| options/nixos/containers.<name>.path | As an alternative to specifying
config, you can specify the path to
the evaluated NixOS system configuration, typically a
symlink to a system profile.
|
| options/nixos/containers.<name>.flake | The Flake URI of the NixOS configuration to use for the container
|
| options/nixos/containers.<name>.bindMounts.<name>.hostPath | Location of the host path to be mounted.
|
| options/nixos/containers.<name>.bindMounts.<name>.isReadOnly | Determine whether the mounted path will be accessed in read-only mode.
|
| options/nixos/containers.<name>.allowedDevices.*.node | Path to device node
|
| options/nixos/containers.<name>.nixpkgs | A path to the nixpkgs that provide the modules, pkgs and lib for evaluating the container
|
| options/nixos/containers.<name>.networkNamespace | Takes the path to a file representing a kernel network namespace that the container
shall run in
|
| options/nixos/virtualisation.oci-containers.containers.<name>.imageFile | Path to an image file to load before running the image
|
| options/nixos/virtualisation.oci-containers.containers.<name>.login.passwordFile | Path to file containing password.
|
| options/nixos/containers | A set of NixOS system configurations to be run as lightweight
containers
|
| options/nixos/virtualisation.oci-containers.containers.<name>.imageStream | Path to a script that streams the desired image on standard output
|
| options/nixos/containers.<name>.config | A specification of the desired configuration of this
container, as a NixOS module.
|
| options/nixos/containers.<name>.autoStart | Whether the container is automatically started at boot-time.
|
| options/nixos/containers.<name>.extraVeths | Extra veth-pairs to be created for the container.
|
| options/nixos/containers.<name>.bindMounts | An extra list of directories that is bound to the container.
|
| options/nixos/containers.<name>.allowedDevices | A list of device nodes to which the containers has access to.
|
| options/nixos/containers.<name>.extraFlags | Extra flags passed to the systemd-nspawn command
|
| options/nixos/containers.<name>.bindMounts.<name>.mountPoint | Mount point on the container file system.
|
| options/nixos/containers.<name>.enableTun | Allows the container to create and setup tunnel interfaces
by granting the NET_ADMIN capability and
enabling access to /dev/net/tun.
|
| options/nixos/containers.<name>.hostBridge | Put the host-side of the veth-pair into the named bridge
|
| options/nixos/containers.<name>.tmpfs | Mounts a set of tmpfs file systems into the container
|
| options/nixos/containers.<name>.hostAddress | The IPv4 address assigned to the host interface.
(Not used when hostBridge is set.)
|
| options/nixos/containers.<name>.hostAddress6 | The IPv6 address assigned to the host interface.
(Not used when hostBridge is set.)
|
| options/nixos/containers.<name>.extraVeths.<name>.hostBridge | Put the host-side of the veth-pair into the named bridge
|
| options/nixos/containers.<name>.extraVeths.<name>.hostAddress | The IPv4 address assigned to the host interface.
(Not used when hostBridge is set.)
|
| options/nixos/containers.<name>.specialArgs | A set of special arguments to be passed to NixOS modules
|
| options/nixos/containers.<name>.extraVeths.<name>.hostAddress6 | The IPv6 address assigned to the host interface.
(Not used when hostBridge is set.)
|
| options/home-manager/programs.floorp.profiles.<name>.containers.<name>.name | Container name, e.g., shopping.
|
| options/nixos/containers.<name>.macvlans | The list of host interfaces from which macvlans will be
created
|
| options/home-manager/programs.firefox.profiles.<name>.containers.<name>.name | Container name, e.g., shopping.
|
| options/nixos/containers.<name>.forwardPorts.*.hostPort | Source port of the external interface on host
|
| options/nixos/containers.<name>.timeoutStartSec | Time for the container to start
|
| options/nixos/containers.<name>.extraVeths.<name>.forwardPorts.*.hostPort | Source port of the external interface on host
|
| options/nixos/containers.<name>.forwardPorts | List of forwarded ports from host to container
|
| options/nixos/containers.<name>.restartIfChanged | Whether the container should be restarted during a NixOS
configuration switch if its definition has changed.
|
| options/nixos/containers.<name>.localAddress | The IPv4 address assigned to the interface in the container
|
| options/nixos/containers.<name>.interfaces | The list of interfaces to be moved into the container.
|
| options/nixos/containers.<name>.extraVeths.<name>.forwardPorts | List of forwarded ports from host to container
|
| options/nixos/containers.<name>.localAddress6 | The IPv6 address assigned to the interface in the container
|
| options/nixos/containers.<name>.extraVeths.<name>.localAddress | The IPv4 address assigned to the interface in the container
|
| options/home-manager/services.podman.containers.<name>.ip6 | Set an IPv6 address for the container.
|
| options/home-manager/services.podman.containers.<name>.ip4 | Set an IPv4 address for the container.
|
| options/nixos/containers.<name>.extraVeths.<name>.localAddress6 | The IPv6 address assigned to the interface in the container
|
| options/home-manager/programs.librewolf.profiles.<name>.containers.<name>.name | Container name, e.g., shopping.
|
| options/home-manager/services.podman.containers.<name>.exec | The command to run after the container start.
|
| options/home-manager/services.podman.containers.<name>.user | The user ID inside the container.
|
| options/darwin/launchd.agents.<name>.path | Packages added to the service's PATH
environment variable
|
| options/home-manager/services.podman.containers.<name>.userNS | Use a user namespace for the container.
|
| options/home-manager/services.podman.containers.<name>.image | The container image.
|
| options/nixos/containers.<name>.privateNetwork | Whether to give the container its own private virtual
Ethernet interface
|
| options/home-manager/services.podman.containers.<name>.group | The group ID inside the container.
|
| options/home-manager/services.podman.containers.<name>.ports | A mapping of ports between host and container
|
| options/home-manager/programs.floorp.profiles.<name>.containers | Attribute set of container configurations
|
| options/home-manager/programs.floorp.profiles.<name>.containers.<name>.icon | Container icon.
|
| options/home-manager/services.podman.containers.<name>.labels | The labels to apply to the container.
|
| options/nixos/containers.<name>.extraVeths.<name>.forwardPorts.*.protocol | The protocol specifier for port forwarding between host and container
|
| options/home-manager/programs.firefox.profiles.<name>.containers | Attribute set of container configurations
|
| options/home-manager/programs.floorp.profiles.<name>.containers.<name>.id | Container ID
|
| options/nixos/containers.<name>.forwardPorts.*.protocol | The protocol specifier for port forwarding between host and container
|
| options/nixos/systemd.paths.<name>.pathConfig | Each attribute in this set specifies an option in the
[Path] section of the unit
|
| options/home-manager/programs.floorp.profiles.<name>.containers.<name>.color | Container color.
|
| options/home-manager/services.podman.containers.<name>.autoStart | Whether to start the container on boot (requires user lingering).
|
| options/darwin/launchd.daemons.<name>.path | Packages added to the service's PATH
environment variable
|
| options/home-manager/programs.firefox.profiles.<name>.containers.<name>.icon | Container icon.
|
| options/home-manager/services.podman.containers.<name>.autoUpdate | The autoupdate policy for the container.
|
| options/darwin/launchd.user.agents.<name>.path | Packages added to the service's PATH
environment variable
|
| options/home-manager/services.podman.containers.<name>.volumes | The volumes to mount into the container.
|
| options/home-manager/services.podman.containers.<name>.devices | The devices to mount into the container
|
| options/nixos/containers.<name>.ephemeral | Runs container in ephemeral mode with the empty root filesystem at boot
|
| options/home-manager/programs.firefox.profiles.<name>.containers.<name>.id | Container ID
|
| options/nixos/systemd.paths.<name>.name | The name of this systemd unit, including its extension
|
| options/home-manager/programs.firefox.profiles.<name>.containers.<name>.color | Container color.
|
| options/nixos/containers.<name>.privateUsers | Whether to give the container its own private UIDs/GIDs space (user namespacing)
|
| options/nixos/containers.<name>.extraVeths.<name>.forwardPorts.*.containerPort | Target port of container
|
| options/nixos/virtualisation.oci-containers.containers.<name>.dependsOn | Define which other containers this one depends on
|
| options/home-manager/services.podman.containers.<name>.extraConfig | INI sections and values to populate the Container Quadlet.
|
| options/nixos/containers.<name>.forwardPorts.*.containerPort | Target port of container
|
| options/nixos/systemd.user.paths.<name>.pathConfig | Each attribute in this set specifies an option in the
[Path] section of the unit
|
| options/home-manager/programs.librewolf.profiles.<name>.containers | Attribute set of container configurations
|
| options/nixos/virtualisation.oci-containers.containers.<name>.podman | Podman-specific settings in OCI containers
|
| options/home-manager/services.podman.containers.<name>.networkAlias | Network aliases for the container.
|
| options/nixos/services.gitwatch.<name>.path | The path to repo in local machine
|
| options/home-manager/services.podman.containers.<name>.extraPodmanArgs | Extra arguments to pass to the podman run command.
|
| options/home-manager/programs.librewolf.profiles.<name>.containers.<name>.icon | Container icon.
|
| options/home-manager/services.podman.containers.<name>.network | The network mode or network/s to connect the container to
|
| options/home-manager/programs.librewolf.profiles.<name>.containers.<name>.id | Container ID
|
| options/nixos/systemd.services.<name>.path | Packages added to the service's PATH
environment variable
|
| options/home-manager/programs.librewolf.profiles.<name>.containers.<name>.color | Container color.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.cmd | Commandline arguments to pass to the image's entrypoint.
|
| options/nixos/systemd.user.paths.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/virtualisation.oci-containers.containers.<name>.hostname | The hostname of the container.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.image | OCI image to run.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.serviceName | Systemd service name that manages the container
|
| options/nixos/virtualisation.oci-containers.containers.<name>.user | Override the username or UID (and optionally groupname or GID) used
in the container.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.pull | Image pull policy for the container
|
| options/nixos/containers.<name>.allowedDevices.*.modifier | Device node access modifier
|
| options/nixos/virtualisation.oci-containers.containers.<name>.labels | Labels to attach to the container at runtime.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.login.username | Username for login.
|
| options/home-manager/services.podman.containers.<name>.entrypoint | The container entrypoint.
|
| options/nixos/security.auditd.plugins.<name>.path | This is the absolute path to the plugin executable.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.podman.user | The user under which the container should run.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.devices | List of devices to attach to this container.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.workdir | Override the default working directory for the container.
|
| options/nixos/systemd.user.services.<name>.path | Packages added to the service's PATH
environment variable
|
| options/nixos/virtualisation.oci-containers.containers.<name>.autoStart | When enabled, the container is automatically started on boot
|
| options/nixos/virtualisation.oci-containers.containers.<name>.autoRemoveOnStop | Automatically remove the container when it is stopped or killed
|
| options/nixos/virtualisation.oci-containers.containers.<name>.networks | Networks to attach the container to
|
| options/home-manager/programs.floorp.profiles.<name>.containersForce | Whether to force replace the existing containers configuration
|
| options/nixos/virtualisation.oci-containers.containers.<name>.extraOptions | Extra options for podman run.
|
| options/home-manager/programs.floorp.profiles.<name>.path | Profile path.
|
| options/home-manager/services.podman.containers.<name>.description | The description of the container.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.login.registry | Registry where to login to.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.preRunExtraOptions | Extra options for podman that go before the run argument.
|
| options/home-manager/services.podman.containers.<name>.environment | Environment variables to set in the container.
|
| options/home-manager/programs.firefox.profiles.<name>.containersForce | Whether to force replace the existing containers configuration
|
| options/nixos/security.dhparams.params.<name>.path | The resulting path of the generated Diffie-Hellman parameters
file for other services to reference
|
| options/nixos/virtualisation.oci-containers.containers.<name>.privileged | Give extended privileges to the container
|
| options/nixos/virtualisation.oci-containers.containers.<name>.entrypoint | Override the default entrypoint of the image.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.volumes | List of volumes to attach to this container
|
| options/nixos/virtualisation.oci-containers.containers.<name>.log-driver | Logging driver for the container
|
| options/home-manager/services.podman.containers.<name>.environmentFile | Paths to files containing container environment variables.
|
| options/home-manager/programs.firefox.profiles.<name>.path | Profile path.
|
| options/nixos/services.fedimintd.<name>.nginx.path | Path to host the API on and forward to the daemon's api port
|
| options/nixos/virtualisation.oci-containers.containers.<name>.environment | Environment variables to set for this container.
|
| options/home-manager/services.podman.containers.<name>.addCapabilities | The capabilities to add to the container.
|
| options/home-manager/accounts.email.accounts.<name>.maildir.path | Path to maildir directory where mail for this account is
stored
|
| options/home-manager/services.podman.containers.<name>.dropCapabilities | The capabilities to drop from the container.
|
| options/home-manager/programs.librewolf.profiles.<name>.containersForce | Whether to force replace the existing containers configuration
|
| options/nixos/virtualisation.oci-containers.containers.<name>.environmentFiles | Environment files for this container.
|
| options/nixos/services.nbd.server.exports.<name>.path | File or block device to export.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.podman.sdnotify | Determines how podman should notify systemd that the unit is ready
|
| options/nixos/containers.<name>.additionalCapabilities | Grant additional capabilities to the container
|
| options/home-manager/accounts.contact.accounts.<name>.local.path | The path of the storage.
|
| options/nixos/security.apparmor.policies.<name>.path | A path of a profile file to include
|
| options/nixos/virtualisation.oci-containers.containers.<name>.capabilities | Capabilities to configure for the container
|
| options/nixos/virtualisation.oci-containers.containers.<name>.ports | Network ports to publish from the container to the outer host
|
| options/home-manager/programs.librewolf.profiles.<name>.path | Profile path.
|
| options/home-manager/accounts.calendar.accounts.<name>.local.path | The path of the storage.
|
| options/nixos/services.tor.relay.onionServices.<name>.path | Path where to store the data files of the hidden service
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.storage.path | Absolute path of the salt on the unencrypted device with
that device's root directory as "/".
|
| options/nixos/systemd.paths.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/systemd.paths.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/home-manager/programs.codex.skills | Custom skills for Codex
|
| options/nixos/systemd.paths.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/home-manager/services.git-sync.repositories.<name>.path | The path at which to sync the repository
|
| options/nixos/services.borgbackup.repos.<name>.path | Where to store the backups
|
| options/home-manager/home.file.<name>.target | Path to target file relative to HOME.
|
| options/nixos/services.woodpecker-agents.agents.<name>.path | Additional packages that should be added to the agent's PATH
|
| options/nixos/programs.xfs_quota.projects.<name>.path | Project directory.
|
| options/nixos/systemd.paths.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/systemd.user.paths.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/systemd.user.paths.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/systemd.paths.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.paths.<name>.aliases | Aliases of that unit.
|
| options/home-manager/xdg.dataFile.<name>.target | Path to target file relative to xdg.dataHome.
|
| options/nixos/systemd.user.paths.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/services.inadyn.settings.custom.<name>.ddns-path | DDNS server path
|
| options/nixos/systemd.paths.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/home-manager/services.syncthing.settings.folders.<name>.path | The path to the folder which should be shared
|
| options/home-manager/xdg.cacheFile.<name>.target | Path to target file relative to xdg.cacheHome.
|
| options/nixos/services.syncthing.settings.folders.<name>.path | The path to the folder which should be shared
|
| options/nixos/systemd.paths.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/systemd.user.paths.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/home-manager/xdg.stateFile.<name>.target | Path to target file relative to xdg.stateHome.
|
| options/home-manager/home.file.<name>.force | Whether the target path should be unconditionally replaced
by the managed file source
|
| options/nixos/systemd.user.paths.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.paths.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.paths.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/systemd.user.paths.<name>.aliases | Aliases of that unit.
|
| options/nixos/systemd.paths.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/home-manager/programs.claude-code.skills | Custom skills for Claude Code
|
| options/home-manager/xdg.dataFile.<name>.force | Whether the target path should be unconditionally replaced
by the managed file source
|
| options/nixos/systemd.user.paths.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/home-manager/xdg.configFile.<name>.target | Path to target file relative to xdg.configHome.
|
| options/home-manager/programs.opencode.skills | Custom agent skills for opencode
|
| options/nixos/systemd.user.paths.<name>.upholds | Keeps the specified running while this unit is running
|
| options/home-manager/home.file.<name>.source | Path of the source file or directory
|
| options/nixos/systemd.user.paths.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.user.paths.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/home-manager/xdg.cacheFile.<name>.force | Whether the target path should be unconditionally replaced
by the managed file source
|
| options/home-manager/xdg.stateFile.<name>.force | Whether the target path should be unconditionally replaced
by the managed file source
|
| options/nixos/services.borgbackup.jobs.<name>.paths | Path(s) to back up
|
| options/nixos/systemd.user.paths.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/networking.supplicant.<name>.configFile.path | External wpa_supplicant.conf configuration file
|
| options/nixos/users.users.<name>.cryptHomeLuks | Path to encrypted luks device that contains
the user's home directory.
|
| options/nixos/systemd.paths.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/home-manager/xdg.dataFile.<name>.source | Path of the source file or directory
|
| options/nixos/systemd.paths.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/services.cgit.<name>.scanPath | A path which will be scanned for repositories.
|
| options/nixos/services.frigate.settings.cameras.<name>.ffmpeg.inputs.*.path | Stream URL
|
| options/nixos/users.users.<name>.shell | The path to the user's shell
|
| options/nixos/users.users.<name>.pamMount | Attributes for user's entry in
pam_mount.conf.xml
|
| options/nixos/systemd.paths.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.paths.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/services.fedimintd.<name>.nginx.path_ws | Path to host the API on and forward to the daemon's api port
|
| options/nixos/services.fedimintd.<name>.nginx.path_ui | Path to host the built-in UI on and forward to the daemon's api port
|
| options/nixos/services.multipath.pathGroups.*.alias | The name of the multipath device
|
| options/nixos/systemd.paths.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/services.multipath.pathGroups.*.array | The DNS name of the storage array
|
| options/home-manager/programs.opencode.tools | Custom tools for opencode
|
| options/nixos/services.sympa.database.name | Database name
|
| options/home-manager/xdg.cacheFile.<name>.source | Path of the source file or directory
|
| options/home-manager/xdg.stateFile.<name>.source | Path of the source file or directory
|
| options/home-manager/xdg.configFile.<name>.force | Whether the target path should be unconditionally replaced
by the managed file source
|
| options/nixos/hardware.sata.timeout.drives.*.name | Drive name without the full path.
|
| options/nixos/systemd.paths.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/boot.initrd.secrets | Secrets to append to the initrd
|
| options/nixos/systemd.user.paths.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/systemd.user.paths.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/nixpkgs.flake.source | The path to the nixpkgs sources used to build the system
|
| options/nixos/systemd.paths.<name>.requisite | Similar to requires
|
| options/home-manager/services.podman.machines.<name>.rootful | Whether to run the machine in rootful mode
|
| options/darwin/nixpkgs.flake.source | The path to the nixpkgs sources used to build the system
|
| options/nixos/systemd.user.paths.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.user.paths.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/security.acme.certs.<name>.csr | Path to a certificate signing request to apply when fetching the certificate.
|
| options/nixos/users.extraUsers.<name>.cryptHomeLuks | Path to encrypted luks device that contains
the user's home directory.
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.path-regex | Regex pattern to match the GC root path.
|
| options/nixos/systemd.user.paths.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/home-manager/xdg.configFile.<name>.source | Path of the source file or directory
|
| options/nixos/systemd.user.paths.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/users.extraUsers.<name>.shell | The path to the user's shell
|
| options/home-manager/programs.opencode.agents | Custom agents for opencode
|
| options/nixos/users.extraUsers.<name>.pamMount | Attributes for user's entry in
pam_mount.conf.xml
|
| options/nixos/security.acme.certs.<name>.csrKey | Path to the private key to the matching certificate signing request.
|
| options/home-manager/programs.sftpman.mounts.<name>.mountDestPath | The path on the current machine where the remote path would be mounted.
|
| options/nixos/systemd.user.paths.<name>.requisite | Similar to requires
|
| options/nixos/fileSystems.<name>.depends | List of paths that should be mounted before this one
|
| options/home-manager/programs.powerline-go.pathAliases | Pairs of full-path and corresponding desired short name
|
| options/nixos/systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.user | The user of the file
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.path | Path to the socket for local or remote transports
|
| options/nixos/systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.group | The group of the file
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SecureSocketWithKey | This optional key is a variant of SockPathName
|
| options/nixos/systemd.paths.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/home-manager/programs.opencode.themes | Custom themes for opencode
|
| options/home-manager/programs.opencode.commands | Custom commands for opencode
|
| options/home-manager/programs.smug.projects.<name>.windows.*.root | Root path of window
|
| options/nixos/systemd.paths.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.paths.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.mode | The file access mode to use when creating this file or directory.
|
| options/nixos/services.buildkite-agents.<name>.hooksPath | Path to the directory storing the hooks
|
| options/darwin/services.buildkite-agents.<name>.hooksPath | Path to the directory storing the hooks
|
| options/nixos/systemd.paths.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/services.restic.backups.<name>.paths | Which paths to backup, in addition to ones specified via
dynamicFilesFrom
|
| options/nixos/boot.initrd.systemd.users.<name>.shell | The path to the user's shell in initrd.
|
| options/nixos/systemd.user.paths.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/home-manager/services.restic.backups.<name>.paths | Paths to back up, alongside those defined by the dynamicFilesFrom
option
|
| options/nixos/systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.age | Delete a file when it reaches a certain age
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockPathName | This optional key implies SockFamily is set to "Unix"
|
| options/nixos/boot.initrd.luks.devices.<name>.device | Path of the underlying encrypted block device.
|
| options/nixos/programs.dms-shell.plugins.<name>.src | Source of the plugin package or path
|
| options/nixos/boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.user | The user of the file
|
| options/nixos/systemd.user.paths.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.user.paths.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/home-manager/services.podman.builds.<name>.file | Path to a Containerfile which contains instructions to build the image.
|
| options/nixos/services.nsd.keys.<name>.keyFile | Path to the file which contains the actual base64 encoded
key
|
| options/nixos/boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.group | The group of the file
|
| options/nixos/power.ups.users.<name>.passwordFile | The full path to a file that contains the user's (clear text)
password
|
| options/home-manager/programs.smug.projects.<name>.windows.*.panes.*.root | Root path of pane
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SecureSocketWithKey | This optional key is a variant of SockPathName
|
| options/nixos/services.bluemap.maps.<name>.world | Path to world folder containing the dimension to render
|
| options/nixos/systemd.user.paths.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/home-manager/services.podman.builds.<name>.authFile | Path of the authentication file.
|
| options/home-manager/programs.rclone.remotes.<name>.mounts.<name>.mountPoint | A local file path specifying the location of the mount point.
|
| options/nixos/systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.type | The type of operation to perform on the file
|
| options/nixos/services.uhub.<name>.plugins.*.plugin | Path to plugin file.
|
| options/darwin/programs.vim.vimOptions.<name>.source | Path of the source file.
|
| options/nixos/security.wrappers.<name>.source | The absolute path to the program to be wrapped.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SecureSocketWithKey | This optional key is a variant of SockPathName
|
| options/nixos/services.multipath.devices.*.prio | The name of the path priority routine
|
| options/home-manager/programs.rclone.remotes.<name>.mounts | An attribute set mapping remote file paths to their corresponding mount
point configurations
|
| options/nixos/services.borgmatic.configurations.<name>.repositories.*.path | Path to the repository
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SecureSocketWithKey | This optional key is a variant of SockPathName
|
| options/home-manager/services.podman.images.<name>.certDir | Path of certificates (*.{crt,cert,key}) used to connect to registry.
|
| options/home-manager/services.podman.images.<name>.authFile | Path of the authentication file used to connect to registry.
|
| options/nixos/services.rspamd.locals.<name>.source | Path of the source file.
|
| options/home-manager/systemd.user.paths.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.path | Unix domain socket path to bind this listener to.
|
| options/nixos/services.bacula-sd.device.<name>.archiveDevice | The specified name-string gives the system file name of the storage
device managed by this storage daemon
|
| options/nixos/boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.mode | The file access mode to use when creating this file or directory.
|
| options/nixos/services.mautrix-meta.instances.<name>.dataDir | Path to the directory with database, registration, and other data for the bridge service
|
| options/nixos/boot.specialFileSystems.<name>.depends | List of paths that should be mounted before this one
|
| options/nixos/services.nginx.virtualHosts.<name>.root | The path of the web root directory.
|
| options/nixos/services.nebula.networks.<name>.ca | Path to the certificate authority certificate.
|
| options/darwin/programs.tmux.tmuxOptions.<name>.source | Path of the source file.
|
| options/nixos/environment.etc.<name>.source | Path of the source file.
|
| options/darwin/environment.etc.<name>.source | Path of the source file.
|
| options/home-manager/programs.sftpman.mounts.<name>.sshKey | Path to the SSH key to use for authentication
|
| options/nixos/boot.initrd.luks.devices.<name>.gpgCard.publicKey | Path to the Public Key.
|
| options/nixos/services.nebula.networks.<name>.key | Path or reference to the host key.
|
| options/nixos/fileSystems.<name>.encrypted.keyFile | Path to a keyfile used to unlock the backing encrypted
device
|
| options/nixos/services.bitcoind.<name>.configFile | The configuration file path to supply bitcoind.
|
| options/home-manager/i18n.inputMethod.fcitx5.themes.<name>.panelImage | Path to the SVG of the panel.
|
| options/nixos/services.nebula.networks.<name>.cert | Path to the host certificate.
|
| options/nixos/boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.age | Delete a file when it reaches a certain age
|
| options/nixos/image.repart.partitions.<name>.contents.<name>.source | Path of the source file.
|
| options/nixos/systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.argument | An argument whose meaning depends on the type of operation
|
| options/nixos/services.phpfpm.pools.<name>.socket | Path to the unix socket file on which to accept FastCGI requests.
This option is read-only and managed by NixOS.
|
| options/home-manager/programs.smug.projects.<name>.root | Root path in filesystem of the smug project
|
| options/nixos/services.snapper.configs.<name>.SUBVOLUME | Path of the subvolume or mount point
|
| options/nixos/services.asusd.auraConfigs.<name>.source | Path of the source file.
|
| options/nixos/programs.neovim.runtime.<name>.source | Path of the source file.
|
| options/nixos/services.redis.servers.<name>.unixSocket | The path to the socket to bind to.
|
| options/nixos/services.quicktun.<name>.privateKeyFile | Path to file containing local secret key in binary or hexadecimal form.
Not needed when services.quicktun..protocol is set to raw.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockPathName | This optional key implies SockFamily is set to "Unix"
|
| options/nixos/services.nginx.proxyCachePath.<name>.enable | Whether to enable this proxy cache path entry.
|
| options/home-manager/services.podman.volumes.<name>.device | The path of a device which is mounted for the volume.
|
| options/nixos/fileSystems.<name>.overlay.workdir | The path to the workdir
|
| options/nixos/boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.type | The type of operation to perform on the file
|
| options/nixos/services.bepasty.servers.<name>.dataDir | Path to the directory where the pastes will be saved to
|
| options/nixos/systemd.paths.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/home-manager/programs.sftpman.mounts.<name>.mountPoint | The remote path to mount.
|
| options/nixos/fileSystems.<name>.device | The device as passed to mount
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockPathName | This optional key implies SockFamily is set to "Unix"
|
| options/nixos/systemd.paths.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/services.authelia.instances.<name>.settings.log.file_path | File path where the logs will be written
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockPathName | This optional key implies SockFamily is set to "Unix"
|
| options/nixos/services.k3s.manifests.<name>.source | Path of the source .yaml file.
|
| options/nixos/boot.initrd.systemd.contents.<name>.target | Path of the symlink.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.controlPath | Specify path to the control socket used for connection sharing.
|
| options/nixos/services.jupyter.kernels.<name>.logo64 | Path to 64x64 logo png.
|
| options/nixos/services.jupyter.kernels.<name>.logo32 | Path to 32x32 logo png.
|
| options/nixos/boot.initrd.systemd.contents.<name>.source | Path of the source file.
|
| options/nixos/services.rke2.manifests.<name>.source | Path of the source .yaml file.
|
| options/nixos/services.sympa.settingsFile.<name>.source | Path of the source file.
|
| options/home-manager/programs.streamlink.plugins.<name>.src | Source of the custom plugin
|
| options/nixos/services.borgbackup.jobs.<name>.wrapper | Name of the wrapper that is installed into PATH
|
| options/nixos/services.bepasty.servers.<name>.workDir | Path to the working directory (used for config and pidfile)
|
| options/nixos/services.h2o.hosts.<name>.tls.identity.*.key-file | Path to key file
|
| options/nixos/services.prosody.virtualHosts.<name>.ssl.key | Path to the key file.
|
| options/nixos/systemd.user.paths.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/services.tahoe.nodes.<name>.sftpd.hostPublicKeyFile | Path to the SSH host public key.
|
| options/nixos/services.radicle.privateKeyFile | Absolute file path to an SSH private key,
usually generated by rad auth
|
| options/nixos/security.dhparams.params | Diffie-Hellman parameters to generate
|
| options/nixos/services.bacula-sd.director.<name>.tls.key | The path of a PEM encoded TLS private key
|
| options/nixos/services.bacula-fd.director.<name>.tls.key | The path of a PEM encoded TLS private key
|
| options/nixos/systemd.user.paths.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.argument | An argument whose meaning depends on the type of operation
|
| options/nixos/services.httpd.virtualHosts.<name>.sslServerKey | Path to server SSL certificate key.
|
| options/nixos/services.prosody.virtualHosts.<name>.ssl.cert | Path to the certificate file.
|
| options/nixos/services.neo4j.ssl.policies.<name>.revokedDir | Path to directory of CRLs (Certificate Revocation Lists) in
PEM format
|
| options/nixos/services.fedimintd.<name>.dataDir | Path to the data dir fedimintd will use to store its data
|
| options/nixos/services.neo4j.ssl.policies.<name>.privateKey | The name of private PKCS #8 key file for this policy to be found
in the baseDirectory, or the absolute path to
the key file
|
| options/home-manager/programs.obsidian.vaults.<name>.target | Path to target vault relative to the user's HOME.
|
| options/nixos/services.httpd.virtualHosts.<name>.sslServerCert | Path to server SSL certificate.
|
| options/nixos/services.borgbackup.repos.<name>.allowSubRepos | Allow clients to create repositories in subdirectories of the
specified path
|
| options/nixos/services.blockbook-frontend.<name>.certFile | To enable SSL, specify path to the name of certificate files without extension
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.extraFiles.<name>.source | Path of the source file or directory.
|
| options/home-manager/systemd.user.paths.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/nixos/services.sympa.domains.<name>.webLocation | URL path part of the web interface.
|
| options/nixos/boot.loader.grub.users.<name>.passwordFile | Specifies the path to a file containing the
clear text password for the account
|
| options/nixos/services.xserver.xkb.extraLayouts.<name>.typesFile | The path to the xkb types file
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.extraFiles.<name>.target | Path to target relative to the vault's directory.
|
| options/home-manager/programs.vscode.profiles.<name>.userMcp | Configuration written to Visual Studio Code's
mcp.json
|
| options/nixos/services.tahoe.nodes.<name>.sftpd.hostPrivateKeyFile | Path to the SSH host private key.
|
| options/nixos/services.tahoe.nodes.<name>.sftpd.accounts.file | Path to the accounts file.
|
| options/nixos/services.tinc.networks.<name>.rsaPrivateKeyFile | Path of the private RSA keyfile.
|
| options/nixos/services.rspamd.overrides.<name>.source | Path of the source file.
|
| options/darwin/system.activationScripts.<name>.source | Path of the source file.
|
| options/nixos/programs.nix-required-mounts.allowedPatterns.<name>.paths | A list of glob patterns, indicating which paths to expose to the sandbox
|
| options/nixos/services.kimai.sites.<name>.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/services.geth.<name>.authrpc.jwtsecret | Path to a JWT secret for authenticated RPC endpoint.
|
| options/nixos/services.httpd.virtualHosts.<name>.sslServerChain | Path to server SSL chain file.
|
| options/nixos/services.kmonad.keyboards.<name>.device | Path to the keyboard's device file.
|
| options/home-manager/programs.gradle.initScripts.<name>.source | Path of the init script file
|
| options/nixos/security.pam.services.<name>.u2fAuth | If set, users listed in
$XDG_CONFIG_HOME/Yubico/u2f_keys (or
$HOME/.config/Yubico/u2f_keys if XDG variable is
not set) are able to log in with the associated U2F key
|
| options/home-manager/accounts.email.accounts.<name>.folders.sent | Relative path of the sent mail folder.
|
| options/nixos/fileSystems.<name>.overlay.upperdir | The path to the upperdir
|
| options/nixos/services.neo4j.ssl.policies.<name>.trustedDir | Path to directory of X.509 certificates in PEM format for
trusted parties
|
| options/nixos/services.varnish.listen.*.address | If given an IP address, it can be a host name ("localhost"), an IPv4 dotted-quad
("127.0.0.1") or an IPv6 address enclosed in square brackets ("[::1]").
(VCL4.1 and higher) If given an absolute Path ("/path/to/listen.sock") or "@"
followed by the name of an abstract socket ("@myvarnishd") accept connections
on a Unix domain socket
|
| options/nixos/services.xserver.xkb.extraLayouts.<name>.compatFile | The path to the xkb compat file
|
| options/nixos/console.font | The font used for the virtual consoles
|
| options/nixos/services.slurm.controlAddr | Name that ControlMachine should be referred to in establishing a
communications path.
|
| options/home-manager/programs.rofi.theme | Name of theme or path to theme file in rasi format or attribute set with
theme configuration
|
| options/nixos/fileSystems.<name>.overlay.lowerdir | The list of path(s) to the lowerdir(s)
|
| options/nixos/services.fedimintd.<name>.nginx.config.root | The path of the web root directory.
|
| options/nixos/programs.uwsm.waylandCompositors.<name>.binPath | The wayland-compositor binary path that will be called by UWSM
|
| options/nixos/services.iodine.clients.<name>.passwordFile | Path to a file containing the password.
|
| options/home-manager/programs.vscode.profiles.<name>.userTasks | Configuration written to Visual Studio Code's
tasks.json
|
| options/nixos/systemd.services.<name>.enableDefaultPath | Whether to append a minimal default PATH environment variable to the service, containing common system utilities.
|
| options/home-manager/services.muchsync.remotes.<name>.remote.muchsyncPath | Specifies the path to muchsync on the server
|
| options/home-manager/accounts.email.accounts.<name>.folders.inbox | Relative path of the inbox mail.
|
| options/nixos/services.xserver.xkb.extraLayouts.<name>.symbolsFile | The path to the xkb symbols file
|
| options/nixos/systemd.shutdownRamfs.contents.<name>.target | Path of the symlink.
|
| options/darwin/environment.launchAgents.<name>.source | Path of the source file.
|
| options/nixos/services.drupal.sites.<name>.database.socket | Path to the unix socket file to use for authentication.
|
| options/home-manager/accounts.email.accounts.<name>.folders.trash | Relative path of the deleted mail folder.
|
| options/nixos/systemd.shutdownRamfs.contents.<name>.source | Path of the source file.
|
| options/nixos/services.beesd.filesystems.<name>.spec | Description of how to identify the filesystem to be duplicated by this
instance of bees
|
| options/nixos/services.dokuwiki.sites.<name>.extraConfigs | Path(s) to additional configuration files that are then linked to the 'conf' directory.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| options/nixos/boot.initrd.luks.devices.<name>.gpgCard.encryptedPass | Path to the GPG encrypted passphrase.
|
| options/nixos/power.ups.upsmon.monitor.<name>.passwordFile | The full path to a file containing the password from
upsd.users for accessing this UPS
|
| options/nixos/services.dokuwiki.sites.<name>.plugins | List of path(s) to respective plugin(s) which are copied into the 'plugin' directory.
These plugins need to be packaged before use, see example.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.certs | List of certificates to accept for authentication
|
| options/nixos/services.borgbackup.repos.<name>.user | The user borg serve is run as
|
| options/nixos/services.drupal.sites.<name>.virtualHost.sslServerCert | Path to server SSL certificate.
|
| options/nixos/services.openvpn.servers.<name>.config | Configuration of this OpenVPN instance
|
| options/nixos/services.calibre-web.dataDir | Where Calibre-Web stores its data
|
| options/nixos/services.rshim.index | Specify the index to create device path /dev/rshim<index>
|
| options/nixos/services.wordpress.sites.<name>.themes | Path(s) to respective theme(s) which are copied from the 'theme' directory.
These themes need to be packaged before use, see example.
|
| options/nixos/services.netbird.clients.<name>.login.setupKeyFile | A Setup Key file path used for automated login of the machine.
|
| options/nixos/services.netbird.tunnels.<name>.login.setupKeyFile | A Setup Key file path used for automated login of the machine.
|
| options/nixos/services.github-runners.<name>.extraPackages | Extra packages to add to PATH of the service to make them available to workflows.
|
| options/darwin/services.github-runners.<name>.extraPackages | Extra packages to add to PATH of the service to make them available to workflows.
|
| options/nixos/services.public-inbox.inboxes.<name>.inboxdir | The absolute path to the directory which hosts the public-inbox.
|
| options/home-manager/i18n.inputMethod.fcitx5.themes.<name>.highlightImage | Path to the SVG of the highlight.
|
| options/darwin/environment.userLaunchAgents.<name>.source | Path of the source file.
|
| options/nixos/services.pgbackrest.repos | An attribute set of repositories as described in:
https://pgbackrest.org/configuration.html#section-repository
Each repository defaults to set repo-host to the attribute's name
|
| options/home-manager/programs.lutris.runners.<name>.package | The package to use for this runner, nix will try to find the executable for this package
|
| options/nixos/services.buildkite-agents.<name>.tokenPath | The token from your Buildkite "Agents" page
|
| options/darwin/services.buildkite-agents.<name>.tokenPath | The token from your Buildkite "Agents" page
|
| options/home-manager/accounts.contact.accounts.<name>.khard.addressbooks | If provided, each item on this list will generate an
entry on khard configuration file as a separate addressbook
(vdir)
|
| options/home-manager/programs.anki.sync.usernameFile | Path to a file containing the sync account username.
|
| options/home-manager/accounts.email.accounts.<name>.folders.drafts | Relative path of the drafts mail folder.
|
| options/darwin/environment.launchDaemons.<name>.source | Path of the source file.
|
| options/nixos/services.borgbackup.repos.<name>.group | The group borg serve is run as
|
| options/nixos/systemd.user.services.<name>.enableDefaultPath | Whether to append a minimal default PATH environment variable to the service, containing common system utilities.
|
| options/nixos/services.snapserver.streams.<name>.location | For type pipe or file, the path to the pipe or file
|
| options/nixos/services.xserver.xkb.extraLayouts.<name>.keycodesFile | The path to the xkb keycodes file
|
| options/nixos/services.klipper.firmwares.<name>.serial | Path to serial port this printer is connected to
|
| options/darwin/programs.ssh.knownHosts.<name>.publicKeyFile | The path to the public key file for the host
|
| options/nixos/services.ghostunnel.servers.<name>.key | Path to certificate private key (PEM with private key)
|
| options/nixos/services.ghostunnel.servers.<name>.cert | Path to certificate (PEM with certificate chain)
|
| options/nixos/services.drupal.sites.<name>.virtualHost.sslServerChain | Path to server SSL chain file.
|
| options/nixos/security.apparmor.policies.<name>.profile | The profile file contents
|
| options/nixos/services.klipper.firmwares.<name>.package | Path to the built firmware package.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacerts | List of CA certificates to accept for
authentication
|
| options/home-manager/programs.irssi.networks.<name>.saslExternal | Enable SASL external authentication
|
| options/home-manager/programs.yazi.plugins | Lua plugins
|
| options/nixos/boot.loader.grub.users.<name>.hashedPasswordFile | Specifies the path to a file containing the password hash
for the account, generated with grub-mkpasswd-pbkdf2
|
| options/nixos/services.xserver.xkb.extraLayouts.<name>.geometryFile | The path to the xkb geometry file
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.pubkeys | List of raw public keys to accept for
authentication
|
| options/nixos/programs.tsmClient.servers.<name>.inclexcl | Text lines with include.* and exclude.* directives
to be used when sending files to the IBM TSM server,
or an absolute path pointing to a file with such lines.
|
| options/nixos/services.wordpress.sites.<name>.plugins | Path(s) to respective plugin(s) which are copied from the 'plugins' directory.
These plugins need to be packaged before use, see example.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.certs | List of certificate candidates to use for
authentication
|
| options/nixos/services.klipper.firmwares.<name>.configFile | Path to firmware config which is generated using klipper-genconf
|
| options/home-manager/programs.yazi.flavors | Pre-made themes
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.file | Absolute path to the certificate to load
|
| options/nixos/boot.specialFileSystems.<name>.device | The device as passed to mount
|
| options/nixos/services.jupyterhub.kernels.<name>.logo64 | Path to 64x64 logo png.
|
| options/nixos/services.jupyterhub.kernels.<name>.logo32 | Path to 32x32 logo png.
|
| options/nixos/services.tinc.networks.<name>.ed25519PrivateKeyFile | Path of the private ed25519 keyfile.
|
| options/nixos/services.opendkim.keyPath | The path that opendkim should put its generated private keys into
|
| options/nixos/services.gitlab-runner.services.<name>.buildsDir | Absolute path to a directory where builds will be stored
in context of selected executor (Locally, Docker, SSH).
|
| options/darwin/services.gitlab-runner.services.<name>.buildsDir | Absolute path to a directory where builds will be stored
in context of selected executor (Locally, Docker, SSH).
|
| options/nixos/services.public-inbox.settings.coderepo.<name>.dir | Path to a git repository
|
| options/nixos/services.vmalert.instances.<name>.settings.rule | Path to the files with alerting and/or recording rules.
|
| options/nixos/services.httpd.virtualHosts.<name>.documentRoot | The path of Apache's document root directory
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.file | Absolute path to the certificate to load
|
| options/nixos/services.spiped.config.<name>.source | Address on which spiped should listen for incoming
connections
|
| options/home-manager/services.podman.images.<name>.decryptionKeyFile | Path to key used for decryption of images.
|
| options/home-manager/programs.distrobox.containers | A set of containers and all its respective configurations
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.pubkeys | List of raw public key candidates to use for
authentication
|
| options/nixos/services.vdirsyncer.jobs.<name>.config.statusPath | vdirsyncer's status path
|
| options/home-manager/programs.vscode.profiles.<name>.userSettings | Configuration written to Visual Studio Code's
settings.json
|
| options/nixos/services.simplesamlphp.<name>.libDir | Path to the SimpleSAMLphp library directory.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.file | Absolute path to the certificate to load
|
| options/nixos/services.dokuwiki.sites.<name>.templates | List of path(s) to respective template(s) which are copied into the 'tpl' directory.
These templates need to be packaged before use, see example.
|
| options/nixos/programs.ssh.knownHosts.<name>.publicKeyFile | The path to the public key file for the host
|
| options/nixos/services.icingaweb2.libraryPaths | Libraries to add to the Icingaweb2 library path
|
| options/nixos/services.wordpress.sites.<name>.languages | List of path(s) to respective language(s) which are copied from the 'languages' directory.
|
| options/nixos/services.restic.backups.<name>.repositoryFile | Path to the file containing the repository location to backup to.
|
| options/nixos/services.buildkite-agents.<name>.privateSshKeyPath | OpenSSH private key
A run-time path to the key file, which is supposed to be provisioned
outside of Nix store.
|
| options/darwin/services.buildkite-agents.<name>.privateSshKeyPath | OpenSSH private key
A run-time path to the key file, which is supposed to be provisioned
outside of Nix store.
|
| options/nixos/services.ghostunnel.servers.<name>.cacert | Path to CA bundle file (PEM/X509)
|
| options/nixos/services.tor.relay.onionServices.<name>.secretKey | Secret key of the onion service
|
| options/nixos/services.restic.backups.<name>.createWrapper | Whether to generate and add a script to the system path, that has the same environment variables set
as the systemd service
|
| options/home-manager/services.restic.backups.<name>.createWrapper | Whether to generate and add a script to the system path, that has the
same environment variables set as the systemd service
|
| options/home-manager/services.podman.containers | Defines Podman container quadlet configurations.
|
| options/nixos/boot.initrd.compressor | The compressor to use on the initrd image
|
| options/nixos/services.angrr.settings.profile-policies.<name>.profile-paths | Paths to the Nix profile
|
| options/nixos/services.restic.backups.<name>.rcloneConfigFile | Path to the file containing rclone configuration
|
| options/nixos/services.easytier.instances.<name>.configFile | Path to easytier config file
|
| options/nixos/services.keepalived.vrrpScripts.<name>.script | (Path of) Script command to execute followed by args, i.e. cmd [args]...
|
| options/nixos/services.wordpress.sites.<name>.database.socket | Path to the unix socket file to use for authentication.
|
| options/home-manager/services.restic.backups.<name>.repositoryFile | Path to a file containing the repository location to backup to
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| options/nixos/virtualisation.oci-containers.containers | OCI (Docker) containers to run as systemd services.
|
| options/nixos/virtualisation.fileSystems.<name>.depends | List of paths that should be mounted before this one
|
| options/nixos/image.repart.partitions.<name>.nixStorePrefix | The prefix to use for store paths
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.sslServerCert | Path to server SSL certificate.
|
| options/nixos/services.openvpn.servers.<name>.authUserPass | This option can be used to store the username / password credentials
with the "auth-user-pass" authentication method
|
| options/nixos/services.patroni.namespace | Path within the configuration store where Patroni will keep information about the cluster.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.documentRoot | The path of Apache's document root directory
|
| options/nixos/security.acme.certs.<name>.environmentFile | Path to an EnvironmentFile for the cert's service containing any required and
optional environment variables for your selected dnsProvider
|
| options/nixos/services.httpd.extraModules | Additional Apache modules to be used
|
| options/nixos/services.sabnzbd.secretFiles | Path to a list of ini file containing confidential settings such as credentials
|
| options/nixos/services.nginx.virtualHosts.<name>.sslCertificate | Path to server SSL certificate.
|
| options/nixos/services.simplesamlphp.<name>.configDir | Path to the SimpleSAMLphp config directory.
|
| options/nixos/services.multipath.devices.*.vendor | Regular expression to match the vendor name
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.sslServerChain | Path to server SSL chain file.
|
| options/nixos/boot.binfmt.registrations.<name>.openBinary | Whether to pass the binary to the interpreter as an open
file descriptor, instead of a path.
|
| options/nixos/services.openbao.settings.listener.<name>.address | The TCP address or UNIX socket path to listen on.
|
| options/home-manager/programs.claude-code.agents | Custom agents for Claude Code
|
| options/nixos/services.nginx.virtualHosts.<name>.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.tarsnap.archives.<name>.keyfile | Set a specific keyfile for this archive
|
| options/nixos/services.wstunnel.clients.<name>.upgradePathPrefix | Use a specific HTTP path prefix that will show up in the upgrade
request to the wstunnel server
|
| options/home-manager/launchd.agents.<name>.config.QueueDirectories | Much like the WatchPaths option, this key will watch the paths for modifications
|
| options/nixos/services.nix-serve.secretKeyFile | The path to the file used for signing derivation data
|
| options/nixos/services.fcgiwrap.instances.<name>.socket.address | Socket address
|
| options/nixos/services.zeronsd.servedNetworks.<name>.settings.token | Path to a file containing the API Token for ZeroTier Central.
|
| options/nixos/services.gitea-actions-runner.instances.<name>.tokenFile | Path to an environment file, containing the TOKEN environment
variable, that holds a token to register at the configured
Gitea/Forgejo instance.
|
| options/nixos/services.openssh.knownHosts.<name>.publicKeyFile | The path to the public key file for the host
|
| options/darwin/networking.wg-quick.interfaces.<name>.privateKeyFile | Path to file containing this interface's private key.
|
| options/nixos/services.multipath.devices.*.product | Regular expression to match the product name
|
| options/nixos/services.klipper.firmwares.<name>.klipperFlashPackage | Path to the built klipper-flash package.
|
| options/home-manager/programs.claude-code.rules | Modular rule files for Claude Code
|
| options/home-manager/programs.neomutt.sidebar.shortPath | By default sidebar shows the full path of the mailbox, but
with this enabled only the relative name is shown.
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.cacert | The certificates may use a relative path from the swanctl
x509ca directory or an absolute path
|
| options/nixos/services.bacula-sd.director.<name>.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/nixos/services.bacula-fd.director.<name>.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/home-manager/programs.obsidian.defaultSettings.extraFiles.<name>.source | Path of the source file or directory.
|
| options/nixos/services.h2o.hosts.<name>.tls.identity.*.certificate-file | Path to certificate file
|
| options/nixos/services.authelia.instances.<name>.secrets.jwtSecretFile | Path to your JWT secret used during identity verificaton.
|
| options/nixos/services.mailpit.instances.<name>.database | Specify the local database filename to store persistent data
|
| options/home-manager/programs.obsidian.defaultSettings.extraFiles.<name>.target | Path to target relative to the vault's directory.
|
| options/home-manager/programs.vscode.profiles.<name>.keybindings | Keybindings written to Visual Studio Code's
keybindings.json
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.tokenFile | A file path where access tokens are stored.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.verify | Null or path to certificate to verify SSL against
|
| options/nixos/services.vault-agent.instances.<name>.settings.pid_file | Path to use for the pid file.
|
| options/nixos/services.ghostunnel.servers.<name>.keystore | Path to keystore (combined PEM with cert/key, or PKCS12 keystore)
|
| options/nixos/services.atuin.path | A path to prepend to all the routes of the server.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.authCert | Either a path to a certificate with a client certificate and
the key or a list of paths to the files with them.
|
| options/nixos/services.simplesamlphp.<name>.settings.baseurlpath | URL where SimpleSAMLphp can be reached.
|
| options/nixos/services.neo4j.ssl.policies.<name>.publicCertificate | The name of public X.509 certificate (chain) file in PEM format
for this policy to be found in the baseDirectory,
or the absolute path to the certificate file
|
| options/nixos/services.nextcloud-spreed-signaling.backends.<name>.secretFile | The path to the file containing the value for backends.<name>.secret
|
| options/nixos/virtualisation.fileSystems.<name>.encrypted.keyFile | Path to a keyfile used to unlock the backing encrypted
device
|
| options/nixos/services.btrbk.instances.<name>.snapshotOnly | Whether to run in snapshot only mode
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.postHook | Command to call for each item creation and modification
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.cssSnippets.*.source | Path of the source file.
|
| options/nixos/services.dysnomia.containers | An attribute set in which each key represents a container and each value an attribute set providing its configuration properties
|
| options/nixos/services.bacula-sd.director.<name>.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| options/nixos/services.bacula-fd.director.<name>.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| options/nixos/services.tlsrpt.reportd.settings.dbname | Path to the sqlite database.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.documentRoot | The path of Apache's document root directory
|
| options/nixos/services.maddy.ensureCredentials.<name>.passwordFile | Specifies the path to a file containing the
clear text password for the user.
|
| options/nixos/services.printing.cups-pdf.instances.<name>.settings.AnonDirName | path for anonymously created PDF files
|
| options/home-manager/programs.claude-code.commands | Custom commands for Claude Code
|
| options/nixos/services.gitlab-runner.services.<name>.registrationConfigFile | Absolute path to a file with environment variables
used for gitlab-runner registration with runner registration
tokens
|
| options/nixos/services.authelia.instances.<name>.secrets.oidcHmacSecretFile | Path to your HMAC secret used to sign OIDC JWTs.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.verify | Null or path to certificate to verify SSL against
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.tokenFile | A file path where access tokens are stored.
|
| options/nixos/services.armagetronad.servers.<name>.package | The armagetronad-dedicated package to use
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.authCert | Either a path to a certificate with a client certificate and
the key or a list of paths to the files with them.
|
| options/nixos/services.nginx.virtualHosts.<name>.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| options/nixos/services.fedimintd.<name>.nginx.config.sslCertificate | Path to server SSL certificate.
|
| options/darwin/launchd.agents.<name>.serviceConfig.QueueDirectories | Much like the WatchPaths option, this key will watch the paths for modifications
|
| options/nixos/services.neo4j.ssl.policies.<name>.baseDirectory | The mandatory base directory for cryptographic objects of this
policy
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.postHook | Command to call for each item creation and modification
|
| options/nixos/services.wstunnel.servers.<name>.settings.restrict-to | Restrictions on the connections that the server will accept
|
| options/home-manager/programs.irssi.networks.<name>.server.ssl.certificateFile | Path to a file containing the certificate used for
client authentication to the server.
|
| options/nixos/services.linux-enable-ir-emitter.device | IR camera device to depend on
|
| options/nixos/services.fedimintd.<name>.nginx.config.sslCertificateKey | Path to server SSL certificate key.
|
| options/home-manager/services.podman.settings.containers | containers.conf configuration
|
| options/nixos/services.borgbackup.jobs | Deduplicating backups using BorgBackup
|
| options/nixos/services.windmill.database.urlPath | Path to the file containing the database url windmill should connect to
|
| options/nixos/boot.kernelPatches | A list of additional patches to apply to the kernel
|
| options/nixos/boot.uki.name | Name of the UKI
|
| options/darwin/launchd.daemons.<name>.serviceConfig.QueueDirectories | Much like the WatchPaths option, this key will watch the paths for modifications
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.caPool | Path to the certificate authority (CA) for the certificate of your origin
|
| options/home-manager/programs.gemini-cli.context | An attribute set of context files to create in ~/.gemini/
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.QueueDirectories | Much like the WatchPaths option, this key will watch the paths for modifications
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.basicSecretFile | The basic secret to use for this service
|
| options/nixos/services.authelia.instances.<name>.secrets.sessionSecretFile | Path to your session secret
|
| options/nixos/services.syncthing.settings.devices.<name>.autoAcceptFolders | Automatically create or share folders that this device advertises at the default path
|
| options/home-manager/services.syncthing.settings.devices.<name>.autoAcceptFolders | Automatically create or share folders that this device advertises at the default path
|
| options/darwin/networking.wg-quick.interfaces.<name>.peers.*.presharedKeyFile | Optional, path to file containing the pre-shared key for this peer.
|
| options/nixos/services.consul-template.instances.<name>.settings.pid_file | Path to use for the pid file.
|
| options/nixos/virtualisation.containers.enable | This option enables the common /etc/containers configuration module.
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.passwordFile | Specifies the path to a file containing the
clear text password for the MQTT user
|
| options/nixos/virtualisation.containers.containersConf.cniPlugins | CNI plugins to install on the system.
|
| options/nixos/services.authelia.instances.<name>.secrets.oidcIssuerPrivateKeyFile | Path to your private key file used to encrypt OIDC JWTs.
|
| options/nixos/services.mautrix-meta.instances.<name>.registrationFile | Path to the yaml registration file of the appservice.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.copy_df | Whether to copy the DF bit to the outer IPv4 header in tunnel mode
|
| options/nixos/virtualisation.containers.containersConf.settings | containers.conf configuration
|
| options/nixos/boot.loader.grub.mirroredBoots.*.path | The path to the boot directory where GRUB will be written
|
| options/home-manager/accounts.email.accounts.<name>.smtp.tls.certificatesFile | Path to file containing certificate authorities that should
be used to validate the connection authenticity
|
| options/home-manager/accounts.email.accounts.<name>.imap.tls.certificatesFile | Path to file containing certificate authorities that should
be used to validate the connection authenticity
|
| options/nixos/users.users.<name>.name | The name of the user account
|
| options/darwin/users.users.<name>.name | The name of the user account
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.filter.program | Path to the external filter program.
|
| options/home-manager/xresources.path | Path where Home Manager should link the {file}`
|
| options/nixos/services.udev.path | Packages added to the PATH environment variable when
executing programs from Udev rules.
coreutils, gnu{sed,grep}, util-linux and config.systemd.package are
automatically included.
|
| options/nixos/services.fedimintd.<name>.nginx.config.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.priority | Priority of this policy
|
| options/nixos/virtualisation.fileSystems.<name>.overlay.workdir | The path to the workdir
|
| options/nixos/services.invoiceplane.sites.<name>.invoiceTemplates | List of path(s) to respective template(s) which are copied from the 'invoice_templates/pdf' directory.
These templates need to be packaged before use, see example.
|
| options/home-manager/gtk.font.name | The family name of the font within the package.
|
| options/darwin/services.github-runners.<name>.tokenFile | The full path to a file which contains either
- a fine-grained personal access token (PAT),
- a classic PAT
- or a runner registration token
Changing this option or the tokenFile’s content triggers a new runner registration
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.model | Name of the voice model to use
|
| options/nixos/systemd.services.<name>.confinement.packages | Additional packages or strings with context to add to the closure of
the chroot
|
| options/nixos/services.gitlab-runner.services.<name>.authenticationTokenConfigFile | Absolute path to a file containing environment variables used for
gitlab-runner registrations with runner authentication tokens
|
| options/nixos/virtualisation.fileSystems.<name>.device | The device as passed to mount
|
| options/nixos/services.archisteamfarm.bots.<name>.passwordFile | Path to a file containing the password
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.runtimePackages | Packages added to the adapter's PATH.
|
| options/nixos/services.tftpd.path | Where the tftp server files are stored.
|
| options/nixos/virtualisation.sharedDirectories.<name>.source | The path of the directory to share, can be a shell variable
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.ignore-prefixes | List of path prefixes to ignore
|
| options/nixos/services.bacula-sd.autochanger.<name>.changerCommand | The name-string specifies an external program to be called that will
automatically change volumes as required by Bacula
|
| options/nixos/boot.loader.grub.mirroredBoots.*.efiBootloaderId | The id of the bootloader to store in efi nvram
|
| options/nixos/services.suricata.settings.default-log-dir | The default logging directory
|
| options/nixos/services.leaps.path | Subdirectory used for reverse proxy setups
|
| options/nixos/services.authelia.instances.<name>.secrets.storageEncryptionKeyFile | Path to your storage encryption key.
|
| options/nixos/users.groups.<name>.name | The name of the group
|
| options/darwin/users.groups.<name>.name | The group's name
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.file | Absolute path to the certificate to load
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_log_config | The file for log configuration
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.hashedPasswordFile | Specifies the path to a file containing the
hashed password for the MQTT user
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.ignore-prefixes-in-home | Path prefixes to ignore under home directory
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters.*.actionValue | Argument passed to the filter action, e.g. a folder path.
|
| options/nixos/virtualisation.fileSystems.<name>.overlay.upperdir | The path to the upperdir
|
| options/nixos/services.github-runners.<name>.tokenFile | The full path to a file which contains either
- a fine-grained personal access token (PAT),
- a classic PAT
- or a runner registration token
Changing this option or the tokenFile’s content triggers a new runner registration
|
| options/nixos/virtualisation.fileSystems.<name>.overlay.lowerdir | The list of path(s) to the lowerdir(s)
|
| options/nixos/services.olivetin.path | Packages added to the service's PATH.
|
| options/home-manager/gtk.theme.name | The name of the theme within the package.
|
| options/nixos/services.gitlab.backup.path | GitLab path for backups.
|
| options/nixos/services.public-inbox.path | Additional packages to place in the path of public-inbox-mda,
public-inbox-watch, etc.
|
| options/darwin/services.gitlab-runner.services.<name>.registrationConfigFile | Absolute path to a file with environment variables
used for gitlab-runner registration
|
| options/nixos/services.tlsrpt.collectd.settings.socketname | Path at which the UNIX socket will be created.
|
| options/nixos/services.pipewire.wireplumber.extraScripts | Additional scripts for WirePlumber to be used by configuration files
|
| options/nixos/services.munin-node.extraPlugins | Additional Munin plugins to activate
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.tfc_padding | Pads ESP packets with additional data to have a consistent ESP packet
size for improved Traffic Flow Confidentiality
|
| options/nixos/services.pantalaimon-headless.instances.<name>.homeserver | The URI of the homeserver that the pantalaimon proxy should
forward requests to, without the matrix API path but including
the http(s) schema.
|
| options/nixos/users.extraUsers.<name>.name | The name of the user account
|
| options/home-manager/programs.git.includes.*.path | Path of the configuration file to include.
|
| options/nixos/services.traefik.environmentFiles | Files to load as an environment file just before Traefik starts
|
| options/nixos/services.public-inbox.settings.publicinbox.css | The local path name of a CSS file for the PSGI web interface.
|
| options/nixos/security.dhparams.path | Path to the directory in which Diffie-Hellman parameters will be
stored
|
| options/nixos/system.name | The name of the system used in the system.build.toplevel derivation
|
| options/nixos/services.thanos.rule.web.prefix-header | Name of HTTP request header used for dynamic prefixing of UI links and
redirects
|
| options/home-manager/services.dropbox.path | Where to put the Dropbox directory.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.encap | To enforce UDP encapsulation of ESP packets, the IKE daemon can fake the
NAT detection payloads
|
| options/nixos/virtualisation.containers.policy | Signature verification policy file
|
| options/home-manager/gtk.gtk3.font.name | The family name of the font within the package.
|
| options/home-manager/gtk.gtk2.font.name | The family name of the font within the package.
|
| options/home-manager/gtk.gtk4.font.name | The family name of the font within the package.
|
| options/nixos/users.extraGroups.<name>.name | The name of the group
|
| options/nixos/services.thanos.query.web.prefix-header | Name of HTTP request header used for dynamic prefixing of UI links and
redirects
|
| options/nixos/services.peertube-runner.instancesToRegister.<name>.registrationTokenFile | Path to a file containing a registration token for the PeerTube instance
|
| options/nixos/services.mediawiki.path | Extra packages to add to the PATH of phpfpm-pool.
|
| options/nixos/services.gitea.database.path | Path to the sqlite3 database file.
|
| options/nixos/systemd.paths | Definition of systemd path units; see systemd.path(5).
|
| options/nixos/services.matrix-synapse.settings.database.args.database | Name of the database when using the psycopg2 backend,
path to the database location when using sqlite3.
|
| options/home-manager/programs.zsh.history.path | History file location
|
| options/home-manager/programs.home-manager.path | The default path to use for Home Manager
|
| options/home-manager/gtk.gtk3.theme.name | The name of the theme within the package.
|
| options/home-manager/gtk.gtk4.theme.name | The name of the theme within the package.
|
| options/home-manager/gtk.gtk2.theme.name | The name of the theme within the package.
|
| options/home-manager/gtk.iconTheme.name | The name of the icon theme within the package.
|
| options/nixos/services.glance.environmentFile | Path to an environment file as defined in systemd.exec(5)
|
| options/nixos/services.crowdsec-firewall-bouncer.secrets.apiKeyPath | Path to the API key to authenticate with a local CrowdSec API
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.gtk.indicators | List of allowed indicator modules to use for the lightdm gtk
greeter panel
|
| options/nixos/services.doh-server.settings.path | HTTP path for resolve application
|
| options/nixos/virtualisation.containers.ociSeccompBpfHook.enable | Enable the OCI seccomp BPF hook
|
| options/nixos/virtualisation.containers.storage.settings | storage.conf configuration
|
| options/nixos/services.tarsnap.keyfile | The keyfile which associates this machine with your tarsnap
account
|
| options/nixos/services.nylon.<name>.name | The name of this nylon instance.
|
| options/nixos/services.matrix-synapse.settings.log_config | The file that holds the logging configuration.
|
| options/nixos/users.users.<name>.hashedPasswordFile | The full path to a file that contains the hash of the user's
password
|
| options/nixos/services.forgejo.database.path | Path to the sqlite3 database file.
|
| options/nixos/services.vikunja.database.path | Path to the sqlite3 database file.
|
| options/nixos/systemd.units.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/services.gammu-smsd.device.path | Device node or address of the phone
|
| options/home-manager/pam.yubico.authorizedYubiKeys.path | File path to write the authorized YubiKeys,
relative to HOME.
|
| options/nixos/systemd.user.paths | Definition of systemd per-user path units.
|
| options/nixos/virtualisation.containers.registries.block | List of blocked repositories.
|
| options/nixos/services.discourse.siteSettings | Discourse site settings
|
| options/nixos/security.pam.rssh.settings.auth_key_file | Path to file with trusted public keys in OpenSSH's authorized_keys format
|
| options/nixos/users.extraUsers.<name>.hashedPasswordFile | The full path to a file that contains the hash of the user's
password
|
| options/nixos/services.outline.oidcAuthentication.usernameClaim | Specify which claims to derive user information from
|
| options/nixos/services.kubernetes.path | Packages added to the services' PATH environment variable
|
| options/home-manager/services.imapnotify.path | List of packages to provide in PATH for the imapnotify service
|
| options/nixos/boot.kernel.enable | Whether to enable the Linux kernel
|
| options/nixos/virtualisation.containers.registries.search | List of repositories to search.
|
| options/nixos/services.keycloak.settings.hostname-backchannel-dynamic | Enables dynamic resolving of backchannel URLs,
including hostname, scheme, port and context path
|
| options/nixos/virtualisation.lxd.enable | This option enables lxd, a daemon that manages
containers
|
| options/nixos/systemd.timers.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/systemd.slices.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/services.offlineimap.path | List of derivations to put in Offlineimap's path.
|
| options/darwin/services.offlineimap.path | List of derivations to put in Offlineimap's path.
|
| options/nixos/services.bind.zones.<name>.name | Name of the zone.
|
| options/home-manager/xdg.desktopEntries.<name>.name | Specific name of the application.
|
| options/home-manager/gtk.gtk4.iconTheme.name | The name of the icon theme within the package.
|
| options/home-manager/gtk.gtk2.iconTheme.name | The name of the icon theme within the package.
|
| options/home-manager/gtk.gtk3.iconTheme.name | The name of the icon theme within the package.
|
| options/nixos/services.pppd.peers.<name>.name | Name of the PPP peer.
|
| options/nixos/services.multipath.devices.*.user_friendly_names | If set to "yes", using the bindings file /etc/multipath/bindings
to assign a persistent and unique alias to the multipath, in the
form of mpath
|
| options/nixos/virtualisation.containers.registries.insecure | List of insecure repositories.
|
| options/nixos/systemd.user.units.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/services.protonmail-bridge.path | List of derivations to put in protonmail-bridge's path.
|
| options/home-manager/xdg.desktopEntries.<name>.actions.<name>.name | Name of the action.
|
| options/nixos/services.aria2.settings.conf-path | Configuration file path.
|
| options/home-manager/gtk.cursorTheme.name | The name of the cursor theme within the package.
|
| options/nixos/services.thanos.sidecar.tsdb.path | Data directory of TSDB.
|
| options/nixos/services.hedgedoc.settings.path | Path to UNIX domain socket to listen on
If specified, host and port will be ignored.
|
| options/nixos/systemd.targets.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/systemd.sockets.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/systemd.user.slices.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/systemd.user.timers.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/services.multipath.pathGroups | This option allows you to define multipath groups as described
in http://christophe.varoqui.free.fr/usage.html.
|
| options/nixos/virtualisation.oci-containers.backend | The underlying Docker implementation to use.
|
| options/nixos/services.prometheus.exporters.wireguard.wireguardConfig | Path to the Wireguard Config to
add the peer's name to the stats of a peer
|
| options/nixos/image.repart.name | Name of the image
|
| options/nixos/services.stash.settings.stash.*.path | location of your media files
|
| options/nixos/services.multipath.pathGroups.*.wwid | The identifier for the multipath device
|
| options/nixos/services.multipath.pathGroups.*.fsType | Type of the filesystem
|
| options/nixos/services.rss-bridge.config.FileCache.path | Directory where to store cache files (if cache.type = "file").
|
| options/nixos/services.borgmatic.configurations.<name>.source_directories | List of source directories and files to backup
|
| options/darwin/services.aerospace.settings.enable-normalization-flatten-containers | Containers that have only one child are "flattened".
|
| options/nixos/services.i2pd.inTunnels.<name>.name | The endpoint name.
|
| options/nixos/services.frigate.settings.database.path | Path to the SQLite database used
|
| options/nixos/boot.initrd.systemd.paths | Definition of systemd path units.
|
| options/nixos/systemd.user.sockets.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/systemd.user.targets.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/systemd.services.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/services.reposilite.database.path | Path to the embedded database file
|
| options/nixos/services.i2pd.outTunnels.<name>.name | The endpoint name.
|
| options/home-manager/gtk.gtk4.cursorTheme.name | The name of the cursor theme within the package.
|
| options/home-manager/gtk.gtk2.cursorTheme.name | The name of the cursor theme within the package.
|
| options/home-manager/gtk.gtk3.cursorTheme.name | The name of the cursor theme within the package.
|
| options/nixos/virtualisation.lxc.enable | This enables Linux Containers (LXC), which provides tools
for creating and managing system or application containers
on Linux.
|
| options/nixos/services.gitDaemon.basePath | Remap all the path requests as relative to the given path
|
| options/nixos/services.athens.pathPrefix | Sets basepath for all routes.
|
| options/nixos/services.etcd.name | Etcd unique node name.
|
| options/home-manager/systemd.user.paths | Definition of systemd per-user path units
|
| options/nixos/hardware.alsa.controls.<name>.name | Name of the control, as it appears in alsamixer
|
| options/nixos/services.grafana.settings.database.path | Only applicable to sqlite3 database
|
| options/nixos/services.trafficserver.plugins.*.path | Path to plugin
|
| options/nixos/services.displayManager.dms-greeter.logs.path | File path where DMS greeter logs will be saved
|
| options/home-manager/home.sessionPath | Extra directories to prepend to PATH
|
| options/nixos/services.bitcoind.<name>.rpc.users.<name>.name | Username for JSON-RPC connections.
|
| options/nixos/security.pam.services.<name>.name | Name of the PAM service.
|
| options/nixos/services.headscale.settings.policy.path | If the mode is set to "file", the path to a
HuJSON file containing ACL policies.
|
| options/darwin/homebrew.casks.*.name | The name of the cask to install.
|
| options/darwin/homebrew.brews.*.name | The name of the formula to install.
|
| options/nixos/services.netbird.tunnels.<name>.name | Primary name for use (as a suffix) in:
- systemd service name,
- hardened user name and group,
- systemd
*Directory= names,
- desktop application identification,
|
| options/nixos/services.netbird.clients.<name>.name | Primary name for use (as a suffix) in:
- systemd service name,
- hardened user name and group,
- systemd
*Directory= names,
- desktop application identification,
|
| options/nixos/services.rspamd.workers.<name>.name | Name of the worker
|
| options/nixos/systemd.user.services.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/services.mailcatcher.http.path | Prefix to all HTTP paths.
|
| options/nixos/services.multipath.pathGroups.*.options | Options used to mount the file system
|
| options/nixos/services.mattermost.socket.path | Default location for the Mattermost control socket used by mmctl.
|
| options/nixos/services.hadoop.hdfs.datanode.dataDirs.*.path | Determines where on the local filesystem a data node should store its blocks.
|
| options/nixos/boot.enableContainers | Whether to enable support for NixOS containers.
|
| options/home-manager/home.pointerCursor.name | The cursor name within the package.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels.<name>.name | The unique name for THIS channel in THIS group
|
| options/darwin/system.defaults.dock.persistent-others.*.folder.path | Path to a folder to be added to the dock.
|
| options/nixos/virtualisation.xen.boot.bios.path | Path to the Xen multiboot binary used for BIOS booting
|
| options/nixos/services.hylafax.modems.<name>.name | Name of modem device,
will be searched for in /dev.
|
| options/nixos/services.frigate.settings.ffmpeg.path | Package providing the ffmpeg and ffprobe executables below the bin/ directory.
|
| options/nixos/virtualisation.xen.store.path | Path to the Xen Store Daemon
|
| options/nixos/users.defaultUserShell | This option defines the default shell assigned to user
accounts
|
| options/nixos/systemd.mounts.*.name | The name of this systemd unit, including its extension
|
| options/home-manager/programs.floorp.profiles.<name>.name | Profile name.
|
| options/home-manager/services.kanshi.profiles.<name>.name | Profile name
|
| options/home-manager/services.colima.profiles.<name>.name | The profile's name.
|
| options/nixos/services.tinc.networks.<name>.name | The name of the node which is used as an identifier when communicating
with the remote nodes in the mesh
|
| options/nixos/virtualisation.docker.enable | This option enables docker, a daemon that manages
linux containers
|
| options/nixos/boot.modprobeConfig.enable | Whether to enable modprobe config
|
| options/nixos/services.github-runners.<name>.name | Name of the runner to configure
|
| options/darwin/services.github-runners.<name>.name | Name of the runner to configure
|
| options/nixos/virtualisation.xen.efi.path | Path to xen.efi. pkgs.xen is patched to install the xen.efi file
on $boot/boot/xen.efi, but an unpatched Xen build may install it
somewhere else, such as $out/boot/efi/efi/nixos/xen.efi
|
| options/nixos/systemd.network.networks.<name>.name | The name of the network interface to match against.
|
| options/nixos/services.warpgate.settings.recordings.path | Path to store session recordings.
|
| options/home-manager/accounts.email.accounts.<name>.name | Unique identifier of the account
|
| options/nixos/services.i2pd.upnp.name | Name i2pd appears in UPnP forwardings list.
|
| options/nixos/services.mediatomb.mediaDirectories.*.path | Absolute directory path to the media directory to index.
|
| options/nixos/hardware.sane.brscan5.netDevices.<name>.name | The friendly name you give to the network device
|
| options/nixos/hardware.sane.brscan4.netDevices.<name>.name | The friendly name you give to the network device
|
| options/nixos/services.bacula-sd.name | Specifies the Name of the Storage daemon.
|
| options/nixos/services.grafana-image-renderer.settings.browser.path | Path to the executable of the chromium to use.
|
| options/home-manager/programs.papis.libraries.<name>.name | This library's name.
|
| options/nixos/services.headscale.settings.database.sqlite.path | Path to the sqlite3 database file.
|
| options/nixos/virtualisation.xen.boot.efi.path | Path to xen.efi. pkgs.xen is patched to install the xen.efi file
on $boot/boot/xen.efi, but an unpatched Xen build may install it
somewhere else, such as $out/boot/efi/efi/nixos/xen.efi
|
| options/nixos/services.grafana.provision.alerting.rules.path | Path to YAML rules configuration
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.name | The name of this group for this account
|
| options/home-manager/programs.kitty.font.name | The family name of the font within the package.
|
| options/darwin/homebrew.taps.*.name | When clone_target is unspecified, this is the name of a formula
repository to tap from GitHub using HTTPS
|
| options/nixos/services.kimai.sites.<name>.database.name | Database name.
|
| options/home-manager/programs.firefox.profiles.<name>.name | Profile name.
|
| options/nixos/services.druid.historical.segmentLocations.*.path | the path to store the segments
|
| options/darwin/services.aerospace.settings.enable-normalization-opposite-orientation-for-nested-containers | Containers that nest into each other must have opposite orientations.
|
| options/nixos/networking.useHostResolvConf | In containers, whether to use the
resolv.conf supplied by the host.
|
| options/nixos/services.k3s.autoDeployCharts.<name>.name | The name of the Helm chart
|
| options/nixos/services.i2pd.proto.bob.name | The endpoint name.
|
| options/nixos/services.i2pd.proto.sam.name | The endpoint name.
|
| options/nixos/services.rke2.autoDeployCharts.<name>.name | The name of the Helm chart
|
| options/nixos/services.kmonad.keyboards.<name>.name | Keyboard name.
|
| options/nixos/services.netbird.clients.<name>.user.name | A system user name for this client instance.
|
| options/nixos/services.netbird.tunnels.<name>.user.name | A system user name for this client instance.
|
| options/nixos/services.bacula-dir.name | The director name used by the system administrator
|
| options/darwin/users.users.<name>.uid | The user's UID.
|
| options/nixos/virtualisation.incus.enable | Whether to enable incusd, a daemon that manages containers and virtual machines
|
| options/home-manager/home.language.name | The language to use for personal names.
|
| options/nixos/services.buildkite-agents.<name>.name | The name of the agent as seen in the buildkite dashboard.
|
| options/darwin/services.buildkite-agents.<name>.name | The name of the agent as seen in the buildkite dashboard.
|
| options/nixos/services.bacula-fd.name | The client name that must be used by the Director when connecting
|
| options/home-manager/programs.fish.plugins.*.src | Path to the plugin folder
|
| options/nixos/services.akkoma.frontends.<name>.name | Akkoma frontend name.
|
| options/nixos/services.bcg.name | Name for the device
|
| options/nixos/services.matrix-synapse.settings.listeners.*.path | Unix domain socket path to bind this listener to.
|
| options/nixos/services.grafana.provision.dashboards.path | Path to YAML dashboard configuration
|
| options/nixos/services.send.redis.name | Name of the redis server
|
| options/nixos/services.suricata.settings.default-rule-path | Path in which suricata-update managed rules are stored by default.
|
| options/nixos/services.drupal.sites.<name>.database.name | Database name.
|
| options/nixos/services.postfix.masterConfig.<name>.name | The name of the service to run
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites.<name>.name | Name of the site.
|
| options/nixos/services.patroni.name | The name of the host
|
| options/nixos/services.i2pd.proto.http.name | The endpoint name.
|
| options/nixos/services.i2pd.proto.i2cp.name | The endpoint name.
|
| options/darwin/users.users.<name>.gid | The user's primary group.
|
| options/home-manager/services.cachix-agent.name | The unique agent name.
|
| options/home-manager/services.pizauth.accounts.<name>.name | Unique identifier of the account
|
| options/home-manager/accounts.contact.accounts.<name>.name | Unique identifier of the contact account
|
| options/nixos/services.v4l2-relayd.instances.<name>.name | The name of the instance.
|
| options/nixos/networking.modemmanager.fccUnlockScripts.*.path | Path to the unlock script
|
| options/nixos/services.cachix-agent.name | Agent name, usually same as the hostname
|
| options/nixos/services.snipe-it.mail.from.name | Mail "from" name.
|
| options/darwin/services.cachix-agent.name | Agent name, usually the same as the hostname.
|
| options/home-manager/programs.zsh.plugins.*.name | The name of the plugin.
|
| options/home-manager/services.walker.theme.name | The theme name.
|
| options/home-manager/programs.smug.projects.<name>.windows.*.name | Name of the tmux window;
|
| options/nixos/services.kasmweb.networkSubnet | The network subnet to use for the containers.
|
| options/nixos/services.grafana.provision.alerting.muteTimings.path | Path to YAML mute timings configuration
|
| options/home-manager/home.file.<name>.text | Text of the file
|
| options/nixos/boot.loader.generic-extlinux-compatible.mirroredBoots.*.path | The path to the boot directory where the extlinux-compatible
configuration files will be written.
|
| options/nixos/services.kmscon.fonts.*.name | Font name, as used by fontconfig.
|
| options/nixos/services.grafana.provision.datasources.path | Path to YAML datasource configuration
|
| options/home-manager/services.dunst.iconTheme.name | The name of the theme within the package.
|
| options/nixos/services.grafana.provision.alerting.policies.path | Path to YAML notification policies configuration
|
| options/home-manager/programs.fish.plugins.*.name | The name of the plugin.
|
| options/nixos/networking.nftables.tables.<name>.name | Table name.
|
| options/nixos/services.varnish.listen.*.name | Name is referenced in logs
|
| options/nixos/users.users.<name>.home | The user's home directory.
|
| options/nixos/services.borgmatic.settings.repositories.*.path | Path to the repository
|
| options/home-manager/accounts.calendar.accounts.<name>.name | Unique identifier of the calendar
|
| options/nixos/services.authelia.instances.<name>.name | Name is used as a suffix for the service name, user, and group
|
| options/nixos/services.dovecot2.mailboxes.<name>.name | The name of the mailbox.
|
| options/nixos/networking.interfaces.<name>.name | Name of the interface.
|
| options/nixos/programs.regreet.font.name | Name of the font to use for regreet.
|
| options/nixos/services.grafana.provision.alerting.contactPoints.path | Path to YAML contact points configuration
|
| options/nixos/services.prosody.muc.*.name | The name to return in service discovery responses for the MUC service itself
|
| options/home-manager/programs.librewolf.profiles.<name>.name | Profile name.
|
| options/nixos/services.zammad.redis.name | Name of the redis server
|
| options/nixos/services.grafana.provision.alerting.templates.path | Path to YAML templates configuration
|
| options/home-manager/programs.docker-cli.contexts.<name>.Name | Name of the Docker context
|
| options/nixos/services.snipe-it.mail.replyTo.name | Mail "reply-to" name.
|
| options/home-manager/programs.gnome-shell.theme.name | Name of the GNOME Shell theme.
|
| options/nixos/services.opengfw.rules.*.name | Name of the rule.
|
| options/home-manager/programs.rbenv.plugins.*.name | Name of the plugin.
|
| options/home-manager/programs.lapce.plugins.*.name | Name of the plugin.
|
| options/darwin/users.groups.<name>.gid | The group's GID.
|
| options/nixos/networking.vswitches.<name>.interfaces.<name>.name | Name of the interface
|
| options/home-manager/xdg.dataFile.<name>.text | Text of the file
|
| options/nixos/services.kanidm.serverSettings.online_backup.path | Path to the output directory for backups.
|
| options/nixos/users.users.<name>.homeMode | The user's home directory mode in numeric format
|
| options/home-manager/xdg.dataHome | Absolute path to directory holding application data
|
| options/nixos/services.crowdsec.name | Name of the machine when registering it at the central or local api.
|
| options/nixos/services.i2pd.proto.httpProxy.name | The endpoint name.
|
| options/nixos/boot.iscsi-initiator.name | Name of the iSCSI initiator to boot from
|
| options/nixos/services.kanidm.server.settings.online_backup.path | Path to the output directory for backups.
|
| options/nixos/users.users.<name>.uid | The account UID
|
| options/nixos/services.netbird.tunnels.<name>.service.name | A systemd service name to use (without .service suffix).
|
| options/nixos/services.netbird.clients.<name>.service.name | A systemd service name to use (without .service suffix).
|
| options/nixos/programs.regreet.theme.name | Name of the theme to use for regreet.
|
| options/nixos/services.postfix.settings.master.<name>.name | The name of the service to run
|
| options/nixos/hardware.deviceTree.name | The name of an explicit dtb to be loaded, relative to the dtb base
|
| options/nixos/services.sabnzbd.settings.servers.<name>.name | The name of the server
|
| options/nixos/services.mysql.ensureUsers.*.name | Name of the user to ensure.
|
| options/nixos/nix.nixPath | The default Nix expression search path, used by the Nix
evaluator to look up paths enclosed in angle brackets
(e.g. <nixpkgs>).
|
| options/home-manager/nix.nixPath | Adds new directories to the Nix expression search path
|
| options/nixos/services.tt-rss.database.name | Name of the existing database.
|
| options/nixos/services.mysql.galeraCluster.name | The logical name of the Galera cluster
|
| options/nixos/users.users.<name>.group | The user's primary group.
|
| options/home-manager/services.activitywatch.watchers.<name>.name | The name of the watcher
|
| options/home-manager/programs.zsh.zplug.plugins.*.name | The name of the plugin.
|
| options/nixos/services.prometheus.alertmanagerGotify.metrics.path | The path under which the metrics will be exposed.
|
| options/home-manager/programs.oh-my-posh.configFile | Path to a custom configuration path, can be json, yaml or toml.
|
| options/nixos/services.i2pd.proto.socksProxy.name | The endpoint name.
|
| options/nixos/boot.zfs.pools.<name>.devNodes | Name of directory from which to import ZFS device, this is passed to zpool import
as the value of the -d option
|
| options/nixos/services.heartbeat.name | Name of the beat
|
| options/nixos/services.mediawiki.name | Name of the wiki.
|
| options/nixos/services.teeworlds.name | Name of the server.
|
| options/nixos/services.multipath.devices.*.rr_weight | If set to priorities the multipath configurator will assign path weights
as "path prio * rr_min_io".
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.name | Name of the profile.
|
| options/nixos/services.wordpress.sites.<name>.database.name | Database name.
|
| options/nixos/services.openiscsi.name | Name of this iscsi initiator
|
| options/nixos/programs.extra-container.enable | Whether to enable extra-container, a tool for running declarative NixOS containers
without host system rebuilds
.
|
| options/home-manager/xdg.stateFile.<name>.text | Text of the file
|
| options/home-manager/xdg.cacheFile.<name>.text | Text of the file
|
| options/nixos/services.gitea.database.name | Database name.
|
| options/nixos/services.movim.database.name | Database name.
|
| options/home-manager/programs.zsh.plugins.*.src | Path to the plugin folder
|
| options/home-manager/programs.zsh.cdpath | List of paths to autocomplete calls to cd.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.auth.<name>.name | The name of this authentication provider
|
| options/nixos/programs.regreet.iconTheme.name | Name of the icon theme to use for regreet.
|
| options/nixos/services.mtr-exporter.jobs.*.name | Name of ICMP pinging job.
|
| options/home-manager/home.file.<name>.enable | Whether this file should be generated
|
| options/home-manager/launchd.agents.<name>.enable | Whether to enable ‹name›.
|
| options/nixos/services.h2o.hosts.<name>.serverName | Server name to be used for this virtual host
|
| options/nixos/services.snipe-it.database.name | Database name.
|
| options/home-manager/xdg.cacheHome | Absolute path to directory holding application caches
|
| options/home-manager/xdg.stateHome | Absolute path to directory holding application states
|
| options/nixos/services.keycloak.settings.http-relative-path | The path relative to / for serving
resources.
In versions of Keycloak using Wildfly (<17),
this defaulted to /auth
|
| options/home-manager/programs.thunderbird.profiles.<name>.feedAccounts.<name>.name | This feed account's name.
|
| options/nixos/services.multipath.devices.*.rr_min_io | Number of I/O requests to route to a path before switching to the next in the
same path group
|
| options/nixos/services.firezone.relay.name | The name of this gateway as shown in firezone
|
| options/nixos/services.oauth2-proxy.cookie.name | The name of the cookie that the oauth_proxy creates.
|
| options/nixos/services.i2pd.proto.i2pControl.name | The endpoint name.
|
| options/nixos/power.ups.ups.<name>.port | The serial port to which your UPS is connected. /dev/ttyS0 is
usually the first port on Linux boxes, for example.
|
| options/home-manager/xdg.desktopEntries.<name>.actions.<name>.exec | Program to execute, possibly with arguments.
|
| options/nixos/system.build.toplevel | This option contains the store path that typically represents a NixOS system
|
| options/home-manager/services.swaync.style | CSS style of the bar
|
| options/home-manager/programs.waybar.style | CSS style of the bar
|
| options/home-manager/programs.wleave.style | CSS style of wleave
|
| options/nixos/users.groups.<name>.gid | The group GID
|
| options/home-manager/services.podman.builds.<name>.tags | Name associated with the build
|
| options/nixos/services.wyoming.piper.servers.<name>.zeroconf.name | The advertised name for zeroconf discovery.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.actors.<name>.name | The name of this actor
|
| options/nixos/services.firezone.server.provision.accounts.<name>.groups.<name>.name | The name of this group
|
| options/nixos/services.tinc.networks.<name>.hosts | The name of the host in the network as well as the configuration for that host
|
| options/home-manager/xdg.desktopEntries.<name>.actions.<name>.icon | Icon to display in file manager, menus, etc.
|
| options/nixos/services.davis.database.name | Database name, only used when the databse is created locally.
|
| options/nixos/services.ente.api.settings.db.name | The database name
|
| options/nixos/services.hans.clients | Each attribute of this option defines a systemd service that
runs hans
|
| options/nixos/services.xinetd.services.*.name | Name of the service.
|
| options/nixos/users.extraUsers.<name>.homeMode | The user's home directory mode in numeric format
|
| options/nixos/services.i2pd.websocket.name | The endpoint name.
|
| options/nixos/services.monica.database.name | Database name.
|
| options/nixos/services.moodle.database.name | Database name.
|
| options/nixos/services.zammad.database.name | Database name.
|
| options/nixos/services.nsd.zones.<name>.notify | This primary server will notify all given secondary servers about
zone changes
|
| options/home-manager/programs.thunderbird.profiles.<name>.name | This profile's name.
|
| options/nixos/services.gitea-actions-runner.instances.<name>.name | The name identifying the runner instance towards the Gitea/Forgejo instance.
|
| options/nixos/services.docuseal.redis.name | Name of the redis server
|
| options/nixos/services.umurmur.settings.ca_path | Path to your SSL CA certificate.
|
| options/home-manager/xdg.dataFile.<name>.enable | Whether this file should be generated
|
| options/darwin/programs.vim.vimOptions.<name>.target | Name of symlink
|
| options/nixos/users.extraUsers.<name>.home | The user's home directory.
|
| options/nixos/services.syncthing.settings.devices.<name>.name | The name of the device.
|
| options/home-manager/services.syncthing.settings.devices.<name>.name | The name of the device.
|
| options/nixos/services.immich.database.name | The name of the immich database.
|
| options/nixos/services.tomcat.virtualHosts.*.name | name of the virtualhost
|
| options/home-manager/programs.distrobox.enableSystemdUnit | Whatever to enable a Systemd Unit that automatically rebuilds your
containers when changes are detected.
|
| options/nixos/services.wakapi.database.name | The name of the database to use for Wakapi.
|
| options/home-manager/programs.boxxy.rules.*.name | Unique identifier of the boxxy rule
|
| options/nixos/services.zabbixWeb.database.name | Database name.
|
| options/darwin/nix.registry.<name>.to | The flake reference from is rewritten to.
|
| options/home-manager/nix.registry.<name>.to | The flake reference to which from> is to be rewritten.
|
| options/nixos/services.rsync.jobs.<name>.user | The name of an existing user account under which the rsync process should run.
|
| options/nixos/services.armagetronad.servers.<name>.name | The name of this server.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.relayGroups.<name>.name | The name of this relay group
|
| options/home-manager/xdg.configFile.<name>.text | Text of the file
|
| options/nixos/security.isolate.cgRoot | Control group which subgroups are placed under
|
| options/home-manager/programs.wlogout.style | CSS style of the bar
|
| options/nixos/programs.regreet.cursorTheme.name | Name of the cursor theme to use for regreet.
|
| options/nixos/services.firezone.gui-client.name | The name of this client as shown in firezone
|
| options/nixos/systemd.automounts.*.name | The name of this systemd unit, including its extension
|
| options/nixos/hardware.deviceTree.overlays.*.name | Name of this overlay
|
| options/nixos/users.extraUsers.<name>.uid | The account UID
|
| options/nixos/fileSystems.<name>.noCheck | Disable running fsck on this filesystem.
|
| options/nixos/systemd.units.<name>.text | Text of this systemd unit.
|
| options/darwin/programs.tmux.tmuxOptions.<name>.target | Name of symlink
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.name | Adapter name that is used in the radicle-ci-broker configuration
|
| options/nixos/services.kanidm.serverSettings.db_path | Path to Kanidm database.
|
| options/darwin/environment.etc.<name>.target | Name of symlink
|
| options/nixos/services.forgejo.database.name | Database name.
|
| options/nixos/services.redmine.database.name | Database name.
|
| options/home-manager/programs.ranger.plugins.*.name | Name of the plugin linked to
$XDG_CONFIG_HOME/ranger/plugins/
|
| options/home-manager/programs.kakoune.config.hooks.*.name | The name of the hook
|
| options/darwin/users.users.<name>.isHidden | Whether to make the user account hidden.
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.name | Name used to derive peer unit name.
|
| options/nixos/services.ndppd.proxies.<name>.rules.<name>.network | This is the target address is to match against
|
| options/nixos/services.logstash.dataDir | A path to directory writable by logstash that it uses to store data
|
| options/home-manager/xdg.configHome | Absolute path to directory holding application configurations
|
| options/nixos/services.pdfding.database.name | PostgreSQL database name
|
| options/nixos/services.kanidm.server.settings.db_path | Path to Kanidm database.
|
| options/home-manager/xdg.cacheFile.<name>.enable | Whether this file should be generated
|
| options/home-manager/xdg.stateFile.<name>.enable | Whether this file should be generated
|
| options/nixos/services.rsync.jobs.<name>.group | The name of an existing user group under which the rsync process should run.
|
| options/nixos/users.extraUsers.<name>.group | The user's primary group.
|
| options/darwin/nix.registry.<name>.from | The flake reference to be rewritten.
|
| options/home-manager/nix.registry.<name>.from | The flake reference to be rewritten.
|
| options/nixos/services.multipath.devices.*.path_selector | The default path selector algorithm to use; they are offered by the kernel multipath target
|
| options/nixos/security.wrappers.<name>.program | The name of the wrapper program
|
| options/nixos/services.frr.pathd.enable | Whether to enable FRR pathd.
|
| options/nixos/services.autossh.sessions.*.name | Name of the local AutoSSH session
|
| options/darwin/services.autossh.sessions.*.name | Name of the local AutoSSH session
|
| options/home-manager/programs.pyradio.stations.*.name | Display name of the radio station.
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.Bonjour | This optional key can be used to request that the service be registered with the
mDNSResponder(8)
|
| options/nixos/services.firezone.gateway.name | The name of this gateway as shown in firezone
|
| options/nixos/services.iodine.clients | Each attribute of this option defines a systemd service that
runs iodine
|
| options/nixos/services.zabbixProxy.database.name | Database name.
|
| options/nixos/power.ups.ups.<name>.driver | Specify the program to run to talk to this UPS. apcsmart,
bestups, and sec are some examples.
|
| options/nixos/environment.etc.<name>.target | Name of symlink (relative to
/etc)
|
| options/nixos/services.firezone.server.provision.accounts.<name>.gatewayGroups.<name>.name | The name of this gateway group
|
| options/nixos/programs.neovim.runtime.<name>.target | Name of symlink
|
| options/home-manager/programs.ssh.matchBlocks.<name>.hostname | Specifies the real host name to log into.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.name | The name of this resource
|
| options/nixos/services.zammad.secretKeyBaseFile | The path to a file containing the
secret_key_base secret
|
| options/nixos/services.castopod.dataDir | The path where castopod stores all data
|
| options/nixos/services.multipath.devices.*.san_path_err_threshold | If set to a value greater than 0, multipathd will watch paths and check
how many times a path has been failed due to errors
|
| options/nixos/services.selfoss.database.name | Name of the existing database (has no effect if type is "sqlite").
|
| options/nixos/services.stash.settings.blobs_path | Path to blobs
|
| options/nixos/services.legit.settings.server.name | Server name.
|
| options/nixos/services.grafana.provision.dashboards.settings.providers.*.options.path | Path grafana will watch for dashboards
|
| options/nixos/security.agnos.settings.accounts.*.private_key_path | Path of the PEM-encoded private key for this account
|
| options/nixos/services.prometheus.pushgateway.web.telemetry-path | Path under which to expose metrics.
null will default to /metrics.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.cssSnippets.*.name | Name of the snippet.
|
| options/nixos/services.gitwatch.<name>.user | The name of services's user
|
| options/darwin/users.users.<name>.home | The user's home directory
|
| options/nixos/fileSystems.<name>.enable | Whether to enable the filesystem mount.
|
| options/nixos/security.doas.extraRules.*.cmd | The command the user is allowed to run
|
| options/nixos/services.thanos.rule.query.sd-files | Path to file that contain addresses of query peers
|
| options/nixos/security.acme.certs.<name>.domain | Domain to fetch certificate for (defaults to the entry name).
|
| options/nixos/services.corosync.nodelist.*.name | Node name
|
| options/darwin/users.users.<name>.createHome | Create the home directory when creating the user.
|
| options/darwin/users.users.<name>.description | A short description of the user account, typically the
user's full name
|
| options/nixos/services.dolibarr.database.name | Database name.
|
| options/nixos/services.castopod.database.name | Database name.
|
| options/nixos/services.agorakit.database.name | Database name.
|
| options/nixos/services.mastodon.database.name | Database name.
|
| options/nixos/services.peertube.database.name | Database name.
|
| options/nixos/services.pixelfed.database.name | Database name.
|
| options/nixos/services.windmill.database.name | Database name.
|
| options/nixos/services.zabbixServer.database.name | Database name.
|
| options/home-manager/wayland.windowManager.sway.config.focus.wrapping | Whether the window focus commands automatically wrap around the edge of containers
|
| options/nixos/services.journalbeat.name | Name of the beat
|
| options/nixos/services.nsd.zones.<name>.zoneStats | When set to something distinct to null NSD is able to collect
statistics per zone
|
| options/home-manager/xsession.pointerCursor.name | Alias of home.pointerCursor.name.
|
| options/nixos/services.cgit.<name>.user | User to run the cgit service as.
|
| options/nixos/users.extraGroups.<name>.gid | The group GID
|
| options/nixos/services.multipath.devices.*.rr_min_io_rq | Number of I/O requests to route to a path before switching to the next in the
same path group
|
| options/nixos/services.dawarich.database.name | The name of the dawarich database.
|
| options/nixos/services.cloudlog.database.name | MySQL database name.
|
| options/nixos/services.freshrss.database.name | Database name for FreshRSS.
|
| options/nixos/services.i2pd.inTunnels.<name>.port | Bind port for ‹name› endpoint.
|
| options/nixos/services.wyoming.satellite.name | Name of the satellite.
|
| options/nixos/power.ups.ups.<name>.summary | Lines which would be added inside ups.conf for handling this UPS.
|
| options/nixos/services.youtrack.statePath | Path were the YouTrack state is stored
|
| options/nixos/image.filePath | Path of the image, relative to $out in system.build.image
|
| options/nixos/services.prometheus.exporters.pve.configFile | Path to the service's config file
|
| options/nixos/services.invoiceplane.sites.<name>.database.name | Database name.
|
| options/home-manager/xsession.windowManager.i3.config.focus.wrapping | Whether the window focus commands automatically wrap around the edge of containers
|
| options/nixos/services.firezone.server.provision.accounts.<name>.name | The account name
|
| options/nixos/nix.registry.<name>.flake | The flake input from is rewritten to.
|
| options/darwin/nix.registry.<name>.flake | The flake input from is rewritten to.
|
| options/home-manager/nix.registry.<name>.flake | The flake input to which from> is to be rewritten.
|
| options/nixos/services.factorio.game-name | Name of the game as it will appear in the game listing.
|
| options/nixos/services.i2pd.outTunnels.<name>.port | Bind port for ‹name› endpoint.
|
| options/nixos/services.hadoop.yarn.nodemanager.useCGroups | Use cgroups to enforce resource limits on containers
|
| options/nixos/services.terraria.worldPath | The path to the world file (.wld) which should be loaded
|
| options/home-manager/xdg.configFile.<name>.enable | Whether this file should be generated
|
| options/nixos/users.users.<name>.extraGroups | The user's auxiliary groups.
|
| options/nixos/services.frr.pathd.options | Options for the FRR pathd daemon.
|
| options/nixos/nix.registry.<name>.to | The flake reference from is rewritten to
|
| options/nixos/users.users.<name>.enable | If set to false, the user account will not be created
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockNodeName | This optional key specifies the node to connect(2) or bind(2) to.
|
| options/home-manager/home.file.<name>.onChange | Shell commands to run when file has changed between
generations
|
| options/nixos/services.opengfw.rules.*.modifier.name | Name of the modifier.
|
| options/nixos/services.mongodb.dbpath | Location where MongoDB stores its files
|
| options/nixos/services.multipath.devices.*.failback | Tell multipathd how to manage path group failback
|
| options/home-manager/programs.rclone.remotes.<name>.mounts.<name>.logLevel | Set the log-level
|
| options/nixos/nix.buildMachines.*.sshKey | The path to the SSH private key with which to authenticate on
the build machine
|
| options/nixos/services.thanos.query.store.sd-files | Path to files that contain addresses of store API servers
|
| options/darwin/nix.buildMachines.*.sshKey | The path to the SSH private key with which to authenticate on
the build machine
|
| options/home-manager/nix.buildMachines.*.sshKey | The path to the SSH private key with which to authenticate on
the build machine
|
| options/home-manager/programs.rclone.remotes.<name>.mounts.<name>.enable | Whether to enable this mount.
|
| options/nixos/fileSystems.<name>.fsType | Type of the file system
|
| options/home-manager/wayland.windowManager.sway.config.workspaceLayout | The mode in which new containers on workspace level will
start.
|
| options/nixos/systemd.user.units.<name>.text | Text of this systemd unit.
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| options/home-manager/programs.rclone.remotes.<name>.mounts.<name>.autoMount | Whether to enable automatic mounting.
|
| options/nixos/ec2.zfs.datasets.<name>.mount | Where to mount this dataset.
|
| options/home-manager/programs.xplr.plugins | An attribute set of plugin paths to be added to the [package.path]https://www.lua.org/manual/5.4/manual.html#pdf-package.path of the ~/config/xplr/init.lua configuration file
|
| options/darwin/users.groups.<name>.members | The group's members.
|
| options/nixos/virtualisation.interfaces.<name>.name | Interface name
|
| options/nixos/services.github-runners.<name>.replace | Replace any existing runner with the same name
|
| options/darwin/services.github-runners.<name>.replace | Replace any existing runner with the same name
|
| options/nixos/services.anuko-time-tracker.database.name | Database name.
|
| options/home-manager/xsession.windowManager.i3.config.workspaceLayout | The mode in which new containers on workspace level will
start.
|
| options/nixos/services.nginx.virtualHosts.<name>.serverName | Name of this virtual host
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels.<name>.nearPattern | Name for where mail coming from the remote (far) mail server will end up
locally
|
| options/nixos/boot.loader.grub.font | Path to a TrueType, OpenType, or pf2 font to be used by Grub.
|
| options/nixos/boot.loader.grub.theme | Path to the grub theme to be used.
|
| options/home-manager/programs.vscode.nameShort | Override for package "short name", used for generating configuration
|
| options/nixos/services.cgit.<name>.group | Group to run the cgit service as.
|
| options/nixos/virtualisation.lxd.zfsSupport | Enables lxd to use zfs as a storage for containers
|
| options/home-manager/programs.pistol.associations.*.fpath | File path regex that this association should match.
|
| options/nixos/programs.tsmClient.servers.<name>.nodename | Target node name on the IBM TSM server.
|
| options/nixos/virtualisation.allInterfaces.<name>.name | Interface name
|
| options/nixos/services.geth.<name>.port | Port number Go Ethereum will be listening on, both TCP and UDP.
|
| options/nixos/boot.initrd.luks.devices.<name>.header | The name of the file or block device that
should be used as header for the encrypted device.
|
| options/home-manager/xdg.desktopEntries.<name>.genericName | Generic name of the application.
|
| options/home-manager/xdg.dataFile.<name>.onChange | Shell commands to run when file has changed between
generations
|
| options/nixos/virtualisation.vlans | Virtual networks to which the container or VM is connected
|
| options/home-manager/wayland.windowManager.sway.config.focus.forceWrapping | Whether to force focus wrapping in tabbed or stacked containers
|
| options/nixos/services.hebbot.botPasswordFile | A path to the password file for your bot
|
| options/nixos/services.immich.database.host | Hostname or address of the postgresql server
|
| options/home-manager/services.kanshi.settings.*.profile.name | Profile name
|
| options/nixos/nix.registry.<name>.from | The flake reference to be rewritten
|
| options/nixos/power.ups.users.<name>.upsmon | Add the necessary actions for a upsmon process to work
|
| options/nixos/services.bookstack.database.name | Database name.
|
| options/nixos/services.mediawiki.database.name | Database name.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels.<name>.extraConfig | Extra configuration lines to add to THIS channel's
configuration.
|
| options/nixos/users.users.<name>.createHome | Whether to create the home directory and ensure ownership as well as
permissions to match the user.
|
| options/nixos/services.k3s.manifests.<name>.target | Name of the symlink (relative to /var/lib/rancher/k3s/server/manifests)
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockFamily | This optional key can be used to specifically request that "IPv4" or "IPv6" socket(s) be created.
|
| options/nixos/swapDevices.*.device | Path of the device or swap file.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.Bonjour | This optional key can be used to request that the service be registered with the
mDNSResponder(8)
|
| options/nixos/services.nsd.zones.<name>.requestXFR | Format: [AXFR|UDP] <ip-address> <key-name | NOKEY>
|
| options/nixos/services.discourse.database.name | Discourse database name.
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockPathMode | This optional key specifies the mode of the socket
|
| options/nixos/security.acme.certs.<name>.s3Bucket | S3 bucket name to use for HTTP-01 based challenges
|
| options/home-manager/xsession.windowManager.i3.config.focus.forceWrapping | Whether to force focus wrapping in tabbed or stacked containers
|
| options/nixos/services.prometheus.remoteRead.*.name | Name of the remote read config, which if specified must be unique among remote read configs
|
| options/nixos/boot.initrd.luks.devices.<name>.keyFile | The name of the file (can be a raw device or a partition) that
should be used as the decryption key for the encrypted device
|
| options/nixos/services.rke2.manifests.<name>.target | Name of the symlink (relative to /var/lib/rancher/rke2/server/manifests)
|
| options/nixos/hardware.alsa.controls.<name>.card | Name of the PCM card to control (slave).
|
| options/nixos/services.openafsClient.cellServDB.<name>.*.dnsname | DNS full-qualified domain name of a database server
|
| options/nixos/services.openafsServer.cellServDB.<name>.*.dnsname | DNS full-qualified domain name of a database server
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.corePlugins.*.name | The plugin.
|
| options/nixos/services.mysql.initialDatabases.*.name | The name of the database to create.
|
| options/nixos/services.tahoe.nodes.<name>.nickname | The nickname of this Tahoe node.
|
| options/nixos/services.nylon.<name>.port | What port to listen for client requests, default is 1080.
|
| options/nixos/services.i2pd.inTunnels.<name>.enable | Whether to enable ‹name›.
|
| options/nixos/services.nix-store-gcs-proxy.<name>.bucketName | Name of Google storage bucket
|
| options/darwin/programs.ssh.knownHosts.<name>.hostNames | The set of system-wide known SSH hosts
|
| options/nixos/services.h2o.hosts.<name>.tls | TLS options for virtual host
|
| options/nixos/systemd.timers.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/systemd.slices.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/services.gemstash.settings.base_path | Path to store the gem files and the sqlite database
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.ssid | SSID to be used in IEEE 802.11 management frames.
|
| options/nixos/services.geth.<name>.http.apis | APIs to enable over WebSocket
|
| options/darwin/system.activationScripts.<name>.target | Name of symlink
|
| options/nixos/services.discourse.secretKeyBaseFile | The path to a file containing the
secret_key_base secret
|
| options/nixos/systemd.slices.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/systemd.timers.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/services.i2pd.outTunnels.<name>.enable | Whether to enable ‹name›.
|
| options/nixos/services.cgit.<name>.repos | cgit repository settings, see cgitrc(5)
|
| options/nixos/services.prometheus.remoteWrite.*.name | Name of the remote write config, which if specified must be unique among remote write configs
|
| options/nixos/services.bcg.rename | Rename nodes to different name.
|
| options/nixos/services.writefreely.admin.name | The name of the first admin user.
|
| options/nixos/services.cgit.<name>.nginx.virtualHost | VirtualHost to serve cgit on, defaults to the attribute name.
|
| options/nixos/virtualisation.podman.enable | This option enables Podman, a daemonless container engine for
developing, managing, and running OCI Containers on your Linux System
|
| options/nixos/nix.settings.extra-sandbox-paths | Directories from the host filesystem to be included
in the sandbox.
|
| options/darwin/nix.settings.extra-sandbox-paths | Directories from the host filesystem to be included
in the sandbox.
|
| options/home-manager/programs.hexchat.channels.<name>.realName | Real name
|
| options/nixos/services.chromadb.dbpath | Location where ChromaDB stores its files
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.Bonjour | This optional key can be used to request that the service be registered with the
mDNSResponder(8)
|
| options/nixos/services.nntp-proxy.users.<name>.username | Username
|
| options/nixos/services.connman.networkInterfaceBlacklist | Default blacklisted interfaces, this includes NixOS containers interfaces (ve).
|
| options/nixos/virtualisation.lxc.defaultConfig | Default config (default.conf) for new containers, i.e. for
network config
|
| options/nixos/services.cgit.<name>.enable | Whether to enable cgit.
|
| options/nixos/services.postgresql.ensureUsers.*.name | Name of the user to ensure.
|
| options/darwin/services.postgresql.ensureUsers.*.name | Name of the user to ensure.
|
| options/nixos/services.quicktun.<name>.privateKey | Local secret key in hexadecimal form.
