| packages/nixpkgs/rnd-name | Random strings that are easy to recognize |
| packages/nixpkgs/edname | Mass renamer using $EDITOR |
| packages/nixpkgs/wmname | Prints or set the window manager name property of the root window |
| packages/nixpkgs/mnamer | Intelligent and highly configurable media organization utility |
| packages/nixpkgs/rPackages.name | |
| packages/nixpkgs/rename | Rename files according to a Perl rewrite expression |
| packages/nixpkgs/typstPackages.name-it | Get the English names of integers |
| packages/nixpkgs/pipe-rename | Rename your files using your favorite text editor |
| packages/nixpkgs/file-rename | Perl extension for renaming multiple files |
| packages/nixpkgs/nltk-data.names | NLTK Data |
| packages/nixpkgs/tvnamer | Automatic TV episode file renamer, uses data from thetvdb.com via tvdb_api |
| packages/nixpkgs/regname | Mass renamer TUI written in Rust |
| packages/nixpkgs/krename | Powerful batch renamer for KDE |
| packages/nixpkgs/dnsname-cni | DNS name resolution for containers |
| packages/nixpkgs/haskellPackages.say-my-name | Require explicit type application for some type variables |
| packages/nixpkgs/ocamlPackages.domain-name | RFC 1035 Internet domain names |
| packages/nixpkgs/flut-renamer | Bulk file renamer written in flutter |
| packages/nixpkgs/haskellPackages.true-name | Template Haskell hack to violate module abstractions |
| packages/nixpkgs/rust-petname | Generate human readable random names |
| packages/nixpkgs/emacsPackages.name-this-color | |
| packages/nixpkgs/typstPackages.name-it_0_1_0 | Get the English names of integers |
| packages/nixpkgs/typstPackages.name-it_0_1_1 | Get the English names of integers |
| packages/nixpkgs/typstPackages.name-it_0_1_2 | Get the English names of integers |
| packages/nixpkgs/gprename | Complete batch renamer for files and directories |
| packages/nixpkgs/hostname | |
| packages/nixpkgs/rubyPackages.unicode-name | |
| packages/nixpkgs/rubyPackages_3_2.unicode-name | |
| packages/nixpkgs/rubyPackages_3_1.unicode-name | |
| packages/nixpkgs/rubyPackages_3_5.unicode-name | |
| packages/nixpkgs/rubyPackages_3_3.unicode-name | |
| packages/nixpkgs/rubyPackages_3_4.unicode-name | |
| packages/nixpkgs/rubyPackages_4_0.unicode-name | |
| packages/nixpkgs/vimPlugins.vim-haskell-module-name | |
| packages/nixpkgs/ocamlPackages_latest.domain-name | RFC 1035 Internet domain names |
| packages/nixpkgs/namecoind | Decentralized open source information registration and transfer system based on the Bitcoin cryptocurrency |
| packages/nixpkgs/python313Packages.name-that-hash | Module and CLI for the identification of hashes |
| packages/nixpkgs/python314Packages.name-that-hash | Module and CLI for the identification of hashes |
| packages/nixpkgs/unnamed-sdvx-clone | Game based on K-Shoot MANIA and Sound Voltex |
| packages/nixpkgs/all-the-package-names | List of all the public package names on npm |
| packages/nixpkgs/rPackages.namer | |
| packages/nixpkgs/vimPlugins.Rename | |
| packages/nixpkgs/python312Packages.name-that-hash | Module and CLI for the identification of hashes |
| packages/nixpkgs/namespace-cli | Command line interface for the Namespaces platform |
| packages/nixpkgs/haskellPackages.hls-module-name-plugin | Module name plugin for Haskell Language Server |
| packages/nixpkgs/emacsPackages.buffer-name-relative | |
| packages/nixpkgs/hostname-debian | Utility to set/show the host name or domain name |
| packages/nixpkgs/mozcdic-ut-place-names | Dictionary converted from the Japan Post's ZIP code data for Mozc |
| packages/nixpkgs/rPackages.rnames | |
| packages/nixpkgs/emacsPackages.names | |
| packages/nixpkgs/uutils-hostname | Rust reimplementation of the hostname project |
| packages/nixpkgs/wg-friendly-peer-names | Small shellscript that makes it possible to give peers a friendlier and more readable name in the `wg` peer list |
| packages/nixpkgs/lomiri.geonames | Parse and query the geonames database dump |
| packages/nixpkgs/vimPlugins.inc-rename-nvim | |
| packages/nixpkgs/luarenamer | Plugin for Shoko that allows users to rename their collection using Lua |
| packages/nixpkgs/vimPlugins.live-rename-nvim | |
| packages/nixpkgs/vimPlugins.renamer-nvim | |
| packages/nixpkgs/username-anarchy | Username generator tool for penetration testing |
| packages/nixpkgs/gnomeExtensions.app-name-indicator | A GNOME Shell extension that shows the active app's name and icon on the left side of the top panel, like it used to. |
| packages/nixpkgs/emacsPackages.go-rename | |
| packages/nixpkgs/haskellPackages.named | Named parameters (keyword arguments) for Haskell |
| packages/nixpkgs/haskellPackages.names | Type level names |
| packages/nixpkgs/rPackages.TouRnament | |
| packages/nixpkgs/python313Packages.pkgutil-resolve-name | Backport of Python 3.9’s pkgutil.resolve_name |
| packages/nixpkgs/python314Packages.pkgutil-resolve-name | Backport of Python 3.9’s pkgutil.resolve_name |
| packages/nixpkgs/haskellPackages.names-th | Manipulate name strings for TH |
| packages/nixpkgs/vimPlugins.nvim-rename-state | |
| packages/nixpkgs/sbclPackages.list-named-class | |
| packages/nixpkgs/emacsPackages.named-timer | |
| packages/nixpkgs/haskellPackages.named-sop | Dependently-typed sums and products, tagged by field name |
| packages/nixpkgs/python312Packages.pkgutil-resolve-name | Backport of Python 3.9’s pkgutil.resolve_name |
| packages/nixpkgs/rPackages.namedropR | |
| packages/nixpkgs/emacsPackages.wfnames | |
| packages/nixpkgs/texlivePackages.eqname | Name tags for equations |
| packages/nixpkgs/renameutils | Set of programs to make renaming of files faster |
| packages/nixpkgs/emacsPackages.auto-rename-tag | |
| packages/nixpkgs/sbclPackages.named-read-macros | |
| packages/nixpkgs/rPackages.geonames | |
| packages/nixpkgs/rPackages.taxnames | |
| packages/nixpkgs/rPackages.envnames | |
| packages/nixpkgs/rPackages.acroname | |
| packages/nixpkgs/rPackages.codename | |
| packages/nixpkgs/haskellPackages.named-lock | A named lock that is created on demand |
| packages/nixpkgs/haskellPackages.named-text | A parameterized named text type and associated functionality |
| packages/nixpkgs/rPackages.namedCapture | |
| packages/nixpkgs/texlivePackages.aaai-named | BibTeX style for AAAI |
| packages/nixpkgs/haskellPackages.lens-named | Helper for use with lens |
| packages/nixpkgs/haskellPackages.data-named | Data types for named entities |
| packages/nixpkgs/gnomeExtensions.current-workspace-name | Displays the current workspace name in the panel |
| packages/nixpkgs/sbclPackages.named-closure | |
| packages/nixpkgs/biosdevname | Udev helper for naming devices per BIOS names |
| packages/nixpkgs/mozcdic-ut-personal-names | Dictionary for Mozc |
| packages/nixpkgs/emacsPackages.nameless | |
| packages/nixpkgs/python313Packages.namex | Simple utility to separate the implementation of your Python package and its public API surface |
| packages/nixpkgs/python314Packages.namex | Simple utility to separate the implementation of your Python package and its public API surface |
| packages/nixpkgs/python314Packages.names | Generate random names |
| packages/nixpkgs/python313Packages.names | Generate random names |
| packages/nixpkgs/haskellPackages.valid-names | Valid operator/module characters |
| packages/nixpkgs/sbclPackages.named-read-macros-test | |
| packages/nixpkgs/unixtools.hostname | |
| packages/nixpkgs/namespaced-openvpn | Network namespace isolation for OpenVPN tunnels |
| packages/nixpkgs/texlivePackages.namedef | TeX definitions with named parameters |
| packages/nixpkgs/texlivePackages.namespc | Rudimentary C++-like namespaces in LaTeX |
| packages/nixpkgs/haskellPackages.by-other-names | Give aliases to record fields |
| packages/nixpkgs/haskellPackages.pdfname | Name a PDF file using information from the pdfinfo command |
| packages/nixpkgs/rPackages.namespace | |
| packages/nixpkgs/texlivePackages.numname | Convert a number to its English expression |
| packages/nixpkgs/haskellPackages.horname | Rename function definitions returned by SMT solvers |
| packages/nixpkgs/perlPackages.TestFilename | Portable filename comparison |
| packages/nixpkgs/emacsPackages.date2name | |
| packages/nixpkgs/rPackages.filenamer | |
| packages/nixpkgs/rPackages.babynames | |
| packages/nixpkgs/akkuPackages.slib-filename | String matching for filenames (glob, a la BASH) |
| packages/nixpkgs/sbclPackages.pathname-utils | |
| packages/nixpkgs/rPackages.babynamesIL | |
| packages/nixpkgs/haskellPackages.random-names | Expose Random and Arbitrary instances |
| packages/nixpkgs/python314Packages.nameko | Microservices framework that lets service developers concentrate on application logic and encourages testability |
| packages/nixpkgs/python313Packages.nameko | Microservices framework that lets service developers concentrate on application logic and encourages testability |
| packages/nixpkgs/perlPackages.ParseDistname | Parse a distribution name |
| packages/nixpkgs/haskellPackages.batch-rename | Make Linux or MacOS do things like "rename *.mp3 *.mp4" |
| packages/nixpkgs/texlivePackages.nameauth | Name authority mechanism for consistency in body text and index |
| packages/nixpkgs/perlPackages.SysHostnameLong | Try every conceivable way to get full hostname |
| packages/nixpkgs/reattach-to-user-namespace | Wrapper that provides access to the Mac OS X pasteboard service |
| packages/nixpkgs/emacsPackages.nameframe | |
| packages/nixpkgs/sbclPackages.lisp-namespace | |
| packages/nixpkgs/emacsPackages.info-rename-buffer | |
| packages/nixpkgs/perl5Packages.TestFilename | Portable filename comparison |
| packages/nixpkgs/perlPackages.CPANDistnameInfo | Extract distribution name and version from a distribution filename |
| packages/nixpkgs/sbclPackages.pcl-pathnames | |
| packages/nixpkgs/CuboCore.corerenamer | Batch file renamer from the C Suite |
| packages/nixpkgs/rPackages.nametagger | |
| packages/nixpkgs/haskellPackages.namelist | fortran90 namelist parser/pretty printer |
| packages/nixpkgs/python312Packages.namex | Simple utility to separate the implementation of your Python package and its public API surface |
| packages/nixpkgs/python312Packages.names | Generate random names |
| packages/nixpkgs/haskellPackages.named-binary-tag | NBT (named binary tag) serialization and deserialization |
| packages/nixpkgs/sbclPackages.trivial-renamer | |
| packages/nixpkgs/akkuPackages.chibi-pathname | A general, non-filesystem-specific pathname library |
| packages/nixpkgs/perl5Packages.ParseDistname | Parse a distribution name |
| packages/nixpkgs/perl5Packages.SysHostnameLong | Try every conceivable way to get full hostname |
| packages/nixpkgs/sbclPackages.pathname-utils-test | |
| packages/nixpkgs/haskellPackages.vinyl-named-sugar | Syntax sugar for vinyl records using overloaded labels |
| packages/nixpkgs/python313Packages.html-tag-names | List of known HTML tags |
| packages/nixpkgs/python314Packages.html-tag-names | List of known HTML tags |
| packages/nixpkgs/perl5Packages.CPANDistnameInfo | Extract distribution name and version from a distribution filename |
| packages/nixpkgs/haskellPackages.haskell-names | Name resolution library for Haskell |
| packages/nixpkgs/texlivePackages.hepnames | Pre-defined high energy particle names |
| packages/nixpkgs/texlivePackages.fontname | Scheme for naming fonts in TeX |
| packages/nixpkgs/haskellPackages.epubname | Rename epub ebook files based on meta information |
| packages/nixpkgs/haskellPackages.hostname | A very simple package providing a cross-platform means of determining the hostname |
| packages/nixpkgs/sbclPackages.lunamech-matrix-api | |
| packages/nixpkgs/haskellPackages.named-records | Flexible records with named fields |
| packages/nixpkgs/haskellPackages.named-formlet | A simple formlet library with named formlets |
| packages/nixpkgs/haskellPackages.named-servant | support records and named (from the named package) parameters in servant |
| packages/nixpkgs/python312Packages.nameko | Microservices framework that lets service developers concentrate on application logic and encourages testability |
| packages/nixpkgs/haskellPackages.servant-named | Add named endpoints to servant |
| packages/nixpkgs/haskellPackages.unicode-names | Unicode 3.2.0 character names |
| packages/nixpkgs/emacsPackages.with-namespace | |
| packages/nixpkgs/deterministic-uname | Print certain system information (hardcoded with lib/system values) |
| packages/nixpkgs/haskellPackages.hls-rename-plugin | Rename plugin for Haskell Language Server |
| packages/nixpkgs/rPackages.matsbyname | |
| packages/nixpkgs/python312Packages.html-tag-names | List of known HTML tags |
| packages/nixpkgs/emacsPackages.namespaces | |
| packages/nixpkgs/haskellPackages.namespace | A Generic Haskell library for managing namespaces |
| packages/nixpkgs/deterministic-host-uname | Print certain system information (hardcoded with lib/system values) |
| packages/nixpkgs/texlivePackages.numnameru | Converts a number to the russian spelled out name |
| packages/nixpkgs/haskellPackages.unicode-data-names | Unicode characters names and aliases |
| packages/nixpkgs/texlivePackages.jobname-suffix | Compile differently based on the filename |
| packages/nixpkgs/perl538Packages.TestFilename | Portable filename comparison |
| packages/nixpkgs/perl540Packages.TestFilename | Portable filename comparison |
| packages/nixpkgs/texlivePackages.langnames | Name languages and their genetic affiliations consistently |
| packages/nixpkgs/perl540Packages.ParseDistname | Parse a distribution name |
| packages/nixpkgs/perl538Packages.ParseDistname | Parse a distribution name |
| packages/nixpkgs/python313Packages.coolname | Random Name and Slug Generator |
| packages/nixpkgs/python314Packages.coolname | Random Name and Slug Generator |
| packages/nixpkgs/haskellPackages.bindings-uname | Low-level binding to POSIX uname(3) |
| packages/nixpkgs/haskellPackages.photoname | Rename photo image files based on EXIF shoot date |
| packages/nixpkgs/haskellPackages.namecoin-update | Tool to keep namecoin names updated and well |
| packages/nixpkgs/perl538Packages.SysHostnameLong | Try every conceivable way to get full hostname |
| packages/nixpkgs/perl540Packages.SysHostnameLong | Try every conceivable way to get full hostname |
| packages/nixpkgs/perl538Packages.CPANDistnameInfo | Extract distribution name and version from a distribution filename |
| packages/nixpkgs/perl540Packages.CPANDistnameInfo | Extract distribution name and version from a distribution filename |
| packages/nixpkgs/emacsPackages.hippie-namespace | |
| packages/nixpkgs/perlPackages.Perlosnames | List possible $^O ($OSNAME) values, with description |
| packages/nixpkgs/sbclPackages.named-readtables | |
| packages/nixpkgs/sbclPackages.symbol-namespaces | |
| packages/nixpkgs/emacsPackages.nameframe-project | |
| packages/nixpkgs/python312Packages.coolname | Random Name and Slug Generator |
| packages/nixpkgs/python313Packages.namedlist | Similar to namedtuple, but instances are mutable |
| packages/nixpkgs/python314Packages.namedlist | Similar to namedtuple, but instances are mutable |
| packages/nixpkgs/perl5Packages.Perlosnames | List possible $^O ($OSNAME) values, with description |
| packages/nixpkgs/rPackages.ozbabynames | |
| packages/nixpkgs/rPackages.onbabynames | |
| packages/nixpkgs/rPackages.ukbabynames | |
| packages/nixpkgs/haskellPackages.foscam-filename | Foscam File format |
| packages/nixpkgs/rubyPackages.domain_name | |
| packages/nixpkgs/haskellPackages.hedis-namespace | Initial project template from stack |
| packages/nixpkgs/haskellPackages.named-servant-server | server support for named-servant |
| packages/nixpkgs/haskellPackages.named-servant-client | client support for named-servant |
| packages/nixpkgs/rubyPackages_3_1.domain_name | |
| packages/nixpkgs/rubyPackages_3_2.domain_name | |
| packages/nixpkgs/rubyPackages_3_5.domain_name | |
| packages/nixpkgs/sbclPackages.named-readtables-test | |
| packages/nixpkgs/rubyPackages_3_3.domain_name | |
| packages/nixpkgs/rubyPackages_4_0.domain_name | |
| packages/nixpkgs/rubyPackages_3_4.domain_name | |
| packages/nixpkgs/haskellPackages.multipart-names | Handling of multipart names in various casing styles |
| packages/nixpkgs/python312Packages.namedlist | Similar to namedtuple, but instances are mutable |
| packages/nixpkgs/haskellPackages.Tournament | Tournament related algorithms |
| packages/nixpkgs/emacsPackages.visual-filename-abbrev | |
| packages/nixpkgs/texlivePackages.namedtensor | Macros for named tensor notation |
| packages/nixpkgs/haskellPackages.hashrename | Rename every file in a directory with his SHA1 hash |
| packages/nixpkgs/sbclPackages.slynk-named-readtables | |
| packages/nixpkgs/emacsPackages.sly-named-readtables | |
| packages/nixpkgs/gnomeExtensions.show-hostname-and-ip | Displays the machine’s hostname and local IP address directly on the desktop. |
| packages/nixpkgs/haskellPackages.linux-namespaces | Work with linux namespaces: create new or enter existing ones |
| packages/nixpkgs/haskellPackages.DAG-Tournament | Real-Time Game Tournament Evaluator |
| packages/nixpkgs/python313Packages.wheel-filename | Parse wheel filenames |
| packages/nixpkgs/python314Packages.wheel-filename | Parse wheel filenames |
| packages/nixpkgs/python314Packages.ipynbname | Simply returns either notebook filename or the full path to the notebook |
| packages/nixpkgs/python313Packages.ipynbname | Simply returns either notebook filename or the full path to the notebook |
| packages/nixpkgs/python313Packages.nameparser | Module for parsing human names into their individual components |
| packages/nixpkgs/python314Packages.nameparser | Module for parsing human names into their individual components |
| packages/nixpkgs/gnomeExtensions.hostname-on-panel | Displays the Hostname on the Gnome Panel |
| packages/nixpkgs/skkDictionaries.fullname | SKK dictionary for celebrities |
| packages/nixpkgs/haskellPackages.servant-namedargs | Combinators for servant providing named parameters |
| packages/nixpkgs/python312Packages.wheel-filename | Parse wheel filenames |
| packages/nixpkgs/python312Packages.nameparser | Module for parsing human names into their individual components |
| packages/nixpkgs/python312Packages.ipynbname | Simply returns either notebook filename or the full path to the notebook |
| packages/nixpkgs/terraform-providers.namecheap_namecheap | |
| packages/nixpkgs/perl540Packages.Perlosnames | List possible $^O ($OSNAME) values, with description |
| packages/nixpkgs/perl538Packages.Perlosnames | List possible $^O ($OSNAME) values, with description |
| packages/nixpkgs/python313Packages.lance-namespace | Open specification on top of the storage-based Lance table and file format to standardize access to a collection of Lance tables |
| packages/nixpkgs/python314Packages.lance-namespace | Open specification on top of the storage-based Lance table and file format to standardize access to a collection of Lance tables |
| packages/nixpkgs/gnomeExtensions.add-username-to-top-panel | Simply add your username to topbar panel quick settings menu. |
| packages/nixpkgs/texlivePackages.babel-vietnamese | Babel support for typesetting Vietnamese |
| packages/nixpkgs/haskellPackages.postgresql-named | Generic deserialization of PostgreSQL rows based on column names |
| packages/nixpkgs/haskellPackages.hostname-validate | Validate hostnames e.g. localhost or foo.co.uk. |
| packages/nixpkgs/chickenPackages_5.chickenEggs.unitex-named-chars | Unicode & LaTeX Named Chars |
| packages/nixpkgs/sbclPackages.illogical-pathnames | |
| packages/nixpkgs/hyprland-autoname-workspaces | Automatically rename workspaces with icons of started applications |
| packages/nixpkgs/texlivePackages.pgfornament | Drawing of Vectorian ornaments with PGF/TikZ |
| packages/nixpkgs/python312Packages.lance-namespace | Open specification on top of the storage-based Lance table and file format to standardize access to a collection of Lance tables |
| packages/nixpkgs/terraform-providers.namecheap | |
| packages/nixpkgs/texlivePackages.hyphen-vietnamese | Vietnamese hyphenation patterns. |
| packages/nixpkgs/texlivePackages.pgfornament-han | pgfornament library for Chinese traditional motifs and patterns |
| packages/nixpkgs/texlivePackages.lshort-vietnamese | Vietnamese version of the LaTeX introduction |
| packages/nixpkgs/perlPackages.namespaceclean | Keep imports and functions out of your namespace |
| packages/nixpkgs/akkuPackages.retropikzel-named-pipes | Library for using named pipes |
| packages/nixpkgs/perl5Packages.namespaceclean | Keep imports and functions out of your namespace |
| packages/nixpkgs/python313Packages.zope-dottedname | Resolver for Python dotted names |
| packages/nixpkgs/python314Packages.zope-dottedname | Resolver for Python dotted names |
| packages/nixpkgs/python314Packages.pynamecheap | Namecheap API client in Python |
| packages/nixpkgs/python313Packages.pynamecheap | Namecheap API client in Python |
| packages/nixpkgs/texlivePackages.biblatex-morenames | New names for standard BibLaTeX entry type |
| packages/nixpkgs/haskellPackages.servant-client-namedargs | Automatically derive API client functions with named and optional parameters |
| packages/nixpkgs/haskellPackages.servant-server-namedargs | Automatically derive API server functions with named and optional parameters |
| packages/nixpkgs/emacsPackages.nameframe-projectile | |
| packages/nixpkgs/haskellPackages.time-locale-vietnamese | Vietnamese locale for date and time format |
| packages/nixpkgs/gnomeExtensions.username-in-top-panel-right-side | Displays the current username in the top panel, positioned at the far right after the power button. |
| packages/nixpkgs/rPackages.vietnameseConverter | |
| packages/nixpkgs/libuninameslist | Library of Unicode names and annotation data |
| packages/nixpkgs/chickenPackages_5.chickenEggs.pathname-expand | |
| packages/nixpkgs/haskellPackages.daemons | Daemons in Haskell made fun and easy |
| packages/nixpkgs/python312Packages.zope-dottedname | Resolver for Python dotted names |
| packages/nixpkgs/python312Packages.pynamecheap | Namecheap API client in Python |
| packages/nixpkgs/sbclPackages.trivial-package-local-nicknames | |
| packages/nixpkgs/haskellPackages.postgresql-simple-named | Implementation of named parameters for `postgresql-simple` library |
| packages/nixpkgs/texlivePackages.mpcolornames | Extend list of predefined colour names for MetaPost |
| packages/nixpkgs/haskellPackages.xmonad-windownames | A library to automatically put named windows into the DynamicLog |
| packages/nixpkgs/haskellPackages.hls-qualify-imported-names-plugin | A Haskell Language Server plugin that qualifies imported names |
| packages/nixpkgs/emacsPackages.nameframe-perspective | |
| packages/nixpkgs/perl540Packages.namespaceclean | Keep imports and functions out of your namespace |
| packages/nixpkgs/perl538Packages.namespaceclean | Keep imports and functions out of your namespace |
| packages/nixpkgs/python313Packages.pytest-helpers-namespace | PyTest Helpers Namespace |
| packages/nixpkgs/python314Packages.pytest-helpers-namespace | PyTest Helpers Namespace |
| packages/nixpkgs/python313Packages.lance-namespace-urllib3-client | Lance namespace OpenAPI specification |
| packages/nixpkgs/python314Packages.lance-namespace-urllib3-client | Lance namespace OpenAPI specification |
| packages/nixpkgs/python312Packages.pytest-helpers-namespace | PyTest Helpers Namespace |
| packages/nixpkgs/haskellPackages.primitive-stablename | primitive operations on StableNames |
| packages/nixpkgs/python312Packages.lance-namespace-urllib3-client | Lance namespace OpenAPI specification |
| packages/nixpkgs/perlPackages.TestRunPluginTrimDisplayedFilenames | Trim the first components |
| packages/nixpkgs/sbclPackages.lisp-namespace_dot_test | |
| packages/nixpkgs/perl5Packages.TestRunPluginTrimDisplayedFilenames | Trim the first components |
| packages/nixpkgs/ocamlPackages.username_kernel | Identifier for a user |
| packages/nixpkgs/home-assistant-component-tests.namecheapdns | Open source home automation that puts local control and privacy first |
| packages/nixpkgs/vscode-extensions.usernamehw.errorlens | Visual Studio Code extension that improves highlighting of errors, warnings and other language diagnostics |
| packages/nixpkgs/gnomeExtensions.quick-settings-audio-devices-renamer | It lets you change the names of your audio devices in the Quick Settings Audio Panel |
| packages/nixpkgs/rPackages.proceduralnames | |
| packages/nixpkgs/rPackages.touRnamentofchampions | |
| packages/nixpkgs/perlPackages.namespaceautoclean | Keep imports out of your namespace |
| packages/nixpkgs/perl538Packages.TestRunPluginTrimDisplayedFilenames | Trim the first components |
| packages/nixpkgs/perl540Packages.TestRunPluginTrimDisplayedFilenames | Trim the first components |
| packages/nixpkgs/perl5Packages.namespaceautoclean | Keep imports out of your namespace |
| packages/nixpkgs/haskellPackages.linux-namespaces_0_2_0_1 | Work with linux namespaces: create new or enter existing ones |
| packages/nixpkgs/ocamlPackages_latest.username_kernel | Identifier for a user |
| packages/nixpkgs/ocamlPackages.janeStreet.username_kernel | Identifier for a user |
| packages/nixpkgs/sbclPackages.cl-ana_dot_pathname-utils | |
| packages/nixpkgs/texlivePackages.longnamefilelist | Tidy \listfiles with long file names |
| packages/nixpkgs/texlivePackages.varsfromjobname | Extract variables from the name of the LaTeX file |
| packages/nixpkgs/sbclPackages.cl-glfw-opengl-amd__name__gen__delete | |
| packages/nixpkgs/perl538Packages.namespaceautoclean | Keep imports out of your namespace |
| packages/nixpkgs/perl540Packages.namespaceautoclean | Keep imports out of your namespace |
| packages/nixpkgs/vscode-extensions.formulahendry.auto-rename-tag | |
| packages/nixpkgs/ocamlPackages_latest.janeStreet.username_kernel | Identifier for a user |
| options/nixos/boot.uki.name | Name of the UKI
|
| options/nixos/users.users.<name>.name | The name of the user account
|
| options/darwin/users.users.<name>.name | The name of the user account
|
| options/home-manager/gtk.font.name | The family name of the font within the package.
|
| options/nixos/users.groups.<name>.name | The name of the group
|
| options/darwin/users.groups.<name>.name | The group's name
|
| options/home-manager/gtk.theme.name | The name of the theme within the package.
|
| options/nixos/users.extraUsers.<name>.name | The name of the user account
|
| options/nixos/system.name | The name of the system used in the system.build.toplevel derivation
|
| options/home-manager/gtk.gtk3.font.name | The family name of the font within the package.
|
| options/home-manager/gtk.gtk2.font.name | The family name of the font within the package.
|
| options/home-manager/gtk.gtk4.font.name | The family name of the font within the package.
|
| options/nixos/users.extraGroups.<name>.name | The name of the group
|
| options/home-manager/gtk.gtk3.theme.name | The name of the theme within the package.
|
| options/home-manager/gtk.gtk4.theme.name | The name of the theme within the package.
|
| options/home-manager/gtk.gtk2.theme.name | The name of the theme within the package.
|
| options/home-manager/gtk.iconTheme.name | The name of the icon theme within the package.
|
| options/nixos/systemd.units.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/systemd.paths.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/services.nylon.<name>.name | The name of this nylon instance.
|
| packages/nixpkgs/sbclPackages.com_dot_gigamonkeys_dot_pathnames | |
| options/nixos/systemd.timers.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/systemd.slices.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/services.bind.zones.<name>.name | Name of the zone.
|
| options/home-manager/xdg.desktopEntries.<name>.name | Specific name of the application.
|
| options/nixos/systemd.user.units.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/systemd.user.paths.<name>.name | The name of this systemd unit, including its extension
|
| options/home-manager/gtk.gtk4.iconTheme.name | The name of the icon theme within the package.
|
| options/home-manager/gtk.gtk2.iconTheme.name | The name of the icon theme within the package.
|
| options/home-manager/gtk.gtk3.iconTheme.name | The name of the icon theme within the package.
|
| options/nixos/services.pppd.peers.<name>.name | Name of the PPP peer.
|
| options/home-manager/xdg.desktopEntries.<name>.actions.<name>.name | Name of the action.
|
| options/nixos/systemd.targets.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/systemd.sockets.<name>.name | The name of this systemd unit, including its extension
|
| options/home-manager/gtk.cursorTheme.name | The name of the cursor theme within the package.
|
| options/nixos/systemd.user.slices.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/systemd.user.timers.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/image.repart.name | Name of the image
|
| options/nixos/systemd.user.sockets.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/systemd.user.targets.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/systemd.services.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/services.i2pd.inTunnels.<name>.name | The endpoint name.
|
| options/nixos/services.i2pd.outTunnels.<name>.name | The endpoint name.
|
| options/home-manager/gtk.gtk4.cursorTheme.name | The name of the cursor theme within the package.
|
| options/home-manager/gtk.gtk2.cursorTheme.name | The name of the cursor theme within the package.
|
| options/home-manager/gtk.gtk3.cursorTheme.name | The name of the cursor theme within the package.
|
| options/nixos/services.bitcoind.<name>.rpc.users.<name>.name | Username for JSON-RPC connections.
|
| options/nixos/hardware.alsa.controls.<name>.name | Name of the control, as it appears in alsamixer
|
| options/nixos/services.etcd.name | Etcd unique node name.
|
| options/nixos/security.pam.services.<name>.name | Name of the PAM service.
|
| options/nixos/systemd.user.services.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/services.netbird.tunnels.<name>.name | Primary name for use (as a suffix) in:
- systemd service name,
- hardened user name and group,
- systemd
*Directory= names,
- desktop application identification,
|
| options/nixos/services.netbird.clients.<name>.name | Primary name for use (as a suffix) in:
- systemd service name,
- hardened user name and group,
- systemd
*Directory= names,
- desktop application identification,
|
| options/darwin/homebrew.casks.*.name | The name of the cask to install.
|
| options/darwin/homebrew.brews.*.name | The name of the formula to install.
|
| options/nixos/services.rspamd.workers.<name>.name | Name of the worker
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels.<name>.name | The unique name for THIS channel in THIS group
|
| options/nixos/services.hylafax.modems.<name>.name | Name of modem device,
will be searched for in /dev.
|
| options/home-manager/home.pointerCursor.name | The cursor name within the package.
|
| options/nixos/services.tinc.networks.<name>.name | The name of the node which is used as an identifier when communicating
with the remote nodes in the mesh
|
| options/nixos/services.github-runners.<name>.name | Name of the runner to configure
|
| options/darwin/services.github-runners.<name>.name | Name of the runner to configure
|
| options/nixos/systemd.mounts.*.name | The name of this systemd unit, including its extension
|
| options/home-manager/programs.floorp.profiles.<name>.name | Profile name.
|
| options/home-manager/services.kanshi.profiles.<name>.name | Profile name
|
| options/home-manager/services.colima.profiles.<name>.name | The profile's name.
|
| options/home-manager/accounts.email.accounts.<name>.name | Unique identifier of the account
|
| options/nixos/systemd.network.networks.<name>.name | The name of the network interface to match against.
|
| options/nixos/hardware.sane.brscan5.netDevices.<name>.name | The friendly name you give to the network device
|
| options/nixos/hardware.sane.brscan4.netDevices.<name>.name | The friendly name you give to the network device
|
| options/nixos/services.i2pd.upnp.name | Name i2pd appears in UPnP forwardings list.
|
| options/darwin/users.users.<name>.uid | The user's UID.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.name | The name of this group for this account
|
| options/home-manager/programs.papis.libraries.<name>.name | This library's name.
|
| options/nixos/services.bacula-sd.name | Specifies the Name of the Storage daemon.
|
| options/darwin/homebrew.taps.*.name | When clone_target is unspecified, this is the name of a formula
repository to tap from GitHub using HTTPS
|
| options/darwin/users.users.<name>.gid | The user's primary group.
|
| options/nixos/services.k3s.autoDeployCharts.<name>.name | The name of the Helm chart
|
| options/home-manager/home.file.<name>.text | Text of the file
|
| options/nixos/services.kimai.sites.<name>.database.name | Database name.
|
| options/home-manager/programs.firefox.profiles.<name>.name | Profile name.
|
| options/nixos/services.rke2.autoDeployCharts.<name>.name | The name of the Helm chart
|
| options/home-manager/programs.kitty.font.name | The family name of the font within the package.
|
| options/home-manager/home.language.name | The language to use for personal names.
|
| options/nixos/services.bcg.name | Name for the device
|
| options/nixos/services.netbird.clients.<name>.user.name | A system user name for this client instance.
|
| options/nixos/services.netbird.tunnels.<name>.user.name | A system user name for this client instance.
|
| options/nixos/services.kmonad.keyboards.<name>.name | Keyboard name.
|
| options/nixos/services.buildkite-agents.<name>.name | The name of the agent as seen in the buildkite dashboard.
|
| options/darwin/services.buildkite-agents.<name>.name | The name of the agent as seen in the buildkite dashboard.
|
| options/nixos/services.akkoma.frontends.<name>.name | Akkoma frontend name.
|
| options/nixos/services.i2pd.proto.bob.name | The endpoint name.
|
| options/nixos/services.i2pd.proto.sam.name | The endpoint name.
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites.<name>.name | Name of the site.
|
| options/nixos/services.bacula-dir.name | The director name used by the system administrator
|
| options/nixos/services.postfix.masterConfig.<name>.name | The name of the service to run
|
| options/nixos/services.bacula-fd.name | The client name that must be used by the Director when connecting
|
| options/nixos/services.drupal.sites.<name>.database.name | Database name.
|
| options/nixos/services.send.redis.name | Name of the redis server
|
| options/home-manager/services.pizauth.accounts.<name>.name | Unique identifier of the account
|
| options/nixos/users.users.<name>.home | The user's home directory.
|
| options/home-manager/accounts.contact.accounts.<name>.name | Unique identifier of the contact account
|
| options/home-manager/xdg.dataFile.<name>.text | Text of the file
|
| options/nixos/services.v4l2-relayd.instances.<name>.name | The name of the instance.
|
| options/nixos/services.patroni.name | The name of the host
|
| options/home-manager/programs.smug.projects.<name>.windows.*.name | Name of the tmux window;
|
| options/nixos/services.i2pd.proto.http.name | The endpoint name.
|
| options/nixos/services.i2pd.proto.i2cp.name | The endpoint name.
|
| options/home-manager/services.cachix-agent.name | The unique agent name.
|
| options/home-manager/programs.floorp.profiles.<name>.containers.<name>.name | Container name, e.g., shopping.
|
| options/nixos/users.users.<name>.uid | The account UID
|
| options/nixos/services.cachix-agent.name | Agent name, usually same as the hostname
|
| options/nixos/services.snipe-it.mail.from.name | Mail "from" name.
|
| options/darwin/services.cachix-agent.name | Agent name, usually the same as the hostname.
|
| options/home-manager/programs.zsh.plugins.*.name | The name of the plugin.
|
| options/home-manager/services.walker.theme.name | The theme name.
|
| options/darwin/users.groups.<name>.gid | The group's GID.
|
| options/nixos/networking.nftables.tables.<name>.name | Table name.
|
| options/nixos/users.users.<name>.homeMode | The user's home directory mode in numeric format
|
| options/home-manager/accounts.calendar.accounts.<name>.name | Unique identifier of the calendar
|
| options/nixos/services.kmscon.fonts.*.name | Font name, as used by fontconfig.
|
| options/home-manager/services.dunst.iconTheme.name | The name of the theme within the package.
|
| options/home-manager/programs.firefox.profiles.<name>.containers.<name>.name | Container name, e.g., shopping.
|
| options/home-manager/programs.fish.plugins.*.name | The name of the plugin.
|
| options/nixos/services.authelia.instances.<name>.name | Name is used as a suffix for the service name, user, and group
|
| options/nixos/services.dovecot2.mailboxes.<name>.name | The name of the mailbox.
|
| options/nixos/networking.interfaces.<name>.name | Name of the interface.
|
| options/home-manager/home.file.<name>.target | Path to target file relative to HOME.
|
| options/home-manager/programs.librewolf.profiles.<name>.name | Profile name.
|
| options/nixos/services.varnish.listen.*.name | Name is referenced in logs
|
| options/nixos/users.users.<name>.group | The user's primary group.
|
| options/nixos/networking.vswitches.<name>.interfaces.<name>.name | Name of the interface
|
| options/nixos/programs.regreet.font.name | Name of the font to use for regreet.
|
| options/home-manager/xdg.stateFile.<name>.text | Text of the file
|
| options/home-manager/xdg.cacheFile.<name>.text | Text of the file
|
| options/nixos/services.prosody.muc.*.name | The name to return in service discovery responses for the MUC service itself
|
| options/nixos/services.zammad.redis.name | Name of the redis server
|
| options/nixos/boot.zfs.pools.<name>.devNodes | Name of directory from which to import ZFS device, this is passed to zpool import
as the value of the -d option
|
| options/nixos/services.netbird.tunnels.<name>.service.name | A systemd service name to use (without .service suffix).
|
| options/nixos/services.netbird.clients.<name>.service.name | A systemd service name to use (without .service suffix).
|
| options/nixos/services.snipe-it.mail.replyTo.name | Mail "reply-to" name.
|
| options/home-manager/programs.gnome-shell.theme.name | Name of the GNOME Shell theme.
|
| options/nixos/power.ups.ups.<name>.port | The serial port to which your UPS is connected. /dev/ttyS0 is
usually the first port on Linux boxes, for example.
|
| options/nixos/services.opengfw.rules.*.name | Name of the rule.
|
| options/home-manager/programs.rbenv.plugins.*.name | Name of the plugin.
|
| options/home-manager/programs.lapce.plugins.*.name | Name of the plugin.
|
| options/home-manager/home.file.<name>.enable | Whether this file should be generated
|
| options/nixos/boot.iscsi-initiator.name | Name of the iSCSI initiator to boot from
|
| options/nixos/services.postfix.settings.master.<name>.name | The name of the service to run
|
| options/nixos/services.crowdsec.name | Name of the machine when registering it at the central or local api.
|
| options/nixos/hardware.deviceTree.name | The name of an explicit dtb to be loaded, relative to the dtb base
|
| options/nixos/services.i2pd.proto.httpProxy.name | The endpoint name.
|
| options/nixos/services.sabnzbd.settings.servers.<name>.name | The name of the server
|
| options/home-manager/programs.docker-cli.contexts.<name>.Name | Name of the Docker context
|
| options/nixos/programs.regreet.theme.name | Name of the theme to use for regreet.
|
| options/home-manager/home.file.<name>.force | Whether the target path should be unconditionally replaced
by the managed file source
|
| options/nixos/users.groups.<name>.gid | The group GID
|
| options/home-manager/xdg.dataFile.<name>.target | Path to target file relative to xdg.dataHome.
|
| options/nixos/services.mysql.ensureUsers.*.name | Name of the user to ensure.
|
| options/home-manager/programs.librewolf.profiles.<name>.containers.<name>.name | Container name, e.g., shopping.
|
| options/nixos/services.tt-rss.database.name | Name of the existing database.
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.name | Name of the profile.
|
| options/home-manager/xdg.desktopEntries.<name>.actions.<name>.exec | Program to execute, possibly with arguments.
|
| options/nixos/services.wordpress.sites.<name>.database.name | Database name.
|
| options/home-manager/xdg.dataFile.<name>.enable | Whether this file should be generated
|
| options/home-manager/programs.zsh.zplug.plugins.*.name | The name of the plugin.
|
| options/nixos/services.i2pd.proto.socksProxy.name | The endpoint name.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.auth.<name>.name | The name of this authentication provider
|
| options/nixos/services.mysql.galeraCluster.name | The logical name of the Galera cluster
|
| options/home-manager/services.activitywatch.watchers.<name>.name | The name of the watcher
|
| options/nixos/services.heartbeat.name | Name of the beat
|
| options/nixos/services.mediawiki.name | Name of the wiki.
|
| options/nixos/services.teeworlds.name | Name of the server.
|
| options/home-manager/xdg.desktopEntries.<name>.actions.<name>.icon | Icon to display in file manager, menus, etc.
|
| options/home-manager/launchd.agents.<name>.enable | Whether to enable ‹name›.
|
| options/nixos/users.extraUsers.<name>.home | The user's home directory.
|
| options/nixos/services.openiscsi.name | Name of this iscsi initiator
|
| options/home-manager/programs.thunderbird.profiles.<name>.feedAccounts.<name>.name | This feed account's name.
|
| options/nixos/users.extraUsers.<name>.homeMode | The user's home directory mode in numeric format
|
| options/home-manager/xdg.dataFile.<name>.force | Whether the target path should be unconditionally replaced
by the managed file source
|
| options/home-manager/xdg.configFile.<name>.text | Text of the file
|
| options/nixos/services.gitea.database.name | Database name.
|
| options/nixos/services.movim.database.name | Database name.
|
| options/darwin/nix.registry.<name>.to | The flake reference from is rewritten to.
|
| options/home-manager/nix.registry.<name>.to | The flake reference to which from> is to be rewritten.
|
| options/nixos/services.h2o.hosts.<name>.serverName | Server name to be used for this virtual host
|
| options/nixos/programs.regreet.iconTheme.name | Name of the icon theme to use for regreet.
|
| options/nixos/services.mtr-exporter.jobs.*.name | Name of ICMP pinging job.
|
| options/home-manager/xdg.cacheFile.<name>.target | Path to target file relative to xdg.cacheHome.
|
| options/nixos/containers.<name>.bindMounts.<name>.hostPath | Location of the host path to be mounted.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.actors.<name>.name | The name of this actor
|
| options/nixos/services.firezone.server.provision.accounts.<name>.groups.<name>.name | The name of this group
|
| options/nixos/services.snipe-it.database.name | Database name.
|
| options/nixos/users.extraUsers.<name>.uid | The account UID
|
| options/nixos/services.wyoming.piper.servers.<name>.zeroconf.name | The advertised name for zeroconf discovery.
|
| options/nixos/services.firezone.relay.name | The name of this gateway as shown in firezone
|
| options/nixos/services.oauth2-proxy.cookie.name | The name of the cookie that the oauth_proxy creates.
|
| options/home-manager/xdg.stateFile.<name>.target | Path to target file relative to xdg.stateHome.
|
| options/nixos/services.i2pd.proto.i2pControl.name | The endpoint name.
|
| options/home-manager/services.podman.builds.<name>.tags | Name associated with the build
|
| options/nixos/services.gitea-actions-runner.instances.<name>.name | The name identifying the runner instance towards the Gitea/Forgejo instance.
|
| options/nixos/services.nsd.zones.<name>.notify | This primary server will notify all given secondary servers about
zone changes
|
| options/nixos/fileSystems.<name>.noCheck | Disable running fsck on this filesystem.
|
| options/nixos/systemd.units.<name>.text | Text of this systemd unit.
|
| options/home-manager/programs.thunderbird.profiles.<name>.name | This profile's name.
|
| options/home-manager/programs.boxxy.rules.*.name | Unique identifier of the boxxy rule
|
| options/home-manager/xdg.cacheFile.<name>.enable | Whether this file should be generated
|
| options/home-manager/xdg.stateFile.<name>.enable | Whether this file should be generated
|
| options/darwin/users.users.<name>.isHidden | Whether to make the user account hidden.
|
| options/nixos/services.syncthing.settings.devices.<name>.name | The name of the device.
|
| options/home-manager/services.syncthing.settings.devices.<name>.name | The name of the device.
|
| options/nixos/services.davis.database.name | Database name, only used when the databse is created locally.
|
| options/nixos/services.rsync.jobs.<name>.user | The name of an existing user account under which the rsync process should run.
|
| options/home-manager/home.file.<name>.source | Path of the source file or directory
|
| options/nixos/power.ups.ups.<name>.driver | Specify the program to run to talk to this UPS. apcsmart,
bestups, and sec are some examples.
|
| options/darwin/users.users.<name>.home | The user's home directory
|
| options/nixos/services.tinc.networks.<name>.hosts | The name of the host in the network as well as the configuration for that host
|
| options/nixos/services.ente.api.settings.db.name | The database name
|
| options/nixos/services.xinetd.services.*.name | Name of the service.
|
| options/nixos/services.docuseal.redis.name | Name of the redis server
|
| options/nixos/services.i2pd.websocket.name | The endpoint name.
|
| options/nixos/services.monica.database.name | Database name.
|
| options/nixos/services.moodle.database.name | Database name.
|
| options/nixos/services.zammad.database.name | Database name.
|
| options/nixos/containers.<name>.bindMounts.<name>.isReadOnly | Determine whether the mounted path will be accessed in read-only mode.
|
| options/nixos/users.extraUsers.<name>.group | The user's primary group.
|
| options/darwin/nix.registry.<name>.from | The flake reference to be rewritten.
|
| options/home-manager/nix.registry.<name>.from | The flake reference to be rewritten.
|
| options/darwin/programs.vim.vimOptions.<name>.target | Name of symlink
|
| options/nixos/services.firezone.server.provision.accounts.<name>.relayGroups.<name>.name | The name of this relay group
|
| options/nixos/services.immich.database.name | The name of the immich database.
|
| options/nixos/services.tomcat.virtualHosts.*.name | name of the virtualhost
|
| options/home-manager/xdg.cacheFile.<name>.force | Whether the target path should be unconditionally replaced
by the managed file source
|
| options/home-manager/xdg.stateFile.<name>.force | Whether the target path should be unconditionally replaced
by the managed file source
|
| options/nixos/services.armagetronad.servers.<name>.name | The name of this server.
|
| options/nixos/services.ndppd.proxies.<name>.rules.<name>.network | This is the target address is to match against
|
| options/nixos/services.sympa.database.name | Database name
|
| options/nixos/services.wakapi.database.name | The name of the database to use for Wakapi.
|
| options/nixos/hardware.sata.timeout.drives.*.name | Drive name without the full path.
|
| options/nixos/services.zabbixWeb.database.name | Database name.
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.Bonjour | This optional key can be used to request that the service be registered with the
mDNSResponder(8)
|
| options/nixos/containers.<name>.bindMounts.<name>.mountPoint | Mount point on the container file system.
|
| options/home-manager/xdg.dataFile.<name>.source | Path of the source file or directory
|
| options/nixos/systemd.automounts.*.name | The name of this systemd unit, including its extension
|
| options/home-manager/home.file.<name>.onChange | Shell commands to run when file has changed between
generations
|
| options/nixos/services.rsync.jobs.<name>.group | The name of an existing user group under which the rsync process should run.
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.name | Adapter name that is used in the radicle-ci-broker configuration
|
| options/nixos/programs.regreet.cursorTheme.name | Name of the cursor theme to use for regreet.
|
| options/home-manager/programs.ranger.plugins.*.name | Name of the plugin linked to
$XDG_CONFIG_HOME/ranger/plugins/
|
| options/nixos/fileSystems.<name>.enable | Whether to enable the filesystem mount.
|
| options/home-manager/xdg.configFile.<name>.target | Path to target file relative to xdg.configHome.
|
| options/nixos/services.firezone.gui-client.name | The name of this client as shown in firezone
|
| options/nixos/hardware.deviceTree.overlays.*.name | Name of this overlay
|
| options/nixos/users.users.<name>.shell | The path to the user's shell
|
| options/nixos/users.extraGroups.<name>.gid | The group GID
|
| options/darwin/programs.tmux.tmuxOptions.<name>.target | Name of symlink
|
| options/darwin/users.users.<name>.createHome | Create the home directory when creating the user.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.hostname | Specifies the real host name to log into.
|
| options/darwin/environment.etc.<name>.target | Name of symlink
|
| options/nixos/services.firezone.server.provision.accounts.<name>.gatewayGroups.<name>.name | The name of this gateway group
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.name | Name used to derive peer unit name.
|
| options/nixos/power.ups.ups.<name>.summary | Lines which would be added inside ups.conf for handling this UPS.
|
| options/nixos/services.cgit.<name>.user | User to run the cgit service as.
|
| options/home-manager/programs.kakoune.config.hooks.*.name | The name of the hook
|
| options/nixos/nix.registry.<name>.to | The flake reference from is rewritten to
|
| options/nixos/users.users.<name>.enable | If set to false, the user account will not be created
|
| options/nixos/services.forgejo.database.name | Database name.
|
| options/nixos/services.redmine.database.name | Database name.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.name | The name of this resource
|
| options/nixos/fileSystems.<name>.fsType | Type of the file system
|
| options/nixos/users.users.<name>.pamMount | Attributes for user's entry in
pam_mount.conf.xml
|
| options/nixos/services.pdfding.database.name | PostgreSQL database name
|
| options/nixos/systemd.paths.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/home-manager/xdg.configFile.<name>.enable | Whether this file should be generated
|
| options/nixos/systemd.paths.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/security.wrappers.<name>.program | The name of the wrapper program
|
| options/nixos/containers.<name>.extraVeths.<name>.hostBridge | Put the host-side of the veth-pair into the named bridge
|
| options/nixos/services.autossh.sessions.*.name | Name of the local AutoSSH session
|
| options/darwin/services.autossh.sessions.*.name | Name of the local AutoSSH session
|
| options/home-manager/programs.pyradio.stations.*.name | Display name of the radio station.
|
| options/nixos/nix.registry.<name>.flake | The flake input from is rewritten to.
|
| options/darwin/nix.registry.<name>.flake | The flake input from is rewritten to.
|
| options/home-manager/nix.registry.<name>.flake | The flake input to which from> is to be rewritten.
|
| options/nixos/services.firezone.gateway.name | The name of this gateway as shown in firezone
|
| options/nixos/environment.etc.<name>.target | Name of symlink (relative to
/etc)
|
| options/home-manager/xdg.dataFile.<name>.onChange | Shell commands to run when file has changed between
generations
|
| options/nixos/users.users.<name>.extraGroups | The user's auxiliary groups.
|
| options/nixos/services.zabbixProxy.database.name | Database name.
|
| options/nixos/programs.neovim.runtime.<name>.target | Name of symlink
|
| options/nixos/security.acme.certs.<name>.domain | Domain to fetch certificate for (defaults to the entry name).
|
| options/nixos/services.gitwatch.<name>.user | The name of services's user
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockNodeName | This optional key specifies the node to connect(2) or bind(2) to.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.cssSnippets.*.name | Name of the snippet.
|
| options/nixos/services.nsd.zones.<name>.zoneStats | When set to something distinct to null NSD is able to collect
statistics per zone
|
| options/nixos/users.users.<name>.cryptHomeLuks | Path to encrypted luks device that contains
the user's home directory.
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| options/home-manager/programs.rclone.remotes.<name>.mounts.<name>.logLevel | Set the log-level
|
| options/nixos/services.selfoss.database.name | Name of the existing database (has no effect if type is "sqlite").
|
| options/nixos/systemd.user.units.<name>.text | Text of this systemd unit.
|
| options/nixos/containers.<name>.flake | The Flake URI of the NixOS configuration to use for the container
|
| options/home-manager/xdg.cacheFile.<name>.source | Path of the source file or directory
|
| options/home-manager/xdg.stateFile.<name>.source | Path of the source file or directory
|
| options/home-manager/xdg.configFile.<name>.force | Whether the target path should be unconditionally replaced
by the managed file source
|
| options/home-manager/programs.rclone.remotes.<name>.mounts.<name>.enable | Whether to enable this mount.
|
| options/nixos/containers.<name>.extraVeths.<name>.hostAddress | The IPv4 address assigned to the host interface.
(Not used when hostBridge is set.)
|
| options/nixos/ec2.zfs.datasets.<name>.mount | Where to mount this dataset.
|
| options/nixos/services.legit.settings.server.name | Server name.
|
| options/home-manager/xsession.pointerCursor.name | Alias of home.pointerCursor.name.
|
| options/nixos/services.i2pd.inTunnels.<name>.port | Bind port for ‹name› endpoint.
|
| options/nixos/nix.registry.<name>.from | The flake reference to be rewritten
|
| options/nixos/power.ups.users.<name>.upsmon | Add the necessary actions for a upsmon process to work
|
| options/home-manager/programs.rclone.remotes.<name>.mounts.<name>.autoMount | Whether to enable automatic mounting.
|
| options/darwin/users.groups.<name>.members | The group's members.
|
| options/nixos/services.geth.<name>.port | Port number Go Ethereum will be listening on, both TCP and UDP.
|
| options/nixos/systemd.paths.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/containers.<name>.extraVeths.<name>.hostAddress6 | The IPv6 address assigned to the host interface.
(Not used when hostBridge is set.)
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockPathName | This optional key implies SockFamily is set to "Unix"
|
| options/nixos/users.users.<name>.createHome | Whether to create the home directory and ensure ownership as well as
permissions to match the user.
|
| options/nixos/services.cgit.<name>.group | Group to run the cgit service as.
|
| options/darwin/users.users.<name>.description | A short description of the user account, typically the
user's full name
|
| options/nixos/services.invoiceplane.sites.<name>.database.name | Database name.
|
| options/nixos/services.factorio.game-name | Name of the game as it will appear in the game listing.
|
| options/nixos/services.i2pd.outTunnels.<name>.port | Bind port for ‹name› endpoint.
|
| options/home-manager/programs.vscode.nameShort | Override for package "short name", used for generating configuration
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels.<name>.nearPattern | Name for where mail coming from the remote (far) mail server will end up
locally
|
| options/nixos/services.corosync.nodelist.*.name | Node name
|
| options/nixos/services.firezone.server.provision.accounts.<name>.name | The account name
|
| options/nixos/services.dolibarr.database.name | Database name.
|
| options/nixos/services.castopod.database.name | Database name.
|
| options/nixos/services.agorakit.database.name | Database name.
|
| options/nixos/services.mastodon.database.name | Database name.
|
| options/nixos/services.peertube.database.name | Database name.
|
| options/nixos/services.pixelfed.database.name | Database name.
|
| options/nixos/services.windmill.database.name | Database name.
|
| options/nixos/services.zabbixServer.database.name | Database name.
|
| options/nixos/services.journalbeat.name | Name of the beat
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockPathMode | This optional key specifies the mode of the socket
|
| options/nixos/services.cgit.<name>.scanPath | A path which will be scanned for repositories.
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockFamily | This optional key can be used to specifically request that "IPv4" or "IPv6" socket(s) be created.
|
| options/nixos/services.dawarich.database.name | The name of the dawarich database.
|
| options/nixos/services.cloudlog.database.name | MySQL database name.
|
| options/nixos/services.freshrss.database.name | Database name for FreshRSS.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels.<name>.extraConfig | Extra configuration lines to add to THIS channel's
configuration.
|
| options/nixos/services.wyoming.satellite.name | Name of the satellite.
|
| options/home-manager/xdg.cacheFile.<name>.onChange | Shell commands to run when file has changed between
generations
|
| options/home-manager/xdg.stateFile.<name>.onChange | Shell commands to run when file has changed between
generations
|
| options/nixos/services.nylon.<name>.port | What port to listen for client requests, default is 1080.
|
| options/nixos/services.bacula-sd.device.<name>.archiveDevice | The specified name-string gives the system file name of the storage
device managed by this storage daemon
|
| options/nixos/systemd.slices.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/systemd.timers.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/services.h2o.hosts.<name>.tls | TLS options for virtual host
|
| options/nixos/systemd.timers.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/systemd.slices.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/services.buildkite-agents.<name>.hooksPath | Path to the directory storing the hooks
|
| options/darwin/services.buildkite-agents.<name>.hooksPath | Path to the directory storing the hooks
|
| options/nixos/users.users.<name>.subGidRanges | Subordinate group ids that user is allowed to use
|
| options/nixos/users.users.<name>.subUidRanges | Subordinate user ids that user is allowed to use
|
| options/nixos/programs.tsmClient.servers.<name>.nodename | Target node name on the IBM TSM server.
|
| options/nixos/services.geth.<name>.http.apis | APIs to enable over WebSocket
|
| options/nixos/services.cgit.<name>.repos | cgit repository settings, see cgitrc(5)
|
| options/nixos/services.tahoe.nodes.<name>.nickname | The nickname of this Tahoe node.
|
| options/home-manager/programs.rclone.remotes.<name>.mounts.<name>.mountPoint | A local file path specifying the location of the mount point.
|
| options/nixos/services.opengfw.rules.*.modifier.name | Name of the modifier.
|
| options/nixos/boot.initrd.luks.devices.<name>.header | The name of the file or block device that
should be used as header for the encrypted device.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.Bonjour | This optional key can be used to request that the service be registered with the
mDNSResponder(8)
|
| options/nixos/virtualisation.interfaces.<name>.name | Interface name
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.ssid | SSID to be used in IEEE 802.11 management frames.
|
| options/darwin/users.users.<name>.shell | The user's shell
|
| options/nixos/boot.initrd.luks.devices.<name>.keyFile | The name of the file (can be a raw device or a partition) that
should be used as the decryption key for the encrypted device
|
| options/nixos/systemd.paths.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/security.acme.certs.<name>.s3Bucket | S3 bucket name to use for HTTP-01 based challenges
|
| options/home-manager/xdg.desktopEntries.<name>.genericName | Generic name of the application.
|
| options/nixos/services.github-runners.<name>.replace | Replace any existing runner with the same name
|
| options/darwin/services.github-runners.<name>.replace | Replace any existing runner with the same name
|
| options/nixos/fileSystems.<name>.label | Label of the device
|
| options/nixos/virtualisation.allInterfaces.<name>.name | Interface name
|
| options/nixos/services.nsd.zones.<name>.requestXFR | Format: [AXFR|UDP] <ip-address> <key-name | NOKEY>
|
| options/nixos/services.openafsClient.cellServDB.<name>.*.dnsname | DNS full-qualified domain name of a database server
|
| options/nixos/services.openafsServer.cellServDB.<name>.*.dnsname | DNS full-qualified domain name of a database server
|
| options/darwin/launchd.agents.<name>.path | Packages added to the service's PATH
environment variable
|
| options/home-manager/xdg.configFile.<name>.source | Path of the source file or directory
|
| options/nixos/services.cgit.<name>.enable | Whether to enable cgit.
|
| options/nixos/users.groups.<name>.members | The user names of the group members, added to the
/etc/group file.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.corePlugins.*.name | The plugin.
|
| options/nixos/systemd.user.paths.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/services.nginx.virtualHosts.<name>.serverName | Name of this virtual host
|
| options/nixos/systemd.paths.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.units.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.user.paths.<name>.wants | Start the specified units when this unit is started.
|
| options/darwin/programs.ssh.knownHosts.<name>.hostNames | The set of system-wide known SSH hosts
|
| options/nixos/services.anuko-time-tracker.database.name | Database name.
|
| options/nixos/services.hans.clients | Each attribute of this option defines a systemd service that
runs hans
|
| options/nixos/services.h2o.hosts.<name>.acme | ACME options for virtual host.
|
| options/nixos/services.h2o.hosts.<name>.http | HTTP options for virtual host
|
| options/nixos/systemd.timers.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/systemd.paths.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.slices.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/hardware.alsa.controls.<name>.card | Name of the PCM card to control (slave).
|
| options/nixos/services.nntp-proxy.users.<name>.username | Username
|
| options/nixos/users.extraUsers.<name>.shell | The path to the user's shell
|
| options/nixos/users.users.<name>.autoSubUidGidRange | Automatically allocate subordinate user and group ids for this user
|
| options/nixos/power.ups.users.<name>.actions | Allow the user to do certain things with upsd
|
| options/nixos/services.geth.<name>.gcmode | Blockchain garbage collection mode.
|
| options/nixos/services.uhub.<name>.enable | Whether to enable hub instance.
|
| options/nixos/services.geth.<name>.http.port | Port number of Go Ethereum HTTP API.
|
| options/nixos/services.i2pd.inTunnels.<name>.enable | Whether to enable ‹name›.
|
| options/nixos/services.nix-store-gcs-proxy.<name>.bucketName | Name of Google storage bucket
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.group | Members of this group can access the control socket for this interface.
|
| options/nixos/services.k3s.manifests.<name>.target | Name of the symlink (relative to /var/lib/rancher/k3s/server/manifests)
|
| options/nixos/users.extraUsers.<name>.enable | If set to false, the user account will not be created
|
| options/home-manager/xdg.desktopEntries.<name>.type | The type of the desktop entry.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.Bonjour | This optional key can be used to request that the service be registered with the
mDNSResponder(8)
|
| options/nixos/users.users.<name>.subUidRanges.*.count | Count of subordinate user ids
|
| options/nixos/users.users.<name>.subGidRanges.*.count | Count of subordinate group ids
|
| options/nixos/containers.<name>.extraVeths.<name>.forwardPorts.*.hostPort | Source port of the external interface on host
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels.<name>.patterns | Instead of synchronizing just the mailboxes that
match the farPattern, use it as a prefix which is
not matched against the patterns, and is not affected by mailbox list
overrides.
|
| options/home-manager/services.kanshi.settings.*.profile.name | Profile name
|
| options/nixos/services.ndppd.proxies.<name>.rules.<name>.interface | Interface to use when method is iface.
|
| options/home-manager/programs.irssi.networks.<name>.channels.<name>.autoJoin | Whether to join this channel on connect.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.utf8Ssid | Whether the SSID is to be interpreted using UTF-8 encoding.
|
| options/nixos/systemd.units.<name>.aliases | Aliases of that unit.
|
| options/nixos/systemd.paths.<name>.aliases | Aliases of that unit.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.Bonjour | This optional key can be used to request that the service be registered with the
mDNSResponder(8)
|
| options/nixos/services.geth.<name>.enable | Whether to enable Go Ethereum Node.
|
| options/nixos/services.geth.<name>.extraArgs | Additional arguments passed to Go Ethereum.
|
| options/nixos/services.bookstack.database.name | Database name.
|
| options/nixos/services.mediawiki.database.name | Database name.
|
| options/nixos/users.extraUsers.<name>.pamMount | Attributes for user's entry in
pam_mount.conf.xml
|
| options/nixos/services.rke2.manifests.<name>.target | Name of the symlink (relative to /var/lib/rancher/rke2/server/manifests)
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockServiceName | This optional key specifies the service on the node to connect(2) or bind(2) to.
|
| options/nixos/services.i2pd.outTunnels.<name>.enable | Whether to enable ‹name›.
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockPassive | This optional key specifies whether listen(2) or connect(2) should be called on the created file
descriptor
|
| options/nixos/containers.<name>.extraVeths.<name>.forwardPorts | List of forwarded ports from host to container
|
| options/nixos/services.cgit.<name>.nginx.virtualHost | VirtualHost to serve cgit on, defaults to the attribute name.
|
| options/nixos/services.rauc.slots.<name>.*.type | The type of the device.
|
| options/home-manager/programs.alot.tags.<name>.focus | How to display the tag when focused.
|
| options/home-manager/xdg.desktopEntries.<name>.exec | Program to execute, possibly with arguments.
|
| options/nixos/services.discourse.database.name | Discourse database name.
|
| options/nixos/containers.<name>.extraVeths.<name>.localAddress | The IPv4 address assigned to the interface in the container
|
| options/nixos/users.extraUsers.<name>.extraGroups | The user's auxiliary groups.
|
| options/nixos/services.prometheus.remoteRead.*.name | Name of the remote read config, which if specified must be unique among remote read configs
|
| options/nixos/systemd.user.paths.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/home-manager/xdg.configFile.<name>.onChange | Shell commands to run when file has changed between
generations
|
| options/nixos/services.pgbackrest.stanzas.<name>.jobs.<name>.type | Backup type as described in:
https://pgbackrest.org/command.html#command-backup/category-command/option-type
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels.<name>.farPattern | IMAP4 patterns for which mailboxes on the remote mail server to sync
|
| options/nixos/services.mysql.initialDatabases.*.name | The name of the database to create.
|
| options/nixos/security.acme.certs.<name>.csr | Path to a certificate signing request to apply when fetching the certificate.
|
| options/nixos/users.extraUsers.<name>.cryptHomeLuks | Path to encrypted luks device that contains
the user's home directory.
|
| options/nixos/containers.<name>.extraVeths.<name>.localAddress6 | The IPv6 address assigned to the interface in the container
|
| options/nixos/services.ndppd.proxies.<name>.rules.<name>.method | static: Immediately answer any Neighbor Solicitation Messages
(if they match the IP rule).
iface: Forward the Neighbor Solicitation Message through the specified
interface and only respond if a matching Neighbor Advertisement
Message is received.
auto: Same as iface, but instead of manually specifying the outgoing
interface, check for a matching route in /proc/net/ipv6_route.
|
| options/nixos/fileSystems.<name>.mountPoint | Location where the file system will be mounted
|
| options/nixos/systemd.slices.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.timers.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/services.uhub.<name>.enableTLS | Whether to enable TLS support.
|
| options/darwin/system.activationScripts.<name>.target | Name of symlink
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.bcg.rename | Rename nodes to different name.
|
| options/nixos/services.tts.servers.<name>.model | Name of the model to download and use for speech synthesis
|
| options/nixos/services.quicktun.<name>.privateKey | Local secret key in hexadecimal form.
This option is deprecated
|
| options/home-manager/qt.style.name | Style to use for Qt5/Qt6 applications
|
| options/nixos/nix.registry.<name>.exact | Whether the from reference needs to match exactly
|
| options/darwin/nix.registry.<name>.exact | Whether the from reference needs to match exactly
|
| options/home-manager/nix.registry.<name>.exact | Whether the from reference needs to match exactly
|
| options/darwin/launchd.agents.<name>.script | Shell commands executed as the service's main process.
|
| options/home-manager/xdg.desktopEntries.<name>.icon | Icon to display in file manager, menus, etc.
|
| options/home-manager/programs.fish.binds.<name>.mode | Specify the bind mode that the bind is used in
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockNodeName | This optional key specifies the node to connect(2) or bind(2) to.
|
| options/home-manager/programs.hexchat.channels.<name>.realName | Real name
|
| options/nixos/systemd.timers.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/systemd.slices.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/systemd.units.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.paths.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.targets.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/systemd.sockets.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.dpi | Output DPI configuration.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.dpi | Output DPI configuration.
|
| options/nixos/systemd.sockets.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/systemd.targets.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/services.writefreely.admin.name | The name of the first admin user.
|
| options/nixos/services.prometheus.remoteWrite.*.name | Name of the remote write config, which if specified must be unique among remote write configs
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockProtocol | This optional key specifies the protocol to be passed to socket(2)
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| options/nixos/systemd.user.paths.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.user.units.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/users.extraUsers.<name>.createHome | Whether to create the home directory and ensure ownership as well as
permissions to match the user.
|
| options/nixos/services.nsd.zones.<name>.allowNotify | Listed primary servers are allowed to notify this secondary server
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.mode | Output resolution.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.rate | Output framerate.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.mode | Output resolution.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.rate | Output framerate.
|
| options/nixos/services.postgresql.ensureUsers.*.name | Name of the user to ensure.
|
| options/darwin/services.postgresql.ensureUsers.*.name | Name of the user to ensure.
|
| options/nixos/systemd.user.timers.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/systemd.user.slices.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/systemd.user.timers.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/systemd.user.slices.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/hardware.alsa.cardAliases.<name>.driver | Name of the kernel module that provides the card.
|
| options/nixos/hardware.sane.brscan4.netDevices.<name>.nodename | The node name of the device
|
| options/nixos/hardware.sane.brscan5.netDevices.<name>.nodename | The node name of the device
|
| options/home-manager/programs.borgmatic.backups.<name>.consistency.checks.*.name | Name of consistency check to run.
|
| options/nixos/services.hylafax.modems.<name>.type | Name of modem configuration file,
will be searched for in config
in the spooling area directory.
|
| options/nixos/services.h2o.hosts.<name>.host | Set the host address for this virtual host
|
| options/nixos/users.users.<name>.packages | The set of packages that should be made available to the user
|
| options/darwin/users.users.<name>.packages | The set of packages that should be made availabe to the user
|
| options/nixos/image.repart.partitions.<name>.contents.<name>.source | Path of the source file.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.index | Adds index directive.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/security.acme.certs.<name>.csrKey | Path to the private key to the matching certificate signing request.
|
| options/nixos/systemd.timers.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.slices.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/home-manager/launchd.agents.<name>.config | Define a launchd job
|
| options/home-manager/services.podman.images.<name>.username | Username used to connect to registry.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockPathName | This optional key implies SockFamily is set to "Unix"
|
| options/nixos/services.firezone.headless-client.name | The name of this client as shown in firezone
|
| options/home-manager/programs.superfile.pinnedFolders.*.name | Name that will be shown.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.crtc | Output video display controller.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.crtc | Output video display controller.
|
| options/nixos/users.users.<name>.useDefaultShell | If true, the user's shell will be set to
users.defaultUserShell.
|
| options/nixos/services.pretix.settings.database.name | Database name.
|
| options/nixos/fileSystems.<name>.autoFormat | If the device does not currently contain a filesystem (as
determined by blkid), then automatically
format it with the filesystem type specified in
fsType
|
| options/nixos/services.i2pd.inTunnels.<name>.address | Bind address for ‹name› endpoint.
|
| options/home-manager/accounts.email.accounts.<name>.realName | Name displayed when sending mails.
|
| options/nixos/services.cgit.<name>.package | The cgit package to use.
|
| options/nixos/services.geth.<name>.package | The geth package to use.
|
| options/nixos/services.uhub.<name>.plugins | Uhub plugin configuration.
|
| options/nixos/systemd.user.paths.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/darwin/launchd.daemons.<name>.path | Packages added to the service's PATH
environment variable
|
| options/nixos/services.nylon.<name>.enable | Enables nylon as a running service upon activation.
|
| options/darwin/environment.launchAgents.<name>.target | Name of symlink
|
| options/nixos/services.httpd.virtualHosts.<name>.locations.<name>.index | Adds DirectoryIndex directive
|
| options/nixos/services.httpd.virtualHosts.<name>.locations.<name>.alias | Alias directory for requests
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.logLevel | Levels (minimum value for logged events):
0 = verbose debugging
1 = debugging
2 = informational messages
3 = notification
4 = warning
|
| options/nixos/systemd.timers.<name>.aliases | Aliases of that unit.
|
| options/nixos/systemd.slices.<name>.aliases | Aliases of that unit.
|
| options/nixos/services.iodine.clients | Each attribute of this option defines a systemd service that
runs iodine
|
| options/nixos/services.nginx.upstreams.<name>.servers.<name>.backup | Marks the server as a backup server
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.tryFiles | Adds try_files directive.
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites.<name>.url | Start URL of the site.
|
| options/nixos/security.acme.certs.<name>.group | Group running the ACME client.
|
| options/home-manager/programs.fish.binds.<name>.erase | Whether to enable remove bind.
|
| options/nixos/systemd.targets.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/systemd.sockets.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/systemd.paths.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/services.h2o.hosts.<name>.tls.port | Override the default TLS port for this virtual host.
|
| options/nixos/services.tinc.networks.<name>.hostSettings | The name of the host in the network as well as the configuration for that host
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.apIsolate | Isolate traffic between stations (clients) and prevent them from
communicating with each other.
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters.*.name | Name for the filter.
|
| options/nixos/hardware.alsa.controls.<name>.device | Name of the PCM device to control (slave).
|
| options/nixos/services.nginx.proxyCachePath.<name>.keysZoneName | Set name to shared memory zone.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockPathMode | This optional key specifies the mode of the socket
|
| options/nixos/users.extraUsers.<name>.subUidRanges | Subordinate user ids that user is allowed to use
|
| options/nixos/users.extraUsers.<name>.subGidRanges | Subordinate group ids that user is allowed to use
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockNodeName | This optional key specifies the node to connect(2) or bind(2) to.
|
| options/darwin/launchd.user.agents.<name>.path | Packages added to the service's PATH
environment variable
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockFamily | This optional key can be used to specifically request that "IPv4" or "IPv6" socket(s) be created.
|
| options/nixos/services.i2pd.outTunnels.<name>.address | Bind address for ‹name› endpoint.
|
| options/nixos/users.users.<name>.subUidRanges.*.startUid | Start of the range of subordinate user ids that user is
allowed to use.
|
| options/nixos/users.users.<name>.subGidRanges.*.startGid | Start of the range of subordinate group ids that user is
allowed to use.
|
| options/home-manager/accounts.email.accounts.<name>.notmuch.neomutt.virtualMailboxes.*.name | Name to display
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.gamma | Output gamma configuration.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.gamma | Output gamma configuration.
|
| options/nixos/systemd.targets.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.sockets.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockNodeName | This optional key specifies the node to connect(2) or bind(2) to.
|
| options/nixos/services.filesender.database.name | Database name.
|
| options/nixos/services.limesurvey.database.name | Database name.
|
| options/nixos/services.zoneminder.database.name | Name of database.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.macDeny | Specifies the MAC addresses to deny if macAcl is set to "deny" or "radius"
|
| options/nixos/boot.initrd.extraFiles.<name>.source | The object to make available inside the initrd.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| options/nixos/systemd.user.paths.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.user.slices.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/systemd.user.timers.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/services.bitcoind.<name>.rpc.users.<name>.passwordHMAC | Password HMAC-SHA-256 for JSON-RPC connections
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.module | Optional PKCS#11 module name.
|
| options/nixos/services.nsd.zones.<name>.data | The actual zone data
|
| options/nixos/systemd.user.timers.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.user.slices.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/services.cntlm.username | Proxy account name, without the possibility to include domain name ('at' sign is interpreted literally).
|
| options/nixos/boot.initrd.systemd.users.<name>.uid | ID of the user in initrd.
|
| options/home-manager/xdg.desktopEntries.<name>.mimeType | The MIME type(s) supported by this application.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| options/nixos/systemd.paths.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.paths.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/services.szurubooru.database.name | Name of the PostgreSQL database.
|
| options/nixos/services.linkwarden.database.name | The name of the Linkwarden database.
|
| options/nixos/services.nsd.zones.<name>.dnssec | Whether to enable DNSSEC.
|
| options/nixos/fileSystems.<name>.autoResize | If set, the filesystem is grown to its maximum size before
being mounted. (This is typically the size of the containing
partition.) This is currently only supported for ext2/3/4
filesystems that are mounted during early boot.
|
| options/nixos/fileSystems.<name>.encrypted.label | Label of the unlocked encrypted device
|
| options/nixos/services.akkoma.config.":pleroma".":instance".name | Instance name.
|
| options/nixos/services.mattermost.database.name | Local Mattermost database name.
|
| options/nixos/services.keycloak.database.name | Database name to use when connecting to an external or
manually provisioned database; has no effect when a local
database is automatically provisioned
|
| options/nixos/systemd.user.units.<name>.aliases | Aliases of that unit.
|
| options/nixos/systemd.user.paths.<name>.aliases | Aliases of that unit.
|
| options/nixos/users.extraGroups.<name>.members | The user names of the group members, added to the
/etc/group file.
|
| options/nixos/services.postfix.masterConfig.<name>.command | A program name specifying a Postfix service/daemon process
|
| options/nixos/services.bind.zones.<name>.file | Zone file resource records contain columns of data, separated by whitespace, that define the record.
|
| options/nixos/systemd.paths.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/systemd.paths.<name>.pathConfig | Each attribute in this set specifies an option in the
[Path] section of the unit
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockPathName | This optional key implies SockFamily is set to "Unix"
|
| options/nixos/services.quicktun.<name>.publicKey | Remote public key in hexadecimal form.
Not needed when services.quicktun..protocol is set to raw.
|
| options/home-manager/programs.alot.tags.<name>.normal | How to display the tag when unfocused
|
| options/home-manager/programs.fish.binds.<name>.setsMode | Change current mode after bind is executed
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/home-manager/programs.rclone.remotes.<name>.mounts.<name>.options | An attribute set of option values passed to rclone mount
|
| options/nixos/hardware.printers.ensurePrinters.*.name | Name of the printer / printer queue
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SecureSocketWithKey | This optional key is a variant of SockPathName
|
| options/nixos/networking.vlans.<name>.id | The vlan identifier
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.module | Optional PKCS#11 module name.
|
| options/nixos/power.ups.ups.<name>.maxStartDelay | This can be set as a global variable above your first UPS
definition and it can also be set in a UPS section
|
| options/nixos/networking.sits.<name>.dev | The underlying network device on which the tunnel resides.
|
| options/darwin/launchd.agents.<name>.command | Command executed as the service's main process.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockPathName | This optional key implies SockFamily is set to "Unix"
|
| options/darwin/environment.userLaunchAgents.<name>.target | Name of symlink
|
| options/nixos/systemd.slices.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.timers.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/boot.initrd.luks.devices.<name>.preLVM | Whether the luksOpen will be attempted before LVM scan or after it.
|
| options/nixos/services.h2o.hosts.<name>.http.port | Override the default HTTP port for this virtual host.
|
| options/nixos/services.httpd.virtualHosts.<name>.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/nixos/environment.etc.<name>.user | User name of file owner
|
| options/nixos/services.homebridge.uiSettings.name | Name of the homebridge UI platform
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.macAllow | Specifies the MAC addresses to allow if macAcl is set to "allow" or "radius"
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.scale.y | Vertical scaling factor/pixels.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.scale.x | Horizontal scaling factor/pixels.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.scale.x | Horizontal scaling factor/pixels.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.scale.y | Vertical scaling factor/pixels.
|
| options/nixos/services.pretalx.settings.database.name | Database name.
|
| options/nixos/services.znapzend.zetup.<name>.destinations.<name>.label | Label for this destination
|
| options/nixos/users.extraUsers.<name>.autoSubUidGidRange | Automatically allocate subordinate user and group ids for this user
|
| options/nixos/services.geth.<name>.http.enable | Whether to enable Go Ethereum HTTP API.
|
| options/nixos/power.ups.upsmon.monitor.<name>.type | The relationship with upsd
|
| options/nixos/services.geth.<name>.network | The network to connect to
|
| options/nixos/services.epgstation.database.name | Name of the MySQL database that holds EPGStation's data.
|
| options/nixos/services.metricbeat.settings.name | Name of the beat
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.enable | Whether to enable the output.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.rotate | Output rotate configuration.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.enable | Whether to enable the output.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.rotate | Output rotate configuration.
|
| options/nixos/users.users.<name>.expires | Set the date on which the user's account will no longer be
accessible
|
| options/darwin/environment.launchDaemons.<name>.target | Name of symlink
|
| options/home-manager/programs.floorp.profiles.<name>.containers.<name>.icon | Container icon.
|
| options/nixos/networking.sits.<name>.ttl | The time-to-live of the connection to the remote tunnel endpoint.
|
| options/darwin/launchd.daemons.<name>.script | Shell commands executed as the service's main process.
|
| options/nixos/users.extraUsers.<name>.subGidRanges.*.count | Count of subordinate group ids
|
| options/nixos/users.extraUsers.<name>.subUidRanges.*.count | Count of subordinate user ids
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockPathMode | This optional key specifies the mode of the socket
|
| options/nixos/services.grafana.settings.database.name | The name of the Grafana database.
|
| options/nixos/programs.tsmClient.servers.<name>.servername | Local name of the IBM TSM server,
must not contain space or more than 64 chars.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockFamily | This optional key can be used to specifically request that "IPv4" or "IPv6" socket(s) be created.
|
| options/home-manager/accounts.email.accounts.<name>.userName | The server username of this account
|
| options/nixos/services.bacula-sd.director.<name>.tls.verifyPeer | Verify peer certificate
|
| options/nixos/services.bacula-fd.director.<name>.tls.verifyPeer | Verify peer certificate
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.extraFiles.<name>.text | Text of the file.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.hotkeys.<name>.*.key | The hotkey.
|
| options/nixos/services.cgit.<name>.extraConfig | These lines go to the end of cgitrc verbatim.
|
| options/nixos/systemd.services.<name>.preStop | Shell commands executed to stop the service.
|
| options/nixos/systemd.sockets.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/systemd.targets.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockPathMode | This optional key specifies the mode of the socket
|
| options/nixos/containers.<name>.extraVeths.<name>.forwardPorts.*.protocol | The protocol specifier for port forwarding between host and container
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockFamily | This optional key can be used to specifically request that "IPv4" or "IPv6" socket(s) be created.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.filter | Interpolation method to be used for scaling the output.
|
| options/home-manager/programs.floorp.profiles.<name>.containers.<name>.id | Container ID
|
| options/nixos/services.rauc.slots.<name>.*.device | The device to update.
|
| options/nixos/services.nylon.<name>.logging | Enable logging, default is no logging.
|
| options/nixos/services.borgbackup.jobs.<name>.archiveBaseName | How to name the created archives
|
| options/darwin/launchd.user.agents.<name>.script | Shell commands executed as the service's main process.
|
| options/nixos/systemd.user.units.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.user.paths.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.user.timers.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/systemd.user.slices.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/services.ax25.axports.<name>.tty | Location of hardware kiss tnc for this interface.
|
| options/nixos/systemd.user.sockets.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/systemd.user.targets.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/power.ups.upsmon.monitor.<name>.user | Username from upsd.users for accessing this UPS
|
| options/nixos/systemd.user.targets.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/systemd.user.sockets.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| packages/nixpkgs/nth | Module and CLI for the identification of hashes |
| options/nixos/services.awstats.configs.<name>.domain | The domain name to collect stats for.
|
| options/nixos/systemd.services.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/services.pppd.peers.<name>.enable | Whether to enable this PPP peer.
|
| options/nixos/services.tts.servers.<name>.port | Port to bind the TTS server to.
|
| options/nixos/services.phpfpm.pools.<name>.user | User account under which this pool runs.
|
| options/home-manager/programs.fish.binds.<name>.silent | Whether to enable Operate silently.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.module | Optional PKCS#11 module name.
|
| options/nixos/systemd.timers.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/systemd.slices.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/systemd.services.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/systemd.sockets.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.targets.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.settings | Configuration for this host
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockServiceName | This optional key specifies the service on the node to connect(2) or bind(2) to.
|
| options/home-manager/programs.floorp.profiles.<name>.containers.<name>.color | Container color.
|
| options/nixos/systemd.user.targets.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.user.sockets.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/users.users.<name>.isNormalUser | Indicates whether this is an account for a “real” user
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockPassive | This optional key specifies whether listen(2) or connect(2) should be called on the created file
descriptor
|
| options/nixos/environment.etc.<name>.group | Group name of file owner
|
| options/nixos/systemd.services.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/services.drupal.sites.<name>.virtualHost.locations.<name>.index | Adds DirectoryIndex directive
|
| options/nixos/services.drupal.sites.<name>.virtualHost.locations.<name>.alias | Alias directory for requests
|
| options/darwin/programs.vim.vimOptions.<name>.text | Text of the file.
|
| options/nixos/services.bind.zones.<name>.master | Master=false means slave server
|
| options/nixos/services.bind.zones.<name>.slaves | Addresses who may request zone transfers.
|
| options/nixos/services.nsd.zones.<name>.minRetrySecs | Limit retry time for secondary zones.
|
| options/nixos/services.rauc.slots.<name>.*.enable | Whether to enable this RAUC slot.
|
| options/nixos/users.users.<name>.isSystemUser | Indicates if the user is a system user or not
|
| options/home-manager/launchd.agents.<name>.config.Nice | This optional key specifies what nice(3) value should be applied to the daemon.
|
| options/nixos/systemd.user.timers.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.user.slices.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/services.nsd.keys.<name>.keyFile | Path to the file which contains the actual base64 encoded
key
|
| options/nixos/systemd.sockets.<name>.aliases | Aliases of that unit.
|
| options/nixos/systemd.targets.<name>.aliases | Aliases of that unit.
|
| options/nixos/users.users.<name>.description | A short description of the user account, typically the
user's full name
|
| options/nixos/containers.<name>.path | As an alternative to specifying
config, you can specify the path to
the evaluated NixOS system configuration, typically a
symlink to a system profile.
|
| options/nixos/services.ax25.axports.<name>.baud | The serial port speed of this interface.
|
| options/nixos/networking.ipips.<name>.dev | The underlying network device on which the tunnel resides.
|
| options/nixos/boot.initrd.systemd.groups.<name>.gid | ID of the group in initrd.
|
| options/nixos/systemd.slices.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/systemd.slices.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.timers.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.timers.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/home-manager/programs.firefox.profiles.<name>.containers.<name>.icon | Container icon.
|
| options/nixos/services.httpd.virtualHosts.<name>.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/home-manager/fonts.fontconfig.configFile.<name>.label | Label to use for the name of the config file.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.user | Specifies the user to log in as.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.primary | Whether output should be marked as primary
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.primary | Whether output should be marked as primary
|
| options/nixos/services.phpfpm.pools.<name>.phpEnv | Environment variables used for this PHP-FPM pool.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.slot | Optional slot number of the token that stores the certificate.
|
| options/nixos/services.fedimintd.<name>.nginx.config.serverName | Name of this virtual host
|
| options/nixos/services.bitcoind.<name>.user | The user as which to run bitcoind.
|
| options/nixos/services.geth.<name>.syncmode | Blockchain sync mode.
|
| options/nixos/services.geth.<name>.maxpeers | Maximum peers to connect to.
|
| options/nixos/services.i2pd.inTunnels.<name>.type | Tunnel type.
|
| options/nixos/systemd.user.slices.<name>.aliases | Aliases of that unit.
|
| options/nixos/systemd.user.timers.<name>.aliases | Aliases of that unit.
|
| options/nixos/security.acme.certs.<name>.keyType | Key type to use for private keys
|
| options/nixos/networking.ipips.<name>.ttl | The time-to-live of the connection to the remote tunnel endpoint.
|
| options/nixos/systemd.nspawn.<name>.execConfig | Each attribute in this set specifies an option in the
[Exec] section of this unit
|
| options/nixos/systemd.timers.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/systemd.slices.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/fileSystems.<name>.stratis.poolUuid | UUID of the stratis pool that the fs is located in
This is only relevant if you are using stratis.
|
| options/nixos/systemd.user.targets.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/systemd.user.sockets.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/systemd.user.paths.<name>.upholds | Keeps the specified running while this unit is running
|
| options/home-manager/programs.firefox.profiles.<name>.containers.<name>.id | Container ID
|
| options/nixos/services.znapzend.zetup.<name>.destinations.<name>.dataset | Dataset name to send snapshots to.
|
| options/nixos/services.netbird.tunnels.<name>.user.group | A system group name for this client instance.
|
| options/nixos/services.netbird.clients.<name>.user.group | A system group name for this client instance.
|
| options/nixos/services.redis.servers.<name>.logfile | Specify the log file name
|
| options/nixos/services.h2o.hosts.<name>.acme.root | Directory for the ACME challenge, which is public
|
| options/nixos/services.openafsServer.roles.backup.cellServDB.<name>.*.dnsname | DNS full-qualified domain name of a database server
|
| options/nixos/containers.<name>.config | A specification of the desired configuration of this
container, as a NixOS module.
|
| options/nixos/containers.<name>.autoStart | Whether the container is automatically started at boot-time.
|
| options/nixos/users.extraUsers.<name>.packages | The set of packages that should be made available to the user
|
| options/nixos/systemd.services.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockProtocol | This optional key specifies the protocol to be passed to socket(2)
|
| options/nixos/services.netbird.tunnels.<name>.dir.baseName | A systemd service name to use (without .service suffix).
|
| options/nixos/services.netbird.clients.<name>.dir.baseName | A systemd service name to use (without .service suffix).
|
| options/nixos/security.acme.certs.<name>.postRun | Commands to run after new certificates go live
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.bssid | Specifies the BSSID for this BSS
|
| options/nixos/hardware.alsa.cardAliases.<name>.id | The ID of the sound card
|
| options/nixos/services.gitwatch.<name>.path | The path to repo in local machine
|
| options/home-manager/services.unison.pairs.<name>.roots | Pair of roots to synchronise.
|
| options/nixos/systemd.services.<name>.postStop | Shell commands executed after the service's main process
has exited.
|
| options/nixos/users.extraUsers.<name>.useDefaultShell | If true, the user's shell will be set to
users.defaultUserShell.
|
| options/home-manager/launchd.agents.<name>.config.Label | This required key uniquely identifies the job to launchd.
|
| options/home-manager/accounts.email.accounts.<name>.neomutt.mailboxName | Use a different name as mailbox name
|
| options/nixos/programs.ssh.knownHosts.<name>.hostNames | A list of host names and/or IP numbers used for accessing
the host's ssh service
|
| options/nixos/services.namecoind.rpc.user | User name for RPC connections.
|
| options/nixos/services.i2pd.outTunnels.<name>.type | Tunnel type.
|
| options/nixos/services.rspamd.locals.<name>.text | Text of the file.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockServiceName | This optional key specifies the service on the node to connect(2) or bind(2) to.
|
| options/home-manager/programs.firefox.profiles.<name>.containers.<name>.color | Container color.
|
| options/nixos/security.acme.certs.<name>.email | Email address for account creation and correspondence from the CA
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.extraConfig | Extra lines to append to this profile's config.
|
| options/nixos/security.acme.certs.<name>.validMinDays | Minimum remaining validity before renewal in days.
|
| options/nixos/boot.initrd.systemd.users.<name>.shell | The path to the user's shell in initrd.
|
| options/nixos/boot.initrd.systemd.users.<name>.group | Group the user belongs to in initrd.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.setEnv | Environment variables and their value to send to the server.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockPassive | This optional key specifies whether listen(2) or connect(2) should be called on the created file
descriptor
|
| options/nixos/systemd.user.paths.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.user.paths.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/services.writefreely.database.name | The name of the database to store data in.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.slot | Optional slot number of the token that stores the certificate.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.scale.method | Output scaling method.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.scale.method | Output scaling method.
|
| options/nixos/services.borgbackup.jobs.<name>.startAt | When or how often the backup should run
|
| options/home-manager/xdg.desktopEntries.<name>.comment | Tooltip for the entry.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockServiceName | This optional key specifies the service on the node to connect(2) or bind(2) to.
|
| options/nixos/services.bitcoind.<name>.port | Override the default port on which to listen for connections.
|
| options/nixos/services.i2pd.inTunnels.<name>.keys | Keyset used for tunnel identity.
|
| options/nixos/services.phpfpm.pools.<name>.group | Group account under which this pool runs.
|
| options/darwin/launchd.daemons.<name>.command | Command executed as the service's main process.
|
| options/nixos/systemd.services.<name>.path | Packages added to the service's PATH
environment variable
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockPassive | This optional key specifies whether listen(2) or connect(2) should be called on the created file
descriptor
|
| options/nixos/systemd.sockets.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.targets.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/services.h2o.hosts.<name>.tls.quic | Enables HTTP/3 over QUIC on the UDP port for TLS
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.extraFiles.<name>.source | Path of the source file or directory.
|
| options/nixos/services.netbird.clients.<name>.bin.suffix | A system group name for this client instance.
|
| options/nixos/services.netbird.tunnels.<name>.bin.suffix | A system group name for this client instance.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.file | Absolute path to the certificate to load
|
| options/nixos/systemd.user.paths.<name>.pathConfig | Each attribute in this set specifies an option in the
[Path] section of the unit
|
| options/nixos/systemd.user.paths.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/services.geth.<name>.metrics.port | Port number of Go Ethereum metrics service.
|
| options/nixos/services.geth.<name>.http.address | Listen address of Go Ethereum HTTP API.
|
| options/nixos/systemd.services.<name>.preStart | Shell commands executed before the service's main process
is started.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.port | Specifies port number to connect on remote host.
