| options/nixos/services.zabbixWeb.nginx.virtualHost | Nginx configuration can be done by adapting services.nginx.virtualHosts.<name>
|
| options/nixos/services.drupal.webserver | Whether to use nginx or caddy for virtual host management
|
| options/nixos/services.nominatim.enable | Whether to enable nominatim
|
| options/nixos/services.roundcube.enable | Whether to enable roundcube
|
| options/nixos/services.freshrss.webserver | Whether to use nginx or caddy for virtual host management
|
| options/nixos/services.dokuwiki.webserver | Whether to use nginx or caddy for virtual host management
|
| options/nixos/services.wordpress.webserver | Whether to use apache2 or nginx for virtual host management
|
| options/nixos/services.limesurvey.nginx.virtualHost | Nginx configuration can be done by adapting services.nginx.virtualHosts.<name>
|
| options/nixos/services.postfixadmin.enable | Whether to enable postfixadmin
|
| options/nixos/services.sympa.web.server | The webserver used for the Sympa web interface
|
| options/nixos/services.nginx.virtualHosts.<name>.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.nginx.virtualHosts.<name>.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.davis.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.movim.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.slskd.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.snipe-it.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.gancio.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.fluidd.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.akkoma.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.matomo.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.monica.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.fedimintd.<name>.nginx.config.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.davis.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.movim.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.slskd.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.snipe-it.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.agorakit.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.fediwall.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.kanboard.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.librenms.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.dolibarr.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.pixelfed.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.mainsail.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.gancio.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.akkoma.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.fluidd.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.matomo.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.monica.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.fedimintd.<name>.nginx.config.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.radicle.httpd.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.anuko-time-tracker.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.bookstack.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.jirafeau.nginxConfig.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.kanboard.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.librenms.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.dolibarr.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.fediwall.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.agorakit.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.pixelfed.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.mainsail.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.radicle.httpd.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.anuko-time-tracker.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.bookstack.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.jirafeau.nginxConfig.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.limesurvey.nginx.virtualHost.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.limesurvey.nginx.virtualHost.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.nginx.virtualHosts.<name>.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.nginx.virtualHosts.<name>.kTLS | Whether to enable kTLS support
|
| options/nixos/services.nginx.virtualHosts.<name>.root | The path of the web root directory.
|
| options/nixos/services.nginx.virtualHosts.<name>.quic | Whether to enable the QUIC transport protocol
|
| options/nixos/services.nginx.virtualHosts.<name>.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| options/nixos/services.nginx.virtualHosts.<name>.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| options/nixos/services.nginx.virtualHosts.<name>.http2 | Whether to enable the HTTP/2 protocol
|
| options/nixos/services.nginx.virtualHosts.<name>.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.nginx.virtualHosts.<name>.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| options/nixos/services.nginx.virtualHosts.<name>.serverName | Name of this virtual host
|
| options/nixos/services.nginx.virtualHosts.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.nginx.virtualHosts.<name>.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.nginx.virtualHosts.<name>.listen | Listen addresses and ports for this virtual host
|
| options/nixos/services.nginx.virtualHosts.<name>.listen.*.ssl | Enable SSL.
|
| options/nixos/services.nginx.virtualHosts.<name>.listen.*.addr | Listen address.
|
| options/nixos/services.nginx.virtualHosts.<name>.listen.*.port | Port number to listen on
|
| options/nixos/services.nginx.virtualHosts.<name>.enableACME | Whether to ask Let's Encrypt to sign a certificate for this vhost
|
| options/nixos/services.nginx.virtualHosts.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.nginx.virtualHosts.<name>.default | Makes this vhost the default.
|
| options/nixos/services.nginx.virtualHosts.<name>.extraConfig | These lines go to the end of the vhost verbatim.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.index | Adds index directive.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.nginx.virtualHosts.<name>.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| options/nixos/services.nginx.virtualHosts.<name>.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.nginx.virtualHosts.<name>.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations | Declarative location config
|
| options/nixos/services.nginx.virtualHosts.<name>.reuseport | Create an individual listening socket
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.nginx.virtualHosts.<name>.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.nginx.virtualHosts.<name>.listen.*.proxyProtocol | Enable PROXY protocol.
|
| options/nixos/services.nginx.virtualHosts.<name>.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.nginx.virtualHosts.<name>.sslCertificate | Path to server SSL certificate.
|
| options/nixos/services.nginx.virtualHosts.<name>.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.tomcat.virtualHosts.*.name | name of the virtualhost
|
| options/nixos/services.nginx.virtualHosts.<name>.listen.*.extraParameters | Extra parameters of this listen directive.
|
| options/nixos/services.rutorrent.nginx.enable | Whether to enable nginx virtual host management
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.nginx.virtualHosts.<name>.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| options/nixos/services.httpd.virtualHosts.<name>.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| options/nixos/services.httpd.virtualHosts.<name>.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| options/nixos/services.httpd.virtualHosts.<name>.hostName | Canonical hostname for the server.
|
| options/nixos/services.caddy.virtualHosts.<name>.hostName | Canonical hostname for the server.
|
| options/nixos/services.httpd.virtualHosts.<name>.http2 | Whether to enable HTTP 2
|
| options/nixos/services.httpd.virtualHosts.<name>.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| options/nixos/services.httpd.virtualHosts.<name>.forceSSL | Whether to add a separate nginx server block that permanently redirects (301)
all plain HTTP traffic to HTTPS
|
| options/nixos/services.prosody.virtualHosts.<name>.ssl.key | Path to the key file.
|
| options/nixos/services.prosody.virtualHosts.<name>.ssl | Paths to SSL files
|
| options/nixos/services.httpd.virtualHosts.<name>.adminAddr | E-mail address of the server administrator.
|
| options/nixos/services.caddy.virtualHosts.<name>.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.httpd.virtualHosts.<name>.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.httpd.virtualHosts.<name>.listen | Listen addresses and ports for this virtual host.
This option overrides addSSL, forceSSL and onlySSL
|
| options/nixos/services.httpd.virtualHosts.<name>.listen.*.ip | IP to listen on. 0.0.0.0 for IPv4 only, * for all.
|
| options/nixos/services.prosody.virtualHosts.<name>.ssl.cert | Path to the certificate file.
|
| options/nixos/services.fedimintd.<name>.nginx.config.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.httpd.virtualHosts.<name>.listen.*.ssl | Whether to enable SSL (https) support.
|
| options/nixos/services.httpd.virtualHosts.<name>.logFormat | Log format for Apache's log files
|
| options/nixos/services.caddy.virtualHosts.<name>.logFormat | Configuration for HTTP request logging (also known as access logs)
|
| options/nixos/services.httpd.virtualHosts.<name>.listen.*.port | Port to listen on
|
| options/nixos/services.httpd.virtualHosts.<name>.sslServerKey | Path to server SSL certificate key.
|
| options/nixos/services.httpd.virtualHosts.<name>.servedDirs | This option provides a simple way to serve static directories.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.httpd.virtualHosts.<name>.enableACME | Whether to ask Let's Encrypt to sign a certificate for this vhost
|
| options/nixos/services.prosody.virtualHosts.<name>.domain | Domain name
|
| options/nixos/services.httpd.virtualHosts.<name>.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/nixos/services.httpd.virtualHosts.<name>.sslServerCert | Path to server SSL certificate.
|
| options/nixos/services.httpd.virtualHosts.<name>.enableUserDir | Whether to enable serving ~/public_html as
/~«username».
|
| options/nixos/services.caddy.virtualHosts.<name>.extraConfig | Additional lines of configuration appended to this virtual host in the
automatically generated Caddyfile.
|
| options/nixos/services.httpd.virtualHosts.<name>.extraConfig | These lines go to httpd.conf verbatim
|
| options/nixos/services.oauth2-proxy.nginx.virtualHosts.<name>.allowed_emails | List of emails to allow access to this vhost, or null to allow all.
|
| options/nixos/services.oauth2-proxy.nginx.virtualHosts.<name>.allowed_groups | List of groups to allow access to this vhost, or null to allow all.
|
| options/nixos/services.httpd.virtualHosts.<name>.sslServerChain | Path to server SSL chain file.
|
| options/nixos/services.httpd.virtualHosts.<name>.locations.<name>.index | Adds DirectoryIndex directive
|
| options/nixos/services.httpd.virtualHosts.<name>.locations.<name>.alias | Alias directory for requests
|
| options/nixos/services.prosody.virtualHosts.<name>.enabled | Whether to enable the virtual host
|
| options/nixos/services.cgit.<name>.nginx.virtualHost | VirtualHost to serve cgit on, defaults to the attribute name.
|
| options/nixos/services.httpd.virtualHosts.<name>.documentRoot | The path of Apache's document root directory
|
| options/nixos/services.prosody.virtualHosts.<name>.extraConfig | Additional virtual host specific configuration
|
| options/nixos/services.httpd.virtualHosts.<name>.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.httpd.virtualHosts.<name>.robotsEntries | Specification of pages to be ignored by web crawlers
|
| options/nixos/services.caddy.virtualHosts.<name>.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.httpd.virtualHosts.<name>.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/nixos/services.httpd.virtualHosts.<name>.locations | Declarative location config
|
| options/nixos/services.prosody.virtualHosts.<name>.ssl.extraOptions | Extra SSL configuration options.
|
| options/nixos/services.httpd.virtualHosts.<name>.globalRedirect | If set, all requests for this host are redirected permanently to
the given URL.
|
| options/nixos/services.httpd.virtualHosts.<name>.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.httpd.virtualHosts.<name>.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.caddy.virtualHosts.<name>.listenAddresses | A list of host interfaces to bind to for this virtual host.
|
| options/nixos/services.httpd.virtualHosts.<name>.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.tomcat.virtualHosts | List consisting of a virtual host name and a list of web applications to deploy on each virtual host
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.oauth2-proxy.nginx.virtualHosts.<name>.allowed_email_domains | List of email domains to allow access to this vhost, or null to allow all.
|
| options/nixos/services.jitsi-meet.nginx.enable | Whether to enable nginx virtual host that will serve the javascript application and act as
a proxy for the XMPP server
|
| options/nixos/services.rutorrent.nginx.exposeInsecureRPC2mount | If you do not enable one of the rpc or httprpc plugins you need to expose an RPC mount through scgi using this option
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.index | Adds index directive.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.homer.virtualHost.domain | Domain to use for the virtual host
|
| options/nixos/services.dashy.virtualHost.domain | Domain to use for the virtual host
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.openssh.knownHosts.<name>.hostNames | A list of host names and/or IP numbers used for accessing
the host's ssh service
|
| options/nixos/services.limesurvey.nginx.virtualHost.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.index | Adds index directive.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.openssh.knownHosts.<name>.publicKey | The public key data for the host
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.openssh.knownHosts.<name>.extraHostNames | A list of additional host names and/or IP numbers used for
accessing the host's ssh service
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.openssh.knownHosts.<name>.publicKeyFile | The path to the public key file for the host
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.serverName | Name of this virtual host
|
| options/darwin/programs.ssh.knownHosts.<name>.hostNames | The set of system-wide known SSH hosts
|
| options/nixos/services.davis.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.slskd.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.movim.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.gitlab-runner.services.<name>.dockerExtraHosts | Add a custom host-to-IP mapping.
|
| options/darwin/services.gitlab-runner.services.<name>.dockerExtraHosts | Add a custom host-to-IP mapping.
|
| options/nixos/services.openssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| options/nixos/services.snipe-it.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/programs.ssh.knownHosts.<name>.hostNames | A list of host names and/or IP numbers used for accessing
the host's ssh service
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.akkoma.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.fluidd.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.gancio.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.monica.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.matomo.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.nginx.proxyCachePath.<name>.maxSize | Set maximum cache size
|
| options/nixos/services.nginx.proxyCachePath.<name>.keysZoneName | Set name to shared memory zone.
|
| options/nixos/services.drupal.sites.<name>.virtualHost | Apache configuration can be done by adapting services.httpd.virtualHosts.
|
| options/nixos/services.cgit.<name>.nginx.location | Location to serve cgit under.
|
| options/nixos/programs.ssh.knownHosts.<name>.publicKey | The public key data for the host
|
| options/darwin/programs.ssh.knownHosts.<name>.publicKey | The public key data for the host
|
| options/nixos/boot.uki.name | Name of the UKI
|
| options/nixos/services.drupal.sites.<name>.virtualHost.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| options/nixos/services.drupal.sites.<name>.virtualHost.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| options/nixos/services.drupal.sites.<name>.virtualHost.hostName | Canonical hostname for the server.
|
| options/nixos/services.nginx.proxyCachePath.<name>.enable | Whether to enable this proxy cache path entry.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| options/nixos/services.drupal.sites.<name>.virtualHost.http2 | Whether to enable HTTP 2
|
| options/nixos/services.nginx.proxyCachePath.<name>.keysZoneSize | Set size to shared memory zone.
|
| options/nixos/programs.ssh.knownHosts.<name>.extraHostNames | A list of additional host names and/or IP numbers used for
accessing the host's ssh service
|
| options/darwin/programs.ssh.knownHosts.<name>.extraHostNames | A list of additional host names and/or IP numbers used for
accessing the host's ssh service
|
| options/nixos/services.radicle.httpd.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.limesurvey.nginx.virtualHost.serverName | Name of this virtual host
|
| options/home-manager/gtk.font.name | The family name of the font within the package.
|
| options/home-manager/launchd.agents.<name>.config.LimitLoadToHosts | This configuration file only applies to the hosts listed with this key
|
| options/nixos/services.nginx.proxyCachePath.<name>.useTempPath | Nginx first writes files that are destined for the cache to a temporary
storage area, and the use_temp_path=off directive instructs Nginx to
write them to the same directories where they will be cached
|
| options/nixos/services.drupal.sites.<name>.virtualHost.adminAddr | E-mail address of the server administrator.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/darwin/programs.ssh.knownHosts.<name>.publicKeyFile | The path to the public key file for the host
|
| options/nixos/services.nginx.proxyCachePath.<name>.levels | The levels parameter defines structure of subdirectories in cache: from
1 to 3, each level accepts values 1 or 2
|
| options/nixos/services.kanboard.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.dolibarr.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.librenms.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.agorakit.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.fediwall.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.pixelfed.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.mainsail.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.drupal.sites.<name>.virtualHost.listen.*.ip | IP to listen on. 0.0.0.0 for IPv4 only, * for all.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.drupal.sites.<name>.virtualHost.forceSSL | Whether to add a separate nginx server block that permanently redirects (301)
all plain HTTP traffic to HTTPS
|
| options/nixos/programs.ssh.knownHosts.<name>.publicKeyFile | The path to the public key file for the host
|
| options/nixos/services.drupal.sites.<name>.virtualHost.listen | Listen addresses and ports for this virtual host.
This option overrides addSSL, forceSSL and onlySSL
|
| options/nixos/services.drupal.sites.<name>.virtualHost.locations.<name>.index | Adds DirectoryIndex directive
|
| options/nixos/services.drupal.sites.<name>.virtualHost.locations.<name>.alias | Alias directory for requests
|
| options/nixos/services.drupal.sites.<name>.virtualHost.listen.*.ssl | Whether to enable SSL (https) support.
|
| options/nixos/services.fedimintd.<name>.nginx.path | Path to host the API on and forward to the daemon's api port
|
| options/nixos/services.fedimintd.<name>.nginx.fqdn | Public domain of the API address of the reverse proxy/tls terminator.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.hashKnownHosts | Indicates that
ssh(1)
should hash host names and addresses when they are added to
the known hosts file.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.logFormat | Log format for Apache's log files
|
| options/nixos/services.drupal.sites.<name>.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.drupal.sites.<name>.virtualHost.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/home-manager/launchd.agents.<name>.config.LimitLoadFromHosts | This configuration file only applies to hosts NOT listed with this key
|
| options/nixos/services.jibri.xmppEnvironments.<name>.xmppServerHosts | Hostnames of the XMPP servers to connect to.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.listen.*.port | Port to listen on
|
| options/nixos/services.drupal.sites.<name>.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.servedDirs | This option provides a simple way to serve static directories.
|
| options/nixos/services.nginx.upstreams.<name>.servers.<name>.backup | Marks the server as a backup server
|
| options/nixos/services.davis.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.movim.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.slskd.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.enableACME | Whether to ask Let's Encrypt to sign a certificate for this vhost
|
| options/nixos/services.drupal.sites.<name>.virtualHost.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/nixos/services.anuko-time-tracker.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.invidious.nginx.enable | Whether to configure nginx as a reverse proxy for Invidious
|
| options/nixos/services.drupal.sites.<name>.virtualHost.sslServerCert | Path to server SSL certificate.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.enableUserDir | Whether to enable serving ~/public_html as
/~«username».
|
| options/nixos/services.bookstack.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.fedimintd.<name>.nginx.config.serverName | Name of this virtual host
|
| options/nixos/services.drupal.sites.<name>.virtualHost.extraConfig | These lines go to httpd.conf verbatim
|
| options/nixos/services.nylon.<name>.name | The name of this nylon instance.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.userKnownHostsFile | Specifies one or more files to use for the user host key
database, separated by whitespace
|
| options/nixos/services.davis.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.davis.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.movim.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.slskd.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.slskd.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.movim.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.bind.zones.<name>.name | Name of the zone.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.sslServerChain | Path to server SSL chain file.
|
| options/nixos/services.fluidd.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.akkoma.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.gancio.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.monica.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.matomo.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.fedimintd.<name>.nginx.config.root | The path of the web root directory.
|
| options/nixos/services.pppd.peers.<name>.name | Name of the PPP peer.
|
| options/nixos/services.fedimintd.<name>.nginx.enable | Whether to configure nginx for fedimintd
|
| options/nixos/services.drupal.sites.<name>.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.fedimintd.<name>.nginx.config | Overrides to the nginx vhost section for api
|
| options/nixos/services.davis.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.slskd.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.movim.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.fedimintd.<name>.nginx.config.quic | Whether to enable the QUIC transport protocol
|
| options/nixos/services.snipe-it.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.nginx.proxyCachePath.<name>.inactive | Cached data that has not been accessed for the time specified by
the inactive parameter is removed from the cache, regardless of
its freshness.
|
| options/nixos/services.fedimintd.<name>.nginx.config.kTLS | Whether to enable kTLS support
|
| options/nixos/services.jirafeau.nginxConfig.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.fedimintd.<name>.nginx.config.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| options/home-manager/gtk.theme.name | The name of the theme within the package.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost | Apache configuration can be done by adapting services.httpd.virtualHosts.
|
| options/nixos/services.fluidd.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.gancio.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.fluidd.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.akkoma.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.akkoma.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.gancio.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.monica.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.monica.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.matomo.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.matomo.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| options/nixos/services.davis.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.movim.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.slskd.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.fedimintd.<name>.nginx.config.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| options/nixos/services.davis.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.davis.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.movim.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.slskd.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.movim.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.slskd.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.davis.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.slskd.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.movim.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.drupal.sites.<name>.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.hostName | Canonical hostname for the server.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.gancio.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.akkoma.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.fluidd.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.monica.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.matomo.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.fedimintd.<name>.nginx.config.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.snipe-it.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/users.users.<name>.name | The name of the user account
|
| options/darwin/users.users.<name>.name | The name of the user account
|
| options/nixos/programs.ssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| options/darwin/programs.ssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.locations.<name>.index | Adds DirectoryIndex directive
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.locations.<name>.alias | Alias directory for requests
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.index | Adds index directive.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| options/nixos/services.drupal.sites.<name>.virtualHost.documentRoot | The path of Apache's document root directory
|
| options/nixos/services.drupal.sites.<name>.virtualHost.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.robotsEntries | Specification of pages to be ignored by web crawlers
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.http2 | Whether to enable HTTP 2
|
| options/nixos/services.fedimintd.<name>.nginx.path_ws | Path to host the API on and forward to the daemon's api port
|
| options/nixos/services.fedimintd.<name>.nginx.path_ui | Path to host the built-in UI on and forward to the daemon's api port
|
| options/nixos/services.fedimintd.<name>.nginx.config.http2 | Whether to enable the HTTP/2 protocol
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.akkoma.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.gancio.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.fluidd.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.monica.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.matomo.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.nginx.upstreams.<name>.servers | Defines the address and other parameters of the upstream servers
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.moodle.virtualHost.locations.<name>.alias | Alias directory for requests
|
| options/nixos/services.nagios.virtualHost.locations.<name>.index | Adds DirectoryIndex directive
|
| options/nixos/services.moodle.virtualHost.locations.<name>.index | Adds DirectoryIndex directive
|
| options/nixos/services.nagios.virtualHost.locations.<name>.alias | Alias directory for requests
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.adminAddr | E-mail address of the server administrator.
|
| options/nixos/services.fluidd.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.fluidd.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.akkoma.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.akkoma.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.gancio.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.gancio.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.matomo.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.matomo.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.monica.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.monica.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.locations | Declarative location config
|
| options/nixos/services.etcd.name | Etcd unique node name.
|
| options/nixos/services.nginx.upstreams.<name>.extraConfig | These lines go to the end of the upstream verbatim.
|
| options/nixos/services.gancio.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.fedimintd.<name>.nginx.config.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.fluidd.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.akkoma.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.matomo.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.monica.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/darwin/launchd.agents.<name>.serviceConfig.LimitLoadToHosts | This configuration file only applies to the hosts listed with this key
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.listen.*.ip | IP to listen on. 0.0.0.0 for IPv4 only, * for all.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LimitLoadToHosts | This configuration file only applies to the hosts listed with this key
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.fedimintd.<name>.nginx.config.listen.*.ssl | Enable SSL.
|
| options/nixos/services.fedimintd.<name>.nginx.config.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.forceSSL | Whether to add a separate nginx server block that permanently redirects (301)
all plain HTTP traffic to HTTPS
|
| options/nixos/services.davis.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.movim.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.slskd.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.listen | Listen addresses and ports for this virtual host.
This option overrides addSSL, forceSSL and onlySSL
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.listen.*.ssl | Whether to enable SSL (https) support.
|
| options/home-manager/gtk.gtk3.font.name | The family name of the font within the package.
|
| options/home-manager/gtk.gtk2.font.name | The family name of the font within the package.
|
| options/home-manager/gtk.gtk4.font.name | The family name of the font within the package.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.fedimintd.<name>.nginx.config.listen | Listen addresses and ports for this virtual host
|
| options/nixos/services.davis.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.slskd.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.movim.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.logFormat | Log format for Apache's log files
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.fedimintd.<name>.nginx.config.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.limesurvey.nginx.virtualHost.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.kanboard.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.fediwall.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.librenms.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.agorakit.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.mainsail.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.fedimintd.<name>.nginx.config.listen.*.addr | Listen address.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.listen.*.port | Port to listen on
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| options/nixos/services.moodle.virtualHost.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/nixos/services.nagios.virtualHost.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.locations.<name>.index | Adds DirectoryIndex directive
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.locations.<name>.alias | Alias directory for requests
|
| options/nixos/services.drupal.sites.<name>.virtualHost.globalRedirect | If set, all requests for this host are redirected permanently to
the given URL.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.servedDirs | This option provides a simple way to serve static directories.
|
| options/nixos/services.fedimintd.<name>.nginx.config.default | Makes this vhost the default.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LimitLoadFromHosts | This configuration file only applies to hosts NOT listed with this key
|
| options/darwin/launchd.agents.<name>.serviceConfig.LimitLoadFromHosts | This configuration file only applies to hosts NOT listed with this key
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.fedimintd.<name>.nginx.config.listen.*.port | Port number to listen on
|
| options/nixos/services.fedimintd.<name>.nginx.config.enableACME | Whether to ask Let's Encrypt to sign a certificate for this vhost
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.enableACME | Whether to ask Let's Encrypt to sign a certificate for this vhost
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.sslServerCert | Path to server SSL certificate.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.enableUserDir | Whether to enable serving ~/public_html as
/~«username».
|
| options/nixos/services.akkoma.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.fluidd.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.fedimintd.<name>.nginx.config.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.gancio.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.monica.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.matomo.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.agorakit.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.kanboard.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.fediwall.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.librenms.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.kanboard.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.agorakit.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.fediwall.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.librenms.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.mainsail.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.mainsail.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.i2pd.upnp.name | Name i2pd appears in UPnP forwardings list.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LimitLoadToHosts | This configuration file only applies to the hosts listed with this key
|
| options/nixos/services.akkoma.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.fluidd.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.fedimintd.<name>.nginx.config.extraConfig | These lines go to the end of the vhost verbatim.
|
| options/nixos/services.gancio.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.monica.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.matomo.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.extraConfig | These lines go to httpd.conf verbatim
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/nixos/services.davis.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.slskd.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.movim.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/users.groups.<name>.name | The name of the group
|
| options/darwin/users.groups.<name>.name | The group's name
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.bcg.name | Name for the device
|
| options/nixos/services.dolibarr.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.agorakit.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.kanboard.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.librenms.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.fediwall.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.mainsail.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.sslServerChain | Path to server SSL chain file.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.i2pd.inTunnels.<name>.name | The endpoint name.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LimitLoadFromHosts | This configuration file only applies to hosts NOT listed with this key
|
| options/nixos/services.moodle.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.nagios.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.bookstack.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.i2pd.proto.bob.name | The endpoint name.
|
| options/nixos/services.i2pd.proto.sam.name | The endpoint name.
|
| options/nixos/services.agorakit.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.fediwall.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.librenms.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.kanboard.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.mainsail.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.i2pd.outTunnels.<name>.name | The endpoint name.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.librenms.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.librenms.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.kanboard.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.kanboard.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.fediwall.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.fediwall.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.agorakit.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.agorakit.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.mainsail.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.mainsail.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.akkoma.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.fediwall.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.kanboard.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.librenms.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.dolibarr.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.fluidd.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.gancio.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.agorakit.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.matomo.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.mainsail.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.monica.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.pixelfed.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.davis.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.movim.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.slskd.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.fedimintd.<name>.nginx.config.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.bookstack.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.bookstack.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/systemd.user.services.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/home-manager/gtk.gtk3.theme.name | The name of the theme within the package.
|
| options/home-manager/gtk.gtk4.theme.name | The name of the theme within the package.
|
| options/home-manager/gtk.gtk2.theme.name | The name of the theme within the package.
|
| options/home-manager/gtk.iconTheme.name | The name of the icon theme within the package.
|
| options/nixos/system.name | The name of the system used in the system.build.toplevel derivation
|
| options/nixos/services.bitcoind.<name>.rpc.users.<name>.name | Username for JSON-RPC connections.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/systemd.services.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.i2pd.proto.http.name | The endpoint name.
|
| options/nixos/services.i2pd.proto.i2cp.name | The endpoint name.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.send.redis.name | Name of the redis server
|
| options/nixos/services.nagios.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.moodle.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/security.pam.services.<name>.name | Name of the PAM service.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.documentRoot | The path of Apache's document root directory
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.robotsEntries | Specification of pages to be ignored by web crawlers
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.bookstack.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.fedimintd.<name>.nginx.config.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.snipe-it.mail.from.name | Mail "from" name.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.locations | Declarative location config
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.dolibarr.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.kanboard.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.librenms.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.agorakit.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.fediwall.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.mainsail.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.pixelfed.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.gancio.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.fluidd.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.akkoma.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.matomo.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.monica.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations | Declarative location config
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.index | Adds index directive.
|
| options/nixos/services.bookstack.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.fediwall.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.agorakit.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.librenms.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.kanboard.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.mainsail.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.fedimintd.<name>.nginx.config.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| options/nixos/users.extraUsers.<name>.name | The name of the user account
|
| options/nixos/services.mediawiki.httpd.virtualHost.locations.<name>.index | Adds DirectoryIndex directive
|
| options/nixos/services.mediawiki.httpd.virtualHost.locations.<name>.alias | Alias directory for requests
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.fedimintd.<name>.nginx.config.reuseport | Create an individual listening socket
|
| options/nixos/services.bookstack.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.bookstack.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.keepalived.vrrpInstances.<name>.virtualIps.*.dev | The name of the device to add the address to.
|
| options/nixos/services.bookstack.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.keepalived.vrrpInstances.<name>.virtualIps.*.label | Each address may be tagged with a label string
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.rspamd.workers.<name>.name | Name of the worker
|
| options/nixos/services.bacula-sd.name | Specifies the Name of the Storage daemon.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.globalRedirect | If set, all requests for this host are redirected permanently to
the given URL.
|
| options/nixos/services.mediawiki.httpd.virtualHost.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.fedimintd.<name>.nginx.config.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.kanboard.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.agorakit.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.dolibarr.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.librenms.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.fediwall.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.pixelfed.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.mainsail.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.hylafax.modems.<name>.name | Name of modem device,
will be searched for in /dev.
|
| options/nixos/services.tinc.networks.<name>.name | The name of the node which is used as an identifier when communicating
with the remote nodes in the mesh
|
| options/nixos/services.netbird.tunnels.<name>.name | Primary name for use (as a suffix) in:
- systemd service name,
- hardened user name and group,
- systemd
*Directory= names,
- desktop application identification,
|
| options/nixos/services.netbird.clients.<name>.name | Primary name for use (as a suffix) in:
- systemd service name,
- hardened user name and group,
- systemd
*Directory= names,
- desktop application identification,
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.bookstack.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.limesurvey.virtualHost.locations.<name>.alias | Alias directory for requests
|
| options/nixos/services.limesurvey.virtualHost.locations.<name>.index | Adds DirectoryIndex directive
|
| options/nixos/programs.ssh.knownHosts | The set of system-wide known SSH hosts
|
| options/darwin/programs.ssh.knownHosts | The set of system-wide known SSH hosts
|
| options/nixos/services.bacula-fd.name | The client name that must be used by the Director when connecting
|
| options/nixos/services.bookstack.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.limesurvey.httpd.virtualHost.locations.<name>.index | Adds DirectoryIndex directive
|
| options/nixos/services.limesurvey.httpd.virtualHost.locations.<name>.alias | Alias directory for requests
|
| options/nixos/services.keepalived.vrrpInstances.<name>.virtualIps | Declarative vhost config
|
| options/nixos/services.bacula-dir.name | The director name used by the system administrator
|
| options/nixos/services.snipe-it.mail.replyTo.name | Mail "reply-to" name.
|
| options/home-manager/services.walker.theme.name | The theme name.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.mediawiki.httpd.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/users.extraGroups.<name>.name | The name of the group
|
| options/nixos/services.limesurvey.virtualHost.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/home-manager/services.dunst.iconTheme.name | The name of the theme within the package.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.virtualIps.*.brd | The broadcast address on the interface.
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.agorakit.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.librenms.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.kanboard.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.dolibarr.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.fediwall.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.mainsail.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.pixelfed.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.limesurvey.httpd.virtualHost.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| options/nixos/services.kimai.sites.<name>.database.name | Database name.
|
| options/nixos/services.fedimintd.<name>.nginx.config.listen.*.proxyProtocol | Enable PROXY protocol.
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.davis.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.slskd.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.movim.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.i2pd.proto.httpProxy.name | The endpoint name.
|
| options/nixos/services.k3s.autoDeployCharts.<name>.name | The name of the Helm chart
|
| options/nixos/services.bookstack.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/home-manager/services.kanshi.profiles.<name>.name | Profile name
|
| options/home-manager/services.colima.profiles.<name>.name | The profile's name.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.zammad.redis.name | Name of the redis server
|
| options/nixos/services.fedimintd.<name>.nginx.config.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.keepalived.vrrpInstances.<name>.virtualIps.*.addr | IP address, optionally with a netmask: IPADDR[/MASK]
|
| options/nixos/services.netbird.clients.<name>.user.name | A system user name for this client instance.
|
| options/nixos/services.netbird.tunnels.<name>.user.name | A system user name for this client instance.
|
| options/nixos/services.patroni.name | The name of the host
|
| options/nixos/services.mediawiki.httpd.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.davis.nginx.serverName | Name of this virtual host
|
| options/nixos/services.slskd.nginx.serverName | Name of this virtual host
|
| options/nixos/services.movim.nginx.serverName | Name of this virtual host
|
| options/home-manager/gtk.gtk4.iconTheme.name | The name of the icon theme within the package.
|
| options/home-manager/gtk.gtk2.iconTheme.name | The name of the icon theme within the package.
|
| options/home-manager/gtk.gtk3.iconTheme.name | The name of the icon theme within the package.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.virtualIps.*.scope | The scope of the area where this address is valid.
|
| options/nixos/services.gancio.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.fluidd.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.akkoma.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.monica.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.matomo.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.tt-rss.virtualHost | Name of the nginx virtualhost to use and setup
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.limesurvey.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.limesurvey.httpd.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/home-manager/services.cachix-agent.name | The unique agent name.
|
| options/nixos/services.snipe-it.nginx.serverName | Name of this virtual host
|
| options/nixos/services.drupal.sites.<name>.database.name | Database name.
|
| options/nixos/services.bookstack.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.cachix-agent.name | Agent name, usually same as the hostname
|
| options/darwin/services.cachix-agent.name | Agent name, usually the same as the hostname.
|
| options/nixos/services.grav.virtualHost | Name of the nginx virtualhost to use and setup
|
| options/nixos/services.i2pd.proto.socksProxy.name | The endpoint name.
|
| options/nixos/services.github-runners.<name>.name | Name of the runner to configure
|
| options/darwin/services.github-runners.<name>.name | Name of the runner to configure
|
| options/nixos/services.fedimintd.<name>.nginx.config.sslCertificate | Path to server SSL certificate.
|
| options/nixos/systemd.units.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/systemd.paths.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.virtualRouterId | Arbitrary unique number 1..255
|
| options/nixos/services.kmscon.fonts.*.name | Font name, as used by fontconfig.
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.fedimintd.<name>.nginx.config.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.limesurvey.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.limesurvey.httpd.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.ente.api.settings.db.name | The database name
|
| options/nixos/systemd.user.units.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/systemd.user.paths.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.prosody.muc.*.name | The name to return in service discovery responses for the MUC service itself
|
| options/nixos/services.fluidd.nginx.serverName | Name of this virtual host
|
| options/nixos/services.akkoma.nginx.serverName | Name of this virtual host
|
| options/nixos/services.gancio.nginx.serverName | Name of this virtual host
|
| options/nixos/services.matomo.nginx.serverName | Name of this virtual host
|
| options/nixos/services.monica.nginx.serverName | Name of this virtual host
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.kmonad.keyboards.<name>.name | Keyboard name.
|
| options/nixos/services.postfix.masterConfig.<name>.name | The name of the service to run
|
| options/home-manager/services.pizauth.accounts.<name>.name | Unique identifier of the account
|
| options/nixos/services.akkoma.frontends.<name>.name | Akkoma frontend name.
|
| options/nixos/services.tt-rss.database.name | Name of the existing database.
|
| options/home-manager/gtk.cursorTheme.name | The name of the cursor theme within the package.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.fedimintd.<name>.nginx.config.listen.*.extraParameters | Extra parameters of this listen directive.
|
| options/nixos/services.fediwall.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.agorakit.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.librenms.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.kanboard.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.mainsail.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/image.repart.name | Name of the image
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.i2pd.proto.i2pControl.name | The endpoint name.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.rke2.autoDeployCharts.<name>.name | The name of the Helm chart
|
| options/home-manager/accounts.email.accounts.<name>.notmuch.neomutt.virtualMailboxes.*.name | Name to display
|
| options/nixos/services.crowdsec.name | Name of the machine when registering it at the central or local api.
|
| options/nixos/services.rsync.jobs.<name>.user | The name of an existing user account under which the rsync process should run.
|
| options/nixos/services.opengfw.rules.*.name | Name of the rule.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.v4l2-relayd.instances.<name>.name | The name of the instance.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/systemd.timers.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/systemd.slices.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.varnish.listen.*.name | Name is referenced in logs
|
| options/nixos/services.netbird.tunnels.<name>.service.name | A systemd service name to use (without .service suffix).
|
| options/nixos/services.netbird.clients.<name>.service.name | A systemd service name to use (without .service suffix).
|
| options/nixos/services.bookstack.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/systemd.user.slices.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/systemd.user.timers.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/services.gitea.database.name | Database name.
|
| options/nixos/services.movim.database.name | Database name.
|
| options/nixos/services.h2o.hosts.<name>.tls | TLS options for virtual host
|
| options/nixos/services.postfix.settings.master.<name>.name | The name of the service to run
|
| options/nixos/services.fedimintd.<name>.nginx.config.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| options/nixos/services.firezone.relay.name | The name of this gateway as shown in firezone
|
| options/nixos/services.oauth2-proxy.cookie.name | The name of the cookie that the oauth_proxy creates.
|
| options/nixos/services.baikal.virtualHost | Name of the nginx virtualhost to use and setup
|
| options/nixos/services.echoip.virtualHost | Name of the nginx virtual host to use and setup
|
| options/nixos/services.snipe-it.database.name | Database name.
|
| options/nixos/services.pretix.nginx.domain | The domain name under which to set up the virtual host.
|
| options/nixos/services.mysql.ensureUsers.*.name | Name of the user to ensure.
|
| options/nixos/services.nsd.zones.<name>.notify | This primary server will notify all given secondary servers about
zone changes
|
| options/nixos/services.mysql.galeraCluster.name | The logical name of the Galera cluster
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.davis.database.name | Database name, only used when the databse is created locally.
|
| options/nixos/services.geth.<name>.http.apis | APIs to enable over WebSocket
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.docuseal.redis.name | Name of the redis server
|
| options/nixos/services.buildkite-agents.<name>.name | The name of the agent as seen in the buildkite dashboard.
|
| options/darwin/services.buildkite-agents.<name>.name | The name of the agent as seen in the buildkite dashboard.
|
| options/nixos/services.rsync.jobs.<name>.group | The name of an existing user group under which the rsync process should run.
|
| options/nixos/services.h2o.hosts.<name>.tls.port | Override the default TLS port for this virtual host.
|
| options/nixos/services.h2o.hosts.<name>.serverName | Server name to be used for this virtual host
|
| options/nixos/services.sympa.database.name | Database name
|
| options/nixos/services.xinetd.services.*.name | Name of the service.
|
| options/nixos/services.sabnzbd.settings.servers.<name>.name | The name of the server
|
| options/nixos/services.geth.<name>.http.port | Port number of Go Ethereum HTTP API.
|
| options/nixos/services.cgit.<name>.user | User to run the cgit service as.
|
| options/nixos/services.rss-bridge.virtualHost | Name of the nginx or caddy virtualhost to use and setup
|
| options/home-manager/xdg.desktopEntries.<name>.name | Specific name of the application.
|
| options/nixos/services.radicle.httpd.nginx.serverName | Name of this virtual host
|
| options/nixos/services.h2o.hosts.<name>.acme | ACME options for virtual host.
|
| options/nixos/services.h2o.hosts.<name>.http | HTTP options for virtual host
|
| options/nixos/services.davis.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.davis.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.movim.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.slskd.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.slskd.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.movim.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.authelia.instances.<name>.name | Name is used as a suffix for the service name, user, and group
|
| options/nixos/services.snipe-it.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.i2pd.websocket.name | The endpoint name.
|
| options/nixos/services.monica.database.name | Database name.
|
| options/nixos/services.moodle.database.name | Database name.
|
| options/nixos/services.zammad.database.name | Database name.
|
| options/nixos/services.heartbeat.name | Name of the beat
|
| options/nixos/services.mediawiki.name | Name of the wiki.
|
| options/nixos/services.teeworlds.name | Name of the server.
|
| options/nixos/services.immich.database.name | The name of the immich database.
|
| options/nixos/services.openiscsi.name | Name of this iscsi initiator
|
| options/home-manager/services.podman.builds.<name>.tags | Name associated with the build
|
| options/nixos/services.h2o.hosts.<name>.http.port | Override the default HTTP port for this virtual host.
|
| options/nixos/services.wakapi.database.name | The name of the database to use for Wakapi.
|
| options/nixos/services.mtr-exporter.jobs.*.name | Name of ICMP pinging job.
|
| options/nixos/services.geth.<name>.port | Port number Go Ethereum will be listening on, both TCP and UDP.
|
| options/home-manager/gtk.gtk4.cursorTheme.name | The name of the cursor theme within the package.
|
| options/home-manager/gtk.gtk2.cursorTheme.name | The name of the cursor theme within the package.
|
| options/home-manager/gtk.gtk3.cursorTheme.name | The name of the cursor theme within the package.
|
| options/nixos/services.wyoming.piper.servers.<name>.zeroconf.name | The advertised name for zeroconf discovery.
|
| options/nixos/services.akkoma.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.gancio.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.fluidd.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.fluidd.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.gancio.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.akkoma.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.matomo.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.matomo.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.monica.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.monica.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.nsd.zones.<name>.zoneStats | When set to something distinct to null NSD is able to collect
statistics per zone
|
| options/nixos/services.wordpress.sites.<name>.database.name | Database name.
|
| options/nixos/services.h2o.hosts.<name>.tls.quic | Enables HTTP/3 over QUIC on the UDP port for TLS
|
| options/nixos/services.agorakit.nginx.serverName | Name of this virtual host
|
| options/nixos/services.dolibarr.nginx.serverName | Name of this virtual host
|
| options/nixos/services.librenms.nginx.serverName | Name of this virtual host
|
| options/nixos/services.kanboard.nginx.serverName | Name of this virtual host
|
| options/nixos/services.fediwall.nginx.serverName | Name of this virtual host
|
| options/nixos/services.pixelfed.nginx.serverName | Name of this virtual host
|
| options/nixos/services.mainsail.nginx.serverName | Name of this virtual host
|
| options/nixos/services.h2o.hosts.<name>.host | Set the host address for this virtual host
|
| options/nixos/services.rauc.slots.<name>.*.type | The type of the device.
|
| options/nixos/systemd.targets.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/systemd.sockets.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/services.zabbixWeb.database.name | Database name.
|
| options/nixos/systemd.user.sockets.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/systemd.user.targets.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/services.zabbixWeb.httpd.virtualHost | Apache configuration can be done by adapting services.httpd.virtualHosts.<name>
|
| options/nixos/services.nginx.resolver | Configures name servers used to resolve names of upstream servers into addresses
|
| options/nixos/services.pretalx.nginx.domain | The domain name under which to set up the virtual host.
|
| options/nixos/services.h2o.hosts.<name>.acme.root | Directory for the ACME challenge, which is public
|
| options/nixos/services.firezone.gui-client.name | The name of this client as shown in firezone
|
| options/nixos/services.nsd.zones.<name>.data | The actual zone data
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/home-manager/xdg.desktopEntries.<name>.actions.<name>.name | Name of the action.
|
| options/nixos/services.legit.settings.server.name | Server name.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.auth.<name>.name | The name of this authentication provider
|
| options/nixos/services.cgit.<name>.group | Group to run the cgit service as.
|
| options/nixos/services.nsd.keys.<name>.keyFile | Path to the file which contains the actual base64 encoded
key
|
| options/nixos/services.bcg.rename | Rename nodes to different name.
|
| options/nixos/services.nylon.<name>.port | What port to listen for client requests, default is 1080.
|
| options/nixos/services.forgejo.database.name | Database name.
|
| options/nixos/services.redmine.database.name | Database name.
|
| options/nixos/services.bind.zones.<name>.file | Zone file resource records contain columns of data, separated by whitespace, that define the record.
|
| options/nixos/services.tinc.networks.<name>.hosts | The name of the host in the network as well as the configuration for that host
|
| options/nixos/services.cgit.<name>.repos | cgit repository settings, see cgitrc(5)
|
| options/nixos/services.pdfding.database.name | PostgreSQL database name
|
| options/nixos/services.i2pd.inTunnels.<name>.port | Bind port for ‹name› endpoint.
|
| options/nixos/services.cgit.<name>.scanPath | A path which will be scanned for repositories.
|
| options/nixos/services.firezone.gateway.name | The name of this gateway as shown in firezone
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.agorakit.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.librenms.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.kanboard.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.fediwall.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.librenms.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.kanboard.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.fediwall.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.agorakit.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.mainsail.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.mainsail.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.dovecot2.mailboxes.<name>.name | The name of the mailbox.
|
| options/nixos/services.anuko-time-tracker.nginx.serverName | Name of this virtual host
|
| options/nixos/services.ndppd.proxies.<name>.rules.<name>.network | This is the target address is to match against
|
| options/nixos/services.selfoss.database.name | Name of the existing database (has no effect if type is "sqlite").
|
| options/nixos/services.factorio.game-name | Name of the game as it will appear in the game listing.
|
| options/nixos/services.i2pd.outTunnels.<name>.port | Bind port for ‹name› endpoint.
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.name | Adapter name that is used in the radicle-ci-broker configuration
|
| options/nixos/services.firezone.server.provision.accounts.<name>.actors.<name>.name | The name of this actor
|
| options/nixos/services.firezone.server.provision.accounts.<name>.groups.<name>.name | The name of this group
|
| options/nixos/services.zabbixProxy.database.name | Database name.
|
| options/nixos/services.tahoe.nodes.<name>.tub.port | The port on which the tub will listen
|
| options/nixos/services.tahoe.nodes.<name>.web.port | The port on which the Web server will listen
|
| options/nixos/services.syncthing.settings.devices.<name>.name | The name of the device.
|
| options/home-manager/services.syncthing.settings.devices.<name>.name | The name of the device.
|
| options/nixos/services.bookstack.nginx.serverName | Name of this virtual host
|
| options/nixos/services.freshrss.virtualHost | Name of the caddy/nginx virtualhost to use and setup.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/home-manager/home.file.<name>.text | Text of the file
|
| options/nixos/services.airsonic.virtualHost | Name of the nginx virtualhost to use and setup
|
| options/nixos/services.cloudlog.virtualHost | Name of the nginx virtualhost to use and setup
|
| options/nixos/networking.interfaces.<name>.virtualType | The type of interface to create
|
| options/nixos/services.youtrack.virtualHost | Name of the nginx virtual host to use and setup
|
| options/nixos/hardware.alsa.controls.<name>.name | Name of the control, as it appears in alsamixer
|
| options/nixos/services.geth.<name>.http.enable | Whether to enable Go Ethereum HTTP API.
|
| options/nixos/services.nsd.zones.<name>.dnssec | Whether to enable DNSSEC.
|
| options/nixos/services.bookstack.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.bookstack.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.tahoe.nodes.<name>.nickname | The nickname of this Tahoe node.
|
| options/nixos/services.nsd.zones.<name>.requestXFR | Format: [AXFR|UDP] <ip-address> <key-name | NOKEY>
|
| options/nixos/services.cgit.<name>.enable | Whether to enable cgit.
|
| options/nixos/virtualisation.interfaces.<name>.name | Interface name
|
| options/nixos/services.geth.<name>.gcmode | Blockchain garbage collection mode.
|
| options/nixos/services.uhub.<name>.enable | Whether to enable hub instance.
|
| options/nixos/services.tts.servers.<name>.model | Name of the model to download and use for speech synthesis
|
| options/nixos/services.firezone.server.provision.accounts.<name>.relayGroups.<name>.name | The name of this relay group
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.geth.<name>.enable | Whether to enable Go Ethereum Node.
|
| options/nixos/services.geth.<name>.extraArgs | Additional arguments passed to Go Ethereum.
|
| options/nixos/services.dolibarr.database.name | Database name.
|
| options/nixos/services.castopod.database.name | Database name.
|
| options/nixos/services.agorakit.database.name | Database name.
|
| options/nixos/services.mastodon.database.name | Database name.
|
| options/nixos/services.peertube.database.name | Database name.
|
| options/nixos/services.pixelfed.database.name | Database name.
|
| options/nixos/services.windmill.database.name | Database name.
|
| options/nixos/services.zabbixServer.database.name | Database name.
|
| options/nixos/power.ups.ups.<name>.port | The serial port to which your UPS is connected. /dev/ttyS0 is
usually the first port on Linux boxes, for example.
|
| options/nixos/services.gitea-actions-runner.instances.<name>.name | The name identifying the runner instance towards the Gitea/Forgejo instance.
|
| options/nixos/services.h2o.hosts.<name>.tls.policy | add will additionally listen for TLS connections. only will
disable TLS connections. force will redirect non-TLS traffic
to the TLS connection.
|
| options/nixos/services.dawarich.database.name | The name of the dawarich database.
|
| options/nixos/services.cloudlog.database.name | MySQL database name.
|
| options/nixos/services.freshrss.database.name | Database name for FreshRSS.
|
| options/nixos/virtualisation.allInterfaces.<name>.name | Interface name
|
| options/nixos/services.autossh.sessions.*.name | Name of the local AutoSSH session
|
| options/darwin/services.autossh.sessions.*.name | Name of the local AutoSSH session
|
| options/nixos/services.jirafeau.nginxConfig.serverName | Name of this virtual host
|
| options/darwin/users.users.<name>.uid | The user's UID.
|
| options/nixos/services.wyoming.satellite.name | Name of the satellite.
|
| options/home-manager/home.pointerCursor.name | The cursor name within the package.
|
| options/nixos/services.rauc.slots.<name>.*.device | The device to update.
|
| options/home-manager/programs.kitty.font.name | The family name of the font within the package.
|
| options/nixos/virtualisation.qemu.drives.*.name | A name for the drive
|
| options/nixos/services.h2o.hosts.<name>.acme.useHost | An existing Let’s Encrypt certificate to use for this virtual
host
|
| options/nixos/services.pppd.peers.<name>.enable | Whether to enable this PPP peer.
|
| options/nixos/services.tts.servers.<name>.port | Port to bind the TTS server to.
|
| options/nixos/services.phpfpm.pools.<name>.user | User account under which this pool runs.
|
| options/nixos/services.nsd.zones.<name>.allowNotify | Listed primary servers are allowed to notify this secondary server
|
| options/nixos/services.opengfw.rules.*.modifier.name | Name of the modifier.
|
| options/nixos/services.bind.zones.<name>.master | Master=false means slave server
|
| options/nixos/services.bind.zones.<name>.slaves | Addresses who may request zone transfers.
|
| options/nixos/services.nsd.zones.<name>.minRetrySecs | Limit retry time for secondary zones.
|
| options/nixos/services.rauc.slots.<name>.*.enable | Whether to enable this RAUC slot.
|
| options/nixos/services.nntp-proxy.users.<name>.username | Username
|
| options/nixos/services.nagios.virtualHost.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/nixos/services.moodle.virtualHost.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/darwin/users.users.<name>.gid | The user's primary group.
|
| options/nixos/services.ndppd.proxies.<name>.rules.<name>.method | static: Immediately answer any Neighbor Solicitation Messages
(if they match the IP rule).
iface: Forward the Neighbor Solicitation Message through the specified
interface and only respond if a matching Neighbor Advertisement
Message is received.
auto: Same as iface, but instead of manually specifying the outgoing
interface, check for a matching route in /proc/net/ipv6_route.
|
| options/nixos/services.h2o.hosts.<name>.acme.enable | Whether to ask Let’s Encrypt to sign a certificate for this
virtual host
|
| options/nixos/services.phpfpm.pools.<name>.phpEnv | Environment variables used for this PHP-FPM pool.
|
| options/nixos/services.i2pd.inTunnels.<name>.enable | Whether to enable ‹name›.
|
| options/nixos/services.uhub.<name>.enableTLS | Whether to enable TLS support.
|
| options/home-manager/home.language.name | The language to use for personal names.
|
| options/nixos/services.gitwatch.<name>.user | The name of services's user
|
| options/nixos/services.tahoe.nodes.<name>.sftpd.port | The port on which the SFTP server will listen
|
| options/nixos/services.pppd.peers.<name>.config | pppd configuration for this peer, see the pppd(8) man page.
|
| options/home-manager/xdg.dataFile.<name>.text | Text of the file
|
| options/nixos/services.i2pd.outTunnels.<name>.enable | Whether to enable ‹name›.
|
| options/nixos/networking.interfaces.<name>.virtual | Whether this interface is virtual and should be created by tunctl
|
| options/nixos/services.firezone.server.provision.accounts.<name>.gatewayGroups.<name>.name | The name of this gateway group
|
| options/nixos/services.hylafax.modems.<name>.type | Name of modem configuration file,
will be searched for in config
in the spooling area directory.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.name | The account name
|
| options/darwin/homebrew.casks.*.name | The name of the cask to install.
|
| options/darwin/homebrew.brews.*.name | The name of the formula to install.
|
| options/nixos/services.i2pd.inTunnels.<name>.type | Tunnel type.
|
| options/nixos/services.anuko-time-tracker.database.name | Database name.
|
| options/nixos/services.armagetronad.servers.<name>.name | The name of this server.
|
| options/home-manager/services.activitywatch.watchers.<name>.name | The name of the watcher
|
| options/nixos/services.geth.<name>.metrics.port | Port number of Go Ethereum metrics service.
|
| options/nixos/services.geth.<name>.http.address | Listen address of Go Ethereum HTTP API.
|
| options/home-manager/qt.style.name | Style to use for Qt5/Qt6 applications
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.ssid | SSID to be used in IEEE 802.11 management frames.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.name | The name of this resource
|
| options/home-manager/services.unison.pairs.<name>.roots | Pair of roots to synchronise.
|
| options/nixos/services.nylon.<name>.enable | Enables nylon as a running service upon activation.
|
| options/nixos/services.geth.<name>.authrpc.port | Port number of Go Ethereum Auth RPC API.
|
| options/nixos/services.tts.servers.<name>.useCuda | Whether to offload computation onto a CUDA compatible GPU.
|
| options/home-manager/services.podman.images.<name>.tag | FQIN of referenced Image when source is a file or directory archive.
|
| options/home-manager/services.kanshi.settings.*.profile.name | Profile name
|
| options/nixos/services.i2pd.inTunnels.<name>.keys | Keyset used for tunnel identity.
|
| options/nixos/services.phpfpm.pools.<name>.group | Group account under which this pool runs.
|
| options/nixos/services.webhook.hooks.<name>.id | The ID of your hook
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/nixos/services.pretix.settings.database.name | Database name.
|
| options/nixos/services.davis.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.slskd.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.movim.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.corosync.nodelist.*.name | Node name
|
| options/nixos/services.i2pd.outTunnels.<name>.type | Tunnel type.
|
| options/nixos/services.rspamd.locals.<name>.text | Text of the file.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels.<name>.name | The unique name for THIS channel in THIS group
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.nsd.zones.<name>.maxRetrySecs | Limit retry time for secondary zones
|
| options/nixos/services.bookstack.database.name | Database name.
|
| options/nixos/services.mediawiki.database.name | Database name.
|
| options/nixos/services.cgit.<name>.package | The cgit package to use.
|
| options/nixos/services.geth.<name>.package | The geth package to use.
|
| options/nixos/services.uhub.<name>.plugins | Uhub plugin configuration.
|
| options/nixos/services.i2pd.outTunnels.<name>.keys | Keyset used for tunnel identity.
|
| options/nixos/services.discourse.database.name | Discourse database name.
|
| options/nixos/services.snipe-it.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.ndppd.proxies.<name>.ttl | Controls how long a valid or invalid entry remains in the cache, in
milliseconds.
|
| options/nixos/systemd.user.services.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/home-manager/services.podman.images.<name>.username | Username used to connect to registry.
|
| options/nixos/services.journalbeat.name | Name of the beat
|
| options/nixos/systemd.user.services.<name>.preStop | Shell commands executed to stop the service.
|
| options/nixos/services.keycloak.database.name | Database name to use when connecting to an external or
manually provisioned database; has no effect when a local
database is automatically provisioned
|
| options/home-manager/accounts.email.accounts.<name>.name | Unique identifier of the account
|
| options/nixos/services.rsync.jobs.<name>.sources | Source directories.
|
| options/nixos/services.openafsClient.cellServDB.<name>.*.dnsname | DNS full-qualified domain name of a database server
|
| options/nixos/services.openafsServer.cellServDB.<name>.*.dnsname | DNS full-qualified domain name of a database server
|
| options/nixos/boot.zfs.pools.<name>.devNodes | Name of directory from which to import ZFS device, this is passed to zpool import
as the value of the -d option
|
| options/nixos/users.users.<name>.uid | The account UID
|
| options/nixos/services.i2pd.inTunnels.<name>.inPort | Service port
|
| options/home-manager/services.podman.builds.<name>.file | Path to a Containerfile which contains instructions to build the image.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.group | Members of this group can access the control socket for this interface.
|
| options/nixos/services.redis.servers.<name>.slaveOf.ip | IP of the Redis master
|
| options/nixos/users.users.<name>.home | The user's home directory.
|
| options/nixos/systemd.user.services.<name>.path | Packages added to the service's PATH
environment variable
|
| options/nixos/services.drupal.sites.<name>.filesDir | The location of the Drupal files directory.
|
| options/nixos/services.tahoe.nodes.<name>.sftpd.enable | Whether to enable SFTP service.
|
| options/nixos/services.k3s.manifests.<name>.target | Name of the symlink (relative to /var/lib/rancher/k3s/server/manifests)
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.name | The name of this group for this account
|
| options/nixos/systemd.mounts.*.name | The name of this systemd unit, including its extension
|
| options/home-manager/programs.floorp.profiles.<name>.name | Profile name.
|
| options/nixos/systemd.network.networks.<name>.name | The name of the network interface to match against.
|
| options/nixos/security.pam.services.<name>.zfs | Enable unlocking and mounting of encrypted ZFS home dataset at login.
|
| options/nixos/services.drupal.sites.<name>.stateDir | The location of the Drupal site state directory.
|
| options/nixos/systemd.user.services.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.utf8Ssid | Whether the SSID is to be interpreted using UTF-8 encoding.
|
| options/nixos/services.i2pd.inTunnels.<name>.address | Bind address for ‹name› endpoint.
|
| options/nixos/services.geth.<name>.network | The network to connect to
|
| options/nixos/networking.interfaces.<name>.virtualOwner | In case of a virtual device, the user who owns it.
null will not set owner, allowing access to any user.
|
| options/nixos/services.invoiceplane.sites.<name>.database.name | Database name.
|
| options/nixos/services.cntlm.username | Proxy account name, without the possibility to include domain name ('at' sign is interpreted literally).
|
| options/nixos/services.bluemap.maps.<name>.world | Path to world folder containing the dimension to render
|
| options/nixos/services.bind.zones.<name>.masters | List of servers for inclusion in stub and secondary zones.
|
| options/nixos/services.redis.servers.<name>.bind | The IP interface to bind to.
null means "all interfaces".
|
| options/nixos/services.writefreely.admin.name | The name of the first admin user.
|
| options/nixos/services.netbird.tunnels.<name>.dir.baseName | A systemd service name to use (without .service suffix).
|
| options/nixos/services.netbird.clients.<name>.dir.baseName | A systemd service name to use (without .service suffix).
|
| options/nixos/services.bind.zones.<name>.allowQuery | List of address ranges allowed to query this zone
|
| options/nixos/services.nbd.server.exports.<name>.path | File or block device to export.
|
| options/nixos/services.ndppd.proxies.<name>.rules.<name>.interface | Interface to use when method is iface.
|
| options/nixos/security.pam.services.<name>.text | Contents of the PAM service file.
|
| options/nixos/services.netbird.tunnels.<name>.user.group | A system group name for this client instance.
|
| options/nixos/services.netbird.clients.<name>.user.group | A system group name for this client instance.
|
| options/nixos/services.nsd.zones.<name>.notifyRetry | Specifies the number of retries for failed notifies
|
| options/nixos/systemd.user.services.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/services.h2o.hosts.<name>.tls.identity | Key / certificate pairs for the virtual host.
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.zsk | Key policy for zone signing keys
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.ksk | Key policy for key signing keys
|
| options/nixos/services.i2pd.outTunnels.<name>.address | Bind address for ‹name› endpoint.
|
| options/nixos/services.bacula-sd.device.<name>.archiveDevice | The specified name-string gives the system file name of the storage
device managed by this storage daemon
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.bind | Which local IP to bind the UDP socket to.
|
| options/nixos/services.rsync.jobs.<name>.timerConfig | When to run the job.
|
| options/home-manager/services.podman.images.<name>.image | Image to pull.
|
| options/nixos/services.akkoma.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.gancio.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.fluidd.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.monica.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.matomo.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.pretalx.settings.database.name | Database name.
|
| options/nixos/services.grafana.settings.database.name | The name of the Grafana database.
|
| options/darwin/homebrew.taps.*.name | When clone_target is unspecified, this is the name of a formula
repository to tap from GitHub using HTTPS
|
| options/nixos/services.bitcoind.<name>.rpc.port | Override the default port on which to listen for JSON-RPC connections.
|
| options/nixos/systemd.user.services.<name>.postStop | Shell commands executed after the service's main process
has exited.
|
| options/nixos/systemd.services.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/services.phpfpm.pools.<name>.listen | The address on which to accept FastCGI requests.
|
| options/nixos/services.cgit.<name>.extraConfig | These lines go to the end of cgitrc verbatim.
|
| options/nixos/systemd.services.<name>.preStop | Shell commands executed to stop the service.
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.ksk.keySize | Key size in bits
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.zsk.keySize | Key size in bits
|
| options/nixos/services.firezone.headless-client.name | The name of this client as shown in firezone
|
| options/nixos/services.pgbackrest.stanzas.<name>.jobs.<name>.type | Backup type as described in:
https://pgbackrest.org/command.html#command-backup/category-command/option-type
|
| options/home-manager/services.podman.images.<name>.certDir | Path of certificates (*.{crt,cert,key}) used to connect to registry.
|
| options/nixos/systemd.user.services.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/services.redis.servers.<name>.port | The TCP port to accept connections
|
| options/nixos/services.drupal.sites.<name>.enable | Whether to enable Drupal web application.
|
| options/nixos/services.tts.servers.<name>.extraArgs | Extra arguments to pass to the server commandline.
|
| options/nixos/services.tts.servers.<name>.enable | Whether to enable Coqui TTS server.
|
| options/nixos/services.thanos.query.grpc-client-server-name | Server name to verify the hostname on the returned gRPC certificates
|
| options/nixos/services.ax25.axports.<name>.tty | Location of hardware kiss tnc for this interface.
|
| options/nixos/services.redis.servers.<name>.slaveOf.port | port of the Redis master
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.macDeny | Specifies the MAC addresses to deny if macAcl is set to "deny" or "radius"
|
| options/nixos/services.netbird.clients.<name>.bin.suffix | A system group name for this client instance.
|
| options/nixos/services.netbird.tunnels.<name>.bin.suffix | A system group name for this client instance.
|
| options/nixos/hardware.sane.brscan5.netDevices.<name>.name | The friendly name you give to the network device
|
| options/nixos/hardware.sane.brscan4.netDevices.<name>.name | The friendly name you give to the network device
|
| options/home-manager/programs.papis.libraries.<name>.name | This library's name.
|
| options/nixos/services.kimai.sites.<name>.package | The kimai package to use.
|
| options/nixos/services.tahoe.nodes.<name>.package | The tahoelafs package to use.
|
| options/home-manager/services.podman.builds.<name>.authFile | Path of the authentication file.
|
| options/nixos/systemd.services.<name>.path | Packages added to the service's PATH
environment variable
|
| options/nixos/services.nylon.<name>.logging | Enable logging, default is no logging.
|
| options/nixos/services.bacula-sd.director.<name>.tls.verifyPeer | Verify peer certificate
|
| options/nixos/services.bacula-fd.director.<name>.tls.verifyPeer | Verify peer certificate
|
| options/nixos/services.rsync.jobs.<name>.inhibit | Run the rsync process with an inhibition lock taken;
see systemd-inhibit(1) for a list of possible operations.
|
| options/nixos/services.bind.zones.<name>.extraConfig | Extra zone config to be appended at the end of the zone section.
|
| options/nixos/systemd.user.services.<name>.preStart | Shell commands executed before the service's main process
is started.
|
| options/nixos/systemd.user.services.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.logLevel | Levels (minimum value for logged events):
0 = verbose debugging
1 = debugging
2 = informational messages
3 = notification
4 = warning
|
| options/nixos/systemd.services.<name>.wants | Start the specified units when this unit is started.
|
| options/darwin/users.groups.<name>.gid | The group's GID.
|
| options/home-manager/accounts.email.accounts.<name>.notmuch.neomutt.virtualMailboxes | List of virtual mailboxes using Notmuch queries
|
| options/nixos/security.pam.services.<name>.rootOK | If set, root doesn't need to authenticate (e.g. for the
useradd service).
|
| options/nixos/services.bitcoind.<name>.rpc.users.<name>.passwordHMAC | Password HMAC-SHA-256 for JSON-RPC connections
|
| options/home-manager/xdg.stateFile.<name>.text | Text of the file
|
| options/home-manager/xdg.cacheFile.<name>.text | Text of the file
|
| options/nixos/services.openafsServer.roles.backup.cellServDB.<name>.*.dnsname | DNS full-qualified domain name of a database server
|
| options/nixos/services.nix-store-gcs-proxy.<name>.bucketName | Name of Google storage bucket
|
| options/nixos/services.asusd.auraConfigs.<name>.text | Text of the file.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.scale.y | Vertical scaling factor/pixels.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.scale.x | Horizontal scaling factor/pixels.
|
| options/home-manager/home.file.<name>.force | Whether the target path should be unconditionally replaced
by the managed file source
|
| options/home-manager/services.podman.images.<name>.authFile | Path of the authentication file used to connect to registry.
|
| options/nixos/services.nsd.zones.<name>.provideXFR | Allow these IPs and TSIG to transfer zones, addr TSIG|NOKEY|BLOCKED
address range 192.0.2.0/24, 1.2.3.4&255.255.0.0, 3.0.2.20-3.0.2.40
|
| options/nixos/services.nebula.networks.<name>.tun.device | Name of the tun device
|
| options/nixos/services.tahoe.nodes.<name>.helper.enable | Whether to enable helper service.
|
| options/nixos/services.restic.backups.<name>.user | As which user the backup should run.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.dpi | Output DPI configuration.
|
| options/nixos/services.limesurvey.virtualHost | Apache configuration can be done by adapting services.httpd.virtualHosts.<name>
|
| options/nixos/services.kimai.sites.<name>.poolConfig | Options for the Kimai PHP pool
|
| options/nixos/services.gvpe.nodename | GVPE node name
|
| options/nixos/systemd.services.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/services.ax25.axports.<name>.baud | The serial port speed of this interface.
|
| options/nixos/services.geth.<name>.authrpc.vhosts | List of virtual hostnames from which to accept requests.
|
| options/nixos/services.hans.clients.<name>.server | IP address of server running hans
|
| options/nixos/services.drupal.sites.<name>.themesDir | The location for users to install Drupal themes.
|
| options/nixos/services.nsd.zones.<name>.minRefreshSecs | Limit refresh time for secondary zones.
|
| options/nixos/services.spiped.config.<name>.maxConns | Limit on the number of simultaneous connections allowed.
|
| options/nixos/services.limesurvey.httpd.virtualHost | Apache configuration can be done by adapting services.httpd.virtualHosts.<name>
|
| options/nixos/services.phpfpm.pools.<name>.socket | Path to the unix socket file on which to accept FastCGI requests.