This option is deprecated
|
| options/nixos/services.go-camo.sslKey | Path to TLS private key.
|
| options/nixos/services.multipath.devices.*.getuid_callout | (Superseded by uid_attribute) The default program and args to callout
to obtain a unique path identifier
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.Bonjour | This optional key can be used to request that the service be registered with the
mDNSResponder(8)
|
| options/home-manager/xdg.cacheFile.<name>.onChange | Shell commands to run when file has changed between
generations
|
| options/home-manager/xdg.stateFile.<name>.onChange | Shell commands to run when file has changed between
generations
|
| options/nixos/systemd.units.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/services.firezone.headless-client.name | The name of this client as shown in firezone
|
| options/home-manager/programs.superfile.pinnedFolders.*.name | Name that will be shown.
|
| options/nixos/services.stash.settings.plugins_path | Path to scrapers
|
| options/nixos/services.pretix.settings.database.name | Database name.
|
| options/nixos/services.h2o.hosts.<name>.acme | ACME options for virtual host.
|
| options/nixos/services.h2o.hosts.<name>.http | HTTP options for virtual host
|
| options/nixos/users.users.<name>.subGidRanges | Subordinate group ids that user is allowed to use
|
| options/nixos/users.users.<name>.subUidRanges | Subordinate user ids that user is allowed to use
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.group | Members of this group can access the control socket for this interface.
|
| options/nixos/services.netdata.configDir | Complete netdata config directory except netdata.conf
|
| options/nixos/services.supybot.configFile | Path to initial supybot config file
|
| options/nixos/services.geth.<name>.gcmode | Blockchain garbage collection mode.
|
| options/nixos/services.uhub.<name>.enable | Whether to enable hub instance.
|
| options/nixos/services.ndppd.proxies.<name>.rules.<name>.interface | Interface to use when method is iface.
|
| options/home-manager/programs.irssi.networks.<name>.channels.<name>.autoJoin | Whether to join this channel on connect.
|
| options/home-manager/xdg.desktopEntries.<name>.type | The type of the desktop entry.
|
| options/nixos/services.cntlm.username | Proxy account name, without the possibility to include domain name ('at' sign is interpreted literally).
|
| options/darwin/environment.launchAgents.<name>.target | Name of symlink
|
| options/nixos/systemd.timers.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/users.groups.<name>.members | The user names of the group members, added to the
/etc/group file.
|
| options/nixos/systemd.slices.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels.<name>.patterns | Instead of synchronizing just the mailboxes that
match the farPattern, use it as a prefix which is
not matched against the patterns, and is not affected by mailbox list
overrides.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.utf8Ssid | Whether the SSID is to be interpreted using UTF-8 encoding.
|
| options/nixos/systemd.units.<name>.aliases | Aliases of that unit.
|
| options/nixos/services.geth.<name>.http.port | Port number of Go Ethereum HTTP API.
|
| options/nixos/services.coder.tlsKey | The path to the TLS key.
|
| options/nixos/services.go-camo.sslCert | Path to TLS certificate.
|
| options/nixos/services.yarr.baseUrl | Base path of the service url.
|
| options/nixos/users.users.<name>.subUidRanges.*.count | Count of subordinate user ids
|
| options/nixos/users.users.<name>.subGidRanges.*.count | Count of subordinate group ids
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockServiceName | This optional key specifies the service on the node to connect(2) or bind(2) to.
|
| options/home-manager/programs.borgmatic.backups.<name>.consistency.checks.*.name | Name of consistency check to run.
|
| options/nixos/power.ups.users.<name>.actions | Allow the user to do certain things with upsd
|
| options/nixos/services.geth.<name>.enable | Whether to enable Go Ethereum Node.
|
| options/nixos/services.geth.<name>.extraArgs | Additional arguments passed to Go Ethereum.
|
| options/nixos/services.tinc.networks.<name>.hostSettings | The name of the host in the network as well as the configuration for that host
|
| options/nixos/services.tts.servers.<name>.model | Name of the model to download and use for speech synthesis
|
| options/nixos/hardware.alsa.cardAliases.<name>.driver | Name of the kernel module that provides the card.
|
| options/nixos/services.filesender.database.name | Database name.
|
| options/nixos/services.limesurvey.database.name | Database name.
|
| options/nixos/services.zoneminder.database.name | Name of database.
|
| options/nixos/services.rauc.slots.<name>.*.type | The type of the device.
|
| options/home-manager/programs.alot.tags.<name>.focus | How to display the tag when focused.
|
| options/home-manager/xdg.desktopEntries.<name>.exec | Program to execute, possibly with arguments.
|
| options/nixos/services.pgbackrest.stanzas.<name>.jobs.<name>.type | Backup type as described in:
https://pgbackrest.org/command.html#command-backup/category-command/option-type
|
| options/nixos/virtualisation.docker.enableOnBoot | When enabled dockerd is started on boot
|
| options/nixos/users.users.<name>.autoSubUidGidRange | Automatically allocate subordinate user and group ids for this user
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockPassive | This optional key specifies whether listen(2) or connect(2) should be called on the created file
descriptor
|
| options/nixos/boot.loader.grub.mirroredBoots.*.efiSysMountPoint | The path to the efi system mount point
|
| options/home-manager/services.fnott.configFile | Path to the configuration file read by fnott
|
| options/nixos/users.extraUsers.<name>.extraGroups | The user's auxiliary groups.
|
| options/nixos/fileSystems.<name>.label | Label of the device
|
| options/nixos/users.extraUsers.<name>.enable | If set to false, the user account will not be created
|
| options/nixos/services.multipath.devices.*.path_checker | The default method used to determine the paths state
|
| options/nixos/services.prometheus.exporters.pve.environmentFile | Path to the service's environment file
|
| options/nixos/services.szurubooru.database.name | Name of the PostgreSQL database.
|
| options/nixos/services.linkwarden.database.name | The name of the Linkwarden database.
|
| options/nixos/services.frr.pathd.extraOptions | Extra options to be appended to the FRR pathd daemon options.
|
| options/nixos/services.hadoop.yarn.nodemanager.resource.cpuVCores | Number of vcores that can be allocated for containers.
|
| options/nixos/virtualisation.docker.enableNvidia | Deprecated, please use hardware.nvidia-container-toolkit.enable instead
|
| options/nixos/virtualisation.podman.enableNvidia | Deprecated, please use hardware.nvidia-container-toolkit.enable instead
|
| options/nixos/services.nsd.zones.<name>.allowNotify | Listed primary servers are allowed to notify this secondary server
|
| options/nixos/hardware.sane.brscan4.netDevices.<name>.nodename | The node name of the device
|
| options/nixos/hardware.sane.brscan5.netDevices.<name>.nodename | The node name of the device
|
| options/nixos/services.hylafax.modems.<name>.type | Name of modem configuration file,
will be searched for in config
in the spooling area directory.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.mpd.dbFile | The path to MPD's database
|
| options/nixos/swapDevices.*.size | If this option is set, ‘device’ is interpreted as the
path of a swapfile that will be created automatically
with the indicated size in MiB (1024×1024 bytes).
|
| options/darwin/nix.nixPath | The default Nix expression search path, used by the Nix
evaluator to look up paths enclosed in angle brackets
(e.g. <nixpkgs>)
|
| options/home-manager/services.mpd.dbFile | The path to MPD's database
|
| options/nixos/services.i2pd.inTunnels.<name>.address | Bind address for ‹name› endpoint.
|
| options/home-manager/accounts.email.accounts.<name>.realName | Name displayed when sending mails.
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters.*.name | Name for the filter.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels.<name>.farPattern | IMAP4 patterns for which mailboxes on the remote mail server to sync
|
| options/nixos/services.akkoma.config.":pleroma".":instance".name | Instance name.
|
| options/nixos/services.mattermost.database.name | Local Mattermost database name.
|
| options/nixos/systemd.slices.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.timers.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/services.uhub.<name>.enableTLS | Whether to enable TLS support.
|
| options/home-manager/accounts.email.accounts.<name>.notmuch.neomutt.virtualMailboxes.*.name | Name to display
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.dpi | Output DPI configuration.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.dpi | Output DPI configuration.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockNodeName | This optional key specifies the node to connect(2) or bind(2) to.
|
| options/nixos/services.hadoop.yarn.nodemanager.openFirewall | Open firewall ports for nodemanager
|
| options/nixos/services.hedgedoc.settings.urlPath | URL path for the website
|
| options/nixos/hardware.alsa.controls.<name>.device | Name of the PCM device to control (slave).
|
| options/nixos/services.nginx.proxyCachePath.<name>.keysZoneName | Set name to shared memory zone.
|
| options/darwin/environment.userLaunchAgents.<name>.target | Name of symlink
|
| options/nixos/environment.pathsToLink | List of directories to be symlinked in /run/current-system/sw.
|
| options/darwin/environment.pathsToLink | List of directories to be symlinked in /run/current-system/sw.
|
| options/darwin/users.users.<name>.shell | The user's shell
|
| options/nixos/services.i2pd.outTunnels.<name>.address | Bind address for ‹name› endpoint.
|
| options/nixos/services.postfix.masterConfig.<name>.command | A program name specifying a Postfix service/daemon process
|
| options/nixos/services.homebridge.uiSettings.name | Name of the homebridge UI platform
|
| options/nixos/hardware.printers.ensurePrinters.*.name | Name of the printer / printer queue
|
| options/nixos/services.pretalx.settings.database.name | Database name.
|
| options/darwin/launchd.agents.<name>.script | Shell commands executed as the service's main process.
|
| options/home-manager/xdg.desktopEntries.<name>.icon | Icon to display in file manager, menus, etc.
|
| options/home-manager/programs.fish.binds.<name>.mode | Specify the bind mode that the bind is used in
|
| options/nixos/services.scrutiny.settings.web.listen.basepath | If Scrutiny will be behind a path prefixed reverse proxy, you can override this
value to serve Scrutiny on a subpath.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.mode | Output resolution.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.rate | Output framerate.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.mode | Output resolution.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.rate | Output framerate.
|
| options/nixos/systemd.targets.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/systemd.sockets.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/services.epgstation.database.name | Name of the MySQL database that holds EPGStation's data.
|
| options/nixos/services.metricbeat.settings.name | Name of the beat
|
| options/nixos/services.confd.confDir | The path to the confd configs.
|
| options/nixos/services.coder.tlsCert | The path to the TLS certificate.
|
| options/nixos/services.ttyd.certFile | SSL certificate file path.
|
| options/nixos/services.rustus.url | url path for uploads
|
| options/nixos/services.ttyd.caFile | SSL CA file path for client certificate verification.
|
| options/nixos/systemd.mounts.*.what | Absolute path of device node, file or other resource. (Mandatory)
|
| options/nixos/services.dawarich.database.host | Hostname or address of the postgresql server
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockProtocol | This optional key specifies the protocol to be passed to socket(2)
|
| options/darwin/environment.launchDaemons.<name>.target | Name of symlink
|
| options/nixos/services.grafana.settings.database.name | The name of the Grafana database.
|
| options/nixos/systemd.user.units.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/services.hadoop.yarn.nodemanager.resource.memoryMB | Amount of physical memory, in MB, that can be allocated for containers.
|
| options/nixos/services.keycloak.database.name | Database name to use when connecting to an external or
manually provisioned database; has no effect when a local
database is automatically provisioned
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| options/nixos/fileSystems.<name>.mountPoint | Location where the file system will be mounted
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.index | Adds index directive.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/systemd.sockets.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/systemd.targets.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/services.ndppd.proxies.<name>.rules.<name>.method | static: Immediately answer any Neighbor Solicitation Messages
(if they match the IP rule).
iface: Forward the Neighbor Solicitation Message through the specified
interface and only respond if a matching Neighbor Advertisement
Message is received.
auto: Same as iface, but instead of manually specifying the outgoing
interface, check for a matching route in /proc/net/ipv6_route.
|
| options/home-manager/services.podman.images.<name>.username | Username used to connect to registry.
|
| options/nixos/services.borgbackup.jobs.<name>.archiveBaseName | How to name the created archives
|
| options/nixos/services.kanidm.unixSettings.hsm_pin_path | Path to a HSM pin.
|
| options/nixos/systemd.timers.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/systemd.slices.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/systemd.units.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.crtc | Output video display controller.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.crtc | Output video display controller.
|
| options/nixos/systemd.user.timers.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/systemd.user.slices.<name>.wants | Start the specified units when this unit is started.
|
| options/home-manager/xdg.configFile.<name>.onChange | Shell commands to run when file has changed between
generations
|
| options/nixos/users.extraUsers.<name>.createHome | Whether to create the home directory and ensure ownership as well as
permissions to match the user.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.module | Optional PKCS#11 module name.
|
| options/nixos/services.bacula-sd.director.<name>.tls.verifyPeer | Verify peer certificate
|
| options/nixos/services.bacula-fd.director.<name>.tls.verifyPeer | Verify peer certificate
|
| options/nixos/services.httpd.virtualHosts.<name>.locations.<name>.index | Adds DirectoryIndex directive
|
| options/nixos/services.httpd.virtualHosts.<name>.locations.<name>.alias | Alias directory for requests
|
| options/nixos/systemd.user.timers.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/systemd.user.slices.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/services.netbird.clients | Attribute set of NetBird client daemons, by default each one will:
- be manageable using dedicated tooling:
netbird-<name> script,
NetBird - netbird-<name> graphical interface when appropriate (see ui.enable),
- run as a
netbird-<name>.service,
- listen for incoming remote connections on the port
51820 (openFirewall by default),
- manage the
netbird-<name> wireguard interface,
- use the /var/lib/netbird-/config.json configuration file,
- override /var/lib/netbird-/config.json with values from /etc/netbird-/config.d/*.json,
- (
hardened) be locally manageable by netbird-<name> system group,
With following caveats:
- multiple daemons will interfere with each other's DNS resolution of
netbird.cloud, but
should remain fully operational otherwise
|
| options/nixos/services.step-ca.intermediatePasswordFile | Path to the file containing the password for the intermediate
certificate private key.
Make sure to use a quoted absolute path instead of a path literal
to prevent it from being copied to the globally readable Nix
store.
|
| options/nixos/services.hydra.logo | Path to a file containing the logo of your Hydra instance.
|
| options/home-manager/services.skhd.outLogFile | Absolute path to log all stdout output.
|
| options/nixos/services.cgit.<name>.package | The cgit package to use.
|
| options/nixos/services.geth.<name>.package | The geth package to use.
|
| options/nixos/services.uhub.<name>.plugins | Uhub plugin configuration.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.tryFiles | Adds try_files directive.
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites.<name>.url | Start URL of the site.
|
| options/nixos/nix.registry.<name>.exact | Whether the from reference needs to match exactly
|
| options/darwin/nix.registry.<name>.exact | Whether the from reference needs to match exactly
|
| options/home-manager/nix.registry.<name>.exact | Whether the from reference needs to match exactly
|
| options/nixos/systemd.timers.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.slices.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/home-manager/launchd.agents.<name>.config | Define a launchd job
|
| options/nixos/fileSystems.<name>.encrypted.label | Label of the unlocked encrypted device
|
| options/nixos/systemd.timers.<name>.aliases | Aliases of that unit.
|
| options/nixos/systemd.slices.<name>.aliases | Aliases of that unit.
|
| options/nixos/services.quicktun.<name>.publicKey | Remote public key in hexadecimal form.
Not needed when services.quicktun..protocol is set to raw.
|
| options/nixos/services.mpd.settings | Configuration for MPD
|
| options/nixos/services.kanidm.unix.settings.hsm_pin_path | Path to a HSM pin.
|
| options/nixos/users.users.<name>.useDefaultShell | If true, the user's shell will be set to
users.defaultUserShell.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.apIsolate | Isolate traffic between stations (clients) and prevent them from
communicating with each other.
|
| options/nixos/services.stash.settings.scrapers_path | Path to scrapers
|
| options/nixos/services.nginx.upstreams.<name>.servers.<name>.backup | Marks the server as a backup server
|
| options/nixos/services.h2o.hosts.<name>.host | Set the host address for this virtual host
|
| options/nixos/users.users.<name>.packages | The set of packages that should be made available to the user
|
| options/darwin/users.users.<name>.packages | The set of packages that should be made availabe to the user
|
| options/nixos/services.nylon.<name>.enable | Enables nylon as a running service upon activation.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.gamma | Output gamma configuration.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.gamma | Output gamma configuration.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockNodeName | This optional key specifies the node to connect(2) or bind(2) to.
|
| options/nixos/security.acme.certs.<name>.group | Group running the ACME client.
|
| options/home-manager/programs.fish.binds.<name>.erase | Whether to enable remove bind.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.logLevel | Levels (minimum value for logged events):
0 = verbose debugging
1 = debugging
2 = informational messages
3 = notification
4 = warning
|
| options/nixos/systemd.targets.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.sockets.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockFamily | This optional key can be used to specifically request that "IPv4" or "IPv6" socket(s) be created.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.module | Optional PKCS#11 module name.
|
| options/nixos/services.znapzend.zetup.<name>.destinations.<name>.label | Label for this destination
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockPathMode | This optional key specifies the mode of the socket
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockNodeName | This optional key specifies the node to connect(2) or bind(2) to.
|
| options/nixos/services.h2o.hosts.<name>.tls.port | Override the default TLS port for this virtual host.
|
| options/nixos/systemd.targets.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/systemd.sockets.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/services.llama-cpp.model | Model path.
|
| options/nixos/services.murmur.sslCa | Path to your SSL CA certificate.
|
| options/nixos/services.ttyd.indexFile | Custom index.html path
|
| options/nixos/services.murmur.sslKey | Path to your SSL key.
|
| options/home-manager/accounts.email.accounts.<name>.userName | The server username of this account
|
| options/nixos/systemd.user.timers.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.user.slices.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/services.multipath.devices.*.no_path_retry | Specify what to do when all paths are down
|
| options/nixos/environment.etc.<name>.user | User name of file owner
|
| options/nixos/programs.tsmClient.servers.<name>.servername | Local name of the IBM TSM server,
must not contain space or more than 64 chars.
|
| options/nixos/boot.initrd.extraFiles.<name>.source | The object to make available inside the initrd.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| options/nixos/fileSystems.<name>.autoFormat | If the device does not currently contain a filesystem (as
determined by blkid), then automatically
format it with the filesystem type specified in
fsType
|
| options/nixos/services.openvpn.servers | Each attribute of this option defines a systemd service that
runs an OpenVPN instance
|
| options/nixos/boot.initrd.systemd.users.<name>.uid | ID of the user in initrd.
|
| options/home-manager/xdg.desktopEntries.<name>.mimeType | The MIME type(s) supported by this application.
|
| options/nixos/users.users.<name>.subUidRanges.*.startUid | Start of the range of subordinate user ids that user is
allowed to use.
|
| options/nixos/users.users.<name>.subGidRanges.*.startGid | Start of the range of subordinate group ids that user is
allowed to use.
|
| options/nixos/services.forgejo.secrets | This is a small wrapper over systemd's LoadCredential
|
| options/nixos/services.fedimintd.<name>.nginx.config.serverName | Name of this virtual host
|
| options/nixos/services.awstats.configs.<name>.domain | The domain name to collect stats for.
|
| options/nixos/services.nsd.zones.<name>.dnssec | Whether to enable DNSSEC.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| options/nixos/systemd.user.slices.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/systemd.user.timers.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/services.bitcoind.<name>.rpc.users.<name>.passwordHMAC | Password HMAC-SHA-256 for JSON-RPC connections
|
| options/nixos/systemd.user.units.<name>.aliases | Aliases of that unit.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.macDeny | Specifies the MAC addresses to deny if macAcl is set to "deny" or "radius"
|
| options/nixos/networking.vlans.<name>.id | The vlan identifier
|
| options/nixos/services.i2pd.dataDir | Alternative path to storage of i2pd data (RI, keys, peer profiles, ...)
|
| options/nixos/services.nntp-proxy.sslKey | Proxy ssl key path
|
| options/nixos/services.tox-node.keysFile | Path to the file where DHT keys are stored.
|
| options/nixos/services.xrdp.sslKey | ssl private key path
A self-signed certificate will be generated if file not exists.
|
| options/home-manager/home.homeDirectory | The user's home directory
|
| options/nixos/services.httpd.virtualHosts.<name>.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.scale.y | Vertical scaling factor/pixels.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.scale.x | Horizontal scaling factor/pixels.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.scale.x | Horizontal scaling factor/pixels.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.scale.y | Vertical scaling factor/pixels.
|
| options/home-manager/accounts.email.accounts.<name>.neomutt.mailboxName | Use a different name as mailbox name
|
| options/nixos/networking.nftables.enable | Whether to enable nftables and use nftables based firewall if enabled.
nftables is a Linux-based packet filtering framework intended to
replace frameworks like iptables
|
| options/nixos/services.kubernetes.apiserver.allowPrivileged | Whether to allow privileged containers on Kubernetes.
|
| options/home-manager/programs.alot.tags.<name>.normal | How to display the tag when unfocused
|
| options/home-manager/programs.fish.binds.<name>.setsMode | Change current mode after bind is executed
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.enable | Whether to enable the output.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.rotate | Output rotate configuration.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.enable | Whether to enable the output.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.rotate | Output rotate configuration.
|
| options/nixos/services.writefreely.database.name | The name of the database to store data in.
|
| options/nixos/networking.sits.<name>.dev | The underlying network device on which the tunnel resides.
|
| options/darwin/launchd.agents.<name>.command | Command executed as the service's main process.
|
| options/nixos/services.multipath.enable | Whether to enable the device mapper multipath (DM-MP) daemon.
|
| options/nixos/services.nsd.zones.<name>.data | The actual zone data
|
| options/nixos/users.extraUsers.<name>.subUidRanges | Subordinate user ids that user is allowed to use
|
| options/nixos/users.extraUsers.<name>.subGidRanges | Subordinate group ids that user is allowed to use
|
| options/darwin/services.emacs.additionalPath | This option specifies additional PATH that the emacs daemon would have
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.module | Optional PKCS#11 module name.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.extraFiles.<name>.text | Text of the file.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.hotkeys.<name>.*.key | The hotkey.
|
| options/home-manager/fonts.fontconfig.configFile.<name>.label | Label to use for the name of the config file.
|
| options/nixos/boot.initrd.luks.devices.<name>.preLVM | Whether the luksOpen will be attempted before LVM scan or after it.
|
| options/nixos/services.h2o.hosts.<name>.http.port | Override the default HTTP port for this virtual host.
|
| options/nixos/users.extraGroups.<name>.members | The user names of the group members, added to the
/etc/group file.
|
| options/nixos/services.bind.zones.<name>.file | Zone file resource records contain columns of data, separated by whitespace, that define the record.
|
| options/nixos/services.maubot.settings.server.ui_base_path | The base path for the UI.
|
| options/nixos/services.geth.<name>.http.enable | Whether to enable Go Ethereum HTTP API.
|
| options/nixos/power.ups.upsmon.monitor.<name>.type | The relationship with upsd
|
| options/nixos/services.geth.<name>.network | The network to connect to
|
| options/nixos/services.rethinkdb.dbpath | Location where RethinkDB stores its data, 1 data directory per instance.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockFamily | This optional key can be used to specifically request that "IPv4" or "IPv6" socket(s) be created.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.filter | Interpolation method to be used for scaling the output.
|
| options/nixos/environment.etc.<name>.group | Group name of file owner
|
| options/nixos/boot.loader.grub.storePath | Path to the Nix store when looking for kernels at boot
|
| options/nixos/services.ttyd.socket | UNIX domain socket path to bind.
|
| options/nixos/services.murmur.sslCert | Path to your SSL certificate.
|
| options/nixos/services.netbox.dataDir | Storage path of netbox.
|
| options/nixos/services.xrdp.sslCert | ssl certificate path
A self-signed certificate will be generated if file not exists.
|
| options/nixos/networking.sits.<name>.ttl | The time-to-live of the connection to the remote tunnel endpoint.
|
| options/nixos/users.extraUsers.<name>.subGidRanges.*.count | Count of subordinate group ids
|
| options/nixos/users.extraUsers.<name>.subUidRanges.*.count | Count of subordinate user ids
|
| options/darwin/launchd.daemons.<name>.script | Shell commands executed as the service's main process.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockPathMode | This optional key specifies the mode of the socket
|
| options/nixos/systemd.slices.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.timers.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/users.users.<name>.description | A short description of the user account, typically the
user's full name
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.bacula-sd.autochanger.<name>.changerDevice | The specified name-string must be the generic SCSI device name of the
autochanger that corresponds to the normal read/write Archive Device
specified in the Device resource
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.macAllow | Specifies the MAC addresses to allow if macAcl is set to "allow" or "radius"
|
| options/nixos/virtualisation.docker.rootless.enable | This option enables docker in a rootless mode, a daemon that manages
linux containers
|
| options/nixos/services.cgit.<name>.extraConfig | These lines go to the end of cgitrc verbatim.
|
| options/nixos/systemd.services.<name>.preStop | Shell commands executed to stop the service.
|
| options/nixos/services.netbird.tunnels.<name>.user.group | A system group name for this client instance.
|
| options/nixos/services.netbird.clients.<name>.user.group | A system group name for this client instance.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockFamily | This optional key can be used to specifically request that "IPv4" or "IPv6" socket(s) be created.
|
| options/nixos/services.homebridge.settings.bridge.name | Name of the homebridge
|
| options/nixos/services.rauc.slots.<name>.*.device | The device to update.
|
| options/nixos/services.nylon.<name>.logging | Enable logging, default is no logging.
|
| options/nixos/fileSystems.<name>.autoResize | If set, the filesystem is grown to its maximum size before
being mounted. (This is typically the size of the containing
partition.) This is currently only supported for ext2/3/4
filesystems that are mounted during early boot.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockPathMode | This optional key specifies the mode of the socket
|
| options/nixos/users.extraUsers.<name>.autoSubUidGidRange | Automatically allocate subordinate user and group ids for this user
|
| options/nixos/systemd.user.targets.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.user.sockets.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/services.netbird.tunnels.<name>.dir.baseName | A systemd service name to use (without .service suffix).
|
| options/nixos/services.netbird.clients.<name>.dir.baseName | A systemd service name to use (without .service suffix).
|
| options/nixos/services.multipath.package | The multipath-tools package to use.
|
| options/nixos/systemd.services.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.settings | Configuration for this host
|
| options/darwin/launchd.user.agents.<name>.script | Shell commands executed as the service's main process.
|
| options/nixos/services.znapzend.zetup.<name>.destinations.<name>.dataset | Dataset name to send snapshots to.
|
| options/nixos/services.redis.servers.<name>.logfile | Specify the log file name
|
| options/nixos/services.borgbackup.jobs.<name>.startAt | When or how often the backup should run
|
| options/home-manager/programs.rclone.remotes.<name>.mounts.<name>.options | An attribute set of option values passed to rclone mount
|
| options/nixos/services.etebase-server.settings.database.name | The database name.
|
| options/nixos/services.ax25.axports.<name>.tty | Location of hardware kiss tnc for this interface.
|
| options/nixos/systemd.user.sockets.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/systemd.user.targets.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/systemd.sockets.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/systemd.targets.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/services.dendrite.settings.media_api.base_path | Storage path for uploaded media.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockServiceName | This optional key specifies the service on the node to connect(2) or bind(2) to.
|
| options/nixos/services.openafsServer.roles.backup.cellServDB.<name>.*.dnsname | DNS full-qualified domain name of a database server
|
| options/nixos/services.bosun.ledisDir | Path to bosun's ledis data dir
|
| options/nixos/services.cook-cli.basePath | Path to the directory cook-cli will look for recipes.
|
| options/nixos/services.nntp-proxy.sslCert | Proxy ssl certificate path
|
| options/nixos/services.oink.apiKeyFile | Path to a file containing the API key to use when modifying DNS records.
|
| options/nixos/services.k3s.tokenFile | File path containing the k3s token to use when connecting to a server.
|
| options/nixos/systemd.mounts.*.where | Absolute path of a directory of the mount point
|
| options/home-manager/services.twmn.icons.info | Path to the informative notifications' icon.
|
| options/nixos/services.multipath.devices.*.deferred_remove | If set to "yes", multipathd will do a deferred remove instead of a
regular remove when the last path device has been deleted
|
| options/nixos/services.pppd.peers.<name>.enable | Whether to enable this PPP peer.
|
| options/nixos/services.tts.servers.<name>.port | Port to bind the TTS server to.
|
| options/nixos/services.phpfpm.pools.<name>.user | User account under which this pool runs.
|
| options/nixos/systemd.services.<name>.wants | Start the specified units when this unit is started.
|
| options/home-manager/programs.fish.binds.<name>.silent | Whether to enable Operate silently.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.drupal.sites.<name>.virtualHost.locations.<name>.index | Adds DirectoryIndex directive
|
| options/nixos/services.drupal.sites.<name>.virtualHost.locations.<name>.alias | Alias directory for requests
|
| options/nixos/services.rethinkdb.pidpath | Location where each instance's pid file is located.
|
| options/nixos/services.traefik.supplementaryGroups | Additional groups under which Traefik runs
|
| options/nixos/power.ups.upsmon.monitor.<name>.user | Username from upsd.users for accessing this UPS
|
| options/nixos/systemd.user.targets.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/systemd.user.sockets.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/services.osquery.flags.database_path | Path used for the database file.
If left as the default value, this directory will be automatically created before the
service starts, otherwise you are responsible for ensuring the directory exists with
the appropriate ownership and permissions.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockPassive | This optional key specifies whether listen(2) or connect(2) should be called on the created file
descriptor
|
| options/darwin/programs.vim.vimOptions.<name>.text | Text of the file.
|
| options/nixos/services.netbird.clients.<name>.bin.suffix | A system group name for this client instance.
|
| options/nixos/services.netbird.tunnels.<name>.bin.suffix | A system group name for this client instance.
|
| options/nixos/systemd.timers.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/systemd.slices.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/systemd.services.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/systemd.sockets.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.targets.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/services.autosuspend.checks.<name>.class | Name of the class implementing the check
|
| options/nixos/systemd.sockets.<name>.aliases | Aliases of that unit.
|
| options/nixos/systemd.targets.<name>.aliases | Aliases of that unit.
|
| options/nixos/services.sourcehut.settings."hg.sr.ht".hg_ssh | Path to hg-ssh (if not in $PATH).
|
| options/home-manager/targets.genericLinux.gpu.nixStateDirectory | The path to the Nix state directory
|
| options/nixos/systemd.user.units.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.user.timers.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/systemd.user.slices.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/services.postfix.settings.master.<name>.command | A program name specifying a Postfix service/daemon process
|
| options/nixos/services.httpd.virtualHosts.<name>.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.primary | Whether output should be marked as primary
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.primary | Whether output should be marked as primary
|
| options/nixos/services.bind.zones.<name>.master | Master=false means slave server
|
| options/nixos/services.bind.zones.<name>.slaves | Addresses who may request zone transfers.
|
| options/nixos/services.nsd.zones.<name>.minRetrySecs | Limit retry time for secondary zones.
|
| options/nixos/services.rauc.slots.<name>.*.enable | Whether to enable this RAUC slot.
|
| options/nixos/services.prosody.virtualHosts.<name>.domain | Domain name
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.slot | Optional slot number of the token that stores the certificate.
|
| options/nixos/services.thanos.query.grpc-client-server-name | Server name to verify the hostname on the returned gRPC certificates
|
| options/nixos/services.ax25.axports.<name>.baud | The serial port speed of this interface.
|
| options/nixos/networking.ipips.<name>.dev | The underlying network device on which the tunnel resides.
|
| options/nixos/boot.initrd.systemd.groups.<name>.gid | ID of the group in initrd.
|
| options/nixos/services.szurubooru.server.settings.name | Name shown in the website title and on the front page.
|
| options/nixos/services.multipath.extraConfig | Lines to append to default multipath.conf
|
| options/nixos/services.athens.hgrcPath | Path to the .hgrc file.
|
| options/nixos/security.pki.caBundle | (Read-only) the path to the final bundle of certificate authorities as a single file.
|
| options/nixos/services.hound.home | The path to use as hound's $HOME
|
| options/nixos/services.bosun.stateFile | Path to bosun's state file.
|
| options/nixos/services.rke2.tokenFile | File path containing the rke2 token to use when connecting to a server.
|
| options/home-manager/services.skhd.errorLogFile | Absolute path to log all stderr output.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.user | Specifies the user to log in as.
|
| options/nixos/services.bitmagnet.settings.postgres.name | Database name to connect to
|
| options/nixos/systemd.user.timers.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.user.slices.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/home-manager/launchd.agents.<name>.config.Nice | This optional key specifies what nice(3) value should be applied to the daemon.
|
| options/nixos/services.multipath.devices | This option allows you to define arrays for use in multipath
groups.
|
| options/nixos/services.bitcoind.<name>.user | The user as which to run bitcoind.
|
| options/nixos/services.geth.<name>.syncmode | Blockchain sync mode.
|
| options/nixos/services.geth.<name>.maxpeers | Maximum peers to connect to.
|
| options/nixos/services.i2pd.inTunnels.<name>.type | Tunnel type.
|
| options/nixos/systemd.user.slices.<name>.aliases | Aliases of that unit.
|
| options/nixos/systemd.user.timers.<name>.aliases | Aliases of that unit.
|
| options/nixos/systemd.slices.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/systemd.slices.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.timers.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.timers.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/services.telepathy.enable | Whether to enable Telepathy service, a communications framework
that enables real-time communication via pluggable protocol backends.
|
| options/nixos/services.headscale.settings.tls_key_path | Path to key for already created certificate.
|
| options/nixos/services.matrix-synapse.settings.database.name | The database engine name
|
| options/home-manager/programs.hexchat.channels.<name>.userName | User name
|
| options/nixos/services.phpfpm.pools.<name>.phpEnv | Environment variables used for this PHP-FPM pool.
|
| options/nixos/services.firefly-iii.settings.APP_KEY_FILE | The path to your appkey
|
| options/nixos/services.ocis.configDir | Path to directory containing oCIS config file
|
| options/nixos/services.prometheus.exporters.idrac.configurationPath | Path to the service's config file
|
| options/nixos/services.nebula.networks.<name>.tun.device | Name of the tun device
|
| options/nixos/services.ebusd.configpath | Directory to read CSV config files from
|
| options/nixos/users.users.<name>.expires | Set the date on which the user's account will no longer be
accessible
|
| options/nixos/networking.ipips.<name>.ttl | The time-to-live of the connection to the remote tunnel endpoint.
|
| options/nixos/power.ups.ups.<name>.maxStartDelay | This can be set as a global variable above your first UPS
definition and it can also be set in a UPS section
|
| options/nixos/services.archisteamfarm.bots.<name>.username | Name of the user to log in
|
| options/nixos/virtualisation.qemu.drives.*.name | A name for the drive
|
| options/nixos/services.k3s.autoDeployCharts.<name>.package | The packaged Helm chart
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockProtocol | This optional key specifies the protocol to be passed to socket(2)
|
| options/nixos/hardware.alsa.cardAliases.<name>.id | The ID of the sound card
|
| options/home-manager/services.unison.pairs.<name>.roots | Pair of roots to synchronise.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.slot | Optional slot number of the token that stores the certificate.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.extraConfig | Extra lines to append to this profile's config.
|
| options/nixos/fileSystems.<name>.stratis.poolUuid | UUID of the stratis pool that the fs is located in
This is only relevant if you are using stratis.
|
| options/nixos/systemd.user.targets.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/systemd.user.sockets.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/services.stash.settings.stash_boxes.*.name | The name of the Stash Box
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.scale.method | Output scaling method.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.scale.method | Output scaling method.
|
| options/nixos/services.dae.configFile | The path of dae config file, end with .dae.
|
| options/nixos/services.athens.tlsKeyFile | Path to the TLS key file.
|
| options/nixos/services.cfssl.caBundle | Path to root certificate store.
|
| options/nixos/users.mysql.passwordFile | The path to the file containing the password for the user
|
| options/home-manager/xsession.scriptPath | Path, relative to HOME, where Home Manager
should write the X session script.
|
| options/nixos/services.i2pd.outTunnels.<name>.type | Tunnel type.
|
| options/nixos/services.rspamd.locals.<name>.text | Text of the file.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockServiceName | This optional key specifies the service on the node to connect(2) or bind(2) to.
|
| options/nixos/systemd.services.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/programs.ssh.knownHosts.<name>.hostNames | A list of host names and/or IP numbers used for accessing
the host's ssh service
|
| options/home-manager/xdg.desktopEntries.<name>.comment | Tooltip for the entry.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/nixos/services.i2pd.inTunnels.<name>.inbound.length | Guaranteed minimum hops for ‹name› tunnels.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.font | The font name, null to use system default.
|
| options/nixos/systemd.services.<name>.postStop | Shell commands executed after the service's main process
has exited.
|
| options/nixos/users.extraUsers.<name>.useDefaultShell | If true, the user's shell will be set to
users.defaultUserShell.
|
| options/home-manager/launchd.agents.<name>.config.Label | This required key uniquely identifies the job to launchd.
|
| options/nixos/systemd.nspawn.<name>.execConfig | Each attribute in this set specifies an option in the
[Exec] section of this unit
|
| options/nixos/systemd.timers.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/systemd.slices.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/services.rke2.autoDeployCharts.<name>.package | The packaged Helm chart
|
| options/nixos/services.librespeed.frontend.servers.*.name | Name shown in the server list.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockServiceName | This optional key specifies the service on the node to connect(2) or bind(2) to.
|
| options/nixos/security.acme.certs.<name>.validMinDays | Minimum remaining validity before renewal in days.
|
| options/nixos/boot.initrd.systemd.users.<name>.group | Group the user belongs to in initrd.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.setEnv | Environment variables and their value to send to the server.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockPassive | This optional key specifies whether listen(2) or connect(2) should be called on the created file
descriptor
|
| options/home-manager/programs.retroarch.cores.<name>.package | The ‹name› package to use.
|
| options/nixos/users.extraUsers.<name>.packages | The set of packages that should be made available to the user
|
| options/nixos/services.linkwarden.database.host | Hostname or address of the postgresql server
|
| options/home-manager/programs.niriswitcher.style | CSS style of the switcher.
https://github.com/isaksamsten/niriswitcher/?tab=readme-ov-file#themes
for the documentation
|
| options/nixos/systemd.user.services.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.position | Output position
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.position | Output position
|
| options/nixos/security.acme.certs.<name>.keyType | Key type to use for private keys
|
| options/nixos/services.bitcoind.<name>.port | Override the default port on which to listen for connections.
|
| options/nixos/services.i2pd.inTunnels.<name>.keys | Keyset used for tunnel identity.
|
| options/nixos/services.phpfpm.pools.<name>.group | Group account under which this pool runs.
|
| options/darwin/launchd.daemons.<name>.command | Command executed as the service's main process.
|
| options/nixos/services.gvpe.nodename | GVPE node name
|
| options/nixos/services.autosuspend.wakeups.<name>.class | Name of the class implementing the check
|
| options/nixos/services.h2o.hosts.<name>.acme.root | Directory for the ACME challenge, which is public
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockPassive | This optional key specifies whether listen(2) or connect(2) should be called on the created file
descriptor
|
| options/nixos/services.i2pd.outTunnels.<name>.inbound.length | Guaranteed minimum hops for ‹name› tunnels.
|
| options/nixos/services.awstats.configs.<name>.extraConfig | Extra configuration to be appended to awstats.${name}.conf.
|
| options/nixos/virtualisation.docker.storageDriver | This option determines which Docker
storage driver
to use
|
| options/nixos/networking.vswitches.<name>.interfaces.<name>.vlan | Vlan tag to apply to interface
|
| options/nixos/networking.vswitches.<name>.interfaces.<name>.type | Openvswitch type to assign to interface
|
| options/nixos/services.bitcoind.<name>.dataDir | The data directory for bitcoind.
|
| options/nixos/services.rsync.jobs.<name>.sources | Source directories.
|
| options/nixos/services.pgbackrest.stanzas.<name>.jobs.<name>.schedule | When or how often the backup should run
|
| options/nixos/services.jupyter.kernels.<name>.displayName | Name that will be shown to the user.
|
| options/nixos/services.librenms.distributedPoller.name | Custom name of this poller.
|
| options/nixos/services.gateone.pidDir | Path of pid files for GateOne.
|
| options/nixos/services.davis.nginx.root | The path of the web root directory.
|
| options/nixos/services.cfssl.intBundle | Path to intermediate certificate store.
|
| options/nixos/services.slskd.nginx.root | The path of the web root directory.
|
| options/nixos/services.ttyd.keyFile | SSL key file path
|
| options/nixos/services.movim.nginx.root | The path of the web root directory.
|
| options/nixos/swapDevices | The swap devices and swap files
|
| options/nixos/services.zammad.dataDir | Path to a folder that will contain Zammad working directory.
|
| options/home-manager/programs.rofi.configPath | Path where to put generated configuration file.
|
| options/nixos/services.hickory-dns.settings.zones.*.file | Path to the .zone file
|
| options/nixos/swapDevices.*.encrypted.keyFile | Path to a keyfile used to unlock the backing encrypted
device
|
| options/nixos/services.wyoming.piper.servers.<name>.voice | Name of the voice model to use
|
| options/nixos/services.geth.<name>.metrics.port | Port number of Go Ethereum metrics service.
|
| options/nixos/services.geth.<name>.http.address | Listen address of Go Ethereum HTTP API.
|
| options/nixos/systemd.services.<name>.preStart | Shell commands executed before the service's main process
is started.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.port | Specifies port number to connect on remote host.
|
| options/nixos/users.mysql.pam.userColumn | The name of the column that contains a unix login name.
|
| options/nixos/services.github-runners.<name>.runnerGroup | Name of the runner group to add this runner to (defaults to the default runner group)
|
| options/nixos/users.extraUsers.<name>.description | A short description of the user account, typically the
user's full name
|
| options/darwin/services.github-runners.<name>.runnerGroup | Name of the runner group to add this runner to (defaults to the default runner group)
|
| options/nixos/security.acme.certs.<name>.postRun | Commands to run after new certificates go live
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.index | Adds index directive.
|
| options/nixos/services.cgit.<name>.settings | cgit configuration, see cgitrc(5)
|
| options/nixos/services.uhub.<name>.settings | Configuration of uhub
|
| options/darwin/launchd.user.agents.<name>.command | Command executed as the service's main process.
|
| options/nixos/systemd.sockets.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.targets.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/users.users.<name>.isNormalUser | Indicates whether this is an account for a “real” user
|
| options/nixos/security.acme.certs.<name>.email | Email address for account creation and correspondence from the CA
|
| options/nixos/services.i2pd.outTunnels.<name>.keys | Keyset used for tunnel identity.
|
| options/nixos/networking.fooOverUDP.<name>.port | Local port of the encapsulation UDP socket.
|
| options/nixos/power.ups.ups.<name>.directives | List of configuration directives for this UPS.
|
| options/nixos/services.pppd.peers.<name>.config | pppd configuration for this peer, see the pppd(8) man page.
|
| options/nixos/users.extraUsers.<name>.subGidRanges.*.startGid | Start of the range of subordinate group ids that user is
allowed to use.
|
| options/nixos/users.extraUsers.<name>.subUidRanges.*.startUid | Start of the range of subordinate user ids that user is
allowed to use.
|
| options/home-manager/programs.fish.binds.<name>.enable | Whether to enable enable the bind
|
| options/nixos/services.freeswitch.configDir | Override file in FreeSWITCH config template directory
|
| options/home-manager/services.podman.machines.<name>.username | Username used in the machine image
|
| options/nixos/services.bitcoind.<name>.pidFile | Location of bitcoind pid file.
|
| options/home-manager/programs.fish.binds.<name>.command | command that will be execute
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.bssid | Specifies the BSSID for this BSS
|
| options/home-manager/programs.hexchat.channels.<name>.nickname | Primary nickname.
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.rsaPublicKey | Legacy RSA public key of the host in PEM format, including start and
end markers
|
| options/nixos/security.wrappers.<name>.group | The group of the wrapper program.
|
| options/nixos/services.bitcoind.<name>.group | The group as which to run bitcoind.
|
| options/nixos/security.wrappers.<name>.owner | The owner of the wrapper program.
|
| options/darwin/programs.tmux.tmuxOptions.<name>.text | Text of the file.
|
| options/nixos/services.multipath.devices.*.uid_attribute | The udev attribute providing a unique path identifier (WWID)
|
| options/nixos/services.geth.<name>.authrpc.port | Port number of Go Ethereum Auth RPC API.
|
| options/nixos/services.tts.servers.<name>.useCuda | Whether to offload computation onto a CUDA compatible GPU.
|
| options/home-manager/services.podman.images.<name>.tag | FQIN of referenced Image when source is a file or directory archive.
|
| options/nixos/networking.jool.siit | Definitions of SIIT instances of Jool
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.slot | Optional slot number of the token that stores the certificate.
|
| options/nixos/environment.etc.<name>.text | Text of the file.
|
| options/darwin/environment.etc.<name>.text | Text of the file.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockProtocol | This optional key specifies the protocol to be passed to socket(2)
|
| options/nixos/networking.sits.<name>.local | The address of the local endpoint which the remote
side should send packets to.
|
| options/nixos/systemd.user.timers.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.user.slices.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/services.neo4j.directories.home | Path of the Neo4j home directory
|
| options/nixos/services.athens.tlsCertFile | Path to the TLS certificate file.
|
| options/nixos/services.gammu-smsd.log.file | Path to file where information about communication will be stored
|
| options/nixos/services.athens.netrcPath | Path to the .netrc file.
|
| options/nixos/services.dae.assetsPath | The path which contains geolocation database
|
| options/nixos/services.snipe-it.nginx.root | The path of the web root directory.
|
| options/nixos/services.ndppd.configFile | Path to configuration file.
|
| options/nixos/services.prosody.ssl.key | Path to the key file.
|
| options/darwin/services.redis.unixSocket | The path to the socket to bind to.
|
| options/home-manager/programs.boxxy.rules.*.mode | Does the current path redirect a file or a directory?
|
| options/home-manager/services.ssh-tpm-agent.keyDir | Path of the directory to look for TPM sealed keys in, defaults to $HOME/.ssh if unset
|
| options/home-manager/programs.nnn.plugins.src | Path to the plugin folder.
|
| options/nixos/users.users.<name>.isSystemUser | Indicates if the user is a system user or not
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.pgbackrest.stanzas.<name>.instances.<name>.host | PostgreSQL host for operating remotely.
|
| options/nixos/systemd.user.services.<name>.preStop | Shell commands executed to stop the service.
|
| options/nixos/systemd.services.<name>.script | Shell commands executed as the service's main process.
|
| options/nixos/services.blockbook-frontend.<name>.user | The user as which to run blockbook-frontend-‹name›.
|
| options/nixos/services.filebeat.modules.<name>.module | The name of the module
|
| options/nixos/services.syncoid.commands.<name>.source | Source ZFS dataset
|
| options/nixos/services.tinc.networks.<name>.extraConfig | Extra lines to add to the tinc service configuration file
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockProtocol | This optional key specifies the protocol to be passed to socket(2)
|
| options/nixos/services.drupal.sites.<name>.filesDir | The location of the Drupal files directory.
|
| options/nixos/services.h2o.hosts.<name>.tls.quic | Enables HTTP/3 over QUIC on the UDP port for TLS
|
| options/home-manager/programs.thunderbird.profiles.<name>.accountsOrder | Custom ordering of accounts and local folders in
Thunderbird's folder pane
|
| options/nixos/boot.specialFileSystems.<name>.enable | Whether to enable the filesystem mount.
|
| options/nixos/services.nix-store-gcs-proxy.<name>.enable | Whether to enable proxy for this bucket
|
| options/nixos/services.discourse.admin.passwordFile | A path to a file containing the admin user's password
|
| options/nixos/boot.kernel.sysfs | sysfs attributes to be set as soon as they become available
|
| options/nixos/services.webhook.hooks.<name>.id | The ID of your hook
|
| options/nixos/services.spiped.config.<name>.keyfile | Name of a file containing the spiped key
|
| options/nixos/services.rsync.jobs.<name>.timerConfig | When to run the job.
|
| options/home-manager/services.podman.images.<name>.image | Image to pull.
|
| options/nixos/services.multipath.extraConfigFile | Append an additional file's contents to /etc/multipath.conf
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.handle | Hex-encoded CKA_ID or handle of the certificate on a token or TPM,
respectively
|
| options/nixos/services.jupyter.kernels.<name>.language | Language of the environment
|
| options/nixos/systemd.sockets.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/systemd.targets.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/services.authelia.instances.<name>.user | The name of the user for this authelia instance.
|
| options/nixos/services.v4l2-relayd.instances.<name>.cardLabel | The name the camera will show up as.
|
| options/nixos/services.nghttpx.backends.*.params.dns | Name resolution of a backends host name is done at start up,
or configuration reload
|
| options/nixos/services.httpd.virtualHosts.<name>.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.drupal.sites.<name>.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.errbot.instances.<name>.backend | Errbot backend name.
|
| options/nixos/services.i2pd.inTunnels.<name>.inPort | Service port
|
| options/nixos/systemd.services.<name>.postStart | Shell commands executed after the service's main process
is started.
|
| options/nixos/systemd.services.<name>.reload | Shell commands executed when the service's main process
is reloaded.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.sendEnv | Environment variables to send from the local host to the
server.
|
| options/nixos/systemd.user.sockets.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/systemd.slices.<name>.sliceConfig | Each attribute in this set specifies an option in the
[Slice] section of the unit
|
| options/nixos/systemd.nspawn.<name>.filesConfig | Each attribute in this set specifies an option in the
[Files] section of this unit
|
| options/nixos/systemd.user.targets.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/services.drupal.sites.<name>.stateDir | The location of the Drupal site state directory.
|
| options/nixos/systemd.user.services.<name>.wants | Start the specified units when this unit is started.
|
| options/home-manager/xdg.desktopEntries.<name>.actions | The set of actions made available to application launchers.
|
| options/home-manager/programs.fish.binds.<name>.operate | Operate on preset bindings or user bindings
|
| options/home-manager/programs.fish.binds.<name>.repaint | Whether to enable redraw prompt after command.
|
| options/home-manager/home.username | The user's username.
|
| options/nixos/services.seafile.dataDir | Path in which to store user data
|
| options/nixos/services.murmur.logFile | Path to the log file for Murmur daemon
|
| options/nixos/services.cfssl.dbConfig | Certificate db configuration file
|
| options/nixos/services.i2pd.reseed.file | Full path to SU3 file to reseed from.
|
| options/nixos/hardware.alsa.plugins | List of ALSA plugins to be added to the search path.
|
| options/nixos/services.ncps.netrcFile | The path to netrc file for upstream authentication
|
| options/nixos/services.molly-brown.keyPath | Path to TLS key
|
| options/nixos/services.nghttpx.tls.key | Path to the TLS key file.
|
| options/nixos/services.zerobin.dataDir | Path to the 0bin data directory
|
| options/nixos/services.nghttpx.tls.crt | Path to the TLS certificate file.
|
| options/nixos/services.yarr.authFilePath | Path to a file containing username:password. null means no authentication required to use the service.
|
| options/home-manager/programs.zsh.zplug.zplugHome | Path to zplug home directory.
|
| options/nixos/systemd.services.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/services.grafana.settings.database.ca_cert_path | The path to the CA certificate to use.
|
| options/nixos/services.headscale.settings.tls_cert_path | Path to already created certificate.
|
| options/nixos/security.pam.services.<name>.text | Contents of the PAM service file.
|
| options/home-manager/programs.smug.projects.<name>.env | Environment Variables to set in session.
|
| options/nixos/networking.jool.nat64 | Definitions of NAT64 instances of Jool
|
| options/nixos/services.dendrite.settings.sync_api.search.index_path | The path the search index will be created in.
|
| options/nixos/services.ndppd.proxies.<name>.ttl | Controls how long a valid or invalid entry remains in the cache, in
milliseconds.
|
| options/nixos/systemd.user.slices.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/systemd.user.targets.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.user.services.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/systemd.user.sockets.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.user.timers.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.subnets | The subnets which this tinc daemon will serve
|
| options/nixos/systemd.user.sockets.<name>.aliases | Aliases of that unit.
|
| options/nixos/systemd.user.targets.<name>.aliases | Aliases of that unit.
|
| options/home-manager/accounts.email.certificatesFile | Path to default file containing certificate authorities that
should be used to validate the connection authenticity
|
| options/nixos/systemd.services.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.targets.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.targets.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/systemd.sockets.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.sockets.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/hardware.nvidia-container-toolkit.mount-nvidia-executables | Mount executables nvidia-smi, nvidia-cuda-mps-control, nvidia-cuda-mps-server,
nvidia-debugdump, nvidia-powerd and nvidia-ctk on containers.
|
| options/nixos/services.bacula-sd.director.<name>.tls.allowedCN | Common name attribute of allowed peer certificates
|
| options/nixos/services.bacula-fd.director.<name>.tls.allowedCN | Common name attribute of allowed peer certificates
|
| options/nixos/systemd.services.<name>.aliases | Aliases of that unit.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels | List of channels that should be grouped together into this group
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.pid-fan-controller.settings.heatSources.*.name | Name of the heat source.
|
| options/nixos/services.bind.zones.<name>.masters | List of servers for inclusion in stub and secondary zones.
|
| options/nixos/services.quicktun.<name>.tunMode | Whether to operate in tun (IP) or tap (Ethernet) mode.
|
| options/nixos/services.redis.servers.<name>.bind | The IP interface to bind to.
null means "all interfaces".
|
| options/home-manager/launchd.agents.<name>.config.Debug | This optional key specifies that launchd should adjust its log mask temporarily to LOG_DEBUG while
dealing with this job.
|
| options/home-manager/programs.obsidian.defaultSettings.cssSnippets.*.name | Name of the snippet.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.handle | Hex-encoded CKA_ID or handle of the certificate on a token or TPM,
respectively
|
| options/nixos/services.i2pd.inTunnels.<name>.outbound.length | Guaranteed minimum hops for ‹name› tunnels.
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.bind | Which local IP to bind the UDP socket to.
|
| options/nixos/services.blockbook-frontend.<name>.dataDir | Location of blockbook-frontend-‹name› data directory.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.macDenyFile | Specifies a file containing the MAC addresses to deny if macAcl is set to "deny" or "radius"
|
| options/nixos/services.blockbook-frontend.<name>.group | The group as which to run blockbook-frontend-‹name›.
|
| options/nixos/networking.sits.<name>.remote | The address of the remote endpoint to forward traffic over.
|
| options/nixos/services.phpfpm.pools.<name>.listen | The address on which to accept FastCGI requests.
|
| options/darwin/environment.darwinConfig | The path of the darwin configuration.nix used to configure the system,
this updates the default darwin-config entry in NIX_PATH
|
| options/nixos/services.gitea.camoHmacKeyFile | Path to a file containing the camo HMAC key.
|
| options/nixos/services.prosody.ssl.cert | Path to the certificate file.
|
| options/nixos/services.xserver.xkb.dir | Path used for -xkbdir xserver parameter.
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites.<name>.settings | Settings for this site
|
| options/nixos/services.prometheus.exporters.rtl_433.ids.*.name | Name to match.
|
| options/nixos/services.kimai.sites.<name>.package | The kimai package to use.
|
| options/nixos/fileSystems.<name>.encrypted.blkDev | Location of the backing encrypted device.
|
| options/nixos/services.tahoe.nodes.<name>.package | The tahoelafs package to use.
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.addresses.*.port | The port where the host can be reached
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites.<name>.manifestUrl | URL of the site's web app manifest.
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.addresses | The external address where the host can be reached
|
| options/nixos/security.pam.services.<name>.zfs | Enable unlocking and mounting of encrypted ZFS home dataset at login.
|
| options/nixos/systemd.user.slices.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.user.timers.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/systemd.user.timers.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.user.slices.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/services.asusd.auraConfigs.<name>.text | Text of the file.
|
| options/nixos/programs.neovim.runtime.<name>.text | Text of the file.
|
| options/home-manager/programs.sftpman.mounts.<name>.host | The host to connect to.
|
| options/home-manager/programs.sftpman.mounts.<name>.user | The username to authenticate with.
|
| options/home-manager/programs.sftpman.mounts.<name>.port | The port to connect to.
|
| options/home-manager/accounts.email.accounts.<name>.gpg | GPG configuration.
|
| options/nixos/power.ups.users.<name>.instcmds | Let the user initiate specific instant commands
|
| options/nixos/systemd.units.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/services.i2pd.outTunnels.<name>.outbound.length | Guaranteed minimum hops for ‹name› tunnels.
|
| options/nixos/security.acme.certs.<name>.profile | The certificate profile to choose if the CA offers multiple profiles.
|
| options/home-manager/launchd.agents.<name>.config.RunAtLoad | This optional key is used to control whether your job is launched once at the time the job is loaded
|
| options/nixos/services.diod.exports | List the file systems that clients will be allowed to mount
|
| options/nixos/networking.ipips.<name>.local | The address of the local endpoint which the remote
side should send packets to.
|
| options/nixos/services.authelia.instances.<name>.group | The name of the group for this authelia instance.
|
| options/home-manager/accounts.contact.accounts.<name>.remote.userName | User name for authentication.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.scale | Output scale configuration
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.scale | Output scale configuration
|
| options/nixos/systemd.targets.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/systemd.sockets.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/home-manager/launchd.agents.<name>.config.UserName | This optional key specifies the user to run the job as
|
| options/nixos/services.tahoe.nodes.<name>.tub.port | The port on which the tub will listen
|
| options/nixos/services.tahoe.nodes.<name>.web.port | The port on which the Web server will listen
|
| options/nixos/services.drupal.sites.<name>.enable | Whether to enable Drupal web application.
|
| options/nixos/services.bitcoind.<name>.dbCache | Override the default database cache size in MiB.
|
| options/nixos/services.tts.servers.<name>.extraArgs | Extra arguments to pass to the server commandline.
|
| options/nixos/services.tts.servers.<name>.enable | Whether to enable Coqui TTS server.
|
| options/home-manager/services.activitywatch.watchers.<name>.settingsFilename | The filename of the generated settings file
|
| options/nixos/power.ups.ups.<name>.shutdownOrder | When you have multiple UPSes on your system, you usually need to
turn them off in a certain order. upsdrvctl shuts down all the
0s, then the 1s, 2s, and so on
|
| options/nixos/services.xserver.displayManager.lightdm.greeter.name | The name of a .desktop file in the directory specified
in the 'package' option.
|
| options/nixos/services.ax25.axports.<name>.window | Default window size for this interface.
|
| options/nixos/services.gancio.settings.log_path | Directory Gancio logs into
|
| options/nixos/boot.specialFileSystems.<name>.fsType | Type of the file system
|
| options/nixos/systemd.timers.<name>.timerConfig | Each attribute in this set specifies an option in the
[Timer] section of the unit
|
| options/home-manager/home.file.<name>.executable | Set the execute bit
|
| options/nixos/services.restic.backups.<name>.user | As which user the backup should run.
|
| options/nixos/services.bacula-sd.tls.key | The path of a PEM encoded TLS private key
|
| options/nixos/services.bacula-fd.tls.key | The path of a PEM encoded TLS private key
|
| options/nixos/services.gancio.nginx.root | The path of the web root directory.
|
| options/nixos/services.gns3-server.log.file | Path of the file GNS3 Server should log to.
|
| options/nixos/services.fluidd.nginx.root | The path of the web root directory.
|
| options/nixos/services.akkoma.nginx.root | The path of the web root directory.
|
| options/nixos/services.monica.nginx.root | The path of the web root directory.
|
| options/nixos/services.matomo.nginx.root | The path of the web root directory.
|
| options/nixos/services.marytts.basePath | The base path in which MaryTTS runs.
|
| options/nixos/services.oauth2-proxy.tls.key | Path to private key file.
|
| options/nixos/services.samba-wsdd.listen | Listen on path or localhost port in discovery mode.
|
| options/nixos/services.skydns.etcd.tlsPem | Skydns path of TLS client certificate - public key.
|
| options/nixos/services.tempo.configFile | Specify a path to a configuration file that Tempo should use.
|
| options/nixos/services.skydns.etcd.tlsKey | Skydns path of TLS client certificate - private key.
|
| options/nixos/services.k3s.configPath | File path containing the k3s YAML config
|
| options/home-manager/programs.nh.flake | The path that will be used for the FLAKE environment variable.
FLAKE is used by nh as the default flake for performing actions,
like nh os switch.
|
| options/home-manager/xsession.profilePath | Path, relative to HOME, where Home Manager
should write the X profile script.
|
| options/nixos/services.bookstack.settings.APP_KEY_FILE | The path to your appkey
|
| options/nixos/services.ndppd.proxies.<name>.interface | Listen for any Neighbor Solicitation messages on this interface,
and respond to them according to a set of rules
|
| options/nixos/services.sourcehut.settings."sr.ht".site-name | The name of your network of sr.ht-based sites.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/environment.etc.<name>.gid | GID of created file
|
| options/nixos/environment.etc.<name>.uid | UID of created file
|
| options/nixos/services.nsd.zones.<name>.notifyRetry | Specifies the number of retries for failed notifies
|
| options/nixos/systemd.user.services.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/home-manager/programs.streamlink.plugins.<name>.settings | Configuration for the specific plugin, written to
$XDG_CONFIG_HOME/streamlink/config. (linux) or
Library/Application Support/streamlink/config. (darwin).
|
| options/nixos/security.wrappers.<name>.enable | Whether to enable the wrapper.
|
| options/nixos/services.quicktun.<name>.localPort | Local UDP port.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.macAllowFile | Specifies a file containing the MAC addresses to allow if macAcl is set to "allow" or "radius"
|
| options/nixos/services.bitcoind.<name>.rpc.port | Override the default port on which to listen for JSON-RPC connections.
|
| options/nixos/systemd.user.services.<name>.postStop | Shell commands executed after the service's main process
has exited.
|
| options/nixos/systemd.user.timers.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/systemd.user.slices.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/home-manager/qt.style.name | Style to use for Qt5/Qt6 applications
|
| options/nixos/services.nix-store-gcs-proxy.<name>.address | The address of the proxy.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.transform | Refer to
xrandr(1)
for the documentation of the transform matrix.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.transform | Refer to
xrandr(1)
for the documentation of the transform matrix.
|
| options/nixos/services.sourcehut.settings."sr.ht".owner-name | Owner's name.
|
| options/nixos/security.acme.certs.<name>.extraLegoFlags | Additional global flags to pass to all lego commands.
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.MulticastGroup | This optional key can be used to request that the datagram socket join a multicast group
|
| options/nixos/services.znapzend.zetup.<name>.destinations.<name>.host | Host to use for the destination dataset
|
| options/nixos/services.ax25.axports.<name>.enable | Whether to enable Enables the axport interface.
|
| options/nixos/services.ax25.axports.<name>.paclen | Default maximum packet size for this interface.
|
| options/home-manager/programs.smug.projects.<name>.stop | Commands to execute after the tmux-session is destroyed.
|
| options/nixos/services.homebridge.settings.platforms.*.name | Name of the platform
|
| options/home-manager/programs.hexchat.channels.<name>.nickname2 | Secondary nickname.
|
| options/nixos/systemd.slices.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/systemd.timers.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.nginx.proxyCachePath.<name>.maxSize | Set maximum cache size
|
| options/nixos/services.inadyn.settings.custom.<name>.ddns-server | DDNS server name.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.handle | Hex-encoded CKA_ID or handle of the certificate on a token or TPM,
respectively
|
| options/nixos/users.extraUsers.<name>.expires | Set the date on which the user's account will no longer be
accessible
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.macAcl | Station MAC address -based authentication
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.locations.<name>.index | Adds DirectoryIndex directive
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.locations.<name>.alias | Alias directory for requests
|
| options/nixos/boot.initrd.luks.devices.<name>.gpgCard | The option to use this LUKS device with a GPG encrypted luks password by the GPG Smartcard
|
| options/nixos/services.gitwatch.<name>.enable | Whether to enable watching for repo.
|
| options/nixos/services.gitwatch.<name>.remote | Optional url of remote repository
|
| options/nixos/services.gitwatch.<name>.branch | Optional branch in remote repository
|
| options/nixos/services.bitcoind.<name>.enable | Whether to enable Bitcoin daemon.
|
| options/nixos/networking.fooOverUDP.<name>.local.dev | Network device to bind to.
|
| options/nixos/hardware.nvidia-container-toolkit.mount-nvidia-docker-1-directories | Mount nvidia-docker-1 directories on containers: /usr/local/nvidia/lib and
/usr/local/nvidia/lib64.
|
| options/nixos/services.borgbackup.jobs.<name>.dateFormat | Arguments passed to date
to create a timestamp suffix for the archive name.
|
| options/nixos/services.prometheus.scrapeConfigs.*.metrics_path | The HTTP resource path on which to fetch metrics from targets
|
| options/home-manager/programs.irssi.networks.<name>.type | Type of the network.
|
| options/home-manager/programs.irssi.networks.<name>.nick | Nickname in that network.
|
| options/nixos/security.pam.oath.usersFile | Set the path to file where the user's credentials are
stored
|
| options/nixos/services.code-server.userDataDir | Path to the user data directory.
|
| options/nixos/services.gitea.dump.backupDir | Path to the dump files.
|
| options/nixos/services.galene.keyFile | Path to the server's private key
|
| options/nixos/services.bacula-dir.tls.key | The path of a PEM encoded TLS private key
|
| options/nixos/services.gollum.stateDir | Specifies the path of the repository directory
|
| options/nixos/services.nginx.sslDhparam | Path to DH parameters file.
|
| options/nixos/services.skydns.etcd.caCert | Skydns path of TLS certificate authority public key.
|
| options/nixos/services.ncps.cache.tempPath | The path to the temporary directory that is used by the cache to download NAR files
|
| options/nixos/services.mptcpd.enable | Whether to enable the Multipath TCP path management daemon.
|
| options/nixos/services.node-red.configFile | Path to the JavaScript configuration file
|
| options/nixos/services.rke2.configPath | File path containing the rke2 YAML config
|
| options/darwin/services.cachix-agent.logFile | Absolute path to log all stderr and stdout
|
| options/home-manager/vdirsyncer.tokenFile | A file path where access tokens are stored.
|
| options/home-manager/vdirsyncer.verify | Null or path to certificate to verify SSL against
|
| options/nixos/services.netbird.clients.<name>.suffixedName | A systemd service name to use (without .service suffix).
|
| options/nixos/services.netbird.tunnels.<name>.suffixedName | A systemd service name to use (without .service suffix).
|
| options/nixos/networking.fooOverUDP.<name>.local | Local address (and optionally device) to bind to using the given port.
|
| options/nixos/services.bind.zones.<name>.extraConfig | Extra zone config to be appended at the end of the zone section.
|
| options/nixos/systemd.user.services.<name>.preStart | Shell commands executed before the service's main process
is started.
|
| options/home-manager/i18n.inputMethod.fcitx5.themes.<name>.theme | The theme.conf file of the theme
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.multipath.defaults | This section defines default values for attributes which are used
whenever no values are given in the appropriate device or multipath
sections.
|
| options/nixos/documentation.man.mandoc.settings.manpath | Override the default search path for man(1),
apropos(1), and makewhatis(8)
|
| options/nixos/services.i2pd.inTunnels.<name>.inbound.quantity | Number of simultaneous ‹name› tunnels.
|
| options/nixos/power.ups.upsmon.monitor.<name>.system | Identifier of the UPS to monitor, in this form: <upsname>[@<hostname>[:<port>]]
See upsmon.conf for details.
|
| options/nixos/systemd.user.sockets.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.user.targets.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/services.nginx.virtualHosts.<name>.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.keepalived.vrrpScripts.<name>.user | Name of user to run the script under.
|
| options/nixos/security.acme.certs.<name>.extraLegoRunFlags | Additional flags to pass to lego run.
|
| options/nixos/services.geth.<name>.authrpc.vhosts | List of virtual hostnames from which to accept requests.
|
| options/nixos/services.hans.clients.<name>.server | IP address of server running hans
|
| options/nixos/services.drupal.sites.<name>.themesDir | The location for users to install Drupal themes.
|
| options/nixos/services.nsd.zones.<name>.minRefreshSecs | Limit refresh time for secondary zones.
|
| options/nixos/services.spiped.config.<name>.maxConns | Limit on the number of simultaneous connections allowed.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.proxyJump | The proxy host to use to connect to the server.
|
| options/nixos/systemd.units.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.services.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.claimMaps.<name>.joinType | Determines how multiple values are joined to create the claim value
|
| options/nixos/services.inadyn.settings.custom.<name>.hostname | Hostname alias(es).
|
| options/nixos/services.inadyn.settings.custom.<name>.username | Username for this DDNS provider.
|
| options/nixos/services.tarsnap.archives.<name>.printStats | Print global archive statistics upon completion
|
| options/nixos/security.pam.services.<name>.showMotd | Whether to show the message of the day.
|
| options/nixos/networking.ipips.<name>.remote | The address of the remote endpoint to forward traffic over.
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites.<name>.desktopEntry.icon | Icon to display in file manager, menus, etc.
|
| options/nixos/services.multipath.devices.*.path_grouping_policy | The default path grouping policy to apply to unspecified multipaths
|
| options/home-manager/xdg.dataFile.<name>.executable | Set the execute bit
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.cgit.<name>.nginx.location | Location to serve cgit under.
|
| options/nixos/services.rauc.slots.<name>.*.settings | Settings for this slot.
|
| options/nixos/services.spiped.config.<name>.target | Address to which spiped should connect.
|
| options/home-manager/services.podman.builds.<name>.labels | The labels to apply to the build.
|
| options/nixos/security.pam.services.<name>.rootOK | If set, root doesn't need to authenticate (e.g. for the
useradd service).
|
| options/nixos/services.i2pd.outTunnels.<name>.inbound.quantity | Number of simultaneous ‹name› tunnels.
|
| options/nixos/services.netbird.clients.<name>.interface | Name of the network interface managed by this client.
|
| options/nixos/services.netbird.tunnels.<name>.interface | Name of the network interface managed by this client.
|
| options/home-manager/launchd.agents.<name>.config.TimeOut | The recommended idle time out (in seconds) to pass to the job
|
| options/home-manager/programs.gemini-cli.commands.<name>.prompt | The prompt that will be sent to the Gemini model when the command is executed
|
| options/nixos/services.borgbackup.jobs.<name>.postCreate | Shell commands to run after borg create
|
| options/nixos/networking.supplicant.<name>.bridge | Name of the bridge interface that wpa_supplicant should listen at.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.librenms.logDir | Path of the LibreNMS logging directory.
|
| options/nixos/services.jenkins.home | The path to use as JENKINS_HOME
|
| options/nixos/services.galene.certFile | Path to the server's certificate
|
| options/nixos/services.klipper.inputTTY | Path of the virtual printer symlink to create.
|
| options/nixos/services.qui.secretFile | Path to a file that contains the session secret
|
| options/nixos/services.self-deploy.nixFile | Path to nix file in repository
|
| options/nixos/services.slskd.domain | If non-null, enables an nginx reverse proxy virtual host at this FQDN,
at the path configurated with services.slskd.web.url_base.
|
| options/nixos/services.minio.dataDir | The list of data directories or nodes for storing the objects
|
| options/nixos/services.slurm.mpi.PmixCliTmpDirBase | Base path for PMIx temporary files.
|
| options/nixos/services.zwave-js.serialPort | Serial port device path for Z-Wave controller.
|
| options/home-manager/programs.rbenv.plugins.*.src | Path to the plugin folder.
|
| options/home-manager/vdirsyncer.authCert | Either a path to a certificate with a client certificate and
the key or a list of paths to the files with them.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.settings | Extra configuration options to put at the end of this BSS's defintion in the
hostapd.conf for the associated interface
|
| options/nixos/services.geth.<name>.metrics.enable | Whether to enable Go Ethereum prometheus metrics.
|
| options/nixos/services.bitcoind.<name>.rpc.users | RPC user information for JSON-RPC connections.
|
| options/nixos/services.redis.servers.<name>.slaveOf | IP and port to which this redis instance acts as a slave.
|
| options/nixos/systemd.user.services.<name>.script | Shell commands executed as the service's main process.
|
| options/darwin/launchd.agents.<name>.serviceConfig | Each attribute in this set specifies an option for a key in the plist.
https://developer.apple.com/legacy/library/documentation/Darwin/Reference/ManPages/man5/launchd.plist.5.html
|
| options/home-manager/services.podman.volumes.<name>.user | The user ID owning the volume inside the container.
|
| options/nixos/services.multipath.devices.*.max_sectors_kb | Sets the max_sectors_kb device parameter on all path devices and the multipath device to the specified value
|
| options/nixos/services.bacula-sd.director.<name>.tls.enable | Specifies if TLS should be enabled
|
| options/nixos/services.bacula-fd.director.<name>.tls.enable | Specifies if TLS should be enabled
|
| options/nixos/security.wrappers.<name>.setuid | Whether to add the setuid bit the wrapper program.
|
| options/nixos/security.wrappers.<name>.setgid | Whether to add the setgid bit the wrapper program.
|
| options/nixos/security.pam.services.<name>.oathAuth | If set, the OATH Toolkit will be used.
|
| options/nixos/services.dovecot2.imapsieve.mailbox.*.name | This setting configures the name of a mailbox for which administrator scripts are configured
|
| options/nixos/services.ghostunnel.servers.<name>.allowCN | Allow client if common name appears in the list.
|
| options/nixos/services.redis.servers.<name>.slaveOf.ip | IP of the Redis master
|
| options/home-manager/accounts.email.accounts.<name>.jmap | The JMAP configuration to use for this account.
|
| options/home-manager/accounts.email.accounts.<name>.smtp | The SMTP configuration to use for this account.
|
| options/home-manager/xdg.desktopEntries.<name>.terminal | Whether the program runs in a terminal window.
|
| options/home-manager/accounts.email.accounts.<name>.imap | The IMAP configuration to use for this account.
|
| options/nixos/services.bind.zones.<name>.allowQuery | List of address ranges allowed to query this zone
|
| options/nixos/systemd.timers.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/systemd.slices.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/services.openvpn.servers.<name>.authUserPass.username | The username to store inside the credentials file.
|
| options/nixos/services.keycloak.database.passwordFile | The path to a file containing the database password
|
| options/nixos/services.cjdns.UDPInterface.connectTo.<name>.login | (optional) name your peer has for you
|
| options/nixos/services.cjdns.ETHInterface.connectTo.<name>.login | (optional) name your peer has for you
|
| options/nixos/services.public-inbox.inboxes.<name>.newsgroup | NNTP group name for the inbox.
|
| options/nixos/services.nsd.zones.<name>.maxRetrySecs | Limit retry time for secondary zones
|
| options/nixos/services.ax25.axports.<name>.kissParams | Kissattach parameters for this interface.
|
| options/nixos/services.drupal.sites.<name>.package | The drupal package to use.
|
| options/nixos/systemd.user.targets.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/systemd.user.sockets.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/users.extraUsers.<name>.isNormalUser | Indicates whether this is an account for a “real” user
|
| options/home-manager/programs.gnome-terminal.profile.<name>.visibleName | The profile name.
|
| options/nixos/power.ups.ups.<name>.description | Description of the UPS.
|
| options/nixos/services.beesd.filesystems.<name>.workDir | Name (relative to the root of the filesystem) of the subvolume where
the hash table will be stored.
|
| options/nixos/services.multipath.blacklist | This section defines which devices should be excluded from the
multipath topology discovery.
|
| options/nixos/services.geth.<name>.authrpc.enable | Whether to enable Go Ethereum Auth RPC API.
|
| options/nixos/systemd.user.services.<name>.postStart | Shell commands executed after the service's main process
is started.
|
| options/nixos/systemd.services.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/systemd.user.services.<name>.reload | Shell commands executed when the service's main process
is reloaded.
|
| options/home-manager/services.podman.volumes.<name>.type | Filesystem type of Device. (used as -t in mount commands)
|
| options/nixos/services.redis.servers.<name>.port | The TCP port to accept connections
|
| options/nixos/systemd.user.slices.<name>.sliceConfig | Each attribute in this set specifies an option in the
[Slice] section of the unit
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/nixos/services.ghostunnel.servers.<name>.allowOU | Allow client if organizational unit name appears in the list.
|
| options/nixos/systemd.nspawn.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.timers.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.slices.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/services.multipath.devices.*.san_path_err_recovery_time | If set to a value greater than 0, multipathd will make sure that when
path failures has exceeded the san_path_err_threshold within
san_path_err_forget_rate then the path will be placed in failed state
for san_path_err_recovery_time duration
|
| options/nixos/systemd.network.links.<name>.enable | Whether to enable this .link unit
|
| options/nixos/systemd.user.services.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/home-manager/xdg.desktopEntries.<name>.noDisplay | Means "this application exists, but don't display it in the menus"
|
| options/nixos/services.graylog.nodeIdFile | Path of the file containing the graylog node-id
|
| options/nixos/services.cfssl.configFile | Path to configuration file
|
| options/nixos/programs.zsh.ohMyZsh.custom | Path to a custom oh-my-zsh package to override config of oh-my-zsh.
(Can't be used along with customPkgs).
|
| options/nixos/programs.rush.shell | The resolved shell path that users can inherit to set rush as their login shell
|
| options/nixos/services.klipper.logFile | Path of the file Klipper should log to
|
| options/nixos/services.uptermd.hostKey | Path to SSH host key
|
| options/nixos/users.ldap.bind.passwordFile | The path to a file containing the credentials to use when binding
to the LDAP server (if not binding anonymously).
|
| options/home-manager/programs.zsh.oh-my-zsh.custom | Path to a custom oh-my-zsh package to override config of
oh-my-zsh
|
| options/home-manager/programs.numbat.initFile | User initialization file (init.nbt) contents
|
| options/nixos/security.acme.certs.<name>.enableDebugLogs | Whether to enable debug logging for this certificate.
|
| options/nixos/services.openvpn.servers.<name>.up | Shell commands executed when the instance is starting.
|
| options/nixos/services.tahoe.nodes.<name>.sftpd.enable | Whether to enable SFTP service.
|
| options/home-manager/accounts.calendar.accounts.<name>.remote.userName | User name for authentication.
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.subnets.*.weight | Indicates the priority over identical Subnets owned by different nodes
|
| options/nixos/environment.etc.<name>.mode | If set to something else than symlink,
the file is copied instead of symlinked, with the given
file mode.
|
| options/nixos/power.ups.upsmon.monitor.<name>.powerValue | Number of power supplies that the UPS feeds on this system
|
| options/nixos/services.fedimintd.<name>.ui.bind | Address to bind on for UI connections
|
| options/nixos/networking.bridges.<name>.rstp | Whether the bridge interface should enable rstp.
|
| options/nixos/services.jupyter.kernels.<name>.env | Environment variables to set for the kernel.
|
| options/nixos/networking.greTunnels.<name>.dev | The underlying network device on which the tunnel resides.
|
| options/nixos/services.redis.servers.<name>.syslog | Enable logging to the system logger.
|
| options/nixos/services.redis.servers.<name>.enable | Whether to enable Redis server.
|
| options/nixos/services.rspamd.workers.<name>.count | Number of worker instances to run
|
| options/nixos/users.extraUsers.<name>.isSystemUser | Indicates if the user is a system user or not
|
| options/home-manager/launchd.agents.<name>.config.WatchPaths | This optional key causes the job to be started if any one of the listed paths are modified.
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.subnets.*.prefixLength | The prefix length of the subnet
|
| options/nixos/services.nsd.keys.<name>.algorithm | Authentication algorithm for this key.
|
| options/home-manager/programs.sftpman.mounts.<name>.authType | The authentication method to use.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.actors.<name>.type | The account type
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.hotkeys.<name>.*.modifiers | The hotkey modifiers.
|
| options/nixos/systemd.user.sockets.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.user.sockets.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/systemd.user.targets.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.user.targets.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/systemd.user.services.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/darwin/programs.vim.vimOptions.<name>.enable | Whether this file should be generated
|
| options/home-manager/services.podman.volumes.<name>.copy | Copy content of the image located at the mountpoint of the volume on first run.
|
| options/nixos/services.acpid.handlers.<name>.event | Event type.
|
| options/nixos/services.quicktun.<name>.remotePort | Remote UDP port
|
| options/nixos/systemd.user.services.<name>.aliases | Aliases of that unit.
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.addresses.*.address | The external IP address or hostname where the host can be reached.
|
| options/nixos/systemd.services.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/systemd.services.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.checkHostIP | Check the host IP address in the
known_hosts file.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.claimMaps.<name>.valuesByGroup | Maps kanidm groups to values for the claim.
|
| options/nixos/services.multipath.overrides | This section defines values for attributes that should override the
device-specific settings for all devices.
|
| options/nixos/services.openssh.knownHosts.<name>.hostNames | A list of host names and/or IP numbers used for accessing
the host's ssh service
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.settings.<name>.force | Forcibly override any existing configuration for
this extension.
|
| options/nixos/services.quicktun.<name>.upScript | Run specified command or script after the tunnel device has been opened.
|
| options/nixos/services.redis.servers.<name>.slowLogMaxLen | Maximum number of items to keep in slow log.
|
| options/nixos/systemd.slices.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/systemd.timers.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/services.kimai.sites.<name>.poolConfig | Options for the Kimai PHP pool
|
| options/nixos/services.fedimintd.<name>.ui.port | TCP Port to bind on for UI connections
|
| options/nixos/services.ghostunnel.servers.<name>.allowURI | Allow client if URI subject alternative name appears in the list.
|
| options/nixos/services.ghostunnel.servers.<name>.allowDNS | Allow client if DNS subject alternative name appears in the list.
|
| options/home-manager/launchd.agents.<name>.config.ExitTimeOut | The amount of time launchd waits before sending a SIGKILL signal
|
| options/nixos/services.librenms.dataDir | Path of the LibreNMS state directory.
|
| options/nixos/hardware.pcmcia.config | Path to the configuration file which maps the memory, IRQs
and ports used by the PCMCIA hardware.
|
| options/nixos/services.gatus.configFile | Path to the Gatus configuration file
|
| options/nixos/services.code-server.socket | Path to a socket (bind-addr will be ignored).
|
| options/nixos/services.self-deploy.sshKeyFile | Path to SSH private key used to fetch private repositories over
SSH.
|
| options/nixos/services.opengfw.rulesFile | Path to file containing OpenGFW rules.
|
| options/nixos/services.h2o.hosts.<name>.tls.policy | add will additionally listen for TLS connections. only will
disable TLS connections. force will redirect non-TLS traffic
to the TLS connection.
|
| options/home-manager/launchd.agents.<name>.config.Umask | This optional key specifies what value should be passed to umask(2) before running the job
|
| options/nixos/services.httpd.virtualHosts.<name>.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/nixos/security.pam.services.<name>.enable | Whether to enable this PAM service.
|
| options/nixos/services.ax25.axports.<name>.package | The ax25-tools package to use.
|
| options/nixos/services.nylon.<name>.verbosity | Enable verbose output, default is to not be verbose.
|
| options/nixos/systemd.network.links.<name>.extraConfig | Extra configuration append to unit
|
| options/nixos/services.cjdns.ETHInterface.connectTo.<name>.peerName | (optional) human-readable name for peer
|
| options/nixos/services.cjdns.UDPInterface.connectTo.<name>.peerName | (optional) human-readable name for peer
|
| options/nixos/services.rsync.jobs.<name>.inhibit | Run the rsync process with an inhibition lock taken;
see systemd-inhibit(1) for a list of possible operations.
|
| options/home-manager/xdg.cacheFile.<name>.executable | Set the execute bit
|
| options/home-manager/xdg.stateFile.<name>.executable | Set the execute bit
|
| options/home-manager/launchd.agents.<name>.config.StartOnMount | This optional key causes the job to be started every time a filesystem is mounted.
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites.<name>.desktopEntry.enable | Whether to enable the desktop entry for this site.
|
| options/nixos/programs.dms-shell.plugins.<name>.enable | Whether to enable this plugin
|
| options/nixos/boot.initrd.systemd.contents.<name>.text | Text of the file.
|
| options/nixos/services.awstats.configs.<name>.type | The type of log being collected.
|
| options/nixos/users.ldap.base | The distinguished name of the search base.
|
| options/nixos/services.anubis.instances.<name>.settings.BIND | The address that Anubis listens to
|
| options/home-manager/programs.ssh.matchBlocks.<name>.host | Host pattern used by this conditional block
|
| options/home-manager/accounts.email.accounts.<name>.meli.mailboxAliases | Folder display name
|
| options/nixos/security.pam.services.<name>.otpwAuth | If set, the OTPW system will be used (if
~/.otpw exists).
|
| options/nixos/services.znapzend.zetup.<name>.destinations.<name>.plan | The znapzend backup plan to use for the source
|
| options/nixos/networking.fooOverUDP.<name>.local.address | Local address to bind to
|
| options/nixos/services.bitcoind.<name>.package | The bitcoind package to use.
|
| options/nixos/services.sympa.settingsFile.<name>.text | Text of the file.
|
| options/nixos/services.bacula-sd.device.<name>.mediaType | The specified name-string names the type of media supported by this
device, for example, DLT7000
|
| options/nixos/systemd.user.units.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/services.h2o.hosts.<name>.acme.enable | Whether to ask Let’s Encrypt to sign a certificate for this
virtual host
|
| options/nixos/services.fedimintd.<name>.p2p.url | Public address for p2p connections from peers (if TCP is used)
|
| options/home-manager/services.podman.builds.<name>.autoStart | Whether to start the build on boot
|
| options/home-manager/services.podman.images.<name>.autoStart | Whether to pull the image on boot
|
| options/nixos/systemd.user.targets.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/systemd.user.sockets.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/security.acme.certs.<name>.server | ACME Directory Resource URI
|
| options/nixos/networking.greTunnels.<name>.ttl | The time-to-live/hoplimit of the connection to the remote tunnel endpoint.
|
| options/nixos/services.h2o.hosts.<name>.tls.identity | Key / certificate pairs for the virtual host.
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.zsk | Key policy for zone signing keys
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.ksk | Key policy for key signing keys
|
| options/nixos/services.ndppd.proxies.<name>.router | Turns on or off the router flag for Neighbor Advertisement Messages.
|
| options/home-manager/services.podman.volumes.<name>.group | The group ID owning the volume inside the container.
|
| options/nixos/services.tahoe.nodes.<name>.sftpd.port | The port on which the SFTP server will listen
|
| options/nixos/services.keepalived.vrrpScripts.<name>.group | Name of group to run the script under
|
| options/nixos/systemd.services.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/services.headscale.settings.database.postgres.name | Database name.
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.slot | Which slot on the YubiKey to challenge.
|
| options/nixos/services.dokuwiki.sites.<name>.acl.*.page | Page or namespace to restrict
|
| options/nixos/services.drupal.sites.<name>.configSyncDir | The location of the Drupal config sync directory.
|
| options/nixos/services.i2pd.inTunnels.<name>.outbound.quantity | Number of simultaneous ‹name› tunnels.
|
| options/nixos/boot.loader.grub.users.<name>.password | Specifies the clear text password for the account
|
| options/nixos/systemd.timers.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.slices.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.user.timers.<name>.timerConfig | Each attribute in this set specifies an option in the
[Timer] section of the unit
|
| options/nixos/services.rspamd.workers.<name>.type | The type of this worker
|
| options/nixos/systemd.sockets.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/systemd.targets.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/services.jupyter.kernels.<name>.argv | Command and arguments to start the kernel.
|
| options/nixos/services.bacula-sd.director.<name>.tls | TLS Options for the Director in this Configuration.
|
| options/nixos/services.bepasty.servers.<name>.bind | Bind address to be used for this server.
|
| options/nixos/services.bacula-fd.director.<name>.tls | TLS Options for the Director in this Configuration.
|
| options/nixos/services.redis.servers.<name>.slaveOf.port | port of the Redis master
|
| options/nixos/services.netbird.tunnels.<name>.port | Port the NetBird client listens on.
|
| options/nixos/services.netbird.clients.<name>.port | Port the NetBird client listens on.
|
| options/home-manager/accounts.email.accounts.<name>.imap.tls | Configuration for secure connections.
|
| options/home-manager/accounts.email.accounts.<name>.smtp.tls | Configuration for secure connections.
|
| options/nixos/services.quorum.nodekeyFile | Path to the nodekey.
|
| options/nixos/services.klipper.apiSocket | Path of the API socket to create.
|
| options/nixos/services.bird-lg.proxy.birdSocket | Bird control socket path.
|
| options/nixos/services.dovecot2.sslCACert | Path to the server's CA certificate key.
|
| options/nixos/services.klipper.configDir | Path to Klipper config file.
|
| options/nixos/services.llama-swap.tls.keyFile | Path to the TLS private key file
|
| options/nixos/services.munge.password | The path to a daemon's secret key.
|
| options/nixos/services.nginx.proxyCachePath | Configure a proxy cache path entry
|
| options/nixos/services.llama-swap.tls.certFile | Path to the TLS certificate file
|
| options/nixos/services.netbox.secretKeyFile | Path to a file containing the secret key.
|
| options/nixos/services.oink.secretApiKeyFile | Path to a file containing the secret API key to use when modifying DNS records.
|
| options/nixos/services.soju.configFile | Path to config file
|
| options/nixos/services.v2ray.configFile | The absolute path to the configuration file
|
| options/home-manager/programs.rofi.terminal | Path to the terminal which will be used to run console applications
|
| options/home-manager/vdirsyncer.postHook | Command to call for each item creation and modification
|
| options/home-manager/services.twmn.icons.warning | Path to the warning notifications' icon.
|
| options/nixos/security.pam.services.<name>.unixAuth | Whether users can log in with passwords defined in
/etc/shadow.
|
| options/nixos/services.redis.servers.<name>.logLevel | Specify the server verbosity level, options: debug, verbose, notice, warning.
|
| options/nixos/services.geth.<name>.websocket.apis | APIs to enable over WebSocket
|
| options/nixos/virtualisation.lxc.unprivilegedContainers | Whether to enable support for unprivileged users to launch containers.
|
| options/nixos/openstack.zfs.datasets.<name>.mount | Where to mount this dataset.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/security.acme.certs.<name>.listenHTTP | Interface and port to listen on to solve HTTP challenges
in the form [INTERFACE]:PORT
|
| options/nixos/networking.wlanInterfaces.<name>.device | The name of the underlying hardware WLAN device as assigned by udev.
|
| options/nixos/services.iodine.clients.<name>.relay | DNS server to use as an intermediate relay to the iodined server
|
| options/home-manager/services.podman.volumes.<name>.image | Specifies the image the volume is based on when Driver is set to the image.
|
| options/home-manager/programs.floorp.profiles.<name>.id | Profile ID
|
| options/nixos/security.acme.certs.<name>.ocspMustStaple | Turns on the OCSP Must-Staple TLS extension
|
| options/nixos/services.awstats.configs.<name>.webService.hostname | The hostname the web service appears under.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/systemd.services.<name>.startAt | Automatically start this unit at the given date/time, which
must be in the format described in
systemd.time(7)
|
| options/nixos/services.r53-ddns.hostname | Manually specify the hostname
|
| options/nixos/services.i2pd.outTunnels.<name>.outbound.quantity | Number of simultaneous ‹name› tunnels.
|
| options/nixos/services.kubernetes.kubelet.taints.<name>.key | Key of taint.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.keyd.keyboards.<name>.ids | Device identifiers, as shown by keyd(1).
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.fwmark | If given, sets the SO_MARK option on the TCP socket.
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.fwmark | If given, sets the SO_MARK option on the TCP socket.
|
| options/home-manager/services.podman.builds.<name>.tlsVerify | Require HTTPS and verification of certificates when contacting registries.
|
| options/home-manager/services.podman.images.<name>.tlsVerify | Require HTTPS and verification of certificates when contacting registries.
|
| options/nixos/services.kanidm.provision.persons.<name>.legalName | Full legal name
|
| options/nixos/systemd.user.slices.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/systemd.nspawn.<name>.networkConfig | Each attribute in this set specifies an option in the
[Network] section of this unit
|
| options/nixos/systemd.sockets.<name>.socketConfig | Each attribute in this set specifies an option in the
[Socket] section of the unit
|
| options/nixos/systemd.user.timers.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/services.tahoe.introducers.<name>.nickname | The nickname of this Tahoe introducer.
|
| options/nixos/services.drupal.sites.<name>.modulesDir | The location for users to install Drupal modules.
|
| options/nixos/security.acme.certs.<name>.extraLegoRenewFlags | Additional flags to pass to lego renew.
|
| options/nixos/services.i2pd.inTunnels.<name>.accessList | I2P nodes that are allowed to connect to this service.
|
| options/nixos/services.openvpn.servers.<name>.down | Shell commands executed when the instance is shutting down.
|
| options/nixos/services.public-inbox.inboxes.<name>.url | URL where this inbox can be accessed over HTTP.
|
| options/nixos/systemd.network.networks.<name>.DHCP | Whether to enable DHCP on the interfaces matched.
|
| options/nixos/services.yandex-disk.username | Your yandex.com login name.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.bitcoind.<name>.testnet | Whether to use the testnet instead of mainnet.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.actors.<name>.email | The email address used to authenticate as this account
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.settings.<name>.force | Forcibly override any existing configuration for
this extension.
|
| options/nixos/security.pam.services.<name>.pamMount | Enable PAM mount (pam_mount) system to mount filesystems on user login.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.auth.<name>.adapter | The auth adapter type
|
| options/nixos/services.httpd.virtualHosts.<name>.hostName | Canonical hostname for the server.
|
| options/nixos/services.caddy.virtualHosts.<name>.hostName | Canonical hostname for the server.
|
| options/nixos/services.rss2email.feeds.<name>.url | The URL at which to fetch the feed.
|
| options/home-manager/services.podman.volumes.<name>.driver | The volume driver to use.
|
| options/home-manager/services.podman.volumes.<name>.labels | The labels to apply to the volume.
|
| options/nixos/services.duckdns.tokenFile | The path to a file containing the token
used to authenticate with DuckDNS.
|
| options/nixos/services.terraria.dataDir | Path to variable state data directory for terraria.
|
| options/nixos/services.sogo.ealarmsCredFile | Optional path to a credentials file for email alarms
|
| options/nixos/services.pangolin.dataDir | Path to variable state data directory for Pangolin.
|
| options/nixos/services.stash.jwtSecretKeyFile | Path to file containing a secret used to sign JWT tokens.
|
| options/darwin/nixpkgs.source | The path to import Nixpkgs from
|
| options/home-manager/programs.sm64ex.baserom | The path to the Super Mario 64 baserom to extract assets from.
|
| options/darwin/homebrew.brewPrefix | The path prefix where the brew executable is located
|
| options/home-manager/accounts.email.accounts.<name>.gpg.key | The key to use as listed in gpg --list-keys.
|
| options/nixos/services.fedimintd.<name>.enable | Whether to enable fedimintd.
|
| options/nixos/users.users.<name>.linger | Whether to enable or disable lingering for this user
|
| options/nixos/services.multipath.devices.*.san_path_err_forget_rate | If set to a value greater than 0, multipathd will check whether the path
failures has exceeded the san_path_err_threshold within this many checks
i.e san_path_err_forget_rate
|
| options/nixos/services.nsd.zones.<name>.provideXFR | Allow these IPs and TSIG to transfer zones, addr TSIG|NOKEY|BLOCKED
address range 192.0.2.0/24, 1.2.3.4&255.255.0.0, 3.0.2.20-3.0.2.40
|
| options/nixos/services.metricbeat.modules.<name>.module | The name of the module
|
| options/nixos/services.fedimintd.<name>.p2p.port | Port to bind on for p2p connections from peers (both TCP and UDP)
|
| options/nixos/services.fedimintd.<name>.p2p.bind | Address to bind on for p2p connections from peers (both TCP and UDP)
|
| options/nixos/virtualisation.emptyDiskImages.*.driveConfig.name | A name for the drive
|
| options/nixos/services.geth.<name>.metrics.address | Listen address of Go Ethereum metrics service.
|
| options/nixos/services.drupal.sites.<name>.phpOptions | Options for PHP's php.ini file for this Drupal site.
|
| options/darwin/launchd.daemons.<name>.serviceConfig | Each attribute in this set specifies an option for a key in the plist.
https://developer.apple.com/legacy/library/documentation/Darwin/Reference/ManPages/man5/launchd.plist.5.html
|
| options/nixos/systemd.user.units.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.user.services.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/services.matrix-conduit.settings.global.database_path | Path to the conduit database, the directory where conduit will save its data
|
| options/nixos/networking.bonds.<name>.mode | DEPRECATED, use driverOptions
|
| options/nixos/services.namecoind.rpc.user | User name for RPC connections.
|
| options/nixos/boot.loader.systemd-boot.windows.<name>.title | The title of the boot menu entry.
|
| options/nixos/services.openafsServer.cellServDB.<name>.*.ip | IP Address of a database server
|
| options/nixos/services.openafsClient.cellServDB.<name>.*.ip | IP Address of a database server
|
| options/nixos/services.tahoe.nodes.<name>.helper.enable | Whether to enable helper service.
|
| options/nixos/services.nginx.proxyCachePath.<name>.keysZoneSize | Set size to shared memory zone.
|
| options/nixos/services.rspamd.locals.<name>.enable | Whether this file locals should be generated
|
| options/nixos/systemd.slices.<name>.requisite | Similar to requires
|
| options/nixos/systemd.timers.<name>.requisite | Similar to requires
|
| options/home-manager/xdg.desktopEntries.<name>.settings | Extra key-value pairs to add to the [Desktop Entry] section
|
| options/nixos/services.hans.clients.<name>.extraConfig | Additional command line parameters
|
| options/nixos/services.dokuwiki.sites.<name>.stateDir | Location of the DokuWiki state directory.
|
| options/nixos/services.iodine.clients.<name>.server | Hostname of server running iodined
|
| options/nixos/services.restic.backups.<name>.checkOpts | A list of options for 'restic check'.
|
| options/nixos/services.rspamd.workers.<name>.enable | Whether to run the rspamd worker.
|
| options/home-manager/accounts.email.accounts.<name>.imap.host | Hostname of IMAP server.
|
| options/home-manager/accounts.email.accounts.<name>.smtp.host | Hostname of SMTP server.
|
| options/home-manager/services.podman.volumes.<name>.autoStart | Whether to create the volume on boot.
|
| options/nixos/services.wordpress.sites.<name>.extraConfig | Any additional text to be appended to the wp-config.php
configuration file
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey | The options to use for this LUKS device in YubiKey-PBA
|
| options/nixos/systemd.sockets.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/systemd.services.<name>.scriptArgs | Arguments passed to the main process script
|
| options/nixos/systemd.targets.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/darwin/services.github-runners.<name>.user | User under which to run the service
|
| options/nixos/hardware.alsa.controls.<name>.maxVolume | The maximum volume in dB.
|
| options/darwin/programs.tmux.tmuxOptions.<name>.enable | Whether this file should be generated
|
| options/nixos/virtualisation.lxd.recommendedSysctlSettings | Enables various settings to avoid common pitfalls when
running containers requiring many file operations
|
| options/nixos/boot.specialFileSystems.<name>.mountPoint | Location where the file system will be mounted
|
| options/nixos/security.auditd.plugins.<name>.args | This allows you to pass arguments to the child program
|
| options/nixos/networking.macvlans.<name>.mode | The mode of the macvlan device.
|
| options/home-manager/home.file.<name>.recursive | If the file source is a directory, then this option
determines whether the directory should be recursively
linked to the target location
|
| options/nixos/fileSystems.<name>.options | Options used to mount the file system
|
| options/nixos/services.artalk.configFile | Artalk config file path
|
| options/nixos/services.gitea.minioAccessKeyId | Path to a file containing the Minio access key id.
|
| options/nixos/services.dnsmasq.configFile | Path to the configuration file of dnsmasq.
|
| options/nixos/services.erigon.secretJwtPath | Path to the secret jwt used for the http api authentication.
|
| options/nixos/services.getty.loginProgram | Path to the login binary executed by agetty.
|
| options/nixos/services.klipper.configFile | Path to default Klipper config.
|
| options/nixos/programs.less.configFile | Path to lesskey configuration file.
configFile takes precedence over commands,
clearDefaultCommands, lineEditingKeys, and
envVariables.
|
| options/nixos/services.portunus.stateDir | Path where Portunus stores its state.
|
| options/nixos/services.terraria.banListPath | The path to the ban list.
|
| options/nixos/services.mailman.restApiPassFile | Path to the file containing the value for MAILMAN_REST_API_PASS.
|
| options/home-manager/accounts.contact.basePath | The base directory in which to save contacts
|
| options/home-manager/programs.git.signing.signer | Path to signer binary to use.
|
| options/home-manager/programs.gpg.publicKeys.*.source | Path of an OpenPGP public key file.
|
| options/nixos/services.grafana.settings.paths.plugins | Directory where grafana will automatically scan and look for plugins
|
| options/nixos/services.kimai.sites.<name>.settings | Structural Kimai's local.yaml configuration
|
| options/nixos/services.geth.<name>.authrpc.address | Listen address of Go Ethereum Auth RPC API.
|
| options/nixos/services.restic.backups.<name>.runCheck | Whether to run the check command with the provided checkOpts options.
|
| options/nixos/services.phpfpm.pools.<name>.phpPackage | The PHP package to use for running this PHP-FPM pool.
|
| options/nixos/systemd.sockets.<name>.listenStreams | For each item in this list, a ListenStream
option in the [Socket] section will be created.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig | Each attribute in this set specifies an option for a key in the plist.
https://developer.apple.com/legacy/library/documentation/Darwin/Reference/ManPages/man5/launchd.plist.5.html
|
| options/darwin/environment.etc.<name>.enable | Whether this file should be generated
|
| options/darwin/users.groups.<name>.description | The group's description.
|
| options/nixos/systemd.network.links.<name>.linkConfig | Each attribute in this set specifies an option in the
[Link] section of the unit
|
| options/nixos/services.bacula-sd.director.<name>.tls.require | Require TLS or TLS-PSK encryption
|
| options/nixos/services.bacula-fd.director.<name>.tls.require | Require TLS or TLS-PSK encryption
|
| options/nixos/services.geth.<name>.websocket.port | Port number of Go Ethereum WebSocket API.
|
| options/nixos/services.sympa.domains.<name>.webHost | Domain part of the web interface URL (no web interface for this domain if null)
|
| options/nixos/services.nylon.<name>.deniedIPRanges | Denied client IP ranges, these gets evaluated after the allowed IP ranges, defaults to all IPv4 addresses:
[ "0.0.0.0/0" ]
To block all other access than the allowed.
|
| options/nixos/services.fedimintd.<name>.api.url | Public URL of the API address of the reverse proxy/tls terminator
|
| options/nixos/services.drupal.sites.<name>.poolConfig | Options for the Drupal PHP pool
|
| options/nixos/systemd.sockets.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.targets.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.MulticastGroup | This optional key can be used to request that the datagram socket join a multicast group
|
| options/nixos/security.auditd.plugins.<name>.active | Whether to enable Whether to enable this plugin.
|
| options/nixos/services.dokuwiki.sites.<name>.acl.*.actor | User or group to restrict
|
| options/nixos/systemd.user.timers.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/systemd.user.slices.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/services.bitcoind.<name>.extraConfig | Additional configurations to be appended to bitcoin.conf.
|
| options/nixos/security.pam.services.<name>.limits.*.type | Type of this limit
|
| options/home-manager/programs.ssh.matchBlocks.<name>.match | Match block conditions used by this block
|
| options/nixos/services.fedimintd.<name>.api.bind | Address to bind on for API connections relied by the reverse proxy/tls terminator.
|
| options/nixos/services.fedimintd.<name>.api.port | Port to bind on for API connections relied by the reverse proxy/tls terminator.
|
| options/home-manager/programs.gradle.initScripts.<name>.text | Text of the init script file. if this option is null
then source must be set.
|
| options/home-manager/xdg.configFile.<name>.executable | Set the execute bit
|
| options/home-manager/services.activitywatch.watchers.<name>.executable | The name of the executable of the watcher
|
| options/nixos/ec2.zfs.datasets.<name>.properties | Properties to set on this dataset.
|
| options/nixos/services.logcheck.ignore.<name>.level | Set the logcheck level.
|
| options/nixos/services.sanoid.datasets.<name>.daily | Number of daily snapshots.
|
| options/nixos/services.znapzend.zetup.<name>.enable | Whether to enable this source.
|
| options/home-manager/launchd.agents.<name>.config.MachServices | This optional key is used to specify Mach services to be registered with the Mach bootstrap sub-system
|
| options/nixos/services.inadyn.settings.provider.<name>.hostname | Hostname alias(es).
|
| options/nixos/services.inadyn.settings.provider.<name>.username | Username for this DDNS provider.
|
| options/nixos/services.h2o.hosts.<name>.serverAliases | Additional names of virtual hosts served by this virtual host
configuration.
|
| options/nixos/security.acme.certs.<name>.extraDomainNames | A list of extra domain names, which are included in the one certificate to be issued.
|
| options/nixos/systemd.user.services.<name>.upholds | Keeps the specified running while this unit is running
|
| options/darwin/launchd.agents.<name>.serviceConfig.Nice | This optional key specifies what nice(3) value should be applied to the daemon.
|
| options/nixos/services.hostapd.radios.<name>.noScan | Disables scan for overlapping BSSs in HT40+/- mode
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.slick.font.name | Name of the font to use.
|
| options/home-manager/programs.i3status-rust.bars.<name>.theme | The theme to use
|
| options/nixos/fileSystems.<name>.neededForBoot | If set, this file system will be mounted in the initial ramdisk
|
| options/nixos/services.rsync.jobs.<name>.settings | Settings that should be passed to rsync via long options
|
| options/nixos/systemd.user.slices.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.user.timers.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/environment.homeBinInPath | Include ~/bin/ in $PATH.
|
| options/nixos/services.corerad.configFile | Path to CoreRAD TOML configuration file.
|
| options/nixos/services.public-inbox.nntp.key | Path to TLS key to use for connections to public-inbox-nntpd(1).
|
| options/nixos/services.nextcloud.home | Storage path of nextcloud.
|
| options/nixos/services.public-inbox.imap.key | Path to TLS key to use for connections to public-inbox-imapd(1).
|
| options/nixos/services.solanum.motd | Solanum MOTD text
|
| options/nixos/services.lasuite-meet.bind | The path, host/port or file descriptior to bind the gunicorn socket to
|
| options/nixos/services.lasuite-docs.bind | The path, host/port or file descriptior to bind the gunicorn socket to
|
| options/nixos/services.webdav.configFile | Path to config file
|
| options/nixos/services.webhook.urlPrefix | The URL path prefix to use for served hooks (protocol://yourserver:port/${prefix}/hook-id).
|
| options/home-manager/services.hound.databasePath | The Hound database path.
|
| options/nixos/systemd.targets.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/systemd.sockets.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.gtk.theme.name | Name of the theme to use for the lightdm-gtk-greeter.
|
| options/nixos/security.pam.services.<name>.p11Auth | If set, keys listed in
~/.ssh/authorized_keys and
~/.eid/authorized_certificates
can be used to log in with the associated PKCS#11 tokens.
|
| options/nixos/services.ndppd.proxies.<name>.rules | This is a rule that the target address is to match against
|
| options/home-manager/launchd.agents.<name>.config.GroupName | This optional key specifies the group to run the job as
|
| options/nixos/services.mobilizon.settings.":mobilizon".":instance".name | The fallback instance name if not configured into the admin UI
|
| options/nixos/security.pam.services.<name>.limits.*.item | Item this limit applies to
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.packages | List of ‹name› add-on packages to install for this profile
|
| options/nixos/services.h2o.hosts.<name>.settings | Attrset to be transformed into YAML for host config
|
| options/nixos/security.pam.services.<name>.mysqlAuth | If set, the pam_mysql module will be used to
authenticate users against a MySQL/MariaDB database.
|
| options/nixos/security.acme.certs.<name>.directory | Directory where certificate and other state is stored.
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.nodelay | Enables TCP_NODELAY on the TCP socket.
|
| options/nixos/services.nsd.zones.<name>.rrlWhitelist | Whitelists the given rrl-types.
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.forward | The IP and port to forward all traffic to.
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.forward | The IP and port to forward all traffic to.
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.nodelay | Enables TCP_NODELAY on the TCP socket.
|
| options/nixos/services.prometheus.exporters.rtl_433.channels.*.name | Name to match.
|
| options/nixos/services.homebridge.settings.accessories.*.name | Name of the accessory
|
| options/nixos/environment.etc.<name>.enable | Whether this /etc file should be generated
|
| options/nixos/networking.greTunnels.<name>.type | Whether the tunnel routes layer 2 (tap) or layer 3 (tun) traffic.
|
| options/nixos/boot.initrd.luks.devices.<name>.keyFileTimeout | The amount of time in seconds for a keyFile to appear before
timing out and trying passwords.
|
| options/nixos/services.jupyterhub.kernels.<name>.displayName | Name that will be shown to the user.
|
| options/nixos/services.kimai.sites.<name>.database.user | Database user.
|
| options/nixos/services.logcheck.ignoreCron.<name>.user | User that runs the cronjob.
|
| options/nixos/services.prosody.virtualHosts.<name>.ssl | Paths to SSL files
|
| options/nixos/services.nebula.networks.<name>.isRelay | Whether this node is a relay.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.preferShortUsername | Use 'name' instead of 'spn' in the preferred_username claim
|
| options/nixos/networking.interfaces.<name>.useDHCP | Whether this interface should be configured with DHCP
|
| options/nixos/services.firezone.server.provision.accounts.<name>.groups.<name>.members | The members of this group
|
| options/home-manager/accounts.contact.accounts.<name>.local.encoding | File encoding for items, both content and file name
|
| options/nixos/security.dhparams.params.<name>.bits | The bit size for the prime that is used during a Diffie-Hellman
key exchange.
|
| options/nixos/systemd.user.services.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.user.services.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/home-manager/services.podman.machines.<name>.cpus | Number of CPUs to allocate to the machine
|
| options/home-manager/services.podman.machines.<name>.swap | Swap size in MB for the machine
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.postfix.masterConfig.<name>.type | The type of the service
|
| options/nixos/services.multipath.devices.*.revision | Regular expression to match the product revision
|
| options/nixos/services.multipath.devices.*.features | Specify any device-mapper features to be used
|
| options/nixos/services.honk.servername | The server name.
|
| options/nixos/services.opensearch.settings."cluster.name" | The name of the cluster.
|
| options/nixos/services.drupal.sites.<name>.virtualHost | Apache configuration can be done by adapting services.httpd.virtualHosts.
|
| options/nixos/systemd.user.timers.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/systemd.user.slices.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/home-manager/services.restic.backups.<name>.checkOpts | A list of options for 'restic check'
|
| options/nixos/services.buildkite-agents.<name>.tags | Tags for the agent.
|
| options/nixos/services.quicktun.<name>.protocol | Which protocol to use.
|
| options/darwin/services.buildkite-agents.<name>.tags | Tags for the agent.
|
| options/home-manager/xdg.dataFile.<name>.recursive | If the file source is a directory, then this option
determines whether the directory should be recursively
linked to the target location
|
| options/nixos/systemd.network.networks.<name>.dns | A list of dns servers to be added to the network section of the
unit
|
| options/nixos/systemd.network.networks.<name>.vrf | A list of vrf interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.network.networks.<name>.ntp | A list of ntp servers to be added to the network section of the
unit
|
| options/nixos/security.acme.certs.<name>.webroot | Where the webroot of the HTTP vhost is located.