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.rsaPublicKey | Legacy RSA public key of the host in PEM format, including start and
end markers
|
| options/nixos/services.pppd.peers.<name>.config | pppd configuration for this peer, see the pppd(8) man page.
|
| options/nixos/users.extraUsers.<name>.subGidRanges.*.startGid | Start of the range of subordinate group ids that user is
allowed to use.
|
| options/nixos/users.extraUsers.<name>.subUidRanges.*.startUid | Start of the range of subordinate user ids that user is
allowed to use.
|
| options/home-manager/programs.fish.binds.<name>.enable | Whether to enable enable the bind
|
| options/nixos/containers.<name>.extraVeths.<name>.forwardPorts.*.containerPort | Target port of container
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.extraFiles.<name>.target | Path to target relative to the vault's directory.
|
| options/nixos/services.bitcoind.<name>.dataDir | The data directory for bitcoind.
|
| options/nixos/services.rsync.jobs.<name>.sources | Source directories.
|
| options/nixos/services.pgbackrest.stanzas.<name>.jobs.<name>.schedule | When or how often the backup should run
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.position | Output position
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.position | Output position
|
| options/nixos/services.thanos.query.grpc-client-server-name | Server name to verify the hostname on the returned gRPC certificates
|
| options/nixos/services.cgit.<name>.settings | cgit configuration, see cgitrc(5)
|
| options/nixos/services.uhub.<name>.settings | Configuration of uhub
|
| options/darwin/launchd.user.agents.<name>.command | Command executed as the service's main process.
|
| options/nixos/systemd.user.timers.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.user.slices.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.units.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.paths.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.user.services.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/networking.vswitches.<name>.interfaces.<name>.vlan | Vlan tag to apply to interface
|
| options/nixos/networking.vswitches.<name>.interfaces.<name>.type | Openvswitch type to assign to interface
|
| options/nixos/services.i2pd.outTunnels.<name>.keys | Keyset used for tunnel identity.
|
| options/nixos/networking.fooOverUDP.<name>.port | Local port of the encapsulation UDP socket.
|
| options/nixos/power.ups.ups.<name>.directives | List of configuration directives for this UPS.
|
| options/nixos/services.prosody.virtualHosts.<name>.domain | Domain name
|
| options/nixos/power.ups.users.<name>.passwordFile | The full path to a file that contains the user's (clear text)
password
|
| options/nixos/services.homebridge.settings.bridge.name | Name of the homebridge
|
| options/nixos/services.geth.<name>.authrpc.port | Port number of Go Ethereum Auth RPC API.
|
| options/nixos/services.tts.servers.<name>.useCuda | Whether to offload computation onto a CUDA compatible GPU.
|
| options/home-manager/services.podman.images.<name>.tag | FQIN of referenced Image when source is a file or directory archive.
|
| options/nixos/systemd.paths.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/home-manager/services.podman.machines.<name>.username | Username used in the machine image
|
| options/nixos/services.bitcoind.<name>.pidFile | Location of bitcoind pid file.
|
| options/nixos/containers.<name>.extraVeths | Extra veth-pairs to be created for the container.
|
| options/home-manager/programs.fish.binds.<name>.command | command that will be execute
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.index | Adds index directive.
|
| options/home-manager/programs.hexchat.channels.<name>.userName | User name
|
| options/nixos/boot.initrd.luks.devices.<name>.device | Path of the underlying encrypted block device.
|
| options/nixos/networking.sits.<name>.local | The address of the local endpoint which the remote
side should send packets to.
|
| options/nixos/services.k3s.autoDeployCharts.<name>.package | The packaged Helm chart
|
| options/nixos/services.nebula.networks.<name>.tun.device | Name of the tun device
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.bacula-sd.autochanger.<name>.changerDevice | The specified name-string must be the generic SCSI device name of the
autochanger that corresponds to the normal read/write Archive Device
specified in the Device resource
|
| options/nixos/security.wrappers.<name>.group | The group of the wrapper program.
|
| options/nixos/services.bitcoind.<name>.group | The group as which to run bitcoind.
|
| options/nixos/security.wrappers.<name>.owner | The owner of the wrapper program.
|
| options/darwin/programs.tmux.tmuxOptions.<name>.text | Text of the file.
|
| options/nixos/services.etebase-server.settings.database.name | The database name.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockProtocol | This optional key specifies the protocol to be passed to socket(2)
|
| options/nixos/systemd.user.services.<name>.preStop | Shell commands executed to stop the service.
|
| options/nixos/systemd.services.<name>.script | Shell commands executed as the service's main process.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.file | Absolute path to the certificate to load
|
| options/nixos/systemd.user.sockets.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/systemd.slices.<name>.sliceConfig | Each attribute in this set specifies an option in the
[Slice] section of the unit
|
| options/nixos/systemd.nspawn.<name>.filesConfig | Each attribute in this set specifies an option in the
[Files] section of this unit
|
| options/nixos/systemd.user.targets.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/services.webhook.hooks.<name>.id | The ID of your hook
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.macDenyFile | Specifies a file containing the MAC addresses to deny if macAcl is set to "deny" or "radius"
|
| options/home-manager/programs.hexchat.channels.<name>.nickname | Primary nickname.
|
| options/nixos/services.autosuspend.checks.<name>.class | Name of the class implementing the check
|
| options/nixos/environment.etc.<name>.text | Text of the file.
|
| options/darwin/environment.etc.<name>.text | Text of the file.
|
| options/nixos/power.ups.users.<name>.instcmds | Let the user initiate specific instant commands
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockProtocol | This optional key specifies the protocol to be passed to socket(2)
|
| options/nixos/programs.dms-shell.plugins.<name>.src | Source of the plugin package or path
|
| options/nixos/services.drupal.sites.<name>.filesDir | The location of the Drupal files directory.
|
| options/nixos/systemd.sockets.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/systemd.targets.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/services.postfix.settings.master.<name>.command | A program name specifying a Postfix service/daemon process
|
| options/nixos/systemd.services.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.slot | Optional slot number of the token that stores the certificate.
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.subnets | The subnets which this tinc daemon will serve
|
| options/nixos/services.rke2.autoDeployCharts.<name>.package | The packaged Helm chart
|
| options/nixos/boot.specialFileSystems.<name>.enable | Whether to enable the filesystem mount.
|
| options/nixos/services.nix-store-gcs-proxy.<name>.enable | Whether to enable proxy for this bucket
|
| options/nixos/containers.<name>.bindMounts | An extra list of directories that is bound to the container.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.pgbackrest.stanzas.<name>.instances.<name>.host | PostgreSQL host for operating remotely.
|
| options/nixos/systemd.services.<name>.postStart | Shell commands executed after the service's main process
is started.
|
| options/nixos/systemd.services.<name>.reload | Shell commands executed when the service's main process
is reloaded.
|
| options/nixos/services.i2pd.inTunnels.<name>.inPort | Service port
|
| options/home-manager/programs.ssh.matchBlocks.<name>.sendEnv | Environment variables to send from the local host to the
server.
|
| options/home-manager/services.podman.builds.<name>.file | Path to a Containerfile which contains instructions to build the image.
|
| options/nixos/services.i2pd.inTunnels.<name>.inbound.length | Guaranteed minimum hops for ‹name› tunnels.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.font | The font name, null to use system default.
|
| options/home-manager/programs.streamlink.plugins.<name>.src | Source of the custom plugin
|
| options/nixos/services.rsync.jobs.<name>.timerConfig | When to run the job.
|
| options/home-manager/services.podman.images.<name>.image | Image to pull.
|
| options/nixos/services.httpd.virtualHosts.<name>.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/systemd.paths.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/services.drupal.sites.<name>.stateDir | The location of the Drupal site state directory.
|
| options/nixos/systemd.user.services.<name>.wants | Start the specified units when this unit is started.
|
| options/home-manager/xdg.desktopEntries.<name>.actions | The set of actions made available to application launchers.
|
| options/home-manager/programs.fish.binds.<name>.operate | Operate on preset bindings or user bindings
|
| options/home-manager/programs.fish.binds.<name>.repaint | Whether to enable redraw prompt after command.
|
| options/home-manager/home.username | The user's username.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.handle | Hex-encoded CKA_ID or handle of the certificate on a token or TPM,
respectively
|
| options/home-manager/launchd.agents.<name>.config.Debug | This optional key specifies that launchd should adjust its log mask temporarily to LOG_DEBUG while
dealing with this job.
|
| options/nixos/services.ndppd.proxies.<name>.ttl | Controls how long a valid or invalid entry remains in the cache, in
milliseconds.
|
| options/nixos/systemd.user.slices.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/systemd.user.targets.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.user.services.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/systemd.user.sockets.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.user.timers.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/power.ups.ups.<name>.shutdownOrder | When you have multiple UPSes on your system, you usually need to
turn them off in a certain order. upsdrvctl shuts down all the
0s, then the 1s, 2s, and so on
|
| options/nixos/services.archisteamfarm.bots.<name>.username | Name of the user to log in
|
| options/home-manager/programs.claude-code.skills | Custom skills for Claude Code
|
| options/nixos/services.szurubooru.server.settings.name | Name shown in the website title and on the front page.
|
| options/nixos/users.extraUsers.<name>.expires | Set the date on which the user's account will no longer be
accessible
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.macAcl | Station MAC address -based authentication
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SecureSocketWithKey | This optional key is a variant of SockPathName
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels | List of channels that should be grouped together into this group
|
| options/nixos/security.pam.services.<name>.text | Contents of the PAM service file.
|
| options/home-manager/programs.smug.projects.<name>.env | Environment Variables to set in session.
|
| options/home-manager/programs.retroarch.cores.<name>.package | The ‹name› package to use.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/systemd.services.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.targets.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.targets.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/systemd.sockets.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.sockets.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/services.github-runners.<name>.runnerGroup | Name of the runner group to add this runner to (defaults to the default runner group)
|
| options/nixos/users.extraUsers.<name>.description | A short description of the user account, typically the
user's full name
|
| options/darwin/services.github-runners.<name>.runnerGroup | Name of the runner group to add this runner to (defaults to the default runner group)
|
| options/nixos/services.wyoming.piper.servers.<name>.voice | Name of the voice model to use
|
| options/nixos/services.i2pd.outTunnels.<name>.inbound.length | Guaranteed minimum hops for ‹name› tunnels.
|
| options/nixos/services.awstats.configs.<name>.extraConfig | Extra configuration to be appended to awstats.${name}.conf.
|
| options/nixos/services.bitmagnet.settings.postgres.name | Database name to connect to
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.macAllowFile | Specifies a file containing the MAC addresses to allow if macAcl is set to "allow" or "radius"
|
| options/nixos/services.tahoe.nodes.<name>.tub.port | The port on which the tub will listen
|
| options/nixos/services.tahoe.nodes.<name>.web.port | The port on which the Web server will listen
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.scale | Output scale configuration
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.scale | Output scale configuration
|
| options/nixos/services.bluemap.maps.<name>.world | Path to world folder containing the dimension to render
|
| options/nixos/services.bind.zones.<name>.masters | List of servers for inclusion in stub and secondary zones.
|
| options/nixos/services.quicktun.<name>.tunMode | Whether to operate in tun (IP) or tap (Ethernet) mode.
|
| options/nixos/services.redis.servers.<name>.bind | The IP interface to bind to.
null means "all interfaces".
|
| options/nixos/services.quicktun.<name>.privateKeyFile | Path to file containing local secret key in binary or hexadecimal form.
Not needed when services.quicktun..protocol is set to raw.
|
| options/home-manager/launchd.agents.<name>.config.RunAtLoad | This optional key is used to control whether your job is launched once at the time the job is loaded
|
| options/nixos/services.matrix-synapse.settings.database.name | The database engine name
|
| options/nixos/fileSystems.<name>.device | The device as passed to mount
|
| options/nixos/services.jupyter.kernels.<name>.displayName | Name that will be shown to the user.
|
| options/nixos/systemd.user.sockets.<name>.aliases | Aliases of that unit.
|
| options/nixos/systemd.user.targets.<name>.aliases | Aliases of that unit.
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.bind | Which local IP to bind the UDP socket to.
|
| options/nixos/boot.specialFileSystems.<name>.fsType | Type of the file system
|
| options/nixos/systemd.timers.<name>.timerConfig | Each attribute in this set specifies an option in the
[Timer] section of the unit
|
| options/home-manager/home.file.<name>.executable | Set the execute bit
|
| options/nixos/systemd.user.slices.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.user.timers.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/systemd.user.timers.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.user.slices.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/security.pam.services.<name>.zfs | Enable unlocking and mounting of encrypted ZFS home dataset at login.
|
| options/nixos/systemd.targets.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/systemd.sockets.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/home-manager/launchd.agents.<name>.config.UserName | This optional key specifies the user to run the job as
|
| options/nixos/virtualisation.qemu.drives.*.name | A name for the drive
|
| options/nixos/services.spiped.config.<name>.keyfile | Name of a file containing the spiped key
|
| options/nixos/systemd.services.<name>.aliases | Aliases of that unit.
|
| options/nixos/users.users.<name>.linger | Whether to enable or disable lingering for this user
|
| options/nixos/networking.sits.<name>.remote | The address of the remote endpoint to forward traffic over.
|
| options/nixos/services.phpfpm.pools.<name>.listen | The address on which to accept FastCGI requests.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.handle | Hex-encoded CKA_ID or handle of the certificate on a token or TPM,
respectively
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.file | Absolute path to the certificate to load
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.addresses | The external address where the host can be reached
|
| options/nixos/security.acme.certs.<name>.profile | The certificate profile to choose if the CA offers multiple profiles.
|
| options/nixos/services.tinc.networks.<name>.extraConfig | Extra lines to add to the tinc service configuration file
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.MulticastGroup | This optional key can be used to request that the datagram socket join a multicast group
|
| options/nixos/boot.initrd.luks.devices.<name>.gpgCard | The option to use this LUKS device with a GPG encrypted luks password by the GPG Smartcard
|
| options/nixos/services.stash.settings.stash_boxes.*.name | The name of the Stash Box
|
| options/nixos/services.kimai.sites.<name>.package | The kimai package to use.
|
| options/nixos/fileSystems.<name>.encrypted.blkDev | Location of the backing encrypted device.
|
| options/nixos/services.tahoe.nodes.<name>.package | The tahoelafs package to use.
|
| options/home-manager/services.podman.builds.<name>.authFile | Path of the authentication file.
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.addresses.*.port | The port where the host can be reached
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites.<name>.settings | Settings for this site
|
| options/nixos/networking.ipips.<name>.local | The address of the local endpoint which the remote
side should send packets to.
|
| options/nixos/systemd.user.timers.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/systemd.user.slices.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/home-manager/programs.librewolf.profiles.<name>.containers.<name>.icon | Container icon.
|
| options/nixos/services.asusd.auraConfigs.<name>.text | Text of the file.
|
| options/nixos/programs.neovim.runtime.<name>.text | Text of the file.
|
| options/home-manager/programs.sftpman.mounts.<name>.host | The host to connect to.
|
| options/home-manager/programs.sftpman.mounts.<name>.user | The username to authenticate with.
|
| options/home-manager/programs.sftpman.mounts.<name>.port | The port to connect to.
|
| options/home-manager/accounts.email.accounts.<name>.gpg | GPG configuration.
|
| options/nixos/services.filebeat.modules.<name>.module | The name of the module
|
| options/nixos/services.syncoid.commands.<name>.source | Source ZFS dataset
|
| options/nixos/users.extraUsers.<name>.isNormalUser | Indicates whether this is an account for a “real” user
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites.<name>.manifestUrl | URL of the site's web app manifest.
|
| options/nixos/services.drupal.sites.<name>.enable | Whether to enable Drupal web application.
|
| options/nixos/services.bitcoind.<name>.dbCache | Override the default database cache size in MiB.
|
| options/nixos/services.tts.servers.<name>.extraArgs | Extra arguments to pass to the server commandline.
|
| options/nixos/services.tts.servers.<name>.enable | Whether to enable Coqui TTS server.
|
| options/nixos/services.autosuspend.wakeups.<name>.class | Name of the class implementing the check
|
| options/nixos/services.librespeed.frontend.servers.*.name | Name shown in the server list.
|
| options/nixos/environment.etc.<name>.gid | GID of created file
|
| options/nixos/environment.etc.<name>.uid | UID of created file
|
| options/nixos/services.nsd.zones.<name>.notifyRetry | Specifies the number of retries for failed notifies
|
| options/nixos/systemd.user.services.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/services.gvpe.nodename | GVPE node name
|
| options/nixos/services.ax25.axports.<name>.window | Default window size for this interface.
|
| options/nixos/services.uhub.<name>.plugins.*.plugin | Path to plugin file.
|
| options/nixos/services.blockbook-frontend.<name>.user | The user as which to run blockbook-frontend-‹name›.
|
| options/nixos/services.bitcoind.<name>.rpc.port | Override the default port on which to listen for JSON-RPC connections.
|
| options/nixos/systemd.user.services.<name>.postStop | Shell commands executed after the service's main process
has exited.
|
| options/nixos/systemd.slices.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/systemd.timers.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/home-manager/programs.codex.skills | Custom skills for Codex
|
| options/nixos/systemd.nspawn.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.timers.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.slices.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/home-manager/programs.hexchat.channels.<name>.nickname2 | Secondary nickname.
|
| options/nixos/users.extraUsers.<name>.isSystemUser | Indicates if the user is a system user or not
|
| options/home-manager/programs.librewolf.profiles.<name>.containers.<name>.id | Container ID
|
| options/darwin/programs.vim.vimOptions.<name>.source | Path of the source file.
|
| options/nixos/services.restic.backups.<name>.user | As which user the backup should run.
|
| options/nixos/systemd.paths.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.units.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.paths.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/security.acme.certs.<name>.extraLegoFlags | Additional global flags to pass to all lego commands.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SecureSocketWithKey | This optional key is a variant of SockPathName
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.jupyter.kernels.<name>.language | Language of the environment
|
| options/nixos/security.wrappers.<name>.enable | Whether to enable the wrapper.
|
| options/nixos/services.quicktun.<name>.localPort | Local UDP port.
|
| options/home-manager/launchd.agents.<name>.config.TimeOut | The recommended idle time out (in seconds) to pass to the job
|
| options/nixos/services.librenms.distributedPoller.name | Custom name of this poller.
|
| options/nixos/services.ax25.axports.<name>.enable | Whether to enable Enables the axport interface.
|
| options/nixos/services.ax25.axports.<name>.paclen | Default maximum packet size for this interface.
|
| options/home-manager/programs.smug.projects.<name>.stop | Commands to execute after the tmux-session is destroyed.
|
| options/nixos/systemd.user.services.<name>.path | Packages added to the service's PATH
environment variable
|
| options/home-manager/xdg.dataFile.<name>.executable | Set the execute bit
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SecureSocketWithKey | This optional key is a variant of SockPathName
|
| options/home-manager/services.podman.images.<name>.certDir | Path of certificates (*.{crt,cert,key}) used to connect to registry.
|
| options/nixos/services.authelia.instances.<name>.user | The name of the user for this authelia instance.
|
| options/nixos/services.v4l2-relayd.instances.<name>.cardLabel | The name the camera will show up as.
|
| options/nixos/systemd.user.sockets.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.user.targets.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/power.ups.upsmon.monitor.<name>.system | Identifier of the UPS to monitor, in this form: <upsname>[@<hostname>[:<port>]]
See upsmon.conf for details.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.nix-store-gcs-proxy.<name>.address | The address of the proxy.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.transform | Refer to
xrandr(1)
for the documentation of the transform matrix.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.transform | Refer to
xrandr(1)
for the documentation of the transform matrix.
|
| options/nixos/services.errbot.instances.<name>.backend | Errbot backend name.
|
| options/nixos/services.znapzend.zetup.<name>.destinations.<name>.host | Host to use for the destination dataset
|
| options/nixos/security.auditd.plugins.<name>.path | This is the absolute path to the plugin executable.
|
| options/nixos/services.nginx.proxyCachePath.<name>.maxSize | Set maximum cache size
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.settings | Extra configuration options to put at the end of this BSS's defintion in the
hostapd.conf for the associated interface
|
| options/nixos/networking.fooOverUDP.<name>.local | Local address (and optionally device) to bind to using the given port.
|
| options/nixos/services.bind.zones.<name>.extraConfig | Extra zone config to be appended at the end of the zone section.
|
| options/nixos/systemd.user.services.<name>.preStart | Shell commands executed before the service's main process
is started.
|
| options/home-manager/i18n.inputMethod.fcitx5.themes.<name>.theme | The theme.conf file of the theme
|
| options/home-manager/programs.librewolf.profiles.<name>.containers.<name>.color | Container color.
|
| options/nixos/containers.<name>.extraFlags | Extra flags passed to the systemd-nspawn command
|
| options/nixos/systemd.services.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/services.nsd.zones.<name>.maxRetrySecs | Limit retry time for secondary zones
|
| options/nixos/services.gitwatch.<name>.enable | Whether to enable watching for repo.
|
| options/nixos/services.gitwatch.<name>.remote | Optional url of remote repository
|
| options/nixos/security.wrappers.<name>.source | The absolute path to the program to be wrapped.
|
| options/nixos/services.gitwatch.<name>.branch | Optional branch in remote repository
|
| options/nixos/services.bitcoind.<name>.enable | Whether to enable Bitcoin daemon.
|
| options/nixos/networking.fooOverUDP.<name>.local.dev | Network device to bind to.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.handle | Hex-encoded CKA_ID or handle of the certificate on a token or TPM,
respectively
|
| options/home-manager/services.podman.images.<name>.authFile | Path of the authentication file used to connect to registry.
|
| options/nixos/containers.<name>.enableTun | Allows the container to create and setup tunnel interfaces
by granting the NET_ADMIN capability and
enabling access to /dev/net/tun.
|
| options/nixos/containers.<name>.hostBridge | Put the host-side of the veth-pair into the named bridge
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.locations.<name>.index | Adds DirectoryIndex directive
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.locations.<name>.alias | Alias directory for requests
|
| options/nixos/services.bacula-sd.director.<name>.tls.allowedCN | Common name attribute of allowed peer certificates
|
| options/nixos/services.bacula-fd.director.<name>.tls.allowedCN | Common name attribute of allowed peer certificates
|
| options/home-manager/programs.irssi.networks.<name>.type | Type of the network.
|
| options/home-manager/programs.irssi.networks.<name>.nick | Nickname in that network.
|
| options/nixos/security.acme.certs.<name>.extraLegoRunFlags | Additional flags to pass to lego run.
|
| options/nixos/services.geth.<name>.authrpc.vhosts | List of virtual hostnames from which to accept requests.
|
| options/nixos/services.hans.clients.<name>.server | IP address of server running hans
|
| options/nixos/services.drupal.sites.<name>.themesDir | The location for users to install Drupal themes.
|
| options/nixos/services.nsd.zones.<name>.minRefreshSecs | Limit refresh time for secondary zones.
|
| options/nixos/services.spiped.config.<name>.maxConns | Limit on the number of simultaneous connections allowed.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.proxyJump | The proxy host to use to connect to the server.
|
| options/nixos/containers.<name>.tmpfs | Mounts a set of tmpfs file systems into the container
|
| options/nixos/services.bind.zones.<name>.allowQuery | List of address ranges allowed to query this zone
|
| options/nixos/systemd.timers.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/systemd.slices.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/systemd.user.paths.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.user.units.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/security.pam.services.<name>.rootOK | If set, root doesn't need to authenticate (e.g. for the
useradd service).
|
| options/nixos/systemd.user.paths.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.claimMaps.<name>.joinType | Determines how multiple values are joined to create the claim value
|
| options/nixos/services.i2pd.inTunnels.<name>.outbound.length | Guaranteed minimum hops for ‹name› tunnels.
|
| options/nixos/security.pam.services.<name>.showMotd | Whether to show the message of the day.
|
| options/nixos/networking.ipips.<name>.remote | The address of the remote endpoint to forward traffic over.
|
| options/nixos/services.blockbook-frontend.<name>.dataDir | Location of blockbook-frontend-‹name› data directory.
|
| options/nixos/services.blockbook-frontend.<name>.group | The group as which to run blockbook-frontend-‹name›.
|
| options/nixos/services.cgit.<name>.nginx.location | Location to serve cgit under.
|
| options/nixos/services.rspamd.locals.<name>.source | Path of the source file.
|
| options/nixos/services.rauc.slots.<name>.*.settings | Settings for this slot.
|
| options/nixos/services.spiped.config.<name>.target | Address to which spiped should connect.
|
| options/home-manager/services.podman.builds.<name>.labels | The labels to apply to the build.
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites.<name>.desktopEntry.icon | Icon to display in file manager, menus, etc.
|
| options/nixos/systemd.user.services.<name>.script | Shell commands executed as the service's main process.
|
| options/darwin/launchd.agents.<name>.serviceConfig | Each attribute in this set specifies an option for a key in the plist.
https://developer.apple.com/legacy/library/documentation/Darwin/Reference/ManPages/man5/launchd.plist.5.html
|
| options/home-manager/services.podman.volumes.<name>.user | The user ID owning the volume inside the container.
|
| options/nixos/services.geth.<name>.metrics.enable | Whether to enable Go Ethereum prometheus metrics.
|
| options/nixos/services.bitcoind.<name>.rpc.users | RPC user information for JSON-RPC connections.
|
| options/nixos/services.redis.servers.<name>.slaveOf | IP and port to which this redis instance acts as a slave.
|
| options/nixos/services.inadyn.settings.custom.<name>.hostname | Hostname alias(es).
|
| options/nixos/services.inadyn.settings.custom.<name>.username | Username for this DDNS provider.
|
| options/nixos/services.redis.servers.<name>.port | The TCP port to accept connections
|
| options/nixos/systemd.user.slices.<name>.sliceConfig | Each attribute in this set specifies an option in the
[Slice] section of the unit
|
| options/nixos/services.nginx.virtualHosts.<name>.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.drupal.sites.<name>.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.i2pd.outTunnels.<name>.outbound.length | Guaranteed minimum hops for ‹name› tunnels.
|
| options/nixos/security.wrappers.<name>.setuid | Whether to add the setuid bit the wrapper program.
|
| options/nixos/security.wrappers.<name>.setgid | Whether to add the setgid bit the wrapper program.
|
| options/nixos/security.pam.services.<name>.oathAuth | If set, the OATH Toolkit will be used.
|
| options/nixos/systemd.user.targets.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/systemd.user.sockets.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.subnets.*.weight | Indicates the priority over identical Subnets owned by different nodes
|
| options/nixos/systemd.network.links.<name>.enable | Whether to enable this .link unit
|
| options/nixos/systemd.user.services.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/home-manager/xdg.desktopEntries.<name>.noDisplay | Means "this application exists, but don't display it in the menus"
|
| options/nixos/services.ndppd.proxies.<name>.interface | Listen for any Neighbor Solicitation messages on this interface,
and respond to them according to a set of rules
|
| options/nixos/services.h2o.hosts.<name>.tls.policy | add will additionally listen for TLS connections. only will
disable TLS connections. force will redirect non-TLS traffic
to the TLS connection.
|
| options/home-manager/launchd.agents.<name>.config.Umask | This optional key specifies what value should be passed to umask(2) before running the job
|
| options/nixos/services.authelia.instances.<name>.group | The name of the group for this authelia instance.
|
| options/home-manager/accounts.contact.accounts.<name>.remote.userName | User name for authentication.
|
| options/nixos/services.redis.servers.<name>.slaveOf.ip | IP of the Redis master
|
| options/home-manager/accounts.email.accounts.<name>.jmap | The JMAP configuration to use for this account.
|
| options/home-manager/accounts.email.accounts.<name>.smtp | The SMTP configuration to use for this account.
|
| options/home-manager/xdg.desktopEntries.<name>.terminal | Whether the program runs in a terminal window.
|
| options/home-manager/accounts.email.accounts.<name>.imap | The IMAP configuration to use for this account.
|
| options/nixos/fileSystems.<name>.options | Options used to mount the file system
|
| options/nixos/fileSystems.<name>.depends | List of paths that should be mounted before this one
|
| options/nixos/services.geth.<name>.authrpc.enable | Whether to enable Go Ethereum Auth RPC API.
|
| options/nixos/systemd.user.services.<name>.postStart | Shell commands executed after the service's main process
is started.
|
| options/nixos/systemd.services.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/systemd.user.services.<name>.reload | Shell commands executed when the service's main process
is reloaded.
|
| options/home-manager/services.podman.volumes.<name>.type | Filesystem type of Device. (used as -t in mount commands)
|
| options/nixos/systemd.paths.<name>.requisite | Similar to requires
|
| options/nixos/environment.etc.<name>.mode | If set to something else than symlink,
the file is copied instead of symlinked, with the given
file mode.
|
| options/nixos/power.ups.upsmon.monitor.<name>.powerValue | Number of power supplies that the UPS feeds on this system
|
| options/nixos/security.acme.certs.<name>.server | ACME Directory Resource URI
|
| options/home-manager/programs.thunderbird.profiles.<name>.accountsOrder | Custom ordering of accounts and local folders in
Thunderbird's folder pane
|
| options/nixos/services.ax25.axports.<name>.kissParams | Kissattach parameters for this interface.
|
| options/nixos/services.drupal.sites.<name>.package | The drupal package to use.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.host | Host pattern used by this conditional block
|
| options/nixos/services.openvpn.servers.<name>.authUserPass.username | The username to store inside the credentials file.
|
| options/nixos/systemd.user.paths.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/home-manager/launchd.agents.<name>.config.ExitTimeOut | The amount of time launchd waits before sending a SIGKILL signal
|
| options/home-manager/launchd.agents.<name>.config.WatchPaths | This optional key causes the job to be started if any one of the listed paths are modified.
|
| options/nixos/services.sourcehut.settings."sr.ht".site-name | The name of your network of sr.ht-based sites.
|
| options/nixos/power.ups.ups.<name>.description | Description of the UPS.
|
| options/home-manager/home.file.<name>.recursive | If the file source is a directory, then this option
determines whether the directory should be recursively
linked to the target location
|
| options/nixos/services.h2o.hosts.<name>.acme.enable | Whether to ask Let’s Encrypt to sign a certificate for this
virtual host
|
| options/nixos/security.acme.certs.<name>.enableDebugLogs | Whether to enable debug logging for this certificate.
|
| options/nixos/services.openvpn.servers.<name>.up | Shell commands executed when the instance is starting.
|
| options/nixos/services.tahoe.nodes.<name>.sftpd.enable | Whether to enable SFTP service.
|
| options/nixos/services.rsync.jobs.<name>.inhibit | Run the rsync process with an inhibition lock taken;
see systemd-inhibit(1) for a list of possible operations.
|
| options/home-manager/xdg.cacheFile.<name>.executable | Set the execute bit
|
| options/home-manager/xdg.stateFile.<name>.executable | Set the execute bit
|
| options/nixos/systemd.user.sockets.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.user.sockets.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/systemd.user.targets.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.user.targets.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/systemd.user.services.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/darwin/programs.vim.vimOptions.<name>.enable | Whether this file should be generated
|
| options/home-manager/programs.sftpman.mounts.<name>.sshKey | Path to the SSH key to use for authentication
|
| options/home-manager/services.podman.volumes.<name>.copy | Copy content of the image located at the mountpoint of the volume on first run.
|
| options/nixos/services.kimai.sites.<name>.poolConfig | Options for the Kimai PHP pool
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.subnets.*.prefixLength | The prefix length of the subnet
|
| options/nixos/services.pid-fan-controller.settings.heatSources.*.name | Name of the heat source.
|
| options/home-manager/services.activitywatch.watchers.<name>.settingsFilename | The filename of the generated settings file
|
| options/nixos/services.fedimintd.<name>.ui.bind | Address to bind on for UI connections
|
| options/nixos/networking.bridges.<name>.rstp | Whether the bridge interface should enable rstp.
|
| options/nixos/services.jupyter.kernels.<name>.env | Environment variables to set for the kernel.
|
| options/nixos/networking.greTunnels.<name>.dev | The underlying network device on which the tunnel resides.
|
| options/nixos/services.redis.servers.<name>.syslog | Enable logging to the system logger.
|
| options/nixos/services.redis.servers.<name>.enable | Whether to enable Redis server.
|
| options/nixos/services.rspamd.workers.<name>.count | Number of worker instances to run
|
| options/nixos/services.nginx.virtualHosts.<name>.root | The path of the web root directory.
|
| options/nixos/services.nebula.networks.<name>.ca | Path to the certificate authority certificate.
|
| options/nixos/services.sourcehut.settings."sr.ht".owner-name | Owner's name.
|
| options/nixos/services.tahoe.nodes.<name>.sftpd.port | The port on which the SFTP server will listen
|
| options/home-manager/programs.obsidian.defaultSettings.cssSnippets.*.name | Name of the snippet.
|
| options/nixos/systemd.services.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/systemd.services.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.checkHostIP | Check the host IP address in the
known_hosts file.
|
| options/nixos/fileSystems.<name>.neededForBoot | If set, this file system will be mounted in the initial ramdisk
|
| options/nixos/systemd.services.<name>.startAt | Automatically start this unit at the given date/time, which
must be in the format described in
systemd.time(7)
|
| options/nixos/services.borgbackup.jobs.<name>.dateFormat | Arguments passed to date
to create a timestamp suffix for the archive name.
|
| options/home-manager/programs.gemini-cli.commands.<name>.prompt | The prompt that will be sent to the Gemini model when the command is executed
|
| options/nixos/services.nsd.keys.<name>.algorithm | Authentication algorithm for this key.
|
| options/darwin/programs.tmux.tmuxOptions.<name>.source | Path of the source file.
|
| options/home-manager/programs.sftpman.mounts.<name>.authType | The authentication method to use.
|
| options/nixos/services.quicktun.<name>.upScript | Run specified command or script after the tunnel device has been opened.
|
| options/nixos/services.redis.servers.<name>.slowLogMaxLen | Maximum number of items to keep in slow log.
|
| options/nixos/systemd.slices.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/containers.<name>.hostAddress | The IPv4 address assigned to the host interface.
(Not used when hostBridge is set.)
|
| options/nixos/systemd.timers.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/services.inadyn.settings.custom.<name>.ddns-server | DDNS server name.
|
| options/nixos/boot.loader.grub.users.<name>.password | Specifies the clear text password for the account
|
| options/nixos/systemd.timers.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.slices.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.user.timers.<name>.timerConfig | Each attribute in this set specifies an option in the
[Timer] section of the unit
|
| options/home-manager/launchd.agents.<name>.config.StartOnMount | This optional key causes the job to be started every time a filesystem is mounted.
|
| options/nixos/services.phpfpm.pools.<name>.socket | Path to the unix socket file on which to accept FastCGI requests.
This option is read-only and managed by NixOS.
|
| options/nixos/systemd.user.targets.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/systemd.user.sockets.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/services.tarsnap.archives.<name>.printStats | Print global archive statistics upon completion
|
| options/nixos/containers.<name>.privateNetwork | Whether to give the container its own private virtual
Ethernet interface
|
| options/nixos/services.prometheus.exporters.rtl_433.ids.*.name | Name to match.
|
| options/nixos/services.bacula-sd.device.<name>.mediaType | The specified name-string names the type of media supported by this
device, for example, DLT7000
|
| options/nixos/environment.etc.<name>.source | Path of the source file.
|
| options/nixos/services.acpid.handlers.<name>.event | Event type.
|
| options/nixos/services.quicktun.<name>.remotePort | Remote UDP port
|
| options/nixos/systemd.user.services.<name>.aliases | Aliases of that unit.
|
| options/darwin/environment.etc.<name>.source | Path of the source file.
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.addresses.*.address | The external IP address or hostname where the host can be reached.
|
| options/nixos/services.netbird.clients.<name>.suffixedName | A systemd service name to use (without .service suffix).
|
| options/nixos/services.netbird.tunnels.<name>.suffixedName | A systemd service name to use (without .service suffix).
|
| options/nixos/services.bacula-sd.director.<name>.tls.enable | Specifies if TLS should be enabled
|
| options/nixos/services.bacula-fd.director.<name>.tls.enable | Specifies if TLS should be enabled
|
| options/nixos/services.fedimintd.<name>.ui.port | TCP Port to bind on for UI connections
|
| options/nixos/boot.initrd.luks.devices.<name>.gpgCard.publicKey | Path to the Public Key.
|
| options/nixos/services.nbd.server.exports.<name>.path | File or block device to export.
|
| options/nixos/security.acme.certs.<name>.listenHTTP | Interface and port to listen on to solve HTTP challenges
in the form [INTERFACE]:PORT
|
| options/nixos/security.pam.services.<name>.otpwAuth | If set, the OTPW system will be used (if
~/.otpw exists).
|
| options/nixos/services.znapzend.zetup.<name>.destinations.<name>.plan | The znapzend backup plan to use for the source
|
| options/nixos/systemd.services.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/home-manager/programs.smug.projects.<name>.root | Root path in filesystem of the smug project
|
| options/nixos/services.firezone.server.provision.accounts.<name>.actors.<name>.type | The account type
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.hotkeys.<name>.*.modifiers | The hotkey modifiers.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.claimMaps.<name>.valuesByGroup | Maps kanidm groups to values for the claim.
|
| options/nixos/services.openssh.knownHosts.<name>.hostNames | A list of host names and/or IP numbers used for accessing
the host's ssh service
|
| options/nixos/services.dokuwiki.sites.<name>.acl.*.page | Page or namespace to restrict
|
| options/nixos/services.borgbackup.jobs.<name>.wrapper | Name of the wrapper that is installed into PATH
|
| options/nixos/services.i2pd.inTunnels.<name>.inbound.quantity | Number of simultaneous ‹name› tunnels.
|
| options/home-manager/programs.streamlink.plugins.<name>.settings | Configuration for the specific plugin, written to
$XDG_CONFIG_HOME/streamlink/config. (linux) or
Library/Application Support/streamlink/config. (darwin).
|
| options/nixos/security.pam.services.<name>.enable | Whether to enable this PAM service.
|
| options/nixos/services.ax25.axports.<name>.package | The ax25-tools package to use.
|
| options/nixos/services.nylon.<name>.verbosity | Enable verbose output, default is to not be verbose.
|
| options/nixos/services.nebula.networks.<name>.key | Path or reference to the host key.
|
| options/nixos/systemd.network.links.<name>.extraConfig | Extra configuration append to unit
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.settings.<name>.force | Forcibly override any existing configuration for
this extension.
|
| options/nixos/services.fedimintd.<name>.p2p.url | Public address for p2p connections from peers (if TCP is used)
|
| options/home-manager/services.podman.builds.<name>.autoStart | Whether to start the build on boot
|
| options/home-manager/services.podman.images.<name>.autoStart | Whether to pull the image on boot
|
| options/nixos/services.rspamd.workers.<name>.type | The type of this worker
|
| options/nixos/systemd.sockets.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/systemd.targets.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/services.keepalived.vrrpScripts.<name>.user | Name of user to run the script under.
|
| options/nixos/services.xserver.displayManager.lightdm.greeter.name | The name of a .desktop file in the directory specified
in the 'package' option.
|
| options/nixos/services.borgbackup.jobs.<name>.postCreate | Shell commands to run after borg create
|
| options/nixos/programs.dms-shell.plugins.<name>.enable | Whether to enable this plugin
|
| options/nixos/boot.initrd.systemd.contents.<name>.text | Text of the file.
|
| options/nixos/services.awstats.configs.<name>.type | The type of log being collected.
|
| options/nixos/systemd.sockets.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.targets.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/networking.greTunnels.<name>.ttl | The time-to-live/hoplimit of the connection to the remote tunnel endpoint.
|
| options/nixos/services.h2o.hosts.<name>.tls.identity | Key / certificate pairs for the virtual host.
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.zsk | Key policy for zone signing keys
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.ksk | Key policy for key signing keys
|
| options/nixos/services.ndppd.proxies.<name>.router | Turns on or off the router flag for Neighbor Advertisement Messages.
|
| options/nixos/containers.<name>.hostAddress6 | The IPv6 address assigned to the host interface.
(Not used when hostBridge is set.)
|
| options/home-manager/services.podman.volumes.<name>.group | The group ID owning the volume inside the container.
|
| options/nixos/security.pam.services.<name>.unixAuth | Whether users can log in with passwords defined in
/etc/shadow.
|
| options/nixos/services.redis.servers.<name>.logLevel | Specify the server verbosity level, options: debug, verbose, notice, warning.
|
| options/nixos/security.acme.certs.<name>.ocspMustStaple | Turns on the OCSP Must-Staple TLS extension
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites.<name>.desktopEntry.enable | Whether to enable the desktop entry for this site.
|
| options/nixos/services.netbird.clients | Attribute set of NetBird client daemons, by default each one will:
- be manageable using dedicated tooling:
netbird-<name> script,
NetBird - netbird-<name> graphical interface when appropriate (see ui.enable),
- run as a
netbird-<name>.service,
- listen for incoming remote connections on the port
51820 (openFirewall by default),
- manage the
netbird-<name> wireguard interface,
- use the /var/lib/netbird-/config.json configuration file,
- override /var/lib/netbird-/config.json with values from /etc/netbird-/config.d/*.json,
- (
hardened) be locally manageable by netbird-<name> system group,
With following caveats:
- multiple daemons will interfere with each other's DNS resolution of
netbird.cloud, but
should remain fully operational otherwise
|
| options/nixos/services.bitcoind.<name>.package | The bitcoind package to use.
|
| options/nixos/services.sympa.settingsFile.<name>.text | Text of the file.
|
| options/home-manager/programs.floorp.profiles.<name>.path | Profile path.
|
| options/nixos/networking.bonds.<name>.mode | DEPRECATED, use driverOptions
|
| options/nixos/services.neo4j.ssl.policies.<name>.privateKey | The name of private PKCS #8 key file for this policy to be found
in the baseDirectory, or the absolute path to
the key file
|
| options/nixos/services.i2pd.outTunnels.<name>.inbound.quantity | Number of simultaneous ‹name› tunnels.
|
| options/nixos/services.netbird.clients.<name>.interface | Name of the network interface managed by this client.
|
| options/nixos/services.netbird.tunnels.<name>.interface | Name of the network interface managed by this client.
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.slot | Which slot on the YubiKey to challenge.
|
| options/nixos/services.drupal.sites.<name>.configSyncDir | The location of the Drupal config sync directory.
|
| options/nixos/services.nsd.zones.<name>.provideXFR | Allow these IPs and TSIG to transfer zones, addr TSIG|NOKEY|BLOCKED
address range 192.0.2.0/24, 1.2.3.4&255.255.0.0, 3.0.2.20-3.0.2.40
|
| options/home-manager/xdg.dataFile.<name>.recursive | If the file source is a directory, then this option
determines whether the directory should be recursively
linked to the target location
|
| options/nixos/fileSystems.<name>.overlay.workdir | The path to the workdir
|
| options/nixos/systemd.user.slices.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/systemd.nspawn.<name>.networkConfig | Each attribute in this set specifies an option in the
[Network] section of this unit
|
| options/nixos/systemd.sockets.<name>.socketConfig | Each attribute in this set specifies an option in the
[Socket] section of the unit
|
| options/nixos/systemd.user.timers.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/networking.supplicant.<name>.bridge | Name of the bridge interface that wpa_supplicant should listen at.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/systemd.user.slices.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.user.timers.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/services.jupyter.kernels.<name>.argv | Command and arguments to start the kernel.
|
| options/nixos/services.bacula-sd.director.<name>.tls | TLS Options for the Director in this Configuration.
|
| options/nixos/services.bitcoind.<name>.configFile | The configuration file path to supply bitcoind.
|
| options/nixos/services.bepasty.servers.<name>.bind | Bind address to be used for this server.
|
| options/nixos/services.bacula-fd.director.<name>.tls | TLS Options for the Director in this Configuration.
|
| options/nixos/services.redis.servers.<name>.slaveOf.port | port of the Redis master
|
| options/nixos/services.netbird.tunnels.<name>.port | Port the NetBird client listens on.
|
| options/nixos/services.netbird.clients.<name>.port | Port the NetBird client listens on.
|
| options/home-manager/i18n.inputMethod.fcitx5.themes.<name>.panelImage | Path to the SVG of the panel.
|
| options/home-manager/accounts.email.accounts.<name>.imap.tls | Configuration for secure connections.
|
| options/home-manager/accounts.email.accounts.<name>.smtp.tls | Configuration for secure connections.
|
| options/nixos/services.mpd.settings | Configuration for MPD
|
| options/nixos/systemd.user.units.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.user.paths.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/services.iodine.clients.<name>.relay | DNS server to use as an intermediate relay to the iodined server
|
| options/nixos/systemd.user.paths.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/home-manager/services.podman.volumes.<name>.image | Specifies the image the volume is based on when Driver is set to the image.
|
| options/home-manager/programs.floorp.profiles.<name>.id | Profile ID
|
| options/nixos/services.dovecot2.imapsieve.mailbox.*.name | This setting configures the name of a mailbox for which administrator scripts are configured
|
| options/nixos/services.ghostunnel.servers.<name>.allowCN | Allow client if common name appears in the list.
|
| options/nixos/services.geth.<name>.websocket.apis | APIs to enable over WebSocket
|
| options/nixos/services.nebula.networks.<name>.cert | Path to the host certificate.
|
| options/nixos/services.homebridge.settings.platforms.*.name | Name of the platform
|
| options/nixos/services.keyd.keyboards.<name>.ids | Device identifiers, as shown by keyd(1).
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.fwmark | If given, sets the SO_MARK option on the TCP socket.
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.fwmark | If given, sets the SO_MARK option on the TCP socket.
|
| options/home-manager/services.podman.builds.<name>.tlsVerify | Require HTTPS and verification of certificates when contacting registries.
|
| options/home-manager/services.podman.images.<name>.tlsVerify | Require HTTPS and verification of certificates when contacting registries.
|
| options/nixos/services.beesd.filesystems.<name>.workDir | Name (relative to the root of the filesystem) of the subvolume where
the hash table will be stored.
|
| options/nixos/security.pam.services.<name>.pamMount | Enable PAM mount (pam_mount) system to mount filesystems on user login.
|
| options/nixos/openstack.zfs.datasets.<name>.mount | Where to mount this dataset.
|
| options/nixos/services.cjdns.UDPInterface.connectTo.<name>.login | (optional) name your peer has for you
|
| options/nixos/services.cjdns.ETHInterface.connectTo.<name>.login | (optional) name your peer has for you
|
| options/nixos/services.public-inbox.inboxes.<name>.newsgroup | NNTP group name for the inbox.
|
| options/nixos/services.drupal.sites.<name>.modulesDir | The location for users to install Drupal modules.
|
| options/nixos/security.acme.certs.<name>.extraLegoRenewFlags | Additional flags to pass to lego renew.
|
| options/nixos/services.i2pd.inTunnels.<name>.accessList | I2P nodes that are allowed to connect to this service.
|
| options/nixos/services.openvpn.servers.<name>.down | Shell commands executed when the instance is shutting down.
|
| options/nixos/services.public-inbox.inboxes.<name>.url | URL where this inbox can be accessed over HTTP.
|
| options/nixos/systemd.network.networks.<name>.DHCP | Whether to enable DHCP on the interfaces matched.
|
| options/nixos/services.httpd.virtualHosts.<name>.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/nixos/networking.fooOverUDP.<name>.local.address | Local address to bind to
|
| options/home-manager/accounts.email.accounts.<name>.gpg.key | The key to use as listed in gpg --list-keys.
|
| options/nixos/services.ghostunnel.servers.<name>.allowOU | Allow client if organizational unit name appears in the list.
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey | The options to use for this LUKS device in YubiKey-PBA
|
| options/nixos/systemd.sockets.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/systemd.services.<name>.scriptArgs | Arguments passed to the main process script
|
| options/nixos/systemd.targets.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/darwin/services.github-runners.<name>.user | User under which to run the service
|
| options/nixos/systemd.user.services.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/services.awstats.configs.<name>.webService.hostname | The hostname the web service appears under.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.visibleName | The profile name.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.bitcoind.<name>.testnet | Whether to use the testnet instead of mainnet.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.match | Match block conditions used by this block
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.fedimintd.<name>.p2p.port | Port to bind on for p2p connections from peers (both TCP and UDP)
|
| options/nixos/services.fedimintd.<name>.p2p.bind | Address to bind on for p2p connections from peers (both TCP and UDP)
|
| options/nixos/services.sympa.domains.<name>.webHost | Domain part of the web interface URL (no web interface for this domain if null)
|
| options/nixos/services.nylon.<name>.deniedIPRanges | Denied client IP ranges, these gets evaluated after the allowed IP ranges, defaults to all IPv4 addresses:
[ "0.0.0.0/0" ]
To block all other access than the allowed.
|
| options/nixos/services.rspamd.locals.<name>.enable | Whether this file locals should be generated
|
| options/nixos/systemd.slices.<name>.requisite | Similar to requires
|
| options/nixos/systemd.timers.<name>.requisite | Similar to requires
|
| options/home-manager/xdg.desktopEntries.<name>.settings | Extra key-value pairs to add to the [Desktop Entry] section
|
| options/nixos/boot.specialFileSystems.<name>.mountPoint | Location where the file system will be mounted
|
| options/nixos/security.auditd.plugins.<name>.args | This allows you to pass arguments to the child program
|
| options/nixos/services.tahoe.introducers.<name>.nickname | The nickname of this Tahoe introducer.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.MulticastGroup | This optional key can be used to request that the datagram socket join a multicast group
|
| options/nixos/services.httpd.virtualHosts.<name>.hostName | Canonical hostname for the server.
|
| options/nixos/services.asusd.auraConfigs.<name>.source | Path of the source file.
|
| options/nixos/programs.neovim.runtime.<name>.source | Path of the source file.
|
| options/nixos/services.caddy.virtualHosts.<name>.hostName | Canonical hostname for the server.
|
| options/nixos/services.rss2email.feeds.<name>.url | The URL at which to fetch the feed.
|
| options/nixos/services.redis.servers.<name>.unixSocket | The path to the socket to bind to.
|
| options/home-manager/services.podman.volumes.<name>.driver | The volume driver to use.
|
| options/home-manager/services.podman.volumes.<name>.labels | The labels to apply to the volume.
|
| options/nixos/services.xserver.xkb.extraLayouts.<name>.typesFile | The path to the xkb types file
|
| options/home-manager/accounts.calendar.accounts.<name>.remote.userName | User name for authentication.
|
| options/nixos/users.extraUsers.<name>.linger | Whether to enable or disable lingering for this user
|
| options/nixos/services.firezone.server.provision.accounts.<name>.actors.<name>.email | The email address used to authenticate as this account
|
| options/nixos/services.bird-lg.frontend.nameFilter | Protocol names to hide in summary tables (RE2 syntax),
|
| options/nixos/services.geth.<name>.metrics.address | Listen address of Go Ethereum metrics service.
|
| options/nixos/services.drupal.sites.<name>.phpOptions | Options for PHP's php.ini file for this Drupal site.
|
| options/nixos/services.nginx.proxyCachePath.<name>.enable | Whether to enable this proxy cache path entry.
|
| options/darwin/launchd.daemons.<name>.serviceConfig | Each attribute in this set specifies an option for a key in the plist.
https://developer.apple.com/legacy/library/documentation/Darwin/Reference/ManPages/man5/launchd.plist.5.html
|
| options/nixos/systemd.user.timers.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/systemd.user.slices.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/systemd.network.links.<name>.linkConfig | Each attribute in this set specifies an option in the
[Link] section of the unit
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.settings.<name>.force | Forcibly override any existing configuration for
this extension.
|
| options/nixos/services.fedimintd.<name>.enable | Whether to enable fedimintd.
|
| options/home-manager/launchd.agents.<name>.config.GroupName | This optional key specifies the group to run the job as
|
| options/nixos/services.firezone.server.provision.accounts.<name>.auth.<name>.adapter | The auth adapter type
|
| options/nixos/boot.loader.systemd-boot.windows.<name>.title | The title of the boot menu entry.
|
| options/nixos/services.openafsServer.cellServDB.<name>.*.ip | IP Address of a database server
|
| options/nixos/services.openafsClient.cellServDB.<name>.*.ip | IP Address of a database server
|
| options/nixos/services.tahoe.nodes.<name>.helper.enable | Whether to enable helper service.
|
| options/nixos/services.nginx.proxyCachePath.<name>.keysZoneSize | Set size to shared memory zone.
|
| options/darwin/programs.tmux.tmuxOptions.<name>.enable | Whether this file should be generated
|
| options/nixos/services.openvpn.servers | Each attribute of this option defines a systemd service that
runs an OpenVPN instance
|
| options/home-manager/xdg.configFile.<name>.executable | Set the execute bit
|
| options/nixos/services.fedimintd.<name>.api.url | Public URL of the API address of the reverse proxy/tls terminator
|
| options/nixos/services.drupal.sites.<name>.poolConfig | Options for the Drupal PHP pool
|
| options/nixos/containers.<name>.specialArgs | A set of special arguments to be passed to NixOS modules
|
| options/nixos/services.blockbook-frontend.<name>.certFile | To enable SSL, specify path to the name of certificate files without extension
|
| options/nixos/services.hans.clients.<name>.extraConfig | Additional command line parameters
|
| options/nixos/services.dokuwiki.sites.<name>.stateDir | Location of the DokuWiki state directory.
|
| options/nixos/services.iodine.clients.<name>.server | Hostname of server running iodined
|
| options/nixos/services.restic.backups.<name>.checkOpts | A list of options for 'restic check'.
|
| options/nixos/services.rspamd.workers.<name>.enable | Whether to run the rspamd worker.
|
| options/home-manager/accounts.email.accounts.<name>.imap.host | Hostname of IMAP server.
|
| options/home-manager/accounts.email.accounts.<name>.smtp.host | Hostname of SMTP server.
|
| options/home-manager/services.podman.volumes.<name>.device | The path of a device which is mounted for the volume.
|
| options/home-manager/services.podman.volumes.<name>.autoStart | Whether to create the volume on boot.
|
| options/nixos/services.ghostunnel.servers.<name>.allowURI | Allow client if URI subject alternative name appears in the list.
|
| options/nixos/services.ghostunnel.servers.<name>.allowDNS | Allow client if DNS subject alternative name appears in the list.
|
| options/nixos/services.kimai.sites.<name>.settings | Structural Kimai's local.yaml configuration
|
| options/nixos/services.geth.<name>.authrpc.address | Listen address of Go Ethereum Auth RPC API.
|
| options/nixos/services.restic.backups.<name>.runCheck | Whether to run the check command with the provided checkOpts options.
|
| options/nixos/services.phpfpm.pools.<name>.phpPackage | The PHP package to use for running this PHP-FPM pool.
|
| options/nixos/systemd.sockets.<name>.listenStreams | For each item in this list, a ListenStream
option in the [Socket] section will be created.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig | Each attribute in this set specifies an option for a key in the plist.
https://developer.apple.com/legacy/library/documentation/Darwin/Reference/ManPages/man5/launchd.plist.5.html
|
| options/darwin/environment.etc.<name>.enable | Whether this file should be generated
|
| options/nixos/security.pam.services.<name>.p11Auth | If set, keys listed in
~/.ssh/authorized_keys and
~/.eid/authorized_certificates
can be used to log in with the associated PKCS#11 tokens.
|
| options/nixos/services.ndppd.proxies.<name>.rules | This is a rule that the target address is to match against
|
| options/nixos/services.hostapd.radios.<name>.noScan | Disables scan for overlapping BSSs in HT40+/- mode
|
| options/nixos/services.h2o.hosts.<name>.serverAliases | Additional names of virtual hosts served by this virtual host
configuration.
|
| options/nixos/security.acme.certs.<name>.extraDomainNames | A list of extra domain names, which are included in the one certificate to be issued.
|
| options/nixos/security.acme.certs.<name>.webroot | Where the webroot of the HTTP vhost is located.
.well-known/acme-challenge/ directory
will be created below the webroot if it doesn't exist.
http://example.org/.well-known/acme-challenge/ must also
be available (notice unencrypted HTTP).
|
| options/nixos/hardware.alsa.controls.<name>.maxVolume | The maximum volume in dB.
|
| options/nixos/services.geth.<name>.websocket.port | Port number of Go Ethereum WebSocket API.
|
| options/nixos/services.cjdns.ETHInterface.connectTo.<name>.peerName | (optional) human-readable name for peer
|
| options/nixos/services.cjdns.UDPInterface.connectTo.<name>.peerName | (optional) human-readable name for peer
|
| options/nixos/services.fedimintd.<name>.api.bind | Address to bind on for API connections relied by the reverse proxy/tls terminator.
|
| options/nixos/services.fedimintd.<name>.api.port | Port to bind on for API connections relied by the reverse proxy/tls terminator.
|
| options/home-manager/programs.gradle.initScripts.<name>.text | Text of the init script file. if this option is null
then source must be set.
|
| options/nixos/services.h2o.hosts.<name>.settings | Attrset to be transformed into YAML for host config
|
| options/nixos/services.rsync.jobs.<name>.settings | Settings that should be passed to rsync via long options
|
| options/nixos/networking.macvlans.<name>.mode | The mode of the macvlan device.
|
| options/nixos/security.auditd.plugins.<name>.active | Whether to enable Whether to enable this plugin.
|
| options/nixos/services.dokuwiki.sites.<name>.acl.*.actor | User or group to restrict
|
| options/nixos/services.bepasty.servers.<name>.dataDir | Path to the directory where the pastes will be saved to
|
| options/nixos/systemd.user.services.<name>.upholds | Keeps the specified running while this unit is running
|
| options/darwin/launchd.agents.<name>.serviceConfig.Nice | This optional key specifies what nice(3) value should be applied to the daemon.
|
| options/home-manager/accounts.email.accounts.<name>.meli.mailboxAliases | Folder display name
|
| options/nixos/systemd.user.paths.<name>.requisite | Similar to requires
|
| options/nixos/services.anubis.instances.<name>.settings.BIND | The address that Anubis listens to
|
| options/darwin/users.groups.<name>.description | The group's description.
|
| options/home-manager/xdg.cacheFile.<name>.recursive | If the file source is a directory, then this option
determines whether the directory should be recursively
linked to the target location
|
| options/home-manager/xdg.stateFile.<name>.recursive | If the file source is a directory, then this option
determines whether the directory should be recursively
linked to the target location
|
| options/nixos/services.keepalived.vrrpScripts.<name>.group | Name of group to run the script under
|
| options/nixos/services.bitcoind.<name>.extraConfig | Additional configurations to be appended to bitcoin.conf.
|
| options/nixos/security.pam.services.<name>.limits.*.type | Type of this limit
|
| options/home-manager/programs.i3status-rust.bars.<name>.theme | The theme to use
|
| options/nixos/security.pam.services.<name>.mysqlAuth | If set, the pam_mysql module will be used to
authenticate users against a MySQL/MariaDB database.
|
| options/nixos/ec2.zfs.datasets.<name>.properties | Properties to set on this dataset.
|
| options/nixos/services.logcheck.ignore.<name>.level | Set the logcheck level.
|
| options/nixos/services.sanoid.datasets.<name>.daily | Number of daily snapshots.
|
| options/nixos/services.znapzend.zetup.<name>.enable | Whether to enable this source.
|
| options/nixos/services.i2pd.inTunnels.<name>.outbound.quantity | Number of simultaneous ‹name› tunnels.
|
| options/nixos/systemd.targets.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/systemd.sockets.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/environment.etc.<name>.enable | Whether this /etc file should be generated
|
| options/nixos/networking.greTunnels.<name>.type | Whether the tunnel routes layer 2 (tap) or layer 3 (tun) traffic.
|
| options/nixos/boot.initrd.luks.devices.<name>.keyFileTimeout | The amount of time in seconds for a keyFile to appear before
timing out and trying passwords.
|
| options/nixos/systemd.sockets.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.targets.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/services.k3s.autoDeployCharts.<name>.repo | The repo of the Helm chart
|
| options/nixos/systemd.network.networks.<name>.dns | A list of dns servers to be added to the network section of the
unit
|
| options/nixos/systemd.network.networks.<name>.vrf | A list of vrf interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.network.networks.<name>.ntp | A list of ntp servers to be added to the network section of the
unit
|
| options/home-manager/launchd.agents.<name>.config.MachServices | This optional key is used to specify Mach services to be registered with the Mach bootstrap sub-system
|
| options/nixos/security.pam.services.<name>.limits.*.item | Item this limit applies to
|
| options/nixos/services.inadyn.settings.provider.<name>.hostname | Hostname alias(es).
|
| options/nixos/services.inadyn.settings.provider.<name>.username | Username for this DDNS provider.
|
| options/nixos/security.dhparams.params.<name>.bits | The bit size for the prime that is used during a Diffie-Hellman
key exchange.
|
| options/nixos/systemd.user.services.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.user.services.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/home-manager/services.podman.machines.<name>.cpus | Number of CPUs to allocate to the machine
|
| options/home-manager/services.podman.machines.<name>.swap | Swap size in MB for the machine
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.MulticastGroup | This optional key can be used to request that the datagram socket join a multicast group
|
| options/darwin/services.github-runners.<name>.group | Group under which to run the service
|
| options/nixos/networking.wlanInterfaces.<name>.device | The name of the underlying hardware WLAN device as assigned by udev.
|
| options/nixos/systemd.user.services.<name>.startAt | Automatically start this unit at the given date/time, which
must be in the format described in
systemd.time(7)
|
| options/nixos/security.acme.certs.<name>.directory | Directory where certificate and other state is stored.
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.nodelay | Enables TCP_NODELAY on the TCP socket.
|
| options/nixos/services.nsd.zones.<name>.rrlWhitelist | Whitelists the given rrl-types.
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.forward | The IP and port to forward all traffic to.
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.forward | The IP and port to forward all traffic to.
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.nodelay | Enables TCP_NODELAY on the TCP socket.
|
| options/nixos/services.i2pd.outTunnels.<name>.outbound.quantity | Number of simultaneous ‹name› tunnels.
|
| options/nixos/services.kubernetes.kubelet.taints.<name>.key | Key of taint.
|
| options/nixos/services.drupal.sites.<name>.virtualHost | Apache configuration can be done by adapting services.httpd.virtualHosts.
|
| options/nixos/systemd.user.timers.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/systemd.user.slices.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/home-manager/services.restic.backups.<name>.checkOpts | A list of options for 'restic check'
|
| options/nixos/boot.initrd.luks.devices.<name>.keyFileSize | The size of the key file
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.MulticastGroup | This optional key can be used to request that the datagram socket join a multicast group
|
| options/nixos/systemd.user.timers.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.user.slices.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/services.k3s.autoDeployCharts.<name>.hash | The hash of the packaged Helm chart
|
| options/nixos/services.wordpress.sites.<name>.extraConfig | Any additional text to be appended to the wp-config.php
configuration file
|
| options/home-manager/services.restic.backups.<name>.runCheck | Whether to run 'restic check' with the provided checkOpts options
|
| options/nixos/services.redis.servers.<name>.user | User account under which this instance of redis-server runs.
If left as the default value this user will automatically be
created on system activation, otherwise you are responsible for
ensuring the user exists before the redis service starts.
|
| options/nixos/security.pam.services.<name>.makeHomeDir | Whether to try to create home directories for users
with $HOMEs pointing to nonexistent
locations on session login.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.kanidm.provision.persons.<name>.legalName | Full legal name
|
| options/nixos/services.kimai.sites.<name>.database.user | Database user.
|
| options/nixos/services.logcheck.ignoreCron.<name>.user | User that runs the cronjob.
|
| options/nixos/services.prosody.virtualHosts.<name>.ssl | Paths to SSL files
|
| options/nixos/services.nebula.networks.<name>.isRelay | Whether this node is a relay.
|
| options/home-manager/programs.sftpman.mounts.<name>.mountPoint | The remote path to mount.
|
| options/nixos/security.pam.services.<name>.updateWtmp | Whether to update /var/log/wtmp.
|
| options/nixos/networking.greTunnels.<name>.local | The address of the local endpoint which the remote
side should send packets to.
|
| options/nixos/services.nylon.<name>.bindInterface | Tell nylon which interface to use as an uplink, default is "enp3s0f0".
|
| options/darwin/launchd.agents.<name>.serviceConfig.Label | This required key uniquely identifies the job to launchd.
|
| options/nixos/services.hostapd.radios.<name>.band | Specifies the frequency band to use, possible values are 2g for 2.4 GHz,
5g for 5 GHz, 6g for 6 GHz and 60g for 60 GHz.
|
| options/nixos/services.bacula-sd.director.<name>.tls.require | Require TLS or TLS-PSK encryption
|
| options/nixos/services.bacula-fd.director.<name>.tls.require | Require TLS or TLS-PSK encryption
|
| options/nixos/fileSystems.<name>.encrypted.enable | The block device is backed by an encrypted one, adds this device as a initrd luks entry.
|
| options/home-manager/programs.i3status-rust.bars.<name>.icons | The icons set to use
|
| options/nixos/services.rke2.autoDeployCharts.<name>.repo | The repo of the Helm chart
|
| options/nixos/containers.<name>.macvlans | The list of host interfaces from which macvlans will be
created
|
| options/nixos/systemd.user.services.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/services.postfix.masterConfig.<name>.type | The type of the service
|
| options/home-manager/programs.firefox.profiles.<name>.path | Profile path.
|
| options/nixos/services.metricbeat.modules.<name>.module | The name of the module
|
| options/nixos/security.pam.services.<name>.enableUMask | If enabled, the pam_umask module will be loaded.
|
| options/nixos/services.acpid.handlers.<name>.action | Shell commands to execute when the event is triggered.
|
| options/nixos/services.logcheck.ignore.<name>.regex | Regex specifying which log lines to ignore.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.groups.<name>.members | The members of this group
|
| options/nixos/services.xserver.xkb.extraLayouts.<name>.compatFile | The path to the xkb compat file
|
| options/nixos/services.drupal.sites.<name>.extraConfig | Extra configuration values that you want to insert into settings.php
|
| options/nixos/hardware.display.outputs.<name>.edid | An EDID filename to be used for configured display, as in edid/<filename>
|
| options/nixos/services.quicktun.<name>.timeWindow | Allowed time window for first received packet in seconds (positive number allows packets from history)
|
| options/nixos/services.phpfpm.pools.<name>.phpOptions | "Options appended to the PHP configuration file php.ini used for this PHP-FPM pool."
|
| options/nixos/systemd.user.targets.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/systemd.user.sockets.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/services.nginx.virtualHosts.<name>.quic | Whether to enable the QUIC transport protocol
|
| options/nixos/services.buildkite-agents.<name>.tags | Tags for the agent.
|
| options/nixos/services.quicktun.<name>.protocol | Which protocol to use.
|
| options/darwin/services.buildkite-agents.<name>.tags | Tags for the agent.
|
| options/nixos/services.r53-ddns.hostname | Manually specify the hostname
|
| options/nixos/services.ax25.axports.<name>.callsign | The callsign of the physical interface to bind to.
|
| options/nixos/services.kimai.sites.<name>.database.host | Database host address.
|
| options/nixos/services.kimai.sites.<name>.database.port | Database host port.
|
| options/nixos/services.netbird.clients.<name>.logLevel | Log level of the NetBird daemon.
|
| options/nixos/services.netbird.tunnels.<name>.logLevel | Log level of the NetBird daemon.
|
| options/nixos/services.uhub.<name>.plugins.*.settings | Settings specific to this plugin.
|
| options/nixos/programs.ssh.knownHosts.<name>.publicKey | The public key data for the host
|
| options/darwin/programs.ssh.knownHosts.<name>.publicKey | The public key data for the host
|
| options/nixos/security.auditd.plugins.<name>.type | This tells the dispatcher how the plugin wants to be run
|
| options/nixos/services.nsd.zones.<name>.maxRefreshSecs | Limit refresh time for secondary zones
|
| options/nixos/boot.initrd.luks.devices.<name>.fido2.gracePeriod | Time in seconds to wait for the FIDO2 key.
|
| options/nixos/boot.initrd.luks.devices.<name>.gpgCard.gracePeriod | Time in seconds to wait for the GPG Smartcard.
|
| options/home-manager/programs.firefox.profiles.<name>.id | Profile ID
|
| options/home-manager/services.colima.profiles.<name>.logFile | Combined stdout and stderr log file for the Colima service.
|
| options/nixos/services.rke2.autoDeployCharts.<name>.hash | The hash of the packaged Helm chart
|
| options/nixos/services.filebeat.inputs.<name>.type | The input type
|
| options/nixos/services.tahoe.nodes.<name>.client.helper | The furl for a Tahoe helper node
|
| options/nixos/systemd.services.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/systemd.user.targets.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.user.sockets.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/security.acme.certs.<name>.dnsProvider | DNS Challenge provider
|
| options/home-manager/launchd.agents.<name>.config.OnDemand | This key was used in Mac OS X 10.4 to control whether a job was kept alive or not
|
| options/nixos/services.frp.instances.<name>.enable | Whether to enable frp.
|
| options/nixos/services.akkoma.frontends.<name>.ref | Akkoma frontend reference.
|
| options/nixos/services.tinc.networks.<name>.package | The tinc_pre package to use.
|
| options/nixos/services.redis.servers.<name>.unixSocketPerm | Change permissions for the socket
|
| options/nixos/services.github-runners.<name>.package | The github-runner package to use.
|
| options/darwin/services.github-runners.<name>.package | The github-runner package to use.
|
| options/nixos/services.github-runners.<name>.user | User under which to run the service
|
| options/nixos/services.znapzend.zetup.<name>.plan | The znapzend backup plan to use for the source
|
| options/nixos/security.pam.services.<name>.nodelay | Whether the delay after typing a wrong password should be disabled.
|
| options/home-manager/services.podman.images.<name>.extraConfig | INI sections and values to populate the Image Quadlet.
|
| options/home-manager/services.podman.builds.<name>.extraConfig | INI sections and values to populate the Build Quadlet.
|
| options/home-manager/accounts.email.accounts.<name>.imap.port | The port on which the IMAP server listens
|
| options/home-manager/accounts.email.accounts.<name>.smtp.port | The port on which the SMTP server listens
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/home-manager/launchd.agents.<name>.config.ServiceIPC | This optional key specifies whether the job participates in advanced
communication with launchd
|
| options/nixos/services.phpfpm.pools.<name>.extraConfig | Extra lines that go into the pool configuration
|
| options/nixos/systemd.network.networks.<name>.bond | A list of bond interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.network.networks.<name>.vlan | A list of vlan interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.network.networks.<name>.xfrm | A list of xfrm interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.user.sockets.<name>.socketConfig | Each attribute in this set specifies an option in the
[Socket] section of the unit
|
| options/nixos/programs.ssh.knownHosts.<name>.extraHostNames | A list of additional host names and/or IP numbers used for
accessing the host's ssh service
|
| options/darwin/programs.ssh.knownHosts.<name>.extraHostNames | A list of additional host names and/or IP numbers used for
accessing the host's ssh service
|
| options/nixos/systemd.services.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/services.headscale.settings.database.postgres.name | Database name.
|
| options/nixos/services.httpd.virtualHosts.<name>.adminAddr | E-mail address of the server administrator.
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.ksk.keySize | Key size in bits
|
| options/nixos/services.tor.relay.onionServices.<name>.map | See torrc manual.
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.zsk.keySize | Key size in bits
|
| options/home-manager/launchd.agents.<name>.config.InitGroups | This optional key specifies whether initgroups(3) should be called before running the job
|
| options/nixos/services.h2o.hosts.<name>.acme.useHost | An existing Let’s Encrypt certificate to use for this virtual
host
|
| options/nixos/hardware.sane.brscan5.netDevices.<name>.ip | The ip address of the device
|
| options/nixos/security.pam.services.<name>.fprintAuth | If set, fingerprint reader will be used (if exists and
your fingerprints are enrolled).
|
| options/nixos/hardware.sane.brscan4.netDevices.<name>.ip | The ip address of the device
|
| options/nixos/security.pam.services.<name>.rssh | If set, the calling user's SSH agent is used to authenticate
against the configured keys
|
| options/nixos/services.gitwatch.<name>.message | Optional text to use in as commit message; all occurrences of %d will be replaced by formatted date/time
|
| options/nixos/services.dokuwiki.sites.<name>.aclFile | Location of the dokuwiki acl rules
|
| options/nixos/security.pam.services.<name>.limits.*.value | Value of this limit
|
| options/nixos/services.k3s.manifests.<name>.source | Path of the source .yaml file.
|
| options/nixos/services.k3s.manifests.<name>.enable | Whether this manifest file should be generated.
|
| options/home-manager/programs.smug.projects.<name>.windows | Windows to create in the project session
|
| options/nixos/services.redis.servers.<name>.save | The schedule in which data is persisted to disk, represented as a list of lists where the first element represent the amount of seconds and the second the number of changes
|
| options/nixos/services.fedimintd.<name>.nginx.path | Path to host the API on and forward to the daemon's api port
|
| options/nixos/services.pppd.peers.<name>.autostart | Whether the PPP session is automatically started at boot time.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.controlPath | Specify path to the control socket used for connection sharing.
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.settings.<name>.settings | Json formatted options for this extension.
|
| options/nixos/services.dokuwiki.sites.<name>.acl.*.level | Permission level to restrict the actor(s) to
|
| options/nixos/services.bepasty.servers.<name>.workDir | Path to the working directory (used for config and pidfile)
|
| options/nixos/programs.neovim.runtime.<name>.enable | Whether this runtime directory should be generated
|
| options/nixos/services.spiped.config.<name>.encrypt | Take unencrypted connections from the
source socket and send encrypted
connections to the target socket.
|
| options/nixos/services.spiped.config.<name>.decrypt | Take encrypted connections from the
source socket and send unencrypted
connections to the target socket.
|
| options/nixos/systemd.paths.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.targets.<name>.requisite | Similar to requires
|
| options/nixos/systemd.sockets.<name>.requisite | Similar to requires
|
| options/nixos/services.nginx.virtualHosts.<name>.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.firewalld.zones.<name>.short | Short description for the zone.
|
| options/nixos/services.firewalld.zones.<name>.rules | Rich rules for the zone.
|
| options/nixos/services.firewalld.zones.<name>.ports | Ports to allow in the zone.
|
| options/nixos/boot.initrd.systemd.contents.<name>.target | Path of the symlink.
|
| options/nixos/services.restic.backups.<name>.package | The restic package to use.
|
| options/home-manager/services.restic.backups.<name>.package | The restic package to use.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.dynamicConfigScripts | All of these scripts will be executed in lexicographical order before hostapd
is started, right after the bss segment was generated and may dynamically
append bss options to the generated configuration file
|
| options/nixos/networking.interfaces.<name>.useDHCP | Whether this interface should be configured with DHCP
|
| options/nixos/services.redis.servers.<name>.extraParams | Extra parameters to append to redis-server invocation
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.subnets.*.address | The subnet of this host
|
| options/nixos/services.ndppd.proxies.<name>.timeout | Controls how long to wait for a Neighbor Advertisement Message before
invalidating the entry, in milliseconds.
|
| options/nixos/services.quicktun.<name>.remoteFloat | Whether to allow the remote address and port to change when properly encrypted packets are received.
|
| options/nixos/services.znapzend.zetup.<name>.destinations.<name>.presend | Command to run before sending the snapshot to the destination
|
| options/nixos/security.pam.services.<name>.limits | Attribute set describing resource limits
|
| options/home-manager/launchd.agents.<name>.config.LimitLoadToHosts | This configuration file only applies to the hosts listed with this key
|
| options/nixos/systemd.user.sockets.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/systemd.user.services.<name>.scriptArgs | Arguments passed to the main process script
|
| options/nixos/systemd.user.targets.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/systemd.network.netdevs.<name>.enable | Whether to manage network configuration using systemd-network
|
| options/nixos/services.cjdns.ETHInterface.connectTo.<name>.hostname | Optional hostname to add to /etc/hosts; prevents reverse lookup failures.
|
| options/nixos/services.cjdns.UDPInterface.connectTo.<name>.hostname | Optional hostname to add to /etc/hosts; prevents reverse lookup failures.
|
| options/nixos/services.fedimintd.<name>.package | The fedimint package to use.
|
| options/nixos/services.rspamd.overrides.<name>.text | Text of the file.
|
| options/nixos/services.yandex-disk.username | Your yandex.com login name.
|
| options/nixos/services.tahoe.nodes.<name>.storage.enable | Whether to enable storage service.
|
| options/nixos/services.wyoming.piper.servers.<name>.uri | URI to bind the wyoming server to.
|
| options/home-manager/accounts.email.accounts.<name>.mu.enable | Whether to enable mu indexing.
|
| options/nixos/services.fedimintd.<name>.nginx.fqdn | Public domain of the API address of the reverse proxy/tls terminator.
|
| options/nixos/services.h2o.hosts.<name>.tls.identity.*.key-file | Path to key file
|
| options/home-manager/services.podman.machines.<name>.image | Bootable image to use for the machine
|
| options/nixos/services.fedimintd.<name>.dataDir | Path to the data dir fedimintd will use to store its data
|
| options/nixos/services.httpd.virtualHosts.<name>.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| options/nixos/services.nginx.virtualHosts.<name>.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| options/nixos/services.httpd.virtualHosts.<name>.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| options/nixos/services.nginx.virtualHosts.<name>.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/systemd.user.slices.<name>.requisite | Similar to requires
|
| options/nixos/systemd.user.timers.<name>.requisite | Similar to requires
|
| options/nixos/systemd.services.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/services.buildkite-agents.<name>.dataDir | The workdir for the agent
|
| options/darwin/system.activationScripts.<name>.text | Text of the file.
|
| options/darwin/services.buildkite-agents.<name>.dataDir | The workdir for the agent
|
| options/nixos/services.firezone.server.provision.accounts.<name>.policies.<name>.group | The group which should be allowed access to the given resource.
|
| options/nixos/services.xserver.xkb.extraLayouts.<name>.symbolsFile | The path to the xkb symbols file
|
| options/home-manager/programs.ssh.matchBlocks.<name>.hashKnownHosts | Indicates that
ssh(1)
should hash host names and addresses when they are added to
the known hosts file.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.preferShortUsername | Use 'name' instead of 'spn' in the preferred_username claim
|
| options/nixos/services.jupyter.kernels.<name>.logo64 | Path to 64x64 logo png.
|
| options/nixos/services.jupyter.kernels.<name>.logo32 | Path to 32x32 logo png.
|
| options/nixos/networking.greTunnels.<name>.remote | The address of the remote endpoint to forward traffic over.
|
| options/nixos/boot.initrd.systemd.contents.<name>.source | Path of the source file.
|
| options/nixos/services.nginx.virtualHosts.<name>.listen.*.ssl | Enable SSL.
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.keyttl | TTL for dnssec records
|
| options/nixos/services.rke2.manifests.<name>.source | Path of the source .yaml file.
|
| options/nixos/services.rke2.manifests.<name>.enable | Whether this manifest file should be generated.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.proxyCommand | The command to use to connect to the server.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.extraOptions | Extra configuration options for the host.
|
| options/nixos/boot.loader.grub.users.<name>.passwordFile | Specifies the path to a file containing the
clear text password for the account
|
| options/nixos/services.redis.servers.<name>.appendFsync | How often to fsync the append-only log, options: no, always, everysec.
|
| options/home-manager/xdg.configFile.<name>.recursive | If the file source is a directory, then this option
determines whether the directory should be recursively
linked to the target location
|
| options/nixos/services.redis.servers.<name>.group | Group account under which this instance of redis-server runs.
If left as the default value this group will automatically be
created on system activation, otherwise you are responsible for
ensuring the group exists before the redis service starts.
|
| options/nixos/services.sympa.settingsFile.<name>.source | Path of the source file.
|
| options/nixos/services.sanoid.datasets.<name>.yearly | Number of yearly snapshots.
|
| options/nixos/services.sanoid.datasets.<name>.hourly | Number of hourly snapshots.
|
| options/nixos/services.nebula.networks.<name>.enable | Enable or disable this network.
|
| options/home-manager/services.podman.networks.<name>.driver | The network driver to use.
|
| options/home-manager/programs.obsidian.vaults.<name>.enable | Whether this vault should be generated.
|
| options/home-manager/services.podman.networks.<name>.labels | The labels to apply to the network.
|
| options/home-manager/services.podman.networks.<name>.subnet | The subnet to use for the network.
|
| options/nixos/virtualisation.emptyDiskImages.*.driveConfig.name | A name for the drive
|
| options/nixos/networking.bonds.<name>.miimon | DEPRECATED, use driverOptions
|
| options/nixos/users.users.<name>.ignoreShellProgramCheck | By default, nixos will check that programs
|
| options/nixos/services.i2pd.inTunnels.<name>.crypto.tagsToSend | Number of ElGamal/AES tags to send.
|
| options/nixos/services.httpd.virtualHosts.<name>.listen.*.ip | IP to listen on. 0.0.0.0 for IPv4 only, * for all.
|
| options/home-manager/programs.sftpman.mounts.<name>.mountDestPath | The path on the current machine where the remote path would be mounted.
|
| options/nixos/services.nsd.zones.<name>.multiMasterCheck | If enabled, checks all masters for the last zone version
|
| options/nixos/services.nylon.<name>.allowedIPRanges | Allowed client IP ranges are evaluated first, defaults to ARIN IPv4 private ranges:
[ "192.168.0.0/16" "127.0.0.0/8" "172.16.0.0/12" "10.0.0.0/8" ]
|
| options/nixos/security.acme.certs.<name>.renewInterval | Systemd calendar expression when to check for renewal
|
| options/nixos/services.httpd.virtualHosts.<name>.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| options/nixos/services.nginx.virtualHosts.<name>.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| options/nixos/services.redis.servers.<name>.appendOnly | By default data is only periodically persisted to disk, enable this option to use an append-only file for improved persistence.
|
| options/nixos/services.spiped.config.<name>.timeout | Timeout, in seconds, after which an attempt to connect to
the target or a protocol handshake will be aborted (and the
connection dropped) if not completed
|
| options/home-manager/programs.ssh.matchBlocks.<name>.forwardX11 | Specifies whether X11 connections will be automatically redirected
over the secure channel and DISPLAY set.
|
| options/home-manager/accounts.contact.accounts.<name>.local.encoding | File encoding for items, both content and file name
|
| options/nixos/services.prometheus.scrapeConfigs.*.label_name_length_limit | Per-scrape limit on length of labels name that will be accepted for a sample
|
| options/nixos/services.drupal.sites.<name>.privateFilesDir | The location of the Drupal private files directory.
|
| options/nixos/security.pam.services.<name>.failDelay.delay | The delay time (in microseconds) on failure.
|
| options/nixos/services.openvpn.servers.<name>.autoStart | Whether this OpenVPN instance should be started automatically.
|
| options/nixos/systemd.paths.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.type | The resource type
|
| options/nixos/systemd.user.sockets.<name>.listenStreams | For each item in this list, a ListenStream
option in the [Socket] section will be created.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Nice | This optional key specifies what nice(3) value should be applied to the daemon.
|
| options/home-manager/services.podman.machines.<name>.diskSize | Disk size in GB for the machine
|
| options/nixos/systemd.user.tmpfiles.users.<name>.rules | Per-user rules for creation, deletion and cleaning of volatile and
temporary files automatically
|
| options/nixos/services.bacula-sd.director.<name>.tls.key | The path of a PEM encoded TLS private key
|
| options/nixos/security.pam.services.<name>.yubicoAuth | If set, users listed in
~/.yubico/authorized_yubikeys
are able to log in with the associated Yubikey tokens.
|
| options/nixos/services.bacula-fd.director.<name>.tls.key | The path of a PEM encoded TLS private key
|
| options/darwin/launchd.agents.<name>.serviceConfig.Debug | This optional key specifies that launchd should adjust its log mask temporarily to LOG_DEBUG while
dealing with this job.
|
| options/home-manager/services.kanshi.profiles.<name>.exec | Commands executed after the profile is successfully applied
|
| options/nixos/services.drupal.sites.<name>.virtualHost.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/nixos/services.jupyterhub.kernels.<name>.displayName | Name that will be shown to the user.
