1
0
Fork 0
mirror of https://github.com/nix-community/home-manager synced 2024-12-03 16:39:46 +01:00
This commit is contained in:
rycee 2023-03-25 23:16:27 +00:00
parent 60ab95695c
commit c53c82fd97

View file

@ -975,7 +975,7 @@ of launchd's LaunchAgents.</p><p><span class="emphasis"><em>Type:</em></span> bo
&lt;home-manager/modules/launchd/default.nix&gt;
</a></code></td></tr></table></dd><dt><span class="term"><a id="opt-launchd.agents._name_.enable"></a><a class="term" href="options.html#opt-launchd.agents._name_.enable"><code class="option">launchd.agents.&lt;name&gt;.enable</code></a></span></dt><dd><p>Whether to enable name.</p><p><span class="emphasis"><em>Type:</em></span> boolean</p><p><span class="emphasis"><em>Default:</em></span> <code class="literal">false</code></p><p><span class="emphasis"><em>Example:</em></span> <code class="literal">true</code></p><p><span class="emphasis"><em>Declared by:</em></span></p><table border="0" summary="Simple list" class="simplelist"><tr><td><code class="filename"><a class="filename" href="https://github.com/nix-community/home-manager/blob/master/modules/launchd/default.nix#blob-path" target="_top">
&lt;home-manager/modules/launchd/default.nix&gt;
</a></code></td></tr></table></dd><dt><span class="term"><a id="opt-launchd.agents._name_.config"></a><a class="term" href="options.html#opt-launchd.agents._name_.config"><code class="option">launchd.agents.&lt;name&gt;.config</code></a></span></dt><dd><p>Define a launchd job. See <span class="citerefentry"><span class="refentrytitle">launchd.plist</span>(5)</span> for details.</p><p><span class="emphasis"><em>Type:</em></span> submodule</p><p><span class="emphasis"><em>Default:</em></span> <code class="literal">{ }</code></p><p><span class="emphasis"><em>Example:</em></span> </p><pre class="programlisting">{
</a></code></td></tr></table></dd><dt><span class="term"><a id="opt-launchd.agents._name_.config"></a><a class="term" href="options.html#opt-launchd.agents._name_.config"><code class="option">launchd.agents.&lt;name&gt;.config</code></a></span></dt><dd><p>Define a launchd job. See <span class="citerefentry"><span class="refentrytitle">launchd.plist</span>(5)</span> for details.</p><p><span class="emphasis"><em>Type:</em></span> attribute set of anything</p><p><span class="emphasis"><em>Default:</em></span> <code class="literal">{ }</code></p><p><span class="emphasis"><em>Example:</em></span> </p><pre class="programlisting">{
ProgramArguments = [ "/usr/bin/say" "Good afternoon" ];
StartCalendarInterval = [
{
@ -986,7 +986,7 @@ of launchd's LaunchAgents.</p><p><span class="emphasis"><em>Type:</em></span> bo
}
</pre><p><span class="emphasis"><em>Declared by:</em></span></p><table border="0" summary="Simple list" class="simplelist"><tr><td><code class="filename"><a class="filename" href="https://github.com/nix-community/home-manager/blob/master/modules/launchd/default.nix#blob-path" target="_top">
&lt;home-manager/modules/launchd/default.nix&gt;
</a></code></td></tr></table></dd><dt><span class="term"><a id="opt-launchd.agents._name_.config.AbandonProcessGroup"></a><a class="term" href="options.html#opt-launchd.agents._name_.config.AbandonProcessGroup"><code class="option">launchd.agents.&lt;name&gt;.config.AbandonProcessGroup</code></a></span></dt><dd><p>When a job dies, launchd kills any remaining processes with the same process group ID as the job. Setting
</a></code></td></tr></table></dd><dt><span class="term"><a id="opt-launchd.agents._name_.config.AbandonProcessGroup"></a><a class="term" href="options.html#opt-launchd.agents._name_.config.AbandonProcessGroup"><code class="option">launchd.agents.&lt;name&gt;.config.AbandonProcessGroup</code></a></span></dt><dd><p>When a job dies, launchd kills any remaining processes with the same process group ID as the job. Setting