.well-known/acme-challenge/ directory
will be created below the webroot if it doesn't exist.
http://example.org/.well-known/acme-challenge/ must also
be available (notice unencrypted HTTP).
|
| options/home-manager/programs.neovim.extraName | Extra name appended to the wrapper package name.
|
| options/nixos/services.anubis.instances | An attribute set of Anubis instances
|
| options/nixos/security.pam.services.<name>.updateWtmp | Whether to update /var/log/wtmp.
|
| options/nixos/networking.greTunnels.<name>.local | The address of the local endpoint which the remote
side should send packets to.
|
| options/nixos/services.bird-lg.frontend.nameFilter | Protocol names to hide in summary tables (RE2 syntax),
|
| options/nixos/services.nylon.<name>.bindInterface | Tell nylon which interface to use as an uplink, default is "enp3s0f0".
|
| options/darwin/launchd.agents.<name>.serviceConfig.Label | This required key uniquely identifies the job to launchd.
|
| options/nixos/services.nginx.virtualHosts.<name>.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.tor.relay.onionServices | See torrc manual.
Because tor.service runs in its own RootDirectory=,
when using a onion service to reverse-proxy to a Unix socket,
you need to make that Unix socket available
within the mount namespace of tor.service
|
| options/nixos/services.pingvin-share.dataDir | The path to the data directory in which Pingvin Share will store its data.
|
| options/nixos/services.gns3-server.ssl.certFile | Path to the SSL certificate file
|
| options/nixos/services.knot.enableXDP | Extends the systemd unit with permissions to allow for the use of
the eXpress Data Path (XDP).
Make sure to read up on functional limitations
when running in XDP mode.
|
| options/nixos/services.jenkinsSlave.home | The path to use as JENKINS_HOME
|
| options/nixos/services.atalkd.configFile | Optional path to a custom atalkd.conf file
|
| options/nixos/services.conman.configFile | The absolute path to the configuration file
|
| options/nixos/services.nipap.nipap-www.unixSocket | Path to UNIX socket to bind to.
|
| options/nixos/services.snmpd.configFile | Path to the snmpd.conf file
|
| options/nixos/services.k3s.agentTokenFile | File path containing the k3s token agents can use to connect to the server
|
| options/home-manager/programs.vivid.themes | An attribute set of vivid themes
|
| options/nixos/security.pam.services.<name>.enableUMask | If enabled, the pam_umask module will be loaded.
|
| options/nixos/services.acpid.handlers.<name>.action | Shell commands to execute when the event is triggered.
|
| options/nixos/services.logcheck.ignore.<name>.regex | Regex specifying which log lines to ignore.
|
| options/home-manager/services.restic.backups.<name>.runCheck | Whether to run 'restic check' with the provided checkOpts options
|
| options/nixos/systemd.sockets.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.targets.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/services.k3s.autoDeployCharts.<name>.repo | The repo of the Helm chart
|
| options/nixos/services.ax25.axports.<name>.callsign | The callsign of the physical interface to bind to.
|
| options/nixos/services.kimai.sites.<name>.database.host | Database host address.
|
| options/nixos/services.kimai.sites.<name>.database.port | Database host port.
|
| options/nixos/services.netbird.clients.<name>.logLevel | Log level of the NetBird daemon.
|
| options/nixos/services.netbird.tunnels.<name>.logLevel | Log level of the NetBird daemon.
|
| options/nixos/services.uhub.<name>.plugins.*.settings | Settings specific to this plugin.
|
| options/nixos/fileSystems.<name>.encrypted.enable | The block device is backed by an encrypted one, adds this device as a initrd luks entry.
|
| options/home-manager/programs.i3status-rust.bars.<name>.icons | The icons set to use
|
| options/nixos/services.riemann.extraClasspathEntries | Extra entries added to the Java classpath when running Riemann.
|
| options/darwin/services.github-runners.<name>.group | Group under which to run the service
|
| options/nixos/networking.wlanInterfaces | Creating multiple WLAN interfaces on top of one physical WLAN device (NIC)
|
| options/nixos/services.frp.instances.<name>.enable | Whether to enable frp.
|
| options/nixos/services.akkoma.frontends.<name>.ref | Akkoma frontend reference.
|
| options/nixos/services.tinc.networks.<name>.package | The tinc_pre package to use.
|
| options/nixos/services.redis.servers.<name>.unixSocketPerm | Change permissions for the socket
|
| options/nixos/services.github-runners.<name>.package | The github-runner package to use.
|
| options/darwin/services.github-runners.<name>.package | The github-runner package to use.
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.enso.theme.name | Name of the theme to use for the lightdm-enso-os-greeter
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.MulticastGroup | This optional key can be used to request that the datagram socket join a multicast group
|
| options/nixos/security.pam.services.<name>.makeHomeDir | Whether to try to create home directories for users
with $HOMEs pointing to nonexistent
locations on session login.
|
| options/nixos/services.easytier.instances.<name>.settings | Settings to generate easytier-‹name›.toml
|
| options/nixos/boot.initrd.luks.devices.<name>.fido2.gracePeriod | Time in seconds to wait for the FIDO2 key.
|
| options/nixos/boot.initrd.luks.devices.<name>.gpgCard.gracePeriod | Time in seconds to wait for the GPG Smartcard.
|
| options/home-manager/programs.firefox.profiles.<name>.id | Profile ID
|
| options/home-manager/services.colima.profiles.<name>.logFile | Combined stdout and stderr log file for the Colima service.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/systemd.user.services.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/security.pam.services.<name>.nodelay | Whether the delay after typing a wrong password should be disabled.
|
| options/home-manager/services.podman.images.<name>.extraConfig | INI sections and values to populate the Image Quadlet.
|
| options/home-manager/services.podman.builds.<name>.extraConfig | INI sections and values to populate the Build Quadlet.
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.settings.<name>.settings | Json formatted options for this extension.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.MulticastGroup | This optional key can be used to request that the datagram socket join a multicast group
|
| options/nixos/systemd.user.timers.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.user.slices.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/services.k3s.autoDeployCharts.<name>.hash | The hash of the packaged Helm chart
|
| options/nixos/services.drupal.sites.<name>.extraConfig | Extra configuration values that you want to insert into settings.php
|
| options/nixos/hardware.display.outputs.<name>.edid | An EDID filename to be used for configured display, as in edid/<filename>
|
| options/nixos/services.quicktun.<name>.timeWindow | Allowed time window for first received packet in seconds (positive number allows packets from history)
|
| options/nixos/services.phpfpm.pools.<name>.phpOptions | "Options appended to the PHP configuration file php.ini used for this PHP-FPM pool."
|
| options/nixos/systemd.user.targets.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/systemd.user.sockets.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.vmacInterface | Name of the vmac interface to use. keepalived will come up with a name
if you don't specify one.
|
| options/nixos/services.httpd.virtualHosts.<name>.adminAddr | E-mail address of the server administrator.
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.ksk.keySize | Key size in bits
|
| options/nixos/services.tor.relay.onionServices.<name>.map | See torrc manual.
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.zsk.keySize | Key size in bits
|
| options/nixos/services.filebeat.inputs.<name>.type | The input type
|
| options/nixos/services.tahoe.nodes.<name>.client.helper | The furl for a Tahoe helper node
|
| options/nixos/systemd.services.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/services.rke2.autoDeployCharts.<name>.repo | The repo of the Helm chart
|
| options/nixos/services.drupal.sites.<name>.virtualHost.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/nixos/services.cyrus-imap.cyrusConfigFile | Path to the configuration file used for Cyrus.
|
| options/nixos/services.bluesky-pds.goat.enable | Add goat to PATH
|
| options/nixos/services.incron.enable | Whether to enable the incron daemon
|
| options/nixos/services.i2pd.reseed.zipfile | Path to local .zip file to reseed from.
|
| options/nixos/services.darkhttpd.rootDir | Path from which to serve files.
|
| options/nixos/services.nagios.plugins | Packages to be added to the Nagios PATH
|
| options/nixos/services.rspamd.localLuaRules | Path of file to link to /etc/rspamd/rspamd.local.lua for local
rules written in Lua
|
| options/nixos/services.rutorrent.dataDir | Storage path of ruTorrent.
|
| options/nixos/services.public-inbox.imap.cert | Path to TLS certificate to use for connections to public-inbox-imapd(1).
|
| options/nixos/services.public-inbox.nntp.cert | Path to TLS certificate to use for connections to public-inbox-nntpd(1).
|
| options/nixos/services.rtorrent.rpcSocket | RPC socket path.
|
| options/nixos/services.rke2.agentTokenFile | File path containing the rke2 token agents can use to connect to the server
|
| options/home-manager/programs.claude-code.hooksDir | Path to a directory containing hook files for Claude Code
|
| options/nixos/security.pam.services.<name>.limits.*.value | Value of this limit
|
| options/nixos/services.k3s.manifests.<name>.enable | Whether this manifest file should be generated.
|
| options/home-manager/programs.smug.projects.<name>.windows | Windows to create in the project session
|
| options/nixos/services.postgresql.systemCallFilter.<name>.enable | Whether to enable ‹name› in postgresql's syscall filter.
|
| options/home-manager/accounts.email.accounts.<name>.imap.port | The port on which the IMAP server listens
|
| options/home-manager/accounts.email.accounts.<name>.smtp.port | The port on which the SMTP server listens
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.packages | List of ‹name› add-on packages to install for this profile
|
| options/nixos/services.nginx.virtualHosts.<name>.quic | Whether to enable the QUIC transport protocol
|
| options/nixos/services.firewalld.zones.<name>.short | Short description for the zone.
|
| options/nixos/services.firewalld.zones.<name>.rules | Rich rules for the zone.
|
| options/nixos/services.firewalld.zones.<name>.ports | Ports to allow in the zone.
|
| options/nixos/services.restic.backups.<name>.package | The restic package to use.
|
| options/home-manager/services.restic.backups.<name>.package | The restic package to use.
|
| options/nixos/services.jupyterhub.kernels.<name>.language | Language of the environment
|
| options/nixos/services.hostapd.radios.<name>.band | Specifies the frequency band to use, possible values are 2g for 2.4 GHz,
5g for 5 GHz, 6g for 6 GHz and 60g for 60 GHz.
|
| options/nixos/hardware.sane.brscan5.netDevices.<name>.ip | The ip address of the device
|
| options/nixos/security.pam.services.<name>.fprintAuth | If set, fingerprint reader will be used (if exists and
your fingerprints are enrolled).
|
| options/nixos/hardware.sane.brscan4.netDevices.<name>.ip | The ip address of the device
|
| options/nixos/security.acme.certs.<name>.dnsProvider | DNS Challenge provider
|
| options/nixos/services.fedimintd.<name>.package | The fedimint package to use.
|
| options/nixos/services.rspamd.overrides.<name>.text | Text of the file.
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.gtk.iconTheme.name | Name of the icon theme to use for the lightdm-gtk-greeter.
|
| options/nixos/services.kanidm.provision.persons.<name>.displayName | Display name
|
| options/nixos/networking.interfaces.<name>.virtualType | The type of interface to create
|
| options/nixos/systemd.user.services.<name>.startAt | Automatically start this unit at the given date/time, which
must be in the format described in
systemd.time(7)
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.slick.theme.name | Name of the theme to use for the lightdm-slick-greeter.
|
| options/nixos/services.pppd.peers.<name>.autostart | Whether the PPP session is automatically started at boot time.
|
| options/nixos/services.buildkite-agents.<name>.dataDir | The workdir for the agent
|
| options/darwin/system.activationScripts.<name>.text | Text of the file.
|
| options/darwin/services.buildkite-agents.<name>.dataDir | The workdir for the agent
|
| options/nixos/services.firezone.server.provision.accounts.<name>.policies.<name>.group | The group which should be allowed access to the given resource.
|
| options/nixos/services.phpfpm.pools.<name>.extraConfig | Extra lines that go into the pool configuration
|
| options/nixos/systemd.network.networks.<name>.bond | A list of bond interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.network.networks.<name>.vlan | A list of vlan interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.network.networks.<name>.xfrm | A list of xfrm interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.user.sockets.<name>.socketConfig | Each attribute in this set specifies an option in the
[Socket] section of the unit
|
| options/nixos/services.cjdns.ETHInterface.connectTo.<name>.hostname | Optional hostname to add to /etc/hosts; prevents reverse lookup failures.
|
| options/nixos/services.cjdns.UDPInterface.connectTo.<name>.hostname | Optional hostname to add to /etc/hosts; prevents reverse lookup failures.
|
| options/nixos/services.redis.servers.<name>.extraParams | Extra parameters to append to redis-server invocation
|
| options/nixos/services.rke2.autoDeployCharts.<name>.hash | The hash of the packaged Helm chart
|
| options/nixos/services.gitwatch.<name>.message | Optional text to use in as commit message; all occurrences of %d will be replaced by formatted date/time
|
| options/nixos/services.headscale.settings.derp.paths | List of file paths containing DERP maps
|
| options/nixos/services.tahoe.nodes.<name>.storage.enable | Whether to enable storage service.
|
| options/nixos/services.wyoming.piper.servers.<name>.uri | URI to bind the wyoming server to.
|
| options/home-manager/accounts.email.accounts.<name>.mu.enable | Whether to enable mu indexing.
|
| options/home-manager/programs.vscode.profiles.<name>.enableMcpIntegration | Whether to integrate the MCP servers config from
programs.mcp.servers into
programs.vscode.profiles.<name>.userMcp
|
| options/nixos/services.redis.servers.<name>.user | User account under which this instance of redis-server runs.
If left as the default value this user will automatically be
created on system activation, otherwise you are responsible for
ensuring the user exists before the redis service starts.
|
| options/nixos/services.dokuwiki.sites.<name>.acl.*.level | Permission level to restrict the actor(s) to
|
| options/nixos/programs.neovim.runtime.<name>.enable | Whether this runtime directory should be generated
|
| options/nixos/services.spiped.config.<name>.encrypt | Take unencrypted connections from the
source socket and send encrypted
connections to the target socket.
|
| options/nixos/services.spiped.config.<name>.decrypt | Take encrypted connections from the
source socket and send unencrypted
connections to the target socket.
|
| options/nixos/systemd.targets.<name>.requisite | Similar to requires
|
| options/nixos/systemd.sockets.<name>.requisite | Similar to requires
|
| options/home-manager/launchd.agents.<name>.config.ServiceIPC | This optional key specifies whether the job participates in advanced
communication with launchd
|
| options/nixos/services.znapzend.zetup.<name>.plan | The znapzend backup plan to use for the source
|
| options/nixos/networking.greTunnels.<name>.remote | The address of the remote endpoint to forward traffic over.
|
| options/nixos/services.nginx.virtualHosts.<name>.listen.*.ssl | Enable SSL.
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.keyttl | TTL for dnssec records
|
| options/nixos/services.rke2.manifests.<name>.enable | Whether this manifest file should be generated.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.proxyCommand | The command to use to connect to the server.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.extraOptions | Extra configuration options for the host.
|
| options/nixos/security.auditd.plugins.<name>.type | This tells the dispatcher how the plugin wants to be run
|
| options/nixos/services.nsd.zones.<name>.maxRefreshSecs | Limit refresh time for secondary zones
|
| options/nixos/services.ndppd.proxies.<name>.timeout | Controls how long to wait for a Neighbor Advertisement Message before
invalidating the entry, in milliseconds.
|
| options/nixos/services.quicktun.<name>.remoteFloat | Whether to allow the remote address and port to change when properly encrypted packets are received.
|
| options/nixos/services.ceph.global.mgrModulePath | Path at which to find ceph-mgr modules.
|
| options/nixos/services.disnix.profiles | Names of the Disnix profiles to expose in the system's PATH
|
| options/nixos/services.cyrus-imap.imapdConfigFile | Path to the configuration file used for cyrus-imap.
|
| options/nixos/services.dolibarr.nginx.root | The path of the web root directory.
|
| options/nixos/services.gocd-agent.packages | Packages to add to PATH for the Go
|
| options/nixos/services.fediwall.nginx.root | The path of the web root directory.
|
| options/nixos/services.agorakit.nginx.root | The path of the web root directory.
|
| options/nixos/services.librenms.nginx.root | The path of the web root directory.
|
| options/nixos/services.ceph.global.rgwMimeTypesFile | Path to mime types used by radosgw.
|
| options/nixos/programs.command-not-found.dbPath | Absolute path to programs.sqlite
|
| options/nixos/services.kanboard.nginx.root | The path of the web root directory.
|
| options/nixos/services.athens.unixSocket | Path to the unix socket file
|
| options/nixos/services.pixelfed.nginx.root | The path of the web root directory.
|
| options/nixos/services.mainsail.nginx.root | The path of the web root directory.
|
| options/nixos/services.syncplay.motdFile | Path to text to display when users join
|
| options/nixos/services.monero.banlist | Path to a text file containing IPs to block
|
| options/nixos/services.sickbeard.dataDir | Path where to store data files.
|
| options/nixos/services.xserver.modules | Packages to be added to the module search path of the X server.
|
| options/home-manager/services.syncthing.key | Path to the key.pem file, which will be copied into Syncthing's
config directory.
|
| options/home-manager/services.twmn.icons.critical | Path to the critical notifications' icon.
|
| options/nixos/services.dokuwiki.sites.<name>.aclFile | Location of the dokuwiki acl rules
|
| options/nixos/services.sanoid.datasets.<name>.yearly | Number of yearly snapshots.
|
| options/nixos/services.sanoid.datasets.<name>.hourly | Number of hourly snapshots.
|
| options/nixos/services.nebula.networks.<name>.enable | Enable or disable this network.
|
| options/home-manager/services.podman.networks.<name>.driver | The network driver to use.
|
| options/home-manager/programs.obsidian.vaults.<name>.enable | Whether this vault should be generated.
|
| options/home-manager/services.podman.networks.<name>.labels | The labels to apply to the network.
|
| options/home-manager/services.podman.networks.<name>.subnet | The subnet to use for the network.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.type | The resource type
|
| options/nixos/services.fedimintd.<name>.nginx.fqdn | Public domain of the API address of the reverse proxy/tls terminator.
|
| options/home-manager/services.podman.machines.<name>.image | Bootable image to use for the machine
|
| options/nixos/systemd.shutdown | Definition of systemd shutdown executables
|
| options/nixos/services.znapzend.zetup.<name>.destinations.<name>.presend | Command to run before sending the snapshot to the destination
|
| options/nixos/services.graylog.rootUsername | Name of the default administrator user
|
| options/home-manager/services.dunst.settings.global.icon_path | Paths where dunst will look for icons.
|
| options/nixos/services.redis.servers.<name>.appendFsync | How often to fsync the append-only log, options: no, always, everysec.
|
| options/nixos/services.nginx.virtualHosts.<name>.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/systemd.network.netdevs.<name>.enable | Whether to manage network configuration using systemd-network
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.settings.<name>.force | Forcibly override any existing configuration for
this extension.
|
| options/nixos/services.suricata.settings.outputs.*.<name>.enabled | Whether to enable .
|
| options/nixos/services.ddclient.username | User name.
|
| options/nixos/services.github-runners.<name>.user | User under which to run the service
|
| options/nixos/services.i2pd.inTunnels.<name>.crypto.tagsToSend | Number of ElGamal/AES tags to send.
|
| options/nixos/services.httpd.virtualHosts.<name>.listen.*.ip | IP to listen on. 0.0.0.0 for IPv4 only, * for all.
|
| options/nixos/boot.initrd.luks.devices.<name>.keyFileSize | The size of the key file
|
| options/home-manager/xdg.cacheFile.<name>.recursive | If the file source is a directory, then this option
determines whether the directory should be recursively
linked to the target location
|
| options/home-manager/xdg.stateFile.<name>.recursive | If the file source is a directory, then this option
determines whether the directory should be recursively
linked to the target location
|
| options/nixos/programs.ssh.knownHosts.<name>.extraHostNames | A list of additional host names and/or IP numbers used for
accessing the host's ssh service
|
| options/darwin/programs.ssh.knownHosts.<name>.extraHostNames | A list of additional host names and/or IP numbers used for
accessing the host's ssh service
|
| options/nixos/services.httpd.virtualHosts.<name>.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| options/nixos/services.nginx.virtualHosts.<name>.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/systemd.user.slices.<name>.requisite | Similar to requires
|
| options/nixos/systemd.user.timers.<name>.requisite | Similar to requires
|
| options/nixos/services.drupal.sites.<name>.privateFilesDir | The location of the Drupal private files directory.
|
| options/nixos/security.pam.services.<name>.failDelay.delay | The delay time (in microseconds) on failure.
|
| options/nixos/services.openvpn.servers.<name>.autoStart | Whether this OpenVPN instance should be started automatically.
|
| options/home-manager/launchd.agents.<name>.config.InitGroups | This optional key specifies whether initgroups(3) should be called before running the job
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.enso.iconTheme.name | Name of the icon theme to use for the lightdm-enso-os-greeter
|
| options/home-manager/launchd.agents.<name>.config.OnDemand | This key was used in Mac OS X 10.4 to control whether a job was kept alive or not
|
| options/nixos/security.pam.services.<name>.limits | Attribute set describing resource limits
|
| options/nixos/systemd.user.sockets.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/systemd.user.services.<name>.scriptArgs | Arguments passed to the main process script
|
| options/nixos/systemd.user.targets.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/home-manager/launchd.agents.<name>.config.LimitLoadToHosts | This configuration file only applies to the hosts listed with this key
|
| options/nixos/services.quicktun.<name>.localAddress | IP address or hostname of the local end.
|
| options/nixos/systemd.network.netdevs.<name>.extraConfig | Extra configuration append to unit
|
| options/home-manager/services.pizauth.accounts.<name>.authUri | The OAuth2 server's authentication URI.
|
| options/home-manager/programs.floorp.profiles.<name>.search | Declarative search engine configuration.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.dynamicConfigScripts | All of these scripts will be executed in lexicographical order before hostapd
is started, right after the bss segment was generated and may dynamically
append bss options to the generated configuration file
|
| options/nixos/security.acme.certs.<name>.renewInterval | Systemd calendar expression when to check for renewal
|
| options/nixos/systemd.services.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.settings.<name>.settings | Json formatted options for this extension.
|
| options/nixos/services.dokuwiki.sites.<name>.package | The dokuwiki package to use.
|
| options/nixos/services.drupal.sites.<name>.database.user | Database user.
|
| options/nixos/services.znapzend.zetup.<name>.dataset | The dataset to use for this source.
|
| options/home-manager/accounts.email.accounts.<name>.aliases | Alternative identities of this account.
|
| options/home-manager/accounts.email.accounts.<name>.address | The email address of this account.
|
| options/home-manager/services.restic.backups.<name>.ssh-package | The openssh package to use.
|
| options/home-manager/accounts.contact.accounts.<name>.local | Local configuration for the contacts.
|
| options/home-manager/accounts.email.accounts.<name>.maildir | Maildir configuration for this account.
|
| options/home-manager/accounts.email.accounts.<name>.folders | Standard email folders.
|
| options/home-manager/programs.sftpman.mounts.<name>.beforeMount | Command to run before mounting.
|
| options/nixos/programs.ssh.knownHosts.<name>.publicKey | The public key data for the host
|
| options/darwin/programs.ssh.knownHosts.<name>.publicKey | The public key data for the host
|
| options/nixos/systemd.user.sockets.<name>.listenStreams | For each item in this list, a ListenStream
option in the [Socket] section will be created.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Nice | This optional key specifies what nice(3) value should be applied to the daemon.
|
| options/home-manager/services.podman.machines.<name>.diskSize | Disk size in GB for the machine
|
| options/nixos/systemd.watchdog.device | The path to a hardware watchdog device which will be managed by systemd
|
| options/nixos/services.angrr.configFile | Path to the angrr configuration file in TOML format
|
| options/nixos/services.dovecot2.sslServerKey | Path to the server's private key.
|
| options/nixos/services.beszel.agent.extraPath | Extra packages to add to beszel path (such as nvidia-smi or rocm-smi).
|
| options/nixos/services.gitea.metricsTokenFile | Path to a file containing the metrics authentication token.
|
| options/nixos/boot.initrd.systemd.storePaths.*.target | Path of the symlink.
|
| options/nixos/services.datadog-agent.apiKeyFile | Path to a file containing the Datadog API key to associate the
agent with your account.
|
| options/nixos/environment.localBinInPath | Add ~/.local/bin/ to $PATH
|
| options/nixos/services.syncthing.dataDir | The path where synchronised directories will exist.
|
| options/nixos/services.syncthing.key | Path to the key.pem file, which will be copied into Syncthing's
configDir.
|
| options/nixos/services.sftpgo.loadDataFile | Path to a json file containing users and folders to load (or update) on startup
|
| options/nixos/services.oxidized.routerDB | Path to the file/database which contains the targets for oxidized.
|
| options/nixos/services.portunus.seedPath | Path to a portunus seed file in json format
|
| options/nixos/services.stash.settings.cache | Path to cache
|
| options/nixos/services.wiki-js.settings.db.host | Hostname or socket-path to connect to.
|
| options/home-manager/programs.command-not-found.dbPath | Absolute path to programs.sqlite
|
| options/nixos/services.matrix-synapse.settings.signing_key_path | Path to the signing key to sign messages with.
|
| options/nixos/services.maubot.settings.server.plugin_base_path | The base path for plugin endpoints
|
| options/home-manager/accounts.calendar.accounts.<name>.local.encoding | File encoding for items, both content and file name
|
| options/nixos/services.keepalived.vrrpInstances.<name>.virtualIps.*.label | Each address may be tagged with a label string
|
| options/nixos/services.httpd.virtualHosts.<name>.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| options/nixos/services.nginx.virtualHosts.<name>.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| options/nixos/services.redis.servers.<name>.appendOnly | By default data is only periodically persisted to disk, enable this option to use an append-only file for improved persistence.
|
| options/nixos/services.spiped.config.<name>.timeout | Timeout, in seconds, after which an attempt to connect to
the target or a protocol handshake will be aborted (and the
connection dropped) if not completed
|
| options/home-manager/programs.ssh.matchBlocks.<name>.forwardX11 | Specifies whether X11 connections will be automatically redirected
over the secure channel and DISPLAY set.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.hashKnownHosts | Indicates that
ssh(1)
should hash host names and addresses when they are added to
the known hosts file.
|
| options/home-manager/programs.obsidian.defaultSettings.corePlugins.*.name | The plugin.
|
| options/nixos/services.grafana.settings.database.client_key_path | The path to the client key
|
| options/nixos/services.i2pd.outTunnels.<name>.crypto.tagsToSend | Number of ElGamal/AES tags to send.
|
| options/nixos/boot.initrd.systemd.contents.<name>.enable | Whether to enable copying of this file and symlinking it.
|
| options/nixos/systemd.user.targets.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.user.sockets.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/security.pam.services.<name>.rssh | If set, the calling user's SSH agent is used to authenticate
against the configured keys
|
| options/nixos/security.pam.services.<name>.yubicoAuth | If set, users listed in
~/.yubico/authorized_yubikeys
are able to log in with the associated Yubikey tokens.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Debug | This optional key specifies that launchd should adjust its log mask temporarily to LOG_DEBUG while
dealing with this job.
|
| options/nixos/services.grafana.settings.server.static_root_path | Root path for static assets.
|
| options/home-manager/services.podman.machines.<name>.autoStart | Whether to automatically start this machine on login.
|
| options/home-manager/programs.smug.projects.<name>.beforeStart | Commands to execute before the tmux-session starts.
|
| options/nixos/services.home-assistant.config.homeassistant.name | Name of the location where Home Assistant is running.
|
| options/home-manager/services.xsuspender.rules.<name>.matchWmNameContains | Match windows where wm name contains string.
|
| options/nixos/services.httpd.virtualHosts.<name>.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| options/nixos/services.nginx.virtualHosts.<name>.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| options/nixos/systemd.services.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/services.drupal.sites.<name>.database.host | Database host address.
|
| options/nixos/services.borgbackup.jobs.<name>.repo | Remote or local repository to back up to.
|
| options/nixos/services.drupal.sites.<name>.database.port | Database host port.
|
| options/nixos/services.httpd.virtualHosts.<name>.listen.*.port | Port to listen on
|
| options/nixos/hardware.sane.brscan4.netDevices.<name>.model | The model of the network device.
|
| options/nixos/services.iodine.clients.<name>.extraConfig | Additional command line parameters
|
| options/nixos/hardware.sane.brscan5.netDevices.<name>.model | The model of the network device.
|
| options/nixos/services.nginx.virtualHosts.<name>.listen.*.addr | Listen address.
|
| options/home-manager/programs.irssi.networks.<name>.server.port | Port of the chat server.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.enable | Whether to enable aerc.
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.slick.iconTheme.name | Name of the icon theme to use for the lightdm-slick-greeter.
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.subnets.*.address | The subnet of this host
|
| options/nixos/services.h2o.hosts.<name>.tls.extraSettings | Additional TLS/SSL-related configuration options
|
| options/nixos/services.public-inbox.inboxes.<name>.watch | Paths for public-inbox-watch(1) to monitor for new mail.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Nice | This optional key specifies what nice(3) value should be applied to the daemon.
|
| options/darwin/networking.computerName | The user-friendly name for the system, set in System Preferences > Sharing > Computer Name
|
| options/nixos/services.fedimintd.<name>.nginx.config.http3 | Whether to enable the HTTP/3 protocol
|
| options/home-manager/services.kanshi.profiles.<name>.exec | Commands executed after the profile is successfully applied
|
| options/nixos/services.multipath.devices.*.prio_args | Arguments to pass to to the prio function
|
| options/nixos/services.hans.clients.<name>.passwordFile | File that contains password
|
| options/nixos/services.nginx.virtualHosts.<name>.default | Makes this vhost the default.
|
| options/nixos/services.grafana.provision.alerting.rules.settings.groups.*.name | Name of the rule group
|
| options/nixos/services.redis.servers.<name>.save | The schedule in which data is persisted to disk, represented as a list of lists where the first element represent the amount of seconds and the second the number of changes
|
| options/nixos/services.firefox-syncserver.database.name | Database to use for storage
|
| options/nixos/services.nsd.zones.<name>.multiMasterCheck | If enabled, checks all masters for the last zone version
|
| options/nixos/services.nylon.<name>.allowedIPRanges | Allowed client IP ranges are evaluated first, defaults to ARIN IPv4 private ranges:
[ "192.168.0.0/16" "127.0.0.0/8" "172.16.0.0/12" "10.0.0.0/8" ]
|
| options/nixos/services.firewalld.zones.<name>.ports.*.port | |
| options/nixos/users.extraUsers.<name>.linger | Whether to enable or disable lingering for this user
|
| options/nixos/services.httpd.virtualHosts.<name>.listen.*.ssl | Whether to enable SSL (https) support.
|
| options/nixos/services.restic.backups.<name>.exclude | Patterns to exclude when backing up
|
| options/nixos/systemd.user.sockets.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/systemd.user.targets.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/services.alloy.configPath | Alloy configuration file/directory path
|
| options/nixos/services.kubernetes.pki.etcClusterAdminKubeconfig | Symlink a kubeconfig with cluster-admin privileges to environment path
(/etc/<path>).
|
| options/nixos/services.pds.pdsadmin.enable | Add pdsadmin script to PATH
|
| options/nixos/services.gotenberg.rootPath | Root path for the Gotenberg API.
|
| options/nixos/services.asusd.asusdConfig.source | Path of the source file.
|
| options/nixos/services.dspam.domainSocket | Path to local domain socket which is used for communication with the daemon
|
| options/nixos/services.asusd.animeConfig.source | Path of the source file.
|
| options/nixos/services.honk.passwordFile | Password for admin account
|
| options/nixos/services.forgejo.dump.backupDir | Path to the directory where the dump archives will be stored.
|
| options/nixos/services.iperf3.rsaPrivateKey | Path to the RSA private key (not password-protected) used to decrypt authentication credentials from the client.
|
| options/nixos/boot.initrd.systemd.storePaths.*.source | Path of the source file.
|
| options/nixos/services.envfs.enable | Fuse filesystem that returns symlinks to executables based on the PATH
of the requesting process
|
| options/nixos/services.sabnzbd.configFile | Path to config file (deprecated, use settings instead and set this value to null)
|
| options/nixos/services.radicle.publicKey | An SSH public key (as an absolute file path or directly as a string),
usually generated by rad auth.
|
| options/nixos/services.paisa.settings.dataDir | Path to paisa data directory.
|
| options/nixos/services.oauth2-proxy.proxyPrefix | The url root path that this proxy should be nested under.
|
| options/nixos/services.outline.sslKeyFile | File path that contains the Base64-encoded private key for HTTPS
termination
|
| options/nixos/services.nitter.server.staticDir | Path to the static files directory.
|
| options/nixos/services.oxidized.configFile | Path to the oxidized configuration file.
|
| options/nixos/services.xray.settingsFile | The absolute path to the configuration file
|
| options/darwin/services.ofborg.configFile | Configuration file to use for ofborg
|
| options/darwin/environment.systemPath | The set of paths that are added to PATH.
|
| options/home-manager/accounts.calendar.basePath | The base directory in which to save calendars
|
| options/home-manager/services.syncthing.cert | Path to the cert.pem file, which will be copied into Syncthing's
config directory.
|
| options/home-manager/nix.channels | A declarative alternative to Nix channels
|
| options/nixos/systemd.user.tmpfiles.users.<name>.rules | Per-user rules for creation, deletion and cleaning of volatile and
temporary files automatically
|
| options/nixos/systemd.network.networks.<name>.vxlan | A list of vxlan interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.network.netdevs.<name>.tapConfig | Each attribute in this set specifies an option in the
[Tap] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.tunConfig | Each attribute in this set specifies an option in the
[Tun] section of the unit
|
| options/darwin/launchd.agents.<name>.serviceConfig.RunAtLoad | This optional key is used to control whether your job is launched once at the time the job is loaded
|
| options/home-manager/programs.ripgrep-all.custom_adapters.*.name | The unique identifier and name of this adapter; must only include a-z, 0-9, _
|
| options/nixos/services.geth.<name>.websocket.enable | Whether to enable Go Ethereum WebSocket API.
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.recvTimeout | An application timeout on receiving data from the TCP socket.
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.recvTimeout | An application timeout on receiving data from the TCP socket.
|
| options/nixos/services.nebula.networks.<name>.relays | List of IPs of relays that this node should allow traffic from.
|
| options/nixos/systemd.services.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Label | This required key uniquely identifies the job to launchd.
|
| options/home-manager/services.podman.builds.<name>.extraPodmanArgs | Extra arguments to pass to the podman build command.
|
| options/nixos/networking.bonds.<name>.miimon | DEPRECATED, use driverOptions
|
| options/nixos/users.users.<name>.ignoreShellProgramCheck | By default, nixos will check that programs
|
| options/nixos/services.borgbackup.jobs.<name>.appendFailedSuffix | Append a .failed suffix
to the archive name, which is only removed if
borg create has a zero exit status.
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.threads | Sets the number of worker threads to use
|
| options/darwin/launchd.agents.<name>.serviceConfig.UserName | This optional key specifies the user to run the job as
|
| options/nixos/boot.initrd.clevis.devices.<name>.secretFile | Clevis JWE file used to decrypt the device at boot, in concert with the chosen pin (one of TPM2, Tang server, or SSS).
|
| options/nixos/services.swapspace.settings.swappath | Location where swapspace may create and delete swapfiles
|
| options/nixos/networking.wg-quick.interfaces.<name>.listenPort | 16-bit port for listening
|
| options/nixos/services.prometheus.exporters.fritz.settings.devices.*.name | Name to use for the device.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/home-manager/fonts.fontconfig.configFile.<name>.text | Verbatim contents of the config file
|
| options/nixos/services.rss2email.feeds.<name>.to | Email address to which to send feed items
|
| options/nixos/services.redis.servers.<name>.group | Group account under which this instance of redis-server runs.
If left as the default value this group will automatically be
created on system activation, otherwise you are responsible for
ensuring the group exists before the redis service starts.
|
| options/nixos/services.sourcehut.settings."builds.sr.ht::worker".name | Listening address and listening port
of the build runner (with HTTP port if not 80).
|
| options/nixos/services.geoclue2.appConfig.<name>.isSystem | Whether the application is a system component or not.
|
| options/nixos/services.errbot.instances.<name>.dataDir | Data directory for errbot instance.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.node | The node where the rule should be applied.
|
| options/nixos/boot.loader.grub.extraFiles | A set of files to be copied to /boot
|
| options/nixos/services.rshim.device | Specify the device name to attach
|
| options/nixos/boot.specialFileSystems.<name>.stratis.poolUuid | UUID of the stratis pool that the fs is located in
This is only relevant if you are using stratis.
|
| options/nixos/services.nsd.zones.<name>.allowAXFRFallback | If NSD as secondary server should be allowed to AXFR if the primary
server does not allow IXFR.
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.gtk.cursorTheme.name | Name of the cursor theme to use for the lightdm-gtk-greeter.
|
| options/nixos/services.dokuwiki.sites.<name>.phpPackage | The php package to use.
|
| options/nixos/services.sanoid.templates.<name>.daily | Number of daily snapshots.
|
| options/nixos/services.redis.servers.<name>.requirePassFile | File with password for the database.
|
| options/nixos/services.vault-agent.instances.<name>.user | User under which this instance runs.
|
| options/nixos/services.agate.hostnames | Domain name of this Gemini server, enables checking hostname and port
in requests. (multiple occurrences means basic vhosts)
|
| options/nixos/services.firezone.server.provision.accounts.<name>.groups.<name>.forceMembers | Ensure that only the given members are part of this group at every server start.
|
| options/nixos/services.parsedmarc.settings.elasticsearch.cert_path | The path to a TLS certificate bundle used to verify
the server's certificate.
|
| options/nixos/security.pam.services.<name>.gnupg.storeOnly | Don't send the password immediately after login, but store for PAM
session.
|
| options/nixos/services.snapper.configs.<name>.FSTYPE | Filesystem type
|
| options/home-manager/programs.ssh.matchBlocks.<name>.forwardAgent | Whether the connection to the authentication agent (if any)
will be forwarded to the remote machine.
|
| options/nixos/security.acme.certs.<name>.dnsResolver | Set the resolver to use for performing recursive DNS queries
|
| options/nixos/systemd.network.links.<name>.matchConfig | Each attribute in this set specifies an option in the
[Match] section of the unit
|
| options/home-manager/launchd.agents.<name>.config.LaunchOnlyOnce | This optional key specifies whether the job can only be run once and only once
|
| options/nixos/services.znapzend.zetup.<name>.destinations.<name>.postsend | Command to run after sending the snapshot to the destination
|
| options/nixos/programs.uwsm.waylandCompositors.<name>.prettyName | The full name of the desktop entry file.
|
| options/darwin/services.github-runners.<name>.workDir | Working directory, available as $GITHUB_WORKSPACE during workflow runs
and used as a default for repository checkouts
|
| options/darwin/users.users.<name>.ignoreShellProgramCheck | By default, nix-darwin will check that programs
|
| options/home-manager/launchd.agents.<name>.config.Program | This key maps to the first argument of execvp(3)
|
| options/nixos/boot.initrd.luks.devices.<name>.postOpenCommands | Commands that should be run right after we have mounted our LUKS device.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Label | This required key uniquely identifies the job to launchd.
|
| options/home-manager/services.podman.images.<name>.extraPodmanArgs | Extra arguments to pass to the podman image pull command.
|
| options/home-manager/services.podman.networks.<name>.autoStart | Whether to start the network on boot (requires user lingering).
|
| options/darwin/environment.launchAgents.<name>.text | Text of the file.
|
| options/nixos/services.znapzend.zetup.<name>.sendDelay | Specify delay (in seconds) before sending snaps to the destination
|
| options/home-manager/services.podman.volumes.<name>.extraConfig | INI sections and values to populate the Volume Quadlet.
|
| options/nixos/security.tpm2.pkcs11.enable | Whether to enable TPM2 PKCS#11 tool and shared library in system path
(/run/current-system/sw/lib/libtpm2_pkcs11.so)
.
|
| options/nixos/services.dendrite.tlsKey | The path to the TLS key.
nix-shell -p dendrite --command "generate-keys --tls-cert server.crt --tls-key server.key"
|
| options/nixos/services.hadoop.hdfs.httpfs.tempPath | HTTPFS_TEMP path used by HTTPFS
|
| options/nixos/services.libinput.mouse.dev | Path for mouse device
|
| options/nixos/services.harmonia.signKeyPath | DEPRECATED: Use services.harmonia.signKeyPaths instead
|
| options/nixos/hardware.deviceTree.dtbSource | Path to dtb directory that overlays and other processing will be applied to
|
| options/nixos/services.dovecot2.sslServerCert | Path to the server's public key.
|
| options/nixos/services.outline.sslCertFile | File path that contains the Base64-encoded certificate for HTTPS
termination
|
| options/nixos/services.syncthing.cert | Path to the cert.pem file, which will be copied into Syncthing's
configDir.
|
| options/nixos/services.oauth2-proxy.keyFile | oauth2-proxy allows passing sensitive configuration via environment variables
|
| options/nixos/services.ncps.cache.secretKeyPath | The path to load the secretKey for signing narinfos
|
| options/nixos/services.routedns.configFile | Path to RouteDNS TOML configuration file.
|
| options/nixos/services.radicle.httpd.nginx.root | The path of the web root directory.
|
| options/nixos/services.lk-jwt-service.keyFile | Path to a file containing the credential mapping (<keyname>: <secret>) to access LiveKit
|
| options/nixos/services.stash.sessionStoreKeyFile | Path to file containing a secret for session store.
|
| options/home-manager/programs.claude-code.skillsDir | Path to a directory containing skill files for Claude Code
|
| options/home-manager/programs.claude-code.agentsDir | Path to a directory containing agent files for Claude Code
|
| options/nixos/services.akkoma.initDb.username | Name of the database user to initialise the database with
|
| options/home-manager/programs.i3status-rust.bars.<name>.blocks | Configuration blocks to add to i3status-rust
config
|
| options/nixos/systemd.user.sockets.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.user.targets.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/services.jupyter.kernels.<name>.extraPaths | Extra paths to link in kernel directory
|
| options/nixos/services.ytdl-sub.instances.<name>.enable | Whether to enable ytdl-sub instance.
|
| options/nixos/services.easytier.instances.<name>.extraSettings | Extra settings to add to easytier-‹name›.toml.
|
| options/nixos/services.h2o.hosts.<name>.acme.useHost | An existing Let’s Encrypt certificate to use for this virtual
host
|
| options/nixos/services.wstunnel.clients.<name>.tlsSNI | Use this as the SNI while connecting via TLS
|
| options/nixos/systemd.slices.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.timers.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.services.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/home-manager/accounts.email.accounts.<name>.jmap.host | Hostname of JMAP server
|
| options/home-manager/launchd.agents.<name>.config.LimitLoadFromHosts | This configuration file only applies to hosts NOT listed with this key
|
| options/nixos/services.multipath.devices.*.all_tg_pt | Set the 'all targets ports' flag when registering keys with mpathpersist
|
| options/nixos/image.repart.partitions.<name>.storePaths | The store paths to include in the partition.
|
| options/nixos/services.fedimintd.<name>.nginx.enable | Whether to configure nginx for fedimintd
|
| options/nixos/services.drupal.sites.<name>.virtualHost.hostName | Canonical hostname for the server.
|
| options/nixos/services.firewalld.zones.<name>.target | Action for packets that doesn't match any rules.
|
| options/home-manager/programs.retroarch.cores.<name>.enable | Whether to enable RetroArch core.
|
| options/home-manager/services.pizauth.accounts.<name>.tokenUri | The OAuth2 server's token URI.
|
| options/nixos/services.frp.instances.<name>.role | The frp consists of client and server
|
| options/nixos/services.vdirsyncer.jobs.<name>.group | group to run vdirsyncer as
|
| options/home-manager/xdg.desktopEntries.<name>.categories | Categories in which the entry should be shown in a menu.
|
| options/nixos/services.kanata.keyboards.<name>.port | Port to run the TCP server on. null will not run the server.
|
| options/nixos/security.acme.certs.<name>.reloadServices | The list of systemd services to call systemctl try-reload-or-restart
on.
|
| options/nixos/services.sympa.settingsFile.<name>.enable | Whether this file should be generated
|
| options/home-manager/services.podman.machines.<name>.memory | Memory in MB to allocate to the machine
|
| options/home-manager/services.podman.images.<name>.password | Password used to connect to registry. (Will be visible in nix store)
|
| options/nixos/systemd.shutdownRamfs.contents.<name>.text | Text of the file.
|
| options/home-manager/services.kanshi.profiles.<name>.outputs | Outputs configuration.
|
| options/nixos/services.httpd.virtualHosts.<name>.servedDirs | This option provides a simple way to serve static directories.
|
| options/nixos/security.pam.services.<name>.ttyAudit.enable | Enable or disable TTY auditing for specified users
|
| options/nixos/services.hostapd.radios.<name>.wifi6.enable | Enables support for IEEE 802.11ax (WiFi 6, HE)
|
| options/nixos/services.redis.servers.<name>.settings | Redis configuration
|
| options/nixos/services.tahoe.nodes.<name>.client.shares.total | The number of shares required to store a file.
|
| options/nixos/services.nginx.virtualHosts.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/systemd.network.netdevs.<name>.wlanConfig | Each attribute in this set specifies an option in the [WLAN] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.l2tpConfig | Each attribute in this set specifies an option in the
[L2TP] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.xfrmConfig | Each attribute in this set specifies an option in the
[Xfrm] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.vlanConfig | Each attribute in this set specifies an option in the
[VLAN] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.bondConfig | Each attribute in this set specifies an option in the
[Bond] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.peerConfig | Each attribute in this set specifies an option in the
[Peer] section of the unit
|
| options/home-manager/launchd.agents.<name>.config.LowPriorityIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O.
|
| options/nixos/services.prometheus.exporters.script.settings.scripts.*.name | Name of the script.
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites.<name>.desktopEntry.categories | Categories in which the entry should be shown in a menu.
|
| options/nixos/services.buildkite-agents.<name>.hooks | "Agent" hooks to install
|
| options/nixos/services.ytdl-sub.instances.<name>.config | Configuration for ytdl-sub
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.enso.cursorTheme.name | Name of the cursor theme to use for the lightdm-enso-os-greeter
|
| options/nixos/services.wstunnel.servers.<name>.tlsKey | TLS key to use instead of the hardcoded on in case of HTTPS connections
|
| options/nixos/services.fedimintd.<name>.api_ws.url | Public URL of the API address of the reverse proxy/tls terminator
|
| options/nixos/systemd.services.<name>.serviceConfig | Each attribute in this set specifies an option in the
[Service] section of the unit
|
| options/nixos/systemd.user.services.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/services.wyoming.piper.servers.<name>.piper | The piper-tts package to use.
|
| options/nixos/services.fedimintd.<name>.nginx.config | Overrides to the nginx vhost section for api
|
| options/nixos/services.tahoe.nodes.<name>.sftpd.accounts.url | URL of the accounts server.
|
| options/nixos/services.neo4j.ssl.policies.<name>.clientAuth | The client authentication stance for this policy.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.addressFamily | Specifies which address family to use when connecting.
|
| options/nixos/programs.ssh.setXAuthLocation | Whether to set the path to xauth for X11-forwarded connections
|
| options/nixos/services.jenkins.packages | Packages to add to PATH for the jenkins process.
|
| options/nixos/services.cfdyndns.apiTokenFile | The path to a file containing the API Token
used to authenticate with CloudFlare.
|
| options/nixos/services.gocd-server.packages | Packages to add to PATH for the Go
|
| options/nixos/services.unpoller.loki.pass | Path of a file containing the password for Loki
|
| options/nixos/services.netbox.ldapConfigPath | Path to the Configuration-File for LDAP-Authentication, will be loaded as ldap_config.py
|
| options/home-manager/xdg.configFile.<name>.recursive | If the file source is a directory, then this option
determines whether the directory should be recursively
linked to the target location
|
| options/nixos/systemd.network.networks.<name>.routes | A list of route sections to be added to the unit
|
| options/home-manager/services.restic.backups.<name>.exclude | Patterns to exclude when backing up
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.packages | List of ‹name› add-on packages to install for this profile
|
| options/nixos/services.davis.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.movim.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.pgbackrest.repos.<name>.host | Repository host when operating remotely
|
| options/nixos/services.slskd.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.twoFactor | Whether to use a passphrase and a YubiKey (true), or only a YubiKey (false).
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.keyLength | Length of the LUKS slot key derived with PBKDF2 in byte.
|
| options/nixos/services.fedimintd.<name>.api_ws.bind | Address to bind on for API connections relied by the reverse proxy/tls terminator.
|
| options/nixos/services.errbot.instances.<name>.logLevel | Errbot log level
|
| options/nixos/services.nebula.networks.<name>.package | The nebula package to use.
|
| options/nixos/services.sanoid.datasets.<name>.monthly | Number of monthly snapshots.
|
| options/home-manager/accounts.contact.accounts.<name>.remote | Remote configuration for the contacts.
|
| options/home-manager/programs.i3status.modules.<name>.enable | Whether or not to enable this module.
|
| options/home-manager/accounts.email.accounts.<name>.enable | Whether this account is enabled
|
| options/nixos/services.nginx.virtualHosts.<name>.kTLS | Whether to enable kTLS support
|
| options/nixos/services.hostapd.radios.<name>.wifi5.enable | Enables support for IEEE 802.11ac (WiFi 5, VHT)
|
| options/nixos/services.netbird.tunnels.<name>.ui.enable | Controls presence of netbird-ui wrapper for this NetBird client.
|
| options/nixos/services.tarsnap.archives.<name>.maxbw | Abort archival if upstream bandwidth usage in bytes
exceeds this threshold.
|
| options/nixos/services.netbird.clients.<name>.ui.enable | Controls presence of netbird-ui wrapper for this NetBird client.
|
| options/nixos/services.vdirsyncer.jobs.<name>.user | User account to run vdirsyncer as, otherwise as a systemd
dynamic user
|
| options/home-manager/accounts.email.accounts.<name>.primary | Whether this is the primary account
|
| options/darwin/services.gitlab-runner.services.<name>.tagList | Tag list.
|
| options/nixos/services.github-runners.<name>.enable | Whether to enable GitHub Actions runner
|
| options/darwin/services.github-runners.<name>.enable | Whether to enable GitHub Actions runner
|
| options/nixos/services.geoclue2.appConfig.<name>.users | List of UIDs of all users for which this application is allowed location
info access, Defaults to an empty string to allow it for all users.
|
| options/nixos/security.pam.services.<name>.limits.*.domain | Username, groupname, or wildcard this limit applies to
|
| options/nixos/services.buildkite-agents.<name>.shell | Command that buildkite-agent 3 will execute when it spawns a shell.
|
| options/nixos/services.nylon.<name>.acceptInterface | Tell nylon which interface to listen for client requests on, default is "lo".
|
| options/nixos/services.wyoming.piper.servers.<name>.useCUDA | Whether to accelerate the underlying onnxruntime library with CUDA.
|
| options/nixos/services.k3s.autoDeployCharts.<name>.extraDeploy | List of extra Kubernetes manifests to deploy with this Helm chart.
|
| options/darwin/services.buildkite-agents.<name>.shell | Command that buildkite-agent 3 will execute when it spawns a shell.
|
| options/nixos/boot.initrd.luks.devices.<name>.keyFileOffset | The offset of the key file
|
| options/nixos/services.postfix.masterConfig.<name>.args | Arguments to pass to the command
|
| options/nixos/services.syncoid.commands.<name>.sshKey | SSH private key file to use to login to the remote system
|
| options/darwin/launchd.agents.<name>.serviceConfig.TimeOut | The recommended idle time out (in seconds) to pass to the job
|
| options/home-manager/xdg.desktopEntries.<name>.startupNotify | If true, it is KNOWN that the application will send a "remove"
message when started with the DESKTOP_STARTUP_ID
environment variable set
|
| options/nixos/services.inadyn.settings.custom.<name>.ssl | Whether to use HTTPS for this DDNS provider.
|
| options/nixos/services.dokuwiki.sites.<name>.phpOptions | Options for PHP's php.ini file for this dokuwiki site.
|
| options/nixos/services.httpd.virtualHosts.<name>.enableUserDir | Whether to enable serving ~/public_html as
/~«username».
|
| options/nixos/services.tinc.networks.<name>.bindToAddress | The ip address to bind to (both listen on and send packets from).
|
| options/nixos/services.rspamd.workers.<name>.bindSockets | List of sockets to listen, in format acceptable by rspamd
|
| options/nixos/services.httpd.virtualHosts.<name>.logFormat | Log format for Apache's log files
|
| options/nixos/services.caddy.virtualHosts.<name>.logFormat | Configuration for HTTP request logging (also known as access logs)
|
| options/nixos/systemd.user.targets.<name>.requisite | Similar to requires
|
| options/nixos/systemd.user.sockets.<name>.requisite | Similar to requires
|
| options/home-manager/launchd.agents.<name>.config.StandardInPath | This optional key specifies what file should be used for data being supplied to stdin when using
stdio(3).
|
| options/nixos/services.jitsi-videobridge.xmppConfigs.<name>.hostName | Hostname of the XMPP server to connect to
|
| options/home-manager/programs.rclone.remotes.<name>.config | Regular configuration options as described in rclone's documentation
https://rclone.org/docs/
|
| options/nixos/services.nginx.virtualHosts.<name>.extraConfig | These lines go to the end of the vhost verbatim.
|
| options/nixos/systemd.network.networks.<name>.domains | A list of domains to pass to the network config.
|
| options/home-manager/accounts.email.accounts.<name>.imap.tls.useStartTls | Whether to use STARTTLS.
|
| options/home-manager/systemd.user.services.<name>.Service.ExecStart | Command that is executed when this service is started.
|
| options/home-manager/accounts.email.accounts.<name>.smtp.tls.useStartTls | Whether to use STARTTLS.
|
| options/home-manager/programs.floorp.profiles.<name>.userChrome | Custom Floorp user chrome CSS.
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.slick.cursorTheme.name | Name of the cursor theme to use for the lightdm-slick-greeter.
|
| options/nixos/services.fedimintd.<name>.api_ws.port | TCP Port to bind on for API connections relayed by the reverse proxy/tls terminator.
|
| options/nixos/systemd.services.<name>.requisite | Similar to requires
|
| options/nixos/services.tinc.networks.<name>.debugLevel | The amount of debugging information to add to the log. 0 means little
logging while 5 is the most logging. man tincd for
more details.
|
| options/nixos/services.nebula.networks.<name>.listen.port | Port number to listen on.
|
| options/nixos/services.mailpit.instances.<name>.smtp | SMTP bind interface and port.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.tarsnap.archives.<name>.nodump | Exclude files with the nodump flag.
|
| options/nixos/services.nebula.networks.<name>.listen.host | IP address to listen on.
|
| options/nixos/services.rspamd.workers.<name>.includes | List of files to include in configuration
|
| options/nixos/services.syncoid.commands.<name>.extraArgs | Extra syncoid arguments for this command.
|
| options/nixos/services.wstunnel.clients.<name>.enable | Whether to enable this wstunnel instance.
|
| options/nixos/services.wstunnel.servers.<name>.enable | Whether to enable this wstunnel instance.
|
| options/nixos/services.znc.confOptions.networks.<name>.port | IRC server port.
|
| options/home-manager/programs.firefox.profiles.<name>.search | Declarative search engine configuration.
|
| options/home-manager/services.podman.networks.<name>.gateway | The gateway IP to use for the network.
|
| options/nixos/services.gateone.settingsDir | Path of configuration files for GateOne.
|
| options/nixos/services.dendrite.tlsCert | The path to the TLS certificate.
nix-shell -p dendrite --command "generate-keys --tls-cert server.crt --tls-key server.key"
|
| options/nixos/services.anuko-time-tracker.nginx.root | The path of the web root directory.
|
| options/nixos/services.devpi-server.secretFile | Path to a shared secret file used for synchronization,
Required for all nodes in a replica/primary setup.
|
| options/nixos/services.stargazer.store | Path to the certificate store on disk
|
| options/nixos/services.pomerium.configFile | Path to Pomerium config YAML
|
| options/nixos/services.molly-brown.certPath | Path to TLS certificate
|
| options/nixos/services.sshwifty.sharedKeyFile | Path to a file containing the shared key.
|
| options/nixos/services.traefik.static.file | Path to Traefik's static configuration file.
|
| options/nixos/services.nomad.extraPackages | Extra packages to add to PATH for the Nomad agent process.
|
| options/nixos/services.opengfw.pcapReplay | Path to PCAP replay file
|
| options/nixos/services.zitadel.masterKeyFile | Path to a file containing a master encryption key for ZITADEL
|
| options/nixos/services.stash.passwordFile | Path to file containing password for login.
|
| options/home-manager/programs.yazi.extraPackages | Extra packages to make available to yazi
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.username | Username for basic HTTP authentication
|
| options/nixos/programs.tsmClient.servers.<name>.tcpport | TCP port of the IBM TSM server
|
| options/nixos/services.tahoe.nodes.<name>.client.shares.happy | The number of distinct storage nodes required to store
a file.
|
| options/nixos/services.rspamd.workers.<name>.extraConfig | Additional entries to put verbatim into worker section of rspamd config file.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.policies.<name>.resource | The resource to which access should be allowed.
|
| options/nixos/services.buildkite-agents.<name>.enable | Whether to enable this buildkite agent
|
| options/nixos/services.vault-agent.instances.<name>.group | Group under which this instance runs.
|
| options/darwin/services.buildkite-agents.<name>.enable | Whether to enable this buildkite agent
|
| options/home-manager/programs.floorp.profiles.<name>.isDefault | Whether this is a default profile.
|
| options/home-manager/programs.sftpman.mounts.<name>.mountOptions | Options to pass to sshfs.
|
| options/home-manager/accounts.contact.accounts.<name>.local.type | The type of the storage.
|
| options/home-manager/services.pizauth.accounts.<name>.clientId | The OAuth2 client ID.
|
| options/nixos/services.easytier.instances.<name>.settings.network_name | EasyTier network name.
|
| options/nixos/services.redis.servers.<name>.slowLogLogSlowerThan | Log queries whose execution take longer than X in milliseconds.
|
| options/nixos/services.dokuwiki.sites.<name>.acl | Access Control Lists: see https://www.dokuwiki.org/acl
Mutually exclusive with services.dokuwiki.aclFile
Set this to a value other than null to take precedence over aclFile option
|
| options/nixos/services.kmonad.keyboards.<name>.config | Keyboard configuration.
|
| options/nixos/services.opkssh.providers.<name>.issuer | Issuer URI
|
| options/nixos/services.icecast.hostname | DNS name or IP address that will be used for the stream directory lookups or possibly the playlist generation if a Host header is not provided.
|
| options/nixos/boot.loader.grub.users.<name>.hashedPassword | Specifies the password hash for the account,
generated with grub-mkpasswd-pbkdf2
|
| options/nixos/services.awstats.configs.<name>.logFile | The log file to be scanned
|
| options/nixos/services.netbird.clients.<name>.dir.state | A state directory used by NetBird client to store config.json, state.json & resolv.conf.
|
| options/nixos/services.netbird.tunnels.<name>.dir.state | A state directory used by NetBird client to store config.json, state.json & resolv.conf.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.imapAuth | Sets the authentication mechanism if imap is used as the incoming
method
|
| options/home-manager/accounts.email.accounts.<name>.aerc.smtpAuth | Sets the authentication mechanism if smtp is used as the outgoing
method
|
| options/nixos/security.pam.services.<name>.requireWheel | Whether to permit root access only to members of group wheel.
|
| options/nixos/services.rke2.autoDeployCharts.<name>.extraDeploy | List of extra Kubernetes manifests to deploy with this Helm chart.
|
| options/home-manager/xdg.desktopEntries.<name>.prefersNonDefaultGPU | If true, the application prefers to be run on a more powerful discrete GPU if available.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.controlMaster | Configure sharing of multiple sessions over a single network connection.
|
| options/nixos/systemd.network.networks.<name>.enable | Whether to manage network configuration using systemd-network
|
| options/nixos/systemd.network.networks.<name>.tunnel | A list of tunnel interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.network.networks.<name>.bridge | A list of bridge interfaces to be added to the network section of the
unit
|
| options/nixos/services.tahoe.nodes.<name>.tub.location | The external location that the node should listen on
|
| options/nixos/services.matomo.webServerUser | Name of the web server user that forwards requests to services.phpfpm.pools.<name>.socket the fastcgi socket for Matomo if the nginx
option is not used
|
| options/nixos/networking.bonds.<name>.driverOptions | Options for the bonding driver
|
| options/home-manager/accounts.email.accounts.<name>.smtp.tls.enable | Whether to enable TLS/SSL.
|
| options/home-manager/accounts.email.accounts.<name>.imap.tls.enable | Whether to enable TLS/SSL.
|
| options/nixos/hardware.display.outputs.<name>.mode | A video kernel parameter (framebuffer mode) configuration for the specific output:
<xres>x<yres>[M][R][-<bpp>][@<refresh>][i][m][eDd]
See for more information:
|
| options/nixos/services.headscale.settings.dns.extra_records.*.name | DNS record name.
|
| options/nixos/services.dokuwiki.sites.<name>.poolConfig | Options for the DokuWiki PHP pool
|
| options/nixos/services.nntp-proxy.users.<name>.passwordHash | SHA-512 password hash (can be generated by
mkpasswd -m sha-512 <password>)
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Debug | This optional key specifies that launchd should adjust its log mask temporarily to LOG_DEBUG while
dealing with this job.
|
| options/home-manager/launchd.agents.<name>.config.StandardOutPath | This optional key specifies what file should be used for data being sent to stdout when using stdio(3).
|
| options/nixos/security.acme.certs.<name>.inheritDefaults | Whether to inherit values set in security.acme.defaults or not.
|
| options/nixos/services.restic.backups.<name>.extraBackupArgs | Extra arguments passed to restic backup.
|
| options/nixos/services.redis.servers.<name>.openFirewall | Whether to open ports in the firewall for the server.
|
| options/home-manager/services.pizauth.accounts.<name>.loginHint | An optional login hint for the account provider.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.state | The state in which a new window should spawn.
|
| options/home-manager/services.muchsync.remotes.<name>.upload | Whether to propagate local changes to the remote.
|
| options/home-manager/programs.smug.projects.<name>.windows.*.panes | Panes to open in a window.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.layer | The layer where a new window should spawn.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.identityAgent | Specifies the location of the ssh identity agent.
|
| options/nixos/security.pam.services.<name>.sshAgentAuth | If set, the calling user's SSH agent is used to authenticate
against the keys in the calling user's
~/.ssh/authorized_keys
|
| options/nixos/systemd.timers.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.slices.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.network.networks.<name>.bridgeFDBs | A list of BridgeFDB sections to be added to the unit
|
| options/nixos/systemd.network.networks.<name>.bridgeMDBs | A list of BridgeMDB sections to be added to the unit
|
| options/home-manager/accounts.email.accounts.<name>.meli.enable | Whether to enable the meli mail client for this account
|
| options/nixos/systemd.user.services.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/security.pam.services.<name>.sssdStrictAccess | enforce sssd access control
|
| options/nixos/networking.vlans.<name>.interface | The interface the vlan will transmit packets through.
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.openFirewall | Open the appropriate ports in the firewall.
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.openFirewall | Open the appropriate ports in the firewall.
|
| options/nixos/services.public-inbox.inboxes.<name>.address | The email addresses of the public-inbox.
|
| options/nixos/systemd.network.networks.<name>.extraConfig | Extra configuration append to unit
|
| options/darwin/launchd.agents.<name>.environment | Environment variables passed to the service's processes.
|
| options/home-manager/home.file.<name>.ignorelinks | When recursive is enabled, adds -ignorelinks flag to lndir
It causes lndir to not treat symbolic links in the source directory specially
|
| options/nixos/services.movim.h2o.serverName | Server name to be used for this virtual host
|
| options/home-manager/programs.atuin.themes | Each theme is written to
$XDG_CONFIG_HOME/atuin/themes/theme-name.toml
where the name of each attribute is the theme-name
See https://docs.atuin.sh/guide/theming/ for the full list
of options.
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.saltLength | Length of the new salt in byte (64 is the effective maximum).
|
| options/darwin/launchd.agents.<name>.serviceConfig.WatchPaths | This optional key causes the job to be started if any one of the listed paths are modified.
|
| options/nixos/services.headscale.settings.noise.private_key_path | Path to noise private key file, generated automatically if it does not exist.
|
| options/nixos/security.apparmor.policies.<name>.state | How strictly this policy should be enforced
|
| options/nixos/services.geoclue2.appConfig.<name>.desktopID | Desktop ID of the application.
|
| options/nixos/services.sanoid.templates.<name>.hourly | Number of hourly snapshots.
|
| options/nixos/services.sanoid.templates.<name>.yearly | Number of yearly snapshots.
|
| options/home-manager/accounts.calendar.accounts.<name>.local | Local configuration for the calendar.
|
| options/home-manager/programs.irssi.networks.<name>.channels | Channels for the given network.
|
| options/nixos/systemd.timers.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/systemd.slices.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/home-manager/programs.ssh.matchBlocks.<name>.userKnownHostsFile | Specifies one or more files to use for the user host key
database, separated by whitespace
|
| options/nixos/security.wrappers | This option effectively allows adding setuid/setgid bits, capabilities,
changing file ownership and permissions of a program without directly
modifying it
|
| options/nixos/services.etebase-server.unixSocket | The path to the socket to bind to.
|
| options/nixos/services.cfdyndns.apikeyFile | The path to a file containing the API Key
used to authenticate with CloudFlare.
|
| options/nixos/services.db-rest.redis.passwordFile | Path to a file containing the redis password.
|
| options/nixos/services.gitea.minioSecretAccessKey | Path to a file containing the Minio secret access key.
|
| options/nixos/services.openssh.hostKeys | NixOS can automatically generate SSH host keys
|
| options/nixos/services.osquery.flags.pidfile | Path used for pid file.
|
| options/nixos/services.nezha-agent.clientSecretFile | Path to the file contained the client_secret of the dashboard.
|
| options/nixos/services.mpd.settings.db_file | The path to MPD's database.
|
| options/nixos/services.syncplay.statsDBFile | Path to SQLite database file to store stats
|
| options/nixos/services.kea.dhcp6.configFile | Kea DHCP6 configuration as a path, see https://kea.readthedocs.io/en/kea-3.0.2/arm/dhcp6-srv.html
|
| options/nixos/services.kea.dhcp4.configFile | Kea DHCP4 configuration as a path, see https://kea.readthedocs.io/en/kea-3.0.2/arm/dhcp4-srv.html
|
| options/home-manager/programs.starship.configPath | Relative path to the user's home directory where the Starship config should be stored.
|
| options/home-manager/programs.sftpman.defaultSshKey | Path to the SSH key to be used by default
|
| options/home-manager/programs.claude-code.rulesDir | Path to a directory containing rule files for Claude Code
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.interface | Optional interface name to restrict outbound IPsec policies.
|
| options/nixos/security.pam.services.<name>.usshAuth | If set, users with an SSH certificate containing an authorized principal
in their SSH agent are able to log in
|
| options/nixos/services.firewalld.zones.<name>.version | Version of the zone.
|
| options/nixos/programs.xfs_quota.projects.<name>.id | Project ID.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags.sent | Tag for notmuch to use for messages stored in the mailbox labeled with the
Sent name attribute
|
| options/nixos/services.pingvin-share.hostname | The domain name of your instance
|
| options/nixos/security.pam.services.<name>.howdy.control | This option sets the PAM "control" used for this module.
|
| options/nixos/systemd.services.<name>.restartIfChanged | Whether the service should be restarted during a NixOS
configuration switch if its definition has changed.
|
| options/home-manager/fonts.fontconfig.configFile.<name>.enable | Whether to enable Whether this font config file should be generated..
|
| options/home-manager/accounts.email.accounts.<name>.lieer.enable | Whether to enable lieer Gmail synchronization for notmuch.
|
| options/darwin/environment.userLaunchAgents.<name>.text | Text of the file.
|
| options/nixos/boot.loader.systemd-boot.windows.<name>.sortKey | systemd-boot orders the menu entries by their sort keys,
so if you want something to appear after all the NixOS entries,
it should start with o or onwards
|
| options/nixos/services.nginx.proxyCachePath.<name>.levels | The levels parameter defines structure of subdirectories in cache: from
1 to 3, each level accepts values 1 or 2
|
| options/home-manager/programs.i3status-rust.bars | Attribute set of i3status-rust bars, each with their own configuration
|
| options/nixos/systemd.network.netdevs.<name>.vxlanConfig | Each attribute in this set specifies an option in the
[VXLAN] section of the unit
|
| options/darwin/launchd.daemons.<name>.serviceConfig.RunAtLoad | This optional key is used to control whether your job is launched once at the time the job is loaded
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Debug | This optional key specifies that launchd should adjust its log mask temporarily to LOG_DEBUG while
dealing with this job.
|
| options/nixos/services.xserver.windowManager.xmonad.config | Configuration from which XMonad gets compiled
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.settings.<name>.settings | Json formatted options for this extension.
|
| options/nixos/services.grafana.settings.database.client_cert_path | The path to the client cert
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.gracePeriod | Time in seconds to wait for the YubiKey.
|
| options/nixos/services.geth.<name>.websocket.address | Listen address of Go Ethereum WebSocket API.
|
| options/nixos/services.borgbackup.jobs.<name>.postInit | Shell commands to run after borg init.
|
| options/nixos/services.wstunnel.clients.<name>.autoStart | Whether to enable starting this wstunnel instance automatically.
|
| options/nixos/services.wstunnel.servers.<name>.autoStart | Whether to enable starting this wstunnel instance automatically.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.focus | Whether the node should gain focus on creation.
|
| options/darwin/launchd.agents.<name>.serviceConfig.MachServices | This optional key is used to specify Mach services to be registered with the Mach bootstrap sub-system
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.wordpress.sites.<name>.fontsDir | This directory is used to download fonts from a remote location, e.g.
to host google fonts locally.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.UserName | This optional key specifies the user to run the job as
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.ksk.rollPeriod | How frequently to change keys
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.zsk.rollPeriod | How frequently to change keys
|
| options/nixos/services.tarsnap.archives.<name>.maxbwRateUp | Upload bandwidth rate limit in bytes.
|
| options/home-manager/services.colima.profiles.<name>.isService | Whether this profile will run as a service.
|
| options/nixos/systemd.user.services.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/services.multipath.devices.*.flush_on_last_del | If set to "yes" multipathd will disable queueing when the last path to a
device has been deleted.
|
| options/nixos/systemd.network.networks.<name>.bridgeVLANs | A list of BridgeVLAN sections to be added to the unit
|
| options/home-manager/programs.ssh.matchBlocks.<name>.identityFile | Specifies files from which the user identity is read
|
| options/darwin/launchd.agents.<name>.serviceConfig.ExitTimeOut | The amount of time launchd waits before sending a SIGKILL signal
|
| options/nixos/services.dokuwiki.sites.<name>.mergedConfig | Read only representation of the final configuration.
|
| options/nixos/services.anubis.instances.<name>.enable | Whether to enable this instance of Anubis.
|
| options/nixos/services.errbot.instances.<name>.admins | List of identifiers of errbot admins.
|
| options/nixos/services.firewalld.zones.<name>.icmpBlocks | ICMP types to block in the zone.
|
| options/nixos/services.davis.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.davis.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.restic.backups.<name>.progressFps | Controls the frequency of progress reporting.
|
| options/nixos/services.movim.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.slskd.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.slskd.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.movim.nginx.locations.<name>.index | Adds index directive.
|
| options/home-manager/services.restic.backups.<name>.progressFps | Controls the frequency of progress reporting.
|
| options/nixos/security.pam.services.<name>.setLoginUid | Set the login uid of the process
(/proc/self/loginuid) for auditing
purposes
|
| options/nixos/services.github-runners.<name>.workDir | Working directory, available as $GITHUB_WORKSPACE during workflow runs
and used as a default for repository checkouts
|
| options/darwin/launchd.agents.<name>.serviceConfig.StartOnMount | This optional key causes the job to be started every time a filesystem is mounted.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.id | IKE identity to use for authentication round
|
| options/darwin/launchd.agents.<name>.serviceConfig.Umask | This optional key specifies what value should be passed to umask(2) before running the job
|
| options/nixos/services.bluemap.storage.<name>.storage-type | Type of storage config
|
| options/nixos/services.awstats.configs.<name>.hostAliases | List of aliases the site has.
|
| options/nixos/services.opkssh.providers.<name>.clientId | OAuth client ID
|
| options/nixos/services.pgbackrest.repos.<name>.sftp-host | SFTP repository host
|
| options/nixos/services.redis.servers.<name>.databases | Set the number of databases.
|
| options/nixos/services.wordpress.sites.<name>.package | The wordpress package to use.
|
| options/home-manager/accounts.contact.accounts.<name>.remote.url | The URL of the storage.
|
| options/nixos/security.pam.services.<name>.logFailures | Whether to log authentication failures in /var/log/faillog.
|
| options/nixos/services.tinc.networks.<name>.settings | Configuration of the Tinc daemon for this network
|
| options/home-manager/fonts.fontconfig.configFile.<name>.source | Config file to source
|
| options/nixos/services.mpdscribble.endpoints.<name>.username | Username for the scrobble service.
|
| options/home-manager/services.mpdscribble.endpoints.<name>.username | Username for the scrobble service.
|
| options/nixos/services.github-runners.<name>.extraLabels | Extra labels in addition to the default (unless disabled through the noDefaultLabels option)
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.RunAtLoad | This optional key is used to control whether your job is launched once at the time the job is loaded
|
| options/darwin/services.github-runners.<name>.extraLabels | Extra labels in addition to the default (unless disabled through the noDefaultLabels option)
|
| options/home-manager/launchd.agents.<name>.config.WaitForDebugger | This optional key specifies that launchd should instruct the kernel to have the job wait for a debugger
to attach before any code in the job is executed.
|
| options/nixos/services.gitea.captcha.secretFile | Path to a file containing the CAPTCHA secret key.
|
| options/nixos/services.ddclient.configFile | Path to configuration file
|
| options/nixos/services.bookstack.nginx.root | The path of the web root directory.
|
| options/nixos/services.syncplay.roomsDBFile | Path to SQLite database file to store room states
|
| options/nixos/services.rutorrent.rpcSocket | Path to rtorrent rpc socket.
|
| options/nixos/services.openssh.moduliFile | Path to moduli file to install in
/etc/ssh/moduli
|
| options/home-manager/programs.nushell.envFile.source | Path of the nushell env.nu file to use
|
| options/home-manager/systemd.user.systemctlPath | Absolute path to the systemctl tool
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.displayName | Display name
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert | Section for a certificate candidate to use for
authentication
|
| options/nixos/services.slurm.nodeName | Name that SLURM uses to refer to a node (or base partition for BlueGene
systems)
|
| options/nixos/services.tahoe.nodes.<name>.client.shares.needed | The number of shares required to reconstitute a file.
|
| options/nixos/systemd.user.services.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/services.znc.confOptions.networks.<name>.useSSL | Whether to use SSL to connect to the IRC server.
|
| options/nixos/systemd.sockets.<name>.listenDatagrams | For each item in this list, a ListenDatagram
option in the [Socket] section will be created.
|
| options/home-manager/services.podman.volumes.<name>.extraPodmanArgs | Extra arguments to pass to the podman volume create command.
|
| options/darwin/environment.launchDaemons.<name>.text | Text of the file.
|
| options/nixos/services.gitlab-runner.services.<name>.description | Name/description of the runner.
|
| options/nixos/services.httpd.virtualHosts.<name>.http2 | Whether to enable HTTP 2
|
| options/nixos/services.github-runners.<name>.url | Repository to add the runner to
|
| options/darwin/services.github-runners.<name>.url | Repository to add the runner to
|
| options/nixos/security.pam.services.<name>.forwardXAuth | Whether X authentication keys should be passed from the
calling user to the target user (e.g. for
su)
|
| options/nixos/services.borgbackup.jobs.<name>.user | The user borg is run as
|
| options/nixos/services.nginx.virtualHosts.<name>.listen.*.port | Port number to listen on
|
| options/nixos/services.sympa.domains.<name>.settings | The robot.conf configuration file as key value set
|
| options/nixos/systemd.network.netdevs.<name>.fooOverUDPConfig | Each attribute in this set specifies an option in the
[FooOverUDP] section of the unit
|
| options/nixos/systemd.network.networks.<name>.canConfig | Each attribute in this set specifies an option in the
[CAN] section of the unit
|
| options/nixos/systemd.network.networks.<name>.pieConfig | Each attribute in this set specifies an option in the
[PIE] section of the unit
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.UserName | This optional key specifies the user to run the job as
|
| options/nixos/services.drupal.sites.<name>.virtualHost.adminAddr | E-mail address of the server administrator.
|
| options/nixos/systemd.timers.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/systemd.slices.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.filters | A list of filter to restrict traffic
|
| options/nixos/boot.initrd.luks.devices.<name>.preOpenCommands | Commands that should be run right before we try to mount our LUKS device
|
| options/home-manager/programs.floorp.profiles.<name>.extraConfig | Extra preferences to add to user.js.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.splitDir | The direction where the container is going to be split.
|
| options/home-manager/programs.thunderbird.profiles.<name>.extensions | List of ‹name› add-on packages to install for this profile
|
| options/home-manager/services.kanshi.profiles.<name>.outputs.*.criteria | The criteria can either be an output name, an output description or "*"
|
| options/nixos/services.anubis.instances.<name>.settings.POLICY_FNAME | The policy file to use
|
| options/nixos/services.borgbackup.jobs.<name>.preHook | Shell commands to run before the backup
|
| options/nixos/systemd.targets.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.sockets.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.restic.backups.<name>.command | Command to pass to --stdin-from-command
|
| options/nixos/services.fluidd.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.akkoma.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.gancio.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.fedimintd.<name>.bitcoin.rpc.kind | Kind of a bitcoin node.
|
| options/nixos/services.monica.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.matomo.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.vdirsyncer.jobs.<name>.enable | Whether to enable this vdirsyncer job.
|
| options/nixos/services.github-runners.<name>.nodeRuntimes | List of Node.js runtimes the runner should support.
|
| options/darwin/services.github-runners.<name>.nodeRuntimes | List of Node.js runtimes the runner should support.
|
| options/home-manager/accounts.contact.accounts.<name>.local.fileExt | The file extension to use.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.fqdn | Fully qualified domain name of the JMAP service.
mujmap looks up the JMAP SRV record for this host to determine the JMAP session
URL
|
| options/home-manager/xdg.dataFile.<name>.ignorelinks | When recursive is enabled, adds -ignorelinks flag to lndir
It causes lndir to not treat symbolic links in the source directory specially
|
| options/nixos/services.caddy.virtualHosts.<name>.extraConfig | Additional lines of configuration appended to this virtual host in the
automatically generated Caddyfile.
|
| options/home-manager/systemd.user.services.<name>.Unit.X-SwitchMethod | The preferred method to use when switching from an old to a new
version of this service.
|
| options/nixos/services.osquery.flags.logger_path | Base directory used for logging.
If left as the default value, this directory will be automatically created before the
service starts, otherwise you are responsible for ensuring the directory exists with
the appropriate ownership and permissions.
|
| options/nixos/services.kimai.sites.<name>.database.charset | Database charset.
|
| options/nixos/services.tarsnap.archives.<name>.period | Create archive at this interval
|
| options/home-manager/services.restic.backups.<name>.extraBackupArgs | Extra arguments passed to restic backup
|
| options/nixos/services.wstunnel.servers.<name>.listen.host | The hostname.
|
| options/nixos/services.wstunnel.servers.<name>.listen.port | The port.
|
| options/home-manager/programs.hexchat.channels.<name>.charset | Character set.
|
| options/home-manager/programs.hexchat.channels.<name>.options | Channel options.
|
| options/nixos/services.httpd.virtualHosts.<name>.enableACME | Whether to ask Let's Encrypt to sign a certificate for this vhost
|
| options/nixos/services.nginx.virtualHosts.<name>.enableACME | Whether to ask Let's Encrypt to sign a certificate for this vhost
|
| options/home-manager/programs.alot.tags.<name>.translated | Fixed string representation for this tag
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags.inbox | Tag for notmuch to use for messages stored in the mailbox labeled with the
Inbox name attribute
|
| options/nixos/services.restic.backups.<name>.extraOptions | Extra extended options to be passed to the restic --option flag.
|
| options/nixos/services.restic.backups.<name>.pruneOpts | A list of options (--keep-* et al.) for 'restic forget
--prune', to automatically prune old snapshots
|
| options/nixos/services.netbird.clients.<name>.config | Additional configuration that exists before the first start and
later overrides the existing values in config.json
|
| options/nixos/services.netbird.tunnels.<name>.config | Additional configuration that exists before the first start and
later overrides the existing values in config.json
|
| options/nixos/services.siproxd.passwordFile | Path to per-user password file.
|
| options/nixos/services.coturn.static-auth-secret-file | Path to the file containing the static authentication secret.
|
| options/nixos/services.chisel-server.authfile | Path to auth.json file
|
| options/nixos/services.asusd.fanCurvesConfig.source | Path of the source file.
|
| options/nixos/services.gitlab.registry.keyFile | Path to GitLab container registry certificate-key.
|
| options/nixos/services.asusd.userLedModesConfig.source | Path of the source file.
|
| options/nixos/services.headphones.dataDir | Path where to store data files.
|
| options/nixos/services.promtail.configFile | Config file path for Promtail
|
| options/nixos/services.pixiecore.initrd | Initrd path
|
| options/nixos/services.pixiecore.kernel | Kernel path
|
| options/nixos/services.suwayomi-server.dataDir | The path to the data directory in which Suwayomi-Server will download scans.
|
| options/nixos/services.sickbeard.configFile | Path to config file.
|
| options/nixos/services.trickster.configFile | Path to configuration file.
|
| options/nixos/services.prosody.extraPluginPaths | Additional path in which to look find plugins/modules
|
| options/nixos/services.opengfw.settingsFile | Path to file containing OpenGFW settings.
|
| options/nixos/systemd.automounts.*.where | Absolute path of a directory of the mount point
|
| options/nixos/services.xandikos.routePrefix | Path to Xandikos
|
| options/home-manager/services.polybar.config | Polybar configuration
|
| options/nixos/services.wstunnel.clients.<name>.addNetBind | Whether to enable Whether add CAP_NET_BIND_SERVICE to the tunnel service, this should be enabled if you want to bind port < 1024.
|
| options/nixos/systemd.network.networks.<name>.ipoIBConfig | Each attribute in this set specifies an option in the
[IPoIB] section of the unit
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.address | The address of this resource
|
| options/nixos/services.nginx.proxyCachePath.<name>.useTempPath | Nginx first writes files that are destined for the cache to a temporary
storage area, and the use_temp_path=off directive instructs Nginx to
write them to the same directories where they will be cached
|
| options/nixos/services.kanata.keyboards.<name>.extraArgs | Extra command line arguments passed to kanata.
|
| options/nixos/services.netbird.tunnels.<name>.dir.runtime | A runtime directory used by NetBird client.
|
| options/nixos/services.netbird.clients.<name>.dir.runtime | A runtime directory used by NetBird client.
|
| options/nixos/services.wyoming.piper.servers.<name>.extraArgs | Extra arguments to pass to the server commandline.
|
| options/nixos/services.wyoming.piper.servers.<name>.enable | Whether to enable Wyoming Piper server.
|
| options/home-manager/accounts.contact.accounts.<name>.khal.readOnly | Keep khal from making any changes to this account.
|
| options/home-manager/services.podman.networks.<name>.extraConfig | INI sections and values to populate the Network Quadlet
|
| options/nixos/services.prometheus.exporters.node-cert.paths | List of paths to search for SSL certificates.
|
| options/nixos/systemd.network.netdevs.<name>.vrfConfig | Each attribute in this set specifies an option in the
[VRF] section of the unit
|
| options/nixos/users.extraUsers.<name>.ignoreShellProgramCheck | By default, nixos will check that programs
|
| options/nixos/services.nginx.proxyCachePath.<name>.inactive | Cached data that has not been accessed for the time specified by
the inactive parameter is removed from the cache, regardless of
its freshness.
|
| options/nixos/systemd.user.slices.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.user.timers.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.user.services.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/users.mysql.pam.logging.userColumn | The name of the column in the log table to which the name of the
user being authenticated is stored.
|
| options/nixos/users.mysql.pam.logging.hostColumn | The name of the column in the log table to which the name of the user
being authenticated is stored.
|
| options/home-manager/programs.helix.themes | Each theme is written to
$XDG_CONFIG_HOME/helix/themes/theme-name.toml
|
| options/nixos/services.bacula-sd.device.<name>.extraDeviceConfig | Extra configuration to be passed in Device directive.
|
| options/nixos/services.easytier.instances.<name>.settings.hostname | Hostname shown in peer list and web console.
|
| options/nixos/services.neo4j.ssl.policies.<name>.ciphers | Restrict the allowed ciphers of this policy to those defined
here
|
| options/nixos/services.quicktun.<name>.remoteAddress | IP address or hostname of the remote end (use 0.0.0.0 for a floating/dynamic remote endpoint).
|
| options/nixos/services.anubis.instances.<name>.user | The user under which Anubis is run
|
| options/nixos/security.pam.services.<name>.enableAppArmor | Enable support for attaching AppArmor profiles at the
user/group level, e.g., as part of a role based access
control scheme.
|
| options/nixos/services.k3s.autoDeployCharts.<name>.version | The version of the Helm chart
|
| options/nixos/services.davis.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.slskd.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.movim.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.restic.backups.<name>.passwordFile | Read the repository password from a file.
|
| options/home-manager/services.restic.backups.<name>.passwordFile | A file containing the repository password.
|
| options/home-manager/accounts.email.accounts.<name>.gpg.signByDefault | Sign messages by default.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.border | Whether the node should have border.
|
| options/nixos/security.auditd.plugins.<name>.settings | Plugin-specific config file to link to /etc/audit/.conf
|
| options/nixos/programs.ssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| options/nixos/services.hostapd.radios.<name>.networks | This defines a BSS, colloquially known as a WiFi network
|
| options/darwin/programs.ssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| options/home-manager/programs.lutris.runners.<name>.settings | Settings passed directly to lutris for this runner's config at XDG_CONFIG/lutris/runners.
|
| options/home-manager/launchd.agents.<name>.config.RootDirectory | This optional key is used to specify a directory to chroot(2) to before running the job.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.localForwards | Specify local port forwardings
|
| options/home-manager/programs.ssh.matchBlocks.<name>.addKeysToAgent | When enabled, a private key that is used during authentication will be
added to ssh-agent if it is running (with confirmation enabled if
set to 'confirm')
|
| options/nixos/services.postfix.settings.master.<name>.type | The type of the service
|
| options/nixos/services.wstunnel.servers.<name>.package | The wstunnel package to use.
|
| options/nixos/services.wstunnel.clients.<name>.package | The wstunnel package to use.
|
| options/home-manager/accounts.contact.accounts.<name>.remote.type | The type of the storage.
|
| options/nixos/services.httpd.virtualHosts.<name>.listen | Listen addresses and ports for this virtual host.
This option overrides addSSL, forceSSL and onlySSL
|
| options/nixos/services.neo4j.ssl.policies.<name>.trustAll | Makes this policy trust all remote parties
|
| options/nixos/services.awstats.configs.<name>.logFormat | The log format being used
|
| options/nixos/services.znapzend.zetup.<name>.presnap | Command to run before snapshots are taken on the source dataset,
e.g. for database locking/flushing
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.eap_id | Client EAP-Identity to use in EAP-Identity exchange and the EAP method.
|
| options/nixos/systemd.services.<name>.confinement.mode | The value full-apivfs (the default) sets up
private /dev, /proc,
/sys, /tmp and /var/tmp file systems
in a separate user name space
|
| options/nixos/services.nextcloud.config.dbname | Database name.
|
| options/nixos/services.fedimintd.<name>.bitcoin.rpc.url | Bitcoin node (bitcoind/electrum/esplora) address to connect to
|
| options/nixos/services.hostapd.radios.<name>.wifi6.require | Require stations (clients) to support WiFi 6 (HE) and disassociate them if they don't.
|
| options/home-manager/accounts.contact.accounts.<name>.khard.glob | The glob expansion to be searched for contacts when
type is set to discover.
|
| options/nixos/security.auditd.plugins.<name>.format | Binary passes the data exactly as the audit event dispatcher gets it from
the audit daemon
|
| options/nixos/services.keepalived.vrrpInstances.<name>.virtualIps.*.dev | The name of the device to add the address to.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert | Section for a certificate candidate to use for
authentication
|
| options/nixos/services.geoclue2.appConfig.<name>.isAllowed | Whether the application will be allowed access to location information.
|
| options/nixos/services.anubis.instances.<name>.policy | Anubis policy configuration
|
| options/nixos/services.drupal.sites.<name>.virtualHost.listen.*.ip | IP to listen on. 0.0.0.0 for IPv4 only, * for all.
|
| options/nixos/services.netbird.tunnels.<name>.login.enable | Whether to enable automated login for NetBird client.
|
| options/nixos/services.netbird.clients.<name>.login.enable | Whether to enable automated login for NetBird client.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| options/nixos/security.pam.services.<name>.failDelay.enable | If enabled, this will replace the FAIL_DELAY setting from login.defs
|
| options/nixos/systemd.network.networks.<name>.linkConfig | Each attribute in this set specifies an option in the
[Link] section of the unit
|
| options/nixos/systemd.user.services.<name>.serviceConfig | Each attribute in this set specifies an option in the
[Service] section of the unit
|
| options/nixos/systemd.network.networks.<name>.lldpConfig | Each attribute in this set specifies an option in the
[LLDP] section of the unit
|
| options/nixos/systemd.network.networks.<name>.cakeConfig | Each attribute in this set specifies an option in the
[CAKE] section of the unit
|
| options/nixos/services.wstunnel.clients.<name>.soMark | Mark network packets with the SO_MARK sockoption with the specified value
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.recvBufferSize | If given, sets the SO_RCVBUF option on the TCP socket to the given number of bytes
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.sendBufferSize | If given, sets the SO_SNDBUF option on the TCP socket to the given number of bytes
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.recvBufferSize | If given, sets the SO_RCVBUF option on the TCP socket to the given number of bytes
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.sendBufferSize | If given, sets the SO_SNDBUF option on the TCP socket to the given number of bytes
|
| options/nixos/services.redis.servers.<name>.requirePass | Password for database (STORED PLAIN TEXT, WORLD-READABLE IN NIX STORE)
|
| options/darwin/launchd.daemons.<name>.serviceConfig.TimeOut | The recommended idle time out (in seconds) to pass to the job
|
| options/home-manager/launchd.agents.<name>.config.SessionCreate | This key specifies that the job should be spawned into a new security
audit session rather than the default session for the context is belongs
to
|
| options/nixos/services.borgbackup.jobs.<name>.postPrune | Shell commands to run after borg prune.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.enable | Whether to enable synchronization using mbsync.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.controlPersist | Whether control socket should remain open in the background.
|
| options/nixos/services.restic.backups.<name>.rcloneConfig | Configuration for the rclone remote being used for backup
|
| options/nixos/services.anki-sync-server.users.*.username | User name accepted by anki-sync-server.
|
| options/nixos/services.grafana.provision.alerting.muteTimings.settings.muteTimes.*.name | Name of the mute time interval, must be unique
|
| options/nixos/services.wakapi.passwordSaltFile | The path to a file containing the password salt to use for Wakapi.
|
| options/nixos/services.jigasi.userPasswordFile | Path to file containing password for XMPP user connection.
|
| options/nixos/services.bonsaid.configFile | Path to a .json file specifying the state transitions
|
| options/nixos/services.gitea.settings.log.ROOT_PATH | Root path for log files.
|
| options/nixos/services.jicofo.userPasswordFile | Path to file containing password for XMPP user connection.
|
| options/nixos/services.gitea.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/services.gitlab.registry.certFile | Path to GitLab container registry certificate.
|
| options/nixos/services.headscale.configFile | Path to the configuration file of headscale.
|
| options/nixos/services.ncdns.dnssec.keys.private | Path to the file containing the KSK private key.
|
| options/nixos/services.kea.dhcp-ddns.configFile | Kea DHCP-DDNS configuration as a path, see https://kea.readthedocs.io/en/kea-3.0.2/arm/ddns.html
|
| options/home-manager/services.ludusavi.configFile | Path to a Ludusavi config.yaml
|
| options/nixos/services.dokuwiki.sites.<name>.usersFile | Location of the dokuwiki users file
|
| options/nixos/services.phpfpm.pools.<name>.settings | PHP-FPM pool directives
|
| options/nixos/services.borgbackup.jobs.<name>.group | The group borg is run as
|
| options/nixos/services.httpd.virtualHosts.<name>.extraConfig | These lines go to httpd.conf verbatim
|
| options/nixos/systemd.network.networks.<name>.address | A list of addresses to be added to the network section of the
unit
|
| options/nixos/systemd.network.networks.<name>.gateway | A list of gateways to be added to the network section of the
unit
|
| options/nixos/networking.fooOverUDP.<name>.protocol | Protocol number of the encapsulated packets
|
| options/nixos/services.printing.cups-pdf.instances.<name>.settings.Out | output directory;
${HOME} will be expanded to the user's home directory,
${USER} will be expanded to the user name.
|
| options/nixos/services.tarsnap.archives.<name>.maxbwRateDown | Download bandwidth rate limit in bytes.
|
| options/nixos/services.tinc.networks.<name>.listenAddress | The ip address to listen on for incoming connections.
|
| options/home-manager/programs.floorp.profiles.<name>.userContent | Custom Floorp user content CSS.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.hidden | Whether the node should occupy any space.
|
| options/home-manager/programs.firefox.profiles.<name>.userChrome | Custom Firefox user chrome CSS.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.id | IKE identity to expect for authentication round
|
| options/nixos/services.firewalld.zones.<name>.sources.*.mac | A MAC address.
|
| options/nixos/services.firewalld.zones.<name>.sourcePorts | Source ports to allow in the zone.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.wyoming.piper.servers.<name>.noiseScale | Generator noise value.
|
| options/home-manager/services.unison.pairs.<name>.stateDirectory | Unison state directory to use.
|
| options/home-manager/programs.hexchat.channels.<name>.servers | IRC Server Address List.
|
| options/nixos/services.restic.backups.<name>.timerConfig | When to run the backup
|
| options/nixos/services.rke2.autoDeployCharts.<name>.version | The version of the Helm chart
|
| options/nixos/services.matrix-continuwuity.settings.global.database_path | Path to the continuwuity database, the directory where continuwuity will save its data
|
| options/nixos/services.anubis.instances.<name>.settings.SERVE_ROBOTS_TXT | Whether to serve a default robots.txt that denies access to common AI bots by name and all other
bots by wildcard.
|
| options/nixos/services.fedimintd.<name>.nginx.config.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.anubis.instances.<name>.settings.METRICS_BIND | The address Anubis' metrics server listens to
|
| options/nixos/services.bepasty.servers.<name>.extraConfig | Extra configuration for bepasty server to be appended on the
configuration.
see https://bepasty-server.readthedocs.org/en/latest/quickstart.html#configuring-bepasty
for all options.
|
| options/nixos/services.hostapd.radios.<name>.wifi4.require | Require stations (clients) to support WiFi 4 (HT) and disassociate them if they don't.
|
| options/nixos/services.hostapd.radios.<name>.wifi5.require | Require stations (clients) to support WiFi 5 (VHT) and disassociate them if they don't.
|
| options/nixos/services.buildkite-agents.<name>.package | The buildkite-agent package to use.
|
| options/darwin/services.buildkite-agents.<name>.package | Which buildkite-agent derivation to use
|
| options/home-manager/services.podman.networks.<name>.internal | Whether the network should be internal
|
| options/home-manager/accounts.calendar.accounts.<name>.remote | Remote configuration for the calendar.
|
| options/home-manager/programs.firefox.profiles.<name>.isDefault | Whether this is a default profile.
|
| options/nixos/services.davis.nginx.serverName | Name of this virtual host
|
| options/nixos/services.slskd.nginx.serverName | Name of this virtual host
|
| options/nixos/services.movim.nginx.serverName | Name of this virtual host
|
| options/nixos/services.gerrit.plugins | List of plugins to add to Gerrit
|
| options/nixos/security.pam.services.<name>.ttyAudit.openOnly | Set the TTY audit flag when opening the session,
but do not restore it when closing the session
|
| options/darwin/launchd.daemons.<name>.serviceConfig.MachServices | This optional key is used to specify Mach services to be registered with the Mach bootstrap sub-system
|
| options/nixos/services.k3s.autoDeployCharts.<name>.values | Override default chart values via Nix expressions
|
| options/nixos/services.multipath.devices.*.vpd_vendor | The vendor specific vpd page information, using the vpd page abbreviation
|
| options/home-manager/programs.ssh.matchBlocks.<name>.serverAliveCountMax | Sets the number of server alive messages which may be sent
without SSH receiving any messages back from the server.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| options/nixos/security.pam.services.<name>.howdy.enable | Whether to enable the Howdy PAM module
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.TimeOut | The recommended idle time out (in seconds) to pass to the job
|
| options/nixos/services.headscale.settings.derp.server.private_key_path | Path to derp private key file, generated automatically if it does not exist.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags.spam | Tag for notmuch to use for messages stored in the mailbox labeled with the
Junk name attribute and/or with the $Junk keyword,
except for messages with the $NotJunk keyword
|
| options/darwin/system.activationScripts.<name>.enable | Whether this file should be generated
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.enable | Whether to enable mujmap JMAP synchronization for notmuch.
|
| options/home-manager/programs.i3status-rust.bars.<name>.settings | Any extra options to add to i3status-rust
config.
|
| options/home-manager/programs.librewolf.profiles.<name>.id | Profile ID
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.remove | Propagate mailbox deletions to the given mail store.
|
| options/home-manager/accounts.email.accounts.<name>.alot.extraConfig | Extra settings to add to this Alot account configuration.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.round | Optional numeric identifier by which authentication rounds are
sorted
|
| options/nixos/systemd.network.networks.<name>.macvtap | A list of macvtap interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.network.netdevs.<name>.tunnelConfig | Each attribute in this set specifies an option in the
[Tunnel] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.bridgeConfig | Each attribute in this set specifies an option in the
[Bridge] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.netdevConfig | Each attribute in this set specifies an option in the
[Netdev] section of the unit
|
| options/nixos/systemd.network.networks.<name>.macvlan | A list of macvlan interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.network.netdevs.<name>.ipvlanConfig | Each attribute in this set specifies an option in the [IPVLAN] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.ipvtapConfig | Each attribute in this set specifies an option in the [IPVTAP] section of the unit
|
| options/nixos/services.nsd.zones.<name>.children | Children zones inherit all options of their parents
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.storage.fsType | The filesystem of the unencrypted device.
|
| options/nixos/services.nylon.<name>.nrConnections | The number of allowed simultaneous connections to the daemon, default 10.
|
| options/nixos/services.ytdl-sub.instances.<name>.readWritePaths | List of paths that ytdl-sub can write to.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.follow | Whether focus should follow the node when it is moved.
|
| options/home-manager/programs.smug.projects.<name>.windows.*.layout | Layout of window when opening panes.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.localForwards.*.host | Host port binding options
|
| options/home-manager/programs.smug.projects.<name>.windows.*.panes.*.type | Type of pane.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.localForwards.*.bind | Local port binding options
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.sticky | Whether the node should stay on the focused desktop.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/nixos/services.postfix.masterConfig.<name>.wakeup | Automatically wake up the service after the specified number of
seconds
|
| options/nixos/systemd.user.services.<name>.requisite | Similar to requires
|
| options/home-manager/launchd.agents.<name>.config.StandardErrorPath | This optional key specifies what file should be used for data being sent to stderr when using stdio(3).
|
| options/home-manager/launchd.agents.<name>.config.EnableGlobbing | This flag causes launchd to use the glob(3) mechanism to update the program arguments before invocation.
|
| options/nixos/networking.jool.nat64.<name>.global.pool6 | The prefix used for embedding IPv4 into IPv6 addresses
|
| options/nixos/programs.schroot.profiles.<name>.fstab | A file in the format described in fstab(5), used to mount filesystems inside the chroot
|
| options/nixos/services.hostapd.radios.<name>.wifi7.enable | Enables support for IEEE 802.11be (WiFi 7, EHT)
|
| options/nixos/services.drupal.sites.<name>.virtualHost.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| options/nixos/services.hostapd.radios.<name>.wifi4.enable | Enables support for IEEE 802.11n (WiFi 4, HT)
|
| options/nixos/services.drupal.sites.<name>.virtualHost.listen.*.port | Port to listen on
|
| options/nixos/services.anubis.instances.<name>.extraFlags | A list of extra flags to be passed to Anubis.
|
| options/nixos/services.syncoid.commands.<name>.service | Systemd configuration specific to this syncoid service.
|
| options/nixos/services.nginx.upstreams.<name>.extraConfig | These lines go to the end of the upstream verbatim.
|
| options/nixos/services.tarsnap.archives.<name>.verbose | Whether to produce verbose logging output.
|
| options/nixos/services.vault-agent.instances.<name>.enable | Whether to enable this vault-agent instance.
|
| options/nixos/services.wyoming.piper.servers.<name>.noiseWidth | Phoneme width noise value.
|
| options/darwin/security.sandbox.profiles.<name>.closure | List of store paths to make accessible.
|
| options/home-manager/services.muchsync.remotes.<name>.remote.host | Remote SSH host to synchronize with.
|
| options/home-manager/accounts.contact.accounts.<name>.khal.enable | Whether to enable khal access.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.MachServices | This optional key is used to specify Mach services to be registered with the Mach bootstrap sub-system
|
| options/nixos/services.pid-fan-controller.settings.heatSources.*.wildcardPath | Path of the heat source's hwmon temp_input file
|
| options/nixos/services.postsrsd.socketPath | Path to the Unix socket for connecting to postsrsd
|
| options/nixos/services.charybdis.motd | Charybdis MOTD text
|
| options/nixos/services.wakapi.smtpPasswordFile | The path to a file containing the password for the smtp mailer used by Wakapi.
|
| options/nixos/services.froide-govplan.secretKeyFile | Path to a file containing the secret key.
|
| options/nixos/services.librechat.dataDir | Absolute path for where the LibreChat server will use as its data directory to store logs, user uploads, and generated images.
|
| options/nixos/hardware.facter.reportPath | Path to a hardware report generated by nixos-facter
|
| options/nixos/services.gitea.mailerPasswordFile | Path to a file containing the SMTP password.
|
| options/nixos/services.duckdns.domainsFile | The path to a file containing a
newline-separated list of DuckDNS
domain(s) to be updated
(without the .duckdns.org suffix)
|
| options/nixos/services.disnix.enableProfilePath | Whether to enable exposing the Disnix profiles in the system's PATH.
|
| options/nixos/services.davis.adminPasswordFile | The full path to a file that contains the admin's password
|
| options/nixos/boot.swraid.enable | Whether to enable support for Linux MD RAID arrays
|
| options/nixos/services.pihole-ftl.logDirectory | Path for Pi-hole log files
|
| options/nixos/services.surrealdb.dbPath | The path that surrealdb will write data to
|
| options/nixos/services.slurm.extraConfigPaths | Slurm expects config files for plugins in the same path
as slurm.conf
|
| options/nixos/services.mycelium.keyFile | Optional path to a file containing the mycelium key material
|
| options/nixos/services.nohang.configPath | Configuration file to use with nohang
|
| options/home-manager/programs.claude-code.memory.source | Path to a file containing memory content for CLAUDE.md
|
| options/home-manager/services.proton-pass-agent.socket | The agent's socket; interpreted as a suffix to $XDG_RUNTIME_DIR
on Linux and $(getconf DARWIN_USER_TEMP_DIR) on macOS
|
| options/nixos/services.znapzend.zetup.<name>.mbuffer.size | The size for mbuffer
|
| options/nixos/systemd.sockets.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.targets.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.fluidd.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.gancio.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.fluidd.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.akkoma.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/image.repart.partitions.<name>.contents | The contents to end up in the filesystem image.
|
| options/nixos/services.akkoma.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.blockbook-frontend.<name>.rpc.url | URL for JSON-RPC connections.
|
| options/nixos/services.jupyterhub.kernels.<name>.env | Environment variables to set for the kernel.
|
| options/nixos/services.gancio.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.monica.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.monica.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.prosody.virtualHosts.<name>.enabled | Whether to enable the virtual host
|
| options/nixos/services.matomo.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.matomo.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.sanoid.datasets.<name>.autosnap | Whether to automatically take snapshots.
|
| options/nixos/services.webhook.hooks.<name>.execute-command | The command that should be executed when the hook is triggered.
|
| options/nixos/services.wstunnel.clients.<name>.connectTo | Server address and port to connect to.
|
| options/darwin/launchd.daemons.<name>.environment | Environment variables passed to the service's processes.
|
| options/home-manager/programs.irssi.networks.<name>.autoCommands | List of commands to execute on connect.
|
| options/nixos/services.dependency-track.oidc.usernameClaim | Defines the name of the claim that contains the username in the provider's userinfo endpoint
|
| options/darwin/launchd.daemons.<name>.serviceConfig.WatchPaths | This optional key causes the job to be started if any one of the listed paths are modified.
|
| options/nixos/services.i2pd.ifname | Network interface to bind to.
|
| options/nixos/services.sabnzbd.settings.servers.<name>.displayname | Human-friendly description of the server
|
| options/nixos/services.akkoma.frontends.<name>.package | Akkoma frontend package.
|
| options/nixos/services.sanoid.templates.<name>.monthly | Number of monthly snapshots.
|
| options/nixos/services.vdirsyncer.jobs.<name>.configFile | existing configuration file
|
| options/home-manager/accounts.calendar.accounts.<name>.local.type | The type of the storage.
|
| options/home-manager/xdg.stateFile.<name>.ignorelinks | When recursive is enabled, adds -ignorelinks flag to lndir
It causes lndir to not treat symbolic links in the source directory specially
|
| options/home-manager/xdg.cacheFile.<name>.ignorelinks | When recursive is enabled, adds -ignorelinks flag to lndir
It causes lndir to not treat symbolic links in the source directory specially
|
| options/nixos/services.netbird.clients.<name>.autoStart | Start the service with the system
|
| options/nixos/services.netbird.tunnels.<name>.autoStart | Start the service with the system
|
| options/nixos/services.snapper.configs.<name>.ALLOW_USERS | List of users allowed to operate with the config. "root" is always
implicitly included
|
| options/nixos/systemd.sockets.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/systemd.targets.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.id | A unique identifier for this authentication token
|
| options/nixos/services.borgbackup.jobs.<name>.extraArgs | Additional arguments for all borg calls the
service has
|
| options/nixos/services.firewalld.zones.<name>.sources | Source addresses, address ranges, MAC addresses or ipsets to bind.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.listen.*.ssl | Whether to enable SSL (https) support.
|
| options/nixos/services.rsync.jobs.<name>.destination | Destination directory.
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.settings.<name>.permissions | Allowed permissions for this extension
|
| options/nixos/services.rke2.autoDeployCharts.<name>.values | Override default chart values via Nix expressions
|
| options/home-manager/launchd.agents.<name>.config.LimitLoadToSessionType | This configuration file only applies to sessions of the type specified
|
| options/nixos/systemd.network.netdevs.<name>.matchConfig | Each attribute in this set specifies an option in the
[Match] section of the unit
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.ksk.prePublish | How long in advance to publish new keys
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.zsk.prePublish | How long in advance to publish new keys
|
| options/home-manager/accounts.email.accounts.<name>.lieer.sync.enable | Whether to enable lieer synchronization service.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.marked | Whether the node will be marked for deferred actions.
|
| options/nixos/services.journald.remote.settings.Remote.ServerKeyFile | A path to a SSL secret key file in PEM format
|
| options/nixos/services.snipe-it.nginx.serverName | Name of this virtual host
|
| options/nixos/systemd.network.networks.<name>.dhcpV4Config | Each attribute in this set specifies an option in the
[DHCPv4] section of the unit
|
| options/nixos/systemd.network.networks.<name>.dhcpV6Config | Each attribute in this set specifies an option in the
[DHCPv6] section of the unit
|
| options/nixos/services.h2o.hosts.<name>.tls.redirectCode | HTTP status used by globalRedirect & forceSSL
|
| options/nixos/services.dovecot2.mailboxes.<name>.auto | Whether to automatically create or create and subscribe to the mailbox or not.
|
| options/nixos/services.blockbook-frontend.<name>.sync | Synchronizes until tip, if together with zeromq, keeps index synchronized.
|
| options/nixos/services.spiped.config.<name>.resolveRefresh | Resolution refresh time for the target socket, in seconds.
|
| options/home-manager/programs.thunderbird.profiles.<name>.calendarAccountsOrder | Custom ordering of calendar accounts
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.ports.*.to | The end of the port range, inclusive.
|
| options/nixos/services.gitlab-runner.services.<name>.tagList | Tag list
|
| options/home-manager/services.restic.backups.<name>.extraOptions | Extra extended options to be passed to the restic -o flag
|
| options/home-manager/accounts.contact.accounts.<name>.khal.color | Color in which events in this calendar are displayed
|
| options/nixos/systemd.user.slices.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.user.timers.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.tor.relay.onionServices.<name>.version | See torrc manual.
|
| options/nixos/services.v4l2-relayd.instances.<name>.enable | Whether to enable this v4l2-relayd instance.
|
| options/darwin/launchd.user.agents.<name>.environment | Environment variables passed to the service's processes.
|
| options/home-manager/programs.irssi.networks.<name>.server.ssl.enable | Whether SSL should be used.
|
| options/nixos/services.snapper.configs.<name>.ALLOW_GROUPS | List of groups allowed to operate with the config
|
| options/nixos/services.rspamd.overrides.<name>.enable | Whether this file overrides should be generated
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.WatchPaths | This optional key causes the job to be started if any one of the listed paths are modified.
|
| options/nixos/services.hostapd.radios.<name>.channel | The channel to operate on
|
| options/darwin/launchd.agents.<name>.serviceConfig.GroupName | This optional key specifies the group to run the job as
|
| options/nixos/services.wstunnel.servers.<name>.enableHTTPS | Use HTTPS for the tunnel server.
|
| options/nixos/services.errbot.instances.<name>.plugins | List of errbot plugin derivations.
|
| options/nixos/services.restic.backups.<name>.inhibitsSleep | Prevents the system from sleeping while backing up.
|
| options/nixos/services.znc.confOptions.networks.<name>.server | IRC server address.
|
| options/nixos/boot.initrd.luks.devices.<name>.fido2.passwordLess | Defines whatever to use an empty string as a default salt
|
| options/nixos/services.anubis.instances.<name>.group | The group under which Anubis is run
|
| options/nixos/systemd.user.slices.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/systemd.user.timers.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/darwin/launchd.daemons.<name>.serviceConfig.ExitTimeOut | The amount of time launchd waits before sending a SIGKILL signal
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.ports | Either a single port or port range to allow
|
| options/nixos/services.thanos.rule.alertmanagers.urls | Alertmanager replica URLs to push firing alerts
|
| options/nixos/programs.river.package | The river package to use
|
| options/nixos/services.asusd.profileConfig.source | Path of the source file.
|
| options/nixos/security.apparmor.packages | List of packages to be added to AppArmor's include path
|
| options/nixos/services.hledger-web.stateDir | Path the service has access to
|
| options/nixos/services.movim.h2o.tls.identity.*.key-file | Path to key file
|
| options/nixos/services.oauth2-proxy.clientSecretFile | The path to a file containing the OAuth Client Secret.
|
| options/nixos/services.lubelogger.dataDir | Path to LubeLogger config and metadata inside of /var/lib/.
|
| options/nixos/services.szurubooru.dataDir | The path to the data directory in which Szurubooru will store its data.
|
| options/nixos/services.syslog-ng.extraModulePaths | A list of paths that should be included in syslog-ng's
--module-path option
|
| options/nixos/services.traefik.dynamic.file | Path to Traefik's dynamic configuration file.