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.settings.<name>.force | Forcibly override any existing configuration for
this extension.
|
| options/nixos/services.quicktun.<name>.localAddress | IP address or hostname of the local end.
|
| options/nixos/services.prosody.virtualHosts.<name>.ssl.key | Path to the key file.
|
| options/nixos/systemd.network.netdevs.<name>.extraConfig | Extra configuration append to unit
|
| options/home-manager/services.pizauth.accounts.<name>.authUri | The OAuth2 server's authentication URI.
|
| options/home-manager/programs.floorp.profiles.<name>.search | Declarative search engine configuration.
|
| options/darwin/services.github-runners.<name>.workDir | Working directory, available as $GITHUB_WORKSPACE during workflow runs
and used as a default for repository checkouts
|
| options/darwin/users.users.<name>.ignoreShellProgramCheck | By default, nix-darwin will check that programs
|
| options/home-manager/launchd.agents.<name>.config.Program | This key maps to the first argument of execvp(3)
|
| options/nixos/boot.initrd.clevis.devices.<name>.secretFile | Clevis JWE file used to decrypt the device at boot, in concert with the chosen pin (one of TPM2, Tang server, or SSS).
|
| options/nixos/containers.<name>.timeoutStartSec | Time for the container to start
|
| options/nixos/services.dokuwiki.sites.<name>.package | The dokuwiki package to use.
|
| options/nixos/services.drupal.sites.<name>.database.user | Database user.
|
| options/nixos/services.znapzend.zetup.<name>.dataset | The dataset to use for this source.
|
| options/nixos/containers.<name>.allowedDevices | A list of device nodes to which the containers has access to.
|
| options/home-manager/accounts.email.accounts.<name>.aliases | Alternative identities of this account.
|
| options/home-manager/accounts.email.accounts.<name>.address | The email address of this account.
|
| options/home-manager/services.restic.backups.<name>.ssh-package | The openssh package to use.
|
| options/home-manager/accounts.contact.accounts.<name>.local | Local configuration for the contacts.
|
| options/home-manager/accounts.email.accounts.<name>.maildir | Maildir configuration for this account.
|
| options/home-manager/accounts.email.accounts.<name>.folders | Standard email folders.
|
| options/home-manager/programs.sftpman.mounts.<name>.beforeMount | Command to run before mounting.
|
| options/nixos/services.i2pd.outTunnels.<name>.crypto.tagsToSend | Number of ElGamal/AES tags to send.
|
| options/nixos/boot.initrd.systemd.contents.<name>.enable | Whether to enable copying of this file and symlinking it.
|
| options/nixos/services.tahoe.nodes.<name>.sftpd.hostPublicKeyFile | Path to the SSH host public key.
|
| options/nixos/services.opensearch.settings."cluster.name" | The name of the cluster.
|
| options/nixos/services.h2o.hosts.<name>.tls.extraSettings | Additional TLS/SSL-related configuration options
|
| options/nixos/services.public-inbox.inboxes.<name>.watch | Paths for public-inbox-watch(1) to monitor for new mail.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Nice | This optional key specifies what nice(3) value should be applied to the daemon.
|
| options/nixos/security.acme.certs.<name>.dnsResolver | Set the resolver to use for performing recursive DNS queries
|
| options/nixos/systemd.network.links.<name>.matchConfig | Each attribute in this set specifies an option in the
[Match] section of the unit
|
| options/home-manager/launchd.agents.<name>.config.LaunchOnlyOnce | This optional key specifies whether the job can only be run once and only once
|
| options/nixos/systemd.network.networks.<name>.vxlan | A list of vxlan interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.network.netdevs.<name>.tapConfig | Each attribute in this set specifies an option in the
[Tap] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.tunConfig | Each attribute in this set specifies an option in the
[Tun] section of the unit
|
| options/darwin/launchd.agents.<name>.serviceConfig.RunAtLoad | This optional key is used to control whether your job is launched once at the time the job is loaded
|
| options/nixos/services.rss2email.feeds.<name>.to | Email address to which to send feed items
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.settings.<name>.settings | Json formatted options for this extension.
|
| options/nixos/containers.<name>.forwardPorts.*.hostPort | Source port of the external interface on host
|
| options/home-manager/services.podman.machines.<name>.autoStart | Whether to automatically start this machine on login.
|
| options/home-manager/programs.smug.projects.<name>.beforeStart | Commands to execute before the tmux-session starts.
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.threads | Sets the number of worker threads to use
|
| options/darwin/launchd.agents.<name>.serviceConfig.UserName | This optional key specifies the user to run the job as
|
| options/nixos/systemd.paths.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/services.drupal.sites.<name>.database.host | Database host address.
|
| options/nixos/services.borgbackup.jobs.<name>.repo | Remote or local repository to back up to.
|
| options/nixos/services.drupal.sites.<name>.database.port | Database host port.
|
| options/nixos/services.httpd.virtualHosts.<name>.listen.*.port | Port to listen on
|
| options/nixos/hardware.sane.brscan4.netDevices.<name>.model | The model of the network device.
|
| options/nixos/services.iodine.clients.<name>.extraConfig | Additional command line parameters
|
| options/nixos/hardware.sane.brscan5.netDevices.<name>.model | The model of the network device.
|
| options/nixos/services.nginx.virtualHosts.<name>.listen.*.addr | Listen address.
|
| options/home-manager/programs.irssi.networks.<name>.server.port | Port of the chat server.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.enable | Whether to enable aerc.
|
| options/nixos/services.easytier.instances.<name>.settings | Settings to generate easytier-‹name›.toml
|
| options/nixos/services.httpd.virtualHosts.<name>.listen.*.ssl | Whether to enable SSL (https) support.
|
| options/nixos/services.restic.backups.<name>.exclude | Patterns to exclude when backing up
|
| options/nixos/systemd.user.sockets.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/systemd.user.targets.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/security.pam.services.<name>.u2fAuth | If set, users listed in
$XDG_CONFIG_HOME/Yubico/u2f_keys (or
$HOME/.config/Yubico/u2f_keys if XDG variable is
not set) are able to log in with the associated U2F key
|
| options/nixos/services.frp.instances.<name>.role | The frp consists of client and server
|
| options/home-manager/fonts.fontconfig.configFile.<name>.text | Verbatim contents of the config file
|
| options/nixos/systemd.user.sockets.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.user.targets.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.packages | List of ‹name› add-on packages to install for this profile
|
| options/nixos/services.hans.clients.<name>.passwordFile | File that contains password
|
| options/nixos/services.nginx.virtualHosts.<name>.default | Makes this vhost the default.
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.slick.font.name | Name of the font to use.
|
| options/nixos/services.geth.<name>.websocket.enable | Whether to enable Go Ethereum WebSocket API.
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.recvTimeout | An application timeout on receiving data from the TCP socket.
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.recvTimeout | An application timeout on receiving data from the TCP socket.
|
| options/nixos/services.nebula.networks.<name>.relays | List of IPs of relays that this node should allow traffic from.
|
| options/nixos/systemd.services.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Label | This required key uniquely identifies the job to launchd.
|
| options/home-manager/services.podman.builds.<name>.extraPodmanArgs | Extra arguments to pass to the podman build command.
|
| options/nixos/boot.specialFileSystems.<name>.stratis.poolUuid | UUID of the stratis pool that the fs is located in
This is only relevant if you are using stratis.
|
| options/nixos/services.nsd.zones.<name>.allowAXFRFallback | If NSD as secondary server should be allowed to AXFR if the primary
server does not allow IXFR.
|
| options/nixos/containers.<name>.forwardPorts | List of forwarded ports from host to container
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.gtk.theme.name | Name of the theme to use for the lightdm-gtk-greeter.
|
| options/nixos/services.znapzend.zetup.<name>.destinations.<name>.postsend | Command to run after sending the snapshot to the destination
|
| options/nixos/boot.initrd.luks.devices.<name>.keyFileOffset | The offset of the key file
|
| options/nixos/services.znapzend.zetup.<name>.sendDelay | Specify delay (in seconds) before sending snaps to the destination
|
| options/nixos/systemd.services.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/home-manager/accounts.email.accounts.<name>.jmap.host | Hostname of JMAP server
|
| options/home-manager/launchd.agents.<name>.config.LimitLoadFromHosts | This configuration file only applies to hosts NOT listed with this key
|
| options/nixos/services.firewalld.zones.<name>.ports.*.port | |
| options/nixos/services.nginx.virtualHosts.<name>.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.nginx.virtualHosts.<name>.kTLS | Whether to enable kTLS support
|
| options/nixos/services.httpd.virtualHosts.<name>.sslServerKey | Path to server SSL certificate key.
|
| options/nixos/networking.interfaces.<name>.virtualType | The type of interface to create
|
| options/nixos/services.postgresql.systemCallFilter.<name>.enable | Whether to enable ‹name› in postgresql's syscall filter.
|
| options/nixos/services.mobilizon.settings.":mobilizon".":instance".name | The fallback instance name if not configured into the admin UI
|
| options/nixos/security.pam.services.<name>.gnupg.storeOnly | Don't send the password immediately after login, but store for PAM
session.
|
| options/nixos/services.snapper.configs.<name>.FSTYPE | Filesystem type
|
| options/home-manager/programs.ssh.matchBlocks.<name>.forwardAgent | Whether the connection to the authentication agent (if any)
will be forwarded to the remote machine.
|
| options/home-manager/programs.i3status-rust.bars.<name>.blocks | Configuration blocks to add to i3status-rust
config
|
| options/home-manager/programs.vscode.profiles.<name>.userMcp | Configuration written to Visual Studio Code's
mcp.json
|
| options/nixos/services.jupyterhub.kernels.<name>.language | Language of the environment
|
| options/home-manager/programs.rclone.remotes.<name>.config | Regular configuration options as described in rclone's documentation
https://rclone.org/docs/
|
| options/nixos/services.geoclue2.appConfig.<name>.isSystem | Whether the application is a system component or not.
|
| options/nixos/services.errbot.instances.<name>.dataDir | Data directory for errbot instance.
|
| options/nixos/services.prosody.virtualHosts.<name>.ssl.cert | Path to the certificate file.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.node | The node where the rule should be applied.
|
| options/nixos/services.restic.backups.<name>.paths | Which paths to backup, in addition to ones specified via
dynamicFilesFrom
|
| options/nixos/boot.initrd.luks.devices.<name>.postOpenCommands | Commands that should be run right after we have mounted our LUKS device.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Label | This required key uniquely identifies the job to launchd.
|
| options/home-manager/programs.obsidian.vaults.<name>.target | Path to target vault relative to the user's HOME.
|
| options/home-manager/services.podman.images.<name>.extraPodmanArgs | Extra arguments to pass to the podman image pull command.
|
| options/home-manager/services.podman.networks.<name>.autoStart | Whether to start the network on boot (requires user lingering).
|
| options/nixos/services.prometheus.exporters.rtl_433.channels.*.name | Name to match.
|
| options/nixos/services.dokuwiki.sites.<name>.acl | Access Control Lists: see https://www.dokuwiki.org/acl
Mutually exclusive with services.dokuwiki.aclFile
Set this to a value other than null to take precedence over aclFile option
|
| options/nixos/containers.<name>.localAddress | The IPv4 address assigned to the interface in the container
|
| options/nixos/services.wstunnel.clients.<name>.tlsSNI | Use this as the SNI while connecting via TLS
|
| options/nixos/systemd.slices.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.timers.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.homebridge.settings.accessories.*.name | Name of the accessory
|
| options/nixos/services.kanidm.provision.persons.<name>.displayName | Display name
|
| options/nixos/services.dokuwiki.sites.<name>.phpPackage | The php package to use.
|
| options/nixos/services.sanoid.templates.<name>.daily | Number of daily snapshots.
|
| options/nixos/services.redis.servers.<name>.requirePassFile | File with password for the database.
|
| options/nixos/services.vault-agent.instances.<name>.user | User under which this instance runs.
|
| options/nixos/services.honk.servername | The server name.
|
| options/home-manager/services.podman.volumes.<name>.extraConfig | INI sections and values to populate the Volume Quadlet.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.groups.<name>.forceMembers | Ensure that only the given members are part of this group at every server start.
|
| options/home-manager/services.activitywatch.watchers.<name>.executable | The name of the executable of the watcher
|
| options/nixos/services.fedimintd.<name>.nginx.config.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/security.dhparams.params.<name>.path | The resulting path of the generated Diffie-Hellman parameters
file for other services to reference
|
| options/nixos/services.github-runners.<name>.enable | Whether to enable GitHub Actions runner
|
| options/darwin/services.github-runners.<name>.enable | Whether to enable GitHub Actions runner
|
| options/nixos/services.nginx.virtualHosts.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/systemd.network.netdevs.<name>.wlanConfig | Each attribute in this set specifies an option in the [WLAN] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.l2tpConfig | Each attribute in this set specifies an option in the
[L2TP] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.xfrmConfig | Each attribute in this set specifies an option in the
[Xfrm] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.vlanConfig | Each attribute in this set specifies an option in the
[VLAN] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.bondConfig | Each attribute in this set specifies an option in the
[Bond] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.peerConfig | Each attribute in this set specifies an option in the
[Peer] section of the unit
|
| options/home-manager/launchd.agents.<name>.config.LowPriorityIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O.
|
| options/nixos/users.mysql.pam.userColumn | The name of the column that contains a unix login name.
|
| options/nixos/services.jupyter.kernels.<name>.extraPaths | Extra paths to link in kernel directory
|
| options/nixos/services.ytdl-sub.instances.<name>.enable | Whether to enable ytdl-sub instance.
|
| options/home-manager/home.file.<name>.ignorelinks | When recursive is enabled, adds -ignorelinks flag to lndir
It causes lndir to not treat symbolic links in the source directory specially
|
| options/nixos/services.kanata.keyboards.<name>.port | Port to run the TCP server on. null will not run the server.
|
| options/nixos/security.acme.certs.<name>.reloadServices | The list of systemd services to call systemctl try-reload-or-restart
on.
|
| options/nixos/services.sympa.settingsFile.<name>.enable | Whether this file should be generated
|
| options/home-manager/services.podman.machines.<name>.memory | Memory in MB to allocate to the machine
|
| options/home-manager/services.podman.images.<name>.password | Password used to connect to registry. (Will be visible in nix store)
|
| options/darwin/environment.launchAgents.<name>.text | Text of the file.
|
| options/nixos/services.wstunnel.servers.<name>.tlsKey | TLS key to use instead of the hardcoded on in case of HTTPS connections
|
| options/nixos/services.fedimintd.<name>.api_ws.url | Public URL of the API address of the reverse proxy/tls terminator
|
| options/nixos/systemd.services.<name>.serviceConfig | Each attribute in this set specifies an option in the
[Service] section of the unit
|
| options/nixos/systemd.user.services.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/darwin/launchd.agents.<name>.serviceConfig.TimeOut | The recommended idle time out (in seconds) to pass to the job
|
| options/home-manager/xdg.desktopEntries.<name>.startupNotify | If true, it is KNOWN that the application will send a "remove"
message when started with the DESKTOP_STARTUP_ID
environment variable set
|
| options/home-manager/accounts.email.accounts.<name>.enable | Whether this account is enabled
|
| options/nixos/image.repart.partitions.<name>.storePaths | The store paths to include in the partition.
|
| options/nixos/services.fedimintd.<name>.nginx.enable | Whether to configure nginx for fedimintd
|
| options/nixos/services.drupal.sites.<name>.virtualHost.hostName | Canonical hostname for the server.
|
| options/nixos/services.firewalld.zones.<name>.target | Action for packets that doesn't match any rules.
|
| options/nixos/services.httpd.virtualHosts.<name>.sslServerCert | Path to server SSL certificate.
|
| options/home-manager/programs.retroarch.cores.<name>.enable | Whether to enable RetroArch core.
|
| options/home-manager/services.pizauth.accounts.<name>.tokenUri | The OAuth2 server's token URI.
|
| options/nixos/fileSystems.<name>.overlay.upperdir | The path to the upperdir
|
| options/nixos/services.httpd.virtualHosts.<name>.servedDirs | This option provides a simple way to serve static directories.
|
| options/nixos/security.pam.services.<name>.ttyAudit.enable | Enable or disable TTY auditing for specified users
|
| options/nixos/services.hostapd.radios.<name>.wifi6.enable | Enables support for IEEE 802.11ax (WiFi 6, HE)
|
| options/nixos/services.redis.servers.<name>.settings | Redis configuration
|
| options/nixos/services.tahoe.nodes.<name>.client.shares.total | The number of shares required to store a file.
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.enso.theme.name | Name of the theme to use for the lightdm-enso-os-greeter
|
| options/nixos/containers.<name>.localAddress6 | The IPv6 address assigned to the interface in the container
|
| options/nixos/security.pam.services.<name>.usshAuth | If set, users with an SSH certificate containing an authorized principal
in their SSH agent are able to log in
|
| options/nixos/systemd.network.networks.<name>.routes | A list of route sections to be added to the unit
|
| options/home-manager/services.restic.backups.<name>.exclude | Patterns to exclude when backing up
|
| options/nixos/services.geoclue2.appConfig.<name>.users | List of UIDs of all users for which this application is allowed location
info access, Defaults to an empty string to allow it for all users.
|
| options/nixos/services.vdirsyncer.jobs.<name>.group | group to run vdirsyncer as
|
| options/home-manager/xdg.desktopEntries.<name>.categories | Categories in which the entry should be shown in a menu.
|
| options/nixos/services.github-runners.<name>.url | Repository to add the runner to
|
| options/darwin/services.github-runners.<name>.url | Repository to add the runner to
|
| options/nixos/systemd.user.services.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/services.suricata.settings.outputs.*.<name>.enabled | Whether to enable .
|
| options/nixos/services.buildkite-agents.<name>.hooks | "Agent" hooks to install
|
| options/nixos/containers.<name>.restartIfChanged | Whether the container should be restarted during a NixOS
configuration switch if its definition has changed.
|
| options/nixos/services.ytdl-sub.instances.<name>.config | Configuration for ytdl-sub
|
| options/nixos/systemd.paths.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/hardware.display.outputs.<name>.mode | A video kernel parameter (framebuffer mode) configuration for the specific output:
<xres>x<yres>[M][R][-<bpp>][@<refresh>][i][m][eDd]
See for more information:
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.twoFactor | Whether to use a passphrase and a YubiKey (true), or only a YubiKey (false).
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.keyLength | Length of the LUKS slot key derived with PBKDF2 in byte.
|
| options/nixos/services.fedimintd.<name>.api_ws.bind | Address to bind on for API connections relied by the reverse proxy/tls terminator.
|
| options/nixos/boot.loader.grub.users.<name>.hashedPassword | Specifies the password hash for the account,
generated with grub-mkpasswd-pbkdf2
|
| options/nixos/services.awstats.configs.<name>.logFile | The log file to be scanned
|
| options/nixos/services.postfix.masterConfig.<name>.args | Arguments to pass to the command
|
| options/nixos/services.syncoid.commands.<name>.sshKey | SSH private key file to use to login to the remote system
|
| options/nixos/services.tinc.networks.<name>.debugLevel | The amount of debugging information to add to the log. 0 means little
logging while 5 is the most logging. man tincd for
more details.
|
| options/nixos/systemd.shutdownRamfs.contents.<name>.text | Text of the file.
|
| options/home-manager/services.kanshi.profiles.<name>.outputs | Outputs configuration.
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.packages | List of ‹name› add-on packages to install for this profile
|
| options/nixos/services.keepalived.vrrpInstances.<name>.vmacInterface | Name of the vmac interface to use. keepalived will come up with a name
if you don't specify one.
|
| options/nixos/services.wyoming.piper.servers.<name>.piper | The piper-tts package to use.
|
| options/nixos/services.fedimintd.<name>.nginx.config | Overrides to the nginx vhost section for api
|
| options/nixos/services.tahoe.nodes.<name>.sftpd.accounts.url | URL of the accounts server.
|
| options/nixos/services.sympa.domains.<name>.webLocation | URL path part of the web interface.
|
| options/nixos/services.neo4j.ssl.policies.<name>.clientAuth | The client authentication stance for this policy.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.addressFamily | Specifies which address family to use when connecting.
|
| options/nixos/fileSystems.<name>.overlay.lowerdir | The list of path(s) to the lowerdir(s)
|
| options/nixos/networking.jool.siit | Definitions of SIIT instances of Jool
|
| options/nixos/services.github-runners.<name>.workDir | Working directory, available as $GITHUB_WORKSPACE during workflow runs
and used as a default for repository checkouts
|
| options/nixos/services.hostapd.radios.<name>.wifi5.enable | Enables support for IEEE 802.11ac (WiFi 5, VHT)
|
| options/nixos/services.netbird.tunnels.<name>.ui.enable | Controls presence of netbird-ui wrapper for this NetBird client.
|
| options/nixos/services.tarsnap.archives.<name>.maxbw | Abort archival if upstream bandwidth usage in bytes
exceeds this threshold.
|
| options/nixos/services.netbird.clients.<name>.ui.enable | Controls presence of netbird-ui wrapper for this NetBird client.
|
| options/nixos/services.vdirsyncer.jobs.<name>.user | User account to run vdirsyncer as, otherwise as a systemd
dynamic user
|
| options/home-manager/accounts.email.accounts.<name>.primary | Whether this is the primary account
|
| options/nixos/security.pam.services.<name>.sshAgentAuth | If set, the calling user's SSH agent is used to authenticate
against the keys in the calling user's
~/.ssh/authorized_keys
|
| options/nixos/systemd.timers.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.slices.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.xserver.xkb.extraLayouts.<name>.keycodesFile | The path to the xkb keycodes file
|
| options/nixos/services.httpd.virtualHosts.<name>.logFormat | Log format for Apache's log files
|
| options/nixos/services.caddy.virtualHosts.<name>.logFormat | Configuration for HTTP request logging (also known as access logs)
|
| options/nixos/systemd.user.targets.<name>.requisite | Similar to requires
|
| options/nixos/systemd.user.paths.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.user.sockets.<name>.requisite | Similar to requires
|
| options/home-manager/launchd.agents.<name>.config.StandardInPath | This optional key specifies what file should be used for data being supplied to stdin when using
stdio(3).
|
| options/nixos/services.tahoe.nodes.<name>.tub.location | The external location that the node should listen on
|
| options/home-manager/accounts.calendar.accounts.<name>.local.encoding | File encoding for items, both content and file name
|
| options/nixos/services.biboumi.settings.realname_customization | Whether the users will be able to use
the ad-hoc commands that lets them configure
their realname and username.
|
| options/home-manager/programs.vscode.profiles.<name>.enableMcpIntegration | Whether to integrate the MCP servers config from
programs.mcp.servers into
programs.vscode.profiles.<name>.userMcp
|
| options/home-manager/services.restic.backups.<name>.paths | Paths to back up, alongside those defined by the dynamicFilesFrom
option
|
| options/nixos/services.davis.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.movim.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.pgbackrest.repos.<name>.host | Repository host when operating remotely
|
| options/nixos/services.slskd.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/boot.loader.systemd-boot.windows.<name>.sortKey | systemd-boot orders the menu entries by their sort keys,
so if you want something to appear after all the NixOS entries,
it should start with o or onwards
|
| options/nixos/services.nginx.proxyCachePath.<name>.levels | The levels parameter defines structure of subdirectories in cache: from
1 to 3, each level accepts values 1 or 2
|
| options/nixos/security.pam.services.<name>.limits.*.domain | Username, groupname, or wildcard this limit applies to
|
| options/nixos/services.buildkite-agents.<name>.shell | Command that buildkite-agent 3 will execute when it spawns a shell.
|
| options/nixos/services.nylon.<name>.acceptInterface | Tell nylon which interface to listen for client requests on, default is "lo".
|
| options/nixos/services.wyoming.piper.servers.<name>.useCUDA | Whether to accelerate the underlying onnxruntime library with CUDA.
|
| options/nixos/services.k3s.autoDeployCharts.<name>.extraDeploy | List of extra Kubernetes manifests to deploy with this Helm chart.
|
| options/darwin/services.buildkite-agents.<name>.shell | Command that buildkite-agent 3 will execute when it spawns a shell.
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites.<name>.desktopEntry.categories | Categories in which the entry should be shown in a menu.
|
| options/nixos/services.fedimintd.<name>.api_ws.port | TCP Port to bind on for API connections relayed by the reverse proxy/tls terminator.
|
| options/nixos/systemd.services.<name>.requisite | Similar to requires
|
| options/nixos/services.netbird.clients.<name>.dir.state | A state directory used by NetBird client to store config.json, state.json & resolv.conf.
|
| options/nixos/services.netbird.tunnels.<name>.dir.state | A state directory used by NetBird client to store config.json, state.json & resolv.conf.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.imapAuth | Sets the authentication mechanism if imap is used as the incoming
method
|
| options/home-manager/accounts.email.accounts.<name>.aerc.smtpAuth | Sets the authentication mechanism if smtp is used as the outgoing
method
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.gtk.iconTheme.name | Name of the icon theme to use for the lightdm-gtk-greeter.
|
| options/nixos/services.errbot.instances.<name>.logLevel | Errbot log level
|
| options/nixos/services.nebula.networks.<name>.package | The nebula package to use.
|
| options/nixos/services.sanoid.datasets.<name>.monthly | Number of monthly snapshots.
|
| options/nixos/containers.<name>.allowedDevices.*.node | Path to device node
|
| options/home-manager/accounts.contact.accounts.<name>.remote | Remote configuration for the contacts.
|
| options/home-manager/programs.i3status.modules.<name>.enable | Whether or not to enable this module.
|
| options/nixos/containers.<name>.nixpkgs | A path to the nixpkgs that provide the modules, pkgs and lib for evaluating the container
|
| options/nixos/security.pam.services.<name>.setLoginUid | Set the login uid of the process
(/proc/self/loginuid) for auditing
purposes
|
| options/nixos/services.inadyn.settings.custom.<name>.ssl | Whether to use HTTPS for this DDNS provider.
|
| options/nixos/services.dokuwiki.sites.<name>.phpOptions | Options for PHP's php.ini file for this dokuwiki site.
|
| options/nixos/services.httpd.virtualHosts.<name>.enableUserDir | Whether to enable serving ~/public_html as
/~«username».
|
| options/nixos/services.tinc.networks.<name>.bindToAddress | The ip address to bind to (both listen on and send packets from).
|
| options/nixos/services.rspamd.workers.<name>.bindSockets | List of sockets to listen, in format acceptable by rspamd
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.slick.theme.name | Name of the theme to use for the lightdm-slick-greeter.
|
| options/nixos/programs.tsmClient.servers.<name>.tcpport | TCP port of the IBM TSM server
|
| options/nixos/services.tahoe.nodes.<name>.client.shares.happy | The number of distinct storage nodes required to store
a file.
|
| options/nixos/services.rspamd.workers.<name>.extraConfig | Additional entries to put verbatim into worker section of rspamd config file.
|
| options/nixos/systemd.network.networks.<name>.enable | Whether to manage network configuration using systemd-network
|
| options/nixos/systemd.network.networks.<name>.tunnel | A list of tunnel interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.network.networks.<name>.bridge | A list of bridge interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.user.services.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/containers.<name>.interfaces | The list of interfaces to be moved into the container.
|
| options/darwin/services.gitlab-runner.services.<name>.tagList | Tag list.
|
| options/home-manager/programs.obsidian.defaultSettings.corePlugins.*.name | The plugin.
|
| options/home-manager/services.xsuspender.rules.<name>.matchWmNameContains | Match windows where wm name contains string.
|
| options/nixos/services.nginx.virtualHosts.<name>.extraConfig | These lines go to the end of the vhost verbatim.
|
| options/nixos/systemd.network.networks.<name>.domains | A list of domains to pass to the network config.
|
| options/home-manager/accounts.email.accounts.<name>.imap.tls.useStartTls | Whether to use STARTTLS.
|
| options/home-manager/systemd.user.services.<name>.Service.ExecStart | Command that is executed when this service is started.
|
| options/home-manager/accounts.email.accounts.<name>.smtp.tls.useStartTls | Whether to use STARTTLS.
|
| options/home-manager/programs.floorp.profiles.<name>.userChrome | Custom Floorp user chrome CSS.
|
| options/nixos/services.redis.servers.<name>.slowLogLogSlowerThan | Log queries whose execution take longer than X in milliseconds.
|
| options/home-manager/xdg.dataFile.<name>.ignorelinks | When recursive is enabled, adds -ignorelinks flag to lndir
It causes lndir to not treat symbolic links in the source directory specially
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.username | Username for basic HTTP authentication
|
| options/nixos/services.firefox-syncserver.database.name | Database to use for storage
|
| options/nixos/services.dokuwiki.sites.<name>.poolConfig | Options for the DokuWiki PHP pool
|
| options/nixos/services.nntp-proxy.users.<name>.passwordHash | SHA-512 password hash (can be generated by
mkpasswd -m sha-512 <password>)
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Debug | This optional key specifies that launchd should adjust its log mask temporarily to LOG_DEBUG while
dealing with this job.
|
| options/home-manager/launchd.agents.<name>.config.StandardOutPath | This optional key specifies what file should be used for data being sent to stdout when using stdio(3).
|
| options/nixos/systemd.timers.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/systemd.slices.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/home-manager/programs.gradle.initScripts.<name>.source | Path of the init script file
|
| options/home-manager/programs.ssh.matchBlocks.<name>.userKnownHostsFile | Specifies one or more files to use for the user host key
database, separated by whitespace
|
| options/nixos/services.nebula.networks.<name>.listen.port | Port number to listen on.
|
| options/nixos/services.mailpit.instances.<name>.smtp | SMTP bind interface and port.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.tarsnap.archives.<name>.nodump | Exclude files with the nodump flag.
|
| options/nixos/services.nebula.networks.<name>.listen.host | IP address to listen on.
|
| options/nixos/services.rspamd.workers.<name>.includes | List of files to include in configuration
|
| options/nixos/services.syncoid.commands.<name>.extraArgs | Extra syncoid arguments for this command.
|
| options/nixos/services.wstunnel.clients.<name>.enable | Whether to enable this wstunnel instance.
|
| options/nixos/services.wstunnel.servers.<name>.enable | Whether to enable this wstunnel instance.
|
| options/nixos/services.znc.confOptions.networks.<name>.port | IRC server port.
|
| options/home-manager/programs.firefox.profiles.<name>.search | Declarative search engine configuration.
|
| options/home-manager/services.podman.networks.<name>.gateway | The gateway IP to use for the network.
|
| options/nixos/services.borgbackup.jobs.<name>.appendFailedSuffix | Append a .failed suffix
to the archive name, which is only removed if
borg create has a zero exit status.
|
| options/nixos/security.pam.services.<name>.requireWheel | Whether to permit root access only to members of group wheel.
|
| options/nixos/services.rke2.autoDeployCharts.<name>.extraDeploy | List of extra Kubernetes manifests to deploy with this Helm chart.
|
| options/home-manager/xdg.desktopEntries.<name>.prefersNonDefaultGPU | If true, the application prefers to be run on a more powerful discrete GPU if available.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.controlMaster | Configure sharing of multiple sessions over a single network connection.
|
| options/nixos/services.httpd.virtualHosts.<name>.http2 | Whether to enable HTTP 2
|
| options/nixos/services.nghttpx.backends.*.params.dns | Name resolution of a backends host name is done at start up,
or configuration reload
|
| options/nixos/systemd.network.networks.<name>.bridgeFDBs | A list of BridgeFDB sections to be added to the unit
|
| options/nixos/systemd.network.networks.<name>.bridgeMDBs | A list of BridgeMDB sections to be added to the unit
|
| options/home-manager/accounts.email.accounts.<name>.meli.enable | Whether to enable the meli mail client for this account
|
| options/darwin/launchd.agents.<name>.serviceConfig.Umask | This optional key specifies what value should be passed to umask(2) before running the job
|
| options/nixos/networking.wg-quick.interfaces.<name>.listenPort | 16-bit port for listening
|
| options/nixos/services.buildkite-agents.<name>.enable | Whether to enable this buildkite agent
|
| options/nixos/services.vault-agent.instances.<name>.group | Group under which this instance runs.
|
| options/darwin/services.buildkite-agents.<name>.enable | Whether to enable this buildkite agent
|
| options/home-manager/programs.floorp.profiles.<name>.isDefault | Whether this is a default profile.
|
| options/home-manager/programs.sftpman.mounts.<name>.mountOptions | Options to pass to sshfs.
|
| options/home-manager/accounts.contact.accounts.<name>.local.type | The type of the storage.
|
| options/home-manager/accounts.contact.accounts.<name>.local.path | The path of the storage.
|
| options/home-manager/services.pizauth.accounts.<name>.clientId | The OAuth2 client ID.
|
| options/nixos/services.graylog.rootUsername | Name of the default administrator user
|
| options/nixos/networking.bonds.<name>.driverOptions | Options for the bonding driver
|
| options/nixos/security.apparmor.policies.<name>.path | A path of a profile file to include
|
| options/nixos/services.tahoe.nodes.<name>.sftpd.hostPrivateKeyFile | Path to the SSH host private key.
|
| options/home-manager/accounts.email.accounts.<name>.smtp.tls.enable | Whether to enable TLS/SSL.
|
| options/home-manager/accounts.email.accounts.<name>.imap.tls.enable | Whether to enable TLS/SSL.
|
| options/nixos/services.xserver.xkb.extraLayouts.<name>.geometryFile | The path to the xkb geometry file
|
| options/nixos/systemd.user.paths.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.saltLength | Length of the new salt in byte (64 is the effective maximum).
|
| options/darwin/launchd.agents.<name>.serviceConfig.WatchPaths | This optional key causes the job to be started if any one of the listed paths are modified.
|
| options/home-manager/programs.smug.projects.<name>.windows.*.root | Root path of window
|
| options/nixos/systemd.network.netdevs.<name>.vxlanConfig | Each attribute in this set specifies an option in the
[VXLAN] section of the unit
|
| options/darwin/launchd.daemons.<name>.serviceConfig.RunAtLoad | This optional key is used to control whether your job is launched once at the time the job is loaded
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Debug | This optional key specifies that launchd should adjust its log mask temporarily to LOG_DEBUG while
dealing with this job.
|
| options/nixos/services.kmonad.keyboards.<name>.config | Keyboard configuration.
|
| options/nixos/services.opkssh.providers.<name>.issuer | Issuer URI
|
| options/darwin/launchd.agents.<name>.serviceConfig.ExitTimeOut | The amount of time launchd waits before sending a SIGKILL signal
|
| options/nixos/services.sourcehut.settings."builds.sr.ht::worker".name | Listening address and listening port
of the build runner (with HTTP port if not 80).
|
| options/nixos/services.firezone.server.provision.accounts.<name>.policies.<name>.resource | The resource to which access should be allowed.
|
| options/nixos/services.nginx.proxyCachePath.<name>.useTempPath | Nginx first writes files that are destined for the cache to a temporary
storage area, and the use_temp_path=off directive instructs Nginx to
write them to the same directories where they will be cached
|
| options/nixos/security.acme.certs.<name>.inheritDefaults | Whether to inherit values set in security.acme.defaults or not.
|
| options/nixos/services.restic.backups.<name>.extraBackupArgs | Extra arguments passed to restic backup.
|
| options/nixos/services.tahoe.nodes.<name>.sftpd.accounts.file | Path to the accounts file.
|
| options/nixos/services.redis.servers.<name>.openFirewall | Whether to open ports in the firewall for the server.
|
| options/home-manager/services.pizauth.accounts.<name>.loginHint | An optional login hint for the account provider.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.state | The state in which a new window should spawn.
|
| options/home-manager/services.muchsync.remotes.<name>.upload | Whether to propagate local changes to the remote.
|
| options/home-manager/programs.smug.projects.<name>.windows.*.panes | Panes to open in a window.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.layer | The layer where a new window should spawn.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.identityAgent | Specifies the location of the ssh identity agent.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.virtualIps.*.label | Each address may be tagged with a label string
|
| options/nixos/services.dokuwiki.sites.<name>.usersFile | Location of the dokuwiki users file
|
| options/nixos/services.ddclient.username | User name.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.addKeysToAgent | When enabled, a private key that is used during authentication will be
added to ssh-agent if it is running (with confirmation enabled if
set to 'confirm')
|
| options/nixos/networking.jool.nat64 | Definitions of NAT64 instances of Jool
|
| options/nixos/services.wordpress.sites.<name>.fontsDir | This directory is used to download fonts from a remote location, e.g.
to host google fonts locally.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.UserName | This optional key specifies the user to run the job as
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.enso.iconTheme.name | Name of the icon theme to use for the lightdm-enso-os-greeter
|
| options/nixos/security.pam.services.<name>.sssdStrictAccess | enforce sssd access control
|
| options/nixos/networking.vlans.<name>.interface | The interface the vlan will transmit packets through.
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.openFirewall | Open the appropriate ports in the firewall.
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.openFirewall | Open the appropriate ports in the firewall.
|
| options/nixos/services.public-inbox.inboxes.<name>.address | The email addresses of the public-inbox.
|
| options/nixos/services.tinc.networks.<name>.rsaPrivateKeyFile | Path of the private RSA keyfile.
|
| options/nixos/systemd.network.networks.<name>.extraConfig | Extra configuration append to unit
|
| options/darwin/launchd.agents.<name>.environment | Environment variables passed to the service's processes.
|
| options/home-manager/services.podman.containers.<name>.ip6 | Set an IPv6 address for the container.
|
| options/home-manager/services.podman.containers.<name>.ip4 | Set an IPv4 address for the container.
|
| options/nixos/services.kimai.sites.<name>.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/security.pam.services.<name>.howdy.control | This option sets the PAM "control" used for this module.
|
| options/nixos/services.borgbackup.jobs.<name>.paths | Path(s) to back up
|
| options/nixos/systemd.services.<name>.restartIfChanged | Whether the service should be restarted during a NixOS
configuration switch if its definition has changed.
|
| options/home-manager/fonts.fontconfig.configFile.<name>.enable | Whether to enable Whether this font config file should be generated..
|
| options/home-manager/accounts.email.accounts.<name>.lieer.enable | Whether to enable lieer Gmail synchronization for notmuch.
|
| options/nixos/services.restic.backups.<name>.pruneOpts | A list of options (--keep-* et al.) for 'restic forget
--prune', to automatically prune old snapshots
|
| options/nixos/systemd.network.networks.<name>.bridgeVLANs | A list of BridgeVLAN sections to be added to the unit
|
| options/home-manager/programs.ssh.matchBlocks.<name>.identityFile | Specifies files from which the user identity is read
|
| options/nixos/services.github-runners.<name>.extraLabels | Extra labels in addition to the default (unless disabled through the noDefaultLabels option)
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.RunAtLoad | This optional key is used to control whether your job is launched once at the time the job is loaded
|
| options/darwin/services.github-runners.<name>.extraLabels | Extra labels in addition to the default (unless disabled through the noDefaultLabels option)
|
| options/home-manager/launchd.agents.<name>.config.WaitForDebugger | This optional key specifies that launchd should instruct the kernel to have the job wait for a debugger
to attach before any code in the job is executed.
|
| options/nixos/boot.initrd.luks.devices.<name>.preOpenCommands | Commands that should be run right before we try to mount our LUKS device
|
| options/nixos/security.apparmor.policies.<name>.state | How strictly this policy should be enforced
|
| options/nixos/services.geoclue2.appConfig.<name>.desktopID | Desktop ID of the application.
|
| options/nixos/services.rspamd.overrides.<name>.source | Path of the source file.
|
| options/nixos/services.sanoid.templates.<name>.hourly | Number of hourly snapshots.
|
| options/nixos/services.sanoid.templates.<name>.yearly | Number of yearly snapshots.
|
| options/home-manager/accounts.calendar.accounts.<name>.local | Local configuration for the calendar.
|
| options/home-manager/programs.irssi.networks.<name>.channels | Channels for the given network.
|
| options/nixos/programs.uwsm.waylandCompositors.<name>.prettyName | The full name of the desktop entry file.
|
| options/nixos/services.agate.hostnames | Domain name of this Gemini server, enables checking hostname and port
in requests. (multiple occurrences means basic vhosts)
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.gracePeriod | Time in seconds to wait for the YubiKey.
|
| options/nixos/services.geth.<name>.websocket.address | Listen address of Go Ethereum WebSocket API.
|
| options/nixos/services.borgbackup.jobs.<name>.postInit | Shell commands to run after borg init.
|
| options/nixos/services.geth.<name>.authrpc.jwtsecret | Path to a JWT secret for authenticated RPC endpoint.
|
| options/nixos/services.wstunnel.clients.<name>.autoStart | Whether to enable starting this wstunnel instance automatically.
|
| options/nixos/services.wstunnel.servers.<name>.autoStart | Whether to enable starting this wstunnel instance automatically.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.focus | Whether the node should gain focus on creation.
|
| options/nixos/services.nsd.zones.<name>.children | Children zones inherit all options of their parents
|
| options/darwin/launchd.agents.<name>.serviceConfig.StartOnMount | This optional key causes the job to be started every time a filesystem is mounted.
|
| options/nixos/systemd.network.netdevs.<name>.vrfConfig | Each attribute in this set specifies an option in the
[VRF] section of the unit
|
| options/nixos/users.extraUsers.<name>.ignoreShellProgramCheck | By default, nixos will check that programs
|
| options/nixos/systemd.network.netdevs.<name>.fooOverUDPConfig | Each attribute in this set specifies an option in the
[FooOverUDP] section of the unit
|
| options/nixos/systemd.network.networks.<name>.canConfig | Each attribute in this set specifies an option in the
[CAN] section of the unit
|
| options/nixos/systemd.network.networks.<name>.pieConfig | Each attribute in this set specifies an option in the
[PIE] section of the unit
|
| options/nixos/security.pam.services.<name>.forwardXAuth | Whether X authentication keys should be passed from the
calling user to the target user (e.g. for
su)
|
| options/nixos/services.borgbackup.jobs.<name>.user | The user borg is run as
|
| options/nixos/services.nginx.virtualHosts.<name>.listen.*.port | Port number to listen on
|
| options/nixos/services.sympa.domains.<name>.settings | The robot.conf configuration file as key value set
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.UserName | This optional key specifies the user to run the job as
|
| options/nixos/services.firewalld.zones.<name>.version | Version of the zone.
|
| options/nixos/programs.xfs_quota.projects.<name>.id | Project ID.
|
| options/darwin/system.activationScripts.<name>.source | Path of the source file.
|
| options/nixos/services.restic.backups.<name>.command | Command to pass to --stdin-from-command
|
| options/nixos/systemd.user.paths.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/services.easytier.instances.<name>.extraSettings | Extra settings to add to easytier-‹name›.toml.
|
| options/nixos/services.httpd.virtualHosts.<name>.sslServerChain | Path to server SSL chain file.
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.ksk.rollPeriod | How frequently to change keys
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.zsk.rollPeriod | How frequently to change keys
|
| options/nixos/services.tarsnap.archives.<name>.maxbwRateUp | Upload bandwidth rate limit in bytes.
|
| options/home-manager/services.colima.profiles.<name>.isService | Whether this profile will run as a service.
|
| options/nixos/security.auditd.plugins.<name>.format | Binary passes the data exactly as the audit event dispatcher gets it from
the audit daemon
|
| options/home-manager/programs.opencode.skills | Custom agent skills for opencode
|
| options/nixos/services.borgbackup.repos.<name>.path | Where to store the backups
|
| options/nixos/security.pam.services.<name>.logFailures | Whether to log authentication failures in /var/log/faillog.
|
| options/nixos/services.tinc.networks.<name>.settings | Configuration of the Tinc daemon for this network
|
| options/home-manager/fonts.fontconfig.configFile.<name>.source | Config file to source
|
| options/darwin/environment.userLaunchAgents.<name>.text | Text of the file.
|
| options/nixos/services.phpfpm.pools.<name>.settings | PHP-FPM pool directives
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.id | IKE identity to use for authentication round
|
| options/home-manager/programs.vscode.profiles.<name>.userTasks | Configuration written to Visual Studio Code's
tasks.json
|
| options/nixos/services.dokuwiki.sites.<name>.mergedConfig | Read only representation of the final configuration.
|
| options/nixos/services.anubis.instances.<name>.enable | Whether to enable this instance of Anubis.
|
| options/nixos/services.kmonad.keyboards.<name>.device | Path to the keyboard's device file.
|
| options/nixos/services.errbot.instances.<name>.admins | List of identifiers of errbot admins.
|
| options/nixos/services.firewalld.zones.<name>.icmpBlocks | ICMP types to block in the zone.
|
| options/nixos/services.davis.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.davis.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.restic.backups.<name>.progressFps | Controls the frequency of progress reporting.
|
| options/nixos/services.movim.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.slskd.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.slskd.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.movim.nginx.locations.<name>.index | Adds index directive.
|
| options/home-manager/services.restic.backups.<name>.progressFps | Controls the frequency of progress reporting.
|
| options/nixos/services.netbird.clients.<name>.config | Additional configuration that exists before the first start and
later overrides the existing values in config.json
|
| options/nixos/services.netbird.tunnels.<name>.config | Additional configuration that exists before the first start and
later overrides the existing values in config.json
|
| options/nixos/services.tahoe.nodes.<name>.client.shares.needed | The number of shares required to reconstitute a file.
|
| options/nixos/systemd.user.services.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/services.znc.confOptions.networks.<name>.useSSL | Whether to use SSL to connect to the IRC server.
|
| options/nixos/systemd.sockets.<name>.listenDatagrams | For each item in this list, a ListenDatagram
option in the [Socket] section will be created.
|
| options/home-manager/services.podman.volumes.<name>.extraPodmanArgs | Extra arguments to pass to the podman volume create command.
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.settings.<name>.settings | Json formatted options for this extension.
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.slick.iconTheme.name | Name of the icon theme to use for the lightdm-slick-greeter.
|
| options/nixos/services.borgbackup.jobs.<name>.preHook | Shell commands to run before the backup
|
| options/nixos/systemd.targets.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.sockets.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.httpd.virtualHosts.<name>.listen | Listen addresses and ports for this virtual host.
This option overrides addSSL, forceSSL and onlySSL
|
| options/nixos/services.neo4j.ssl.policies.<name>.trustAll | Makes this policy trust all remote parties
|
| options/nixos/services.home-assistant.config.homeassistant.name | Name of the location where Home Assistant is running.
|
| options/nixos/services.httpd.virtualHosts.<name>.enableACME | Whether to ask Let's Encrypt to sign a certificate for this vhost
|
| options/nixos/services.nginx.virtualHosts.<name>.enableACME | Whether to ask Let's Encrypt to sign a certificate for this vhost
|
| options/home-manager/programs.alot.tags.<name>.translated | Fixed string representation for this tag
|
| options/nixos/systemd.user.services.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.bluemap.storage.<name>.storage-type | Type of storage config
|
| options/nixos/services.awstats.configs.<name>.hostAliases | List of aliases the site has.
|
| options/nixos/services.opkssh.providers.<name>.clientId | OAuth client ID
|
| options/nixos/services.pgbackrest.repos.<name>.sftp-host | SFTP repository host
|
| options/nixos/services.redis.servers.<name>.databases | Set the number of databases.
|
| options/nixos/services.wordpress.sites.<name>.package | The wordpress package to use.
|
| options/home-manager/accounts.contact.accounts.<name>.remote.url | The URL of the storage.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert | Section for a certificate candidate to use for
authentication
|
| options/nixos/services.drupal.sites.<name>.virtualHost.adminAddr | E-mail address of the server administrator.
|
| options/nixos/systemd.timers.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/systemd.slices.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/home-manager/accounts.email.accounts.<name>.folders.sent | Relative path of the sent mail folder.
|
| options/nixos/services.grafana.provision.alerting.rules.settings.groups.*.name | Name of the rule group
|
| options/nixos/services.caddy.virtualHosts.<name>.extraConfig | Additional lines of configuration appended to this virtual host in the
automatically generated Caddyfile.
|
| options/home-manager/systemd.user.services.<name>.Unit.X-SwitchMethod | The preferred method to use when switching from an old to a new
version of this service.
|
| options/nixos/systemd.services.<name>.enableDefaultPath | Whether to append a minimal default PATH environment variable to the service, containing common system utilities.
|
| options/nixos/services.wstunnel.clients.<name>.addNetBind | Whether to enable Whether add CAP_NET_BIND_SERVICE to the tunnel service, this should be enabled if you want to bind port < 1024.
|
| options/nixos/systemd.network.networks.<name>.ipoIBConfig | Each attribute in this set specifies an option in the
[IPoIB] section of the unit
|
| options/nixos/services.anubis.instances.<name>.user | The user under which Anubis is run
|
| options/nixos/security.pam.services.<name>.enableAppArmor | Enable support for attaching AppArmor profiles at the
user/group level, e.g., as part of a role based access
control scheme.
|
| options/nixos/services.k3s.autoDeployCharts.<name>.version | The version of the Helm chart
|
| options/darwin/launchd.agents.<name>.serviceConfig.MachServices | This optional key is used to specify Mach services to be registered with the Mach bootstrap sub-system
|
| options/home-manager/programs.floorp.profiles.<name>.extraConfig | Extra preferences to add to user.js.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.splitDir | The direction where the container is going to be split.
|
| options/home-manager/programs.ripgrep-all.custom_adapters.*.name | The unique identifier and name of this adapter; must only include a-z, 0-9, _
|
| options/nixos/services.k3s.autoDeployCharts.<name>.values | Override default chart values via Nix expressions
|
| options/nixos/services.tarsnap.archives.<name>.period | Create archive at this interval
|
| options/home-manager/services.restic.backups.<name>.extraBackupArgs | Extra arguments passed to restic backup
|
| options/darwin/environment.launchDaemons.<name>.text | Text of the file.
|
| options/nixos/services.mpdscribble.endpoints.<name>.username | Username for the scrobble service.
|
| options/home-manager/services.mpdscribble.endpoints.<name>.username | Username for the scrobble service.
|
| options/nixos/power.ups.upsmon.monitor.<name>.passwordFile | The full path to a file containing the password from
upsd.users for accessing this UPS
|
| options/nixos/services.nginx.proxyCachePath.<name>.inactive | Cached data that has not been accessed for the time specified by
the inactive parameter is removed from the cache, regardless of
its freshness.
|
| options/nixos/systemd.user.slices.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.user.timers.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/darwin/programs.ssh.knownHosts.<name>.publicKeyFile | The path to the public key file for the host
|
| options/home-manager/xdg.stateFile.<name>.ignorelinks | When recursive is enabled, adds -ignorelinks flag to lndir
It causes lndir to not treat symbolic links in the source directory specially
|
| options/home-manager/xdg.cacheFile.<name>.ignorelinks | When recursive is enabled, adds -ignorelinks flag to lndir
It causes lndir to not treat symbolic links in the source directory specially
|
| options/nixos/services.wstunnel.clients.<name>.soMark | Mark network packets with the SO_MARK sockoption with the specified value
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.recvBufferSize | If given, sets the SO_RCVBUF option on the TCP socket to the given number of bytes
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.sendBufferSize | If given, sets the SO_SNDBUF option on the TCP socket to the given number of bytes
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.recvBufferSize | If given, sets the SO_RCVBUF option on the TCP socket to the given number of bytes
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.sendBufferSize | If given, sets the SO_SNDBUF option on the TCP socket to the given number of bytes
|
| options/nixos/services.redis.servers.<name>.requirePass | Password for database (STORED PLAIN TEXT, WORLD-READABLE IN NIX STORE)
|
| options/darwin/launchd.daemons.<name>.serviceConfig.TimeOut | The recommended idle time out (in seconds) to pass to the job
|
| options/home-manager/launchd.agents.<name>.config.SessionCreate | This key specifies that the job should be spawned into a new security
audit session rather than the default session for the context is belongs
to
|
| options/nixos/services.awstats.configs.<name>.logFormat | The log format being used
|
| options/nixos/services.znapzend.zetup.<name>.presnap | Command to run before snapshots are taken on the source dataset,
e.g. for database locking/flushing
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.filters | A list of filter to restrict traffic
|
| options/nixos/boot.specialFileSystems.<name>.device | The device as passed to mount
|
| options/nixos/services.fluidd.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.akkoma.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.gancio.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.fedimintd.<name>.bitcoin.rpc.kind | Kind of a bitcoin node.
|
| options/nixos/services.monica.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.matomo.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.vdirsyncer.jobs.<name>.enable | Whether to enable this vdirsyncer job.
|
| options/nixos/services.github-runners.<name>.nodeRuntimes | List of Node.js runtimes the runner should support.
|
| options/darwin/services.github-runners.<name>.nodeRuntimes | List of Node.js runtimes the runner should support.
|
| options/home-manager/services.podman.containers.<name>.exec | The command to run after the container start.
|
| options/home-manager/services.podman.containers.<name>.user | The user ID inside the container.
|
| options/home-manager/accounts.contact.accounts.<name>.local.fileExt | The file extension to use.
|
| options/home-manager/services.podman.containers.<name>.userNS | Use a user namespace for the container.
|
| options/nixos/services.akkoma.initDb.username | Name of the database user to initialise the database with
|
| options/nixos/services.restic.backups.<name>.extraOptions | Extra extended options to be passed to the restic --option flag.
|
| options/nixos/services.neo4j.ssl.policies.<name>.ciphers | Restrict the allowed ciphers of this policy to those defined
here
|
| options/nixos/services.quicktun.<name>.remoteAddress | IP address or hostname of the remote end (use 0.0.0.0 for a floating/dynamic remote endpoint).
|
| options/nixos/security.pam.services.<name>.ttyAudit.openOnly | Set the TTY audit flag when opening the session,
but do not restore it when closing the session
|
| options/nixos/networking.fooOverUDP.<name>.protocol | Protocol number of the encapsulated packets
|
| options/nixos/services.prometheus.exporters.fritz.settings.devices.*.name | Name to use for the device.
|
| options/nixos/services.kimai.sites.<name>.database.charset | Database charset.
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.gtk.cursorTheme.name | Name of the cursor theme to use for the lightdm-gtk-greeter.
|
| options/nixos/services.spiped.config.<name>.waitForDNS | Wait for DNS
|
| options/nixos/services.vmalert.instances.<name>.settings.rule | Path to the files with alerting and/or recording rules.
|
| options/nixos/services.kanata.keyboards.<name>.extraArgs | Extra command line arguments passed to kanata.
|
| options/nixos/services.netbird.tunnels.<name>.dir.runtime | A runtime directory used by NetBird client.
|
| options/nixos/services.netbird.clients.<name>.dir.runtime | A runtime directory used by NetBird client.
|
| options/nixos/services.wyoming.piper.servers.<name>.extraArgs | Extra arguments to pass to the server commandline.
|
| options/nixos/services.wyoming.piper.servers.<name>.enable | Whether to enable Wyoming Piper server.
|
| options/home-manager/accounts.contact.accounts.<name>.khal.readOnly | Keep khal from making any changes to this account.
|
| options/home-manager/services.podman.networks.<name>.extraConfig | INI sections and values to populate the Network Quadlet
|
| options/nixos/services.restic.backups.<name>.rcloneConfig | Configuration for the rclone remote being used for backup
|
| options/nixos/security.auditd.plugins.<name>.settings | Plugin-specific config file to link to /etc/audit/.conf
|
| options/nixos/programs.ssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| options/nixos/services.hostapd.radios.<name>.networks | This defines a BSS, colloquially known as a WiFi network
|
| options/darwin/programs.ssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| options/home-manager/programs.lutris.runners.<name>.settings | Settings passed directly to lutris for this runner's config at XDG_CONFIG/lutris/runners.
|
| options/home-manager/launchd.agents.<name>.config.RootDirectory | This optional key is used to specify a directory to chroot(2) to before running the job.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.localForwards | Specify local port forwardings
|
| options/nixos/services.jitsi-videobridge.xmppConfigs.<name>.hostName | Hostname of the XMPP server to connect to
|
| options/nixos/services.wstunnel.servers.<name>.listen.host | The hostname.
|
| options/nixos/services.wstunnel.servers.<name>.listen.port | The port.
|
| options/home-manager/programs.hexchat.channels.<name>.charset | Character set.
|
| options/home-manager/programs.hexchat.channels.<name>.options | Channel options.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| options/nixos/security.pam.services.<name>.failDelay.enable | If enabled, this will replace the FAIL_DELAY setting from login.defs
|
| options/nixos/systemd.network.networks.<name>.linkConfig | Each attribute in this set specifies an option in the
[Link] section of the unit
|
| options/nixos/systemd.user.services.<name>.serviceConfig | Each attribute in this set specifies an option in the
[Service] section of the unit
|
| options/nixos/systemd.network.networks.<name>.lldpConfig | Each attribute in this set specifies an option in the
[LLDP] section of the unit
|
| options/nixos/systemd.network.networks.<name>.cakeConfig | Each attribute in this set specifies an option in the
[CAKE] section of the unit
|
| options/nixos/services.easytier.instances.<name>.settings.network_name | EasyTier network name.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| options/nixos/security.pam.services.<name>.howdy.enable | Whether to enable the Howdy PAM module
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.TimeOut | The recommended idle time out (in seconds) to pass to the job
|
| options/nixos/services.restic.backups.<name>.timerConfig | When to run the backup
|
| options/nixos/services.rke2.autoDeployCharts.<name>.version | The version of the Helm chart
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.address | The address of this resource
|
| options/nixos/services.h2o.hosts.<name>.tls.redirectCode | HTTP status used by globalRedirect & forceSSL
|
| options/nixos/services.fedimintd.<name>.nginx.config.root | The path of the web root directory.
|
| options/nixos/services.bacula-sd.device.<name>.extraDeviceConfig | Extra configuration to be passed in Device directive.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.interface | Optional interface name to restrict outbound IPsec policies.
|
| options/nixos/services.fedimintd.<name>.bitcoin.rpc.url | Bitcoin node (bitcoind/electrum/esplora) address to connect to
|
| options/nixos/services.hostapd.radios.<name>.wifi6.require | Require stations (clients) to support WiFi 6 (HE) and disassociate them if they don't.
|
| options/home-manager/accounts.contact.accounts.<name>.khard.glob | The glob expansion to be searched for contacts when
type is set to discover.
|
| options/nixos/services.rke2.autoDeployCharts.<name>.values | Override default chart values via Nix expressions
|
| options/nixos/services.borgbackup.jobs.<name>.group | The group borg is run as
|
| options/nixos/services.httpd.virtualHosts.<name>.extraConfig | These lines go to httpd.conf verbatim
|
| options/nixos/systemd.network.networks.<name>.address | A list of addresses to be added to the network section of the
unit
|
| options/nixos/systemd.network.networks.<name>.gateway | A list of gateways to be added to the network section of the
unit
|
| options/nixos/systemd.sockets.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.targets.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.ignoreBroadcastSsid | Send empty SSID in beacons and ignore probe request frames that do not
specify full SSID, i.e., require stations to know SSID
|
| options/nixos/services.davis.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.iodine.clients.<name>.passwordFile | Path to a file containing the password.
|
| options/nixos/services.slskd.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.movim.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.restic.backups.<name>.passwordFile | Read the repository password from a file.
|
| options/home-manager/services.restic.backups.<name>.passwordFile | A file containing the repository password.
|
| options/home-manager/accounts.email.accounts.<name>.gpg.signByDefault | Sign messages by default.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.border | Whether the node should have border.
|
| options/nixos/services.geoclue2.appConfig.<name>.isAllowed | Whether the application will be allowed access to location information.
|
| options/nixos/services.anubis.instances.<name>.policy | Anubis policy configuration
|
| options/nixos/services.drupal.sites.<name>.virtualHost.listen.*.ip | IP to listen on. 0.0.0.0 for IPv4 only, * for all.
|
| options/nixos/services.netbird.tunnels.<name>.login.enable | Whether to enable automated login for NetBird client.
|
| options/nixos/services.netbird.clients.<name>.login.enable | Whether to enable automated login for NetBird client.
|
| options/nixos/systemd.user.paths.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags.sent | Tag for notmuch to use for messages stored in the mailbox labeled with the
Sent name attribute
|
| options/nixos/services.easytier.instances.<name>.settings.hostname | Hostname shown in peer list and web console.
|
| options/nixos/services.netbird.clients.<name>.autoStart | Start the service with the system
|
| options/nixos/services.openvpn.servers.<name>.config | Configuration of this OpenVPN instance
|
| options/nixos/services.netbird.tunnels.<name>.autoStart | Start the service with the system
|
| options/home-manager/programs.ssh.matchBlocks.<name>.serverAliveCountMax | Sets the number of server alive messages which may be sent
without SSH receiving any messages back from the server.
|
| options/nixos/networking.jool.nat64.<name>.global.pool6 | The prefix used for embedding IPv4 into IPv6 addresses
|
| options/nixos/programs.schroot.profiles.<name>.fstab | A file in the format described in fstab(5), used to mount filesystems inside the chroot
|
| options/nixos/services.hostapd.radios.<name>.wifi7.enable | Enables support for IEEE 802.11be (WiFi 7, EHT)
|
| options/nixos/services.drupal.sites.<name>.virtualHost.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| options/nixos/services.hostapd.radios.<name>.wifi4.enable | Enables support for IEEE 802.11n (WiFi 4, HT)
|
| options/nixos/services.dokuwiki.sites.<name>.plugins | List of path(s) to respective plugin(s) which are copied into the 'plugin' directory.
These plugins need to be packaged before use, see example.
|
| options/nixos/services.postfix.settings.master.<name>.type | The type of the service
|
| options/nixos/services.wstunnel.servers.<name>.package | The wstunnel package to use.
|
| options/nixos/services.wstunnel.clients.<name>.package | The wstunnel package to use.
|
| options/home-manager/accounts.contact.accounts.<name>.remote.type | The type of the storage.
|
| options/nixos/services.hostapd.radios.<name>.driver | The driver hostapd will use.
nl80211 is used with all Linux mac80211 drivers.
none is used if building a standalone RADIUS server that does
not control any wireless/wired driver
|
| options/nixos/services.redis.servers.<name>.masterAuth | If the master is password protected (using the requirePass configuration)
it is possible to tell the slave to authenticate before starting the replication synchronization
process, otherwise the master will refuse the slave request.
(STORED PLAIN TEXT, WORLD-READABLE IN NIX STORE)
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert | Section for a certificate candidate to use for
authentication
|
| options/nixos/services.borgbackup.jobs.<name>.postPrune | Shell commands to run after borg prune.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.enable | Whether to enable synchronization using mbsync.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.controlPersist | Whether control socket should remain open in the background.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.eap_id | Client EAP-Identity to use in EAP-Identity exchange and the EAP method.
|
| options/nixos/services.bepasty.servers.<name>.extraConfig | Extra configuration for bepasty server to be appended on the
configuration.
see https://bepasty-server.readthedocs.org/en/latest/quickstart.html#configuring-bepasty
for all options.
|
| options/nixos/services.hostapd.radios.<name>.wifi4.require | Require stations (clients) to support WiFi 4 (HT) and disassociate them if they don't.
|
| options/nixos/services.hostapd.radios.<name>.wifi5.require | Require stations (clients) to support WiFi 5 (VHT) and disassociate them if they don't.
|
| options/nixos/systemd.user.slices.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.user.timers.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/programs.xfs_quota.projects.<name>.path | Project directory.
|
| options/home-manager/services.podman.containers.<name>.image | The container image.
|
| options/home-manager/programs.librewolf.profiles.<name>.path | Profile path.
|
| options/nixos/systemd.network.networks.<name>.macvtap | A list of macvtap interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.network.netdevs.<name>.tunnelConfig | Each attribute in this set specifies an option in the
[Tunnel] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.bridgeConfig | Each attribute in this set specifies an option in the
[Bridge] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.netdevConfig | Each attribute in this set specifies an option in the
[Netdev] section of the unit
|
| options/nixos/systemd.network.networks.<name>.macvlan | A list of macvlan interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.network.netdevs.<name>.ipvlanConfig | Each attribute in this set specifies an option in the [IPVLAN] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.ipvtapConfig | Each attribute in this set specifies an option in the [IPVTAP] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.matchConfig | Each attribute in this set specifies an option in the
[Match] section of the unit
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.id | IKE identity to expect for authentication round
|
| options/home-manager/services.kanshi.profiles.<name>.outputs.*.criteria | The criteria can either be an output name, an output description or "*"
|
| options/nixos/services.tarsnap.archives.<name>.maxbwRateDown | Download bandwidth rate limit in bytes.
|
| options/nixos/services.tinc.networks.<name>.listenAddress | The ip address to listen on for incoming connections.
|
| options/home-manager/accounts.email.accounts.<name>.folders.inbox | Relative path of the inbox mail.
|
| options/home-manager/programs.floorp.profiles.<name>.userContent | Custom Floorp user content CSS.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.hidden | Whether the node should occupy any space.
|
| options/home-manager/programs.firefox.profiles.<name>.userChrome | Custom Firefox user chrome CSS.
|
| options/nixos/services.spiped.config.<name>.source | Address on which spiped should listen for incoming
connections
|
| options/nixos/services.postfix.masterConfig.<name>.wakeup | Automatically wake up the service after the specified number of
seconds
|
| options/nixos/systemd.user.services.<name>.requisite | Similar to requires
|
| options/home-manager/launchd.agents.<name>.config.StandardErrorPath | This optional key specifies what file should be used for data being sent to stderr when using stdio(3).
|
| options/home-manager/launchd.agents.<name>.config.EnableGlobbing | This flag causes launchd to use the glob(3) mechanism to update the program arguments before invocation.
|
| options/nixos/services.hostapd.radios.<name>.channel | The channel to operate on
|
| options/darwin/launchd.agents.<name>.serviceConfig.GroupName | This optional key specifies the group to run the job as
|
| options/home-manager/programs.lutris.runners.<name>.package | The package to use for this runner, nix will try to find the executable for this package
|
| options/nixos/services.snapper.configs.<name>.ALLOW_USERS | List of users allowed to operate with the config. "root" is always
implicitly included
|
| options/nixos/systemd.sockets.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/systemd.targets.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.enso.cursorTheme.name | Name of the cursor theme to use for the lightdm-enso-os-greeter
|
| options/nixos/services.firewalld.zones.<name>.sources.*.mac | A MAC address.
|
| options/nixos/services.firewalld.zones.<name>.sourcePorts | Source ports to allow in the zone.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.wyoming.piper.servers.<name>.noiseScale | Generator noise value.
|
| options/home-manager/services.unison.pairs.<name>.stateDirectory | Unison state directory to use.
|
| options/home-manager/programs.hexchat.channels.<name>.servers | IRC Server Address List.
|
| options/nixos/systemd.services.<name>.confinement.mode | The value full-apivfs (the default) sets up
private /dev, /proc,
/sys, /tmp and /var/tmp file systems
in a separate user name space
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.packages | List of ‹name› add-on packages to install for this profile
|
| options/home-manager/accounts.email.accounts.<name>.flavor | Some email providers have peculiar behavior that require
special treatment
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.fqdn | Fully qualified domain name of the JMAP service.
mujmap looks up the JMAP SRV record for this host to determine the JMAP session
URL
|
| options/nixos/services.fedimintd.<name>.nginx.path_ws | Path to host the API on and forward to the daemon's api port
|
| options/nixos/services.drupal.sites.<name>.database.socket | Path to the unix socket file to use for authentication.
|
| options/darwin/system.activationScripts.<name>.enable | Whether this file should be generated
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.enable | Whether to enable mujmap JMAP synchronization for notmuch.
|
| options/home-manager/programs.i3status-rust.bars.<name>.settings | Any extra options to add to i3status-rust
config.
|
| options/home-manager/programs.librewolf.profiles.<name>.id | Profile ID
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.remove | Propagate mailbox deletions to the given mail store.
|
| options/home-manager/accounts.email.accounts.<name>.alot.extraConfig | Extra settings to add to this Alot account configuration.
|
| options/nixos/services.prometheus.exporters.script.settings.scripts.*.name | Name of the script.
|
| options/nixos/services.znapzend.zetup.<name>.mbuffer.size | The size for mbuffer
|
| options/nixos/services.borgbackup.repos.<name>.user | The user borg serve is run as
|
| options/home-manager/launchd.agents.<name>.config.LimitLoadToSessionType | This configuration file only applies to sessions of the type specified
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Umask | This optional key specifies what value should be passed to umask(2) before running the job
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.round | Optional numeric identifier by which authentication rounds are
sorted
|
| options/nixos/services.buildkite-agents.<name>.package | The buildkite-agent package to use.
|
| options/darwin/services.buildkite-agents.<name>.package | Which buildkite-agent derivation to use
|
| options/home-manager/services.podman.networks.<name>.internal | Whether the network should be internal
|
| options/home-manager/accounts.calendar.accounts.<name>.remote | Remote configuration for the calendar.
|
| options/home-manager/programs.firefox.profiles.<name>.isDefault | Whether this is a default profile.
|
| options/nixos/services.icecast.hostname | DNS name or IP address that will be used for the stream directory lookups or possibly the playlist generation if a Host header is not provided.
|
| options/nixos/systemd.services.<name>.stopIfChanged | If set, a changed unit is restarted by calling
systemctl stop in the old configuration,
then systemctl start in the new one
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.storage.fsType | The filesystem of the unencrypted device.
|
| options/nixos/services.nylon.<name>.nrConnections | The number of allowed simultaneous connections to the daemon, default 10.
|
| options/nixos/services.ytdl-sub.instances.<name>.readWritePaths | List of paths that ytdl-sub can write to.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.follow | Whether focus should follow the node when it is moved.
|
| options/home-manager/programs.smug.projects.<name>.windows.*.layout | Layout of window when opening panes.
|
| options/home-manager/accounts.email.accounts.<name>.folders.trash | Relative path of the deleted mail folder.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.localForwards.*.host | Host port binding options
|
| options/home-manager/programs.smug.projects.<name>.windows.*.panes.*.type | Type of pane.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.localForwards.*.bind | Local port binding options
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.sticky | Whether the node should stay on the focused desktop.
|
| options/nixos/services.nginx.virtualHosts.<name>.listen | Listen addresses and ports for this virtual host
|
| options/darwin/launchd.daemons.<name>.serviceConfig.WatchPaths | This optional key causes the job to be started if any one of the listed paths are modified.
|
| options/nixos/services.i2pd.ifname | Network interface to bind to.
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.id | A unique identifier for this authentication token
|
| options/nixos/systemd.shutdownRamfs.contents.<name>.target | Path of the symlink.
|
| options/darwin/environment.launchAgents.<name>.source | Path of the source file.
|
| options/nixos/services.tor.relay.onionServices.<name>.path | Path where to store the data files of the hidden service
|
| options/nixos/systemd.network.networks.<name>.dhcpV4Config | Each attribute in this set specifies an option in the
[DHCPv4] section of the unit
|
| options/nixos/systemd.network.networks.<name>.dhcpV6Config | Each attribute in this set specifies an option in the
[DHCPv6] section of the unit
|
| options/home-manager/services.restic.backups.<name>.pruneOpts | A list of policy options for 'restic forget --prune', to automatically
prune old snapshots
|
| options/nixos/services.logcheck.ignoreCron.<name>.timeArgs | "min hr dom mon dow" crontab time args, to auto-create a cronjob too
|
| options/home-manager/services.colima.profiles.<name>.isActive | Whether to set this profile as:
- active docker context
- active kubernetes context
- active incus remote
Exactly one or zero profiles should have this option set.
|
| options/home-manager/services.restic.backups.<name>.timerConfig | When to run the backup
|
| options/nixos/boot.initrd.luks.devices.<name>.fido2.passwordLess | Defines whatever to use an empty string as a default salt
|
| options/nixos/services.anubis.instances.<name>.group | The group under which Anubis is run
|
| options/nixos/systemd.user.slices.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/services.wordpress.sites.<name>.themes | Path(s) to respective theme(s) which are copied from the 'theme' directory.
These themes need to be packaged before use, see example.
|
| options/nixos/systemd.user.timers.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/darwin/launchd.daemons.<name>.serviceConfig.ExitTimeOut | The amount of time launchd waits before sending a SIGKILL signal
|
| options/nixos/services.drupal.sites.<name>.virtualHost.listen.*.port | Port to listen on
|
| options/nixos/services.anubis.instances.<name>.extraFlags | A list of extra flags to be passed to Anubis.
|
| options/nixos/services.syncoid.commands.<name>.service | Systemd configuration specific to this syncoid service.
|
| options/nixos/services.nginx.upstreams.<name>.extraConfig | These lines go to the end of the upstream verbatim.
|
| options/nixos/services.tarsnap.archives.<name>.verbose | Whether to produce verbose logging output.
|
| options/nixos/services.vault-agent.instances.<name>.enable | Whether to enable this vault-agent instance.
|
| options/nixos/services.wyoming.piper.servers.<name>.noiseWidth | Phoneme width noise value.
|
| options/darwin/security.sandbox.profiles.<name>.closure | List of store paths to make accessible.
|
| options/home-manager/services.muchsync.remotes.<name>.remote.host | Remote SSH host to synchronize with.
|
| options/home-manager/accounts.contact.accounts.<name>.khal.enable | Whether to enable khal access.
|
| options/nixos/services.dokuwiki.sites.<name>.extraConfigs | Path(s) to additional configuration files that are then linked to the 'conf' directory.
|
| options/nixos/services.borgbackup.jobs.<name>.extraArgs | Additional arguments for all borg calls the
service has
|
| options/nixos/services.firewalld.zones.<name>.sources | Source addresses, address ranges, MAC addresses or ipsets to bind.
|
| options/nixos/services.fedimintd.<name>.nginx.path_ui | Path to host the built-in UI on and forward to the daemon's api port
|
| options/nixos/services.drupal.sites.<name>.virtualHost.listen.*.ssl | Whether to enable SSL (https) support.
|
| options/nixos/services.gitlab-runner.services.<name>.tagList | Tag list
|
| options/home-manager/services.restic.backups.<name>.extraOptions | Extra extended options to be passed to the restic -o flag
|
| options/home-manager/accounts.email.accounts.<name>.maildir.path | Path to maildir directory where mail for this account is
stored
|
| options/home-manager/accounts.contact.accounts.<name>.khal.color | Color in which events in this calendar are displayed
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Umask | This optional key specifies what value should be passed to umask(2) before running the job
|
| options/nixos/services.borgbackup.jobs.<name>.doInit | Run borg init if the
specified repo does not exist
|
| options/nixos/services.k3s.autoDeployCharts.<name>.enable | Whether to enable the installation of this Helm chart
|
| options/nixos/services.fluidd.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.gancio.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.fluidd.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.akkoma.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/image.repart.partitions.<name>.contents | The contents to end up in the filesystem image.
|
| options/nixos/services.akkoma.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.blockbook-frontend.<name>.rpc.url | URL for JSON-RPC connections.
|
| options/nixos/services.jupyterhub.kernels.<name>.env | Environment variables to set for the kernel.
|
| options/nixos/services.gancio.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.monica.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.monica.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.prosody.virtualHosts.<name>.enabled | Whether to enable the virtual host
|
| options/nixos/services.matomo.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.matomo.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.sanoid.datasets.<name>.autosnap | Whether to automatically take snapshots.
|
| options/nixos/services.webhook.hooks.<name>.execute-command | The command that should be executed when the hook is triggered.
|
| options/nixos/services.wstunnel.clients.<name>.connectTo | Server address and port to connect to.
|
| options/darwin/launchd.daemons.<name>.environment | Environment variables passed to the service's processes.
|
| options/home-manager/programs.irssi.networks.<name>.autoCommands | List of commands to execute on connect.
|
| options/home-manager/services.podman.containers.<name>.group | The group ID inside the container.
|
| options/home-manager/services.podman.containers.<name>.ports | A mapping of ports between host and container
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.ksk.prePublish | How long in advance to publish new keys
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.zsk.prePublish | How long in advance to publish new keys
|
| options/home-manager/accounts.email.accounts.<name>.lieer.sync.enable | Whether to enable lieer synchronization service.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.marked | Whether the node will be marked for deferred actions.
|
| options/nixos/services.snapper.configs.<name>.ALLOW_GROUPS | List of groups allowed to operate with the config
|
| options/nixos/services.rspamd.overrides.<name>.enable | Whether this file overrides should be generated
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.WatchPaths | This optional key causes the job to be started if any one of the listed paths are modified.
|
| options/nixos/services.openssh.knownHosts.<name>.publicKey | The public key data for the host
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.slick.cursorTheme.name | Name of the cursor theme to use for the lightdm-slick-greeter.
|
| options/nixos/services.postfix.masterConfig.<name>.chroot | Whether the service is chrooted to have only access to the
services.postfix.queueDir and the closure of
store paths specified by the program option.
|
| options/nixos/services.syncoid.commands.<name>.target | Target ZFS dataset
|
| options/home-manager/services.podman.machines.<name>.volumes | Volumes to mount in the machine, specified as source:target pairs
|
| options/nixos/services.nginx.virtualHosts.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.akkoma.frontends.<name>.package | Akkoma frontend package.
|
| options/nixos/services.sanoid.templates.<name>.monthly | Number of monthly snapshots.
|
| options/nixos/services.vdirsyncer.jobs.<name>.configFile | existing configuration file
|
| options/nixos/systemd.shutdownRamfs.contents.<name>.source | Path of the source file.
|
| options/home-manager/accounts.calendar.accounts.<name>.local.path | The path of the storage.
|
| options/home-manager/accounts.calendar.accounts.<name>.local.type | The type of the storage.
|
| options/nixos/services.mailpit.instances.<name>.max | Maximum number of emails to keep
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.ExitTimeOut | The amount of time launchd waits before sending a SIGKILL signal
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags.inbox | Tag for notmuch to use for messages stored in the mailbox labeled with the
Inbox name attribute
|
| options/nixos/services.drupal.sites.<name>.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| options/nixos/services.dovecot2.mailboxes.<name>.auto | Whether to automatically create or create and subscribe to the mailbox or not.
|
| options/nixos/boot.initrd.luks.devices.<name>.gpgCard.encryptedPass | Path to the GPG encrypted passphrase.
|
| options/nixos/services.blockbook-frontend.<name>.sync | Synchronizes until tip, if together with zeromq, keeps index synchronized.
|
| options/nixos/services.spiped.config.<name>.resolveRefresh | Resolution refresh time for the target socket, in seconds.
|
| options/nixos/services.nginx.virtualHosts.<name>.http2 | Whether to enable the HTTP/2 protocol
|
| options/nixos/services.anubis.instances.<name>.settings.POLICY_FNAME | The policy file to use
|
| options/darwin/launchd.daemons.<name>.serviceConfig.MachServices | This optional key is used to specify Mach services to be registered with the Mach bootstrap sub-system
|
| options/nixos/services.sabnzbd.settings.servers.<name>.displayname | Human-friendly description of the server
|
| options/darwin/launchd.daemons.<name>.serviceConfig.StartOnMount | This optional key causes the job to be started every time a filesystem is mounted.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.create | Automatically create missing mailboxes within the
given mail store.
|
| options/nixos/services.rsync.jobs.<name>.destination | Destination directory.
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.settings.<name>.permissions | Allowed permissions for this extension
|
| options/nixos/systemd.network.networks.<name>.qdiscConfig | Each attribute in this set specifies an option in the
[QDisc] section of the unit
|
| options/nixos/systemd.network.networks.<name>.pfifoConfig | Each attribute in this set specifies an option in the
[PFIFO] section of the unit
|
| options/nixos/systemd.network.networks.<name>.bfifoConfig | Each attribute in this set specifies an option in the
[BFIFO] section of the unit
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.displayName | Display name
|
| options/nixos/services.openssh.knownHosts.<name>.extraHostNames | A list of additional host names and/or IP numbers used for
accessing the host's ssh service
|
| options/nixos/services.tor.relay.onionServices.<name>.version | See torrc manual.
|
| options/nixos/services.v4l2-relayd.instances.<name>.enable | Whether to enable this v4l2-relayd instance.
|
| options/darwin/launchd.user.agents.<name>.environment | Environment variables passed to the service's processes.
|
| options/home-manager/programs.irssi.networks.<name>.server.ssl.enable | Whether SSL should be used.
|
| options/nixos/services.gitlab-runner.services.<name>.description | Name/description of the runner.
|
| options/nixos/networking.interfaces.<name>.mtu | MTU size for packets leaving the interface
|
| options/nixos/systemd.user.services.<name>.restartIfChanged | Whether the service should be restarted during a NixOS
configuration switch if its definition has changed.
|
| options/home-manager/programs.smug.projects.<name>.windows.*.manual | Start window only manually, using the -w arg
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.locked | Whether the node should ignore node --close
messages.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.center | Whether the node will be put in the center, in floating mode.
|
| options/home-manager/programs.rclone.remotes.<name>.mounts | An attribute set mapping remote file paths to their corresponding mount
point configurations
|
| options/nixos/services.kanata.keyboards.<name>.config | Configuration other than defcfg
|
| options/nixos/services.wordpress.sites.<name>.poolConfig | Options for the WordPress PHP pool
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.certs | List of certificates to accept for authentication
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.ports.*.to | The end of the port range, inclusive.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.MachServices | This optional key is used to specify Mach services to be registered with the Mach bootstrap sub-system
|
| options/nixos/services.wstunnel.servers.<name>.listen | Address and port to listen on
|
| options/home-manager/services.podman.volumes.<name>.preserve | Whether the volume should be preserved if it is removed from the configuration
|
| options/nixos/services.wstunnel.servers.<name>.enableHTTPS | Use HTTPS for the tunnel server.
|
| options/nixos/services.errbot.instances.<name>.plugins | List of errbot plugin derivations.
|
| options/nixos/services.restic.backups.<name>.inhibitsSleep | Prevents the system from sleeping while backing up.
|
| options/nixos/services.znc.confOptions.networks.<name>.server | IRC server address.
|
| options/nixos/services.rke2.autoDeployCharts.<name>.enable | Whether to enable the installation of this Helm chart
|
| options/home-manager/xdg.configFile.<name>.ignorelinks | When recursive is enabled, adds -ignorelinks flag to lndir
It causes lndir to not treat symbolic links in the source directory specially
|
| options/nixos/boot.specialFileSystems.<name>.depends | List of paths that should be mounted before this one
|
| options/nixos/boot.specialFileSystems.<name>.options | Options used to mount the file system
|
| options/nixos/services.fedimintd.<name>.nginx.config.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.ports | Either a single port or port range to allow
|
| options/nixos/boot.loader.grub.users.<name>.hashedPasswordFile | Specifies the path to a file containing the password hash
for the account, generated with grub-mkpasswd-pbkdf2
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StartOnMount | This optional key causes the job to be started every time a filesystem is mounted.
|
| options/nixos/services.httpd.virtualHosts.<name>.forceSSL | Whether to add a separate nginx server block that permanently redirects (301)
all plain HTTP traffic to HTTPS
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.round | Optional numeric identifier by which authentication rounds are
sorted
|
| options/nixos/services.buildkite-agents.<name>.tokenPath | The token from your Buildkite "Agents" page
|
| options/nixos/networking.bonds.<name>.lacp_rate | DEPRECATED, use driverOptions
|
| options/darwin/services.buildkite-agents.<name>.tokenPath | The token from your Buildkite "Agents" page
|
| options/nixos/services.snapserver.streams.<name>.type | The type of input stream.
|
| options/home-manager/services.xsuspender.rules.<name>.resumeFor | Resume duration in seconds.
|
| options/nixos/services.wstunnel.servers.<name>.useACMEHost | Use a certificate generated by the NixOS ACME module for the given host
|
| options/home-manager/accounts.email.accounts.<name>.aerc.extraBinds | Extra bindings specific to this account, added to
$HOME/.config/aerc/binds.conf
|
| options/nixos/services.sanoid.datasets.<name>.useTemplate | Names of the templates to use for this dataset.
|
| options/nixos/services.pingvin-share.hostname | The domain name of your instance
|
| options/nixos/services.davis.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.fedimintd.<name>.api_iroh.bind | Address to bind on for Iroh endpoint for API connections
|
| options/nixos/services.syncoid.commands.<name>.useCommonArgs | Whether to add the configured common arguments to this command.
|
| options/nixos/services.movim.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.slskd.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/systemd.sockets.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/systemd.targets.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/home-manager/programs.irssi.networks.<name>.server.ssl.verify | Whether the SSL certificate should be verified.
|
| options/nixos/services.headscale.settings.dns.extra_records.*.name | DNS record name.
|
| options/nixos/services.nbd.server.exports.<name>.extraOptions | Extra options for this export
|
| options/nixos/services.netbird.clients.<name>.login.setupKeyFile | A Setup Key file path used for automated login of the machine.
|
| options/nixos/services.netbird.tunnels.<name>.login.setupKeyFile | A Setup Key file path used for automated login of the machine.
|
| options/darwin/services.buildkite-agents.<name>.hooks.pre-exit | The pre-exit hook will run just before your build job finishes
|
| options/home-manager/accounts.calendar.accounts.<name>.khal.glob | The glob expansion to be searched for events or birthdays when
type is set to discover.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.remoteForwards | Specify remote port forwardings
|
| options/nixos/boot.initrd.luks.devices.<name>.allowDiscards | Whether to allow TRIM requests to the underlying device
|
| options/nixos/networking.bonds.<name>.interfaces | The interfaces to bond together
|
| options/nixos/services.firewalld.zones.<name>.sourcePorts.*.port | |
| options/nixos/services.firewalld.services.<name>.ports | Ports of the service.
|
| options/home-manager/programs.papis.libraries.<name>.settings | Configuration for this library.
|
| options/home-manager/accounts.email.accounts.<name>.signature | Signature configuration.
|
| options/nixos/services.gitlab-runner.services.<name>.limit | Limit how many jobs can be handled concurrently by this service.
