Merge pull request #200440 from nagy/treewide-modules

treewide: use `types.port` and `mkEnableOption` in nixos modules

figsoda e920aed5 a72fc0d5

+2 -3
nixos/modules/hardware/brillo.nix
···
options = {
hardware.brillo = {
enable = mkEnableOption (lib.mdDoc ''
-
Enable brillo in userspace.
-
This will allow brightness control from users in the video group.
'');
};
};
-
config = mkIf cfg.enable {
services.udev.packages = [ pkgs.brillo ];
···
options = {
hardware.brillo = {
enable = mkEnableOption (lib.mdDoc ''
+
brillo in userspace.
+
This will allow brightness control from users in the video group
'');
};
};
config = mkIf cfg.enable {
services.udev.packages = [ pkgs.brillo ];
+1 -1
nixos/modules/hardware/ubertooth.nix
···
};
in {
options.hardware.ubertooth = {
-
enable = mkEnableOption (lib.mdDoc "Enable the Ubertooth software and its udev rules.");
group = mkOption {
type = types.str;
···
};
in {
options.hardware.ubertooth = {
+
enable = mkEnableOption (lib.mdDoc "Ubertooth software and its udev rules");
group = mkOption {
type = types.str;
+1 -1
nixos/modules/hardware/wooting.nix
···
with lib;
{
options.hardware.wooting.enable =
-
mkEnableOption (lib.mdDoc "Enable support for Wooting keyboards");
config = mkIf config.hardware.wooting.enable {
environment.systemPackages = [ pkgs.wootility ];
···
with lib;
{
options.hardware.wooting.enable =
+
mkEnableOption (lib.mdDoc "support for Wooting keyboards");
config = mkIf config.hardware.wooting.enable {
environment.systemPackages = [ pkgs.wootility ];
+1 -1
nixos/modules/programs/kclock.nix
···
cfg = config.programs.kclock;
kclockPkg = pkgs.libsForQt5.kclock;
in {
-
options.programs.kclock = { enable = mkEnableOption (lib.mdDoc "Enable KClock"); };
config = mkIf cfg.enable {
services.dbus.packages = [ kclockPkg ];
···
cfg = config.programs.kclock;
kclockPkg = pkgs.libsForQt5.kclock;
in {
+
options.programs.kclock = { enable = mkEnableOption (lib.mdDoc "KClock"); };
config = mkIf cfg.enable {
services.dbus.packages = [ kclockPkg ];
+1 -1
nixos/modules/services/audio/ympd.nix
···
};
port = mkOption {
-
type = types.int;
default = config.services.mpd.network.port;
defaultText = literalExpression "config.services.mpd.network.port";
description = lib.mdDoc "The port where MPD is listening.";
···
};
port = mkOption {
+
type = types.port;
default = config.services.mpd.network.port;
defaultText = literalExpression "config.services.mpd.network.port";
description = lib.mdDoc "The port where MPD is listening.";
+3 -3
nixos/modules/services/backup/bacula.nix
···
port = mkOption {
default = 9102;
-
type = types.int;
description = lib.mdDoc ''
This specifies the port number on which the Client listens for
Director connections. It must agree with the FDPort specified in
···
port = mkOption {
default = 9103;
-
type = types.int;
description = lib.mdDoc ''
Specifies port number on which the Storage daemon listens for
Director connections.
···
port = mkOption {
default = 9101;
-
type = types.int;
description = lib.mdDoc ''
Specify the port (a positive integer) on which the Director daemon
will listen for Bacula Console connections. This same port number
···
port = mkOption {
default = 9102;
+
type = types.port;
description = lib.mdDoc ''
This specifies the port number on which the Client listens for
Director connections. It must agree with the FDPort specified in
···
port = mkOption {
default = 9103;
+
type = types.port;
description = lib.mdDoc ''
Specifies port number on which the Storage daemon listens for
Director connections.