This option is read-only and managed by NixOS.
|
| options/home-manager/programs.firefox.profiles.<name>.name | Profile name.
|
| options/nixos/services.filesender.database.name | Database name.
|
| options/nixos/services.limesurvey.database.name | Database name.
|
| options/nixos/services.zoneminder.database.name | Name of database.
|
| options/nixos/services.i2pd.ifname | Network interface to bind to.
|
| options/nixos/services.wyoming.piper.servers.<name>.voice | Name of the voice model to use
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.macAllow | Specifies the MAC addresses to allow if macAcl is set to "allow" or "radius"
|
| options/home-manager/home.file.<name>.target | Path to target file relative to HOME.
|
| options/nixos/services.prometheus.remoteRead.*.name | Name of the remote read config, which if specified must be unique among remote read configs
|
| options/nixos/services.geth.<name>.metrics.enable | Whether to enable Go Ethereum prometheus metrics.
|
| options/nixos/services.bitcoind.<name>.rpc.users | RPC user information for JSON-RPC connections.
|
| options/nixos/services.redis.servers.<name>.slaveOf | IP and port to which this redis instance acts as a slave.
|
| options/nixos/systemd.user.services.<name>.script | Shell commands executed as the service's main process.
|
| options/home-manager/services.podman.volumes.<name>.user | The user ID owning the volume inside the container.
|
| options/nixos/services.szurubooru.database.name | Name of the PostgreSQL database.
|
| options/nixos/services.linkwarden.database.name | The name of the Linkwarden database.
|
| options/nixos/services.redis.servers.<name>.logfile | Specify the log file name
|
| options/nixos/services.mysql.initialDatabases.*.name | The name of the database to create.
|
| options/nixos/programs.regreet.font.name | Name of the font to use for regreet.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.mode | Output resolution.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.rate | Output framerate.
|
| options/nixos/services.mattermost.database.name | Local Mattermost database name.
|
| options/nixos/services.geth.<name>.authrpc.enable | Whether to enable Go Ethereum Auth RPC API.
|
| options/nixos/systemd.user.services.<name>.postStart | Shell commands executed after the service's main process
is started.
|
| options/nixos/systemd.user.services.<name>.reload | Shell commands executed when the service's main process
is reloaded.
|
| options/home-manager/services.podman.volumes.<name>.type | Filesystem type of Device. (used as -t in mount commands)
|
| options/nixos/services.tahoe.nodes.<name>.client.helper | The furl for a Tahoe helper node
|
| options/nixos/services.i2pd.inTunnels.<name>.inbound.length | Guaranteed minimum hops for ‹name› tunnels.
|
| options/nixos/security.pam.services.<name>.showMotd | Whether to show the message of the day.
|
| options/nixos/systemd.services.<name>.postStop | Shell commands executed after the service's main process
has exited.
|
| options/nixos/systemd.user.services.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/home-manager/services.podman.volumes.<name>.copy | Copy content of the image located at the mountpoint of the volume on first run.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.crtc | Output video display controller.
|
| options/nixos/security.pam.services.<name>.oathAuth | If set, the OATH Toolkit will be used.
|
| options/nixos/services.redis.servers.<name>.user | User account under which this instance of redis-server runs.
If left as the default value this user will automatically be
created on system activation, otherwise you are responsible for
ensuring the user exists before the redis service starts.
|
| options/home-manager/accounts.email.accounts.<name>.notmuch.neomutt.virtualMailboxes.*.type | Reads all matching messages or whole-threads
|
| options/nixos/services.sympa.domains.<name>.webHost | Domain part of the web interface URL (no web interface for this domain if null)
|
| options/nixos/services.epgstation.database.name | Name of the MySQL database that holds EPGStation's data.
|
| options/nixos/services.metricbeat.settings.name | Name of the beat
|
| options/nixos/services.awstats.configs.<name>.domain | The domain name to collect stats for.
|
| options/nixos/users.users.<name>.homeMode | The user's home directory mode in numeric format
|
| options/nixos/services.homebridge.uiSettings.name | Name of the homebridge UI platform
|
| options/nixos/power.ups.ups.<name>.driver | Specify the program to run to talk to this UPS. apcsmart,
bestups, and sec are some examples.
|
| options/nixos/services.rspamd.locals.<name>.source | Path of the source file.
|
| options/nixos/services.rauc.slots.<name>.*.settings | Settings for this slot.
|
| options/nixos/services.spiped.config.<name>.target | Address to which spiped should connect.
|
| options/home-manager/services.podman.builds.<name>.labels | The labels to apply to the build.
|
| options/nixos/services.i2pd.outTunnels.<name>.inbound.length | Guaranteed minimum hops for ‹name› tunnels.
|
| options/nixos/services.bird-lg.frontend.nameFilter | Protocol names to hide in summary tables (RE2 syntax),
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.apIsolate | Isolate traffic between stations (clients) and prevent them from
communicating with each other.
|
| options/nixos/services.rspamd.workers.<name>.type | The type of this worker
|
| options/nixos/services.bitcoind.<name>.user | The user as which to run bitcoind.
|
| options/nixos/services.geth.<name>.syncmode | Blockchain sync mode.
|
| options/nixos/services.geth.<name>.maxpeers | Maximum peers to connect to.
|
| options/nixos/systemd.user.services.<name>.startAt | Automatically start this unit at the given date/time, which
must be in the format described in
systemd.time(7)
|
| options/home-manager/programs.gnome-shell.theme.name | Name of the GNOME Shell theme.
|
| options/nixos/services.tahoe.nodes.<name>.client.shares.total | The number of shares required to store a file.
|
| options/nixos/services.redis.servers.<name>.save | The schedule in which data is persisted to disk, represented as a list of lists where the first element represent the amount of seconds and the second the number of changes
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.bssid | Specifies the BSSID for this BSS
|
| options/home-manager/programs.zsh.plugins.*.name | The name of the plugin.
|
| options/home-manager/home.file.<name>.enable | Whether this file should be generated
|
| options/home-manager/accounts.email.accounts.<name>.notmuch.neomutt.virtualMailboxes.*.query | Notmuch query
|
| options/nixos/systemd.services.<name>.preStart | Shell commands executed before the service's main process
is started.
|
| options/nixos/users.users.<name>.group | The user's primary group.
|
| options/nixos/security.pam.services.<name>.otpwAuth | If set, the OTPW system will be used (if
~/.otpw exists).
|
| options/nixos/services.gitwatch.<name>.path | The path to repo in local machine
|
| options/nixos/services.openvpn.servers.<name>.up | Shell commands executed when the instance is starting.
|
| options/nixos/systemd.services.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/services.tahoe.nodes.<name>.client.shares.happy | The number of distinct storage nodes required to store
a file.
|
| options/nixos/security.pam.services.<name>.p11Auth | If set, keys listed in
~/.ssh/authorized_keys and
~/.eid/authorized_certificates
can be used to log in with the associated PKCS#11 tokens.
|
| options/nixos/services.ndppd.proxies.<name>.rules | This is a rule that the target address is to match against
|
| options/home-manager/accounts.email.accounts.<name>.notmuch.neomutt.virtualMailboxes.*.limit | Restricts number of messages/threads in the result.
|
| options/nixos/systemd.services.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/services.radicle.httpd.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/security.pam.services.<name>.unixAuth | Whether users can log in with passwords defined in
/etc/shadow.
|
| options/nixos/services.redis.servers.<name>.logLevel | Specify the server verbosity level, options: debug, verbose, notice, warning.
|
| options/nixos/security.pam.services.<name>.rssh | If set, the calling user's SSH agent is used to authenticate
against the configured keys
|
| options/nixos/services.bitcoind.<name>.port | Override the default port on which to listen for connections.
|
| options/nixos/services.prometheus.remoteWrite.*.name | Name of the remote write config, which if specified must be unique among remote write configs
|
| options/nixos/services.redis.servers.<name>.slowLogMaxLen | Maximum number of items to keep in slow log.
|
| options/nixos/services.drupal.sites.<name>.package | The drupal package to use.
|
| options/nixos/services.spiped.config.<name>.keyfile | Name of a file containing the spiped key
|
| options/nixos/services.kimai.sites.<name>.database.user | Database user.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.macAcl | Station MAC address -based authentication
|
| options/nixos/services.tinc.networks.<name>.hostSettings | The name of the host in the network as well as the configuration for that host
|
| options/nixos/services.github-runners.<name>.replace | Replace any existing runner with the same name
|
| options/darwin/services.github-runners.<name>.replace | Replace any existing runner with the same name
|
| options/nixos/services.fedimintd.<name>.p2p.url | Public address for p2p connections from peers (if TCP is used)
|
| options/home-manager/services.podman.builds.<name>.autoStart | Whether to start the build on boot
|
| options/home-manager/services.podman.images.<name>.autoStart | Whether to pull the image on boot
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.gamma | Output gamma configuration.
|
| options/nixos/services.cgit.<name>.settings | cgit configuration, see cgitrc(5)
|
| options/nixos/services.uhub.<name>.settings | Configuration of uhub
|
| options/nixos/services.postgresql.ensureUsers.*.name | Name of the user to ensure.
|
| options/darwin/services.postgresql.ensureUsers.*.name | Name of the user to ensure.
|
| options/nixos/services.bacula-sd.director.<name>.tls.key | The path of a PEM encoded TLS private key
|
| options/nixos/services.bacula-fd.director.<name>.tls.key | The path of a PEM encoded TLS private key
|
| options/nixos/services.kimai.sites.<name>.database.host | Database host address.
|
| options/nixos/services.kimai.sites.<name>.database.port | Database host port.
|
| options/nixos/services.fedimintd.<name>.ui.bind | Address to bind on for UI connections
|
| options/nixos/services.jupyter.kernels.<name>.env | Environment variables to set for the kernel.
|
| options/nixos/services.redis.servers.<name>.syslog | Enable logging to the system logger.
|
| options/nixos/services.redis.servers.<name>.enable | Whether to enable Redis server.
|
| options/nixos/services.rspamd.workers.<name>.count | Number of worker instances to run
|
| options/nixos/services.nebula.networks.<name>.ca | Path to the certificate authority certificate.
|
| options/nixos/systemd.user.services.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/services.tahoe.nodes.<name>.sftpd.accounts.url | URL of the accounts server.
|
| options/nixos/services.h2o.hosts.<name>.settings | Attrset to be transformed into YAML for host config
|
| options/nixos/services.h2o.hosts.<name>.tls.identity.*.key-file | Path to key file
|
| options/nixos/services.tor.relay.onionServices.<name>.map | See torrc manual.
|
| options/nixos/services.fedimintd.<name>.ui.port | TCP Port to bind on for UI connections
|
| options/home-manager/accounts.contact.accounts.<name>.name | Unique identifier of the contact account
|
| options/nixos/security.pam.services.<name>.pamMount | Enable PAM mount (pam_mount) system to mount filesystems on user login.
|
| options/nixos/services.bacula-sd.device.<name>.mediaType | The specified name-string names the type of media supported by this
device, for example, DLT7000
|
| options/nixos/services.ndppd.proxies.<name>.router | Turns on or off the router flag for Neighbor Advertisement Messages.
|
| options/home-manager/services.podman.volumes.<name>.group | The group ID owning the volume inside the container.
|
| options/nixos/services.hostapd.radios.<name>.noScan | Disables scan for overlapping BSSs in HT40+/- mode
|
| options/nixos/services.nsd.keys.<name>.algorithm | Authentication algorithm for this key.
|
| options/nixos/virtualisation.emptyDiskImages.*.driveConfig.name | A name for the drive
|
| options/nixos/services.rspamd.locals.<name>.enable | Whether this file locals should be generated
|
| options/nixos/services.bacula-sd.director.<name>.tls.enable | Specifies if TLS should be enabled
|
| options/nixos/services.bacula-fd.director.<name>.tls.enable | Specifies if TLS should be enabled
|
| options/nixos/services.iodine.clients.<name>.relay | DNS server to use as an intermediate relay to the iodined server
|
| options/home-manager/services.podman.volumes.<name>.image | Specifies the image the volume is based on when Driver is set to the image.
|
| options/nixos/services.hostapd.radios.<name>.band | Specifies the frequency band to use, possible values are 2g for 2.4 GHz,
5g for 5 GHz, 6g for 6 GHz and 60g for 60 GHz.
|
| options/nixos/security.pam.services.<name>.enable | Whether to enable this PAM service.
|
| options/nixos/services.nebula.networks.<name>.key | Path or reference to the host key.
|
| options/nixos/services.homebridge.settings.bridge.name | Name of the homebridge
|
| options/nixos/services.fedimintd.<name>.api.url | Public URL of the API address of the reverse proxy/tls terminator
|
| options/nixos/services.drupal.sites.<name>.poolConfig | Options for the Drupal PHP pool
|
| options/nixos/services.quicktun.<name>.privateKey | Local secret key in hexadecimal form.
This option is deprecated
|
| options/nixos/systemd.services.<name>.script | Shell commands executed as the service's main process.
|
| options/home-manager/xdg.dataFile.<name>.force | Whether the target path should be unconditionally replaced
by the managed file source
|
| options/nixos/services.bitcoind.<name>.dataDir | The data directory for bitcoind.
|
| options/nixos/services.k3s.autoDeployCharts.<name>.repo | The repo of the Helm chart
|
| options/nixos/services.tahoe.nodes.<name>.storage.enable | Whether to enable storage service.
|
| options/nixos/services.wyoming.piper.servers.<name>.uri | URI to bind the wyoming server to.
|
| options/nixos/services.nsd.zones.<name>.maxRefreshSecs | Limit refresh time for secondary zones
|
| options/nixos/programs.regreet.theme.name | Name of the theme to use for regreet.
|
| options/nixos/users.groups.<name>.gid | The group GID
|
| options/nixos/services.dokuwiki.sites.<name>.acl.*.page | Page or namespace to restrict
|
| options/nixos/services.drupal.sites.<name>.configSyncDir | The location of the Drupal config sync directory.
|
| options/nixos/services.h2o.hosts.<name>.tls.extraSettings | Additional TLS/SSL-related configuration options
|
| options/nixos/services.rsync.jobs.<name>.settings | Settings that should be passed to rsync via long options
|
| options/nixos/services.acpid.handlers.<name>.event | Event type.
|
| options/nixos/systemd.user.services.<name>.aliases | Aliases of that unit.
|
| options/nixos/services.redis.servers.<name>.group | Group account under which this instance of redis-server runs.
If left as the default value this group will automatically be
created on system activation, otherwise you are responsible for
ensuring the group exists before the redis service starts.
|
| options/nixos/services.k3s.autoDeployCharts.<name>.package | The packaged Helm chart
|
| options/nixos/services.k3s.autoDeployCharts.<name>.hash | The hash of the packaged Helm chart
|
| options/nixos/services.tahoe.nodes.<name>.tub.location | The external location that the node should listen on
|
| options/nixos/services.i2pd.inTunnels.<name>.crypto.tagsToSend | Number of ElGamal/AES tags to send.
|
| options/nixos/services.quicktun.<name>.publicKey | Remote public key in hexadecimal form.
Not needed when services.quicktun..protocol is set to raw.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.macDenyFile | Specifies a file containing the MAC addresses to deny if macAcl is set to "deny" or "radius"
|
| options/nixos/systemd.services.<name>.postStart | Shell commands executed after the service's main process
is started.
|
| options/nixos/systemd.services.<name>.reload | Shell commands executed when the service's main process
is reloaded.
|
| options/nixos/services.bitcoind.<name>.pidFile | Location of bitcoind pid file.
|
| options/nixos/services.mediawiki.httpd.virtualHost.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/nixos/services.postfix.masterConfig.<name>.command | A program name specifying a Postfix service/daemon process
|
| options/nixos/services.keyd.keyboards.<name>.ids | Device identifiers, as shown by keyd(1).
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.fwmark | If given, sets the SO_MARK option on the TCP socket.
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.fwmark | If given, sets the SO_MARK option on the TCP socket.
|
| options/home-manager/services.podman.builds.<name>.tlsVerify | Require HTTPS and verification of certificates when contacting registries.
|
| options/home-manager/services.podman.images.<name>.tlsVerify | Require HTTPS and verification of certificates when contacting registries.
|
| options/home-manager/programs.fish.plugins.*.name | The name of the plugin.
|
| options/home-manager/services.podman.machines.<name>.username | Username used in the machine image
|
| options/nixos/services.etebase-server.settings.database.name | The database name.
|
| options/nixos/services.rke2.manifests.<name>.target | Name of the symlink (relative to /var/lib/rancher/rke2/server/manifests)
|
| options/nixos/services.awstats.configs.<name>.type | The type of log being collected.
|
| options/nixos/services.tahoe.nodes.<name>.sftpd.accounts.file | Path to the accounts file.
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.keyttl | TTL for dnssec records
|
| options/nixos/systemd.services.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/services.fedimintd.<name>.p2p.port | Port to bind on for p2p connections from peers (both TCP and UDP)
|
| options/nixos/services.fedimintd.<name>.p2p.bind | Address to bind on for p2p connections from peers (both TCP and UDP)
|
| options/nixos/services.namecoind.rpc.user | User name for RPC connections.
|
| options/nixos/services.szurubooru.server.settings.name | Name shown in the website title and on the front page.
|
| options/nixos/services.jupyter.kernels.<name>.argv | Command and arguments to start the kernel.
|
| options/nixos/services.bacula-sd.director.<name>.tls | TLS Options for the Director in this Configuration.
|
| options/nixos/services.bepasty.servers.<name>.bind | Bind address to be used for this server.
|
| options/nixos/services.bacula-fd.director.<name>.tls | TLS Options for the Director in this Configuration.
|
| options/nixos/services.netbird.tunnels.<name>.port | Port the NetBird client listens on.
|
| options/nixos/services.netbird.clients.<name>.port | Port the NetBird client listens on.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.scale.method | Output scaling method.
|
| options/nixos/services.buildkite-agents.<name>.hooksPath | Path to the directory storing the hooks
|
| options/darwin/services.buildkite-agents.<name>.hooksPath | Path to the directory storing the hooks
|
| options/home-manager/programs.smug.projects.<name>.windows.*.name | Name of the tmux window;
|
| options/nixos/services.bacula-sd.director.<name>.tls.allowedCN | Common name attribute of allowed peer certificates
|
| options/nixos/services.bacula-fd.director.<name>.tls.allowedCN | Common name attribute of allowed peer certificates
|
| options/nixos/security.pam.services.<name>.failDelay.delay | The delay time (in microseconds) on failure.
|
| options/nixos/security.pam.services.<name>.u2fAuth | If set, users listed in
$XDG_CONFIG_HOME/Yubico/u2f_keys (or
$HOME/.config/Yubico/u2f_keys if XDG variable is
not set) are able to log in with the associated U2F key
|
| options/nixos/services.neo4j.ssl.policies.<name>.privateKey | The name of private PKCS #8 key file for this policy to be found
in the baseDirectory, or the absolute path to
the key file
|
| options/nixos/services.tahoe.nodes.<name>.client.shares.needed | The number of shares required to reconstitute a file.
|
| options/nixos/services.bitcoind.<name>.group | The group as which to run bitcoind.
|
| options/nixos/services.drupal.sites.<name>.modulesDir | The location for users to install Drupal modules.
|
| options/nixos/services.i2pd.inTunnels.<name>.accessList | I2P nodes that are allowed to connect to this service.
|
| options/nixos/services.openvpn.servers.<name>.down | Shell commands executed when the instance is shutting down.
|
| options/nixos/services.public-inbox.inboxes.<name>.url | URL where this inbox can be accessed over HTTP.
|
| options/nixos/services.i2pd.outTunnels.<name>.crypto.tagsToSend | Number of ElGamal/AES tags to send.
|
| options/nixos/services.tahoe.nodes.<name>.sftpd.hostPublicKeyFile | Path to the SSH host public key.
|
| options/nixos/services.sympa.settingsFile.<name>.text | Text of the file.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.serverName | Name of this virtual host
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.enable | Whether to enable the output.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.rotate | Output rotate configuration.
|
| options/nixos/services.h2o.hosts.<name>.tls.redirectCode | HTTP status used by globalRedirect & forceSSL
|
| options/nixos/services.fedimintd.<name>.api.bind | Address to bind on for API connections relied by the reverse proxy/tls terminator.
|
| options/nixos/services.fedimintd.<name>.api.port | Port to bind on for API connections relied by the reverse proxy/tls terminator.
|
| options/nixos/hardware.deviceTree.name | The name of an explicit dtb to be loaded, relative to the dtb base
|
| options/nixos/services.znapzend.zetup.<name>.plan | The znapzend backup plan to use for the source
|
| options/nixos/services.dependency-track.nginx.domain | The domain name under which to set up the virtual host.
|
| options/nixos/services.i2pd.inTunnels.<name>.outbound.length | Guaranteed minimum hops for ‹name› tunnels.
|
| options/nixos/services.geth.<name>.metrics.address | Listen address of Go Ethereum metrics service.
|
| options/nixos/services.drupal.sites.<name>.phpOptions | Options for PHP's php.ini file for this Drupal site.
|
| options/nixos/services.quicktun.<name>.tunMode | Whether to operate in tun (IP) or tap (Ethernet) mode.
|
| options/nixos/services.matrix-synapse.settings.database.name | The database engine name
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.ksk.rollPeriod | How frequently to change keys
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.zsk.rollPeriod | How frequently to change keys
|
| options/nixos/security.pam.services.<name>.makeHomeDir | Whether to try to create home directories for users
with $HOMEs pointing to nonexistent
locations on session login.
|
| options/home-manager/xdg.dataFile.<name>.target | Path to target file relative to xdg.dataHome.
|
| options/nixos/services.nix-store-gcs-proxy.<name>.enable | Whether to enable proxy for this bucket
|
| options/nixos/services.geth.<name>.websocket.apis | APIs to enable over WebSocket
|
| options/nixos/services.nebula.networks.<name>.cert | Path to the host certificate.
|
| options/nixos/services.borgbackup.jobs.<name>.startAt | When or how often the backup should run
|
| options/nixos/security.pam.services.<name>.mysqlAuth | If set, the pam_mysql module will be used to
authenticate users against a MySQL/MariaDB database.
|
| options/nixos/services.tinc.networks.<name>.extraConfig | Extra lines to add to the tinc service configuration file
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites.<name>.name | Name of the site.
|
| options/nixos/security.pam.services.<name>.gnupg.storeOnly | Don't send the password immediately after login, but store for PAM
session.
|
| options/nixos/systemd.services.<name>.startAt | Automatically start this unit at the given date/time, which
must be in the format described in
systemd.time(7)
|
| options/nixos/services.kimai.sites.<name>.settings | Structural Kimai's local.yaml configuration
|
| options/nixos/services.geth.<name>.authrpc.address | Listen address of Go Ethereum Auth RPC API.
|
| options/nixos/services.restic.backups.<name>.runCheck | Whether to run the check command with the provided checkOpts options.
|
| options/nixos/services.phpfpm.pools.<name>.phpPackage | The PHP package to use for running this PHP-FPM pool.
|
| options/nixos/services.agorakit.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.librenms.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.kanboard.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.dolibarr.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.fediwall.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.pixelfed.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.mainsail.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/virtualisation.kvmgt.vgpus.<name>.uuid | UUID(s) of VGPU device
|
| options/nixos/services.dokuwiki.sites.<name>.acl | Access Control Lists: see https://www.dokuwiki.org/acl
Mutually exclusive with services.dokuwiki.aclFile
Set this to a value other than null to take precedence over aclFile option
|
| options/nixos/services.bitmagnet.settings.postgres.name | Database name to connect to
|
| options/nixos/services.h2o.hosts.<name>.serverAliases | Additional names of virtual hosts served by this virtual host
configuration.
|
| options/nixos/systemd.user.services.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/services.netbird.clients.<name>.dir.state | A state directory used by NetBird client to store config.json, state.json & resolv.conf.
|
| options/nixos/services.netbird.tunnels.<name>.dir.state | A state directory used by NetBird client to store config.json, state.json & resolv.conf.
|
| options/nixos/services.openafsServer.cellServDB.<name>.*.ip | IP Address of a database server
|
| options/nixos/services.openafsClient.cellServDB.<name>.*.ip | IP Address of a database server
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.claimMaps.<name>.joinType | Determines how multiple values are joined to create the claim value
|
| options/nixos/services.drupal.sites.<name>.database.user | Database user.
|
| options/nixos/systemd.user.services.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/services.r53-ddns.hostname | Manually specify the hostname
|
| options/nixos/services.inadyn.settings.custom.<name>.hostname | Hostname alias(es).
|
| options/nixos/services.inadyn.settings.custom.<name>.username | Username for this DDNS provider.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.macAllowFile | Specifies a file containing the MAC addresses to allow if macAcl is set to "allow" or "radius"
|
| options/nixos/services.i2pd.outTunnels.<name>.outbound.length | Guaranteed minimum hops for ‹name› tunnels.
|
| options/home-manager/xdg.dataFile.<name>.enable | Whether this file should be generated
|
| options/nixos/boot.iscsi-initiator.name | Name of the iSCSI initiator to boot from
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.rsaPublicKey | Legacy RSA public key of the host in PEM format, including start and
end markers
|
| options/home-manager/programs.zsh.zplug.plugins.*.name | The name of the plugin.
|
| options/nixos/services.icingaweb2.virtualHost | Name of the nginx virtualhost to use and setup
|
| options/nixos/systemd.user.services.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/services.geth.<name>.websocket.port | Port number of Go Ethereum WebSocket API.
|
| options/nixos/services.drupal.sites.<name>.database.host | Database host address.
|
| options/nixos/services.drupal.sites.<name>.database.port | Database host port.
|
| options/nixos/services.asusd.auraConfigs.<name>.source | Path of the source file.
|
| options/nixos/services.rss2email.feeds.<name>.url | The URL at which to fetch the feed.
|
| options/nixos/services.redis.servers.<name>.unixSocket | The path to the socket to bind to.
|
| options/home-manager/services.podman.volumes.<name>.driver | The volume driver to use.
|
| options/home-manager/services.podman.volumes.<name>.labels | The labels to apply to the volume.
|
| options/nixos/services.neo4j.ssl.policies.<name>.trustAll | Makes this policy trust all remote parties
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.settings | Configuration for this host
|
| options/nixos/services.akkoma.config.":pleroma".":instance".name | Instance name.
|
| options/home-manager/services.restic.backups.<name>.runCheck | Whether to run 'restic check' with the provided checkOpts options
|
| options/nixos/services.openvpn.servers.<name>.authUserPass.username | The username to store inside the credentials file.
|
| options/nixos/services.dokuwiki.sites.<name>.aclFile | Location of the dokuwiki acl rules
|
| options/nixos/services.nsd.zones.<name>.multiMasterCheck | If enabled, checks all masters for the last zone version
|
| options/nixos/services.hans.clients.<name>.extraConfig | Additional command line parameters
|
| options/nixos/services.dokuwiki.sites.<name>.stateDir | Location of the DokuWiki state directory.
|
| options/nixos/services.iodine.clients.<name>.server | Hostname of server running iodined
|
| options/nixos/services.restic.backups.<name>.checkOpts | A list of options for 'restic check'.
|
| options/nixos/services.rspamd.workers.<name>.enable | Whether to run the rspamd worker.
|
| options/home-manager/services.podman.volumes.<name>.device | The path of a device which is mounted for the volume.
|
| options/home-manager/services.podman.volumes.<name>.autoStart | Whether to create the volume on boot.
|
| options/nixos/systemd.services.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/services.drupal.sites.<name>.extraConfig | Extra configuration values that you want to insert into settings.php
|
| options/nixos/services.phpfpm.pools.<name>.phpOptions | "Options appended to the PHP configuration file php.ini used for this PHP-FPM pool."
|
| options/nixos/services.writefreely.database.name | The name of the database to store data in.
|
| options/nixos/security.pam.services.<name>.usshAuth | If set, users with an SSH certificate containing an authorized principal
in their SSH agent are able to log in
|
| options/nixos/security.pam.services.<name>.limits | Attribute set describing resource limits
|
| options/nixos/systemd.user.services.<name>.scriptArgs | Arguments passed to the main process script
|
| options/nixos/systemd.user.services.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.user.services.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/home-manager/services.podman.machines.<name>.cpus | Number of CPUs to allocate to the machine
|
| options/home-manager/services.podman.machines.<name>.swap | Swap size in MB for the machine
|
| options/nixos/services.dokuwiki.sites.<name>.acl.*.actor | User or group to restrict
|
| options/nixos/services.bepasty.servers.<name>.dataDir | Path to the directory where the pastes will be saved to
|
| options/nixos/services.xserver.xkb.extraLayouts.<name>.typesFile | The path to the xkb types file
|
| options/nixos/services.phpfpm.pools.<name>.extraConfig | Extra lines that go into the pool configuration
|
| options/nixos/services.postfix.settings.master.<name>.command | A program name specifying a Postfix service/daemon process
|
| options/nixos/security.pam.services.<name>.ttyAudit.enable | Enable or disable TTY auditing for specified users
|
| options/nixos/services.bitcoind.<name>.dbCache | Override the default database cache size in MiB.
|
| options/nixos/security.pam.services.<name>.ttyAudit.openOnly | Set the TTY audit flag when opening the session,
but do not restore it when closing the session
|
| options/nixos/services.sourcehut.settings."sr.ht".site-name | The name of your network of sr.ht-based sites.
|
| options/nixos/services.netbird.tunnels.<name>.ui.enable | Controls presence of netbird-ui wrapper for this NetBird client.
|
| options/nixos/services.netbird.clients.<name>.ui.enable | Controls presence of netbird-ui wrapper for this NetBird client.
|
| options/nixos/services.nsd.zones.<name>.children | Children zones inherit all options of their parents
|
| options/darwin/users.users.<name>.home | The user's home directory
|
| options/nixos/services.spiped.config.<name>.waitForDNS | Wait for DNS
|
| options/nixos/services.filebeat.inputs.<name>.type | The input type
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.subnets | The subnets which this tinc daemon will serve
|
| options/home-manager/services.restic.backups.<name>.checkOpts | A list of options for 'restic check'
|
| options/nixos/services.i2pd.ifname4 | IPv4 interface to bind to.
|
| options/nixos/services.i2pd.ifname6 | IPv6 interface to bind to.
|
| options/nixos/services.restic.backups.<name>.paths | Which paths to backup, in addition to ones specified via
dynamicFilesFrom
|
| options/nixos/security.pam.services.<name>.limits.*.type | Type of this limit
|
| options/home-manager/accounts.calendar.accounts.<name>.name | Unique identifier of the calendar
|
| options/home-manager/xdg.configFile.<name>.text | Text of the file
|
| options/nixos/services.awstats.configs.<name>.extraConfig | Extra configuration to be appended to awstats.${name}.conf.
|
| options/nixos/services.xserver.displayManager.lightdm.greeter.name | The name of a .desktop file in the directory specified
in the 'package' option.
|
| options/nixos/services.frp.instances.<name>.role | The frp consists of client and server
|
| options/nixos/systemd.services.<name>.aliases | Aliases of that unit.
|
| options/nixos/security.pam.services.<name>.limits.*.item | Item this limit applies to
|
| options/nixos/services.ax25.axports.<name>.window | Default window size for this interface.
|
| options/nixos/services.uhub.<name>.plugins.*.plugin | Path to plugin file.
|
| options/nixos/security.pam.services.<name>.howdy.enable | Whether to enable the Howdy PAM module
|
| options/nixos/services.wyoming.piper.servers.<name>.useCUDA | Whether to accelerate the underlying onnxruntime library with CUDA.
|
| options/nixos/services.filebeat.modules.<name>.module | The name of the module
|
| options/nixos/services.syncoid.commands.<name>.source | Source ZFS dataset
|
| options/home-manager/programs.rbenv.plugins.*.name | Name of the plugin.
|
| options/home-manager/programs.lapce.plugins.*.name | Name of the plugin.
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.ksk.prePublish | How long in advance to publish new keys
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.zsk.prePublish | How long in advance to publish new keys
|
| options/nixos/security.pam.services.<name>.updateWtmp | Whether to update /var/log/wtmp.
|
| options/home-manager/home.file.<name>.source | Path of the source file or directory
|
| options/nixos/services.logcheck.ignore.<name>.level | Set the logcheck level.
|
| options/nixos/services.sanoid.datasets.<name>.daily | Number of daily snapshots.
|
| options/nixos/services.znapzend.zetup.<name>.enable | Whether to enable this source.
|
| options/nixos/services.bacula-sd.director.<name>.tls.require | Require TLS or TLS-PSK encryption
|
| options/nixos/services.bacula-fd.director.<name>.tls.require | Require TLS or TLS-PSK encryption
|
| options/nixos/services.ax25.axports.<name>.enable | Whether to enable Enables the axport interface.
|
| options/nixos/services.ax25.axports.<name>.paclen | Default maximum packet size for this interface.
|
| options/nixos/services.wyoming.piper.servers.<name>.piper | The piper-tts package to use.
|
| options/nixos/services.neo4j.ssl.policies.<name>.clientAuth | The client authentication stance for this policy.
|
| options/nixos/networking.nftables.tables.<name>.name | Table name.
|
| options/home-manager/services.restic.backups.<name>.paths | Paths to back up, alongside those defined by the dynamicFilesFrom
option
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.primary | Whether output should be marked as primary
|
| options/nixos/services.dokuwiki.sites.<name>.acl.*.level | Permission level to restrict the actor(s) to
|
| options/nixos/services.bepasty.servers.<name>.workDir | Path to the working directory (used for config and pidfile)
|
| options/nixos/services.spiped.config.<name>.encrypt | Take unencrypted connections from the
source socket and send encrypted
connections to the target socket.
|
| options/nixos/services.spiped.config.<name>.decrypt | Take encrypted connections from the
source socket and send unencrypted
connections to the target socket.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.scale | Output scale configuration
|
| options/home-manager/services.colima.profiles.<name>.logFile | Combined stdout and stderr log file for the Colima service.
|
| options/home-manager/services.kanshi.profiles.<name>.exec | Commands executed after the profile is successfully applied
|
| options/nixos/services.inadyn.settings.custom.<name>.ddns-server | DDNS server name.
|
| options/nixos/services.inadyn.settings.custom.<name>.ssl | Whether to use HTTPS for this DDNS provider.
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.nodelay | Enables TCP_NODELAY on the TCP socket.
|
| options/nixos/services.nsd.zones.<name>.rrlWhitelist | Whitelists the given rrl-types.
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.forward | The IP and port to forward all traffic to.
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.forward | The IP and port to forward all traffic to.
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.nodelay | Enables TCP_NODELAY on the TCP socket.
|
| options/nixos/services.tor.relay.onionServices.<name>.path | Path where to store the data files of the hidden service
|
| options/home-manager/programs.floorp.profiles.<name>.containers.<name>.name | Container name, e.g., shopping.
|
| options/nixos/power.ups.ups.<name>.summary | Lines which would be added inside ups.conf for handling this UPS.
|
| options/nixos/services.jupyter.kernels.<name>.displayName | Name that will be shown to the user.
|
| options/nixos/services.sourcehut.settings."sr.ht".owner-name | Owner's name.
|
| options/nixos/services.rss2email.feeds.<name>.to | Email address to which to send feed items
|
| options/nixos/security.pam.services.<name>.fprintAuth | If set, fingerprint reader will be used (if exists and
your fingerprints are enrolled).
|
| options/nixos/services.i2pd.inTunnels.<name>.inbound.quantity | Number of simultaneous ‹name› tunnels.
|
| options/nixos/security.pam.services.<name>.enableUMask | If enabled, the pam_umask module will be loaded.
|
| options/nixos/services.acpid.handlers.<name>.action | Shell commands to execute when the event is triggered.
|
| options/nixos/services.logcheck.ignore.<name>.regex | Regex specifying which log lines to ignore.
|
| options/nixos/services.redis.servers.<name>.appendOnly | By default data is only periodically persisted to disk, enable this option to use an append-only file for improved persistence.
|
| options/nixos/services.spiped.config.<name>.timeout | Timeout, in seconds, after which an attempt to connect to
the target or a protocol handshake will be aborted (and the
connection dropped) if not completed
|
| options/nixos/services.limesurvey.virtualHost.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/nixos/programs.regreet.iconTheme.name | Name of the icon theme to use for regreet.
|
| options/nixos/security.pam.services.<name>.setLoginUid | Set the login uid of the process
(/proc/self/loginuid) for auditing
purposes
|
| options/nixos/services.ndppd.proxies.<name>.timeout | Controls how long to wait for a Neighbor Advertisement Message before
invalidating the entry, in milliseconds.
|
| options/home-manager/systemd.user.services.<name>.Service.ExecStart | Command that is executed when this service is started.
|
| options/darwin/services.gitlab-runner.services.<name>.tagList | Tag list.
|
| options/nixos/security.pam.services.<name>.nodelay | Whether the delay after typing a wrong password should be disabled.
|
| options/home-manager/services.podman.images.<name>.extraConfig | INI sections and values to populate the Image Quadlet.
|
| options/home-manager/services.podman.builds.<name>.extraConfig | INI sections and values to populate the Build Quadlet.
|
| options/nixos/services.logcheck.ignoreCron.<name>.user | User that runs the cronjob.
|
| options/nixos/services.nebula.networks.<name>.isRelay | Whether this node is a relay.
|
| options/nixos/services.limesurvey.httpd.virtualHost.servedFiles | This option provides a simple way to serve individual, static files.
This option has been deprecated and will be removed in a future
version of NixOS
|
| options/nixos/services.borgbackup.jobs.<name>.archiveBaseName | How to name the created archives
|
| options/nixos/services.anuko-time-tracker.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.quicktun.<name>.localPort | Local UDP port.
|
| options/nixos/services.tahoe.nodes.<name>.sftpd.hostPrivateKeyFile | Path to the SSH host private key.
|
| options/nixos/services.pppd.peers.<name>.autostart | Whether the PPP session is automatically started at boot time.
|
| options/nixos/services.netbird.clients.<name>.logLevel | Log level of the NetBird daemon.
|
| options/nixos/services.netbird.tunnels.<name>.logLevel | Log level of the NetBird daemon.
|
| options/nixos/services.i2pd.outTunnels.<name>.inbound.quantity | Number of simultaneous ‹name› tunnels.
|
| options/nixos/security.pam.services.<name>.yubicoAuth | If set, users listed in
~/.yubico/authorized_yubikeys
are able to log in with the associated Yubikey tokens.
|
| options/nixos/services.kimai.sites.<name>.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/security.pam.services.<name>.howdy.control | This option sets the PAM "control" used for this module.
|
| options/nixos/services.akkoma.initDb.username | Name of the database user to initialise the database with
|
| options/home-manager/services.podman.machines.<name>.image | Bootable image to use for the machine
|
| options/nixos/services.gitwatch.<name>.enable | Whether to enable watching for repo.
|
| options/nixos/services.gitwatch.<name>.remote | Optional url of remote repository
|
| options/nixos/services.gitwatch.<name>.branch | Optional branch in remote repository
|
| options/nixos/services.bitcoind.<name>.enable | Whether to enable Bitcoin daemon.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.module | Optional PKCS#11 module name.
|
| options/nixos/services.nebula.networks.<name>.listen.port | Port number to listen on.
|
| options/nixos/services.nebula.networks.<name>.listen.host | IP address to listen on.
|
| options/nixos/services.znc.confOptions.networks.<name>.port | IRC server port.
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.ksk.postPublish | How long after deactivation to keep a key in the zone
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.zsk.postPublish | How long after deactivation to keep a key in the zone
|
| options/nixos/services.postfix.masterConfig.<name>.type | The type of the service
|
| options/nixos/security.pam.services.<name>.failDelay.enable | If enabled, this will replace the FAIL_DELAY setting from login.defs
|
| options/nixos/services.pgbackrest.stanzas.<name>.jobs.<name>.schedule | When or how often the backup should run
|
| options/nixos/security.pam.services.<name>.sshAgentAuth | If set, the calling user's SSH agent is used to authenticate
against the keys in the calling user's
~/.ssh/authorized_keys
|
| options/nixos/systemd.services.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/services.nix-store-gcs-proxy.<name>.address | The address of the proxy.
|
| options/nixos/services.redis.servers.<name>.extraParams | Extra parameters to append to redis-server invocation
|
| options/home-manager/systemd.user.services.<name>.Unit.X-SwitchMethod | The preferred method to use when switching from an old to a new
version of this service.
|
| options/nixos/services.frp.instances.<name>.enable | Whether to enable frp.
|
| options/nixos/services.akkoma.frontends.<name>.ref | Akkoma frontend reference.
|
| options/nixos/services.tinc.networks.<name>.package | The tinc_pre package to use.
|
| options/nixos/services.redis.servers.<name>.unixSocketPerm | Change permissions for the socket
|
| options/nixos/services.znapzend.zetup.<name>.destinations.<name>.label | Label for this destination
|
| options/nixos/services.xserver.xkb.extraLayouts.<name>.compatFile | The path to the xkb compat file
|
| options/nixos/users.extraUsers.<name>.home | The user's home directory.
|
| options/nixos/users.extraUsers.<name>.uid | The account UID
|
| options/nixos/services.awstats.configs.<name>.webService.hostname | The hostname the web service appears under.
|
| options/nixos/services.spiped.config.<name>.source | Address on which spiped should listen for incoming
connections
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.gtk.theme.name | Name of the theme to use for the lightdm-gtk-greeter.
|
| options/nixos/systemd.services.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/services.redis.servers.<name>.appendFsync | How often to fsync the append-only log, options: no, always, everysec.
|
| options/home-manager/xdg.cacheFile.<name>.force | Whether the target path should be unconditionally replaced
by the managed file source
|
| options/home-manager/xdg.stateFile.<name>.force | Whether the target path should be unconditionally replaced
by the managed file source
|
| options/nixos/services.neo4j.ssl.policies.<name>.ciphers | Restrict the allowed ciphers of this policy to those defined
here
|
| options/nixos/security.pam.services.<name>.limits.*.value | Value of this limit
|
| options/nixos/services.k3s.manifests.<name>.source | Path of the source .yaml file.
|
| options/nixos/services.k3s.manifests.<name>.enable | Whether this manifest file should be generated.
|
| options/nixos/services.awstats.configs.<name>.logFile | The log file to be scanned
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.claimMaps.<name>.valuesByGroup | Maps kanidm groups to values for the claim.
|
| options/nixos/services.znc.confOptions.networks.<name>.useSSL | Whether to use SSL to connect to the IRC server.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.settings | Extra configuration options to put at the end of this BSS's defintion in the
hostapd.conf for the associated interface
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.threads | Sets the number of worker threads to use
|
| options/nixos/services.jupyter.kernels.<name>.language | Language of the environment
|
| options/home-manager/programs.boxxy.rules.*.name | Unique identifier of the boxxy rule
|
| options/home-manager/services.podman.machines.<name>.diskSize | Disk size in GB for the machine
|
| options/home-manager/programs.librewolf.profiles.<name>.name | Profile name.
|
| options/home-manager/xdg.cacheFile.<name>.target | Path to target file relative to xdg.cacheHome.
|
| options/nixos/services.cjdns.UDPInterface.connectTo.<name>.login | (optional) name your peer has for you
|
| options/nixos/services.cjdns.ETHInterface.connectTo.<name>.login | (optional) name your peer has for you
|
| options/nixos/services.bookstack.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.nylon.<name>.deniedIPRanges | Denied client IP ranges, these gets evaluated after the allowed IP ranges, defaults to all IPv4 addresses:
[ "0.0.0.0/0" ]
To block all other access than the allowed.
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.slick.font.name | Name of the font to use.
|
| options/nixos/services.znapzend.zetup.<name>.sendDelay | Specify delay (in seconds) before sending snaps to the destination
|
| options/nixos/systemd.services.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/services.public-inbox.inboxes.<name>.watch | Paths for public-inbox-watch(1) to monitor for new mail.
|
| options/nixos/services.ndppd.proxies.<name>.interface | Listen for any Neighbor Solicitation messages on this interface,
and respond to them according to a set of rules
|
| options/nixos/services.firezone.server.provision.accounts.<name>.actors.<name>.type | The account type
|
| options/darwin/nix.registry.<name>.to | The flake reference from is rewritten to.
|
| options/home-manager/nix.registry.<name>.to | The flake reference to which from> is to be rewritten.
|
| options/nixos/services.firewalld.zones.<name>.short | Short description for the zone.
|
| options/nixos/services.firewalld.zones.<name>.rules | Rich rules for the zone.
|
| options/nixos/services.firewalld.zones.<name>.ports | Ports to allow in the zone.
|
| options/nixos/services.restic.backups.<name>.package | The restic package to use.
|
| options/home-manager/services.restic.backups.<name>.package | The restic package to use.
|
| options/nixos/services.authelia.instances.<name>.user | The name of the user for this authelia instance.
|
| options/nixos/services.v4l2-relayd.instances.<name>.cardLabel | The name the camera will show up as.
|
| options/nixos/systemd.services.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/systemd.services.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/power.ups.users.<name>.upsmon | Add the necessary actions for a upsmon process to work
|
| options/nixos/services.prometheus.exporters.nginxlog.settings.namespaces | Namespaces to collect the metrics for
|
| options/nixos/systemd.services.<name>.scriptArgs | Arguments passed to the main process script
|
| options/darwin/services.github-runners.<name>.user | User under which to run the service
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.module | Optional PKCS#11 module name.
|
| options/nixos/services.openafsServer.roles.backup.cellServDB.<name>.*.ip | IP Address of a database server
|
| options/nixos/services.gitlab-runner.services.<name>.tagList | Tag list
|
| options/nixos/services.jupyter.kernels.<name>.logo64 | Path to 64x64 logo png.
|
| options/nixos/services.jupyter.kernels.<name>.logo32 | Path to 32x32 logo png.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.position | Output position
|
| options/nixos/services.restic.backups.<name>.pruneOpts | A list of options (--keep-* et al.) for 'restic forget
--prune', to automatically prune old snapshots
|
| options/home-manager/xdg.stateFile.<name>.target | Path to target file relative to xdg.stateHome.
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.enso.theme.name | Name of the theme to use for the lightdm-enso-os-greeter
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.slot | Optional slot number of the token that stores the certificate.
|
| options/nixos/services.fedimintd.<name>.bitcoin.rpc.url | Bitcoin node (bitcoind/electrum/esplora) address to connect to
|
| options/nixos/services.stash.settings.stash_boxes.*.name | The name of the Stash Box
|
| options/nixos/services.tinc.networks.<name>.debugLevel | The amount of debugging information to add to the log. 0 means little
logging while 5 is the most logging. man tincd for
more details.
|
| options/home-manager/programs.firefox.profiles.<name>.containers.<name>.name | Container name, e.g., shopping.
|
| options/nixos/services.errbot.instances.<name>.backend | Errbot backend name.
|
| options/home-manager/home.file.<name>.onChange | Shell commands to run when file has changed between
generations
|
| options/nixos/services.drupal.sites.<name>.privateFilesDir | The location of the Drupal private files directory.
|
| options/nixos/services.openvpn.servers.<name>.autoStart | Whether this OpenVPN instance should be started automatically.
|
| options/nixos/services.prometheus.exporters.nginx.user | User name under which the nginx exporter shall be run.
|
| options/nixos/services.rspamd.overrides.<name>.text | Text of the file.
|
| options/nixos/services.tarsnap.archives.<name>.printStats | Print global archive statistics upon completion
|
| options/nixos/services.bcg.mqtt.username | MQTT server access username.
|
| options/nixos/services.librespeed.frontend.servers.*.name | Name shown in the server list.
|
| options/nixos/services.quicktun.<name>.upScript | Run specified command or script after the tunnel device has been opened.
|
| options/nixos/services.ax25.axports.<name>.kissParams | Kissattach parameters for this interface.
|
| options/nixos/services.nsd.zones.<name>.allowAXFRFallback | If NSD as secondary server should be allowed to AXFR if the primary
server does not allow IXFR.
|
| options/nixos/services.netbird.tunnels.<name>.dir.runtime | A runtime directory used by NetBird client.
|
| options/nixos/services.netbird.clients.<name>.dir.runtime | A runtime directory used by NetBird client.
|
| options/nixos/services.wyoming.piper.servers.<name>.extraArgs | Extra arguments to pass to the server commandline.
|
| options/nixos/services.wyoming.piper.servers.<name>.enable | Whether to enable Wyoming Piper server.
|
| options/nixos/services.cjdns.ETHInterface.connectTo.<name>.peerName | (optional) human-readable name for peer
|
| options/nixos/services.cjdns.UDPInterface.connectTo.<name>.peerName | (optional) human-readable name for peer
|
| options/nixos/services.sympa.settingsFile.<name>.source | Path of the source file.
|
| options/nixos/services.sanoid.datasets.<name>.yearly | Number of yearly snapshots.
|
| options/nixos/services.sanoid.datasets.<name>.hourly | Number of hourly snapshots.
|
| options/nixos/services.nebula.networks.<name>.enable | Enable or disable this network.
|
| options/home-manager/services.podman.networks.<name>.driver | The network driver to use.
|
| options/home-manager/services.podman.networks.<name>.labels | The labels to apply to the network.
|
| options/home-manager/services.podman.networks.<name>.subnet | The subnet to use for the network.
|
| options/nixos/services.znapzend.zetup.<name>.mbuffer.size | The size for mbuffer
|
| options/nixos/services.wstunnel.clients.<name>.tlsSNI | Use this as the SNI while connecting via TLS
|
| options/nixos/services.netbird.tunnels.<name>.login.enable | Whether to enable automated login for NetBird client.
|
| options/nixos/services.netbird.clients.<name>.login.enable | Whether to enable automated login for NetBird client.
|
| options/nixos/services.restic.backups.<name>.exclude | Patterns to exclude when backing up
|
| options/home-manager/xdg.cacheFile.<name>.enable | Whether this file should be generated
|
| options/home-manager/xdg.stateFile.<name>.enable | Whether this file should be generated
|
| options/nixos/services.fedimintd.<name>.bitcoin.rpc.kind | Kind of a bitcoin node.
|
| options/home-manager/services.pizauth.accounts.<name>.authUri | The OAuth2 server's authentication URI.
|
| options/nixos/services.autosuspend.checks.<name>.class | Name of the class implementing the check
|
| options/nixos/security.pam.services.<name>.gnupg.enable | If enabled, pam_gnupg will attempt to automatically unlock the
user's GPG keys with the login password via
gpg-agent
|
| options/nixos/services.wstunnel.servers.<name>.tlsKey | TLS key to use instead of the hardcoded on in case of HTTPS connections
|
| options/nixos/services.fedimintd.<name>.api_ws.url | Public URL of the API address of the reverse proxy/tls terminator
|
| options/nixos/systemd.user.services.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/services.gitlab-runner.services.<name>.limit | Limit how many jobs can be handled concurrently by this service.
0 (default) simply means don't limit.
|
| options/darwin/services.gitlab-runner.services.<name>.limit | Limit how many jobs can be handled concurrently by this service.
0 (default) simply means don't limit.
|
| options/home-manager/xdg.dataFile.<name>.source | Path of the source file or directory
|
| options/nixos/services.yandex-disk.username | Your yandex.com login name.
|
| options/nixos/services.snapper.configs.<name>.FSTYPE | Filesystem type
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.gtk.iconTheme.name | Name of the icon theme to use for the lightdm-gtk-greeter.
|
| options/nixos/systemd.user.services.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.addresses | The external address where the host can be reached
|
| options/nixos/services.hostapd.radios.<name>.driver | The driver hostapd will use.
nl80211 is used with all Linux mac80211 drivers.
none is used if building a standalone RADIUS server that does
not control any wireless/wired driver
|
| options/nixos/services.redis.servers.<name>.masterAuth | If the master is password protected (using the requirePass configuration)
it is possible to tell the slave to authenticate before starting the replication synchronization
process, otherwise the master will refuse the slave request.
(STORED PLAIN TEXT, WORLD-READABLE IN NIX STORE)
|
| options/home-manager/services.podman.machines.<name>.autoStart | Whether to automatically start this machine on login.
|
| options/nixos/services.k3s.autoDeployCharts.<name>.values | Override default chart values via Nix expressions
|
| options/nixos/services.postfix.masterConfig.<name>.args | Arguments to pass to the command
|
| options/nixos/services.syncoid.commands.<name>.sshKey | SSH private key file to use to login to the remote system
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.file | Absolute path to the certificate to load
|
| options/nixos/services.kimai.sites.<name>.database.charset | Database charset.
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.slick.theme.name | Name of the theme to use for the lightdm-slick-greeter.
|
| options/nixos/services.geth.<name>.websocket.enable | Whether to enable Go Ethereum WebSocket API.
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.recvTimeout | An application timeout on receiving data from the TCP socket.
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.recvTimeout | An application timeout on receiving data from the TCP socket.
|
| options/nixos/services.nebula.networks.<name>.relays | List of IPs of relays that this node should allow traffic from.
|
| options/home-manager/services.podman.builds.<name>.extraPodmanArgs | Extra arguments to pass to the podman build command.
|
| options/nixos/services.dokuwiki.sites.<name>.package | The dokuwiki package to use.
|
| options/nixos/services.znapzend.zetup.<name>.dataset | The dataset to use for this source.
|
| options/home-manager/services.restic.backups.<name>.ssh-package | The openssh package to use.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.actors.<name>.email | The email address used to authenticate as this account
|
| options/nixos/services.pgbackrest.stanzas.<name>.instances.<name>.host | PostgreSQL host for operating remotely.
|
| options/nixos/services.drupal.sites.<name>.database.socket | Path to the unix socket file to use for authentication.
|
| options/home-manager/services.restic.backups.<name>.pruneOpts | A list of policy options for 'restic forget --prune', to automatically
prune old snapshots
|
| options/home-manager/services.restic.backups.<name>.exclude | Patterns to exclude when backing up
|
| options/nixos/services.dokuwiki.sites.<name>.usersFile | Location of the dokuwiki users file
|
| options/nixos/services.phpfpm.pools.<name>.settings | PHP-FPM pool directives
|
| options/nixos/users.users.<name>.shell | The path to the user's shell
|
| options/nixos/services.xserver.xkb.extraLayouts.<name>.symbolsFile | The path to the xkb symbols file
|
| options/nixos/services.i2pd.inTunnels.<name>.outbound.quantity | Number of simultaneous ‹name› tunnels.
|
| options/home-manager/services.podman.images.<name>.extraPodmanArgs | Extra arguments to pass to the podman image pull command.
|
| options/home-manager/services.podman.networks.<name>.autoStart | Whether to start the network on boot (requires user lingering).
|
| options/nixos/users.extraUsers.<name>.homeMode | The user's home directory mode in numeric format
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.slot | Optional slot number of the token that stores the certificate.
|
| options/nixos/services.borgbackup.jobs.<name>.repo | Remote or local repository to back up to.
|
| options/nixos/services.iodine.clients.<name>.extraConfig | Additional command line parameters
|
| options/nixos/services.ax25.axports.<name>.package | The ax25-tools package to use.
|
| options/nixos/services.nylon.<name>.verbosity | Enable verbose output, default is to not be verbose.
|
| options/nixos/services.anubis.instances.<name>.settings.BIND | The address that Anubis listens to
|
| options/nixos/services.inadyn.settings.provider.<name>.hostname | Hostname alias(es).
|
| options/nixos/services.inadyn.settings.provider.<name>.username | Username for this DDNS provider.
|
| options/nixos/services.github-runners.<name>.user | User under which to run the service
|
| options/nixos/services.borgbackup.jobs.<name>.dateFormat | Arguments passed to date
to create a timestamp suffix for the archive name.
|
| options/nixos/services.wstunnel.servers.<name>.listen.host | The hostname.
|
| options/nixos/services.wstunnel.servers.<name>.listen.port | The port.
|
| options/nixos/services.kanata.keyboards.<name>.port | Port to run the TCP server on. null will not run the server.
|
| options/nixos/services.sympa.settingsFile.<name>.enable | Whether this file should be generated
|
| options/home-manager/services.podman.machines.<name>.memory | Memory in MB to allocate to the machine
|
| options/home-manager/services.podman.images.<name>.password | Password used to connect to registry. (Will be visible in nix store)
|
| options/nixos/services.authelia.instances.<name>.group | The name of the group for this authelia instance.
|
| options/nixos/systemd.user.units.<name>.text | Text of this systemd unit.
|
| options/nixos/services.quicktun.<name>.remotePort | Remote UDP port
|
| options/nixos/services.jirafeau.nginxConfig.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.librenms.distributedPoller.name | Custom name of this poller.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.auth.<name>.adapter | The auth adapter type
|
| options/nixos/services.postfix.settings.master.<name>.type | The type of the service
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.enso.iconTheme.name | Name of the icon theme to use for the lightdm-enso-os-greeter
|
| options/nixos/services.fedimintd.<name>.api_ws.bind | Address to bind on for API connections relied by the reverse proxy/tls terminator.
|
| options/nixos/services.k3s.autoDeployCharts.<name>.enable | Whether to enable the installation of this Helm chart
|
| options/nixos/services.quicktun.<name>.privateKeyFile | Path to file containing local secret key in binary or hexadecimal form.
Not needed when services.quicktun..protocol is set to raw.
|
| options/home-manager/services.podman.volumes.<name>.extraConfig | INI sections and values to populate the Volume Quadlet.
|
| options/darwin/users.users.<name>.isHidden | Whether to make the user account hidden.
|
| options/nixos/services.hans.clients.<name>.passwordFile | File that contains password
|
| options/nixos/services.i2pd.outTunnels.<name>.outbound.quantity | Number of simultaneous ‹name› tunnels.
|
| options/nixos/services.kubernetes.kubelet.taints.<name>.key | Key of taint.
|
| options/nixos/services.borgbackup.jobs.<name>.postCreate | Shell commands to run after borg create
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.module | Optional PKCS#11 module name.
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.addresses.*.port | The port where the host can be reached
|
| options/nixos/services.wyoming.piper.servers.<name>.noiseScale | Generator noise value.
|
| options/nixos/services.rke2.autoDeployCharts.<name>.package | The packaged Helm chart
|
| options/nixos/services.fedimintd.<name>.api_ws.port | TCP Port to bind on for API connections relayed by the reverse proxy/tls terminator.
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.subnets.*.weight | Indicates the priority over identical Subnets owned by different nodes
|
| options/nixos/services.github-runners.<name>.runnerGroup | Name of the runner group to add this runner to (defaults to the default runner group)
|
| options/darwin/services.github-runners.<name>.runnerGroup | Name of the runner group to add this runner to (defaults to the default runner group)
|
| options/nixos/services.gitlab-runner.services.<name>.cloneUrl | Overwrite the URL for the GitLab instance
|
| options/darwin/services.gitlab-runner.services.<name>.cloneUrl | Overwrite the URL for the GitLab instance
|
| options/nixos/services.hostapd.radios.<name>.wifi6.enable | Enables support for IEEE 802.11ax (WiFi 6, HE)
|
| options/nixos/services.redis.servers.<name>.settings | Redis configuration
|
| options/nixos/systemd.units.<name>.text | Text of this systemd unit.
|
| options/nixos/services.borgbackup.jobs.<name>.wrapper | Name of the wrapper that is installed into PATH
|
| options/nixos/services.errbot.instances.<name>.dataDir | Data directory for errbot instance.
|
| options/nixos/services.wyoming.piper.servers.<name>.noiseWidth | Phoneme width noise value.
|
| options/home-manager/services.muchsync.remotes.<name>.remote.host | Remote SSH host to synchronize with.
|
| options/nixos/services.dokuwiki.sites.<name>.poolConfig | Options for the DokuWiki PHP pool
|
| options/nixos/services.nntp-proxy.users.<name>.passwordHash | SHA-512 password hash (can be generated by
mkpasswd -m sha-512 <password>)
|
| options/nixos/services.bitcoind.<name>.configFile | The configuration file path to supply bitcoind.
|
| options/nixos/services.kanidm.provision.persons.<name>.legalName | Full legal name
|
| options/nixos/services.tinc.networks.<name>.chroot | Change process root directory to the directory where the config file is located (/etc/tinc/netname/), for added security
|
| options/nixos/services.netbird.clients.<name>.suffixedName | A systemd service name to use (without .service suffix).
|
| options/nixos/services.netbird.tunnels.<name>.suffixedName | A systemd service name to use (without .service suffix).
|
| options/nixos/services.nbd.server.exports.<name>.extraOptions | Extra options for this export
|
| options/nixos/services.netbird.clients.<name>.login.setupKeyFile | A Setup Key file path used for automated login of the machine.
|
| options/nixos/services.netbird.tunnels.<name>.login.setupKeyFile | A Setup Key file path used for automated login of the machine.
|
| options/nixos/services.hostapd.radios.<name>.wifi5.enable | Enables support for IEEE 802.11ac (WiFi 5, VHT)
|
| options/nixos/services.tarsnap.archives.<name>.maxbw | Abort archival if upstream bandwidth usage in bytes
exceeds this threshold.
|
| options/nixos/services.vdirsyncer.jobs.<name>.user | User account to run vdirsyncer as, otherwise as a systemd
dynamic user
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.file | Absolute path to the certificate to load
|
| options/home-manager/programs.docker-cli.contexts.<name>.Name | Name of the Docker context
|
| options/nixos/services.restic.backups.<name>.command | Command to pass to --stdin-from-command
|
| options/nixos/hardware.sata.timeout.drives.*.name | Drive name without the full path.
|
| options/nixos/services.jupyter.kernels.<name>.extraPaths | Extra paths to link in kernel directory
|
| options/nixos/services.ytdl-sub.instances.<name>.enable | Whether to enable ytdl-sub instance.
|
| options/nixos/services.nebula.networks.<name>.tun.disable | When tun is disabled, a lighthouse can be started without a local tun interface (and therefore without root).
|
| options/darwin/services.github-runners.<name>.group | Group under which to run the service
|
| options/nixos/services.firewalld.zones.<name>.ports.*.port | |
| options/nixos/services.cgit.<name>.gitHttpBackend.enable | Whether to bypass cgit and use git-http-backend for HTTP clones
|
| options/nixos/services.github-runners.<name>.url | Repository to add the runner to
|
| options/darwin/services.github-runners.<name>.url | Repository to add the runner to
|
| options/nixos/services.netbird.clients.<name>.config | Additional configuration that exists before the first start and
later overrides the existing values in config.json
|
| options/nixos/services.netbird.tunnels.<name>.config | Additional configuration that exists before the first start and
later overrides the existing values in config.json
|
| options/nixos/services.cjdns.ETHInterface.connectTo.<name>.hostname | Optional hostname to add to /etc/hosts; prevents reverse lookup failures.
|
| options/nixos/services.cjdns.UDPInterface.connectTo.<name>.hostname | Optional hostname to add to /etc/hosts; prevents reverse lookup failures.
|
| options/nixos/services.rspamd.workers.<name>.extraConfig | Additional entries to put verbatim into worker section of rspamd config file.
|
| options/nixos/systemd.user.services.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/services.bitcoind.<name>.package | The bitcoind package to use.
|
| options/nixos/services.znapzend.zetup.<name>.destinations.<name>.dataset | Dataset name to send snapshots to.
|
| options/nixos/services.ytdl-sub.instances.<name>.config | Configuration for ytdl-sub
|
| options/nixos/services.rke2.autoDeployCharts.<name>.repo | The repo of the Helm chart
|
| options/nixos/services.dokuwiki.sites.<name>.phpPackage | The php package to use.
|
| options/nixos/services.sanoid.templates.<name>.daily | Number of daily snapshots.
|
| options/nixos/services.redis.servers.<name>.requirePassFile | File with password for the database.
|
| options/nixos/services.vault-agent.instances.<name>.user | User under which this instance runs.
|
| options/nixos/services.wstunnel.clients.<name>.soMark | Mark network packets with the SO_MARK sockoption with the specified value
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.recvBufferSize | If given, sets the SO_RCVBUF option on the TCP socket to the given number of bytes
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.sendBufferSize | If given, sets the SO_SNDBUF option on the TCP socket to the given number of bytes
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.recvBufferSize | If given, sets the SO_RCVBUF option on the TCP socket to the given number of bytes
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.sendBufferSize | If given, sets the SO_SNDBUF option on the TCP socket to the given number of bytes
|
| options/nixos/services.redis.servers.<name>.requirePass | Password for database (STORED PLAIN TEXT, WORLD-READABLE IN NIX STORE)
|
| options/nixos/security.pam.services.<name>.limits.*.domain | Username, groupname, or wildcard this limit applies to
|
| options/nixos/services.k3s.autoDeployCharts.<name>.extraDeploy | List of extra Kubernetes manifests to deploy with this Helm chart.
|
| options/nixos/services.tor.relay.onionServices.<name>.version | See torrc manual.
|
| options/nixos/services.inadyn.settings.custom.<name>.ddns-path | DDNS server path
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.slick.iconTheme.name | Name of the icon theme to use for the lightdm-slick-greeter.
|
| options/nixos/services.firewalld.zones.<name>.target | Action for packets that doesn't match any rules.
|
| options/home-manager/services.pizauth.accounts.<name>.tokenUri | The OAuth2 server's token URI.
|
| options/nixos/services.rke2.autoDeployCharts.<name>.hash | The hash of the packaged Helm chart
|
| options/nixos/services.wordpress.sites.<name>.fontsDir | This directory is used to download fonts from a remote location, e.g.
to host google fonts locally.
|
| options/nixos/services.headscale.settings.database.postgres.name | Database name.
|
| options/nixos/services.redis.servers.<name>.slowLogLogSlowerThan | Log queries whose execution take longer than X in milliseconds.
|
| options/nixos/services.anubis.instances.<name>.user | The user under which Anubis is run
|
| options/nixos/security.pam.services.<name>.enableAppArmor | Enable support for attaching AppArmor profiles at the
user/group level, e.g., as part of a role based access
control scheme.
|
| options/nixos/services.k3s.autoDeployCharts.<name>.version | The version of the Helm chart
|
| options/nixos/services.agate.hostnames | Domain name of this Gemini server, enables checking hostname and port
in requests. (multiple occurrences means basic vhosts)
|
| options/nixos/services.sympa.domains.<name>.webLocation | URL path part of the web interface.
|
| options/nixos/services.wordpress.sites.<name>.extraConfig | Any additional text to be appended to the wp-config.php
configuration file
|
| options/nixos/services.bitcoind.<name>.testnet | Whether to use the testnet instead of mainnet.
|
| options/nixos/services.netbird.clients.<name>.autoStart | Start the service with the system
|
| options/nixos/services.openvpn.servers.<name>.config | Configuration of this OpenVPN instance
|
| options/nixos/services.netbird.tunnels.<name>.autoStart | Start the service with the system
|
| options/nixos/security.pam.services.<name>.forwardXAuth | Whether X authentication keys should be passed from the
calling user to the target user (e.g. for
su)
|
| options/nixos/services.borgbackup.jobs.<name>.user | The user borg is run as
|
| options/nixos/services.sympa.domains.<name>.settings | The robot.conf configuration file as key value set
|
| options/nixos/services.hylafax.modems.<name>.config | Attribute set of values for the given modem
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.handle | Hex-encoded CKA_ID or handle of the certificate on a token or TPM,
respectively
|
| options/nixos/services.znc.confOptions.networks.<name>.server | IRC server address.
|
| options/nixos/services.hostapd.radios.<name>.channel | The channel to operate on
|
| options/nixos/services.dokuwiki.sites.<name>.phpOptions | Options for PHP's php.ini file for this dokuwiki site.
|
| options/nixos/services.tinc.networks.<name>.bindToAddress | The ip address to bind to (both listen on and send packets from).
|
| options/nixos/services.rspamd.workers.<name>.bindSockets | List of sockets to listen, in format acceptable by rspamd
|
| options/nixos/services.vdirsyncer.jobs.<name>.group | group to run vdirsyncer as
|
| options/nixos/services.beesd.filesystems.<name>.workDir | Name (relative to the root of the filesystem) of the subvolume where
the hash table will be stored.
|
| options/darwin/services.github-runners.<name>.workDir | Working directory, available as $GITHUB_WORKSPACE during workflow runs
and used as a default for repository checkouts
|
| options/nixos/services.firewalld.services.<name>.ports | Ports of the service.
|
| options/nixos/services.orangefs.server.fileSystems.<name>.id | File system ID (must be unique within configuration).
|
| options/nixos/services.znapzend.zetup.<name>.mbuffer.port | Port to use for mbuffer
|
| options/nixos/services.autosuspend.wakeups.<name>.class | Name of the class implementing the check
|
| options/home-manager/xdg.dataFile.<name>.onChange | Shell commands to run when file has changed between
generations
|
| options/nixos/services.keepalived.vrrpScripts.<name>.user | Name of user to run the script under.
|
| options/nixos/security.pam.services.<name>.requireWheel | Whether to permit root access only to members of group wheel.
|
| options/nixos/users.users.<name>.pamMount | Attributes for user's entry in
pam_mount.conf.xml
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.slot | Optional slot number of the token that stores the certificate.
|
| options/nixos/services.borgbackup.jobs.<name>.prune.keep | Prune a repository by deleting all archives not matching any of the
specified retention options
|
| options/nixos/services.awstats.configs.<name>.logFormat | The log format being used
|
| options/nixos/services.znapzend.zetup.<name>.presnap | Command to run before snapshots are taken on the source dataset,
e.g. for database locking/flushing
|
| options/nixos/services.pgbackrest.repos.<name>.host | Repository host when operating remotely
|
| options/nixos/services.znapzend.zetup.<name>.destinations.<name>.host | Host to use for the destination dataset
|
| options/nixos/services.honk.username | The admin account username.
|
| options/nixos/services.firewalld.zones.<name>.services | Services to allow in the zone.
|
| options/nixos/services.firewalld.services.<name>.short | Short description for the service.
|
| options/nixos/users.extraUsers.<name>.group | The user's primary group.
|
| options/darwin/nix.registry.<name>.from | The flake reference to be rewritten.
|
| options/home-manager/nix.registry.<name>.from | The flake reference to be rewritten.