0 (default) simply means don't limit.
|
| options/darwin/services.gitlab-runner.services.<name>.limit | Limit how many jobs can be handled concurrently by this service.
0 (default) simply means don't limit.
|
| options/nixos/services.caddy.virtualHosts.<name>.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.jibri.xmppEnvironments.<name>.call.login.username | User part of the JID for the recorder.
|
| options/nixos/services.dokuwiki.sites.<name>.pluginsConfig | List of the dokuwiki (un)loaded plugins.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.sslServerCert | Path to server SSL certificate.
|
| options/nixos/services.public-inbox.inboxes.<name>.coderepo | Nicknames of a 'coderepo' section associated with the inbox.
|
| options/nixos/services.mailpit.instances.<name>.listen | HTTP bind interface and port for UI.
|
| options/nixos/systemd.shutdownRamfs.contents.<name>.enable | Whether to enable copying of this file and symlinking it.
|
| options/home-manager/services.kanshi.profiles.<name>.outputs.*.alias | Defines an alias for the output
|
| options/home-manager/accounts.email.accounts.<name>.meli.settings | Account specific meli configuration
|
| options/home-manager/programs.firefox.profiles.<name>.extraConfig | Extra preferences to add to user.js.
|
| options/nixos/services.namecoind.wallet | Wallet file
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags.spam | Tag for notmuch to use for messages stored in the mailbox labeled with the
Junk name attribute and/or with the $Junk keyword,
except for messages with the $NotJunk keyword
|
| options/nixos/services.drupal.sites.<name>.virtualHost.servedDirs | This option provides a simple way to serve static directories.
|
| options/nixos/systemd.user.sockets.<name>.listenDatagrams | For each item in this list, a ListenDatagram
option in the [Socket] section will be created.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert | Section for a CA certificate to accept for authentication
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.storage.path | Absolute path of the salt on the unencrypted device with
that device's root directory as "/".
|
| options/nixos/systemd.user.targets.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.user.sockets.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.blockbook-frontend.<name>.rpc.port | Port for JSON-RPC connections.
|
| options/nixos/services.gancio.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.blockbook-frontend.<name>.rpc.user | Username for JSON-RPC connections.
|
| options/nixos/services.buildkite-agents.<name>.extraGroups | Groups the user for this buildkite agent should belong to
|
| options/nixos/services.akkoma.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.jupyterhub.kernels.<name>.argv | Command and arguments to start the kernel.
|
| options/nixos/services.fluidd.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.monica.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.matomo.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/home-manager/accounts.email.accounts.<name>.neomutt.enable | Whether to enable NeoMutt.
|
| options/home-manager/programs.irssi.networks.<name>.server.address | Address of the chat server.
|
| options/home-manager/accounts.email.accounts.<name>.astroid.enable | Whether to enable Astroid.
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.allAccess | Grants all permissions in the associated organization.
|
| options/nixos/services.fedimintd.<name>.api_iroh.port | UDP Port to bind Iroh endpoint for API connections
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.ksk.postPublish | How long after deactivation to keep a key in the zone
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.zsk.postPublish | How long after deactivation to keep a key in the zone
|
| options/nixos/services.nebula.networks.<name>.settings | Nebula configuration
|
| options/nixos/services.github-runners.<name>.extraPackages | Extra packages to add to PATH of the service to make them available to workflows.
|
| options/nixos/systemd.user.slices.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/systemd.user.timers.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/darwin/services.github-runners.<name>.extraPackages | Extra packages to add to PATH of the service to make them available to workflows.
|
| options/home-manager/services.podman.networks.<name>.extraPodmanArgs | Extra arguments to pass to the podman network create command.
|
| options/home-manager/services.podman.machines.<name>.timezone | Timezone to set in the machine
|
| options/nixos/systemd.services.<name>.reloadIfChanged | Whether the service should be reloaded during a NixOS
configuration switch if its definition has changed
|
| options/nixos/services.logcheck.ignoreCron.<name>.cmdline | Command line for the cron job
|
| options/nixos/systemd.services.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/home-manager/accounts.calendar.accounts.<name>.khal.type | Either a single calendar (calendar which is the default) or a directory with multiple calendars (discover).
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/nixos/services.bepasty.servers.<name>.secretKey | server secret for safe session cookies, must be set
|
| options/nixos/services.printing.cups-pdf.instances.<name>.settings.Out | output directory;
${HOME} will be expanded to the user's home directory,
${USER} will be expanded to the user name.
|
| options/nixos/services.borgbackup.repos.<name>.group | The group borg serve is run as
|
| options/nixos/systemd.user.services.<name>.enableDefaultPath | Whether to append a minimal default PATH environment variable to the service, containing common system utilities.
|
| options/nixos/services.znapzend.zetup.<name>.postsnap | Command to run after snapshots are taken on the source dataset,
e.g. for database unlocking
|
| options/nixos/services.firewalld.zones.<name>.services | Services to allow in the zone.
|
| options/nixos/services.firewalld.services.<name>.short | Short description for the service.
|
| options/nixos/services.autorandr.profiles.<name>.hooks | Profile hook scripts.
|
| options/nixos/services.znapzend.zetup.<name>.recursive | Whether to do recursive snapshots.
|
| options/home-manager/programs.autorandr.profiles.<name>.hooks | Profile hook scripts.
|
| options/home-manager/accounts.calendar.accounts.<name>.remote.url | The URL of the storage.
|
| options/home-manager/services.podman.machines.<name>.rootful | Whether to run the machine in rootful mode
|
| options/home-manager/programs.thunderbird.profiles.<name>.extensions | List of ‹name› add-on packages to install for this profile
|
| options/nixos/fileSystems.<name>.encrypted.keyFile | Path to a keyfile used to unlock the backing encrypted
device
|
| options/nixos/services.fedimintd.<name>.ui.openFirewall | Opens TCP port in firewall for built-in UI
|
| options/nixos/services.klipper.firmwares.<name>.enable | Whether to enable building of firmware for manual flashing
.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.public-inbox.inboxes.<name>.inboxdir | The absolute path to the directory which hosts the public-inbox.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors | The terminal colors, null to use system default.
|
| options/home-manager/systemd.user.paths.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.ports.*.from | The start of the port range, inclusive.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.virtualIps.*.dev | The name of the device to add the address to.
|
| options/nixos/services.nginx.virtualHosts.<name>.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| options/darwin/launchd.agents.<name>.serviceConfig.OnDemand | This key was used in Mac OS X 10.4 to control whether a job was kept alive or not
|
| options/nixos/networking.nftables.tables.<name>.enable | Enable this table.
|
| options/nixos/networking.nftables.tables.<name>.family | Table family.
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.tokenFile | The token value
|
| options/nixos/services.anubis.instances.<name>.settings.METRICS_BIND | The address Anubis' metrics server listens to
|
| options/nixos/services.jitsi-videobridge.xmppConfigs.<name>.mucNickname | Videobridges use the same XMPP account and need to be distinguished by the
nickname (aka resource part of the JID)
|
| options/nixos/services.drupal.sites.<name>.virtualHost.logFormat | Log format for Apache's log files
|
| options/nixos/systemd.network.netdevs.<name>.l2tpSessions | Each item in this array specifies an option in the
[L2TPSession] section of the unit
|
| options/nixos/systemd.network.networks.<name>.ipv6SendRAConfig | Each attribute in this set specifies an option in the
[IPv6SendRA] section of the unit
|
| options/home-manager/programs.floorp.profiles.<name>.search.order | The order the search engines are listed in
|
| options/darwin/launchd.agents.<name>.serviceConfig.ServiceIPC | This optional key specifies whether the job participates in advanced
communication with launchd
|
| options/nixos/services.anubis.instances.<name>.settings.SERVE_ROBOTS_TXT | Whether to serve a default robots.txt that denies access to common AI bots by name and all other
bots by wildcard.
|
| options/nixos/services.wstunnel.clients.<name>.localToRemote | Listen on local and forwards traffic from remote.
|
| options/nixos/services.buildkite-agents.<name>.extraConfig | Extra lines to be added verbatim to the configuration file.
|
| options/nixos/security.pam.services.<name>.kwallet.package | The kwallet-pam package to use.
|
| options/nixos/services.sabnzbd.settings.servers.<name>.ssl | Whether the server supports TLS
|
| options/nixos/services.prosody.virtualHosts.<name>.extraConfig | Additional virtual host specific configuration
|
| options/nixos/services.znapzend.zetup.<name>.mbuffer.enable | Whether to use mbuffer.
|
| options/darwin/services.buildkite-agents.<name>.extraConfig | Extra lines to be added verbatim to the configuration file.
|
| options/home-manager/accounts.email.accounts.<name>.notmuch.enable | Whether to enable notmuch indexing.
|
| options/home-manager/accounts.contact.accounts.<name>.khard.enable | Whether to enable khard access.
|
| options/nixos/services.nginx.virtualHosts.<name>.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.orangefs.server.fileSystems.<name>.id | File system ID (must be unique within configuration).
|
| options/home-manager/services.colima.profiles.<name>.settings | Colima configuration settings, see https://github.com/abiosoft/colima/blob/main/embedded/defaults/colima.yaml or run colima template.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.xauth_id | Client XAuth username used in the XAuth exchange.
|
| options/nixos/programs.ssh.knownHosts.<name>.publicKeyFile | The path to the public key file for the host
|
| options/nixos/services.frp.instances.<name>.settings | Frp configuration, for configuration options
see the example of client
or server on github.
|
| options/home-manager/programs.smug.projects.<name>.windows.*.panes.*.root | Root path of pane
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.eap_id | Identity to use as peer identity during EAP authentication
|
| options/darwin/launchd.agents.<name>.serviceConfig.InitGroups | This optional key specifies whether initgroups(3) should be called before running the job
|
| options/nixos/services.borgbackup.repos.<name>.quota | Storage quota for the repository
|
| options/nixos/services.wstunnel.clients.<name>.extraArgs | Extra command line arguments to pass to wstunnel
|
| options/nixos/services.wstunnel.servers.<name>.extraArgs | Extra command line arguments to pass to wstunnel
|
| options/nixos/services.borgbackup.jobs.<name>.postHook | Shell commands to run just before exit
|
| options/nixos/services.errbot.instances.<name>.extraConfig | String to be appended to the config verbatim
|
| options/nixos/services.wyoming.piper.servers.<name>.lengthScale | Phoneme length value.
|
| options/nixos/services.wordpress.sites.<name>.mergedConfig | Read only representation of the final configuration.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.app | Settings to write to app.json.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.monitor | The monitor where the rule should be applied.
|
| options/home-manager/accounts.calendar.accounts.<name>.local.fileExt | The file extension to use.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.desktop | The desktop where the rule should be applied.
|
| options/home-manager/i18n.inputMethod.fcitx5.themes.<name>.highlightImage | Path to the SVG of the highlight.
|
| options/nixos/services.skydns.nameservers | Skydns list of nameservers to forward DNS requests to when not authoritative for a domain.
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.settings.<name>.permissions | Allowed permissions for this extension
|
| options/nixos/services.drupal.sites.<name>.virtualHost.enableUserDir | Whether to enable serving ~/public_html as
/~«username».
|
| options/nixos/services.neo4j.ssl.policies.<name>.tlsVersions | Restrict the TLS protocol versions of this policy to those
defined here.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost | Apache configuration can be done by adapting services.httpd.virtualHosts.
|
| options/nixos/services.wyoming.piper.servers.<name>.speaker | ID of a specific speaker in a multi-speaker model.
|
| options/darwin/environment.launchAgents.<name>.enable | Whether this file should be generated
|
| options/home-manager/programs.gnome-terminal.profile.<name>.allowBold | If true, allow applications in the
terminal to make text boldface.
|
| options/home-manager/services.kanshi.profiles.<name>.outputs.*.scale | Scales the output by the specified scale factor.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.gatewayGroups | A list of gateway groups (sites) which can reach the resource and may be used to connect to it.
|
| options/nixos/services.namecoind.rpc.key | Key file for securing RPC connections.
|
| options/nixos/services.blockbook-frontend.<name>.cssDir | Location of the dir with main.css CSS file
|
| options/nixos/services.firewalld.zones.<name>.forwardPorts | Ports to forward in the zone.
|
| options/nixos/services.firewalld.zones.<name>.sources.*.ipset | An ipset.
|
| options/nixos/services.sabnzbd.settings.servers.<name>.host | Hostname of the server
|
| options/nixos/services.sabnzbd.settings.servers.<name>.port | Port of the server
|
| options/nixos/services.nginx.virtualHosts.<name>.locations | Declarative location config
|
| options/nixos/services.vdirsyncer.jobs.<name>.timerConfig | systemd timer configuration
|
| options/nixos/services.vault-agent.instances.<name>.package | The vault package to use.
|
| options/home-manager/services.podman.containers.<name>.labels | The labels to apply to the container.
|
| options/nixos/services.nginx.upstreams.<name>.servers | Defines the address and other parameters of the upstream servers
|
| options/nixos/services.nebula.networks.<name>.tun.disable | When tun is disabled, a lighthouse can be started without a local tun interface (and therefore without root).
|
| options/nixos/services.fedimintd.<name>.api.openFirewall | Opens port in firewall for fedimintd's api port
|
| options/nixos/services.pgbackrest.stanzas.<name>.jobs | Backups jobs to schedule for this stanza as described in:
https://pgbackrest.org/user-guide.html#quickstart/schedule-backup
|
| options/home-manager/programs.ssh.matchBlocks.<name>.remoteForwards.*.host | Host port binding options
|
| options/home-manager/programs.ssh.matchBlocks.<name>.remoteForwards.*.bind | Local port binding options
|
| options/home-manager/accounts.email.accounts.<name>.folders.drafts | Relative path of the drafts mail folder.
|
| options/home-manager/accounts.calendar.accounts.<name>.khal.readOnly | Keep khal from making any changes to this account.
|
| options/darwin/environment.userLaunchAgents.<name>.source | Path of the source file.
|
| options/nixos/services.inadyn.settings.custom.<name>.ddns-path | DDNS server path
|
| options/nixos/services.gitlab-runner.services.<name>.cloneUrl | Overwrite the URL for the GitLab instance
|
| options/nixos/systemd.network.netdevs.<name>.macvlanConfig | Each attribute in this set specifies an option in the
[MACVLAN] section of the unit
|
| options/darwin/services.gitlab-runner.services.<name>.cloneUrl | Overwrite the URL for the GitLab instance
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits | Resource limits to be imposed on the job
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits | Resource limits to be imposed on the job
|
| options/nixos/systemd.user.targets.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.user.sockets.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/darwin/launchd.agents.<name>.serviceConfig.LimitLoadToHosts | This configuration file only applies to the hosts listed with this key
|
| options/nixos/services.tarsnap.archives.<name>.keyfile | Set a specific keyfile for this archive
|
| options/nixos/boot.initrd.luks.devices.<name>.fido2.credential | The FIDO2 credential ID.
|
| options/home-manager/programs.firefox.profiles.<name>.userContent | Custom Firefox user content CSS.
|
| options/nixos/services.klipper.firmwares.<name>.serial | Path to serial port this printer is connected to
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.splitRatio | The ratio between the new window and the previous existing window in
the desktop.
|
| options/nixos/services.wordpress.sites.<name>.uploadsDir | This directory is used for uploads of pictures
|
| options/home-manager/programs.ssh.matchBlocks.<name>.forwardX11Trusted | Specifies whether remote X11 clients will have full access to the
original X11 display.
|
| options/home-manager/programs.alot.tags.<name>.translation | A pair of strings that define a regular substitution to
compute the string representation on the fly using
re.sub.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.http2 | Whether to enable HTTP 2
|
| options/home-manager/programs.floorp.profiles.<name>.preConfig | Extra preferences to add to user.js, before
programs.firefox.profiles._name_.settings
|
| options/home-manager/accounts.email.accounts.<name>.getmail.readAll | Enable if you want to fetch all, even the read messages from the
server
|
| options/nixos/systemd.services.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/darwin/launchd.daemons.<name>.serviceConfig.GroupName | This optional key specifies the group to run the job as
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.present | Whether to ensure that this user is present or absent.
|
| options/nixos/services.atalkd.interfaces.<name>.config | Optional configuration string for this interface.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.loginShell | Run command as a login shell.
|
| options/nixos/users.ldap.base | The distinguished name of the search base.
|
| options/nixos/services.httpd.virtualHosts.<name>.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.caddy.virtualHosts.<name>.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.nginx.virtualHosts.<name>.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.wstunnel.clients.<name>.remoteToLocal | Listen on remote and forwards traffic from local
|
| options/nixos/services.blockbook-frontend.<name>.debug | Debug mode, return more verbose errors, reload templates on each request.
|
| options/nixos/services.openafsServer.roles.backup.cellServDB.<name>.*.ip | IP Address of a database server
|
| options/home-manager/accounts.email.accounts.<name>.getmail.enable | Whether to enable the getmail mail retriever for this account.
|
| options/nixos/services.ghostunnel.servers.<name>.key | Path to certificate private key (PEM with private key)
|
| options/nixos/services.davis.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.davis.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.movim.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.slskd.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.movim.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.slskd.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/home-manager/accounts.email.accounts.<name>.msmtp.extraConfig | Extra configuration options to add to ~/.msmtprc
|
| options/nixos/services.bitcoind.<name>.prune | Reduce storage requirements by enabling pruning (deleting) of old
blocks
|
| options/nixos/networking.wlanInterfaces.<name>.meshID | MeshID of interface with type mesh.
|
| options/home-manager/accounts.calendar.accounts.<name>.remote.type | The type of the storage.
|
| options/home-manager/services.pizauth.accounts.<name>.clientSecret | The OAuth2 client secret.
|
| options/nixos/programs.tsmClient.servers.<name>.inclexcl | Text lines with include.* and exclude.* directives
to be used when sending files to the IBM TSM server,
or an absolute path pointing to a file with such lines.
|
| options/nixos/services.inadyn.settings.provider.<name>.ssl | Whether to use HTTPS for this DDNS provider.
|
| options/nixos/containers.<name>.forwardPorts.*.protocol | The protocol specifier for port forwarding between host and container
|
| options/nixos/services.fedimintd.<name>.nginx.config.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.updown | Updown script to invoke on CHILD_SA up and down events.
|
| options/nixos/services.znc.confOptions.networks.<name>.extraConf | Extra config for the network
|
| options/darwin/environment.launchDaemons.<name>.source | Path of the source file.
|
| options/nixos/systemd.network.networks.<name>.bridgeConfig | Each attribute in this set specifies an option in the
[Bridge] section of the unit
|
| options/nixos/systemd.network.networks.<name>.pfifoFastConfig | Each attribute in this set specifies an option in the
[PFIFOFast] section of the unit
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.GroupName | This optional key specifies the group to run the job as
|
| options/nixos/services.fedimintd.<name>.nginx.config.quic | Whether to enable the QUIC transport protocol
|
| options/nixos/systemd.user.targets.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/services.wordpress.sites.<name>.plugins | Path(s) to respective plugin(s) which are copied from the 'plugins' directory.
These plugins need to be packaged before use, see example.
|
| options/nixos/systemd.user.sockets.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/systemd.network.networks.<name>.matchConfig | Each attribute in this set specifies an option in the
[Match] section of the unit
|
| options/nixos/services.v4l2-relayd.instances.<name>.input.width | The width to read from input-stream.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.certs | List of certificate candidates to use for
authentication
|
| options/nixos/services.ghostunnel.servers.<name>.cert | Path to certificate (PEM with certificate chain)
|
| options/nixos/services.httpd.virtualHosts.<name>.robotsEntries | Specification of pages to be ignored by web crawlers
|
| options/nixos/services.fedimintd.<name>.p2p.openFirewall | Opens port in firewall for fedimintd's p2p port (both TCP and UDP)
|
| options/nixos/networking.wireless.networks.<name>.pskRaw | Either the raw pre-shared key in hexadecimal format
or the name of the secret (as defined inside
networking.wireless.secretsFile and prefixed
with ext:) containing the network pre-shared key.
Be aware that this will be written to the Nix store
in plaintext! Always use an external reference.
The external secret can be either the plaintext
passphrase or the raw pre-shared key.
Mutually exclusive with psk and auth.
|
| options/nixos/services.anki-sync-server.users.*.username | User name accepted by anki-sync-server.
|
| options/home-manager/programs.irssi.networks.<name>.saslExternal | Enable SASL external authentication
|
| options/nixos/services.k3s.manifests.<name>.content | Content of the manifest file
|
| options/nixos/systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.user | The user of the file
|
| options/nixos/systemd.services.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/home-manager/services.pizauth.accounts.<name>.scopes | The scopes which the OAuth2 token will give access to
|
| options/nixos/services.snapserver.streams.<name>.codec | Default audio compression method.
|
| options/nixos/services.vdirsyncer.jobs.<name>.config.pairs | vdirsyncer pair configurations
|
| options/home-manager/programs.hexchat.channels.<name>.commands | Commands to be executed on connecting to server.
|
| options/home-manager/programs.i3status.modules.<name>.position | Position of this module in i3status order.
|
| options/nixos/services.nextcloud.config.dbname | Database name.
|
| options/nixos/services.btrbk.instances.<name>.settings | configuration options for btrbk
|
| options/home-manager/programs.ssh.matchBlocks.<name>.localForwards.*.host.port | Specifies port number to forward to.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.private | Whether the node should stay in the same tiling position and size.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.localForwards.*.bind.port | Specifies port number to bind to.
|
| options/nixos/systemd.user.services.<name>.stopIfChanged | If set, a changed unit is restarted by calling
systemctl stop in the old configuration,
then systemctl start in the new one
|
| options/nixos/services.snipe-it.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.fedimintd.<name>.bitcoin.network | Bitcoin network to participate in.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.default | Whether this should be the default profile.
|
| options/nixos/services.postfix.settings.master.<name>.args | Arguments to pass to the command
|
| options/nixos/services.github-runners.<name>.noDefaultLabels | Disables adding the default labels
|
| options/darwin/services.github-runners.<name>.noDefaultLabels | Disables adding the default labels
|
| options/darwin/launchd.agents.<name>.serviceConfig.Program | This key maps to the first argument of execvp(3)
|
| options/nixos/services.tinc.networks.<name>.chroot | Change process root directory to the directory where the config file is located (/etc/tinc/netname/), for added security
|
| options/nixos/networking.jool.siit.<name>.framework | The framework to use for attaching Jool's translation to the exist
kernel packet processing rules
|
| options/home-manager/accounts.email.accounts.<name>.jmap.sessionUrl | URL for the JMAP Session resource
|
| options/nixos/networking.nameservers | The list of nameservers
|
| options/nixos/services.grafana.provision.alerting.muteTimings.settings.muteTimes.*.name | Name of the mute time interval, must be unique
|
| options/nixos/services.httpd.virtualHosts.<name>.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.nginx.virtualHosts.<name>.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.drupal.sites.<name>.virtualHost.sslServerChain | Path to server SSL chain file.
|
| options/nixos/services.akkoma.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.gancio.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.fluidd.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.httpd.virtualHosts.<name>.locations | Declarative location config
|
| options/nixos/services.monica.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.tinc.networks.<name>.interfaceType | The type of virtual interface used for the network connection.
|
| options/nixos/services.matomo.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.kexAlgorithms | Specifies the available KEX (Key Exchange) algorithms.
|
| options/nixos/services.ytdl-sub.instances.<name>.schedule | How often to run ytdl-sub
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.expunge | Permanently remove messages marked for deletion from
the given mail store.
|
| options/nixos/services.easytier.instances.<name>.enable | Enable the instance.
|
| options/nixos/services.firewalld.services.<name>.ports.*.port | |
| options/nixos/services.opkssh.providers.<name>.lifetime | Token lifetime
|
| options/home-manager/programs.floorp.profiles.<name>.bookmarks | Declarative bookmarks.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.readBuckets | The organization's buckets which should be allowed to be read
|
| options/nixos/image.repart.partitions.<name>.repartConfig | Specify the repart options for a partiton as a structural setting
|
| options/nixos/services.tarsnap.archives.<name>.lowmem | Reduce memory consumption by not caching small files
|
| options/darwin/launchd.agents.<name>.serviceConfig.LaunchOnlyOnce | This optional key specifies whether the job can only be run once and only once
|
| options/nixos/security.apparmor.policies.<name>.profile | The profile file contents
|
| options/nixos/services.tahoe.introducers.<name>.tub.port | The port on which the introducer will listen.
|
| options/nixos/services.tarsnap.archives.<name>.excludes | Exclude files and directories matching these patterns.
|
| options/home-manager/programs.hexchat.channels.<name>.autojoin | Channels list to autojoin on connecting to server.
|
| options/home-manager/accounts.calendar.accounts.<name>.qcal.enable | Whether to enable qcal access.
|
| options/home-manager/accounts.calendar.accounts.<name>.khal.enable | Whether to enable khal access.
|
| options/nixos/services.github-runners.<name>.group | Group under which to run the service
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.rsa.<name>.file | File name in the rsa folder for which this passphrase
should be used.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacerts | List of CA certificates to accept for
authentication
|
| options/nixos/services.wordpress.sites.<name>.settings | Structural Wordpress configuration
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/nixos/services.cgit.<name>.gitHttpBackend.enable | Whether to bypass cgit and use git-http-backend for HTTP clones
|
| options/nixos/services.borgbackup.jobs.<name>.extraInitArgs | Additional arguments for borg init
|
| options/nixos/services.mosquitto.bridges.<name>.topics | Topic patterns to be shared between the two brokers
|
| options/home-manager/accounts.calendar.accounts.<name>.khal.color | Color in which events in this calendar are displayed
|
| options/home-manager/services.pizauth.accounts.<name>.extraConfig | Additional configuration that will be added to the account configuration
|
| options/nixos/services.rke2.manifests.<name>.content | Content of the manifest file
|
| options/nixos/services.postfix.masterConfig.<name>.maxproc | The maximum number of processes to spawn for this service
|
| options/nixos/services.drupal.sites.<name>.virtualHost.enableACME | Whether to ask Let's Encrypt to sign a certificate for this vhost
|
| options/nixos/services.blockbook-frontend.<name>.enable | Whether to enable blockbook-frontend application.
|
| options/nixos/services.klipper.firmwares.<name>.package | Path to the built firmware package.
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.algorithm | Which algorithm to use for DNSSEC
|
| options/nixos/systemd.services.<name>.environment | Environment variables passed to the service's processes.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.listen | Listen addresses and ports for this virtual host.
This option overrides addSSL, forceSSL and onlySSL
|
| options/nixos/services.namecoind.rpc.port | Port the RPC server will bind to.
|
| options/nixos/networking.wlanInterfaces.<name>.type | The type of the WLAN interface
|
| options/home-manager/services.podman.containers.<name>.autoStart | Whether to start the container on boot (requires user lingering).
|
| options/nixos/services.firezone.server.provision.accounts.<name>.policies.<name>.description | The description of this policy
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.operator | Grants all permissions in all organizations.
|
| options/nixos/services.errbot.instances.<name>.identity | Errbot identity configuration
|
| options/nixos/services.gitlab-runner.services.<name>.dockerImage | Docker image to be used.
|
| options/nixos/networking.supplicant.<name>.driver | Force a specific wpa_supplicant driver.
|
| options/nixos/networking.wlanInterfaces.<name>.flags | Flags for interface of type monitor.
|
| options/darwin/services.gitlab-runner.services.<name>.dockerImage | Docker image to be used.
|
| options/home-manager/services.xsuspender.rules.<name>.resumeEvery | Resume interval in seconds.
|
| options/nixos/services.davis.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.slskd.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.movim.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.firezone.server.provision.accounts.<name>.auth | All authentication providers to provision
|
| options/nixos/services.jibri.xmppEnvironments.<name>.control.muc.nickname | The nickname for this Jibri instance in the MUC.
|
| options/nixos/services.i2pd.ifname4 | IPv4 interface to bind to.
|
| options/nixos/services.i2pd.ifname6 | IPv6 interface to bind to.
|
| options/nixos/services.borgbackup.jobs.<name>.prune.keep | Prune a repository by deleting all archives not matching any of the
specified retention options
|
| options/nixos/services.tahoe.nodes.<name>.storage.reservedSpace | The amount of filesystem space to not use for storage.
|
| options/nixos/services.redis.servers.<name>.maxclients | Set the max number of connected clients at the same time.
|
| options/home-manager/services.kanshi.profiles.<name>.outputs.*.status | Enables or disables the specified output.
|
| options/home-manager/systemd.user.slices.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.serverAliveInterval | Set timeout in seconds after which response will be requested.
|
| options/home-manager/systemd.user.mounts.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/home-manager/systemd.user.timers.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.protocol | The protocol to allow
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.pubkeys | List of raw public keys to accept for
authentication
|
| options/nixos/services.blockbook-frontend.<name>.coinName | See https://github.com/trezor/blockbook/blob/master/bchain/coins/blockchain.go#L61
for current of coins supported in master (Note: may differ from release).
|
| options/home-manager/programs.ssh.matchBlocks.<name>.dynamicForwards | Specify dynamic port forwardings
|
| options/nixos/services.firewalld.zones.<name>.forwardPorts.*.port | |
| options/home-manager/programs.gnome-terminal.profile.<name>.cursorShape | The cursor shape.
|
| options/nixos/services.fedimintd.<name>.nginx.config.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/systemd.network.networks.<name>.flowQueuePIEConfig | Each attribute in this set specifies an option in the
[FlowQueuePIE] section of the unit
|
| options/home-manager/accounts.contact.accounts.<name>.khard.type | Either a single vdir located in accounts.contact.accounts._name_.local.path
or multiple automatically discovered vdirs in
accounts.contact.accounts._name_.local.path/accounts.contact.accounts._name_.khard.glob.
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.coverage | The length of time to ensure that keys will be correct; no action will be taken to create new keys to be activated after this time.
|
| options/darwin/launchd.agents.<name>.serviceConfig.LimitLoadFromHosts | This configuration file only applies to hosts NOT listed with this key
|
| options/nixos/services.jibri.xmppEnvironments.<name>.control.muc.roomName | The room name of the MUC to connect to for control.
|
| options/nixos/services.fedimintd.<name>.nginx.config.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| options/nixos/services.firewalld.zones.<name>.forward | Whether to enable intra-zone forwarding
|
| options/nixos/services.vmalert.instances.<name>.rules | A list of the given alerting or recording rules against configured "datasource.url" compatible with
Prometheus HTTP API for vmalert to execute
|
| options/nixos/services.wstunnel.servers.<name>.restrictTo | Accepted traffic will be forwarded only to this service.
|
| options/nixos/services.keepalived.vrrpScripts.<name>.fall | Required number of failures for KO transition.
|
| options/nixos/services.fedimintd.<name>.nginx.config.listen.*.ssl | Enable SSL.
|
| options/nixos/services.keepalived.vrrpScripts.<name>.rise | Required number of successes for OK transition.
|
| options/nixos/services.blockbook-frontend.<name>.public | Public http server binding [address]:port.
|
| options/nixos/services.znc.confOptions.networks.<name>.modules | ZNC network modules to load.
|
| options/nixos/services.nginx.virtualHosts.<name>.reuseport | Create an individual listening socket
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.flatten | If set, flattens the hierarchy within the maildir by
substituting the canonical hierarchy delimiter
/ with this value.
|
| options/nixos/services.hylafax.modems.<name>.config | Attribute set of values for the given modem
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags.deleted | Tag for notmuch to use for messages stored in the mailbox labeled with the
Trash name attribute
|
| options/home-manager/programs.thunderbird.profiles.<name>.calendarAccountsOrder | Custom ordering of calendar accounts
|
| options/nixos/services.autorandr.profiles.<name>.config | Per output profile configuration.
|
| options/nixos/services.authelia.instances.<name>.enable | Whether to enable Authelia instance.
|
| options/nixos/services.sanoid.templates.<name>.autosnap | Whether to automatically take snapshots.
|
| options/darwin/networking.wg-quick.interfaces.<name>.dns | List of DNS servers for this interface.
|
| options/home-manager/programs.librewolf.profiles.<name>.search | Declarative search engine configuration.
|
| options/home-manager/programs.autorandr.profiles.<name>.config | Per output profile configuration.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.manage | Whether the window should be managed by bspwm
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.writeBuckets | The organization's buckets which should be allowed to be written
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.groups | Authorization group memberships to require
|
| options/nixos/services.snapserver.streams.<name>.query | Key-value pairs that convey additional parameters about a stream.
|
| options/nixos/services.klipper.firmwares.<name>.configFile | Path to firmware config which is generated using klipper-genconf
|
| options/nixos/systemd.user.targets.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/systemd.user.sockets.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/darwin/environment.userLaunchAgents.<name>.enable | Whether this file should be generated
|
| options/nixos/systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.group | The group of the file
|
| options/nixos/systemd.network.networks.<name>.ipv6Prefixes | A list of ipv6Prefix sections to be added to the unit
|
| options/nixos/services.wordpress.sites.<name>.database.user | Database user.
|
| options/home-manager/services.podman.containers.<name>.autoUpdate | The autoupdate policy for the container.
|
| options/home-manager/accounts.email.accounts.<name>.signature.text | Signature content.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/home-manager/services.unison.pairs.<name>.commandOptions | Additional command line options as a dictionary to pass to the
unison program
|
| options/nixos/services.postfix.masterConfig.<name>.private | Whether the service's sockets and storage directory is restricted to
be only available via the mail system
|
| options/nixos/services.fedimintd.<name>.nginx.config.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| options/nixos/services.restic.backups.<name>.dynamicFilesFrom | A script that produces a list of files to back up
|
| options/home-manager/launchd.agents.<name>.config.StartInterval | This optional key causes the job to be started every N seconds
|
| options/nixos/services.inadyn.settings.custom.<name>.include | File to include additional settings for this provider from.
|
| options/nixos/systemd.services.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.boldIsBright | Whether bold text is shown in bright colors.
|
| options/home-manager/programs.irssi.networks.<name>.server.autoConnect | Whether Irssi connects to the server on launch.
|
| options/nixos/services.namecoind.enable | Whether to enable namecoind, Namecoin client.
|
| options/home-manager/services.xsuspender.rules.<name>.execResume | Before resuming, execute this shell script
|
| options/home-manager/services.muchsync.remotes.<name>.local.importNew | Whether to begin the synchronisation by running
notmuch new locally.
|
| options/nixos/services.firewalld.zones.<name>.forwardPorts.*.to-port | |
| options/nixos/networking.nftables.tables.<name>.content | The table content.
|
| options/nixos/services.restic.backups.<name>.repository | repository to backup to.
|
| options/nixos/services.gitlab-runner.services.<name>.buildsDir | Absolute path to a directory where builds will be stored
in context of selected executor (Locally, Docker, SSH).
|
| options/nixos/services.drupal.sites.<name>.virtualHost.extraConfig | These lines go to httpd.conf verbatim
|
| options/darwin/services.gitlab-runner.services.<name>.buildsDir | Absolute path to a directory where builds will be stored
in context of selected executor (Locally, Docker, SSH).
|
| options/darwin/launchd.agents.<name>.serviceConfig.LowPriorityIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O.
|
| options/home-manager/programs.firefox.profiles.<name>.search.order | The order the search engines are listed in
|
| options/darwin/launchd.daemons.<name>.serviceConfig.OnDemand | This key was used in Mac OS X 10.4 to control whether a job was kept alive or not
|
| options/nixos/services.mautrix-meta.instances.<name>.dataDir | Path to the directory with database, registration, and other data for the bridge service
|
| options/darwin/launchd.daemons.<name>.serviceConfig.ServiceIPC | This optional key specifies whether the job participates in advanced
communication with launchd
|
| options/home-manager/launchd.agents.<name>.config.AbandonProcessGroup | When a job dies, launchd kills any remaining processes with the same process group ID as the job
|
| options/nixos/networking.wg-quick.interfaces.<name>.dns | The IP addresses of DNS servers to configure.
|
| options/nixos/services.sanoid.datasets.<name>.autoprune | Whether to automatically prune old snapshots.
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.uri | URI to bind the wyoming server to.
|
| options/nixos/services.lemmy.settings.hostname | The domain name of your instance (eg 'lemmy.ml').
|
| options/nixos/services.netbird.tunnels.<name>.hardened | Hardened service:
- runs as a dedicated user with minimal set of permissions (see caveats),
- restricts daemon configuration socket access to dedicated user group
(you can grant access to it with
users.users."<user>".extraGroups = [ netbird-‹name› ]),
Even though the local system resources access is restricted:
CAP_NET_RAW, CAP_NET_ADMIN and CAP_BPF still give unlimited network manipulation possibilites,
- older kernels don't have
CAP_BPF and use CAP_SYS_ADMIN instead,
Known security features that are not (yet) integrated into the module:
- 2024-02-14:
rosenpass is an experimental feature configurable solely
through --enable-rosenpass flag on the netbird up command,
see the docs
|
| options/nixos/services.netbird.clients.<name>.hardened | Hardened service:
- runs as a dedicated user with minimal set of permissions (see caveats),
- restricts daemon configuration socket access to dedicated user group
(you can grant access to it with
users.users."<user>".extraGroups = [ netbird-‹name› ]),
Even though the local system resources access is restricted:
CAP_NET_RAW, CAP_NET_ADMIN and CAP_BPF still give unlimited network manipulation possibilites,
- older kernels don't have
CAP_BPF and use CAP_SYS_ADMIN instead,
Known security features that are not (yet) integrated into the module:
- 2024-02-14:
rosenpass is an experimental feature configurable solely
through --enable-rosenpass flag on the netbird up command,
see the docs
|
| options/home-manager/accounts.calendar.accounts.<name>.primary | Whether this is the primary account
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.ca_id | Identity in CA certificate to accept for authentication
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saeAddToMacAllow | If set, all sae password entries that have a non-wildcard MAC associated to
them will additionally be used to populate the MAC allow list
|
| options/nixos/systemd.user.services.<name>.reloadIfChanged | Whether the service should be reloaded during a NixOS
configuration switch if its definition has changed
|
| options/nixos/systemd.user.services.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.nebula.networks.<name>.staticHostMap | The static host map defines a set of hosts with fixed IP addresses on the internet (or any network)
|
| options/nixos/services.kanata.keyboards.<name>.devices | Paths to keyboard devices
|
| options/nixos/services.httpd.virtualHosts.<name>.documentRoot | The path of Apache's document root directory
|
| options/nixos/services.kanboard.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.fediwall.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.librenms.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.agorakit.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.mainsail.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.wordpress.sites.<name>.database.port | Database host port.
|
| options/nixos/services.wordpress.sites.<name>.database.host | Database host address.
|
| options/darwin/services.buildkite-agents.<name>.preCommands | Extra commands to run before starting buildkite.
|
| options/home-manager/accounts.email.accounts.<name>.meli.mailboxes | Mailboxes to show in meli
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.patterns | Pattern of mailboxes to synchronize.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.InitGroups | This optional key specifies whether initgroups(3) should be called before running the job
|
| options/nixos/services.prefect.workerPools.<name>.installPolicy | install policy for the worker (always, if-not-present, never, prompt)
|
| options/darwin/environment.launchDaemons.<name>.enable | Whether this file should be generated
|
| options/nixos/security.pam.services.<name>.startSession | If set, the service will register a new session with
systemd's login manager
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.reqid | Fixed reqid to use for this CHILD_SA
|
| options/nixos/services.fluidd.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.fluidd.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.akkoma.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.akkoma.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.gancio.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.gancio.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.matomo.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.matomo.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.monica.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.monica.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.subFolders | The on-disk folder naming style
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.OnDemand | This key was used in Mac OS X 10.4 to control whether a job was kept alive or not
|
| options/nixos/services.restic.backups.<name>.initialize | Create the repository if it doesn't exist.
|
| options/home-manager/services.podman.containers.<name>.volumes | The volumes to mount into the container.
|
| options/home-manager/services.podman.containers.<name>.devices | The devices to mount into the container
|
| options/home-manager/accounts.email.accounts.<name>.getmail.delete | Enable if you want to delete read messages from the server
|
| options/nixos/services.kanata.keyboards.<name>.extraDefCfg | Configuration of defcfg other than linux-dev (generated
from the devices option) and
linux-continue-if-no-devs-found (hardcoded to be yes)
|
| options/nixos/services.keyd.keyboards.<name>.extraConfig | Extra configuration that is appended to the end of the file.
Do not write ids section here, use a separate option for it
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.description | Optional description for the API token
|
| options/nixos/networking.jool.nat64.<name>.framework | The framework to use for attaching Jool's translation to the exist
kernel packet processing rules
|
| options/nixos/services.spiped.config.<name>.weakHandshake | Use fast/weak handshaking: This reduces the CPU time spent
in the initial connection setup, at the expense of losing
perfect forward secrecy.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.ServiceIPC | This optional key specifies whether the job participates in advanced
communication with launchd
|
| options/nixos/services.awstats.configs.<name>.webService.enable | Whether to enable awstats web service.
|
| options/nixos/services.easytier.instances.<name>.extraArgs | Extra args append to the easytier command-line.
|
| options/nixos/services.davis.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.slskd.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.movim.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.logrotate.settings.<name>.enable | Whether to enable setting individual kill switch.
|
| options/darwin/networking.wg-quick.interfaces.<name>.mtu | MTU to set for this interface, automatically set if not specified
|
| options/home-manager/programs.ssh.matchBlocks.<name>.dynamicForwards.*.port | Specifies port number to bind to.
|
| options/nixos/services.influxdb2.provision.organizations.<name>.buckets.<name>.present | Whether to ensure that this bucket is present or absent.
|
| options/nixos/boot.initrd.luks.devices.<name>.tryEmptyPassphrase | If keyFile fails then try an empty passphrase first before
prompting for password.
|
| options/home-manager/programs.i3status.modules.<name>.settings | Configuration to add to this i3status module
|
| options/home-manager/programs.hexchat.channels.<name>.password | Password to use
|
| options/nixos/services.firewalld.zones.<name>.ports.*.protocol | |
| options/nixos/networking.vswitches.<name>.openFlowRules | OpenFlow rules to insert into the Open vSwitch
|
| options/nixos/services.syncoid.commands.<name>.sendOptions | Advanced options to pass to zfs send
|
| options/nixos/services.syncoid.commands.<name>.recvOptions | Advanced options to pass to zfs recv
|
| options/nixos/systemd.network.networks.<name>.dhcpServerConfig | Each attribute in this set specifies an option in the
[DHCPServer] section of the unit
|
| options/nixos/systemd.network.networks.<name>.pfifoHeadDropConfig | Each attribute in this set specifies an option in the
[PFIFOHeadDrop] section of the unit
|
| options/nixos/services.vmalert.instances.<name>.enable | Wether to enable VictoriaMetrics's vmalert.
vmalert evaluates alerting and recording rules against a data source, sends notifications via Alertmanager.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LimitLoadToHosts | This configuration file only applies to the hosts listed with this key
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.InitGroups | This optional key specifies whether initgroups(3) should be called before running the job
|
| options/nixos/networking.wg-quick.interfaces.<name>.preUp | Commands called at the start of the interface setup.
|
| options/nixos/services.fedimintd.<name>.nginx.config.listen.*.addr | Listen address.
|
| options/nixos/services.v4l2-relayd.instances.<name>.input.height | The height to read from input-stream.
|
| options/darwin/networking.wg-quick.interfaces.<name>.preUp | List of commands to run before interface setup.
|
| options/nixos/services.tor.relay.onionServices.<name>.settings | Settings of the onion service
|
| options/nixos/services.netbird.tunnels.<name>.dns-resolver.port | A port to serve DNS entries on when dns-resolver.address is enabled.
|
| options/nixos/services.netbird.clients.<name>.dns-resolver.port | A port to serve DNS entries on when dns-resolver.address is enabled.
|
| options/nixos/services.borgbackup.jobs.<name>.extraPruneArgs | Additional arguments for borg prune
|
| options/darwin/launchd.agents.<name>.serviceConfig.StandardInPath | This optional key specifies what file should be used for data being supplied to stdin when using
stdio(3).
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.pools | List of named IP pools to allocate virtual IP addresses
and other configuration attributes from
|
| options/nixos/services.jupyterhub.kernels.<name>.logo64 | Path to 64x64 logo png.
|
| options/nixos/services.fedimintd.<name>.nginx.config.default | Makes this vhost the default.
|
| options/nixos/services.jupyterhub.kernels.<name>.logo32 | Path to 32x32 logo png.
|
| options/nixos/services.tinc.networks.<name>.ed25519PrivateKeyFile | Path of the private ed25519 keyfile.
|
| options/home-manager/programs.hexchat.channels.<name>.options.forceSSL | Use SSL for all servers.
|
| options/home-manager/programs.firefox.profiles.<name>.preConfig | Extra preferences to add to user.js, before
programs.firefox.profiles._name_.settings
|
| options/home-manager/accounts.email.accounts.<name>.aerc.smtpOauth2Params | Sets the oauth2 params if authentication mechanism oauthbearer or
xoauth2 is used
|
| options/home-manager/accounts.email.accounts.<name>.aerc.imapOauth2Params | Sets the oauth2 params if authentication mechanism oauthbearer or
xoauth2 is used
|
| options/home-manager/programs.rclone.remotes.<name>.secrets | Sensitive configuration values such as passwords, API keys, and tokens
|
| options/nixos/services.ghostunnel.servers.<name>.allowAll | If true, allow all clients, do not check client cert subject.
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.remoteForwards.*.bind.port | Specifies port number to bind to.
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.remoteForwards.*.host.port | Specifies port number to forward to.
|
| options/nixos/services.jibri.xmppEnvironments.<name>.control.login.username | User part of the JID.
|
| options/nixos/services.peertube-runner.instancesToRegister.<name>.runnerName | Runner name declared to the PeerTube instance.
|
| options/nixos/services.wstunnel.servers.<name>.restrictTo.*.port | The port.
|
| options/nixos/services.wstunnel.servers.<name>.restrictTo.*.host | The hostname.
|
| options/nixos/services.firewalld.zones.<name>.protocols | Protocols to allow in the zone.
|
| options/nixos/services.blockbook-frontend.<name>.configFile | Location of the blockbook configuration file.
|
| options/nixos/services.zeronsd.servedNetworks.<name>.package | The zeronsd package to use.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.audibleBell | Turn on/off the terminal's bell.
|
| options/nixos/programs.tsmClient.servers.<name>.genPasswd | Whether to enable automatic client password generation
|
| options/home-manager/programs.floorp.profiles.<name>.search.force | Whether to force replace the existing search
configuration
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LimitLoadToHosts | This configuration file only applies to the hosts listed with this key
|
| options/home-manager/services.restic.backups.<name>.dynamicFilesFrom | A script that produces a list of files to back up
|
| options/nixos/networking.wlanInterfaces.<name>.fourAddr | Whether to enable 4-address mode with type managed.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.v4l2-relayd.instances.<name>.input.format | The video-format to read from input-stream.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ecdsa.<name>.file | File name in the ecdsa folder for which this
passphrase should be used.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs8.<name>.file | File name in the pkcs8 folder for which this
passphrase should be used.
|
| options/nixos/services.github-runners.<name>.tokenType | Type of token to use for runner registration
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.ipcomp | Enable IPComp compression before encryption
|
| options/nixos/services.dependency-track.oidc.usernameClaim | Defines the name of the claim that contains the username in the provider's userinfo endpoint
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.aaa_id | Server side EAP-Identity to expect in the EAP method
|
| options/home-manager/programs.floorp.profiles.<name>.search.default | The default search engine used in the address bar and search
bar.
|
| options/home-manager/programs.lutris.runners.<name>.settings.system | Lutris system options for this runner
|
| options/home-manager/launchd.agents.<name>.config.WorkingDirectory | This optional key is used to specify a directory to chdir(2) to before running the job.
|
| options/nixos/services.blockbook-frontend.<name>.package | The blockbook package to use.
|
| options/nixos/programs.proxychains.proxies.<name>.type | Proxy type.
|
| options/nixos/programs.proxychains.proxies.<name>.port | Proxy port
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.settings.<name>.permissions | Allowed permissions for this extension
|
| options/nixos/networking.wireguard.interfaces.<name>.listenPort | 16-bit port for listening
|
| options/nixos/services.borgbackup.jobs.<name>.privateTmp | Set the PrivateTmp option for
the systemd-service
|
| options/nixos/systemd.network.networks.<name>.networkConfig | Each attribute in this set specifies an option in the
[Network] section of the unit
|
| options/nixos/systemd.network.networks.<name>.ipv6AcceptRAConfig | Each attribute in this set specifies an option in the
[IPv6AcceptRA] section of the unit
|
| options/nixos/services.dokuwiki.sites.<name>.settings | Structural DokuWiki configuration
|
| options/nixos/services.fedimintd.<name>.nginx.config.kTLS | Whether to enable kTLS support
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.pubkeys | List of raw public key candidates to use for
authentication
|
| options/nixos/systemd.user.services.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.firewalld.zones.<name>.forwardPorts.*.to-addr | Destination IP address.
|
| options/nixos/networking.supplicant.<name>.extraCmdArgs | Command line arguments to add when executing wpa_supplicant.
|
| options/darwin/services.github-runners.<name>.tokenFile | The full path to a file which contains either
- a fine-grained personal access token (PAT),
- a classic PAT
- or a runner registration token
Changing this option or the tokenFile’s content triggers a new runner registration
|
| options/nixos/services.bitcoind.<name>.extraCmdlineOptions | Extra command line options to pass to bitcoind
|
| options/darwin/launchd.agents.<name>.serviceConfig.StandardOutPath | This optional key specifies what file should be used for data being sent to stdout when using stdio(3).
|
| options/nixos/services.ax25.axports.<name>.description | Free format description of this interface.
|
| options/nixos/networking.macvlans.<name>.interface | The interface the macvlan will transmit packets through.
|
| options/nixos/networking.wg-quick.interfaces.<name>.postUp | Commands called after the interface setup.
|
| options/nixos/services.public-inbox.settings.coderepo.<name>.dir | Path to a git repository
|
| options/nixos/services.openbao.settings.listener.<name>.type | The listener type to enable.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.hostName | Canonical hostname for the server.
|
| options/home-manager/accounts.email.accounts.<name>.alot.sendMailCommand | Command to send a mail
|
| options/nixos/services.pgbackrest.stanzas.<name>.instances | An attribute set of database instances as described in:
https://pgbackrest.org/configuration.html#section-stanza
Each instance defaults to set pg-host to the attribute's name
|
| options/nixos/services.grafana.provision.dashboards.settings.providers.*.name | A unique provider name.
|
| options/nixos/services.httpd.virtualHosts.<name>.globalRedirect | If set, all requests for this host are redirected permanently to
the given URL.
|
| options/nixos/services.kimai.sites.<name>.database.passwordFile | A file containing the password corresponding to
database.user.
|
| options/nixos/systemd.paths.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/systemd.units.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/services.borgbackup.jobs.<name>.dumpCommand | Backup the stdout of this program instead of filesystem paths
|
| options/nixos/systemd.network.networks.<name>.addresses | A list of address sections to be added to the unit
|
| options/nixos/services.consul-template.instances.<name>.user | User under which this instance runs.
|
| options/home-manager/services.git-sync.repositories.<name>.path | The path at which to sync the repository
|
| options/nixos/services.gancio.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.fedimintd.<name>.nginx.config.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.fluidd.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.akkoma.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.matomo.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.monica.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/home-manager/systemd.user.services.<name>.Unit.X-Reload-Triggers | List of free form strings that can be used to trigger a service
reload during Home Manager activation.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.userNameCommand | A command that prints the user name to standard output.
|
| options/nixos/services.autorandr.profiles.<name>.fingerprint | Output name to EDID mapping
|
| options/home-manager/programs.autorandr.profiles.<name>.fingerprint | Output name to EDID mapping
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Program | This key maps to the first argument of execvp(3)
|
| options/nixos/services.ghostunnel.servers.<name>.target | Address to forward connections to (can be HOST:PORT or unix:PATH).
|
| options/nixos/services.kimai.sites.<name>.database.createLocally | Create the database and database user locally.
|
| options/nixos/boot.binfmt.registrations.<name>.mask | A mask to be ANDed with the byte sequence of the file before matching
|
| options/nixos/services.awstats.configs.<name>.webService.urlPrefix | The URL prefix under which the awstats pages appear.
|
| options/nixos/networking.wg-quick.interfaces.<name>.type | The type of the interface
|
| options/nixos/services.ghostunnel.servers.<name>.listen | Address and port to listen on (can be HOST:PORT, unix:PATH).
|
| options/home-manager/programs.smug.projects.<name>.windows.*.commands | Commands to execute when window starts.
|
| options/nixos/services.openafsServer.cellServDB.*.dnsname | DNS full-qualified domain name of a database server
|
| options/nixos/services.openafsClient.cellServDB.*.dnsname | DNS full-qualified domain name of a database server
|
| options/nixos/services.firewalld.services.<name>.version | Version of the service.
|
| options/nixos/services.firewalld.services.<name>.helpers | Helpers for the service.
|
| options/home-manager/programs.firefox.profiles.<name>.bookmarks | Declarative bookmarks.
|
| options/nixos/services.znapzend.zetup.<name>.mbuffer.port | Port to use for mbuffer
|
| options/nixos/services.tarsnap.archives.<name>.includes | Include only files and directories matching these
patterns (the empty list includes everything)
|
| options/nixos/services.mautrix-meta.instances.<name>.enable | Whether to enable Mautrix-Meta, a Matrix <-> Facebook and Matrix <-> Instagram hybrid puppeting/relaybot bridge.
|
| options/nixos/services.tor.relay.onionServices.<name>.secretKey | Secret key of the onion service
|
| options/nixos/systemd.user.services.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/services.gitea-actions-runner.instances.<name>.url | Base URL of your Gitea/Forgejo instance.
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.prosody.virtualHosts.<name>.ssl.extraOptions | Extra SSL configuration options.
|
| options/darwin/networking.wg-quick.interfaces.<name>.postUp | List of commands to run after interface setup.
|
| options/home-manager/services.podman.images.<name>.decryptionKeyFile | Path to key used for decryption of images.
|
| options/home-manager/services.xsuspender.rules.<name>.onlyOnBattery | Whether to enable process suspend only on battery.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.imapOauth2Params.scope | The OAuth2 requested scope.
|
| options/home-manager/accounts.email.accounts.<name>.gpg.encryptByDefault | Encrypt outgoing messages by default.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.smtpOauth2Params.scope | The OAuth2 requested scope.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LaunchOnlyOnce | This optional key specifies whether the job can only be run once and only once
|
| options/nixos/services.openvpn.servers.<name>.authUserPass | This option can be used to store the username / password credentials
with the "auth-user-pass" authentication method
|
| options/nixos/security.pam.services.<name>.ttyAudit.enablePattern | For each user matching one of comma-separated
glob patterns, enable TTY auditing
|
| options/nixos/services.agorakit.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.kanboard.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/programs.xfs_quota.projects.<name>.sizeHardLimit | Hard limit of the project size.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.fediwall.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.librenms.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.kanboard.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.agorakit.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/programs.proxychains.proxies.<name>.host | Proxy host or IP address.
|
| options/nixos/programs.xfs_quota.projects.<name>.sizeSoftLimit | Soft limit of the project size
|
| options/nixos/services.fediwall.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.librenms.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/networking.wg-quick.interfaces.<name>.preDown | Command called before the interface is taken down.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.mainsail.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.mainsail.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.sabnzbd.settings.servers.<name>.enable | Enable this server by default
|
| options/home-manager/programs.vscode.profiles.<name>.globalSnippets | Defines global user snippets.
|
| options/home-manager/programs.vscode.profiles.<name>.userSettings | Configuration written to Visual Studio Code's
settings.json
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Program | This key maps to the first argument of execvp(3)
|
| options/home-manager/programs.floorp.profiles.<name>.settings | Attribute set of Floorp preferences
|
| options/nixos/services.drupal.sites.<name>.virtualHost.forceSSL | Whether to add a separate nginx server block that permanently redirects (301)
all plain HTTP traffic to HTTPS
|
| options/darwin/services.gitlab-runner.services.<name>.preCloneScript | Runner-specific command script executed before code is pulled.
|
| options/home-manager/services.xsuspender.rules.<name>.execSuspend | Before suspending, execute this shell script
|
| options/home-manager/accounts.email.accounts.<name>.neomutt.extraConfig | Extra lines to add to the folder hook for this account.
|
| options/home-manager/accounts.email.accounts.<name>.astroid.extraConfig | Extra settings to add to this astroid account configuration.
|
| options/home-manager/services.restic.backups.<name>.initialize | Create the repository if it does not already exist
|
| options/home-manager/programs.neovim.extraName | Extra name appended to the wrapper package name.
|
| options/nixos/services.anubis.instances | An attribute set of Anubis instances
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers | Peers linked to the interface.
|
| options/nixos/services.authelia.instances.<name>.package | The authelia package to use.
|
| options/nixos/services.mosquitto.bridges.<name>.settings | Additional settings for this bridge.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.themes | Themes to install.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.cursorBlinkMode | The cursor blink mode.
|
| options/darwin/launchd.agents.<name>.serviceConfig.WaitForDebugger | This optional key specifies that launchd should instruct the kernel to have the job wait for a debugger
to attach before any code in the job is executed.
|
| options/nixos/services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.help | A human-readable description of this metric.
|
| options/nixos/services.dokuwiki.sites.<name>.templates | List of path(s) to respective template(s) which are copied into the 'tpl' directory.
These templates need to be packaged before use, see example.
|
| options/nixos/services.restic.backups.<name>.createWrapper | Whether to generate and add a script to the system path, that has the same environment variables set
as the systemd service
|
| options/home-manager/services.restic.backups.<name>.createWrapper | Whether to generate and add a script to the system path, that has the
same environment variables set as the systemd service
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LaunchOnlyOnce | This optional key specifies whether the job can only be run once and only once
|
| options/home-manager/services.restic.backups.<name>.inhibitsSleep | Prevents the system from sleeping while backing up
|
| options/nixos/services.wstunnel.clients.<name>.customHeaders | Custom HTTP headers to send during the upgrade request.
|
| options/home-manager/systemd.user.sockets.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/home-manager/systemd.user.targets.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.actors | All actors (users) to provision
|
| options/nixos/services.bepasty.servers.<name>.secretKeyFile | A file that contains the server secret for safe session cookies, must be set.
secretKeyFile takes precedence over secretKey
|
| options/nixos/services.gancio.settings.hostname | The domain name under which the server is reachable.
|
| options/nixos/services.openssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| options/nixos/services.woodpecker-agents.agents.<name>.path | Additional packages that should be added to the agent's PATH
|
| options/darwin/security.sandbox.profiles.<name>.allowSystemPaths | Whether to allow read access to FHS paths like /etc and /var.
|
| options/home-manager/accounts.email.accounts.<name>.himalaya.enable | Whether to enable the email client Himalaya CLI for this email account.
|
| options/home-manager/services.podman.images.<name>.description | The description of the image.
|
| options/home-manager/services.podman.builds.<name>.description | The description of the build.
|
| options/nixos/services.postfix.settings.master.<name>.wakeup | Automatically wake up the service after the specified number of
seconds
|
| options/nixos/services.restic.backups.<name>.rcloneConfigFile | Path to the file containing rclone configuration
|
| options/nixos/boot.initrd.luks.devices.<name>.fallbackToPassword | Whether to fallback to interactive passphrase prompt if the keyfile
cannot be found
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LimitLoadFromHosts | This configuration file only applies to hosts NOT listed with this key
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings | Settings which are applied to .gmailieer.json
for the account
|
| options/nixos/security.pam.services.<name>.kwallet.enable | If enabled, pam_wallet will attempt to automatically unlock the
user's default KDE wallet upon login
|
| options/nixos/programs.xfs_quota.projects.<name>.fileSystem | XFS filesystem hosting the xfs_quota project.
|
| options/nixos/services.snapper.configs.<name>.TIMELINE_CREATE | Defines whether hourly snapshots should be created.
|
| options/nixos/systemd.user.services.<name>.environment | Environment variables passed to the service's processes.
|
| options/darwin/networking.wg-quick.interfaces.<name>.preDown | List of commands to run before interface shutdown.
|
| options/home-manager/programs.librewolf.profiles.<name>.userChrome | Custom LibreWolf user chrome CSS.
|
| options/nixos/services.grafana.provision.alerting.muteTimings.settings.deleteMuteTimes.*.name | Name of the mute time interval, must be unique
|
| options/nixos/services.namecoind.generate | Whether to generate (mine) Namecoins.
|
| options/home-manager/programs.smug.projects.<name>.windows.*.selected | Whether this window should be selected by default at session start.
|
| options/nixos/networking.wlanInterfaces | Creating multiple WLAN interfaces on top of one physical WLAN device (NIC)
|
| options/nixos/services.logrotate.settings.<name>.global | Whether this setting is a global option or not: set to have these
settings apply to all files settings with a higher priority.
|
| options/home-manager/programs.vscode.profiles.<name>.enableUpdateCheck | Whether to enable update checks/notifications
|
| options/nixos/networking.bridges.<name>.interfaces | The physical network interfaces connected by the bridge.
|
| options/nixos/services.znc.confOptions.networks.<name>.channels | IRC channels to join.
|
| options/darwin/networking.wg-quick.interfaces.<name>.peers | List of peers associated with this interface.
|
| options/home-manager/services.xsuspender.rules.<name>.suspendDelay | Initial suspend delay in seconds.
|
| options/home-manager/services.podman.builds.<name>.workingDirectory | WorkingDirectory of the systemd unit file.
|
| options/nixos/security.pam.services.<name>.duoSecurity.enable | If set, use the Duo Security pam module
pam_duo for authentication
|
| options/nixos/services.netbird.clients.<name>.openFirewall | Opens up firewall port for communication between NetBird peers directly over LAN or public IP,
without using (internet-hosted) TURN servers as intermediaries.
|
| options/nixos/services.netbird.tunnels.<name>.openFirewall | Opens up firewall port for communication between NetBird peers directly over LAN or public IP,
without using (internet-hosted) TURN servers as intermediaries.
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/nixos/security.pam.services.<name>.gnupg.enable | If enabled, pam_gnupg will attempt to automatically unlock the
user's GPG keys with the login password via
gpg-agent
|
| options/nixos/services.tahoe.nodes.<name>.client.introducer | The furl for a Tahoe introducer node
|
| options/nixos/services.nginx.virtualHosts.<name>.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| options/nixos/systemd.network.networks.<name>.ipv6PREF64Prefixes | A list of IPv6PREF64Prefix sections to be added to the unit
|
| options/darwin/services.buildkite-agents.<name>.hooks.command | The command hook script will replace the default implementation of running
the build command.
|
| options/home-manager/services.muchsync.remotes.<name>.remote.importNew | Whether to begin the synchronisation by running
notmuch new on the remote side.
|
| options/nixos/openstack.zfs.datasets.<name>.properties | Properties to set on this dataset.
|
| options/home-manager/programs.librewolf.profiles.<name>.isDefault | Whether this is a default profile.
|
| options/home-manager/programs.lutris.runners.<name>.settings.runner | Runner specific options
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs12.<name>.file | File name in the pkcs12 folder for which this
passphrase should be used.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LimitLoadFromHosts | This configuration file only applies to hosts NOT listed with this key
|
| options/home-manager/fonts.fontconfig.configFile.<name>.priority | Determines the order in which configs are loaded
|
| options/nixos/services.nebula.networks.<name>.enableReload | Enable automatic config reload on config change
|
| options/nixos/services.borgbackup.jobs.<name>.exclude | Exclude paths matching any of the given patterns
|
| options/nixos/services.akkoma.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.fluidd.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.fedimintd.<name>.nginx.config.extraConfig | These lines go to the end of the vhost verbatim.
|
| options/nixos/services.gancio.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.monica.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.matomo.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.nntp-proxy.users.<name>.maxConnections | Maximum number of concurrent connections to the proxy for this user
|
| options/home-manager/accounts.contact.accounts.<name>.pimsync.enable | Whether to enable synchronization using pimsync.
|
| options/home-manager/services.podman.containers.<name>.extraConfig | INI sections and values to populate the Container Quadlet.
|
| options/nixos/services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.query | The SQL query to run.
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.iterationStep | How much the iteration count for PBKDF2 is increased at each successful authentication.
|
| options/nixos/services.k3s.autoDeployCharts.<name>.createNamespace | Whether to create the target namespace if not present.
|
| options/nixos/services.k3s.autoDeployCharts.<name>.targetNamespace | The namespace in which the Helm chart gets installed.
|
| options/nixos/services.restic.backups.<name>.rcloneOptions | Options to pass to rclone to control its behavior
|
| options/home-manager/services.restic.backups.<name>.rcloneOptions | Options to pass to rclone to control its behavior
|
| options/nixos/services.borgbackup.jobs.<name>.prune.prefix | Only consider archive names starting with this prefix for pruning
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LowPriorityIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O.
|
| options/nixos/services.acme-dns.settings.general.nsname | Zone name server.
|
| options/nixos/services.jupyterhub.kernels.<name>.extraPaths | Extra paths to link in kernel directory
|
| options/nixos/services.syncoid.commands.<name>.recursive | Whether to enable the transfer of child datasets.
|
| options/nixos/systemd.paths.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/darwin/security.sandbox.profiles.<name>.readablePaths | List of paths that should be read-only inside the sandbox.
|
| options/nixos/services.openvpn.servers.<name>.updateResolvConf | Use the script from the update-resolv-conf package to automatically
update resolv.conf with the DNS information provided by openvpn
|
| options/nixos/services.snapper.configs.<name>.SUBVOLUME | Path of the subvolume or mount point
|
| options/home-manager/launchd.agents.<name>.config.LaunchEvents | Specifies higher-level event types to be used as launch-on-demand event
sources
|
| options/nixos/services.borgbackup.jobs.<name>.extraCreateArgs | Additional arguments for borg create
|
| options/nixos/networking.wg-quick.interfaces.<name>.postDown | Command called after the interface is taken down.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.agorakit.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.kanboard.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.librenms.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.fediwall.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.mainsail.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.vdirsyncer.jobs.<name>.config.statusPath | vdirsyncer's status path
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.cursor | The color for the terminal cursor.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.scrollOnOutput | Whether to scroll when output is written.
|
| options/home-manager/services.podman.builds.<name>.environment | Environment variables to set in the build.
|
| options/nixos/services.postfix.settings.master.<name>.chroot | Whether the service is chrooted to have only access to the
services.postfix.queueDir and the closure of
store paths specified by the program option.
|
| options/darwin/launchd.agents.<name>.serviceConfig.SessionCreate | This key specifies that the job should be spawned into a new security
audit session rather than the default session for the context is belongs
to
|
| options/nixos/networking.wlanInterfaces.<name>.mac | MAC address to use for the device
|
| options/nixos/services.fedimintd.<name>.api_ws.openFirewall | Opens TCP port in firewall for fedimintd's Websocket API
|
| options/nixos/systemd.user.services.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/services.gitlab-runner.services.<name>.preBuildScript | Runner-specific command script executed after code is pulled,
just before build executes.
|
| options/darwin/services.gitlab-runner.services.<name>.preBuildScript | Runner-specific command script executed after code is pulled,
just before build executes.
|
| options/home-manager/services.xsuspender.rules.<name>.sendSignals | Whether to send SIGSTOP / SIGCONT signals or not
|
| options/nixos/services.consul-template.instances.<name>.group | Group under which this instance runs.
|
| options/nixos/services.firewalld.services.<name>.sourcePorts | Source ports for the service.
|
| options/nixos/services.tahoe.introducers.<name>.package | The tahoelafs package to use.
|
| options/nixos/services.orangefs.server.fileSystems.<name>.troveSyncData | Sync data.
|
| options/nixos/containers.<name>.forwardPorts.*.containerPort | Target port of container
|
| options/nixos/services.vdirsyncer.jobs.<name>.config.general | general configuration
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LowPriorityIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O.
|
| options/nixos/image.repart.partitions.<name>.stripNixStorePrefix | Whether to strip /nix/store/ from the store paths
|
| options/nixos/services.wstunnel.clients.<name>.settings | Command line arguments to pass to wstunnel
|
| options/nixos/services.wstunnel.servers.<name>.settings | Command line arguments to pass to wstunnel
|
| options/home-manager/services.muchsync.remotes.<name>.sshCommand | Specifies a command line to pass to /bin/sh
to execute a command on another machine
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.copy_df | Whether to copy the DF bit to the outer IPv4 header in tunnel mode
|
| options/nixos/services.logrotate.settings.<name>.files | Single or list of files for which rules are defined
|
| options/nixos/services.openvpn.servers.<name>.authUserPass.password | The password to store inside the credentials file.
|
| options/nixos/services.fcgiwrap.instances.<name>.socket.user | User to be set as owner of the UNIX socket.
|
| options/nixos/services.fcgiwrap.instances.<name>.socket.type | Socket type: 'unix', 'tcp' or 'tcp6'.
|
| options/nixos/programs.schroot.profiles.<name>.copyfiles | A list of files to copy into the chroot from the host system.
|
| options/nixos/services.v4l2-relayd.instances.<name>.output.format | The video-format to write to output-stream.
|
| options/nixos/services.znc.confOptions.networks.<name>.password | IRC server password, such as for a Slack gateway.
|
| options/darwin/security.sandbox.profiles.<name>.writablePaths | List of paths that should be read/write inside the sandbox.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.extraConfig.local | Local store extra configuration.
|
| options/nixos/services.wordpress.sites.<name>.languages | List of path(s) to respective language(s) which are copied from the 'languages' directory.
|
| options/darwin/services.buildkite-agents.<name>.hooks.pre-command | The pre-command hook will run just before your build command runs
|
| options/darwin/launchd.agents.<name>.serviceConfig.RootDirectory | This optional key is used to specify a directory to chroot(2) to before running the job.
|
| options/home-manager/accounts.contact.accounts.<name>.khal.priority | Priority of a calendar used for coloring (calendar with highest priority is preferred).
|
| options/nixos/services.rke2.autoDeployCharts.<name>.createNamespace | Whether to create the target namespace if not present.
|
| options/nixos/services.rke2.autoDeployCharts.<name>.targetNamespace | The namespace in which the Helm chart gets installed.
|
| options/nixos/services.buildkite-agents.<name>.privateSshKeyPath | OpenSSH private key
A run-time path to the key file, which is supposed to be provisioned
outside of Nix store.
|
| options/darwin/services.buildkite-agents.<name>.privateSshKeyPath | OpenSSH private key
A run-time path to the key file, which is supposed to be provisioned
outside of Nix store.
|
| options/nixos/services.anubis.instances.<name>.botPolicy | Anubis policy configuration in Nix syntax
|
| options/nixos/image.repart.partitions.<name>.nixStorePrefix | The prefix to use for store paths
|
| options/nixos/services.keepalived.vrrpScripts.<name>.weight | Following a failure, adjust the priority by this weight.
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.kanidm.provision.persons.<name>.groups | List of groups this person should belong to.
|
| options/nixos/services.wstunnel.servers.<name>.listen.enableHTTPS | Use HTTPS for the tunnel server.
|
| options/darwin/networking.wg-quick.interfaces.<name>.postDown | List of commands to run after interface shutdown
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.storage.device | An unencrypted device that will temporarily be mounted in stage-1
|
| options/nixos/systemd.services.<name>.notSocketActivated | If set, a changed unit is never assumed to be
socket-activated on configuration switch, even if
it might have associated socket units
|
| options/nixos/services.drupal.sites.<name>.virtualHost.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.groups | All groups to provision
|
| options/nixos/services.bacula-sd.director.<name>.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/nixos/services.bacula-fd.director.<name>.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/nixos/networking.interfaces.<name>.ipv6.routes | List of extra IPv6 static routes that will be assigned to the interface.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.compression | Specifies whether to use compression
|
| options/home-manager/accounts.email.accounts.<name>.neomutt.mailboxType | Whether this account uses maildir folders or IMAP mailboxes
|
| options/home-manager/programs.opencode.tools | Custom tools for opencode
|
| options/home-manager/accounts.email.accounts.<name>.aerc.extraConfig | Config specific to this account, added to $HOME/.config/aerc/aerc.conf
|
| options/nixos/services.ghostunnel.servers.<name>.cacert | Path to CA bundle file (PEM/X509)
|
| options/nixos/services.kimai.sites.<name>.environmentFile | Securely pass environment variabels to Kimai
|
| options/darwin/launchd.daemons.<name>.serviceConfig.StandardInPath | This optional key specifies what file should be used for data being supplied to stdin when using
stdio(3).
|
| options/nixos/services.public-inbox.settings.coderepo.<name>.cgitUrl | URL of a cgit instance
|
| options/nixos/services.orangefs.server.fileSystems.<name>.troveSyncMeta | Sync meta data.
|
| options/nixos/services.anubis.instances.<name>.settings | Freeform configuration via environment variables for Anubis
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.id | If this attribute is given with non-zero length, it will set the password identifier
for this entry
|
| options/nixos/services.i2pd.inTunnels.<name>.destination | Remote endpoint, I2P hostname or b32.i2p address.
|
| options/nixos/services.drupal.sites.<name>.database.passwordFile | A file containing the password corresponding to
database.user.
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.acl | Control client access to topics on the broker.
|
| options/home-manager/accounts.email.accounts.<name>.passwordCommand | A command, which when run writes the account password on
standard output.
|
| options/nixos/systemd.network.networks.<name>.ipv6RoutePrefixes | A list of ipv6RoutePrefix sections to be added to the unit
|
| options/nixos/systemd.slices.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/systemd.timers.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/services.simplesamlphp.<name>.libDir | Path to the SimpleSAMLphp library directory.
|
| options/nixos/services.snapper.configs.<name>.TIMELINE_LIMIT_DAILY | Limits for timeline cleanup.
|
| options/nixos/services.fedimintd.<name>.nginx.config.listen.*.port | Port number to listen on
|
| options/nixos/services.wstunnel.servers.<name>.loggingLevel | Passed to --log-lvl
Control the log verbosity. i.e: TRACE, DEBUG, INFO, WARN, ERROR, OFF
For more details, checkout [EnvFilter](https://docs.rs/tracing-subscriber/latest/tracing_subscriber/filter/struct
|
| options/nixos/services.wstunnel.clients.<name>.loggingLevel | Passed to --log-lvl
Control the log verbosity. i.e: TRACE, DEBUG, INFO, WARN, ERROR, OFF
For more details, checkout [EnvFilter](https://docs.rs/tracing-subscriber/latest/tracing_subscriber/filter/struct
|
| options/home-manager/programs.firefox.profiles.<name>.search.force | Whether to force replace the existing search
configuration
|
| options/nixos/services.btrbk.instances.<name>.onCalendar | How often this btrbk instance is started
|
| options/nixos/networking.interfaces.<name>.ipv4.routes.*.via | IPv4 address of the next hop.
|
| options/nixos/networking.interfaces.<name>.ipv6.routes.*.via | IPv6 address of the next hop.
|
| options/nixos/services.drupal.sites.<name>.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.restic.backups.<name>.repositoryFile | Path to the file containing the repository location to backup to.
|
| options/nixos/services.moodle.virtualHost.locations.<name>.alias | Alias directory for requests
|
| options/nixos/services.nagios.virtualHost.locations.<name>.index | Adds DirectoryIndex directive
|
| options/nixos/services.moodle.virtualHost.locations.<name>.index | Adds DirectoryIndex directive
|
| options/nixos/services.nagios.virtualHost.locations.<name>.alias | Alias directory for requests
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.adminAddr | E-mail address of the server administrator.
|
| options/nixos/services.kanidm.provision.groups.<name>.present | Whether to ensure that this group is present or absent.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.boldColor | The bold color, null to use same as foreground.
|
| options/nixos/services.bacula-sd.director.<name>.monitor | If Monitor is set to no, this director will have
full access to this Storage daemon
|
| options/nixos/services.bacula-fd.director.<name>.monitor | If Monitor is set to no, this director will have
full access to this Storage daemon
|
| options/nixos/networking.wireless.networks.<name>.bssid | If set, this network block is used only when associating with
the AP using the configured BSSID.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.robotsEntries | Specification of pages to be ignored by web crawlers
|
| options/home-manager/programs.firefox.profiles.<name>.search.default | The default search engine used in the address bar and search
bar.
|
| options/nixos/services.zeronsd.servedNetworks.<name>.settings | Settings for zeronsd
|
| options/home-manager/launchd.agents.<name>.config.KeepAlive | This optional key is used to control whether your job is to be kept continuously running or to let
demand and conditions control the invocation
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StandardInPath | This optional key specifies what file should be used for data being supplied to stdin when using
stdio(3).
|
| options/nixos/security.pam.services.<name>.gnupg.noAutostart | Don't start gpg-agent if it is not running
|
| options/nixos/services.gitlab-runner.services.<name>.dockerExtraHosts | Add a custom host-to-IP mapping.
|
| options/nixos/services.sanoid.templates.<name>.autoprune | Whether to automatically prune old snapshots.
|
| options/nixos/services.syncthing.settings.folders.<name>.id | The ID of the folder
|
| options/nixos/services.orangefs.server.fileSystems.<name>.rootHandle | File system root ID.
|
| options/nixos/services.syncthing.settings.devices.<name>.id | The device ID
|
| options/darwin/services.gitlab-runner.services.<name>.dockerExtraHosts | Add a custom host-to-IP mapping.
|
| options/home-manager/programs.librewolf.profiles.<name>.extraConfig | Extra preferences to add to user.js.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.themes.*.pkg | The theme package.
|
| options/home-manager/services.syncthing.settings.devices.<name>.id | The device ID
|
| options/home-manager/services.syncthing.settings.folders.<name>.id | The ID of the folder
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.userNameCommand | A command that prints the user name to standard output.
|
| options/nixos/systemd.shutdown | Definition of systemd shutdown executables
|
| options/nixos/networking.vswitches.<name>.openFlowVersion | Version of OpenFlow protocol to use when communicating with the switch internally (e.g. with openFlowRules).
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.wpaPasswordFile | Sets the password for WPA-PSK
|
| options/nixos/services.keyd.keyboards.<name>.settings | Configuration, except ids section, that is written to /etc/keyd/.conf
|
| options/darwin/launchd.agents.<name>.serviceConfig.StandardErrorPath | This optional key specifies what file should be used for data being sent to stderr when using stdio(3).
|
| options/darwin/launchd.agents.<name>.serviceConfig.EnableGlobbing | This flag causes launchd to use the glob(3) mechanism to update the program arguments before invocation.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.StandardOutPath | This optional key specifies what file should be used for data being sent to stdout when using stdio(3).
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.policies | Whether to install IPsec policies or not
|
| options/nixos/services.borgbackup.jobs.<name>.inhibitsSleep | Prevents the system from sleeping while backing up.
|
| options/nixos/networking.interfaces.<name>.wakeOnLan.enable | Whether to enable wol on this interface.
|
| options/nixos/services.bookstack.nginx.locations.<name>.root | Root directory for requests.
|
| options/home-manager/programs.floorp.profiles.<name>.extensions | Submodule for installing and configuring extensions.
|
| options/nixos/services.fedimintd.<name>.nginx.config.enableACME | Whether to ask Let's Encrypt to sign a certificate for this vhost
|
| options/nixos/services.borgbackup.jobs.<name>.readWritePaths | By default, borg cannot write anywhere on the system but
$HOME/.config/borg and $HOME/.cache/borg
|
| options/nixos/services.davis.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.movim.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.slskd.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.token.<name>.module | Optional PKCS#11 module name to access the token.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.locations | Declarative location config
|
| options/nixos/services.i2pd.outTunnels.<name>.destination | Remote endpoint, I2P hostname or b32.i2p address.
|
| options/nixos/services.displayManager.dms-greeter.compositor.name | The Wayland compositor to run the greeter in
|
| options/nixos/services.gitlab-runner.services.<name>.postBuildScript | Runner-specific command script executed after code is pulled
and just after build executes.
|
| options/darwin/services.gitlab-runner.services.<name>.postBuildScript | Runner-specific command script executed after code is pulled
and just after build executes.
|
| options/nixos/services.nebula.networks.<name>.isLighthouse | Whether this node is a lighthouse.
|
| options/home-manager/programs.borgmatic.backups.<name>.hooks.extraConfig | Extra settings.
|
| options/home-manager/services.podman.containers.<name>.networkAlias | Network aliases for the container.
|
| options/nixos/services.hostapd.radios.<name>.settings | Extra configuration options to put at the end of global initialization, before defining BSSs
|
| options/nixos/services.drupal.sites.<name>.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/darwin/launchd.agents.<name>.serviceConfig.LimitLoadToSessionType | This configuration file only applies to sessions of the type specified
|
| options/home-manager/systemd.user.services.<name>.Unit.X-Restart-Triggers | List of free form strings that can be used to trigger a service
restart during Home Manager activation.
|
| options/nixos/security.auditd.plugins.<name>.direction | The option is dictated by the plugin
|
| options/nixos/services.nginx.virtualHosts.<name>.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| options/nixos/networking.interfaces.<name>.macAddress | MAC address of the interface
|
| options/nixos/services.cjdns.ETHInterface.connectTo.<name>.publicKey | Public key at the opposite end of the tunnel.
|
| options/nixos/services.cjdns.UDPInterface.connectTo.<name>.publicKey | Public key at the opposite end of the tunnel.
|
| options/nixos/services.printing.cups-pdf.instances.<name>.enable | Whether to enable this cups-pdf instance.
|
| options/nixos/services.fcgiwrap.instances.<name>.socket.mode | Mode to be set on the UNIX socket
|
| options/nixos/services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.labels | A set of columns that will be used as Prometheus labels.
|
| options/nixos/services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.values | A set of columns that will be used as values of this metric.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StandardOutPath | This optional key specifies what file should be used for data being sent to stdout when using stdio(3).
|
| options/nixos/services.nipap.settings.nipapd.db_name | Name of database to use on PostgreSQL server.
|
| options/nixos/services.kanata.keyboards.<name>.configFile | The config file
|
| options/nixos/security.acme.certs.<name>.credentialFiles | Environment variables suffixed by "_FILE" to set for the cert's service
for your selected dnsProvider
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.copy_ecn | Whether to copy the ECN (Explicit Congestion Notification) header field
to/from the outer IP header in tunnel mode
|
| options/nixos/services.gitlab-runner.services.<name>.dockerPullPolicy | Default pull-policy for Docker images
|
| options/nixos/networking.wireless.networks.<name>.hidden | Set this to true if the SSID of the network is hidden.
|
| options/nixos/services.nginx.virtualHosts.<name>.listen.*.proxyProtocol | Enable PROXY protocol.
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/home-manager/programs.vscode.profiles.<name>.extensions | The extensions Visual Studio Code should be started with.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.localForwards.*.host.address | The address to forward to.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.localForwards.*.bind.address | The address to bind to.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.certificateFile | Specifies files from which the user certificate is read.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings | Settings which are applied to mujmap.toml
for the account
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| options/nixos/services.kanidm.provision.groups.<name>.members | List of kanidm entities (persons, groups, ...) which are part of this group.
|
| options/nixos/systemd.user.units.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/systemd.user.paths.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/security.pam.services.<name>.ttyAudit.disablePattern | For each user matching one of comma-separated
glob patterns, disable TTY auditing
|
| options/nixos/services.easytier.instances.<name>.configFile | Path to easytier config file
|
| options/nixos/services.nbd.server.exports.<name>.allowAddresses | IPs and subnets that are authorized to connect for this device
|
| options/darwin/services.gitlab-runner.services.<name>.executor | Select executor, eg. shell, docker, etc
|
| options/nixos/services.namecoind.extraNodes | List of additional peer IP addresses to connect to.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.private.<name>.file | File name in the private folder for which this passphrase should be used.
|
| options/nixos/services.influxdb2.provision.organizations.<name>.buckets.<name>.retention | The duration in seconds for which the bucket will retain data (0 is infinite).
|
| options/nixos/services.bacula-sd.autochanger.<name>.devices | |
| options/nixos/services.snipe-it.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/home-manager/programs.firefox.profiles.<name>.settings | Attribute set of Firefox preferences
|
| options/home-manager/accounts.email.accounts.<name>.msmtp.enable | Whether to enable msmtp
|
| options/nixos/services.wyoming.piper.servers.<name>.streaming | Whether to enable audio streaming on sentence boundaries.
|
| options/nixos/services.firewalld.zones.<name>.egressPriority | Priority for outbound traffic
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.listen.*.ip | IP to listen on. 0.0.0.0 for IPv4 only, * for all.
|
| options/home-manager/services.kanshi.profiles.<name>.outputs.*.mode | <width>x<height>[@<rate>[Hz]]
Configures the specified output to use the specified mode
|
| options/nixos/security.wrappers.<name>.permissions | The permissions of the wrapper program
|
| options/darwin/services.buildkite-agents.<name>.hooks.post-command | The post-command hook will run after the bootstrap script has run your
build commands
|
| options/nixos/services.kubernetes.kubelet.taints.<name>.value | Value of taint.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.hotkeys | Hotkeys to configure.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.WaitForDebugger | This optional key specifies that launchd should instruct the kernel to have the job wait for a debugger
to attach before any code in the job is executed.
|
| options/nixos/services.kmonad.keyboards.<name>.defcfg.enable | Whether to enable automatic generation of the defcfg block
|
| options/nixos/services.syncoid.commands.<name>.localSourceAllow | Permissions granted for the services.syncoid.user user
for local source datasets
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| options/nixos/services.invoiceplane.sites.<name>.cron.key | Cron key taken from the administration page.
|
| options/nixos/services.caddy.virtualHosts.<name>.listenAddresses | A list of host interfaces to bind to for this virtual host.
|
| options/nixos/services.agorakit.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.fediwall.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.librenms.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.fcgiwrap.instances.<name>.socket.group | Group to be set as owner of the UNIX socket.
|
| options/nixos/services.kanboard.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.restic.backups.<name>.backupPrepareCommand | A script that must run before starting the backup process.
|
| options/nixos/services.mainsail.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.restic.backups.<name>.backupCleanupCommand | A script that must run after finishing the backup process.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.extraFiles | Extra files to link to the vault directory.
|
| options/home-manager/services.podman.containers.<name>.extraPodmanArgs | Extra arguments to pass to the podman run command.
|
| options/nixos/services.drupal.sites.<name>.database.tablePrefix | The $table_prefix is the value placed in the front of your database tables
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/nixos/services.firewalld.services.<name>.sourcePorts.*.port | |
| options/nixos/services.firewalld.zones.<name>.interfaces | Interfaces to bind.
|
| options/home-manager/services.podman.volumes.<name>.description | The description of the volume.
|
| options/nixos/services.keepalived.vrrpScripts.<name>.script | (Path of) Script command to execute followed by args, i.e. cmd [args]...
|
| options/darwin/services.gitlab-runner.services.<name>.runUntagged | Register to run untagged builds; defaults to
true when tagList is empty.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups | Some email providers (Gmail) have a different directory hierarchy for
synchronized email messages
|
| options/nixos/services.gitlab-runner.services.<name>.executor | Select executor, eg. shell, docker, etc
|
| options/nixos/systemd.network.networks.<name>.routingPolicyRules | A list of routing policy rules sections to be added to the unit
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.remote_ts | List of remote selectors to include in CHILD_SA
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rand_time | Time range from which to choose a random value to subtract from
rekey_time
|
| options/nixos/services.tarsnap.archives.<name>.followSymlinks | Whether to follow all symlinks in archive trees.
|
| options/nixos/systemd.timers.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/systemd.slices.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/home-manager/programs.librewolf.profiles.<name>.userContent | Custom LibreWolf user content CSS.
|
| options/home-manager/services.podman.containers.<name>.network | The network mode or network/s to connect the container to
|
| options/home-manager/services.git-sync.repositories.<name>.uri | The URI of the remote to be synchronized
|
| options/nixos/security.pam.services.<name>.enableGnomeKeyring | If enabled, pam_gnome_keyring will attempt to automatically unlock the
user's default Gnome keyring upon login
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.priority | Optional fixed priority for IPsec policies
|
| options/nixos/services.traefik.dynamic.files.<name>.settings | Dynamic configuration for Traefik, written in Nix.