···
port = mkOption {
default = 9101;
+
type = types.port;
description = lib.mdDoc ''
Specify the port (a positive integer) on which the Director daemon
will listen for Bacula Console connections. This same port number
+1 -1
nixos/modules/services/backup/duplicati.nix
···
port = mkOption {
default = 8200;
-
type = types.int;
description = lib.mdDoc ''
Port serving the web interface
'';
···
port = mkOption {
default = 8200;
+
type = types.port;
description = lib.mdDoc ''
Port serving the web interface
'';
+1 -1
nixos/modules/services/cluster/kubernetes/flannel.nix
···
{
###### interface
options.services.kubernetes.flannel = {
-
enable = mkEnableOption (lib.mdDoc "enable flannel networking");
};
###### implementation
···
{
###### interface
options.services.kubernetes.flannel = {
+
enable = mkEnableOption (lib.mdDoc "flannel networking");
};
###### implementation
+1 -1
nixos/modules/services/computing/foldingathome/client.nix
···
'')
];
options.services.foldingathome = {
-
enable = mkEnableOption (lib.mdDoc "Enable the Folding@home client");
package = mkOption {
type = types.package;
···
'')
];
options.services.foldingathome = {
+
enable = mkEnableOption (lib.mdDoc "Folding@home client");
package = mkOption {
type = types.package;
+1 -7
nixos/modules/services/databases/couchdb.nix
···
services.couchdb = {
-
enable = mkOption {
-
type = types.bool;
-
default = false;
-
description = lib.mdDoc ''
-
Whether to run CouchDB Server.
-
'';
-
};
package = mkOption {
type = types.package;
···
services.couchdb = {
+
enable = mkEnableOption (lib.mdDoc "CouchDB Server");
package = mkOption {
type = types.package;
+2 -8
nixos/modules/services/databases/opentsdb.nix
···
services.opentsdb = {
-
enable = mkOption {
-
type = types.bool;
-
default = false;
-
description = lib.mdDoc ''
-
Whether to run OpenTSDB.
-
'';
-
};
package = mkOption {
type = types.package;
···
};
port = mkOption {
-
type = types.int;
default = 4242;
description = lib.mdDoc ''
Which port OpenTSDB listens on.
···
services.opentsdb = {
+
enable = mkEnableOption (lib.mdDoc "OpenTSDB");
package = mkOption {
type = types.package;
···
};
port = mkOption {
+
type = types.port;
default = 4242;
description = lib.mdDoc ''
Which port OpenTSDB listens on.
+1 -1
nixos/modules/services/databases/pgmanage.nix
···
};
port = mkOption {
-
type = types.int;
default = 8080;
description = lib.mdDoc ''
This tells pgmanage what port to listen on for browser requests.
···
};
port = mkOption {
+
type = types.port;
default = 8080;
description = lib.mdDoc ''
This tells pgmanage what port to listen on for browser requests.
+1 -1
nixos/modules/services/games/teeworlds.nix
···
};
port = mkOption {
-
type = types.int;
default = 8303;
description = lib.mdDoc ''
Port the server will listen on.
···
};
port = mkOption {
+
type = types.port;
default = 8303;
description = lib.mdDoc ''
Port the server will listen on.
+1 -1
nixos/modules/services/home-automation/zigbee2mqtt.nix
···
];
options.services.zigbee2mqtt = {
-
enable = mkEnableOption (lib.mdDoc "enable zigbee2mqtt service");
package = mkOption {
description = lib.mdDoc "Zigbee2mqtt package to use";
···
];
options.services.zigbee2mqtt = {
+
enable = mkEnableOption (lib.mdDoc "zigbee2mqtt service");
package = mkOption {
description = lib.mdDoc "Zigbee2mqtt package to use";
+1 -5
nixos/modules/services/logging/fluentd.nix
···
options = {
services.fluentd = {
-
enable = mkOption {
-
type = types.bool;
-
default = false;
-
description = lib.mdDoc "Whether to enable fluentd.";
-
};
config = mkOption {
type = types.lines;
···
options = {
services.fluentd = {
+
enable = mkEnableOption (lib.mdDoc "fluentd");
config = mkOption {
type = types.lines;
+1 -7
nixos/modules/services/logging/logcheck.nix
···
{
options = {
services.logcheck = {
-
enable = mkOption {
-
default = false;
-
type = types.bool;
-
description = lib.mdDoc ''
-
Enable the logcheck cron job.
