| options/nixos/networking.interfaces.<name>.ipv4.addresses | List of IPv4 addresses that will be statically assigned to the interface.
|
| options/nixos/networking.interfaces.<name>.ipv4.addresses.*.address | IPv4 address of the interface
|
| options/nixos/networking.interfaces.<name>.useDHCP | Whether this interface should be configured with DHCP
|
| options/nixos/networking.interfaces.<name>.ipv4.addresses.*.prefixLength | Subnet mask of the interface, specified as the number of
bits in the prefix (24).
|
| options/nixos/services.tayga.ipv4.pool | The pool of IPv4 addresses which are used for translation.
|
| options/nixos/services.nginx.resolver.ipv4 | By default, nginx will look up both IPv4 and IPv6 addresses while resolving
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.allowedIPs | List of IP (v4 or v6) addresses with CIDR masks from
which this peer is allowed to send incoming traffic and to which
outgoing traffic for this peer is directed
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.subnets.*.address | The subnet of this host
|
| options/nixos/networking.tempAddresses | Whether to enable IPv6 Privacy Extensions for interfaces not
configured explicitly in
networking.interfaces._name_.tempAddress
|
| options/nixos/services.nylon.<name>.deniedIPRanges | Denied client IP ranges, these gets evaluated after the allowed IP ranges, defaults to all IPv4 addresses:
[ "0.0.0.0/0" ]
To block all other access than the allowed.
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.allowedIPs | List of IP (v4 or v6) addresses with CIDR masks from
which this peer is allowed to send incoming traffic and to which
outgoing traffic for this peer is directed
|
| options/nixos/networking.jool.nat64.<name>.global.pool6 | The prefix used for embedding IPv4 into IPv6 addresses
|
| options/nixos/networking.interfaces.<name>.ipv4.routes.*.via | IPv4 address of the next hop.
|
| options/nixos/networking.interfaces.<name>.ipv4.routes | List of extra IPv4 static routes that will be assigned to the interface.
If the route type is the default unicast, then the scope
is set differently depending on the value of networking.useNetworkd:
the script-based backend sets it to link, while networkd sets
it to global.
If you want consistency between the two implementations,
set the scope of the route manually with
networking.interfaces.eth0.ipv4.routes = [{ options.scope = "global"; }]
for example.
|
| options/nixos/networking.interfaces.<name>.ipv4.routes.*.address | IPv4 address of the network.
|
| options/nixos/services.agate.addresses | Addresses to listen on, IP:PORT, if you haven't disabled forwarding
only set IPv4.
|
| options/nixos/networking.interfaces.<name>.ipv4.routes.*.type | Type of the route
|
| options/nixos/networking.interfaces.<name>.ipv6.addresses | List of IPv6 addresses that will be statically assigned to the interface.
|
| options/nixos/networking.interfaces.<name>.ipv4.routes.*.prefixLength | Subnet mask of the network, specified as the number of
bits in the prefix (24).
|
| options/nixos/services.avahi.nssmdns6 | Whether to enable the mDNS NSS (Name Service Switch) plug-in for IPv6
|
| options/nixos/networking.interfaces.<name>.ipv4.routes.*.options | Other route options
|
| options/nixos/services.keepalived.vrrpInstances.<name>.unicastPeers | Do not send VRRP adverts over VRRP multicast group
|
| options/nixos/services.pgbouncer.settings.pgbouncer.listen_addr | Specifies a list (comma-separated) of addresses where to listen for TCP connections
|
| options/nixos/services.nsd.ratelimit.ipv4PrefixLength | IPv4 prefix length
|
| options/nixos/services.k3s.nodeIP | IPv4/IPv6 addresses to advertise for node.
|
| options/nixos/services.rke2.nodeIP | IPv4/IPv6 addresses to advertise for node.
|
| options/nixos/networking.interfaces.<name>.ipv6.addresses.*.address | IPv6 address of the interface
|
| options/nixos/networking.interfaces.<name>.ipv6.addresses.*.prefixLength | Subnet mask of the interface, specified as the number of
bits in the prefix (64).
|
| options/nixos/services.tigerbeetle.addresses | The addresses of all replicas in the cluster
|
| options/nixos/networking.interfaces.<name>.tempAddress | When IPv6 is enabled with SLAAC, this option controls the use of
temporary address (aka privacy extensions) on this
interface
|
| options/nixos/services.easytier.instances.<name>.settings.ipv4 | IPv4 cidr address of this peer in the virtual network
|
| options/nixos/networking.useDHCP | Whether to use DHCP to obtain an IP address and other
configuration for all network interfaces that do not have any manually
configured IPv4 addresses.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local_addrs | Local address(es) to use for IKE communication
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote_addrs | Remote address(es) to use for IKE communication
|
| options/nixos/services.firewalld.services.<name>.destination.ipv4 | IPv4 destination.
|
| options/nixos/services.nginx.resolver.ipv6 | By default, nginx will look up both IPv4 and IPv6 addresses while resolving
|
| options/nixos/services.sks.hkpAddress | Domain names, IPv4 and/or IPv6 addresses to listen on for HKP
requests.
|
| options/nixos/services.consul.forceIpv4 | Deprecated: Use consul.forceAddrFamily instead
|
| options/home-manager/accounts.contact.accounts.<name>.khal.addresses | Email addresses to be associated with this account
|
| options/home-manager/accounts.calendar.accounts.<name>.khal.addresses | Email addresses to be associated with this account
|
| options/nixos/systemd.network.networks.<name>.addresses | A list of address sections to be added to the unit
|
| options/nixos/services.postgrey.IPv4CIDR | Strip N bits from IPv4 addresses if lookupBySubnet is true
|
| options/nixos/networking.resolvconf.dnsSingleRequest | Recent versions of glibc will issue both ipv4 (A) and ipv6 (AAAA)
address queries at the same time, from the same port
|
| options/nixos/services.consul.forceAddrFamily | Whether to bind ipv4/ipv6 or both kind of addresses.
|
| options/nixos/services.mosquitto.bridges.<name>.addresses | Remote endpoints for the bridge.
|
| options/nixos/services.ostinato.rpcServer.address | By default, the Drone RPC server will listen on all interfaces and
local IPv4 addresses for incoming connections from clients
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.addresses | The external address where the host can be reached
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.addresses.*.port | The port where the host can be reached
|
| options/nixos/services.kavita.settings.IpAddresses | IP Addresses to bind to
|
| options/nixos/services.mosquitto.bridges.<name>.addresses.*.port | Port of the remote MQTT broker.
|
| options/nixos/services.firewalld.settings.RFC3964_IPv4 | Whether to filter IPv6 traffic with 6to4 destination addresses that correspond to IPv4 addresses that should not be routed over the public internet.
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.addresses.*.address | The external IP address or hostname where the host can be reached.
|
| options/nixos/services.mosquitto.bridges.<name>.addresses.*.address | Address of the remote MQTT broker.
|
| options/nixos/services.nsd.ipv4 | Whether to listen on IPv4 connections.
|
| options/nixos/services.matrix-tuwunel.settings.global.address | Addresses (IPv4 or IPv6) to listen on for connections by the reverse proxy/tls terminator
|
| options/nixos/networking.wg-quick.interfaces.<name>.dns | The IP addresses of DNS servers to configure.
|
| options/nixos/services.nginx.virtualHosts.<name>.listen | Listen addresses and ports for this virtual host
|
| options/nixos/networking.ipips.<name>.encapsulation.type | Select the encapsulation type:
-
ipip to create an IPv4 within IPv4 tunnel (RFC 2003).
-
4in6 to create a 4in6 tunnel (RFC 2473);
-
ip6ip6 to create an IPv6 within IPv6 tunnel (RFC 2473);
For encapsulating IPv6 within IPv4 packets, see
the ad-hoc networking.sits option.
|
| options/nixos/services.avahi.ipv4 | Whether to use IPv4.
|
| options/nixos/services.tayga.ipv4 | IPv4-specific configuration.
|
| options/nixos/services.coturn.listening-ips | Listener IP addresses of relay server
|
| options/nixos/services.i2pd.ifname4 | IPv4 interface to bind to.
|
| options/nixos/networking.wg-quick.interfaces.<name>.mtu | If not specified, the MTU is automatically determined
from the endpoint addresses or the system default route, which is usually
a sane choice
|
| options/nixos/services.umurmur.settings.bindaddr | IPv4 address to bind to
|
| options/nixos/services.nsd.zones.<name>.notify | This primary server will notify all given secondary servers about
zone changes
|
| options/nixos/networking.wg-quick.interfaces.<name>.address | The IP addresses of the interface.
|
| options/darwin/networking.wg-quick.interfaces.<name>.address | List of IP addresses for this interface.
|
| options/nixos/services.resolved.fallbackDns | A list of IPv4 and IPv6 addresses to use as the fallback DNS servers
|
| options/nixos/networking.wireguard.interfaces.<name>.ips | The IP addresses of the interface.
|
| options/nixos/services.fedimintd.<name>.nginx.config.listen | Listen addresses and ports for this virtual host
|
| options/darwin/networking.wg-quick.interfaces.<name>.peers.*.allowedIPs | List of IP addresses associated with this peer.
|
| options/nixos/networking.interfaces.<name>.proxyARP | Turn on proxy_arp for this device
|
| options/nixos/services.matrix-continuwuity.settings.global.address | Addresses (IPv4 or IPv6) to listen on for connections by the reverse proxy/tls terminator
|
| options/nixos/services.hickory-dns.settings.listen_addrs_ipv4 | List of ipv4 addresses on which to listen for DNS queries.
|
| options/nixos/services.httpd.virtualHosts.<name>.listen | Listen addresses and ports for this virtual host.
This option overrides addSSL, forceSSL and onlySSL
|
| options/nixos/services.firewalld.zones.<name>.sources | Source addresses, address ranges, MAC addresses or ipsets to bind.
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockFamily | This optional key can be used to specifically request that "IPv4" or "IPv6" socket(s) be created.
|
| options/nixos/services.firewalld.zones.<name>.sources.*.address | An IP address or a network IP address with a mask for IPv4 or IPv6
|
| options/nixos/containers.<name>.extraVeths.<name>.hostAddress | The IPv4 address assigned to the host interface.
(Not used when hostBridge is set.)
|
| options/nixos/containers.<name>.hostAddress | The IPv4 address assigned to the host interface.
(Not used when hostBridge is set.)
|
| options/nixos/services.bind.zones.<name>.slaves | Addresses who may request zone transfers.
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.addrs | Addresses allocated in pool
|
| options/nixos/services.bind.ipv4Only | Only use ipv4, even if the host supports ipv6.
|
| options/nixos/networking.interfaces | The configuration for each network interface
|
| options/nixos/services.httpd.virtualHosts.<name>.listen.*.ip | IP to listen on. 0.0.0.0 for IPv4 only, * for all.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.listen | Listen addresses and ports for this virtual host.
This option overrides addSSL, forceSSL and onlySSL
|
| options/nixos/services.nsd.ipv4EDNSSize | Preferred EDNS buffer size for IPv4.
|
| options/nixos/services.soju.acceptProxyIP | Allow the specified IPs to act as a proxy
|
| options/nixos/services.nebula.networks.<name>.staticHostMap | The static host map defines a set of hosts with fixed IP addresses on the internet (or any network)
|
| options/nixos/services.nylon.<name>.allowedIPRanges | Allowed client IP ranges are evaluated first, defaults to ARIN IPv4 private ranges:
[ "192.168.0.0/16" "127.0.0.0/8" "172.16.0.0/12" "10.0.0.0/8" ]
|
| options/nixos/services.tayga.ipv4.address | The source IPv4 address of the TAYGA server.
|
| options/home-manager/services.podman.containers.<name>.ip4 | Set an IPv4 address for the container.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockFamily | This optional key can be used to specifically request that "IPv4" or "IPv6" socket(s) be created.
|
| options/nixos/networking.jool.siit | Definitions of SIIT instances of Jool
|
| options/nixos/services.ndppd.proxies.<name>.rules.<name>.network | This is the target address is to match against
|
| options/nixos/containers.<name>.extraVeths.<name>.localAddress | The IPv4 address assigned to the interface in the container
|
| options/nixos/services.tayga.ipv4.pool.address | IPv4 address.
|
| options/nixos/services.nsd.zones.<name>.allowNotify | Listed primary servers are allowed to notify this secondary server
|
| options/nixos/networking.jool.nat64 | Definitions of NAT64 instances of Jool
|
| options/nixos/services.drupal.sites.<name>.virtualHost.listen.*.ip | IP to listen on. 0.0.0.0 for IPv4 only, * for all.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockFamily | This optional key can be used to specifically request that "IPv4" or "IPv6" socket(s) be created.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockFamily | This optional key can be used to specifically request that "IPv4" or "IPv6" socket(s) be created.
|
| options/nixos/services.httpd.virtualHosts.<name>.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/containers.<name>.localAddress | The IPv4 address assigned to the interface in the container
|
| options/nixos/services.nginx.virtualHosts.<name>.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.listen | Listen addresses and ports for this virtual host.
This option overrides addSSL, forceSSL and onlySSL
|
| options/nixos/networking.wireguard.interfaces.<name>.dynamicEndpointRefreshSeconds | Periodically refresh the endpoint hostname or address for all peers
|
| options/nixos/services.drupal.sites.<name>.virtualHost.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.avahi.nssmdns4 | Whether to enable the mDNS NSS (Name Service Switch) plug-in for IPv4
|
| options/nixos/services.ndppd.proxies.<name>.rules | This is a rule that the target address is to match against
|
| options/nixos/services.tayga.ipv4.router.address | The IPv4 address of the router.
|
| options/nixos/networking.wlanInterfaces.<name>.mac | MAC address to use for the device
|
| options/nixos/services.cloudflared.tunnels.<name>.edgeIPVersion | Specifies the IP address version (IPv4 or IPv6) used to establish a connection between cloudflared and the Cloudflare global network
|
| options/home-manager/programs.ssh.matchBlocks.<name>.hashKnownHosts | Indicates that
ssh(1)
should hash host names and addresses when they are added to
the known hosts file.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.listen.*.ip | IP to listen on. 0.0.0.0 for IPv4 only, * for all.
|
| options/nixos/services.fedimintd.<name>.nginx.config.listenAddresses | Listen addresses for this virtual host
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.MulticastGroup | This optional key can be used to request that the datagram socket join a multicast group
|
| options/nixos/services.syncplay.ipv4Only | Listen only on IPv4 when strting the server.
|
| options/nixos/services.public-inbox.inboxes.<name>.address | The email addresses of the public-inbox.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.macDeny | Specifies the MAC addresses to deny if macAcl is set to "deny" or "radius"
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.nginx.resolver | Configures name servers used to resolve names of upstream servers into addresses
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.macAllow | Specifies the MAC addresses to allow if macAcl is set to "allow" or "radius"
|
| options/nixos/services.nsd.zones.<name>.outgoingInterface | This address will be used for zone-transfer requests if configured
as a secondary server or notifications in case of a primary server
|
| options/nixos/systemd.network.networks.<name>.address | A list of addresses to be added to the network section of the
unit
|
| options/nixos/services.easytier.instances.<name>.settings.dhcp | Automatically determine the IPv4 address of this peer based on
existing peers on network.
|
| options/nixos/services.cloudflare-dyndns.ipv4 | Whether to enable setting IPv4 A records.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.MulticastGroup | This optional key can be used to request that the datagram socket join a multicast group
|
| options/nixos/services.namecoind.extraNodes | List of additional peer IP addresses to connect to.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.MulticastGroup | This optional key can be used to request that the datagram socket join a multicast group
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.MulticastGroup | This optional key can be used to request that the datagram socket join a multicast group
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.bssid | Specifies the BSSID for this BSS
|
| options/nixos/services.spiped.config.<name>.waitForDNS | Wait for DNS
|
| options/nixos/services.tayga.ipv4.pool.prefixLength | Subnet mask of the interface, specified as the number of
bits in the prefix ("24").
|
| options/nixos/services.varnish.listen.*.address | If given an IP address, it can be a host name ("localhost"), an IPv4 dotted-quad
("127.0.0.1") or an IPv6 address enclosed in square brackets ("[::1]").
(VCL4.1 and higher) If given an absolute Path ("/path/to/listen.sock") or "@"
followed by the name of an abstract socket ("@myvarnishd") accept connections
on a Unix domain socket
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.macDenyFile | Specifies a file containing the MAC addresses to deny if macAcl is set to "deny" or "radius"
|
| options/nixos/services._3proxy.resolution.nscache | Set name cache size for IPv4.
|
| options/nixos/services.cloudflare-ddns.provider.ipv4 | IP detection provider for IPv4
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.macAllowFile | Specifies a file containing the MAC addresses to allow if macAcl is set to "allow" or "radius"
|
| options/nixos/services.namecoind.trustedNodes | List of the only peer IP addresses to connect to
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.vips | List of virtual IPs to request in IKEv2 configuration payloads or IKEv1
Mode Config
|
| options/nixos/services.openssh.settings.UseDns | Specifies whether sshd(8) should look up the remote host name, and to check that the resolved host name for
the remote IP address maps back to the very same IP address
|
| options/nixos/services.dsnet.settings.ExternalHostname | The hostname that clients should use to connect to this server
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.bind_addresses | IP addresses to bind the listener to.
|
| options/nixos/networking.interfaces.<name>.name | Name of the interface.
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.noHappyEyeballs | Disable the “happy eyeballs” algorithm for IPv4/IPv6 fallback if your local network has misconfigured one of the protocols.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.copy_df | Whether to copy the DF bit to the outer IPv4 header in tunnel mode
|
| options/nixos/services.kanidm.provision.persons.<name>.mailAddresses | Mail addresses
|
| options/nixos/services.avahi.publish.addresses | Whether to register mDNS address records for all local IP addresses.
|
| options/nixos/services.oauth2-proxy.email.addresses | Line-separated email addresses that are allowed to authenticate.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.pools | List of named IP pools to allocate virtual IP addresses
and other configuration attributes from
|
| options/nixos/services.thanos.rule.query.addresses | Addresses of statically configured query API servers
|
| options/darwin/services.dnsmasq.addresses | List of domains that will be redirected by the DNSmasq.
|
| options/nixos/networking.vswitches.<name>.interfaces.<name>.name | Name of the interface
|
| options/nixos/services.easytier.instances.<name>.settings.listeners | Listener addresses to accept connections from other peers
|
| options/nixos/services.ncps.cache.redis.addresses | A list of host:port for the Redis servers that are part of a cluster
|
| options/nixos/services.firefox-syncserver.database.host | Database host name. localhost is treated specially and inserts
systemd dependencies, other hostnames or IP addresses of the local machine do not.
|
| options/nixos/services.nginx.resolver.addresses | List of resolvers to use
|
| options/nixos/networking.dhcpcd.wait | This option specifies when the dhcpcd service will fork to background
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.name | Name used to derive peer unit name.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mode | IPsec Mode to establish CHILD_SA with.
tunnel negotiates the CHILD_SA in IPsec Tunnel Mode,
- whereas
transport uses IPsec Transport Mode.
transport_proxy signifying the special Mobile IPv6
Transport Proxy Mode.
beet is the Bound End to End Tunnel mixture mode,
working with fixed inner addresses without the need to include them in
each packet.
- Both
transport and beet modes are
subject to mode negotiation; tunnel mode is
negotiated if the preferred mode is not available.
pass and drop are used to install
shunt policies which explicitly bypass the defined traffic from IPsec
processing or drop it, respectively
|
| options/nixos/networking.interfaces.<name>.mtu | MTU size for packets leaving the interface
|
| options/nixos/services.nullmailer.config.adminaddr | If set, all recipients to users at either "localhost" (the literal string)
or the canonical host name (from the me control attribute) are remapped to this address
|
| options/nixos/networking.bonds.<name>.interfaces | The interfaces to bond together
|
| options/darwin/networking.wg-quick.interfaces.<name>.dns | List of DNS servers for this interface.
|
| options/darwin/networking.wg-quick.interfaces.<name>.mtu | MTU to set for this interface, automatically set if not specified
|
| options/nixos/networking.vswitches.<name>.interfaces.<name>.vlan | Vlan tag to apply to interface
|
| options/nixos/networking.vswitches.<name>.interfaces.<name>.type | Openvswitch type to assign to interface
|
| options/nixos/networking.wg-quick.interfaces.<name>.preUp | Commands called at the start of the interface setup.
|
| options/darwin/networking.wg-quick.interfaces.<name>.preUp | List of commands to run before interface setup.
|
| options/nixos/networking.wg-quick.interfaces.<name>.type | The type of the interface
|
| options/nixos/networking.interfaces.<name>.virtualType | The type of interface to create
|
| options/nixos/networking.wg-quick.interfaces.<name>.postUp | Commands called after the interface setup.
|
| options/darwin/networking.wg-quick.interfaces.<name>.postUp | List of commands to run after interface setup.
|
| options/nixos/networking.wg-quick.interfaces.<name>.preDown | Command called before the interface is taken down.
|
| options/darwin/networking.wg-quick.interfaces.<name>.preDown | List of commands to run before interface shutdown.
|
| options/nixos/networking.wg-quick.interfaces.<name>.listenPort | 16-bit port for listening
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers | Peers linked to the interface.
|
| options/darwin/networking.wg-quick.interfaces.<name>.peers | List of peers associated with this interface.
|
| options/nixos/networking.wg-quick.interfaces.<name>.postDown | Command called after the interface is taken down.
|
| options/darwin/networking.wg-quick.interfaces.<name>.postDown | List of commands to run after interface shutdown
|
| options/nixos/networking.interfaces.<name>.ipv6.routes | List of extra IPv6 static routes that will be assigned to the interface.
|
| options/nixos/networking.bridges.<name>.interfaces | The physical network interfaces connected by the bridge.
|
| options/nixos/networking.interfaces.<name>.wakeOnLan.enable | Whether to enable wol on this interface.
|
| options/darwin/networking.wg-quick.interfaces.<name>.table | Controls the routing table to which routes are added
|
| options/nixos/networking.interfaces.<name>.ipv6.routes.*.via | IPv6 address of the next hop.
|
| options/nixos/networking.interfaces.<name>.virtual | Whether this interface is virtual and should be created by tunctl
|
| options/nixos/networking.wg-quick.interfaces.<name>.table | The kernel routing table to add this interface's
associated routes to
|
| options/nixos/networking.interfaces.<name>.macAddress | MAC address of the interface
|
| options/nixos/networking.interfaces.<name>.wakeOnLan.policy | The Wake-on-LAN policy
to set for the device
|
| options/darwin/networking.wg-quick.interfaces.<name>.listenPort | Port to listen on, randomly selected if not specified.
|
| options/nixos/boot.uki.name | Name of the UKI
|
| options/nixos/networking.interfaces.<name>.ipv6.routes.*.type | Type of the route
|
| options/nixos/networking.interfaces.<name>.virtualOwner | In case of a virtual device, the user who owns it.
null will not set owner, allowing access to any user.
|
| options/nixos/networking.wg-quick.interfaces.<name>.configFile | wg-quick .conf file, describing the interface
|
| options/nixos/networking.sits | This option allows you to define interfaces encapsulating IPv6
packets within IPv4 packets; which should be automatically created.
|
| options/darwin/networking.wg-quick.interfaces.<name>.peers.*.publicKey | The public key for this peer.
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.publicKey | The base64 public key to the peer.
|
| options/nixos/networking.wg-quick.interfaces.<name>.privateKey | Base64 private key generated by wg genkey
|
| options/darwin/networking.wg-quick.interfaces.<name>.privateKeyFile | Path to file containing this interface's private key.
|
| options/nixos/networking.wg-quick.interfaces.<name>.privateKeyFile | Private key file as generated by wg genkey.
|
| options/nixos/networking.vswitches.<name>.interfaces | The physical network interfaces connected by the vSwitch.
|
| options/nixos/networking.wg-quick.interfaces.<name>.extraOptions | Extra options to append to the interface section
|
| options/nixos/networking.interfaces.<name>.ipv6.routes.*.address | IPv6 address of the network.
|
| options/nixos/networking.wireguard.interfaces.<name>.listenPort | 16-bit port for listening
|
| options/nixos/networking.wireguard.interfaces.<name>.type | The type of the interface
|
| options/nixos/services.nghttpx.backend-address-family | Specify address family of backend connections
|
| options/nixos/networking.wireguard.interfaces.<name>.peers | Peers linked to the interface.
|
| options/home-manager/gtk.font.name | The family name of the font within the package.
|
| options/nixos/networking.wireguard.interfaces.<name>.mtu | Set the maximum transmission unit in bytes for the wireguard
interface
|
| options/nixos/networking.wg-quick.interfaces.<name>.autostart | Whether to bring up this interface automatically during boot.
|
| options/darwin/networking.wg-quick.interfaces.<name>.autostart | Whether to bring up this interface automatically during boot.
|
| options/nixos/networking.jool.enable | Whether to enable Jool, an Open Source implementation of IPv4/IPv6
translation on Linux
|
| options/darwin/networking.wg-quick.interfaces.<name>.peers.*.endpoint | IP and port to connect to this peer at.
|
| options/nixos/networking.interfaces.<name>.ipv6.routes.*.options | Other route options
|
| options/nixos/networking.wireguard.interfaces.<name>.preSetup | Commands called at the start of the interface setup.
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.endpoint | Endpoint IP or hostname of the peer, followed by a colon,
and then a port number of the peer.
|
| options/nixos/services.davis.nginx.listen | Listen addresses and ports for this virtual host
|
| options/nixos/services.movim.nginx.listen | Listen addresses and ports for this virtual host
|
| options/nixos/services.slskd.nginx.listen | Listen addresses and ports for this virtual host
|
| options/nixos/users.users.<name>.name | The name of the user account
|
| options/darwin/users.users.<name>.name | The name of the user account
|
| options/nixos/networking.wireguard.interfaces.<name>.fwMark | Mark all wireguard packets originating from
this interface with the given firewall mark
|
| options/nixos/services.snipe-it.nginx.listen | Listen addresses and ports for this virtual host
|
| options/nixos/networking.wireguard.interfaces.<name>.postSetup | Commands called at the end of the interface setup.
|
| options/nixos/networking.interfaces.<name>.ipv6.routes.*.prefixLength | Subnet mask of the network, specified as the number of
bits in the prefix (64).
|
| options/nixos/networking.wireguard.interfaces.<name>.metric | Set the metric of routes related to this Wireguard interface.
|
| options/nixos/networking.wireguard.interfaces.<name>.table | The kernel routing table to add this interface's
associated routes to
|
| options/nixos/services.akkoma.nginx.listen | Listen addresses and ports for this virtual host
|
| options/nixos/services.gancio.nginx.listen | Listen addresses and ports for this virtual host
|
| options/nixos/services.fluidd.nginx.listen | Listen addresses and ports for this virtual host
|
| options/nixos/services.monica.nginx.listen | Listen addresses and ports for this virtual host
|
| options/nixos/services.matomo.nginx.listen | Listen addresses and ports for this virtual host
|
| options/nixos/networking.firewall.interfaces.<name>.allowedUDPPorts | List of open UDP ports.
|
| options/nixos/networking.firewall.interfaces.<name>.allowedTCPPorts | List of TCP ports on which incoming connections are
accepted.
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.publicKey | The base64 public key of the peer.
|
| options/nixos/networking.openconnect.interfaces.<name>.user | Username to authenticate with.
|
| options/home-manager/gtk.theme.name | The name of the theme within the package.
|
| options/nixos/networking.wireguard.interfaces.<name>.privateKey | Base64 private key generated by wg genkey
|
| options/nixos/users.groups.<name>.name | The name of the group
|
| options/darwin/users.groups.<name>.name | The group's name
|
| options/darwin/networking.wg-quick.interfaces.<name>.peers.*.presharedKeyFile | Optional, path to file containing the pre-shared key for this peer.
|
| options/nixos/networking.wireguard.interfaces.<name>.privateKeyFile | Private key file as generated by wg genkey.
|
| options/nixos/programs.captive-browser.dhcp-dns | The shell (/bin/sh) command executed to obtain the DHCP
DNS server address
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.presharedKey | Base64 preshared key generated by wg genpsk
|
| options/nixos/networking.wireguard.interfaces.<name>.preShutdown | Commands called before shutting down the interface.
|
| options/nixos/networking.wg-quick.interfaces.<name>.generatePrivateKeyFile | Automatically generate a private key with
wg genkey, at the privateKeyFile location.
|
| options/nixos/networking.wireguard.interfaces.<name>.extraOptions | Extra options to append to the interface section
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.presharedKeyFile | File pointing to preshared key as generated by wg genpsk
|
| options/nixos/networking.wireguard.interfaces.<name>.postShutdown | Commands called after shutting down the interface.
|
| options/nixos/networking.firewall.interfaces.<name>.allowedUDPPortRanges | Range of open UDP ports.
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.endpoint | Endpoint IP or hostname of the peer, followed by a colon,
and then a port number of the peer
|
| options/nixos/networking.firewall.interfaces.<name>.allowedTCPPortRanges | A range of TCP ports on which incoming connections are
accepted.
|
| options/nixos/networking.openconnect.interfaces.<name>.autoStart | Whether this VPN connection should be started automatically.
|
| options/nixos/networking.wireguard.interfaces.<name>.allowedIPsAsRoutes | Determines whether to add allowed IPs as routes or not.
|
| options/nixos/networking.hosts | Locally defined maps of hostnames to IP addresses.
|
| options/nixos/services.kanboard.nginx.listen | Listen addresses and ports for this virtual host
|
| options/nixos/services.dolibarr.nginx.listen | Listen addresses and ports for this virtual host
|
| options/nixos/services.librenms.nginx.listen | Listen addresses and ports for this virtual host
|
| options/nixos/services.fediwall.nginx.listen | Listen addresses and ports for this virtual host
|
| options/nixos/services.agorakit.nginx.listen | Listen addresses and ports for this virtual host
|
| options/nixos/services.mainsail.nginx.listen | Listen addresses and ports for this virtual host
|
| options/nixos/services.pixelfed.nginx.listen | Listen addresses and ports for this virtual host
|
| options/nixos/networking.openconnect.interfaces.<name>.gateway | Gateway server to connect to.
|
| options/nixos/users.extraUsers.<name>.name | The name of the user account
|
| options/nixos/networking.openconnect.interfaces.<name>.privateKey | Private key to authenticate with.
|
| options/home-manager/gtk.gtk3.font.name | The family name of the font within the package.
|
| options/home-manager/gtk.gtk2.font.name | The family name of the font within the package.
|
| options/home-manager/gtk.gtk4.font.name | The family name of the font within the package.
|
| options/nixos/services.radicle.httpd.nginx.listen | Listen addresses and ports for this virtual host
|
| options/nixos/networking.nftables.tables.<name>.name | Table name.
|
| options/nixos/system.name | The name of the system used in the system.build.toplevel derivation
|
| options/nixos/networking.openconnect.interfaces.<name>.protocol | Protocol to use.
|
| options/nixos/services.anuko-time-tracker.nginx.listen | Listen addresses and ports for this virtual host
|
| options/nixos/services.bookstack.nginx.listen | Listen addresses and ports for this virtual host
|
| options/nixos/networking.wireguard.interfaces.<name>.socketNamespace | The pre-existing network namespace in which the
WireGuard interface is created, and which retains the socket even if the
interface is moved via interfaceNamespace
|
| options/nixos/networking.openconnect.interfaces.<name>.passwordFile | File containing the password to authenticate with
|
| options/nixos/networking.openconnect.interfaces.<name>.extraOptions | Extra config to be appended to the interface config
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.presharedKey | Base64 preshared key generated by wg genpsk
|
| options/nixos/networking.wireguard.interfaces.<name>.generatePrivateKeyFile | Automatically generate a private key with
wg genkey, at the privateKeyFile location.
|
| options/nixos/users.extraGroups.<name>.name | The name of the group
|
| options/nixos/services.tor.torsocks.onionAddrRange | Tor hidden sites do not have real IP addresses
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.presharedKeyFile | File pointing to preshared key as generated by wg genpsk
|
| options/nixos/services.cloudflare-ddns.ip4Domains | Explicit list of domains to manage only for IPv4
|
| options/nixos/services.i2pd.enableIPv4 | Whether to enable IPv4 connectivity.
|
| options/home-manager/gtk.gtk3.theme.name | The name of the theme within the package.
|
| options/home-manager/gtk.gtk4.theme.name | The name of the theme within the package.
|
| options/home-manager/gtk.gtk2.theme.name | The name of the theme within the package.
|
| options/home-manager/gtk.iconTheme.name | The name of the icon theme within the package.
|
| options/nixos/services.nsd.interfaces | What addresses the server should listen to.
|
| options/nixos/services.jirafeau.nginxConfig.listen | Listen addresses and ports for this virtual host
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.listen | Listen addresses and ports for this virtual host
|
| options/darwin/networking.wg-quick.interfaces.<name>.peers.*.persistentKeepalive | Interval in seconds to send keepalive packets
|
| options/nixos/services.seafile.seafileSettings.fileserver.host | The bind address used by seafile fileserver
|
| options/nixos/services.pict-rs.address | The IPv4 address to deploy the service to.
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.persistentKeepalive | This is optional and is by default off, because most
users will not need it
|
| options/nixos/networking.wireguard.interfaces.<name>.interfaceNamespace | The pre-existing network namespace the WireGuard
interface is moved to
|
| options/nixos/networking.openconnect.interfaces.<name>.certificate | Certificate to authenticate with.
|
| options/nixos/systemd.units.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/systemd.paths.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/services.nylon.<name>.name | The name of this nylon instance.
|
| options/nixos/networking.sits.<name>.dev | The underlying network device on which the tunnel resides.
|
| options/nixos/services.polipo.allowedClients | List of IP addresses or network addresses that may connect to Polipo.
|
| options/nixos/networking.sits.<name>.ttl | The time-to-live of the connection to the remote tunnel endpoint.
|
| options/nixos/networking.vlans.<name>.id | The vlan identifier
|
| options/home-manager/gtk.gtk4.iconTheme.name | The name of the icon theme within the package.
|
| options/home-manager/gtk.gtk2.iconTheme.name | The name of the icon theme within the package.
|
| options/home-manager/gtk.gtk3.iconTheme.name | The name of the icon theme within the package.
|
| options/nixos/networking.ipips.<name>.dev | The underlying network device on which the tunnel resides.
|
| options/nixos/services.bind.zones.<name>.name | Name of the zone.
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.persistentKeepalive | This is optional and is by default off, because most
users will not need it
|
| options/nixos/networking.ipips.<name>.ttl | The time-to-live of the connection to the remote tunnel endpoint.
|
| options/nixos/systemd.timers.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/systemd.slices.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.dynamicEndpointRefreshSeconds | Periodically re-execute the wg utility every
this many seconds in order to let WireGuard notice DNS / hostname
changes
|
| options/nixos/systemd.user.units.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/systemd.user.paths.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/virtualisation.interfaces.<name>.name | Interface name
|
| options/nixos/services.miredo.bindPort | Depending on the local firewall/NAT rules, you might need to force
Miredo to use a fixed UDP port and or IPv4 address.
|
| options/nixos/services.pppd.peers.<name>.name | Name of the PPP peer.
|
| options/nixos/services.tayga.mappings | Static IPv4 -> IPv6 host mappings.
|
| options/nixos/services.fail2ban.ignoreIP | "ignoreIP" can be a list of IP addresses, CIDR masks or DNS hosts
|
| options/home-manager/xdg.desktopEntries.<name>.name | Specific name of the application.
|
| options/nixos/services.limesurvey.nginx.virtualHost.listen | Listen addresses and ports for this virtual host
|
| options/home-manager/gtk.cursorTheme.name | The name of the cursor theme within the package.
|
| options/nixos/networking.sits.<name>.local | The address of the local endpoint which the remote
side should send packets to.
|
| options/nixos/networking.fooOverUDP.<name>.port | Local port of the encapsulation UDP socket.
|
| options/home-manager/xdg.desktopEntries.<name>.actions.<name>.name | Name of the action.
|
| options/nixos/services.nagios.virtualHost.listen | Listen addresses and ports for this virtual host.
This option overrides addSSL, forceSSL and onlySSL
|
| options/nixos/services.moodle.virtualHost.listen | Listen addresses and ports for this virtual host.
This option overrides addSSL, forceSSL and onlySSL
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.dynamicEndpointRefreshRestartSeconds | When the dynamic endpoint refresh that is configured via
dynamicEndpointRefreshSeconds exits (likely due to a failure),
restart that service after this many seconds
|
| options/nixos/networking.nat.internalIPs | The IP address ranges for which to perform NAT
|
| options/nixos/image.repart.name | Name of the image
|
| options/nixos/systemd.user.slices.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/systemd.user.timers.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/networking.ipips.<name>.local | The address of the local endpoint which the remote
side should send packets to.
|
| options/nixos/networking.nat.internalIPv6s | The IPv6 address ranges for which to perform NAT
|
| options/nixos/networking.sits.<name>.remote | The address of the remote endpoint to forward traffic over.
|
| options/nixos/systemd.targets.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/systemd.sockets.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/networking.fooOverUDP.<name>.local.dev | Network device to bind to.
|
| options/nixos/services.ddclient.usev4 | Method to determine the IPv4 address to send to the dynamic DNS provider
|
| options/nixos/services.flannel.network | IPv4 network in CIDR format to use for the entire flannel network
|
| options/nixos/networking.fooOverUDP.<name>.local | Local address (and optionally device) to bind to using the given port.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.listen | Listen addresses and ports for this virtual host
|
| options/nixos/services.https-dns-proxy.preferIPv4 | https_dns_proxy will by default use IPv6 and fail if it is not available
|
| options/nixos/networking.bonds.<name>.mode | DEPRECATED, use driverOptions
|
| options/nixos/services.alerta.bind | Address to bind to
|
| options/nixos/networking.ipips.<name>.remote | The address of the remote endpoint to forward traffic over.
|
| options/nixos/services.pixiecore.listen | IPv4 address to listen on
|
| options/nixos/services.dsnet.settings.IP | The IPv4 address that the server will use on the network
|
| options/nixos/services.davis.nginx.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.movim.nginx.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.slskd.nginx.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.tayga.ipv6.pool | The pool of IPv6 addresses which are used for translation.
|
| options/nixos/services.snipe-it.nginx.listenAddresses | Listen addresses for this virtual host
|
| options/home-manager/gtk.gtk4.cursorTheme.name | The name of the cursor theme within the package.
|
| options/home-manager/gtk.gtk2.cursorTheme.name | The name of the cursor theme within the package.
|
| options/home-manager/gtk.gtk3.cursorTheme.name | The name of the cursor theme within the package.
|
| options/nixos/systemd.user.sockets.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/systemd.user.targets.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/networking.bridges.<name>.rstp | Whether the bridge interface should enable rstp.
|
| options/nixos/networking.greTunnels.<name>.dev | The underlying network device on which the tunnel resides.
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.listen | Listen addresses and ports for this virtual host.
This option overrides addSSL, forceSSL and onlySSL
|
| options/nixos/services.i2pd.inTunnels.<name>.name | The endpoint name.
|
| options/nixos/services.tayga.wkpfStrict | Enable restrictions on the use of the well-known prefix (64:ff9b::/96) - prevents translation of non-global IPv4 ranges when using the well-known prefix
|
| options/nixos/services.etcd.name | Etcd unique node name.
|
| options/nixos/services.miredo.bindAddress | Depending on the local firewall/NAT rules, you might need to force
Miredo to use a fixed UDP port and or IPv4 address.
|
| options/nixos/networking.greTunnels.<name>.ttl | The time-to-live/hoplimit of the connection to the remote tunnel endpoint.
|
| options/nixos/services.i2pd.outTunnels.<name>.name | The endpoint name.
|
| options/nixos/services.fluidd.nginx.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.akkoma.nginx.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.gancio.nginx.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.monica.nginx.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.matomo.nginx.listenAddresses | Listen addresses for this virtual host
|
| options/home-manager/home.language.address | The language to use for addresses.
|
| options/nixos/networking.getaddrinfo.scopev4 | Adds custom rules to the IPv4 scope table
|
| options/nixos/systemd.services.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/hardware.alsa.controls.<name>.name | Name of the control, as it appears in alsamixer
|
| options/nixos/services.murmur.hostName | Host to bind to
|
| options/nixos/services.coturn.relay-ips | Relay address (the local IP address that will be used to relay the
packets to the peer)
|
| options/nixos/services.firezone.relay.publicIpv4 | The public ipv4 address of this relay
|
| options/nixos/services.atalkd.interfaces.<name>.config | Optional configuration string for this interface.
|
| options/nixos/networking.greTunnels.<name>.type | Whether the tunnel routes layer 2 (tap) or layer 3 (tun) traffic.
|
| options/nixos/networking.bonds.<name>.miimon | DEPRECATED, use driverOptions
|
| options/nixos/services.bitcoind.<name>.rpc.users.<name>.name | Username for JSON-RPC connections.
|
| options/nixos/networking.fooOverUDP.<name>.local.address | Local address to bind to
|
| options/nixos/security.pam.services.<name>.name | Name of the PAM service.
|
| options/nixos/services.nagios.virtualHost.listen.*.ip | IP to listen on. 0.0.0.0 for IPv4 only, * for all.
|
| options/nixos/services.moodle.virtualHost.listen.*.ip | IP to listen on. 0.0.0.0 for IPv4 only, * for all.
|
| options/nixos/networking.macvlans.<name>.mode | The mode of the macvlan device.
|
| options/nixos/networking.greTunnels.<name>.local | The address of the local endpoint which the remote
side should send packets to.
|
| options/darwin/homebrew.casks.*.name | The name of the cask to install.
|
| options/darwin/homebrew.brews.*.name | The name of the formula to install.
|
| options/nixos/systemd.user.services.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/services.netbird.tunnels.<name>.name | Primary name for use (as a suffix) in:
- systemd service name,
- hardened user name and group,
- systemd
*Directory= names,
- desktop application identification,
|
| options/nixos/services.netbird.clients.<name>.name | Primary name for use (as a suffix) in:
- systemd service name,
- hardened user name and group,
- systemd
*Directory= names,
- desktop application identification,
|
| options/nixos/services.rspamd.workers.<name>.name | Name of the worker
|
| options/nixos/services.moodle.virtualHost.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.nagios.virtualHost.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.librenms.nginx.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.fediwall.nginx.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.kanboard.nginx.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.agorakit.nginx.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.dolibarr.nginx.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.mainsail.nginx.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.pixelfed.nginx.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.matrix-synapse.settings.listeners.*.bind_addresses | IP addresses to bind the listener to.
|
| options/home-manager/home.pointerCursor.name | The cursor name within the package.
|
| options/nixos/networking.greTunnels.<name>.remote | The address of the remote endpoint to forward traffic over.
|
| options/nixos/services.ceph.global.monHost | List of hostname shortnames/IP addresses of the initial monitors.
|
| options/nixos/services.aria2.settings.listen-port | Set UDP listening port range used by DHT(IPv4, IPv6) and UDP tracker.
|
| options/nixos/services.radicle.httpd.nginx.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.limesurvey.virtualHost.listen | Listen addresses and ports for this virtual host.
This option overrides addSSL, forceSSL and onlySSL
|
| options/nixos/services.mediawiki.httpd.virtualHost.listen | Listen addresses and ports for this virtual host.
This option overrides addSSL, forceSSL and onlySSL
|
| options/nixos/services.i2pd.upnp.name | Name i2pd appears in UPnP forwardings list.
|
| options/nixos/services.taskserver.listenHost | The address (IPv4, IPv6 or DNS) to listen on.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels.<name>.name | The unique name for THIS channel in THIS group
|
| options/nixos/services.hylafax.modems.<name>.name | Name of modem device,
will be searched for in /dev.
|
| options/nixos/services.rkvm.server.settings.listen | An internet socket address to listen on, either IPv4 or IPv6.
|
| options/nixos/services.anuko-time-tracker.nginx.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/networking.supplicant.<name>.bridge | Name of the bridge interface that wpa_supplicant should listen at.
|
| options/nixos/services.rkvm.client.settings.server | An RKVM server's internet socket address, either IPv4 or IPv6.
|
| options/nixos/services.tinc.networks.<name>.name | The name of the node which is used as an identifier when communicating
with the remote nodes in the mesh
|
| options/nixos/services.bookstack.nginx.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.shorewall.enable | Whether to enable Shorewall IPv4 Firewall.
Enabling this service WILL disable the existing NixOS
firewall! Default firewall rules provided by packages are not
considered at the moment.
|
| options/nixos/systemd.mounts.*.name | The name of this systemd unit, including its extension
|
| options/home-manager/programs.floorp.profiles.<name>.name | Profile name.
|
| options/home-manager/services.kanshi.profiles.<name>.name | Profile name
|
| options/home-manager/services.colima.profiles.<name>.name | The profile's name.
|
| options/nixos/services.dsnet.settings.Network | The IPv4 network that the server will use to allocate IPs on the network
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.listen.*.ip | IP to listen on. 0.0.0.0 for IPv4 only, * for all.
|
| options/nixos/services.firewalld.zones.<name>.interfaces | Interfaces to bind.
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/systemd.network.networks.<name>.name | The name of the network interface to match against.
|
| options/nixos/services.bacula-sd.name | Specifies the Name of the Storage daemon.
|
| options/home-manager/accounts.email.accounts.<name>.name | Unique identifier of the account
|
| options/nixos/networking.fooOverUDP.<name>.protocol | Protocol number of the encapsulated packets
|
| options/nixos/services.monero.extraNodes | List of additional peer IP addresses to add to the local list.
|
| options/nixos/services.nsd.ipFreebind | Whether to bind to nonlocal addresses and interfaces that are down
|
| options/home-manager/programs.kitty.font.name | The family name of the font within the package.
|
| options/nixos/services.varnish.listen | Accept for client requests on the specified listen addresses.
|
| options/nixos/networking.bonds.<name>.driverOptions | Options for the bonding driver
|
| options/nixos/services.miredo.serverAddress | The hostname or primary IPv4 address of the Teredo server
|
| options/nixos/services.i2pd.proto.bob.name | The endpoint name.
|
| options/nixos/services.i2pd.proto.sam.name | The endpoint name.
|
| options/nixos/services.syncplay.interfaceIpv4 | The IP address to bind to for IPv4
|
| options/nixos/services.github-runners.<name>.name | Name of the runner to configure
|
| options/darwin/services.github-runners.<name>.name | Name of the runner to configure
|
| options/nixos/hardware.sane.brscan5.netDevices.<name>.name | The friendly name you give to the network device
|
| options/nixos/hardware.sane.brscan4.netDevices.<name>.name | The friendly name you give to the network device
|
| options/nixos/services.jirafeau.nginxConfig.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.limesurvey.httpd.virtualHost.listen | Listen addresses and ports for this virtual host.
This option overrides addSSL, forceSSL and onlySSL
|
| options/nixos/networking.wlanInterfaces.<name>.device | The name of the underlying hardware WLAN device as assigned by udev.
|
| options/nixos/networking.vlans.<name>.interface | The interface the vlan will transmit packets through.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.listenAddresses | Listen addresses for this virtual host
|
| options/home-manager/programs.papis.libraries.<name>.name | This library's name.
|
| options/nixos/services.kimai.sites.<name>.database.name | Database name.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.name | The name of this group for this account
|
| options/nixos/services.patroni.otherNodesIps | IP addresses of the other nodes.
|
| options/darwin/users.users.<name>.uid | The user's UID.
|
| options/nixos/services.bcg.name | Name for the device
|
| options/home-manager/home.language.name | The language to use for personal names.
|
| options/darwin/homebrew.taps.*.name | When clone_target is unspecified, this is the name of a formula
repository to tap from GitHub using HTTPS
|
| options/nixos/services.kresd.listenTLS | Addresses and ports on which kresd should provide DNS over TLS (see RFC 7858)
|
| options/nixos/services.send.redis.name | Name of the redis server
|
| options/nixos/services.kresd.listenPlain | What addresses and ports the server should listen on
|
| options/nixos/services.tang.ipAddressAllow | Whitelist a list of address prefixes
|
| options/nixos/services.postgrey.IPv6CIDR | Strip N bits from IPv6 addresses if lookupBySubnet is true
|
| options/nixos/services.i2pd.proto.http.name | The endpoint name.
|
| options/nixos/services.i2pd.proto.i2cp.name | The endpoint name.
|
| options/nixos/services.ipfs-cluster.initPeers | Peer addresses to initialize with on first run.
|
| options/nixos/services.k3s.autoDeployCharts.<name>.name | The name of the Helm chart
|
| options/home-manager/programs.firefox.profiles.<name>.name | Profile name.
|
| options/nixos/networking.jool.siit.<name>.framework | The framework to use for attaching Jool's translation to the exist
kernel packet processing rules
|
| options/nixos/services.kresd.listenDoH | Addresses and ports on which kresd should provide DNS over HTTPS/2 (see RFC 8484)
|
| options/nixos/networking.bonds.<name>.lacp_rate | DEPRECATED, use driverOptions
|
| options/nixos/services.netbird.clients.<name>.user.name | A system user name for this client instance.
|
| options/nixos/services.netbird.tunnels.<name>.user.name | A system user name for this client instance.
|
| options/nixos/services.tang.listenStream | Addresses and/or ports on which tang should listen
|
| options/nixos/services.sympa.listMasters | The list of the email addresses of the listmasters
(users authorized to perform global server commands).
|
| options/nixos/services.bacula-dir.name | The director name used by the system administrator
|
| options/darwin/users.users.<name>.gid | The user's primary group.
|
| options/nixos/services.bacula-fd.name | The client name that must be used by the Director when connecting
|
| options/nixos/services.openssh.listenAddresses.*.addr | Host, IPv4 or IPv6 address to listen to.
|
| options/nixos/services.snipe-it.mail.from.name | Mail "from" name.
|
| options/home-manager/home.file.<name>.text | Text of the file
|
| options/nixos/networking.nftables.tables.<name>.enable | Enable this table.
|
| options/nixos/networking.nftables.tables.<name>.family | Table family.
|
| options/nixos/services.stargazer.ipLog | Log client IP addresses in the connection log.
|
| options/nixos/services.kmonad.keyboards.<name>.name | Keyboard name.
|
| options/nixos/services.gpsd.listenany | Listen on all addresses rather than just loopback.
|
| options/nixos/services.kapacitor.bind | Address to bind to
|
| options/nixos/services.zabbixAgent.listen.ip | List of comma delimited IP addresses that the agent should listen on.
|
| options/nixos/services.drupal.sites.<name>.database.name | Database name.
|
| options/nixos/services.akkoma.frontends.<name>.name | Akkoma frontend name.
|
| options/nixos/services.patroni.name | The name of the host
|
| options/nixos/networking.jool.nat64.<name>.framework | The framework to use for attaching Jool's translation to the exist
kernel packet processing rules
|
| options/nixos/services.rke2.autoDeployCharts.<name>.name | The name of the Helm chart
|
| options/home-manager/services.walker.theme.name | The theme name.
|
| options/home-manager/services.cachix-agent.name | The unique agent name.
|
| options/nixos/services.postfix.masterConfig.<name>.name | The name of the service to run
|
| options/nixos/networking.wireless.networks.<name>.pskRaw | Either the raw pre-shared key in hexadecimal format
or the name of the secret (as defined inside
networking.wireless.secretsFile and prefixed
with ext:) containing the network pre-shared key.
Be aware that this will be written to the Nix store
in plaintext! Always use an external reference.
The external secret can be either the plaintext
passphrase or the raw pre-shared key.
Mutually exclusive with psk and auth.
|
| options/home-manager/services.pizauth.accounts.<name>.name | Unique identifier of the account
|
| options/nixos/services.buildkite-agents.<name>.name | The name of the agent as seen in the buildkite dashboard.
|
| options/darwin/services.buildkite-agents.<name>.name | The name of the agent as seen in the buildkite dashboard.
|
| options/nixos/services.cachix-agent.name | Agent name, usually same as the hostname
|
| options/darwin/services.cachix-agent.name | Agent name, usually the same as the hostname.
|
| options/home-manager/programs.zsh.plugins.*.name | The name of the plugin.
|
| options/nixos/services.limesurvey.virtualHost.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.mediawiki.httpd.virtualHost.listenAddresses | Listen addresses for this virtual host
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites.<name>.name | Name of the site.
|
| options/home-manager/accounts.contact.accounts.<name>.name | Unique identifier of the contact account
|
| options/home-manager/services.dunst.iconTheme.name | The name of the theme within the package.
|
| options/nixos/services.pgmanage.localOnly | This tells pgmanage whether or not to set the listening socket to local
addresses only.
|
| options/nixos/services.dnscache.clientIps | Client IP addresses (or prefixes) from which to accept connections.
|
| options/nixos/services.v4l2-relayd.instances.<name>.name | The name of the instance.
|
| options/nixos/networking.wlanInterfaces.<name>.meshID | MeshID of interface with type mesh.
|
| options/nixos/networking.nftables.tables.<name>.content | The table content.
|
| options/nixos/users.users.<name>.home | The user's home directory.
|
| options/home-manager/programs.smug.projects.<name>.windows.*.name | Name of the tmux window;
|
| options/nixos/networking.wlanInterfaces.<name>.type | The type of the WLAN interface
|
| options/nixos/services.tox-node.tcpAddresses | TCP addresses to run TCP relay.
|
| options/nixos/services.thanos.rule.query.sd-files | Path to file that contain addresses of query peers
|
| options/nixos/services.kmscon.fonts.*.name | Font name, as used by fontconfig.
|
| options/nixos/networking.vswitches.<name>.openFlowRules | OpenFlow rules to insert into the Open vSwitch
|
| options/home-manager/xdg.dataFile.<name>.text | Text of the file
|
| options/nixos/networking.supplicant.<name>.driver | Force a specific wpa_supplicant driver.
|
| options/nixos/networking.wlanInterfaces.<name>.flags | Flags for interface of type monitor.
|
| options/home-manager/programs.fish.plugins.*.name | The name of the plugin.
|
| options/nixos/services.snipe-it.mail.replyTo.name | Mail "reply-to" name.
|
| options/nixos/services.limesurvey.virtualHost.listen.*.ip | IP to listen on. 0.0.0.0 for IPv4 only, * for all.
|
| options/nixos/services.mediawiki.httpd.virtualHost.listen.*.ip | IP to listen on. 0.0.0.0 for IPv4 only, * for all.
|
| options/nixos/programs.regreet.font.name | Name of the font to use for regreet.
|
| options/nixos/services.zammad.redis.name | Name of the redis server
|
| options/home-manager/programs.floorp.profiles.<name>.containers.<name>.name | Container name, e.g., shopping.
|
| options/nixos/services.radvd.enable | Whether to enable the Router Advertisement Daemon
(radvd), which provides link-local
advertisements of IPv6 router addresses and prefixes using
the Neighbor Discovery Protocol (NDP)
|
| options/nixos/services.varnish.listen.*.name | Name is referenced in logs
|
| options/nixos/services.openssh.listenAddresses | List of addresses and ports to listen on (ListenAddress directive
in config)
|
| options/nixos/services.limesurvey.httpd.virtualHost.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/networking.wlanInterfaces.<name>.fourAddr | Whether to enable 4-address mode with type managed.
|
| options/home-manager/programs.gnome-shell.theme.name | Name of the GNOME Shell theme.
|
| options/nixos/services.i2pd.proto.httpProxy.name | The endpoint name.
|
| options/nixos/users.users.<name>.uid | The account UID
|
| options/darwin/users.groups.<name>.gid | The group's GID.
|
| options/nixos/services.zabbixProxy.listen.ip | List of comma delimited IP addresses that the trapper should listen on
|
| options/nixos/services.taskserver.ipLog | Logs the IP addresses of incoming requests.
|
| options/nixos/networking.supplicant.<name>.extraCmdArgs | Command line arguments to add when executing wpa_supplicant.
|
| options/nixos/networking.wireless.networks.<name>.bssid | If set, this network block is used only when associating with
the AP using the configured BSSID.
|
| options/home-manager/accounts.calendar.accounts.<name>.name | Unique identifier of the calendar
|
| options/nixos/services.prosody.muc.*.name | The name to return in service discovery responses for the MUC service itself
|
| options/nixos/networking.macvlans.<name>.interface | The interface the macvlan will transmit packets through.
|
| options/nixos/services.authelia.instances.<name>.name | Name is used as a suffix for the service name, user, and group
|
| options/nixos/services.sillytavern.listenAddressIPv4 | Specific IPv4 address to listen to.
|
| options/nixos/users.users.<name>.homeMode | The user's home directory mode in numeric format
|
| options/nixos/services.thanos.query.store.sd-files | Path to files that contain addresses of store API servers
|
| options/nixos/networking.wireless.networks.<name>.psk | The network's pre-shared key in plaintext defaulting
to being a network without any authentication.
Be aware that this will be written to the Nix store
in plaintext! Use pskRaw with an external
reference to keep it safe.
Mutually exclusive with pskRaw.
|
| options/nixos/services.limesurvey.nginx.virtualHost.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/boot.zfs.pools.<name>.devNodes | Name of directory from which to import ZFS device, this is passed to zpool import
as the value of the -d option
|
| options/nixos/services.opengfw.rules.*.name | Name of the rule.
|
| options/home-manager/programs.rbenv.plugins.*.name | Name of the plugin.
|
| options/home-manager/programs.lapce.plugins.*.name | Name of the plugin.
|
| options/nixos/services.nntp-proxy.listenAddress | Proxy listen address (IPv6 literal addresses need to be enclosed in "[" and "]" characters)
|
| options/nixos/networking.wireless.networks.<name>.hidden | Set this to true if the SSID of the network is hidden.
|
| options/nixos/services.cloudflare-ddns.domains | List of domain names (FQDNs) to manage
|
| options/nixos/services.sslh.listenAddresses | Listening addresses or hostnames.
|
| options/nixos/programs.regreet.theme.name | Name of the theme to use for regreet.
|
| options/home-manager/programs.firefox.profiles.<name>.containers.<name>.name | Container name, e.g., shopping.
|
| options/home-manager/programs.librewolf.profiles.<name>.name | Profile name.
|
| options/nixos/boot.iscsi-initiator.name | Name of the iSCSI initiator to boot from
|
| options/nixos/networking.wireless.networks.<name>.ssid | You could use this field to override the network's ssid
|
| options/nixos/services.crowdsec.name | Name of the machine when registering it at the central or local api.
|
| options/nixos/services.netbird.tunnels.<name>.service.name | A systemd service name to use (without .service suffix).
|
| options/nixos/services.netbird.clients.<name>.service.name | A systemd service name to use (without .service suffix).
|
| options/nixos/power.ups.ups.<name>.port | The serial port to which your UPS is connected. /dev/ttyS0 is
usually the first port on Linux boxes, for example.
|
| options/home-manager/programs.docker-cli.contexts.<name>.Name | Name of the Docker context
|
| options/nixos/hardware.deviceTree.name | The name of an explicit dtb to be loaded, relative to the dtb base
|
| options/nixos/networking.vswitches.<name>.openFlowVersion | Version of OpenFlow protocol to use when communicating with the switch internally (e.g. with openFlowRules).
|
| options/nixos/services.dovecot2.mailboxes.<name>.name | The name of the mailbox.
|
| options/nixos/services.i2pd.proto.socksProxy.name | The endpoint name.
|
| options/nixos/networking.supplicant.<name>.extraConf | Configuration options for wpa_supplicant.conf
|
| options/nixos/services.nginx.defaultListen | If vhosts do not specify listen, use these addresses by default
|
| options/nixos/users.users.<name>.group | The user's primary group.
|
| options/nixos/services.limesurvey.httpd.virtualHost.listen.*.ip | IP to listen on. 0.0.0.0 for IPv4 only, * for all.
|
| options/nixos/services.zabbixServer.listen.ip | List of comma delimited IP addresses that the trapper should listen on
|
| options/nixos/services.tt-rss.database.name | Name of the existing database.
|
| options/nixos/services.postfix.settings.master.<name>.name | The name of the service to run
|
| options/home-manager/home.file.<name>.target | Path to target file relative to HOME.
|
| options/nixos/services.monero.priorityNodes | List of peer IP addresses to connect to and
attempt to keep the connection open.
|
| options/nixos/networking.wireless.networks.<name>.auth | Use this option to configure advanced authentication methods
like EAP
|
| options/nixos/virtualisation.interfaces.<name>.vlan | VLAN to which the network interface is connected.
|
| options/nixos/networking.vswitches.<name>.extraOvsctlCmds | Commands to manipulate the Open vSwitch database
|
| options/home-manager/programs.zsh.zplug.plugins.*.name | The name of the plugin.
|
| options/nixos/services.sabnzbd.settings.servers.<name>.name | The name of the server
|
| options/nixos/services.inadyn.settings.allow-ipv6 | Whether to get IPv6 addresses from interfaces.
|
| options/home-manager/xdg.stateFile.<name>.text | Text of the file
|
| options/home-manager/xdg.cacheFile.<name>.text | Text of the file
|
| options/nixos/services.mysql.galeraCluster.name | The logical name of the Galera cluster
|
| options/nixos/networking.supplicant.<name>.configFile.path | External wpa_supplicant.conf configuration file
|
| options/nixos/services.mysql.ensureUsers.*.name | Name of the user to ensure.
|
| options/nixos/services.vwifi.module.macPrefix | The prefix for MAC addresses to use, without the trailing ':'
|
| options/nixos/services.mailman.webHosts | The list of hostnames and/or IP addresses from which the Mailman Web
UI will accept requests
|
| options/nixos/services.pdns-recursor.exportHosts | Whether to export names and IP addresses defined in /etc/hosts.
|
| options/home-manager/home.file.<name>.enable | Whether this file should be generated
|
| options/nixos/services.imaginary.address | Bind address
|
| options/nixos/services.pdns-recursor.dns.address | IP addresses Recursor DNS server will bind to.
|
| options/nixos/services.mpd.network.listenAddress | The address for the daemon to listen on
|
| options/home-manager/services.mpd.network.listenAddress | The address for the daemon to listen on
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.heartbeat.name | Name of the beat
|
| options/nixos/services.mediawiki.name | Name of the wiki.
|
| options/nixos/services.teeworlds.name | Name of the server.
|
| options/nixos/services.meilisearch.listenAddress | The IP address that Meilisearch will listen on
|
| options/nixos/services.gitea.database.name | Database name.
|
| options/nixos/services.movim.database.name | Database name.
|
| options/nixos/services.wordpress.sites.<name>.database.name | Database name.
|
| options/nixos/programs.regreet.iconTheme.name | Name of the icon theme to use for regreet.
|
| options/nixos/services.i2pd.proto.i2pControl.name | The endpoint name.
|
| options/nixos/services.coturn.alt-listening-port | Alternative listening port for UDP and TCP listeners;
default (or zero) value means "listening port plus one"
|
| options/nixos/services.openiscsi.name | Name of this iscsi initiator
|
| options/nixos/services.postgrey.lookupBySubnet | Strip the last N bits from IP addresses, determined by IPv4CIDR and IPv6CIDR
|
| options/nixos/services.nsd.ipTransparent | Allow binding to non local addresses.
|
| options/nixos/services.cockroachdb.join | The addresses for connecting the node to a cluster.
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.name | Name of the profile.
|
| options/nixos/networking.wireless.networks.<name>.extraConfig | Extra configuration lines appended to the network block
|
| options/nixos/services.ente.api.settings.db.name | The database name
|
| options/nixos/services.snipe-it.database.name | Database name.
|
| options/nixos/users.groups.<name>.gid | The group GID
|
| options/nixos/services.firezone.server.provision.accounts.<name>.auth.<name>.name | The name of this authentication provider
|
| options/nixos/services.firezone.relay.name | The name of this gateway as shown in firezone
|
| options/nixos/services.oauth2-proxy.cookie.name | The name of the cookie that the oauth_proxy creates.
|
| options/home-manager/services.activitywatch.watchers.<name>.name | The name of the watcher
|
| options/nixos/services.stargazer.ipLogPartial | Log partial client IP addresses in the connection log.
|
| options/nixos/containers.<name>.interfaces | The list of interfaces to be moved into the container.
|
| options/nixos/services.h2o.hosts.<name>.serverName | Server name to be used for this virtual host
|
| options/home-manager/xdg.dataFile.<name>.target | Path to target file relative to xdg.dataHome.
|
| options/home-manager/home.file.<name>.force | Whether the target path should be unconditionally replaced
by the managed file source
|
| options/nixos/virtualisation.interfaces.<name>.assignIP | Automatically assign an IP address to the network interface using the same scheme as
virtualisation.vlans.
|
| options/nixos/services.mtr-exporter.jobs.*.name | Name of ICMP pinging job.
|
| options/home-manager/programs.librewolf.profiles.<name>.containers.<name>.name | Container name, e.g., shopping.
|
| options/nixos/services.jitsi-videobridge.nat.harvesterAddresses | Addresses of public STUN services to use to automatically find
the public and local addresses of this Jitsi-Videobridge instance
without the need for manual configuration
|
| options/nixos/services.postsrsd.separator | First separator character in generated addresses
|
| options/home-manager/launchd.agents.<name>.enable | Whether to enable ‹name›.
|
| options/home-manager/xdg.dataFile.<name>.enable | Whether this file should be generated
|
| options/nixos/services.davis.database.name | Database name, only used when the databse is created locally.
|
| options/nixos/services.monero.exclusiveNodes | List of peer IP addresses to connect to only
|
| options/nixos/services.wyoming.piper.servers.<name>.zeroconf.name | The advertised name for zeroconf discovery.
|
| options/nixos/services.sshguard.whitelist | Whitelist a list of addresses, hostnames, or address blocks.
|
| options/nixos/services.schleuder.lists | List of list addresses that should be handled by Schleuder
|
| options/home-manager/services.podman.builds.<name>.tags | Name associated with the build
|
| options/nixos/services.docuseal.redis.name | Name of the redis server
|
| options/nixos/services.avahi.publish.userServices | Whether to publish user services
|
| options/nixos/services.i2pd.websocket.name | The endpoint name.
|
| options/nixos/services.monica.database.name | Database name.
|
| options/nixos/services.moodle.database.name | Database name.
|
| options/nixos/services.zammad.database.name | Database name.
|
| options/home-manager/xdg.desktopEntries.<name>.actions.<name>.exec | Program to execute, possibly with arguments.
|
| options/nixos/users.extraUsers.<name>.home | The user's home directory.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.actors.<name>.name | The name of this actor
|
| options/nixos/services.firezone.server.provision.accounts.<name>.groups.<name>.name | The name of this group
|
| options/nixos/users.extraUsers.<name>.homeMode | The user's home directory mode in numeric format
|
| options/nixos/services.headscale.settings.prefixes.v6 | Each prefix consists of either an IPv4 or IPv6 address,
and the associated prefix length, delimited by a slash
|
| options/nixos/services.headscale.settings.prefixes.v4 | Each prefix consists of either an IPv4 or IPv6 address,
and the associated prefix length, delimited by a slash
|
| options/home-manager/programs.thunderbird.profiles.<name>.feedAccounts.<name>.name | This feed account's name.
|
| options/nixos/services.immich.database.name | The name of the immich database.
|
| options/home-manager/programs.boxxy.rules.*.name | Unique identifier of the boxxy rule
|
| options/nixos/services.tinc.networks.<name>.hosts | The name of the host in the network as well as the configuration for that host
|
| options/nixos/networking.vlans | This option allows you to define vlan devices that tag packets
on top of a physical interface
|
| options/nixos/services.rsync.jobs.<name>.user | The name of an existing user account under which the rsync process should run.
|
| options/nixos/services.dnscache.forwardOnly | Whether to treat root servers (for @) as caching
servers, requesting addresses the same way a client does
|
| options/nixos/services.sympa.database.name | Database name
|
| options/nixos/services.xinetd.services.*.name | Name of the service.
|
| options/darwin/nix.registry.<name>.to | The flake reference from is rewritten to.
|
| options/home-manager/nix.registry.<name>.to | The flake reference to which from> is to be rewritten.
|
| options/home-manager/xdg.configFile.<name>.text | Text of the file
|
| options/nixos/services.wakapi.database.name | The name of the database to use for Wakapi.
|
| options/home-manager/xdg.desktopEntries.<name>.actions.<name>.icon | Icon to display in file manager, menus, etc.
|
| options/home-manager/programs.radicle.settings.node.listen | Addresses to bind to and listen for inbound connections.
|
| options/nixos/networking.sits.<name>.encapsulation | Configures the type of encapsulation.
|
| options/home-manager/xdg.dataFile.<name>.force | Whether the target path should be unconditionally replaced
by the managed file source
|
| options/nixos/power.ups.ups.<name>.driver | Specify the program to run to talk to this UPS. apcsmart,
bestups, and sec are some examples.
|
| options/darwin/programs.vim.vimOptions.<name>.target | Name of symlink
|
| options/nixos/hardware.sata.timeout.drives.*.name | Drive name without the full path.
|
| options/nixos/services.zabbixWeb.database.name | Database name.
|
| options/nixos/networking.dhcpcd.setHostname | Whether to set the machine hostname based on the information
received from the DHCP server.
The hostname will be changed only if the current one is
the empty string, localhost or nixos
|
| options/nixos/services.syncthing.settings.devices.<name>.name | The name of the device.
|
| options/home-manager/services.syncthing.settings.devices.<name>.name | The name of the device.
|
| options/home-manager/xdg.cacheFile.<name>.target | Path to target file relative to xdg.cacheHome.
|
| options/nixos/services.tomcat.virtualHosts.*.name | name of the virtualhost
|
| options/nixos/networking.supplicant.<name>.configFile.writable | Whether the configuration file at configFile.path should be written to by
wpa_supplicant.
|
| options/nixos/services.gitea-actions-runner.instances.<name>.name | The name identifying the runner instance towards the Gitea/Forgejo instance.
|
| options/nixos/users.extraUsers.<name>.uid | The account UID
|
| options/nixos/networking.bonds | This option allows you to define bond devices that aggregate multiple,
underlying networking interfaces together
|
| options/nixos/networking.sits.<name>.encapsulation.port | Destination port when using UDP encapsulation.
|
| options/home-manager/programs.thunderbird.profiles.<name>.name | This profile's name.
|
| options/nixos/programs.regreet.cursorTheme.name | Name of the cursor theme to use for regreet.
|
| options/home-manager/xdg.stateFile.<name>.target | Path to target file relative to xdg.stateHome.
|
| options/nixos/services.firezone.gui-client.name | The name of this client as shown in firezone
|
| options/nixos/services.miniflux.config.LISTEN_ADDR | Address to listen on
|
| options/nixos/networking.fqdn | The fully qualified domain name (FQDN) of this host
|
| options/darwin/networking.fqdn | The fully qualified domain name (FQDN) of this host
|
| options/nixos/systemd.units.<name>.text | Text of this systemd unit.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.relayGroups.<name>.name | The name of this relay group
|
| options/nixos/virtualisation.forwardPorts.*.host.address | The IPv4 address of the host.
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.name | Adapter name that is used in the radicle-ci-broker configuration
|
| options/darwin/networking.computerName | The user-friendly name for the system, set in System Preferences > Sharing > Computer Name
|
| options/nixos/networking.domain | The system domain name
|
| options/darwin/users.users.<name>.isHidden | Whether to make the user account hidden.
|
| options/home-manager/xdg.cacheFile.<name>.enable | Whether this file should be generated
|
| options/home-manager/xdg.stateFile.<name>.enable | Whether this file should be generated
|
| options/nixos/services.nsd.ratelimit.ipv6PrefixLength | IPv6 prefix length
|
| options/home-manager/programs.kakoune.config.hooks.*.name | The name of the hook
|
| options/nixos/services.forgejo.database.name | Database name.
|
| options/nixos/services.redmine.database.name | Database name.
|
| options/nixos/networking.wireless.networks.<name>.authProtocols | The list of authentication protocols accepted by this network
|
| options/nixos/services.rsync.jobs.<name>.group | The name of an existing user group under which the rsync process should run.
|
| options/home-manager/programs.ranger.plugins.*.name | Name of the plugin linked to
$XDG_CONFIG_HOME/ranger/plugins/
|
| options/nixos/services.home-assistant.config.http.server_host | Only listen to incoming requests on specific IP/host
|
| options/nixos/hardware.deviceTree.overlays.*.name | Name of this overlay
|
| options/nixos/services.armagetronad.servers.<name>.name | The name of this server.
|
| options/nixos/services.syncthing.settings.options.localAnnouncePort | The port on which to listen and send IPv4 broadcast announcements to.
|
| options/home-manager/services.syncthing.settings.options.localAnnouncePort | The port on which to listen and send IPv4 broadcast announcements to.
|
| options/nixos/users.extraUsers.<name>.group | The user's primary group.
|
| options/darwin/nix.registry.<name>.from | The flake reference to be rewritten.
|
| options/home-manager/nix.registry.<name>.from | The flake reference to be rewritten.
|
| options/nixos/services.pdfding.database.name | PostgreSQL database name
|
| options/home-manager/home.file.<name>.source | Path of the source file or directory
|
| options/nixos/networking.vswitches.<name>.controllers | Specify the controller targets
|
| options/darwin/programs.tmux.tmuxOptions.<name>.target | Name of symlink
|
| options/darwin/users.users.<name>.home | The user's home directory
|
| options/nixos/networking.wireless.networks.<name>.priority | By default, all networks will get same priority group (0)
|
| options/nixos/virtualisation.forwardPorts.*.guest.address | The IPv4 address on the guest VLAN.
|
| options/nixos/services.sftpgo.settings.ftpd.bindings | Configure listen addresses and ports for ftpd.
|
| options/nixos/services.printing.listenAddresses | A list of addresses and ports on which to listen.
|
| options/nixos/services.firezone.gateway.name | The name of this gateway as shown in firezone
|
| options/nixos/services.thanos.query.endpoints | Addresses of statically configured Thanos API servers (repeatable)
|
| options/nixos/virtualisation.forwardPorts | When using the SLiRP user networking (default), this option allows to
forward ports to/from the host/guest.
If the NixOS firewall on the virtual machine is enabled, you also
have to open the guest ports to enable the traffic between host and
guest.
Currently QEMU supports only IPv4 forwarding.
|
| options/nixos/services.zabbixProxy.database.name | Database name.
|
| options/nixos/services.rustdesk-server.signal.relayHosts | The relay server IP addresses or DNS names of the RustDesk relay.
|
| options/nixos/services.legit.settings.server.name | Server name.
|
| options/nixos/systemd.automounts.*.name | The name of this systemd unit, including its extension
|
| options/nixos/power.ups.ups.<name>.summary | Lines which would be added inside ups.conf for handling this UPS.
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.Bonjour | This optional key can be used to request that the service be registered with the
mDNSResponder(8)
|
| options/nixos/networking.wlanInterfaces | Creating multiple WLAN interfaces on top of one physical WLAN device (NIC)
|
| options/nixos/services.eris-server.listenCoap | Server CoAP listen address
|
| options/home-manager/xdg.cacheFile.<name>.force | Whether the target path should be unconditionally replaced
by the managed file source
|
| options/home-manager/xdg.stateFile.<name>.force | Whether the target path should be unconditionally replaced
by the managed file source
|
| options/nixos/services.komodo-periphery.allowedIps | IP addresses or subnets allowed to call the periphery API
|
| options/nixos/services.selfoss.database.name | Name of the existing database (has no effect if type is "sqlite").
|
| options/nixos/services.autossh.sessions.*.name | Name of the local AutoSSH session
|
| options/darwin/services.autossh.sessions.*.name | Name of the local AutoSSH session
|
| options/home-manager/programs.pyradio.stations.*.name | Display name of the radio station.
|
| options/nixos/networking.ipips.<name>.encapsulation.limit | For an IPv6-based tunnel, the maximum number of nested
encapsulation to allow. 0 means no nesting, "none" unlimited.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.hostname | Specifies the real host name to log into.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.gatewayGroups.<name>.name | The name of this gateway group
|
| options/darwin/environment.etc.<name>.target | Name of symlink
|
| options/nixos/services.sftpgo.settings.httpd.bindings | Configure listen addresses and ports for httpd.
|
| options/nixos/services.sftpgo.settings.sftpd.bindings | Configure listen addresses and ports for sftpd.
|
| options/nixos/networking.supplicant.<name>.userControlled.group | Members of this group can control wpa_supplicant.
|
| options/nixos/programs.neovim.runtime.<name>.target | Name of symlink
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.name | The name of this resource
|
| options/nixos/security.acme.certs.<name>.domain | Domain to fetch certificate for (defaults to the entry name).
|
| options/nixos/services.parsedmarc.settings.smtp.to | The addresses to send outgoing mail to.
|
| options/nixos/networking.nameservers | The list of nameservers
|
| options/home-manager/xdg.configFile.<name>.target | Path to target file relative to xdg.configHome.
|
| options/home-manager/xdg.dataFile.<name>.source | Path of the source file or directory
|
| options/nixos/services.nsd.zones.<name>.zoneStats | When set to something distinct to null NSD is able to collect
statistics per zone
|
| options/nixos/networking.sits.<name>.encapsulation.type | Select the encapsulation type:
-
6in4: the IPv6 packets are encapsulated using the
6in4 protocol (formerly known as SIT, RFC 4213);
-
gue: the IPv6 packets are encapsulated in UDP packets
using the Generic UDP Encapsulation (GUE) scheme;
-
foo: the IPv6 packets are encapsulated in UDP packets
using the Foo over UDP (FOU) scheme.
|
| options/home-manager/home.file.<name>.onChange | Shell commands to run when file has changed between
generations
|
| options/nixos/services.hans.clients | Each attribute of this option defines a systemd service that
runs hans
|
| options/nixos/services.resolved.settings.Resolve.DNS | List of IP addresses to query as recursive DNS resolvers.
|
| options/darwin/users.users.<name>.createHome | Create the home directory when creating the user.
|
| options/nixos/users.extraGroups.<name>.gid | The group GID
|
| options/nixos/networking.sits.<name>.encapsulation.sourcePort | Source port when using UDP encapsulation
|
| options/darwin/networking.localHostName | The local hostname, or local network name, is displayed beneath the computer's name at the
top of the Sharing preferences pane
|
| options/nixos/security.wrappers.<name>.program | The name of the wrapper program
|
| options/nixos/services.netbox.settings.ALLOWED_HOSTS | A list of valid fully-qualified domain names (FQDNs) and/or IP
addresses that can be used to reach the NetBox service.
|
| options/darwin/networking.fqdnOrHostName | Either the fully qualified domain name (FQDN), or just the host name if
it does not exists
|
| options/nixos/services.cgit.<name>.user | User to run the cgit service as.
|
| options/nixos/users.users.<name>.shell | The path to the user's shell
|
| options/nixos/systemd.user.units.<name>.text | Text of this systemd unit.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.cssSnippets.*.name | Name of the snippet.
|
| options/nixos/services.dolibarr.database.name | Database name.
|
| options/nixos/services.castopod.database.name | Database name.
|
| options/nixos/services.agorakit.database.name | Database name.
|
| options/nixos/services.mastodon.database.name | Database name.
|
| options/nixos/services.peertube.database.name | Database name.
|
| options/nixos/services.pixelfed.database.name | Database name.
|
| options/nixos/services.windmill.database.name | Database name.
|
| options/nixos/services.zabbixServer.database.name | Database name.
|
| options/home-manager/xsession.pointerCursor.name | Alias of home.pointerCursor.name.
|
| options/nixos/environment.etc.<name>.target | Name of symlink (relative to
/etc)
|
| options/nixos/services.mastodon.trustedProxy | You need to set it to the IP from which your reverse proxy sends requests to Mastodon's web process,
otherwise Mastodon will record the reverse proxy's own IP as the IP of all requests, which would be
bad because IP addresses are used for important rate limits and security functions.
|
| options/nixos/networking.fqdnOrHostName | Either the fully qualified domain name (FQDN), or just the host name if
it does not exist
|
| options/nixos/services.i2pd.inTunnels.<name>.port | Bind port for ‹name› endpoint.
|
| options/nixos/nix.registry.<name>.to | The flake reference from is rewritten to
|
| options/nixos/users.users.<name>.enable | If set to false, the user account will not be created
|
| options/nixos/services.dawarich.database.name | The name of the dawarich database.
|
| options/nixos/services.cloudlog.database.name | MySQL database name.
|
| options/nixos/services.freshrss.database.name | Database name for FreshRSS.
|
| options/nixos/services.shadowsocks.localAddress | Local addresses to which the server binds.
|
| options/nixos/services.wyoming.satellite.name | Name of the satellite.
|
| options/nixos/networking.supplicant.<name>.userControlled.socketDir | Directory of sockets for controlling wpa_supplicant.
|
| options/nixos/power.ups.users.<name>.upsmon | Add the necessary actions for a upsmon process to work
|
| options/nixos/systemd.paths.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/systemd.paths.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/home-manager/xdg.configFile.<name>.enable | Whether this file should be generated
|
| options/nixos/networking.vswitches.<name>.supportedOpenFlowVersions | Supported versions to enable on this switch.
|
| options/nixos/services.gitwatch.<name>.user | The name of services's user
|
| options/nixos/users.users.<name>.pamMount | Attributes for user's entry in
pam_mount.conf.xml
|
| options/nixos/services.umurmur.settings.bindaddr6 | IPv6 address to bind to
|
| options/nixos/services.nginx.defaultListenAddresses | If vhosts do not specify listenAddresses, use these addresses by default
|
| options/nixos/services.factorio.game-name | Name of the game as it will appear in the game listing.
|
| options/nixos/services.i2pd.outTunnels.<name>.port | Bind port for ‹name› endpoint.
|
| options/nixos/nix.registry.<name>.flake | The flake input from is rewritten to.
|
| options/darwin/nix.registry.<name>.flake | The flake input from is rewritten to.
|
| options/home-manager/nix.registry.<name>.flake | The flake input to which from> is to be rewritten.
|
| options/nixos/services.corosync.nodelist.*.name | Node name
|
| options/nixos/services.firezone.server.provision.accounts.<name>.name | The account name
|
| options/nixos/services.journalbeat.name | Name of the beat
|
| options/nixos/services.yggdrasil.settings.Listen | Listen addresses for incoming connections
|
| options/nixos/users.users.<name>.extraGroups | The user's auxiliary groups.
|
| options/nixos/services.lokinet.settings.dns.upstream | Upstream resolver(s) to use as fallback for non-loki addresses
|
| options/nixos/networking.bridges | This option allows you to define Ethernet bridge devices
that connect physical networks together
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockNodeName | This optional key specifies the node to connect(2) or bind(2) to.
|
| options/nixos/services.opengfw.rules.*.modifier.name | Name of the modifier.
|
| options/nixos/boot.initrd.luks.devices.<name>.header | The name of the file or block device that
should be used as header for the encrypted device.
|
| options/nixos/services.invoiceplane.sites.<name>.database.name | Database name.
|
| options/nixos/services.nghttpx.frontends.*.server | Frontend server interface binding specification as either a
host:port pair or a unix domain docket
|
| options/home-manager/xdg.dataFile.<name>.onChange | Shell commands to run when file has changed between
generations
|
| options/nixos/users.users.<name>.cryptHomeLuks | Path to encrypted luks device that contains
the user's home directory.
|
| options/home-manager/programs.rclone.remotes.<name>.mounts.<name>.logLevel | Set the log-level
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| options/home-manager/programs.vscode.nameShort | Override for package "short name", used for generating configuration
|
| options/nixos/boot.initrd.luks.devices.<name>.keyFile | The name of the file (can be a raw device or a partition) that
should be used as the decryption key for the encrypted device
|
| options/nixos/services.bacula-sd.device.<name>.archiveDevice | The specified name-string gives the system file name of the storage
device managed by this storage daemon
|
| options/home-manager/programs.rclone.remotes.<name>.mounts.<name>.enable | Whether to enable this mount.
|
| options/darwin/users.users.<name>.description | A short description of the user account, typically the
user's full name
|
| options/nixos/ec2.zfs.datasets.<name>.mount | Where to mount this dataset.
|
| options/nixos/networking.supplicant.<name>.userControlled.enable | Allow normal users to control wpa_supplicant through wpa_gui or wpa_cli
|
| options/home-manager/programs.rclone.remotes.<name>.mounts.<name>.autoMount | Whether to enable automatic mounting.
|
| options/darwin/users.groups.<name>.members | The group's members.
|
| options/home-manager/xdg.cacheFile.<name>.source | Path of the source file or directory
|
| options/home-manager/xdg.stateFile.<name>.source | Path of the source file or directory
|
| options/home-manager/xdg.configFile.<name>.force | Whether the target path should be unconditionally replaced
by the managed file source
|
| options/nixos/services.clamsmtp.instances.*.action | Action to take when a virus is detected
|
| options/nixos/services.sftpgo.settings.webdavd.bindings | Configure listen addresses and ports for webdavd.
|
| options/nixos/services.h2o.hosts.<name>.tls | TLS options for virtual host
|
| options/nixos/services.geth.<name>.port | Port number Go Ethereum will be listening on, both TCP and UDP.
|
| options/nixos/systemd.paths.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/nix.registry.<name>.from | The flake reference to be rewritten
|
| options/nixos/services.anuko-time-tracker.database.name | Database name.
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockPathName | This optional key implies SockFamily is set to "Unix"
|
| options/nixos/services.geth.<name>.http.apis | APIs to enable over WebSocket
|
| options/nixos/services.cgit.<name>.group | Group to run the cgit service as.
|
| options/nixos/services.clamsmtp.instances.*.xClient | Send the XCLIENT command to the receiving server, for forwarding
client addresses and connection information if the receiving
server supports this feature.
|
| options/nixos/users.users.<name>.createHome | Whether to create the home directory and ensure ownership as well as
permissions to match the user.
|
| options/nixos/services.nextcloud.settings.mail_from_address | FROM address that overrides the built-in sharing-noreply and lostpassword-noreply FROM addresses
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels.<name>.nearPattern | Name for where mail coming from the remote (far) mail server will end up
locally
|
| options/nixos/security.acme.certs.<name>.s3Bucket | S3 bucket name to use for HTTP-01 based challenges
|
| options/home-manager/services.kanshi.settings.*.profile.name | Profile name
|
| options/nixos/services.buildkite-agents.<name>.hooksPath | Path to the directory storing the hooks
|
| options/darwin/services.buildkite-agents.<name>.hooksPath | Path to the directory storing the hooks
|
| options/nixos/programs.tsmClient.servers.<name>.nodename | Target node name on the IBM TSM server.
|
| options/nixos/services.nsd.zones.<name>.requestXFR | Format: [AXFR|UDP] <ip-address> <key-name | NOKEY>
|
| options/nixos/services.nginx.virtualHosts.<name>.serverName | Name of this virtual host
|
| options/nixos/services.mysql.galeraCluster.nodeAddresses | IP addresses or hostnames of all nodes in the cluster, including this node
|
| options/nixos/services.bookstack.database.name | Database name.
|
| options/nixos/services.mediawiki.database.name | Database name.