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.gtk.cursorTheme.name | Name of the cursor theme to use for the lightdm-gtk-greeter.
|
| options/nixos/services.postfix.settings.master.<name>.args | Arguments to pass to the command
|
| options/nixos/services.netbird.clients.<name>.interface | Name of the network interface managed by this client.
|
| options/nixos/services.netbird.tunnels.<name>.interface | Name of the network interface managed by this client.
|
| options/nixos/services.restic.backups.<name>.timerConfig | When to run the backup
|
| options/nixos/services.sourcehut.settings."builds.sr.ht::worker".name | Listening address and listening port
of the build runner (with HTTP port if not 80).
|
| options/home-manager/services.kanshi.profiles.<name>.outputs | Outputs configuration.
|
| options/nixos/services.neo4j.ssl.policies.<name>.tlsVersions | Restrict the TLS protocol versions of this policy to those
defined here.
|
| options/nixos/services.wyoming.piper.servers.<name>.speaker | ID of a specific speaker in a multi-speaker model.
|
| options/nixos/services.wstunnel.clients.<name>.addNetBind | Whether to enable Whether add CAP_NET_BIND_SERVICE to the tunnel service, this should be enabled if you want to bind port < 1024.
|
| options/nixos/services.ttyd.username | Username for basic http authentication.
|
| options/nixos/services.ghostunnel.servers.<name>.allowCN | Allow client if common name appears in the list.
|
| options/nixos/services.fedimintd.<name>.dataDir | Path to the data dir fedimintd will use to store its data
|
| options/nixos/boot.initrd.luks.devices.<name>.keyFile | The name of the file (can be a raw device or a partition) that
should be used as the decryption key for the encrypted device
|
| options/nixos/services.honk.servername | The server name.
|
| options/nixos/services.hostapd.radios.<name>.wifi7.enable | Enables support for IEEE 802.11be (WiFi 7, EHT)
|
| options/nixos/services.hostapd.radios.<name>.wifi4.enable | Enables support for IEEE 802.11n (WiFi 4, HT)
|
| options/nixos/services.dokuwiki.sites.<name>.plugins | List of path(s) to respective plugin(s) which are copied into the 'plugin' directory.
These plugins need to be packaged before use, see example.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.transform | Refer to
xrandr(1)
for the documentation of the transform matrix.
|
| options/nixos/services.i2pd.proto.http.hostname | Expected hostname for WebUI.
|
| options/nixos/programs.regreet.cursorTheme.name | Name of the cursor theme to use for regreet.
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.coverage | The length of time to ensure that keys will be correct; no action will be taken to create new keys to be activated after this time.
|
| options/nixos/services.errbot.instances.<name>.logLevel | Errbot log level
|
| options/nixos/services.nebula.networks.<name>.package | The nebula package to use.
|
| options/nixos/services.sanoid.datasets.<name>.monthly | Number of monthly snapshots.
|
| options/nixos/services.quicktun.<name>.timeWindow | Allowed time window for first received packet in seconds (positive number allows packets from history)
|
| options/nixos/services.pid-fan-controller.settings.heatSources.*.name | Name of the heat source.
|
| options/nixos/security.pam.services.<name>.kwallet.package | The kwallet-pam package to use.
|
| options/nixos/services.sabnzbd.settings.servers.<name>.ssl | Whether the server supports TLS
|
| options/nixos/services.znapzend.zetup.<name>.mbuffer.enable | Whether to use mbuffer.
|
| options/nixos/services.ghostunnel.servers.<name>.allowOU | Allow client if organizational unit name appears in the list.
|
| options/nixos/systemd.user.services.<name>.stopIfChanged | If set, a changed unit is restarted by calling
systemctl stop in the old configuration,
then systemctl start in the new one
|
| options/nixos/services.nylon.<name>.allowedIPRanges | Allowed client IP ranges are evaluated first, defaults to ARIN IPv4 private ranges:
[ "192.168.0.0/16" "127.0.0.0/8" "172.16.0.0/12" "10.0.0.0/8" ]
|
| options/nixos/services.borgbackup.jobs.<name>.preHook | Shell commands to run before the backup
|
| options/nixos/services.fedimintd.<name>.enable | Whether to enable fedimintd.
|
| options/nixos/services.borgbackup.jobs.<name>.paths | Path(s) to back up
|
| options/nixos/services.znc.confOptions.networks.<name>.extraConf | Extra config for the network
|
| options/nixos/services.tor.relay.onionServices.<name>.secretKey | Secret key of the onion service
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.name | Name of the profile.
|
| options/nixos/services.mailpit.instances.<name>.smtp | SMTP bind interface and port.
|
| options/nixos/services.tarsnap.archives.<name>.nodump | Exclude files with the nodump flag.
|
| options/nixos/services.rspamd.workers.<name>.includes | List of files to include in configuration
|
| options/nixos/services.syncoid.commands.<name>.extraArgs | Extra syncoid arguments for this command.
|
| options/nixos/services.wstunnel.clients.<name>.enable | Whether to enable this wstunnel instance.
|
| options/nixos/services.wstunnel.servers.<name>.enable | Whether to enable this wstunnel instance.
|
| options/home-manager/services.podman.networks.<name>.gateway | The gateway IP to use for the network.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.groups.<name>.members | The members of this group
|
| options/nixos/services.logcheck.ignoreCron.<name>.timeArgs | "min hr dom mon dow" crontab time args, to auto-create a cronjob too
|
| options/home-manager/services.colima.profiles.<name>.isActive | Whether to set this profile as:
- active docker context
- active kubernetes context
- active incus remote
Exactly one or zero profiles should have this option set.
|
| options/home-manager/services.restic.backups.<name>.timerConfig | When to run the backup
|
| options/nixos/networking.interfaces.<name>.name | Name of the interface.
|
| options/nixos/services.borgbackup.repos.<name>.path | Where to store the backups
|
| options/nixos/security.pam.services.<name>.logFailures | Whether to log authentication failures in /var/log/faillog.
|
| options/nixos/services.tinc.networks.<name>.settings | Configuration of the Tinc daemon for this network
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.handle | Hex-encoded CKA_ID or handle of the certificate on a token or TPM,
respectively
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.file | Absolute path to the certificate to load
|
| options/nixos/services.restic.backups.<name>.extraBackupArgs | Extra arguments passed to restic backup.
|
| options/nixos/services.redis.servers.<name>.openFirewall | Whether to open ports in the firewall for the server.
|
| options/home-manager/services.pizauth.accounts.<name>.loginHint | An optional login hint for the account provider.
|
| options/home-manager/services.muchsync.remotes.<name>.upload | Whether to propagate local changes to the remote.
|
| options/home-manager/xdg.desktopEntries.<name>.actions.<name>.exec | Program to execute, possibly with arguments.
|
| options/nixos/nix.registry.<name>.to | The flake reference from is rewritten to
|
| options/nixos/users.users.<name>.enable | If set to false, the user account will not be created
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.enso.cursorTheme.name | Name of the cursor theme to use for the lightdm-enso-os-greeter
|
| options/nixos/services.wyoming.piper.servers.<name>.lengthScale | Phoneme length value.
|
| options/nixos/systemd.user.services.<name>.serviceConfig | Each attribute in this set specifies an option in the
[Service] section of the unit
|
| options/nixos/services.prometheus.exporters.rtl_433.ids.*.name | Name to match.
|
| options/nixos/services.gitlab-runner.services.<name>.buildsDir | Absolute path to a directory where builds will be stored
in context of selected executor (Locally, Docker, SSH).
|
| options/darwin/services.gitlab-runner.services.<name>.buildsDir | Absolute path to a directory where builds will be stored
in context of selected executor (Locally, Docker, SSH).
|
| options/nixos/services.github-runners.<name>.workDir | Working directory, available as $GITHUB_WORKSPACE during workflow runs
and used as a default for repository checkouts
|
| options/nixos/services.public-inbox.inboxes.<name>.newsgroup | NNTP group name for the inbox.
|
| options/nixos/systemd.services.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/home-manager/launchd.agents.<name>.enable | Whether to enable ‹name›.
|
| options/nixos/services.tahoe.introducers.<name>.nickname | The nickname of this Tahoe introducer.
|
| options/nixos/security.pam.services.<name>.kwallet.enable | If enabled, pam_wallet will attempt to automatically unlock the
user's default KDE wallet upon login
|
| options/nixos/services.geth.<name>.websocket.address | Listen address of Go Ethereum WebSocket API.
|
| options/nixos/services.borgbackup.jobs.<name>.postInit | Shell commands to run after borg init.
|
| options/nixos/services.geth.<name>.authrpc.jwtsecret | Path to a JWT secret for authenticated RPC endpoint.
|
| options/nixos/services.wstunnel.clients.<name>.autoStart | Whether to enable starting this wstunnel instance automatically.
|
| options/nixos/services.wstunnel.servers.<name>.autoStart | Whether to enable starting this wstunnel instance automatically.
|
| options/nixos/services.bitcoind.<name>.extraConfig | Additional configurations to be appended to bitcoin.conf.
|
| options/nixos/services.vault-agent.instances.<name>.group | Group under which this instance runs.
|
| options/home-manager/services.pizauth.accounts.<name>.clientId | The OAuth2 client ID.
|
| options/home-manager/programs.kakoune.config.hooks.*.name | The name of the hook
|
| options/nixos/systemd.services.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/services.borgbackup.jobs.<name>.doInit | Run borg init if the
specified repo does not exist
|
| options/nixos/security.pam.services.<name>.kwallet.forceRun | The force_run option is used to tell the PAM module for KWallet
to forcefully run even if no graphical session (such as a GUI
display manager) is detected
|
| options/nixos/services.xserver.xkb.extraLayouts.<name>.keycodesFile | The path to the xkb keycodes file
|
| options/nixos/services.gitwatch.<name>.message | Optional text to use in as commit message; all occurrences of %d will be replaced by formatted date/time
|
| options/nixos/systemd.user.services.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/home-manager/services.podman.volumes.<name>.extraPodmanArgs | Extra arguments to pass to the podman volume create command.
|
| options/nixos/services.ghostunnel.servers.<name>.allowURI | Allow client if URI subject alternative name appears in the list.
|
| options/nixos/services.ghostunnel.servers.<name>.allowDNS | Allow client if DNS subject alternative name appears in the list.
|
| options/nixos/services.inadyn.settings.provider.<name>.ssl | Whether to use HTTPS for this DDNS provider.
|
| options/nixos/security.pam.services.<name>.sssdStrictAccess | enforce sssd access control
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.openFirewall | Open the appropriate ports in the firewall.
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.openFirewall | Open the appropriate ports in the firewall.
|
| options/nixos/services.public-inbox.inboxes.<name>.address | The email addresses of the public-inbox.
|
| options/nixos/services.tinc.networks.<name>.rsaPrivateKeyFile | Path of the private RSA keyfile.
|
| options/home-manager/services.podman.containers.<name>.ip6 | Set an IPv6 address for the container.
|
| options/home-manager/services.podman.containers.<name>.ip4 | Set an IPv4 address for the container.
|
| options/nixos/services.snapper.configs.<name>.ALLOW_USERS | List of users allowed to operate with the config. "root" is always
implicitly included
|
| options/nixos/services.sabnzbd.settings.servers.<name>.host | Hostname of the server
|
| options/nixos/services.sabnzbd.settings.servers.<name>.port | Port of the server
|
| options/nixos/services.icecast.hostname | DNS name or IP address that will be used for the stream directory lookups or possibly the playlist generation if a Host header is not provided.
|
| options/nixos/services.borgbackup.jobs.<name>.group | The group borg is run as
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.subnets.*.prefixLength | The prefix length of the subnet
|
| options/nixos/services.bepasty.servers.<name>.secretKey | server secret for safe session cookies, must be set
|
| options/nixos/services.tarsnap.archives.<name>.period | Create archive at this interval
|
| options/home-manager/services.restic.backups.<name>.extraBackupArgs | Extra arguments passed to restic backup
|
| options/nixos/services.anubis.instances.<name>.group | The group under which Anubis is run
|
| options/nixos/services.wordpress.sites.<name>.themes | Path(s) to respective theme(s) which are copied from the 'theme' directory.
These themes need to be packaged before use, see example.
|
| options/nixos/services.tarsnap.archives.<name>.maxbwRateUp | Upload bandwidth rate limit in bytes.
|
| options/home-manager/services.colima.profiles.<name>.isService | Whether this profile will run as a service.
|
| options/nixos/services.kmonad.keyboards.<name>.config | Keyboard configuration.
|
| options/nixos/services.opkssh.providers.<name>.issuer | Issuer URI
|
| options/nixos/services.znapzend.zetup.<name>.destinations.<name>.plan | The znapzend backup plan to use for the source
|
| options/nixos/services.nylon.<name>.bindInterface | Tell nylon which interface to use as an uplink, default is "enp3s0f0".
|
| options/nixos/users.extraGroups.<name>.gid | The group GID
|
| options/home-manager/xdg.desktopEntries.<name>.actions.<name>.icon | Icon to display in file manager, menus, etc.
|
| options/nixos/services.graylog.rootUsername | Name of the default administrator user
|
| options/nixos/services.namecoind.rpc.key | Key file for securing RPC connections.
|
| options/nixos/services.hostapd.radios.<name>.networks | This defines a BSS, colloquially known as a WiFi network
|
| options/nixos/services.mailpit.instances.<name>.max | Maximum number of emails to keep
|
| options/nixos/services.v4l2-relayd.instances.<name>.input.width | The width to read from input-stream.
|
| options/nixos/services.xserver.xkb.extraLayouts.<name>.geometryFile | The path to the xkb geometry file
|
| options/nixos/virtualisation.fileSystems.<name>.fsType | Type of the file system
|
| options/nixos/services.neo4j.ssl.policies.<name>.revokedDir | Path to directory of CRLs (Certificate Revocation Lists) in
PEM format
|
| options/nixos/virtualisation.fileSystems.<name>.noCheck | Disable running fsck on this filesystem.
|
| options/nixos/services.rspamd.overrides.<name>.source | Path of the source file.
|
| options/nixos/services.sanoid.templates.<name>.hourly | Number of hourly snapshots.
|
| options/nixos/services.sanoid.templates.<name>.yearly | Number of yearly snapshots.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.policies.<name>.group | The group which should be allowed access to the given resource.
|
| options/nixos/services.borgbackup.repos.<name>.user | The user borg serve is run as
|
| options/nixos/services.acme-dns.settings.general.nsname | Zone name server.
|
| options/nixos/services.restic.backups.<name>.rcloneConfig | Configuration for the rclone remote being used for backup
|
| options/nixos/systemd.user.paths.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/home-manager/xdg.configFile.<name>.target | Path to target file relative to xdg.configHome.
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.slick.cursorTheme.name | Name of the cursor theme to use for the lightdm-slick-greeter.
|
| options/home-manager/xdg.cacheFile.<name>.source | Path of the source file or directory
|
| options/home-manager/xdg.stateFile.<name>.source | Path of the source file or directory
|
| options/home-manager/xdg.configFile.<name>.force | Whether the target path should be unconditionally replaced
by the managed file source
|
| options/nixos/services.restic.backups.<name>.extraOptions | Extra extended options to be passed to the restic --option flag.
|
| options/nixos/services.dokuwiki.sites.<name>.mergedConfig | Read only representation of the final configuration.
|
| options/nixos/services.anubis.instances.<name>.enable | Whether to enable this instance of Anubis.
|
| options/nixos/services.kmonad.keyboards.<name>.device | Path to the keyboard's device file.
|
| options/nixos/services.errbot.instances.<name>.admins | List of identifiers of errbot admins.
|
| options/nixos/services.firewalld.zones.<name>.icmpBlocks | ICMP types to block in the zone.
|
| options/nixos/services.restic.backups.<name>.progressFps | Controls the frequency of progress reporting.
|
| options/home-manager/services.restic.backups.<name>.progressFps | Controls the frequency of progress reporting.
|
| options/nixos/boot.initrd.luks.devices.<name>.header | The name of the file or block device that
should be used as header for the encrypted device.
|
| options/nixos/services.postfix.masterConfig.<name>.wakeup | Automatically wake up the service after the specified number of
seconds
|
| options/nixos/systemd.user.services.<name>.requisite | Similar to requires
|
| options/nixos/services.vdirsyncer.jobs.<name>.config.pairs | vdirsyncer pair configurations
|
| options/nixos/services.hostapd.radios.<name>.wifi6.require | Require stations (clients) to support WiFi 6 (HE) and disassociate them if they don't.
|
| options/nixos/services.bacula-sd.autochanger.<name>.changerDevice | The specified name-string must be the generic SCSI device name of the
autochanger that corresponds to the normal read/write Archive Device
specified in the Device resource
|
| options/nixos/services.dovecot2.imapsieve.mailbox.*.name | This setting configures the name of a mailbox for which administrator scripts are configured
|
| options/nixos/services.firewalld.services.<name>.ports.*.port | |
| options/nixos/services.keepalived.vrrpScripts.<name>.group | Name of group to run the script under
|
| options/nixos/services.firewalld.zones.<name>.version | Version of the zone.
|
| options/nixos/services.bitcoind.<name>.prune | Reduce storage requirements by enabling pruning (deleting) of old
blocks
|
| options/nixos/services.hans.clients | Each attribute of this option defines a systemd service that
runs hans
|
| options/nixos/power.ups.users.<name>.actions | Allow the user to do certain things with upsd
|
| options/nixos/services.tahoe.introducers.<name>.tub.port | The port on which the introducer will listen.
|
| options/nixos/services.quicktun.<name>.remoteFloat | Whether to allow the remote address and port to change when properly encrypted packets are received.
|
| options/home-manager/programs.librewolf.profiles.<name>.containers.<name>.name | Container name, e.g., shopping.
|
| options/nixos/services.bepasty.servers.<name>.extraConfig | Extra configuration for bepasty server to be appended on the
configuration.
see https://bepasty-server.readthedocs.org/en/latest/quickstart.html#configuring-bepasty
for all options.
|
| options/nixos/services.hostapd.radios.<name>.wifi4.require | Require stations (clients) to support WiFi 4 (HT) and disassociate them if they don't.
|
| options/nixos/services.hostapd.radios.<name>.wifi5.require | Require stations (clients) to support WiFi 5 (VHT) and disassociate them if they don't.
|
| options/darwin/programs.vim.vimOptions.<name>.target | Name of symlink
|
| options/nixos/services.wstunnel.servers.<name>.useACMEHost | Use a certificate generated by the NixOS ACME module for the given host
|
| options/nixos/services.opensearch.settings."cluster.name" | The name of the cluster.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.preferShortUsername | Use 'name' instead of 'spn' in the preferred_username claim
|
| options/nixos/services.grafana.provision.alerting.rules.settings.groups.*.name | Name of the rule group
|
| options/nixos/services.gitlab-runner.services.<name>.dockerImage | Docker image to be used.
|
| options/darwin/services.gitlab-runner.services.<name>.dockerImage | Docker image to be used.
|
| options/nixos/services.kanata.keyboards.<name>.extraArgs | Extra command line arguments passed to kanata.
|
| options/home-manager/services.podman.networks.<name>.extraConfig | INI sections and values to populate the Network Quadlet
|
| options/home-manager/services.muchsync.remotes.<name>.local.importNew | Whether to begin the synchronisation by running
notmuch new locally.
|
| options/nixos/services.bluemap.storage.<name>.storage-type | Type of storage config
|
| options/nixos/services.awstats.configs.<name>.hostAliases | List of aliases the site has.
|
| options/nixos/services.opkssh.providers.<name>.clientId | OAuth client ID
|
| options/nixos/services.pgbackrest.repos.<name>.sftp-host | SFTP repository host
|
| options/nixos/services.redis.servers.<name>.databases | Set the number of databases.
|
| options/nixos/services.wordpress.sites.<name>.package | The wordpress package to use.
|
| options/nixos/services.postfix.masterConfig.<name>.chroot | Whether the service is chrooted to have only access to the
services.postfix.queueDir and the closure of
store paths specified by the program option.
|
| options/nixos/services.syncoid.commands.<name>.target | Target ZFS dataset
|
| options/home-manager/services.podman.machines.<name>.volumes | Volumes to mount in the machine, specified as source:target pairs
|
| options/nixos/virtualisation.fileSystems.<name>.encrypted.label | Label of the unlocked encrypted device
|
| options/darwin/users.users.<name>.shell | The user's shell
|
| options/nixos/services.tahoe.nodes.<name>.storage.reservedSpace | The amount of filesystem space to not use for storage.
|
| options/nixos/services.ax25.axports.<name>.callsign | The callsign of the physical interface to bind to.
|
| options/nixos/services.uhub.<name>.plugins.*.settings | Settings specific to this plugin.
|
| options/nixos/services.anubis.instances.<name>.policy | Anubis policy configuration
|
| options/nixos/services.homebridge.settings.platforms.*.name | Name of the platform
|
| options/nixos/services.blockbook-frontend.<name>.user | The user as which to run blockbook-frontend-‹name›.
|
| options/nixos/services.vdirsyncer.jobs.<name>.enable | Whether to enable this vdirsyncer job.
|
| options/home-manager/services.podman.containers.<name>.exec | The command to run after the container start.
|
| options/home-manager/services.podman.containers.<name>.user | The user ID inside the container.
|
| options/nixos/networking.vswitches.<name>.interfaces.<name>.name | Name of the interface
|
| options/nixos/services.wstunnel.servers.<name>.listen | Address and port to listen on
|
| options/home-manager/services.podman.volumes.<name>.preserve | Whether the volume should be preserved if it is removed from the configuration
|
| options/darwin/users.users.<name>.createHome | Create the home directory when creating the user.
|
| options/nixos/services.ddclient.username | User name.
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.algorithm | Which algorithm to use for DNSSEC
|
| options/home-manager/services.restic.backups.<name>.extraOptions | Extra extended options to be passed to the restic -o flag
|
| options/nixos/services.metricbeat.modules.<name>.module | The name of the module
|
| options/nixos/services.nextcloud.config.dbname | Database name.
|
| options/nixos/services.github-runners.<name>.enable | Whether to enable GitHub Actions runner
|
| options/darwin/services.github-runners.<name>.enable | Whether to enable GitHub Actions runner
|
| options/nixos/services.bacula-sd.device.<name>.extraDeviceConfig | Extra configuration to be passed in Device directive.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.handle | Hex-encoded CKA_ID or handle of the certificate on a token or TPM,
respectively
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.type | The resource type
|
| options/nixos/services.neo4j.ssl.policies.<name>.trustedDir | Path to directory of X.509 certificates in PEM format for
trusted parties
|
| options/nixos/services.nipap.settings.nipapd.db_name | Name of database to use on PostgreSQL server.
|
| options/nixos/systemd.user.paths.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/services.znc.confOptions.networks.<name>.modules | ZNC network modules to load.
|
| options/nixos/systemd.services.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/services.k3s.manifests.<name>.content | Content of the manifest file
|
| options/nixos/systemd.paths.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/home-manager/xdg.configFile.<name>.enable | Whether this file should be generated
|
| options/nixos/services.maddy.hostname | Hostname to use
|
| options/home-manager/services.podman.machines.<name>.rootful | Whether to run the machine in rootful mode
|
| options/home-manager/programs.ranger.plugins.*.name | Name of the plugin linked to
$XDG_CONFIG_HOME/ranger/plugins/
|
| options/nixos/services.borgbackup.jobs.<name>.postPrune | Shell commands to run after borg prune.
|
| options/nixos/services.github-runners.<name>.package | The github-runner package to use.
|
| options/darwin/services.github-runners.<name>.package | The github-runner package to use.
|
| options/nixos/services.inadyn.settings.custom.<name>.include | File to include additional settings for this provider from.
|
| options/home-manager/systemd.user.services.<name>.Unit.X-Reload-Triggers | List of free form strings that can be used to trigger a service
reload during Home Manager activation.
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.addresses.*.address | The external IP address or hostname where the host can be reached.
|
| options/nixos/virtualisation.fileSystems.<name>.enable | Whether to enable the filesystem mount.
|
| options/nixos/services.openvpn.servers.<name>.authUserPass | This option can be used to store the username / password credentials
with the "auth-user-pass" authentication method
|
| options/nixos/services.snapper.configs.<name>.ALLOW_GROUPS | List of groups allowed to operate with the config
|
| options/nixos/services.rspamd.overrides.<name>.enable | Whether this file overrides should be generated
|
| options/nixos/services.ncps.cache.redis.username | Redis username for authentication (for Redis ACL).
|
| options/nixos/services.wstunnel.clients.<name>.extraArgs | Extra command line arguments to pass to wstunnel
|
| options/nixos/services.wstunnel.servers.<name>.extraArgs | Extra command line arguments to pass to wstunnel
|
| options/nixos/services.borgbackup.jobs.<name>.postHook | Shell commands to run just before exit
|
| options/nixos/security.acme.certs.<name>.domain | Domain to fetch certificate for (defaults to the entry name).
|
| options/nixos/services.kanidm.provision.persons.<name>.displayName | Display name
|
| options/nixos/services.iodine.clients.<name>.passwordFile | Path to a file containing the password.
|
| options/nixos/services.restic.backups.<name>.passwordFile | Read the repository password from a file.
|
| options/home-manager/services.podman.containers.<name>.userNS | Use a user namespace for the container.
|
| options/home-manager/services.restic.backups.<name>.passwordFile | A file containing the repository password.
|
| options/nixos/services.buildkite-agents.<name>.tags | Tags for the agent.
|
| options/nixos/services.quicktun.<name>.protocol | Which protocol to use.
|
| options/darwin/services.buildkite-agents.<name>.tags | Tags for the agent.
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.subnets.*.address | The subnet of this host
|
| options/nixos/virtualisation.fileSystems.<name>.label | Label of the device
|
| options/nixos/services.kanata.keyboards.<name>.config | Configuration other than defcfg
|
| options/nixos/services.wordpress.sites.<name>.poolConfig | Options for the WordPress PHP pool
|
| options/nixos/services.tor.relay.onionServices.<name>.settings | Settings of the onion service
|
| options/nixos/services.netbird.tunnels.<name>.dns-resolver.port | A port to serve DNS entries on when dns-resolver.address is enabled.
|
| options/nixos/services.netbird.clients.<name>.dns-resolver.port | A port to serve DNS entries on when dns-resolver.address is enabled.
|
| options/nixos/services.namecoind.rpc.port | Port the RPC server will bind to.
|
| options/nixos/services.dokuwiki.sites.<name>.extraConfigs | Path(s) to additional configuration files that are then linked to the 'conf' directory.
|
| options/nixos/services.borgbackup.jobs.<name>.extraArgs | Additional arguments for all borg calls the
service has
|
| options/nixos/services.firewalld.zones.<name>.sources | Source addresses, address ranges, MAC addresses or ipsets to bind.
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.uri | URI to bind the wyoming server to.
|
| options/nixos/services.tarsnap.archives.<name>.maxbwRateDown | Download bandwidth rate limit in bytes.
|
| options/nixos/services.tinc.networks.<name>.listenAddress | The ip address to listen on for incoming connections.
|
| options/nixos/services.lemmy.settings.hostname | The domain name of your instance (eg 'lemmy.ml').
|
| options/nixos/services.archisteamfarm.bots.<name>.username | Name of the user to log in
|
| options/nixos/services.suricata.settings.outputs.*.<name>.enabled | Whether to enable .
|
| options/nixos/power.ups.ups.<name>.maxStartDelay | This can be set as a global variable above your first UPS
definition and it can also be set in a UPS section
|
| options/nixos/services.awstats.configs.<name>.webService.enable | Whether to enable awstats web service.
|
| options/nixos/services.ytdl-sub.instances.<name>.readWritePaths | List of paths that ytdl-sub can write to.
|
| options/nixos/services.wordpress.sites.<name>.database.user | Database user.
|
| options/nixos/services.wstunnel.servers.<name>.package | The wstunnel package to use.
|
| options/nixos/services.wstunnel.clients.<name>.package | The wstunnel package to use.
|
| options/home-manager/services.pizauth.accounts.<name>.scopes | The scopes which the OAuth2 token will give access to
|
| options/nixos/security.pam.services.<name>.startSession | If set, the service will register a new session with
systemd's login manager
|
| options/nixos/services.borgbackup.repos.<name>.group | The group borg serve is run as
|
| options/nixos/systemd.user.services.<name>.enableDefaultPath | Whether to append a minimal default PATH environment variable to the service, containing common system utilities.
|
| options/nixos/services.znapzend.zetup.<name>.postsnap | Command to run after snapshots are taken on the source dataset,
e.g. for database unlocking
|
| options/nixos/services.vmalert.instances.<name>.settings.rule | Path to the files with alerting and/or recording rules.
|
| options/nixos/services.firefox-syncserver.database.name | Database to use for storage
|
| options/nixos/services.radicle.ci.broker.settings.adapters.<name>.env | Environment variables to add when running the adapter.
|
| options/nixos/security.pam.services.<name>.duoSecurity.enable | If set, use the Duo Security pam module
pam_duo for authentication
|
| options/home-manager/programs.vscode.nameShort | Override for package "short name", used for generating configuration
|
| options/nixos/services.wordpress.sites.<name>.database.port | Database host port.
|
| options/nixos/services.wordpress.sites.<name>.database.host | Database host address.
|
| options/nixos/services.tarsnap.archives.<name>.lowmem | Reduce memory consumption by not caching small files
|
| options/nixos/services.firezone.server.provision.accounts.<name>.groups.<name>.forceMembers | Ensure that only the given members are part of this group at every server start.
|
| options/nixos/services.firewalld.zones.<name>.sources.*.mac | A MAC address.
|
| options/nixos/services.firewalld.zones.<name>.sourcePorts | Source ports to allow in the zone.
|
| options/home-manager/services.unison.pairs.<name>.stateDirectory | Unison state directory to use.
|
| options/nixos/security.pam.services.<name>.ttyAudit.enablePattern | For each user matching one of comma-separated
glob patterns, enable TTY auditing
|
| options/nixos/virtualisation.fileSystems.<name>.stratis.poolUuid | UUID of the stratis pool that the fs is located in
This is only relevant if you are using stratis.
|
| options/nixos/services.borgbackup.repos.<name>.quota | Storage quota for the repository
|
| options/nixos/services.printing.cups-pdf.instances.<name>.settings.Out | output directory;
${HOME} will be expanded to the user's home directory,
${USER} will be expanded to the user name.
|
| options/nixos/systemd.paths.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/services.rke2.manifests.<name>.source | Path of the source .yaml file.
|
| options/nixos/services.rke2.manifests.<name>.enable | Whether this manifest file should be generated.
|
| options/nixos/services.v4l2-relayd.instances.<name>.input.height | The height to read from input-stream.
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.Bonjour | This optional key can be used to request that the service be registered with the
mDNSResponder(8)
|
| options/nixos/systemd.user.services.<name>.restartIfChanged | Whether the service should be restarted during a NixOS
configuration switch if its definition has changed.
|
| options/nixos/systemd.user.services.<name>.reloadIfChanged | Whether the service should be reloaded during a NixOS
configuration switch if its definition has changed
|
| options/nixos/services.postfix.settings.master.<name>.wakeup | Automatically wake up the service after the specified number of
seconds
|
| options/nixos/services.blockbook-frontend.<name>.dataDir | Location of blockbook-frontend-‹name› data directory.
|
| options/nixos/services.anubis.instances.<name>.extraFlags | A list of extra flags to be passed to Anubis.
|
| options/nixos/services.syncoid.commands.<name>.service | Systemd configuration specific to this syncoid service.
|
| options/nixos/services.tarsnap.archives.<name>.verbose | Whether to produce verbose logging output.
|
| options/nixos/services.vault-agent.instances.<name>.enable | Whether to enable this vault-agent instance.
|
| options/home-manager/services.podman.containers.<name>.image | The container image.
|
| options/nixos/services.borgbackup.jobs.<name>.prune.prefix | Only consider archive names starting with this prefix for pruning
|
| options/nixos/services.kmonad.keyboards.<name>.defcfg.compose.key | The (optional) compose key to use.
|
| options/nixos/services.v4l2-relayd.instances.<name>.input.format | The video-format to read from input-stream.
|
| options/darwin/services.gitlab-runner.services.<name>.preCloneScript | Runner-specific command script executed before code is pulled.
|
| options/nixos/systemd.user.paths.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/darwin/services.buildkite-agents.<name>.hooks.pre-exit | The pre-exit hook will run just before your build job finishes
|
| options/home-manager/xdg.cacheFile.<name>.onChange | Shell commands to run when file has changed between
generations
|
| options/home-manager/xdg.stateFile.<name>.onChange | Shell commands to run when file has changed between
generations
|
| options/nixos/services.stash.username | Username for login.
|
| options/nixos/services.fedimintd.<name>.package | The fedimint package to use.
|
| options/nixos/services.spiped.config.<name>.resolveRefresh | Resolution refresh time for the target socket, in seconds.
|
| options/home-manager/services.podman.networks.<name>.internal | Whether the network should be internal
|
| options/nixos/users.users.<name>.cryptHomeLuks | Path to encrypted luks device that contains
the user's home directory.
|
| options/nixos/services.kimai.sites.<name>.database.passwordFile | A file containing the password corresponding to
database.user.
|
| options/nixos/services.postfix.settings.master.<name>.chroot | Whether the service is chrooted to have only access to the
services.postfix.queueDir and the closure of
store paths specified by the program option.
|
| options/nixos/services.logcheck.ignoreCron.<name>.cmdline | Command line for the cron job
|
| options/nixos/services.blockbook-frontend.<name>.group | The group as which to run blockbook-frontend-‹name›.
|
| options/nixos/services.drupal.sites.<name>.database.tablePrefix | The $table_prefix is the value placed in the front of your database tables
|
| options/nixos/boot.initrd.systemd.users.<name>.uid | ID of the user in initrd.
|
| options/home-manager/programs.thunderbird.profiles.<name>.feedAccounts.<name>.name | This feed account's name.
|
| options/nixos/services.blockbook-frontend.<name>.rpc.url | URL for JSON-RPC connections.
|
| options/nixos/services.jupyterhub.kernels.<name>.env | Environment variables to set for the kernel.
|
| options/nixos/services.sanoid.datasets.<name>.autosnap | Whether to automatically take snapshots.
|
| options/nixos/services.webhook.hooks.<name>.execute-command | The command that should be executed when the hook is triggered.
|
| options/nixos/services.wstunnel.clients.<name>.connectTo | Server address and port to connect to.
|
| options/home-manager/services.podman.containers.<name>.group | The group ID inside the container.
|
| options/home-manager/services.podman.containers.<name>.ports | A mapping of ports between host and container
|
| options/nixos/nix.registry.<name>.from | The flake reference to be rewritten
|
| options/nixos/services.frp.instances.<name>.settings | Frp configuration, for configuration options
see the example of client
or server on github.
|
| options/nixos/boot.initrd.luks.devices.<name>.preLVM | Whether the luksOpen will be attempted before LVM scan or after it.
|
| options/nixos/services.geoclue2.appConfig.<name>.users | List of UIDs of all users for which this application is allowed location
info access, Defaults to an empty string to allow it for all users.
|
| options/home-manager/services.unison.pairs.<name>.commandOptions | Additional command line options as a dictionary to pass to the
unison program
|
| options/nixos/services.gitlab-runner.services.<name>.preBuildScript | Runner-specific command script executed after code is pulled,
just before build executes.
|
| options/darwin/services.gitlab-runner.services.<name>.preBuildScript | Runner-specific command script executed after code is pulled,
just before build executes.
|
| options/nixos/services.buildkite-agents.<name>.dataDir | The workdir for the agent
|
| options/darwin/services.buildkite-agents.<name>.dataDir | The workdir for the agent
|
| options/nixos/services.v4l2-relayd.instances.<name>.enable | Whether to enable this v4l2-relayd instance.
|
| options/nixos/services.wordpress.sites.<name>.plugins | Path(s) to respective plugin(s) which are copied from the 'plugins' directory.
These plugins need to be packaged before use, see example.
|
| options/nixos/services.quicktun.<name>.localAddress | IP address or hostname of the local end.
|
| options/nixos/nix.registry.<name>.flake | The flake input from is rewritten to.
|
| options/darwin/nix.registry.<name>.flake | The flake input from is rewritten to.
|
| options/home-manager/nix.registry.<name>.flake | The flake input to which from> is to be rewritten.
|
| options/nixos/systemd.services.<name>.stopIfChanged | If set, a changed unit is restarted by calling
systemctl stop in the old configuration,
then systemctl start in the new one
|
| options/nixos/services.kimai.sites.<name>.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.awstats.configs.<name>.webService.urlPrefix | The URL prefix under which the awstats pages appear.
|
| options/nixos/services.nebula.networks.<name>.staticHostMap | The static host map defines a set of hosts with fixed IP addresses on the internet (or any network)
|
| options/nixos/services.tahoe.nodes.<name>.client.introducer | The furl for a Tahoe introducer node
|
| options/home-manager/services.muchsync.remotes.<name>.remote.importNew | Whether to begin the synchronisation by running
notmuch new on the remote side.
|
| options/nixos/services.gitlab.smtp.username | Username of the SMTP server for GitLab.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.hostname | Specifies the real host name to log into.
|
| options/nixos/services.fedimintd.<name>.api_iroh.bind | Address to bind on for Iroh endpoint for API connections
|
| options/nixos/services.syncoid.commands.<name>.useCommonArgs | Whether to add the configured common arguments to this command.
|
| options/nixos/services.akkoma.frontends.<name>.package | Akkoma frontend package.
|
| options/nixos/services.sanoid.templates.<name>.monthly | Number of monthly snapshots.
|
| options/nixos/services.vdirsyncer.jobs.<name>.configFile | existing configuration file
|
| options/nixos/systemd.services.<name>.serviceConfig | Each attribute in this set specifies an option in the
[Service] section of the unit
|
| options/nixos/security.acme.certs.<name>.csr | Path to a certificate signing request to apply when fetching the certificate.
|
| options/nixos/services.pingvin-share.hostname | The domain name of your instance
|
| options/nixos/services.public-inbox.settings.coderepo.<name>.dir | Path to a git repository
|
| options/nixos/services.openbao.settings.listener.<name>.type | The listener type to enable.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.displayName | Display name
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.dynamicConfigScripts | All of these scripts will be executed in lexicographical order before hostapd
is started, right after the bss segment was generated and may dynamically
append bss options to the generated configuration file
|
| options/nixos/services.firewalld.services.<name>.version | Version of the service.
|
| options/nixos/services.firewalld.services.<name>.helpers | Helpers for the service.
|
| options/nixos/services.jibri.xmppEnvironments.<name>.call.login.username | User part of the JID for the recorder.
|
| options/nixos/services.fedimintd.<name>.api_iroh.port | UDP Port to bind Iroh endpoint for API connections
|
| options/nixos/services.nebula.networks.<name>.settings | Nebula configuration
|
| options/home-manager/services.podman.networks.<name>.extraPodmanArgs | Extra arguments to pass to the podman network create command.
|
| options/home-manager/services.podman.machines.<name>.timezone | Timezone to set in the machine
|
| options/nixos/security.pam.services.<name>.gnupg.noAutostart | Don't start gpg-agent if it is not running
|
| options/nixos/services.github-runners.<name>.group | Group under which to run the service
|
| options/nixos/services.wstunnel.servers.<name>.enableHTTPS | Use HTTPS for the tunnel server.
|
| options/nixos/services.errbot.instances.<name>.plugins | List of errbot plugin derivations.
|
| options/nixos/services.restic.backups.<name>.inhibitsSleep | Prevents the system from sleeping while backing up.
|
| options/nixos/services.davis.hostname | Domain of the host to serve davis under
|
| options/nixos/services.tarsnap.archives.<name>.keyfile | Set a specific keyfile for this archive
|
| options/nixos/systemd.services.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| options/nixos/services.wordpress.sites.<name>.uploadsDir | This directory is used for uploads of pictures
|
| options/nixos/services.firewalld.zones.<name>.forward | Whether to enable intra-zone forwarding
|
| options/nixos/services.vmalert.instances.<name>.rules | A list of the given alerting or recording rules against configured "datasource.url" compatible with
Prometheus HTTP API for vmalert to execute
|
| options/nixos/power.ups.upsmon.monitor.<name>.type | The relationship with upsd
|
| options/home-manager/services.colima.profiles.<name>.settings | Colima configuration settings, see https://github.com/abiosoft/colima/blob/main/embedded/defaults/colima.yaml or run colima template.
|
| options/nixos/services.kanata.keyboards.<name>.extraDefCfg | Configuration of defcfg other than linux-dev (generated
from the devices option) and
linux-continue-if-no-devs-found (hardcoded to be yes)
|
| options/nixos/services.keyd.keyboards.<name>.extraConfig | Extra configuration that is appended to the end of the file.
Do not write ids section here, use a separate option for it
|
| options/nixos/services.bepasty.servers.<name>.secretKeyFile | A file that contains the server secret for safe session cookies, must be set.
secretKeyFile takes precedence over secretKey
|
| options/nixos/services.dokuwiki.sites.<name>.pluginsConfig | List of the dokuwiki (un)loaded plugins.
|
| options/nixos/services.public-inbox.inboxes.<name>.coderepo | Nicknames of a 'coderepo' section associated with the inbox.
|
| options/nixos/services.mailpit.instances.<name>.listen | HTTP bind interface and port for UI.
|
| options/home-manager/services.kanshi.profiles.<name>.outputs.*.alias | Defines an alias for the output
|
| options/nixos/services.rsync.jobs.<name>.destination | Destination directory.
|
| options/nixos/users.users.<name>.createHome | Whether to create the home directory and ensure ownership as well as
permissions to match the user.
|
| options/home-manager/programs.alot.tags.<name>.focus | How to display the tag when focused.
|
| options/home-manager/programs.thunderbird.profiles.<name>.name | This profile's name.
|
| options/nixos/users.users.<name>.extraGroups | The user's auxiliary groups.
|
| options/nixos/services.fedimintd.<name>.ui.openFirewall | Opens TCP port in firewall for built-in UI
|
| options/nixos/services.klipper.firmwares.<name>.enable | Whether to enable building of firmware for manual flashing
.
|
| options/nixos/services.public-inbox.inboxes.<name>.inboxdir | The absolute path to the directory which hosts the public-inbox.
|
| options/darwin/programs.tmux.tmuxOptions.<name>.target | Name of symlink
|
| options/nixos/services.sabnzbd.settings.servers.<name>.enable | Enable this server by default
|
| options/nixos/services.snapserver.streams.<name>.type | The type of input stream.
|
| options/home-manager/services.xsuspender.rules.<name>.resumeFor | Resume duration in seconds.
|
| options/nixos/services.traefik.dynamic.files.<name>.settings | Dynamic configuration for Traefik, written in Nix.
This will be serialized to JSON (which is considered valid YAML) at build, and passed as part of the static file.
|
| options/home-manager/xsession.pointerCursor.name | Alias of home.pointerCursor.name.
|
| options/nixos/services.dokuwiki.sites.<name>.settings | Structural DokuWiki configuration
|
| options/nixos/systemd.paths.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/services.ghostunnel.servers.<name>.key | Path to certificate private key (PEM with private key)
|
| options/nixos/virtualisation.fileSystems.<name>.mountPoint | Location where the file system will be mounted
|
| options/home-manager/services.kanshi.profiles.<name>.outputs.*.scale | Scales the output by the specified scale factor.
|
| options/nixos/services.wyoming.piper.servers.<name>.zeroconf.enable | Whether to enable zeroconf discovery.
|
| options/nixos/services.blockbook-frontend.<name>.rpc.port | Port for JSON-RPC connections.
|
| options/nixos/services.blockbook-frontend.<name>.rpc.user | Username for JSON-RPC connections.
|
| options/nixos/services.jupyterhub.kernels.<name>.argv | Command and arguments to start the kernel.
|
| options/nixos/services.sanoid.datasets.<name>.useTemplate | Names of the templates to use for this dataset.
|
| options/nixos/services.postfix.masterConfig.<name>.maxproc | The maximum number of processes to spawn for this service
|
| options/nixos/services.gitlab-runner.services.<name>.postBuildScript | Runner-specific command script executed after code is pulled
and just after build executes.
|
| options/darwin/services.gitlab-runner.services.<name>.postBuildScript | Runner-specific command script executed after code is pulled
and just after build executes.
|
| options/nixos/services.kmonad.keyboards.<name>.defcfg.enable | Whether to enable automatic generation of the defcfg block
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockNodeName | This optional key specifies the node to connect(2) or bind(2) to.
|
| options/nixos/hardware.deviceTree.overlays.*.name | Name of this overlay
|
| options/nixos/services.gancio.settings.hostname | The domain name under which the server is reachable.
|
| options/nixos/services.klipper.firmwares.<name>.serial | Path to serial port this printer is connected to
|
| options/home-manager/systemd.user.services.<name>.Unit.X-Restart-Triggers | List of free form strings that can be used to trigger a service
restart during Home Manager activation.
|
| options/nixos/services.wstunnel.clients.<name>.localToRemote | Listen on local and forwards traffic from remote.
|
| options/darwin/services.gitlab-runner.services.<name>.executor | Select executor, eg. shell, docker, etc
|
| options/nixos/services.firewalld.zones.<name>.sourcePorts.*.port | |
| options/nixos/services.anubis.instances.<name>.policy.extraBots | Additional bot rules appended to the policy
|
| options/nixos/services.rke2.autoDeployCharts.<name>.values | Override default chart values via Nix expressions
|
| options/nixos/power.ups.upsmon.monitor.<name>.user | Username from upsd.users for accessing this UPS
|
| options/nixos/services.znc.confOptions.networks.<name>.channels | IRC channels to join.
|
| options/nixos/services.prometheus.exporters.fritz.settings.devices.*.name | Name to use for the device.
|
| options/nixos/services.gitlab-runner.services.<name>.executor | Select executor, eg. shell, docker, etc
|
| options/nixos/systemd.services.<name>.requisite | Similar to requires
|
| options/nixos/services.postfix.masterConfig.<name>.private | Whether the service's sockets and storage directory is restricted to
be only available via the mail system
|
| options/nixos/services.restic.backups.<name>.dynamicFilesFrom | A script that produces a list of files to back up
|
| options/nixos/services.fedimintd.<name>.api.openFirewall | Opens port in firewall for fedimintd's api port
|
| options/nixos/services.pgbackrest.stanzas.<name>.jobs | Backups jobs to schedule for this stanza as described in:
https://pgbackrest.org/user-guide.html#quickstart/schedule-backup
|
| options/nixos/services.geoclue2.appConfig.<name>.isSystem | Whether the application is a system component or not.
|
| options/nixos/services.autorandr.profiles.<name>.hooks | Profile hook scripts.
|
| options/nixos/services.znapzend.zetup.<name>.recursive | Whether to do recursive snapshots.
|
| options/nixos/services.hostapd.radios.<name>.settings | Extra configuration options to put at the end of global initialization, before defining BSSs
|
| options/nixos/services.netbird.tunnels.<name>.hardened | Hardened service:
- runs as a dedicated user with minimal set of permissions (see caveats),
- restricts daemon configuration socket access to dedicated user group
(you can grant access to it with
users.users."<user>".extraGroups = [ netbird-‹name› ]),
Even though the local system resources access is restricted:
CAP_NET_RAW, CAP_NET_ADMIN and CAP_BPF still give unlimited network manipulation possibilites,
- older kernels don't have
CAP_BPF and use CAP_SYS_ADMIN instead,
Known security features that are not (yet) integrated into the module:
- 2024-02-14:
rosenpass is an experimental feature configurable solely
through --enable-rosenpass flag on the netbird up command,
see the docs
|
| options/nixos/services.netbird.clients.<name>.hardened | Hardened service:
- runs as a dedicated user with minimal set of permissions (see caveats),
- restricts daemon configuration socket access to dedicated user group
(you can grant access to it with
users.users."<user>".extraGroups = [ netbird-‹name› ]),
Even though the local system resources access is restricted:
CAP_NET_RAW, CAP_NET_ADMIN and CAP_BPF still give unlimited network manipulation possibilites,
- older kernels don't have
CAP_BPF and use CAP_SYS_ADMIN instead,
Known security features that are not (yet) integrated into the module:
- 2024-02-14:
rosenpass is an experimental feature configurable solely
through --enable-rosenpass flag on the netbird up command,
see the docs
|
| options/nixos/services.firewalld.services.<name>.sourcePorts | Source ports for the service.
|
| options/home-manager/programs.fish.binds.<name>.mode | Specify the bind mode that the bind is used in
|
| options/nixos/services.wstunnel.clients.<name>.remoteToLocal | Listen on remote and forwards traffic from local
|
| options/nixos/services.errbot.instances.<name>.extraConfig | String to be appended to the config verbatim
|
| options/nixos/services.wordpress.sites.<name>.mergedConfig | Read only representation of the final configuration.
|
| options/nixos/virtualisation.fileSystems.<name>.autoFormat | If the device does not currently contain a filesystem (as
determined by blkid), then automatically
format it with the filesystem type specified in
fsType
|
| options/nixos/systemd.user.services.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.bacula-sd.director.<name>.monitor | If Monitor is set to no, this director will have
full access to this Storage daemon
|
| options/nixos/services.bacula-fd.director.<name>.monitor | If Monitor is set to no, this director will have
full access to this Storage daemon
|
| options/nixos/services.jupyterhub.kernels.<name>.displayName | Name that will be shown to the user.
|
| options/nixos/services.openvpn.servers.<name>.authUserPass.password | The password to store inside the credentials file.
|
| options/nixos/services.fcgiwrap.instances.<name>.socket.user | User to be set as owner of the UNIX socket.
|
| options/nixos/services.fcgiwrap.instances.<name>.socket.type | Socket type: 'unix', 'tcp' or 'tcp6'.
|
| options/nixos/services.v4l2-relayd.instances.<name>.output.format | The video-format to write to output-stream.
|
| options/nixos/services.znc.confOptions.networks.<name>.password | IRC server password, such as for a Slack gateway.
|
| options/nixos/services.borgbackup.jobs.<name>.extraInitArgs | Additional arguments for borg init
|
| options/nixos/services.mosquitto.bridges.<name>.topics | Topic patterns to be shared between the two brokers
|
| options/home-manager/services.pizauth.accounts.<name>.extraConfig | Additional configuration that will be added to the account configuration
|
| options/nixos/systemd.user.timers.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/systemd.user.slices.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/services.ghostunnel.servers.<name>.cert | Path to certificate (PEM with certificate chain)
|
| options/nixos/services.fedimintd.<name>.p2p.openFirewall | Opens port in firewall for fedimintd's p2p port (both TCP and UDP)
|
| options/nixos/services.mautrix-meta.instances.<name>.dataDir | Path to the directory with database, registration, and other data for the bridge service
|
| options/nixos/services.drupal.sites.<name>.database.passwordFile | A file containing the password corresponding to
database.user.
|
| options/nixos/services.easytier.instances.<name>.settings.hostname | Hostname shown in peer list and web console.
|
| options/nixos/services.buildkite-agents.<name>.hooks | "Agent" hooks to install
|
| options/nixos/services.vdirsyncer.jobs.<name>.config.statusPath | vdirsyncer's status path
|
| options/nixos/services.firezone.server.provision.accounts.<name>.policies.<name>.resource | The resource to which access should be allowed.
|
| options/home-manager/services.restic.backups.<name>.dynamicFilesFrom | A script that produces a list of files to back up
|
| options/nixos/systemd.user.paths.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/services.kimai.sites.<name>.database.serverVersion | MySQL exact version string
|
| options/nixos/virtualisation.fileSystems.<name>.autoResize | If set, the filesystem is grown to its maximum size before
being mounted. (This is typically the size of the containing
partition.) This is currently only supported for ext2/3/4
filesystems that are mounted during early boot.
|
| options/nixos/security.pam.services.<name>.ttyAudit.disablePattern | For each user matching one of comma-separated
glob patterns, disable TTY auditing
|
| options/nixos/services.nbd.server.exports.<name>.allowAddresses | IPs and subnets that are authorized to connect for this device
|
| options/nixos/services.ytdl-sub.instances.<name>.schedule | How often to run ytdl-sub
|
| options/darwin/services.gitlab-runner.services.<name>.runUntagged | Register to run untagged builds; defaults to
true when tagList is empty.
|
| options/nixos/services.monica.hostname | The hostname to serve monica on.
|
| options/nixos/services.spiped.config.<name>.weakHandshake | Use fast/weak handshaking: This reduces the CPU time spent
in the initial connection setup, at the expense of losing
perfect forward secrecy.
|
| options/nixos/services.firewalld.zones.<name>.forwardPorts | Ports to forward in the zone.
|
| options/nixos/services.firewalld.zones.<name>.sources.*.ipset | An ipset.
|
| options/nixos/services.vdirsyncer.jobs.<name>.timerConfig | systemd timer configuration
|
| options/nixos/services.vault-agent.instances.<name>.package | The vault package to use.
|
| options/home-manager/services.podman.containers.<name>.labels | The labels to apply to the container.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.auth | All authentication providers to provision
|
| options/nixos/ec2.zfs.datasets.<name>.mount | Where to mount this dataset.
|
| options/nixos/services.github-runners.<name>.extraLabels | Extra labels in addition to the default (unless disabled through the noDefaultLabels option)
|
| options/darwin/services.github-runners.<name>.extraLabels | Extra labels in addition to the default (unless disabled through the noDefaultLabels option)
|
| options/nixos/services.easytier.instances.<name>.settings | Settings to generate easytier-‹name›.toml
|
| options/nixos/services.kanidm.provision.persons.<name>.groups | List of groups this person should belong to.
|
| options/nixos/services.wstunnel.servers.<name>.listen.enableHTTPS | Use HTTPS for the tunnel server.
|
| options/nixos/services.buildkite-agents.<name>.shell | Command that buildkite-agent 3 will execute when it spawns a shell.
|
| options/nixos/services.nylon.<name>.acceptInterface | Tell nylon which interface to listen for client requests on, default is "lo".
|
| options/darwin/services.buildkite-agents.<name>.shell | Command that buildkite-agent 3 will execute when it spawns a shell.
|
| options/nixos/services.restic.backups.<name>.rcloneConfigFile | Path to the file containing rclone configuration
|
| options/home-manager/programs.rclone.remotes.<name>.mounts.<name>.logLevel | Set the log-level
|
| options/nixos/services.kmonad.keyboards.<name>.defcfg.compose.delay | The delay (in milliseconds) between compose key sequences.
|
| options/nixos/services.fcgiwrap.instances.<name>.socket.mode | Mode to be set on the UNIX socket
|
| options/nixos/services.rke2.autoDeployCharts.<name>.enable | Whether to enable the installation of this Helm chart
|
| options/nixos/services.znapzend.zetup.<name>.destinations.<name>.presend | Command to run before sending the snapshot to the destination
|
| options/nixos/services.btrbk.instances.<name>.settings | configuration options for btrbk
|
| options/nixos/virtualisation.fileSystems.<name>.encrypted.blkDev | Location of the backing encrypted device.
|
| options/nixos/services.atalkd.interfaces.<name>.config | Optional configuration string for this interface.
|
| options/nixos/security.acme.certs.<name>.s3Bucket | S3 bucket name to use for HTTP-01 based challenges
|
| options/nixos/services.drupal.sites.<name>.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.kanidm.provision.groups.<name>.present | Whether to ensure that this group is present or absent.
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockPathName | This optional key implies SockFamily is set to "Unix"
|
| options/nixos/services.kanata.keyboards.<name>.devices | Paths to keyboard devices
|
| options/nixos/services.orangefs.server.fileSystems.<name>.troveSyncData | Sync data.
|
| options/nixos/services.vdirsyncer.jobs.<name>.config.general | general configuration
|
| options/darwin/launchd.user.agents.<name>.path | Packages added to the service's PATH
environment variable
|
| options/nixos/services.blockbook-frontend.<name>.certFile | To enable SSL, specify path to the name of certificate files without extension
|
| options/nixos/services.wordpress.sites.<name>.settings | Structural Wordpress configuration
|
| options/nixos/services.anki-sync-server.users.*.username | User name accepted by anki-sync-server.
|
| options/nixos/services.restic.backups.<name>.createWrapper | Whether to generate and add a script to the system path, that has the same environment variables set
as the systemd service
|
| options/home-manager/services.restic.backups.<name>.createWrapper | Whether to generate and add a script to the system path, that has the
same environment variables set as the systemd service
|
| options/nixos/services.wstunnel.clients.<name>.httpProxy | Proxy to use to connect to the wstunnel server (USER:PASS@HOST:PORT).
Passwords specified here will be world-readable in the Nix store!
To pass a password to the service, point the environmentFile option
to a file containing PROXY_PASSWORD=<your-password-here> and set
this option to <user>:$PROXY_PASSWORD@<host>:<port>
|
| options/nixos/services.gitlab-runner.services.<name>.dockerPullPolicy | Default pull-policy for Docker images
|
| options/nixos/services.vmalert.instances.<name>.enable | Wether to enable VictoriaMetrics's vmalert.
vmalert evaluates alerting and recording rules against a data source, sends notifications via Alertmanager.
|
| options/nixos/services.public-inbox.settings.coderepo.<name>.cgitUrl | URL of a cgit instance
|
| options/nixos/services.orangefs.server.fileSystems.<name>.troveSyncMeta | Sync meta data.
|
| options/nixos/security.acme.certs.<name>.csrKey | Path to the private key to the matching certificate signing request.
|
| options/nixos/services.anubis.instances.<name>.settings.POLICY_FNAME | The policy file to use
|
| options/nixos/services.kanidm.provision.groups.<name>.members | List of kanidm entities (persons, groups, ...) which are part of this group.
|
| options/nixos/services.postgresql.systemCallFilter.<name>.enable | Whether to enable ‹name› in postgresql's syscall filter.
|
| options/nixos/services.postfix.settings.master.<name>.maxproc | The maximum number of processes to spawn for this service
|
| options/nixos/services.anubis.instances.<name>.botPolicy | Anubis policy configuration in Nix syntax
|
| options/nixos/services.tinc.networks.<name>.interfaceType | The type of virtual interface used for the network connection.
|
| options/nixos/virtualisation.fileSystems.<name>.device | The device as passed to mount
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.rsa.<name>.file | File name in the rsa folder for which this passphrase
should be used.
|
| options/nixos/services.syncthing.settings.folders.<name>.id | The ID of the folder
|
| options/nixos/services.orangefs.server.fileSystems.<name>.rootHandle | File system root ID.
|
| options/nixos/services.syncthing.settings.devices.<name>.id | The device ID
|
| options/home-manager/services.syncthing.settings.devices.<name>.id | The device ID
|
| options/home-manager/services.syncthing.settings.folders.<name>.id | The ID of the folder
|
| options/nixos/users.users.<name>.subGidRanges | Subordinate group ids that user is allowed to use
|
| options/nixos/users.users.<name>.subUidRanges | Subordinate user ids that user is allowed to use
|
| options/home-manager/services.pizauth.accounts.<name>.clientSecret | The OAuth2 client secret.
|
| options/nixos/services.fedimintd.<name>.bitcoin.rpc.secretFile | If set the URL specified in bitcoin.rpc.url will get the content of this file added
as an URL password, so http://user@example.com will turn into http://user:SOMESECRET@example.com
|
| options/nixos/services.grafana.provision.alerting.muteTimings.settings.muteTimes.*.name | Name of the mute time interval, must be unique
|
| options/home-manager/xdg.configFile.<name>.source | Path of the source file or directory
|
| options/nixos/services.prometheus.exporters.script.settings.scripts.*.name | Name of the script.
|
| options/nixos/systemd.user.timers.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/systemd.user.slices.<name>.wants | Start the specified units when this unit is started.
|
| options/home-manager/programs.pyradio.stations.*.name | Display name of the radio station.
|
| options/darwin/users.groups.<name>.members | The group's members.
|
| options/nixos/services.samba-wsdd.hostname | Override (NetBIOS) hostname to be used (default hostname).
|
| options/nixos/services.biboumi.settings.db_name | The name of the database to use
|
| options/nixos/services.cjdns.ETHInterface.connectTo.<name>.publicKey | Public key at the opposite end of the tunnel.
|
| options/nixos/services.cjdns.UDPInterface.connectTo.<name>.publicKey | Public key at the opposite end of the tunnel.
|
| options/nixos/services.printing.cups-pdf.instances.<name>.enable | Whether to enable this cups-pdf instance.
|
| options/nixos/services.rke2.autoDeployCharts.<name>.extraDeploy | List of extra Kubernetes manifests to deploy with this Helm chart.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.filters | A list of filter to restrict traffic
|
| options/home-manager/services.podman.containers.<name>.autoStart | Whether to start the container on boot (requires user lingering).
|
| options/home-manager/programs.rclone.remotes.<name>.mounts.<name>.enable | Whether to enable this mount.
|
| options/nixos/virtualisation.interfaces.<name>.vlan | VLAN to which the network interface is connected.
|
| options/nixos/services.snapserver.streams.<name>.codec | Default audio compression method.
|
| options/nixos/services.frigate.settings.cameras.<name>.ffmpeg.inputs | List of inputs for this camera.
|
| options/nixos/services.restic.backups.<name>.rcloneOptions | Options to pass to rclone to control its behavior
|
| options/home-manager/services.restic.backups.<name>.rcloneOptions | Options to pass to rclone to control its behavior
|
| options/nixos/services.postfix.settings.master.<name>.private | Whether the service's sockets and storage directory is restricted to
be only available via the mail system
|
| options/nixos/systemd.user.paths.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.user.units.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/services.jupyterhub.kernels.<name>.language | Language of the environment
|
| options/nixos/virtualisation.fileSystems.<name>.overlay.workdir | The path to the workdir
|
| options/nixos/systemd.user.services.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.hadoop.hdfs.namenode.extraEnv | Extra environment variables for HDFS NameNode
|
| options/nixos/services.wyoming.piper.servers.<name>.streaming | Whether to enable audio streaming on sentence boundaries.
|
| options/nixos/services.nebula.networks.<name>.enableReload | Enable automatic config reload on config change
|
| options/nixos/services.tarsnap.archives.<name>.excludes | Exclude files and directories matching these patterns.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.address | The address of this resource
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockPathMode | This optional key specifies the mode of the socket
|
| options/nixos/programs.neovim.runtime.<name>.target | Name of symlink
|
| options/home-manager/programs.rclone.remotes.<name>.mounts.<name>.autoMount | Whether to enable automatic mounting.
|
| options/nixos/services.jibri.xmppEnvironments.<name>.control.muc.nickname | The nickname for this Jibri instance in the MUC.
|
| options/nixos/services.syncoid.commands.<name>.sendOptions | Advanced options to pass to zfs send
|
| options/nixos/services.syncoid.commands.<name>.recvOptions | Advanced options to pass to zfs recv
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/home-manager/services.restic.backups.<name>.inhibitsSleep | Prevents the system from sleeping while backing up
|
| options/nixos/users.extraUsers.<name>.shell | The path to the user's shell
|
| options/nixos/services.rke2.autoDeployCharts.<name>.version | The version of the Helm chart
|
| options/nixos/services.github-runners.<name>.tokenType | Type of token to use for runner registration
|
| options/home-manager/services.xsuspender.rules.<name>.execResume | Before resuming, execute this shell script
|
| options/home-manager/services.kanshi.profiles.<name>.outputs.*.mode | <width>x<height>[@<rate>[Hz]]
Configures the specified output to use the specified mode
|
| options/nixos/services.redis.servers.<name>.maxclients | Set the max number of connected clients at the same time.
|
| options/home-manager/services.kanshi.profiles.<name>.outputs.*.status | Enables or disables the specified output.
|
| options/nixos/systemd.services.<name>.enableDefaultPath | Whether to append a minimal default PATH environment variable to the service, containing common system utilities.
|
| options/nixos/services.fedimintd.<name>.bitcoin.network | Bitcoin network to participate in.
|
| options/darwin/services.github-runners.<name>.tokenFile | The full path to a file which contains either
- a fine-grained personal access token (PAT),
- a classic PAT
- or a runner registration token
Changing this option or the tokenFile’s content triggers a new runner registration
|
| options/nixos/systemd.services.<name>.confinement.mode | The value full-apivfs (the default) sets up
private /dev, /proc,
/sys, /tmp and /var/tmp file systems
in a separate user name space
|
| options/nixos/services.gitlab-runner.services.<name>.dockerVolumes | Bind-mount a volume and create it
if it doesn't exist prior to mounting.
|
| options/darwin/services.gitlab-runner.services.<name>.dockerVolumes | Bind-mount a volume and create it
if it doesn't exist prior to mounting.
|
| options/nixos/services.nebula.networks.<name>.lighthouse.dns.port | UDP port number for lighthouse DNS server.
|
| options/nixos/services.invoiceplane.sites.<name>.cron.key | Cron key taken from the administration page.
|
| options/nixos/services.fcgiwrap.instances.<name>.socket.group | Group to be set as owner of the UNIX socket.
|
| options/nixos/services.jibri.xmppEnvironments.<name>.control.muc.roomName | The room name of the MUC to connect to for control.
|
| options/nixos/services.gitlab-runner.services.<name>.runUntagged | Register to run untagged builds; defaults to
true when tagList is empty
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.beamSize | The number of beams to use in beam search
|
| options/nixos/services.snapserver.streams.<name>.query | Key-value pairs that convey additional parameters about a stream.
|
| options/nixos/services.klipper.firmwares.<name>.configFile | Path to firmware config which is generated using klipper-genconf
|
| options/nixos/services.klipper.firmwares.<name>.package | Path to the built firmware package.
|
| options/nixos/services.inadyn.settings.custom.<name>.password | Password for this DDNS provider
|
| options/nixos/systemd.services.<name>.restartIfChanged | Whether the service should be restarted during a NixOS
configuration switch if its definition has changed.
|
| options/nixos/services.wordpress.sites.<name>.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/systemd.slices.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/systemd.timers.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/services.firewalld.services.<name>.sourcePorts.*.port | |
| options/nixos/services.borgbackup.jobs.<name>.extraPruneArgs | Additional arguments for borg prune
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.cssSnippets.*.name | Name of the snippet.
|
| options/nixos/services.wstunnel.servers.<name>.restrictTo | Accepted traffic will be forwarded only to this service.
|
| options/nixos/services.keepalived.vrrpScripts.<name>.fall | Required number of failures for KO transition.
|
| options/nixos/services.keepalived.vrrpScripts.<name>.rise | Required number of successes for OK transition.
|
| options/home-manager/services.muchsync.remotes.<name>.sshCommand | Specifies a command line to pass to /bin/sh
to execute a command on another machine
|
| options/nixos/services.easytier.instances.<name>.enable | Enable the instance.
|
| options/nixos/services.opkssh.providers.<name>.lifetime | Token lifetime
|
| options/nixos/systemd.user.services.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/virtualisation.allInterfaces.<name>.vlan | VLAN to which the network interface is connected.
|
| options/nixos/services.borgbackup.jobs.<name>.appendFailedSuffix | Append a .failed suffix
to the archive name, which is only removed if
borg create has a zero exit status.
|
| options/nixos/services.sabnzbd.settings.servers.<name>.displayname | Human-friendly description of the server
|
| options/nixos/services.anubis.instances.<name>.settings.METRICS_BIND | The address Anubis' metrics server listens to
|
| options/nixos/services.firewalld.services.<name>.includes | Services to include for the service.
|
| options/nixos/services.borgbackup.jobs.<name>.privateTmp | Set the PrivateTmp option for
the systemd-service
|
| options/nixos/virtualisation.oci-containers.containers.<name>.login.username | Username for login.
|
| options/nixos/services.borgbackup.jobs.<name>.exclude | Exclude paths matching any of the given patterns
|
| options/nixos/services.iodine.clients | Each attribute of this option defines a systemd service that
runs iodine
|
| options/nixos/systemd.services.<name>.reloadIfChanged | Whether the service should be reloaded during a NixOS
configuration switch if its definition has changed
|
| options/nixos/systemd.paths.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/services.outline.smtp.username | Username to authenticate with.
|
| options/nixos/services.kanata.keyboards.<name>.configFile | The config file
|
| options/nixos/services.keyd.keyboards.<name>.settings | Configuration, except ids section, that is written to /etc/keyd/.conf
|
| options/nixos/boot.initrd.systemd.groups.<name>.gid | ID of the group in initrd.
|
| options/nixos/services.dokuwiki.sites.<name>.templates | List of path(s) to respective template(s) which are copied into the 'tpl' directory.
