various: use `types.port` instead of `types.int` (#445243)

+1 -1
nixos/modules/profiles/nix-builder-vm.nix
···
};
hostPort = mkOption {
default = 31022;
-
type = types.int;
+
type = types.port;
example = 22;
description = ''
The localhost host port to forward TCP to the guest port.
+1 -1
nixos/modules/services/continuous-integration/buildbot/master.nix
···
pbPort = lib.mkOption {
default = 9989;
-
type = lib.types.either lib.types.str lib.types.int;
+
type = lib.types.either lib.types.str lib.types.port;
example = "'tcp:9990:interface=127.0.0.1'";
description = ''
The buildmaster will listen on a TCP port of your choosing
+1 -1
nixos/modules/services/continuous-integration/gocd-server/default.nix
···
sslPort = mkOption {
default = 8154;
-
type = types.int;
+
type = types.port;
description = ''
Specifies port number on which the Go.CD server HTTPS interface listens.
'';
+1 -1
nixos/modules/services/databases/cassandra.nix
···
};
jmxPort = mkOption {
-
type = types.int;
+
type = types.port;
default = 7199;
description = ''
Specifies the default port over which Cassandra will be available for
+1 -1
nixos/modules/services/databases/foundationdb.nix
···
};
listenPortStart = lib.mkOption {
-
type = lib.types.int;
+
type = lib.types.port;
default = 4500;
description = ''
Starting port number for database listening sockets. Every FDB process binds to a
+1 -1
nixos/modules/services/misc/gitlab.nix
···
description = "External address used to access registry from the internet";
};
externalPort = mkOption {
-
type = types.int;
+
type = types.port;
description = "External port used to access registry from the internet";
};
};
+1 -1
nixos/modules/services/misc/homepage-dashboard.nix
···
};
listenPort = lib.mkOption {
-
type = lib.types.int;
+
type = lib.types.port;
default = 8082;
description = "Port for Homepage to bind to.";
};
+1 -1
nixos/modules/services/misc/taskserver/default.nix
···
};
listenPort = lib.mkOption {
-
type = lib.types.int;
+
type = lib.types.port;
default = 53589;
description = ''
Port number of the Taskserver.
+1 -1
nixos/modules/services/monitoring/prometheus/exporters/fritzbox.nix
···
};
gatewayPort = mkOption {
-
type = types.int;
+
type = types.port;
default = 49000;
description = ''
The port of the FRITZ!Box UPnP service.
+1 -1
nixos/modules/services/monitoring/statsd.nix
···
graphitePort = lib.mkOption {
description = "Port of Graphite server (i.e. carbon-cache).";
default = null;
-
type = lib.types.nullOr lib.types.int;
+
type = lib.types.nullOr lib.types.port;
};
extraConfig = lib.mkOption {
+3 -3
nixos/modules/services/network-filesystems/nfsd.nix
···
};
mountdPort = lib.mkOption {
-
type = lib.types.nullOr lib.types.int;
+
type = lib.types.nullOr lib.types.port;
default = null;
example = 4002;
description = ''
···
};
lockdPort = lib.mkOption {
-
type = lib.types.nullOr lib.types.int;
+
type = lib.types.nullOr lib.types.port;
default = null;
example = 4001;
description = ''
···
};
statdPort = lib.mkOption {
-
type = lib.types.nullOr lib.types.int;
+
type = lib.types.nullOr lib.types.port;
default = null;
example = 4000;
description = ''
+1 -1
nixos/modules/services/network-filesystems/tahoe.nix
···
sftpd.enable = lib.mkEnableOption "SFTP service";
sftpd.port = lib.mkOption {
default = null;
-
type = lib.types.nullOr lib.types.int;
+
type = lib.types.nullOr lib.types.port;
description = ''
The port on which the SFTP server will listen.
+2 -2
nixos/modules/services/networking/3proxy.nix
···
'';
};
bindPort = lib.mkOption {
-
type = lib.types.nullOr lib.types.int;
+
type = lib.types.nullOr lib.types.port;
default = null;
example = 3128;
description = ''
···
'';
};
targetPorts = lib.mkOption {
-
type = lib.types.listOf lib.types.int;
+
type = lib.types.listOf lib.types.port;
default = [ ];
example = [
80
+1 -1
nixos/modules/services/networking/autossh.nix
···
description = "Name of the user the AutoSSH session should run as";
};
monitoringPort = lib.mkOption {
-
type = lib.types.int;
+
type = lib.types.port;
default = 0;
example = 20000;
description = ''
+7 -7
nixos/modules/services/networking/coturn.nix
···
services.coturn = {
enable = lib.mkEnableOption "coturn TURN server";
listening-port = lib.mkOption {
-
type = lib.types.int;
+
type = lib.types.port;
default = 3478;
description = ''
TURN listener port for UDP and TCP.