-
'';
-
};
user = mkOption {
default = "logcheck";
···
{
options = {
services.logcheck = {
+
enable = mkEnableOption (lib.mdDoc "logcheck cron job");
user = mkOption {
default = "logcheck";
+1 -1
nixos/modules/services/misc/airsonic.nix
···
};
port = mkOption {
-
type = types.int;
default = 4040;
description = lib.mdDoc ''
The port on which Airsonic will listen for
···
};
port = mkOption {
+
type = types.port;
default = 4040;
description = lib.mdDoc ''
The port on which Airsonic will listen for
+1 -1
nixos/modules/services/misc/ankisyncd.nix
···
};
port = mkOption {
-
type = types.int;
default = 27701;
description = lib.mdDoc "ankisyncd port";
};
···
};
port = mkOption {
+
type = types.port;
default = 27701;
description = lib.mdDoc "ankisyncd port";
};
+1 -1
nixos/modules/services/misc/apache-kafka.nix
···
port = mkOption {
description = lib.mdDoc "Port number the broker should listen on.";
default = 9092;
-
type = types.int;
};
hostname = mkOption {
···
port = mkOption {
description = lib.mdDoc "Port number the broker should listen on.";
default = 9092;
+
type = types.port;
};
hostname = mkOption {
+3 -8
nixos/modules/services/misc/exhibitor.nix
···
{
options = {
services.exhibitor = {
-
enable = mkOption {
-
type = types.bool;
-
default = false;
-
description = lib.mdDoc ''
-
Whether to enable the exhibitor server.
-
'';
-
};
# See https://github.com/soabase/exhibitor/wiki/Running-Exhibitor for what these mean
# General options for any type of config
port = mkOption {
-
type = types.int;
default = 8080;
description = lib.mdDoc ''
The port for exhibitor to listen on and communicate with other exhibitors.
···
{
options = {
services.exhibitor = {
+
enable = mkEnableOption (lib.mdDoc "exhibitor server");
+
# See https://github.com/soabase/exhibitor/wiki/Running-Exhibitor for what these mean
# General options for any type of config
port = mkOption {
+
type = types.port;
default = 8080;
description = lib.mdDoc ''
The port for exhibitor to listen on and communicate with other exhibitors.
+2 -2
nixos/modules/services/misc/gogs.nix
···
};
port = mkOption {
-
type = types.int;
default = 3306;
description = lib.mdDoc "Database host port.";
};
···
};
httpPort = mkOption {
-
type = types.int;
default = 3000;
description = lib.mdDoc "HTTP listen port.";
};
···
};
port = mkOption {
+
type = types.port;
default = 3306;
description = lib.mdDoc "Database host port.";
};
···
};
httpPort = mkOption {
+
type = types.port;
default = 3000;
description = lib.mdDoc "HTTP listen port.";
};
+2 -6
nixos/modules/services/misc/gollum.nix
···
{
options.services.gollum = {
-
enable = mkOption {
-
type = types.bool;
-
default = false;
-
description = lib.mdDoc "Enable the Gollum service.";
-
};
address = mkOption {
type = types.str;
···
};
port = mkOption {
-
type = types.int;
default = 4567;
description = lib.mdDoc "Port on which the web server will run.";
};
···
{
options.services.gollum = {
+
enable = mkEnableOption (lib.mdDoc "Gollum service");
address = mkOption {
type = types.str;
···
};
port = mkOption {
+
type = types.port;
default = 4567;
description = lib.mdDoc "Port on which the web server will run.";
};
+1 -1
nixos/modules/services/misc/parsoid.nix
···
};
port = mkOption {
-
type = types.int;
default = 8000;
description = lib.mdDoc ''
Port to listen on.
···
};
port = mkOption {
+
type = types.port;
default = 8000;
description = lib.mdDoc ''
Port to listen on.
+1 -1
nixos/modules/services/misc/pykms.nix
···
};
port = mkOption {
-
type = types.int;
default = 1688;
description = lib.mdDoc "The port on which to listen.";
};
···
};
port = mkOption {
+
type = types.port;
default = 1688;
description = lib.mdDoc "The port on which to listen.";
};
+1 -1
nixos/modules/services/misc/redmine.nix
···
};
port = mkOption {
-
type = types.int;
default = if cfg.database.type == "postgresql" then 5432 else 3306;
defaultText = literalExpression "3306";
description = lib.mdDoc "Database host port.";
···
};
port = mkOption {
+
type = types.port;
default = if cfg.database.type == "postgresql" then 5432 else 3306;
defaultText = literalExpression "3306";
description = lib.mdDoc "Database host port.";
+1 -1
nixos/modules/services/misc/rippled.nix
···
port = mkOption {
description = lib.mdDoc "Port where rippled listens.";
-
type = types.int;
};
protocol = mkOption {
···
port = mkOption {
description = lib.mdDoc "Port where rippled listens.";
+
type = types.port;
};
protocol = mkOption {
+1 -1
nixos/modules/services/misc/tautulli.nix
···
};
port = mkOption {
-
type = types.int;
default = 8181;
description = lib.mdDoc "TCP port where Tautulli listens.";
};
···
};
port = mkOption {
+
type = types.port;
default = 8181;
description = lib.mdDoc "TCP port where Tautulli listens.";
};
+1 -1
nixos/modules/services/misc/zoneminder.nix
···
};
port = mkOption {
-
type = types.int;
default = 8095;
description = lib.mdDoc ''
The port on which to listen.