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockPathMode | This optional key specifies the mode of the socket
|
| options/nixos/services.cgit.<name>.scanPath | A path which will be scanned for repositories.
|
| options/nixos/services.iodine.clients | Each attribute of this option defines a systemd service that
runs iodine
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels.<name>.extraConfig | Extra configuration lines to add to THIS channel's
configuration.
|
| options/nixos/services.tahoe.nodes.<name>.nickname | The nickname of this Tahoe node.
|
| options/nixos/systemd.user.paths.<name>.wants | Start the specified units when this unit is started.
|
| options/darwin/programs.ssh.knownHosts.<name>.hostNames | The set of system-wide known SSH hosts
|
| options/nixos/systemd.user.paths.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/services.discourse.database.name | Discourse database name.
|
| options/nixos/hardware.alsa.controls.<name>.card | Name of the PCM card to control (slave).
|
| options/nixos/services.bcg.rename | Rename nodes to different name.
|
| options/nixos/services.nylon.<name>.port | What port to listen for client requests, default is 1080.
|
| options/nixos/services.h2o.hosts.<name>.acme | ACME options for virtual host.
|
| options/nixos/services.h2o.hosts.<name>.http | HTTP options for virtual host
|
| options/nixos/services.cassandra.seedAddresses | The addresses of hosts designated as contact points in the cluster
|
| options/nixos/services.i2pd.inTunnels.<name>.enable | Whether to enable ‹name›.
|
| options/nixos/services.k3s.manifests.<name>.target | Name of the symlink (relative to /var/lib/rancher/k3s/server/manifests)
|
| options/nixos/systemd.timers.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/systemd.slices.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/systemd.slices.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/systemd.timers.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.corePlugins.*.name | The plugin.
|
| options/nixos/services.postsrsd.settings.srs-domain | Dedicated mail domain used for ephemeral SRS envelope addresses
|
| options/home-manager/xdg.cacheFile.<name>.onChange | Shell commands to run when file has changed between
generations
|
| options/home-manager/xdg.stateFile.<name>.onChange | Shell commands to run when file has changed between
generations
|
| options/nixos/services.geth.<name>.http.port | Port number of Go Ethereum HTTP API.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.Bonjour | This optional key can be used to request that the service be registered with the
mDNSResponder(8)
|
| options/nixos/power.ups.users.<name>.actions | Allow the user to do certain things with upsd
|
| options/nixos/services.github-runners.<name>.replace | Replace any existing runner with the same name
|
| options/darwin/services.github-runners.<name>.replace | Replace any existing runner with the same name
|
| options/nixos/services.openafsClient.cellServDB.<name>.*.dnsname | DNS full-qualified domain name of a database server
|
| options/nixos/services.openafsServer.cellServDB.<name>.*.dnsname | DNS full-qualified domain name of a database server
|
| options/home-manager/programs.rclone.remotes.<name>.mounts.<name>.mountPoint | A local file path specifying the location of the mount point.
|
| options/nixos/services.cgit.<name>.repos | cgit repository settings, see cgitrc(5)
|
| options/home-manager/xdg.desktopEntries.<name>.genericName | Generic name of the application.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.ssid | SSID to be used in IEEE 802.11 management frames.
|
| options/nixos/services.https-dns-proxy.provider.kind | The upstream provider to use or custom in case you do not trust any of
the predefined providers or just want to use your own
|
| options/nixos/services.i2pd.outTunnels.<name>.enable | Whether to enable ‹name›.
|
| options/nixos/services.cgit.<name>.nginx.virtualHost | VirtualHost to serve cgit on, defaults to the attribute name.
|
| options/nixos/services.prometheus.remoteRead.*.name | Name of the remote read config, which if specified must be unique among remote read configs
|
| options/nixos/services.nntp-proxy.users.<name>.username | Username
|
| options/nixos/services.writefreely.admin.name | The name of the first admin user.
|
| options/nixos/users.users.<name>.subGidRanges | Subordinate group ids that user is allowed to use
|
| options/nixos/users.users.<name>.subUidRanges | Subordinate user ids that user is allowed to use
|
| options/nixos/services.rauc.slots.<name>.*.type | The type of the device.
|
| options/home-manager/programs.alot.tags.<name>.focus | How to display the tag when focused.
|
| options/nixos/systemd.paths.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/services.unpoller.unifi.defaults.hash_pii | Hash, with md5, client names and MAC addresses
|
| options/nixos/services.mysql.initialDatabases.*.name | The name of the database to create.
|
| options/nixos/services.pretix.settings.database.name | Database name.
|
| options/nixos/systemd.user.paths.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.Bonjour | This optional key can be used to request that the service be registered with the
mDNSResponder(8)
|
| options/nixos/services.cgit.<name>.enable | Whether to enable cgit.
|
| options/nixos/services.postsrsd.settings.separator | SRS tag separator used in generated sender addresses
|
| options/nixos/systemd.paths.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.units.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/services.nix-store-gcs-proxy.<name>.bucketName | Name of Google storage bucket
|
| options/darwin/users.users.<name>.shell | The user's shell
|
| options/nixos/virtualisation.allInterfaces.<name>.name | Interface name
|
| options/darwin/launchd.agents.<name>.path | Packages added to the service's PATH
environment variable
|
| options/nixos/security.acme.certs.<name>.csr | Path to a certificate signing request to apply when fetching the certificate.
|
| options/nixos/services.corosync.nodelist.*.ring_addrs | List of addresses, one for each ring.
|
| options/home-manager/xdg.configFile.<name>.source | Path of the source file or directory
|
| options/nixos/systemd.timers.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/systemd.paths.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/users.groups.<name>.members | The user names of the group members, added to the
/etc/group file.
|
| options/nixos/systemd.slices.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/services.rke2.manifests.<name>.target | Name of the symlink (relative to /var/lib/rancher/rke2/server/manifests)
|
| options/home-manager/programs.hexchat.channels.<name>.realName | Real name
|
| options/nixos/services.firezone.headless-client.name | The name of this client as shown in firezone
|
| options/nixos/services.tts.servers.<name>.model | Name of the model to download and use for speech synthesis
|
| options/nixos/services._3proxy.services.*.acl.*.targets | List of target IP ranges, use empty list for any
|
| options/nixos/services.geth.<name>.gcmode | Blockchain garbage collection mode.
|
| options/nixos/services.uhub.<name>.enable | Whether to enable hub instance.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.Bonjour | This optional key can be used to request that the service be registered with the
mDNSResponder(8)
|
| options/nixos/services.prometheus.remoteWrite.*.name | Name of the remote write config, which if specified must be unique among remote write configs
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.group | Members of this group can access the control socket for this interface.
|
| options/nixos/services.froide-govplan.settings.ALLOWED_HOSTS | A list of valid fully-qualified domain names (FQDNs) and/or IP
addresses that can be used to reach the Froide-Govplan service.
|
| options/home-manager/programs.fish.binds.<name>.mode | Specify the bind mode that the bind is used in
|
| options/nixos/users.users.<name>.autoSubUidGidRange | Automatically allocate subordinate user and group ids for this user
|
| options/home-manager/xdg.desktopEntries.<name>.type | The type of the desktop entry.
|
| options/nixos/users.extraUsers.<name>.shell | The path to the user's shell
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels.<name>.patterns | Instead of synchronizing just the mailboxes that
match the farPattern, use it as a prefix which is
not matched against the patterns, and is not affected by mailbox list
overrides.
|
| options/nixos/users.users.<name>.subUidRanges.*.count | Count of subordinate user ids
|
| options/nixos/users.users.<name>.subGidRanges.*.count | Count of subordinate group ids
|
| options/nixos/services.ndppd.proxies.<name>.rules.<name>.interface | Interface to use when method is iface.
|
| options/home-manager/programs.irssi.networks.<name>.channels.<name>.autoJoin | Whether to join this channel on connect.
|
| options/nixos/services.cntlm.username | Proxy account name, without the possibility to include domain name ('at' sign is interpreted literally).
|
| options/nixos/users.extraUsers.<name>.enable | If set to false, the user account will not be created
|
| options/nixos/services.spacecookie.settings.log.hide-ips | If enabled, spacecookie will hide personal
information of users like IP addresses from
log output.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.utf8Ssid | Whether the SSID is to be interpreted using UTF-8 encoding.
|
| options/nixos/systemd.units.<name>.aliases | Aliases of that unit.
|
| options/nixos/systemd.paths.<name>.aliases | Aliases of that unit.
|
| options/nixos/services.postgresql.ensureUsers.*.name | Name of the user to ensure.
|
| options/darwin/services.postgresql.ensureUsers.*.name | Name of the user to ensure.
|
| options/nixos/services.h2o.hosts.<name>.tls.port | Override the default TLS port for this virtual host.
|
| options/nixos/services.geth.<name>.enable | Whether to enable Go Ethereum Node.
|
| options/nixos/services.geth.<name>.extraArgs | Additional arguments passed to Go Ethereum.
|
| options/nixos/systemd.user.paths.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.user.units.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockServiceName | This optional key specifies the service on the node to connect(2) or bind(2) to.
|
| options/nixos/hardware.alsa.cardAliases.<name>.driver | Name of the kernel module that provides the card.
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockPassive | This optional key specifies whether listen(2) or connect(2) should be called on the created file
descriptor
|
| options/darwin/system.activationScripts.<name>.target | Name of symlink
|
| options/home-manager/xdg.desktopEntries.<name>.exec | Program to execute, possibly with arguments.
|
| options/home-manager/programs.superfile.pinnedFolders.*.name | Name that will be shown.
|
| options/nixos/services.hylafax.modems.<name>.type | Name of modem configuration file,
will be searched for in config
in the spooling area directory.
|
| options/nixos/systemd.user.timers.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/systemd.user.slices.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/users.extraUsers.<name>.pamMount | Attributes for user's entry in
pam_mount.conf.xml
|
| options/nixos/systemd.user.timers.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/systemd.user.slices.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/services.filesender.database.name | Database name.
|
| options/nixos/services.limesurvey.database.name | Database name.
|
| options/nixos/services.zoneminder.database.name | Name of database.
|
| options/nixos/users.extraUsers.<name>.extraGroups | The user's auxiliary groups.
|
| options/nixos/services.pgbackrest.stanzas.<name>.jobs.<name>.type | Backup type as described in:
https://pgbackrest.org/command.html#command-backup/category-command/option-type
|
| options/nixos/security.acme.certs.<name>.csrKey | Path to the private key to the matching certificate signing request.
|
| options/nixos/services.h2o.hosts.<name>.host | Set the host address for this virtual host
|
| options/nixos/services.quicktun.<name>.privateKey | Local secret key in hexadecimal form.
This option is deprecated
|
| options/nixos/services.hickory-dns.settings.listen_port | Port to listen on (applies to all listen addresses).
|
| options/home-manager/qt.style.name | Style to use for Qt5/Qt6 applications
|
| options/nixos/boot.initrd.systemd.users.<name>.uid | ID of the user in initrd.
|
| options/nixos/services.szurubooru.database.name | Name of the PostgreSQL database.
|
| options/nixos/services.linkwarden.database.name | The name of the Linkwarden database.
|
| options/nixos/services.pretalx.settings.database.name | Database name.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels.<name>.farPattern | IMAP4 patterns for which mailboxes on the remote mail server to sync
|
| options/nixos/services.i2pd.inTunnels.<name>.address | Bind address for ‹name› endpoint.
|
| options/home-manager/accounts.email.accounts.<name>.realName | Name displayed when sending mails.
|
| options/home-manager/programs.borgmatic.backups.<name>.consistency.checks.*.name | Name of consistency check to run.
|
| options/nixos/users.extraUsers.<name>.cryptHomeLuks | Path to encrypted luks device that contains
the user's home directory.
|
| options/nixos/services.tinc.networks.<name>.hostSettings | The name of the host in the network as well as the configuration for that host
|
| options/nixos/systemd.slices.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.timers.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/services.uhub.<name>.enableTLS | Whether to enable TLS support.
|
| options/nixos/services.hadoop.hbase.regionServer.overrideHosts | Remove /etc/hosts entries for "127.0.0.2" and "::1" defined in nixos/modules/config/networking.nix
Regionservers must be able to resolve their hostnames to their IP addresses, through PTR records
or /etc/hosts entries.
|
| options/home-manager/xdg.configFile.<name>.onChange | Shell commands to run when file has changed between
generations
|
| options/nixos/services.mattermost.database.name | Local Mattermost database name.
|
| options/nixos/services.grafana.settings.database.name | The name of the Grafana database.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.keycloak.database.name | Database name to use when connecting to an external or
manually provisioned database; has no effect when a local
database is automatically provisioned
|
| options/nixos/systemd.user.paths.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/services.ndppd.proxies.<name>.rules.<name>.method | static: Immediately answer any Neighbor Solicitation Messages
(if they match the IP rule).
iface: Forward the Neighbor Solicitation Message through the specified
interface and only respond if a matching Neighbor Advertisement
Message is received.
auto: Same as iface, but instead of manually specifying the outgoing
interface, check for a matching route in /proc/net/ipv6_route.
|
| options/nixos/containers.<name>.bindMounts.<name>.hostPath | Location of the host path to be mounted.
|
| options/nixos/hardware.alsa.controls.<name>.device | Name of the PCM device to control (slave).
|
| options/nixos/services.nginx.proxyCachePath.<name>.keysZoneName | Set name to shared memory zone.
|
| options/nixos/hardware.sane.brscan4.netDevices.<name>.nodename | The node name of the device
|
| options/nixos/hardware.sane.brscan5.netDevices.<name>.nodename | The node name of the device
|
| options/nixos/services.peering-manager.settings.ALLOWED_HOSTS | A list of valid fully-qualified domain names (FQDNs) and/or IP
addresses that can be used to reach the peering manager service.
|
| options/nixos/security.acme.certs.<name>.group | Group running the ACME client.
|
| options/home-manager/programs.fish.binds.<name>.erase | Whether to enable remove bind.
|
| options/nixos/services.i2pd.outTunnels.<name>.address | Bind address for ‹name› endpoint.
|
| options/home-manager/accounts.email.accounts.<name>.notmuch.neomutt.virtualMailboxes.*.name | Name to display
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockNodeName | This optional key specifies the node to connect(2) or bind(2) to.
|
| options/darwin/launchd.agents.<name>.script | Shell commands executed as the service's main process.
|
| options/home-manager/xdg.desktopEntries.<name>.icon | Icon to display in file manager, menus, etc.
|
| options/nixos/networking.vswitches | This option allows you to define Open vSwitches that connect
physical networks together
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.dpi | Output DPI configuration.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.dpi | Output DPI configuration.
|
| options/nixos/boot.initrd.luks.devices.<name>.preLVM | Whether the luksOpen will be attempted before LVM scan or after it.
|
| options/nixos/services.h2o.hosts.<name>.http.port | Override the default HTTP port for this virtual host.
|
| options/nixos/services.homebridge.uiSettings.name | Name of the homebridge UI platform
|
| options/nixos/systemd.targets.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/systemd.sockets.<name>.wants | Start the specified units when this unit is started.
|
| options/darwin/launchd.user.agents.<name>.path | Packages added to the service's PATH
environment variable
|
| options/nixos/nix.registry.<name>.exact | Whether the from reference needs to match exactly
|
| options/darwin/nix.registry.<name>.exact | Whether the from reference needs to match exactly
|
| options/home-manager/nix.registry.<name>.exact | Whether the from reference needs to match exactly
|
| options/nixos/systemd.sockets.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/systemd.targets.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/home-manager/services.podman.images.<name>.username | Username used to connect to registry.
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockProtocol | This optional key specifies the protocol to be passed to socket(2)
|
| options/nixos/power.ups.upsmon.monitor.<name>.type | The relationship with upsd
|
| options/nixos/services.epgstation.database.name | Name of the MySQL database that holds EPGStation's data.
|
| options/nixos/services.metricbeat.settings.name | Name of the beat
|
| options/nixos/systemd.timers.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/systemd.slices.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/systemd.units.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.paths.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters.*.name | Name for the filter.
|
| options/nixos/boot.initrd.extraFiles.<name>.source | The object to make available inside the initrd.
|
| options/nixos/systemd.user.paths.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.user.slices.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/systemd.user.timers.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/services.wgautomesh.settings.peers.*.address | Wireguard address of this peer (a single IP address, multiple
addresses or address ranges are not supported).
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.mode | Output resolution.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.rate | Output framerate.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.mode | Output resolution.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.rate | Output framerate.
|
| options/nixos/systemd.user.timers.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.user.slices.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/users.extraUsers.<name>.createHome | Whether to create the home directory and ensure ownership as well as
permissions to match the user.
|
| options/darwin/environment.launchAgents.<name>.target | Name of symlink
|
| options/nixos/services.akkoma.config.":pleroma".":instance".name | Instance name.
|
| options/nixos/services.bacula-sd.director.<name>.tls.verifyPeer | Verify peer certificate
|
| options/nixos/services.bacula-fd.director.<name>.tls.verifyPeer | Verify peer certificate
|
| options/nixos/services.certspotter.emailRecipients | A list of email addresses to send certificate updates to.
|
| options/nixos/services.nsd.zones.<name>.data | The actual zone data
|
| options/nixos/networking.bonds.<name>.xmit_hash_policy | DEPRECATED, use driverOptions
|
| options/nixos/services.postfix.masterConfig.<name>.command | A program name specifying a Postfix service/daemon process
|
| options/nixos/image.repart.partitions.<name>.contents.<name>.source | Path of the source file.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.index | Adds index directive.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/hardware.printers.ensurePrinters.*.name | Name of the printer / printer queue
|
| options/nixos/services.nsd.zones.<name>.dnssec | Whether to enable DNSSEC.
|
| options/nixos/systemd.timers.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.slices.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/home-manager/launchd.agents.<name>.config | Define a launchd job
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockPathName | This optional key implies SockFamily is set to "Unix"
|
| options/nixos/systemd.user.units.<name>.aliases | Aliases of that unit.
|
| options/nixos/systemd.user.paths.<name>.aliases | Aliases of that unit.
|
| options/nixos/users.users.<name>.packages | The set of packages that should be made available to the user
|
| options/darwin/users.users.<name>.packages | The set of packages that should be made availabe to the user
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.crtc | Output video display controller.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.crtc | Output video display controller.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockNodeName | This optional key specifies the node to connect(2) or bind(2) to.
|
| options/home-manager/programs.alot.tags.<name>.normal | How to display the tag when unfocused
|
| options/home-manager/programs.fish.binds.<name>.setsMode | Change current mode after bind is executed
|
| options/nixos/services.bind.zones.<name>.file | Zone file resource records contain columns of data, separated by whitespace, that define the record.
|
| options/nixos/power.ups.upsmon.monitor.<name>.user | Username from upsd.users for accessing this UPS
|
| options/nixos/users.users.<name>.useDefaultShell | If true, the user's shell will be set to
users.defaultUserShell.
|
| options/nixos/fileSystems.<name>.noCheck | Disable running fsck on this filesystem.
|
| options/nixos/services.cgit.<name>.package | The cgit package to use.
|
| options/nixos/services.geth.<name>.package | The geth package to use.
|
| options/nixos/services.uhub.<name>.plugins | Uhub plugin configuration.
|
| options/nixos/services.httpd.virtualHosts.<name>.locations.<name>.index | Adds DirectoryIndex directive
|
| options/nixos/services.httpd.virtualHosts.<name>.locations.<name>.alias | Alias directory for requests
|
| options/nixos/networking.hostName | The name of the machine
|
| options/nixos/services.nylon.<name>.enable | Enables nylon as a running service upon activation.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| options/nixos/systemd.timers.<name>.aliases | Aliases of that unit.
|
| options/nixos/systemd.slices.<name>.aliases | Aliases of that unit.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.tryFiles | Adds try_files directive.
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites.<name>.url | Start URL of the site.
|
| options/darwin/launchd.daemons.<name>.path | Packages added to the service's PATH
environment variable
|
| options/nixos/services.nginx.upstreams.<name>.servers.<name>.backup | Marks the server as a backup server
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.logLevel | Levels (minimum value for logged events):
0 = verbose debugging
1 = debugging
2 = informational messages
3 = notification
4 = warning
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.apIsolate | Isolate traffic between stations (clients) and prevent them from
communicating with each other.
|
| options/nixos/services.geth.<name>.http.enable | Whether to enable Go Ethereum HTTP API.
|
| options/nixos/power.ups.ups.<name>.maxStartDelay | This can be set as a global variable above your first UPS
definition and it can also be set in a UPS section
|
| options/home-manager/accounts.email.accounts.<name>.userName | The server username of this account
|
| options/nixos/systemd.targets.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/systemd.sockets.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/systemd.paths.<name>.upholds | Keeps the specified running while this unit is running
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockNodeName | This optional key specifies the node to connect(2) or bind(2) to.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockPathMode | This optional key specifies the mode of the socket
|
| options/nixos/services.borgbackup.jobs.<name>.archiveBaseName | How to name the created archives
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.gamma | Output gamma configuration.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.gamma | Output gamma configuration.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.module | Optional PKCS#11 module name.
|
| options/nixos/systemd.targets.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.sockets.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/containers.<name>.bindMounts.<name>.isReadOnly | Determine whether the mounted path will be accessed in read-only mode.
|
| options/nixos/users.users.<name>.subUidRanges.*.startUid | Start of the range of subordinate user ids that user is
allowed to use.
|
| options/nixos/users.users.<name>.subGidRanges.*.startGid | Start of the range of subordinate group ids that user is
allowed to use.
|
| options/home-manager/programs.claude-code.skills | Custom skills for Claude Code
|
| options/nixos/boot.initrd.systemd.groups.<name>.gid | ID of the group in initrd.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockPathName | This optional key implies SockFamily is set to "Unix"
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.scale.y | Vertical scaling factor/pixels.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.scale.x | Horizontal scaling factor/pixels.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.scale.x | Horizontal scaling factor/pixels.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.scale.y | Vertical scaling factor/pixels.
|
| options/darwin/environment.userLaunchAgents.<name>.target | Name of symlink
|
| options/nixos/services.rauc.slots.<name>.*.device | The device to update.
|
| options/nixos/services.bitcoind.<name>.rpc.users.<name>.passwordHMAC | Password HMAC-SHA-256 for JSON-RPC connections
|
| options/darwin/launchd.user.agents.<name>.script | Shell commands executed as the service's main process.
|
| options/nixos/fileSystems.<name>.encrypted.label | Label of the unlocked encrypted device
|
| options/home-manager/xdg.desktopEntries.<name>.mimeType | The MIME type(s) supported by this application.
|
| options/nixos/networking.networkmanager.ensureProfiles.profiles.<name>.connection.id | This is the name that will be displayed by NetworkManager and GUIs.
|
| options/nixos/services.fedimintd.<name>.nginx.config.serverName | Name of this virtual host
|
| options/nixos/services.quicktun.<name>.publicKey | Remote public key in hexadecimal form.
Not needed when services.quicktun..protocol is set to raw.
|
| options/nixos/systemd.paths.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.paths.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/services.awstats.configs.<name>.domain | The domain name to collect stats for.
|
| options/nixos/services.openafsServer.advertisedAddresses | List of IP addresses this server is advertised under
|
| options/nixos/systemd.user.sockets.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/systemd.user.targets.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/users.extraUsers.<name>.subUidRanges | Subordinate user ids that user is allowed to use
|
| options/nixos/users.extraUsers.<name>.subGidRanges | Subordinate group ids that user is allowed to use
|
| options/nixos/systemd.user.targets.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/systemd.user.sockets.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/systemd.user.units.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.user.paths.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.user.timers.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/systemd.user.slices.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/services.netbird.tunnels.<name>.user.group | A system group name for this client instance.
|
| options/nixos/services.netbird.clients.<name>.user.group | A system group name for this client instance.
|
| options/darwin/environment.launchDaemons.<name>.target | Name of symlink
|
| options/nixos/programs.tsmClient.servers.<name>.servername | Local name of the IBM TSM server,
must not contain space or more than 64 chars.
|
| options/nixos/services.pppd.peers.<name>.enable | Whether to enable this PPP peer.
|
| options/nixos/services.tts.servers.<name>.port | Port to bind the TTS server to.
|
| options/nixos/services.phpfpm.pools.<name>.user | User account under which this pool runs.
|
| options/home-manager/programs.fish.binds.<name>.silent | Whether to enable Operate silently.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.extraFiles.<name>.text | Text of the file.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.hotkeys.<name>.*.key | The hotkey.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.module | Optional PKCS#11 module name.
|
| options/nixos/systemd.user.targets.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.user.sockets.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/services.h2o.hosts.<name>.acme.root | Directory for the ACME challenge, which is public
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockPathName | This optional key implies SockFamily is set to "Unix"
|
| options/nixos/services.netbird.tunnels.<name>.dir.baseName | A systemd service name to use (without .service suffix).
|
| options/nixos/services.netbird.clients.<name>.dir.baseName | A systemd service name to use (without .service suffix).
|
| options/nixos/environment.etc.<name>.user | User name of file owner
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockPathMode | This optional key specifies the mode of the socket
|
| options/nixos/services.znapzend.zetup.<name>.destinations.<name>.label | Label for this destination
|
| options/home-manager/accounts.email.accounts.<name>.neomutt.mailboxName | Use a different name as mailbox name
|
| options/nixos/systemd.paths.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/systemd.paths.<name>.pathConfig | Each attribute in this set specifies an option in the
[Path] section of the unit
|
| options/nixos/networking.supplicant | Interfaces for which to start wpa_supplicant
|
| options/nixos/services.httpd.virtualHosts.<name>.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SecureSocketWithKey | This optional key is a variant of SockPathName
|
| options/darwin/launchd.agents.<name>.command | Command executed as the service's main process.
|
| options/nixos/services.openafsServer.roles.backup.cellServDB.<name>.*.dnsname | DNS full-qualified domain name of a database server
|
| options/home-manager/programs.codex.skills | Custom skills for Codex
|
| options/nixos/containers.<name>.bindMounts.<name>.mountPoint | Mount point on the container file system.
|
| options/darwin/programs.vim.vimOptions.<name>.text | Text of the file.
|
| options/nixos/users.extraGroups.<name>.members | The user names of the group members, added to the
/etc/group file.
|
| options/nixos/services.bind.zones.<name>.master | Master=false means slave server
|
| options/nixos/services.nsd.zones.<name>.minRetrySecs | Limit retry time for secondary zones.
|
| options/nixos/services.rauc.slots.<name>.*.enable | Whether to enable this RAUC slot.
|
| options/nixos/services.writefreely.database.name | The name of the database to store data in.
|
| options/nixos/boot.initrd.systemd.users.<name>.shell | The path to the user's shell in initrd.
|
| options/nixos/boot.initrd.systemd.users.<name>.group | Group the user belongs to in initrd.
|
| options/nixos/services.homebridge.settings.bridge.name | Name of the homebridge
|
| options/nixos/systemd.slices.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.timers.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.user.timers.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.user.slices.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/home-manager/launchd.agents.<name>.config.Nice | This optional key specifies what nice(3) value should be applied to the daemon.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.enable | Whether to enable the output.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.rotate | Output rotate configuration.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.enable | Whether to enable the output.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.rotate | Output rotate configuration.
|
| options/home-manager/fonts.fontconfig.configFile.<name>.label | Label to use for the name of the config file.
|
| options/nixos/services.geth.<name>.network | The network to connect to
|
| options/home-manager/programs.floorp.profiles.<name>.containers.<name>.icon | Container icon.
|
| options/nixos/services.firewalld.settings.IPv6_rpfilter | Performs reverse path filtering (RPF) on IPv6 packets as per RFC 3704
|
| options/nixos/services.nsd.keys.<name>.keyFile | Path to the file which contains the actual base64 encoded
key
|
| options/nixos/users.extraUsers.<name>.autoSubUidGidRange | Automatically allocate subordinate user and group ids for this user
|
| options/nixos/services.h2o.hosts.<name>.tls.quic | Enables HTTP/3 over QUIC on the UDP port for TLS
|
| options/nixos/services.netbird.clients.<name>.bin.suffix | A system group name for this client instance.
|
| options/nixos/services.netbird.tunnels.<name>.bin.suffix | A system group name for this client instance.
|
| options/nixos/users.extraUsers.<name>.subGidRanges.*.count | Count of subordinate group ids
|
| options/nixos/users.extraUsers.<name>.subUidRanges.*.count | Count of subordinate user ids
|
| options/darwin/launchd.daemons.<name>.script | Shell commands executed as the service's main process.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockPathMode | This optional key specifies the mode of the socket
|
| options/home-manager/programs.ssh.matchBlocks.<name>.user | Specifies the user to log in as.
|
| options/nixos/services.etebase-server.settings.database.name | The database name.
|
| options/home-manager/programs.rclone.remotes.<name>.mounts.<name>.options | An attribute set of option values passed to rclone mount
|
| options/nixos/services.phpfpm.pools.<name>.phpEnv | Environment variables used for this PHP-FPM pool.
|
| options/nixos/services.cgit.<name>.extraConfig | These lines go to the end of cgitrc verbatim.
|
| options/nixos/systemd.services.<name>.preStop | Shell commands executed to stop the service.
|
| options/nixos/services.thanos.query.grpc-client-server-name | Server name to verify the hostname on the returned gRPC certificates
|
| options/nixos/services.i2pd.inTunnels.<name>.type | Tunnel type.
|
| options/nixos/systemd.user.slices.<name>.aliases | Aliases of that unit.
|
| options/nixos/systemd.user.timers.<name>.aliases | Aliases of that unit.
|
| options/nixos/services.redis.servers.<name>.logfile | Specify the log file name
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.filter | Interpolation method to be used for scaling the output.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.locations.<name>.index | Adds DirectoryIndex directive
|
| options/nixos/services.drupal.sites.<name>.virtualHost.locations.<name>.alias | Alias directory for requests
|
| options/home-manager/programs.floorp.profiles.<name>.containers.<name>.id | Container ID
|
| options/nixos/security.acme.certs.<name>.keyType | Key type to use for private keys
|
| options/nixos/systemd.user.targets.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/systemd.user.sockets.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/systemd.user.paths.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/systemd.sockets.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/systemd.targets.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/services.nylon.<name>.logging | Enable logging, default is no logging.
|
| options/nixos/users.users.<name>.expires | Set the date on which the user's account will no longer be
accessible
|
| options/nixos/fileSystems.<name>.enable | Whether to enable the filesystem mount.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.module | Optional PKCS#11 module name.
|
| options/nixos/hardware.alsa.cardAliases.<name>.id | The ID of the sound card
|
| options/home-manager/services.unison.pairs.<name>.roots | Pair of roots to synchronise.
|
| options/nixos/services.ax25.axports.<name>.tty | Location of hardware kiss tnc for this interface.
|
| options/nixos/boot.initrd.luks.devices.<name>.device | Path of the underlying encrypted block device.
|
| options/home-manager/launchd.agents.<name>.config.Label | This required key uniquely identifies the job to launchd.
|
| options/darwin/services.prometheus.exporters.node.listenAddress | Address where Node exporter exposes its HTTP interface
|
| options/nixos/security.acme.certs.<name>.postRun | Commands to run after new certificates go live
|
| options/nixos/services.borgbackup.jobs.<name>.startAt | When or how often the backup should run
|
| options/nixos/services.szurubooru.server.settings.name | Name shown in the website title and on the front page.
|
| options/nixos/services.nebula.networks.<name>.tun.device | Name of the tun device
|
| options/nixos/environment.etc.<name>.group | Group name of file owner
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.settings | Configuration for this host
|
| options/home-manager/programs.floorp.profiles.<name>.containers.<name>.color | Container color.
|
| options/nixos/services.i2pd.outTunnels.<name>.type | Tunnel type.
|
| options/nixos/services.rspamd.locals.<name>.text | Text of the file.
|
| options/nixos/systemd.services.<name>.wants | Start the specified units when this unit is started.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockServiceName | This optional key specifies the service on the node to connect(2) or bind(2) to.
|
| options/nixos/security.acme.certs.<name>.validMinDays | Minimum remaining validity before renewal in days.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.setEnv | Environment variables and their value to send to the server.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/systemd.timers.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/systemd.slices.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/systemd.services.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/systemd.sockets.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.targets.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.user.paths.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.user.paths.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/security.acme.certs.<name>.email | Email address for account creation and correspondence from the CA
|
| options/nixos/systemd.services.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/containers.<name>.flake | The Flake URI of the NixOS configuration to use for the container
|
| options/nixos/services.bitmagnet.settings.postgres.name | Database name to connect to
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockPassive | This optional key specifies whether listen(2) or connect(2) should be called on the created file
descriptor
|
| options/nixos/programs.ssh.knownHosts.<name>.hostNames | A list of host names and/or IP numbers used for accessing
the host's ssh service
|
| options/nixos/services.postfix.settings.master.<name>.command | A program name specifying a Postfix service/daemon process
|
| options/nixos/users.users.<name>.description | A short description of the user account, typically the
user's full name
|
| options/nixos/services.i2pd.inTunnels.<name>.keys | Keyset used for tunnel identity.
|
| options/nixos/services.phpfpm.pools.<name>.group | Group account under which this pool runs.
|
| options/nixos/services.matrix-synapse.settings.database.name | The database engine name
|
| options/nixos/services.i2pd.inTunnels.<name>.inbound.length | Guaranteed minimum hops for ‹name› tunnels.
|
| options/nixos/services.unpoller.unifi.controllers.*.hash_pii | Hash, with md5, client names and MAC addresses
|
| options/nixos/services.geth.<name>.metrics.port | Port number of Go Ethereum metrics service.
|
| options/nixos/services.geth.<name>.http.address | Listen address of Go Ethereum HTTP API.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.port | Specifies port number to connect on remote host.
|
| options/nixos/systemd.sockets.<name>.aliases | Aliases of that unit.
|
| options/nixos/systemd.targets.<name>.aliases | Aliases of that unit.
|
| options/nixos/services.pppd.peers.<name>.config | pppd configuration for this peer, see the pppd(8) man page.
|
| options/home-manager/programs.fish.binds.<name>.enable | Whether to enable enable the bind
|
| options/nixos/systemd.user.paths.<name>.pathConfig | Each attribute in this set specifies an option in the
[Path] section of the unit
|
| options/nixos/systemd.user.paths.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/services.rsync.jobs.<name>.sources | Source directories.
|
| options/home-manager/programs.firefox.profiles.<name>.containers.<name>.icon | Container icon.
|
| options/nixos/services.prosody.virtualHosts.<name>.domain | Domain name
|
| options/nixos/services.ax25.axports.<name>.baud | The serial port speed of this interface.
|
| options/darwin/launchd.user.agents.<name>.command | Command executed as the service's main process.
|
| options/nixos/services.httpd.virtualHosts.<name>.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/users.users.<name>.isNormalUser | Indicates whether this is an account for a “real” user
|
| options/nixos/systemd.user.services.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.slices.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/systemd.slices.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.timers.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.timers.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/systemd.user.timers.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.user.slices.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.primary | Whether output should be marked as primary
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.primary | Whether output should be marked as primary
|
| options/nixos/services.bacula-sd.autochanger.<name>.changerDevice | The specified name-string must be the generic SCSI device name of the
autochanger that corresponds to the normal read/write Archive Device
specified in the Device resource
|
| options/nixos/services.znapzend.zetup.<name>.destinations.<name>.dataset | Dataset name to send snapshots to.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.scale.method | Output scaling method.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.scale.method | Output scaling method.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.slot | Optional slot number of the token that stores the certificate.
|
| options/nixos/services.i2pd.outTunnels.<name>.keys | Keyset used for tunnel identity.
|
| options/nixos/power.ups.ups.<name>.directives | List of configuration directives for this UPS.
|
| options/home-manager/programs.hexchat.channels.<name>.userName | User name
|
| options/nixos/services.wyoming.piper.servers.<name>.voice | Name of the voice model to use
|
| options/nixos/services.drupal.sites.<name>.virtualHost.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/nixos/services.i2pd.outTunnels.<name>.inbound.length | Guaranteed minimum hops for ‹name› tunnels.
|
| options/nixos/services.sshguard.blacklist_file | Blacklist an attacker when its score exceeds threshold
|
| options/nixos/services.geth.<name>.authrpc.port | Port number of Go Ethereum Auth RPC API.
|
| options/nixos/services.tts.servers.<name>.useCuda | Whether to offload computation onto a CUDA compatible GPU.
|
| options/home-manager/services.podman.images.<name>.tag | FQIN of referenced Image when source is a file or directory archive.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockServiceName | This optional key specifies the service on the node to connect(2) or bind(2) to.
|
| options/nixos/power.ups.users.<name>.passwordFile | The full path to a file that contains the user's (clear text)
password
|
| options/nixos/services.k3s.autoDeployCharts.<name>.package | The packaged Helm chart
|
| options/nixos/services.bitcoind.<name>.user | The user as which to run bitcoind.
|
| options/nixos/services.geth.<name>.syncmode | Blockchain sync mode.
|
| options/nixos/services.geth.<name>.maxpeers | Maximum peers to connect to.
|
| options/nixos/services.autosuspend.checks.<name>.class | Name of the class implementing the check
|
| options/nixos/services.tahoe.nodes.<name>.tub.port | The port on which the tub will listen
|
| options/nixos/services.tahoe.nodes.<name>.web.port | The port on which the Web server will listen
|
| options/home-manager/programs.fish.binds.<name>.command | command that will be execute
|
| options/nixos/services.gvpe.nodename | GVPE node name
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockPassive | This optional key specifies whether listen(2) or connect(2) should be called on the created file
descriptor
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.extraFiles.<name>.source | Path of the source file or directory.
|
| options/home-manager/programs.firefox.profiles.<name>.containers.<name>.id | Container ID
|
| options/nixos/users.users.<name>.isSystemUser | Indicates if the user is a system user or not
|
| options/nixos/fileSystems.<name>.stratis.poolUuid | UUID of the stratis pool that the fs is located in
This is only relevant if you are using stratis.
|
| options/darwin/programs.tmux.tmuxOptions.<name>.text | Text of the file.
|
| options/nixos/systemd.nspawn.<name>.execConfig | Each attribute in this set specifies an option in the
[Exec] section of this unit
|
| options/nixos/systemd.timers.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/systemd.slices.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.extraFiles.<name>.target | Path to target relative to the vault's directory.
|
| options/nixos/systemd.user.services.<name>.preStop | Shell commands executed to stop the service.
|
| options/nixos/services.webhook.hooks.<name>.id | The ID of your hook
|
| options/nixos/containers.<name>.extraVeths.<name>.hostBridge | Put the host-side of the veth-pair into the named bridge
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockProtocol | This optional key specifies the protocol to be passed to socket(2)
|
| options/nixos/systemd.user.sockets.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/systemd.user.targets.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/systemd.services.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/users.extraUsers.<name>.packages | The set of packages that should be made available to the user
|
| options/nixos/services.gitwatch.<name>.path | The path to repo in local machine
|
| options/nixos/programs.dms-shell.plugins.<name>.src | Source of the plugin package or path
|
| options/nixos/services.drupal.sites.<name>.filesDir | The location of the Drupal files directory.
|
| options/nixos/services.stash.settings.stash_boxes.*.name | The name of the Stash Box
|
| options/home-manager/programs.gnome-terminal.profile.<name>.font | The font name, null to use system default.
|
| options/home-manager/programs.streamlink.plugins.<name>.src | Source of the custom plugin
|
| options/home-manager/programs.firefox.profiles.<name>.containers.<name>.color | Container color.
|
| options/nixos/boot.initrd.luks.devices.<name>.gpgCard | The option to use this LUKS device with a GPG encrypted luks password by the GPG Smartcard
|
| options/nixos/systemd.services.<name>.postStop | Shell commands executed after the service's main process
has exited.
|
| options/nixos/users.extraUsers.<name>.useDefaultShell | If true, the user's shell will be set to
users.defaultUserShell.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockServiceName | This optional key specifies the service on the node to connect(2) or bind(2) to.
|
| options/nixos/power.ups.users.<name>.instcmds | Let the user initiate specific instant commands
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.extraConfig | Extra lines to append to this profile's config.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.slot | Optional slot number of the token that stores the certificate.
|
| options/nixos/services.yggdrasil-jumper.retrieveListenAddresses | Automatically retrieve listen addresses from the Yggdrasil router configuration
|
| options/nixos/services.i2pd.inTunnels.<name>.inPort | Service port
|
| options/home-manager/programs.ssh.matchBlocks.<name>.sendEnv | Environment variables to send from the local host to the
server.
|
| options/home-manager/services.podman.builds.<name>.file | Path to a Containerfile which contains instructions to build the image.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockPassive | This optional key specifies whether listen(2) or connect(2) should be called on the created file
descriptor
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.index | Adds index directive.
|
| options/home-manager/xdg.desktopEntries.<name>.comment | Tooltip for the entry.
|
| options/nixos/services.librespeed.frontend.servers.*.name | Name shown in the server list.
|
| options/nixos/services.rsync.jobs.<name>.timerConfig | When to run the job.
|
| options/home-manager/services.podman.images.<name>.image | Image to pull.
|
| options/home-manager/programs.retroarch.cores.<name>.package | The ‹name› package to use.
|
| options/nixos/services.yggdrasil-jumper.appendListenAddresses | Append Yggdrasil router configuration with listeners on loopback
addresses (127.0.0.1) and preselected ports to support peering
using client-server protocols like quic and tls
|
| options/nixos/services.drupal.sites.<name>.stateDir | The location of the Drupal site state directory.
|
| options/nixos/systemd.user.services.<name>.wants | Start the specified units when this unit is started.
|
| options/home-manager/programs.fish.binds.<name>.operate | Operate on preset bindings or user bindings
|
| options/home-manager/programs.fish.binds.<name>.repaint | Whether to enable redraw prompt after command.
|
| options/home-manager/home.username | The user's username.
|
| options/nixos/services.bitcoind.<name>.port | Override the default port on which to listen for connections.
|
| options/darwin/launchd.daemons.<name>.command | Command executed as the service's main process.
|
| options/nixos/services.ndppd.proxies.<name>.ttl | Controls how long a valid or invalid entry remains in the cache, in
milliseconds.
|
| options/nixos/systemd.user.slices.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/systemd.user.targets.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.user.services.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/systemd.user.sockets.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.user.timers.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/services.awstats.configs.<name>.extraConfig | Extra configuration to be appended to awstats.${name}.conf.
|
| options/home-manager/launchd.agents.<name>.config.Debug | This optional key specifies that launchd should adjust its log mask temporarily to LOG_DEBUG while
dealing with this job.
|
| options/nixos/services.netbird.clients | Attribute set of NetBird client daemons, by default each one will:
- be manageable using dedicated tooling:
netbird-<name> script,
NetBird - netbird-<name> graphical interface when appropriate (see ui.enable),
- run as a
netbird-<name>.service,
- listen for incoming remote connections on the port
51820 (openFirewall by default),
- manage the
netbird-<name> wireguard interface,
- use the /var/lib/netbird-/config.json configuration file,
- override /var/lib/netbird-/config.json with values from /etc/netbird-/config.d/*.json,
- (
hardened) be locally manageable by netbird-<name> system group,
With following caveats:
- multiple daemons will interfere with each other's DNS resolution of
netbird.cloud, but
should remain fully operational otherwise
|
| options/nixos/services.mpd.settings | Configuration for MPD
|
| options/nixos/security.pam.services.<name>.text | Contents of the PAM service file.
|
| options/home-manager/programs.smug.projects.<name>.env | Environment Variables to set in session.
|
| options/home-manager/services.podman.machines.<name>.username | Username used in the machine image
|
| options/nixos/systemd.sockets.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.targets.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.file | Absolute path to the certificate to load
|
| options/nixos/power.ups.ups.<name>.shutdownOrder | When you have multiple UPSes on your system, you usually need to
turn them off in a certain order. upsdrvctl shuts down all the
0s, then the 1s, 2s, and so on
|
| options/nixos/systemd.services.<name>.path | Packages added to the service's PATH
environment variable
|
| options/nixos/virtualisation.qemu.drives.*.name | A name for the drive
|
| options/nixos/services.jupyter.kernels.<name>.displayName | Name that will be shown to the user.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.position | Output position
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.position | Output position
|
| options/nixos/systemd.services.<name>.preStart | Shell commands executed before the service's main process
is started.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockProtocol | This optional key specifies the protocol to be passed to socket(2)
|
| options/nixos/services.bitcoind.<name>.dataDir | The data directory for bitcoind.
|
| options/nixos/services.pgbackrest.stanzas.<name>.jobs.<name>.schedule | When or how often the backup should run
|
| options/nixos/users.extraUsers.<name>.subGidRanges.*.startGid | Start of the range of subordinate group ids that user is
allowed to use.
|
| options/nixos/users.extraUsers.<name>.subUidRanges.*.startUid | Start of the range of subordinate user ids that user is
allowed to use.
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.rsaPublicKey | Legacy RSA public key of the host in PEM format, including start and
end markers
|
| options/home-manager/programs.hexchat.channels.<name>.nickname | Primary nickname.
|
| options/nixos/services.bluemap.maps.<name>.world | Path to world folder containing the dimension to render
|
| options/nixos/services.bind.zones.<name>.masters | List of servers for inclusion in stub and secondary zones.
|
| options/nixos/services.redis.servers.<name>.bind | The IP interface to bind to.
null means "all interfaces".
|
| options/nixos/services.librenms.distributedPoller.name | Custom name of this poller.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.cgit.<name>.settings | cgit configuration, see cgitrc(5)
|
| options/nixos/services.uhub.<name>.settings | Configuration of uhub
|
| options/home-manager/launchd.agents.<name>.config.RunAtLoad | This optional key is used to control whether your job is launched once at the time the job is loaded
|
| options/nixos/systemd.user.sockets.<name>.aliases | Aliases of that unit.
|
| options/nixos/systemd.user.targets.<name>.aliases | Aliases of that unit.
|
| options/nixos/containers.<name>.extraVeths.<name>.hostAddress6 | The IPv6 address assigned to the host interface.
(Not used when hostBridge is set.)
|
| options/nixos/services.spiped.config.<name>.keyfile | Name of a file containing the spiped key
|
| options/nixos/power.ups.upsmon.monitor.<name>.system | Identifier of the UPS to monitor, in this form: <upsname>[@<hostname>[:<port>]]
See upsmon.conf for details.
|
| options/nixos/fileSystems.<name>.fsType | Type of the file system
|
| options/nixos/services.archisteamfarm.bots.<name>.username | Name of the user to log in
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.bind | Which local IP to bind the UDP socket to.
|
| options/nixos/security.pam.services.<name>.zfs | Enable unlocking and mounting of encrypted ZFS home dataset at login.
|
| options/nixos/systemd.user.slices.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.user.timers.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/systemd.user.timers.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.user.slices.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/services.tinc.networks.<name>.extraConfig | Extra lines to add to the tinc service configuration file
|
| options/home-manager/launchd.agents.<name>.config.UserName | This optional key specifies the user to run the job as
|
| options/nixos/services.phpfpm.pools.<name>.listen | The address on which to accept FastCGI requests.
|
| options/nixos/services.bitcoind.<name>.pidFile | Location of bitcoind pid file.
|
| options/nixos/systemd.paths.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/security.acme.certs.<name>.profile | The certificate profile to choose if the CA offers multiple profiles.
|
| options/nixos/services.autosuspend.wakeups.<name>.class | Name of the class implementing the check
|
| options/nixos/services.drupal.sites.<name>.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.kimai.sites.<name>.package | The kimai package to use.
|
| options/nixos/services.tahoe.nodes.<name>.package | The tahoelafs package to use.
|
| options/home-manager/services.podman.builds.<name>.authFile | Path of the authentication file.
|
| options/nixos/services.filebeat.modules.<name>.module | The name of the module
|
| options/nixos/services.syncoid.commands.<name>.source | Source ZFS dataset
|
| options/nixos/services.bacula-sd.director.<name>.tls.allowedCN | Common name attribute of allowed peer certificates
|
| options/nixos/services.bacula-fd.director.<name>.tls.allowedCN | Common name attribute of allowed peer certificates
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels | List of channels that should be grouped together into this group
|
| options/nixos/security.wrappers.<name>.group | The group of the wrapper program.
|
| options/nixos/services.bitcoind.<name>.group | The group as which to run bitcoind.
|
| options/nixos/security.wrappers.<name>.owner | The owner of the wrapper program.
|
| options/nixos/services.rke2.autoDeployCharts.<name>.package | The packaged Helm chart
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.file | Absolute path to the certificate to load
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockProtocol | This optional key specifies the protocol to be passed to socket(2)
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/systemd.services.<name>.script | Shell commands executed as the service's main process.
|
| options/nixos/systemd.user.timers.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/systemd.user.slices.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/services.asusd.auraConfigs.<name>.text | Text of the file.
|
| options/nixos/programs.neovim.runtime.<name>.text | Text of the file.
|
| options/home-manager/programs.sftpman.mounts.<name>.host | The host to connect to.
|
| options/home-manager/programs.sftpman.mounts.<name>.user | The username to authenticate with.
|
| options/home-manager/programs.sftpman.mounts.<name>.port | The port to connect to.
|
| options/home-manager/accounts.email.accounts.<name>.gpg | GPG configuration.
|
| options/nixos/systemd.units.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.paths.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/environment.etc.<name>.text | Text of the file.
|
| options/darwin/environment.etc.<name>.text | Text of the file.
|
| options/nixos/services.i2pd.inTunnels.<name>.outbound.length | Guaranteed minimum hops for ‹name› tunnels.
|
| options/nixos/services.drupal.sites.<name>.enable | Whether to enable Drupal web application.
|
| options/nixos/services.tts.servers.<name>.extraArgs | Extra arguments to pass to the server commandline.
|
| options/nixos/services.tts.servers.<name>.enable | Whether to enable Coqui TTS server.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.slot | Optional slot number of the token that stores the certificate.
|
| options/nixos/systemd.slices.<name>.sliceConfig | Each attribute in this set specifies an option in the
[Slice] section of the unit
|
| options/nixos/systemd.nspawn.<name>.filesConfig | Each attribute in this set specifies an option in the
[Files] section of this unit
|
| options/nixos/services.nsd.zones.<name>.notifyRetry | Specifies the number of retries for failed notifies
|
| options/nixos/systemd.user.services.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/services.openvpn.servers | Each attribute of this option defines a systemd service that
runs an OpenVPN instance
|
| options/nixos/systemd.sockets.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/systemd.targets.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/services.pgbackrest.stanzas.<name>.instances.<name>.host | PostgreSQL host for operating remotely.
|
| options/nixos/boot.specialFileSystems.<name>.enable | Whether to enable the filesystem mount.
|
| options/nixos/services.nix-store-gcs-proxy.<name>.enable | Whether to enable proxy for this bucket
|
| options/nixos/systemd.services.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/services.bitcoind.<name>.rpc.port | Override the default port on which to listen for JSON-RPC connections.
|
| options/nixos/systemd.user.services.<name>.postStop | Shell commands executed after the service's main process
has exited.
|
| options/nixos/services.jupyter.kernels.<name>.language | Language of the environment
|
| options/nixos/services.xserver.displayManager.lightdm.greeter.name | The name of a .desktop file in the directory specified
in the 'package' option.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/systemd.services.<name>.postStart | Shell commands executed after the service's main process
is started.
|
| options/nixos/systemd.services.<name>.reload | Shell commands executed when the service's main process
is reloaded.
|
| options/nixos/services.restic.backups.<name>.user | As which user the backup should run.
|
| options/darwin/programs.vim.vimOptions.<name>.source | Path of the source file.
|
| options/nixos/services.github-runners.<name>.runnerGroup | Name of the runner group to add this runner to (defaults to the default runner group)
|
| options/nixos/users.extraUsers.<name>.description | A short description of the user account, typically the
user's full name
|
| options/darwin/services.github-runners.<name>.runnerGroup | Name of the runner group to add this runner to (defaults to the default runner group)
|
| options/nixos/services.i2pd.outTunnels.<name>.outbound.length | Guaranteed minimum hops for ‹name› tunnels.
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.subnets | The subnets which this tinc daemon will serve
|
| options/nixos/services.authelia.instances.<name>.user | The name of the user for this authelia instance.
|
| options/nixos/services.v4l2-relayd.instances.<name>.cardLabel | The name the camera will show up as.
|
| options/nixos/security.acme.certs.<name>.extraLegoFlags | Additional global flags to pass to all lego commands.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.handle | Hex-encoded CKA_ID or handle of the certificate on a token or TPM,
respectively
|
| options/nixos/services.httpd.virtualHosts.<name>.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.errbot.instances.<name>.backend | Errbot backend name.
|
| options/home-manager/xdg.desktopEntries.<name>.actions | The set of actions made available to application launchers.
|
| options/nixos/boot.initrd.luks.devices.<name>.gpgCard.publicKey | Path to the Public Key.
|
| options/nixos/services.quicktun.<name>.privateKeyFile | Path to file containing local secret key in binary or hexadecimal form.
Not needed when services.quicktun..protocol is set to raw.
|
| options/home-manager/accounts.contact.accounts.<name>.remote.userName | User name for authentication.
|
| options/home-manager/programs.smug.projects.<name>.stop | Commands to execute after the tmux-session is destroyed.
|
| options/nixos/services.h2o.hosts.<name>.tls.policy | add will additionally listen for TLS connections. only will
disable TLS connections. force will redirect non-TLS traffic
to the TLS connection.
|
| options/nixos/services.mpd.settings.bind_to_address | The address for the daemon to listen on
|
| options/nixos/services.redis.servers.<name>.slaveOf.ip | IP of the Redis master
|
| options/home-manager/services.podman.images.<name>.certDir | Path of certificates (*.{crt,cert,key}) used to connect to registry.
|
| options/home-manager/launchd.agents.<name>.config.TimeOut | The recommended idle time out (in seconds) to pass to the job
|
| options/nixos/systemd.user.sockets.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.user.targets.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SecureSocketWithKey | This optional key is a variant of SockPathName
|
| options/nixos/systemd.user.services.<name>.path | Packages added to the service's PATH
environment variable
|
| options/nixos/systemd.paths.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/power.ups.upsmon.monitor.<name>.powerValue | Number of power supplies that the UPS feeds on this system
|
| options/nixos/security.auditd.plugins.<name>.path | This is the absolute path to the plugin executable.
|
| options/nixos/services.nginx.proxyCachePath.<name>.maxSize | Set maximum cache size
|
| options/nixos/systemd.services.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.targets.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.targets.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/systemd.sockets.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.sockets.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/services.bind.zones.<name>.extraConfig | Extra zone config to be appended at the end of the zone section.
|
| options/nixos/systemd.user.services.<name>.preStart | Shell commands executed before the service's main process
is started.
|
| options/home-manager/i18n.inputMethod.fcitx5.themes.<name>.theme | The theme.conf file of the theme
|
| options/nixos/services.sourcehut.settings."sr.ht".site-name | The name of your network of sr.ht-based sites.
|
| options/nixos/services.quicktun.<name>.tunMode | Whether to operate in tun (IP) or tap (Ethernet) mode.
|
| options/home-manager/services.podman.images.<name>.authFile | Path of the authentication file used to connect to registry.
|
| options/nixos/services.tahoe.nodes.<name>.sftpd.enable | Whether to enable SFTP service.
|
| options/nixos/services.h2o.hosts.<name>.acme.enable | Whether to ask Let’s Encrypt to sign a certificate for this
virtual host
|
| options/nixos/services.nsd.zones.<name>.maxRetrySecs | Limit retry time for secondary zones
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.slot | Which slot on the YubiKey to challenge.
|
| options/home-manager/programs.irssi.networks.<name>.type | Type of the network.
|
| options/home-manager/programs.irssi.networks.<name>.nick | Nickname in that network.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.scale | Output scale configuration
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.scale | Output scale configuration
|
| options/nixos/services.pid-fan-controller.settings.heatSources.*.name | Name of the heat source.
|
| options/nixos/users.extraUsers.<name>.expires | Set the date on which the user's account will no longer be
accessible
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.macAcl | Station MAC address -based authentication
|
| options/nixos/systemd.services.<name>.aliases | Aliases of that unit.
|
| options/home-manager/programs.obsidian.defaultSettings.cssSnippets.*.name | Name of the snippet.
|
| options/nixos/security.acme.certs.<name>.extraLegoRunFlags | Additional flags to pass to lego run.
|
| options/nixos/services.geth.<name>.authrpc.vhosts | List of virtual hostnames from which to accept requests.
|
| options/nixos/services.hans.clients.<name>.server | IP address of server running hans
|
| options/nixos/services.drupal.sites.<name>.themesDir | The location for users to install Drupal themes.
|
| options/nixos/services.nsd.zones.<name>.minRefreshSecs | Limit refresh time for secondary zones.
|
| options/nixos/services.spiped.config.<name>.maxConns | Limit on the number of simultaneous connections allowed.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.proxyJump | The proxy host to use to connect to the server.
|
| options/nixos/services.sourcehut.settings."sr.ht".owner-name | Owner's name.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/security.pam.services.<name>.rootOK | If set, root doesn't need to authenticate (e.g. for the
useradd service).
|
| options/nixos/services.tahoe.nodes.<name>.sftpd.port | The port on which the SFTP server will listen
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.handle | Hex-encoded CKA_ID or handle of the certificate on a token or TPM,
respectively
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.file | Absolute path to the certificate to load
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.claimMaps.<name>.joinType | Determines how multiple values are joined to create the claim value
|
| options/nixos/systemd.user.paths.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/systemd.targets.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/systemd.sockets.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/services.bind.zones.<name>.allowQuery | List of address ranges allowed to query this zone
|
| options/nixos/boot.specialFileSystems.<name>.fsType | Type of the file system
|
| options/nixos/systemd.timers.<name>.timerConfig | Each attribute in this set specifies an option in the
[Timer] section of the unit
|
| options/home-manager/home.file.<name>.executable | Set the execute bit
|
| options/nixos/security.pam.services.<name>.showMotd | Whether to show the message of the day.
|
| options/nixos/services.blockbook-frontend.<name>.user | The user as which to run blockbook-frontend-‹name›.
|
| options/nixos/services.inadyn.settings.custom.<name>.ddns-server | DDNS server name.
|
| options/nixos/services.prometheus.exporters.rtl_433.ids.*.name | Name to match.
|
| options/nixos/systemd.user.paths.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.user.units.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/boot.loader.grub.users.<name>.password | Specifies the clear text password for the account
|
| options/nixos/fileSystems.<name>.encrypted.blkDev | Location of the backing encrypted device.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SecureSocketWithKey | This optional key is a variant of SockPathName
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites.<name>.settings | Settings for this site
|
| options/nixos/services.cgit.<name>.nginx.location | Location to serve cgit under.
|
| options/nixos/services.rspamd.locals.<name>.source | Path of the source file.
|
| options/nixos/services.rauc.slots.<name>.*.settings | Settings for this slot.
|
| options/nixos/services.spiped.config.<name>.target | Address to which spiped should connect.
|
| options/home-manager/services.podman.builds.<name>.labels | The labels to apply to the build.
|
| options/home-manager/programs.librewolf.profiles.<name>.containers.<name>.icon | Container icon.
|
| options/nixos/services.inadyn.settings.custom.<name>.hostname | Hostname alias(es).
|
| options/nixos/services.inadyn.settings.custom.<name>.username | Username for this DDNS provider.
|
| options/nixos/services.bacula-sd.director.<name>.tls.enable | Specifies if TLS should be enabled
|
| options/nixos/services.bacula-fd.director.<name>.tls.enable | Specifies if TLS should be enabled
|
| options/nixos/services.nginx.virtualHosts.<name>.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.geth.<name>.metrics.enable | Whether to enable Go Ethereum prometheus metrics.
|
| options/nixos/services.bitcoind.<name>.rpc.users | RPC user information for JSON-RPC connections.
|
| options/nixos/services.redis.servers.<name>.slaveOf | IP and port to which this redis instance acts as a slave.
|
| options/nixos/systemd.user.services.<name>.script | Shell commands executed as the service's main process.
|
| options/home-manager/services.podman.volumes.<name>.user | The user ID owning the volume inside the container.
|
| options/nixos/services.nbd.server.exports.<name>.path | File or block device to export.
|
| options/home-manager/programs.thunderbird.profiles.<name>.accountsOrder | Custom ordering of accounts and local folders in
Thunderbird's folder pane
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites.<name>.manifestUrl | URL of the site's web app manifest.
|
| options/nixos/services.authelia.instances.<name>.group | The name of the group for this authelia instance.
|
| options/nixos/services.ndppd.proxies.<name>.interface | Listen for any Neighbor Solicitation messages on this interface,
and respond to them according to a set of rules
|
| options/nixos/services.redis.servers.<name>.port | The TCP port to accept connections
|
| options/nixos/systemd.user.slices.<name>.sliceConfig | Each attribute in this set specifies an option in the
[Slice] section of the unit
|
| options/nixos/services.i2pd.inTunnels.<name>.inbound.quantity | Number of simultaneous ‹name› tunnels.
|
| options/nixos/services.bitcoind.<name>.dbCache | Override the default database cache size in MiB.
|
| options/nixos/security.pam.services.<name>.oathAuth | If set, the OATH Toolkit will be used.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.locations.<name>.index | Adds DirectoryIndex directive
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.locations.<name>.alias | Alias directory for requests
|
| options/nixos/environment.etc.<name>.gid | GID of created file
|
| options/nixos/environment.etc.<name>.uid | UID of created file
|
| options/nixos/systemd.user.targets.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/systemd.user.sockets.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/systemd.network.links.<name>.enable | Whether to enable this .link unit
|
| options/nixos/systemd.user.services.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/services.ax25.axports.<name>.window | Default window size for this interface.
|
| options/nixos/services.uhub.<name>.plugins.*.plugin | Path to plugin file.
|
| options/home-manager/accounts.email.accounts.<name>.jmap | The JMAP configuration to use for this account.
|
| options/home-manager/accounts.email.accounts.<name>.smtp | The SMTP configuration to use for this account.
|
| options/home-manager/accounts.email.accounts.<name>.imap | The IMAP configuration to use for this account.
|
| options/nixos/boot.initrd.systemd.contents.<name>.text | Text of the file.
|
| options/home-manager/programs.librewolf.profiles.<name>.containers.<name>.id | Container ID
|
| options/nixos/services.h2o.hosts.<name>.tls.identity | Key / certificate pairs for the virtual host.
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.zsk | Key policy for zone signing keys
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.ksk | Key policy for key signing keys
|
| options/nixos/services.geth.<name>.authrpc.enable | Whether to enable Go Ethereum Auth RPC API.
|
| options/nixos/systemd.user.services.<name>.postStart | Shell commands executed after the service's main process
is started.
|
| options/nixos/systemd.user.services.<name>.reload | Shell commands executed when the service's main process
is reloaded.
|
| options/home-manager/services.podman.volumes.<name>.type | Filesystem type of Device. (used as -t in mount commands)
|
| options/home-manager/launchd.agents.<name>.config.Umask | This optional key specifies what value should be passed to umask(2) before running the job
|
| options/home-manager/programs.hexchat.channels.<name>.nickname2 | Secondary nickname.
|
| options/nixos/systemd.slices.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/systemd.timers.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/services.drupal.sites.<name>.package | The drupal package to use.
|
| options/nixos/services.neo4j.ssl.policies.<name>.privateKey | The name of private PKCS #8 key file for this policy to be found
in the baseDirectory, or the absolute path to
the key file
|
| options/nixos/services.openvpn.servers.<name>.authUserPass.username | The username to store inside the credentials file.
|
| options/nixos/services.i2pd.outTunnels.<name>.inbound.quantity | Number of simultaneous ‹name› tunnels.
|
| options/nixos/systemd.paths.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/security.acme.certs.<name>.server | ACME Directory Resource URI
|
| options/nixos/security.wrappers.<name>.enable | Whether to enable the wrapper.
|
| options/nixos/services.quicktun.<name>.localPort | Local UDP port.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SecureSocketWithKey | This optional key is a variant of SockPathName
|
| options/home-manager/launchd.agents.<name>.config.WatchPaths | This optional key causes the job to be started if any one of the listed paths are modified.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.host | Host pattern used by this conditional block
|
| options/nixos/users.extraUsers.<name>.isNormalUser | Indicates whether this is an account for a “real” user
|
| options/nixos/power.ups.ups.<name>.description | Description of the UPS.
|
| options/nixos/systemd.user.paths.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/home-manager/launchd.agents.<name>.config.ExitTimeOut | The amount of time launchd waits before sending a SIGKILL signal
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites.<name>.desktopEntry.icon | Icon to display in file manager, menus, etc.
|
| options/nixos/services.redis.servers.<name>.slaveOf.port | port of the Redis master
|
| options/home-manager/accounts.email.accounts.<name>.imap.tls | Configuration for secure connections.
|
| options/home-manager/accounts.email.accounts.<name>.smtp.tls | Configuration for secure connections.
|
| options/nixos/services.ax25.axports.<name>.enable | Whether to enable Enables the axport interface.
|
| options/nixos/services.ax25.axports.<name>.paclen | Default maximum packet size for this interface.
|
| options/nixos/systemd.paths.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.units.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/security.acme.certs.<name>.enableDebugLogs | Whether to enable debug logging for this certificate.
|
| options/nixos/services.openvpn.servers.<name>.up | Shell commands executed when the instance is starting.
|
| options/nixos/services.nix-store-gcs-proxy.<name>.address | The address of the proxy.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.transform | Refer to
xrandr(1)
for the documentation of the transform matrix.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.transform | Refer to
xrandr(1)
for the documentation of the transform matrix.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/systemd.user.sockets.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.user.sockets.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/systemd.user.targets.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.user.targets.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/systemd.user.services.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/darwin/programs.vim.vimOptions.<name>.enable | Whether this file should be generated
|
| options/home-manager/programs.sftpman.mounts.<name>.sshKey | Path to the SSH key to use for authentication
|
| options/home-manager/services.podman.volumes.<name>.copy | Copy content of the image located at the mountpoint of the volume on first run.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.borgbackup.jobs.<name>.dateFormat | Arguments passed to date
to create a timestamp suffix for the archive name.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.znapzend.zetup.<name>.destinations.<name>.host | Host to use for the destination dataset
|
| options/home-manager/programs.librewolf.profiles.<name>.containers.<name>.color | Container color.
|
| options/nixos/services.kimai.sites.<name>.poolConfig | Options for the Kimai PHP pool
|
| options/nixos/services.rsync.jobs.<name>.inhibit | Run the rsync process with an inhibition lock taken;
see systemd-inhibit(1) for a list of possible operations.
|
| options/nixos/services.homebridge.settings.platforms.*.name | Name of the platform
|
| options/nixos/systemd.nspawn.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.timers.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.slices.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/home-manager/programs.gemini-cli.commands.<name>.prompt | The prompt that will be sent to the Gemini model when the command is executed
|
| options/nixos/services.fedimintd.<name>.ui.bind | Address to bind on for UI connections
|
| options/nixos/services.jupyter.kernels.<name>.env | Environment variables to set for the kernel.
|
| options/nixos/services.redis.servers.<name>.syslog | Enable logging to the system logger.
|
| options/nixos/services.redis.servers.<name>.enable | Whether to enable Redis server.
|
| options/nixos/services.rspamd.workers.<name>.count | Number of worker instances to run
|
| options/nixos/services.nginx.virtualHosts.<name>.root | The path of the web root directory.
|
| options/nixos/services.nebula.networks.<name>.ca | Path to the certificate authority certificate.
|
| options/nixos/users.users.<name>.linger | Whether to enable or disable lingering for this user
|
| options/home-manager/xdg.dataFile.<name>.executable | Set the execute bit
|
| options/home-manager/programs.ssh.matchBlocks.<name>.checkHostIP | Check the host IP address in the
known_hosts file.
|
| options/nixos/services.blockbook-frontend.<name>.dataDir | Location of blockbook-frontend-‹name› data directory.
|
| options/nixos/users.extraUsers.<name>.isSystemUser | Indicates if the user is a system user or not
|
| options/nixos/services.tarsnap.archives.<name>.printStats | Print global archive statistics upon completion
|
| options/nixos/services.netbird.clients.<name>.suffixedName | A systemd service name to use (without .service suffix).
|
| options/nixos/services.netbird.tunnels.<name>.suffixedName | A systemd service name to use (without .service suffix).
|
| options/nixos/services.cjdns.UDPInterface.connectTo.<name>.login | (optional) name your peer has for you
|
| options/nixos/services.cjdns.ETHInterface.connectTo.<name>.login | (optional) name your peer has for you
|
| options/nixos/services.gitwatch.<name>.enable | Whether to enable watching for repo.
|
| options/nixos/services.gitwatch.<name>.remote | Optional url of remote repository
|
| options/nixos/security.wrappers.<name>.source | The absolute path to the program to be wrapped.
|
| options/nixos/services.gitwatch.<name>.branch | Optional branch in remote repository
|
| options/nixos/services.bitcoind.<name>.enable | Whether to enable Bitcoin daemon.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.handle | Hex-encoded CKA_ID or handle of the certificate on a token or TPM,
respectively
|
| options/nixos/services.nsd.keys.<name>.algorithm | Authentication algorithm for this key.
|
| options/darwin/programs.tmux.tmuxOptions.<name>.source | Path of the source file.
|
| options/home-manager/programs.sftpman.mounts.<name>.authType | The authentication method to use.
|
| options/nixos/users.mysql.pam.userColumn | The name of the column that contains a unix login name.
|
| options/nixos/systemd.services.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/services.blockbook-frontend.<name>.group | The group as which to run blockbook-frontend-‹name›.
|
| options/home-manager/programs.streamlink.plugins.<name>.settings | Configuration for the specific plugin, written to
$XDG_CONFIG_HOME/streamlink/config. (linux) or
Library/Application Support/streamlink/config. (darwin).
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.settings | Extra configuration options to put at the end of this BSS's defintion in the
hostapd.conf for the associated interface
|
| options/nixos/services.redis.servers.<name>.slowLogMaxLen | Maximum number of items to keep in slow log.
|
| options/home-manager/accounts.email.accounts.<name>.gpg.key | The key to use as listed in gpg --list-keys.
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey | The options to use for this LUKS device in YubiKey-PBA
|
| options/home-manager/launchd.agents.<name>.config.StartOnMount | This optional key causes the job to be started every time a filesystem is mounted.
|
| options/nixos/services.acpid.handlers.<name>.event | Event type.
|
| options/nixos/systemd.user.services.<name>.aliases | Aliases of that unit.
|
| options/nixos/services.borgbackup.jobs.<name>.wrapper | Name of the wrapper that is installed into PATH
|
| options/nixos/services.phpfpm.pools.<name>.socket | Path to the unix socket file on which to accept FastCGI requests.
This option is read-only and managed by NixOS.
|
| options/nixos/systemd.user.targets.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/systemd.user.sockets.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/systemd.user.timers.<name>.timerConfig | Each attribute in this set specifies an option in the
[Timer] section of the unit
|
| options/nixos/networking.networkmanager.ensureProfiles.profiles.<name>.connection.type | The connection type defines the connection kind, like vpn, wireguard, gsm, wifi and more.
|
| options/nixos/services.fedimintd.<name>.ui.port | TCP Port to bind on for UI connections
|
| options/nixos/services.keepalived.vrrpScripts.<name>.user | Name of user to run the script under.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.actors.<name>.type | The account type
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.claimMaps.<name>.valuesByGroup | Maps kanidm groups to values for the claim.
|
| options/nixos/security.pam.services.<name>.otpwAuth | If set, the OTPW system will be used (if
~/.otpw exists).
|
| options/home-manager/programs.smug.projects.<name>.root | Root path in filesystem of the smug project
|
| options/nixos/containers.<name>.extraVeths.<name>.forwardPorts.*.hostPort | Source port of the external interface on host
|
| options/nixos/security.acme.certs.<name>.listenHTTP | Interface and port to listen on to solve HTTP challenges
in the form [INTERFACE]:PORT
|
| options/home-manager/accounts.calendar.accounts.<name>.remote.userName | User name for authentication.
|
| options/nixos/services.xserver.xkb.extraLayouts.<name>.typesFile | The path to the xkb types file
|
| options/nixos/services.borgbackup.jobs.<name>.postCreate | Shell commands to run after borg create
|
| options/nixos/security.pam.services.<name>.enable | Whether to enable this PAM service.
|
| options/nixos/services.nebula.networks.<name>.key | Path or reference to the host key.
|
| options/nixos/systemd.network.links.<name>.extraConfig | Extra configuration append to unit
|
| options/nixos/systemd.timers.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/systemd.slices.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/services.fedimintd.<name>.p2p.url | Public address for p2p connections from peers (if TCP is used)
|
| options/home-manager/services.podman.builds.<name>.autoStart | Whether to start the build on boot
|
| options/home-manager/services.podman.images.<name>.autoStart | Whether to pull the image on boot
|
| options/nixos/services.bacula-sd.device.<name>.mediaType | The specified name-string names the type of media supported by this
device, for example, DLT7000
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/nixos/services.rspamd.workers.<name>.type | The type of this worker
|
| options/nixos/services.netbird.clients.<name>.interface | Name of the network interface managed by this client.
|
| options/nixos/services.netbird.tunnels.<name>.interface | Name of the network interface managed by this client.
|
| options/nixos/programs.dms-shell.plugins.<name>.enable | Whether to enable this plugin
|
| options/nixos/services.awstats.configs.<name>.type | The type of log being collected.
|
| options/nixos/boot.loader.systemd-boot.windows.<name>.title | The title of the boot menu entry.
|
| options/nixos/services.tahoe.nodes.<name>.helper.enable | Whether to enable helper service.
|
| options/nixos/services.openssh.knownHosts.<name>.hostNames | A list of host names and/or IP numbers used for accessing
the host's ssh service
|
| options/nixos/services.ndppd.proxies.<name>.router | Turns on or off the router flag for Neighbor Advertisement Messages.
|
| options/home-manager/services.podman.volumes.<name>.group | The group ID owning the volume inside the container.
|
| options/darwin/launchd.agents.<name>.serviceConfig | Each attribute in this set specifies an option for a key in the plist.
https://developer.apple.com/legacy/library/documentation/Darwin/Reference/ManPages/man5/launchd.plist.5.html
|
| options/nixos/security.pam.services.<name>.unixAuth | Whether users can log in with passwords defined in
/etc/shadow.
|
| options/nixos/services.redis.servers.<name>.logLevel | Specify the server verbosity level, options: debug, verbose, notice, warning.
|
| options/nixos/services.sympa.settingsFile.<name>.text | Text of the file.
|
| options/home-manager/programs.floorp.profiles.<name>.path | Profile path.
|
| options/nixos/security.acme.certs.<name>.ocspMustStaple | Turns on the OCSP Must-Staple TLS extension
|
| options/home-manager/services.activitywatch.watchers.<name>.settingsFilename | The filename of the generated settings file
|
| options/home-manager/accounts.email.accounts.<name>.imap.host | Hostname of IMAP server.
|
| options/home-manager/accounts.email.accounts.<name>.smtp.host | Hostname of SMTP server.
|
| options/nixos/services.dokuwiki.sites.<name>.acl.*.page | Page or namespace to restrict
|
| options/nixos/services.drupal.sites.<name>.configSyncDir | The location of the Drupal config sync directory.
|
| options/nixos/security.wrappers.<name>.setuid | Whether to add the setuid bit the wrapper program.
|
| options/nixos/security.wrappers.<name>.setgid | Whether to add the setgid bit the wrapper program.
|
| options/nixos/services.ghostunnel.servers.<name>.allowCN | Allow client if common name appears in the list.
|
| options/nixos/systemd.user.slices.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/systemd.user.timers.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/services.nsd.zones.<name>.provideXFR | Allow these IPs and TSIG to transfer zones, addr TSIG|NOKEY|BLOCKED
address range 192.0.2.0/24, 1.2.3.4&255.255.0.0, 3.0.2.20-3.0.2.40
|
| options/nixos/services.cjdns.ETHInterface.connectTo.<name>.peerName | (optional) human-readable name for peer
|
| options/nixos/services.cjdns.UDPInterface.connectTo.<name>.peerName | (optional) human-readable name for peer
|
| options/nixos/services.jupyter.kernels.<name>.argv | Command and arguments to start the kernel.
|
| options/nixos/services.bacula-sd.director.<name>.tls | TLS Options for the Director in this Configuration.
|
| options/nixos/services.bepasty.servers.<name>.bind | Bind address to be used for this server.
|
| options/nixos/services.bacula-fd.director.<name>.tls | TLS Options for the Director in this Configuration.
|
| options/nixos/services.netbird.tunnels.<name>.port | Port the NetBird client listens on.
|
| options/nixos/services.netbird.clients.<name>.port | Port the NetBird client listens on.
|
| options/home-manager/i18n.inputMethod.fcitx5.themes.<name>.panelImage | Path to the SVG of the panel.
|
| options/nixos/services.beesd.filesystems.<name>.workDir | Name (relative to the root of the filesystem) of the subvolume where
the hash table will be stored.
|
| options/home-manager/xdg.desktopEntries.<name>.terminal | Whether the program runs in a terminal window.
|
| options/home-manager/xdg.desktopEntries.<name>.noDisplay | Means "this application exists, but don't display it in the menus"
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.hotkeys.<name>.*.modifiers | The hotkey modifiers.
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.subnets.*.weight | Indicates the priority over identical Subnets owned by different nodes
|
| options/nixos/services.iodine.clients.<name>.relay | DNS server to use as an intermediate relay to the iodined server
|
| options/nixos/systemd.user.paths.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/home-manager/services.podman.volumes.<name>.image | Specifies the image the volume is based on when Driver is set to the image.
|
| options/home-manager/programs.floorp.profiles.<name>.id | Profile ID
|
| options/nixos/services.public-inbox.inboxes.<name>.newsgroup | NNTP group name for the inbox.
|
| options/nixos/services.headscale.settings.database.postgres.name | Database name.
|
| options/nixos/systemd.services.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/services.dovecot2.imapsieve.mailbox.*.name | This setting configures the name of a mailbox for which administrator scripts are configured
|
| options/nixos/systemd.user.units.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.user.paths.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/services.geth.<name>.websocket.apis | APIs to enable over WebSocket
|
| options/nixos/services.nebula.networks.<name>.cert | Path to the host certificate.
|
| options/nixos/services.ax25.axports.<name>.kissParams | Kissattach parameters for this interface.
|
| options/home-manager/accounts.email.accounts.<name>.meli.mailboxAliases | Folder display name
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.settings.<name>.force | Forcibly override any existing configuration for
this extension.
|
| options/nixos/systemd.user.slices.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.user.timers.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/services.anubis.instances.<name>.settings.BIND | The address that Anubis listens to
|
| options/nixos/services.ghostunnel.servers.<name>.allowOU | Allow client if organizational unit name appears in the list.
|
| options/nixos/environment.etc.<name>.mode | If set to something else than symlink,
the file is copied instead of symlinked, with the given
file mode.
|
| options/nixos/systemd.paths.<name>.requisite | Similar to requires
|
| options/nixos/services.keyd.keyboards.<name>.ids | Device identifiers, as shown by keyd(1).
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.fwmark | If given, sets the SO_MARK option on the TCP socket.
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.fwmark | If given, sets the SO_MARK option on the TCP socket.
|
| options/home-manager/services.podman.builds.<name>.tlsVerify | Require HTTPS and verification of certificates when contacting registries.
|
| options/home-manager/services.podman.images.<name>.tlsVerify | Require HTTPS and verification of certificates when contacting registries.
|
| options/nixos/services.namecoind.rpc.user | User name for RPC connections.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.visibleName | The profile name.
|
| options/nixos/services.httpd.virtualHosts.<name>.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/nixos/security.pam.services.<name>.pamMount | Enable PAM mount (pam_mount) system to mount filesystems on user login.
|
| options/nixos/openstack.zfs.datasets.<name>.mount | Where to mount this dataset.
|
| options/nixos/boot.initrd.luks.devices.<name>.gpgCard.gracePeriod | Time in seconds to wait for the GPG Smartcard.
|
| options/nixos/services.drupal.sites.<name>.modulesDir | The location for users to install Drupal modules.
|
| options/nixos/security.acme.certs.<name>.extraLegoRenewFlags | Additional flags to pass to lego renew.
|
| options/nixos/services.i2pd.inTunnels.<name>.accessList | I2P nodes that are allowed to connect to this service.
|
| options/nixos/services.openvpn.servers.<name>.down | Shell commands executed when the instance is shutting down.
|
| options/nixos/services.public-inbox.inboxes.<name>.url | URL where this inbox can be accessed over HTTP.
|
| options/nixos/systemd.network.networks.<name>.DHCP | Whether to enable DHCP on the interfaces matched.
|
| options/nixos/services.r53-ddns.hostname | Manually specify the hostname
|
| options/nixos/services.awstats.configs.<name>.webService.hostname | The hostname the web service appears under.
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites.<name>.desktopEntry.enable | Whether to enable the desktop entry for this site.
|
| options/nixos/services.i2pd.inTunnels.<name>.outbound.quantity | Number of simultaneous ‹name› tunnels.
|
| options/nixos/systemd.user.services.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/networking.ucarp.upscript | Command to run after become master, the interface name, virtual address
and optional extra parameters are passed as arguments.
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.subnets.*.prefixLength | The prefix length of the subnet
|
| options/nixos/boot.initrd.luks.devices.<name>.keyFileTimeout | The amount of time in seconds for a keyFile to appear before
timing out and trying passwords.
|
| options/nixos/services.fedimintd.<name>.p2p.port | Port to bind on for p2p connections from peers (both TCP and UDP)
|
| options/nixos/services.fedimintd.<name>.p2p.bind | Address to bind on for p2p connections from peers (both TCP and UDP)
|
| options/nixos/containers.<name>.extraVeths.<name>.forwardPorts | List of forwarded ports from host to container
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.ksk.keySize | Key size in bits
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.zsk.keySize | Key size in bits
|
| options/home-manager/xdg.cacheFile.<name>.executable | Set the execute bit
|
| options/home-manager/xdg.stateFile.<name>.executable | Set the execute bit
|
| options/nixos/services.rspamd.locals.<name>.enable | Whether this file locals should be generated
|
| options/home-manager/programs.ssh.matchBlocks.<name>.match | Match block conditions used by this block
|
| options/nixos/services.httpd.virtualHosts.<name>.hostName | Canonical hostname for the server.
|
| options/nixos/services.asusd.auraConfigs.<name>.source | Path of the source file.
|
| options/nixos/programs.neovim.runtime.<name>.source | Path of the source file.
|
| options/nixos/services.caddy.virtualHosts.<name>.hostName | Canonical hostname for the server.
|
| options/nixos/services.rss2email.feeds.<name>.url | The URL at which to fetch the feed.
|
| options/nixos/services.redis.servers.<name>.unixSocket | The path to the socket to bind to.
|
| options/home-manager/services.podman.volumes.<name>.driver | The volume driver to use.
|
| options/home-manager/services.podman.volumes.<name>.labels | The labels to apply to the volume.
|
| options/nixos/security.auditd.plugins.<name>.args | This allows you to pass arguments to the child program
|
| options/nixos/services.sympa.domains.<name>.webHost | Domain part of the web interface URL (no web interface for this domain if null)
|
| options/nixos/systemd.services.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/systemd.services.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.actors.<name>.email | The email address used to authenticate as this account
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.slick.font.name | Name of the font to use.
|
| options/nixos/services.geth.<name>.metrics.address | Listen address of Go Ethereum metrics service.
|
| options/nixos/services.drupal.sites.<name>.phpOptions | Options for PHP's php.ini file for this Drupal site.
|
| options/nixos/services.nginx.proxyCachePath.<name>.enable | Whether to enable this proxy cache path entry.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.gtk.theme.name | Name of the theme to use for the lightdm-gtk-greeter.
|
| options/nixos/services.quicktun.<name>.upScript | Run specified command or script after the tunnel device has been opened.
|
| options/nixos/systemd.slices.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/systemd.timers.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/services.i2pd.outTunnels.<name>.outbound.quantity | Number of simultaneous ‹name› tunnels.
|
| options/nixos/services.kubernetes.kubelet.taints.<name>.key | Key of taint.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.auth.<name>.adapter | The auth adapter type
|
| options/nixos/systemd.network.links.<name>.linkConfig | Each attribute in this set specifies an option in the
[Link] section of the unit
|
| options/nixos/systemd.user.timers.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/systemd.user.slices.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/environment.etc.<name>.source | Path of the source file.
|
| options/nixos/services.quicktun.<name>.remotePort | Remote UDP port
|
| options/darwin/environment.etc.<name>.source | Path of the source file.
|
| options/nixos/services.ghostunnel.servers.<name>.allowURI | Allow client if URI subject alternative name appears in the list.
|
| options/nixos/services.ghostunnel.servers.<name>.allowDNS | Allow client if DNS subject alternative name appears in the list.
|
| options/nixos/services.openafsServer.cellServDB.<name>.*.ip | IP Address of a database server
|
| options/nixos/services.openafsClient.cellServDB.<name>.*.ip | IP Address of a database server
|
| options/nixos/services.nginx.proxyCachePath.<name>.keysZoneSize | Set size to shared memory zone.
|
| options/nixos/boot.initrd.luks.devices.<name>.keyFileSize | The size of the key file
|
| options/nixos/services.kanidm.provision.persons.<name>.legalName | Full legal name
|
| options/darwin/programs.tmux.tmuxOptions.<name>.enable | Whether this file should be generated
|
| options/nixos/services.kimai.sites.<name>.database.user | Database user.
|
| options/home-manager/launchd.agents.<name>.config.GroupName | This optional key specifies the group to run the job as
|
| options/nixos/systemd.services.<name>.startAt | Automatically start this unit at the given date/time, which
must be in the format described in
systemd.time(7)
|
| options/nixos/services.fedimintd.<name>.api.url | Public URL of the API address of the reverse proxy/tls terminator
|
| options/nixos/services.drupal.sites.<name>.poolConfig | Options for the Drupal PHP pool
|
| options/nixos/systemd.timers.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.slices.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/services.bacula-sd.director.<name>.tls.require | Require TLS or TLS-PSK encryption
|
| options/nixos/services.bacula-fd.director.<name>.tls.require | Require TLS or TLS-PSK encryption
|
| options/home-manager/home.file.<name>.recursive | If the file source is a directory, then this option
determines whether the directory should be recursively
linked to the target location
|
| options/nixos/services.bird-lg.frontend.nameFilter | Protocol names to hide in summary tables (RE2 syntax),
|
| options/nixos/services.hans.clients.<name>.extraConfig | Additional command line parameters
|
| options/nixos/services.dokuwiki.sites.<name>.stateDir | Location of the DokuWiki state directory.
|
| options/nixos/services.iodine.clients.<name>.server | Hostname of server running iodined
|
| options/nixos/services.restic.backups.<name>.checkOpts | A list of options for 'restic check'.
|
| options/nixos/services.rspamd.workers.<name>.enable | Whether to run the rspamd worker.
|
| options/home-manager/services.podman.volumes.<name>.device | The path of a device which is mounted for the volume.
|
| options/home-manager/services.podman.volumes.<name>.autoStart | Whether to create the volume on boot.
|
| options/nixos/services.znapzend.zetup.<name>.destinations.<name>.plan | The znapzend backup plan to use for the source
|
| options/nixos/services.kimai.sites.<name>.settings | Structural Kimai's local.yaml configuration
|
| options/nixos/services.geth.<name>.authrpc.address | Listen address of Go Ethereum Auth RPC API.
|
| options/nixos/services.restic.backups.<name>.runCheck | Whether to run the check command with the provided checkOpts options.
|
| options/nixos/services.phpfpm.pools.<name>.phpPackage | The PHP package to use for running this PHP-FPM pool.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig | Each attribute in this set specifies an option for a key in the plist.
https://developer.apple.com/legacy/library/documentation/Darwin/Reference/ManPages/man5/launchd.plist.5.html
|
| options/nixos/services.ax25.axports.<name>.package | The ax25-tools package to use.
|
| options/nixos/services.nylon.<name>.verbosity | Enable verbose output, default is to not be verbose.
|
| options/nixos/systemd.services.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/hardware.alsa.controls.<name>.maxVolume | The maximum volume in dB.
|
| options/nixos/services.hostapd.radios.<name>.noScan | Disables scan for overlapping BSSs in HT40+/- mode
|
| options/nixos/security.pam.services.<name>.p11Auth | If set, keys listed in
~/.ssh/authorized_keys and
~/.eid/authorized_certificates
can be used to log in with the associated PKCS#11 tokens.
|
| options/nixos/services.xserver.xkb.extraLayouts.<name>.compatFile | The path to the xkb compat file
|
| options/nixos/fileSystems.<name>.label | Label of the device
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.geth.<name>.websocket.port | Port number of Go Ethereum WebSocket API.
|
| options/nixos/services.yandex-disk.username | Your yandex.com login name.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/containers.<name>.extraVeths.<name>.localAddress6 | The IPv6 address assigned to the interface in the container
|
| options/nixos/systemd.sockets.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/systemd.targets.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/services.kimai.sites.<name>.database.host | Database host address.
|
| options/nixos/services.kimai.sites.<name>.database.port | Database host port.
|
| options/nixos/services.fedimintd.<name>.api.bind | Address to bind on for API connections relied by the reverse proxy/tls terminator.
|
| options/nixos/services.fedimintd.<name>.api.port | Port to bind on for API connections relied by the reverse proxy/tls terminator.
|
| options/home-manager/programs.gradle.initScripts.<name>.text | Text of the init script file. if this option is null
then source must be set.
|
| options/nixos/security.acme.certs.<name>.webroot | Where the webroot of the HTTP vhost is located.