You cannot use this option alongside the declarative configuration options.
|
| options/nixos/services.jirafeau.nginxConfig.root | The path of the web root directory.
|
| options/nixos/services.webdav-server-rs.configFile | Path to config file
|
| options/nixos/services.xinetd.services.*.server | Path of the program that implements the service.
|
| options/nixos/system.preSwitchChecks | A set of shell script fragments that are executed before the switch to a
new NixOS system configuration
|
| options/home-manager/targets.darwin.copyApps.directory | Path to link apps relative to the home directory.
|
| options/home-manager/programs.opencode.rules | You can provide global custom instructions to opencode
|
| options/home-manager/targets.darwin.linkApps.directory | Path to link apps relative to the home directory.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.StartOnMount | This optional key causes the job to be started every time a filesystem is mounted.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.create | Automatically create missing mailboxes within the
given mail store.
|
| options/nixos/services.lemmy.settings.hostname | The domain name of your instance (eg 'lemmy.ml').
|
| options/nixos/services.snapserver.streams.<name>.type | The type of input stream.
|
| options/home-manager/services.xsuspender.rules.<name>.resumeFor | Resume duration in seconds.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Umask | This optional key specifies what value should be passed to umask(2) before running the job
|
| options/nixos/networking.interfaces.<name>.mtu | MTU size for packets leaving the interface
|
| options/nixos/systemd.user.services.<name>.restartIfChanged | Whether the service should be restarted during a NixOS
configuration switch if its definition has changed.
|
| options/home-manager/programs.smug.projects.<name>.windows.*.manual | Start window only manually, using the -w arg
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.locked | Whether the node should ignore node --close
messages.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.center | Whether the node will be put in the center, in floating mode.
|
| options/nixos/networking.bonds.<name>.interfaces | The interfaces to bond together
|
| options/nixos/services.firewalld.zones.<name>.sourcePorts.*.port | |
| options/nixos/services.firewalld.services.<name>.ports | Ports of the service.
|
| options/home-manager/programs.papis.libraries.<name>.settings | Configuration for this library.
|
| options/home-manager/accounts.email.accounts.<name>.signature | Signature configuration.
|
| options/nixos/services.jibri.xmppEnvironments.<name>.call.login.username | User part of the JID for the recorder.
|
| options/nixos/services.postfix.masterConfig.<name>.chroot | Whether the service is chrooted to have only access to the
services.postfix.queueDir and the closure of
store paths specified by the program option.
|
| options/nixos/services.syncoid.commands.<name>.target | Target ZFS dataset
|
| options/home-manager/services.podman.machines.<name>.volumes | Volumes to mount in the machine, specified as source:target pairs
|
| options/nixos/services.logcheck.ignoreCron.<name>.timeArgs | "min hr dom mon dow" crontab time args, to auto-create a cronjob too
|
| options/home-manager/services.colima.profiles.<name>.isActive | Whether to set this profile as:
- active docker context
- active kubernetes context
- active incus remote
Exactly one or zero profiles should have this option set.
|
| options/home-manager/services.restic.backups.<name>.timerConfig | When to run the backup
|
| options/nixos/services.hostapd.radios.<name>.driver | The driver hostapd will use.
nl80211 is used with all Linux mac80211 drivers.
none is used if building a standalone RADIUS server that does
not control any wireless/wired driver
|
| options/nixos/services.redis.servers.<name>.masterAuth | If the master is password protected (using the requirePass configuration)
it is possible to tell the slave to authenticate before starting the replication synchronization
process, otherwise the master will refuse the slave request.
(STORED PLAIN TEXT, WORLD-READABLE IN NIX STORE)
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.round | Optional numeric identifier by which authentication rounds are
sorted
|
| options/nixos/systemd.network.networks.<name>.qdiscConfig | Each attribute in this set specifies an option in the
[QDisc] section of the unit
|
| options/nixos/systemd.network.networks.<name>.pfifoConfig | Each attribute in this set specifies an option in the
[PFIFO] section of the unit
|
| options/nixos/systemd.network.networks.<name>.bfifoConfig | Each attribute in this set specifies an option in the
[BFIFO] section of the unit
|
| options/nixos/services.borgbackup.jobs.<name>.doInit | Run borg init if the
specified repo does not exist
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.rsa.<name>.file | File name in the rsa folder for which this passphrase
should be used.
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.allAccess | Grants all permissions in the associated organization.
|
| options/nixos/services.davis.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.fedimintd.<name>.api_iroh.bind | Address to bind on for Iroh endpoint for API connections
|
| options/nixos/services.syncoid.commands.<name>.useCommonArgs | Whether to add the configured common arguments to this command.
|
| options/nixos/services.movim.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.slskd.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/systemd.sockets.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/systemd.targets.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/home-manager/programs.irssi.networks.<name>.server.ssl.verify | Whether the SSL certificate should be verified.
|
| options/nixos/services.kanata.keyboards.<name>.config | Configuration other than defcfg
|
| options/nixos/services.wordpress.sites.<name>.poolConfig | Options for the WordPress PHP pool
|
| options/nixos/services.fedimintd.<name>.nginx.config.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.mailpit.instances.<name>.max | Maximum number of emails to keep
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.ExitTimeOut | The amount of time launchd waits before sending a SIGKILL signal
|
| options/nixos/services.dokuwiki.sites.<name>.pluginsConfig | List of the dokuwiki (un)loaded plugins.
|
| options/nixos/services.public-inbox.inboxes.<name>.coderepo | Nicknames of a 'coderepo' section associated with the inbox.
|
| options/nixos/services.mailpit.instances.<name>.listen | HTTP bind interface and port for UI.
|
| options/nixos/systemd.shutdownRamfs.contents.<name>.enable | Whether to enable copying of this file and symlinking it.
|
| options/home-manager/services.kanshi.profiles.<name>.outputs.*.alias | Defines an alias for the output
|
| options/home-manager/accounts.email.accounts.<name>.meli.settings | Account specific meli configuration
|
| options/home-manager/programs.firefox.profiles.<name>.extraConfig | Extra preferences to add to user.js.
|
| options/home-manager/programs.zsh.plugins.*.file | The plugin script to source
|
| options/home-manager/accounts.email.accounts.<name>.flavor | Some email providers have peculiar behavior that require
special treatment
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert | Section for a CA certificate to accept for authentication
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StartOnMount | This optional key causes the job to be started every time a filesystem is mounted.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.ignoreBroadcastSsid | Send empty SSID in beacons and ignore probe request frames that do not
specify full SSID, i.e., require stations to know SSID
|
| options/nixos/services.blockbook-frontend.<name>.rpc.port | Port for JSON-RPC connections.
|
| options/nixos/services.gancio.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.blockbook-frontend.<name>.rpc.user | Username for JSON-RPC connections.
|
| options/nixos/services.buildkite-agents.<name>.extraGroups | Groups the user for this buildkite agent should belong to
|
| options/nixos/services.akkoma.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.jupyterhub.kernels.<name>.argv | Command and arguments to start the kernel.
|
| options/nixos/services.fluidd.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.monica.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.matomo.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.sanoid.datasets.<name>.useTemplate | Names of the templates to use for this dataset.
|
| options/home-manager/accounts.email.accounts.<name>.neomutt.enable | Whether to enable NeoMutt.
|
| options/home-manager/programs.irssi.networks.<name>.server.address | Address of the chat server.
|
| options/home-manager/accounts.email.accounts.<name>.astroid.enable | Whether to enable Astroid.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Umask | This optional key specifies what value should be passed to umask(2) before running the job
|
| options/nixos/services.nbd.server.exports.<name>.extraOptions | Extra options for this export
|
| options/darwin/services.buildkite-agents.<name>.hooks.pre-exit | The pre-exit hook will run just before your build job finishes
|
| options/home-manager/accounts.calendar.accounts.<name>.khal.glob | The glob expansion to be searched for events or birthdays when
type is set to discover.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.remoteForwards | Specify remote port forwardings
|
| options/nixos/services.nginx.virtualHosts.<name>.listen | Listen addresses and ports for this virtual host
|
| options/nixos/services.firewalld.zones.<name>.services | Services to allow in the zone.
|
| options/nixos/services.firewalld.services.<name>.short | Short description for the service.
|
| options/nixos/services.autorandr.profiles.<name>.hooks | Profile hook scripts.
|
| options/nixos/services.znapzend.zetup.<name>.recursive | Whether to do recursive snapshots.
|
| options/home-manager/programs.autorandr.profiles.<name>.hooks | Profile hook scripts.
|
| options/home-manager/accounts.calendar.accounts.<name>.remote.url | The URL of the storage.
|
| options/nixos/services.wstunnel.servers.<name>.listen | Address and port to listen on
|
| options/home-manager/services.podman.volumes.<name>.preserve | Whether the volume should be preserved if it is removed from the configuration
|
| options/nixos/services.nginx.virtualHosts.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.ports.*.from | The start of the port range, inclusive.
|
| options/nixos/services.i2pd.reseed.floodfill | Path to router info of floodfill to reseed from.
|
| options/nixos/programs.k3b.enable | Whether to enable k3b, the KDE disk burning application
|
| options/nixos/services.ergochat.configFile | Path to configuration file
|
| options/nixos/services.chhoto-url.settings.db_url | The path of the sqlite database.
|
| options/nixos/services.code-server.extraPackages | Additional packages to add to the code-server PATH.
|
| options/nixos/services.gitea.repositoryRoot | Path to the git repositories.
|
| options/nixos/services.athens.storage.mongo.certPath | Path to the certificate file for the mongo database.
|
| options/nixos/services.outline.utilsSecretFile | File path that contains the utility secret key
|
| options/nixos/services.mackerel-agent.apiKeyFile | Path to file containing the Mackerel API key
|
| options/nixos/services.podgrab.passwordFile | The path to a file containing the PASSWORD environment variable
definition for Podgrab's authentication.
|
| options/nixos/services.mailman.serve.virtualRoot | Path to mount the mailman-web django application on.
|
| options/nixos/services.waagent.extraPackages | Additional packages to add to the waagent PATH.
|
| options/nixos/xdg.portal.extraPortals | List of additional portals to add to path
|
| options/nixos/services.kea.ctrl-agent.configFile | Kea Control Agent configuration as a path, see https://kea.readthedocs.io/en/kea-3.0.2/arm/agent.html
|
| options/darwin/system.defaults.finder.ShowPathbar | Show path breadcrumbs in finder windows
|
| options/home-manager/programs.vscode.argvSettings | Configuration written to Visual Studio Code's
argv.json
|
| options/home-manager/accounts.email.maildirBasePath | The base directory for account maildir directories
|
| options/home-manager/programs.nushell.loginFile.source | Path of the nushell login.nu file to use
|
| options/nixos/services.drupal.sites.<name>.virtualHost.servedDirs | This option provides a simple way to serve static directories.
|
| options/nixos/systemd.user.sockets.<name>.listenDatagrams | For each item in this list, a ListenDatagram
option in the [Socket] section will be created.
|
| options/nixos/networking.nftables.tables.<name>.enable | Enable this table.
|
| options/nixos/networking.nftables.tables.<name>.family | Table family.
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.tokenFile | The token value
|
| options/nixos/services.spiped.config.<name>.waitForDNS | Wait for DNS
|
| options/nixos/networking.bonds.<name>.lacp_rate | DEPRECATED, use driverOptions
|
| options/nixos/services.jibri.xmppEnvironments.<name>.control.muc.roomName | The room name of the MUC to connect to for control.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.xauth_id | Client XAuth username used in the XAuth exchange.
|
| options/nixos/services.fedimintd.<name>.api_iroh.port | UDP Port to bind Iroh endpoint for API connections
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.ksk.postPublish | How long after deactivation to keep a key in the zone
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.zsk.postPublish | How long after deactivation to keep a key in the zone
|
| options/nixos/services.nebula.networks.<name>.settings | Nebula configuration
|
| options/nixos/systemd.user.slices.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/systemd.user.timers.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/home-manager/services.podman.networks.<name>.extraPodmanArgs | Extra arguments to pass to the podman network create command.
|
| options/home-manager/services.podman.machines.<name>.timezone | Timezone to set in the machine
|
| options/nixos/services.firezone.server.provision.accounts.<name>.auth | All authentication providers to provision
|
| options/nixos/services.gitlab-runner.services.<name>.limit | Limit how many jobs can be handled concurrently by this service.
0 (default) simply means don't limit.
|
| options/darwin/services.gitlab-runner.services.<name>.limit | Limit how many jobs can be handled concurrently by this service.
0 (default) simply means don't limit.
|
| options/nixos/services.fedimintd.<name>.ui.openFirewall | Opens TCP port in firewall for built-in UI
|
| options/nixos/services.klipper.firmwares.<name>.enable | Whether to enable building of firmware for manual flashing
.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors | The terminal colors, null to use system default.
|
| options/nixos/systemd.user.targets.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.user.sockets.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.settings.<name>.permissions | Allowed permissions for this extension
|
| options/nixos/services.openssh.knownHosts.<name>.extraHostNames | A list of additional host names and/or IP numbers used for
accessing the host's ssh service
|
| options/nixos/services.wstunnel.servers.<name>.useACMEHost | Use a certificate generated by the NixOS ACME module for the given host
|
| options/home-manager/accounts.email.accounts.<name>.aerc.extraBinds | Extra bindings specific to this account, added to
$HOME/.config/aerc/binds.conf
|
| options/nixos/services.grafana.provision.dashboards.settings.providers.*.name | A unique provider name.
|
| options/nixos/services.wstunnel.clients.<name>.localToRemote | Listen on local and forwards traffic from remote.
|
| options/nixos/services.buildkite-agents.<name>.extraConfig | Extra lines to be added verbatim to the configuration file.
|
| options/nixos/security.pam.services.<name>.kwallet.package | The kwallet-pam package to use.
|
| options/nixos/services.sabnzbd.settings.servers.<name>.ssl | Whether the server supports TLS
|
| options/nixos/services.prosody.virtualHosts.<name>.extraConfig | Additional virtual host specific configuration
|
| options/nixos/services.znapzend.zetup.<name>.mbuffer.enable | Whether to use mbuffer.
|
| options/darwin/services.buildkite-agents.<name>.extraConfig | Extra lines to be added verbatim to the configuration file.
|
| options/home-manager/accounts.email.accounts.<name>.notmuch.enable | Whether to enable notmuch indexing.
|
| options/home-manager/accounts.contact.accounts.<name>.khard.enable | Whether to enable khard access.
|
| options/nixos/services.logcheck.ignoreCron.<name>.cmdline | Command line for the cron job
|
| options/nixos/systemd.services.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/home-manager/accounts.calendar.accounts.<name>.khal.type | Either a single calendar (calendar which is the default) or a directory with multiple calendars (discover).
|
| options/home-manager/services.restic.backups.<name>.pruneOpts | A list of policy options for 'restic forget --prune', to automatically
prune old snapshots
|
| options/nixos/services.prometheus.scrapeConfigs.*.triton_sd_configs.*.groups | A list of groups for which targets are retrieved, only supported when targeting the container role
|
| options/nixos/services.errbot.instances.<name>.extraConfig | String to be appended to the config verbatim
|
| options/nixos/services.wyoming.piper.servers.<name>.lengthScale | Phoneme length value.
|
| options/nixos/services.wordpress.sites.<name>.mergedConfig | Read only representation of the final configuration.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.app | Settings to write to app.json.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.monitor | The monitor where the rule should be applied.
|
| options/home-manager/accounts.calendar.accounts.<name>.local.fileExt | The file extension to use.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.desktop | The desktop where the rule should be applied.
|
| options/nixos/services.jitsi-videobridge.xmppConfigs.<name>.mucNickname | Videobridges use the same XMPP account and need to be distinguished by the
nickname (aka resource part of the JID)
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.gatewayGroups | A list of gateway groups (sites) which can reach the resource and may be used to connect to it.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.eap_id | Identity to use as peer identity during EAP authentication
|
| options/nixos/services.firewalld.zones.<name>.forwardPorts | Ports to forward in the zone.
|
| options/nixos/services.firewalld.zones.<name>.sources.*.ipset | An ipset.
|
| options/nixos/services.sabnzbd.settings.servers.<name>.host | Hostname of the server
|
| options/nixos/services.sabnzbd.settings.servers.<name>.port | Port of the server
|
| options/nixos/services.nginx.virtualHosts.<name>.locations | Declarative location config
|
| options/nixos/services.vdirsyncer.jobs.<name>.timerConfig | systemd timer configuration
|
| options/nixos/services.vault-agent.instances.<name>.package | The vault package to use.
|
| options/nixos/services.k3s.autoDeployCharts.<name>.enable | Whether to enable the installation of this Helm chart
|
| options/home-manager/programs.zed-editor.themes | Each theme is written to
$XDG_CONFIG_HOME/zed/themes/theme-name.json
where the name of each attribute is the theme-name
See https://zed.dev/docs/extensions/themes for the structure of a
Zed theme
|
| options/nixos/systemd.services.<name>.stopIfChanged | If set, a changed unit is restarted by calling
systemctl stop in the old configuration,
then systemctl start in the new one
|
| options/nixos/services.matrix-tuwunel.settings.global.unix_socket_path | Listen on a UNIX socket at the specified path
|
| options/nixos/services.orangefs.server.fileSystems.<name>.id | File system ID (must be unique within configuration).
|
| options/home-manager/services.colima.profiles.<name>.settings | Colima configuration settings, see https://github.com/abiosoft/colima/blob/main/embedded/defaults/colima.yaml or run colima template.
|
| options/nixos/services.openssh.knownHosts.<name>.publicKey | The public key data for the host
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.pools | List of named IP pools to allocate virtual IP addresses
and other configuration attributes from
|
| options/nixos/services.znapzend.zetup.<name>.postsnap | Command to run after snapshots are taken on the source dataset,
e.g. for database unlocking
|
| options/nixos/services.traefik.staticConfigFile | Path to traefik's static configuration to use.
(Using that option has precedence over staticConfigOptions and dynamicConfigOptions)
|
| options/nixos/services.ente.api.settings | Museum yaml configuration
|
| options/nixos/hardware.deviceTree.overlays.*.dtboFile | Path to .dtbo compiled overlay file.
|
| options/nixos/services.airsonic.contextPath | The context path, i.e., the last part of the Airsonic
URL
|
| options/nixos/services.subsonic.contextPath | The context path, i.e., the last part of the Subsonic
URL
|
| options/nixos/services.outline.secretKeyFile | File path that contains the application secret key
|
| options/nixos/services.moodle.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/services.ncdns.dnssec.keys.zonePrivate | Path to the file containing the ZSK private key.
|
| options/nixos/services.rkvm.server.settings.key | TLS key path.
This should be generated with rkvm-certificate-gen.
|
| options/nixos/services.mirakurun.unixSocket | Path to unix socket to listen on
|
| options/nixos/services.oauth2-proxy.upstream | The http url(s) of the upstream endpoint or file://
paths for static files
|
| options/nixos/systemd.shutdownRamfs.storePaths.*.target | Path of the symlink.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.root | The path of the web root directory.
|
| options/home-manager/services.dunst.configFile | Path to the configuration file read by dunst
|
| options/home-manager/services.polybar.script | This script will be used to start the polybars
|
| options/nixos/services.drupal.sites.<name>.virtualHost.enableUserDir | Whether to enable serving ~/public_html as
/~«username».
|
| options/nixos/services.neo4j.ssl.policies.<name>.tlsVersions | Restrict the TLS protocol versions of this policy to those
defined here.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost | Apache configuration can be done by adapting services.httpd.virtualHosts.
|
| options/nixos/services.wyoming.piper.servers.<name>.speaker | ID of a specific speaker in a multi-speaker model.
|
| options/darwin/environment.launchAgents.<name>.enable | Whether this file should be generated
|
| options/home-manager/programs.gnome-terminal.profile.<name>.allowBold | If true, allow applications in the
terminal to make text boldface.
|
| options/home-manager/services.kanshi.profiles.<name>.outputs.*.scale | Scales the output by the specified scale factor.
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.present | Whether to ensure that this user is present or absent.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.logFormat | Log format for Apache's log files
|
| options/nixos/systemd.network.netdevs.<name>.l2tpSessions | Each item in this array specifies an option in the
[L2TPSession] section of the unit
|
| options/nixos/systemd.network.networks.<name>.ipv6SendRAConfig | Each attribute in this set specifies an option in the
[IPv6SendRA] section of the unit
|
| options/home-manager/programs.floorp.profiles.<name>.search.order | The order the search engines are listed in
|
| options/nixos/services.fedimintd.<name>.api.openFirewall | Opens port in firewall for fedimintd's api port
|
| options/nixos/services.pgbackrest.stanzas.<name>.jobs | Backups jobs to schedule for this stanza as described in:
https://pgbackrest.org/user-guide.html#quickstart/schedule-backup
|
| options/home-manager/programs.ssh.matchBlocks.<name>.remoteForwards.*.host | Host port binding options
|
| options/home-manager/programs.ssh.matchBlocks.<name>.remoteForwards.*.bind | Local port binding options
|
| options/home-manager/accounts.calendar.accounts.<name>.khal.readOnly | Keep khal from making any changes to this account.
|
| options/nixos/services.frp.instances.<name>.settings | Frp configuration, for configuration options
see the example of client
or server on github.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags.deleted | Tag for notmuch to use for messages stored in the mailbox labeled with the
Trash name attribute
|
| options/nixos/boot.initrd.luks.devices.<name>.fido2.credential | The FIDO2 credential ID.
|
| options/home-manager/programs.firefox.profiles.<name>.userContent | Custom Firefox user content CSS.
|
| options/nixos/services.blockbook-frontend.<name>.cssDir | Location of the dir with main.css CSS file
|
| options/nixos/services.atalkd.interfaces.<name>.config | Optional configuration string for this interface.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.loginShell | Run command as a login shell.
|
| options/nixos/services.openafsServer.cellServDB.*.dnsname | DNS full-qualified domain name of a database server
|
| options/nixos/services.openafsClient.cellServDB.*.dnsname | DNS full-qualified domain name of a database server
|
| options/darwin/launchd.agents.<name>.serviceConfig.ServiceIPC | This optional key specifies whether the job participates in advanced
communication with launchd
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.updown | Updown script to invoke on CHILD_SA up and down events.
|
| options/nixos/networking.wlanInterfaces.<name>.meshID | MeshID of interface with type mesh.
|
| options/home-manager/accounts.calendar.accounts.<name>.remote.type | The type of the storage.
|
| options/home-manager/services.pizauth.accounts.<name>.clientSecret | The OAuth2 client secret.
|
| options/nixos/boot.initrd.luks.devices.<name>.allowDiscards | Whether to allow TRIM requests to the underlying device
|
| options/nixos/services.borgbackup.repos.<name>.quota | Storage quota for the repository
|
| options/nixos/services.rke2.autoDeployCharts.<name>.enable | Whether to enable the installation of this Helm chart
|
| options/home-manager/xdg.configFile.<name>.ignorelinks | When recursive is enabled, adds -ignorelinks flag to lndir
It causes lndir to not treat symbolic links in the source directory specially
|
| options/nixos/services.nginx.virtualHosts.<name>.http2 | Whether to enable the HTTP/2 protocol
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.splitRatio | The ratio between the new window and the previous existing window in
the desktop.
|
| options/nixos/networking.wireless.networks.<name>.pskRaw | Either the raw pre-shared key in hexadecimal format
or the name of the secret (as defined inside
networking.wireless.secretsFile and prefixed
with ext:) containing the network pre-shared key.
Be aware that this will be written to the Nix store
in plaintext! Always use an external reference.
The external secret can be either the plaintext
passphrase or the raw pre-shared key.
Mutually exclusive with psk and auth.
|
| options/nixos/services.nginx.upstreams.<name>.servers | Defines the address and other parameters of the upstream servers
|
| options/nixos/services.nebula.networks.<name>.tun.disable | When tun is disabled, a lighthouse can be started without a local tun interface (and therefore without root).
|
| options/nixos/services.wstunnel.clients.<name>.remoteToLocal | Listen on remote and forwards traffic from local
|
| options/nixos/services.blockbook-frontend.<name>.debug | Debug mode, return more verbose errors, reload templates on each request.
|
| options/nixos/services.openafsServer.roles.backup.cellServDB.<name>.*.ip | IP Address of a database server
|
| options/home-manager/accounts.email.accounts.<name>.getmail.enable | Whether to enable the getmail mail retriever for this account.
|
| options/nixos/services.gancio.settings.hostname | The domain name under which the server is reachable.
|
| options/nixos/services.gitlab-runner.services.<name>.cloneUrl | Overwrite the URL for the GitLab instance
|
| options/nixos/systemd.network.netdevs.<name>.macvlanConfig | Each attribute in this set specifies an option in the
[MACVLAN] section of the unit
|
| options/darwin/services.gitlab-runner.services.<name>.cloneUrl | Overwrite the URL for the GitLab instance
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits | Resource limits to be imposed on the job
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits | Resource limits to be imposed on the job
|
| options/nixos/services.bepasty.servers.<name>.secretKey | server secret for safe session cookies, must be set
|
| options/nixos/services.fluidd.nginx.serverName | Name of this virtual host
|
| options/nixos/services.akkoma.nginx.serverName | Name of this virtual host
|
| options/nixos/services.gancio.nginx.serverName | Name of this virtual host
|
| options/nixos/networking.vlans | This option allows you to define vlan devices that tag packets
on top of a physical interface
|
| options/nixos/services.matomo.nginx.serverName | Name of this virtual host
|
| options/nixos/services.monica.nginx.serverName | Name of this virtual host
|
| options/nixos/services.cross-seed.settingsFile | Path to a JSON file containing settings that will be merged with the
settings option
|
| options/nixos/boot.loader.external.installHook | The full path to a program of your choosing which performs the bootloader installation process
|
| options/nixos/services.hound.settings | The full configuration of the Hound daemon
|
| options/nixos/services.pihole-ftl.stateDirectory | Path for pihole state files.
|
| options/nixos/services.moodle.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| options/nixos/services.nagios.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| options/nixos/services.pairdrop.rtcConfig | Configuration for STUN/TURN servers
|
| options/nixos/services.outline.smtp.passwordFile | File path containing the password to authenticate with.
|
| options/nixos/services.minetest-server.logPath | Path to logfile for logging
|
| options/nixos/services.oauth2-proxy.cookie.secretFile | The path to a file containing the seed string for secure cookies.
|
| options/nixos/services.tailscaleAuth.socketPath | Path of the socket listening to authorization requests.
|
| options/nixos/systemd.shutdownRamfs.storePaths.*.source | Path of the source file.
|
| options/nixos/services.matrix-synapse.configFile | Path to the configuration file on the target system
|
| options/home-manager/programs.claude-code.commandsDir | Path to a directory containing command files for Claude Code
|
| options/nixos/services.wstunnel.clients.<name>.extraArgs | Extra command line arguments to pass to wstunnel
|
| options/nixos/services.wstunnel.servers.<name>.extraArgs | Extra command line arguments to pass to wstunnel
|
| options/nixos/services.borgbackup.jobs.<name>.postHook | Shell commands to run just before exit
|
| options/nixos/services.inadyn.settings.provider.<name>.ssl | Whether to use HTTPS for this DDNS provider.
|
| options/nixos/services.grafana.provision.alerting.muteTimings.settings.deleteMuteTimes.*.name | Name of the mute time interval, must be unique
|
| options/nixos/services.peertube-runner.instancesToRegister.<name>.runnerName | Runner name declared to the PeerTube instance.
|
| options/nixos/services.wordpress.sites.<name>.uploadsDir | This directory is used for uploads of pictures
|
| options/home-manager/programs.ssh.matchBlocks.<name>.forwardX11Trusted | Specifies whether remote X11 clients will have full access to the
original X11 display.
|
| options/home-manager/programs.alot.tags.<name>.translation | A pair of strings that define a regular substitution to
compute the string representation on the fly using
re.sub.
|
| options/nixos/services.httpd.virtualHosts.<name>.forceSSL | Whether to add a separate nginx server block that permanently redirects (301)
all plain HTTP traffic to HTTPS
|
| options/nixos/services.v4l2-relayd.instances.<name>.input.width | The width to read from input-stream.
|
| options/nixos/systemd.services.<name>.reloadIfChanged | Whether the service should be reloaded during a NixOS
configuration switch if its definition has changed
|
| options/nixos/services.davis.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.davis.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.movim.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.slskd.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.movim.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.slskd.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/home-manager/accounts.email.accounts.<name>.msmtp.extraConfig | Extra configuration options to add to ~/.msmtprc
|
| options/nixos/services.snapserver.streams.<name>.codec | Default audio compression method.
|
| options/nixos/services.vdirsyncer.jobs.<name>.config.pairs | vdirsyncer pair configurations
|
| options/home-manager/programs.hexchat.channels.<name>.commands | Commands to be executed on connecting to server.
|
| options/home-manager/programs.i3status.modules.<name>.position | Position of this module in i3status order.
|
| options/nixos/services.caddy.virtualHosts.<name>.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/darwin/launchd.agents.<name>.serviceConfig.InitGroups | This optional key specifies whether initgroups(3) should be called before running the job
|
| options/darwin/launchd.agents.<name>.serviceConfig.LimitLoadToHosts | This configuration file only applies to the hosts listed with this key
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.readBuckets | The organization's buckets which should be allowed to be read
|
| options/nixos/services.znc.confOptions.networks.<name>.extraConf | Extra config for the network
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ecdsa.<name>.file | File name in the ecdsa folder for which this
passphrase should be used.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs8.<name>.file | File name in the pkcs8 folder for which this
passphrase should be used.
|
| options/nixos/services.fedimintd.<name>.bitcoin.network | Bitcoin network to participate in.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.default | Whether this should be the default profile.
|
| options/darwin/launchd.agents.<name>.serviceConfig.OnDemand | This key was used in Mac OS X 10.4 to control whether a job was kept alive or not
|
| options/home-manager/accounts.email.accounts.<name>.getmail.readAll | Enable if you want to fetch all, even the read messages from the
server
|
| options/nixos/services.httpd.virtualHosts.<name>.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.httpd.virtualHosts.<name>.robotsEntries | Specification of pages to be ignored by web crawlers
|
| options/nixos/services.fedimintd.<name>.p2p.openFirewall | Opens port in firewall for fedimintd's p2p port (both TCP and UDP)
|
| options/nixos/services.caddy.virtualHosts.<name>.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.nginx.virtualHosts.<name>.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.easytier.instances.<name>.enable | Enable the instance.
|
| options/nixos/services.firewalld.services.<name>.ports.*.port | |
| options/nixos/services.opkssh.providers.<name>.lifetime | Token lifetime
|
| options/home-manager/programs.floorp.profiles.<name>.bookmarks | Declarative bookmarks.
|
| options/nixos/services.btrbk.instances.<name>.settings | configuration options for btrbk
|
| options/home-manager/programs.ssh.matchBlocks.<name>.localForwards.*.host.port | Specifies port number to forward to.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.private | Whether the node should stay in the same tiling position and size.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.localForwards.*.bind.port | Specifies port number to bind to.
|
| options/nixos/networking.wireguard.interfaces.<name>.listenPort | 16-bit port for listening
|
| options/nixos/systemd.network.networks.<name>.bridgeConfig | Each attribute in this set specifies an option in the
[Bridge] section of the unit
|
| options/nixos/systemd.network.networks.<name>.pfifoFastConfig | Each attribute in this set specifies an option in the
[PFIFOFast] section of the unit
|
| options/nixos/services.acme-dns.settings.general.nsname | Zone name server.
|
| options/nixos/services.akkoma.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.gancio.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.fluidd.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.httpd.virtualHosts.<name>.locations | Declarative location config
|
| options/nixos/services.monica.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.tinc.networks.<name>.interfaceType | The type of virtual interface used for the network connection.
|
| options/nixos/services.matomo.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.kexAlgorithms | Specifies the available KEX (Key Exchange) algorithms.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.policies.<name>.description | The description of this policy
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.operator | Grants all permissions in all organizations.
|
| options/nixos/services.nginx.virtualHosts.<name>.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.multipath.devices.*.skip_kpartx | If set to yes, kpartx will not automatically create partitions on the device
|
| options/nixos/services.snapserver.http.docRoot | Path to serve from the HTTP servers root.
|
| options/nixos/programs.xwayland.defaultFontPath | Default font path
|
| options/nixos/services.actual.settings | Server settings, refer to the documentation for available options
|
| options/nixos/services.hickory-dns.configFile | Path to an existing toml file to configure hickory-dns with
|
| options/nixos/services.hadoop.hdfs.datanode.dataDirs | Tier and path definitions for datanode storage.
|
| options/nixos/services.komodo-periphery.ssl.keyFile | Path to SSL key file.
|
| options/nixos/services.paperless.manage | The package derivation for the paperless-manage wrapper script
|
| options/nixos/services.syncthing.configDir | The path where the settings and keys will exist.
|
| options/nixos/services.transfer-sh.secretFile | Path to file containing environment variables
|
| options/nixos/services.nagios.virtualHost.sslServerCert | Path to server SSL certificate.
|
| options/nixos/services.pretix.settings.tools.pdftk | Path to the pdftk executable.
|
| options/nixos/services.peering-manager.secretKeyFile | Path to a file containing the secret key.
|
| options/nixos/services.moodle.virtualHost.sslServerCert | Path to server SSL certificate.
|
| options/nixos/services.thanos.rule.web.route-prefix | Prefix for API and UI endpoints
|
| options/nixos/services.zabbixWeb.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/services.postsrsd.secretsFile | Secret keys used for signing and verification.
The secret will be generated, if it does not exist at the given path.
|
| options/nixos/services.lasuite-docs.settings.DATA_DIR | Path to the data directory
|
| options/nixos/systemd.user.targets.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.user.sockets.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.tahoe.introducers.<name>.tub.port | The port on which the introducer will listen.
|
| options/nixos/services.tarsnap.archives.<name>.excludes | Exclude files and directories matching these patterns.
|
| options/home-manager/programs.hexchat.channels.<name>.autojoin | Channels list to autojoin on connecting to server.
|
| options/home-manager/accounts.calendar.accounts.<name>.qcal.enable | Whether to enable qcal access.
|
| options/home-manager/accounts.calendar.accounts.<name>.khal.enable | Whether to enable khal access.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.userNameCommand | A command that prints the user name to standard output.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/networking.domain | The system domain name
|
| options/nixos/services.stargazer.certOrg | The name of the organization responsible for the X.509
certificate's /O name.
|
| options/nixos/services.xserver.cmt.models | Which models to enable cmt for
|
| options/nixos/services.blockbook-frontend.<name>.enable | Whether to enable blockbook-frontend application.
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.algorithm | Which algorithm to use for DNSSEC
|
| options/nixos/systemd.services.<name>.environment | Environment variables passed to the service's processes.
|
| options/nixos/services.fedimintd.<name>.nginx.config.quic | Whether to enable the QUIC transport protocol
|
| options/nixos/systemd.user.targets.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/systemd.user.sockets.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/systemd.services.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/darwin/launchd.daemons.<name>.serviceConfig.GroupName | This optional key specifies the group to run the job as
|
| options/nixos/services.jibri.xmppEnvironments.<name>.control.muc.nickname | The nickname for this Jibri instance in the MUC.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.protocol | The protocol to allow
|
| options/nixos/services.ytdl-sub.instances.<name>.schedule | How often to run ytdl-sub
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.expunge | Permanently remove messages marked for deletion from
the given mail store.
|
| options/nixos/services.errbot.instances.<name>.identity | Errbot identity configuration
|
| options/nixos/services.gitlab-runner.services.<name>.dockerImage | Docker image to be used.
|
| options/nixos/networking.supplicant.<name>.driver | Force a specific wpa_supplicant driver.
|
| options/nixos/networking.wlanInterfaces.<name>.flags | Flags for interface of type monitor.
|
| options/darwin/services.gitlab-runner.services.<name>.dockerImage | Docker image to be used.
|
| options/home-manager/services.xsuspender.rules.<name>.resumeEvery | Resume interval in seconds.
|
| options/nixos/boot.specialFileSystems.<name>.options | Options used to mount the file system
|
| options/nixos/systemd.services.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/services.autorandr.profiles.<name>.fingerprint | Output name to EDID mapping
|
| options/home-manager/programs.autorandr.profiles.<name>.fingerprint | Output name to EDID mapping
|
| options/nixos/services.wordpress.sites.<name>.settings | Structural Wordpress configuration
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/nixos/services.firewalld.zones.<name>.forwardPorts.*.port | |
| options/home-manager/programs.gnome-terminal.profile.<name>.cursorShape | The cursor shape.
|
| options/nixos/services.nginx.virtualHosts.<name>.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.description | Optional description for the API token
|
| options/nixos/services.drupal.sites.<name>.virtualHost.http2 | Whether to enable HTTP 2
|
| options/home-manager/programs.floorp.profiles.<name>.preConfig | Extra preferences to add to user.js, before
programs.firefox.profiles._name_.settings
|
| options/nixos/services.postfix.settings.master.<name>.args | Arguments to pass to the command
|
| options/nixos/services.github-runners.<name>.noDefaultLabels | Disables adding the default labels
|
| options/darwin/services.github-runners.<name>.noDefaultLabels | Disables adding the default labels
|
| options/nixos/systemd.network.networks.<name>.matchConfig | Each attribute in this set specifies an option in the
[Match] section of the unit
|
| options/nixos/networking.wlanInterfaces.<name>.type | The type of the WLAN interface
|
| options/nixos/image.repart.partitions.<name>.repartConfig | Specify the repart options for a partiton as a structural setting
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.writeBuckets | The organization's buckets which should be allowed to be written
|
| options/nixos/services.tahoe.nodes.<name>.storage.reservedSpace | The amount of filesystem space to not use for storage.
|
| options/nixos/services.redis.servers.<name>.maxclients | Set the max number of connected clients at the same time.
|
| options/home-manager/services.kanshi.profiles.<name>.outputs.*.status | Enables or disables the specified output.
|
| options/home-manager/systemd.user.slices.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.serverAliveInterval | Set timeout in seconds after which response will be requested.
|
| options/home-manager/systemd.user.mounts.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/home-manager/systemd.user.timers.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/nixos/services.borgbackup.jobs.<name>.extraInitArgs | Additional arguments for borg init
|
| options/nixos/services.mosquitto.bridges.<name>.topics | Topic patterns to be shared between the two brokers
|
| options/home-manager/accounts.calendar.accounts.<name>.khal.color | Color in which events in this calendar are displayed
|
| options/home-manager/services.pizauth.accounts.<name>.extraConfig | Additional configuration that will be added to the account configuration
|
| options/nixos/services.wstunnel.servers.<name>.restrictTo | Accepted traffic will be forwarded only to this service.
|
| options/nixos/services.keepalived.vrrpScripts.<name>.fall | Required number of failures for KO transition.
|
| options/nixos/services.fedimintd.<name>.nginx.config.listen.*.ssl | Enable SSL.
|
| options/nixos/services.keepalived.vrrpScripts.<name>.rise | Required number of successes for OK transition.
|
| options/nixos/services.blockbook-frontend.<name>.public | Public http server binding [address]:port.
|
| options/nixos/services.znc.confOptions.networks.<name>.modules | ZNC network modules to load.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.GroupName | This optional key specifies the group to run the job as
|
| options/nixos/networking.jool.siit.<name>.framework | The framework to use for attaching Jool's translation to the exist
kernel packet processing rules
|
| options/home-manager/accounts.email.accounts.<name>.jmap.sessionUrl | URL for the JMAP Session resource
|
| options/nixos/hardware.sensor.hddtemp.drives | List of drives to monitor
|
| options/nixos/services.freeradius.configDir | The path of the freeradius server configuration directory.
|
| options/nixos/services.athens.storage.s3.forcePathStyle | Force path style for the S3 storage backend.
|
| options/nixos/services.headphones.configFile | Path to config file.
|
| options/nixos/services.nipap.nipap-www.xmlrpcURIFile | Path to file containing XMLRPC URI for use by web UI - this is a secret, since it contains auth credentials
|
| options/nixos/services.syncplay.saltFile | Path to the file that contains the server salt
|
| options/nixos/services.zitadel.settings.TLS.KeyPath | Path to the TLS certificate private key.
|
| options/nixos/services.zitadel.settings.TLS.CertPath | Path to the TLS certificate.
|
| options/home-manager/programs.nushell.configFile.source | Path of the nushell config.nu file to use
|
| options/nixos/services.autorandr.profiles.<name>.config | Per output profile configuration.
|
| options/nixos/services.authelia.instances.<name>.enable | Whether to enable Authelia instance.
|
| options/nixos/services.sanoid.templates.<name>.autosnap | Whether to automatically take snapshots.
|
| options/darwin/networking.wg-quick.interfaces.<name>.dns | List of DNS servers for this interface.
|
| options/home-manager/programs.librewolf.profiles.<name>.search | Declarative search engine configuration.
|
| options/home-manager/programs.autorandr.profiles.<name>.config | Per output profile configuration.
|
| options/home-manager/services.pizauth.accounts.<name>.scopes | The scopes which the OAuth2 token will give access to
|
| options/nixos/services.blockbook-frontend.<name>.coinName | See https://github.com/trezor/blockbook/blob/master/bchain/coins/blockchain.go#L61
for current of coins supported in master (Note: may differ from release).
|
| options/home-manager/programs.ssh.matchBlocks.<name>.dynamicForwards | Specify dynamic port forwardings
|
| options/nixos/services.wordpress.sites.<name>.database.user | Database user.
|
| options/home-manager/accounts.email.accounts.<name>.signature.text | Signature content.
|
| options/nixos/services.postfix.masterConfig.<name>.maxproc | The maximum number of processes to spawn for this service
|
| options/nixos/services.drupal.sites.<name>.virtualHost.enableACME | Whether to ask Let's Encrypt to sign a certificate for this vhost
|
| options/nixos/services.nginx.virtualHosts.<name>.reuseport | Create an individual listening socket
|
| options/nixos/services.firewalld.zones.<name>.forwardPorts.*.to-port | |
| options/nixos/networking.nftables.tables.<name>.content | The table content.
|
| options/nixos/services.restic.backups.<name>.repository | repository to backup to.
|
| options/nixos/services.k3s.manifests.<name>.content | Content of the manifest file
|
| options/nixos/services.davis.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.slskd.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.movim.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/darwin/launchd.agents.<name>.serviceConfig.LaunchOnlyOnce | This optional key specifies whether the job can only be run once and only once
|
| options/nixos/services.firezone.server.provision.accounts.<name>.actors | All actors (users) to provision
|
| options/nixos/services.snapserver.streams.<name>.query | Key-value pairs that convey additional parameters about a stream.
|
| options/nixos/systemd.user.targets.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/systemd.user.sockets.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/darwin/environment.userLaunchAgents.<name>.enable | Whether this file should be generated
|
| options/nixos/services.pgbackrest.stanzas.<name>.instances | An attribute set of database instances as described in:
https://pgbackrest.org/configuration.html#section-stanza
Each instance defaults to set pg-host to the attribute's name
|
| options/nixos/documentation.man.mandoc.settings.output.includes | A string of relative path used as a template for the output path of
linked header files (usually via the In macro) in HTML output
|
| options/nixos/services.fedimintd.<name>.nginx.config.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/systemd.network.networks.<name>.flowQueuePIEConfig | Each attribute in this set specifies an option in the
[FlowQueuePIE] section of the unit
|
| options/darwin/launchd.agents.<name>.serviceConfig.Program | This key maps to the first argument of execvp(3)
|
| options/nixos/services.inadyn.settings.custom.<name>.include | File to include additional settings for this provider from.
|
| options/nixos/systemd.services.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.boldIsBright | Whether bold text is shown in bright colors.
|
| options/home-manager/programs.irssi.networks.<name>.server.autoConnect | Whether Irssi connects to the server on launch.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.flatten | If set, flattens the hierarchy within the maildir by
substituting the canonical hierarchy delimiter
/ with this value.
|
| options/nixos/networking.wg-quick.interfaces.<name>.dns | The IP addresses of DNS servers to configure.
|
| options/nixos/services.sanoid.datasets.<name>.autoprune | Whether to automatically prune old snapshots.
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.uri | URI to bind the wyoming server to.
|
| options/nixos/services.tarsnap.archives.<name>.lowmem | Reduce memory consumption by not caching small files
|
| options/nixos/services.borgbackup.jobs.<name>.prune.keep | Prune a repository by deleting all archives not matching any of the
specified retention options
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs12.<name>.file | File name in the pkcs12 folder for which this
passphrase should be used.
|
| options/nixos/systemd.network.networks.<name>.ipv6Prefixes | A list of ipv6Prefix sections to be added to the unit
|
| options/nixos/services.kanboard.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.fediwall.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.librenms.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.agorakit.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.mainsail.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.wordpress.sites.<name>.database.port | Database host port.
|
| options/nixos/services.wordpress.sites.<name>.database.host | Database host address.
|
| options/darwin/services.buildkite-agents.<name>.preCommands | Extra commands to run before starting buildkite.
|
| options/home-manager/accounts.email.accounts.<name>.meli.mailboxes | Mailboxes to show in meli
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.patterns | Pattern of mailboxes to synchronize.
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.coverage | The length of time to ensure that keys will be correct; no action will be taken to create new keys to be activated after this time.
|
| options/darwin/launchd.agents.<name>.serviceConfig.LimitLoadFromHosts | This configuration file only applies to hosts NOT listed with this key
|
| options/nixos/services.drupal.sites.<name>.virtualHost.listen | Listen addresses and ports for this virtual host.
This option overrides addSSL, forceSSL and onlySSL
|
| options/nixos/services.influxdb2.provision.organizations.<name>.buckets.<name>.present | Whether to ensure that this bucket is present or absent.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.groups | Authorization group memberships to require
|
| options/home-manager/services.xsuspender.rules.<name>.execResume | Before resuming, execute this shell script
|
| options/home-manager/services.muchsync.remotes.<name>.local.importNew | Whether to begin the synchronisation by running
notmuch new locally.
|
| options/nixos/services.restic.backups.<name>.initialize | Create the repository if it doesn't exist.
|
| options/nixos/services.traefik.dynamicConfigFile | Path to traefik's dynamic configuration to use.
(Using that option has precedence over dynamicConfigOptions)
|
| options/nixos/services.komodo-periphery.ssl.certFile | Path to SSL certificate file.
|
| options/nixos/services.immich-kiosk.settings | Configuration for immich-kiosk
|
| options/nixos/hardware.deviceTree.overlays.*.dtsFile | Path to .dts overlay file, overlay is applied to
each .dtb file matching "compatible" of the overlay.
|
| options/nixos/services.rustus.storage.data_dir | path to the local directory where all files are stored
|
| options/nixos/services.outline.storage.forcePathStyle | Force S3 path style.
|
| options/nixos/services.phylactery.library | Path to CBZ library
|
| options/nixos/services.soju.tlsCertificate | Path to server TLS certificate.
|
| options/nixos/services.pomerium.secretsFile | Path to file containing secrets for Pomerium, in systemd
EnvironmentFile format
|
| options/nixos/services.stash.settings.database | Path to the SQLite database
|
| options/home-manager/programs.gpg.mutableKeys | If set to true, you may manage your keyring as a user
using the gpg command
|
| options/home-manager/accounts.calendar.accounts.<name>.primary | Whether this is the primary account
|
| options/nixos/services.firewalld.zones.<name>.ports.*.protocol | |
| options/nixos/services.headscale.settings.oidc.client_secret_path | Path to OpenID Connect client secret file
|
| options/nixos/services.snipe-it.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.rke2.manifests.<name>.content | Content of the manifest file
|
| options/nixos/services.fedimintd.<name>.nginx.config.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| options/nixos/services.firewalld.zones.<name>.forward | Whether to enable intra-zone forwarding
|
| options/nixos/services.vmalert.instances.<name>.rules | A list of the given alerting or recording rules against configured "datasource.url" compatible with
Prometheus HTTP API for vmalert to execute
|
| options/nixos/services.prefect.workerPools.<name>.installPolicy | install policy for the worker (always, if-not-present, never, prompt)
|
| options/darwin/environment.launchDaemons.<name>.enable | Whether this file should be generated
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saeAddToMacAllow | If set, all sae password entries that have a non-wildcard MAC associated to
them will additionally be used to populate the MAC allow list
|
| options/nixos/services.drupal.sites.<name>.virtualHost.extraConfig | These lines go to httpd.conf verbatim
|
| options/darwin/launchd.agents.<name>.serviceConfig.LowPriorityIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O.
|
| options/home-manager/programs.firefox.profiles.<name>.search.order | The order the search engines are listed in
|
| options/nixos/services.nipap.settings.nipapd.db_name | Name of database to use on PostgreSQL server.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.manage | Whether the window should be managed by bspwm
|
| options/nixos/services.awstats.configs.<name>.webService.enable | Whether to enable awstats web service.
|
| options/nixos/services.easytier.instances.<name>.extraArgs | Extra args append to the easytier command-line.
|
| options/nixos/services.davis.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.slskd.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.movim.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.logrotate.settings.<name>.enable | Whether to enable setting individual kill switch.
|
| options/darwin/networking.wg-quick.interfaces.<name>.mtu | MTU to set for this interface, automatically set if not specified
|
| options/home-manager/programs.ssh.matchBlocks.<name>.dynamicForwards.*.port | Specifies port number to bind to.
|
| options/nixos/networking.bonds | This option allows you to define bond devices that aggregate multiple,
underlying networking interfaces together
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.reqid | Fixed reqid to use for this CHILD_SA
|
| options/nixos/systemd.user.services.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.jibri.xmppEnvironments.<name>.control.login.username | User part of the JID.
|
| options/nixos/networking.wg-quick.interfaces.<name>.preUp | Commands called at the start of the interface setup.
|
| options/nixos/services.fedimintd.<name>.nginx.config.listen.*.addr | Listen address.
|
| options/nixos/services.v4l2-relayd.instances.<name>.input.height | The height to read from input-stream.
|
| options/darwin/networking.wg-quick.interfaces.<name>.preUp | List of commands to run before interface setup.
|
| options/home-manager/accounts.contact.accounts.<name>.khard.type | Either a single vdir located in accounts.contact.accounts._name_.local.path
or multiple automatically discovered vdirs in
accounts.contact.accounts._name_.local.path/accounts.contact.accounts._name_.khard.glob.
|
| options/nixos/services.postfix.masterConfig.<name>.private | Whether the service's sockets and storage directory is restricted to
be only available via the mail system
|
| options/nixos/services.fedimintd.<name>.nginx.config.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| options/nixos/services.restic.backups.<name>.dynamicFilesFrom | A script that produces a list of files to back up
|
| options/nixos/services.fluidd.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.fluidd.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.akkoma.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.akkoma.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.gancio.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.gancio.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.matomo.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.matomo.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.monica.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.monica.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.subFolders | The on-disk folder naming style
|
| options/nixos/services.fedimintd.<name>.nginx.config.default | Makes this vhost the default.
|
| options/home-manager/programs.hexchat.channels.<name>.options.forceSSL | Use SSL for all servers.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.ServiceIPC | This optional key specifies whether the job participates in advanced
communication with launchd
|
| options/home-manager/launchd.agents.<name>.config.AbandonProcessGroup | When a job dies, launchd kills any remaining processes with the same process group ID as the job
|
| options/nixos/systemd.user.services.<name>.stopIfChanged | If set, a changed unit is restarted by calling
systemctl stop in the old configuration,
then systemctl start in the new one
|
| options/nixos/boot.initrd.luks.devices.<name>.tryEmptyPassphrase | If keyFile fails then try an empty passphrase first before
prompting for password.
|
| options/home-manager/programs.i3status.modules.<name>.settings | Configuration to add to this i3status module
|
| options/home-manager/programs.hexchat.channels.<name>.password | Password to use
|
| options/nixos/services.wstunnel.servers.<name>.restrictTo.*.port | The port.
|
| options/nixos/services.wstunnel.servers.<name>.restrictTo.*.host | The hostname.
|
| options/nixos/services.firewalld.zones.<name>.protocols | Protocols to allow in the zone.
|
| options/nixos/services.blockbook-frontend.<name>.configFile | Location of the blockbook configuration file.
|
| options/nixos/services.zeronsd.servedNetworks.<name>.package | The zeronsd package to use.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.audibleBell | Turn on/off the terminal's bell.
|
| options/nixos/services.kanata.keyboards.<name>.devices | Paths to keyboard devices
|
| options/nixos/services.blockbook-frontend.<name>.package | The blockbook package to use.
|
| options/nixos/programs.proxychains.proxies.<name>.type | Proxy type.
|
| options/nixos/programs.proxychains.proxies.<name>.port | Proxy port
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.settings.<name>.permissions | Allowed permissions for this extension
|
| options/nixos/services.tor.relay.onionServices.<name>.settings | Settings of the onion service
|
| options/nixos/services.netbird.tunnels.<name>.dns-resolver.port | A port to serve DNS entries on when dns-resolver.address is enabled.
|
| options/nixos/services.netbird.clients.<name>.dns-resolver.port | A port to serve DNS entries on when dns-resolver.address is enabled.
|
| options/nixos/services.forgejo.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/services.gokapi.settingsFile | Path to config file to parse and append to settings
|
| options/nixos/services.libinput.touchpad.dev | Path for touchpad device
|
| options/nixos/services.code-server.extensionsDir | Path to the extensions directory.
|
| options/nixos/services.bluesky-pds.pdsadmin.enable | Add pdsadmin script to PATH
|
| options/nixos/services.buildbot-master.masterCfg | Optionally pass master.cfg path
|
| options/nixos/services.forgejo.settings.log.ROOT_PATH | Root path for log files.
|
| options/nixos/services.shibboleth-sp.configFile | Path to shibboleth config file
|
| options/nixos/services.outline.storage.secretKeyFile | File path that contains the S3 secret key.
|
| options/nixos/services.redmine.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/services.restic.server.htpasswd-file | The path to the servers .htpasswd file
|
| options/nixos/services.syncplay.passwordFile | Path to the file that contains the server password
|
| options/nixos/services.ncps.cache.storage.s3.accessKeyIdPath | The path to a file containing only the access-key-id.
|
| options/nixos/services.lasuite-docs.secretKeyPath | Path to the Django secret key
|
| options/nixos/services.lasuite-meet.secretKeyPath | Path to the Django secret key
|
| options/nixos/services.multipath.devices.*.ghost_delay | Sets the number of seconds that multipath will wait after creating a device with only ghost paths before marking it ready for use in systemd
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.ca_id | Identity in CA certificate to accept for authentication
|
| options/nixos/services.netbird.tunnels.<name>.hardened | Hardened service:
- runs as a dedicated user with minimal set of permissions (see caveats),
- restricts daemon configuration socket access to dedicated user group
(you can grant access to it with
users.users."<user>".extraGroups = [ netbird-‹name› ]),
Even though the local system resources access is restricted:
CAP_NET_RAW, CAP_NET_ADMIN and CAP_BPF still give unlimited network manipulation possibilites,
- older kernels don't have
CAP_BPF and use CAP_SYS_ADMIN instead,
Known security features that are not (yet) integrated into the module:
- 2024-02-14:
rosenpass is an experimental feature configurable solely
through --enable-rosenpass flag on the netbird up command,
see the docs
|
| options/nixos/services.netbird.clients.<name>.hardened | Hardened service:
- runs as a dedicated user with minimal set of permissions (see caveats),
- restricts daemon configuration socket access to dedicated user group
(you can grant access to it with
users.users."<user>".extraGroups = [ netbird-‹name› ]),
Even though the local system resources access is restricted:
CAP_NET_RAW, CAP_NET_ADMIN and CAP_BPF still give unlimited network manipulation possibilites,
- older kernels don't have
CAP_BPF and use CAP_SYS_ADMIN instead,
Known security features that are not (yet) integrated into the module:
- 2024-02-14:
rosenpass is an experimental feature configurable solely
through --enable-rosenpass flag on the netbird up command,
see the docs
|
| options/home-manager/accounts.email.accounts.<name>.getmail.delete | Enable if you want to delete read messages from the server
|
| options/nixos/services.ghostunnel.servers.<name>.allowAll | If true, allow all clients, do not check client cert subject.
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.remoteForwards.*.bind.port | Specifies port number to bind to.
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.remoteForwards.*.host.port | Specifies port number to forward to.
|
| options/nixos/networking.vswitches.<name>.openFlowRules | OpenFlow rules to insert into the Open vSwitch
|
| options/nixos/services.syncoid.commands.<name>.sendOptions | Advanced options to pass to zfs send
|
| options/nixos/services.syncoid.commands.<name>.recvOptions | Advanced options to pass to zfs recv
|
| options/nixos/systemd.network.networks.<name>.dhcpServerConfig | Each attribute in this set specifies an option in the
[DHCPServer] section of the unit
|
| options/nixos/systemd.network.networks.<name>.pfifoHeadDropConfig | Each attribute in this set specifies an option in the
[PFIFOHeadDrop] section of the unit
|
| options/nixos/services.httpd.virtualHosts.<name>.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.nginx.virtualHosts.<name>.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/home-manager/services.unison.pairs.<name>.commandOptions | Additional command line options as a dictionary to pass to the
unison program
|
| options/nixos/networking.wlanInterfaces.<name>.fourAddr | Whether to enable 4-address mode with type managed.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.v4l2-relayd.instances.<name>.input.format | The video-format to read from input-stream.
|
| options/nixos/services.grafana.provision.alerting.contactPoints.settings.contactPoints.*.name | Name of the contact point
|
| options/nixos/services.borgbackup.jobs.<name>.extraPruneArgs | Additional arguments for borg prune
|
| options/darwin/launchd.agents.<name>.serviceConfig.StandardInPath | This optional key specifies what file should be used for data being supplied to stdin when using
stdio(3).
|
| options/nixos/services.firewalld.zones.<name>.forwardPorts.*.to-addr | Destination IP address.
|
| options/nixos/networking.supplicant.<name>.extraCmdArgs | Command line arguments to add when executing wpa_supplicant.
|
| options/nixos/networking.jool.nat64.<name>.framework | The framework to use for attaching Jool's translation to the exist
kernel packet processing rules
|
| options/nixos/services.spiped.config.<name>.weakHandshake | Use fast/weak handshaking: This reduces the CPU time spent
in the initial connection setup, at the expense of losing
perfect forward secrecy.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.ServiceIPC | This optional key specifies whether the job participates in advanced
communication with launchd
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.ipcomp | Enable IPComp compression before encryption
|
| options/nixos/services.ax25.axports.<name>.description | Free format description of this interface.
|
| options/nixos/networking.macvlans.<name>.interface | The interface the macvlan will transmit packets through.
|
| options/nixos/networking.wg-quick.interfaces.<name>.postUp | Commands called after the interface setup.
|
| options/nixos/services.openbao.settings.listener.<name>.type | The listener type to enable.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.hostName | Canonical hostname for the server.
|
| options/nixos/services.vmalert.instances.<name>.enable | Wether to enable VictoriaMetrics's vmalert.
vmalert evaluates alerting and recording rules against a data source, sends notifications via Alertmanager.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LimitLoadToHosts | This configuration file only applies to the hosts listed with this key
|
| options/darwin/launchd.daemons.<name>.serviceConfig.InitGroups | This optional key specifies whether initgroups(3) should be called before running the job
|
| options/home-manager/programs.floorp.profiles.<name>.search.default | The default search engine used in the address bar and search
bar.
|
| options/home-manager/programs.lutris.runners.<name>.settings.system | Lutris system options for this runner
|
| options/home-manager/launchd.agents.<name>.config.WorkingDirectory | This optional key is used to specify a directory to chdir(2) to before running the job.
|
| options/nixos/services.i2pd.ifname4 | IPv4 interface to bind to.
|
| options/nixos/services.i2pd.ifname6 | IPv6 interface to bind to.
|
| options/nixos/services.consul-template.instances.<name>.user | User under which this instance runs.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.userNameCommand | A command that prints the user name to standard output.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.OnDemand | This key was used in Mac OS X 10.4 to control whether a job was kept alive or not
|
| options/home-manager/accounts.email.accounts.<name>.aerc.smtpOauth2Params | Sets the oauth2 params if authentication mechanism oauthbearer or
xoauth2 is used
|
| options/home-manager/accounts.email.accounts.<name>.aerc.imapOauth2Params | Sets the oauth2 params if authentication mechanism oauthbearer or
xoauth2 is used
|
| options/nixos/services.firewalld.services.<name>.version | Version of the service.
|
| options/nixos/services.firewalld.services.<name>.helpers | Helpers for the service.
|
| options/home-manager/programs.firefox.profiles.<name>.bookmarks | Declarative bookmarks.
|
| options/nixos/services.tinc.networks.<name>.chroot | Change process root directory to the directory where the config file is located (/etc/tinc/netname/), for added security
|
| options/nixos/services.nebula.networks.<name>.staticHostMap | The static host map defines a set of hosts with fixed IP addresses on the internet (or any network)
|
| options/nixos/services.httpd.virtualHosts.<name>.globalRedirect | If set, all requests for this host are redirected permanently to
the given URL.
|
| options/nixos/services.kimai.sites.<name>.database.passwordFile | A file containing the password corresponding to
database.user.
|
| options/nixos/services.cockroachdb.certsDir | The path to the certificate directory.
|
| options/nixos/security.pam.makeHomeDir.skelDirectory | Path to skeleton directory whose contents are copied to home
directories newly created by pam_mkhomedir.
|
| options/nixos/programs.sway.package | The sway package to use
|
| options/nixos/boot.loader.grub.mirroredBoots.*.devices | The path to the devices which will have the GRUB MBR written
|
| options/nixos/services.dnsproxy.settings | Contents of the config.yaml config file
|
| options/nixos/services.hebbot.templates.report | A path to the Markdown file for the report template.
|
| options/nixos/services.thanos.query.web.route-prefix | Prefix for API and UI endpoints
|
| options/nixos/services.moodle.virtualHost.sslServerChain | Path to server SSL chain file.
|
| options/nixos/services.plausible.server.baseUrl | Public URL where plausible is available
|
| options/nixos/services.pleroma.secretConfigFile | Path to the file containing your secret pleroma configuration.
DO NOT POINT THIS OPTION TO THE NIX
STORE, the store being world-readable, it'll
compromise all your secrets.
|
| options/nixos/services.thinkfan.fans | List of fans thinkfan will control.
This section slightly departs from the thinkfan.conf syntax
|
| options/nixos/services.misskey.redis.passwordFile | The path to a file containing the Redis password
|
| options/nixos/services.nagios.virtualHost.sslServerChain | Path to server SSL chain file.
|
| options/nixos/services.xserver.synaptics.dev | Path for touchpad device
|
| options/darwin/services.gitlab-runner.extraPackages | Extra packages to add to PATH for the gitlab-runner process.
|
| options/nixos/services.borgbackup.jobs.<name>.privateTmp | Set the PrivateTmp option for
the systemd-service
|
| options/nixos/systemd.network.networks.<name>.networkConfig | Each attribute in this set specifies an option in the
[Network] section of the unit
|
| options/nixos/systemd.network.networks.<name>.ipv6AcceptRAConfig | Each attribute in this set specifies an option in the
[IPv6AcceptRA] section of the unit
|
| options/nixos/services.kanata.keyboards.<name>.extraDefCfg | Configuration of defcfg other than linux-dev (generated
from the devices option) and
linux-continue-if-no-devs-found (hardcoded to be yes)
|
| options/nixos/services.keyd.keyboards.<name>.extraConfig | Extra configuration that is appended to the end of the file.
Do not write ids section here, use a separate option for it
|
| options/nixos/services.ghostunnel.servers.<name>.target | Address to forward connections to (can be HOST:PORT or unix:PATH).
|
| options/nixos/services.kimai.sites.<name>.database.createLocally | Create the database and database user locally.
|
| options/nixos/boot.binfmt.registrations.<name>.mask | A mask to be ANDed with the byte sequence of the file before matching
|
| options/nixos/services.awstats.configs.<name>.webService.urlPrefix | The URL prefix under which the awstats pages appear.
|
| options/nixos/networking.wg-quick.interfaces.<name>.type | The type of the interface
|
| options/nixos/services.ghostunnel.servers.<name>.listen | Address and port to listen on (can be HOST:PORT, unix:PATH).
|
| options/home-manager/programs.smug.projects.<name>.windows.*.commands | Commands to execute when window starts.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.token.<name>.module | Optional PKCS#11 module name to access the token.
|
| options/nixos/services.bitcoind.<name>.extraCmdlineOptions | Extra command line options to pass to bitcoind
|
| options/darwin/launchd.agents.<name>.serviceConfig.StandardOutPath | This optional key specifies what file should be used for data being sent to stdout when using stdio(3).
|
| options/nixos/systemd.user.services.<name>.reloadIfChanged | Whether the service should be reloaded during a NixOS
configuration switch if its definition has changed
|
| options/nixos/services.gitea-actions-runner.instances.<name>.url | Base URL of your Gitea/Forgejo instance.
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.prosody.virtualHosts.<name>.ssl.extraOptions | Extra SSL configuration options.
|
| options/darwin/networking.wg-quick.interfaces.<name>.postUp | List of commands to run after interface setup.
|
| options/home-manager/services.xsuspender.rules.<name>.onlyOnBattery | Whether to enable process suspend only on battery.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.imapOauth2Params.scope | The OAuth2 requested scope.
|
| options/home-manager/accounts.email.accounts.<name>.gpg.encryptByDefault | Encrypt outgoing messages by default.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.smtpOauth2Params.scope | The OAuth2 requested scope.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LimitLoadToHosts | This configuration file only applies to the hosts listed with this key
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.InitGroups | This optional key specifies whether initgroups(3) should be called before running the job
|
| options/home-manager/launchd.agents.<name>.config.StartInterval | This optional key causes the job to be started every N seconds
|
| options/nixos/services.borgbackup.jobs.<name>.dumpCommand | Backup the stdout of this program instead of filesystem paths
|
| options/nixos/systemd.network.networks.<name>.addresses | A list of address sections to be added to the unit
|
| options/nixos/services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.help | A human-readable description of this metric.
|
| options/nixos/services.agorakit.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.kanboard.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/programs.xfs_quota.projects.<name>.sizeHardLimit | Hard limit of the project size.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.fediwall.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.librenms.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.kanboard.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.agorakit.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/programs.proxychains.proxies.<name>.host | Proxy host or IP address.
|
| options/nixos/programs.xfs_quota.projects.<name>.sizeSoftLimit | Soft limit of the project size
|
| options/nixos/services.fediwall.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.librenms.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/networking.wg-quick.interfaces.<name>.preDown | Command called before the interface is taken down.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.mainsail.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.mainsail.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.sabnzbd.settings.servers.<name>.enable | Enable this server by default
|
| options/home-manager/programs.vscode.profiles.<name>.globalSnippets | Defines global user snippets.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.OnDemand | This key was used in Mac OS X 10.4 to control whether a job was kept alive or not
|
| options/nixos/services.firezone.server.provision.accounts.<name>.groups | All groups to provision
|
| options/nixos/services.cgit.<name>.gitHttpBackend.enable | Whether to bypass cgit and use git-http-backend for HTTP clones
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers | Peers linked to the interface.
|
| options/nixos/services.authelia.instances.<name>.package | The authelia package to use.
|
| options/nixos/services.mosquitto.bridges.<name>.settings | Additional settings for this bridge.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.themes | Themes to install.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.cursorBlinkMode | The cursor blink mode.
|
| options/nixos/services.nominatim.database.dbname | Name of the postgresql database.
|
| options/nixos/services.roundcube.database.dbname | Name of the postgresql database
|
| options/home-manager/accounts.email.accounts.<name>.alot.sendMailCommand | Command to send a mail
|
| options/home-manager/services.restic.backups.<name>.dynamicFilesFrom | A script that produces a list of files to back up
|
| options/home-manager/services.podman.images.<name>.description | The description of the image.
|
| options/home-manager/services.podman.builds.<name>.description | The description of the build.
|
| options/nixos/security.pam.services.<name>.startSession | If set, the service will register a new session with
systemd's login manager
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.aaa_id | Server side EAP-Identity to expect in the EAP method
|
| options/nixos/services.gancio.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.fedimintd.<name>.nginx.config.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.fluidd.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.akkoma.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.matomo.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.monica.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/home-manager/systemd.user.services.<name>.Unit.X-Reload-Triggers | List of free form strings that can be used to trigger a service
reload during Home Manager activation.
|
| options/home-manager/programs.firefox.profiles.<name>.preConfig | Extra preferences to add to user.js, before
programs.firefox.profiles._name_.settings
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.private.<name>.file | File name in the private folder for which this passphrase should be used.
|
| options/darwin/services.gitlab-runner.services.<name>.preCloneScript | Runner-specific command script executed before code is pulled.
|
| options/home-manager/services.xsuspender.rules.<name>.execSuspend | Before suspending, execute this shell script
|
| options/home-manager/accounts.email.accounts.<name>.neomutt.extraConfig | Extra lines to add to the folder hook for this account.
|
| options/home-manager/accounts.email.accounts.<name>.astroid.extraConfig | Extra settings to add to this astroid account configuration.
|
| options/home-manager/services.restic.backups.<name>.initialize | Create the repository if it does not already exist
|
| options/nixos/services.tarsnap.archives.<name>.includes | Include only files and directories matching these
patterns (the empty list includes everything)
|
| options/nixos/services.mautrix-meta.instances.<name>.enable | Whether to enable Mautrix-Meta, a Matrix <-> Facebook and Matrix <-> Instagram hybrid puppeting/relaybot bridge.
|
| options/nixos/services.wstunnel.clients.<name>.customHeaders | Custom HTTP headers to send during the upgrade request.
|
| options/home-manager/systemd.user.sockets.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/home-manager/systemd.user.targets.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/home-manager/programs.floorp.profiles.<name>.search.force | Whether to force replace the existing search
configuration
|
| options/nixos/services.dawarich.smtp.passwordFile | Path to file containing the SMTP password.
|
| options/nixos/services.immich.secretsFile | Path of a file with extra environment variables to be loaded from disk
|
| options/nixos/services.soju.tlsCertificateKey | Path to server TLS certificate key.
|
| options/nixos/services.sharkey.settings.socket | If specified, creates a UNIX socket at the given path that Sharkey listens on.
|
| options/nixos/services.mastodon.smtp.passwordFile | Path to file containing the SMTP password.
|
| options/nixos/services.zabbixProxy.extraPackages | Packages to be added to the Zabbix PATH
|
| options/nixos/services.zabbixAgent.extraPackages | Packages to be added to the Zabbix PATH
|
| options/nixos/services.zabbixProxy.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/services.warpgate.settings.http.key | Path to HTTPS listener private key.
|
| options/home-manager/services.syncthing.passwordFile | Path to the gui password file.
|
| options/nixos/security.pam.services.<name>.ttyAudit.enablePattern | For each user matching one of comma-separated
glob patterns, enable TTY auditing
|
| options/nixos/programs.xfs_quota.projects.<name>.fileSystem | XFS filesystem hosting the xfs_quota project.
|
| options/nixos/services.snapper.configs.<name>.TIMELINE_CREATE | Defines whether hourly snapshots should be created.
|
| options/nixos/systemd.user.services.<name>.environment | Environment variables passed to the service's processes.
|
| options/darwin/networking.wg-quick.interfaces.<name>.preDown | List of commands to run before interface shutdown.
|
| options/home-manager/programs.librewolf.profiles.<name>.userChrome | Custom LibreWolf user chrome CSS.
|
| options/nixos/systemd.user.services.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.bitcoind.<name>.prune | Reduce storage requirements by enabling pruning (deleting) of old
blocks
|
| options/nixos/networking.bridges.<name>.interfaces | The physical network interfaces connected by the bridge.
|
| options/nixos/services.znc.confOptions.networks.<name>.channels | IRC channels to join.
|
| options/darwin/networking.wg-quick.interfaces.<name>.peers | List of peers associated with this interface.
|
| options/home-manager/services.xsuspender.rules.<name>.suspendDelay | Initial suspend delay in seconds.
|
| options/home-manager/services.podman.builds.<name>.workingDirectory | WorkingDirectory of the systemd unit file.
|
| options/nixos/services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.query | The SQL query to run.
|
| options/nixos/systemd.user.services.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/services.github-runners.<name>.group | Group under which to run the service
|
| options/nixos/services.hylafax.modems.<name>.config | Attribute set of values for the given modem
|
| options/nixos/services.openssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| options/darwin/security.sandbox.profiles.<name>.allowSystemPaths | Whether to allow read access to FHS paths like /etc and /var.
|
| options/home-manager/accounts.email.accounts.<name>.himalaya.enable | Whether to enable the email client Himalaya CLI for this email account.
|
| options/nixos/openstack.zfs.datasets.<name>.properties | Properties to set on this dataset.
|
| options/home-manager/programs.librewolf.profiles.<name>.isDefault | Whether this is a default profile.
|
| options/nixos/services.dokuwiki.sites.<name>.settings | Structural DokuWiki configuration
|
| options/nixos/services.fedimintd.<name>.nginx.config.kTLS | Whether to enable kTLS support
|
| options/home-manager/programs.smug.projects.<name>.windows.*.selected | Whether this window should be selected by default at session start.
|
| options/nixos/services.grafana.provision.alerting.templates.settings.templates.*.name | Name of the template, must be unique
|
| options/darwin/launchd.agents.<name>.serviceConfig.WaitForDebugger | This optional key specifies that launchd should instruct the kernel to have the job wait for a debugger
to attach before any code in the job is executed.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LaunchOnlyOnce | This optional key specifies whether the job can only be run once and only once
|
| options/nixos/services.displayManager.dms-greeter.compositor.name | The Wayland compositor to run the greeter in
|
| options/nixos/services.postfix.settings.master.<name>.wakeup | Automatically wake up the service after the specified number of
seconds
|
| options/nixos/services.akkoma.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.fluidd.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.fedimintd.<name>.nginx.config.extraConfig | These lines go to the end of the vhost verbatim.
|
| options/nixos/services.gancio.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.monica.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.matomo.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.nntp-proxy.users.<name>.maxConnections | Maximum number of concurrent connections to the proxy for this user
|
| options/home-manager/accounts.contact.accounts.<name>.pimsync.enable | Whether to enable synchronization using pimsync.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Program | This key maps to the first argument of execvp(3)
|
| options/nixos/services.icecream.daemon.netName | Network name to connect to
|
| options/nixos/boot.loader.systemd-boot.extraFiles | A set of files to be copied to $BOOT
|
| options/nixos/systemd.generators | Definition of systemd generators; see systemd.generator(5)
|
| options/nixos/users.mysql.pam.logging.rHostColumn | The name of the column in the log table to which the name of the remote
host that initiates the session is stored
|
| options/nixos/services.logrotate.settings.<name>.global | Whether this setting is a global option or not: set to have these
settings apply to all files settings with a higher priority.
|
| options/home-manager/programs.vscode.profiles.<name>.enableUpdateCheck | Whether to enable update checks/notifications
|
| options/nixos/services.jupyterhub.kernels.<name>.extraPaths | Extra paths to link in kernel directory
|
| options/nixos/services.syncoid.commands.<name>.recursive | Whether to enable the transfer of child datasets.
|
| options/darwin/security.sandbox.profiles.<name>.readablePaths | List of paths that should be read-only inside the sandbox.
|
| options/nixos/services.buildbot-master.packages | Packages to add to PATH for the buildbot process.
|
| options/nixos/services.gitlab.smtp.passwordFile | File containing the password of the SMTP server for GitLab
|
| options/nixos/services.gitea.settings.server.HTTP_ADDR | Listen address
|
| options/nixos/services.forgejo.repositoryRoot | Path to the git repositories.
|
| options/nixos/services.buildbot-worker.packages | Packages to add to PATH for the buildbot process.
|
| options/nixos/services.thanos.rule.tracing.config-file | Path to YAML file that contains tracing configuration
|
| options/nixos/services.ncps.cache.storage.s3.forcePathStyle | Force path-style S3 addressing (bucket/key vs key.bucket).
|
| options/nixos/services.radicle.ci.broker.settings.db | Database file path.
|
| options/nixos/services.moonraker.klipperSocket | Path to Klipper's API socket.
|
| options/nixos/services.minetest-server.configPath | Path to the config to use
|
| options/nixos/services.warpgate.settings.ssh.keys | Path to store SSH host & client keys.
|
| options/nixos/services.weblate.smtp.passwordFile | Location of a file containing the SMTP password
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children | CHILD_SA configuration sub-section
|
| options/nixos/services.tahoe.nodes.<name>.client.introducer | The furl for a Tahoe introducer node
|
| options/nixos/services.nginx.virtualHosts.<name>.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| options/nixos/systemd.network.networks.<name>.ipv6PREF64Prefixes | A list of IPv6PREF64Prefix sections to be added to the unit
|
| options/darwin/services.buildkite-agents.<name>.hooks.command | The command hook script will replace the default implementation of running
the build command.
|
| options/home-manager/services.muchsync.remotes.<name>.remote.importNew | Whether to begin the synchronisation by running
notmuch new on the remote side.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.relayGroups | All relay groups to provision
|
| options/nixos/networking.wg-quick.interfaces.<name>.postDown | Command called after the interface is taken down.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.agorakit.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.kanboard.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.librenms.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.fediwall.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.mainsail.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.cursor | The color for the terminal cursor.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.scrollOnOutput | Whether to scroll when output is written.
|
| options/home-manager/services.podman.builds.<name>.environment | Environment variables to set in the build.
|
| options/nixos/boot.initrd.luks.devices.<name>.fallbackToPassword | Whether to fallback to interactive passphrase prompt if the keyfile
cannot be found
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LimitLoadFromHosts | This configuration file only applies to hosts NOT listed with this key
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings | Settings which are applied to .gmailieer.json
for the account
|
| options/home-manager/programs.floorp.profiles.<name>.settings | Attribute set of Floorp preferences
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.iterationStep | How much the iteration count for PBKDF2 is increased at each successful authentication.
|
| options/nixos/services.consul-template.instances.<name>.group | Group under which this instance runs.
|
| options/nixos/services.firewalld.services.<name>.sourcePorts | Source ports for the service.
|
| options/nixos/services.tahoe.introducers.<name>.package | The tahoelafs package to use.
|
| options/nixos/services.orangefs.server.fileSystems.<name>.troveSyncData | Sync data.
|
| options/nixos/services.vdirsyncer.jobs.<name>.config.general | general configuration
|
| options/nixos/services.warpgate.settings.sso_providers.*.name | Internal identifier of SSO provider.
|
| options/nixos/security.pam.services.<name>.duoSecurity.enable | If set, use the Duo Security pam module
pam_duo for authentication
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LaunchOnlyOnce | This optional key specifies whether the job can only be run once and only once
|
| options/home-manager/services.restic.backups.<name>.inhibitsSleep | Prevents the system from sleeping while backing up
|
| options/home-manager/programs.lutris.runners.<name>.settings.runner | Runner specific options
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Program | This key maps to the first argument of execvp(3)
|
| options/nixos/services.multipath.devices.*.alias_prefix | The user_friendly_names prefix to use for this device type, instead of the default mpath
|
| options/home-manager/programs.rclone.remotes.<name>.secrets | Sensitive configuration values such as passwords, API keys, and tokens
|
| options/nixos/services.fedimintd.<name>.api_ws.openFirewall | Opens TCP port in firewall for fedimintd's Websocket API
|
| options/nixos/systemd.user.services.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/services.znapzend.zetup.<name>.mbuffer.port | Port to use for mbuffer
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LowPriorityIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O.
|
| options/nixos/services.openvpn.servers.<name>.authUserPass.password | The password to store inside the credentials file.
|
| options/nixos/services.fcgiwrap.instances.<name>.socket.user | User to be set as owner of the UNIX socket.
|
| options/nixos/services.fcgiwrap.instances.<name>.socket.type | Socket type: 'unix', 'tcp' or 'tcp6'.
|
| options/nixos/programs.schroot.profiles.<name>.copyfiles | A list of files to copy into the chroot from the host system.
|
| options/nixos/services.v4l2-relayd.instances.<name>.output.format | The video-format to write to output-stream.
|
| options/nixos/services.znc.confOptions.networks.<name>.password | IRC server password, such as for a Slack gateway.
|
| options/darwin/security.sandbox.profiles.<name>.writablePaths | List of paths that should be read/write inside the sandbox.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.extraConfig.local | Local store extra configuration.
|
| options/nixos/services.netbird.clients.<name>.openFirewall | Opens up firewall port for communication between NetBird peers directly over LAN or public IP,
without using (internet-hosted) TURN servers as intermediaries.
|
| options/nixos/services.netbird.tunnels.<name>.openFirewall | Opens up firewall port for communication between NetBird peers directly over LAN or public IP,
without using (internet-hosted) TURN servers as intermediaries.
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/nixos/services.borgbackup.jobs.<name>.extraCreateArgs | Additional arguments for borg create
|
| options/nixos/services.keepalived.vrrpScripts.<name>.weight | Following a failure, adjust the priority by this weight.
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.k3s.autoDeployCharts.<name>.createNamespace | Whether to create the target namespace if not present.
|
| options/nixos/services.kanidm.provision.persons.<name>.groups | List of groups this person should belong to.
|
| options/nixos/services.k3s.autoDeployCharts.<name>.targetNamespace | The namespace in which the Helm chart gets installed.
|
| options/nixos/services.wstunnel.servers.<name>.listen.enableHTTPS | Use HTTPS for the tunnel server.
|
| options/darwin/networking.wg-quick.interfaces.<name>.postDown | List of commands to run after interface shutdown
|
| options/nixos/services.biboumi.settings.db_name | The name of the database to use
|
| options/nixos/services.murmur.registerHostname | DNS hostname where your server can be reached
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LimitLoadFromHosts | This configuration file only applies to hosts NOT listed with this key
|
| options/home-manager/fonts.fontconfig.configFile.<name>.priority | Determines the order in which configs are loaded
|
| options/nixos/services.gitlab-runner.services.<name>.preBuildScript | Runner-specific command script executed after code is pulled,
just before build executes.
|
| options/darwin/services.gitlab-runner.services.<name>.preBuildScript | Runner-specific command script executed after code is pulled,
just before build executes.
|
| options/home-manager/services.xsuspender.rules.<name>.sendSignals | Whether to send SIGSTOP / SIGCONT signals or not
|
| options/nixos/programs.tsmClient.servers.<name>.genPasswd | Whether to enable automatic client password generation
|
| options/nixos/services.public-inbox.settings.coderepo.<name>.cgitUrl | URL of a cgit instance
|
| options/nixos/services.orangefs.server.fileSystems.<name>.troveSyncMeta | Sync meta data.
|
| options/nixos/services.dockerRegistry.configFile | Path to CNCF distribution config file
|
| options/nixos/boot.iscsi-initiator.extraConfigFile | Append an additional file's contents to /etc/iscsid.conf
|
| options/nixos/services.invidious.hmacKeyFile | A path to a file containing the hmac_key
|
| options/nixos/services.send.redis.passwordFile | The path to the file containing the Redis password
|
| options/nixos/services.unpoller.influxdb.pass | Path of a file containing the password for influxdb
|
| options/nixos/services.nsd.remoteControl.serverKeyFile | Path to the server private key, which is used by the server
but not by nsd-control
|
| options/nixos/services.hylafax.sendmailPath | Path to sendmail program
|
| options/home-manager/services.pass-secret-service.storePath | Absolute path to the password store
|
| options/nixos/programs.ssh.knownHosts | The set of system-wide known SSH hosts
|
| options/nixos/security.pam.services | This option defines the PAM services
|
| options/nixos/services.pcscd.extendReaderNames | String to append to every reader name
|
| options/darwin/programs.ssh.knownHosts | The set of system-wide known SSH hosts
|
| options/darwin/services.buildkite-agents.<name>.hooks.pre-command | The pre-command hook will run just before your build command runs
|
| options/darwin/launchd.agents.<name>.serviceConfig.RootDirectory | This optional key is used to specify a directory to chroot(2) to before running the job.
|
| options/home-manager/accounts.contact.accounts.<name>.khal.priority | Priority of a calendar used for coloring (calendar with highest priority is preferred).
|
| options/nixos/services.snapper.configs.<name>.TIMELINE_LIMIT_DAILY | Limits for timeline cleanup.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.id | If this attribute is given with non-zero length, it will set the password identifier
for this entry
|
| options/nixos/services.postfix.settings.master.<name>.chroot | Whether the service is chrooted to have only access to the
services.postfix.queueDir and the closure of
store paths specified by the program option.
|
| options/nixos/services.borgbackup.jobs.<name>.exclude | Exclude paths matching any of the given patterns
|
| options/nixos/services.zeronsd.servedNetworks.<name>.settings | Settings for zeronsd
|
| options/nixos/networking.interfaces.<name>.ipv6.routes | List of extra IPv6 static routes that will be assigned to the interface.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.compression | Specifies whether to use compression
|
| options/home-manager/accounts.email.accounts.<name>.neomutt.mailboxType | Whether this account uses maildir folders or IMAP mailboxes
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LowPriorityIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O.
|
| options/nixos/services.openvpn.servers.<name>.updateResolvConf | Use the script from the update-resolv-conf package to automatically
update resolv.conf with the DNS information provided by openvpn
|
| options/nixos/services.i2pd.inTunnels.<name>.destination | Remote endpoint, I2P hostname or b32.i2p address.
|
| options/nixos/services.drupal.sites.<name>.database.passwordFile | A file containing the password corresponding to
database.user.
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.acl | Control client access to topics on the broker.
|
| options/home-manager/accounts.email.accounts.<name>.passwordCommand | A command, which when run writes the account password on
standard output.
|
| options/darwin/networking.localHostName | The local hostname, or local network name, is displayed beneath the computer's name at the
top of the Sharing preferences pane
|
| options/nixos/services.firezone.server.provision.accounts.<name>.policies | All policies to provision
|
| options/nixos/networking.interfaces.<name>.ipv4.routes.*.via | IPv4 address of the next hop.
|
| options/nixos/networking.interfaces.<name>.ipv6.routes.*.via | IPv6 address of the next hop.
|
| options/nixos/services.drupal.sites.<name>.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.moodle.virtualHost.locations.<name>.alias | Alias directory for requests
|
| options/nixos/services.nagios.virtualHost.locations.<name>.index | Adds DirectoryIndex directive
|
| options/nixos/services.moodle.virtualHost.locations.<name>.index | Adds DirectoryIndex directive
|
| options/nixos/services.nagios.virtualHost.locations.<name>.alias | Alias directory for requests
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.adminAddr | E-mail address of the server administrator.
|
| options/nixos/services.kanidm.provision.groups.<name>.present | Whether to ensure that this group is present or absent.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.boldColor | The bold color, null to use same as foreground.
|
| options/darwin/launchd.agents.<name>.serviceConfig.SessionCreate | This key specifies that the job should be spawned into a new security
audit session rather than the default session for the context is belongs
to
|
| options/nixos/services.nebula.networks.<name>.enableReload | Enable automatic config reload on config change
|
| options/nixos/services.drupal.sites.<name>.virtualHost.forceSSL | Whether to add a separate nginx server block that permanently redirects (301)
all plain HTTP traffic to HTTPS
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags.important | Tag for notmuch to use for messages stored in the mailbox labeled with the
Important name attribute and/or with the $Important
keyword
|
| options/nixos/services.kimai.sites.<name>.environmentFile | Securely pass environment variabels to Kimai
|
| options/darwin/launchd.daemons.<name>.serviceConfig.StandardInPath | This optional key specifies what file should be used for data being supplied to stdin when using
stdio(3).
|
| options/nixos/services.gitlab-runner.services.<name>.dockerExtraHosts | Add a custom host-to-IP mapping.
|
| options/nixos/services.sanoid.templates.<name>.autoprune | Whether to automatically prune old snapshots.
|
| options/nixos/services.syncthing.settings.folders.<name>.id | The ID of the folder
|
| options/nixos/services.orangefs.server.fileSystems.<name>.rootHandle | File system root ID.
|
| options/nixos/services.syncthing.settings.devices.<name>.id | The device ID
|
| options/nixos/services.rke2.autoDeployCharts.<name>.createNamespace | Whether to create the target namespace if not present.
|
| options/nixos/services.rke2.autoDeployCharts.<name>.targetNamespace | The namespace in which the Helm chart gets installed.
|
| options/darwin/services.gitlab-runner.services.<name>.dockerExtraHosts | Add a custom host-to-IP mapping.
|
| options/home-manager/programs.librewolf.profiles.<name>.extraConfig | Extra preferences to add to user.js.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.themes.*.pkg | The theme package.
|
| options/home-manager/services.syncthing.settings.devices.<name>.id | The device ID
|
| options/home-manager/services.syncthing.settings.folders.<name>.id | The ID of the folder
|
| options/nixos/image.repart.partitions.<name>.stripNixStorePrefix | Whether to strip /nix/store/ from the store paths
|
| options/nixos/services.borgbackup.jobs.<name>.prune.prefix | Only consider archive names starting with this prefix for pruning
|
| options/nixos/services.wstunnel.clients.<name>.settings | Command line arguments to pass to wstunnel
|
| options/nixos/services.wstunnel.servers.<name>.settings | Command line arguments to pass to wstunnel
|
| options/nixos/services.bepasty.servers.<name>.secretKeyFile | A file that contains the server secret for safe session cookies, must be set.
secretKeyFile takes precedence over secretKey
|
| options/nixos/systemd.network.networks.<name>.ipv6RoutePrefixes | A list of ipv6RoutePrefix sections to be added to the unit
|
| options/nixos/services.borgbackup.jobs.<name>.inhibitsSleep | Prevents the system from sleeping while backing up.
|
| options/nixos/networking.interfaces.<name>.wakeOnLan.enable | Whether to enable wol on this interface.
|
| options/nixos/services.bookstack.nginx.locations.<name>.root | Root directory for requests.
|
| options/home-manager/programs.floorp.profiles.<name>.extensions | Submodule for installing and configuring extensions.
|
| options/nixos/networking.wlanInterfaces.<name>.mac | MAC address to use for the device
|
| options/nixos/services.drupal.sites.<name>.virtualHost.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/networking.wireless.networks.<name>.bssid | If set, this network block is used only when associating with
the AP using the configured BSSID.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.robotsEntries | Specification of pages to be ignored by web crawlers
|
| options/home-manager/programs.firefox.profiles.<name>.search.default | The default search engine used in the address bar and search
bar.
|
| options/nixos/services.nebula.networks.<name>.isLighthouse | Whether this node is a lighthouse.
|
| options/home-manager/programs.borgmatic.backups.<name>.hooks.extraConfig | Extra settings.
|
| options/nixos/services.vmalert.settings.rule | Path to the files with alerting and/or recording rules.
Consider using the services.vmalert.rules option as a convenient alternative for declaring rules
directly in the nix language.
|
| options/nixos/services.flannel.kubeconfig | Path to kubeconfig to use for storing flannel config using the
Kubernetes API
|
| options/nixos/services.duplicity.secretFile | Path of a file containing secrets (gpg passphrase, access key...) in
the format of EnvironmentFile as described by
systemd.exec(5)
|
| options/nixos/services.slskd.settings.web.url_base | The base path in the url for web requests.
|
| options/nixos/services.mailman.ldap.bindPasswordFile | Path to the file containing the bind password of the service account
defined by services.mailman.ldap.bindDn.
|
| options/nixos/services.tcsd.conformanceCred | Path to the conformance credential for your TPM
|
| options/nixos/services.tcsd.endorsementCred | Path to the endorsement credential for your TPM
|
| options/nixos/services.warpgate.settings.mysql.key | Path to MySQL listener private key.
|
| options/home-manager/programs.pyenv.rootDirectory | The pyenv root directory (PYENV_ROOT).
This deviates from upstream, which uses $HOME/.pyenv
|
| options/home-manager/programs.aliae.configLocation | Path where aliae should look for its config file
|
| options/home-manager/programs.git.includes.*.contents | Configuration to include
|
| options/nixos/services.anubis.instances.<name>.settings | Freeform configuration via environment variables for Anubis
|
| options/nixos/services.bitwarden-directory-connector-cli.secrets.bitwarden.client_path_id | Path to file that contains Client ID.
|
| options/nixos/services.logrotate.settings.<name>.files | Single or list of files for which rules are defined
|
| options/nixos/services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.labels | A set of columns that will be used as Prometheus labels.
|
| options/nixos/services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.values | A set of columns that will be used as values of this metric.
|
| options/nixos/networking.vswitches.<name>.openFlowVersion | Version of OpenFlow protocol to use when communicating with the switch internally (e.g. with openFlowRules).
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.policies | Whether to install IPsec policies or not
|
| options/nixos/services.fedimintd.<name>.nginx.config.listen.*.port | Port number to listen on
|
| options/nixos/users.mysql.pam.table | The name of table that maps unique login names to the passwords.
|
| options/nixos/system.nixos.codeName | The NixOS release code name (e.g. Emu).
|
| options/nixos/services.dolibarr.h2o.serverName | Server name to be used for this virtual host
|
| options/nixos/services.slurm.partitionName | Name by which the partition may be referenced
|
| options/home-manager/programs.docker-cli.contexts | Attribute set of Docker context configurations
|
| options/nixos/services.drupal.sites.<name>.virtualHost.locations | Declarative location config
|
| options/nixos/services.i2pd.outTunnels.<name>.destination | Remote endpoint, I2P hostname or b32.i2p address.
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.storage.device | An unencrypted device that will temporarily be mounted in stage-1
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.wpaPasswordFile | Sets the password for WPA-PSK
|
| options/nixos/services.github-runners.<name>.tokenType | Type of token to use for runner registration
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StandardInPath | This optional key specifies what file should be used for data being supplied to stdin when using
stdio(3).
|
| options/nixos/services.bacula-sd.autochanger.<name>.devices | |
| options/nixos/security.pam.services.<name>.kwallet.enable | If enabled, pam_wallet will attempt to automatically unlock the
user's default KDE wallet upon login
|
| options/nixos/networking.interfaces.<name>.macAddress | MAC address of the interface
|
| options/nixos/services.cjdns.ETHInterface.connectTo.<name>.publicKey | Public key at the opposite end of the tunnel.
|
| options/nixos/services.cjdns.UDPInterface.connectTo.<name>.publicKey | Public key at the opposite end of the tunnel.
|
| options/nixos/services.printing.cups-pdf.instances.<name>.enable | Whether to enable this cups-pdf instance.
|
| options/nixos/services.xonotic.settings.hostname | The name that will appear in the server list. $g_xonoticversion
gets replaced with the current version.
|
| options/home-manager/services.muchsync.remotes.<name>.sshCommand | Specifies a command line to pass to /bin/sh
to execute a command on another machine
|
| options/darwin/launchd.agents.<name>.serviceConfig.StandardErrorPath | This optional key specifies what file should be used for data being sent to stderr when using stdio(3).
|
| options/darwin/launchd.agents.<name>.serviceConfig.EnableGlobbing | This flag causes launchd to use the glob(3) mechanism to update the program arguments before invocation.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.StandardOutPath | This optional key specifies what file should be used for data being sent to stdout when using stdio(3).
|
| options/nixos/services.influxdb2.provision.organizations.<name>.buckets.<name>.retention | The duration in seconds for which the bucket will retain data (0 is infinite).
|
| options/nixos/services.journald.remote.settings.Remote.ServerCertificateFile | A path to a SSL certificate file in PEM format
|
| options/nixos/services.gitlab-runner.services.<name>.dockerPullPolicy | Default pull-policy for Docker images
|
| options/nixos/networking.wireless.networks.<name>.hidden | Set this to true if the SSID of the network is hidden.
|
| options/nixos/services.nginx.virtualHosts.<name>.listen.*.proxyProtocol | Enable PROXY protocol.
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/home-manager/programs.vscode.profiles.<name>.extensions | The extensions Visual Studio Code should be started with.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.localForwards.*.host.address | The address to forward to.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.localForwards.*.bind.address | The address to bind to.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.certificateFile | Specifies files from which the user certificate is read.
|
| options/nixos/services.wstunnel.servers.<name>.loggingLevel | Passed to --log-lvl
Control the log verbosity. i.e: TRACE, DEBUG, INFO, WARN, ERROR, OFF
For more details, checkout [EnvFilter](https://docs.rs/tracing-subscriber/latest/tracing_subscriber/filter/struct
|
| options/nixos/services.wstunnel.clients.<name>.loggingLevel | Passed to --log-lvl
Control the log verbosity. i.e: TRACE, DEBUG, INFO, WARN, ERROR, OFF
For more details, checkout [EnvFilter](https://docs.rs/tracing-subscriber/latest/tracing_subscriber/filter/struct
|
| options/nixos/systemd.services.<name>.notSocketActivated | If set, a changed unit is never assumed to be
socket-activated on configuration switch, even if
it might have associated socket units
|
| options/nixos/services.gitlab-runner.services.<name>.postBuildScript | Runner-specific command script executed after code is pulled
and just after build executes.
|
| options/darwin/services.gitlab-runner.services.<name>.postBuildScript | Runner-specific command script executed after code is pulled
and just after build executes.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/systemd.units.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/security.pam.services.<name>.gnupg.noAutostart | Don't start gpg-agent if it is not running
|
| options/nixos/services.restic.backups.<name>.rcloneOptions | Options to pass to rclone to control its behavior
|
| options/home-manager/services.restic.backups.<name>.rcloneOptions | Options to pass to rclone to control its behavior
|
| options/nixos/services.fcgiwrap.instances.<name>.socket.mode | Mode to be set on the UNIX socket
|
| options/nixos/services.kubernetes.kubelet.taints.<name>.value | Value of taint.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.hotkeys | Hotkeys to configure.
|
| options/nixos/boot.binfmt.registrations.<name>.interpreter | The interpreter to invoke to run the program
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.copy_ecn | Whether to copy the ECN (Explicit Congestion Notification) header field
to/from the outer IP header in tunnel mode
|
| options/nixos/services.fedimintd.<name>.nginx.config.enableACME | Whether to ask Let's Encrypt to sign a certificate for this vhost
|
| options/nixos/services.btrbk.instances.<name>.onCalendar | How often this btrbk instance is started
|
| options/nixos/services.firewalld.services.<name>.sourcePorts.*.port | |
| options/nixos/services.firewalld.zones.<name>.interfaces | Interfaces to bind.
|
| options/home-manager/services.podman.volumes.<name>.description | The description of the volume.
|
| options/nixos/services.kanidm.provision.groups.<name>.members | List of kanidm entities (persons, groups, ...) which are part of this group.
|
| options/nixos/services.hebbot.templates.project | A path to the Markdown file for the project template.
|
| options/nixos/services.gitlab-runner.extraPackages | Extra packages to add to PATH for the gitlab-runner process
|
| options/nixos/services.grafana-to-ntfy.settings.bauthPass | The path to the password you will use in the Grafana webhook settings.
|
| options/nixos/services.glusterfs.tlsSettings.tlsPem | Path to the certificate used for TLS.
|
| options/nixos/services.hebbot.templates.section | A path to the Markdown file for the section template.
|
| options/nixos/services.immich.settings | Configuration for Immich
|
| options/nixos/services.traefik.dynamic.dir | Path to the directory Traefik should watch for configuration files.
Files in this directory matching the glob _nixos-* (reserved for Nix-managed dynamic configurations) will be deleted as part of
systemd-tmpfiles-resetup.service, regardless of their origin..
|
| options/nixos/services.ncdns.dnssec.keys.public | Path to the file containing the KSK public key
|
| options/nixos/services.thanos.query.tracing.config-file | Path to YAML file that contains tracing configuration
|
| options/nixos/services.nextcloud.config.dbpassFile | The full path to a file that contains the database password.
|
| options/nixos/services.thanos.store.tracing.config-file | Path to YAML file that contains tracing configuration
|
| options/nixos/services.stash.settings.generated | Path to generated files
|
| options/nixos/services.zabbixServer.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/services.zabbixServer.extraPackages | Packages to be added to the Zabbix PATH
|
| options/darwin/launchd.agents.<name>.serviceConfig.LimitLoadToSessionType | This configuration file only applies to sessions of the type specified
|
| options/home-manager/systemd.user.services.<name>.Unit.X-Restart-Triggers | List of free form strings that can be used to trigger a service
restart during Home Manager activation.
|
| options/nixos/services.wyoming.piper.servers.<name>.streaming | Whether to enable audio streaming on sentence boundaries.
|
| options/nixos/services.firewalld.zones.<name>.egressPriority | Priority for outbound traffic
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.listen.*.ip | IP to listen on. 0.0.0.0 for IPv4 only, * for all.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StandardOutPath | This optional key specifies what file should be used for data being sent to stdout when using stdio(3).
|
| options/nixos/services.postfix.masterConfig.<name>.privileged | |
| options/nixos/services.anubis.instances.<name>.botPolicy | Anubis policy configuration in Nix syntax
|
| options/nixos/services.invoiceplane.sites.<name>.cron.key | Cron key taken from the administration page.
|
| options/nixos/services.caddy.virtualHosts.<name>.listenAddresses | A list of host interfaces to bind to for this virtual host.
|
| options/nixos/services.agorakit.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.fediwall.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.librenms.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.fcgiwrap.instances.<name>.socket.group | Group to be set as owner of the UNIX socket.
|
| options/nixos/services.kanboard.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.restic.backups.<name>.backupPrepareCommand | A script that must run before starting the backup process.
|
| options/nixos/services.mainsail.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.restic.backups.<name>.backupCleanupCommand | A script that must run after finishing the backup process.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.extraFiles | Extra files to link to the vault directory.
|
| options/home-manager/programs.firefox.profiles.<name>.search.force | Whether to force replace the existing search
configuration
|
| options/nixos/security.pam.services.<name>.ttyAudit.disablePattern | For each user matching one of comma-separated
glob patterns, disable TTY auditing
|
| options/nixos/services.nbd.server.exports.<name>.allowAddresses | IPs and subnets that are authorized to connect for this device
|
| options/darwin/services.gitlab-runner.services.<name>.executor | Select executor, eg. shell, docker, etc
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.remote_ts | List of remote selectors to include in CHILD_SA
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rand_time | Time range from which to choose a random value to subtract from
rekey_time
|
| options/nixos/services.tarsnap.archives.<name>.followSymlinks | Whether to follow all symlinks in archive trees.
|
| options/nixos/systemd.timers.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/systemd.slices.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/home-manager/programs.librewolf.profiles.<name>.userContent | Custom LibreWolf user content CSS.
|
| options/nixos/networking.fqdn | The fully qualified domain name (FQDN) of this host
|
| options/nixos/services.taskserver.fqdn | The fully qualified domain name of this server, which is also used
as the common name in the certificates.
|
| options/darwin/networking.fqdn | The fully qualified domain name (FQDN) of this host
|
| options/nixos/services.grafana.provision.datasources.settings.datasources.*.name | Name of the datasource
|
| options/nixos/security.wrappers.<name>.permissions | The permissions of the wrapper program
|
| options/darwin/services.buildkite-agents.<name>.hooks.post-command | The post-command hook will run after the bootstrap script has run your
build commands
|
| options/nixos/services.i2pd.outTunnels.<name>.destinationPort | Connect to particular port at destination.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings | Settings which are applied to mujmap.toml
for the account
|
| options/nixos/services.borgbackup.jobs.<name>.readWritePaths | By default, borg cannot write anywhere on the system but
$HOME/.config/borg and $HOME/.cache/borg
|
| options/nixos/services.davis.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.movim.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.slskd.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/programs.proxychains.proxies.<name>.enable | Whether to enable this proxy.
|
| options/nixos/services.firewalld.services.<name>.includes | Services to include for the service.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.palette | The terminal palette.
|
| options/home-manager/programs.hexchat.channels.<name>.options.bypassProxy | Bypass proxy.
|
| options/darwin/services.gitlab-runner.services.<name>.runUntagged | Register to run untagged builds; defaults to
true when tagList is empty.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.extraConfig | Config specific to this account, added to $HOME/.config/aerc/aerc.conf
|
| options/nixos/security.pam.services.<name>.gnupg.enable | If enabled, pam_gnupg will attempt to automatically unlock the
user's GPG keys with the login password via
gpg-agent
|
| options/darwin/launchd.daemons.<name>.serviceConfig.WaitForDebugger | This optional key specifies that launchd should instruct the kernel to have the job wait for a debugger
to attach before any code in the job is executed.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.priority | Optional fixed priority for IPsec policies
|
| options/nixos/services.gitea-actions-runner.instances.<name>.token | Plain token to register at the configured Gitea/Forgejo instance.
|
| options/nixos/services.vdirsyncer.jobs.<name>.forceDiscover | Run yes | vdirsyncer discover prior to vdirsyncer sync
|
| options/home-manager/programs.floorp.profiles.<name>.bookmarks.force | Whether to force override existing custom bookmarks.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| options/nixos/services.peering-manager.oidcConfigPath | Path to the Configuration-File for OIDC-Authentication, will be loaded as oidc_config.py
|
| options/nixos/services.hqplayerd.licenseFile | Path to the HQPlayer license key file
|
| options/nixos/services.syncthing.guiPasswordFile | Path to file containing the plaintext password for Syncthing's GUI.
|
| options/nixos/services.sshwifty.socks5PasswordFile | Path to a file containing the SOCKS5 password.
|
| options/nixos/services.tcsd.platformCred | Path to the platform credential for your TPM
|
| options/nixos/services.nsd.remoteControl.serverCertFile | Path to the server self signed certificate, which is used by the server
but and by nsd-control
|
| options/nixos/services.miniflux.config.LISTEN_ADDR | Address to listen on
|
| options/nixos/services.openiscsi.extraConfigFile | Append an additional file's contents to /etc/iscsid.conf
|
| options/nixos/services.peering-manager.ldapConfigPath | Path to the Configuration-File for LDAP-Authentication, will be loaded as ldap_config.py
|
| options/nixos/services.oauth2-proxy.customTemplatesDir | Path to custom HTML templates.
|
| options/nixos/services.weblate.djangoSecretKeyFile | Location of the Django secret key
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| options/nixos/services.dnscrypt-proxy.configFile | Path to TOML config file
|
| options/home-manager/wayland.windowManager.river.package | The river-classic package to use
|
| options/nixos/services.gitlab-runner.services.<name>.executor | Select executor, eg. shell, docker, etc
|
| options/nixos/systemd.network.networks.<name>.routingPolicyRules | A list of routing policy rules sections to be added to the unit
|
| options/nixos/services.kmonad.keyboards.<name>.defcfg.compose.key | The (optional) compose key to use.
|
| options/nixos/boot.binfmt.registrations.<name>.offset | The byte offset of the magic number used for recognition.