These templates need to be packaged before use, see example.
|
| options/nixos/services.errbot.instances.<name>.identity | Errbot identity configuration
|
| options/home-manager/services.xsuspender.rules.<name>.resumeEvery | Resume interval in seconds.
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.extraArgs | Extra arguments to pass to the server commandline.
|
| options/home-manager/systemd.user.services.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockFamily | This optional key can be used to specifically request that "IPv4" or "IPv6" socket(s) be created.
|
| options/nixos/services.kubernetes.kubelet.taints.<name>.value | Value of taint.
|
| options/nixos/services.buildkite-agents.<name>.enable | Whether to enable this buildkite agent
|
| options/darwin/services.buildkite-agents.<name>.enable | Whether to enable this buildkite agent
|
| options/nixos/services.gitlab-runner.services.<name>.description | Name/description of the runner.
|
| options/nixos/services.anubis.instances.<name>.settings.SERVE_ROBOTS_TXT | Whether to serve a default robots.txt that denies access to common AI bots by name and all other
bots by wildcard.
|
| options/nixos/services.netbird.clients.<name>.openFirewall | Opens up firewall port for communication between NetBird peers directly over LAN or public IP,
without using (internet-hosted) TURN servers as intermediaries.
|
| options/nixos/services.netbird.tunnels.<name>.openFirewall | Opens up firewall port for communication between NetBird peers directly over LAN or public IP,
without using (internet-hosted) TURN servers as intermediaries.
|
| options/nixos/services.prefect.workerPools.<name>.installPolicy | install policy for the worker (always, if-not-present, never, prompt)
|
| options/nixos/services.displayManager.dms-greeter.compositor.name | The Wayland compositor to run the greeter in
|
| options/nixos/services.cgit.<name>.gitHttpBackend.checkExportOkFiles | Whether git-http-backend should only export repositories that contain a git-daemon-export-ok file
|
| options/nixos/systemd.user.paths.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.user.slices.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/systemd.user.timers.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.ignoreBroadcastSsid | Send empty SSID in beacons and ignore probe request frames that do not
specify full SSID, i.e., require stations to know SSID
|
| options/nixos/services.autorandr.profiles.<name>.config | Per output profile configuration.
|
| options/nixos/services.authelia.instances.<name>.enable | Whether to enable Authelia instance.
|
| options/nixos/services.sanoid.templates.<name>.autosnap | Whether to automatically take snapshots.
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.enable | Whether to enable Wyoming faster-whisper server.
|
| options/nixos/services.zabbixWeb.hostname | Hostname for either nginx or httpd.
|
| options/nixos/services.quicktun.<name>.remoteAddress | IP address or hostname of the remote end (use 0.0.0.0 for a floating/dynamic remote endpoint).
|
| options/nixos/services.openvpn.servers.<name>.updateResolvConf | Use the script from the update-resolv-conf package to automatically
update resolv.conf with the DNS information provided by openvpn
|
| options/nixos/services.home-assistant.config.homeassistant.name | Name of the location where Home Assistant is running.
|
| options/nixos/services.sabnzbd.settings.servers.<name>.timeout | Time, in seconds, to wait for a response before
attempting error recovery.
|
| options/nixos/services.sanoid.datasets.<name>.autoprune | Whether to automatically prune old snapshots.
|
| options/nixos/services.firewalld.zones.<name>.forwardPorts.*.port | |
| options/nixos/services.hadoop.hdfs.namenode.enable | Whether to enable HDFS NameNode.
|
| options/nixos/services.nebula.networks.<name>.firewall.inbound | Firewall rules for inbound traffic.
|
| options/nixos/services.orangefs.server.fileSystems.<name>.extraConfig | Extra config for <FileSystem> section.
|
| options/darwin/launchd.agents.<name>.path | Packages added to the service's PATH
environment variable
|
| options/nixos/services.tarsnap.archives.<name>.includes | Include only files and directories matching these
patterns (the empty list includes everything)
|
| options/nixos/services.mautrix-meta.instances.<name>.enable | Whether to enable Mautrix-Meta, a Matrix <-> Facebook and Matrix <-> Instagram hybrid puppeting/relaybot bridge.
|
| options/nixos/services.logrotate.settings.<name>.files | Single or list of files for which rules are defined
|
| options/nixos/services.matomo.hostname | URL of the host, without https prefix
|
| options/nixos/services.easytier.instances.<name>.extraArgs | Extra args append to the easytier command-line.
|
| options/nixos/services.logrotate.settings.<name>.enable | Whether to enable setting individual kill switch.
|
| options/nixos/services.inadyn.settings.provider.<name>.include | File to include additional settings for this provider from.
|
| options/home-manager/services.podman.containers.<name>.autoUpdate | The autoupdate policy for the container.
|
| options/nixos/systemd.timers.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/systemd.slices.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/services.znapzend.zetup.<name>.destinations.<name>.postsend | Command to run after sending the snapshot to the destination
|
| options/nixos/security.acme.certs.<name>.group | Group running the ACME client.
|
| options/home-manager/programs.fish.binds.<name>.erase | Whether to enable remove bind.
|
| options/nixos/services.tor.relay.onionServices.<name>.settings.RendPostPeriod | See torrc manual.
|
| options/home-manager/services.kanshi.profiles.<name>.outputs.*.criteria | The criteria can either be an output name, an output description or "*"
|
| options/nixos/services.borgbackup.jobs.<name>.dumpCommand | Backup the stdout of this program instead of filesystem paths
|
| options/nixos/services.syncthing.settings.folders.<name>.type | Controls how the folder is handled by Syncthing
|
| options/home-manager/services.syncthing.settings.folders.<name>.type | Controls how the folder is handled by Syncthing
|
| options/nixos/services.hostapd.radios.<name>.countryCode | Country code (ISO/IEC 3166-1)
|
| options/nixos/services.mailman.ldap.attrMap.username | LDAP-attribute that corresponds to the username-attribute in mailman.
|
| options/nixos/services.ghostunnel.servers.<name>.allowAll | If true, allow all clients, do not check client cert subject.
|
| options/nixos/services.geoclue2.appConfig.<name>.desktopID | Desktop ID of the application.
|
| options/nixos/virtualisation.fileSystems.<name>.options | Options used to mount the file system
|
| options/nixos/virtualisation.fileSystems.<name>.depends | List of paths that should be mounted before this one
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.public | Whether this is a public client (enforces PKCE, doesn't use a basic secret)
|
| options/home-manager/services.xsuspender.rules.<name>.matchWmNameContains | Match windows where wm name contains string.
|
| options/darwin/services.gitlab-runner.services.<name>.protected | When set to true Runner will only run on pipelines
triggered on protected branches.
|
| options/nixos/users.users.<name>.autoSubUidGidRange | Automatically allocate subordinate user and group ids for this user
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ecdsa.<name>.file | File name in the ecdsa folder for which this
passphrase should be used.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs8.<name>.file | File name in the pkcs8 folder for which this
passphrase should be used.
|
| options/nixos/services.prometheus.exporters.rtl_433.channels.*.name | Name to match.
|
| options/nixos/services.firewalld.zones.<name>.forwardPorts.*.to-port | |
| options/nixos/services.restic.backups.<name>.repository | repository to backup to.
|
| options/nixos/users.extraUsers.<name>.pamMount | Attributes for user's entry in
pam_mount.conf.xml
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.id | IKE identity to use for authentication round
|
| options/home-manager/xdg.configFile.<name>.onChange | Shell commands to run when file has changed between
generations
|
| options/nixos/boot.initrd.extraFiles.<name>.source | The object to make available inside the initrd.
|
| options/nixos/services.btrbk.instances.<name>.onCalendar | How often this btrbk instance is started
|
| options/nixos/services.jibri.xmppEnvironments.<name>.control.login.username | User part of the JID.
|
| options/nixos/services.kanidm.provision.persons.<name>.present | Whether to ensure that this person is present or absent.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels.<name>.nearPattern | Name for where mail coming from the remote (far) mail server will end up
locally
|
| options/nixos/services.xserver.xkb.extraLayouts.<name>.languages | A list of languages provided by the layout.
(Use ISO 639-2 codes, for example: "eng" for english)
|
| options/nixos/services.restic.backups.<name>.initialize | Create the repository if it doesn't exist.
|
| options/home-manager/services.podman.containers.<name>.volumes | The volumes to mount into the container.
|
| options/home-manager/services.podman.containers.<name>.devices | The devices to mount into the container
|
| options/nixos/services.wstunnel.clients.<name>.settings | Command line arguments to pass to wstunnel
|
| options/nixos/services.wstunnel.servers.<name>.settings | Command line arguments to pass to wstunnel
|
| options/nixos/services.frigate.settings.cameras.<name>.ffmpeg.inputs.*.path | Stream URL
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.scopeMaps | Maps kanidm groups to returned oauth scopes
|
| options/nixos/virtualisation.fileSystems.<name>.neededForBoot | If set, this file system will be mounted in the initial ramdisk
|
| options/nixos/services.homebridge.settings.accessories.*.name | Name of the accessory
|
| options/nixos/services.printing.cups-pdf.instances.<name>.confFileText | This will contain the contents of cups-pdf.conf for this instance, derived from settings
|
| options/nixos/services.firezone.server.provision.accounts.<name>.actors | All actors (users) to provision
|
| options/nixos/services.borgbackup.jobs.<name>.readWritePaths | By default, borg cannot write anywhere on the system but
$HOME/.config/borg and $HOME/.cache/borg
|
| options/nixos/security.pam.services.<name>.enableGnomeKeyring | If enabled, pam_gnome_keyring will attempt to automatically unlock the
user's default Gnome keyring upon login
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.device | Determines the platform faster-whisper is run on
|
| options/nixos/boot.initrd.systemd.users.<name>.shell | The path to the user's shell in initrd.
|
| options/nixos/boot.initrd.systemd.users.<name>.group | Group the user belongs to in initrd.
|
| options/nixos/services.jupyterhub.kernels.<name>.logo64 | Path to 64x64 logo png.
|
| options/nixos/services.jupyterhub.kernels.<name>.logo32 | Path to 32x32 logo png.
|
| options/nixos/services.tinc.networks.<name>.ed25519PrivateKeyFile | Path of the private ed25519 keyfile.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.ports | Either a single port or port range to allow
|
| options/nixos/hardware.alsa.controls.<name>.card | Name of the PCM card to control (slave).
|
| options/nixos/virtualisation.oci-containers.containers.<name>.hostname | The hostname of the container.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels.<name>.extraConfig | Extra configuration lines to add to THIS channel's
configuration.
|
| options/nixos/services.logrotate.settings.<name>.global | Whether this setting is a global option or not: set to have these
settings apply to all files settings with a higher priority.
|
| options/nixos/services.neo4j.ssl.policies.<name>.baseDirectory | The mandatory base directory for cryptographic objects of this
policy
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.ports.*.to | The end of the port range, inclusive.
|
| options/nixos/services.nitter.server.hostname | Hostname of the instance.
|
| options/nixos/services.firewalld.zones.<name>.forwardPorts.*.to-addr | Destination IP address.
|
| options/nixos/services.nominatim.database.dbname | Name of the postgresql database.
|
| options/nixos/services.roundcube.database.dbname | Name of the postgresql database
|
| options/nixos/services.firewalld.zones.<name>.ports.*.protocol | |
| options/nixos/services.gitlab-runner.services.<name>.preGetSourcesScript | Runner-specific command script executed before code is pulled.
|
| options/nixos/services.snapper.configs.<name>.SUBVOLUME | Path of the subvolume or mount point
|
| options/nixos/services.radicle.ci.broker.settings.adapters.<name>.command | Adapter command to run.
|
| options/nixos/services.openafsServer.cellServDB.*.dnsname | DNS full-qualified domain name of a database server
|
| options/nixos/services.openafsClient.cellServDB.*.dnsname | DNS full-qualified domain name of a database server
|
| options/nixos/services.v4l2-relayd.instances.<name>.input.pipeline | The gstreamer-pipeline to use for the input-stream.
|
| options/nixos/services.github-runners.<name>.nodeRuntimes | List of Node.js runtimes the runner should support.
|
| options/darwin/services.github-runners.<name>.nodeRuntimes | List of Node.js runtimes the runner should support.
|
| options/nixos/services.syncthing.settings.folders.<name>.label | The label of the folder.
|
| options/home-manager/services.syncthing.settings.folders.<name>.label | The label of the folder.
|
| options/nixos/virtualisation.fileSystems.<name>.encrypted.enable | The block device is backed by an encrypted one, adds this device as a initrd luks entry.
|
| options/nixos/services.geoclue2.appConfig.<name>.isAllowed | Whether the application will be allowed access to location information.
|
| options/nixos/services.fcgiwrap.instances.<name>.process.user | User as which this instance of fcgiwrap will be run
|
| options/nixos/users.extraUsers.<name>.enable | If set to false, the user account will not be created
|
| options/nixos/services.woodpecker-agents.agents.<name>.path | Additional packages that should be added to the agent's PATH
|
| options/nixos/systemd.automounts.*.name | The name of this systemd unit, including its extension
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert | Section for a certificate candidate to use for
authentication
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.claimMaps | Adds additional claims (and values) based on which kanidm groups an authenticating party belongs to
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.model | Name of the voice model to use
|
| options/nixos/services.ghostunnel.servers.<name>.target | Address to forward connections to (can be HOST:PORT or unix:PATH).
|
| options/nixos/services.ghostunnel.servers.<name>.listen | Address and port to listen on (can be HOST:PORT, unix:PATH).
|
| options/nixos/services.xonotic.settings.hostname | The name that will appear in the server list. $g_xonoticversion
gets replaced with the current version.
|
| options/nixos/services.wstunnel.servers.<name>.restrictTo.*.port | The port.
|
| options/nixos/services.wstunnel.servers.<name>.restrictTo.*.host | The hostname.
|
| options/nixos/services.firewalld.zones.<name>.protocols | Protocols to allow in the zone.
|
| options/nixos/services.zeronsd.servedNetworks.<name>.package | The zeronsd package to use.
|
| options/nixos/services.wstunnel.servers.<name>.loggingLevel | Passed to --log-lvl
Control the log verbosity. i.e: TRACE, DEBUG, INFO, WARN, ERROR, OFF
For more details, checkout [EnvFilter](https://docs.rs/tracing-subscriber/latest/tracing_subscriber/filter/struct
|
| options/nixos/services.wstunnel.clients.<name>.loggingLevel | Passed to --log-lvl
Control the log verbosity. i.e: TRACE, DEBUG, INFO, WARN, ERROR, OFF
For more details, checkout [EnvFilter](https://docs.rs/tracing-subscriber/latest/tracing_subscriber/filter/struct
|
| options/home-manager/services.syncthing.settings.folders.<name>.path | The path to the folder which should be shared
|
| options/nixos/services.vdirsyncer.jobs.<name>.config.storages | vdirsyncer storage configurations
|
| options/darwin/services.buildkite-agents.<name>.hooks.command | The command hook script will replace the default implementation of running
the build command.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.originUrl | The redirect URL of the service
|
| options/home-manager/services.xsuspender.rules.<name>.execSuspend | Before suspending, execute this shell script
|
| options/home-manager/services.restic.backups.<name>.initialize | Create the repository if it does not already exist
|
| options/nixos/services.easytier.instances.<name>.extraSettings | Extra settings to add to easytier-‹name›.toml.
|
| options/nixos/boot.initrd.luks.devices.<name>.gpgCard | The option to use this LUKS device with a GPG encrypted luks password by the GPG Smartcard
|
| options/nixos/services.anubis.instances.<name>.settings | Freeform configuration via environment variables for Anubis
|
| options/nixos/services.authelia.instances.<name>.settings.log.level | Level of verbosity for logs.
|
| options/nixos/services.nebula.networks.<name>.lighthouse.dns.host | IP address on which nebula lighthouse should serve DNS.
'localhost' is a good default to ensure the service does not listen on public interfaces;
use a Nebula address like 10.0.0.5 to make DNS resolution available to nebula hosts only.
|
| options/home-manager/programs.rclone.remotes.<name>.mounts.<name>.mountPoint | A local file path specifying the location of the mount point.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.groups | All groups to provision
|
| options/nixos/services.borgbackup.jobs.<name>.extraCreateArgs | Additional arguments for borg create
|
| options/nixos/services.namecoind.rpc.allowFrom | List of IP address ranges allowed to use the RPC API
|
| options/nixos/services.gitea-actions-runner.instances.<name>.url | Base URL of your Gitea/Forgejo instance.
|
| options/home-manager/services.podman.images.<name>.decryptionKeyFile | Path to key used for decryption of images.
|
| options/home-manager/services.xsuspender.rules.<name>.onlyOnBattery | Whether to enable process suspend only on battery.
|
| options/nixos/virtualisation.fileSystems.<name>.overlay.upperdir | The path to the upperdir
|
| options/home-manager/programs.alot.tags.<name>.normal | How to display the tag when unfocused
|
| options/home-manager/programs.fish.binds.<name>.setsMode | Change current mode after bind is executed
|
| options/nixos/services.fcgiwrap.instances.<name>.process.group | Group as which this instance of fcgiwrap will be run.
|
| options/nixos/services.gitlab-runner.services.<name>.protected | When set to true Runner will only run on pipelines
triggered on protected branches
|
| options/nixos/systemd.timers.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/systemd.paths.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/users.groups.<name>.members | The user names of the group members, added to the
/etc/group file.
|
| options/nixos/systemd.slices.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/services.kubernetes.kubelet.taints.<name>.effect | Effect of taint.
|
| options/nixos/virtualisation.fileSystems.<name>.overlay.lowerdir | The list of path(s) to the lowerdir(s)
|
| options/nixos/services.syncthing.settings.folders.<name>.path | The path to the folder which should be shared
|
| options/nixos/services.buildkite-agents.<name>.tokenPath | The token from your Buildkite "Agents" page
|
| options/darwin/services.buildkite-agents.<name>.tokenPath | The token from your Buildkite "Agents" page
|
| options/nixos/services.wstunnel.clients.<name>.customHeaders | Custom HTTP headers to send during the upgrade request.
|
| options/nixos/services.consul-template.instances.<name>.user | User under which this instance runs.
|
| options/home-manager/services.git-sync.repositories.<name>.path | The path at which to sync the repository
|
| options/nixos/services.kmonad.keyboards.<name>.extraGroups | Extra permission groups to attach to the KMonad instance for
this keyboard
|
| options/nixos/systemd.services.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.paths.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.units.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.user.timers.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.user.slices.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/home-manager/services.xsuspender.rules.<name>.sendSignals | Whether to send SIGSTOP / SIGCONT signals or not
|
| options/nixos/services.nsd.zones.<name>.outgoingInterface | This address will be used for zone-transfer requests if configured
as a secondary server or notifications in case of a primary server
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.ports.*.from | The start of the port range, inclusive.
|
| options/nixos/services.gitlab-runner.services.<name>.dockerDisableCache | Disable all container caching.
|
| options/darwin/services.gitlab-runner.services.<name>.dockerDisableCache | Disable all container caching.
|
| options/nixos/security.pam.services.<name>.allowNullPassword | Whether to allow logging into accounts that have no password
set (i.e., have an empty password field in
/etc/passwd or
/etc/group)
|
| options/nixos/systemd.user.units.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.user.paths.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.user.timers.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/systemd.user.slices.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/services.grafana.provision.alerting.muteTimings.settings.deleteMuteTimes.*.name | Name of the mute time interval, must be unique
|
| options/nixos/services.gitlab-runner.services.<name>.postGetSourcesScript | Runner-specific command script executed after code is pulled.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.id | IKE identity to expect for authentication round
|
| options/nixos/services.bacula-sd.director.<name>.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/nixos/services.bacula-fd.director.<name>.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs12.<name>.file | File name in the pkcs12 folder for which this
passphrase should be used.
|
| options/nixos/services.ghostunnel.servers.<name>.cacert | Path to CA bundle file (PEM/X509)
|
| options/nixos/services.kimai.sites.<name>.environmentFile | Securely pass environment variabels to Kimai
|
| options/nixos/services.netbird.tunnels.<name>.dns-resolver.address | An explicit address that NetBird will serve *.netbird.cloud. (usually) entries on
|
| options/nixos/services.netbird.clients.<name>.dns-resolver.address | An explicit address that NetBird will serve *.netbird.cloud. (usually) entries on
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.gatewayGroups | A list of gateway groups (sites) which can reach the resource and may be used to connect to it.
|
| options/nixos/boot.initrd.luks.devices.<name>.device | Path of the underlying encrypted block device.
|
| options/home-manager/services.activitywatch.watchers.<name>.settingsFilename | The filename of the generated settings file
|
| options/nixos/services.snapper.configs.<name>.TIMELINE_CREATE | Defines whether hourly snapshots should be created.
|
| options/nixos/systemd.user.services.<name>.environment | Environment variables passed to the service's processes.
|
| options/nixos/nix.registry.<name>.exact | Whether the from reference needs to match exactly
|
| options/darwin/nix.registry.<name>.exact | Whether the from reference needs to match exactly
|
| options/home-manager/nix.registry.<name>.exact | Whether the from reference needs to match exactly
|
| options/nixos/services.mpdscribble.endpoints.<name>.username | Username for the scrobble service.
|
| options/home-manager/services.mpdscribble.endpoints.<name>.username | Username for the scrobble service.
|
| options/nixos/services.nebula.networks.<name>.lighthouse.dns.enable | Whether this lighthouse node should serve DNS.
|
| options/nixos/services.frigate.settings.cameras.<name>.ffmpeg.inputs.*.roles | List of roles for this stream
|
| options/nixos/services.nylon.<name>.nrConnections | The number of allowed simultaneous connections to the daemon, default 10.
|
| options/nixos/programs.tsmClient.servers.<name>.nodename | Target node name on the IBM TSM server.
|
| options/nixos/services.jitsi-videobridge.xmppConfigs.<name>.hostName | Hostname of the XMPP server to connect to
|
| options/nixos/virtualisation.fileSystems.<name>.encrypted.keyFile | Path to a keyfile used to unlock the backing encrypted
device
|
| options/nixos/services.wordpress.sites.<name>.languages | List of path(s) to respective language(s) which are copied from the 'languages' directory.
|
| options/darwin/services.buildkite-agents.<name>.hooks.pre-command | The pre-command hook will run just before your build command runs
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.imageFile | Application image to display in the WebUI
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.enable | Whether to enable this radicle-native-ci instance.
|
| options/nixos/services.nntp-proxy.users.<name>.maxConnections | Maximum number of concurrent connections to the proxy for this user
|
| options/home-manager/services.podman.containers.<name>.extraConfig | INI sections and values to populate the Container Quadlet.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.Bonjour | This optional key can be used to request that the service be registered with the
mDNSResponder(8)
|
| options/nixos/services.authelia.instances.<name>.package | The authelia package to use.
|
| options/nixos/services.mosquitto.bridges.<name>.settings | Additional settings for this bridge.
|
| options/nixos/services.syncoid.commands.<name>.localSourceAllow | Permissions granted for the services.syncoid.user user
for local source datasets
|
| options/nixos/systemd.user.units.<name>.aliases | Aliases of that unit.
|
| options/nixos/systemd.user.paths.<name>.aliases | Aliases of that unit.
|
| options/nixos/services.rke2.manifests.<name>.content | Content of the manifest file
|
| options/nixos/virtualisation.interfaces.<name>.assignIP | Automatically assign an IP address to the network interface using the same scheme as
virtualisation.vlans.
|
| options/nixos/services.sanoid.datasets.<name>.recursive | Whether to recursively snapshot dataset children
|
| options/darwin/services.gitlab-runner.services.<name>.maximumTimeout | What is the maximum timeout (in seconds) that will be set for
job when using this Runner. 0 (default) simply means don't limit.
|
| options/nixos/services.hadoop.hdfs.namenode.extraFlags | Extra command line flags to pass to HDFS NameNode
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.name | Name used to derive peer unit name.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert | Section for a certificate candidate to use for
authentication
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.corePlugins.*.name | The plugin.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.present | Whether to ensure that this oauth2 resource server is present or absent.
|
| options/nixos/services.fedimintd.<name>.api_ws.openFirewall | Opens TCP port in firewall for fedimintd's Websocket API
|
| options/nixos/systemd.user.services.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/home-manager/services.xsuspender.rules.<name>.suspendDelay | Initial suspend delay in seconds.
|
| options/home-manager/services.podman.builds.<name>.workingDirectory | WorkingDirectory of the systemd unit file.
|
| options/nixos/services.github-runners.<name>.tokenFile | The full path to a file which contains either
- a fine-grained personal access token (PAT),
- a classic PAT
- or a runner registration token
Changing this option or the tokenFile’s content triggers a new runner registration
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.round | Optional numeric identifier by which authentication rounds are
sorted
|
| options/nixos/services.anubis.instances.<name>.settings.TARGET | The reverse proxy target that Anubis is protecting
|
| options/nixos/services.openafsServer.roles.backup.cellServDB.*.dnsname | DNS full-qualified domain name of a database server
|
| options/nixos/services.jupyterhub.kernels.<name>.extraPaths | Extra paths to link in kernel directory
|
| options/nixos/services.syncoid.commands.<name>.recursive | Whether to enable the transfer of child datasets.
|
| options/home-manager/services.podman.images.<name>.description | The description of the image.
|
| options/home-manager/services.podman.builds.<name>.description | The description of the build.
|
| options/nixos/systemd.user.services.<name>.notSocketActivated | If set, a changed unit is never assumed to be
socket-activated on configuration switch, even if
it might have associated socket units
|
| options/home-manager/services.podman.containers.<name>.network | The network mode or network/s to connect the container to
|
| options/home-manager/services.git-sync.repositories.<name>.uri | The URI of the remote to be synchronized
|
| options/nixos/services.firewalld.services.<name>.ports.*.protocol | |
| options/nixos/services.firewalld.services.<name>.protocols | Protocols for the service.
|
| options/nixos/services.openbao.settings.listener.<name>.address | The TCP address or UNIX socket path to listen on.
|
| options/nixos/services.buildkite-agents.<name>.package | The buildkite-agent package to use.
|
| options/darwin/services.buildkite-agents.<name>.package | Which buildkite-agent derivation to use
|
| options/nixos/systemd.user.targets.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/systemd.user.sockets.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/services.dovecot2.mailboxes.<name>.auto | Whether to automatically create or create and subscribe to the mailbox or not.
|
| options/nixos/services.blockbook-frontend.<name>.sync | Synchronizes until tip, if together with zeromq, keeps index synchronized.
|
| options/nixos/services.grafana.settings.smtp.from_name | Name to be used as client identity for EHLO in SMTP dialog.
|
| options/nixos/services.tor.settings.Nickname | See torrc manual.
|
| options/nixos/services.tarsnap.archives.<name>.cachedir | The cache allows tarsnap to identify previously stored data
blocks, reducing archival time and bandwidth usage
|
| options/nixos/services.nebula.networks.<name>.firewall.outbound | Firewall rules for outbound traffic.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.eap_id | Client EAP-Identity to use in EAP-Identity exchange and the EAP method.
|
| options/nixos/users.users.<name>.subUidRanges.*.count | Count of subordinate user ids
|
| options/nixos/users.users.<name>.subGidRanges.*.count | Count of subordinate group ids
|
| options/darwin/launchd.user.agents.<name>.script | Shell commands executed as the service's main process.
|
| options/nixos/services.i2pd.inTunnels.<name>.destination | Remote endpoint, I2P hostname or b32.i2p address.
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.acl | Control client access to topics on the broker.
|
| options/nixos/systemd.services.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/home-manager/services.podman.builds.<name>.environment | Environment variables to set in the build.
|
| options/nixos/services.borgbackup.repos.<name>.allowSubRepos | Allow clients to create repositories in subdirectories of the
specified path
|
| options/nixos/security.acme.certs.<name>.keyType | Key type to use for private keys
|
| options/nixos/services.headscale.settings.dns.extra_records.*.name | DNS record name.
|
| options/nixos/services.cjdns.UDPInterface.connectTo.<name>.password | Authorized password to the opposite end of the tunnel.
|
| options/nixos/services.cjdns.ETHInterface.connectTo.<name>.password | Authorized password to the opposite end of the tunnel.
|
| options/nixos/virtualisation.allInterfaces.<name>.assignIP | Automatically assign an IP address to the network interface using the same scheme as
virtualisation.vlans.
|
| options/nixos/services.printing.cups-pdf.instances.<name>.settings.Spool | spool directory
|
| options/nixos/services.easytier.instances.<name>.configFile | Path to easytier config file
|
| options/home-manager/services.restic.backups.<name>.repository | Repository to backup to
|
| options/nixos/services.keepalived.vrrpScripts.<name>.weight | Following a failure, adjust the priority by this weight.
|
| options/nixos/services.k3s.autoDeployCharts.<name>.createNamespace | Whether to create the target namespace if not present.
|
| options/nixos/services.k3s.autoDeployCharts.<name>.targetNamespace | The namespace in which the Helm chart gets installed.
|
| options/nixos/services.tor.relay.onionServices.<name>.authorizeClient.clientNames | Only clients that are listed here are authorized to access the hidden service
|
| options/nixos/services.authelia.instances.<name>.settings.log.format | Format the logs are written as.
|
| options/nixos/services.dependency-track.oidc.usernameClaim | Defines the name of the claim that contains the username in the provider's userinfo endpoint
|
| options/nixos/services.sabnzbd.settings.servers.<name>.priority | Priority of this servers
|
| options/nixos/services.sabnzbd.settings.servers.<name>.required | In case of connection failures, wait for the
server to come back online instead of skipping
it.
|
| options/darwin/environment.etc.<name>.target | Name of symlink
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.token.<name>.module | Optional PKCS#11 module name to access the token.
|
| options/nixos/services.postfix.hostname | Hostname to use
|
| options/nixos/services.anubis.instances.<name>.policy.settings | Additional policy settings merged into the policy file
|
| options/nixos/services.restic.backups.<name>.repositoryFile | Path to the file containing the repository location to backup to.
|
| options/nixos/services.tahoe.introducers.<name>.tub.location | The external location that the introducer should listen on
|
| options/nixos/services.consul-template.instances.<name>.group | Group under which this instance runs.
|
| options/nixos/services.tahoe.introducers.<name>.package | The tahoelafs package to use.
|
| options/nixos/security.acme.certs.<name>.postRun | Commands to run after new certificates go live
|
| options/nixos/services.beesd.filesystems.<name>.spec | Description of how to identify the filesystem to be duplicated by this
instance of bees
|
| options/nixos/services.angrr.settings.profile-policies.<name>.enable | Whether to enable this angrr policy.
|
| options/nixos/services.tor.relay.onionServices.<name>.authorizeClient | See torrc manual.
|
| options/nixos/services.sabnzbd.settings.servers.<name>.optional | In case of connection failures, temporarily
disable this server. (See sabnzbd's documentation
for usage guides).
|
| options/darwin/services.buildkite-agents.<name>.hooks.post-command | The post-command hook will run after the bootstrap script has run your
build commands
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockPassive | This optional key specifies whether listen(2) or connect(2) should be called on the created file
descriptor
|
| options/nixos/services.i2pd.outTunnels.<name>.destination | Remote endpoint, I2P hostname or b32.i2p address.
|
| options/nixos/services.angrr.settings.profile-policies.<name>.keep-since | Retention period for the GC roots in this profile.
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.dns | Address or CIDR subnets
StrongSwan default: []
|
| options/nixos/services.frigate.hostname | Hostname of the nginx vhost to configure
|
| options/nixos/systemd.user.sockets.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/systemd.user.targets.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/services.gitlab-runner.services.<name>.maximumTimeout | What is the maximum timeout (in seconds) that will be set for
job when using this Runner. 0 (default) simply means don't limit
|
| options/nixos/services.firezone.server.provision.accounts.<name>.relayGroups | All relay groups to provision
|
| options/nixos/services.blockbook-frontend.<name>.cssDir | Location of the dir with main.css CSS file
|
| options/nixos/services.github-runners.<name>.extraPackages | Extra packages to add to PATH of the service to make them available to workflows.
|
| options/darwin/services.github-runners.<name>.extraPackages | Extra packages to add to PATH of the service to make them available to workflows.
|
| options/nixos/services.easytier.instances.<name>.settings.dhcp | Automatically determine the IPv4 address of this peer based on
existing peers on network.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.certs | List of certificates to accept for authentication
|
| options/home-manager/xdg.desktopEntries.<name>.type | The type of the desktop entry.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.Bonjour | This optional key can be used to request that the service be registered with the
mDNSResponder(8)
|
| options/nixos/services.sanoid.templates.<name>.autoprune | Whether to automatically prune old snapshots.
|
| options/nixos/services.gitlab-runner.services.<name>.debugTraceDisabled | When set to true Runner will disable the possibility of
using the CI_DEBUG_TRACE feature.
|
| options/darwin/services.gitlab-runner.services.<name>.debugTraceDisabled | When set to true Runner will disable the possibility of
using the CI_DEBUG_TRACE feature.
|
| options/nixos/systemd.user.timers.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.user.slices.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/home-manager/launchd.agents.<name>.config.Nice | This optional key specifies what nice(3) value should be applied to the daemon.
|
| options/nixos/systemd.services.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.round | Optional numeric identifier by which authentication rounds are
sorted
|
| options/nixos/services.gitlab-runner.services.<name>.dockerAllowedImages | Whitelist allowed images.
|
| options/darwin/services.gitlab-runner.services.<name>.dockerAllowedImages | Whitelist allowed images.
|
| options/nixos/services.vmalert.instances.<name>.settings | vmalert configuration, passed via command line flags
|
| options/nixos/virtualisation.credentials.<name>.text | Text content of the credential
|
| options/nixos/services.fcgiwrap.instances.<name>.socket.address | Socket address
|
| options/nixos/services.zeronsd.servedNetworks.<name>.settings.token | Path to a file containing the API Token for ZeroTier Central.
|
| options/nixos/services.jitsi-videobridge.xmppConfigs.<name>.mucNickname | Videobridges use the same XMPP account and need to be distinguished by the
nickname (aka resource part of the JID)
|
| options/nixos/services.keepalived.vrrpScripts.<name>.script | (Path of) Script command to execute followed by args, i.e. cmd [args]...
|
| options/nixos/services.easytier.instances.<name>.settings.network_name | EasyTier network name.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels.<name>.patterns | Instead of synchronizing just the mailboxes that
match the farPattern, use it as a prefix which is
not matched against the patterns, and is not affected by mailbox list
overrides.
|
| options/nixos/services.snapper.configs.<name>.TIMELINE_LIMIT_DAILY | Limits for timeline cleanup.
|
| options/nixos/users.extraUsers.<name>.cryptHomeLuks | Path to encrypted luks device that contains
the user's home directory.
|
| options/nixos/services.namecoind.rpc.address | IP address the RPC server will bind to.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.private.<name>.file | File name in the private folder for which this passphrase should be used.
|
| options/nixos/security.acme.certs.<name>.email | Email address for account creation and correspondence from the CA
|
| options/home-manager/services.restic.backups.<name>.repositoryFile | Path to a file containing the repository location to backup to
|
| options/nixos/services.firewalld.zones.<name>.egressPriority | Priority for outbound traffic
|
| options/nixos/services.authelia.instances.<name>.settings.theme | The theme to display.
|
| options/nixos/services.borgbackup.jobs.<name>.inhibitsSleep | Prevents the system from sleeping while backing up.
|
| options/nixos/services.namecoind.enable | Whether to enable namecoind, Namecoin client.
|
| options/home-manager/programs.fish.binds.<name>.silent | Whether to enable Operate silently.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.certs | List of certificate candidates to use for
authentication
|
| options/nixos/systemd.timers.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/systemd.slices.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/systemd.units.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.paths.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/services.borgbackup.jobs.<name>.extraCompactArgs | Additional arguments for borg compact
|
| options/nixos/services.github-runners.<name>.noDefaultLabels | Disables adding the default labels
|
| options/darwin/services.github-runners.<name>.noDefaultLabels | Disables adding the default labels
|
| options/home-manager/xdg.desktopEntries.<name>.exec | Program to execute, possibly with arguments.
|
| options/nixos/services.buildkite-agents.<name>.extraGroups | Groups the user for this buildkite agent should belong to
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels.<name>.farPattern | IMAP4 patterns for which mailboxes on the remote mail server to sync
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockServiceName | This optional key specifies the service on the node to connect(2) or bind(2) to.
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.package | The radicle-native-ci package to use.
|
| options/nixos/services.zeronsd.servedNetworks.<name>.settings | Settings for zeronsd
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| options/nixos/services.librenms.database.username | Name of the user on the MySQL/MariaDB server
|
| options/nixos/services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.help | A human-readable description of this metric.
|
| options/nixos/systemd.units.<name>.aliases | Aliases of that unit.
|
| options/nixos/systemd.paths.<name>.aliases | Aliases of that unit.
|
| options/nixos/services.tailscale.serve.services.<name>.endpoints | Map of incoming traffic patterns to local targets
|
| options/nixos/systemd.user.services.<name>.enableStrictShellChecks | Enable running shellcheck on the generated scripts for this unit
|
| options/nixos/services.neo4j.ssl.policies.<name>.publicCertificate | The name of public X.509 certificate (chain) file in PEM format
for this policy to be found in the baseDirectory,
or the absolute path to the certificate file
|
| options/nixos/services.v4l2-relayd.instances.<name>.input.framerate | The framerate to read from input-stream.
|
| options/nixos/power.ups.users.<name>.instcmds | Let the user initiate specific instant commands
|
| options/nixos/services.buildkite-agents.<name>.extraConfig | Extra lines to be added verbatim to the configuration file.
|
| options/darwin/services.buildkite-agents.<name>.extraConfig | Extra lines to be added verbatim to the configuration file.
|
| options/nixos/services.restic.backups.<name>.backupPrepareCommand | A script that must run before starting the backup process.
|
| options/nixos/services.restic.backups.<name>.backupCleanupCommand | A script that must run after finishing the backup process.
|
| options/home-manager/services.podman.containers.<name>.extraPodmanArgs | Extra arguments to pass to the podman run command.
|
| options/nixos/services.nebula.networks.<name>.isLighthouse | Whether this node is a lighthouse.
|
| options/home-manager/services.podman.containers.<name>.networkAlias | Network aliases for the container.
|
| options/nixos/services.mobilizon.settings.":mobilizon".":instance".name | The fallback instance name if not configured into the admin UI
|
| options/nixos/services.murmur.registerHostname | DNS hostname where your server can be reached
|
| options/nixos/security.wrappers.<name>.program | The name of the wrapper program
|
| options/nixos/services.easytier.instances.<name>.settings.ipv4 | IPv4 cidr address of this peer in the virtual network
|
| options/nixos/services.bacula-sd.director.<name>.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| options/nixos/services.bacula-fd.director.<name>.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.nbns | Address or CIDR subnets
StrongSwan default: []
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.dhcp | Address or CIDR subnets
StrongSwan default: []
|
| options/nixos/services.wstunnel.clients.<name>.settings.http-headers | Custom headers to send in the upgrade request
|
| options/nixos/environment.etc.<name>.target | Name of symlink (relative to
/etc)
|
| options/nixos/services.gitea-actions-runner.instances.<name>.token | Plain token to register at the configured Gitea/Forgejo instance.
|
| options/nixos/services.vdirsyncer.jobs.<name>.forceDiscover | Run yes | vdirsyncer discover prior to vdirsyncer sync
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert | Section for a CA certificate to accept for authentication
|
| options/nixos/services.vault-agent.instances.<name>.settings | Free-form settings written directly to the config.json file
|
| options/nixos/services.grafana.provision.dashboards.settings.providers.*.name | A unique provider name.
|
| options/home-manager/services.muchsync.remotes.<name>.frequency | How often to run muchsync
|
| options/nixos/services.bacula-sd.director.<name>.password | Specifies the password that must be supplied for the default Bacula
Console to be authorized
|
| options/nixos/services.bacula-fd.director.<name>.password | Specifies the password that must be supplied for the default Bacula
Console to be authorized
|
| options/home-manager/programs.irssi.networks.<name>.channels.<name>.autoJoin | Whether to join this channel on connect.
|
| options/nixos/services.inadyn.settings.provider.<name>.password | Password for this DDNS provider
|
| options/nixos/services.btrbk.instances.<name>.snapshotOnly | Whether to run in snapshot only mode
|
| options/nixos/services.kmonad.keyboards.<name>.defcfg.allowCommands | Whether to enable keys to run shell commands.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.protocol | The protocol to allow
|
| options/nixos/power.ups.upsmon.monitor.<name>.system | Identifier of the UPS to monitor, in this form: <upsname>[@<hostname>[:<port>]]
See upsmon.conf for details.
|
| options/home-manager/services.muchsync.remotes.<name>.remote.muchsyncPath | Specifies the path to muchsync on the server
|
| options/nixos/services.jibri.xmppEnvironments.<name>.call.login.domain | The domain part of the JID for the recorder.
|
| options/nixos/systemd.services.<name>.confinement.binSh | The program to make available as /bin/sh inside
the chroot
|
| options/nixos/systemd.user.targets.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/systemd.user.sockets.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/systemd.user.paths.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/services.namecoind.wallet | Wallet file
|
| options/nixos/services.firezone.server.provision.accounts.<name>.policies.<name>.description | The description of this policy
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockNodeName | This optional key specifies the node to connect(2) or bind(2) to.
|
| options/nixos/services.tarsnap.archives.<name>.followSymlinks | Whether to follow all symlinks in archive trees.
|
| options/nixos/users.users.<name>.expires | Set the date on which the user's account will no longer be
accessible
|
| options/nixos/users.extraUsers.<name>.extraGroups | The user's auxiliary groups.
|
| options/nixos/services.blockbook-frontend.<name>.debug | Debug mode, return more verbose errors, reload templates on each request.
|
| options/nixos/services.borgbackup.jobs.<name>.failOnWarnings | Fail the whole backup job if any borg command returns a warning
(exit code 1), for example because a file changed during backup.
|
| options/nixos/services.syncthing.settings.folders.<name>.enable | Whether to share this folder
|
| options/home-manager/services.syncthing.settings.folders.<name>.enable | Whether to share this folder
|
| options/nixos/services.maubot.settings.homeservers.<name>.url | Client-server API URL
|
| options/nixos/users.extraUsers.<name>.createHome | Whether to create the home directory and ensure ownership as well as
permissions to match the user.
|
| options/nixos/services.printing.cups-pdf.instances.<name>.settings.AnonDirName | path for anonymously created PDF files
|
| options/nixos/services.firezone.server.provision.accounts.<name>.policies | All policies to provision
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.eap_id | Identity to use as peer identity during EAP authentication
|
| options/nixos/services.borgbackup.jobs.<name>.patterns | Include/exclude paths matching the given patterns
|
| options/nixos/services.tor.relay.onionServices.<name>.authorizeClient.authType | Either "basic" for a general-purpose authorization protocol
or "stealth" for a less scalable protocol
that also hides service activity from unauthorized clients.
|
| options/home-manager/services.restic.backups.<name>.backupCleanupCommand | A script that must run after finishing the backup process
|
| options/home-manager/services.restic.backups.<name>.backupPrepareCommand | A script that must run before starting the backup process
|
| options/nixos/hardware.alsa.cardAliases.<name>.driver | Name of the kernel module that provides the card.
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.settings.log | File where radicle-native-ci should write the run log.
|
| options/nixos/boot.initrd.luks.devices.<name>.gpgCard.publicKey | Path to the Public Key.
|
| options/nixos/services.easytier.instances.<name>.settings.peers | Peers to connect initially
|
| options/nixos/services.invoiceplane.sites.<name>.cron.enable | Enable cron service which periodically runs Invoiceplane tasks
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.language | The language used to to parse words and sentences.
|
| options/nixos/services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.query | The SQL query to run.
|
| options/nixos/systemd.sockets.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/systemd.targets.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/services.syncoid.commands.<name>.localTargetAllow | Permissions granted for the services.syncoid.user user
for local target datasets
|
| options/nixos/services.wordpress.sites.<name>.database.tablePrefix | The $table_prefix is the value placed in the front of your database tables
|
| options/nixos/virtualisation.credentials.<name>.source | Source file on the host containing the credential data.
|
| options/nixos/services.pgbackrest.repos.<name>.sftp-private-key-file | SFTP private key file
|
| options/nixos/services.snapper.configs.<name>.TIMELINE_CLEANUP | Defines whether the timeline cleanup algorithm should be run for the config.
|
| options/nixos/services.i2pd.outTunnels.<name>.destinationPort | Connect to particular port at destination.
|
| options/darwin/launchd.agents.<name>.script | Shell commands executed as the service's main process.
|
| options/home-manager/xdg.desktopEntries.<name>.icon | Icon to display in file manager, menus, etc.
|
| options/darwin/programs.vim.vimOptions.<name>.text | Text of the file.
|
| options/nixos/systemd.user.paths.<name>.pathConfig | Each attribute in this set specifies an option in the
[Path] section of the unit
|
| options/nixos/systemd.user.paths.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/darwin/services.buildkite-agents.<name>.hooks.pre-artifact | The pre-artifact hook will run just before artifacts are uploaded
|
| options/nixos/virtualisation.oci-containers.containers.<name>.imageFile | Path to an image file to load before running the image
|
| options/nixos/users.users.<name>.packages | The set of packages that should be made available to the user
|
| options/darwin/users.users.<name>.packages | The set of packages that should be made availabe to the user
|
| options/nixos/services.firewalld.zones.<name>.interfaces | Interfaces to bind.
|
| options/home-manager/services.podman.volumes.<name>.description | The description of the volume.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.vmacInterface | Name of the vmac interface to use. keepalived will come up with a name
if you don't specify one.
|
| options/nixos/systemd.slices.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.timers.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/services.grafana.provision.alerting.contactPoints.settings.contactPoints.*.name | Name of the contact point
|
| options/nixos/services.reposilite.database.dbname | Database name.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.dependsOn | Define which other containers this one depends on
|
| options/nixos/services.zeronsd.servedNetworks.<name>.settings.domain | Domain under which ZeroTier records will be available.
|
| options/home-manager/systemd.user.services.<name>.Service.Environment | Environment variables available to executed processes.
|
| options/nixos/services.bacula-sd.autochanger.<name>.devices | |
| options/darwin/services.buildkite-agents.<name>.hooks.checkout | The checkout hook script will replace the default checkout routine of the
bootstrap.sh script
|
| options/nixos/virtualisation.oci-containers.containers.<name>.serviceName | Systemd service name that manages the container
|
| options/nixos/services.fcgiwrap.instances.<name>.process.prefork | Number of processes to prefork.
|
| options/nixos/power.ups.users.<name>.passwordFile | The full path to a file that contains the user's (clear text)
password
|
| options/nixos/services.firewalld.zones.<name>.masquerade | Whether to enable masquerading in the zone.
|
| options/nixos/services.autosuspend.checks.<name>.enabled | Whether to enable this activity check.
|
| options/nixos/services.keepalived.vrrpScripts.<name>.timeout | Seconds after which script is considered to have failed.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.user | Specifies the user to log in as.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.ca_id | Identity in CA certificate to accept for authentication
|
| options/nixos/services.wstunnel.clients.<name>.upgradePathPrefix | Use a specific HTTP path prefix that will show up in the upgrade
request to the wstunnel server
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ppk.<name>.id | PPK identity the PPK belongs to
|
| options/nixos/systemd.user.targets.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.user.sockets.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockPathName | This optional key implies SockFamily is set to "Unix"
|
| options/nixos/systemd.user.paths.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.user.paths.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/power.ups.ups.<name>.shutdownOrder | When you have multiple UPSes on your system, you usually need to
turn them off in a certain order. upsdrvctl shuts down all the
0s, then the 1s, 2s, and so on
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| options/darwin/launchd.daemons.<name>.path | Packages added to the service's PATH
environment variable
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.slot | Which slot on the YubiKey to challenge.
|
| options/nixos/services.tailscale.serve.services.<name>.advertised | Whether the service should accept new connections
|
| options/nixos/services.orangefs.server.fileSystems.<name>.extraStorageHints | Extra config for <StorageHints> section.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.eap.<name>.id | Identity the EAP/XAuth secret belongs to
|
| options/nixos/systemd.targets.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/systemd.sockets.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/services.consul-template.instances.<name>.enable | Whether to enable this consul-template instance.
|
| options/nixos/services.blockbook-frontend.<name>.coinName | See https://github.com/trezor/blockbook/blob/master/bchain/coins/blockchain.go#L61
for current of coins supported in master (Note: may differ from release).
|
| options/nixos/users.users.<name>.isNormalUser | Indicates whether this is an account for a “real” user
|
| options/nixos/systemd.user.timers.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.user.slices.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/services.anubis.instances.<name>.policy.useDefaultBotRules | Whether to include Anubis's default bot detection rules via the
(data)/meta/default-config.yaml import
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ike.<name>.id | IKE identity the IKE preshared secret belongs to
|
| options/home-manager/launchd.agents.<name>.config.Label | This required key uniquely identifies the job to launchd.
|
| options/darwin/services.buildkite-agents.<name>.hooks.pre-checkout | The pre-checkout hook will run just before your projects source code is
checked out from your SCM provider
|
| options/nixos/services.authelia.instances.<name>.secrets | It is recommended you keep your secrets separate from the configuration
|
| options/nixos/services.mailpit.instances.<name>.database | Specify the local database filename to store persistent data
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.xauth_id | Client XAuth username used in the XAuth exchange.
|
| options/nixos/services.v4l2-relayd.instances.<name>.extraPackages | Extra packages to add to GST_PLUGIN_PATH for the instance.
|
| options/nixos/services.postfix.masterConfig.<name>.privileged | |
| options/nixos/services.snapper.configs.<name>.TIMELINE_LIMIT_YEARLY | Limits for timeline cleanup.
|
| options/nixos/services.snapper.configs.<name>.TIMELINE_LIMIT_WEEKLY | Limits for timeline cleanup.
|
| options/nixos/services.mosquitto.bridges.<name>.addresses | Remote endpoints for the bridge.
|
| options/nixos/services.snapper.configs.<name>.TIMELINE_LIMIT_HOURLY | Limits for timeline cleanup.
|
| options/nixos/services.pgbackrest.stanzas.<name>.instances | An attribute set of database instances as described in:
https://pgbackrest.org/configuration.html#section-stanza
Each instance defaults to set pg-host to the attribute's name
|
| options/nixos/services.angrr.settings.profile-policies.<name>.keep-latest-n | Keep the latest N GC roots in this profile.
|
| options/nixos/systemd.user.services.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/home-manager/programs.fish.binds.<name>.enable | Whether to enable enable the bind
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.basicSecretFile | The basic secret to use for this service
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.groups | Authorization group memberships to require
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockProtocol | This optional key specifies the protocol to be passed to socket(2)
|
| options/home-manager/accounts.email.accounts.<name>.realName | Name displayed when sending mails.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.aaa_id | Server side EAP-Identity to expect in the EAP method
|
| options/nixos/security.pam.services.<name>.setEnvironment | Whether the service should set the environment variables
listed in environment.sessionVariables
using pam_env.so.
|
| options/nixos/systemd.timers.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.slices.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/home-manager/launchd.agents.<name>.config | Define a launchd job
|
| options/nixos/users.users.<name>.isSystemUser | Indicates if the user is a system user or not
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.Bonjour | This optional key can be used to request that the service be registered with the
mDNSResponder(8)
|
| options/nixos/services.coder.database.username | Username for accessing the database.
|
| options/nixos/systemd.user.slices.<name>.aliases | Aliases of that unit.
|
| options/nixos/systemd.user.timers.<name>.aliases | Aliases of that unit.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockNodeName | This optional key specifies the node to connect(2) or bind(2) to.
|
| options/nixos/services.h2o.hosts.<name>.tls.identity.*.certificate-file | Path to certificate file
|
| options/nixos/services.mautrix-meta.instances.<name>.serviceUnit | The systemd unit (a service or a target) for other services to depend on if they
need to be started after matrix-synapse
|
| options/nixos/services.firewalld.zones.<name>.sources.*.address | An IP address or a network IP address with a mask for IPv4 or IPv6
|
| options/darwin/services.buildkite-agents.<name>.hooks.post-artifact | The post-artifact hook will run just after artifacts are uploaded
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockPathMode | This optional key specifies the mode of the socket
|
| options/nixos/services.woodpecker-agents.agents.<name>.enable | Whether to enable this Woodpecker-Agent
|
| options/nixos/services.invoiceplane.sites.<name>.enable | Whether to enable InvoicePlane web application.
|
| options/nixos/services.armagetronad.servers.<name>.dns | DNS address to use for this server
|
| options/nixos/services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.labels | A set of columns that will be used as Prometheus labels.
|
| options/nixos/services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.values | A set of columns that will be used as values of this metric.
|
| options/nixos/services.authelia.instances.<name>.secrets.manual | Configuring authelia's secret files via the secrets attribute set
is intended to be convenient and help catch cases where values are required
to run at all
|
| options/home-manager/services.kanshi.profiles.<name>.outputs.*.position | <x>,<y>
Places the output at the specified position in the global coordinates
space.
|
| options/nixos/services.invoiceplane.sites.<name>.stateDir | This directory is used for uploads of attachments and cache
|
| options/nixos/services.borgbackup.jobs.<name>.encryption.mode | Encryption mode to use
|
| options/nixos/security.acme.certs.<name>.validMinDays | Minimum remaining validity before renewal in days.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.setEnv | Environment variables and their value to send to the server.
|
| options/nixos/hardware.alsa.controls.<name>.device | Name of the PCM device to control (slave).
|
| options/nixos/services.gitea-actions-runner.instances.<name>.enable | Whether to enable Gitea Actions Runner instance.
|
| options/nixos/services.snapserver.streams.<name>.sampleFormat | Default sample format.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacerts | List of CA certificates to accept for
authentication
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ntlm.<name>.id | Identity the NTLM secret belongs to
|
| options/nixos/services.authelia.instances.<name>.secrets.jwtSecretFile | Path to your JWT secret used during identity verificaton.
|
| options/nixos/services.wordpress.sites.<name>.database.passwordFile | A file containing the password corresponding to
database.user.
|
| options/darwin/users.users.<name>.description | A short description of the user account, typically the
user's full name
|
| options/nixos/services.postfix.settings.master.<name>.privileged | |
| options/nixos/services.blockbook-frontend.<name>.enable | Whether to enable blockbook-frontend application.
|
| options/nixos/systemd.services.<name>.environment | Environment variables passed to the service's processes.
|
| options/nixos/hardware.alsa.cardAliases.<name>.id | The ID of the sound card
|
| options/nixos/users.extraUsers.<name>.subUidRanges | Subordinate user ids that user is allowed to use
|
| options/nixos/users.extraUsers.<name>.subGidRanges | Subordinate group ids that user is allowed to use
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.settings.state | Directory where per-run directories are stored.
|
| options/nixos/users.users.<name>.linger | Whether to enable or disable lingering for this user
|
| options/nixos/services.firewalld.zones.<name>.ingressPriority | Priority for inbound traffic
|
| options/nixos/services.grafana.provision.alerting.templates.settings.templates.*.name | Name of the template, must be unique
|
| options/nixos/services.woodpecker-agents.agents.<name>.package | The woodpecker-agent package to use.
|
| options/nixos/services.hadoop.hdfs.namenode.formatOnInit | Format HDFS namenode on first start
|
| options/nixos/services.namecoind.extraNodes | List of additional peer IP addresses to connect to.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.pubkeys | List of raw public keys to accept for
authentication
|
| options/nixos/users.users.<name>.useDefaultShell | If true, the user's shell will be set to
users.defaultUserShell.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.podman.user | The user under which the container should run.
|
| options/nixos/services.blockbook-frontend.<name>.public | Public http server binding [address]:port.
|
| options/nixos/services.logrotate.settings.<name>.priority | Order of this logrotate block in relation to the others
|
| options/darwin/services.buildkite-agents.<name>.hooks.post-checkout | The post-checkout hook will run after the bootstrap script has checked out
your projects source code.
|
| options/nixos/boot.loader.grub.users.<name>.password | Specifies the clear text password for the account
|
| options/nixos/systemd.user.paths.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.user.units.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/virtualisation.oci-containers.containers.<name>.cmd | Commandline arguments to pass to the image's entrypoint.
|
| options/nixos/services.librenms.hostname | The hostname to serve LibreNMS on.
|
| options/nixos/systemd.user.sockets.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/systemd.user.targets.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/services.sanoid.datasets.<name>.processChildrenOnly | Whether to only snapshot child datasets if recursing.
|
| options/nixos/services.spiped.config.<name>.disableKeepalives | Disable transport layer keep-alives.
|
| options/nixos/services.firewalld.zones.<name>.sourcePorts.*.protocol | |
| options/home-manager/programs.ssh.matchBlocks.<name>.port | Specifies port number to connect on remote host.
|
| options/nixos/services.wordpress.sites.<name>.database.createLocally | Create the database and database user locally.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.scale.x | Horizontal scaling factor/pixels.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.scale.y | Vertical scaling factor/pixels.
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.settings | Configuration of radicle-native-ci
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockFamily | This optional key can be used to specifically request that "IPv4" or "IPv6" socket(s) be created.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.pubkeys | List of raw public key candidates to use for
authentication
|
| options/nixos/power.ups.upsmon.monitor.<name>.powerValue | Number of power supplies that the UPS feeds on this system
|
| options/nixos/systemd.services.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/services.keepalived.vrrpScripts.<name>.extraConfig | Extra lines to be added verbatim to the vrrp_script section.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.updown | Updown script to invoke on CHILD_SA up and down events.
|
| options/nixos/users.users.<name>.subUidRanges.*.startUid | Start of the range of subordinate user ids that user is
allowed to use.
|
| options/nixos/users.users.<name>.subGidRanges.*.startGid | Start of the range of subordinate group ids that user is
allowed to use.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.auth | Authentication to perform locally.
- The default
pubkey uses public key authentication
using a private key associated to a usable certificate.
psk uses pre-shared key authentication.
- The IKEv1 specific
xauth is used for XAuth or Hybrid
authentication,
- while the IKEv2 specific
eap keyword defines EAP
authentication.
- For
xauth, a specific backend name may be appended,
separated by a dash
|
| options/home-manager/programs.hexchat.channels.<name>.realName | Real name
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.dpi | Output DPI configuration.
|
| options/nixos/services.firezone.server.smtp.username | Username to authenticate against the SMTP relay
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saeAddToMacAllow | If set, all sae password entries that have a non-wildcard MAC associated to
them will additionally be used to populate the MAC allow list
|
| options/nixos/systemd.services.<name>.confinement.enable | If set, all the required runtime store paths for this service are
bind-mounted into a tmpfs-based
chroot(2).
|
| options/nixos/services.firezone.server.provision.accounts.<name>.gatewayGroups | All gateway groups (sites) to provision
|
| options/nixos/services.mautrix-meta.instances.<name>.settings | config.yaml configuration as a Nix attribute set
|
| options/nixos/services.anubis.instances.<name>.settings.BIND_NETWORK | The network family that Anubis should bind to
|
| options/nixos/services.armagetronad.servers.<name>.host | Host to listen on
|
| options/nixos/services.armagetronad.servers.<name>.port | Port to listen on
|
| options/nixos/services.keepalived.vrrpInstances.<name>.useVmac | Use VRRP Virtual MAC.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockPathName | This optional key implies SockFamily is set to "Unix"
|
| options/nixos/systemd.targets.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/systemd.sockets.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/systemd.paths.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/services.neo4j.ssl.policies.<name>.allowKeyGeneration | Allows the generation of a private key and associated self-signed
certificate
|
| options/nixos/services.bitcoind.<name>.extraCmdlineOptions | Extra command line options to pass to bitcoind
|
| options/darwin/launchd.user.agents.<name>.command | Command executed as the service's main process.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.interface | Optional interface name to restrict outbound IPsec policies.
|
| options/nixos/systemd.services.<name>.notSocketActivated | If set, a changed unit is never assumed to be
socket-activated on configuration switch, even if
it might have associated socket units
|
| options/nixos/services.wstunnel.servers.<name>.settings.restrict-to.*.port | The port.
|
| options/nixos/services.xserver.xkb.extraLayouts.<name>.description | A short description of the layout.
|
| options/nixos/services.wstunnel.servers.<name>.settings.restrict-to.*.host | The hostname.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources | All resources to provision
|
| options/home-manager/xdg.desktopEntries.<name>.genericName | Generic name of the application.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.reqid | Fixed reqid to use for this CHILD_SA
|
| options/nixos/services.firewalld.services.<name>.destination.ipv4 | IPv4 destination.
|
| options/nixos/services.firewalld.services.<name>.destination.ipv6 | IPv6 destination.
|
| options/nixos/services.borgbackup.jobs.<name>.createCommand | Borg command to use for archive creation
|
| options/nixos/services.tlsrpt.reportd.settings.dbname | Path to the sqlite database.
|
| options/nixos/services.printing.cups-pdf.instances.<name>.settings | Settings for a cups-pdf instance, see the descriptions in the template config file in the cups-pdf package
|
| options/nixos/services.namecoind.rpc.password | Password for RPC connections.
|
| options/nixos/services.hostapd.radios.<name>.dynamicConfigScripts | All of these scripts will be executed in lexicographical order before hostapd
is started, right after the global segment was generated and may dynamically
append global options the generated configuration file
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.id | A unique identifier for this authentication token
|
| options/nixos/services.vault-agent.instances.<name>.settings.pid_file | Path to use for the pid file.
|
| options/nixos/services.znapzend.zetup.<name>.timestampFormat | The timestamp format to use for constructing snapshot names
|
| options/home-manager/services.kanshi.profiles.<name>.outputs.*.adaptiveSync | Enables or disables adaptive synchronization
(aka
|
| options/nixos/services.woodpecker-agents.agents.<name>.extraGroups | Additional groups for the systemd service.
|
| options/nixos/services.authelia.instances.<name>.settings | Your Authelia config.yml as a Nix attribute set
|
| options/nixos/virtualisation.oci-containers.containers.<name>.user | Override the username or UID (and optionally groupname or GID) used
in the container.
|
| options/darwin/services.buildkite-agents.<name>.preCommands | Extra commands to run before starting buildkite.
|
| options/nixos/services.mpd.settings | Configuration for MPD
|
| options/nixos/services.gitea-actions-runner.instances.<name>.tokenFile | Path to an environment file, containing the TOKEN environment
variable, that holds a token to register at the configured
Gitea/Forgejo instance.
|
| options/nixos/services.autorandr.profiles.<name>.hooks.preswitch | Preswitch hook executed before mode switch.