.well-known/acme-challenge/ directory
will be created below the webroot if it doesn't exist.
http://example.org/.well-known/acme-challenge/ must also
be available (notice unencrypted HTTP).
|
| options/nixos/services.keepalived.vrrpScripts.<name>.group | Name of group to run the script under
|
| options/nixos/services.rsync.jobs.<name>.settings | Settings that should be passed to rsync via long options
|
| options/nixos/services.h2o.hosts.<name>.settings | Attrset to be transformed into YAML for host config
|
| options/nixos/boot.initrd.luks.devices.<name>.fido2.gracePeriod | Time in seconds to wait for the FIDO2 key.
|
| options/nixos/services.bitcoind.<name>.package | The bitcoind package to use.
|
| options/nixos/services.tahoe.nodes.<name>.client.helper | The furl for a Tahoe helper node
|
| options/nixos/security.auditd.plugins.<name>.active | Whether to enable Whether to enable this plugin.
|
| options/nixos/services.dokuwiki.sites.<name>.acl.*.actor | User or group to restrict
|
| options/nixos/services.bepasty.servers.<name>.dataDir | Path to the directory where the pastes will be saved to
|
| options/nixos/services.h2o.hosts.<name>.serverAliases | Additional names of virtual hosts served by this virtual host
configuration.
|
| options/nixos/security.acme.certs.<name>.extraDomainNames | A list of extra domain names, which are included in the one certificate to be issued.
|
| options/nixos/systemd.user.services.<name>.upholds | Keeps the specified running while this unit is running
|
| options/darwin/launchd.agents.<name>.serviceConfig.Nice | This optional key specifies what nice(3) value should be applied to the daemon.
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.settings.<name>.force | Forcibly override any existing configuration for
this extension.
|
| options/nixos/systemd.user.paths.<name>.requisite | Similar to requires
|
| options/nixos/security.pam.services.<name>.limits.*.type | Type of this limit
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.enso.theme.name | Name of the theme to use for the lightdm-enso-os-greeter
|
| options/home-manager/accounts.email.accounts.<name>.imap.port | The port on which the IMAP server listens
|
| options/home-manager/accounts.email.accounts.<name>.smtp.port | The port on which the SMTP server listens
|
| options/nixos/services.tahoe.introducers.<name>.nickname | The nickname of this Tahoe introducer.
|
| options/home-manager/programs.i3status-rust.bars.<name>.theme | The theme to use
|
| options/nixos/services.bitcoind.<name>.configFile | The configuration file path to supply bitcoind.
|
| options/nixos/services.tor.relay.onionServices.<name>.map | See torrc manual.
|
| options/nixos/systemd.nspawn.<name>.networkConfig | Each attribute in this set specifies an option in the
[Network] section of this unit
|
| options/nixos/systemd.sockets.<name>.socketConfig | Each attribute in this set specifies an option in the
[Socket] section of the unit
|
| options/nixos/security.pam.services.<name>.mysqlAuth | If set, the pam_mysql module will be used to
authenticate users against a MySQL/MariaDB database.
|
| options/nixos/services.nghttpx.backends.*.params.dns | Name resolution of a backends host name is done at start up,
or configuration reload
|
| options/nixos/services.logcheck.ignore.<name>.level | Set the logcheck level.
|
| options/nixos/services.sanoid.datasets.<name>.daily | Number of daily snapshots.
|
| options/nixos/services.znapzend.zetup.<name>.enable | Whether to enable this source.
|
| options/nixos/fileSystems.<name>.overlay.workdir | The path to the workdir
|
| options/nixos/services.h2o.hosts.<name>.acme.useHost | An existing Let’s Encrypt certificate to use for this virtual
host
|
| options/nixos/systemd.sockets.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.targets.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/home-manager/launchd.agents.<name>.config.MachServices | This optional key is used to specify Mach services to be registered with the Mach bootstrap sub-system
|
| options/nixos/systemd.network.networks.<name>.dns | A list of dns servers to be added to the network section of the
unit
|
| options/nixos/systemd.network.networks.<name>.vrf | A list of vrf interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.network.networks.<name>.ntp | A list of ntp servers to be added to the network section of the
unit
|
| options/nixos/services.k3s.autoDeployCharts.<name>.repo | The repo of the Helm chart
|
| options/nixos/services.inadyn.settings.provider.<name>.hostname | Hostname alias(es).
|
| options/nixos/services.inadyn.settings.provider.<name>.username | Username for this DDNS provider.
|
| options/nixos/security.pam.services.<name>.limits.*.item | Item this limit applies to
|
| options/nixos/boot.initrd.systemd.contents.<name>.target | Path of the symlink.
|
| options/nixos/security.dhparams.params.<name>.bits | The bit size for the prime that is used during a Diffie-Hellman
key exchange.
|
| options/nixos/systemd.user.services.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.user.services.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/home-manager/services.podman.machines.<name>.cpus | Number of CPUs to allocate to the machine
|
| options/home-manager/services.podman.machines.<name>.swap | Swap size in MB for the machine
|
| options/nixos/services.wordpress.sites.<name>.extraConfig | Any additional text to be appended to the wp-config.php
configuration file
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/security.acme.certs.<name>.directory | Directory where certificate and other state is stored.
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.nodelay | Enables TCP_NODELAY on the TCP socket.
|
| options/nixos/services.nsd.zones.<name>.rrlWhitelist | Whitelists the given rrl-types.
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.forward | The IP and port to forward all traffic to.
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.forward | The IP and port to forward all traffic to.
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.nodelay | Enables TCP_NODELAY on the TCP socket.
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.gtk.iconTheme.name | Name of the icon theme to use for the lightdm-gtk-greeter.
|
| options/nixos/services.drupal.sites.<name>.virtualHost | Apache configuration can be done by adapting services.httpd.virtualHosts.
|
| options/nixos/systemd.user.timers.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/systemd.user.slices.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/home-manager/services.restic.backups.<name>.checkOpts | A list of options for 'restic check'
|
| options/home-manager/xdg.dataFile.<name>.recursive | If the file source is a directory, then this option
determines whether the directory should be recursively
linked to the target location
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.slick.theme.name | Name of the theme to use for the lightdm-slick-greeter.
|
| options/nixos/services.tahoe.nodes.<name>.storage.enable | Whether to enable storage service.
|
| options/nixos/services.wyoming.piper.servers.<name>.uri | URI to bind the wyoming server to.
|
| options/home-manager/accounts.email.accounts.<name>.mu.enable | Whether to enable mu indexing.
|
| options/nixos/fileSystems.<name>.mountPoint | Location where the file system will be mounted
|
| options/nixos/systemd.user.services.<name>.startAt | Automatically start this unit at the given date/time, which
must be in the format described in
systemd.time(7)
|
| options/nixos/services.metricbeat.modules.<name>.module | The name of the module
|
| options/nixos/services.bitcoind.<name>.testnet | Whether to use the testnet instead of mainnet.
|
| options/home-manager/services.restic.backups.<name>.runCheck | Whether to run 'restic check' with the provided checkOpts options
|
| options/nixos/services.logcheck.ignoreCron.<name>.user | User that runs the cronjob.
|
| options/nixos/services.prosody.virtualHosts.<name>.ssl | Paths to SSL files
|
| options/nixos/services.nebula.networks.<name>.isRelay | Whether this node is a relay.
|
| options/home-manager/programs.sftpman.mounts.<name>.mountPoint | The remote path to mount.
|
| options/nixos/services.h2o.hosts.<name>.tls.identity.*.key-file | Path to key file
|
| options/nixos/security.pam.services.<name>.makeHomeDir | Whether to try to create home directories for users
with $HOMEs pointing to nonexistent
locations on session login.
|
| options/nixos/services.blockbook-frontend.<name>.certFile | To enable SSL, specify path to the name of certificate files without extension
|
| options/nixos/systemd.user.timers.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.user.slices.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/services.k3s.autoDeployCharts.<name>.hash | The hash of the packaged Helm chart
|
| options/nixos/services.xserver.xkb.extraLayouts.<name>.symbolsFile | The path to the xkb symbols file
|
| options/nixos/systemd.sockets.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/systemd.services.<name>.scriptArgs | Arguments passed to the main process script
|
| options/nixos/systemd.targets.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/darwin/services.github-runners.<name>.user | User under which to run the service
|
| options/nixos/security.pam.services.<name>.updateWtmp | Whether to update /var/log/wtmp.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Label | This required key uniquely identifies the job to launchd.
|
| options/nixos/boot.initrd.systemd.contents.<name>.source | Path of the source file.
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.keyttl | TTL for dnssec records
|
| options/nixos/services.redis.servers.<name>.user | User account under which this instance of redis-server runs.
If left as the default value this user will automatically be
created on system activation, otherwise you are responsible for
ensuring the user exists before the redis service starts.
|
| options/nixos/boot.loader.grub.users.<name>.passwordFile | Specifies the path to a file containing the
clear text password for the account
|
| options/home-manager/programs.i3status-rust.bars.<name>.icons | The icons set to use
|
| options/nixos/services.postfix.masterConfig.<name>.type | The type of the service
|
| options/home-manager/programs.firefox.profiles.<name>.path | Profile path.
|
| options/nixos/systemd.slices.<name>.requisite | Similar to requires
|
| options/nixos/systemd.timers.<name>.requisite | Similar to requires
|
| options/home-manager/xdg.desktopEntries.<name>.settings | Extra key-value pairs to add to the [Desktop Entry] section
|
| options/nixos/systemd.user.services.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/services.hostapd.radios.<name>.band | Specifies the frequency band to use, possible values are 2g for 2.4 GHz,
5g for 5 GHz, 6g for 6 GHz and 60g for 60 GHz.
|
| options/nixos/boot.specialFileSystems.<name>.mountPoint | Location where the file system will be mounted
|
| options/darwin/launchd.daemons.<name>.serviceConfig | Each attribute in this set specifies an option for a key in the plist.
https://developer.apple.com/legacy/library/documentation/Darwin/Reference/ManPages/man5/launchd.plist.5.html
|
| options/nixos/services.firezone.server.provision.accounts.<name>.groups.<name>.members | The members of this group
|
| options/nixos/security.pam.services.<name>.enableUMask | If enabled, the pam_umask module will be loaded.
|
| options/nixos/services.acpid.handlers.<name>.action | Shell commands to execute when the event is triggered.
|
| options/nixos/services.logcheck.ignore.<name>.regex | Regex specifying which log lines to ignore.
|
| options/nixos/services.fedimintd.<name>.enable | Whether to enable fedimintd.
|
| options/nixos/services.i2pd.inTunnels.<name>.crypto.tagsToSend | Number of ElGamal/AES tags to send.
|
| options/nixos/services.drupal.sites.<name>.extraConfig | Extra configuration values that you want to insert into settings.php
|
| options/nixos/hardware.display.outputs.<name>.edid | An EDID filename to be used for configured display, as in edid/<filename>
|
| options/nixos/services.phpfpm.pools.<name>.phpOptions | "Options appended to the PHP configuration file php.ini used for this PHP-FPM pool."
|
| options/nixos/systemd.user.targets.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/systemd.user.sockets.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/home-manager/accounts.contact.accounts.<name>.local.encoding | File encoding for items, both content and file name
|
| options/nixos/services.nginx.virtualHosts.<name>.quic | Whether to enable the QUIC transport protocol
|
| options/nixos/services.netbird.clients.<name>.logLevel | Log level of the NetBird daemon.
|
| options/nixos/services.netbird.tunnels.<name>.logLevel | Log level of the NetBird daemon.
|
| options/home-manager/programs.opencode.skills | Custom agent skills for opencode
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.preferShortUsername | Use 'name' instead of 'spn' in the preferred_username claim
|
| options/home-manager/programs.firefox.profiles.<name>.id | Profile ID
|
| options/home-manager/services.colima.profiles.<name>.logFile | Combined stdout and stderr log file for the Colima service.
|
| options/nixos/security.pam.services.<name>.failDelay.delay | The delay time (in microseconds) on failure.
|
| options/nixos/services.filebeat.inputs.<name>.type | The input type
|
| options/nixos/services.frp.instances.<name>.enable | Whether to enable frp.
|
| options/nixos/services.akkoma.frontends.<name>.ref | Akkoma frontend reference.
|
| options/nixos/services.tinc.networks.<name>.package | The tinc_pre package to use.
|
| options/nixos/services.redis.servers.<name>.unixSocketPerm | Change permissions for the socket
|
| options/nixos/systemd.user.tmpfiles.users.<name>.rules | Per-user rules for creation, deletion and cleaning of volatile and
temporary files automatically
|
| options/nixos/security.acme.certs.<name>.dnsProvider | DNS Challenge provider
|
| options/nixos/security.auditd.plugins.<name>.type | This tells the dispatcher how the plugin wants to be run
|
| options/nixos/services.nsd.zones.<name>.maxRefreshSecs | Limit refresh time for secondary zones
|
| options/nixos/services.bacula-sd.director.<name>.tls.key | The path of a PEM encoded TLS private key
|
| options/nixos/services.bacula-fd.director.<name>.tls.key | The path of a PEM encoded TLS private key
|
| options/nixos/services.drupal.sites.<name>.virtualHost.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/home-manager/xdg.configFile.<name>.executable | Set the execute bit
|
| options/nixos/security.pam.services.<name>.nodelay | Whether the delay after typing a wrong password should be disabled.
|
| options/home-manager/services.podman.images.<name>.extraConfig | INI sections and values to populate the Image Quadlet.
|
| options/home-manager/services.podman.builds.<name>.extraConfig | INI sections and values to populate the Build Quadlet.
|
| options/nixos/services.prosody.virtualHosts.<name>.ssl.key | Path to the key file.
|
| options/nixos/systemd.sockets.<name>.listenStreams | For each item in this list, a ListenStream
option in the [Socket] section will be created.
|
| options/darwin/environment.etc.<name>.enable | Whether this file should be generated
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.enso.iconTheme.name | Name of the icon theme to use for the lightdm-enso-os-greeter
|
| options/home-manager/launchd.agents.<name>.config.OnDemand | This key was used in Mac OS X 10.4 to control whether a job was kept alive or not
|
| options/nixos/services.znapzend.zetup.<name>.plan | The znapzend backup plan to use for the source
|
| options/nixos/services.doh-server.settings.ecs_allow_non_global_ip | By default, non global IP addresses are never forwarded to upstream servers
|
| options/nixos/systemd.user.targets.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.user.sockets.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/services.phpfpm.pools.<name>.extraConfig | Extra lines that go into the pool configuration
|
| options/nixos/systemd.network.networks.<name>.bond | A list of bond interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.network.networks.<name>.vlan | A list of vlan interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.network.networks.<name>.xfrm | A list of xfrm interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.user.sockets.<name>.socketConfig | Each attribute in this set specifies an option in the
[Socket] section of the unit
|
| options/nixos/boot.initrd.clevis.devices.<name>.secretFile | Clevis JWE file used to decrypt the device at boot, in concert with the chosen pin (one of TPM2, Tang server, or SSS).
|
| options/home-manager/launchd.agents.<name>.config.ServiceIPC | This optional key specifies whether the job participates in advanced
communication with launchd
|
| options/nixos/services.httpd.virtualHosts.<name>.adminAddr | E-mail address of the server administrator.
|
| options/nixos/services.drupal.sites.<name>.database.user | Database user.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.opensearch.settings."cluster.name" | The name of the cluster.
|
| options/nixos/services.i2pd.outTunnels.<name>.crypto.tagsToSend | Number of ElGamal/AES tags to send.
|
| options/nixos/boot.initrd.systemd.contents.<name>.enable | Whether to enable copying of this file and symlinking it.
|
| options/nixos/services.tahoe.nodes.<name>.sftpd.hostPublicKeyFile | Path to the SSH host public key.
|
| options/nixos/hardware.sane.brscan5.netDevices.<name>.ip | The ip address of the device
|
| options/nixos/security.pam.services.<name>.fprintAuth | If set, fingerprint reader will be used (if exists and
your fingerprints are enrolled).
|
| options/nixos/hardware.sane.brscan4.netDevices.<name>.ip | The ip address of the device
|
| options/nixos/programs.ssh.knownHosts.<name>.publicKey | The public key data for the host
|
| options/darwin/programs.ssh.knownHosts.<name>.publicKey | The public key data for the host
|
| options/nixos/services.h2o.hosts.<name>.tls.extraSettings | Additional TLS/SSL-related configuration options
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Nice | This optional key specifies what nice(3) value should be applied to the daemon.
|
| options/home-manager/launchd.agents.<name>.config.InitGroups | This optional key specifies whether initgroups(3) should be called before running the job
|
| options/nixos/security.pam.services.<name>.limits.*.value | Value of this limit
|
| options/nixos/services.k3s.manifests.<name>.source | Path of the source .yaml file.
|
| options/nixos/services.k3s.manifests.<name>.enable | Whether this manifest file should be generated.
|
| options/home-manager/programs.smug.projects.<name>.windows | Windows to create in the project session
|
| options/nixos/services.dokuwiki.sites.<name>.aclFile | Location of the dokuwiki acl rules
|
| options/nixos/services.honk.servername | The server name.
|
| options/nixos/services.nginx.virtualHosts.<name>.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/darwin/users.groups.<name>.description | The group's description.
|
| options/nixos/services.fedimintd.<name>.nginx.path | Path to host the API on and forward to the daemon's api port
|
| options/nixos/services.pppd.peers.<name>.autostart | Whether the PPP session is automatically started at boot time.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.controlPath | Specify path to the control socket used for connection sharing.
|
| options/nixos/security.pam.services.<name>.rssh | If set, the calling user's SSH agent is used to authenticate
against the configured keys
|
| options/nixos/services.dokuwiki.sites.<name>.acl.*.level | Permission level to restrict the actor(s) to
|
| options/nixos/services.bepasty.servers.<name>.workDir | Path to the working directory (used for config and pidfile)
|
| options/nixos/programs.neovim.runtime.<name>.enable | Whether this runtime directory should be generated
|
| options/nixos/services.spiped.config.<name>.encrypt | Take unencrypted connections from the
source socket and send encrypted
connections to the target socket.
|
| options/nixos/services.spiped.config.<name>.decrypt | Take encrypted connections from the
source socket and send unencrypted
connections to the target socket.
|
| options/nixos/services.firewalld.zones.<name>.short | Short description for the zone.
|
| options/nixos/services.firewalld.zones.<name>.rules | Rich rules for the zone.
|
| options/nixos/services.firewalld.zones.<name>.ports | Ports to allow in the zone.
|
| options/nixos/services.restic.backups.<name>.package | The restic package to use.
|
| options/home-manager/services.restic.backups.<name>.package | The restic package to use.
|
| options/nixos/services.tahoe.nodes.<name>.client.shares.total | The number of shares required to store a file.
|
| options/nixos/services.bitcoind.<name>.extraConfig | Additional configurations to be appended to bitcoin.conf.
|
| options/nixos/programs.ssh.knownHosts.<name>.extraHostNames | A list of additional host names and/or IP numbers used for
accessing the host's ssh service
|
| options/darwin/programs.ssh.knownHosts.<name>.extraHostNames | A list of additional host names and/or IP numbers used for
accessing the host's ssh service
|
| options/nixos/services.redis.servers.<name>.save | The schedule in which data is persisted to disk, represented as a list of lists where the first element represent the amount of seconds and the second the number of changes
|
| options/nixos/services.drupal.sites.<name>.database.host | Database host address.
|
| options/nixos/services.drupal.sites.<name>.database.port | Database host port.
|
| options/home-manager/programs.irssi.networks.<name>.server.port | Port of the chat server.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.enable | Whether to enable aerc.
|
| options/nixos/services.redis.servers.<name>.extraParams | Extra parameters to append to redis-server invocation
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.packages | List of ‹name› add-on packages to install for this profile
|
| options/nixos/services.rspamd.overrides.<name>.text | Text of the file.
|
| options/nixos/services.ndppd.proxies.<name>.timeout | Controls how long to wait for a Neighbor Advertisement Message before
invalidating the entry, in milliseconds.
|
| options/nixos/services.cjdns.ETHInterface.connectTo.<name>.hostname | Optional hostname to add to /etc/hosts; prevents reverse lookup failures.
|
| options/nixos/services.cjdns.UDPInterface.connectTo.<name>.hostname | Optional hostname to add to /etc/hosts; prevents reverse lookup failures.
|
| options/nixos/virtualisation.emptyDiskImages.*.driveConfig.name | A name for the drive
|
| options/nixos/ec2.zfs.datasets.<name>.properties | Properties to set on this dataset.
|
| options/nixos/systemd.network.netdevs.<name>.enable | Whether to manage network configuration using systemd-network
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.twoFactor | Whether to use a passphrase and a YubiKey (true), or only a YubiKey (false).
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.keyLength | Length of the LUKS slot key derived with PBKDF2 in byte.
|
| options/nixos/users.extraUsers.<name>.linger | Whether to enable or disable lingering for this user
|
| options/nixos/security.pam.services.<name>.limits | Attribute set describing resource limits
|
| options/nixos/systemd.user.sockets.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/systemd.user.services.<name>.scriptArgs | Arguments passed to the main process script
|
| options/nixos/systemd.user.targets.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/home-manager/launchd.agents.<name>.config.LimitLoadToHosts | This configuration file only applies to the hosts listed with this key
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.slick.iconTheme.name | Name of the icon theme to use for the lightdm-slick-greeter.
|
| options/nixos/users.ldap.base | The distinguished name of the search base.
|
| options/nixos/systemd.targets.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/systemd.sockets.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.policies.<name>.group | The group which should be allowed access to the given resource.
|
| options/nixos/services.fedimintd.<name>.nginx.fqdn | Public domain of the API address of the reverse proxy/tls terminator.
|
| options/home-manager/services.podman.machines.<name>.image | Bootable image to use for the machine
|
| options/nixos/services.tahoe.nodes.<name>.sftpd.accounts.url | URL of the accounts server.
|
| options/nixos/services.httpd.virtualHosts.<name>.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| options/nixos/services.nginx.virtualHosts.<name>.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/systemd.user.slices.<name>.requisite | Similar to requires
|
| options/nixos/systemd.user.timers.<name>.requisite | Similar to requires
|
| options/home-manager/accounts.email.accounts.<name>.jmap.host | Hostname of JMAP server
|
| options/nixos/environment.etc.<name>.enable | Whether this /etc file should be generated
|
| options/nixos/boot.initrd.luks.devices.<name>.keyFileOffset | The offset of the key file
|
| options/nixos/services.jupyter.kernels.<name>.logo64 | Path to 64x64 logo png.
|
| options/nixos/services.jupyter.kernels.<name>.logo32 | Path to 32x32 logo png.
|
| options/nixos/services.nginx.virtualHosts.<name>.listen.*.ssl | Enable SSL.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.proxyCommand | The command to use to connect to the server.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.extraOptions | Extra configuration options for the host.
|
| options/nixos/services.httpd.virtualHosts.<name>.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| options/nixos/services.nginx.virtualHosts.<name>.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.redis.servers.<name>.appendFsync | How often to fsync the append-only log, options: no, always, everysec.
|
| options/nixos/systemd.sockets.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.targets.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/security.pam.services.<name>.gnupg.storeOnly | Don't send the password immediately after login, but store for PAM
session.
|
| options/nixos/services.sympa.settingsFile.<name>.source | Path of the source file.
|
| options/nixos/services.sanoid.datasets.<name>.yearly | Number of yearly snapshots.
|
| options/nixos/services.sanoid.datasets.<name>.hourly | Number of hourly snapshots.
|
| options/nixos/services.nebula.networks.<name>.enable | Enable or disable this network.
|
| options/home-manager/services.podman.networks.<name>.driver | The network driver to use.
|
| options/home-manager/programs.obsidian.vaults.<name>.enable | Whether this vault should be generated.
|
| options/home-manager/services.podman.networks.<name>.labels | The labels to apply to the network.
|
| options/home-manager/services.podman.networks.<name>.subnet | The subnet to use for the network.
|
| options/nixos/services.prosody.virtualHosts.<name>.ssl.cert | Path to the certificate file.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.node | The node where the rule should be applied.
|
| options/nixos/services.prometheus.exporters.rtl_433.channels.*.name | Name to match.
|
| options/home-manager/programs.sftpman.mounts.<name>.mountDestPath | The path on the current machine where the remote path would be mounted.
|
| options/nixos/services.jupyterhub.kernels.<name>.displayName | Name that will be shown to the user.
|
| options/nixos/boot.initrd.luks.devices.<name>.postOpenCommands | Commands that should be run right after we have mounted our LUKS device.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Label | This required key uniquely identifies the job to launchd.
|
| options/home-manager/xdg.cacheFile.<name>.recursive | If the file source is a directory, then this option
determines whether the directory should be recursively
linked to the target location
|
| options/home-manager/xdg.stateFile.<name>.recursive | If the file source is a directory, then this option
determines whether the directory should be recursively
linked to the target location
|
| options/nixos/services.homebridge.settings.accessories.*.name | Name of the accessory
|
| options/darwin/services.github-runners.<name>.group | Group under which to run the service
|
| options/nixos/security.acme.certs.<name>.renewInterval | Systemd calendar expression when to check for renewal
|
| options/nixos/services.redis.servers.<name>.group | Group account under which this instance of redis-server runs.
If left as the default value this group will automatically be
created on system activation, otherwise you are responsible for
ensuring the group exists before the redis service starts.
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.settings.<name>.settings | Json formatted options for this extension.
|
| options/nixos/services.kanidm.provision.persons.<name>.displayName | Display name
|
| options/nixos/services.tahoe.nodes.<name>.client.shares.happy | The number of distinct storage nodes required to store
a file.
|
| options/nixos/services.redis.servers.<name>.appendOnly | By default data is only periodically persisted to disk, enable this option to use an append-only file for improved persistence.
|
| options/nixos/services.spiped.config.<name>.timeout | Timeout, in seconds, after which an attempt to connect to
the target or a protocol handshake will be aborted (and the
connection dropped) if not completed
|
| options/home-manager/programs.ssh.matchBlocks.<name>.forwardX11 | Specifies whether X11 connections will be automatically redirected
over the secure channel and DISPLAY set.
|
| options/nixos/services.httpd.virtualHosts.<name>.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| options/nixos/services.nginx.virtualHosts.<name>.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| options/nixos/services.nsd.zones.<name>.multiMasterCheck | If enabled, checks all masters for the last zone version
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.type | The resource type
|
| options/nixos/services.drupal.sites.<name>.privateFilesDir | The location of the Drupal private files directory.
|
| options/nixos/services.openvpn.servers.<name>.autoStart | Whether this OpenVPN instance should be started automatically.
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.gtk.cursorTheme.name | Name of the cursor theme to use for the lightdm-gtk-greeter.
|
| options/nixos/services.fedimintd.<name>.nginx.config.http3 | Whether to enable the HTTP/3 protocol
|
| options/home-manager/accounts.email.accounts.<name>.imap.tls.useStartTls | Whether to use STARTTLS.
|
| options/home-manager/accounts.email.accounts.<name>.smtp.tls.useStartTls | Whether to use STARTTLS.
|
| options/nixos/services.nylon.<name>.bindInterface | Tell nylon which interface to use as an uplink, default is "enp3s0f0".
|
| options/nixos/systemd.user.sockets.<name>.listenStreams | For each item in this list, a ListenStream
option in the [Socket] section will be created.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Nice | This optional key specifies what nice(3) value should be applied to the daemon.
|
| options/home-manager/services.podman.machines.<name>.diskSize | Disk size in GB for the machine
|
| options/nixos/fileSystems.<name>.autoFormat | If the device does not currently contain a filesystem (as
determined by blkid), then automatically
format it with the filesystem type specified in
fsType
|
| options/nixos/security.pam.services.<name>.yubicoAuth | If set, users listed in
~/.yubico/authorized_yubikeys
are able to log in with the associated Yubikey tokens.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Debug | This optional key specifies that launchd should adjust its log mask temporarily to LOG_DEBUG while
dealing with this job.
|
| options/nixos/systemd.network.netdevs.<name>.extraConfig | Extra configuration append to unit
|
| options/home-manager/services.pizauth.accounts.<name>.authUri | The OAuth2 server's authentication URI.
|
| options/home-manager/programs.floorp.profiles.<name>.search | Declarative search engine configuration.
|
| options/home-manager/services.kanshi.profiles.<name>.exec | Commands executed after the profile is successfully applied
|
| options/nixos/fileSystems.<name>.encrypted.enable | The block device is backed by an encrypted one, adds this device as a initrd luks entry.
|
| options/nixos/services.grafana.provision.alerting.rules.settings.groups.*.name | Name of the rule group
|
| options/nixos/services.buildkite-agents.<name>.tags | Tags for the agent.
|
| options/nixos/services.quicktun.<name>.protocol | Which protocol to use.
|
| options/darwin/services.buildkite-agents.<name>.tags | Tags for the agent.
|
| options/nixos/services.rke2.autoDeployCharts.<name>.repo | The repo of the Helm chart
|
| options/nixos/services.dokuwiki.sites.<name>.package | The dokuwiki package to use.
|
| options/nixos/services.znapzend.zetup.<name>.dataset | The dataset to use for this source.
|
| options/home-manager/accounts.email.accounts.<name>.aliases | Alternative identities of this account.
|
| options/home-manager/accounts.email.accounts.<name>.address | The email address of this account.
|
| options/home-manager/services.restic.backups.<name>.ssh-package | The openssh package to use.
|
| options/home-manager/accounts.contact.accounts.<name>.local | Local configuration for the contacts.
|
| options/home-manager/accounts.email.accounts.<name>.maildir | Maildir configuration for this account.
|
| options/home-manager/accounts.email.accounts.<name>.folders | Standard email folders.
|
| options/home-manager/programs.sftpman.mounts.<name>.beforeMount | Command to run before mounting.
|
| options/home-manager/launchd.agents.<name>.config.Program | This key maps to the first argument of execvp(3)
|
| options/nixos/services.drupal.sites.<name>.virtualHost.hostName | Canonical hostname for the server.
|
| options/nixos/services.ax25.axports.<name>.callsign | The callsign of the physical interface to bind to.
|
| options/nixos/services.uhub.<name>.plugins.*.settings | Settings specific to this plugin.
|
| options/nixos/services.quicktun.<name>.timeWindow | Allowed time window for first received packet in seconds (positive number allows packets from history)
|
| options/nixos/security.pam.services.<name>.ttyAudit.enable | Enable or disable TTY auditing for specified users
|
| options/nixos/services.akkoma.initDb.username | Name of the database user to initialise the database with
|
| options/home-manager/accounts.email.accounts.<name>.smtp.tls.enable | Whether to enable TLS/SSL.
|
| options/home-manager/accounts.email.accounts.<name>.imap.tls.enable | Whether to enable TLS/SSL.
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.saltLength | Length of the new salt in byte (64 is the effective maximum).
|
| options/nixos/services.public-inbox.inboxes.<name>.watch | Paths for public-inbox-watch(1) to monitor for new mail.
|
| options/nixos/services.easytier.instances.<name>.settings | Settings to generate easytier-‹name›.toml
|
| options/nixos/systemd.network.networks.<name>.vxlan | A list of vxlan interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.network.netdevs.<name>.tapConfig | Each attribute in this set specifies an option in the
[Tap] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.tunConfig | Each attribute in this set specifies an option in the
[Tun] section of the unit
|
| options/darwin/launchd.agents.<name>.serviceConfig.RunAtLoad | This optional key is used to control whether your job is launched once at the time the job is loaded
|
| options/nixos/services.github-runners.<name>.package | The github-runner package to use.
|
| options/darwin/services.github-runners.<name>.package | The github-runner package to use.
|
| options/nixos/services.suricata.settings.outputs.*.<name>.enabled | Whether to enable .
|
| options/nixos/services.rss2email.feeds.<name>.to | Email address to which to send feed items
|
| options/nixos/security.acme.certs.<name>.dnsResolver | Set the resolver to use for performing recursive DNS queries
|
| options/nixos/systemd.network.links.<name>.matchConfig | Each attribute in this set specifies an option in the
[Match] section of the unit
|
| options/home-manager/launchd.agents.<name>.config.LaunchOnlyOnce | This optional key specifies whether the job can only be run once and only once
|
| options/home-manager/services.podman.machines.<name>.autoStart | Whether to automatically start this machine on login.
|
| options/home-manager/programs.smug.projects.<name>.beforeStart | Commands to execute before the tmux-session starts.
|
| options/nixos/systemd.services.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/services.tahoe.nodes.<name>.sftpd.accounts.file | Path to the accounts file.
|
| options/nixos/services.graylog.rootUsername | Name of the default administrator user
|
| options/nixos/boot.loader.grub.users.<name>.hashedPassword | Specifies the password hash for the account,
generated with grub-mkpasswd-pbkdf2
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.packages | List of ‹name› add-on packages to install for this profile
|
| options/nixos/services.sourcehut.settings."builds.sr.ht::worker".name | Listening address and listening port
of the build runner (with HTTP port if not 80).
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.threads | Sets the number of worker threads to use
|
| options/darwin/launchd.agents.<name>.serviceConfig.UserName | This optional key specifies the user to run the job as
|
| options/nixos/services.rke2.autoDeployCharts.<name>.hash | The hash of the packaged Helm chart
|
| options/nixos/services.borgbackup.jobs.<name>.repo | Remote or local repository to back up to.
|
| options/nixos/services.httpd.virtualHosts.<name>.listen.*.port | Port to listen on
|
| options/nixos/hardware.sane.brscan4.netDevices.<name>.model | The model of the network device.
|
| options/nixos/services.iodine.clients.<name>.extraConfig | Additional command line parameters
|
| options/nixos/hardware.sane.brscan5.netDevices.<name>.model | The model of the network device.
|
| options/nixos/services.nginx.virtualHosts.<name>.listen.*.addr | Listen address.
|
| options/nixos/services.mobilizon.settings.":mobilizon".":instance".name | The fallback instance name if not configured into the admin UI
|
| options/nixos/services.wyoming.piper.servers.<name>.piper | The piper-tts package to use.
|
| options/nixos/services.neo4j.ssl.policies.<name>.clientAuth | The client authentication stance for this policy.
|
| options/nixos/services.xserver.xkb.extraLayouts.<name>.keycodesFile | The path to the xkb keycodes file
|
| options/nixos/services.netbird.tunnels.<name>.ui.enable | Controls presence of netbird-ui wrapper for this NetBird client.
|
| options/nixos/services.netbird.clients.<name>.ui.enable | Controls presence of netbird-ui wrapper for this NetBird client.
|
| options/nixos/services.httpd.virtualHosts.<name>.listen.*.ssl | Whether to enable SSL (https) support.
|
| options/nixos/services.restic.backups.<name>.exclude | Patterns to exclude when backing up
|
| options/nixos/systemd.user.sockets.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/systemd.user.targets.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.enso.cursorTheme.name | Name of the cursor theme to use for the lightdm-enso-os-greeter
|
| options/home-manager/accounts.calendar.accounts.<name>.local.encoding | File encoding for items, both content and file name
|
| options/nixos/services.tahoe.nodes.<name>.tub.location | The external location that the node should listen on
|
| options/nixos/containers.<name>.extraVeths.<name>.forwardPorts.*.protocol | The protocol specifier for port forwarding between host and container
|
| options/home-manager/fonts.fontconfig.configFile.<name>.text | Verbatim contents of the config file
|
| options/nixos/services.hans.clients.<name>.passwordFile | File that contains password
|
| options/nixos/services.nginx.virtualHosts.<name>.default | Makes this vhost the default.
|
| options/nixos/services.postgresql.systemCallFilter.<name>.enable | Whether to enable ‹name› in postgresql's syscall filter.
|
| options/nixos/services.ddclient.username | User name.
|
| options/nixos/services.davis.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.movim.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.slskd.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.nginx.virtualHosts.<name>.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.github-runners.<name>.user | User under which to run the service
|
| options/nixos/services.frp.instances.<name>.role | The frp consists of client and server
|
| options/nixos/systemd.user.sockets.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.user.targets.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/services.geth.<name>.websocket.enable | Whether to enable Go Ethereum WebSocket API.
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.recvTimeout | An application timeout on receiving data from the TCP socket.
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.recvTimeout | An application timeout on receiving data from the TCP socket.
|
| options/nixos/services.nebula.networks.<name>.relays | List of IPs of relays that this node should allow traffic from.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Label | This required key uniquely identifies the job to launchd.
|
| options/home-manager/services.podman.builds.<name>.extraPodmanArgs | Extra arguments to pass to the podman build command.
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.gracePeriod | Time in seconds to wait for the YubiKey.
|
| options/nixos/services.wyoming.piper.servers.<name>.useCUDA | Whether to accelerate the underlying onnxruntime library with CUDA.
|
| options/nixos/services.jupyterhub.kernels.<name>.language | Language of the environment
|
| options/nixos/boot.loader.systemd-boot.windows.<name>.sortKey | systemd-boot orders the menu entries by their sort keys,
so if you want something to appear after all the NixOS entries,
it should start with o or onwards
|
| options/nixos/security.pam.services.<name>.u2fAuth | If set, users listed in
$XDG_CONFIG_HOME/Yubico/u2f_keys (or
$HOME/.config/Yubico/u2f_keys if XDG variable is
not set) are able to log in with the associated U2F key
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.settings.<name>.force | Forcibly override any existing configuration for
this extension.
|
| options/nixos/services.gitwatch.<name>.message | Optional text to use in as commit message; all occurrences of %d will be replaced by formatted date/time
|
| options/home-manager/services.activitywatch.watchers.<name>.executable | The name of the executable of the watcher
|
| options/nixos/services.firewalld.zones.<name>.ports.*.port | |
| options/nixos/services.netbird.clients.<name>.dir.state | A state directory used by NetBird client to store config.json, state.json & resolv.conf.
|
| options/nixos/services.netbird.tunnels.<name>.dir.state | A state directory used by NetBird client to store config.json, state.json & resolv.conf.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.imapAuth | Sets the authentication mechanism if imap is used as the incoming
method
|
| options/home-manager/accounts.email.accounts.<name>.aerc.smtpAuth | Sets the authentication mechanism if smtp is used as the outgoing
method
|
| options/nixos/boot.specialFileSystems.<name>.stratis.poolUuid | UUID of the stratis pool that the fs is located in
This is only relevant if you are using stratis.
|
| options/nixos/services.nsd.zones.<name>.allowAXFRFallback | If NSD as secondary server should be allowed to AXFR if the primary
server does not allow IXFR.
|
| options/nixos/services.znapzend.zetup.<name>.sendDelay | Specify delay (in seconds) before sending snaps to the destination
|
| options/home-manager/launchd.agents.<name>.config.LimitLoadFromHosts | This configuration file only applies to hosts NOT listed with this key
|
| options/nixos/services.httpd.virtualHosts.<name>.sslServerKey | Path to server SSL certificate key.
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.ksk.rollPeriod | How frequently to change keys
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.zsk.rollPeriod | How frequently to change keys
|
| options/nixos/services.inadyn.settings.custom.<name>.ssl | Whether to use HTTPS for this DDNS provider.
|
| options/nixos/systemd.paths.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.targets.<name>.requisite | Similar to requires
|
| options/nixos/systemd.sockets.<name>.requisite | Similar to requires
|
| options/nixos/services.snapper.configs.<name>.FSTYPE | Filesystem type
|
| options/home-manager/programs.ssh.matchBlocks.<name>.forwardAgent | Whether the connection to the authentication agent (if any)
will be forwarded to the remote machine.
|
| options/home-manager/programs.obsidian.defaultSettings.corePlugins.*.name | The plugin.
|
| options/nixos/systemd.services.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/home-manager/programs.i3status-rust.bars.<name>.blocks | Configuration blocks to add to i3status-rust
config
|
| options/nixos/services.fedimintd.<name>.package | The fedimint package to use.
|
| options/nixos/services.nginx.virtualHosts.<name>.kTLS | Whether to enable kTLS support
|
| options/nixos/services.errbot.instances.<name>.dataDir | Data directory for errbot instance.
|
| options/home-manager/systemd.user.services.<name>.Service.ExecStart | Command that is executed when this service is started.
|
| options/home-manager/programs.vscode.profiles.<name>.userMcp | Configuration written to Visual Studio Code's
mcp.json
|
| options/nixos/services.tahoe.nodes.<name>.client.shares.needed | The number of shares required to reconstitute a file.
|
| options/nixos/services.firefox-syncserver.database.name | Database to use for storage
|
| options/nixos/services.quicktun.<name>.remoteFloat | Whether to allow the remote address and port to change when properly encrypted packets are received.
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.settings.<name>.settings | Json formatted options for this extension.
|
| options/home-manager/programs.obsidian.vaults.<name>.target | Path to target vault relative to the user's HOME.
|
| options/home-manager/services.podman.images.<name>.extraPodmanArgs | Extra arguments to pass to the podman image pull command.
|
| options/home-manager/services.podman.networks.<name>.autoStart | Whether to start the network on boot (requires user lingering).
|
| options/nixos/services.znapzend.zetup.<name>.destinations.<name>.presend | Command to run before sending the snapshot to the destination
|
| options/nixos/services.prometheus.exporters.fritz.settings.devices.*.name | Name to use for the device.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.dynamicConfigScripts | All of these scripts will be executed in lexicographical order before hostapd
is started, right after the bss segment was generated and may dynamically
append bss options to the generated configuration file
|
| options/nixos/services.buildkite-agents.<name>.dataDir | The workdir for the agent
|
| options/darwin/system.activationScripts.<name>.text | Text of the file.
|
| options/darwin/services.buildkite-agents.<name>.dataDir | The workdir for the agent
|
| options/nixos/services.wstunnel.clients.<name>.tlsSNI | Use this as the SNI while connecting via TLS
|
| options/nixos/services.dokuwiki.sites.<name>.phpPackage | The php package to use.
|
| options/nixos/services.sanoid.templates.<name>.daily | Number of daily snapshots.
|
| options/nixos/services.redis.servers.<name>.requirePassFile | File with password for the database.
|
| options/nixos/services.vault-agent.instances.<name>.user | User under which this instance runs.
|
| options/nixos/services.nebula.networks.<name>.listen.port | Port number to listen on.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.nebula.networks.<name>.listen.host | IP address to listen on.
|
| options/nixos/services.znc.confOptions.networks.<name>.port | IRC server port.
|
| options/nixos/services.restic.backups.<name>.paths | Which paths to backup, in addition to ones specified via
dynamicFilesFrom
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.slick.cursorTheme.name | Name of the cursor theme to use for the lightdm-slick-greeter.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.groups.<name>.forceMembers | Ensure that only the given members are part of this group at every server start.
|
| options/home-manager/services.podman.volumes.<name>.extraConfig | INI sections and values to populate the Volume Quadlet.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags.sent | Tag for notmuch to use for messages stored in the mailbox labeled with the
Sent name attribute
|
| options/nixos/services.rke2.manifests.<name>.source | Path of the source .yaml file.
|
| options/nixos/services.rke2.manifests.<name>.enable | Whether this manifest file should be generated.
|
| options/home-manager/accounts.email.accounts.<name>.meli.enable | Whether to enable the meli mail client for this account
|
| options/nixos/services.agate.hostnames | Domain name of this Gemini server, enables checking hostname and port
in requests. (multiple occurrences means basic vhosts)
|
| options/nixos/services.dokuwiki.sites.<name>.acl | Access Control Lists: see https://www.dokuwiki.org/acl
Mutually exclusive with services.dokuwiki.aclFile
Set this to a value other than null to take precedence over aclFile option
|
| options/home-manager/accounts.contact.accounts.<name>.local.type | The type of the storage.
|
| options/home-manager/accounts.contact.accounts.<name>.local.path | The path of the storage.
|
| options/nixos/services.nginx.virtualHosts.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/systemd.network.netdevs.<name>.wlanConfig | Each attribute in this set specifies an option in the [WLAN] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.l2tpConfig | Each attribute in this set specifies an option in the
[L2TP] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.xfrmConfig | Each attribute in this set specifies an option in the
[Xfrm] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.vlanConfig | Each attribute in this set specifies an option in the
[VLAN] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.bondConfig | Each attribute in this set specifies an option in the
[Bond] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.peerConfig | Each attribute in this set specifies an option in the
[Peer] section of the unit
|
| options/home-manager/launchd.agents.<name>.config.LowPriorityIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O.
|
| options/nixos/services.home-assistant.config.homeassistant.name | Name of the location where Home Assistant is running.
|
| options/nixos/systemd.services.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/services.xserver.xkb.extraLayouts.<name>.geometryFile | The path to the xkb geometry file
|
| options/nixos/services.tahoe.nodes.<name>.sftpd.hostPrivateKeyFile | Path to the SSH host private key.
|
| options/nixos/services.jupyter.kernels.<name>.extraPaths | Extra paths to link in kernel directory
|
| options/nixos/services.ytdl-sub.instances.<name>.enable | Whether to enable ytdl-sub instance.
|
| options/nixos/security.dhparams.params.<name>.path | The resulting path of the generated Diffie-Hellman parameters
file for other services to reference
|
| options/nixos/services.fedimintd.<name>.dataDir | Path to the data dir fedimintd will use to store its data
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Debug | This optional key specifies that launchd should adjust its log mask temporarily to LOG_DEBUG while
dealing with this job.
|
| options/nixos/services.kanata.keyboards.<name>.port | Port to run the TCP server on. null will not run the server.
|
| options/nixos/security.acme.certs.<name>.reloadServices | The list of systemd services to call systemctl try-reload-or-restart
on.
|
| options/nixos/services.sympa.settingsFile.<name>.enable | Whether this file should be generated
|
| options/home-manager/services.podman.machines.<name>.memory | Memory in MB to allocate to the machine
|
| options/home-manager/services.podman.images.<name>.password | Password used to connect to registry. (Will be visible in nix store)
|
| options/nixos/services.keepalived.vrrpInstances.<name>.vmacInterface | Name of the vmac interface to use. keepalived will come up with a name
if you don't specify one.
|
| options/nixos/services.wstunnel.servers.<name>.tlsKey | TLS key to use instead of the hardcoded on in case of HTTPS connections
|
| options/nixos/services.fedimintd.<name>.api_ws.url | Public URL of the API address of the reverse proxy/tls terminator
|
| options/nixos/systemd.user.services.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.username | Username for basic HTTP authentication
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.state | The state in which a new window should spawn.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.layer | The layer where a new window should spawn.
|
| options/nixos/image.repart.partitions.<name>.storePaths | The store paths to include in the partition.
|
| options/nixos/services.fedimintd.<name>.nginx.enable | Whether to configure nginx for fedimintd
|
| options/nixos/services.firewalld.zones.<name>.target | Action for packets that doesn't match any rules.
|
| options/nixos/services.httpd.virtualHosts.<name>.sslServerCert | Path to server SSL certificate.
|
| options/home-manager/programs.retroarch.cores.<name>.enable | Whether to enable RetroArch core.
|
| options/home-manager/services.pizauth.accounts.<name>.tokenUri | The OAuth2 server's token URI.
|
| options/nixos/services.nextcloud-spreed-signaling.settings.stats.allowed_ips | List of IP addresses that are allowed to access the debug, stats and metrics endpoints
|
| options/home-manager/accounts.email.accounts.<name>.enable | Whether this account is enabled
|
| options/darwin/launchd.agents.<name>.serviceConfig.TimeOut | The recommended idle time out (in seconds) to pass to the job
|
| options/nixos/services.httpd.virtualHosts.<name>.servedDirs | This option provides a simple way to serve static directories.
|
| options/nixos/services.hostapd.radios.<name>.wifi6.enable | Enables support for IEEE 802.11ax (WiFi 6, HE)
|
| options/nixos/services.redis.servers.<name>.settings | Redis configuration
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.storage.fsType | The filesystem of the unencrypted device.
|
| options/nixos/services.vdirsyncer.jobs.<name>.group | group to run vdirsyncer as
|
| options/nixos/systemd.network.networks.<name>.routes | A list of route sections to be added to the unit
|
| options/home-manager/services.restic.backups.<name>.exclude | Patterns to exclude when backing up
|
| options/home-manager/programs.rclone.remotes.<name>.config | Regular configuration options as described in rclone's documentation
https://rclone.org/docs/
|
| options/home-manager/programs.vscode.profiles.<name>.enableMcpIntegration | Whether to integrate the MCP servers config from
programs.mcp.servers into
programs.vscode.profiles.<name>.userMcp
|
| options/nixos/services.kimai.sites.<name>.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/security.pam.services.<name>.howdy.control | This option sets the PAM "control" used for this module.
|
| options/home-manager/accounts.email.accounts.<name>.lieer.enable | Whether to enable lieer Gmail synchronization for notmuch.
|
| options/nixos/fileSystems.<name>.autoResize | If set, the filesystem is grown to its maximum size before
being mounted. (This is typically the size of the containing
partition.) This is currently only supported for ext2/3/4
filesystems that are mounted during early boot.
|
| options/nixos/services.ytdl-sub.instances.<name>.config | Configuration for ytdl-sub
|
| options/nixos/users.users.<name>.ignoreShellProgramCheck | By default, nixos will check that programs
|
| options/nixos/services.quicktun.<name>.localAddress | IP address or hostname of the local end.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.RunAtLoad | This optional key is used to control whether your job is launched once at the time the job is loaded
|
| options/nixos/boot.initrd.luks.devices.<name>.preOpenCommands | Commands that should be run right before we try to mount our LUKS device
|
| options/nixos/systemd.shutdownRamfs.contents.<name>.text | Text of the file.
|
| options/home-manager/services.kanshi.profiles.<name>.outputs | Outputs configuration.
|
| options/nixos/security.pam.services.<name>.usshAuth | If set, users with an SSH certificate containing an authorized principal
in their SSH agent are able to log in
|
| options/nixos/services.fedimintd.<name>.api_ws.bind | Address to bind on for API connections relied by the reverse proxy/tls terminator.
|
| options/nixos/services.postfix.masterConfig.<name>.args | Arguments to pass to the command
|
| options/nixos/services.syncoid.commands.<name>.sshKey | SSH private key file to use to login to the remote system
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.focus | Whether the node should gain focus on creation.
|
| options/nixos/services.fedimintd.<name>.nginx.config | Overrides to the nginx vhost section for api
|
| options/nixos/services.sympa.domains.<name>.webLocation | URL path part of the web interface.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.addressFamily | Specifies which address family to use when connecting.
|
| options/nixos/hardware.display.outputs.<name>.mode | A video kernel parameter (framebuffer mode) configuration for the specific output:
<xres>x<yres>[M][R][-<bpp>][@<refresh>][i][m][eDd]
See for more information:
|
| options/nixos/services.tinc.networks.<name>.debugLevel | The amount of debugging information to add to the log. 0 means little
logging while 5 is the most logging. man tincd for
more details.
|
| options/nixos/services.awstats.configs.<name>.logFile | The log file to be scanned
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/systemd.user.services.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.UserName | This optional key specifies the user to run the job as
|
| options/nixos/systemd.paths.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.hostapd.radios.<name>.wifi5.enable | Enables support for IEEE 802.11ac (WiFi 5, VHT)
|
| options/nixos/services.tarsnap.archives.<name>.maxbw | Abort archival if upstream bandwidth usage in bytes
exceeds this threshold.
|
| options/nixos/services.vdirsyncer.jobs.<name>.user | User account to run vdirsyncer as, otherwise as a systemd
dynamic user
|
| options/home-manager/accounts.email.accounts.<name>.primary | Whether this is the primary account
|
| options/home-manager/xdg.configFile.<name>.recursive | If the file source is a directory, then this option
determines whether the directory should be recursively
linked to the target location
|
| options/nixos/services.prometheus.exporters.script.settings.scripts.*.name | Name of the script.
|
| options/nixos/services.httpd.virtualHosts.<name>.logFormat | Log format for Apache's log files
|
| options/nixos/services.caddy.virtualHosts.<name>.logFormat | Configuration for HTTP request logging (also known as access logs)
|
| options/nixos/systemd.user.targets.<name>.requisite | Similar to requires
|
| options/nixos/systemd.user.paths.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.user.sockets.<name>.requisite | Similar to requires
|
| options/home-manager/launchd.agents.<name>.config.StandardInPath | This optional key specifies what file should be used for data being supplied to stdin when using
stdio(3).
|
| options/nixos/services.pgbackrest.repos.<name>.host | Repository host when operating remotely
|
| options/nixos/security.pam.services.<name>.sshAgentAuth | If set, the calling user's SSH agent is used to authenticate
against the keys in the calling user's
~/.ssh/authorized_keys
|
| options/nixos/security.pam.services.<name>.limits.*.domain | Username, groupname, or wildcard this limit applies to
|
| options/nixos/services.k3s.autoDeployCharts.<name>.extraDeploy | List of extra Kubernetes manifests to deploy with this Helm chart.
|
| options/darwin/services.github-runners.<name>.workDir | Working directory, available as $GITHUB_WORKSPACE during workflow runs
and used as a default for repository checkouts
|
| options/darwin/users.users.<name>.ignoreShellProgramCheck | By default, nix-darwin will check that programs
|
| options/home-manager/services.xsuspender.rules.<name>.matchWmNameContains | Match windows where wm name contains string.
|
| options/nixos/services.davis.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.davis.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.movim.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.slskd.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.slskd.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.movim.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.errbot.instances.<name>.logLevel | Errbot log level
|
| options/nixos/services.nebula.networks.<name>.package | The nebula package to use.
|
| options/nixos/services.sanoid.datasets.<name>.monthly | Number of monthly snapshots.
|
| options/home-manager/accounts.contact.accounts.<name>.remote | Remote configuration for the contacts.
|
| options/home-manager/programs.i3status.modules.<name>.enable | Whether or not to enable this module.
|
| options/nixos/services.fedimintd.<name>.api_ws.port | TCP Port to bind on for API connections relayed by the reverse proxy/tls terminator.
|
| options/home-manager/services.restic.backups.<name>.paths | Paths to back up, alongside those defined by the dynamicFilesFrom
option
|
| options/nixos/services.znc.confOptions.networks.<name>.useSSL | Whether to use SSL to connect to the IRC server.
|
| options/nixos/services.nginx.proxyCachePath.<name>.levels | The levels parameter defines structure of subdirectories in cache: from
1 to 3, each level accepts values 1 or 2
|
| options/nixos/services.dokuwiki.sites.<name>.phpOptions | Options for PHP's php.ini file for this dokuwiki site.
|
| options/nixos/services.httpd.virtualHosts.<name>.enableUserDir | Whether to enable serving ~/public_html as
/~«username».
|
| options/nixos/services.tinc.networks.<name>.bindToAddress | The ip address to bind to (both listen on and send packets from).
|
| options/nixos/services.rspamd.workers.<name>.bindSockets | List of sockets to listen, in format acceptable by rspamd
|
| options/nixos/services.neo4j.ssl.policies.<name>.trustAll | Makes this policy trust all remote parties
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags.inbox | Tag for notmuch to use for messages stored in the mailbox labeled with the
Inbox name attribute
|
| options/home-manager/accounts.contact.accounts.<name>.remote.url | The URL of the storage.
|
| options/darwin/services.gitlab-runner.services.<name>.tagList | Tag list.
|
| options/nixos/programs.tsmClient.servers.<name>.tcpport | TCP port of the IBM TSM server
|
| options/nixos/services.rspamd.workers.<name>.extraConfig | Additional entries to put verbatim into worker section of rspamd config file.
|
| options/nixos/services.borgbackup.jobs.<name>.appendFailedSuffix | Append a .failed suffix
to the archive name, which is only removed if
borg create has a zero exit status.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.adminAddr | E-mail address of the server administrator.
|
| options/home-manager/accounts.email.accounts.<name>.folders.sent | Relative path of the sent mail folder.
|
| options/nixos/systemd.network.networks.<name>.enable | Whether to manage network configuration using systemd-network
|
| options/nixos/systemd.network.networks.<name>.tunnel | A list of tunnel interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.network.networks.<name>.bridge | A list of bridge interfaces to be added to the network section of the
unit
|
| options/nixos/security.pam.services.<name>.setLoginUid | Set the login uid of the process
(/proc/self/loginuid) for auditing
purposes
|
| options/nixos/services.nginx.virtualHosts.<name>.extraConfig | These lines go to the end of the vhost verbatim.
|
| options/nixos/systemd.network.networks.<name>.domains | A list of domains to pass to the network config.
|
| options/home-manager/programs.floorp.profiles.<name>.userChrome | Custom Floorp user chrome CSS.
|
| options/nixos/systemd.user.services.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/home-manager/systemd.user.services.<name>.Unit.X-SwitchMethod | The preferred method to use when switching from an old to a new
version of this service.
|
| options/nixos/systemd.paths.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/services.redis.servers.<name>.slowLogLogSlowerThan | Log queries whose execution take longer than X in milliseconds.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.splitDir | The direction where the container is going to be split.
|
| options/nixos/services.dokuwiki.sites.<name>.poolConfig | Options for the DokuWiki PHP pool
|
| options/nixos/services.nntp-proxy.users.<name>.passwordHash | SHA-512 password hash (can be generated by
mkpasswd -m sha-512 <password>)
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Debug | This optional key specifies that launchd should adjust its log mask temporarily to LOG_DEBUG while
dealing with this job.
|
| options/home-manager/launchd.agents.<name>.config.StandardOutPath | This optional key specifies what file should be used for data being sent to stdout when using stdio(3).
|
| options/nixos/services.mailpit.instances.<name>.smtp | SMTP bind interface and port.
|
| options/nixos/services.tarsnap.archives.<name>.nodump | Exclude files with the nodump flag.
|
| options/nixos/services.rspamd.workers.<name>.includes | List of files to include in configuration
|
| options/nixos/services.syncoid.commands.<name>.extraArgs | Extra syncoid arguments for this command.
|
| options/nixos/services.wstunnel.clients.<name>.enable | Whether to enable this wstunnel instance.
|
| options/nixos/services.wstunnel.servers.<name>.enable | Whether to enable this wstunnel instance.
|
| options/home-manager/programs.firefox.profiles.<name>.search | Declarative search engine configuration.
|
| options/home-manager/services.podman.networks.<name>.gateway | The gateway IP to use for the network.
|
| options/nixos/systemd.services.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/home-manager/programs.gradle.initScripts.<name>.source | Path of the init script file
|
| options/home-manager/programs.ssh.matchBlocks.<name>.userKnownHostsFile | Specifies one or more files to use for the user host key
database, separated by whitespace
|
| options/nixos/services.keepalived.vrrpInstances.<name>.virtualIps.*.label | Each address may be tagged with a label string
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.fqdn | Fully qualified domain name of the JMAP service.
mujmap looks up the JMAP SRV record for this host to determine the JMAP session
URL
|
| options/nixos/power.ups.upsmon.monitor.<name>.passwordFile | The full path to a file containing the password from
upsd.users for accessing this UPS
|
| options/nixos/security.pam.services.<name>.requireWheel | Whether to permit root access only to members of group wheel.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.controlMaster | Configure sharing of multiple sessions over a single network connection.
|
| options/nixos/services.fluidd.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.akkoma.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.gancio.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.fedimintd.<name>.bitcoin.rpc.kind | Kind of a bitcoin node.
|
| options/nixos/services.monica.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.matomo.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.index | Adds index directive.
|
| options/home-manager/accounts.contact.accounts.<name>.local.fileExt | The file extension to use.
|
| options/nixos/services.vault-agent.instances.<name>.group | Group under which this instance runs.
|
| options/home-manager/programs.floorp.profiles.<name>.isDefault | Whether this is a default profile.
|
| options/home-manager/programs.sftpman.mounts.<name>.mountOptions | Options to pass to sshfs.
|
| options/home-manager/services.pizauth.accounts.<name>.clientId | The OAuth2 client ID.
|
| options/nixos/systemd.network.networks.<name>.bridgeFDBs | A list of BridgeFDB sections to be added to the unit
|
| options/nixos/systemd.network.networks.<name>.bridgeMDBs | A list of BridgeMDB sections to be added to the unit
|
| options/nixos/services.i2pd.ifname | Network interface to bind to.
|
| options/nixos/services.znapzend.zetup.<name>.destinations.<name>.postsend | Command to run after sending the snapshot to the destination
|
| options/nixos/services.httpd.virtualHosts.<name>.http2 | Whether to enable HTTP 2
|
| options/nixos/services.neo4j.ssl.policies.<name>.ciphers | Restrict the allowed ciphers of this policy to those defined
here
|
| options/darwin/launchd.agents.<name>.serviceConfig.Umask | This optional key specifies what value should be passed to umask(2) before running the job
|
| options/nixos/security.apparmor.policies.<name>.path | A path of a profile file to include
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.storage.path | Absolute path of the salt on the unencrypted device with
that device's root directory as "/".
|
| options/nixos/security.pam.services.<name>.ttyAudit.openOnly | Set the TTY audit flag when opening the session,
but do not restore it when closing the session
|
| options/nixos/services.kimai.sites.<name>.database.charset | Database charset.
|
| options/nixos/systemd.services.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/services.vmalert.instances.<name>.settings.rule | Path to the files with alerting and/or recording rules.
|
| options/nixos/services.kmonad.keyboards.<name>.config | Keyboard configuration.
|
| options/nixos/services.opkssh.providers.<name>.issuer | Issuer URI
|
| options/nixos/services.icecast.hostname | DNS name or IP address that will be used for the stream directory lookups or possibly the playlist generation if a Host header is not provided.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.policies.<name>.resource | The resource to which access should be allowed.
|
| options/darwin/launchd.agents.<name>.serviceConfig.WatchPaths | This optional key causes the job to be started if any one of the listed paths are modified.
|
| options/home-manager/programs.smug.projects.<name>.windows.*.root | Root path of window
|
| options/nixos/services.geoclue2.appConfig.<name>.isSystem | Whether the application is a system component or not.
|
| options/nixos/services.netbird.tunnels.<name>.dir.runtime | A runtime directory used by NetBird client.
|
| options/nixos/services.netbird.clients.<name>.dir.runtime | A runtime directory used by NetBird client.
|
| options/nixos/services.wyoming.piper.servers.<name>.extraArgs | Extra arguments to pass to the server commandline.
|
| options/nixos/services.wyoming.piper.servers.<name>.enable | Whether to enable Wyoming Piper server.
|
| options/home-manager/accounts.contact.accounts.<name>.khal.readOnly | Keep khal from making any changes to this account.
|
| options/nixos/systemd.network.netdevs.<name>.vxlanConfig | Each attribute in this set specifies an option in the
[VXLAN] section of the unit
|
| options/darwin/launchd.daemons.<name>.serviceConfig.RunAtLoad | This optional key is used to control whether your job is launched once at the time the job is loaded
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites.<name>.desktopEntry.categories | Categories in which the entry should be shown in a menu.
|
| options/nixos/security.acme.certs.<name>.inheritDefaults | Whether to inherit values set in security.acme.defaults or not.
|
| options/nixos/services.restic.backups.<name>.extraBackupArgs | Extra arguments passed to restic backup.
|
| options/nixos/services.redis.servers.<name>.openFirewall | Whether to open ports in the firewall for the server.
|
| options/home-manager/services.pizauth.accounts.<name>.loginHint | An optional login hint for the account provider.
|
| options/home-manager/services.muchsync.remotes.<name>.upload | Whether to propagate local changes to the remote.
|
| options/home-manager/programs.smug.projects.<name>.windows.*.panes | Panes to open in a window.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.identityAgent | Specifies the location of the ssh identity agent.
|
| options/darwin/launchd.agents.<name>.serviceConfig.ExitTimeOut | The amount of time launchd waits before sending a SIGKILL signal
|
| options/nixos/services.wstunnel.servers.<name>.listen.host | The hostname.
|
| options/nixos/services.wstunnel.servers.<name>.listen.port | The port.
|
| options/nixos/systemd.user.paths.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.drupal.sites.<name>.virtualHost.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| options/nixos/security.pam.services.<name>.failDelay.enable | If enabled, this will replace the FAIL_DELAY setting from login.defs
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags.spam | Tag for notmuch to use for messages stored in the mailbox labeled with the
Junk name attribute and/or with the $Junk keyword,
except for messages with the $NotJunk keyword
|
| options/nixos/services.drupal.sites.<name>.virtualHost.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| options/nixos/security.pam.services.<name>.howdy.enable | Whether to enable the Howdy PAM module
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.TimeOut | The recommended idle time out (in seconds) to pass to the job
|
| options/nixos/programs.uwsm.waylandCompositors.<name>.prettyName | The full name of the desktop entry file.
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.ksk.prePublish | How long in advance to publish new keys
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.zsk.prePublish | How long in advance to publish new keys
|
| options/home-manager/accounts.email.accounts.<name>.lieer.sync.enable | Whether to enable lieer synchronization service.
|
| options/nixos/services.fedimintd.<name>.nginx.config.root | The path of the web root directory.
|
| options/nixos/services.h2o.hosts.<name>.tls.redirectCode | HTTP status used by globalRedirect & forceSSL
|
| options/nixos/services.wordpress.sites.<name>.fontsDir | This directory is used to download fonts from a remote location, e.g.
to host google fonts locally.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.UserName | This optional key specifies the user to run the job as
|
| options/nixos/services.nginx.proxyCachePath.<name>.useTempPath | Nginx first writes files that are destined for the cache to a temporary
storage area, and the use_temp_path=off directive instructs Nginx to
write them to the same directories where they will be cached
|
| options/nixos/systemd.slices.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.timers.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/security.pam.services.<name>.sssdStrictAccess | enforce sssd access control
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.openFirewall | Open the appropriate ports in the firewall.
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.openFirewall | Open the appropriate ports in the firewall.
|
| options/nixos/services.tinc.networks.<name>.rsaPrivateKeyFile | Path of the private RSA keyfile.
|
| options/nixos/systemd.network.networks.<name>.extraConfig | Extra configuration append to unit
|
| options/home-manager/services.podman.containers.<name>.ip6 | Set an IPv6 address for the container.
|
| options/nixos/services.fedimintd.<name>.bitcoin.rpc.url | Bitcoin node (bitcoind/electrum/esplora) address to connect to
|
| options/home-manager/accounts.contact.accounts.<name>.khard.glob | The glob expansion to be searched for contacts when
type is set to discover.
|
| options/nixos/services.sabnzbd.settings.misc.inet_exposure | Restrictions for access from non-local IP addresses
|
| options/nixos/services.borgbackup.jobs.<name>.paths | Path(s) to back up
|
| options/home-manager/fonts.fontconfig.configFile.<name>.enable | Whether to enable Whether this font config file should be generated..
|
| options/nixos/boot.initrd.luks.devices.<name>.gpgCard.encryptedPass | Path to the GPG encrypted passphrase.
|
| options/nixos/services.davis.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.slskd.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.movim.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/home-manager/accounts.email.accounts.<name>.gpg.signByDefault | Sign messages by default.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.border | Whether the node should have border.
|
| options/nixos/containers.<name>.config | A specification of the desired configuration of this
container, as a NixOS module.
|
| options/nixos/containers.<name>.autoStart | Whether the container is automatically started at boot-time.
|
| options/nixos/services.easytier.instances.<name>.extraSettings | Extra settings to add to easytier-‹name›.toml.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.addKeysToAgent | When enabled, a private key that is used during authentication will be
added to ssh-agent if it is running (with confirmation enabled if
set to 'confirm')
|
| options/nixos/security.apparmor.policies.<name>.state | How strictly this policy should be enforced
|
| options/nixos/services.rspamd.overrides.<name>.source | Path of the source file.
|
| options/nixos/services.sanoid.templates.<name>.hourly | Number of hourly snapshots.
|
| options/nixos/services.sanoid.templates.<name>.yearly | Number of yearly snapshots.
|
| options/home-manager/accounts.calendar.accounts.<name>.local | Local configuration for the calendar.
|
| options/home-manager/programs.irssi.networks.<name>.channels | Channels for the given network.
|
| options/nixos/systemd.network.networks.<name>.bridgeVLANs | A list of BridgeVLAN sections to be added to the unit
|
| options/home-manager/programs.ssh.matchBlocks.<name>.identityFile | Specifies files from which the user identity is read
|
| options/nixos/services.netbird.tunnels.<name>.login.enable | Whether to enable automated login for NetBird client.
|
| options/nixos/services.netbird.clients.<name>.login.enable | Whether to enable automated login for NetBird client.
|
| options/home-manager/launchd.agents.<name>.config.WaitForDebugger | This optional key specifies that launchd should instruct the kernel to have the job wait for a debugger
to attach before any code in the job is executed.
|
| options/darwin/environment.launchAgents.<name>.text | Text of the file.
|
| options/nixos/services.restic.backups.<name>.pruneOpts | A list of options (--keep-* et al.) for 'restic forget
--prune', to automatically prune old snapshots
|
| options/nixos/services.geth.<name>.websocket.address | Listen address of Go Ethereum WebSocket API.
|
| options/nixos/services.borgbackup.jobs.<name>.postInit | Shell commands to run after borg init.
|
| options/nixos/services.geth.<name>.authrpc.jwtsecret | Path to a JWT secret for authenticated RPC endpoint.
|
| options/nixos/services.wstunnel.clients.<name>.autoStart | Whether to enable starting this wstunnel instance automatically.
|
| options/nixos/services.wstunnel.servers.<name>.autoStart | Whether to enable starting this wstunnel instance automatically.
|
| options/nixos/services.postfix.settings.master.<name>.type | The type of the service
|
| options/home-manager/accounts.contact.accounts.<name>.remote.type | The type of the storage.
|
| options/home-manager/programs.irssi.networks.<name>.server.ssl.enable | Whether SSL should be used.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| options/nixos/services.firewalld.zones.<name>.version | Version of the zone.
|
| options/nixos/programs.xfs_quota.projects.<name>.id | Project ID.
|
| options/darwin/launchd.agents.<name>.serviceConfig.StartOnMount | This optional key causes the job to be started every time a filesystem is mounted.
|
| options/nixos/services.hickory-dns.settings.listen_addrs_ipv6 | List of ipv6 addresses on which to listen for DNS queries.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.enable | Whether to enable synchronization using mbsync.
|
| options/nixos/services.github-runners.<name>.enable | Whether to enable GitHub Actions runner
|
| options/darwin/services.github-runners.<name>.enable | Whether to enable GitHub Actions runner
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.displayName | Display name
|
| options/nixos/security.pam.services.<name>.forwardXAuth | Whether X authentication keys should be passed from the
calling user to the target user (e.g. for
su)
|
| options/nixos/services.borgbackup.jobs.<name>.user | The user borg is run as
|
| options/nixos/services.nginx.virtualHosts.<name>.listen.*.port | Port number to listen on
|
| options/nixos/services.sympa.domains.<name>.settings | The robot.conf configuration file as key value set
|
| options/nixos/systemd.network.netdevs.<name>.fooOverUDPConfig | Each attribute in this set specifies an option in the
[FooOverUDP] section of the unit
|
| options/nixos/systemd.network.networks.<name>.canConfig | Each attribute in this set specifies an option in the
[CAN] section of the unit
|
| options/nixos/systemd.network.networks.<name>.pieConfig | Each attribute in this set specifies an option in the
[PIE] section of the unit
|
| options/nixos/services.httpd.virtualHosts.<name>.sslServerChain | Path to server SSL chain file.
|
| options/nixos/services.tarsnap.archives.<name>.maxbwRateUp | Upload bandwidth rate limit in bytes.
|
| options/home-manager/services.colima.profiles.<name>.isService | Whether this profile will run as a service.
|
| options/nixos/systemd.services.<name>.serviceConfig | Each attribute in this set specifies an option in the
[Service] section of the unit
|
| options/nixos/services.restic.backups.<name>.command | Command to pass to --stdin-from-command
|
| options/nixos/systemd.user.paths.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/systemd.network.netdevs.<name>.vrfConfig | Each attribute in this set specifies an option in the
[VRF] section of the unit
|
| options/home-manager/accounts.email.accounts.<name>.folders.inbox | Relative path of the inbox mail.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.hidden | Whether the node should occupy any space.
|
| options/nixos/services.borgbackup.repos.<name>.path | Where to store the backups
|
| options/nixos/security.pam.services.<name>.logFailures | Whether to log authentication failures in /var/log/faillog.
|
| options/nixos/services.tinc.networks.<name>.settings | Configuration of the Tinc daemon for this network
|
| options/home-manager/fonts.fontconfig.configFile.<name>.source | Config file to source
|
| options/home-manager/xdg.desktopEntries.<name>.categories | Categories in which the entry should be shown in a menu.
|
| options/nixos/services.nsd.zones.<name>.children | Children zones inherit all options of their parents
|
| options/home-manager/xdg.desktopEntries.<name>.startupNotify | If true, it is KNOWN that the application will send a "remove"
message when started with the DESKTOP_STARTUP_ID
environment variable set
|
| options/home-manager/programs.ripgrep-all.custom_adapters.*.name | The unique identifier and name of this adapter; must only include a-z, 0-9, _
|
| options/nixos/services.dokuwiki.sites.<name>.mergedConfig | Read only representation of the final configuration.
|
| options/nixos/services.anubis.instances.<name>.enable | Whether to enable this instance of Anubis.
|
| options/nixos/services.kmonad.keyboards.<name>.device | Path to the keyboard's device file.
|
| options/nixos/services.errbot.instances.<name>.admins | List of identifiers of errbot admins.
|
| options/nixos/services.firewalld.zones.<name>.icmpBlocks | ICMP types to block in the zone.
|
| options/nixos/services.restic.backups.<name>.progressFps | Controls the frequency of progress reporting.
|
| options/home-manager/services.restic.backups.<name>.progressFps | Controls the frequency of progress reporting.
|
| options/nixos/containers.<name>.extraVeths.<name>.forwardPorts.*.containerPort | Target port of container
|
| options/home-manager/programs.vscode.profiles.<name>.userTasks | Configuration written to Visual Studio Code's
tasks.json
|
| options/nixos/security.auditd.plugins.<name>.format | Binary passes the data exactly as the audit event dispatcher gets it from
the audit daemon
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.packages | List of ‹name› add-on packages to install for this profile
|
| options/home-manager/programs.irssi.networks.<name>.server.ssl.verify | Whether the SSL certificate should be verified.
|
| options/nixos/services.buildkite-agents.<name>.hooks | "Agent" hooks to install
|
| options/nixos/systemd.paths.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.wyoming.piper.servers.<name>.noiseScale | Generator noise value.
|
| options/nixos/systemd.user.services.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/home-manager/services.podman.volumes.<name>.extraPodmanArgs | Extra arguments to pass to the podman volume create command.
|
| options/nixos/services.geoclue2.appConfig.<name>.users | List of UIDs of all users for which this application is allowed location
info access, Defaults to an empty string to allow it for all users.
|
| options/nixos/containers.<name>.path | As an alternative to specifying
config, you can specify the path to
the evaluated NixOS system configuration, typically a
symlink to a system profile.
|
| options/nixos/services.netbird.clients.<name>.config | Additional configuration that exists before the first start and
later overrides the existing values in config.json
|
| options/nixos/services.netbird.tunnels.<name>.config | Additional configuration that exists before the first start and
later overrides the existing values in config.json
|
| options/nixos/services.drupal.sites.<name>.database.socket | Path to the unix socket file to use for authentication.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.enable | Whether to enable mujmap JMAP synchronization for notmuch.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.remove | Propagate mailbox deletions to the given mail store.
|
| options/home-manager/accounts.email.accounts.<name>.alot.extraConfig | Extra settings to add to this Alot account configuration.
|
| options/nixos/services.bluemap.storage.<name>.storage-type | Type of storage config
|
| options/nixos/services.awstats.configs.<name>.hostAliases | List of aliases the site has.
|
| options/nixos/services.opkssh.providers.<name>.clientId | OAuth client ID
|
| options/nixos/services.pgbackrest.repos.<name>.sftp-host | SFTP repository host
|
| options/nixos/services.redis.servers.<name>.databases | Set the number of databases.
|
| options/nixos/services.wordpress.sites.<name>.package | The wordpress package to use.
|
| options/home-manager/home.file.<name>.ignorelinks | When recursive is enabled, adds -ignorelinks flag to lndir
It causes lndir to not treat symbolic links in the source directory specially
|
| options/nixos/services.borgbackup.jobs.<name>.preHook | Shell commands to run before the backup
|
| options/nixos/networking.ucarp.downscript | Command to run after become backup, the interface name, virtual address
and optional extra parameters are passed as arguments.
|
| options/nixos/services.znapzend.zetup.<name>.mbuffer.size | The size for mbuffer
|
| options/nixos/fileSystems.<name>.overlay.upperdir | The path to the upperdir
|
| options/nixos/services.httpd.virtualHosts.<name>.enableACME | Whether to ask Let's Encrypt to sign a certificate for this vhost
|
| options/nixos/services.nginx.virtualHosts.<name>.enableACME | Whether to ask Let's Encrypt to sign a certificate for this vhost
|
| options/home-manager/programs.alot.tags.<name>.translated | Fixed string representation for this tag
|
| options/nixos/services.prometheus.exporters.unpoller.controllers.*.hash_pii | Hash, with md5, client names and MAC addresses
|
| options/nixos/systemd.user.services.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/services.pingvin-share.hostname | The domain name of your instance
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.follow | Whether focus should follow the node when it is moved.
|
| options/home-manager/accounts.email.accounts.<name>.folders.trash | Relative path of the deleted mail folder.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.sticky | Whether the node should stay on the focused desktop.
|
| options/darwin/launchd.agents.<name>.serviceConfig.MachServices | This optional key is used to specify Mach services to be registered with the Mach bootstrap sub-system
|
| options/nixos/services.caddy.virtualHosts.<name>.extraConfig | Additional lines of configuration appended to this virtual host in the
automatically generated Caddyfile.
|
| options/nixos/services.headscale.settings.dns.extra_records.*.name | DNS record name.
|
| options/nixos/services.wstunnel.clients.<name>.addNetBind | Whether to enable Whether add CAP_NET_BIND_SERVICE to the tunnel service, this should be enabled if you want to bind port < 1024.
|
| options/nixos/systemd.network.networks.<name>.ipoIBConfig | Each attribute in this set specifies an option in the
[IPoIB] section of the unit
|
| options/home-manager/programs.floorp.profiles.<name>.extraConfig | Extra preferences to add to user.js.
|
| options/nixos/services.tor.relay.onionServices.<name>.path | Path where to store the data files of the hidden service
|
| options/nixos/services.anubis.instances.<name>.user | The user under which Anubis is run
|
| options/nixos/security.pam.services.<name>.enableAppArmor | Enable support for attaching AppArmor profiles at the
user/group level, e.g., as part of a role based access
control scheme.
|
| options/nixos/services.k3s.autoDeployCharts.<name>.version | The version of the Helm chart
|
| options/nixos/boot.initrd.luks.devices.<name>.fido2.passwordLess | Defines whatever to use an empty string as a default salt
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.ksk.postPublish | How long after deactivation to keep a key in the zone
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.zsk.postPublish | How long after deactivation to keep a key in the zone
|
| options/nixos/services.dokuwiki.sites.<name>.usersFile | Location of the dokuwiki users file
|
| options/nixos/services.phpfpm.pools.<name>.settings | PHP-FPM pool directives
|
| options/nixos/services.drupal.sites.<name>.virtualHost.listen.*.port | Port to listen on
|
| options/nixos/services.wyoming.piper.servers.<name>.noiseWidth | Phoneme width noise value.
|
| options/home-manager/services.muchsync.remotes.<name>.remote.host | Remote SSH host to synchronize with.
|
| options/home-manager/accounts.contact.accounts.<name>.khal.enable | Whether to enable khal access.
|
| options/nixos/services.tarsnap.archives.<name>.period | Create archive at this interval
|
| options/home-manager/services.restic.backups.<name>.extraBackupArgs | Extra arguments passed to restic backup
|
| options/nixos/services.buildkite-agents.<name>.shell | Command that buildkite-agent 3 will execute when it spawns a shell.
|
| options/nixos/services.nylon.<name>.acceptInterface | Tell nylon which interface to listen for client requests on, default is "lo".
|
| options/darwin/services.buildkite-agents.<name>.shell | Command that buildkite-agent 3 will execute when it spawns a shell.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.filters | A list of filter to restrict traffic
|
| options/nixos/services.drupal.sites.<name>.virtualHost.listen.*.ssl | Whether to enable SSL (https) support.
|
| options/nixos/services.nginx.proxyCachePath.<name>.inactive | Cached data that has not been accessed for the time specified by
the inactive parameter is removed from the cache, regardless of
its freshness.
|
| options/nixos/systemd.user.slices.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.user.timers.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.vdirsyncer.jobs.<name>.enable | Whether to enable this vdirsyncer job.
|
| options/home-manager/services.podman.containers.<name>.exec | The command to run after the container start.
|
| options/home-manager/services.podman.containers.<name>.user | The user ID inside the container.
|
| options/nixos/services.nextcloud.config.dbname | Database name.
|
| options/home-manager/accounts.email.accounts.<name>.maildir.path | Path to maildir directory where mail for this account is
stored
|
| options/home-manager/accounts.contact.accounts.<name>.khal.color | Color in which events in this calendar are displayed
|
| options/nixos/services.jitsi-videobridge.xmppConfigs.<name>.hostName | Hostname of the XMPP server to connect to
|
| options/nixos/systemd.timers.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.slices.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.awstats.configs.<name>.logFormat | The log format being used
|
| options/nixos/services.znapzend.zetup.<name>.presnap | Command to run before snapshots are taken on the source dataset,
e.g. for database locking/flushing
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Umask | This optional key specifies what value should be passed to umask(2) before running the job
|
| options/nixos/systemd.services.<name>.requisite | Similar to requires
|
| options/nixos/fileSystems.<name>.overlay.lowerdir | The list of path(s) to the lowerdir(s)
|
| options/nixos/services.github-runners.<name>.url | Repository to add the runner to
|
| options/darwin/services.github-runners.<name>.url | Repository to add the runner to
|
| options/nixos/services.k3s.autoDeployCharts.<name>.values | Override default chart values via Nix expressions
|
| options/nixos/services.fluidd.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.gancio.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.fluidd.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.akkoma.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.akkoma.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.gancio.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.monica.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.monica.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.matomo.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.matomo.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.wstunnel.clients.<name>.soMark | Mark network packets with the SO_MARK sockoption with the specified value
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.recvBufferSize | If given, sets the SO_RCVBUF option on the TCP socket to the given number of bytes
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.sendBufferSize | If given, sets the SO_SNDBUF option on the TCP socket to the given number of bytes
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.recvBufferSize | If given, sets the SO_RCVBUF option on the TCP socket to the given number of bytes
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.sendBufferSize | If given, sets the SO_SNDBUF option on the TCP socket to the given number of bytes
|
| options/nixos/services.redis.servers.<name>.requirePass | Password for database (STORED PLAIN TEXT, WORLD-READABLE IN NIX STORE)
|
| options/darwin/launchd.daemons.<name>.serviceConfig.TimeOut | The recommended idle time out (in seconds) to pass to the job
|
| options/home-manager/launchd.agents.<name>.config.SessionCreate | This key specifies that the job should be spawned into a new security
audit session rather than the default session for the context is belongs
to
|
| options/nixos/services.printing.cups-pdf.instances.<name>.settings.Out | output directory;
${HOME} will be expanded to the user's home directory,
${USER} will be expanded to the user name.
|
| options/nixos/services.restic.backups.<name>.extraOptions | Extra extended options to be passed to the restic --option flag.
|
| options/nixos/services.easytier.instances.<name>.settings.network_name | EasyTier network name.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.marked | Whether the node will be marked for deferred actions.
|
| options/nixos/services.grafana.provision.alerting.muteTimings.settings.muteTimes.*.name | Name of the mute time interval, must be unique
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.WatchPaths | This optional key causes the job to be started if any one of the listed paths are modified.
|
| options/nixos/services.github-runners.<name>.workDir | Working directory, available as $GITHUB_WORKSPACE during workflow runs
and used as a default for repository checkouts
|
| options/darwin/programs.ssh.knownHosts.<name>.publicKeyFile | The path to the public key file for the host
|
| options/home-manager/accounts.calendar.accounts.<name>.local.path | The path of the storage.
|
| options/home-manager/accounts.calendar.accounts.<name>.local.type | The type of the storage.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.ExitTimeOut | The amount of time launchd waits before sending a SIGKILL signal
|
| options/nixos/services.kanata.keyboards.<name>.extraArgs | Extra command line arguments passed to kanata.
|
| options/home-manager/services.podman.networks.<name>.extraConfig | INI sections and values to populate the Network Quadlet
|
| options/nixos/services.anubis.instances.<name>.settings.POLICY_FNAME | The policy file to use
|
| options/nixos/services.drupal.sites.<name>.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| options/home-manager/programs.hexchat.channels.<name>.charset | Character set.
|
| options/home-manager/programs.hexchat.channels.<name>.options | Channel options.
|
| options/nixos/security.auditd.plugins.<name>.settings | Plugin-specific config file to link to /etc/audit/.conf
|
| options/nixos/programs.ssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| options/nixos/services.hostapd.radios.<name>.networks | This defines a BSS, colloquially known as a WiFi network
|
| options/darwin/programs.ssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| options/home-manager/programs.lutris.runners.<name>.settings | Settings passed directly to lutris for this runner's config at XDG_CONFIG/lutris/runners.
|
| options/home-manager/launchd.agents.<name>.config.RootDirectory | This optional key is used to specify a directory to chroot(2) to before running the job.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.localForwards | Specify local port forwardings
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.create | Automatically create missing mailboxes within the
given mail store.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.address | The address of this resource
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.id | IKE identity to use for authentication round
|
| options/nixos/systemd.network.networks.<name>.linkConfig | Each attribute in this set specifies an option in the
[Link] section of the unit
|
| options/nixos/systemd.user.services.<name>.serviceConfig | Each attribute in this set specifies an option in the
[Service] section of the unit
|
| options/nixos/systemd.network.networks.<name>.lldpConfig | Each attribute in this set specifies an option in the
[LLDP] section of the unit
|
| options/nixos/systemd.network.networks.<name>.cakeConfig | Each attribute in this set specifies an option in the
[CAKE] section of the unit
|
| options/nixos/services.bacula-sd.device.<name>.extraDeviceConfig | Extra configuration to be passed in Device directive.