···
};
port = mkOption {
+
type = types.port;
default = 8095;
description = lib.mdDoc ''
The port on which to listen.
+2 -6
nixos/modules/services/misc/zookeeper.nix
···
in {
options.services.zookeeper = {
-
enable = mkOption {
-
description = lib.mdDoc "Whether to enable Zookeeper.";
-
default = false;
-
type = types.bool;
-
};
port = mkOption {
description = lib.mdDoc "Zookeeper Client port.";
default = 2181;
-
type = types.int;
};
id = mkOption {
···
in {
options.services.zookeeper = {
+
enable = mkEnableOption (lib.mdDoc "Zookeeper");
port = mkOption {
description = lib.mdDoc "Zookeeper Client port.";
default = 2181;
+
type = types.port;
};
id = mkOption {
+1 -1
nixos/modules/services/monitoring/alerta.nix
···
enable = mkEnableOption (lib.mdDoc "alerta");
port = mkOption {
-
type = types.int;
default = 5000;
description = lib.mdDoc "Port of Alerta";
};
···
enable = mkEnableOption (lib.mdDoc "alerta");
port = mkOption {
+
type = types.port;
default = 5000;
description = lib.mdDoc "Port of Alerta";
};
+1 -7
nixos/modules/services/monitoring/arbtt.nix
···
in {
options = {
services.arbtt = {
-
enable = mkOption {
-
type = types.bool;
-
default = false;
-
description = lib.mdDoc ''
-
Enable the arbtt statistics capture service.
-
'';
-
};
package = mkOption {
type = types.package;
···
in {
options = {
services.arbtt = {
+
enable = mkEnableOption (lib.mdDoc "Arbtt statistics capture service");
package = mkOption {
type = types.package;
+1 -7
nixos/modules/services/monitoring/bosun.nix
···
services.bosun = {
-
enable = mkOption {
-
type = types.bool;
-
default = false;
-
description = lib.mdDoc ''
-
Whether to run bosun.
-
'';
-
};
package = mkOption {
type = types.package;
···
services.bosun = {
+
enable = mkEnableOption (lib.mdDoc "bosun");
package = mkOption {
type = types.package;
+2 -6
nixos/modules/services/monitoring/cadvisor.nix
···
in {
options = {
services.cadvisor = {
-
enable = mkOption {
-
default = false;
-
type = types.bool;
-
description = lib.mdDoc "Whether to enable cadvisor service.";
-
};
listenAddress = mkOption {
default = "127.0.0.1";
···
port = mkOption {
default = 8080;
-
type = types.int;
description = lib.mdDoc "Cadvisor listening port";
};
···
in {
options = {
services.cadvisor = {
+
enable = mkEnableOption (lib.mdDoc "Cadvisor service");
listenAddress = mkOption {
default = "127.0.0.1";
···
port = mkOption {
default = 8080;
+
type = types.port;
description = lib.mdDoc "Cadvisor listening port";
};
+1 -7
nixos/modules/services/monitoring/datadog-agent.nix
···
};
in {
options.services.datadog-agent = {
-
enable = mkOption {
-
description = lib.mdDoc ''
-
Whether to enable the datadog-agent v7 monitoring service
-
'';
-
default = false;
-
type = types.bool;
-
};
package = mkOption {
default = pkgs.datadog-agent;
···
};
in {
options.services.datadog-agent = {
+
enable = mkEnableOption (lib.mdDoc "Datadog-agent v7 monitoring service");
package = mkOption {
default = pkgs.datadog-agent;
+2 -2
nixos/modules/services/monitoring/grafana-reporter.nix
···
port = mkOption {
description = lib.mdDoc "Grafana port.";
default = 3000;
-
type = types.int;
};
};
···
port = mkOption {
description = lib.mdDoc "Listening port.";
default = 8686;
-
type = types.int;
};
templateDir = mkOption {
···
port = mkOption {
description = lib.mdDoc "Grafana port.";
default = 3000;
+
type = types.port;
};
};
···
port = mkOption {
description = lib.mdDoc "Listening port.";
default = 8686;
+
type = types.port;
};
templateDir = mkOption {
+1 -5
nixos/modules/services/monitoring/heapster.nix
···
cfg = config.services.heapster;
in {
options.services.heapster = {
-
enable = mkOption {
-
description = lib.mdDoc "Whether to enable heapster monitoring";
-
default = false;
-
type = types.bool;
-
};
source = mkOption {
description = lib.mdDoc "Heapster metric source";
···
cfg = config.services.heapster;
in {
options.services.heapster = {
+
enable = mkEnableOption (lib.mdDoc "Heapster monitoring");
source = mkOption {
description = lib.mdDoc "Heapster metric source";
+1 -7
nixos/modules/services/monitoring/prometheus/default.nix
···
options.services.prometheus = {
-
enable = mkOption {
-
type = types.bool;
-
default = false;
-
description = lib.mdDoc ''
-
Enable the Prometheus monitoring daemon.