this key to true disables that behavior.</p><p><span class="emphasis"><em>Type:</em></span> null or boolean</p><p><span class="emphasis"><em>Default:</em></span> <code class="literal">null</code></p><p><span class="emphasis"><em>Declared by:</em></span></p><table border="0" summary="Simple list" class="simplelist"><tr><td><code class="filename"><a class="filename" href="https://github.com/nix-community/home-manager/blob/master/modules/launchd/default.nix#blob-path" target="_top">
&lt;home-manager/modules/launchd/default.nix&gt;
</a></code></td></tr></table></dd><dt><span class="term"><a id="opt-launchd.agents._name_.config.Debug"></a><a class="term" href="options.html#opt-launchd.agents._name_.config.Debug"><code class="option">launchd.agents.&lt;name&gt;.config.Debug</code></a></span></dt><dd><p>This optional key specifies that launchd should adjust its log mask temporarily to LOG_DEBUG while
@ -1043,8 +1043,8 @@ extend its break with the <code class="literal">sbrk(2)</code> system call.</p><
</a></code></td></tr></table></dd><dt><span class="term"><a id="opt-launchd.agents._name_.config.HardResourceLimits.MemoryLock"></a><a class="term" href="options.html#opt-launchd.agents._name_.config.HardResourceLimits.MemoryLock"><code class="option">launchd.agents.&lt;name&gt;.config.HardResourceLimits.MemoryLock</code></a></span></dt><dd><p>The maximum size (in bytes) which a process may lock into memory using the <code class="literal">mlock(2)</code> function.</p><p><span class="emphasis"><em>Type:</em></span> null or signed integer</p><p><span class="emphasis"><em>Default:</em></span> <code class="literal">null</code></p><p><span class="emphasis"><em>Declared by:</em></span></p><table border="0" summary="Simple list" class="simplelist"><tr><td><code class="filename"><a class="filename" href="https://github.com/nix-community/home-manager/blob/master/modules/launchd/default.nix#blob-path" target="_top">
&lt;home-manager/modules/launchd/default.nix&gt;
</a></code></td></tr></table></dd><dt><span class="term"><a id="opt-launchd.agents._name_.config.HardResourceLimits.NumberOfFiles"></a><a class="term" href="options.html#opt-launchd.agents._name_.config.HardResourceLimits.NumberOfFiles"><code class="option">launchd.agents.&lt;name&gt;.config.HardResourceLimits.NumberOfFiles</code></a></span></dt><dd><p>The maximum number of open files for this process. Setting this value in a system wide daemon
will set the <code class="literal">sysctl(3)</code> kern.maxfiles (SoftResourceLimits) or kern.maxfilesperproc (HardResource-Limits) (HardResourceLimits)
Limits) value in addition to the <code class="literal">setrlimit(2)</code> values.</p><p><span class="emphasis"><em>Type:</em></span> null or signed integer</p><p><span class="emphasis"><em>Default:</em></span> <code class="literal">null</code></p><p><span class="emphasis"><em>Declared by:</em></span></p><table border="0" summary="Simple list" class="simplelist"><tr><td><code class="filename"><a class="filename" href="https://github.com/nix-community/home-manager/blob/master/modules/launchd/default.nix#blob-path" target="_top">
will set the <code class="literal">sysctl(3)</code> kern.maxfiles (SoftResourceLimits) or kern.maxfilesperproc (HardResourceLimits)
value in addition to the <code class="literal">setrlimit(2)</code> values.</p><p><span class="emphasis"><em>Type:</em></span> null or signed integer</p><p><span class="emphasis"><em>Default:</em></span> <code class="literal">null</code></p><p><span class="emphasis"><em>Declared by:</em></span></p><table border="0" summary="Simple list" class="simplelist"><tr><td><code class="filename"><a class="filename" href="https://github.com/nix-community/home-manager/blob/master/modules/launchd/default.nix#blob-path" target="_top">
&lt;home-manager/modules/launchd/default.nix&gt;
</a></code></td></tr></table></dd><dt><span class="term"><a id="opt-launchd.agents._name_.config.HardResourceLimits.NumberOfProcesses"></a><a class="term" href="options.html#opt-launchd.agents._name_.config.HardResourceLimits.NumberOfProcesses"><code class="option">launchd.agents.&lt;name&gt;.config.HardResourceLimits.NumberOfProcesses</code></a></span></dt><dd><p>The maximum number of simultaneous processes for this user id. Setting this value in a system
