Skip to content

Peering manager

services.peering-manager.enable

Enable Peering Manager.

This module requires a reverse proxy that serves /static separately. See this [example](https://github.com/peering-manager/contrib/blob/main/nginx.conf on how to configure this.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/web-apps/peering-manager.nix

services.peering-manager.enableLdap

Enable LDAP-Authentication for Peering Manager.

This requires a configuration file being pass through ldapConfigPath.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/web-apps/peering-manager.nix

services.peering-manager.enableOidc

Enable OIDC-Authentication for Peering Manager.

This requires a configuration file being pass through oidcConfigPath.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/web-apps/peering-manager.nix

services.peering-manager.enableScheduledTasks

Set up scheduled tasks

Type: boolean

Default

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/web-apps/peering-manager.nix

services.peering-manager.extraConfig

Additional lines of configuration appended to the configuration.py. See the documentation for more possible options.

Type: strings concatenated with "\n"

Default

""

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/web-apps/peering-manager.nix

services.peering-manager.ldapConfigPath

Path to the Configuration-File for LDAP-Authentication, will be loaded as ldap_config.py. See the documentation for possible options.

Type: path

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/web-apps/peering-manager.nix

services.peering-manager.listenAddress

Address the server will listen on.

Type: string

Default

"[::1]"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/web-apps/peering-manager.nix

services.peering-manager.oidcConfigPath

Path to the Configuration-File for OIDC-Authentication, will be loaded as oidc_config.py. See the documentation for possible options.

Type: path

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/web-apps/peering-manager.nix

services.peering-manager.peeringdbApiKeyFile

Path to a file containing the PeeringDB API key.

Type: null or path

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/web-apps/peering-manager.nix

services.peering-manager.plugins

List of plugin packages to install.

Type: function that evaluates to a(n) list of package

Default

python3Packages: with python3Packages; [];

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/web-apps/peering-manager.nix

services.peering-manager.port

Port the server will listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

8001

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/web-apps/peering-manager.nix

services.peering-manager.secretKeyFile

Path to a file containing the secret key.

Type: path

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/web-apps/peering-manager.nix

services.peering-manager.settings

Configuration options to set in configuration.py. See the documentation for more possible options.

Type: attribute set of (Python value)

Default

{ }

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/web-apps/peering-manager.nix

services.peering-manager.settings.ALLOWED_HOSTS

A list of valid fully-qualified domain names (FQDNs) and/or IP addresses that can be used to reach the peering manager service.

Type: list of string

Default

["*"]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/web-apps/peering-manager.nix