{pkgs, config, ...}: let inherit (pkgs.lib) mkOption; inherit (builtins) head tail; obsolete = what: f: if builtins ? trace then builtins.trace "Obsolete ${what}." f else f; obsoleteMerge = obsolete "option" pkgs.lib.mergeDefaultOption; # temporary modifications. # backward here means that expression could either be a value or a # function which expects to have a pkgs argument. optionalPkgs = x: if builtins.isFunction x then obsolete "notation" (x pkgs) else x; backwardPkgsFunListMerge = list: pkgs.lib.concatMap optionalPkgs list; backwardPkgsFunMerge = list: if list != [] && tail list == [] then optionalPkgs (head list) else abort "Defined at least twice."; in { time = { timeZone = mkOption { default = "CET"; example = "America/New_York"; description = "The time zone used when displaying times and dates."; }; }; boot = { isLiveCD = mkOption { default = false; description = " If set to true, the root device will be mounted read-only and a ramdisk will be mounted on top of it using unionfs to provide a writable root. This is used for the NixOS Live-CD/DVD. "; }; grubDevice = mkOption { default = ""; example = "/dev/hda"; description = " The device on which the boot loader, Grub, will be installed. If empty, Grub won't be installed and it's your responsibility to make the system bootable. "; }; bootMount = mkOption { default = ""; example = "(hd0,0)"; description = " If the system partition may be wiped on reinstall, it is better to have /boot on a small partition. To do it, we need to explain to GRUB where the kernels live. Specify the partition here (in GRUB notation. "; }; resumeDevice = mkOption { default = ""; example = "0:0"; description = " Device for manual resume attempt during boot. Looks like major:minor. ls -l /dev/SWAP_PARTION shows them. "; }; kernelPackages = mkOption { default = pkgs.kernelPackages; example = pkgs.kernelPackages_2_6_25; merge = backwardPkgsFunMerge; description = " This option allows you to override the Linux kernel used by NixOS. Since things like external kernel module packages are tied to the kernel you're using, it also overrides those. This option is a function that takes Nixpkgs as an argument (as a convenience), and returns an attribute set containing at the very least an attribute kernel. Additional attributes may be needed depending on your configuration. For instance, if you use the NVIDIA X driver, then it also needs to contain an attribute nvidia_x11. "; }; configurationName = mkOption { default = ""; example = "Stable 2.6.21"; description = " Grub entry name instead of default. "; }; kernelParams = mkOption { default = [ "selinux=0" "apm=on" "acpi=on" "vga=0x317" "console=tty1" "splash=verbose" ]; description = " The kernel parameters. If you want to add additional parameters, it's best to set . "; }; extraKernelParams = mkOption { default = [ ]; example = [ "debugtrace" ]; description = " Additional user-defined kernel parameters. "; }; hardwareScan = mkOption { default = true; description = " Whether to try to load kernel modules for all detected hardware. Usually this does a good job of providing you with the modules you need, but sometimes it can crash the system or cause other nasty effects. If the hardware scan is turned on, it can be disabled at boot time by adding the safemode parameter to the kernel command line. "; }; extraModulePackages = mkOption { default = []; # !!! example = [pkgs.aufs pkgs.nvidia_x11]; description = '' A list of additional packages supplying kernel modules. ''; merge = backwardPkgsFunListMerge; }; kernelModules = mkOption { default = []; description = " The set of kernel modules to be loaded in the second stage of the boot process. That is, these modules are not included in the initial ramdisk, so they'd better not be required for mounting the root file system. Add them to if they are. "; }; initrd = { kernelModules = mkOption { default = [ # Note: most of these (especially the SATA/PATA modules) # shouldn't be included by default since nixos-hardware-scan # detects them, but I'm keeping them for now for backwards # compatibility. # Some SATA/PATA stuff. "ahci" "sata_nv" "sata_via" "sata_sis" "sata_uli" "ata_piix" "pata_marvell" # Standard SCSI stuff. "sd_mod" "sr_mod" # Standard IDE stuff. "ide_cd" "ide_disk" "ide_generic" # Filesystems. "ext3" # Support USB keyboards, in case the boot fails and we only have # a USB keyboard. "ehci_hcd" "ohci_hcd" "usbhid" # LVM. "dm_mod" ]; description = " The set of kernel modules in the initial ramdisk used during the boot process. This set must include all modules necessary for mounting the root device. That is, it should include modules for the physical device (e.g., SCSI drivers) and for the file system (e.g., ext3). The set specified here is automatically closed under the module dependency relation, i.e., all dependencies of the modules list here are included automatically. If you want to add additional modules, it's best to set . "; }; extraKernelModules = mkOption { default = []; description = " Additional kernel modules for the initial ramdisk. These are loaded before the modules listed in , so they take precedence. "; }; allowMissing = mkOption { default = false; description = '' Allow some initrd components to be missing. Useful for custom kernel that are changed too often to track needed kernelModules. ''; }; lvm = mkOption { default = true; description = " Whether to include lvm in the initial ramdisk. You should use this option if your ROOT device is on lvm volume. "; }; enableSplashScreen = mkOption { default = true; description = " Whether to show a nice splash screen while booting. "; }; }; copyKernels = mkOption { default = false; description = " Whether the Grub menu builder should copy kernels and initial ramdisks to /boot. This is necessary when /nix is on a different file system than /boot. "; }; localCommands = mkOption { default = ""; example = "text=anything; echo You can put $text here."; description = " Shell commands to be executed just before Upstart is started. "; }; extraGrubEntries = mkOption { default = ""; example = " title Windows chainloader (hd0,1)+1 "; description = " Any additional entries you want added to the Grub boot menu. "; }; extraGrubEntriesBeforeNixos = mkOption { default = false; description = " Wheter extraGrubEntries are put before the Nixos-default option "; }; grubSplashImage = mkOption { default = pkgs.fetchurl { url = http://www.gnome-look.org/CONTENT/content-files/36909-soft-tux.xpm.gz; sha256 = "14kqdx2lfqvh40h6fjjzqgff1mwk74dmbjvmqphi6azzra7z8d59"; }; example = null; description = " Background image used for Grub. It must be a 640x480, 14-colour image in XPM format, optionally compressed with gzip or bzip2. Set to null to run Grub in text mode. "; }; extraTTYs = mkOption { default = []; example = [8 9]; description = " Tty (virtual console) devices, in addition to the consoles on which mingetty and syslogd run, that must be initialised. Only useful if you have some program that you want to run on some fixed console. For example, the NixOS installation CD opens the manual in a web browser on console 7, so it sets to [7]. "; }; configurationLimit = mkOption { default = 100; example = 120; description = " Maximum of configurations in boot menu. GRUB has problems when there are too many entries. "; }; }; # Hm, this sounds like a catch-all... hardware = { enableGo7007 = mkOption { default = false; merge = obsoleteMerge; description = '' Enable this option to get support for the WIS GO7007SB multi-format video encoder, which is used in a number of devices such as the Plextor ConvertX TV402U USB TV device. ''; }; }; networking = { hostName = mkOption { default = "nixos"; description = " The name of the machine. Leave it empty if you want to obtain it from a DHCP server (if using DHCP). "; }; nativeIPv6 = mkOption { default = false; description = " Whether to use IPv6 even though gw6c is not used. For example, for Postfix. "; }; extraHosts = mkOption { default = ""; example = "192.168.0.1 lanlocalhost"; description = '' Additional entries to be appended to /etc/hosts. ''; }; defaultGateway = mkOption { default = ""; example = "131.211.84.1"; description = " The default gateway. It can be left empty if it is auto-detected through DHCP. "; }; nameservers = mkOption { default = []; example = ["130.161.158.4" "130.161.33.17"]; description = " The list of nameservers. It can be left empty if it is auto-detected through DHCP. "; }; domain = mkOption { default = ""; example = "home"; description = " The domain. It can be left empty if it is auto-detected through DHCP. "; }; enableIntel2200BGFirmware = mkOption { default = false; merge = obsoleteMerge; description = " Turn on this option if you want firmware for the Intel PRO/Wireless 2200BG to be loaded automatically. This is required if you want to use this device. Intel requires you to accept the license for this firmware, see . "; }; enableIntel3945ABGFirmware = mkOption { default = false; merge = obsoleteMerge; description = " This option enables automatic loading of the firmware for the Intel PRO/Wireless 3945ABG. "; }; enableIntel4965AGNFirmware = mkOption { default = false; merge = obsoleteMerge; description = " This option enables automatic loading of the firmware for the Intel PRO/Wireless 4965AGN. "; }; enableZydasZD1211Firmware = mkOption { default = false; merge = obsoleteMerge; description = " This option enables automatic loading of the firmware for the Zydas ZyDAS ZD1211(b) 802.11a/b/g USB WLAN chip. "; }; localCommands = mkOption { default = ""; example = "text=anything; echo You can put $text here."; description = " Shell commands to be executed at the end of the network-interfaces Upstart job. Note that if you are using DHCP to obtain the network configuration, interfaces may not be fully configured yet. "; }; interfaceMonitor = { enable = mkOption { default = false; description = " If true, monitor Ethernet interfaces for cables being plugged in or unplugged. When this occurs, the dhclient service is restarted to automatically obtain a new IP address. This is useful for roaming users (laptops). "; }; beep = mkOption { default = false; description = " If true, beep when an Ethernet cable is plugged in or unplugged. "; }; }; defaultMailServer = { directDelivery = mkOption { default = false; example = true; description = " Use the trivial Mail Transfer Agent (MTA) ssmtp package to allow programs to send e-mail. If you don't want to run a ``real'' MTA like sendmail or postfix on your machine, set this option to true, and set the option to the host name of your preferred mail server. "; }; hostName = mkOption { example = "mail.example.org"; description = " The host name of the default mail server to use to deliver e-mail. "; }; domain = mkOption { default = ""; example = "example.org"; description = " The domain from which mail will appear to be sent. "; }; useTLS = mkOption { default = false; example = true; description = " Whether TLS should be used to connect to the default mail server. "; }; useSTARTTLS = mkOption { default = false; example = true; description = " Whether the STARTTLS should be used to connect to the default mail server. (This is needed for TLS-capable mail servers running on the default SMTP port 25.) "; }; }; }; fileSystems = mkOption { default = []; example = [ { mountPoint = "/"; device = "/dev/hda1"; } { mountPoint = "/data"; device = "/dev/hda2"; fsType = "ext3"; options = "data=journal"; } { mountPoint = "/bigdisk"; label = "bigdisk"; } ]; description = " The file systems to be mounted. It must include an entry for the root directory (mountPoint = \"/\"). Each entry in the list is an attribute set with the following fields: mountPoint, device, fsType (a file system type recognised by mount; defaults to \"auto\"), and options (the mount options passed to mount using the flag; defaults to \"defaults\"). Instead of specifying device, you can also specify a volume label (label) for file systems that support it, such as ext2/ext3 (see mke2fs -L). autocreate forces mountPoint to be created with mkdir -p . "; }; swapDevices = mkOption { default = []; example = [ { device = "/dev/hda7"; } { device = "/var/swapfile"; } { label = "bigswap"; } ]; description = " The swap devices and swap files. These must have been initialised using mkswap. Each element should be an attribute set specifying either the path of the swap device or file (device) or the label of the swap device (label, see mkswap -L). Using a label is recommended. "; }; servicesProposal = { # see upstart-jobs/default.nix # the option declarations can be found in the upstart-jobs/newProposal/*.nix files # one way to include the declarations here is adding kind of glob "*.nix" # file function to builtins to get all jobs # then the checking in upstart-jobs/default.nix can be removed again (together with passing arg optionDeclarations) }; services = { extraJobs = mkOption { default = []; example = [ { name = "test-job"; job = '' description "nc" start on started network-interfaces respawn env PATH=/var/run/current-system/sw/bin exec sh -c "echo 'hello world' | ${pkgs.netcat}/bin/nc -l -p 9000" ''; } ]; description = " Additional Upstart jobs. "; }; syslogd = { tty = mkOption { default = 10; description = " The tty device on which syslogd will print important log messages. "; }; }; atd = { enable = mkOption { default = true; description = '' Whether to enable the `at' daemon, a command scheduler. ''; }; allowEveryone = mkOption { default = false; description = '' Whether to make /var/spool/at{jobs,spool} writeable by everyone (and sticky). This is normally not needed since the `at' commands are setuid/setgid `atd'. ''; }; }; ttyBackgrounds = { enable = mkOption { default = true; description = " Whether to enable graphical backgrounds for the virtual consoles. "; }; defaultTheme = mkOption { default = pkgs.fetchurl { #url = http://www.bootsplash.de/files/themes/Theme-BabyTux.tar.bz2; url = http://www.mirrorservice.org/sites/www.ibiblio.org/gentoo/distfiles/Theme-BabyTux.tar.bz2; md5 = "a6d89d1c1cff3b6a08e2f526f2eab4e0"; }; description = " The default theme for the virtual consoles. Themes can be found at . "; }; defaultSpecificThemes = mkOption { default = [ /* { tty = 6; theme = pkgs.fetchurl { # Yeah! url = http://www.bootsplash.de/files/themes/Theme-Pativo.tar.bz2; md5 = "9e13beaaadf88d43a5293e7ab757d569"; }; } */ { tty = 10; theme = pkgs.fetchurl { #url = http://www.bootsplash.de/files/themes/Theme-GNU.tar.bz2; url = http://www.mirrorservice.org/sites/www.ibiblio.org/gentoo/distfiles/Theme-GNU.tar.bz2; md5 = "61969309d23c631e57b0a311102ef034"; }; } ]; description = " This option sets specific themes for virtual consoles. If you just want to set themes for additional consoles, use . "; }; specificThemes = mkOption { default = [ ]; description = " This option allows you to set specific themes for virtual consoles. "; }; }; mingetty = { ttys = mkOption { default = [1 2 3 4 5 6]; description = " The list of tty (virtual console) devices on which to start a login prompt. "; }; waitOnMounts = mkOption { default = false; description = " Whether the login prompts on the virtual consoles will be started before or after all file systems have been mounted. By default we don't wait, but if for example