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.server | Address or CIDR subnets
StrongSwan default: []
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.subnet | Address or CIDR subnets
StrongSwan default: []
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.p_cscf | Address or CIDR subnets
StrongSwan default: []
|
| options/home-manager/launchd.agents.<name>.config.Debug | This optional key specifies that launchd should adjust its log mask temporarily to LOG_DEBUG while
dealing with this job.
|
| options/nixos/services.firewalld.services.<name>.sourcePorts.*.protocol | |
| options/nixos/services.wstunnel.servers.<name>.settings.restrict-to | Restrictions on the connections that the server will accept
|
| options/nixos/services.mpdscribble.endpoints.<name>.url | The url endpoint where the scrobble API is listening.
|
| options/home-manager/services.podman.machines.<name>.watchdogInterval | Interval in seconds to check if the machine is running
|
| options/home-manager/services.mpdscribble.endpoints.<name>.url | The url endpoint where the scrobble API is listening.
|
| options/nixos/services.jibri.xmppEnvironments.<name>.control.muc.domain | The domain part of the MUC to connect to for control.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.token.<name>.slot | Optional slot number to access the token.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.mode | Output resolution.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.rate | Output framerate.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockPathMode | This optional key specifies the mode of the socket
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.extraFiles.<name>.text | Text of the file.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.hotkeys.<name>.*.key | The hotkey.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.pull | Image pull policy for the container
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.xauth.<name>.id | Identity the EAP/XAuth secret belongs to
|
| options/nixos/systemd.paths.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/systemd.paths.<name>.pathConfig | Each attribute in this set specifies an option in the
[Path] section of the unit
|
| options/nixos/power.ups.ups.<name>.directives | List of configuration directives for this UPS.
|
| options/nixos/services.syncthing.settings.folders.<name>.devices | The devices this folder should be shared with
|
| options/home-manager/services.syncthing.settings.folders.<name>.devices | The devices this folder should be shared with
|
| options/nixos/services.tarsnap.archives.<name>.verylowmem | Reduce memory consumption by a factor of 2 beyond what
lowmem does, at the cost of significantly
slowing down the archiving process.
|
| options/nixos/services.networkd-dispatcher.rules.<name>.script | Shell commands executed on specified operational states.
|
| options/nixos/services.datadog-agent.hostname | The hostname to show in the Datadog dashboard (optional)
|
| options/nixos/services.printing.cups-pdf.instances.<name>.settings.GhostScript | location of GhostScript binary
|
| options/nixos/services.autorandr.profiles.<name>.hooks.predetect | Predetect hook executed before autorandr attempts to run xrandr.
|
| options/nixos/services.networkd-dispatcher.rules.<name>.onState | List of names of the systemd-networkd operational states which
should trigger the script
|
| options/nixos/boot.initrd.luks.devices.<name>.keyFileSize | The size of the key file
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.token.<name>.pin | Optional PIN required to access the key on the token
|
| options/home-manager/launchd.agents.<name>.config.RunAtLoad | This optional key is used to control whether your job is launched once at the time the job is loaded
|
| options/nixos/image.repart.partitions.<name>.contents.<name>.source | Path of the source file.
|
| options/nixos/services.beesd.filesystems.<name>.extraOptions | Extra command-line options passed to the daemon
|
| options/nixos/hardware.sane.brscan4.netDevices.<name>.nodename | The node name of the device
|
| options/nixos/hardware.sane.brscan5.netDevices.<name>.nodename | The node name of the device
|
| options/nixos/services.consul-template.instances.<name>.package | The consul-template package to use.
|
| options/nixos/services.autosuspend.wakeups.<name>.enabled | Whether to enable this wake-up check.
|
| options/nixos/services.vault-agent.instances.<name>.settings.template | Template section of vault-agent
|
| options/home-manager/programs.rclone.remotes.<name>.mounts.<name>.options | An attribute set of option values passed to rclone mount
|
| options/nixos/services.invoiceplane.sites.<name>.database.user | Database user.
|
| options/home-manager/accounts.email.accounts.<name>.userName | The server username of this account
|
| options/nixos/services.blockbook-frontend.<name>.rpc.password | RPC password for JSON-RPC connections
|
| options/nixos/virtualisation.oci-containers.containers.<name>.image | OCI image to run.
|
| options/nixos/systemd.paths.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.paths.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/services.fedimintd.<name>.api_iroh.openFirewall | Opens UDP port in firewall for fedimintd's API Iroh endpoint
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.originLanding | When redirecting from the Kanidm Apps Listing page, some linked applications may need to land on a specific page to trigger oauth2/oidc interactions.
|
| options/home-manager/services.kanshi.profiles.<name>.outputs.*.transform | Sets the output transform.
|
| options/home-manager/services.podman.networks.<name>.description | The description of the network.
|
| options/nixos/users.extraUsers.<name>.autoSubUidGidRange | Automatically allocate subordinate user and group ids for this user
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.crtc | Output video display controller.
|
| options/nixos/services.invoiceplane.sites.<name>.database.host | Database host address.
|
| options/nixos/services.invoiceplane.sites.<name>.database.port | Database host port.
|
| options/nixos/services.ghostunnel.servers.<name>.unsafeTarget | If set, does not limit target to localhost, 127.0.0.1, [::1], or UNIX sockets
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.ipcomp | Enable IPComp compression before encryption
|
| options/nixos/services.firewalld.zones.<name>.icmpBlockInversion | Whether to invert the icmp block handling
|
| options/home-manager/programs.fish.binds.<name>.command | command that will be execute
|
| options/nixos/services.cloudflared.tunnels.<name>.default | Catch-all service if no ingress matches
|
| options/nixos/services.cloudflared.tunnels.<name>.ingress | Ingress rules
|
| options/nixos/services.mosquitto.bridges.<name>.addresses.*.port | Port of the remote MQTT broker.
|
| options/nixos/services.keepalived.vrrpScripts.<name>.interval | Seconds between script invocations.
|
| options/nixos/services.snapper.configs.<name>.TIMELINE_LIMIT_MONTHLY | Limits for timeline cleanup.
|
| options/nixos/systemd.user.slices.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/systemd.user.targets.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.user.sockets.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.user.timers.<name>.upholds | Keeps the specified running while this unit is running
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockFamily | This optional key can be used to specifically request that "IPv4" or "IPv6" socket(s) be created.
|
| options/nixos/services.gitlab-runner.services.<name>.dockerPrivileged | Give extended privileges to container.
|
| options/darwin/services.gitlab-runner.services.<name>.dockerPrivileged | Give extended privileges to container.
|
| options/nixos/systemd.slices.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.timers.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.timers.<name>.aliases | Aliases of that unit.
|
| options/nixos/systemd.slices.<name>.aliases | Aliases of that unit.
|
| options/nixos/services.factorio.username | Your factorio.com login credentials
|
| options/nixos/services.prometheus.exporters.nginxlog.user | User name under which the nginxlog exporter shall be run.
|
| options/nixos/services.netbird.tunnels.<name>.environment | Environment for the netbird service, used to pass configuration options.
|
| options/nixos/services.netbird.clients.<name>.environment | Environment for the netbird service, used to pass configuration options.
|
| options/nixos/services.blockbook-frontend.<name>.configFile | Location of the blockbook configuration file.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.rsa.<name>.secret | Value of decryption passphrase for RSA key.
|
| options/home-manager/launchd.agents.<name>.config.UserName | This optional key specifies the user to run the job as
|
| options/home-manager/programs.ssh.matchBlocks.<name>.sendEnv | Environment variables to send from the local host to the
server.
|
| options/nixos/services.actual.settings.hostname | The address to listen on
|
| options/nixos/services.plausible.database.postgres.dbname | Name of the database to use.
|
| options/nixos/services.restic.backups.<name>.environmentFile | file containing the credentials to access the repository, in the
format of an EnvironmentFile as described by systemd.exec(5)
|
| options/home-manager/services.activitywatch.watchers.<name>.executable | The name of the executable of the watcher
|
| options/nixos/services.patroni.namespace | Path within the configuration store where Patroni will keep information about the cluster.
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_app | Type of this worker
|
| options/nixos/programs.dms-shell.plugins.<name>.src | Source of the plugin package or path
|
| options/nixos/services.gitlab-runner.services.<name>.dockerAllowedServices | Whitelist allowed services.
|
| options/darwin/services.gitlab-runner.services.<name>.dockerAllowedServices | Whitelist allowed services.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockNodeName | This optional key specifies the node to connect(2) or bind(2) to.
|
| options/nixos/services.ax25.axports.<name>.description | Free format description of this interface.
|
| options/home-manager/launchd.agents.<name>.config.TimeOut | The recommended idle time out (in seconds) to pass to the job
|
| options/nixos/services.roundcube.database.username | Username for the postgresql connection
|
| options/darwin/programs.tmux.tmuxOptions.<name>.text | Text of the file.
|
| options/nixos/services.easytier.instances.<name>.configServer | Configure the instance from config server
|
| options/nixos/services.ghostunnel.servers.<name>.keystore | Path to keystore (combined PEM with cert/key, or PKCS12 keystore)
|
| options/nixos/services.prometheus.exporters.imap-mailstat.accounts.<name>.username | If empty string mailaddress value is used
|
| options/home-manager/xdg.desktopEntries.<name>.mimeType | The MIME type(s) supported by this application.
|
| options/nixos/services.blockbook-frontend.<name>.package | The blockbook package to use.
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey | The options to use for this LUKS device in YubiKey-PBA
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SecureSocketWithKey | This optional key is a variant of SockPathName
|
| options/nixos/systemd.user.timers.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/systemd.user.slices.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/virtualisation.sharedDirectories.<name>.target | The mount point of the directory inside the virtual machine
|
| options/nixos/virtualisation.sharedDirectories.<name>.source | The path of the directory to share, can be a shell variable
|
| options/nixos/services.kanidm.provision.persons.<name>.mailAddresses | Mail addresses
|
| options/nixos/services.dovecot2.mailPlugins.perProtocol.<name>.enable | mail plugins to enable as a list of strings to append to the corresponding per-protocol $mail_plugins configuration variable
|
| options/nixos/services.authelia.instances.<name>.settings.server.address | The address to listen on.
|
| options/nixos/services.public-inbox.inboxes.<name>.description | User-visible description for the repository.
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites.<name>.url | Start URL of the site.
|
| options/home-manager/programs.fish.binds.<name>.operate | Operate on preset bindings or user bindings
|
| options/home-manager/programs.fish.binds.<name>.repaint | Whether to enable redraw prompt after command.
|
| options/home-manager/home.username | The user's username.
|
| options/home-manager/programs.borgmatic.backups.<name>.consistency.checks.*.name | Name of consistency check to run.
|
| options/nixos/services.buildkite-agents.<name>.privateSshKeyPath | OpenSSH private key
A run-time path to the key file, which is supposed to be provisioned
outside of Nix store.
|
| options/darwin/services.buildkite-agents.<name>.privateSshKeyPath | OpenSSH private key
A run-time path to the key file, which is supposed to be provisioned
outside of Nix store.
|
| options/nixos/systemd.services.<name>.confinement.fullUnit | Whether to include the full closure of the systemd unit file into the
chroot, instead of just the dependencies for the executables.
While it may be tempting to just enable this option to
make things work quickly, please be aware that this might add paths
to the closure of the chroot that you didn't anticipate
|
| options/nixos/services.invoiceplane.sites.<name>.poolConfig | Options for the InvoicePlane PHP pool
|
| options/nixos/services.jitsi-videobridge.xmppConfigs.<name>.mucJids | JID of the MUC to join
|
| options/nixos/services.firewalld.zones.<name>.forwardPorts.*.protocol | |
| options/nixos/users.extraGroups.<name>.members | The user names of the group members, added to the
/etc/group file.
|
| options/nixos/systemd.services.<name>.enableStrictShellChecks | Enable running shellcheck on the generated scripts for this unit
|
| options/nixos/services.authelia.instances.<name>.secrets.oidcHmacSecretFile | Path to your HMAC secret used to sign OIDC JWTs.
|
| options/nixos/systemd.targets.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.sockets.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/boot.initrd.luks.devices.<name>.gpgCard.gracePeriod | Time in seconds to wait for the GPG Smartcard.
|
| options/nixos/systemd.user.slices.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.user.timers.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/systemd.user.timers.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.user.slices.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.pools | List of named IP pools to allocate virtual IP addresses
and other configuration attributes from
|
| options/nixos/services.gitea-actions-runner.instances.<name>.labels | Labels used to map jobs to their runtime environment
|
| options/nixos/services.jitsi-videobridge.xmppConfigs.<name>.userName | User part of the JID.
|
| options/home-manager/systemd.user.services.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/nixos/services.warpgate.settings.sso_providers.*.name | Internal identifier of SSO provider.
|
| options/nixos/services.autorandr.profiles.<name>.fingerprint | Output name to EDID mapping
|
| options/nixos/systemd.sockets.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/systemd.targets.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.labels | Labels to attach to the container at runtime.
|
| options/nixos/services.blockbook-frontend.<name>.rpc.passwordFile | File containing password of the RPC user
|
| options/nixos/services.netbird.tunnels.<name>.openInternalFirewall | Opens up internal firewall ports for the NetBird's network interface.
|
| options/nixos/services.netbird.clients.<name>.openInternalFirewall | Opens up internal firewall ports for the NetBird's network interface.
|
| options/nixos/services.hadoop.hdfs.namenode.openFirewall | Open firewall ports for HDFS NameNode.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.gamma | Output gamma configuration.
|
| options/nixos/services.beesd.filesystems.<name>.hashTableSizeMB | Hash table size in MB; must be a multiple of 16
|
| options/home-manager/programs.smug.projects.<name>.env | Environment Variables to set in session.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockPathName | This optional key implies SockFamily is set to "Unix"
|
| options/nixos/services.firewalld.zones.<name>.description | Description for the zone.
|
| options/nixos/services.grafana.provision.alerting.templates.settings.deleteTemplates.*.name | Name of the template, must be unique
|
| options/home-manager/services.restic.backups.<name>.environmentFile | A file containing the credentials to access the repository, in the
format of an EnvironmentFile as described by systemd.exec(5)
|
| options/nixos/services.peertube-runner.instancesToRegister.<name>.runnerName | Runner name declared to the PeerTube instance.
|
| options/nixos/services.pgadmin.emailServer.username | SMTP server username for email delivery
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.tokenFile | The token value
|
| options/nixos/services.jibri.xmppEnvironments.<name>.control.login.domain | The domain part of the JID for this Jibri instance.
|
| options/nixos/services.pgbackrest.stanzas.<name>.settings | An attribute set of options as described in:
https://pgbackrest.org/configuration.html
All options can be used
|
| options/nixos/services.borgbackup.jobs.<name>.removableDevice | Whether the repo (which must be local) is a removable device.
|
| options/nixos/services.influxdb2.provision.users.<name>.present | Whether to ensure that this user is present or absent.
|
| options/home-manager/services.xsuspender.rules.<name>.matchWmClassContains | Match windows that wm class contains string.
|
| options/nixos/security.acme.certs.<name>.profile | The certificate profile to choose if the CA offers multiple profiles.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.state | Initial state
|
| options/nixos/services.jibri.xmppEnvironments.<name>.xmppDomain | The base XMPP domain.
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.netmask | Address or CIDR subnets
StrongSwan default: []
|
| options/nixos/systemd.units.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.paths.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/networking.sits.<name>.dev | The underlying network device on which the tunnel resides.
|
| options/darwin/launchd.agents.<name>.command | Command executed as the service's main process.
|
| options/nixos/services.dependency-track.settings."alpine.oidc.username.claim" | Defines the name of the claim that contains the username in the provider's userinfo endpoint
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.allAccess | Grants all permissions in the associated organization.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.enableLegacyCrypto | Enable legacy crypto on this client
|
| options/nixos/services.logrotate.settings.<name>.frequency | How often to rotate the logs
|
| options/home-manager/programs.superfile.pinnedFolders.*.name | Name that will be shown.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.podman | Podman-specific settings in OCI containers
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.initialPrompt | Optional text to provide as a prompt for the first window
|
| options/nixos/security.acme.certs.<name>.server | ACME Directory Resource URI
|
| options/nixos/services.suricata.settings.app-layer.protocols.<name>.enabled | The option "enabled" takes 3 values - "yes", "no", "detection-only".
"yes" enables both detection and the parser, "no" disables both, and
"detection-only" enables protocol detection only (parser disabled).
|
| options/nixos/services.icecream.daemon.hostname | Hostname of the daemon in the icecream infrastructure
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockPassive | This optional key specifies whether listen(2) or connect(2) should be called on the created file
descriptor
|
| options/nixos/services.parsedmarc.provision.localMail.hostname | The hostname to use when configuring Postfix
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.copy_df | Whether to copy the DF bit to the outer IPv4 header in tunnel mode
|
| options/nixos/services.printing.cups-pdf.instances.<name>.settings.Anonuser | User for anonymous PDF creation
|
| options/nixos/services.hostapd.radios.<name>.wifi6.multiUserBeamformer | HE multi user beamformee support
|
| options/nixos/services.beesd.filesystems.<name>.verbosity | Log verbosity (syslog keyword/level).
|
| options/nixos/services.tarsnap.archives.<name>.explicitSymlinks | Whether to follow symlinks specified as archives.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.eap.<name>.secret | Value of the EAP/XAuth secret
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ike.<name>.secret | Value of the IKE preshared secret
|
| options/nixos/virtualisation.oci-containers.containers.<name>.autoStart | When enabled, the container is automatically started on boot
|
| options/nixos/services.public-inbox.inboxes.<name>.watchheader | If specified, public-inbox-watch(1) will only process
mail containing a matching header.
|
| options/nixos/services.firewalld.services.<name>.destination | Destinations for the service.
|
| options/nixos/services.firewalld.services.<name>.description | Description for the service.
|
| options/home-manager/launchd.agents.<name>.config.Umask | This optional key specifies what value should be passed to umask(2) before running the job
|
| options/nixos/services.hostapd.radios.<name>.wifi7.multiUserBeamformer | EHT multi user beamformee support
|
| options/nixos/services.armagetronad.servers.<name>.enable | Whether to enable armagetronad.
|
| options/nixos/boot.initrd.systemd.contents.<name>.text | Text of the file.
|
| options/home-manager/accounts.email.accounts.<name>.gpg.key | The key to use as listed in gpg --list-keys.
|
| options/nixos/services.vmalert.instances.<name>.settings."notifier.url" | Prometheus Alertmanager URL
|
| options/nixos/networking.sits.<name>.ttl | The time-to-live of the connection to the remote tunnel endpoint.
|
| options/nixos/users.extraUsers.<name>.subGidRanges.*.count | Count of subordinate group ids
|
| options/nixos/users.extraUsers.<name>.subUidRanges.*.count | Count of subordinate user ids
|
| options/darwin/launchd.daemons.<name>.script | Shell commands executed as the service's main process.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockPathMode | This optional key specifies the mode of the socket
|
| options/nixos/systemd.user.sockets.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.user.targets.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/services.nebula.networks.<name>.lighthouses | List of IPs of lighthouse hosts this node should report to and query from
|
| options/nixos/services.bcg.automaticRenameNodes | Automatically rename all nodes.
|
| options/nixos/services.zeronsd.servedNetworks.<name>.settings.wildcard | Whether to serve a wildcard record for ZeroTier Nodes.
|
| options/nixos/systemd.user.slices.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.user.timers.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/networking.vlans.<name>.id | The vlan identifier
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mode | IPsec Mode to establish CHILD_SA with.
tunnel negotiates the CHILD_SA in IPsec Tunnel Mode,
- whereas
transport uses IPsec Transport Mode.
transport_proxy signifying the special Mobile IPv6
Transport Proxy Mode.
beet is the Bound End to End Tunnel mixture mode,
working with fixed inner addresses without the need to include them in
each packet.
- Both
transport and beet modes are
subject to mode negotiation; tunnel mode is
negotiated if the preferred mode is not available.
pass and drop are used to install
shunt policies which explicitly bypass the defined traffic from IPsec
processing or drop it, respectively
|
| options/nixos/services.hqplayerd.auth.username | Username used for HQPlayer's WebUI
|
| options/nixos/services.kmonad.keyboards.<name>.enableHardening | Whether to enable systemd hardening.
If KMonad is used to execute shell commands, hardening may make some of them fail.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ecdsa.<name>.secret | Value of decryption passphrase for ECDSA key.
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters.*.name | Name for the filter.
|
| options/nixos/systemd.user.sockets.<name>.aliases | Aliases of that unit.
|
| options/nixos/systemd.user.targets.<name>.aliases | Aliases of that unit.
|
| options/home-manager/services.muchsync.remotes.<name>.local.checkForModifiedFiles | Check for locally modified files
|
| options/home-manager/accounts.email.accounts.<name>.imap.tls | Configuration for secure connections.
|
| options/home-manager/accounts.email.accounts.<name>.smtp.tls | Configuration for secure connections.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.login.registry | Registry where to login to.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs8.<name>.secret | Value of decryption passphrase for PKCS#8 key.
|
| options/nixos/services.netbird.clients | Attribute set of NetBird client daemons, by default each one will:
- be manageable using dedicated tooling:
netbird-<name> script,
NetBird - netbird-<name> graphical interface when appropriate (see ui.enable),
- run as a
netbird-<name>.service,
- listen for incoming remote connections on the port
51820 (openFirewall by default),
- manage the
netbird-<name> wireguard interface,
- use the /var/lib/netbird-/config.json configuration file,
- override /var/lib/netbird-/config.json with values from /etc/netbird-/config.d/*.json,
- (
hardened) be locally manageable by netbird-<name> system group,
With following caveats:
- multiple daemons will interfere with each other's DNS resolution of
netbird.cloud, but
should remain fully operational otherwise
|
| options/nixos/services.discourse.admin.username | The admin user username.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ppk.<name>.secret | Value of the PPK
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockServiceName | This optional key specifies the service on the node to connect(2) or bind(2) to.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.vmacXmitBase | Send/Recv VRRP messages from base interface instead of VMAC interface.
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.addrs | Addresses allocated in pool
|
| options/nixos/services.anuko-time-tracker.hostname | The hostname to serve Anuko Time Tracker on.
|
| options/nixos/services.maubot.settings.server.hostname | The IP to listen on
|
| options/nixos/services.angrr.settings.profile-policies.<name>.keep-booted-system | Whether to keep the last booted system generation
|
| options/nixos/services.printing.cups-pdf.instances.<name>.installPrinter | Whether to enable a CUPS printer queue for this instance
|
| options/nixos/services.jibri.xmppEnvironments.<name>.call.login.passwordFile | File containing the password for the user.
|
| options/nixos/services.tor.relay.onionServices.<name>.settings.HiddenServiceSingleHopMode | See torrc manual.
|
| options/nixos/services.znc.confOptions.networks.<name>.hasBitlbeeControlChannel | Whether to add the special Bitlbee operations channel.
|
| options/nixos/services.ncdns.identity.hostname | The hostname of this ncdns instance, which defaults to the machine
hostname
|
| options/nixos/services.tor.torsocks.socks5Username | SOCKS5 username
|
| options/home-manager/services.xsuspender.rules.<name>.autoSuspendOnBattery | Whether to auto-apply rules when switching to battery
power even if the window(s) didn't just lose focus.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.host | Host pattern used by this conditional block
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.present | Whether to ensure that this user is present or absent.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.wpaPasswordFile | Sets the password for WPA-PSK
|
| options/nixos/services.tarsnap.archives.<name>.directories | List of filesystem paths to archive.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockFamily | This optional key can be used to specifically request that "IPv4" or "IPv6" socket(s) be created.
|
| options/nixos/services.tor.relay.onionServices.<name>.authorizedClients | Authorized clients for a v3 onion service,
as a list of public key, in the format:
descriptor:x25519:<base32-public-key>
See torrc manual.
|
| options/nixos/services.snapserver.streams.<name>.location | For type pipe or file, the path to the pipe or file
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.enable | Whether to enable this angrr policy.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.devices | List of devices to attach to this container.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.token.<name>.handle | Hex-encoded CKA_ID or handle of the private key on the token or TPM,
respectively.
|
| options/nixos/systemd.services.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/services.znapzend.zetup.<name>.destinations | Additional destinations.
|
| options/home-manager/services.podman.containers.<name>.entrypoint | The container entrypoint.
|
| options/nixos/services.klipper.firmwares.<name>.klipperFlashPackage | Path to the built klipper-flash package.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.workdir | Override the default working directory for the container.
|
| options/nixos/services.rke2.autoDeployCharts.<name>.createNamespace | Whether to create the target namespace if not present.
|
| options/nixos/services.rke2.autoDeployCharts.<name>.targetNamespace | The namespace in which the Helm chart gets installed.
|
| options/nixos/services.autorandr.profiles.<name>.hooks.postswitch | Postswitch hook executed after mode switch.
|
| options/darwin/services.github-runners.<name>.ephemeral | If enabled, causes the following behavior:
- Passes the
--ephemeral flag to the runner configuration script
- De-registers and stops the runner with GitHub after it has processed one job
- Restarts the service after its successful exit
- On start, wipes the state directory and configures a new runner
You should only enable this option if tokenFile points to a file which contains a
personal access token (PAT)
|
| options/nixos/security.acme.certs.<name>.extraLegoFlags | Additional global flags to pass to all lego commands.
|
| options/nixos/systemd.timers.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/systemd.slices.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/systemd.sockets.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.targets.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/virtualisation.credentials.<name>.mechanism | The mechanism used to pass the credential to the VM.
|
| options/nixos/systemd.user.paths.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/services.tor.relay.onionServices.<name>.settings.HiddenServiceMaxStreams | See torrc manual.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.id | If this attribute is given with non-zero length, it will set the password identifier
for this entry
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.period | Retention period for the GC roots matched by this policy.
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.path-regex | Regex pattern to match the GC root path.
|
| options/nixos/services.simplesamlphp.<name>.libDir | Path to the SimpleSAMLphp library directory.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.scale.method | Output scaling method.
|
| options/nixos/services.sabnzbd.settings.servers.<name>.ssl_verify | Level of TLS verification
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.policies | Whether to install IPsec policies or not
|
| options/nixos/services.dawarich.sidekiqProcesses.<name>.threads | Number of threads this process should use for executing jobs
|
| options/nixos/services.mastodon.sidekiqProcesses.<name>.threads | Number of threads this process should use for executing jobs
|
| options/nixos/services.jitsi-videobridge.xmppConfigs.<name>.domain | Domain part of JID of the XMPP user, if it is different from hostName.
|
| options/nixos/services.authelia.instances.<name>.settings.log.file_path | File path where the logs will be written
|
| options/home-manager/fonts.fontconfig.configFile.<name>.label | Label to use for the name of the config file.
|
| options/nixos/programs.neovim.runtime.<name>.text | Text of the file.
|
| options/home-manager/programs.sftpman.mounts.<name>.host | The host to connect to.
|
| options/home-manager/programs.sftpman.mounts.<name>.user | The username to authenticate with.
|
| options/home-manager/programs.sftpman.mounts.<name>.port | The port to connect to.
|
| options/home-manager/accounts.email.accounts.<name>.gpg | GPG configuration.
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.caPool | Path to the certificate authority (CA) for the certificate of your origin
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.extraFiles.<name>.source | Path of the source file or directory.
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.filter | External filter program to further filter GC roots matched by this policy.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.enable | Whether to enable the output.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.rotate | Output rotate configuration.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.addressDescription | An optional description for resource address, usually a full link to the resource including a schema.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.copy_ecn | Whether to copy the ECN (Explicit Congestion Notification) header field
to/from the outer IP header in tunnel mode
|
| options/nixos/hardware.printers.ensurePrinters.*.name | Name of the printer / printer queue
|
| options/nixos/systemd.user.slices.<name>.sliceConfig | Each attribute in this set specifies an option in the
[Slice] section of the unit
|
| options/home-manager/i18n.inputMethod.fcitx5.themes.<name>.theme | The theme.conf file of the theme
|
| options/nixos/services.authelia.instances.<name>.settingsFiles | Here you can provide authelia with configuration files or directories
|
| options/nixos/services.dovecot2.mailboxes.<name>.specialUse | Null if no special use flag is set
|
| options/nixos/systemd.user.paths.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/home-manager/launchd.agents.<name>.config.ExitTimeOut | The amount of time launchd waits before sending a SIGKILL signal
|
| options/nixos/services.openvpn.servers | Each attribute of this option defines a systemd service that
runs an OpenVPN instance
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.extraFiles.<name>.target | Path to target relative to the vault's directory.
|
| options/nixos/services.angrr.settings.profile-policies.<name>.profile-paths | Paths to the Nix profile
|
| options/home-manager/programs.smug.projects.<name>.stop | Commands to execute after the tmux-session is destroyed.
|
| options/home-manager/programs.floorp.profiles.<name>.containers.<name>.id | Container ID
|
| options/nixos/boot.loader.systemd-boot.windows.<name>.title | The title of the boot menu entry.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.mode | Selects the authentication mode for this AP.
- "none": Don't configure any authentication
|
| options/home-manager/programs.floorp.profiles.<name>.containers.<name>.icon | Container icon.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.priority | Optional fixed priority for IPsec policies
|
| options/nixos/services.discourse.hostname | The hostname to serve Discourse on.
|
| options/nixos/services.bookstack.hostname | The hostname to serve BookStack on.
|
| options/darwin/programs.vim.vimOptions.<name>.source | Path of the source file.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockPassive | This optional key specifies whether listen(2) or connect(2) should be called on the created file
descriptor
|
| options/home-manager/services.git-sync.repositories.<name>.interval | The interval, specified in seconds, at which the synchronization will
be triggered even without filesystem changes.
|
| options/nixos/programs.tsmClient.servers.<name>.servername | Local name of the IBM TSM server,
must not contain space or more than 64 chars.
|
| options/nixos/services.gitea-actions-runner.instances.<name>.settings | Configuration for act_runner daemon
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.wpaPskFile | Sets the password(s) for WPA-PSK
|
| options/nixos/services.h2o.hosts.<name>.tls.recommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|
| options/home-manager/accounts.email.accounts.<name>.neomutt.mailboxName | Use a different name as mailbox name
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ntlm.<name>.secret | Value of the NTLM secret, which is the NT Hash of the actual secret,
that is, MD4(UTF-16LE(secret))
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels | List of channels that should be grouped together into this group
|
| options/nixos/systemd.nspawn.<name>.execConfig | Each attribute in this set specifies an option in the
[Exec] section of this unit
|
| options/nixos/systemd.timers.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/systemd.slices.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/boot.loader.grub.users.<name>.passwordFile | Specifies the path to a file containing the
clear text password for the account
|
| options/nixos/virtualisation.oci-containers.containers.<name>.login.passwordFile | Path to file containing password.
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.readBuckets | The organization's buckets which should be allowed to be read
|
| options/nixos/services.klipper.firmwares.<name>.enableKlipperFlash | Whether to enable flashings scripts for firmware
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.filter | Interpolation method to be used for scaling the output.
|
| options/nixos/services.invoiceplane.sites.<name>.settings | Structural InvoicePlane configuration
|
| options/nixos/services.hostapd.radios.<name>.wifi6.singleUserBeamformee | HE single user beamformee support
|
| options/nixos/services.hostapd.radios.<name>.wifi6.singleUserBeamformer | HE single user beamformer support
|
| options/nixos/services.bcg.automaticRenameKitNodes | Automatically rename kit's nodes.
|
| options/nixos/services.namecoind.generate | Whether to generate (mine) Namecoins.
|
| options/nixos/systemd.network.links.<name>.enable | Whether to enable this .link unit
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.xauth.<name>.secret | Value of the EAP/XAuth secret
|
| options/nixos/services.hostapd.radios.<name>.wifi7.singleUserBeamformer | EHT single user beamformer support
|
| options/nixos/services.hostapd.radios.<name>.wifi7.singleUserBeamformee | EHT single user beamformee support
|
| options/nixos/services.peertube-runner.instancesToRegister.<name>.url | URL of the PeerTube instance.
|
| options/home-manager/accounts.email.accounts.<name>.imap.host | Hostname of IMAP server.
|
| options/home-manager/accounts.email.accounts.<name>.smtp.host | Hostname of SMTP server.
|
| options/nixos/boot.initrd.luks.devices.<name>.keyFileTimeout | The amount of time in seconds for a keyFile to appear before
timing out and trying passwords.
|
| options/nixos/security.auditd.plugins.<name>.path | This is the absolute path to the plugin executable.
|
| options/nixos/systemd.slices.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/systemd.slices.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.timers.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.timers.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockProtocol | This optional key specifies the protocol to be passed to socket(2)
|
| options/nixos/services.kmonad.keyboards.<name>.defcfg.fallthrough | Whether to enable re-emitting unhandled key events.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs12.<name>.secret | Value of decryption passphrase for PKCS#12 container.
|
| options/nixos/services.grafana.provision.datasources.settings.datasources.*.name | Name of the datasource
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.settings.base_url | Base URL for build logs (mandatory for access from CI broker page).
|
| options/nixos/services.botamusique.settings.bot.username | Name the bot should appear with.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.autoRemoveOnStop | Automatically remove the container when it is stopped or killed
|
| options/nixos/security.acme.certs.<name>.listenHTTP | Interface and port to listen on to solve HTTP challenges
in the form [INTERFACE]:PORT
|
| options/nixos/services.fedimintd.<name>.consensus.finalityDelay | Consensus peg-in finality delay.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.pk | If this attribute is given, SAE-PK will be enabled for this connection
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.mac | If this attribute is not included, or if is set to the wildcard address (ff:ff:ff:ff:ff:ff),
the entry is available for any station (client) to use
|
| options/nixos/users.extraUsers.<name>.expires | Set the date on which the user's account will no longer be
accessible
|
| options/nixos/services.syncthing.settings.folders.<name>.versioning.type | The type of versioning
|
| options/home-manager/services.syncthing.settings.folders.<name>.versioning.type | The type of versioning
|
| options/home-manager/services.muchsync.remotes.<name>.remote.checkForModifiedFiles | Check for modified files on the remote side
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.operator | Grants all permissions in all organizations.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.log-driver | Logging driver for the container
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockServiceName | This optional key specifies the service on the node to connect(2) or bind(2) to.
|
| options/nixos/users.extraUsers.<name>.packages | The set of packages that should be made available to the user
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.auth | Authentication to expect from remote
|
| options/nixos/systemd.user.timers.<name>.timerConfig | Each attribute in this set specifies an option in the
[Timer] section of the unit
|
| options/darwin/services.github-runners.<name>.serviceOverrides | Modify the service
|
| options/nixos/security.acme.certs.<name>.extraLegoRunFlags | Additional flags to pass to lego run.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.proxyJump | The proxy host to use to connect to the server.
|
| options/nixos/services.github-runners.<name>.ephemeral | If enabled, causes the following behavior:
- Passes the
--ephemeral flag to the runner configuration script
- De-registers and stops the runner with GitHub after it has processed one job
- On stop, systemd wipes the runtime directory (this always happens, even without using the ephemeral option)
- Restarts the service after its successful exit
- On start, wipes the state directory and configures a new runner
You should only enable this option if tokenFile points to a file which contains a
personal access token (PAT)
|
| options/nixos/services.dawarich.sidekiqProcesses.<name>.jobClasses | If not empty, which job classes should be executed by this process.
If left empty, all job classes will be executed by this process.
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.runtimePackages | Packages added to the adapter's PATH.
|
| options/nixos/systemd.user.services.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/fileSystems.<name>.stratis.poolUuid | UUID of the stratis pool that the fs is located in
This is only relevant if you are using stratis.
|
| options/nixos/networking.fooOverUDP.<name>.local.dev | Network device to bind to.
|
| options/nixos/services.blockbook-frontend.<name>.internal | Internal http server binding [address]:port.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.networks | Networks to attach the container to
|
| options/nixos/services.tarsnap.archives.<name>.checkpointBytes | Create a checkpoint every checkpointBytes
of uploaded data (optionally specified using an SI prefix).
1GB is the minimum value
|
| options/nixos/environment.etc.<name>.user | User name of file owner
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.remote_ts | List of remote selectors to include in CHILD_SA
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rand_time | Time range from which to choose a random value to subtract from
rekey_time
|
| options/nixos/systemd.user.targets.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/systemd.user.sockets.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/services.borgbackup.jobs.<name>.encryption.passCommand | A command which prints the passphrase to stdout
|
| options/nixos/services.angrr.settings.profile-policies.<name>.keep-current-system | Whether to keep the current system generation
|
| options/nixos/services.authelia.instances.<name>.secrets.sessionSecretFile | Path to your session secret
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.writeBuckets | The organization's buckets which should be allowed to be written
|
| options/nixos/services.zeronsd.servedNetworks.<name>.settings.log_level | Log Level.
|
| options/nixos/networking.ipips.<name>.dev | The underlying network device on which the tunnel resides.
|
| options/nixos/boot.initrd.luks.devices.<name>.keyFileOffset | The offset of the key file
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.password | Specifies the (clear text) password for the MQTT User.
|
| options/nixos/services.frp.instances.<name>.environmentFiles | List of paths files that follows systemd environmentfile structure
|
| options/nixos/services.borgbackup.jobs.<name>.persistentTimer | Set the Persistent option for the
systemd.timer(5)
which triggers the backup immediately if the last trigger
was missed (e.g. if the system was powered down).
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.if_id_in | XFRM interface ID set on inbound policies/SA
|
| options/nixos/services.syncthing.settings.devices.<name>.autoAcceptFolders | Automatically create or share folders that this device advertises at the default path
|
| options/home-manager/services.syncthing.settings.devices.<name>.autoAcceptFolders | Automatically create or share folders that this device advertises at the default path
|
| options/nixos/services.wstunnel.servers.<name>.tlsCertificate | TLS certificate to use instead of the hardcoded one in case of HTTPS connections
|
| options/nixos/virtualisation.oci-containers.containers.<name>.volumes | List of volumes to attach to this container
|
| options/nixos/services.keepalived.vrrpInstances.<name>.extraConfig | Extra lines to be added verbatim to the vrrp_instance section.
|
| options/home-manager/launchd.agents.<name>.config.WatchPaths | This optional key causes the job to be started if any one of the listed paths are modified.
|
| options/home-manager/programs.irssi.networks.<name>.type | Type of the network.
|
| options/home-manager/programs.irssi.networks.<name>.nick | Nickname in that network.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.extraOptions | Extra options for podman run.
|
| options/nixos/services.blockbook-frontend.<name>.extraConfig | Additional configurations to be appended to coin.conf
|
| options/nixos/services.biboumi.settings.hostname | The hostname served by the XMPP gateway
|
| options/nixos/services.firezone.server.provision.accounts.<name>.auth.<name>.adapter_config.clientSecretFile | A file containing a the client secret for an openid_connect adapter
|
| options/nixos/services.borgbackup.jobs.<name>.compression | Compression method to use
|
| options/nixos/services.sabnzbd.settings.servers.<name>.connections | Number of parallel connections permitted by
the server.
|
| options/home-manager/programs.floorp.profiles.<name>.containers.<name>.color | Container color.
|
| options/home-manager/services.xsuspender.rules.<name>.matchWmClassGroupContains | Match windows where wm class group contains string.
|
| options/nixos/services.sanoid.datasets.<name>.use_template | Names of the templates to use for this dataset.
|
| options/nixos/systemd.user.targets.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/systemd.user.sockets.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/services.mastodon.sidekiqProcesses.<name>.jobClasses | If not empty, which job classes should be executed by this process. *Only one process should handle the 'scheduler' class
|
| options/nixos/networking.ipips.<name>.ttl | The time-to-live of the connection to the remote tunnel endpoint.
|
| options/nixos/users.extraUsers.<name>.isNormalUser | Indicates whether this is an account for a “real” user
|
| options/nixos/services.borgbackup.jobs.<name>.environment | Environment variables passed to the backup script
|
| options/nixos/fileSystems.<name>.encrypted.label | Label of the unlocked encrypted device
|
| options/nixos/services.ghostunnel.servers.<name>.extraArguments | Extra arguments to pass to ghostunnel server
|
| options/nixos/services.vdirsyncer.jobs.<name>.additionalGroups | additional groups to add the dynamic user to
|
| options/nixos/services.cloudflared.tunnels.<name>.warp-routing.enabled | Enable warp routing
|
| options/nixos/systemd.sockets.<name>.aliases | Aliases of that unit.
|
| options/nixos/systemd.targets.<name>.aliases | Aliases of that unit.
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.twoFactor | Whether to use a passphrase and a YubiKey (true), or only a YubiKey (false).
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.keyLength | Length of the LUKS slot key derived with PBKDF2 in byte.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.wpaPassword | Sets the password for WPA-PSK that will be converted to the pre-shared key
|
| options/nixos/systemd.sockets.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.targets.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/services.easytier.instances.<name>.settings.instance_name | Identify different instances on same host
|
| options/nixos/services.nextcloud.notify_push.dbname | Database name.
|
| options/nixos/services.influxdb2.provision.organizations.<name>.buckets.<name>.present | Whether to ensure that this bucket is present or absent.
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.filter.program | Path to the external filter program.
|
| options/nixos/services.fedimintd.<name>.environment | Extra Environment variables to pass to the fedimintd.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.life_time | Maximum lifetime before CHILD_SA gets closed
|
| options/nixos/virtualisation.fileSystems.<name>.overlay.useStage1BaseDirectories | If enabled, lowerdir, upperdir and workdir will be prefixed with /sysroot
|
| options/nixos/services.github-runners.<name>.serviceOverrides | Modify the systemd service
|
| options/nixos/systemd.user.sockets.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.user.sockets.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/systemd.user.targets.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.user.targets.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/darwin/programs.vim.vimOptions.<name>.enable | Whether this file should be generated
|
| options/home-manager/programs.sftpman.mounts.<name>.sshKey | Path to the SSH key to use for authentication
|
| options/nixos/services.namecoind.trustedNodes | List of the only peer IP addresses to connect to
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.local_ts | List of local traffic selectors to include in CHILD_SA
|
| options/nixos/users.extraUsers.<name>.isSystemUser | Indicates if the user is a system user or not
|
| options/nixos/virtualisation.oci-containers.containers.<name>.ports | Network ports to publish from the container to the outer host
|
| options/nixos/services.anubis.instances.<name>.settings.DIFFICULTY | The difficulty required for clients to solve the challenge
|
| options/nixos/systemd.user.tmpfiles.users.<name>.rules | Per-user rules for creation, deletion and cleaning of volatile and
temporary files automatically
|
| options/nixos/systemd.user.units.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.user.paths.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/home-manager/accounts.email.accounts.<name>.imap.port | The port on which the IMAP server listens
|
| options/home-manager/accounts.email.accounts.<name>.smtp.port | The port on which the SMTP server listens
|
| options/nixos/users.extraUsers.<name>.useDefaultShell | If true, the user's shell will be set to
users.defaultUserShell.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.vlanid | If this attribute is given, all clients using this entry will get tagged with the given VLAN ID.
|
| options/nixos/services.consul-template.instances.<name>.settings | Free-form settings written directly to the config.json file
|
| options/home-manager/programs.ssh.matchBlocks.<name>.match | Match block conditions used by this block
|
| options/home-manager/programs.smug.projects.<name>.root | Root path in filesystem of the smug project
|
| options/home-manager/programs.hexchat.channels.<name>.userName | User name
|
| options/nixos/services.mautrix-meta.instances.<name>.registerToSynapse | Whether to add registration file to services.matrix-synapse.settings.app_service_config_files and
make Synapse wait for registration service.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.podman.sdnotify | Determines how podman should notify systemd that the unit is ready
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mark_in | Netfilter mark and mask for input traffic
|
| options/nixos/boot.initrd.luks.devices.<name>.fido2.gracePeriod | Time in seconds to wait for the FIDO2 key.
|
| options/home-manager/accounts.email.accounts.<name>.jmap | The JMAP configuration to use for this account.
|
| options/home-manager/accounts.email.accounts.<name>.smtp | The SMTP configuration to use for this account.
|
| options/home-manager/accounts.email.accounts.<name>.imap | The IMAP configuration to use for this account.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords | Sets allowed passwords for WPA3-SAE
|
| options/home-manager/launchd.agents.<name>.config.StartOnMount | This optional key causes the job to be started every time a filesystem is mounted.
|
| options/nixos/services.armagetronad.servers.<name>.package | The armagetronad-dedicated package to use
|
| options/nixos/services.gitea-actions-runner.instances.<name>.hostPackages | List of packages, that are available to actions, when the runner is configured
with a host execution label.
|
| options/nixos/services.kanidm.provision.groups.<name>.overwriteMembers | Whether the member list should be overwritten each time (true) or appended
(false)
|
| options/nixos/services.mosquitto.bridges.<name>.addresses.*.address | Address of the remote MQTT broker.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.removeOrphanedClaimMaps | Whether claim maps not specified here but present in kanidm should be removed from kanidm.
|
| options/nixos/users.extraUsers.<name>.subGidRanges.*.startGid | Start of the range of subordinate group ids that user is
allowed to use.
|
| options/nixos/users.extraUsers.<name>.subUidRanges.*.startUid | Start of the range of subordinate user ids that user is
allowed to use.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.private.<name>.secret | Value of decryption passphrase for private key.
|
| options/nixos/systemd.nspawn.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.timers.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.slices.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockProtocol | This optional key specifies the protocol to be passed to socket(2)
|
| options/home-manager/launchd.agents.<name>.config.GroupName | This optional key specifies the group to run the job as
|
| options/nixos/services.blockbook-frontend.<name>.templateDir | Location of the HTML templates
|
| options/home-manager/programs.ssh.matchBlocks.<name>.checkHostIP | Check the host IP address in the
known_hosts file.
|
| options/nixos/security.acme.certs.<name>.ocspMustStaple | Turns on the OCSP Must-Staple TLS extension
|
| options/nixos/services.nextcloud-spreed-signaling.backends.<name>.secretFile | The path to the file containing the value for backends.<name>.secret
|
| options/home-manager/programs.firefox.profiles.<name>.containers.<name>.id | Container ID
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.primary | Whether output should be marked as primary
|
| options/nixos/services.anubis.instances.<name>.settings.WEBMASTER_EMAIL | If set, shows a contact email address when rendering error pages
|
| options/home-manager/programs.firefox.profiles.<name>.containers.<name>.icon | Container icon.
|
| options/nixos/boot.initrd.clevis.devices.<name>.secretFile | Clevis JWE file used to decrypt the device at boot, in concert with the chosen pin (one of TPM2, Tang server, or SSS).
|
| options/nixos/security.acme.certs.<name>.enableDebugLogs | Whether to enable debug logging for this certificate.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockPassive | This optional key specifies whether listen(2) or connect(2) should be called on the created file
descriptor
|
| options/nixos/services.jibri.xmppEnvironments.<name>.usageTimeout | The duration that the Jibri session can be
|
| options/nixos/services.maddy.ensureCredentials.<name>.passwordFile | Specifies the path to a file containing the
clear text password for the user.
|
| options/nixos/services.evremap.settings.device_name | The name of the device that should be remapped
|
| options/darwin/system.activationScripts.<name>.target | Name of symlink
|
| options/home-manager/services.git-sync.repositories.<name>.extraPackages | Extra packages available to git-sync.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.hostaccess | Hostaccess variable to pass to updown script
|
| options/nixos/services.borgbackup.repos.<name>.authorizedKeys | Public SSH keys that are given full write access to this repository
|
| options/nixos/security.acme.certs.<name>.webroot | Where the webroot of the HTTP vhost is located.
.well-known/acme-challenge/ directory
will be created below the webroot if it doesn't exist.
http://example.org/.well-known/acme-challenge/ must also
be available (notice unencrypted HTTP).
|
| options/nixos/systemd.paths.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert_policy | List of certificate policy OIDs the peer's certificate
must have
|
| options/nixos/services.snapper.configs.<name>.TIMELINE_LIMIT_QUARTERLY | Limits for timeline cleanup.
|
| options/nixos/services.anubis.instances.<name>.settings.METRICS_BIND_NETWORK | The network family that the metrics server should bind to
|
| options/home-manager/programs.hexchat.channels.<name>.nickname | Primary nickname.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.preRunExtraOptions | Extra options for podman that go before the run argument.
|
| options/darwin/services.aerospace.settings.on-window-detected.*."if".app-name-regex-substring | Regex substring to match the app name (optional).
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children | CHILD_SA configuration sub-section
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.tcpKeepAlive | The timeout after which a TCP keepalive packet is sent on a connection between Tunnel and the origin server.
|
| options/nixos/services.gitlab.databaseUsername | GitLab database user.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.sha256_96 | HMAC-SHA-256 is used with 128-bit truncation with IPsec
|
| options/nixos/systemd.user.slices.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/systemd.user.timers.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/services.gitlab-runner.services.<name>.requestConcurrency | Limit number of concurrent requests for new jobs from GitLab.
|
| options/darwin/services.gitlab-runner.services.<name>.requestConcurrency | Limit number of concurrent requests for new jobs from GitLab.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SecureSocketWithKey | This optional key is a variant of SockPathName
|
| options/nixos/services.postfix.settings.master.<name>.wakeupUnusedComponent | If set to false the component will only be woken
up if it is used
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.revocation | Certificate revocation policy for CRL or OCSP revocation.
- A
strict revocation policy fails if no revocation information is
available, i.e. the certificate is not known to be unrevoked.
ifuri fails only if a CRL/OCSP URI is available, but certificate
revocation checking fails, i.e. there should be revocation information
available, but it could not be obtained.
- The default revocation policy
relaxed fails only if a certificate is
revoked, i.e. it is explicitly known that it is bad
|
| options/darwin/launchd.daemons.<name>.command | Command executed as the service's main process.
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.storage.fsType | The filesystem of the unencrypted device.
|
| options/nixos/services.nextjs-ollama-llm-ui.hostname | The hostname under which the Ollama UI interface should be accessible
|
| options/nixos/power.ups.ups.<name>.description | Description of the UPS.
|
| options/nixos/systemd.slices.<name>.sliceConfig | Each attribute in this set specifies an option in the
[Slice] section of the unit
|
| options/nixos/systemd.nspawn.<name>.filesConfig | Each attribute in this set specifies an option in the
[Files] section of this unit
|
| options/nixos/services.sabnzbd.settings.servers.<name>.expire_date | If Notifications are enabled and an expiry date is
set, warn 5 days before expiry
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.saltLength | Length of the new salt in byte (64 is the effective maximum).
|
| options/nixos/users.extraUsers.<name>.linger | Whether to enable or disable lingering for this user
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockServiceName | This optional key specifies the service on the node to connect(2) or bind(2) to.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mark_out | Netfilter mark and mask for output traffic
|
| options/nixos/services.bacula-sd.autochanger.<name>.changerCommand | The name-string specifies an external program to be called that will
automatically change volumes as required by Bacula
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rand_bytes | Byte range from which to choose a random value to subtract from
rekey_bytes
|
| options/home-manager/services.xsuspender.rules.<name>.suspendSubtreePattern | Also suspend descendant processes that match this regex.
|
| options/nixos/systemd.user.targets.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.user.sockets.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.module | Optional PKCS#11 module name.
|
| options/nixos/systemd.paths.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/services.tor.relay.onionServices.<name>.settings.HiddenServiceExportCircuitID | See torrc manual.
|
| options/home-manager/accounts.contact.accounts.<name>.remote.userName | User name for authentication.
|
| options/nixos/services.postfixadmin.database.dbname | Name of the postgresql database
|
| options/nixos/environment.etc.<name>.group | Group name of file owner
|
| options/nixos/systemd.user.timers.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/systemd.user.slices.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/virtualisation.oci-containers.containers.<name>.imageStream | Path to a script that streams the desired image on standard output
|
| options/nixos/services.postfix.masterConfig.<name>.wakeupUnusedComponent | If set to false the component will only be woken
up if it is used
|
| options/nixos/services.keepalived.vrrpInstances.<name>.unicastSrcIp | Default IP for binding vrrpd is the primary IP on interface
|
| options/nixos/services.buildkite-agents.<name>.runtimePackages | Add programs to the buildkite-agent environment
|
| options/darwin/services.buildkite-agents.<name>.runtimePackages | Add programs to the buildkite-agent environment
|
| options/home-manager/accounts.email.accounts.<name>.imap.tls.useStartTls | Whether to use STARTTLS.
|
| options/home-manager/accounts.email.accounts.<name>.smtp.tls.useStartTls | Whether to use STARTTLS.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.font | The font name, null to use system default.
|
| options/darwin/programs.tmux.tmuxOptions.<name>.source | Path of the source file.
|
| options/home-manager/programs.sftpman.mounts.<name>.authType | The authentication method to use.
|
| options/nixos/services.k3s.autoDeployCharts.<name>.extraFieldDefinitions | Extra HelmChart field definitions that are merged with the rest of the HelmChart
custom resource
|
| options/home-manager/services.podman.containers.<name>.description | The description of the container.
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.noTLSVerify | Disables TLS verification of the certificate presented by your origin
|
| options/nixos/services.authelia.instances.<name>.secrets.oidcIssuerPrivateKeyFile | Path to your private key file used to encrypt OIDC JWTs.
|
| options/nixos/security.auditd.plugins.<name>.args | This allows you to pass arguments to the child program
|
| options/nixos/services.grafana.provision.datasources.settings.deleteDatasources.*.name | Name of the datasource to delete.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.priority | For electing MASTER, highest priority wins
|
| options/home-manager/xdg.desktopEntries.<name>.comment | Tooltip for the entry.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.trackScripts | List of script names to invoke for health tracking.
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.storage.path | Absolute path of the salt on the unencrypted device with
that device's root directory as "/".
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.extraConfig | Extra lines to append to this profile's config.
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.proxyPort | cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP
|
| options/home-manager/accounts.email.accounts.<name>.smtp.tls.enable | Whether to enable TLS/SSL.
|
| options/home-manager/accounts.email.accounts.<name>.imap.tls.enable | Whether to enable TLS/SSL.
|
| options/nixos/services.castopod.database.hostname | Database hostname.
|
| options/nixos/services.jibri.xmppEnvironments.<name>.control.login.passwordFile | File containing the password for the user.
|
| options/home-manager/accounts.email.accounts.<name>.jmap.host | Hostname of JMAP server
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.if_id_out | XFRM interface ID set on outbound policies/SA
|
| options/home-manager/home.file.<name>.recursive | If the file source is a directory, then this option
determines whether the directory should be recursively
linked to the target location
|
| options/nixos/services.wstunnel.servers.<name>.websocketPingInterval | Frequency at which the client will send websocket ping to the server.
|
| options/nixos/services.wstunnel.clients.<name>.websocketPingInterval | Frequency at which the client will send websocket ping to the server.
|
| options/nixos/services.bepasty.servers.<name>.defaultPermissions | default permissions for all unauthenticated accesses.
|
| options/home-manager/services.podman.containers.<name>.environment | Environment variables to set in the container.
|
| options/home-manager/accounts.email.accounts.<name>.mu.enable | Whether to enable mu indexing.
|
| options/nixos/systemd.network.links.<name>.extraConfig | Extra configuration append to unit
|
| options/nixos/services.consul-template.instances.<name>.settings.pid_file | Path to use for the pid file.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswordsFile | Sets the password for WPA3-SAE
|
| options/home-manager/programs.firefox.profiles.<name>.containers.<name>.color | Container color.
|
| options/nixos/networking.sits.<name>.local | The address of the local endpoint which the remote
side should send packets to.
|
| options/nixos/services.jibri.xmppEnvironments.<name>.stripFromRoomDomain | The prefix to strip from the room's JID domain to derive the call URL.
|
| options/nixos/services.spiped.config.<name>.disableReresolution | Disable target address re-resolution.
|
| options/nixos/services.easytier.instances.<name>.settings.listeners | Listener addresses to accept connections from other peers
|
| options/nixos/boot.initrd.systemd.contents.<name>.target | Path of the symlink.
|
| options/nixos/services.vmalert.instances.<name>.settings."datasource.url" | Datasource compatible with Prometheus HTTP API.
|
| options/home-manager/services.xsuspender.rules.<name>.downclockOnBattery | Limit CPU consumption for this factor when on battery power
|
| options/nixos/services.firefox-syncserver.singleNode.hostname | Host name to use for this service.
|
| options/nixos/networking.fooOverUDP.<name>.port | Local port of the encapsulation UDP socket.
|
| options/nixos/services.influxdb2.provision.users.<name>.passwordFile | Password for the user
|
| options/nixos/services.movim.h2o.serverName | Server name to be used for this virtual host
|
| options/nixos/services.kubernetes.proxy.hostname | Kubernetes proxy hostname override.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.inactivity | Timeout before closing CHILD_SA after inactivity
|
| options/nixos/systemd.user.paths.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/home-manager/programs.floorp.profiles.<name>.id | Profile ID
|
| options/nixos/boot.loader.systemd-boot.windows.<name>.sortKey | systemd-boot orders the menu entries by their sort keys,
so if you want something to appear after all the NixOS entries,
it should start with o or onwards
|
| options/nixos/systemd.network.links.<name>.linkConfig | Each attribute in this set specifies an option in the
[Link] section of the unit
|
| options/nixos/services.tor.relay.onionServices.<name>.settings.HiddenServiceAllowUnknownPorts | See torrc manual.
|
| options/nixos/services.hostapd.radios.<name>.wifi6.operatingChannelWidth | Determines the operating channel width for HE.
- "20or40": 20 or 40 MHz operating channel width
- "80": 80 MHz channel width
- "160": 160 MHz channel width
- "80+80": 80+80 MHz channel width
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.scale | Output scale configuration
|
| options/nixos/services.hostapd.radios.<name>.wifi5.capabilities | VHT (Very High Throughput) capabilities given as a list of flags
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.life_bytes | Maximum bytes processed before CHILD_SA gets closed
|
| options/nixos/services.syncthing.settings.folders.<name>.versioning | How to keep changed/deleted files with Syncthing
|
| options/home-manager/services.syncthing.settings.folders.<name>.versioning | How to keep changed/deleted files with Syncthing
|
| options/nixos/services.hostapd.radios.<name>.wifi5.operatingChannelWidth | Determines the operating channel width for VHT.
- "20or40": 20 or 40 MHz operating channel width
- "80": 80 MHz channel width
- "160": 160 MHz channel width
- "80+80": 80+80 MHz channel width
|
| options/nixos/services.hostapd.radios.<name>.wifi7.operatingChannelWidth | Determines the operating channel width for EHT.
- "20or40": 20 or 40 MHz operating channel width
- "80": 80 MHz channel width
- "160": 160 MHz channel width
- "80+80": 80+80 MHz channel width
|
| options/nixos/services.nextcloud-spreed-signaling.backends.<name>.urls | List of URLs of the Nextcloud instance
|
| options/nixos/services.simplesamlphp.<name>.configDir | Path to the SimpleSAMLphp config directory.
|
| options/nixos/boot.initrd.systemd.contents.<name>.source | Path of the source file.
|
| options/nixos/services.wstunnel.clients.<name>.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.wstunnel.servers.<name>.environmentFile | Environment file to be passed to the systemd service
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Nice | This optional key specifies what nice(3) value should be applied to the daemon.
|
| options/nixos/boot.specialFileSystems.<name>.fsType | Type of the file system
|
| options/nixos/systemd.timers.<name>.timerConfig | Each attribute in this set specifies an option in the
[Timer] section of the unit
|
| options/home-manager/home.file.<name>.executable | Set the execute bit
|
| options/nixos/programs.dms-shell.plugins.<name>.enable | Whether to enable this plugin
|
| options/nixos/systemd.sockets.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/systemd.targets.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/services.consul-template.instances.<name>.settings.template | Template section of consul-template
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.MulticastGroup | This optional key can be used to request that the datagram socket join a multicast group
|
| options/home-manager/launchd.agents.<name>.config.OnDemand | This key was used in Mac OS X 10.4 to control whether a job was kept alive or not
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.gracePeriod | Time in seconds to wait for the YubiKey.
|
| options/nixos/services.syncplay.maxUsernameLength | Maximum number of characters in a username.
|
| options/nixos/services.gitlab-runner.services.<name>.registrationFlags | Extra command-line flags passed to
gitlab-runner register
|
| options/darwin/services.gitlab-runner.services.<name>.registrationFlags | Extra command-line flags passed to
gitlab-runner register
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.copy_dscp | Whether to copy the DSCP (Differentiated Services Field Codepoint)
header field to/from the outer IP header in tunnel mode
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.description | Optional description for the API token
|
| options/nixos/systemd.services.<name>.confinement.packages | Additional packages or strings with context to add to the closure of
the chroot
|
| options/nixos/services.tor.relay.onionServices.<name>.settings.HiddenServiceDirGroupReadable | See torrc manual.
|
| options/home-manager/programs.retroarch.cores.<name>.package | The ‹name› package to use.
|
| options/nixos/boot.loader.grub.users.<name>.hashedPassword | Specifies the password hash for the account,
generated with grub-mkpasswd-pbkdf2
|
| options/nixos/services.bonsaid.settings.*.event_name | Name of the event which should trigger this transition when received by bonsaid
|
| options/nixos/services.github-runners.<name>.extraEnvironment | Extra environment variables to set for the runner, as an attrset.
|
| options/darwin/services.github-runners.<name>.extraEnvironment | Extra environment variables to set for the runner, as an attrset.
|
| options/home-manager/i18n.inputMethod.fcitx5.themes.<name>.panelImage | Path to the SVG of the panel.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.noPreempt | VRRP will normally preempt a lower priority machine when a higher
priority machine comes online. "nopreempt" allows the lower priority
machine to maintain the master role, even when a higher priority machine
comes back online
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.username | Username for the api or remote transport
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockProtocol | This optional key specifies the protocol to be passed to socket(2)
|
| options/home-manager/programs.floorp.profiles.<name>.path | Profile path.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.pairwiseCiphers | Set of accepted cipher suites (encryption algorithms) for pairwise keys (unicast packets)
|
| options/nixos/services.firezone.server.provision.accounts.<name>.features.idp_sync | Whether to enable the idp_sync feature for this account.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.features.rest_api | Whether to enable the rest_api feature for this account.
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.proxyType | cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.position | Output position
|
| options/home-manager/programs.streamlink.plugins.<name>.src | Source of the custom plugin
|
| options/nixos/boot.initrd.systemd.contents.<name>.enable | Whether to enable copying of this file and symlinking it.
|
| options/home-manager/services.activitywatch.watchers.<name>.settings | The settings for the individual watcher in TOML format
|
| options/nixos/services.hostapd.radios.<name>.wifi4.capabilities | HT (High Throughput) capabilities given as a list of flags
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.dpd_action | Action to perform for this CHILD_SA on DPD timeout
|
| options/nixos/security.acme.certs.<name>.extraLegoRenewFlags | Additional flags to pass to lego renew.
|
| options/nixos/systemd.network.networks.<name>.DHCP | Whether to enable DHCP on the interfaces matched.
|
| options/nixos/security.wrappers.<name>.group | The group of the wrapper program.
|
| options/nixos/security.wrappers.<name>.owner | The owner of the wrapper program.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SecureSocketWithKey | This optional key is a variant of SockPathName
|
| options/nixos/systemd.targets.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/systemd.sockets.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/services.hadoop.hdfs.namenode.restartIfChanged | Automatically restart the service on config change
|
| options/nixos/services.tsmBackup.servername | Create a systemd system service
tsm-backup.service that starts
a backup based on the given servername's stanza
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.passwordFile | Specifies the path to a file containing the
clear text password for the MQTT user
|
| options/nixos/users.users.<name>.description | A short description of the user account, typically the
user's full name
|
| options/nixos/services.vmagent.remoteWrite.basicAuthUsername | Basic Auth username used to connect to remote_write endpoint
|
| options/nixos/services.vlagent.remoteWrite.basicAuthUsername | Basic Auth username used to connect to remote_write endpoint
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.tlsTimeout | Timeout for completing a TLS handshake to your origin server, if you have chosen to connect Tunnel to an HTTPS server.
|
| options/darwin/environment.launchAgents.<name>.target | Name of symlink
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.httpHostHeader | Sets the HTTP Host header on requests sent to the local service.
|
| options/nixos/services.skydns.nameservers | Skydns list of nameservers to forward DNS requests to when not authoritative for a domain.
|
| options/nixos/services.prometheus.exporters.mail.configuration.servers.*.name | Value for label 'configname' which will be added to all metrics.
|
| options/darwin/programs.tmux.tmuxOptions.<name>.enable | Whether this file should be generated
|
| options/nixos/systemd.targets.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.targets.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/systemd.sockets.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.sockets.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.priority | Priority of this policy
|
| options/nixos/services.discourse.mail.outgoing.username | The username of the SMTP server.
|
| options/nixos/systemd.user.timers.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.user.slices.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/services.zoneminder.hostname | The hostname on which to listen.
|
| options/home-manager/xdg.desktopEntries.<name>.actions | The set of actions made available to application launchers.
|
| options/nixos/systemd.user.paths.<name>.requisite | Similar to requires
|
| options/nixos/services.keycloak.settings.hostname | The hostname part of the public URL used as base for
all frontend requests
|
| options/nixos/virtualisation.oci-containers.containers.<name>.privileged | Give extended privileges to the container
|
| options/nixos/virtualisation.oci-containers.containers.<name>.entrypoint | Override the default entrypoint of the image.
|
| options/nixos/security.auditd.plugins.<name>.type | This tells the dispatcher how the plugin wants to be run
|
| options/nixos/boot.specialFileSystems.<name>.enable | Whether to enable the filesystem mount.
|
| options/nixos/services.prometheus.exporters.ebpf.names | List of eBPF programs to load
|
| options/nixos/environment.etc.<name>.text | Text of the file.
|
| options/darwin/environment.etc.<name>.text | Text of the file.
|
| options/nixos/services.slurm.nodeName | Name that SLURM uses to refer to a node (or base partition for BlueGene
systems)
|
| options/home-manager/programs.gradle.initScripts.<name>.text | Text of the init script file. if this option is null
then source must be set.
|
| options/nixos/openstack.zfs.datasets.<name>.mount | Where to mount this dataset.
|
| options/nixos/services.onlyoffice.hostname | FQDN for the OnlyOffice instance.
|
| options/nixos/services.simplesamlphp.<name>.package | The simplesamlphp package to use.
|
| options/nixos/services.cloudflared.tunnels.<name>.edgeIPVersion | Specifies the IP address version (IPv4 or IPv6) used to establish a connection between cloudflared and the Cloudflare global network
|
| options/nixos/services.simplesamlphp.<name>.phpfpmPool | The PHP-FPM pool that serves SimpleSAMLphp instance.
|
| options/nixos/systemd.paths.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.units.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/services.armagetronad.servers.<name>.settings | Armagetron Advanced server rules configuration
|
| options/nixos/services.rshim.device | Specify the device name to attach
|
| options/nixos/services.blockbook-frontend.<name>.extraCmdLineOptions | Extra command line options to pass to Blockbook
|
| options/nixos/services.nghttpx.backends.*.params.dns | Name resolution of a backends host name is done at start up,
or configuration reload
|
| options/darwin/launchd.user.agents.<name>.serviceConfig | Each attribute in this set specifies an option for a key in the plist.
https://developer.apple.com/legacy/library/documentation/Darwin/Reference/ManPages/man5/launchd.plist.5.html
|
| options/home-manager/programs.irssi.networks.<name>.server.port | Port of the chat server.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.enable | Whether to enable aerc.
|
| options/nixos/systemd.network.networks.<name>.dns | A list of dns servers to be added to the network section of the
unit
|
| options/nixos/systemd.network.networks.<name>.vrf | A list of vrf interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.network.networks.<name>.ntp | A list of ntp servers to be added to the network section of the
unit
|
| options/home-manager/launchd.agents.<name>.config.InitGroups | This optional key specifies whether initgroups(3) should be called before running the job
|
| options/nixos/services.influxdb2.provision.organizations.<name>.buckets.<name>.retention | The duration in seconds for which the bucket will retain data (0 is infinite).
|
| options/home-manager/xdg.dataFile.<name>.recursive | If the file source is a directory, then this option
determines whether the directory should be recursively
linked to the target location
|
| options/nixos/services.authelia.instances.<name>.settings.log.keep_stdout | Whether to also log to stdout when a file_path is defined.
|
| options/home-manager/services.podman.containers.<name>.environmentFile | Paths to files containing container environment variables.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.hw_offload | Enable hardware offload for this CHILD_SA, if supported by the IPsec
implementation
|
| options/nixos/boot.initrd.luks.devices.<name>.postOpenCommands | Commands that should be run right after we have mounted our LUKS device.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Label | This required key uniquely identifies the job to launchd.
|
| options/nixos/services.icingaweb2.modules.monitoring.backends.<name>.resource | Name of the IDO resource
|
| options/nixos/programs.neovim.runtime.<name>.source | Path of the source file.