wide daemon will set the <code class="literal">sysctl(3)</code> kern.maxproc (SoftResourceLimits) or kern.maxprocperuid
@ -1067,18 +1067,36 @@ of conditions may be specified to selectively control whether launchd keeps a jo
multiple keys are provided, launchd ORs them, thus providing maximum flexibility to the job to refine
the logic and stall if necessary. If launchd finds no reason to restart the job, it falls back on
demand based invocation. Jobs that exit quickly and frequently when configured to be kept alive will
be throttled to conserve system resources.</p><p><span class="emphasis"><em>Type:</em></span> null or boolean or (submodule)</p><p><span class="emphasis"><em>Default:</em></span> <code class="literal">null</code></p><p><span class="emphasis"><em>Declared by:</em></span></p><table border="0" summary="Simple list" class="simplelist"><tr><td><code class="filename"><a class="filename" href="https://github.com/nix-community/home-manager/blob/master/modules/launchd/default.nix#blob-path" target="_top">
be throttled to converve system resources.</p><p><span class="emphasis"><em>Type:</em></span> null or boolean or (submodule)</p><p><span class="emphasis"><em>Default:</em></span> <code class="literal">null</code></p><p><span class="emphasis"><em>Declared by:</em></span></p><table border="0" summary="Simple list" class="simplelist"><tr><td><code class="filename"><a class="filename" href="https://github.com/nix-community/home-manager/blob/master/modules/launchd/default.nix#blob-path" target="_top">
&lt;home-manager/modules/launchd/default.nix&gt;
</a></code></td></tr></table></dd><dt><span class="term"><a id="opt-launchd.agents._name_.config.Label"></a><a class="term" href="options.html#opt-launchd.agents._name_.config.Label"><code class="option">launchd.agents.&lt;name&gt;.config.Label</code></a></span></dt><dd><p>This required key uniquely identifies the job to launchd.</p><p><span class="emphasis"><em>Type:</em></span> string</p><p><span class="emphasis"><em>Declared by:</em></span></p><table border="0" summary="Simple list" class="simplelist"><tr><td><code class="filename"><a class="filename" href="https://github.com/nix-community/home-manager/blob/master/modules/launchd/default.nix#blob-path" target="_top">
&lt;home-manager/modules/launchd/default.nix&gt;
</a></code></td></tr></table></dd><dt><span class="term"><a id="opt-launchd.agents._name_.config.LaunchEvents"></a><a class="term" href="options.html#opt-launchd.agents._name_.config.LaunchEvents"><code class="option">launchd.agents.&lt;name&gt;.config.LaunchEvents</code></a></span></dt><dd><p>Specifies higher-level event types to be used as launch-on-demand event
sources. Each sub-dictionary defines events for a particular event
subsystem, such as "com.apple.iokit.matching", which can be used to
launch jobs based on the appearance of nodes in the IORegistry. Each
dictionary within the sub-dictionary specifies an event descriptor that
is specified to each event subsystem. With this key, the job promises to
use the xpc_set_event_stream_handler(3) API to consume events. See
xpc_events(3) for more details on event sources.</p><p><span class="emphasis"><em>Type:</em></span> null or (attribute set)</p><p><span class="emphasis"><em>Default:</em></span> <code class="literal">null</code></p><p><span class="emphasis"><em>Example:</em></span> </p><pre class="programlisting">{
"com.apple.iokit.matching" = {
"com.apple.usb.device" = {
IOMatchLaunchStream = true;
IOProviderClass = "IOUSBDevice";
idProduct = "*";
idVendor = "*";
};
};
}</pre><p><span class="emphasis"><em>Declared by:</em></span></p><table border="0" summary="Simple list" class="simplelist"><tr><td><code class="filename"><a class="filename" href="https://github.com/nix-community/home-manager/blob/master/modules/launchd/default.nix#blob-path" target="_top">