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.settings.<name>.settings | Json formatted options for this extension.
|
| options/nixos/services.restic.backups.<name>.timerConfig | When to run the backup
|
| options/nixos/services.tor.relay.onionServices.<name>.version | See torrc manual.
|
| options/nixos/services.hostapd.radios.<name>.wifi6.require | Require stations (clients) to support WiFi 6 (HE) and disassociate them if they don't.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.locked | Whether the node should ignore node --close
messages.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.center | Whether the node will be put in the center, in floating mode.
|
| options/nixos/services.rke2.autoDeployCharts.<name>.extraDeploy | List of extra Kubernetes manifests to deploy with this Helm chart.
|
| options/home-manager/xdg.desktopEntries.<name>.prefersNonDefaultGPU | If true, the application prefers to be run on a more powerful discrete GPU if available.
|
| options/nixos/systemd.timers.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/systemd.slices.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/services.buildkite-agents.<name>.enable | Whether to enable this buildkite agent
|
| options/darwin/services.buildkite-agents.<name>.enable | Whether to enable this buildkite agent
|
| options/nixos/services.borgbackup.jobs.<name>.group | The group borg is run as
|
| options/nixos/services.httpd.virtualHosts.<name>.extraConfig | These lines go to httpd.conf verbatim
|
| options/nixos/systemd.network.networks.<name>.gateway | A list of gateways to be added to the network section of the
unit
|
| options/nixos/services.iodine.clients.<name>.passwordFile | Path to a file containing the password.
|
| options/nixos/services.restic.backups.<name>.passwordFile | Read the repository password from a file.
|
| options/home-manager/services.podman.containers.<name>.userNS | Use a user namespace for the container.
|
| options/home-manager/services.restic.backups.<name>.passwordFile | A file containing the repository password.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.MachServices | This optional key is used to specify Mach services to be registered with the Mach bootstrap sub-system
|
| options/nixos/services.restic.backups.<name>.rcloneConfig | Configuration for the rclone remote being used for backup
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert | Section for a certificate candidate to use for
authentication
|
| options/nixos/services.znc.confOptions.networks.<name>.server | IRC server address.
|
| options/nixos/services.easytier.instances.<name>.settings.hostname | Hostname shown in peer list and web console.
|
| options/nixos/services.anubis.instances.<name>.policy | Anubis policy configuration
|
| options/nixos/systemd.user.paths.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/services.fedimintd.<name>.nginx.config.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/containers.<name>.extraVeths | Extra veth-pairs to be created for the container.
|
| options/nixos/services.wstunnel.servers.<name>.package | The wstunnel package to use.
|
| options/nixos/services.wstunnel.clients.<name>.package | The wstunnel package to use.
|
| options/home-manager/programs.neovim.extraName | Extra name appended to the wrapper package name.
|
| options/nixos/boot.loader.grub.users.<name>.hashedPasswordFile | Specifies the path to a file containing the password hash
for the account, generated with grub-mkpasswd-pbkdf2
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StartOnMount | This optional key causes the job to be started every time a filesystem is mounted.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.serverAliveCountMax | Sets the number of server alive messages which may be sent
without SSH receiving any messages back from the server.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.extraBinds | Extra bindings specific to this account, added to
$HOME/.config/aerc/binds.conf
|
| options/home-manager/xdg.dataFile.<name>.ignorelinks | When recursive is enabled, adds -ignorelinks flag to lndir
It causes lndir to not treat symbolic links in the source directory specially
|
| options/nixos/services.borgbackup.jobs.<name>.postPrune | Shell commands to run after borg prune.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.controlPersist | Whether control socket should remain open in the background.
|
| options/nixos/programs.schroot.profiles.<name>.fstab | A file in the format described in fstab(5), used to mount filesystems inside the chroot
|
| options/nixos/services.hostapd.radios.<name>.wifi7.enable | Enables support for IEEE 802.11be (WiFi 7, EHT)
|
| options/nixos/services.hostapd.radios.<name>.wifi4.enable | Enables support for IEEE 802.11n (WiFi 4, HT)
|
| options/nixos/services.dokuwiki.sites.<name>.plugins | List of path(s) to respective plugin(s) which are copied into the 'plugin' directory.
These plugins need to be packaged before use, see example.
|
| options/nixos/services.netbird.clients.<name>.autoStart | Start the service with the system
|
| options/nixos/services.openvpn.servers.<name>.config | Configuration of this OpenVPN instance
|
| options/nixos/services.netbird.tunnels.<name>.autoStart | Start the service with the system
|
| options/nixos/services.davis.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.movim.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.slskd.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/programs.xfs_quota.projects.<name>.path | Project directory.
|
| options/home-manager/services.podman.containers.<name>.image | The container image.
|
| options/home-manager/programs.librewolf.profiles.<name>.path | Profile path.
|
| options/nixos/services.bepasty.servers.<name>.extraConfig | Extra configuration for bepasty server to be appended on the
configuration.
see https://bepasty-server.readthedocs.org/en/latest/quickstart.html#configuring-bepasty
for all options.
|
| options/nixos/services.hostapd.radios.<name>.wifi4.require | Require stations (clients) to support WiFi 4 (HT) and disassociate them if they don't.
|
| options/nixos/services.hostapd.radios.<name>.wifi5.require | Require stations (clients) to support WiFi 5 (VHT) and disassociate them if they don't.
|
| options/nixos/services.nbd.server.exports.<name>.extraOptions | Extra options for this export
|
| options/nixos/services.netbird.clients.<name>.login.setupKeyFile | A Setup Key file path used for automated login of the machine.
|
| options/nixos/services.netbird.tunnels.<name>.login.setupKeyFile | A Setup Key file path used for automated login of the machine.
|
| options/home-manager/accounts.calendar.accounts.<name>.khal.glob | The glob expansion to be searched for events or birthdays when
type is set to discover.
|
| options/nixos/boot.initrd.luks.devices.<name>.allowDiscards | Whether to allow TRIM requests to the underlying device
|
| options/nixos/services.openafsServer.roles.backup.cellServDB.<name>.*.ip | IP Address of a database server
|
| options/nixos/systemd.network.networks.<name>.macvtap | A list of macvtap interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.network.netdevs.<name>.tunnelConfig | Each attribute in this set specifies an option in the
[Tunnel] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.bridgeConfig | Each attribute in this set specifies an option in the
[Bridge] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.netdevConfig | Each attribute in this set specifies an option in the
[Netdev] section of the unit
|
| options/nixos/systemd.network.networks.<name>.macvlan | A list of macvlan interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.network.netdevs.<name>.ipvlanConfig | Each attribute in this set specifies an option in the [IPVLAN] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.ipvtapConfig | Each attribute in this set specifies an option in the [IPVTAP] section of the unit
|
| options/nixos/services.hostapd.radios.<name>.driver | The driver hostapd will use.
nl80211 is used with all Linux mac80211 drivers.
none is used if building a standalone RADIUS server that does
not control any wireless/wired driver
|
| options/nixos/services.redis.servers.<name>.masterAuth | If the master is password protected (using the requirePass configuration)
it is possible to tell the slave to authenticate before starting the replication synchronization
process, otherwise the master will refuse the slave request.
(STORED PLAIN TEXT, WORLD-READABLE IN NIX STORE)
|
| options/nixos/services.tarsnap.archives.<name>.maxbwRateDown | Download bandwidth rate limit in bytes.
|
| options/nixos/services.tinc.networks.<name>.listenAddress | The ip address to listen on for incoming connections.
|
| options/home-manager/programs.floorp.profiles.<name>.userContent | Custom Floorp user content CSS.
|
| options/home-manager/programs.firefox.profiles.<name>.userChrome | Custom Firefox user chrome CSS.
|
| options/darwin/launchd.agents.<name>.environment | Environment variables passed to the service's processes.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.sslServerCert | Path to server SSL certificate.
|
| options/home-manager/accounts.email.accounts.<name>.meli.settings | Account specific meli configuration
|
| options/nixos/systemd.network.netdevs.<name>.matchConfig | Each attribute in this set specifies an option in the
[Match] section of the unit
|
| options/nixos/systemd.user.slices.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.user.timers.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.drupal.sites.<name>.virtualHost.servedDirs | This option provides a simple way to serve static directories.
|
| options/home-manager/services.kanshi.profiles.<name>.outputs.*.criteria | The criteria can either be an output name, an output description or "*"
|
| options/nixos/systemd.services.<name>.restartIfChanged | Whether the service should be restarted during a NixOS
configuration switch if its definition has changed.
|
| options/nixos/services.firewalld.zones.<name>.sources.*.mac | A MAC address.
|
| options/nixos/services.firewalld.zones.<name>.sourcePorts | Source ports to allow in the zone.
|
| options/home-manager/services.unison.pairs.<name>.stateDirectory | Unison state directory to use.
|
| options/home-manager/programs.hexchat.channels.<name>.servers | IRC Server Address List.
|
| options/nixos/services.postfix.masterConfig.<name>.wakeup | Automatically wake up the service after the specified number of
seconds
|
| options/nixos/systemd.user.services.<name>.requisite | Similar to requires
|
| options/home-manager/launchd.agents.<name>.config.StandardErrorPath | This optional key specifies what file should be used for data being sent to stderr when using stdio(3).
|
| options/home-manager/launchd.agents.<name>.config.EnableGlobbing | This flag causes launchd to use the glob(3) mechanism to update the program arguments before invocation.
|
| options/nixos/services.geoclue2.appConfig.<name>.desktopID | Desktop ID of the application.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.interface | Optional interface name to restrict outbound IPsec policies.
|
| options/nixos/services.gancio.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.akkoma.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.fluidd.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.monica.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.matomo.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/home-manager/accounts.email.accounts.<name>.neomutt.enable | Whether to enable NeoMutt.
|
| options/home-manager/programs.irssi.networks.<name>.server.address | Address of the chat server.
|
| options/home-manager/accounts.email.accounts.<name>.astroid.enable | Whether to enable Astroid.
|
| options/nixos/services.snapper.configs.<name>.ALLOW_USERS | List of users allowed to operate with the config. "root" is always
implicitly included
|
| options/nixos/services.mpdscribble.endpoints.<name>.username | Username for the scrobble service.
|
| options/home-manager/services.mpdscribble.endpoints.<name>.username | Username for the scrobble service.
|
| options/nixos/services.hostapd.radios.<name>.channel | The channel to operate on
|
| options/darwin/launchd.agents.<name>.serviceConfig.GroupName | This optional key specifies the group to run the job as
|
| options/home-manager/programs.lutris.runners.<name>.package | The package to use for this runner, nix will try to find the executable for this package
|
| options/nixos/services.fedimintd.<name>.nginx.path_ws | Path to host the API on and forward to the daemon's api port
|
| options/home-manager/programs.i3status-rust.bars.<name>.settings | Any extra options to add to i3status-rust
config.
|
| options/home-manager/programs.librewolf.profiles.<name>.id | Profile ID
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/home-manager/services.podman.networks.<name>.internal | Whether the network should be internal
|
| options/home-manager/accounts.calendar.accounts.<name>.remote | Remote configuration for the calendar.
|
| options/home-manager/programs.firefox.profiles.<name>.isDefault | Whether this is a default profile.
|
| options/home-manager/accounts.calendar.accounts.<name>.khal.type | Either a single calendar (calendar which is the default) or a directory with multiple calendars (discover).
|
| options/darwin/system.activationScripts.<name>.source | Path of the source file.
|
| options/nixos/services.github-runners.<name>.extraLabels | Extra labels in addition to the default (unless disabled through the noDefaultLabels option)
|
| options/darwin/services.github-runners.<name>.extraLabels | Extra labels in addition to the default (unless disabled through the noDefaultLabels option)
|
| options/home-manager/accounts.calendar.accounts.<name>.remote.url | The URL of the storage.
|
| options/nixos/services.borgbackup.repos.<name>.user | The user borg serve is run as
|
| options/home-manager/launchd.agents.<name>.config.LimitLoadToSessionType | This configuration file only applies to sessions of the type specified
|
| options/home-manager/accounts.email.accounts.<name>.flavor | Some email providers have peculiar behavior that require
special treatment
|
| options/nixos/services.ytdl-sub.instances.<name>.readWritePaths | List of paths that ytdl-sub can write to.
|
| options/home-manager/programs.smug.projects.<name>.windows.*.layout | Layout of window when opening panes.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.localForwards.*.host | Host port binding options
|
| options/home-manager/programs.smug.projects.<name>.windows.*.panes.*.type | Type of pane.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.localForwards.*.bind | Local port binding options
|
| options/nixos/services.lemmy.settings.hostname | The domain name of your instance (eg 'lemmy.ml').
|
| options/nixos/services.snipe-it.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/home-manager/systemd.user.paths.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Umask | This optional key specifies what value should be passed to umask(2) before running the job
|
| options/nixos/systemd.shutdownRamfs.contents.<name>.target | Path of the symlink.
|
| options/darwin/environment.userLaunchAgents.<name>.text | Text of the file.
|
| options/nixos/containers.<name>.bindMounts | An extra list of directories that is bound to the container.
|
| options/nixos/services.anubis.instances | An attribute set of Anubis instances
|
| options/nixos/services.anubis.instances.<name>.settings.METRICS_BIND | The address Anubis' metrics server listens to
|
| options/darwin/launchd.daemons.<name>.serviceConfig.WatchPaths | This optional key causes the job to be started if any one of the listed paths are modified.
|
| options/nixos/services.jibri.xmppEnvironments.<name>.call.login.username | User part of the JID for the recorder.
|
| options/nixos/services.anubis.instances.<name>.settings.SERVE_ROBOTS_TXT | Whether to serve a default robots.txt that denies access to common AI bots by name and all other
bots by wildcard.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.logFormat | Log format for Apache's log files
|
| options/home-manager/programs.floorp.profiles.<name>.search.order | The order the search engines are listed in
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags.deleted | Tag for notmuch to use for messages stored in the mailbox labeled with the
Trash name attribute
|
| options/nixos/systemd.network.networks.<name>.dhcpV4Config | Each attribute in this set specifies an option in the
[DHCPv4] section of the unit
|
| options/nixos/systemd.network.networks.<name>.dhcpV6Config | Each attribute in this set specifies an option in the
[DHCPv6] section of the unit
|
| options/nixos/systemd.services.<name>.confinement.mode | The value full-apivfs (the default) sets up
private /dev, /proc,
/sys, /tmp and /var/tmp file systems
in a separate user name space
|
| options/nixos/services.anubis.instances.<name>.extraFlags | A list of extra flags to be passed to Anubis.
|
| options/nixos/services.syncoid.commands.<name>.service | Systemd configuration specific to this syncoid service.
|
| options/nixos/services.nginx.upstreams.<name>.extraConfig | These lines go to the end of the upstream verbatim.
|
| options/nixos/services.tarsnap.archives.<name>.verbose | Whether to produce verbose logging output.
|
| options/nixos/services.vault-agent.instances.<name>.enable | Whether to enable this vault-agent instance.
|
| options/darwin/security.sandbox.profiles.<name>.closure | List of store paths to make accessible.
|
| options/nixos/security.pam.services.<name>.kwallet.package | The kwallet-pam package to use.
|
| options/nixos/services.sabnzbd.settings.servers.<name>.ssl | Whether the server supports TLS
|
| options/nixos/services.znapzend.zetup.<name>.mbuffer.enable | Whether to use mbuffer.
|
| options/home-manager/accounts.email.accounts.<name>.notmuch.enable | Whether to enable notmuch indexing.
|
| options/home-manager/accounts.contact.accounts.<name>.khard.enable | Whether to enable khard access.
|
| options/nixos/services.anubis.instances.<name>.group | The group under which Anubis is run
|
| options/nixos/systemd.user.slices.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/services.wordpress.sites.<name>.themes | Path(s) to respective theme(s) which are copied from the 'theme' directory.
These themes need to be packaged before use, see example.
|
| options/nixos/systemd.user.timers.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/darwin/launchd.daemons.<name>.serviceConfig.ExitTimeOut | The amount of time launchd waits before sending a SIGKILL signal
|
| options/nixos/services.logcheck.ignoreCron.<name>.timeArgs | "min hr dom mon dow" crontab time args, to auto-create a cronjob too
|
| options/home-manager/services.colima.profiles.<name>.isActive | Whether to set this profile as:
- active docker context
- active kubernetes context
- active incus remote
Exactly one or zero profiles should have this option set.
|
| options/home-manager/services.restic.backups.<name>.timerConfig | When to run the backup
|
| options/nixos/services.anki-sync-server.users.*.username | User name accepted by anki-sync-server.
|
| options/nixos/services.orangefs.server.fileSystems.<name>.id | File system ID (must be unique within configuration).
|
| options/nixos/services.dokuwiki.sites.<name>.extraConfigs | Path(s) to additional configuration files that are then linked to the 'conf' directory.
|
| options/nixos/services.borgbackup.jobs.<name>.extraArgs | Additional arguments for all borg calls the
service has
|
| options/nixos/services.fedimintd.<name>.nginx.path_ui | Path to host the built-in UI on and forward to the daemon's api port
|
| options/nixos/users.extraUsers.<name>.ignoreShellProgramCheck | By default, nixos will check that programs
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/image.repart.partitions.<name>.contents | The contents to end up in the filesystem image.
|
| options/nixos/services.blockbook-frontend.<name>.rpc.url | URL for JSON-RPC connections.
|
| options/nixos/services.jupyterhub.kernels.<name>.env | Environment variables to set for the kernel.
|
| options/nixos/services.prosody.virtualHosts.<name>.enabled | Whether to enable the virtual host
|
| options/nixos/services.sanoid.datasets.<name>.autosnap | Whether to automatically take snapshots.
|
| options/nixos/services.webhook.hooks.<name>.execute-command | The command that should be executed when the hook is triggered.
|
| options/nixos/services.wstunnel.clients.<name>.connectTo | Server address and port to connect to.
|
| options/home-manager/programs.irssi.networks.<name>.autoCommands | List of commands to execute on connect.
|
| options/home-manager/services.podman.containers.<name>.group | The group ID inside the container.
|
| options/home-manager/services.podman.containers.<name>.ports | A mapping of ports between host and container
|
| options/home-manager/services.restic.backups.<name>.pruneOpts | A list of policy options for 'restic forget --prune', to automatically
prune old snapshots
|
| options/nixos/services.gitlab-runner.services.<name>.tagList | Tag list
|
| options/home-manager/services.restic.backups.<name>.extraOptions | Extra extended options to be passed to the restic -o flag
|
| options/nixos/services.wyoming.piper.servers.<name>.lengthScale | Phoneme length value.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.app | Settings to write to app.json.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.monitor | The monitor where the rule should be applied.
|
| options/home-manager/accounts.calendar.accounts.<name>.local.fileExt | The file extension to use.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.desktop | The desktop where the rule should be applied.
|
| options/nixos/systemd.sockets.<name>.listenDatagrams | For each item in this list, a ListenDatagram
option in the [Socket] section will be created.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert | Section for a certificate candidate to use for
authentication
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.eap_id | Client EAP-Identity to use in EAP-Identity exchange and the EAP method.
|
| options/nixos/services.borgbackup.jobs.<name>.doInit | Run borg init if the
specified repo does not exist
|
| options/nixos/services.drupal.sites.<name>.virtualHost.enableUserDir | Whether to enable serving ~/public_html as
/~«username».
|
| options/nixos/services.neo4j.ssl.policies.<name>.tlsVersions | Restrict the TLS protocol versions of this policy to those
defined here.
|
| options/nixos/services.wyoming.piper.servers.<name>.speaker | ID of a specific speaker in a multi-speaker model.
|
| options/nixos/systemd.targets.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.sockets.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.gitlab-runner.services.<name>.description | Name/description of the runner.
|
| options/nixos/services.akkoma.frontends.<name>.package | Akkoma frontend package.
|
| options/nixos/services.sanoid.templates.<name>.monthly | Number of monthly snapshots.
|
| options/nixos/services.vdirsyncer.jobs.<name>.configFile | existing configuration file
|
| options/nixos/systemd.shutdownRamfs.contents.<name>.source | Path of the source file.
|
| options/nixos/services.sabnzbd.settings.servers.<name>.host | Hostname of the server
|
| options/nixos/services.sabnzbd.settings.servers.<name>.port | Port of the server
|
| options/darwin/launchd.daemons.<name>.serviceConfig.MachServices | This optional key is used to specify Mach services to be registered with the Mach bootstrap sub-system
|
| options/nixos/services.snapper.configs.<name>.ALLOW_GROUPS | List of groups allowed to operate with the config
|
| options/nixos/services.rspamd.overrides.<name>.enable | Whether this file overrides should be generated
|
| options/nixos/systemd.timers.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/systemd.slices.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/services.nebula.networks.<name>.tun.disable | When tun is disabled, a lighthouse can be started without a local tun interface (and therefore without root).
|
| options/nixos/services.k3s.autoDeployCharts.<name>.enable | Whether to enable the installation of this Helm chart
|
| options/nixos/services.postfix.masterConfig.<name>.chroot | Whether the service is chrooted to have only access to the
services.postfix.queueDir and the closure of
store paths specified by the program option.
|
| options/nixos/services.syncoid.commands.<name>.target | Target ZFS dataset
|
| options/home-manager/services.podman.machines.<name>.volumes | Volumes to mount in the machine, specified as source:target pairs
|
| options/home-manager/accounts.email.accounts.<name>.folders.drafts | Relative path of the drafts mail folder.
|
| options/home-manager/accounts.calendar.accounts.<name>.khal.readOnly | Keep khal from making any changes to this account.
|
| options/nixos/services.spiped.config.<name>.resolveRefresh | Resolution refresh time for the target socket, in seconds.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.id | IKE identity to expect for authentication round
|
| options/nixos/services.sabnzbd.settings.servers.<name>.displayname | Human-friendly description of the server
|
| options/nixos/services.mailpit.instances.<name>.max | Maximum number of emails to keep
|
| options/nixos/services.nginx.virtualHosts.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.rsa.<name>.file | File name in the rsa folder for which this passphrase
should be used.
|
| options/nixos/services.rsync.jobs.<name>.destination | Destination directory.
|
| options/darwin/environment.launchDaemons.<name>.text | Text of the file.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.StartOnMount | This optional key causes the job to be started every time a filesystem is mounted.
|
| options/nixos/services.inadyn.settings.custom.<name>.ddns-path | DDNS server path
|
| options/nixos/systemd.services.<name>.enableDefaultPath | Whether to append a minimal default PATH environment variable to the service, containing common system utilities.
|
| options/nixos/systemd.network.networks.<name>.qdiscConfig | Each attribute in this set specifies an option in the
[QDisc] section of the unit
|
| options/nixos/systemd.network.networks.<name>.pfifoConfig | Each attribute in this set specifies an option in the
[PFIFO] section of the unit
|
| options/nixos/systemd.network.networks.<name>.bfifoConfig | Each attribute in this set specifies an option in the
[BFIFO] section of the unit
|
| options/nixos/boot.initrd.luks.devices.<name>.fido2.credential | The FIDO2 credential ID.
|
| options/nixos/boot.loader.grub.extraFiles | A set of files to be copied to /boot
|
| options/nixos/services.v4l2-relayd.instances.<name>.enable | Whether to enable this v4l2-relayd instance.
|
| options/darwin/launchd.user.agents.<name>.environment | Environment variables passed to the service's processes.
|
| options/nixos/networking.nat.externalInterface | The name of the external network interface.
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.splitRatio | The ratio between the new window and the previous existing window in
the desktop.
|
| options/nixos/services.github-runners.<name>.nodeRuntimes | List of Node.js runtimes the runner should support.
|
| options/darwin/services.github-runners.<name>.nodeRuntimes | List of Node.js runtimes the runner should support.
|
| options/nixos/systemd.user.services.<name>.restartIfChanged | Whether the service should be restarted during a NixOS
configuration switch if its definition has changed.
|
| options/home-manager/programs.smug.projects.<name>.windows.*.manual | Start window only manually, using the -w arg
|
| options/nixos/services.nginx.virtualHosts.<name>.http2 | Whether to enable the HTTP/2 protocol
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.ports.*.to | The end of the port range, inclusive.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.http2 | Whether to enable HTTP 2
|
| options/home-manager/accounts.email.accounts.<name>.getmail.readAll | Enable if you want to fetch all, even the read messages from the
server
|
| options/nixos/services.wstunnel.servers.<name>.enableHTTPS | Use HTTPS for the tunnel server.
|
| options/nixos/services.errbot.instances.<name>.plugins | List of errbot plugin derivations.
|
| options/nixos/services.restic.backups.<name>.inhibitsSleep | Prevents the system from sleeping while backing up.
|
| options/nixos/services.kanata.keyboards.<name>.config | Configuration other than defcfg
|
| options/nixos/services.wordpress.sites.<name>.poolConfig | Options for the WordPress PHP pool
|
| options/nixos/services.firezone.server.provision.accounts.<name>.auth | All authentication providers to provision
|
| options/home-manager/programs.opencode.tools | Custom tools for opencode
|
| options/nixos/services.spiped.config.<name>.source | Address on which spiped should listen for incoming
connections
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.round | Optional numeric identifier by which authentication rounds are
sorted
|
| options/nixos/services.wstunnel.servers.<name>.listen | Address and port to listen on
|
| options/home-manager/services.podman.volumes.<name>.preserve | Whether the volume should be preserved if it is removed from the configuration
|
| options/home-manager/accounts.email.accounts.<name>.getmail.enable | Whether to enable the getmail mail retriever for this account.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.ports | Either a single port or port range to allow
|
| options/nixos/services.openssh.knownHosts.<name>.publicKey | The public key data for the host
|
| options/nixos/services.davis.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.davis.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.movim.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.slskd.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.movim.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.slskd.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/home-manager/accounts.email.accounts.<name>.msmtp.extraConfig | Extra configuration options to add to ~/.msmtprc
|
| options/nixos/services.quicktun.<name>.remoteAddress | IP address or hostname of the remote end (use 0.0.0.0 for a floating/dynamic remote endpoint).
|
| options/nixos/services.snapserver.streams.<name>.type | The type of input stream.
|
| options/home-manager/services.xsuspender.rules.<name>.resumeFor | Resume duration in seconds.
|
| options/home-manager/accounts.calendar.accounts.<name>.remote.type | The type of the storage.
|
| options/home-manager/programs.rclone.remotes.<name>.mounts | An attribute set mapping remote file paths to their corresponding mount
point configurations
|
| options/nixos/services.acme-dns.settings.general.nsname | Zone name server.
|
| options/nixos/services.fedimintd.<name>.nginx.config.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.jibri.xmppEnvironments.<name>.control.muc.roomName | The room name of the MUC to connect to for control.
|
| options/nixos/services.inadyn.settings.provider.<name>.ssl | Whether to use HTTPS for this DDNS provider.
|
| options/nixos/services.fedimintd.<name>.api_iroh.bind | Address to bind on for Iroh endpoint for API connections
|
| options/nixos/services.syncoid.commands.<name>.useCommonArgs | Whether to add the configured common arguments to this command.
|
| options/nixos/services.openssh.knownHosts.<name>.extraHostNames | A list of additional host names and/or IP numbers used for
accessing the host's ssh service
|
| options/nixos/services.wstunnel.servers.<name>.useACMEHost | Use a certificate generated by the NixOS ACME module for the given host
|
| options/nixos/services.znc.confOptions.networks.<name>.extraConf | Extra config for the network
|
| options/nixos/services.firewalld.zones.<name>.sourcePorts.*.port | |
| options/nixos/services.firewalld.services.<name>.ports | Ports of the service.
|
| options/home-manager/programs.papis.libraries.<name>.settings | Configuration for this library.
|
| options/home-manager/accounts.email.accounts.<name>.signature | Signature configuration.
|
| options/darwin/services.buildkite-agents.<name>.hooks.pre-exit | The pre-exit hook will run just before your build job finishes
|
| options/home-manager/programs.ssh.matchBlocks.<name>.remoteForwards | Specify remote port forwardings
|
| options/nixos/services.dependency-track.oidc.usernameClaim | Defines the name of the claim that contains the username in the provider's userinfo endpoint
|
| options/home-manager/programs.thunderbird.profiles.<name>.extensions | List of ‹name› add-on packages to install for this profile
|
| options/home-manager/xdg.stateFile.<name>.ignorelinks | When recursive is enabled, adds -ignorelinks flag to lndir
It causes lndir to not treat symbolic links in the source directory specially
|
| options/home-manager/xdg.cacheFile.<name>.ignorelinks | When recursive is enabled, adds -ignorelinks flag to lndir
It causes lndir to not treat symbolic links in the source directory specially
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.GroupName | This optional key specifies the group to run the job as
|
| options/nixos/services.fedimintd.<name>.nginx.config.quic | Whether to enable the QUIC transport protocol
|
| options/nixos/services.httpd.virtualHosts.<name>.forceSSL | Whether to add a separate nginx server block that permanently redirects (301)
all plain HTTP traffic to HTTPS
|
| options/nixos/services.v4l2-relayd.instances.<name>.input.width | The width to read from input-stream.
|
| options/nixos/services.gitlab-runner.services.<name>.limit | Limit how many jobs can be handled concurrently by this service.
0 (default) simply means don't limit.
|
| options/darwin/services.gitlab-runner.services.<name>.limit | Limit how many jobs can be handled concurrently by this service.
0 (default) simply means don't limit.
|
| options/nixos/services.dokuwiki.sites.<name>.pluginsConfig | List of the dokuwiki (un)loaded plugins.
|
| options/nixos/services.public-inbox.inboxes.<name>.coderepo | Nicknames of a 'coderepo' section associated with the inbox.
|
| options/nixos/services.mailpit.instances.<name>.listen | HTTP bind interface and port for UI.
|
| options/nixos/systemd.shutdownRamfs.contents.<name>.enable | Whether to enable copying of this file and symlinking it.
|
| options/home-manager/services.kanshi.profiles.<name>.outputs.*.alias | Defines an alias for the output
|
| options/home-manager/programs.firefox.profiles.<name>.extraConfig | Extra preferences to add to user.js.
|
| options/nixos/services.rke2.autoDeployCharts.<name>.version | The version of the Helm chart
|
| options/nixos/systemd.user.sockets.<name>.listenDatagrams | For each item in this list, a ListenDatagram
option in the [Socket] section will be created.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.virtualIps.*.dev | The name of the device to add the address to.
|
| options/nixos/services.vdirsyncer.jobs.<name>.config.pairs | vdirsyncer pair configurations
|
| options/nixos/services.blockbook-frontend.<name>.rpc.port | Port for JSON-RPC connections.
|
| options/nixos/services.blockbook-frontend.<name>.rpc.user | Username for JSON-RPC connections.
|
| options/nixos/services.jupyterhub.kernels.<name>.argv | Command and arguments to start the kernel.
|
| options/nixos/services.sanoid.datasets.<name>.useTemplate | Names of the templates to use for this dataset.
|
| options/nixos/systemd.user.targets.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.user.sockets.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.caddy.virtualHosts.<name>.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/home-manager/programs.ssh.matchBlocks.<name>.localForwards.*.host.port | Specifies port number to forward to.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.private | Whether the node should stay in the same tiling position and size.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.localForwards.*.bind.port | Specifies port number to bind to.
|
| options/nixos/services.geoclue2.appConfig.<name>.isAllowed | Whether the application will be allowed access to location information.
|
| options/nixos/services.fedimintd.<name>.api_iroh.port | UDP Port to bind Iroh endpoint for API connections
|
| options/nixos/services.nebula.networks.<name>.settings | Nebula configuration
|
| options/nixos/systemd.user.slices.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/systemd.user.timers.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/home-manager/services.podman.networks.<name>.extraPodmanArgs | Extra arguments to pass to the podman network create command.
|
| options/home-manager/services.podman.machines.<name>.timezone | Timezone to set in the machine
|
| options/nixos/services.snipe-it.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.firewalld.zones.<name>.services | Services to allow in the zone.
|
| options/nixos/services.firewalld.services.<name>.short | Short description for the service.
|
| options/nixos/services.autorandr.profiles.<name>.hooks | Profile hook scripts.
|
| options/nixos/services.znapzend.zetup.<name>.recursive | Whether to do recursive snapshots.
|
| options/home-manager/programs.autorandr.profiles.<name>.hooks | Profile hook scripts.
|
| options/nixos/services.postfix.settings.master.<name>.args | Arguments to pass to the command
|
| options/nixos/boot.specialFileSystems.<name>.device | The device as passed to mount
|
| options/nixos/services.logcheck.ignoreCron.<name>.cmdline | Command line for the cron job
|
| options/home-manager/accounts.email.accounts.<name>.jmap.sessionUrl | URL for the JMAP Session resource
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.settings.<name>.permissions | Allowed permissions for this extension
|
| options/nixos/systemd.sockets.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.targets.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.drupal.sites.<name>.virtualHost.sslServerChain | Path to server SSL chain file.
|
| options/nixos/services.akkoma.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.gancio.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.fluidd.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.monica.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.matomo.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.rke2.autoDeployCharts.<name>.values | Override default chart values via Nix expressions
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.ports.*.from | The start of the port range, inclusive.
|
| options/nixos/services.borgbackup.repos.<name>.group | The group borg serve is run as
|
| options/nixos/systemd.user.services.<name>.enableDefaultPath | Whether to append a minimal default PATH environment variable to the service, containing common system utilities.
|
| options/nixos/services.znapzend.zetup.<name>.postsnap | Command to run after snapshots are taken on the source dataset,
e.g. for database unlocking
|
| options/nixos/services.fedimintd.<name>.ui.openFirewall | Opens TCP port in firewall for built-in UI
|
| options/nixos/services.klipper.firmwares.<name>.enable | Whether to enable building of firmware for manual flashing
.
|
| options/nixos/services.public-inbox.inboxes.<name>.inboxdir | The absolute path to the directory which hosts the public-inbox.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors | The terminal colors, null to use system default.
|
| options/home-manager/services.podman.machines.<name>.rootful | Whether to run the machine in rootful mode
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.expunge | Permanently remove messages marked for deletion from
the given mail store.
|
| options/nixos/services.bepasty.servers.<name>.secretKey | server secret for safe session cookies, must be set
|
| options/nixos/services.tahoe.introducers.<name>.tub.port | The port on which the introducer will listen.
|
| options/home-manager/accounts.calendar.accounts.<name>.qcal.enable | Whether to enable qcal access.
|
| options/home-manager/accounts.calendar.accounts.<name>.khal.enable | Whether to enable khal access.
|
| options/nixos/systemd.network.netdevs.<name>.l2tpSessions | Each item in this array specifies an option in the
[L2TPSession] section of the unit
|
| options/nixos/systemd.network.networks.<name>.ipv6SendRAConfig | Each attribute in this set specifies an option in the
[IPv6SendRA] section of the unit
|
| options/nixos/services.wstunnel.clients.<name>.localToRemote | Listen on local and forwards traffic from remote.
|
| options/nixos/services.prosody.virtualHosts.<name>.extraConfig | Additional virtual host specific configuration
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.certs | List of certificates to accept for authentication
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/darwin/launchd.agents.<name>.serviceConfig.ServiceIPC | This optional key specifies whether the job participates in advanced
communication with launchd
|
| options/darwin/launchd.agents.<name>.serviceConfig.OnDemand | This key was used in Mac OS X 10.4 to control whether a job was kept alive or not
|
| options/home-manager/accounts.calendar.accounts.<name>.khal.color | Color in which events in this calendar are displayed
|
| options/home-manager/services.colima.profiles.<name>.settings | Colima configuration settings, see https://github.com/abiosoft/colima/blob/main/embedded/defaults/colima.yaml or run colima template.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.ignoreBroadcastSsid | Send empty SSID in beacons and ignore probe request frames that do not
specify full SSID, i.e., require stations to know SSID
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.algorithm | Which algorithm to use for DNSSEC
|
| options/nixos/services.gancio.settings.hostname | The domain name under which the server is reachable.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.enableACME | Whether to ask Let's Encrypt to sign a certificate for this vhost
|
| options/nixos/services.nginx.virtualHosts.<name>.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| options/nixos/services.errbot.instances.<name>.extraConfig | String to be appended to the config verbatim
|
| options/nixos/services.wordpress.sites.<name>.mergedConfig | Read only representation of the final configuration.
|
| options/home-manager/i18n.inputMethod.fcitx5.themes.<name>.highlightImage | Path to the SVG of the highlight.
|
| options/nixos/services.frp.instances.<name>.settings | Frp configuration, for configuration options
see the example of client
or server on github.
|
| options/home-manager/programs.smug.projects.<name>.windows.*.panes.*.root | Root path of pane
|
| options/nixos/services.borgbackup.repos.<name>.quota | Storage quota for the repository
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.gatewayGroups | A list of gateway groups (sites) which can reach the resource and may be used to connect to it.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.round | Optional numeric identifier by which authentication rounds are
sorted
|
| options/nixos/services.grafana.provision.dashboards.settings.providers.*.name | A unique provider name.
|
| options/darwin/system.activationScripts.<name>.enable | Whether this file should be generated
|
| options/nixos/services.nginx.virtualHosts.<name>.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.wordpress.sites.<name>.virtualHost | Apache configuration can be done by adapting services.httpd.virtualHosts.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.allowBold | If true, allow applications in the
terminal to make text boldface.
|
| options/home-manager/services.kanshi.profiles.<name>.outputs.*.scale | Scales the output by the specified scale factor.
|
| options/nixos/services.wstunnel.clients.<name>.extraArgs | Extra command line arguments to pass to wstunnel
|
| options/nixos/services.wstunnel.servers.<name>.extraArgs | Extra command line arguments to pass to wstunnel
|
| options/nixos/services.borgbackup.jobs.<name>.postHook | Shell commands to run just before exit
|
| options/nixos/services.grafana.provision.alerting.muteTimings.settings.deleteMuteTimes.*.name | Name of the mute time interval, must be unique
|
| options/nixos/services.buildkite-agents.<name>.package | The buildkite-agent package to use.
|
| options/darwin/services.buildkite-agents.<name>.package | Which buildkite-agent derivation to use
|
| options/nixos/systemd.sockets.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/systemd.targets.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/darwin/launchd.agents.<name>.serviceConfig.InitGroups | This optional key specifies whether initgroups(3) should be called before running the job
|
| options/nixos/services.davis.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.slskd.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.movim.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.firewalld.zones.<name>.forwardPorts | Ports to forward in the zone.
|
| options/nixos/services.firewalld.zones.<name>.sources.*.ipset | An ipset.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations | Declarative location config
|
| options/nixos/services.vdirsyncer.jobs.<name>.timerConfig | systemd timer configuration
|
| options/nixos/services.vault-agent.instances.<name>.package | The vault package to use.
|
| options/home-manager/services.podman.containers.<name>.labels | The labels to apply to the container.
|
| options/nixos/services.borgbackup.jobs.<name>.prune.keep | Prune a repository by deleting all archives not matching any of the
specified retention options
|
| options/nixos/services.tahoe.nodes.<name>.storage.reservedSpace | The amount of filesystem space to not use for storage.
|
| options/home-manager/systemd.user.slices.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/home-manager/systemd.user.mounts.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/home-manager/systemd.user.timers.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/nixos/systemd.shutdown | Definition of systemd shutdown executables
|
| options/nixos/services.nginx.upstreams.<name>.servers | Defines the address and other parameters of the upstream servers
|
| options/nixos/services.nylon.<name>.nrConnections | The number of allowed simultaneous connections to the daemon, default 10.
|
| options/nixos/services.fedimintd.<name>.api.openFirewall | Opens port in firewall for fedimintd's api port
|
| options/nixos/services.pgbackrest.stanzas.<name>.jobs | Backups jobs to schedule for this stanza as described in:
https://pgbackrest.org/user-guide.html#quickstart/schedule-backup
|
| options/home-manager/programs.ssh.matchBlocks.<name>.remoteForwards.*.host | Host port binding options
|
| options/home-manager/programs.ssh.matchBlocks.<name>.remoteForwards.*.bind | Local port binding options
|
| options/darwin/environment.launchAgents.<name>.source | Path of the source file.
|
| options/nixos/programs.ssh.knownHosts.<name>.publicKeyFile | The path to the public key file for the host
|
| options/nixos/services.fedimintd.<name>.nginx.config.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.coverage | The length of time to ensure that keys will be correct; no action will be taken to create new keys to be activated after this time.
|
| options/home-manager/accounts.contact.accounts.<name>.khard.type | Either a single vdir located in accounts.contact.accounts._name_.local.path
or multiple automatically discovered vdirs in
accounts.contact.accounts._name_.local.path/accounts.contact.accounts._name_.khard.glob.
|
| options/nixos/services.fedimintd.<name>.nginx.config.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| options/nixos/services.fedimintd.<name>.nginx.config.listen.*.ssl | Enable SSL.
|
| options/nixos/services.znc.confOptions.networks.<name>.modules | ZNC network modules to load.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert | Section for a CA certificate to accept for authentication
|
| options/nixos/services.gitlab-runner.services.<name>.cloneUrl | Overwrite the URL for the GitLab instance
|
| options/nixos/systemd.network.netdevs.<name>.macvlanConfig | Each attribute in this set specifies an option in the
[MACVLAN] section of the unit
|
| options/darwin/services.gitlab-runner.services.<name>.cloneUrl | Overwrite the URL for the GitLab instance
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits | Resource limits to be imposed on the job
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits | Resource limits to be imposed on the job
|
| options/home-manager/programs.firefox.profiles.<name>.userContent | Custom Firefox user content CSS.
|
| options/nixos/services.rshim.device | Specify the device name to attach
|
| options/nixos/services.i2pd.ifname6 | IPv6 interface to bind to.
|
| options/nixos/services.tarsnap.archives.<name>.keyfile | Set a specific keyfile for this archive
|
| options/darwin/launchd.agents.<name>.serviceConfig.LimitLoadToHosts | This configuration file only applies to the hosts listed with this key
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.flatten | If set, flattens the hierarchy within the maildir by
substituting the canonical hierarchy delimiter
/ with this value.
|
| options/nixos/services.klipper.firmwares.<name>.serial | Path to serial port this printer is connected to
|
| options/nixos/systemd.user.targets.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.user.sockets.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.manage | Whether the window should be managed by bspwm
|
| options/darwin/launchd.daemons.<name>.environment | Environment variables passed to the service's processes.
|
| options/nixos/services.nipap.settings.nipapd.db_name | Name of database to use on PostgreSQL server.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ecdsa.<name>.file | File name in the ecdsa folder for which this
passphrase should be used.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs8.<name>.file | File name in the pkcs8 folder for which this
passphrase should be used.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.loginShell | Run command as a login shell.
|
| options/nixos/services.wordpress.sites.<name>.uploadsDir | This directory is used for uploads of pictures
|
| options/home-manager/programs.ssh.matchBlocks.<name>.forwardX11Trusted | Specifies whether remote X11 clients will have full access to the
original X11 display.
|
| options/home-manager/programs.alot.tags.<name>.translation | A pair of strings that define a regular substitution to
compute the string representation on the fly using
re.sub.
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.id | A unique identifier for this authentication token
|
| options/nixos/services.wstunnel.clients.<name>.remoteToLocal | Listen on remote and forwards traffic from local
|
| options/nixos/services.jibri.xmppEnvironments.<name>.control.muc.nickname | The nickname for this Jibri instance in the MUC.
|
| options/nixos/services.wordpress.sites.<name>.database.user | Database user.
|
| options/home-manager/accounts.email.accounts.<name>.signature.text | Signature content.
|
| options/home-manager/programs.floorp.profiles.<name>.preConfig | Extra preferences to add to user.js, before
programs.firefox.profiles._name_.settings
|
| options/nixos/services.snipe-it.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/darwin/launchd.daemons.<name>.serviceConfig.GroupName | This optional key specifies the group to run the job as
|
| options/home-manager/services.pizauth.accounts.<name>.clientSecret | The OAuth2 client secret.
|
| options/nixos/services.fedimintd.<name>.nginx.config.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| options/nixos/services.ghostunnel.servers.<name>.key | Path to certificate private key (PEM with private key)
|
| options/nixos/services.inadyn.settings.custom.<name>.include | File to include additional settings for this provider from.
|
| options/home-manager/programs.irssi.networks.<name>.server.autoConnect | Whether Irssi connects to the server on launch.
|
| options/nixos/systemd.services.<name>.stopIfChanged | If set, a changed unit is restarted by calling
systemctl stop in the old configuration,
then systemctl start in the new one
|
| options/home-manager/services.muchsync.remotes.<name>.local.importNew | Whether to begin the synchronisation by running
notmuch new locally.
|
| options/nixos/services.dovecot2.mailboxes.<name>.auto | Whether to automatically create or create and subscribe to the mailbox or not.
|
| options/nixos/services.blockbook-frontend.<name>.sync | Synchronizes until tip, if together with zeromq, keeps index synchronized.
|
| options/nixos/services.sshguard.blacklist_threshold | Blacklist an attacker when its score exceeds threshold
|
| options/nixos/programs.tsmClient.servers.<name>.inclexcl | Text lines with include.* and exclude.* directives
to be used when sending files to the IBM TSM server,
or an absolute path pointing to a file with such lines.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.extraConfig | These lines go to httpd.conf verbatim
|
| options/home-manager/programs.firefox.profiles.<name>.search.order | The order the search engines are listed in
|
| options/nixos/systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.user | The user of the file
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.uri | URI to bind the wyoming server to.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.xauth_id | Client XAuth username used in the XAuth exchange.
|
| options/nixos/systemd.network.networks.<name>.bridgeConfig | Each attribute in this set specifies an option in the
[Bridge] section of the unit
|
| options/nixos/systemd.network.networks.<name>.pfifoFastConfig | Each attribute in this set specifies an option in the
[PFIFOFast] section of the unit
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.eap_id | Identity to use as peer identity during EAP authentication
|
| options/nixos/systemd.user.targets.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/services.wordpress.sites.<name>.plugins | Path(s) to respective plugin(s) which are copied from the 'plugins' directory.
These plugins need to be packaged before use, see example.
|
| options/nixos/systemd.user.sockets.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.settings.<name>.permissions | Allowed permissions for this extension
|
| options/nixos/services.kanboard.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.fediwall.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.librenms.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.agorakit.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.mainsail.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.wordpress.sites.<name>.database.port | Database host port.
|
| options/nixos/services.wordpress.sites.<name>.database.host | Database host address.
|
| options/home-manager/accounts.email.accounts.<name>.meli.mailboxes | Mailboxes to show in meli
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.patterns | Pattern of mailboxes to synchronize.
|
| options/nixos/systemd.network.networks.<name>.matchConfig | Each attribute in this set specifies an option in the
[Match] section of the unit
|
| options/nixos/services.ghostunnel.servers.<name>.cert | Path to certificate (PEM with certificate chain)
|
| options/nixos/services.httpd.virtualHosts.<name>.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.httpd.virtualHosts.<name>.robotsEntries | Specification of pages to be ignored by web crawlers
|
| options/nixos/services.fedimintd.<name>.p2p.openFirewall | Opens port in firewall for fedimintd's p2p port (both TCP and UDP)
|
| options/nixos/services.caddy.virtualHosts.<name>.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.nginx.virtualHosts.<name>.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.root | Root directory for requests.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.imapOauth2Params.scope | The OAuth2 requested scope.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.smtpOauth2Params.scope | The OAuth2 requested scope.
|
| options/nixos/services.snapserver.streams.<name>.codec | Default audio compression method.
|
| options/home-manager/programs.hexchat.channels.<name>.commands | Commands to be executed on connecting to server.
|
| options/home-manager/programs.i3status.modules.<name>.position | Position of this module in i3status order.
|
| options/home-manager/programs.irssi.networks.<name>.saslExternal | Enable SASL external authentication
|
| options/nixos/services.fluidd.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.fluidd.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.akkoma.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.akkoma.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.gancio.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.gancio.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.matomo.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.matomo.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.monica.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.monica.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.subFolders | The on-disk folder naming style
|
| options/nixos/services.openafsServer.cellServDB.*.dnsname | DNS full-qualified domain name of a database server
|
| options/nixos/services.openafsClient.cellServDB.*.dnsname | DNS full-qualified domain name of a database server
|
| options/nixos/services.btrbk.instances.<name>.settings | configuration options for btrbk
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.OnDemand | This key was used in Mac OS X 10.4 to control whether a job was kept alive or not
|
| options/home-manager/accounts.email.accounts.<name>.getmail.delete | Enable if you want to delete read messages from the server
|
| options/nixos/services.jitsi-videobridge.xmppConfigs.<name>.mucNickname | Videobridges use the same XMPP account and need to be distinguished by the
nickname (aka resource part of the JID)
|
| options/home-manager/services.pizauth.accounts.<name>.scopes | The scopes which the OAuth2 token will give access to
|
| options/nixos/services.k3s.manifests.<name>.content | Content of the manifest file
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.ServiceIPC | This optional key specifies whether the job participates in advanced
communication with launchd
|
| options/nixos/services.fedimintd.<name>.bitcoin.network | Bitcoin network to participate in.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.default | Whether this should be the default profile.
|
| options/nixos/services.awstats.configs.<name>.webService.enable | Whether to enable awstats web service.
|
| options/nixos/services.davis.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.slskd.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.movim.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.storage.device | An unencrypted device that will temporarily be mounted in stage-1
|
| options/nixos/boot.initrd.luks.devices.<name>.tryEmptyPassphrase | If keyFile fails then try an empty passphrase first before
prompting for password.
|
| options/nixos/services.httpd.virtualHosts.<name>.locations | Declarative location config
|
| options/nixos/services.tinc.networks.<name>.interfaceType | The type of virtual interface used for the network connection.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.kexAlgorithms | Specifies the available KEX (Key Exchange) algorithms.
|
| options/nixos/systemd.sockets.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/systemd.targets.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/services.easytier.instances.<name>.enable | Enable the instance.
|
| options/nixos/services.firewalld.services.<name>.ports.*.port | |
| options/nixos/services.opkssh.providers.<name>.lifetime | Token lifetime
|
| options/home-manager/programs.floorp.profiles.<name>.bookmarks | Declarative bookmarks.
|
| options/nixos/services.fedimintd.<name>.nginx.config.listen.*.addr | Listen address.
|
| options/nixos/services.v4l2-relayd.instances.<name>.input.height | The height to read from input-stream.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Program | This key maps to the first argument of execvp(3)
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.InitGroups | This optional key specifies whether initgroups(3) should be called before running the job
|
| options/nixos/services.ytdl-sub.instances.<name>.schedule | How often to run ytdl-sub
|
| options/nixos/services.buildkite-agents.<name>.tokenPath | The token from your Buildkite "Agents" page
|
| options/darwin/services.buildkite-agents.<name>.tokenPath | The token from your Buildkite "Agents" page
|
| options/nixos/systemd.user.services.<name>.stopIfChanged | If set, a changed unit is restarted by calling
systemctl stop in the old configuration,
then systemctl start in the new one
|
| options/nixos/services.tor.relay.onionServices.<name>.settings | Settings of the onion service
|
| options/nixos/services.netbird.tunnels.<name>.dns-resolver.port | A port to serve DNS entries on when dns-resolver.address is enabled.
|
| options/nixos/services.netbird.clients.<name>.dns-resolver.port | A port to serve DNS entries on when dns-resolver.address is enabled.
|
| options/nixos/security.apparmor.policies.<name>.profile | The profile file contents
|
| options/nixos/services.tarsnap.archives.<name>.excludes | Exclude files and directories matching these patterns.
|
| options/home-manager/programs.hexchat.channels.<name>.autojoin | Channels list to autojoin on connecting to server.
|
| options/nixos/image.repart.partitions.<name>.repartConfig | Specify the repart options for a partiton as a structural setting
|
| options/nixos/services.fedimintd.<name>.nginx.config.default | Makes this vhost the default.
|
| options/home-manager/programs.hexchat.channels.<name>.options.forceSSL | Use SSL for all servers.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.smtpOauth2Params | Sets the oauth2 params if authentication mechanism oauthbearer or
xoauth2 is used
|
| options/home-manager/accounts.email.accounts.<name>.aerc.imapOauth2Params | Sets the oauth2 params if authentication mechanism oauthbearer or
xoauth2 is used
|
| options/nixos/services.firezone.server.provision.accounts.<name>.actors | All actors (users) to provision
|
| options/darwin/launchd.agents.<name>.serviceConfig.LaunchOnlyOnce | This optional key specifies whether the job can only be run once and only once
|
| options/nixos/services.wordpress.sites.<name>.settings | Structural Wordpress configuration
|
| options/nixos/services.httpd.virtualHosts.<name>.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.nginx.virtualHosts.<name>.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.tinc.networks.<name>.chroot | Change process root directory to the directory where the config file is located (/etc/tinc/netname/), for added security
|
| options/nixos/services.rke2.autoDeployCharts.<name>.enable | Whether to enable the installation of this Helm chart
|
| options/home-manager/xdg.configFile.<name>.ignorelinks | When recursive is enabled, adds -ignorelinks flag to lndir
It causes lndir to not treat symbolic links in the source directory specially
|
| options/nixos/services.tarsnap.archives.<name>.lowmem | Reduce memory consumption by not caching small files
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.remoteForwards.*.bind.port | Specifies port number to bind to.
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.remoteForwards.*.host.port | Specifies port number to forward to.
|
| options/nixos/services.klipper.firmwares.<name>.package | Path to the built firmware package.
|
| options/nixos/services.borgbackup.jobs.<name>.extraInitArgs | Additional arguments for borg init
|
| options/nixos/services.mosquitto.bridges.<name>.topics | Topic patterns to be shared between the two brokers
|
| options/home-manager/services.pizauth.accounts.<name>.extraConfig | Additional configuration that will be added to the account configuration
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.allAccess | Grants all permissions in the associated organization.
|
| options/nixos/services.buildkite-agents.<name>.extraGroups | Groups the user for this buildkite agent should belong to
|
| options/nixos/services.postfix.masterConfig.<name>.maxproc | The maximum number of processes to spawn for this service
|
| options/home-manager/services.podman.containers.<name>.autoStart | Whether to start the container on boot (requires user lingering).
|
| options/home-manager/programs.thunderbird.profiles.<name>.calendarAccountsOrder | Custom ordering of calendar accounts
|
| options/nixos/services.firezone.server.provision.accounts.<name>.policies.<name>.description | The description of this policy
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LimitLoadToHosts | This configuration file only applies to the hosts listed with this key
|
| options/home-manager/programs.floorp.profiles.<name>.search.force | Whether to force replace the existing search
configuration
|
| options/nixos/services.snipe-it.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.v4l2-relayd.instances.<name>.input.format | The video-format to read from input-stream.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.updown | Updown script to invoke on CHILD_SA up and down events.
|
| options/nixos/services.errbot.instances.<name>.identity | Errbot identity configuration
|
| options/nixos/services.gitlab-runner.services.<name>.dockerImage | Docker image to be used.
|
| options/darwin/services.gitlab-runner.services.<name>.dockerImage | Docker image to be used.
|
| options/home-manager/services.xsuspender.rules.<name>.resumeEvery | Resume interval in seconds.
|
| options/nixos/services.github-runners.<name>.extraPackages | Extra packages to add to PATH of the service to make them available to workflows.
|
| options/darwin/services.github-runners.<name>.extraPackages | Extra packages to add to PATH of the service to make them available to workflows.
|
| options/home-manager/programs.floorp.profiles.<name>.search.default | The default search engine used in the address bar and search
bar.
|
| options/home-manager/programs.lutris.runners.<name>.settings.system | Lutris system options for this runner
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.protocol | The protocol to allow
|
| options/nixos/services.redis.servers.<name>.maxclients | Set the max number of connected clients at the same time.
|
| options/home-manager/services.kanshi.profiles.<name>.outputs.*.status | Enables or disables the specified output.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.serverAliveInterval | Set timeout in seconds after which response will be requested.
|
| options/nixos/systemd.services.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/boot.specialFileSystems.<name>.depends | List of paths that should be mounted before this one
|
| options/nixos/boot.specialFileSystems.<name>.options | Options used to mount the file system
|
| options/nixos/services.cgit.<name>.gitHttpBackend.enable | Whether to bypass cgit and use git-http-backend for HTTP clones
|
| options/nixos/services.fedimintd.<name>.nginx.config.kTLS | Whether to enable kTLS support
|
| options/nixos/services.firewalld.zones.<name>.forwardPorts.*.port | |
| options/home-manager/programs.gnome-terminal.profile.<name>.cursorShape | The cursor shape.
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.tokenFile | The token value
|
| options/home-manager/programs.ssh.matchBlocks.<name>.dynamicForwards | Specify dynamic port forwardings
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.iterationStep | How much the iteration count for PBKDF2 is increased at each successful authentication.
|
| options/nixos/containers.<name>.extraFlags | Extra flags passed to the systemd-nspawn command
|
| options/nixos/containers.<name>.privateNetwork | Whether to give the container its own private virtual
Ethernet interface
|
| options/nixos/services.wstunnel.servers.<name>.restrictTo | Accepted traffic will be forwarded only to this service.
|
| options/nixos/services.keepalived.vrrpScripts.<name>.fall | Required number of failures for KO transition.
|
| options/nixos/services.keepalived.vrrpScripts.<name>.rise | Required number of successes for OK transition.
|
| options/nixos/systemd.network.networks.<name>.flowQueuePIEConfig | Each attribute in this set specifies an option in the
[FlowQueuePIE] section of the unit
|
| options/nixos/systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.group | The group of the file
|
| options/nixos/services.movim.h2o.serverName | Server name to be used for this virtual host
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs12.<name>.file | File name in the pkcs12 folder for which this
passphrase should be used.
|
| options/nixos/services.public-inbox.settings.coderepo.<name>.dir | Path to a git repository
|
| options/nixos/services.openbao.settings.listener.<name>.type | The listener type to enable.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.hostName | Canonical hostname for the server.
|
| options/nixos/services.buildkite-agents.<name>.extraConfig | Extra lines to be added verbatim to the configuration file.
|
| options/darwin/services.buildkite-agents.<name>.extraConfig | Extra lines to be added verbatim to the configuration file.
|
| options/darwin/launchd.agents.<name>.serviceConfig.LimitLoadFromHosts | This configuration file only applies to hosts NOT listed with this key
|
| options/home-manager/accounts.email.accounts.<name>.alot.sendMailCommand | Command to send a mail
|
| options/nixos/services.nginx.virtualHosts.<name>.reuseport | Create an individual listening socket
|
| options/nixos/services.firewalld.zones.<name>.forward | Whether to enable intra-zone forwarding
|
| options/nixos/services.vmalert.instances.<name>.rules | A list of the given alerting or recording rules against configured "datasource.url" compatible with
Prometheus HTTP API for vmalert to execute
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.certs | List of certificate candidates to use for
authentication
|
| options/nixos/services.kimai.sites.<name>.database.passwordFile | A file containing the password corresponding to
database.user.
|
| options/nixos/services.jibri.xmppEnvironments.<name>.control.login.username | User part of the JID.
|
| options/nixos/systemd.services.<name>.reloadIfChanged | Whether the service should be reloaded during a NixOS
configuration switch if its definition has changed
|
| options/nixos/services.autorandr.profiles.<name>.config | Per output profile configuration.
|
| options/nixos/services.authelia.instances.<name>.enable | Whether to enable Authelia instance.
|
| options/nixos/services.sanoid.templates.<name>.autosnap | Whether to automatically take snapshots.
|
| options/home-manager/programs.librewolf.profiles.<name>.search | Declarative search engine configuration.
|
| options/home-manager/programs.autorandr.profiles.<name>.config | Per output profile configuration.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.userNameCommand | A command that prints the user name to standard output.
|
| options/nixos/services.gancio.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.fedimintd.<name>.nginx.config.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.fluidd.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.akkoma.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.matomo.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.monica.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/home-manager/systemd.user.services.<name>.Unit.X-Reload-Triggers | List of free form strings that can be used to trigger a service
reload during Home Manager activation.
|
| options/nixos/services.snapserver.streams.<name>.query | Key-value pairs that convey additional parameters about a stream.
|
| options/nixos/services.klipper.firmwares.<name>.configFile | Path to firmware config which is generated using klipper-genconf
|
| options/nixos/systemd.user.targets.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/systemd.user.sockets.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/services.kimai.sites.<name>.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.awstats.configs.<name>.webService.urlPrefix | The URL prefix under which the awstats pages appear.
|
| options/home-manager/services.podman.containers.<name>.autoUpdate | The autoupdate policy for the container.
|
| options/nixos/systemd.network.networks.<name>.ipv6Prefixes | A list of ipv6Prefix sections to be added to the unit
|
| options/darwin/environment.launchAgents.<name>.enable | Whether this file should be generated
|
| options/nixos/networking.dhcpcd.denyInterfaces | Disable the DHCP client for any interface whose name matches
any of the shell glob patterns in this list
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.znapzend.zetup.<name>.mbuffer.port | Port to use for mbuffer
|
| options/home-manager/programs.gnome-terminal.profile.<name>.boldIsBright | Whether bold text is shown in bright colors.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.extraConfig.local | Local store extra configuration.
|
| options/nixos/services.listmonk.database.settings."privacy.domain_blocklist" | E-mail addresses with these domains are disallowed from subscribing.
|
| options/nixos/services.tor.relay.onionServices.<name>.secretKey | Secret key of the onion service
|
| options/nixos/services.prosody.virtualHosts.<name>.ssl.extraOptions | Extra SSL configuration options.
|
| options/home-manager/accounts.email.accounts.<name>.gpg.encryptByDefault | Encrypt outgoing messages by default.
|
| options/nixos/services.postfix.masterConfig.<name>.private | Whether the service's sockets and storage directory is restricted to
be only available via the mail system
|
| options/nixos/services.restic.backups.<name>.dynamicFilesFrom | A script that produces a list of files to back up
|
| options/nixos/services.blockbook-frontend.<name>.cssDir | Location of the dir with main.css CSS file
|
| options/nixos/services.firewalld.zones.<name>.forwardPorts.*.to-port | |
| options/nixos/services.restic.backups.<name>.repository | repository to backup to.
|
| options/nixos/services.hylafax.modems.<name>.config | Attribute set of values for the given modem
|
| options/home-manager/services.unison.pairs.<name>.commandOptions | Additional command line options as a dictionary to pass to the
unison program
|
| options/home-manager/services.xsuspender.rules.<name>.execResume | Before resuming, execute this shell script
|
| options/darwin/environment.userLaunchAgents.<name>.source | Path of the source file.
|
| options/nixos/containers.<name>.enableTun | Allows the container to create and setup tunnel interfaces
by granting the NET_ADMIN capability and
enabling access to /dev/net/tun.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacerts | List of CA certificates to accept for
authentication
|
| options/nixos/services.sanoid.datasets.<name>.autoprune | Whether to automatically prune old snapshots.
|
| options/nixos/services.gitlab-runner.services.<name>.buildsDir | Absolute path to a directory where builds will be stored
in context of selected executor (Locally, Docker, SSH).
|
| options/darwin/services.gitlab-runner.services.<name>.buildsDir | Absolute path to a directory where builds will be stored
in context of selected executor (Locally, Docker, SSH).
|
| options/darwin/launchd.agents.<name>.serviceConfig.LowPriorityIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O.
|
| options/nixos/security.pam.services.<name>.ttyAudit.enablePattern | For each user matching one of comma-separated
glob patterns, enable TTY auditing
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.agorakit.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.kanboard.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.fediwall.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.librenms.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.kanboard.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.agorakit.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.fediwall.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.librenms.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.mainsail.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.mainsail.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.sabnzbd.settings.servers.<name>.enable | Enable this server by default
|
| options/home-manager/launchd.agents.<name>.config.StartInterval | This optional key causes the job to be started every N seconds
|
| options/nixos/services.mautrix-meta.instances.<name>.dataDir | Path to the directory with database, registration, and other data for the bridge service
|
| options/darwin/launchd.daemons.<name>.serviceConfig.ServiceIPC | This optional key specifies whether the job participates in advanced
communication with launchd
|
| options/home-manager/launchd.agents.<name>.config.AbandonProcessGroup | When a job dies, launchd kills any remaining processes with the same process group ID as the job
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Program | This key maps to the first argument of execvp(3)
|
| options/home-manager/accounts.calendar.accounts.<name>.primary | Whether this is the primary account
|
| options/home-manager/accounts.email.accounts.<name>.neomutt.extraConfig | Extra lines to add to the folder hook for this account.
|
| options/home-manager/accounts.email.accounts.<name>.astroid.extraConfig | Extra settings to add to this astroid account configuration.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.OnDemand | This key was used in Mac OS X 10.4 to control whether a job was kept alive or not
|
| options/nixos/services.drupal.sites.<name>.virtualHost.forceSSL | Whether to add a separate nginx server block that permanently redirects (301)
all plain HTTP traffic to HTTPS
|
| options/nixos/services.netbird.tunnels.<name>.hardened | Hardened service:
- runs as a dedicated user with minimal set of permissions (see caveats),
- restricts daemon configuration socket access to dedicated user group
(you can grant access to it with
users.users."<user>".extraGroups = [ netbird-‹name› ]),
Even though the local system resources access is restricted:
CAP_NET_RAW, CAP_NET_ADMIN and CAP_BPF still give unlimited network manipulation possibilites,
- older kernels don't have
CAP_BPF and use CAP_SYS_ADMIN instead,
Known security features that are not (yet) integrated into the module:
- 2024-02-14:
rosenpass is an experimental feature configurable solely
through --enable-rosenpass flag on the netbird up command,
see the docs
|
| options/nixos/services.netbird.clients.<name>.hardened | Hardened service:
- runs as a dedicated user with minimal set of permissions (see caveats),
- restricts daemon configuration socket access to dedicated user group
(you can grant access to it with
users.users."<user>".extraGroups = [ netbird-‹name› ]),
Even though the local system resources access is restricted:
CAP_NET_RAW, CAP_NET_ADMIN and CAP_BPF still give unlimited network manipulation possibilites,
- older kernels don't have
CAP_BPF and use CAP_SYS_ADMIN instead,
Known security features that are not (yet) integrated into the module:
- 2024-02-14:
rosenpass is an experimental feature configurable solely
through --enable-rosenpass flag on the netbird up command,
see the docs
|
| options/nixos/fileSystems.<name>.encrypted.keyFile | Path to a keyfile used to unlock the backing encrypted
device
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.present | Whether to ensure that this user is present or absent.
|
| options/nixos/systemd.user.services.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/users.mysql.pam.logging.userColumn | The name of the column in the log table to which the name of the
user being authenticated is stored.
|
| options/nixos/users.mysql.pam.logging.hostColumn | The name of the column in the log table to which the name of the user
being authenticated is stored.
|
| options/nixos/containers.<name>.hostBridge | Put the host-side of the veth-pair into the named bridge
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.themes | Themes to install.
|
| options/nixos/services.kanata.keyboards.<name>.devices | Paths to keyboard devices
|
| options/nixos/services.httpd.virtualHosts.<name>.documentRoot | The path of Apache's document root directory
|
| options/home-manager/programs.atuin.themes | Each theme is written to
$XDG_CONFIG_HOME/atuin/themes/theme-name.toml
where the name of each attribute is the theme-name
See https://docs.atuin.sh/guide/theming/ for the full list
of options.
|
| options/nixos/services.prefect.workerPools.<name>.installPolicy | install policy for the worker (always, if-not-present, never, prompt)
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LaunchOnlyOnce | This optional key specifies whether the job can only be run once and only once
|
| options/home-manager/systemd.user.sockets.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/home-manager/systemd.user.targets.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/nixos/systemd.user.services.<name>.reloadIfChanged | Whether the service should be reloaded during a NixOS
configuration switch if its definition has changed
|
| options/nixos/services.restic.backups.<name>.initialize | Create the repository if it doesn't exist.
|
| options/home-manager/services.podman.containers.<name>.volumes | The volumes to mount into the container.
|
| options/home-manager/services.podman.containers.<name>.devices | The devices to mount into the container
|
| options/darwin/launchd.daemons.<name>.serviceConfig.InitGroups | This optional key specifies whether initgroups(3) should be called before running the job
|
| options/home-manager/accounts.email.accounts.<name>.himalaya.enable | Whether to enable the email client Himalaya CLI for this email account.
|
| options/nixos/services.blockbook-frontend.<name>.debug | Debug mode, return more verbose errors, reload templates on each request.
|
| options/nixos/services.grafana.provision.alerting.contactPoints.settings.contactPoints.*.name | Name of the contact point
|
| options/nixos/services.postfix.settings.master.<name>.wakeup | Automatically wake up the service after the specified number of
seconds
|
| options/nixos/services.easytier.instances.<name>.extraArgs | Extra args append to the easytier command-line.
|
| options/nixos/services.logrotate.settings.<name>.enable | Whether to enable setting individual kill switch.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.dynamicForwards.*.port | Specifies port number to bind to.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.pubkeys | List of raw public keys to accept for
authentication
|
| options/nixos/boot.initrd.luks.devices.<name>.fallbackToPassword | Whether to fallback to interactive passphrase prompt if the keyfile
cannot be found
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings | Settings which are applied to .gmailieer.json
for the account
|
| options/nixos/services.firewalld.zones.<name>.ports.*.protocol | |
| options/nixos/services.spiped.config.<name>.weakHandshake | Use fast/weak handshaking: This reduces the CPU time spent
in the initial connection setup, at the expense of losing
perfect forward secrecy.
|
| options/nixos/security.pam.services.<name>.startSession | If set, the service will register a new session with
systemd's login manager
|
| options/home-manager/programs.i3status.modules.<name>.settings | Configuration to add to this i3status module
|
| options/home-manager/programs.hexchat.channels.<name>.password | Password to use
|
| options/nixos/services.kanata.keyboards.<name>.extraDefCfg | Configuration of defcfg other than linux-dev (generated
from the devices option) and
linux-continue-if-no-devs-found (hardcoded to be yes)
|
| options/nixos/services.keyd.keyboards.<name>.extraConfig | Extra configuration that is appended to the end of the file.
Do not write ids section here, use a separate option for it
|
| options/darwin/environment.launchDaemons.<name>.source | Path of the source file.
|
| options/nixos/services.peertube-runner.instancesToRegister.<name>.runnerName | Runner name declared to the PeerTube instance.
|
| options/nixos/systemd.services.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.matomo.webServerUser | Name of the web server user that forwards requests to services.phpfpm.pools.<name>.socket the fastcgi socket for Matomo if the nginx
option is not used
|
| options/nixos/services.syncoid.commands.<name>.sendOptions | Advanced options to pass to zfs send
|
| options/nixos/services.syncoid.commands.<name>.recvOptions | Advanced options to pass to zfs recv
|
| options/nixos/systemd.network.networks.<name>.dhcpServerConfig | Each attribute in this set specifies an option in the
[DHCPServer] section of the unit
|
| options/nixos/systemd.network.networks.<name>.pfifoHeadDropConfig | Each attribute in this set specifies an option in the
[PFIFOHeadDrop] section of the unit
|
| options/nixos/services.znc.confOptions.networks.<name>.channels | IRC channels to join.
|
| options/nixos/security.pam.services.<name>.duoSecurity.enable | If set, use the Duo Security pam module
pam_duo for authentication
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/nixos/services.vmalert.instances.<name>.enable | Wether to enable VictoriaMetrics's vmalert.
vmalert evaluates alerting and recording rules against a data source, sends notifications via Alertmanager.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LimitLoadToHosts | This configuration file only applies to the hosts listed with this key
|
| options/nixos/services.firezone.server.provision.accounts.<name>.groups | All groups to provision
|
| options/nixos/services.jupyterhub.kernels.<name>.logo64 | Path to 64x64 logo png.
|
| options/nixos/services.jupyterhub.kernels.<name>.logo32 | Path to 32x32 logo png.
|
| options/nixos/services.tinc.networks.<name>.ed25519PrivateKeyFile | Path of the private ed25519 keyfile.
|
| options/nixos/security.pam.services.<name>.gnupg.enable | If enabled, pam_gnupg will attempt to automatically unlock the
user's GPG keys with the login password via
gpg-agent
|
| options/nixos/services.tahoe.nodes.<name>.client.introducer | The furl for a Tahoe introducer node
|
| options/home-manager/services.muchsync.remotes.<name>.remote.importNew | Whether to begin the synchronisation by running
notmuch new on the remote side.
|
| options/nixos/services.borgbackup.jobs.<name>.extraPruneArgs | Additional arguments for borg prune
|
| options/darwin/launchd.agents.<name>.serviceConfig.StandardInPath | This optional key specifies what file should be used for data being supplied to stdin when using
stdio(3).
|
| options/home-manager/programs.lutris.runners.<name>.settings.runner | Runner specific options
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LimitLoadFromHosts | This configuration file only applies to hosts NOT listed with this key
|
| options/nixos/services.akkoma.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.fluidd.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.fedimintd.<name>.nginx.config.extraConfig | These lines go to the end of the vhost verbatim.
|
| options/nixos/services.gancio.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.monica.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.matomo.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/home-manager/accounts.contact.accounts.<name>.pimsync.enable | Whether to enable synchronization using pimsync.
|
| options/nixos/services.ghostunnel.servers.<name>.allowAll | If true, allow all clients, do not check client cert subject.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.groups | Authorization group memberships to require
|
| options/nixos/services.slurm.nodeName | Name that SLURM uses to refer to a node (or base partition for BlueGene
systems)
|
| options/nixos/services.wstunnel.servers.<name>.restrictTo.*.port | The port.
|
| options/nixos/services.wstunnel.servers.<name>.restrictTo.*.host | The hostname.
|
| options/nixos/services.firewalld.zones.<name>.protocols | Protocols to allow in the zone.
|
| options/nixos/services.zeronsd.servedNetworks.<name>.package | The zeronsd package to use.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.audibleBell | Turn on/off the terminal's bell.
|
| options/home-manager/programs.firefox.profiles.<name>.preConfig | Extra preferences to add to user.js, before
programs.firefox.profiles._name_.settings
|
| options/nixos/services.displayManager.dms-greeter.compositor.name | The Wayland compositor to run the greeter in
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.token.<name>.module | Optional PKCS#11 module name to access the token.
|
| options/nixos/security.pam.services.<name>.kwallet.enable | If enabled, pam_wallet will attempt to automatically unlock the
user's default KDE wallet upon login
|
| options/nixos/systemd.services.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/programs.proxychains.proxies.<name>.type | Proxy type.
|
| options/nixos/programs.proxychains.proxies.<name>.port | Proxy port
|
| options/nixos/services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.help | A human-readable description of this metric.
|
| options/home-manager/services.restic.backups.<name>.dynamicFilesFrom | A script that produces a list of files to back up
|
| options/home-manager/launchd.agents.<name>.config.WorkingDirectory | This optional key is used to specify a directory to chdir(2) to before running the job.
|
| options/nixos/services.nominatim.database.dbname | Name of the postgresql database.
|
| options/nixos/services.roundcube.database.dbname | Name of the postgresql database
|
| options/home-manager/programs.rclone.remotes.<name>.secrets | Sensitive configuration values such as passwords, API keys, and tokens
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.readBuckets | The organization's buckets which should be allowed to be read
|
| options/nixos/services.pgbackrest.stanzas.<name>.instances | An attribute set of database instances as described in:
https://pgbackrest.org/configuration.html#section-stanza
Each instance defaults to set pg-host to the attribute's name
|
| options/nixos/services.dolibarr.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.agorakit.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.kanboard.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.librenms.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.fediwall.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.mainsail.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.vdirsyncer.jobs.<name>.config.statusPath | vdirsyncer's status path
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.cursor | The color for the terminal cursor.
|
| options/nixos/services.firewalld.zones.<name>.forwardPorts.*.to-addr | Destination IP address.
|
| options/nixos/services.borgbackup.jobs.<name>.privateTmp | Set the PrivateTmp option for
the systemd-service
|
| options/nixos/systemd.network.networks.<name>.networkConfig | Each attribute in this set specifies an option in the
[Network] section of the unit
|
| options/nixos/systemd.network.networks.<name>.ipv6AcceptRAConfig | Each attribute in this set specifies an option in the
[IPv6AcceptRA] section of the unit
|
| options/nixos/services.postfix.settings.master.<name>.chroot | Whether the service is chrooted to have only access to the
services.postfix.queueDir and the closure of
store paths specified by the program option.
|
| options/nixos/services.github-runners.<name>.noDefaultLabels | Disables adding the default labels
|
| options/darwin/services.github-runners.<name>.noDefaultLabels | Disables adding the default labels
|
| options/nixos/services.autorandr.profiles.<name>.fingerprint | Output name to EDID mapping
|
| options/home-manager/programs.autorandr.profiles.<name>.fingerprint | Output name to EDID mapping
|
| options/nixos/programs.tsmClient.servers.<name>.genPasswd | Whether to enable automatic client password generation
|
| options/home-manager/programs.i3status-rust.bars | Attribute set of i3status-rust bars, each with their own configuration
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saeAddToMacAllow | If set, all sae password entries that have a non-wildcard MAC associated to
them will additionally be used to populate the MAC allow list
|
| options/nixos/systemd.user.services.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.dokuwiki.sites.<name>.settings | Structural DokuWiki configuration
|
| options/nixos/services.orangefs.server.fileSystems.<name>.troveSyncData | Sync data.
|
| options/nixos/services.vdirsyncer.jobs.<name>.config.general | general configuration
|
| options/darwin/launchd.agents.<name>.serviceConfig.StandardOutPath | This optional key specifies what file should be used for data being sent to stdout when using stdio(3).
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags.important | Tag for notmuch to use for messages stored in the mailbox labeled with the
Important name attribute and/or with the $Important
keyword
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.ca_id | Identity in CA certificate to accept for authentication
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LowPriorityIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O.
|
| options/nixos/services.borgbackup.jobs.<name>.prune.prefix | Only consider archive names starting with this prefix for pruning
|
| options/nixos/services.openvpn.servers.<name>.authUserPass.password | The password to store inside the credentials file.
|
| options/nixos/services.fcgiwrap.instances.<name>.socket.user | User to be set as owner of the UNIX socket.
|
| options/nixos/services.fcgiwrap.instances.<name>.socket.type | Socket type: 'unix', 'tcp' or 'tcp6'.
|
| options/nixos/services.v4l2-relayd.instances.<name>.output.format | The video-format to write to output-stream.
|
| options/nixos/services.znc.confOptions.networks.<name>.password | IRC server password, such as for a Slack gateway.
|
| options/nixos/services.httpd.virtualHosts.<name>.globalRedirect | If set, all requests for this host are redirected permanently to
the given URL.
|
| options/nixos/services.blockbook-frontend.<name>.enable | Whether to enable blockbook-frontend application.
|
| options/nixos/systemd.services.<name>.environment | Environment variables passed to the service's processes.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.reqid | Fixed reqid to use for this CHILD_SA
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.private.<name>.file | File name in the private folder for which this passphrase should be used.
|
| options/nixos/services.consul-template.instances.<name>.user | User under which this instance runs.
|
| options/home-manager/services.git-sync.repositories.<name>.path | The path at which to sync the repository
|
| options/home-manager/accounts.contact.accounts.<name>.khal.priority | Priority of a calendar used for coloring (calendar with highest priority is preferred).
|
| options/nixos/networking.dhcpcd.allowInterfaces | Enable the DHCP client for any interface whose name matches
any of the shell glob patterns in this list
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.operator | Grants all permissions in all organizations.
|
| options/nixos/services.borgbackup.jobs.<name>.dumpCommand | Backup the stdout of this program instead of filesystem paths
|
| options/nixos/services.kanidm.provision.persons.<name>.groups | List of groups this person should belong to.
|
| options/nixos/services.wstunnel.servers.<name>.listen.enableHTTPS | Use HTTPS for the tunnel server.
|
| options/nixos/services.bitcoind.<name>.prune | Reduce storage requirements by enabling pruning (deleting) of old
blocks
|
| options/nixos/services.ghostunnel.servers.<name>.target | Address to forward connections to (can be HOST:PORT or unix:PATH).
|
| options/nixos/boot.binfmt.registrations.<name>.mask | A mask to be ANDed with the byte sequence of the file before matching
|
| options/nixos/services.ghostunnel.servers.<name>.listen | Address and port to listen on (can be HOST:PORT, unix:PATH).
|
| options/home-manager/programs.smug.projects.<name>.windows.*.commands | Commands to execute when window starts.
|
| options/nixos/services.bacula-sd.director.<name>.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/nixos/services.bacula-fd.director.<name>.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/nixos/services.firewalld.services.<name>.version | Version of the service.
|
| options/nixos/services.firewalld.services.<name>.helpers | Helpers for the service.
|
| options/home-manager/programs.firefox.profiles.<name>.bookmarks | Declarative bookmarks.
|
| options/home-manager/accounts.email.accounts.<name>.neomutt.mailboxType | Whether this account uses maildir folders or IMAP mailboxes
|
| options/nixos/services.biboumi.settings.db_name | The name of the database to use
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Program | This key maps to the first argument of execvp(3)
|
| options/home-manager/accounts.email.accounts.<name>.aerc.extraConfig | Config specific to this account, added to $HOME/.config/aerc/aerc.conf
|
| options/nixos/services.public-inbox.settings.coderepo.<name>.cgitUrl | URL of a cgit instance
|
| options/nixos/services.orangefs.server.fileSystems.<name>.troveSyncMeta | Sync meta data.
|
| options/nixos/services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.query | The SQL query to run.
|
| options/nixos/services.gitea-actions-runner.instances.<name>.url | Base URL of your Gitea/Forgejo instance.
|
| options/home-manager/services.podman.images.<name>.decryptionKeyFile | Path to key used for decryption of images.
|
| options/home-manager/services.xsuspender.rules.<name>.onlyOnBattery | Whether to enable process suspend only on battery.
|
| options/nixos/services.tarsnap.archives.<name>.includes | Include only files and directories matching these
patterns (the empty list includes everything)
|
| options/nixos/services.mautrix-meta.instances.<name>.enable | Whether to enable Mautrix-Meta, a Matrix <-> Facebook and Matrix <-> Instagram hybrid puppeting/relaybot bridge.
|
| options/nixos/services.drupal.sites.<name>.database.passwordFile | A file containing the password corresponding to
database.user.
|
| options/nixos/services.rke2.manifests.<name>.content | Content of the manifest file
|
| options/nixos/systemd.user.services.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LaunchOnlyOnce | This optional key specifies whether the job can only be run once and only once
|
| options/nixos/services.grafana.provision.alerting.templates.settings.templates.*.name | Name of the template, must be unique
|
| options/nixos/services.blockbook-frontend.<name>.coinName | See https://github.com/trezor/blockbook/blob/master/bchain/coins/blockchain.go#L61
for current of coins supported in master (Note: may differ from release).
|
| options/nixos/containers.<name>.tmpfs | Mounts a set of tmpfs file systems into the container
|
| options/nixos/services.blockbook-frontend.<name>.public | Public http server binding [address]:port.
|
| options/nixos/programs.xfs_quota.projects.<name>.sizeHardLimit | Hard limit of the project size.
|
| options/nixos/programs.proxychains.proxies.<name>.host | Proxy host or IP address.
|
| options/nixos/programs.xfs_quota.projects.<name>.sizeSoftLimit | Soft limit of the project size
|
| options/home-manager/programs.vscode.profiles.<name>.globalSnippets | Defines global user snippets.
|
| options/nixos/services.fedimintd.<name>.nginx.config.listen.*.port | Port number to listen on
|
| options/home-manager/programs.helix.themes | Each theme is written to
$XDG_CONFIG_HOME/helix/themes/theme-name.toml
|
| options/nixos/services.drupal.sites.<name>.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.moodle.virtualHost.locations.<name>.alias | Alias directory for requests
|
| options/nixos/services.nagios.virtualHost.locations.<name>.index | Adds DirectoryIndex directive
|
| options/nixos/services.moodle.virtualHost.locations.<name>.index | Adds DirectoryIndex directive
|
| options/nixos/services.nagios.virtualHost.locations.<name>.alias | Alias directory for requests
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.adminAddr | E-mail address of the server administrator.
|
| options/nixos/services.kanidm.provision.groups.<name>.present | Whether to ensure that this group is present or absent.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.boldColor | The bold color, null to use same as foreground.
|
| options/home-manager/programs.firefox.profiles.<name>.search.force | Whether to force replace the existing search
configuration
|
| options/home-manager/programs.vscode.profiles.<name>.userSettings | Configuration written to Visual Studio Code's
settings.json
|
| options/darwin/services.gitlab-runner.services.<name>.preCloneScript | Runner-specific command script executed before code is pulled.
|
| options/home-manager/services.xsuspender.rules.<name>.execSuspend | Before suspending, execute this shell script
|
| options/home-manager/services.restic.backups.<name>.initialize | Create the repository if it does not already exist
|
| options/nixos/services.drupal.sites.<name>.virtualHost.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.robotsEntries | Specification of pages to be ignored by web crawlers
|
| options/home-manager/programs.firefox.profiles.<name>.search.default | The default search engine used in the address bar and search
bar.