···
'';
};
tls-listening-port = lib.mkOption {
-
type = lib.types.int;
+
type = lib.types.port;
default = 5349;
description = ''
TURN listener port for TLS.
···
'';
};
alt-listening-port = lib.mkOption {
-
type = lib.types.int;
+
type = lib.types.port;
default = cfg.listening-port + 1;
defaultText = lib.literalExpression "listening-port + 1";
description = ''
···
'';
};
alt-tls-listening-port = lib.mkOption {
-
type = lib.types.int;
+
type = lib.types.port;
default = cfg.tls-listening-port + 1;
defaultText = lib.literalExpression "tls-listening-port + 1";
description = ''
···
'';
};
min-port = lib.mkOption {
-
type = lib.types.int;
+
type = lib.types.port;
default = 49152;
description = ''
Lower bound of UDP relay endpoints
'';
};
max-port = lib.mkOption {
-
type = lib.types.int;
+
type = lib.types.port;
default = 65535;
description = ''
Upper bound of UDP relay endpoints
···
'';
};
cli-port = lib.mkOption {
-
type = lib.types.int;
+
type = lib.types.port;
default = 5766;
description = ''
CLI server port.
+3 -3
nixos/modules/services/networking/i2pd.nix
···
description = "Upstream outproxy bind address.";
};
outproxyPort = mkOption {
-
type = types.int;
+
type = types.port;
default = 4444;
description = "Upstream outproxy bind port.";
};
···
{
options = {
destinationPort = mkOption {
-
type = with types; nullOr int;
+
type = with types; nullOr port;
default = null;
description = "Connect to particular port at destination.";
};
···
{
options = {
inPort = mkOption {
-
type = types.int;
+
type = types.port;
default = 0;
description = "Service port. Default to the tunnel's listen port.";
};
+2 -2
nixos/modules/services/networking/livekit-ingress.nix
···
rtc_config = {
port_range_start = lib.mkOption {
-
type = lib.types.int;
+
type = lib.types.port;
default = 50000;
description = "Start of UDP port range for WebRTC";
};
port_range_end = lib.mkOption {
-
type = lib.types.int;
+
type = lib.types.port;
default = 51000;
description = "End of UDP port range for WebRTC";
};
+2 -2
nixos/modules/services/networking/livekit.nix
···
rtc = {
port_range_start = lib.mkOption {
-
type = lib.types.int;
+
type = lib.types.port;
default = 50000;
description = "Start of UDP port range for WebRTC";
};
port_range_end = lib.mkOption {
-
type = lib.types.int;
+
type = lib.types.port;
default = 51000;
description = "End of UDP port range for WebRTC";
};
+1 -1
nixos/modules/services/networking/ntopng.nix
···
httpPort = mkOption {
default = 3000;
-
type = types.int;
+
type = types.port;
description = ''
Sets the HTTP port of the embedded web server.
'';
+2 -2
nixos/modules/services/networking/prosody.nix
···
# HTTP server-related options
httpPorts = mkOption {
-
type = types.listOf types.int;
+
type = types.listOf types.port;
description = "Listening HTTP ports list for this service.";
default = [ 5280 ];
};
···
};
httpsPorts = mkOption {
-
type = types.listOf types.int;
+
type = types.listOf types.port;
description = "Listening HTTPS ports list for this service.";
default = [ 5281 ];
};
+2 -2
nixos/modules/services/networking/resilio.nix
···
};
listeningPort = mkOption {
-
type = types.int;
+
type = types.port;
default = 0;
example = 44444;
description = ''
···
};
httpListenPort = mkOption {
-
type = types.int;
+
type = types.port;
default = 9000;
description = ''
HTTP port to bind on.