This will be serialized to JSON (which is considered valid YAML) at build, and passed as part of the static file.
|
| options/nixos/security.pam.services.<name>.kwallet.forceRun | The force_run option is used to tell the PAM module for KWallet
to forcefully run even if no graphical session (such as a GUI
display manager) is detected
|
| options/nixos/services.i2pd.outTunnels.<name>.destinationPort | Connect to particular port at destination.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.WaitForDebugger | This optional key specifies that launchd should instruct the kernel to have the job wait for a debugger
to attach before any code in the job is executed.
|
| options/nixos/services.anubis.instances.<name>.policy.extraBots | Additional bot rules appended to the policy
|
| options/home-manager/accounts.email.accounts.<name>.aerc.extraAccounts | Extra config added to the configuration section for this account in
$HOME/.config/aerc/accounts.conf
|
| options/nixos/services.postfix.masterConfig.<name>.privileged | |
| options/nixos/security.acme.certs.<name>.environmentFile | Path to an EnvironmentFile for the cert's service containing any required and
optional environment variables for your selected dnsProvider
|
| options/nixos/services.firezone.server.provision.accounts.<name>.relayGroups | All relay groups to provision
|
| options/darwin/networking.computerName | The user-friendly name for the system, set in System Preferences > Sharing > Computer Name
|
| options/nixos/services.gitea-actions-runner.instances.<name>.token | Plain token to register at the configured Gitea/Forgejo instance.
|
| options/nixos/services.vdirsyncer.jobs.<name>.forceDiscover | Run yes | vdirsyncer discover prior to vdirsyncer sync
|
| options/nixos/services.wordpress.sites.<name>.database.socket | Path to the unix socket file to use for authentication.
|
| options/home-manager/programs.floorp.profiles.<name>.bookmarks.force | Whether to force override existing custom bookmarks.
|
| options/home-manager/services.restic.backups.<name>.repositoryFile | Path to a file containing the repository location to backup to
|
| options/nixos/services.neo4j.ssl.policies.<name>.publicCertificate | The name of public X.509 certificate (chain) file in PEM format
for this policy to be found in the baseDirectory,
or the absolute path to the certificate file
|
| options/nixos/programs.proxychains.proxies.<name>.enable | Whether to enable this proxy.
|
| options/nixos/services.firewalld.services.<name>.includes | Services to include for the service.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.palette | The terminal palette.
|
| options/home-manager/programs.hexchat.channels.<name>.options.bypassProxy | Bypass proxy.
|
| options/nixos/services.davis.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.slskd.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.movim.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.grafana.provision.alerting.contactPoints.settings.contactPoints.*.name | Name of the contact point
|
| options/nixos/services.kmonad.keyboards.<name>.defcfg.compose.key | The (optional) compose key to use.
|
| options/nixos/boot.binfmt.registrations.<name>.offset | The byte offset of the magic number used for recognition.
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.extraArgs | Extra arguments to pass to the server commandline.
|
| options/home-manager/systemd.user.services.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.extraConfig.remote | Remote store extra configuration.
|
| options/nixos/services.openssh.knownHosts.<name>.publicKeyFile | The path to the public key file for the host
|
| options/nixos/services.vmalert.instances.<name>.settings | vmalert configuration, passed via command line flags
|
| options/nixos/services.blockbook-frontend.<name>.internal | Internal http server binding [address]:port.
|
| options/nixos/services.nebula.networks.<name>.firewall.inbound | Firewall rules for inbound traffic.
|
| options/nixos/services.orangefs.server.fileSystems.<name>.extraConfig | Extra config for <FileSystem> section.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.listen.*.port | Port to listen on
|
| options/nixos/services.drupal.sites.<name>.virtualHost.documentRoot | The path of Apache's document root directory
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.mac | If this attribute is not included, or if is set to the wildcard address (ff:ff:ff:ff:ff:ff),
the entry is available for any station (client) to use
|
| options/home-manager/programs.ssh.matchBlocks.<name>.identitiesOnly | Specifies that ssh should only use the authentication
identity explicitly configured in the
~/.ssh/config files or passed on the
ssh command-line, even if ssh-agent
offers more identities.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.listen.*.ssl | Whether to enable SSL (https) support.
|
| options/nixos/containers.<name>.privateUsers | Whether to give the container its own private UIDs/GIDs space (user namespacing)
|
| options/nixos/services.borgbackup.jobs.<name>.extraCompactArgs | Additional arguments for borg compact
|
| options/nixos/services.dovecot2.mailboxes.<name>.specialUse | Null if no special use flag is set
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.auth | Authentication to perform locally.
- The default
pubkey uses public key authentication
using a private key associated to a usable certificate.
psk uses pre-shared key authentication.
- The IKEv1 specific
xauth is used for XAuth or Hybrid
authentication,
- while the IKEv2 specific
eap keyword defines EAP
authentication.
- For
xauth, a specific backend name may be appended,
separated by a dash
|
| options/nixos/services.firewalld.zones.<name>.masquerade | Whether to enable masquerading in the zone.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.bookstack.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.autosuspend.checks.<name>.enabled | Whether to enable this activity check.
|
| options/nixos/services.bookstack.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.keepalived.vrrpScripts.<name>.timeout | Seconds after which script is considered to have failed.
|
| options/nixos/services.warpgate.settings.sso_providers.*.name | Internal identifier of SSO provider.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SessionCreate | This key specifies that the job should be spawned into a new security
audit session rather than the default session for the context is belongs
to
|
| options/nixos/boot.initrd.luks.devices.<name>.bypassWorkqueues | Whether to bypass dm-crypt's internal read and write workqueues
|
| options/nixos/services.sanoid.datasets.<name>.recursive | Whether to recursively snapshot dataset children
|
| options/nixos/systemd.network.netdevs.<name>.wireguardPeers | Each item in this array specifies an option in the
[WireGuardPeer] section of the unit
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags.important | Tag for notmuch to use for messages stored in the mailbox labeled with the
Important name attribute and/or with the $Important
keyword
|
| options/nixos/services.gitlab-runner.services.<name>.dockerVolumes | Bind-mount a volume and create it
if it doesn't exist prior to mounting.
|
| options/nixos/services.snapper.configs.<name>.TIMELINE_CLEANUP | Defines whether the timeline cleanup algorithm should be run for the config.
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.enable | Whether to enable Wyoming faster-whisper server.
|
| options/darwin/services.gitlab-runner.services.<name>.dockerVolumes | Bind-mount a volume and create it
if it doesn't exist prior to mounting.
|
| options/darwin/services.github-runners.<name>.serviceOverrides | Modify the service
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.rectangle | The node's geometry, in the format WxH+X+Y.
|
| options/nixos/systemd.network.networks.<name>.dhcpServerStaticLeases | A list of DHCPServerStaticLease sections to be added to the unit
|
| options/nixos/services.snapper.configs.<name>.TIMELINE_LIMIT_YEARLY | Limits for timeline cleanup.
|
| options/nixos/services.snapper.configs.<name>.TIMELINE_LIMIT_WEEKLY | Limits for timeline cleanup.
|
| options/nixos/services.mosquitto.bridges.<name>.addresses | Remote endpoints for the bridge.
|
| options/nixos/services.snapper.configs.<name>.TIMELINE_LIMIT_HOURLY | Limits for timeline cleanup.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.pk | If this attribute is given, SAE-PK will be enabled for this connection
|
| options/nixos/boot.loader.grub.extraFiles | A set of files to be copied to /boot
|
| options/nixos/services.rshim.device | Specify the device name to attach
|
| options/nixos/services.snipe-it.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.vlanid | If this attribute is given, all clients using this entry will get tagged with the given VLAN ID.
|
| options/nixos/services.fedimintd.<name>.nginx.config.listen | Listen addresses and ports for this virtual host
|
| options/nixos/services.inadyn.settings.provider.<name>.include | File to include additional settings for this provider from.
|
| options/home-manager/accounts.calendar.accounts.<name>.pimsync.enable | Whether to enable synchronization using pimsync.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| options/nixos/systemd.user.paths.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/home-manager/launchd.agents.<name>.config.ProgramArguments | This key maps to the second argument of execvp(3)
|
| options/nixos/boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.user | The user of the file
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.hostaccess | Hostaccess variable to pass to updown script
|
| options/darwin/launchd.daemons.<name>.serviceConfig.RootDirectory | This optional key is used to specify a directory to chroot(2) to before running the job.
|
| options/home-manager/services.restic.backups.<name>.backupCleanupCommand | A script that must run after finishing the backup process
|
| options/home-manager/services.restic.backups.<name>.backupPrepareCommand | A script that must run before starting the backup process
|
| options/nixos/services.consul-template.instances.<name>.enable | Whether to enable this consul-template instance.
|
| options/nixos/security.acme.certs.<name>.dnsPropagationCheck | Toggles lego DNS propagation check, which is used alongside DNS-01
challenge to ensure the DNS entries required are available.
|
| options/nixos/services.postfix.settings.master.<name>.maxproc | The maximum number of processes to spawn for this service
|
| options/nixos/services.nominatim.database.dbname | Name of the postgresql database.
|
| options/nixos/services.roundcube.database.dbname | Name of the postgresql database
|
| options/nixos/services.nsd.zones.<name>.outgoingInterface | This address will be used for zone-transfer requests if configured
as a secondary server or notifications in case of a primary server
|
| options/nixos/services.kimai.sites.<name>.database.serverVersion | MySQL exact version string
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SessionCreate | This key specifies that the job should be spawned into a new security
audit session rather than the default session for the context is belongs
to
|
| options/home-manager/services.restic.backups.<name>.repository | Repository to backup to
|
| options/home-manager/programs.papis.libraries.<name>.isDefault | Whether this is a default library
|
| options/nixos/services.sabnzbd.settings.servers.<name>.timeout | Time, in seconds, to wait for a response before
attempting error recovery.
|
| options/darwin/services.buildkite-agents.<name>.hooks.pre-artifact | The pre-artifact hook will run just before artifacts are uploaded
|
| options/home-manager/programs.smug.projects.<name>.windows.*.panes.*.commands | Commands to execute when pane starts.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.policies | All policies to provision
|
| options/nixos/services.fedimintd.<name>.environment | Extra Environment variables to pass to the fedimintd.
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.root | Root directory for requests.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.dynamicForwards.*.address | The address to bind to.
|
| options/home-manager/accounts.email.accounts.<name>.imapnotify.boxes | IMAP folders to watch.
|
| options/nixos/boot.initrd.luks.devices.<name>.fido2.credentials | List of FIDO2 credential IDs
|
| options/nixos/networking.interfaces.<name>.virtual | Whether this interface is virtual and should be created by tunctl
|
| options/nixos/services.bacula-sd.director.<name>.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| options/nixos/services.bacula-fd.director.<name>.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| options/nixos/services.akkoma.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.fluidd.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.fedimintd.<name>.nginx.config.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.gancio.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.monica.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.matomo.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.syncthing.settings.folders.<name>.type | Controls how the folder is handled by Syncthing
|
| options/nixos/services.moodle.virtualHost.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/nixos/services.nagios.virtualHost.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/home-manager/services.syncthing.settings.folders.<name>.type | Controls how the folder is handled by Syncthing
|
| options/home-manager/programs.gnome-terminal.profile.<name>.customCommand | The command to use to start the shell, or null for default shell.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.librenms.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.librenms.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.kanboard.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.kanboard.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.fediwall.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.fediwall.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.agorakit.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.agorakit.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.pgbackrest.repos.<name>.sftp-private-key-file | SFTP private key file
|
| options/nixos/services.mainsail.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.mainsail.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.RootDirectory | This optional key is used to specify a directory to chroot(2) to before running the job.
|
| options/home-manager/accounts.email.accounts.<name>.neomutt.sendMailCommand | Command to send a mail
|
| options/home-manager/programs.floorp.profiles.<name>.containers | Attribute set of container configurations
|
| options/nixos/services.snapserver.streams.<name>.sampleFormat | Default sample format.
|
| options/nixos/services.syncthing.settings.folders.<name>.label | The label of the folder.
|
| options/home-manager/programs.borgmatic.backups.<name>.output.extraConfig | Extra settings.
|
| options/home-manager/services.syncthing.settings.folders.<name>.label | The label of the folder.
|
| options/nixos/systemd.targets.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/systemd.sockets.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.beamSize | The number of beams to use in beam search
|
| options/nixos/boot.initrd.systemd.contents.<name>.dlopen.features | Features to enable via dlopen ELF notes
|
| options/nixos/services.kanidm.provision.persons.<name>.present | Whether to ensure that this person is present or absent.
|
| options/nixos/services.v4l2-relayd.instances.<name>.extraPackages | Extra packages to add to GST_PLUGIN_PATH for the instance.
|
| options/nixos/services.neo4j.ssl.policies.<name>.revokedDir | Path to directory of CRLs (Certificate Revocation Lists) in
PEM format
|
| options/nixos/systemd.user.services.<name>.notSocketActivated | If set, a changed unit is never assumed to be
socket-activated on configuration switch, even if
it might have associated socket units
|
| options/nixos/services.firewalld.zones.<name>.sourcePorts.*.protocol | |
| options/nixos/services.fedimintd.<name>.nginx.config.http2 | Whether to enable the HTTP/2 protocol
|
| options/home-manager/accounts.calendar.accounts.<name>.khal.priority | Priority of a calendar used for coloring (calendar with highest priority is preferred).
|
| options/nixos/services.wstunnel.clients.<name>.httpProxy | Proxy to use to connect to the wstunnel server (USER:PASS@HOST:PORT).
Passwords specified here will be world-readable in the Nix store!
To pass a password to the service, point the environmentFile option
to a file containing PROXY_PASSWORD=<your-password-here> and set
this option to <user>:$PROXY_PASSWORD@<host>:<port>
|
| options/nixos/systemd.network.networks.<name>.fairQueueingConfig | Each attribute in this set specifies an option in the
[FairQueueing] section of the unit
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits | Resource limits to be imposed on the job
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits | Resource limits to be imposed on the job
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/nixos/services.invoiceplane.sites.<name>.enable | Whether to enable InvoicePlane web application.
|
| options/nixos/services.armagetronad.servers.<name>.dns | DNS address to use for this server
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.sslServerCert | Path to server SSL certificate.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.remoteForwards.*.host.address | The address to forward to.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.remoteForwards.*.bind.address | The address to bind to.
|
| options/home-manager/i18n.inputMethod.fcitx5.settings.addons.<name>.sections | attribute set of section of an INI file (attrs of INI atom (null, bool, int, float or string))
|
| options/nixos/networking.vswitches.<name>.extraOvsctlCmds | Commands to manipulate the Open vSwitch database
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children | CHILD_SA configuration sub-section
|
| options/nixos/services.drupal.sites.<name>.virtualHost.globalRedirect | If set, all requests for this host are redirected permanently to
the given URL.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.servedDirs | This option provides a simple way to serve static directories.
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.life_time | Maximum lifetime before CHILD_SA gets closed
|
| options/nixos/systemd.user.timers.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/systemd.user.slices.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/services.httpd.virtualHosts.<name>.listenAddresses | Listen addresses for this virtual host
|
| options/darwin/launchd.daemons.<name>.serviceConfig.EnableGlobbing | This flag causes launchd to use the glob(3) mechanism to update the program arguments before invocation.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.StandardErrorPath | This optional key specifies what file should be used for data being sent to stderr when using stdio(3).
|
| options/nixos/services.bookstack.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.vdirsyncer.jobs.<name>.config.storages | vdirsyncer storage configurations
|
| options/nixos/services.woodpecker-agents.agents.<name>.package | The woodpecker-agent package to use.
|
| options/home-manager/programs.firefox.profiles.<name>.extensions | Submodule for installing and configuring extensions.
|
| options/home-manager/accounts.email.accounts.<name>.signature.command | A command that generates a signature.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert_policy | List of certificate policy OIDs the peer's certificate
must have
|
| options/nixos/services.postfix.settings.master.<name>.private | Whether the service's sockets and storage directory is restricted to
be only available via the mail system
|
| options/nixos/networking.wg-quick.interfaces.<name>.mtu | If not specified, the MTU is automatically determined
from the endpoint addresses or the system default route, which is usually
a sane choice
|
| options/nixos/networking.supplicant.<name>.extraConf | Configuration options for wpa_supplicant.conf
|
| options/nixos/services.biboumi.settings.db_name | The name of the database to use
|
| options/nixos/services.murmur.registerHostname | DNS hostname where your server can be reached
|
| options/nixos/services.grafana.provision.alerting.templates.settings.templates.*.name | Name of the template, must be unique
|
| options/nixos/boot.binfmt.registrations.<name>.interpreter | The interpreter to invoke to run the program
|
| options/nixos/networking.wg-quick.interfaces.<name>.address | The IP addresses of the interface.
|
| options/nixos/services.kubernetes.kubelet.taints.<name>.effect | Effect of taint.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LimitLoadToSessionType | This configuration file only applies to sessions of the type specified
|
| options/nixos/services.gitea-actions-runner.instances.<name>.enable | Whether to enable Gitea Actions Runner instance.
|
| options/nixos/services.wyoming.piper.servers.<name>.zeroconf.enable | Whether to enable zeroconf discovery.
|
| options/nixos/services.v4l2-relayd.instances.<name>.input.pipeline | The gstreamer-pipeline to use for the input-stream.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.addressDescription | An optional description for resource address, usually a full link to the resource including a schema.
|
| options/nixos/systemd.network.netdevs.<name>.batmanAdvancedConfig | Each attribute in this set specifies an option in the
[BatmanAdvanced] section of the unit
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.logFormat | Log format for Apache's log files
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.EnableGlobbing | This flag causes launchd to use the glob(3) mechanism to update the program arguments before invocation.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StandardErrorPath | This optional key specifies what file should be used for data being sent to stderr when using stdio(3).
|
| options/home-manager/programs.librewolf.profiles.<name>.search.order | The order the search engines are listed in
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rand_bytes | Byte range from which to choose a random value to subtract from
rekey_bytes
|
| options/nixos/services.sanoid.datasets.<name>.processChildrenOnly | Whether to only snapshot child datasets if recursing.
|
| options/nixos/services.spiped.config.<name>.disableKeepalives | Disable transport layer keep-alives.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.root | Root directory for requests.
|
| options/darwin/networking.wg-quick.interfaces.<name>.listenPort | Port to listen on, randomly selected if not specified.
|
| options/nixos/boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.group | The group of the file
|
| options/nixos/services.borgbackup.jobs.<name>.failOnWarnings | Fail the whole backup job if any borg command returns a warning
(exit code 1), for example because a file changed during backup.
|
| options/darwin/services.buildkite-agents.<name>.hooks.post-artifact | The post-artifact hook will run just after artifacts are uploaded
|
| options/home-manager/programs.atuin.themes | Each theme is written to
$XDG_CONFIG_HOME/atuin/themes/theme-name.toml
where the name of each attribute is the theme-name
See https://docs.atuin.sh/guide/theming/ for the full list
of options.
|
| options/nixos/services.armagetronad.servers.<name>.host | Host to listen on
|
| options/nixos/services.armagetronad.servers.<name>.port | Port to listen on
|
| options/nixos/services.keepalived.vrrpInstances.<name>.useVmac | Use VRRP Virtual MAC.
|
| options/darwin/networking.wg-quick.interfaces.<name>.address | List of IP addresses for this interface.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.corePlugins | Core plugins to activate.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LimitLoadToSessionType | This configuration file only applies to sessions of the type specified
|
| options/nixos/containers.<name>.ephemeral | Runs container in ephemeral mode with the empty root filesystem at boot
|
| options/nixos/services.inadyn.settings.custom.<name>.password | Password for this DDNS provider
|
| options/home-manager/services.muchsync.remotes.<name>.frequency | How often to run muchsync
|
| options/nixos/services.blockbook-frontend.<name>.templateDir | Location of the HTML templates
|
| options/nixos/services.firewalld.zones.<name>.ingressPriority | Priority for inbound traffic
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.enableUserDir | Whether to enable serving ~/public_html as
/~«username».
|
| options/home-manager/accounts.email.accounts.<name>.notmuch.neomutt.enable | Whether to enable Notmuch support in NeoMutt.
|
| options/nixos/security.pam.services.<name>.setEnvironment | Whether the service should set the environment variables
listed in environment.sessionVariables
using pam_env.so.
|
| options/nixos/services.tor.relay.onionServices.<name>.authorizeClient.clientNames | Only clients that are listed here are authorized to access the hidden service
|
| options/nixos/services.nextcloud-spreed-signaling.backends.<name>.secretFile | The path to the file containing the value for backends.<name>.secret
|
| options/nixos/services.kmonad.keyboards.<name>.extraGroups | Extra permission groups to attach to the KMonad instance for
this keyboard
|
| options/nixos/services.akkoma.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.fediwall.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.kanboard.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.librenms.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.dolibarr.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.fluidd.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.gancio.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.agorakit.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.matomo.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.mainsail.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.monica.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.pixelfed.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.fcgiwrap.instances.<name>.process.group | Group as which this instance of fcgiwrap will be run.
|
| options/nixos/programs.tsmClient.servers.<name>.passworddir | Directory that holds the TSM
node's password information.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.keepalived.vrrpScripts.<name>.extraConfig | Extra lines to be added verbatim to the vrrp_script section.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags | Tag configuration
|
| options/nixos/services.cgit.<name>.gitHttpBackend.checkExportOkFiles | Whether git-http-backend should only export repositories that contain a git-daemon-export-ok file
|
| options/nixos/services.honk.username | The admin account username.
|
| options/darwin/services.gitlab-runner.services.<name>.protected | When set to true Runner will only run on pipelines
triggered on protected branches.
|
| options/nixos/services.fedimintd.<name>.nginx.config.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.if_id_in | XFRM interface ID set on inbound policies/SA
|
| options/darwin/services.buildkite-agents.<name>.hooks.pre-checkout | The pre-checkout hook will run just before your projects source code is
checked out from your SCM provider
|
| options/nixos/users.users.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| options/darwin/users.users.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| options/nixos/systemd.sockets.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/systemd.targets.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/services.fedimintd.<name>.nginx.config.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations | Declarative location config
|
| options/nixos/services.buildkite-agents.<name>.runtimePackages | Add programs to the buildkite-agent environment
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.woodpecker-agents.agents.<name>.extraGroups | Additional groups for the systemd service.
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.index | Adds index directive.
|
| options/darwin/services.buildkite-agents.<name>.runtimePackages | Add programs to the buildkite-agent environment
|
| options/home-manager/accounts.email.accounts.<name>.astroid.sendMailCommand | Command to send a mail
|
| options/nixos/boot.initrd.systemd.contents.<name>.dlopen.usePriority | Priority of dlopen ELF notes to include. "required" is
minimal, "recommended" includes "required", and
"suggested" includes "recommended"
|
| options/nixos/services.gitlab-runner.services.<name>.preGetSourcesScript | Runner-specific command script executed before code is pulled.
|
| options/home-manager/programs.firefox.profiles.<name>.bookmarks.force | Whether to force override existing custom bookmarks.
|
| options/nixos/systemd.network.netdevs.<name>.wireguardConfig | Each attribute in this set specifies an option in the
[WireGuard] section of the unit
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.http2 | Whether to enable HTTP 2
|
| options/home-manager/programs.librewolf.profiles.<name>.preConfig | Extra preferences to add to user.js, before
programs.firefox.profiles._name_.settings
|
| options/nixos/services.gitlab-runner.services.<name>.dockerDisableCache | Disable all container caching.
|
| options/darwin/services.gitlab-runner.services.<name>.dockerDisableCache | Disable all container caching.
|
| options/nixos/users.users.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| options/darwin/users.users.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| options/nixos/services.github-runners.<name>.serviceOverrides | Modify the systemd service
|
| options/nixos/services.xserver.xkb.extraLayouts.<name>.languages | A list of languages provided by the layout.
(Use ISO 639-2 codes, for example: "eng" for english)
|
| options/nixos/networking.wireless.networks.<name>.psk | The network's pre-shared key in plaintext defaulting
to being a network without any authentication.
Be aware that this will be written to the Nix store
in plaintext! Use pskRaw with an external
reference to keep it safe.
Mutually exclusive with pskRaw.
|
| options/nixos/systemd.user.slices.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/systemd.user.timers.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.extraConfig.channel | Per channel extra configuration.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.extraConfig.account | Account section extra configuration.
|
| options/darwin/services.buildkite-agents.<name>.hooks.checkout | The checkout hook script will replace the default checkout routine of the
bootstrap.sh script
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mode | IPsec Mode to establish CHILD_SA with.
tunnel negotiates the CHILD_SA in IPsec Tunnel Mode,
- whereas
transport uses IPsec Transport Mode.
transport_proxy signifying the special Mobile IPv6
Transport Proxy Mode.
beet is the Bound End to End Tunnel mixture mode,
working with fixed inner addresses without the need to include them in
each packet.
- Both
transport and beet modes are
subject to mode negotiation; tunnel mode is
negotiated if the preferred mode is not available.
pass and drop are used to install
shunt policies which explicitly bypass the defined traffic from IPsec
processing or drop it, respectively
|
| options/home-manager/services.podman.networks.<name>.description | The description of the network.
|
| options/nixos/services.invoiceplane.sites.<name>.stateDir | This directory is used for uploads of attachments and cache
|
| options/nixos/systemd.network.networks.<name>.tokenBucketFilterConfig | Each attribute in this set specifies an option in the
[TokenBucketFilter] section of the unit
|
| options/nixos/systemd.network.networks.<name>.heavyHitterFilterConfig | Each attribute in this set specifies an option in the
[HeavyHitterFilter] section of the unit
|
| options/nixos/services.mpdscribble.endpoints.<name>.url | The url endpoint where the scrobble API is listening.
|
| options/home-manager/programs.vscode.profiles.<name>.languageSnippets | Defines user snippets for different languages.
|
| options/home-manager/services.podman.machines.<name>.watchdogInterval | Interval in seconds to check if the machine is running
|
| options/home-manager/services.mpdscribble.endpoints.<name>.url | The url endpoint where the scrobble API is listening.
|
| options/nixos/services.fedimintd.<name>.nginx.config.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.influxdb2.provision.organizations.<name>.buckets.<name>.description | Optional description for the bucket.
|
| options/nixos/services.nginx.virtualHosts.<name>.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.xonotic.settings.hostname | The name that will appear in the server list. $g_xonoticversion
gets replaced with the current version.
|
| options/nixos/services.gitlab-runner.services.<name>.runUntagged | Register to run untagged builds; defaults to
true when tagList is empty
|
| options/nixos/virtualisation.kvmgt.vgpus.<name>.uuid | UUID(s) of VGPU device
|
| options/nixos/services.ttyd.username | Username for basic http authentication.
|
| options/nixos/services.logrotate.settings.<name>.priority | Order of this logrotate block in relation to the others
|
| options/darwin/services.buildkite-agents.<name>.hooks.post-checkout | The post-checkout hook will run after the bootstrap script has checked out
your projects source code.
|
| options/nixos/services.consul-template.instances.<name>.package | The consul-template package to use.
|
| options/nixos/services.autosuspend.wakeups.<name>.enabled | Whether to enable this wake-up check.
|
| options/nixos/services.nginx.virtualHosts.<name>.sslCertificate | Path to server SSL certificate.
|
| options/home-manager/accounts.email.accounts.<name>.imapnotify.enable | Whether to enable imapnotify.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.showScrollbar | Whether the scroll bar should be visible.
|
| options/nixos/services.matomo.webServerUser | Name of the web server user that forwards requests to services.phpfpm.pools.<name>.socket the fastcgi socket for Matomo if the nginx
option is not used
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.device | Determines the platform faster-whisper is run on
|
| options/nixos/services.wstunnel.clients.<name>.upgradePathPrefix | Use a specific HTTP path prefix that will show up in the upgrade
request to the wstunnel server
|
| options/home-manager/launchd.agents.<name>.config.QueueDirectories | Much like the WatchPaths option, this key will watch the paths for modifications
|
| options/nixos/networking.wireless.networks.<name>.ssid | You could use this field to override the network's ssid
|
| options/nixos/services.kmonad.keyboards.<name>.defcfg.compose.delay | The delay (in milliseconds) between compose key sequences.
|
| options/nixos/containers.<name>.allowedDevices.*.modifier | Device node access modifier
|
| options/home-manager/accounts.email.accounts.<name>.himalaya.settings | Himalaya CLI configuration for this email account
|
| options/nixos/services.simplesamlphp.<name>.configDir | Path to the SimpleSAMLphp config directory.
|
| options/nixos/services.keepalived.vrrpScripts.<name>.interval | Seconds between script invocations.
|
| options/nixos/services.snapper.configs.<name>.TIMELINE_LIMIT_MONTHLY | Limits for timeline cleanup.
|
| options/home-manager/programs.obsidian.defaultSettings.hotkeys.<name>.*.key | The hotkey.
|
| options/home-manager/programs.obsidian.defaultSettings.extraFiles.<name>.text | Text of the file.
|
| options/nixos/services.fcgiwrap.instances.<name>.process.user | User as which this instance of fcgiwrap will be run
|
| options/home-manager/accounts.contact.accounts.<name>.khal.addresses | Email addresses to be associated with this account
|
| options/nixos/services.tarsnap.archives.<name>.cachedir | The cache allows tarsnap to identify previously stored data
blocks, reducing archival time and bandwidth usage
|
| options/nixos/services.bookstack.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.fediwall.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/programs.uwsm.waylandCompositors.<name>.extraArgs | Extra command-line arguments pass to to the compsitor.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.agorakit.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.librenms.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.kanboard.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.mainsail.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.networkd-dispatcher.rules.<name>.script | Shell commands executed on specified operational states.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.sslServerChain | Path to server SSL chain file.
|
| options/home-manager/systemd.user.paths.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/nixos/security.pam.services.<name>.allowNullPassword | Whether to allow logging into accounts that have no password
set (i.e., have an empty password field in
/etc/passwd or
/etc/group)
|
| options/nixos/services.firewalld.services.<name>.ports.*.protocol | |
| options/nixos/services.firewalld.services.<name>.protocols | Protocols for the service.
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_app | Type of this worker
|
| options/home-manager/programs.librewolf.profiles.<name>.bookmarks | Declarative bookmarks.
|
| options/nixos/boot.binfmt.registrations.<name>.openBinary | Whether to pass the binary to the interpreter as an open
file descriptor, instead of a path.
|
| options/nixos/services.movim.h2o.serverName | Server name to be used for this virtual host
|
| options/nixos/services.nebula.networks.<name>.firewall.outbound | Firewall rules for outbound traffic.
|
| options/nixos/services.frigate.settings.cameras.<name>.ffmpeg.inputs | List of inputs for this camera.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.index | Adds index directive.
|
| options/home-manager/services.kanshi.profiles.<name>.outputs.*.transform | Sets the output transform.
|
| options/home-manager/accounts.email.accounts.<name>.imapnotify.extraArgs | Extra arguments to pass to goimapnotify.
|
| options/nixos/virtualisation.fileSystems.<name>.encrypted.label | Label of the unlocked encrypted device
|
| options/darwin/launchd.agents.<name>.serviceConfig.StartInterval | This optional key causes the job to be started every N seconds
|
| options/nixos/services.davis.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/networking.supplicant.<name>.configFile.path | External wpa_supplicant.conf configuration file
|
| options/nixos/services.movim.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.slskd.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/darwin/launchd.agents.<name>.serviceConfig.AbandonProcessGroup | When a job dies, launchd kills any remaining processes with the same process group ID as the job
|
| options/home-manager/services.kanshi.profiles.<name>.outputs.*.position | <x>,<y>
Places the output at the specified position in the global coordinates
space.
|
| options/nixos/services.fedimintd.<name>.bitcoin.rpc.secretFile | If set the URL specified in bitcoin.rpc.url will get the content of this file added
as an URL password, so http://user@example.com will turn into http://user:SOMESECRET@example.com
|
| options/nixos/services.vault-agent.instances.<name>.settings | Free-form settings written directly to the config.json file
|
| options/nixos/networking.interfaces.<name>.virtualOwner | In case of a virtual device, the user who owns it.
null will not set owner, allowing access to any user.
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.tryFiles | Adds try_files directive.
|
| options/home-manager/programs.thunderbird.profiles.<name>.search | Declarative search engine configuration.
|
| options/nixos/services.borgbackup.repos.<name>.allowSubRepos | Allow clients to create repositories in subdirectories of the
specified path
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.enableACME | Whether to ask Let's Encrypt to sign a certificate for this vhost
|
| options/home-manager/i18n.inputMethod.fcitx5.settings.addons.<name>.globalSection | global section of an INI file (attrs of INI atom (null, bool, int, float or string))
|
| options/home-manager/services.syncthing.settings.folders.<name>.path | The path to the folder which should be shared
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources | All resources to provision
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.sha256_96 | HMAC-SHA-256 is used with 128-bit truncation with IPsec
|
| options/nixos/services.namecoind.rpc.allowFrom | List of IP address ranges allowed to use the RPC API
|
| options/nixos/services.namecoind.rpc.address | IP address the RPC server will bind to.
|
| options/nixos/services.printing.cups-pdf.instances.<name>.confFileText | This will contain the contents of cups-pdf.conf for this instance, derived from settings
|
| options/nixos/services.gitlab-runner.services.<name>.postGetSourcesScript | Runner-specific command script executed after code is pulled.
|
| options/nixos/services.openbao.settings.listener.<name>.address | The TCP address or UNIX socket path to listen on.
|
| options/home-manager/programs.floorp.profiles.<name>.search.privateDefault | The default search engine used in the Private Browsing.
|
| options/nixos/services.blockbook-frontend.<name>.extraConfig | Additional configurations to be appended to coin.conf
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.listen | Listen addresses and ports for this virtual host.
This option overrides addSSL, forceSSL and onlySSL
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.local_ts | List of local traffic selectors to include in CHILD_SA
|
| options/home-manager/programs.i3status-rust.bars | Attribute set of i3status-rust bars, each with their own configuration
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/home-manager/programs.firefox.profiles.<name>.containers | Attribute set of container configurations
|
| options/home-manager/accounts.email.accounts.<name>.getmail.mailboxes | A non-empty list of mailboxes
|
| options/home-manager/services.kanshi.profiles.<name>.outputs.*.adaptiveSync | Enables or disables adaptive synchronization
(aka
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.inactivity | Timeout before closing CHILD_SA after inactivity
|
| options/home-manager/programs.borgmatic.backups.<name>.storage.extraConfig | Extra settings.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.gatewayGroups | All gateway groups (sites) to provision
|
| options/nixos/systemd.services.<name>.confinement.enable | If set, all the required runtime store paths for this service are
bind-mounted into a tmpfs-based
chroot(2).
|
| options/nixos/services.cloudflared.tunnels.<name>.default | Catch-all service if no ingress matches
|
| options/nixos/services.cjdns.UDPInterface.connectTo.<name>.password | Authorized password to the opposite end of the tunnel.
|
| options/nixos/services.cjdns.ETHInterface.connectTo.<name>.password | Authorized password to the opposite end of the tunnel.
|
| options/nixos/services.cloudflared.tunnels.<name>.ingress | Ingress rules
|
| options/nixos/services.mosquitto.bridges.<name>.addresses.*.port | Port of the remote MQTT broker.
|
| options/home-manager/programs.floorp.profiles.<name>.bookmarks.configFile | Configuration file to define custom bookmarks.
|
| options/home-manager/programs.helix.themes | Each theme is written to
$XDG_CONFIG_HOME/helix/themes/theme-name.toml
|
| options/nixos/systemd.services.<name>.confinement.binSh | The program to make available as /bin/sh inside
the chroot
|
| options/nixos/services.fedimintd.<name>.nginx.config.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.firewalld.zones.<name>.forwardPorts.*.protocol | |
| options/nixos/systemd.services.<name>.enableStrictShellChecks | Enable running shellcheck on the generated scripts for this unit
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.life_bytes | Maximum bytes processed before CHILD_SA gets closed
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits | Resource limits to be imposed on the job
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits | Resource limits to be imposed on the job
|
| options/nixos/services.angrr.settings.profile-policies.<name>.enable | Whether to enable this angrr policy.
|
| options/nixos/services.tor.relay.onionServices.<name>.authorizeClient | See torrc manual.
|
| options/nixos/services.github-runners.<name>.extraEnvironment | Extra environment variables to set for the runner, as an attrset.
|
| options/darwin/services.github-runners.<name>.extraEnvironment | Extra environment variables to set for the runner, as an attrset.
|
| options/home-manager/accounts.email.accounts.<name>.imapnotify.onNotify | Shell commands to run on any event.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.woodpecker-agents.agents.<name>.enable | Whether to enable this Woodpecker-Agent
|
| options/nixos/services.fedimintd.<name>.api_iroh.openFirewall | Opens UDP port in firewall for fedimintd's API Iroh endpoint
|
| options/nixos/services.radicle.ci.broker.settings.adapters.<name>.env | Environment variables to add when running the adapter.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/nixos/services.neo4j.ssl.policies.<name>.trustedDir | Path to directory of X.509 certificates in PEM format for
trusted parties
|
| options/nixos/networking.vswitches.<name>.interfaces | The physical network interfaces connected by the vSwitch.
|
| options/nixos/services.public-inbox.inboxes.<name>.description | User-visible description for the repository.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.cssSnippets | CSS snippets to install.
|
| options/nixos/systemd.user.sockets.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/systemd.user.targets.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/services.netbird.tunnels.<name>.environment | Environment for the netbird service, used to pass configuration options.
|
| options/nixos/services.netbird.clients.<name>.environment | Environment for the netbird service, used to pass configuration options.
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.locations.<name>.index | Adds DirectoryIndex directive
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.locations.<name>.alias | Alias directory for requests
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.themes.*.enable | Whether to set the theme as active.
|
| options/darwin/networking.wg-quick.interfaces.<name>.table | Controls the routing table to which routes are added
|
| options/nixos/services.grafana.provision.datasources.settings.datasources.*.name | Name of the datasource
|
| options/nixos/services.authelia.instances.<name>.settings.theme | The theme to display.
|
| options/nixos/services.jitsi-videobridge.xmppConfigs.<name>.userName | User part of the JID.
|
| options/nixos/services.beesd.filesystems.<name>.extraOptions | Extra command-line options passed to the daemon
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.timeout | HTTP timeout in seconds. 0 means forever or system timeout.
|
| options/home-manager/accounts.contact.accounts.<name>.khard.addressbooks | If provided, each item on this list will generate an
entry on khard configuration file as a separate addressbook
(vdir)
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords | Sets allowed passwords for WPA3-SAE
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits | Resource limits to be imposed on the job
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits | Resource limits to be imposed on the job
|
| options/nixos/services.slurm.nodeName | Name that SLURM uses to refer to a node (or base partition for BlueGene
systems)
|
| options/nixos/systemd.services.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/services.angrr.settings.profile-policies.<name>.keep-since | Retention period for the GC roots in this profile.
|
| options/nixos/services.moodle.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.dns | Address or CIDR subnets
StrongSwan default: []
|
| options/nixos/services.nagios.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.simplesamlphp.<name>.package | The simplesamlphp package to use.
|
| options/nixos/services.firewalld.zones.<name>.description | Description for the zone.
|
| options/nixos/services.fedimintd.<name>.nginx.config.reuseport | Create an individual listening socket
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/darwin/launchd.agents.<name>.serviceConfig.WorkingDirectory | This optional key is used to specify a directory to chdir(2) to before running the job.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/nixos/services.github-runners.<name>.tokenFile | The full path to a file which contains either
- a fine-grained personal access token (PAT),
- a classic PAT
- or a runner registration token
Changing this option or the tokenFile’s content triggers a new runner registration
|
| options/nixos/services.tarsnap.archives.<name>.verylowmem | Reduce memory consumption by a factor of 2 beyond what
lowmem does, at the cost of significantly
slowing down the archiving process.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.extraConfig | These lines go to httpd.conf verbatim
|
| options/nixos/hardware.fw-fanctrl.config.strategies.<name>.speedCurve | How should the speed curve look like
|
| options/nixos/services.nginx.virtualHosts.<name>.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.tryFiles | Adds try_files directive.
|
| options/darwin/networking.wg-quick.interfaces.<name>.peers.*.publicKey | The public key for this peer.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.auth | Authentication settings
|
| options/home-manager/accounts.email.accounts.<name>.lieer.sync.frequency | How often to synchronize the account
|
| options/home-manager/launchd.agents.<name>.config.Sockets | This optional key is used to specify launch on demand sockets that can be used to let launchd know when
to run the job
|
| options/nixos/services.mautrix-meta.instances.<name>.serviceUnit | The systemd unit (a service or a target) for other services to depend on if they
need to be started after matrix-synapse
|
| options/nixos/services.tahoe.introducers.<name>.tub.location | The external location that the introducer should listen on
|
| options/nixos/services.nebula.networks.<name>.lighthouse.dns.port | UDP port number for lighthouse DNS server.
|
| options/nixos/services.gitea-actions-runner.instances.<name>.tokenFile | Path to an environment file, containing the TOKEN environment
variable, that holds a token to register at the configured
Gitea/Forgejo instance.
|
| options/nixos/services.prometheus.exporters.imap-mailstat.accounts.<name>.username | If empty string mailaddress value is used
|
| options/nixos/services.syncthing.settings.folders.<name>.path | The path to the folder which should be shared
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.jibri.xmppEnvironments.<name>.xmppDomain | The base XMPP domain.
|
| options/nixos/services.gitlab-runner.services.<name>.dockerAllowedImages | Whitelist allowed images.
|
| options/darwin/services.gitlab-runner.services.<name>.dockerAllowedImages | Whitelist allowed images.
|
| options/nixos/services.bookstack.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.bookstack.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.revocation | Certificate revocation policy for CRL or OCSP revocation.
- A
strict revocation policy fails if no revocation information is
available, i.e. the certificate is not known to be unrevoked.
ifuri fails only if a CRL/OCSP URI is available, but certificate
revocation checking fails, i.e. there should be revocation information
available, but it could not be obtained.
- The default revocation policy
relaxed fails only if a certificate is
revoked, i.e. it is explicitly known that it is bad
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.publicKey | The base64 public key to the peer.
|
| options/nixos/services.netbird.tunnels.<name>.dns-resolver.address | An explicit address that NetBird will serve *.netbird.cloud. (usually) entries on
|
| options/nixos/services.netbird.clients.<name>.dns-resolver.address | An explicit address that NetBird will serve *.netbird.cloud. (usually) entries on
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.force | Whether to override all previous firefox settings
|
| options/nixos/services.grafana.provision.alerting.templates.settings.deleteTemplates.*.name | Name of the template, must be unique
|
| options/nixos/services.networkd-dispatcher.rules.<name>.onState | List of names of the systemd-networkd operational states which
should trigger the script
|
| options/nixos/services.firewalld.zones.<name>.sources.*.address | An IP address or a network IP address with a mask for IPv4 or IPv6
|
| options/nixos/services.firewalld.zones.<name>.icmpBlockInversion | Whether to invert the icmp block handling
|
| options/nixos/systemd.network.networks.<name>.quickFairQueueingConfig | Each attribute in this set specifies an option in the
[QuickFairQueueing] section of the unit
|
| options/nixos/services.simplesamlphp.<name>.phpfpmPool | The PHP-FPM pool that serves SimpleSAMLphp instance.
|
| options/nixos/services.v4l2-relayd.instances.<name>.input.framerate | The framerate to read from input-stream.
|
| options/nixos/services.fcgiwrap.instances.<name>.socket.address | Socket address
|
| options/nixos/services.jitsi-videobridge.xmppConfigs.<name>.mucJids | JID of the MUC to join
|
| options/nixos/services.zeronsd.servedNetworks.<name>.settings.token | Path to a file containing the API Token for ZeroTier Central.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/nixos/services.sabnzbd.settings.servers.<name>.priority | Priority of this servers
|
| options/nixos/services.sabnzbd.settings.servers.<name>.required | In case of connection failures, wait for the
server to come back online instead of skipping
it.
|
| options/nixos/services.restic.backups.<name>.environmentFile | file containing the credentials to access the repository, in the
format of an EnvironmentFile as described by systemd.exec(5)
|
| options/home-manager/accounts.email.accounts.<name>.neomutt.extraMailboxes | List of extra mailboxes
|
| options/nixos/services.blockbook-frontend.<name>.rpc.password | RPC password for JSON-RPC connections
|
| options/nixos/services.authelia.instances.<name>.settings | Your Authelia config.yml as a Nix attribute set
|
| options/nixos/programs.nix-required-mounts.allowedPatterns.<name>.paths | A list of glob patterns, indicating which paths to expose to the sandbox
|
| options/nixos/services.netbird.tunnels.<name>.openInternalFirewall | Opens up internal firewall ports for the NetBird's network interface.
|
| options/nixos/services.netbird.clients.<name>.openInternalFirewall | Opens up internal firewall ports for the NetBird's network interface.
|
| options/nixos/services.easytier.instances.<name>.settings.instance_name | Identify different instances on same host
|
| options/home-manager/services.activitywatch.watchers.<name>.settings | The settings for the individual watcher in TOML format
|
| options/nixos/services.reposilite.database.dbname | Database name.
|
| options/nixos/services.mautrix-meta.instances.<name>.settings | config.yaml configuration as a Nix attribute set
|
| options/nixos/services.authelia.instances.<name>.secrets | It is recommended you keep your secrets separate from the configuration
|
| options/nixos/services.mailpit.instances.<name>.database | Specify the local database filename to store persistent data
|
| options/nixos/users.mysql.pam.logging.userColumn | The name of the column in the log table to which the name of the
user being authenticated is stored.
|
| options/nixos/users.mysql.pam.logging.hostColumn | The name of the column in the log table to which the name of the user
being authenticated is stored.
|
| options/nixos/networking.wireguard.interfaces.<name>.ips | The IP addresses of the interface.
|
| options/nixos/services.armagetronad.servers.<name>.enable | Whether to enable armagetronad.
|
| options/nixos/services.easytier.instances.<name>.settings.dhcp | Automatically determine the IPv4 address of this peer based on
existing peers on network.
|
| options/darwin/services.gitlab-runner.services.<name>.maximumTimeout | What is the maximum timeout (in seconds) that will be set for
job when using this Runner. 0 (default) simply means don't limit.
|
| options/nixos/services.borgbackup.jobs.<name>.removableDevice | Whether the repo (which must be local) is a removable device.
|
| options/nixos/services.influxdb2.provision.users.<name>.present | Whether to ensure that this user is present or absent.
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.nbns | Address or CIDR subnets
StrongSwan default: []
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.dhcp | Address or CIDR subnets
StrongSwan default: []
|
| options/nixos/services.tor.relay.onionServices.<name>.settings.RendPostPeriod | See torrc manual.
|
| options/nixos/systemd.user.sockets.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.wstunnel.clients.<name>.settings.http-headers | Custom headers to send in the upgrade request
|
| options/nixos/systemd.user.targets.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/home-manager/systemd.user.slices.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/home-manager/systemd.user.timers.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/home-manager/systemd.user.mounts.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/home-manager/services.xsuspender.rules.<name>.matchWmClassContains | Match windows that wm class contains string.
|
| options/nixos/services.anubis.instances.<name>.settings.TARGET | The reverse proxy target that Anubis is protecting
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites | Attribute set of site options for this profile
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.if_id_out | XFRM interface ID set on outbound policies/SA
|
| options/home-manager/programs.librewolf.profiles.<name>.search.force | Whether to force replace the existing search
configuration
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/home-manager/programs.librewolf.profiles.<name>.search.default | The default search engine used in the address bar and search
bar.
|
| options/nixos/services.maddy.hostname | Hostname to use
|
| options/nixos/networking.wireless.networks.<name>.extraConfig | Extra configuration lines appended to the network block
|
| options/nixos/services.sabnzbd.settings.servers.<name>.optional | In case of connection failures, temporarily
disable this server. (See sabnzbd's documentation
for usage guides).
|
| options/nixos/services.hostapd.radios.<name>.wifi6.multiUserBeamformer | HE multi user beamformee support
|
| options/nixos/programs.uwsm.waylandCompositors.<name>.comment | The comment field of the desktop entry file.
|
| options/nixos/services.beesd.filesystems.<name>.verbosity | Log verbosity (syslog keyword/level).
|
| options/nixos/networking.interfaces.<name>.ipv4.routes.*.address | IPv4 address of the network.
|
| options/nixos/networking.interfaces.<name>.ipv6.routes.*.address | IPv6 address of the network.
|
| options/nixos/services.tarsnap.archives.<name>.explicitSymlinks | Whether to follow symlinks specified as archives.
|
| options/nixos/services.maubot.settings.homeservers.<name>.url | Client-server API URL
|
| options/nixos/systemd.services.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/home-manager/accounts.email.accounts.<name>.neomutt.showDefaultMailbox | Show the default mailbox (INBOX)
|
| options/home-manager/wayland.windowManager.hyprland.submaps.<name>.settings | Hyprland binds to be put in the submap
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.wpaPassword | Sets the password for WPA-PSK that will be converted to the pre-shared key
|
| options/nixos/services.ghostunnel.servers.<name>.unsafeTarget | If set, does not limit target to localhost, 127.0.0.1, [::1], or UNIX sockets
|
| options/nixos/services.gancio.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.fluidd.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.akkoma.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.matomo.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.monica.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.gitlab-runner.services.<name>.protected | When set to true Runner will only run on pipelines
triggered on protected branches
|
| options/home-manager/launchd.agents.<name>.config.ThrottleInterval | This key lets one override the default throttling policy imposed on jobs by launchd
|
| options/nixos/services.librenms.database.username | Name of the user on the MySQL/MariaDB server
|
| options/nixos/services.invoiceplane.sites.<name>.poolConfig | Options for the InvoicePlane PHP pool
|
| options/home-manager/programs.hexchat.channels.<name>.loginMethod | The login method
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.dpd_action | Action to perform for this CHILD_SA on DPD timeout
|
| options/nixos/services.kmonad.keyboards.<name>.defcfg.allowCommands | Whether to enable keys to run shell commands.
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.settings | Settings for this profile
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/nixos/virtualisation.fileSystems.<name>.noCheck | Disable running fsck on this filesystem.
|
| options/nixos/services.blockbook-frontend.<name>.rpc.passwordFile | File containing password of the RPC user
|
| options/nixos/networking.wireless.networks.<name>.auth | Use this option to configure advanced authentication methods
like EAP
|
| options/nixos/services.borgbackup.jobs.<name>.patterns | Include/exclude paths matching the given patterns
|
| options/nixos/services.bookstack.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.dovecot2.mailPlugins.perProtocol.<name>.enable | mail plugins to enable as a list of strings to append to the corresponding per-protocol $mail_plugins configuration variable
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.hostapd.radios.<name>.wifi7.multiUserBeamformer | EHT multi user beamformee support
|
| options/nixos/services.frigate.settings.cameras.<name>.ffmpeg.inputs.*.path | Stream URL
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.language | The language used to to parse words and sentences.
|
| options/darwin/networking.wg-quick.interfaces.<name>.privateKeyFile | Path to file containing this interface's private key.
|
| options/darwin/security.sandbox.profiles.<name>.allowNetworking | Whether to allow network access inside the sandbox.
|
| options/nixos/security.ipa.ipaHostname | Fully-qualified hostname used to identify this host in the IPA domain.
|
| options/nixos/boot.binfmt.registrations.<name>.fixBinary | Whether to open the interpreter file as soon as the
registration is loaded, rather than waiting for a
relevant file to be invoked
|
| options/nixos/networking.sits.<name>.encapsulation | Configures the type of encapsulation.
|
| options/nixos/services.znapzend.zetup.<name>.destinations | Additional destinations.
|
| options/home-manager/services.podman.containers.<name>.entrypoint | The container entrypoint.
|
| options/nixos/services.gitlab-runner.services.<name>.debugTraceDisabled | When set to true Runner will disable the possibility of
using the CI_DEBUG_TRACE feature.
|
| options/darwin/services.gitlab-runner.services.<name>.debugTraceDisabled | When set to true Runner will disable the possibility of
using the CI_DEBUG_TRACE feature.
|
| options/nixos/services.btrbk.instances.<name>.snapshotOnly | Whether to run in snapshot only mode
|
| options/home-manager/programs.thunderbird.profiles.<name>.userChrome | Custom Thunderbird user chrome CSS.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.AbandonProcessGroup | When a job dies, launchd kills any remaining processes with the same process group ID as the job
|
| options/darwin/launchd.daemons.<name>.serviceConfig.StartInterval | This optional key causes the job to be started every N seconds
|
| options/nixos/users.extraUsers.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mark_in | Netfilter mark and mask for input traffic
|
| options/nixos/networking.wg-quick.interfaces.<name>.table | The kernel routing table to add this interface's
associated routes to
|
| options/nixos/users.users.<name>.openssh.authorizedPrincipals | A list of verbatim principal names that should be added to the user's
authorized principals.
|
| options/nixos/services.blockbook-frontend.<name>.extraCmdLineOptions | Extra command line options to pass to Blockbook
|
| options/nixos/services.davis.nginx.serverName | Name of this virtual host
|
| options/nixos/services.slskd.nginx.serverName | Name of this virtual host
|
| options/nixos/services.movim.nginx.serverName | Name of this virtual host
|
| options/nixos/services.gerrit.plugins | List of plugins to add to Gerrit
|
| options/nixos/services.fcgiwrap.instances.<name>.process.prefork | Number of processes to prefork.
|
| options/nixos/services.tarsnap.archives.<name>.directories | List of filesystem paths to archive.
|
| options/nixos/services.syncoid.commands.<name>.localTargetAllow | Permissions granted for the services.syncoid.user user
for local target datasets
|
| options/home-manager/programs.zsh.plugins.*.file | The plugin script to source
|
| options/nixos/networking.wg-quick.interfaces.<name>.privateKeyFile | Private key file as generated by wg genkey.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/home-manager/programs.firefox.profiles.<name>.search.privateDefault | The default search engine used in the Private Browsing.
|
| options/darwin/services.aerospace.settings.on-window-detected.*."if".app-name-regex-substring | Regex substring to match the app name (optional).
|
| options/home-manager/programs.librewolf.profiles.<name>.settings | Attribute set of LibreWolf preferences
|
| options/home-manager/programs.floorp.profiles.<name>.bookmarks.settings | Custom bookmarks.
|
| options/nixos/services.logrotate.settings.<name>.frequency | How often to rotate the logs
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.public | Whether this is a public client (enforces PKCE, doesn't use a basic secret)
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mark_out | Netfilter mark and mask for output traffic
|
| options/home-manager/accounts.calendar.accounts.<name>.khal.addresses | Email addresses to be associated with this account
|
| options/nixos/services.zeronsd.servedNetworks.<name>.settings.domain | Domain under which ZeroTier records will be available.
|
| options/home-manager/accounts.email.accounts.<name>.imapnotify.onNotifyPost | Shell commands to run after onNotify event.
|
| options/home-manager/programs.firefox.profiles.<name>.bookmarks.configFile | Configuration file to define custom bookmarks.
|
| options/home-manager/systemd.user.services.<name>.Service.Environment | Environment variables available to executed processes.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.AbandonProcessGroup | When a job dies, launchd kills any remaining processes with the same process group ID as the job
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.forceSSL | Whether to add a separate nginx server block that permanently redirects (301)
all plain HTTP traffic to HTTPS
|
| options/nixos/users.extraUsers.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StartInterval | This optional key causes the job to be started every N seconds
|
| options/nixos/services.namecoind.rpc.password | Password for RPC connections.
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.module | Optional PKCS#11 module name.
|
| options/nixos/services.easytier.instances.<name>.settings.peers | Peers to connect initially
|
| options/darwin/launchd.agents.<name>.serviceConfig.LaunchEvents | Specifies higher-level event types to be used as launch-on-demand event
sources
|
| options/nixos/services.drupal.sites.<name>.virtualHost.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.klipper.firmwares.<name>.klipperFlashPackage | Path to the built klipper-flash package.
|
| options/nixos/services.authelia.instances.<name>.settings.log.level | Level of verbosity for logs.
|
| options/nixos/services.orangefs.server.fileSystems.<name>.extraStorageHints | Extra config for <StorageHints> section.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.cssSnippets.*.text | Text of the file.
|
| options/nixos/services.postfix.settings.master.<name>.privileged | |
| options/nixos/services.zabbixWeb.httpd.virtualHost.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/nixos/fileSystems.<name>.overlay.useStage1BaseDirectories | If enabled, lowerdir, upperdir and workdir will be prefixed with /sysroot
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswordsFile | Sets the password for WPA3-SAE
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.kanboard.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.librenms.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.agorakit.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.fediwall.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.mainsail.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.pixelfed.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rand_packets | Packet range from which to choose a random value to subtract from
rekey_packets
|
| options/home-manager/programs.borgmatic.backups.<name>.location.extraConfig | Extra settings.
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/systemd.user.services.<name>.enableStrictShellChecks | Enable running shellcheck on the generated scripts for this unit
|
| options/nixos/services.bcg.mqtt.username | MQTT server access username.
|
| options/nixos/services.bookstack.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.auth.<name>.adapter_config.clientSecretFile | A file containing a the client secret for an openid_connect adapter
|
| options/nixos/services.ghostunnel.servers.<name>.keystore | Path to keystore (combined PEM with cert/key, or PKCS12 keystore)
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.copy_dscp | Whether to copy the DSCP (Differentiated Services Field Codepoint)
header field to/from the outer IP header in tunnel mode
|
| options/nixos/services.keepalived.vrrpInstances.<name>.vmacXmitBase | Send/Recv VRRP messages from base interface instead of VMAC interface.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.WorkingDirectory | This optional key is used to specify a directory to chdir(2) to before running the job.
|
| options/nixos/services.public-inbox.inboxes.<name>.watchheader | If specified, public-inbox-watch(1) will only process
mail containing a matching header.
|
| options/home-manager/accounts.email.accounts.<name>.imapnotify.extraConfig | Additional configuration to add for this account.
|
| options/nixos/services.snipe-it.nginx.serverName | Name of this virtual host
|
| options/home-manager/accounts.email.accounts.<name>.lieer.notmuchSetupWarning | Warn if Notmuch is not also enabled for this account
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/nixos/services.hadoop.hdfs.namenode.extraEnv | Extra environment variables for HDFS NameNode
|
| options/nixos/services.hostapd.radios.<name>.dynamicConfigScripts | All of these scripts will be executed in lexicographical order before hostapd
is started, right after the global segment was generated and may dynamically
append global options the generated configuration file
|
| options/nixos/services.beesd.filesystems.<name>.spec | Description of how to identify the filesystem to be duplicated by this
instance of bees
|
| options/nixos/services.fedimintd.<name>.nginx.config.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| options/nixos/services.simplesamlphp.<name>.authSources | Auth sources options used by SimpleSAMLphp.
|
| options/home-manager/programs.zed-editor.themes | Each theme is written to
$XDG_CONFIG_HOME/zed/themes/theme-name.json
where the name of each attribute is the theme-name
See https://zed.dev/docs/extensions/themes for the structure of a
Zed theme
|
| options/home-manager/programs.vscode.profiles.<name>.keybindings | Keybindings written to Visual Studio Code's
keybindings.json
|
| options/nixos/systemd.user.services.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/services.simplesamlphp.<name>.localDomain | The domain serving your SimpleSAMLphp instance
|
| options/nixos/services.jitsi-videobridge.xmppConfigs.<name>.domain | Domain part of JID of the XMPP user, if it is different from hostName.
|
| options/nixos/networking.interfaces.<name>.ipv6.addresses | List of IPv6 addresses that will be statically assigned to the interface.
|
| options/nixos/services.angrr.settings.profile-policies.<name>.keep-latest-n | Keep the latest N GC roots in this profile.
|
| options/nixos/networking.interfaces.<name>.ipv4.addresses | List of IPv4 addresses that will be statically assigned to the interface.
|
| options/nixos/services.peertube-runner.instancesToRegister.<name>.url | URL of the PeerTube instance.
|
| options/nixos/virtualisation.fileSystems.<name>.enable | Whether to enable the filesystem mount.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.WorkingDirectory | This optional key is used to specify a directory to chdir(2) to before running the job.
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.model | Name of the voice model to use
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.scopeMaps | Maps kanidm groups to returned oauth scopes
|
| options/nixos/networking.wireguard.interfaces.<name>.type | The type of the interface
|
| options/nixos/services.nginx.virtualHosts.<name>.listen.*.extraParameters | Extra parameters of this listen directive.
|
| options/nixos/services.easytier.instances.<name>.settings.ipv4 | IPv4 cidr address of this peer in the virtual network
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.passwordFile | The password for this entry, read from the given file when starting hostapd
|
| options/nixos/services.anubis.instances.<name>.policy.settings | Additional policy settings merged into the policy file
|
| options/nixos/systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.mode | The file access mode to use when creating this file or directory.
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.force | Whether to override all previous firefox settings
|
| options/nixos/services.grafana.provision.datasources.settings.deleteDatasources.*.name | Name of the datasource to delete.
|
| options/nixos/services.znapzend.zetup.<name>.timestampFormat | The timestamp format to use for constructing snapshot names
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/systemd.network.networks.<name>.networkEmulatorConfig | Each attribute in this set specifies an option in the
[NetworkEmulator] section of the unit
|
| options/nixos/services.hostapd.radios.<name>.wifi6.singleUserBeamformee | HE single user beamformee support
|
| options/nixos/services.hostapd.radios.<name>.wifi6.singleUserBeamformer | HE single user beamformer support
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.highlight | The colors for the terminal’s highlighted area.
|
| options/home-manager/programs.obsidian.defaultSettings.extraFiles.<name>.source | Path of the source file or directory.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.auth | Authentication settings
|
| options/home-manager/programs.thunderbird.profiles.<name>.extraConfig | Extra preferences to add to user.js.
|
| options/nixos/services.syncthing.settings.folders.<name>.enable | Whether to share this folder
|
| options/nixos/systemd.shutdownRamfs.contents.<name>.dlopen.features | Features to enable via dlopen ELF notes
|
| options/home-manager/services.syncthing.settings.folders.<name>.enable | Whether to share this folder
|
| options/nixos/services.namecoind.trustedNodes | List of the only peer IP addresses to connect to
|
| options/home-manager/services.restic.backups.<name>.environmentFile | A file containing the credentials to access the repository, in the
format of an EnvironmentFile as described by systemd.exec(5)
|
| options/nixos/hardware.fw-fanctrl.config.strategies.<name>.speedCurve.*.temp | Temperature in °C at which the fan speed should be changed
|
| options/nixos/services.h2o.hosts.<name>.tls.identity.*.certificate-file | Path to certificate file
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.hw_offload | Enable hardware offload for this CHILD_SA, if supported by the IPsec
implementation
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.pairwiseCiphers | Set of accepted cipher suites (encryption algorithms) for pairwise keys (unicast packets)
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.originUrl | The redirect URL of the service
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.fedimintd.<name>.consensus.finalityDelay | Consensus peg-in finality delay.
|
| options/home-manager/accounts.email.accounts.<name>.offlineimap.enable | Whether to enable OfflineIMAP.
|
| options/nixos/services.patroni.namespace | Path within the configuration store where Patroni will keep information about the cluster.
|
| options/nixos/services.kmonad.keyboards.<name>.enableHardening | Whether to enable systemd hardening.
If KMonad is used to execute shell commands, hardening may make some of them fail.
|
| options/nixos/services.gitea-actions-runner.instances.<name>.settings | Configuration for act_runner daemon
|
| options/nixos/services.authelia.instances.<name>.secrets.jwtSecretFile | Path to your JWT secret used during identity verificaton.
|
| options/nixos/services.nebula.networks.<name>.lighthouse.dns.enable | Whether this lighthouse node should serve DNS.
|
| options/nixos/services.frigate.settings.cameras.<name>.ffmpeg.inputs.*.roles | List of roles for this stream
|
| options/nixos/services.wordpress.sites.<name>.database.passwordFile | A file containing the password corresponding to
database.user.
|
| options/darwin/networking.wg-quick.interfaces.<name>.peers.*.allowedIPs | List of IP addresses associated with this peer.
|
| options/nixos/services.inadyn.settings.provider.<name>.password | Password for this DDNS provider
|
| options/home-manager/launchd.agents.<name>.config.LowPriorityBackgroundIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O when the process is throttled with the Darwin-background classification.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mark_in_sa | Whether to set mark_in on the inbound SA
|
| options/nixos/services.keepalived.vrrpInstances.<name>.virtualIps | Declarative vhost config
|
| options/nixos/networking.wireguard.interfaces.<name>.peers | Peers linked to the interface.
|
| options/nixos/services.dawarich.sidekiqProcesses.<name>.threads | Number of threads this process should use for executing jobs
|
| options/nixos/services.mastodon.sidekiqProcesses.<name>.threads | Number of threads this process should use for executing jobs
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.wpaPskFile | Sets the password(s) for WPA-PSK
|
| options/nixos/services.kanboard.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.agorakit.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.dolibarr.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.librenms.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.fediwall.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.pixelfed.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.mainsail.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/home-manager/services.xsuspender.rules.<name>.autoSuspendOnBattery | Whether to auto-apply rules when switching to battery
power even if the window(s) didn't just lose focus.
|
| options/nixos/services.hostapd.radios.<name>.wifi7.singleUserBeamformer | EHT single user beamformer support
|
| options/nixos/services.hostapd.radios.<name>.wifi7.singleUserBeamformee | EHT single user beamformee support
|
| options/nixos/services.wordpress.sites.<name>.database.createLocally | Create the database and database user locally.
|
| options/home-manager/systemd.user.sockets.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/home-manager/systemd.user.automounts.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/home-manager/systemd.user.targets.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/home-manager/programs.obsidian.defaultSettings.extraFiles.<name>.target | Path to target relative to the vault's directory.
|
| options/nixos/services.invoiceplane.sites.<name>.cron.enable | Enable cron service which periodically runs Invoiceplane tasks
|
| options/nixos/services.nebula.networks.<name>.lighthouses | List of IPs of lighthouse hosts this node should report to and query from
|
| options/nixos/users.users.<name>.hashedPassword | Specifies the hashed password for the user
|
| options/nixos/services.keepalived.vrrpInstances.<name>.state | Initial state
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/home-manager/programs.floorp.profiles.<name>.containersForce | Whether to force replace the existing containers configuration
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.robotsEntries | Specification of pages to be ignored by web crawlers
|
| options/darwin/launchd.agents.<name>.serviceConfig.KeepAlive | This optional key is used to control whether your job is to be kept continuously running or to let
demand and conditions control the invocation
|
| options/home-manager/accounts.email.accounts.<name>.aerc.imapOauth2Params.client_id | The OAuth2 client identifier.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.smtpOauth2Params.client_id | The OAuth2 client identifier.
|
| options/nixos/services.hadoop.hdfs.namenode.enable | Whether to enable HDFS NameNode.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.notmuchSetupWarning | Warn if Notmuch is not also enabled for this account
|
| options/nixos/services.invoiceplane.sites.<name>.settings | Structural InvoicePlane configuration
|
| options/home-manager/programs.thunderbird.profiles.<name>.isDefault | Whether this is a default profile
|
| options/nixos/networking.interfaces.<name>.ipv4.routes.*.type | Type of the route
|
| options/nixos/networking.interfaces.<name>.ipv6.routes.*.type | Type of the route
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/home-manager/programs.anki.sync.username | Sync account username.
|
| options/nixos/networking.wg-quick.interfaces.<name>.extraOptions | Extra options to append to the interface section
|
| options/nixos/services.printing.cups-pdf.instances.<name>.settings.Spool | spool directory
|
| options/nixos/services.wstunnel.servers.<name>.settings.restrict-to.*.port | The port.
|
| options/nixos/services.xserver.xkb.extraLayouts.<name>.description | A short description of the layout.
|
| options/nixos/services.wstunnel.servers.<name>.settings.restrict-to.*.host | The hostname.
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions | Submodule for installing and configuring extensions.
|
| options/nixos/services.sanoid.datasets.<name>.use_template | Names of the templates to use for this dataset.
|
| options/nixos/virtualisation.fileSystems.<name>.fsType | Type of the file system
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.locations | Declarative location config
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/nixos/services.easytier.instances.<name>.configServer | Configure the instance from config server
|
| options/nixos/services.blockbook-frontend.<name>.messageQueueBinding | Message Queue Binding address:port.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.authCert | Either a path to a certificate with a client certificate and
the key or a list of paths to the files with them.
|
| options/home-manager/services.git-sync.repositories.<name>.interval | The interval, specified in seconds, at which the synchronization will
be triggered even without filesystem changes.
|
| options/nixos/containers.<name>.networkNamespace | Takes the path to a file representing a kernel network namespace that the container
shall run in
|
| options/nixos/systemd.user.services.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.enable | Whether to enable synchronization using vdirsyncer.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.tokenFile | A file path where access tokens are stored.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.corePlugins.*.enable | Whether to enable the plugin.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.verify | Null or path to certificate to verify SSL against
|
| options/nixos/services.borgbackup.jobs.<name>.createCommand | Borg command to use for archive creation
|
| options/nixos/networking.interfaces.<name>.wakeOnLan.policy | The Wake-on-LAN policy
to set for the device
|
| options/nixos/networking.wg-quick.interfaces.<name>.privateKey | Base64 private key generated by wg genkey
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.present | Whether to ensure that this oauth2 resource server is present or absent.
|
| options/nixos/programs.uwsm.waylandCompositors.<name>.binPath | The wayland-compositor binary path that will be called by UWSM
|
| options/nixos/services.gitlab-runner.services.<name>.maximumTimeout | What is the maximum timeout (in seconds) that will be set for
job when using this Runner. 0 (default) simply means don't limit
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rekey_time | Time to schedule CHILD_SA rekeying
|
| options/nixos/services.neo4j.ssl.policies.<name>.baseDirectory | The mandatory base directory for cryptographic objects of this
policy
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.username | Username for the api or remote transport
|
| options/nixos/systemd.network.networks.<name>.quickFairQueueingConfigClass | Each attribute in this set specifies an option in the
[QuickFairQueueingClass] section of the unit
|
| options/darwin/services.github-runners.<name>.ephemeral | If enabled, causes the following behavior:
- Passes the
--ephemeral flag to the runner configuration script
- De-registers and stops the runner with GitHub after it has processed one job
- Restarts the service after its successful exit
- On start, wipes the state directory and configures a new runner
You should only enable this option if tokenFile points to a file which contains a
personal access token (PAT)
|
| options/nixos/services.authelia.instances.<name>.settings.log.format | Format the logs are written as.
|
| options/nixos/services.vault-agent.instances.<name>.settings.pid_file | Path to use for the pid file.
|
| options/home-manager/accounts.email.accounts.<name>.signature.delimiter | The delimiter used between the document and the signature.
|
| options/home-manager/programs.thunderbird.profiles.<name>.userContent | Custom Thunderbird user content CSS.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.keepDaily | Number of daily archives to keep
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/nixos/services.jibri.xmppEnvironments.<name>.xmppServerHosts | Hostnames of the XMPP servers to connect to.
|
| options/nixos/services.parsedmarc.provision.localMail.hostname | The hostname to use when configuring Postfix
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/hardware.fw-fanctrl.config.strategies.<name>.speedCurve.*.speed | Percent how fast the fan should run at
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.userAgent | The user agent to report to the server
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.enable | Whether to enable the Thunderbird mail client for this account.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.claimMaps | Adds additional claims (and values) based on which kanidm groups an authenticating party belongs to
|
| options/nixos/services.invoiceplane.sites.<name>.database.user | Database user.
|
| options/home-manager/programs.firefox.profiles.<name>.bookmarks.settings | Custom bookmarks.
|
| options/nixos/services.fedimintd.<name>.nginx.config.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| options/nixos/services.gitea-actions-runner.instances.<name>.labels | Labels used to map jobs to their runtime environment
|
| options/nixos/services.hostapd.radios.<name>.countryCode | Country code (ISO/IEC 3166-1)
|
| options/nixos/services.borgbackup.jobs.<name>.encryption.mode | Encryption mode to use
|
| options/nixos/services.nagios.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.moodle.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.keepalived.vrrpInstances.<name>.extraConfig | Extra lines to be added verbatim to the vrrp_instance section.
|
| options/nixos/services.autorandr.profiles.<name>.hooks.preswitch | Preswitch hook executed before mode switch.
|
| options/nixos/services.fedimintd.<name>.nginx.config.listen.*.proxyProtocol | Enable PROXY protocol.
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.server | Address or CIDR subnets
StrongSwan default: []
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.subnet | Address or CIDR subnets
StrongSwan default: []
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.p_cscf | Address or CIDR subnets
StrongSwan default: []
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/home-manager/accounts.contact.accounts.<name>.remote.passwordCommand | A command that prints the password to standard output.
|
| options/home-manager/programs.autorandr.profiles.<name>.hooks.preswitch | Preswitch hook executed before mode switch.
|
| options/nixos/systemd.shutdownRamfs.contents.<name>.dlopen.usePriority | Priority of dlopen ELF notes to include. "required" is
minimal, "recommended" includes "required", and
"suggested" includes "recommended"
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.life_packets | Maximum number of packets processed before CHILD_SA gets closed
|
| options/nixos/services.firewalld.services.<name>.sourcePorts.*.protocol | |
| options/nixos/users.users.<name>.password | Specifies the (clear text) password for the user
|
| options/nixos/services.stash.username | Username for login.
|
| options/darwin/launchd.agents.<name>.serviceConfig.ProgramArguments | This key maps to the second argument of execvp(3)
|
| options/nixos/services.ghostunnel.servers.<name>.extraArguments | Extra arguments to pass to ghostunnel server
|
| options/nixos/networking.wg-quick.interfaces.<name>.autostart | Whether to bring up this interface automatically during boot.
|
| options/nixos/services.vdirsyncer.jobs.<name>.additionalGroups | additional groups to add the dynamic user to
|
| options/darwin/networking.wg-quick.interfaces.<name>.autostart | Whether to bring up this interface automatically during boot.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.password | The password for this entry
|
| options/nixos/services.icingaweb2.modules.monitoring.backends.<name>.resource | Name of the IDO resource
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.password | Specifies the (clear text) password for the MQTT User.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LaunchEvents | Specifies higher-level event types to be used as launch-on-demand event
sources
|
| options/home-manager/launchd.agents.<name>.config.ProcessType | This optional key describes, at a high level, the intended purpose of the job
|
| options/nixos/services.grafana.settings.smtp.from_name | Name to be used as client identity for EHLO in SMTP dialog.
|
| options/nixos/services.invoiceplane.sites.<name>.database.host | Database host address.
|
| options/nixos/services.invoiceplane.sites.<name>.database.port | Database host port.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.mode | Selects the authentication mode for this AP.
- "none": Don't configure any authentication
|
| options/nixos/virtualisation.oci-containers.containers.<name>.hostname | The hostname of the container.
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.simplesamlphp.<name>.settings | Configuration options used by SimpleSAMLphp
|
| options/home-manager/services.xsuspender.rules.<name>.matchWmClassGroupContains | Match windows where wm class group contains string.
|
| options/home-manager/programs.librewolf.profiles.<name>.bookmarks.force | Whether to force override existing custom bookmarks.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.pgbackrest.stanzas.<name>.settings | An attribute set of options as described in:
https://pgbackrest.org/configuration.html
All options can be used
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.tfc_padding | Pads ESP packets with additional data to have a consistent ESP packet
size for improved Traffic Flow Confidentiality
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.postHook | Command to call for each item creation and modification
|
| options/nixos/networking.supplicant.<name>.configFile.writable | Whether the configuration file at configFile.path should be written to by
wpa_supplicant.
|
| options/darwin/networking.wg-quick.interfaces.<name>.peers.*.endpoint | IP and port to connect to this peer at.
|
| options/home-manager/accounts.contact.accounts.<name>.khal.collections | VCARD collections to be searched for contact birthdays.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.scrollbackLines | The number of scrollback lines to keep, null for infinite.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LaunchEvents | Specifies higher-level event types to be used as launch-on-demand event
sources
|
| options/nixos/services.monica.hostname | The hostname to serve monica on.
|
| options/nixos/services.openafsServer.roles.backup.cellServDB.*.dnsname | DNS full-qualified domain name of a database server
|
| options/home-manager/services.muchsync.remotes.<name>.remote.muchsyncPath | Specifies the path to muchsync on the server
|
| options/nixos/services.dawarich.sidekiqProcesses.<name>.jobClasses | If not empty, which job classes should be executed by this process.
If left empty, all job classes will be executed by this process.
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/nixos/networking.sits.<name>.encapsulation.port | Destination port when using UDP encapsulation.
|
| options/nixos/networking.wireguard.interfaces.<name>.preSetup | Commands called at the start of the interface setup.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.virtualIps.*.brd | The broadcast address on the interface.
|
| options/home-manager/programs.thunderbird.profiles.<name>.settings | Preferences to add to this profile's
user.js.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.documentRoot | The path of Apache's document root directory
|
| options/nixos/services.davis.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.autorandr.profiles.<name>.hooks.predetect | Predetect hook executed before autorandr attempts to run xrandr.
|
| options/nixos/services.slskd.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.movim.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/home-manager/programs.autorandr.profiles.<name>.hooks.predetect | Predetect hook executed before autorandr attempts to run xrandr.
|
| options/nixos/users.extraUsers.<name>.openssh.authorizedPrincipals | A list of verbatim principal names that should be added to the user's
authorized principals.
|
| options/nixos/networking.wg-quick.interfaces.<name>.configFile | wg-quick .conf file, describing the interface
|
| options/nixos/services.wordpress.sites.<name>.database.tablePrefix | The $table_prefix is the value placed in the front of your database tables
|
| options/nixos/services.fluidd.nginx.serverName | Name of this virtual host
|
| options/nixos/services.akkoma.nginx.serverName | Name of this virtual host
|
| options/nixos/services.gancio.nginx.serverName | Name of this virtual host
|
| options/nixos/networking.vlans | This option allows you to define vlan devices that tag packets
on top of a physical interface
|
| options/nixos/services.matomo.nginx.serverName | Name of this virtual host
|
| options/nixos/services.monica.nginx.serverName | Name of this virtual host
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/darwin/security.sandbox.profiles.<name>.allowLocalNetworking | Whether to allow localhost network access inside the sandbox.
|
| options/nixos/services.snapper.configs.<name>.TIMELINE_LIMIT_QUARTERLY | Limits for timeline cleanup.
|
| options/nixos/services.borgbackup.jobs.<name>.compression | Compression method to use
|
| options/home-manager/programs.floorp.profiles.<name>.search.engines | Attribute set of search engine configurations
|
| options/nixos/services.mosquitto.bridges.<name>.addresses.*.address | Address of the remote MQTT broker.
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.keepWithin | Keep all archives within this time interval.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.timeRange.end | End of time range to show.
|
| options/nixos/programs.tsmClient.servers.<name>.tcpserveraddress | Host/domain name or IP address of the IBM TSM server.
|
| options/nixos/networking.interfaces.<name>.ipv4.routes | List of extra IPv4 static routes that will be assigned to the interface.
If the route type is the default unicast, then the scope
is set differently depending on the value of networking.useNetworkd:
the script-based backend sets it to link, while networkd sets
it to global.
If you want consistency between the two implementations,
set the scope of the route manually with
networking.interfaces.eth0.ipv4.routes = [{ options.scope = "global"; }]
for example.
|
| options/home-manager/programs.gemini-cli.commands.<name>.description | A brief, one-line description of what the command does
|
| options/nixos/services.vault-agent.instances.<name>.settings.template | Template section of vault-agent
|
| packages/nixpkgs/perlPackages.SubName | (Re)name a sub |
| options/nixos/services.wstunnel.servers.<name>.tlsCertificate | TLS certificate to use instead of the hardcoded one in case of HTTPS connections
|
| options/home-manager/services.git-sync.repositories.<name>.extraPackages | Extra packages available to git-sync.
|
| options/nixos/services.h2o.hosts.<name>.tls.recommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|
| options/nixos/services.anubis.instances.<name>.settings.BIND_NETWORK | The network family that Anubis should bind to
|
| options/nixos/services.snipe-it.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.gitlab-runner.services.<name>.dockerPrivileged | Give extended privileges to container.
|
| options/darwin/services.gitlab-runner.services.<name>.dockerPrivileged | Give extended privileges to container.
|
| options/home-manager/accounts.email.accounts.<name>.signature.showSignature | Method to communicate the signature.
|
| options/nixos/services.borgbackup.jobs.<name>.environment | Environment variables passed to the backup script
|
| options/nixos/services.bookstack.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.age | Delete a file when it reaches a certain age
|
| options/nixos/services.gitlab-runner.services.<name>.dockerAllowedServices | Whitelist allowed services.
|
| options/darwin/services.gitlab-runner.services.<name>.dockerAllowedServices | Whitelist allowed services.
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.extraConfig | Extra settings.
|
| options/nixos/services.anubis.instances.<name>.policy.useDefaultBotRules | Whether to include Anubis's default bot detection rules via the
(data)/meta/default-config.yaml import
|
| options/nixos/networking.interfaces.<name>.ipv4.routes.*.prefixLength | Subnet mask of the network, specified as the number of
bits in the prefix (24).
|
| options/nixos/networking.interfaces.<name>.ipv6.routes.*.prefixLength | Subnet mask of the network, specified as the number of
bits in the prefix (64).
|
| options/home-manager/programs.librewolf.profiles.<name>.containers | Attribute set of container configurations
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.jibri.xmppEnvironments.<name>.call.login.domain | The domain part of the JID for the recorder.
|
| options/nixos/services.radicle.ci.broker.settings.adapters.<name>.command | Adapter command to run.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.cssSnippets.*.enable | Whether to enable the snippet.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.cssSnippets.*.source | Path of the source file.
|
| options/home-manager/services.podman.containers.<name>.description | The description of the container.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/home-manager/programs.firefox.profiles.<name>.containersForce | Whether to force replace the existing containers configuration
|
| options/nixos/services.gitea-actions-runner.instances.<name>.hostPackages | List of packages, that are available to actions, when the runner is configured
with a host execution label.
|
| options/nixos/networking.vswitches.<name>.controllers | Specify the controller targets
|
| options/nixos/services.authelia.instances.<name>.settingsFiles | Here you can provide authelia with configuration files or directories
|
| options/nixos/systemd.network.networks.<name>.controlledDelayConfig | Each attribute in this set specifies an option in the
[ControlledDelay] section of the unit
|
| options/home-manager/programs.thunderbird.profiles.<name>.search.order | The order the search engines are listed in
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.timeRange | A time range to synchronize. start and end can be any Python
expression that returns a datetime.datetime
object.
|
| options/nixos/networking.wireguard.interfaces.<name>.postSetup | Commands called at the end of the interface setup.
|
| options/nixos/services.borgbackup.jobs.<name>.persistentTimer | Set the Persistent option for the
systemd.timer(5)
which triggers the backup immediately if the last trigger
was missed (e.g. if the system was powered down).
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.globalRedirect | If set, all requests for this host are redirected permanently to
the given URL.
|
| options/nixos/services.jibri.xmppEnvironments.<name>.usageTimeout | The duration that the Jibri session can be
|
| options/nixos/services.maddy.ensureCredentials.<name>.passwordFile | Specifies the path to a file containing the
clear text password for the user.
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.keepYearly | Number of yearly archives to keep
|
| options/home-manager/launchd.agents.<name>.config.inetdCompatibility | The presence of this key specifies that the daemon expects to be run as if it were launched from inetd.
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.keepHourly | Number of hourly archives to keep
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.keepWeekly | Number of weekly archives to keep
|
| options/nixos/networking.domain | The system domain name
|
| options/nixos/services.stargazer.certOrg | The name of the organization responsible for the X.509
certificate's /O name.
|
| options/nixos/services.xserver.cmt.models | Which models to enable cmt for
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.appearance | Settings to write to appearance.json.
|
| options/nixos/services.mautrix-meta.instances.<name>.registerToSynapse | Whether to add registration file to services.matrix-synapse.settings.app_service_config_files and
make Synapse wait for registration service.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.KeepAlive | This optional key is used to control whether your job is to be kept continuously running or to let
demand and conditions control the invocation
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.readPermissions | The read permissions to include for this token
|
| options/nixos/services.printing.cups-pdf.instances.<name>.settings.AnonDirName | path for anonymously created PDF files
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.itemTypes | Kinds of items to show
|
| options/nixos/networking.wireguard.interfaces.<name>.metric | Set the metric of routes related to this Wireguard interface.
|
| options/home-manager/services.xsuspender.rules.<name>.suspendSubtreePattern | Also suspend descendant processes that match this regex.
|
| options/home-manager/systemd.user.services.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.trackScripts | List of script names to invoke for health tracking.
|
| options/nixos/services.kanidm.provision.persons.<name>.mailAddresses | Mail addresses
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.replay_window | IPsec replay window to configure for this CHILD_SA
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.KeepAlive | This optional key is used to control whether your job is to be kept continuously running or to let
demand and conditions control the invocation
|
| options/nixos/services.armagetronad.servers.<name>.package | The armagetronad-dedicated package to use
|
| options/nixos/systemd.network.networks.<name>.stochasticFairBlueConfig | Each attribute in this set specifies an option in the
[StochasticFairBlue] section of the unit
|
| options/nixos/services.dependency-track.settings."alpine.oidc.username.claim" | Defines the name of the claim that contains the username in the provider's userinfo endpoint
|
| options/nixos/services.agorakit.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.librenms.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.kanboard.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.dolibarr.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.fediwall.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.mainsail.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.pixelfed.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.useVcard4 | Specifies whether vdirsyncer should request vCards in version 4.0
|
| options/nixos/services.authelia.instances.<name>.secrets.oidcHmacSecretFile | Path to your HMAC secret used to sign OIDC JWTs.
|
| options/nixos/services.frp.instances.<name>.environmentFiles | List of paths files that follows systemd environmentfile structure
|
| options/nixos/networking.interfaces.<name>.proxyARP | Turn on proxy_arp for this device
|
| options/nixos/services.nebula.networks.<name>.lighthouse.dns.host | IP address on which nebula lighthouse should serve DNS.
'localhost' is a good default to ensure the service does not listen on public interfaces;
use a Nebula address like 10.0.0.5 to make DNS resolution available to nebula hosts only.
|
| options/nixos/services.bepasty.servers.<name>.defaultPermissions | default permissions for all unauthenticated accesses.
|
| options/home-manager/services.podman.containers.<name>.environment | Environment variables to set in the container.