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.writeBuckets | The organization's buckets which should be allowed to be written
|
| options/nixos/services.kmonad.keyboards.<name>.defcfg.compose.key | The (optional) compose key to use.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.extraConfig.remote | Remote store extra configuration.
|
| options/nixos/services.authelia.instances.<name>.package | The authelia package to use.
|
| options/nixos/services.mosquitto.bridges.<name>.settings | Additional settings for this bridge.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.cursorBlinkMode | The cursor blink mode.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.relayGroups | All relay groups to provision
|
| options/nixos/services.openvpn.servers.<name>.authUserPass | This option can be used to store the username / password credentials
with the "auth-user-pass" authentication method
|
| options/home-manager/programs.floorp.profiles.<name>.settings | Attribute set of Floorp preferences
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.userNameCommand | A command that prints the user name to standard output.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StandardInPath | This optional key specifies what file should be used for data being supplied to stdin when using
stdio(3).
|
| options/nixos/services.syncthing.settings.folders.<name>.id | The ID of the folder
|
| options/nixos/services.orangefs.server.fileSystems.<name>.rootHandle | File system root ID.
|
| options/nixos/services.syncthing.settings.devices.<name>.id | The device ID
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.themes.*.pkg | The theme package.
|
| options/home-manager/services.syncthing.settings.devices.<name>.id | The device ID
|
| options/home-manager/services.syncthing.settings.folders.<name>.id | The ID of the folder
|
| options/nixos/security.pam.services.<name>.gnupg.noAutostart | Don't start gpg-agent if it is not running
|
| options/nixos/services.wstunnel.clients.<name>.customHeaders | Custom HTTP headers to send during the upgrade request.
|
| options/darwin/launchd.agents.<name>.serviceConfig.WaitForDebugger | This optional key specifies that launchd should instruct the kernel to have the job wait for a debugger
to attach before any code in the job is executed.
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.settings.<name>.permissions | Allowed permissions for this extension
|
| options/darwin/environment.userLaunchAgents.<name>.enable | Whether this file should be generated
|
| options/home-manager/services.podman.images.<name>.description | The description of the image.
|
| options/home-manager/services.podman.builds.<name>.description | The description of the build.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.ipcomp | Enable IPComp compression before encryption
|
| options/nixos/services.dokuwiki.sites.<name>.templates | List of path(s) to respective template(s) which are copied into the 'tpl' directory.
These templates need to be packaged before use, see example.
|
| options/nixos/containers.<name>.hostAddress6 | The IPv6 address assigned to the host interface.
(Not used when hostBridge is set.)
|
| options/nixos/services.openssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| options/nixos/services.woodpecker-agents.agents.<name>.path | Additional packages that should be added to the agent's PATH
|
| options/darwin/security.sandbox.profiles.<name>.allowSystemPaths | Whether to allow read access to FHS paths like /etc and /var.
|
| options/home-manager/services.restic.backups.<name>.inhibitsSleep | Prevents the system from sleeping while backing up
|
| options/nixos/services.davis.nginx.serverName | Name of this virtual host
|
| options/nixos/services.slskd.nginx.serverName | Name of this virtual host
|
| options/nixos/services.movim.nginx.serverName | Name of this virtual host
|
| options/nixos/services.restic.backups.<name>.createWrapper | Whether to generate and add a script to the system path, that has the same environment variables set
as the systemd service
|
| options/home-manager/services.restic.backups.<name>.createWrapper | Whether to generate and add a script to the system path, that has the
same environment variables set as the systemd service
|
| options/nixos/services.github-runners.<name>.group | Group under which to run the service
|
| options/nixos/services.bookstack.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.fedimintd.<name>.nginx.config.enableACME | Whether to ask Let's Encrypt to sign a certificate for this vhost
|
| options/nixos/programs.xfs_quota.projects.<name>.fileSystem | XFS filesystem hosting the xfs_quota project.
|
| options/nixos/services.snapper.configs.<name>.TIMELINE_CREATE | Defines whether hourly snapshots should be created.
|
| options/nixos/systemd.user.services.<name>.environment | Environment variables passed to the service's processes.
|
| options/home-manager/programs.librewolf.profiles.<name>.userChrome | Custom LibreWolf user chrome CSS.
|
| options/nixos/systemd.services.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/services.davis.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.movim.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.slskd.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.drupal.sites.<name>.virtualHost.locations | Declarative location config
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.aaa_id | Server side EAP-Identity to expect in the EAP method
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LimitLoadFromHosts | This configuration file only applies to hosts NOT listed with this key
|
| options/home-manager/programs.smug.projects.<name>.windows.*.selected | Whether this window should be selected by default at session start.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.pubkeys | List of raw public key candidates to use for
authentication
|
| options/nixos/services.bepasty.servers.<name>.secretKeyFile | A file that contains the server secret for safe session cookies, must be set.
secretKeyFile takes precedence over secretKey
|
| options/home-manager/programs.borgmatic.backups.<name>.hooks.extraConfig | Extra settings.
|
| options/nixos/services.restic.backups.<name>.rcloneConfigFile | Path to the file containing rclone configuration
|
| options/home-manager/services.xsuspender.rules.<name>.suspendDelay | Initial suspend delay in seconds.
|
| options/home-manager/services.podman.builds.<name>.workingDirectory | WorkingDirectory of the systemd unit file.
|
| options/home-manager/systemd.user.services.<name>.Unit.X-Restart-Triggers | List of free form strings that can be used to trigger a service
restart during Home Manager activation.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.logrotate.settings.<name>.global | Whether this setting is a global option or not: set to have these
settings apply to all files settings with a higher priority.
|
| options/home-manager/programs.vscode.profiles.<name>.enableUpdateCheck | Whether to enable update checks/notifications
|
| options/nixos/services.cjdns.ETHInterface.connectTo.<name>.publicKey | Public key at the opposite end of the tunnel.
|
| options/nixos/services.cjdns.UDPInterface.connectTo.<name>.publicKey | Public key at the opposite end of the tunnel.
|
| options/nixos/services.printing.cups-pdf.instances.<name>.enable | Whether to enable this cups-pdf instance.
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.description | Optional description for the API token
|
| options/nixos/services.fcgiwrap.instances.<name>.socket.mode | Mode to be set on the UNIX socket
|
| options/nixos/services.netbird.clients.<name>.openFirewall | Opens up firewall port for communication between NetBird peers directly over LAN or public IP,
without using (internet-hosted) TURN servers as intermediaries.
|
| options/nixos/services.netbird.tunnels.<name>.openFirewall | Opens up firewall port for communication between NetBird peers directly over LAN or public IP,
without using (internet-hosted) TURN servers as intermediaries.
|
| options/nixos/openstack.zfs.datasets.<name>.properties | Properties to set on this dataset.
|
| options/home-manager/programs.librewolf.profiles.<name>.isDefault | Whether this is a default profile.
|
| options/darwin/services.buildkite-agents.<name>.preCommands | Extra commands to run before starting buildkite.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StandardOutPath | This optional key specifies what file should be used for data being sent to stdout when using stdio(3).
|
| options/nixos/services.nginx.virtualHosts.<name>.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| options/nixos/systemd.network.networks.<name>.ipv6PREF64Prefixes | A list of IPv6PREF64Prefix sections to be added to the unit
|
| options/darwin/services.buildkite-agents.<name>.hooks.command | The command hook script will replace the default implementation of running
the build command.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.localForwards.*.host.address | The address to forward to.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.localForwards.*.bind.address | The address to bind to.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings | Settings which are applied to mujmap.toml
for the account
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| options/nixos/services.nntp-proxy.users.<name>.maxConnections | Maximum number of concurrent connections to the proxy for this user
|
| options/home-manager/services.podman.containers.<name>.extraConfig | INI sections and values to populate the Container Quadlet.
|
| options/nixos/services.kanidm.provision.groups.<name>.members | List of kanidm entities (persons, groups, ...) which are part of this group.
|
| options/darwin/environment.launchDaemons.<name>.enable | Whether this file should be generated
|
| options/nixos/boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.user | The user of the file
|
| options/home-manager/fonts.fontconfig.configFile.<name>.priority | Determines the order in which configs are loaded
|
| options/nixos/security.pam.services.<name>.ttyAudit.disablePattern | For each user matching one of comma-separated
glob patterns, disable TTY auditing
|
| options/nixos/services.nbd.server.exports.<name>.allowAddresses | IPs and subnets that are authorized to connect for this device
|
| options/nixos/services.borgbackup.jobs.<name>.exclude | Exclude paths matching any of the given patterns
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.nebula.networks.<name>.enableReload | Enable automatic config reload on config change
|
| options/nixos/services.influxdb2.provision.organizations.<name>.buckets.<name>.present | Whether to ensure that this bucket is present or absent.
|
| options/nixos/services.jupyterhub.kernels.<name>.extraPaths | Extra paths to link in kernel directory
|
| options/nixos/services.syncoid.commands.<name>.recursive | Whether to enable the transfer of child datasets.
|
| options/darwin/security.sandbox.profiles.<name>.readablePaths | List of paths that should be read-only inside the sandbox.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LowPriorityIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.wyoming.piper.servers.<name>.streaming | Whether to enable audio streaming on sentence boundaries.
|
| options/home-manager/accounts.email.accounts.<name>.msmtp.enable | Whether to enable msmtp
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.kubernetes.kubelet.taints.<name>.value | Value of taint.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.hotkeys | Hotkeys to configure.
|
| options/nixos/services.openvpn.servers.<name>.updateResolvConf | Use the script from the update-resolv-conf package to automatically
update resolv.conf with the DNS information provided by openvpn
|
| options/home-manager/programs.gnome-terminal.profile.<name>.scrollOnOutput | Whether to scroll when output is written.
|
| options/home-manager/services.podman.builds.<name>.environment | Environment variables to set in the build.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.policies | All policies to provision
|
| options/nixos/services.borgbackup.jobs.<name>.extraCreateArgs | Additional arguments for borg create
|
| options/nixos/services.kmonad.keyboards.<name>.defcfg.enable | Whether to enable automatic generation of the defcfg block
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| options/nixos/services.invoiceplane.sites.<name>.cron.key | Cron key taken from the administration page.
|
| options/nixos/services.agorakit.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.fediwall.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.librenms.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.fcgiwrap.instances.<name>.socket.group | Group to be set as owner of the UNIX socket.
|
| options/nixos/services.kanboard.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.mainsail.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.extraFiles | Extra files to link to the vault directory.
|
| options/nixos/boot.initrd.systemd.contents.<name>.dlopen.features | Features to enable via dlopen ELF notes
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/nixos/services.drupal.sites.<name>.database.tablePrefix | The $table_prefix is the value placed in the front of your database tables
|
| options/nixos/services.xonotic.settings.hostname | The name that will appear in the server list. $g_xonoticversion
gets replaced with the current version.
|
| options/nixos/services.snipe-it.nginx.serverName | Name of this virtual host
|
| options/nixos/services.fedimintd.<name>.api_ws.openFirewall | Opens TCP port in firewall for fedimintd's Websocket API
|
| options/nixos/systemd.user.services.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/darwin/launchd.agents.<name>.serviceConfig.SessionCreate | This key specifies that the job should be spawned into a new security
audit session rather than the default session for the context is belongs
to
|
| options/nixos/services.consul-template.instances.<name>.group | Group under which this instance runs.
|
| options/nixos/services.firewalld.services.<name>.sourcePorts | Source ports for the service.
|
| options/nixos/services.tahoe.introducers.<name>.package | The tahoelafs package to use.
|
| options/nixos/services.gitlab-runner.services.<name>.preBuildScript | Runner-specific command script executed after code is pulled,
just before build executes.
|
| options/darwin/services.gitlab-runner.services.<name>.preBuildScript | Runner-specific command script executed after code is pulled,
just before build executes.
|
| options/home-manager/services.xsuspender.rules.<name>.sendSignals | Whether to send SIGSTOP / SIGCONT signals or not
|
| options/nixos/fileSystems.<name>.device | The device as passed to mount
|
| options/nixos/services.traefik.dynamic.files.<name>.settings | Dynamic configuration for Traefik, written in Nix.
This will be serialized to JSON (which is considered valid YAML) at build, and passed as part of the static file.
|
| options/nixos/programs.schroot.profiles.<name>.copyfiles | A list of files to copy into the chroot from the host system.
|
| options/darwin/security.sandbox.profiles.<name>.writablePaths | List of paths that should be read/write inside the sandbox.
|
| options/nixos/services.gerrit.plugins | List of plugins to add to Gerrit
|
| options/nixos/image.repart.partitions.<name>.stripNixStorePrefix | Whether to strip /nix/store/ from the store paths
|
| options/nixos/services.wstunnel.clients.<name>.settings | Command line arguments to pass to wstunnel
|
| options/nixos/services.wstunnel.servers.<name>.settings | Command line arguments to pass to wstunnel
|
| options/home-manager/launchd.agents.<name>.config.LaunchEvents | Specifies higher-level event types to be used as launch-on-demand event
sources
|
| options/nixos/services.blockbook-frontend.<name>.configFile | Location of the blockbook configuration file.
|
| options/nixos/services.wordpress.sites.<name>.languages | List of path(s) to respective language(s) which are copied from the 'languages' directory.
|
| options/darwin/services.buildkite-agents.<name>.hooks.pre-command | The pre-command hook will run just before your build command runs
|
| options/darwin/launchd.agents.<name>.serviceConfig.RootDirectory | This optional key is used to specify a directory to chroot(2) to before running the job.
|
| options/nixos/security.pam.services.<name>.kwallet.forceRun | The force_run option is used to tell the PAM module for KWallet
to forcefully run even if no graphical session (such as a GUI
display manager) is detected
|
| options/nixos/services.logrotate.settings.<name>.files | Single or list of files for which rules are defined
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.WaitForDebugger | This optional key specifies that launchd should instruct the kernel to have the job wait for a debugger
to attach before any code in the job is executed.
|
| options/home-manager/services.muchsync.remotes.<name>.sshCommand | Specifies a command line to pass to /bin/sh
to execute a command on another machine
|
| options/nixos/services.restic.backups.<name>.rcloneOptions | Options to pass to rclone to control its behavior
|
| options/home-manager/services.restic.backups.<name>.rcloneOptions | Options to pass to rclone to control its behavior
|
| options/nixos/services.anubis.instances.<name>.policy.extraBots | Additional bot rules appended to the policy
|
| options/home-manager/accounts.email.accounts.<name>.aerc.extraAccounts | Extra config added to the configuration section for this account in
$HOME/.config/aerc/accounts.conf
|
| options/nixos/services.keepalived.vrrpScripts.<name>.weight | Following a failure, adjust the priority by this weight.
|
| options/nixos/services.k3s.autoDeployCharts.<name>.createNamespace | Whether to create the target namespace if not present.
|
| options/nixos/services.k3s.autoDeployCharts.<name>.targetNamespace | The namespace in which the Helm chart gets installed.
|
| options/nixos/services.wordpress.sites.<name>.database.socket | Path to the unix socket file to use for authentication.
|
| options/home-manager/programs.floorp.profiles.<name>.bookmarks.force | Whether to force override existing custom bookmarks.
|
| options/nixos/services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.labels | A set of columns that will be used as Prometheus labels.
|
| options/nixos/services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.values | A set of columns that will be used as values of this metric.
|
| options/nixos/services.neo4j.ssl.policies.<name>.publicCertificate | The name of public X.509 certificate (chain) file in PEM format
for this policy to be found in the baseDirectory,
or the absolute path to the certificate file
|
| options/nixos/services.blockbook-frontend.<name>.package | The blockbook package to use.
|
| options/nixos/services.snapper.configs.<name>.SUBVOLUME | Path of the subvolume or mount point
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.palette | The terminal palette.
|
| options/home-manager/programs.hexchat.channels.<name>.options.bypassProxy | Bypass proxy.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.compression | Specifies whether to use compression
|
| options/nixos/services.davis.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.slskd.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.movim.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.anubis.instances.<name>.botPolicy | Anubis policy configuration in Nix syntax
|
| options/nixos/image.repart.partitions.<name>.nixStorePrefix | The prefix to use for store paths
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.extraArgs | Extra arguments to pass to the server commandline.
|
| options/home-manager/systemd.user.services.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/nixos/services.ghostunnel.servers.<name>.cacert | Path to CA bundle file (PEM/X509)
|
| options/nixos/services.kimai.sites.<name>.environmentFile | Securely pass environment variabels to Kimai
|
| options/darwin/launchd.daemons.<name>.serviceConfig.StandardInPath | This optional key specifies what file should be used for data being supplied to stdin when using
stdio(3).
|
| options/nixos/services.wyoming.piper.servers.<name>.zeroconf.enable | Whether to enable zeroconf discovery.
|
| options/nixos/services.anubis.instances.<name>.settings | Freeform configuration via environment variables for Anubis
|
| options/nixos/services.i2pd.inTunnels.<name>.destination | Remote endpoint, I2P hostname or b32.i2p address.
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.acl | Control client access to topics on the broker.
|
| options/home-manager/accounts.email.accounts.<name>.passwordCommand | A command, which when run writes the account password on
standard output.
|
| options/nixos/services.snapper.configs.<name>.TIMELINE_LIMIT_DAILY | Limits for timeline cleanup.
|
| options/nixos/services.murmur.registerHostname | DNS hostname where your server can be reached
|
| options/nixos/services.nebula.networks.<name>.firewall.inbound | Firewall rules for inbound traffic.
|
| options/nixos/services.orangefs.server.fileSystems.<name>.extraConfig | Extra config for <FileSystem> section.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.listen.*.port | Port to listen on
|
| options/nixos/services.drupal.sites.<name>.virtualHost.documentRoot | The path of Apache's document root directory
|
| options/nixos/systemd.network.networks.<name>.ipv6RoutePrefixes | A list of ipv6RoutePrefix sections to be added to the unit
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.ax25.axports.<name>.description | Free format description of this interface.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.listen.*.ssl | Whether to enable SSL (https) support.
|
| options/nixos/services.restic.backups.<name>.repositoryFile | Path to the file containing the repository location to backup to.
|
| options/nixos/services.warpgate.settings.sso_providers.*.name | Internal identifier of SSO provider.
|
| options/nixos/services.zeronsd.servedNetworks.<name>.settings | Settings for zeronsd
|
| options/nixos/services.bitcoind.<name>.extraCmdlineOptions | Extra command line options to pass to bitcoind
|
| options/nixos/services.wstunnel.servers.<name>.loggingLevel | Passed to --log-lvl
Control the log verbosity. i.e: TRACE, DEBUG, INFO, WARN, ERROR, OFF
For more details, checkout [EnvFilter](https://docs.rs/tracing-subscriber/latest/tracing_subscriber/filter/struct
|
| options/nixos/services.wstunnel.clients.<name>.loggingLevel | Passed to --log-lvl
Control the log verbosity. i.e: TRACE, DEBUG, INFO, WARN, ERROR, OFF
For more details, checkout [EnvFilter](https://docs.rs/tracing-subscriber/latest/tracing_subscriber/filter/struct
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.bookstack.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.bookstack.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.group | The group of the file
|
| options/nixos/services.btrbk.instances.<name>.onCalendar | How often this btrbk instance is started
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.enable | Whether to enable Wyoming faster-whisper server.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.rectangle | The node's geometry, in the format WxH+X+Y.
|
| options/nixos/boot.initrd.luks.devices.<name>.bypassWorkqueues | Whether to bypass dm-crypt's internal read and write workqueues
|
| options/nixos/services.gitlab-runner.services.<name>.dockerExtraHosts | Add a custom host-to-IP mapping.
|
| options/nixos/services.sanoid.templates.<name>.autoprune | Whether to automatically prune old snapshots.
|
| options/darwin/services.gitlab-runner.services.<name>.dockerExtraHosts | Add a custom host-to-IP mapping.
|
| options/home-manager/programs.librewolf.profiles.<name>.extraConfig | Extra preferences to add to user.js.
|
| options/home-manager/accounts.email.accounts.<name>.notmuch.neomutt.enable | Whether to enable Notmuch support in NeoMutt.
|
| options/nixos/services.bacula-sd.director.<name>.monitor | If Monitor is set to no, this director will have
full access to this Storage daemon
|
| options/nixos/services.bacula-fd.director.<name>.monitor | If Monitor is set to no, this director will have
full access to this Storage daemon
|
| options/nixos/services.snipe-it.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags | Tag configuration
|
| options/nixos/services.borgbackup.jobs.<name>.inhibitsSleep | Prevents the system from sleeping while backing up.
|
| options/home-manager/programs.floorp.profiles.<name>.extensions | Submodule for installing and configuring extensions.
|
| options/nixos/services.inadyn.settings.provider.<name>.include | File to include additional settings for this provider from.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| options/home-manager/accounts.calendar.accounts.<name>.pimsync.enable | Whether to enable synchronization using pimsync.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups | Some email providers (Gmail) have a different directory hierarchy for
synchronized email messages
|
| options/darwin/launchd.agents.<name>.serviceConfig.StandardErrorPath | This optional key specifies what file should be used for data being sent to stderr when using stdio(3).
|
| options/darwin/launchd.agents.<name>.serviceConfig.EnableGlobbing | This flag causes launchd to use the glob(3) mechanism to update the program arguments before invocation.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.StandardOutPath | This optional key specifies what file should be used for data being sent to stdout when using stdio(3).
|
| options/nixos/services.tor.relay.onionServices.<name>.authorizeClient.clientNames | Only clients that are listed here are authorized to access the hidden service
|
| options/nixos/services.honk.username | The admin account username.
|
| options/nixos/services.i2pd.outTunnels.<name>.destination | Remote endpoint, I2P hostname or b32.i2p address.
|
| options/nixos/services.nebula.networks.<name>.isLighthouse | Whether this node is a lighthouse.
|
| options/home-manager/services.podman.containers.<name>.networkAlias | Network aliases for the container.
|
| options/nixos/services.postfix.settings.master.<name>.maxproc | The maximum number of processes to spawn for this service
|
| options/nixos/services.borgbackup.jobs.<name>.readWritePaths | By default, borg cannot write anywhere on the system but
$HOME/.config/borg and $HOME/.cache/borg
|
| options/nixos/services.gitlab-runner.services.<name>.postBuildScript | Runner-specific command script executed after code is pulled
and just after build executes.
|
| options/darwin/services.gitlab-runner.services.<name>.postBuildScript | Runner-specific command script executed after code is pulled
and just after build executes.
|
| options/nixos/services.kimai.sites.<name>.database.serverVersion | MySQL exact version string
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SessionCreate | This key specifies that the job should be spawned into a new security
audit session rather than the default session for the context is belongs
to
|
| options/nixos/services.sabnzbd.settings.servers.<name>.timeout | Time, in seconds, to wait for a response before
attempting error recovery.
|
| options/nixos/services.github-runners.<name>.tokenType | Type of token to use for runner registration
|
| options/darwin/launchd.agents.<name>.serviceConfig.LimitLoadToSessionType | This configuration file only applies to sessions of the type specified
|
| options/nixos/services.grafana.settings.analytics.reporting_enabled | When enabled Grafana will send anonymous usage statistics to stats.grafana.org
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.root | Root directory for requests.
|
| options/home-manager/accounts.email.accounts.<name>.imapnotify.boxes | IMAP folders to watch.
|
| options/nixos/services.bacula-sd.director.<name>.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| options/nixos/services.bacula-fd.director.<name>.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| options/nixos/boot.initrd.systemd.contents.<name>.dlopen.usePriority | Priority of dlopen ELF notes to include. "required" is
minimal, "recommended" includes "required", and
"suggested" includes "recommended"
|
| options/nixos/boot.initrd.luks.devices.<name>.fido2.credentials | List of FIDO2 credential IDs
|
| options/nixos/services.syncthing.settings.folders.<name>.type | Controls how the folder is handled by Syncthing
|
| options/nixos/services.moodle.virtualHost.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/nixos/services.nagios.virtualHost.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/home-manager/services.syncthing.settings.folders.<name>.type | Controls how the folder is handled by Syncthing
|
| options/nixos/services.akkoma.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.fluidd.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.fedimintd.<name>.nginx.config.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.gancio.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.monica.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.matomo.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/security.auditd.plugins.<name>.direction | The option is dictated by the plugin
|
| options/nixos/services.nginx.virtualHosts.<name>.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| options/nixos/services.gitlab-runner.services.<name>.dockerPullPolicy | Default pull-policy for Docker images
|
| options/nixos/services.nginx.virtualHosts.<name>.listen.*.proxyProtocol | Enable PROXY protocol.
|
| options/home-manager/programs.vscode.profiles.<name>.extensions | The extensions Visual Studio Code should be started with.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.certificateFile | Specifies files from which the user certificate is read.
|
| options/nixos/services.radicle.ci.broker.settings.adapters.<name>.env | Environment variables to add when running the adapter.
|
| options/darwin/services.github-runners.<name>.tokenFile | The full path to a file which contains either
- a fine-grained personal access token (PAT),
- a classic PAT
- or a runner registration token
Changing this option or the tokenFile’s content triggers a new runner registration
|
| options/nixos/services.syncthing.settings.folders.<name>.label | The label of the folder.
|
| options/home-manager/programs.borgmatic.backups.<name>.output.extraConfig | Extra settings.
|
| options/home-manager/services.syncthing.settings.folders.<name>.label | The label of the folder.
|
| options/nixos/services.hostapd.radios.<name>.settings | Extra configuration options to put at the end of global initialization, before defining BSSs
|
| options/nixos/services.dolibarr.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.librenms.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.librenms.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.kanboard.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.kanboard.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.fediwall.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.fediwall.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.agorakit.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.agorakit.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.mainsail.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.mainsail.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.RootDirectory | This optional key is used to specify a directory to chroot(2) to before running the job.
|
| options/home-manager/accounts.email.accounts.<name>.neomutt.sendMailCommand | Command to send a mail
|
| options/home-manager/launchd.agents.<name>.config.KeepAlive | This optional key is used to control whether your job is to be kept continuously running or to let
demand and conditions control the invocation
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.beamSize | The number of beams to use in beam search
|
| options/home-manager/programs.zsh.plugins.*.file | The plugin script to source
|
| options/nixos/services.kanidm.provision.persons.<name>.present | Whether to ensure that this person is present or absent.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.extraConfig.channel | Per channel extra configuration.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.extraConfig.account | Account section extra configuration.
|
| options/nixos/services.kanata.keyboards.<name>.configFile | The config file
|
| options/nixos/services.keyd.keyboards.<name>.settings | Configuration, except ids section, that is written to /etc/keyd/.conf
|
| options/nixos/security.acme.certs.<name>.credentialFiles | Environment variables suffixed by "_FILE" to set for the cert's service
for your selected dnsProvider
|
| options/nixos/services.bacula-sd.autochanger.<name>.devices | |
| options/nixos/services.neo4j.ssl.policies.<name>.revokedDir | Path to directory of CRLs (Certificate Revocation Lists) in
PEM format
|
| options/nixos/services.easytier.instances.<name>.configFile | Path to easytier config file
|
| options/darwin/services.gitlab-runner.services.<name>.executor | Select executor, eg. shell, docker, etc
|
| options/home-manager/accounts.calendar.accounts.<name>.khal.priority | Priority of a calendar used for coloring (calendar with highest priority is preferred).
|
| options/nixos/services.fedimintd.<name>.nginx.config.http2 | Whether to enable the HTTP/2 protocol
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.id | If this attribute is given with non-zero length, it will set the password identifier
for this entry
|
| options/nixos/services.firewalld.zones.<name>.egressPriority | Priority for outbound traffic
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/nixos/containers.<name>.specialArgs | A set of special arguments to be passed to NixOS modules
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.sslServerCert | Path to server SSL certificate.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.remoteForwards.*.host.address | The address to forward to.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.remoteForwards.*.bind.address | The address to bind to.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children | CHILD_SA configuration sub-section
|
| options/home-manager/i18n.inputMethod.fcitx5.settings.addons.<name>.sections | attribute set of section of an INI file (attrs of INI atom (null, bool, int, float or string))
|
| options/home-manager/programs.firefox.profiles.<name>.settings | Attribute set of Firefox preferences
|
| options/darwin/services.buildkite-agents.<name>.hooks.post-command | The post-command hook will run after the bootstrap script has run your
build commands
|
| options/nixos/services.drupal.sites.<name>.virtualHost.globalRedirect | If set, all requests for this host are redirected permanently to
the given URL.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.servedDirs | This option provides a simple way to serve static directories.
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/nixos/services.caddy.virtualHosts.<name>.listenAddresses | A list of host interfaces to bind to for this virtual host.
|
| options/nixos/services.restic.backups.<name>.backupPrepareCommand | A script that must run before starting the backup process.
|
| options/nixos/services.restic.backups.<name>.backupCleanupCommand | A script that must run after finishing the backup process.
|
| options/home-manager/services.podman.containers.<name>.extraPodmanArgs | Extra arguments to pass to the podman run command.
|
| options/nixos/services.ttyd.username | Username for basic http authentication.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.WaitForDebugger | This optional key specifies that launchd should instruct the kernel to have the job wait for a debugger
to attach before any code in the job is executed.
|
| options/nixos/services.bookstack.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.vdirsyncer.jobs.<name>.config.storages | vdirsyncer storage configurations
|
| options/home-manager/accounts.email.accounts.<name>.signature.command | A command that generates a signature.
|
| options/nixos/services.firewalld.services.<name>.sourcePorts.*.port | |
| options/home-manager/services.podman.volumes.<name>.description | The description of the volume.
|
| options/nixos/services.syncoid.commands.<name>.localSourceAllow | Permissions granted for the services.syncoid.user user
for local source datasets
|
| options/nixos/services.keepalived.vrrpScripts.<name>.script | (Path of) Script command to execute followed by args, i.e. cmd [args]...
|
| options/darwin/services.gitlab-runner.services.<name>.runUntagged | Register to run untagged builds; defaults to
true when tagList is empty.
|
| options/nixos/services.postfix.settings.master.<name>.private | Whether the service's sockets and storage directory is restricted to
be only available via the mail system
|
| options/nixos/services.kmonad.keyboards.<name>.defcfg.compose.delay | The delay (in milliseconds) between compose key sequences.
|
| options/home-manager/services.kanshi.profiles.<name>.outputs.*.mode | <width>x<height>[@<rate>[Hz]]
Configures the specified output to use the specified mode
|
| options/nixos/services.tarsnap.archives.<name>.followSymlinks | Whether to follow all symlinks in archive trees.
|
| options/home-manager/programs.librewolf.profiles.<name>.userContent | Custom LibreWolf user content CSS.
|
| options/nixos/services.gitlab-runner.services.<name>.executor | Select executor, eg. shell, docker, etc
|
| options/nixos/systemd.network.networks.<name>.routingPolicyRules | A list of routing policy rules sections to be added to the unit
|
| options/nixos/services.kubernetes.kubelet.taints.<name>.effect | Effect of taint.
|
| options/nixos/services.grafana.provision.alerting.templates.settings.deleteTemplates.*.name | Name of the template, must be unique
|
| options/home-manager/services.podman.containers.<name>.network | The network mode or network/s to connect the container to
|
| options/home-manager/services.git-sync.repositories.<name>.uri | The URI of the remote to be synchronized
|
| options/nixos/services.v4l2-relayd.instances.<name>.input.pipeline | The gstreamer-pipeline to use for the input-stream.
|
| options/nixos/services.i2pd.outTunnels.<name>.destinationPort | Connect to particular port at destination.
|
| options/nixos/services.postfix.masterConfig.<name>.privileged | |
| options/nixos/security.pam.services.<name>.enableGnomeKeyring | If enabled, pam_gnome_keyring will attempt to automatically unlock the
user's default Gnome keyring upon login
|
| options/nixos/systemd.paths.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/systemd.units.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.wpaPasswordFile | Sets the password for WPA-PSK
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.policies | Whether to install IPsec policies or not
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.logFormat | Log format for Apache's log files
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.EnableGlobbing | This flag causes launchd to use the glob(3) mechanism to update the program arguments before invocation.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StandardErrorPath | This optional key specifies what file should be used for data being sent to stderr when using stdio(3).
|
| options/home-manager/programs.librewolf.profiles.<name>.search.order | The order the search engines are listed in
|
| options/nixos/services.gitea-actions-runner.instances.<name>.token | Plain token to register at the configured Gitea/Forgejo instance.
|
| options/nixos/services.vdirsyncer.jobs.<name>.forceDiscover | Run yes | vdirsyncer discover prior to vdirsyncer sync
|
| options/nixos/services.frigate.settings.cameras.<name>.ffmpeg.inputs | List of inputs for this camera.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.index | Adds index directive.
|
| options/nixos/systemd.paths.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/programs.proxychains.proxies.<name>.enable | Whether to enable this proxy.
|
| options/nixos/services.firewalld.services.<name>.includes | Services to include for the service.
|
| options/nixos/services.grafana.provision.datasources.settings.datasources.*.name | Name of the datasource
|
| options/home-manager/services.restic.backups.<name>.repositoryFile | Path to a file containing the repository location to backup to
|
| options/nixos/security.acme.certs.<name>.environmentFile | Path to an EnvironmentFile for the cert's service containing any required and
optional environment variables for your selected dnsProvider
|
| options/nixos/services.reposilite.database.dbname | Database name.
|
| options/nixos/boot.binfmt.registrations.<name>.offset | The byte offset of the magic number used for recognition.
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.corePlugins | Core plugins to activate.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LimitLoadToSessionType | This configuration file only applies to sessions of the type specified
|
| options/nixos/services.inadyn.settings.custom.<name>.password | Password for this DDNS provider
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.enableUserDir | Whether to enable serving ~/public_html as
/~«username».
|
| options/home-manager/programs.zed-editor.themes | Each theme is written to
$XDG_CONFIG_HOME/zed/themes/theme-name.json
where the name of each attribute is the theme-name
See https://zed.dev/docs/extensions/themes for the structure of a
Zed theme
|
| options/nixos/systemd.user.units.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/systemd.user.paths.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/services.vmalert.instances.<name>.settings | vmalert configuration, passed via command line flags
|
| options/nixos/services.fluidd.nginx.serverName | Name of this virtual host
|
| options/nixos/services.akkoma.nginx.serverName | Name of this virtual host
|
| options/nixos/services.gancio.nginx.serverName | Name of this virtual host
|
| options/nixos/services.matomo.nginx.serverName | Name of this virtual host
|
| options/nixos/services.monica.nginx.serverName | Name of this virtual host
|
| options/nixos/services.akkoma.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.fediwall.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.kanboard.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.librenms.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.dolibarr.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.fluidd.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.gancio.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.agorakit.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.matomo.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.mainsail.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.monica.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.pixelfed.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.copy_ecn | Whether to copy the ECN (Explicit Congestion Notification) header field
to/from the outer IP header in tunnel mode
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources | All resources to provision
|
| options/nixos/services.fcgiwrap.instances.<name>.process.group | Group as which this instance of fcgiwrap will be run.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.librenms.database.username | Name of the user on the MySQL/MariaDB server
|
| options/nixos/services.firewalld.zones.<name>.masquerade | Whether to enable masquerading in the zone.
|
| options/nixos/services.autosuspend.checks.<name>.enabled | Whether to enable this activity check.
|
| options/nixos/services.keepalived.vrrpScripts.<name>.timeout | Seconds after which script is considered to have failed.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.gatewayGroups | All gateway groups (sites) to provision
|
| options/home-manager/programs.ssh.matchBlocks.<name>.identitiesOnly | Specifies that ssh should only use the authentication
identity explicitly configured in the
~/.ssh/config files or passed on the
ssh command-line, even if ssh-agent
offers more identities.
|
| options/nixos/services.borgbackup.jobs.<name>.extraCompactArgs | Additional arguments for borg compact
|
| options/nixos/services.fedimintd.<name>.nginx.config.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| options/nixos/services.openssh.knownHosts.<name>.publicKeyFile | The path to the public key file for the host
|
| options/nixos/services.gitlab-runner.services.<name>.dockerVolumes | Bind-mount a volume and create it
if it doesn't exist prior to mounting.
|
| options/nixos/services.snapper.configs.<name>.TIMELINE_CLEANUP | Defines whether the timeline cleanup algorithm should be run for the config.
|
| options/darwin/services.gitlab-runner.services.<name>.dockerVolumes | Bind-mount a volume and create it
if it doesn't exist prior to mounting.
|
| options/nixos/users.users.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| options/darwin/users.users.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| options/nixos/services.snapper.configs.<name>.TIMELINE_LIMIT_YEARLY | Limits for timeline cleanup.
|
| options/nixos/services.snapper.configs.<name>.TIMELINE_LIMIT_WEEKLY | Limits for timeline cleanup.
|
| options/nixos/services.snapper.configs.<name>.TIMELINE_LIMIT_HOURLY | Limits for timeline cleanup.
|
| options/nixos/services.fedimintd.<name>.nginx.config.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SessionCreate | This key specifies that the job should be spawned into a new security
audit session rather than the default session for the context is belongs
to
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/nixos/systemd.network.networks.<name>.dhcpServerStaticLeases | A list of DHCPServerStaticLease sections to be added to the unit
|
| options/nixos/services.sanoid.datasets.<name>.recursive | Whether to recursively snapshot dataset children
|
| options/nixos/systemd.network.netdevs.<name>.wireguardPeers | Each item in this array specifies an option in the
[WireGuardPeer] section of the unit
|
| options/nixos/services.buildkite-agents.<name>.privateSshKeyPath | OpenSSH private key
A run-time path to the key file, which is supposed to be provisioned
outside of Nix store.
|
| options/darwin/services.buildkite-agents.<name>.privateSshKeyPath | OpenSSH private key
A run-time path to the key file, which is supposed to be provisioned
outside of Nix store.
|
| options/nixos/services.bcg.mqtt.username | MQTT server access username.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations | Declarative location config
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.index | Adds index directive.
|
| options/nixos/systemd.user.paths.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/home-manager/accounts.email.accounts.<name>.astroid.sendMailCommand | Command to send a mail
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.locations.<name>.index | Adds DirectoryIndex directive
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.locations.<name>.alias | Alias directory for requests
|
| options/home-manager/programs.firefox.profiles.<name>.bookmarks.force | Whether to force override existing custom bookmarks.
|
| options/nixos/fileSystems.<name>.options | Options used to mount the file system
|
| options/nixos/fileSystems.<name>.depends | List of paths that should be mounted before this one
|
| options/darwin/launchd.daemons.<name>.serviceConfig.RootDirectory | This optional key is used to specify a directory to chroot(2) to before running the job.
|
| options/home-manager/services.restic.backups.<name>.backupCleanupCommand | A script that must run after finishing the backup process
|
| options/home-manager/services.restic.backups.<name>.backupPrepareCommand | A script that must run before starting the backup process
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.http2 | Whether to enable HTTP 2
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.timeout | HTTP timeout in seconds. 0 means forever or system timeout.
|
| options/nixos/services.consul-template.instances.<name>.enable | Whether to enable this consul-template instance.
|
| options/home-manager/launchd.agents.<name>.config.ProgramArguments | This key maps to the second argument of execvp(3)
|
| options/nixos/services.xserver.cmt.models | Which models to enable cmt for
|
| options/nixos/services.simplesamlphp.<name>.libDir | Path to the SimpleSAMLphp library directory.
|
| options/nixos/services.xserver.xkb.extraLayouts.<name>.languages | A list of languages provided by the layout.
(Use ISO 639-2 codes, for example: "eng" for english)
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.remote_ts | List of remote selectors to include in CHILD_SA
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rand_time | Time range from which to choose a random value to subtract from
rekey_time
|
| options/nixos/users.users.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| options/darwin/users.users.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| options/nixos/systemd.services.<name>.notSocketActivated | If set, a changed unit is never assumed to be
socket-activated on configuration switch, even if
it might have associated socket units
|
| options/nixos/security.acme.certs.<name>.dnsPropagationCheck | Toggles lego DNS propagation check, which is used alongside DNS-01
challenge to ensure the DNS entries required are available.
|
| options/darwin/services.buildkite-agents.<name>.hooks.pre-artifact | The pre-artifact hook will run just before artifacts are uploaded
|
| options/home-manager/programs.smug.projects.<name>.windows.*.panes.*.commands | Commands to execute when pane starts.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/home-manager/services.restic.backups.<name>.repository | Repository to backup to
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.priority | Optional fixed priority for IPsec policies
|
| options/home-manager/programs.ssh.matchBlocks.<name>.dynamicForwards.*.address | The address to bind to.
|
| options/home-manager/accounts.email.accounts.<name>.lieer.sync.frequency | How often to synchronize the account
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.tryFiles | Adds try_files directive.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.customCommand | The command to use to start the shell, or null for default shell.
|
| options/nixos/services.nebula.networks.<name>.lighthouse.dns.port | UDP port number for lighthouse DNS server.
|
| options/nixos/services.snapserver.streams.<name>.sampleFormat | Default sample format.
|
| options/home-manager/programs.papis.libraries.<name>.isDefault | Whether this is a default library
|
| options/nixos/services.rke2.autoDeployCharts.<name>.createNamespace | Whether to create the target namespace if not present.
|
| options/nixos/services.rke2.autoDeployCharts.<name>.targetNamespace | The namespace in which the Helm chart gets installed.
|
| options/nixos/services.pgbackrest.repos.<name>.sftp-private-key-file | SFTP private key file
|
| options/home-manager/programs.floorp.profiles.<name>.containers | Attribute set of container configurations
|
| options/home-manager/accounts.email.accounts.<name>.imapnotify.enable | Whether to enable imapnotify.
|
| options/nixos/services.v4l2-relayd.instances.<name>.extraPackages | Extra packages to add to GST_PLUGIN_PATH for the instance.
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.device | Determines the platform faster-whisper is run on
|
| options/nixos/services.firewalld.zones.<name>.sourcePorts.*.protocol | |
| options/home-manager/programs.obsidian.defaultSettings.hotkeys.<name>.*.key | The hotkey.
|
| options/home-manager/programs.obsidian.defaultSettings.extraFiles.<name>.text | Text of the file.
|
| options/home-manager/accounts.email.accounts.<name>.himalaya.settings | Himalaya CLI configuration for this email account
|
| options/nixos/boot.binfmt.registrations.<name>.interpreter | The interpreter to invoke to run the program
|
| options/nixos/services.invoiceplane.sites.<name>.enable | Whether to enable InvoicePlane web application.
|
| options/nixos/services.armagetronad.servers.<name>.dns | DNS address to use for this server
|
| options/nixos/systemd.user.services.<name>.notSocketActivated | If set, a changed unit is never assumed to be
socket-activated on configuration switch, even if
it might have associated socket units
|
| options/nixos/systemd.network.networks.<name>.fairQueueingConfig | Each attribute in this set specifies an option in the
[FairQueueing] section of the unit
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits | Resource limits to be imposed on the job
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits | Resource limits to be imposed on the job
|
| options/nixos/services.fcgiwrap.instances.<name>.process.user | User as which this instance of fcgiwrap will be run
|
| options/nixos/services.bookstack.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.fediwall.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.agorakit.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.librenms.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.kanboard.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.mainsail.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.sslServerChain | Path to server SSL chain file.
|
| options/home-manager/systemd.user.paths.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/nixos/services.fedimintd.<name>.nginx.config.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.woodpecker-agents.agents.<name>.package | The woodpecker-agent package to use.
|
| options/home-manager/programs.firefox.profiles.<name>.extensions | Submodule for installing and configuring extensions.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.mac | If this attribute is not included, or if is set to the wildcard address (ff:ff:ff:ff:ff:ff),
the entry is available for any station (client) to use
|
| options/darwin/launchd.daemons.<name>.serviceConfig.EnableGlobbing | This flag causes launchd to use the glob(3) mechanism to update the program arguments before invocation.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.StandardErrorPath | This optional key specifies what file should be used for data being sent to stderr when using stdio(3).
|
| options/nixos/fileSystems.<name>.neededForBoot | If set, this file system will be mounted in the initial ramdisk
|
| options/nixos/services.nebula.networks.<name>.firewall.outbound | Firewall rules for outbound traffic.
|
| options/home-manager/accounts.email.accounts.<name>.imapnotify.extraArgs | Extra arguments to pass to goimapnotify.
|
| options/nixos/services.davis.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.movim.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.slskd.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/containers.<name>.macvlans | The list of host interfaces from which macvlans will be
created
|
| options/nixos/services.fedimintd.<name>.bitcoin.rpc.secretFile | If set the URL specified in bitcoin.rpc.url will get the content of this file added
as an URL password, so http://user@example.com will turn into http://user:SOMESECRET@example.com
|
| options/nixos/services.wstunnel.clients.<name>.httpProxy | Proxy to use to connect to the wstunnel server (USER:PASS@HOST:PORT).
Passwords specified here will be world-readable in the Nix store!
To pass a password to the service, point the environmentFile option
to a file containing PROXY_PASSWORD=<your-password-here> and set
this option to <user>:$PROXY_PASSWORD@<host>:<port>
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.gitea-actions-runner.instances.<name>.enable | Whether to enable Gitea Actions Runner instance.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.enableACME | Whether to ask Let's Encrypt to sign a certificate for this vhost
|
| options/home-manager/i18n.inputMethod.fcitx5.settings.addons.<name>.globalSection | global section of an INI file (attrs of INI atom (null, bool, int, float or string))
|
| options/home-manager/services.syncthing.settings.folders.<name>.path | The path to the folder which should be shared
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.vlanid | If this attribute is given, all clients using this entry will get tagged with the given VLAN ID.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LimitLoadToSessionType | This configuration file only applies to sessions of the type specified
|
| options/nixos/services.openbao.settings.listener.<name>.address | The TCP address or UNIX socket path to listen on.
|
| options/home-manager/programs.floorp.profiles.<name>.search.privateDefault | The default search engine used in the Private Browsing.
|
| options/nixos/services.printing.cups-pdf.instances.<name>.confFileText | This will contain the contents of cups-pdf.conf for this instance, derived from settings
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.pk | If this attribute is given, SAE-PK will be enabled for this connection
|
| options/nixos/services.influxdb2.provision.organizations.<name>.buckets.<name>.retention | The duration in seconds for which the bucket will retain data (0 is infinite).
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.addressDescription | An optional description for resource address, usually a full link to the resource including a schema.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.hostaccess | Hostaccess variable to pass to updown script
|
| options/home-manager/programs.borgmatic.backups.<name>.storage.extraConfig | Extra settings.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/home-manager/accounts.email.accounts.<name>.getmail.mailboxes | A non-empty list of mailboxes
|
| options/nixos/services.tor.relay.onionServices.<name>.settings.RendPostPeriod | See torrc manual.
|
| options/nixos/services.sanoid.datasets.<name>.processChildrenOnly | Whether to only snapshot child datasets if recursing.
|
| options/nixos/services.spiped.config.<name>.disableKeepalives | Disable transport layer keep-alives.
|
| options/nixos/systemd.network.netdevs.<name>.batmanAdvancedConfig | Each attribute in this set specifies an option in the
[BatmanAdvanced] section of the unit
|
| options/nixos/services.cjdns.UDPInterface.connectTo.<name>.password | Authorized password to the opposite end of the tunnel.
|
| options/nixos/services.cjdns.ETHInterface.connectTo.<name>.password | Authorized password to the opposite end of the tunnel.
|
| options/home-manager/programs.floorp.profiles.<name>.bookmarks.configFile | Configuration file to define custom bookmarks.
|
| options/nixos/services.nextcloud-spreed-signaling.backends.<name>.secretFile | The path to the file containing the value for backends.<name>.secret
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/nixos/services.maddy.hostname | Hostname to use
|
| options/home-manager/programs.anki.sync.username | Sync account username.
|
| options/nixos/services.borgbackup.jobs.<name>.failOnWarnings | Fail the whole backup job if any borg command returns a warning
(exit code 1), for example because a file changed during backup.
|
| options/darwin/services.buildkite-agents.<name>.hooks.post-artifact | The post-artifact hook will run just after artifacts are uploaded
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.auth | Authentication to perform locally.
- The default
pubkey uses public key authentication
using a private key associated to a usable certificate.
psk uses pre-shared key authentication.
- The IKEv1 specific
xauth is used for XAuth or Hybrid
authentication,
- while the IKEv2 specific
eap keyword defines EAP
authentication.
- For
xauth, a specific backend name may be appended,
separated by a dash
|
| options/nixos/services.fedimintd.<name>.nginx.config.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.armagetronad.servers.<name>.host | Host to listen on
|
| options/nixos/services.armagetronad.servers.<name>.port | Port to listen on
|
| options/nixos/services.keepalived.vrrpInstances.<name>.useVmac | Use VRRP Virtual MAC.
|
| options/nixos/services.angrr.settings.profile-policies.<name>.enable | Whether to enable this angrr policy.
|
| options/nixos/services.tor.relay.onionServices.<name>.authorizeClient | See torrc manual.
|
| options/home-manager/accounts.email.accounts.<name>.imapnotify.onNotify | Shell commands to run on any event.
|
| options/nixos/security.wrappers.<name>.permissions | The permissions of the wrapper program
|
| options/nixos/services.snipe-it.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.firewalld.zones.<name>.ingressPriority | Priority for inbound traffic
|
| options/nixos/services.grafana.settings.smtp.from_name | Name to be used as client identity for EHLO in SMTP dialog.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/home-manager/services.muchsync.remotes.<name>.frequency | How often to run muchsync
|
| options/nixos/security.pam.services.<name>.setEnvironment | Whether the service should set the environment variables
listed in environment.sessionVariables
using pam_env.so.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.cssSnippets | CSS snippets to install.
|
| options/nixos/services.neo4j.ssl.policies.<name>.trustedDir | Path to directory of X.509 certificates in PEM format for
trusted parties
|
| options/nixos/systemd.slices.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/systemd.timers.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/systemd.timers.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/systemd.slices.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/services.parsedmarc.provision.localMail.hostname | The hostname to use when configuring Postfix
|
| options/nixos/programs.tsmClient.servers.<name>.passworddir | Directory that holds the TSM
node's password information.
|
| options/nixos/services.keepalived.vrrpScripts.<name>.extraConfig | Extra lines to be added verbatim to the vrrp_script section.
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.themes.*.enable | Whether to set the theme as active.
|
| options/home-manager/accounts.contact.accounts.<name>.khard.addressbooks | If provided, each item on this list will generate an
entry on khard configuration file as a separate addressbook
(vdir)
|
| options/nixos/services.authelia.instances.<name>.settings.theme | The theme to display.
|
| options/darwin/services.gitlab-runner.services.<name>.protected | When set to true Runner will only run on pipelines
triggered on protected branches.
|
| options/nixos/security.ipa.ipaHostname | Fully-qualified hostname used to identify this host in the IPA domain.
|
| options/nixos/services.frigate.settings.cameras.<name>.ffmpeg.inputs.*.path | Stream URL
|
| options/nixos/services.openafsServer.roles.backup.cellServDB.*.dnsname | DNS full-qualified domain name of a database server
|
| options/nixos/services.stargazer.certOrg | The name of the organization responsible for the X.509
certificate's /O name.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits | Resource limits to be imposed on the job
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits | Resource limits to be imposed on the job
|
| options/nixos/services.kmonad.keyboards.<name>.extraGroups | Extra permission groups to attach to the KMonad instance for
this keyboard
|
| options/darwin/services.buildkite-agents.<name>.hooks.pre-checkout | The pre-checkout hook will run just before your projects source code is
checked out from your SCM provider
|
| options/nixos/services.angrr.settings.profile-policies.<name>.keep-since | Retention period for the GC roots in this profile.
|
| options/nixos/services.moodle.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.dns | Address or CIDR subnets
StrongSwan default: []
|
| options/nixos/services.nagios.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/systemd.user.timers.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/systemd.user.slices.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/services.fedimintd.<name>.nginx.config.reuseport | Create an individual listening socket
|
| options/nixos/services.woodpecker-agents.agents.<name>.extraGroups | Additional groups for the systemd service.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.extraConfig | These lines go to httpd.conf verbatim
|
| options/nixos/hardware.fw-fanctrl.config.strategies.<name>.speedCurve | How should the speed curve look like
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.auth | Authentication settings
|
| options/nixos/services.cgit.<name>.gitHttpBackend.checkExportOkFiles | Whether git-http-backend should only export repositories that contain a git-daemon-export-ok file
|
| options/nixos/services.gitlab-runner.services.<name>.preGetSourcesScript | Runner-specific command script executed before code is pulled.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.life_time | Maximum lifetime before CHILD_SA gets closed
|
| options/nixos/services.tahoe.introducers.<name>.tub.location | The external location that the introducer should listen on
|
| options/nixos/services.gitlab-runner.services.<name>.dockerDisableCache | Disable all container caching.
|
| options/darwin/services.gitlab-runner.services.<name>.dockerDisableCache | Disable all container caching.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert_policy | List of certificate policy OIDs the peer's certificate
must have
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/systemd.network.netdevs.<name>.wireguardConfig | Each attribute in this set specifies an option in the
[WireGuard] section of the unit
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.public | Whether this is a public client (enforces PKCE, doesn't use a basic secret)
|
| options/home-manager/programs.librewolf.profiles.<name>.preConfig | Extra preferences to add to user.js, before
programs.firefox.profiles._name_.settings
|
| options/nixos/services.blockbook-frontend.<name>.internal | Internal http server binding [address]:port.
|
| options/nixos/systemd.user.slices.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/systemd.user.timers.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/services.syncthing.settings.folders.<name>.path | The path to the folder which should be shared
|
| options/home-manager/services.podman.networks.<name>.description | The description of the network.
|
| options/nixos/users.mysql.pam.table | The name of table that maps unique login names to the passwords.
|
| options/darwin/services.buildkite-agents.<name>.hooks.checkout | The checkout hook script will replace the default checkout routine of the
bootstrap.sh script
|
| options/nixos/services.bookstack.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.bookstack.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.mpdscribble.endpoints.<name>.url | The url endpoint where the scrobble API is listening.
|
| options/home-manager/programs.vscode.profiles.<name>.languageSnippets | Defines user snippets for different languages.
|
| options/home-manager/services.podman.machines.<name>.watchdogInterval | Interval in seconds to check if the machine is running
|
| options/home-manager/services.mpdscribble.endpoints.<name>.url | The url endpoint where the scrobble API is listening.
|
| options/nixos/services.invoiceplane.sites.<name>.stateDir | This directory is used for uploads of attachments and cache
|
| options/nixos/systemd.network.networks.<name>.tokenBucketFilterConfig | Each attribute in this set specifies an option in the
[TokenBucketFilter] section of the unit
|
| options/nixos/systemd.network.networks.<name>.heavyHitterFilterConfig | Each attribute in this set specifies an option in the
[HeavyHitterFilter] section of the unit
|
| options/nixos/services.netbird.tunnels.<name>.dns-resolver.address | An explicit address that NetBird will serve *.netbird.cloud. (usually) entries on
|
| options/nixos/services.netbird.clients.<name>.dns-resolver.address | An explicit address that NetBird will serve *.netbird.cloud. (usually) entries on
|
| options/nixos/services.authelia.instances.<name>.settings.log.level | Level of verbosity for logs.
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.force | Whether to override all previous firefox settings
|
| options/nixos/services.dovecot2.mailboxes.<name>.specialUse | Null if no special use flag is set
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rand_bytes | Byte range from which to choose a random value to subtract from
rekey_bytes
|
| options/nixos/virtualisation.kvmgt.vgpus.<name>.uuid | UUID(s) of VGPU device
|
| options/darwin/services.github-runners.<name>.serviceOverrides | Modify the service
|
| options/nixos/services.consul-template.instances.<name>.package | The consul-template package to use.
|
| options/nixos/services.autosuspend.wakeups.<name>.enabled | Whether to enable this wake-up check.
|
| options/nixos/services.nginx.virtualHosts.<name>.sslCertificate | Path to server SSL certificate.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.showScrollbar | Whether the scroll bar should be visible.
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/nixos/services.gitlab-runner.services.<name>.runUntagged | Register to run untagged builds; defaults to
true when tagList is empty
|
| options/nixos/services.v4l2-relayd.instances.<name>.input.framerate | The framerate to read from input-stream.
|
| options/nixos/services.logrotate.settings.<name>.priority | Order of this logrotate block in relation to the others
|
| options/darwin/services.buildkite-agents.<name>.hooks.post-checkout | The post-checkout hook will run after the bootstrap script has checked out
your projects source code.
|
| options/nixos/virtualisation.fileSystems.<name>.encrypted.label | Label of the unlocked encrypted device
|
| options/nixos/services.fcgiwrap.instances.<name>.socket.address | Socket address
|
| options/nixos/services.zeronsd.servedNetworks.<name>.settings.token | Path to a file containing the API Token for ZeroTier Central.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/nixos/containers.<name>.allowedDevices | A list of device nodes to which the containers has access to.
|
| options/nixos/services.grafana.provision.datasources.settings.deleteDatasources.*.name | Name of the datasource to delete.
|
| options/nixos/services.keepalived.vrrpScripts.<name>.interval | Seconds between script invocations.
|
| options/nixos/services.snapper.configs.<name>.TIMELINE_LIMIT_MONTHLY | Limits for timeline cleanup.
|
| options/home-manager/accounts.email.accounts.<name>.neomutt.extraMailboxes | List of extra mailboxes
|
| options/nixos/services.sabnzbd.settings.servers.<name>.priority | Priority of this servers
|
| options/nixos/services.sabnzbd.settings.servers.<name>.required | In case of connection failures, wait for the
server to come back online instead of skipping
it.
|
| options/nixos/services.wstunnel.clients.<name>.upgradePathPrefix | Use a specific HTTP path prefix that will show up in the upgrade
request to the wstunnel server
|
| options/home-manager/launchd.agents.<name>.config.QueueDirectories | Much like the WatchPaths option, this key will watch the paths for modifications
|
| options/nixos/users.mysql.pam.logging.rHostColumn | The name of the column in the log table to which the name of the remote
host that initiates the session is stored
|
| options/nixos/services.dependency-track.settings."alpine.oidc.username.claim" | Defines the name of the claim that contains the username in the provider's userinfo endpoint
|
| options/nixos/programs.uwsm.waylandCompositors.<name>.extraArgs | Extra command-line arguments pass to to the compsitor.
|
| options/nixos/services.networkd-dispatcher.rules.<name>.script | Shell commands executed on specified operational states.
|
| options/nixos/services.firewalld.services.<name>.ports.*.protocol | |
| options/nixos/services.firewalld.services.<name>.protocols | Protocols for the service.
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_app | Type of this worker
|
| options/home-manager/programs.librewolf.profiles.<name>.bookmarks | Declarative bookmarks.
|
| options/nixos/services.prometheus.exporters.imap-mailstat.accounts.<name>.username | If empty string mailaddress value is used
|
| options/nixos/boot.binfmt.registrations.<name>.openBinary | Whether to pass the binary to the interpreter as an open
file descriptor, instead of a path.
|
| options/home-manager/services.kanshi.profiles.<name>.outputs.*.transform | Sets the output transform.
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.nbns | Address or CIDR subnets
StrongSwan default: []
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.dhcp | Address or CIDR subnets
StrongSwan default: []
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.wstunnel.clients.<name>.settings.http-headers | Custom headers to send in the upgrade request
|
| options/home-manager/systemd.user.slices.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/home-manager/systemd.user.timers.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/home-manager/systemd.user.mounts.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/nixos/services.fedimintd.<name>.environment | Extra Environment variables to pass to the fedimintd.
|
| options/nixos/services.anubis.instances.<name>.settings.TARGET | The reverse proxy target that Anubis is protecting
|
| options/nixos/services.tarsnap.archives.<name>.cachedir | The cache allows tarsnap to identify previously stored data
blocks, reducing archival time and bandwidth usage
|
| options/home-manager/programs.librewolf.profiles.<name>.search.force | Whether to force replace the existing search
configuration
|
| options/home-manager/programs.librewolf.profiles.<name>.search.default | The default search engine used in the address bar and search
bar.
|
| options/darwin/launchd.agents.<name>.serviceConfig.AbandonProcessGroup | When a job dies, launchd kills any remaining processes with the same process group ID as the job
|
| options/home-manager/services.kanshi.profiles.<name>.outputs.*.position | <x>,<y>
Places the output at the specified position in the global coordinates
space.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/nixos/services.sabnzbd.settings.servers.<name>.optional | In case of connection failures, temporarily
disable this server. (See sabnzbd's documentation
for usage guides).
|
| options/home-manager/programs.thunderbird.profiles.<name>.search | Declarative search engine configuration.
|
| options/nixos/services.maubot.settings.homeservers.<name>.url | Client-server API URL
|
| options/home-manager/accounts.email.accounts.<name>.neomutt.showDefaultMailbox | Show the default mailbox (INBOX)
|
| options/home-manager/wayland.windowManager.hyprland.submaps.<name>.settings | Hyprland binds to be put in the submap
|
| options/nixos/security.pam.services.<name>.allowNullPassword | Whether to allow logging into accounts that have no password
set (i.e., have an empty password field in
/etc/passwd or
/etc/group)
|
| options/nixos/services.gancio.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.fluidd.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.akkoma.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.matomo.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.monica.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.if_id_in | XFRM interface ID set on inbound policies/SA
|
| options/nixos/services.vault-agent.instances.<name>.settings | Free-form settings written directly to the config.json file
|
| options/darwin/launchd.agents.<name>.serviceConfig.StartInterval | This optional key causes the job to be started every N seconds
|
| options/nixos/services.gitlab-runner.services.<name>.postGetSourcesScript | Runner-specific command script executed after code is pulled.
|
| options/nixos/containers.<name>.forwardPorts.*.hostPort | Source port of the external interface on host
|
| options/home-manager/programs.firefox.profiles.<name>.containers | Attribute set of container configurations
|
| options/home-manager/services.kanshi.profiles.<name>.outputs.*.adaptiveSync | Enables or disables adaptive synchronization
(aka
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.scopeMaps | Maps kanidm groups to returned oauth scopes
|
| options/nixos/services.kmonad.keyboards.<name>.defcfg.allowCommands | Whether to enable keys to run shell commands.
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/nixos/services.borgbackup.repos.<name>.allowSubRepos | Allow clients to create repositories in subdirectories of the
specified path
|
| options/nixos/services.cloudflared.tunnels.<name>.default | Catch-all service if no ingress matches
|
| options/nixos/services.cloudflared.tunnels.<name>.ingress | Ingress rules
|
| options/nixos/systemd.services.<name>.confinement.enable | If set, all the required runtime store paths for this service are
bind-mounted into a tmpfs-based
chroot(2).
|
| options/nixos/services.firewalld.zones.<name>.forwardPorts.*.protocol | |
| options/nixos/services.bookstack.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.language | The language used to to parse words and sentences.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits | Resource limits to be imposed on the job
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits | Resource limits to be imposed on the job
|
| options/nixos/systemd.services.<name>.confinement.binSh | The program to make available as /bin/sh inside
the chroot
|
| options/nixos/services.fedimintd.<name>.api_iroh.openFirewall | Opens UDP port in firewall for fedimintd's API Iroh endpoint
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.originUrl | The redirect URL of the service
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.public-inbox.inboxes.<name>.description | User-visible description for the repository.
|
| options/nixos/services.woodpecker-agents.agents.<name>.enable | Whether to enable this Woodpecker-Agent
|
| options/nixos/services.nebula.networks.<name>.lighthouse.dns.enable | Whether this lighthouse node should serve DNS.
|
| options/nixos/services.frigate.settings.cameras.<name>.ffmpeg.inputs.*.roles | List of roles for this stream
|
| options/nixos/services.netbird.tunnels.<name>.environment | Environment for the netbird service, used to pass configuration options.
|
| options/nixos/services.netbird.clients.<name>.environment | Environment for the netbird service, used to pass configuration options.
|
| options/nixos/users.extraUsers.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| options/nixos/boot.zfs.devNodes | Name of directory from which to import ZFS device, this is passed to zpool import
as the value of the -d option
|
| options/nixos/services.fcgiwrap.instances.<name>.process.prefork | Number of processes to prefork.
|
| options/nixos/services.jitsi-videobridge.xmppConfigs.<name>.userName | User part of the JID.
|
| options/darwin/services.aerospace.settings.on-window-detected.*."if".app-name-regex-substring | Regex substring to match the app name (optional).
|
| options/nixos/services.beesd.filesystems.<name>.extraOptions | Extra command-line options passed to the daemon
|
| options/home-manager/programs.firefox.profiles.<name>.search.privateDefault | The default search engine used in the Private Browsing.
|
| options/home-manager/programs.floorp.profiles.<name>.bookmarks.settings | Custom bookmarks.
|
| options/nixos/services.firewalld.zones.<name>.description | Description for the zone.
|
| options/nixos/containers.<name>.timeoutStartSec | Time for the container to start
|
| options/nixos/boot.loader.systemd-boot.extraFiles | A set of files to be copied to $BOOT
|
| options/darwin/launchd.agents.<name>.serviceConfig.WorkingDirectory | This optional key is used to specify a directory to chdir(2) to before running the job.
|
| options/nixos/services.zeronsd.servedNetworks.<name>.settings.domain | Domain under which ZeroTier records will be available.
|
| options/home-manager/accounts.email.accounts.<name>.imapnotify.onNotifyPost | Shell commands to run after onNotify event.
|
| options/home-manager/programs.firefox.profiles.<name>.bookmarks.configFile | Configuration file to define custom bookmarks.
|
| options/home-manager/systemd.user.services.<name>.Service.Environment | Environment variables available to executed processes.
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.module | Optional PKCS#11 module name.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.imapOauth2Params.client_id | The OAuth2 client identifier.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.smtpOauth2Params.client_id | The OAuth2 client identifier.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.AbandonProcessGroup | When a job dies, launchd kills any remaining processes with the same process group ID as the job
|
| options/nixos/services.nginx.virtualHosts.<name>.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.forceSSL | Whether to add a separate nginx server block that permanently redirects (301)
all plain HTTP traffic to HTTPS
|
| options/nixos/users.extraUsers.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StartInterval | This optional key causes the job to be started every N seconds
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.tarsnap.archives.<name>.verylowmem | Reduce memory consumption by a factor of 2 beyond what
lowmem does, at the cost of significantly
slowing down the archiving process.
|
| options/nixos/services.easytier.instances.<name>.settings.peers | Peers to connect initially
|
| options/nixos/services.orangefs.server.fileSystems.<name>.extraStorageHints | Extra config for <StorageHints> section.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.cssSnippets.*.text | Text of the file.
|
| options/nixos/services.printing.cups-pdf.instances.<name>.settings.Spool | spool directory
|
| options/nixos/services.postfix.settings.master.<name>.privileged | |
| options/nixos/services.blockbook-frontend.<name>.templateDir | Location of the HTML templates
|
| options/nixos/networking.networkmanager.ensureProfiles.profiles | Declaratively define NetworkManager profiles
|
| options/nixos/services.mautrix-meta.instances.<name>.serviceUnit | The systemd unit (a service or a target) for other services to depend on if they
need to be started after matrix-synapse
|
| options/nixos/services.gitea-actions-runner.instances.<name>.tokenFile | Path to an environment file, containing the TOKEN environment
variable, that holds a token to register at the configured
Gitea/Forgejo instance.
|
| options/nixos/services.jibri.xmppEnvironments.<name>.xmppDomain | The base XMPP domain.
|
| options/nixos/services.gitlab-runner.services.<name>.dockerAllowedImages | Whitelist allowed images.
|
| options/darwin/services.gitlab-runner.services.<name>.dockerAllowedImages | Whitelist allowed images.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.kanboard.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.librenms.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.agorakit.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.fediwall.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.mainsail.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.pixelfed.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/home-manager/programs.borgmatic.backups.<name>.location.extraConfig | Extra settings.
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.present | Whether to ensure that this oauth2 resource server is present or absent.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.sha256_96 | HMAC-SHA-256 is used with 128-bit truncation with IPsec
|
| options/nixos/systemd.sockets.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/systemd.targets.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/services.bookstack.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.inactivity | Timeout before closing CHILD_SA after inactivity
|
| options/home-manager/services.activitywatch.watchers.<name>.settings | The settings for the individual watcher in TOML format
|
| options/nixos/services.authelia.instances.<name>.settings.log.format | Format the logs are written as.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/nixos/systemd.targets.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/systemd.sockets.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/services.firewalld.zones.<name>.icmpBlockInversion | Whether to invert the icmp block handling
|
| options/nixos/systemd.network.networks.<name>.quickFairQueueingConfig | Each attribute in this set specifies an option in the
[QuickFairQueueing] section of the unit
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.local_ts | List of local traffic selectors to include in CHILD_SA
|
| options/nixos/services.buildkite-agents.<name>.runtimePackages | Add programs to the buildkite-agent environment
|
| options/darwin/services.buildkite-agents.<name>.runtimePackages | Add programs to the buildkite-agent environment
|
| options/nixos/system.nixos.codeName | The NixOS release code name (e.g. Emu).
|
| options/home-manager/accounts.email.accounts.<name>.imapnotify.extraConfig | Additional configuration to add for this account.
|
| options/nixos/services.jitsi-videobridge.xmppConfigs.<name>.mucJids | JID of the MUC to join
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/systemd.user.sockets.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/systemd.user.targets.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.life_bytes | Maximum bytes processed before CHILD_SA gets closed
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.claimMaps | Adds additional claims (and values) based on which kanidm groups an authenticating party belongs to
|
| options/nixos/services.icecream.daemon.netName | Network name to connect to
|
| options/home-manager/accounts.email.accounts.<name>.lieer.notmuchSetupWarning | Warn if Notmuch is not also enabled for this account
|
| options/nixos/services.restic.backups.<name>.environmentFile | file containing the credentials to access the repository, in the
format of an EnvironmentFile as described by systemd.exec(5)
|
| options/nixos/services.easytier.instances.<name>.settings.instance_name | Identify different instances on same host
|
| options/nixos/services.fedimintd.<name>.nginx.config.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| options/nixos/programs.nix-required-mounts.allowedPatterns.<name>.paths | A list of glob patterns, indicating which paths to expose to the sandbox
|
| options/nixos/services.netbird.tunnels.<name>.openInternalFirewall | Opens up internal firewall ports for the NetBird's network interface.
|
| options/nixos/services.netbird.clients.<name>.openInternalFirewall | Opens up internal firewall ports for the NetBird's network interface.
|
| options/nixos/services.blockbook-frontend.<name>.rpc.password | RPC password for JSON-RPC connections
|
| options/nixos/services.armagetronad.servers.<name>.enable | Whether to enable armagetronad.
|
| options/home-manager/launchd.agents.<name>.config.Sockets | This optional key is used to specify launch on demand sockets that can be used to let launchd know when
to run the job
|
| options/nixos/services.angrr.settings.profile-policies.<name>.keep-latest-n | Keep the latest N GC roots in this profile.
|
| options/nixos/services.authelia.instances.<name>.settings | Your Authelia config.yml as a Nix attribute set
|
| options/nixos/services.stash.username | Username for login.
|
| options/nixos/services.radicle.ci.broker.settings.adapters.<name>.command | Adapter command to run.
|
| options/nixos/services.mautrix-meta.instances.<name>.settings | config.yaml configuration as a Nix attribute set
|
| options/nixos/services.borgbackup.jobs.<name>.removableDevice | Whether the repo (which must be local) is a removable device.
|
| options/nixos/services.influxdb2.provision.users.<name>.present | Whether to ensure that this user is present or absent.
|
| options/nixos/systemd.user.sockets.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/systemd.user.targets.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/home-manager/services.xsuspender.rules.<name>.matchWmClassContains | Match windows that wm class contains string.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.WorkingDirectory | This optional key is used to specify a directory to chdir(2) to before running the job.
|
| options/nixos/services.influxdb2.provision.organizations.<name>.buckets.<name>.description | Optional description for the bucket.
|
| options/darwin/services.gitlab-runner.services.<name>.maximumTimeout | What is the maximum timeout (in seconds) that will be set for
job when using this Runner. 0 (default) simply means don't limit.
|
| options/nixos/services.authelia.instances.<name>.secrets | It is recommended you keep your secrets separate from the configuration
|
| options/nixos/services.mailpit.instances.<name>.database | Specify the local database filename to store persistent data
|
| options/nixos/services.github-runners.<name>.serviceOverrides | Modify the systemd service
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.model | Name of the voice model to use
|
| options/nixos/services.networkd-dispatcher.rules.<name>.onState | List of names of the systemd-networkd operational states which
should trigger the script
|
| options/nixos/services.hostapd.radios.<name>.wifi6.multiUserBeamformer | HE multi user beamformee support
|
| options/nixos/programs.uwsm.waylandCompositors.<name>.comment | The comment field of the desktop entry file.
|
| options/nixos/services.beesd.filesystems.<name>.verbosity | Log verbosity (syslog keyword/level).
|
| options/nixos/services.tarsnap.archives.<name>.explicitSymlinks | Whether to follow symlinks specified as archives.
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.force | Whether to override all previous firefox settings
|
| options/nixos/services.anubis.instances.<name>.policy.settings | Additional policy settings merged into the policy file
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites | Attribute set of site options for this profile
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.highlight | The colors for the terminal’s highlighted area.
|
| options/home-manager/programs.obsidian.defaultSettings.extraFiles.<name>.source | Path of the source file or directory.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.auth | Authentication settings
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.ghostunnel.servers.<name>.unsafeTarget | If set, does not limit target to localhost, 127.0.0.1, [::1], or UNIX sockets
|
| options/home-manager/programs.opencode.agents | Custom agents for opencode
|
| options/nixos/services.syncthing.settings.folders.<name>.enable | Whether to share this folder
|
| options/nixos/systemd.shutdownRamfs.contents.<name>.dlopen.features | Features to enable via dlopen ELF notes
|
| options/home-manager/services.syncthing.settings.folders.<name>.enable | Whether to share this folder
|
| options/nixos/hardware.fw-fanctrl.config.strategies.<name>.speedCurve.*.temp | Temperature in °C at which the fan speed should be changed
|
| options/nixos/services.h2o.hosts.<name>.tls.identity.*.certificate-file | Path to certificate file
|
| options/nixos/services.gitlab-runner.services.<name>.protected | When set to true Runner will only run on pipelines
triggered on protected branches
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords | Sets allowed passwords for WPA3-SAE
|
| options/nixos/services.invoiceplane.sites.<name>.poolConfig | Options for the InvoicePlane PHP pool
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| options/nixos/programs.ssh.knownHosts | The set of system-wide known SSH hosts
|
| options/darwin/programs.ssh.knownHosts | The set of system-wide known SSH hosts
|
| options/home-manager/accounts.email.accounts.<name>.offlineimap.enable | Whether to enable OfflineIMAP.
|
| options/nixos/services.simplesamlphp.<name>.configDir | Path to the SimpleSAMLphp config directory.
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.settings | Settings for this profile
|
| options/nixos/containers.<name>.restartIfChanged | Whether the container should be restarted during a NixOS
configuration switch if its definition has changed.
|
| options/nixos/services.authelia.instances.<name>.secrets.jwtSecretFile | Path to your JWT secret used during identity verificaton.
|
| options/nixos/services.wordpress.sites.<name>.database.passwordFile | A file containing the password corresponding to
database.user.
|
| options/nixos/services.inadyn.settings.provider.<name>.password | Password for this DDNS provider
|
| options/nixos/services.blockbook-frontend.<name>.rpc.passwordFile | File containing password of the RPC user
|
| options/home-manager/launchd.agents.<name>.config.ThrottleInterval | This key lets one override the default throttling policy imposed on jobs by launchd
|
| options/nixos/services.monica.hostname | The hostname to serve monica on.
|
| options/nixos/services.hostapd.radios.<name>.wifi7.multiUserBeamformer | EHT multi user beamformee support
|
| options/darwin/security.sandbox.profiles.<name>.allowNetworking | Whether to allow network access inside the sandbox.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.auth.<name>.adapter_config.clientSecretFile | A file containing a the client secret for an openid_connect adapter
|
| options/nixos/services.znapzend.zetup.<name>.destinations | Additional destinations.
|
| options/home-manager/services.podman.containers.<name>.entrypoint | The container entrypoint.
|
| options/nixos/services.dovecot2.mailPlugins.perProtocol.<name>.enable | mail plugins to enable as a list of strings to append to the corresponding per-protocol $mail_plugins configuration variable
|
| options/nixos/services.kanboard.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.agorakit.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.dolibarr.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.librenms.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.fediwall.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.pixelfed.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.mainsail.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.wordpress.sites.<name>.database.createLocally | Create the database and database user locally.
|
| options/home-manager/systemd.user.sockets.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/home-manager/systemd.user.automounts.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/home-manager/systemd.user.targets.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/home-manager/programs.obsidian.defaultSettings.extraFiles.<name>.target | Path to target relative to the vault's directory.
|
| options/nixos/services.gitlab-runner.services.<name>.debugTraceDisabled | When set to true Runner will disable the possibility of
using the CI_DEBUG_TRACE feature.
|
| options/darwin/services.gitlab-runner.services.<name>.debugTraceDisabled | When set to true Runner will disable the possibility of
using the CI_DEBUG_TRACE feature.
|
| options/nixos/services.invoiceplane.sites.<name>.cron.enable | Enable cron service which periodically runs Invoiceplane tasks
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.robotsEntries | Specification of pages to be ignored by web crawlers
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/home-manager/programs.thunderbird.profiles.<name>.userChrome | Custom Thunderbird user chrome CSS.
|
| options/nixos/boot.binfmt.registrations.<name>.fixBinary | Whether to open the interpreter file as soon as the
registration is loaded, rather than waiting for a
relevant file to be invoked
|
| options/home-manager/programs.hexchat.channels.<name>.loginMethod | The login method
|
| options/nixos/services.namecoind.rpc.key | Key file for securing RPC connections.
|
| options/nixos/containers.<name>.forwardPorts | List of forwarded ports from host to container
|
| options/nixos/containers.<name>.allowedDevices.*.node | Path to device node
|
| options/nixos/services.borgbackup.jobs.<name>.patterns | Include/exclude paths matching the given patterns
|
| options/darwin/launchd.daemons.<name>.serviceConfig.AbandonProcessGroup | When a job dies, launchd kills any remaining processes with the same process group ID as the job
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.notmuchSetupWarning | Warn if Notmuch is not also enabled for this account
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.tarsnap.archives.<name>.directories | List of filesystem paths to archive.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.revocation | Certificate revocation policy for CRL or OCSP revocation.
- A
strict revocation policy fails if no revocation information is
available, i.e. the certificate is not known to be unrevoked.
ifuri fails only if a CRL/OCSP URI is available, but certificate
revocation checking fails, i.e. there should be revocation information
available, but it could not be obtained.
- The default revocation policy
relaxed fails only if a certificate is
revoked, i.e. it is explicitly known that it is bad
|
| options/nixos/services.wstunnel.servers.<name>.settings.restrict-to.*.port | The port.
|
| options/nixos/services.xserver.xkb.extraLayouts.<name>.description | A short description of the layout.
|
| options/nixos/services.wstunnel.servers.<name>.settings.restrict-to.*.host | The hostname.
|
| options/nixos/services.btrbk.instances.<name>.snapshotOnly | Whether to run in snapshot only mode
|
| options/darwin/launchd.daemons.<name>.serviceConfig.StartInterval | This optional key causes the job to be started every N seconds
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.timeRange.end | End of time range to show.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.locations | Declarative location config
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/nixos/security.pam.services | This option defines the PAM services
|
| options/nixos/services.logrotate.settings.<name>.frequency | How often to rotate the logs
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.authCert | Either a path to a certificate with a client certificate and
the key or a list of paths to the files with them.
|
| options/home-manager/programs.librewolf.profiles.<name>.settings | Attribute set of LibreWolf preferences
|
| options/nixos/services.syncoid.commands.<name>.localTargetAllow | Permissions granted for the services.syncoid.user user
for local target datasets
|
| options/nixos/services.roundcube.database.username | Username for the postgresql connection
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.enable | Whether to enable synchronization using vdirsyncer.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.tokenFile | A file path where access tokens are stored.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.corePlugins.*.enable | Whether to enable the plugin.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.verify | Null or path to certificate to verify SSL against
|
| options/nixos/services.blockbook-frontend.<name>.extraConfig | Additional configurations to be appended to coin.conf
|
| options/nixos/services.klipper.firmwares.<name>.klipperFlashPackage | Path to the built klipper-flash package.
|
| options/nixos/services.github-runners.<name>.extraEnvironment | Extra environment variables to set for the runner, as an attrset.
|
| options/darwin/services.github-runners.<name>.extraEnvironment | Extra environment variables to set for the runner, as an attrset.
|
| options/nixos/services.neo4j.ssl.policies.<name>.baseDirectory | The mandatory base directory for cryptographic objects of this
policy
|
| options/nixos/services.vault-agent.instances.<name>.settings.pid_file | Path to use for the pid file.
|
| options/home-manager/accounts.email.accounts.<name>.signature.delimiter | The delimiter used between the document and the signature.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/users.users.<name>.openssh.authorizedPrincipals | A list of verbatim principal names that should be added to the user's
authorized principals.
|
| options/nixos/services.dolibarr.h2o.serverName | Server name to be used for this virtual host
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.keepDaily | Number of daily archives to keep
|
| options/nixos/services.jibri.xmppEnvironments.<name>.call.login.domain | The domain part of the JID for the recorder.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.if_id_out | XFRM interface ID set on outbound policies/SA
|
| options/nixos/hardware.fw-fanctrl.config.strategies.<name>.speedCurve.*.speed | Percent how fast the fan should run at
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.userAgent | The user agent to report to the server
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.enable | Whether to enable the Thunderbird mail client for this account.
|
| options/nixos/services.invoiceplane.sites.<name>.database.user | Database user.
|
| options/home-manager/programs.firefox.profiles.<name>.bookmarks.settings | Custom bookmarks.
|
| options/nixos/services.fedimintd.<name>.nginx.config.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| options/darwin/launchd.agents.<name>.serviceConfig.LaunchEvents | Specifies higher-level event types to be used as launch-on-demand event
sources
|
| options/nixos/services.borgbackup.jobs.<name>.encryption.mode | Encryption mode to use
|
| options/nixos/services.nagios.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.moodle.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.simplesamlphp.<name>.package | The simplesamlphp package to use.
|
| options/nixos/services.autorandr.profiles.<name>.hooks.preswitch | Preswitch hook executed before mode switch.
|
| options/nixos/services.fedimintd.<name>.nginx.config.listen.*.proxyProtocol | Enable PROXY protocol.