+1 -1
nixos/modules/services/networking/squid.nix
···
};
proxyPort = mkOption {
-
type = types.int;
+
type = types.port;
default = 3128;
description = "TCP port on which squid will listen.";
};
+1 -1
nixos/modules/services/networking/syncthing.nix
···
};
localAnnouncePort = mkOption {
-
type = types.nullOr types.int;
+
type = types.nullOr types.port;
default = null;
description = ''
The port on which to listen and send IPv4 broadcast announcements to.
+1 -1
nixos/modules/services/networking/websockify.nix
···
portMap = mkOption {
description = "Ports to map by default.";
default = { };
-
type = types.attrsOf types.int;
+
type = types.attrsOf types.port;
};
};
};
+1 -1
nixos/modules/services/networking/zerobin.nix
···
};
listenPort = mkOption {
-
type = types.int;
+
type = types.port;
default = 8000;
example = 1357;
description = ''
+1 -1
nixos/modules/services/search/elasticsearch.nix
···
tcp_port = mkOption {
description = "Elasticsearch port for the node to node communication.";
default = 9300;
-
type = types.int;
+
type = types.port;
};
cluster_name = mkOption {
+2 -2
nixos/modules/services/security/shibboleth-sp.nix
···
};
fastcgi.shibAuthorizerPort = lib.mkOption {
-
type = lib.types.int;
+
type = lib.types.port;
default = 9100;
description = "Port for shibauthorizer FastCGI process to bind to";
};
fastcgi.shibResponderPort = lib.mkOption {
-
type = lib.types.int;
+
type = lib.types.port;
default = 9101;
description = "Port for shibauthorizer FastCGI process to bind to";
};
+1 -1
nixos/modules/services/web-apps/anuko-time-tracker.nix
···
};
smtpPort = lib.mkOption {
-
type = lib.types.int;
+
type = lib.types.port;
description = "MTA port.";
default = 25;
};
+2 -2
nixos/modules/services/web-apps/cryptpad.nix
···
description = "Address on which the Node.js server should listen";
};
httpPort = mkOption {
-
type = types.int;
+
type = types.port;
default = 3000;
description = "Port on which the Node.js server should listen";
};
websocketPort = mkOption {
-
type = types.int;
+
type = types.port;
default = 3003;
description = "Port for the websocket that needs to be separate";
};
+1 -1
nixos/modules/services/web-apps/kasmweb/default.nix
···
};
listenPort = lib.mkOption {
-
type = lib.types.int;
+
type = lib.types.port;
default = 443;
description = ''
The port on which kasmweb should listen.
+1 -1
nixos/modules/services/web-apps/nexus.nix
···
};
listenPort = mkOption {
-
type = types.int;
+
type = types.port;
default = 8081;
description = "Port to listen on.";
};
+2 -2
nixos/modules/services/web-apps/nifi.nix
···
};
listenPort = lib.mkOption {
-
type = lib.types.int;
+
type = lib.types.port;
default = if cfg.enableHTTPS then 8443 else 8080;
defaultText = lib.literalExpression ''
if config.${opt.enableHTTPS}
···
};
proxyPort = lib.mkOption {
-
type = lib.types.nullOr lib.types.int;
+
type = lib.types.nullOr lib.types.port;
default = if cfg.enableHTTPS then 8443 else null;
defaultText = lib.literalExpression ''
if config.${opt.enableHTTPS}
+1 -1
nixos/modules/services/web-apps/pgpkeyserver-lite.nix
···
hkpPort = mkOption {
default = sksCfg.hkpPort;
defaultText = literalExpression "config.${sksOpt.hkpPort}";
-
type = types.int;
+
type = types.port;
description = ''
Which port the sks-keyserver is listening on.
'';
+1 -1
nixos/modules/services/web-apps/plantuml-server.nix
···
};
listenPort = mkOption {
-
type = types.int;
+
type = types.port;
default = 8080;
description = "Port to listen on.";
};
+1 -1
nixos/modules/services/web-apps/silverbullet.nix
···
};
listenPort = lib.mkOption {
-
type = lib.types.int;
+
type = lib.types.port;
default = 3000;
description = "Port to listen on.";
};
+2 -2
nixos/modules/virtualisation/nixos-containers.nix
···
description = "The protocol specifier for port forwarding between host and container";
};
hostPort = mkOption {
-
type = types.int;
+
type = types.port;
description = "Source port of the external interface on host";
};
containerPort = mkOption {
-
type = types.nullOr types.int;
+
type = types.nullOr types.port;
default = null;
description = "Target port of container";
};