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.extraArgs | Extra arguments to pass to the server commandline.
|
| options/home-manager/systemd.user.services.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.extraConfig.remote | Remote store extra configuration.
|
| options/nixos/services.blockbook-frontend.<name>.internal | Internal http server binding [address]:port.
|
| options/nixos/services.nebula.networks.<name>.firewall.inbound | Firewall rules for inbound traffic.
|
| options/nixos/services.orangefs.server.fileSystems.<name>.extraConfig | Extra config for <FileSystem> section.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.listen.*.port | Port to listen on
|
| options/nixos/services.kmonad.keyboards.<name>.defcfg.enable | Whether to enable automatic generation of the defcfg block
|
| options/nixos/services.syncoid.commands.<name>.localSourceAllow | Permissions granted for the services.syncoid.user user
for local source datasets
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| options/nixos/services.firewalld.zones.<name>.masquerade | Whether to enable masquerading in the zone.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.bookstack.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.autosuspend.checks.<name>.enabled | Whether to enable this activity check.
|
| options/nixos/services.bookstack.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.keepalived.vrrpScripts.<name>.timeout | Seconds after which script is considered to have failed.
|
| options/home-manager/services.git-sync.repositories.<name>.uri | The URI of the remote to be synchronized
|
| options/nixos/security.auditd.plugins.<name>.direction | The option is dictated by the plugin
|
| options/nixos/services.nginx.virtualHosts.<name>.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| options/nixos/services.snipe-it.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/home-manager/programs.firefox.profiles.<name>.settings | Attribute set of Firefox preferences
|
| options/nixos/services.snapper.configs.<name>.TIMELINE_LIMIT_YEARLY | Limits for timeline cleanup.
|
| options/nixos/services.snapper.configs.<name>.TIMELINE_LIMIT_WEEKLY | Limits for timeline cleanup.
|
| options/nixos/services.mosquitto.bridges.<name>.addresses | Remote endpoints for the bridge.
|
| options/nixos/services.snapper.configs.<name>.TIMELINE_LIMIT_HOURLY | Limits for timeline cleanup.
|
| options/darwin/networking.fqdnOrHostName | Either the fully qualified domain name (FQDN), or just the host name if
it does not exists
|
| options/nixos/boot.zfs.devNodes | Name of directory from which to import ZFS device, this is passed to zpool import
as the value of the -d option
|
| options/nixos/services.tarsnap.archives | Tarsnap archive configurations
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.WaitForDebugger | This optional key specifies that launchd should instruct the kernel to have the job wait for a debugger
to attach before any code in the job is executed.
|
| options/nixos/services.tor.relay.onionServices.<name>.authorizeClient.clientNames | Only clients that are listed here are authorized to access the hidden service
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.hostaccess | Hostaccess variable to pass to updown script
|
| options/nixos/services.bacula-sd.director.<name>.monitor | If Monitor is set to no, this director will have
full access to this Storage daemon
|
| options/nixos/services.bacula-fd.director.<name>.monitor | If Monitor is set to no, this director will have
full access to this Storage daemon
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.listen.*.ssl | Whether to enable SSL (https) support.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.vlanid | If this attribute is given, all clients using this entry will get tagged with the given VLAN ID.
|
| options/nixos/services.grafana.provision.alerting.templates.settings.deleteTemplates.*.name | Name of the template, must be unique
|
| options/nixos/services.davis.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.slskd.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.movim.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.mac | If this attribute is not included, or if is set to the wildcard address (ff:ff:ff:ff:ff:ff),
the entry is available for any station (client) to use
|
| options/nixos/services.gitlab-runner.services.<name>.dockerVolumes | Bind-mount a volume and create it
if it doesn't exist prior to mounting.
|
| options/nixos/services.snapper.configs.<name>.TIMELINE_CLEANUP | Defines whether the timeline cleanup algorithm should be run for the config.
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.enable | Whether to enable Wyoming faster-whisper server.
|
| options/darwin/services.gitlab-runner.services.<name>.dockerVolumes | Bind-mount a volume and create it
if it doesn't exist prior to mounting.
|
| options/darwin/services.github-runners.<name>.serviceOverrides | Modify the service
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.rectangle | The node's geometry, in the format WxH+X+Y.
|
| options/nixos/services.traefik.dynamic.files.<name>.settings | Dynamic configuration for Traefik, written in Nix.
This will be serialized to JSON (which is considered valid YAML) at build, and passed as part of the static file.
|
| options/nixos/services.vmalert.instances.<name>.settings | vmalert configuration, passed via command line flags
|
| options/nixos/services.inadyn.settings.provider.<name>.include | File to include additional settings for this provider from.
|
| options/home-manager/accounts.calendar.accounts.<name>.pimsync.enable | Whether to enable synchronization using pimsync.
|
| options/nixos/services.kanata.keyboards.<name>.configFile | The config file
|
| options/nixos/services.keyd.keyboards.<name>.settings | Configuration, except ids section, that is written to /etc/keyd/.conf
|
| options/nixos/security.acme.certs.<name>.credentialFiles | Environment variables suffixed by "_FILE" to set for the cert's service
for your selected dnsProvider
|
| options/nixos/services.anubis.instances.<name>.policy.extraBots | Additional bot rules appended to the policy
|
| options/home-manager/accounts.email.accounts.<name>.aerc.extraAccounts | Extra config added to the configuration section for this account in
$HOME/.config/aerc/accounts.conf
|
| options/nixos/services.multipath.devices.*.detect_prio | If set to "yes", multipath will try to detect if the device supports
SCSI-3 ALUA
|
| options/nixos/services.drupal.sites.<name>.database.tablePrefix | The $table_prefix is the value placed in the front of your database tables
|
| options/nixos/services.dolibarr.h2o.tls.identity.*.key-file | Path to key file
|
| options/nixos/services.firezone.relay.tokenFile | A file containing the firezone relay token
|
| options/nixos/services.gns3-server.auth.passwordFile | A file containing the password to access the GNS3 Server.
This should be a string, not a nix path, since nix paths
are copied into the world-readable nix store.
|
| options/nixos/services.pulseaudio.configFile | The path to the default configuration options the PulseAudio server
should use
|
| options/nixos/services.microbin.passwordFile | Path to file containing environment variables
|
| options/nixos/services.ncdns.dnssec.keys.zonePublic | Path to the file containing the ZSK public key
|
| options/nixos/services.nextcloud.datadir | Nextcloud's data storage path
|
| options/nixos/services.oauth2-proxy.nginx.domain | The domain under which the oauth2-proxy will be accesible and the path of cookies are set to
|
| options/nixos/services.sillytavern.configFile | Path to the SillyTavern configuration file.
|
| options/nixos/users.ldap.daemon.rootpwmodpwFile | The path to a file containing the credentials with which to bind to
the LDAP server if the root user tries to change a user's password.
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.sslServerCert | Path to server SSL certificate.
|
| options/darwin/homebrew.global.brewfile | Whether to enable Homebrew to automatically use the Brewfile that this module generates in
the Nix store, when you manually invoke brew bundle
|
| options/nixos/services.borgbackup.jobs.<name>.extraCompactArgs | Additional arguments for borg compact
|
| options/nixos/services.dovecot2.mailboxes.<name>.specialUse | Null if no special use flag is set
|
| options/nixos/services.consul-template.instances.<name>.enable | Whether to enable this consul-template instance.
|
| options/nixos/services.reposilite.database.dbname | Database name.
|
| options/nixos/services.redmine.components.minimagick_font_path | MiniMagick font path
|
| options/nixos/systemd.network.networks.<name>.dhcpServerStaticLeases | A list of DHCPServerStaticLease sections to be added to the unit
|
| options/nixos/services.fedimintd.<name>.environment | Extra Environment variables to pass to the fedimintd.
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.root | Root directory for requests.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.dynamicForwards.*.address | The address to bind to.
|
| options/home-manager/accounts.email.accounts.<name>.imapnotify.boxes | IMAP folders to watch.
|
| options/nixos/services.snapserver.streams.<name>.sampleFormat | Default sample format.
|
| options/nixos/services.syncthing.settings.folders.<name>.label | The label of the folder.
|
| options/home-manager/programs.borgmatic.backups.<name>.output.extraConfig | Extra settings.
|
| options/home-manager/services.syncthing.settings.folders.<name>.label | The label of the folder.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.RootDirectory | This optional key is used to specify a directory to chroot(2) to before running the job.
|
| options/home-manager/services.restic.backups.<name>.backupCleanupCommand | A script that must run after finishing the backup process
|
| options/home-manager/services.restic.backups.<name>.backupPrepareCommand | A script that must run before starting the backup process
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.pk | If this attribute is given, SAE-PK will be enabled for this connection
|
| options/nixos/services.firewalld.zones.<name>.sourcePorts.*.protocol | |
| options/nixos/security.pam.services.<name>.enableGnomeKeyring | If enabled, pam_gnome_keyring will attempt to automatically unlock the
user's default Gnome keyring upon login
|
| options/nixos/virtualisation.fileSystems.<name>.encrypted.label | Label of the unlocked encrypted device
|
| options/nixos/services.sabnzbd.settings.servers.<name>.timeout | Time, in seconds, to wait for a response before
attempting error recovery.
|
| options/darwin/services.buildkite-agents.<name>.hooks.pre-artifact | The pre-artifact hook will run just before artifacts are uploaded
|
| options/home-manager/programs.smug.projects.<name>.windows.*.panes.*.commands | Commands to execute when pane starts.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.syncthing.settings.folders.<name>.type | Controls how the folder is handled by Syncthing
|
| options/nixos/services.moodle.virtualHost.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/nixos/services.nagios.virtualHost.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/home-manager/services.syncthing.settings.folders.<name>.type | Controls how the folder is handled by Syncthing
|
| options/home-manager/programs.gnome-terminal.profile.<name>.customCommand | The command to use to start the shell, or null for default shell.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources | All resources to provision
|
| options/nixos/services.agorakit.nginx.serverName | Name of this virtual host
|
| options/nixos/services.dolibarr.nginx.serverName | Name of this virtual host
|
| options/nixos/services.librenms.nginx.serverName | Name of this virtual host
|
| options/nixos/networking.fqdnOrHostName | Either the fully qualified domain name (FQDN), or just the host name if
it does not exist
|
| options/nixos/networking.bridges | This option allows you to define Ethernet bridge devices
that connect physical networks together
|
| options/nixos/services.kanboard.nginx.serverName | Name of this virtual host
|
| options/nixos/services.fediwall.nginx.serverName | Name of this virtual host
|
| options/nixos/services.murmur.registerName | Public server registration name, and also the name of the
Root channel
|
| options/nixos/services.pixelfed.nginx.serverName | Name of this virtual host
|
| options/nixos/services.mainsail.nginx.serverName | Name of this virtual host
|
| options/home-manager/launchd.agents.<name>.config.LaunchEvents | Specifies higher-level event types to be used as launch-on-demand event
sources
|
| options/nixos/services.hostapd.radios.<name>.settings | Extra configuration options to put at the end of global initialization, before defining BSSs
|
| options/nixos/services.drupal.sites.<name>.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.kanidm.provision.persons.<name>.present | Whether to ensure that this person is present or absent.
|
| options/nixos/services.v4l2-relayd.instances.<name>.extraPackages | Extra packages to add to GST_PLUGIN_PATH for the instance.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SessionCreate | This key specifies that the job should be spawned into a new security
audit session rather than the default session for the context is belongs
to
|
| options/home-manager/services.kanshi.profiles.<name>.outputs.*.mode | <width>x<height>[@<rate>[Hz]]
Configures the specified output to use the specified mode
|
| options/nixos/services.invoiceplane.sites.<name>.enable | Whether to enable InvoicePlane web application.
|
| options/nixos/services.armagetronad.servers.<name>.dns | DNS address to use for this server
|
| options/home-manager/programs.ssh.matchBlocks.<name>.remoteForwards.*.host.address | The address to forward to.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.remoteForwards.*.bind.address | The address to bind to.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.gatewayGroups | All gateway groups (sites) to provision
|
| options/home-manager/programs.ssh.matchBlocks.<name>.identitiesOnly | Specifies that ssh should only use the authentication
identity explicitly configured in the
~/.ssh/config files or passed on the
ssh command-line, even if ssh-agent
offers more identities.
|
| options/nixos/services.komodo-periphery.configFile | Path to the periphery configuration file
|
| options/nixos/services.beszel.agent.smartmon.enable | Include services.beszel.agent.smartmon.package in the Beszel agent path for disk monitoring and add the agent to the disk group.
|
| options/nixos/services.journald.gateway.trust | Specify the path to a file or AF_UNIX stream socket to read a CA
certificate from
|
| options/nixos/programs.firejail.wrappedBinaries | Wrap the binaries in firejail and place them in the global path.
|
| options/nixos/services.nsd.remoteControl.controlKeyFile | Path to the client private key, which is used by nsd-control
but not by the server
|
| options/nixos/services.quake3-server.baseq3 | Path to the baseq3 files (pak*.pk3)
|
| options/nixos/services.k3s.environmentFile | File path containing environment variables for configuring the k3s service in the format of an EnvironmentFile
|
| options/nixos/services.lasuite-meet.settings.DJANGO_DATA_DIR | Path to the data directory
|
| options/home-manager/services.librespot.settings.cache | Path to a directory where files will be cached after downloading.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.librenms.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.librenms.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.kanboard.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.kanboard.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.fediwall.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.fediwall.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.agorakit.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.agorakit.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.pgbackrest.repos.<name>.sftp-private-key-file | SFTP private key file
|
| options/nixos/services.mainsail.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.mainsail.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.RootDirectory | This optional key is used to specify a directory to chroot(2) to before running the job.
|
| options/home-manager/accounts.email.accounts.<name>.neomutt.sendMailCommand | Command to send a mail
|
| options/nixos/services.bookstack.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.vdirsyncer.jobs.<name>.config.storages | vdirsyncer storage configurations
|
| options/nixos/services.woodpecker-agents.agents.<name>.package | The woodpecker-agent package to use.
|
| options/home-manager/programs.firefox.profiles.<name>.extensions | Submodule for installing and configuring extensions.
|
| options/home-manager/accounts.email.accounts.<name>.signature.command | A command that generates a signature.
|
| options/nixos/security.acme.certs.<name>.dnsPropagationCheck | Toggles lego DNS propagation check, which is used alongside DNS-01
challenge to ensure the DNS entries required are available.
|
| options/nixos/services.postfix.settings.master.<name>.maxproc | The maximum number of processes to spawn for this service
|
| options/nixos/boot.initrd.luks.devices.<name>.bypassWorkqueues | Whether to bypass dm-crypt's internal read and write workqueues
|
| options/nixos/services.sanoid.datasets.<name>.recursive | Whether to recursively snapshot dataset children
|
| options/nixos/systemd.network.netdevs.<name>.wireguardPeers | Each item in this array specifies an option in the
[WireGuardPeer] section of the unit
|
| options/nixos/systemd.slices.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/systemd.timers.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/networking.wg-quick.interfaces.<name>.address | The IP addresses of the interface.
|
| options/nixos/services.kubernetes.kubelet.taints.<name>.effect | Effect of taint.
|
| options/home-manager/accounts.calendar.accounts.<name>.khal.priority | Priority of a calendar used for coloring (calendar with highest priority is preferred).
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert_policy | List of certificate policy OIDs the peer's certificate
must have
|
| options/nixos/boot.initrd.luks.devices.<name>.fido2.credentials | List of FIDO2 credential IDs
|
| options/nixos/networking.interfaces.<name>.virtual | Whether this interface is virtual and should be created by tunctl
|
| options/nixos/services.drupal.sites.<name>.virtualHost.globalRedirect | If set, all requests for this host are redirected permanently to
the given URL.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.servedDirs | This option provides a simple way to serve static directories.
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/nixos/services.librenms.database.username | Name of the user on the MySQL/MariaDB server
|
| options/nixos/services.grafana.settings.paths.provisioning | Folder that contains provisioning config files that grafana will apply on startup and while running
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.beamSize | The number of beams to use in beam search
|
| options/nixos/services.kimai.sites.<name>.database.serverVersion | MySQL exact version string
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SessionCreate | This key specifies that the job should be spawned into a new security
audit session rather than the default session for the context is belongs
to
|
| options/home-manager/services.restic.backups.<name>.repository | Repository to backup to
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.life_time | Maximum lifetime before CHILD_SA gets closed
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.addressDescription | An optional description for resource address, usually a full link to the resource including a schema.
|
| options/nixos/systemd.network.networks.<name>.fairQueueingConfig | Each attribute in this set specifies an option in the
[FairQueueing] section of the unit
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits | Resource limits to be imposed on the job
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits | Resource limits to be imposed on the job
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/nixos/services.gitea-actions-runner.instances.<name>.enable | Whether to enable Gitea Actions Runner instance.
|
| options/nixos/services.wyoming.piper.servers.<name>.zeroconf.enable | Whether to enable zeroconf discovery.
|
| options/nixos/services.v4l2-relayd.instances.<name>.input.pipeline | The gstreamer-pipeline to use for the input-stream.
|
| options/home-manager/launchd.agents.<name>.config.ProgramArguments | This key maps to the second argument of execvp(3)
|
| options/nixos/services.httpd.virtualHosts.<name>.listenAddresses | Listen addresses for this virtual host
|
| options/darwin/launchd.daemons.<name>.serviceConfig.EnableGlobbing | This flag causes launchd to use the glob(3) mechanism to update the program arguments before invocation.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.StandardErrorPath | This optional key specifies what file should be used for data being sent to stderr when using stdio(3).
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rand_bytes | Byte range from which to choose a random value to subtract from
rekey_bytes
|
| options/nixos/services.sanoid.datasets.<name>.processChildrenOnly | Whether to only snapshot child datasets if recursing.
|
| options/nixos/services.spiped.config.<name>.disableKeepalives | Disable transport layer keep-alives.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.root | Root directory for requests.
|
| options/darwin/networking.wg-quick.interfaces.<name>.listenPort | Port to listen on, randomly selected if not specified.
|
| options/nixos/boot.initrd.systemd.contents.<name>.dlopen.features | Features to enable via dlopen ELF notes
|
| options/home-manager/accounts.email.accounts.<name>.msmtp.enable | Whether to enable msmtp
|
| options/nixos/services.k3s.nodeName | Node name.
|
| options/nixos/systemd.user.generators | Definition of systemd generators; see systemd.generator(5)
|
| options/nixos/services.armagetronad.servers.<name>.host | Host to listen on
|
| options/nixos/services.armagetronad.servers.<name>.port | Port to listen on
|
| options/nixos/services.keepalived.vrrpInstances.<name>.useVmac | Use VRRP Virtual MAC.
|
| options/darwin/networking.wg-quick.interfaces.<name>.address | List of IP addresses for this interface.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.corePlugins | Core plugins to activate.
|
| options/home-manager/i18n.inputMethod.fcitx5.settings.addons.<name>.sections | attribute set of section of an INI file (attrs of INI atom (null, bool, int, float or string))
|
| options/nixos/services.fedimintd.<name>.nginx.config.listen | Listen addresses and ports for this virtual host
|
| options/nixos/security.agnos.generateKeys.enable | Enable automatic generation of account keys
|
| options/nixos/services.earlyoom.killHook | An absolute path to an executable to be run for each process killed
|
| options/nixos/services.cloudflare-dyndns.apiTokenFile | The path to a file containing the CloudFlare API token.
|
| options/nixos/services.gitweb.projectroot | Path to git projects (bare repositories) that should be served by
gitweb
|
| options/nixos/programs.river-classic.package | The river-classic package to use
|
| options/nixos/services.dockerRegistry.storagePath | Docker registry storage path for the filesystem storage backend
|
| options/nixos/programs.tsmClient.wrappedPackage | The tsm-client package to use
|
| options/nixos/services.glusterfs.tlsSettings.caCert | Path certificate authority used to sign the cluster certificates.
|
| options/nixos/services.bird-lg.proxy.traceroute.binary | Traceroute's binary path.
|
| options/nixos/services.suricata.settings.rule-files | Files to load suricata-update managed rules, relative to 'default-rule-path'.
|
| options/nixos/services.ncps.cache.storage.s3.secretAccessKeyPath | The path to a file containing only the secret-access-key.
|
| options/nixos/services.searx.settingsFile | The path of the Searx server settings.yml file
|
| options/nixos/services.thanos.rule.objstore.config-file | Path to YAML file that contains object store configuration
|
| options/nixos/services.pretix.settings.database.host | Database host or socket path.
|
| options/nixos/services.opensnitch.rules | Declarative configuration of firewall rules
|
| options/nixos/services.opengfw.settings.ruleset.geoip | Path to geoip.dat.
|
| options/nixos/services.rke2.environmentFile | File path containing environment variables for configuring the rke2 service in the format of an EnvironmentFile
|
| options/home-manager/targets.darwin.defaults."com.apple.finder".ShowPathBar | Show the path bar at the bottom of a Finder window
|
| options/home-manager/programs.gpg.mutableTrust | If set to true, you may manage trust as a user using
the gpg command
|
| options/nixos/services.akkoma.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.fluidd.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.fedimintd.<name>.nginx.config.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.gancio.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.monica.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.matomo.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/darwin/services.buildkite-agents.<name>.hooks.post-artifact | The post-artifact hook will run just after artifacts are uploaded
|
| options/nixos/services.nsd.zones.<name>.outgoingInterface | This address will be used for zone-transfer requests if configured
as a secondary server or notifications in case of a primary server
|
| options/nixos/security.pam.services.<name>.kwallet.forceRun | The force_run option is used to tell the PAM module for KWallet
to forcefully run even if no graphical session (such as a GUI
display manager) is detected
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LimitLoadToSessionType | This configuration file only applies to sessions of the type specified
|
| options/nixos/services.blockbook-frontend.<name>.templateDir | Location of the HTML templates
|
| options/nixos/services.firewalld.zones.<name>.ingressPriority | Priority for inbound traffic
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.enableUserDir | Whether to enable serving ~/public_html as
/~«username».
|
| options/home-manager/accounts.email.accounts.<name>.notmuch.neomutt.enable | Whether to enable Notmuch support in NeoMutt.
|
| options/nixos/networking.vswitches.<name>.extraOvsctlCmds | Commands to manipulate the Open vSwitch database
|
| options/nixos/systemd.network.netdevs.<name>.batmanAdvancedConfig | Each attribute in this set specifies an option in the
[BatmanAdvanced] section of the unit
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.logFormat | Log format for Apache's log files
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.EnableGlobbing | This flag causes launchd to use the glob(3) mechanism to update the program arguments before invocation.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StandardErrorPath | This optional key specifies what file should be used for data being sent to stderr when using stdio(3).
|
| options/home-manager/programs.librewolf.profiles.<name>.search.order | The order the search engines are listed in
|
| options/nixos/services.fcgiwrap.instances.<name>.process.group | Group as which this instance of fcgiwrap will be run.
|
| options/nixos/programs.tsmClient.servers.<name>.passworddir | Directory that holds the TSM
node's password information.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.keepalived.vrrpScripts.<name>.extraConfig | Extra lines to be added verbatim to the vrrp_script section.
|
| options/nixos/services.postfix.settings.master.<name>.private | Whether the service's sockets and storage directory is restricted to
be only available via the mail system
|
| options/nixos/systemd.user.services.<name>.notSocketActivated | If set, a changed unit is never assumed to be
socket-activated on configuration switch, even if
it might have associated socket units
|
| options/nixos/systemd.sockets.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/systemd.targets.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/systemd.user.units.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/security.pam.services.<name>.setEnvironment | Whether the service should set the environment variables
listed in environment.sessionVariables
using pam_env.so.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations | Declarative location config
|
| options/nixos/services.buildkite-agents.<name>.runtimePackages | Add programs to the buildkite-agent environment
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.woodpecker-agents.agents.<name>.extraGroups | Additional groups for the systemd service.
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.index | Adds index directive.
|
| options/darwin/services.buildkite-agents.<name>.runtimePackages | Add programs to the buildkite-agent environment
|
| options/nixos/services.borgbackup.jobs.<name>.failOnWarnings | Fail the whole backup job if any borg command returns a warning
(exit code 1), for example because a file changed during backup.
|
| options/nixos/services.gitlab-runner.services.<name>.dockerDisableCache | Disable all container caching.
|
| options/darwin/services.gitlab-runner.services.<name>.dockerDisableCache | Disable all container caching.
|
| options/nixos/services.honk.username | The admin account username.
|
| options/darwin/services.gitlab-runner.services.<name>.protected | When set to true Runner will only run on pipelines
triggered on protected branches.
|
| options/nixos/services.influxdb2.provision.organizations.<name>.buckets.<name>.description | Optional description for the bucket.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LimitLoadToSessionType | This configuration file only applies to sessions of the type specified
|
| options/nixos/services.davis.nginx.sslCertificate | Path to server SSL certificate.
|
| options/nixos/services.docuseal.secretKeyBaseFile | Path to file containing the secret key base
|
| options/nixos/services.homebridge.userStoragePath | Path to store homebridge user files (needs to be writeable).
|
| options/nixos/services.glusterfs.tlsSettings.tlsKeyPath | Path to the private key used for TLS.
|
| options/nixos/services.c2fmzq-server.passphraseFile | Path to file containing the database passphrase
|
| options/nixos/services.journald.gateway.cert | The path to a file or AF_UNIX stream socket to read the server
certificate from
|
| options/nixos/services.homebridge.pluginPath | Path to the plugin download directory (needs to be writeable)
|
| options/nixos/services.iperf3.authorizedUsersFile | Path to the configuration file containing authorized users credentials to run iperf tests.
|
| options/nixos/environment.unixODBCDrivers | Specifies Unix ODBC drivers to be registered in
/etc/odbcinst.ini
|
| options/nixos/services.slskd.nginx.sslCertificate | Path to server SSL certificate.
|
| options/nixos/services.openvscode-server.socketPath | The path to a socket file for the server to listen to.
|
| options/nixos/services.movim.nginx.sslCertificate | Path to server SSL certificate.
|
| options/home-manager/programs.sketchybar.service.outLogFile | Absolute path to log all stdout output.
|
| options/home-manager/services.podman.networks.<name>.description | The description of the network.
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.auth | Authentication to perform locally.
- The default
pubkey uses public key authentication
using a private key associated to a usable certificate.
psk uses pre-shared key authentication.
- The IKEv1 specific
xauth is used for XAuth or Hybrid
authentication,
- while the IKEv2 specific
eap keyword defines EAP
authentication.
- For
xauth, a specific backend name may be appended,
separated by a dash
|
| options/nixos/services.akkoma.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.fediwall.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.kanboard.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.librenms.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.dolibarr.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.fluidd.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.gancio.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.agorakit.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.matomo.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.mainsail.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.monica.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.pixelfed.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.gitlab-runner.services.<name>.preGetSourcesScript | Runner-specific command script executed before code is pulled.
|
| options/home-manager/programs.firefox.profiles.<name>.bookmarks.force | Whether to force override existing custom bookmarks.
|
| options/nixos/networking.wg-quick.interfaces.<name>.mtu | If not specified, the MTU is automatically determined
from the endpoint addresses or the system default route, which is usually
a sane choice
|
| options/nixos/networking.supplicant.<name>.extraConf | Configuration options for wpa_supplicant.conf
|
| options/darwin/services.buildkite-agents.<name>.hooks.pre-checkout | The pre-checkout hook will run just before your projects source code is
checked out from your SCM provider
|
| options/nixos/systemd.user.slices.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/systemd.user.timers.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.extraConfig.channel | Per channel extra configuration.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.extraConfig.account | Account section extra configuration.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups | Some email providers (Gmail) have a different directory hierarchy for
synchronized email messages
|
| options/nixos/services.sslh.settings.protocols | List of protocols sslh will probe for and redirect
|
| options/nixos/services.inadyn.settings.custom.<name>.password | Password for this DDNS provider
|
| options/home-manager/services.muchsync.remotes.<name>.frequency | How often to run muchsync
|
| options/nixos/services.parsedmarc.provision.localMail.hostname | The hostname to use when configuring Postfix
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.mpdscribble.endpoints.<name>.url | The url endpoint where the scrobble API is listening.
|
| options/home-manager/programs.vscode.profiles.<name>.languageSnippets | Defines user snippets for different languages.
|
| options/home-manager/services.podman.machines.<name>.watchdogInterval | Interval in seconds to check if the machine is running
|
| options/home-manager/services.mpdscribble.endpoints.<name>.url | The url endpoint where the scrobble API is listening.
|
| options/nixos/services.journald.remote.settings.Remote.TrustedCertificateFile | A path to a SSL CA certificate file in PEM format, or all
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags | Tag configuration
|
| options/home-manager/programs.papis.libraries.<name>.isDefault | Whether this is a default library
|
| options/nixos/services.grafana.provision.datasources.settings.deleteDatasources.*.name | Name of the datasource to delete.
|
| options/nixos/services.consul-template.instances.<name>.package | The consul-template package to use.
|
| options/nixos/services.autosuspend.wakeups.<name>.enabled | Whether to enable this wake-up check.
|
| options/home-manager/accounts.email.accounts.<name>.imapnotify.enable | Whether to enable imapnotify.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.showScrollbar | Whether the scroll bar should be visible.
|
| options/nixos/services.keepalived.vrrpScripts.<name>.interval | Seconds between script invocations.
|
| options/nixos/services.snapper.configs.<name>.TIMELINE_LIMIT_MONTHLY | Limits for timeline cleanup.
|
| options/home-manager/programs.obsidian.defaultSettings.hotkeys.<name>.*.key | The hotkey.
|
| options/home-manager/programs.obsidian.defaultSettings.extraFiles.<name>.text | Text of the file.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.if_id_in | XFRM interface ID set on inbound policies/SA
|
| options/home-manager/accounts.email.accounts.<name>.astroid.sendMailCommand | Command to send a mail
|
| options/home-manager/services.activitywatch.watchers.<name>.settings | The settings for the individual watcher in TOML format
|
| options/nixos/services.firewalld.services.<name>.ports.*.protocol | |
| options/nixos/services.firewalld.services.<name>.protocols | Protocols for the service.
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_app | Type of this worker
|
| options/home-manager/programs.librewolf.profiles.<name>.bookmarks | Declarative bookmarks.
|
| options/nixos/virtualisation.kvmgt.vgpus.<name>.uuid | UUID(s) of VGPU device
|
| options/nixos/services.fedimintd.<name>.nginx.config.http2 | Whether to enable the HTTP/2 protocol
|
| options/nixos/services.github-runners.<name>.serviceOverrides | Modify the systemd service
|
| options/nixos/services.xserver.xkb.extraLayouts.<name>.languages | A list of languages provided by the layout.
(Use ISO 639-2 codes, for example: "eng" for english)
|
| options/nixos/services.mastodon.otpSecretFile | Path to file containing the OTP secret
|
| options/nixos/services.dnscrypt-proxy2.configFile | Path to TOML config file
|
| options/nixos/services.forgejo.settings.server.HTTP_ADDR | Listen address
|
| options/nixos/services.asterisk.confFiles | Sets the content of config files (typically ending with
.conf) in the Asterisk configuration directory
|
| options/nixos/services.nsd.remoteControl.controlCertFile | Path to the client certificate signed with the server certificate
|
| options/nixos/services.matrix-conduit.secretFile | Path to a file containing sensitive environment as described in {manpage}`systemd.exec(5)
|
| options/nixos/services.tailscale.serve.configFile | Path to a Tailscale Serve configuration file in JSON format
|
| options/nixos/services.qbittorrent.profileDir | the path passed to qbittorrent via --profile.
|
| options/nixos/services.onlyoffice.postgresHost | The Postgresql hostname or socket path OnlyOffice should connect to.
|
| options/nixos/services.snipe-it.nginx.sslCertificate | Path to server SSL certificate.
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.sslServerChain | Path to server SSL chain file.
|
| options/home-manager/services.jankyborders.outLogFile | Absolute path to log all stdout output.
|
| options/home-manager/services.xidlehook.timers.*.command | Command executed after the idle timeout is reached
|
| options/nixos/services.kmonad.keyboards.<name>.defcfg.compose.delay | The delay (in milliseconds) between compose key sequences.
|
| options/nixos/services.rke2.nodeName | Node name.
|
| options/nixos/services.radicle.httpd.nginx.serverName | Name of this virtual host
|
| options/nixos/services.invoiceplane.sites.<name>.stateDir | This directory is used for uploads of attachments and cache
|
| options/nixos/systemd.network.networks.<name>.tokenBucketFilterConfig | Each attribute in this set specifies an option in the
[TokenBucketFilter] section of the unit
|
| options/nixos/systemd.network.networks.<name>.heavyHitterFilterConfig | Each attribute in this set specifies an option in the
[HeavyHitterFilter] section of the unit
|
| options/nixos/services.bookstack.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.fediwall.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/programs.uwsm.waylandCompositors.<name>.extraArgs | Extra command-line arguments pass to to the compsitor.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.agorakit.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.librenms.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.kanboard.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.mainsail.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.networkd-dispatcher.rules.<name>.script | Shell commands executed on specified operational states.
|
| options/nixos/boot.initrd.systemd.contents.<name>.dlopen.usePriority | Priority of dlopen ELF notes to include. "required" is
minimal, "recommended" includes "required", and
"suggested" includes "recommended"
|
| options/nixos/services.ttyd.username | Username for basic http authentication.
|
| options/nixos/services.logrotate.settings.<name>.priority | Order of this logrotate block in relation to the others
|
| options/darwin/services.buildkite-agents.<name>.hooks.post-checkout | The post-checkout hook will run after the bootstrap script has checked out
your projects source code.
|
| options/nixos/services.nebula.networks.<name>.firewall.outbound | Firewall rules for outbound traffic.
|
| options/nixos/services.frigate.settings.cameras.<name>.ffmpeg.inputs | List of inputs for this camera.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.index | Adds index directive.
|
| options/home-manager/services.kanshi.profiles.<name>.outputs.*.transform | Sets the output transform.
|
| options/home-manager/accounts.email.accounts.<name>.imapnotify.extraArgs | Extra arguments to pass to goimapnotify.
|
| options/darwin/services.buildkite-agents.<name>.hooks.checkout | The checkout hook script will replace the default checkout routine of the
bootstrap.sh script
|
| options/home-manager/accounts.email.accounts.<name>.himalaya.settings | Himalaya CLI configuration for this email account
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.tryFiles | Adds try_files directive.
|
| options/home-manager/programs.thunderbird.profiles.<name>.search | Declarative search engine configuration.
|
| options/nixos/services.nginx.virtualHosts.<name>.listenAddresses | Listen addresses for this virtual host
|
| options/darwin/services.aerospace.settings.on-window-detected.*."if".app-name-regex-substring | Regex substring to match the app name (optional).
|
| options/home-manager/programs.borgmatic.backups.<name>.storage.extraConfig | Extra settings.
|
| options/nixos/systemd.network.netdevs.<name>.wireguardConfig | Each attribute in this set specifies an option in the
[WireGuard] section of the unit
|
| options/nixos/services.fedimintd.<name>.nginx.config.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.device | Determines the platform faster-whisper is run on
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.module | Optional PKCS#11 module name.
|
| options/nixos/services.firewalld.zones.<name>.forwardPorts.*.protocol | |
| options/nixos/services.fcgiwrap.instances.<name>.process.user | User as which this instance of fcgiwrap will be run
|
| options/home-manager/accounts.contact.accounts.<name>.khal.addresses | Email addresses to be associated with this account
|
| options/nixos/services.gitlab-runner.services.<name>.postGetSourcesScript | Runner-specific command script executed after code is pulled.
|
| options/home-manager/programs.floorp.profiles.<name>.search.privateDefault | The default search engine used in the Private Browsing.
|
| options/nixos/services.gitlab-runner.services.<name>.runUntagged | Register to run untagged builds; defaults to
true when tagList is empty
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.http2 | Whether to enable HTTP 2
|
| options/home-manager/programs.librewolf.profiles.<name>.preConfig | Extra preferences to add to user.js, before
programs.firefox.profiles._name_.settings
|
| options/nixos/services.journald.gateway.key | Specify the path to a file or AF_UNIX stream socket to read the
secret server key corresponding to the certificate specified with
services.journald.gateway.cert from
|
| options/nixos/services.c2fmzq-server.settings.database | Path of the database
|
| options/nixos/services.nitter.sessionsFile | Path to the session tokens file
|
| options/nixos/services.shiori.environmentFile | Path to file containing environment variables
|
| options/nixos/services.mediawiki.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/services.thanos.store.objstore.config-file | Path to YAML file that contains object store configuration
|
| options/nixos/services.sympa.database.host | Database host address
|
| options/nixos/services.mongodb.initialRootPasswordFile | Path to the file containing the password for the root user if auth is enabled.
|
| options/nixos/services.mail.sendmailSetuidWrapper.source | The absolute path to the program to be wrapped.
|
| options/nixos/services.warpgate.databaseUrlFile | Path to file containing database connection string with credentials
|
| options/darwin/services.sketchybar.extraPackages | Extra packages to add to PATH.
|
| options/home-manager/programs.taskwarrior.colorTheme | Either one of the default provided theme as string, or a
path to a theme configuration file.
|
| options/nixos/services.cloudflared.tunnels.<name>.default | Catch-all service if no ingress matches
|
| options/nixos/services.cjdns.UDPInterface.connectTo.<name>.password | Authorized password to the opposite end of the tunnel.
|
| options/nixos/services.cjdns.ETHInterface.connectTo.<name>.password | Authorized password to the opposite end of the tunnel.
|
| options/nixos/services.cloudflared.tunnels.<name>.ingress | Ingress rules
|
| options/nixos/services.mosquitto.bridges.<name>.addresses.*.port | Port of the remote MQTT broker.
|
| options/home-manager/programs.floorp.profiles.<name>.bookmarks.configFile | Configuration file to define custom bookmarks.
|
| options/nixos/services.fedimintd.<name>.nginx.config.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/networking.interfaces.<name>.virtualOwner | In case of a virtual device, the user who owns it.
null will not set owner, allowing access to any user.
|
| options/nixos/services.angrr.settings.profile-policies.<name>.enable | Whether to enable this angrr policy.
|
| options/nixos/services.tor.relay.onionServices.<name>.authorizeClient | See torrc manual.
|
| options/nixos/services.github-runners.<name>.extraEnvironment | Extra environment variables to set for the runner, as an attrset.
|
| options/darwin/services.github-runners.<name>.extraEnvironment | Extra environment variables to set for the runner, as an attrset.
|
| options/home-manager/accounts.email.accounts.<name>.imapnotify.onNotify | Shell commands to run on any event.
|
| options/nixos/services.kmonad.keyboards.<name>.extraGroups | Extra permission groups to attach to the KMonad instance for
this keyboard
|
| options/nixos/services.buildkite-agents | Attribute set of buildkite agents
|
| options/darwin/services.buildkite-agents | Attribute set of buildkite agents
|
| options/nixos/services.wstunnel.clients.<name>.httpProxy | Proxy to use to connect to the wstunnel server (USER:PASS@HOST:PORT).
Passwords specified here will be world-readable in the Nix store!
To pass a password to the service, point the environmentFile option
to a file containing PROXY_PASSWORD=<your-password-here> and set
this option to <user>:$PROXY_PASSWORD@<host>:<port>
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/home-manager/accounts.email.accounts.<name>.getmail.mailboxes | A non-empty list of mailboxes
|
| options/home-manager/services.kanshi.profiles.<name>.outputs.*.adaptiveSync | Enables or disables adaptive synchronization
(aka
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.inactivity | Timeout before closing CHILD_SA after inactivity
|
| options/nixos/networking.vswitches.<name>.interfaces | The physical network interfaces connected by the vSwitch.
|
| options/nixos/services.public-inbox.inboxes.<name>.description | User-visible description for the repository.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.cssSnippets | CSS snippets to install.
|
| options/nixos/services.davis.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.movim.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.slskd.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/darwin/launchd.agents.<name>.serviceConfig.AbandonProcessGroup | When a job dies, launchd kills any remaining processes with the same process group ID as the job
|
| options/home-manager/services.kanshi.profiles.<name>.outputs.*.position | <x>,<y>
Places the output at the specified position in the global coordinates
space.
|
| options/nixos/services.authelia.instances.<name>.settings.theme | The theme to display.
|
| options/nixos/services.jitsi-videobridge.xmppConfigs.<name>.userName | User part of the JID.
|
| options/nixos/systemd.targets.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/systemd.sockets.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.enableACME | Whether to ask Let's Encrypt to sign a certificate for this vhost
|
| options/home-manager/i18n.inputMethod.fcitx5.settings.addons.<name>.globalSection | global section of an INI file (attrs of INI atom (null, bool, int, float or string))
|
| options/nixos/services.simplesamlphp.<name>.package | The simplesamlphp package to use.
|
| options/nixos/services.firewalld.zones.<name>.description | Description for the zone.
|
| options/nixos/services.fedimintd.<name>.api_iroh.openFirewall | Opens UDP port in firewall for fedimintd's API Iroh endpoint
|
| options/nixos/services.radicle.ci.broker.settings.adapters.<name>.env | Environment variables to add when running the adapter.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.life_bytes | Maximum bytes processed before CHILD_SA gets closed
|
| options/nixos/services.fedimintd.<name>.nginx.config.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| options/nixos/systemd.services.<name>.confinement.enable | If set, all the required runtime store paths for this service are
bind-mounted into a tmpfs-based
chroot(2).
|
| options/nixos/services.netbird.tunnels.<name>.environment | Environment for the netbird service, used to pass configuration options.
|
| options/nixos/services.netbird.clients.<name>.environment | Environment for the netbird service, used to pass configuration options.
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.locations.<name>.index | Adds DirectoryIndex directive
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.locations.<name>.alias | Alias directory for requests
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.themes.*.enable | Whether to set the theme as active.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.sha256_96 | HMAC-SHA-256 is used with 128-bit truncation with IPsec
|
| options/nixos/networking.wireless.networks.<name>.psk | The network's pre-shared key in plaintext defaulting
to being a network without any authentication.
Be aware that this will be written to the Nix store
in plaintext! Use pskRaw with an external
reference to keep it safe.
Mutually exclusive with pskRaw.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits | Resource limits to be imposed on the job
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits | Resource limits to be imposed on the job
|
| options/nixos/services.angrr.settings.profile-policies.<name>.keep-since | Retention period for the GC roots in this profile.
|
| options/nixos/services.moodle.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.dns | Address or CIDR subnets
StrongSwan default: []
|
| options/nixos/services.nagios.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.printing.cups-pdf.instances.<name>.confFileText | This will contain the contents of cups-pdf.conf for this instance, derived from settings
|
| options/nixos/hardware.fw-fanctrl.config.strategies.<name>.speedCurve | How should the speed curve look like
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.tryFiles | Adds try_files directive.
|
| options/darwin/networking.wg-quick.interfaces.<name>.peers.*.publicKey | The public key for this peer.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.auth | Authentication settings
|
| options/nixos/services.jigasi.componentPasswordFile | Path to file containing component secret.
|
| options/nixos/services.gitea.settings.server.STATIC_ROOT_PATH | Upper level of template and static files path.
|
| options/nixos/services.draupnir.settings.dataPath | The path Draupnir will store its state/data in.
This option is read-only.
If you want to customize where this data is stored, use a bind mount.
|
| options/nixos/services.glance.settings | Configuration written to a yaml file that is read by glance
|
| options/nixos/documentation.enable | Whether to install documentation of packages from
environment.systemPackages into the generated system path
|
| options/nixos/services.davis.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.calibre-web.options.calibreLibrary | Path to Calibre library.
|
| options/nixos/services.jicofo.componentPasswordFile | Path to file containing component secret.
|
| options/nixos/services.oauth2-proxy.tls.certificate | Path to certificate file.
|
| options/nixos/services.thinkfan.sensors | List of temperature sensors thinkfan will monitor.
This section slightly departs from the thinkfan.conf syntax
|
| options/nixos/services.onlyoffice.jwtSecretFile | Path to a file that contains the secret to sign web requests using JSON Web Tokens
|
| options/nixos/services.slskd.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.nextcloud.config.dbhost | Database host (+port) or socket path
|
| options/nixos/services.movim.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.zoneminder.storageDir | ZoneMinder can generate quite a lot of data, so in case you don't want
to use the default /var/lib/zoneminder, you can override the path here.
|
| options/darwin/documentation.enable | Whether to install documentation of packages from
environment.systemPackages into the generated system path
|
| options/home-manager/home.sessionSearchVariables | Extra directories to prepend to arbitrary PATH-like
environment variables (e.g.: MANPATH)
|
| options/nixos/users.users.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| options/darwin/users.users.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| options/nixos/services.prometheus.exporters.imap-mailstat.accounts.<name>.username | If empty string mailaddress value is used
|
| options/nixos/networking.wireless.networks.<name>.ssid | You could use this field to override the network's ssid
|
| options/nixos/services.beesd.filesystems.<name>.extraOptions | Extra command-line options passed to the daemon
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.timeout | HTTP timeout in seconds. 0 means forever or system timeout.
|
| options/nixos/systemd.user.timers.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/systemd.user.slices.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/home-manager/launchd.agents.<name>.config.KeepAlive | This optional key is used to control whether your job is to be kept continuously running or to let
demand and conditions control the invocation
|
| options/nixos/services.snipe-it.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.jibri.xmppEnvironments.<name>.xmppDomain | The base XMPP domain.
|
| options/nixos/services.gitlab-runner.services.<name>.dockerAllowedImages | Whitelist allowed images.
|
| options/darwin/services.gitlab-runner.services.<name>.dockerAllowedImages | Whitelist allowed images.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mode | IPsec Mode to establish CHILD_SA with.
tunnel negotiates the CHILD_SA in IPsec Tunnel Mode,
- whereas
transport uses IPsec Transport Mode.
transport_proxy signifying the special Mobile IPv6
Transport Proxy Mode.
beet is the Bound End to End Tunnel mixture mode,
working with fixed inner addresses without the need to include them in
each packet.
- Both
transport and beet modes are
subject to mode negotiation; tunnel mode is
negotiated if the preferred mode is not available.
pass and drop are used to install
shunt policies which explicitly bypass the defined traffic from IPsec
processing or drop it, respectively
|
| options/nixos/services.fedimintd.<name>.nginx.config.reuseport | Create an individual listening socket
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/darwin/launchd.agents.<name>.serviceConfig.WorkingDirectory | This optional key is used to specify a directory to chdir(2) to before running the job.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/nixos/services.blockbook-frontend.<name>.extraConfig | Additional configurations to be appended to coin.conf
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.listen | Listen addresses and ports for this virtual host.
This option overrides addSSL, forceSSL and onlySSL
|
| options/nixos/users.users.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| options/darwin/users.users.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| options/nixos/services.tahoe.introducers.<name>.tub.location | The external location that the introducer should listen on
|
| options/nixos/services.nebula.networks.<name>.lighthouse.dns.port | UDP port number for lighthouse DNS server.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.local_ts | List of local traffic selectors to include in CHILD_SA
|
| options/nixos/services.honk.host | The host name or IP address the server should listen to.
|
| options/nixos/services.anuko-time-tracker.nginx.serverName | Name of this virtual host
|
| options/nixos/services.neo4j.ssl.policies | Defines the SSL policies for use with Neo4j connectors
|
| options/nixos/services.mysql.galeraCluster.localName | The unique name that identifies this particular node within the cluster
|
| options/home-manager/programs.vicinae.themes | Theme settings to add to the themes folder in ~/.config/vicinae/themes
|
| options/nixos/services.vault-agent.instances.<name>.settings | Free-form settings written directly to the config.json file
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits | Resource limits to be imposed on the job
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits | Resource limits to be imposed on the job
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.dependency-track.settings."alpine.oidc.username.claim" | Defines the name of the claim that contains the username in the provider's userinfo endpoint
|
| options/nixos/services.cgit.<name>.gitHttpBackend.checkExportOkFiles | Whether git-http-backend should only export repositories that contain a git-daemon-export-ok file
|
| options/nixos/services.woodpecker-agents.agents.<name>.enable | Whether to enable this Woodpecker-Agent
|
| options/nixos/services.tarsnap.archives.<name>.verylowmem | Reduce memory consumption by a factor of 2 beyond what
lowmem does, at the cost of significantly
slowing down the archiving process.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.extraConfig | These lines go to httpd.conf verbatim
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.publicKey | The base64 public key to the peer.
|
| options/nixos/services.matrix-continuwuity.settings.global.unix_socket_path | Listen on a UNIX socket at the specified path
|
| options/nixos/services.fedimintd.<name>.bitcoin.rpc.secretFile | If set the URL specified in bitcoin.rpc.url will get the content of this file added
as an URL password, so http://user@example.com will turn into http://user:SOMESECRET@example.com
|
| options/nixos/services.easytier.instances.<name>.settings.instance_name | Identify different instances on same host
|
| options/nixos/services.simplesamlphp.<name>.phpfpmPool | The PHP-FPM pool that serves SimpleSAMLphp instance.
|
| options/nixos/services.v4l2-relayd.instances.<name>.input.framerate | The framerate to read from input-stream.
|
| options/nixos/services.grafana.settings.smtp.from_name | Name to be used as client identity for EHLO in SMTP dialog.
|
| options/nixos/services.tarsnap.archives.<name>.cachedir | The cache allows tarsnap to identify previously stored data
blocks, reducing archival time and bandwidth usage
|
| options/home-manager/accounts.email.accounts.<name>.neomutt.extraMailboxes | List of extra mailboxes
|
| options/nixos/services.bookstack.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.bookstack.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.akkoma.extraPackages | List of extra packages to include in the executable search path of the service unit
|
| options/nixos/services.akkoma.nginx.sslCertificate | Path to server SSL certificate.
|
| options/nixos/services.fluidd.nginx.sslCertificate | Path to server SSL certificate.
|
| options/nixos/services.grafana.settings.smtp.key_file | File path to a key file.
|
| options/nixos/services.gancio.nginx.sslCertificate | Path to server SSL certificate.
|
| options/nixos/services.snipe-it.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.thanos.sidecar.tracing.config-file | Path to YAML file that contains tracing configuration
|
| options/nixos/services.thanos.receive.tracing.config-file | Path to YAML file that contains tracing configuration
|
| options/nixos/services.quassel.certificateFile | Path to the certificate used for SSL connections with clients.
|
| options/nixos/services.monica.nginx.sslCertificate | Path to server SSL certificate.
|
| options/nixos/services.oauth2-proxy.google.serviceAccountJSON | The path to the service account JSON credentials.
|
| options/nixos/services.thanos.compact.tracing.config-file | Path to YAML file that contains tracing configuration
|
| options/nixos/services.pretalx.settings.database.host | Database host or socket path.
|
| options/nixos/services.unpoller.unifi.defaults.pass | Path of a file containing the password for the unifi service user
|
| options/nixos/services.matomo.nginx.sslCertificate | Path to server SSL certificate.
|
| options/nixos/services.microsocks.authPasswordFile | Path to a file containing the password for authentication.
|
| options/home-manager/programs.chromium.extensions.*.crxPath | Path to the extension's crx file
|
| options/home-manager/wayland.windowManager.wayfire.package | The wayfire package to use
|
| options/home-manager/programs.sketchybar.extraPackages | Extra packages to add to PATH for the sketchybar service.
|
| options/darwin/launchd.agents.<name>.serviceConfig.StartInterval | This optional key causes the job to be started every N seconds
|
| options/nixos/networking.wireguard.interfaces.<name>.ips | The IP addresses of the interface.
|
| options/nixos/services.armagetronad.servers.<name>.enable | Whether to enable armagetronad.
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.force | Whether to override all previous firefox settings
|
| options/nixos/systemd.services.<name>.confinement.binSh | The program to make available as /bin/sh inside
the chroot
|
| options/nixos/services.jitsi-videobridge.xmppConfigs.<name>.mucJids | JID of the MUC to join
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.netbird.tunnels.<name>.openInternalFirewall | Opens up internal firewall ports for the NetBird's network interface.
|
| options/nixos/services.netbird.clients.<name>.openInternalFirewall | Opens up internal firewall ports for the NetBird's network interface.
|
| options/home-manager/accounts.email.accounts.<name>.lieer.sync.frequency | How often to synchronize the account
|
| options/darwin/networking.wg-quick.interfaces.<name>.table | Controls the routing table to which routes are added
|
| options/nixos/services.firewalld.zones.<name>.icmpBlockInversion | Whether to invert the icmp block handling
|
| options/nixos/systemd.network.networks.<name>.quickFairQueueingConfig | Each attribute in this set specifies an option in the
[QuickFairQueueing] section of the unit
|
| options/nixos/services.borgbackup.jobs.<name>.removableDevice | Whether the repo (which must be local) is a removable device.
|
| options/nixos/services.influxdb2.provision.users.<name>.present | Whether to ensure that this user is present or absent.
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.nbns | Address or CIDR subnets
StrongSwan default: []
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.dhcp | Address or CIDR subnets
StrongSwan default: []
|
| options/nixos/services.tor.relay.onionServices.<name>.settings.RendPostPeriod | See torrc manual.
|
| options/nixos/systemd.user.sockets.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.wstunnel.clients.<name>.settings.http-headers | Custom headers to send in the upgrade request
|
| options/nixos/systemd.user.targets.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/home-manager/systemd.user.slices.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/home-manager/systemd.user.timers.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/home-manager/systemd.user.mounts.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/home-manager/services.xsuspender.rules.<name>.matchWmClassContains | Match windows that wm class contains string.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords | Sets allowed passwords for WPA3-SAE
|
| options/nixos/services.openafsServer.roles.backup.cellServDB.*.dnsname | DNS full-qualified domain name of a database server
|
| options/nixos/services.shorewall.configs | This option defines the Shorewall configs
|
| options/nixos/security.pam.services.<name>.allowNullPassword | Whether to allow logging into accounts that have no password
set (i.e., have an empty password field in
/etc/passwd or
/etc/group)
|
| options/nixos/services.sabnzbd.settings.servers.<name>.priority | Priority of this servers
|
| options/nixos/services.sabnzbd.settings.servers.<name>.required | In case of connection failures, wait for the
server to come back online instead of skipping
it.
|
| options/nixos/services.restic.backups.<name>.environmentFile | file containing the credentials to access the repository, in the
format of an EnvironmentFile as described by systemd.exec(5)
|
| options/nixos/services.hostapd.radios.<name>.wifi6.multiUserBeamformer | HE multi user beamformee support
|
| options/nixos/programs.uwsm.waylandCompositors.<name>.comment | The comment field of the desktop entry file.
|
| options/nixos/services.beesd.filesystems.<name>.verbosity | Log verbosity (syslog keyword/level).
|
| options/nixos/networking.interfaces.<name>.ipv4.routes.*.address | IPv4 address of the network.
|
| options/nixos/networking.interfaces.<name>.ipv6.routes.*.address | IPv6 address of the network.
|
| options/nixos/services.tarsnap.archives.<name>.explicitSymlinks | Whether to follow symlinks specified as archives.
|
| options/nixos/services.maubot.settings.homeservers.<name>.url | Client-server API URL
|
| options/nixos/systemd.services.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/home-manager/accounts.email.accounts.<name>.neomutt.showDefaultMailbox | Show the default mailbox (INBOX)
|
| options/home-manager/wayland.windowManager.hyprland.submaps.<name>.settings | Hyprland binds to be put in the submap
|
| options/nixos/services.netbird.tunnels.<name>.dns-resolver.address | An explicit address that NetBird will serve *.netbird.cloud. (usually) entries on
|
| options/nixos/services.netbird.clients.<name>.dns-resolver.address | An explicit address that NetBird will serve *.netbird.cloud. (usually) entries on
|
| options/nixos/services.mautrix-meta.instances.<name>.serviceUnit | The systemd unit (a service or a target) for other services to depend on if they
need to be started after matrix-synapse
|
| options/nixos/services.easytier.instances.<name>.settings.dhcp | Automatically determine the IPv4 address of this peer based on
existing peers on network.
|
| options/nixos/virtualisation.fileSystems.<name>.noCheck | Disable running fsck on this filesystem.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/home-manager/programs.librewolf.profiles.<name>.search.default | The default search engine used in the address bar and search
bar.
|
| options/nixos/services.maddy.hostname | Hostname to use
|
| options/nixos/services.gitlab.secrets.dbFile | A file containing the secret used to encrypt variables in
the DB
|
| options/nixos/services.gitlab.secrets.jwsFile | A file containing the secret used to encrypt session
keys
|
| options/nixos/services.hardware.pommed.configFile | The path to the pommed.conf file
|
| options/nixos/services.buffyboard.configFile | Path to an INI format configuration file to provide Buffyboard
|
| options/nixos/services.moodle.virtualHost.documentRoot | The path of Apache's document root directory
|
| options/nixos/services.nagios.virtualHost.documentRoot | The path of Apache's document root directory
|
| options/nixos/services.tlsrpt.fetcher.settings.storage | Path to the collectd sqlite database.
|
| options/nixos/services.opengfw.settings.ruleset | The path to load specific local geoip/geosite db files
|
| options/nixos/services.slurm.dbdserver.storagePassFile | Path to file with database password
|
| options/nixos/services.misskey.database.passwordFile | The path to a file containing the database password
|
| options/home-manager/programs.sketchybar.service.errorLogFile | Absolute path to log all stderr output.
|
| options/nixos/services.blockbook-frontend.<name>.rpc.password | RPC password for JSON-RPC connections
|
| options/nixos/networking.sits.<name>.encapsulation | Configures the type of encapsulation.
|
| options/nixos/services.znapzend.zetup.<name>.destinations | Additional destinations.
|
| options/darwin/services.gitlab-runner.services.<name>.maximumTimeout | What is the maximum timeout (in seconds) that will be set for
job when using this Runner. 0 (default) simply means don't limit.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.revocation | Certificate revocation policy for CRL or OCSP revocation.
- A
strict revocation policy fails if no revocation information is
available, i.e. the certificate is not known to be unrevoked.
ifuri fails only if a CRL/OCSP URI is available, but certificate
revocation checking fails, i.e. there should be revocation information
available, but it could not be obtained.
- The default revocation policy
relaxed fails only if a certificate is
revoked, i.e. it is explicitly known that it is bad
|
| options/nixos/services.kmonad.keyboards.<name>.defcfg.allowCommands | Whether to enable keys to run shell commands.
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.settings | Settings for this profile
|
| options/nixos/networking.wireless.networks.<name>.extraConfig | Extra configuration lines appended to the network block
|
| options/nixos/services.sabnzbd.settings.servers.<name>.optional | In case of connection failures, temporarily
disable this server. (See sabnzbd's documentation
for usage guides).
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.hostapd.radios.<name>.wifi7.multiUserBeamformer | EHT multi user beamformee support
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.language | The language used to to parse words and sentences.
|
| options/darwin/security.sandbox.profiles.<name>.allowNetworking | Whether to allow network access inside the sandbox.
|
| options/nixos/services.peertube.settings.video_transcription.engine_path | Custom engine path for local transcription.
|
| options/nixos/services.authelia.instances.<name>.settings | Your Authelia config.yml as a Nix attribute set
|
| options/nixos/services.fedimintd.<name>.nginx.config.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.invoiceplane.sites.<name>.poolConfig | Options for the InvoicePlane PHP pool
|
| options/home-manager/programs.thunderbird.profiles.<name>.userChrome | Custom Thunderbird user chrome CSS.
|
| options/nixos/services.anubis.instances.<name>.settings.TARGET | The reverse proxy target that Anubis is protecting
|
| options/nixos/services.networkd-dispatcher.rules.<name>.onState | List of names of the systemd-networkd operational states which
should trigger the script
|
| options/nixos/services.fcgiwrap.instances.<name>.process.prefork | Number of processes to prefork.
|
| options/nixos/services.tarsnap.archives.<name>.directories | List of filesystem paths to archive.
|
| options/nixos/services.blockbook-frontend.<name>.rpc.passwordFile | File containing password of the RPC user
|
| options/nixos/services.gitea.appName | Application name.
|
| options/nixos/services.bookstack.nginx.serverName | Name of this virtual host
|
| options/nixos/services.ghostunnel.servers.<name>.unsafeTarget | If set, does not limit target to localhost, 127.0.0.1, [::1], or UNIX sockets
|
| options/nixos/services.gancio.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.fluidd.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.akkoma.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.matomo.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.monica.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/home-manager/programs.floorp.profiles.<name>.bookmarks.settings | Custom bookmarks.
|
| options/nixos/services.gitlab-runner.services.<name>.debugTraceDisabled | When set to true Runner will disable the possibility of
using the CI_DEBUG_TRACE feature.
|
| options/darwin/services.gitlab-runner.services.<name>.debugTraceDisabled | When set to true Runner will disable the possibility of
using the CI_DEBUG_TRACE feature.
|
| options/nixos/services.mautrix-meta.instances.<name>.settings | config.yaml configuration as a Nix attribute set
|
| options/nixos/services.icingaweb2.modules.monitoring.backends.<name>.resource | Name of the IDO resource
|
| options/nixos/services.prosody.uploadHttp.httpUploadPath | Directory where the uploaded files will be stored when the http_upload module is used
|
| options/nixos/networking.firewall.extraPackages | Additional packages to be included in the environment of the system
as well as the path of networking.firewall.extraCommands.
|
| options/nixos/services.grafana-to-ntfy.settings.ntfyBAuthPass | The path to the password for the specified ntfy-sh user
|
| options/nixos/services.firezone.gateway.tokenFile | A file containing the firezone gateway token
|
| options/nixos/services.pgadmin.emailServer.passwordFile | Password for SMTP email account
|
| options/nixos/services.plausible.mail.smtp.passwordFile | The path to the file with the password in case SMTP auth is enabled.
|
| options/nixos/services.uwsgi.instance | uWSGI configuration
|
| options/nixos/services.xserver.displayManager.xserverBin | Path to the X server used by display managers.
|
| options/nixos/services.wyoming.satellite.sounds.done | Path to audio file in WAV format to play when voice command recording has ended.
|
| options/nixos/services.postsrsd.settings.chroot-dir | Path to chroot into at runtime as an additional layer of protection.
We confine the runtime environment through systemd hardening instead, so this option is read-only.
|
| options/nixos/services.xserver.windowManager.i3.configFile | Path to the i3 configuration file
|
| options/home-manager/services.jankyborders.errorLogFile | Absolute path to log all stderr output.
|
| options/home-manager/programs.anki.sync.keyFile | Path to a file containing the sync account sync key
|
| options/nixos/services.postfix.settings.master.<name>.privileged | |
| options/nixos/services.bookstack.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.dovecot2.mailPlugins.perProtocol.<name>.enable | mail plugins to enable as a list of strings to append to the corresponding per-protocol $mail_plugins configuration variable
|
| options/nixos/networking.wg-quick.interfaces.<name>.privateKeyFile | Private key file as generated by wg genkey.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/home-manager/programs.firefox.profiles.<name>.search.privateDefault | The default search engine used in the Private Browsing.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.dpd_action | Action to perform for this CHILD_SA on DPD timeout
|
| options/nixos/services.gitlab-runner.services.<name>.protected | When set to true Runner will only run on pipelines
triggered on protected branches
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.if_id_out | XFRM interface ID set on outbound policies/SA
|
| options/nixos/systemd.services.<name>.enableStrictShellChecks | Enable running shellcheck on the generated scripts for this unit
|
| options/nixos/services.zeronsd.servedNetworks.<name>.settings.domain | Domain under which ZeroTier records will be available.
|
| options/home-manager/accounts.email.accounts.<name>.imapnotify.onNotifyPost | Shell commands to run after onNotify event.
|
| options/home-manager/programs.firefox.profiles.<name>.bookmarks.configFile | Configuration file to define custom bookmarks.
|
| options/home-manager/systemd.user.services.<name>.Service.Environment | Environment variables available to executed processes.
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/home-manager/programs.librewolf.profiles.<name>.search.force | Whether to force replace the existing search
configuration
|
| options/nixos/services.blockbook-frontend.<name>.extraCmdLineOptions | Extra command line options to pass to Blockbook
|
| options/nixos/services.authelia.instances.<name>.settings.log.level | Level of verbosity for logs.
|
| options/nixos/services.orangefs.server.fileSystems.<name>.extraStorageHints | Extra config for <StorageHints> section.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.cssSnippets.*.text | Text of the file.
|
| options/nixos/services.authelia.instances.<name>.secrets | It is recommended you keep your secrets separate from the configuration
|
| options/nixos/services.logrotate.settings.<name>.frequency | How often to rotate the logs
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.public | Whether this is a public client (enforces PKCE, doesn't use a basic secret)
|
| options/darwin/launchd.daemons.<name>.serviceConfig.AbandonProcessGroup | When a job dies, launchd kills any remaining processes with the same process group ID as the job
|
| options/home-manager/programs.borgmatic.backups.<name>.location.extraConfig | Extra settings.
|
| options/nixos/services.easytier.instances.<name>.settings.peers | Peers to connect initially
|
| options/nixos/services.firewalld.zones.<name>.sources.*.address | An IP address or a network IP address with a mask for IPv4 or IPv6
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rand_packets | Packet range from which to choose a random value to subtract from
rekey_packets
|
| options/nixos/users.users.<name>.openssh.authorizedPrincipals | A list of verbatim principal names that should be added to the user's
authorized principals.
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/nixos/security.ipa.ipaHostname | Fully-qualified hostname used to identify this host in the IPA domain.
|
| options/nixos/boot.binfmt.registrations.<name>.fixBinary | Whether to open the interpreter file as soon as the
registration is loaded, rather than waiting for a
relevant file to be invoked
|
| options/nixos/services.nullmailer.config.me | The fully-qualifiled host name of the computer running nullmailer
|
| options/home-manager/programs.gemini-cli.commands | An attribute set of custom commands that will be globally available
|
| options/home-manager/accounts.calendar.accounts.<name>.khal.addresses | Email addresses to be associated with this account
|
| options/nixos/services.firezone.server.provision.accounts.<name>.auth.<name>.adapter_config.clientSecretFile | A file containing a the client secret for an openid_connect adapter
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/nixos/services.fluidd.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.gitea.settings.mailer.SENDMAIL_PATH | Path to sendmail binary or script.
|
| options/nixos/services.borgbackup.repos | Serve BorgBackup repositories to given public SSH keys,
restricting their access to the repository only
|
| options/nixos/services.keycloak.database.host | Hostname of the database to connect to
|
| options/nixos/services.gancio.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/hardware.nvidia-container-toolkit.csv-files | The path to the list of CSV files to use when generating the CDI specification in CSV mode.
|
| options/nixos/services.akkoma.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.ejabberd.imagemagick | Add ImageMagick to server's path; allows for image thumbnailing
|
| options/nixos/services.foundationdb.pidfile | Path to pidfile for fdbmonitor.
|
| options/nixos/services.monica.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.matterbridge.configPath | The path to the matterbridge configuration file.
|
| options/nixos/services.thanos.rule.tracing.config | Tracing configuration
|
| options/nixos/services.peering-manager.peeringdbApiKeyFile | Path to a file containing the PeeringDB API key.
|
| options/nixos/services.matomo.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.taskserver.pki.manual.ca.cert | Fully qualified path to the CA certificate.
Setting this option will prevent automatic CA creation and handling.
|
| options/nixos/virtualisation.xen.qemu.pidFile | Path to the QEMU PID file.
|
| options/nixos/services.warpgate.settings.log.send_to | Path of UNIX socket of log forwarder
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites | Attribute set of site options for this profile
|
| options/nixos/services.drupal.sites.<name>.virtualHost.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.bookstack.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/home-manager/accounts.email.accounts.<name>.imapnotify.extraConfig | Additional configuration to add for this account.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.AbandonProcessGroup | When a job dies, launchd kills any remaining processes with the same process group ID as the job
|
| options/nixos/services.simplesamlphp.<name>.authSources | Auth sources options used by SimpleSAMLphp.
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/systemd.user.sockets.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/systemd.user.targets.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/programs.tsmClient.servers.<name>.tcpserveraddress | Host/domain name or IP address of the IBM TSM server.
|
| options/nixos/services.peertube-runner.instancesToRegister.<name>.url | URL of the PeerTube instance.
|
| options/nixos/virtualisation.fileSystems.<name>.enable | Whether to enable the filesystem mount.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.vmacXmitBase | Send/Recv VRRP messages from base interface instead of VMAC interface.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.WorkingDirectory | This optional key is used to specify a directory to chdir(2) to before running the job.
|
| options/home-manager/programs.librewolf.profiles.<name>.settings | Attribute set of LibreWolf preferences
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.wpaPassword | Sets the password for WPA-PSK that will be converted to the pre-shared key
|
| options/nixos/systemd.services.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/services.bcg.mqtt.username | MQTT server access username.
|
| options/nixos/services.simplesamlphp.<name>.localDomain | The domain serving your SimpleSAMLphp instance
|
| options/nixos/services.jitsi-videobridge.xmppConfigs.<name>.domain | Domain part of JID of the XMPP user, if it is different from hostName.
|
| options/nixos/networking.interfaces.<name>.ipv6.addresses | List of IPv6 addresses that will be statically assigned to the interface.
|
| options/nixos/services.angrr.settings.profile-policies.<name>.keep-latest-n | Keep the latest N GC roots in this profile.
|
| options/nixos/networking.interfaces.<name>.ipv4.addresses | List of IPv4 addresses that will be statically assigned to the interface.
|
| options/nixos/services.public-inbox.inboxes.<name>.watchheader | If specified, public-inbox-watch(1) will only process
mail containing a matching header.
|
| options/nixos/networking.wireguard.interfaces.<name>.type | The type of the interface
|
| options/nixos/services.nginx.virtualHosts.<name>.listen.*.extraParameters | Extra parameters of this listen directive.
|
| options/nixos/services.etesync-dav.sslCertificate | Path to server SSL certificate
|
| options/nixos/services.esphome.allowedDevices | A list of device nodes to which esphome has access to
|
| options/nixos/services.haven.environmentFile | Path to a file containing sensitive environment variables
|
| options/nixos/services.grafana.settings.server.socket | Path where the socket should be created when protocol=socket
|
| options/nixos/services.calibre-server.libraries | Make sure each library path is initialized before service startup
|
| options/nixos/services.gitlab.initialRootPasswordFile | File containing the initial password of the root account if
this is a new install
|
| options/nixos/services.gitlab.databasePasswordFile | File containing the GitLab database user password
|
| options/nixos/services.gitlab.secrets.otpFile | A file containing the secret used to encrypt secrets for OTP
tokens
|
| options/nixos/services.netdata.extraNdsudoPackages | Extra packages to add to PATH to make available to ndsudo.
ndsudo has SUID privileges, be careful what packages you list here.
cfg.package must be built with withNdsudo = true
|
| options/nixos/services.opengfw.settings.ruleset.geosite | Path to geosite.dat.
|
| options/nixos/services.mastodon.secretKeyBaseFile | Path to file containing the secret key base
|
| options/nixos/services.nullmailer.remotesFile | Path to the remotes control file
|
| options/nixos/services.limesurvey.nginx.virtualHost.root | The path of the web root directory.
|
| options/nixos/services.wyoming.satellite.sounds.awake | Path to audio file in WAV format to play when wake word is detected.
|
| options/nixos/services.fedimintd.<name>.nginx.config.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| options/nixos/services.hostapd.radios.<name>.wifi6.singleUserBeamformee | HE single user beamformee support
|
| options/nixos/services.hostapd.radios.<name>.wifi6.singleUserBeamformer | HE single user beamformer support
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.highlight | The colors for the terminal’s highlighted area.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.auth | Authentication settings
|
| options/home-manager/programs.thunderbird.profiles.<name>.extraConfig | Extra preferences to add to user.js.
|
| options/nixos/services.fedimintd.<name>.consensus.finalityDelay | Consensus peg-in finality delay.
|
| options/home-manager/accounts.email.accounts.<name>.offlineimap.enable | Whether to enable OfflineIMAP.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.WorkingDirectory | This optional key is used to specify a directory to chdir(2) to before running the job.
|
| options/nixos/fileSystems.<name>.overlay.useStage1BaseDirectories | If enabled, lowerdir, upperdir and workdir will be prefixed with /sysroot
|
| options/nixos/services.keepalived.vrrpInstances.<name>.virtualIps | Declarative vhost config
|
| options/nixos/networking.wireguard.interfaces.<name>.peers | Peers linked to the interface.
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.force | Whether to override all previous firefox settings
|
| options/darwin/launchd.daemons.<name>.serviceConfig.StartInterval | This optional key causes the job to be started every N seconds
|
| options/nixos/services.dolibarr.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.kanboard.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.librenms.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.agorakit.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.fediwall.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.mainsail.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.pixelfed.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/networking.wireless.networks.<name>.auth | Use this option to configure advanced authentication methods
like EAP
|
| options/nixos/services.borgbackup.jobs.<name>.patterns | Include/exclude paths matching the given patterns
|
| options/nixos/hardware.fw-fanctrl.config.strategies.<name>.speedCurve.*.temp | Temperature in °C at which the fan speed should be changed
|
| options/home-manager/launchd.agents.<name>.config.ThrottleInterval | This key lets one override the default throttling policy imposed on jobs by launchd
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.scopeMaps | Maps kanidm groups to returned oauth scopes
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mark_out | Netfilter mark and mask for output traffic
|
| options/nixos/services.gitea-actions-runner.instances.<name>.settings | Configuration for act_runner daemon
|
| options/nixos/services.nebula.networks.<name>.lighthouse.dns.enable | Whether this lighthouse node should serve DNS.
|
| options/nixos/services.frigate.settings.cameras.<name>.ffmpeg.inputs.*.roles | List of roles for this stream
|
| options/nixos/services.wordpress.sites.<name>.database.passwordFile | A file containing the password corresponding to
database.user.
|
| options/darwin/networking.wg-quick.interfaces.<name>.peers.*.allowedIPs | List of IP addresses associated with this peer.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.passwordFile | The password for this entry, read from the given file when starting hostapd
|
| options/home-manager/accounts.email.accounts.<name>.lieer.notmuchSetupWarning | Warn if Notmuch is not also enabled for this account
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mark_in | Netfilter mark and mask for input traffic
|
| options/nixos/systemd.network.networks.<name>.networkEmulatorConfig | Each attribute in this set specifies an option in the
[NetworkEmulator] section of the unit
|
| options/nixos/services.hostapd.radios.<name>.wifi7.singleUserBeamformer | EHT single user beamformer support
|
| options/nixos/services.hostapd.radios.<name>.wifi7.singleUserBeamformee | EHT single user beamformee support
|
| options/nixos/services.wordpress.sites.<name>.database.createLocally | Create the database and database user locally.
|
| options/home-manager/systemd.user.sockets.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/home-manager/systemd.user.automounts.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/home-manager/systemd.user.targets.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/nixos/services.multipath.devices.*.marginal_path_err_sample_time | One of the four parameters of supporting path check based on accounting IO error such as intermittent error
|
| options/nixos/services.roundcube.database.username | Username for the postgresql connection
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.originUrl | The redirect URL of the service
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.imapOauth2Params.client_id | The OAuth2 client identifier.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.smtpOauth2Params.client_id | The OAuth2 client identifier.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswordsFile | Sets the password for WPA3-SAE
|
| options/nixos/networking.firewall.logReversePathDrops | Logs dropped packets failing the reverse path filter test if
the option networking.firewall.checkReversePath is enabled.
|
| options/nixos/services.photoprism.originalsPath | Storage path of your original media files (photos and videos).
|
| options/nixos/services.prefect.databasePasswordFile | path to a file containing e.g.:
DBPASSWORD=supersecret
stored outside the nix store, read by systemd as EnvironmentFile.
|
| options/nixos/services.postgresqlBackup.location | Path of directory where the PostgreSQL database dumps will be placed.
|
| options/nixos/services.kubernetes.kubelet.cni.configDir | Path to Kubernetes CNI configuration directory.
|
| options/nixos/services.warpgate.settings.postgres.key | Path to PostgreSQL listener private key.
|
| options/nixos/virtualisation.rootDevice | The path (inside the VM) to the device containing the root filesystem.
|
| options/home-manager/wayland.windowManager.sway.package | Sway package to use
|
| options/nixos/services.easytier.instances.<name>.settings.ipv4 | IPv4 cidr address of this peer in the virtual network
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.forceSSL | Whether to add a separate nginx server block that permanently redirects (301)
all plain HTTP traffic to HTTPS
|
| options/nixos/users.extraUsers.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StartInterval | This optional key causes the job to be started every N seconds
|
| options/nixos/services.printing.cups-pdf.instances.<name>.settings.Spool | spool directory
|
| options/nixos/services.wstunnel.servers.<name>.settings.restrict-to.*.port | The port.
|
| options/nixos/services.xserver.xkb.extraLayouts.<name>.description | A short description of the layout.
|
| options/nixos/services.wstunnel.servers.<name>.settings.restrict-to.*.host | The hostname.
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions | Submodule for installing and configuring extensions.
|
| options/nixos/services.dawarich.sidekiqProcesses.<name>.threads | Number of threads this process should use for executing jobs
|
| options/nixos/services.mastodon.sidekiqProcesses.<name>.threads | Number of threads this process should use for executing jobs
|
| options/nixos/services.syncoid.commands.<name>.localTargetAllow | Permissions granted for the services.syncoid.user user
for local target datasets
|
| options/nixos/services.syncthing.settings.folders.<name>.enable | Whether to share this folder
|
| options/nixos/systemd.shutdownRamfs.contents.<name>.dlopen.features | Features to enable via dlopen ELF notes
|
| options/home-manager/services.syncthing.settings.folders.<name>.enable | Whether to share this folder
|
| options/nixos/services.blockbook-frontend.<name>.messageQueueBinding | Message Queue Binding address:port.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.robotsEntries | Specification of pages to be ignored by web crawlers
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/networking.wg-quick.interfaces.<name>.table | The kernel routing table to add this interface's
associated routes to
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.copy_dscp | Whether to copy the DSCP (Differentiated Services Field Codepoint)
header field to/from the outer IP header in tunnel mode
|
| options/nixos/services.kmonad.keyboards.<name>.enableHardening | Whether to enable systemd hardening.
If KMonad is used to execute shell commands, hardening may make some of them fail.
|
| options/nixos/services.invoiceplane.sites.<name>.settings | Structural InvoicePlane configuration
|
| options/home-manager/programs.thunderbird.profiles.<name>.isDefault | Whether this is a default profile
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.username | Username for the api or remote transport
|
| options/nixos/users.extraUsers.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| options/nixos/services.kanboard.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.agorakit.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.dolibarr.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.librenms.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.fediwall.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.pixelfed.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.mainsail.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/home-manager/services.xsuspender.rules.<name>.autoSuspendOnBattery | Whether to auto-apply rules when switching to battery
power even if the window(s) didn't just lose focus.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.locations | Declarative location config
|
| options/nixos/services.maubot.settings.server.override_resource_path | Override path from where to load UI resources.
|
| options/home-manager/services.restic.backups.<name>.environmentFile | A file containing the credentials to access the repository, in the
format of an EnvironmentFile as described by systemd.exec(5)
|
| options/nixos/systemd.user.services.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.enable | Whether to enable synchronization using vdirsyncer.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.corePlugins.*.enable | Whether to enable the plugin.
|
| options/home-manager/programs.hexchat.channels.<name>.loginMethod | The login method
|
| options/nixos/services.inadyn.settings.provider.<name>.password | Password for this DDNS provider
|
| options/home-manager/launchd.agents.<name>.config.LowPriorityBackgroundIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O when the process is throttled with the Darwin-background classification.
|
| options/nixos/services.anubis.instances.<name>.policy.settings | Additional policy settings merged into the policy file
|
| options/nixos/services.hostapd.radios.<name>.dynamicConfigScripts | All of these scripts will be executed in lexicographical order before hostapd
is started, right after the global segment was generated and may dynamically
append global options the generated configuration file
|
| options/nixos/services.authelia.instances.<name>.settings.log.format | Format the logs are written as.
|
| options/home-manager/accounts.email.accounts.<name>.signature.delimiter | The delimiter used between the document and the signature.
|
| options/home-manager/programs.thunderbird.profiles.<name>.userContent | Custom Thunderbird user content CSS.
|
| options/home-manager/programs.anki.sync.username | Sync account username.
|
| options/nixos/networking.wg-quick.interfaces.<name>.extraOptions | Extra options to append to the interface section
|
| options/nixos/services.invoiceplane.sites.<name>.cron.enable | Enable cron service which periodically runs Invoiceplane tasks
|
| options/nixos/services.nebula.networks.<name>.lighthouses | List of IPs of lighthouse hosts this node should report to and query from
|
| options/nixos/services.jibri.xmppEnvironments.<name>.xmppServerHosts | Hostnames of the XMPP servers to connect to.
|
| options/nixos/services.sanoid.datasets.<name>.use_template | Names of the templates to use for this dataset.
|
| options/home-manager/services.git-sync.repositories.<name>.interval | The interval, specified in seconds, at which the synchronization will
be triggered even without filesystem changes.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.hw_offload | Enable hardware offload for this CHILD_SA, if supported by the IPsec
implementation
|
| options/nixos/services.sourcehut.settings."hg.sr.ht".repos | Path to mercurial repositories on disk
|
| options/nixos/services.gerbil.environmentFile | Path to a file containing sensitive environment variables for Gerbil
|
| options/nixos/services.keycloak.sslCertificate | The path to a PEM formatted certificate to use for TLS/SSL
connections.
|
| options/nixos/services.netbird.server.coturn.passwordFile | The path to a file containing the password of the user used by netbird to connect to the coturn server.
|
| options/nixos/services.pgadmin.initialPasswordFile | Initial password file for the pgAdmin account
|
| options/nixos/services.limesurvey.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/services.mattermost.database.host | Host to use for the database
|
| options/nixos/services.typesense.settings.server.data-dir | Path to the directory where data will be stored on disk.
|
| options/nixos/services.postfix-tlspol.settings.server.cache-file | Path to the cache file.
|
| options/nixos/services.misskey.meilisearch.keyFile | The path to a file containing the Meilisearch API key
|
| options/nixos/services.thanos.store.tracing.config | Tracing configuration
|
| options/nixos/services.thanos.query.tracing.config | Tracing configuration
|
| options/nixos/services.samba.settings.global."passwd program" | Path to a program that can be used to set UNIX user passwords.
|
| options/nixos/services.kubernetes.pki.caCertPathPrefix | Path-prefrix for the CA-certificate to be used for cfssl signing
|
| options/home-manager/services.ssh-agent.pkcs11Whitelist | Specify a list of approved path patterns for PKCS#11 and FIDO authenticator middleware libraries
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.notmuchSetupWarning | Warn if Notmuch is not also enabled for this account
|
| options/nixos/services.invoiceplane.sites.<name>.database.user | Database user.
|
| options/home-manager/programs.firefox.profiles.<name>.bookmarks.settings | Custom bookmarks.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.present | Whether to ensure that this oauth2 resource server is present or absent.
|
| options/nixos/virtualisation.fileSystems.<name>.fsType | Type of the file system
|
| options/nixos/services.firewalld.services.<name>.sourcePorts.*.protocol | |
| options/home-manager/programs.borgmatic.backups.<name>.retention.keepDaily | Number of daily archives to keep
|
| options/nixos/services.keepalived.vrrpInstances.<name>.state | Initial state
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mark_in_sa | Whether to set mark_in on the inbound SA
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| options/nixos/services.jirafeau.nginxConfig.serverName | Name of this virtual host
|
| options/nixos/programs.foot.theme | Theme name
|
| options/darwin/homebrew.taps | List of Homebrew formula repositories to tap
|
| options/darwin/homebrew.brews | List of Homebrew formulae to install
|
| options/nixos/hardware.fw-fanctrl.config.strategies.<name>.speedCurve.*.speed | Percent how fast the fan should run at
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.userAgent | The user agent to report to the server
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.enable | Whether to enable the Thunderbird mail client for this account.
|
| options/nixos/systemd.network.networks.<name>.quickFairQueueingConfigClass | Each attribute in this set specifies an option in the
[QuickFairQueueingClass] section of the unit
|
| options/nixos/services.keepalived.vrrpInstances.<name>.extraConfig | Extra lines to be added verbatim to the vrrp_instance section.
|
| options/nixos/services.autorandr.profiles.<name>.hooks.preswitch | Preswitch hook executed before mode switch.
|
| options/nixos/services.fedimintd.<name>.nginx.config.listen.*.proxyProtocol | Enable PROXY protocol.
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.server | Address or CIDR subnets
StrongSwan default: []
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.subnet | Address or CIDR subnets
StrongSwan default: []
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.p_cscf | Address or CIDR subnets
StrongSwan default: []
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/home-manager/accounts.contact.accounts.<name>.remote.passwordCommand | A command that prints the password to standard output.
|
| options/home-manager/programs.autorandr.profiles.<name>.hooks.preswitch | Preswitch hook executed before mode switch.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.pairwiseCiphers | Set of accepted cipher suites (encryption algorithms) for pairwise keys (unicast packets)
|
| options/nixos/services.ghostunnel.servers.<name>.extraArguments | Extra arguments to pass to ghostunnel server
|
| options/nixos/networking.wg-quick.interfaces.<name>.autostart | Whether to bring up this interface automatically during boot.
|
| options/nixos/services.vdirsyncer.jobs.<name>.additionalGroups | additional groups to add the dynamic user to
|
| options/darwin/networking.wg-quick.interfaces.<name>.autostart | Whether to bring up this interface automatically during boot.
|
| options/nixos/services.h2o.hosts.<name>.tls.recommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|
| options/nixos/services.invoiceplane.sites.<name>.database.host | Database host address.
|
| options/nixos/services.invoiceplane.sites.<name>.database.port | Database host port.
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.limesurvey.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| options/nixos/services.sourcehut.settings."git.sr.ht".repos | Path to git repositories on disk
|
| options/nixos/hardware.nvidia-container-toolkit.mounts.*.hostPath | Host path.
|
| options/nixos/services.discourse.redis.passwordFile | File containing the Redis password
|
| options/nixos/services.grafana.settings.smtp.cert_file | File path to a cert file.
|
| options/nixos/services.etesync-dav.sslCertificateKey | Path to server SSL certificate key
|
| options/nixos/services.thanos.compact.objstore.config-file | Path to YAML file that contains object store configuration
|
| options/nixos/services.thanos.receive.objstore.config-file | Path to YAML file that contains object store configuration
|
| options/nixos/services.tsidp.environmentFile | Path to an environment file loaded for the tsidp service
|
| options/nixos/services.thanos.sidecar.objstore.config-file | Path to YAML file that contains object store configuration
|
| options/nixos/services.xserver.windowManager.qtile.configFile | Path to the qtile configuration file
|
| options/nixos/services.matrix-synapse.extraConfigFiles | Extra config files to include
|
| options/nixos/services.wastebin.secretFile | Path to file containing sensitive environment variables
|
| options/home-manager/programs.sketchybar.includeSystemPath | Whether to include common system PATH in the wrapper
|
| options/home-manager/services.librespot.settings.system-cache | Path to a directory where system files (credentials, volume) will be cached.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.life_packets | Maximum number of packets processed before CHILD_SA gets closed
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.password | Specifies the (clear text) password for the MQTT User.
|
| options/nixos/networking.wg-quick.interfaces.<name>.privateKey | Base64 private key generated by wg genkey
|
| options/nixos/services.borgbackup.jobs.<name>.encryption.mode | Encryption mode to use
|
| options/nixos/services.nagios.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.moodle.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/systemd.user.services.<name>.enableStrictShellChecks | Enable running shellcheck on the generated scripts for this unit
|
| options/nixos/services.simplesamlphp.<name>.settings | Configuration options used by SimpleSAMLphp
|
| options/home-manager/services.xsuspender.rules.<name>.matchWmClassGroupContains | Match windows where wm class group contains string.
|
| options/home-manager/programs.librewolf.profiles.<name>.bookmarks.force | Whether to force override existing custom bookmarks.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/nixos/networking.supplicant.<name>.configFile.writable | Whether the configuration file at configFile.path should be written to by
wpa_supplicant.
|
| options/darwin/networking.wg-quick.interfaces.<name>.peers.*.endpoint | IP and port to connect to this peer at.
|
| options/home-manager/accounts.contact.accounts.<name>.khal.collections | VCARD collections to be searched for contact birthdays.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.scrollbackLines | The number of scrollback lines to keep, null for infinite.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.claimMaps | Adds additional claims (and values) based on which kanidm groups an authenticating party belongs to
|
| options/nixos/services.gitlab-runner.services.<name>.maximumTimeout | What is the maximum timeout (in seconds) that will be set for
job when using this Runner. 0 (default) simply means don't limit
|
| options/nixos/networking.sits.<name>.encapsulation.port | Destination port when using UDP encapsulation.
|
| options/nixos/networking.wireguard.interfaces.<name>.preSetup | Commands called at the start of the interface setup.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.virtualIps.*.brd | The broadcast address on the interface.
|
| options/home-manager/programs.thunderbird.profiles.<name>.settings | Preferences to add to this profile's
user.js.
|
| options/nixos/services.keycloak.themes | Additional theme packages for Keycloak
|
| options/nixos/networking.vswitches | This option allows you to define Open vSwitches that connect
physical networks together
|
| options/nixos/systemd.shutdownRamfs.contents.<name>.dlopen.usePriority | Priority of dlopen ELF notes to include. "required" is
minimal, "recommended" includes "required", and
"suggested" includes "recommended"
|
| options/nixos/services.znapzend.zetup.<name>.timestampFormat | The timestamp format to use for constructing snapshot names
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rekey_time | Time to schedule CHILD_SA rekeying
|
| options/nixos/services.easytier.instances.<name>.configServer | Configure the instance from config server
|
| options/nixos/programs.tsmClient.defaultServername | If multiple server stanzas are declared with
programs.tsmClient.servers,
this option may be used to name a default
server stanza that IBM TSM uses in the absence of
a user-defined dsm.opt file
|
| options/nixos/services.snapper.configs.<name>.TIMELINE_LIMIT_QUARTERLY | Limits for timeline cleanup.
|
| options/nixos/services.monica.hostname | The hostname to serve monica on.
|
| options/darwin/launchd.agents.<name>.serviceConfig.LaunchEvents | Specifies higher-level event types to be used as launch-on-demand event
sources
|
| options/nixos/networking.interfaces.<name>.ipv4.routes.*.type | Type of the route
|
| options/nixos/networking.interfaces.<name>.ipv6.routes.*.type | Type of the route
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.davis.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.autorandr.profiles.<name>.hooks.predetect | Predetect hook executed before autorandr attempts to run xrandr.
|
| options/nixos/services.slskd.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.movim.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/home-manager/programs.autorandr.profiles.<name>.hooks.predetect | Predetect hook executed before autorandr attempts to run xrandr.
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.connection | Specifies parameters used to connect to the server, as a connection string
|
| options/nixos/services.nextcloud.notify_push.dbname | Database name.
|
| options/nixos/services.stash.username | Username for login.
|
| options/nixos/services.limesurvey.virtualHost.sslServerCert | Path to server SSL certificate.
|
| options/nixos/services.fwupd.daemonSettings.EspLocation | The EFI system partition (ESP) path used if UDisks is not available
or if this partition is not mounted at /boot/efi, /boot, or /efi
|
| options/nixos/security.pam.mount.additionalSearchPaths | Additional programs to include in the search path of pam_mount
|
| options/nixos/services.forgejo.settings.server.STATIC_ROOT_PATH | Upper level of template and static files path.
|
| options/nixos/services.kasmweb.sslCertificateKey | The SSL certificate's key to be used for kasmweb
|
| options/nixos/services.mpd.credentials.*.passwordFile | Path to file containing the password.
|
| options/nixos/services.mediawiki.httpd.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| options/nixos/services.maddy.tls.certificates.*.keyPath | Path to the private key used for TLS.
|
| options/nixos/services.xserver.windowManager.mlvwm.configFile | Path to the mlvwm configuration file
|
| options/nixos/services.xserver.windowManager.bspwm.configFile | Path to the bspwm configuration file
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/darwin/security.sandbox.profiles.<name>.allowLocalNetworking | Whether to allow localhost network access inside the sandbox.
|
| options/nixos/services.dawarich.sidekiqProcesses.<name>.jobClasses | If not empty, which job classes should be executed by this process.
If left empty, all job classes will be executed by this process.
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/nixos/services.mosquitto.bridges.<name>.addresses.*.address | Address of the remote MQTT broker.
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.keepWithin | Keep all archives within this time interval.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.timeRange.end | End of time range to show.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.password | The password for this entry
|
| options/home-manager/services.git-sync.repositories.<name>.extraPackages | Extra packages available to git-sync.
|
| options/darwin/launchd.agents.<name>.serviceConfig.ProgramArguments | This key maps to the second argument of execvp(3)
|
| options/nixos/services.gitlab-runner.services.<name>.dockerPrivileged | Give extended privileges to container.
|
| options/darwin/services.gitlab-runner.services.<name>.dockerPrivileged | Give extended privileges to container.
|
| options/home-manager/accounts.email.accounts.<name>.signature.showSignature | Method to communicate the signature.
|
| options/nixos/services.borgbackup.jobs.<name>.compression | Compression method to use
|
| options/nixos/networking.interfaces.<name>.wakeOnLan.policy | The Wake-on-LAN policy
to set for the device
|
| options/nixos/services.fedimintd.<name>.nginx.config.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| options/nixos/services.gitea-actions-runner.instances.<name>.labels | Labels used to map jobs to their runtime environment
|
| options/nixos/services.gitlab-runner.services.<name>.dockerAllowedServices | Whitelist allowed services.
|
| options/darwin/services.gitlab-runner.services.<name>.dockerAllowedServices | Whitelist allowed services.
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.extraConfig | Extra settings.
|
| options/nixos/services.vault-agent.instances.<name>.settings.template | Template section of vault-agent
|
| options/nixos/services.plausible.database.postgres.dbname | Name of the database to use.
|
| options/nixos/services.shorewall6.configs | This option defines the Shorewall configs
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.serverName | Name of this virtual host
|
| options/nixos/security.tpm2.tssUser | Name of the tpm device-owner and service user, set if applyUdevRules is
set.
|
| options/nixos/services.artalk.user | Artalk user name.
|
| options/nixos/services.bcg.device | Device name to configure gateway to use.
|
| options/nixos/services.sogo.vhostName | Name of the nginx vhost
|
| options/nixos/services.zammad.user | Name of the Zammad user.
|
| options/nixos/users.mysql.database | The name of the database containing the users
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/systemd.user.services.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/services.snipe-it.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/users.extraUsers.<name>.openssh.authorizedPrincipals | A list of verbatim principal names that should be added to the user's
authorized principals.
|
| options/nixos/services.borgbackup.jobs.<name>.createCommand | Borg command to use for archive creation
|
| options/nixos/services.sourcehut.settings."hg.sr.ht".srhtext | Path to the srht mercurial extension
(defaults to where the hgsrht code is)
|
| options/nixos/security.pam.u2f.enable | Enables U2F PAM (pam-u2f) module
|
| options/nixos/services.dashy.settings | Settings serialized into user-data/conf.yml before build
|
| options/nixos/programs.hyprland.systemd.setPath.enable | Set environment path of systemd to include the current system's bin directory
|
| options/nixos/services.keycloak.sslCertificateKey | The path to a PEM formatted private key to use for TLS/SSL
connections.
|
| options/nixos/services.openssh.sftpServerExecutable | The sftp server executable
|
| options/nixos/services.maddy.tls.certificates.*.certPath | Path to the certificate used for TLS.
|
| options/nixos/services.mediawiki.httpd.virtualHost.sslServerCert | Path to server SSL certificate.
|
| options/nixos/services.newt.environmentFile | Path to a file containing sensitive environment variables for Newt
|
| options/nixos/services.reposilite.settings.basePath | Custom base path for this Reposilite instance
|
| options/nixos/services.rathole.credentialsFile | Path to a TOML file to be merged with the settings
|
| options/nixos/services.mattermost.database.socketPath | The database (Postgres or MySQL) socket path.
|
| options/nixos/services.lasuite-docs.settings.DJANGO_SECRET_KEY_FILE | The path to the file containing Django's secret key
|
| options/nixos/services.lasuite-meet.settings.DJANGO_SECRET_KEY_FILE | The path to the file containing Django's secret key
|
| options/nixos/services.wstunnel.servers.<name>.tlsCertificate | TLS certificate to use instead of the hardcoded one in case of HTTPS connections
|
| options/nixos/services.jibri.xmppEnvironments.<name>.call.login.domain | The domain part of the JID for the recorder.
|
| options/nixos/services.radicle.ci.broker.settings.adapters.<name>.command | Adapter command to run.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.cssSnippets.*.enable | Whether to enable the snippet.
|
| options/nixos/networking.wireguard.interfaces.<name>.postSetup | Commands called at the end of the interface setup.
|
| options/nixos/services.borgbackup.jobs.<name>.environment | Environment variables passed to the backup script
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.appearance | Settings to write to appearance.json.
|
| options/nixos/networking.interfaces.<name>.ipv4.routes.*.prefixLength | Subnet mask of the network, specified as the number of
bits in the prefix (24).
|
| options/nixos/networking.interfaces.<name>.ipv6.routes.*.prefixLength | Subnet mask of the network, specified as the number of
bits in the prefix (64).
|
| options/nixos/services.pgbackrest.stanzas.<name>.settings | An attribute set of options as described in:
https://pgbackrest.org/configuration.html
All options can be used
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.refresh_interval | The time after which the containers are refreshed
|
| options/nixos/services.anubis.instances.<name>.settings.BIND_NETWORK | The network family that Anubis should bind to
|
| options/nixos/services.gitea-actions-runner.instances.<name>.hostPackages | List of packages, that are available to actions, when the runner is configured
with a host execution label.
|
| options/nixos/networking.vswitches.<name>.controllers | Specify the controller targets
|
| options/nixos/services.jibri.xmppEnvironments.<name>.usageTimeout | The duration that the Jibri session can be
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.globalRedirect | If set, all requests for this host are redirected permanently to
the given URL.
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.keepYearly | Number of yearly archives to keep
|
| options/home-manager/launchd.agents.<name>.config.inetdCompatibility | The presence of this key specifies that the daemon expects to be run as if it were launched from inetd.
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.keepHourly | Number of hourly archives to keep
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.keepWeekly | Number of weekly archives to keep
|
| options/home-manager/programs.gemini-cli.commands.<name>.description | A brief, one-line description of what the command does
|
| options/nixos/services.wordpress.sites.<name>.database.tablePrefix | The $table_prefix is the value placed in the front of your database tables
|
| options/nixos/services.multipath.devices.*.dev_loss_tmo | Specify the number of seconds the SCSI layer will wait after a problem has
been detected on a FC remote port before removing it from the system
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.bonsaid.settings.*.event_name | Name of the event which should trigger this transition when received by bonsaid
|
| options/nixos/systemd.network.networks.<name>.controlledDelayConfig | Each attribute in this set specifies an option in the
[ControlledDelay] section of the unit
|
| options/home-manager/programs.thunderbird.profiles.<name>.search.order | The order the search engines are listed in
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.timeRange | A time range to synchronize. start and end can be any Python
expression that returns a datetime.datetime
object.
|
| options/nixos/networking.wireguard.interfaces.<name>.metric | Set the metric of routes related to this Wireguard interface.
|
| options/home-manager/services.xsuspender.rules.<name>.suspendSubtreePattern | Also suspend descendant processes that match this regex.
|
| options/home-manager/systemd.user.services.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/nixos/services.chatgpt-retrieval-plugin.openaiApiKeyPath | Path to the secret openai api key used for embeddings.
|
| options/nixos/services.hickory-dns.settings.directory | The directory in which hickory-dns should look for .zone files,
whenever zones aren't specified by absolute path.
|
| options/nixos/services.taskserver.extensions | Fully qualified path of the Taskserver extension scripts
|
| options/nixos/services.thanos.rule.web.external-prefix | Static prefix for all HTML links and redirect URLs in the UI query web
interface
|
| options/nixos/services.ntfy-sh.environmentFile | Path to a file containing extra ntfy environment variables in the systemd EnvironmentFile
format
|
| options/nixos/services.thanos.rule.objstore.config | Object store configuration
|
| options/nixos/services.self-deploy.repository | The repository to fetch from
|
| options/nixos/services.reposilite.keyPasswordFile | Path the the file containing the password used to unlock the Java KeyStore file specified in services.reposilite.settings.keyPath
|
| options/nixos/services.mautrix-meta.instances.<name>.registerToSynapse | Whether to add registration file to services.matrix-synapse.settings.app_service_config_files and
make Synapse wait for registration service.
|
| options/nixos/networking.wg-quick.interfaces.<name>.configFile | wg-quick .conf file, describing the interface
|
| options/nixos/services.bepasty.servers.<name>.defaultPermissions | default permissions for all unauthenticated accesses.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.wpaPskFile | Sets the password(s) for WPA-PSK
|
| options/home-manager/launchd.agents.<name>.config.Sockets | This optional key is used to specify launch on demand sockets that can be used to let launchd know when
to run the job
|
| options/nixos/services.borgbackup.jobs.<name>.persistentTimer | Set the Persistent option for the
systemd.timer(5)
which triggers the backup immediately if the last trigger
was missed (e.g. if the system was powered down).
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.replay_window | IPsec replay window to configure for this CHILD_SA
|
| options/nixos/services.kanidm.provision.persons.<name>.mailAddresses | Mail addresses
|
| options/nixos/services.bookstack.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.itemTypes | Kinds of items to show
|
| options/nixos/services.anubis.instances.<name>.policy.useDefaultBotRules | Whether to include Anubis's default bot detection rules via the
(data)/meta/default-config.yaml import
|
| options/nixos/systemd.network.networks.<name>.stochasticFairBlueConfig | Each attribute in this set specifies an option in the
[StochasticFairBlue] section of the unit
|
| options/nixos/services.keepalived.vrrpInstances.<name>.trackScripts | List of script names to invoke for health tracking.
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.netmask | Address or CIDR subnets
StrongSwan default: []
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.enable | Whether to enable synchronization using vdirsyncer.
|
| options/nixos/services.multipath.devices.*.detect_checker | If set to "yes", multipath will try to detect if the device supports
SCSI-3 ALUA
|
| options/nixos/services.spiped.config.<name>.disableReresolution | Disable target address re-resolution.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.urlCommand | A command that prints the URL of the storage.
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.endpoint | Endpoint IP or hostname of the peer, followed by a colon,
and then a port number of the peer.
|
| options/nixos/services.authelia.instances.<name>.settingsFiles | Here you can provide authelia with configuration files or directories
|
| options/nixos/services.znc.user | The name of an existing user account to use to own the ZNC server
process
|
| options/darwin/homebrew.casks | List of Homebrew casks to install
|
| options/nixos/services.evremap.settings.phys | The physical device name to listen on
|
| options/home-manager/programs.astroid.externalEditor | You can use the following variables:
%1
: file name
%2
: server name
%3
: socket ID
See Customizing editor
on the Astroid wiki.
|
| options/nixos/services.gitlab.secrets.secretFile | A file containing the secret used to encrypt variables in
the DB
|
| options/nixos/security.dhparams.stateful | Whether generation of Diffie-Hellman parameters should be stateful or
not
|
| options/nixos/services.dolibarr.nginx.sslCertificate | Path to server SSL certificate.
|
| options/nixos/services.certspotter.sendmailPath | Path to the sendmail binary
|
| options/nixos/services.librenms.nginx.sslCertificate | Path to server SSL certificate.
|
| options/nixos/services.atticd.environmentFile | Path to an EnvironmentFile containing required environment
variables:
- ATTIC_SERVER_TOKEN_RS256_SECRET_BASE64: The base64-encoded RSA PEM PKCS1 of the
RS256 JWT secret
|
| options/nixos/services.grafana.settings.server.cert_key | Path to the certificate key file (if protocol is set to https or h2).
|
| options/nixos/services.agorakit.nginx.sslCertificate | Path to server SSL certificate.
|
| options/nixos/services.desktopManager.gnome.sessionPath | Additional list of packages to be added to the session search path
|
| options/nixos/services.fediwall.nginx.sslCertificate | Path to server SSL certificate.
|
| options/nixos/services.kanboard.nginx.sslCertificate | Path to server SSL certificate.
|
| options/nixos/services.pixelfed.nginx.sslCertificate | Path to server SSL certificate.
|
| options/nixos/services.scion.stateless | Setting this value to false (stateful) can lead to improved caching and
performance
|
| options/nixos/services.mainsail.nginx.sslCertificate | Path to server SSL certificate.
|
| options/nixos/services.taskserver.pki.manual.server.key | Fully qualified path to the server key.
Setting this option will prevent automatic CA creation and handling.
|
| options/nixos/services.mattermost.database.peerAuth | If set, will use peer auth instead of connecting to a Postgres server
|
| options/nixos/services.networking.websockify.sslKey | Path to the SSL key.
|
| options/nixos/services.mastodon.vapidPublicKeyFile | Path to file containing the public key used for Web Push
Voluntary Application Server Identification
|
| options/nixos/services.lasuite-docs.environmentFile | Path to environment file
|
| options/nixos/services.lasuite-meet.environmentFile | Path to environment file
|
| options/nixos/services.nextcloud-spreed-signaling.backends.<name>.urls | List of URLs of the Nextcloud instance
|
| options/nixos/services.prometheus.scrapeConfigs.*.job_name | The job name assigned to scraped metrics by default.
|
| options/nixos/services.agorakit.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.librenms.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.kanboard.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.dolibarr.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.fediwall.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.mainsail.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.pixelfed.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.useVcard4 | Specifies whether vdirsyncer should request vCards in version 4.0
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/nixos/services.firewalld.services.<name>.destination | Destinations for the service.
|
| options/nixos/services.firewalld.services.<name>.description | Description for the service.
|
| options/home-manager/accounts.email.accounts.<name>.alot.contactCompletion | Contact completion configuration as expected per alot
|
| options/nixos/services.keepalived.vrrpInstances.<name>.virtualIps.*.addr | IP address, optionally with a netmask: IPADDR[/MASK]
|
| options/nixos/services.gancio.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.fluidd.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.akkoma.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.monica.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.matomo.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.bitwarden-directory-connector-cli.secrets.bitwarden.client_path_secret | Path to file that contains Client Secret.
|
| options/nixos/services.bookstack.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.wstunnel.servers.<name>.websocketPingInterval | Frequency at which the client will send websocket ping to the server.
|
| options/nixos/services.wstunnel.clients.<name>.websocketPingInterval | Frequency at which the client will send websocket ping to the server.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.userAgent | The user agent to report to the server
|
| options/nixos/services.postfixadmin.database.dbname | Name of the postgresql database
|
| options/nixos/services.frp.instances.<name>.environmentFiles | List of paths files that follows systemd environmentfile structure
|
| options/nixos/services.limesurvey.virtualHost.locations.<name>.alias | Alias directory for requests
|
| options/nixos/services.limesurvey.virtualHost.locations.<name>.index | Adds DirectoryIndex directive
|
| options/home-manager/accounts.calendar.accounts.<name>.remote.passwordCommand | A command that prints the password to standard output.
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.readPermissions | The read permissions to include for this token
|
| options/nixos/services.mastodon.sidekiqProcesses.<name>.jobClasses | If not empty, which job classes should be executed by this process. *Only one process should handle the 'scheduler' class
|
| options/home-manager/accounts.email.accounts.<name>.msmtp.tls.fingerprint | Fingerprint of a trusted TLS certificate
|
| options/nixos/programs.nix-required-mounts.allowedPatterns.<name>.onFeatures | Which requiredSystemFeatures should trigger relaxation of the sandbox
|
| options/darwin/services.github-runners.<name>.ephemeral | If enabled, causes the following behavior:
- Passes the
--ephemeral flag to the runner configuration script
- De-registers and stops the runner with GitHub after it has processed one job
- Restarts the service after its successful exit
- On start, wipes the state directory and configures a new runner
You should only enable this option if tokenFile points to a file which contains a
personal access token (PAT)
|
| options/home-manager/launchd.agents.<name>.config.EnvironmentVariables | This optional key is used to specify additional environment variables to be set before running the
job.
|
| options/nixos/services.samba-wsdd.hostname | Override (NetBIOS) hostname to be used (default hostname).
|
| options/nixos/virtualisation.interfaces.<name>.vlan | VLAN to which the network interface is connected.
|
| options/nixos/services.limesurvey.virtualHost.sslServerChain | Path to server SSL chain file.
|
| options/nixos/services.invidious.database.passwordFile | Path to file containing the database password.
|
| options/nixos/services.desktopManager.budgie.sessionPath | Additional list of packages to be added to the session search path
|
| options/nixos/services.discourse.sslCertificate | The path to the server SSL certificate
|
| options/nixos/services.netbird.useRoutingFeatures | Enables settings required for NetBird's routing features: Network Resources, Network Routes & Exit Nodes
|
| options/nixos/services.openvscode-server.extraPackages | Additional packages to add to the openvscode-server PATH.
|
| options/nixos/services.routinator.settings.log-file | A string value containing the path to a file to which log messages will be appended if the log configuration value is set to file
|
| options/nixos/services.prometheus.exporters.lnd.lndTlsPath | Path to lnd TLS certificate.
|
| options/nixos/services.meilisearch.masterKeyFile | Path to file which contains the master key
|
| options/nixos/services.sharkey.settings.mediaDirectory | Path to the folder where Sharkey stores uploaded media such as images and attachments.
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.documentRoot | The path of Apache's document root directory
|
| options/nixos/services.postsrsd.settings.secrets-file | Path to the file containing the secret keys.
Secrets are passed using LoadCredential= on the systemd unit,
so this options is read-only
|
| options/home-manager/xsession.windowManager.xmonad.config | The configuration file to be used for xmonad
|
| options/home-manager/programs.desktoppr.settings.picture | The path to the desktop picture/wallpaper to set
|
| options/home-manager/services.protonmail-bridge.extraPackages | List of derivations to place in ProtonMail Bridge's service path.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.priority | For electing MASTER, highest priority wins
|
| options/nixos/networking.wireless.networks.<name>.authProtocols | The list of authentication protocols accepted by this network
|
| options/nixos/virtualisation.fileSystems.<name>.label | Label of the device
|
| options/nixos/services.drupal.webserver | Whether to use nginx or caddy for virtual host management
|
| options/nixos/boot.loader.limine.additionalFiles | A set of files to be copied to /boot
|
| options/nixos/boot.loader.refind.additionalFiles | A set of files to be copied to /boot
|
| options/nixos/services.jibri.xmppEnvironments.<name>.stripFromRoomDomain | The prefix to strip from the room's JID domain to derive the call URL.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LaunchEvents | Specifies higher-level event types to be used as launch-on-demand event
sources
|
| options/nixos/services.mediawiki.httpd.virtualHost.locations.<name>.index | Adds DirectoryIndex directive
|
| options/nixos/services.mediawiki.httpd.virtualHost.locations.<name>.alias | Alias directory for requests
|
| options/nixos/services.zeronsd.servedNetworks.<name>.settings.wildcard | Whether to serve a wildcard record for ZeroTier Nodes.
|
| options/nixos/networking.interfaces.<name>.ipv4.routes | List of extra IPv4 static routes that will be assigned to the interface.
If the route type is the default unicast, then the scope
is set differently depending on the value of networking.useNetworkd:
the script-based backend sets it to link, while networkd sets
it to global.