&lt;home-manager/modules/launchd/default.nix&gt;
</a></code></td></tr></table></dd><dt><span class="term"><a id="opt-launchd.agents._name_.config.LaunchOnlyOnce"></a><a class="term" href="options.html#opt-launchd.agents._name_.config.LaunchOnlyOnce"><code class="option">launchd.agents.&lt;name&gt;.config.LaunchOnlyOnce</code></a></span></dt><dd><p>This optional key specifies whether the job can only be run once and only once. In other words, if the
job cannot be safely respawned without a full machine reboot, then set this key to be true.</p><p><span class="emphasis"><em>Type:</em></span> null or boolean</p><p><span class="emphasis"><em>Default:</em></span> <code class="literal">null</code></p><p><span class="emphasis"><em>Declared by:</em></span></p><table border="0" summary="Simple list" class="simplelist"><tr><td><code class="filename"><a class="filename" href="https://github.com/nix-community/home-manager/blob/master/modules/launchd/default.nix#blob-path" target="_top">
&lt;home-manager/modules/launchd/default.nix&gt;
</a></code></td></tr></table></dd><dt><span class="term"><a id="opt-launchd.agents._name_.config.LimitLoadFromHosts"></a><a class="term" href="options.html#opt-launchd.agents._name_.config.LimitLoadFromHosts"><code class="option">launchd.agents.&lt;name&gt;.config.LimitLoadFromHosts</code></a></span></dt><dd><p>This configuration file only applies to hosts NOT listed with this key. Note: One should set kern.host-name kern.hostname
name in <code class="literal">sysctl.conf(5)</code> for this feature to work reliably.</p><p><span class="emphasis"><em>Type:</em></span> null or (list of string)</p><p><span class="emphasis"><em>Default:</em></span> <code class="literal">null</code></p><p><span class="emphasis"><em>Declared by:</em></span></p><table border="0" summary="Simple list" class="simplelist"><tr><td><code class="filename"><a class="filename" href="https://github.com/nix-community/home-manager/blob/master/modules/launchd/default.nix#blob-path" target="_top">
</a></code></td></tr></table></dd><dt><span class="term"><a id="opt-launchd.agents._name_.config.LimitLoadFromHosts"></a><a class="term" href="options.html#opt-launchd.agents._name_.config.LimitLoadFromHosts"><code class="option">launchd.agents.&lt;name&gt;.config.LimitLoadFromHosts</code></a></span></dt><dd><p>This configuration file only applies to hosts NOT listed with this key. Note: One should set kern.hostname
in <code class="literal">sysctl.conf(5)</code> for this feature to work reliably.</p><p><span class="emphasis"><em>Type:</em></span> null or (list of string)</p><p><span class="emphasis"><em>Default:</em></span> <code class="literal">null</code></p><p><span class="emphasis"><em>Declared by:</em></span></p><table border="0" summary="Simple list" class="simplelist"><tr><td><code class="filename"><a class="filename" href="https://github.com/nix-community/home-manager/blob/master/modules/launchd/default.nix#blob-path" target="_top">
&lt;home-manager/modules/launchd/default.nix&gt;
</a></code></td></tr></table></dd><dt><span class="term"><a id="opt-launchd.agents._name_.config.LimitLoadToHosts"></a><a class="term" href="options.html#opt-launchd.agents._name_.config.LimitLoadToHosts"><code class="option">launchd.agents.&lt;name&gt;.config.LimitLoadToHosts</code></a></span></dt><dd><p>This configuration file only applies to the hosts listed with this key. Note: One should set kern.host-name kern.hostname
name in <code class="literal">sysctl.conf(5)</code> for this feature to work reliably.</p><p><span class="emphasis"><em>Type:</em></span> null or (list of string)</p><p><span class="emphasis"><em>Default:</em></span> <code class="literal">null</code></p><p><span class="emphasis"><em>Declared by:</em></span></p><table border="0" summary="Simple list" class="simplelist"><tr><td><code class="filename"><a class="filename" href="https://github.com/nix-community/home-manager/blob/master/modules/launchd/default.nix#blob-path" target="_top">
