Peering manager
services.peering-manager.enable
Enable Peering Manager.
This module requires a reverse proxy that serves /static
separately.
See this [example](https://github.com/peering-manager/contrib/blob/main/nginx.conf on how to configure this.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/web-apps/peering-manager.nix
services.peering-manager.enableLdap
Enable LDAP-Authentication for Peering Manager.
This requires a configuration file being pass through ldapConfigPath
.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/web-apps/peering-manager.nix
services.peering-manager.enableOidc
Enable OIDC-Authentication for Peering Manager.
This requires a configuration file being pass through oidcConfigPath
.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/web-apps/peering-manager.nix
services.peering-manager.enableScheduledTasks
Set up scheduled tasks
Type: boolean
Default
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/web-apps/peering-manager.nix
services.peering-manager.extraConfig
Additional lines of configuration appended to the configuration.py
.
See the documentation for more possible options.
Type: strings concatenated with "\n"
Default
""
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/web-apps/peering-manager.nix
services.peering-manager.ldapConfigPath
Path to the Configuration-File for LDAP-Authentication, will be loaded as ldap_config.py
.
See the documentation for possible options.
Type: path
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/web-apps/peering-manager.nix
services.peering-manager.listenAddress
Address the server will listen on.
Type: string
Default
"[::1]"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/web-apps/peering-manager.nix
services.peering-manager.oidcConfigPath
Path to the Configuration-File for OIDC-Authentication, will be loaded as oidc_config.py
.
See the documentation for possible options.
Type: path
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/web-apps/peering-manager.nix
services.peering-manager.peeringdbApiKeyFile
Path to a file containing the PeeringDB API key.
Type: null or path
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/web-apps/peering-manager.nix
services.peering-manager.plugins
List of plugin packages to install.
Type: function that evaluates to a(n) list of package
Default
python3Packages: with python3Packages; [];
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/web-apps/peering-manager.nix
services.peering-manager.port
Port the server will listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
8001
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/web-apps/peering-manager.nix
services.peering-manager.secretKeyFile
Path to a file containing the secret key.
Type: path
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/web-apps/peering-manager.nix
services.peering-manager.settings
Configuration options to set in configuration.py
.
See the documentation for more possible options.
Type: attribute set of (Python value)
Default
{ }
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/web-apps/peering-manager.nix
services.peering-manager.settings.ALLOWED_HOSTS
A list of valid fully-qualified domain names (FQDNs) and/or IP addresses that can be used to reach the peering manager service.
Type: list of string
Default
["*"]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/web-apps/peering-manager.nix