Skip to content

Podman

virtualisation.podman.autoPrune.dates

Specification (in the format described by {manpage}systemd.time(7)) of the time at which the prune will occur.

Type: string

Default

"weekly"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/virtualisation/podman/default.nix

virtualisation.podman.autoPrune.enable

Whether to periodically prune Podman resources. If enabled, a systemd timer will run podman system prune -f as specified by the dates option.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/virtualisation/podman/default.nix

virtualisation.podman.autoPrune.flags

Any additional flags passed to {command}podman system prune.

Type: list of string

Default

[ ]

Example

["--all"]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/virtualisation/podman/default.nix

virtualisation.podman.defaultNetwork.settings

Settings for podman's default network.

Type: JSON value

Default

{ }

Example

{ dns_enabled = true; }

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/virtualisation/podman/default.nix

virtualisation.podman.dockerCompat

Create an alias mapping {command}docker to {command}podman.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/virtualisation/podman/default.nix

virtualisation.podman.dockerSocket.enable

Make the Podman socket available in place of the Docker socket, so Docker tools can find the Podman socket.

Podman implements the Docker API.

Users must be in the podman group in order to connect. As with Docker, members of this group can gain root access.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/virtualisation/podman/default.nix

virtualisation.podman.enable

This option enables Podman, a daemonless container engine for developing, managing, and running OCI Containers on your Linux System.

It is a drop-in replacement for the {command}docker command.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/virtualisation/podman/default.nix

virtualisation.podman.enableNvidia

Deprecated, please use virtualisation.containers.cdi.dynamic.nvidia.enable instead.

Enable use of NVidia GPUs from within podman containers.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/virtualisation/podman/default.nix

virtualisation.podman.extraPackages

Extra packages to be installed in the Podman wrapper.

Type: list of package

Default

[ ]

Example

[pkgs.gvisor]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/virtualisation/podman/default.nix

virtualisation.podman.networkSocket.enable

Make the Podman and Docker compatibility API available over the network with TLS client certificate authentication.

This allows Docker clients to connect with the equivalents of the Docker CLI -H and --tls* family of options.

For certificate setup, see https://docs.docker.com/engine/security/protect-access/

This option is independent of .

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/virtualisation/podman/network-socket.nix

virtualisation.podman.networkSocket.listenAddress

Interface address for receiving TLS connections.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/virtualisation/podman/network-socket.nix

virtualisation.podman.networkSocket.openFirewall

Whether to open the port in the firewall.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/virtualisation/podman/network-socket.nix

virtualisation.podman.networkSocket.port

TCP port number for receiving TLS connections.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

2376

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/virtualisation/podman/network-socket.nix

virtualisation.podman.networkSocket.server

Choice of TLS proxy server.

Type: value "ghostunnel" (singular enum)

Example

"ghostunnel"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/virtualisation/podman/network-socket-ghostunnel.nix

virtualisation.podman.networkSocket.tls.cacert

Path to CA certificate to use for client authentication.

Type: path

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/virtualisation/podman/network-socket.nix

virtualisation.podman.networkSocket.tls.cert

Path to certificate describing the server.

Type: path

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/virtualisation/podman/network-socket.nix

virtualisation.podman.networkSocket.tls.key

Path to the private key corresponding to the server certificate.

Use a string for this setting. Otherwise it will be copied to the Nix store first, where it is readable by any system process.

Type: path

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/virtualisation/podman/network-socket.nix