</a></code></td></tr></table></dd><dt><span class="term"><a id="opt-launchd.agents._name_.config.LimitLoadToHosts"></a><a class="term" href="options.html#opt-launchd.agents._name_.config.LimitLoadToHosts"><code class="option">launchd.agents.&lt;name&gt;.config.LimitLoadToHosts</code></a></span></dt><dd><p>This configuration file only applies to the hosts listed with this key. Note: One should set kern.hostname
in <code class="literal">sysctl.conf(5)</code> for this feature to work reliably.</p><p><span class="emphasis"><em>Type:</em></span> null or (list of string)</p><p><span class="emphasis"><em>Default:</em></span> <code class="literal">null</code></p><p><span class="emphasis"><em>Declared by:</em></span></p><table border="0" summary="Simple list" class="simplelist"><tr><td><code class="filename"><a class="filename" href="https://github.com/nix-community/home-manager/blob/master/modules/launchd/default.nix#blob-path" target="_top">
&lt;home-manager/modules/launchd/default.nix&gt;
</a></code></td></tr></table></dd><dt><span class="term"><a id="opt-launchd.agents._name_.config.LimitLoadToSessionType"></a><a class="term" href="options.html#opt-launchd.agents._name_.config.LimitLoadToSessionType"><code class="option">launchd.agents.&lt;name&gt;.config.LimitLoadToSessionType</code></a></span></dt><dd><p>This configuration file only applies to sessions of the type specified. This key is used in concert
with the -S flag to <span class="command"><strong>launchctl</strong></span>.</p><p><span class="emphasis"><em>Type:</em></span> null or string</p><p><span class="emphasis"><em>Default:</em></span> <code class="literal">null</code></p><p><span class="emphasis"><em>Declared by:</em></span></p><table border="0" summary="Simple list" class="simplelist"><tr><td><code class="filename"><a class="filename" href="https://github.com/nix-community/home-manager/blob/master/modules/launchd/default.nix#blob-path" target="_top">
@ -1100,8 +1118,8 @@ checked in with launchd.</p><p><span class="emphasis"><em>Type:</em></span> null
&lt;home-manager/modules/launchd/default.nix&gt;
</a></code></td></tr></table></dd><dt><span class="term"><a id="opt-launchd.agents._name_.config.MachServices.ResetAtClose"></a><a class="term" href="options.html#opt-launchd.agents._name_.config.MachServices.ResetAtClose"><code class="option">launchd.agents.&lt;name&gt;.config.MachServices.ResetAtClose</code></a></span></dt><dd><p>If this boolean is false, the port is recycled, thus leaving clients to remain oblivious to the
demand nature of job. If the value is set to true, clients receive port death notifications when
the job lets go of the receive right. The port will be recreated atomically with respect to boot-strap_look_up() bootstrap_look_up()
strap_look_up() calls, so that clients can trust that after receiving a port death notification,
the job lets go of the receive right. The port will be recreated atomically with respect to bootstrap_look_up()
calls, so that clients can trust that after receiving a port death notification,
the new port will have already been recreated. Setting the value to true should be done with
care. Not all clients may be able to handle this behavior. The default value is false.</p><p><span class="emphasis"><em>Type:</em></span> null or boolean</p><p><span class="emphasis"><em>Default:</em></span> <code class="literal">null</code></p><p><span class="emphasis"><em>Declared by:</em></span></p><table border="0" summary="Simple list" class="simplelist"><tr><td><code class="filename"><a class="filename" href="https://github.com/nix-community/home-manager/blob/master/modules/launchd/default.nix#blob-path" target="_top">
&lt;home-manager/modules/launchd/default.nix&gt;
@ -1159,13 +1177,12 @@ protocol which conforms to the criteria specified in the job configuration file.