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.server | Address or CIDR subnets
StrongSwan default: []
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.subnet | Address or CIDR subnets
StrongSwan default: []
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.p_cscf | Address or CIDR subnets
StrongSwan default: []
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/home-manager/accounts.contact.accounts.<name>.remote.passwordCommand | A command that prints the password to standard output.
|
| options/home-manager/programs.autorandr.profiles.<name>.hooks.preswitch | Preswitch hook executed before mode switch.
|
| options/nixos/systemd.shutdownRamfs.contents.<name>.dlopen.usePriority | Priority of dlopen ELF notes to include. "required" is
minimal, "recommended" includes "required", and
"suggested" includes "recommended"
|
| options/nixos/services.keepalived.vrrpInstances.<name>.vmacXmitBase | Send/Recv VRRP messages from base interface instead of VMAC interface.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.WorkingDirectory | This optional key is used to specify a directory to chdir(2) to before running the job.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.dpd_action | Action to perform for this CHILD_SA on DPD timeout
|
| options/nixos/services.pcscd.extendReaderNames | String to append to every reader name
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.wpaPassword | Sets the password for WPA-PSK that will be converted to the pre-shared key
|
| options/nixos/services.ghostunnel.servers.<name>.keystore | Path to keystore (combined PEM with cert/key, or PKCS12 keystore)
|
| options/nixos/services.public-inbox.inboxes.<name>.watchheader | If specified, public-inbox-watch(1) will only process
mail containing a matching header.
|
| options/nixos/services.icingaweb2.modules.monitoring.backends.<name>.resource | Name of the IDO resource
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/nixos/services.printing.cups-pdf.instances.<name>.settings.AnonDirName | path for anonymously created PDF files
|
| options/nixos/systemd.services.<name>.enableStrictShellChecks | Enable running shellcheck on the generated scripts for this unit
|
| options/nixos/systemd.user.services.<name>.enableStrictShellChecks | Enable running shellcheck on the generated scripts for this unit
|
| options/nixos/services.invoiceplane.sites.<name>.database.host | Database host address.
|
| options/nixos/services.invoiceplane.sites.<name>.database.port | Database host port.
|
| options/nixos/services.jitsi-videobridge.xmppConfigs.<name>.domain | Domain part of JID of the XMPP user, if it is different from hostName.
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.enable | Whether to enable this radicle-native-ci instance.
|
| options/home-manager/programs.librewolf.profiles.<name>.bookmarks.force | Whether to force override existing custom bookmarks.
|
| options/home-manager/programs.vscode.profiles.<name>.keybindings | Keybindings written to Visual Studio Code's
keybindings.json
|
| options/nixos/services.hostapd.radios.<name>.dynamicConfigScripts | All of these scripts will be executed in lexicographical order before hostapd
is started, right after the global segment was generated and may dynamically
append global options the generated configuration file
|
| options/nixos/services.peertube-runner.instancesToRegister.<name>.url | URL of the PeerTube instance.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/containers.<name>.localAddress6 | The IPv6 address assigned to the interface in the container
|
| options/nixos/services.nginx.virtualHosts.<name>.listen.*.extraParameters | Extra parameters of this listen directive.
|
| options/nixos/services.nebula.networks.<name>.lighthouse.dns.host | IP address on which nebula lighthouse should serve DNS.
'localhost' is a good default to ensure the service does not listen on public interfaces;
use a Nebula address like 10.0.0.5 to make DNS resolution available to nebula hosts only.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.postHook | Command to call for each item creation and modification
|
| options/home-manager/accounts.contact.accounts.<name>.khal.collections | VCARD collections to be searched for contact birthdays.
|
| options/nixos/services.plausible.database.postgres.dbname | Name of the database to use.
|
| options/nixos/systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.mode | The file access mode to use when creating this file or directory.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LaunchEvents | Specifies higher-level event types to be used as launch-on-demand event
sources
|
| options/nixos/services.beesd.filesystems.<name>.spec | Description of how to identify the filesystem to be duplicated by this
instance of bees
|
| options/home-manager/services.muchsync.remotes.<name>.remote.muchsyncPath | Specifies the path to muchsync on the server
|
| options/nixos/services.hostapd.radios.<name>.wifi6.singleUserBeamformee | HE single user beamformee support
|
| options/nixos/services.hostapd.radios.<name>.wifi6.singleUserBeamformer | HE single user beamformer support
|
| options/home-manager/programs.thunderbird.profiles.<name>.extraConfig | Extra preferences to add to user.js.
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/nixos/systemd.network.networks.<name>.networkEmulatorConfig | Each attribute in this set specifies an option in the
[NetworkEmulator] section of the unit
|
| options/home-manager/programs.anki.sync.usernameFile | Path to a file containing the sync account username.
|
| options/nixos/services.simplesamlphp.<name>.phpfpmPool | The PHP-FPM pool that serves SimpleSAMLphp instance.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.documentRoot | The path of Apache's document root directory
|
| options/nixos/services.davis.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.autorandr.profiles.<name>.hooks.predetect | Predetect hook executed before autorandr attempts to run xrandr.
|
| options/nixos/services.slskd.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.movim.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/home-manager/programs.autorandr.profiles.<name>.hooks.predetect | Predetect hook executed before autorandr attempts to run xrandr.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mark_in | Netfilter mark and mask for input traffic
|
| options/nixos/services.fedimintd.<name>.consensus.finalityDelay | Consensus peg-in finality delay.
|
| options/nixos/services.wordpress.sites.<name>.database.tablePrefix | The $table_prefix is the value placed in the front of your database tables
|
| options/nixos/services.i2pd.proto.http.hostname | Expected hostname for WebUI.
|
| options/home-manager/services.restic.backups.<name>.environmentFile | A file containing the credentials to access the repository, in the
format of an EnvironmentFile as described by systemd.exec(5)
|
| options/home-manager/accounts.email.accounts.<name>.msmtp.tls.fingerprint | Fingerprint of a trusted TLS certificate
|
| options/home-manager/programs.docker-cli.contexts | Attribute set of Docker context configurations
|
| options/nixos/services.gitea-actions-runner.instances.<name>.settings | Configuration for act_runner daemon
|
| options/nixos/services.kmonad.keyboards.<name>.enableHardening | Whether to enable systemd hardening.
If KMonad is used to execute shell commands, hardening may make some of them fail.
|
| options/nixos/systemd.generators | Definition of systemd generators; see systemd.generator(5)
|
| options/nixos/services.keepalived.vrrpInstances.<name>.virtualIps | Declarative vhost config
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mark_out | Netfilter mark and mask for output traffic
|
| options/nixos/services.samba-wsdd.hostname | Override (NetBIOS) hostname to be used (default hostname).
|
| options/home-manager/launchd.agents.<name>.config.LowPriorityBackgroundIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O when the process is throttled with the Darwin-background classification.
|
| options/nixos/services.dawarich.sidekiqProcesses.<name>.threads | Number of threads this process should use for executing jobs
|
| options/nixos/services.mastodon.sidekiqProcesses.<name>.threads | Number of threads this process should use for executing jobs
|
| options/nixos/services.namecoind.rpc.port | Port the RPC server will bind to.
|
| options/nixos/services.davis.hostname | Domain of the host to serve davis under
|
| options/nixos/services.hostapd.radios.<name>.wifi7.singleUserBeamformer | EHT single user beamformer support
|
| options/nixos/services.hostapd.radios.<name>.wifi7.singleUserBeamformee | EHT single user beamformee support
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.keepWithin | Keep all archives within this time interval.
|
| options/home-manager/programs.floorp.profiles.<name>.search.engines | Attribute set of search engine configurations
|
| options/home-manager/services.xsuspender.rules.<name>.autoSuspendOnBattery | Whether to auto-apply rules when switching to battery
power even if the window(s) didn't just lose focus.
|
| options/nixos/services.slurm.partitionName | Name by which the partition may be referenced
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rand_packets | Packet range from which to choose a random value to subtract from
rekey_packets
|
| options/nixos/services.vault-agent.instances.<name>.settings.template | Template section of vault-agent
|
| options/nixos/services.nebula.networks.<name>.lighthouses | List of IPs of lighthouse hosts this node should report to and query from
|
| options/nixos/services.h2o.hosts.<name>.tls.recommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.imageFile | Application image to display in the WebUI
|
| options/nixos/services.keepalived.vrrpInstances.<name>.state | Initial state
|
| options/home-manager/programs.floorp.profiles.<name>.containersForce | Whether to force replace the existing containers configuration
|
| options/nixos/services.anubis.instances.<name>.settings.BIND_NETWORK | The network family that Anubis should bind to
|
| options/nixos/systemd.services.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.invoiceplane.sites.<name>.settings | Structural InvoicePlane configuration
|
| options/home-manager/programs.thunderbird.profiles.<name>.isDefault | Whether this is a default profile
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswordsFile | Sets the password for WPA3-SAE
|
| options/nixos/services.znapzend.zetup.<name>.timestampFormat | The timestamp format to use for constructing snapshot names
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions | Submodule for installing and configuring extensions.
|
| options/home-manager/accounts.email.accounts.<name>.signature.showSignature | Method to communicate the signature.
|
| options/nixos/systemd.services.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/systemd.user.services.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags.phishing | Tag for notmuch to use for the IANA $Phishing keyword
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.extraConfig | Extra settings.
|
| options/nixos/services.bookstack.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.anubis.instances.<name>.policy.useDefaultBotRules | Whether to include Anubis's default bot detection rules via the
(data)/meta/default-config.yaml import
|
| options/home-manager/services.git-sync.repositories.<name>.interval | The interval, specified in seconds, at which the synchronization will
be triggered even without filesystem changes.
|
| options/nixos/virtualisation.fileSystems.<name>.noCheck | Disable running fsck on this filesystem.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.copy_dscp | Whether to copy the DSCP (Differentiated Services Field Codepoint)
header field to/from the outer IP header in tunnel mode
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.cssSnippets.*.enable | Whether to enable the snippet.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.cssSnippets.*.source | Path of the source file.
|
| options/nixos/systemd.user.services.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/services.zabbixWeb.hostname | Hostname for either nginx or httpd.
|
| options/nixos/services.github-runners.<name>.tokenFile | The full path to a file which contains either
- a fine-grained personal access token (PAT),
- a classic PAT
- or a runner registration token
Changing this option or the tokenFile’s content triggers a new runner registration
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/nixos/services.easytier.instances.<name>.configServer | Configure the instance from config server
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.username | Username for the api or remote transport
|
| options/nixos/services.mediawiki.httpd.virtualHost.locations.<name>.index | Adds DirectoryIndex directive
|
| options/nixos/services.mediawiki.httpd.virtualHost.locations.<name>.alias | Alias directory for requests
|
| options/home-manager/programs.thunderbird.profiles.<name>.search.order | The order the search engines are listed in
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.timeRange | A time range to synchronize. start and end can be any Python
expression that returns a datetime.datetime
object.
|
| options/home-manager/programs.thunderbird.profiles.<name>.userContent | Custom Thunderbird user content CSS.
|
| options/nixos/systemd.network.networks.<name>.quickFairQueueingConfigClass | Each attribute in this set specifies an option in the
[QuickFairQueueingClass] section of the unit
|
| options/nixos/services.gitlab-runner.services.<name>.maximumTimeout | What is the maximum timeout (in seconds) that will be set for
job when using this Runner. 0 (default) simply means don't limit
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.globalRedirect | If set, all requests for this host are redirected permanently to
the given URL.
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.keepYearly | Number of yearly archives to keep
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.keepHourly | Number of hourly archives to keep
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.keepWeekly | Number of weekly archives to keep
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/darwin/launchd.agents.<name>.serviceConfig.KeepAlive | This optional key is used to control whether your job is to be kept continuously running or to let
demand and conditions control the invocation
|
| options/nixos/services.borgbackup.jobs.<name>.createCommand | Borg command to use for archive creation
|
| options/nixos/programs.uwsm.waylandCompositors.<name>.binPath | The wayland-compositor binary path that will be called by UWSM
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.timeRange.start | Start of time range to show.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.appearance | Settings to write to appearance.json.
|
| options/nixos/services.jibri.xmppEnvironments.<name>.xmppServerHosts | Hostnames of the XMPP servers to connect to.
|
| options/nixos/services.sanoid.datasets.<name>.use_template | Names of the templates to use for this dataset.
|
| options/nixos/services.k3s.nodeName | Node name.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.passwordFile | The password for this entry, read from the given file when starting hostapd
|
| options/nixos/services.taskserver.fqdn | The fully qualified domain name of this server, which is also used
as the common name in the certificates.
|
| options/nixos/services.blockbook-frontend.<name>.extraCmdLineOptions | Extra command line options to pass to Blockbook
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.itemTypes | Kinds of items to show
|
| options/home-manager/systemd.user.services.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.extraConfig | Extra lines to be added verbatim to the vrrp_instance section.
|
| options/nixos/services.nextcloud.notify_push.dbname | Database name.
|
| options/nixos/services.firewalld.services.<name>.sourcePorts.*.protocol | |
| options/nixos/services.gitea-actions-runner.instances.<name>.labels | Labels used to map jobs to their runtime environment
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.hw_offload | Enable hardware offload for this CHILD_SA, if supported by the IPsec
implementation
|
| options/nixos/services.ghostunnel.servers.<name>.extraArguments | Extra arguments to pass to ghostunnel server
|
| options/nixos/services.vdirsyncer.jobs.<name>.additionalGroups | additional groups to add the dynamic user to
|
| options/nixos/services.agorakit.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.librenms.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.kanboard.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.dolibarr.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.fediwall.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.mainsail.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.pixelfed.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.useVcard4 | Specifies whether vdirsyncer should request vCards in version 4.0
|
| options/nixos/services.agorakit.nginx.serverName | Name of this virtual host
|
| options/nixos/services.dolibarr.nginx.serverName | Name of this virtual host
|
| options/nixos/services.librenms.nginx.serverName | Name of this virtual host
|
| options/nixos/services.kanboard.nginx.serverName | Name of this virtual host
|
| options/nixos/services.fediwall.nginx.serverName | Name of this virtual host
|
| options/nixos/services.pixelfed.nginx.serverName | Name of this virtual host
|
| options/nixos/services.mainsail.nginx.serverName | Name of this virtual host
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.KeepAlive | This optional key is used to control whether your job is to be kept continuously running or to let
demand and conditions control the invocation
|
| options/nixos/services.gitlab.smtp.username | Username of the SMTP server for GitLab.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.pairwiseCiphers | Set of accepted cipher suites (encryption algorithms) for pairwise keys (unicast packets)
|
| options/nixos/services.authelia.instances.<name>.secrets.oidcHmacSecretFile | Path to your HMAC secret used to sign OIDC JWTs.
|
| options/darwin/launchd.agents.<name>.serviceConfig.ProgramArguments | This key maps to the second argument of execvp(3)
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.timeRange.end | End of time range to show.
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.password | Specifies the (clear text) password for the MQTT User.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mark_in_sa | Whether to set mark_in on the inbound SA
|
| options/home-manager/accounts.email.accounts.<name>.alot.contactCompletion | Contact completion configuration as expected per alot
|
| options/home-manager/services.xsuspender.rules.<name>.matchWmClassGroupContains | Match windows where wm class group contains string.
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.package | The radicle-native-ci package to use.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.authCert | Either a path to a certificate with a client certificate and
the key or a list of paths to the files with them.
|
| options/nixos/services.tor.relay.onionServices.<name>.authorizeClient.authType | Either "basic" for a general-purpose authorization protocol
or "stealth" for a less scalable protocol
that also hides service activity from unauthorized clients.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.tarsnap.archives | Tarsnap archive configurations
|
| options/nixos/services.bookstack.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.netmask | Address or CIDR subnets
StrongSwan default: []
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.verify | Null or path to certificate to verify SSL against
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.enable | Whether to enable synchronization using vdirsyncer.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.tokenFile | A file path where access tokens are stored.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.scrollbackLines | The number of scrollback lines to keep, null for infinite.
|
| options/nixos/services.hostapd.radios.<name>.countryCode | Country code (ISO/IEC 3166-1)
|
| options/nixos/programs.tsmClient.defaultServername | If multiple server stanzas are declared with
programs.tsmClient.servers,
this option may be used to name a default
server stanza that IBM TSM uses in the absence of
a user-defined dsm.opt file
|
| options/nixos/services.pgbackrest.stanzas.<name>.settings | An attribute set of options as described in:
https://pgbackrest.org/configuration.html
All options can be used
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.urlCommand | A command that prints the URL of the storage.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LaunchEvents | Specifies higher-level event types to be used as launch-on-demand event
sources
|
| options/nixos/fileSystems.<name>.overlay.useStage1BaseDirectories | If enabled, lowerdir, upperdir and workdir will be prefixed with /sysroot
|
| options/home-manager/programs.irssi.networks.<name>.server.ssl.certificateFile | Path to a file containing the certificate used for
client authentication to the server.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.virtualIps.*.brd | The broadcast address on the interface.
|
| options/home-manager/programs.thunderbird.profiles.<name>.settings | Preferences to add to this profile's
user.js.
|
| options/nixos/services.gancio.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.fluidd.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.akkoma.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.monica.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.matomo.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.dawarich.sidekiqProcesses.<name>.jobClasses | If not empty, which job classes should be executed by this process.
If left empty, all job classes will be executed by this process.
|
| options/nixos/programs.tsmClient.servers.<name>.tcpserveraddress | Host/domain name or IP address of the IBM TSM server.
|
| options/nixos/services.authelia.instances.<name>.secrets.manual | Configuring authelia's secret files via the secrets attribute set
is intended to be convenient and help catch cases where values are required
to run at all
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.wpaPskFile | Sets the password(s) for WPA-PSK
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.userAgent | The user agent to report to the server
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.cache_dir | The cache directory in which to store mail files while they are being
downloaded
|
| options/darwin/security.sandbox.profiles.<name>.allowLocalNetworking | Whether to allow localhost network access inside the sandbox.
|
| options/nixos/services.wstunnel.servers.<name>.settings.restrict-to | Restrictions on the connections that the server will accept
|
| options/nixos/services.simplesamlphp.<name>.authSources | Auth sources options used by SimpleSAMLphp.
|
| options/nixos/services.snapper.configs.<name>.TIMELINE_LIMIT_QUARTERLY | Limits for timeline cleanup.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.ProgramArguments | This key maps to the second argument of execvp(3)
|
| options/nixos/services.limesurvey.virtualHost.locations.<name>.alias | Alias directory for requests
|
| options/nixos/services.limesurvey.virtualHost.locations.<name>.index | Adds DirectoryIndex directive
|
| options/home-manager/accounts.calendar.accounts.<name>.remote.passwordCommand | A command that prints the password to standard output.
|
| options/nixos/services.borgbackup.jobs.<name>.compression | Compression method to use
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rekey_time | Time to schedule CHILD_SA rekeying
|
| options/nixos/virtualisation.fileSystems.<name>.enable | Whether to enable the filesystem mount.
|
| options/nixos/services.simplesamlphp.<name>.localDomain | The domain serving your SimpleSAMLphp instance
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ppk.<name>.id | PPK identity the PPK belongs to
|
| options/home-manager/launchd.agents.<name>.config.ProcessType | This optional key describes, at a high level, the intended purpose of the job
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/nixos/services.murmur.registerName | Public server registration name, and also the name of the
Root channel
|
| options/home-manager/services.git-sync.repositories.<name>.extraPackages | Extra packages available to git-sync.
|
| options/home-manager/programs.gemini-cli.commands.<name>.description | A brief, one-line description of what the command does
|
| options/nixos/services.wstunnel.servers.<name>.tlsCertificate | TLS certificate to use instead of the hardcoded one in case of HTTPS connections
|
| options/nixos/services.syncthing.settings.folders.<name>.devices | The devices this folder should be shared with
|
| options/home-manager/services.syncthing.settings.folders.<name>.devices | The devices this folder should be shared with
|
| options/nixos/users.extraUsers.<name>.openssh.authorizedPrincipals | A list of verbatim principal names that should be added to the user's
authorized principals.
|
| options/nixos/services.gitlab-runner.services.<name>.dockerPrivileged | Give extended privileges to container.
|
| options/darwin/services.gitlab-runner.services.<name>.dockerPrivileged | Give extended privileges to container.
|
| options/nixos/services.zeronsd.servedNetworks.<name>.settings.wildcard | Whether to serve a wildcard record for ZeroTier Nodes.
|
| options/nixos/services.radicle.httpd.nginx.serverName | Name of this virtual host
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.printing.cups-pdf.instances.<name>.settings.GhostScript | location of GhostScript binary
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.life_packets | Maximum number of packets processed before CHILD_SA gets closed
|
| options/nixos/services.borgbackup.jobs.<name>.environment | Environment variables passed to the backup script
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags.lowercase | If true, translate all mailboxes to lowercase names when mapping to notmuch
tags.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.eap.<name>.id | Identity the EAP/XAuth secret belongs to
|
| options/home-manager/accounts.contact.accounts.<name>.thunderbird.token | A token is generated when adding an address book manually to Thunderbird, this can be entered here.
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.gitlab-runner.services.<name>.dockerAllowedServices | Whitelist allowed services.
|
| options/darwin/services.gitlab-runner.services.<name>.dockerAllowedServices | Whitelist allowed services.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.postHook | Command to call for each item creation and modification
|
| options/home-manager/programs.librewolf.profiles.<name>.containers | Attribute set of container configurations
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.basicSecretFile | The basic secret to use for this service
|
| options/nixos/services.jibri.xmppEnvironments.<name>.control.muc.domain | The domain part of the MUC to connect to for control.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.token.<name>.slot | Optional slot number to access the token.
|
| options/nixos/systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.age | Delete a file when it reaches a certain age
|
| options/home-manager/services.podman.containers.<name>.description | The description of the container.
|
| options/home-manager/programs.firefox.profiles.<name>.search.engines | Attribute set of search engine configurations
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.password | The password for this entry
|
| options/nixos/containers.<name>.nixpkgs | A path to the nixpkgs that provide the modules, pkgs and lib for evaluating the container
|
| options/nixos/services.fedimintd.<name>.nginx.config.sslCertificate | Path to server SSL certificate.
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.enable | Whether to enable this angrr policy.
|
| options/nixos/services.gitea-actions-runner.instances.<name>.hostPackages | List of packages, that are available to actions, when the runner is configured
with a host execution label.
|
| options/home-manager/programs.opencode.themes | Custom themes for opencode
|
| options/home-manager/programs.firefox.profiles.<name>.containersForce | Whether to force replace the existing containers configuration
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ike.<name>.id | IKE identity the IKE preshared secret belongs to
|
| options/nixos/systemd.network.networks.<name>.controlledDelayConfig | Each attribute in this set specifies an option in the
[ControlledDelay] section of the unit
|
| options/nixos/services.authelia.instances.<name>.settingsFiles | Here you can provide authelia with configuration files or directories
|
| options/nixos/services.jibri.xmppEnvironments.<name>.usageTimeout | The duration that the Jibri session can be
|
| options/nixos/services.maddy.ensureCredentials.<name>.passwordFile | Specifies the path to a file containing the
clear text password for the user.
|
| options/home-manager/launchd.agents.<name>.config.inetdCompatibility | The presence of this key specifies that the daemon expects to be run as if it were launched from inetd.
|
| options/nixos/systemd.user.generators | Definition of systemd generators; see systemd.generator(5)
|
| options/nixos/services.borgbackup.jobs.<name>.persistentTimer | Set the Persistent option for the
systemd.timer(5)
which triggers the backup immediately if the last trigger
was missed (e.g. if the system was powered down).
|
| options/nixos/services.znc.confOptions.networks.<name>.hasBitlbeeControlChannel | Whether to add the special Bitlbee operations channel.
|
| options/home-manager/programs.librewolf.profiles.<name>.search.privateDefault | The default search engine used in the Private Browsing.
|
| options/nixos/services.mautrix-meta.instances.<name>.registerToSynapse | Whether to add registration file to services.matrix-synapse.settings.app_service_config_files and
make Synapse wait for registration service.
|
| options/nixos/services.mediawiki.httpd.virtualHost.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.tfc_padding | Pads ESP packets with additional data to have a consistent ESP packet
size for improved Traffic Flow Confidentiality
|
| options/nixos/virtualisation.oci-containers.containers.<name>.hostname | The hostname of the container.
|
| options/nixos/services.autorandr.profiles.<name>.hooks.postswitch | Postswitch hook executed after mode switch.
|
| options/home-manager/programs.librewolf.profiles.<name>.bookmarks.configFile | Configuration file to define custom bookmarks.
|
| options/home-manager/programs.autorandr.profiles.<name>.hooks.postswitch | Postswitch hook executed after mode switch.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ntlm.<name>.id | Identity the NTLM secret belongs to
|
| options/home-manager/services.xsuspender.rules.<name>.suspendSubtreePattern | Also suspend descendant processes that match this regex.
|
| options/nixos/services.postfixadmin.database.dbname | Name of the postgresql database
|
| options/nixos/services.blockbook-frontend.<name>.messageQueueBinding | Message Queue Binding address:port.
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.keepMonthly | Number of monthly archives to keep
|
| options/nixos/virtualisation.fileSystems.<name>.fsType | Type of the file system
|
| options/nixos/services.armagetronad.servers.<name>.package | The armagetronad-dedicated package to use
|
| options/nixos/systemd.network.networks.<name>.stochasticFairBlueConfig | Each attribute in this set specifies an option in the
[StochasticFairBlue] section of the unit
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.mode | Selects the authentication mode for this AP.
- "none": Don't configure any authentication
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.period | Retention period for the GC roots matched by this policy.
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.path-regex | Regex pattern to match the GC root path.
|
| options/home-manager/accounts.contact.accounts.<name>.thunderbird.enable | Whether to enable the Thunderbird mail client for this account.
|
| options/nixos/services.bepasty.servers.<name>.defaultPermissions | default permissions for all unauthenticated accesses.
|
| options/home-manager/services.podman.containers.<name>.environment | Environment variables to set in the container.
|
| options/nixos/services.bonsaid.settings.*.event_name | Name of the event which should trigger this transition when received by bonsaid
|
| options/nixos/services.frp.instances.<name>.environmentFiles | List of paths files that follows systemd environmentfile structure
|
| options/nixos/services.honk.host | The host name or IP address the server should listen to.
|
| options/nixos/services.angrr.settings.profile-policies.<name>.keep-booted-system | Whether to keep the last booted system generation
|
| options/nixos/services.sslh.settings.protocols | List of protocols sslh will probe for and redirect
|
| options/nixos/services.authelia.instances.<name>.settings.server.address | The address to listen on.
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.vmalert.instances.<name>.settings."notifier.url" | Prometheus Alertmanager URL
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.rsa.<name>.secret | Value of decryption passphrase for RSA key.
|
| options/nixos/services.mastodon.sidekiqProcesses.<name>.jobClasses | If not empty, which job classes should be executed by this process. *Only one process should handle the 'scheduler' class
|
| options/darwin/launchd.agents.<name>.serviceConfig.QueueDirectories | Much like the WatchPaths option, this key will watch the paths for modifications
|
| options/darwin/launchd.daemons.<name>.serviceConfig.KeepAlive | This optional key is used to control whether your job is to be kept continuously running or to let
demand and conditions control the invocation
|
| options/nixos/services.keepalived.vrrpInstances.<name>.trackScripts | List of script names to invoke for health tracking.
|
| options/home-manager/accounts.calendar.accounts.<name>.thunderbird.color | Display color of the calendar in hex
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.timeRange | A time range to synchronize. start and end can be any Python
expression that returns a datetime.datetime
object.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.timeRange.start | Start of time range to show.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.ncps.cache.redis.username | Redis username for authentication (for Redis ACL).
|
| options/nixos/services.spiped.config.<name>.disableReresolution | Disable target address re-resolution.
|
| options/home-manager/accounts.calendar.accounts.<name>.thunderbird.readOnly | Mark calendar as read only
|
| options/home-manager/programs.opencode.commands | Custom commands for opencode
|
| options/darwin/launchd.daemons.<name>.serviceConfig.ProgramArguments | This key maps to the second argument of execvp(3)
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.index | Adds index directive.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.virtualIps.*.addr | IP address, optionally with a netmask: IPADDR[/MASK]
|
| options/nixos/systemd.services.<name>.confinement.fullUnit | Whether to include the full closure of the systemd unit file into the
chroot, instead of just the dependencies for the executables.
While it may be tempting to just enable this option to
make things work quickly, please be aware that this might add paths
to the closure of the chroot that you didn't anticipate
|
| options/nixos/services.botamusique.settings.bot.username | Name the bot should appear with.
|
| options/nixos/services.nextcloud-spreed-signaling.backends.<name>.urls | List of URLs of the Nextcloud instance
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.connection | Specifies parameters used to connect to the server, as a connection string
|
| options/nixos/services.wstunnel.servers.<name>.websocketPingInterval | Frequency at which the client will send websocket ping to the server.
|
| options/nixos/services.wstunnel.clients.<name>.websocketPingInterval | Frequency at which the client will send websocket ping to the server.
|
| options/nixos/services.fedimintd.<name>.nginx.config.sslCertificateKey | Path to server SSL certificate key.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.corePlugins.*.settings | Plugin settings to include.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.itemTypes | Kinds of items to show
|
| options/nixos/services.neo4j.ssl.policies | Defines the SSL policies for use with Neo4j connectors
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.filter | External filter program to further filter GC roots matched by this policy.
|
| options/nixos/services.tailscale.serve.services.<name>.advertised | Whether the service should accept new connections
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.force | Whether to override all previous firefox settings
|
| options/home-manager/programs.thunderbird.profiles.<name>.search.default | The default search engine used in the address bar and search
bar.
|
| options/home-manager/launchd.agents.<name>.config.EnvironmentVariables | This optional key is used to specify additional environment variables to be set before running the
job.
|
| options/nixos/services.firefox-syncserver.singleNode.hostname | Host name to use for this service.
|
| options/nixos/services.bacula-sd.director.<name>.password | Specifies the password that must be supplied for the default Bacula
Console to be authorized
|
| options/nixos/services.bacula-fd.director.<name>.password | Specifies the password that must be supplied for the default Bacula
Console to be authorized
|
| options/home-manager/programs.thunderbird.profiles.<name>.search.force | Whether to force replace the existing search
configuration
|
| options/nixos/services.firewalld.services.<name>.destination | Destinations for the service.
|
| options/nixos/services.firewalld.services.<name>.description | Description for the service.
|
| options/nixos/services.tarsnap.archives.<name>.checkpointBytes | Create a checkpoint every checkpointBytes
of uploaded data (optionally specified using an SI prefix).
1GB is the minimum value
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.useVcard4 | Specifies whether vdirsyncer should request vCards in version 4.0
|
| options/nixos/services.keepalived.vrrpInstances.<name>.priority | For electing MASTER, highest priority wins
|
| options/home-manager/programs.gnome-terminal.profile.<name>.deleteBinding | Which string the terminal should send to an application when the user
presses the Delete key.
auto
: Send the @7 control sequence.
ascii-backspace
: Send an ASCII backspace character (0x08).
ascii-delete
: Send an ASCII delete character (0x7F).
delete-sequence
: Send the @7 control sequence.
tty
: Send terminal's "erase" setting.
|
| options/nixos/services.simplesamlphp.<name>.settings | Configuration options used by SimpleSAMLphp
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.QueueDirectories | Much like the WatchPaths option, this key will watch the paths for modifications
|
| options/nixos/virtualisation.oci-containers.containers.<name>.login.username | Username for login.
|
| options/nixos/systemd.network.networks.<name>.hierarchyTokenBucketConfig | Each attribute in this set specifies an option in the
[HierarchyTokenBucket] section of the unit
|
| options/nixos/services.bacula-sd.autochanger.<name>.changerCommand | The name-string specifies an external program to be called that will
automatically change volumes as required by Bacula
|
| options/nixos/services.printing.cups-pdf.instances.<name>.settings | Settings for a cups-pdf instance, see the descriptions in the template config file in the cups-pdf package
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/nixos/services.limesurvey.virtualHost.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.metadata | Metadata keys that should be synchronized when vdirsyncer
metasync is executed.
|
| options/nixos/services.jibri.xmppEnvironments.<name>.stripFromRoomDomain | The prefix to strip from the room's JID domain to derive the call URL.
|
| options/nixos/programs.nix-required-mounts.allowedPatterns.<name>.onFeatures | Which requiredSystemFeatures should trigger relaxation of the sandbox
|
| options/darwin/services.github-runners.<name>.ephemeral | If enabled, causes the following behavior:
- Passes the
--ephemeral flag to the runner configuration script
- De-registers and stops the runner with GitHub after it has processed one job
- Restarts the service after its successful exit
- On start, wipes the state directory and configures a new runner
You should only enable this option if tokenFile points to a file which contains a
personal access token (PAT)
|
| options/nixos/services.zeronsd.servedNetworks.<name>.settings.log_level | Log Level.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.foregroundColor | The foreground color.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.backgroundColor | The background color.
|
| options/home-manager/programs.hexchat.channels.<name>.options.autoconnect | Autoconnect to network.
|
| options/nixos/services.klipper.firmwares.<name>.enableKlipperFlash | Whether to enable flashings scripts for firmware
|
| options/home-manager/programs.vscode.profiles.<name>.enableExtensionUpdateCheck | Whether to enable update notifications for extensions
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.replay_window | IPsec replay window to configure for this CHILD_SA
|
| options/nixos/services.nginx.virtualHosts.<name>.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| options/nixos/services.limesurvey.httpd.virtualHost.locations.<name>.index | Adds DirectoryIndex directive
|
| options/nixos/services.limesurvey.httpd.virtualHost.locations.<name>.alias | Alias directory for requests
|
| options/nixos/services.evremap.settings.device_name | The name of the device that should be remapped
|
| options/nixos/services.matomo.hostname | URL of the host, without https prefix
|
| options/nixos/services.outline.smtp.username | Username to authenticate with.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.urlCommand | A command that prints the URL of the storage.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.virtualIps.*.scope | The scope of the area where this address is valid.
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.caPool | Path to the certificate authority (CA) for the certificate of your origin
|
| options/nixos/boot.binfmt.registrations.<name>.preserveArgvZero | Whether to pass the original argv[0] to the interpreter
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.token.<name>.pin | Optional PIN required to access the key on the token
|
| options/nixos/services.bookstack.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.settings | Attribute set of options for each extension
|
| options/nixos/services.kmonad.keyboards.<name>.defcfg.fallthrough | Whether to enable re-emitting unhandled key events.
|
| options/nixos/services.snapserver.streams.<name>.location | For type pipe or file, the path to the pipe or file
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.xauth.<name>.id | Identity the EAP/XAuth secret belongs to
|
| options/nixos/services.prometheus.scrapeConfigs.*.job_name | The job name assigned to scraped metrics by default.
|
| options/nixos/boot.binfmt.registrations.<name>.magicOrExtension | The magic number or extension to match on.
|
| options/nixos/services.firewalld.services.<name>.destination.ipv6 | IPv6 destination.
|
| options/nixos/boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.mode | The file access mode to use when creating this file or directory.
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.settings | Configuration of radicle-native-ci
|
| options/nixos/services.rke2.nodeName | Node name.
|
| options/nixos/services.mysql.galeraCluster.localName | The unique name that identifies this particular node within the cluster
|
| options/nixos/services.prometheus.exporters.mail.configuration.servers.*.name | Value for label 'configname' which will be added to all metrics.
|
| options/nixos/services.jibri.xmppEnvironments.<name>.control.login.domain | The domain part of the JID for this Jibri instance.
|
| options/nixos/systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.type | The type of operation to perform on the file
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.communityPlugins | Community plugins to install and activate.
|
| options/nixos/services.anuko-time-tracker.nginx.serverName | Name of this virtual host
|
| options/home-manager/accounts.email.accounts.<name>.offlineimap.extraConfig.local | Extra configuration options to add to the local account
section.
|
| options/nixos/services.tor.relay.onionServices.<name>.authorizedClients | Authorized clients for a v3 onion service,
as a list of public key, in the format:
descriptor:x25519:<base32-public-key>
See torrc manual.
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.settings.log | File where radicle-native-ci should write the run log.
|
| options/nixos/services.neo4j.ssl.policies.<name>.allowKeyGeneration | Allows the generation of a private key and associated self-signed
certificate
|
| options/nixos/hardware.nvidia-container-toolkit.device-name-strategy | Specify the strategy for generating device names,
passed to nvidia-ctk cdi generate
|
| options/home-manager/programs.vicinae.themes | Theme settings to add to the themes folder in ~/.config/vicinae/themes
|
| options/nixos/systemd.network.networks.<name>.trivialLinkEqualizerConfig | Each attribute in this set specifies an option in the
[TrivialLinkEqualizer] section of the unit
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.originLanding | When redirecting from the Kanidm Apps Listing page, some linked applications may need to land on a specific page to trigger oauth2/oidc interactions.
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_log_config | The file for log configuration
|
| options/home-manager/programs.librewolf.profiles.<name>.bookmarks.settings | Custom bookmarks.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.cursor.background | The background color.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.cursor.foreground | The foreground color.
|
| options/nixos/users.users.<name>.hashedPassword | Specifies the hashed password for the user
|
| options/nixos/services.sabnzbd.settings.servers.<name>.connections | Number of parallel connections permitted by
the server.
|
| options/nixos/services.gitea.appName | Application name.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rekey_bytes | Number of bytes processed before initiating CHILD_SA rekeying
|
| options/nixos/services.borgbackup.jobs.<name>.encryption.passCommand | A command which prints the passphrase to stdout
|
| options/nixos/services.angrr.settings.profile-policies.<name>.keep-current-system | Whether to keep the current system generation
|
| options/nixos/services.authelia.instances.<name>.secrets.sessionSecretFile | Path to your session secret
|
| options/nixos/services.consul-template.instances.<name>.settings | Free-form settings written directly to the config.json file
|
| options/nixos/services.postfix.masterConfig.<name>.wakeupUnusedComponent | If set to false the component will only be woken
up if it is used
|
| options/nixos/services.keepalived.vrrpInstances.<name>.unicastSrcIp | Default IP for binding vrrpd is the primary IP on interface
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/home-manager/programs.borgmatic.backups.<name>.consistency.checks | Consistency checks to run
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.close_action | Action to perform after a CHILD_SA gets closed by the peer.
- The default of
none does not take any action,
trap installs a trap policy for the CHILD_SA.
start tries to re-create the CHILD_SA.
close_action does not provide any guarantee that the
CHILD_SA is kept alive
|
| options/nixos/services.system76-scheduler.assignments.<name>.nice | Niceness.
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| options/nixos/services.influxdb2.provision.users.<name>.passwordFile | Password for the user
|
| options/nixos/services.jitsi-videobridge.xmppConfigs.<name>.passwordFile | File containing the password for the user.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.interface | Interface for inside_network, bound by vrrp.
|
| options/nixos/services.archisteamfarm.bots.<name>.enabled | Whether to enable the bot on startup.
|
| options/nixos/services.mediawiki.httpd.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ecdsa.<name>.secret | Value of decryption passphrase for ECDSA key.
|
| options/home-manager/wayland.windowManager.sway.config.bindswitches.<name>.action | The sway command to execute on state changes
|
| options/nixos/services.beesd.filesystems.<name>.hashTableSizeMB | Hash table size in MB; must be a multiple of 16
|
| options/nixos/services.tailscale.serve.services.<name>.endpoints | Map of incoming traffic patterns to local targets
|
| options/nixos/programs.schroot.profiles.<name>.nssdatabases | System databases (as described in /etc/nsswitch.conf on GNU/Linux systems) to copy into the chroot from the host.
|
| options/home-manager/accounts.calendar.accounts.<name>.primaryCollection | The primary collection of the account
|
| options/nixos/services.printing.cups-pdf.instances.<name>.settings.Anonuser | User for anonymous PDF creation
|
| options/nixos/services.namecoind.enable | Whether to enable namecoind, Namecoin client.
|
| options/nixos/services.jibri.xmppEnvironments.<name>.call.login.passwordFile | File containing the password for the user.
|
| options/nixos/services.tor.relay.onionServices.<name>.settings.HiddenServiceSingleHopMode | See torrc manual.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.communityPlugins.*.pkg | The plugin package.
|
| options/home-manager/launchd.agents.<name>.config.EnableTransactions | This flag instructs launchd that the job promises to use vproc_transaction_begin(3) and
vproc_transaction_end(3) to track outstanding transactions that need to be reconciled before the
process can safely terminate
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.readPermissions | The read permissions to include for this token
|
| options/darwin/launchd.daemons.<name>.serviceConfig.QueueDirectories | Much like the WatchPaths option, this key will watch the paths for modifications
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.initialPrompt | Optional text to provide as a prompt for the first window
|
| options/home-manager/services.podman.containers.<name>.environmentFile | Paths to files containing container environment variables.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.partialSync | What should happen if synchronization in one direction
is impossible due to one storage being read-only
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.keepSecondly | Number of secondly archives to keep
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.keepMinutely | Number of minutely archives to keep
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.enableLegacyCrypto | Enable legacy crypto on this client
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.set_mark_in | Netfilter mark applied to packets after the inbound IPsec SA processed
them
|
| options/nixos/services.syncthing.settings.devices.<name>.autoAcceptFolders | Automatically create or share folders that this device advertises at the default path
|
| options/home-manager/services.syncthing.settings.devices.<name>.autoAcceptFolders | Automatically create or share folders that this device advertises at the default path
|
| options/nixos/services.sabnzbd.settings.servers.<name>.ssl_verify | Level of TLS verification
|
| options/darwin/launchd.agents.<name>.serviceConfig.ThrottleInterval | This key lets one override the default throttling policy imposed on jobs by launchd
|
| options/nixos/services.printing.cups-pdf.instances.<name>.installPrinter | Whether to enable a CUPS printer queue for this instance
|
| options/home-manager/programs.borgmatic.backups.<name>.location.patterns | Patterns to include/exclude
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs8.<name>.secret | Value of decryption passphrase for PKCS#8 key.
|
| options/home-manager/accounts.calendar.accounts.<name>.thunderbird.enable | Whether to enable the Thunderbird mail client for this account.
|
| options/home-manager/programs.floorp.profiles.<name>.search.meta.maintainers | List of maintainers of each module
|
| options/nixos/services.borgbackup.repos.<name>.authorizedKeys | Public SSH keys that are given full write access to this repository
|
| options/nixos/containers.<name>.forwardPorts.*.protocol | The protocol specifier for port forwarding between host and container
|
| options/nixos/services.nitter.server.hostname | Hostname of the instance.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/home-manager/services.xsuspender.rules.<name>.downclockOnBattery | Limit CPU consumption for this factor when on battery power
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.auth | Authentication to expect from remote
|
| options/nixos/services.k3s.autoDeployCharts.<name>.extraFieldDefinitions | Extra HelmChart field definitions that are merged with the rest of the HelmChart
custom resource
|
| options/nixos/services.system76-scheduler.assignments.<name>.prio | CPU scheduler priority.
|
| options/nixos/services.tor.relay.onionServices.<name>.settings.HiddenServiceMaxStreams | See torrc manual.
|
| options/nixos/virtualisation.fileSystems.<name>.label | Label of the device
|
| options/home-manager/launchd.agents.<name>.config.Disabled | This optional key is used as a hint to launchctl(1) that it should not submit this job to launchd when
loading a job or jobs
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets | This optional key is used to specify launch on demand sockets that can be used to let launchd know when
to run the job
|
| options/nixos/services.bookstack.nginx.serverName | Name of this virtual host
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.ThrottleInterval | This key lets one override the default throttling policy imposed on jobs by launchd
|
| options/nixos/services.limesurvey.httpd.virtualHost.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/nixos/services.postfix.hostname | Hostname to use
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.profiles | List of Thunderbird profiles for which this account should be
enabled
|
| options/nixos/services.fedimintd.<name>.nginx.config.listen.*.extraParameters | Extra parameters of this listen directive.
|
| options/home-manager/accounts.contact.accounts.<name>.pimsync.extraPairDirectives | Extra directives that should be added under this accounts pair directive
|
| options/nixos/services.hostapd.radios.<name>.wifi5.capabilities | VHT (Very High Throughput) capabilities given as a list of flags
|
| options/nixos/systemd.network.networks.<name>.dhcpPrefixDelegationConfig | Each attribute in this set specifies an option in the
[DHCPPrefixDelegation] section of the unit
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.armagetronad.servers.<name>.openFirewall | Set to true to open the configured UDP port for Armagetron Advanced.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets | This optional key is used to specify launch on demand sockets that can be used to let launchd know when
to run the job
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.settings.state | Directory where per-run directories are stored.
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.writePermissions | The read permissions to include for this token
|
| options/home-manager/accounts.email.accounts.<name>.offlineimap.postSyncHookCommand | Command to run after fetching new mails.
|
| options/nixos/services.pantalaimon-headless.instances.<name>.ssl | Whether or not SSL verification should be enabled for outgoing
connections to the homeserver.
|
| options/nixos/services.system76-scheduler.assignments.<name>.ioPrio | IO scheduler priority.
|
| options/nixos/services.shorewall.configs | This option defines the Shorewall configs
|
| options/home-manager/accounts.email.accounts.<name>.offlineimap.extraConfig.remote | Extra configuration options to add to the remote account
section.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.per_cpu_sas | Enable per-CPU CHILD_SAs
|
| options/home-manager/accounts.email.accounts.<name>.smtp.tls.certificatesFile | Path to file containing certificate authorities that should
be used to validate the connection authenticity
|
| options/home-manager/accounts.email.accounts.<name>.imap.tls.certificatesFile | Path to file containing certificate authorities that should
be used to validate the connection authenticity
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.settings | Attribute set of options for each extension
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.settings | Extra settings to add to this Thunderbird account configuration
|
| options/nixos/services.fediwall.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.agorakit.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.librenms.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.kanboard.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.mainsail.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/home-manager/programs.obsidian.defaultSettings.hotkeys.<name>.*.modifiers | The hotkey modifiers.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.metadata | Metadata keys that should be synchronized when vdirsyncer
metasync is executed.
|
| options/nixos/services.cloudflared.tunnels.<name>.warp-routing.enabled | Enable warp routing
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.token.<name>.handle | Hex-encoded CKA_ID or handle of the private key on the token or TPM,
respectively.
|
| options/nixos/services.buildkite-agents | Attribute set of buildkite agents
|
| options/darwin/services.buildkite-agents | Attribute set of buildkite agents
|
| options/nixos/services.nullmailer.config.me | The fully-qualifiled host name of the computer running nullmailer
|
| options/nixos/services.limesurvey.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.anubis.instances.<name>.settings.DIFFICULTY | The difficulty required for clients to solve the challenge
|
| options/nixos/services.frigate.hostname | Hostname of the nginx vhost to configure
|
| options/nixos/virtualisation.oci-containers.containers.<name>.serviceName | Systemd service name that manages the container
|
| options/nixos/boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.age | Delete a file when it reaches a certain age
|
| options/nixos/virtualisation.fileSystems.<name>.mountPoint | Location where the file system will be mounted
|
| options/nixos/users.users.<name>.password | Specifies the (clear text) password for the user
|
| options/nixos/services.mpdscribble.endpoints.<name>.passwordFile | File containing the password, either as MD5SUM or cleartext.
|
| options/home-manager/services.mpdscribble.endpoints.<name>.passwordFile | File containing the password, either as MD5SUM or cleartext.
|
| options/home-manager/programs.thunderbird.profiles.<name>.withExternalGnupg | Allow using external GPG keys with GPGME.
|
| options/home-manager/accounts.email.accounts.<name>.notmuch.neomutt.virtualMailboxes | List of virtual mailboxes using Notmuch queries
|
| options/home-manager/programs.thunderbird.profiles.<name>.feedAccounts | Attribute set of feed accounts
|
| options/nixos/services.authelia.instances.<name>.settings.log.file_path | File path where the logs will be written
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.ignore_tags | Set labels to ignore when syncing from local tags to
remote labels (after translations).
|
| options/nixos/services.wstunnel.clients.<name>.tlsVerifyCertificate | Whether to verify the TLS certificate of the server
|
| options/nixos/systemd.network.networks.<name>.hierarchyTokenBucketClassConfig | Each attribute in this set specifies an option in the
[HierarchyTokenBucketClass] section of the unit
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.tcpKeepAlive | The timeout after which a TCP keepalive packet is sent on a connection between Tunnel and the origin server.
|
| options/nixos/services.suricata.settings.app-layer.protocols.<name>.enabled | The option "enabled" takes 3 values - "yes", "no", "detection-only".
"yes" enables both detection and the parser, "no" disables both, and
"detection-only" enables protocol detection only (parser disabled).
|
| options/nixos/services.syncthing.settings.folders.<name>.versioning.type | The type of versioning
|
| options/home-manager/services.syncthing.settings.folders.<name>.versioning.type | The type of versioning
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.extraArgs | A list of extra arguments to pass to the pg_receivewal command.
|
| options/home-manager/programs.gemini-cli.commands | An attribute set of custom commands that will be globally available
|
| options/nixos/services.system76-scheduler.assignments.<name>.class | CPU scheduler class.
|
| options/nixos/services.consul-template.instances.<name>.settings.pid_file | Path to use for the pid file.
|
| options/nixos/programs.foot.theme | Theme name
|
| options/nixos/services.namecoind.wallet | Wallet file
|
| options/nixos/services.angrr.settings.profile-policies.<name>.profile-paths | Paths to the Nix profile
|
| options/nixos/services.armagetronad.servers.<name>.settings | Armagetron Advanced server rules configuration
|
| options/darwin/launchd.agents.<name>.serviceConfig.LowPriorityBackgroundIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O when the process is throttled with the Darwin-background classification.
|
| options/nixos/services.prometheus.exporters.imap-mailstat.accounts.<name>.mailaddress | Your email address (at the moment used as login name)
|
| options/nixos/services.ytdl-sub.instances.<name>.subscriptions | Subscriptions for ytdl-sub
|
| options/nixos/security.dhparams.params | Diffie-Hellman parameters to generate
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs12.<name>.secret | Value of decryption passphrase for PKCS#12 container.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.eap.<name>.secret | Value of the EAP/XAuth secret
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ike.<name>.secret | Value of the IKE preshared secret
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.github-runners.<name>.ephemeral | If enabled, causes the following behavior:
- Passes the
--ephemeral flag to the runner configuration script
- De-registers and stops the runner with GitHub after it has processed one job
- On stop, systemd wipes the runtime directory (this always happens, even without using the ephemeral option)
- Restarts the service after its successful exit
- On start, wipes the state directory and configures a new runner
You should only enable this option if tokenFile points to a file which contains a
personal access token (PAT)
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.clientIdCommand | A command that prints the OAuth credentials to standard
output
|
| options/nixos/services.vmalert.instances.<name>.settings."datasource.url" | Datasource compatible with Prometheus HTTP API.
|
| options/home-manager/systemd.user.automounts.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/nixos/virtualisation.allInterfaces.<name>.vlan | VLAN to which the network interface is connected.
|
| options/nixos/services.dovecot2.mailboxes.<name>.autoexpunge | To automatically remove all email from the mailbox which is older than the
specified time.
|
| options/nixos/boot.loader.systemd-boot.windows.<name>.efiDeviceHandle | The device handle of the EFI System Partition (ESP) where the Windows bootloader is
located
|
| options/nixos/services.authelia.instances.<name>.secrets.oidcIssuerPrivateKeyFile | Path to your private key file used to encrypt OIDC JWTs.
|
| options/nixos/services.librenms.hostname | The hostname to serve LibreNMS on.
|
| options/nixos/services.system76-scheduler.assignments.<name>.ioClass | IO scheduler class.
|
| options/nixos/services.wstunnel.clients.<name>.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.wstunnel.servers.<name>.environmentFile | Environment file to be passed to the systemd service
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LowPriorityBackgroundIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O when the process is throttled with the Darwin-background classification.
|
| options/home-manager/programs.hexchat.channels.<name>.options.connectToSelectedServerOnly | Connect to selected server only.
|
| options/home-manager/programs.firefox.profiles.<name>.search.meta.maintainers | List of maintainers of each module
|
| options/nixos/virtualisation.oci-containers.containers.<name>.dependsOn | Define which other containers this one depends on
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.passwordFile | Specifies the path to a file containing the
clear text password for the MQTT user
|
| options/nixos/virtualisation.fileSystems.<name>.stratis.poolUuid | UUID of the stratis pool that the fs is located in
This is only relevant if you are using stratis.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/home-manager/programs.borgmatic.backups.<name>.consistency.extraConfig | Extra settings.
|
| options/nixos/services.anubis.instances.<name>.settings.WEBMASTER_EMAIL | If set, shows a contact email address when rendering error pages
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.set_mark_out | Netfilter mark applied to packets after the outbound IPsec SA processed
them
|
| options/darwin/launchd.daemons.<name>.serviceConfig.ThrottleInterval | This key lets one override the default throttling policy imposed on jobs by launchd
|
| options/nixos/virtualisation.fileSystems.<name>.autoFormat | If the device does not currently contain a filesystem (as
determined by blkid), then automatically
format it with the filesystem type specified in
fsType
|
| options/nixos/services.archisteamfarm.bots.<name>.settings | Additional settings that are documented here.
|
| options/nixos/services.hostapd.radios.<name>.wifi4.capabilities | HT (High Throughput) capabilities given as a list of flags
|
| options/nixos/services.anubis.instances.<name>.settings.METRICS_BIND_NETWORK | The network family that the metrics server should bind to
|
| options/nixos/services.hadoop.hdfs.namenode.extraEnv | Extra environment variables for HDFS NameNode
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.noTLSVerify | Disables TLS verification of the certificate presented by your origin
|
| options/home-manager/services.podman.containers.<name>.addCapabilities | The capabilities to add to the container.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.virtualRouterId | Arbitrary unique number 1..255
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.partialSync | What should happen if synchronization in one direction
is impossible due to one storage being read-only
|
| options/home-manager/accounts.email.accounts.<name>.offlineimap.extraConfig.account | Extra configuration options to add to the account section.
|
| options/home-manager/programs.librewolf.profiles.<name>.search.engines | Attribute set of search engine configurations
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/home-manager/accounts.email.accounts.<name>.getmail.destinationCommand | Specify a command delivering the incoming mail to your maildir.
|
| options/home-manager/programs.librewolf.profiles.<name>.containersForce | Whether to force replace the existing containers configuration
|
| options/nixos/services.pantalaimon-headless.instances.<name>.logLevel | Set the log level of the daemon.
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.filter.program | Path to the external filter program.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets | This optional key is used to specify launch on demand sockets that can be used to let launchd know when
to run the job
|
| options/nixos/services.consul-template.instances.<name>.settings.template | Template section of consul-template
|
| options/nixos/services.tor.settings.Nickname | See torrc manual.
|
| options/nixos/users.extraUsers.<name>.hashedPassword | Specifies the hashed password for the user
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters | List of message filters to add to this Thunderbird account
configuration.
|
| options/nixos/services.postfix.settings.master.<name>.wakeupUnusedComponent | If set to false the component will only be woken
up if it is used
|
| options/nixos/services.pantalaimon-headless.instances.<name>.dataPath | The directory where pantalaimon should store its state such as the database file.
|
| options/nixos/services.hostapd.radios.<name>.wifi6.operatingChannelWidth | Determines the operating channel width for HE.
- "20or40": 20 or 40 MHz operating channel width
- "80": 80 MHz channel width
- "160": 160 MHz channel width
- "80+80": 80+80 MHz channel width
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.start_action | Action to perform after loading the configuration.
- The default of
none loads the connection only, which
then can be manually initiated or used as a responder configuration.
- The value
trap installs a trap policy, which triggers
the tunnel as soon as matching traffic has been detected.
- The value
start initiates the connection actively.
- Since version 5.9.6 two modes above can be combined with
trap|start,
to immediately initiate a connection for which trap policies have been installed
|
| options/nixos/services.bcg.device | Device name to configure gateway to use.
|
| options/home-manager/accounts.calendar.accounts.<name>.pimsync.extraPairDirectives | Extra directives that should be added under this accounts pair directive
|
| options/nixos/services.limesurvey.httpd.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.filters.*.name | Name of the filter
|
| options/nixos/services.jirafeau.nginxConfig.serverName | Name of this virtual host
|
| options/nixos/users.mysql.database | The name of the database containing the users
|
| options/nixos/boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.type | The type of operation to perform on the file
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ppk.<name>.secret | Value of the PPK
|
| options/nixos/services.artalk.user | Artalk user name.
|
| options/nixos/services.sogo.vhostName | Name of the nginx vhost
|
| options/nixos/services.zammad.user | Name of the Zammad user.
|
| options/darwin/homebrew.taps | List of Homebrew formula repositories to tap
|
| options/nixos/services.sabnzbd.settings.servers.<name>.expire_date | If Notifications are enabled and an expiry date is
set, warn 5 days before expiry
|
| options/home-manager/services.activitywatch.watchers.<name>.package | The activitywatch package to use
|
| options/nixos/services.hostapd.radios.<name>.wifi5.operatingChannelWidth | Determines the operating channel width for VHT.
- "20or40": 20 or 40 MHz operating channel width
- "80": 80 MHz channel width
- "160": 160 MHz channel width
- "80+80": 80+80 MHz channel width
|
| options/nixos/services.hostapd.radios.<name>.wifi7.operatingChannelWidth | Determines the operating channel width for EHT.
- "20or40": 20 or 40 MHz operating channel width
- "80": 80 MHz channel width
- "160": 160 MHz channel width
- "80+80": 80+80 MHz channel width
|
| options/home-manager/services.podman.containers.<name>.dropCapabilities | The capabilities to drop from the container.
|
| options/nixos/virtualisation.fileSystems.<name>.autoResize | If set, the filesystem is grown to its maximum size before
being mounted. (This is typically the size of the containing
partition.) This is currently only supported for ext2/3/4
filesystems that are mounted during early boot.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.serverName | Name of this virtual host
|
| options/nixos/services.znc.user | The name of an existing user account to use to own the ZNC server
process
|
| options/home-manager/launchd.agents.<name>.config.inetdCompatibility.Wait | This flag corresponds to the "wait" or "nowait" option of inetd
|
| options/nixos/services.rke2.autoDeployCharts.<name>.extraFieldDefinitions | Extra HelmChart field definitions that are merged with the rest of the HelmChart
custom resource
|
| options/home-manager/programs.senpai.config.nickname | Your nickname, sent with a NICK IRC message
|
| options/nixos/services.hadoop.hdfs.namenode.enable | Whether to enable HDFS NameNode.
|
| options/nixos/services.mediawiki.httpd.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.syncthing.settings.folders.<name>.versioning | How to keep changed/deleted files with Syncthing
|
| options/home-manager/services.syncthing.settings.folders.<name>.versioning | How to keep changed/deleted files with Syncthing
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.private.<name>.secret | Value of decryption passphrase for private key.
|
| options/home-manager/accounts.email.accounts.<name>.smtp.authentication | The authentication mechanism.
|
| options/home-manager/accounts.email.accounts.<name>.imap.authentication | The authentication mechanism.
|
| options/nixos/services.easytier.instances.<name>.environmentFiles | Environment files for this instance
|
| options/nixos/systemd.network.networks.<name>.deficitRoundRobinSchedulerConfig | Each attribute in this set specifies an option in the
[DeficitRoundRobinScheduler] section of the unit
|
| options/darwin/homebrew.brews | List of Homebrew formulae to install
|
| options/home-manager/accounts.email.accounts.<name>.notmuch.neomutt.virtualMailboxes.*.query | Notmuch query
|
| options/nixos/services.simplesamlphp.<name>.configureNginx | Configure nginx as a reverse proxy for SimpleSAMLphp.
|
| options/nixos/services.kanidm.provision.groups.<name>.overwriteMembers | Whether the member list should be overwritten each time (true) or appended
(false)
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.httpHostHeader | Sets the HTTP Host header on requests sent to the local service.
|
| options/nixos/programs.zsh.ohMyZsh.theme | Name of the theme to be used by oh-my-zsh.
|
| options/home-manager/programs.zsh.oh-my-zsh.theme | Name of the theme to be used by oh-my-zsh.
|
| options/home-manager/services.muchsync.remotes.<name>.local.checkForModifiedFiles | Check for locally modified files
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters.*.type | Type for this filter.
|
| options/nixos/services.gitlab-runner.services.<name>.requestConcurrency | Limit number of concurrent requests for new jobs from GitLab.
|
| options/darwin/services.gitlab-runner.services.<name>.requestConcurrency | Limit number of concurrent requests for new jobs from GitLab.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.noPreempt | VRRP will normally preempt a lower priority machine when a higher
priority machine comes online. "nopreempt" allows the lower priority
machine to maintain the master role, even when a higher priority machine
comes back online
|
| options/nixos/services.bookstack.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.xauth.<name>.secret | Value of the EAP/XAuth secret
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LowPriorityBackgroundIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O when the process is throttled with the Darwin-background classification.
|
| options/nixos/services.woodpecker-agents.agents.<name>.environment | woodpecker-agent config environment variables, for other options read the documentation
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.removeOrphanedClaimMaps | Whether claim maps not specified here but present in kanidm should be removed from kanidm.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.datadog-agent.hostname | The hostname to show in the Datadog dashboard (optional)
|
| options/nixos/services.keycloak.themes | Additional theme packages for Keycloak
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.communityPlugins.*.enable | Whether to enable the plugin.
|
| options/nixos/services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.filters.*.name | See this list
for the available filters.
|
| options/darwin/launchd.agents.<name>.serviceConfig.inetdCompatibility | The presence of this key specifies that the daemon expects to be run as if it were launched from inetd.
|
| options/nixos/services.hddfancontrol.settings.<drive-bay-name>.extraArgs | Extra commandline arguments for hddfancontrol
|
| options/home-manager/accounts.email.accounts.<name>.notmuch.neomutt.virtualMailboxes.*.type | Reads all matching messages or whole-threads
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.tlsTimeout | Timeout for completing a TLS handshake to your origin server, if you have chosen to connect Tunnel to an HTTPS server.
|
| options/darwin/services.buildkite-agents.<name>.hooks.environment | The environment hook will run before all other commands, and can be used
to set up secrets, data, etc
|
| options/nixos/services.invoiceplane.sites.<name>.database.passwordFile | A file containing the password corresponding to
database.user.
|
| options/home-manager/programs.thunderbird.profiles.<name>.search.privateDefault | The default search engine used in the Private Browsing.
|
| options/home-manager/accounts.contact.accounts.<name>.thunderbird.profiles | List of Thunderbird profiles for which this account should be
enabled
|
| options/nixos/services.paretosecurity.users.<name>.inviteId | A unique ID that links the agent to Pareto Cloud
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.hashedPassword | Specifies the hashed password for the MQTT User
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.clientIdCommand | A command that prints the OAuth credentials to standard
output
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rekey_packets | Number of packets processed before initiating CHILD_SA rekeying
|
| options/nixos/services.mautrix-meta.instances.<name>.registrationFile | Path to the yaml registration file of the appservice.
|
| options/nixos/services.tor.relay.onionServices.<name>.settings.HiddenServiceExportCircuitID | See torrc manual.
|
| options/nixos/services.invoiceplane.sites.<name>.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.namecoind.rpc.allowFrom | List of IP address ranges allowed to use the RPC API
|
| options/darwin/launchd.agents.<name>.serviceConfig.ProcessType | This optional key describes, at a high level, the intended purpose of the job
|
| options/nixos/services.mailman.ldap.attrMap.username | LDAP-attribute that corresponds to the username-attribute in mailman.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.ProcessType | This optional key describes, at a high level, the intended purpose of the job
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/home-manager/accounts.email.accounts.<name>.notmuch.neomutt.virtualMailboxes.*.limit | Restricts number of messages/threads in the result.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.inetdCompatibility | The presence of this key specifies that the daemon expects to be run as if it were launched from inetd.
|
| options/nixos/virtualisation.fileSystems.<name>.encrypted.blkDev | Location of the backing encrypted device.
|
| options/nixos/services.fedimintd.<name>.nginx.config.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.proxyPort | cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP
|
| options/nixos/services.namecoind.rpc.address | IP address the RPC server will bind to.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.session_url | Session URL to connect to
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.runtimePackages | Packages added to the adapter's PATH.
|
| options/home-manager/launchd.agents.<name>.config.StartCalendarInterval | This optional key causes the job to be started every calendar interval as specified
|
| options/nixos/virtualisation.oci-containers.containers.<name>.imageFile | Path to an image file to load before running the image
|
| options/nixos/services.jibri.xmppEnvironments.<name>.control.login.passwordFile | File containing the password for the user.
|
| options/nixos/services.limesurvey.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/home-manager/services.hyprsunset.transitions.<name>.calendar | Deprecated - Use services.hyprsunset.settings instead to manage transitions
|
| options/nixos/services.evremap.settings.phys | The physical device name to listen on
|
| options/nixos/services.armagetronad.servers.<name>.roundSettings | Armagetron Advanced server per-round configuration
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ntlm.<name>.secret | Value of the NTLM secret, which is the NT Hash of the actual secret,
that is, MD4(UTF-16LE(secret))
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/darwin/launchd.agents.<name>.serviceConfig.EnvironmentVariables | This optional key is used to specify additional environment variables to be set before running the
job.
|
| options/nixos/boot.binfmt.registrations.<name>.recognitionType | Whether to recognize executables by magic number or extension.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.mediated_by | The name of the connection to mediate this connection through
|
| options/nixos/security.tpm2.tssUser | Name of the tpm device-owner and service user, set if applyUdevRules is
set.
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.priority | Priority of this policy
|
| options/home-manager/wayland.windowManager.sway.config.bindswitches.<name>.locked | Unless the flag --locked is set, the command
will not be run when a screen locking program
is active
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters.*.text | The raw text of the filter
|
| options/nixos/containers.<name>.forwardPorts.*.containerPort | Target port of container
|
| options/nixos/services.tor.relay.onionServices.<name>.settings.HiddenServiceAllowUnknownPorts | See torrc manual.
|
| options/nixos/hardware.fw-fanctrl.config.strategies.<name>.fanSpeedUpdateFrequency | How often the fan speed should be updated in seconds
|
| options/nixos/services.taskserver.organisations.<name>.users | A list of user names that belong to the organization.
|
| options/nixos/systemd.network.networks.<name>.genericRandomEarlyDetectionConfig | Each attribute in this set specifies an option in the
[GenericRandomEarlyDetection] section of the unit
|
| options/nixos/systemd.services.<name>.confinement.packages | Additional packages or strings with context to add to the closure of
the chroot
|
| options/nixos/systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.argument | An argument whose meaning depends on the type of operation
|
| options/nixos/services.sanoid.datasets.<name>.pruning_script | Script to run after pruning snapshot.
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.netbird.clients.<name>.login.systemdDependencies | Additional systemd dependencies required to succeed before the Setup Key file becomes available.
|
| options/nixos/services.netbird.tunnels.<name>.login.systemdDependencies | Additional systemd dependencies required to succeed before the Setup Key file becomes available.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.EnvironmentVariables | This optional key is used to specify additional environment variables to be set before running the
job.
|
| options/home-manager/services.muchsync.remotes.<name>.remote.checkForModifiedFiles | Check for modified files on the remote side
|
| options/nixos/services.tor.relay.onionServices.<name>.settings.HiddenServiceDirGroupReadable | See torrc manual.
|
| options/nixos/services.sftpgo.user | User account name under which SFTPGo runs.
|
| options/home-manager/services.activitywatch.watchers.<name>.extraOptions | Extra arguments to be passed to the watcher executable.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.r53-ddns.domain | The name of your domain in Route53
|
| options/nixos/boot.loader.limine.additionalFiles | A set of files to be copied to /boot
|
| options/nixos/boot.loader.refind.additionalFiles | A set of files to be copied to /boot
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.originServerName | Hostname that cloudflared should expect from your origin server certificate.
|
| options/nixos/services.cloudflared.tunnels.<name>.credentialsFile | Credential file
|
| options/home-manager/wayland.windowManager.sway.config.bindswitches.<name>.reload | If the --reload flag is given, the binding will
also be executed when the config is reloaded.
toggle bindings will not be executed on reload
|
| options/nixos/services.postfixadmin.database.username | Username for the postgresql connection
|
| options/nixos/services.matrix-tuwunel.settings.global.server_name | The server_name is the name of this server
|
| options/nixos/services.matrix-conduit.settings.global.server_name | The server_name is the name of this server
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.clientSecretCommand | A command that prints the OAuth credentials to standard
output
|
| options/nixos/services.bcg.automaticRenameNodes | Automatically rename all nodes.
|
| options/darwin/homebrew.casks | List of Homebrew casks to install
|
| options/nixos/services.hddfancontrol.settings.<drive-bay-name>.disks | Drive(s) to get temperature from
Can also use command substitution to automatically grab all matching drives; such as all scsi (sas) drives
|
| options/nixos/services.dendrite.settings.global.server_name | The domain name of the server, with optional explicit port
|
| options/nixos/hardware.fw-fanctrl.config.strategies.<name>.movingAverageInterval | Interval (seconds) of the last temperatures to use to calculate the average temperature
|
| options/nixos/users.extraUsers.<name>.password | Specifies the (clear text) password for the user
|
| options/home-manager/programs.hexchat.channels.<name>.options.useGlobalUserInformation | Use global user information.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.inetdCompatibility | The presence of this key specifies that the daemon expects to be run as if it were launched from inetd.
|
| options/nixos/services.coder.database.username | Username for accessing the database.
|
| options/nixos/services.pretix.settings.pretix.instance_name | The name of this installation.
|
| options/nixos/services.patroni.namespace | Path within the configuration store where Patroni will keep information about the cluster.
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.settings | Attribute set of options for each extension
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.keepAliveTimeout | Timeout after which an idle keepalive connection can be discarded.
|
| options/nixos/systemd.network.networks.<name>.deficitRoundRobinSchedulerClassConfig | Each attribute in this set specifies an option in the
[DeficitRoundRobinSchedulerClass] section of the unit
|
| options/nixos/services.davis.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.davis.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.movim.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.slskd.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.slskd.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.movim.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.highlight.background | The background color.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.highlight.foreground | The foreground color.
|
| options/home-manager/programs.astroid.externalEditor | You can use the following variables:
%1
: file name
%2
: server name
%3
: socket ID
See Customizing editor
on the Astroid wiki.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.limesurvey.httpd.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/home-manager/services.hyprsunset.transitions.<name>.requests | Deprecated - Use services.hyprsunset.settings instead to manage transitions
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/home-manager/accounts.calendar.accounts.<name>.thunderbird.profiles | List of Thunderbird profiles for which this account should be
enabled
|
| options/darwin/launchd.daemons.<name>.serviceConfig.ProcessType | This optional key describes, at a high level, the intended purpose of the job
|
| options/nixos/services.bind.enable | Whether to enable BIND domain name server.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.trackInterfaces | List of network interfaces to monitor for health tracking.
|
| options/nixos/services.anubis.instances.<name>.settings.OG_PASSTHROUGH | Whether to enable Open Graph tag passthrough
|
| options/darwin/launchd.agents.<name>.serviceConfig.EnableTransactions | This flag instructs launchd that the job promises to use vproc_transaction_begin(3) and
vproc_transaction_end(3) to track outstanding transactions that need to be reconciled before the
process can safely terminate
|
| options/nixos/services.drupal.webserver | Whether to use nginx or caddy for virtual host management
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.policies_fwd_out | Whether to install outbound FWD IPsec policies or not
|
| options/nixos/services.gitlab-runner.services.<name>.registrationConfigFile | Absolute path to a file with environment variables
used for gitlab-runner registration with runner registration
tokens
|
| options/nixos/services.taskserver.organisations.<name>.groups | A list of group names that belong to the organization.
|
| options/nixos/services.gitlab-runner.services.<name>.registrationFlags | Extra command-line flags passed to
gitlab-runner register
|
| options/darwin/services.gitlab-runner.services.<name>.registrationFlags | Extra command-line flags passed to
gitlab-runner register
|
| options/nixos/services.tt-rss.pool | Name of existing phpfpm pool that is used to run web-application
|
| options/nixos/services.snipe-it.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.backspaceBinding | Which string the terminal should send to an application when the user
presses the Backspace key.
auto
: Attempt to determine the right value from the terminal's IO settings.
ascii-backspace
: Send an ASCII backspace character (0x08).
ascii-delete
: Send an ASCII delete character (0x7F).
delete-sequence
: Send the @7 control sequence.
tty
: Send terminal's "erase" setting.
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.useTransformers | Whether to provide the dependencies to allow using transformer models.
|
| options/nixos/services.factorio.username | Your factorio.com login credentials
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.EnableTransactions | This flag instructs launchd that the job promises to use vproc_transaction_begin(3) and
vproc_transaction_end(3) to track outstanding transactions that need to be reconciled before the
process can safely terminate
|
| options/nixos/networking.networkmanager.unmanaged | List of interfaces that will not be managed by NetworkManager
|
| options/nixos/services.artalk.group | Artalk group name.
|
| options/nixos/services.zammad.group | Name of the Zammad group.
|
| options/nixos/virtualisation.allInterfaces.<name>.assignIP | Automatically assign an IP address to the network interface using the same scheme as
virtualisation.vlans.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.transparencyPercent | Background transparency in percent.
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters.*.action | Action to perform on matched messages.
|
| options/nixos/services.woodpecker-agents.agents.<name>.environmentFile | File to load environment variables
from
|
| options/nixos/services.hadoop.hdfs.namenode.extraFlags | Extra command line flags to pass to HDFS NameNode
|
| options/nixos/services.anuko-time-tracker.hostname | The hostname to serve Anuko Time Tracker on.
|
| options/nixos/services.sanoid.datasets.<name>.script_timeout | Time limit for pre/post/pruning script execution time (<=0 for infinite).
|
| options/darwin/launchd.daemons.<name>.serviceConfig.EnvironmentVariables | This optional key is used to specify additional environment variables to be set before running the
job.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/nixos/services.prometheus.exporters.imap-mailstat.accounts.<name>.serveraddress | mailserver name or address
|
| options/nixos/services.borgbackup.repos.<name>.authorizedKeysAppendOnly | Public SSH keys that can only be used to append new data (archives) to the repository
|
| options/nixos/services.shorewall6.configs | This option defines the Shorewall configs
|
| options/home-manager/accounts.email.accounts.<name>.aerc.imapOauth2Params.client_secret | The OAuth2 client secret.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.smtpOauth2Params.client_secret | The OAuth2 client secret.
|
| options/nixos/services.authelia.instances.<name>.settings.log.keep_stdout | Whether to also log to stdout when a file_path is defined.
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.resources.*.names | List of resources to host on this listener.
|
| options/nixos/services.matrix-synapse.settings.server_name | The domain name of the server, with optional explicit port
|
| options/home-manager/programs.librewolf.profiles.<name>.search.meta.maintainers | List of maintainers of each module
|
| options/home-manager/programs.floorp.profiles.<name>.bookmarks.meta.maintainers | List of maintainers of each module
|
| options/nixos/virtualisation.fileSystems.<name>.overlay.workdir | The path to the workdir
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.settings.base_url | Base URL for build logs (mandatory for access from CI broker page).
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.collections | The collections to synchronize between the storages.
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.proxyType | cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP
|
| options/nixos/services.monero.rpc.user | User name for RPC connections.
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.slot | Optional slot number of the token that stores the certificate.
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.proxyAddress | cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP
|
| options/nixos/services.invoiceplane.sites.<name>.invoiceTemplates | List of path(s) to respective template(s) which are copied from the 'invoice_templates/pdf' directory.
These templates need to be packaged before use, see example.
|
| options/nixos/services.discourse.hostname | The hostname to serve Discourse on.
|
| options/nixos/services.bookstack.hostname | The hostname to serve BookStack on.
|
| options/nixos/services.system76-scheduler.assignments.<name>.matchers | Process matchers.
|
| options/nixos/services.namecoind.rpc.password | Password for RPC connections.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.enableRecommendedPairwiseCiphers | Additionally enable the recommended set of pairwise ciphers
|
| options/nixos/security.pam.services.<name>.googleAuthenticator.enable | If set, users with enabled Google Authenticator (created
~/.google_authenticator) will be required
to provide Google Authenticator token to log in.
|
| options/nixos/services.minidlna.settings.friendly_name | Name that the server presents to clients.
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.directory | Directory to write the output to.
|
| options/nixos/security.pam.services.<name>.googleAuthenticator.allowNullOTP | Whether to allow login for accounts that have no OTP set
(i.e., accounts with no OTP configured or no existing
~/.google_authenticator).
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Disabled | This optional key is used as a hint to launchctl(1) that it should not submit this job to launchd when
loading a job or jobs
|
| options/nixos/services.akkoma.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.gancio.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.fluidd.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.fluidd.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.gancio.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.akkoma.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.matomo.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.matomo.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.monica.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.monica.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.bcg.automaticRenameKitNodes | Automatically rename kit's nodes.
|
| options/nixos/services.namecoind.generate | Whether to generate (mine) Namecoins.
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.ignore-prefixes | List of path prefixes to ignore
|
| options/nixos/systemd.network.networks.<name>.fairQueueingControlledDelayConfig | Each attribute in this set specifies an option in the
[FairQueueingControlledDelay] section of the unit
|
| options/nixos/services.grav.pool | Name of existing phpfpm pool that is used to run web-application
|
| options/nixos/services.sftpgo.group | Group name under which SFTPGo runs.
|
| options/nixos/users.mysql.pam.logging.table | The name of the table to which logs are written.
|
| options/nixos/services.sanoid.templates.<name>.pruning_script | Script to run after pruning snapshot.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Disabled | This optional key is used as a hint to launchctl(1) that it should not submit this job to launchd when
loading a job or jobs
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.clientSecretCommand | A command that prints the OAuth credentials to standard
output
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.api_server | The API server addresses
|
| options/nixos/services.archisteamfarm.bots.<name>.passwordFile | Path to a file containing the password
|
| options/home-manager/accounts.contact.accounts.<name>.pimsync.extraLocalStorageDirectives | Extra directives that should be added under this accounts local storage directive
|
| options/nixos/services.actual.settings.hostname | The address to listen on
|
| options/nixos/services.factorio.loadLatestSave | Load the latest savegame on startup
|
| options/nixos/virtualisation.credentials.<name>.source | Source file on the host containing the credential data.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.communityPlugins.*.settings | Settings to include in the plugin's data.json.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.EnableTransactions | This flag instructs launchd that the job promises to use vproc_transaction_begin(3) and
vproc_transaction_end(3) to track outstanding transactions that need to be reconciled before the
process can safely terminate
|
| options/nixos/virtualisation.fileSystems.<name>.device | The device as passed to mount
|
| options/nixos/boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.argument | An argument whose meaning depends on the type of operation
|
| options/nixos/services.firezone.server.provision.accounts.<name>.features.idp_sync | Whether to enable the idp_sync feature for this account.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.features.rest_api | Whether to enable the rest_api feature for this account.
|
| options/nixos/services.pantalaimon-headless.instances.<name>.listenPort | The port where the daemon will listen to client connections for
this homeserver
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.filter.arguments | Extra command-line arguments pass to the external filter program.
|
| options/nixos/services.gitlab.host | GitLab host name
|
| options/nixos/services.gancio.user | The user (and PostgreSQL database name) used to run the gancio server
|
| options/home-manager/programs.btop.themes | Themes to be written to $XDG_CONFIG_HOME/btop/themes/${name}.theme
|
| options/nixos/services.borgbackup.jobs.<name>.encryption.passphrase | The passphrase the backups are encrypted with
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters.*.enabled | Whether this filter is currently active.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/virtualisation.fileSystems.<name>.encrypted.enable | The block device is backed by an encrypted one, adds this device as a initrd luks entry.
|
| options/nixos/services.hddfancontrol.settings.<drive-bay-name>.pwmPaths | PWM filepath(s) to control fan speed (under /sys), followed by initial and fan-stop PWM values
Can also use command substitution to ensure the correct hwmonX is selected on every boot
|
| options/home-manager/programs.firefox.profiles.<name>.bookmarks.meta.maintainers | List of maintainers of each module
|
| options/nixos/services.cntlm.domain | Proxy account domain/workgroup name.
|
| options/home-manager/programs.borgmatic.backups.<name>.location.repositories | List of local or remote repositories with paths and optional labels.
|
| options/nixos/services.gitea.dump.file | Filename to be used for the dump
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/nixos/services.tor.relay.onionServices.<name>.settings.HiddenServiceMaxStreamsCloseCircuit | See torrc manual.
|
| options/nixos/boot.binfmt.registrations.<name>.wrapInterpreterInShell | Whether to wrap the interpreter in a shell script
|
| options/home-manager/programs.thunderbird.profiles.<name>.search.engines | Attribute set of search engine configurations
|
| options/nixos/security.wrappers.<name>.capabilities | A comma-separated list of capability clauses to be given to the
wrapper program
|
| options/nixos/services.authelia.instances.<name>.secrets.storageEncryptionKeyFile | Path to your storage encryption key.
|
| options/nixos/services.bacula-sd.autochanger.<name>.extraAutochangerConfig | Extra configuration to be passed in Autochanger directive.
|
| options/nixos/boot.loader.systemd-boot.extraEntries | Any additional entries you want added to the systemd-boot menu
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.file | Absolute path to the certificate to load
|
| options/nixos/services.kerberos_server.settings.realms.<name>.acl | The privileges granted to a user.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.collections | The collections to synchronize between the storages.
|
| options/darwin/launchd.agents.<name>.serviceConfig.inetdCompatibility.Wait | This flag corresponds to the "wait" or "nowait" option of inetd
|
| options/nixos/services.mautrix-meta.instances.<name>.environmentFile | File containing environment variables to substitute when copying the configuration
out of Nix store to the services.mautrix-meta.dataDir
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters.*.extraConfig | Extra settings to apply to the filter
|
| options/nixos/services.sanoid.templates.<name>.script_timeout | Time limit for pre/post/pruning script execution time (<=0 for infinite).
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.fcron.allow | Users allowed to use fcrontab and fcrondyn (one name per
line, all for everyone).
|
| options/home-manager/programs.borgmatic.backups.<name>.location.sourceDirectories | Directories to backup
|
| options/nixos/users.mysql.pam.updateTable | The name of the table used for password alteration
|
| options/nixos/virtualisation.credentials.<name>.text | Text content of the credential
|
| options/home-manager/accounts.contact.accounts.<name>.pimsync.extraRemoteStorageDirectives | Extra directives that should be added under this accounts remote storage directive
|
| options/nixos/services.mautrix-meta.instances.<name>.serviceDependencies | List of Systemd services to require and wait for when starting the application service.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.inetdCompatibility.Wait | This flag corresponds to the "wait" or "nowait" option of inetd
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.hashedPasswordFile | Specifies the path to a file containing the
hashed password for the MQTT user
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.ah_proposals | AH proposals to offer for the CHILD_SA
|
| options/nixos/services.authelia.instances.<name>.settings.telemetry.metrics.enabled | Enable Metrics.
|
| options/nixos/services.tarsnap.archives.<name>.aggressiveNetworking | Upload data over multiple TCP connections, potentially
increasing tarsnap's bandwidth utilisation at the cost
of slowing down all other network traffic
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.ignore-prefixes-in-home | Path prefixes to ignore under home directory
|
| options/nixos/security.pam.services.<name>.googleAuthenticator.forwardPass | The authentication provides a single field requiring
the user's password followed by the one-time password (OTP).
|
| options/nixos/virtualisation.fileSystems.<name>.options | Options used to mount the file system
|
| options/nixos/virtualisation.fileSystems.<name>.depends | List of paths that should be mounted before this one
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Disabled | This optional key is used as a hint to launchctl(1) that it should not submit this job to launchd when
loading a job or jobs
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.ppk_id | String identifying the Postquantum Preshared Key (PPK) to be used.
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.perIdentitySettings | Extra settings to add to each identity of this Thunderbird
account configuration
|
| options/nixos/users.users.<name>.initialHashedPassword | Specifies the initial hashed password for the user, i.e. the
hashed password assigned if the user does not already
exist
|
| options/nixos/services.icingaweb2.libraryPaths | Libraries to add to the Icingaweb2 library path
|
| options/nixos/services.gitlab.databaseUsername | GitLab database user.
|
| options/nixos/services.tayga.tunDevice | Name of the nat64 tun device.
|
| options/nixos/services.syncthing.settings.folders.<name>.copyOwnershipFromParent | On Unix systems, tries to copy file/folder ownership from the parent directory (the directory it’s located in)
|
| options/home-manager/services.syncthing.settings.folders.<name>.copyOwnershipFromParent | On Unix systems, tries to copy file/folder ownership from
the parent directory (the directory it’s located in)
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters.*.actionValue | Argument passed to the filter action, e.g. a folder path.
|
| options/nixos/services.pihole-web.hostName | Domain name for the website.
|
| options/nixos/boot.binfmt.registrations.<name>.matchCredentials | Whether to launch with the credentials and security
token of the binary, not the interpreter (e.g. setuid
bit)
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.connectTimeout | Timeout for establishing a new TCP connection to your origin server
|
| options/nixos/services.pgadmin.emailServer.username | SMTP server username for email delivery
|
| options/nixos/virtualisation.fileSystems.<name>.neededForBoot | If set, this file system will be mounted in the initial ramdisk
|
| options/nixos/services.oauth2-proxy.nginx.virtualHosts.<name>.allowed_emails | List of emails to allow access to this vhost, or null to allow all.
|
| options/nixos/services.oauth2-proxy.nginx.virtualHosts.<name>.allowed_groups | List of groups to allow access to this vhost, or null to allow all.
|
| options/home-manager/accounts.calendar.accounts.<name>.pimsync.extraLocalStorageDirectives | Extra directives that should be added under this accounts local storage directive
|
| options/nixos/programs.nix-required-mounts.allowedPatterns.<name>.unsafeFollowSymlinks | Whether to enable Instructs the hook to mount the symlink targets as well, when any of
the paths contain symlinks
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/nixos/services.postgresql.systemCallFilter.<name>.priority | Set the priority of the system call filter setting
|
| options/nixos/services.pantalaimon-headless.instances.<name>.listenAddress | The address where the daemon will listen to client connections
for this homeserver.
|
| options/nixos/services.gitlab-runner.services.<name>.environmentVariables | Custom environment variables injected to build environment
|
| options/darwin/services.gitlab-runner.services.<name>.environmentVariables | Custom environment variables injected to build environment
|
| options/darwin/services.github-runners | Multiple GitHub Runners
|
| options/nixos/services.cyrus-imap.user | Cyrus IMAP user name
|
| options/nixos/services.discourse.admin.username | The admin user username.