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites.<name>.desktopEntry.icon | Icon to display in file manager, menus, etc.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mark_in_sa | Whether to set mark_in on the inbound SA
|
| options/nixos/services.jitsi-videobridge.xmppConfigs.<name>.passwordFile | File containing the password for the user.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.interface | Interface for inside_network, bound by vrrp.
|
| options/nixos/services.archisteamfarm.bots.<name>.enabled | Whether to enable the bot on startup.
|
| options/nixos/security.acme.certs.<name>.extraDomainNames | A list of extra domain names, which are included in the one certificate to be issued.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Nice | This optional key specifies what nice(3) value should be applied to the daemon.
|
| options/nixos/services.invoiceplane.sites.<name>.database.passwordFile | A file containing the password corresponding to
database.user.
|
| options/nixos/systemd.services.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/services.armagetronad.servers.<name>.openFirewall | Set to true to open the configured UDP port for Armagetron Advanced.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.imapAuth | Sets the authentication mechanism if imap is used as the incoming
method
|
| options/home-manager/accounts.email.accounts.<name>.aerc.smtpAuth | Sets the authentication mechanism if smtp is used as the outgoing
method
|
| options/home-manager/xdg.dataFile.<name>.executable | Set the execute bit
|
| options/nixos/services.dendrite.settings.global.server_name | The domain name of the server, with optional explicit port
|
| options/nixos/services.vikunja.frontendHostname | The Hostname under which the frontend is running.
|
| options/nixos/services.wstunnel.clients.<name>.tlsVerifyCertificate | Whether to verify the TLS certificate of the server
|
| options/nixos/services.gitlab-runner.services.<name>.registrationConfigFile | Absolute path to a file with environment variables
used for gitlab-runner registration with runner registration
tokens
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rekey_time | Time to schedule CHILD_SA rekeying
|
| options/nixos/services.invoiceplane.sites.<name>.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.cassandra.jmxRoles.*.username | Username for JMX
|
| options/nixos/services.system76-scheduler.assignments.<name>.nice | Niceness.
|
| options/nixos/services.pantalaimon-headless.instances.<name>.ssl | Whether or not SSL verification should be enabled for outgoing
connections to the homeserver.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.node | The node where the rule should be applied.
|
| options/darwin/services.buildkite-agents.<name>.hooks.environment | The environment hook will run before all other commands, and can be used
to set up secrets, data, etc
|
| options/home-manager/programs.i3status-rust.bars.<name>.theme | The theme to use
|
| options/nixos/systemd.slices.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/systemd.timers.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/services.authelia.instances.<name>.settings.telemetry.metrics.enabled | Enable Metrics.
|
| options/home-manager/programs.gemini-cli.commands.<name>.prompt | The prompt that will be sent to the Gemini model when the command is executed
|
| options/nixos/services.netbird.clients.<name>.login.systemdDependencies | Additional systemd dependencies required to succeed before the Setup Key file becomes available.
|
| options/nixos/services.netbird.tunnels.<name>.login.systemdDependencies | Additional systemd dependencies required to succeed before the Setup Key file becomes available.
|
| options/nixos/security.auditd.plugins.<name>.active | Whether to enable Whether to enable this plugin.
|
| options/nixos/environment.etc.<name>.gid | GID of created file
|
| options/nixos/environment.etc.<name>.uid | UID of created file
|
| options/home-manager/launchd.agents.<name>.config.ServiceIPC | This optional key specifies whether the job participates in advanced
communication with launchd
|
| options/nixos/services.system76-scheduler.assignments.<name>.prio | CPU scheduler priority.
|
| options/nixos/hardware.alsa.controls.<name>.maxVolume | The maximum volume in dB.
|
| options/nixos/networking.ipips.<name>.local | The address of the local endpoint which the remote
side should send packets to.
|
| options/nixos/services.keycloak.database.username | Username to use when connecting to an external or manually
provisioned database; has no effect when a local database is
automatically provisioned
|
| options/nixos/networking.sits.<name>.remote | The address of the remote endpoint to forward traffic over.
|
| options/nixos/security.dhparams.params.<name>.bits | The bit size for the prime that is used during a Diffie-Hellman
key exchange.
|
| options/nixos/security.acme.certs.<name>.dnsProvider | DNS Challenge provider
|
| options/nixos/services.anubis.instances.<name>.settings.OG_PASSTHROUGH | Whether to enable Open Graph tag passthrough
|
| options/home-manager/programs.hexchat.channels.<name>.nickname2 | Secondary nickname.
|
| options/nixos/boot.initrd.luks.devices.<name>.preOpenCommands | Commands that should be run right before we try to mount our LUKS device
|
| options/home-manager/accounts.calendar.accounts.<name>.remote.userName | User name for authentication.
|
| options/nixos/services.postgresql.systemCallFilter.<name>.priority | Set the priority of the system call filter setting
|
| options/nixos/hardware.display.outputs.<name>.edid | An EDID filename to be used for configured display, as in edid/<filename>
|
| options/nixos/systemd.user.targets.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/systemd.user.sockets.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.filter.arguments | Extra command-line arguments pass to the external filter program.
|
| options/nixos/systemd.timers.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/systemd.slices.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/services.authelia.instances.<name>.settings.telemetry.metrics.address | The address to listen on for metrics
|
| options/home-manager/launchd.agents.<name>.config.Program | This key maps to the first argument of execvp(3)
|
| options/nixos/virtualisation.sharedDirectories.<name>.securityModel | The security model to use for this share:
passthrough: files are stored using the same credentials as they are created on the guest (this requires QEMU to run as root)
mapped-xattr: some of the file attributes like uid, gid, mode bits and link target are stored as file attributes
mapped-file: the attributes are stored in the hidden .virtfs_metadata directory
|
| options/nixos/services.system76-scheduler.assignments.<name>.ioPrio | IO scheduler priority.
|
| options/nixos/services.mpdscribble.endpoints.<name>.passwordFile | File containing the password, either as MD5SUM or cleartext.
|
| options/home-manager/services.mpdscribble.endpoints.<name>.passwordFile | File containing the password, either as MD5SUM or cleartext.
|
| options/home-manager/programs.i3status-rust.bars.<name>.icons | The icons set to use
|
| options/nixos/systemd.sockets.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.targets.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.passwordFile | The password for this entry, read from the given file when starting hostapd
|
| options/nixos/power.ups.upsmon.monitor.<name>.passwordFile | The full path to a file containing the password from
upsd.users for accessing this UPS
|
| options/nixos/fileSystems.<name>.encrypted.blkDev | Location of the backing encrypted device.
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.extraArgs | A list of extra arguments to pass to the pg_receivewal command.
|
| options/nixos/systemd.user.timers.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/systemd.user.slices.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.unicastPeers | Do not send VRRP adverts over VRRP multicast group
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Debug | This optional key specifies that launchd should adjust its log mask temporarily to LOG_DEBUG while
dealing with this job.
|
| options/nixos/systemd.network.networks.<name>.bond | A list of bond interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.network.networks.<name>.vlan | A list of vlan interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.network.networks.<name>.xfrm | A list of xfrm interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.user.sockets.<name>.socketConfig | Each attribute in this set specifies an option in the
[Socket] section of the unit
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SecureSocketWithKey | This optional key is a variant of SockPathName
|
| options/home-manager/accounts.email.accounts.<name>.lieer.sync.enable | Whether to enable lieer synchronization service.
|
| options/nixos/services.matrix-tuwunel.settings.global.server_name | The server_name is the name of this server
|
| options/nixos/services.matrix-conduit.settings.global.server_name | The server_name is the name of this server
|
| options/nixos/services.syncthing.settings.folders.<name>.ignorePatterns | Syncthing can be configured to ignore certain files in a folder using ignore patterns
|
| options/nixos/services.simplesamlphp.<name>.localDomain | The domain serving your SimpleSAMLphp instance
|
| options/nixos/systemd.user.sockets.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/systemd.user.targets.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/home-manager/accounts.email.accounts.<name>.meli.enable | Whether to enable the meli mail client for this account
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.password | The password for this entry
|
| options/nixos/services.ytdl-sub.instances.<name>.subscriptions | Subscriptions for ytdl-sub
|
| options/darwin/environment.userLaunchAgents.<name>.target | Name of symlink
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.RunAtLoad | This optional key is used to control whether your job is launched once at the time the job is loaded
|
| options/nixos/systemd.paths.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.originServerName | Hostname that cloudflared should expect from your origin server certificate.
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.proxyAddress | cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP
|
| options/nixos/services.postfix.settings.main.myhostname | The internet hostname of this mail system
|
| options/nixos/services.honk.host | The host name or IP address the server should listen to.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Label | This required key uniquely identifies the job to launchd.
|
| options/nixos/boot.initrd.luks.devices.<name>.gpgCard.encryptedPass | Path to the GPG encrypted passphrase.
|
| options/nixos/services.paretosecurity.users.<name>.inviteId | A unique ID that links the agent to Pareto Cloud
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.hashedPassword | Specifies the hashed password for the MQTT User
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites.<name>.settings | Settings for this site
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags.sent | Tag for notmuch to use for messages stored in the mailbox labeled with the
Sent name attribute
|
| options/nixos/security.acme.certs.<name>.directory | Directory where certificate and other state is stored.
|
| options/nixos/networking.fooOverUDP.<name>.local.address | Local address to bind to
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.tfc_padding | Pads ESP packets with additional data to have a consistent ESP packet
size for improved Traffic Flow Confidentiality
|
| options/nixos/services.simplesamlphp.<name>.authSources | Auth sources options used by SimpleSAMLphp.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.environment | Environment variables to set for this container.
|
| options/nixos/security.pam.services.<name>.googleAuthenticator.enable | If set, users with enabled Google Authenticator (created
~/.google_authenticator) will be required
to provide Google Authenticator token to log in.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rand_packets | Packet range from which to choose a random value to subtract from
rekey_packets
|
| options/nixos/services.discourse.database.username | Discourse database user.
|
| options/nixos/services.system76-scheduler.assignments.<name>.class | CPU scheduler class.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.UserName | This optional key specifies the user to run the job as
|
| options/nixos/networking.fooOverUDP.<name>.local | Local address (and optionally device) to bind to using the given port.
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.keepAliveTimeout | Timeout after which an idle keepalive connection can be discarded.
|
| options/home-manager/programs.firefox.profiles.<name>.id | Profile ID
|
| options/nixos/services.tor.relay.onionServices.<name>.settings.HiddenServiceMaxStreamsCloseCircuit | See torrc manual.
|
| options/nixos/systemd.network.netdevs.<name>.enable | Whether to manage network configuration using systemd-network
|
| options/home-manager/accounts.email.accounts.<name>.meli.mailboxAliases | Folder display name
|
| options/home-manager/programs.irssi.networks.<name>.server.ssl.enable | Whether SSL should be used.
|
| options/darwin/environment.launchDaemons.<name>.target | Name of symlink
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.TimeOut | The recommended idle time out (in seconds) to pass to the job
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.settings.<name>.force | Forcibly override any existing configuration for
this extension.
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites.<name>.manifestUrl | URL of the site's web app manifest.
|
| options/home-manager/launchd.agents.<name>.config.MachServices | This optional key is used to specify Mach services to be registered with the Mach bootstrap sub-system
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.hotkeys.<name>.*.modifiers | The hotkey modifiers.
|
| options/nixos/programs.neovim.runtime.<name>.enable | Whether this runtime directory should be generated
|
| options/nixos/services.prometheus.scrapeConfigs.*.job_name | The job name assigned to scraped metrics by default.
|
| options/home-manager/programs.sftpman.mounts.<name>.mountPoint | The remote path to mount.
|
| options/nixos/services.k3s.nodeName | Node name.
|
| options/nixos/services.microsocks.authUsername | Optional username to use for authentication.
|
| options/nixos/security.acme.certs.<name>.dnsResolver | Set the resolver to use for performing recursive DNS queries
|
| options/nixos/systemd.network.links.<name>.matchConfig | Each attribute in this set specifies an option in the
[Match] section of the unit
|
| options/home-manager/launchd.agents.<name>.config.LaunchOnlyOnce | This optional key specifies whether the job can only be run once and only once
|
| options/home-manager/programs.irssi.networks.<name>.server.ssl.verify | Whether the SSL certificate should be verified.
|
| options/nixos/hardware.sane.brscan5.netDevices.<name>.ip | The ip address of the device
|
| options/nixos/hardware.sane.brscan4.netDevices.<name>.ip | The ip address of the device
|
| options/nixos/services.system76-scheduler.assignments.<name>.ioClass | IO scheduler class.
|
| options/home-manager/programs.librewolf.profiles.<name>.containers.<name>.id | Container ID
|
| options/nixos/services.znc.user | The name of an existing user account to use to own the ZNC server
process
|
| options/home-manager/programs.librewolf.profiles.<name>.containers.<name>.icon | Container icon.
|
| options/nixos/security.pam.services.<name>.googleAuthenticator.allowNullOTP | Whether to allow login for accounts that have no OTP set
(i.e., accounts with no OTP configured or no existing
~/.google_authenticator).
|
| options/nixos/services.wyoming.faster-whisper.servers.<name>.useTransformers | Whether to provide the dependencies to allow using transformer models.
|
| options/nixos/services.archisteamfarm.bots.<name>.settings | Additional settings that are documented here.
|
| options/nixos/systemd.user.slices.<name>.requisite | Similar to requires
|
| options/nixos/systemd.user.timers.<name>.requisite | Similar to requires
|
| options/nixos/services.pretix.settings.pretix.instance_name | The name of this installation.
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites.<name>.desktopEntry.enable | Whether to enable the desktop entry for this site.
|
| options/nixos/security.wrappers.<name>.enable | Whether to enable the wrapper.
|
| options/home-manager/xdg.desktopEntries.<name>.noDisplay | Means "this application exists, but don't display it in the menus"
|
| options/home-manager/xdg.cacheFile.<name>.recursive | If the file source is a directory, then this option
determines whether the directory should be recursively
linked to the target location
|
| options/home-manager/xdg.stateFile.<name>.recursive | If the file source is a directory, then this option
determines whether the directory should be recursively
linked to the target location
|
| options/home-manager/programs.firefox.profiles.<name>.path | Profile path.
|
| options/home-manager/accounts.email.accounts.<name>.lieer.enable | Whether to enable lieer Gmail synchronization for notmuch.
|
| options/nixos/services.armagetronad.servers.<name>.roundSettings | Armagetron Advanced server per-round configuration
|
| options/nixos/services.easytier.instances.<name>.environmentFiles | Environment files for this instance
|
| options/home-manager/services.podman.containers.<name>.addCapabilities | The capabilities to add to the container.
|
| options/nixos/services.pantalaimon-headless.instances.<name>.dataPath | The directory where pantalaimon should store its state such as the database file.
|
| options/nixos/services.gitlab-runner.services.<name>.environmentVariables | Custom environment variables injected to build environment
|
| options/darwin/services.gitlab-runner.services.<name>.environmentVariables | Custom environment variables injected to build environment
|
| options/home-manager/programs.ssh.matchBlocks.<name>.controlPath | Specify path to the control socket used for connection sharing.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.state | The state in which a new window should spawn.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.layer | The layer where a new window should spawn.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.forwardX11 | Specifies whether X11 connections will be automatically redirected
over the secure channel and DISPLAY set.
|
| options/home-manager/xdg.cacheFile.<name>.executable | Set the execute bit
|
| options/home-manager/xdg.stateFile.<name>.executable | Set the execute bit
|
| options/nixos/services.borgbackup.jobs.<name>.encryption.passphrase | The passphrase the backups are encrypted with
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rekey_bytes | Number of bytes processed before initiating CHILD_SA rekeying
|
| options/home-manager/services.activitywatch.watchers.<name>.package | The activitywatch package to use
|
| options/nixos/services.pantalaimon-headless.instances.<name>.logLevel | Set the log level of the daemon.
|
| options/home-manager/accounts.contact.accounts.<name>.local.type | The type of the storage.
|
| options/home-manager/accounts.contact.accounts.<name>.local.path | The path of the storage.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.life_packets | Maximum number of packets processed before CHILD_SA gets closed
|
| options/nixos/services.zfs.autoReplication.username | Username used by SSH to login to remote host.
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.ignore-prefixes | List of path prefixes to ignore
|
| options/darwin/services.gitlab-runner.services.<name>.registrationConfigFile | Absolute path to a file with environment variables
used for gitlab-runner registration
|
| options/nixos/security.wrappers.<name>.source | The absolute path to the program to be wrapped.
|
| options/nixos/networking.jool.nat64.<name>.global.pool6 | The prefix used for embedding IPv4 into IPv6 addresses
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.transform | Refer to
xrandr(1)
for the documentation of the transform matrix.
|
| options/home-manager/programs.obsidian.defaultSettings.cssSnippets.*.name | Name of the snippet.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.focus | Whether the node should gain focus on creation.
|
| options/nixos/services.blockbook-frontend.<name>.messageQueueBinding | Message Queue Binding address:port.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.MulticastGroup | This optional key can be used to request that the datagram socket join a multicast group
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.slot | Optional slot number of the token that stores the certificate.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags.spam | Tag for notmuch to use for messages stored in the mailbox labeled with the
Junk name attribute and/or with the $Junk keyword,
except for messages with the $NotJunk keyword
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.allowInsecureClientDisablePkce | Disable PKCE on this oauth2 resource server to work around insecure clients
that may not support it
|
| options/nixos/environment.etc.<name>.mode | If set to something else than symlink,
the file is copied instead of symlinked, with the given
file mode.
|
| options/nixos/systemd.paths.<name>.requisite | Similar to requires
|
| options/nixos/boot.loader.grub.users.<name>.hashedPasswordFile | Specifies the path to a file containing the password hash
for the account, generated with grub-mkpasswd-pbkdf2
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.set_mark_in | Netfilter mark applied to packets after the inbound IPsec SA processed
them
|
| options/nixos/services.woodpecker-agents.agents.<name>.environment | woodpecker-agent config environment variables, for other options read the documentation
|
| options/nixos/networking.bonds.<name>.mode | DEPRECATED, use driverOptions
|
| options/nixos/services.kubernetes.kubelet.hostname | Kubernetes kubelet hostname override.
|
| options/nixos/services.matrix-synapse.settings.server_name | The domain name of the server, with optional explicit port
|
| options/nixos/systemd.timers.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.slices.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags.inbox | Tag for notmuch to use for messages stored in the mailbox labeled with the
Inbox name attribute
|
| options/nixos/systemd.user.sockets.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.user.targets.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/darwin/launchd.agents.<name>.serviceConfig.Debug | This optional key specifies that launchd should adjust its log mask temporarily to LOG_DEBUG while
dealing with this job.
|
| options/nixos/services.simplesamlphp.<name>.settings | Configuration options used by SimpleSAMLphp
|
| options/home-manager/programs.smug.projects.<name>.windows | Windows to create in the project session
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Umask | This optional key specifies what value should be passed to umask(2) before running the job
|
| options/darwin/launchd.agents.<name>.serviceConfig | Each attribute in this set specifies an option for a key in the plist.
https://developer.apple.com/legacy/library/documentation/Darwin/Reference/ManPages/man5/launchd.plist.5.html
|
| options/nixos/services.borgbackup.repos.<name>.authorizedKeysAppendOnly | Public SSH keys that can only be used to append new data (archives) to the repository
|
| options/nixos/networking.ipips.<name>.remote | The address of the remote endpoint to forward traffic over.
|
| options/nixos/security.acme.certs.<name>.renewInterval | Systemd calendar expression when to check for renewal
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.storage.device | An unencrypted device that will temporarily be mounted in stage-1
|
| options/nixos/services.syncthing.settings.folders.<name>.copyOwnershipFromParent | On Unix systems, tries to copy file/folder ownership from the parent directory (the directory it’s located in)
|
| options/home-manager/services.syncthing.settings.folders.<name>.copyOwnershipFromParent | On Unix systems, tries to copy file/folder ownership from
the parent directory (the directory it’s located in)
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.per_cpu_sas | Enable per-CPU CHILD_SAs
|
| options/nixos/services.bcg.automaticRenameGenericNodes | Automatically rename generic nodes.
|
| options/home-manager/services.hyprsunset.transitions.<name>.calendar | Deprecated - Use services.hyprsunset.settings instead to manage transitions
|
| options/home-manager/services.podman.containers.<name>.dropCapabilities | The capabilities to drop from the container.
|
| options/nixos/systemd.network.networks.<name>.vxlan | A list of vxlan interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.network.netdevs.<name>.tapConfig | Each attribute in this set specifies an option in the
[Tap] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.tunConfig | Each attribute in this set specifies an option in the
[Tun] section of the unit
|
| options/darwin/launchd.agents.<name>.serviceConfig.RunAtLoad | This optional key is used to control whether your job is launched once at the time the job is loaded
|
| options/nixos/services.suricata.settings.logging.outputs.file.filename | Filename of the logfile.
|
| options/nixos/boot.initrd.luks.devices.<name>.allowDiscards | Whether to allow TRIM requests to the underlying device
|
| options/nixos/services.vsmartcard-vpcd.hostname | Hostname of a waiting vpicc server vpcd will be connecting to
|
| options/nixos/services.influxdb2.provision.organizations.<name>.buckets.<name>.description | Optional description for the bucket.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.environmentFiles | Environment files for this container.
|
| options/home-manager/programs.librewolf.profiles.<name>.containers.<name>.color | Container color.
|
| options/home-manager/accounts.email.accounts.<name>.folders.sent | Relative path of the sent mail folder.
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.noHappyEyeballs | Disable the “happy eyeballs” algorithm for IPv4/IPv6 fallback if your local network has misconfigured one of the protocols.
|
| options/nixos/security.wrappers.<name>.setuid | Whether to add the setuid bit the wrapper program.
|
| options/nixos/security.wrappers.<name>.setgid | Whether to add the setgid bit the wrapper program.
|
| options/nixos/security.dhparams.params.<name>.path | The resulting path of the generated Diffie-Hellman parameters
file for other services to reference
|
| options/nixos/systemd.user.sockets.<name>.listenStreams | For each item in this list, a ListenStream
option in the [Socket] section will be created.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Nice | This optional key specifies what nice(3) value should be applied to the daemon.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.username | Username for basic HTTP authentication
|
| options/nixos/services.postfixadmin.database.username | Username for the postgresql connection
|
| options/nixos/hardware.display.outputs.<name>.mode | A video kernel parameter (framebuffer mode) configuration for the specific output:
<xres>x<yres>[M][R][-<bpp>][@<refresh>][i][m][eDd]
See for more information:
|
| options/home-manager/programs.sftpman.mounts.<name>.mountDestPath | The path on the current machine where the remote path would be mounted.
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.file | Absolute path to the certificate to load
|
| options/nixos/services.xserver.cmt.models | Which models to enable cmt for
|
| options/darwin/launchd.agents.<name>.serviceConfig.UserName | This optional key specifies the user to run the job as
|
| options/nixos/services.suricata.settings.unix-command.filename | Filename for unix-command socket.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.proxyCommand | The command to use to connect to the server.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.extraOptions | Extra configuration options for the host.
|
| options/nixos/users.extraUsers.<name>.description | A short description of the user account, typically the
user's full name
|
| options/nixos/services.hddfancontrol.settings.<drive-bay-name>.disks | Drive(s) to get temperature from
Can also use command substitution to automatically grab all matching drives; such as all scsi (sas) drives
|
| options/nixos/services.hddfancontrol.settings.<drive-bay-name>.extraArgs | Extra commandline arguments for hddfancontrol
|
| options/nixos/boot.initrd.luks.devices.<name>.fido2.passwordLess | Defines whatever to use an empty string as a default salt
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.splitDir | The direction where the container is going to be split.
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.settings.<name>.force | Forcibly override any existing configuration for
this extension.
|
| options/home-manager/programs.vscode.profiles.<name>.userMcp | Configuration written to Visual Studio Code's
mcp.json
|
| options/nixos/services.mautrix-meta.instances.<name>.environmentFile | File containing environment variables to substitute when copying the configuration
out of Nix store to the services.mautrix-meta.dataDir
|
| options/home-manager/programs.ssh.matchBlocks.<name>.addKeysToAgent | When enabled, a private key that is used during authentication will be
added to ssh-agent if it is running (with confirmation enabled if
set to 'confirm')
|
| options/home-manager/xdg.desktopEntries.<name>.terminal | Whether the program runs in a terminal window.
|
| options/home-manager/accounts.contact.accounts.<name>.remote.url | The URL of the storage.
|
| options/nixos/services.mautrix-meta.instances.<name>.registrationFile | Path to the yaml registration file of the appservice.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.close_action | Action to perform after a CHILD_SA gets closed by the peer.
- The default of
none does not take any action,
trap installs a trap policy for the CHILD_SA.
start tries to re-create the CHILD_SA.
close_action does not provide any guarantee that the
CHILD_SA is kept alive
|
| options/darwin/launchd.agents.<name>.serviceConfig.TimeOut | The recommended idle time out (in seconds) to pass to the job
|
| options/home-manager/accounts.contact.accounts.<name>.khard.glob | The glob expansion to be searched for contacts when
type is set to discover.
|
| options/home-manager/services.hyprsunset.transitions.<name>.requests | Deprecated - Use services.hyprsunset.settings instead to manage transitions
|
| options/nixos/services.prometheus.exporters.imap-mailstat.accounts.<name>.password | |
| options/darwin/launchd.user.agents.<name>.serviceConfig.ExitTimeOut | The amount of time launchd waits before sending a SIGKILL signal
|
| options/nixos/services.dsnet.settings.ExternalHostname | The hostname that clients should use to connect to this server
|
| options/home-manager/programs.rclone.remotes.<name>.config | Regular configuration options as described in rclone's documentation
https://rclone.org/docs/
|
| options/nixos/services.deye-dummycloud.mqttUsername | MQTT username
|
| options/nixos/services.prometheus.exporters.imap-mailstat.accounts.<name>.mailaddress | Your email address (at the moment used as login name)
|
| options/nixos/services.namecoind.rpc.certificate | Certificate file for securing RPC connections.
|
| options/nixos/services.teeworlds.game.tournamentMode | Whether to enable tournament mode
|
| options/home-manager/accounts.contact.accounts.<name>.khal.readOnly | Keep khal from making any changes to this account.
|
| options/home-manager/fonts.fontconfig.configFile.<name>.text | Verbatim contents of the config file
|
| options/home-manager/programs.obsidian.vaults.<name>.enable | Whether this vault should be generated.
|
| options/home-manager/accounts.contact.accounts.<name>.local.fileExt | The file extension to use.
|
| options/nixos/fileSystems.<name>.overlay.workdir | The path to the workdir
|
| options/home-manager/accounts.contact.accounts.<name>.local.encoding | File encoding for items, both content and file name
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.fqdn | Fully qualified domain name of the JMAP service.
mujmap looks up the JMAP SRV record for this host to determine the JMAP session
URL
|
| options/home-manager/programs.i3status-rust.bars.<name>.blocks | Configuration blocks to add to i3status-rust
config
|
| options/nixos/systemd.network.netdevs.<name>.extraConfig | Extra configuration append to unit
|
| options/home-manager/programs.floorp.profiles.<name>.search | Declarative search engine configuration.
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.connectTimeout | Timeout for establishing a new TCP connection to your origin server
|
| options/nixos/systemd.sockets.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/systemd.targets.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.enableLocalhostRedirects | Allow localhost redirects
|
| options/nixos/services.tt-rss.pool | Name of existing phpfpm pool that is used to run web-application
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.ignore-prefixes-in-home | Path prefixes to ignore under home directory
|
| options/nixos/security.pam.services.<name>.googleAuthenticator.forwardPass | The authentication provides a single field requiring
the user's password followed by the one-time password (OTP).
|
| options/nixos/boot.specialFileSystems.<name>.stratis.poolUuid | UUID of the stratis pool that the fs is located in
This is only relevant if you are using stratis.
|
| options/home-manager/accounts.email.accounts.<name>.enable | Whether this account is enabled
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.connection | Specifies parameters used to connect to the server, as a connection string
|
| options/nixos/systemd.user.sockets.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/systemd.user.targets.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/systemd.slices.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/systemd.timers.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.extraBinds | Extra bindings specific to this account, added to
$HOME/.config/aerc/binds.conf
|
| options/nixos/services.taskserver.organisations.<name>.users | A list of user names that belong to the organization.
|
| options/nixos/networking.vswitches.<name>.interfaces.<name>.vlan | Vlan tag to apply to interface
|
| options/nixos/networking.vswitches.<name>.interfaces.<name>.type | Openvswitch type to assign to interface
|
| options/nixos/systemd.network.netdevs.<name>.wlanConfig | Each attribute in this set specifies an option in the [WLAN] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.l2tpConfig | Each attribute in this set specifies an option in the
[L2TP] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.xfrmConfig | Each attribute in this set specifies an option in the
[Xfrm] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.vlanConfig | Each attribute in this set specifies an option in the
[VLAN] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.bondConfig | Each attribute in this set specifies an option in the
[Bond] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.peerConfig | Each attribute in this set specifies an option in the
[Peer] section of the unit
|
| options/home-manager/launchd.agents.<name>.config.LowPriorityIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.dscp | Differentiated Services Field Codepoint to set on outgoing IKE packets for
this connection
|
| options/nixos/services.prometheus.exporters.imap-mailstat.accounts.<name>.starttls | set to true for using STARTTLS to start a TLS connection
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.enable | Whether to enable synchronization using mbsync.
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.hashedPasswordFile | Specifies the path to a file containing the
hashed password for the MQTT user
|
| options/nixos/networking.bridges.<name>.rstp | Whether the bridge interface should enable rstp.
|
| options/nixos/networking.greTunnels.<name>.dev | The underlying network device on which the tunnel resides.
|
| options/home-manager/accounts.email.accounts.<name>.maildir.path | Path to maildir directory where mail for this account is
stored
|
| options/home-manager/accounts.contact.accounts.<name>.khal.color | Color in which events in this calendar are displayed
|
| options/home-manager/programs.smug.projects.<name>.beforeStart | Commands to execute before the tmux-session starts.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.replay_window | IPsec replay window to configure for this CHILD_SA
|
| options/home-manager/accounts.email.accounts.<name>.gpg.signByDefault | Sign messages by default.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.border | Whether the node should have border.
|
| options/home-manager/accounts.email.accounts.<name>.aliases | Alternative identities of this account.
|
| options/home-manager/accounts.email.accounts.<name>.address | The email address of this account.
|
| options/home-manager/accounts.contact.accounts.<name>.local | Local configuration for the contacts.
|
| options/home-manager/accounts.email.accounts.<name>.maildir | Maildir configuration for this account.
|
| options/home-manager/accounts.email.accounts.<name>.folders | Standard email folders.
|
| options/home-manager/programs.sftpman.mounts.<name>.beforeMount | Command to run before mounting.
|
| options/nixos/systemd.nspawn.<name>.networkConfig | Each attribute in this set specifies an option in the
[Network] section of this unit
|
| options/nixos/systemd.sockets.<name>.socketConfig | Each attribute in this set specifies an option in the
[Socket] section of the unit
|
| options/nixos/services.sanoid.datasets.<name>.pruning_script | Script to run after pruning snapshot.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.forwardAgent | Whether the connection to the authentication agent (if any)
will be forwarded to the remote machine.
|
| options/nixos/services.tor.settings.ServerDNSAllowNonRFC953Hostnames | See torrc manual.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.enable | Whether to enable mujmap JMAP synchronization for notmuch.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.remove | Propagate mailbox deletions to the given mail store.
|
| options/home-manager/accounts.email.accounts.<name>.alot.extraConfig | Extra settings to add to this Alot account configuration.
|
| options/nixos/services.invoiceplane.sites.<name>.invoiceTemplates | List of path(s) to respective template(s) which are copied from the 'invoice_templates/pdf' directory.
These templates need to be packaged before use, see example.
|
| options/nixos/systemd.user.paths.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.authelia.instances.<name>.secrets.storageEncryptionKeyFile | Path to your storage encryption key.
|
| options/nixos/services.woodpecker-agents.agents.<name>.environmentFile | File to load environment variables
from
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Label | This required key uniquely identifies the job to launchd.
|
| options/nixos/systemd.sockets.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/systemd.targets.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/home-manager/services.activitywatch.watchers.<name>.extraOptions | Extra arguments to be passed to the watcher executable.
|
| options/nixos/services.wstunnel.clients.<name>.upgradeCredentials | Use these credentials to authenticate during the HTTP upgrade request
(Basic authorization type, USER:[PASS]).
Passwords specified here will be world-readable in the Nix store!
To pass a password to the service, point the environmentFile option
to a file containing HTTP_PASSWORD=<your-password-here> and set this
option to <user>:$HTTP_PASSWORD
|
| options/nixos/virtualisation.oci-containers.containers.<name>.capabilities | Capabilities to configure for the container
|
| options/home-manager/accounts.email.accounts.<name>.folders.inbox | Relative path of the inbox mail.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.hidden | Whether the node should occupy any space.
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.slot | Require pg_receivewal to use an existing replication slot (see
Section 26.2.6 of the PostgreSQL manual)
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.WatchPaths | This optional key causes the job to be started if any one of the listed paths are modified.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.set_mark_out | Netfilter mark applied to packets after the outbound IPsec SA processed
them
|
| options/nixos/hardware.sane.brscan4.netDevices.<name>.model | The model of the network device.
|
| options/nixos/hardware.sane.brscan5.netDevices.<name>.model | The model of the network device.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.MulticastGroup | This optional key can be used to request that the datagram socket join a multicast group
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.vips | List of virtual IPs to request in IKEv2 configuration payloads or IKEv1
Mode Config
|
| options/home-manager/accounts.contact.accounts.<name>.remote.type | The type of the storage.
|
| options/nixos/services.cloudflared.tunnels.<name>.credentialsFile | Credential file
|
| options/darwin/launchd.agents.<name>.serviceConfig.Umask | This optional key specifies what value should be passed to umask(2) before running the job
|
| options/nixos/services.kerberos_server.settings.realms.<name>.acl | The privileges granted to a user.
|
| options/home-manager/programs.obsidian.vaults.<name>.target | Path to target vault relative to the user's HOME.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.follow | Whether focus should follow the node when it is moved.
|
| options/home-manager/accounts.email.accounts.<name>.folders.trash | Relative path of the deleted mail folder.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.sticky | Whether the node should stay on the focused desktop.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.ppk_id | String identifying the Postquantum Preshared Key (PPK) to be used.
|
| options/nixos/services.gitea.dump.file | Filename to be used for the dump
|
| options/nixos/services.hddfancontrol.settings.<drive-bay-name>.pwmPaths | PWM filepath(s) to control fan speed (under /sys), followed by initial and fan-stop PWM values
Can also use command substitution to ensure the correct hwmonX is selected on every boot
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.start_action | Action to perform after loading the configuration.
- The default of
none loads the connection only, which
then can be manually initiated or used as a responder configuration.
- The value
trap installs a trap policy, which triggers
the tunnel as soon as matching traffic has been detected.
- The value
start initiates the connection actively.
- Since version 5.9.6 two modes above can be combined with
trap|start,
to immediately initiate a connection for which trap policies have been installed
|
| options/nixos/networking.greTunnels.<name>.ttl | The time-to-live/hoplimit of the connection to the remote tunnel endpoint.
|
| options/nixos/services.rke2.autoDeployCharts.<name>.extraFieldDefinitions | Extra HelmChart field definitions that are merged with the rest of the HelmChart
custom resource
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.create | Automatically create missing mailboxes within the
given mail store.
|
| options/nixos/boot.specialFileSystems.<name>.mountPoint | Location where the file system will be mounted
|
| options/nixos/systemd.network.networks.<name>.routes | A list of route sections to be added to the unit
|
| options/nixos/security.auditd.plugins.<name>.format | Binary passes the data exactly as the audit event dispatcher gets it from
the audit daemon
|
| options/nixos/environment.etc.<name>.source | Path of the source file.
|
| options/darwin/environment.etc.<name>.source | Path of the source file.
|
| options/nixos/services.prometheus.exporters.dmarc.imap.username | Login username for the IMAP connection.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.marked | Whether the node will be marked for deferred actions.
|
| options/nixos/services.archisteamfarm.bots.<name>.passwordFile | Path to a file containing the password
|
| options/nixos/security.acme.certs.<name>.reloadServices | The list of systemd services to call systemctl try-reload-or-restart
on.
|
| options/nixos/services.sanoid.datasets.<name>.script_timeout | Time limit for pre/post/pruning script execution time (<=0 for infinite).
|
| options/nixos/services.filesender.database.hostname | Database hostname.
|
| options/home-manager/accounts.contact.accounts.<name>.khal.enable | Whether to enable khal access.
|
| options/nixos/systemd.network.netdevs.<name>.vrfConfig | Each attribute in this set specifies an option in the
[VRF] section of the unit
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StartOnMount | This optional key causes the job to be started every time a filesystem is mounted.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.visibleName | The profile name.
|
| options/nixos/systemd.user.targets.<name>.requisite | Similar to requires
|
| options/nixos/systemd.user.paths.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.user.sockets.<name>.requisite | Similar to requires
|
| options/home-manager/launchd.agents.<name>.config.StandardInPath | This optional key specifies what file should be used for data being supplied to stdin when using
stdio(3).
|
| options/nixos/services.zoneminder.database.username | Username for accessing the database.
|
| options/home-manager/xdg.configFile.<name>.recursive | If the file source is a directory, then this option
determines whether the directory should be recursively
linked to the target location
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.pull | If the default of yes is used, Mode Config works in pull mode, where the
initiator actively requests a virtual IP
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.GroupName | This optional key specifies the group to run the job as
|
| options/home-manager/xdg.configFile.<name>.executable | Set the execute bit
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.locked | Whether the node should ignore node --close
messages.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.center | Whether the node will be put in the center, in floating mode.
|
| options/nixos/services.grav.pool | Name of existing phpfpm pool that is used to run web-application
|
| options/nixos/services.keepalived.vrrpInstances.<name>.trackInterfaces | List of network interfaces to monitor for health tracking.
|
| options/nixos/services.matomo.webServerUser | Name of the web server user that forwards requests to services.phpfpm.pools.<name>.socket the fastcgi socket for Matomo if the nginx
option is not used
|
| options/home-manager/programs.gradle.initScripts.<name>.source | Path of the init script file
|
| options/nixos/services.monero.rpc.user | User name for RPC connections.
|
| options/nixos/systemd.slices.<name>.requisite | Similar to requires
|
| options/nixos/systemd.timers.<name>.requisite | Similar to requires
|
| options/home-manager/xdg.desktopEntries.<name>.settings | Extra key-value pairs to add to the [Desktop Entry] section
|
| options/nixos/systemd.network.networks.<name>.enable | Whether to manage network configuration using systemd-network
|
| options/nixos/systemd.network.networks.<name>.tunnel | A list of tunnel interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.network.networks.<name>.bridge | A list of bridge interfaces to be added to the network section of the
unit
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.handle | Hex-encoded CKA_ID or handle of the certificate on a token or TPM,
respectively
|
| options/home-manager/accounts.calendar.accounts.<name>.khal.glob | The glob expansion to be searched for events or birthdays when
type is set to discover.
|
| options/nixos/services.taskserver.organisations.<name>.groups | A list of group names that belong to the organization.
|
| options/nixos/services.gitea.appName | Application name.
|
| options/darwin/launchd.agents.<name>.serviceConfig.ExitTimeOut | The amount of time launchd waits before sending a SIGKILL signal
|
| options/home-manager/programs.floorp.profiles.<name>.search.order | The order the search engines are listed in
|
| options/home-manager/accounts.email.accounts.<name>.primary | Whether this is the primary account
|
| options/home-manager/accounts.calendar.accounts.<name>.khal.type | Either a single calendar (calendar which is the default) or a directory with multiple calendars (discover).
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.readPermissions | The read permissions to include for this token
|
| options/nixos/services.pantalaimon-headless.instances.<name>.listenPort | The port where the daemon will listen to client connections for
this homeserver
|
| options/home-manager/programs.streamlink.plugins.<name>.settings | Configuration for the specific plugin, written to
$XDG_CONFIG_HOME/streamlink/config. (linux) or
Library/Application Support/streamlink/config. (darwin).
|
| options/home-manager/accounts.calendar.accounts.<name>.local.path | The path of the storage.
|
| options/home-manager/accounts.calendar.accounts.<name>.local.type | The type of the storage.
|
| options/nixos/services.dovecot2.mailboxes.<name>.autoexpunge | To automatically remove all email from the mailbox which is older than the
specified time.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Debug | This optional key specifies that launchd should adjust its log mask temporarily to LOG_DEBUG while
dealing with this job.
|
| options/home-manager/launchd.agents.<name>.config.StandardOutPath | This optional key specifies what file should be used for data being sent to stdout when using stdio(3).
|
| options/nixos/image.repart.partitions.<name>.storePaths | The store paths to include in the partition.
|
| options/home-manager/programs.retroarch.cores.<name>.enable | Whether to enable RetroArch core.
|
| options/nixos/services.tlsrpt.collectd.settings.socketname | Path at which the UNIX socket will be created.
|
| options/nixos/programs.tsmClient.servers.<name>.tcpport | TCP port of the IBM TSM server
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.type | Type of this transport
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.cacert | The certificates may use a relative path from the swanctl
x509ca directory or an absolute path
|
| options/home-manager/accounts.email.accounts.<name>.getmail.readAll | Enable if you want to fetch all, even the read messages from the
server
|
| options/nixos/services.minidlna.settings.friendly_name | Name that the server presents to clients.
|
| options/nixos/services.reposilite.settings.hostname | The hostname to bind to
|
| options/nixos/services.prometheus.exporters.sql.configuration.jobs.<name>.queries | SQL queries to run.
|
| options/nixos/systemd.network.netdevs.<name>.vxlanConfig | Each attribute in this set specifies an option in the
[VXLAN] section of the unit
|
| options/darwin/launchd.daemons.<name>.serviceConfig.RunAtLoad | This optional key is used to control whether your job is launched once at the time the job is loaded
|
| options/home-manager/programs.ssh.matchBlocks.<name>.addressFamily | Specifies which address family to use when connecting.
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.host | Host for the api or remote transport
|
| options/nixos/systemd.network.networks.<name>.bridgeFDBs | A list of BridgeFDB sections to be added to the unit
|
| options/nixos/systemd.network.networks.<name>.bridgeMDBs | A list of BridgeMDB sections to be added to the unit
|
| options/nixos/systemd.user.paths.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.path | Path to the socket for local or remote transports
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.port | Port to connect to for the api or remote transport
|
| options/home-manager/accounts.email.accounts.<name>.meli.settings | Account specific meli configuration
|
| options/nixos/services.tarsnap.archives.<name>.aggressiveNetworking | Upload data over multiple TCP connections, potentially
increasing tarsnap's bandwidth utilisation at the cost
of slowing down all other network traffic
|
| options/nixos/systemd.sockets.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.targets.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/services.gerrit.plugins | List of plugins to add to Gerrit
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.encap | To enforce UDP encapsulation of ESP packets, the IKE daemon can fake the
NAT detection payloads
|
| options/darwin/launchd.daemons.<name>.serviceConfig | Each attribute in this set specifies an option for a key in the plist.
https://developer.apple.com/legacy/library/documentation/Darwin/Reference/ManPages/man5/launchd.plist.5.html
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags.deleted | Tag for notmuch to use for messages stored in the mailbox labeled with the
Trash name attribute
|
| options/home-manager/launchd.agents.<name>.config.WaitForDebugger | This optional key specifies that launchd should instruct the kernel to have the job wait for a debugger
to attach before any code in the job is executed.
|
| options/home-manager/accounts.contact.accounts.<name>.khard.type | Either a single vdir located in accounts.contact.accounts._name_.local.path
or multiple automatically discovered vdirs in
accounts.contact.accounts._name_.local.path/accounts.contact.accounts._name_.khard.glob.
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.writePermissions | The read permissions to include for this token
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.MulticastGroup | This optional key can be used to request that the datagram socket join a multicast group
|
| options/darwin/launchd.daemons.<name>.serviceConfig.UserName | This optional key specifies the user to run the job as
|
| options/nixos/services.mjolnir.pantalaimon.username | The username to login with.
|
| options/home-manager/accounts.email.accounts.<name>.jmap.sessionUrl | URL for the JMAP Session resource
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local | Section for a local authentication round
|
| options/home-manager/systemd.user.paths.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/nixos/systemd.shutdownRamfs.contents.<name>.text | Text of the file.
|
| options/nixos/services.system76-scheduler.assignments.<name>.matchers | Process matchers.
|
| options/darwin/launchd.agents.<name>.serviceConfig.WatchPaths | This optional key causes the job to be started if any one of the listed paths are modified.
|
| options/home-manager/programs.smug.projects.<name>.windows.*.root | Root path of window
|
| options/home-manager/accounts.email.accounts.<name>.neomutt.enable | Whether to enable NeoMutt.
|
| options/home-manager/programs.irssi.networks.<name>.server.address | Address of the chat server.
|
| options/home-manager/accounts.email.accounts.<name>.astroid.enable | Whether to enable Astroid.
|
| options/home-manager/programs.vscode.profiles.<name>.userTasks | Configuration written to Visual Studio Code's
tasks.json
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.settings.<name>.settings | Json formatted options for this extension.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.OnDemand | This key was used in Mac OS X 10.4 to control whether a job was kept alive or not
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rekey_packets | Number of packets processed before initiating CHILD_SA rekeying
|
| options/nixos/systemd.sockets.<name>.listenStreams | For each item in this list, a ListenStream
option in the [Socket] section will be created.
|
| options/darwin/environment.etc.<name>.enable | Whether this file should be generated
|
| options/home-manager/programs.ssh.matchBlocks.<name>.controlMaster | Configure sharing of multiple sessions over a single network connection.
|
| options/nixos/services.anubis.instances | An attribute set of Anubis instances
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.directory | Directory to write the output to.
|
| options/home-manager/accounts.email.accounts.<name>.flavor | Some email providers have peculiar behavior that require
special treatment
|
| options/home-manager/accounts.calendar.accounts.<name>.local.encoding | File encoding for items, both content and file name
|
| options/darwin/launchd.daemons.<name>.serviceConfig.TimeOut | The recommended idle time out (in seconds) to pass to the job
|
| options/home-manager/launchd.agents.<name>.config.SessionCreate | This key specifies that the job should be spawned into a new security
audit session rather than the default session for the context is belongs
to
|
| options/nixos/systemd.network.netdevs.<name>.fooOverUDPConfig | Each attribute in this set specifies an option in the
[FooOverUDP] section of the unit
|
| options/nixos/systemd.network.networks.<name>.canConfig | Each attribute in this set specifies an option in the
[CAN] section of the unit
|
| options/nixos/systemd.network.networks.<name>.pieConfig | Each attribute in this set specifies an option in the
[PIE] section of the unit
|
| options/home-manager/programs.rclone.remotes.<name>.mounts | An attribute set mapping remote file paths to their corresponding mount
point configurations
|
| options/nixos/systemd.network.networks.<name>.domains | A list of domains to pass to the network config.
|
| options/home-manager/programs.floorp.profiles.<name>.userChrome | Custom Floorp user chrome CSS.
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.compress | Enables gzip compression of write-ahead logs, and specifies the compression level
(0 through 9, 0 being no compression and 9 being best compression)
|
| options/nixos/services.sanoid.templates.<name>.pruning_script | Script to run after pruning snapshot.
|
| options/home-manager/accounts.contact.accounts.<name>.remote | Remote configuration for the contacts.
|
| options/home-manager/programs.i3status.modules.<name>.enable | Whether or not to enable this module.
|
| options/home-manager/accounts.email.accounts.<name>.notmuch.enable | Whether to enable notmuch indexing.
|
| options/home-manager/accounts.contact.accounts.<name>.khard.enable | Whether to enable khard access.
|
| options/nixos/systemd.network.networks.<name>.bridgeVLANs | A list of BridgeVLAN sections to be added to the unit
|
| options/home-manager/programs.ssh.matchBlocks.<name>.identityFile | Specifies files from which the user identity is read
|
| options/home-manager/accounts.email.accounts.<name>.msmtp.extraConfig | Extra configuration options to add to ~/.msmtprc
|
| options/nixos/services.prometheus.exporters.sql.configuration.jobs.<name>.startupSql | A list of SQL statements to execute once after making a connection.
|
| options/nixos/services.icingaweb2.modules.monitoring.backends.<name>.disabled | Disable this backend
|
| options/home-manager/accounts.calendar.accounts.<name>.remote.url | The URL of the storage.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.imapOauth2Params.scope | The OAuth2 requested scope.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.smtpOauth2Params.scope | The OAuth2 requested scope.
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.splitRatio | The ratio between the new window and the previous existing window in
the desktop.
|
| options/home-manager/programs.alot.tags.<name>.translated | Fixed string representation for this tag
|
| options/nixos/security.apparmor.policies.<name>.path | A path of a profile file to include
|
| options/nixos/systemd.user.slices.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.user.timers.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/home-manager/accounts.email.accounts.<name>.folders.drafts | Relative path of the drafts mail folder.
|
| options/home-manager/accounts.calendar.accounts.<name>.khal.readOnly | Keep khal from making any changes to this account.
|
| options/nixos/services.bcg.device | Device name to configure gateway to use.
|
| options/home-manager/programs.firefox.profiles.<name>.search | Declarative search engine configuration.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.app | Settings to write to app.json.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.monitor | The monitor where the rule should be applied.
|
| options/home-manager/accounts.calendar.accounts.<name>.local.fileExt | The file extension to use.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.desktop | The desktop where the rule should be applied.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.supplementaryScopeMaps | Maps kanidm groups to additionally returned oauth scopes
|
| options/darwin/launchd.agents.<name>.serviceConfig.StartOnMount | This optional key causes the job to be started every time a filesystem is mounted.
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.iterationStep | How much the iteration count for PBKDF2 is increased at each successful authentication.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.manage | Whether the window should be managed by bspwm
|
| options/home-manager/fonts.fontconfig.configFile.<name>.enable | Whether to enable Whether this font config file should be generated..
|
| options/home-manager/accounts.email.accounts.<name>.getmail.enable | Whether to enable the getmail mail retriever for this account.
|
| options/nixos/environment.etc.<name>.enable | Whether this /etc file should be generated
|
| options/nixos/networking.greTunnels.<name>.type | Whether the tunnel routes layer 2 (tap) or layer 3 (tun) traffic.
|
| options/home-manager/launchd.agents.<name>.config.KeepAlive | This optional key is used to control whether your job is to be kept continuously running or to let
demand and conditions control the invocation
|
| options/nixos/systemd.network.networks.<name>.ipoIBConfig | Each attribute in this set specifies an option in the
[IPoIB] section of the unit
|
| options/nixos/security.acme.certs.<name>.inheritDefaults | Whether to inherit values set in security.acme.defaults or not.
|
| options/home-manager/programs.smug.projects.<name>.windows.*.panes | Panes to open in a window.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.identityAgent | Specifies the location of the ssh identity agent.
|
| options/nixos/boot.initrd.luks.devices.<name>.fido2.credential | The FIDO2 credential ID.
|
| options/darwin/launchd.agents.<name>.serviceConfig.GroupName | This optional key specifies the group to run the job as
|
| options/home-manager/programs.lutris.runners.<name>.package | The package to use for this runner, nix will try to find the executable for this package
|
| options/home-manager/programs.floorp.profiles.<name>.isDefault | Whether this is a default profile.
|
| options/home-manager/programs.sftpman.mounts.<name>.mountOptions | Options to pass to sshfs.
|
| options/nixos/services.sanoid.templates.<name>.script_timeout | Time limit for pre/post/pruning script execution time (<=0 for infinite).
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.InitGroups | This optional key specifies whether initgroups(3) should be called before running the job
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.MachServices | This optional key is used to specify Mach services to be registered with the Mach bootstrap sub-system
|
| options/home-manager/fonts.fontconfig.configFile.<name>.source | Config file to source
|
| options/nixos/services.prometheus.exporters.mqtt.mqttUsername | Username which should be used to authenticate against the MQTT broker.
|
| options/nixos/systemd.network.netdevs.<name>.matchConfig | Each attribute in this set specifies an option in the
[Match] section of the unit
|
| options/home-manager/accounts.calendar.accounts.<name>.khal.color | Color in which events in this calendar are displayed
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.ah_proposals | AH proposals to offer for the CHILD_SA
|
| options/nixos/security.pam.services.<name>.googleOsLoginAccountVerification | If set, will use the Google OS Login PAM modules
(pam_oslogin_login,
pam_oslogin_admin) to verify possible OS Login
users and set sudoers configuration accordingly
|
| options/nixos/systemd.network.networks.<name>.extraConfig | Extra configuration append to unit
|
| options/nixos/systemd.user.slices.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.user.timers.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.simplesamlphp.<name>.configureNginx | Configure nginx as a reverse proxy for SimpleSAMLphp.
|
| options/nixos/programs.schroot.profiles.<name>.fstab | A file in the format described in fstab(5), used to mount filesystems inside the chroot
|
| options/home-manager/programs.floorp.profiles.<name>.search.force | Whether to force replace the existing search
configuration
|
| options/home-manager/programs.thunderbird.profiles.<name>.accountsOrder | Custom ordering of accounts and local folders in
Thunderbird's folder pane
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.expunge | Permanently remove messages marked for deletion from
the given mail store.
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.settings.<name>.force | Forcibly override any existing configuration for
this extension.
|
| options/nixos/systemd.targets.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/systemd.sockets.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote | Section for a remote authentication round
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Umask | This optional key specifies what value should be passed to umask(2) before running the job
|
| options/nixos/networking.macvlans.<name>.mode | The mode of the macvlan device.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.localForwards.*.host.port | Specifies port number to forward to.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.private | Whether the node should stay in the same tiling position and size.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.localForwards.*.bind.port | Specifies port number to bind to.
|
| options/nixos/services.tor.client.onionServices.<name>.clientAuthorizations | Clients' authorizations for a v3 onion service,
as a list of files containing each one private key, in the format:
descriptor:x25519:<base32-private-key>
See torrc manual.
|
| options/nixos/services.bacula-sd.autochanger.<name>.extraAutochangerConfig | Extra configuration to be passed in Autochanger directive.
|
| options/nixos/services.mautrix-meta.instances.<name>.serviceDependencies | List of Systemd services to require and wait for when starting the application service.
|
| options/nixos/systemd.network.networks.<name>.linkConfig | Each attribute in this set specifies an option in the
[Link] section of the unit
|
| options/nixos/systemd.network.networks.<name>.lldpConfig | Each attribute in this set specifies an option in the
[LLDP] section of the unit
|
| options/nixos/systemd.network.networks.<name>.cakeConfig | Each attribute in this set specifies an option in the
[CAKE] section of the unit
|
| options/nixos/fileSystems.<name>.encrypted.enable | The block device is backed by an encrypted one, adds this device as a initrd luks entry.
|
| options/nixos/networking.bonds.<name>.miimon | DEPRECATED, use driverOptions
|
| options/nixos/users.users.<name>.ignoreShellProgramCheck | By default, nixos will check that programs
|
| options/home-manager/accounts.calendar.accounts.<name>.remote.type | The type of the storage.
|
| options/nixos/services.cloudflared.tunnels.<name>.certificateFile | Account certificate file, necessary to create, delete and manage tunnels
|
| options/nixos/security.apparmor.policies.<name>.state | How strictly this policy should be enforced
|
| options/home-manager/accounts.calendar.accounts.<name>.local | Local configuration for the calendar.
|
| options/home-manager/programs.irssi.networks.<name>.channels | Channels for the given network.
|
| options/nixos/services.prometheus.exporters.sql.configuration.jobs.<name>.interval | How often to run this job, specified in
Go duration format.
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.extraConfig.local | Local store extra configuration.
|
| options/home-manager/programs.obsidian.defaultSettings.corePlugins.*.name | The plugin.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.ServiceIPC | This optional key specifies whether the job participates in advanced
communication with launchd
|
| options/nixos/ec2.zfs.datasets.<name>.properties | Properties to set on this dataset.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.flatten | If set, flattens the hierarchy within the maildir by
substituting the canonical hierarchy delimiter
/ with this value.
|
| options/darwin/users.groups.<name>.description | The group's description.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.mediated_by | The name of the connection to mediate this connection through
|
| options/home-manager/programs.ssh.matchBlocks.<name>.serverAliveCountMax | Sets the number of server alive messages which may be sent
without SSH receiving any messages back from the server.
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.settings.<name>.settings | Json formatted options for this extension.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.version | IKE major version to use for connection.
- 1 uses IKEv1 aka ISAKMP,
- 2 uses IKEv2.
- A connection using the default of 0 accepts both IKEv1 and IKEv2 as
responder, and initiates the connection actively with IKEv2
|
| options/nixos/services.kerberos_server.settings.realms.<name>.acl.*.target | The principals that 'access' applies to.
|
| options/darwin/users.users.<name>.ignoreShellProgramCheck | By default, nix-darwin will check that programs
|
| options/nixos/systemd.network.networks.<name>.address | A list of addresses to be added to the network section of the
unit
|
| options/nixos/systemd.network.networks.<name>.gateway | A list of gateways to be added to the network section of the
unit
|
| options/nixos/programs.xfs_quota.projects.<name>.id | Project ID.
|
| options/home-manager/programs.firefox.profiles.<name>.search.order | The order the search engines are listed in
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.mobike | Enables MOBIKE on IKEv2 connections
|
| options/nixos/security.auditd.plugins.<name>.settings | Plugin-specific config file to link to /etc/audit/.conf
|
| options/home-manager/programs.lutris.runners.<name>.settings | Settings passed directly to lutris for this runner's config at XDG_CONFIG/lutris/runners.
|
| options/home-manager/launchd.agents.<name>.config.RootDirectory | This optional key is used to specify a directory to chroot(2) to before running the job.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.localForwards | Specify local port forwardings
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.crl_uris | List of CRL distribution points (ldap, http, or file URI)
|
| options/nixos/services.prometheus.exporters.imap-mailstat.accounts.<name>.serverport | imap port number (at the moment only tls connection is supported)
|
| options/nixos/systemd.paths.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/networking.greTunnels.<name>.local | The address of the local endpoint which the remote
side should send packets to.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Program | This key maps to the first argument of execvp(3)
|
| options/home-manager/accounts.calendar.accounts.<name>.qcal.enable | Whether to enable qcal access.
|
| options/home-manager/accounts.calendar.accounts.<name>.khal.enable | Whether to enable khal access.
|
| options/nixos/services.artalk.user | Artalk user name.
|
| options/nixos/services.sogo.vhostName | Name of the nginx vhost
|
| options/nixos/services.zammad.user | Name of the Zammad user.
|
| options/nixos/services.prometheus.exporters.imap-mailstat.accounts.<name>.serveraddress | mailserver name or address
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.packages | List of ‹name› add-on packages to install for this profile
|
| options/nixos/systemd.network.networks.<name>.macvtap | A list of macvtap interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.network.netdevs.<name>.tunnelConfig | Each attribute in this set specifies an option in the
[Tunnel] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.bridgeConfig | Each attribute in this set specifies an option in the
[Bridge] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.netdevConfig | Each attribute in this set specifies an option in the
[Netdev] section of the unit
|
| options/nixos/systemd.network.networks.<name>.macvlan | A list of macvlan interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.network.netdevs.<name>.ipvlanConfig | Each attribute in this set specifies an option in the [IPVLAN] section of the unit
|
| options/nixos/systemd.network.netdevs.<name>.ipvtapConfig | Each attribute in this set specifies an option in the [IPVTAP] section of the unit
|
| options/home-manager/programs.floorp.profiles.<name>.extraConfig | Extra preferences to add to user.js.
|
| options/home-manager/accounts.email.accounts.<name>.getmail.delete | Enable if you want to delete read messages from the server
|
| options/home-manager/accounts.email.accounts.<name>.msmtp.enable | Whether to enable msmtp
|
| options/nixos/services.echoip.enableReverseHostnameLookups | Whether to enable reverse hostname lookups.
|
| options/nixos/services.suwayomi-server.settings.server.basicAuthUsername | The username value that you have to provide when authenticating.
|
| options/nixos/systemd.user.slices.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/systemd.user.timers.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/darwin/launchd.daemons.<name>.serviceConfig.ExitTimeOut | The amount of time launchd waits before sending a SIGKILL signal
|
| options/home-manager/systemd.user.slices.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/home-manager/systemd.user.mounts.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/home-manager/systemd.user.timers.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/nixos/services.pantalaimon-headless.instances.<name>.listenAddress | The address where the daemon will listen to client connections
for this homeserver.
|
| options/home-manager/launchd.agents.<name>.config.LimitLoadToSessionType | This configuration file only applies to sessions of the type specified
|
| options/home-manager/accounts.email.accounts.<name>.aerc.smtpOauth2Params | Sets the oauth2 params if authentication mechanism oauthbearer or
xoauth2 is used
|
| options/home-manager/accounts.email.accounts.<name>.aerc.imapOauth2Params | Sets the oauth2 params if authentication mechanism oauthbearer or
xoauth2 is used
|
| options/nixos/services.neo4j.ssl.policies | Defines the SSL policies for use with Neo4j connectors
|
| options/nixos/security.pam.services | This option defines the PAM services
|
| options/home-manager/launchd.agents.<name>.config.StandardErrorPath | This optional key specifies what file should be used for data being sent to stderr when using stdio(3).
|
| options/home-manager/launchd.agents.<name>.config.EnableGlobbing | This flag causes launchd to use the glob(3) mechanism to update the program arguments before invocation.
|
| options/darwin/launchd.agents.<name>.serviceConfig.OnDemand | This key was used in Mac OS X 10.4 to control whether a job was kept alive or not
|
| options/nixos/systemd.paths.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.targets.<name>.requisite | Similar to requires
|
| options/nixos/systemd.sockets.<name>.requisite | Similar to requires
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.subFolders | The on-disk folder naming style
|
| options/nixos/services.kapacitor.defaultDatabase.username | The username to connect to the remote InfluxDB server
|
| options/home-manager/accounts.email.accounts.<name>.aerc.extraConfig | Config specific to this account, added to $HOME/.config/aerc/aerc.conf
|
| options/nixos/systemd.user.paths.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/services.icecream.daemon.netName | Network name to connect to
|
| options/nixos/services.tt-rss.email.fromName | Name for sending outgoing mail
|
| options/home-manager/home.file.<name>.ignorelinks | When recursive is enabled, adds -ignorelinks flag to lndir
It causes lndir to not treat symbolic links in the source directory specially
|
| options/nixos/systemd.network.networks.<name>.dhcpV4Config | Each attribute in this set specifies an option in the
[DHCPv4] section of the unit
|
| options/nixos/systemd.network.networks.<name>.dhcpV6Config | Each attribute in this set specifies an option in the
[DHCPv6] section of the unit
|
| options/nixos/services.headscale.settings.dns.nameservers.global | List of nameservers to pass to Tailscale clients.
|
| options/home-manager/programs.irssi.networks.<name>.server.autoConnect | Whether Irssi connects to the server on launch.
|
| options/nixos/services.nvme-rs.settings.email.smtp_username | SMTP username
|
| options/nixos/security.pam.services.<name>.googleOsLoginAuthentication | If set, will use the pam_oslogin_login's user
authentication methods to authenticate users using 2FA
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LaunchOnlyOnce | This optional key specifies whether the job can only be run once and only once
|
| options/home-manager/accounts.email.accounts.<name>.alot.sendMailCommand | Command to send a mail
|
| options/nixos/boot.initrd.luks.devices.<name>.tryEmptyPassphrase | If keyFile fails then try an empty passphrase first before
prompting for password.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.controlPersist | Whether control socket should remain open in the background.
|
| options/nixos/services.sftpgo.user | User account name under which SFTPGo runs.
|
| options/nixos/services.tor.relay.onionServices.<name>.settings.HiddenServiceNumIntroductionPoints | See torrc manual.
|
| options/home-manager/programs.hexchat.channels.<name>.charset | Character set.
|
| options/home-manager/programs.hexchat.channels.<name>.options | Channel options.
|
| options/nixos/boot.initrd.systemd.contents.<name>.dlopen.features | Features to enable via dlopen ELF notes
|
| options/darwin/launchd.daemons.<name>.serviceConfig.WatchPaths | This optional key causes the job to be started if any one of the listed paths are modified.
|
| options/home-manager/accounts.email.accounts.<name>.signature.text | Signature content.
|
| options/nixos/services.pantalaimon-headless.instances.<name>.extraSettings | Extra configuration options
|
| options/home-manager/programs.i3status-rust.bars.<name>.settings | Any extra options to add to i3status-rust
config.
|
| options/home-manager/programs.librewolf.profiles.<name>.id | Profile ID
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.split_exclude | Address or CIDR subnets
StrongSwan default: []
|
| options/nixos/services.strongswan-swanctl.swanctl.pools.<name>.split_include | Address or CIDR subnets
StrongSwan default: []
|
| options/nixos/systemd.network.networks.<name>.qdiscConfig | Each attribute in this set specifies an option in the
[QDisc] section of the unit
|
| options/nixos/systemd.network.networks.<name>.pfifoConfig | Each attribute in this set specifies an option in the
[PFIFO] section of the unit
|
| options/nixos/systemd.network.networks.<name>.bfifoConfig | Each attribute in this set specifies an option in the
[BFIFO] section of the unit
|
| options/home-manager/programs.floorp.profiles.<name>.userContent | Custom Floorp user content CSS.
|
| options/home-manager/programs.firefox.profiles.<name>.userChrome | Custom Firefox user chrome CSS.
|
| options/nixos/services.dolibarr.h2o.serverName | Server name to be used for this virtual host
|
| options/home-manager/programs.anki.sync.username | Sync account username.
|
| options/home-manager/accounts.email.accounts.<name>.meli.mailboxes | Mailboxes to show in meli
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.patterns | Pattern of mailboxes to synchronize.
|
| options/darwin/launchd.agents.<name>.serviceConfig.InitGroups | This optional key specifies whether initgroups(3) should be called before running the job
|
| options/home-manager/programs.floorp.profiles.<name>.search.default | The default search engine used in the address bar and search
bar.
|
| options/home-manager/programs.lutris.runners.<name>.settings.system | Lutris system options for this runner
|
| options/nixos/services.bind.enable | Whether to enable BIND domain name server.
|
| options/home-manager/programs.floorp.profiles.<name>.preConfig | Extra preferences to add to user.js, before
programs.firefox.profiles._name_.settings
|
| options/nixos/services.hddfancontrol.settings.<drive-bay-name>.logVerbosity | Verbosity of the log level
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_log_config | The file for log configuration
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.enableRecommendedPairwiseCiphers | Additionally enable the recommended set of pairwise ciphers
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.remoteForwards.*.bind.port | Specifies port number to bind to.
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.remoteForwards.*.host.port | Specifies port number to forward to.
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.disableChunkedEncoding | Disables chunked transfer encoding
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.ocsp_uris | List of OCSP URIs
|
| options/home-manager/programs.smug.projects.<name>.windows.*.layout | Layout of window when opening panes.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.localForwards.*.host | Host port binding options
|
| options/home-manager/programs.smug.projects.<name>.windows.*.panes.*.type | Type of pane.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.localForwards.*.bind | Local port binding options
|
| options/darwin/launchd.agents.<name>.serviceConfig.MachServices | This optional key is used to specify Mach services to be registered with the Mach bootstrap sub-system
|
| options/nixos/systemd.user.targets.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.user.sockets.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/home-manager/programs.hexchat.channels.<name>.servers | IRC Server Address List.
|
| options/nixos/boot.initrd.luks.devices.<name>.fallbackToPassword | Whether to fallback to interactive passphrase prompt if the keyfile
cannot be found
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings | Settings which are applied to .gmailieer.json
for the account
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.extraConfig.remote | Remote store extra configuration.
|
| options/nixos/programs.xfs_quota.projects.<name>.path | Project directory.
|
| options/home-manager/programs.librewolf.profiles.<name>.path | Profile path.
|
| options/nixos/systemd.paths.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/darwin/launchd.daemons.<name>.serviceConfig.StartOnMount | This optional key causes the job to be started every time a filesystem is mounted.
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.packages | List of ‹name› add-on packages to install for this profile
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups | Some email providers (Gmail) have a different directory hierarchy for
synchronized email messages
|
| options/nixos/boot.specialFileSystems.<name>.device | The device as passed to mount
|
| options/darwin/security.sandbox.profiles.<name>.closure | List of store paths to make accessible.
|
| options/nixos/fileSystems.<name>.overlay.upperdir | The path to the upperdir
|
| options/nixos/services.spacecookie.settings.hostname | The hostname the service is reachable via
|
| options/home-manager/programs.hexchat.channels.<name>.options.forceSSL | Use SSL for all servers.
|
| options/home-manager/accounts.calendar.accounts.<name>.remote | Remote configuration for the calendar.
|
| options/home-manager/programs.firefox.profiles.<name>.isDefault | Whether this is a default profile.