If you want consistency between the two implementations,
set the scope of the route manually with
networking.interfaces.eth0.ipv4.routes = [{ options.scope = "global"; }]
for example.
|
| options/nixos/systemd.network.networks.<name>.hierarchyTokenBucketConfig | Each attribute in this set specifies an option in the
[HierarchyTokenBucket] section of the unit
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.virtualIps.*.scope | The scope of the area where this address is valid.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.timeRange.start | Start of time range to show.
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.enable | Whether to enable this angrr policy.
|
| options/home-manager/programs.vscode.profiles.<name>.enableExtensionUpdateCheck | Whether to enable update notifications for extensions
|
| options/nixos/services.zabbixWeb.hostname | Hostname for either nginx or httpd.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.ProgramArguments | This key maps to the second argument of execvp(3)
|
| options/nixos/services.nebula.networks.<name>.lighthouse.dns.host | IP address on which nebula lighthouse should serve DNS.
'localhost' is a good default to ensure the service does not listen on public interfaces;
use a Nebula address like 10.0.0.5 to make DNS resolution available to nebula hosts only.
|
| options/nixos/boot.binfmt.registrations.<name>.magicOrExtension | The magic number or extension to match on.
|
| options/home-manager/accounts.contact.accounts.<name>.thunderbird.token | A token is generated when adding an address book manually to Thunderbird, this can be entered here.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LaunchEvents | Specifies higher-level event types to be used as launch-on-demand event
sources
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.enable | Whether to enable this radicle-native-ci instance.
|
| options/nixos/specialisation.<name>.inheritParentConfig | Include the entire system's configuration
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.writePermissions | The read permissions to include for this token
|
| options/nixos/services.karakeep.environmentFile | An optional path to an environment file that will be used in the web and workers
services
|
| options/nixos/services.beszel.agent.environmentFile | File path containing environment variables for configuring the beszel-agent service in the format of an EnvironmentFile
|
| options/nixos/services.homer.settings | Settings serialized into config.yml before build
|
| options/nixos/security.pam.yubico.challengeResponsePath | If not null, set the path used by yubico pam module where the challenge expected response is stored
|
| options/nixos/services.thanos.query.web.external-prefix | Static prefix for all HTML links and redirect URLs in the UI query web
interface
|
| options/nixos/services.networking.websockify.sslCert | Path to the SSL certificate.
|
| options/nixos/services.mediawiki.httpd.virtualHost.sslServerChain | Path to server SSL chain file.
|
| options/nixos/services.taskserver.pki.manual.server.crl | Fully qualified path to the server certificate revocation list.
Setting this option will prevent automatic CA creation and handling.
|
| options/nixos/services.mastodon.vapidPrivateKeyFile | Path to file containing the private key used for Web Push
Voluntary Application Server Identification
|
| options/nixos/services.neo4j.directories.data | Path of the data directory
|
| options/nixos/services.thanos.store.objstore.config | Object store configuration
|
| options/nixos/services.taskserver.pki.manual.server.cert | Fully qualified path to the server certificate.
Setting this option will prevent automatic CA creation and handling.
|
| options/nixos/services.plausible.server.secretKeybaseFile | Path to the secret used by the phoenix-framework
|
| options/nixos/services.opensnitch.settings.Rules.Path | Path to the directory where firewall rules can be found and will
get stored by the NixOS module.
|
| options/nixos/services.thanos.query-frontend.tracing.config-file | Path to YAML file that contains tracing configuration
|
| options/nixos/services.kanidm.provision.adminPasswordFile | Path to a file containing the admin password for kanidm
|
| options/nixos/boot.binfmt.registrations.<name>.preserveArgvZero | Whether to pass the original argv[0] to the interpreter
|
| options/nixos/virtualisation.fileSystems.<name>.mountPoint | Location where the file system will be mounted
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/nixos/services.znc.confOptions.networks.<name>.hasBitlbeeControlChannel | Whether to add the special Bitlbee operations channel.
|
| options/home-manager/programs.librewolf.profiles.<name>.search.privateDefault | The default search engine used in the Private Browsing.
|
| options/home-manager/programs.floorp.profiles.<name>.search.engines | Attribute set of search engine configurations
|
| options/nixos/services.firefox-syncserver.singleNode.hostname | Host name to use for this service.
|
| options/nixos/programs.zsh.ohMyZsh.theme | Name of the theme to be used by oh-my-zsh.
|
| options/nixos/services.sftpgo.user | User account name under which SFTPGo runs.
|
| options/nixos/services.r53-ddns.domain | The name of your domain in Route53
|
| options/home-manager/programs.zsh.oh-my-zsh.theme | Name of the theme to be used by oh-my-zsh.
|
| options/nixos/networking.supplicant | Interfaces for which to start wpa_supplicant
|
| options/nixos/services.autorandr.profiles.<name>.hooks.postswitch | Postswitch hook executed after mode switch.
|
| options/home-manager/programs.librewolf.profiles.<name>.bookmarks.configFile | Configuration file to define custom bookmarks.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.timeRange.end | End of time range to show.
|
| options/home-manager/programs.autorandr.profiles.<name>.hooks.postswitch | Postswitch hook executed after mode switch.
|
| options/nixos/services.tarsnap.archives.<name>.checkpointBytes | Create a checkpoint every checkpointBytes
of uploaded data (optionally specified using an SI prefix).
1GB is the minimum value
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.ProgramArguments | This key maps to the second argument of execvp(3)
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.close_action | Action to perform after a CHILD_SA gets closed by the peer.
- The default of
none does not take any action,
trap installs a trap policy for the CHILD_SA.
start tries to re-create the CHILD_SA.
close_action does not provide any guarantee that the
CHILD_SA is kept alive
|
| options/nixos/services.authelia.instances.<name>.secrets.manual | Configuring authelia's secret files via the secrets attribute set
is intended to be convenient and help catch cases where values are required
to run at all
|
| options/nixos/services.davis.hostname | Domain of the host to serve davis under
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.mode | Selects the authentication mode for this AP.
- "none": Don't configure any authentication
|
| options/nixos/services.fedimintd.<name>.nginx.config.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rekey_bytes | Number of bytes processed before initiating CHILD_SA rekeying
|
| options/nixos/services.syncthing.settings.folders.<name>.devices | The devices this folder should be shared with
|
| options/home-manager/services.syncthing.settings.folders.<name>.devices | The devices this folder should be shared with
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.imageFile | Application image to display in the WebUI
|
| options/nixos/virtualisation.allInterfaces.<name>.vlan | VLAN to which the network interface is connected.
|
| options/nixos/services.namecoind.rpc.key | Key file for securing RPC connections.
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.keepMonthly | Number of monthly archives to keep
|
| options/nixos/services.system76-scheduler.assignments.<name>.nice | Niceness.
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.filters.*.name | Name of the filter
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.period | Retention period for the GC roots matched by this policy.
|
| options/nixos/services.dovecot2.mailboxes.<name>.autoexpunge | To automatically remove all email from the mailbox which is older than the
specified time.
|
| options/home-manager/accounts.contact.accounts.<name>.thunderbird.enable | Whether to enable the Thunderbird mail client for this account.
|
| options/nixos/services.chatgpt-retrieval-plugin.bearerTokenPath | Path to the secret bearer token used for the http api authentication.
|
| options/nixos/services.sourcehut.settings."todo.sr.ht::mail".sock | Path for the lmtp daemon's unix socket
|
| options/nixos/services.librenms.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.agorakit.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.kanboard.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.dependency-track.ldap.bindPasswordFile | The path to a file containing the LDAP bind password.
|
| options/nixos/services.fediwall.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/environment.profileRelativeEnvVars | Attribute set of environment variable
|
| options/nixos/services.dolibarr.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.mainsail.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.radicle.httpd.nginx.sslCertificate | Path to server SSL certificate.
|
| options/nixos/services.pixelfed.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.n8n.environment.N8N_USER_FOLDER | Provide the path where n8n will create the .n8n folder
|
| options/nixos/services.vsftpd.userDbPath | Only applies if enableVirtualUsers is true
|
| options/home-manager/services.xidlehook.timers.*.canceller | Command executed when the user becomes active again
|
| options/darwin/launchd.agents.<name>.serviceConfig.KeepAlive | This optional key is used to control whether your job is to be kept continuously running or to let
demand and conditions control the invocation
|
| options/nixos/systemd.network.networks.<name>.trivialLinkEqualizerConfig | Each attribute in this set specifies an option in the
[TrivialLinkEqualizer] section of the unit
|
| options/nixos/services.klipper.firmwares.<name>.enableKlipperFlash | Whether to enable flashings scripts for firmware
|
| options/home-manager/accounts.calendar.accounts.<name>.thunderbird.color | Display color of the calendar in hex
|
| options/nixos/hardware.nvidia-container-toolkit.device-name-strategy | Specify the strategy for generating device names,
passed to nvidia-ctk cdi generate
|
| options/nixos/services.jitsi-videobridge.xmppConfigs.<name>.passwordFile | File containing the password for the user.
|
| options/nixos/networking.firewall.interfaces.<name>.allowedUDPPorts | List of open UDP ports.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.interface | Interface for inside_network, bound by vrrp.
|
| options/nixos/services.archisteamfarm.bots.<name>.enabled | Whether to enable the bot on startup.
|
| options/home-manager/accounts.calendar.accounts.<name>.thunderbird.readOnly | Mark calendar as read only
|
| options/nixos/services.angrr.settings.profile-policies.<name>.keep-booted-system | Whether to keep the last booted system generation
|
| options/nixos/systemd.services.<name>.confinement.fullUnit | Whether to include the full closure of the systemd unit file into the
chroot, instead of just the dependencies for the executables.
While it may be tempting to just enable this option to
make things work quickly, please be aware that this might add paths
to the closure of the chroot that you didn't anticipate
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.endpoint | Endpoint IP or hostname of the peer, followed by a colon,
and then a port number of the peer
|
| options/nixos/services.hostapd.radios.<name>.countryCode | Country code (ISO/IEC 3166-1)
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.vmalert.instances.<name>.settings."notifier.url" | Prometheus Alertmanager URL
|
| options/home-manager/accounts.calendar.accounts.<name>.primaryCollection | The primary collection of the account
|
| options/home-manager/programs.gnome-terminal.profile.<name>.deleteBinding | Which string the terminal should send to an application when the user
presses the Delete key.
auto
: Send the @7 control sequence.
ascii-backspace
: Send an ASCII backspace character (0x08).
ascii-delete
: Send an ASCII delete character (0x7F).
delete-sequence
: Send the @7 control sequence.
tty
: Send terminal's "erase" setting.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.set_mark_in | Netfilter mark applied to packets after the inbound IPsec SA processed
them
|
| options/nixos/services.tor.relay.onionServices.<name>.authorizeClient.authType | Either "basic" for a general-purpose authorization protocol
or "stealth" for a less scalable protocol
that also hides service activity from unauthorized clients.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.corePlugins.*.settings | Plugin settings to include.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.timeRange | A time range to synchronize. start and end can be any Python
expression that returns a datetime.datetime
object.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.cache_dir | The cache directory in which to store mail files while they are being
downloaded
|
| options/nixos/services.davis.nginx.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| options/nixos/services.discourse.sslCertificateKey | The path to the server SSL certificate key
|
| options/nixos/hardware.graphics.extraPackages | Additional packages to add to the default graphics driver lookup path
|
| options/nixos/services.pufferpanel.extraPackages | Packages to add to the PATH environment variable
|
| options/nixos/services.postfix-tlspol.settings.server.address | Path or address/port where postfix-tlspol binds its socket to.
|
| options/nixos/services.thanos.compact.tracing.config | Tracing configuration
|
| options/nixos/services.mediawiki.extensions | Attribute set of paths whose content is copied to the extensions
subdirectory of the MediaWiki installation and enabled in configuration
|
| options/nixos/services.slskd.nginx.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| options/nixos/services.pretalx.settings.filesystem.data | Base path for all other storage paths.
|
| options/nixos/services.thanos.sidecar.tracing.config | Tracing configuration
|
| options/nixos/services.movim.nginx.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| options/nixos/services.thanos.receive.tracing.config | Tracing configuration
|
| options/nixos/virtualisation.diskImage | Path to the disk image containing the root filesystem
|
| options/nixos/services.evremap.settings.device_name | The name of the device that should be remapped
|
| options/nixos/services.postfix.masterConfig.<name>.wakeupUnusedComponent | If set to false the component will only be woken
up if it is used
|
| options/nixos/services.keepalived.vrrpInstances.<name>.unicastSrcIp | Default IP for binding vrrpd is the primary IP on interface
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.printing.cups-pdf.instances.<name>.settings.GhostScript | location of GhostScript binary
|
| options/nixos/programs.schroot.profiles.<name>.nssdatabases | System databases (as described in /etc/nsswitch.conf on GNU/Linux systems) to copy into the chroot from the host.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.system76-scheduler.assignments.<name>.prio | CPU scheduler priority.
|
| options/nixos/services.zeronsd.servedNetworks.<name>.settings.log_level | Log Level.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.foregroundColor | The foreground color.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.backgroundColor | The background color.
|
| options/home-manager/programs.hexchat.channels.<name>.options.autoconnect | Autoconnect to network.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.influxdb2.provision.users.<name>.passwordFile | Password for the user
|
| options/nixos/virtualisation.fileSystems.<name>.autoFormat | If the device does not currently contain a filesystem (as
determined by blkid), then automatically
format it with the filesystem type specified in
fsType
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags.phishing | Tag for notmuch to use for the IANA $Phishing keyword
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.filter | External filter program to further filter GC roots matched by this policy.
|
| options/nixos/services.tailscale.serve.services.<name>.advertised | Whether the service should accept new connections
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.force | Whether to override all previous firefox settings
|
| options/home-manager/programs.thunderbird.profiles.<name>.search.default | The default search engine used in the address bar and search
bar.
|
| options/nixos/networking.openconnect.interfaces.<name>.user | Username to authenticate with.
|
| options/nixos/services.bind.enable | Whether to enable BIND domain name server.
|
| options/nixos/services.artalk.group | Artalk group name.
|
| options/nixos/services.zammad.group | Name of the Zammad group.
|
| options/nixos/services.factorio.loadLatestSave | Load the latest savegame on startup
|
| options/nixos/services.consul-template.instances.<name>.settings | Free-form settings written directly to the config.json file
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.itemTypes | Kinds of items to show
|
| options/nixos/services.limesurvey.virtualHost.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/nixos/services.jibri.xmppEnvironments.<name>.control.muc.domain | The domain part of the MUC to connect to for control.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.token.<name>.slot | Optional slot number to access the token.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.metadata | Metadata keys that should be synchronized when vdirsyncer
metasync is executed.
|
| options/nixos/networking.firewall.interfaces.<name>.allowedTCPPorts | List of TCP ports on which incoming connections are
accepted.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ppk.<name>.id | PPK identity the PPK belongs to
|
| options/nixos/networking.supplicant.<name>.userControlled.group | Members of this group can control wpa_supplicant.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.urlCommand | A command that prints the URL of the storage.
|
| options/nixos/services.bitmagnet.settings.postgres.host | Address, hostname or Unix socket path of the database server
|
| options/nixos/security.tpm2.tctiEnvironment.deviceConf | Configuration part of the device TCTI, e.g. the path to the TPM device
|
| options/nixos/services.anuko-time-tracker.nginx.sslCertificate | Path to server SSL certificate.
|
| options/nixos/services.apache-kafka.configFiles.log4jProperties | Kafka log4j property configuration file path
|
| options/nixos/services.prometheus.exporters.mqtt.mqttTopic | Topic path to subscribe to.
|
| options/nixos/services.sabnzbd.settings.misc.https_key | Path to the TLS key for the web UI
|
| options/nixos/services.limesurvey.httpd.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| options/nixos/services.step-ca.settings | Settings that go into ca.json
|
| options/nixos/services.snipe-it.nginx.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| options/nixos/services.botamusique.settings.bot.username | Name the bot should appear with.
|
| options/nixos/networking.vswitches.<name>.supportedOpenFlowVersions | Supported versions to enable on this switch.
|
| options/nixos/services.firewalld.services.<name>.destination.ipv4 | IPv4 destination.
|
| options/nixos/services.firewalld.services.<name>.destination.ipv6 | IPv6 destination.
|
| options/nixos/services.system76-scheduler.assignments.<name>.ioPrio | IO scheduler priority.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.useVcard4 | Specifies whether vdirsyncer should request vCards in version 4.0
|
| options/nixos/networking.interfaces.<name>.proxyARP | Turn on proxy_arp for this device
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.armagetronad.servers.<name>.openFirewall | Set to true to open the configured UDP port for Armagetron Advanced.
|
| options/nixos/services.kmonad.keyboards.<name>.defcfg.fallthrough | Whether to enable re-emitting unhandled key events.
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.package | The radicle-native-ci package to use.
|
| options/nixos/services.mediawiki.httpd.virtualHost.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/nixos/services.pantalaimon-headless.instances.<name>.ssl | Whether or not SSL verification should be enabled for outgoing
connections to the homeserver.
|
| options/nixos/services.prometheus.exporters.mail.configuration.servers.*.name | Value for label 'configname' which will be added to all metrics.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.per_cpu_sas | Enable per-CPU CHILD_SAs
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.eap.<name>.id | Identity the EAP/XAuth secret belongs to
|
| options/home-manager/services.xsuspender.rules.<name>.downclockOnBattery | Limit CPU consumption for this factor when on battery power
|
| options/nixos/systemd.network.networks.<name>.dhcpPrefixDelegationConfig | Each attribute in this set specifies an option in the
[DHCPPrefixDelegation] section of the unit
|
| options/nixos/networking.interfaces.<name>.ipv4.routes.*.options | Other route options
|
| options/nixos/networking.interfaces.<name>.ipv6.routes.*.options | Other route options
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.communityPlugins | Community plugins to install and activate.
|
| options/home-manager/programs.thunderbird.profiles.<name>.search.force | Whether to force replace the existing search
configuration
|
| options/home-manager/launchd.agents.<name>.config.EnableTransactions | This flag instructs launchd that the job promises to use vproc_transaction_begin(3) and
vproc_transaction_end(3) to track outstanding transactions that need to be reconciled before the
process can safely terminate
|
| options/nixos/services.simplesamlphp.<name>.configureNginx | Configure nginx as a reverse proxy for SimpleSAMLphp.
|
| options/nixos/services.authelia.instances.<name>.settings.server.address | The address to listen on.
|
| options/nixos/services.gitlab.secrets.activeRecordSaltFile | A file containing the salt for active record encryption in the DB
|
| options/nixos/services.grafana.settings.server.cert_file | Path to the certificate file (if protocol is set to https or h2).
|
| options/nixos/services.pretalx.settings.filesystem.logs | Path to the log directory, that pretalx logs message to.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.root | The path of the web root directory.
|
| options/nixos/services.limesurvey.httpd.virtualHost.sslServerCert | Path to server SSL certificate.
|
| options/nixos/services.radicle.httpd.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/virtualisation.bootLoaderDevice | The path (inside th VM) to the device to boot from when legacy booting.
|
| options/nixos/services.xserver.windowManager.bspwm.sxhkd.configFile | Path to the sxhkd configuration file
|
| options/nixos/services.k3s.autoDeployCharts.<name>.extraFieldDefinitions | Extra HelmChart field definitions that are merged with the rest of the HelmChart
custom resource
|
| options/home-manager/programs.librewolf.profiles.<name>.bookmarks.settings | Custom bookmarks.
|
| options/nixos/services.bookstack.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.settings | Attribute set of options for each extension
|
| options/nixos/services.namecoind.rpc.port | Port the RPC server will bind to.
|
| options/nixos/services.borgbackup.repos.<name>.authorizedKeys | Public SSH keys that are given full write access to this repository
|
| options/nixos/services.hostapd.radios.<name>.wifi5.capabilities | VHT (Very High Throughput) capabilities given as a list of flags
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ike.<name>.id | IKE identity the IKE preshared secret belongs to
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.rsa.<name>.secret | Value of decryption passphrase for RSA key.
|
| options/nixos/virtualisation.fileSystems.<name>.autoResize | If set, the filesystem is grown to its maximum size before
being mounted. (This is typically the size of the containing
partition.) This is currently only supported for ext2/3/4
filesystems that are mounted during early boot.
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.publicKey | The base64 public key of the peer.
|
| options/nixos/services.sabnzbd.settings.servers.<name>.connections | Number of parallel connections permitted by
the server.
|
| options/nixos/services.mpdscribble.endpoints.<name>.passwordFile | File containing the password, either as MD5SUM or cleartext.
|
| options/home-manager/services.mpdscribble.endpoints.<name>.passwordFile | File containing the password, either as MD5SUM or cleartext.
|
| options/home-manager/programs.thunderbird.profiles.<name>.withExternalGnupg | Allow using external GPG keys with GPGME.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.timeRange.start | Start of time range to show.
|
| options/home-manager/programs.firefox.profiles.<name>.search.engines | Attribute set of search engine configurations
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ntlm.<name>.id | Identity the NTLM secret belongs to
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.index | Adds index directive.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.bacula-sd.director.<name>.password | Specifies the password that must be supplied for the default Bacula
Console to be authorized
|
| options/nixos/services.bacula-fd.director.<name>.password | Specifies the password that must be supplied for the default Bacula
Console to be authorized
|
| options/home-manager/programs.borgmatic.backups.<name>.consistency.checks | Consistency checks to run
|
| options/nixos/services.rke2.autoDeployCharts.<name>.extraFieldDefinitions | Extra HelmChart field definitions that are merged with the rest of the HelmChart
custom resource
|
| options/nixos/services.tt-rss.pool | Name of existing phpfpm pool that is used to run web-application
|
| options/nixos/services.sftpgo.group | Group name under which SFTPGo runs.
|
| options/darwin/services.github-runners | Multiple GitHub Runners
|
| options/nixos/services.system76-scheduler.assignments.<name>.class | CPU scheduler class.
|
| options/nixos/services.borgbackup.jobs.<name>.encryption.passCommand | A command which prints the passphrase to stdout
|
| options/nixos/services.angrr.settings.profile-policies.<name>.keep-current-system | Whether to keep the current system generation
|
| options/nixos/services.sourcehut.settings."pages.sr.ht".gemini-certs | An absolute file path (which should be outside the Nix-store)
to Gemini certificates.
|
| options/nixos/nixpkgs.flake.setFlakeRegistry | Whether to pin nixpkgs in the system-wide flake registry (/etc/nix/registry.json) to the
store path of the sources of nixpkgs used to build the NixOS system
|
| options/nixos/services.bookstack.nginx.sslCertificate | Path to server SSL certificate.
|
| options/nixos/services.nextcloud.config.adminpassFile | The full path to a file that contains the admin's password
|
| options/nixos/services.slskd.environmentFile | Path to the environment file sourced on startup
|
| options/nixos/services.unbound.localControlSocketPath | When not set to null this option defines the path
at which the unbound remote control socket should be created at
|
| options/nixos/services.prometheus.exporters.sql.configFile | Path to configuration file.
|
| options/nixos/services.openssh.authorizedKeysCommand | Specifies a program to be used to look up the user's public
keys
|
| options/nixos/services.zfs.autoReplication.identityFilePath | Path to SSH key used to login to host.
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/nixos/networking.ipips.<name>.encapsulation.limit | For an IPv6-based tunnel, the maximum number of nested
encapsulation to allow. 0 means no nesting, "none" unlimited.
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.extraArgs | A list of extra arguments to pass to the pg_receivewal command.
|
| options/nixos/services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.filters.*.name | See this list
for the available filters.
|
| options/nixos/services.tor.relay.onionServices.<name>.authorizedClients | Authorized clients for a v3 onion service,
as a list of public key, in the format:
descriptor:x25519:<base32-public-key>
See torrc manual.
|
| options/darwin/launchd.agents.<name>.serviceConfig.ThrottleInterval | This key lets one override the default throttling policy imposed on jobs by launchd
|
| options/nixos/services.ytdl-sub.instances.<name>.subscriptions | Subscriptions for ytdl-sub
|
| options/nixos/services.wstunnel.clients.<name>.tlsVerifyCertificate | Whether to verify the TLS certificate of the server
|
| options/nixos/systemd.network.networks.<name>.hierarchyTokenBucketClassConfig | Each attribute in this set specifies an option in the
[HierarchyTokenBucketClass] section of the unit
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.printing.cups-pdf.instances.<name>.settings | Settings for a cups-pdf instance, see the descriptions in the template config file in the cups-pdf package
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.communityPlugins.*.pkg | The plugin package.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags.lowercase | If true, translate all mailboxes to lowercase names when mapping to notmuch
tags.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.KeepAlive | This optional key is used to control whether your job is to be kept continuously running or to let
demand and conditions control the invocation
|
| options/home-manager/programs.thunderbird.profiles.<name>.feedAccounts | Attribute set of feed accounts
|
| options/nixos/services.system76-scheduler.assignments.<name>.ioClass | IO scheduler class.
|
| options/nixos/services.beesd.filesystems.<name>.hashTableSizeMB | Hash table size in MB; must be a multiple of 16
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.keepSecondly | Number of secondly archives to keep
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.keepMinutely | Number of minutely archives to keep
|
| options/nixos/services.akkoma.nginx.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| options/nixos/services.fluidd.nginx.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| options/nixos/services.anuko-time-tracker.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.firezone.headless-client.tokenFile | A file containing the firezone client token
|
| options/nixos/services.gancio.nginx.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| options/nixos/services.matomo.nginx.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| options/nixos/services.monica.nginx.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| options/nixos/services.monero.environmentFile | Path to an EnvironmentFile for the monero service as defined in systemd.exec(5)
|
| options/nixos/services.openvscode-server.extensionsDir | Set the root path for extensions.
|
| options/nixos/services.gitlab.smtp.username | Username of the SMTP server for GitLab.
|
| options/nixos/services.limesurvey.httpd.virtualHost.locations.<name>.index | Adds DirectoryIndex directive
|
| options/nixos/services.limesurvey.httpd.virtualHost.locations.<name>.alias | Alias directory for requests
|
| options/home-manager/accounts.calendar.accounts.<name>.thunderbird.enable | Whether to enable the Thunderbird mail client for this account.
|
| options/home-manager/launchd.agents.<name>.config.ProcessType | This optional key describes, at a high level, the intended purpose of the job
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.set_mark_out | Netfilter mark applied to packets after the outbound IPsec SA processed
them
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.KeepAlive | This optional key is used to control whether your job is to be kept continuously running or to let
demand and conditions control the invocation
|
| options/nixos/services.armagetronad.servers.<name>.settings | Armagetron Advanced server rules configuration
|
| options/darwin/launchd.agents.<name>.serviceConfig.LowPriorityBackgroundIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O when the process is throttled with the Darwin-background classification.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.github-runners.<name>.ephemeral | If enabled, causes the following behavior:
- Passes the
--ephemeral flag to the runner configuration script
- De-registers and stops the runner with GitHub after it has processed one job
- On stop, systemd wipes the runtime directory (this always happens, even without using the ephemeral option)
- Restarts the service after its successful exit
- On start, wipes the state directory and configures a new runner
You should only enable this option if tokenFile points to a file which contains a
personal access token (PAT)
|
| options/nixos/networking.wireguard.interfaces.<name>.preShutdown | Commands called before shutting down the interface.
|
| options/nixos/services.archisteamfarm.bots.<name>.settings | Additional settings that are documented here.
|
| options/nixos/services.prometheus.exporters.imap-mailstat.accounts.<name>.mailaddress | Your email address (at the moment used as login name)
|
| options/nixos/networking.wireguard.interfaces.<name>.mtu | Set the maximum transmission unit in bytes for the wireguard
interface
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.partialSync | What should happen if synchronization in one direction
is impossible due to one storage being read-only
|
| options/nixos/virtualisation.fileSystems.<name>.stratis.poolUuid | UUID of the stratis pool that the fs is located in
This is only relevant if you are using stratis.
|
| options/nixos/services.multipath.devices.*.hardware_handler | The hardware handler to use for this device type
|
| options/nixos/services.fedimintd.<name>.nginx.config.listen.*.extraParameters | Extra parameters of this listen directive.
|
| options/nixos/networking.wireguard.interfaces.<name>.privateKeyFile | Private key file as generated by wg genkey.
|
| options/nixos/services.jibri.xmppEnvironments.<name>.control.login.domain | The domain part of the JID for this Jibri instance.
|
| options/home-manager/accounts.contact.accounts.<name>.pimsync.extraPairDirectives | Extra directives that should be added under this accounts pair directive
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| options/nixos/services.keepalived.enableScriptSecurity | Don't run scripts configured to be run as root if any part of the path is writable by a non-root user.
|
| options/nixos/services.biboumi.credentialsFile | Path to a configuration file to be merged with the settings
|
| options/nixos/services.audiobookshelf.dataDir | Path to Audiobookshelf config and metadata inside of /var/lib.
|
| options/nixos/services.matrix-continuwuity.admin.enable | Add conduwuit command to PATH for administration
|
| options/nixos/services.prometheus.exporters.json.configFile | Path to configuration file.
|
| options/nixos/services.prometheus.exporters.ipmi.configFile | Path to configuration file.
|
| options/home-manager/programs.bash.enableCompletion | Whether to enable Bash completion for all interactive Bash shells
|
| options/home-manager/accounts.email.accounts.<name>.offlineimap.postSyncHookCommand | Command to run after fetching new mails.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.auth | Authentication to expect from remote
|
| options/nixos/systemd.mounts.*.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/services.cntlm.domain | Proxy account domain/workgroup name.
|
| options/nixos/services.gitlab.host | GitLab host name
|
| options/nixos/services.grav.pool | Name of existing phpfpm pool that is used to run web-application
|
| options/nixos/services.gancio.user | The user (and PostgreSQL database name) used to run the gancio server
|
| options/nixos/services.monero.rpc.user | User name for RPC connections.
|
| options/home-manager/programs.btop.themes | Themes to be written to $XDG_CONFIG_HOME/btop/themes/${name}.theme
|
| options/nixos/networking.interfaces.<name>.ipv4.addresses.*.address | IPv4 address of the interface
|
| options/nixos/networking.interfaces.<name>.ipv6.addresses.*.address | IPv6 address of the interface
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.token.<name>.pin | Optional PIN required to access the key on the token
|
| options/nixos/networking.supplicant.<name>.userControlled.socketDir | Directory of sockets for controlling wpa_supplicant.
|
| options/nixos/services.pantalaimon-headless.instances.<name>.logLevel | Set the log level of the daemon.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.cursor.background | The background color.
|
| options/home-manager/programs.obsidian.defaultSettings.hotkeys.<name>.*.modifiers | The hotkey modifiers.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.cursor.foreground | The foreground color.
|
| options/nixos/networking.sits.<name>.encapsulation.sourcePort | Source port when using UDP encapsulation
|
| options/nixos/services.sabnzbd.settings.servers.<name>.ssl_verify | Level of TLS verification
|
| options/nixos/services.tailscale.serve.services.<name>.endpoints | Map of incoming traffic patterns to local targets
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/home-manager/accounts.email.accounts.<name>.offlineimap.extraConfig.local | Extra configuration options to add to the local account
section.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.virtualRouterId | Arbitrary unique number 1..255
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.profiles | List of Thunderbird profiles for which this account should be
enabled
|
| options/nixos/services.fediwall.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.agorakit.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.librenms.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.kanboard.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.mainsail.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.neo4j.ssl.policies.<name>.allowKeyGeneration | Allows the generation of a private key and associated self-signed
certificate
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.metadata | Metadata keys that should be synchronized when vdirsyncer
metasync is executed.
|
| options/nixos/services.i2pd.proto.http.hostname | Expected hostname for WebUI.
|
| options/nixos/services.printing.cups-pdf.instances.<name>.installPrinter | Whether to enable a CUPS printer queue for this instance
|
| options/home-manager/programs.borgmatic.backups.<name>.location.patterns | Patterns to include/exclude
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.xauth.<name>.id | Identity the EAP/XAuth secret belongs to
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.start_action | Action to perform after loading the configuration.
- The default of
none loads the connection only, which
then can be manually initiated or used as a responder configuration.
- The value
trap installs a trap policy, which triggers
the tunnel as soon as matching traffic has been detected.
- The value
start initiates the connection actively.
- Since version 5.9.6 two modes above can be combined with
trap|start,
to immediately initiate a connection for which trap policies have been installed
|
| options/nixos/services.limesurvey.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.pantalaimon-headless.instances.<name>.dataPath | The directory where pantalaimon should store its state such as the database file.
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.initialPrompt | Optional text to provide as a prompt for the first window
|
| options/nixos/services.homebridge.environmentFile | Path to an environment-file which may contain secrets.
|
| options/nixos/services.bookstack.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.cyrus-imap.imapdSettings.lmtpsocket | Unix socket that lmtpd listens on, used by deliver(8)
|
| options/nixos/services.dawarich.secretKeyBaseFile | Path to file containing the secret key base
|
| options/nixos/services.thanos.downsample.tracing.config-file | Path to YAML file that contains tracing configuration
|
| options/nixos/services.limesurvey.httpd.virtualHost.sslServerChain | Path to server SSL chain file.
|
| options/darwin/nixpkgs.flake.setFlakeRegistry | Whether to pin nixpkgs in the system-wide flake registry (/etc/nix/registry.json) to the
store path of the sources of nixpkgs used to build the nix-darwin system
|
| options/home-manager/wayland.windowManager.hyprland.enable | Whether to enable configuration for Hyprland, a tiling Wayland
compositor that doesn't sacrifice on its looks.
This module configures Hyprland and adds it to your user's PATH,
but does not make certain system-level changes
|
| options/nixos/services.multipath.devices.*.marginal_path_double_failed_time | One of the four parameters of supporting path check based on accounting IO error such as intermittent error
|
| options/nixos/services.wstunnel.clients.<name>.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.wstunnel.servers.<name>.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/networking.wireguard.interfaces.<name>.postShutdown | Commands called after shutting down the interface.
|
| options/nixos/networking.firewall.interfaces.<name>.allowedUDPPortRanges | Range of open UDP ports.
|
| options/nixos/services.filesender.settings.storage_filesystem_path | When using storage type filesystem this is the absolute path to the file system where uploaded files are stored until they expire
|
| options/nixos/boot.loader.systemd-boot.extraEntries | Any additional entries you want added to the systemd-boot menu
|
| options/nixos/services.mail.sendmailSetuidWrapper.program | The name of the wrapper program
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.settings | Attribute set of options for each extension
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.settings | Extra settings to add to this Thunderbird account configuration
|
| options/nixos/services.hostapd.radios.<name>.wifi4.capabilities | HT (High Throughput) capabilities given as a list of flags
|
| options/nixos/services.cloudflared.tunnels.<name>.warp-routing.enabled | Enable warp routing
|
| options/nixos/networking.wireguard.interfaces.<name>.fwMark | Mark all wireguard packets originating from
this interface with the given firewall mark
|
| options/nixos/services.mediawiki.httpd.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ecdsa.<name>.secret | Value of decryption passphrase for ECDSA key.
|
| options/home-manager/services.activitywatch.watchers.<name>.package | The activitywatch package to use
|
| options/home-manager/wayland.windowManager.sway.config.bindswitches.<name>.action | The sway command to execute on state changes
|
| options/nixos/services.anubis.instances.<name>.settings.DIFFICULTY | The difficulty required for clients to solve the challenge
|
| options/nixos/services.matomo.hostname | URL of the host, without https prefix
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.originLanding | When redirecting from the Kanidm Apps Listing page, some linked applications may need to land on a specific page to trigger oauth2/oidc interactions.
|
| options/nixos/services.jibri.xmppEnvironments.<name>.call.login.passwordFile | File containing the password for the user.
|
| options/nixos/services.tor.relay.onionServices.<name>.settings.HiddenServiceSingleHopMode | See torrc manual.
|
| options/nixos/users.users.<name>.hashedPassword | Specifies the hashed password for the user
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.allowedIPs | List of IP (v4 or v6) addresses with CIDR masks from
which this peer is allowed to send incoming traffic and to which
outgoing traffic for this peer is directed
|
| options/nixos/services.lighthouse.beacon.execution.jwtPath | Path for the jwt secret required to connect to the execution layer.
|
| options/nixos/services.apache-kafka.configFiles.serverProperties | Kafka server.properties configuration file path
|
| options/nixos/services.grafana.settings.users.home_page | Path to a custom home page
|
| options/nixos/services.bacula-sd.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/nixos/services.grafana.settings.database.host | Only applicable to MySQL or Postgres
|
| options/nixos/services.bacula-fd.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/nixos/services.calibre-web.options.enableBookConversion | Configure path to the Calibre's ebook-convert in the DB.
|
| options/nixos/services.umurmur.settings.certificate | Path to your SSL certificate
|
| options/nixos/services.snapserver.settings.http.doc_root | Path to serve from the HTTP servers root.
|
| options/nixos/services.prometheus.exporters.bird.birdSocket | Path to BIRD2 (or BIRD1 v4) socket.
|
| options/nixos/services.plausible.database.postgres.socket | Path to the UNIX domain-socket to communicate with postgres.
|
| options/nixos/services.movim.h2o.tls.identity.*.certificate-file | Path to certificate file
|
| options/nixos/services.thanos.sidecar.objstore.config | Object store configuration
|
| options/nixos/services.umurmur.settings.private_key | Path to your SSL key
|
| options/nixos/services.thanos.compact.objstore.config | Object store configuration
|
| options/nixos/services.thanos.receive.objstore.config | Object store configuration
|
| options/nixos/services.jirafeau.nginxConfig.sslCertificate | Path to server SSL certificate.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.tcpKeepAlive | The timeout after which a TCP keepalive packet is sent on a connection between Tunnel and the origin server.
|
| options/nixos/services.printing.cups-pdf.instances.<name>.settings.Anonuser | User for anonymous PDF creation
|
| options/nixos/networking.wg-quick.interfaces.<name>.generatePrivateKeyFile | Automatically generate a private key with
wg genkey, at the privateKeyFile location.
|
| options/nixos/services.easytier.instances.<name>.environmentFiles | Environment files for this instance
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs8.<name>.secret | Value of decryption passphrase for PKCS#8 key.
|
| options/nixos/virtualisation.interfaces.<name>.assignIP | Automatically assign an IP address to the network interface using the same scheme as
virtualisation.vlans.
|
| options/nixos/services.gitlab-runner.services.<name>.requestConcurrency | Limit number of concurrent requests for new jobs from GitLab.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/darwin/services.gitlab-runner.services.<name>.requestConcurrency | Limit number of concurrent requests for new jobs from GitLab.
|
| options/nixos/services.namecoind.enable | Whether to enable namecoind, Namecoin client.
|
| options/nixos/services.fcron.allow | Users allowed to use fcrontab and fcrondyn (one name per
line, all for everyone).
|
| options/nixos/services.tayga.tunDevice | Name of the nat64 tun device.
|
| options/nixos/services.pihole-web.hostName | Domain name for the website.
|
| options/nixos/services.openssh.settings.UseDns | Specifies whether sshd(8) should look up the remote host name, and to check that the resolved host name for
the remote IP address maps back to the very same IP address
|
| options/nixos/security.agnos.settings.accounts.*.certificates.*.key_output_file | Output path for the certificate private key
|
| options/nixos/services.matrix-synapse.settings.media_store_path | Directory where uploaded images and attachments are stored.
|
| options/nixos/networking.firewall.interfaces.<name>.allowedTCPPortRanges | A range of TCP ports on which incoming connections are
accepted.
|
| options/nixos/services.tor.relay.onionServices.<name>.settings.HiddenServiceMaxStreams | See torrc manual.
|
| options/nixos/services.vmalert.instances.<name>.settings."datasource.url" | Datasource compatible with Prometheus HTTP API.
|
| options/home-manager/systemd.user.automounts.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.enableLegacyCrypto | Enable legacy crypto on this client
|
| options/nixos/systemd.network.networks.<name>.deficitRoundRobinSchedulerConfig | Each attribute in this set specifies an option in the
[DeficitRoundRobinScheduler] section of the unit
|
| options/darwin/launchd.daemons.<name>.serviceConfig.ThrottleInterval | This key lets one override the default throttling policy imposed on jobs by launchd
|
| options/nixos/services.hddfancontrol.settings.<drive-bay-name>.extraArgs | Extra commandline arguments for hddfancontrol
|
| options/home-manager/programs.hexchat.channels.<name>.options.connectToSelectedServerOnly | Connect to selected server only.
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.settings | Configuration of radicle-native-ci
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.clientIdCommand | A command that prints the OAuth credentials to standard
output
|
| options/nixos/services.sourcehut.settings."sr.ht".network-key | An absolute file path (which should be outside the Nix-store)
to a secret key to encrypt internal messages with
|
| options/nixos/services.desktopManager.pantheon.sessionPath | Additional list of packages to be added to the session search path
|
| options/nixos/services.librespeed.frontend.servers.*.ulURL | URL path to upload test on this server
|
| options/nixos/services.librespeed.frontend.servers.*.dlURL | URL path to download test on this server
|
| options/nixos/services.bacula-dir.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/nixos/services.opensnitch.settings.Ebpf.ModulesPath | Configure eBPF modules path
|
| options/nixos/services.pretalx.settings.filesystem.static | Path to the directory that contains static files.
|
| options/home-manager/programs.borgmatic.backups.<name>.consistency.extraConfig | Extra settings.
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.woodpecker-agents.agents.<name>.environment | woodpecker-agent config environment variables, for other options read the documentation
|
| options/nixos/services.limesurvey.httpd.virtualHost.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/darwin/launchd.agents.<name>.serviceConfig.inetdCompatibility | The presence of this key specifies that the daemon expects to be run as if it were launched from inetd.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rekey_packets | Number of packets processed before initiating CHILD_SA rekeying
|
| options/nixos/networking.wireguard.interfaces.<name>.table | The kernel routing table to add this interface's
associated routes to
|
| options/nixos/networking.interfaces.<name>.tempAddress | When IPv6 is enabled with SLAAC, this option controls the use of
temporary address (aka privacy extensions) on this
interface
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.ThrottleInterval | This key lets one override the default throttling policy imposed on jobs by launchd
|
| options/nixos/services.hostapd.radios.<name>.wifi6.operatingChannelWidth | Determines the operating channel width for HE.
- "20or40": 20 or 40 MHz operating channel width
- "80": 80 MHz channel width
- "160": 160 MHz channel width
- "80+80": 80+80 MHz channel width
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LowPriorityBackgroundIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O when the process is throttled with the Darwin-background classification.
|
| options/nixos/networking.openconnect.interfaces.<name>.autoStart | Whether this VPN connection should be started automatically.
|
| options/nixos/networking.wireguard.interfaces.<name>.extraOptions | Extra options to append to the interface section
|
| options/nixos/services.dnsdist.dnscrypt.providerName | The name that will be given to this DNSCrypt resolver.
The provider name must start with 2.dnscrypt-cert..
|
| options/nixos/services.tailscale.serve.services | Services to configure for Tailscale Serve
|
| options/nixos/virtualisation.fileSystems.<name>.encrypted.blkDev | Location of the backing encrypted device.
|
| options/home-manager/programs.floorp.profiles.<name>.search.meta.maintainers | List of maintainers of each module
|
| options/home-manager/accounts.email.accounts.<name>.offlineimap.extraConfig.remote | Extra configuration options to add to the remote account
section.
|
| options/nixos/services.sourcehut.settings."lists.sr.ht::worker".sock | Path for the lmtp daemon's unix socket
|
| options/nixos/services.discourse.mail.incoming.apiKeyFile | A file containing the Discourse API key used to add
posts and messages from mail
|
| options/nixos/hardware.graphics.extraPackages32 | Additional packages to add to 32-bit graphics driver lookup path on 64-bit systems
|
| options/nixos/services.anuko-time-tracker.settings.email.smtpPasswordFile | Path to file containing the MTA authentication password.
|
| options/nixos/services.blendfarm.basicSecurityPasswordFile | Path to the password file the client needs to connect to the server
|
| options/nixos/services.filebrowser.settings.database | The path to FileBrowser's Bolt database.
|
| options/nixos/services.discourse.database.passwordFile | File containing the Discourse database user password
|
| options/nixos/services.sabnzbd.settings.misc.https_cert | Path to the TLS certificate for the web UI
|
| options/nixos/services.rkvm.server.settings.certificate | TLS certificate path.
This should be generated with rkvm-certificate-gen.
|
| options/nixos/services.limesurvey.encryptionKeyFile | 32-byte key used to encrypt variables in the database
|
| options/nixos/services.unpoller.unifi.controllers.*.pass | Path of a file containing the password for the unifi service user
|
| options/nixos/services.nextcloud.notify_push.socketPath | Socket path to use for notify_push
|
| options/nixos/services.rkvm.client.settings.certificate | TLS ceritficate path.
This should be generated with rkvm-certificate-gen.
|
| options/nixos/services.rustus.info_storage | Info storages are used to store information about file uploads
|
| options/nixos/services.suwayomi-server.settings.server.localSourcePath | Path to the local source folder.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.sslCertificate | Path to server SSL certificate.
|
| options/nixos/services.kanidm.provision.idmAdminPasswordFile | Path to a file containing the idm admin password for kanidm
|
| options/nixos/virtualisation.allInterfaces.<name>.assignIP | Automatically assign an IP address to the network interface using the same scheme as
virtualisation.vlans.
|
| options/home-manager/accounts.email.accounts.<name>.getmail.destinationCommand | Specify a command delivering the incoming mail to your maildir.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| options/nixos/services.hostapd.radios.<name>.wifi5.operatingChannelWidth | Determines the operating channel width for VHT.
- "20or40": 20 or 40 MHz operating channel width
- "80": 80 MHz channel width
- "160": 160 MHz channel width
- "80+80": 80+80 MHz channel width
|
| options/nixos/services.hostapd.radios.<name>.wifi7.operatingChannelWidth | Determines the operating channel width for EHT.
- "20or40": 20 or 40 MHz operating channel width
- "80": 80 MHz channel width
- "160": 160 MHz channel width
- "80+80": 80+80 MHz channel width
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.mediated_by | The name of the connection to mediate this connection through
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LowPriorityBackgroundIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O when the process is throttled with the Darwin-background classification.
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.noTLSVerify | Disables TLS verification of the certificate presented by your origin
|
| options/nixos/services.anubis.instances.<name>.settings.WEBMASTER_EMAIL | If set, shows a contact email address when rendering error pages
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.token.<name>.handle | Hex-encoded CKA_ID or handle of the private key on the token or TPM,
respectively.
|
| options/nixos/services.anubis.instances.<name>.settings.METRICS_BIND_NETWORK | The network family that the metrics server should bind to
|
| options/nixos/networking.interfaces.<name>.ipv4.addresses.*.prefixLength | Subnet mask of the interface, specified as the number of
bits in the prefix (24).
|
| options/nixos/networking.interfaces.<name>.ipv6.addresses.*.prefixLength | Subnet mask of the interface, specified as the number of
bits in the prefix (64).
|
| options/nixos/services.postfix.hostname | Hostname to use
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.partialSync | What should happen if synchronization in one direction
is impossible due to one storage being read-only
|
| options/nixos/services.outline.smtp.username | Username to authenticate with.
|
| options/nixos/services.consul-template.instances.<name>.settings.template | Template section of consul-template
|
| options/nixos/services.freshrss.webserver | Whether to use nginx or caddy for virtual host management
|
| options/nixos/services.dokuwiki.webserver | Whether to use nginx or caddy for virtual host management
|
| options/nixos/programs.tsmClient.servers | Server definitions ("stanzas")
for the client system-options file
|
| options/nixos/services.code-server.host | The host name or IP address the server should listen to.
|
| options/nixos/services.gitea.dump.file | Filename to be used for the dump
|
| options/nixos/services.avahi.domainName | Domain name for all advertisements.
|
| options/nixos/services.cyrus-imap.user | Cyrus IMAP user name
|
| options/nixos/services.movim.domain | Fully-qualified domain name (FQDN) for the Movim instance.
|
| options/nixos/services.patroni.scope | Cluster name.
|
| options/nixos/services.nats.serverName | Name of the NATS server, must be unique if clustered.
|
| options/nixos/users.mysql.pam.logging.table | The name of the table to which logs are written.
|
| options/nixos/services.paretosecurity.users.<name>.inviteId | A unique ID that links the agent to Pareto Cloud
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.hashedPassword | Specifies the hashed password for the MQTT User
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/home-manager/accounts.email.accounts.<name>.notmuch.neomutt.virtualMailboxes | List of virtual mailboxes using Notmuch queries
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters | List of message filters to add to this Thunderbird account
configuration.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| options/nixos/networking.wireguard.interfaces.<name>.privateKey | Base64 private key generated by wg genkey
|
| options/nixos/services.librespeed.frontend.servers.*.getIpURL | URL path to IP lookup on this server
|
| options/nixos/services.prometheus.exporters.pve.server.keyFile | Path to a SSL private key file for the server
|
| options/nixos/services.onlyoffice.postgresPasswordFile | Path to a file that contains the password OnlyOffice should use to connect to Postgresql
|
| options/nixos/services.mosquitto.listeners.*.authPlugins.*.plugin | Plugin path to load, should be a .so file.
|
| options/nixos/services.pocket-id.environmentFile | Path to an environment file to be loaded
|
| options/nixos/services.pangolin.environmentFile | Path to a file containing sensitive environment variables for Pangolin
|
| options/nixos/services.jirafeau.nginxConfig.sslCertificateKey | Path to server SSL certificate key.
|
| options/home-manager/accounts.calendar.accounts.<name>.pimsync.extraPairDirectives | Extra directives that should be added under this accounts pair directive
|
| options/nixos/services.keepalived.vrrpInstances.<name>.noPreempt | VRRP will normally preempt a lower priority machine when a higher
priority machine comes online. "nopreempt" allows the lower priority
machine to maintain the master role, even when a higher priority machine
comes back online
|
| options/nixos/boot.binfmt.registrations.<name>.recognitionType | Whether to recognize executables by magic number or extension.
|
| options/nixos/services.syncthing.settings.folders.<name>.versioning.type | The type of versioning
|
| options/home-manager/services.syncthing.settings.folders.<name>.versioning.type | The type of versioning
|
| options/home-manager/services.hyprsunset.transitions.<name>.calendar | Deprecated - Use services.hyprsunset.settings instead to manage transitions
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets | This optional key is used to specify launch on demand sockets that can be used to let launchd know when
to run the job
|
| options/nixos/services.taskserver.organisations.<name>.users | A list of user names that belong to the organization.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.ignore_tags | Set labels to ignore when syncing from local tags to
remote labels (after translations).
|
| options/darwin/services.buildkite-agents.<name>.hooks.environment | The environment hook will run before all other commands, and can be used
to set up secrets, data, etc
|
| options/nixos/services.sanoid.datasets.<name>.pruning_script | Script to run after pruning snapshot.
|
| options/darwin/launchd.agents.<name>.serviceConfig.EnvironmentVariables | This optional key is used to specify additional environment variables to be set before running the
job.
|
| options/home-manager/accounts.email.accounts.<name>.smtp.authentication | The authentication mechanism.
|
| options/home-manager/accounts.email.accounts.<name>.imap.authentication | The authentication mechanism.
|
| options/nixos/services.parsedmarc.provision.localMail.recipientName | The DMARC mail recipient name, i.e. the name part of the
email address which receives DMARC reports
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs12.<name>.secret | Value of decryption passphrase for PKCS#12 container.
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/nixos/services.armagetronad.servers.<name>.roundSettings | Armagetron Advanced server per-round configuration
|
| options/nixos/services.postfix.settings.master.<name>.wakeupUnusedComponent | If set to false the component will only be woken
up if it is used
|
| options/nixos/networking.wireguard.interfaces.<name>.allowedIPsAsRoutes | Determines whether to add allowed IPs as routes or not.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.sourcehut.settings.objects.s3-secret-key | An absolute file path (which should be outside the Nix-store)
to the secret key of the S3-compatible object storage service.
|
| options/nixos/programs.gnupg.agent.pinentryPackage | Which pinentry package to use
|
| options/nixos/security.acme.defaults.environmentFile | Path to an EnvironmentFile for the cert's service containing any required and
optional environment variables for your selected dnsProvider
|
| options/nixos/services.prometheus.exporters.ipmi.webConfigFile | Path to configuration file that can enable TLS or authentication.
|
| options/nixos/services.reposilite.database.passwordFile | Path to the file containing the password for the database connection
|
| options/nixos/services.prometheus.exporters.pve.server.certFile | Path to a SSL certificate file for the server
|
| options/nixos/services.ocsinventory-agent.settings.ca | Path to CA certificates file in PEM format, for server
SSL certificate validation.
|
| options/nixos/services.nextcloud.notify_push.dbpassFile | The full path to a file that contains the database password.
|
| options/nixos/services.prometheus.exporters.knot.knotSocketPath | Socket path of knotd(8).
|
| options/nixos/virtualisation.incus.clientPackage | The incus client package to use
|
| options/nixos/services.hercules-ci-agent.settings.secretsJsonPath | Path to a JSON file containing secrets for effects
|
| options/darwin/services.hercules-ci-agent.settings.secretsJsonPath | Path to a JSON file containing secrets for effects
|
| options/nixos/systemd.network.networks.<name>.genericRandomEarlyDetectionConfig | Each attribute in this set specifies an option in the
[GenericRandomEarlyDetection] section of the unit
|
| options/nixos/services.frigate.hostname | Hostname of the nginx vhost to configure
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.resources.*.names | List of resources to host on this listener.
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters.*.type | Type for this filter.
|
| options/home-manager/services.activitywatch.watchers.<name>.extraOptions | Extra arguments to be passed to the watcher executable.
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.settings.log | File where radicle-native-ci should write the run log.
|
| options/nixos/networking.openconnect.interfaces.<name>.gateway | Gateway server to connect to.
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.httpHostHeader | Sets the HTTP Host header on requests sent to the local service.
|
| options/nixos/services.librenms.hostname | The hostname to serve LibreNMS on.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.policies_fwd_out | Whether to install outbound FWD IPsec policies or not
|
| options/nixos/services.suricata.settings.app-layer.protocols.<name>.enabled | The option "enabled" takes 3 values - "yes", "no", "detection-only".
"yes" enables both detection and the parser, "no" disables both, and
"detection-only" enables protocol detection only (parser disabled).
|
| options/nixos/services.syncthing.settings.folders.<name>.versioning | How to keep changed/deleted files with Syncthing
|
| options/home-manager/services.syncthing.settings.folders.<name>.versioning | How to keep changed/deleted files with Syncthing
|
| options/nixos/services.bookstack.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.namecoind.wallet | Wallet file
|
| options/nixos/services.sabnzbd.settings.servers.<name>.expire_date | If Notifications are enabled and an expiry date is
set, warn 5 days before expiry
|
| options/nixos/services.cloudflared.tunnels.<name>.credentialsFile | Credential file
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.communityPlugins.*.enable | Whether to enable the plugin.
|
| options/nixos/virtualisation.credentials.<name>.source | Source file on the host containing the credential data.
|
| options/nixos/services.limesurvey.virtualHost.documentRoot | The path of Apache's document root directory
|
| options/nixos/services.dependency-track.database.passwordFile | The path to a file containing the database password.
|
| options/nixos/services.librespeed.frontend.servers.*.pingURL | URL path to latency/jitter test on this server
|
| options/nixos/services.interception-tools.udevmonConfig | String of udevmon YAML configuration, or path to a udevmon YAML
configuration file.
|
| options/nixos/services.sftpgo.settings.ftpd.bindings.*.address | Network listen address
|
| options/nixos/services.szurubooru.server.settings.data_dir | Path to the static files.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.avahi.hostName | Host name advertised on the LAN
|
| options/nixos/services.nscd.config | Configuration to use for Name Service Cache Daemon
|
| options/nixos/services.murmur.user | The name of an existing user to use to run the service
|
| options/nixos/users.mysql.pam.updateTable | The name of the table used for password alteration
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.eap.<name>.secret | Value of the EAP/XAuth secret
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ike.<name>.secret | Value of the IKE preshared secret
|
| options/darwin/launchd.daemons.<name>.serviceConfig.inetdCompatibility | The presence of this key specifies that the daemon expects to be run as if it were launched from inetd.
|
| options/home-manager/accounts.email.accounts.<name>.offlineimap.extraConfig.account | Extra configuration options to add to the account section.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.invoiceplane.sites.<name>.database.passwordFile | A file containing the password corresponding to
database.user.
|
| options/home-manager/programs.thunderbird.profiles.<name>.search.privateDefault | The default search engine used in the Private Browsing.
|
| options/nixos/services.invoiceplane.sites.<name>.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.tlsTimeout | Timeout for completing a TLS handshake to your origin server, if you have chosen to connect Tunnel to an HTTPS server.
|
| options/home-manager/launchd.agents.<name>.config.inetdCompatibility.Wait | This flag corresponds to the "wait" or "nowait" option of inetd
|
| options/nixos/networking.wireless.networks.<name>.priority | By default, all networks will get same priority group (0)
|
| options/nixos/services.hddfancontrol.settings.<drive-bay-name>.disks | Drive(s) to get temperature from
Can also use command substitution to automatically grab all matching drives; such as all scsi (sas) drives
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.clientIdCommand | A command that prints the OAuth credentials to standard
output
|
| options/nixos/documentation.man.man-db.manualPages | The manual pages to generate caches for if documentation.man.generateCaches
is enabled
|
| options/nixos/services.pretix.settings.memcached.location | The host:port combination or the path to the UNIX socket of a memcached instance
|
| options/nixos/services.limesurvey.encryptionNonceFile | 24-byte used to encrypt variables in the database
|
| options/nixos/services.thanos.query-frontend.tracing.config | Tracing configuration
|
| options/nixos/services.thanos.downsample.objstore.config-file | Path to YAML file that contains object store configuration
|
| options/nixos/services.mediawiki.httpd.virtualHost.documentRoot | The path of Apache's document root directory
|
| options/nixos/services.neo4j.directories.plugins | Path of the database plugin directory
|
| options/nixos/services.lighttpd.collectd.collectionCgi | Path to collection.cgi script from (collectd sources)/contrib/collection.cgi
This option allows to use a customized version
|
| options/nixos/users.extraUsers.<name>.hashedPassword | Specifies the hashed password for the user
|
| options/home-manager/programs.firefox.profiles.<name>.search.meta.maintainers | List of maintainers of each module
|
| options/nixos/networking.openconnect.interfaces.<name>.privateKey | Private key to authenticate with.
|
| options/nixos/services.kanidm.provision.groups.<name>.overwriteMembers | Whether the member list should be overwritten each time (true) or appended
(false)
|
| options/nixos/services.nitter.server.hostname | Hostname of the instance.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.inetdCompatibility | The presence of this key specifies that the daemon expects to be run as if it were launched from inetd.
|
| options/home-manager/accounts.contact.accounts.<name>.thunderbird.profiles | List of Thunderbird profiles for which this account should be
enabled
|
| options/home-manager/launchd.agents.<name>.config.Disabled | This optional key is used as a hint to launchctl(1) that it should not submit this job to launchd when
loading a job or jobs
|
| options/nixos/services.easytier.instances.<name>.settings.listeners | Listener addresses to accept connections from other peers
|
| options/nixos/services.limesurvey.httpd.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.trackInterfaces | List of network interfaces to monitor for health tracking.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/systemd.network.networks.<name>.deficitRoundRobinSchedulerClassConfig | Each attribute in this set specifies an option in the
[DeficitRoundRobinSchedulerClass] section of the unit
|
| options/nixos/services.taskserver.organisations.<name>.groups | A list of group names that belong to the organization.
|
| options/nixos/services.ncps.cache.redis.username | Redis username for authentication (for Redis ACL).
|
| options/home-manager/programs.librewolf.profiles.<name>.search.engines | Attribute set of search engine configurations
|
| options/home-manager/programs.gnome-terminal.profile.<name>.transparencyPercent | Background transparency in percent.
|
| options/nixos/services.namecoind.extraNodes | List of additional peer IP addresses to connect to.
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.settings.state | Directory where per-run directories are stored.
|
| options/nixos/services.xserver.desktopManager.gnome.sessionPath | Additional list of packages to be added to the session search path
|
| options/nixos/services.opensnitch.settings.Server.Address | Unix socket path (unix:///tmp/osui.sock, the "unix:///" part is
mandatory) or TCP socket (192.168.1.100:50051).
|
| options/nixos/services.prometheus.exporters.lnd.lndMacaroonDir | Path to lnd macaroons.
|
| options/nixos/services.openvscode-server.connectionTokenFile | Path to a file that contains the connection token.
|
| options/nixos/services.yggdrasil.settings.PrivateKeyPath | Path to the private key file on the host system
|
| options/home-manager/programs.vscode.haskell.hie.executablePath | The path to the Haskell IDE Engine executable
|
| options/nixos/services.multipath.devices.*.delay_wait_checks | This option is deprecated, and mapped to san_path_err_recovery_time
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.private.<name>.secret | Value of decryption passphrase for private key.
|
| options/nixos/services.limesurvey.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/home-manager/services.hyprsunset.transitions.<name>.requests | Deprecated - Use services.hyprsunset.settings instead to manage transitions
|
| options/nixos/hardware.fw-fanctrl.config.strategies.<name>.fanSpeedUpdateFrequency | How often the fan speed should be updated in seconds
|
| options/home-manager/accounts.email.accounts.<name>.notmuch.neomutt.virtualMailboxes.*.query | Notmuch query
|
| options/nixos/services.samba-wsdd.domain | Set domain name (disables workgroup).
|
| options/nixos/services.monica.mail.fromName | Mail "from" name.
|
| options/nixos/services.tmate-ssh-server.host | External host name
|
| options/nixos/services.vault.address | The name of the ip interface to listen to
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.enableRecommendedPairwiseCiphers | Additionally enable the recommended set of pairwise ciphers
|
| options/nixos/services.gitlab-runner.services.<name>.registrationFlags | Extra command-line flags passed to
gitlab-runner register
|
| options/darwin/services.gitlab-runner.services.<name>.registrationFlags | Extra command-line flags passed to
gitlab-runner register
|
| options/nixos/services.sanoid.datasets.<name>.script_timeout | Time limit for pre/post/pruning script execution time (<=0 for infinite).
|
| options/darwin/launchd.daemons.<name>.serviceConfig.EnvironmentVariables | This optional key is used to specify additional environment variables to be set before running the
job.
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters.*.text | The raw text of the filter
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets | This optional key is used to specify launch on demand sockets that can be used to let launchd know when
to run the job
|
| options/nixos/services.postfixadmin.database.username | Username for the postgresql connection
|
| options/nixos/services.system76-scheduler.assignments.<name>.matchers | Process matchers.
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.mediawiki.httpd.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.woodpecker-agents.agents.<name>.environmentFile | File to load environment variables
from
|
| options/nixos/services.xserver.desktopManager.budgie.sessionPath | Additional list of packages to be added to the session search path
|
| options/nixos/services.librenms.nginx.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| options/nixos/services.bacula-sd.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| options/nixos/services.discourse.mail.outgoing.passwordFile | A file containing the password of the SMTP server account
|
| options/nixos/services.dolibarr.nginx.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| options/nixos/services.kanboard.nginx.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| options/nixos/services.agorakit.nginx.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| options/nixos/services.bacula-fd.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| options/nixos/services.fediwall.nginx.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| options/nixos/services.sftpgo.settings.sftpd.bindings.*.address | Network listen address
|
| options/nixos/services.pixelfed.nginx.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| options/nixos/services.prometheus.exporters.knot.knotLibraryPath | Path to the library of knot-dns.
|
| options/nixos/services.sftpgo.settings.httpd.bindings.*.address | Network listen address
|
| options/nixos/services.prometheus.exporters.postfix.showqPath | Path where Postfix places its showq socket.
|
| options/nixos/services.mainsail.nginx.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| options/nixos/services.warpgate.settings.http.certificate | Path to HTTPS listener certificate.
|
| options/nixos/services.hercules-ci-agent.settings.binaryCachesPath | Path to a JSON file containing binary cache secret keys
|
| options/darwin/services.hercules-ci-agent.settings.binaryCachesPath | Path to a JSON file containing binary cache secret keys
|
| options/home-manager/programs.obsidian.defaultSettings.cssSnippets.*.source | Path of the source file.
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.proxyPort | cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP
|
| options/nixos/_module.args | Additional arguments passed to each module in addition to ones
like lib, config,
and pkgs, modulesPath
|
| options/darwin/_module.args | Additional arguments passed to each module in addition to ones
like lib, config,
and pkgs, modulesPath
|
| options/home-manager/_module.args | Additional arguments passed to each module in addition to ones
like lib, config,
and pkgs, modulesPath
|
| options/nixos/services.multipath.devices.*.product_blacklist | Products with the given vendor matching this string are blacklisted
|
| options/nixos/services.keepalived.vrrpInstances.<name>.unicastPeers | Do not send VRRP adverts over VRRP multicast group
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/networking.sits.<name>.encapsulation.type | Select the encapsulation type:
-
6in4: the IPv6 packets are encapsulated using the
6in4 protocol (formerly known as SIT, RFC 4213);
-
gue: the IPv6 packets are encapsulated in UDP packets
using the Generic UDP Encapsulation (GUE) scheme;
-
foo: the IPv6 packets are encapsulated in UDP packets
using the Foo over UDP (FOU) scheme.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets | This optional key is used to specify launch on demand sockets that can be used to let launchd know when
to run the job
|
| options/nixos/services.netbird.clients.<name>.login.systemdDependencies | Additional systemd dependencies required to succeed before the Setup Key file becomes available.
|
| options/nixos/services.netbird.tunnels.<name>.login.systemdDependencies | Additional systemd dependencies required to succeed before the Setup Key file becomes available.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.EnvironmentVariables | This optional key is used to specify additional environment variables to be set before running the
job.
|
| options/darwin/launchd.agents.<name>.serviceConfig.EnableTransactions | This flag instructs launchd that the job promises to use vproc_transaction_begin(3) and
vproc_transaction_end(3) to track outstanding transactions that need to be reconciled before the
process can safely terminate
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.removeOrphanedClaimMaps | Whether claim maps not specified here but present in kanidm should be removed from kanidm.
|
| options/home-manager/services.muchsync.remotes.<name>.local.checkForModifiedFiles | Check for locally modified files
|
| options/nixos/services.prometheus.exporters.imap-mailstat.accounts.<name>.serveraddress | mailserver name or address
|
| options/nixos/services.multipath.devices.*.fast_io_fail_tmo | Specify the number of seconds the SCSI layer will wait after a problem has been
detected on a FC remote port before failing I/O to devices on that remote port
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.directory | Directory to write the output to.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ppk.<name>.secret | Value of the PPK
|
| options/nixos/networking.openconnect.interfaces.<name>.protocol | Protocol to use.
|
| options/nixos/virtualisation.credentials.<name>.text | Text content of the credential
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.originServerName | Hostname that cloudflared should expect from your origin server certificate.
|
| options/nixos/services.datadog-agent.hostname | The hostname to show in the Datadog dashboard (optional)
|
| options/nixos/services.bacula-dir.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| options/nixos/services.librechat.credentialsFile | Path to a file that contains environment variables
|
| options/nixos/services.displayManager.dms-greeter.configHome | Path to a user's home directory from which to copy DankMaterialShell
configuration files
|
| options/nixos/services.waagent.settings.ResourceDisk.MountPoint | This option specifies the path at which the resource disk is mounted
|
| options/nixos/virtualisation.podman.extraPackages | Extra dependencies for podman to be placed on $PATH in the wrapper.
|
| options/nixos/services.tor.relay.onionServices.<name>.settings.HiddenServiceExportCircuitID | See torrc manual.
|
| options/home-manager/accounts.email.accounts.<name>.notmuch.neomutt.virtualMailboxes.*.type | Reads all matching messages or whole-threads
|
| options/home-manager/programs.hexchat.channels.<name>.options.useGlobalUserInformation | Use global user information.
|
| options/home-manager/launchd.agents.<name>.config.StartCalendarInterval | This optional key causes the job to be started every calendar interval as specified
|
| options/nixos/services.sanoid.templates.<name>.pruning_script | Script to run after pruning snapshot.
|
| options/nixos/services.borgbackup.repos.<name>.authorizedKeysAppendOnly | Public SSH keys that can only be used to append new data (archives) to the repository
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.clientSecretCommand | A command that prints the OAuth credentials to standard
output
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.xauth.<name>.secret | Value of the EAP/XAuth secret
|
| options/nixos/hardware.fw-fanctrl.config.strategies.<name>.movingAverageInterval | Interval (seconds) of the last temperatures to use to calculate the average temperature
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/home-manager/accounts.email.accounts.<name>.notmuch.neomutt.virtualMailboxes.*.limit | Restricts number of messages/threads in the result.
|
| options/nixos/services.kismet.serverName | The name of the server.
|
| options/nixos/services.cyrus-imap.group | Cyrus IMAP group name
|
| options/nixos/services.dovecot2.user | Dovecot user name.
|
| options/home-manager/programs.sapling.userName | Default user name to use.
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.keepAliveTimeout | Timeout after which an idle keepalive connection can be discarded.
|
| options/nixos/services.multipath.devices.*.marginal_path_err_recheck_gap_time | One of the four parameters of supporting path check based on accounting IO error such as intermittent error
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.addrs | Addresses allocated in pool
|
| options/nixos/services.jibri.xmppEnvironments.<name>.control.login.passwordFile | File containing the password for the user.
|
| options/nixos/systemd.network.networks.<name>.fairQueueingControlledDelayConfig | Each attribute in this set specifies an option in the
[FairQueueingControlledDelay] section of the unit
|
| options/nixos/services.healthchecks.settings.SECRET_KEY_FILE | Path to a file containing the secret key.
|
| options/nixos/hardware.nvidia-container-toolkit.mounts.*.containerPath | Container path.
|
| options/nixos/services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".http.ip | Listener IP address or Unix socket path
|
| options/nixos/services.rosenpass.settings.public_key | Path to a file containing the public key of the local Rosenpass peer
|
| options/nixos/services.rosenpass.settings.secret_key | Path to a file containing the secret key of the local Rosenpass peer
|
| options/nixos/services.prometheus.exporters.dnsmasq.leasesPath | Path to the dnsmasq.leases file.
|
| options/nixos/services.opensnitch.settings.Audit.AudispSocketPath | Configure audit socket path
|
| options/nixos/services.wasabibackend.customConfigFile | Defines the path to a custom configuration file that is copied to the user's directory
|
| options/nixos/virtualisation.xen.store.settings.pidFile | Path to the Xen Store Daemon PID file.
|
| options/nixos/virtualisation.docker.extraPackages | Extra packages to add to PATH for the docker daemon process.
|
| options/nixos/services.wastebin.settings.WASTEBIN_DATABASE_PATH | Path to the sqlite3 database file
|
| options/nixos/services.vault.extraSettingsPaths | Configuration files to load besides the immutable one defined by the NixOS module
|
| options/nixos/networking.supplicant.<name>.userControlled.enable | Allow normal users to control wpa_supplicant through wpa_gui or wpa_cli
|
| options/nixos/services.davis.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.davis.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.movim.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.slskd.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.slskd.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.movim.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/networking.ipips.<name>.encapsulation.type | Select the encapsulation type:
-
ipip to create an IPv4 within IPv4 tunnel (RFC 2003).
-
4in6 to create a 4in6 tunnel (RFC 2473);
-
ip6ip6 to create an IPv6 within IPv6 tunnel (RFC 2473);
For encapsulating IPv6 within IPv4 packets, see
the ad-hoc networking.sits option.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.backspaceBinding | Which string the terminal should send to an application when the user
presses the Backspace key.
auto
: Attempt to determine the right value from the terminal's IO settings.
ascii-backspace
: Send an ASCII backspace character (0x08).
ascii-delete
: Send an ASCII delete character (0x7F).
delete-sequence
: Send the @7 control sequence.
tty
: Send terminal's "erase" setting.
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.settings | Attribute set of options for each extension
|
| options/nixos/users.users.<name>.password | Specifies the (clear text) password for the user
|
| options/nixos/services.minidlna.settings.friendly_name | Name that the server presents to clients.
|
| options/nixos/services.pretix.settings.pretix.instance_name | The name of this installation.
|
| options/nixos/services.tor.relay.onionServices.<name>.settings.HiddenServiceAllowUnknownPorts | See torrc manual.
|
| options/nixos/services.wordpress.webserver | Whether to use apache2 or nginx for virtual host management
|
| options/nixos/services.snipe-it.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.session_url | Session URL to connect to
|
| options/nixos/services.gitlab.secrets.activeRecordPrimaryKeyFile | A file containing the secret used to encrypt some rails data
in the DB
|
| options/nixos/services.routinator.settings.repository-dir | The path where the collected RPKI data is stored.
|
| options/nixos/services.radicle.httpd.nginx.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| options/nixos/services.reposilite.settings.keyPath | Path to the .jsk KeyStore or paths to the PKCS#8 certificate and private key, separated by a space (see example)
|
| options/nixos/services.kubernetes.apiserver.kubeletClientCaFile | Path to a cert file for connecting to kubelet.
|
| options/nixos/services.warpgate.settings.mysql.certificate | Path to MySQL listener certificate.
|
| options/nixos/services.matrix-tuwunel.settings.global.server_name | The server_name is the name of this server
|
| options/nixos/services.matrix-conduit.settings.global.server_name | The server_name is the name of this server
|
| options/home-manager/specialisation.<name>.configuration | Arbitrary Home Manager configuration settings.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.useTransformers | Whether to provide the dependencies to allow using transformer models.
|
| options/home-manager/accounts.calendar.accounts.<name>.thunderbird.profiles | List of Thunderbird profiles for which this account should be
enabled
|
| options/nixos/virtualisation.fileSystems.<name>.options | Options used to mount the file system
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters.*.action | Action to perform on matched messages.
|
| options/nixos/services.tor.relay.onionServices.<name>.settings.HiddenServiceDirGroupReadable | See torrc manual.
|
| options/nixos/security.wrappers.<name>.capabilities | A comma-separated list of capability clauses to be given to the
wrapper program
|
| options/nixos/boot.loader.systemd-boot.windows.<name>.efiDeviceHandle | The device handle of the EFI System Partition (ESP) where the Windows bootloader is
located
|
| options/nixos/services.anubis.instances.<name>.settings.OG_PASSTHROUGH | Whether to enable Open Graph tag passthrough
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.collections | The collections to synchronize between the storages.
|
| options/nixos/services.pantalaimon-headless.instances.<name>.listenPort | The port where the daemon will listen to client connections for
this homeserver
|
| options/nixos/virtualisation.fileSystems.<name>.encrypted.enable | The block device is backed by an encrypted one, adds this device as a initrd luks entry.
|
| options/nixos/services.matrix-synapse.settings.server_name | The domain name of the server, with optional explicit port
|
| options/nixos/services.bitwarden-directory-connector-cli.ldap.rootPath | Root path for LDAP.
|
| options/nixos/services.prometheus.exporters.shelly.metrics-file | Path to the JSON file with the metric definitions
|
| options/nixos/services.nextcloud.notify_push.dbhost | Database host (+port) or socket path
|
| options/nixos/services.nginx.sso.configuration | nginx-sso configuration
(documentation)
as a Nix attribute set
|
| options/nixos/virtualisation.bootPartition | The path (inside the VM) to the device containing the EFI System Partition (ESP)
|
| options/darwin/system.defaults.screencapture.location | The filesystem path to which screencaptures should be written.
|
| options/nixos/security.ipa.shells | List of shells which binaries should be installed to /bin/
|
| options/nixos/services.librenms.user | Name of the LibreNMS user.
|
| options/nixos/services.gdomap.enable | Whether to enable GNUstep Distributed Objects name server.
|
| options/nixos/services.davfs2.davUser | When invoked by root the mount.davfs daemon will run as this user
|
| options/nixos/services.murmur.group | The name of an existing group to use to run the service
|
| options/nixos/services.weblate.smtp.user | SMTP login name.
|
| options/home-manager/programs.termite.iconName | The name of the icon to be used for the terminal process.
|
| options/nixos/services.dendrite.settings.global.server_name | The domain name of the server, with optional explicit port
|
| options/darwin/launchd.agents.<name>.serviceConfig.ProcessType | This optional key describes, at a high level, the intended purpose of the job
|
| options/nixos/virtualisation.fileSystems.<name>.neededForBoot | If set, this file system will be mounted in the initial ramdisk
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.slot | Optional slot number of the token that stores the certificate.
|
| options/nixos/services.tor.settings.Nickname | See torrc manual.
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.presharedKeyFile | File pointing to preshared key as generated by wg genpsk
|
| options/nixos/services.bacula-sd.autochanger.<name>.extraAutochangerConfig | Extra configuration to be passed in Autochanger directive.
|
| options/home-manager/services.muchsync.remotes.<name>.remote.checkForModifiedFiles | Check for modified files on the remote side
|
| options/nixos/boot.binfmt.registrations.<name>.wrapInterpreterInShell | Whether to wrap the interpreter in a shell script
|
| options/darwin/launchd.daemons.<name>.serviceConfig.EnableTransactions | This flag instructs launchd that the job promises to use vproc_transaction_begin(3) and
vproc_transaction_end(3) to track outstanding transactions that need to be reconciled before the
process can safely terminate
|
| options/nixos/services.bcg.automaticRenameNodes | Automatically rename all nodes.
|
| options/home-manager/wayland.windowManager.sway.config.bindswitches.<name>.locked | Unless the flag --locked is set, the command
will not be run when a screen locking program
is active
|
| options/nixos/services.anuko-time-tracker.nginx.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| options/nixos/services.rosenpass.settings.peers.*.public_key | Path to a file containing the public key of the remote Rosenpass peer.
|
| options/nixos/services.prometheus.exporters.varnish.healthPath | Path under which to expose healthcheck
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ntlm.<name>.secret | Value of the NTLM secret, which is the NT Hash of the actual secret,
that is, MD4(UTF-16LE(secret))
|
| options/nixos/networking.networkmanager.ensureProfiles.profiles.<name>.connection.id | This is the name that will be displayed by NetworkManager and GUIs.
|
| options/nixos/services.hddfancontrol.settings.<drive-bay-name>.pwmPaths | PWM filepath(s) to control fan speed (under /sys), followed by initial and fan-stop PWM values
Can also use command substitution to ensure the correct hwmonX is selected on every boot
|
| options/nixos/services.akkoma.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.gancio.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.fluidd.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.fluidd.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.gancio.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.akkoma.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.matomo.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.matomo.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.monica.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.monica.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.EnableTransactions | This flag instructs launchd that the job promises to use vproc_transaction_begin(3) and
vproc_transaction_end(3) to track outstanding transactions that need to be reconciled before the
process can safely terminate
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.proxyAddress | cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.highlight.background | The background color.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.highlight.foreground | The foreground color.
|
| options/nixos/security.pam.services.<name>.googleAuthenticator.enable | If set, users with enabled Google Authenticator (created
~/.google_authenticator) will be required
to provide Google Authenticator token to log in.
|
| options/nixos/services.sanoid.templates.<name>.script_timeout | Time limit for pre/post/pruning script execution time (<=0 for infinite).
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.mautrix-meta.instances.<name>.serviceDependencies | List of Systemd services to require and wait for when starting the application service.
|
| options/nixos/security.pam.services.<name>.googleAuthenticator.allowNullOTP | Whether to allow login for accounts that have no OTP set
(i.e., accounts with no OTP configured or no existing
~/.google_authenticator).
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/nixos/services.akkoma.config.":pleroma"."Pleroma.Upload".base_url | Base path which uploads will be stored at
|
| options/nixos/services.prometheus.exporters.nut.passwordPath | A run-time path to the nutUser password file, which should be
provisioned outside of Nix store.
|
| options/nixos/services.prometheus.exporters.zfs.telemetryPath | Path under which to expose metrics.
|
| options/nixos/services.thanos.downsample.tracing.config | Tracing configuration
|
| options/nixos/services.limesurvey.httpd.virtualHost.documentRoot | The path of Apache's document root directory
|
| options/nixos/nixpkgs.pkgs | If set, the pkgs argument to all NixOS modules is the value of
this option, extended with nixpkgs.overlays, if
that is also set
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/virtualisation.sharedDirectories.<name>.target | The mount point of the directory inside the virtual machine
|
| options/nixos/services.keter.bundle.appName | The name keter assigns to this bundle
|
| options/nixos/services.baikal.pool | Name of existing phpfpm pool that is used to run web-application
|
| options/nixos/services.guix.publish.user | Name of the user to change once the server is up.
|
| options/home-manager/i18n.inputMethod.fcitx5.themes | Themes to be written to $XDG_DATA_HOME/fcitx5/themes/${name}
|
| options/home-manager/programs.oh-my-posh.useTheme | Use one of the official themes
|
| options/nixos/services.limesurvey.nginx.virtualHost.serverName | Name of this virtual host
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.clientSecretCommand | A command that prints the OAuth credentials to standard
output
|
| options/home-manager/programs.senpai.config.nickname | Your nickname, sent with a NICK IRC message
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/home-manager/accounts.contact.accounts.<name>.pimsync.extraLocalStorageDirectives | Extra directives that should be added under this accounts local storage directive
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.limesurvey.httpd.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.communityPlugins.*.settings | Settings to include in the plugin's data.json.
|
| options/nixos/services.bookstack.nginx.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| options/nixos/services.dolibarr.h2o.tls.identity.*.certificate-file | Path to certificate file
|
| options/nixos/services.ocsinventory-agent.settings.local | If specified, the OCS Inventory Agent will run in offline mode
and the resulting inventory file will be stored in the specified path.
|
| options/nixos/virtualisation.podman.networkSocket.tls.cert | Path to certificate describing the server.
|
| options/home-manager/wayland.windowManager.sway.config.bindswitches.<name>.reload | If the --reload flag is given, the binding will
also be executed when the config is reloaded.
toggle bindings will not be executed on reload
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.proxyType | cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP
|
| options/home-manager/accounts.email.accounts.<name>.aerc.imapOauth2Params.client_secret | The OAuth2 client secret.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.smtpOauth2Params.client_secret | The OAuth2 client secret.
|
| options/nixos/services.tarsnap.archives.<name>.aggressiveNetworking | Upload data over multiple TCP connections, potentially
increasing tarsnap's bandwidth utilisation at the cost
of slowing down all other network traffic
|
| options/nixos/services.bacula-fd.tls.verifyPeer | Verify peer certificate
|
| options/nixos/services.bacula-sd.tls.verifyPeer | Verify peer certificate
|
| options/nixos/services.authelia.instances.<name>.settings.log.keep_stdout | Whether to also log to stdout when a file_path is defined.
|
| options/nixos/services.pantalaimon-headless.instances.<name>.listenAddress | The address where the daemon will listen to client connections
for this homeserver.
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters.*.enabled | Whether this filter is currently active.
|
| options/nixos/services.anuko-time-tracker.hostname | The hostname to serve Anuko Time Tracker on.
|
| options/nixos/services.sourcehut.settings.mail.pgp-privkey | An absolute file path (which should be outside the Nix-store)
to an OpenPGP private key
|
| options/nixos/boot.loader.generic-extlinux-compatible.populateCmd | Contains the builder command used to populate an image,
honoring all options except the -c <path-to-default-configuration>
argument
|
| options/nixos/services.prometheus.exporters.unbound.unbound.ca | Path to the Unbound server certificate authority
|
| options/nixos/services.prometheus.exporters.ping.telemetryPath | Path under which to expose metrics.
|
| options/nixos/services.prometheus.exporters.blackbox.configFile | Path to configuration file.
|
| options/nixos/services.prometheus.exporters.mail.telemetryPath | Path under which to expose metrics.
|
| options/nixos/services.prometheus.exporters.php-fpm.telemetryPath | Path under which to expose metrics.
|
| options/nixos/services.prometheus.exporters.fastly.configFile | Path to a fastly-exporter configuration file
|
| options/nixos/services.writefreely.admin.initialPasswordFile | Path to a file containing the initial password for the admin user
|
| options/nixos/services.mautrix-meta.instances.<name>.environmentFile | File containing environment variables to substitute when copying the configuration
out of Nix store to the services.mautrix-meta.dataDir
|
| options/nixos/programs.nix-required-mounts.allowedPatterns.<name>.unsafeFollowSymlinks | Whether to enable Instructs the hook to mount the symlink targets as well, when any of
the paths contain symlinks
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.ah_proposals | AH proposals to offer for the CHILD_SA
|
| options/nixos/services.cloudflared.tunnels.<name>.edgeIPVersion | Specifies the IP address version (IPv4 or IPv6) used to establish a connection between cloudflared and the Cloudflare global network
|
| options/nixos/boot.binfmt.registrations.<name>.matchCredentials | Whether to launch with the credentials and security
token of the binary, not the interpreter (e.g. setuid
bit)
|
| options/nixos/services.discourse.hostname | The hostname to serve Discourse on.
|
| options/nixos/services.bookstack.hostname | The hostname to serve BookStack on.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/home-manager/programs.borgmatic.backups.<name>.location.repositories | List of local or remote repositories with paths and optional labels.
|
| options/nixos/services.gitlab-runner.services.<name>.environmentVariables | Custom environment variables injected to build environment
|
| options/darwin/services.gitlab-runner.services.<name>.environmentVariables | Custom environment variables injected to build environment
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.presharedKey | Base64 preshared key generated by wg genpsk
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.noHappyEyeballs | Disable the “happy eyeballs” algorithm for IPv4/IPv6 fallback if your local network has misconfigured one of the protocols.
|
| options/nixos/boot.zfs.forceImportAll | Forcibly import all ZFS pool(s)
|
| options/nixos/services.dovecot2.group | Dovecot group name.
|
| options/nixos/services.rspamd.locals | Local configuration files, written into /etc/rspamd/local.d/{name}.
|
| options/nixos/services.tt-rss.virtualHost | Name of the nginx virtualhost to use and setup
|
| options/nixos/services.tt-rss.email.fromName | Name for sending outgoing mail
|
| options/nixos/services.bacula-dir.tls.verifyPeer | Verify peer certificate
|
| options/nixos/services.borgbackup.jobs.<name>.encryption.passphrase | The passphrase the backups are encrypted with
|
| options/darwin/launchd.daemons.<name>.serviceConfig.ProcessType | This optional key describes, at a high level, the intended purpose of the job
|
| options/nixos/services.hadoop.hdfs.namenode.extraEnv | Extra environment variables for HDFS NameNode
|
| options/nixos/services.namecoind.rpc.address | IP address the RPC server will bind to.
|
| options/nixos/services.kerberos_server.settings.realms.<name>.acl | The privileges granted to a user.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.collections | The collections to synchronize between the storages.
|
| options/nixos/services.prometheus.exporters.unbound.unbound.key | Path to the Unbound control socket key.
|
| options/nixos/services.sftpgo.settings.webdavd.bindings.*.address | Network listen address
|
| options/nixos/virtualisation.xen.store.settings.quota.maxPath | Path limit for the quota system.
|
| options/nixos/services.factorio.username | Your factorio.com login credentials
|
| options/nixos/services.hddfancontrol.settings.<drive-bay-name>.logVerbosity | Verbosity of the log level
|
| options/home-manager/programs.librewolf.profiles.<name>.search.meta.maintainers | List of maintainers of each module
|
| options/home-manager/programs.floorp.profiles.<name>.bookmarks.meta.maintainers | List of maintainers of each module
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.ProcessType | This optional key describes, at a high level, the intended purpose of the job
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters.*.extraConfig | Extra settings to apply to the filter
|
| options/nixos/services.prometheus.scrapeConfigs.*.nerve_sd_configs.*.paths | Paths can point to a single service, or the root of a tree of services.
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.refresh_interval | The time after which the containers are refreshed
|
| options/nixos/services.multipath.devices.*.delay_watch_checks | This option is deprecated, and mapped to san_path_err_forget_rate
|
| options/nixos/services.bcg.automaticRenameKitNodes | Automatically rename kit's nodes.
|
| options/nixos/services.namecoind.generate | Whether to generate (mine) Namecoins.
|
| options/nixos/networking.openconnect.interfaces.<name>.passwordFile | File containing the password to authenticate with
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.allowedIPs | List of IP (v4 or v6) addresses with CIDR masks from
which this peer is allowed to send incoming traffic and to which
outgoing traffic for this peer is directed
|
| options/nixos/services.sourcehut.settings."builds.sr.ht::worker".buildlogs | Path to write build logs.
|
| options/nixos/services.paperless.environmentFile | Path to a file containing extra paperless config options in the systemd EnvironmentFile
format
|
| options/nixos/services.tailscale.useRoutingFeatures | Enables settings required for Tailscale's routing features like subnet routers and exit nodes
|
| options/nixos/services.prometheus.exporters.varnish.varnishStatPath | Path to varnishstat.
|
| options/nixos/networking.wireguard.interfaces.<name>.generatePrivateKeyFile | Automatically generate a private key with
wg genkey, at the privateKeyFile location.
|
| options/home-manager/programs.borgmatic.backups.<name>.location.sourceDirectories | Directories to backup
|
| options/nixos/services.namecoind.rpc.allowFrom | List of IP address ranges allowed to use the RPC API
|
| options/home-manager/accounts.contact.accounts.<name>.pimsync.extraRemoteStorageDirectives | Extra directives that should be added under this accounts remote storage directive
|
| options/nixos/services.pantalaimon-headless.instances.<name>.extraSettings | Extra configuration options
|
| options/nixos/services.hadoop.hdfs.namenode.enable | Whether to enable HDFS NameNode.
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.compress | Enables gzip compression of write-ahead logs, and specifies the compression level
(0 through 9, 0 being no compression and 9 being best compression)
|
| options/nixos/services.grav.virtualHost | Name of the nginx virtualhost to use and setup
|
| options/nixos/services.epmd.enable | Whether to enable socket activation for Erlang Port Mapper Daemon (epmd),
which acts as a name server on all hosts involved in distributed
Erlang computations.
|
| options/nixos/services.librenms.group | Name of the LibreNMS group.
|
| options/nixos/services.outline.smtp.host | Host name or IP address of the SMTP server.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.ppk_id | String identifying the Postquantum Preshared Key (PPK) to be used.
|
| options/nixos/services.xserver.desktopManager.pantheon.sessionPath | Additional list of packages to be added to the session search path
|
| options/nixos/services.sourcehut.settings."meta.sr.ht::billing".stripe-secret-key | An absolute file path (which should be outside the Nix-store)
to a secret key for Stripe
|
| options/nixos/services.cadvisor.storageDriverPasswordFile | File that contains the cadvisor storage driver password.
storageDriverPasswordFile takes precedence over storageDriverPassword
Warning: when storageDriverPassword is non-empty this defaults to a file in the
world-readable Nix store that contains the value of storageDriverPassword
|
| options/nixos/services.prometheus.exporters.nginx.telemetryPath | Path under which to expose metrics.
|
| options/nixos/services.nextcloud.config.objectstore.s3.secretFile | The full path to a file that contains the access secret.
|
| options/nixos/services.prometheus.exporters.unpoller.loki.pass | Path of a file containing the password for Loki
|
| options/nixos/services.prometheus.exporters.nextcloud.url | URL to the Nextcloud serverinfo page
|
| options/nixos/services.jirafeau.nginxConfig.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| options/nixos/services.xserver.desktopManager.cinnamon.sessionPath | Additional list of packages to be added to the session search path
|
| options/nixos/security.pam.services.<name>.googleAuthenticator.forwardPass | The authentication provides a single field requiring
the user's password followed by the one-time password (OTP).
|
| options/nixos/systemd.network.networks.<name>.stochasticFairnessQueueingConfig | Each attribute in this set specifies an option in the
[StochasticFairnessQueueing] section of the unit
|
| options/nixos/users.extraUsers.<name>.password | Specifies the (clear text) password for the user
|
| options/nixos/services.coder.database.username | Username for accessing the database.
|
| options/darwin/launchd.agents.<name>.serviceConfig.inetdCompatibility.Wait | This flag corresponds to the "wait" or "nowait" option of inetd
|
| options/nixos/virtualisation.credentials.<name>.mechanism | The mechanism used to pass the credential to the VM.
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.filter.arguments | Extra command-line arguments pass to the external filter program.
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.perIdentitySettings | Extra settings to add to each identity of this Thunderbird
account configuration
|
| options/nixos/services.oauth2-proxy.nginx.virtualHosts.<name>.allowed_emails | List of emails to allow access to this vhost, or null to allow all.
|
| options/nixos/services.oauth2-proxy.nginx.virtualHosts.<name>.allowed_groups | List of groups to allow access to this vhost, or null to allow all.
|
| options/home-manager/accounts.calendar.accounts.<name>.pimsync.extraLocalStorageDirectives | Extra directives that should be added under this accounts local storage directive
|
| options/nixos/services.sourcehut.settings."sr.ht".service-key | An absolute file path (which should be outside the Nix-store)
to a key used for encrypting session cookies
|
| options/nixos/security.pam.ussh.authorizedPrincipalsFile | Path to a list of principals; if the user presents a certificate with
one of these principals, then they will be authorized
|
| options/nixos/hardware.nvidia-container-toolkit.enable-hooks | List of hooks to enable when generating the CDI specification
|
| options/nixos/services.tor.relay.onionServices.<name>.settings.HiddenServiceMaxStreamsCloseCircuit | See torrc manual.
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.type | Type of this transport
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.connectTimeout | Timeout for establishing a new TCP connection to your origin server
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/security.pam.services.<name>.googleOsLoginAccountVerification | If set, will use the Google OS Login PAM modules
(pam_oslogin_login,
pam_oslogin_admin) to verify possible OS Login
users and set sudoers configuration accordingly
|
| options/nixos/services.syncthing.settings.folders.<name>.copyOwnershipFromParent | On Unix systems, tries to copy file/folder ownership from the parent directory (the directory it’s located in)
|
| options/home-manager/services.syncthing.settings.folders.<name>.copyOwnershipFromParent | On Unix systems, tries to copy file/folder ownership from
the parent directory (the directory it’s located in)
|
| options/nixos/documentation.man.mandoc.settings.output.style | Path to the file used for an external style-sheet
|
| options/nixos/services.gotosocial.environmentFile | File path containing environment variables for configuring the GoToSocial service
in the format of an EnvironmentFile as described by systemd.exec(5)
|
| options/nixos/networking.firewall.checkReversePath | Performs a reverse path filter test on a packet
|
| options/nixos/services.thanos.downsample.objstore.config | Object store configuration
|
| options/nixos/services.prometheus.exporters.postfix.logfilePath | Path where Postfix writes log entries
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| options/nixos/services.postgresql.systemCallFilter.<name>.priority | Set the priority of the system call filter setting
|
| options/home-manager/programs.vicinae.extensions | List of Vicinae extensions to install
|
| options/nixos/boot.iscsi-initiator.target | Name of the iSCSI target to boot from.
|
| options/nixos/services.dnsdist.enable | Whether to enable dnsdist domain name server.
|
| options/nixos/services.ircdHybrid.serverName | IRCD server name.
|
| options/nixos/services.unbound.enable | Whether to enable Unbound domain name server.
|
| options/home-manager/programs.firefox.profiles.<name>.bookmarks.meta.maintainers | List of maintainers of each module
|
| options/home-manager/programs.thunderbird.profiles.<name>.search.engines | Attribute set of search engine configurations
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/nixos/services.elasticsearch.cluster_name | Elasticsearch name that identifies your cluster for auto-discovery.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Disabled | This optional key is used as a hint to launchctl(1) that it should not submit this job to launchd when
loading a job or jobs
|
| options/nixos/services.mailman.ldap.attrMap.username | LDAP-attribute that corresponds to the username-attribute in mailman.
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.host | Host for the api or remote transport
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths | API tokens to provision for the user in this organization.
|
| options/home-manager/programs.borgmatic.backups.<name>.consistency.checks.*.frequency | Frequency of this type of check
|
| options/nixos/security.pam.services.<name>.googleOsLoginAuthentication | If set, will use the pam_oslogin_login's user
authentication methods to authenticate users using 2FA
|
| options/nixos/specialisation.<name>.configuration | Arbitrary NixOS configuration
|
| options/nixos/services.foundationdb.tls.certificate | Path to the TLS certificate file
|
| options/nixos/services.nextcloud-spreed-signaling.settings.https.key | Path to the private key used for the HTTPS listener
|
| options/nixos/services.logrotate.checkConfig | Whether the config should be checked at build time
|
| options/nixos/services.prometheus.exporters.mysqld.configFile | Path to the services config file
|
| options/nixos/services.wstunnel.clients.<name>.upgradeCredentials | Use these credentials to authenticate during the HTTP upgrade request
(Basic authorization type, USER:[PASS]).
Passwords specified here will be world-readable in the Nix store!
To pass a password to the service, point the environmentFile option
to a file containing HTTP_PASSWORD=<your-password-here> and set this
option to <user>:$HTTP_PASSWORD
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/nixos/services.k3s.autoDeployCharts | Auto deploying Helm charts that are installed by the k3s Helm controller
|
| options/nixos/services.firezone.server.provision.accounts.<name>.features.idp_sync | Whether to enable the idp_sync feature for this account.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.features.rest_api | Whether to enable the rest_api feature for this account.
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.port | Port to connect to for the api or remote transport
|
| options/nixos/users.users.<name>.initialHashedPassword | Specifies the initial hashed password for the user, i.e. the
hashed password assigned if the user does not already
exist
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.settings.base_url | Base URL for build logs (mandatory for access from CI broker page).
|
| options/nixos/services.dolibarr.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.agorakit.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.librenms.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.kanboard.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.fediwall.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.librenms.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.kanboard.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.fediwall.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.agorakit.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.mainsail.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.mainsail.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.namecoind.rpc.password | Password for RPC connections.
|
| options/nixos/services.icingaweb2.modules.monitoring.backends.<name>.disabled | Disable this backend
|
| options/nixos/documentation.man.mandoc.manPath | Change the paths included in the MANPATH environment variable,
i. e. the directories where man(1)
looks for section-specific directories of man pages
|
| options/nixos/services.etebase-server.settings.global.secret_file | The path to a file containing the secret
used as django's SECRET_KEY.
|
| options/nixos/services.prometheus.exporters.mysqld.telemetryPath | Path under which to expose metrics.
|
| options/nixos/services.prometheus.pushgateway.web.route-prefix | Prefix for the internal routes of web endpoints
|
| options/nixos/services.prometheus.exporters.mikrotik.configFile | Path to a mikrotik exporter configuration file
|
| options/nixos/services.archisteamfarm.ipcPasswordFile | Path to a file containing the password
|
| options/home-manager/services.linux-wallpaperengine.assetsPath | Path to the assets directory.
|
| options/nixos/services.gitlab.databaseUsername | GitLab database user.
|
| options/home-manager/accounts.calendar.accounts.<name>.pimsync.extraRemoteStorageDirectives | Extra directives that should be added under this accounts remote storage directive
|
| options/nixos/networking.bonds.<name>.xmit_hash_policy | DEPRECATED, use driverOptions
|
| options/darwin/launchd.agents.<name>.serviceConfig.StartCalendarInterval | This optional key causes the job to be started every calendar interval as specified
|
| options/darwin/networking.wg-quick.interfaces.<name>.peers.*.persistentKeepalive | Interval in seconds to send keepalive packets
|
| options/nixos/services.forgejo.dump.file | Filename to be used for the dump
|
| options/nixos/services.mjpg-streamer.user | mjpg-streamer user name.
|
| options/nixos/services.prosody.muc.*.domain | Domain name of the MUC
|
| options/nixos/services.rss-bridge.pool | Name of phpfpm pool that is used to run web-application
|
| options/darwin/launchd.daemons.<name>.serviceConfig.inetdCompatibility.Wait | This flag corresponds to the "wait" or "nowait" option of inetd
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.handle | Hex-encoded CKA_ID or handle of the certificate on a token or TPM,
respectively
|
| options/nixos/services.opentelemetry-collector.configFile | Specify a path to a configuration file that Opentelemetry Collector should use.
|
| options/nixos/services.prometheus.exporters.borgmatic.configFile | The path to the borgmatic config file
|
| options/nixos/virtualisation.podman.networkSocket.tls.cacert | Path to CA certificate to use for client authentication.
|
| options/nixos/services.prometheus.exporters.imap-mailstat.accounts.<name>.password | |
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.login | Grants the user, created by the ensureUser attr, login permissions
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.inetdCompatibility.Wait | This flag corresponds to the "wait" or "nowait" option of inetd
|
| options/nixos/networking.wireguard.interfaces.<name>.socketNamespace | The pre-existing network namespace in which the
WireGuard interface is created, and which retains the socket even if the
interface is moved via interfaceNamespace
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.actual.settings.hostname | The address to listen on
|
| options/nixos/services.homepage-dashboard.environmentFile | The path to an environment file that contains environment variables to pass
to the homepage-dashboard service, for the purpose of passing secrets to
the service
|
| options/nixos/programs.singularity.enableExternalLocalStateDir | Whether to use top-level directories as LOCALSTATEDIR
instead of the store path ones
|
| options/nixos/services.bitwarden-directory-connector-cli.secrets.ldap | Path to file that contains LDAP password for user in {option}`ldap.username
|
| options/nixos/services.prometheus.exporters.unbound.unbound.host | Path to the unbound control socket
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.dscp | Differentiated Services Field Codepoint to set on outgoing IKE packets for
this connection
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.authelia.instances.<name>.settings.telemetry.metrics.enabled | Enable Metrics.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.imapOauth2Params.token_endpoint | The OAuth2 token endpoint.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.smtpOauth2Params.token_endpoint | The OAuth2 token endpoint.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.dawarich.smtp.user | SMTP login name.
|
| options/nixos/boot.initrd.luks.devices | The encrypted disk that should be opened before the root
filesystem is mounted
|
| options/nixos/services.asusd.auraConfigs | The content of /etc/asusd/aura_.ron
|
| options/nixos/services.flannel.iface | Interface to use (IP or name) for inter-host communication
|
| options/nixos/services.mastodon.smtp.user | SMTP login name.
|
| options/nixos/services.resilio.deviceName | Name of the Resilio Sync device.
|
| options/nixos/services.selfoss.pool | Name of existing phpfpm pool that is used to run web-application
|
| options/nixos/users.mysql.pam.passwordColumn | The name of the column that contains a (encrypted) password string.
|
| options/nixos/services.lasuite-docs.domain | Domain name of the docs instance.
|
| options/nixos/users.mysql.pam.logging.msgColumn | The name of the column in the log table to which the description
of the performed operation is stored.
|
| options/nixos/services.lasuite-meet.domain | Domain name of the meet instance.
|
| options/home-manager/programs.yazi.shellWrapperName | Name of the shell wrapper to be called.
|
| options/nixos/hardware.nvidia-container-toolkit.disable-hooks | List of hooks to disable when generating the CDI specification
|
| options/nixos/services.strongswan-swanctl.swanctl.pools | Section defining named pools
|
| options/nixos/services.rke2.autoDeployCharts | Auto deploying Helm charts that are installed by the rke2 Helm controller
|
| options/nixos/services.limesurvey.nginx.virtualHost.sslCertificate | Path to server SSL certificate.
|
| options/nixos/services.pid-fan-controller.settings.fans.*.wildcardPath | Wildcard path of the hwmon pwm file
|
| options/nixos/services.warpgate.settings.postgres.certificate | Path to PostgreSQL listener certificate.
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters.*.condition | Condition to match messages against.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.verifyFingerprint | Optional
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Disabled | This optional key is used as a hint to launchctl(1) that it should not submit this job to launchd when
loading a job or jobs
|
| options/nixos/services.namecoind.trustedNodes | List of the only peer IP addresses to connect to
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Disabled | This optional key is used as a hint to launchctl(1) that it should not submit this job to launchd when
loading a job or jobs
|
| options/nixos/services.athens.downloadMode | Defines how Athens behaves when a module@version
is not found in storage
|
| options/nixos/security.pam.sshAgentAuth.authorizedKeysFiles | A list of paths to files in OpenSSH's authorized_keys format, containing
the keys that will be trusted by the pam_ssh_agent_auth module
|
| options/nixos/services.linkwarden.environmentFile | Path of a file with extra environment variables to be loaded from disk
|
| options/nixos/virtualisation.podman.networkSocket.tls.key | Path to the private key corresponding to the server certificate
|
| options/nixos/virtualisation.containerd.configFile | Path to containerd config file
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/home-manager/programs.borgmatic.backups.<name>.location.excludeHomeManagerSymlinks | Whether to exclude Home Manager generated symbolic links from
the backups
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.enableLocalhostRedirects | Allow localhost redirects
|
| options/darwin/launchd.daemons.<name>.serviceConfig.StartCalendarInterval | This optional key causes the job to be started every calendar interval as specified
|
| options/nixos/services.kerberos_server.settings.realms.<name>.acl.*.target | The principals that 'access' applies to.
|
| options/nixos/services.cloudflared.tunnels.<name>.certificateFile | Account certificate file, necessary to create, delete and manage tunnels
|
| options/home-manager/programs.hexchat.channels.<name>.options.acceptInvalidSSLCertificates | Accept invalid SSL certificates.
|
| options/nixos/services.syncplay.maxUsernameLength | Maximum number of characters in a username.
|
| options/nixos/networking.openconnect.interfaces.<name>.extraOptions | Extra config to be appended to the interface config
|
| options/nixos/services.cloudflare-ddns.credentialsFile | Path to a file containing the Cloudflare API authentication token
|
| options/nixos/services.rmfakecloud.environmentFile | Path to an environment file loaded for the rmfakecloud service
|
| options/nixos/services.prometheus.exporters.dovecot.telemetryPath | Path under which to expose metrics.
|
| options/nixos/services.lubelogger.environmentFile | Path to a file containing extra LubeLogger config options in the systemd EnvironmentFile format
|
| options/nixos/services.prometheus.exporters.tibber.apiTokenPath | Add here the path to your personal Tibber API Token ('Bearer Token') File
|
| options/nixos/services.prometheus.exporters.postfix.telemetryPath | Path under which to expose metrics.
|
| options/nixos/services.prometheus.exporters.varnish.telemetryPath | Path under which to expose metrics.
|
| options/nixos/services.nextcloud.config.objectstore.s3.usePathStyle | Required for some non-Amazon S3 implementations
|
| options/nixos/services.prometheus.exporters.mongodb.telemetryPath | Metrics expose path
|
| options/nixos/services.prometheus.exporters.unbound.telemetryPath | Path under which to expose metrics.
|
| options/home-manager/programs.ripgrep-all.custom_adapters.*.args | The output path hint; the placeholders are the same as for rga's args
|
| options/nixos/services.influxdb2.provision.organizations.<name>.buckets | Buckets to provision in this organization.
|
| options/nixos/systemd.automounts.*.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/security.tpm2.fapi.profileName | Name of the default cryptographic profile chosen from the profile_dir directory.
|
| options/nixos/services.dolibarr.domain | Domain name of your server.
|
| options/nixos/services.jicofo.xmppDomain | Domain name of the XMMP server to which to connect as a component
|
| options/nixos/services.saunafs.masterHost | IP or hostname name of master host.
|
| options/nixos/services.nixops-dns.domain | Fake domain name to resolve to NixOps virtual machines
|
| options/nixos/services.nscd.enable | Whether to enable the Name Service Cache Daemon
|
| options/nixos/services.pretix.nginx.domain | The domain name under which to set up the virtual host.
|
| options/nixos/services.spiped.config | Configuration for a secure pipe daemon
|
| options/nixos/services.wiki-js.settings.db.db | Name of the database to use.
|
| options/nixos/xdg.portal.config | Sets which portal backend should be used to provide the implementation
for the requested interface
|
| options/home-manager/xdg.portal.config | Sets which portal backend should be used to provide the implementation
for the requested interface
|
| options/home-manager/programs.kitty.themeFile | Apply a Kitty color theme
|
| options/nixos/services.hadoop.hdfs.namenode.extraFlags | Extra command line flags to pass to HDFS NameNode
|
| options/nixos/users.extraUsers.<name>.initialHashedPassword | Specifies the initial hashed password for the user, i.e. the
hashed password assigned if the user does not already
exist
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StartCalendarInterval | This optional key causes the job to be started every calendar interval as specified
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.exactPermissions | When enabled,
programs.floorp.profiles.<profile>.extensions.settings.<extensionID>.permissions
must specify the exact set of permissions that the
extension will request
|
| options/nixos/services.zoneminder.hostname | The hostname on which to listen.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.vips | List of virtual IPs to request in IKEv2 configuration payloads or IKEv1
Mode Config
|
| options/nixos/services.bookstack.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.bookstack.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.postgresqlPackage | The postgresql package to use.
|
| options/nixos/services.limesurvey.nginx.virtualHost.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.prometheus.exporters.pgbouncer.webConfigFile | Path to configuration file that can enable TLS or authentication.
|
| options/nixos/services.prometheus.exporters.imap-mailstat.accounts.<name>.starttls | set to true for using STARTTLS to start a TLS connection
|
| options/nixos/networking.openconnect.interfaces.<name>.certificate | Certificate to authenticate with.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.allowInsecureClientDisablePkce | Disable PKCE on this oauth2 resource server to work around insecure clients
that may not support it
|
| options/nixos/services.dovecot2.imapsieve.mailbox.*.from | Only execute the administrator Sieve scripts for the mailbox configured with services.dovecot2.imapsieve.mailbox..name when the message originates from the indicated mailbox
|
| options/nixos/services.dovecot2.imapsieve.mailbox.*.causes | Only execute the administrator Sieve scripts for the mailbox configured with services.dovecot2.imapsieve.mailbox..name when one of the listed IMAPSIEVE causes apply
|
| options/nixos/services.dependency-track.oidc.teams.claim | Defines the name of the claim that contains group memberships or role assignments in the provider's userinfo endpoint
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.serverName | Name of this virtual host
|
| options/nixos/services.influxdb2.provision.organizations.<name>.present | Whether to ensure that this organization is present or absent.