-
'';
-
};
package = mkOption {
type = types.package;
···
options.services.prometheus = {
+
enable = mkEnableOption (lib.mdDoc "Prometheus monitoring daemon");
package = mkOption {
type = types.package;
+1 -1
nixos/modules/services/monitoring/prometheus/exporters/mail.nix
···
'';
};
port = mkOption {
-
type = types.int;
example = 587;
description = lib.mdDoc ''
Port to use for SMTP.
···
'';
};
port = mkOption {
+
type = types.port;
example = 587;
description = lib.mdDoc ''
Port to use for SMTP.
+1 -1
nixos/modules/services/monitoring/prometheus/exporters/tor.nix
···
};
torControlPort = mkOption {
-
type = types.int;
default = 9051;
description = lib.mdDoc ''
Tor control port.
···
};
torControlPort = mkOption {
+
type = types.port;
default = 9051;
description = lib.mdDoc ''
Tor control port.
+2 -7
nixos/modules/services/monitoring/riemann.nix
···
options = {
services.riemann = {
-
enable = mkOption {
-
type = types.bool;
-
default = false;
-
description = lib.mdDoc ''
-
Enable the Riemann network monitoring daemon.
-
'';
-
};
config = mkOption {
type = types.lines;
description = lib.mdDoc ''
···
options = {
services.riemann = {
+
enable = mkEnableOption (lib.mdDoc "Riemann network monitoring daemon");
+
config = mkOption {
type = types.lines;
description = lib.mdDoc ''
+1 -1
nixos/modules/services/monitoring/zabbix-server.nix
···
};
port = mkOption {
-
type = types.int;
default = if cfg.database.type == "mysql" then mysql.port else pgsql.port;
defaultText = literalExpression ''
if config.${opt.database.type} == "mysql"
···
};
port = mkOption {
+
type = types.port;
default = if cfg.database.type == "mysql" then mysql.port else pgsql.port;
defaultText = literalExpression ''
if config.${opt.database.type} == "mysql"
+1 -1
nixos/modules/services/network-filesystems/samba-wsdd.nix
···
options = {
services.samba-wsdd = {
enable = mkEnableOption (lib.mdDoc ''
-
Enable Web Services Dynamic Discovery host daemon. This enables (Samba) hosts, like your local NAS device,
to be found by Web Service Discovery Clients like Windows.
::: {.note}
···
options = {
services.samba-wsdd = {
enable = mkEnableOption (lib.mdDoc ''
+
Web Services Dynamic Discovery host daemon. This enables (Samba) hosts, like your local NAS device,
to be found by Web Service Discovery Clients like Windows.
::: {.note}
+1 -1
nixos/modules/services/networking/bitlbee.nix
···
portNumber = mkOption {
default = 6667;
-
type = types.int;
description = lib.mdDoc ''
Number of the port BitlBee will be listening to.
'';
···
portNumber = mkOption {
default = 6667;
+
type = types.port;
description = lib.mdDoc ''
Number of the port BitlBee will be listening to.
'';
+2 -2
nixos/modules/services/networking/dnscrypt-wrapper.nix
···
};
port = mkOption {
-
type = types.int;
default = 5353;
description = lib.mdDoc ''
The DNSCrypt wrapper will listen for DNS queries on this port.