The parameters below are used as inputs to call <code class="literal">getaddrinfo(3)</code>.</p><p><span class="emphasis"><em>Type:</em></span> null or (attribute set of (submodule))</p><p><span class="emphasis"><em>Default:</em></span> <code class="literal">null</code></p><p><span class="emphasis"><em>Declared by:</em></span></p><table border="0" summary="Simple list" class="simplelist"><tr><td><code class="filename"><a class="filename" href="https://github.com/nix-community/home-manager/blob/master/modules/launchd/default.nix#blob-path" target="_top">
&lt;home-manager/modules/launchd/default.nix&gt;
</a></code></td></tr></table></dd><dt><span class="term"><a id="opt-launchd.agents._name_.config.Sockets._name_.Bonjour"></a><a class="term" href="options.html#opt-launchd.agents._name_.config.Sockets._name_.Bonjour"><code class="option">launchd.agents.&lt;name&gt;.config.Sockets.&lt;name&gt;.Bonjour</code></a></span></dt><dd><p>This optional key can be used to request that the service be registered with the
<code class="literal">mDNSResponder(8)</code>. If the value is boolean, the service name is inferred from the SockService-Name. SockServiceName.
Name.</p><p><span class="emphasis"><em>Type:</em></span> null or boolean or list of string</p><p><span class="emphasis"><em>Default:</em></span> <code class="literal">null</code></p><p><span class="emphasis"><em>Declared by:</em></span></p><table border="0" summary="Simple list" class="simplelist"><tr><td><code class="filename"><a class="filename" href="https://github.com/nix-community/home-manager/blob/master/modules/launchd/default.nix#blob-path" target="_top">
<code class="literal">mDNSResponder(8)</code>. If the value is boolean, the service name is inferred from the SockServiceName.</p><p><span class="emphasis"><em>Type:</em></span> null or boolean or list of string</p><p><span class="emphasis"><em>Default:</em></span> <code class="literal">null</code></p><p><span class="emphasis"><em>Declared by:</em></span></p><table border="0" summary="Simple list" class="simplelist"><tr><td><code class="filename"><a class="filename" href="https://github.com/nix-community/home-manager/blob/master/modules/launchd/default.nix#blob-path" target="_top">
&lt;home-manager/modules/launchd/default.nix&gt;
</a></code></td></tr></table></dd><dt><span class="term"><a id="opt-launchd.agents._name_.config.Sockets._name_.MulticastGroup"></a><a class="term" href="options.html#opt-launchd.agents._name_.config.Sockets._name_.MulticastGroup"><code class="option">launchd.agents.&lt;name&gt;.config.Sockets.&lt;name&gt;.MulticastGroup</code></a></span></dt><dd><p>This optional key can be used to request that the datagram socket join a multicast group. If the
value is a hostname, then <code class="literal">getaddrinfo(3)</code> will be used to join the correct multicast address for a
given socket family. If an explicit IPv4 or IPv6 address is given, it is required that the Sock-Family SockFamily
Family family also be set, otherwise the results are undefined.</p><p><span class="emphasis"><em>Type:</em></span> null or string</p><p><span class="emphasis"><em>Default:</em></span> <code class="literal">null</code></p><p><span class="emphasis"><em>Declared by:</em></span></p><table border="0" summary="Simple list" class="simplelist"><tr><td><code class="filename"><a class="filename" href="https://github.com/nix-community/home-manager/blob/master/modules/launchd/default.nix#blob-path" target="_top">
given socket family. If an explicit IPv4 or IPv6 address is given, it is required that the SockFamily
family also be set, otherwise the results are undefined.</p><p><span class="emphasis"><em>Type:</em></span> null or string</p><p><span class="emphasis"><em>Default:</em></span> <code class="literal">null</code></p><p><span class="emphasis"><em>Declared by:</em></span></p><table border="0" summary="Simple list" class="simplelist"><tr><td><code class="filename"><a class="filename" href="https://github.com/nix-community/home-manager/blob/master/modules/launchd/default.nix#blob-path" target="_top">