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.endpoint | Endpoint IP or hostname of the peer, followed by a colon,
and then a port number of the peer.
|
| options/home-manager/accounts.email.accounts.<name>.alot.contactCompletion | Contact completion configuration as expected per alot
|
| options/nixos/services.mastodon.sidekiqProcesses.<name>.jobClasses | If not empty, which job classes should be executed by this process. *Only one process should handle the 'scheduler' class
|
| options/darwin/launchd.agents.<name>.serviceConfig.QueueDirectories | Much like the WatchPaths option, this key will watch the paths for modifications
|
| options/nixos/virtualisation.fileSystems.<name>.label | Label of the device
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.authCert | Either a path to a certificate with a client certificate and
the key or a list of paths to the files with them.
|
| packages/nixpkgs/perl5Packages.SubName | (Re)name a sub |
| options/nixos/systemd.services.<name>.confinement.fullUnit | Whether to include the full closure of the systemd unit file into the
chroot, instead of just the dependencies for the executables.
While it may be tempting to just enable this option to
make things work quickly, please be aware that this might add paths
to the closure of the chroot that you didn't anticipate
|
| options/nixos/services.bookstack.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.netmask | Address or CIDR subnets
StrongSwan default: []
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.verify | Null or path to certificate to verify SSL against
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.enable | Whether to enable synchronization using vdirsyncer.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.tokenFile | A file path where access tokens are stored.
|
| options/nixos/services.bacula-sd.director.<name>.password | Specifies the password that must be supplied for the default Bacula
Console to be authorized
|
| options/nixos/services.bacula-fd.director.<name>.password | Specifies the password that must be supplied for the default Bacula
Console to be authorized
|
| options/home-manager/accounts.email.accounts.<name>.msmtp.tls.fingerprint | Fingerprint of a trusted TLS certificate
|
| options/darwin/launchd.daemons.<name>.serviceConfig.ProgramArguments | This key maps to the second argument of execvp(3)
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.writePermissions | The read permissions to include for this token
|
| options/nixos/services.spiped.config.<name>.disableReresolution | Disable target address re-resolution.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.urlCommand | A command that prints the URL of the storage.
|
| options/nixos/services.samba-wsdd.hostname | Override (NetBIOS) hostname to be used (default hostname).
|
| options/nixos/services.keepalived.vrrpInstances.<name>.virtualIps.*.addr | IP address, optionally with a netmask: IPADDR[/MASK]
|
| options/nixos/services.gancio.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.fluidd.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.akkoma.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.monica.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.matomo.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.nextcloud-spreed-signaling.backends.<name>.urls | List of URLs of the Nextcloud instance
|
| options/nixos/services.authelia.instances.<name>.secrets.manual | Configuring authelia's secret files via the secrets attribute set
is intended to be convenient and help catch cases where values are required
to run at all
|
| options/nixos/services.davis.hostname | Domain of the host to serve davis under
|
| options/nixos/services.syncthing.settings.folders.<name>.devices | The devices this folder should be shared with
|
| options/home-manager/services.syncthing.settings.folders.<name>.devices | The devices this folder should be shared with
|
| options/home-manager/programs.gnome-terminal.profile.<name>.deleteBinding | Which string the terminal should send to an application when the user
presses the Delete key.
auto
: Send the @7 control sequence.
ascii-backspace
: Send an ASCII backspace character (0x08).
ascii-delete
: Send an ASCII delete character (0x7F).
delete-sequence
: Send the @7 control sequence.
tty
: Send terminal's "erase" setting.
|
| options/nixos/services.wstunnel.servers.<name>.websocketPingInterval | Frequency at which the client will send websocket ping to the server.
|
| options/nixos/services.wstunnel.clients.<name>.websocketPingInterval | Frequency at which the client will send websocket ping to the server.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.userAgent | The user agent to report to the server
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rekey_bytes | Number of bytes processed before initiating CHILD_SA rekeying
|
| options/nixos/services.wstunnel.servers.<name>.settings.restrict-to | Restrictions on the connections that the server will accept
|
| options/nixos/services.snapserver.streams.<name>.location | For type pipe or file, the path to the pipe or file
|
| options/home-manager/launchd.agents.<name>.config.EnvironmentVariables | This optional key is used to specify additional environment variables to be set before running the
job.
|
| options/nixos/services.tarsnap.archives.<name>.checkpointBytes | Create a checkpoint every checkpointBytes
of uploaded data (optionally specified using an SI prefix).
1GB is the minimum value
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.ProgramArguments | This key maps to the second argument of execvp(3)
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.imageFile | Application image to display in the WebUI
|
| options/nixos/services.limesurvey.virtualHost.locations.<name>.alias | Alias directory for requests
|
| options/nixos/services.limesurvey.virtualHost.locations.<name>.index | Adds DirectoryIndex directive
|
| options/home-manager/accounts.calendar.accounts.<name>.remote.passwordCommand | A command that prints the password to standard output.
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.connection | Specifies parameters used to connect to the server, as a connection string
|
| options/nixos/services.firewalld.services.<name>.destination | Destinations for the service.
|
| options/nixos/services.firewalld.services.<name>.description | Description for the service.
|
| options/nixos/users.extraUsers.<name>.hashedPassword | Specifies the hashed password for the user
|
| options/nixos/services.hadoop.hdfs.namenode.extraFlags | Extra command line flags to pass to HDFS NameNode
|
| options/nixos/services.keepalived.vrrpInstances.<name>.priority | For electing MASTER, highest priority wins
|
| options/nixos/networking.wireless.networks.<name>.authProtocols | The list of authentication protocols accepted by this network
|
| options/nixos/services.roundcube.database.username | Username for the postgresql connection
|
| options/nixos/services.klipper.firmwares.<name>.enableKlipperFlash | Whether to enable flashings scripts for firmware
|
| options/nixos/services.github-runners.<name>.ephemeral | If enabled, causes the following behavior:
- Passes the
--ephemeral flag to the runner configuration script
- De-registers and stops the runner with GitHub after it has processed one job
- On stop, systemd wipes the runtime directory (this always happens, even without using the ephemeral option)
- Restarts the service after its successful exit
- On start, wipes the state directory and configures a new runner
You should only enable this option if tokenFile points to a file which contains a
personal access token (PAT)
|
| options/nixos/systemd.network.networks.<name>.hierarchyTokenBucketConfig | Each attribute in this set specifies an option in the
[HierarchyTokenBucket] section of the unit
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/nixos/services.bacula-sd.autochanger.<name>.changerCommand | The name-string specifies an external program to be called that will
automatically change volumes as required by Bacula
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.close_action | Action to perform after a CHILD_SA gets closed by the peer.
- The default of
none does not take any action,
trap installs a trap policy for the CHILD_SA.
start tries to re-create the CHILD_SA.
close_action does not provide any guarantee that the
CHILD_SA is kept alive
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.auth | Authentication to expect from remote
|
| options/nixos/virtualisation.oci-containers.containers.<name>.login.username | Username for login.
|
| options/nixos/services.jibri.xmppEnvironments.<name>.stripFromRoomDomain | The prefix to strip from the room's JID domain to derive the call URL.
|
| options/nixos/programs.nix-required-mounts.allowedPatterns.<name>.onFeatures | Which requiredSystemFeatures should trigger relaxation of the sandbox
|
| options/nixos/services.zabbixWeb.hostname | Hostname for either nginx or httpd.
|
| options/home-manager/programs.vscode.profiles.<name>.enableExtensionUpdateCheck | Whether to enable update notifications for extensions
|
| options/nixos/services.nginx.virtualHosts.<name>.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| options/nixos/services.mediawiki.httpd.virtualHost.locations.<name>.index | Adds DirectoryIndex directive
|
| options/nixos/services.mediawiki.httpd.virtualHost.locations.<name>.alias | Alias directory for requests
|
| options/nixos/services.zeronsd.servedNetworks.<name>.settings.wildcard | Whether to serve a wildcard record for ZeroTier Nodes.
|
| options/nixos/virtualisation.interfaces.<name>.vlan | VLAN to which the network interface is connected.
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/home-manager/accounts.contact.accounts.<name>.thunderbird.token | A token is generated when adding an address book manually to Thunderbird, this can be entered here.
|
| options/nixos/boot.binfmt.registrations.<name>.preserveArgvZero | Whether to pass the original argv[0] to the interpreter
|
| options/nixos/virtualisation.fileSystems.<name>.mountPoint | Location where the file system will be mounted
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.postHook | Command to call for each item creation and modification
|
| options/nixos/networking.bonds | This option allows you to define bond devices that aggregate multiple,
underlying networking interfaces together
|
| options/nixos/services.keepalived.vrrpInstances.<name>.virtualIps.*.scope | The scope of the area where this address is valid.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.timeRange.start | Start of time range to show.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.set_mark_in | Netfilter mark applied to packets after the inbound IPsec SA processed
them
|
| options/nixos/services.fedimintd.<name>.nginx.config.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/hardware.nvidia-container-toolkit.device-name-strategy | Specify the strategy for generating device names,
passed to nvidia-ctk cdi generate
|
| options/home-manager/programs.firefox.profiles.<name>.search.engines | Attribute set of search engine configurations
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.enable | Whether to enable this radicle-native-ci instance.
|
| options/nixos/specialisation.<name>.inheritParentConfig | Include the entire system's configuration
|
| options/nixos/services.fedimintd.<name>.nginx.config.sslCertificate | Path to server SSL certificate.
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.enable | Whether to enable this angrr policy.
|
| options/nixos/boot.binfmt.registrations.<name>.magicOrExtension | The magic number or extension to match on.
|
| options/nixos/systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.type | The type of operation to perform on the file
|
| options/nixos/services.znc.confOptions.networks.<name>.hasBitlbeeControlChannel | Whether to add the special Bitlbee operations channel.
|
| options/home-manager/programs.librewolf.profiles.<name>.search.privateDefault | The default search engine used in the Private Browsing.
|
| options/nixos/services.autorandr.profiles.<name>.hooks.postswitch | Postswitch hook executed after mode switch.
|
| options/home-manager/programs.librewolf.profiles.<name>.bookmarks.configFile | Configuration file to define custom bookmarks.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.timeRange.end | End of time range to show.
|
| options/home-manager/programs.autorandr.profiles.<name>.hooks.postswitch | Postswitch hook executed after mode switch.
|
| options/nixos/programs.tsmClient.defaultServername | If multiple server stanzas are declared with
programs.tsmClient.servers,
this option may be used to name a default
server stanza that IBM TSM uses in the absence of
a user-defined dsm.opt file
|
| options/nixos/systemd.network.networks.<name>.trivialLinkEqualizerConfig | Each attribute in this set specifies an option in the
[TrivialLinkEqualizer] section of the unit
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.keepMonthly | Number of monthly archives to keep
|
| options/nixos/services.tor.relay.onionServices.<name>.authorizeClient.authType | Either "basic" for a general-purpose authorization protocol
or "stealth" for a less scalable protocol
that also hides service activity from unauthorized clients.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.consul-template.instances.<name>.settings | Free-form settings written directly to the config.json file
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.period | Retention period for the GC roots matched by this policy.
|
| options/nixos/services.dovecot2.mailboxes.<name>.autoexpunge | To automatically remove all email from the mailbox which is older than the
specified time.
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.path-regex | Regex pattern to match the GC root path.
|
| options/home-manager/accounts.contact.accounts.<name>.thunderbird.enable | Whether to enable the Thunderbird mail client for this account.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.per_cpu_sas | Enable per-CPU CHILD_SAs
|
| options/nixos/services.postfix.masterConfig.<name>.wakeupUnusedComponent | If set to false the component will only be woken
up if it is used
|
| options/nixos/services.keepalived.vrrpInstances.<name>.unicastSrcIp | Default IP for binding vrrpd is the primary IP on interface
|
| options/nixos/virtualisation.allInterfaces.<name>.vlan | VLAN to which the network interface is connected.
|
| options/nixos/services.angrr.settings.profile-policies.<name>.keep-booted-system | Whether to keep the last booted system generation
|
| options/home-manager/programs.irssi.networks.<name>.server.ssl.certificateFile | Path to a file containing the certificate used for
client authentication to the server.
|
| options/nixos/services.beesd.filesystems.<name>.hashTableSizeMB | Hash table size in MB; must be a multiple of 16
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.vmalert.instances.<name>.settings."notifier.url" | Prometheus Alertmanager URL
|
| options/home-manager/launchd.agents.<name>.config.Disabled | This optional key is used as a hint to launchctl(1) that it should not submit this job to launchd when
loading a job or jobs
|
| options/nixos/networking.interfaces.<name>.ipv4.routes.*.options | Other route options
|
| options/nixos/networking.interfaces.<name>.ipv6.routes.*.options | Other route options
|
| options/home-manager/accounts.calendar.accounts.<name>.thunderbird.color | Display color of the calendar in hex
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.timeRange | A time range to synchronize. start and end can be any Python
expression that returns a datetime.datetime
object.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.cache_dir | The cache directory in which to store mail files while they are being
downloaded
|
| options/nixos/services.system76-scheduler.assignments.<name>.nice | Niceness.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.influxdb2.provision.users.<name>.passwordFile | Password for the user
|
| options/nixos/virtualisation.fileSystems.<name>.autoFormat | If the device does not currently contain a filesystem (as
determined by blkid), then automatically
format it with the filesystem type specified in
fsType
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags.phishing | Tag for notmuch to use for the IANA $Phishing keyword
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_log_config | The file for log configuration
|
| options/nixos/services.jitsi-videobridge.xmppConfigs.<name>.passwordFile | File containing the password for the user.
|
| options/nixos/networking.firewall.interfaces.<name>.allowedUDPPorts | List of open UDP ports.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.interface | Interface for inside_network, bound by vrrp.
|
| options/nixos/services.archisteamfarm.bots.<name>.enabled | Whether to enable the bot on startup.
|
| options/home-manager/accounts.calendar.accounts.<name>.thunderbird.readOnly | Mark calendar as read only
|
| options/nixos/programs.schroot.profiles.<name>.nssdatabases | System databases (as described in /etc/nsswitch.conf on GNU/Linux systems) to copy into the chroot from the host.
|
| options/home-manager/launchd.agents.<name>.config.EnableTransactions | This flag instructs launchd that the job promises to use vproc_transaction_begin(3) and
vproc_transaction_end(3) to track outstanding transactions that need to be reconciled before the
process can safely terminate
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets | This optional key is used to specify launch on demand sockets that can be used to let launchd know when
to run the job
|
| options/home-manager/accounts.calendar.accounts.<name>.primaryCollection | The primary collection of the account
|
| options/darwin/launchd.agents.<name>.serviceConfig.ThrottleInterval | This key lets one override the default throttling policy imposed on jobs by launchd
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ppk.<name>.id | PPK identity the PPK belongs to
|
| options/darwin/launchd.daemons.<name>.serviceConfig.QueueDirectories | Much like the WatchPaths option, this key will watch the paths for modifications
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.itemTypes | Kinds of items to show
|
| options/nixos/services.fedimintd.<name>.nginx.config.sslCertificateKey | Path to server SSL certificate key.
|
| options/home-manager/services.podman.containers.<name>.environmentFile | Paths to files containing container environment variables.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.corePlugins.*.settings | Plugin settings to include.
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.filter | External filter program to further filter GC roots matched by this policy.
|
| options/nixos/services.tailscale.serve.services.<name>.advertised | Whether the service should accept new connections
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.force | Whether to override all previous firefox settings
|
| options/home-manager/programs.thunderbird.profiles.<name>.search.default | The default search engine used in the address bar and search
bar.
|
| options/home-manager/programs.thunderbird.profiles.<name>.search.force | Whether to force replace the existing search
configuration
|
| options/nixos/services.borgbackup.repos.<name>.authorizedKeys | Public SSH keys that are given full write access to this repository
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.printing.cups-pdf.instances.<name>.settings.GhostScript | location of GhostScript binary
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.useVcard4 | Specifies whether vdirsyncer should request vCards in version 4.0
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.eap.<name>.id | Identity the EAP/XAuth secret belongs to
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.QueueDirectories | Much like the WatchPaths option, this key will watch the paths for modifications
|
| options/home-manager/services.xsuspender.rules.<name>.downclockOnBattery | Limit CPU consumption for this factor when on battery power
|
| options/nixos/services.k3s.autoDeployCharts.<name>.extraFieldDefinitions | Extra HelmChart field definitions that are merged with the rest of the HelmChart
custom resource
|
| options/nixos/services.printing.cups-pdf.instances.<name>.settings | Settings for a cups-pdf instance, see the descriptions in the template config file in the cups-pdf package
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.limesurvey.virtualHost.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/nixos/services.jibri.xmppEnvironments.<name>.control.muc.domain | The domain part of the MUC to connect to for control.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.token.<name>.slot | Optional slot number to access the token.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.metadata | Metadata keys that should be synchronized when vdirsyncer
metasync is executed.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.basicSecretFile | The basic secret to use for this service
|
| options/home-manager/programs.anki.sync.usernameFile | Path to a file containing the sync account username.
|
| options/nixos/services.system76-scheduler.assignments.<name>.prio | CPU scheduler priority.
|
| options/nixos/services.zeronsd.servedNetworks.<name>.settings.log_level | Log Level.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.foregroundColor | The foreground color.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.backgroundColor | The background color.
|
| options/home-manager/programs.hexchat.channels.<name>.options.autoconnect | Autoconnect to network.
|
| options/nixos/networking.firewall.interfaces.<name>.allowedTCPPorts | List of TCP ports on which incoming connections are
accepted.
|
| options/nixos/networking.openconnect.interfaces.<name>.user | Username to authenticate with.
|
| options/home-manager/programs.opencode.agents | Custom agents for opencode
|
| options/nixos/users.extraUsers.<name>.password | Specifies the (clear text) password for the user
|
| options/nixos/services.hostapd.radios.<name>.wifi5.capabilities | VHT (Very High Throughput) capabilities given as a list of flags
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ike.<name>.id | IKE identity the IKE preshared secret belongs to
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.endpoint | Endpoint IP or hostname of the peer, followed by a colon,
and then a port number of the peer
|
| options/nixos/networking.supplicant.<name>.userControlled.group | Members of this group can control wpa_supplicant.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.urlCommand | A command that prints the URL of the storage.
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.caPool | Path to the certificate authority (CA) for the certificate of your origin
|
| options/nixos/systemd.network.networks.<name>.dhcpPrefixDelegationConfig | Each attribute in this set specifies an option in the
[DHCPPrefixDelegation] section of the unit
|
| options/nixos/services.nextcloud.notify_push.dbname | Database name.
|
| options/nixos/services.bookstack.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.settings | Attribute set of options for each extension
|
| options/nixos/services.armagetronad.servers.<name>.openFirewall | Set to true to open the configured UDP port for Armagetron Advanced.
|
| options/nixos/services.kmonad.keyboards.<name>.defcfg.fallthrough | Whether to enable re-emitting unhandled key events.
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.package | The radicle-native-ci package to use.
|
| options/nixos/services.mediawiki.httpd.virtualHost.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/nixos/virtualisation.fileSystems.<name>.autoResize | If set, the filesystem is grown to its maximum size before
being mounted. (This is typically the size of the containing
partition.) This is currently only supported for ext2/3/4
filesystems that are mounted during early boot.
|
| options/nixos/services.rke2.autoDeployCharts.<name>.extraFieldDefinitions | Extra HelmChart field definitions that are merged with the rest of the HelmChart
custom resource
|
| options/nixos/services.pantalaimon-headless.instances.<name>.ssl | Whether or not SSL verification should be enabled for outgoing
connections to the homeserver.
|
| options/nixos/services.bonsaid.settings.*.event_name | Name of the event which should trigger this transition when received by bonsaid
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ntlm.<name>.id | Identity the NTLM secret belongs to
|
| options/nixos/networking.vswitches.<name>.supportedOpenFlowVersions | Supported versions to enable on this switch.
|
| options/nixos/services.firewalld.services.<name>.destination.ipv4 | IPv4 destination.
|
| options/nixos/services.firewalld.services.<name>.destination.ipv6 | IPv6 destination.
|
| options/nixos/services.system76-scheduler.assignments.<name>.ioPrio | IO scheduler priority.
|
| options/nixos/services.plausible.database.postgres.dbname | Name of the database to use.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.set_mark_out | Netfilter mark applied to packets after the outbound IPsec SA processed
them
|
| options/nixos/networking.wireguard.interfaces.<name>.mtu | Set the maximum transmission unit in bytes for the wireguard
interface
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.communityPlugins | Community plugins to install and activate.
|
| options/nixos/services.icecream.daemon.netName | Network name to connect to
|
| options/nixos/boot.loader.systemd-boot.extraFiles | A set of files to be copied to $BOOT
|
| options/nixos/systemd.generators | Definition of systemd generators; see systemd.generator(5)
|
| options/nixos/users.mysql.pam.logging.rHostColumn | The name of the column in the log table to which the name of the remote
host that initiates the session is stored
|
| options/nixos/services.neo4j.ssl.policies.<name>.allowKeyGeneration | Allows the generation of a private key and associated self-signed
certificate
|
| options/nixos/services.tor.relay.onionServices.<name>.authorizedClients | Authorized clients for a v3 onion service,
as a list of public key, in the format:
descriptor:x25519:<base32-public-key>
See torrc manual.
|
| options/nixos/services.simplesamlphp.<name>.configureNginx | Configure nginx as a reverse proxy for SimpleSAMLphp.
|
| options/nixos/services.authelia.instances.<name>.settings.server.address | The address to listen on.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags.lowercase | If true, translate all mailboxes to lowercase names when mapping to notmuch
tags.
|
| options/nixos/programs.ssh.knownHosts | The set of system-wide known SSH hosts
|
| options/darwin/programs.ssh.knownHosts | The set of system-wide known SSH hosts
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.rsa.<name>.secret | Value of decryption passphrase for RSA key.
|
| options/home-manager/programs.librewolf.profiles.<name>.bookmarks.settings | Custom bookmarks.
|
| options/nixos/networking.ipips.<name>.encapsulation.limit | For an IPv6-based tunnel, the maximum number of nested
encapsulation to allow. 0 means no nesting, "none" unlimited.
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.publicKey | The base64 public key of the peer.
|
| options/nixos/services.sabnzbd.settings.servers.<name>.connections | Number of parallel connections permitted by
the server.
|
| options/nixos/services.mpdscribble.endpoints.<name>.passwordFile | File containing the password, either as MD5SUM or cleartext.
|
| options/home-manager/services.mpdscribble.endpoints.<name>.passwordFile | File containing the password, either as MD5SUM or cleartext.
|
| options/home-manager/programs.thunderbird.profiles.<name>.withExternalGnupg | Allow using external GPG keys with GPGME.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.timeRange.start | Start of time range to show.
|
| options/home-manager/programs.thunderbird.profiles.<name>.feedAccounts | Attribute set of feed accounts
|
| options/nixos/services.borgbackup.jobs.<name>.encryption.passCommand | A command which prints the passphrase to stdout
|
| options/nixos/services.angrr.settings.profile-policies.<name>.keep-current-system | Whether to keep the current system generation
|
| options/nixos/services.authelia.instances.<name>.secrets.sessionSecretFile | Path to your session secret
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.index | Adds index directive.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.wstunnel.clients.<name>.tlsVerifyCertificate | Whether to verify the TLS certificate of the server
|
| options/nixos/systemd.network.networks.<name>.hierarchyTokenBucketClassConfig | Each attribute in this set specifies an option in the
[HierarchyTokenBucketClass] section of the unit
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.printing.cups-pdf.instances.<name>.installPrinter | Whether to enable a CUPS printer queue for this instance
|
| options/nixos/networking.interfaces.<name>.tempAddress | When IPv6 is enabled with SLAAC, this option controls the use of
temporary address (aka privacy extensions) on this
interface
|
| options/home-manager/programs.borgmatic.backups.<name>.consistency.checks | Consistency checks to run
|
| options/nixos/virtualisation.oci-containers.containers.<name>.serviceName | Systemd service name that manages the container
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.extraArgs | A list of extra arguments to pass to the pg_receivewal command.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.start_action | Action to perform after loading the configuration.
- The default of
none loads the connection only, which
then can be manually initiated or used as a responder configuration.
- The value
trap installs a trap policy, which triggers
the tunnel as soon as matching traffic has been detected.
- The value
start initiates the connection actively.
- Since version 5.9.6 two modes above can be combined with
trap|start,
to immediately initiate a connection for which trap policies have been installed
|
| options/nixos/services.armagetronad.servers.<name>.settings | Armagetron Advanced server rules configuration
|
| options/darwin/launchd.agents.<name>.serviceConfig.LowPriorityBackgroundIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O when the process is throttled with the Darwin-background classification.
|
| options/nixos/services.system76-scheduler.assignments.<name>.class | CPU scheduler class.
|
| options/nixos/services.tailscale.serve.services.<name>.endpoints | Map of incoming traffic patterns to local targets
|
| options/nixos/services.gitlab.smtp.username | Username of the SMTP server for GitLab.
|
| options/nixos/services.ytdl-sub.instances.<name>.subscriptions | Subscriptions for ytdl-sub
|
| options/nixos/users.mysql.pam.table | The name of table that maps unique login names to the passwords.
|
| options/nixos/security.pam.services | This option defines the PAM services
|
| options/nixos/services.pcscd.extendReaderNames | String to append to every reader name
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.communityPlugins.*.pkg | The plugin package.
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.initialPrompt | Optional text to provide as a prompt for the first window
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.partialSync | What should happen if synchronization in one direction
is impossible due to one storage being read-only
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.keepSecondly | Number of secondly archives to keep
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.keepMinutely | Number of minutely archives to keep
|
| options/nixos/services.sabnzbd.settings.servers.<name>.ssl_verify | Level of TLS verification
|
| options/nixos/services.syncthing.settings.devices.<name>.autoAcceptFolders | Automatically create or share folders that this device advertises at the default path
|
| options/home-manager/services.syncthing.settings.devices.<name>.autoAcceptFolders | Automatically create or share folders that this device advertises at the default path
|
| options/home-manager/programs.borgmatic.backups.<name>.location.patterns | Patterns to include/exclude
|
| options/nixos/services.wstunnel.clients.<name>.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.wstunnel.servers.<name>.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/networking.wireguard.interfaces.<name>.fwMark | Mark all wireguard packets originating from
this interface with the given firewall mark
|
| options/darwin/networking.localHostName | The local hostname, or local network name, is displayed beneath the computer's name at the
top of the Sharing preferences pane
|
| options/nixos/services.limesurvey.httpd.virtualHost.locations.<name>.index | Adds DirectoryIndex directive
|
| options/nixos/services.limesurvey.httpd.virtualHost.locations.<name>.alias | Alias directory for requests
|
| options/home-manager/accounts.calendar.accounts.<name>.thunderbird.enable | Whether to enable the Thunderbird mail client for this account.
|
| options/nixos/services.prometheus.scrapeConfigs.*.job_name | The job name assigned to scraped metrics by default.
|
| options/nixos/services.system76-scheduler.assignments.<name>.ioClass | IO scheduler class.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.ThrottleInterval | This key lets one override the default throttling policy imposed on jobs by launchd
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.passwordFile | Specifies the path to a file containing the
clear text password for the MQTT user
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.allowedIPs | List of IP (v4 or v6) addresses with CIDR masks from
which this peer is allowed to send incoming traffic and to which
outgoing traffic for this peer is directed
|
| options/nixos/services.matomo.hostname | URL of the host, without https prefix
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.token.<name>.pin | Optional PIN required to access the key on the token
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets | This optional key is used to specify launch on demand sockets that can be used to let launchd know when
to run the job
|
| options/nixos/virtualisation.fileSystems.<name>.stratis.poolUuid | UUID of the stratis pool that the fs is located in
This is only relevant if you are using stratis.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.hostapd.radios.<name>.wifi4.capabilities | HT (High Throughput) capabilities given as a list of flags
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.xauth.<name>.id | Identity the EAP/XAuth secret belongs to
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.ThrottleInterval | This key lets one override the default throttling policy imposed on jobs by launchd
|
| options/nixos/networking.wireguard.interfaces.<name>.preShutdown | Commands called before shutting down the interface.
|
| options/nixos/services.archisteamfarm.bots.<name>.settings | Additional settings that are documented here.
|
| options/nixos/networking.interfaces.<name>.ipv4.addresses.*.address | IPv4 address of the interface
|
| options/nixos/networking.interfaces.<name>.ipv6.addresses.*.address | IPv6 address of the interface
|
| options/nixos/boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.mode | The file access mode to use when creating this file or directory.
|
| options/nixos/networking.wireguard.interfaces.<name>.table | The kernel routing table to add this interface's
associated routes to
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets | This optional key is used to specify launch on demand sockets that can be used to let launchd know when
to run the job
|
| options/nixos/services.keepalived.vrrpInstances.<name>.virtualRouterId | Arbitrary unique number 1..255
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.profiles | List of Thunderbird profiles for which this account should be
enabled
|
| options/nixos/services.fedimintd.<name>.nginx.config.listen.*.extraParameters | Extra parameters of this listen directive.
|
| options/nixos/networking.wireguard.interfaces.<name>.privateKeyFile | Private key file as generated by wg genkey.
|
| options/nixos/services.jibri.xmppEnvironments.<name>.control.login.domain | The domain part of the JID for this Jibri instance.
|
| options/home-manager/accounts.contact.accounts.<name>.pimsync.extraPairDirectives | Extra directives that should be added under this accounts pair directive
|
| options/nixos/services.postfixadmin.database.dbname | Name of the postgresql database
|
| options/home-manager/services.podman.containers.<name>.addCapabilities | The capabilities to add to the container.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.dependsOn | Define which other containers this one depends on
|
| options/nixos/networking.sits.<name>.encapsulation.sourcePort | Source port when using UDP encapsulation
|
| options/nixos/system.nixos.codeName | The NixOS release code name (e.g. Emu).
|
| options/nixos/services.dolibarr.h2o.serverName | Server name to be used for this virtual host
|
| options/nixos/services.slurm.partitionName | Name by which the partition may be referenced
|
| options/home-manager/programs.docker-cli.contexts | Attribute set of Docker context configurations
|
| options/home-manager/accounts.email.accounts.<name>.offlineimap.postSyncHookCommand | Command to run after fetching new mails.
|
| options/nixos/services.i2pd.proto.http.hostname | Expected hostname for WebUI.
|
| options/home-manager/accounts.email.accounts.<name>.offlineimap.extraConfig.local | Extra configuration options to add to the local account
section.
|
| options/home-manager/programs.librewolf.profiles.<name>.containersForce | Whether to force replace the existing containers configuration
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.settings | Attribute set of options for each extension
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.settings | Extra settings to add to this Thunderbird account configuration
|
| options/nixos/services.fediwall.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.agorakit.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.librenms.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.kanboard.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.mainsail.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.originLanding | When redirecting from the Kanidm Apps Listing page, some linked applications may need to land on a specific page to trigger oauth2/oidc interactions.
|
| options/nixos/services.biboumi.settings.realname_from_jid | Whether the realname and username of each biboumi
user will be extracted from their JID
|
| options/nixos/networking.supplicant.<name>.userControlled.socketDir | Directory of sockets for controlling wpa_supplicant.
|
| options/nixos/services.pantalaimon-headless.instances.<name>.logLevel | Set the log level of the daemon.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.cursor.background | The background color.
|
| options/home-manager/programs.obsidian.defaultSettings.hotkeys.<name>.*.modifiers | The hotkey modifiers.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.cursor.foreground | The foreground color.
|
| options/nixos/services.hostapd.radios.<name>.wifi6.operatingChannelWidth | Determines the operating channel width for HE.
- "20or40": 20 or 40 MHz operating channel width
- "80": 80 MHz channel width
- "160": 160 MHz channel width
- "80+80": 80+80 MHz channel width
|
| options/nixos/services.cloudflared.tunnels.<name>.warp-routing.enabled | Enable warp routing
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.metadata | Metadata keys that should be synchronized when vdirsyncer
metasync is executed.
|
| options/darwin/networking.wg-quick.interfaces.<name>.peers.*.presharedKeyFile | Optional, path to file containing the pre-shared key for this peer.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rekey_packets | Number of packets processed before initiating CHILD_SA rekeying
|
| options/nixos/services.limesurvey.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.pantalaimon-headless.instances.<name>.dataPath | The directory where pantalaimon should store its state such as the database file.
|
| options/nixos/services.anubis.instances.<name>.settings.DIFFICULTY | The difficulty required for clients to solve the challenge
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.hostapd.radios.<name>.wifi5.operatingChannelWidth | Determines the operating channel width for VHT.
- "20or40": 20 or 40 MHz operating channel width
- "80": 80 MHz channel width
- "160": 160 MHz channel width
- "80+80": 80+80 MHz channel width
|
| options/nixos/services.hostapd.radios.<name>.wifi7.operatingChannelWidth | Determines the operating channel width for EHT.
- "20or40": 20 or 40 MHz operating channel width
- "80": 80 MHz channel width
- "160": 160 MHz channel width
- "80+80": 80+80 MHz channel width
|
| options/home-manager/programs.floorp.profiles.<name>.search.meta.maintainers | List of maintainers of each module
|
| options/nixos/networking.wireguard.interfaces.<name>.postShutdown | Commands called after shutting down the interface.
|
| options/nixos/networking.firewall.interfaces.<name>.allowedUDPPortRanges | Range of open UDP ports.
|
| options/nixos/networking.fqdn | The fully qualified domain name (FQDN) of this host
|
| options/nixos/services.taskserver.fqdn | The fully qualified domain name of this server, which is also used
as the common name in the certificates.
|
| options/darwin/networking.fqdn | The fully qualified domain name (FQDN) of this host
|
| options/nixos/services.mediawiki.httpd.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ecdsa.<name>.secret | Value of decryption passphrase for ECDSA key.
|
| options/home-manager/services.activitywatch.watchers.<name>.package | The activitywatch package to use
|
| options/home-manager/wayland.windowManager.sway.config.bindswitches.<name>.action | The sway command to execute on state changes
|
| options/home-manager/services.podman.containers.<name>.dropCapabilities | The capabilities to drop from the container.
|
| options/nixos/services.tarsnap.archives | Tarsnap archive configurations
|
| options/nixos/services.firefox-syncserver.singleNode.hostname | Host name to use for this service.
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.tcpKeepAlive | The timeout after which a TCP keepalive packet is sent on a connection between Tunnel and the origin server.
|
| options/nixos/services.printing.cups-pdf.instances.<name>.settings.Anonuser | User for anonymous PDF creation
|
| options/nixos/services.jibri.xmppEnvironments.<name>.call.login.passwordFile | File containing the password for the user.
|
| options/nixos/services.tor.relay.onionServices.<name>.settings.HiddenServiceSingleHopMode | See torrc manual.
|
| options/nixos/services.prometheus.exporters.mail.configuration.servers.*.name | Value for label 'configname' which will be added to all metrics.
|
| options/nixos/networking.wg-quick.interfaces.<name>.generatePrivateKeyFile | Automatically generate a private key with
wg genkey, at the privateKeyFile location.
|
| options/nixos/services.easytier.instances.<name>.environmentFiles | Environment files for this instance
|
| options/nixos/services.consul-template.instances.<name>.settings.pid_file | Path to use for the pid file.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.enableLegacyCrypto | Enable legacy crypto on this client
|
| options/nixos/systemd.network.networks.<name>.deficitRoundRobinSchedulerConfig | Each attribute in this set specifies an option in the
[DeficitRoundRobinScheduler] section of the unit
|
| options/nixos/services.keepalived.vrrpInstances.<name>.noPreempt | VRRP will normally preempt a lower priority machine when a higher
priority machine comes online. "nopreempt" allows the lower priority
machine to maintain the master role, even when a higher priority machine
comes back online
|
| options/nixos/services.angrr.settings.profile-policies.<name>.profile-paths | Paths to the Nix profile
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs8.<name>.secret | Value of decryption passphrase for PKCS#8 key.
|
| options/nixos/virtualisation.interfaces.<name>.assignIP | Automatically assign an IP address to the network interface using the same scheme as
virtualisation.vlans.
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.filters.*.name | Name of the filter
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| options/nixos/services.gitlab-runner.services.<name>.requestConcurrency | Limit number of concurrent requests for new jobs from GitLab.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/darwin/services.gitlab-runner.services.<name>.requestConcurrency | Limit number of concurrent requests for new jobs from GitLab.
|
| options/darwin/launchd.agents.<name>.serviceConfig.ProcessType | This optional key describes, at a high level, the intended purpose of the job
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LowPriorityBackgroundIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O when the process is throttled with the Darwin-background classification.
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.settings | Configuration of radicle-native-ci
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.clientIdCommand | A command that prints the OAuth credentials to standard
output
|
| options/nixos/boot.loader.systemd-boot.windows.<name>.efiDeviceHandle | The device handle of the EFI System Partition (ESP) where the Windows bootloader is
located
|
| options/nixos/networking.firewall.interfaces.<name>.allowedTCPPortRanges | A range of TCP ports on which incoming connections are
accepted.
|
| options/nixos/services.tor.relay.onionServices.<name>.settings.HiddenServiceMaxStreams | See torrc manual.
|
| options/nixos/services.vmalert.instances.<name>.settings."datasource.url" | Datasource compatible with Prometheus HTTP API.
|
| options/home-manager/systemd.user.automounts.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/nixos/services.evremap.settings.device_name | The name of the device that should be remapped
|
| options/nixos/services.authelia.instances.<name>.secrets.oidcIssuerPrivateKeyFile | Path to your private key file used to encrypt OIDC JWTs.
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.woodpecker-agents.agents.<name>.environment | woodpecker-agent config environment variables, for other options read the documentation
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| options/nixos/services.limesurvey.httpd.virtualHost.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/darwin/launchd.agents.<name>.serviceConfig.inetdCompatibility | The presence of this key specifies that the daemon expects to be run as if it were launched from inetd.
|
| options/darwin/networking.fqdnOrHostName | Either the fully qualified domain name (FQDN), or just the host name if
it does not exists
|
| options/nixos/boot.zfs.devNodes | Name of directory from which to import ZFS device, this is passed to zpool import
as the value of the -d option
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LowPriorityBackgroundIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O when the process is throttled with the Darwin-background classification.
|
| options/nixos/services.hddfancontrol.settings.<drive-bay-name>.extraArgs | Extra commandline arguments for hddfancontrol
|
| options/home-manager/programs.hexchat.channels.<name>.options.connectToSelectedServerOnly | Connect to selected server only.
|
| options/nixos/networking.wireguard.interfaces.<name>.extraOptions | Extra options to append to the interface section
|
| options/nixos/services.postfix.hostname | Hostname to use
|
| options/darwin/services.buildkite-agents.<name>.hooks.environment | The environment hook will run before all other commands, and can be used
to set up secrets, data, etc
|
| options/nixos/services.anubis.instances.<name>.settings.WEBMASTER_EMAIL | If set, shows a contact email address when rendering error pages
|
| options/home-manager/programs.borgmatic.backups.<name>.consistency.extraConfig | Extra settings.
|
| options/nixos/services.paretosecurity.users.<name>.inviteId | A unique ID that links the agent to Pareto Cloud
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.hashedPassword | Specifies the hashed password for the MQTT User
|
| options/nixos/networking.wireless.networks.<name>.priority | By default, all networks will get same priority group (0)
|
| options/nixos/services.anubis.instances.<name>.settings.METRICS_BIND_NETWORK | The network family that the metrics server should bind to
|
| options/home-manager/accounts.email.accounts.<name>.offlineimap.extraConfig.remote | Extra configuration options to add to the remote account
section.
|
| options/home-manager/launchd.agents.<name>.config.StartCalendarInterval | This optional key causes the job to be started every calendar interval as specified
|
| options/nixos/networking.wireguard.interfaces.<name>.privateKey | Base64 private key generated by wg genkey
|
| options/nixos/services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.filters.*.name | See this list
for the available filters.
|
| options/nixos/networking.openconnect.interfaces.<name>.autoStart | Whether this VPN connection should be started automatically.
|
| options/nixos/services.mautrix-meta.instances.<name>.registrationFile | Path to the yaml registration file of the appservice.
|
| options/home-manager/accounts.email.accounts.<name>.smtp.tls.certificatesFile | Path to file containing certificate authorities that should
be used to validate the connection authenticity
|
| options/home-manager/accounts.email.accounts.<name>.imap.tls.certificatesFile | Path to file containing certificate authorities that should
be used to validate the connection authenticity
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.noTLSVerify | Disables TLS verification of the certificate presented by your origin
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.partialSync | What should happen if synchronization in one direction
is impossible due to one storage being read-only
|
| options/nixos/virtualisation.allInterfaces.<name>.assignIP | Automatically assign an IP address to the network interface using the same scheme as
virtualisation.vlans.
|
| options/home-manager/programs.librewolf.profiles.<name>.search.engines | Attribute set of search engine configurations
|
| options/nixos/virtualisation.fileSystems.<name>.encrypted.blkDev | Location of the backing encrypted device.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.token.<name>.handle | Hex-encoded CKA_ID or handle of the private key on the token or TPM,
respectively.
|
| options/home-manager/accounts.email.accounts.<name>.getmail.destinationCommand | Specify a command delivering the incoming mail to your maildir.
|
| options/nixos/networking.interfaces.<name>.ipv4.addresses.*.prefixLength | Subnet mask of the interface, specified as the number of
bits in the prefix (24).
|
| options/nixos/networking.interfaces.<name>.ipv6.addresses.*.prefixLength | Subnet mask of the interface, specified as the number of
bits in the prefix (64).
|
| options/nixos/services.frigate.hostname | Hostname of the nginx vhost to configure
|
| options/nixos/services.outline.smtp.username | Username to authenticate with.
|
| options/nixos/services.consul-template.instances.<name>.settings.template | Template section of consul-template
|
| options/nixos/services.taskserver.organisations.<name>.users | A list of user names that belong to the organization.
|
| options/nixos/services.agorakit.nginx.serverName | Name of this virtual host
|
| options/nixos/services.dolibarr.nginx.serverName | Name of this virtual host
|
| options/nixos/services.librenms.nginx.serverName | Name of this virtual host
|
| options/nixos/networking.fqdnOrHostName | Either the fully qualified domain name (FQDN), or just the host name if
it does not exist
|
| options/nixos/networking.bridges | This option allows you to define Ethernet bridge devices
that connect physical networks together
|
| options/nixos/services.kanboard.nginx.serverName | Name of this virtual host
|
| options/nixos/services.fediwall.nginx.serverName | Name of this virtual host
|
| options/nixos/services.murmur.registerName | Public server registration name, and also the name of the
Root channel
|
| options/nixos/services.pixelfed.nginx.serverName | Name of this virtual host
|
| options/nixos/services.mainsail.nginx.serverName | Name of this virtual host
|
| options/nixos/boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.age | Delete a file when it reaches a certain age
|
| options/home-manager/services.hyprsunset.transitions.<name>.calendar | Deprecated - Use services.hyprsunset.settings instead to manage transitions
|
| options/nixos/services.botamusique.settings.bot.username | Name the bot should appear with.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/home-manager/accounts.email.accounts.<name>.notmuch.neomutt.virtualMailboxes | List of virtual mailboxes using Notmuch queries
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters | List of message filters to add to this Thunderbird account
configuration.
|
| options/nixos/services.armagetronad.servers.<name>.roundSettings | Armagetron Advanced server per-round configuration
|
| options/nixos/services.postfix.settings.master.<name>.wakeupUnusedComponent | If set to false the component will only be woken
up if it is used
|
| options/nixos/services.authelia.instances.<name>.settings.log.file_path | File path where the logs will be written
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.ignore_tags | Set labels to ignore when syncing from local tags to
remote labels (after translations).
|
| options/home-manager/accounts.calendar.accounts.<name>.pimsync.extraPairDirectives | Extra directives that should be added under this accounts pair directive
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.resources.*.names | List of resources to host on this listener.
|
| options/nixos/systemd.services.<name>.confinement.packages | Additional packages or strings with context to add to the closure of
the chroot
|
| options/nixos/virtualisation.oci-containers.containers.<name>.imageFile | Path to an image file to load before running the image
|
| options/nixos/services.prometheus.exporters.imap-mailstat.accounts.<name>.mailaddress | Your email address (at the moment used as login name)
|
| options/darwin/launchd.agents.<name>.serviceConfig.EnvironmentVariables | This optional key is used to specify additional environment variables to be set before running the
job.
|
| options/nixos/services.suricata.settings.app-layer.protocols.<name>.enabled | The option "enabled" takes 3 values - "yes", "no", "detection-only".
"yes" enables both detection and the parser, "no" disables both, and
"detection-only" enables protocol detection only (parser disabled).
|
| options/nixos/services.hadoop.hdfs.namenode.openFirewall | Open firewall ports for HDFS NameNode.
|
| options/nixos/boot.binfmt.registrations.<name>.recognitionType | Whether to recognize executables by magic number or extension.
|
| options/nixos/services.syncthing.settings.folders.<name>.versioning.type | The type of versioning
|
| options/home-manager/services.syncthing.settings.folders.<name>.versioning.type | The type of versioning
|
| options/nixos/services.sabnzbd.settings.servers.<name>.expire_date | If Notifications are enabled and an expiry date is
set, warn 5 days before expiry
|
| options/nixos/systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.argument | An argument whose meaning depends on the type of operation
|
| options/nixos/systemd.network.networks.<name>.genericRandomEarlyDetectionConfig | Each attribute in this set specifies an option in the
[GenericRandomEarlyDetection] section of the unit
|
| options/home-manager/launchd.agents.<name>.config.inetdCompatibility.Wait | This flag corresponds to the "wait" or "nowait" option of inetd
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs12.<name>.secret | Value of decryption passphrase for PKCS#12 container.
|
| options/home-manager/programs.firefox.profiles.<name>.search.meta.maintainers | List of maintainers of each module
|
| options/nixos/services.sanoid.datasets.<name>.pruning_script | Script to run after pruning snapshot.
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.settings.log | File where radicle-native-ci should write the run log.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.eap.<name>.secret | Value of the EAP/XAuth secret
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ike.<name>.secret | Value of the IKE preshared secret
|
| options/nixos/services.syncthing.settings.folders.<name>.versioning | How to keep changed/deleted files with Syncthing
|
| options/home-manager/services.syncthing.settings.folders.<name>.versioning | How to keep changed/deleted files with Syncthing
|
| options/home-manager/accounts.email.accounts.<name>.smtp.authentication | The authentication mechanism.
|
| options/home-manager/accounts.email.accounts.<name>.imap.authentication | The authentication mechanism.
|
| options/nixos/networking.wireguard.interfaces.<name>.allowedIPsAsRoutes | Determines whether to add allowed IPs as routes or not.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.k3s.nodeName | Node name.
|
| options/home-manager/programs.opencode.themes | Custom themes for opencode
|
| options/nixos/systemd.user.generators | Definition of systemd generators; see systemd.generator(5)
|
| options/nixos/containers.<name>.additionalCapabilities | Grant additional capabilities to the container
|
| options/nixos/services.kanidm.provision.groups.<name>.overwriteMembers | Whether the member list should be overwritten each time (true) or appended
(false)
|
| options/home-manager/services.muchsync.remotes.<name>.local.checkForModifiedFiles | Check for locally modified files
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.httpHostHeader | Sets the HTTP Host header on requests sent to the local service.
|
| options/nixos/services.librenms.hostname | The hostname to serve LibreNMS on.
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters.*.type | Type for this filter.
|
| options/home-manager/services.activitywatch.watchers.<name>.extraOptions | Extra arguments to be passed to the watcher executable.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.policies_fwd_out | Whether to install outbound FWD IPsec policies or not
|
| options/nixos/services.bookstack.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/users.users.<name>.initialHashedPassword | Specifies the initial hashed password for the user, i.e. the
hashed password assigned if the user does not already
exist
|
| options/nixos/virtualisation.fileSystems.<name>.device | The device as passed to mount
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/networking.openconnect.interfaces.<name>.gateway | Gateway server to connect to.
|
| options/nixos/services.cloudflared.tunnels.<name>.credentialsFile | Credential file
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.communityPlugins.*.enable | Whether to enable the plugin.
|
| options/nixos/networking.sits.<name>.encapsulation.type | Select the encapsulation type:
-
6in4: the IPv6 packets are encapsulated using the
6in4 protocol (formerly known as SIT, RFC 4213);
-
gue: the IPv6 packets are encapsulated in UDP packets
using the Generic UDP Encapsulation (GUE) scheme;
-
foo: the IPv6 packets are encapsulated in UDP packets
using the Foo over UDP (FOU) scheme.
|
| options/nixos/services.hddfancontrol.settings.<drive-bay-name>.disks | Drive(s) to get temperature from
Can also use command substitution to automatically grab all matching drives; such as all scsi (sas) drives
|
| options/home-manager/programs.opencode.commands | Custom commands for opencode
|
| options/nixos/services.easytier.instances.<name>.settings.listeners | Listener addresses to accept connections from other peers
|
| options/nixos/virtualisation.credentials.<name>.source | Source file on the host containing the credential data.
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.tlsTimeout | Timeout for completing a TLS handshake to your origin server, if you have chosen to connect Tunnel to an HTTPS server.
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.addrs | Addresses allocated in pool
|
| options/darwin/launchd.daemons.<name>.serviceConfig.ProcessType | This optional key describes, at a high level, the intended purpose of the job
|
| options/nixos/services.keepalived.vrrpInstances.<name>.unicastPeers | Do not send VRRP adverts over VRRP multicast group
|
| options/darwin/launchd.daemons.<name>.serviceConfig.inetdCompatibility | The presence of this key specifies that the daemon expects to be run as if it were launched from inetd.
|
| options/home-manager/accounts.email.accounts.<name>.offlineimap.extraConfig.account | Extra configuration options to add to the account section.
|
| options/nixos/security.wrappers.<name>.capabilities | A comma-separated list of capability clauses to be given to the
wrapper program
|
| options/nixos/services.invoiceplane.sites.<name>.database.passwordFile | A file containing the password corresponding to
database.user.
|
| options/home-manager/programs.thunderbird.profiles.<name>.search.privateDefault | The default search engine used in the Private Browsing.
|
| options/home-manager/accounts.contact.accounts.<name>.thunderbird.profiles | List of Thunderbird profiles for which this account should be
enabled
|
| options/nixos/services.ncps.cache.redis.username | Redis username for authentication (for Redis ACL).
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.enableRecommendedPairwiseCiphers | Additionally enable the recommended set of pairwise ciphers
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.clientIdCommand | A command that prints the OAuth credentials to standard
output
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.ProcessType | This optional key describes, at a high level, the intended purpose of the job
|
| options/nixos/services.invoiceplane.sites.<name>.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.filter.program | Path to the external filter program.
|
| options/nixos/services.taskserver.organisations.<name>.groups | A list of group names that belong to the organization.
|
| options/nixos/services.nitter.server.hostname | Hostname of the instance.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.inetdCompatibility | The presence of this key specifies that the daemon expects to be run as if it were launched from inetd.
|
| options/nixos/systemd.network.networks.<name>.deficitRoundRobinSchedulerClassConfig | Each attribute in this set specifies an option in the
[DeficitRoundRobinSchedulerClass] section of the unit
|
| options/nixos/services.sslh.settings.protocols | List of protocols sslh will probe for and redirect
|
| options/nixos/services.fedimintd.<name>.nginx.config.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| options/home-manager/services.hyprsunset.transitions.<name>.requests | Deprecated - Use services.hyprsunset.settings instead to manage transitions
|
| options/nixos/users.users.<name>.hashedPasswordFile | The full path to a file that contains the hash of the user's
password
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.mediated_by | The name of the connection to mediate this connection through
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.proxyPort | cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP
|
| options/nixos/services.limesurvey.httpd.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/darwin/launchd.agents.<name>.serviceConfig.EnableTransactions | This flag instructs launchd that the job promises to use vproc_transaction_begin(3) and
vproc_transaction_end(3) to track outstanding transactions that need to be reconciled before the
process can safely terminate
|
| options/nixos/networking.openconnect.interfaces.<name>.privateKey | Private key to authenticate with.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.backspaceBinding | Which string the terminal should send to an application when the user
presses the Backspace key.
auto
: Attempt to determine the right value from the terminal's IO settings.
ascii-backspace
: Send an ASCII backspace character (0x08).
ascii-delete
: Send an ASCII delete character (0x7F).
delete-sequence
: Send the @7 control sequence.
tty
: Send terminal's "erase" setting.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.trackInterfaces | List of network interfaces to monitor for health tracking.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.limesurvey.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.type | The type of operation to perform on the file
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ppk.<name>.secret | Value of the PPK
|
| options/nixos/services.gitlab-runner.services.<name>.registrationFlags | Extra command-line flags passed to
gitlab-runner register
|
| options/darwin/services.gitlab-runner.services.<name>.registrationFlags | Extra command-line flags passed to
gitlab-runner register
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.settings.state | Directory where per-run directories are stored.
|
| options/nixos/services.gitlab-runner.services.<name>.registrationConfigFile | Absolute path to a file with environment variables
used for gitlab-runner registration with runner registration
tokens
|
| options/nixos/networking.ipips.<name>.encapsulation.type | Select the encapsulation type:
-
ipip to create an IPv4 within IPv4 tunnel (RFC 2003).
-
4in6 to create a 4in6 tunnel (RFC 2473);
-
ip6ip6 to create an IPv6 within IPv6 tunnel (RFC 2473);
For encapsulating IPv6 within IPv4 packets, see
the ad-hoc networking.sits option.
|
| options/nixos/services.headscale.settings.dns.nameservers.global | List of nameservers to pass to Tailscale clients.
|
| options/nixos/services.rke2.nodeName | Node name.
|
| options/nixos/services.radicle.httpd.nginx.serverName | Name of this virtual host
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.private.<name>.secret | Value of decryption passphrase for private key.
|
| options/nixos/services.mediawiki.httpd.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.woodpecker-agents.agents.<name>.environmentFile | File to load environment variables
from
|
| options/nixos/services.borgbackup.repos.<name>.authorizedKeysAppendOnly | Public SSH keys that can only be used to append new data (archives) to the repository
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/home-manager/programs.gnome-terminal.profile.<name>.transparencyPercent | Background transparency in percent.
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.priority | Priority of this policy
|
| options/nixos/services.sanoid.datasets.<name>.script_timeout | Time limit for pre/post/pruning script execution time (<=0 for infinite).
|
| options/darwin/launchd.daemons.<name>.serviceConfig.EnvironmentVariables | This optional key is used to specify additional environment variables to be set before running the
job.
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters.*.text | The raw text of the filter
|
| options/nixos/hardware.fw-fanctrl.config.strategies.<name>.fanSpeedUpdateFrequency | How often the fan speed should be updated in seconds
|
| options/home-manager/accounts.email.accounts.<name>.notmuch.neomutt.virtualMailboxes.*.query | Notmuch query
|
| options/nixos/virtualisation.credentials.<name>.text | Text content of the credential
|
| options/nixos/virtualisation.fileSystems.<name>.options | Options used to mount the file system
|
| options/nixos/virtualisation.fileSystems.<name>.depends | List of paths that should be mounted before this one
|
| options/nixos/virtualisation.fileSystems.<name>.overlay.workdir | The path to the workdir
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.netbird.clients.<name>.login.systemdDependencies | Additional systemd dependencies required to succeed before the Setup Key file becomes available.
|
| options/nixos/services.netbird.tunnels.<name>.login.systemdDependencies | Additional systemd dependencies required to succeed before the Setup Key file becomes available.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.EnvironmentVariables | This optional key is used to specify additional environment variables to be set before running the
job.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.xauth.<name>.secret | Value of the EAP/XAuth secret
|
| options/darwin/launchd.agents.<name>.serviceConfig.Disabled | This optional key is used as a hint to launchctl(1) that it should not submit this job to launchd when
loading a job or jobs
|
| options/home-manager/services.muchsync.remotes.<name>.remote.checkForModifiedFiles | Check for modified files on the remote side
|
| options/nixos/services.invoiceplane.sites.<name>.invoiceTemplates | List of path(s) to respective template(s) which are copied from the 'invoice_templates/pdf' directory.
These templates need to be packaged before use, see example.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.removeOrphanedClaimMaps | Whether claim maps not specified here but present in kanidm should be removed from kanidm.
|
| options/nixos/services.neo4j.ssl.policies | Defines the SSL policies for use with Neo4j connectors
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/networking.supplicant.<name>.userControlled.enable | Allow normal users to control wpa_supplicant through wpa_gui or wpa_cli
|
| options/nixos/services.datadog-agent.hostname | The hostname to show in the Datadog dashboard (optional)
|
| options/nixos/services.system76-scheduler.assignments.<name>.matchers | Process matchers.
|
| options/home-manager/accounts.email.accounts.<name>.notmuch.neomutt.virtualMailboxes.*.type | Reads all matching messages or whole-threads
|
| options/nixos/services.buildkite-agents | Attribute set of buildkite agents
|
| options/darwin/services.buildkite-agents | Attribute set of buildkite agents
|
| options/nixos/virtualisation.fileSystems.<name>.neededForBoot | If set, this file system will be mounted in the initial ramdisk
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.originServerName | Hostname that cloudflared should expect from your origin server certificate.
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.directory | Directory to write the output to.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.clientSecretCommand | A command that prints the OAuth credentials to standard
output
|
| options/nixos/services.tor.relay.onionServices.<name>.settings.HiddenServiceExportCircuitID | See torrc manual.
|
| options/nixos/networking.openconnect.interfaces.<name>.protocol | Protocol to use.
|
| options/nixos/hardware.fw-fanctrl.config.strategies.<name>.movingAverageInterval | Interval (seconds) of the last temperatures to use to calculate the average temperature
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/home-manager/accounts.email.accounts.<name>.notmuch.neomutt.virtualMailboxes.*.limit | Restricts number of messages/threads in the result.
|
| options/home-manager/programs.hexchat.channels.<name>.options.useGlobalUserInformation | Use global user information.
|
| options/nixos/systemd.network.networks.<name>.fairQueueingControlledDelayConfig | Each attribute in this set specifies an option in the
[FairQueueingControlledDelay] section of the unit
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.settings | Attribute set of options for each extension
|
| options/nixos/services.sanoid.templates.<name>.pruning_script | Script to run after pruning snapshot.
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.keepAliveTimeout | Timeout after which an idle keepalive connection can be discarded.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.session_url | Session URL to connect to
|
| options/nixos/services.jibri.xmppEnvironments.<name>.control.login.passwordFile | File containing the password for the user.
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.presharedKeyFile | File pointing to preshared key as generated by wg genpsk
|
| options/nixos/services.honk.host | The host name or IP address the server should listen to.
|
| options/nixos/services.anuko-time-tracker.nginx.serverName | Name of this virtual host
|
| options/nixos/services.mysql.galeraCluster.localName | The unique name that identifies this particular node within the cluster
|
| options/home-manager/programs.vicinae.themes | Theme settings to add to the themes folder in ~/.config/vicinae/themes
|
| options/nixos/services.archisteamfarm.bots.<name>.passwordFile | Path to a file containing the password
|
| options/nixos/services.cloudflared.tunnels.<name>.edgeIPVersion | Specifies the IP address version (IPv4 or IPv6) used to establish a connection between cloudflared and the Cloudflare global network
|
| options/nixos/services.davis.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.davis.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.movim.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.slskd.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.slskd.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.movim.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.hadoop.hdfs.namenode.formatOnInit | Format HDFS namenode on first start
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.ah_proposals | AH proposals to offer for the CHILD_SA
|
| options/home-manager/accounts.calendar.accounts.<name>.thunderbird.profiles | List of Thunderbird profiles for which this account should be
enabled
|
| options/darwin/launchd.daemons.<name>.serviceConfig.EnableTransactions | This flag instructs launchd that the job promises to use vproc_transaction_begin(3) and
vproc_transaction_end(3) to track outstanding transactions that need to be reconciled before the
process can safely terminate
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ntlm.<name>.secret | Value of the NTLM secret, which is the NT Hash of the actual secret,
that is, MD4(UTF-16LE(secret))
|
| options/nixos/services.anubis.instances.<name>.settings.OG_PASSTHROUGH | Whether to enable Open Graph tag passthrough
|
| options/nixos/services.tor.relay.onionServices.<name>.settings.HiddenServiceAllowUnknownPorts | See torrc manual.
|
| options/nixos/users.extraUsers.<name>.initialHashedPassword | Specifies the initial hashed password for the user, i.e. the
hashed password assigned if the user does not already
exist
|
| options/home-manager/wayland.windowManager.sway.config.bindswitches.<name>.locked | Unless the flag --locked is set, the command
will not be run when a screen locking program
is active
|
| options/nixos/services.pantalaimon-headless.instances.<name>.listenPort | The port where the daemon will listen to client connections for
this homeserver
|
| options/nixos/services.namecoind.rpc.certificate | Certificate file for securing RPC connections.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.useTransformers | Whether to provide the dependencies to allow using transformer models.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.EnableTransactions | This flag instructs launchd that the job promises to use vproc_transaction_begin(3) and
vproc_transaction_end(3) to track outstanding transactions that need to be reconciled before the
process can safely terminate
|
| options/nixos/services.hddfancontrol.settings.<drive-bay-name>.pwmPaths | PWM filepath(s) to control fan speed (under /sys), followed by initial and fan-stop PWM values
Can also use command substitution to ensure the correct hwmonX is selected on every boot
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters.*.action | Action to perform on matched messages.
|
| options/home-manager/programs.gemini-cli.commands | An attribute set of custom commands that will be globally available
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/home-manager/specialisation.<name>.configuration | Arbitrary Home Manager configuration settings.
|
| options/nixos/virtualisation.fileSystems.<name>.encrypted.enable | The block device is backed by an encrypted one, adds this device as a initrd luks entry.
|
| options/nixos/services.shorewall.configs | This option defines the Shorewall configs
|
| options/nixos/services.tor.relay.onionServices.<name>.settings.HiddenServiceDirGroupReadable | See torrc manual.
|
| options/nixos/services.tor.settings.Nickname | See torrc manual.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.proxyType | cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.collections | The collections to synchronize between the storages.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.slot | Optional slot number of the token that stores the certificate.
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.proxyAddress | cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP
|
| options/nixos/boot.binfmt.registrations.<name>.wrapInterpreterInShell | Whether to wrap the interpreter in a shell script
|
| options/nixos/services.mautrix-meta.instances.<name>.environmentFile | File containing environment variables to substitute when copying the configuration
out of Nix store to the services.mautrix-meta.dataDir
|
| options/home-manager/wayland.windowManager.sway.config.bindswitches.<name>.reload | If the --reload flag is given, the binding will
also be executed when the config is reloaded.
toggle bindings will not be executed on reload
|
| options/nixos/security.pam.services.<name>.googleAuthenticator.enable | If set, users with enabled Google Authenticator (created
~/.google_authenticator) will be required
to provide Google Authenticator token to log in.
|
| options/nixos/services.bcg.automaticRenameNodes | Automatically rename all nodes.
|
| options/nixos/services.bacula-sd.autochanger.<name>.extraAutochangerConfig | Extra configuration to be passed in Autochanger directive.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Disabled | This optional key is used as a hint to launchctl(1) that it should not submit this job to launchd when
loading a job or jobs
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.presharedKey | Base64 preshared key generated by wg genpsk
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.runtimePackages | Packages added to the adapter's PATH.
|
| options/nixos/users.users.<name>.initialPassword | Specifies the initial password for the user, i.e. the
password assigned if the user does not already exist
|
| options/home-manager/programs.senpai.config.nickname | Your nickname, sent with a NICK IRC message
|
| options/nixos/services.gitea.appName | Application name.
|
| options/nixos/services.bookstack.nginx.serverName | Name of this virtual host
|
| options/nixos/security.pam.services.<name>.googleAuthenticator.allowNullOTP | Whether to allow login for accounts that have no OTP set
(i.e., accounts with no OTP configured or no existing
~/.google_authenticator).
|
| options/nixos/services.sanoid.templates.<name>.script_timeout | Time limit for pre/post/pruning script execution time (<=0 for infinite).
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Disabled | This optional key is used as a hint to launchctl(1) that it should not submit this job to launchd when
loading a job or jobs
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.hashedPasswordFile | Specifies the path to a file containing the
hashed password for the MQTT user
|
| options/nixos/services.akkoma.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.gancio.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.fluidd.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.fluidd.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.gancio.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.akkoma.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.matomo.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.matomo.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.monica.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.monica.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.ignore-prefixes | List of path prefixes to ignore
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.mautrix-meta.instances.<name>.serviceDependencies | List of Systemd services to require and wait for when starting the application service.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.highlight.background | The background color.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.highlight.foreground | The foreground color.
|
| options/nixos/services.tarsnap.archives.<name>.aggressiveNetworking | Upload data over multiple TCP connections, potentially
increasing tarsnap's bandwidth utilisation at the cost
of slowing down all other network traffic
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.limesurvey.httpd.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.clientSecretCommand | A command that prints the OAuth credentials to standard
output
|
| options/nixos/virtualisation.sharedDirectories.<name>.target | The mount point of the directory inside the virtual machine
|
| options/nixos/virtualisation.sharedDirectories.<name>.source | The path of the directory to share, can be a shell variable
|
| options/nixos/services.postgresql.systemCallFilter.<name>.priority | Set the priority of the system call filter setting
|
| options/home-manager/accounts.contact.accounts.<name>.pimsync.extraLocalStorageDirectives | Extra directives that should be added under this accounts local storage directive
|
| options/nixos/services.nullmailer.config.me | The fully-qualifiled host name of the computer running nullmailer
|
| options/home-manager/programs.librewolf.profiles.<name>.search.meta.maintainers | List of maintainers of each module
|
| options/home-manager/programs.floorp.profiles.<name>.bookmarks.meta.maintainers | List of maintainers of each module
|
| options/nixos/services.prometheus.exporters.imap-mailstat.accounts.<name>.serveraddress | mailserver name or address
|
| options/nixos/users.extraUsers.<name>.hashedPasswordFile | The full path to a file that contains the hash of the user's
password
|
| options/nixos/boot.binfmt.registrations.<name>.matchCredentials | Whether to launch with the credentials and security
token of the binary, not the interpreter (e.g. setuid
bit)
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.communityPlugins.*.settings | Settings to include in the plugin's data.json.
|
| options/nixos/services.factorio.username | Your factorio.com login credentials
|
| options/nixos/services.anuko-time-tracker.hostname | The hostname to serve Anuko Time Tracker on.
|
| options/nixos/security.dhparams.params | Diffie-Hellman parameters to generate
|
| options/nixos/programs.nix-required-mounts.allowedPatterns.<name>.unsafeFollowSymlinks | Whether to enable Instructs the hook to mount the symlink targets as well, when any of
the paths contain symlinks
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.allowedIPs | List of IP (v4 or v6) addresses with CIDR masks from
which this peer is allowed to send incoming traffic and to which
outgoing traffic for this peer is directed
|
| options/home-manager/accounts.email.accounts.<name>.aerc.imapOauth2Params.client_secret | The OAuth2 client secret.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.smtpOauth2Params.client_secret | The OAuth2 client secret.
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/nixos/services.authelia.instances.<name>.settings.log.keep_stdout | Whether to also log to stdout when a file_path is defined.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.borgbackup.jobs.<name>.encryption.passphrase | The passphrase the backups are encrypted with
|
| options/nixos/services.pantalaimon-headless.instances.<name>.listenAddress | The address where the daemon will listen to client connections
for this homeserver.
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters.*.enabled | Whether this filter is currently active.
|
| options/nixos/services.gitlab-runner.services.<name>.environmentVariables | Custom environment variables injected to build environment
|
| options/darwin/services.gitlab-runner.services.<name>.environmentVariables | Custom environment variables injected to build environment
|
| options/darwin/launchd.agents.<name>.serviceConfig.StartCalendarInterval | This optional key causes the job to be started every calendar interval as specified
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.noHappyEyeballs | Disable the “happy eyeballs” algorithm for IPv4/IPv6 fallback if your local network has misconfigured one of the protocols.
|
| options/nixos/services.discourse.hostname | The hostname to serve Discourse on.
|
| options/nixos/services.bookstack.hostname | The hostname to serve BookStack on.
|
| options/home-manager/programs.borgmatic.backups.<name>.location.repositories | List of local or remote repositories with paths and optional labels.
|
| options/nixos/services.postfixadmin.database.username | Username for the postgresql connection
|
| options/home-manager/programs.thunderbird.profiles.<name>.search.engines | Attribute set of search engine configurations
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.compress | Enables gzip compression of write-ahead logs, and specifies the compression level
(0 through 9, 0 being no compression and 9 being best compression)
|
| options/nixos/services.authelia.instances.<name>.secrets.storageEncryptionKeyFile | Path to your storage encryption key.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.file | Absolute path to the certificate to load
|
| options/darwin/launchd.agents.<name>.serviceConfig.inetdCompatibility.Wait | This flag corresponds to the "wait" or "nowait" option of inetd
|
| options/nixos/services.kerberos_server.settings.realms.<name>.acl | The privileges granted to a user.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.collections | The collections to synchronize between the storages.
|
| options/nixos/services.bcg.automaticRenameKitNodes | Automatically rename kit's nodes.
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters.*.extraConfig | Extra settings to apply to the filter
|
| options/nixos/services.hddfancontrol.settings.<drive-bay-name>.logVerbosity | Verbosity of the log level
|
| options/nixos/networking.openconnect.interfaces.<name>.passwordFile | File containing the password to authenticate with
|
| options/nixos/virtualisation.fileSystems.<name>.overlay.upperdir | The path to the upperdir
|
| options/nixos/networking.wireguard.interfaces.<name>.generatePrivateKeyFile | Automatically generate a private key with
wg genkey, at the privateKeyFile location.
|
| options/home-manager/programs.borgmatic.backups.<name>.location.sourceDirectories | Directories to backup
|
| options/nixos/services.wstunnel.clients.<name>.upgradeCredentials | Use these credentials to authenticate during the HTTP upgrade request
(Basic authorization type, USER:[PASS]).
Passwords specified here will be world-readable in the Nix store!
To pass a password to the service, point the environmentFile option
to a file containing HTTP_PASSWORD=<your-password-here> and set this
option to <user>:$HTTP_PASSWORD
|
| options/home-manager/accounts.contact.accounts.<name>.pimsync.extraRemoteStorageDirectives | Extra directives that should be added under this accounts remote storage directive
|
| options/nixos/virtualisation.fileSystems.<name>.overlay.lowerdir | The list of path(s) to the lowerdir(s)
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.ignore-prefixes-in-home | Path prefixes to ignore under home directory
|
| options/nixos/security.pam.services.<name>.googleAuthenticator.forwardPass | The authentication provides a single field requiring
the user's password followed by the one-time password (OTP).
|
| options/nixos/services.pantalaimon-headless.instances.<name>.extraSettings | Extra configuration options
|
| options/nixos/systemd.network.networks.<name>.stochasticFairnessQueueingConfig | Each attribute in this set specifies an option in the
[StochasticFairnessQueueing] section of the unit
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.ppk_id | String identifying the Postquantum Preshared Key (PPK) to be used.
|
| options/nixos/security.pam.services.<name>.googleOsLoginAccountVerification | If set, will use the Google OS Login PAM modules
(pam_oslogin_login,
pam_oslogin_admin) to verify possible OS Login
users and set sudoers configuration accordingly
|
| options/home-manager/programs.firefox.profiles.<name>.bookmarks.meta.maintainers | List of maintainers of each module
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.perIdentitySettings | Extra settings to add to each identity of this Thunderbird
account configuration
|
| options/nixos/services.coder.database.username | Username for accessing the database.
|
| options/nixos/boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.argument | An argument whose meaning depends on the type of operation
|
| options/nixos/services.syncthing.settings.folders.<name>.copyOwnershipFromParent | On Unix systems, tries to copy file/folder ownership from the parent directory (the directory it’s located in)
|
| options/home-manager/services.syncthing.settings.folders.<name>.copyOwnershipFromParent | On Unix systems, tries to copy file/folder ownership from
the parent directory (the directory it’s located in)
|
| options/nixos/services.jirafeau.nginxConfig.serverName | Name of this virtual host
|
| options/nixos/programs.foot.theme | Theme name
|
| options/darwin/homebrew.taps | List of Homebrew formula repositories to tap
|
| options/darwin/homebrew.brews | List of Homebrew formulae to install
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.filter.arguments | Extra command-line arguments pass to the external filter program.
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters.*.actionValue | Argument passed to the filter action, e.g. a folder path.
|
| options/nixos/networking.networkmanager.ensureProfiles.profiles.<name>.connection.id | This is the name that will be displayed by NetworkManager and GUIs.
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.connectTimeout | Timeout for establishing a new TCP connection to your origin server
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.oauth2-proxy.nginx.virtualHosts.<name>.allowed_emails | List of emails to allow access to this vhost, or null to allow all.
|
| options/nixos/services.oauth2-proxy.nginx.virtualHosts.<name>.allowed_groups | List of groups to allow access to this vhost, or null to allow all.
|
| options/home-manager/accounts.calendar.accounts.<name>.pimsync.extraLocalStorageDirectives | Extra directives that should be added under this accounts local storage directive
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/nixos/virtualisation.credentials.<name>.mechanism | The mechanism used to pass the credential to the VM.
|
| options/nixos/services.matrix-synapse.settings.server_name | The domain name of the server, with optional explicit port
|
| options/nixos/services.tor.relay.onionServices.<name>.settings.HiddenServiceMaxStreamsCloseCircuit | See torrc manual.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/darwin/launchd.daemons.<name>.serviceConfig.StartCalendarInterval | This optional key causes the job to be started every calendar interval as specified
|
| options/nixos/services.matrix-tuwunel.settings.global.server_name | The server_name is the name of this server
|
| options/nixos/services.matrix-conduit.settings.global.server_name | The server_name is the name of this server
|
| options/nixos/services.mailman.ldap.attrMap.username | LDAP-attribute that corresponds to the username-attribute in mailman.
|
| options/nixos/services.minidlna.settings.friendly_name | Name that the server presents to clients.
|
| options/nixos/services.pretix.settings.pretix.instance_name | The name of this installation.
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.type | Type of this transport
|
| options/nixos/services.keycloak.themes | Additional theme packages for Keycloak
|
| options/nixos/networking.vswitches | This option allows you to define Open vSwitches that connect
physical networks together
|
| options/nixos/security.pam.services.<name>.googleOsLoginAuthentication | If set, will use the pam_oslogin_login's user
authentication methods to authenticate users using 2FA
|
| options/nixos/specialisation.<name>.configuration | Arbitrary NixOS configuration
|
| options/nixos/networking.wireguard.interfaces.<name>.socketNamespace | The pre-existing network namespace in which the
WireGuard interface is created, and which retains the socket even if the
interface is moved via interfaceNamespace
|
| options/nixos/services.dendrite.settings.global.server_name | The domain name of the server, with optional explicit port
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StartCalendarInterval | This optional key causes the job to be started every calendar interval as specified
|
| options/darwin/launchd.daemons.<name>.serviceConfig.inetdCompatibility.Wait | This flag corresponds to the "wait" or "nowait" option of inetd
|
| options/nixos/users.extraUsers.<name>.initialPassword | Specifies the initial password for the user, i.e. the
password assigned if the user does not already exist
|
| options/darwin/services.gitlab-runner.services.<name>.registrationConfigFile | Absolute path to a file with environment variables
used for gitlab-runner registration
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.host | Host for the api or remote transport
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths | API tokens to provision for the user in this organization.
|
| options/home-manager/programs.borgmatic.backups.<name>.consistency.checks.*.frequency | Frequency of this type of check
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.settings.base_url | Base URL for build logs (mandatory for access from CI broker page).
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.inetdCompatibility.Wait | This flag corresponds to the "wait" or "nowait" option of inetd
|
| options/nixos/services.shorewall6.configs | This option defines the Shorewall configs
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.serverName | Name of this virtual host
|
| options/nixos/security.tpm2.tssUser | Name of the tpm device-owner and service user, set if applyUdevRules is
set.
|
| options/nixos/services.artalk.user | Artalk user name.
|
| options/nixos/services.bcg.device | Device name to configure gateway to use.
|
| options/nixos/services.sogo.vhostName | Name of the nginx vhost
|
| options/nixos/services.zammad.user | Name of the Zammad user.
|
| options/nixos/users.mysql.database | The name of the database containing the users
|
| options/nixos/services.firezone.server.provision.accounts.<name>.features.idp_sync | Whether to enable the idp_sync feature for this account.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.features.rest_api | Whether to enable the rest_api feature for this account.
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.path | Path to the socket for local or remote transports
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.port | Port to connect to for the api or remote transport
|
| options/nixos/networking.bonds.<name>.xmit_hash_policy | DEPRECATED, use driverOptions
|
| options/nixos/services.gitlab.databaseUsername | GitLab database user.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.agorakit.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.librenms.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.kanboard.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.fediwall.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.librenms.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.kanboard.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.fediwall.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.agorakit.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.mainsail.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.mainsail.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/home-manager/accounts.calendar.accounts.<name>.pimsync.extraRemoteStorageDirectives | Extra directives that should be added under this accounts remote storage directive
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.handle | Hex-encoded CKA_ID or handle of the certificate on a token or TPM,
respectively
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.dscp | Differentiated Services Field Codepoint to set on outgoing IKE packets for
this connection
|
| options/nixos/services.simplesamlphp.<name>.settings.baseurlpath | URL where SimpleSAMLphp can be reached.
|
| options/nixos/services.icingaweb2.modules.monitoring.backends.<name>.disabled | Disable this backend
|
| options/darwin/networking.wg-quick.interfaces.<name>.peers.*.persistentKeepalive | Interval in seconds to send keepalive packets
|
| options/nixos/services.evremap.settings.phys | The physical device name to listen on
|
| options/nixos/virtualisation.oci-containers.containers.<name>.cmd | Commandline arguments to pass to the image's entrypoint.
|
| options/nixos/services.cloudflared.tunnels.<name>.certificateFile | Account certificate file, necessary to create, delete and manage tunnels
|
| options/nixos/services.prometheus.exporters.imap-mailstat.accounts.<name>.password | |
| options/nixos/services.heisenbridge.namespaces | Configure the 'namespaces' section of the registration.yml for the bridge and the server
|
| options/nixos/services.actual.settings.hostname | The address to listen on
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.znc.user | The name of an existing user account to use to own the ZNC server
process
|
| options/darwin/homebrew.casks | List of Homebrew casks to install
|
| options/home-manager/programs.astroid.externalEditor | You can use the following variables:
%1
: file name
%2
: server name
%3
: socket ID
See Customizing editor
on the Astroid wiki.
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.authelia.instances.<name>.settings.telemetry.metrics.enabled | Enable Metrics.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.imapOauth2Params.token_endpoint | The OAuth2 token endpoint.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.smtpOauth2Params.token_endpoint | The OAuth2 token endpoint.
|
| options/nixos/networking.openconnect.interfaces.<name>.extraOptions | Extra config to be appended to the interface config
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.verifyFingerprint | Optional
|
| options/home-manager/programs.borgmatic.backups.<name>.location.excludeHomeManagerSymlinks | Whether to exclude Home Manager generated symbolic links from
the backups
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.vips | List of virtual IPs to request in IKEv2 configuration payloads or IKEv1
Mode Config
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters.*.condition | Condition to match messages against.
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.exactPermissions | When enabled,
programs.floorp.profiles.<profile>.extensions.settings.<extensionID>.permissions
must specify the exact set of permissions that the
extension will request
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.slot | Require pg_receivewal to use an existing replication slot (see
Section 26.2.6 of the PostgreSQL manual)
|
| options/nixos/services.drupal.webserver | Whether to use nginx or caddy for virtual host management
|
| options/nixos/boot.loader.limine.additionalFiles | A set of files to be copied to /boot
|
| options/nixos/boot.loader.refind.additionalFiles | A set of files to be copied to /boot
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.cacert | The certificates may use a relative path from the swanctl
x509ca directory or an absolute path
|
| options/nixos/virtualisation.oci-containers.containers.<name>.image | OCI image to run.
|
| options/nixos/networking.supplicant | Interfaces for which to start wpa_supplicant
|
| options/nixos/services.syncthing.settings.folders.<name>.ignorePatterns | Syncthing can be configured to ignore certain files in a folder using ignore patterns
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.user | Override the username or UID (and optionally groupname or GID) used
in the container.
|
| options/nixos/services.syncplay.maxUsernameLength | Maximum number of characters in a username.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.enableLocalhostRedirects | Allow localhost redirects
|
| options/nixos/virtualisation.fileSystems.<name>.encrypted.keyFile | Path to a keyfile used to unlock the backing encrypted
device
|
| options/nixos/services.kerberos_server.settings.realms.<name>.acl.*.target | The principals that 'access' applies to.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.allowInsecureClientDisablePkce | Disable PKCE on this oauth2 resource server to work around insecure clients
that may not support it
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.presharedKeyFile | File pointing to preshared key as generated by wg genpsk
|
| options/home-manager/programs.hexchat.channels.<name>.options.acceptInvalidSSLCertificates | Accept invalid SSL certificates.
|
| options/nixos/programs.zsh.ohMyZsh.theme | Name of the theme to be used by oh-my-zsh.
|
| options/nixos/services.sftpgo.user | User account name under which SFTPGo runs.
|
| options/nixos/services.r53-ddns.domain | The name of your domain in Route53
|
| options/home-manager/programs.zsh.oh-my-zsh.theme | Name of the theme to be used by oh-my-zsh.
|
| options/nixos/services.influxdb2.provision.organizations.<name>.buckets | Buckets to provision in this organization.
|
| options/nixos/services.zoneminder.hostname | The hostname on which to listen.
|
| options/nixos/services.pantalaimon-headless.instances.<name>.homeserver | The URI of the homeserver that the pantalaimon proxy should
forward requests to, without the matrix API path but including
the http(s) schema.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.pull | Image pull policy for the container
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.statusInterval | Specifies the number of seconds between status packets sent back to the server
|
| options/nixos/services.prometheus.exporters.imap-mailstat.accounts.<name>.starttls | set to true for using STARTTLS to start a TLS connection
|
| options/nixos/services.bookstack.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.bookstack.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.environment | Environment variables passed to the service
|
| options/home-manager/programs.thunderbird.profiles.<name>.search.meta.maintainers | List of maintainers of each module
|
| options/nixos/services.mautrix-meta.instances.<name>.registrationServiceUnit | The registration service that generates the registration file
|
| options/nixos/services.authelia.instances.<name>.settings.telemetry.metrics.address | The address to listen on for metrics
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.postgresqlPackage | The postgresql package to use.
|
| options/nixos/services.influxdb2.provision.organizations.<name>.present | Whether to ensure that this organization is present or absent.
|
| options/nixos/networking.openconnect.interfaces.<name>.certificate | Certificate to authenticate with.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.onlyoffice.hostname | FQDN for the OnlyOffice instance.
|
| options/nixos/services.icingaweb2.libraryPaths | Libraries to add to the Icingaweb2 library path
|
| options/nixos/services.peertube-runner.instancesToRegister.<name>.runnerDescription | Runner description declared to the PeerTube instance.
|
| options/home-manager/programs.librewolf.profiles.<name>.bookmarks.meta.maintainers | List of maintainers of each module
|
| options/nixos/services.pgadmin.emailServer.username | SMTP server username for email delivery
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.crl_uris | List of CRL distribution points (ldap, http, or file URI)
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.pull | If the default of yes is used, Mode Config works in pull mode, where the
initiator actively requests a virtual IP
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.exactPermissions | When enabled,
programs.firefox.profiles.<profile>.extensions.settings.<extensionID>.permissions
must specify the exact set of permissions that the
extension will request
|
| options/nixos/virtualisation.oci-containers.containers.<name>.labels | Labels to attach to the container at runtime.
|
| options/nixos/services.discourse.admin.username | The admin user username.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.verifyFingerprint | Optional
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.presharedKey | Base64 preshared key generated by wg genpsk
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.file_extension | Extension to include in local file names, which can be useful
for indexing with third-party programs.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.conflictResolution | What to do in case of a conflict between the storages
|
| options/nixos/services.bind.enable | Whether to enable BIND domain name server.
|
| options/nixos/services.artalk.group | Artalk group name.
|
| options/nixos/services.zammad.group | Name of the Zammad group.
|
| options/nixos/services.factorio.loadLatestSave | Load the latest savegame on startup
|
| options/nixos/services.vikunja.frontendHostname | The Hostname under which the frontend is running.
|
| options/nixos/services.tor.client.onionServices.<name>.clientAuthorizations | Clients' authorizations for a v3 onion service,
as a list of files containing each one private key, in the format:
descriptor:x25519:<base32-private-key>
See torrc manual.
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.split_exclude | Address or CIDR subnets
StrongSwan default: []
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.split_include | Address or CIDR subnets
StrongSwan default: []
|
| options/nixos/services.elasticsearch.cluster_name | Elasticsearch name that identifies your cluster for auto-discovery.
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.cassandra.jmxRoles.*.username | Username for JMX
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.ocsp_uris | List of OCSP URIs
|
| options/home-manager/programs.borgmatic.backups.<name>.storage.encryptionPasscommand | Command writing the passphrase to standard output.
|
| options/nixos/services.authelia.instances.<name>.environmentVariables | Additional environment variables to provide to authelia
|
| options/nixos/networking.wireguard.interfaces.<name>.interfaceNamespace | The pre-existing network namespace the WireGuard
interface is moved to
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.encap | To enforce UDP encapsulation of ESP packets, the IKE daemon can fake the
NAT detection payloads
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.disableChunkedEncoding | Disables chunked transfer encoding
|
| options/nixos/services.tt-rss.pool | Name of existing phpfpm pool that is used to run web-application
|
| options/nixos/services.sftpgo.group | Group name under which SFTPGo runs.
|
| options/darwin/services.github-runners | Multiple GitHub Runners
|
| options/nixos/virtualisation.oci-containers.containers.<name>.podman | Podman-specific settings in OCI containers
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote_addrs | Remote address(es) to use for IKE communication
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local | Section for a local authentication round
|
| options/nixos/virtualisation.oci-containers.containers.<name>.podman.user | The user under which the container should run.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.devices | List of devices to attach to this container.
|
| options/nixos/services.tor.torsocks.socks5Username | SOCKS5 username
|
| options/nixos/services.icecream.daemon.hostname | Hostname of the daemon in the icecream infrastructure
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.esp_proposals | ESP proposals to offer for the CHILD_SA
|
| options/nixos/virtualisation.oci-containers.containers.<name>.workdir | Override the default working directory for the container.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.version | IKE major version to use for connection.
- 1 uses IKEv1 aka ISAKMP,
- 2 uses IKEv2.
- A connection using the default of 0 accepts both IKEv1 and IKEv2 as
responder, and initiates the connection actively with IKEv2
|
| options/nixos/services.ghostunnel.servers.<name>.disableAuthentication | Disable client authentication, no client certificate will be required.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.conflictResolution | What to do in case of a conflict between the storages
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners | List of ports that this worker should listen on, their purpose and their configuration.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.autoStart | When enabled, the container is automatically started on boot
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.password | Password for the api transport
|
| options/nixos/services.firezone.server.smtp.username | Username to authenticate against the SMTP relay
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.instance | Assign a icinga instance to this transport
|
| options/nixos/services.tlsrpt.reportd.settings.dbname | Path to the sqlite database.
|
| options/nixos/systemd.mounts.*.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/services.cntlm.domain | Proxy account domain/workgroup name.
|
| options/nixos/services.gitlab.host | GitLab host name
|
| options/nixos/services.grav.pool | Name of existing phpfpm pool that is used to run web-application
|
| options/nixos/services.gancio.user | The user (and PostgreSQL database name) used to run the gancio server
|
| options/nixos/services.monero.rpc.user | User name for RPC connections.
|
| options/home-manager/programs.btop.themes | Themes to be written to $XDG_CONFIG_HOME/btop/themes/${name}.theme
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.namespaces.names | Namespace name.
|
| options/nixos/services.microsocks.authUsername | Optional username to use for authentication.