your /home is on a separate partition, you may want to turn this on. "; }; greetingLine = mkOption { default = ''<<< Welcome to NixOS (\m) - Kernel \r (\l) >>>''; description = " Welcome line printed by mingetty. "; }; helpLine = mkOption { default = ""; description = " Help line printed by mingetty below the welcome line. Used by the installation CD to give some hints on how to proceed. "; }; }; dhcpd = { enable = mkOption { default = false; description = " Whether to enable the DHCP server. "; }; extraConfig = mkOption { default = ""; example = " option subnet-mask 255.255.255.0; option broadcast-address 192.168.1.255; option routers 192.168.1.5; option domain-name-servers 130.161.158.4, 130.161.33.17, 130.161.180.1; option domain-name \"example.org\"; subnet 192.168.1.0 netmask 255.255.255.0 { range 192.168.1.100 192.168.1.200; } "; description = " Extra text to be appended to the DHCP server configuration file. Currently, you almost certainly need to specify something here, such as the options specifying the subnet mask, DNS servers, etc. "; }; configFile = mkOption { default = null; description = " The path of the DHCP server configuration file. If no file is specified, a file is generated using the other options. "; }; interfaces = mkOption { default = ["eth0"]; description = " The interfaces on which the DHCP server should listen. "; }; machines = mkOption { default = []; example = [ { hostName = "foo"; ethernetAddress = "00:16:76:9a:32:1d"; ipAddress = "192.168.1.10"; } { hostName = "bar"; ethernetAddress = "00:19:d1:1d:c4:9a"; ipAddress = "192.168.1.11"; } ]; description = " A list mapping ethernet addresses to IP addresses for the DHCP server. "; }; }; sshd = { enable = mkOption { default = false; description = " Whether to enable the Secure Shell daemon, which allows secure remote logins. "; }; forwardX11 = mkOption { default = true; description = " Whether to enable sshd to forward X11 connections. "; }; allowSFTP = mkOption { default = true; description = " Whether to enable the SFTP subsystem in the SSH daemon. This enables the use of commands such as sftp and sshfs. "; }; permitRootLogin = mkOption { default = "yes"; description = " Whether the root user can login using ssh. Valid options are yes, without-password, forced-commands-only or no "; }; gatewayPorts = mkOption { default = "no"; description = " Specifies whether remote hosts are allowed to connect to ports forwarded for the client. See man sshd_conf. "; }; }; lshd = { enable = mkOption { default = false; description = '' Whether to enable the GNU lshd SSH2 daemon, which allows secure remote login. ''; }; portNumber = mkOption { default = 22; description = '' The port on which to listen for connections. ''; }; interfaces = mkOption { default = []; description = '' List of network interfaces where listening for connections. When providing the empty list, `[]', lshd listens on all network interfaces. ''; example = [ "localhost" "1.2.3.4:443" ]; }; hostKey = mkOption { default = "/etc/lsh/host-key"; description = '' Path to the server's private key. Note that this key must have been created, e.g., using "lsh-keygen --server | lsh-writekey --server", so that you can run lshd. ''; }; syslog = mkOption { default = true; description = ''Whether to enable syslog output.''; }; passwordAuthentication = mkOption { default = true; description = ''Whether to enable password authentication.''; }; publicKeyAuthentication = mkOption { default = true; description = ''Whether to enable public key authentication.''; }; rootLogin = mkOption { default = false; description = ''Whether to enable remote root login.''; }; loginShell = mkOption { default = null; description = '' If non-null, override the default login shell with the specified value. ''; example = "/nix/store/xyz-bash-10.0/bin/bash10"; }; srpKeyExchange = mkOption { default = false; description = '' Whether to enable SRP key exchange and user authentication. ''; }; tcpForwarding = mkOption { default = true; description = ''Whether to enable TCP/IP forwarding.''; }; x11Forwarding = mkOption { default = true; description = ''Whether to enable X11 forwarding.''; }; subsystems = mkOption { default = [ ["sftp" "${pkgs.lsh}/sbin/sftp-server"] ]; description = '' List of subsystem-path pairs, where the head of the pair denotes the subsystem name, and the tail denotes the path to an executable implementing it. ''; }; }; ntp = { enable = mkOption { default = true; description = " Whether to synchronise your machine's time using the NTP protocol. "; }; servers = mkOption { default = [ "0.pool.ntp.org" "1.pool.ntp.org" "2.pool.ntp.org" ]; description = " The set of NTP servers from which to synchronise. "; }; }; avahi = { enable = mkOption { default = false; description = '' Whether to run the Avahi daemon, which allows Avahi clients to use Avahi's service discovery facilities and also allows the local machine to advertise its presence and services (through the mDNS responder implemented by `avahi-daemon'). ''; }; hostName = mkOption { default = "nixos"; # XXX: Would be nice to use `networking.hostName'. description = ''Host name advertised on the LAN.''; }; browseDomains = mkOption { default = [ "0pointer.de" "zeroconf.org" ]; description = '' List of non-local DNS domains to be browsed. ''; }; ipv4 = mkOption { default = true; description = ''Whether to use IPv4''; }; ipv6 = mkOption { default = false; description = ''Whether to use IPv6''; }; wideArea = mkOption { default = true; description = ''Whether to enable wide-area service discovery.''; }; publishing = mkOption { default = true; description = ''Whether to allow publishing.''; }; nssmdns = mkOption { default = false; description = '' Whether to enable the mDNS NSS (Name Service Switch) plug-in. Enabling it allows applications to resolve names in the `.local' domain by transparently querying the Avahi daemon. Warning: Currently, enabling this option breaks DNS lookups after a `nixos-rebuild'. This is because `/etc/nsswitch.conf' is updated to use `nss-mdns' but `libnss_mdns' is not in applications' `LD_LIBRARY_PATH'. The next time `/etc/profile' is sourced, it will set up an appropriate `LD_LIBRARY_PATH', though. ''; }; }; bitlbee = { enable = mkOption { default = false; description = '' Whether to run the BitlBee IRC to other chat network gateway. Running it allows you to access the MSN, Jabber, Yahoo! and ICQ chat networks via an IRC client. ''; }; interface = mkOption { default = "127.0.0.1"; description = '' The interface the BitlBee deamon will be listening to. If `127.0.0.1', only clients on the local host can connect to it; if `0.0.0.0', clients can access it from any network interface. ''; }; portNumber = mkOption { default = 6667; description = '' Number of the port BitlBee will be listening to. ''; }; }; gnunet = { enable = mkOption { default = false; description = '' Whether to run the GNUnet daemon. GNUnet is GNU's anonymous peer-to-peer communication and file sharing framework. ''; }; home = mkOption { default = "/var/lib/gnunet"; description = '' Directory where the GNUnet daemon will store its data. ''; }; debug = mkOption { default = false; description = '' When true, run in debug mode; gnunetd will not daemonize and error messages will be written to stderr instead of a logfile. ''; }; logLevel = mkOption { default = "ERROR"; example = "INFO"; description = '' Log level of the deamon (see `gnunetd(1)' for details). ''; }; hostLists = mkOption { default = [ "http://gnunet.org/hostlist.php" "http://gnunet.mine.nu:8081/hostlist" "http://vserver1236.vserver-on.de/hostlist-074" ]; description = '' URLs of host