&lt;home-manager/modules/launchd/default.nix&gt;
</a></code></td></tr></table></dd><dt><span class="term"><a id="opt-launchd.agents._name_.config.Sockets._name_.SecureSocketWithKey"></a><a class="term" href="options.html#opt-launchd.agents._name_.config.Sockets._name_.SecureSocketWithKey"><code class="option">launchd.agents.&lt;name&gt;.config.Sockets.&lt;name&gt;.SecureSocketWithKey</code></a></span></dt><dd><p>This optional key is a variant of SockPathName. Instead of binding to a known path, a securely
generated socket is created and the path is assigned to the environment variable that is inherited
@ -1207,8 +1224,8 @@ extend its break with the <code class="literal">sbrk(2)</code> system call.</p><
</a></code></td></tr></table></dd><dt><span class="term"><a id="opt-launchd.agents._name_.config.SoftResourceLimits.MemoryLock"></a><a class="term" href="options.html#opt-launchd.agents._name_.config.SoftResourceLimits.MemoryLock"><code class="option">launchd.agents.&lt;name&gt;.config.SoftResourceLimits.MemoryLock</code></a></span></dt><dd><p>The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.</p><p><span class="emphasis"><em>Type:</em></span> null or signed integer</p><p><span class="emphasis"><em>Default:</em></span> <code class="literal">null</code></p><p><span class="emphasis"><em>Declared by:</em></span></p><table border="0" summary="Simple list" class="simplelist"><tr><td><code class="filename"><a class="filename" href="https://github.com/nix-community/home-manager/blob/master/modules/launchd/default.nix#blob-path" target="_top">
&lt;home-manager/modules/launchd/default.nix&gt;
</a></code></td></tr></table></dd><dt><span class="term"><a id="opt-launchd.agents._name_.config.SoftResourceLimits.NumberOfFiles"></a><a class="term" href="options.html#opt-launchd.agents._name_.config.SoftResourceLimits.NumberOfFiles"><code class="option">launchd.agents.&lt;name&gt;.config.SoftResourceLimits.NumberOfFiles</code></a></span></dt><dd><p>The maximum number of open files for this process. Setting this value in a system wide daemon
will set the <code class="literal">sysctl(3)</code> kern.maxfiles (SoftResourceLimits) or kern.maxfilesperproc (HardResource-Limits) (HardResourceLimits)
Limits) value in addition to the <code class="literal">setrlimit(2)</code> values.</p><p><span class="emphasis"><em>Type:</em></span> null or signed integer</p><p><span class="emphasis"><em>Default:</em></span> <code class="literal">null</code></p><p><span class="emphasis"><em>Declared by:</em></span></p><table border="0" summary="Simple list" class="simplelist"><tr><td><code class="filename"><a class="filename" href="https://github.com/nix-community/home-manager/blob/master/modules/launchd/default.nix#blob-path" target="_top">
will set the <code class="literal">sysctl(3)</code> kern.maxfiles (SoftResourceLimits) or kern.maxfilesperproc (HardResourceLimits)
value in addition to the <code class="literal">setrlimit(2)</code> values.</p><p><span class="emphasis"><em>Type:</em></span> null or signed integer</p><p><span class="emphasis"><em>Default:</em></span> <code class="literal">null</code></p><p><span class="emphasis"><em>Declared by:</em></span></p><table border="0" summary="Simple list" class="simplelist"><tr><td><code class="filename"><a class="filename" href="https://github.com/nix-community/home-manager/blob/master/modules/launchd/default.nix#blob-path" target="_top">
&lt;home-manager/modules/launchd/default.nix&gt;
</a></code></td></tr></table></dd><dt><span class="term"><a id="opt-launchd.agents._name_.config.SoftResourceLimits.NumberOfProcesses"></a><a class="term" href="options.html#opt-launchd.agents._name_.config.SoftResourceLimits.NumberOfProcesses"><code class="option">launchd.agents.&lt;name&gt;.config.SoftResourceLimits.NumberOfProcesses</code></a></span></dt><dd><p>The maximum number of simultaneous processes for this user id. Setting this value in a system
wide daemon will set the <code class="literal">sysctl(3)</code> kern.maxproc (SoftResourceLimits) or kern.maxprocperuid