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.resource | SSH identity resource for the remote transport
|
| options/nixos/services.hadoop.hdfs.namenode.restartIfChanged | Automatically restart the service on config change
|
| options/nixos/services.openssh.settings.UseDns | Specifies whether sshd(8) should look up the remote host name, and to check that the resolved host name for
the remote IP address maps back to the very same IP address
|
| options/nixos/boot.loader.systemd-boot.extraEntries | Any additional entries you want added to the systemd-boot menu
|
| options/nixos/services.mail.sendmailSetuidWrapper.program | The name of the wrapper program
|
| options/nixos/networking.dhcpcd.setHostname | Whether to set the machine hostname based on the information
received from the DHCP server.
The hostname will be changed only if the current one is
the empty string, localhost or nixos
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.keepAliveConnections | Maximum number of idle keepalive connections between Tunnel and your origin
|
| options/nixos/services.hqplayerd.auth.username | Username used for HQPlayer's WebUI
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote | Section for a remote authentication round
|
| options/nixos/virtualisation.oci-containers.containers.<name>.autoRemoveOnStop | Automatically remove the container when it is stopped or killed
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.supplementaryScopeMaps | Maps kanidm groups to additionally returned oauth scopes
|
| options/nixos/virtualisation.oci-containers.containers.<name>.networks | Networks to attach the container to
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.type | The type of the listener, usually http.
|
| options/nixos/services.fcron.allow | Users allowed to use fcrontab and fcrondyn (one name per
line, all for everyone).
|
| options/nixos/services.tayga.tunDevice | Name of the nat64 tun device.
|
| options/nixos/services.pihole-web.hostName | Domain name for the website.
|
| options/nixos/services.sabnzbd.secretFiles | Path to a list of ini file containing confidential settings such as credentials
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.mode | File permissions on the UNIX domain socket.
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.port | The port to listen for HTTP(S) requests on.
|
| options/nixos/services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.name_filter | Specify a name filter (works as a LIKE) to apply on the server listing request.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.cyrus-imap.user | Cyrus IMAP user name
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.local_trash_tag | Local tag to which the remote Gmail 'TRASH' label is translated.
|
| options/nixos/systemd.network.networks.<name>.enhancedTransmissionSelectionConfig | Each attribute in this set specifies an option in the
[EnhancedTransmissionSelection] section of the unit
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.synchronous | Flush the WAL data to disk immediately after it has been received
|
| options/nixos/services.btrbk.instances.<name>.settings.stream_compress | Compress the btrfs send stream before transferring it from/to remote locations using a
compression command.
|
| options/nixos/services.bcg.automaticRenameGenericNodes | Automatically rename generic nodes.
|
| options/nixos/services.prometheus.exporters.imap-mailstat.accounts.<name>.serverport | imap port number (at the moment only tls connection is supported)
|
| options/nixos/virtualisation.oci-containers.containers.<name>.extraOptions | Extra options for podman run.
|
| options/nixos/services.dnsdist.dnscrypt.providerName | The name that will be given to this DNSCrypt resolver.
The provider name must start with 2.dnscrypt-cert..
|
| options/nixos/services.tailscale.serve.services | Services to configure for Tailscale Serve
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.exactPermissions | When enabled,
programs.librewolf.profiles.<profile>.extensions.settings.<extensionID>.permissions
must specify the exact set of permissions that the
extension will request
|
| options/nixos/services.deye-dummycloud.mqttUsername | MQTT username
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.mediation | Whether this connection is a mediation connection, that is, whether this
connection is used to mediate other connections using the IKEv2 Mediation
Extension
|
| options/nixos/services.peertube-runner.instancesToRegister.<name>.registrationTokenFile | Path to a file containing a registration token for the PeerTube instance
|
| options/nixos/services.easytier.instances.<name>.settings.network_secret | EasyTier network credential used for verification and
encryption
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.tls | Whether to enable TLS on the listener socket.
This option will be ignored for UNIX domain sockets.
|
| options/nixos/services.kerberos_server.settings.realms.<name>.acl.*.principal | Which principal the rule applies to
|
| options/nixos/services.castopod.database.hostname | Database hostname.
|
| options/nixos/services.freshrss.webserver | Whether to use nginx or caddy for virtual host management
|
| options/nixos/services.dokuwiki.webserver | Whether to use nginx or caddy for virtual host management
|
| options/nixos/programs.tsmClient.servers | Server definitions ("stanzas")
for the client system-options file
|
| options/nixos/services.code-server.host | The host name or IP address the server should listen to.
|
| options/nixos/services.gitea.dump.file | Filename to be used for the dump
|
| options/nixos/services.avahi.domainName | Domain name for all advertisements.
|
| options/nixos/services.movim.domain | Fully-qualified domain name (FQDN) for the Movim instance.
|
| options/nixos/services.patroni.scope | Cluster name.
|
| options/nixos/services.nats.serverName | Name of the NATS server, must be unique if clustered.
|
| options/nixos/users.mysql.pam.logging.table | The name of the table to which logs are written.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.mobike | Enables MOBIKE on IKEv2 connections
|
| options/nixos/services.biboumi.settings.hostname | The hostname served by the XMPP gateway
|
| options/nixos/services.prometheus.exporters.sql.configuration.jobs.<name>.queries | SQL queries to run.
|
| options/nixos/services.tor.relay.onionServices.<name>.settings.HiddenServiceNumIntroductionPoints | See torrc manual.
|
| options/nixos/services.kerberos_server.settings.realms.<name>.acl.*.access | The changes the principal is allowed to make.
The "all" permission does not imply the "get-keys" permission
|
| options/nixos/services.parsedmarc.provision.localMail.recipientName | The DMARC mail recipient name, i.e. the name part of the
email address which receives DMARC reports
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.filters.*.name | Name of the filter
|
| options/nixos/services.kubernetes.proxy.hostname | Kubernetes proxy hostname override.
|
| options/nixos/services.maubot.settings.server.hostname | The IP to listen on
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.dpd_delay | Interval to check the liveness of a peer actively using IKEv2
INFORMATIONAL exchanges or IKEv1 R_U_THERE messages
|
| options/nixos/virtualisation.oci-containers.containers.<name>.preRunExtraOptions | Extra options for podman that go before the run argument.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.login.registry | Registry where to login to.
|
| options/nixos/services.avahi.hostName | Host name advertised on the LAN
|
| options/nixos/services.nscd.config | Configuration to use for Name Service Cache Daemon
|
| options/nixos/services.murmur.user | The name of an existing user to use to run the service
|
| options/nixos/users.mysql.pam.updateTable | The name of the table used for password alteration
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.rand_time | Time range from which to choose a random value to subtract from
rekey/reauth times
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.if_id_in | XFRM interface ID set on inbound policies/SA, can be overridden by child
config, see there for details
|
| options/nixos/services.prometheus.remoteRead.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.vsmartcard-vpcd.hostname | Hostname of a waiting vpicc server vpcd will be connecting to
|
| options/nixos/services.prometheus.exporters.sql.configuration.jobs.<name>.startupSql | A list of SQL statements to execute once after making a connection.
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.exhaustivePermissions | When enabled, the user must authorize requested
permissions for all extensions from
programs.floorp.profiles.<profile>.extensions.packages
in
programs.floorp.profiles.<profile>.extensions.settings.<extensionID>.permissions
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.persistentKeepalive | This is optional and is by default off, because most
users will not need it
|
| options/nixos/services.samba-wsdd.domain | Set domain name (disables workgroup).
|
| options/nixos/services.monica.mail.fromName | Mail "from" name.
|
| options/nixos/services.tmate-ssh-server.host | External host name
|
| options/nixos/services.vault.address | The name of the ip interface to listen to
|
| options/nixos/virtualisation.fileSystems.<name>.overlay.useStage1BaseDirectories | If enabled, lowerdir, upperdir and workdir will be prefixed with /sysroot
|
| options/nixos/services.cyrus-imap.group | Cyrus IMAP group name
|
| options/nixos/networking.wireguard.interfaces.<name>.dynamicEndpointRefreshSeconds | Periodically refresh the endpoint hostname or address for all peers
|
| options/nixos/services.nextjs-ollama-llm-ui.hostname | The hostname under which the Ollama UI interface should be accessible
|
| options/nixos/services.prometheus.remoteWrite.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.send_cert | Send certificate payloads when using certificate authentication.
- With the default of
ifasked the daemon sends
certificate payloads only if certificate requests have been received.
never disables sending of certificate payloads
altogether,
always causes certificate payloads to be sent
unconditionally whenever certificate authentication is used
|
| options/nixos/_module.args | Additional arguments passed to each module in addition to ones
like lib, config,
and pkgs, modulesPath
|
| options/darwin/_module.args | Additional arguments passed to each module in addition to ones
like lib, config,
and pkgs, modulesPath
|
| options/home-manager/_module.args | Additional arguments passed to each module in addition to ones
like lib, config,
and pkgs, modulesPath
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.path | Unix domain socket path to bind this listener to.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.login.passwordFile | Path to file containing password.
|
| options/nixos/services.vmagent.remoteWrite.basicAuthUsername | Basic Auth username used to connect to remote_write endpoint
|
| options/nixos/services.vlagent.remoteWrite.basicAuthUsername | Basic Auth username used to connect to remote_write endpoint
|
| options/nixos/virtualisation.oci-containers.containers.<name>.log-driver | Logging driver for the container
|
| options/nixos/services.borgmatic.configurations.<name>.repositories.*.path | Path to the repository
|
| options/nixos/virtualisation.oci-containers.containers.<name>.volumes | List of volumes to attach to this container
|
| options/nixos/services.prometheus.exporters.sql.configuration.jobs.<name>.interval | How often to run this job, specified in
Go duration format.
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.exhaustivePermissions | When enabled, the user must authorize requested
permissions for all extensions from
programs.firefox.profiles.<profile>.extensions.packages
in
programs.firefox.profiles.<profile>.extensions.settings.<extensionID>.permissions
|
| options/nixos/services.kismet.serverName | The name of the server.
|
| options/nixos/services.dovecot2.user | Dovecot user name.
|
| options/home-manager/programs.sapling.userName | Default user name to use.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.privileged | Give extended privileges to the container
|
| options/nixos/virtualisation.oci-containers.containers.<name>.entrypoint | Override the default entrypoint of the image.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.if_id_out | XFRM interface ID set on outbound policies/SA, can be overridden by child
config, see there for details
|
| options/nixos/services.influxdb2.provision.organizations.<name>.description | Optional description for the organization.
|
| options/nixos/services.borgmatic.configurations.<name>.repositories.*.label | Label to the repository
|
| options/nixos/services.wordpress.webserver | Whether to use apache2 or nginx for virtual host management
|
| options/nixos/services.tsmBackup.servername | Create a systemd system service
tsm-backup.service that starts
a backup based on the given servername's stanza
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/security.ipa.shells | List of shells which binaries should be installed to /bin/
|
| options/nixos/services.librenms.user | Name of the LibreNMS user.
|
| options/nixos/services.gdomap.enable | Whether to enable GNUstep Distributed Objects name server.
|
| options/nixos/services.davfs2.davUser | When invoked by root the mount.davfs daemon will run as this user
|
| options/nixos/services.murmur.group | The name of an existing group to use to run the service
|
| options/nixos/services.weblate.smtp.user | SMTP login name.
|
| options/home-manager/programs.termite.iconName | The name of the icon to be used for the terminal process.
|
| options/nixos/services.discourse.database.username | Discourse database user.
|
| options/nixos/services.keycloak.settings.hostname | The hostname part of the public URL used as base for
all frontend requests
|
| options/nixos/services.ncdns.identity.hostname | The hostname of this ncdns instance, which defaults to the machine
hostname
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.aggressive | Enables Aggressive Mode instead of Main Mode with Identity
Protection
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote_port | Remote UDP port for IKE communication
|
| options/nixos/services.keter.bundle.appName | The name keter assigns to this bundle
|
| options/nixos/services.baikal.pool | Name of existing phpfpm pool that is used to run web-application
|
| options/nixos/services.guix.publish.user | Name of the user to change once the server is up.
|
| options/home-manager/i18n.inputMethod.fcitx5.themes | Themes to be written to $XDG_DATA_HOME/fcitx5/themes/${name}
|
| options/home-manager/programs.oh-my-posh.useTheme | Use one of the official themes
|
| options/nixos/services.limesurvey.nginx.virtualHost.serverName | Name of this virtual host
|
| options/nixos/virtualisation.sharedDirectories.<name>.securityModel | The security model to use for this share:
passthrough: files are stored using the same credentials as they are created on the guest (this requires QEMU to run as root)
mapped-xattr: some of the file attributes like uid, gid, mode bits and link target are stored as file attributes
mapped-file: the attributes are stored in the hidden .virtfs_metadata directory
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.ppk_required | Whether a Postquantum Preshared Key (PPK) is required for this connection
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.over_time | Hard IKE_SA lifetime if rekey/reauth does not complete, as time
|
| options/nixos/services.prometheus.scrapeConfigs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.matrix-continuwuity.settings.global.server_name | The server_name is the name of this server
|
| options/nixos/services.bacula-fd.tls.verifyPeer | Verify peer certificate
|
| options/nixos/services.bacula-sd.tls.verifyPeer | Verify peer certificate
|
| options/nixos/virtualisation.oci-containers.containers.<name>.environment | Environment variables to set for this container.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.password_command | Shell command which will print a password to stdout for basic HTTP
authentication
|
| options/nixos/services.echoip.enableReverseHostnameLookups | Whether to enable reverse hostname lookups.
|
| options/nixos/services.kubernetes.kubelet.hostname | Kubernetes kubelet hostname override.
|
| options/nixos/services.teeworlds.game.tournamentMode | Whether to enable tournament mode
|
| options/nixos/boot.zfs.forceImportAll | Forcibly import all ZFS pool(s)
|
| options/nixos/services.dovecot2.group | Dovecot group name.
|
| options/nixos/services.rspamd.locals | Local configuration files, written into /etc/rspamd/local.d/{name}.
|
| options/nixos/services.tt-rss.virtualHost | Name of the nginx virtualhost to use and setup
|
| options/nixos/services.tt-rss.email.fromName | Name for sending outgoing mail
|
| options/nixos/containers | A set of NixOS system configurations to be run as lightweight
containers
|
| options/nixos/services.bacula-dir.tls.verifyPeer | Verify peer certificate
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.resources | List of HTTP resources to serve on this listener.
|
| options/nixos/services.zfs.autoReplication.username | Username used by SSH to login to remote host.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local_port | Local UDP port for IKE communication
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.dpd_timeout | Charon by default uses the normal retransmission mechanism and timeouts to
check the liveness of a peer, as all messages are used for liveness
checking
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.dynamicEndpointRefreshSeconds | Periodically re-execute the wg utility every
this many seconds in order to let WireGuard notice DNS / hostname
changes
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.exhaustivePermissions | When enabled, the user must authorize requested
permissions for all extensions from
programs.librewolf.profiles.<profile>.extensions.packages
in
programs.librewolf.profiles.<profile>.extensions.settings.<extensionID>.permissions
|
| options/nixos/services.gitlab-runner.services.<name>.authenticationTokenConfigFile | Absolute path to a file containing environment variables used for
gitlab-runner registrations with runner authentication tokens
|
| options/nixos/services.prometheus.exporters.ebpf.names | List of eBPF programs to load
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.rekey_time | IKE rekeying refreshes key material using a Diffie-Hellman exchange, but
does not re-check associated credentials
|
| options/home-manager/programs.rofi.theme | Name of theme or path to theme file in rasi format or attribute set with
theme configuration
|
| options/nixos/services.grav.virtualHost | Name of the nginx virtualhost to use and setup
|
| options/nixos/services.epmd.enable | Whether to enable socket activation for Erlang Port Mapper Daemon (epmd),
which acts as a name server on all hosts involved in distributed
Erlang computations.
|
| options/nixos/services.librenms.group | Name of the LibreNMS group.
|
| options/nixos/services.outline.smtp.host | Host name or IP address of the SMTP server.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.keyingtries | Number of retransmission sequences to perform during initial
connect
|
| options/nixos/services.tor.settings.ServerDNSAllowNonRFC953Hostnames | See torrc manual.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.imageStream | Path to a script that streams the desired image on standard output
|
| options/nixos/virtualisation.oci-containers.containers.<name>.environmentFiles | Environment files for this container.
|
| options/nixos/hardware.nvidia-container-toolkit.enable-hooks | List of hooks to enable when generating the CDI specification
|
| options/nixos/services.varnish.listen.*.address | If given an IP address, it can be a host name ("localhost"), an IPv4 dotted-quad
("127.0.0.1") or an IPv6 address enclosed in square brackets ("[::1]").
(VCL4.1 and higher) If given an absolute Path ("/path/to/listen.sock") or "@"
followed by the name of an abstract socket ("@myvarnishd") accept connections
on a Unix domain socket
|
| options/nixos/services.discourse.mail.outgoing.username | The username of the SMTP server.
|
| options/nixos/services.jibri.xmppEnvironments.<name>.disableCertificateVerification | Whether to skip validation of the server's certificate.
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.persistentKeepalive | This is optional and is by default off, because most
users will not need it
|
| options/nixos/services.k3s.autoDeployCharts | Auto deploying Helm charts that are installed by the k3s Helm controller
|
| options/nixos/services.sanoid.datasets.<name>.pre_snapshot_script | Script to run before taking snapshot.
|
| options/home-manager/programs.vicinae.extensions | List of Vicinae extensions to install
|
| options/nixos/console.font | The font used for the virtual consoles
|
| options/nixos/boot.iscsi-initiator.target | Name of the iSCSI target to boot from.
|
| options/nixos/services.dnsdist.enable | Whether to enable dnsdist domain name server.
|
| options/nixos/services.ircdHybrid.serverName | IRCD server name.
|
| options/nixos/services.slurm.controlAddr | Name that ControlMachine should be referred to in establishing a
communications path.
|
| options/nixos/services.unbound.enable | Whether to enable Unbound domain name server.
|
| options/nixos/services.keycloak.database.username | Username to use when connecting to an external or manually
provisioned database; has no effect when a local database is
automatically provisioned
|
| options/nixos/virtualisation.oci-containers.containers.<name>.podman.sdnotify | Determines how podman should notify systemd that the unit is ready
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.dynamicEndpointRefreshRestartSeconds | When the dynamic endpoint refresh that is configured via
dynamicEndpointRefreshSeconds exits (likely due to a failure),
restart that service after this many seconds
|
| options/nixos/services.filesender.database.hostname | Database hostname.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.unique | Connection uniqueness policy to enforce
|
| options/home-manager/programs.offlineimap.extraConfig.mbnames | Extra configuration options added to the
mbnames section.
|
| options/nixos/services.zoneminder.database.username | Username for accessing the database.
|
| options/nixos/services.strongswan-swanctl.swanctl.pools | Section defining named pools
|
| options/nixos/services.forgejo.dump.file | Filename to be used for the dump
|
| options/nixos/services.mjpg-streamer.user | mjpg-streamer user name.
|
| options/nixos/services.prosody.muc.*.domain | Domain name of the MUC
|
| options/nixos/services.rss-bridge.pool | Name of phpfpm pool that is used to run web-application
|
| options/home-manager/programs.lutris.runners.<name>.settings.runner.runner_executable | Specific option to point to a runner executable directly, don't set runner.package if you set this
|
| options/nixos/services.pgpkeyserver-lite.hostname | Which hostname to set the vHost to that is proxying to sks.
|
| options/nixos/services.jitsi-videobridge.xmppConfigs.<name>.disableCertificateVerification | Whether to skip validation of the server's certificate.
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.login | Grants the user, created by the ensureUser attr, login permissions
|
| options/nixos/services.rke2.autoDeployCharts | Auto deploying Helm charts that are installed by the rke2 Helm controller
|
| options/nixos/services.prometheus.exporters.sql.configuration.jobs.<name>.connections | A list of connection strings of the SQL servers to scrape metrics from
|
| options/nixos/services.sanoid.templates.<name>.pre_snapshot_script | Script to run before taking snapshot.
|
| options/nixos/services.dawarich.smtp.user | SMTP login name.
|
| options/nixos/boot.initrd.luks.devices | The encrypted disk that should be opened before the root
filesystem is mounted
|
| options/nixos/services.asusd.auraConfigs | The content of /etc/asusd/aura_.ron
|
| options/nixos/services.flannel.iface | Interface to use (IP or name) for inter-host communication
|
| options/nixos/services.mastodon.smtp.user | SMTP login name.
|
| options/nixos/services.resilio.deviceName | Name of the Resilio Sync device.
|
| options/nixos/services.selfoss.pool | Name of existing phpfpm pool that is used to run web-application
|
| options/nixos/users.mysql.pam.passwordColumn | The name of the column that contains a (encrypted) password string.
|
| options/nixos/services.lasuite-docs.domain | Domain name of the docs instance.
|
| options/nixos/users.mysql.pam.logging.msgColumn | The name of the column in the log table to which the description
of the performed operation is stored.
|
| options/nixos/services.lasuite-meet.domain | Domain name of the meet instance.
|
| options/home-manager/programs.yazi.shellWrapperName | Name of the shell wrapper to be called.
|
| options/nixos/hardware.nvidia-container-toolkit.disable-hooks | List of hooks to disable when generating the CDI specification
|
| options/nixos/services.mjolnir.pantalaimon.username | The username to login with.
|
| options/nixos/services.shellhub-agent.preferredHostname | Set the device preferred hostname
|
| options/nixos/virtualisation.oci-containers.containers.<name>.ports | Network ports to publish from the container to the outer host
|
| options/nixos/boot.kernelPatches | A list of additional patches to apply to the kernel
|
| options/nixos/services.borgmatic.configurations.<name>.repositories | A required list of local or remote repositories with paths and
optional labels (which can be used with the --repository flag to
select a repository)
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local_addrs | Local address(es) to use for IKE communication
|
| options/nixos/networking.networkmanager.ensureProfiles.profiles.<name>.connection.type | The connection type defines the connection kind, like vpn, wireguard, gsm, wifi and more.
|
| options/nixos/systemd.automounts.*.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/security.tpm2.fapi.profileName | Name of the default cryptographic profile chosen from the profile_dir directory.
|
| options/nixos/services.dolibarr.domain | Domain name of your server.
|
| options/nixos/services.calibre-web.dataDir | Where Calibre-Web stores its data
|
| options/nixos/services.jicofo.xmppDomain | Domain name of the XMMP server to which to connect as a component
|
| options/nixos/services.saunafs.masterHost | IP or hostname name of master host.
|
| options/nixos/services.nixops-dns.domain | Fake domain name to resolve to NixOps virtual machines
|
| options/nixos/services.nscd.enable | Whether to enable the Name Service Cache Daemon
|
| options/nixos/services.rshim.index | Specify the index to create device path /dev/rshim<index>
|
| options/nixos/services.pretix.nginx.domain | The domain name under which to set up the virtual host.
|
| options/nixos/services.spiped.config | Configuration for a secure pipe daemon
|
| options/nixos/services.wiki-js.settings.db.db | Name of the database to use.
|
| options/nixos/xdg.portal.config | Sets which portal backend should be used to provide the implementation
for the requested interface
|
| options/home-manager/xdg.portal.config | Sets which portal backend should be used to provide the implementation
for the requested interface
|
| options/home-manager/programs.kitty.themeFile | Apply a Kitty color theme
|
| options/nixos/virtualisation.oci-containers.containers.<name>.capabilities | Capabilities to configure for the container
|
| options/nixos/services.dsnet.settings.ExternalHostname | The hostname that clients should use to connect to this server
|
| options/nixos/services.dovecot2.imapsieve.mailbox.*.from | Only execute the administrator Sieve scripts for the mailbox configured with services.dovecot2.imapsieve.mailbox..name when the message originates from the indicated mailbox
|
| options/nixos/services.dovecot2.imapsieve.mailbox.*.causes | Only execute the administrator Sieve scripts for the mailbox configured with services.dovecot2.imapsieve.mailbox..name when one of the listed IMAPSIEVE causes apply
|
| options/nixos/services.dependency-track.oidc.teams.claim | Defines the name of the claim that contains group memberships or role assignments in the provider's userinfo endpoint
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.serverName | Name of this virtual host
|
| options/nixos/services.reposilite.settings.hostname | The hostname to bind to
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.send_certreq | Send certificate request payloads to offer trusted root CA certificates to
the peer
|
| options/home-manager/services.xcape.mapExpression | The value has the grammar Key[|OtherKey]
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.x_forwarded | Use the X-Forwarded-For (XFF) header as the client IP and not the
actual client IP.
|
| options/nixos/programs.zsh.enable | Whether to configure zsh as an interactive shell
|
| options/nixos/services.jigasi.xmppDomain | Domain name of the XMMP server to which to connect as a component
|
| options/nixos/services.mjpg-streamer.group | mjpg-streamer group name.
|
| options/nixos/services.moosefs.masterHost | IP or DNS name of the MooseFS master server.
|
| options/nixos/services.openafsClient.cellName | Cell name.
|
| options/nixos/services.nixops-dns.enable | Whether to enable the nixops-dns resolution
of NixOps virtual machines via dnsmasq and fake domain name.
|
| options/nixos/users.mysql.pam.logging.timeColumn | The name of the column in the log table to which the timestamp of the
log entry is stored.
|
| options/home-manager/services.cachix-agent.profile | The Nix profile name.
|
| options/nixos/services.nginx.resolver | Configures name servers used to resolve names of upstream servers into addresses
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.reauth_time | Time to schedule IKE reauthentication
|
| options/nixos/services.tlsrpt.reportd.settings.organization_name | Name of the organization sending out the reports.
|
| options/nixos/services.postfix.settings.main.myhostname | The internet hostname of this mail system
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.cert_uri_base | Defines the base URI for the Hash and URL feature supported by
IKEv2
|
| options/nixos/services.firezone.server.provision.accounts.<name>.features.flow_activities | Whether to enable the flow_activities feature for this account.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.features.traffic_filters | Whether to enable the traffic_filters feature for this account.
|
| options/nixos/services.sanoid.datasets.<name>.post_snapshot_script | Script to run after taking snapshot.
|
| options/nixos/services.freshrss.pool | Name of the php-fpm pool to use and setup
|
| options/nixos/services.agorakit.mail.fromName | Mail "from" name.
|
| options/nixos/services.mongodb.replSetName | If this instance is part of a replica set, set its name here
|
| options/nixos/users.mysql.pam.logging.pidColumn | The name of the column in the log table to which the pid of the
process utilising the pam_mysql authentication
service is stored.
|
| options/nixos/services.varnish.listen.*.user | User name who owns the socket file.
|
| options/home-manager/programs.sbt.repositories | A list of repositories to use when resolving dependencies
|
| options/nixos/services.suricata.settings.unix-command.filename | Filename for unix-command socket.
|
| options/nixos/services.grafana.settings.database.server_cert_name | The common name field of the certificate used by the mysql or postgres server
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.childless | Use childless IKE_SA initiation (allow, prefer, force or never)
|
| options/nixos/services.jupyter.group | Name of the group used to run the jupyter service
|
| options/nixos/services.cachix-agent.profile | Profile name, defaults to 'system' (NixOS).
|
| options/nixos/services.davfs2.davGroup | The group of the running mount.davfs daemon
|
| options/nixos/services.baikal.virtualHost | Name of the nginx virtualhost to use and setup
|
| options/nixos/services.ceph.global.clusterName | Name of cluster
|
| options/nixos/services.sympa.web.server | The webserver used for the Sympa web interface
|
| options/nixos/services.powerdns.enable | Whether to enable PowerDNS domain name server.
|
| options/nixos/services.rshim.backend | Specify the backend to attach
|
| options/nixos/services.weblate.localDomain | The domain name serving your Weblate instance.
|
| options/home-manager/services.wlsunset.output | Name of output to use, by default all outputs are used.
|
| options/home-manager/programs.yazi.plugins | Lua plugins
|
| options/nixos/services.kapacitor.defaultDatabase.username | The username to connect to the remote InfluxDB server
|
| options/nixos/networking.hostName | The name of the machine
|
| options/nixos/services.victorialogs.basicAuthUsername | Basic Auth username used to protect VictoriaLogs instance by authorization
|
| options/nixos/services.paperless.passwordFile | A file containing the superuser password
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.resources.*.compress | Whether synapse should compress HTTP responses to clients that support it
|
| options/nixos/services.sanoid.templates.<name>.post_snapshot_script | Script to run after taking snapshot.
|
| options/nixos/services.dawarich.user | User under which dawarich runs
|
| options/nixos/services.echoip.virtualHost | Name of the nginx virtual host to use and setup
|
| options/nixos/services.gitlab.databaseName | GitLab database name.
|
| options/nixos/services.cachix-watch-store.cacheName | Cachix binary cache name
|
| options/nixos/services.openafsServer.cellName | Cell name, this server will serve.
|
| options/nixos/services.smokeping.owner | Real name of the owner of the instance
|
| options/nixos/services.weechat.sessionName | Name of the screen session for weechat.
|
| options/nixos/services.znc.confOptions.userName | The user name used to log in to the ZNC web admin interface.
|
| options/home-manager/programs.claude-code.hooks | Custom hooks for Claude Code
|
| options/home-manager/programs.yazi.flavors | Pre-made themes
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.proposals | A proposal is a set of algorithms
|
| options/nixos/services.prometheus.alertmanagerGotify.metrics.namespace | The namescape of the metrics.
|
| options/nixos/services.authelia.instances.<name>.settings.default_2fa_method | Default 2FA method for new users and fallback for preferred but disabled methods.
|
| options/nixos/services.nullmailer.config.defaulthost | The content of this attribute is appended to any address that
is missing a host name
|
| options/nixos/services.bitlbee.hostName | Normally, BitlBee gets a hostname using getsockname()
|
| options/nixos/services.jupyter.user | Name of the user used to run the jupyter service
|
| options/nixos/services.alerta.databaseName | Name of the database instance to connect to
|
| options/nixos/services.opendkim.keyPath | The path that opendkim should put its generated private keys into
|
| options/nixos/services.pretalx.nginx.domain | The domain name under which to set up the virtual host.
|
| options/nixos/services.varnish.listen.*.group | Group name who owns the socket file.
|
| options/home-manager/programs.mercurial.userName | Default user name to use.
|
| options/nixos/services.mqtt2influxdb.mqtt.username | Username used to connect to the MQTT server.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.mediation_peer | Identity under which the peer is registered at the mediation server, that
is, the IKE identity the other end of this connection uses as its local
identity on its connection to the mediation server
|
| options/nixos/services.tlsrpt.collectd.settings.socketname | Path at which the UNIX socket will be created.
|
| options/nixos/services.gammu-smsd.backend.sql.user | User name used for connection to the database
|
| options/nixos/services.ddclient.domains | Domain name(s) to synchronize.
|
| options/nixos/services.smokeping.hostName | DNS name for the urls generated in the cgi.
|
| options/nixos/services.rss-bridge.virtualHost | Name of the nginx or caddy virtualhost to use and setup
|
| options/nixos/services.netatalk.extmap | File name extension mappings
|
| options/nixos/services.sympa.database.user | Database user
|
| options/nixos/services.prometheus.exporters.nginxlog.settings.namespaces | Namespaces to collect the metrics for
|
| options/nixos/services.xserver.displayManager.lightdm.greeter.package | The LightDM greeter to login via
|
| options/nixos/hardware.display.edid.linuxhw | Exposes EDID files from users-sourced database at https://github.com/linuxhw/EDID
Attribute names will be mapped to EDID filenames <NAME>.bin
|
| options/nixos/services.spacecookie.settings.hostname | The hostname the service is reachable via
|
| options/nixos/services.samba.nmbd.enable | Whether to enable Samba's nmbd, which replies to NetBIOS over IP name
service requests
|
| options/nixos/services.smokeping.user | User that runs smokeping and (optionally) thttpd
|
| options/nixos/services.vault.storageBackend | The name of the type of storage backend
|
| options/nixos/services.wakapi.database.user | The name of the user to use for Wakapi.
|
| options/darwin/services.gitlab-runner.sentryDSN | Data Source Name for tracking of all system level errors to Sentry.
|
| options/home-manager/vdirsyncer.userNameCommand | A command that prints the user name to standard output.
|
| options/home-manager/programs.radio-active.aliases | Key/value pairs where the key is name of radio station and value is URL.
|
| options/home-manager/services.gromit-mpx.tools.*.device | Use this tool with the given xinput device
|
| options/nixos/services.sanoid.datasets.<name>.process_children_only | Whether to only snapshot child datasets if recursing.
|
| options/nixos/services.bird-lg.frontend.domain | Server name domain suffixes.
|
| options/nixos/services.avahi.publish.domain | Whether to announce the locally used domain name for browsing by other hosts.
|
| options/nixos/boot.initrd.secrets | Secrets to append to the initrd
|
| options/nixos/programs.regreet.font.package | The package that provides the font given in the name option.
|
| options/nixos/services.gitlab.registry.host | GitLab container registry host name.
|
| options/nixos/services.oidentd.enable | Whether to enable ‘oidentd’, an implementation of the Ident
protocol (RFC 1413)
|
| options/nixos/services.pangolin.baseDomain | Your base fully qualified domain name (without any subdomains).
|
| options/home-manager/programs.sbt.plugins.*.artifact | The name of the artifact.
|
| options/nixos/services.prometheus.exporters.mqtt.mqttUsername | Username which should be used to authenticate against the MQTT broker.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags.directory_separator | Directory separator for mapping notmuch tags to maildirs.
|
| options/nixos/services.samba.nsswins | Whether to enable WINS NSS (Name Service Switch) plug-in
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.bind_addresses | IP addresses to bind the listener to.
|
| options/nixos/services.xserver.displayManager.session | List of sessions supported with the command used to start each
session
|
| options/nixos/services.bookstack.mail.fromName | Mail "from" name.
|
| options/nixos/services.corosync.clusterName | Name of the corosync cluster.
|
| options/nixos/services.prefect.databaseName | database name for postgres only
|
| options/nixos/services.smokeping.linkStyle | DNS name for the urls generated in the cgi.
|
| options/nixos/services.netbird.enable | Enables backward-compatible NetBird client service
|
| options/nixos/services.samba-wsdd.workgroup | Set workgroup name (default WORKGROUP).
|
| options/nixos/services.tomcat.virtualHosts | List consisting of a virtual host name and a list of web applications to deploy on each virtual host
|
| options/home-manager/programs.qutebrowser.searchEngines | Search engines that can be used via the address bar
|
| options/nixos/services.suwayomi-server.settings.server.basicAuthUsername | The username value that you have to provide when authenticating.
|
| options/nixos/services.nvme-rs.settings.email.smtp_username | SMTP username
|
| options/nixos/services.dependency-track.database.username | Username to use when connecting to an external or manually
provisioned database; has no effect when a local database is
automatically provisioned
|
| options/nixos/services.firezone.server.provision.accounts.<name>.features.internet_resource | Whether to enable the internet_resource feature for this account.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.features.policy_conditions | Whether to enable the policy_conditions feature for this account.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.fragmentation | Use IKE fragmentation (proprietary IKEv1 extension or RFC 7383 IKEv2
fragmentation)
|
| options/nixos/services.factorio.stateDirName | Name of the directory under /var/lib holding the server's data
|
| options/nixos/services.autorandr.matchEdid | Match displays based on edid instead of name
|
| options/nixos/services.shairport-sync.user | User account name under which to run shairport-sync
|
| options/nixos/services.misskey.settings.db.db | The database name.
|
| options/nixos/services.xserver.videoDriver | The name of the video driver for your graphics card
|
| options/home-manager/services.autorandr.matchEdid | Match displays based on edid instead of name.
|
| options/nixos/services.influxdb2.provision.initialSetup.username | Primary username
|
| options/nixos/services.prometheus.exporters.dmarc.imap.username | Login username for the IMAP connection.
|
| options/nixos/services.athens.storage.s3.bucket | Bucket name for the S3 storage backend.
|
| options/nixos/programs.regreet.theme.package | The package that provides the theme given in the name option.
|
| options/nixos/services.ncps.cache.storage.s3.bucket | The name of the S3 bucket.
|
| options/nixos/services.usbrelayd.clientName | Name, your client connects as.
|
| options/home-manager/programs.lazygit.shellWrapperName | Name of the shell wrapper to be called.
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.ignore_remote_labels | Set Gmail labels to ignore when syncing from remote labels to
local tags (before translations).
|
| options/nixos/services.avahi.nssmdns4 | Whether to enable the mDNS NSS (Name Service Switch) plug-in for IPv4
|
| options/nixos/services.gnome.at-spi2-core.enable | Whether to enable at-spi2-core, a service for the Assistive Technologies
available on the GNOME platform
|
| options/nixos/services.bird-lg.frontend.servers | Server name prefixes.
|
| options/nixos/services.factorio.saveName | The name of the savegame that will be used by the server
|
| options/nixos/services.jigasi.defaultJvbRoomName | Name of the default JVB room that will be joined if no special header is included in SIP invite.
|
| options/nixos/services.freshrss.virtualHost | Name of the caddy/nginx virtualhost to use and setup.
|
| options/nixos/services.mattermost.siteName | Name of this Mattermost site.
|
| options/nixos/services.prosody.httpFileShare.domain | Domain name for a http_file_share service.
|
| options/nixos/services.miredo.interfaceName | Name of the network tunneling interface.
|
| options/nixos/swapDevices.*.encrypted.label | Label of the unlocked encrypted device
|
| options/nixos/services.suricata.settings.logging.outputs.file.filename | Filename of the logfile.
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.ignore_empty_history | Work around a Gmail API quirk where an empty change history
is sometimes returned
|
| options/nixos/services.oauth2-proxy.nginx.virtualHosts.<name>.allowed_email_domains | List of email domains to allow access to this vhost, or null to allow all.
|
| options/nixos/services.prosody.uploadHttp.domain | Domain name for the http-upload service
|
| options/nixos/services.keyd.keyboards | Configuration for one or more device IDs
|
| options/nixos/services.autossh.sessions.*.user | Name of the user the AutoSSH session should run as
|
| options/nixos/services.kresd.enable | Whether to enable knot-resolver (version 5) domain name server
|
| options/nixos/services.httpd.extraModules | Additional Apache modules to be used
|
| options/nixos/services.outline.storage.region | AWS S3 region name.
|
| options/nixos/services.shairport-sync.group | Group account name under which to run shairport-sync
|
| options/nixos/services.rspamd.overrides | Overridden configuration files, written into /etc/rspamd/override.d/{name}.
|
| options/darwin/services.autossh.sessions.*.user | Name of the user the AutoSSH session should run as
|
| options/home-manager/programs.ncmpcpp.settings | Attribute set from name of a setting to its value
|
| options/home-manager/programs.gnome-shell.theme.package | Package providing a GNOME Shell theme in
$out/share/themes/${name}/gnome-shell.
|
| options/nixos/services.nextcloud-spreed-signaling.backends | A list of backends from which clients are allowed to connect from
|
| options/nixos/services.consul.interface.bind | The name of the interface to pull the bind_addr from.
|
| options/nixos/services.airsonic.virtualHost | Name of the nginx virtualhost to use and setup
|
| options/nixos/services.discourse.admin.fullName | The admin user's full name.
|
| options/nixos/services.guacamole-server.host | The host name or IP address the server should listen to.
|
| options/nixos/services.cloudlog.virtualHost | Name of the nginx virtualhost to use and setup
|
| options/nixos/services.wiki-js.stateDirectoryName | Name of the directory in /var/lib.
|
| options/nixos/services.borgmatic.configurations.<name>.source_directories | List of source directories and files to backup
|
| options/nixos/services.firezone.server.provision.accounts.<name>.features.self_hosted_relays | Whether to enable the self_hosted_relays feature for this account.
|
| options/nixos/services.cntlm.netbios_hostname | The hostname of your machine.
|
| options/nixos/services.matrix-synapse.log | Default configuration for the loggers used by matrix-synapse and its workers
|
| options/nixos/services.mqtt2influxdb.influxdb.username | Username for InfluxDB login.
|
| options/nixos/services.synergy.client.screenName | Use the given name instead of the hostname to identify
ourselves to the server.
|
| options/nixos/services.unpoller.influxdb.db | Database name
|
| options/nixos/services.thanos.rule.alert.label-drop | Labels by name to drop before sending to alertmanager
|
| options/nixos/services.youtrack.virtualHost | Name of the nginx virtual host to use and setup
|
| options/darwin/services.synergy.client.screenName | Use the given name instead of the hostname to identify
ourselves to the server.
|
| options/nixos/services.prometheus.remoteRead.*.basic_auth.username | HTTP username
|
| options/nixos/services.nextcloud.config.objectstore.s3.hostname | Required for some non-Amazon implementations.
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.remove_local_messages | Remove local messages that have been deleted on the remote.
|
| options/nixos/systemd.network.config.routeTables | Defines route table names as an attrset of name to number
|
| options/nixos/programs.regreet.iconTheme.package | The package that provides the icon theme given in the name option.
|
| options/nixos/services.synergy.server.screenName | Use the given name instead of the hostname to identify
this screen in the configuration.
|
| options/nixos/services.stargazer.routes.*.route | Route section name
|
| options/nixos/services.lasuite-meet.settings.DB_NAME | Name of the database
|
| options/nixos/services.lasuite-docs.settings.DB_NAME | Name of the database
|
| options/darwin/services.synergy.server.screenName | Use the given name instead of the hostname to identify
this screen in the configuration.
|
| options/home-manager/programs.claude-code.agents | Custom agents for Claude Code
|
| options/nixos/services.prometheus.exporters.pihole.piholeHostname | Hostname or address where to find the Pi-Hole webinterface
|
| options/nixos/services.victoriatraces.basicAuthUsername | Basic Auth username used to protect VictoriaTraces instance by authorization
|
| options/nixos/services.bitwarden-directory-connector-cli.ldap.username | The user to authenticate as.
|
| options/nixos/services.prometheus.remoteWrite.*.basic_auth.username | HTTP username
|
| options/nixos/services.matrix-synapse.settings.listeners.*.resources.*.names | List of resources to host on this listener.
|
| options/nixos/services.bitwarden-directory-connector-cli.ldap.hostname | The host the LDAP is accessible on.
|
| options/nixos/services.cloudlog.database.user | MySQL user name.
|
| options/nixos/services.nix-serve.secretKeyFile | The path to the file used for signing derivation data
|
| options/nixos/services.syncplay.useACMEHost | If set, use NixOS-generated ACME certificate with the specified name for TLS
|
| options/nixos/services.slurm.dbdserver.dbdHost | Hostname of the machine where slurmdbd
is running (i.e. name returned by hostname -s).
|
| options/nixos/services.supybot.plugins | Attribute set of additional plugins that will be symlinked to the
plugin subdirectory
|
| options/nixos/services.zabbixWeb.httpd.virtualHost | Apache configuration can be done by adapting services.httpd.virtualHosts.<name>
|
| options/nixos/services.zabbixWeb.nginx.virtualHost | Nginx configuration can be done by adapting services.nginx.virtualHosts.<name>
|
| options/nixos/services.dependency-track.settings."alpine.oidc.teams.claim" | Defines the name of the claim that contains group memberships or role assignments in the provider's userinfo endpoint
|
| options/nixos/services.nullmailer.config.defaultdomain | The content of this attribute is appended to any host name that
does not contain a period (except localhost), including defaulthost
and idhost
|
| options/nixos/services.athens.storage.minio.bucket | Bucket name for the minio storage backend.
|
| options/nixos/services.soju.acceptProxyIP | Allow the specified IPs to act as a proxy
|
| options/nixos/services.writefreely.host | The public host name to serve.
|
| packages/nixpkgs/dlx | DLX simulator written in C |
| options/nixos/services.hatsu.settings.HATSU_DOMAIN | The domain name of your instance (eg 'hatsu.local').
|
| options/nixos/services.icingaweb2.pool | Name of existing PHP-FPM pool that is used to run Icingaweb2
|
| options/nixos/image.repart.verityStore.partitionIds.esp | Specify the attribute name of the ESP.
|
| options/nixos/services.coder.database.database | Name of database.
|
| options/nixos/services.cjdns.ETHInterface.bind | Bind to this device for native ethernet operation.
all is a pseudo-name which will try to connect to all devices.
|
| options/nixos/services.cadvisor.storageDriverDb | Cadvisord storage driver database name.
|
| options/nixos/services.athens.index.mysql.database | Database name for the MySQL database.
|
| options/nixos/services.multipath.devices.*.prio | The name of the path priority routine
|
| options/home-manager/programs.zsh.siteFunctions | Functions that are added to the Zsh environment and are subject to
autoloading
|
| options/home-manager/programs.claude-code.rules | Modular rule files for Claude Code
|
| options/home-manager/programs.neomutt.sidebar.shortPath | By default sidebar shows the full path of the mailbox, but
with this enabled only the relative name is shown.
|
| options/nixos/services.traefik.environmentFiles | Files to load as an environment file just before Traefik starts
|
| options/nixos/services.pds.settings.PDS_HOSTNAME | Instance hostname (base domain name)
|
| options/nixos/services.resolved.llmnr | Controls Link-Local Multicast Name Resolution support
(RFC 4795) on the local host
|
| options/nixos/hardware.firmware | List of packages containing firmware files
|
| options/nixos/services.davis.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.multipath.pathGroups.*.alias | The name of the multipath device
|
| options/nixos/services.movim.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.misskey.reverseProxy.host | The fully qualified domain name to bind to
|
| options/nixos/services.slskd.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.minetest-server.world | Name of the world to use
|
| options/nixos/services.nextcloud.settings.mail_smtpname | This depends on mail_smtpauth
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.replace_slash_with_dot | Replace '/' with '.' in Gmail labels.
|
| options/nixos/services.prometheus.exporters.py-air-control.deviceHostname | The hostname of the air purification device from which to scrape the metrics.
|
| options/nixos/networking.ucarp.upscript | Command to run after become master, the interface name, virtual address
and optional extra parameters are passed as arguments.
|
| options/nixos/boot.zfs.extraPools | Name or GUID of extra ZFS pools that you wish to import during boot
|
| options/nixos/services.slurm.controlMachine | The short hostname of the machine where SLURM control functions are
executed (i.e. the name returned by the command "hostname -s", use "tux001"
rather than "tux001.my.com").
|
| options/nixos/services.snipe-it.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.multipath.pathGroups.*.array | The DNS name of the storage array
|
| options/nixos/services.netbird.server.signal.domain | The domain name for the signal service.
|
| options/nixos/services.xserver.xrandrHeads.*.output | The output name of the monitor, as shown by
xrandr(1) invoked without arguments.
|
| packages/nixpkgs/perl538Packages.SubName | (Re)name a sub |
| packages/nixpkgs/perl540Packages.SubName | (Re)name a sub |
| options/nixos/services.dependency-track.settings."alpine.database.username" | Specifies the username to use when authenticating to the database.
|
| options/nixos/services.prometheus.scrapeConfigs.*.basic_auth.username | HTTP username
|
| options/nixos/services.mobilizon.settings.":mobilizon".":instance".hostname | Your instance's hostname
|
| options/nixos/services.knot-resolver.enable | Whether to enable knot-resolver (version 6) domain name server
|
| options/nixos/services.gitea.settings.server.DOMAIN | Domain name of your server.
|
| options/nixos/services.openvscode-server.host | The host name or IP address the server should listen to.
|
| options/nixos/services.mastodon.user | User under which mastodon runs
|
| options/nixos/services.tailscale.derper.domain | Domain name under which the derper server is reachable.
|
| options/nixos/services.restic.server.privateRepos | Enable private repos
|
| options/nixos/services.livekit.keyFile | LiveKit key file holding one or multiple application secrets
|
| options/nixos/services.vault-agent.instances | Attribute set of vault-agent instances
|
| options/nixos/services.buildbot-worker.adminMessage | Name of the administrator of this worker
|
| options/nixos/services._3proxy.resolution | Use this option to configure name resolution and DNS caching.
|
| options/nixos/programs.regreet.cursorTheme.package | The package that provides the cursor theme given in the name option.
|
| options/nixos/services.tailscale.authKeyFile | A file containing the auth key
|
| options/nixos/services.nominatim.enable | Whether to enable nominatim
|
| options/nixos/services.ncps.cache.lru.scheduleTimeZone | The name of the timezone to use for the cron schedule
|
| options/nixos/services.trilium-server.instanceName | Instance name used to distinguish between different instances
|
| options/darwin/system.defaults.finder._FXSortFoldersFirst | Keep folders on top when sorting by name
|
| options/nixos/services.prometheus.exporters.nextcloud.username | Username for connecting to Nextcloud
|
| options/nixos/services.victoriametrics.basicAuthUsername | Basic Auth username used to protect VictoriaMetrics instance by authorization
|
| options/nixos/services.postfix.networksStyle | Name of standard way of trusted network specification to use,
leave blank if you specify it explicitly or if you want to use
default (localhost-only).
|
| options/nixos/services.gotify.stateDirectoryName | The name of the directory below /var/lib where
gotify stores its runtime data.
|
| options/nixos/services.gancio.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.fluidd.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.gammu-smsd.backend.sql.database | Database name to store sms data
|
| options/nixos/programs.kubeswitch.commandName | The name of the command to use
|
| options/nixos/services.gitlab.registry.serviceName | GitLab container registry service name.
|
| options/nixos/services.akkoma.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.radicle.privateKeyFile | Absolute file path to an SSH private key,
usually generated by rad auth
|
| options/nixos/services.portunus.ldap.searchUserName | The login name of the search user
|
| options/nixos/services.matomo.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.monica.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.roundcube.enable | Whether to enable roundcube
|
| options/nixos/users.ldap.daemon.rootpwmoddn | The distinguished name to use to bind to the LDAP server
when the root user tries to modify a user's password.
|
| options/darwin/services.postgresql.identMap | Defines the mapping from system users to database users
|
| options/home-manager/programs.kubeswitch.commandName | The name of the command to use
|
| options/nixos/services.firezone.server.provision.accounts.<name>.features.multi_site_resources | Whether to enable the multi_site_resources feature for this account.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/image.repart.verityStore.partitionIds.store | Specify the attribute name of the store partition.
|
| options/nixos/services.lavalink.plugins.*.configName | The name of the plugin to use as the key for the plugin configuration.
|
| options/nixos/services.slurm.dbdserver.storageUser | Database user name.
|
| options/nixos/services.rustus.storage.s3_region | S3 region name.
|
| options/home-manager/programs.claude-code.commands | Custom commands for Claude Code
|
| options/home-manager/programs.zsh.prezto.tmux.defaultSessionName | Set the default session name.
|
| options/home-manager/programs.zed-editor.extensions | A list of the extensions Zed should install on startup
|
| options/nixos/services.sanoid.datasets.<name>.no_inconsistent_snapshot | Whether to take a snapshot if the pre script fails
|
| options/nixos/services.hickory-dns.settings.zones.*.zone | Zone name, like "example.com", "localhost", or "0.0.127.in-addr.arpa".
|
| options/nixos/services.httpd.customLogFormat | Defines a custom Apache HTTPD access log format string
|
| options/nixos/services.athens.storage.mongo.defaultDBName | Name of the mongo database.
|
| options/nixos/services.rosenpass.defaultDevice | Name of the network interface to use for all peers by default.
|
| options/nixos/services.prometheus.remoteRead.*.url | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/home-manager/programs.wezterm.colorSchemes | Attribute set of additional color schemes to be written to
$XDG_CONFIG_HOME/wezterm/colors, where each key is
taken as the name of the corresponding color scheme
|
| packages/nixpkgs/seppo | Personal Social Web |
| options/nixos/services.transmission.settings.script-torrent-done-filename | Executable to be run at torrent completion.
|
| options/nixos/services.acme-dns.settings.general.domain | Domain name to serve the requests off of.
|
| options/nixos/services.gancio.settings.db.database | Name of the PostgreSQL database
|
| options/nixos/hardware.trackpoint.device | The device name of the trackpoint
|
| options/nixos/services.cassandra.clusterName | The name of the cluster
|
| options/nixos/services.multipath.devices.*.vendor | Regular expression to match the vendor name
|
| options/nixos/services.samba.winbindd.enable | Whether to enable Samba's winbindd, which provides a number of services
to the Name Service Switch capability found in most modern C libraries,
to arbitrary applications via PAM and ntlm_auth and to Samba itself.
|
| options/nixos/services.unpoller.unifi.defaults.user | Unifi service user name.
|
| options/home-manager/programs.gnome-terminal.profile | A set of Gnome Terminal profiles
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.drop_non_existing_label | Allow missing labels on the Gmail side to be dropped.
|
| options/nixos/services.sanoid.templates.<name>.no_inconsistent_snapshot | Whether to take a snapshot if the pre script fails
|
| options/nixos/services.outline.oidcAuthentication.usernameClaim | Specify which claims to derive user information from
|
| options/nixos/nixpkgs.flake.source | The path to the nixpkgs sources used to build the system
|
| options/nixos/services.icingaweb2.virtualHost | Name of the nginx virtualhost to use and setup
|
| options/nixos/services.samba.usershares.group | Name of the group members of which will be allowed to create usershares
|
| options/nixos/services.nextcloud.autoUpdateApps.startAt | When to run the update
|
| options/nixos/services.outline.storage.uploadBucketName | Name of the bucket where uploads should be stored.
|
| options/nixos/services.vikunja.database.database | Database name.
|
| options/nixos/services.libreswan.policies | A set of policies to apply to the IPsec connections.
The policy name must match the one of connection it needs to apply to.
|
| options/nixos/services.cloudflare-ddns.wafLists | List of WAF IP Lists to manage, in the format account-id/list-name.
(Experimental feature as of cloudflare-ddns 1.14.0).
|
| options/nixos/security.doas.extraRules.*.setEnv | Keep or set the specified variables
|
| options/nixos/services.prometheus.remoteWrite.*.url | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.thinkfan.fans.*.query | The query string used to match one or more fans: can be
a fullpath to the temperature file (single fan) or a fullpath
to a driver directory (multiple fans).
When multiple fans match, the query can be restricted using the
name or indices options.
|
| options/nixos/services.linux-enable-ir-emitter.device | IR camera device to depend on
|
| options/darwin/nixpkgs.flake.source | The path to the nixpkgs sources used to build the system
|
| options/home-manager/programs.git.includes.*.contentSuffix | Nix store name for the git configuration text file,
when generating the configuration text from nix options.
|
| options/nixos/services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.keycloak.settings.hostname-backchannel-dynamic | Enables dynamic resolving of backchannel URLs,
including hostname, scheme, port and context path
|
| options/home-manager/programs.gemini-cli.context | An attribute set of context files to create in ~/.gemini/
|
| options/nixos/services.borgbackup.jobs | Deduplicating backups using BorgBackup
|
| options/nixos/hardware.display.edid.modelines | Attribute set of XFree86 Modelines automatically converted
and exposed as edid/<name>.bin files in initrd
|
| options/nixos/services.btrbk.extraPackages | Extra packages for btrbk, like compression utilities for stream_compress.
Note: This option will get deprecated in future releases
|
| options/nixos/services.windmill.database.urlPath | Path to the file containing the database url windmill should connect to
|
| options/home-manager/programs.powerline-go.pathAliases | Pairs of full-path and corresponding desired short name
|
| options/home-manager/programs.element-desktop.profiles | Extra profiles for Element
|
| options/nixos/services.prometheus.exporters.fritz.settings.devices.*.username | Username to authenticate with the target device.
|
| options/nixos/services.prometheus.exporters.fritz.settings.devices.*.hostname | Hostname under which the target device is reachable.
|
| options/nixos/services.bacula-fd.tls.allowedCN | Common name attribute of allowed peer certificates
|
| options/nixos/services.canaille.settings.SERVER_NAME | The domain name on which canaille will be served.
|
| options/nixos/services.forgejo.settings.server.DOMAIN | Domain name of your server.
|
| options/nixos/services.icecream.scheduler.netName | Network name for the icecream scheduler
|
| options/nixos/services.bacula-sd.tls.allowedCN | Common name attribute of allowed peer certificates
|
| options/nixos/services.caddy.adapter | Name of the config adapter to use
|
| options/nixos/services.onlyoffice.postgresName | The name of database OnlyOffice should use.
|
| options/nixos/services.lldap.environment | Environment variables passed to the service
|
| options/nixos/services.mautrix-meta.instances | Configuration of multiple mautrix-meta instances.
services.mautrix-meta.instances.facebook and services.mautrix-meta.instances.instagram
come preconfigured with network.mode, appservice.id, bot username, display name and avatar.
|
| options/nixos/services.ntopng.redis.createInstance | Local Redis instance name
|
| options/nixos/services.prometheus.exporters.artifactory.artiUsername | Username for authentication against JFrog Artifactory API.
|
| options/nixos/services.limesurvey.virtualHost | Apache configuration can be done by adapting services.httpd.virtualHosts.<name>
|
| options/nixos/services.bacula-dir.tls.allowedCN | Common name attribute of allowed peer certificates
|
| options/nixos/services.davis.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.pcscd.ignoreReaderNames | List of reader name patterns for the PCSC daemon to ignore
|
| options/nixos/services.multipath.devices.*.product | Regular expression to match the product name
|
| options/nixos/services.movim.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.slskd.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.mysql.ensureUsers | Ensures that the specified users exist and have at least the ensured permissions
|
| options/nixos/services.dependency-track.nginx.domain | The domain name under which to set up the virtual host.
|
| options/nixos/services.stargazer.routes | Routes that Stargazer should server
|
| options/nixos/services.snipe-it.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/users.mysql.pam.statusColumn | The name of the column or an SQL expression that indicates the status of
the user
|
| options/home-manager/programs.radicle.uri.web-rad.browser | Name of the XDG Desktop Entry for your browser
|
| options/home-manager/programs.quickshell.configs | A set of configs to include in the quickshell config directory
|
| options/nixos/networking.networkmanager.ensureProfiles.profiles | Declaratively define NetworkManager profiles
|
| options/nixos/services.prometheus.alertmanagerGotify.metrics.username | The username used to access your metrics.
|
| options/nixos/services.athens.index.postgres.database | Database name for the Postgres database.
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.gtk.indicators | List of allowed indicator modules to use for the lightdm gtk
greeter panel
|
| options/nixos/services.agorakit.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.fediwall.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.kanboard.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.librenms.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.dolibarr.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.davis.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.pixelfed.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.slskd.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.portunus.dex.oidcClients | List of OIDC clients
|
| options/nixos/services.mainsail.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.movim.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| packages/nixpkgs/dig | Domain name server |
| options/nixos/services.avahi.nssmdns6 | Whether to enable the mDNS NSS (Name Service Switch) plug-in for IPv6
|
| options/nixos/services.gancio.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.filebeat.inputs | Inputs specify how Filebeat locates and processes input data
|
| options/nixos/networking.ucarp.downscript | Command to run after become backup, the interface name, virtual address
and optional extra parameters are passed as arguments.
|
| options/nixos/networking.nat.externalInterface | The name of the external network interface.
|
| options/nixos/services.akkoma.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.fluidd.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.bluesky-pds.settings.PDS_HOSTNAME | Instance hostname (base domain name)
|
| options/nixos/services.tailscale.interfaceName | The interface name for tunnel traffic
|
| options/nixos/services.matomo.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.rutorrent.nginx.enable | Whether to enable nginx virtual host management
|
| options/nixos/services.monica.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.subsonic.listenAddress | The host name or IP address on which to bind Subsonic
|
| options/nixos/services.snipe-it.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.printing.cups-pdf.instances | Permits to raise one or more cups-pdf instances
|
| options/nixos/services.prometheus.scrapeConfigs.*.dns_sd_configs.*.names | A list of DNS SRV record names to be queried.
|
| packages/nixpkgs/parpd | Proxy ARP Daemon that complies with RFC 1027 |
| packages/nixpkgs/quisk | SDR transceiver for radios that use the Hermes protocol |
| options/nixos/services.documize.stateDirectoryName | The name of the directory below /var/lib/private
where documize runs in and stores, for example, backups.
|
| options/nixos/services.librenms.database.database | Name of the database on the MySQL/MariaDB server.
|
| options/nixos/services.libvirtd.autoSnapshot.vms | If specified only the list of VMs will be snapshotted else all existing one
|
| options/nixos/services.umami.settings.TRACKER_SCRIPT_NAME | Allows you to assign a custom name to the tracker script different from the default script.js.
|
| options/nixos/boot.loader.systemd-boot.windows | Make Windows bootable from systemd-boot
|
| options/nixos/services.pomerium.useACMEHost | If set, use a NixOS-generated ACME certificate with the specified name
|
| options/nixos/services.radicle.httpd.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.mjolnir.pantalaimon | pantalaimon options (enables E2E Encryption support)
|
| options/nixos/services.pgbackrest.repos | An attribute set of repositories as described in:
https://pgbackrest.org/configuration.html#section-repository
Each repository defaults to set repo-host to the attribute's name
|
| options/nixos/services.k3s.charts | Packaged Helm charts that are linked to /var/lib/rancher/k3s/server/static/charts before k3s starts
|
| options/home-manager/programs.quickshell.activeConfig | The name of the config to use
|
| packages/nixpkgs/bind | Domain name server |
| packages/nixpkgs/host | Domain name server |
| options/nixos/services.sanoid.datasets.<name>.force_post_snapshot_script | Whether to run the post script if the pre script fails
|
| options/nixos/services.mobilizon.settings.":mobilizon"."Mobilizon.Storage.Repo".username | User used to connect to the database
|
| options/nixos/services.akkoma.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/image.repart.verityStore.partitionIds.store-verity | Specify the attribute name of the store's dm-verity hash partition.
|
| options/nixos/services.gancio.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services._3proxy.resolution.nscache | Set name cache size for IPv4.
|
| options/nixos/services.fluidd.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.consul.interface.advertise | The name of the interface to pull the advertise_addr from.
|
| options/nixos/boot.loader.grub.configurationName | GRUB entry name instead of default.
|
| options/nixos/services.monica.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.matomo.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/programs.msmtp.accounts | Named accounts and their respective configurations
|
| packages/nixpkgs/unscd | Less buggy replacement for the glibc name service cache daemon |
| packages/nixpkgs/ls-lint | Extremely fast file and directory name linter |
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.rsnapshot.extraConfig | rsnapshot configuration option in addition to the defaults from
rsnapshot and this module
|
| options/nixos/services.anuko-time-tracker.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.nagios.virtualHost.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/nixos/services.moodle.virtualHost.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/nixos/users.ldap.bind.distinguishedName | The distinguished name to bind to the LDAP server with
|
| options/nixos/services.rke2.charts | Packaged Helm charts that are linked to /var/lib/rancher/rke2/server/static/charts before rke2 starts
|
| options/home-manager/programs.rclone.requiresUnit | The name of a systemd user service that must complete before the rclone
configuration file is written
|
| options/home-manager/services.colima.profiles | Profiles allow multiple colima configurations
|
| options/nixos/services.pufferpanel.environment | Environment variables to set for the service
|
| options/nixos/services.sanoid.templates.<name>.force_post_snapshot_script | Whether to run the post script if the pre script fails
|
| options/nixos/services.prometheus.exporters.ecoflow.ecoflowDevicesPrettyNamesFile | File must contain one line, example: {"R3300000":"Delta 2","R3400000":"Delta Pro",...}
The key/value map of custom names for your devices
|
| options/nixos/services.consul-template.instances | Attribute set of consul-template instances
|
| options/nixos/services.limesurvey.httpd.virtualHost | Apache configuration can be done by adapting services.httpd.virtualHosts.<name>
|
| options/nixos/services.limesurvey.nginx.virtualHost | Nginx configuration can be done by adapting services.nginx.virtualHosts.<name>
|
| options/nixos/services.thinkfan.sensors.*.query | The query string used to match one or more sensors: can be
a fullpath to the temperature file (single sensor) or a fullpath
to a driver directory (multiple sensors).
When multiple sensors match, the query can be restricted using the
name or indices options.
|
| options/darwin/system.defaults.finder._FXSortFoldersFirstOnDesktop | Keep folders on top when sorting by name on the desktop
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.auto_create_new_mailboxes | Whether to create new mailboxes automatically on the server from notmuch
tags.
|
| options/nixos/security.pam.rssh.settings.auth_key_file | Path to file with trusted public keys in OpenSSH's authorized_keys format
|
| options/nixos/services.bookstack.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/programs.pay-respects.runtimeRules | List of rules to be added to /etc/xdg/pay-respects/rules.
pay-respects will read the contents of these generated rules to recommend command corrections
|
| options/nixos/services.matrix-tuwunel.stateDirectory | The name of the directory under /var/lib/ where the database will be stored
|
| options/nixos/services.rosenpass.settings.peers.*.device | Name of the local WireGuard interface to use for this peer.
|
| options/nixos/services.postgresqlBackup.backupAll | Backup all databases using pg_dumpall
|
| options/nixos/services.znc.useLegacyConfig | Whether to propagate the legacy options under
services.znc.confOptions.* to the znc config
|
| options/nixos/services.zfs.autoSnapshot.flags | Flags to pass to the zfs-auto-snapshot command
|
| options/nixos/services.calibre-web.options.reverseProxyAuth.header | Auth proxy header name.
|
| options/nixos/services.libeufin.nexus.settings.nexus-ebics.HOST_ID | Name of the EBICS host.
|
| options/nixos/services.lasuite-meet.livekit.keyFile | LiveKit key file holding one or multiple application secrets
|
| options/nixos/services.sourcehut.settings."sr.ht".global-domain | Global domain name.
|
| options/nixos/services._3proxy.resolution.nscache6 | Set name cache size for IPv6.
|
| options/nixos/boot.loader.grub.fsIdentifier | Determines how GRUB will identify devices when generating the
configuration file
|
| options/nixos/services.airsonic.listenAddress | The host name or IP address on which to bind Airsonic
|
| options/nixos/services.oncall.settings.db.conn.kwargs.database | Database name.
|
| options/nixos/services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.headscale.settings.tls_letsencrypt_hostname | Domain name to request a TLS certificate for.
|
| options/nixos/services._3proxy.resolution.nserver | List of nameservers to use
|
| options/nixos/services.prometheus.exporters.pve.user | User name under which the pve exporter shall be run.
|
| options/nixos/services.prometheus.exporters.nut.user | User name under which the nut exporter shall be run.
|
| options/nixos/services.prometheus.exporters.kea.user | User name under which the kea exporter shall be run.
|
| options/nixos/services.prometheus.exporters.sql.user | User name under which the sql exporter shall be run.
|
| options/nixos/services.prometheus.exporters.zfs.user | User name under which the zfs exporter shall be run.
|
| options/nixos/services.prometheus.exporters.lnd.user | User name under which the lnd exporter shall be run.
|
| options/nixos/services.jirafeau.nginxConfig.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.bookstack.settings | Options for Bookstack configuration
|
| options/nixos/services.kanboard.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.librenms.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.grafana.settings.server.domain | The public facing domain name used to access grafana from a browser
|
| options/nixos/services.dolibarr.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.fediwall.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.agorakit.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.pixelfed.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.nominatim.database.superUser | Postgresql database superuser used to create Nominatim database and
import data
|
| options/nixos/services.mainsail.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.miniupnpd.externalInterface | Name of the external interface.
|
| options/nixos/services.certspotter.watchlist | Domain names to watch
|
| options/nixos/boot.loader.grub.mirroredBoots.*.efiBootloaderId | The id of the bootloader to store in efi nvram
|
| options/nixos/services.prometheus.exporters.snmp.user | User name under which the snmp exporter shall be run.
|
| options/nixos/services.prometheus.exporters.bind.user | User name under which the bind exporter shall be run.
|
| options/nixos/services.prometheus.exporters.ipmi.user | User name under which the ipmi exporter shall be run.
|
| options/nixos/services.prometheus.exporters.flow.user | User name under which the flow exporter shall be run.
|
| options/nixos/services.prometheus.exporters.nats.user | User name under which the nats exporter shall be run.
|
| options/nixos/services.suricata.settings.default-log-dir | The default logging directory
|
| options/nixos/services.prometheus.exporters.mail.user | User name under which the mail exporter shall be run.
|
| options/nixos/services.prometheus.exporters.ping.user | User name under which the ping exporter shall be run.
|
| options/nixos/services.prometheus.exporters.bird.user | User name under which the bird exporter shall be run.
|
| options/nixos/services.prometheus.exporters.ebpf.user | User name under which the ebpf exporter shall be run.
|
| options/nixos/services.prometheus.exporters.json.user | User name under which the json exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mqtt.user | User name under which the mqtt exporter shall be run.
|
| options/nixos/services.prometheus.exporters.node.user | User name under which the node exporter shall be run.
|
| options/nixos/services.prometheus.exporters.knot.user | User name under which the knot exporter shall be run.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.logrotate.settings | logrotate freeform settings: each attribute here will define its own section,
ordered by services.logrotate.settings.<name>.priority,
which can either define files to rotate with their settings
or settings common to all further files settings
|
| options/nixos/services.athens.singleFlight.redisSentinel.masterName | Name of the sentinel master server.
|
| options/nixos/services.prometheus.exporters.php-fpm.user | User name under which the php-fpm exporter shall be run.
|
| options/nixos/system.nixos.label | NixOS version name to be used in the names of generated
outputs and boot labels
|
| options/nixos/services.homebridge.uiSettings.log.service | Name of the systemd service to log to
|
| options/nixos/services.agorakit.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.datadog-agent.checks | Configuration for all Datadog checks
|
| options/nixos/services.librenms.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.kanboard.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.gmediarender.friendlyName | A "friendly name" for identifying the endpoint.
|
| options/nixos/services.dolibarr.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.icingaweb2.modulePackages | Name-package attrset of Icingaweb 2 modules packages to enable
|
| options/nixos/services.fediwall.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.athens.storage.azureblob.accountName | Account name for the Azure Blob storage backend.
|
| options/nixos/services.radicle.httpd.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.pixelfed.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.mainsail.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.archisteamfarm.bots | Bots name and configuration.
|
| options/home-manager/services.xidlehook.environment | Extra environment variables to be exported in the script
|
| options/nixos/services.postfixadmin.enable | Whether to enable postfixadmin
|
| options/nixos/hardware.nvidia.prime.offload.offloadCmdMainProgram | Specifies the CLI name of the hardware.nvidia.prime.offload.enableOffloadCmd
convenience script for offloading programs to an nvidia device.
|
| options/nixos/services.prometheus.exporters.nginx.user | User name under which the nginx exporter shall be run.
|
| options/nixos/services.prometheus.exporters.kafka.user | User name under which the kafka exporter shall be run.
|
| options/nixos/services.prometheus.exporters.redis.user | User name under which the redis exporter shall be run.
|
| options/nixos/services.prometheus.exporters.fritz.user | User name under which the fritz exporter shall be run.
|
| options/nixos/services.prometheus.exporters.idrac.user | User name under which the idrac exporter shall be run.
|
| options/nixos/services.prometheus.exporters.jitsi.user | User name under which the jitsi exporter shall be run.
|
| options/nixos/services.prometheus.exporters.dmarc.user | User name under which the dmarc exporter shall be run.
|
| options/nixos/services.prometheus.exporters.v2ray.user | User name under which the v2ray exporter shall be run.
|
| options/nixos/services.unpoller.unifi.controllers.*.user | Unifi service user name.
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/nixos/services.nghttpx.frontends.*.params.sni-fwd | When performing a match to select a backend server, SNI host
name received from the client is used instead of the request
host
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/networking.dhcpcd.denyInterfaces | Disable the DHCP client for any interface whose name matches
any of the shell glob patterns in this list
|
| options/nixos/services.healthchecks.settings.DB_NAME | Database name.
|
| options/nixos/boot.initrd.compressor | The compressor to use on the initrd image
|
| options/nixos/services.anuko-time-tracker.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.nextcloud-spreed-signaling.hostName | The host name to bind the nginx virtual host to, if
config.services.nextcloud-spreed-signaling.configureNginx is set to true.
|
| options/nixos/services.prometheus.exporters.zfs.pools | Name of the pool(s) to collect, repeat for multiple pools (default: all pools).
|
| options/nixos/services.resolved.settings.Resolve.Domains | List of search domains used to complete unqualified name lookups.
|
| options/nixos/security.tpm2.tctiEnvironment.tabrmdConf | Configuration part of the tabrmd TCTI, like the D-Bus bus name
|
| options/nixos/services.radicle.httpd.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.prometheus.exporters.process.settings.process_names | All settings expressed as an Nix attrset
|
| options/nixos/services.bookstack.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.journaldriver.logName | Configures the name of the target log in Stackdriver Logging
|
| options/nixos/services.prometheus.exporters.frr.user | User name under which the frr exporter shall be run
|
| options/nixos/networking.dhcpcd.allowInterfaces | Enable the DHCP client for any interface whose name matches
any of the shell glob patterns in this list
|
| options/nixos/services.anuko-time-tracker.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.prometheus.exporters.statsd.user | User name under which the statsd exporter shall be run.
|
| options/nixos/services.prometheus.exporters.dnssec.user | User name under which the dnssec exporter shall be run.
|
| options/nixos/services.prometheus.exporters.script.user | User name under which the script exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mysqld.user | User name under which the mysqld exporter shall be run.
|
| options/nixos/services.prometheus.exporters.deluge.user | User name under which the deluge exporter shall be run.
|
| options/nixos/services.prometheus.exporters.domain.user | User name under which the domain exporter shall be run.
|
| options/nixos/services.prometheus.exporters.fastly.user | User name under which the fastly exporter shall be run.
|
| options/nixos/services.prometheus.exporters.restic.user | User name under which the restic exporter shall be run.
|
| options/nixos/services.prometheus.exporters.pihole.user | User name under which the pihole exporter shall be run.
|
| options/nixos/services.prometheus.exporters.shelly.user | User name under which the shelly exporter shall be run.
|
| options/nixos/services.prometheus.exporters.rspamd.user | User name under which the rspamd exporter shall be run.
|
| options/nixos/services.metricbeat.modules | Metricbeat modules are responsible for reading metrics from the various sources
|
| options/nixos/services.prometheus.exporters.tibber.user | User name under which the tibber exporter shall be run.
|
| options/nixos/security.tpm2.tctiEnvironment.interface | The name of the TPM command transmission interface (TCTI) library to
use.
|
| options/nixos/services.home-assistant.extraComponents | List of components that have their dependencies included in the package
|
| options/home-manager/services.kanshi.settings.*.output.criteria | The criteria can either be an output name, an output description or "*"
|
| options/nixos/services.pipewire.wireplumber.extraScripts | Additional scripts for WirePlumber to be used by configuration files
|
| options/nixos/services.bookstack.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.postgresql.ensureUsers | Ensures that the specified users exist
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".url.host | Domain name of the instance.
|
| options/nixos/services.prometheus.exporters.nvidia-gpu.user | User name under which the nvidia-gpu exporter shall be run.
|
| options/nixos/services.munin-node.extraPlugins | Additional Munin plugins to activate
|
| options/nixos/services.jirafeau.nginxConfig.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.namespaces | Optional namespace discovery
|
| options/nixos/services.firefox-syncserver.database.host | Database host name. localhost is treated specially and inserts
systemd dependencies, other hostnames or IP addresses of the local machine do not.
|
| options/nixos/services.filebeat.modules | Filebeat modules provide a quick way to get started
processing common log formats
|
| options/nixos/services.prometheus.exporters.rtl_433.user | User name under which the rtl_433 exporter shall be run.
|
| options/nixos/services.prometheus.exporters.bitcoin.rpcUser | RPC user name.
|
| packages/nixpkgs/alfis | Alternative Free Identity System |
| options/nixos/services.movim.h2o.tls.recommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|
| options/nixos/services.libeufin.nexus.settings.nexus-ebics.CURRENCY | Name of the fiat currency.
|
| options/nixos/services.prometheus.exporters.systemd.user | User name under which the systemd exporter shall be run.
|
| options/nixos/services.prometheus.exporters.bitcoin.user | User name under which the bitcoin exporter shall be run.
|
| options/nixos/services.prometheus.exporters.varnish.user | User name under which the varnish exporter shall be run.
|
| options/nixos/services.umami.createPostgresqlDatabase | Whether to automatically create the database for Umami using PostgreSQL
|
| options/nixos/services.prometheus.exporters.apcupsd.user | User name under which the apcupsd exporter shall be run.
|
| options/nixos/services.prometheus.exporters.ecoflow.user | User name under which the ecoflow exporter shall be run.
|
| options/nixos/services.prometheus.exporters.dovecot.user | User name under which the dovecot exporter shall be run.
|
| options/nixos/services.prometheus.exporters.process.user | User name under which the process exporter shall be run.
|
| options/nixos/services.prometheus.exporters.dnsmasq.user | User name under which the dnsmasq exporter shall be run.
|
| options/nixos/services.prometheus.exporters.libvirt.user | User name under which the libvirt exporter shall be run.
|
| options/nixos/services.prometheus.exporters.sabnzbd.user | User name under which the sabnzbd exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mongodb.user | User name under which the mongodb exporter shall be run.
|
| options/nixos/services.prometheus.exporters.postfix.user | User name under which the postfix exporter shall be run.
|
| options/nixos/services.prometheus.exporters.klipper.user | User name under which the klipper exporter shall be run.
|
| options/nixos/services.prometheus.exporters.unbound.user | User name under which the unbound exporter shall be run.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.journaldriver.logStream | Configures the name of the Stackdriver Logging log stream into
which to write journald entries
|
| options/nixos/services.jirafeau.nginxConfig.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/darwin/services.postgresql.ensureUsers | Ensures that the specified users exist and have at least the ensured permissions
|
| options/nixos/services.h2o.defaultTLSRecommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|
| options/nixos/services.hockeypuck.settings | Configuration file for hockeypuck, here you can override
certain settings (loglevel and
openpgp.db.dsn) by just setting those values
|
| options/nixos/hardware.block.defaultSchedulerExclude | Device name pattern to exclude from default scheduler assignment
through config.hardware.block.defaultScheduler and
config.hardware.block.defaultSchedulerRotational
|
| options/nixos/services.influxdb2.provision.initialSetup.bucket | Primary bucket name
|
| options/nixos/services.radicle.ci.broker.settings.triggers.*.adapter | Adapter name.
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.username | Credentials are used to authenticate the requests to Uyuni API.
|
| options/nixos/hardware.printers.ensurePrinters | Will regularly ensure that the given CUPS printers are configured as declared here
|
| options/nixos/services.athens.storage.azureblob.containerName | Container name for the Azure Blob storage backend.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.anubis.defaultOptions.settings.POLICY_FNAME | The policy file to use
|
| options/nixos/services.public-inbox.settings.publicinbox.css | The local path name of a CSS file for the PSGI web interface.
|
| options/nixos/services.prometheus.exporters.mailman3.user | User name under which the mailman3 exporter shall be run.
|
| options/nixos/services.prometheus.exporters.py-air-control.user | User name under which the py-air-control exporter shall be run.
|
| options/nixos/services.pgmanage.connections | pgmanage requires at least one PostgreSQL server be defined
|
| options/nixos/services.thanos.rule.web.prefix-header | Name of HTTP request header used for dynamic prefixing of UI links and
redirects
|
| options/home-manager/services.xsuspender.defaults.matchWmNameContains | Match windows where wm name contains string.
|
| options/nixos/services.limesurvey.virtualHost.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/nixos/services.sourcehut.hg.postgresql.database | PostgreSQL database name for the hg.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.pds.environmentFiles | File to load environment variables from
|
| options/nixos/services.prometheus.exporters.influxdb.user | User name under which the influxdb exporter shall be run.
|
| options/nixos/services.prometheus.exporters.opnsense.user | User name under which the opensense exporter shall be run.
|
| options/nixos/services.prometheus.exporters.smartctl.user | User name under which the smartctl exporter shall be run.
|
| options/nixos/services.prometheus.exporters.fritzbox.user | User name under which the fritzbox exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mikrotik.user | User name under which the mikrotik exporter shall be run.
|
| options/nixos/services.prometheus.exporters.nginxlog.user | User name under which the nginxlog exporter shall be run.
|
| options/nixos/services.prometheus.exporters.postgres.user | User name under which the postgres exporter shall be run.
|
| options/nixos/services.prometheus.exporters.unpoller.user | User name under which the unpoller exporter shall be run.
|
| options/nixos/services.prometheus.exporters.graphite.user | User name under which the graphite exporter shall be run.
|
| options/nixos/services.prometheus.exporters.blackbox.user | User name under which the blackbox exporter shall be run.
|
| options/nixos/services.prometheus.exporters.keylight.user | User name under which the keylight exporter shall be run.
|
| options/nixos/services.prometheus.exporters.collectd.user | User name under which the collectd exporter shall be run.
|
| options/nixos/services.dolibarr.h2o.tls.recommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|
| options/nixos/services.sourcehut.man.postgresql.database | PostgreSQL database name for the man.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.sourcehut.git.postgresql.database | PostgreSQL database name for the git.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.sourcehut.hub.postgresql.database | PostgreSQL database name for the hub.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.anubis.defaultOptions.settings.SERVE_ROBOTS_TXT | Whether to serve a default robots.txt that denies access to common AI bots by name and all other
bots by wildcard.
|
| options/nixos/services.mediawiki.httpd.virtualHost.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/nixos/services.cassandra.listenAddress | Address or interface to bind to and tell other Cassandra nodes
to connect to
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.username | Consul username
|
| options/nixos/services.sourcehut.todo.postgresql.database | PostgreSQL database name for the todo.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.sourcehut.meta.postgresql.database | PostgreSQL database name for the meta.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.suricata.settings.unix-command | Unix command socket that can be used to pass commands to Suricata
|
| options/nixos/services.thanos.query.web.prefix-header | Name of HTTP request header used for dynamic prefixing of UI links and
redirects
|
| options/nixos/services.nextcloud.config.objectstore.s3.bucket | The name of the S3 bucket.
|
| options/nixos/services.zfs.autoReplication.localFilesystem | Local ZFS filesystem from which snapshots should be sent
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.mosquitto.listeners.*.omitPasswordAuth | Omits password checking, allowing anyone to log in with any user name unless
other mandatory authentication methods (eg TLS client certificates) are configured.
|
| options/nixos/services.nullmailer.config.remotes | A list of remote servers to which to send each message
|
| options/nixos/services.prometheus.exporters.imap-mailstat.user | User name under which the imap-mailstat exporter shall be run.
|
| options/nixos/services.yggdrasil.openMulticastPort | Whether to open the UDP port used for multicast peer discovery
|
| packages/nixpkgs/iro | CLI tool to convet Hex color code or RGB to color code, RGB, HSL and color name |
| options/nixos/services.sourcehut.lists.postgresql.database | PostgreSQL database name for the lists.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.sourcehut.paste.postgresql.database | PostgreSQL database name for the paste.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.sourcehut.pages.postgresql.database | PostgreSQL database name for the pages.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.libeufin.nexus.settings.nexus-ebics.BANK_DIALECT | Name of the following combination: EBICS version and ISO20022
recommendations that Nexus would honor in the communication with the
bank
|
| options/nixos/services.limesurvey.nginx.virtualHost.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.multipath.devices.*.user_friendly_names | If set to "yes", using the bindings file /etc/multipath/bindings
to assign a persistent and unique alias to the multipath, in the
form of mpath
|
| options/nixos/services.pgbouncer.settings.pgbouncer.max_client_conn | Maximum number of client connections allowed
|
| options/nixos/services.prometheus.exporters.surfboard.user | User name under which the surfboard exporter shall be run.
|
| options/nixos/services.prometheus.exporters.tailscale.user | User name under which the tailscale exporter shall be run.
|
| options/nixos/services.prometheus.exporters.wireguard.user | User name under which the wireguard exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mongodb.collectAll | Enable all collectors
|
| options/nixos/services.prometheus.exporters.rasdaemon.user | User name under which the rasdaemon exporter shall be run.
|
| options/nixos/services.prometheus.exporters.borgmatic.user | User name under which the borgmatic exporter shall be run.
|
| options/nixos/services.prometheus.exporters.smokeping.user | User name under which the smokeping exporter shall be run.
|
| options/nixos/services.postgresql.ensureUsers.*.ensureDBOwnership | Grants the user ownership to a database with the same name
|
| options/nixos/services.prometheus.exporters.pgbouncer.user | User name under which the pgbouncer exporter shall be run.
|
| options/nixos/services.prometheus.exporters.nextcloud.user | User name under which the nextcloud exporter shall be run.
|
| options/nixos/services.chatgpt-retrieval-plugin.qdrantCollection | name of the qdrant collection used to store documents.
|
| options/nixos/services.prometheus.exporters.junos-czerwonk.user | User name under which the junos-czerwonk exporter shall be run.
|
| options/nixos/services.matrix-alertmanager.matrixRooms | Combination of Alertmanager receiver(s) and rooms for the bot to join
|
| options/nixos/services.yggdrasil.denyDhcpcdInterfaces | Disable the DHCP client for any interface whose name matches
any of the shell glob patterns in this list
|
| packages/nixpkgs/dhcpcd | Client for the Dynamic Host Configuration Protocol (DHCP) |
| packages/nixpkgs/djbdns | Collection of Domain Name System tools |
| packages/nixpkgs/idnkit | Provides functionalities about i18n domain name processing |
| options/nixos/services.prometheus.scrapeConfigs.*.http_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.exporters.chrony.user | User name under which the chrony exporter shall be run
|
| options/nixos/services.limesurvey.httpd.virtualHost.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/nixos/services.sourcehut.builds.postgresql.database | PostgreSQL database name for the builds.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.prometheus.exporters.postfix.systemd.unit | Name of the postfix systemd unit.
|
| options/home-manager/wayland.windowManager.sway.config.workspaceOutputAssign.*.output | Name(s) of the output(s) from {command}swaymsg -t get_outputs.
|
| options/nixos/services.journald.upload.settings.Upload.ServerKeyFile | SSL key in PEM format
|
| options/nixos/services.centrifugo.environmentFiles | Files to load environment variables from
|
| options/nixos/services.matrix-synapse.settings.database.args.database | Name of the database when using the psycopg2 backend,
path to the database location when using sqlite3.
|
| packages/nixpkgs/nsncd | Name service non-caching daemon |
| packages/nixpkgs/nixos-install | Install bootloader and NixOS |
| options/nixos/services.foundationdb.tls.allowedPeers | "Peer verification string"
|
| options/nixos/virtualisation.rosetta.mountTag | The VirtioFS mount tag for the Rosetta runtime, exposed by the host's virtualisation software
|
| options/nixos/services.datadog-agent.extraIntegrations | Extra integrations from the Datadog core-integrations
repository that should be built and included
|
| options/nixos/services.mosquitto.listeners.*.authPlugins.*.denySpecialChars | Automatically disallow all clients using #
or + in their name/id.
|
| options/home-manager/xsession.windowManager.i3.config.workspaceOutputAssign.*.output | Name(s) of the output(s) from {command}i3-msg -t get_outputs.
|
| options/home-manager/services.kanshi.settings.*.profile.outputs.*.criteria | The criteria can either be an output name, an output description or "*"
|
| options/nixos/services.glance.environmentFile | Path to an environment file as defined in systemd.exec(5)
|
| options/nixos/services.mqtt2influxdb.influxdb.database | Name of the InfluxDB database.
|
| options/nixos/services.taskserver.organisations | An attribute set where the keys name the organisation and the values
are a set of lists of users and
groups.
|
| packages/nixpkgs/alfis-nogui | Alternative Free Identity System |
| options/nixos/services.journaldriver.googleCloudProject | Configures the name of the Google Cloud project to which to
forward journald logs
|
| options/nixos/services.prometheus.exporters.scaphandre.user | User name under which the scaphandre exporter shall be run.
|
| options/nixos/services.nullmailer.config.adminaddr | If set, all recipients to users at either "localhost" (the literal string)
or the canonical host name (from the me control attribute) are remapped to this address
|
| options/nixos/services.prometheus.exporters.buildkite-agent.user | User name under which the buildkite-agent exporter shall be run.
|
| options/nixos/services.prometheus.exporters.storagebox.user | User name under which the storagebox exporter shall be run.
|
| options/nixos/services.crowdsec-firewall-bouncer.secrets.apiKeyPath | Path to the API key to authenticate with a local CrowdSec API
|
| options/nixos/services.bluesky-pds.environmentFiles | File to load environment variables from
|
| options/nixos/services.dependency-track.database.databaseName | Database name to use when connecting to an external or
manually provisioned database; has no effect when a local
database is automatically provisioned
|
| options/nixos/services.prometheus.exporters.postfix.systemd.slice | Name of the postfix systemd slice
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/virtualisation.libvirtd.nss.enableGuest | This option enables the newer libvirt_guest NSS module
|
| packages/nixpkgs/upspin | Global name space for storing data akin to a filesystem |
| packages/nixpkgs/nsd | Authoritative only, high performance, simple and open source name server |
| options/nixos/services.firezone.server.provision.accounts | All accounts to provision
|
| options/nixos/services.grafana.settings.smtp.ehlo_identity | Name to be used as client identity for EHLO in SMTP dialog.
|
| options/nixos/services.limesurvey.nginx.virtualHost.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.desktopManager.gnome.flashback.customSessions.*.wmLabel | The name of the window manager to show in the session chooser.
|
| options/nixos/services.prometheus.exporters.exportarr-lidarr.user | User name under which the exportarr-lidarr exporter shall be run.
|
| options/nixos/services.prometheus.exporters.exportarr-sonarr.user | User name under which the exportarr-sonarr exporter shall be run.
|
| options/nixos/services.suricata.settings.outputs | Configure the type of alert (and other) logging you would like
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.prometheus.exporters.exportarr-radarr.user | User name under which the exportarr-radarr exporter shall be run.
|
| options/nixos/services.prometheus.exporters.exportarr-bazarr.user | User name under which the exportarr-bazarr exporter shall be run.
|
| options/nixos/services.rutorrent.nginx.exposeInsecureRPC2mount | If you do not enable one of the rpc or httprpc plugins you need to expose an RPC mount through scgi using this option
|
| options/nixos/services.matrix-appservice-discord.settings | config.yaml configuration as a Nix attribute set
|
| options/nixos/services.limesurvey.nginx.virtualHost.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.tarsnap.keyfile | The keyfile which associates this machine with your tarsnap
account
|
| options/nixos/services.warpgate.settings.external_host | Configure the domain name of this Warpgate instance
|
| options/nixos/services.pufferpanel.enable | Whether to enable PufferPanel game management server
|
| options/nixos/services.matrix-synapse.settings.log_config | The file that holds the logging configuration.
|
| options/darwin/services.aerospace.settings.on-window-detected.*."if".workspace | The workspace name to match (optional).
|
| options/nixos/services.crowdsec-firewall-bouncer.registerBouncer.bouncerName | Name to register the bouncer as to the CrowdSec API
|
| options/nixos/services.outline.oidcAuthentication.displayName | Display name for OIDC authentication.
|
| options/home-manager/wayland.windowManager.sway.config.workspaceOutputAssign.*.workspace | Name of the workspace to assign.
|
| options/nixos/services.prometheus.exporters.artifactory.user | User name under which the artifactory exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mqtt.prometheusPrefix | Prefix added to the metric name.
|
| options/nixos/services.prometheus.exporters.exportarr-readarr.user | User name under which the exportarr-readarr exporter shall be run.