···
};
upstream.port = mkOption {
-
type = types.int;
default = 53;
description = lib.mdDoc ''
The port of the upstream DNS server DNSCrypt will "wrap".
···
};
port = mkOption {
+
type = types.port;
default = 5353;
description = lib.mdDoc ''
The DNSCrypt wrapper will listen for DNS queries on this port.
···
};
upstream.port = mkOption {
+
type = types.port;
default = 53;
description = lib.mdDoc ''
The port of the upstream DNS server DNSCrypt will "wrap".
+1 -1
nixos/modules/services/networking/eternal-terminal.nix
···
port = mkOption {
default = 2022;
-
type = types.int;
description = lib.mdDoc ''
The port the server should listen on. Will use the server's default (2022) if not specified.
···
port = mkOption {
default = 2022;
+
type = types.port;
description = lib.mdDoc ''
The port the server should listen on. Will use the server's default (2022) if not specified.
+1 -1
nixos/modules/services/networking/magic-wormhole-mailbox-server.nix
···
in
{
options.services.magic-wormhole-mailbox-server = {
-
enable = mkEnableOption (lib.mdDoc "Enable Magic Wormhole Mailbox Server");
};
config = mkIf cfg.enable {
···
in
{
options.services.magic-wormhole-mailbox-server = {
+
enable = mkEnableOption (lib.mdDoc "Magic Wormhole Mailbox Server");
};
config = mkIf cfg.enable {
+2 -7
nixos/modules/services/networking/mozillavpn.nix
···
{ config, lib, pkgs, ... }:
{
-
options.services.mozillavpn.enable = lib.mkOption {
-
type = lib.types.bool;
-
default = false;
-
description = lib.mdDoc ''
-
Enable the Mozilla VPN daemon.
-
'';
-
};
config = lib.mkIf config.services.mozillavpn.enable {
environment.systemPackages = [ pkgs.mozillavpn ];
···
{ config, lib, pkgs, ... }:
{
+
options.services.mozillavpn.enable =
+
lib.mkEnableOption (lib.mdDoc "Mozilla VPN daemon");
config = lib.mkIf config.services.mozillavpn.enable {
environment.systemPackages = [ pkgs.mozillavpn ];
+1 -1
nixos/modules/services/networking/networkmanager.nix
···
If you enable this option the
`networkmanager_strongswan` plugin will be added to
the {option}`networking.networkmanager.plugins` option
-
so you don't need to to that yourself.
'';
};
···
If you enable this option the
`networkmanager_strongswan` plugin will be added to
the {option}`networking.networkmanager.plugins` option
+
so you don't need to do that yourself.
'';
};
+2 -2
nixos/modules/services/networking/nntp-proxy.nix
···
};
upstreamPort = mkOption {
-
type = types.int;
default = 563;
description = lib.mdDoc ''
Upstream server port
···
};
port = mkOption {
-
type = types.int;
default = 5555;
description = lib.mdDoc ''
Proxy listen port
···
};
upstreamPort = mkOption {
+
type = types.port;
default = 563;
description = lib.mdDoc ''
Upstream server port
···
};
port = mkOption {
+
type = types.port;
default = 5555;
description = lib.mdDoc ''
Proxy listen port
+1 -5
nixos/modules/services/networking/onedrive.nix
···
### Interface
options.services.onedrive = {
-
enable = lib.mkOption {
-
type = lib.types.bool;
-
default = false;
-
description = lib.mdDoc "Enable OneDrive service";
-
};
package = lib.mkOption {
type = lib.types.package;
···
### Interface
options.services.onedrive = {
+
enable = lib.mkEnableOption (lib.mdDoc "OneDrive service");
package = lib.mkOption {
type = lib.types.package;
+1 -1
nixos/modules/services/networking/ostinato.nix
···
enable = mkEnableOption (lib.mdDoc "Ostinato agent-controller (Drone)");
port = mkOption {
-
type = types.int;
default = 7878;
description = lib.mdDoc ''
Port to listen on.
···
enable = mkEnableOption (lib.mdDoc "Ostinato agent-controller (Drone)");
port = mkOption {
+
type = types.port;
default = 7878;
description = lib.mdDoc ''
Port to listen on.