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.environment | Environment variables passed to the service
|
| options/nixos/services.peertube-runner.instancesToRegister.<name>.runnerDescription | Runner description declared to the PeerTube instance.
|
| options/nixos/services.authelia.instances.<name>.settings.telemetry.metrics.address | The address to listen on for metrics
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.onlyoffice.hostname | FQDN for the OnlyOffice instance.
|
| options/nixos/services.dendrite.settings.global.private_key | The path to the signing private key file, used to sign
requests and events.
nix-shell -p dendrite --command "generate-keys --private-key matrix_key.pem"
|
| options/nixos/services.mastodon.elasticsearch.passwordFile | Path to file containing password for optionally authenticating with Elasticsearch.
|
| options/nixos/services.outline.slackAuthentication.secretFile | File path containing the authentication secret.
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.key | Path to certificate private key (PEM with private key)
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.cert | Path to certificate (PEM with certificate chain)
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.presharedKeyFile | File pointing to preshared key as generated by wg genpsk
|
| options/nixos/programs.zsh.enable | Whether to configure zsh as an interactive shell
|
| options/nixos/services.jigasi.xmppDomain | Domain name of the XMMP server to which to connect as a component
|
| options/nixos/services.mjpg-streamer.group | mjpg-streamer group name.
|
| options/nixos/services.moosefs.masterHost | IP or DNS name of the MooseFS master server.
|
| options/nixos/services.openafsClient.cellName | Cell name.
|
| options/nixos/services.nixops-dns.enable | Whether to enable the nixops-dns resolution
of NixOps virtual machines via dnsmasq and fake domain name.
|
| options/nixos/users.mysql.pam.logging.timeColumn | The name of the column in the log table to which the timestamp of the
log entry is stored.
|
| options/home-manager/services.cachix-agent.profile | The Nix profile name.
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.crl_uris | List of CRL distribution points (ldap, http, or file URI)
|
| options/nixos/services.pgadmin.emailServer.username | SMTP server username for email delivery
|
| options/nixos/services.sourcehut.settings.webhooks.private-key | An absolute file path (which should be outside the Nix-store)
to a base64-encoded Ed25519 key for signing webhook payloads
|
| options/nixos/services.akkoma.config.":pleroma".":media_proxy".base_url | Base path for the media proxy
|
| options/nixos/services.transmission.credentialsFile | Path to a JSON file to be merged with the settings
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.statusInterval | Specifies the number of seconds between status packets sent back to the server
|
| options/nixos/services.discourse.admin.username | The admin user username.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.verifyFingerprint | Optional
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.mautrix-meta.instances.<name>.registrationServiceUnit | The registration service that generates the registration file
|
| options/home-manager/programs.thunderbird.profiles.<name>.search.meta.maintainers | List of maintainers of each module
|
| options/nixos/services.vikunja.frontendHostname | The Hostname under which the frontend is running.
|
| options/home-manager/services.xcape.mapExpression | The value has the grammar Key[|OtherKey]
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.split_exclude | Address or CIDR subnets
StrongSwan default: []
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.split_include | Address or CIDR subnets
StrongSwan default: []
|
| options/home-manager/programs.ripgrep-all.custom_adapters.*.binary | The path of the binary to run
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.conflictResolution | What to do in case of a conflict between the storages
|
| options/home-manager/programs.librewolf.profiles.<name>.bookmarks.meta.maintainers | List of maintainers of each module
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.exactPermissions | When enabled,
programs.firefox.profiles.<profile>.extensions.settings.<extensionID>.permissions
must specify the exact set of permissions that the
extension will request
|
| options/nixos/services.multipath.blacklist_exceptions | This section defines which devices should be included in the
multipath topology discovery, despite being listed in the
blacklist section.
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.file_extension | Extension to include in local file names, which can be useful
for indexing with third-party programs.
|
| options/nixos/services.freshrss.pool | Name of the php-fpm pool to use and setup
|
| options/nixos/services.agorakit.mail.fromName | Mail "from" name.
|
| options/nixos/services.nginx.resolver | Configures name servers used to resolve names of upstream servers into addresses
|
| options/nixos/services.mongodb.replSetName | If this instance is part of a replica set, set its name here
|
| options/nixos/users.mysql.pam.logging.pidColumn | The name of the column in the log table to which the pid of the
process utilising the pam_mysql authentication
service is stored.
|
| options/nixos/services.varnish.listen.*.user | User name who owns the socket file.
|
| options/home-manager/programs.sbt.repositories | A list of repositories to use when resolving dependencies
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.ocsp_uris | List of OCSP URIs
|
| options/home-manager/programs.borgmatic.backups.<name>.storage.encryptionPasscommand | Command writing the passphrase to standard output.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote_addrs | Remote address(es) to use for IKE communication
|
| options/nixos/services.cassandra.jmxRoles.*.username | Username for JMX
|
| options/nixos/services.prometheus.exporters.postfix.systemd.journalPath | Path to the systemd journal.
|
| options/nixos/services.syncthing.settings.folders.<name>.ignorePatterns | Syncthing can be configured to ignore certain files in a folder using ignore patterns
|
| options/nixos/services.tor.client.onionServices.<name>.clientAuthorizations | Clients' authorizations for a v3 onion service,
as a list of files containing each one private key, in the format:
descriptor:x25519:<base32-private-key>
See torrc manual.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.pull | If the default of yes is used, Mode Config works in pull mode, where the
initiator actively requests a virtual IP
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.filters.*.name | Name of the filter
|
| options/nixos/services.skydns.nameservers | Skydns list of nameservers to forward DNS requests to when not authoritative for a domain.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.jellyfin.hardwareAcceleration.device | Path to the hardware acceleration device that Jellyfin should use
|
| options/nixos/services.nextcloud-spreed-signaling.settings.turn.apikeyFile | The path to the file containing the value for turn.apikey
|
| options/nixos/services.prometheus.exporters.restic.repositoryFile | Path to the file containing the URI for the repository to monitor.
|
| options/nixos/services.lldap.settings.jwt_secret_file | Path to a file containing the JWT secret.
|
| options/nixos/services.prometheus.exporters.postgres.telemetryPath | Path under which to expose metrics.
|
| options/nixos/services.nextcloud-spreed-signaling.settings.turn.secretFile | The path to the file containing the value for turn.secret
|
| options/nixos/virtualisation.docker.rootless.extraPackages | Extra packages to add to PATH for the docker daemon process.
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.disableChunkedEncoding | Disables chunked transfer encoding
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.slot | Require pg_receivewal to use an existing replication slot (see
Section 26.2.6 of the PostgreSQL manual)
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.presharedKey | Base64 preshared key generated by wg genpsk
|
| options/nixos/services.akkoma.config.":pleroma".":instance".static_dir | Directory of static files
|
| options/nixos/services.prometheus.exporters.sabnzbd.servers.*.apiKeyFile | The path to a file containing the API key
|
| options/nixos/services.jupyter.group | Name of the group used to run the jupyter service
|
| options/nixos/services.cachix-agent.profile | Profile name, defaults to 'system' (NixOS).
|
| options/nixos/services.davfs2.davGroup | The group of the running mount.davfs daemon
|
| options/nixos/services.baikal.virtualHost | Name of the nginx virtualhost to use and setup
|
| options/nixos/services.ceph.global.clusterName | Name of cluster
|
| options/nixos/services.sympa.web.server | The webserver used for the Sympa web interface
|
| options/nixos/services.powerdns.enable | Whether to enable PowerDNS domain name server.
|
| options/nixos/services.rshim.backend | Specify the backend to attach
|
| options/nixos/services.weblate.localDomain | The domain name serving your Weblate instance.
|
| options/home-manager/services.wlsunset.output | Name of output to use, by default all outputs are used.
|
| options/nixos/services.authelia.instances.<name>.environmentVariables | Additional environment variables to provide to authelia
|
| options/nixos/services.dependency-track.settings."alpine.data.directory" | Defines the path to the data directory
|
| options/nixos/services.prometheus.exporters.ecoflow.ecoflowEmailFile | Path to the file with your personal ecoflow app login email address
|
| options/nixos/services.prometheus.alertmanagerGotify.webhookPath | The URL path to handle requests on.
|
| options/nixos/services.xserver.windowManager.herbstluftwm.configFile | Path to the herbstluftwm configuration file
|
| options/nixos/services.prometheus.remoteRead.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.ghostunnel.servers.<name>.disableAuthentication | Disable client authentication, no client certificate will be required.
|
| options/nixos/services.paperless.passwordFile | A file containing the superuser password
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners | List of ports that this worker should listen on, their purpose and their configuration.
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.password | Password for the api transport
|
| options/nixos/services.tor.torsocks.socks5Username | SOCKS5 username
|
| options/nixos/networking.wireguard.interfaces.<name>.interfaceNamespace | The pre-existing network namespace the WireGuard
interface is moved to
|
| options/nixos/services.prometheus.exporters.buildkite-agent.tokenPath | The token from your Buildkite "Agents" page
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.instance | Assign a icinga instance to this transport
|
| options/nixos/networking.nameservers | The list of nameservers
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.conflictResolution | What to do in case of a conflict between the storages
|
| options/nixos/services.dawarich.user | User under which dawarich runs
|
| options/nixos/services.echoip.virtualHost | Name of the nginx virtual host to use and setup
|
| options/nixos/services.gitlab.databaseName | GitLab database name.
|
| options/nixos/services.cachix-watch-store.cacheName | Cachix binary cache name
|
| options/nixos/services.openafsServer.cellName | Cell name, this server will serve.
|
| options/nixos/services.smokeping.owner | Real name of the owner of the instance
|
| options/nixos/services.weechat.sessionName | Name of the screen session for weechat.
|
| options/nixos/services.znc.confOptions.userName | The user name used to log in to the ZNC web admin interface.
|
| options/home-manager/programs.claude-code.hooks | Custom hooks for Claude Code
|
| options/nixos/networking.hostName | The name of the machine
|
| options/nixos/services.icecream.daemon.hostname | Hostname of the daemon in the icecream infrastructure
|
| options/nixos/services.firezone.server.smtp.username | Username to authenticate against the SMTP relay
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.resource | SSH identity resource for the remote transport
|
| options/nixos/services.prometheus.exporters.rasdaemon.databasePath | Path to the RAS daemon machine check event database.
|
| options/nixos/services.outline.oidcAuthentication.clientSecretFile | File path containing the authentication secret.
|
| options/nixos/services.prometheus.exporters.pgbouncer.pidFile | Path to PgBouncer pid file
|
| options/nixos/services.prometheus.exporters.restic.rcloneConfigFile | Path to the file containing rclone configuration
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.version | IKE major version to use for connection.
- 1 uses IKEv1 aka ISAKMP,
- 2 uses IKEv2.
- A connection using the default of 0 accepts both IKEv1 and IKEv2 as
responder, and initiates the connection actively with IKEv2
|
| options/nixos/services.microsocks.authUsername | Optional username to use for authentication.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local | Section for a local authentication round
|
| options/nixos/services.prometheus.remoteWrite.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.exporters.nginxlog.metricsEndpoint | Path under which to expose metrics.
|
| options/nixos/services.mjolnir.pantalaimon.options.homeserver | The URI of the homeserver that the pantalaimon proxy should
forward requests to, without the matrix API path but including
the http(s) schema.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.sslCertificate | Path to server SSL certificate.
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.keepAliveConnections | Maximum number of idle keepalive connections between Tunnel and your origin
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.type | The type of the listener, usually http.
|
| options/nixos/services.nullmailer.config.defaulthost | The content of this attribute is appended to any address that
is missing a host name
|
| options/nixos/services.bitlbee.hostName | Normally, BitlBee gets a hostname using getsockname()
|
| options/nixos/services.jupyter.user | Name of the user used to run the jupyter service
|
| options/nixos/services.alerta.databaseName | Name of the database instance to connect to
|
| options/nixos/services.pretalx.nginx.domain | The domain name under which to set up the virtual host.
|
| options/nixos/services.varnish.listen.*.group | Group name who owns the socket file.
|
| options/home-manager/programs.mercurial.userName | Default user name to use.
|
| options/nixos/services.meilisearch.masterKeyEnvironmentFile | Path to file which contains the master key
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.cacert | Path to CA bundle file (PEM/X509)
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.supplementaryScopeMaps | Maps kanidm groups to additionally returned oauth scopes
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.mode | File permissions on the UNIX domain socket.
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.port | The port to listen for HTTP(S) requests on.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.local_trash_tag | Local tag to which the remote Gmail 'TRASH' label is translated.
|
| options/nixos/services.fluent-bit.configurationFile | Fluent Bit configuration
|
| options/nixos/services.prometheus.exporters.smokeping.telemetryPath | Path under which to expose metrics.
|
| options/nixos/services.prometheus.exporters.pgbouncer.telemetryPath | Path under which to expose metrics.
|
| options/nixos/services.outline.azureAuthentication.clientSecretFile | File path containing the authentication secret.
|
| options/nixos/services.prometheus.exporters.junos-czerwonk.telemetryPath | Path under which to expose metrics.
|
| options/nixos/systemd.network.networks.<name>.enhancedTransmissionSelectionConfig | Each attribute in this set specifies an option in the
[EnhancedTransmissionSelection] section of the unit
|
| options/nixos/services.btrbk.instances.<name>.settings.stream_compress | Compress the btrfs send stream before transferring it from/to remote locations using a
compression command.
|
| options/nixos/services.bcg.automaticRenameGenericNodes | Automatically rename generic nodes.
|
| options/nixos/services.hqplayerd.auth.username | Username used for HQPlayer's WebUI
|
| options/nixos/services.prometheus.exporters.imap-mailstat.accounts.<name>.serverport | imap port number (at the moment only tls connection is supported)
|
| options/nixos/users.users.<name>.initialPassword | Specifies the initial password for the user, i.e. the
password assigned if the user does not already exist
|
| options/nixos/services.gammu-smsd.backend.sql.user | User name used for connection to the database
|
| options/nixos/services.ddclient.domains | Domain name(s) to synchronize.
|
| options/nixos/services.smokeping.hostName | DNS name for the urls generated in the cgi.
|
| options/nixos/services.rss-bridge.virtualHost | Name of the nginx or caddy virtualhost to use and setup
|
| options/nixos/services.netatalk.extmap | File name extension mappings
|
| options/nixos/services.sympa.database.user | Database user
|
| options/nixos/services.nextcloud.config.objectstore.s3.sseCKeyFile | If provided this is the full path to a file that contains the key
to enable [server-side encryption with customer-provided keys][1]
(SSE-C)
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/virtualisation.xen.store.settings.xenstored.log.file | Path to the Xen Store log file.
|
| options/nixos/services.deye-dummycloud.mqttUsername | MQTT username
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote | Section for a remote authentication round
|
| options/nixos/services.kerberos_server.settings.realms.<name>.acl.*.principal | Which principal the rule applies to
|
| options/nixos/services.xserver.displayManager.lightdm.greeter.package | The LightDM greeter to login via
|
| options/nixos/services.easytier.instances.<name>.settings.network_secret | EasyTier network credential used for verification and
encryption
|
| options/nixos/services.castopod.database.hostname | Database hostname.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.mediation | Whether this connection is a mediation connection, that is, whether this
connection is used to mediate other connections using the IKEv2 Mediation
Extension
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.synchronous | Flush the WAL data to disk immediately after it has been received
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.tls | Whether to enable TLS on the listener socket.
This option will be ignored for UNIX domain sockets.
|
| options/nixos/networking.dhcpcd.setHostname | Whether to set the machine hostname based on the information
received from the DHCP server.
The hostname will be changed only if the current one is
the empty string, localhost or nixos
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.exactPermissions | When enabled,
programs.librewolf.profiles.<profile>.extensions.settings.<extensionID>.permissions
must specify the exact set of permissions that the
extension will request
|
| options/nixos/services.prometheus.exporters.sql.configuration.jobs.<name>.queries | SQL queries to run.
|
| options/nixos/services.tor.relay.onionServices.<name>.settings.HiddenServiceNumIntroductionPoints | See torrc manual.
|
| options/nixos/services.prometheus.exporters.ecoflow.ecoflowAccessKeyFile | Path to the file with your personal api access string from the Ecoflow development website https://developer-eu.ecoflow.com
|
| options/nixos/services.prometheus.exporters.ecoflow.ecoflowSecretKeyFile | Path to the file with your personal api secret string from the Ecoflow development website https://developer-eu.ecoflow.com
|
| options/nixos/services.matrix-appservice-irc.settings.ircService.mediaProxy.signingKeyPath | Path to the signing key file for authenticated media.
|
| options/home-manager/programs.ripgrep-all.custom_adapters.*.output_path_hint | Setting this is useful if the output format is not plain text (.txt) but instead some other format that should be passed to another adapter
|
| options/nixos/services.samba.nmbd.enable | Whether to enable Samba's nmbd, which replies to NetBIOS over IP name
service requests
|
| options/nixos/services.smokeping.user | User that runs smokeping and (optionally) thttpd
|
| options/nixos/services.vault.storageBackend | The name of the type of storage backend
|
| options/nixos/services.wakapi.database.user | The name of the user to use for Wakapi.
|
| options/darwin/services.gitlab-runner.sentryDSN | Data Source Name for tracking of all system level errors to Sentry.
|
| options/home-manager/vdirsyncer.userNameCommand | A command that prints the user name to standard output.
|
| options/home-manager/programs.radio-active.aliases | Key/value pairs where the key is name of radio station and value is URL.
|
| options/home-manager/services.gromit-mpx.tools.*.device | Use this tool with the given xinput device
|
| options/nixos/services.outline.googleAuthentication.clientSecretFile | File path containing the authentication secret.
|
| options/nixos/services.limesurvey.nginx.virtualHost.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| options/nixos/hardware.display.edid.linuxhw | Exposes EDID files from users-sourced database at https://github.com/linuxhw/EDID
Attribute names will be mapped to EDID filenames <NAME>.bin
|
| options/nixos/services.hadoop.hdfs.namenode.openFirewall | Open firewall ports for HDFS NameNode.
|
| options/nixos/services.biboumi.settings.hostname | The hostname served by the XMPP gateway
|
| options/nixos/services.kubernetes.apiserver.serviceAccountSigningKeyFile | Path to the file that contains the current private key of the service
account token issuer
|
| options/nixos/services.multipath.devices.*.marginal_path_err_rate_threshold | The error rate threshold as a permillage (1/1000)
|
| options/nixos/services.grafana.settings.server.serve_from_sub_path | Serve Grafana from subpath specified in the root_url setting
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.esp_proposals | ESP proposals to offer for the CHILD_SA
|
| options/nixos/services.kubernetes.proxy.hostname | Kubernetes proxy hostname override.
|
| options/nixos/services.maubot.settings.server.hostname | The IP to listen on
|
| options/nixos/services.bird-lg.frontend.domain | Server name domain suffixes.
|
| options/nixos/services.avahi.publish.domain | Whether to announce the locally used domain name for browsing by other hosts.
|
| options/nixos/programs.regreet.font.package | The package that provides the font given in the name option.
|
| options/nixos/services.gitlab.registry.host | GitLab container registry host name.
|
| options/nixos/services.oidentd.enable | Whether to enable ‘oidentd’, an implementation of the Ident
protocol (RFC 1413)
|
| options/nixos/services.pangolin.baseDomain | Your base fully qualified domain name (without any subdomains).
|
| options/home-manager/programs.sbt.plugins.*.artifact | The name of the artifact.
|
| options/nixos/services.kerberos_server.settings.realms.<name>.acl.*.access | The changes the principal is allowed to make.
The "all" permission does not imply the "get-keys" permission
|
| options/nixos/services.matrix-synapse.settings.tls_private_key_path | PEM encoded private key for TLS
|
| options/nixos/services.prometheus.scrapeConfigs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.exporters.sql.configuration.jobs.<name>.startupSql | A list of SQL statements to execute once after making a connection.
|
| options/nixos/services.matrix-continuwuity.settings.global.server_name | The server_name is the name of this server
|
| options/nixos/services.opentelemetry-collector.validateConfigFile | Whether to enable Validate configuration file.
|
| options/nixos/services.magnetico.web.credentialsFile | The path to the file holding the credentials to access the web
interface
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.mobike | Enables MOBIKE on IKEv2 connections
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.dpd_delay | Interval to check the liveness of a peer actively using IKEv2
INFORMATIONAL exchanges or IKEv1 R_U_THERE messages
|
| options/nixos/services.xserver.displayManager.session | List of sessions supported with the command used to start each
session
|
| options/nixos/services.bookstack.mail.fromName | Mail "from" name.
|
| options/nixos/services.corosync.clusterName | Name of the corosync cluster.
|
| options/nixos/services.prefect.databaseName | database name for postgres only
|
| options/nixos/services.smokeping.linkStyle | DNS name for the urls generated in the cgi.
|
| options/nixos/services.netbird.enable | Enables backward-compatible NetBird client service
|
| options/nixos/services.samba-wsdd.workgroup | Set workgroup name (default WORKGROUP).
|
| options/nixos/services.tomcat.virtualHosts | List consisting of a virtual host name and a list of web applications to deploy on each virtual host
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.exhaustivePermissions | When enabled, the user must authorize requested
permissions for all extensions from
programs.floorp.profiles.<profile>.extensions.packages
in
programs.floorp.profiles.<profile>.extensions.settings.<extensionID>.permissions
|
| options/nixos/services.prometheus.exporters.scaphandre.telemetryPath | Path under which to expose metrics.
|
| options/nixos/services.outline.slackIntegration.verificationTokenFile | File path containing the verification token.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.rand_time | Time range from which to choose a random value to subtract from
rekey/reauth times
|
| options/nixos/services.vsmartcard-vpcd.hostname | Hostname of a waiting vpicc server vpcd will be connecting to
|
| options/nixos/services.outline.discordAuthentication.clientSecretFile | File path containing the authentication secret.
|
| options/nixos/users.extraUsers.<name>.initialPassword | Specifies the initial password for the user, i.e. the
password assigned if the user does not already exist
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.if_id_in | XFRM interface ID set on inbound policies/SA, can be overridden by child
config, see there for details
|
| options/nixos/virtualisation.fileSystems.<name>.overlay.useStage1BaseDirectories | If enabled, lowerdir, upperdir and workdir will be prefixed with /sysroot
|
| options/nixos/services.prometheus.exporters.ecoflow.ecoflowPasswordFile | Path to the file with your personal ecoflow app login email password
|
| options/nixos/security.agnos.settings.accounts.*.certificates.*.fullchain_output_file | Output path for the full chain including the acquired certificate
|
| options/nixos/services.factorio.stateDirName | Name of the directory under /var/lib holding the server's data
|
| options/nixos/services.autorandr.matchEdid | Match displays based on edid instead of name
|
| options/nixos/services.shairport-sync.user | User account name under which to run shairport-sync
|
| options/nixos/services.misskey.settings.db.db | The database name.
|
| options/nixos/services.samba.nsswins | Whether to enable WINS NSS (Name Service Switch) plug-in
|
| options/nixos/services.xserver.videoDriver | The name of the video driver for your graphics card
|
| options/home-manager/services.autorandr.matchEdid | Match displays based on edid instead of name.
|
| options/home-manager/programs.qutebrowser.searchEngines | Search engines that can be used via the address bar
|
| options/nixos/networking.wireguard.interfaces.<name>.dynamicEndpointRefreshSeconds | Periodically refresh the endpoint hostname or address for all peers
|
| options/nixos/services.prometheus.globalConfig.query_log_file | Path to the file prometheus should write its query log to.
|
| options/nixos/services.vmagent.remoteWrite.basicAuthUsername | Basic Auth username used to connect to remote_write endpoint
|
| options/nixos/services.vlagent.remoteWrite.basicAuthUsername | Basic Auth username used to connect to remote_write endpoint
|
| options/nixos/services.prometheus.exporters.sql.configuration.jobs.<name>.interval | How often to run this job, specified in
Go duration format.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.send_cert | Send certificate payloads when using certificate authentication.
- With the default of
ifasked the daemon sends
certificate payloads only if certificate requests have been received.
never disables sending of certificate payloads
altogether,
always causes certificate payloads to be sent
unconditionally whenever certificate authentication is used
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.exhaustivePermissions | When enabled, the user must authorize requested
permissions for all extensions from
programs.firefox.profiles.<profile>.extensions.packages
in
programs.firefox.profiles.<profile>.extensions.settings.<extensionID>.permissions
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.persistentKeepalive | This is optional and is by default off, because most
users will not need it
|
| options/nixos/services.influxdb2.provision.organizations.<name>.description | Optional description for the organization.
|
| options/nixos/services.borgmatic.configurations.<name>.repositories.*.label | Label to the repository
|
| options/nixos/services.athens.storage.s3.bucket | Bucket name for the S3 storage backend.
|
| options/nixos/programs.regreet.theme.package | The package that provides the theme given in the name option.
|
| options/nixos/services.ncps.cache.storage.s3.bucket | The name of the S3 bucket.
|
| options/nixos/services.usbrelayd.clientName | Name, your client connects as.
|
| options/home-manager/programs.lazygit.shellWrapperName | Name of the shell wrapper to be called.
|
| options/nixos/virtualisation.xen.store.settings.xenstored.accessLog.file | Path to the Xen Store access log file.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.matrix-synapse.settings.tls_certificate_path | PEM encoded X509 certificate for TLS
|
| options/nixos/services.gnome.at-spi2-core.enable | Whether to enable at-spi2-core, a service for the Assistive Technologies
available on the GNOME platform
|
| options/nixos/services.bird-lg.frontend.servers | Server name prefixes.
|
| options/nixos/services.factorio.saveName | The name of the savegame that will be used by the server
|
| options/nixos/services.jigasi.defaultJvbRoomName | Name of the default JVB room that will be joined if no special header is included in SIP invite.
|
| options/nixos/services.freshrss.virtualHost | Name of the caddy/nginx virtualhost to use and setup.
|
| options/nixos/services.mattermost.siteName | Name of this Mattermost site.
|
| options/nixos/services.prosody.httpFileShare.domain | Domain name for a http_file_share service.
|
| options/nixos/services.miredo.interfaceName | Name of the network tunneling interface.
|
| options/nixos/swapDevices.*.encrypted.label | Label of the unlocked encrypted device
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.if_id_out | XFRM interface ID set on outbound policies/SA, can be overridden by child
config, see there for details
|
| options/nixos/services.discourse.database.username | Discourse database user.
|
| options/nixos/services.tlsrpt.reportd.settings.sendmail_script | Path to a sendmail-compatible executable for delivery reports.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| options/nixos/services.prosody.uploadHttp.domain | Domain name for the http-upload service
|
| options/nixos/services.keyd.keyboards | Configuration for one or more device IDs
|
| options/nixos/services.autossh.sessions.*.user | Name of the user the AutoSSH session should run as
|
| options/nixos/services.kresd.enable | Whether to enable knot-resolver (version 5) domain name server
|
| options/nixos/services.avahi.nssmdns4 | Whether to enable the mDNS NSS (Name Service Switch) plug-in for IPv4
|
| options/nixos/services.outline.storage.region | AWS S3 region name.
|
| options/nixos/services.shairport-sync.group | Group account name under which to run shairport-sync
|
| options/nixos/services.rspamd.overrides | Overridden configuration files, written into /etc/rspamd/override.d/{name}.
|
| options/darwin/services.autossh.sessions.*.user | Name of the user the AutoSSH session should run as
|
| options/home-manager/programs.ncmpcpp.settings | Attribute set from name of a setting to its value
|
| options/home-manager/programs.gnome-shell.theme.package | Package providing a GNOME Shell theme in
$out/share/themes/${name}/gnome-shell.
|
| options/nixos/services.nextjs-ollama-llm-ui.hostname | The hostname under which the Ollama UI interface should be accessible
|
| options/nixos/services.keycloak.settings.hostname | The hostname part of the public URL used as base for
all frontend requests
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.keystore | Path to keystore (combined PEM with cert/key, or PKCS12 keystore)
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.ppk_required | Whether a Postquantum Preshared Key (PPK) is required for this connection
|
| options/nixos/environment.profileRelativeSessionVariables | Attribute set of environment variable used in the global
environment
|
| options/nixos/services.prometheus.exporters.snmp.configurationPath | Path to a snmp exporter configuration file
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote_port | Remote UDP port for IKE communication
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.aggressive | Enables Aggressive Mode instead of Main Mode with Identity
Protection
|
| options/nixos/services.nextcloud-spreed-signaling.backends | A list of backends from which clients are allowed to connect from
|
| options/nixos/services.consul.interface.bind | The name of the interface to pull the bind_addr from.
|
| options/nixos/services.airsonic.virtualHost | Name of the nginx virtualhost to use and setup
|
| options/nixos/services.discourse.admin.fullName | The admin user's full name.
|
| options/nixos/services.guacamole-server.host | The host name or IP address the server should listen to.
|
| options/nixos/services.cloudlog.virtualHost | Name of the nginx virtualhost to use and setup
|
| options/nixos/services.wiki-js.stateDirectoryName | Name of the directory in /var/lib.
|
| options/nixos/services.prometheus.scrapeConfigs.*.serverset_sd_configs.*.paths | Paths can point to a single service, or the root of a tree of services.
|
| options/nixos/services.prometheus.exporters.unbound.unbound.certificate | Path to the Unbound control socket certificate
|
| options/nixos/services.prometheus.alertmanager.webExternalUrl | The URL under which Alertmanager is externally reachable (for example, if Alertmanager is served via a reverse proxy)
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.resources | List of HTTP resources to serve on this listener.
|
| options/nixos/services.echoip.enableReverseHostnameLookups | Whether to enable reverse hostname lookups.
|
| options/nixos/services.kubernetes.kubelet.hostname | Kubernetes kubelet hostname override.
|
| options/nixos/services.matrix-synapse.log | Default configuration for the loggers used by matrix-synapse and its workers
|
| options/nixos/services.hadoop.hdfs.namenode.formatOnInit | Format HDFS namenode on first start
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.password_command | Shell command which will print a password to stdout for basic HTTP
authentication
|
| options/nixos/services.tsmBackup.servername | Create a systemd system service
tsm-backup.service that starts
a backup based on the given servername's stanza
|
| options/nixos/services.zfs.autoReplication.username | Username used by SSH to login to remote host.
|
| options/nixos/services.synergy.client.screenName | Use the given name instead of the hostname to identify
ourselves to the server.
|
| options/nixos/services.unpoller.influxdb.db | Database name
|
| options/nixos/services.thanos.rule.alert.label-drop | Labels by name to drop before sending to alertmanager
|
| options/nixos/services.youtrack.virtualHost | Name of the nginx virtual host to use and setup
|
| options/darwin/services.synergy.client.screenName | Use the given name instead of the hostname to identify
ourselves to the server.
|
| options/nixos/services.prometheus.exporters.unpoller.controllers.*.pass | Path of a file containing the password for the unifi service user
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.over_time | Hard IKE_SA lifetime if rekey/reauth does not complete, as time
|
| options/nixos/virtualisation.sharedDirectories.<name>.securityModel | The security model to use for this share:
passthrough: files are stored using the same credentials as they are created on the guest (this requires QEMU to run as root)
mapped-xattr: some of the file attributes like uid, gid, mode bits and link target are stored as file attributes
mapped-file: the attributes are stored in the hidden .virtfs_metadata directory
|
| options/nixos/services.gitlab.secrets.activeRecordDeterministicKeyFile | A file containing the secret used to encrypt some rails data in a deterministic way
in the DB
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.dpd_timeout | Charon by default uses the normal retransmission mechanism and timeouts to
check the liveness of a peer, as all messages are used for liveness
checking
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.exhaustivePermissions | When enabled, the user must authorize requested
permissions for all extensions from
programs.librewolf.profiles.<profile>.extensions.packages
in
programs.librewolf.profiles.<profile>.extensions.settings.<extensionID>.permissions
|
| options/nixos/services.ncdns.identity.hostname | The hostname of this ncdns instance, which defaults to the machine
hostname
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.dynamicEndpointRefreshSeconds | Periodically re-execute the wg utility every
this many seconds in order to let WireGuard notice DNS / hostname
changes
|
| options/nixos/services.nextcloud-spreed-signaling.settings.https.certificate | Path to the certificate used for the HTTPS listener
|
| options/nixos/programs.regreet.iconTheme.package | The package that provides the icon theme given in the name option.
|
| options/nixos/services.synergy.server.screenName | Use the given name instead of the hostname to identify
this screen in the configuration.
|
| options/nixos/services.stargazer.routes.*.route | Route section name
|
| options/nixos/services.lasuite-meet.settings.DB_NAME | Name of the database
|
| options/nixos/services.lasuite-docs.settings.DB_NAME | Name of the database
|
| options/darwin/services.synergy.server.screenName | Use the given name instead of the hostname to identify
this screen in the configuration.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local_port | Local UDP port for IKE communication
|
| options/nixos/services.nextcloud-spreed-signaling.settings.sessions.hashkeyFile | The path to the file containing the value for sessions.hashkey
|
| options/nixos/services.jibri.xmppEnvironments.<name>.disableCertificateVerification | Whether to skip validation of the server's certificate.
|
| options/nixos/services.namecoind.rpc.certificate | Certificate file for securing RPC connections.
|
| options/nixos/services.discourse.mail.outgoing.username | The username of the SMTP server.
|
| options/nixos/services.tlsrpt.reportd.settings.organization_name | Name of the organization sending out the reports.
|
| options/nixos/services.sanoid.datasets.<name>.pre_snapshot_script | Script to run before taking snapshot.
|
| options/nixos/services.cloudlog.database.user | MySQL user name.
|
| options/nixos/services.syncplay.useACMEHost | If set, use NixOS-generated ACME certificate with the specified name for TLS
|
| options/nixos/services.slurm.dbdserver.dbdHost | Hostname of the machine where slurmdbd
is running (i.e. name returned by hostname -s).
|
| options/nixos/services.supybot.plugins | Attribute set of additional plugins that will be symlinked to the
plugin subdirectory
|
| options/nixos/systemd.network.config.routeTables | Defines route table names as an attrset of name to number
|
| options/nixos/services.zabbixWeb.httpd.virtualHost | Apache configuration can be done by adapting services.httpd.virtualHosts.<name>
|
| options/nixos/services.zabbixWeb.nginx.virtualHost | Nginx configuration can be done by adapting services.nginx.virtualHosts.<name>
|
| options/nixos/services.dependency-track.settings."alpine.oidc.teams.claim" | Defines the name of the claim that contains group memberships or role assignments in the provider's userinfo endpoint
|
| options/nixos/services.prometheus.exporters.ebpf.names | List of eBPF programs to load
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.rekey_time | IKE rekeying refreshes key material using a Diffie-Hellman exchange, but
does not re-check associated credentials
|
| options/nixos/services.tor.settings.ServerDNSAllowNonRFC953Hostnames | See torrc manual.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.keyingtries | Number of retransmission sequences to perform during initial
connect
|
| options/nixos/services.nullmailer.config.defaultdomain | The content of this attribute is appended to any host name that
does not contain a period (except localhost), including defaulthost
and idhost
|
| options/nixos/services.filesender.database.hostname | Database hostname.
|
| options/nixos/networking.networkmanager.dispatcherScripts.*.source | Path to the hook script.
|
| options/nixos/services.athens.storage.minio.bucket | Bucket name for the minio storage backend.
|
| options/nixos/services.soju.acceptProxyIP | Allow the specified IPs to act as a proxy
|
| options/nixos/services.writefreely.host | The public host name to serve.
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.dynamicEndpointRefreshRestartSeconds | When the dynamic endpoint refresh that is configured via
dynamicEndpointRefreshSeconds exits (likely due to a failure),
restart that service after this many seconds
|
| options/nixos/services.zoneminder.database.username | Username for accessing the database.
|
| options/nixos/services.grafana.settings.database.server_cert_name | The common name field of the certificate used by the mysql or postgres server
|
| options/nixos/services.nextcloud-spreed-signaling.settings.sessions.blockkeyFile | The path to the file containing the value for sessions.blockkey
|
| options/nixos/services.warpgate.settings.http.sni_certificates.*.key | Path to private key.
|
| options/nixos/services.jitsi-videobridge.xmppConfigs.<name>.disableCertificateVerification | Whether to skip validation of the server's certificate.
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.persistentKeepalive | This is optional and is by default off, because most
users will not need it
|
| options/home-manager/programs.lutris.runners.<name>.settings.runner.runner_executable | Specific option to point to a runner executable directly, don't set runner.package if you set this
|
| options/nixos/services.pgpkeyserver-lite.hostname | Which hostname to set the vHost to that is proxying to sks.
|
| options/nixos/services.hatsu.settings.HATSU_DOMAIN | The domain name of your instance (eg 'hatsu.local').
|
| options/nixos/services.icingaweb2.pool | Name of existing PHP-FPM pool that is used to run Icingaweb2
|
| options/nixos/image.repart.verityStore.partitionIds.esp | Specify the attribute name of the ESP.
|
| options/nixos/services.coder.database.database | Name of database.
|
| options/nixos/services.cjdns.ETHInterface.bind | Bind to this device for native ethernet operation.
all is a pseudo-name which will try to connect to all devices.
|
| options/nixos/services.cadvisor.storageDriverDb | Cadvisord storage driver database name.
|
| options/nixos/services.athens.index.mysql.database | Database name for the MySQL database.
|
| options/home-manager/programs.zsh.siteFunctions | Functions that are added to the Zsh environment and are subject to
autoloading
|
| options/nixos/services.prometheus.exporters.sql.configuration.jobs.<name>.connections | A list of connection strings of the SQL servers to scrape metrics from
|
| options/nixos/services.keycloak.database.username | Username to use when connecting to an external or manually
provisioned database; has no effect when a local database is
automatically provisioned
|
| options/home-manager/programs.offlineimap.extraConfig.mbnames | Extra configuration options added to the
mbnames section.
|
| options/nixos/services.sanoid.templates.<name>.pre_snapshot_script | Script to run before taking snapshot.
|
| options/nixos/services.mjolnir.pantalaimon.username | The username to login with.
|
| options/nixos/services.pds.settings.PDS_HOSTNAME | Instance hostname (base domain name)
|
| options/nixos/services.resolved.llmnr | Controls Link-Local Multicast Name Resolution support
(RFC 4795) on the local host
|
| options/nixos/hardware.firmware | List of packages containing firmware files
|
| options/nixos/services.davis.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.movim.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.misskey.reverseProxy.host | The fully qualified domain name to bind to
|
| options/nixos/services.slskd.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.minetest-server.world | Name of the world to use
|
| options/nixos/services.shellhub-agent.preferredHostname | Set the device preferred hostname
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.namespaces.names | Namespace name.
|
| options/nixos/services.firewalld.settings.IPv6_rpfilter | Performs reverse path filtering (RPF) on IPv6 packets as per RFC 3704
|
| options/nixos/networking.ucarp.upscript | Command to run after become master, the interface name, virtual address
and optional extra parameters are passed as arguments.
|
| options/nixos/boot.zfs.extraPools | Name or GUID of extra ZFS pools that you wish to import during boot
|
| options/nixos/services.slurm.controlMachine | The short hostname of the machine where SLURM control functions are
executed (i.e. the name returned by the command "hostname -s", use "tux001"
rather than "tux001.my.com").
|
| options/nixos/services.snipe-it.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.netbird.server.signal.domain | The domain name for the signal service.
|
| options/nixos/services.xserver.xrandrHeads.*.output | The output name of the monitor, as shown by
xrandr(1) invoked without arguments.
|
| options/nixos/networking.networkmanager.ensureProfiles.profiles.<name>.connection.type | The connection type defines the connection kind, like vpn, wireguard, gsm, wifi and more.
|
| options/nixos/services.rustus.storage.s3_access_key_file | File path that contains the S3 access key.
|
| options/nixos/services.rustus.storage.s3_secret_key_file | File path that contains the S3 secret key.
|
| options/nixos/services.teeworlds.game.tournamentMode | Whether to enable tournament mode
|
| options/nixos/services.knot-resolver.enable | Whether to enable knot-resolver (version 6) domain name server
|
| options/nixos/services.gitea.settings.server.DOMAIN | Domain name of your server.
|
| options/nixos/services.openvscode-server.host | The host name or IP address the server should listen to.
|
| options/nixos/services.mastodon.user | User under which mastodon runs
|
| options/nixos/services.tailscale.derper.domain | Domain name under which the derper server is reachable.
|
| options/nixos/services.restic.server.privateRepos | Enable private repos
|
| options/nixos/services.livekit.keyFile | LiveKit key file holding one or multiple application secrets
|
| options/nixos/services.vault-agent.instances | Attribute set of vault-agent instances
|
| options/nixos/virtualisation.virtualbox.host.enableHardening | Enable hardened VirtualBox, which ensures that only the binaries in the
system path get access to the devices exposed by the kernel modules
instead of all users in the vboxusers group.
Disabling this can put your system's security at risk, as local users
in the vboxusers group can tamper with the VirtualBox device files.
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.x_forwarded | Use the X-Forwarded-For (XFF) header as the client IP and not the
actual client IP.
|
| options/nixos/services.borgmatic.configurations.<name>.repositories | A required list of local or remote repositories with paths and
optional labels (which can be used with the --repository flag to
select a repository)
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.unique | Connection uniqueness policy to enforce
|
| options/nixos/services.reposilite.settings.hostname | The hostname to bind to
|
| options/nixos/services.buildbot-worker.adminMessage | Name of the administrator of this worker
|
| options/nixos/services._3proxy.resolution | Use this option to configure name resolution and DNS caching.
|
| options/nixos/programs.regreet.cursorTheme.package | The package that provides the cursor theme given in the name option.
|
| options/nixos/services.tailscale.authKeyFile | A file containing the auth key
|
| options/nixos/services.nominatim.enable | Whether to enable nominatim
|
| options/nixos/services.ncps.cache.lru.scheduleTimeZone | The name of the timezone to use for the cron schedule
|
| options/nixos/services.trilium-server.instanceName | Instance name used to distinguish between different instances
|
| options/darwin/system.defaults.finder._FXSortFoldersFirst | Keep folders on top when sorting by name
|
| options/nixos/services.firezone.server.provision.accounts.<name>.features.flow_activities | Whether to enable the flow_activities feature for this account.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.features.traffic_filters | Whether to enable the traffic_filters feature for this account.
|
| options/nixos/services.dsnet.settings.ExternalHostname | The hostname that clients should use to connect to this server
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local_addrs | Local address(es) to use for IKE communication
|
| options/nixos/services.sanoid.datasets.<name>.post_snapshot_script | Script to run after taking snapshot.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.send_certreq | Send certificate request payloads to offer trusted root CA certificates to
the peer
|
| options/nixos/services.suricata.settings.unix-command.filename | Filename for unix-command socket.
|
| options/nixos/services.postfix.networksStyle | Name of standard way of trusted network specification to use,
leave blank if you specify it explicitly or if you want to use
default (localhost-only).
|
| options/nixos/services.gotify.stateDirectoryName | The name of the directory below /var/lib where
gotify stores its runtime data.
|
| options/nixos/services.gancio.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.fluidd.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.gammu-smsd.backend.sql.database | Database name to store sms data
|
| options/nixos/programs.kubeswitch.commandName | The name of the command to use
|
| options/nixos/services.gitlab.registry.serviceName | GitLab container registry service name.
|
| options/nixos/services.akkoma.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.portunus.ldap.searchUserName | The login name of the search user
|
| options/nixos/services.matomo.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.monica.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.roundcube.enable | Whether to enable roundcube
|
| options/nixos/users.ldap.daemon.rootpwmoddn | The distinguished name to use to bind to the LDAP server
when the root user tries to modify a user's password.
|
| options/darwin/services.postgresql.identMap | Defines the mapping from system users to database users
|
| options/home-manager/programs.kubeswitch.commandName | The name of the command to use
|
| options/home-manager/services.linux-wallpaperengine.wallpapers.*.wallpaperId | Wallpaper to be used
|
| options/nixos/services.postfix.settings.main.myhostname | The internet hostname of this mail system
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.cert_uri_base | Defines the base URI for the Hash and URL feature supported by
IKEv2
|
| options/nixos/image.repart.verityStore.partitionIds.store | Specify the attribute name of the store partition.
|
| options/nixos/services.lavalink.plugins.*.configName | The name of the plugin to use as the key for the plugin configuration.
|
| options/nixos/services.slurm.dbdserver.storageUser | Database user name.
|
| options/nixos/services.rustus.storage.s3_region | S3 region name.
|
| options/home-manager/programs.zsh.prezto.tmux.defaultSessionName | Set the default session name.
|
| options/home-manager/programs.zed-editor.extensions | A list of the extensions Zed should install on startup
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.reauth_time | Time to schedule IKE reauthentication
|
| options/nixos/services.kapacitor.defaultDatabase.username | The username to connect to the remote InfluxDB server
|
| options/nixos/services.victorialogs.basicAuthUsername | Basic Auth username used to protect VictoriaLogs instance by authorization
|
| options/nixos/services.hickory-dns.settings.zones.*.zone | Zone name, like "example.com", "localhost", or "0.0.127.in-addr.arpa".
|
| options/nixos/services.httpd.customLogFormat | Defines a custom Apache HTTPD access log format string
|
| options/nixos/services.athens.storage.mongo.defaultDBName | Name of the mongo database.
|
| options/nixos/services.rosenpass.defaultDevice | Name of the network interface to use for all peers by default.
|
| options/nixos/services.prometheus.remoteRead.*.url | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/home-manager/programs.wezterm.colorSchemes | Attribute set of additional color schemes to be written to
$XDG_CONFIG_HOME/wezterm/colors, where each key is
taken as the name of the corresponding color scheme
|
| options/nixos/services.sanoid.templates.<name>.post_snapshot_script | Script to run after taking snapshot.
|
| options/nixos/services.journaldriver.applicationCredentials | Path to the service account private key (in JSON-format) used
to forward log entries to Stackdriver Logging on non-GCP
instances
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.resources.*.compress | Whether synapse should compress HTTP responses to clients that support it
|
| options/nixos/services.acme-dns.settings.general.domain | Domain name to serve the requests off of.
|
| options/nixos/services.gancio.settings.db.database | Name of the PostgreSQL database
|
| options/nixos/hardware.trackpoint.device | The device name of the trackpoint
|
| options/nixos/services.cassandra.clusterName | The name of the cluster
|
| options/nixos/services.samba.winbindd.enable | Whether to enable Samba's winbindd, which provides a number of services
to the Name Service Switch capability found in most modern C libraries,
to arbitrary applications via PAM and ntlm_auth and to Samba itself.
|
| options/nixos/services.unpoller.unifi.defaults.user | Unifi service user name.
|
| options/home-manager/programs.gnome-terminal.profile | A set of Gnome Terminal profiles
|
| options/nixos/services.authelia.instances.<name>.settings.default_2fa_method | Default 2FA method for new users and fallback for preferred but disabled methods.
|
| options/nixos/services.heisenbridge.namespaces | Configure the 'namespaces' section of the registration.yml for the bridge and the server
|
| options/nixos/services.prometheus.exporters.snmp.environmentFile | EnvironmentFile as defined in systemd.exec(5)
|
| options/nixos/services.icingaweb2.virtualHost | Name of the nginx virtualhost to use and setup
|
| options/nixos/services.samba.usershares.group | Name of the group members of which will be allowed to create usershares
|
| options/nixos/services.nextcloud.autoUpdateApps.startAt | When to run the update
|
| options/nixos/services.outline.storage.uploadBucketName | Name of the bucket where uploads should be stored.
|
| options/nixos/services.vikunja.database.database | Database name.
|
| options/nixos/services.mqtt2influxdb.mqtt.username | Username used to connect to the MQTT server.
|
| options/nixos/services.amazon-cloudwatch-agent.configurationFile | Amazon CloudWatch Agent configuration file
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.childless | Use childless IKE_SA initiation (allow, prefer, force or never)
|
| options/nixos/services.hadoop.hdfs.namenode.restartIfChanged | Automatically restart the service on config change
|
| options/nixos/services.libreswan.policies | A set of policies to apply to the IPsec connections.
The policy name must match the one of connection it needs to apply to.
|
| options/nixos/services.cloudflare-ddns.wafLists | List of WAF IP Lists to manage, in the format account-id/list-name.
(Experimental feature as of cloudflare-ddns 1.14.0).
|
| options/nixos/security.doas.extraRules.*.setEnv | Keep or set the specified variables
|
| options/nixos/services.prometheus.remoteWrite.*.url | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.thinkfan.fans.*.query | The query string used to match one or more fans: can be
a fullpath to the temperature file (single fan) or a fullpath
to a driver directory (multiple fans).
When multiple fans match, the query can be restricted using the
name or indices options.
|
| options/home-manager/programs.git.includes.*.contentSuffix | Nix store name for the git configuration text file,
when generating the configuration text from nix options.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.mediation_peer | Identity under which the peer is registered at the mediation server, that
is, the IKE identity the other end of this connection uses as its local
identity on its connection to the mediation server
|
| options/nixos/services.amazon-cloudwatch-agent.commonConfigurationFile | Amazon CloudWatch Agent common configuration
|
| options/nixos/services.prometheus.exporters.dovecot.socketPath | Path under which the stats socket is placed
|
| options/nixos/hardware.display.edid.modelines | Attribute set of XFree86 Modelines automatically converted
and exposed as edid/<name>.bin files in initrd
|
| options/nixos/services.btrbk.extraPackages | Extra packages for btrbk, like compression utilities for stream_compress.
Note: This option will get deprecated in future releases
|
| options/home-manager/programs.element-desktop.profiles | Extra profiles for Element
|
| options/nixos/services.sanoid.datasets.<name>.process_children_only | Whether to only snapshot child datasets if recursing.
|
| options/nixos/services.bacula-fd.tls.allowedCN | Common name attribute of allowed peer certificates
|
| options/nixos/services.canaille.settings.SERVER_NAME | The domain name on which canaille will be served.
|
| options/nixos/services.forgejo.settings.server.DOMAIN | Domain name of your server.
|
| options/nixos/services.icecream.scheduler.netName | Network name for the icecream scheduler
|
| options/nixos/services.bacula-sd.tls.allowedCN | Common name attribute of allowed peer certificates
|
| options/nixos/services.caddy.adapter | Name of the config adapter to use
|
| options/nixos/services.onlyoffice.postgresName | The name of database OnlyOffice should use.
|
| options/nixos/services.lldap.environment | Environment variables passed to the service
|
| options/nixos/services.mautrix-meta.instances | Configuration of multiple mautrix-meta instances.
services.mautrix-meta.instances.facebook and services.mautrix-meta.instances.instagram
come preconfigured with network.mode, appservice.id, bot username, display name and avatar.
|
| options/nixos/services.ntopng.redis.createInstance | Local Redis instance name
|
| options/nixos/services.spacecookie.settings.hostname | The hostname the service is reachable via
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags.directory_separator | Directory separator for mapping notmuch tags to maildirs.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.proposals | A proposal is a set of algorithms
|
| options/nixos/services.prometheus.exporters.mqtt.mqttUsername | Username which should be used to authenticate against the MQTT broker.
|
| options/nixos/services.limesurvey.virtualHost | Apache configuration can be done by adapting services.httpd.virtualHosts.<name>
|
| options/nixos/services.bacula-dir.tls.allowedCN | Common name attribute of allowed peer certificates
|
| options/nixos/services.davis.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.pcscd.ignoreReaderNames | List of reader name patterns for the PCSC daemon to ignore
|
| options/nixos/services.movim.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.slskd.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.mysql.ensureUsers | Ensures that the specified users exist and have at least the ensured permissions
|
| options/nixos/services.prometheus.scrapeConfigs.*.label_name_length_limit | Per-scrape limit on length of labels name that will be accepted for a sample
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.bind_addresses | IP addresses to bind the listener to.
|
| options/nixos/services.prometheus.exporters.fritz.settings.devices.*.password_file | Path to a file which contains the password to authenticate with the target device
|
| options/nixos/services.dependency-track.nginx.domain | The domain name under which to set up the virtual host.
|
| options/nixos/services.stargazer.routes | Routes that Stargazer should server
|
| options/nixos/services.snipe-it.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/users.mysql.pam.statusColumn | The name of the column or an SQL expression that indicates the status of
the user
|
| options/home-manager/programs.radicle.uri.web-rad.browser | Name of the XDG Desktop Entry for your browser
|
| options/home-manager/programs.quickshell.configs | A set of configs to include in the quickshell config directory
|
| options/nixos/networking.networkmanager.ensureProfiles.profiles | Declaratively define NetworkManager profiles
|
| options/nixos/services.suwayomi-server.settings.server.basicAuthUsername | The username value that you have to provide when authenticating.
|
| options/nixos/services.nvme-rs.settings.email.smtp_username | SMTP username
|
| options/nixos/services.firezone.server.provision.accounts.<name>.features.internet_resource | Whether to enable the internet_resource feature for this account.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.features.policy_conditions | Whether to enable the policy_conditions feature for this account.
|
| options/nixos/services.athens.index.postgres.database | Database name for the Postgres database.
|
| options/nixos/services.influxdb2.provision.initialSetup.username | Primary username
|
| options/nixos/services.borgmatic.settings.source_directories | List of source directories and files to backup
|
| options/nixos/services.mobilizon.settings.":mobilizon"."Mobilizon.Storage.Repo".socket_dir | Path to the postgres socket directory
|
| options/nixos/services.prometheus.exporters.dmarc.imap.username | Login username for the IMAP connection.
|
| options/nixos/services.agorakit.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.fediwall.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.kanboard.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.librenms.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.dolibarr.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.davis.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.pixelfed.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.slskd.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.portunus.dex.oidcClients | List of OIDC clients
|
| options/nixos/services.mainsail.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.movim.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.dependency-track.database.username | Username to use when connecting to an external or manually
provisioned database; has no effect when a local database is
automatically provisioned
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.ignore_remote_labels | Set Gmail labels to ignore when syncing from remote labels to
local tags (before translations).
|
| options/nixos/services.gancio.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.filebeat.inputs | Inputs specify how Filebeat locates and processes input data
|
| options/nixos/networking.ucarp.downscript | Command to run after become backup, the interface name, virtual address
and optional extra parameters are passed as arguments.
|
| options/nixos/networking.nat.externalInterface | The name of the external network interface.
|
| options/nixos/services.akkoma.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.fluidd.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.bluesky-pds.settings.PDS_HOSTNAME | Instance hostname (base domain name)
|
| options/nixos/services.tailscale.interfaceName | The interface name for tunnel traffic
|
| options/nixos/services.matomo.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.rutorrent.nginx.enable | Whether to enable nginx virtual host management
|
| options/nixos/services.monica.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.subsonic.listenAddress | The host name or IP address on which to bind Subsonic
|
| options/nixos/services.snipe-it.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.avahi.nssmdns6 | Whether to enable the mDNS NSS (Name Service Switch) plug-in for IPv6
|
| options/nixos/services.documize.stateDirectoryName | The name of the directory below /var/lib/private
where documize runs in and stores, for example, backups.
|
| options/nixos/services.librenms.database.database | Name of the database on the MySQL/MariaDB server.
|
| options/nixos/services.libvirtd.autoSnapshot.vms | If specified only the list of VMs will be snapshotted else all existing one
|
| options/nixos/services.umami.settings.TRACKER_SCRIPT_NAME | Allows you to assign a custom name to the tracker script different from the default script.js.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.fragmentation | Use IKE fragmentation (proprietary IKEv1 extension or RFC 7383 IKEv2
fragmentation)
|
| options/nixos/services.suricata.settings.logging.outputs.file.filename | Filename of the logfile.
|
| options/nixos/services.warpgate.settings.http.sni_certificates.*.certificate | Path to certificate.
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.ignore_empty_history | Work around a Gmail API quirk where an empty change history
is sometimes returned
|
| options/nixos/services.oauth2-proxy.nginx.virtualHosts.<name>.allowed_email_domains | List of email domains to allow access to this vhost, or null to allow all.
|
| options/nixos/services.pomerium.useACMEHost | If set, use a NixOS-generated ACME certificate with the specified name
|
| options/nixos/services.radicle.httpd.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.mjolnir.pantalaimon | pantalaimon options (enables E2E Encryption support)
|
| options/nixos/services.printing.cups-pdf.instances | Permits to raise one or more cups-pdf instances
|
| options/nixos/services.k3s.charts | Packaged Helm charts that are linked to /var/lib/rancher/k3s/server/static/charts before k3s starts
|
| options/nixos/services.nextcloud-spreed-signaling.settings.clients.internalsecretFile | The path to the file containing the value for clients.internalsecret
|
| options/nixos/services.akkoma.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/image.repart.verityStore.partitionIds.store-verity | Specify the attribute name of the store's dm-verity hash partition.
|
| options/nixos/services.gancio.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services._3proxy.resolution.nscache | Set name cache size for IPv4.
|
| options/nixos/boot.loader.systemd-boot.windows | Make Windows bootable from systemd-boot
|
| options/nixos/services.fluidd.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.consul.interface.advertise | The name of the interface to pull the advertise_addr from.
|
| options/nixos/boot.loader.grub.configurationName | GRUB entry name instead of default.
|
| options/nixos/services.monica.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.matomo.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.firezone.server.provision.accounts.<name>.features.self_hosted_relays | Whether to enable the self_hosted_relays feature for this account.
|
| options/nixos/services.lldap.settings.ldap_user_pass_file | Path to a file containing the default admin password
|
| options/nixos/services.cntlm.netbios_hostname | The hostname of your machine.
|
| options/nixos/services.anuko-time-tracker.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.nagios.virtualHost.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/nixos/services.moodle.virtualHost.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/nixos/users.ldap.bind.distinguishedName | The distinguished name to bind to the LDAP server with
|
| options/nixos/services.rke2.charts | Packaged Helm charts that are linked to /var/lib/rancher/rke2/server/static/charts before rke2 starts
|
| options/home-manager/programs.rclone.requiresUnit | The name of a systemd user service that must complete before the rclone
configuration file is written
|
| options/home-manager/services.colima.profiles | Profiles allow multiple colima configurations
|
| options/home-manager/programs.quickshell.activeConfig | The name of the config to use
|
| options/nixos/services.pufferpanel.environment | Environment variables to set for the service
|
| options/nixos/services.mqtt2influxdb.influxdb.username | Username for InfluxDB login.
|
| options/nixos/services.prometheus.remoteRead.*.basic_auth.username | HTTP username
|
| options/nixos/programs.msmtp.accounts | Named accounts and their respective configurations
|
| options/nixos/services.consul-template.instances | Attribute set of consul-template instances
|
| options/nixos/services.limesurvey.httpd.virtualHost | Apache configuration can be done by adapting services.httpd.virtualHosts.<name>
|
| options/nixos/services.rsnapshot.extraConfig | rsnapshot configuration option in addition to the defaults from
rsnapshot and this module
|
| options/nixos/services.limesurvey.nginx.virtualHost | Nginx configuration can be done by adapting services.nginx.virtualHosts.<name>
|
| options/nixos/services.thinkfan.sensors.*.query | The query string used to match one or more sensors: can be
a fullpath to the temperature file (single sensor) or a fullpath
to a driver directory (multiple sensors).
When multiple sensors match, the query can be restricted using the
name or indices options.
|
| options/darwin/system.defaults.finder._FXSortFoldersFirstOnDesktop | Keep folders on top when sorting by name on the desktop
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.remove_local_messages | Remove local messages that have been deleted on the remote.
|
| options/nixos/services.nextcloud.config.objectstore.s3.hostname | Required for some non-Amazon implementations.
|
| options/nixos/services.prometheus.exporters.ecoflow.ecoflowDevicesPrettyNamesFile | File must contain one line, example: {"R3300000":"Delta 2","R3400000":"Delta Pro",...}
The key/value map of custom names for your devices
|
| options/nixos/services.bookstack.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/programs.pay-respects.runtimeRules | List of rules to be added to /etc/xdg/pay-respects/rules.
pay-respects will read the contents of these generated rules to recommend command corrections
|
| options/nixos/services.matrix-tuwunel.stateDirectory | The name of the directory under /var/lib/ where the database will be stored
|
| options/nixos/services.bitwarden-directory-connector-cli.ldap.username | The user to authenticate as.
|
| options/nixos/services.prometheus.exporters.pihole.piholeHostname | Hostname or address where to find the Pi-Hole webinterface
|
| options/nixos/services.victoriatraces.basicAuthUsername | Basic Auth username used to protect VictoriaTraces instance by authorization
|
| options/nixos/services.rosenpass.settings.peers.*.device | Name of the local WireGuard interface to use for this peer.
|
| options/nixos/services.postgresqlBackup.backupAll | Backup all databases using pg_dumpall
|
| options/nixos/services.znc.useLegacyConfig | Whether to propagate the legacy options under
services.znc.confOptions.* to the znc config
|
| options/nixos/services.prometheus.remoteWrite.*.basic_auth.username | HTTP username
|
| options/nixos/services.bitwarden-directory-connector-cli.ldap.hostname | The host the LDAP is accessible on.
|
| options/nixos/services.headscale.settings.dns.nameservers.global | List of nameservers to pass to Tailscale clients.
|
| options/nixos/services.calibre-web.options.reverseProxyAuth.header | Auth proxy header name.
|
| options/nixos/services.libeufin.nexus.settings.nexus-ebics.HOST_ID | Name of the EBICS host.
|
| options/nixos/services.lasuite-meet.livekit.keyFile | LiveKit key file holding one or multiple application secrets
|
| options/nixos/services.sourcehut.settings."sr.ht".global-domain | Global domain name.
|
| options/nixos/services._3proxy.resolution.nscache6 | Set name cache size for IPv6.
|
| options/nixos/boot.loader.grub.fsIdentifier | Determines how GRUB will identify devices when generating the
configuration file
|
| options/nixos/services.airsonic.listenAddress | The host name or IP address on which to bind Airsonic
|
| options/nixos/services.oncall.settings.db.conn.kwargs.database | Database name.
|
| options/nixos/services.zfs.autoSnapshot.flags | Flags to pass to the zfs-auto-snapshot command
|
| options/nixos/services.matrix-synapse.settings.listeners.*.resources.*.names | List of resources to host on this listener.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.exporters.pve.user | User name under which the pve exporter shall be run.
|
| options/nixos/services.prometheus.exporters.nut.user | User name under which the nut exporter shall be run.
|
| options/nixos/services.prometheus.exporters.kea.user | User name under which the kea exporter shall be run.
|
| options/nixos/services.prometheus.exporters.sql.user | User name under which the sql exporter shall be run.
|
| options/nixos/services.prometheus.exporters.zfs.user | User name under which the zfs exporter shall be run.
|
| options/nixos/services.prometheus.exporters.lnd.user | User name under which the lnd exporter shall be run.
|
| options/nixos/services.jirafeau.nginxConfig.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.bookstack.settings | Options for Bookstack configuration
|
| options/nixos/services.kanboard.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.librenms.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.grafana.settings.server.domain | The public facing domain name used to access grafana from a browser
|
| options/nixos/services.dolibarr.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.fediwall.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.agorakit.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.pixelfed.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.nominatim.database.superUser | Postgresql database superuser used to create Nominatim database and
import data
|
| options/nixos/services.mainsail.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.miniupnpd.externalInterface | Name of the external interface.
|
| options/nixos/services.nextcloud.settings.mail_smtpname | This depends on mail_smtpauth
|
| options/nixos/services.prometheus.exporters.snmp.user | User name under which the snmp exporter shall be run.
|
| options/nixos/services.prometheus.exporters.bind.user | User name under which the bind exporter shall be run.
|
| options/nixos/services.prometheus.exporters.ipmi.user | User name under which the ipmi exporter shall be run.
|
| options/nixos/services.prometheus.exporters.flow.user | User name under which the flow exporter shall be run.
|
| options/nixos/services.prometheus.exporters.nats.user | User name under which the nats exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mail.user | User name under which the mail exporter shall be run.
|
| options/nixos/services.prometheus.exporters.ping.user | User name under which the ping exporter shall be run.
|
| options/nixos/services.prometheus.exporters.bird.user | User name under which the bird exporter shall be run.
|
| options/nixos/services.prometheus.exporters.ebpf.user | User name under which the ebpf exporter shall be run.
|
| options/nixos/services.prometheus.exporters.json.user | User name under which the json exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mqtt.user | User name under which the mqtt exporter shall be run.
|
| options/nixos/services.prometheus.exporters.node.user | User name under which the node exporter shall be run.
|
| options/nixos/services.prometheus.exporters.knot.user | User name under which the knot exporter shall be run.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.http3 | Whether to enable the HTTP/3 protocol
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.replace_slash_with_dot | Replace '/' with '.' in Gmail labels.
|
| options/nixos/services.prometheus.exporters.py-air-control.deviceHostname | The hostname of the air purification device from which to scrape the metrics.
|
| options/nixos/services.certspotter.watchlist | Domain names to watch
|
| options/nixos/services._3proxy.resolution.nserver | List of nameservers to use
|
| options/nixos/services.athens.singleFlight.redisSentinel.masterName | Name of the sentinel master server.
|
| options/nixos/services.prometheus.exporters.php-fpm.user | User name under which the php-fpm exporter shall be run.
|
| options/nixos/services.dependency-track.settings."alpine.database.username" | Specifies the username to use when authenticating to the database.
|
| options/nixos/services.prometheus.scrapeConfigs.*.basic_auth.username | HTTP username
|
| options/nixos/services.mobilizon.settings.":mobilizon".":instance".hostname | Your instance's hostname
|
| options/nixos/services.homebridge.uiSettings.log.service | Name of the systemd service to log to
|
| options/nixos/services.agorakit.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.datadog-agent.checks | Configuration for all Datadog checks
|
| options/nixos/services.librenms.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.kanboard.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.gmediarender.friendlyName | A "friendly name" for identifying the endpoint.
|
| options/nixos/services.dolibarr.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.icingaweb2.modulePackages | Name-package attrset of Icingaweb 2 modules packages to enable
|
| options/nixos/services.fediwall.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.athens.storage.azureblob.accountName | Account name for the Azure Blob storage backend.
|
| options/nixos/services.radicle.httpd.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.logrotate.settings | logrotate freeform settings: each attribute here will define its own section,
ordered by services.logrotate.settings.<name>.priority,
which can either define files to rotate with their settings
or settings common to all further files settings
|
| options/nixos/services.pixelfed.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.mainsail.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.archisteamfarm.bots | Bots name and configuration.
|
| options/home-manager/services.xidlehook.environment | Extra environment variables to be exported in the script
|
| options/nixos/services.postfixadmin.enable | Whether to enable postfixadmin
|
| options/nixos/hardware.nvidia.prime.offload.offloadCmdMainProgram | Specifies the CLI name of the hardware.nvidia.prime.offload.enableOffloadCmd
convenience script for offloading programs to an nvidia device.
|
| options/nixos/services.prometheus.exporters.nginx.user | User name under which the nginx exporter shall be run.
|
| options/nixos/services.prometheus.exporters.kafka.user | User name under which the kafka exporter shall be run.
|
| options/nixos/services.prometheus.exporters.redis.user | User name under which the redis exporter shall be run.
|
| options/nixos/services.prometheus.exporters.fritz.user | User name under which the fritz exporter shall be run.
|
| options/nixos/services.prometheus.exporters.idrac.user | User name under which the idrac exporter shall be run.
|
| options/nixos/services.prometheus.exporters.jitsi.user | User name under which the jitsi exporter shall be run.
|
| options/nixos/services.prometheus.exporters.dmarc.user | User name under which the dmarc exporter shall be run.
|
| options/nixos/services.prometheus.exporters.v2ray.user | User name under which the v2ray exporter shall be run.
|
| options/nixos/services.unpoller.unifi.controllers.*.user | Unifi service user name.
|
| options/nixos/system.nixos.label | NixOS version name to be used in the names of generated
outputs and boot labels
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/nixos/services.nghttpx.frontends.*.params.sni-fwd | When performing a match to select a backend server, SNI host
name received from the client is used instead of the request
host
|
| options/nixos/services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/networking.dhcpcd.denyInterfaces | Disable the DHCP client for any interface whose name matches
any of the shell glob patterns in this list
|
| options/nixos/services.healthchecks.settings.DB_NAME | Database name.
|
| options/nixos/services.anuko-time-tracker.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.nextcloud-spreed-signaling.hostName | The host name to bind the nginx virtual host to, if
config.services.nextcloud-spreed-signaling.configureNginx is set to true.
|
| options/nixos/services.prometheus.exporters.zfs.pools | Name of the pool(s) to collect, repeat for multiple pools (default: all pools).
|
| options/nixos/services.resolved.settings.Resolve.Domains | List of search domains used to complete unqualified name lookups.
|
| options/nixos/services.prometheus.exporters.nextcloud.username | Username for connecting to Nextcloud
|
| options/nixos/services.victoriametrics.basicAuthUsername | Basic Auth username used to protect VictoriaMetrics instance by authorization
|
| options/nixos/services.firezone.server.provision.accounts.<name>.features.multi_site_resources | Whether to enable the multi_site_resources feature for this account.
|
| options/nixos/security.tpm2.tctiEnvironment.tabrmdConf | Configuration part of the tabrmd TCTI, like the D-Bus bus name
|
| options/nixos/services.radicle.httpd.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.bookstack.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.journaldriver.logName | Configures the name of the target log in Stackdriver Logging
|
| options/nixos/services.prometheus.exporters.frr.user | User name under which the frr exporter shall be run
|
| options/nixos/services.sanoid.datasets.<name>.no_inconsistent_snapshot | Whether to take a snapshot if the pre script fails
|
| options/nixos/networking.dhcpcd.allowInterfaces | Enable the DHCP client for any interface whose name matches
any of the shell glob patterns in this list
|
| options/nixos/services.anuko-time-tracker.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.prometheus.exporters.statsd.user | User name under which the statsd exporter shall be run.
|
| options/nixos/services.prometheus.exporters.dnssec.user | User name under which the dnssec exporter shall be run.
|
| options/nixos/services.prometheus.exporters.script.user | User name under which the script exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mysqld.user | User name under which the mysqld exporter shall be run.
|
| options/nixos/services.prometheus.exporters.deluge.user | User name under which the deluge exporter shall be run.
|
| options/nixos/services.prometheus.exporters.domain.user | User name under which the domain exporter shall be run.
|
| options/nixos/services.prometheus.exporters.fastly.user | User name under which the fastly exporter shall be run.
|
| options/nixos/services.prometheus.exporters.restic.user | User name under which the restic exporter shall be run.
|
| options/nixos/services.prometheus.exporters.pihole.user | User name under which the pihole exporter shall be run.
|
| options/nixos/services.prometheus.exporters.shelly.user | User name under which the shelly exporter shall be run.
|
| options/nixos/services.prometheus.exporters.rspamd.user | User name under which the rspamd exporter shall be run.
|
| options/nixos/services.metricbeat.modules | Metricbeat modules are responsible for reading metrics from the various sources
|
| options/nixos/services.prometheus.exporters.tibber.user | User name under which the tibber exporter shall be run.
|
| options/nixos/services.transmission.settings.script-torrent-done-filename | Executable to be run at torrent completion.
|
| options/nixos/security.tpm2.tctiEnvironment.interface | The name of the TPM command transmission interface (TCTI) library to
use.
|
| options/nixos/services.home-assistant.extraComponents | List of components that have their dependencies included in the package
|
| options/nixos/services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.name_filter | Specify a name filter (works as a LIKE) to apply on the server listing request.
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.drop_non_existing_label | Allow missing labels on the Gmail side to be dropped.
|
| options/nixos/services.sanoid.templates.<name>.no_inconsistent_snapshot | Whether to take a snapshot if the pre script fails
|
| options/nixos/services.bookstack.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.postgresql.ensureUsers | Ensures that the specified users exist
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".url.host | Domain name of the instance.
|
| options/nixos/services.prometheus.exporters.nvidia-gpu.user | User name under which the nvidia-gpu exporter shall be run.
|
| options/nixos/services.jirafeau.nginxConfig.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/home-manager/services.kanshi.settings.*.output.criteria | The criteria can either be an output name, an output description or "*"
|
| options/nixos/services.firefox-syncserver.database.host | Database host name. localhost is treated specially and inserts
systemd dependencies, other hostnames or IP addresses of the local machine do not.
|
| options/nixos/services.filebeat.modules | Filebeat modules provide a quick way to get started
processing common log formats
|
| options/nixos/services.prometheus.exporters.rtl_433.user | User name under which the rtl_433 exporter shall be run.
|
| options/nixos/services.prometheus.exporters.bitcoin.rpcUser | RPC user name.
|
| options/nixos/services.movim.h2o.tls.recommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|
| options/nixos/services.libeufin.nexus.settings.nexus-ebics.CURRENCY | Name of the fiat currency.
|
| options/nixos/services.prometheus.exporters.systemd.user | User name under which the systemd exporter shall be run.
|
| options/nixos/services.prometheus.exporters.bitcoin.user | User name under which the bitcoin exporter shall be run.
|
| options/nixos/services.prometheus.exporters.varnish.user | User name under which the varnish exporter shall be run.
|
| options/nixos/services.umami.createPostgresqlDatabase | Whether to automatically create the database for Umami using PostgreSQL
|
| options/nixos/services.prometheus.exporters.apcupsd.user | User name under which the apcupsd exporter shall be run.
|
| options/nixos/services.prometheus.exporters.ecoflow.user | User name under which the ecoflow exporter shall be run.
|
| options/nixos/services.prometheus.exporters.dovecot.user | User name under which the dovecot exporter shall be run.
|
| options/nixos/services.prometheus.exporters.process.user | User name under which the process exporter shall be run.
|
| options/nixos/services.prometheus.exporters.dnsmasq.user | User name under which the dnsmasq exporter shall be run.
|
| options/nixos/services.prometheus.exporters.libvirt.user | User name under which the libvirt exporter shall be run.
|
| options/nixos/services.prometheus.exporters.sabnzbd.user | User name under which the sabnzbd exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mongodb.user | User name under which the mongodb exporter shall be run.
|
| options/nixos/services.prometheus.exporters.postfix.user | User name under which the postfix exporter shall be run.
|
| options/nixos/services.prometheus.exporters.klipper.user | User name under which the klipper exporter shall be run.
|
| options/nixos/services.prometheus.exporters.unbound.user | User name under which the unbound exporter shall be run.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.journaldriver.logStream | Configures the name of the Stackdriver Logging log stream into
which to write journald entries
|
| options/nixos/services.jirafeau.nginxConfig.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/darwin/services.postgresql.ensureUsers | Ensures that the specified users exist and have at least the ensured permissions
|
| options/nixos/services.prometheus.exporters.fritz.settings.devices.*.username | Username to authenticate with the target device.
|
| options/nixos/services.prometheus.exporters.fritz.settings.devices.*.hostname | Hostname under which the target device is reachable.
|
| options/nixos/services.h2o.defaultTLSRecommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|
| options/nixos/services.hockeypuck.settings | Configuration file for hockeypuck, here you can override
certain settings (loglevel and
openpgp.db.dsn) by just setting those values
|
| options/nixos/hardware.block.defaultSchedulerExclude | Device name pattern to exclude from default scheduler assignment
through config.hardware.block.defaultScheduler and
config.hardware.block.defaultSchedulerRotational
|
| options/nixos/services.influxdb2.provision.initialSetup.bucket | Primary bucket name
|
| options/nixos/services.radicle.ci.broker.settings.triggers.*.adapter | Adapter name.
|
| options/nixos/services.prometheus.exporters.artifactory.artiUsername | Username for authentication against JFrog Artifactory API.
|
| options/nixos/hardware.printers.ensurePrinters | Will regularly ensure that the given CUPS printers are configured as declared here
|
| options/nixos/services.athens.storage.azureblob.containerName | Container name for the Azure Blob storage backend.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.anubis.defaultOptions.settings.POLICY_FNAME | The policy file to use
|
| options/nixos/services.prometheus.exporters.mailman3.user | User name under which the mailman3 exporter shall be run.
|
| options/nixos/services.prometheus.exporters.py-air-control.user | User name under which the py-air-control exporter shall be run.
|
| options/nixos/services.pgmanage.connections | pgmanage requires at least one PostgreSQL server be defined
|
| options/home-manager/services.xsuspender.defaults.matchWmNameContains | Match windows where wm name contains string.
|
| options/nixos/services.prometheus.alertmanagerGotify.metrics.username | The username used to access your metrics.
|
| options/nixos/services.limesurvey.virtualHost.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/nixos/services.sourcehut.hg.postgresql.database | PostgreSQL database name for the hg.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.pds.environmentFiles | File to load environment variables from
|
| options/nixos/services.prometheus.exporters.influxdb.user | User name under which the influxdb exporter shall be run.
|
| options/nixos/services.prometheus.exporters.opnsense.user | User name under which the opensense exporter shall be run.
|
| options/nixos/services.prometheus.exporters.smartctl.user | User name under which the smartctl exporter shall be run.
|
| options/nixos/services.prometheus.exporters.fritzbox.user | User name under which the fritzbox exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mikrotik.user | User name under which the mikrotik exporter shall be run.
|
| options/nixos/services.prometheus.exporters.nginxlog.user | User name under which the nginxlog exporter shall be run.
|
| options/nixos/services.prometheus.exporters.postgres.user | User name under which the postgres exporter shall be run.
|
| options/nixos/services.prometheus.exporters.unpoller.user | User name under which the unpoller exporter shall be run.
|
| options/nixos/services.prometheus.exporters.graphite.user | User name under which the graphite exporter shall be run.
|
| options/nixos/services.prometheus.exporters.blackbox.user | User name under which the blackbox exporter shall be run.
|
| options/nixos/services.prometheus.exporters.keylight.user | User name under which the keylight exporter shall be run.
|
| options/nixos/services.prometheus.exporters.collectd.user | User name under which the collectd exporter shall be run.
|
| options/nixos/services.dolibarr.h2o.tls.recommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|
| options/nixos/services.sourcehut.man.postgresql.database | PostgreSQL database name for the man.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.sourcehut.git.postgresql.database | PostgreSQL database name for the git.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.sourcehut.hub.postgresql.database | PostgreSQL database name for the hub.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.anubis.defaultOptions.settings.SERVE_ROBOTS_TXT | Whether to serve a default robots.txt that denies access to common AI bots by name and all other
bots by wildcard.
|
| options/nixos/services.mediawiki.httpd.virtualHost.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/nixos/services.cassandra.listenAddress | Address or interface to bind to and tell other Cassandra nodes
to connect to
|
| options/nixos/services.sourcehut.todo.postgresql.database | PostgreSQL database name for the todo.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.sourcehut.meta.postgresql.database | PostgreSQL database name for the meta.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.suricata.settings.unix-command | Unix command socket that can be used to pass commands to Suricata
|
| options/nixos/services.prometheus.alertmanagerGotify.metrics.namespace | The namescape of the metrics.
|
| options/nixos/services.nextcloud.config.objectstore.s3.bucket | The name of the S3 bucket.
|
| options/nixos/services.zfs.autoReplication.localFilesystem | Local ZFS filesystem from which snapshots should be sent
|
| options/nixos/services.headscale.settings.tls_letsencrypt_hostname | Domain name to request a TLS certificate for.
|
| options/nixos/services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.mosquitto.listeners.*.omitPasswordAuth | Omits password checking, allowing anyone to log in with any user name unless
other mandatory authentication methods (eg TLS client certificates) are configured.
|
| options/nixos/services.nullmailer.config.remotes | A list of remote servers to which to send each message
|
| options/nixos/services.prometheus.exporters.imap-mailstat.user | User name under which the imap-mailstat exporter shall be run.
|
| options/nixos/services.yggdrasil.openMulticastPort | Whether to open the UDP port used for multicast peer discovery
|
| options/nixos/services.sanoid.datasets.<name>.force_post_snapshot_script | Whether to run the post script if the pre script fails
|
| options/nixos/services.sourcehut.lists.postgresql.database | PostgreSQL database name for the lists.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.sourcehut.paste.postgresql.database | PostgreSQL database name for the paste.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.sourcehut.pages.postgresql.database | PostgreSQL database name for the pages.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.libeufin.nexus.settings.nexus-ebics.BANK_DIALECT | Name of the following combination: EBICS version and ISO20022
recommendations that Nexus would honor in the communication with the
bank
|
| options/nixos/services.limesurvey.nginx.virtualHost.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.prometheus.scrapeConfigs.*.dns_sd_configs.*.names | A list of DNS SRV record names to be queried.
|
| options/nixos/services.mobilizon.settings.":mobilizon"."Mobilizon.Storage.Repo".username | User used to connect to the database
|
| options/nixos/services.prometheus.exporters.nginxlog.settings.namespaces | Namespaces to collect the metrics for
|
| options/nixos/services.pgbouncer.settings.pgbouncer.max_client_conn | Maximum number of client connections allowed
|
| options/nixos/services.prometheus.exporters.surfboard.user | User name under which the surfboard exporter shall be run.
|
| options/nixos/services.prometheus.exporters.tailscale.user | User name under which the tailscale exporter shall be run.
|
| options/nixos/services.prometheus.exporters.wireguard.user | User name under which the wireguard exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mongodb.collectAll | Enable all collectors
|
| options/nixos/services.prometheus.exporters.rasdaemon.user | User name under which the rasdaemon exporter shall be run.
|
| options/nixos/services.prometheus.exporters.borgmatic.user | User name under which the borgmatic exporter shall be run.
|
| options/nixos/services.prometheus.exporters.smokeping.user | User name under which the smokeping exporter shall be run.
|
| options/nixos/services.postgresql.ensureUsers.*.ensureDBOwnership | Grants the user ownership to a database with the same name
|
| options/nixos/services.prometheus.exporters.pgbouncer.user | User name under which the pgbouncer exporter shall be run.
|
| options/nixos/services.prometheus.exporters.nextcloud.user | User name under which the nextcloud exporter shall be run.
|
| options/nixos/services.chatgpt-retrieval-plugin.qdrantCollection | name of the qdrant collection used to store documents.
|
| options/nixos/services.prometheus.exporters.junos-czerwonk.user | User name under which the junos-czerwonk exporter shall be run.
|
| options/nixos/services.matrix-alertmanager.matrixRooms | Combination of Alertmanager receiver(s) and rooms for the bot to join
|
| options/nixos/services.yggdrasil.denyDhcpcdInterfaces | Disable the DHCP client for any interface whose name matches
any of the shell glob patterns in this list
|
| options/nixos/services.sanoid.templates.<name>.force_post_snapshot_script | Whether to run the post script if the pre script fails
|
| options/nixos/services.prometheus.exporters.chrony.user | User name under which the chrony exporter shall be run
|
| options/nixos/services.limesurvey.httpd.virtualHost.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.auto_create_new_mailboxes | Whether to create new mailboxes automatically on the server from notmuch
tags.
|
| options/nixos/services.chhoto-url.settings.custom_landing_directory | The path of a directory which contains a custom landing page.
|
| options/nixos/services.sourcehut.builds.postgresql.database | PostgreSQL database name for the builds.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.prometheus.exporters.postfix.systemd.unit | Name of the postfix systemd unit.
|
| options/home-manager/wayland.windowManager.sway.config.workspaceOutputAssign.*.output | Name(s) of the output(s) from {command}swaymsg -t get_outputs.
|
| options/nixos/services.journald.upload.settings.Upload.ServerKeyFile | SSL key in PEM format
|
| options/nixos/services.centrifugo.environmentFiles | Files to load environment variables from
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.foundationdb.tls.allowedPeers | "Peer verification string"
|
| options/nixos/virtualisation.rosetta.mountTag | The VirtioFS mount tag for the Rosetta runtime, exposed by the host's virtualisation software
|
| options/nixos/services.datadog-agent.extraIntegrations | Extra integrations from the Datadog core-integrations
repository that should be built and included
|
| options/nixos/services.mosquitto.listeners.*.authPlugins.*.denySpecialChars | Automatically disallow all clients using #
or + in their name/id.
|
| options/home-manager/xsession.windowManager.i3.config.workspaceOutputAssign.*.output | Name(s) of the output(s) from {command}i3-msg -t get_outputs.
|
| options/nixos/services.mqtt2influxdb.influxdb.database | Name of the InfluxDB database.
|
| options/nixos/services.taskserver.organisations | An attribute set where the keys name the organisation and the values
are a set of lists of users and
groups.
|
| options/nixos/services.journaldriver.googleCloudProject | Configures the name of the Google Cloud project to which to
forward journald logs
|
| options/nixos/services.prometheus.exporters.scaphandre.user | User name under which the scaphandre exporter shall be run.
|
| options/nixos/services.nullmailer.config.adminaddr | If set, all recipients to users at either "localhost" (the literal string)
or the canonical host name (from the me control attribute) are remapped to this address
|
| options/nixos/services.prometheus.exporters.buildkite-agent.user | User name under which the buildkite-agent exporter shall be run.
|
| options/nixos/services.prometheus.exporters.storagebox.user | User name under which the storagebox exporter shall be run.
|
| options/home-manager/services.kanshi.settings.*.profile.outputs.*.criteria | The criteria can either be an output name, an output description or "*"
|
| options/nixos/services.bluesky-pds.environmentFiles | File to load environment variables from
|
| options/nixos/services.dependency-track.database.databaseName | Database name to use when connecting to an external or
manually provisioned database; has no effect when a local
database is automatically provisioned
|
| options/nixos/services.prometheus.exporters.postfix.systemd.slice | Name of the postfix systemd slice
|
| options/nixos/virtualisation.libvirtd.nss.enableGuest | This option enables the newer libvirt_guest NSS module
|
| options/nixos/services.biboumi.settings.realname_from_jid | Whether the realname and username of each biboumi
user will be extracted from their JID
|
| options/nixos/services.firezone.server.provision.accounts | All accounts to provision
|
| options/nixos/services.grafana.settings.smtp.ehlo_identity | Name to be used as client identity for EHLO in SMTP dialog.
|
| options/nixos/services.limesurvey.nginx.virtualHost.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.desktopManager.gnome.flashback.customSessions.*.wmLabel | The name of the window manager to show in the session chooser.
|
| options/nixos/services.prometheus.exporters.exportarr-lidarr.user | User name under which the exportarr-lidarr exporter shall be run.
|
| options/nixos/services.prometheus.exporters.exportarr-sonarr.user | User name under which the exportarr-sonarr exporter shall be run.
|
| options/nixos/services.suricata.settings.outputs | Configure the type of alert (and other) logging you would like
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.prometheus.exporters.exportarr-radarr.user | User name under which the exportarr-radarr exporter shall be run.
|
| options/nixos/services.prometheus.exporters.exportarr-bazarr.user | User name under which the exportarr-bazarr exporter shall be run.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.rutorrent.nginx.exposeInsecureRPC2mount | If you do not enable one of the rpc or httprpc plugins you need to expose an RPC mount through scgi using this option
|
| options/nixos/services.matrix-appservice-discord.settings | config.yaml configuration as a Nix attribute set
|
| options/nixos/services.limesurvey.nginx.virtualHost.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.warpgate.settings.external_host | Configure the domain name of this Warpgate instance
|
| options/nixos/services.pufferpanel.enable | Whether to enable PufferPanel game management server
|
| options/darwin/services.aerospace.settings.on-window-detected.*."if".workspace | The workspace name to match (optional).
|
| options/nixos/services.crowdsec-firewall-bouncer.registerBouncer.bouncerName | Name to register the bouncer as to the CrowdSec API
|
| options/nixos/services.outline.oidcAuthentication.displayName | Display name for OIDC authentication.
|
| options/home-manager/wayland.windowManager.sway.config.workspaceOutputAssign.*.workspace | Name of the workspace to assign.
|
| options/nixos/services.prometheus.exporters.artifactory.user | User name under which the artifactory exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mqtt.prometheusPrefix | Prefix added to the metric name.
|
| options/nixos/services.prometheus.exporters.exportarr-readarr.user | User name under which the exportarr-readarr exporter shall be run.
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowCN | Allow client if common name appears in the list.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections | Section defining IKE connection configurations, each in its own subsection
with an arbitrary yet unique name
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowOU | Allow client if organizational unit name appears in the list.
|
| options/home-manager/xsession.windowManager.i3.config.workspaceOutputAssign.*.workspace | Name of the workspace to assign.
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities | Section defining complementary attributes of certification authorities, each
in its own subsection with an arbitrary yet unique name
|
| options/nixos/services.mqtt2influxdb.points.*.measurement | Name of the measurement
|
| options/nixos/services.warpgate.settings.sso_providers.*.label | SSO provider name displayed on login page.
|
| options/nixos/services.nextcloud.settings."profile.enabled" | Makes user-profiles globally available under nextcloud.tld/u/user.name
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowDNS | Allow client if DNS subject alternative name appears in the list.
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowURI | Allow client if URI subject alternative name appears in the list.
|
| options/nixos/services.prometheus.exporters.process.settings.process_names | All settings expressed as an Nix attrset
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/virtualisation.sharedDirectories | An attributes set of directories that will be shared with the
virtual machine using VirtFS (9P filesystem over VirtIO)
|
| options/nixos/services.prometheus.exporters.exportarr-prowlarr.user | User name under which the exportarr-prowlarr exporter shall be run.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.nipap.settings.auth.default_backend | Name of auth backend to use by default.
|
| options/darwin/system.defaults.loginwindow.SHOWFULLNAME | Apple menu > System Preferences > Users and Groups > Login Options
Displays login window as a name and password field instead of a list of users
|
| options/nixos/services.crowdsec-firewall-bouncer.settings.api_key | API key to authenticate with a local crowdsec API
|
| options/nixos/services.grafana.provision.alerting.rules.settings.groups.*.folder | Name of the folder the rule group will be stored in
|
| options/nixos/system.replaceDependencies.replacements | List of packages to override without doing a full rebuild
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.prometheus.exporters.modemmanager.user | User name under which the modemmanager exporter shall be run.
|
| options/nixos/services.tabby.model | Specify the model that tabby will use to generate completions
|
| options/nixos/boot.loader.systemd-boot.sortKey | The sort key used for the NixOS bootloader entries
|
| options/nixos/services.matrix-appservice-irc.settings.homeserver.domain | The 'domain' part for user IDs on this home server
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.groupNameAttribute | Attribute for a name of group.
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.username | Credentials are used to authenticate the requests to Uyuni API.
|
| options/nixos/services.xserver.desktopManager.gnome.flashback.customSessions.*.wmLabel | The name of the window manager to show in the session chooser.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.kubeconfig_file | Optional path to a kubeconfig file
|
| options/nixos/documentation.man.mandoc.settings.output.man | A template for linked manuals (usually via the Xr macro) in HTML
output
|
| options/nixos/security.apparmor.killUnconfinedConfinables | Whether to enable killing of processes which have an AppArmor profile enabled
(in security.apparmor.policies)
but are not confined (because AppArmor can only confine new processes)
|
| options/nixos/services.influxdb2.provision.initialSetup.organization | Primary organization name
|
| options/nixos/networking.networkmanager.unmanaged | List of interfaces that will not be managed by NetworkManager
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.inherit | Grants the user created inherit permissions
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.username | Consul username
|
| options/nixos/services.mautrix-telegram.environmentFile | File containing environment variables to be passed to the mautrix-telegram service,
in which secret tokens can be specified securely by defining values for e.g.
MAUTRIX_TELEGRAM_APPSERVICE_AS_TOKEN,
MAUTRIX_TELEGRAM_APPSERVICE_HS_TOKEN,
MAUTRIX_TELEGRAM_TELEGRAM_API_ID,
MAUTRIX_TELEGRAM_TELEGRAM_API_HASH and optionally
MAUTRIX_TELEGRAM_TELEGRAM_BOT_TOKEN
|
| options/nixos/services.prometheus.exporters.unpoller.controllers.*.user | Unifi service user name.
|
| options/nixos/services.journald.upload.settings.Upload.ServerCertificateFile | SSL CA certificate in PEM format
|
| options/home-manager/programs.ripgrep-all.custom_adapters.*.mimetypes | If not null and --rga-accurate is enabled, mime type matching is used instead of file name matching
|
| options/nixos/documentation.man.mandoc.settings.output.paper | This option is for generating PostScript and PDF output
|
| options/nixos/services.prometheus.scrapeConfigs.*.http_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.createdb | Grants the user, created by the ensureUser attr, createdb permissions
|
| options/nixos/services.pgbouncer.settings.pgbouncer.listen_addr | Specifies a list (comma-separated) of addresses where to listen for TCP connections
|
| options/darwin/services.aerospace.settings.workspace-to-monitor-force-assignment | Map workspaces to specific monitors
|
| options/nixos/services.mobilizon.settings.":mobilizon"."Mobilizon.Storage.Repo".database | Name of the database
|
| options/nixos/networking.networkmanager.appendNameservers | A list of name servers that should be appended
to the ones configured in NetworkManager or received by DHCP.
|
| options/nixos/networking.networkmanager.insertNameservers | A list of name servers that should be inserted before
the ones configured in NetworkManager or received by DHCP.
|
| options/nixos/services.prometheus.exporters.mqtt.zigbee2MqttAvailability | Whether to enable Normalize sensor name for device availability metric added by Zigbee2MQTT..
|
| options/nixos/virtualisation.xen.store.settings.perms.enableWatch | Whether to enable the watch permission system
|
| options/nixos/services.prometheus.exporters.restic.rcloneConfig | Configuration for the rclone remote being used for backup
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.veilid.settings.core.network.routing_table.bootstrap | Host name of existing well-known Veilid bootstrap servers for the network to connect to.
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.bypassrls | Grants the user, created by the ensureUser attr, replication permissions
|
| options/nixos/hardware.block.scheduler | Assign block I/O scheduler by device name pattern
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.superuser | Grants the user, created by the ensureUser attr, superuser permissions
|
| options/nixos/services.postgresql.systemCallFilter | Configures the syscall filter for postgresql.service
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.exporters.pgbouncer.connectionEnvFile | File that must contain the environment variable
PGBOUNCER_EXPORTER_CONNECTION_STRING which is set to the connection
string used by pgbouncer
|
| options/nixos/services.matrix-synapse.settings.trusted_key_servers.*.server_name | Hostname of the trusted server.
|
| options/nixos/networking.networkmanager.ensureProfiles.secrets.entries.*.matchIface | interface name of the NetworkManager connection
|
| options/nixos/services.biboumi.settings.realname_customization | Whether the users will be able to use
the ad-hoc commands that lets them configure
their realname and username.
