1 { config, lib, pkg, ... }:
8 cfg = config.virtualisation.podman.networkSocket;
13 ./network-socket-ghostunnel.nix
16 options.virtualisation.podman.networkSocket = {
21 Make the Podman and Docker compatibility API available over the network
22 with TLS client certificate authentication.
24 This allows Docker clients to connect with the equivalents of the Docker
25 CLI `-H` and `--tls*` family of options.
27 For certificate setup, see https://docs.docker.com/engine/security/protect-access/
29 This option is independent of [](#opt-virtualisation.podman.dockerSocket.enable).
34 type = types.enum [ ];
36 Choice of TLS proxy server.
38 example = "ghostunnel";
41 openFirewall = mkOption {
45 Whether to open the port in the firewall.
49 tls.cacert = mkOption {
52 Path to CA certificate to use for client authentication.
59 Path to certificate describing the server.
66 Path to the private key corresponding to the server certificate.
68 Use a string for this setting. Otherwise it will be copied to the Nix
69 store first, where it is readable by any system process.
77 TCP port number for receiving TLS connections.
80 listenAddress = mkOption {
84 Interface address for receiving TLS connections.
90 networking.firewall.allowedTCPPorts =
91 lib.optional (cfg.enable && cfg.openFirewall) cfg.port;
94 meta.maintainers = lib.teams.podman.members ++ [ lib.maintainers.roberth ];