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites.<name>.desktopEntry.categories | Categories in which the entry should be shown in a menu.
|
| options/home-manager/programs.firefox.profiles.<name>.search.force | Whether to force replace the existing search
configuration
|
| options/darwin/launchd.daemons.<name>.serviceConfig.GroupName | This optional key specifies the group to run the job as
|
| options/darwin/launchd.agents.<name>.serviceConfig.ServiceIPC | This optional key specifies whether the job participates in advanced
communication with launchd
|
| options/nixos/networking.greTunnels.<name>.remote | The address of the remote endpoint to forward traffic over.
|
| options/nixos/services.fcron.allow | Users allowed to use fcrontab and fcrondyn (one name per
line, all for everyone).
|
| options/home-manager/programs.smug.projects.<name>.windows.*.manual | Start window only manually, using the -w arg
|
| options/home-manager/launchd.agents.<name>.config.LaunchEvents | Specifies higher-level event types to be used as launch-on-demand event
sources
|
| options/home-manager/xdg.dataFile.<name>.ignorelinks | When recursive is enabled, adds -ignorelinks flag to lndir
It causes lndir to not treat symbolic links in the source directory specially
|
| options/nixos/services.dependency-track.database.username | Username to use when connecting to an external or manually
provisioned database; has no effect when a local database is
automatically provisioned
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags | Tag configuration
|
| options/nixos/networking.supplicant.<name>.bridge | Name of the bridge interface that wpa_supplicant should listen at.
|
| options/nixos/services.kerberos_server.settings.realms.<name>.acl.*.access | The changes the principal is allowed to make.
The "all" permission does not imply the "get-keys" permission
|
| options/nixos/programs.tsmClient.servers.<name>.genPasswd | Whether to enable automatic client password generation
|
| options/nixos/fileSystems.<name>.overlay.lowerdir | The list of path(s) to the lowerdir(s)
|
| options/nixos/image.repart.partitions.<name>.contents | The contents to end up in the filesystem image.
|
| options/home-manager/programs.irssi.networks.<name>.autoCommands | List of commands to execute on connect.
|
| options/nixos/systemd.user.targets.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.user.sockets.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.shutdownRamfs.contents.<name>.target | Path of the symlink.
|
| options/nixos/boot.initrd.systemd.contents.<name>.dlopen.usePriority | Priority of dlopen ELF notes to include. "required" is
minimal, "recommended" includes "required", and
"suggested" includes "recommended"
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.statusInterval | Specifies the number of seconds between status packets sent back to the server
|
| options/home-manager/programs.lutris.runners.<name>.settings.runner | Runner specific options
|
| options/nixos/services.mqtt2influxdb.mqtt.username | Username used to connect to the MQTT server.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.remoteForwards | Specify remote port forwardings
|
| options/nixos/services.r53-ddns.domain | The name of your domain in Route53
|
| options/nixos/services.gitlab.host | GitLab host name
|
| options/nixos/services.gancio.user | The user (and PostgreSQL database name) used to run the gancio server
|
| options/home-manager/launchd.agents.<name>.config.StartInterval | This optional key causes the job to be started every N seconds
|
| options/home-manager/programs.rclone.remotes.<name>.secrets | Sensitive configuration values such as passwords, API keys, and tokens
|
| options/nixos/services.monica.mail.fromName | Mail "from" name.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.if_id_in | XFRM interface ID set on inbound policies/SA, can be overridden by child
config, see there for details
|
| options/darwin/system.activationScripts.<name>.text | Text of the file.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Program | This key maps to the first argument of execvp(3)
|
| options/darwin/launchd.user.agents.<name>.environment | Environment variables passed to the service's processes.
|
| options/nixos/systemd.network.netdevs.<name>.l2tpSessions | Each item in this array specifies an option in the
[L2TPSession] section of the unit
|
| options/nixos/systemd.network.networks.<name>.ipv6SendRAConfig | Each attribute in this set specifies an option in the
[IPv6SendRA] section of the unit
|
| options/home-manager/accounts.email.accounts.<name>.himalaya.enable | Whether to enable the email client Himalaya CLI for this email account.
|
| options/nixos/systemd.shutdownRamfs.contents.<name>.source | Path of the source file.
|
| options/home-manager/xdg.desktopEntries.<name>.startupNotify | If true, it is KNOWN that the application will send a "remove"
message when started with the DESKTOP_STARTUP_ID
environment variable set
|
| options/home-manager/accounts.email.accounts.<name>.neomutt.extraConfig | Extra lines to add to the folder hook for this account.
|
| options/home-manager/accounts.email.accounts.<name>.astroid.extraConfig | Extra settings to add to this astroid account configuration.
|
| options/nixos/systemd.user.sockets.<name>.listenDatagrams | For each item in this list, a ListenDatagram
option in the [Socket] section will be created.
|
| options/home-manager/accounts.email.accounts.<name>.gpg.encryptByDefault | Encrypt outgoing messages by default.
|
| options/nixos/systemd.network.networks.<name>.matchConfig | Each attribute in this set specifies an option in the
[Match] section of the unit
|
| options/nixos/systemd.timers.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.slices.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.mautrix-meta.instances.<name>.registrationServiceUnit | The registration service that generates the registration file
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths | API tokens to provision for the user in this organization.
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.keepAliveConnections | Maximum number of idle keepalive connections between Tunnel and your origin
|
| options/nixos/services.shellhub-agent.preferredHostname | Set the device preferred hostname
|
| options/home-manager/programs.smug.projects.<name>.windows.*.panes.*.root | Root path of pane
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LowPriorityIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O.
|
| options/nixos/programs.tsmClient.servers.<name>.inclexcl | Text lines with include.* and exclude.* directives
to be used when sending files to the IBM TSM server,
or an absolute path pointing to a file with such lines.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.mediation | Whether this connection is a mediation connection, that is, whether this
connection is used to mediate other connections using the IKEv2 Mediation
Extension
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.password | Password for the api transport
|
| options/home-manager/systemd.user.sockets.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/home-manager/systemd.user.targets.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/nixos/services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.filters.*.name | See this list
for the available filters.
|
| options/nixos/systemd.user.slices.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/systemd.user.timers.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.instance | Assign a icinga instance to this transport
|
| options/nixos/systemd.shutdownRamfs.contents.<name>.enable | Whether to enable copying of this file and symlinking it.
|
| options/home-manager/programs.firefox.profiles.<name>.extraConfig | Extra preferences to add to user.js.
|
| options/nixos/systemd.network.netdevs.<name>.macvlanConfig | Each attribute in this set specifies an option in the
[MACVLAN] section of the unit
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits | Resource limits to be imposed on the job
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits | Resource limits to be imposed on the job
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.resource | SSH identity resource for the remote transport
|
| options/nixos/services.pgpkeyserver-lite.hostname | Which hostname to set the vHost to that is proxying to sks.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.unique | Connection uniqueness policy to enforce
|
| options/nixos/services.stargazer.certOrg | The name of the organization responsible for the X.509
certificate's /O name.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.policies_fwd_out | Whether to install outbound FWD IPsec policies or not
|
| options/nixos/systemd.user.targets.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/systemd.user.sockets.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/services.cyrus-imap.user | Cyrus IMAP user name
|
| options/nixos/systemd.slices.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.timers.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.themes | Themes to install.
|
| options/nixos/users.users.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| options/darwin/users.users.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| options/darwin/launchd.agents.<name>.serviceConfig.LaunchOnlyOnce | This optional key specifies whether the job can only be run once and only once
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors | The terminal colors, null to use system default.
|
| options/home-manager/accounts.email.accounts.<name>.notmuch.neomutt.enable | Whether to enable Notmuch support in NeoMutt.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.forwardX11Trusted | Specifies whether remote X11 clients will have full access to the
original X11 display.
|
| options/home-manager/programs.alot.tags.<name>.translation | A pair of strings that define a regular substitution to
compute the string representation on the fly using
re.sub.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags.important | Tag for notmuch to use for messages stored in the mailbox labeled with the
Important name attribute and/or with the $Important
keyword
|
| options/nixos/networking.jool.siit.<name>.framework | The framework to use for attaching Jool's translation to the exist
kernel packet processing rules
|
| options/home-manager/accounts.contact.accounts.<name>.pimsync.enable | Whether to enable synchronization using pimsync.
|
| options/home-manager/programs.papis.libraries.<name>.settings | Configuration for this library.
|
| options/home-manager/accounts.email.accounts.<name>.signature | Signature configuration.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.OnDemand | This key was used in Mac OS X 10.4 to control whether a job was kept alive or not
|
| options/nixos/services.artalk.group | Artalk group name.
|
| options/nixos/services.zammad.group | Name of the Zammad group.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.dpd_delay | Interval to check the liveness of a peer actively using IKEv2
INFORMATIONAL exchanges or IKEv1 R_U_THERE messages
|
| options/nixos/services.simplesamlphp.<name>.settings.baseurlpath | URL where SimpleSAMLphp can be reached.
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.resources.*.names | List of resources to host on this listener.
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/nixos/services.authelia.instances.<name>.environmentVariables | Additional environment variables to provide to authelia
|
| options/home-manager/accounts.contact.accounts.<name>.khal.priority | Priority of a calendar used for coloring (calendar with highest priority is preferred).
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.rand_time | Time range from which to choose a random value to subtract from
rekey/reauth times
|
| options/home-manager/programs.gnome-terminal.profile.<name>.allowBold | If true, allow applications in the
terminal to make text boldface.
|
| options/nixos/systemd.network.networks.<name>.bridgeConfig | Each attribute in this set specifies an option in the
[Bridge] section of the unit
|
| options/nixos/systemd.network.networks.<name>.pfifoFastConfig | Each attribute in this set specifies an option in the
[PFIFOFast] section of the unit
|
| options/nixos/services.avahi.hostName | Host name advertised on the LAN
|
| options/nixos/services.nscd.config | Configuration to use for Name Service Cache Daemon
|
| options/nixos/services.murmur.user | The name of an existing user to use to run the service
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StandardInPath | This optional key specifies what file should be used for data being supplied to stdin when using
stdio(3).
|
| options/home-manager/programs.autorandr.profiles.<name>.hooks | Profile hook scripts.
|
| options/home-manager/launchd.agents.<name>.config.Sockets | This optional key is used to specify launch on demand sockets that can be used to let launchd know when
to run the job
|
| options/nixos/networking.wg-quick.interfaces.<name>.listenPort | 16-bit port for listening
|
| options/nixos/services.btrbk.instances.<name>.settings.stream_compress | Compress the btrfs send stream before transferring it from/to remote locations using a
compression command.
|
| options/nixos/services.wiki-js.settings.db.db | Name of the database to use.
|
| options/nixos/services.weblate.smtp.user | SMTP login name.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings | Settings which are applied to mujmap.toml
for the account
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.settings.<name>.settings | Json formatted options for this extension.
|
| options/home-manager/accounts.email.accounts.<name>.neomutt.mailboxType | Whether this account uses maildir folders or IMAP mailboxes
|
| options/home-manager/programs.ssh.matchBlocks.<name>.remoteForwards.*.host | Host port binding options
|
| options/home-manager/programs.ssh.matchBlocks.<name>.remoteForwards.*.bind | Local port binding options
|
| options/home-manager/accounts.email.accounts.<name>.lieer.sync.frequency | How often to synchronize the account
|
| options/home-manager/i18n.inputMethod.fcitx5.themes.<name>.highlightImage | Path to the SVG of the highlight.
|
| options/nixos/services.sftpgo.group | Group name under which SFTPGo runs.
|
| options/home-manager/programs.irssi.networks.<name>.saslExternal | Enable SASL external authentication
|
| options/nixos/networking.nftables.tables.<name>.enable | Enable this table.
|
| options/nixos/networking.nftables.tables.<name>.family | Table family.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.cursor | The color for the terminal cursor.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.MachServices | This optional key is used to specify Mach services to be registered with the Mach bootstrap sub-system
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.send_cert | Send certificate payloads when using certificate authentication.
- With the default of
ifasked the daemon sends
certificate payloads only if certificate requests have been received.
never disables sending of certificate payloads
altogether,
always causes certificate payloads to be sent
unconditionally whenever certificate authentication is used
|
| options/home-manager/programs.firefox.profiles.<name>.search.default | The default search engine used in the address bar and search
bar.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.extraConfig.channel | Per channel extra configuration.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.extraConfig.account | Account section extra configuration.
|
| options/home-manager/xdg.stateFile.<name>.ignorelinks | When recursive is enabled, adds -ignorelinks flag to lndir
It causes lndir to not treat symbolic links in the source directory specially
|
| options/home-manager/xdg.cacheFile.<name>.ignorelinks | When recursive is enabled, adds -ignorelinks flag to lndir
It causes lndir to not treat symbolic links in the source directory specially
|
| options/nixos/services.keter.bundle.appName | The name keter assigns to this bundle
|
| options/nixos/services.guix.publish.user | Name of the user to change once the server is up.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.extraAccounts | Extra config added to the configuration section for this account in
$HOME/.config/aerc/accounts.conf
|
| options/nixos/services.nextcloud.config.objectstore.s3.hostname | Required for some non-Amazon implementations.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StandardOutPath | This optional key specifies what file should be used for data being sent to stdout when using stdio(3).
|
| options/home-manager/programs.firefox.profiles.<name>.userContent | Custom Firefox user content CSS.
|
| options/nixos/image.repart.partitions.<name>.repartConfig | Specify the repart options for a partiton as a structural setting
|
| options/nixos/services.pantalaimon-headless.instances.<name>.homeserver | The URI of the homeserver that the pantalaimon proxy should
forward requests to, without the matrix API path but including
the http(s) schema.
|
| options/nixos/boot.initrd.luks.devices.<name>.bypassWorkqueues | Whether to bypass dm-crypt's internal read and write workqueues
|
| options/nixos/services.easytier.instances.<name>.settings.network_secret | EasyTier network credential used for verification and
encryption
|
| options/darwin/launchd.daemons.<name>.serviceConfig.InitGroups | This optional key specifies whether initgroups(3) should be called before running the job
|
| options/nixos/users.extraUsers.<name>.ignoreShellProgramCheck | By default, nixos will check that programs
|
| options/nixos/systemd.timers.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/systemd.slices.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/services.cntlm.domain | Proxy account domain/workgroup name.
|
| options/home-manager/programs.firefox.profiles.<name>.preConfig | Extra preferences to add to user.js, before
programs.firefox.profiles._name_.settings
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.if_id_out | XFRM interface ID set on outbound policies/SA, can be overridden by child
config, see there for details
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.boldColor | The bold color, null to use same as foreground.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.loginShell | Run command as a login shell.
|
| options/nixos/networking.interfaces.<name>.useDHCP | Whether this interface should be configured with DHCP
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.WaitForDebugger | This optional key specifies that launchd should instruct the kernel to have the job wait for a debugger
to attach before any code in the job is executed.
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.environment | Environment variables passed to the service
|
| options/nixos/services.prometheus.exporters.pihole.piholeHostname | Hostname or address where to find the Pi-Hole webinterface
|
| options/nixos/systemd.paths.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.esp_proposals | ESP proposals to offer for the CHILD_SA
|
| options/nixos/users.users.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| options/darwin/users.users.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.themes.*.pkg | The theme package.
|
| options/nixos/systemd.network.networks.<name>.flowQueuePIEConfig | Each attribute in this set specifies an option in the
[FlowQueuePIE] section of the unit
|
| options/nixos/networking.wlanInterfaces.<name>.device | The name of the underlying hardware WLAN device as assigned by udev.
|
| options/home-manager/programs.codex.skills | Custom skills for Codex
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.timeout | HTTP timeout in seconds. 0 means forever or system timeout.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SessionCreate | This key specifies that the job should be spawned into a new security
audit session rather than the default session for the context is belongs
to
|
| options/nixos/services.outline.smtp.host | Host name or IP address of the SMTP server.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.ServiceIPC | This optional key specifies whether the job participates in advanced
communication with launchd
|
| options/home-manager/launchd.agents.<name>.config.AbandonProcessGroup | When a job dies, launchd kills any remaining processes with the same process group ID as the job
|
| options/nixos/boot.specialFileSystems.<name>.depends | List of paths that should be mounted before this one
|
| options/nixos/boot.specialFileSystems.<name>.options | Options used to mount the file system
|
| options/nixos/services.kerberos_server.settings.realms.<name>.acl.*.principal | Which principal the rule applies to
|
| options/nixos/services.gitlab-runner.services.<name>.authenticationTokenConfigFile | Absolute path to a file containing environment variables used for
gitlab-runner registrations with runner authentication tokens
|
| options/nixos/users.mysql.pam.userColumn | The name of the column that contains a unix login name.
|
| options/nixos/services.rke2.nodeName | Node name.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.kexAlgorithms | Specifies the available KEX (Key Exchange) algorithms.
|
| options/home-manager/xdg.desktopEntries.<name>.categories | Categories in which the entry should be shown in a menu.
|
| options/nixos/security.ipa.ipaHostname | Fully-qualified hostname used to identify this host in the IPA domain.
|
| options/darwin/environment.launchAgents.<name>.text | Text of the file.
|
| options/home-manager/programs.hexchat.channels.<name>.commands | Commands to be executed on connecting to server.
|
| options/home-manager/programs.i3status.modules.<name>.position | Position of this module in i3status order.
|
| options/nixos/fileSystems.<name>.encrypted.keyFile | Path to a keyfile used to unlock the backing encrypted
device
|
| options/nixos/programs.uwsm.waylandCompositors.<name>.prettyName | The full name of the desktop entry file.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/nixos/networking.jool.nat64.<name>.framework | The framework to use for attaching Jool's translation to the exist
kernel packet processing rules
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.over_time | Hard IKE_SA lifetime if rekey/reauth does not complete, as time
|
| options/home-manager/programs.ssh.matchBlocks.<name>.dynamicForwards | Specify dynamic port forwardings
|
| options/nixos/services.baikal.pool | Name of existing phpfpm pool that is used to run web-application
|
| options/home-manager/programs.ssh.matchBlocks.<name>.localForwards.*.host.address | The address to forward to.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.localForwards.*.bind.address | The address to bind to.
|
| options/nixos/services.movim.domain | Fully-qualified domain name (FQDN) for the Movim instance.
|
| options/home-manager/programs.claude-code.skills | Custom skills for Claude Code
|
| options/nixos/security.apparmor.policies.<name>.profile | The profile file contents
|
| options/home-manager/programs.hexchat.channels.<name>.autojoin | Channels list to autojoin on connecting to server.
|
| options/home-manager/programs.borgmatic.backups.<name>.hooks.extraConfig | Extra settings.
|
| options/nixos/services.influxdb2.provision.organizations.<name>.buckets | Buckets to provision in this organization.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Program | This key maps to the first argument of execvp(3)
|
| options/darwin/launchd.agents.<name>.serviceConfig.LowPriorityIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.default | Whether this should be the default profile.
|
| options/nixos/systemd.network.networks.<name>.ipv6Prefixes | A list of ipv6Prefix sections to be added to the unit
|
| options/nixos/services.matrix-continuwuity.settings.global.server_name | The server_name is the name of this server
|
| options/nixos/services.prometheus.exporters.sql.configuration.jobs.<name>.connections | A list of connection strings of the SQL servers to scrape metrics from
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.extraFiles | Extra files to link to the vault directory.
|
| options/nixos/users.ldap.base | The distinguished name of the search base.
|
| options/nixos/services.influxdb2.provision.organizations.<name>.present | Whether to ensure that this organization is present or absent.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.serverAliveInterval | Set timeout in seconds after which response will be requested.
|
| options/nixos/services.forgejo.dump.file | Filename to be used for the dump
|
| options/home-manager/xdg.desktopEntries.<name>.prefersNonDefaultGPU | If true, the application prefers to be run on a more powerful discrete GPU if available.
|
| options/nixos/boot.initrd.luks.devices.<name>.fido2.credentials | List of FIDO2 credential IDs
|
| options/home-manager/programs.anki.sync.usernameFile | Path to a file containing the sync account username.
|
| options/nixos/networking.wireless.networks.<name>.pskRaw | Either the raw pre-shared key in hexadecimal format
or the name of the secret (as defined inside
networking.wireless.secretsFile and prefixed
with ext:) containing the network pre-shared key.
Be aware that this will be written to the Nix store
in plaintext! Always use an external reference.
The external secret can be either the plaintext
passphrase or the raw pre-shared key.
Mutually exclusive with psk and auth.
|
| options/home-manager/programs.vscode.profiles.<name>.enableMcpIntegration | Whether to integrate the MCP servers config from
programs.mcp.servers into
programs.vscode.profiles.<name>.userMcp
|
| options/home-manager/programs.floorp.profiles.<name>.bookmarks | Declarative bookmarks.
|
| options/home-manager/programs.floorp.profiles.<name>.bookmarks.force | Whether to force override existing custom bookmarks.
|
| options/nixos/services.peertube-runner.instancesToRegister.<name>.runnerDescription | Runner description declared to the PeerTube instance.
|
| options/home-manager/i18n.inputMethod.fcitx5.settings.addons.<name>.sections | attribute set of section of an INI file (attrs of INI atom (null, bool, int, float or string))
|
| options/nixos/services.pcscd.extendReaderNames | String to append to every reader name
|
| options/nixos/systemd.user.targets.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/systemd.user.sockets.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.KeepAlive | This optional key is used to control whether your job is to be kept continuously running or to let
demand and conditions control the invocation
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.hotkeys | Hotkeys to configure.
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.postgresqlPackage | The postgresql package to use.
|
| options/nixos/systemd.network.networks.<name>.dhcpServerConfig | Each attribute in this set specifies an option in the
[DHCPServer] section of the unit
|
| options/nixos/systemd.network.networks.<name>.pfifoHeadDropConfig | Each attribute in this set specifies an option in the
[PFIFOHeadDrop] section of the unit
|
| options/nixos/networking.bonds.<name>.driverOptions | Options for the bonding driver
|
| options/nixos/services.code-server.host | The host name or IP address the server should listen to.
|
| options/nixos/services.nats.serverName | Name of the NATS server, must be unique if clustered.
|
| options/nixos/services.epmd.enable | Whether to enable socket activation for Erlang Port Mapper Daemon (epmd),
which acts as a name server on all hosts involved in distributed
Erlang computations.
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.packages | List of ‹name› add-on packages to install for this profile
|
| options/home-manager/programs.floorp.profiles.<name>.settings | Attribute set of Floorp preferences
|
| options/nixos/systemd.sockets.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.targets.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote_addrs | Remote address(es) to use for IKE communication
|
| options/home-manager/accounts.calendar.accounts.<name>.primary | Whether this is the primary account
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/nixos/services.mysql.galeraCluster.localName | The unique name that identifies this particular node within the cluster
|
| options/home-manager/programs.gnome-terminal.profile.<name>.boldIsBright | Whether bold text is shown in bright colors.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LaunchOnlyOnce | This optional key specifies whether the job can only be run once and only once
|
| options/nixos/services.tayga.tunDevice | Name of the nat64 tun device.
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.settings.<name>.permissions | Allowed permissions for this extension
|
| options/darwin/networking.wg-quick.interfaces.<name>.dns | List of DNS servers for this interface.
|
| options/home-manager/programs.librewolf.profiles.<name>.search | Declarative search engine configuration.
|
| options/home-manager/programs.autorandr.profiles.<name>.config | Per output profile configuration.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.rectangle | The node's geometry, in the format WxH+X+Y.
|
| options/nixos/services.prometheus.remoteRead.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/darwin/launchd.agents.<name>.serviceConfig.StandardInPath | This optional key specifies what file should be used for data being supplied to stdin when using
stdio(3).
|
| options/nixos/services.influxdb2.provision.initialSetup.username | Primary username
|
| options/home-manager/programs.gnome-terminal.profile.<name>.cursorShape | The cursor shape.
|
| options/nixos/networking.fooOverUDP.<name>.protocol | Protocol number of the encapsulated packets
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.aggressive | Enables Aggressive Mode instead of Main Mode with Identity
Protection
|
| options/home-manager/programs.i3status.modules.<name>.settings | Configuration to add to this i3status module
|
| options/home-manager/programs.hexchat.channels.<name>.password | Password to use
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.RootDirectory | This optional key is used to specify a directory to chroot(2) to before running the job.
|
| options/home-manager/accounts.email.accounts.<name>.neomutt.sendMailCommand | Command to send a mail
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.palette | The terminal palette.
|
| options/home-manager/programs.hexchat.channels.<name>.options.bypassProxy | Bypass proxy.
|
| options/nixos/image.repart.partitions.<name>.nixStorePrefix | The prefix to use for store paths
|
| options/nixos/networking.wg-quick.interfaces.<name>.dns | The IP addresses of DNS servers to configure.
|
| options/nixos/systemd.network.networks.<name>.networkConfig | Each attribute in this set specifies an option in the
[Network] section of the unit
|
| options/nixos/systemd.network.networks.<name>.ipv6AcceptRAConfig | Each attribute in this set specifies an option in the
[IPv6AcceptRA] section of the unit
|
| options/home-manager/accounts.calendar.accounts.<name>.pimsync.enable | Whether to enable synchronization using pimsync.
|
| options/nixos/systemd.user.units.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/systemd.user.paths.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/systemd.targets.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.sockets.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.synchronous | Flush the WAL data to disk immediately after it has been received
|
| options/nixos/services.cyrus-imap.group | Cyrus IMAP group name
|
| options/home-manager/accounts.calendar.accounts.<name>.khal.priority | Priority of a calendar used for coloring (calendar with highest priority is preferred).
|
| options/nixos/networking.vlans.<name>.interface | The interface the vlan will transmit packets through.
|
| options/darwin/launchd.agents.<name>.environment | Environment variables passed to the service's processes.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LimitLoadToSessionType | This configuration file only applies to sessions of the type specified
|
| options/nixos/services.rshim.index | Specify the index to create device path /dev/rshim<index>
|
| options/darwin/networking.wg-quick.interfaces.<name>.mtu | MTU to set for this interface, automatically set if not specified
|
| options/home-manager/programs.ssh.matchBlocks.<name>.dynamicForwards.*.port | Specifies port number to bind to.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.EnableGlobbing | This flag causes launchd to use the glob(3) mechanism to update the program arguments before invocation.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StandardErrorPath | This optional key specifies what file should be used for data being sent to stderr when using stdio(3).
|
| options/home-manager/programs.librewolf.profiles.<name>.search.order | The order the search engines are listed in
|
| options/nixos/services.victorialogs.basicAuthUsername | Basic Auth username used to protect VictoriaLogs instance by authorization
|
| options/darwin/launchd.agents.<name>.serviceConfig.StandardOutPath | This optional key specifies what file should be used for data being sent to stdout when using stdio(3).
|
| options/nixos/services.pihole-web.hostName | Domain name for the website.
|
| options/home-manager/xdg.configFile.<name>.ignorelinks | When recursive is enabled, adds -ignorelinks flag to lndir
It causes lndir to not treat symbolic links in the source directory specially
|
| options/nixos/networking.nftables.tables.<name>.content | The table content.
|
| options/home-manager/launchd.agents.<name>.config.WorkingDirectory | This optional key is used to specify a directory to chdir(2) to before running the job.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local_port | Local UDP port for IKE communication
|
| options/nixos/systemd.sockets.<name>.listenDatagrams | For each item in this list, a ListenDatagram
option in the [Socket] section will be created.
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/home-manager/programs.vscode.profiles.<name>.userSettings | Configuration written to Visual Studio Code's
settings.json
|
| options/nixos/users.extraUsers.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| options/nixos/networking.wg-quick.interfaces.<name>.preUp | Commands called at the start of the interface setup.
|
| options/darwin/networking.wg-quick.interfaces.<name>.preUp | List of commands to run before interface setup.
|
| options/nixos/services.murmur.group | The name of an existing group to use to run the service
|
| options/home-manager/accounts.email.accounts.<name>.imapnotify.boxes | IMAP folders to watch.
|
| options/nixos/systemd.network.networks.<name>.addresses | A list of address sections to be added to the unit
|
| options/home-manager/accounts.email.accounts.<name>.astroid.sendMailCommand | Command to send a mail
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.rekey_time | IKE rekeying refreshes key material using a Diffie-Hellman exchange, but
does not re-check associated credentials
|
| options/nixos/users.users.<name>.password | Specifies the (clear text) password for the user
|
| options/nixos/services.prometheus.remoteWrite.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.bacula-fd.tls.verifyPeer | Verify peer certificate
|
| options/nixos/services.bacula-sd.tls.verifyPeer | Verify peer certificate
|
| options/nixos/systemd.timers.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/systemd.slices.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/services.samba.nmbd.enable | Whether to enable Samba's nmbd, which replies to NetBIOS over IP name
service requests
|
| options/nixos/services.elasticsearch.cluster_name | Elasticsearch name that identifies your cluster for auto-discovery.
|
| options/darwin/launchd.agents.<name>.serviceConfig.WaitForDebugger | This optional key specifies that launchd should instruct the kernel to have the job wait for a debugger
to attach before any code in the job is executed.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.remoteForwards.*.host.address | The address to forward to.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.remoteForwards.*.bind.address | The address to bind to.
|
| options/darwin/system.activationScripts.<name>.source | Path of the source file.
|
| options/nixos/boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.user | The user of the file
|
| options/home-manager/programs.borgmatic.backups.<name>.output.extraConfig | Extra settings.
|
| options/home-manager/fonts.fontconfig.configFile.<name>.priority | Determines the order in which configs are loaded
|
| options/home-manager/launchd.agents.<name>.config.ProcessType | This optional key describes, at a high level, the intended purpose of the job
|
| options/nixos/services.nscd.enable | Whether to enable the Name Service Cache Daemon
|
| options/nixos/security.acme.certs.<name>.credentialFiles | Environment variables suffixed by "_FILE" to set for the cert's service
for your selected dnsProvider
|
| options/home-manager/accounts.email.accounts.<name>.signature.command | A command that generates a signature.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.audibleBell | Turn on/off the terminal's bell.
|
| options/nixos/services.prometheus.exporters.py-air-control.deviceHostname | The hostname of the air purification device from which to scrape the metrics.
|
| options/darwin/environment.userLaunchAgents.<name>.text | Text of the file.
|
| options/darwin/launchd.agents.<name>.serviceConfig.SessionCreate | This key specifies that the job should be spawned into a new security
audit session rather than the default session for the context is belongs
to
|
| options/nixos/systemd.sockets.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/systemd.targets.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.filters.*.name | Name of the filter
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.settings.<name>.permissions | Allowed permissions for this extension
|
| options/nixos/services.murmur.registerName | Public server registration name, and also the name of the
Root channel
|
| options/nixos/security.auditd.plugins.<name>.direction | The option is dictated by the plugin
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/nixos/services.tarsnap.archives | Tarsnap archive configurations
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/nixos/services.slurm.partitionName | Name by which the partition may be referenced
|
| options/nixos/services.ghostunnel.servers.<name>.disableAuthentication | Disable client authentication, no client certificate will be required.
|
| options/nixos/boot.binfmt.registrations.<name>.mask | A mask to be ANDed with the byte sequence of the file before matching
|
| options/nixos/networking.wg-quick.interfaces.<name>.type | The type of the interface
|
| options/home-manager/programs.smug.projects.<name>.windows.*.commands | Commands to execute when window starts.
|
| options/nixos/services.gammu-smsd.backend.sql.user | User name used for connection to the database
|
| options/nixos/networking.wg-quick.interfaces.<name>.postUp | Commands called after the interface setup.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote_port | Remote UDP port for IKE communication
|
| options/nixos/services.avahi.domainName | Domain name for all advertisements.
|
| options/nixos/services.prometheus.exporters.nextcloud.username | Username for connecting to Nextcloud
|
| options/home-manager/programs.vscode.profiles.<name>.enableUpdateCheck | Whether to enable update checks/notifications
|
| options/nixos/programs.proxychains.proxies.<name>.type | Proxy type.
|
| options/nixos/programs.proxychains.proxies.<name>.port | Proxy port
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/nixos/services.evremap.settings.phys | The physical device name to listen on
|
| options/nixos/services.bacula-dir.tls.verifyPeer | Verify peer certificate
|
| options/home-manager/accounts.contact.accounts.<name>.khal.addresses | Email addresses to be associated with this account
|
| options/nixos/image.repart.partitions.<name>.stripNixStorePrefix | Whether to strip /nix/store/ from the store paths
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners | List of ports that this worker should listen on, their purpose and their configuration.
|
| options/darwin/security.sandbox.profiles.<name>.allowSystemPaths | Whether to allow read access to FHS paths like /etc and /var.
|
| options/home-manager/programs.papis.libraries.<name>.isDefault | Whether this is a default library
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.corePlugins | Core plugins to activate.
|
| options/darwin/networking.wg-quick.interfaces.<name>.postUp | List of commands to run after interface setup.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LowPriorityIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O.
|
| options/home-manager/i18n.inputMethod.fcitx5.settings.addons.<name>.globalSection | global section of an INI file (attrs of INI atom (null, bool, int, float or string))
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LaunchEvents | Specifies higher-level event types to be used as launch-on-demand event
sources
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.childless | Use childless IKE_SA initiation (allow, prefer, force or never)
|
| options/home-manager/programs.firefox.profiles.<name>.bookmarks.force | Whether to force override existing custom bookmarks.
|
| options/nixos/systemd.network.networks.<name>.ipv6PREF64Prefixes | A list of IPv6PREF64Prefix sections to be added to the unit
|
| options/darwin/environment.launchDaemons.<name>.text | Text of the file.
|
| options/nixos/services.rss-bridge.pool | Name of phpfpm pool that is used to run web-application
|
| options/home-manager/programs.smug.projects.<name>.windows.*.selected | Whether this window should be selected by default at session start.
|
| options/nixos/services.heisenbridge.namespaces | Configure the 'namespaces' section of the registration.yml for the bridge and the server
|
| options/nixos/users.extraUsers.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StartInterval | This optional key causes the job to be started every N seconds
|
| options/home-manager/accounts.email.accounts.<name>.himalaya.settings | Himalaya CLI configuration for this email account
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.dpd_timeout | Charon by default uses the normal retransmission mechanism and timeouts to
check the liveness of a peer, as all messages are used for liveness
checking
|
| options/nixos/services.firezone.server.provision.accounts.<name>.features.flow_activities | Whether to enable the flow_activities feature for this account.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.features.traffic_filters | Whether to enable the traffic_filters feature for this account.
|
| options/nixos/programs.xfs_quota.projects.<name>.sizeHardLimit | Hard limit of the project size.
|
| options/nixos/programs.proxychains.proxies.<name>.host | Proxy host or IP address.
|
| options/nixos/programs.xfs_quota.projects.<name>.sizeSoftLimit | Soft limit of the project size
|
| options/nixos/networking.wg-quick.interfaces.<name>.preDown | Command called before the interface is taken down.
|
| options/home-manager/programs.vscode.profiles.<name>.globalSnippets | Defines global user snippets.
|
| options/nixos/boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.group | The group of the file
|
| options/home-manager/programs.firefox.profiles.<name>.bookmarks | Declarative bookmarks.
|
| options/nixos/services.patroni.scope | Cluster name.
|
| options/nixos/services.taskserver.fqdn | The fully qualified domain name of this server, which is also used
as the common name in the certificates.
|
| options/nixos/services.nullmailer.config.me | The fully-qualifiled host name of the computer running nullmailer
|
| options/nixos/services.dependency-track.settings."alpine.database.username" | Specifies the username to use when authenticating to the database.
|
| options/nixos/services.sslh.settings.protocols | List of protocols sslh will probe for and redirect
|
| options/nixos/programs.xfs_quota.projects.<name>.fileSystem | XFS filesystem hosting the xfs_quota project.
|
| options/darwin/networking.wg-quick.interfaces.<name>.preDown | List of commands to run before interface shutdown.
|
| options/home-manager/programs.librewolf.profiles.<name>.userChrome | Custom LibreWolf user chrome CSS.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags.phishing | Tag for notmuch to use for the IANA $Phishing keyword
|
| options/home-manager/programs.librewolf.profiles.<name>.search.force | Whether to force replace the existing search
configuration
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers | Peers linked to the interface.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.cursorBlinkMode | The cursor blink mode.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.userNameCommand | A command that prints the user name to standard output.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.proposals | A proposal is a set of algorithms
|
| options/nixos/systemd.user.timers.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/systemd.user.slices.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/services.samba-wsdd.domain | Set domain name (disables workgroup).
|
| options/darwin/system.activationScripts.<name>.enable | Whether this file should be generated
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.keyingtries | Number of retransmission sequences to perform during initial
connect
|
| options/home-manager/accounts.email.accounts.<name>.getmail.mailboxes | A non-empty list of mailboxes
|
| options/home-manager/programs.firefox.profiles.<name>.settings | Attribute set of Firefox preferences
|
| options/nixos/services.prometheus.exporters.fritz.settings.devices.*.username | Username to authenticate with the target device.
|
| options/nixos/services.prometheus.exporters.fritz.settings.devices.*.hostname | Hostname under which the target device is reachable.
|
| options/home-manager/programs.floorp.profiles.<name>.search.engines | Attribute set of search engine configurations
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits | Resource limits to be imposed on the job
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits | Resource limits to be imposed on the job
|
| options/darwin/networking.wg-quick.interfaces.<name>.peers | List of peers associated with this interface.
|
| options/home-manager/systemd.user.paths.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.StandardInPath | This optional key specifies what file should be used for data being supplied to stdin when using
stdio(3).
|
| options/home-manager/accounts.email.accounts.<name>.aerc.imapOauth2Params.client_id | The OAuth2 client identifier.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.smtpOauth2Params.client_id | The OAuth2 client identifier.
|
| options/home-manager/accounts.email.accounts.<name>.imapnotify.enable | Whether to enable imapnotify.
|
| options/darwin/launchd.agents.<name>.serviceConfig.RootDirectory | This optional key is used to specify a directory to chroot(2) to before running the job.
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.type | The type of the listener, usually http.
|
| options/darwin/launchd.agents.<name>.serviceConfig.KeepAlive | This optional key is used to control whether your job is to be kept continuously running or to let
demand and conditions control the invocation
|
| options/home-manager/programs.floorp.profiles.<name>.search.privateDefault | The default search engine used in the Private Browsing.
|
| options/darwin/security.sandbox.profiles.<name>.readablePaths | List of paths that should be read-only inside the sandbox.
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.mode | File permissions on the UNIX domain socket.
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.port | The port to listen for HTTP(S) requests on.
|
| options/nixos/openstack.zfs.datasets.<name>.properties | Properties to set on this dataset.
|
| options/home-manager/programs.librewolf.profiles.<name>.isDefault | Whether this is a default profile.
|
| options/nixos/networking.bonds.<name>.lacp_rate | DEPRECATED, use driverOptions
|
| options/home-manager/accounts.email.accounts.<name>.imapnotify.extraArgs | Extra arguments to pass to goimapnotify.
|
| options/nixos/systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.user | The user of the file
|
| options/nixos/systemd.network.networks.<name>.ipv6RoutePrefixes | A list of ipv6RoutePrefix sections to be added to the unit
|
| options/home-manager/programs.obsidian.defaultSettings.hotkeys.<name>.*.key | The hotkey.
|
| options/home-manager/programs.obsidian.defaultSettings.extraFiles.<name>.text | Text of the file.
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.tls | Whether to enable TLS on the listener socket.
This option will be ignored for UNIX domain sockets.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.compression | Specifies whether to use compression
|
| options/nixos/security.acme.certs.<name>.environmentFile | Path to an EnvironmentFile for the cert's service containing any required and
optional environment variables for your selected dnsProvider
|
| options/nixos/services.tailscale.serve.services | Services to configure for Tailscale Serve
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/nixos/services.vault.address | The name of the ip interface to listen to
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/nixos/programs.schroot.profiles.<name>.copyfiles | A list of files to copy into the chroot from the host system.
|
| options/darwin/security.sandbox.profiles.<name>.writablePaths | List of paths that should be read/write inside the sandbox.
|
| options/nixos/services.mqtt2influxdb.influxdb.username | Username for InfluxDB login.
|
| options/nixos/services.peertube-runner.instancesToRegister.<name>.registrationTokenFile | Path to a file containing a registration token for the PeerTube instance
|
| options/darwin/launchd.agents.<name>.serviceConfig.LimitLoadToSessionType | This configuration file only applies to sessions of the type specified
|
| options/nixos/services.dawarich.smtp.user | SMTP login name.
|
| options/nixos/services.mastodon.smtp.user | SMTP login name.
|
| options/home-manager/programs.floorp.profiles.<name>.bookmarks.configFile | Configuration file to define custom bookmarks.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.ppk_required | Whether a Postquantum Preshared Key (PPK) is required for this connection
|
| options/nixos/networking.wg-quick.interfaces.<name>.postDown | Command called after the interface is taken down.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.scrollOnOutput | Whether to scroll when output is written.
|
| options/darwin/launchd.agents.<name>.serviceConfig.StandardErrorPath | This optional key specifies what file should be used for data being sent to stderr when using stdio(3).
|
| options/darwin/launchd.agents.<name>.serviceConfig.EnableGlobbing | This flag causes launchd to use the glob(3) mechanism to update the program arguments before invocation.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.StandardOutPath | This optional key specifies what file should be used for data being sent to stdout when using stdio(3).
|
| options/nixos/services.prometheus.remoteRead.*.basic_auth.username | HTTP username
|
| options/home-manager/programs.ssh.matchBlocks.<name>.identitiesOnly | Specifies that ssh should only use the authentication
identity explicitly configured in the
~/.ssh/config files or passed on the
ssh command-line, even if ssh-agent
offers more identities.
|
| options/home-manager/programs.ripgrep-all.custom_adapters.*.name | The unique identifier and name of this adapter; must only include a-z, 0-9, _
|
| options/nixos/networking.wireless.networks.<name>.bssid | If set, this network block is used only when associating with
the AP using the configured BSSID.
|
| options/nixos/services.gdomap.enable | Whether to enable GNUstep Distributed Objects name server.
|
| options/home-manager/accounts.email.accounts.<name>.passwordCommand | A command, which when run writes the account password on
standard output.
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.themes.*.enable | Whether to set the theme as active.
|
| options/nixos/networking.interfaces.<name>.mtu | MTU size for packets leaving the interface
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/darwin/networking.wg-quick.interfaces.<name>.postDown | List of commands to run after interface shutdown
|
| options/home-manager/accounts.email.accounts.<name>.imapnotify.onNotify | Shell commands to run on any event.
|
| options/darwin/launchd.daemons.<name>.environment | Environment variables passed to the service's processes.
|
| options/darwin/environment.launchAgents.<name>.source | Path of the source file.
|
| options/home-manager/launchd.agents.<name>.config.ProgramArguments | This key maps to the second argument of execvp(3)
|
| options/nixos/services.keycloak.themes | Additional theme packages for Keycloak
|
| options/home-manager/programs.borgmatic.backups.<name>.storage.extraConfig | Extra settings.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets | This optional key is used to specify launch on demand sockets that can be used to let launchd know when
to run the job
|
| options/nixos/systemd.network.netdevs.<name>.wireguardPeers | Each item in this array specifies an option in the
[WireGuardPeer] section of the unit
|
| options/darwin/launchd.daemons.<name>.serviceConfig.WaitForDebugger | This optional key specifies that launchd should instruct the kernel to have the job wait for a debugger
to attach before any code in the job is executed.
|
| options/nixos/services.tmate-ssh-server.host | External host name
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.cssSnippets | CSS snippets to install.
|
| options/nixos/services.prometheus.scrapeConfigs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.force | Whether to override all previous firefox settings
|
| options/home-manager/launchd.agents.<name>.config.Disabled | This optional key is used as a hint to launchctl(1) that it should not submit this job to launchd when
loading a job or jobs
|
| options/nixos/hardware.fw-fanctrl.config.strategies.<name>.speedCurve | How should the speed curve look like
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.auth | Authentication settings
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local_addrs | Local address(es) to use for IKE communication
|
| options/home-manager/programs.librewolf.profiles.<name>.extraConfig | Extra preferences to add to user.js.
|
| options/nixos/systemd.network.networks.<name>.routingPolicyRules | A list of routing policy rules sections to be added to the unit
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SessionCreate | This key specifies that the job should be spawned into a new security
audit session rather than the default session for the context is belongs
to
|
| options/nixos/systemd.sockets.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/systemd.targets.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/nixos/services.thanos.rule.alert.label-drop | Labels by name to drop before sending to alertmanager
|
| options/nixos/services.rspamd.locals | Local configuration files, written into /etc/rspamd/local.d/{name}.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.AbandonProcessGroup | When a job dies, launchd kills any remaining processes with the same process group ID as the job
|
| options/home-manager/accounts.email.accounts.<name>.msmtp.tls.fingerprint | Fingerprint of a trusted TLS certificate
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| options/nixos/services.openssh.settings.UseDns | Specifies whether sshd(8) should look up the remote host name, and to check that the resolved host name for
the remote IP address maps back to the very same IP address
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.timeRange.end | End of time range to show.
|
| options/nixos/networking.wg-quick.interfaces.<name>.mtu | If not specified, the MTU is automatically determined
from the endpoint addresses or the system default route, which is usually
a sane choice
|
| options/nixos/networking.interfaces.<name>.wakeOnLan.enable | Whether to enable wol on this interface.
|
| options/home-manager/programs.floorp.profiles.<name>.extensions | Submodule for installing and configuring extensions.
|
| options/home-manager/programs.librewolf.profiles.<name>.search.default | The default search engine used in the address bar and search
bar.
|
| options/nixos/systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.group | The group of the file
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.reauth_time | Time to schedule IKE reauthentication
|
| options/nixos/services.prometheus.remoteWrite.*.basic_auth.username | HTTP username
|
| options/nixos/services.selfoss.pool | Name of existing phpfpm pool that is used to run web-application
|
| options/nixos/networking.wireless.networks.<name>.hidden | Set this to true if the SSID of the network is hidden.
|
| options/home-manager/programs.vscode.profiles.<name>.extensions | The extensions Visual Studio Code should be started with.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.certificateFile | Specifies files from which the user certificate is read.
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.path | Unix domain socket path to bind this listener to.
|
| options/nixos/boot.loader.systemd-boot.windows.<name>.efiDeviceHandle | The device handle of the EFI System Partition (ESP) where the Windows bootloader is
located
|
| options/home-manager/accounts.email.accounts.<name>.lieer.notmuchSetupWarning | Warn if Notmuch is not also enabled for this account
|
| options/home-manager/accounts.calendar.accounts.<name>.khal.addresses | Email addresses to be associated with this account
|
| options/nixos/services.bitwarden-directory-connector-cli.ldap.username | The user to authenticate as.
|
| options/home-manager/systemd.user.slices.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/home-manager/systemd.user.timers.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/home-manager/systemd.user.mounts.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags.lowercase | If true, translate all mailboxes to lowercase names when mapping to notmuch
tags.
|
| options/nixos/security.acme.certs.<name>.dnsPropagationCheck | Toggles lego DNS propagation check, which is used alongside DNS-01
challenge to ensure the DNS entries required are available.
|
| options/home-manager/accounts.email.accounts.<name>.neomutt.extraMailboxes | List of extra mailboxes
|
| options/nixos/services.bitwarden-directory-connector-cli.ldap.hostname | The host the LDAP is accessible on.
|
| options/nixos/networking.bonds.<name>.interfaces | The interfaces to bond together
|
| options/nixos/networking.wireless.networks.<name>.psk | The network's pre-shared key in plaintext defaulting
to being a network without any authentication.
Be aware that this will be written to the Nix store
in plaintext! Use pskRaw with an external
reference to keep it safe.
Mutually exclusive with pskRaw.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.userNameCommand | A command that prints the user name to standard output.
|
| options/nixos/services.matrix-synapse.settings.listeners.*.resources.*.names | List of resources to host on this listener.
|
| options/home-manager/accounts.email.accounts.<name>.neomutt.showDefaultMailbox | Show the default mailbox (INBOX)
|
| options/home-manager/wayland.windowManager.hyprland.submaps.<name>.settings | Hyprland binds to be put in the submap
|
| options/nixos/services.znc.confOptions.userName | The user name used to log in to the ZNC web admin interface.
|
| options/darwin/environment.launchAgents.<name>.enable | Whether this file should be generated
|
| options/home-manager/programs.librewolf.profiles.<name>.userContent | Custom LibreWolf user content CSS.
|
| options/home-manager/programs.thunderbird.profiles.<name>.extensions | List of ‹name› add-on packages to install for this profile
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.settings.<name>.permissions | Allowed permissions for this extension
|
| options/home-manager/programs.firefox.profiles.<name>.search.engines | Attribute set of search engine configurations
|
| options/darwin/launchd.agents.<name>.serviceConfig.StartInterval | This optional key causes the job to be started every N seconds
|
| options/nixos/systemd.network.networks.<name>.dhcpServerStaticLeases | A list of DHCPServerStaticLease sections to be added to the unit
|
| options/darwin/launchd.agents.<name>.serviceConfig.LaunchEvents | Specifies higher-level event types to be used as launch-on-demand event
sources
|
| options/home-manager/programs.hexchat.channels.<name>.loginMethod | The login method
|
| options/nixos/systemd.user.sockets.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/systemd.user.targets.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/nixos/boot.binfmt.registrations.<name>.offset | The byte offset of the magic number used for recognition.
|
| options/home-manager/programs.firefox.profiles.<name>.search.privateDefault | The default search engine used in the Private Browsing.
|
| options/home-manager/programs.librewolf.profiles.<name>.preConfig | Extra preferences to add to user.js, before
programs.firefox.profiles._name_.settings
|
| options/nixos/services.kismet.serverName | The name of the server.
|
| options/nixos/systemd.paths.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/systemd.units.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/services.grafana.settings.database.server_cert_name | The common name field of the certificate used by the mysql or postgres server
|
| options/nixos/networking.wireless.networks.<name>.ssid | You could use this field to override the network's ssid
|
| options/darwin/launchd.daemons.<name>.serviceConfig.RootDirectory | This optional key is used to specify a directory to chroot(2) to before running the job.
|
| options/nixos/systemd.shutdownRamfs.contents.<name>.dlopen.features | Features to enable via dlopen ELF notes
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/nixos/users.users.<name>.hashedPassword | Specifies the hashed password for the user
|
| options/home-manager/accounts.email.accounts.<name>.imapnotify.onNotifyPost | Shell commands to run after onNotify event.
|
| options/home-manager/programs.firefox.profiles.<name>.bookmarks.configFile | Configuration file to define custom bookmarks.
|
| options/nixos/systemd.network.networks.<name>.fairQueueingConfig | Each attribute in this set specifies an option in the
[FairQueueing] section of the unit
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits | Resource limits to be imposed on the job
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits | Resource limits to be imposed on the job
|
| options/nixos/programs.proxychains.proxies.<name>.enable | Whether to enable this proxy.
|
| options/nixos/services.gnome.at-spi2-core.enable | Whether to enable at-spi2-core, a service for the Assistive Technologies
available on the GNOME platform
|
| options/home-manager/programs.floorp.profiles.<name>.containers | Attribute set of container configurations
|
| options/nixos/services.tlsrpt.reportd.settings.organization_name | Name of the organization sending out the reports.
|
| options/home-manager/programs.smug.projects.<name>.windows.*.panes.*.commands | Commands to execute when pane starts.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.send_certreq | Send certificate request payloads to offer trusted root CA certificates to
the peer
|
| options/nixos/systemd.network.netdevs.<name>.wireguardConfig | Each attribute in this set specifies an option in the
[WireGuard] section of the unit
|
| options/darwin/launchd.daemons.<name>.serviceConfig.KeepAlive | This optional key is used to control whether your job is to be kept continuously running or to let
demand and conditions control the invocation
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/nixos/services.librenms.user | Name of the LibreNMS user.
|
| options/nixos/systemd.user.paths.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LimitLoadToSessionType | This configuration file only applies to sessions of the type specified
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.cssSnippets.*.text | Text of the file.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.EnableGlobbing | This flag causes launchd to use the glob(3) mechanism to update the program arguments before invocation.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.StandardErrorPath | This optional key specifies what file should be used for data being sent to stderr when using stdio(3).
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.WorkingDirectory | This optional key is used to specify a directory to chdir(2) to before running the job.
|
| options/home-manager/programs.floorp.profiles.<name>.bookmarks.settings | Custom bookmarks.
|
| options/darwin/environment.userLaunchAgents.<name>.source | Path of the source file.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.notmuchSetupWarning | Warn if Notmuch is not also enabled for this account
|
| options/home-manager/programs.gnome-terminal.profile.<name>.customCommand | The command to use to start the shell, or null for default shell.
|
| options/nixos/systemd.network.netdevs.<name>.batmanAdvancedConfig | Each attribute in this set specifies an option in the
[BatmanAdvanced] section of the unit
|
| options/home-manager/launchd.agents.<name>.config.ThrottleInterval | This key lets one override the default throttling policy imposed on jobs by launchd
|
| options/nixos/services.ncps.cache.storage.s3.bucket | The name of the S3 bucket.
|
| options/nixos/services.spiped.config | Configuration for a secure pipe daemon
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.force | Whether to override all previous firefox settings
|
| options/nixos/networking.wlanInterfaces.<name>.meshID | MeshID of interface with type mesh.
|
| options/nixos/services.nextcloud.settings.mail_smtpname | This depends on mail_smtpauth
|
| options/home-manager/accounts.email.accounts.<name>.imapnotify.extraConfig | Additional configuration to add for this account.
|
| options/nixos/services.misskey.settings.db.db | The database name.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.dynamicForwards.*.address | The address to bind to.
|
| options/home-manager/programs.borgmatic.backups.<name>.location.extraConfig | Extra settings.
|
| options/nixos/services.agorakit.mail.fromName | Mail "from" name.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.timeRange.start | Start of time range to show.
|
| options/nixos/services.flannel.iface | Interface to use (IP or name) for inter-host communication
|
| options/nixos/hardware.fw-fanctrl.config.strategies.<name>.speedCurve.*.temp | Temperature in °C at which the fan speed should be changed
|
| options/darwin/environment.launchDaemons.<name>.source | Path of the source file.
|
| options/nixos/services.shorewall.configs | This option defines the Shorewall configs
|
| options/nixos/systemd.shutdownRamfs.contents.<name>.dlopen.usePriority | Priority of dlopen ELF notes to include. "required" is
minimal, "recommended" includes "required", and
"suggested" includes "recommended"
|
| options/nixos/services.jupyter.user | Name of the user used to run the jupyter service
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.cache_dir | The cache directory in which to store mail files while they are being
downloaded
|
| options/home-manager/launchd.agents.<name>.config.QueueDirectories | Much like the WatchPaths option, this key will watch the paths for modifications
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.ProcessType | This optional key describes, at a high level, the intended purpose of the job
|
| options/home-manager/programs.irssi.networks.<name>.server.ssl.certificateFile | Path to a file containing the certificate used for
client authentication to the server.
|
| options/nixos/networking.wireguard.interfaces.<name>.listenPort | 16-bit port for listening
|
| options/nixos/networking.wlanInterfaces.<name>.type | The type of the WLAN interface
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.highlight | The colors for the terminal’s highlighted area.
|
| options/home-manager/programs.obsidian.defaultSettings.extraFiles.<name>.source | Path of the source file or directory.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.auth | Authentication settings
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.authCert | Either a path to a certificate with a client certificate and
the key or a list of paths to the files with them.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.timeRange.end | End of time range to show.
|
| options/home-manager/programs.firefox.profiles.<name>.extensions | Submodule for installing and configuring extensions.
|
| options/darwin/networking.wg-quick.interfaces.<name>.table | Controls the routing table to which routes are added
|
| options/nixos/services.borgmatic.configurations.<name>.repositories.*.path | Path to the repository
|
| options/nixos/networking.wireless.networks.<name>.auth | Use this option to configure advanced authentication methods
like EAP
|
| options/home-manager/systemd.user.sockets.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/home-manager/systemd.user.automounts.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/home-manager/systemd.user.targets.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/home-manager/programs.obsidian.defaultSettings.extraFiles.<name>.target | Path to target relative to the vault's directory.
|
| options/home-manager/accounts.email.accounts.<name>.offlineimap.enable | Whether to enable OfflineIMAP.
|
| options/darwin/networking.wg-quick.interfaces.<name>.listenPort | Port to listen on, randomly selected if not specified.
|
| options/nixos/users.extraUsers.<name>.password | Specifies the (clear text) password for the user
|
| options/home-manager/programs.autorandr.profiles.<name>.fingerprint | Output name to EDID mapping
|
| options/nixos/systemd.network.networks.<name>.tokenBucketFilterConfig | Each attribute in this set specifies an option in the
[TokenBucketFilter] section of the unit
|
| options/nixos/systemd.network.networks.<name>.heavyHitterFilterConfig | Each attribute in this set specifies an option in the
[HeavyHitterFilter] section of the unit
|
| options/nixos/networking.wg-quick.interfaces.<name>.address | The IP addresses of the interface.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets | This optional key is used to specify launch on demand sockets that can be used to let launchd know when
to run the job
|
| options/nixos/services.sympa.database.user | Database user
|
| options/nixos/services.ceph.global.clusterName | Name of cluster
|
| options/nixos/networking.supplicant.<name>.configFile.path | External wpa_supplicant.conf configuration file
|
| options/darwin/launchd.agents.<name>.serviceConfig.AbandonProcessGroup | When a job dies, launchd kills any remaining processes with the same process group ID as the job
|
| options/nixos/programs.tsmClient.servers.<name>.passworddir | Directory that holds the TSM
node's password information.
|
| options/darwin/environment.userLaunchAgents.<name>.enable | Whether this file should be generated
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.keepDaily | Number of daily archives to keep
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites | Attribute set of site options for this profile
|
| options/nixos/networking.supplicant.<name>.driver | Force a specific wpa_supplicant driver.
|
| options/nixos/networking.wlanInterfaces.<name>.flags | Flags for interface of type monitor.
|
| options/darwin/networking.wg-quick.interfaces.<name>.address | List of IP addresses for this interface.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.postHook | Command to call for each item creation and modification
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.enable | Whether to enable synchronization using vdirsyncer.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.tokenFile | A file path where access tokens are stored.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.corePlugins.*.enable | Whether to enable the plugin.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.verify | Null or path to certificate to verify SSL against
|
| options/nixos/services.calibre-web.dataDir | Where Calibre-Web stores its data
|
| options/nixos/services.nixops-dns.domain | Fake domain name to resolve to NixOps virtual machines
|
| options/nixos/networking.vswitches.<name>.openFlowRules | OpenFlow rules to insert into the Open vSwitch
|
| options/nixos/services.sabnzbd.secretFiles | Path to a list of ini file containing confidential settings such as credentials
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/home-manager/accounts.contact.accounts.<name>.khard.addressbooks | If provided, each item on this list will generate an
entry on khard configuration file as a separate addressbook
(vdir)
|
| options/nixos/services.kresd.enable | Whether to enable knot-resolver (version 5) domain name server
|
| options/nixos/hardware.fw-fanctrl.config.strategies.<name>.speedCurve.*.speed | Percent how fast the fan should run at
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.userAgent | The user agent to report to the server
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.enable | Whether to enable the Thunderbird mail client for this account.
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/home-manager/accounts.email.accounts.<name>.signature.delimiter | The delimiter used between the document and the signature.
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.cert_uri_base | Defines the base URI for the Hash and URL feature supported by
IKEv2
|
| options/darwin/launchd.daemons.<name>.serviceConfig.StartInterval | This optional key causes the job to be started every N seconds
|
| options/nixos/services.influxdb2.provision.organizations.<name>.description | Optional description for the organization.
|
| options/nixos/services.borgmatic.configurations.<name>.repositories.*.label | Label to the repository
|
| options/home-manager/programs.senpai.config.nickname | Your nickname, sent with a NICK IRC message
|
| options/nixos/services.prometheus.scrapeConfigs.*.basic_auth.username | HTTP username
|
| options/nixos/services.nixops-dns.enable | Whether to enable the nixops-dns resolution
of NixOps virtual machines via dnsmasq and fake domain name.
|
| options/nixos/systemd.user.slices.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/systemd.user.timers.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/systemd.slices.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/systemd.timers.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LaunchEvents | Specifies higher-level event types to be used as launch-on-demand event
sources
|
| options/home-manager/accounts.contact.accounts.<name>.remote.passwordCommand | A command that prints the password to standard output.
|
| options/home-manager/programs.autorandr.profiles.<name>.hooks.preswitch | Preswitch hook executed before mode switch.
|
| options/darwin/environment.launchDaemons.<name>.enable | Whether this file should be generated
|
| options/nixos/services.jupyter.group | Name of the group used to run the jupyter service
|
| options/nixos/services.rshim.backend | Specify the backend to attach
|
| options/nixos/boot.binfmt.registrations.<name>.openBinary | Whether to pass the binary to the interpreter as an open
file descriptor, instead of a path.
|
| options/nixos/services.dnsdist.enable | Whether to enable dnsdist domain name server.
|
| options/nixos/services.slurm.controlAddr | Name that ControlMachine should be referred to in establishing a
communications path.
|
| options/nixos/services.unbound.enable | Whether to enable Unbound domain name server.
|
| options/home-manager/programs.librewolf.profiles.<name>.bookmarks.force | Whether to force override existing custom bookmarks.
|
| options/home-manager/programs.vscode.profiles.<name>.languageSnippets | Defines user snippets for different languages.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits | Resource limits to be imposed on the job
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits | Resource limits to be imposed on the job
|
| options/home-manager/programs.firefox.profiles.<name>.bookmarks.settings | Custom bookmarks.
|
| options/nixos/services.prometheus.exporters.artifactory.artiUsername | Username for authentication against JFrog Artifactory API.
|
| options/home-manager/programs.firefox.profiles.<name>.containers | Attribute set of container configurations
|
| options/nixos/networking.wg-quick.interfaces.<name>.table | The kernel routing table to add this interface's
associated routes to
|
| options/home-manager/programs.autorandr.profiles.<name>.hooks.predetect | Predetect hook executed before autorandr attempts to run xrandr.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.ProgramArguments | This key maps to the second argument of execvp(3)
|
| options/nixos/programs.uwsm.waylandCompositors.<name>.extraArgs | Extra command-line arguments pass to to the compsitor.
|
| options/home-manager/accounts.contact.accounts.<name>.khal.collections | VCARD collections to be searched for contact birthdays.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.showScrollbar | Whether the scroll bar should be visible.
|
| options/nixos/services.avahi.publish.domain | Whether to announce the locally used domain name for browsing by other hosts.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.features.internet_resource | Whether to enable the internet_resource feature for this account.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.features.policy_conditions | Whether to enable the policy_conditions feature for this account.
|
| options/home-manager/programs.thunderbird.profiles.<name>.search.order | The order the search engines are listed in
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.timeRange | A time range to synchronize. start and end can be any Python
expression that returns a datetime.datetime
object.
|
| options/home-manager/programs.thunderbird.profiles.<name>.calendarAccountsOrder | Custom ordering of calendar accounts
|
| options/nixos/services.jicofo.xmppDomain | Domain name of the XMMP server to which to connect as a component
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.useVcard4 | Specifies whether vdirsyncer should request vCards in version 4.0
|
| options/nixos/services.librenms.group | Name of the LibreNMS group.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.itemTypes | Kinds of items to show
|
| options/nixos/networking.wlanInterfaces.<name>.fourAddr | Whether to enable 4-address mode with type managed.
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.keepWithin | Keep all archives within this time interval.
|
| options/nixos/services.k3s.autoDeployCharts | Auto deploying Helm charts that are installed by the k3s Helm controller
|
| options/nixos/services.asusd.auraConfigs | The content of /etc/asusd/aura_.ron
|
| options/home-manager/programs.thunderbird.profiles.<name>.search | Declarative search engine configuration.
|
| options/home-manager/programs.librewolf.profiles.<name>.bookmarks | Declarative bookmarks.
|
| options/home-manager/accounts.email.accounts.<name>.alot.contactCompletion | Contact completion configuration as expected per alot
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.timeRange.start | Start of time range to show.
|
| options/nixos/networking.wlanInterfaces.<name>.mac | MAC address to use for the device
|
| options/darwin/launchd.agents.<name>.serviceConfig.WorkingDirectory | This optional key is used to specify a directory to chdir(2) to before running the job.
|
| options/nixos/services.factorio.loadLatestSave | Load the latest savegame on startup
|
| options/nixos/containers.<name>.bindMounts.<name>.hostPath | Location of the host path to be mounted.
|
| options/nixos/services.jigasi.xmppDomain | Domain name of the XMMP server to which to connect as a component
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Disabled | This optional key is used as a hint to launchctl(1) that it should not submit this job to launchd when
loading a job or jobs
|
| options/nixos/networking.supplicant.<name>.extraCmdArgs | Command line arguments to add when executing wpa_supplicant.
|
| options/nixos/boot.binfmt.registrations.<name>.fixBinary | Whether to open the interpreter file as soon as the
registration is loaded, rather than waiting for a
relevant file to be invoked
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| options/nixos/systemd.network.networks.<name>.quickFairQueueingConfig | Each attribute in this set specifies an option in the
[QuickFairQueueing] section of the unit
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.keepYearly | Number of yearly archives to keep
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.keepHourly | Number of hourly archives to keep
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.keepWeekly | Number of weekly archives to keep
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.cssSnippets.*.enable | Whether to enable the snippet.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.cssSnippets.*.source | Path of the source file.
|
| options/nixos/services.bitlbee.hostName | Normally, BitlBee gets a hostname using getsockname()
|
| options/home-manager/accounts.email.accounts.<name>.signature.showSignature | Method to communicate the signature.
|
| options/home-manager/programs.librewolf.profiles.<name>.settings | Attribute set of LibreWolf preferences
|
| options/home-manager/programs.floorp.profiles.<name>.search.meta.maintainers | List of maintainers of each module
|
| options/nixos/networking.macvlans.<name>.interface | The interface the macvlan will transmit packets through.
|
| options/nixos/services.k3s.charts | Packaged Helm charts that are linked to /var/lib/rancher/k3s/server/static/charts before k3s starts
|
| options/nixos/boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.mode | The file access mode to use when creating this file or directory.
|
| options/nixos/services.freshrss.pool | Name of the php-fpm pool to use and setup
|
| options/nixos/services.mongodb.replSetName | If this instance is part of a replica set, set its name here
|
| options/nixos/services.prometheus.alertmanagerGotify.metrics.username | The username used to access your metrics.