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowCN | Allow client if common name appears in the list.
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.strongswan-swanctl.swanctl.connections | Section defining IKE connection configurations, each in its own subsection
with an arbitrary yet unique name
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowOU | Allow client if organizational unit name appears in the list.
|
| options/home-manager/xsession.windowManager.i3.config.workspaceOutputAssign.*.workspace | Name of the workspace to assign.
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities | Section defining complementary attributes of certification authorities, each
in its own subsection with an arbitrary yet unique name
|
| options/nixos/services.mqtt2influxdb.points.*.measurement | Name of the measurement
|
| options/nixos/services.warpgate.settings.sso_providers.*.label | SSO provider name displayed on login page.
|
| options/nixos/services.discourse.siteSettings | Discourse site settings
|
| options/nixos/services.nextcloud.settings."profile.enabled" | Makes user-profiles globally available under nextcloud.tld/u/user.name
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowDNS | Allow client if DNS subject alternative name appears in the list.
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowURI | Allow client if URI subject alternative name appears in the list.
|
| options/nixos/services.matrix-synapse.settings.trusted_key_servers.*.server_name | Hostname of the trusted server.
|
| options/nixos/virtualisation.sharedDirectories | An attributes set of directories that will be shared with the
virtual machine using VirtFS (9P filesystem over VirtIO)
|
| options/nixos/services.prometheus.exporters.exportarr-prowlarr.user | User name under which the exportarr-prowlarr exporter shall be run.
|
| packages/nixpkgs/nixos-enter | Run a command in a NixOS chroot environment |
| packages/nixpkgs/ocamlPackages.dns | Domain Name System (DNS) library |
| options/nixos/services.misskey.reverseProxy.webserver.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.nipap.settings.auth.default_backend | Name of auth backend to use by default.
|
| options/darwin/system.defaults.loginwindow.SHOWFULLNAME | Apple menu > System Preferences > Users and Groups > Login Options
Displays login window as a name and password field instead of a list of users
|
| options/nixos/boot.loader.systemd-boot.sortKey | The sort key used for the NixOS bootloader entries
|
| options/nixos/services.crowdsec-firewall-bouncer.settings.api_key | API key to authenticate with a local crowdsec API
|
| options/nixos/services.grafana.provision.alerting.rules.settings.groups.*.folder | Name of the folder the rule group will be stored in
|
| options/nixos/system.replaceDependencies.replacements | List of packages to override without doing a full rebuild
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.prometheus.exporters.modemmanager.user | User name under which the modemmanager exporter shall be run.
|
| options/nixos/services.tabby.model | Specify the model that tabby will use to generate completions
|
| packages/nixpkgs/aewan | Ascii-art Editor Without A Name |
| options/nixos/services.matrix-appservice-irc.settings.homeserver.domain | The 'domain' part for user IDs on this home server
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.groupNameAttribute | Attribute for a name of group.
|
| options/nixos/services.xserver.desktopManager.gnome.flashback.customSessions.*.wmLabel | The name of the window manager to show in the session chooser.
|
| options/nixos/documentation.man.mandoc.settings.output.man | A template for linked manuals (usually via the Xr macro) in HTML
output
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.username | username is required if using Identity V2 API
|
| options/nixos/security.apparmor.killUnconfinedConfinables | Whether to enable killing of processes which have an AppArmor profile enabled
(in security.apparmor.policies)
but are not confined (because AppArmor can only confine new processes)
|
| options/nixos/services.influxdb2.provision.initialSetup.organization | Primary organization name
|
| options/nixos/networking.networkmanager.unmanaged | List of interfaces that will not be managed by NetworkManager
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.inherit | Grants the user created inherit permissions
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.basic_auth.username | HTTP username
|
| packages/nixpkgs/mimeo | Open files by MIME-type or file name using regular expressions |
| options/nixos/services.mautrix-telegram.environmentFile | File containing environment variables to be passed to the mautrix-telegram service,
in which secret tokens can be specified securely by defining values for e.g.
MAUTRIX_TELEGRAM_APPSERVICE_AS_TOKEN,
MAUTRIX_TELEGRAM_APPSERVICE_HS_TOKEN,
MAUTRIX_TELEGRAM_TELEGRAM_API_ID,
MAUTRIX_TELEGRAM_TELEGRAM_API_HASH and optionally
MAUTRIX_TELEGRAM_TELEGRAM_BOT_TOKEN
|
| options/nixos/services.prometheus.exporters.unpoller.controllers.*.user | Unifi service user name.
|
| options/nixos/services.journald.upload.settings.Upload.ServerCertificateFile | SSL CA certificate in PEM format
|
| packages/nixpkgs/git-crypt | Transparent file encryption in git |
| packages/nixpkgs/uniscribe | Explains Unicode characters/code points: Displays their name, category, and shows compositions |
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.domain_name | At most one of domain_id and domain_name must be provided if using username
with Identity V3
|
| options/home-manager/programs.ripgrep-all.custom_adapters.*.mimetypes | If not null and --rga-accurate is enabled, mime type matching is used instead of file name matching
|
| options/nixos/documentation.man.mandoc.settings.output.paper | This option is for generating PostScript and PDF output
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.createdb | Grants the user, created by the ensureUser attr, createdb permissions
|
| options/nixos/services.pgbouncer.settings.pgbouncer.listen_addr | Specifies a list (comma-separated) of addresses where to listen for TCP connections
|
| options/darwin/services.aerospace.settings.workspace-to-monitor-force-assignment | Map workspaces to specific monitors
|
| options/nixos/services.mobilizon.settings.":mobilizon"."Mobilizon.Storage.Repo".database | Name of the database
|
| options/nixos/services.prometheus.exporters.restic.rcloneConfig | Configuration for the rclone remote being used for backup
|
| options/nixos/networking.networkmanager.appendNameservers | A list of name servers that should be appended
to the ones configured in NetworkManager or received by DHCP.
|
| options/nixos/networking.networkmanager.insertNameservers | A list of name servers that should be inserted before
the ones configured in NetworkManager or received by DHCP.
|
| options/nixos/services.prometheus.exporters.mqtt.zigbee2MqttAvailability | Whether to enable Normalize sensor name for device availability metric added by Zigbee2MQTT..
|
| options/nixos/virtualisation.xen.store.settings.perms.enableWatch | Whether to enable the watch permission system
|
| packages/nixpkgs/vpnc-scripts | Script for vpnc to configure the network routing and name service |
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.project_name | The project_id and project_name fields are optional for the Identity V2 API
|
| options/nixos/services.prometheus.exporters.wireguard.wireguardConfig | Path to the Wireguard Config to
add the peer's name to the stats of a peer
|
| packages/nixpkgs/detect | Expression-based file search combining name, content, metadata, and structured data predicates |
| packages/nixpkgs/dnsutils | Domain name server |
| options/nixos/hardware.block.scheduler | Assign block I/O scheduler by device name pattern
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.veilid.settings.core.network.routing_table.bootstrap | Host name of existing well-known Veilid bootstrap servers for the network to connect to.
|
| options/nixos/services.postgresql.systemCallFilter | Configures the syscall filter for postgresql.service
|
| packages/nixpkgs/getopt | Parses command-line arguments from shell scripts |
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.bypassrls | Grants the user, created by the ensureUser attr, replication permissions
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.superuser | Grants the user, created by the ensureUser attr, superuser permissions
|
| packages/nixpkgs/jwhois | Client for the WHOIS protocol allowing you to query the owner of a domain name |
| packages/nixpkgs/nssmdns | MDNS Name Service Switch (NSS) plug-in |
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.exporters.pgbouncer.connectionEnvFile | File that must contain the environment variable
PGBOUNCER_EXPORTER_CONNECTION_STRING which is set to the connection
string used by pgbouncer
|
| packages/nixpkgs/figurine | Print your name in style |
| options/nixos/networking.networkmanager.ensureProfiles.secrets.entries.*.matchIface | interface name of the NetworkManager connection
|
| options/nixos/services.filesender.settings.log_facilities | Defines where FileSender logging is sent
|
| options/nixos/services.prometheus.exporters.pgbouncer.connectionString | Connection string for accessing pgBouncer
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.replication | Grants the user, created by the ensureUser attr, replication permissions
|
| packages/nixpkgs/filegive | Easy p2p file sending program |
| packages/nixpkgs/ocamlPackages_latest.dns | Domain Name System (DNS) library |
| options/nixos/networking.networkmanager.ensureProfiles.secrets.entries.*.matchSetting | name of the setting section for which secrets are requested
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.createrole | Grants the user, created by the ensureUser attr, createrole permissions
|
| options/nixos/networking.networkmanager.ensureProfiles.secrets.entries.*.matchId | connection id used by NetworkManager
|
| packages/nixpkgs/dnstwist | Domain name permutation engine for detecting homograph phishing attacks |
| packages/nixpkgs/nixpkgs-vet | Tool to vet (check) Nixpkgs, including its pkgs/by-name directory |
| packages/nixpkgs/perlPackages.SymbolGlobalName | Finds name and type of a global variable |
| packages/nixpkgs/ocamlPackages.dns-mirage | Opinionated Domain Name System (DNS) library |
| packages/nixpkgs/perl5Packages.SymbolGlobalName | Finds name and type of a global variable |
| packages/nixpkgs/spotifywm | Wrapper around Spotify that correctly sets class name before opening the window |
| packages/nixpkgs/ocamlPackages.uuidm | OCaml module implementing 128 bits universally unique identifiers version 3, 5 (name based with MD5, SHA-1 hashing) and 4 (random based) according to RFC 4122 |
| packages/nixpkgs/geticons | CLI utility to get icons for apps on your system or other generic icons by name |
| packages/nixpkgs/eschalot | Tor hidden service name generator |
| packages/nixpkgs/nixos-rebuild-ng | Rebuild your NixOS configuration and switch to it, on local hosts and remote |
| packages/nixpkgs/ascii | Interactive ASCII name and synonym chart |
| options/home-manager/programs.qutebrowser.keyBindings | Key bindings mapping keys to commands in different modes
|
| packages/nixpkgs/ibus-engines.uniemoji | Input method (ibus) for entering unicode symbols and emoji by name |
| packages/nixpkgs/git-remote-gcrypt | Git remote helper for GPG-encrypted remotes |
| packages/nixpkgs/xml2 | Tools for command line processing of XML, HTML, and CSV |
| packages/nixpkgs/ocamlPackages_latest.dns-mirage | Opinionated Domain Name System (DNS) library |
| packages/nixpkgs/spooftooph | Automate spoofing or clone Bluetooth device Name, Class, and Address |
| packages/nixpkgs/wiggle | Tool for applying patches with conflicts |
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.application_credential_name | The application_credential_id or application_credential_name fields are
required if using an application credential to authenticate
|
| packages/nixpkgs/gnu-config | Attempt to guess a canonical system name |
| packages/nixpkgs/ocamlPackages_latest.uuidm | OCaml module implementing 128 bits universally unique identifiers version 3, 5 (name based with MD5, SHA-1 hashing) and 4 (random based) according to RFC 4122 |
| packages/nixpkgs/profont | Monospaced font created to be a most readable font for programming |
| packages/nixpkgs/fixDarwinDylibNames | |
| packages/nixpkgs/perlPackages.NetDNS | Perl Interface to the Domain Name System |
| packages/nixpkgs/python313Packages.wcmatch | Wilcard File Name matching library |
| packages/nixpkgs/python314Packages.wcmatch | Wilcard File Name matching library |
| packages/nixpkgs/perl5Packages.NetDNS | Perl Interface to the Domain Name System |
| packages/nixpkgs/nix-required-mounts | A --pre-build-hook for Nix, that allows to expose extra paths in the build sandbox based on derivations' requiredSystemFeatrues |
| packages/nixpkgs/haskellPackages.nom | Name-binding & alpha-equivalence |
| packages/nixpkgs/openresolv | Program to manage /etc/resolv.conf |
| packages/nixpkgs/perlPackages.ProcFind | Find processes by name, PID, or some other attributes |
| packages/nixpkgs/perl540Packages.SymbolGlobalName | Finds name and type of a global variable |
| packages/nixpkgs/perl538Packages.SymbolGlobalName | Finds name and type of a global variable |
| packages/nixpkgs/texlivePackages.fink | The LaTeX2e File Name Keeper |
| packages/nixpkgs/libasyncns | C library for Linux/Unix for executing name service queries asynchronously |
| packages/nixpkgs/perl5Packages.ProcFind | Find processes by name, PID, or some other attributes |
| packages/nixpkgs/haskellPackages.HPath | Extract Haskell declarations by name |
| packages/nixpkgs/zstxtns-utils | Utilities to deal with text based name service databases |
| packages/nixpkgs/perlPackages.DataOptList | Parse and validate simple name/value option pairs |
| packages/nixpkgs/perlPackages.ClassLoad | Working (require "Class::Name") and more |
| packages/nixpkgs/haskellPackages.zenc | GHC style name Z-encoding and Z-decoding |
| packages/nixpkgs/ocamlPackages.yuujinchou | Name pattern combinators |
| packages/nixpkgs/haskellPackages.rpm-nvr | RPM package name-version-release data types |
| packages/nixpkgs/perlPackages.FileMimeInfo | Determine file type from the file name |
| packages/nixpkgs/perl5Packages.ClassLoad | Working (require "Class::Name") and more |
| packages/nixpkgs/perl5Packages.DataOptList | Parse and validate simple name/value option pairs |
| packages/nixpkgs/python312Packages.wcmatch | Wilcard File Name matching library |
| packages/nixpkgs/perl538Packages.NetDNS | Perl Interface to the Domain Name System |
| packages/nixpkgs/perl540Packages.NetDNS | Perl Interface to the Domain Name System |
| packages/nixpkgs/akkuPackages.chibi-net-dns | Domain Name Service library, with high-level utilities for address, mx and text record lookups |
| packages/nixpkgs/yaziPlugins.jump-to-char | Vim-like f<char>, jump to the next file whose name starts with <char>. |
| packages/nixpkgs/perlPackages.TryTinyByClass | Selectively catch exceptions by class name |
| packages/nixpkgs/perl5Packages.FileMimeInfo | Determine file type from the file name |
| packages/nixpkgs/python313Packages.outdated | Mini-library which, given a package name and a version, checks if it's the latest version available on PyPI |
| packages/nixpkgs/python314Packages.outdated | Mini-library which, given a package name and a version, checks if it's the latest version available on PyPI |
| packages/nixpkgs/perlPackages.ModuleUtil | Module name tools and transformations |
| packages/nixpkgs/perl5Packages.TryTinyByClass | Selectively catch exceptions by class name |
| packages/nixpkgs/haskellPackages.hcount | Haskell artifact name counts |
| packages/nixpkgs/perl5Packages.ModuleUtil | Module name tools and transformations |
| packages/nixpkgs/haskellPackages.gender | Identify a persons gender by their first name |
| packages/nixpkgs/perl540Packages.ProcFind | Find processes by name, PID, or some other attributes |
| packages/nixpkgs/perl538Packages.ProcFind | Find processes by name, PID, or some other attributes |
| packages/nixpkgs/gnomeExtensions.xremap | Allow xremap to fetch the focused app name using D-Bus or local socket. |
| packages/nixpkgs/haskellPackages.lsfrom | List directory files starting from a specific name |
| packages/nixpkgs/libcanberra | Implementation of the XDG Sound Theme and Name Specifications |
| packages/nixpkgs/ocamlPackages_latest.yuujinchou | Name pattern combinators |
| packages/nixpkgs/akkuPackages.r6rs-psystem | OS name and libc-loading for PFFI |
| packages/nixpkgs/haskellPackages.resolv | Domain Name Service (DNS) lookup via the libresolv standard library routines |
| packages/nixpkgs/haskellPackages.windns | Domain Name Service (DNS) lookup via the <windns.h>/dnsapi.dll standard library |
| packages/nixpkgs/perl538Packages.DataOptList | Parse and validate simple name/value option pairs |
| packages/nixpkgs/perl540Packages.DataOptList | Parse and validate simple name/value option pairs |
| packages/nixpkgs/perl538Packages.ClassLoad | Working (require "Class::Name") and more |
| packages/nixpkgs/perl540Packages.ClassLoad | Working (require "Class::Name") and more |
| packages/nixpkgs/libcanberra-gtk3 | Implementation of the XDG Sound Theme and Name Specifications |
| packages/nixpkgs/libcanberra-gtk2 | Implementation of the XDG Sound Theme and Name Specifications |
| packages/nixpkgs/python313Packages.srvlookup | Wrapper for dnspython to return SRV records for a given host, protocol, and domain name |
| packages/nixpkgs/python314Packages.srvlookup | Wrapper for dnspython to return SRV records for a given host, protocol, and domain name |
| packages/nixpkgs/perl540Packages.FileMimeInfo | Determine file type from the file name |
| packages/nixpkgs/perl538Packages.FileMimeInfo | Determine file type from the file name |
| packages/nixpkgs/haskellPackages.system-info | Get the name of the operating system |
| packages/nixpkgs/haskellPackages.resolve | A name resolusion library |
| packages/nixpkgs/python313Packages.click-default-group | Group to invoke a command without explicit subcommand name |
| packages/nixpkgs/python314Packages.click-default-group | Group to invoke a command without explicit subcommand name |
| packages/nixpkgs/nodePackages.poor-mans-t-sql-formatter-cli | A T-SQL formatting utility in JS, transpiled from the C# library of the same name. |
| packages/nixpkgs/python312Packages.outdated | Mini-library which, given a package name and a version, checks if it's the latest version available on PyPI |
| packages/nixpkgs/dnstracer | Determines where a given Domain Name Server (DNS) gets its information from, and follows the chain of DNS servers back to the servers which know the data |
| packages/nixpkgs/texlivePackages.grffile | Extended file name support for graphics (legacy package) |
| packages/nixpkgs/haskellPackages.path-tagged | A wrapper around the @path@ library, tagged with semantic name |
| packages/nixpkgs/haskellPackages.CabalSearch | Search cabal packages by name |
| packages/nixpkgs/perl538Packages.TryTinyByClass | Selectively catch exceptions by class name |
| packages/nixpkgs/perl540Packages.TryTinyByClass | Selectively catch exceptions by class name |
| packages/nixpkgs/haskellPackages.ConsStream | Trivial re-export of Wouter Swierstra's Stream package, avoiding module name clash |
| packages/nixpkgs/perl540Packages.ModuleUtil | Module name tools and transformations |
| packages/nixpkgs/perl538Packages.ModuleUtil | Module name tools and transformations |
| packages/nixpkgs/haskellPackages.window-utils | OS window icon/name utilities |
| packages/nixpkgs/haskellPackages.network-dns | Domain Name System data structures |
| packages/nixpkgs/gnomeExtensions.user-id-in-top-panel | Add ( user name :: user id @ host ) in top panel |
| packages/nixpkgs/haskellPackages.itanium-abi | An implementation of name mangling/demangling for the Itanium ABI |
| packages/nixpkgs/haskellPackages.acme-omitted | A name for omitted definitions |
| packages/nixpkgs/moreutils | Growing collection of the unix tools that nobody thought to write long ago when unix was young |
| packages/nixpkgs/texlivePackages.fetchcls | Fetch the current class name |
| packages/nixpkgs/haskellPackages.haskell-docs | A program to find and display the docs and type of a name |
| packages/nixpkgs/luarocks-packages-updater | Module to update luarocks-packages |
| packages/nixpkgs/texlivePackages.refenums | Define named items and provide back-references with that name |
| packages/nixpkgs/texlivePackages.storecmd | Store the name of a defined command in a container |
| packages/nixpkgs/texlivePackages.etexcmds | Avoid name clashes with e-TeX commands |
| packages/nixpkgs/texlivePackages.currfile | Provide file name and path of input files |
| packages/nixpkgs/python312Packages.srvlookup | Wrapper for dnspython to return SRV records for a given host, protocol, and domain name |
| packages/nixpkgs/python312Packages.click-default-group | Group to invoke a command without explicit subcommand name |
| packages/nixpkgs/nodePackages_latest.poor-mans-t-sql-formatter-cli | A T-SQL formatting utility in JS, transpiled from the C# library of the same name. |
| packages/nixpkgs/haskellPackages.dns-patterns | DNS name parsing and pattern matching utilities |
| packages/nixpkgs/vimPlugins.yaml-companion-nvim | |
| packages/nixpkgs/gnomeExtensions.toggle-window | For security reasons, since Gnome 41, cann't invoke '**org.gnome |
| packages/nixpkgs/python313Packages.libasyncns | Libasyncns-python is a python binding for the asynchronous name service query library |
| packages/nixpkgs/python314Packages.libasyncns | Libasyncns-python is a python binding for the asynchronous name service query library |
| packages/nixpkgs/texlivePackages.cmdstring | Get command name reliably |
| packages/nixpkgs/gnomeExtensions.vpn-indicator | Display current VPN name in panel. |
| packages/nixpkgs/perlPackages.DataValidateDomain | Domain and host name validation |
| packages/nixpkgs/perl5Packages.DataValidateDomain | Domain and host name validation |
| packages/nixpkgs/libcanberra_kde | Implementation of the XDG Sound Theme and Name Specifications |
| packages/nixpkgs/gnomeExtensions.ip-indicator | Displays the current IP address of the network with it's relevant interface name |
| packages/nixpkgs/python312Packages.libasyncns | Libasyncns-python is a python binding for the asynchronous name service query library |
| packages/nixpkgs/texlivePackages.noconflict | Resolve macro name conflict between packages |
| packages/nixpkgs/texlivePackages.savefnmark | Save name of the footnote mark for reuse |
| packages/nixpkgs/haskellPackages.denominate | Functions supporting bulk file and directory name normalization |
| packages/nixpkgs/perlPackages.Apppapersway | PaperWM-like scrollable tiling window management for Sway/i3wm |
| packages/nixpkgs/perl538Packages.DataValidateDomain | Domain and host name validation |
| packages/nixpkgs/perl540Packages.DataValidateDomain | Domain and host name validation |
| packages/nixpkgs/haskellPackages.hs-nombre-generator | Name generator |
| packages/nixpkgs/perl5Packages.Apppapersway | PaperWM-like scrollable tiling window management for Sway/i3wm |
| packages/nixpkgs/python313Packages.pyaxmlparser | Python3 Parser for Android XML file and get Application Name without using Androguard |
| packages/nixpkgs/python314Packages.pyaxmlparser | Python3 Parser for Android XML file and get Application Name without using Androguard |
| packages/nixpkgs/python312Packages.publicsuffix | Allows to get the public suffix of a domain name |
| packages/nixpkgs/python313Packages.publicsuffix | Allows to get the public suffix of a domain name |
| packages/nixpkgs/perl540Packages.Apppapersway | PaperWM-like scrollable tiling window management for Sway/i3wm |
| packages/nixpkgs/perl538Packages.Apppapersway | PaperWM-like scrollable tiling window management for Sway/i3wm |
| packages/nixpkgs/python312Packages.pyaxmlparser | Python3 Parser for Android XML file and get Application Name without using Androguard |
| packages/nixpkgs/python313Packages.publicsuffix2 | Get a public suffix for a domain name using the Public Suffix List |
| packages/nixpkgs/python314Packages.publicsuffix2 | Get a public suffix for a domain name using the Public Suffix List |
| packages/nixpkgs/python312Packages.publicsuffix2 | Get a public suffix for a domain name using the Public Suffix List |
| packages/nixpkgs/perlPackages.MooseXSemiAffordanceAccessor | Name your accessors foo() and set_foo() |
| packages/nixpkgs/perl5Packages.MooseXSemiAffordanceAccessor | Name your accessors foo() and set_foo() |
| packages/nixpkgs/perl540Packages.MooseXSemiAffordanceAccessor | Name your accessors foo() and set_foo() |
| packages/nixpkgs/perl538Packages.MooseXSemiAffordanceAccessor | Name your accessors foo() and set_foo() |
| packages/nixpkgs/gnomeExtensions.applications-overview-tooltip | Shows a tooltip over applications icons on applications overview with application name and/or description. |
| packages/nixpkgs/python313Packages.cv2-enumerate-cameras | Retrieve the connected camera's name, VID, PID, and the corresponding OpenCV index |
| packages/nixpkgs/python314Packages.cv2-enumerate-cameras | Retrieve the connected camera's name, VID, PID, and the corresponding OpenCV index |
| packages/nixpkgs/python312Packages.cv2-enumerate-cameras | Retrieve the connected camera's name, VID, PID, and the corresponding OpenCV index |
| packages/nixpkgs/gnomeExtensions.transcodeappsearch | Searching apps both direct and transcoded name (English, Russian, Ukrainian langs) |
| packages/nixpkgs/python312Packages.pythonNamespacesHook | |
| packages/nixpkgs/python313Packages.pythonNamespacesHook | |
| packages/nixpkgs/python314Packages.pythonNamespacesHook | |
| options/nixos/security.allowUserNamespaces | Whether to allow creation of user namespaces
|
| options/nixos/services.ceph.mgr.daemons | A list of names for manager daemons that should have a service created
|
| options/nixos/services.ceph.osd.daemons | A list of OSD daemons that should have a service created
|
| options/nixos/services.ceph.mon.daemons | A list of monitor daemons that should have a service created
|
| options/nixos/services.ceph.mds.daemons | A list of metadata service daemons that should have a service created
|
| options/nixos/services.ceph.rgw.daemons | A list of rados gateway daemons that should have a service created
|
| options/nixos/boot.bootspec.extensions | User-defined data that extends the bootspec document
|
| options/home-manager/programs.zellij.themes | Each them is written to $XDG_CONFIG_HOME/zellij/themes/NAME.kdl
|
| options/home-manager/programs.ptyxis.palettes | Written to {file}`$XDG_CONFIG_HOME/org.gnome
|
| options/home-manager/programs.foliate.themes | Each theme is written to
{file}`$XDG_CONFIG_HOME/com.github.johnfactotum
|
| options/home-manager/programs.halloy.themes | Each theme is written to $XDG_CONFIG_HOME/halloy/themes/NAME.toml
|
| options/nixos/services.iodine.server.domain | Domain or subdomain of which nameservers point to us
|
| options/nixos/services.httpd.logPerVirtualHost | If enabled, each virtual host gets its own
access.log and
error.log, namely suffixed by the
hostName of the virtual host.
|
| options/nixos/services.nginx.enableQuicBPF | Enables routing of QUIC packets using eBPF
|
| options/nixos/services.ncdns.enable | Whether to enable ncdns, a Go daemon to bridge Namecoin to DNS
|
| options/home-manager/programs.television.channels | Each set of channels are written to
$XDG_CONFIG_HOME/television/cable/NAME.toml
See https://alexpasmantier.github.io/television/docs/Users/channels
for options
|
| options/nixos/security.unprivilegedUsernsClone | When disabled, unprivileged users will not be able to create new namespaces
|
| options/nixos/services.resolved.settings.Resolve.DNSOverTLS | Whether to use TLS encryption for DNS queries
|
| options/nixos/services.bind.configFile | Overridable config file to use for named
|
| options/nixos/services.hickory-dns.settings.zones.*.zone_type | One of:
- "Primary" (the master, authority for the zone).
- "Secondary" (the slave, replicated from the primary).
- "External" (a cached zone that queries other nameservers)
|
| options/nixos/services.pdns-recursor.resolveNamecoin | Resolve .bit top-level domains using ncdns and namecoin.
|
| options/nixos/services.foundationdb.extraReadWritePaths | An extra set of filesystem paths that FoundationDB can read to
and write from
|
| options/darwin/nix.settings.sandbox | If set, Nix will perform builds in a sandboxed environment that it
will set up automatically for each build
|
| options/darwin/nix.nixPath | The default Nix expression search path, used by the Nix
evaluator to look up paths enclosed in angle brackets
(e.g. <nixpkgs>)
|
| options/home-manager/home.pointerCursor | Cursor configuration
|
| options/nixos/boot.loader.grub.efiInstallAsRemovable | Whether to invoke grub-install with
--removable
|
| options/nixos/services.ocis.group | The group to run oCIS under
|
| options/nixos/services.bind.extraArgs | Additional command-line arguments to pass to named.
|
| options/home-manager/programs.zsh.dirHashes | An attribute set that adds to named directory hash table.
|
| options/nixos/services.ocis.user | The user to run oCIS as
|
| options/nixos/services.kubo.settings.Mounts.MFS | Where to mount the MFS namespace to
|
| options/nixos/services.oink.domains | List of attribute sets containing configuration for each domain
|
| options/home-manager/targets.genericLinux.nixGL.installScripts | For each wrapper wrp named in the provided list, a wrapper script
named nixGLWrp is installed into the environment
|
| options/nixos/services.kubo.settings.Mounts.IPNS | Where to mount the IPNS namespace to
|
| options/nixos/services.kubo.settings.Mounts.IPFS | Where to mount the IPFS namespace to
|
| options/nixos/nix.settings.sandbox | If set, Nix will perform builds in a sandboxed environment that it
will set up automatically for each build
|
| options/nixos/systemd.mounts.*.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/services.bind.extraConfig | Extra lines to be added verbatim to the generated named configuration file.
|
| options/nixos/services.code-server.user | The user to run code-server as
|
| options/nixos/nix.sshServe.write | Whether to enable writing to the Nix store as a remote store via SSH
|
| options/nixos/services.public-inbox.inboxes | Inboxes to configure, where attribute names are inbox names.
|
| options/nixos/services.resolved.domains | A list of domains
|
| options/nixos/services.eris-server.mountpoint | Mountpoint for FUSE namespace that exposes "urn:eris:…" files.
|
| options/nixos/services.code-server.group | The group to run code-server under
|
| options/home-manager/xdg.systemDirs.data | Directory names to add to XDG_DATA_DIRS
in the user session.
|
| options/nixos/services.bind.extraOptions | Extra lines to be added verbatim to the options section of the
generated named configuration file.
|
| options/nixos/boot.initrd.kernelModules | Set of modules that are always loaded by the initrd
|
| options/home-manager/programs.kodi.addonSettings | Attribute set with the plugin namespace as toplevel key and the plugins
settings as lower level key/value pairs
|
| options/darwin/system.darwinLabel | Label to be used in the names of generated outputs.
|
| options/nixos/boot.kernelModules | The set of kernel modules to be loaded in the second stage of
the boot process
|
| options/nixos/systemd.automounts.*.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/services.btrbk.instances | Set of btrbk instances
|
| options/nixos/services.keepalived.snmp.socket | Socket to use for connecting to SNMP master agent
|
| options/nixos/services.opencloud.group | The group to run OpenCloud under
|
| options/nixos/services.syncthing.group | The group to run Syncthing under
|
| options/home-manager/xdg.systemDirs.config | Directory names to add to XDG_CONFIG_DIRS
in the user session.
|
| options/nixos/services.opencloud.user | The user to run OpenCloud as
|
| options/nixos/services.autossh.sessions | List of AutoSSH sessions to start as systemd services
|
| options/nixos/services.syncthing.user | The user to run Syncthing as
|
| options/darwin/services.autossh.sessions | List of AutoSSH sessions to start as launchd daemon
|
| options/nixos/services.sks.extraDbConfig | Set contents of the files "KDB/DB_CONFIG" and "PTree/DB_CONFIG" within
the ${dataDir} directory
|
| options/home-manager/programs.kakoune.config.hooks.*.group | Add the hook to the named group.
|
| options/home-manager/programs.lutris.runners | Attribute set of Lutris runners along with their configurations
|
| options/nixos/services.seafile.seafileSettings.fileserver.host | The bind address used by seafile fileserver
|
| options/nixos/services.factorio.mods | Mods the server should install and activate
|
| options/home-manager/fonts.fontconfig.configFile | Extra font config files that will be added to ~/.config/fontconfig/conf.d/
|
| options/home-manager/programs.borgmatic.backups | Borgmatic allows for several named backup configurations,
each with its own source directories and repositories.
|
| options/nixos/systemd.mounts | Definition of systemd mount units; see systemd.mount(5)
|
| options/nixos/services.couchdb.databaseDir | Specifies location of CouchDB database files (*.couch named)
|
| options/nixos/services.ddclient.passwordFile | A file containing the password or a TSIG key in named format when using the nsupdate protocol.
|
| options/darwin/networking.dns | The list of dns servers used when resolving domain names.
|
| options/nixos/services.freeciv.settings.saves | Save games to given directory,
a sub-directory named after the starting date of the service
will me inserted to preserve older saves.
|
| options/nixos/services.sks.webroot | Source directory (will be symlinked, if not null) for the files the
built-in webserver should serve
|
| options/home-manager/services.podman.useDefaultMachine | Whether to create and use the default podman machine
|
| options/nixos/boot.blacklistedKernelModules | Set of names of kernel modules that should not be loaded
automatically by the hardware probing code
|
| options/nixos/hardware.sane.disabledDefaultBackends | Names of backends which are enabled by default but should be disabled
|
| options/home-manager/specialisation | A set of named specialized configurations
|
| options/nixos/services.openvscode-server.user | The user to run openvscode-server as
|
| options/nixos/services.tor.relay.onionServices | See torrc manual.
Because tor.service runs in its own RootDirectory=,
when using a onion service to reverse-proxy to a Unix socket,
you need to make that Unix socket available
within the mount namespace of tor.service
|
| options/nixos/services.openvscode-server.group | The group to run openvscode-server under
|
| options/home-manager/programs.boxxy.rules.*.only | Apply redirection ONLY to specified executable names.
|
| options/nixos/networking.usePredictableInterfaceNames | Whether to assign predictable names to network interfaces
|
| options/nixos/boot.kernel.sysfs | sysfs attributes to be set as soon as they become available
|
| options/nixos/services.sks.hkpAddress | Domain names, IPv4 and/or IPv6 addresses to listen on for HKP
requests.
|
| options/home-manager/programs.eza.icons | Display icons next to file names (--icons argument)
|
| options/nixos/services.silverbullet.group | The group to run Silverbullet under
|
| options/nixos/hardware.printers.ensureDefaultPrinter | Ensures the named printer is the default CUPS printer / printer queue.
|
| options/nixos/networking.rxe.interfaces | Enable RDMA on the listed interfaces
|
| options/nixos/virtualisation.bios | An alternate BIOS (such as qboot) with which to start the VM
|
| options/nixos/services.silverbullet.user | The user to run Silverbullet as
|
| options/darwin/networking.search | The list of search paths used when resolving domain names.
|
| options/nixos/services.headscale.settings.oidc.strip_email_domain | Whether the domain part of the email address should be removed when generating namespaces.
|
| options/nixos/hardware.alsa.enableRecorder | Whether to set up a loopback device that continuously records and
allows to play back audio from the computer
|
| options/nixos/security.pki.caCertificateBlacklist | A list of blacklisted CA certificate names that won't be imported from
the Mozilla Trust Store into
/etc/ssl/certs/ca-certificates.crt
|
| options/darwin/security.pki.caCertificateBlacklist | A list of blacklisted CA certificate names that won't be imported from
the Mozilla Trust Store into
/etc/ssl/certs/ca-certificates.crt
|
| options/home-manager/programs.fish.shellAbbrs | An attribute set that maps aliases (the top level attribute names
in this option) to abbreviations
|
| options/nixos/boot.initrd.systemd.mounts | Definition of systemd mount units
|
| options/nixos/boot.kernel.sysctl | Runtime parameters of the Linux kernel, as set by
sysctl(8)
|
| options/nixos/services.tt-rss.sphinx.index | Index names in Sphinx configuration
|
| options/nixos/services.osquery.flags | Attribute set of flag names and values to be written to the osqueryd flagfile
|
| options/nixos/services.traefik.dynamic.settings | Dynamic configuration for Traefik, written in Nix
|
| options/nixos/services.dependency-track.oidc.teams.default | Defines one or more team names that auto-provisioned OIDC users shall be added to
|
| options/nixos/hardware.alsa.deviceAliases | Assign custom names to sound cards.
|
| options/nixos/services.prometheus.remoteWrite.*.sigv4.profile | The named AWS profile used to authenticate.
|
| options/nixos/virtualisation.libvirtd.qemu.verbatimConfig | Contents written to the qemu configuration file, qemu.conf
|
| options/nixos/services.factorio.admins | List of player names which will be admin.
|
| options/nixos/services.rabbitmq.listenAddress | IP address on which RabbitMQ will listen for AMQP
connections
|
| options/nixos/services.disnix.profiles | Names of the Disnix profiles to expose in the system's PATH
|
| options/nixos/hardware.alsa.cardAliases | Assign custom names and reorder the sound cards.
You can find the card ids by looking at /proc/asound/cards.
|
| options/home-manager/programs.ion.shellAliases | An attribute set that maps aliases (the top level attribute names
in this option) to command strings or directly to build outputs.
|
| options/home-manager/programs.zsh.shellAliases | An attribute set that maps aliases (the top level attribute names in
this option) to command strings or directly to build outputs.
|
| options/nixos/image.repart.partitions | Specify partitions as a set of the names of the partitions with their
configuration as the key.
|
| options/nixos/services.rshim.config | Structural setting for the rshim configuration file
(/etc/rshim.conf)
|
| options/home-manager/home.shellAliases | An attribute set that maps aliases (the top level attribute names
in this option) to command strings or directly to build outputs
|
| options/nixos/services.epgstation.database.passwordFile | A file containing the password for the database named
database.name.
|
| options/nixos/services.postsrsd.domains | Domain names for rewrite
|
| options/nixos/services.rabbitmq.plugins | The names of plugins to enable
|
| options/home-manager/programs.fish.shellAliases | An attribute set that maps aliases (the top level attribute names
in this option) to command strings or directly to build outputs.
|
| options/home-manager/programs.bash.shellAliases | An attribute set that maps aliases (the top level attribute names in
this option) to command strings or directly to build outputs.
|
| options/nixos/services.nginx.serverNamesHashMaxSize | Sets the maximum size of the server names hash tables.
|
| options/home-manager/programs.mpvpaper.stopList | List of program names that will cause mpvpaper to stop
|
| options/nixos/services.collectd.plugins | Attribute set of plugin names to plugin config segments
|
| options/nixos/meta.maintainers | List of maintainers of each module
|
| options/nixos/services.anki-sync-server.address | IP address anki-sync-server listens to
|
| options/nixos/systemd.automounts | Definition of systemd automount units; see systemd.automount(5)
|
| options/home-manager/meta.maintainers | List of maintainers of each module
|
| options/home-manager/programs.mpvpaper.pauseList | List of program names that will cause mpvpaper to pause
|
| options/home-manager/programs.sketchybar.config | The sketchybar configuration
|
| options/nixos/services.movim.h2o.serverAliases | Additional names of virtual hosts served by this virtual host
configuration.
|
| options/nixos/xdg.icons.fallbackCursorThemes | Names of the fallback cursor themes, in order of preference, to be used when no other icon source can be found
|
| options/nixos/services.activemq.configurationDir | The base directory for ActiveMQ's configuration
|
| options/nixos/services.automx2.domain | E-Mail-Domain for which mail client autoconfig/autoconfigure should be set up
|
| options/nixos/services.hickory-dns.package | The hickory-dns package to use. ::: {.note}
The package must provide meta.mainProgram which names the server binary; any other utilities (client, resolver) are not needed.
:::
|
| options/nixos/services.davis.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.slskd.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.mysqlBackup.databases | List of database names to dump.
|
| options/nixos/services.movim.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/nix.settings.trusted-users | A list of names of users that have additional rights when
connecting to the Nix daemon, such as the ability to specify
additional binary caches, or to import unsigned NARs
|
| options/nixos/services.mailman.webHosts | The list of hostnames and/or IP addresses from which the Mailman Web
UI will accept requests
|
| options/nixos/services.pdns-recursor.exportHosts | Whether to export names and IP addresses defined in /etc/hosts.
|
| options/nixos/services.snipe-it.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.vsftpd.userlistDeny | Specifies whether userlistFile is a list of user
names to allow or deny access
|
| options/darwin/nix.settings.trusted-users | A list of names of users that have additional rights when
connecting to the Nix daemon, such as the ability to specify
additional binary caches, or to import unsigned NARs
|
| options/nixos/services.dependency-track.settings."alpine.oidc.teams.default" | Defines one or more team names that auto-provisioned OIDC users shall be added to
|
| options/nixos/nix.settings.allowed-users | A list of names of users (separated by whitespace) that are
allowed to connect to the Nix daemon
|
| options/darwin/nix.settings.allowed-users | A list of names of users (separated by whitespace) that are
allowed to connect to the Nix daemon
|
| options/home-manager/programs.nushell.shellAliases | An attribute set that maps aliases (the top level attribute names in
this option) to command strings or directly to build outputs.
|
| options/nixos/hardware.sensor.hddtemp.drives | List of drives to monitor
|
| options/nixos/services.gancio.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.fluidd.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.akkoma.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.matomo.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.monica.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.unclutter.excluded | Names of windows where unclutter should not apply
|
| options/nixos/boot.initrd.availableKernelModules | The set of kernel modules in the initial ramdisk used during the
boot process
|
| options/nixos/services.apcupsd.hooks | Each attribute in this option names an apcupsd event and the string
value it contains will be executed in a shell, in response to that
event (prior to the default action)
|
| options/nixos/services.gnome.gnome-keyring.enable | Whether to enable GNOME Keyring daemon, a service designed to
take care of the user's security credentials,
such as user names and passwords
.
|
| options/nixos/services.nginx.serverNamesHashBucketSize | Sets the bucket size for the server names hash tables
|
| options/home-manager/programs.powerline-go.modules | List of module names to load
|
| options/home-manager/programs.hyprlock.settings | Hyprlock configuration written in Nix
|
| options/home-manager/services.hypridle.settings | Hypridle configuration written in Nix
|
| options/nixos/boot.initrd.systemd.automounts | Definition of systemd automount units
|
| options/nixos/services.dolibarr.h2o.serverAliases | Additional names of virtual hosts served by this virtual host
configuration.
|
| options/nixos/services.orangefs.server.servers | URLs for storage server including port
|
| options/home-manager/programs.zsh.antidote.useFriendlyNames | Whether to enable friendly names.
|
| options/darwin/environment.shellAliases | An attribute set that maps aliases (the top level attribute names in
this option) to command strings or directly to build outputs
|
| options/home-manager/xsession.windowManager.bspwm.monitors | Specifies the names of desktops to create on each monitor.
|
| options/nixos/services.phpfpm.settings | PHP-FPM global directives
|
| options/nixos/systemd.repart.partitions | Specify partitions as a set of the names of the definition files as the
key and the partition configuration as its value
|
| options/nixos/services.vsftpd.userlistFile | Newline separated list of names to be allowed/denied if userlistEnable
is true
|
| options/nixos/services.dolibarr.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.librenms.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.kanboard.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.fediwall.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.agorakit.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.mainsail.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.pixelfed.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/home-manager/services.hyprpaper.settings | hyprpaper configuration written in Nix
|
| options/home-manager/xsession.windowManager.xmonad.libFiles | Additional files that will be saved in
~/.xmonad/lib/ and included in the configuration
build
|
| options/nixos/environment.shellAliases | An attribute set that maps aliases (the top level attribute names in
this option) to command strings or directly to build outputs
|
| options/nixos/services.rustdesk-server.signal.relayHosts | The relay server IP addresses or DNS names of the RustDesk relay.
|
| options/nixos/services.nagios.virtualHost.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.moodle.virtualHost.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.graphite.carbon.rewriteRules | Regular expression patterns that can be used to rewrite metric names
in a search and replace fashion.
|
| options/nixos/services.cloudflare-dyndns.domains | List of domain names to update records for.
|
| options/nixos/services.rkvm.server.settings.switch-keys | A key list specifying a host switch combination.
A list of key names is available in https://github.com/htrefil/rkvm/blob/master/switch-keys.md.
|
| options/nixos/services.radicle.httpd.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.mysql.initialDatabases | List of database names and their initial schemas that should be used to create databases on the first startup
of MySQL
|
| options/nixos/services.kubernetes.pki.cfsslAPIExtraSANs | Extra x509 Subject Alternative Names to be added to the cfssl API webserver TLS cert.
|
| options/nixos/services.anuko-time-tracker.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.music-assistant.providers | List of provider names for which dependencies will be installed.
|
| options/nixos/systemd.sysupdate.transfers | Specify transfers as a set of the names of the transfer files as the
key and the configuration as its value
|
| options/nixos/services.bookstack.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.libvirtd.autoSnapshot.prefix | Prefix for automatic snapshot names
|
| options/nixos/services.unpoller.unifi.defaults.sites | List of site names for which statistics should be exported
|
| options/nixos/services.netbox.settings.ALLOWED_HOSTS | A list of valid fully-qualified domain names (FQDNs) and/or IP
addresses that can be used to reach the NetBox service.
|
| options/nixos/services.uwsgi.instance | uWSGI configuration
|
| options/home-manager/services.hyprsunset.settings | Hyprsunset configuration written in Nix
|
| options/nixos/services.tor.torsocks.onionAddrRange | Tor hidden sites do not have real IP addresses
|
| options/home-manager/programs.powerline-go.modulesRight | List of module names to load to be displayed on the right side
|
| options/nixos/services.jirafeau.nginxConfig.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/boot.supportedFilesystems | Names of supported filesystem types, or an attribute set of file system types
and their state
|
| options/nixos/services.postgresqlBackup.databases | List of database names to dump.
|
| options/nixos/services.cloudflare-ddns.domains | List of domain names (FQDNs) to manage
|
| options/nixos/services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.profile | Named AWS profile used to connect to the API.
|
| options/nixos/services.openafsServer.dottedPrincipals | If enabled, allow principal names containing (.) dots
|
| options/nixos/services._3proxy.services.*.acl.*.targets | List of target IP ranges, use empty list for any
|
| options/nixos/services.kubernetes.apiserver.extraSANs | Extra x509 Subject Alternative Names to be added to the kubernetes apiserver tls cert.
|
| options/nixos/services.unpoller.unifi.defaults.hash_pii | Hash, with md5, client names and MAC addresses
|
| options/nixos/services.mysqlBackup.singleTransaction | Whether to create database dump in a single transaction
|
| options/nixos/hardware.facter.detected.dhcp.interfaces | List of network interface names to configure with DHCP
|
| options/home-manager/wayland.windowManager.hyprland.settings | Hyprland configuration written in Nix
|
| options/nixos/services.froide-govplan.settings.ALLOWED_HOSTS | A list of valid fully-qualified domain names (FQDNs) and/or IP
addresses that can be used to reach the Froide-Govplan service.
|
| options/nixos/environment.wordlist.lists | A set with the key names being the environment variable you'd like to
set and the values being a list of paths to text documents containing
lists of words
|
| options/home-manager/programs.zsh.zsh-abbr.abbreviations | An attribute set that maps aliases (the top level attribute names
in this option) to abbreviations
|
| options/nixos/services.limesurvey.virtualHost.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/boot.initrd.supportedFilesystems | Names of supported filesystem types, or an attribute set of file system types
and their state
|
| options/nixos/services.triggerhappy.bindings.*.keys | List of keys to match
|
| options/nixos/services.mediawiki.database.tablePrefix | If you only have access to a single database and wish to install more than
one version of MediaWiki, or have other applications that also use the
database, you can give the table names a unique prefix to stop any naming
conflicts or confusion
|
| options/nixos/services.peering-manager.settings.ALLOWED_HOSTS | A list of valid fully-qualified domain names (FQDNs) and/or IP
addresses that can be used to reach the peering manager service.
|
| options/nixos/services.postfix.localRecipients | List of accepted local users
|
| options/nixos/services.mediawiki.httpd.virtualHost.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.unpoller.unifi.controllers.*.sites | List of site names for which statistics should be exported
|
| options/nixos/services.munin-node.extraAutoPlugins | Additional Munin plugins to autoconfigure, using
munin-node-configure --suggest
|
| options/nixos/services.factorio.allowedPlayers | If non-empty, only these player names are allowed to connect
|
| options/nixos/services.limesurvey.nginx.virtualHost.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.limesurvey.httpd.virtualHost.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.znapzend.features.lowmemRecurse | Whether to enable use lowmemRecurse on systems where you have too many datasets, so a
recursive listing of attributes to find backup plans exhausts the
memory available to znapzend: instead, go the slower
way to first list all impacted dataset names, and then query their
configs one by one
.
|
| options/nixos/services.healthchecks.settings.ALLOWED_HOSTS | The host/domain names that this site can serve.
|
| options/nixos/services.alloy.configPath | Alloy configuration file/directory path
|
| options/nixos/services.unpoller.unifi.controllers.*.hash_pii | Hash, with md5, client names and MAC addresses
|
| options/nixos/boot.zfs.requestEncryptionCredentials | If true on import encryption keys or passwords for all encrypted datasets
are requested
|
| options/nixos/services.misskey.reverseProxy.webserver.caddy.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.prometheus.exporters.nut.nutVariables | List of NUT variable names to monitor
|
| options/home-manager/programs.vim.settings | At attribute set of Vim settings
|
| options/nixos/services.mysql.ensureUsers.*.ensurePermissions | Permissions to ensure for the user, specified as attribute set
|
| options/nixos/virtualisation.libvirtd.qemu.ovmf.packages | List of OVMF packages to use
|
| options/nixos/services.postfix.settings.main.mydestination | List of domain names intended for local delivery using /etc/passwd and /etc/aliases.
Do not include virtual domains in this list.
https://www.postfix.org/postconf.5.html#mydestination
|
| options/nixos/services.openssh.settings.AuthorizedPrincipalsFile | Specifies a file that lists principal names that are accepted for certificate authentication
|
| options/nixos/services.prometheus.exporters.restic.rcloneOptions | Options to pass to rclone to control its behavior
|
| options/nixos/services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.profile | Named AWS profile used to connect to the API.
|
| options/nixos/services.magnetico.web.credentialsFile | The path to the file holding the credentials to access the web
interface
|
| options/nixos/services.prometheus.exporters.collectd.collectdBinary.authFile | File mapping user names to pre-shared keys (passwords).
|
| options/darwin/services.postgresql.ensureUsers.*.ensurePermissions | Permissions to ensure for the user, specified as an attribute set
|
| options/nixos/services.prometheus.exporters.unpoller.controllers.*.sites | List of site names for which statistics should be exported
|
| options/nixos/services.vaultwarden.config | The configuration of vaultwarden is done through environment variables,
therefore it is recommended to use upper snake case (e.g. DISABLE_2FA_REMEMBER)
|
| options/nixos/services.pipewire.wireplumber.extraConfig | Additional configuration for the WirePlumber daemon when run in
single-instance mode (the default in nixpkgs and currently the only
supported way to run WirePlumber configured via extraConfig)
|
| options/nixos/services.prometheus.exporters.unpoller.controllers.*.hash_pii | Hash, with md5, client names and MAC addresses
|
| options/nixos/services.borgmatic.settings.source_directories | List of source directories and files to backup
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.separator | The string by which Uyuni group names are joined into the groups label
Defaults to , in prometheus
when set to null.
|
| options/nixos/services.prometheus.scrapeConfigs.*.dns_sd_configs.*.refresh_interval | The time after which the provided names are refreshed
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.refresh_interval | The time after which the provided names are refreshed
|
| options/nixos/services.xserver.videoDrivers | The names of the video drivers the configuration
supports
|
| packages/nixpkgs/haskellPackages.NameGenerator | A name generator written in Haskell |
| packages/nixpkgs/python313Packages.aenum | Advanced Enumerations (compatible with Python's stdlib Enum), NamedTuples, and NamedConstants |
| packages/nixpkgs/python314Packages.aenum | Advanced Enumerations (compatible with Python's stdlib Enum), NamedTuples, and NamedConstants |
| packages/nixpkgs/python312Packages.aenum | Advanced Enumerations (compatible with Python's stdlib Enum), NamedTuples, and NamedConstants |
| packages/nixpkgs/tg | Terminal client for telegram |
| packages/nixpkgs/libaal | Support library for Reiser4 |
| packages/nixpkgs/ncdns | Namecoin to DNS bridge daemon |
| packages/nixpkgs/ndisc6 | Small collection of useful tools for IPv6 networking |
| packages/nixpkgs/libnss-mysql | MySQL module for the Solaris Nameservice Switch (NSS) |
| packages/nixpkgs/net-tools | Set of tools for controlling the network subsystem in Linux |
| packages/nixpkgs/nss_ldap | LDAP module for the Solaris Nameservice Switch (NSS) |
| packages/nixpkgs/nettools | Set of tools for controlling the network subsystem in Linux |
| packages/nixpkgs/omniorb | Robust high performance CORBA ORB for C++ and Python |
| packages/nixpkgs/untie | Tool to run processes untied from some of the namespaces |
| packages/nixpkgs/lngen | Tool for generating Locally Nameless definitions and proofs in Coq, working together with Ott |
| packages/nixpkgs/oniux | Isolate Applications over Tor using Linux Namespaces |
| packages/nixpkgs/python313Packages.f90nml | Python module for working with Fortran Namelists |
| packages/nixpkgs/python314Packages.f90nml | Python module for working with Fortran Namelists |
| packages/nixpkgs/haskellPackages.txt-sushi | The SQL link in your *NIX chain |
| packages/nixpkgs/vopono | Run applications through VPN connections in network namespaces |
| packages/nixpkgs/python312Packages.f90nml | Python module for working with Fortran Namelists |
| packages/nixpkgs/golangci-lint-langserver | Language server for golangci-lint |
| packages/nixpkgs/python314Packages.omniorb | Robust high performance CORBA ORB for C++ and Python |
| packages/nixpkgs/nsjail | Light-weight process isolation tool, making use of Linux namespaces and seccomp-bpf syscall filters |
| packages/nixpkgs/netns-proxy | Simple and slim proxy to forward ports from and into linux network namespaces |
| packages/nixpkgs/reiserfsprogs | ReiserFS utilities |
| packages/nixpkgs/python313Packages.pre-commit-hooks | Some out-of-the-box hooks for pre-commit |
| packages/nixpkgs/python314Packages.pre-commit-hooks | Some out-of-the-box hooks for pre-commit |
| packages/nixpkgs/nfd | Named Data Networking (NDN) Forwarding Daemon |
| packages/nixpkgs/macpm | Perf monitoring CLI tool for Apple Silicon; previously named 'asitop' |
| packages/nixpkgs/ndn-cxx | Named Data Networking (NDN) or Content Centric Networking (CCN) abstraction |
| packages/nixpkgs/kubectx | Fast way to switch between clusters and namespaces in kubectl |
| packages/nixpkgs/debian-devscripts | Debian package maintenance scripts |
| packages/nixpkgs/ndn-tools | Named Data Networking (NDN) Essential Tools |
| packages/nixpkgs/util-linux | Set of system utilities for Linux |
| packages/nixpkgs/haskellPackages.provide | Lightweight dependency injection / namespaced+typed implicit-ish arguments |
| packages/nixpkgs/libuuid | Set of system utilities for Linux |
| packages/nixpkgs/minijail | Sandboxing library and application using Linux namespaces and capabilities |
| packages/nixpkgs/kns | Kubernetes namespace switcher |
| packages/nixpkgs/temporal-cli | Command-line interface for running Temporal Server and interacting with Workflows, Activities, Namespaces, and other parts of Temporal |
| packages/nixpkgs/pipectl | Simple named pipe management utility |
| packages/nixpkgs/kubie | Shell independent context and namespace switcher for kubectl |
| packages/nixpkgs/haskellPackages.rosa | Query the namecoin blockchain |
| packages/nixpkgs/livi | Small video player targeting mobile devices (also named μPlayer) |
| packages/nixpkgs/haskellPackages.global-variables | Namespaced, global, and top-level mutable variables without unsafePerformIO |
| packages/nixpkgs/haskellPackages.erebos-tester | Test framework with virtual network using Linux namespaces |
| packages/nixpkgs/firejail | Namespace-based sandboxing tool for Linux |
| packages/nixpkgs/slirp4netns | User-mode networking for unprivileged network namespaces |
| packages/nixpkgs/typstPackages.niram-css | Allows CSS named colors to be used directly in a Typst document |
| packages/nixpkgs/sway-scratch | Automatically starting named scratchpads for sway |
| packages/nixpkgs/color-lsp | A document color language server supporting HEX, RGB, HSL, and named colors |
| packages/nixpkgs/krane | Command-line tool that helps you ship changes to a Kubernetes namespace and understand the result |
| packages/nixpkgs/raider | Permanently delete your files (also named File Shredder) |
| packages/nixpkgs/python313Packages.apipkg | Namespace control and lazy-import mechanism |
| packages/nixpkgs/python314Packages.apipkg | Namespace control and lazy-import mechanism |
| packages/nixpkgs/kodiPackages.idna | Internationalized Domain Names for Python |
| packages/nixpkgs/python313Packages.oldmemo | Backend implementation of the `eu.siacs.conversations.axolotl` namespace for python-omemo |
| packages/nixpkgs/python313Packages.twomemo | Backend implementation of the urn:xmpp:omemo:2 namespace for python-omemo |
| packages/nixpkgs/python314Packages.oldmemo | Backend implementation of the `eu.siacs.conversations.axolotl` namespace for python-omemo |
| packages/nixpkgs/python314Packages.twomemo | Backend implementation of the urn:xmpp:omemo:2 namespace for python-omemo |
| packages/nixpkgs/typstPackages.niram-css_0_1_0 | Allows CSS named colors to be used directly in a Typst document |
| packages/nixpkgs/python313Packages.lazy-loader | Populate library namespace without incurring immediate import costs |
| packages/nixpkgs/python314Packages.lazy-loader | Populate library namespace without incurring immediate import costs |
| packages/nixpkgs/cero | Scrape domain names from SSL certificates of arbitrary hosts |
| packages/nixpkgs/busybox | Tiny versions of common UNIX utilities in a single small executable |
| packages/nixpkgs/python312Packages.apipkg | Namespace control and lazy-import mechanism |
| packages/nixpkgs/typstPackages.xodec | Get Codex/Typst names of symbols |
| packages/nixpkgs/python312Packages.oldmemo | Backend implementation of the `eu.siacs.conversations.axolotl` namespace for python-omemo |
| packages/nixpkgs/python312Packages.twomemo | Backend implementation of the urn:xmpp:omemo:2 namespace for python-omemo |
| packages/nixpkgs/python312Packages.lazy-loader | Populate library namespace without incurring immediate import costs |
| packages/nixpkgs/jawiki-all-titles-in-ns0 | Jawiki dump list of page titles in main namespace |
| packages/nixpkgs/merve | Lexer to extract named exports via analysis from CommonJS modules |
| packages/nixpkgs/windows.npiperelay | Access Windows named pipes from WSL |
| packages/nixpkgs/pomodoro-gtk | Simple and intuitive timer application (also named Planytimer) |
| packages/nixpkgs/nflz | Numbered Files Leading Zeros helps you to manage ascending numbered file names |
| packages/nixpkgs/python313Packages.azure-storage-nspkg | Client library for Microsoft Azure Storage services owning the azure.storage namespace, user should not use this directly |
| packages/nixpkgs/python314Packages.azure-storage-nspkg | Client library for Microsoft Azure Storage services owning the azure.storage namespace, user should not use this directly |
| packages/nixpkgs/python313Packages.gliner | Generalist and Lightweight Model for Named Entity Recognition |
| packages/nixpkgs/python314Packages.gliner | Generalist and Lightweight Model for Named Entity Recognition |
| packages/nixpkgs/python313Packages.azure-cosmosdb-nspkg | This is the Microsoft Azure CosmosDB namespace package |
| packages/nixpkgs/python314Packages.azure-cosmosdb-nspkg | This is the Microsoft Azure CosmosDB namespace package |
| packages/nixpkgs/python313Packages.azure-keyvault-nspkg | Microsoft Azure Key Vault Namespace Package [Internal] |
| packages/nixpkgs/python314Packages.azure-keyvault-nspkg | Microsoft Azure Key Vault Namespace Package [Internal] |
| packages/nixpkgs/i3wsr | Automatically change i3 workspace names based on their contents |
| packages/nixpkgs/python313Packages.python-ndn | NDN client library with AsyncIO support |
| packages/nixpkgs/python314Packages.python-ndn | NDN client library with AsyncIO support |
| packages/nixpkgs/python313Packages.azure-mgmt-datalake-nspkg | This is the Microsoft Azure Data Lake Management namespace package |
| packages/nixpkgs/python314Packages.azure-mgmt-datalake-nspkg | This is the Microsoft Azure Data Lake Management namespace package |
| packages/nixpkgs/python312Packages.azure-storage-nspkg | Client library for Microsoft Azure Storage services owning the azure.storage namespace, user should not use this directly |
| packages/nixpkgs/lxqt.lxqt-runner | Tool used to launch programs quickly by typing their names |
| packages/nixpkgs/python312Packages.azure-cosmosdb-nspkg | This is the Microsoft Azure CosmosDB namespace package |
| packages/nixpkgs/python312Packages.azure-keyvault-nspkg | Microsoft Azure Key Vault Namespace Package [Internal] |
| packages/nixpkgs/python312Packages.gliner | Generalist and Lightweight Model for Named Entity Recognition |
| packages/nixpkgs/perlPackages.URIFromHash | Build a URI from a set of named parameters |
| packages/nixpkgs/haskellPackages.nbt | A parser/serializer for Minecraft's Named Binary Tag (NBT) data format |
| packages/nixpkgs/python312Packages.python-ndn | NDN client library with AsyncIO support |
| packages/nixpkgs/perl5Packages.URIFromHash | Build a URI from a set of named parameters |
| packages/nixpkgs/roogle | Rust API search engine which allows you to search functions by names and type signatures |
| packages/nixpkgs/python312Packages.azure-mgmt-datalake-nspkg | This is the Microsoft Azure Data Lake Management namespace package |
| packages/nixpkgs/haskellPackages.nerf | Nerf, a named entity recognition tool based on linear-chain CRFs |
| packages/nixpkgs/vscode-extensions.sdras.night-owl | Visual Studio Code theme named Light Owl for daytime usage |
| packages/nixpkgs/chickenPackages_5.chickenEggs.holes | partial expressions as procedures with named parameters |
| packages/nixpkgs/texlivePackages.philex | Cross references for named and numbered environments |
| packages/nixpkgs/texlivePackages.emarks | Named mark registers with e-TeX |
| packages/nixpkgs/plattenalbum | Client for the Music Player Daemon (originally named mpdevil) |
| packages/nixpkgs/haskellPackages.labels | Anonymous records via named tuples |
| packages/nixpkgs/swaywsr | Automatically change sway workspace names based on their contents |
| packages/nixpkgs/pantheon.elementary-icon-theme | Named, vector icons for elementary OS |
| packages/nixpkgs/perl538Packages.URIFromHash | Build a URI from a set of named parameters |
| packages/nixpkgs/perl540Packages.URIFromHash | Build a URI from a set of named parameters |
| packages/nixpkgs/texlivePackages.css-colors | Named colors for web-safe design |
| packages/nixpkgs/chickenPackages_5.chickenEggs.x11-colors | named standard colors as available in X11 |
| packages/nixpkgs/perlPackages.ConvertColor | Color space conversions and named lookups |
| packages/nixpkgs/typstPackages.conchord | Easily write lyrics with chords, generate chord diagrams by chord names and draw tabs |
| packages/nixpkgs/perlPackages.ColorLibrary | Easy-to-use and comprehensive named-color library |
| packages/nixpkgs/perl5Packages.ConvertColor | Color space conversions and named lookups |
| packages/nixpkgs/perl5Packages.ColorLibrary | Easy-to-use and comprehensive named-color library |
| packages/nixpkgs/gobuster | Tool used to brute-force URIs, DNS subdomains, Virtual Host names on target web servers |
| packages/nixpkgs/typstPackages.xodec_0_2_0 | Get Codex/Typst names of symbols |
| packages/nixpkgs/perlPackages.TestSnapshot | Test against data stored in automatically-named file |
| packages/nixpkgs/texlivePackages.svgcolor | Define SVG named colours |
| packages/nixpkgs/perl5Packages.TestSnapshot | Test against data stored in automatically-named file |
| packages/nixpkgs/akkuPackages.chibi-optional | Syntax to support optional and named keyword arguments |
| packages/nixpkgs/haskellPackages.bluefin-algae | Algebraic effects and named handlers in Bluefin |
| packages/nixpkgs/chickenPackages_5.chickenEggs.anaphora | Some anaphoric and named macros |
| packages/nixpkgs/certgraph | Intelligence tool to crawl the graph of certificate alternate names |
| packages/nixpkgs/python313Packages.idna | Internationalized Domain Names in Applications (IDNA) |
| packages/nixpkgs/python314Packages.idna | Internationalized Domain Names in Applications (IDNA) |
| packages/nixpkgs/perl540Packages.ConvertColor | Color space conversions and named lookups |
| packages/nixpkgs/perl538Packages.ConvertColor | Color space conversions and named lookups |
| packages/nixpkgs/perl538Packages.ColorLibrary | Easy-to-use and comprehensive named-color library |
| packages/nixpkgs/perl540Packages.ColorLibrary | Easy-to-use and comprehensive named-color library |
| packages/nixpkgs/haskellPackages.simple-text-format | Simple text based format strings with named identifiers |
| packages/nixpkgs/texlivePackages.polytable | Tabular-like environments with named columns |
| packages/nixpkgs/haskellPackages.multipass | Folding data with multiple named passes |
| packages/nixpkgs/ocamlPackages.ppx_css | PPX that takes in css strings and produces a module for accessing the unique names defined within |
| packages/nixpkgs/perl540Packages.TestSnapshot | Test against data stored in automatically-named file |
| packages/nixpkgs/perl538Packages.TestSnapshot | Test against data stored in automatically-named file |
| packages/nixpkgs/ipgrep | Extract, defang, resolve names and IPs from text |
| packages/nixpkgs/libxcb-errors | XCB utility library that gives human readable names to error, event & request codes |
| packages/nixpkgs/haskellPackages.implicit-params | Named and unnamed implicit parameters with defaults |
| packages/nixpkgs/libidn | Library for internationalized domain names |
| packages/nixpkgs/haskellPackages.abstractly-keyed-implicits | Manage the implicit parameter namespace dynamically at compile time |
| packages/nixpkgs/python313Packages.emojis | Convert emoji names to emoji characters |
| packages/nixpkgs/python314Packages.emojis | Convert emoji names to emoji characters |
| packages/nixpkgs/python312Packages.idna | Internationalized Domain Names in Applications (IDNA) |
| packages/nixpkgs/fuzzdb | Comprehensive collection of attack patterns and predictable resource names used for security testing and fuzzing application |
| packages/nixpkgs/typstPackages.tricorder | 按占三格的节奏记录中文人名(花名册)Record Chinese names with a rhythm of three characters |
| packages/nixpkgs/python313Packages.rigour | Data cleaning and validation functions for names, languages, identifiers, etc |
| packages/nixpkgs/python313Packages.whodap | Python RDAP utility for querying and parsing information about domain names |
| packages/nixpkgs/python314Packages.whodap | Python RDAP utility for querying and parsing information about domain names |
| packages/nixpkgs/python314Packages.rigour | Data cleaning and validation functions for names, languages, identifiers, etc |
| packages/nixpkgs/massdns | Resolve large amounts of domain names |
| packages/nixpkgs/ocamlPackages.janeStreet.ppx_css | PPX that takes in css strings and produces a module for accessing the unique names defined within |
| packages/nixpkgs/ocamlPackages_latest.ppx_css | PPX that takes in css strings and produces a module for accessing the unique names defined within |
| packages/nixpkgs/haskellPackages.generic-accessors | stringly-named getters for generic data |
| packages/nixpkgs/python313Packages.cpe-search | Search for Common Platform Enumeration (CPE) strings using software names and titles |
| packages/nixpkgs/python314Packages.cpe-search | Search for Common Platform Enumeration (CPE) strings using software names and titles |
| packages/nixpkgs/swayest-workstyle | Map sway workspace names to icons defined depending on the windows inside of the workspace |
| packages/nixpkgs/haskellPackages.urn | Universal Resource Names |
| packages/nixpkgs/ip2location | Look up locations of host names and IP addresses |
| packages/nixpkgs/python312Packages.emojis | Convert emoji names to emoji characters |
| packages/nixpkgs/ip2location-c | Library to look up locations of host names and IP addresses |
| packages/nixpkgs/python312Packages.rigour | Data cleaning and validation functions for names, languages, identifiers, etc |
| packages/nixpkgs/python312Packages.whodap | Python RDAP utility for querying and parsing information about domain names |
| packages/nixpkgs/haskellPackages.dump | Dumps the names and values of expressions to ease debugging |
| packages/nixpkgs/ocamlPackages_latest.janeStreet.ppx_css | PPX that takes in css strings and produces a module for accessing the unique names defined within |
| packages/nixpkgs/haskellPackages.aws-arn | Types and optics for manipulating Amazon Resource Names (ARNs) |
| packages/nixpkgs/python313Packages.country-list | List of all countries with names and ISO 3166-1 codes in all languages |
| packages/nixpkgs/python314Packages.country-list | List of all countries with names and ISO 3166-1 codes in all languages |
| packages/nixpkgs/python313Packages.python-iso639 | ISO 639 language codes, names, and other associated information |
| packages/nixpkgs/python314Packages.python-iso639 | ISO 639 language codes, names, and other associated information |
| packages/nixpkgs/extractpdfmark | Extract page mode and named destinations as PDFmark from PDF |
| packages/nixpkgs/texlivePackages.farbe | Color management (conversion, names) for LuaTeX implemented in Lua |
| packages/nixpkgs/texlivePackages.plain-doc | A list of plain.tex cs names |
| packages/nixpkgs/perlPackages.NetDomainTLD | Work with TLD names |
| packages/nixpkgs/perlPackages.aliased | Use shorter versions of class names |
| packages/nixpkgs/perlPackages.LocaleUtilsPlaceholderNamed | Locale::Utils::PlaceholderNamed - Utils to expand named placeholders |
| packages/nixpkgs/texlivePackages.biocon | Typesetting biological species names |
| packages/nixpkgs/perlPackages.NetIDNEncode | Internationalizing Domain Names in Applications (UTS #46) |
| packages/nixpkgs/perl5Packages.NetDomainTLD | Work with TLD names |
| packages/nixpkgs/texlivePackages.bpchem | Typeset chemical names, formulae, etc |
| packages/nixpkgs/typstPackages.conchord_0_4_0 | Easily write lyrics with chords, generate chord diagrams by chord names and draw tabs |
| packages/nixpkgs/typstPackages.conchord_0_3_0 | Easily write lyrics with chords, generate chord diagrams by chord names and draw tabs |
| packages/nixpkgs/haskellPackages.emojis | Conversion between emoji characters and their names |
| packages/nixpkgs/perl5Packages.LocaleUtilsPlaceholderNamed | Locale::Utils::PlaceholderNamed - Utils to expand named placeholders |
| packages/nixpkgs/haskellPackages.hurdle | Extract function names from Windows DLLs |
| packages/nixpkgs/perl5Packages.aliased | Use shorter versions of class names |
| packages/nixpkgs/haskellPackages.hs-gen-iface | Utility to generate haskell-names interface files |
| packages/nixpkgs/perl5Packages.NetIDNEncode | Internationalizing Domain Names in Applications (UTS #46) |
| packages/nixpkgs/haskellPackages.setops | Uniform names (and Unicode operators) for set operations on data structures |
| packages/nixpkgs/haskellPackages.multi-trie | Trie of sets, as a model for compound names having multiple values |
| packages/nixpkgs/dirbuster | Brute force directories and files names on web/application servers |
| packages/nixpkgs/python313Packages.zulip-emoji-mapping | Get emojis by Zulip names |
| packages/nixpkgs/python314Packages.zulip-emoji-mapping | Get emojis by Zulip names |
| packages/nixpkgs/python312Packages.python-iso639 | ISO 639 language codes, names, and other associated information |
| packages/nixpkgs/haskellPackages.ObjectName | Explicitly handled object names |
| packages/nixpkgs/python313Packages.webcolors | Library for working with color names/values defined by the HTML and CSS specifications |
| packages/nixpkgs/python314Packages.webcolors | Library for working with color names/values defined by the HTML and CSS specifications |
| packages/nixpkgs/python313Packages.html-void-elements | List of HTML void tag names |
| packages/nixpkgs/python314Packages.html-void-elements | List of HTML void tag names |
| packages/nixpkgs/texlivePackages.savesym | Redefine symbols where names conflict |
| packages/nixpkgs/perl540Packages.LocaleUtilsPlaceholderNamed | Locale::Utils::PlaceholderNamed - Utils to expand named placeholders |
| packages/nixpkgs/perl538Packages.LocaleUtilsPlaceholderNamed | Locale::Utils::PlaceholderNamed - Utils to expand named placeholders |
| packages/nixpkgs/theharvester | Gather E-mails, subdomains and names from different public sources |
| packages/nixpkgs/texlivePackages.hvlogos | Print TeX-related names as logo |
| packages/nixpkgs/haskellPackages.unbound | Generic support for programming with names and binders |
| packages/nixpkgs/haskellPackages.state-codes | ISO 3166-2:US state codes and i18n names |
| packages/nixpkgs/texlivePackages.tocdata | Adds names to chapters, sections, figures in the TOC and LOF |
| packages/nixpkgs/haskellPackages.debug-trace-var | You do not have to write variable names twice in Debug |
| packages/nixpkgs/haskellPackages.mx-state-codes | ISO 3166-2:MX State Codes and Names |
| packages/nixpkgs/perlPackages.BKeywords | Lists of reserved barewords and symbol names |
| packages/nixpkgs/perlPackages.DevelSymdump | Dump symbol names or the symbol table |
| packages/nixpkgs/perlPackages.SubIdentify | Retrieve names of code references |
| packages/nixpkgs/perl540Packages.NetDomainTLD | Work with TLD names |
| packages/nixpkgs/perl538Packages.NetDomainTLD | Work with TLD names |
| packages/nixpkgs/perl5Packages.BKeywords | Lists of reserved barewords and symbol names |
| packages/nixpkgs/perl5Packages.DevelSymdump | Dump symbol names or the symbol table |
| packages/nixpkgs/perl540Packages.aliased | Use shorter versions of class names |
| packages/nixpkgs/perl538Packages.aliased | Use shorter versions of class names |
| packages/nixpkgs/haskellPackages.html-entity-map | Map from HTML5 entity names to the corresponding Unicode text |
| packages/nixpkgs/perl5Packages.SubIdentify | Retrieve names of code references |
| packages/nixpkgs/perl540Packages.NetIDNEncode | Internationalizing Domain Names in Applications (UTS #46) |
| packages/nixpkgs/perl538Packages.NetIDNEncode | Internationalizing Domain Names in Applications (UTS #46) |
| packages/nixpkgs/haskellPackages.aeson-casing | Tools to change the formatting of field names in Aeson instances |
| packages/nixpkgs/haskellPackages.acme-grawlix | More readable names for commonly used symbols |
| packages/nixpkgs/texlivePackages.coloring | Define missing colors by their names |
| packages/nixpkgs/python312Packages.zulip-emoji-mapping | Get emojis by Zulip names |
| packages/nixpkgs/python312Packages.webcolors | Library for working with color names/values defined by the HTML and CSS specifications |
| packages/nixpkgs/python312Packages.html-void-elements | List of HTML void tag names |
| packages/nixpkgs/texlivePackages.typstfun | List of equivalent Typst function names of LaTeX commands |
| packages/nixpkgs/haskellPackages.haddock-use-refs | Eliminate warnings for names referred in Haddock only |
| packages/nixpkgs/haskellPackages.country-codes | ISO 3166 country codes and i18n names |
| packages/nixpkgs/perlPackages.AuthenSASLSASLprep | Stringprep Profile for User Names and Passwords (RFC 4013) |
| packages/nixpkgs/skkDictionaries.jinmei | SKK dictionary for names |
| packages/nixpkgs/perl5Packages.AuthenSASLSASLprep | Stringprep Profile for User Names and Passwords (RFC 4013) |
| packages/nixpkgs/haskellPackages.yi-emacs-colours | Simple mapping from colour names used in emacs to Color |
| packages/nixpkgs/perl538Packages.BKeywords | Lists of reserved barewords and symbol names |
| packages/nixpkgs/perl540Packages.BKeywords | Lists of reserved barewords and symbol names |
| packages/nixpkgs/perl540Packages.DevelSymdump | Dump symbol names or the symbol table |
| packages/nixpkgs/perl538Packages.DevelSymdump | Dump symbol names or the symbol table |
| packages/nixpkgs/typstPackages.tricorder_0_1_0 | 按占三格的节奏记录中文人名(花名册)Record Chinese names with a rhythm of three characters |
| packages/nixpkgs/perl540Packages.SubIdentify | Retrieve names of code references |
| packages/nixpkgs/perl538Packages.SubIdentify | Retrieve names of code references |
| packages/nixpkgs/python313Packages.python-mimeparse | Module provides basic functions for parsing mime-type names and matching them against a list of media-ranges |
| packages/nixpkgs/python314Packages.python-mimeparse | Module provides basic functions for parsing mime-type names and matching them against a list of media-ranges |
| packages/nixpkgs/haskellPackages.demangler | Demangler for C++ mangled names |
| packages/nixpkgs/cudaPackages.cuda_cuxxfilt | Decode low-level identifiers that have been mangled by CUDA C++ into user readable names |
| packages/nixpkgs/texlivePackages.stricttex | Strictly balanced brackets and numbers in command names |
| packages/nixpkgs/cldr-annotations | Names and keywords for Unicode characters from the Common Locale Data Repository |
| packages/nixpkgs/haskellPackages.ca-province-codes | ISO 3166-2:CA Province Codes and Names |
| packages/nixpkgs/perl538Packages.AuthenSASLSASLprep | Stringprep Profile for User Names and Passwords (RFC 4013) |
| packages/nixpkgs/perl540Packages.AuthenSASLSASLprep | Stringprep Profile for User Names and Passwords (RFC 4013) |
| packages/nixpkgs/python312Packages.python-mimeparse | Module provides basic functions for parsing mime-type names and matching them against a list of media-ranges |
| packages/nixpkgs/haskellPackages.aeson-generic-compat | Compatible generic class names of Aeson |
| packages/nixpkgs/texlivePackages.xkcdcolors | xkcd names of colors |
| packages/nixpkgs/texlivePackages.theoremref | References with automatic theorem names |
| packages/nixpkgs/texlivePackages.complexity | Computational complexity class names |
| packages/nixpkgs/texlivePackages.bxorigcapt | To retain the original caption names when using Babel |
| packages/nixpkgs/texlivePackages.greekdates | Provides ancient Greek day and month names, dates, etc |
| packages/nixpkgs/haskellPackages.docrecords | Vinyl-based records with hierarchical field names, default values and documentation |
| packages/nixpkgs/haskellPackages.deriving-show-simple | Derive a Show instance without field selector names |
| packages/nixpkgs/haskellPackages.unbound-generics | Support for programming with names and binders using GHC Generics |
| packages/nixpkgs/haskellPackages.unbound-kind-generics | Support for programming with names and binders using kind-generics |
| packages/nixpkgs/texlivePackages.authorindex | Index citations by author names |
| packages/nixpkgs/perlPackages.TestPortabilityFiles | Check file names portability |
| packages/nixpkgs/perl5Packages.TestPortabilityFiles | Check file names portability |
| packages/nixpkgs/texlivePackages.hepparticles | Macros for typesetting high energy physics particle names |
| packages/nixpkgs/haskellPackages.acme-schoenfinkel | Proper names for curry and uncurry |
| packages/nixpkgs/perl538Packages.TestPortabilityFiles | Check file names portability |
| packages/nixpkgs/perl540Packages.TestPortabilityFiles | Check file names portability |
| packages/nixpkgs/python313Packages.zope-deferredimport | Allows you to perform imports names that will only be resolved when used in the code |
| packages/nixpkgs/python314Packages.zope-deferredimport | Allows you to perform imports names that will only be resolved when used in the code |
| packages/nixpkgs/perlPackages.capitalization | No capitalization on method names |
| packages/nixpkgs/perl5Packages.capitalization | No capitalization on method names |
| packages/nixpkgs/python313Packages.django-shortuuidfield | Short UUIDField for Django |
| packages/nixpkgs/python314Packages.django-shortuuidfield | Short UUIDField for Django |
| packages/nixpkgs/python312Packages.zope-deferredimport | Allows you to perform imports names that will only be resolved when used in the code |
| packages/nixpkgs/perl540Packages.capitalization | No capitalization on method names |
| packages/nixpkgs/perl538Packages.capitalization | No capitalization on method names |
| packages/nixpkgs/python312Packages.django-shortuuidfield | Short UUIDField for Django |
| packages/nixpkgs/gnomeExtensions.display-configuration-switcher | Quickly change the display configuration from the system menu |
| packages/nixpkgs/ocamlPackages.ordinal_abbreviation | Minimal library for generating ordinal names of integers |
| packages/nixpkgs/ocamlPackages.janeStreet.ordinal_abbreviation | Minimal library for generating ordinal names of integers |
| packages/nixpkgs/ocamlPackages_latest.ordinal_abbreviation | Minimal library for generating ordinal names of integers |
| packages/nixpkgs/ocamlPackages_latest.janeStreet.ordinal_abbreviation | Minimal library for generating ordinal names of integers |
| packages/nixpkgs/perlPackages.XMLNamespaceSupport | Simple generic namespace processor |
| packages/nixpkgs/perl5Packages.XMLNamespaceSupport | Simple generic namespace processor |
| packages/nixpkgs/perl538Packages.XMLNamespaceSupport | Simple generic namespace processor |
| packages/nixpkgs/perl540Packages.XMLNamespaceSupport | Simple generic namespace processor |
| packages/nixpkgs/rPackages.NameNeedle | |
| packages/nixpkgs/perlPackages.TextSprintfNamed | Sprintf-like function with named conversions |
| packages/nixpkgs/perl5Packages.TextSprintfNamed | Sprintf-like function with named conversions |
| packages/nixpkgs/perl538Packages.TextSprintfNamed | Sprintf-like function with named conversions |
| packages/nixpkgs/perl540Packages.TextSprintfNamed | Sprintf-like function with named conversions |
| packages/nixpkgs/perlPackages.StringInterpolateNamed | Interpolated named arguments in string |
| packages/nixpkgs/perl5Packages.StringInterpolateNamed | Interpolated named arguments in string |
| packages/nixpkgs/perl540Packages.StringInterpolateNamed | Interpolated named arguments in string |
| packages/nixpkgs/perl538Packages.StringInterpolateNamed | Interpolated named arguments in string |
| packages/nur/nagy.unum | Utility for looking up Unicode characters and HTML entities by code, name, block, or description |
| packages/nur/xddxdd.soggy | Experimental server emulator for a game I forgot its name |
| packages/nur/shadowrz.mkxp-z | RGSS on Steroids |
| packages/nur/xyenon.yaziPlugins.yazi-rs.jump-to-char | Vim-like `f<char>`, jump to the next file whose name starts with `<char>` |
| packages/nur/xddxdd.uncategorized.soggy | Experimental server emulator for a game I forgot its name |
| packages/nur/rycee.firefox-addons.matte-black-red | A modern dark / Matte Black theme with a red accent color |
| packages/nur/xddxdd.netns-exec | Run command in Linux network namespace as normal user |
| packages/nur/0x4A6F.firejail | Namespace-based sandboxing tool for Linux |
| packages/nur/xddxdd.uncategorized.netns-exec | Run command in Linux network namespace as normal user |
| packages/nur/bandithedoge.thorium-bin | Chromium fork named after radioactive element No. 90 |
| packages/nur/codgician.ms213x-rename | A tool that helps you modify the basic EDID information in the MS213X collector firmware, such as the display name, serial number etc. |