+1 -1
nixos/modules/services/networking/owamp.nix
···
###### interface
options = {
-
services.owamp.enable = mkEnableOption (lib.mdDoc "Enable OWAMP server");
};
···
###### interface
options = {
+
services.owamp.enable = mkEnableOption (lib.mdDoc "OWAMP server");
};
+2 -6
nixos/modules/services/networking/polipo.nix
···
services.polipo = {
-
enable = mkOption {
-
type = types.bool;
-
default = false;
-
description = lib.mdDoc "Whether to run the polipo caching web proxy.";
-
};
proxyAddress = mkOption {
type = types.str;
···
};
proxyPort = mkOption {
-
type = types.int;
default = 8123;
description = lib.mdDoc "TCP port on which Polipo will listen.";
};
···
services.polipo = {
+
enable = mkEnableOption (lib.mdDoc "polipo caching web proxy");
proxyAddress = mkOption {
type = types.str;
···
};
proxyPort = mkOption {
+
type = types.port;
default = 8123;
description = lib.mdDoc "TCP port on which Polipo will listen.";
};
+1 -1
nixos/modules/services/networking/shadowsocks.nix
···
};
port = mkOption {
-
type = types.int;
default = 8388;
description = lib.mdDoc ''
Port which the server uses.
···
};
port = mkOption {
+
type = types.port;
default = 8388;
description = lib.mdDoc ''
Port which the server uses.
+3 -6
nixos/modules/services/networking/smokeping.nix
···
{
options = {
services.smokeping = {
-
enable = mkOption {
-
type = types.bool;
-
default = false;
-
description = lib.mdDoc "Enable the smokeping service";
-
};
alertConfig = mkOption {
type = types.lines;
default = ''
···
'';
};
port = mkOption {
-
type = types.int;
default = 8081;
description = lib.mdDoc "TCP port to use for the web server.";
};
···
{
options = {
services.smokeping = {
+
enable = mkEnableOption (lib.mdDoc "smokeping service");
+
alertConfig = mkOption {
type = types.lines;
default = ''
···
'';
};
port = mkOption {
+
type = types.port;
default = 8081;
description = lib.mdDoc "TCP port to use for the web server.";
};
+1 -1
nixos/modules/services/networking/sslh.nix
···
};
port = mkOption {
-
type = types.int;
default = 443;
description = lib.mdDoc "Listening port.";
};
···
};
port = mkOption {
+
type = types.port;
default = 443;
description = lib.mdDoc "Listening port.";
};
+1 -1
nixos/modules/services/networking/teleport.nix
···
};
port = mkOption {
-
type = int;
default = 3000;
description = lib.mdDoc "Metrics and diagnostics port.";
};
···
};
port = mkOption {
+
type = port;
default = 3000;
description = lib.mdDoc "Metrics and diagnostics port.";
};
+1 -1
nixos/modules/services/networking/tox-bootstrapd.nix
···
};
port = mkOption {
-
type = types.int;
default = 33445;
description = lib.mdDoc "Listening port (UDP).";
};
···
};
port = mkOption {
+
type = types.port;
default = 33445;
description = lib.mdDoc "Listening port (UDP).";
};
+1 -1
nixos/modules/services/networking/toxvpn.nix
···
};
port = mkOption {
-
type = types.int;
default = 33445;
description = lib.mdDoc "udp port for toxcore, port-forward to help with connectivity if you run many nodes behind one NAT";
};
···
};
port = mkOption {
+
type = types.port;
default = 33445;
description = lib.mdDoc "udp port for toxcore, port-forward to help with connectivity if you run many nodes behind one NAT";
};
+1 -1
nixos/modules/services/networking/xrdp.nix
···
};
port = mkOption {
-
type = types.int;
default = 3389;
description = lib.mdDoc ''
Specifies on which port the xrdp daemon listens.
···
};
port = mkOption {
+
type = types.port;
default = 3389;
description = lib.mdDoc ''
Specifies on which port the xrdp daemon listens.
+1 -1
nixos/modules/services/networking/zerotierone.nix
···
options.services.zerotierone.port = mkOption {
default = 9993;
-
type = types.int;
description = lib.mdDoc ''
Network port used by ZeroTier.
'';
···
options.services.zerotierone.port = mkOption {
default = 9993;
+
type = types.port;
description = lib.mdDoc ''
Network port used by ZeroTier.