lists. ''; }; applications = mkOption { default = [ "advertising" "getoption" "fs" "stats" "traffic" ]; example = [ "chat" "fs" ]; description = '' List of GNUnet applications supported by the daemon. Note that `fs', which means "file sharing", is probably the one you want. ''; }; transports = mkOption { default = [ "udp" "tcp" "http" "nat" ]; example = [ "smtp" "http" ]; description = '' List of transport methods used by the server. ''; }; fileSharing = { quota = mkOption { default = 1024; description = '' Maximum file system usage (in MiB) for file sharing. ''; }; activeMigration = mkOption { default = false; description = '' Whether to allow active migration of content originating from other nodes. ''; }; }; load = { maxNetDownBandwidth = mkOption { default = 50000; description = '' Maximum bandwidth usage (in bits per second) for GNUnet when downloading data. ''; }; maxNetUpBandwidth = mkOption { default = 50000; description = '' Maximum bandwidth usage (in bits per second) for GNUnet when downloading data. ''; }; hardNetUpBandwidth = mkOption { default = 0; description = '' Hard bandwidth limit (in bits per second) when uploading data. ''; }; maxCPULoad = mkOption { default = 100; description = '' Maximum CPU load (percentage) authorized for the GNUnet daemon. ''; }; interfaces = mkOption { default = [ "eth0" ]; example = [ "wlan0" "eth1" ]; description = '' List of network interfaces to use. ''; }; }; extraOptions = mkOption { default = ""; example = '' [NETWORK] INTERFACE = eth3 ''; description = '' Additional options that will be copied verbatim in `gnunetd.conf'. See `gnunetd.conf(5)' for details. ''; }; }; xserver = { enable = mkOption { default = false; description = " Whether to enable the X server. "; }; autorun = mkOption { default = true; description = " Switch to false to create upstart-job and configuration, but not run it automatically "; }; exportConfiguration = mkOption { default = false; description = " Create /etc/X11/xorg.conf and a file with environment variables "; }; tcpEnable = mkOption { default = false; description = " Whether to enable TCP socket for the X server. "; }; resolutions = mkOption { default = [{x = 1024; y = 768;} {x = 800; y = 600;} {x = 640; y = 480;}]; description = " The screen resolutions for the X server. The first element is the default resolution. "; }; videoDriver = mkOption { default = "vesa"; example = "i810"; description = " The name of the video driver for your graphics card. "; }; driSupport = mkOption { default = false; description = " Whether to enable accelerated OpenGL rendering through the Direct Rendering Interface (DRI). "; }; sessionType = mkOption { default = "gnome"; example = "xterm"; description = " The kind of session to start after login. Current possibilies are kde (which starts KDE), gnome (which starts gnome-terminal) and xterm (which starts xterm). "; }; windowManager = mkOption { default = ""; description = " This option selects the window manager. Available values are twm (extremely primitive), metacity, xmonad and compiz. If left empty, the determines the window manager, e.g., Metacity for Gnome, and kwm for KDE. "; }; renderingFlag = mkOption { default = ""; example = "--indirect-rendering"; description = " Possibly pass --indierct-rendering to Compiz. "; }; sessionStarter = mkOption { example = "${pkgs.xterm}/bin/xterm -ls"; description = " The command executed after login and after the window manager has been started. Used if is empty. "; }; startSSHAgent = mkOption { default = true; description = " Whether to start the SSH agent when you log in. The SSH agent remembers private keys for you so that you don't have to type in passphrases every time you make an SSH connection. Use ssh-add to add a key to the agent. "; }; slim = { theme = mkOption { default = null; example = pkgs.fetchurl { url = http://download.berlios.de/slim/slim-wave.tar.gz; sha256 = "0ndr419i5myzcylvxb89m9grl2xyq6fbnyc3lkd711mzlmnnfxdy"; }; description = " The theme for the SLiM login manager. If not specified, SLiM's default theme is used. See for a collection of themes. "; }; defaultUser = mkOption { default = ""; example = "login"; description = " The default user to load. If you put a username here you get it automatically loaded into the username field, and the focus is placed on the password. "; }; hideCursor = mkOption { default = false; example = true; description = " Hide the mouse cursor on the login screen. "; }; }; isClone = mkOption { default = true; example = false; description = " Whether to enable the X server clone mode for dual-head. "; }; synaptics = { enable = mkOption { default = false; example = true; description = " Whether to replace mouse with touchpad. "; }; dev = mkOption { default = "/dev/input/event0"; description = " Event device for Synaptics touchpad. "; }; minSpeed = mkOption { default = "0.06"; description = "Cursor speed factor for precision finger motion"; }; maxSpeed = mkOption { default = "0.12"; description = "Cursor speed factor for highest-speed finger motion"; }; twoFingerScroll = mkOption { default = false; description = "Whether to enable two-finger drag-scrolling"; }; }; layout = mkOption { default = "us"; description = " Keyboard layout. "; }; xkbModel = mkOption { default = "pc104"; example = "presario"; description = " Keyboard model. "; }; xkbOptions = mkOption { default = ""; example = "grp:caps_toggle, grp_led:scroll"; description = " X keyboard options; layout switching goes here. "; }; useInternalAGPGART = mkOption { default = ""; example = "no"; description = " Just the wrapper for an xorg.conf option. "; }; extraDeviceConfig = mkOption { default = ""; example = "VideoRAM 131072"; description = " Just anything to add into Device section. "; }; extraMonitorSettings = mkOption { default = ""; example = "HorizSync 28-49"; description = " Just anything to add into Monitor section. "; }; extraDisplaySettings = mkOption { default = ""; example = "Virtual 2048 2048"; description = " Just anything to add into Display subsection (located in Screen section). "; }; extraModules = mkOption { default = ""; example = " SubSection \"extmod\" EndSubsection "; description = " Just anything to add into Modules section. "; }; serverLayoutOptions = mkOption { default = ""; example = " Option \"AIGLX\" \"true\" "; description = " Just anything to add into Monitor section. "; }; defaultDepth = mkOption { default = 24; example = 8; description = " Default colour depth. "; }; useXFS = mkOption { default = false; example = "unix/:7100"; description = " Way to access the X Font Server to use. "; }; tty = mkOption { default = 7; example = 9; description = " Virtual console for the X server. "; }; display = mkOption { default = 0; example = 1; description = " Display number for the X server. "; }; packageFun = mkOption { default = pkgs.xorg; merge = obsolete "option" backwardPkgsFunMerge; description = "Obsolete: use 'package' instead."; }; package = mkOption { default = config.services.xserver.packageFun; # pkgs.xorg; description = " Alternative X.org package to use. For example, you can replace individual drivers. "; }; virtualScreen = mkOption { default = null; example = { x=2048; y=2048; }; description = " Virtual screen size for Xrandr "; }; }; ejabberd = { enable = mkOption { default = false; description = "Whether to enable ejabberd server"; }; spoolDir = mkOption { default = "/var/lib/ejabberd"; description = "Location of the spooldir of ejabberd"; }; logsDir = mkOption { default = "/var/log/ejabberd"; description = "Location of the logfile directory of ejabberd"; }; confDir = mkOption { default = "/var/ejabberd"; description = "Location of the config directory of ejabberd"; }; virtualHosts = mkOption { default = "\"localhost\""; description = "Virtualhosts that ejabberd should host. Hostnames are surrounded with doublequotes and separated by commas"; }; }; jboss = { enable = mkOption { default = false; description = "Whether to enable jboss"; }; tempDir = mkOption { default = "/tmp"; description = "Location where JBoss stores its temp files"; }; logDir = mkOption { default = "/var/log/jboss"; description = "Location of the logfile directory of JBoss"; }; serverDir = mkOption { description = "Location of the server instance files"; default = "/var/jboss/server"; }; deployDir = mkOption { description = "Location of the deployment files"; default = "/nix/var/nix/profiles/default/server/default/deploy/"; }; libUrl = mkOption { default = "file:///nix/var/nix/profiles/default/server/default/lib"; description = "Location where the shared library JARs are stored"; }; user = mkOption { default = "nobody"; description = "User account under which jboss runs."; }; useJK = mkOption { default = false; description = "Whether to use to connector to the Apache HTTP server"; }; }; tomcat = { enable = mkOption { default = false; description = "Whether to enable Apache Tomcat"; }; baseDir = mkOption { default = "/var/tomcat"; description = "Location where Tomcat stores configuration files, webapplications and logfiles"; }; user = mkOption { default = "tomcat"; description = "User account under which Apache Tomcat runs."; }; deployFrom = mkOption { default = ""; description = "Location where webapplications are stored. Leave empty to use the baseDir."; }; javaOpts = mkOption { default = ""; description = "Parameters to pass to the Java Virtual Machine which spawns Apache Tomcat"; }; catalinaOpts = mkOption { default = ""; description = "Parameters to pass to the Java Virtual Machine which spawns the Catalina servlet container"; }; sharedLibFrom = mkOption { default = ""; description = "Location where shared libraries are stored. Leave empty to use the baseDir."; }; commonLibFrom = mkOption { default = ""; description = "Location where common libraries are stored. Leave empty to use the baseDir."; }; contextXML = mkOption { default = ""; description = "Location of the context.xml to use. Leave empty to use the default."; }; }; disnix = { enable = mkOption { default = false; description = "Whether to enable Disnix"; }; activateHook = mkOption { default = ""; description = "Custom script or executable that activates services through Disnix"; }; deactivateHook = mkOption { default = ""; description = "Custom script or executable that deactivates services through Disnix"; }; }; httpd = { enable = mkOption { default = false; description = " Whether to enable the Apache httpd server. "; }; experimental = mkOption { default = false; description = " Whether to use the new-style Apache configuration. "; }; extraConfig = mkOption { default = ""; description = " These configuration lines will be passed verbatim to the apache config "; }; extraModules = mkOption { default = []; example = [ "proxy_connect" { name = "php5_module"; path = "${pkgs.php}/modules/libphp5.so"; } ]; description = '' Specifies additional Apache modules. These can be specified as a string in the case of modules distributed with Apache, or as an attribute set specifying the name and path of the module. ''; }; logPerVirtualHost = mkOption { default = false; description = " If enabled, each virtual host gets its own access_log and error_log, namely suffixed by the of the virtual host. "; }; user = mkOption { default = "wwwrun"; description = " User account under which httpd runs. The account is created automatically if it doesn't exist. "; }; group = mkOption { default = "wwwrun"; description = " Group under which httpd runs. The account is created automatically if it doesn't exist. "; }; logDir = mkOption { default = "/var/log/httpd"; description = " Directory for Apache's log files. It is created automatically. "; }; stateDir = mkOption { default = "/var/run/httpd"; description = " Directory for Apache's transient runtime state (such as PID files). It is created automatically. Note that the default, /var/run/httpd, is deleted at boot time. "; }; mod_php = mkOption { default = false; description = "Whether to enable the PHP module."; }; mod_jk = { enable = mkOption { default = false; description = "Whether to enable the Apache Tomcat connector."; }; applicationMappings = mkOption { default = []; description = "List of Java webapplications that should be mapped to the servlet container (Tomcat/JBoss)"; }; }; virtualHosts = mkOption { default = []; example = [ { hostName = "foo"; documentRoot = "/data/webroot-foo"; } { hostName = "bar"; documentRoot = "/data/webroot-bar"; } ]; description = '' Specification of the virtual hosts served by Apache. Each element should be an attribute set specifying the configuration of the virtual host. The available options are the non-global options permissible for the main host. ''; }; subservices = { # !!! remove this subversion = { enable = mkOption { default = false; description = " Whether to enable the Subversion subservice in the webserver. "; }; notificationSender = mkOption { default = "svn-server@example.org"; example = "svn-server@example.org"; description = " The email address used in the Sender field of commit notification messages sent by the Subversion subservice. "; }; userCreationDomain = mkOption { default = "example.org"; example = "example.org"; description = " The domain from which user creation is allowed. A client can only create a new user account if its IP address resolves to this domain. "; }; autoVersioning = mkOption { default = false; description = " Whether you want the Subversion subservice to support auto-versioning, which enables Subversion repositories to be mounted as read/writable file systems on operating systems that support WebDAV. "; }; dataDir = mkOption { default = "/no/such/path/exists"; description = " Place to put SVN repository. "; }; organization = { name = mkOption { default = null; description = " Name of the organization hosting the Subversion service. "; }; url = mkOption { default = null; description = " URL of the website of the organization hosting the Subversion service. "; }; logo = mkOption { default = null; description = " Logo the organization hosting the Subversion service. "; }; }; }; }; } // # Include the options shared between the main server and virtual hosts. (import ../upstart-jobs/apache-httpd/per-server-options.nix { inherit mkOption; forMainServer = true; }); vsftpd = { enable = mkOption { default = false; description = " Whether to enable the vsftpd FTP server. "; }; anonymousUser = mkOption { default = false; description = " Whether to enable the anonymous FTP user. "; }; localUsers = mkOption { default = false; description = " Whether to enable FTP for the local users. "; }; writeEnable = mkOption { default = false; description = " Whether any write activity is permitted to users. "; }; anonymousUploadEnable = mkOption { default = false; description = " Whether any uploads are permitted to anonymous users. "; }; anonymousMkdirEnable = mkOption { default = false; description = " Whether mkdir is permitted to anonymous users. "; }; chrootlocaluser = mkOption { default = false; description = " Whether u can like out of ur home dir. "; }; userlistenable = mkOption { default = false; description = " Whether users are included. "; }; userlistdeny = mkOption { default = false; description = " Whether users are excluded. "; }; }; printing = { enable = mkOption { default = false; description = " Whether to enable printing support through the CUPS daemon. "; }; }; dbus = { enable = mkOption { default = true; description = " Whether to start the D-Bus message bus daemon. It is required by the HAL service. "; }; }; hal = { enable = mkOption { default = true; description = " Whether to start the HAL daemon. "; }; }; udev = { addFirmware = mkOption { default = []; example = ["/mnt/big-storage/firmware/"]; description = " To specify firmware that is not too spread to ensure a package, or have an interactive process of extraction and cannot be redistributed. "; merge = pkgs.lib.mergeListOption; }; addUdevPkgs = mkOption { default = []; description = " List of packages containing udev rules. "; merge = pkgs.lib.mergeListOption; }; sndMode = mkOption { default = "0600"; example = "0666"; description = " Permissions for /dev/snd/*, in case you have multiple logged in users or if the devices belong to root for some reason. "; }; }; samba = { enable = mkOption { default = false; description = " Whether to enable the samba server. (to communicate with, and provide windows shares) "; }; }; gw6c = { enable = mkOption { default = false; description = " Whether to enable Gateway6 client (IPv6 tunnel). "; }; autorun = mkOption { default = true; description = " Switch to false to create upstart-job and configuration, but not run it automatically "; }; username = mkOption { default = ""; description = " Your Gateway6 login name, if any. "; }; password = mkOption { default = ""; description = " Your Gateway6 password, if any. "; }; server = mkOption { default = "anon.freenet6.net"; example = "broker.freenet6.net"; description = " Used Gateway6 server. "; }; keepAlive = mkOption { default = "30"; example = "2"; description = " Gateway6 keep-alive period. "; }; everPing = mkOption { default = "1000000"; example = "2"; description = " Gateway6 manual ping period. "; }; waitPingableBroker = mkOption { default = true; example = false; description = " Whether to wait until tunnel broker returns ICMP echo. "; }; }; ircdHybrid = { enable = mkOption { default = false; description = " Enable IRCD. "; }; serverName = mkOption { default = "hades.arpa"; description = " IRCD server name. "; }; sid = mkOption { default = "0NL"; description = " IRCD server unique ID in a net of servers. "; }; description = mkOption { default = "Hybrid-7 IRC server."; description = " IRCD server description. "; }; rsaKey = mkOption { default = null; example = /root/certificates/irc.key; description = " IRCD server RSA key. "; }; certificate = mkOption { default = null; example = /root/certificates/irc.pem; description = " IRCD server SSL certificate. There are some limitations - read manual. "; }; adminEmail = mkOption { default = ""; example = ""; description = " IRCD server administrator e-mail. "; }; extraIPs = mkOption { default = []; example = ["127.0.0.1"]; description = " Extra IP's to bind. "; }; extraPort = mkOption { default = "7117"; description = " Extra port to avoid filtering. "; }; }; xfs = { enable = mkOption { default = false; description = " Whether to enable the X Font Server. "; }; }; nagios = { enable = mkOption { default = false; description = " Whether to use Nagios to monitor your system or network. "; }; objectDefs = mkOption { description = " A list of Nagios object configuration files that must define the hosts, host groups, services and contacts for the network that you want Nagios to monitor. "; }; plugins = mkOption { default = [pkgs.nagiosPluginsOfficial pkgs.ssmtp]; description = " Packages to be added to the Nagios PATH. Typically used to add plugins, but can be anything. "; }; enableWebInterface = mkOption { default = false; description = " Whether to enable the Nagios web interface. You should also enable Apache (). "; }; urlPath = mkOption { default = "/nagios"; description = " The URL path under which the Nagios web interface appears. That is, you can access the Nagios web interface through http://server/urlPath. "; }; }; mysql = { enable = mkOption { default = false; description = " Whether to enable the MySQL server. "; }; port = mkOption { default = "3306"; description = "Port of MySQL"; }; user = mkOption { default = "mysql"; description = "User account under which MySQL runs"; }; dataDir = mkOption { default = "/var/mysql"; description = "Location where MySQL stores its table files"; }; logError = mkOption { default = "/var/log/mysql_err.log"; description = "Location of the MySQL error logfile"; }; pidDir = mkOption { default = "/var/run/mysql"; description = "Location of the file which stores the PID of the MySQL server"; }; }; postgresql = { enable = mkOption { default = false; description = " Whether to run PostgreSQL. "; }; port = mkOption { default = "5432"; description = " Port for PostgreSQL. "; }; logDir = mkOption { default = "/var/log/postgresql"; description = " Log directory for PostgreSQL. "; }; dataDir = mkOption { default = "/var/db/postgresql"; description = " Data directory for PostgreSQL. "; }; subServices = mkOption { default = []; description = " Subservices list. As it is already implememnted, here is an interface... "; }; authentication = mkOption { default = '' # Generated file; do not edit! local all all ident sameuser host all all 127.0.0.1/32 md5 host all all ::1/128 md5 ''; description = " Hosts (except localhost), who you allow to connect. "; }; allowedHosts = mkOption { default = []; description = " Hosts (except localhost), who you allow to connect. "; }; authMethod = mkOption { default = " ident sameuser "; description = " How to authorize users. Note: ident needs absolute trust to all allowed client hosts."; }; }; openfire = { enable = mkOption { default = false; description = " Whether to enable OpenFire XMPP server. "; }; usePostgreSQL = mkOption { default = true; description = " Whether you use PostgreSQL service for your storage back-end. "; }; }; gpm = { enable = mkOption { default = false; description = " Whether to enable general purpose mouse daemon. "; }; protocol = mkOption { default = "ps/2"; description = " Mouse protocol to use. "; }; }; zabbixAgent = { enable = mkOption { default = false; description = " Whether to run the Zabbix monitoring agent on this machine. It will send monitoring data to a Zabbix server. "; }; server = mkOption { default = "127.0.0.1"; description = '' The IP address or hostname of the Zabbix server to connect to. ''; }; }; zabbixServer = { enable = mkOption { default = false; description = " Whether to run the Zabbix server on this machine. "; }; }; postfix = { enable = mkOption { default = false; description =" Whether to run the Postfix mail server. "; }; user = mkOption { default = "postfix"; description = " How to call postfix user (must be used only for postfix). "; }; group = mkOption { default = "postfix"; description = " How to call postfix group (must be used only for postfix). "; }; setgidGroup = mkOption { default = "postdrop"; description = " How to call postfix setgid group (for postdrop). Should be uniquely used group. "; }; networks = mkOption { default = null; example = ["192.168.0.1/24"]; description = " Net masks for trusted - allowed to relay mail to third parties - hosts. Leave empty to use mynetworks_style configuration or use default (localhost-only). "; }; networksStyle = mkOption { default = ""; description = " Name of standard way of trusted network specification to use, leave blank if you specify it explicitly or if you want to use default (localhost-only). "; }; hostname = mkOption { default = ""; description =" Hostname to use. Leave blank to use just the hostname of machine. It