|
| options/nixos/services.filesender.settings.log_facilities | Defines where FileSender logging is sent
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.exporters.pgbouncer.connectionString | Connection string for accessing pgBouncer
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.replication | Grants the user, created by the ensureUser attr, replication permissions
|
| options/nixos/networking.networkmanager.ensureProfiles.secrets.entries.*.matchSetting | name of the setting section for which secrets are requested
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.createrole | Grants the user, created by the ensureUser attr, createrole permissions
|
| options/nixos/networking.networkmanager.ensureProfiles.secrets.entries.*.matchId | connection id used by NetworkManager
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.username | username is required if using Identity V2 API
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.domain_name | At most one of domain_id and domain_name must be provided if using username
with Identity V3
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.namespaces | Optional namespace discovery
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.project_name | The project_id and project_name fields are optional for the Identity V2 API
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.basic_auth.username | HTTP username
|
| options/home-manager/programs.qutebrowser.keyBindings | Key bindings mapping keys to commands in different modes
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.application_credential_name | The application_credential_id or application_credential_name fields are
required if using an application credential to authenticate
|
| packages/nixpkgs/cni | Container Network Interface - networking for Linux containers |
| packages/nixpkgs/kata-runtime | Lightweight Virtual Machines like containers that provide the workload isolation and security of VMs |
| packages/nixpkgs/crun | Fast and lightweight fully featured OCI runtime and C library for running containers |
| packages/nixpkgs/gvisor | Application Kernel for Containers |
| packages/nixpkgs/netavark | Rust based network stack for containers |
| packages/nixpkgs/krunvm | CLI-based utility for creating microVMs from OCI images |
| packages/nixpkgs/tini | Tiny but valid init for containers |
| packages/nixpkgs/youki | Container runtime written in Rust |
| packages/nixpkgs/krunkit | Launch configurable virtual machines with libkrun |
| packages/nixpkgs/texlivePackages.currfile | Provide file name and path of input files |
| packages/nixpkgs/runc | CLI tool for spawning and running containers according to the OCI specification |
| packages/nixpkgs/ciel | Tool for controlling AOSC OS packaging environments using multi-layer filesystems and containers |
| packages/nixpkgs/libkrun | Dynamic library providing Virtualization-based process isolation capabilities |
| packages/nixpkgs/lxd-lts | Daemon based on liblxc offering a REST API to manage containers |
| packages/nixpkgs/rke | Extremely simple, lightning fast Kubernetes distribution that runs entirely within containers |
| packages/nixpkgs/libkrun-tdx | Dynamic library providing Virtualization-based process isolation capabilities |
| packages/nixpkgs/libkrun-sev | Dynamic library providing Virtualization-based process isolation capabilities |
| packages/nixpkgs/podman-bootc | Streamlining podman+bootc interactions |
| packages/nixpkgs/dcv | TUI (Terminal User Interface) tool for monitoring Docker containers and Docker Compose applications |
| packages/nixpkgs/libkrun-efi | EFI variant of Libkrun, a dynamic library providing Virtualization-based process isolation capabilities |
| packages/nixpkgs/clair | Vulnerability Static Analysis for Containers |
| packages/nixpkgs/conmon | OCI container runtime monitor |
| packages/nixpkgs/gefyra | Tool to connect local containers to kubernetes clusters |
| packages/nixpkgs/pflask | Lightweight process containers for Linux |
| packages/nixpkgs/trivy | Simple and comprehensive vulnerability scanner for containers, suitable for CI |
| packages/nixpkgs/cruise | TUI for managing Docker containers, images, volumes, networks, and more |
| packages/nixpkgs/conmon-rs | OCI container runtime monitor written in Rust |
| packages/nixpkgs/ptyxis | Terminal for GNOME with first-class support for containers |
| packages/nixpkgs/orbstack | Fast, light, and easy way to run Docker containers and Linux machines |
| packages/nixpkgs/dgoss | Convenience wrapper around goss that aims to bring the simplicity of goss to docker containers |
| packages/nixpkgs/kolla | Provides production-ready containers and deployment tools for operating OpenStack clouds |
| packages/nixpkgs/dockle | Container Image Linter for Security |
| packages/nixpkgs/host-spawn | Run commands on your host machine from inside your flatpak sandbox, toolbox or distrobox containers |
| packages/nixpkgs/devbox | Instant, easy, predictable shells and containers |
| packages/nixpkgs/podman | Program for managing pods, containers and container images |
| packages/nixpkgs/repro-get | Reproducible apt/dnf/apk/pacman, with content-addressing |
| packages/nixpkgs/lxc | Userspace tools for Linux Containers, a lightweight virtualization system |
| packages/nixpkgs/oxker | Simple TUI to view & control docker containers |
| packages/nixpkgs/libr3 | High-performance path dispatching library |
| packages/nixpkgs/docker-gc | Docker garbage collection of containers and images |
| packages/nixpkgs/podman-tui | Podman Terminal UI |
| packages/nixpkgs/fetchit | Tool to manage the life cycle and configuration of Podman containers |
| packages/nixpkgs/flannel | Network fabric for containers, designed for Kubernetes |
| packages/nixpkgs/skopeo | Command line utility for various operations on container images and image repositories |
| packages/nixpkgs/docker-slim | Minify and secure Docker containers |
| packages/nixpkgs/mlib | Library of generic and type safe containers in pure C language |
| packages/nixpkgs/cli50 | Mount directories into cs50/cli containers |
| packages/nixpkgs/shod | Mouse-based window manager that can tile windows inside floating containers |
| packages/nixpkgs/ecs-agent | Agent that runs on AWS EC2 container instances and starts containers on behalf of Amazon ECS |
| packages/nixpkgs/dumb-init | Minimal init system for Linux containers |
| packages/nixpkgs/ducker | Terminal app for managing docker containers, inspired by K9s |
| packages/nixpkgs/libgumath | Library supporting function dispatch on general data containers |
| packages/nixpkgs/container | Create and run Linux containers using lightweight virtual machines on a Mac |
| packages/nixpkgs/diffoci | Diff for Docker and OCI container images |
| packages/nixpkgs/udocker | Basic user tool to execute simple docker containers in user space without root privileges |
| packages/nixpkgs/libkrunfw | Dynamic library bundling the guest payload consumed by libkrun |
| packages/nixpkgs/gvproxy | Network stack based on gVisor |
| packages/nixpkgs/podlet | Generate Podman Quadlet files from a Podman command, compose file, or existing object |
| packages/nixpkgs/libbfd | Library for manipulating containers of machine code |
| packages/nixpkgs/haskellPackages.lxc | High level Haskell bindings to LXC (Linux containers) |
| packages/nixpkgs/datalad | Keep code, data, containers under control with git and git-annex |
| packages/nixpkgs/aardvark-dns | Authoritative dns server for A/AAAA container records |
| packages/nixpkgs/cadvisor | Analyzes resource usage and performance characteristics of running docker containers |
| packages/nixpkgs/buildkit-nix | Nix frontend for BuildKit |
| packages/nixpkgs/oci-seccomp-bpf-hook | OCI hook to trace syscalls and generate a seccomp profile
|
| packages/nixpkgs/cockpit-podman | Cockpit UI for podman containers |
| packages/nixpkgs/linuxkit | Toolkit for building secure, portable and lean operating systems for containers |
| packages/nixpkgs/kubedock | Minimal implementation of the Docker API that will orchestrate containers on a Kubernetes cluster |
| packages/nixpkgs/podman-desktop | Graphical tool for developing on containers and Kubernetes |
| packages/nixpkgs/ioq3-scion | ioquake3 with support for path aware networking |
| packages/nixpkgs/kontainer | Manage Distrobox containers |
| packages/nixpkgs/alpine-make-rootfs | Make customized Alpine Linux rootfs (base image) for containers |
| packages/nixpkgs/apptainer | Application containers for linux (previously known as Singularity) |
| packages/nixpkgs/xtl | Basic tools (containers, algorithms) used by other quantstack packages |
| packages/nixpkgs/cni-plugin-flannel | Network fabric for containers designed to work in conjunction with flannel |
| packages/nixpkgs/drat | Utility for performing data recovery and analysis of APFS partitions/containers |
| packages/nixpkgs/fuse-overlayfs | FUSE implementation for overlayfs |
| packages/nixpkgs/drone-runner-docker | Drone pipeline runner that executes builds inside Docker containers |
| packages/nixpkgs/distrobox | Wrapper around podman or docker to create and start containers |
| packages/nixpkgs/wiimms-iso-tools | Set of command line tools to manipulate Wii and GameCube ISO images and WBFS containers |
| packages/nixpkgs/bubblewrap | Unprivileged sandboxing tool |
| packages/nixpkgs/extra-container | Run declarative containers without full system rebuilds |
| packages/nixpkgs/tensorman | Utility for easy management of Tensorflow containers |
| packages/nixpkgs/lxd-unwrapped-lts | Daemon based on liblxc offering a REST API to manage containers |
| packages/nixpkgs/podman-compose | Implementation of docker-compose with podman backend |
| packages/nixpkgs/libbfd_2_38 | Library for manipulating containers of machine code |
| packages/nixpkgs/composefs | File system for mounting container images |
| packages/nixpkgs/linuxPackages.oci-seccomp-bpf-hook | OCI hook to trace syscalls and generate a seccomp profile
|
| packages/nixpkgs/python313Packages.podman | Python bindings for Podman's RESTful API |
| packages/nixpkgs/python314Packages.podman | Python bindings for Podman's RESTful API |
| packages/nixpkgs/python313Packages.nitime | Algorithms and containers for time-series analysis in time and spectral domains |
| packages/nixpkgs/python314Packages.nitime | Algorithms and containers for time-series analysis in time and spectral domains |
| packages/nixpkgs/python313Packages.gumath | Library supporting function dispatch on general data containers |
| packages/nixpkgs/python314Packages.gumath | Library supporting function dispatch on general data containers |
| packages/nixpkgs/linuxPackages_lqx.oci-seccomp-bpf-hook | OCI hook to trace syscalls and generate a seccomp profile
|
| packages/nixpkgs/linuxPackages_zen.oci-seccomp-bpf-hook | OCI hook to trace syscalls and generate a seccomp profile
|
| packages/nixpkgs/distroshelf | GUI for Distrobox Containers |
| packages/nixpkgs/haskellPackages.bindings-lxc | Direct Haskell bindings to LXC (Linux containers) C API |
| packages/nixpkgs/python313Packages.datalad | Keep code, data, containers under control with git and git-annex |
| packages/nixpkgs/singularity | Application containers for linux (Sylabs Inc's fork of Singularity, a.k.a |
| packages/nixpkgs/slirp4netns | User-mode networking for unprivileged network namespaces |
| packages/nixpkgs/python312Packages.podman | Python bindings for Podman's RESTful API |
| packages/nixpkgs/linuxPackages_xanmod.oci-seccomp-bpf-hook | OCI hook to trace syscalls and generate a seccomp profile
|
| packages/nixpkgs/linuxPackages_latest.oci-seccomp-bpf-hook | OCI hook to trace syscalls and generate a seccomp profile
|
| packages/nixpkgs/python312Packages.nitime | Algorithms and containers for time-series analysis in time and spectral domains |
| packages/nixpkgs/supercronic | Cron tool designed for use in containers |
| packages/nixpkgs/haskellPackages.keys | Keyed functors and containers |
| packages/nixpkgs/python314Packages.datalad | Keep code, data, containers under control with git and git-annex |
| packages/nixpkgs/haskellPackages.staf | Numerical statistics for Foldable containers |
| packages/nixpkgs/haskellPackages.sets | Ducktyped set interface for Haskell containers |
| packages/nixpkgs/parallel-hashmap | Family of header-only, very fast and memory-friendly hashmap and btree containers |
| packages/nixpkgs/rootlesskit | Kind of Linux-native "fake root" utility, made for mainly running Docker and Kubernetes as an unprivileged user |
| packages/nixpkgs/haskellPackages.Empty | A type class for empty containers |
| packages/nixpkgs/python312Packages.datalad | Keep code, data, containers under control with git and git-annex |
| packages/nixpkgs/texlivePackages.memory | Containers for data in LaTeX |
| packages/nixpkgs/haskellPackages.vessel | Functor-parametric containers |
| packages/nixpkgs/gnomeExtensions.sermon | SerMon: an extension for monitoring and managing systemd services, cron jobs, docker and podman containers |
| packages/nixpkgs/haskellPackages.data-index | Extending the concept of indices for lists and other containers |
| packages/nixpkgs/haskellPackages.nspace | Efficient, infinite-precision 2D and 3D spatial containers |
| packages/nixpkgs/lazyjournal | TUI for journalctl, file system logs, as well as Docker and Podman containers |
| packages/nixpkgs/python312Packages.gumath | Library supporting function dispatch on general data containers |
| packages/nixpkgs/linuxKernel.packages.linux_6_1.oci-seccomp-bpf-hook | OCI hook to trace syscalls and generate a seccomp profile
|
| packages/nixpkgs/linuxKernel.packages.linux_6_6.oci-seccomp-bpf-hook | OCI hook to trace syscalls and generate a seccomp profile
|
| packages/nixpkgs/poetryPlugins.poetry-plugin-poeblix | Poetry Plugin that adds various features that extend the poetry command such as building wheel files with locked dependencies, and validations of wheel/docker containers |
| packages/nixpkgs/linuxKernel.packages.linux_lqx.oci-seccomp-bpf-hook | OCI hook to trace syscalls and generate a seccomp profile
|
| packages/nixpkgs/linuxKernel.packages.linux_zen.oci-seccomp-bpf-hook | OCI hook to trace syscalls and generate a seccomp profile
|
| packages/nixpkgs/envfs | Fuse filesystem that returns symlinks to executables based on the PATH of the requesting process |
| packages/nixpkgs/haskellPackages.pptable | Pretty Print containers in a tabular format |
| packages/nixpkgs/haskellPackages.hashmap | Persistent containers Map and Set based on hashing |
| packages/nixpkgs/linuxKernel.packages.linux_6_12.oci-seccomp-bpf-hook | OCI hook to trace syscalls and generate a seccomp profile
|
| packages/nixpkgs/linuxKernel.packages.linux_5_15.oci-seccomp-bpf-hook | OCI hook to trace syscalls and generate a seccomp profile
|
| packages/nixpkgs/linuxKernel.packages.linux_6_19.oci-seccomp-bpf-hook | OCI hook to trace syscalls and generate a seccomp profile
|
| packages/nixpkgs/linuxKernel.packages.linux_6_18.oci-seccomp-bpf-hook | OCI hook to trace syscalls and generate a seccomp profile
|
| packages/nixpkgs/haskellPackages.SizeCompare | Fast size comparison for standard containers |
| packages/nixpkgs/linuxKernel.packages.linux_5_10.oci-seccomp-bpf-hook | OCI hook to trace syscalls and generate a seccomp profile
|
| packages/nixpkgs/devcontainer | Dev container CLI, run and manage your dev environments via a devcontainer.json |
| packages/nixpkgs/haskellPackages.batchd-docker | docker containers host controller for batchd |
| packages/nixpkgs/haskellPackages.IntervalMap | Containers for intervals, with efficient search |
| packages/nixpkgs/haskellPackages.reducers | Semigroups, specialized containers and a general map/reduce framework |
| packages/nixpkgs/haskellPackages.mono-foldable | Folds for monomorphic containers |
| packages/nixpkgs/python313Packages.dissect-evidence | Dissect module implementing a parsers for various forensic evidence file containers |
| packages/nixpkgs/python314Packages.dissect-evidence | Dissect module implementing a parsers for various forensic evidence file containers |
| packages/nixpkgs/haskellPackages.data-interval | Interval datatype, interval arithmetic and interval-based containers |
| packages/nixpkgs/haskellPackages.filtrable | Class of filtrable containers |
| packages/nixpkgs/haskellPackages.container | Containers abstraction and utilities |
| packages/nixpkgs/haskellPackages.validity-dlist | Validity instances for containers |
| packages/nixpkgs/linuxKernel.packages.linux_xanmod.oci-seccomp-bpf-hook | OCI hook to trace syscalls and generate a seccomp profile
|
| packages/nixpkgs/haskellPackages.Transhare | A library to apply transformation to containers so as to maximize sharing of unchanged subcomponents |
| packages/nixpkgs/haskellPackages.microlens-ghc | microlens + array, bytestring, containers, transformers |
| packages/nixpkgs/python312Packages.dissect-evidence | Dissect module implementing a parsers for various forensic evidence file containers |
| packages/nixpkgs/i-pi | Universal force engine for ab initio and force field driven (path integral) molecular dynamics |
| packages/nixpkgs/has | Checks presence of various command line tools and their versions on the path |
| packages/nixpkgs/mptcpd | Daemon for Linux that performs Multipath TCP path management related operations in the user space |
| packages/nixpkgs/linuxPackages_xanmod_stable.oci-seccomp-bpf-hook | OCI hook to trace syscalls and generate a seccomp profile
|
| packages/nixpkgs/linuxPackages_xanmod_latest.oci-seccomp-bpf-hook | OCI hook to trace syscalls and generate a seccomp profile
|
| packages/nixpkgs/haskellPackages.compressed | Compressed containers and reducers |
| packages/nixpkgs/gomanagedocker | TUI tool to manage your docker images, containers and volumes |
| packages/nixpkgs/cxx-prettyprint | Header only C++ library for pretty printing standard containers |
| packages/nixpkgs/haskellPackages.unordered-graphs | Graph library using unordered-containers |
| packages/nixpkgs/linuxKernel.packages.linux_hardened.oci-seccomp-bpf-hook | OCI hook to trace syscalls and generate a seccomp profile
|
| packages/nixpkgs/haskellPackages.EnumContainers | Simple Enum-class-based int containers |
| packages/nixpkgs/gnomeExtensions.fix-remote-window-icons | This extension restores proper icon and app associations for remote X11 (Xwayland) windows that GNOME Shell fails to recognize |
| packages/nixpkgs/haskellPackages.sequential-index | Sequential numbers that allow arbitrarily inserting numbers - for containers |
| packages/nixpkgs/haskellPackages.Compactable | A generalization for containers that can be stripped of Nothing |
| packages/nixpkgs/haskellPackages.container-builder | Functions for building containers from a known number of elements |
| packages/nixpkgs/haskellPackages.mono-traversable | Type classes for mapping, folding, and traversing monomorphic containers |
| packages/nixpkgs/haskellPackages.unzip-traversable | Unzip functions for general Traversable containers |
| packages/nixpkgs/scion | Future Internet architecture utilizing path-aware networking |
| packages/nixpkgs/haskellPackages.mono-traversable-keys | Type-classes for interacting with monomorphic containers with a key |
| packages/nixpkgs/haskellPackages.microlens-ghc_0_4_15_1 | microlens + array, bytestring, containers, transformers |
| packages/nixpkgs/haskellPackages.microlens-ghc_0_4_15_2 | microlens + array, bytestring, containers, transformers |
| packages/nixpkgs/haskellPackages.ixset-typed-conversions | Conversions from ixset-typed to other containers |
| packages/nixpkgs/haskellPackages.sdp4unordered | SDP classes for unordered containers |
| packages/nixpkgs/openpgl | Intel Open Path Guiding Library |
| packages/nixpkgs/gnomeExtensions.dev-container-manager | Gnome Extension to enable cicd/container/kubernetes and cloud resource handling. https://www.youtube.com/watch?v=Ah-LQxtOHak you can use docker, podman and use kubernetes clusters with kind |
| packages/nixpkgs/bloodhound | Active Directory reconnaissance and attack path management tool |
| packages/nixpkgs/linuxKernel.packages.linux_xanmod_stable.oci-seccomp-bpf-hook | OCI hook to trace syscalls and generate a seccomp profile
|
| packages/nixpkgs/linuxKernel.packages.linux_xanmod_latest.oci-seccomp-bpf-hook | OCI hook to trace syscalls and generate a seccomp profile
|
| packages/nixpkgs/linuxKernel.packages.linux_6_12_hardened.oci-seccomp-bpf-hook | OCI hook to trace syscalls and generate a seccomp profile
|
| packages/nixpkgs/python313Packages.i-pi | Universal force engine for ab initio and force field driven (path integral) molecular dynamics |
| packages/nixpkgs/python313Packages.py | Library with cross-python path, ini-parsing, io, code, log facilities |
| packages/nixpkgs/python314Packages.py | Library with cross-python path, ini-parsing, io, code, log facilities |
| packages/nixpkgs/s0ix-selftest-tool | Tool for testing the S2idle path CPU Package C-state and S0ix failures |
| packages/nixpkgs/which | Shows the full path of (shell) commands |
| packages/nixpkgs/dlx | DLX simulator written in C |
| packages/nixpkgs/python313Packages.esig | This package provides "rough path" tools for analysing vector time series |
| packages/nixpkgs/python314Packages.esig | This package provides "rough path" tools for analysing vector time series |
| packages/nixpkgs/luajitPackages.loadkit | Loadkit allows you to load arbitrary files within the Lua package path |
| packages/nixpkgs/seppo | Personal Social Web |
| packages/nixpkgs/python312Packages.i-pi | Universal force engine for ab initio and force field driven (path integral) molecular dynamics |
| packages/nixpkgs/ocamlPackages.dispatch | Path-based dispatching for client- and server-side applications |
| packages/nixpkgs/scope-lite | Migration path to C++ library extensions scope_exit, scope_fail, scope_success, unique_resource |
| packages/nixpkgs/python314Packages.i-pi | Universal force engine for ab initio and force field driven (path integral) molecular dynamics |
| packages/nixpkgs/python312Packages.py | Library with cross-python path, ini-parsing, io, code, log facilities |
| packages/nixpkgs/luaPackages.loadkit | Loadkit allows you to load arbitrary files within the Lua package path |
| packages/nixpkgs/oils-for-unix | Unix shell with JSON-compatible structured data |
| packages/nixpkgs/parpd | Proxy ARP Daemon that complies with RFC 1027 |
| packages/nixpkgs/quisk | SDR transceiver for radios that use the Hermes protocol |
| packages/nixpkgs/python313Packages.jsonxs | Python library that uses path expression strings to get and set values in JSON |
| packages/nixpkgs/python314Packages.jsonxs | Python library that uses path expression strings to get and set values in JSON |
| packages/nixpkgs/lua51Packages.loadkit | Loadkit allows you to load arbitrary files within the Lua package path |
| packages/nixpkgs/lua54Packages.loadkit | Loadkit allows you to load arbitrary files within the Lua package path |
| packages/nixpkgs/lua55Packages.loadkit | Loadkit allows you to load arbitrary files within the Lua package path |
| packages/nixpkgs/lua53Packages.loadkit | Loadkit allows you to load arbitrary files within the Lua package path |
| packages/nixpkgs/lua52Packages.loadkit | Loadkit allows you to load arbitrary files within the Lua package path |
| packages/nixpkgs/proximity-sort | Simple command-line utility for sorting inputs by proximity to a path argument |
| packages/nixpkgs/unscd | Less buggy replacement for the glibc name service cache daemon |
| packages/nixpkgs/ls-lint | Extremely fast file and directory name linter |
| packages/nixpkgs/python312Packages.esig | This package provides "rough path" tools for analysing vector time series |
| packages/nixpkgs/ocamlPackages_latest.dispatch | Path-based dispatching for client- and server-side applications |
| packages/nixpkgs/rblake3sum | Recursive blake3 digest (hash) of a file-system path |
| packages/nixpkgs/rblake2sum | Recursive blake2 digest (hash) of a file-system path |
| packages/nixpkgs/tracelinks | Report on symbolic links encountered in path traversals |
| packages/nixpkgs/perlPackages.ClassISA | Report the search path for a class's ISA tree |
| packages/nixpkgs/python312Packages.jsonxs | Python library that uses path expression strings to get and set values in JSON |
| packages/nixpkgs/haskellPackages.SVGPath | Parsing the path command of SVG |
| packages/nixpkgs/perl5Packages.ClassISA | Report the search path for a class's ISA tree |
| packages/nixpkgs/alfis | Alternative Free Identity System |
| packages/nixpkgs/haskellPackages.which | Determine the full path to an executable |
| packages/nixpkgs/perlPackages.DevelFindPerl | Find the path to your perl |
| packages/nixpkgs/haskellPackages.mptcp-pm | A Multipath TCP path manager |
| packages/nixpkgs/perlPackages.MathPlanePath | Points on a path through the 2-D plane |
| packages/nixpkgs/perl5Packages.DevelFindPerl | Find the path to your perl |
| packages/nixpkgs/iro | CLI tool to convet Hex color code or RGB to color code, RGB, HSL and color name |
| packages/nixpkgs/perl5Packages.MathPlanePath | Points on a path through the 2-D plane |
| packages/nixpkgs/texlivePackages.crumbs | Add a Navigation Path to the page header |
| packages/nixpkgs/haskellPackages.within | A value within another path |
| packages/nixpkgs/haskellPackages.wai-route | WAI middleware for path-based request routing with captures |
| packages/nixpkgs/dhcpcd | Client for the Dynamic Host Configuration Protocol (DHCP) |
| packages/nixpkgs/djbdns | Collection of Domain Name System tools |
| packages/nixpkgs/idnkit | Provides functionalities about i18n domain name processing |
| packages/nixpkgs/haskellPackages.fswait | Wait and observe events on the filesystem for a path, with a timeout |
| packages/nixpkgs/nsncd | Name service non-caching daemon |
| packages/nixpkgs/nixos-install | Install bootloader and NixOS |
| packages/nixpkgs/perl540Packages.ClassISA | Report the search path for a class's ISA tree |
| packages/nixpkgs/perl538Packages.ClassISA | Report the search path for a class's ISA tree |
| packages/nixpkgs/alfis-nogui | Alternative Free Identity System |
| packages/nixpkgs/perlPackages.CryptOpenSSLGuess | Guess OpenSSL include path |
| packages/nixpkgs/upspin | Global name space for storing data akin to a filesystem |
| packages/nixpkgs/nsd | Authoritative only, high performance, simple and open source name server |
| packages/nixpkgs/perl5Packages.CryptOpenSSLGuess | Guess OpenSSL include path |
| packages/nixpkgs/python313Packages.dirsearch | Command-line tool for brute-forcing directories and files in webservers, AKA a web path scanner |
| packages/nixpkgs/python314Packages.dirsearch | Command-line tool for brute-forcing directories and files in webservers, AKA a web path scanner |
| packages/nixpkgs/perl540Packages.DevelFindPerl | Find the path to your perl |
| packages/nixpkgs/perl538Packages.DevelFindPerl | Find the path to your perl |
| packages/nixpkgs/haskellPackages.smallpt-hs | A Haskell port of the smallpt path tracer |
| packages/nixpkgs/perl538Packages.MathPlanePath | Points on a path through the 2-D plane |
| packages/nixpkgs/perl540Packages.MathPlanePath | Points on a path through the 2-D plane |
| packages/nixpkgs/perlPackages.TestLoadAllModules | Do use_ok for modules in search path |
| packages/nixpkgs/nixos-enter | Run a command in a NixOS chroot environment |
| packages/nixpkgs/ocamlPackages.dns | Domain Name System (DNS) library |
| packages/nixpkgs/perl5Packages.TestLoadAllModules | Do use_ok for modules in search path |
| packages/nixpkgs/aewan | Ascii-art Editor Without A Name |
| packages/nixpkgs/python313Packages.opsdroid-get-image-size | Get image width and height given a file path using minimal dependencies |
| packages/nixpkgs/python314Packages.opsdroid-get-image-size | Get image width and height given a file path using minimal dependencies |
| packages/nixpkgs/perl538Packages.CryptOpenSSLGuess | Guess OpenSSL include path |
| packages/nixpkgs/perl540Packages.CryptOpenSSLGuess | Guess OpenSSL include path |
| packages/nixpkgs/python312Packages.dirsearch | Command-line tool for brute-forcing directories and files in webservers, AKA a web path scanner |
| packages/nixpkgs/haskellPackages.paripari | Parser combinators with fast-path and slower fallback for error reporting |
| packages/nixpkgs/mimeo | Open files by MIME-type or file name using regular expressions |
| packages/nixpkgs/haskellPackages.waypoint | Bidirectional URL path, URL query string and HTTP headers codecs |
| packages/nixpkgs/git-crypt | Transparent file encryption in git |
| packages/nixpkgs/uniscribe | Explains Unicode characters/code points: Displays their name, category, and shows compositions |
| packages/nixpkgs/perlPackages.ExtUtilsInstallPaths | Build |
| packages/nixpkgs/perl5Packages.ExtUtilsInstallPaths | Build |
| packages/nixpkgs/perl540Packages.TestLoadAllModules | Do use_ok for modules in search path |
| packages/nixpkgs/perl538Packages.TestLoadAllModules | Do use_ok for modules in search path |
| packages/nixpkgs/vpnc-scripts | Script for vpnc to configure the network routing and name service |
| packages/nixpkgs/python312Packages.opsdroid-get-image-size | Get image width and height given a file path using minimal dependencies |
| packages/nixpkgs/python313Packages.requests-download | Download files using requests and save them to a target path |
| packages/nixpkgs/python314Packages.requests-download | Download files using requests and save them to a target path |
| packages/nixpkgs/detect | Expression-based file search combining name, content, metadata, and structured data predicates |
| packages/nixpkgs/dnsutils | Domain name server |
| packages/nixpkgs/getopt | Parses command-line arguments from shell scripts |
| packages/nixpkgs/jwhois | Client for the WHOIS protocol allowing you to query the owner of a domain name |
| packages/nixpkgs/nssmdns | MDNS Name Service Switch (NSS) plug-in |
| packages/nixpkgs/haskellPackages.pandoc-include-plus | Pandoc filter to include files, with image path and heading level adjustment |
| packages/nixpkgs/figurine | Print your name in style |
| packages/nixpkgs/perl538Packages.ExtUtilsInstallPaths | Build |
| packages/nixpkgs/perl540Packages.ExtUtilsInstallPaths | Build |
| packages/nixpkgs/python312Packages.requests-download | Download files using requests and save them to a target path |
| packages/nixpkgs/filegive | Easy p2p file sending program |
| packages/nixpkgs/ocamlPackages_latest.dns | Domain Name System (DNS) library |
| packages/nixpkgs/dig | Domain name server |
| packages/nixpkgs/dnstwist | Domain name permutation engine for detecting homograph phishing attacks |
| packages/nixpkgs/bind | Domain name server |
| packages/nixpkgs/host | Domain name server |
| packages/nixpkgs/nixpkgs-vet | Tool to vet (check) Nixpkgs, including its pkgs/by-name directory |
| packages/nixpkgs/ocamlPackages.dns-mirage | Opinionated Domain Name System (DNS) library |
| packages/nixpkgs/haskellPackages.filepattern | File path glob-like matching |
| packages/nixpkgs/spotifywm | Wrapper around Spotify that correctly sets class name before opening the window |
| packages/nixpkgs/ocamlPackages.uuidm | OCaml module implementing 128 bits universally unique identifiers version 3, 5 (name based with MD5, SHA-1 hashing) and 4 (random based) according to RFC 4122 |
| packages/nixpkgs/geticons | CLI utility to get icons for apps on your system or other generic icons by name |
| packages/nixpkgs/eschalot | Tor hidden service name generator |
| packages/nixpkgs/nixos-rebuild-ng | Rebuild your NixOS configuration and switch to it, on local hosts and remote |
| packages/nixpkgs/texlivePackages.pgfkeysearch | Find keys in a given path 'recursively' |
| packages/nixpkgs/ascii | Interactive ASCII name and synonym chart |
| packages/nixpkgs/ibus-engines.uniemoji | Input method (ibus) for entering unicode symbols and emoji by name |
| packages/nixpkgs/git-remote-gcrypt | Git remote helper for GPG-encrypted remotes |
| packages/nixpkgs/xml2 | Tools for command line processing of XML, HTML, and CSV |
| packages/nixpkgs/ocamlPackages_latest.dns-mirage | Opinionated Domain Name System (DNS) library |
| packages/nixpkgs/spooftooph | Automate spoofing or clone Bluetooth device Name, Class, and Address |
| packages/nixpkgs/wiggle | Tool for applying patches with conflicts |
| packages/nixpkgs/gnu-config | Attempt to guess a canonical system name |
| packages/nixpkgs/ocamlPackages_latest.uuidm | OCaml module implementing 128 bits universally unique identifiers version 3, 5 (name based with MD5, SHA-1 hashing) and 4 (random based) according to RFC 4122 |
| packages/nixpkgs/profont | Monospaced font created to be a most readable font for programming |
| packages/nixpkgs/perlPackages.NetDNS | Perl Interface to the Domain Name System |
| packages/nixpkgs/python313Packages.wcmatch | Wilcard File Name matching library |
| packages/nixpkgs/python314Packages.wcmatch | Wilcard File Name matching library |
| packages/nixpkgs/perl5Packages.NetDNS | Perl Interface to the Domain Name System |
| packages/nixpkgs/nix-required-mounts | A --pre-build-hook for Nix, that allows to expose extra paths in the build sandbox based on derivations' requiredSystemFeatrues |
| packages/nixpkgs/haskellPackages.nom | Name-binding & alpha-equivalence |
| packages/nixpkgs/openresolv | Program to manage /etc/resolv.conf |
| packages/nixpkgs/perlPackages.ProcFind | Find processes by name, PID, or some other attributes |
| packages/nixpkgs/texlivePackages.fink | The LaTeX2e File Name Keeper |
| packages/nixpkgs/libasyncns | C library for Linux/Unix for executing name service queries asynchronously |
| packages/nixpkgs/perl5Packages.ProcFind | Find processes by name, PID, or some other attributes |
| packages/nixpkgs/haskellPackages.HPath | Extract Haskell declarations by name |
| packages/nixpkgs/zstxtns-utils | Utilities to deal with text based name service databases |
| packages/nixpkgs/perlPackages.DataOptList | Parse and validate simple name/value option pairs |
| packages/nixpkgs/perlPackages.ClassLoad | Working (require "Class::Name") and more |
| packages/nixpkgs/haskellPackages.zenc | GHC style name Z-encoding and Z-decoding |
| packages/nixpkgs/ocamlPackages.yuujinchou | Name pattern combinators |
| packages/nixpkgs/haskellPackages.rpm-nvr | RPM package name-version-release data types |
| packages/nixpkgs/perlPackages.FileMimeInfo | Determine file type from the file name |
| packages/nixpkgs/perl5Packages.ClassLoad | Working (require "Class::Name") and more |
| packages/nixpkgs/perl5Packages.DataOptList | Parse and validate simple name/value option pairs |
| packages/nixpkgs/python312Packages.wcmatch | Wilcard File Name matching library |
| packages/nixpkgs/perl538Packages.NetDNS | Perl Interface to the Domain Name System |
| packages/nixpkgs/perl540Packages.NetDNS | Perl Interface to the Domain Name System |
| packages/nixpkgs/akkuPackages.chibi-net-dns | Domain Name Service library, with high-level utilities for address, mx and text record lookups |
| packages/nixpkgs/yaziPlugins.jump-to-char | Vim-like f<char>, jump to the next file whose name starts with <char>. |
| packages/nixpkgs/perlPackages.TryTinyByClass | Selectively catch exceptions by class name |
| packages/nixpkgs/perl5Packages.FileMimeInfo | Determine file type from the file name |
| packages/nixpkgs/python313Packages.outdated | Mini-library which, given a package name and a version, checks if it's the latest version available on PyPI |
| packages/nixpkgs/python314Packages.outdated | Mini-library which, given a package name and a version, checks if it's the latest version available on PyPI |
| packages/nixpkgs/perlPackages.ModuleUtil | Module name tools and transformations |
| packages/nixpkgs/perl5Packages.TryTinyByClass | Selectively catch exceptions by class name |
| packages/nixpkgs/haskellPackages.hcount | Haskell artifact name counts |
| packages/nixpkgs/perl5Packages.ModuleUtil | Module name tools and transformations |
| packages/nixpkgs/haskellPackages.gender | Identify a persons gender by their first name |
| packages/nixpkgs/perl540Packages.ProcFind | Find processes by name, PID, or some other attributes |
| packages/nixpkgs/perl538Packages.ProcFind | Find processes by name, PID, or some other attributes |
| packages/nixpkgs/gnomeExtensions.xremap | Allow xremap to fetch the focused app name using D-Bus or local socket. |
| packages/nixpkgs/haskellPackages.lsfrom | List directory files starting from a specific name |
| packages/nixpkgs/libcanberra | Implementation of the XDG Sound Theme and Name Specifications |
| packages/nixpkgs/ocamlPackages_latest.yuujinchou | Name pattern combinators |
| packages/nixpkgs/akkuPackages.r6rs-psystem | OS name and libc-loading for PFFI |
| packages/nixpkgs/haskellPackages.resolv | Domain Name Service (DNS) lookup via the libresolv standard library routines |
| packages/nixpkgs/haskellPackages.windns | Domain Name Service (DNS) lookup via the <windns.h>/dnsapi.dll standard library |
| packages/nixpkgs/perl538Packages.DataOptList | Parse and validate simple name/value option pairs |
| packages/nixpkgs/perl540Packages.DataOptList | Parse and validate simple name/value option pairs |
| packages/nixpkgs/perl538Packages.ClassLoad | Working (require "Class::Name") and more |
| packages/nixpkgs/perl540Packages.ClassLoad | Working (require "Class::Name") and more |
| packages/nixpkgs/libcanberra-gtk3 | Implementation of the XDG Sound Theme and Name Specifications |
| packages/nixpkgs/libcanberra-gtk2 | Implementation of the XDG Sound Theme and Name Specifications |
| packages/nixpkgs/python313Packages.srvlookup | Wrapper for dnspython to return SRV records for a given host, protocol, and domain name |
| packages/nixpkgs/python314Packages.srvlookup | Wrapper for dnspython to return SRV records for a given host, protocol, and domain name |
| packages/nixpkgs/perl540Packages.FileMimeInfo | Determine file type from the file name |
| packages/nixpkgs/perl538Packages.FileMimeInfo | Determine file type from the file name |
| packages/nixpkgs/haskellPackages.system-info | Get the name of the operating system |
| packages/nixpkgs/haskellPackages.resolve | A name resolusion library |
| packages/nixpkgs/python313Packages.click-default-group | Group to invoke a command without explicit subcommand name |
| packages/nixpkgs/python314Packages.click-default-group | Group to invoke a command without explicit subcommand name |
| packages/nixpkgs/nodePackages.poor-mans-t-sql-formatter-cli | A T-SQL formatting utility in JS, transpiled from the C# library of the same name. |
| packages/nixpkgs/python312Packages.outdated | Mini-library which, given a package name and a version, checks if it's the latest version available on PyPI |
| packages/nixpkgs/dnstracer | Determines where a given Domain Name Server (DNS) gets its information from, and follows the chain of DNS servers back to the servers which know the data |
| packages/nixpkgs/texlivePackages.grffile | Extended file name support for graphics (legacy package) |
| packages/nixpkgs/haskellPackages.CabalSearch | Search cabal packages by name |
| packages/nixpkgs/perl538Packages.TryTinyByClass | Selectively catch exceptions by class name |
| packages/nixpkgs/perl540Packages.TryTinyByClass | Selectively catch exceptions by class name |
| packages/nixpkgs/haskellPackages.ConsStream | Trivial re-export of Wouter Swierstra's Stream package, avoiding module name clash |
| packages/nixpkgs/perl540Packages.ModuleUtil | Module name tools and transformations |
| packages/nixpkgs/perl538Packages.ModuleUtil | Module name tools and transformations |
| packages/nixpkgs/haskellPackages.daemons | Daemons in Haskell made fun and easy |
| packages/nixpkgs/haskellPackages.window-utils | OS window icon/name utilities |
| packages/nixpkgs/haskellPackages.network-dns | Domain Name System data structures |
| packages/nixpkgs/gnomeExtensions.user-id-in-top-panel | Add ( user name :: user id @ host ) in top panel |
| packages/nixpkgs/haskellPackages.itanium-abi | An implementation of name mangling/demangling for the Itanium ABI |
| packages/nixpkgs/haskellPackages.acme-omitted | A name for omitted definitions |
| packages/nixpkgs/moreutils | Growing collection of the unix tools that nobody thought to write long ago when unix was young |
| packages/nixpkgs/texlivePackages.fetchcls | Fetch the current class name |
| packages/nixpkgs/haskellPackages.haskell-docs | A program to find and display the docs and type of a name |
| packages/nixpkgs/luarocks-packages-updater | Module to update luarocks-packages |
| packages/nixpkgs/texlivePackages.storecmd | Store the name of a defined command in a container |
| packages/nixpkgs/texlivePackages.etexcmds | Avoid name clashes with e-TeX commands |
| packages/nixpkgs/python312Packages.srvlookup | Wrapper for dnspython to return SRV records for a given host, protocol, and domain name |
| packages/nixpkgs/texlivePackages.refenums | Define named items and provide back-references with that name |
| packages/nixpkgs/python312Packages.click-default-group | Group to invoke a command without explicit subcommand name |
| packages/nixpkgs/nodePackages_latest.poor-mans-t-sql-formatter-cli | A T-SQL formatting utility in JS, transpiled from the C# library of the same name. |
| packages/nixpkgs/haskellPackages.dns-patterns | DNS name parsing and pattern matching utilities |
| packages/nixpkgs/vimPlugins.yaml-companion-nvim | |
| packages/nixpkgs/gnomeExtensions.toggle-window | For security reasons, since Gnome 41, cann't invoke '**org.gnome |
| packages/nixpkgs/python313Packages.libasyncns | Libasyncns-python is a python binding for the asynchronous name service query library |
| packages/nixpkgs/python314Packages.libasyncns | Libasyncns-python is a python binding for the asynchronous name service query library |
| packages/nixpkgs/texlivePackages.cmdstring | Get command name reliably |
| packages/nixpkgs/gnomeExtensions.vpn-indicator | Display current VPN name in panel. |
| packages/nixpkgs/perlPackages.DataValidateDomain | Domain and host name validation |
| packages/nixpkgs/haskellPackages.NameGenerator | A name generator written in Haskell |
| packages/nixpkgs/perl5Packages.DataValidateDomain | Domain and host name validation |
| packages/nixpkgs/libcanberra_kde | Implementation of the XDG Sound Theme and Name Specifications |
| packages/nixpkgs/gnomeExtensions.ip-indicator | Displays the current IP address of the network with it's relevant interface name |
| packages/nixpkgs/python312Packages.libasyncns | Libasyncns-python is a python binding for the asynchronous name service query library |
| packages/nixpkgs/texlivePackages.noconflict | Resolve macro name conflict between packages |
| packages/nixpkgs/texlivePackages.savefnmark | Save name of the footnote mark for reuse |
| packages/nixpkgs/haskellPackages.denominate | Functions supporting bulk file and directory name normalization |
| packages/nixpkgs/perlPackages.Apppapersway | PaperWM-like scrollable tiling window management for Sway/i3wm |
| packages/nixpkgs/perl538Packages.DataValidateDomain | Domain and host name validation |
| packages/nixpkgs/perl540Packages.DataValidateDomain | Domain and host name validation |
| packages/nixpkgs/haskellPackages.hs-nombre-generator | Name generator |
| packages/nixpkgs/perl5Packages.Apppapersway | PaperWM-like scrollable tiling window management for Sway/i3wm |
| packages/nixpkgs/python313Packages.pyaxmlparser | Python3 Parser for Android XML file and get Application Name without using Androguard |
| packages/nixpkgs/python314Packages.pyaxmlparser | Python3 Parser for Android XML file and get Application Name without using Androguard |
| packages/nixpkgs/python312Packages.publicsuffix | Allows to get the public suffix of a domain name |
| packages/nixpkgs/python313Packages.publicsuffix | Allows to get the public suffix of a domain name |
| packages/nixpkgs/perl540Packages.Apppapersway | PaperWM-like scrollable tiling window management for Sway/i3wm |
| packages/nixpkgs/perl538Packages.Apppapersway | PaperWM-like scrollable tiling window management for Sway/i3wm |
| packages/nixpkgs/python312Packages.pyaxmlparser | Python3 Parser for Android XML file and get Application Name without using Androguard |
| packages/nixpkgs/python313Packages.publicsuffix2 | Get a public suffix for a domain name using the Public Suffix List |
| packages/nixpkgs/python314Packages.publicsuffix2 | Get a public suffix for a domain name using the Public Suffix List |
| packages/nixpkgs/python312Packages.publicsuffix2 | Get a public suffix for a domain name using the Public Suffix List |
| packages/nixpkgs/perlPackages.MooseXSemiAffordanceAccessor | Name your accessors foo() and set_foo() |
| packages/nixpkgs/perl5Packages.MooseXSemiAffordanceAccessor | Name your accessors foo() and set_foo() |
| packages/nixpkgs/perl540Packages.MooseXSemiAffordanceAccessor | Name your accessors foo() and set_foo() |
| packages/nixpkgs/perl538Packages.MooseXSemiAffordanceAccessor | Name your accessors foo() and set_foo() |
| packages/nixpkgs/gnomeExtensions.applications-overview-tooltip | Shows a tooltip over applications icons on applications overview with application name and/or description. |
| packages/nixpkgs/python313Packages.cv2-enumerate-cameras | Retrieve the connected camera's name, VID, PID, and the corresponding OpenCV index |
| packages/nixpkgs/python314Packages.cv2-enumerate-cameras | Retrieve the connected camera's name, VID, PID, and the corresponding OpenCV index |
| packages/nixpkgs/python312Packages.cv2-enumerate-cameras | Retrieve the connected camera's name, VID, PID, and the corresponding OpenCV index |
| packages/nixpkgs/gnomeExtensions.transcodeappsearch | Searching apps both direct and transcoded name (English, Russian, Ukrainian langs) |
| packages/nixpkgs/patchRcPathCsh | Setup-hook to inject source-time PATH prefix to a Csh script |
| packages/nixpkgs/addBinToPathHook | |
| packages/nixpkgs/patchRcPathFish | Setup-hook to inject source-time PATH prefix to a Fish script |
| packages/nixpkgs/patchRcPathBash | Setup-hook to inject source-time PATH prefix to a Bash/Ksh/Zsh script |
| packages/nixpkgs/patchRcPathPosix | Setup-hook to inject source-time PATH prefix to a POSIX shell script |
| packages/nixpkgs/rocmPackages.rocmPath | |
| packages/nixpkgs/perlPackages.EnvPath | Advanced operations on path variables |
| packages/nixpkgs/perl5Packages.EnvPath | Advanced operations on path variables |
| packages/nixpkgs/perlPackages.PathTiny | File path utility |
| packages/nixpkgs/perl5Packages.PathTiny | File path utility |
| packages/nixpkgs/rPackages.Path2PPI | |
| packages/nixpkgs/rPackages.CBN2Path | |
| packages/nixpkgs/perlPackages.PathClass | Cross-platform path specification manipulation |
| packages/nixpkgs/perl5Packages.PathClass | Cross-platform path specification manipulation |
| packages/nixpkgs/perlPackages.FilePath | Create or remove directory trees |
| packages/nixpkgs/perl5Packages.FilePath | Create or remove directory trees |
| packages/nixpkgs/perl540Packages.EnvPath | Advanced operations on path variables |
| packages/nixpkgs/perl538Packages.EnvPath | Advanced operations on path variables |
| packages/nixpkgs/perlPackages.ModulePath | Get the full path to a locally installed module |
| packages/nixpkgs/perl540Packages.PathTiny | File path utility |
| packages/nixpkgs/perl538Packages.PathTiny | File path utility |
| packages/nixpkgs/perl5Packages.ModulePath | Get the full path to a locally installed module |
| packages/nixpkgs/perl540Packages.PathClass | Cross-platform path specification manipulation |
| packages/nixpkgs/perl538Packages.PathClass | Cross-platform path specification manipulation |
| packages/nixpkgs/perlPackages.MooseXTypesPathTiny | Path::Tiny types and coercions for Moose |
| packages/nixpkgs/perl540Packages.FilePath | Create or remove directory trees |
| packages/nixpkgs/perl538Packages.FilePath | Create or remove directory trees |
| packages/nixpkgs/nth | Module and CLI for the identification of hashes |
| packages/nixpkgs/perl538Packages.ModulePath | Get the full path to a locally installed module |
| packages/nixpkgs/perl540Packages.ModulePath | Get the full path to a locally installed module |
| packages/nixpkgs/perl5Packages.MooseXTypesPathTiny | Path::Tiny types and coercions for Moose |
| packages/nixpkgs/perlPackages.MooseXTypesPathClass | Path::Class type library for Moose |
| packages/nixpkgs/perlPackages.MouseXTypesPathClass | Cross-platform path specification manipulation |
| packages/nixpkgs/perl5Packages.MooseXTypesPathClass | Path::Class type library for Moose |
| packages/nixpkgs/perl5Packages.MouseXTypesPathClass | Cross-platform path specification manipulation |
| packages/nixpkgs/perl538Packages.MooseXTypesPathTiny | Path::Tiny types and coercions for Moose |
| packages/nixpkgs/perl540Packages.MooseXTypesPathTiny | Path::Tiny types and coercions for Moose |
| packages/nixpkgs/perl538Packages.MouseXTypesPathClass | Cross-platform path specification manipulation |
| packages/nixpkgs/perl540Packages.MouseXTypesPathClass | Cross-platform path specification manipulation |
| packages/nixpkgs/perl540Packages.MooseXTypesPathClass | Path::Class type library for Moose |
| packages/nixpkgs/perl538Packages.MooseXTypesPathClass | Path::Class type library for Moose |
| packages/nixpkgs/perlPackages.SpecioLibraryPathTiny | Path::Tiny types and coercions for Specio |
| packages/nixpkgs/setJavaClassPath | |
| packages/nixpkgs/perl5Packages.SpecioLibraryPathTiny | Path::Tiny types and coercions for Specio |
| packages/nixpkgs/rPackages.Path_Analysis | |
| packages/nixpkgs/perl540Packages.SpecioLibraryPathTiny | Path::Tiny types and coercions for Specio |
| packages/nixpkgs/perl538Packages.SpecioLibraryPathTiny | Path::Tiny types and coercions for Specio |
| packages/nixpkgs/perlPackages.PathIteratorRule | Iterative, recursive file finder |
| packages/nixpkgs/perl5Packages.PathIteratorRule | Iterative, recursive file finder |
| packages/nixpkgs/perlPackages.SubName | (Re)name a sub |
| packages/nixpkgs/perl5Packages.SubName | (Re)name a sub |
| packages/nixpkgs/perl540Packages.PathIteratorRule | Iterative, recursive file finder |
| packages/nixpkgs/perl538Packages.PathIteratorRule | Iterative, recursive file finder |
| packages/nixpkgs/perlPackages.PathDispatcher | Flexible and extensible dispatch |
| packages/nixpkgs/perl5Packages.PathDispatcher | Flexible and extensible dispatch |
| packages/nixpkgs/perl540Packages.PathDispatcher | Flexible and extensible dispatch |
| packages/nixpkgs/perl538Packages.PathDispatcher | Flexible and extensible dispatch |
| packages/nixpkgs/perl540Packages.SubName | (Re)name a sub |
| packages/nixpkgs/perl538Packages.SubName | (Re)name a sub |
| packages/nixpkgs/perlPackages.SymbolGlobalName | Finds name and type of a global variable |
| packages/nixpkgs/perl5Packages.SymbolGlobalName | Finds name and type of a global variable |
| packages/nixpkgs/fixDarwinDylibNames | |
| packages/nixpkgs/perl540Packages.SymbolGlobalName | Finds name and type of a global variable |
| packages/nixpkgs/perl538Packages.SymbolGlobalName | Finds name and type of a global variable |
| packages/nixpkgs/python312Packages.pythonNamespacesHook | |
| packages/nixpkgs/python313Packages.pythonNamespacesHook | |
| packages/nixpkgs/python314Packages.pythonNamespacesHook | |
| packages/nixpkgs/sbclPackages.pathname-utils | |
| packages/nixpkgs/sbclPackages.pcl-pathnames | |
| packages/nixpkgs/sbclPackages.pathname-utils-test | |
| packages/nixpkgs/akkuPackages.chibi-pathname | A general, non-filesystem-specific pathname library |
| packages/nixpkgs/dnsname-cni | DNS name resolution for containers |
| packages/nixpkgs/sbclPackages.illogical-pathnames | |
| packages/nixpkgs/a-keys-path | Short puzzle-platformer game made with Godot, running on GLES 2.0 |
| packages/nixpkgs/sbclPackages.cl-ana_dot_pathname-utils | |
| packages/nixpkgs/chickenPackages_5.chickenEggs.pathname-expand | |
| packages/nixpkgs/python313Packages.path | Object-oriented file system path manipulation |
| packages/nixpkgs/python314Packages.path | Object-oriented file system path manipulation |
| packages/nixpkgs/texlivePackages.path | Typeset paths, making them breakable |
| packages/nixpkgs/haskellPackages.path | Support for well-typed paths |
| packages/nixpkgs/svg-text-to-path | Convert svg nodes to vector font-free elements |
| packages/nixpkgs/haskellPackages.path-tagged | A wrapper around the @path@ library, tagged with semantic name |
| packages/nixpkgs/rnd-name | Random strings that are easy to recognize |
| packages/nixpkgs/sbclPackages.mnas-path | |
| packages/nixpkgs/ocamlPackages.containers | Modular standard library focused on data structures |
| packages/nixpkgs/vimPlugins.cmp-path | |
| packages/nixpkgs/haskellPackages.path_0_9_6 | Support for well-typed paths |
| packages/nixpkgs/haskellPackages.path_0_9_5 | Support for well-typed paths |
| packages/nixpkgs/haskellPackages.path-io | Interface to ‘directory’ package for users of ‘path’ |
| packages/nixpkgs/ocamlPackages_latest.containers | Modular standard library focused on data structures |
| packages/nixpkgs/python313Packages.svg-path | SVG path objects and parser |
| packages/nixpkgs/python314Packages.svg-path | SVG path objects and parser |
| packages/nixpkgs/vimPlugins.ncm2-path | |
| packages/nixpkgs/sbclPackages.cl-containers | |
| packages/nixpkgs/sbclPackages.path-parse | |
| packages/nixpkgs/ocamlPackages.containers-data | Set of advanced datatypes for containers |
| packages/nixpkgs/haskellPackages.ast-path | vocabulary representation for predicting program properties |
| packages/nixpkgs/frozen-containers | Header-only library that provides 0 cost initialization for immutable containers, fixed-size containers, and various algorithms |
| packages/nixpkgs/sbclPackages.cl-containers-test | |
| packages/nixpkgs/ocamlPackages_latest.containers-data | Set of advanced datatypes for containers |
| packages/nixpkgs/haskellPackages.win-hp-path | Work with multiple Haskell Platform versions on Windows |
| packages/nixpkgs/haskellPackages.path-sing | A singleton wrapper for the `path` library |
| packages/nixpkgs/haskellPackages.path-like | PathLike, FileLike and DirLike type classes for the Path library |
| packages/nixpkgs/haskellPackages.stm-containers | Containers for STM |
| packages/nixpkgs/path-of-building | Offline build planner for Path of Exile |
| packages/nixpkgs/haskellPackages.path-tree | `Data |
| packages/nixpkgs/sbclPackages.path-parse-test | |
| packages/nixpkgs/sbclPackages.path-string | |
| packages/nixpkgs/haskellPackages.yaya-containers | Pattern functors and instances for types in the containers package |
| packages/nixpkgs/idrisPackages.containers | Various data structures for use in the Idris Language |
| packages/nixpkgs/ocamlPackages.irmin-containers | Mergeable Irmin data structures |
| packages/nixpkgs/vimPlugins.cmp-fuzzy-path | |
| packages/nixpkgs/haskellPackages.fcf-containers | Data structures and algorithms for first-class-families |
| packages/nixpkgs/haskellPackages.file-path-th | Template Haskell utilities for filepaths |
| packages/nixpkgs/vimPlugins.cmp-async-path | Nvim-cmp source for filesystem paths with async processing |
| packages/nixpkgs/haskellPackages.more-containers | A few more collections |
| packages/nixpkgs/rPackages.pathMED | |
| packages/nixpkgs/rPackages.pathVar | |
| packages/nixpkgs/haskellPackages.byte-containers | Sets and maps with 8-bit words for keys |
| packages/nixpkgs/haskellPackages.text-containers | Memory-efficient string-indexed container types |
| packages/nixpkgs/haskellPackages.strict-containers | Strict containers |
| packages/nixpkgs/haskellPackages.impure-containers | Mutable containers in Haskell |
| packages/nixpkgs/haskellPackages.liquid-containers | Old specs for containers |
| packages/nixpkgs/haskellPackages.shake-path | path alternatives to shake functions |
| packages/nixpkgs/haskellPackages.path-utils | Handful of simple utility functions for the path library |
| packages/nixpkgs/vimPlugins.nvim-remote-containers | |
| packages/nixpkgs/emacsPackages.save-load-path | |
| packages/nixpkgs/emacsPackages.kill-file-path | |
| packages/nixpkgs/haskellPackages.multi-containers | A few multimap variants |
| packages/nixpkgs/ocamlPackages_latest.irmin-containers | Mergeable Irmin data structures |
| packages/nixpkgs/haskellPackages.non-empty-containers | |
| packages/nixpkgs/sbclPackages.path-string-test | |
| packages/nixpkgs/rPackages.name | |
| packages/nixpkgs/haskellPackages.path-extra | URLs without host information |
| packages/nixpkgs/haskellPackages.strict-containers-lens | Strict containers - Lens instances |
| packages/nixpkgs/gnomeExtensions.containers | Manage podman containers through a gnome-shell menu |
| packages/nixpkgs/haskellPackages.exposed-containers | A distribution of the 'containers' package, with all modules exposed |
| packages/nixpkgs/haskellPackages.mutable-containers | Abstactions and concrete implementations of mutable containers |
| packages/nixpkgs/haskellPackages.containers-deepseq | Provide orphan NFData instances for containers as needed. (deprecated) |
| packages/nixpkgs/haskellPackages.containers-good-graph | Data |
| packages/nixpkgs/python313Packages.mypy-boto3-emr-containers | Type annotations for boto3 emr-containers |
| packages/nixpkgs/python314Packages.mypy-boto3-emr-containers | Type annotations for boto3 emr-containers |
| packages/nixpkgs/haskellPackages.containers_0_8 | Assorted concrete container types |
| packages/nixpkgs/haskellPackages.path-text-utf8 | Read and write UTF-8 text files |
| packages/nixpkgs/haskellPackages.expiring-containers | Expiring containers |
| packages/nixpkgs/haskellPackages.disjoint-containers | Disjoint containers |
| packages/nixpkgs/python313Packages.jaraco-path | Miscellaneous path functions |
| packages/nixpkgs/python314Packages.jaraco-path | Miscellaneous path functions |
| packages/nixpkgs/haskellPackages.validity-containers | Validity instances for containers |
| packages/nixpkgs/haskellPackages.monoidal-containers | Containers with monoidal accumulation |
| packages/nixpkgs/haskellPackages.unpacked-containers | Unpacked containers via backpack |
| packages/nixpkgs/emacsPackages.path-helper | |
| packages/nixpkgs/haskellPackages.containers-verified | Formally verified drop-in replacement of containers |
| packages/nixpkgs/emacsPackages.shrink-path | |
| packages/nixpkgs/haskellPackages.nonempty-containers | Non-empty variants of containers data types, with full API |
| packages/nixpkgs/rPackages.this_path | |
| packages/nixpkgs/haskellPackages.indexed-containers | Simple, no-frills indexed lists |
| packages/nixpkgs/rusty-path-of-building | A cross-platform runtime for Path of Building and Path of Building 2. |
| packages/nixpkgs/haskellPackages.ordered-containers | Set- and Map-like types that remember the order elements were inserted |
| packages/nixpkgs/haskellPackages.refined-containers | Type-checked proof that a key exists in a container and can be safely indexed |
| packages/nixpkgs/haskellPackages.unboxed-containers | Self-optimizing unboxed sets using view patterns and data families |
| packages/nixpkgs/haskellPackages.amazonka-emr-containers | Amazon EMR Containers SDK |
| packages/nixpkgs/sbclPackages.xpath | |
| packages/nixpkgs/sbclPackages.ppath | |
| packages/nixpkgs/emacsPackages.x-path-walker | |
| packages/nixpkgs/typstPackages.name-it | Get the English names of integers |
| packages/nixpkgs/python312Packages.path | Object-oriented file system path manipulation |
| packages/nixpkgs/haskellPackages.extended-containers-lens | lens instances for extended-containers |
| packages/nixpkgs/haskellPackages.acme-circular-containers | Spineless containers which are fast to read but inefficient to update |
| packages/nixpkgs/haskellPackages.reflex-dynamic-containers | various dynamic containers for Reflex |
| packages/nixpkgs/python312Packages.mypy-boto3-emr-containers | Type annotations for boto3 emr-containers |
| packages/nixpkgs/haskellPackages.insert-ordered-containers | Associative containers retaining insertion order for traversals |
| packages/nixpkgs/python313Packages.python-path | Clean way to import scripts on other folders via a context manager |
| packages/nixpkgs/python314Packages.python-path | Clean way to import scripts on other folders via a context manager |
| packages/nixpkgs/haskellPackages.primitive-containers | containers backed by arrays |
| packages/nixpkgs/emacsPackages.pretty-sha-path | |
| packages/nixpkgs/haskellPackages.containers-benchmark | Extensive benchmark suite for containers package |
| packages/nixpkgs/haskellPackages.path-pieces | Components of paths |
| packages/nixpkgs/haskellPackages.adaptive-containers | Self optimizing container types |
| packages/nixpkgs/haskellPackages.extended-containers | Heap and Vector container types |
| packages/nixpkgs/haskellPackages.strong-path | Strongly typed paths in Haskell |
| packages/nixpkgs/sbclPackages.com_dot_gigamonkeys_dot_pathnames | |
| packages/nixpkgs/python312Packages.svg-path | SVG path objects and parser |
| packages/nixpkgs/haskellPackages.ten-unordered-containers | Higher-kinded hash containers |
| packages/nixpkgs/sbclPackages.cl-paths | |
| packages/nixpkgs/gnomeExtensions.easy-docker-containers | A GNOME Shell extension (GNOME Panel applet) to be able to generally control your available Docker containers. |
| packages/nixpkgs/emacsPackages.exec-path-from-shell | |
| packages/nixpkgs/haskellPackages.unordered-containers | Efficient hashing-based container types |
| packages/nixpkgs/haskellPackages.changeset-containers | Stateful monad transformer based on monoidal actions |
| packages/nixpkgs/haskellPackages.justified-containers | Keyed container types with type-checked proofs of key presence |
| packages/nixpkgs/haskellPackages.cereal-unordered-containers | Integration of "cereal" and "unordered-containers" |
| packages/nixpkgs/haskellPackages.strict-containers-serialise | Strict containers - Serialise instances |
| packages/nixpkgs/haskellPackages.containers-unicode-symbols | Unicode alternatives for common functions and operators |
| packages/nixpkgs/rPackages.path_chain | |
| packages/nixpkgs/chrpath | Command line tool to adjust the RPATH or RUNPATH of ELF binaries |
| packages/nixpkgs/sbclPackages.cl-paths-ttf | |
| packages/nixpkgs/haskellPackages.unordered-containers-rematch | Rematch support for unordered containers |
| packages/nixpkgs/haskellPackages.genvalidity-containers | GenValidity support for containers |
| packages/nixpkgs/haskellPackages.containers-accelerate | Hashing-based container types |
| packages/nixpkgs/haskellPackages.data-default-instances-containers | Default instances for types in containers |
| packages/nixpkgs/sbclPackages.ppath-test | |
| packages/nixpkgs/haskellPackages.validity-unordered-containers | Validity instances for unordered-containers |
| packages/nixpkgs/python313Packages.path-and-address | Functions for server CLI applications used by humans |
| packages/nixpkgs/python314Packages.path-and-address | Functions for server CLI applications used by humans |
| packages/nixpkgs/haskellPackages.hslua-module-path | Lua module to work with file paths |
| packages/nixpkgs/python312Packages.jaraco-path | Miscellaneous path functions |
| packages/nixpkgs/rPackages.mpath | |
| packages/nixpkgs/rPackages.paths | |
| packages/nixpkgs/typstPackages.name-it_0_1_0 | Get the English names of integers |
| packages/nixpkgs/typstPackages.name-it_0_1_1 | Get the English names of integers |
| packages/nixpkgs/typstPackages.name-it_0_1_2 | Get the English names of integers |
| packages/nixpkgs/vscode-extensions.ms-vscode-remote.remote-containers | Open any folder or repository inside a Docker container |
| packages/nixpkgs/rPackages.RAMpath | |
| packages/nixpkgs/emacsPackages.add-node-modules-path | |
| packages/nixpkgs/emacsPackages.path-iterator | |
| packages/nixpkgs/python313Packages.pathy | Path interface for local and cloud bucket storage |
| packages/nixpkgs/python314Packages.pathy | Path interface for local and cloud bucket storage |
| packages/nixpkgs/haskellPackages.validity-path | Validity instances for Path |
| packages/nixpkgs/haskellPackages.polysemy-path | Polysemy versions of Path functions |
| packages/nixpkgs/rPackages.miRNApath | |
| packages/nixpkgs/rPackages.pathRender | |
| packages/nixpkgs/haskellPackages.bpath | A minimal typed unix path library |
| packages/nixpkgs/edname | Mass renamer using $EDITOR |
| packages/nixpkgs/python313Packages.types-aiobotocore-emr-containers | Type annotations for aiobotocore emr-containers |
| packages/nixpkgs/python314Packages.types-aiobotocore-emr-containers | Type annotations for aiobotocore emr-containers |
| packages/nixpkgs/python312Packages.python-path | Clean way to import scripts on other folders via a context manager |
| packages/nixpkgs/haskellPackages.unliftio-path | UnliftIO using well-typed Paths |
| packages/nixpkgs/rPackages.rocsvm_path | |
| packages/nixpkgs/python313Packages.colcon-library-path | Extension for colcon to set the library path environment variable |
| packages/nixpkgs/python314Packages.colcon-library-path | Extension for colcon to set the library path environment variable |
| packages/nixpkgs/vscode-extensions.ms-azuretools.vscode-containers | Container Tools Extension for Visual Studio Code |
| packages/nixpkgs/python312Packages.types-aiobotocore-emr-containers | Type annotations for aiobotocore emr-containers |
| packages/nixpkgs/haskellPackages.hpath | Support for well-typed paths |
| packages/nixpkgs/haskellPackages.paths | Library for representing and manipulating type-safe file paths |
| packages/nixpkgs/python313Packages.dpath | Python library for accessing and searching dictionaries via /slashed/paths ala xpath |
| packages/nixpkgs/python314Packages.dpath | Python library for accessing and searching dictionaries via /slashed/paths ala xpath |
| packages/nixpkgs/haskellPackages.genvalidity-unordered-containers | GenValidity support for unordered-containers |
| packages/nixpkgs/wmname | Prints or set the window manager name property of the root window |
| packages/nixpkgs/emacsPackages.friendly-tramp-path | |
| packages/nixpkgs/haskellPackages.path-dhall-instance | ToDhall and FromDhall instances for Path |
| packages/nixpkgs/haskellPackages.data-default-instances-unordered-containers | Default instances for unordered-containers |
| packages/nixpkgs/jmespath | Golang implementation of JMESPath |
| packages/nixpkgs/repath-studio | Cross-platform vector graphics editor, that combines procedural tooling with traditional design workflows |
| packages/nixpkgs/mnamer | Intelligent and highly configurable media organization utility |
| packages/nixpkgs/yamlpath | Command-line processors for YAML/JSON/Compatible data |
| packages/nixpkgs/python312Packages.path-and-address | Functions for server CLI applications used by humans |
| packages/nixpkgs/haskellPackages.hpath-io | High-level IO operations on files/directories |
| packages/nixpkgs/haskellPackages.hpath-filepath | ByteString based filepath manipulation |
| packages/nixpkgs/python313Packages.pytest-resource-path | Pytest plugin to provide path for uniform access to test resources |
| packages/nixpkgs/python314Packages.pytest-resource-path | Pytest plugin to provide path for uniform access to test resources |
| packages/nixpkgs/haskellPackages.say-my-name | Require explicit type application for some type variables |
| packages/nixpkgs/haskellPackages.path-binary-instance | Binary instance for Path |
| packages/nixpkgs/rsonpath | Experimental JSONPath engine for querying massive streamed datasets |
| packages/nixpkgs/rPackages.apathe | |
| packages/nixpkgs/rPackages.ggpath | |
| packages/nixpkgs/rPackages.mpathr | |
| packages/nixpkgs/rPackages.spaths | |
| packages/nixpkgs/python313Packages.repath | Port of the node module path-to-regexp to Python |
| packages/nixpkgs/python314Packages.repath | Port of the node module path-to-regexp to Python |
| packages/nixpkgs/ocamlPackages.path_glob | Checking glob patterns on paths |
| packages/nixpkgs/python313Packages.ipynbname | Simply returns either notebook filename or the full path to the notebook |
| packages/nixpkgs/python314Packages.ipynbname | Simply returns either notebook filename or the full path to the notebook |
| packages/nixpkgs/ocamlPackages.file_path | Library for typed manipulation of UNIX-style file paths |
| packages/nixpkgs/haskellPackages.jspath | Extract substructures from JSON by following a path |
| packages/nixpkgs/vimPlugins.vim-apathy | |
| packages/nixpkgs/haskellPackages.hxt-xpath | The XPath modules for HXT |
| packages/nixpkgs/haskellPackages.ghc-paths | Knowledge of GHC's installation directories |
| packages/nixpkgs/haskellPackages.nix-paths | Knowledge of Nix's installation directories |
| packages/nixpkgs/haskellPackages.true-name | Template Haskell hack to violate module abstractions |
| packages/nixpkgs/haskellPackages.composite-aeson-path | Formatting data for the path library |
| packages/nixpkgs/python312Packages.colcon-library-path | Extension for colcon to set the library path environment variable |
| packages/nixpkgs/haskellPackages.path-formatting | Formatting for path |
| packages/nixpkgs/haskellPackages.attoparsec-path | Convenience bindings between path and attoparsec |
| packages/nixpkgs/haskellPackages.executable-path | Finding out the full path of the executable |
| packages/nixpkgs/haskellPackages.path-extensions | Enumeration of common filetype extensions for use with the path library |
| packages/nixpkgs/addDriverRunpath | |
| packages/nixpkgs/ocamlPackages.domain-name | RFC 1035 Internet domain names |
| packages/nixpkgs/rename | Rename files according to a Perl rewrite expression |
| packages/nixpkgs/rPackages.loci2path | |
| packages/nixpkgs/emacsPackages.go-gopath | |
| packages/nixpkgs/ocamlPackages.fpath | OCaml module for handling file system paths with POSIX and Windows conventions |
| packages/nixpkgs/python313Packages.jsonschema-path | JSONSchema Spec with object-oriented paths |
| packages/nixpkgs/python314Packages.jsonschema-path | JSONSchema Spec with object-oriented paths |
| packages/nixpkgs/ocamlPackages_latest.path_glob | Checking glob patterns on paths |
| packages/nixpkgs/ocamlPackages.janeStreet.file_path | Library for typed manipulation of UNIX-style file paths |
| packages/nixpkgs/ocamlPackages_latest.file_path | Library for typed manipulation of UNIX-style file paths |
| packages/nixpkgs/emacsPackages.path-headerline-mode | |
| packages/nixpkgs/python312Packages.ipynbname | Simply returns either notebook filename or the full path to the notebook |
| packages/nixpkgs/python312Packages.pytest-resource-path | Pytest plugin to provide path for uniform access to test resources |
| packages/nixpkgs/python313Packages.pathos | Parallel graph management and execution in heterogeneous computing |
| packages/nixpkgs/python314Packages.pathos | Parallel graph management and execution in heterogeneous computing |
| packages/nixpkgs/texlivePackages.spath3 | Manipulate "soft paths" in PGF |
| packages/nixpkgs/haskellPackages.hjpath | XPath-like syntax for querying JSON |
| packages/nixpkgs/chickenPackages_5.chickenEggs.awful-path-matchers | Path matchers for awful |
| packages/nixpkgs/haskellPackages.unordered-containers_0_2_21 | Efficient hashing-based container types |
| packages/nixpkgs/python313Packages.iopath | Python library that provides common I/O interface across different storage backends |
| packages/nixpkgs/python314Packages.iopath | Python library that provides common I/O interface across different storage backends |
| packages/nixpkgs/luaPackages.pathlib-nvim | OS Independent, ultimate solution to path handling in neovim. |
| packages/nixpkgs/haskellPackages.genvalidity-path | GenValidity support for Path |
| packages/nixpkgs/luajitPackages.pathlib-nvim | OS Independent, ultimate solution to path handling in neovim. |
| packages/nixpkgs/nltk-data.names | NLTK Data |
| packages/nixpkgs/autoAddDriverRunpath | |
| packages/nixpkgs/emacsPackages.name-this-color | |
| packages/nixpkgs/lua55Packages.pathlib-nvim | OS Independent, ultimate solution to path handling in neovim. |
| packages/nixpkgs/lua52Packages.pathlib-nvim | OS Independent, ultimate solution to path handling in neovim. |
| packages/nixpkgs/lua54Packages.pathlib-nvim | OS Independent, ultimate solution to path handling in neovim. |
| packages/nixpkgs/lua51Packages.pathlib-nvim | OS Independent, ultimate solution to path handling in neovim. |
| packages/nixpkgs/lua53Packages.pathlib-nvim | OS Independent, ultimate solution to path handling in neovim. |
| packages/nixpkgs/ocamlPackages_latest.janeStreet.file_path | Library for typed manipulation of UNIX-style file paths |
| packages/nixpkgs/rPackages.dnapath | |
| packages/nixpkgs/rPackages.glmpath | |
| packages/nixpkgs/rPackages.pathlit | |
| packages/nixpkgs/rPackages.svmpath | |
| packages/nixpkgs/rPackages.svrpath | |
| packages/nixpkgs/haskellPackages.scotty-path-normalizer | Redirect to a normalized path |
| packages/nixpkgs/texlivePackages.sunpath | Draw sun path charts |
| packages/nixpkgs/python313Packages.name-that-hash | Module and CLI for the identification of hashes |
| packages/nixpkgs/python314Packages.name-that-hash | Module and CLI for the identification of hashes |
| packages/nixpkgs/ocamlPackages_latest.domain-name | RFC 1035 Internet domain names |
| packages/nixpkgs/python312Packages.jsonschema-path | JSONSchema Spec with object-oriented paths |
| packages/nixpkgs/rPackages.pathwayTMB | |
| packages/nixpkgs/rPackages.pathwayPCA | |
| packages/nixpkgs/pipe-rename | Rename your files using your favorite text editor |
| packages/nixpkgs/python313Packages.pathlib-abc | Python base classes for rich path objects |
| packages/nixpkgs/python314Packages.pathlib-abc | Python base classes for rich path objects |
| packages/nixpkgs/emacsPackages.pathify | |
| packages/nixpkgs/ocamlPackages_latest.fpath | OCaml module for handling file system paths with POSIX and Windows conventions |
| packages/nixpkgs/haskellPackages.posix-paths | POSIX filepath/directory functionality |
| packages/nixpkgs/haskellPackages.hpath-posix | Some low-level POSIX glue code, that is not in 'unix' |
| packages/nixpkgs/python312Packages.pathy | Path interface for local and cloud bucket storage |
| packages/nixpkgs/typstPackages.jsonpath | jsonpath extracts values from dictionary or array using a JSONPath expression as per RFC 9535, except the filter syntax is different |
| packages/nixpkgs/tvnamer | Automatic TV episode file renamer, uses data from thetvdb.com via tvdb_api |
| packages/nixpkgs/regname | Mass renamer TUI written in Rust |
| packages/nixpkgs/filterpath | Retrieve a valid path from a messy piped line |
| packages/nixpkgs/chroot-realpath | Output a path's realpath within a chroot. |
| packages/nixpkgs/telepathy-glib | |
| packages/nixpkgs/krename | Powerful batch renamer for KDE |
| packages/nixpkgs/python313Packages.testcontainers | Allows using docker containers for functional and integration testing |
| packages/nixpkgs/python314Packages.testcontainers | Allows using docker containers for functional and integration testing |
| packages/nixpkgs/file-rename | Perl extension for renaming multiple files |
| packages/nixpkgs/haskellPackages.urlpath | Painfully simple URL deployment |
| packages/nixpkgs/rPackages.cppcontainers | |
| packages/nixpkgs/telepathy-haze | Telepathy connection manager based on libpurple |
| packages/nixpkgs/telepathy-idle | IRC connection manager for the Telepathy framework |
| packages/nixpkgs/vimPlugins.lspcontainers-nvim | |
| packages/nixpkgs/haskellPackages.testcontainers | Docker containers for your integration tests |
| packages/nixpkgs/libsForQt5.telepathy | Telepathy Qt bindings |
| packages/nixpkgs/multipath-tools | Tools for the Linux multipathing storage driver |
| packages/nixpkgs/python313Packages.userpath | Cross-platform tool for adding locations to the user PATH |
| packages/nixpkgs/python314Packages.userpath | Cross-platform tool for adding locations to the user PATH |
| packages/nixpkgs/python313Packages.pathspec | Utility library for gitignore-style pattern matching of file paths |
| packages/nixpkgs/python314Packages.pathspec | Utility library for gitignore-style pattern matching of file paths |
| packages/nixpkgs/python312Packages.repath | Port of the node module path-to-regexp to Python |
| packages/nixpkgs/texlivePackages.textpath | Setting text along a path with MetaPost |
| packages/nixpkgs/texlivePackages.kpathsea | Path searching library for TeX-related files |
| packages/nixpkgs/haskellPackages.pathwalk | Path walking utilities for Haskell programs |
| packages/nixpkgs/rPackages.anipaths | |
| packages/nixpkgs/rPackages.critpath | |
| packages/nixpkgs/rPackages.hipathia | |
| packages/nixpkgs/rPackages.pathling | |
| packages/nixpkgs/rPackages.gazepath | |
| packages/nixpkgs/rPackages.pathview | |
| packages/nixpkgs/rPackages.pathlibr | |
| packages/nixpkgs/rPackages.spathial | |
| packages/nixpkgs/vimPlugins.vim-pathogen | |
| packages/nixpkgs/vimPlugins.vim-jsonpath | |
| packages/nixpkgs/rPackages.string2path | |
| packages/nixpkgs/rPackages.OmnipathR | |
| packages/nixpkgs/rPackages.pathfindR | |
| packages/nixpkgs/rPackages.pathlinkR | |
| packages/nixpkgs/pathvector | Declarative edge routing platform that automates route optimization and control plane configuration |
| packages/nixpkgs/python312Packages.testcontainers | Allows using docker containers for functional and integration testing |
| packages/nixpkgs/gprename | Complete batch renamer for files and directories |
| packages/nixpkgs/rubyPackages.unicode-name | |
| packages/nixpkgs/python312Packages.dpath | Python library for accessing and searching dictionaries via /slashed/paths ala xpath |
| packages/nixpkgs/emacsPackages.jmespath | |
| packages/nixpkgs/flut-renamer | Bulk file renamer written in flutter |
| packages/nixpkgs/python313Packages.skia-pathops | Python access to operations on paths using the Skia library |
| packages/nixpkgs/python314Packages.skia-pathops | Python access to operations on paths using the Skia library |
| packages/nixpkgs/rubyPackages_3_2.unicode-name | |
| packages/nixpkgs/rubyPackages_3_1.unicode-name | |
| packages/nixpkgs/rubyPackages_3_5.unicode-name | |
| packages/nixpkgs/rubyPackages_3_3.unicode-name | |
| packages/nixpkgs/rubyPackages_3_4.unicode-name | |
| packages/nixpkgs/rubyPackages_4_0.unicode-name | |
| packages/nixpkgs/python312Packages.name-that-hash | Module and CLI for the identification of hashes |
| packages/nixpkgs/haskellPackages.data-filepath | A type safe file path data structure |
| packages/nixpkgs/rust-petname | Generate human readable random names |
| packages/nixpkgs/vimPlugins.vim-haskell-module-name | |
| packages/nixpkgs/python313Packages.jsonpath | XPath for JSON |
| packages/nixpkgs/python314Packages.jsonpath | XPath for JSON |
| packages/nixpkgs/python313Packages.telepath | Library for exchanging data between Python and JavaScript |
| packages/nixpkgs/python314Packages.telepath | Library for exchanging data between Python and JavaScript |
| packages/nixpkgs/python313Packages.pathable | Library for object-oriented paths |
| packages/nixpkgs/python314Packages.pathable | Library for object-oriented paths |
| packages/nixpkgs/python313Packages.testpath | Test utilities for code working with files and commands |
| packages/nixpkgs/python314Packages.testpath | Test utilities for code working with files and commands |
| packages/nixpkgs/vscode-extensions.alexdima.copy-relative-path | |
| packages/nixpkgs/hostname | |
| packages/nixpkgs/python313Packages.opencontainers | Python module for oci specifications |
| packages/nixpkgs/python314Packages.opencontainers | Python module for oci specifications |
| packages/nixpkgs/haskellPackages.safepath | Safe Paths in Haskell |
| packages/nixpkgs/python313Packages.seekpath | Module to obtain and visualize band paths in the Brillouin zone of crystal structures |
| packages/nixpkgs/python314Packages.seekpath | Module to obtain and visualize band paths in the Brillouin zone of crystal structures |
| packages/nixpkgs/haskellPackages.jsonpath | Library to parse and execute JSONPath |
| packages/nixpkgs/python313Packages.jmespath | JMESPath allows you to declaratively specify how to extract elements from a JSON document |
| packages/nixpkgs/python314Packages.jmespath | JMESPath allows you to declaratively specify how to extract elements from a JSON document |
| packages/nixpkgs/haskellPackages.pathtype | Type-safe replacement for System |
| packages/nixpkgs/rubyPackages.pathutil | |
| packages/nixpkgs/python313Packages.pathlib2 | This module offers classes representing filesystem paths with semantics appropriate for different operating systems |
| packages/nixpkgs/python314Packages.pathlib2 | This module offers classes representing filesystem paths with semantics appropriate for different operating systems |
| packages/nixpkgs/python313Packages.azure-mgmt-appcontainers | Microsoft Azure Appcontainers Management Client Library for Python |
| packages/nixpkgs/python314Packages.azure-mgmt-appcontainers | Microsoft Azure Appcontainers Management Client Library for Python |
| packages/nixpkgs/python312Packages.pathos | Parallel graph management and execution in heterogeneous computing |
| packages/nixpkgs/rubyPackages.jmespath | |
| packages/nixpkgs/rubyPackages.jsonpath | |
| packages/nixpkgs/python312Packages.pathlib-abc | Python base classes for rich path objects |
| packages/nixpkgs/haskellPackages.xpathdsv | Command line tool to extract DSV data from HTML and XML with XPATH expressions |
| packages/nixpkgs/python313Packages.jsonpath-ng | JSONPath implementation |
| packages/nixpkgs/python314Packages.jsonpath-ng | JSONPath implementation |
| packages/nixpkgs/python312Packages.iopath | Python library that provides common I/O interface across different storage backends |
| packages/nixpkgs/rPackages.pathfindR_data | |
| packages/nixpkgs/rPackages.namer | |
| packages/nixpkgs/rubyPackages_3_2.pathutil | |
| packages/nixpkgs/rubyPackages_3_1.pathutil | |
| packages/nixpkgs/rubyPackages_3_1.jmespath | |
| packages/nixpkgs/rubyPackages_3_1.jsonpath | |
| packages/nixpkgs/rubyPackages_3_2.jsonpath | |
| packages/nixpkgs/rubyPackages_3_2.jmespath | |
| packages/nixpkgs/rubyPackages_3_5.pathutil | |
| packages/nixpkgs/rubyPackages_3_3.pathutil | |
| packages/nixpkgs/rubyPackages_3_4.pathutil | |
| packages/nixpkgs/rubyPackages_4_0.pathutil | |
| packages/nixpkgs/rubyPackages_3_3.jmespath | |
| packages/nixpkgs/rubyPackages_3_3.jsonpath | |
| packages/nixpkgs/rubyPackages_3_5.jmespath | |
| packages/nixpkgs/rubyPackages_3_5.jsonpath | |
| packages/nixpkgs/rubyPackages_3_4.jsonpath | |
| packages/nixpkgs/rubyPackages_4_0.jmespath | |
| packages/nixpkgs/rubyPackages_3_4.jmespath | |
| packages/nixpkgs/rubyPackages_4_0.jsonpath | |
| packages/nixpkgs/python313Packages.jsonpath-rw | Robust and significantly extended implementation of JSONPath for Python, with a clear AST for metaprogramming |
| packages/nixpkgs/python314Packages.jsonpath-rw | Robust and significantly extended implementation of JSONPath for Python, with a clear AST for metaprogramming |
| packages/nixpkgs/haskellPackages.multipath | Parser and builder for unix-path-like objects |
| packages/nixpkgs/haskellPackages.hls-module-name-plugin | Module name plugin for Haskell Language Server |
| packages/nixpkgs/arrayUtilities.getRunpathEntries | Appends runpath entries of a file to an array |
| packages/nixpkgs/python313Packages.bc-jsonpath-ng | JSONPath implementation for Python |
| packages/nixpkgs/python314Packages.bc-jsonpath-ng | JSONPath implementation for Python |
| packages/nixpkgs/vimPlugins.vim-classpath | |
| packages/nixpkgs/rPackages.glmpathcr | |
| packages/nixpkgs/rPackages.pathifier | |
| packages/nixpkgs/rPackages.phylopath | |
| packages/nixpkgs/rPackages.phenopath | |
| packages/nixpkgs/rPackages.pathviewr | |
| packages/nixpkgs/chickenPackages_5.chickenEggs.svgpath | Parse, normalize, and write SVG path data |
| packages/nixpkgs/rPackages.iSEEpathways | |
| packages/nixpkgs/cudaPackages.autoAddCudaCompatRunpath | |
| packages/nixpkgs/python312Packages.opencontainers | Python module for oci specifications |
| packages/nixpkgs/python312Packages.userpath | Cross-platform tool for adding locations to the user PATH |
| packages/nixpkgs/cudaPackages.removeStubsFromRunpathHook | |
| packages/nixpkgs/python312Packages.azure-mgmt-appcontainers | Microsoft Azure Appcontainers Management Client Library for Python |
| packages/nixpkgs/cudaPackages_11.autoAddCudaCompatRunpath | |
| packages/nixpkgs/python312Packages.pathspec | Utility library for gitignore-style pattern matching of file paths |
| packages/nixpkgs/emacsPackages.telepathy | |
| packages/nixpkgs/chickenPackages_5.chickenEggs.sxpath | The sxpath bits of sxml-tools from the SSAX project at Sourceforge |
| packages/nixpkgs/emacsPackages.names | |
| packages/nixpkgs/haskellPackages.system-filepath | High-level, byte-based file and directory path manipulations (deprecated) |
| packages/nixpkgs/plasma5Packages.telepathy | Telepathy Qt bindings |
| packages/nixpkgs/typstPackages.jsonpath_0_1_0 | jsonpath extracts values from dictionary or array using a JSONPath expression as per RFC 9535, except the filter syntax is different |
| packages/nixpkgs/vimPlugins.Rename | |
| packages/nixpkgs/hostname-debian | Utility to set/show the host name or domain name |
| packages/nixpkgs/emacsPackages.buffer-name-relative | |
| packages/nixpkgs/python313Packages.pathtools | Pattern matching and various utilities for file systems paths |
| packages/nixpkgs/python314Packages.pathtools | Pattern matching and various utilities for file systems paths |
| packages/nixpkgs/chickenPackages_5.chickenEggs.filepath | Cross-platform file path manipulation. |
| packages/nixpkgs/haskellPackages.aeson-jsonpath | Parse and run JSONPath queries on Aeson documents |
| packages/nixpkgs/haskellPackages.names-th | Manipulate name strings for TH |
| packages/nixpkgs/unnamed-sdvx-clone | Game based on K-Shoot MANIA and Sound Voltex |
| packages/nixpkgs/all-the-package-names | List of all the public package names on npm |
| packages/nixpkgs/python312Packages.skia-pathops | Python access to operations on paths using the Skia library |
| packages/nixpkgs/rPackages.genpathmox | |
| packages/nixpkgs/rPackages.ggpolypath | |
| packages/nixpkgs/rPackages.rnames | |
| packages/nixpkgs/python313Packages.sortedcontainers | Python Sorted Container Types: SortedList, SortedDict, and SortedSet |
| packages/nixpkgs/python314Packages.sortedcontainers | Python Sorted Container Types: SortedList, SortedDict, and SortedSet |
| packages/nixpkgs/haskellPackages.names | Type level names |
| packages/nixpkgs/rPackages.psSubpathway | |
| packages/nixpkgs/haskellPackages.named-sop | Dependently-typed sums and products, tagged by field name |
| packages/nixpkgs/haskellPackages.named | Named parameters (keyword arguments) for Haskell |
| packages/nixpkgs/python312Packages.jsonpath | XPath for JSON |
| packages/nixpkgs/python312Packages.telepath | Library for exchanging data between Python and JavaScript |
| packages/nixpkgs/python312Packages.pathable | Library for object-oriented paths |
| packages/nixpkgs/python312Packages.testpath | Test utilities for code working with files and commands |
| packages/nixpkgs/python313Packages.pkgutil-resolve-name | Backport of Python 3.9’s pkgutil.resolve_name |
| packages/nixpkgs/python314Packages.pkgutil-resolve-name | Backport of Python 3.9’s pkgutil.resolve_name |
| packages/nixpkgs/python313Packages.jsonpath-python | More powerful JSONPath implementations in modern python |
| packages/nixpkgs/python314Packages.jsonpath-python | More powerful JSONPath implementations in modern python |
| packages/nixpkgs/python312Packages.jmespath | JMESPath allows you to declaratively specify how to extract elements from a JSON document |
| packages/nixpkgs/python312Packages.seekpath | Module to obtain and visualize band paths in the Brillouin zone of crystal structures |
| packages/nixpkgs/python312Packages.pathlib2 | This module offers classes representing filesystem paths with semantics appropriate for different operating systems |
| packages/nixpkgs/python312Packages.jsonpath-ng | JSONPath implementation |
| packages/nixpkgs/sbclPackages.list-named-class | |
| packages/nixpkgs/python313Packages.python-jsonpath | Flexible JSONPath engine for Python with JSON Pointer and JSON Patch |
| packages/nixpkgs/python314Packages.python-jsonpath | Flexible JSONPath engine for Python with JSON Pointer and JSON Patch |
| packages/nixpkgs/rPackages.SubpathwayGMir | |
| packages/nixpkgs/haskellPackages.filepath-crypto | Reversable and secure encoding of object ids as filepaths |
| packages/nixpkgs/python313Packages.names | Generate random names |
| packages/nixpkgs/python314Packages.names | Generate random names |
| packages/nixpkgs/python312Packages.jsonpath-rw | Robust and significantly extended implementation of JSONPath for Python, with a clear AST for metaprogramming |
| packages/nixpkgs/python312Packages.bc-jsonpath-ng | JSONPath implementation for Python |
| packages/nixpkgs/python313Packages.namex | Simple utility to separate the implementation of your Python package and its public API surface |
| packages/nixpkgs/python314Packages.namex | Simple utility to separate the implementation of your Python package and its public API surface |
| packages/nixpkgs/haskellPackages.filepath-io-access | IO Access for filepath |
| packages/nixpkgs/namecoind | Decentralized open source information registration and transfer system based on the Bitcoin cryptocurrency |
| packages/nixpkgs/rPackages.SubpathwayLNCE | |
| packages/nixpkgs/python312Packages.sortedcontainers | Python Sorted Container Types: SortedList, SortedDict, and SortedSet |
| packages/nixpkgs/texlivePackages.eqname | Name tags for equations |
| packages/nixpkgs/haskellPackages.hpath-directory | Alternative to 'directory' package with ByteString based filepaths |
| packages/nixpkgs/alephone-pathways-into-darkness | Port of the 1993 mac game "Pathways Into Darkness" by Bungie to the Aleph One engine |
| packages/nixpkgs/haskellPackages.testcontainers-postgresql | Testcontainers integration for PostgreSQL |
| packages/nixpkgs/python313Packages.azure-mgmt-containerservice | This is the Microsoft Azure Container Service Management Client Library |
| packages/nixpkgs/python314Packages.azure-mgmt-containerservice | This is the Microsoft Azure Container Service Management Client Library |
| packages/nixpkgs/haskellPackages.filepather | Functions on System |
| packages/nixpkgs/namespace-cli | Command line interface for the Namespaces platform |
| packages/nixpkgs/emacsPackages.go-rename | |
| packages/nixpkgs/telepathy-farstream | GObject-based C library that uses Telepathy GLib, Farstream and GStreamer to handle the media streaming part of channels of type Call |
| packages/nixpkgs/python312Packages.pkgutil-resolve-name | Backport of Python 3.9’s pkgutil.resolve_name |
| packages/nixpkgs/python312Packages.pathtools | Pattern matching and various utilities for file systems paths |
| packages/nixpkgs/wg-friendly-peer-names | Small shellscript that makes it possible to give peers a friendlier and more readable name in the `wg` peer list |
| packages/nixpkgs/gnomeExtensions.app-name-indicator | A GNOME Shell extension that shows the active app's name and icon on the left side of the top panel, like it used to. |
| packages/nixpkgs/haskellPackages.stratosphere-emrcontainers | Stratosphere integration for AWS EMRContainers |
| packages/nixpkgs/haskellPackages.filepath_1_5_4_0 | Library for manipulating FilePaths in a cross platform way |
| packages/nixpkgs/vimPlugins.inc-rename-nvim | |
| packages/nixpkgs/rPackages.pathmapping | |
| packages/nixpkgs/rPackages.pathdiagram | |
| packages/nixpkgs/rPackages.mpathsenser | |
| packages/nixpkgs/sbclPackages.named-read-macros | |
| packages/nixpkgs/python312Packages.azure-mgmt-containerservice | This is the Microsoft Azure Container Service Management Client Library |
| packages/nixpkgs/telepathy-mission-control | Account manager and channel dispatcher for the Telepathy framework |
| packages/nixpkgs/rPackages.seq2pathway | |
| packages/nixpkgs/rPackages.TCIApathfinder | |
| packages/nixpkgs/sbclPackages.named-closure | |
| packages/nixpkgs/emacsPackages.date2name | |
| packages/nixpkgs/uutils-hostname | Rust reimplementation of the hostname project |
| packages/nixpkgs/lomiri.geonames | Parse and query the geonames database dump |
| packages/nixpkgs/python312Packages.jsonpath-python | More powerful JSONPath implementations in modern python |
| packages/nixpkgs/texlivePackages.aaai-named | BibTeX style for AAAI |
| packages/nixpkgs/haskellPackages.lens-named | Helper for use with lens |
| packages/nixpkgs/emacsPackages.named-timer | |
| packages/nixpkgs/vscode-extensions.christian-kohler.path-intellisense | Visual Studio Code plugin that autocompletes filenames |
| packages/nixpkgs/haskellPackages.data-named | Data types for named entities |
| packages/nixpkgs/haskellPackages.named-lock | A named lock that is created on demand |
| packages/nixpkgs/python312Packages.python-jsonpath | Flexible JSONPath engine for Python with JSON Pointer and JSON Patch |
| packages/nixpkgs/haskellPackages.named-text | A parameterized named text type and associated functionality |
| packages/nixpkgs/vimPlugins.live-rename-nvim | |
| packages/nixpkgs/luarenamer | Plugin for Shoko that allows users to rename their collection using Lua |
| packages/nixpkgs/haskellPackages.streamly-filepath | Streamly compatibility with filepath package |
| packages/nixpkgs/python313Packages.svgpathtools | Collection of tools for manipulating and analyzing SVG Path objects and Bezier curves |
| packages/nixpkgs/python314Packages.svgpathtools | Collection of tools for manipulating and analyzing SVG Path objects and Bezier curves |
| packages/nixpkgs/python313Packages.universal-pathlib | Pathlib api extended to use fsspec backends |
| packages/nixpkgs/python314Packages.universal-pathlib | Pathlib api extended to use fsspec backends |
| packages/nixpkgs/mozcdic-ut-place-names | Dictionary converted from the Japan Post's ZIP code data for Mozc |
| packages/nixpkgs/vimPlugins.renamer-nvim | |
| packages/nixpkgs/rPackages.TouRnament | |
| packages/nixpkgs/python313Packages.elementpath | XPath 1.0/2.0 parsers and selectors for ElementTree and lxml |
| packages/nixpkgs/python314Packages.elementpath | XPath 1.0/2.0 parsers and selectors for ElementTree and lxml |
| packages/nixpkgs/deterministic-uname | Print certain system information (hardcoded with lib/system values) |
| packages/nixpkgs/python313Packages.nameko | Microservices framework that lets service developers concentrate on application logic and encourages testability |
| packages/nixpkgs/python314Packages.nameko | Microservices framework that lets service developers concentrate on application logic and encourages testability |
| packages/nixpkgs/texlivePackages.inversepath | Calculate inverse file paths |
| packages/nixpkgs/haskellPackages.pathfinding | pathfinding in grid and graphs |
| packages/nixpkgs/haskellPackages.rawfilepath | Use RawFilePath instead of FilePath |
| packages/nixpkgs/haskellPackages.pdfname | Name a PDF file using information from the pdfinfo command |
| packages/nixpkgs/emacsPackages.wfnames | |
| packages/nixpkgs/sbclPackages.named-read-macros-test | |
| packages/nixpkgs/deterministic-host-uname | Print certain system information (hardcoded with lib/system values) |
| packages/nixpkgs/gnomeExtensions.current-workspace-name | Displays the current workspace name in the panel |
| packages/nixpkgs/unixtools.hostname | |
| packages/nixpkgs/vimPlugins.nvim-rename-state | |
| packages/nixpkgs/emacsPackages.auto-rename-tag | |
| packages/nixpkgs/rPackages.criticalpath | |
| packages/nixpkgs/rPackages.geomtextpath | |
| packages/nixpkgs/rPackages.pathmodelfit | |
| packages/nixpkgs/haskellPackages.aeson-jsonpath_0_3_0_2 | Parse and run JSONPath queries on Aeson documents |
| packages/nixpkgs/python313Packages.html-tag-names | List of known HTML tags |
| packages/nixpkgs/python314Packages.html-tag-names | List of known HTML tags |
| packages/nixpkgs/haskellPackages.valid-names | Valid operator/module characters |
| packages/nixpkgs/haskellPackages.canonical-filepath | Abstract data type for canonical file paths |
| packages/nixpkgs/rPackages.AHWikipathwaysDbs | |
| packages/nixpkgs/python312Packages.svgpathtools | Collection of tools for manipulating and analyzing SVG Path objects and Bezier curves |
| packages/nixpkgs/python313Packages.xpath-expressions | Python module to handle XPath expressions |
| packages/nixpkgs/python314Packages.xpath-expressions | Python module to handle XPath expressions |
| packages/nixpkgs/sbclPackages.cl-migratum_dot_provider_dot_local-path | |
| packages/nixpkgs/username-anarchy | Username generator tool for penetration testing |
| packages/nixpkgs/haskellPackages.by-other-names | Give aliases to record fields |
| packages/nixpkgs/python312Packages.universal-pathlib | Pathlib api extended to use fsspec backends |
| packages/nixpkgs/rPackages.envnames | |
| packages/nixpkgs/rPackages.codename | |
| packages/nixpkgs/rPackages.acroname | |
| packages/nixpkgs/rPackages.geonames | |
| packages/nixpkgs/rPackages.taxnames | |
| packages/nixpkgs/texlivePackages.namedef | TeX definitions with named parameters |
| packages/nixpkgs/texlivePackages.numname | Convert a number to its English expression |
| packages/nixpkgs/texlivePackages.namespc | Rudimentary C++-like namespaces in LaTeX |
| packages/nixpkgs/python312Packages.elementpath | XPath 1.0/2.0 parsers and selectors for ElementTree and lxml |
| packages/nixpkgs/rPackages.namedCapture | |
| packages/nixpkgs/rPackages.namedropR | |
| packages/nixpkgs/haskellPackages.horname | Rename function definitions returned by SMT solvers |
| packages/nixpkgs/python313Packages.pathvalidate | Library to sanitize/validate a string such as filenames/file-paths/etc |
| packages/nixpkgs/python314Packages.pathvalidate | Library to sanitize/validate a string such as filenames/file-paths/etc |
| packages/nixpkgs/python313Packages.cloudpathlib | Python pathlib-style classes for cloud storage services such as Amazon S3, Azure Blob Storage, and Google Cloud Storage |
| packages/nixpkgs/python314Packages.cloudpathlib | Python pathlib-style classes for cloud storage services such as Amazon S3, Azure Blob Storage, and Google Cloud Storage |
| packages/nixpkgs/biosdevname | Udev helper for naming devices per BIOS names |
| packages/nixpkgs/texlivePackages.nameauth | Name authority mechanism for consistency in body text and index |
| packages/nixpkgs/sbclPackages.trivial-renamer | |
| packages/nixpkgs/python313Packages.coolname | Random Name and Slug Generator |
| packages/nixpkgs/python314Packages.coolname | Random Name and Slug Generator |
| packages/nixpkgs/terraform-providers.stackpath | |
| packages/nixpkgs/python312Packages.names | Generate random names |
| packages/nixpkgs/haskellPackages.haskell-names | Name resolution library for Haskell |
| packages/nixpkgs/haskellPackages.filepath-bytestring | Library for manipulating RawFilePaths in a cross platform way |
| packages/nixpkgs/emacsPackages.nameless | |
| packages/nixpkgs/sbclPackages.lisp-namespace | |
| packages/nixpkgs/haskellPackages.random-names | Expose Random and Arbitrary instances |
| packages/nixpkgs/perlPackages.ParseDistname | Parse a distribution name |
| packages/nixpkgs/python312Packages.namex | Simple utility to separate the implementation of your Python package and its public API surface |
| packages/nixpkgs/rPackages.leastcostpath | |
| packages/nixpkgs/haskellPackages.batch-rename | Make Linux or MacOS do things like "rename *.mp3 *.mp4" |
| packages/nixpkgs/perlPackages.CPANDistnameInfo | Extract distribution name and version from a distribution filename |
| packages/nixpkgs/python312Packages.xpath-expressions | Python module to handle XPath expressions |
| packages/nixpkgs/perl5Packages.ParseDistname | Parse a distribution name |
| packages/nixpkgs/sbclPackages.lunamech-matrix-api | |
| packages/nixpkgs/perl5Packages.CPANDistnameInfo | Extract distribution name and version from a distribution filename |
| packages/nixpkgs/haskellPackages.named-binary-tag | NBT (named binary tag) serialization and deserialization |
| packages/nixpkgs/python312Packages.pathvalidate | Library to sanitize/validate a string such as filenames/file-paths/etc |
| packages/nixpkgs/rPackages.seq2pathway_data | |
| packages/nixpkgs/perlPackages.TestFilename | Portable filename comparison |
| packages/nixpkgs/python312Packages.cloudpathlib | Python pathlib-style classes for cloud storage services such as Amazon S3, Azure Blob Storage, and Google Cloud Storage |
| packages/nixpkgs/haskellPackages.vinyl-named-sugar | Syntax sugar for vinyl records using overloaded labels |
| packages/nixpkgs/emacsPackages.info-rename-buffer | |
| packages/nixpkgs/rPackages.babynames | |
| packages/nixpkgs/rPackages.filenamer | |
| packages/nixpkgs/rPackages.namespace | |
| packages/nixpkgs/python312Packages.nameko | Microservices framework that lets service developers concentrate on application logic and encourages testability |
| packages/nixpkgs/texlivePackages.fontname | Scheme for naming fonts in TeX |
| packages/nixpkgs/perl5Packages.TestFilename | Portable filename comparison |
| packages/nixpkgs/renameutils | Set of programs to make renaming of files faster |
| packages/nixpkgs/texlivePackages.hepnames | Pre-defined high energy particle names |
| packages/nixpkgs/haskellPackages.namelist | fortran90 namelist parser/pretty printer |
| packages/nixpkgs/akkuPackages.slib-filename | String matching for filenames (glob, a la BASH) |
| packages/nixpkgs/haskellPackages.epubname | Rename epub ebook files based on meta information |
| packages/nixpkgs/haskellPackages.hostname | A very simple package providing a cross-platform means of determining the hostname |
| packages/nixpkgs/rPackages.babynamesIL | |
| packages/nixpkgs/haskellPackages.directory-ospath-streaming | Stream directory entries in constant memory in vanilla IO |
| packages/nixpkgs/texlivePackages.langnames | Name languages and their genetic affiliations consistently |
| packages/nixpkgs/texlivePackages.numnameru | Converts a number to the russian spelled out name |
| packages/nixpkgs/perlPackages.SysHostnameLong | Try every conceivable way to get full hostname |
| packages/nixpkgs/haskellPackages.servant-named | Add named endpoints to servant |
| packages/nixpkgs/haskellPackages.named-records | Flexible records with named fields |
| packages/nixpkgs/haskellPackages.unicode-names | Unicode 3.2.0 character names |
| packages/nixpkgs/haskellPackages.named-formlet | A simple formlet library with named formlets |
| packages/nixpkgs/haskellPackages.hack-middleware-cleanpath | Applies some basic redirect rules to get cleaner paths. (deprecated) |
| packages/nixpkgs/haskellPackages.named-servant | support records and named (from the named package) parameters in servant |
| packages/nixpkgs/python312Packages.html-tag-names | List of known HTML tags |
| packages/nixpkgs/mozcdic-ut-personal-names | Dictionary for Mozc |
| packages/nixpkgs/python312Packages.coolname | Random Name and Slug Generator |
| packages/nixpkgs/perl5Packages.SysHostnameLong | Try every conceivable way to get full hostname |
| packages/nixpkgs/haskellPackages.hls-rename-plugin | Rename plugin for Haskell Language Server |
| packages/nixpkgs/CuboCore.corerenamer | Batch file renamer from the C Suite |
| packages/nixpkgs/emacsPackages.nameframe | |
| packages/nixpkgs/reattach-to-user-namespace | Wrapper that provides access to the Mac OS X pasteboard service |
| packages/nixpkgs/namespaced-openvpn | Network namespace isolation for OpenVPN tunnels |
| packages/nixpkgs/perlPackages.Perlosnames | List possible $^O ($OSNAME) values, with description |
| packages/nixpkgs/perl540Packages.ParseDistname | Parse a distribution name |
| packages/nixpkgs/perl538Packages.ParseDistname | Parse a distribution name |
| packages/nixpkgs/rubyPackages_3_2.domain_name | |
| packages/nixpkgs/rubyPackages_3_1.domain_name | |
| packages/nixpkgs/rubyPackages_3_5.domain_name | |
| packages/nixpkgs/perl538Packages.CPANDistnameInfo | Extract distribution name and version from a distribution filename |
| packages/nixpkgs/perl540Packages.CPANDistnameInfo | Extract distribution name and version from a distribution filename |
| packages/nixpkgs/perl5Packages.Perlosnames | List possible $^O ($OSNAME) values, with description |
| packages/nixpkgs/haskellPackages.system-canonicalpath | Abstract data type for canonical paths with some utilities |
| packages/nixpkgs/texlivePackages.jobname-suffix | Compile differently based on the filename |
| packages/nixpkgs/haskellPackages.unicode-data-names | Unicode characters names and aliases |
| packages/nixpkgs/sbclPackages.named-readtables | |
| packages/nixpkgs/emacsPackages.with-namespace | |
| packages/nixpkgs/haskellPackages.namespace | A Generic Haskell library for managing namespaces |
| packages/nixpkgs/rPackages.nametagger | |
| packages/nixpkgs/rPackages.matsbyname | |
| packages/nixpkgs/haskellPackages.bindings-uname | Low-level binding to POSIX uname(3) |
| packages/nixpkgs/haskellPackages.photoname | Rename photo image files based on EXIF shoot date |
| packages/nixpkgs/perl538Packages.TestFilename | Portable filename comparison |
| packages/nixpkgs/perl540Packages.TestFilename | Portable filename comparison |
| packages/nixpkgs/haskellPackages.directory-ospath-streaming_0_3 | Stream directory entries in constant memory in vanilla IO |
| packages/nixpkgs/python313Packages.namedlist | Similar to namedtuple, but instances are mutable |
| packages/nixpkgs/python314Packages.namedlist | Similar to namedtuple, but instances are mutable |
| packages/nixpkgs/python313Packages.wheel-filename | Parse wheel filenames |
| packages/nixpkgs/python314Packages.wheel-filename | Parse wheel filenames |
| packages/nixpkgs/rubyPackages.domain_name | |
| packages/nixpkgs/sbclPackages.named-readtables-test | |
| packages/nixpkgs/sbclPackages.symbol-namespaces | |
| packages/nixpkgs/rubyPackages_3_3.domain_name | |
| packages/nixpkgs/rubyPackages_4_0.domain_name | |
| packages/nixpkgs/rubyPackages_3_4.domain_name | |
| packages/nixpkgs/perl538Packages.SysHostnameLong | Try every conceivable way to get full hostname |
| packages/nixpkgs/perl540Packages.SysHostnameLong | Try every conceivable way to get full hostname |
| packages/nixpkgs/emacsPackages.namespaces | |
| packages/nixpkgs/haskellPackages.foscam-filename | Foscam File format |
| packages/nixpkgs/haskellPackages.namecoin-update | Tool to keep namecoin names updated and well |
| packages/nixpkgs/haskellPackages.pathfindingcore | A toy pathfinding library |
| packages/nixpkgs/sbclPackages.slynk-named-readtables | |
| packages/nixpkgs/texlivePackages.addtoluatexpath | Add paths to Lua packages and input TeX files |
| packages/nixpkgs/haskellPackages.directory-ospath-streaming_0_2_2 | Stream directory entries in constant memory in vanilla IO |
| packages/nixpkgs/haskellPackages.named-servant-server | server support for named-servant |
| packages/nixpkgs/haskellPackages.named-servant-client | client support for named-servant |
| packages/nixpkgs/emacsPackages.hippie-namespace | |
| packages/nixpkgs/perl540Packages.Perlosnames | List possible $^O ($OSNAME) values, with description |
| packages/nixpkgs/perl538Packages.Perlosnames | List possible $^O ($OSNAME) values, with description |
| packages/nixpkgs/skkDictionaries.fullname | SKK dictionary for celebrities |
| packages/nixpkgs/haskellPackages.hedis-namespace | Initial project template from stack |
| packages/nixpkgs/haskellPackages.multipart-names | Handling of multipart names in various casing styles |
| packages/nixpkgs/haskellPackages.Tournament | Tournament related algorithms |
| packages/nixpkgs/haskellPackages.hashrename | Rename every file in a directory with his SHA1 hash |
| packages/nixpkgs/rPackages.ozbabynames | |
| packages/nixpkgs/rPackages.onbabynames | |
| packages/nixpkgs/rPackages.ukbabynames | |
| packages/nixpkgs/python312Packages.namedlist | Similar to namedtuple, but instances are mutable |
| packages/nixpkgs/python312Packages.wheel-filename | Parse wheel filenames |
| packages/nixpkgs/python313Packages.nameparser | Module for parsing human names into their individual components |
| packages/nixpkgs/python314Packages.nameparser | Module for parsing human names into their individual components |
| packages/nixpkgs/haskellPackages.linux-namespaces | Work with linux namespaces: create new or enter existing ones |
| packages/nixpkgs/haskellPackages.pathological-bytestrings | Pathological ByteStrings for testing |
| packages/nixpkgs/python313Packages.lance-namespace | Open specification on top of the storage-based Lance table and file format to standardize access to a collection of Lance tables |
| packages/nixpkgs/python314Packages.lance-namespace | Open specification on top of the storage-based Lance table and file format to standardize access to a collection of Lance tables |
| packages/nixpkgs/emacsPackages.visual-filename-abbrev | |
| packages/nixpkgs/haskellPackages.DAG-Tournament | Real-Time Game Tournament Evaluator |
| packages/nixpkgs/emacsPackages.nameframe-project | |
| packages/nixpkgs/chickenPackages_5.chickenEggs.unitex-named-chars | Unicode & LaTeX Named Chars |
| packages/nixpkgs/emacsPackages.sly-named-readtables | |
| packages/nixpkgs/python313Packages.zope-dottedname | Resolver for Python dotted names |
| packages/nixpkgs/python314Packages.zope-dottedname | Resolver for Python dotted names |
| packages/nixpkgs/texlivePackages.babel-vietnamese | Babel support for typesetting Vietnamese |
| packages/nixpkgs/gnomeExtensions.show-hostname-and-ip | Displays the machine’s hostname and local IP address directly on the desktop. |
| packages/nixpkgs/haskellPackages.hostname-validate | Validate hostnames e.g. localhost or foo.co.uk. |
| packages/nixpkgs/haskellPackages.postgresql-named | Generic deserialization of PostgreSQL rows based on column names |
| packages/nixpkgs/haskellPackages.servant-namedargs | Combinators for servant providing named parameters |
| packages/nixpkgs/texlivePackages.namedtensor | Macros for named tensor notation |
| packages/nixpkgs/texlivePackages.pgfornament | Drawing of Vectorian ornaments with PGF/TikZ |
| packages/nixpkgs/gnomeExtensions.hostname-on-panel | Displays the Hostname on the Gnome Panel |
| packages/nixpkgs/python312Packages.nameparser | Module for parsing human names into their individual components |
| packages/nixpkgs/python312Packages.lance-namespace | Open specification on top of the storage-based Lance table and file format to standardize access to a collection of Lance tables |
| packages/nixpkgs/python313Packages.pynamecheap | Namecheap API client in Python |
| packages/nixpkgs/python314Packages.pynamecheap | Namecheap API client in Python |
| packages/nixpkgs/texlivePackages.hyphen-vietnamese | Vietnamese hyphenation patterns. |
| packages/nixpkgs/texlivePackages.lshort-vietnamese | Vietnamese version of the LaTeX introduction |
| packages/nixpkgs/texlivePackages.pgfornament-han | pgfornament library for Chinese traditional motifs and patterns |
| packages/nixpkgs/gnomeExtensions.add-username-to-top-panel | Simply add your username to topbar panel quick settings menu. |
| packages/nixpkgs/sbclPackages.trivial-package-local-nicknames | |
| packages/nixpkgs/python313Packages.lance-namespace-urllib3-client | Lance namespace OpenAPI specification |
| packages/nixpkgs/python314Packages.lance-namespace-urllib3-client | Lance namespace OpenAPI specification |
| packages/nixpkgs/python312Packages.zope-dottedname | Resolver for Python dotted names |
| packages/nixpkgs/perlPackages.namespaceclean | Keep imports and functions out of your namespace |
| packages/nixpkgs/hyprland-autoname-workspaces | Automatically rename workspaces with icons of started applications |
| packages/nixpkgs/texlivePackages.biblatex-morenames | New names for standard BibLaTeX entry type |
| packages/nixpkgs/perl5Packages.namespaceclean | Keep imports and functions out of your namespace |
| packages/nixpkgs/haskellPackages.time-locale-vietnamese | Vietnamese locale for date and time format |
| packages/nixpkgs/akkuPackages.retropikzel-named-pipes | Library for using named pipes |
| packages/nixpkgs/python312Packages.pynamecheap | Namecheap API client in Python |
| packages/nixpkgs/terraform-providers.namecheap | |
| packages/nixpkgs/haskellPackages.postgresql-simple-named | Implementation of named parameters for `postgresql-simple` library |
| packages/nixpkgs/texlivePackages.mpcolornames | Extend list of predefined colour names for MetaPost |
| packages/nixpkgs/haskellPackages.servant-client-namedargs | Automatically derive API client functions with named and optional parameters |
| packages/nixpkgs/haskellPackages.servant-server-namedargs | Automatically derive API server functions with named and optional parameters |
| packages/nixpkgs/rPackages.vietnameseConverter | |
| packages/nixpkgs/python313Packages.pytest-helpers-namespace | PyTest Helpers Namespace |
| packages/nixpkgs/python314Packages.pytest-helpers-namespace | PyTest Helpers Namespace |
| packages/nixpkgs/haskellPackages.xmonad-windownames | A library to automatically put named windows into the DynamicLog |
| packages/nixpkgs/gnomeExtensions.username-in-top-panel-right-side | Displays the current username in the top panel, positioned at the far right after the power button. |
| packages/nixpkgs/haskellPackages.hls-qualify-imported-names-plugin | A Haskell Language Server plugin that qualifies imported names |
| packages/nixpkgs/python312Packages.lance-namespace-urllib3-client | Lance namespace OpenAPI specification |
| packages/nixpkgs/emacsPackages.nameframe-projectile | |
| packages/nixpkgs/perl540Packages.namespaceclean | Keep imports and functions out of your namespace |
| packages/nixpkgs/perl538Packages.namespaceclean | Keep imports and functions out of your namespace |
| packages/nixpkgs/python312Packages.pytest-helpers-namespace | PyTest Helpers Namespace |
| packages/nixpkgs/sbclPackages.lisp-namespace_dot_test | |
| packages/nixpkgs/terraform-providers.namecheap_namecheap | |
| packages/nixpkgs/haskellPackages.primitive-stablename | primitive operations on StableNames |
| packages/nixpkgs/libuninameslist | Library of Unicode names and annotation data |
| packages/nixpkgs/emacsPackages.nameframe-perspective | |
| packages/nixpkgs/perlPackages.TestRunPluginTrimDisplayedFilenames | Trim the first components |
| packages/nixpkgs/perl5Packages.TestRunPluginTrimDisplayedFilenames | Trim the first components |
| packages/nixpkgs/texlivePackages.varsfromjobname | Extract variables from the name of the LaTeX file |
| packages/nixpkgs/vscode-extensions.usernamehw.errorlens | Visual Studio Code extension that improves highlighting of errors, warnings and other language diagnostics |
| packages/nixpkgs/ocamlPackages.username_kernel | Identifier for a user |
| packages/nixpkgs/sbclPackages.architecture_dot_builder-protocol_dot_xpath | |
| packages/nixpkgs/perl538Packages.TestRunPluginTrimDisplayedFilenames | Trim the first components |
| packages/nixpkgs/perl540Packages.TestRunPluginTrimDisplayedFilenames | Trim the first components |
| packages/nixpkgs/haskellPackages.linux-namespaces_0_2_0_1 | Work with linux namespaces: create new or enter existing ones |
| packages/nixpkgs/rPackages.proceduralnames | |
| packages/nixpkgs/gnomeExtensions.quick-settings-audio-devices-renamer | It lets you change the names of your audio devices in the Quick Settings Audio Panel |
| packages/nixpkgs/ocamlPackages_latest.username_kernel | Identifier for a user |
| packages/nixpkgs/ocamlPackages.janeStreet.username_kernel | Identifier for a user |
| packages/nixpkgs/perlPackages.namespaceautoclean | Keep imports out of your namespace |
| packages/nixpkgs/perl5Packages.namespaceautoclean | Keep imports out of your namespace |
| packages/nixpkgs/vscode-extensions.formulahendry.auto-rename-tag | |
| packages/nixpkgs/home-assistant-component-tests.namecheapdns | Open source home automation that puts local control and privacy first |
| packages/nixpkgs/ocamlPackages_latest.janeStreet.username_kernel | Identifier for a user |
| packages/nixpkgs/perl538Packages.namespaceautoclean | Keep imports out of your namespace |
| packages/nixpkgs/perl540Packages.namespaceautoclean | Keep imports out of your namespace |
| packages/nixpkgs/texlivePackages.longnamefilelist | Tidy \listfiles with long file names |
| packages/nixpkgs/sbclPackages.cl-glfw-opengl-amd__name__gen__delete | |
| packages/nixpkgs/rPackages.touRnamentofchampions | |
| packages/nur/xddxdd.kata-image | (DEPRECATED: kata-image is available in nixpkgs by a different maintainer) Open source project and community working to build a standard implementation of lightweight Virtual Machines (VMs) that feel and perform like containers, but provide the workload isolation and security advantages of VMs (Packaging script adapted from https://github.com/TUM-DSE/doctor-cluster-config/blob/0c40be8dd86282122f8f04df738c409ef5e3da1c/pkgs/kata-images/default.nix) |
| packages/nur/xddxdd.kata-runtime | (DEPRECATED: kata-runtime is available in nixpkgs by a different maintainer) Open source project and community working to build a standard implementation of lightweight Virtual Machines (VMs) that feel and perform like containers, but provide the workload isolation and security advantages of VMs (Packaging script adapted from https://github.com/TUM-DSE/doctor-cluster-config/blob/0c40be8dd86282122f8f04df738c409ef5e3da1c/pkgs/kata-runtime/default.nix) |
| packages/nur/xddxdd.deprecated.kata-image | (DEPRECATED: kata-image is available in nixpkgs by a different maintainer) Open source project and community working to build a standard implementation of lightweight Virtual Machines (VMs) that feel and perform like containers, but provide the workload isolation and security advantages of VMs (Packaging script adapted from https://github.com/TUM-DSE/doctor-cluster-config/blob/0c40be8dd86282122f8f04df738c409ef5e3da1c/pkgs/kata-images/default.nix) |
| packages/nur/xddxdd.deprecated.kata-runtime | (DEPRECATED: kata-runtime is available in nixpkgs by a different maintainer) Open source project and community working to build a standard implementation of lightweight Virtual Machines (VMs) that feel and perform like containers, but provide the workload isolation and security advantages of VMs (Packaging script adapted from https://github.com/TUM-DSE/doctor-cluster-config/blob/0c40be8dd86282122f8f04df738c409ef5e3da1c/pkgs/kata-runtime/default.nix) |
| packages/nur/j-k.bane | Custom & better AppArmor profile generator for Docker containers |
| packages/nur/sikmir.podman-desktop-bin | A graphical tool for developing on containers and Kubernetes |
| packages/nur/renesat.datalad | Keep code, data, containers under control with git and git-annex |
| packages/nur/dcsunset.i3-focus-group | Create a group for i3/sway containers to easily switch focus between |
| packages/nur/nikpkgs.cockpit-podman | Cockpit UI for podman containers |
| packages/nur/j-k.container-diff | Diff your Docker containers |
| packages/nur/heph2.google-cloud-sdk-auth-plugin | Google Cloud SDK Auth Plugin |
| packages/nur/ataraxiasjel.prometheus-podman-exporter | Prometheus exporter for podman environments exposing containers, pods, images, volumes and networks information. |
| packages/nur/forkprince.podman-desktop | Graphical tool for developing on containers and Kubernetes |
| packages/nur/foolnotion.seq | Collection of original C++11 STL-like containers and related tools |
| packages/nur/rycee.firefox-addons.conex | TabGroups married with Tab Containers and bookmark & history search |
| packages/nur/foolnotion.pareto | Spatial Containers, Pareto Fronts, and Pareto Archives |
| packages/nur/ihaveamac.rofs-dumper | Dumps 3DS ROFS containers (early format of romfs) |
| packages/nur/xddxdd.route-chain | Small app to generate a long path in traceroute |
| packages/nur/rycee.firefox-addons.sidebery | Vertical tabs tree and bookmarks in sidebar with advanced containers configuration, grouping and many other features. |
| packages/nur/rycee.firefox-addons.container-proxy | Allows Firefox user assign different proxies to be used in different containers |
| packages/nur/rycee.firefox-addons.open-url-in-container | This extension enables support for opening links in specific containers using custom protocol handler |
| packages/nur/rycee.firefox-addons.container-tab-groups | Chrome-like tab groups using private and isolated containers: The ultimate tab manager and groups for Firefox. |
| packages/nur/nagy.unum | Utility for looking up Unicode characters and HTML entities by code, name, block, or description |
| packages/nur/rycee.firefox-addons.google-container | THIS IS NOT AN OFFICIAL ADDON FROM MOZILLA!
It is a fork of the Facebook Container addon |
| packages/nur/rycee.firefox-addons.container-tabs-sidebar | Show tabs in a sidebar grouped by privacy containers. |
| packages/nur/rycee.firefox-addons.cookie-autodelete | Control your cookies! This WebExtension is inspired by Self Destructing Cookies |
| packages/nur/xddxdd.soggy | Experimental server emulator for a game I forgot its name |
| packages/nur/shadowrz.mkxp-z | RGSS on Steroids |
| packages/nur/xddxdd.uncategorized.route-chain | Small app to generate a long path in traceroute |
| packages/nur/xyenon.yaziPlugins.yazi-rs.jump-to-char | Vim-like `f<char>`, jump to the next file whose name starts with `<char>` |
| packages/nur/xddxdd.uncategorized.soggy | Experimental server emulator for a game I forgot its name |
| packages/nur/rycee.firefox-addons.matte-black-red | A modern dark / Matte Black theme with a red accent color |
| packages/nur/Ex-32.devcontainer-cli | A reference implementation of devcontainers |
| packages/nur/meain.firefox-addons.aws-sso-containers | Automatically places AWS SSO accounts into containers. |
| packages/nur/sikmir.config-path | Python library to work with paths to config folders and files in an OS independent way |
| packages/nur/rycee.firefox-addons.multi-account-containers | Firefox Multi-Account Containers lets you keep parts of your online life separated into color-coded tabs |
| packages/nur/rycee.firefox-addons.temporary-containers-plus | Open tabs, websites, and links in automatically managed disposable containers |
| packages/nur/rycee.firefox-addons.temporary-containers | Open tabs, websites, and links in automatically managed disposable containers which isolate the data websites store (cookies, storage, and more) from each other, enhancing your privacy and security while you browse. |
| packages/nur/codgician.ms213x-rename | A tool that helps you modify the basic EDID information in the MS213X collector firmware, such as the display name, serial number etc. |