'';
+1 -1
nixos/modules/services/search/solr.nix
···
};
port = mkOption {
-
type = types.int;
default = 8983;
description = lib.mdDoc "Port on which Solr is ran.";
};
···
};
port = mkOption {
+
type = types.port;
default = 8983;
description = lib.mdDoc "Port on which Solr is ran.";
};
+2 -2
nixos/modules/services/web-apps/atlassian/crowd.nix
···
};
listenPort = mkOption {
-
type = types.int;
default = 8092;
description = lib.mdDoc "Port to listen on.";
};
···
};
port = mkOption {
-
type = types.int;
default = 443;
example = 80;
description = lib.mdDoc "Port used at the proxy";
···
};
listenPort = mkOption {
+
type = types.port;
default = 8092;
description = lib.mdDoc "Port to listen on.";
};
···
};
port = mkOption {
+
type = types.port;
default = 443;
example = 80;
description = lib.mdDoc "Port used at the proxy";
+4 -4
nixos/modules/services/web-apps/peertube.nix
···
in {
options.services.peertube = {
-
enable = lib.mkEnableOption (lib.mdDoc "Enable Peertube’s service");
user = lib.mkOption {
type = lib.types.str;
···
};
listenHttp = lib.mkOption {
-
type = lib.types.int;
default = 9000;
description = lib.mdDoc "listen port for HTTP server.";
};
listenWeb = lib.mkOption {
-
type = lib.types.int;
default = 9000;
description = lib.mdDoc "listen port for WEB server.";
};
···
};
port = lib.mkOption {
-
type = lib.types.int;
default = 5432;
description = lib.mdDoc "Database host port.";
};
···
in {
options.services.peertube = {
+
enable = lib.mkEnableOption (lib.mdDoc "Peertube");
user = lib.mkOption {
type = lib.types.str;
···
};
listenHttp = lib.mkOption {
+
type = lib.types.port;
default = 9000;
description = lib.mdDoc "listen port for HTTP server.";
};
listenWeb = lib.mkOption {
+
type = lib.types.port;
default = 9000;
description = lib.mdDoc "listen port for WEB server.";
};
···
};
port = lib.mkOption {
+
type = lib.types.port;
default = 5432;
description = lib.mdDoc "Database host port.";
};
+2 -2
nixos/modules/services/web-apps/restya-board.nix
···
};
listenPort = mkOption {
-
type = types.int;
default = 3000;
description = lib.mdDoc ''
Listen port for the virtualhost to use.
···
};
port = mkOption {
-
type = types.int;
default = 25;
description = lib.mdDoc ''
Port used to connect to SMTP server.
···
};
listenPort = mkOption {
+
type = types.port;
default = 3000;
description = lib.mdDoc ''
Listen port for the virtualhost to use.
···
};
port = mkOption {
+
type = types.port;
default = 25;
description = lib.mdDoc ''
Port used to connect to SMTP server.
+1 -1
nixos/modules/services/web-apps/trilium.nix
···
};
port = mkOption {
-
type = types.int;
default = 8080;
description = lib.mdDoc ''
The port number to bind to.
···
};
port = mkOption {
+
type = types.port;
default = 8080;
description = lib.mdDoc ''
The port number to bind to.
+1 -1
nixos/modules/services/web-apps/tt-rss.nix
···
};
port = mkOption {
-
type = types.nullOr types.int;
default = null;
description = lib.mdDoc ''
The database's port. If not set, the default ports will be provided (5432
···
};
port = mkOption {
+
type = types.nullOr types.port;
default = null;
description = lib.mdDoc ''
The database's port. If not set, the default ports will be provided (5432
+1 -1
nixos/modules/services/web-apps/youtrack.nix
···
The port youtrack will listen on.
'';
default = 8080;
-
type = types.int;
};
statePath = mkOption {
···
The port youtrack will listen on.
'';
default = 8080;
+
type = types.port;
};
statePath = mkOption {
+1 -7
nixos/modules/services/x11/clight.nix
···
cfg.settings));
in {
options.services.clight = {
-
enable = mkOption {
-
type = types.bool;
-
default = false;
-
description = lib.mdDoc ''
-
Whether to enable clight or not.
-
'';
-
};
temperature = {
day = mkOption {
···
cfg.settings));
in {
options.services.clight = {
+
enable = mkEnableOption (lib.mdDoc "clight");
temperature = {
day = mkOption {
+1 -1
nixos/modules/system/boot/initrd-ssh.nix
···
};
port = mkOption {
-
type = types.int;
default = 22;
description = lib.mdDoc ''
Port on which SSH initrd service should listen.
···
};
port = mkOption {
+
type = types.port;
default = 22;
description = lib.mdDoc ''
Port on which SSH initrd service should listen.