···59596060 port = mkOption {
6161 default = "3050";
6262+ type = types.port;
6263 description = ''
6364 Port Firebird uses.
6465 '';
···66676768 user = mkOption {
6869 default = "firebird";
7070+ type = types.str;
6971 description = ''
7072 User account under which firebird runs.
7173 '';
···73757476 baseDir = mkOption {
7577 default = "/var/db/firebird"; # ubuntu is using /var/lib/firebird/2.1/data/.. ?
7878+ type = types.str;
7679 description = ''
7780 Location containing data/ and system/ directories.
7881 data/ stores the databases, system/ stores the password database security2.fdb.
+10-5
nixos/modules/services/databases/memcached.nix
···1717 options = {
18181919 services.memcached = {
2020-2120 enable = mkEnableOption "Memcached";
22212322 user = mkOption {
2323+ type = types.str;
2424 default = "memcached";
2525 description = "The user to run Memcached as";
2626 };
27272828 listen = mkOption {
2929+ type = types.str;
2930 default = "127.0.0.1";
3030- description = "The IP address to bind to";
3131+ description = "The IP address to bind to.";
3132 };
32333334 port = mkOption {
3535+ type = types.port;
3436 default = 11211;
3535- description = "The port to bind to";
3737+ description = "The port to bind to.";
3638 };
37393840 enableUnixSocket = mkEnableOption "unix socket at /run/memcached/memcached.sock";
39414042 maxMemory = mkOption {
4343+ type = types.ints.unsigned;
4144 default = 64;
4245 description = "The maximum amount of memory to use for storage, in megabytes.";
4346 };
44474548 maxConnections = mkOption {
4949+ type = types.ints.unsigned;
4650 default = 1024;
4747- description = "The maximum number of simultaneous connections";
5151+ description = "The maximum number of simultaneous connections.";
4852 };
49535054 extraOptions = mkOption {
5555+ type = types.listOf types.str;
5156 default = [];
5252- description = "A list of extra options that will be added as a suffix when running memcached";
5757+ description = "A list of extra options that will be added as a suffix when running memcached.";
5358 };
5459 };
5560
+7
nixos/modules/services/databases/mongodb.nix
···4141 };
42424343 user = mkOption {
4444+ type = types.str;
4445 default = "mongodb";
4546 description = "User account under which MongoDB runs";
4647 };
47484849 bind_ip = mkOption {
5050+ type = types.str;
4951 default = "127.0.0.1";
5052 description = "IP to bind to";
5153 };
52545355 quiet = mkOption {
5656+ type = types.bool;
5457 default = false;
5558 description = "quieter output";
5659 };
···6871 };
69727073 dbpath = mkOption {
7474+ type = types.str;
7175 default = "/var/db/mongodb";
7276 description = "Location where MongoDB stores its files";
7377 };
74787579 pidFile = mkOption {
8080+ type = types.str;
7681 default = "/run/mongodb.pid";
7782 description = "Location of MongoDB pid file";
7883 };
79848085 replSetName = mkOption {
8686+ type = types.str;
8187 default = "";
8288 description = ''
8389 If this instance is part of a replica set, set its name here.
···8692 };
87938894 extraConfig = mkOption {
9595+ type = types.lines;
8996 default = "";
9097 example = ''
9198 storage.journal.enabled: false
+19-2
nixos/modules/services/databases/redis.nix
···122122 };
123123124124 slaveOf = mkOption {
125125- default = null; # { ip, port }
126126- description = "An attribute set with two attributes: ip and port to which this redis instance acts as a slave.";
125125+ type = with types; nullOr (submodule ({ ... }: {
126126+ options = {
127127+ ip = mkOption {
128128+ type = str;
129129+ description = "IP of the Redis master";
130130+ example = "192.168.1.100";
131131+ };
132132+133133+ port = mkOption {
134134+ type = port;
135135+ description = "port of the Redis master";
136136+ default = 6379;
137137+ };
138138+ };
139139+ }));
140140+141141+ default = null;
142142+ description = "IP and port to which this redis instance acts as a slave.";
127143 example = { ip = "192.168.1.100"; port = 6379; };
128144 };
129145130146 masterAuth = mkOption {
147147+ type = types.str;
131148 default = null;
132149 description = ''If the master is password protected (using the requirePass configuration)
133150 it is possible to tell the slave to authenticate before starting the replication synchronization
+5
nixos/modules/services/databases/virtuoso.nix
···1616 enable = mkEnableOption "Virtuoso Opensource database server";
17171818 config = mkOption {
1919+ type = types.lines;
1920 default = "";
2021 description = "Extra options to put into Virtuoso configuration file.";
2122 };
22232324 parameters = mkOption {
2525+ type = types.lines;
2426 default = "";
2527 description = "Extra options to put into [Parameters] section of Virtuoso configuration file.";
2628 };
27292830 listenAddress = mkOption {
3131+ type = types.str;
2932 default = "1111";
3033 example = "myserver:1323";
3134 description = "ip:port or port to listen on.";
3235 };
33363437 httpListenAddress = mkOption {
3838+ type = types.nullOr types.str;
3539 default = null;
3640 example = "myserver:8080";
3741 description = "ip:port or port for Virtuoso HTTP server to listen on.";
3842 };
39434044 dirsAllowed = mkOption {
4545+ type = types.nullOr types.str; # XXX Maybe use a list in the future?
4146 default = null;
4247 example = "/www, /home/";
4348 description = "A list of directories Virtuoso is allowed to access";