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.type | Type of this transport
|
| options/nixos/services.firezone.server.smtp.username | Username to authenticate against the SMTP relay
|
| options/nixos/services.prometheus.exporters.imap-mailstat.accounts.<name>.password | |
| options/nixos/services.mail.sendmailSetuidWrapper.program | The name of the wrapper program
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StartCalendarInterval | This optional key causes the job to be started every calendar interval as specified
|
| options/nixos/services.movim.domain | Fully-qualified domain name (FQDN) for the Movim instance.
|
| options/nixos/services.tlsrpt.reportd.settings.dbname | Path to the sqlite database.
|
| options/darwin/launchd.agents.<name>.serviceConfig.StartCalendarInterval | This optional key causes the job to be started every calendar interval as specified
|
| options/nixos/services.code-server.host | The host name or IP address the server should listen to.
|
| options/nixos/services.nats.serverName | Name of the NATS server, must be unique if clustered.
|
| options/nixos/systemd.mounts.*.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.sabnzbd.secretFiles | Path to a list of ini file containing confidential settings such as credentials
|
| options/darwin/launchd.daemons.<name>.serviceConfig.inetdCompatibility.Wait | This flag corresponds to the "wait" or "nowait" option of inetd
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.compress | Enables gzip compression of write-ahead logs, and specifies the compression level
(0 through 9, 0 being no compression and 9 being best compression)
|
| options/home-manager/accounts.email.accounts.<name>.aerc.imapOauth2Params.token_endpoint | The OAuth2 token endpoint.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.smtpOauth2Params.token_endpoint | The OAuth2 token endpoint.
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.host | Host for the api or remote transport
|
| options/home-manager/programs.borgmatic.backups.<name>.consistency.checks.*.frequency | Frequency of this type of check
|
| options/nixos/services.hddfancontrol.settings.<drive-bay-name>.logVerbosity | Verbosity of the log level
|
| options/nixos/services.authelia.instances.<name>.settings.telemetry.metrics.address | The address to listen on for metrics
|
| options/nixos/services.avahi.domainName | Domain name for all advertisements.
|
| options/nixos/services.patroni.scope | Cluster name.
|
| options/nixos/services.tailscale.serve.services | Services to configure for Tailscale Serve
|
| options/nixos/virtualisation.fileSystems.<name>.overlay.upperdir | The path to the upperdir
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.path | Path to the socket for local or remote transports
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.port | Port to connect to for the api or remote transport
|
| options/nixos/users.users.<name>.hashedPasswordFile | The full path to a file that contains the hash of the user's
password
|
| options/nixos/services.avahi.hostName | Host name advertised on the LAN
|
| options/nixos/services.nscd.config | Configuration to use for Name Service Cache Daemon
|
| options/nixos/services.murmur.user | The name of an existing user to use to run the service
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.dnsdist.dnscrypt.providerName | The name that will be given to this DNSCrypt resolver.
The provider name must start with 2.dnscrypt-cert..
|
| options/nixos/services.dolibarr.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.agorakit.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.librenms.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.kanboard.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.fediwall.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.librenms.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.kanboard.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.fediwall.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.agorakit.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.mainsail.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.mainsail.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/virtualisation.fileSystems.<name>.overlay.lowerdir | The list of path(s) to the lowerdir(s)
|
| options/nixos/services.wstunnel.clients.<name>.upgradeCredentials | Use these credentials to authenticate during the HTTP upgrade request
(Basic authorization type, USER:[PASS]).
Passwords specified here will be world-readable in the Nix store!
To pass a password to the service, point the environmentFile option
to a file containing HTTP_PASSWORD=<your-password-here> and set this
option to <user>:$HTTP_PASSWORD
|
| options/nixos/containers.<name>.allowedDevices.*.modifier | Device node access modifier
|
| options/nixos/services.monica.mail.fromName | Mail "from" name.
|
| options/home-manager/accounts.calendar.accounts.<name>.pimsync.extraRemoteStorageDirectives | Extra directives that should be added under this accounts remote storage directive
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.handle | Hex-encoded CKA_ID or handle of the certificate on a token or TPM,
respectively
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.dscp | Differentiated Services Field Codepoint to set on outgoing IKE packets for
this connection
|
| options/nixos/services.pantalaimon-headless.instances.<name>.extraSettings | Extra configuration options
|
| options/nixos/services.icingaweb2.modules.monitoring.backends.<name>.disabled | Disable this backend
|
| options/nixos/programs.tsmClient.servers | Server definitions ("stanzas")
for the client system-options file
|
| options/nixos/systemd.network.networks.<name>.stochasticFairnessQueueingConfig | Each attribute in this set specifies an option in the
[StochasticFairnessQueueing] section of the unit
|
| options/nixos/services.syncplay.maxUsernameLength | Maximum number of characters in a username.
|
| options/nixos/security.pam.services.<name>.googleOsLoginAccountVerification | If set, will use the Google OS Login PAM modules
(pam_oslogin_login,
pam_oslogin_admin) to verify possible OS Login
users and set sudoers configuration accordingly
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.enableLocalhostRedirects | Allow localhost redirects
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.allowInsecureClientDisablePkce | Disable PKCE on this oauth2 resource server to work around insecure clients
that may not support it
|
| options/nixos/services.tor.torsocks.socks5Username | SOCKS5 username
|
| options/nixos/services.icecream.daemon.hostname | Hostname of the daemon in the icecream infrastructure
|
| options/nixos/services.zoneminder.hostname | The hostname on which to listen.
|
| options/nixos/virtualisation.sharedDirectories.<name>.target | The mount point of the directory inside the virtual machine
|
| options/nixos/virtualisation.sharedDirectories.<name>.source | The path of the directory to share, can be a shell variable
|
| options/nixos/services.prometheus.exporters.imap-mailstat.accounts.<name>.starttls | set to true for using STARTTLS to start a TLS connection
|
| options/nixos/security.pam.services.<name>.googleOsLoginAuthentication | If set, will use the pam_oslogin_login's user
authentication methods to authenticate users using 2FA
|
| options/nixos/users.extraUsers.<name>.initialHashedPassword | Specifies the initial hashed password for the user, i.e. the
hashed password assigned if the user does not already
exist
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.onlyoffice.hostname | FQDN for the OnlyOffice instance.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.verifyFingerprint | Optional
|
| options/darwin/launchd.daemons.<name>.serviceConfig.StartCalendarInterval | This optional key causes the job to be started every calendar interval as specified
|
| options/home-manager/programs.borgmatic.backups.<name>.location.excludeHomeManagerSymlinks | Whether to exclude Home Manager generated symbolic links from
the backups
|
| options/nixos/services.freshrss.webserver | Whether to use nginx or caddy for virtual host management
|
| options/nixos/services.dokuwiki.webserver | Whether to use nginx or caddy for virtual host management
|
| options/nixos/services.parsedmarc.provision.localMail.recipientName | The DMARC mail recipient name, i.e. the name part of the
email address which receives DMARC reports
|
| options/home-manager/programs.thunderbird.profiles.<name>.search.meta.maintainers | List of maintainers of each module
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters.*.condition | Condition to match messages against.
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths | API tokens to provision for the user in this organization.
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.exactPermissions | When enabled,
programs.floorp.profiles.<profile>.extensions.settings.<extensionID>.permissions
must specify the exact set of permissions that the
extension will request
|
| options/darwin/services.gitlab-runner.services.<name>.registrationConfigFile | Absolute path to a file with environment variables
used for gitlab-runner registration
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.cacert | The certificates may use a relative path from the swanctl
x509ca directory or an absolute path
|
| options/nixos/services.samba-wsdd.domain | Set domain name (disables workgroup).
|
| options/home-manager/programs.librewolf.profiles.<name>.bookmarks.meta.maintainers | List of maintainers of each module
|
| options/nixos/_module.args | Additional arguments passed to each module in addition to ones
like lib, config,
and pkgs, modulesPath
|
| options/darwin/_module.args | Additional arguments passed to each module in addition to ones
like lib, config,
and pkgs, modulesPath
|
| options/home-manager/_module.args | Additional arguments passed to each module in addition to ones
like lib, config,
and pkgs, modulesPath
|
| options/nixos/services.vault.address | The name of the ip interface to listen to
|
| options/nixos/services.syncthing.settings.folders.<name>.ignorePatterns | Syncthing can be configured to ignore certain files in a folder using ignore patterns
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.tmate-ssh-server.host | External host name
|
| options/nixos/services.vikunja.frontendHostname | The Hostname under which the frontend is running.
|
| options/nixos/services.hqplayerd.auth.username | Username used for HQPlayer's WebUI
|
| options/nixos/services.simplesamlphp.<name>.settings.baseurlpath | URL where SimpleSAMLphp can be reached.
|
| options/nixos/services.kerberos_server.settings.realms.<name>.acl.*.target | The principals that 'access' applies to.
|
| options/nixos/services.hadoop.hdfs.namenode.openFirewall | Open firewall ports for HDFS NameNode.
|
| options/home-manager/programs.hexchat.channels.<name>.options.acceptInvalidSSLCertificates | Accept invalid SSL certificates.
|
| options/nixos/services.weblate.smtp.user | SMTP login name.
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.file_extension | Extension to include in local file names, which can be useful
for indexing with third-party programs.
|
| options/nixos/services.skydns.nameservers | Skydns list of nameservers to forward DNS requests to when not authoritative for a domain.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.cmd | Commandline arguments to pass to the image's entrypoint.
|
| options/nixos/services.cyrus-imap.group | Cyrus IMAP group name
|
| options/nixos/services.cassandra.jmxRoles.*.username | Username for JMX
|
| options/nixos/services.elasticsearch.cluster_name | Elasticsearch name that identifies your cluster for auto-discovery.
|
| options/nixos/services.bookstack.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.bookstack.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.maubot.settings.server.hostname | The IP to listen on
|
| options/nixos/services.cloudflared.tunnels.<name>.certificateFile | Account certificate file, necessary to create, delete and manage tunnels
|
| options/nixos/security.ipa.shells | List of shells which binaries should be installed to /bin/
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/home-manager/programs.sapling.userName | Default user name to use.
|
| options/nixos/networking.networkmanager.appendNameservers | A list of name servers that should be appended
to the ones configured in NetworkManager or received by DHCP.
|
| options/nixos/networking.networkmanager.insertNameservers | A list of name servers that should be inserted before
the ones configured in NetworkManager or received by DHCP.
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.crl_uris | List of CRL distribution points (ldap, http, or file URI)
|
| options/nixos/services.kismet.serverName | The name of the server.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.pull | If the default of yes is used, Mode Config works in pull mode, where the
initiator actively requests a virtual IP
|
| options/nixos/services.keter.bundle.appName | The name keter assigns to this bundle
|
| options/nixos/services.guix.publish.user | Name of the user to change once the server is up.
|
| options/nixos/virtualisation.credentials.<name>.mechanism | The mechanism used to pass the credential to the VM.
|
| options/nixos/users.users.<name>.initialPassword | Specifies the initial password for the user, i.e. the
password assigned if the user does not already exist
|
| options/nixos/containers.<name>.ephemeral | Runs container in ephemeral mode with the empty root filesystem at boot
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.exactPermissions | When enabled,
programs.firefox.profiles.<profile>.extensions.settings.<extensionID>.permissions
must specify the exact set of permissions that the
extension will request
|
| options/nixos/services.murmur.group | The name of an existing group to use to run the service
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.verifyFingerprint | Optional
|
| options/nixos/boot.zfs.forceImportAll | Forcibly import all ZFS pool(s)
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.conflictResolution | What to do in case of a conflict between the storages
|
| options/nixos/services.tt-rss.email.fromName | Name for sending outgoing mail
|
| options/nixos/virtualisation.oci-containers.containers.<name>.image | OCI image to run.
|
| options/nixos/users.extraUsers.<name>.hashedPasswordFile | The full path to a file that contains the hash of the user's
password
|
| options/nixos/services.gdomap.enable | Whether to enable GNUstep Distributed Objects name server.
|
| options/nixos/services.tor.client.onionServices.<name>.clientAuthorizations | Clients' authorizations for a v3 onion service,
as a list of files containing each one private key, in the format:
descriptor:x25519:<base32-private-key>
See torrc manual.
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.split_exclude | Address or CIDR subnets
StrongSwan default: []
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.split_include | Address or CIDR subnets
StrongSwan default: []
|
| options/nixos/virtualisation.oci-containers.containers.<name>.user | Override the username or UID (and optionally groupname or GID) used
in the container.
|
| options/nixos/services.castopod.database.hostname | Database hostname.
|
| options/home-manager/programs.termite.iconName | The name of the icon to be used for the terminal process.
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.slot | Require pg_receivewal to use an existing replication slot (see
Section 26.2.6 of the PostgreSQL manual)
|
| options/nixos/services.biboumi.settings.hostname | The hostname served by the XMPP gateway
|
| options/nixos/services.baikal.pool | Name of existing phpfpm pool that is used to run web-application
|
| options/home-manager/programs.oh-my-posh.useTheme | Use one of the official themes
|
| options/nixos/services.librenms.user | Name of the LibreNMS user.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.bacula-fd.tls.verifyPeer | Verify peer certificate
|
| options/nixos/services.bacula-sd.tls.verifyPeer | Verify peer certificate
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.ocsp_uris | List of OCSP URIs
|
| options/home-manager/programs.borgmatic.backups.<name>.storage.encryptionPasscommand | Command writing the passphrase to standard output.
|
| options/nixos/services.influxdb2.provision.organizations.<name>.buckets | Buckets to provision in this organization.
|
| options/nixos/virtualisation.fileSystems.<name>.encrypted.keyFile | Path to a keyfile used to unlock the backing encrypted
device
|
| options/nixos/services.pantalaimon-headless.instances.<name>.homeserver | The URI of the homeserver that the pantalaimon proxy should
forward requests to, without the matrix API path but including
the http(s) schema.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.pull | Image pull policy for the container
|
| options/nixos/services.microsocks.authUsername | Optional username to use for authentication.
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.statusInterval | Specifies the number of seconds between status packets sent back to the server
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.environment | Environment variables passed to the service
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.encap | To enforce UDP encapsulation of ESP packets, the IKE daemon can fake the
NAT detection payloads
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.disableChunkedEncoding | Disables chunked transfer encoding
|
| options/nixos/services.bacula-dir.tls.verifyPeer | Verify peer certificate
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.postgresqlPackage | The postgresql package to use.
|
| options/home-manager/i18n.inputMethod.fcitx5.themes | Themes to be written to $XDG_DATA_HOME/fcitx5/themes/${name}
|
| options/nixos/services.mautrix-meta.instances.<name>.registrationServiceUnit | The registration service that generates the registration file
|
| options/nixos/services.influxdb2.provision.organizations.<name>.present | Whether to ensure that this organization is present or absent.
|
| options/nixos/services.kubernetes.proxy.hostname | Kubernetes proxy hostname override.
|
| options/nixos/services.peertube-runner.instancesToRegister.<name>.runnerDescription | Runner description declared to the PeerTube instance.
|
| options/nixos/containers.<name>.privateUsers | Whether to give the container its own private UIDs/GIDs space (user namespacing)
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local | Section for a local authentication round
|
| options/nixos/virtualisation.oci-containers.containers.<name>.podman.user | The user under which the container should run.
|
| options/nixos/services.outline.smtp.host | Host name or IP address of the SMTP server.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.supplementaryScopeMaps | Maps kanidm groups to additionally returned oauth scopes
|
| options/nixos/services.limesurvey.nginx.virtualHost.serverName | Name of this virtual host
|
| options/nixos/virtualisation.oci-containers.containers.<name>.labels | Labels to attach to the container at runtime.
|
| options/nixos/services.wordpress.webserver | Whether to use apache2 or nginx for virtual host management
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.version | IKE major version to use for connection.
- 1 uses IKEv1 aka ISAKMP,
- 2 uses IKEv2.
- A connection using the default of 0 accepts both IKEv1 and IKEv2 as
responder, and initiates the connection actively with IKEv2
|
| options/nixos/services.dovecot2.user | Dovecot user name.
|
| options/nixos/services.hadoop.hdfs.namenode.formatOnInit | Format HDFS namenode on first start
|
| options/nixos/services.prometheus.exporters.sql.configuration.jobs.<name>.queries | SQL queries to run.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.conflictResolution | What to do in case of a conflict between the storages
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.local_trash_tag | Local tag to which the remote Gmail 'TRASH' label is translated.
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.password | Password for the api transport
|
| options/nixos/services.rspamd.locals | Local configuration files, written into /etc/rspamd/local.d/{name}.
|
| options/nixos/services.bcg.automaticRenameGenericNodes | Automatically rename generic nodes.
|
| options/nixos/services.davfs2.davUser | When invoked by root the mount.davfs daemon will run as this user
|
| options/nixos/services.tt-rss.virtualHost | Name of the nginx virtualhost to use and setup
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.instance | Assign a icinga instance to this transport
|
| options/nixos/services.epmd.enable | Whether to enable socket activation for Erlang Port Mapper Daemon (epmd),
which acts as a name server on all hosts involved in distributed
Erlang computations.
|
| options/nixos/services.prometheus.exporters.imap-mailstat.accounts.<name>.serverport | imap port number (at the moment only tls connection is supported)
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.resource | SSH identity resource for the remote transport
|
| options/nixos/services.deye-dummycloud.mqttUsername | MQTT username
|
| options/nixos/users.mysql.pam.logging.msgColumn | The name of the column in the log table to which the description
of the performed operation is stored.
|
| options/nixos/services.authelia.instances.<name>.environmentVariables | Additional environment variables to provide to authelia
|
| options/nixos/services.prometheus.remoteRead.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/home-manager/programs.rofi.theme | Name of theme or path to theme file in rasi format or attribute set with
theme configuration
|
| options/nixos/boot.initrd.luks.devices | The encrypted disk that should be opened before the root
filesystem is mounted
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.keepAliveConnections | Maximum number of idle keepalive connections between Tunnel and your origin
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote | Section for a remote authentication round
|
| options/nixos/services.vmagent.remoteWrite.basicAuthUsername | Basic Auth username used to connect to remote_write endpoint
|
| options/nixos/services.vlagent.remoteWrite.basicAuthUsername | Basic Auth username used to connect to remote_write endpoint
|
| options/nixos/services.prometheus.exporters.sql.configuration.jobs.<name>.startupSql | A list of SQL statements to execute once after making a connection.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.podman | Podman-specific settings in OCI containers
|
| options/nixos/services.grav.virtualHost | Name of the nginx virtualhost to use and setup
|
| options/nixos/services.tor.relay.onionServices.<name>.settings.HiddenServiceNumIntroductionPoints | See torrc manual.
|
| options/nixos/services.forgejo.dump.file | Filename to be used for the dump
|
| options/nixos/users.extraUsers.<name>.initialPassword | Specifies the initial password for the user, i.e. the
password assigned if the user does not already exist
|
| options/nixos/virtualisation.oci-containers.containers.<name>.devices | List of devices to attach to this container.
|
| options/nixos/networking.networkmanager.ensureProfiles.secrets.entries.*.matchIface | interface name of the NetworkManager connection
|
| options/nixos/services.librenms.group | Name of the LibreNMS group.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.workdir | Override the default working directory for the container.
|
| options/nixos/console.font | The font used for the virtual consoles
|
| options/nixos/services.btrbk.instances.<name>.settings.stream_compress | Compress the btrfs send stream before transferring it from/to remote locations using a
compression command.
|
| options/nixos/services.prometheus.remoteWrite.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.ghostunnel.servers.<name>.disableAuthentication | Disable client authentication, no client certificate will be required.
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners | List of ports that this worker should listen on, their purpose and their configuration.
|
| options/nixos/xdg.portal.config | Sets which portal backend should be used to provide the implementation
for the requested interface
|
| options/home-manager/xdg.portal.config | Sets which portal backend should be used to provide the implementation
for the requested interface
|
| options/nixos/virtualisation.oci-containers.containers.<name>.autoStart | When enabled, the container is automatically started on boot
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.exactPermissions | When enabled,
programs.librewolf.profiles.<profile>.extensions.settings.<extensionID>.permissions
must specify the exact set of permissions that the
extension will request
|
| options/nixos/services.wiki-js.settings.db.db | Name of the database to use.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.mediation | Whether this connection is a mediation connection, that is, whether this
connection is used to mediate other connections using the IKEv2 Mediation
Extension
|
| options/nixos/networking.networkmanager.ensureProfiles.secrets.entries.*.matchId | connection id used by NetworkManager
|
| options/nixos/services.dnsdist.enable | Whether to enable dnsdist domain name server.
|
| options/nixos/services.slurm.controlAddr | Name that ControlMachine should be referred to in establishing a
communications path.
|
| options/nixos/services.unbound.enable | Whether to enable Unbound domain name server.
|
| options/nixos/services.rss-bridge.pool | Name of phpfpm pool that is used to run web-application
|
| options/nixos/services.easytier.instances.<name>.settings.network_secret | EasyTier network credential used for verification and
encryption
|
| options/nixos/services.vsmartcard-vpcd.hostname | Hostname of a waiting vpicc server vpcd will be connecting to
|
| options/nixos/users.mysql.pam.passwordColumn | The name of the column that contains a (encrypted) password string.
|
| options/nixos/boot.iscsi-initiator.target | Name of the iSCSI target to boot from.
|
| options/nixos/services.kerberos_server.settings.realms.<name>.acl.*.principal | Which principal the rule applies to
|
| options/nixos/specialisation.<name>.inheritParentConfig | Include the entire system's configuration
|
| options/nixos/services.ncdns.identity.hostname | The hostname of this ncdns instance, which defaults to the machine
hostname
|
| options/nixos/users.mysql.pam.logging.timeColumn | The name of the column in the log table to which the timestamp of the
log entry is stored.
|
| options/nixos/services.ircdHybrid.serverName | IRCD server name.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.mobike | Enables MOBIKE on IKEv2 connections
|
| options/nixos/services.dawarich.smtp.user | SMTP login name.
|
| options/nixos/services.mastodon.smtp.user | SMTP login name.
|
| options/nixos/services.prometheus.exporters.sql.configuration.jobs.<name>.interval | How often to run this job, specified in
Go duration format.
|
| options/nixos/services.kerberos_server.settings.realms.<name>.acl.*.access | The changes the principal is allowed to make.
The "all" permission does not imply the "get-keys" permission
|
| options/nixos/services.dovecot2.group | Dovecot group name.
|
| options/nixos/services.k3s.autoDeployCharts | Auto deploying Helm charts that are installed by the k3s Helm controller
|
| options/nixos/services.keycloak.settings.hostname | The hostname part of the public URL used as base for
all frontend requests
|
| options/nixos/virtualisation.oci-containers.containers.<name>.autoRemoveOnStop | Automatically remove the container when it is stopped or killed
|
| options/nixos/services.discourse.database.username | Discourse database user.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.networks | Networks to attach the container to
|
| options/nixos/users.mysql.pam.logging.pidColumn | The name of the column in the log table to which the pid of the
process utilising the pam_mysql authentication
service is stored.
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.type | The type of the listener, usually http.
|
| options/nixos/services.nextjs-ollama-llm-ui.hostname | The hostname under which the Ollama UI interface should be accessible
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.mode | File permissions on the UNIX domain socket.
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.port | The port to listen for HTTP(S) requests on.
|
| options/nixos/services.prosody.muc.*.domain | Domain name of the MUC
|
| options/nixos/services.matrix-continuwuity.settings.global.server_name | The server_name is the name of this server
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.esp_proposals | ESP proposals to offer for the CHILD_SA
|
| options/nixos/services.pretix.nginx.domain | The domain name under which to set up the virtual host.
|
| options/nixos/services.mjpg-streamer.user | mjpg-streamer user name.
|
| options/nixos/services.selfoss.pool | Name of existing phpfpm pool that is used to run web-application
|
| options/nixos/systemd.network.networks.<name>.enhancedTransmissionSelectionConfig | Each attribute in this set specifies an option in the
[EnhancedTransmissionSelection] section of the unit
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.dpd_delay | Interval to check the liveness of a peer actively using IKEv2
INFORMATIONAL exchanges or IKEv1 R_U_THERE messages
|
| options/nixos/virtualisation.oci-containers.containers.<name>.login.registry | Registry where to login to.
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.synchronous | Flush the WAL data to disk immediately after it has been received
|
| options/nixos/services.rshim.index | Specify the index to create device path /dev/rshim<index>
|
| options/nixos/services.flannel.iface | Interface to use (IP or name) for inter-host communication
|
| options/home-manager/programs.vicinae.extensions | List of Vicinae extensions to install
|
| options/nixos/virtualisation.oci-containers.containers.<name>.extraOptions | Extra options for podman run.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.rand_time | Time range from which to choose a random value to subtract from
rekey/reauth times
|
| options/nixos/services.nscd.enable | Whether to enable the Name Service Cache Daemon
|
| options/nixos/containers.<name>.networkNamespace | Takes the path to a file representing a kernel network namespace that the container
shall run in
|
| options/nixos/services.discourse.mail.outgoing.username | The username of the SMTP server.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.if_id_in | XFRM interface ID set on inbound policies/SA, can be overridden by child
config, see there for details
|
| options/nixos/hardware.nvidia-container-toolkit.enable-hooks | List of hooks to enable when generating the CDI specification
|
| options/nixos/services.grafana.settings.security.data_source_proxy_whitelist | Define a whitelist of allowed IP addresses or domains, with ports,
to be used in data source URLs with the Grafana data source proxy
|
| options/nixos/services.asusd.auraConfigs | The content of /etc/asusd/aura_.ron
|
| options/nixos/networking.networkmanager.ensureProfiles.secrets.entries.*.matchSetting | name of the setting section for which secrets are requested
|
| options/home-manager/programs.kitty.themeFile | Apply a Kitty color theme
|
| options/nixos/services.peertube-runner.instancesToRegister.<name>.registrationTokenFile | Path to a file containing a registration token for the PeerTube instance
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.exhaustivePermissions | When enabled, the user must authorize requested
permissions for all extensions from
programs.floorp.profiles.<profile>.extensions.packages
in
programs.floorp.profiles.<profile>.extensions.settings.<extensionID>.permissions
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.tls | Whether to enable TLS on the listener socket.
This option will be ignored for UNIX domain sockets.
|
| options/nixos/services.prometheus.exporters.ebpf.names | List of eBPF programs to load
|
| options/nixos/services.resilio.deviceName | Name of the Resilio Sync device.
|
| options/nixos/services.lasuite-docs.domain | Domain name of the docs instance.
|
| options/nixos/services.lasuite-meet.domain | Domain name of the meet instance.
|
| options/home-manager/programs.yazi.shellWrapperName | Name of the shell wrapper to be called.
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.filters.*.name | Name of the filter
|
| options/nixos/programs.zsh.enable | Whether to configure zsh as an interactive shell
|
| options/nixos/services.kubernetes.kubelet.hostname | Kubernetes kubelet hostname override.
|
| options/nixos/services.spiped.config | Configuration for a secure pipe daemon
|
| options/nixos/services.tsmBackup.servername | Create a systemd system service
tsm-backup.service that starts
a backup based on the given servername's stanza
|
| options/nixos/services.zfs.autoReplication.username | Username used by SSH to login to remote host.
|
| options/nixos/services.calibre-web.dataDir | Where Calibre-Web stores its data
|
| options/nixos/services.nixops-dns.domain | Fake domain name to resolve to NixOps virtual machines
|
| options/nixos/services.dependency-track.oidc.teams.claim | Defines the name of the claim that contains group memberships or role assignments in the provider's userinfo endpoint
|
| options/nixos/services.prometheus.scrapeConfigs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.jicofo.xmppDomain | Domain name of the XMMP server to which to connect as a component
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.login | Grants the user, created by the ensureUser attr, login permissions
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.serverName | Name of this virtual host
|
| options/nixos/services.sympa.web.server | The webserver used for the Sympa web interface
|
| options/nixos/security.tpm2.fapi.profileName | Name of the default cryptographic profile chosen from the profile_dir directory.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.send_cert | Send certificate payloads when using certificate authentication.
- With the default of
ifasked the daemon sends
certificate payloads only if certificate requests have been received.
never disables sending of certificate payloads
altogether,
always causes certificate payloads to be sent
unconditionally whenever certificate authentication is used
|
| options/nixos/services.strongswan-swanctl.swanctl.pools | Section defining named pools
|
| options/nixos/services.saunafs.masterHost | IP or hostname name of master host.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.login.passwordFile | Path to file containing password.
|
| options/nixos/services.dolibarr.domain | Domain name of your server.
|
| options/nixos/boot.kernelPatches | A list of additional patches to apply to the kernel
|
| options/nixos/services.agorakit.mail.fromName | Mail "from" name.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.preRunExtraOptions | Extra options for podman that go before the run argument.
|
| options/nixos/services.nixops-dns.enable | Whether to enable the nixops-dns resolution
of NixOps virtual machines via dnsmasq and fake domain name.
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.exhaustivePermissions | When enabled, the user must authorize requested
permissions for all extensions from
programs.firefox.profiles.<profile>.extensions.packages
in
programs.firefox.profiles.<profile>.extensions.settings.<extensionID>.permissions
|
| options/nixos/services.jigasi.xmppDomain | Domain name of the XMMP server to which to connect as a component
|
| options/nixos/services.namecoind.rpc.certificate | Certificate file for securing RPC connections.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.if_id_out | XFRM interface ID set on outbound policies/SA, can be overridden by child
config, see there for details
|
| options/nixos/services.moosefs.masterHost | IP or DNS name of the MooseFS master server.
|
| options/nixos/services.mjpg-streamer.group | mjpg-streamer group name.
|
| options/home-manager/services.cachix-agent.profile | The Nix profile name.
|
| options/nixos/services.openafsClient.cellName | Cell name.
|
| options/nixos/services.ceph.global.clusterName | Name of cluster
|
| options/nixos/hardware.nvidia-container-toolkit.disable-hooks | List of hooks to disable when generating the CDI specification
|
| options/nixos/services.keycloak.database.username | Username to use when connecting to an external or manually
provisioned database; has no effect when a local database is
automatically provisioned
|
| options/nixos/services.freshrss.pool | Name of the php-fpm pool to use and setup
|
| options/nixos/services.mongodb.replSetName | If this instance is part of a replica set, set its name here
|
| options/nixos/services.rke2.autoDeployCharts | Auto deploying Helm charts that are installed by the rke2 Helm controller
|
| options/nixos/services.tor.settings.ServerDNSAllowNonRFC953Hostnames | See torrc manual.
|
| options/nixos/virtualisation.fileSystems.<name>.overlay.useStage1BaseDirectories | If enabled, lowerdir, upperdir and workdir will be prefixed with /sysroot
|
| options/nixos/services.znc.confOptions.userName | The user name used to log in to the ZNC web admin interface.
|
| options/home-manager/programs.yazi.plugins | Lua plugins
|
| options/nixos/services.varnish.listen.*.user | User name who owns the socket file.
|
| options/nixos/services.filesender.database.hostname | Database hostname.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.password_command | Shell command which will print a password to stdout for basic HTTP
authentication
|
| options/nixos/services.echoip.enableReverseHostnameLookups | Whether to enable reverse hostname lookups.
|
| options/nixos/services.jupyter.group | Name of the group used to run the jupyter service
|
| options/nixos/services.rshim.backend | Specify the backend to attach
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.path | Unix domain socket path to bind this listener to.
|
| options/nixos/services.borgmatic.configurations.<name>.repositories.*.path | Path to the repository
|
| options/nixos/services.gammu-smsd.backend.sql.user | User name used for connection to the database
|
| options/nixos/virtualisation.oci-containers.containers.<name>.log-driver | Logging driver for the container
|
| options/nixos/services.zoneminder.database.username | Username for accessing the database.
|
| options/home-manager/services.xcape.mapExpression | The value has the grammar Key[|OtherKey]
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.aggressive | Enables Aggressive Mode instead of Main Mode with Identity
Protection
|
| options/nixos/virtualisation.oci-containers.containers.<name>.volumes | List of volumes to attach to this container
|
| options/nixos/services.dovecot2.imapsieve.mailbox.*.from | Only execute the administrator Sieve scripts for the mailbox configured with services.dovecot2.imapsieve.mailbox..name when the message originates from the indicated mailbox
|
| options/home-manager/programs.yazi.flavors | Pre-made themes
|
| options/nixos/services.dovecot2.imapsieve.mailbox.*.causes | Only execute the administrator Sieve scripts for the mailbox configured with services.dovecot2.imapsieve.mailbox..name when one of the listed IMAPSIEVE causes apply
|
| options/nixos/services.baikal.virtualHost | Name of the nginx virtualhost to use and setup
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote_port | Remote UDP port for IKE communication
|
| options/nixos/virtualisation.oci-containers.containers.<name>.privileged | Give extended privileges to the container
|
| options/nixos/virtualisation.oci-containers.containers.<name>.entrypoint | Override the default entrypoint of the image.
|
| options/home-manager/programs.claude-code.hooks | Custom hooks for Claude Code
|
| options/nixos/services.powerdns.enable | Whether to enable PowerDNS domain name server.
|
| options/home-manager/services.wlsunset.output | Name of output to use, by default all outputs are used.
|
| options/nixos/services.pretalx.nginx.domain | The domain name under which to set up the virtual host.
|
| options/home-manager/programs.offlineimap.extraConfig.mbnames | Extra configuration options added to the
mbnames section.
|
| options/nixos/services.cachix-agent.profile | Profile name, defaults to 'system' (NixOS).
|
| options/nixos/services.weblate.localDomain | The domain name serving your Weblate instance.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.ppk_required | Whether a Postquantum Preshared Key (PPK) is required for this connection
|
| options/nixos/systemd.automounts.*.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.over_time | Hard IKE_SA lifetime if rekey/reauth does not complete, as time
|
| options/nixos/services.influxdb2.provision.organizations.<name>.description | Optional description for the organization.
|
| options/nixos/services.borgmatic.configurations.<name>.repositories.*.label | Label to the repository
|
| options/nixos/services.dawarich.user | User under which dawarich runs
|
| options/nixos/services.samba.nmbd.enable | Whether to enable Samba's nmbd, which replies to NetBIOS over IP name
service requests
|
| options/home-manager/programs.sbt.repositories | A list of repositories to use when resolving dependencies
|
| options/nixos/services.jupyter.user | Name of the user used to run the jupyter service
|
| options/nixos/containers | A set of NixOS system configurations to be run as lightweight
containers
|
| options/nixos/services.postfix.settings.main.myhostname | The internet hostname of this mail system
|
| options/nixos/services.echoip.virtualHost | Name of the nginx virtual host to use and setup
|
| options/nixos/services.mjolnir.pantalaimon.username | The username to login with.
|
| options/nixos/services.sympa.database.user | Database user
|
| options/nixos/services.teeworlds.game.tournamentMode | Whether to enable tournament mode
|
| options/nixos/services.bitlbee.hostName | Normally, BitlBee gets a hostname using getsockname()
|
| options/nixos/services.openafsServer.cellName | Cell name, this server will serve.
|
| options/nixos/services.cachix-watch-store.cacheName | Cachix binary cache name
|
| options/nixos/services.smokeping.owner | Real name of the owner of the instance
|
| options/nixos/services.weechat.sessionName | Name of the screen session for weechat.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local_port | Local UDP port for IKE communication
|
| options/nixos/services.gitlab.databaseName | GitLab database name.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.dpd_timeout | Charon by default uses the normal retransmission mechanism and timeouts to
check the liveness of a peer, as all messages are used for liveness
checking
|
| options/nixos/services.suricata.settings.unix-command.filename | Filename for unix-command socket.
|
| options/nixos/services.opendkim.keyPath | The path that opendkim should put its generated private keys into
|
| options/nixos/services.prometheus.exporters.sql.configuration.jobs.<name>.connections | A list of connection strings of the SQL servers to scrape metrics from
|
| options/nixos/services.davfs2.davGroup | The group of the running mount.davfs daemon
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.exhaustivePermissions | When enabled, the user must authorize requested
permissions for all extensions from
programs.librewolf.profiles.<profile>.extensions.packages
in
programs.librewolf.profiles.<profile>.extensions.settings.<extensionID>.permissions
|
| options/nixos/boot.initrd.secrets | Secrets to append to the initrd
|
| options/nixos/containers.<name>.additionalCapabilities | Grant additional capabilities to the container
|
| options/nixos/services.paperless.passwordFile | A file containing the superuser password
|
| options/nixos/services.varnish.listen.*.group | Group name who owns the socket file.
|
| options/nixos/services.wakapi.database.user | The name of the user to use for Wakapi.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.rekey_time | IKE rekeying refreshes key material using a Diffie-Hellman exchange, but
does not re-check associated credentials
|
| options/nixos/services.alerta.databaseName | Name of the database instance to connect to
|
| options/home-manager/programs.mercurial.userName | Default user name to use.
|
| options/nixos/services.tlsrpt.reportd.settings.organization_name | Name of the organization sending out the reports.
|
| options/nixos/services.reposilite.settings.hostname | The hostname to bind to
|
| options/nixos/hardware.display.edid.linuxhw | Exposes EDID files from users-sourced database at https://github.com/linuxhw/EDID
Attribute names will be mapped to EDID filenames <NAME>.bin
|
| options/nixos/services.xserver.displayManager.lightdm.greeter.package | The LightDM greeter to login via
|
| options/nixos/services.hadoop.hdfs.namenode.restartIfChanged | Automatically restart the service on config change
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.keyingtries | Number of retransmission sequences to perform during initial
connect
|
| options/home-manager/programs.lutris.runners.<name>.settings.runner.runner_executable | Specific option to point to a runner executable directly, don't set runner.package if you set this
|
| options/nixos/services.avahi.publish.domain | Whether to announce the locally used domain name for browsing by other hosts.
|
| options/nixos/services.rss-bridge.virtualHost | Name of the nginx or caddy virtualhost to use and setup
|
| options/nixos/services.netatalk.extmap | File name extension mappings
|
| options/nixos/services.pgpkeyserver-lite.hostname | Which hostname to set the vHost to that is proxying to sks.
|
| options/nixos/programs.regreet.font.package | The package that provides the font given in the name option.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.environment | Environment variables to set for this container.
|
| options/nixos/services.gitlab.registry.host | GitLab container registry host name.
|
| options/nixos/services.bird-lg.frontend.domain | Server name domain suffixes.
|
| options/nixos/services.smokeping.hostName | DNS name for the urls generated in the cgi.
|
| options/nixos/services.dendrite.settings.global.trusted_third_party_id_servers | Lists of domains that the server will trust as identity
servers to verify third party identifiers such as phone
numbers and email addresses
|
| options/nixos/services.ddclient.domains | Domain name(s) to synchronize.
|
| options/nixos/services.nullmailer.config.defaulthost | The content of this attribute is appended to any address that
is missing a host name
|
| options/nixos/services.grafana.settings.database.server_cert_name | The common name field of the certificate used by the mysql or postgres server
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.resources | List of HTTP resources to serve on this listener.
|
| options/nixos/services.misskey.settings.db.db | The database name.
|
| options/home-manager/services.gromit-mpx.tools.*.device | Use this tool with the given xinput device
|
| options/nixos/services.smokeping.user | User that runs smokeping and (optionally) thttpd
|
| options/nixos/virtualisation.oci-containers.containers.<name>.podman.sdnotify | Determines how podman should notify systemd that the unit is ready
|
| options/home-manager/programs.radio-active.aliases | Key/value pairs where the key is name of radio station and value is URL.
|
| options/nixos/services.shellhub-agent.preferredHostname | Set the device preferred hostname
|
| options/darwin/services.gitlab-runner.sentryDSN | Data Source Name for tracking of all system level errors to Sentry.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.unique | Connection uniqueness policy to enforce
|
| options/nixos/services.oidentd.enable | Whether to enable ‘oidentd’, an implementation of the Ident
protocol (RFC 1413)
|
| options/nixos/services.ncps.cache.storage.s3.bucket | The name of the S3 bucket.
|
| options/nixos/services.vault.storageBackend | The name of the type of storage backend
|
| options/nixos/services.bookstack.mail.fromName | Mail "from" name.
|
| options/nixos/services.gitlab-runner.services.<name>.authenticationTokenConfigFile | Absolute path to a file containing environment variables used for
gitlab-runner registrations with runner authentication tokens
|
| options/nixos/virtualisation.oci-containers.containers.<name>.environmentFiles | Environment files for this container.
|
| options/nixos/services.pangolin.baseDomain | Your base fully qualified domain name (without any subdomains).
|
| options/nixos/services.netbird.enable | Enables backward-compatible NetBird client service
|
| options/home-manager/specialisation.<name>.configuration | Arbitrary Home Manager configuration settings.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.features.flow_activities | Whether to enable the flow_activities feature for this account.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.features.traffic_filters | Whether to enable the traffic_filters feature for this account.
|
| options/nixos/services.kapacitor.defaultDatabase.username | The username to connect to the remote InfluxDB server
|
| options/nixos/services.jibri.xmppEnvironments.<name>.disableCertificateVerification | Whether to skip validation of the server's certificate.
|
| options/home-manager/programs.sbt.plugins.*.artifact | The name of the artifact.
|
| options/nixos/services.tlsrpt.collectd.settings.socketname | Path at which the UNIX socket will be created.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.imageStream | Path to a script that streams the desired image on standard output
|
| options/nixos/services.gnome.at-spi2-core.enable | Whether to enable at-spi2-core, a service for the Assistive Technologies
available on the GNOME platform
|
| options/nixos/services.samba.nsswins | Whether to enable WINS NSS (Name Service Switch) plug-in
|
| options/nixos/services.sanoid.datasets.<name>.pre_snapshot_script | Script to run before taking snapshot.
|
| options/nixos/services.tomcat.virtualHosts | List consisting of a virtual host name and a list of web applications to deploy on each virtual host
|
| options/nixos/virtualisation.sharedDirectories.<name>.securityModel | The security model to use for this share:
passthrough: files are stored using the same credentials as they are created on the guest (this requires QEMU to run as root)
mapped-xattr: some of the file attributes like uid, gid, mode bits and link target are stored as file attributes
mapped-file: the attributes are stored in the hidden .virtfs_metadata directory
|
| options/nixos/services.xserver.displayManager.session | List of sessions supported with the command used to start each
session
|
| options/nixos/services.athens.storage.s3.bucket | Bucket name for the S3 storage backend.
|
| options/nixos/programs.regreet.theme.package | The package that provides the theme given in the name option.
|
| options/nixos/services.smokeping.linkStyle | DNS name for the urls generated in the cgi.
|
| options/nixos/services.samba-wsdd.workgroup | Set workgroup name (default WORKGROUP).
|
| options/nixos/services.corosync.clusterName | Name of the corosync cluster.
|
| options/nixos/services.prefect.databaseName | database name for postgres only
|
| options/nixos/services.xserver.videoDriver | The name of the video driver for your graphics card
|
| options/nixos/services.factorio.stateDirName | Name of the directory under /var/lib holding the server's data
|
| options/nixos/services.shairport-sync.user | User account name under which to run shairport-sync
|
| options/home-manager/vdirsyncer.userNameCommand | A command that prints the user name to standard output.
|
| options/nixos/services.thanos.rule.alert.label-drop | Labels by name to drop before sending to alertmanager
|
| options/nixos/services.prosody.httpFileShare.domain | Domain name for a http_file_share service.
|
| options/nixos/services.autorandr.matchEdid | Match displays based on edid instead of name
|
| options/home-manager/services.autorandr.matchEdid | Match displays based on edid instead of name.
|
| options/nixos/services.bird-lg.frontend.servers | Server name prefixes.
|
| options/nixos/services.jitsi-videobridge.xmppConfigs.<name>.disableCertificateVerification | Whether to skip validation of the server's certificate.
|
| options/nixos/services.suricata.settings.logging.outputs.file.filename | Filename of the logfile.
|
| options/home-manager/programs.gnome-shell.theme.package | Package providing a GNOME Shell theme in
$out/share/themes/${name}/gnome-shell.
|
| options/nixos/services.prometheus.exporters.dmarc.imap.username | Login username for the IMAP connection.
|
| options/nixos/services.mqtt2influxdb.mqtt.username | Username used to connect to the MQTT server.
|
| options/nixos/services.prometheus.exporters.mqtt.mqttUsername | Username which should be used to authenticate against the MQTT broker.
|
| options/nixos/services.kresd.enable | Whether to enable knot-resolver (version 5) domain name server
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.send_certreq | Send certificate request payloads to offer trusted root CA certificates to
the peer
|
| options/nixos/services.sanoid.templates.<name>.pre_snapshot_script | Script to run before taking snapshot.
|
| options/nixos/services.prosody.uploadHttp.domain | Domain name for the http-upload service
|
| options/nixos/services.outline.storage.region | AWS S3 region name.
|
| options/nixos/services.factorio.saveName | The name of the savegame that will be used by the server
|
| options/home-manager/programs.lazygit.shellWrapperName | Name of the shell wrapper to be called.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.reauth_time | Time to schedule IKE reauthentication
|
| options/nixos/services.usbrelayd.clientName | Name, your client connects as.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.ports | Network ports to publish from the container to the outer host
|
| options/nixos/services.victorialogs.basicAuthUsername | Basic Auth username used to protect VictoriaLogs instance by authorization
|
| options/nixos/services.jigasi.defaultJvbRoomName | Name of the default JVB room that will be joined if no special header is included in SIP invite.
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.cert_uri_base | Defines the base URI for the Hash and URL feature supported by
IKEv2
|
| options/nixos/services.borgmatic.configurations.<name>.repositories | A required list of local or remote repositories with paths and
optional labels (which can be used with the --repository flag to
select a repository)
|
| options/nixos/services.suwayomi-server.settings.server.basicAuthUsername | The username value that you have to provide when authenticating.
|
| options/home-manager/programs.qutebrowser.searchEngines | Search engines that can be used via the address bar
|
| options/nixos/services.consul.interface.bind | The name of the interface to pull the bind_addr from.
|
| options/nixos/services.discourse.admin.fullName | The admin user's full name.
|
| options/nixos/services.httpd.extraModules | Additional Apache modules to be used
|
| options/nixos/services.spacecookie.settings.hostname | The hostname the service is reachable via
|
| options/nixos/services.freshrss.virtualHost | Name of the caddy/nginx virtualhost to use and setup.
|
| options/nixos/services.miredo.interfaceName | Name of the network tunneling interface.
|
| options/nixos/services.nvme-rs.settings.email.smtp_username | SMTP username
|
| options/nixos/services.keyd.keyboards | Configuration for one or more device IDs
|
| options/nixos/services.mattermost.siteName | Name of this Mattermost site.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.capabilities | Capabilities to configure for the container
|
| options/nixos/services.synergy.client.screenName | Use the given name instead of the hostname to identify
ourselves to the server.
|
| options/darwin/services.synergy.client.screenName | Use the given name instead of the hostname to identify
ourselves to the server.
|
| options/home-manager/programs.ncmpcpp.settings | Attribute set from name of a setting to its value
|
| options/nixos/boot.zfs.extraPools | Name or GUID of extra ZFS pools that you wish to import during boot
|
| options/nixos/services.shairport-sync.group | Group account name under which to run shairport-sync
|
| options/nixos/services.rspamd.overrides | Overridden configuration files, written into /etc/rspamd/override.d/{name}.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.namespaces.names | Namespace name.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.childless | Use childless IKE_SA initiation (allow, prefer, force or never)
|
| options/nixos/services.unpoller.influxdb.db | Database name
|
| options/nixos/services.autossh.sessions.*.user | Name of the user the AutoSSH session should run as
|
| options/darwin/services.autossh.sessions.*.user | Name of the user the AutoSSH session should run as
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.x_forwarded | Use the X-Forwarded-For (XFF) header as the client IP and not the
actual client IP.
|
| options/nixos/services.heisenbridge.namespaces | Configure the 'namespaces' section of the registration.yml for the bridge and the server
|
| options/nixos/services.matrix-synapse.log | Default configuration for the loggers used by matrix-synapse and its workers
|
| options/nixos/services.synergy.server.screenName | Use the given name instead of the hostname to identify
this screen in the configuration.
|
| options/darwin/services.synergy.server.screenName | Use the given name instead of the hostname to identify
this screen in the configuration.
|
| options/nixos/programs.regreet.iconTheme.package | The package that provides the icon theme given in the name option.
|
| options/nixos/services.athens.storage.minio.bucket | Bucket name for the minio storage backend.
|
| options/nixos/services.airsonic.virtualHost | Name of the nginx virtualhost to use and setup
|
| options/nixos/services.cloudlog.virtualHost | Name of the nginx virtualhost to use and setup
|
| options/nixos/services.lasuite-meet.settings.DB_NAME | Name of the database
|
| options/nixos/services.lasuite-docs.settings.DB_NAME | Name of the database
|
| options/nixos/services.guacamole-server.host | The host name or IP address the server should listen to.
|
| options/nixos/systemd.network.config.routeTables | Defines route table names as an attrset of name to number
|
| options/nixos/specialisation.<name>.configuration | Arbitrary NixOS configuration
|
| options/nixos/services.wiki-js.stateDirectoryName | Name of the directory in /var/lib.
|
| options/nixos/services.zabbixWeb.httpd.virtualHost | Apache configuration can be done by adapting services.httpd.virtualHosts.<name>
|
| options/nixos/services.zabbixWeb.nginx.virtualHost | Nginx configuration can be done by adapting services.nginx.virtualHosts.<name>
|
| options/home-manager/programs.claude-code.agents | Custom agents for Claude Code
|
| options/nixos/services.slurm.dbdserver.dbdHost | Hostname of the machine where slurmdbd
is running (i.e. name returned by hostname -s).
|
| options/nixos/services.davis.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.movim.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.slskd.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.sanoid.datasets.<name>.post_snapshot_script | Script to run after taking snapshot.
|
| options/nixos/swapDevices.*.encrypted.label | Label of the unlocked encrypted device
|
| options/nixos/services.dependency-track.database.username | Username to use when connecting to an external or manually
provisioned database; has no effect when a local database is
automatically provisioned
|
| options/nixos/image.repart.verityStore.partitionIds.esp | Specify the attribute name of the ESP.
|
| options/nixos/services.athens.index.mysql.database | Database name for the MySQL database.
|
| options/nixos/services.youtrack.virtualHost | Name of the nginx virtual host to use and setup
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.proposals | A proposal is a set of algorithms
|
| options/nixos/services.dependency-track.settings."alpine.oidc.teams.claim" | Defines the name of the claim that contains group memberships or role assignments in the provider's userinfo endpoint
|
| options/nixos/services.cloudlog.database.user | MySQL user name.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags.directory_separator | Directory separator for mapping notmuch tags to maildirs.
|
| options/nixos/services.nix-serve.secretKeyFile | The path to the file used for signing derivation data
|
| options/nixos/services.authelia.instances.<name>.settings.default_2fa_method | Default 2FA method for new users and fallback for preferred but disabled methods.
|
| options/nixos/services.snipe-it.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.influxdb2.provision.initialSetup.username | Primary username
|
| options/nixos/services.syncplay.useACMEHost | If set, use NixOS-generated ACME certificate with the specified name for TLS
|
| options/nixos/services.supybot.plugins | Attribute set of additional plugins that will be symlinked to the
plugin subdirectory
|
| options/nixos/services.stargazer.routes.*.route | Route section name
|
| options/nixos/services.cjdns.ETHInterface.bind | Bind to this device for native ethernet operation.
all is a pseudo-name which will try to connect to all devices.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.mediation_peer | Identity under which the peer is registered at the mediation server, that
is, the IKE identity the other end of this connection uses as its local
identity on its connection to the mediation server
|
| options/home-manager/programs.neomutt.sidebar.shortPath | By default sidebar shows the full path of the mailbox, but
with this enabled only the relative name is shown.
|
| options/home-manager/programs.claude-code.rules | Modular rule files for Claude Code
|
| options/nixos/services.nextcloud-spreed-signaling.backends | A list of backends from which clients are allowed to connect from
|
| options/nixos/services.hatsu.settings.HATSU_DOMAIN | The domain name of your instance (eg 'hatsu.local').
|
| options/nixos/services.netbird.server.signal.domain | The domain name for the signal service.
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.resources.*.compress | Whether synapse should compress HTTP responses to clients that support it
|
| options/nixos/services.sanoid.templates.<name>.post_snapshot_script | Script to run after taking snapshot.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.features.internet_resource | Whether to enable the internet_resource feature for this account.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.features.policy_conditions | Whether to enable the policy_conditions feature for this account.
|
| options/nixos/services.coder.database.database | Name of database.
|
| options/nixos/services.headscale.settings.dns.nameservers.global | List of nameservers to pass to Tailscale clients.
|
| options/nixos/services.misskey.reverseProxy.host | The fully qualified domain name to bind to
|
| options/nixos/services.pds.settings.PDS_HOSTNAME | Instance hostname (base domain name)
|
| options/nixos/services.gitea.settings.server.DOMAIN | Domain name of your server.
|
| options/nixos/services.ncps.cache.lru.scheduleTimeZone | The name of the timezone to use for the cron schedule
|
| options/home-manager/programs.zsh.siteFunctions | Functions that are added to the Zsh environment and are subject to
autoloading
|
| options/nixos/services.nextcloud.config.objectstore.s3.hostname | Required for some non-Amazon implementations.
|
| options/nixos/services.resolved.llmnr | Controls Link-Local Multicast Name Resolution support
(RFC 4795) on the local host
|
| options/nixos/services.writefreely.host | The public host name to serve.
|
| options/nixos/services.gancio.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.fluidd.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.akkoma.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.matomo.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.monica.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.nullmailer.config.defaultdomain | The content of this attribute is appended to any host name that
does not contain a period (except localhost), including defaulthost
and idhost
|
| options/nixos/services.prometheus.exporters.pihole.piholeHostname | Hostname or address where to find the Pi-Hole webinterface
|
| options/nixos/services.livekit.keyFile | LiveKit key file holding one or multiple application secrets
|
| options/nixos/services.multipath.devices.*.prio | The name of the path priority routine
|
| options/nixos/services.restic.server.privateRepos | Enable private repos
|
| options/nixos/services.cadvisor.storageDriverDb | Cadvisord storage driver database name.
|
| options/nixos/services.minetest-server.world | Name of the world to use
|
| options/nixos/services.gammu-smsd.backend.sql.database | Database name to store sms data
|
| options/nixos/services.mastodon.user | User under which mastodon runs
|
| options/nixos/services.tailscale.derper.domain | Domain name under which the derper server is reachable.
|
| options/nixos/services.slurm.controlMachine | The short hostname of the machine where SLURM control functions are
executed (i.e. the name returned by the command "hostname -s", use "tux001"
rather than "tux001.my.com").
|
| options/nixos/services.multipath.pathGroups.*.alias | The name of the multipath device
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.ignore_remote_labels | Set Gmail labels to ignore when syncing from remote labels to
local tags (before translations).
|
| options/nixos/services.mqtt2influxdb.influxdb.username | Username for InfluxDB login.
|
| options/nixos/image.repart.verityStore.partitionIds.store | Specify the attribute name of the store partition.
|
| options/nixos/programs.regreet.cursorTheme.package | The package that provides the cursor theme given in the name option.
|
| options/home-manager/programs.zsh.prezto.tmux.defaultSessionName | Set the default session name.
|
| options/nixos/services.xserver.xrandrHeads.*.output | The output name of the monitor, as shown by
xrandr(1) invoked without arguments.
|
| options/nixos/services.prometheus.remoteRead.*.basic_auth.username | HTTP username
|
| options/nixos/services.knot-resolver.enable | Whether to enable knot-resolver (version 6) domain name server
|
| options/nixos/services.portunus.ldap.searchUserName | The login name of the search user
|
| options/nixos/users.ldap.daemon.rootpwmoddn | The distinguished name to use to bind to the LDAP server
when the root user tries to modify a user's password.
|
| options/nixos/services.sanoid.datasets.<name>.process_children_only | Whether to only snapshot child datasets if recursing.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.fragmentation | Use IKE fragmentation (proprietary IKEv1 extension or RFC 7383 IKEv2
fragmentation)
|
| options/nixos/services.multipath.pathGroups.*.array | The DNS name of the storage array
|
| options/nixos/hardware.firmware | List of packages containing firmware files
|
| options/nixos/services.traefik.environmentFiles | Files to load as an environment file just before Traefik starts
|
| options/nixos/services.vault-agent.instances | Attribute set of vault-agent instances
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.ignore_empty_history | Work around a Gmail API quirk where an empty change history
is sometimes returned
|
| options/nixos/services.athens.storage.mongo.defaultDBName | Name of the mongo database.
|
| options/nixos/services.gitlab.registry.serviceName | GitLab container registry service name.
|
| options/nixos/services.icingaweb2.pool | Name of existing PHP-FPM pool that is used to run Icingaweb2
|
| options/nixos/services.firezone.server.provision.accounts.<name>.features.self_hosted_relays | Whether to enable the self_hosted_relays feature for this account.
|
| options/nixos/services.tailscale.authKeyFile | A file containing the auth key
|
| options/nixos/services.nominatim.enable | Whether to enable nominatim
|
| options/nixos/services.openvscode-server.host | The host name or IP address the server should listen to.
|
| options/nixos/services.bitwarden-directory-connector-cli.ldap.username | The user to authenticate as.
|
| options/nixos/services.acme-dns.settings.general.domain | Domain name to serve the requests off of.
|
| options/nixos/services.unpoller.unifi.defaults.user | Unifi service user name.
|
| options/nixos/nixpkgs.flake.source | The path to the nixpkgs sources used to build the system
|
| options/nixos/services.gancio.settings.db.database | Name of the PostgreSQL database
|
| options/nixos/services.prometheus.remoteWrite.*.basic_auth.username | HTTP username
|
| options/nixos/services.slurm.dbdserver.storageUser | Database user name.
|
| options/nixos/services.rustus.storage.s3_region | S3 region name.
|
| options/nixos/services.radicle.privateKeyFile | Absolute file path to an SSH private key,
usually generated by rad auth
|
| options/nixos/services.bitwarden-directory-connector-cli.ldap.hostname | The host the LDAP is accessible on.
|
| options/darwin/system.defaults.finder._FXSortFoldersFirst | Keep folders on top when sorting by name
|
| options/nixos/services.roundcube.enable | Whether to enable roundcube
|
| options/nixos/services.samba.winbindd.enable | Whether to enable Samba's winbindd, which provides a number of services
to the Name Service Switch capability found in most modern C libraries,
to arbitrary applications via PAM and ntlm_auth and to Samba itself.
|
| options/nixos/services.trilium-server.instanceName | Instance name used to distinguish between different instances
|
| options/nixos/services.hickory-dns.settings.zones.*.zone | Zone name, like "example.com", "localhost", or "0.0.127.in-addr.arpa".
|
| options/nixos/services.buildbot-worker.adminMessage | Name of the administrator of this worker
|
| options/darwin/nixpkgs.flake.source | The path to the nixpkgs sources used to build the system
|
| options/nixos/services.postfix.networksStyle | Name of standard way of trusted network specification to use,
leave blank if you specify it explicitly or if you want to use
default (localhost-only).
|
| options/darwin/services.postgresql.identMap | Defines the mapping from system users to database users
|
| options/home-manager/programs.claude-code.commands | Custom commands for Claude Code
|
| options/nixos/services.prometheus.exporters.py-air-control.deviceHostname | The hostname of the air purification device from which to scrape the metrics.
|
| options/nixos/services.httpd.customLogFormat | Defines a custom Apache HTTPD access log format string
|
| options/nixos/services.cntlm.netbios_hostname | The hostname of your machine.
|
| options/nixos/services.gotify.stateDirectoryName | The name of the directory below /var/lib where
gotify stores its runtime data.
|
| options/nixos/users.mysql.pam.statusColumn | The name of the column or an SQL expression that indicates the status of
the user
|
| options/nixos/services.matrix-synapse.settings.listeners.*.resources.*.names | List of resources to host on this listener.
|
| options/nixos/programs.kubeswitch.commandName | The name of the command to use
|
| options/home-manager/programs.kubeswitch.commandName | The name of the command to use
|
| options/nixos/services.oauth2-proxy.nginx.virtualHosts.<name>.allowed_email_domains | List of email domains to allow access to this vhost, or null to allow all.
|
| options/nixos/services.dependency-track.settings."alpine.database.username" | Specifies the username to use when authenticating to the database.
|
| options/home-manager/programs.wezterm.colorSchemes | Attribute set of additional color schemes to be written to
$XDG_CONFIG_HOME/wezterm/colors, where each key is
taken as the name of the corresponding color scheme
|
| options/home-manager/programs.zed-editor.extensions | A list of the extensions Zed should install on startup
|
| options/nixos/services.lavalink.plugins.*.configName | The name of the plugin to use as the key for the plugin configuration.
|
| options/nixos/services.samba.usershares.group | Name of the group members of which will be allowed to create usershares
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.remove_local_messages | Remove local messages that have been deleted on the remote.
|
| options/nixos/security.doas.extraRules.*.setEnv | Keep or set the specified variables
|
| options/nixos/services.bacula-fd.tls.allowedCN | Common name attribute of allowed peer certificates
|
| options/nixos/services.bacula-sd.tls.allowedCN | Common name attribute of allowed peer certificates
|
| options/nixos/services.nextcloud.autoUpdateApps.startAt | When to run the update
|
| options/home-manager/programs.radicle.uri.web-rad.browser | Name of the XDG Desktop Entry for your browser
|
| options/nixos/services.outline.storage.uploadBucketName | Name of the bucket where uploads should be stored.
|
| options/nixos/services.vikunja.database.database | Database name.
|
| options/nixos/services.prometheus.exporters.nextcloud.username | Username for connecting to Nextcloud
|
| options/nixos/services.victoriatraces.basicAuthUsername | Basic Auth username used to protect VictoriaTraces instance by authorization
|
| options/nixos/services.prometheus.remoteRead.*.url | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.rosenpass.defaultDevice | Name of the network interface to use for all peers by default.
|
| options/home-manager/programs.gnome-terminal.profile | A set of Gnome Terminal profiles
|
| options/nixos/services.bacula-dir.tls.allowedCN | Common name attribute of allowed peer certificates
|
| options/nixos/services.nextcloud.settings.mail_smtpname | This depends on mail_smtpauth
|
| options/nixos/services.forgejo.settings.server.DOMAIN | Domain name of your server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.label_name_length_limit | Per-scrape limit on length of labels name that will be accepted for a sample
|
| options/nixos/services._3proxy.resolution | Use this option to configure name resolution and DNS caching.
|
| options/nixos/hardware.trackpoint.device | The device name of the trackpoint
|
| options/nixos/services.cassandra.clusterName | The name of the cluster
|
| options/nixos/hardware.display.edid.modelines | Attribute set of XFree86 Modelines automatically converted
and exposed as edid/<name>.bin files in initrd
|
| options/nixos/services.windmill.database.urlPath | Path to the file containing the database url windmill should connect to
|
| options/nixos/services.thinkfan.fans.*.query | The query string used to match one or more fans: can be
a fullpath to the temperature file (single fan) or a fullpath
to a driver directory (multiple fans).
When multiple fans match, the query can be restricted using the
name or indices options.
|
| options/nixos/services.davis.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.movim.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.slskd.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.multipath.devices.*.vendor | Regular expression to match the vendor name
|
| options/nixos/services.caddy.adapter | Name of the config adapter to use
|
| options/nixos/services.ntopng.redis.createInstance | Local Redis instance name
|
| options/nixos/services.snipe-it.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.btrbk.extraPackages | Extra packages for btrbk, like compression utilities for stream_compress.
Note: This option will get deprecated in future releases
|
| options/nixos/services.prometheus.scrapeConfigs.*.basic_auth.username | HTTP username
|
| options/home-manager/programs.gemini-cli.context | An attribute set of context files to create in ~/.gemini/
|
| options/nixos/services.linux-enable-ir-emitter.device | IR camera device to depend on
|
| options/nixos/services.icecream.scheduler.netName | Network name for the icecream scheduler
|
| options/nixos/services.mysql.ensureUsers | Ensures that the specified users exist and have at least the ensured permissions
|
| options/nixos/services.cloudflare-ddns.wafLists | List of WAF IP Lists to manage, in the format account-id/list-name.
(Experimental feature as of cloudflare-ddns 1.14.0).
|
| options/nixos/services.canaille.settings.SERVER_NAME | The domain name on which canaille will be served.
|
| options/nixos/services.libreswan.policies | A set of policies to apply to the IPsec connections.
The policy name must match the one of connection it needs to apply to.
|
| options/home-manager/programs.git.includes.*.contentSuffix | Nix store name for the git configuration text file,
when generating the configuration text from nix options.
|
| options/nixos/services.borgbackup.jobs | Deduplicating backups using BorgBackup
|
| options/nixos/services.prometheus.remoteWrite.*.url | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.athens.index.postgres.database | Database name for the Postgres database.
|
| options/home-manager/programs.powerline-go.pathAliases | Pairs of full-path and corresponding desired short name
|
| options/nixos/services.agorakit.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.fediwall.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.kanboard.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.librenms.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.dolibarr.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.pixelfed.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.mainsail.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.radicle.httpd.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.borgmatic.configurations.<name>.source_directories | List of source directories and files to backup
|
| options/home-manager/programs.element-desktop.profiles | Extra profiles for Element
|
| options/nixos/services.pcscd.ignoreReaderNames | List of reader name patterns for the PCSC daemon to ignore
|
| options/nixos/services.mautrix-meta.instances | Configuration of multiple mautrix-meta instances.
services.mautrix-meta.instances.facebook and services.mautrix-meta.instances.instagram
come preconfigured with network.mode, appservice.id, bot username, display name and avatar.
|
| options/nixos/services.prometheus.exporters.fritz.settings.devices.*.username | Username to authenticate with the target device.
|
| options/nixos/services.prometheus.exporters.fritz.settings.devices.*.hostname | Hostname under which the target device is reachable.
|
| options/nixos/services.dependency-track.nginx.domain | The domain name under which to set up the virtual host.
|
| options/nixos/services.davis.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.slskd.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.portunus.dex.oidcClients | List of OIDC clients
|
| options/nixos/services.movim.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.lldap.environment | Environment variables passed to the service
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.gtk.indicators | List of allowed indicator modules to use for the lightdm gtk
greeter panel
|
| options/nixos/services.gancio.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.akkoma.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.fluidd.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.matomo.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.monica.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.replace_slash_with_dot | Replace '/' with '.' in Gmail labels.
|
| options/nixos/services.stargazer.routes | Routes that Stargazer should server
|
| options/nixos/services.k3s.charts | Packaged Helm charts that are linked to /var/lib/rancher/k3s/server/static/charts before k3s starts
|
| options/nixos/services.onlyoffice.postgresName | The name of database OnlyOffice should use.
|
| options/nixos/services.snipe-it.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.icingaweb2.virtualHost | Name of the nginx virtualhost to use and setup
|
| options/nixos/services.rutorrent.nginx.enable | Whether to enable nginx virtual host management
|
| options/nixos/boot.loader.systemd-boot.windows | Make Windows bootable from systemd-boot
|
| options/nixos/services.limesurvey.virtualHost | Apache configuration can be done by adapting services.httpd.virtualHosts.<name>
|
| options/nixos/services.multipath.devices.*.product | Regular expression to match the product name
|
| options/nixos/services.mobilizon.settings.":mobilizon".":instance".hostname | Your instance's hostname
|
| options/home-manager/programs.quickshell.configs | A set of configs to include in the quickshell config directory
|
| options/nixos/services.firezone.server.provision.accounts.<name>.features.multi_site_resources | Whether to enable the multi_site_resources feature for this account.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.transmission.settings.script-torrent-done-filename | Executable to be run at torrent completion.
|
| options/nixos/services.libvirtd.autoSnapshot.vms | If specified only the list of VMs will be snapshotted else all existing one
|
| options/nixos/services.filebeat.inputs | Inputs specify how Filebeat locates and processes input data
|
| options/nixos/services.bluesky-pds.settings.PDS_HOSTNAME | Instance hostname (base domain name)
|
| options/nixos/image.repart.verityStore.partitionIds.store-verity | Specify the attribute name of the store's dm-verity hash partition.
|
| options/nixos/services.outline.oidcAuthentication.usernameClaim | Specify which claims to derive user information from
|
| options/nixos/services.umami.settings.TRACKER_SCRIPT_NAME | Allows you to assign a custom name to the tracker script different from the default script.js.
|
| options/nixos/services.victoriametrics.basicAuthUsername | Basic Auth username used to protect VictoriaMetrics instance by authorization
|
| options/nixos/services.librenms.database.database | Name of the database on the MySQL/MariaDB server.
|
| options/nixos/services.akkoma.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.gancio.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.fluidd.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.monica.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.matomo.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.anuko-time-tracker.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.printing.cups-pdf.instances | Permits to raise one or more cups-pdf instances
|
| options/nixos/services.pomerium.useACMEHost | If set, use a NixOS-generated ACME certificate with the specified name
|
| options/nixos/services.subsonic.listenAddress | The host name or IP address on which to bind Subsonic
|
| options/nixos/services.prometheus.exporters.artifactory.artiUsername | Username for authentication against JFrog Artifactory API.
|
| options/nixos/services.nagios.virtualHost.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/nixos/services.moodle.virtualHost.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/nixos/services.oncall.settings.db.conn.kwargs.database | Database name.
|
| options/nixos/services.tailscale.interfaceName | The interface name for tunnel traffic
|
| options/nixos/services.keycloak.settings.hostname-backchannel-dynamic | Enables dynamic resolving of backchannel URLs,
including hostname, scheme, port and context path
|
| options/nixos/services.pgbackrest.repos | An attribute set of repositories as described in:
https://pgbackrest.org/configuration.html#section-repository
Each repository defaults to set repo-host to the attribute's name
|
| options/nixos/boot.loader.grub.configurationName | GRUB entry name instead of default.
|
| options/nixos/services.bookstack.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.consul.interface.advertise | The name of the interface to pull the advertise_addr from.
|
| options/home-manager/services.colima.profiles | Profiles allow multiple colima configurations
|
| options/nixos/services.libeufin.nexus.settings.nexus-ebics.HOST_ID | Name of the EBICS host.
|
| options/nixos/services.prometheus.alertmanagerGotify.metrics.username | The username used to access your metrics.
|
| options/nixos/services.documize.stateDirectoryName | The name of the directory below /var/lib/private
where documize runs in and stores, for example, backups.
|
| options/nixos/users.ldap.bind.distinguishedName | The distinguished name to bind to the LDAP server with
|
| options/nixos/programs.msmtp.accounts | Named accounts and their respective configurations
|
| options/home-manager/programs.rclone.requiresUnit | The name of a systemd user service that must complete before the rclone
configuration file is written
|
| options/nixos/services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.mjolnir.pantalaimon | pantalaimon options (enables E2E Encryption support)
|
| options/nixos/services.limesurvey.httpd.virtualHost | Apache configuration can be done by adapting services.httpd.virtualHosts.<name>
|
| options/nixos/services.limesurvey.nginx.virtualHost | Nginx configuration can be done by adapting services.nginx.virtualHosts.<name>
|
| options/nixos/boot.loader.grub.fsIdentifier | Determines how GRUB will identify devices when generating the
configuration file
|
| options/nixos/services.zfs.autoSnapshot.flags | Flags to pass to the zfs-auto-snapshot command
|
| options/nixos/services.lasuite-meet.livekit.keyFile | LiveKit key file holding one or multiple application secrets
|
| options/nixos/services.znc.useLegacyConfig | Whether to propagate the legacy options under
services.znc.confOptions.* to the znc config
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.drop_non_existing_label | Allow missing labels on the Gmail side to be dropped.
|
| options/nixos/system.nixos.label | NixOS version name to be used in the names of generated
outputs and boot labels
|
| options/nixos/services.calibre-web.options.reverseProxyAuth.header | Auth proxy header name.
|
| options/nixos/security.pam.rssh.settings.auth_key_file | Path to file with trusted public keys in OpenSSH's authorized_keys format
|
| options/nixos/services.rke2.charts | Packaged Helm charts that are linked to /var/lib/rancher/rke2/server/static/charts before rke2 starts
|
| options/nixos/services.thinkfan.sensors.*.query | The query string used to match one or more sensors: can be
a fullpath to the temperature file (single sensor) or a fullpath
to a driver directory (multiple sensors).
When multiple sensors match, the query can be restricted using the
name or indices options.
|
| options/nixos/services.prometheus.exporters.nginxlog.settings.namespaces | Namespaces to collect the metrics for
|
| options/nixos/services.rsnapshot.extraConfig | rsnapshot configuration option in addition to the defaults from
rsnapshot and this module
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.http3 | Whether to enable the HTTP/3 protocol
|
| options/home-manager/programs.quickshell.activeConfig | The name of the config to use
|
| options/nixos/services.rosenpass.settings.peers.*.device | Name of the local WireGuard interface to use for this peer.
|
| options/nixos/services.prometheus.alertmanagerGotify.metrics.namespace | The namescape of the metrics.
|
| options/nixos/programs.pay-respects.runtimeRules | List of rules to be added to /etc/xdg/pay-respects/rules.
pay-respects will read the contents of these generated rules to recommend command corrections
|
| options/nixos/services.grafana.settings.server.domain | The public facing domain name used to access grafana from a browser
|
| options/nixos/services.jirafeau.nginxConfig.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.prometheus.exporters.pve.user | User name under which the pve exporter shall be run.
|
| options/nixos/services.prometheus.exporters.nut.user | User name under which the nut exporter shall be run.
|
| options/nixos/services.prometheus.exporters.kea.user | User name under which the kea exporter shall be run.
|
| options/nixos/services.prometheus.exporters.sql.user | User name under which the sql exporter shall be run.
|
| options/nixos/services.prometheus.exporters.zfs.user | User name under which the zfs exporter shall be run.
|
| options/nixos/services.prometheus.exporters.lnd.user | User name under which the lnd exporter shall be run.
|
| options/nixos/services.consul-template.instances | Attribute set of consul-template instances
|
| options/darwin/system.defaults.finder._FXSortFoldersFirstOnDesktop | Keep folders on top when sorting by name on the desktop
|
| options/nixos/services.prometheus.exporters.ecoflow.ecoflowDevicesPrettyNamesFile | File must contain one line, example: {"R3300000":"Delta 2","R3400000":"Delta Pro",...}
The key/value map of custom names for your devices
|
| options/nixos/services.pufferpanel.environment | Environment variables to set for the service
|
| options/nixos/services.matrix-tuwunel.stateDirectory | The name of the directory under /var/lib/ where the database will be stored
|
| options/nixos/services.radicle.httpd.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.kanboard.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.librenms.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.dolibarr.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.fediwall.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.agorakit.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.pixelfed.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.mainsail.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.sanoid.datasets.<name>.no_inconsistent_snapshot | Whether to take a snapshot if the pre script fails
|
| options/nixos/services.sourcehut.settings."sr.ht".global-domain | Global domain name.
|
| options/nixos/services.postgresqlBackup.backupAll | Backup all databases using pg_dumpall
|
| options/nixos/services.mobilizon.settings.":mobilizon"."Mobilizon.Storage.Repo".username | User used to connect to the database
|
| options/nixos/services.prometheus.exporters.snmp.user | User name under which the snmp exporter shall be run.
|
| options/nixos/services.prometheus.exporters.bind.user | User name under which the bind exporter shall be run.
|
| options/nixos/services.prometheus.exporters.ipmi.user | User name under which the ipmi exporter shall be run.
|
| options/nixos/services.prometheus.exporters.flow.user | User name under which the flow exporter shall be run.
|
| options/nixos/services.prometheus.exporters.nats.user | User name under which the nats exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mail.user | User name under which the mail exporter shall be run.
|
| options/nixos/services.prometheus.exporters.ping.user | User name under which the ping exporter shall be run.
|
| options/nixos/services.prometheus.exporters.bird.user | User name under which the bird exporter shall be run.
|
| options/nixos/services.prometheus.exporters.ebpf.user | User name under which the ebpf exporter shall be run.
|
| options/nixos/services.prometheus.exporters.json.user | User name under which the json exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mqtt.user | User name under which the mqtt exporter shall be run.
|
| options/nixos/services.prometheus.exporters.node.user | User name under which the node exporter shall be run.
|
| options/nixos/services.prometheus.exporters.knot.user | User name under which the knot exporter shall be run.
|
| options/nixos/services.nominatim.database.superUser | Postgresql database superuser used to create Nominatim database and
import data
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.airsonic.listenAddress | The host name or IP address on which to bind Airsonic
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/nixos/services.prometheus.exporters.php-fpm.user | User name under which the php-fpm exporter shall be run.
|
| options/nixos/services.athens.singleFlight.redisSentinel.masterName | Name of the sentinel master server.
|
| options/nixos/services.suricata.settings.default-log-dir | The default logging directory
|
| options/nixos/boot.loader.grub.mirroredBoots.*.efiBootloaderId | The id of the bootloader to store in efi nvram
|
| options/nixos/services.athens.storage.azureblob.accountName | Account name for the Azure Blob storage backend.
|
| options/nixos/services.sanoid.templates.<name>.no_inconsistent_snapshot | Whether to take a snapshot if the pre script fails
|
| options/nixos/services.homebridge.uiSettings.log.service | Name of the systemd service to log to
|
| options/nixos/hardware.nvidia.prime.offload.offloadCmdMainProgram | Specifies the CLI name of the hardware.nvidia.prime.offload.enableOffloadCmd
convenience script for offloading programs to an nvidia device.
|
| options/nixos/services.bookstack.settings | Options for Bookstack configuration
|
| options/nixos/services.radicle.httpd.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.agorakit.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.librenms.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.kanboard.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.dolibarr.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.fediwall.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.pixelfed.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.mainsail.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services._3proxy.resolution.nscache6 | Set name cache size for IPv6.
|
| options/nixos/services.prometheus.exporters.nginx.user | User name under which the nginx exporter shall be run.
|
| options/nixos/services.prometheus.exporters.kafka.user | User name under which the kafka exporter shall be run.
|
| options/nixos/services.prometheus.exporters.redis.user | User name under which the redis exporter shall be run.
|
| options/nixos/services.prometheus.exporters.fritz.user | User name under which the fritz exporter shall be run.
|
| options/nixos/services.prometheus.exporters.idrac.user | User name under which the idrac exporter shall be run.
|
| options/nixos/services.prometheus.exporters.jitsi.user | User name under which the jitsi exporter shall be run.
|
| options/nixos/services.prometheus.exporters.dmarc.user | User name under which the dmarc exporter shall be run.
|
| options/nixos/services.prometheus.exporters.v2ray.user | User name under which the v2ray exporter shall be run.
|
| options/nixos/services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.name_filter | Specify a name filter (works as a LIKE) to apply on the server listing request.
|
| options/nixos/services.datadog-agent.checks | Configuration for all Datadog checks
|
| options/nixos/services.prometheus.exporters.zfs.pools | Name of the pool(s) to collect, repeat for multiple pools (default: all pools).
|
| options/nixos/services.resolved.settings.Resolve.Domains | List of search domains used to complete unqualified name lookups.
|
| options/nixos/services.nghttpx.frontends.*.params.sni-fwd | When performing a match to select a backend server, SNI host
name received from the client is used instead of the request
host
|
| options/nixos/services.anuko-time-tracker.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/boot.initrd.compressor | The compressor to use on the initrd image
|
| options/nixos/services.prometheus.exporters.frr.user | User name under which the frr exporter shall be run
|
| options/nixos/services.miniupnpd.externalInterface | Name of the external interface.
|
| options/nixos/services.logrotate.settings | logrotate freeform settings: each attribute here will define its own section,
ordered by services.logrotate.settings.<name>.priority,
which can either define files to rotate with their settings
or settings common to all further files settings
|
| options/nixos/services.unpoller.unifi.controllers.*.user | Unifi service user name.
|
| options/nixos/services._3proxy.resolution.nserver | List of nameservers to use
|
| options/nixos/services.bookstack.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.certspotter.watchlist | Domain names to watch
|
| options/nixos/services.prometheus.exporters.statsd.user | User name under which the statsd exporter shall be run.
|
| options/nixos/services.prometheus.exporters.dnssec.user | User name under which the dnssec exporter shall be run.
|
| options/nixos/services.prometheus.exporters.script.user | User name under which the script exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mysqld.user | User name under which the mysqld exporter shall be run.
|
| options/nixos/services.prometheus.exporters.deluge.user | User name under which the deluge exporter shall be run.
|
| options/nixos/services.prometheus.exporters.domain.user | User name under which the domain exporter shall be run.
|
| options/nixos/services.prometheus.exporters.fastly.user | User name under which the fastly exporter shall be run.
|
| options/nixos/services.prometheus.exporters.restic.user | User name under which the restic exporter shall be run.
|
| options/nixos/services.prometheus.exporters.pihole.user | User name under which the pihole exporter shall be run.
|
| options/nixos/services.prometheus.exporters.shelly.user | User name under which the shelly exporter shall be run.
|
| options/nixos/services.prometheus.exporters.rspamd.user | User name under which the rspamd exporter shall be run.
|
| options/nixos/services.prometheus.exporters.tibber.user | User name under which the tibber exporter shall be run.
|
| options/nixos/services.healthchecks.settings.DB_NAME | Database name.
|
| options/nixos/services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".url.host | Domain name of the instance.
|
| options/home-manager/services.xidlehook.environment | Extra environment variables to be exported in the script
|
| options/nixos/services.anuko-time-tracker.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.postfixadmin.enable | Whether to enable postfixadmin
|
| options/nixos/services.gmediarender.friendlyName | A "friendly name" for identifying the endpoint.
|
| options/nixos/services.archisteamfarm.bots | Bots name and configuration.
|
| options/nixos/services.prometheus.scrapeConfigs.*.dns_sd_configs.*.names | A list of DNS SRV record names to be queried.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.libeufin.nexus.settings.nexus-ebics.CURRENCY | Name of the fiat currency.
|
| options/nixos/services.thanos.rule.web.prefix-header | Name of HTTP request header used for dynamic prefixing of UI links and
redirects
|
| options/nixos/services.prometheus.exporters.nvidia-gpu.user | User name under which the nvidia-gpu exporter shall be run.
|
| options/nixos/services.nextcloud-spreed-signaling.hostName | The host name to bind the nginx virtual host to, if
config.services.nextcloud-spreed-signaling.configureNginx is set to true.
|
| options/nixos/services.bookstack.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/security.tpm2.tctiEnvironment.tabrmdConf | Configuration part of the tabrmd TCTI, like the D-Bus bus name
|
| options/nixos/services.metricbeat.modules | Metricbeat modules are responsible for reading metrics from the various sources
|
| options/nixos/services.jirafeau.nginxConfig.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.munin-node.extraPlugins | Additional Munin plugins to activate
|
| options/home-manager/services.kanshi.settings.*.output.criteria | The criteria can either be an output name, an output description or "*"
|
| options/nixos/services.prometheus.exporters.bitcoin.rpcUser | RPC user name.
|
| options/nixos/services.journaldriver.logName | Configures the name of the target log in Stackdriver Logging
|
| options/nixos/services.radicle.ci.broker.settings.triggers.*.adapter | Adapter name.
|
| options/nixos/services.pipewire.wireplumber.extraScripts | Additional scripts for WirePlumber to be used by configuration files
|
| options/nixos/services.prometheus.exporters.systemd.user | User name under which the systemd exporter shall be run.
|
| options/nixos/services.prometheus.exporters.bitcoin.user | User name under which the bitcoin exporter shall be run.
|
| options/nixos/services.prometheus.exporters.varnish.user | User name under which the varnish exporter shall be run.
|
| options/nixos/services.prometheus.exporters.apcupsd.user | User name under which the apcupsd exporter shall be run.
|
| options/nixos/services.prometheus.exporters.ecoflow.user | User name under which the ecoflow exporter shall be run.
|
| options/nixos/services.prometheus.exporters.dovecot.user | User name under which the dovecot exporter shall be run.
|
| options/nixos/services.prometheus.exporters.process.user | User name under which the process exporter shall be run.
|
| options/nixos/services.prometheus.exporters.dnsmasq.user | User name under which the dnsmasq exporter shall be run.
|
| options/nixos/services.prometheus.exporters.libvirt.user | User name under which the libvirt exporter shall be run.
|
| options/nixos/services.prometheus.exporters.sabnzbd.user | User name under which the sabnzbd exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mongodb.user | User name under which the mongodb exporter shall be run.
|
| options/nixos/services.prometheus.exporters.postfix.user | User name under which the postfix exporter shall be run.
|
| options/nixos/services.prometheus.exporters.klipper.user | User name under which the klipper exporter shall be run.
|
| options/nixos/services.prometheus.exporters.unbound.user | User name under which the unbound exporter shall be run.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.auto_create_new_mailboxes | Whether to create new mailboxes automatically on the server from notmuch
tags.
|
| options/nixos/services.icingaweb2.modulePackages | Name-package attrset of Icingaweb 2 modules packages to enable
|
| options/nixos/services.filebeat.modules | Filebeat modules provide a quick way to get started
processing common log formats
|
| options/nixos/services.prometheus.exporters.process.settings.process_names | All settings expressed as an Nix attrset
|
| options/nixos/services.postgresql.ensureUsers | Ensures that the specified users exist
|
| options/nixos/services.biboumi.settings.realname_from_jid | Whether the realname and username of each biboumi
user will be extracted from their JID
|
| options/nixos/services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.headscale.settings.tls_letsencrypt_hostname | Domain name to request a TLS certificate for.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.movim.h2o.tls.recommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|
| options/nixos/services.thanos.query.web.prefix-header | Name of HTTP request header used for dynamic prefixing of UI links and
redirects
|
| options/nixos/services.home-assistant.extraComponents | List of components that have their dependencies included in the package
|
| options/nixos/services.prometheus.exporters.rtl_433.user | User name under which the rtl_433 exporter shall be run.
|
| options/nixos/services.jirafeau.nginxConfig.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/security.tpm2.tctiEnvironment.interface | The name of the TPM command transmission interface (TCTI) library to
use.
|
| options/nixos/services.athens.storage.azureblob.containerName | Container name for the Azure Blob storage backend.
|
| options/nixos/services.anubis.defaultOptions.settings.POLICY_FNAME | The policy file to use
|
| options/nixos/services.sanoid.datasets.<name>.force_post_snapshot_script | Whether to run the post script if the pre script fails
|
| options/nixos/services.public-inbox.settings.publicinbox.css | The local path name of a CSS file for the PSGI web interface.
|
| options/darwin/services.postgresql.ensureUsers | Ensures that the specified users exist and have at least the ensured permissions
|
| options/nixos/services.prometheus.exporters.py-air-control.user | User name under which the py-air-control exporter shall be run.
|
| options/nixos/services.mediawiki.httpd.virtualHost.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/nixos/services.influxdb2.provision.initialSetup.bucket | Primary bucket name
|
| options/nixos/services.umami.createPostgresqlDatabase | Whether to automatically create the database for Umami using PostgreSQL
|
| options/nixos/services.sourcehut.hg.postgresql.database | PostgreSQL database name for the hg.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.hockeypuck.settings | Configuration file for hockeypuck, here you can override
certain settings (loglevel and
openpgp.db.dsn) by just setting those values
|
| options/nixos/services.prometheus.exporters.influxdb.user | User name under which the influxdb exporter shall be run.
|
| options/nixos/services.prometheus.exporters.opnsense.user | User name under which the opensense exporter shall be run.
|
| options/nixos/services.prometheus.exporters.smartctl.user | User name under which the smartctl exporter shall be run.
|
| options/nixos/services.prometheus.exporters.fritzbox.user | User name under which the fritzbox exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mikrotik.user | User name under which the mikrotik exporter shall be run.
|
| options/nixos/services.prometheus.exporters.nginxlog.user | User name under which the nginxlog exporter shall be run.
|
| options/nixos/services.prometheus.exporters.postgres.user | User name under which the postgres exporter shall be run.
|
| options/nixos/services.prometheus.exporters.unpoller.user | User name under which the unpoller exporter shall be run.
|
| options/nixos/services.prometheus.exporters.graphite.user | User name under which the graphite exporter shall be run.
|
| options/nixos/services.prometheus.exporters.blackbox.user | User name under which the blackbox exporter shall be run.
|
| options/nixos/services.prometheus.exporters.keylight.user | User name under which the keylight exporter shall be run.
|
| options/nixos/services.prometheus.exporters.collectd.user | User name under which the collectd exporter shall be run.
|
| options/nixos/services.sanoid.templates.<name>.force_post_snapshot_script | Whether to run the post script if the pre script fails
|
| options/nixos/hardware.printers.ensurePrinters | Will regularly ensure that the given CUPS printers are configured as declared here
|
| options/nixos/services.anubis.defaultOptions.settings.SERVE_ROBOTS_TXT | Whether to serve a default robots.txt that denies access to common AI bots by name and all other
bots by wildcard.
|
| options/nixos/services.sourcehut.man.postgresql.database | PostgreSQL database name for the man.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.sourcehut.git.postgresql.database | PostgreSQL database name for the git.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.sourcehut.hub.postgresql.database | PostgreSQL database name for the hub.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/hardware.block.defaultSchedulerExclude | Device name pattern to exclude from default scheduler assignment
through config.hardware.block.defaultScheduler and
config.hardware.block.defaultSchedulerRotational
|
| options/nixos/services.journaldriver.logStream | Configures the name of the Stackdriver Logging log stream into
which to write journald entries
|
| options/nixos/services.limesurvey.virtualHost.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.exporters.mailman3.user | User name under which the mailman3 exporter shall be run.
|
| options/nixos/services.libeufin.nexus.settings.nexus-ebics.BANK_DIALECT | Name of the following combination: EBICS version and ISO20022
recommendations that Nexus would honor in the communication with the
bank
|
| options/home-manager/services.xsuspender.defaults.matchWmNameContains | Match windows where wm name contains string.
|
| options/nixos/services.sourcehut.todo.postgresql.database | PostgreSQL database name for the todo.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.sourcehut.meta.postgresql.database | PostgreSQL database name for the meta.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.suricata.settings.unix-command | Unix command socket that can be used to pass commands to Suricata
|
| options/nixos/services.limesurvey.nginx.virtualHost.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.dolibarr.h2o.tls.recommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|
| options/nixos/services.pds.environmentFiles | File to load environment variables from
|
| options/nixos/services.pgmanage.connections | pgmanage requires at least one PostgreSQL server be defined
|
| options/nixos/services.h2o.defaultTLSRecommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|
| options/nixos/services.nextcloud.config.objectstore.s3.bucket | The name of the S3 bucket.
|
| options/nixos/services.nullmailer.config.remotes | A list of remote servers to which to send each message
|
| options/nixos/services.prometheus.exporters.imap-mailstat.user | User name under which the imap-mailstat exporter shall be run.
|
| options/nixos/services.cassandra.listenAddress | Address or interface to bind to and tell other Cassandra nodes
to connect to
|
| options/nixos/services.sourcehut.lists.postgresql.database | PostgreSQL database name for the lists.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.sourcehut.paste.postgresql.database | PostgreSQL database name for the paste.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.sourcehut.pages.postgresql.database | PostgreSQL database name for the pages.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.journald.upload.settings.Upload.ServerKeyFile | SSL key in PEM format
|
| options/nixos/services.prometheus.exporters.chrony.user | User name under which the chrony exporter shall be run
|
| options/nixos/services.prometheus.exporters.surfboard.user | User name under which the surfboard exporter shall be run.
|
| options/nixos/services.prometheus.exporters.tailscale.user | User name under which the tailscale exporter shall be run.
|
| options/nixos/services.prometheus.exporters.wireguard.user | User name under which the wireguard exporter shall be run.
|
| options/nixos/services.prometheus.exporters.rasdaemon.user | User name under which the rasdaemon exporter shall be run.
|
| options/nixos/services.prometheus.exporters.borgmatic.user | User name under which the borgmatic exporter shall be run.
|
| options/nixos/services.prometheus.exporters.smokeping.user | User name under which the smokeping exporter shall be run.
|
| options/nixos/services.prometheus.exporters.pgbouncer.user | User name under which the pgbouncer exporter shall be run.
|
| options/nixos/services.prometheus.exporters.nextcloud.user | User name under which the nextcloud exporter shall be run.
|
| options/nixos/services.limesurvey.httpd.virtualHost.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/nixos/services.zfs.autoReplication.localFilesystem | Local ZFS filesystem from which snapshots should be sent
|
| options/nixos/services.prometheus.exporters.mongodb.collectAll | Enable all collectors
|
| options/nixos/services.prometheus.exporters.postfix.systemd.unit | Name of the postfix systemd unit.
|
| options/nixos/services.matrix-synapse.settings.database.args.database | Name of the database when using the psycopg2 backend,
path to the database location when using sqlite3.
|
| options/nixos/services.prometheus.exporters.junos-czerwonk.user | User name under which the junos-czerwonk exporter shall be run.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.yggdrasil.openMulticastPort | Whether to open the UDP port used for multicast peer discovery
|
| options/home-manager/wayland.windowManager.sway.config.workspaceOutputAssign.*.output | Name(s) of the output(s) from {command}swaymsg -t get_outputs.
|
| options/nixos/services.sourcehut.builds.postgresql.database | PostgreSQL database name for the builds.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.mosquitto.listeners.*.omitPasswordAuth | Omits password checking, allowing anyone to log in with any user name unless
other mandatory authentication methods (eg TLS client certificates) are configured.
|
| options/nixos/services.pgbouncer.settings.pgbouncer.max_client_conn | Maximum number of client connections allowed
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.prometheus.exporters.postfix.systemd.slice | Name of the postfix systemd slice
|
| options/nixos/services.foundationdb.tls.allowedPeers | "Peer verification string"
|
| options/nixos/services.yggdrasil.denyDhcpcdInterfaces | Disable the DHCP client for any interface whose name matches
any of the shell glob patterns in this list
|
| options/nixos/services.postgresql.ensureUsers.*.ensureDBOwnership | Grants the user ownership to a database with the same name
|
| options/nixos/services.matrix-alertmanager.matrixRooms | Combination of Alertmanager receiver(s) and rooms for the bot to join
|
| options/nixos/services.prometheus.exporters.buildkite-agent.user | User name under which the buildkite-agent exporter shall be run.
|
| options/nixos/services.prometheus.exporters.scaphandre.user | User name under which the scaphandre exporter shall be run.
|
| options/nixos/services.prometheus.exporters.storagebox.user | User name under which the storagebox exporter shall be run.
|
| options/nixos/services.firezone.server.provision.accounts | All accounts to provision
|
| options/nixos/services.chatgpt-retrieval-plugin.qdrantCollection | name of the qdrant collection used to store documents.
|
| options/nixos/services.limesurvey.nginx.virtualHost.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/home-manager/xsession.windowManager.i3.config.workspaceOutputAssign.*.output | Name(s) of the output(s) from {command}i3-msg -t get_outputs.
|
| options/home-manager/services.kanshi.settings.*.profile.outputs.*.criteria | The criteria can either be an output name, an output description or "*"
|
| options/nixos/services.suricata.settings.outputs | Configure the type of alert (and other) logging you would like
|
| options/nixos/services.crowdsec-firewall-bouncer.secrets.apiKeyPath | Path to the API key to authenticate with a local CrowdSec API
|
| options/nixos/services.glance.environmentFile | Path to an environment file as defined in systemd.exec(5)
|
| options/nixos/services.centrifugo.environmentFiles | Files to load environment variables from
|
| options/nixos/virtualisation.rosetta.mountTag | The VirtioFS mount tag for the Rosetta runtime, exposed by the host's virtualisation software
|
| options/nixos/services.mqtt2influxdb.influxdb.database | Name of the InfluxDB database.
|
| options/nixos/services.dependency-track.database.databaseName | Database name to use when connecting to an external or
manually provisioned database; has no effect when a local
database is automatically provisioned
|
| options/nixos/services.grafana.settings.smtp.ehlo_identity | Name to be used as client identity for EHLO in SMTP dialog.