should be FQDN. "; }; domain = mkOption { default = ""; description =" Domain to use. Leave blank to use hostname minus first component. "; }; origin = mkOption { default = ""; description =" Origin to use in outgoing e-mail. Leave blank to use hostname. "; }; destination = mkOption { default = null; example = ["localhost"]; description = " Full (!) list of domains we deliver locally. Leave blank for acceptable Postfix default. "; }; relayDomains = mkOption { default = null; example = ["localdomain"]; description = " List of domains we agree to relay to. Default is the same as destination. "; }; relayHost = mkOption { default = ""; description = " Mail relay for outbound mail. "; }; lookupMX = mkOption { default = false; description = " Whether relay specified is just domain whose MX must be used. "; }; postmasterAlias = mkOption { default = "root"; description = " Who should receive postmaster e-mail. "; }; rootAlias = mkOption { default = ""; description = " Who should receive root e-mail. Blank for no redirection. "; }; extraAliases = mkOption { default = ""; description = " Additional entries to put verbatim into aliases file. "; }; sslCert = mkOption { default = ""; description = " SSL certificate to use. "; }; sslCACert = mkOption { default = ""; description = " SSL certificate of CA. "; }; sslKey = mkOption { default = ""; description =" SSL key to use. "; }; recipientDelimiter = mkOption { default = ""; example = "+"; description = " Delimiter for address extension: so mail to user+test can be handled by ~user/.forward+test "; }; }; dovecot = { enable = mkOption { default = false; description = "Whether to enable dovecot POP3/IMAP server."; }; user = mkOption { default = "dovecot"; description = "dovecot user name"; }; group = mkOption { default = "dovecot"; description = "dovecot group name"; }; sslServerCert = mkOption { default = ""; description = "Server certificate"; }; sslCACert = mkOption { default = ""; description = "CA certificate used by server certificate"; }; sslServerKey = mkOption { default = ""; description = "Server key"; }; }; bind = { enable = mkOption { default = false; description = " Whether to enable BIND domain name server. "; }; cacheNetworks = mkOption { default = ["127.0.0.0/24"]; description = " What networks are allowed to use us as a resolver. "; }; blockedNetworks = mkOption { default = []; description = " What networks are just blocked. "; }; zones = mkOption { default = []; description = " List of zones we claim authority over. master=false means slave server; slaves means addresses who may request zone transfer. "; example = [{ name = "example.com"; master = false; file = "/var/dns/example.com"; masters = ["192.168.0.1"]; slaves = []; }]; }; }; }; installer = { nixpkgsURL = mkOption { default = ""; example = http://nixos.org/releases/nix/nixpkgs-0.11pre7577; description = " URL of the Nixpkgs distribution to use when building the installation CD. "; }; repos = { nixos = mkOption { default = [ { type = "svn"; } ]; example = [ { type = "svn"; url = "https://svn.nixos.org/repos/nix/nixos/branches/stdenv-updates"; target = "/etc/nixos/nixos-stdenv-updates"; } { type = "git"; initialize = ''git clone git://mawercer.de/nixos $target''; update = "git pull origin"; target = "/etc/nixos/nixos-git"; } ]; description = '' The NixOS repository from which the system will be built. nixos-checkout will update all working copies of the given repositories, nixos-rebuild will use the first item which has the attribute default = true falling back to the first item. The type defines the repository tool added to the path. It also defines a "valid" repository. If the target directory already exists and it's not valid it will be moved to the backup location dir-date. For svn the default target and repositories are /etc/nixos/nixos and https://svn.nixos.org/repos/nix/nixos/trunk. For git repositories update is called after initialization when the repo is initialized. The initialize code is run from working directory dirname target and should create the directory dir. (git clone url nixos/nixpkgs/services should do) For the executables used see . ''; }; nixpkgs = mkOption { default = [ { type = "svn"; } ]; description = "same as "; }; services = mkOption { default = [ { type = "svn"; } ]; description = "same as "; }; }; repoTypes = mkOption { default = { svn = { valid = "[ -d .svn ]"; env = [ pkgs.coreutils pkgs.subversion ]; }; git = { valid = "[ -d .git ]"; env = [ pkgs.coreutils pkgs.git pkgs.gnused /* FIXME: use full path to sed in nix-pull */ ]; }; }; description = '' Defines, for each supported version control system (e.g. git), the dependencies for the mechanism, as well as a test used to determine whether a directory is a checkout created by that version control system. ''; }; manifests = mkOption { default = [http://nixos.org/releases/nixpkgs/channels/nixpkgs-unstable/MANIFEST]; example = [ http://nixos.org/releases/nixpkgs/channels/nixpkgs-unstable/MANIFEST http://nixos.org/releases/nixpkgs/channels/nixpkgs-stable/MANIFEST ]; description = " URLs of manifests to be downloaded when you run nixos-rebuild to speed up builds. "; }; }; nix = { maxJobs = mkOption { default = 1; example = 2; description = " This option defines the maximum number of jobs that Nix will try to build in parallel. The default is 1. You should generally set it to the number of CPUs in your system (e.g., 2 on a Athlon 64 X2). "; }; useChroot = mkOption { default = false; example = true; description = " If set, Nix will perform builds in a chroot-environment that it will set up automatically for each build. This prevents impurities in builds by disallowing access to dependencies outside of the Nix store. "; }; extraOptions = mkOption { default = ""; example = " gc-keep-outputs = true gc-keep-derivations = true "; description = " This option allows to append lines to nix.conf. "; }; distributedBuilds = mkOption { default = false; description = " Whether to distribute builds to the machines listed in . "; }; buildMachines = mkOption { example = [ { hostName = "voila.labs.cs.uu.nl"; sshUser = "nix"; sshKey = "/root/.ssh/id_buildfarm"; system = "powerpc-darwin"; maxJobs = 1; } { hostName = "linux64.example.org"; sshUser = "buildfarm"; sshKey = "/root/.ssh/id_buildfarm"; system = "x86_64-linux"; maxJobs = 2; } ]; description = " This option lists the machines to be used if distributed builds are enabled (see ). Nix will perform derivations on those machines via SSh by copying the inputs to the Nix store on the remote machine, starting the build, then copying the output back to the local Nix store. Each element of the list should be an attribute set containing the machine's host name (hostname), the user name to be used for the SSH connection (sshUser), the Nix system type (system, e.g., \"i686-linux\"), the maximum number of jobs to be run in parallel on that machine (maxJobs), and the path to the SSH private key to be used to connect (sshKey). The SSH private key should not have a passphrase, and the corresponding public key should be added to ~sshUser/authorized_keys on the remote machine. "; }; proxy = mkOption { default = ""; description = " This option specifies the proxy to use for fetchurl. The real effect is just exporting http_proxy, https_proxy and ftp_proxy with that value. "; example = "http://127.0.0.1:3128"; }; }; security = { setuidPrograms = mkOption { default = [ "passwd" "su" "crontab" "ping" "ping6" "fusermount" "wodim" "cdrdao" "growisofs" ]; description = " Only the programs from system path listed her will be made setuid root (through a wrapper program). It's better to set . "; }; extraSetuidPrograms = mkOption { default = []; example = ["fusermount"]; description = " This option lists additional programs that must be made setuid root. "; }; setuidOwners = mkOption { default = []; example = [{ program = "sendmail"; owner = "nodody"; group = "postdrop"; setuid = false; setgid = true; }]; description = '' List of non-trivial setuid programs from system path, like Postfix sendmail. Default should probably be nobody:nogroup:false:false - if you are bothering doing anything with a setuid program, "root.root u+s g-s" is not what you are aiming at.. ''; }; seccureKeys = { public = mkOption { default = /var/elliptic-keys/public; description = " Public key. Make it path argument, so it is copied into store and hashed. The key is used to encrypt Gateway 6 configuration in store, as it contains a password for external service. Unfortunately, derivation file should be protected by other means. For example, nix-http-export.cgi will happily export any non-derivation path, but not a derivation. "; }; private = mkOption { default = "/var/elliptic-keys/private"; description = " Private key. Make it string argument, so it is not copied into store. "; }; }; sudo = { enable = mkOption { default = true; description = " Whether to enable the sudo command, which allows non-root users to execute commands as root. "; }; configFile = mkOption { default = " # WARNING: do not edit this file directly or with \"visudo\". Instead, # edit the source file in /etc/nixos/nixos/etc/sudoers. # \"root\" is allowed to do anything. root ALL=(ALL) SETENV: ALL # Users in the \"wheel\" group can do anything. %wheel ALL=(ALL) SETENV: ALL "; description = " This string contains the contents of the sudoers file. If syntax errors are detected in this file, the NixOS configuration will fail to build. "; }; }; }; users = { extraUsers = mkOption { default = []; example = [ { name = "alice"; uid = 1234; description = "Alice"; home = "/home/alice"; createHome = true; group = "users"; extraGroups = ["wheel"]; shell = "/bin/sh"; } ]; description = " Additional user accounts to be created automatically by the system. "; }; extraGroups = mkOption { default = []; example = [ { name = "students"; gid = 1001; } ]; description = " Additional groups to be created automatically by the system. "; }; ldap = { enable = mkOption { default = false; description = " Whether to enable authentication against an LDAP server. "; }; server = mkOption { example = "ldap://ldap.example.org/"; description = " The URL of the LDAP server. "; }; base = mkOption { example = "dc=example,dc=org"; description = " The distinguished name of the search base. "; }; useTLS = mkOption { default = false; description = " If enabled, use TLS (encryption) over an LDAP (port 389) connection. The alternative is to specify an LDAPS server (port 636) in or to forego security. "; }; }; }; fonts = { enableFontConfig = mkOption { # !!! should be enableFontconfig default = true; description = " If enabled, a Fontconfig configuration file will be built pointing to a set of default fonts. If you don't care about running X11 applications or any other program that uses Fontconfig, you can turn this option off and prevent a dependency on all those fonts. "; }; enableGhostscriptFonts = mkOption { default = false; description = " Whether to add the fonts provided by Ghostscript (such as various URW fonts and the ``Base-14'' Postscript fonts) to the list of system fonts, making them available to X11 applications. "; }; enableFontDir = mkOption { default = false; description = " Whether to create a directory with links to all fonts in share - so user can configure vncserver script one time (I mean per-user vncserver, so global service is not a good solution). "; }; extraFonts = mkOption { default = []; merge = backwardPkgsFunListMerge; description = " Function, returning list of additional fonts. "; }; enableCoreFonts = mkOption { default = true; description = " Whether to include MS Core Fonts (redistributable, but only verbatim). "; }; }; sound = { enable = mkOption { default = true; description = " Whether to enable ALSA sound. "; }; }; i18n = { defaultLocale = mkOption { default = "en_US.UTF-8"; example = "nl_NL.UTF-8"; description = " The default locale. It determines the language for program messages, the format for dates and times, sort order, and so on. It also determines the character set, such as UTF-8. "; }; consoleFont = mkOption { default = "lat9w-16"; example = "LatArCyrHeb-16"; description = " The font used for the virtual consoles. Leave empty to use whatever the setfont program considers the default font. "; }; consoleKeyMap = mkOption { default = "us"; example = "fr"; description = " The keyboard mapping table for the virtual consoles. "; }; }; environment = { pathsToLink = mkOption { default = ["/bin" "/sbin" "/lib" "/share" "/man" "/info" "/etc"]; example = ["/"]; description = " Lists directories to be symlinked in `/var/run/current-system/sw'. "; }; cleanStart = mkOption { default = false; example = true; description = " There are some times when you want really small system for specific purpose and do not want default package list. Setting cleanStart to true allows you to create a system with empty path - only extraPackages will be included. "; }; extraPackages = mkOption { default = []; example = [pkgs.firefox pkgs.thunderbird]; merge = backwardPkgsFunListMerge; description = " This option allows you to add additional packages to the system path. These packages are automatically available to all users, and they are automatically updated every time you rebuild the system configuration. (The latter is the main difference with installing them in the default profile, /nix/var/nix/profiles/default. The value of this option must be a function that returns a list of packages. The function will be called with the Nix Packages collection as its argument for convenience. "; }; # should be moved to etc/default.nix etc = mkOption { default = []; example = [ { source = "/nix/store/.../etc/dir/file.conf.example"; target = "dir/file.conf"; mode = "0440"; } ]; description = " List of files that have to be linked in /etc. "; }; nix = mkOption { default = pkgs.nixUnstable; example = pkgs.nixCustomFun /root/nix.tar.gz; merge = backwardPkgsFunMerge; description = " Use non-default Nix easily. Be careful, though, not to break everything. "; }; checkConfigurationOptions = mkOption { default = true; example = false; description = " If all configuration options must be checked. Non-existing options fail build. "; }; unixODBCDrivers = mkOption { default = pkgs : []; example = "pkgs : map (x : x.ini) (with pkgs.unixODBCDrivers; [ mysql psql psqlng ] )"; description = "specifies unix odbc drivers to be registered at /etc/odbcinst.ini"; }; }; powerManagement = { enable = mkOption { default = false; description = " Whether to enable power management. "; }; }; nesting = { children = mkOption { default = []; description = " Additional configurations to build. "; }; }; passthru = mkOption { default = {}; description = " Additional parameters. Ignored. When you want to be sure that /etc/nixos/nixos -A config.passthru.* is that same thing the system rebuild will use. "; }; require = [ # newtworking (import ../upstart-jobs/dhclient.nix) # hardware (import ../upstart-jobs/pcmcia.nix) # services (import ../upstart-jobs/cron.nix) (import ../upstart-jobs/fcron.nix) (import ../upstart-jobs/cron/locate.nix) (import ../upstart-jobs/manual.nix) (import ../upstart-jobs/rogue.nix) (import ../upstart-jobs/guest-users.nix) (import ../upstart-jobs/pulseaudio.nix) (import ../upstart-jobs/portmap.nix) ]; }