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.username | Credentials are used to authenticate the requests to Uyuni API.
|
| options/nixos/services.tarsnap.keyfile | The keyfile which associates this machine with your tarsnap
account
|
| options/nixos/services.datadog-agent.extraIntegrations | Extra integrations from the Datadog core-integrations
repository that should be built and included
|
| options/nixos/services.desktopManager.gnome.flashback.customSessions.*.wmLabel | The name of the window manager to show in the session chooser.
|
| options/nixos/services.prometheus.exporters.exportarr-lidarr.user | User name under which the exportarr-lidarr exporter shall be run.
|
| options/nixos/services.prometheus.exporters.exportarr-sonarr.user | User name under which the exportarr-sonarr exporter shall be run.
|
| options/nixos/services.prometheus.exporters.exportarr-radarr.user | User name under which the exportarr-radarr exporter shall be run.
|
| options/nixos/services.prometheus.exporters.exportarr-bazarr.user | User name under which the exportarr-bazarr exporter shall be run.
|
| options/nixos/services.limesurvey.nginx.virtualHost.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/boot.loader.systemd-boot.sortKey | The sort key used for the NixOS bootloader entries
|
| options/nixos/virtualisation.libvirtd.nss.enableGuest | This option enables the newer libvirt_guest NSS module
|
| options/nixos/services.bluesky-pds.environmentFiles | File to load environment variables from
|
| options/nixos/services.mosquitto.listeners.*.authPlugins.*.denySpecialChars | Automatically disallow all clients using #
or + in their name/id.
|
| options/nixos/services.rutorrent.nginx.exposeInsecureRPC2mount | If you do not enable one of the rpc or httprpc plugins you need to expose an RPC mount through scgi using this option
|
| options/nixos/services.taskserver.organisations | An attribute set where the keys name the organisation and the values
are a set of lists of users and
groups.
|
| options/nixos/services.journaldriver.googleCloudProject | Configures the name of the Google Cloud project to which to
forward journald logs
|
| options/nixos/services.matrix-synapse.settings.log_config | The file that holds the logging configuration.
|
| options/home-manager/wayland.windowManager.sway.config.workspaceOutputAssign.*.workspace | Name of the workspace to assign.
|
| options/nixos/services.tabby.model | Specify the model that tabby will use to generate completions
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.exporters.exportarr-readarr.user | User name under which the exportarr-readarr exporter shall be run.
|
| options/nixos/services.pufferpanel.enable | Whether to enable PufferPanel game management server
|
| options/nixos/services.prometheus.exporters.artifactory.user | User name under which the artifactory exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mqtt.prometheusPrefix | Prefix added to the metric name.
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowCN | Allow client if common name appears in the list.
|
| options/nixos/services.warpgate.settings.external_host | Configure the domain name of this Warpgate instance
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowOU | Allow client if organizational unit name appears in the list.
|
| options/nixos/services.prometheus.scrapeConfigs.*.http_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.basic_auth.username | HTTP username
|
| options/darwin/services.aerospace.settings.on-window-detected.*."if".workspace | The workspace name to match (optional).
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.username | Consul username
|
| options/nixos/services.grafana.provision.alerting.rules.settings.groups.*.folder | Name of the folder the rule group will be stored in
|
| options/nixos/services.matrix-appservice-discord.settings | config.yaml configuration as a Nix attribute set
|
| options/nixos/services.crowdsec-firewall-bouncer.registerBouncer.bouncerName | Name to register the bouncer as to the CrowdSec API
|
| options/nixos/services.outline.oidcAuthentication.displayName | Display name for OIDC authentication.
|
| options/nixos/services.nextcloud.settings."profile.enabled" | Makes user-profiles globally available under nextcloud.tld/u/user.name
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowDNS | Allow client if DNS subject alternative name appears in the list.
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowURI | Allow client if URI subject alternative name appears in the list.
|
| options/nixos/services.discourse.siteSettings | Discourse site settings
|
| options/nixos/services.strongswan-swanctl.swanctl.connections | Section defining IKE connection configurations, each in its own subsection
with an arbitrary yet unique name
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/home-manager/xsession.windowManager.i3.config.workspaceOutputAssign.*.workspace | Name of the workspace to assign.
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities | Section defining complementary attributes of certification authorities, each
in its own subsection with an arbitrary yet unique name
|
| options/nixos/services.warpgate.settings.sso_providers.*.label | SSO provider name displayed on login page.
|
| options/nixos/services.prometheus.exporters.exportarr-prowlarr.user | User name under which the exportarr-prowlarr exporter shall be run.
|
| options/nixos/documentation.man.mandoc.settings.output.man | A template for linked manuals (usually via the Xr macro) in HTML
output
|
| options/nixos/services.multipath.devices.*.user_friendly_names | If set to "yes", using the bindings file /etc/multipath/bindings
to assign a persistent and unique alias to the multipath, in the
form of mpath
|
| options/nixos/services.nipap.settings.auth.default_backend | Name of auth backend to use by default.
|
| options/nixos/services.xserver.desktopManager.gnome.flashback.customSessions.*.wmLabel | The name of the window manager to show in the session chooser.
|
| options/nixos/services.prometheus.exporters.modemmanager.user | User name under which the modemmanager exporter shall be run.
|
| options/nixos/services.crowdsec-firewall-bouncer.settings.api_key | API key to authenticate with a local crowdsec API
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.matrix-appservice-irc.settings.homeserver.domain | The 'domain' part for user IDs on this home server
|
| options/nixos/services.mqtt2influxdb.points.*.measurement | Name of the measurement
|
| options/darwin/system.defaults.loginwindow.SHOWFULLNAME | Apple menu > System Preferences > Users and Groups > Login Options
Displays login window as a name and password field instead of a list of users
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.groupNameAttribute | Attribute for a name of group.
|
| options/nixos/system.replaceDependencies.replacements | List of packages to override without doing a full rebuild
|
| options/nixos/services.journald.upload.settings.Upload.ServerCertificateFile | SSL CA certificate in PEM format
|
| options/nixos/documentation.man.mandoc.settings.output.paper | This option is for generating PostScript and PDF output
|
| options/nixos/virtualisation.sharedDirectories | An attributes set of directories that will be shared with the
virtual machine using VirtFS (9P filesystem over VirtIO)
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.inherit | Grants the user created inherit permissions
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.influxdb2.provision.initialSetup.organization | Primary organization name
|
| options/nixos/services.prometheus.exporters.unpoller.controllers.*.user | Unifi service user name.
|
| options/nixos/services.matrix-synapse.settings.trusted_key_servers.*.server_name | Hostname of the trusted server.
|
| options/nixos/security.apparmor.killUnconfinedConfinables | Whether to enable killing of processes which have an AppArmor profile enabled
(in security.apparmor.policies)
but are not confined (because AppArmor can only confine new processes)
|
| options/nixos/services.biboumi.settings.realname_customization | Whether the users will be able to use
the ad-hoc commands that lets them configure
their realname and username.
|
| options/nixos/virtualisation.xen.store.settings.perms.enableWatch | Whether to enable the watch permission system
|
| options/nixos/services.mautrix-telegram.environmentFile | File containing environment variables to be passed to the mautrix-telegram service,
in which secret tokens can be specified securely by defining values for e.g.
MAUTRIX_TELEGRAM_APPSERVICE_AS_TOKEN,
MAUTRIX_TELEGRAM_APPSERVICE_HS_TOKEN,
MAUTRIX_TELEGRAM_TELEGRAM_API_ID,
MAUTRIX_TELEGRAM_TELEGRAM_API_HASH and optionally
MAUTRIX_TELEGRAM_TELEGRAM_BOT_TOKEN
|
| options/nixos/services.prometheus.exporters.restic.rcloneConfig | Configuration for the rclone remote being used for backup
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.createdb | Grants the user, created by the ensureUser attr, createdb permissions
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.mobilizon.settings.":mobilizon"."Mobilizon.Storage.Repo".database | Name of the database
|
| options/nixos/services.veilid.settings.core.network.routing_table.bootstrap | Host name of existing well-known Veilid bootstrap servers for the network to connect to.
|
| options/nixos/services.prometheus.exporters.wireguard.wireguardConfig | Path to the Wireguard Config to
add the peer's name to the stats of a peer
|
| options/nixos/services.prometheus.exporters.mqtt.zigbee2MqttAvailability | Whether to enable Normalize sensor name for device availability metric added by Zigbee2MQTT..
|
| options/nixos/hardware.block.scheduler | Assign block I/O scheduler by device name pattern
|
| options/darwin/services.aerospace.settings.workspace-to-monitor-force-assignment | Map workspaces to specific monitors
|
| options/home-manager/programs.ripgrep-all.custom_adapters.*.mimetypes | If not null and --rga-accurate is enabled, mime type matching is used instead of file name matching
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.bypassrls | Grants the user, created by the ensureUser attr, replication permissions
|
| options/nixos/services.postgresql.systemCallFilter | Configures the syscall filter for postgresql.service
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.superuser | Grants the user, created by the ensureUser attr, superuser permissions
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.username | username is required if using Identity V2 API
|
| options/nixos/services.prometheus.exporters.pgbouncer.connectionEnvFile | File that must contain the environment variable
PGBOUNCER_EXPORTER_CONNECTION_STRING which is set to the connection
string used by pgbouncer
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.domain_name | At most one of domain_id and domain_name must be provided if using username
with Identity V3
|
| options/nixos/services.prometheus.exporters.pgbouncer.connectionString | Connection string for accessing pgBouncer
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.namespaces | Optional namespace discovery
|
| options/nixos/services.filesender.settings.log_facilities | Defines where FileSender logging is sent
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.replication | Grants the user, created by the ensureUser attr, replication permissions
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.createrole | Grants the user, created by the ensureUser attr, createrole permissions
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.project_name | The project_id and project_name fields are optional for the Identity V2 API
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.basic_auth.username | HTTP username
|
| options/home-manager/programs.qutebrowser.keyBindings | Key bindings mapping keys to commands in different modes
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.application_credential_name | The application_credential_id or application_credential_name fields are
required if using an application credential to authenticate
|
| packages/nixpkgs/grepcidr | Filter IPv4 and IPv6 addresses matching CIDR patterns |
| packages/nixpkgs/hans | Tunnel IPv4 over ICMP |
| packages/nixpkgs/cnping | Minimal Graphical IPV4 Ping Tool |
| packages/nixpkgs/ahcpd | Autoconfiguration protocol for IPv6 and dual-stack IPv6/IPv4 networks |
| packages/nixpkgs/tnat64 | IPv4 to IPv6 interceptor |
| packages/nixpkgs/cidrgrep | Like grep but for IPv4 CIDRs |
| packages/nixpkgs/cidr-merger | Simple command line tool to merge ip/ip cidr/ip range, supports IPv4/IPv6 |
| packages/nixpkgs/iodine | Tool to tunnel IPv4 data through a DNS server |
| packages/nixpkgs/freebind | IPv4 and IPv6 address rate limiting evasion tool |
| packages/nixpkgs/cf-hero | Tool that uses multiple data sources to discover the origin IP addresses of Cloudflare-protected web applications |
| packages/nixpkgs/taldir | Directory service to resolve wallet mailboxes by messenger addresses |
| packages/nixpkgs/scanmem | Memory scanner for finding and poking addresses in executing processes |
| packages/nixpkgs/pycoin | Utilities for Bitcoin and altcoin addresses and transaction manipulation |
| packages/nixpkgs/aggregate6 | IPv4 and IPv6 prefix aggregation tool |
| packages/nixpkgs/acpidump-all | Walk through all ACPI tables with their addresses |
| packages/nixpkgs/ip2asn | CLI tool for mapping IP addresses to Autonomous System information |
| packages/nixpkgs/ipv6calc | Calculate/manipulate (not only) IPv6 addresses |
| packages/nixpkgs/norouter | Tool to handle unprivileged networking by using multiple loopback addresses |
| packages/nixpkgs/packetdrill | Quick, precise tests for entire TCP/UDP/IPv4/IPv6 network stacks |
| packages/nixpkgs/subnetcalc | IPv4/IPv6 subnet address calculator |
| packages/nixpkgs/maltego | Open source intelligence and forensics application, enabling to easily gather information about DNS, domains, IP addresses, websites, persons, and so on |
| packages/nixpkgs/fail2ban | Program that scans log files for repeated failing login attempts and bans IP addresses |
| packages/nixpkgs/dnsvalidator | Tool to maintain a list of IPv4 DNS servers |
| packages/nixpkgs/ipfetch | Neofetch but for ip addresses |
| packages/nixpkgs/libpostal | C library for parsing/normalizing street addresses around the world |
| packages/nixpkgs/ip2location | Look up locations of host names and IP addresses |
| packages/nixpkgs/libpostalWithData | C library for parsing/normalizing street addresses around the world |
| packages/nixpkgs/ip2location-c | Library to look up locations of host names and IP addresses |
| packages/nixpkgs/dlx | DLX simulator written in C |
| packages/nixpkgs/seppo | Personal Social Web |
| packages/nixpkgs/parpd | Proxy ARP Daemon that complies with RFC 1027 |
| packages/nixpkgs/quisk | SDR transceiver for radios that use the Hermes protocol |
| packages/nixpkgs/unscd | Less buggy replacement for the glibc name service cache daemon |
| packages/nixpkgs/ls-lint | Extremely fast file and directory name linter |
| packages/nixpkgs/alfis | Alternative Free Identity System |
| packages/nixpkgs/iro | CLI tool to convet Hex color code or RGB to color code, RGB, HSL and color name |
| packages/nixpkgs/dhcpcd | Client for the Dynamic Host Configuration Protocol (DHCP) |
| packages/nixpkgs/djbdns | Collection of Domain Name System tools |
| packages/nixpkgs/idnkit | Provides functionalities about i18n domain name processing |
| packages/nixpkgs/nsncd | Name service non-caching daemon |
| packages/nixpkgs/nixos-install | Install bootloader and NixOS |
| packages/nixpkgs/alfis-nogui | Alternative Free Identity System |
| packages/nixpkgs/upspin | Global name space for storing data akin to a filesystem |
| packages/nixpkgs/nsd | Authoritative only, high performance, simple and open source name server |
| packages/nixpkgs/nixos-enter | Run a command in a NixOS chroot environment |
| packages/nixpkgs/aewan | Ascii-art Editor Without A Name |
| packages/nixpkgs/mimeo | Open files by MIME-type or file name using regular expressions |
| packages/nixpkgs/git-crypt | Transparent file encryption in git |
| packages/nixpkgs/uniscribe | Explains Unicode characters/code points: Displays their name, category, and shows compositions |
| packages/nixpkgs/vpnc-scripts | Script for vpnc to configure the network routing and name service |
| packages/nixpkgs/detect | Expression-based file search combining name, content, metadata, and structured data predicates |
| packages/nixpkgs/dnsutils | Domain name server |
| packages/nixpkgs/getopt | Parses command-line arguments from shell scripts |
| packages/nixpkgs/jwhois | Client for the WHOIS protocol allowing you to query the owner of a domain name |
| packages/nixpkgs/nssmdns | MDNS Name Service Switch (NSS) plug-in |
| packages/nixpkgs/figurine | Print your name in style |
| packages/nixpkgs/filegive | Easy p2p file sending program |
| packages/nixpkgs/dig | Domain name server |
| packages/nixpkgs/dnstwist | Domain name permutation engine for detecting homograph phishing attacks |
| packages/nixpkgs/bind | Domain name server |
| packages/nixpkgs/host | Domain name server |
| packages/nixpkgs/nixpkgs-vet | Tool to vet (check) Nixpkgs, including its pkgs/by-name directory |
| packages/nixpkgs/spotifywm | Wrapper around Spotify that correctly sets class name before opening the window |
| packages/nixpkgs/geticons | CLI utility to get icons for apps on your system or other generic icons by name |
| packages/nixpkgs/eschalot | Tor hidden service name generator |
| packages/nixpkgs/nixos-rebuild-ng | Rebuild your NixOS configuration and switch to it, on local hosts and remote |
| packages/nixpkgs/ascii | Interactive ASCII name and synonym chart |
| packages/nixpkgs/git-remote-gcrypt | Git remote helper for GPG-encrypted remotes |
| packages/nixpkgs/xml2 | Tools for command line processing of XML, HTML, and CSV |
| packages/nixpkgs/spooftooph | Automate spoofing or clone Bluetooth device Name, Class, and Address |
| packages/nixpkgs/wiggle | Tool for applying patches with conflicts |
| packages/nixpkgs/gnu-config | Attempt to guess a canonical system name |
| packages/nixpkgs/profont | Monospaced font created to be a most readable font for programming |
| packages/nixpkgs/nix-required-mounts | A --pre-build-hook for Nix, that allows to expose extra paths in the build sandbox based on derivations' requiredSystemFeatrues |
| packages/nixpkgs/openresolv | Program to manage /etc/resolv.conf |
| packages/nixpkgs/libasyncns | C library for Linux/Unix for executing name service queries asynchronously |
| packages/nixpkgs/zstxtns-utils | Utilities to deal with text based name service databases |
| packages/nixpkgs/libcanberra | Implementation of the XDG Sound Theme and Name Specifications |
| packages/nixpkgs/libcanberra-gtk3 | Implementation of the XDG Sound Theme and Name Specifications |
| packages/nixpkgs/libcanberra-gtk2 | Implementation of the XDG Sound Theme and Name Specifications |
| packages/nixpkgs/dnstracer | Determines where a given Domain Name Server (DNS) gets its information from, and follows the chain of DNS servers back to the servers which know the data |
| packages/nixpkgs/moreutils | Growing collection of the unix tools that nobody thought to write long ago when unix was young |
| packages/nixpkgs/luarocks-packages-updater | Module to update luarocks-packages |
| packages/nixpkgs/libcanberra_kde | Implementation of the XDG Sound Theme and Name Specifications |
| packages/nixpkgs/python313Packages.ipy | Class and tools for handling of IPv4 and IPv6 addresses and networks |
| packages/nixpkgs/python314Packages.ipy | Class and tools for handling of IPv4 and IPv6 addresses and networks |
| packages/nixpkgs/python312Packages.ipy | Class and tools for handling of IPv4 and IPv6 addresses and networks |
| packages/nixpkgs/perlPackages.NetIP | Perl extension for manipulating IPv4/IPv6 addresses |
| packages/nixpkgs/perl5Packages.NetIP | Perl extension for manipulating IPv4/IPv6 addresses |
| packages/nixpkgs/perlPackages.NetAddrIP | Manages IPv4 and IPv6 addresses and subnets |
| packages/nixpkgs/perlPackages.NetIPLite | Perl extension for manipulating IPv4/IPv6 addresses |
| packages/nixpkgs/perl5Packages.NetAddrIP | Manages IPv4 and IPv6 addresses and subnets |
| packages/nixpkgs/perlPackages.NetIPv4Addr | Perl extension for manipulating IPv4 addresses |
| packages/nixpkgs/perl5Packages.NetIPLite | Perl extension for manipulating IPv4/IPv6 addresses |
| packages/nixpkgs/perl5Packages.NetIPv4Addr | Perl extension for manipulating IPv4 addresses |
| packages/nixpkgs/perlPackages.NetCIDRLite | Perl extension for merging IPv4 or IPv6 CIDR addresses |
| packages/nixpkgs/perl5Packages.NetCIDRLite | Perl extension for merging IPv4 or IPv6 CIDR addresses |
| packages/nixpkgs/perl538Packages.NetIP | Perl extension for manipulating IPv4/IPv6 addresses |
| packages/nixpkgs/perl540Packages.NetIP | Perl extension for manipulating IPv4/IPv6 addresses |
| packages/nixpkgs/perl538Packages.NetAddrIP | Manages IPv4 and IPv6 addresses and subnets |
| packages/nixpkgs/perl540Packages.NetAddrIP | Manages IPv4 and IPv6 addresses and subnets |
| packages/nixpkgs/perl538Packages.NetIPLite | Perl extension for manipulating IPv4/IPv6 addresses |
| packages/nixpkgs/perl540Packages.NetIPLite | Perl extension for manipulating IPv4/IPv6 addresses |
| packages/nixpkgs/perl540Packages.NetIPv4Addr | Perl extension for manipulating IPv4 addresses |
| packages/nixpkgs/perl538Packages.NetIPv4Addr | Perl extension for manipulating IPv4 addresses |
| packages/nixpkgs/perl540Packages.NetCIDRLite | Perl extension for merging IPv4 or IPv6 CIDR addresses |
| packages/nixpkgs/perl538Packages.NetCIDRLite | Perl extension for merging IPv4 or IPv6 CIDR addresses |
| packages/nixpkgs/postgresqlPackages.ip4r | IPv4/v6 and IPv4/v6 range index type for PostgreSQL |
| packages/nixpkgs/postgresql15Packages.ip4r | IPv4/v6 and IPv4/v6 range index type for PostgreSQL |
| packages/nixpkgs/postgresql17Packages.ip4r | IPv4/v6 and IPv4/v6 range index type for PostgreSQL |
| packages/nixpkgs/postgresql18Packages.ip4r | IPv4/v6 and IPv4/v6 range index type for PostgreSQL |
| packages/nixpkgs/postgresql14Packages.ip4r | IPv4/v6 and IPv4/v6 range index type for PostgreSQL |
| packages/nixpkgs/postgresql16Packages.ip4r | IPv4/v6 and IPv4/v6 range index type for PostgreSQL |
| packages/nixpkgs/rocmPackages.rdc | Simplifies administration and addresses infrastructure challenges in cluster and datacenter environments |
| packages/nixpkgs/nth | Module and CLI for the identification of hashes |
| packages/nixpkgs/python313Packages.py-radix-sr | Python radix tree for IPv4 and IPv6 prefix matching |
| packages/nixpkgs/python314Packages.py-radix-sr | Python radix tree for IPv4 and IPv6 prefix matching |
| packages/nixpkgs/perlPackages.NetIPXS | IPv4/IPv6 address library |
| packages/nixpkgs/perlPackages.NetCIDR | Manipulate IPv4/IPv6 netblocks in CIDR notation |
| packages/nixpkgs/perl5Packages.NetIPXS | IPv4/IPv6 address library |
| packages/nixpkgs/perl5Packages.NetCIDR | Manipulate IPv4/IPv6 netblocks in CIDR notation |
| packages/nixpkgs/python312Packages.py-radix-sr | Python radix tree for IPv4 and IPv6 prefix matching |
| packages/nixpkgs/chickenPackages_5.chickenEggs.tcp6 | Interface to TCP over IPv4 and IPv6 |
| packages/nixpkgs/chickenPackages_5.chickenEggs.udp6 | Interface to UDP over IPv4 and IPv6 |
| packages/nixpkgs/perl540Packages.NetIPXS | IPv4/IPv6 address library |
| packages/nixpkgs/perl538Packages.NetIPXS | IPv4/IPv6 address library |
| packages/nixpkgs/perl538Packages.NetCIDR | Manipulate IPv4/IPv6 netblocks in CIDR notation |
| packages/nixpkgs/perl540Packages.NetCIDR | Manipulate IPv4/IPv6 netblocks in CIDR notation |
| packages/nixpkgs/gnomeExtensions.mypubip | A simple extension that let the user to view and copy the public IPv4 and IPv6 address, by using ipify.org services. |
| packages/nixpkgs/python313Packages.aggregate6 | IPv4 and IPv6 prefix aggregation tool |
| packages/nixpkgs/python314Packages.aggregate6 | IPv4 and IPv6 prefix aggregation tool |
| packages/nixpkgs/perlPackages.DataValidateIP | IPv4 and IPv6 validation methods |
| packages/nixpkgs/python313Packages.pycoin | Utilities for Bitcoin and altcoin addresses and transaction manipulation |
| packages/nixpkgs/python313Packages.ifaddr | Enumerates all IP addresses on all network adapters of the system |
| packages/nixpkgs/python314Packages.ifaddr | Enumerates all IP addresses on all network adapters of the system |
| packages/nixpkgs/perl5Packages.DataValidateIP | IPv4 and IPv6 validation methods |
| packages/nixpkgs/python313Packages.anonip | Tool to anonymize IP addresses in log files |
| packages/nixpkgs/python314Packages.anonip | Tool to anonymize IP addresses in log files |
| packages/nixpkgs/python313Packages.bip-utils | Implementation of BIP39, BIP32, BIP44, BIP49 and BIP84 for wallet seeds, keys and addresses generation |
| packages/nixpkgs/python314Packages.bip-utils | Implementation of BIP39, BIP32, BIP44, BIP49 and BIP84 for wallet seeds, keys and addresses generation |
| packages/nixpkgs/typstPackages.datify_0_1_3 | Datify is a simple date package that allows users to format dates in new ways and addresses the issue of lacking date formats in different languages |
| packages/nixpkgs/typstPackages.datify_0_1_4 | Datify is a simple date package that allows users to format dates in new ways and addresses the issue of lacking date formats in different languages |
| packages/nixpkgs/typstPackages.datify_0_1_1 | Datify is a simple date package that allows users to format dates in new ways and addresses the issue of lacking date formats in different languages |
| packages/nixpkgs/typstPackages.datify_0_1_2 | Datify is a simple date package that allows users to format dates in new ways and addresses the issue of lacking date formats in different languages |
| packages/nixpkgs/haskellPackages.network-house | data and parsers for Ethernet, TCP, UDP, IPv4, IPv6, ICMP, DHCP, TFTP |
| packages/nixpkgs/gnomeExtensions.public-ip-address | Shows an public IPv4 and IPv6 address. |
| packages/nixpkgs/python314Packages.pycoin | Utilities for Bitcoin and altcoin addresses and transaction manipulation |
| packages/nixpkgs/python312Packages.aggregate6 | IPv4 and IPv6 prefix aggregation tool |
| packages/nixpkgs/haskellPackages.ip | Library for IP and MAC addresses |
| packages/nixpkgs/perl538Packages.DataValidateIP | IPv4 and IPv6 validation methods |
| packages/nixpkgs/perl540Packages.DataValidateIP | IPv4 and IPv6 validation methods |
| packages/nixpkgs/perlPackages.NetIPv6Addr | Check and manipulate IPv6 addresses |
| packages/nixpkgs/python312Packages.anonip | Tool to anonymize IP addresses in log files |
| packages/nixpkgs/python312Packages.ifaddr | Enumerates all IP addresses on all network adapters of the system |
| packages/nixpkgs/python312Packages.pycoin | Utilities for Bitcoin and altcoin addresses and transaction manipulation |
| packages/nixpkgs/perlPackages.NetWorks | Sane APIs for IP addresses and networks |
| packages/nixpkgs/haskellPackages.hw-ip | Library for manipulating IP addresses and CIDR blocks |
| packages/nixpkgs/perl5Packages.NetIPv6Addr | Check and manipulate IPv6 addresses |
| packages/nixpkgs/python312Packages.bip-utils | Implementation of BIP39, BIP32, BIP44, BIP49 and BIP84 for wallet seeds, keys and addresses generation |
| packages/nixpkgs/perl5Packages.NetWorks | Sane APIs for IP addresses and networks |
| packages/nixpkgs/python313Packages.iptools | Utilities for manipulating IP addresses including a class that can be used to include CIDR network blocks in Django's INTERNAL_IPS setting |
| packages/nixpkgs/python314Packages.iptools | Utilities for manipulating IP addresses including a class that can be used to include CIDR network blocks in Django's INTERNAL_IPS setting |
| packages/nixpkgs/perlPackages.NetWhoisIP | Perl extension for looking up the whois information for ip addresses |
| packages/nixpkgs/haskellPackages.addy | A full-featured library for parsing, validating, and rendering email addresses |
| packages/nixpkgs/perlPackages.RegexpIPv6 | Regular expression for IPv6 addresses |
| packages/nixpkgs/perl5Packages.NetWhoisIP | Perl extension for looking up the whois information for ip addresses |
| packages/nixpkgs/perlPackages.EmailValid | Check validity of Internet email addresses |
| packages/nixpkgs/perl5Packages.RegexpIPv6 | Regular expression for IPv6 addresses |
| packages/nixpkgs/perlPackages.DeviceMAC | Handle hardware MAC Addresses (EUI-48 and EUI-64) |
| packages/nixpkgs/perl5Packages.EmailValid | Check validity of Internet email addresses |
| packages/nixpkgs/texlivePackages.envbig | Printing addresses on envelopes |
| packages/nixpkgs/perl5Packages.DeviceMAC | Handle hardware MAC Addresses (EUI-48 and EUI-64) |
| packages/nixpkgs/texlivePackages.envlab | Addresses on envelopes or mailing labels |
| packages/nixpkgs/perlPackages.IPCountry | Fast lookup of country codes from IP addresses |
| packages/nixpkgs/perl538Packages.NetIPv6Addr | Check and manipulate IPv6 addresses |
| packages/nixpkgs/perl540Packages.NetIPv6Addr | Check and manipulate IPv6 addresses |
| packages/nixpkgs/haskellPackages.ip-quoter | Quasiquoter for IP addresses |
| packages/nixpkgs/perl538Packages.NetWorks | Sane APIs for IP addresses and networks |
| packages/nixpkgs/perl540Packages.NetWorks | Sane APIs for IP addresses and networks |
| packages/nixpkgs/python312Packages.iptools | Utilities for manipulating IP addresses including a class that can be used to include CIDR network blocks in Django's INTERNAL_IPS setting |
| packages/nixpkgs/perlPackages.MaxMindDBReader | Read MaxMind DB files and look up IP addresses |
| packages/nixpkgs/perl5Packages.IPCountry | Fast lookup of country codes from IP addresses |
| packages/nixpkgs/python313Packages.py-multiaddr | Composable and future-proof network addresses |
| packages/nixpkgs/python314Packages.py-multiaddr | Composable and future-proof network addresses |
| packages/nixpkgs/perl538Packages.NetWhoisIP | Perl extension for looking up the whois information for ip addresses |
| packages/nixpkgs/perl540Packages.NetWhoisIP | Perl extension for looking up the whois information for ip addresses |
| packages/nixpkgs/perl5Packages.MaxMindDBReader | Read MaxMind DB files and look up IP addresses |
| packages/nixpkgs/perl538Packages.RegexpIPv6 | Regular expression for IPv6 addresses |
| packages/nixpkgs/perl540Packages.RegexpIPv6 | Regular expression for IPv6 addresses |
| packages/nixpkgs/perl540Packages.EmailValid | Check validity of Internet email addresses |
| packages/nixpkgs/perl538Packages.EmailValid | Check validity of Internet email addresses |
| packages/nixpkgs/perl538Packages.DeviceMAC | Handle hardware MAC Addresses (EUI-48 and EUI-64) |
| packages/nixpkgs/perl540Packages.DeviceMAC | Handle hardware MAC Addresses (EUI-48 and EUI-64) |
| packages/nixpkgs/perlPackages.MailRFC822Address | Perl extension for validating email addresses according to RFC822 |
| packages/nixpkgs/perlPackages.EmailAddressXS | Parse and format RFC 5322 email addresses and groups |
| packages/nixpkgs/perl5Packages.MailRFC822Address | Perl extension for validating email addresses according to RFC822 |
| packages/nixpkgs/perl5Packages.EmailAddressXS | Parse and format RFC 5322 email addresses and groups |
| packages/nixpkgs/perl538Packages.IPCountry | Fast lookup of country codes from IP addresses |
| packages/nixpkgs/perl540Packages.IPCountry | Fast lookup of country codes from IP addresses |
| packages/nixpkgs/gnomeExtensions.lan-ip-address | Show LAN IP address on GNOME panel |
| packages/nixpkgs/python312Packages.py-multiaddr | Composable and future-proof network addresses |
| packages/nixpkgs/python313Packages.macaddress | Module for handling hardware identifiers like MAC addresses |
| packages/nixpkgs/python314Packages.macaddress | Module for handling hardware identifiers like MAC addresses |
| packages/nixpkgs/perl538Packages.MaxMindDBReader | Read MaxMind DB files and look up IP addresses |
| packages/nixpkgs/perl540Packages.MaxMindDBReader | Read MaxMind DB files and look up IP addresses |
| packages/nixpkgs/perl538Packages.MailRFC822Address | Perl extension for validating email addresses according to RFC822 |
| packages/nixpkgs/perl540Packages.MailRFC822Address | Perl extension for validating email addresses according to RFC822 |
| packages/nixpkgs/perl538Packages.EmailAddressXS | Parse and format RFC 5322 email addresses and groups |
| packages/nixpkgs/perl540Packages.EmailAddressXS | Parse and format RFC 5322 email addresses and groups |
| packages/nixpkgs/haskellPackages.rtnetlink | Manipulate network devices, addresses, and routes on Linux |
| packages/nixpkgs/python312Packages.macaddress | Module for handling hardware identifiers like MAC addresses |
| packages/nixpkgs/python313Packages.anonymizeip | Python library for anonymizing IP addresses |
| packages/nixpkgs/python314Packages.anonymizeip | Python library for anonymizing IP addresses |
| packages/nixpkgs/python313Packages.cashaddress | Python tool for convert bitcoin cash legacy addresses |
| packages/nixpkgs/python314Packages.cashaddress | Python tool for convert bitcoin cash legacy addresses |
| packages/nixpkgs/python313Packages.radixtarget | Radix implementation designed for lookups of IP addresses/networks and DNS hostnames |
| packages/nixpkgs/python314Packages.radixtarget | Radix implementation designed for lookups of IP addresses/networks and DNS hostnames |
| packages/nixpkgs/haskellPackages.primitive-addr | Addresses to unmanaged memory |
| packages/nixpkgs/python312Packages.anonymizeip | Python library for anonymizing IP addresses |
| packages/nixpkgs/haskellPackages.email-validator | Perform basic syntax and deliverability checks on email addresses |
| packages/nixpkgs/python312Packages.cashaddress | Python tool for convert bitcoin cash legacy addresses |
| packages/nixpkgs/python312Packages.radixtarget | Radix implementation designed for lookups of IP addresses/networks and DNS hostnames |
| packages/nixpkgs/haskellPackages.hostaddress | Network Host Addresses |
| packages/nixpkgs/graylogPlugins.ipanonymizer | Graylog-server plugin that replaces the last octet of IP addresses in messages with xxx |
| packages/nixpkgs/haskellPackages.network-simple-sockaddr | network-simple for resolved addresses |
| packages/nixpkgs/haskellPackages.base58address | Parsing and serialization for Base58 addresses (Bitcoin and Ripple) |
| packages/nixpkgs/fixDarwinDylibNames | |
| packages/nixpkgs/ocamlPackages.dns | Domain Name System (DNS) library |
| packages/nixpkgs/ocamlPackages_latest.dns | Domain Name System (DNS) library |
| packages/nixpkgs/ocamlPackages.dns-mirage | Opinionated Domain Name System (DNS) library |
| packages/nixpkgs/ocamlPackages.uuidm | OCaml module implementing 128 bits universally unique identifiers version 3, 5 (name based with MD5, SHA-1 hashing) and 4 (random based) according to RFC 4122 |
| packages/nixpkgs/ibus-engines.uniemoji | Input method (ibus) for entering unicode symbols and emoji by name |
| packages/nixpkgs/ocamlPackages_latest.dns-mirage | Opinionated Domain Name System (DNS) library |
| packages/nixpkgs/ocamlPackages_latest.uuidm | OCaml module implementing 128 bits universally unique identifiers version 3, 5 (name based with MD5, SHA-1 hashing) and 4 (random based) according to RFC 4122 |
| packages/nixpkgs/perlPackages.NetDNS | Perl Interface to the Domain Name System |
| packages/nixpkgs/perl5Packages.NetDNS | Perl Interface to the Domain Name System |
| packages/nixpkgs/python313Packages.wcmatch | Wilcard File Name matching library |
| packages/nixpkgs/python314Packages.wcmatch | Wilcard File Name matching library |
| packages/nixpkgs/haskellPackages.nom | Name-binding & alpha-equivalence |
| packages/nixpkgs/perlPackages.ProcFind | Find processes by name, PID, or some other attributes |
| packages/nixpkgs/texlivePackages.fink | The LaTeX2e File Name Keeper |
| packages/nixpkgs/perl5Packages.ProcFind | Find processes by name, PID, or some other attributes |
| packages/nixpkgs/haskellPackages.HPath | Extract Haskell declarations by name |
| packages/nixpkgs/perlPackages.DataOptList | Parse and validate simple name/value option pairs |
| packages/nixpkgs/perlPackages.ClassLoad | Working (require "Class::Name") and more |
| packages/nixpkgs/haskellPackages.zenc | GHC style name Z-encoding and Z-decoding |
| packages/nixpkgs/perlPackages.FileMimeInfo | Determine file type from the file name |
| packages/nixpkgs/haskellPackages.rpm-nvr | RPM package name-version-release data types |
| packages/nixpkgs/perl5Packages.DataOptList | Parse and validate simple name/value option pairs |
| packages/nixpkgs/perl5Packages.ClassLoad | Working (require "Class::Name") and more |
| packages/nixpkgs/ocamlPackages.yuujinchou | Name pattern combinators |
| packages/nixpkgs/yaziPlugins.jump-to-char | Vim-like f<char>, jump to the next file whose name starts with <char>. |
| packages/nixpkgs/akkuPackages.chibi-net-dns | Domain Name Service library, with high-level utilities for address, mx and text record lookups |
| packages/nixpkgs/perl538Packages.NetDNS | Perl Interface to the Domain Name System |
| packages/nixpkgs/perl540Packages.NetDNS | Perl Interface to the Domain Name System |
| packages/nixpkgs/perlPackages.TryTinyByClass | Selectively catch exceptions by class name |
| packages/nixpkgs/perl5Packages.FileMimeInfo | Determine file type from the file name |
| packages/nixpkgs/python312Packages.wcmatch | Wilcard File Name matching library |
| packages/nixpkgs/perlPackages.ModuleUtil | Module name tools and transformations |
| packages/nixpkgs/python313Packages.outdated | Mini-library which, given a package name and a version, checks if it's the latest version available on PyPI |
| packages/nixpkgs/python314Packages.outdated | Mini-library which, given a package name and a version, checks if it's the latest version available on PyPI |
| packages/nixpkgs/perl5Packages.TryTinyByClass | Selectively catch exceptions by class name |
| packages/nixpkgs/perl5Packages.ModuleUtil | Module name tools and transformations |
| packages/nixpkgs/haskellPackages.hcount | Haskell artifact name counts |
| packages/nixpkgs/haskellPackages.gender | Identify a persons gender by their first name |
| packages/nixpkgs/perl540Packages.ProcFind | Find processes by name, PID, or some other attributes |
| packages/nixpkgs/perl538Packages.ProcFind | Find processes by name, PID, or some other attributes |
| packages/nixpkgs/haskellPackages.lsfrom | List directory files starting from a specific name |
| packages/nixpkgs/gnomeExtensions.xremap | Allow xremap to fetch the focused app name using D-Bus or local socket. |
| packages/nixpkgs/akkuPackages.r6rs-psystem | OS name and libc-loading for PFFI |
| packages/nixpkgs/haskellPackages.resolv | Domain Name Service (DNS) lookup via the libresolv standard library routines |
| packages/nixpkgs/haskellPackages.windns | Domain Name Service (DNS) lookup via the <windns.h>/dnsapi.dll standard library |
| packages/nixpkgs/perl538Packages.DataOptList | Parse and validate simple name/value option pairs |
| packages/nixpkgs/perl540Packages.DataOptList | Parse and validate simple name/value option pairs |
| packages/nixpkgs/perl538Packages.ClassLoad | Working (require "Class::Name") and more |
| packages/nixpkgs/perl540Packages.ClassLoad | Working (require "Class::Name") and more |
| packages/nixpkgs/ocamlPackages_latest.yuujinchou | Name pattern combinators |
| packages/nixpkgs/perl540Packages.FileMimeInfo | Determine file type from the file name |
| packages/nixpkgs/perl538Packages.FileMimeInfo | Determine file type from the file name |
| packages/nixpkgs/haskellPackages.system-info | Get the name of the operating system |
| packages/nixpkgs/haskellPackages.resolve | A name resolusion library |
| packages/nixpkgs/python313Packages.srvlookup | Wrapper for dnspython to return SRV records for a given host, protocol, and domain name |
| packages/nixpkgs/python314Packages.srvlookup | Wrapper for dnspython to return SRV records for a given host, protocol, and domain name |
| packages/nixpkgs/haskellPackages.path-tagged | A wrapper around the @path@ library, tagged with semantic name |
| packages/nixpkgs/texlivePackages.grffile | Extended file name support for graphics (legacy package) |
| packages/nixpkgs/python313Packages.click-default-group | Group to invoke a command without explicit subcommand name |
| packages/nixpkgs/python314Packages.click-default-group | Group to invoke a command without explicit subcommand name |
| packages/nixpkgs/nodePackages.poor-mans-t-sql-formatter-cli | A T-SQL formatting utility in JS, transpiled from the C# library of the same name. |
| packages/nixpkgs/python312Packages.outdated | Mini-library which, given a package name and a version, checks if it's the latest version available on PyPI |
| packages/nixpkgs/haskellPackages.CabalSearch | Search cabal packages by name |
| packages/nixpkgs/perl538Packages.TryTinyByClass | Selectively catch exceptions by class name |
| packages/nixpkgs/perl540Packages.TryTinyByClass | Selectively catch exceptions by class name |
| packages/nixpkgs/haskellPackages.ConsStream | Trivial re-export of Wouter Swierstra's Stream package, avoiding module name clash |
| packages/nixpkgs/perl540Packages.ModuleUtil | Module name tools and transformations |
| packages/nixpkgs/perl538Packages.ModuleUtil | Module name tools and transformations |
| packages/nixpkgs/haskellPackages.daemons | Daemons in Haskell made fun and easy |
| packages/nixpkgs/haskellPackages.window-utils | OS window icon/name utilities |
| packages/nixpkgs/haskellPackages.network-dns | Domain Name System data structures |
| packages/nixpkgs/haskellPackages.itanium-abi | An implementation of name mangling/demangling for the Itanium ABI |
| packages/nixpkgs/gnomeExtensions.user-id-in-top-panel | Add ( user name :: user id @ host ) in top panel |
| packages/nixpkgs/haskellPackages.acme-omitted | A name for omitted definitions |
| packages/nixpkgs/haskellPackages.haskell-docs | A program to find and display the docs and type of a name |
| packages/nixpkgs/texlivePackages.fetchcls | Fetch the current class name |
| packages/nixpkgs/texlivePackages.storecmd | Store the name of a defined command in a container |
| packages/nixpkgs/texlivePackages.etexcmds | Avoid name clashes with e-TeX commands |
| packages/nixpkgs/texlivePackages.currfile | Provide file name and path of input files |
| packages/nixpkgs/texlivePackages.refenums | Define named items and provide back-references with that name |
| packages/nixpkgs/python312Packages.srvlookup | Wrapper for dnspython to return SRV records for a given host, protocol, and domain name |
| packages/nixpkgs/python312Packages.click-default-group | Group to invoke a command without explicit subcommand name |
| packages/nixpkgs/nodePackages_latest.poor-mans-t-sql-formatter-cli | A T-SQL formatting utility in JS, transpiled from the C# library of the same name. |
| packages/nixpkgs/haskellPackages.dns-patterns | DNS name parsing and pattern matching utilities |
| packages/nixpkgs/vimPlugins.yaml-companion-nvim | |
| packages/nixpkgs/gnomeExtensions.toggle-window | For security reasons, since Gnome 41, cann't invoke '**org.gnome |
| packages/nixpkgs/texlivePackages.cmdstring | Get command name reliably |
| packages/nixpkgs/python313Packages.libasyncns | Libasyncns-python is a python binding for the asynchronous name service query library |
| packages/nixpkgs/python314Packages.libasyncns | Libasyncns-python is a python binding for the asynchronous name service query library |
| packages/nixpkgs/gnomeExtensions.vpn-indicator | Display current VPN name in panel. |
| packages/nixpkgs/perlPackages.DataValidateDomain | Domain and host name validation |
| packages/nixpkgs/haskellPackages.NameGenerator | A name generator written in Haskell |
| packages/nixpkgs/perl5Packages.DataValidateDomain | Domain and host name validation |
| packages/nixpkgs/gnomeExtensions.ip-indicator | Displays the current IP address of the network with it's relevant interface name |
| packages/nixpkgs/python312Packages.libasyncns | Libasyncns-python is a python binding for the asynchronous name service query library |
| packages/nixpkgs/texlivePackages.noconflict | Resolve macro name conflict between packages |
| packages/nixpkgs/texlivePackages.savefnmark | Save name of the footnote mark for reuse |
| packages/nixpkgs/haskellPackages.denominate | Functions supporting bulk file and directory name normalization |
| packages/nixpkgs/perlPackages.Apppapersway | PaperWM-like scrollable tiling window management for Sway/i3wm |
| packages/nixpkgs/perl538Packages.DataValidateDomain | Domain and host name validation |
| packages/nixpkgs/perl540Packages.DataValidateDomain | Domain and host name validation |
| packages/nixpkgs/haskellPackages.hs-nombre-generator | Name generator |
| packages/nixpkgs/perl5Packages.Apppapersway | PaperWM-like scrollable tiling window management for Sway/i3wm |
| packages/nixpkgs/python313Packages.pyaxmlparser | Python3 Parser for Android XML file and get Application Name without using Androguard |
| packages/nixpkgs/python314Packages.pyaxmlparser | Python3 Parser for Android XML file and get Application Name without using Androguard |
| packages/nixpkgs/python312Packages.publicsuffix | Allows to get the public suffix of a domain name |
| packages/nixpkgs/python313Packages.publicsuffix | Allows to get the public suffix of a domain name |
| packages/nixpkgs/perl540Packages.Apppapersway | PaperWM-like scrollable tiling window management for Sway/i3wm |
| packages/nixpkgs/perl538Packages.Apppapersway | PaperWM-like scrollable tiling window management for Sway/i3wm |
| packages/nixpkgs/python312Packages.pyaxmlparser | Python3 Parser for Android XML file and get Application Name without using Androguard |
| packages/nixpkgs/python313Packages.publicsuffix2 | Get a public suffix for a domain name using the Public Suffix List |
| packages/nixpkgs/python314Packages.publicsuffix2 | Get a public suffix for a domain name using the Public Suffix List |
| packages/nixpkgs/python312Packages.publicsuffix2 | Get a public suffix for a domain name using the Public Suffix List |
| packages/nixpkgs/perlPackages.MooseXSemiAffordanceAccessor | Name your accessors foo() and set_foo() |
| packages/nixpkgs/perl5Packages.MooseXSemiAffordanceAccessor | Name your accessors foo() and set_foo() |
| packages/nixpkgs/perl540Packages.MooseXSemiAffordanceAccessor | Name your accessors foo() and set_foo() |
| packages/nixpkgs/perl538Packages.MooseXSemiAffordanceAccessor | Name your accessors foo() and set_foo() |
| packages/nixpkgs/gnomeExtensions.applications-overview-tooltip | Shows a tooltip over applications icons on applications overview with application name and/or description. |
| packages/nixpkgs/python313Packages.cv2-enumerate-cameras | Retrieve the connected camera's name, VID, PID, and the corresponding OpenCV index |
| packages/nixpkgs/python314Packages.cv2-enumerate-cameras | Retrieve the connected camera's name, VID, PID, and the corresponding OpenCV index |
| packages/nixpkgs/python312Packages.cv2-enumerate-cameras | Retrieve the connected camera's name, VID, PID, and the corresponding OpenCV index |
| packages/nixpkgs/gnomeExtensions.transcodeappsearch | Searching apps both direct and transcoded name (English, Russian, Ukrainian langs) |
| packages/nixpkgs/sbclPackages.network-addresses | |
| packages/nixpkgs/sbclPackages.network-addresses-test | |
| packages/nixpkgs/haskellPackages.cardano-addresses | Utils for constructing a command-line on top of cardano-addresses |
| packages/nixpkgs/rPackages.name | |
| packages/nixpkgs/typstPackages.name-it | Get the English names of integers |
| packages/nixpkgs/rnd-name | Random strings that are easy to recognize |
| packages/nixpkgs/typstPackages.name-it_0_1_0 | Get the English names of integers |
| packages/nixpkgs/typstPackages.name-it_0_1_1 | Get the English names of integers |
| packages/nixpkgs/typstPackages.name-it_0_1_2 | Get the English names of integers |
| packages/nixpkgs/haskellPackages.say-my-name | Require explicit type application for some type variables |
| packages/nixpkgs/ocamlPackages.domain-name | RFC 1035 Internet domain names |
| packages/nixpkgs/haskellPackages.true-name | Template Haskell hack to violate module abstractions |
| packages/nixpkgs/nltk-data.names | NLTK Data |
| packages/nixpkgs/emacsPackages.name-this-color | |
| packages/nixpkgs/ocamlPackages_latest.domain-name | RFC 1035 Internet domain names |
| packages/nixpkgs/python313Packages.name-that-hash | Module and CLI for the identification of hashes |
| packages/nixpkgs/python314Packages.name-that-hash | Module and CLI for the identification of hashes |
| packages/nixpkgs/rubyPackages.unicode-name | |
| packages/nixpkgs/vimPlugins.vim-haskell-module-name | |
| packages/nixpkgs/python312Packages.name-that-hash | Module and CLI for the identification of hashes |
| packages/nixpkgs/edname | Mass renamer using $EDITOR |
| packages/nixpkgs/haskellPackages.hls-module-name-plugin | Module name plugin for Haskell Language Server |
| packages/nixpkgs/rPackages.namer | |
| packages/nixpkgs/vimPlugins.Rename | |
| packages/nixpkgs/emacsPackages.buffer-name-relative | |
| packages/nixpkgs/wmname | Prints or set the window manager name property of the root window |
| packages/nixpkgs/emacsPackages.names | |
| packages/nixpkgs/mnamer | Intelligent and highly configurable media organization utility |
| packages/nixpkgs/rPackages.rnames | |
| packages/nixpkgs/python313Packages.pkgutil-resolve-name | Backport of Python 3.9’s pkgutil.resolve_name |
| packages/nixpkgs/python314Packages.pkgutil-resolve-name | Backport of Python 3.9’s pkgutil.resolve_name |
| packages/nixpkgs/sbclPackages.list-named-class | |
| packages/nixpkgs/haskellPackages.names-th | Manipulate name strings for TH |
| packages/nixpkgs/gnomeExtensions.app-name-indicator | A GNOME Shell extension that shows the active app's name and icon on the left side of the top panel, like it used to. |
| packages/nixpkgs/haskellPackages.named-sop | Dependently-typed sums and products, tagged by field name |
| packages/nixpkgs/haskellPackages.names | Type level names |
| packages/nixpkgs/haskellPackages.named | Named parameters (keyword arguments) for Haskell |
| packages/nixpkgs/vimPlugins.inc-rename-nvim | |
| packages/nixpkgs/python312Packages.pkgutil-resolve-name | Backport of Python 3.9’s pkgutil.resolve_name |
| packages/nixpkgs/lomiri.geonames | Parse and query the geonames database dump |
| packages/nixpkgs/texlivePackages.eqname | Name tags for equations |
| packages/nixpkgs/rename | Rename files according to a Perl rewrite expression |
| packages/nixpkgs/emacsPackages.go-rename | |
| packages/nixpkgs/sbclPackages.named-read-macros | |
| packages/nixpkgs/python313Packages.names | Generate random names |
| packages/nixpkgs/python314Packages.names | Generate random names |
| packages/nixpkgs/vimPlugins.live-rename-nvim | |
| packages/nixpkgs/sbclPackages.named-closure | |
| packages/nixpkgs/python313Packages.namex | Simple utility to separate the implementation of your Python package and its public API surface |
| packages/nixpkgs/python314Packages.namex | Simple utility to separate the implementation of your Python package and its public API surface |
| packages/nixpkgs/vimPlugins.renamer-nvim | |
| packages/nixpkgs/emacsPackages.named-timer | |
| packages/nixpkgs/rPackages.TouRnament | |
| packages/nixpkgs/gnomeExtensions.current-workspace-name | Displays the current workspace name in the panel |
| packages/nixpkgs/emacsPackages.date2name | |
| packages/nixpkgs/vimPlugins.nvim-rename-state | |
| packages/nixpkgs/sbclPackages.named-read-macros-test | |
| packages/nixpkgs/texlivePackages.aaai-named | BibTeX style for AAAI |
| packages/nixpkgs/haskellPackages.lens-named | Helper for use with lens |
| packages/nixpkgs/haskellPackages.data-named | Data types for named entities |
| packages/nixpkgs/haskellPackages.named-lock | A named lock that is created on demand |
| packages/nixpkgs/haskellPackages.named-text | A parameterized named text type and associated functionality |
| packages/nixpkgs/emacsPackages.wfnames | |
| packages/nixpkgs/unixtools.hostname | |
| packages/nixpkgs/pipe-rename | Rename your files using your favorite text editor |
| packages/nixpkgs/haskellPackages.pdfname | Name a PDF file using information from the pdfinfo command |
| packages/nixpkgs/emacsPackages.auto-rename-tag | |
| packages/nixpkgs/dnsname-cni | DNS name resolution for containers |
| packages/nixpkgs/tvnamer | Automatic TV episode file renamer, uses data from thetvdb.com via tvdb_api |
| packages/nixpkgs/sbclPackages.pathname-utils | |
| packages/nixpkgs/regname | Mass renamer TUI written in Rust |
| packages/nixpkgs/python313Packages.nameko | Microservices framework that lets service developers concentrate on application logic and encourages testability |
| packages/nixpkgs/python314Packages.nameko | Microservices framework that lets service developers concentrate on application logic and encourages testability |
| packages/nixpkgs/rPackages.envnames | |
| packages/nixpkgs/rPackages.codename | |
| packages/nixpkgs/rPackages.acroname | |
| packages/nixpkgs/rPackages.geonames | |
| packages/nixpkgs/rPackages.taxnames | |
| packages/nixpkgs/haskellPackages.valid-names | Valid operator/module characters |
| packages/nixpkgs/rPackages.namedCapture | |
| packages/nixpkgs/rPackages.namedropR | |
| packages/nixpkgs/krename | Powerful batch renamer for KDE |
| packages/nixpkgs/sbclPackages.pcl-pathnames | |
| packages/nixpkgs/haskellPackages.by-other-names | Give aliases to record fields |
| packages/nixpkgs/python313Packages.html-tag-names | List of known HTML tags |
| packages/nixpkgs/python314Packages.html-tag-names | List of known HTML tags |
| packages/nixpkgs/sbclPackages.trivial-renamer | |
| packages/nixpkgs/file-rename | Perl extension for renaming multiple files |
| packages/nixpkgs/gprename | Complete batch renamer for files and directories |
| packages/nixpkgs/texlivePackages.namedef | TeX definitions with named parameters |
| packages/nixpkgs/texlivePackages.numname | Convert a number to its English expression |
| packages/nixpkgs/texlivePackages.namespc | Rudimentary C++-like namespaces in LaTeX |
| packages/nixpkgs/haskellPackages.horname | Rename function definitions returned by SMT solvers |
| packages/nixpkgs/sbclPackages.lisp-namespace | |
| packages/nixpkgs/sbclPackages.pathname-utils-test | |
| packages/nixpkgs/perlPackages.ParseDistname | Parse a distribution name |
| packages/nixpkgs/emacsPackages.nameless | |
| packages/nixpkgs/texlivePackages.nameauth | Name authority mechanism for consistency in body text and index |
| packages/nixpkgs/python312Packages.names | Generate random names |
| packages/nixpkgs/perlPackages.CPANDistnameInfo | Extract distribution name and version from a distribution filename |
| packages/nixpkgs/haskellPackages.haskell-names | Name resolution library for Haskell |
| packages/nixpkgs/python312Packages.namex | Simple utility to separate the implementation of your Python package and its public API surface |
| packages/nixpkgs/flut-renamer | Bulk file renamer written in flutter |
| packages/nixpkgs/perl5Packages.ParseDistname | Parse a distribution name |
| packages/nixpkgs/haskellPackages.random-names | Expose Random and Arbitrary instances |
| packages/nixpkgs/sbclPackages.lunamech-matrix-api | |
| packages/nixpkgs/python313Packages.coolname | Random Name and Slug Generator |
| packages/nixpkgs/python314Packages.coolname | Random Name and Slug Generator |
| packages/nixpkgs/haskellPackages.batch-rename | Make Linux or MacOS do things like "rename *.mp3 *.mp4" |
| packages/nixpkgs/perl5Packages.CPANDistnameInfo | Extract distribution name and version from a distribution filename |
| packages/nixpkgs/perlPackages.TestFilename | Portable filename comparison |
| packages/nixpkgs/rubyPackages_3_2.unicode-name | |
| packages/nixpkgs/rubyPackages_3_1.unicode-name | |
| packages/nixpkgs/rubyPackages_3_5.unicode-name | |
| packages/nixpkgs/rubyPackages_3_3.unicode-name | |
| packages/nixpkgs/rubyPackages_3_4.unicode-name | |
| packages/nixpkgs/rubyPackages_4_0.unicode-name | |
| packages/nixpkgs/rPackages.babynames | |
| packages/nixpkgs/rPackages.filenamer | |
| packages/nixpkgs/rPackages.namespace | |
| packages/nixpkgs/hostname | |
| packages/nixpkgs/akkuPackages.slib-filename | String matching for filenames (glob, a la BASH) |
| packages/nixpkgs/haskellPackages.named-binary-tag | NBT (named binary tag) serialization and deserialization |
| packages/nixpkgs/rPackages.babynamesIL | |
| packages/nixpkgs/emacsPackages.info-rename-buffer | |
| packages/nixpkgs/perl5Packages.TestFilename | Portable filename comparison |
| packages/nixpkgs/rust-petname | Generate human readable random names |
| packages/nixpkgs/CuboCore.corerenamer | Batch file renamer from the C Suite |
| packages/nixpkgs/perlPackages.SysHostnameLong | Try every conceivable way to get full hostname |
| packages/nixpkgs/haskellPackages.vinyl-named-sugar | Syntax sugar for vinyl records using overloaded labels |
| packages/nixpkgs/python312Packages.nameko | Microservices framework that lets service developers concentrate on application logic and encourages testability |
| packages/nixpkgs/texlivePackages.fontname | Scheme for naming fonts in TeX |
| packages/nixpkgs/texlivePackages.hepnames | Pre-defined high energy particle names |
| packages/nixpkgs/haskellPackages.namelist | fortran90 namelist parser/pretty printer |
| packages/nixpkgs/haskellPackages.epubname | Rename epub ebook files based on meta information |
| packages/nixpkgs/haskellPackages.hostname | A very simple package providing a cross-platform means of determining the hostname |
| packages/nixpkgs/texlivePackages.langnames | Name languages and their genetic affiliations consistently |
| packages/nixpkgs/texlivePackages.numnameru | Converts a number to the russian spelled out name |
| packages/nixpkgs/akkuPackages.chibi-pathname | A general, non-filesystem-specific pathname library |
| packages/nixpkgs/perl5Packages.SysHostnameLong | Try every conceivable way to get full hostname |
| packages/nixpkgs/python312Packages.html-tag-names | List of known HTML tags |
| packages/nixpkgs/haskellPackages.named-records | Flexible records with named fields |
| packages/nixpkgs/haskellPackages.servant-named | Add named endpoints to servant |
| packages/nixpkgs/haskellPackages.unicode-names | Unicode 3.2.0 character names |
| packages/nixpkgs/haskellPackages.named-formlet | A simple formlet library with named formlets |
| packages/nixpkgs/emacsPackages.nameframe | |
| packages/nixpkgs/haskellPackages.named-servant | support records and named (from the named package) parameters in servant |
| packages/nixpkgs/python312Packages.coolname | Random Name and Slug Generator |
| packages/nixpkgs/haskellPackages.hls-rename-plugin | Rename plugin for Haskell Language Server |
| packages/nixpkgs/perl540Packages.ParseDistname | Parse a distribution name |
| packages/nixpkgs/perl538Packages.ParseDistname | Parse a distribution name |
| packages/nixpkgs/hostname-debian | Utility to set/show the host name or domain name |
| packages/nixpkgs/perl538Packages.CPANDistnameInfo | Extract distribution name and version from a distribution filename |
| packages/nixpkgs/perl540Packages.CPANDistnameInfo | Extract distribution name and version from a distribution filename |
| packages/nixpkgs/sbclPackages.named-readtables | |
| packages/nixpkgs/texlivePackages.jobname-suffix | Compile differently based on the filename |
| packages/nixpkgs/emacsPackages.with-namespace | |
| packages/nixpkgs/rPackages.nametagger | |
| packages/nixpkgs/rPackages.matsbyname | |
| packages/nixpkgs/haskellPackages.unicode-data-names | Unicode characters names and aliases |
| packages/nixpkgs/perlPackages.Perlosnames | List possible $^O ($OSNAME) values, with description |
| packages/nixpkgs/perl540Packages.TestFilename | Portable filename comparison |
| packages/nixpkgs/perl538Packages.TestFilename | Portable filename comparison |
| packages/nixpkgs/haskellPackages.namespace | A Generic Haskell library for managing namespaces |
| packages/nixpkgs/perl5Packages.Perlosnames | List possible $^O ($OSNAME) values, with description |
| packages/nixpkgs/haskellPackages.bindings-uname | Low-level binding to POSIX uname(3) |
| packages/nixpkgs/haskellPackages.photoname | Rename photo image files based on EXIF shoot date |
| packages/nixpkgs/sbclPackages.named-readtables-test | |
| packages/nixpkgs/sbclPackages.symbol-namespaces | |
| packages/nixpkgs/rubyPackages.domain_name | |
| packages/nixpkgs/unnamed-sdvx-clone | Game based on K-Shoot MANIA and Sound Voltex |
| packages/nixpkgs/emacsPackages.namespaces | |
| packages/nixpkgs/perl538Packages.SysHostnameLong | Try every conceivable way to get full hostname |
| packages/nixpkgs/perl540Packages.SysHostnameLong | Try every conceivable way to get full hostname |
| packages/nixpkgs/all-the-package-names | List of all the public package names on npm |
| packages/nixpkgs/python313Packages.namedlist | Similar to namedtuple, but instances are mutable |
| packages/nixpkgs/python314Packages.namedlist | Similar to namedtuple, but instances are mutable |
| packages/nixpkgs/python313Packages.wheel-filename | Parse wheel filenames |
| packages/nixpkgs/python314Packages.wheel-filename | Parse wheel filenames |
| packages/nixpkgs/python313Packages.ipynbname | Simply returns either notebook filename or the full path to the notebook |
| packages/nixpkgs/python314Packages.ipynbname | Simply returns either notebook filename or the full path to the notebook |
| packages/nixpkgs/sbclPackages.slynk-named-readtables | |
| packages/nixpkgs/haskellPackages.foscam-filename | Foscam File format |
| packages/nixpkgs/haskellPackages.namecoin-update | Tool to keep namecoin names updated and well |
| packages/nixpkgs/emacsPackages.hippie-namespace | |
| packages/nixpkgs/haskellPackages.named-servant-server | server support for named-servant |
| packages/nixpkgs/haskellPackages.named-servant-client | client support for named-servant |
| packages/nixpkgs/rPackages.ozbabynames | |
| packages/nixpkgs/rPackages.onbabynames | |
| packages/nixpkgs/rPackages.ukbabynames | |
| packages/nixpkgs/haskellPackages.hedis-namespace | Initial project template from stack |
| packages/nixpkgs/haskellPackages.multipart-names | Handling of multipart names in various casing styles |
| packages/nixpkgs/haskellPackages.Tournament | Tournament related algorithms |
| packages/nixpkgs/namecoind | Decentralized open source information registration and transfer system based on the Bitcoin cryptocurrency |
| packages/nixpkgs/haskellPackages.hashrename | Rename every file in a directory with his SHA1 hash |
| packages/nixpkgs/skkDictionaries.fullname | SKK dictionary for celebrities |
| packages/nixpkgs/python312Packages.namedlist | Similar to namedtuple, but instances are mutable |
| packages/nixpkgs/python312Packages.wheel-filename | Parse wheel filenames |
| packages/nixpkgs/emacsPackages.visual-filename-abbrev | |
| packages/nixpkgs/perl540Packages.Perlosnames | List possible $^O ($OSNAME) values, with description |
| packages/nixpkgs/perl538Packages.Perlosnames | List possible $^O ($OSNAME) values, with description |
| packages/nixpkgs/python312Packages.ipynbname | Simply returns either notebook filename or the full path to the notebook |
| packages/nixpkgs/haskellPackages.linux-namespaces | Work with linux namespaces: create new or enter existing ones |
| packages/nixpkgs/emacsPackages.nameframe-project | |
| packages/nixpkgs/sbclPackages.illogical-pathnames | |
| packages/nixpkgs/haskellPackages.DAG-Tournament | Real-Time Game Tournament Evaluator |
| packages/nixpkgs/emacsPackages.sly-named-readtables | |
| packages/nixpkgs/python313Packages.nameparser | Module for parsing human names into their individual components |
| packages/nixpkgs/python314Packages.nameparser | Module for parsing human names into their individual components |
| packages/nixpkgs/gnomeExtensions.show-hostname-and-ip | Displays the machine’s hostname and local IP address directly on the desktop. |
| packages/nixpkgs/wg-friendly-peer-names | Small shellscript that makes it possible to give peers a friendlier and more readable name in the `wg` peer list |
| packages/nixpkgs/python313Packages.lance-namespace | Open specification on top of the storage-based Lance table and file format to standardize access to a collection of Lance tables |
| packages/nixpkgs/python314Packages.lance-namespace | Open specification on top of the storage-based Lance table and file format to standardize access to a collection of Lance tables |
| packages/nixpkgs/chickenPackages_5.chickenEggs.unitex-named-chars | Unicode & LaTeX Named Chars |
| packages/nixpkgs/namespace-cli | Command line interface for the Namespaces platform |
| packages/nixpkgs/gnomeExtensions.hostname-on-panel | Displays the Hostname on the Gnome Panel |
| packages/nixpkgs/python313Packages.zope-dottedname | Resolver for Python dotted names |
| packages/nixpkgs/python314Packages.zope-dottedname | Resolver for Python dotted names |
| packages/nixpkgs/texlivePackages.babel-vietnamese | Babel support for typesetting Vietnamese |
| packages/nixpkgs/haskellPackages.hostname-validate | Validate hostnames e.g. localhost or foo.co.uk. |
| packages/nixpkgs/haskellPackages.postgresql-named | Generic deserialization of PostgreSQL rows based on column names |
| packages/nixpkgs/haskellPackages.servant-namedargs | Combinators for servant providing named parameters |
| packages/nixpkgs/gnomeExtensions.add-username-to-top-panel | Simply add your username to topbar panel quick settings menu. |
| packages/nixpkgs/luarenamer | Plugin for Shoko that allows users to rename their collection using Lua |
| packages/nixpkgs/texlivePackages.namedtensor | Macros for named tensor notation |
| packages/nixpkgs/python312Packages.nameparser | Module for parsing human names into their individual components |
| packages/nixpkgs/texlivePackages.pgfornament | Drawing of Vectorian ornaments with PGF/TikZ |
| packages/nixpkgs/uutils-hostname | Rust reimplementation of the hostname project |
| packages/nixpkgs/python312Packages.lance-namespace | Open specification on top of the storage-based Lance table and file format to standardize access to a collection of Lance tables |
| packages/nixpkgs/texlivePackages.hyphen-vietnamese | Vietnamese hyphenation patterns. |
| packages/nixpkgs/texlivePackages.lshort-vietnamese | Vietnamese version of the LaTeX introduction |
| packages/nixpkgs/texlivePackages.pgfornament-han | pgfornament library for Chinese traditional motifs and patterns |
| packages/nixpkgs/chickenPackages_5.chickenEggs.pathname-expand | |
| packages/nixpkgs/sbclPackages.trivial-package-local-nicknames | |
| packages/nixpkgs/python313Packages.pynamecheap | Namecheap API client in Python |
| packages/nixpkgs/python314Packages.pynamecheap | Namecheap API client in Python |
| packages/nixpkgs/python312Packages.zope-dottedname | Resolver for Python dotted names |
| packages/nixpkgs/texlivePackages.biblatex-morenames | New names for standard BibLaTeX entry type |
| packages/nixpkgs/terraform-providers.namecheap | |
| packages/nixpkgs/akkuPackages.retropikzel-named-pipes | Library for using named pipes |
| packages/nixpkgs/haskellPackages.time-locale-vietnamese | Vietnamese locale for date and time format |
| packages/nixpkgs/mozcdic-ut-place-names | Dictionary converted from the Japan Post's ZIP code data for Mozc |
| packages/nixpkgs/deterministic-uname | Print certain system information (hardcoded with lib/system values) |
| packages/nixpkgs/gnomeExtensions.username-in-top-panel-right-side | Displays the current username in the top panel, positioned at the far right after the power button. |
| packages/nixpkgs/python312Packages.pynamecheap | Namecheap API client in Python |
| packages/nixpkgs/perlPackages.namespaceclean | Keep imports and functions out of your namespace |
| packages/nixpkgs/rPackages.vietnameseConverter | |
| packages/nixpkgs/python313Packages.lance-namespace-urllib3-client | Lance namespace OpenAPI specification |
| packages/nixpkgs/python314Packages.lance-namespace-urllib3-client | Lance namespace OpenAPI specification |
| packages/nixpkgs/haskellPackages.postgresql-simple-named | Implementation of named parameters for `postgresql-simple` library |
| packages/nixpkgs/deterministic-host-uname | Print certain system information (hardcoded with lib/system values) |
| packages/nixpkgs/texlivePackages.mpcolornames | Extend list of predefined colour names for MetaPost |
| packages/nixpkgs/haskellPackages.servant-client-namedargs | Automatically derive API client functions with named and optional parameters |
| packages/nixpkgs/haskellPackages.servant-server-namedargs | Automatically derive API server functions with named and optional parameters |
| packages/nixpkgs/perl5Packages.namespaceclean | Keep imports and functions out of your namespace |
| packages/nixpkgs/haskellPackages.xmonad-windownames | A library to automatically put named windows into the DynamicLog |
| packages/nixpkgs/haskellPackages.hls-qualify-imported-names-plugin | A Haskell Language Server plugin that qualifies imported names |
| packages/nixpkgs/python313Packages.pytest-helpers-namespace | PyTest Helpers Namespace |
| packages/nixpkgs/python314Packages.pytest-helpers-namespace | PyTest Helpers Namespace |
| packages/nixpkgs/sbclPackages.cl-ana_dot_pathname-utils | |
| packages/nixpkgs/emacsPackages.nameframe-projectile | |
| packages/nixpkgs/username-anarchy | Username generator tool for penetration testing |
| packages/nixpkgs/biosdevname | Udev helper for naming devices per BIOS names |
| packages/nixpkgs/python312Packages.lance-namespace-urllib3-client | Lance namespace OpenAPI specification |
| packages/nixpkgs/python312Packages.pytest-helpers-namespace | PyTest Helpers Namespace |
| packages/nixpkgs/terraform-providers.namecheap_namecheap | |
| packages/nixpkgs/perl540Packages.namespaceclean | Keep imports and functions out of your namespace |
| packages/nixpkgs/perl538Packages.namespaceclean | Keep imports and functions out of your namespace |
| packages/nixpkgs/haskellPackages.primitive-stablename | primitive operations on StableNames |
| packages/nixpkgs/emacsPackages.nameframe-perspective | |
| packages/nixpkgs/perlPackages.TestRunPluginTrimDisplayedFilenames | Trim the first components |
| packages/nixpkgs/perl5Packages.TestRunPluginTrimDisplayedFilenames | Trim the first components |
| packages/nixpkgs/vscode-extensions.usernamehw.errorlens | Visual Studio Code extension that improves highlighting of errors, warnings and other language diagnostics |
| packages/nixpkgs/sbclPackages.lisp-namespace_dot_test | |
| packages/nixpkgs/texlivePackages.varsfromjobname | Extract variables from the name of the LaTeX file |
| packages/nixpkgs/renameutils | Set of programs to make renaming of files faster |
| packages/nixpkgs/ocamlPackages.username_kernel | Identifier for a user |
| packages/nixpkgs/perl538Packages.TestRunPluginTrimDisplayedFilenames | Trim the first components |
| packages/nixpkgs/perl540Packages.TestRunPluginTrimDisplayedFilenames | Trim the first components |
| packages/nixpkgs/reattach-to-user-namespace | Wrapper that provides access to the Mac OS X pasteboard service |
| packages/nixpkgs/rPackages.proceduralnames | |
| packages/nixpkgs/gnomeExtensions.quick-settings-audio-devices-renamer | It lets you change the names of your audio devices in the Quick Settings Audio Panel |
| packages/nixpkgs/namespaced-openvpn | Network namespace isolation for OpenVPN tunnels |
| packages/nixpkgs/rubyPackages_3_2.domain_name | |
| packages/nixpkgs/rubyPackages_3_1.domain_name | |
| packages/nixpkgs/mozcdic-ut-personal-names | Dictionary for Mozc |
| packages/nixpkgs/rubyPackages_3_5.domain_name | |
| packages/nixpkgs/perlPackages.SubName | (Re)name a sub |
| packages/nixpkgs/ocamlPackages.janeStreet.username_kernel | Identifier for a user |
| packages/nixpkgs/vscode-extensions.formulahendry.auto-rename-tag | |
| packages/nixpkgs/perl5Packages.SubName | (Re)name a sub |
| packages/nixpkgs/ocamlPackages_latest.username_kernel | Identifier for a user |
| packages/nixpkgs/home-assistant-component-tests.namecheapdns | Open source home automation that puts local control and privacy first |
| packages/nixpkgs/haskellPackages.linux-namespaces_0_2_0_1 | Work with linux namespaces: create new or enter existing ones |
| packages/nixpkgs/rubyPackages_3_3.domain_name | |
| packages/nixpkgs/rubyPackages_4_0.domain_name | |
| packages/nixpkgs/rubyPackages_3_4.domain_name | |
| packages/nixpkgs/ocamlPackages_latest.janeStreet.username_kernel | Identifier for a user |
| packages/nixpkgs/perlPackages.namespaceautoclean | Keep imports out of your namespace |
| packages/nixpkgs/perl5Packages.namespaceautoclean | Keep imports out of your namespace |
| packages/nixpkgs/texlivePackages.longnamefilelist | Tidy \listfiles with long file names |
| packages/nixpkgs/perl538Packages.namespaceautoclean | Keep imports out of your namespace |
| packages/nixpkgs/perl540Packages.namespaceautoclean | Keep imports out of your namespace |
| packages/nixpkgs/rPackages.touRnamentofchampions | |
| packages/nixpkgs/hyprland-autoname-workspaces | Automatically rename workspaces with icons of started applications |
| packages/nixpkgs/sbclPackages.cl-glfw-opengl-amd__name__gen__delete | |
| packages/nixpkgs/perl540Packages.SubName | (Re)name a sub |
| packages/nixpkgs/perl538Packages.SubName | (Re)name a sub |
| packages/nixpkgs/libuninameslist | Library of Unicode names and annotation data |
| packages/nixpkgs/perlPackages.SymbolGlobalName | Finds name and type of a global variable |
| packages/nixpkgs/perl5Packages.SymbolGlobalName | Finds name and type of a global variable |
| packages/nixpkgs/perl540Packages.SymbolGlobalName | Finds name and type of a global variable |
| packages/nixpkgs/perl538Packages.SymbolGlobalName | Finds name and type of a global variable |
| packages/nixpkgs/sbclPackages.com_dot_gigamonkeys_dot_pathnames | |
| packages/nixpkgs/python313Packages.pythonNamespacesHook | |
| packages/nixpkgs/python314Packages.pythonNamespacesHook | |
| packages/nixpkgs/python312Packages.pythonNamespacesHook | |
| packages/nur/wrvsrx.goauthing | Authentication utility for srun4000 (auth.tsinghua.edu.cn / net.tsinghua.edu.cn / Tsinghua-IPv4) |
| packages/nur/rycee.firefox-addons.ipvfoo | Display the server IP address, with a realtime summary of IPv4, IPv6, and HTTPS information across all page elements. |
| packages/nur/lennis-dev.email-obfuscater | Obfuscate email addresses, only with JavaScript |
| packages/nur/c2vi.mac-telnet | Open source MAC Telnet client and server for connecting to Mikrotik RouterOS routers and Posix devices using MAC addresses |
| packages/nur/nagy.unum | Utility for looking up Unicode characters and HTML entities by code, name, block, or description |
| packages/nur/xddxdd.soggy | Experimental server emulator for a game I forgot its name |
| packages/nur/shadowrz.mkxp-z | RGSS on Steroids |
| packages/nur/xyenon.yaziPlugins.yazi-rs.jump-to-char | Vim-like `f<char>`, jump to the next file whose name starts with `<char>` |
| packages/nur/xddxdd.uncategorized.soggy | Experimental server emulator for a game I forgot its name |
| packages/nur/rycee.firefox-addons.matte-black-red | A modern dark / Matte Black theme with a red accent color |
| packages/nur/codgician.ms213x-rename | A tool that helps you modify the basic EDID information in the MS213X collector firmware, such as the display name, serial number etc. |