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.extraConfig | Extra settings.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.authCert | Either a path to a certificate with a client certificate and
the key or a list of paths to the files with them.
|
| options/nixos/services.prosody.muc.*.domain | Domain name of the MUC
|
| options/darwin/networking.wg-quick.interfaces.<name>.peers.*.publicKey | The public key for this peer.
|
| options/nixos/networking.wireless.networks.<name>.extraConfig | Extra configuration lines appended to the network block
|
| options/nixos/services.wakapi.database.user | The name of the user to use for Wakapi.
|
| options/nixos/services.ircdHybrid.serverName | IRCD server name.
|
| options/nixos/services.borgmatic.configurations.<name>.repositories | A required list of local or remote repositories with paths and
optional labels (which can be used with the --repository flag to
select a repository)
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.appearance | Settings to write to appearance.json.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.AbandonProcessGroup | When a job dies, launchd kills any remaining processes with the same process group ID as the job
|
| options/nixos/networking.jool.siit | Definitions of SIIT instances of Jool
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.publicKey | The base64 public key to the peer.
|
| options/home-manager/accounts.email.accounts.<name>.offlineimap.extraConfig.local | Extra configuration options to add to the local account
section.
|
| options/home-manager/accounts.email.accounts.<name>.smtp.tls.certificatesFile | Path to file containing certificate authorities that should
be used to validate the connection authenticity
|
| options/home-manager/accounts.email.accounts.<name>.imap.tls.certificatesFile | Path to file containing certificate authorities that should
be used to validate the connection authenticity
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.resources | List of HTTP resources to serve on this listener.
|
| options/nixos/networking.interfaces.<name>.wakeOnLan.policy | The Wake-on-LAN policy
to set for the device
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets | This optional key is used to specify launch on demand sockets that can be used to let launchd know when
to run the job
|
| options/nixos/services.gitlab.registry.host | GitLab container registry host name.
|
| options/nixos/services.cntlm.netbios_hostname | The hostname of your machine.
|
| options/nixos/programs.nix-required-mounts.allowedPatterns.<name>.paths | A list of glob patterns, indicating which paths to expose to the sandbox
|
| options/nixos/boot.loader.grub.extraFiles | A set of files to be copied to /boot
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.postHook | Command to call for each item creation and modification
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.verify | Null or path to certificate to verify SSL against
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.enable | Whether to enable synchronization using vdirsyncer.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.tokenFile | A file path where access tokens are stored.
|
| options/nixos/services.mjpg-streamer.user | mjpg-streamer user name.
|
| options/nixos/services.dawarich.user | User under which dawarich runs
|
| options/nixos/services.samba.nsswins | Whether to enable WINS NSS (Name Service Switch) plug-in
|
| options/nixos/systemd.user.sockets.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/systemd.user.targets.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/services.outline.oidcAuthentication.usernameClaim | Specify which claims to derive user information from
|
| options/nixos/boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.age | Delete a file when it reaches a certain age
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.userAgent | The user agent to report to the server
|
| options/nixos/services.victoriatraces.basicAuthUsername | Basic Auth username used to protect VictoriaTraces instance by authorization
|
| options/home-manager/programs.thunderbird.profiles.<name>.search.force | Whether to force replace the existing search
configuration
|
| options/nixos/users.extraUsers.<name>.hashedPassword | Specifies the hashed password for the user
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.urlCommand | A command that prints the URL of the storage.
|
| options/nixos/programs.uwsm.waylandCompositors.<name>.binPath | The wayland-compositor binary path that will be called by UWSM
|
| options/home-manager/accounts.contact.accounts.<name>.thunderbird.token | A token is generated when adding an address book manually to Thunderbird, this can be entered here.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.ThrottleInterval | This key lets one override the default throttling policy imposed on jobs by launchd
|
| options/nixos/networking.bridges.<name>.interfaces | The physical network interfaces connected by the bridge.
|
| options/nixos/services.bird-lg.frontend.domain | Server name domain suffixes.
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.settings | Settings for this profile
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.fragmentation | Use IKE fragmentation (proprietary IKEv1 extension or RFC 7383 IKEv2
fragmentation)
|
| options/darwin/launchd.agents.<name>.serviceConfig.ProcessType | This optional key describes, at a high level, the intended purpose of the job
|
| options/home-manager/accounts.calendar.accounts.<name>.remote.passwordCommand | A command that prints the password to standard output.
|
| options/nixos/programs.uwsm.waylandCompositors.<name>.comment | The comment field of the desktop entry file.
|
| options/nixos/networking.wireguard.interfaces.<name>.ips | The IP addresses of the interface.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.cursor.background | The background color.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.cursor.foreground | The foreground color.
|
| options/nixos/services.transmission.settings.script-torrent-done-filename | Executable to be run at torrent completion.
|
| options/home-manager/wayland.windowManager.sway.config.bindswitches.<name>.action | The sway command to execute on state changes
|
| options/nixos/systemd.paths.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/systemd.targets.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/systemd.sockets.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/services.keycloak.settings.hostname-backchannel-dynamic | Enables dynamic resolving of backchannel URLs,
including hostname, scheme, port and context path
|
| options/darwin/networking.wg-quick.interfaces.<name>.privateKeyFile | Path to file containing this interface's private key.
|
| options/darwin/security.sandbox.profiles.<name>.allowNetworking | Whether to allow network access inside the sandbox.
|
| options/nixos/fileSystems.<name>.noCheck | Disable running fsck on this filesystem.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.mediation_peer | Identity under which the peer is registered at the mediation server, that
is, the IKE identity the other end of this connection uses as its local
identity on its connection to the mediation server
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.QueueDirectories | Much like the WatchPaths option, this key will watch the paths for modifications
|
| options/nixos/networking.interfaces.<name>.ipv6.routes | List of extra IPv6 static routes that will be assigned to the interface.
|
| options/nixos/services.athens.storage.minio.bucket | Bucket name for the minio storage backend.
|
| options/nixos/networking.wg-quick.interfaces.<name>.privateKeyFile | Private key file as generated by wg genkey.
|
| options/home-manager/programs.vscode.profiles.<name>.keybindings | Keybindings written to Visual Studio Code's
keybindings.json
|
| options/nixos/services.davfs2.davUser | When invoked by root the mount.davfs daemon will run as this user
|
| options/home-manager/programs.thunderbird.profiles.<name>.userChrome | Custom Thunderbird user chrome CSS.
|
| options/home-manager/programs.floorp.profiles.<name>.containersForce | Whether to force replace the existing containers configuration
|
| options/nixos/services.resilio.deviceName | Name of the Resilio Sync device.
|
| options/nixos/services.lasuite-docs.domain | Domain name of the docs instance.
|
| options/nixos/services.lasuite-meet.domain | Domain name of the meet instance.
|
| options/home-manager/launchd.agents.<name>.config.LowPriorityBackgroundIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O when the process is throttled with the Darwin-background classification.
|
| options/home-manager/programs.librewolf.profiles.<name>.search.privateDefault | The default search engine used in the Private Browsing.
|
| options/home-manager/programs.librewolf.profiles.<name>.search.engines | Attribute set of search engine configurations
|
| options/nixos/users.users.<name>.openssh.authorizedPrincipals | A list of verbatim principal names that should be added to the user's
authorized principals.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.timeRange | A time range to synchronize. start and end can be any Python
expression that returns a datetime.datetime
object.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.useVcard4 | Specifies whether vdirsyncer should request vCards in version 4.0
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.keepMonthly | Number of monthly archives to keep
|
| options/home-manager/programs.firefox.profiles.<name>.search.meta.maintainers | List of maintainers of each module
|
| options/nixos/services.ncps.cache.lru.scheduleTimeZone | The name of the timezone to use for the cron schedule
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.itemTypes | Kinds of items to show
|
| options/darwin/launchd.daemons.<name>.serviceConfig.WorkingDirectory | This optional key is used to specify a directory to chdir(2) to before running the job.
|
| options/home-manager/programs.librewolf.profiles.<name>.bookmarks.configFile | Configuration file to define custom bookmarks.
|
| options/home-manager/programs.autorandr.profiles.<name>.hooks.postswitch | Postswitch hook executed after mode switch.
|
| options/home-manager/accounts.email.accounts.<name>.offlineimap.extraConfig.remote | Extra configuration options to add to the remote account
section.
|
| options/nixos/services.saunafs.masterHost | IP or hostname name of master host.
|
| options/nixos/services.prometheus.alertmanagerGotify.metrics.namespace | The namescape of the metrics.
|
| options/nixos/networking.vswitches.<name>.openFlowVersion | Version of OpenFlow protocol to use when communicating with the switch internally (e.g. with openFlowRules).
|
| options/nixos/networking.wg-quick.interfaces.<name>.privateKey | Base64 private key generated by wg genkey
|
| options/nixos/networking.interfaces.<name>.ipv4.routes.*.via | IPv4 address of the next hop.
|
| options/nixos/networking.interfaces.<name>.ipv6.routes.*.via | IPv6 address of the next hop.
|
| options/nixos/systemd.network.networks.<name>.networkEmulatorConfig | Each attribute in this set specifies an option in the
[NetworkEmulator] section of the unit
|
| options/nixos/services.jibri.xmppEnvironments.<name>.disableCertificateVerification | Whether to skip validation of the server's certificate.
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| options/home-manager/accounts.contact.accounts.<name>.thunderbird.enable | Whether to enable the Thunderbird mail client for this account.
|
| options/nixos/networking.wg-quick.interfaces.<name>.configFile | wg-quick .conf file, describing the interface
|
| options/darwin/launchd.agents.<name>.serviceConfig.ProgramArguments | This key maps to the second argument of execvp(3)
|
| options/nixos/networking.jool.nat64 | Definitions of NAT64 instances of Jool
|
| options/nixos/services.opendkim.keyPath | The path that opendkim should put its generated private keys into
|
| options/nixos/boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.type | The type of operation to perform on the file
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.settings | Attribute set of options for each extension
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.ignore_tags | Set labels to ignore when syncing from local tags to
remote labels (after translations).
|
| options/nixos/services.firezone.server.provision.accounts.<name>.features.self_hosted_relays | Whether to enable the self_hosted_relays feature for this account.
|
| options/nixos/boot.binfmt.registrations.<name>.interpreter | The interpreter to invoke to run the program
|
| options/nixos/services.moosefs.masterHost | IP or DNS name of the MooseFS master server.
|
| options/nixos/systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.mode | The file access mode to use when creating this file or directory.
|
| options/nixos/services.dependency-track.oidc.teams.claim | Defines the name of the claim that contains group memberships or role assignments in the provider's userinfo endpoint
|
| options/nixos/services.athens.storage.s3.bucket | Bucket name for the S3 storage backend.
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.force | Whether to override all previous firefox settings
|
| options/home-manager/programs.thunderbird.profiles.<name>.search.default | The default search engine used in the address bar and search
bar.
|
| options/nixos/containers.<name>.bindMounts.<name>.isReadOnly | Determine whether the mounted path will be accessed in read-only mode.
|
| options/nixos/services.sanoid.datasets.<name>.pre_snapshot_script | Script to run before taking snapshot.
|
| options/home-manager/programs.borgmatic.backups.<name>.location.patterns | Patterns to include/exclude
|
| options/nixos/security.wrappers.<name>.permissions | The permissions of the wrapper program
|
| options/home-manager/accounts.calendar.accounts.<name>.thunderbird.color | Display color of the calendar in hex
|
| options/nixos/networking.interfaces.<name>.macAddress | MAC address of the interface
|
| options/nixos/services.oidentd.enable | Whether to enable ‘oidentd’, an implementation of the Ident
protocol (RFC 1413)
|
| options/nixos/services.athens.index.mysql.database | Database name for the MySQL database.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.deleteBinding | Which string the terminal should send to an application when the user
presses the Delete key.
auto
: Send the @7 control sequence.
ascii-backspace
: Send an ASCII backspace character (0x08).
ascii-delete
: Send an ASCII delete character (0x7F).
delete-sequence
: Send the @7 control sequence.
tty
: Send terminal's "erase" setting.
|
| options/nixos/networking.wireguard.interfaces.<name>.type | The type of the interface
|
| options/nixos/services.varnish.listen.*.user | User name who owns the socket file.
|
| options/nixos/services.bookstack.mail.fromName | Mail "from" name.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.corePlugins.*.settings | Plugin settings to include.
|
| options/nixos/services.dnsdist.dnscrypt.providerName | The name that will be given to this DNSCrypt resolver.
The provider name must start with 2.dnscrypt-cert..
|
| options/nixos/networking.wg-quick.interfaces.<name>.extraOptions | Extra options to append to the interface section
|
| options/home-manager/accounts.calendar.accounts.<name>.thunderbird.readOnly | Mark calendar as read only
|
| options/nixos/services.mobilizon.settings.":mobilizon"."Mobilizon.Storage.Repo".username | User used to connect to the database
|
| options/darwin/networking.wg-quick.interfaces.<name>.peers.*.allowedIPs | List of IP addresses associated with this peer.
|
| options/home-manager/programs.thunderbird.profiles.<name>.extraConfig | Extra preferences to add to user.js.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.metadata | Metadata keys that should be synchronized when vdirsyncer
metasync is executed.
|
| options/nixos/networking.supplicant.<name>.extraConf | Configuration options for wpa_supplicant.conf
|
| options/nixos/services.netbird.enable | Enables backward-compatible NetBird client service
|
| options/nixos/systemd.network.networks.<name>.quickFairQueueingConfigClass | Each attribute in this set specifies an option in the
[QuickFairQueueingClass] section of the unit
|
| options/nixos/services.dolibarr.domain | Domain name of your server.
|
| options/home-manager/programs.thunderbird.profiles.<name>.isDefault | Whether this is a default profile
|
| options/nixos/services.soju.acceptProxyIP | Allow the specified IPs to act as a proxy
|
| options/nixos/services.authelia.instances.<name>.settings.default_2fa_method | Default 2FA method for new users and fallback for preferred but disabled methods.
|
| options/nixos/users.mysql.pam.table | The name of table that maps unique login names to the passwords.
|
| options/nixos/systemd.timers.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/systemd.slices.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/networking.vswitches.<name>.extraOvsctlCmds | Commands to manipulate the Open vSwitch database
|
| options/nixos/services.mjpg-streamer.group | mjpg-streamer group name.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.urlCommand | A command that prints the URL of the storage.
|
| options/nixos/networking.wireguard.interfaces.<name>.peers | Peers linked to the interface.
|
| options/home-manager/programs.gemini-cli.commands.<name>.description | A brief, one-line description of what the command does
|
| options/nixos/services.bacula-fd.tls.allowedCN | Common name attribute of allowed peer certificates
|
| options/nixos/services.bacula-sd.tls.allowedCN | Common name attribute of allowed peer certificates
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.foregroundColor | The foreground color.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.backgroundColor | The background color.
|
| options/home-manager/programs.hexchat.channels.<name>.options.autoconnect | Autoconnect to network.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.partialSync | What should happen if synchronization in one direction
is impossible due to one storage being read-only
|
| options/nixos/services.livekit.keyFile | LiveKit key file holding one or multiple application secrets
|
| options/darwin/launchd.agents.<name>.serviceConfig.Disabled | This optional key is used as a hint to launchctl(1) that it should not submit this job to launchd when
loading a job or jobs
|
| options/nixos/services.jitsi-videobridge.xmppConfigs.<name>.disableCertificateVerification | Whether to skip validation of the server's certificate.
|
| options/nixos/systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.age | Delete a file when it reaches a certain age
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions | Submodule for installing and configuring extensions.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.ProcessType | This optional key describes, at a high level, the intended purpose of the job
|
| options/nixos/services.mail.sendmailSetuidWrapper.program | The name of the wrapper program
|
| options/home-manager/accounts.email.accounts.<name>.offlineimap.extraConfig.account | Extra configuration options to add to the account section.
|
| options/nixos/services.buildkite-agents | Attribute set of buildkite agents
|
| options/darwin/services.buildkite-agents | Attribute set of buildkite agents
|
| options/darwin/services.github-runners | Multiple GitHub Runners
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.communityPlugins | Community plugins to install and activate.
|
| options/home-manager/programs.thunderbird.profiles.<name>.userContent | Custom Thunderbird user content CSS.
|
| options/home-manager/programs.firefox.profiles.<name>.containersForce | Whether to force replace the existing containers configuration
|
| options/home-manager/services.cachix-agent.profile | The Nix profile name.
|
| options/nixos/services.netbird.server.signal.domain | The domain name for the signal service.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/home-manager/wayland.windowManager.sway.config.bindswitches.<name>.locked | Unless the flag --locked is set, the command
will not be run when a screen locking program
is active
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.profiles | List of Thunderbird profiles for which this account should be
enabled
|
| options/nixos/services.prosody.httpFileShare.domain | Domain name for a http_file_share service.
|
| options/nixos/services.powerdns.enable | Whether to enable PowerDNS domain name server.
|
| options/home-manager/services.wlsunset.output | Name of output to use, by default all outputs are used.
|
| options/nixos/containers.<name>.bindMounts.<name>.mountPoint | Mount point on the container file system.
|
| options/nixos/boot.zfs.devNodes | Name of directory from which to import ZFS device, this is passed to zpool import
as the value of the -d option
|
| options/nixos/services.sanoid.templates.<name>.pre_snapshot_script | Script to run before taking snapshot.
|
| options/home-manager/programs.opencode.skills | Custom agent skills for opencode
|
| options/nixos/services.bacula-dir.tls.allowedCN | Common name attribute of allowed peer certificates
|
| options/home-manager/programs.librewolf.profiles.<name>.bookmarks.settings | Custom bookmarks.
|
| options/nixos/networking.wg-quick.interfaces.<name>.autostart | Whether to bring up this interface automatically during boot.
|
| options/darwin/networking.wg-quick.interfaces.<name>.autostart | Whether to bring up this interface automatically during boot.
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.settings | Attribute set of options for each extension
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.settings | Extra settings to add to this Thunderbird account configuration
|
| options/nixos/users.users.<name>.hashedPasswordFile | The full path to a file that contains the hash of the user's
password
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.keepSecondly | Number of secondly archives to keep
|
| options/home-manager/programs.borgmatic.backups.<name>.retention.keepMinutely | Number of minutely archives to keep
|
| options/nixos/services.openafsClient.cellName | Cell name.
|
| options/nixos/users.mysql.pam.logging.userColumn | The name of the column in the log table to which the name of the
user being authenticated is stored.
|
| options/nixos/users.mysql.pam.logging.hostColumn | The name of the column in the log table to which the name of the user
being authenticated is stored.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.ProgramArguments | This key maps to the second argument of execvp(3)
|
| options/home-manager/programs.borgmatic.backups.<name>.consistency.checks | Consistency checks to run
|
| options/nixos/services.prosody.uploadHttp.domain | Domain name for the http-upload service
|
| options/nixos/networking.supplicant.<name>.configFile.writable | Whether the configuration file at configFile.path should be written to by
wpa_supplicant.
|
| options/darwin/networking.wg-quick.interfaces.<name>.peers.*.endpoint | IP and port to connect to this peer at.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.scrollbackLines | The number of scrollback lines to keep, null for infinite.
|
| options/darwin/launchd.agents.<name>.serviceConfig.ThrottleInterval | This key lets one override the default throttling policy imposed on jobs by launchd
|
| options/home-manager/wayland.windowManager.sway.config.bindswitches.<name>.reload | If the --reload flag is given, the binding will
also be executed when the config is reloaded.
toggle bindings will not be executed on reload
|
| options/home-manager/services.gromit-mpx.tools.*.device | Use this tool with the given xinput device
|
| options/home-manager/accounts.calendar.accounts.<name>.thunderbird.enable | Whether to enable the Thunderbird mail client for this account.
|
| options/nixos/services.bird-lg.frontend.servers | Server name prefixes.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.communityPlugins.*.pkg | The plugin package.
|
| options/nixos/services.cachix-agent.profile | Profile name, defaults to 'system' (NixOS).
|
| options/nixos/services.weblate.localDomain | The domain name serving your Weblate instance.
|
| options/darwin/security.sandbox.profiles.<name>.allowLocalNetworking | Whether to allow localhost network access inside the sandbox.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.session_url | Session URL to connect to
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/nixos/networking.sits.<name>.encapsulation.port | Destination port when using UDP encapsulation.
|
| options/nixos/networking.wireguard.interfaces.<name>.preSetup | Commands called at the start of the interface setup.
|
| options/home-manager/programs.thunderbird.profiles.<name>.settings | Preferences to add to this profile's
user.js.
|
| options/nixos/services.nix-serve.secretKeyFile | The path to the file used for signing derivation data
|
| options/nixos/systemd.network.networks.<name>.controlledDelayConfig | Each attribute in this set specifies an option in the
[ControlledDelay] section of the unit
|
| options/home-manager/programs.librewolf.profiles.<name>.containers | Attribute set of container configurations
|
| options/darwin/launchd.agents.<name>.serviceConfig.QueueDirectories | Much like the WatchPaths option, this key will watch the paths for modifications
|
| options/nixos/users.extraUsers.<name>.openssh.authorizedPrincipals | A list of verbatim principal names that should be added to the user's
authorized principals.
|
| options/nixos/services.outline.storage.region | AWS S3 region name.
|
| options/home-manager/accounts.contact.accounts.<name>.pimsync.extraPairDirectives | Extra directives that should be added under this accounts pair directive
|
| options/nixos/services.mobilizon.settings.":mobilizon".":instance".hostname | Your instance's hostname
|
| options/nixos/services.prometheus.exporters.process.settings.process_names | All settings expressed as an Nix attrset
|
| options/nixos/services.synergy.client.screenName | Use the given name instead of the hostname to identify
ourselves to the server.
|
| options/darwin/services.synergy.client.screenName | Use the given name instead of the hostname to identify
ourselves to the server.
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.x_forwarded | Use the X-Forwarded-For (XFF) header as the client IP and not the
actual client IP.
|
| options/home-manager/launchd.agents.<name>.config.StartCalendarInterval | This optional key causes the job to be started every calendar interval as specified
|
| options/nixos/services.gitea.settings.server.DOMAIN | Domain name of your server.
|
| options/home-manager/launchd.agents.<name>.config.inetdCompatibility.Wait | This flag corresponds to the "wait" or "nowait" option of inetd
|
| options/home-manager/accounts.email.accounts.<name>.offlineimap.postSyncHookCommand | Command to run after fetching new mails.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LowPriorityBackgroundIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O when the process is throttled with the Darwin-background classification.
|
| options/nixos/systemd.network.networks.<name>.stochasticFairBlueConfig | Each attribute in this set specifies an option in the
[StochasticFairBlue] section of the unit
|
| options/nixos/services.netatalk.extmap | File name extension mappings
|
| options/nixos/systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.type | The type of operation to perform on the file
|
| options/home-manager/launchd.agents.<name>.config.inetdCompatibility | The presence of this key specifies that the daemon expects to be run as if it were launched from inetd.
|
| options/nixos/fileSystems.<name>.enable | Whether to enable the filesystem mount.
|
| options/nixos/services.synergy.server.screenName | Use the given name instead of the hostname to identify
this screen in the configuration.
|
| options/darwin/services.synergy.server.screenName | Use the given name instead of the hostname to identify
this screen in the configuration.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.metadata | Metadata keys that should be synchronized when vdirsyncer
metasync is executed.
|
| options/nixos/services.avahi.nssmdns4 | Whether to enable the mDNS NSS (Name Service Switch) plug-in for IPv4
|
| options/nixos/services.varnish.listen.*.group | Group name who owns the socket file.
|
| options/nixos/programs.tsmClient.defaultServername | If multiple server stanzas are declared with
programs.tsmClient.servers,
this option may be used to name a default
server stanza that IBM TSM uses in the absence of
a user-defined dsm.opt file
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.endpoint | Endpoint IP or hostname of the peer, followed by a colon,
and then a port number of the peer.
|
| options/nixos/services.openafsServer.cellName | Cell name, this server will serve.
|
| options/nixos/services.smokeping.user | User that runs smokeping and (optionally) thttpd
|
| options/nixos/networking.wireguard.interfaces.<name>.postSetup | Commands called at the end of the interface setup.
|
| options/nixos/services.factorio.saveName | The name of the savegame that will be used by the server
|
| options/nixos/services.slurm.dbdserver.dbdHost | Hostname of the machine where slurmdbd
is running (i.e. name returned by hostname -s).
|
| options/home-manager/programs.obsidian.defaultSettings.hotkeys.<name>.*.modifiers | The hotkey modifiers.
|
| options/nixos/services.gammu-smsd.backend.sql.database | Database name to store sms data
|
| options/nixos/services.consul.interface.bind | The name of the interface to pull the bind_addr from.
|
| options/nixos/services.discourse.admin.fullName | The admin user's full name.
|
| options/nixos/services.victoriametrics.basicAuthUsername | Basic Auth username used to protect VictoriaMetrics instance by authorization
|
| options/home-manager/launchd.agents.<name>.config.EnableTransactions | This flag instructs launchd that the job promises to use vproc_transaction_begin(3) and
vproc_transaction_end(3) to track outstanding transactions that need to be reconciled before the
process can safely terminate
|
| options/nixos/networking.wireguard.interfaces.<name>.metric | Set the metric of routes related to this Wireguard interface.
|
| options/nixos/services.matrix-synapse.log | Default configuration for the loggers used by matrix-synapse and its workers
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.clientIdCommand | A command that prints the OAuth credentials to standard
output
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.partialSync | What should happen if synchronization in one direction
is impossible due to one storage being read-only
|
| options/nixos/systemd.sockets.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/systemd.targets.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/services.httpd.extraModules | Additional Apache modules to be used
|
| options/nixos/services.cachix-watch-store.cacheName | Cachix binary cache name
|
| options/nixos/services.smokeping.owner | Real name of the owner of the instance
|
| options/nixos/services.weechat.sessionName | Name of the screen session for weechat.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Disabled | This optional key is used as a hint to launchctl(1) that it should not submit this job to launchd when
loading a job or jobs
|
| options/nixos/services.varnish.listen.*.address | If given an IP address, it can be a host name ("localhost"), an IPv4 dotted-quad
("127.0.0.1") or an IPv6 address enclosed in square brackets ("[::1]").
(VCL4.1 and higher) If given an absolute Path ("/path/to/listen.sock") or "@"
followed by the name of an abstract socket ("@myvarnishd") accept connections
on a Unix domain socket
|
| options/nixos/systemd.network.networks.<name>.hierarchyTokenBucketConfig | Each attribute in this set specifies an option in the
[HierarchyTokenBucket] section of the unit
|
| options/nixos/virtualisation.rosetta.mountTag | The VirtioFS mount tag for the Rosetta runtime, exposed by the host's virtualisation software
|
| options/nixos/services.mastodon.user | User under which mastodon runs
|
| options/home-manager/launchd.agents.<name>.config.EnvironmentVariables | This optional key is used to specify additional environment variables to be set before running the
job.
|
| options/nixos/services.cjdns.ETHInterface.bind | Bind to this device for native ethernet operation.
all is a pseudo-name which will try to connect to all devices.
|
| options/nixos/boot.binfmt.registrations.<name>.preserveArgvZero | Whether to pass the original argv[0] to the interpreter
|
| options/home-manager/programs.vscode.profiles.<name>.enableExtensionUpdateCheck | Whether to enable update notifications for extensions
|
| options/nixos/services.caddy.adapter | Name of the config adapter to use
|
| options/home-manager/systemd.user.automounts.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/nixos/users.users.<name>.initialPassword | Specifies the initial password for the user, i.e. the
password assigned if the user does not already exist
|
| options/nixos/networking.wireless.networks.<name>.authProtocols | The list of authentication protocols accepted by this network
|
| options/nixos/services.unpoller.influxdb.db | Database name
|
| options/nixos/hardware.nvidia-container-toolkit.device-name-strategy | Specify the strategy for generating device names,
passed to nvidia-ctk cdi generate
|
| options/nixos/networking.wireguard.interfaces.<name>.mtu | Set the maximum transmission unit in bytes for the wireguard
interface
|
| options/nixos/services.dovecot2.user | Dovecot user name.
|
| options/nixos/services.gitlab.databaseName | GitLab database name.
|
| options/nixos/virtualisation.xen.store.settings.perms.enableWatch | Whether to enable the watch permission system
|
| options/nixos/virtualisation.libvirtd.nss.enableGuest | This option enables the newer libvirt_guest NSS module
|
| options/darwin/services.gitlab-runner.sentryDSN | Data Source Name for tracking of all system level errors to Sentry.
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/darwin/launchd.daemons.<name>.serviceConfig.ThrottleInterval | This key lets one override the default throttling policy imposed on jobs by launchd
|
| options/home-manager/programs.librewolf.profiles.<name>.search.meta.maintainers | List of maintainers of each module
|
| options/home-manager/programs.floorp.profiles.<name>.bookmarks.meta.maintainers | List of maintainers of each module
|
| options/home-manager/programs.hexchat.channels.<name>.options.connectToSelectedServerOnly | Connect to selected server only.
|
| options/nixos/services.sanoid.datasets.<name>.post_snapshot_script | Script to run after taking snapshot.
|
| options/nixos/services.alerta.databaseName | Name of the database instance to connect to
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.resources.*.compress | Whether synapse should compress HTTP responses to clients that support it
|
| options/home-manager/accounts.email.accounts.<name>.getmail.destinationCommand | Specify a command delivering the incoming mail to your maildir.
|
| options/nixos/services.misskey.reverseProxy.host | The fully qualified domain name to bind to
|
| options/nixos/systemd.network.networks.<name>.trivialLinkEqualizerConfig | Each attribute in this set specifies an option in the
[TrivialLinkEqualizer] section of the unit
|
| options/home-manager/programs.borgmatic.backups.<name>.consistency.extraConfig | Extra settings.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.QueueDirectories | Much like the WatchPaths option, this key will watch the paths for modifications
|
| options/nixos/containers.<name>.flake | The Flake URI of the NixOS configuration to use for the container
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters | List of message filters to add to this Thunderbird account
configuration.
|
| options/nixos/services.xserver.videoDriver | The name of the video driver for your graphics card
|
| options/nixos/programs.nix-required-mounts.allowedPatterns.<name>.onFeatures | Which requiredSystemFeatures should trigger relaxation of the sandbox
|
| options/nixos/services.smokeping.hostName | DNS name for the urls generated in the cgi.
|
| options/home-manager/accounts.calendar.accounts.<name>.pimsync.extraPairDirectives | Extra directives that should be added under this accounts pair directive
|
| options/nixos/services.samba.winbindd.enable | Whether to enable Samba's winbindd, which provides a number of services
to the Name Service Switch capability found in most modern C libraries,
to arbitrary applications via PAM and ntlm_auth and to Samba itself.
|
| options/nixos/services.resolved.llmnr | Controls Link-Local Multicast Name Resolution support
(RFC 4795) on the local host
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.allowedIPs | List of IP (v4 or v6) addresses with CIDR masks from
which this peer is allowed to send incoming traffic and to which
outgoing traffic for this peer is directed
|
| options/nixos/boot.binfmt.registrations.<name>.magicOrExtension | The magic number or extension to match on.
|
| options/nixos/services.keyd.keyboards | Configuration for one or more device IDs
|
| options/nixos/networking.wireguard.interfaces.<name>.fwMark | Mark all wireguard packets originating from
this interface with the given firewall mark
|
| options/nixos/services.factorio.stateDirName | Name of the directory under /var/lib holding the server's data
|
| options/nixos/programs.schroot.profiles.<name>.nssdatabases | System databases (as described in /etc/nsswitch.conf on GNU/Linux systems) to copy into the chroot from the host.
|
| options/nixos/networking.vswitches.<name>.interfaces | The physical network interfaces connected by the vSwitch.
|
| options/nixos/services.ddclient.domains | Domain name(s) to synchronize.
|
| options/home-manager/accounts.contact.accounts.<name>.thunderbird.profiles | List of Thunderbird profiles for which this account should be
enabled
|
| options/nixos/containers.<name>.extraVeths.<name>.hostBridge | Put the host-side of the veth-pair into the named bridge
|
| options/nixos/services.davfs2.davGroup | The group of the running mount.davfs daemon
|
| options/nixos/services.athens.storage.mongo.defaultDBName | Name of the mongo database.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.highlight.background | The background color.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.highlight.foreground | The foreground color.
|
| options/nixos/services.thanos.rule.web.prefix-header | Name of HTTP request header used for dynamic prefixing of UI links and
redirects
|
| options/nixos/services.pangolin.baseDomain | Your base fully qualified domain name (without any subdomains).
|
| options/nixos/services.mysql.ensureUsers | Ensures that the specified users exist and have at least the ensured permissions
|
| options/nixos/networking.wireless.networks.<name>.priority | By default, all networks will get same priority group (0)
|
| options/nixos/services.lasuite-meet.settings.DB_NAME | Name of the database
|
| options/nixos/services.lasuite-docs.settings.DB_NAME | Name of the database
|
| options/nixos/users.users.<name>.initialHashedPassword | Specifies the initial hashed password for the user, i.e. the
hashed password assigned if the user does not already
exist
|
| options/nixos/services.acme-dns.settings.general.domain | Domain name to serve the requests off of.
|
| options/nixos/services.unpoller.unifi.defaults.user | Unifi service user name.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StartCalendarInterval | This optional key causes the job to be started every calendar interval as specified
|
| options/nixos/fileSystems.<name>.overlay.useStage1BaseDirectories | If enabled, lowerdir, upperdir and workdir will be prefixed with /sysroot
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters.*.type | Type for this filter.
|
| options/home-manager/accounts.calendar.accounts.<name>.primaryCollection | The primary collection of the account
|
| options/nixos/boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.argument | An argument whose meaning depends on the type of operation
|
| options/home-manager/accounts.email.accounts.<name>.smtp.authentication | The authentication mechanism.
|
| options/home-manager/accounts.email.accounts.<name>.imap.authentication | The authentication mechanism.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.clientIdCommand | A command that prints the OAuth credentials to standard
output
|
| options/nixos/fileSystems.<name>.fsType | Type of the file system
|
| options/nixos/systemd.network.networks.<name>.dhcpPrefixDelegationConfig | Each attribute in this set specifies an option in the
[DHCPPrefixDelegation] section of the unit
|
| options/nixos/services.syncplay.useACMEHost | If set, use NixOS-generated ACME certificate with the specified name for TLS
|
| options/nixos/services.supybot.plugins | Attribute set of additional plugins that will be symlinked to the
plugin subdirectory
|
| options/nixos/services.cloudlog.database.user | MySQL user name.
|
| options/home-manager/programs.neovim.extraName | Extra name appended to the wrapper package name.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.communityPlugins.*.enable | Whether to enable the plugin.
|
| options/nixos/networking.interfaces.<name>.proxyARP | Turn on proxy_arp for this device
|
| options/home-manager/accounts.email.accounts.<name>.aerc.imapOauth2Params.client_secret | The OAuth2 client secret.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.smtpOauth2Params.client_secret | The OAuth2 client secret.
|
| options/nixos/services.restic.server.privateRepos | Enable private repos
|
| options/nixos/networking.firewall.interfaces.<name>.allowedUDPPorts | List of open UDP ports.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.inetdCompatibility | The presence of this key specifies that the daemon expects to be run as if it were launched from inetd.
|
| options/nixos/services.gancio.settings.db.database | Name of the PostgreSQL database
|
| options/nixos/services.sanoid.templates.<name>.post_snapshot_script | Script to run after taking snapshot.
|
| options/nixos/networking.wireguard.interfaces.<name>.table | The kernel routing table to add this interface's
associated routes to
|
| options/home-manager/programs.thunderbird.profiles.<name>.search.privateDefault | The default search engine used in the Private Browsing.
|
| options/nixos/networking.interfaces.<name>.ipv4.routes.*.type | Type of the route
|
| options/nixos/networking.interfaces.<name>.ipv6.routes.*.type | Type of the route
|
| options/nixos/services.vault.storageBackend | The name of the type of storage backend
|
| options/home-manager/programs.firefox.profiles.<name>.bookmarks.meta.maintainers | List of maintainers of each module
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.inetdCompatibility.Wait | This flag corresponds to the "wait" or "nowait" option of inetd
|
| options/home-manager/programs.thunderbird.profiles.<name>.feedAccounts | Attribute set of feed accounts
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/nixos/services.shairport-sync.user | User account name under which to run shairport-sync
|
| options/nixos/services.zfs.autoSnapshot.flags | Flags to pass to the zfs-auto-snapshot command
|
| options/home-manager/programs.thunderbird.profiles.<name>.search.engines | Attribute set of search engine configurations
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.EnableTransactions | This flag instructs launchd that the job promises to use vproc_transaction_begin(3) and
vproc_transaction_end(3) to track outstanding transactions that need to be reconciled before the
process can safely terminate
|
| options/darwin/launchd.agents.<name>.serviceConfig.LowPriorityBackgroundIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O when the process is throttled with the Darwin-background classification.
|
| options/nixos/networking.firewall.interfaces.<name>.allowedTCPPorts | List of TCP ports on which incoming connections are
accepted.
|
| options/nixos/networking.interfaces.<name>.ipv4.routes | List of extra IPv4 static routes that will be assigned to the interface.
If the route type is the default unicast, then the scope
is set differently depending on the value of networking.useNetworkd:
the script-based backend sets it to link, while networkd sets
it to global.
If you want consistency between the two implementations,
set the scope of the route manually with
networking.interfaces.eth0.ipv4.routes = [{ options.scope = "global"; }]
for example.
|
| options/nixos/containers.<name>.extraVeths.<name>.hostAddress | The IPv4 address assigned to the host interface.
(Not used when hostBridge is set.)
|
| options/nixos/services.firezone.server.provision.accounts.<name>.features.multi_site_resources | Whether to enable the multi_site_resources feature for this account.
|
| options/nixos/networking.ipips.<name>.encapsulation.limit | For an IPv6-based tunnel, the maximum number of nested
encapsulation to allow. 0 means no nesting, "none" unlimited.
|
| options/nixos/networking.interfaces.<name>.ipv4.routes.*.address | IPv4 address of the network.
|
| options/nixos/networking.interfaces.<name>.ipv6.routes.*.address | IPv6 address of the network.
|
| options/nixos/services.hatsu.settings.HATSU_DOMAIN | The domain name of your instance (eg 'hatsu.local').
|
| options/nixos/services.oncall.settings.db.conn.kwargs.database | Database name.
|
| options/nixos/services.portunus.ldap.searchUserName | The login name of the search user
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters.*.text | The raw text of the filter
|
| options/nixos/networking.supplicant.<name>.userControlled.group | Members of this group can control wpa_supplicant.
|
| options/nixos/users.extraUsers.<name>.hashedPasswordFile | The full path to a file that contains the hash of the user's
password
|
| options/nixos/services.parsedmarc.provision.localMail.recipientName | The DMARC mail recipient name, i.e. the name part of the
email address which receives DMARC reports
|
| options/nixos/systemd.network.networks.<name>.hierarchyTokenBucketClassConfig | Each attribute in this set specifies an option in the
[HierarchyTokenBucketClass] section of the unit
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.EnvironmentVariables | This optional key is used to specify additional environment variables to be set before running the
job.
|
| options/nixos/networking.openconnect.interfaces.<name>.user | Username to authenticate with.
|
| options/nixos/services.jigasi.defaultJvbRoomName | Name of the default JVB room that will be joined if no special header is included in SIP invite.
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.settings | Attribute set of options for each extension
|
| options/home-manager/services.xcape.mapExpression | The value has the grammar Key[|OtherKey]
|
| options/nixos/hardware.fw-fanctrl.config.strategies.<name>.fanSpeedUpdateFrequency | How often the fan speed should be updated in seconds
|
| options/nixos/containers.<name>.extraVeths.<name>.hostAddress6 | The IPv6 address assigned to the host interface.
(Not used when hostBridge is set.)
|
| options/nixos/services.dovecot2.group | Dovecot group name.
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.filters.*.name | Name of the filter
|
| options/home-manager/programs.librewolf.profiles.<name>.containersForce | Whether to force replace the existing containers configuration
|
| options/nixos/services.pds.settings.PDS_HOSTNAME | Instance hostname (base domain name)
|
| options/nixos/networking.sits.<name>.encapsulation | Configures the type of encapsulation.
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.publicKey | The base64 public key of the peer.
|
| options/home-manager/programs.thunderbird.profiles.<name>.withExternalGnupg | Allow using external GPG keys with GPGME.
|
| options/nixos/services.tabby.model | Specify the model that tabby will use to generate completions
|
| options/nixos/services.smokeping.linkStyle | DNS name for the urls generated in the cgi.
|
| options/nixos/services.samba-wsdd.workgroup | Set workgroup name (default WORKGROUP).
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.clientSecretCommand | A command that prints the OAuth credentials to standard
output
|
| options/nixos/services.xserver.displayManager.lightdm.greeter.package | The LightDM greeter to login via
|
| options/nixos/hardware.fw-fanctrl.config.strategies.<name>.movingAverageInterval | Interval (seconds) of the last temperatures to use to calculate the average temperature
|
| options/home-manager/accounts.calendar.accounts.<name>.thunderbird.profiles | List of Thunderbird profiles for which this account should be
enabled
|
| options/nixos/services.autorandr.matchEdid | Match displays based on edid instead of name
|
| options/home-manager/services.autorandr.matchEdid | Match displays based on edid instead of name.
|
| options/nixos/services.thanos.query.web.prefix-header | Name of HTTP request header used for dynamic prefixing of UI links and
redirects
|
| options/nixos/services.coder.database.database | Name of database.
|
| options/nixos/services.httpd.customLogFormat | Defines a custom Apache HTTPD access log format string
|
| options/nixos/networking.interfaces.<name>.ipv6.addresses | List of IPv6 addresses that will be statically assigned to the interface.
|
| options/nixos/networking.interfaces.<name>.ipv4.addresses | List of IPv4 addresses that will be statically assigned to the interface.
|
| options/nixos/networking.sits.<name>.encapsulation.sourcePort | Source port when using UDP encapsulation
|
| options/nixos/users.mysql.pam.logging.rHostColumn | The name of the column in the log table to which the name of the remote
host that initiates the session is stored
|
| options/home-manager/programs.hexchat.channels.<name>.options.useGlobalUserInformation | Use global user information.
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.endpoint | Endpoint IP or hostname of the peer, followed by a colon,
and then a port number of the peer
|
| options/nixos/networking.sits.<name>.encapsulation.type | Select the encapsulation type:
-
6in4: the IPv6 packets are encapsulated using the
6in4 protocol (formerly known as SIT, RFC 4213);
-
gue: the IPv6 packets are encapsulated in UDP packets
using the Generic UDP Encapsulation (GUE) scheme;
-
foo: the IPv6 packets are encapsulated in UDP packets
using the Foo over UDP (FOU) scheme.
|
| options/nixos/services.corosync.clusterName | Name of the corosync cluster.
|
| options/nixos/services.prefect.databaseName | database name for postgres only
|
| options/nixos/networking.wireguard.interfaces.<name>.privateKeyFile | Private key file as generated by wg genkey.
|
| options/darwin/networking.wg-quick.interfaces.<name>.peers.*.presharedKeyFile | Optional, path to file containing the pre-shared key for this peer.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LowPriorityBackgroundIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O when the process is throttled with the Darwin-background classification.
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/nixos/networking.wireguard.interfaces.<name>.preShutdown | Commands called before shutting down the interface.
|
| options/nixos/programs.tsmClient.servers.<name>.tcpserveraddress | Host/domain name or IP address of the IBM TSM server.
|
| options/nixos/services.forgejo.settings.server.DOMAIN | Domain name of your server.
|
| options/nixos/services.tailscale.derper.domain | Domain name under which the derper server is reachable.
|
| options/nixos/services.znc.useLegacyConfig | Whether to propagate the legacy options under
services.znc.confOptions.* to the znc config
|
| options/home-manager/programs.gnome-terminal.profile.<name>.backspaceBinding | Which string the terminal should send to an application when the user
presses the Backspace key.
auto
: Attempt to determine the right value from the terminal's IO settings.
ascii-backspace
: Send an ASCII backspace character (0x08).
ascii-delete
: Send an ASCII delete character (0x7F).
delete-sequence
: Send the @7 control sequence.
tty
: Send terminal's "erase" setting.
|
| options/nixos/users.extraUsers.<name>.initialPassword | Specifies the initial password for the user, i.e. the
password assigned if the user does not already exist
|
| options/nixos/services.shairport-sync.group | Group account name under which to run shairport-sync
|
| options/nixos/services.rspamd.overrides | Overridden configuration files, written into /etc/rspamd/override.d/{name}.
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters.*.action | Action to perform on matched messages.
|
| options/nixos/services.biboumi.settings.realname_from_jid | Whether the realname and username of each biboumi
user will be extracted from their JID
|
| options/nixos/systemd.network.networks.<name>.deficitRoundRobinSchedulerConfig | Each attribute in this set specifies an option in the
[DeficitRoundRobinScheduler] section of the unit
|
| options/nixos/networking.wireguard.interfaces.<name>.privateKey | Base64 private key generated by wg genkey
|
| options/nixos/services.portunus.dex.oidcClients | List of OIDC clients
|
| options/nixos/services.strongswan-swanctl.swanctl.pools | Section defining named pools
|
| options/nixos/services.sanoid.datasets.<name>.process_children_only | Whether to only snapshot child datasets if recursing.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.namespaces.names | Namespace name.
|
| options/nixos/services.shorewall6.configs | This option defines the Shorewall configs
|
| options/nixos/networking.supplicant.<name>.userControlled.socketDir | Directory of sockets for controlling wpa_supplicant.
|
| options/home-manager/programs.opencode.tools | Custom tools for opencode
|
| options/darwin/launchd.agents.<name>.serviceConfig.inetdCompatibility.Wait | This flag corresponds to the "wait" or "nowait" option of inetd
|
| options/nixos/networking.wg-quick.interfaces.<name>.generatePrivateKeyFile | Automatically generate a private key with
wg genkey, at the privateKeyFile location.
|
| options/nixos/services.xserver.displayManager.session | List of sessions supported with the command used to start each
session
|
| options/nixos/networking.ipips.<name>.encapsulation.type | Select the encapsulation type:
-
ipip to create an IPv4 within IPv4 tunnel (RFC 2003).
-
4in6 to create a 4in6 tunnel (RFC 2473);
-
ip6ip6 to create an IPv6 within IPv6 tunnel (RFC 2473);
For encapsulating IPv6 within IPv4 packets, see
the ad-hoc networking.sits option.
|
| options/nixos/services.avahi.nssmdns6 | Whether to enable the mDNS NSS (Name Service Switch) plug-in for IPv6
|
| options/nixos/networking.wireguard.interfaces.<name>.postShutdown | Commands called after shutting down the interface.
|
| options/nixos/networking.firewall.interfaces.<name>.allowedUDPPortRanges | Range of open UDP ports.
|
| options/home-manager/programs.atuin.themes | Each theme is written to
$XDG_CONFIG_HOME/atuin/themes/theme-name.toml
where the name of each attribute is the theme-name
See https://docs.atuin.sh/guide/theming/ for the full list
of options.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.collections | The collections to synchronize between the storages.
|
| options/nixos/networking.wireguard.interfaces.<name>.extraOptions | Extra options to append to the interface section
|
| options/nixos/users.extraUsers.<name>.initialHashedPassword | Specifies the initial hashed password for the user, i.e. the
hashed password assigned if the user does not already
exist
|
| options/nixos/services.rke2.autoDeployCharts | Auto deploying Helm charts that are installed by the rke2 Helm controller
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.clientSecretCommand | A command that prints the OAuth credentials to standard
output
|
| options/nixos/systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.argument | An argument whose meaning depends on the type of operation
|
| options/nixos/services.autossh.sessions.*.user | Name of the user the AutoSSH session should run as
|
| options/darwin/services.autossh.sessions.*.user | Name of the user the AutoSSH session should run as
|
| options/darwin/launchd.agents.<name>.serviceConfig.inetdCompatibility | The presence of this key specifies that the daemon expects to be run as if it were launched from inetd.
|
| options/nixos/networking.firewall.interfaces.<name>.allowedTCPPortRanges | A range of TCP ports on which incoming connections are
accepted.
|
| options/nixos/services.hickory-dns.settings.zones.*.zone | Zone name, like "example.com", "localhost", or "0.0.127.in-addr.arpa".
|
| options/nixos/services.thinkfan.fans.*.query | The query string used to match one or more fans: can be
a fullpath to the temperature file (single fan) or a fullpath
to a driver directory (multiple fans).
When multiple fans match, the query can be restricted using the
name or indices options.
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.bind_addresses | IP addresses to bind the listener to.
|
| options/nixos/services.lasuite-meet.livekit.keyFile | LiveKit key file holding one or multiple application secrets
|
| options/nixos/services.usbrelayd.clientName | Name, your client connects as.
|
| options/darwin/launchd.agents.<name>.serviceConfig.StartCalendarInterval | This optional key causes the job to be started every calendar interval as specified
|
| options/home-manager/accounts.contact.accounts.<name>.pimsync.extraLocalStorageDirectives | Extra directives that should be added under this accounts local storage directive
|
| options/nixos/services.gitlab.registry.serviceName | GitLab container registry service name.
|
| options/nixos/services.knot-resolver.enable | Whether to enable knot-resolver (version 6) domain name server
|
| options/nixos/services.athens.index.postgres.database | Database name for the Postgres database.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.imapOauth2Params.token_endpoint | The OAuth2 token endpoint.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.smtpOauth2Params.token_endpoint | The OAuth2 token endpoint.
|
| options/darwin/launchd.agents.<name>.serviceConfig.EnableTransactions | This flag instructs launchd that the job promises to use vproc_transaction_begin(3) and
vproc_transaction_end(3) to track outstanding transactions that need to be reconciled before the
process can safely terminate
|
| options/nixos/services.miredo.interfaceName | Name of the network tunneling interface.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.communityPlugins.*.settings | Settings to include in the plugin's data.json.
|
| options/nixos/services.samba.usershares.group | Name of the group members of which will be allowed to create usershares
|
| options/home-manager/programs.thunderbird.profiles.<name>.search.meta.maintainers | List of maintainers of each module
|
| options/nixos/networking.openconnect.interfaces.<name>.autoStart | Whether this VPN connection should be started automatically.
|
| options/nixos/services.windmill.database.urlPath | Path to the file containing the database url windmill should connect to
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/nixos/systemd.network.networks.<name>.genericRandomEarlyDetectionConfig | Each attribute in this set specifies an option in the
[GenericRandomEarlyDetection] section of the unit
|
| options/darwin/launchd.agents.<name>.serviceConfig.EnvironmentVariables | This optional key is used to specify additional environment variables to be set before running the
job.
|
| options/nixos/networking.interfaces.<name>.ipv4.routes.*.prefixLength | Subnet mask of the network, specified as the number of
bits in the prefix (24).
|
| options/nixos/networking.interfaces.<name>.ipv6.routes.*.prefixLength | Subnet mask of the network, specified as the number of
bits in the prefix (64).
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters.*.enabled | Whether this filter is currently active.
|
| options/nixos/services.libeufin.nexus.settings.nexus-ebics.HOST_ID | Name of the EBICS host.
|
| options/nixos/networking.dhcpcd.setHostname | Whether to set the machine hostname based on the information
received from the DHCP server.
The hostname will be changed only if the current one is
the empty string, localhost or nixos
|
| options/home-manager/programs.helix.themes | Each theme is written to
$XDG_CONFIG_HOME/helix/themes/theme-name.toml
|
| options/nixos/services.mattermost.siteName | Name of this Mattermost site.
|
| options/home-manager/programs.librewolf.profiles.<name>.bookmarks.meta.maintainers | List of maintainers of each module
|
| options/nixos/networking.interfaces.<name>.tempAddress | When IPv6 is enabled with SLAAC, this option controls the use of
temporary address (aka privacy extensions) on this
interface
|
| options/nixos/networking.vswitches.<name>.controllers | Specify the controller targets
|
| options/home-manager/programs.borgmatic.backups.<name>.location.repositories | List of local or remote repositories with paths and optional labels.
|
| options/nixos/services.slurm.controlMachine | The short hostname of the machine where SLURM control functions are
executed (i.e. the name returned by the command "hostname -s", use "tux001"
rather than "tux001.my.com").
|
| options/nixos/services.dependency-track.settings."alpine.oidc.teams.claim" | Defines the name of the claim that contains group memberships or role assignments in the provider's userinfo endpoint
|
| options/nixos/system.nixos.codeName | The NixOS release code name (e.g. Emu).
|
| options/darwin/launchd.daemons.<name>.serviceConfig.inetdCompatibility.Wait | This flag corresponds to the "wait" or "nowait" option of inetd
|
| options/nixos/services.guacamole-server.host | The host name or IP address the server should listen to.
|
| options/nixos/boot.binfmt.registrations.<name>.recognitionType | Whether to recognize executables by magic number or extension.
|
| options/nixos/services.minetest-server.world | Name of the world to use
|
| options/nixos/services.ntopng.redis.createInstance | Local Redis instance name
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.perIdentitySettings | Extra settings to add to each identity of this Thunderbird
account configuration
|
| options/nixos/services.radicle.privateKeyFile | Absolute file path to an SSH private key,
usually generated by rad auth
|
| options/home-manager/programs.borgmatic.backups.<name>.location.sourceDirectories | Directories to backup
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters.*.extraConfig | Extra settings to apply to the filter
|
| options/nixos/services.paperless.passwordFile | A file containing the superuser password
|
| options/nixos/services.wiki-js.stateDirectoryName | Name of the directory in /var/lib.
|
| options/nixos/networking.wireguard.interfaces.<name>.allowedIPsAsRoutes | Determines whether to add allowed IPs as routes or not.
|
| options/nixos/services.tailscale.authKeyFile | A file containing the auth key
|
| options/nixos/services.pomerium.useACMEHost | If set, use a NixOS-generated ACME certificate with the specified name
|
| options/nixos/networking.interfaces.<name>.ipv4.routes.*.options | Other route options
|
| options/nixos/networking.interfaces.<name>.ipv6.routes.*.options | Other route options
|
| options/home-manager/accounts.contact.accounts.<name>.pimsync.extraRemoteStorageDirectives | Extra directives that should be added under this accounts remote storage directive
|
| options/nixos/services.slurm.dbdserver.storageUser | Database user name.
|
| options/nixos/services.rustus.storage.s3_region | S3 region name.
|
| options/nixos/networking.supplicant.<name>.userControlled.enable | Allow normal users to control wpa_supplicant through wpa_gui or wpa_cli
|
| options/nixos/services.filebeat.inputs | Inputs specify how Filebeat locates and processes input data
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.collections | The collections to synchronize between the storages.
|
| options/nixos/systemd.network.networks.<name>.deficitRoundRobinSchedulerClassConfig | Each attribute in this set specifies an option in the
[DeficitRoundRobinSchedulerClass] section of the unit
|
| options/darwin/launchd.daemons.<name>.serviceConfig.inetdCompatibility | The presence of this key specifies that the daemon expects to be run as if it were launched from inetd.
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.presharedKeyFile | File pointing to preshared key as generated by wg genpsk
|
| options/nixos/services.btrbk.extraPackages | Extra packages for btrbk, like compression utilities for stream_compress.
Note: This option will get deprecated in future releases
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters.*.actionValue | Argument passed to the filter action, e.g. a folder path.
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.presharedKey | Base64 preshared key generated by wg genpsk
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.login | Grants the user, created by the ensureUser attr, login permissions
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.file_extension | Extension to include in local file names, which can be useful
for indexing with third-party programs.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.StartCalendarInterval | This optional key causes the job to be started every calendar interval as specified
|
| options/nixos/networking.openconnect.interfaces.<name>.gateway | Gateway server to connect to.
|
| options/nixos/services.prometheus.scrapeConfigs.*.dns_sd_configs.*.names | A list of DNS SRV record names to be queried.
|
| options/nixos/services.libvirtd.autoSnapshot.vms | If specified only the list of VMs will be snapshotted else all existing one
|
| options/home-manager/accounts.calendar.accounts.<name>.pimsync.extraLocalStorageDirectives | Extra directives that should be added under this accounts local storage directive
|
| options/darwin/launchd.daemons.<name>.serviceConfig.EnableTransactions | This flag instructs launchd that the job promises to use vproc_transaction_begin(3) and
vproc_transaction_end(3) to track outstanding transactions that need to be reconciled before the
process can safely terminate
|
| options/nixos/services.grafana.settings.server.domain | The public facing domain name used to access grafana from a browser
|
| options/nixos/services.pcscd.ignoreReaderNames | List of reader name patterns for the PCSC daemon to ignore
|
| options/nixos/services.nextcloud.autoUpdateApps.startAt | When to run the update
|
| options/home-manager/services.colima.profiles | Profiles allow multiple colima configurations
|
| options/darwin/launchd.daemons.<name>.serviceConfig.EnvironmentVariables | This optional key is used to specify additional environment variables to be set before running the
job.
|
| options/nixos/containers.<name>.extraVeths.<name>.forwardPorts.*.hostPort | Source port of the external interface on host
|
| options/nixos/services.rke2.charts | Packaged Helm charts that are linked to /var/lib/rancher/rke2/server/static/charts before rke2 starts
|
| options/nixos/services.icingaweb2.libraryPaths | Libraries to add to the Icingaweb2 library path
|
| options/nixos/networking.openconnect.interfaces.<name>.privateKey | Private key to authenticate with.
|
| options/nixos/services.stargazer.routes.*.route | Route section name
|
| options/nixos/services.vault-agent.instances | Attribute set of vault-agent instances
|
| options/nixos/services.outline.storage.uploadBucketName | Name of the bucket where uploads should be stored.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.transparencyPercent | Background transparency in percent.
|
| options/nixos/systemd.network.networks.<name>.fairQueueingControlledDelayConfig | Each attribute in this set specifies an option in the
[FairQueueingControlledDelay] section of the unit
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.exactPermissions | When enabled,
programs.floorp.profiles.<profile>.extensions.settings.<extensionID>.permissions
must specify the exact set of permissions that the
extension will request
|
| options/home-manager/programs.borgmatic.backups.<name>.consistency.checks.*.frequency | Frequency of this type of check
|
| options/home-manager/programs.i3status-rust.bars | Attribute set of i3status-rust bars, each with their own configuration
|
| options/home-manager/programs.borgmatic.backups.<name>.location.excludeHomeManagerSymlinks | Whether to exclude Home Manager generated symbolic links from
the backups
|
| options/nixos/fileSystems.<name>.label | Label of the device
|
| options/nixos/boot.loader.systemd-boot.extraFiles | A set of files to be copied to $BOOT
|
| options/nixos/services.icecream.scheduler.netName | Network name for the icecream scheduler
|
| options/home-manager/accounts.calendar.accounts.<name>.pimsync.extraRemoteStorageDirectives | Extra directives that should be added under this accounts remote storage directive
|
| options/nixos/services.xserver.xrandrHeads.*.output | The output name of the monitor, as shown by
xrandr(1) invoked without arguments.
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.allowedIPs | List of IP (v4 or v6) addresses with CIDR masks from
which this peer is allowed to send incoming traffic and to which
outgoing traffic for this peer is directed
|
| options/nixos/containers.<name>.extraVeths.<name>.forwardPorts | List of forwarded ports from host to container
|
| options/home-manager/programs.zsh.plugins.*.file | The plugin script to source
|
| options/nixos/services.vikunja.database.database | Database name.
|
| options/nixos/services.borgmatic.configurations.<name>.source_directories | List of source directories and files to backup
|
| options/nixos/networking.openconnect.interfaces.<name>.protocol | Protocol to use.
|
| options/nixos/containers.<name>.extraVeths.<name>.localAddress | The IPv4 address assigned to the interface in the container
|
| options/nixos/services.borgbackup.jobs | Deduplicating backups using BorgBackup
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.verifyFingerprint | Optional
|
| options/nixos/services.postfix.networksStyle | Name of standard way of trusted network specification to use,
leave blank if you specify it explicitly or if you want to use
default (localhost-only).
|
| options/nixos/systemd.shutdown | Definition of systemd shutdown executables
|
| options/nixos/services.stargazer.routes | Routes that Stargazer should server
|
| options/nixos/boot.binfmt.registrations.<name>.matchCredentials | Whether to launch with the credentials and security
token of the binary, not the interpreter (e.g. setuid
bit)
|
| options/nixos/services.multipath.devices.*.prio | The name of the path priority routine
|
| options/nixos/services.canaille.settings.SERVER_NAME | The domain name on which canaille will be served.
|
| options/nixos/networking.networkmanager.ensureProfiles.profiles.<name>.connection.id | This is the name that will be displayed by NetworkManager and GUIs.
|
| options/nixos/boot.binfmt.registrations.<name>.wrapInterpreterInShell | Whether to wrap the interpreter in a shell script
|
| options/nixos/services.writefreely.host | The public host name to serve.
|
| options/nixos/containers.<name>.extraVeths.<name>.localAddress6 | The IPv6 address assigned to the interface in the container
|
| options/nixos/security.wrappers.<name>.capabilities | A comma-separated list of capability clauses to be given to the
wrapper program
|
| options/darwin/services.postgresql.identMap | Defines the mapping from system users to database users
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.exactPermissions | When enabled,
programs.firefox.profiles.<profile>.extensions.settings.<extensionID>.permissions
must specify the exact set of permissions that the
extension will request
|
| options/home-manager/accounts.email.accounts.<name>.thunderbird.messageFilters.*.condition | Condition to match messages against.
|
| options/nixos/services.dovecot2.imapsieve.mailbox.*.from | Only execute the administrator Sieve scripts for the mailbox configured with services.dovecot2.imapsieve.mailbox..name when the message originates from the indicated mailbox
|
| options/nixos/services.cadvisor.storageDriverDb | Cadvisord storage driver database name.
|
| options/home-manager/programs.zed-editor.themes | Each theme is written to
$XDG_CONFIG_HOME/zed/themes/theme-name.json
where the name of each attribute is the theme-name
See https://zed.dev/docs/extensions/themes for the structure of a
Zed theme
|
| options/nixos/networking.vswitches.<name>.supportedOpenFlowVersions | Supported versions to enable on this switch.
|
| options/nixos/services.datadog-agent.checks | Configuration for all Datadog checks
|
| options/nixos/services.printing.cups-pdf.instances | Permits to raise one or more cups-pdf instances
|
| options/nixos/programs.nix-required-mounts.allowedPatterns.<name>.unsafeFollowSymlinks | Whether to enable Instructs the hook to mount the symlink targets as well, when any of
the paths contain symlinks
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.local_trash_tag | Local tag to which the remote Gmail 'TRASH' label is translated.
|
| options/nixos/fileSystems.<name>.mountPoint | Location where the file system will be mounted
|
| options/nixos/services.multipath.pathGroups.*.alias | The name of the multipath device
|
| options/home-manager/programs.hexchat.channels.<name>.options.acceptInvalidSSLCertificates | Accept invalid SSL certificates.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.conflictResolution | What to do in case of a conflict between the storages
|
| options/nixos/networking.interfaces.<name>.ipv4.addresses.*.address | IPv4 address of the interface
|
| options/nixos/networking.interfaces.<name>.ipv6.addresses.*.address | IPv6 address of the interface
|
| options/nixos/services.calibre-web.options.reverseProxyAuth.header | Auth proxy header name.
|
| options/nixos/services.nullmailer.config.defaulthost | The content of this attribute is appended to any address that
is missing a host name
|
| options/nixos/services.multipath.pathGroups.*.array | The DNS name of the storage array
|
| options/nixos/services.linux-enable-ir-emitter.device | IR camera device to depend on
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.verifyFingerprint | Optional
|
| options/nixos/users.mysql.pam.logging.table | The name of the table to which logs are written.
|
| options/nixos/services.prometheus.exporters.pve.user | User name under which the pve exporter shall be run.
|
| options/nixos/services.prometheus.exporters.nut.user | User name under which the nut exporter shall be run.
|
| options/nixos/services.prometheus.exporters.kea.user | User name under which the kea exporter shall be run.
|
| options/nixos/services.prometheus.exporters.sql.user | User name under which the sql exporter shall be run.
|
| options/nixos/services.prometheus.exporters.zfs.user | User name under which the zfs exporter shall be run.
|
| options/nixos/services.prometheus.exporters.lnd.user | User name under which the lnd exporter shall be run.
|
| options/nixos/services.munin-node.extraPlugins | Additional Munin plugins to activate
|
| options/nixos/programs.zsh.ohMyZsh.theme | Name of the theme to be used by oh-my-zsh.
|
| options/home-manager/programs.zsh.oh-my-zsh.theme | Name of the theme to be used by oh-my-zsh.
|
| options/nixos/services.openvscode-server.host | The host name or IP address the server should listen to.
|
| options/nixos/services.dovecot2.imapsieve.mailbox.*.causes | Only execute the administrator Sieve scripts for the mailbox configured with services.dovecot2.imapsieve.mailbox..name when one of the listed IMAPSIEVE causes apply
|
| options/nixos/networking.openconnect.interfaces.<name>.passwordFile | File containing the password to authenticate with
|
| options/nixos/services.umami.settings.TRACKER_SCRIPT_NAME | Allows you to assign a custom name to the tracker script different from the default script.js.
|
| options/nixos/services.gotify.stateDirectoryName | The name of the directory below /var/lib where
gotify stores its runtime data.
|
| options/nixos/services.cassandra.clusterName | The name of the cluster
|
| options/nixos/networking.wireguard.interfaces.<name>.generatePrivateKeyFile | Automatically generate a private key with
wg genkey, at the privateKeyFile location.
|
| options/nixos/systemd.network.networks.<name>.stochasticFairnessQueueingConfig | Each attribute in this set specifies an option in the
[StochasticFairnessQueueing] section of the unit
|
| options/nixos/services.prometheus.exporters.snmp.user | User name under which the snmp exporter shall be run.
|
| options/nixos/services.prometheus.exporters.bind.user | User name under which the bind exporter shall be run.
|
| options/nixos/services.prometheus.exporters.ipmi.user | User name under which the ipmi exporter shall be run.
|
| options/nixos/services.prometheus.exporters.flow.user | User name under which the flow exporter shall be run.
|
| options/nixos/services.prometheus.exporters.nats.user | User name under which the nats exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mail.user | User name under which the mail exporter shall be run.
|
| options/nixos/services.prometheus.exporters.ping.user | User name under which the ping exporter shall be run.
|
| options/nixos/services.prometheus.exporters.bird.user | User name under which the bird exporter shall be run.
|
| options/nixos/services.prometheus.exporters.ebpf.user | User name under which the ebpf exporter shall be run.
|
| options/nixos/services.prometheus.exporters.json.user | User name under which the json exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mqtt.user | User name under which the mqtt exporter shall be run.
|
| options/nixos/services.prometheus.exporters.node.user | User name under which the node exporter shall be run.
|
| options/nixos/services.prometheus.exporters.knot.user | User name under which the knot exporter shall be run.
|
| options/nixos/services.trilium-server.instanceName | Instance name used to distinguish between different instances
|
| options/home-manager/programs.borgmatic.backups.<name>.storage.encryptionPasscommand | Command writing the passphrase to standard output.
|
| options/nixos/services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".url.host | Domain name of the instance.
|
| options/home-manager/programs.offlineimap.extraConfig.mbnames | Extra configuration options added to the
mbnames section.
|
| options/nixos/services.prometheus.exporters.php-fpm.user | User name under which the php-fpm exporter shall be run.
|
| options/nixos/services.pgbackrest.repos | An attribute set of repositories as described in:
https://pgbackrest.org/configuration.html#section-repository
Each repository defaults to set repo-host to the attribute's name
|
| options/nixos/services.bluesky-pds.settings.PDS_HOSTNAME | Instance hostname (base domain name)
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.conflictResolution | What to do in case of a conflict between the storages
|
| options/nixos/networking.wireguard.interfaces.<name>.socketNamespace | The pre-existing network namespace in which the
WireGuard interface is created, and which retains the socket even if the
interface is moved via interfaceNamespace
|
| options/nixos/services.prometheus.exporters.frr.user | User name under which the frr exporter shall be run
|
| options/nixos/services.cloudflare-ddns.wafLists | List of WAF IP Lists to manage, in the format account-id/list-name.
(Experimental feature as of cloudflare-ddns 1.14.0).
|
| options/nixos/services.lavalink.plugins.*.configName | The name of the plugin to use as the key for the plugin configuration.
|
| options/nixos/services.mautrix-meta.instances | Configuration of multiple mautrix-meta instances.
services.mautrix-meta.instances.facebook and services.mautrix-meta.instances.instagram
come preconfigured with network.mode, appservice.id, bot username, display name and avatar.
|
| options/nixos/networking.interfaces.<name>.ipv4.addresses.*.prefixLength | Subnet mask of the interface, specified as the number of
bits in the prefix (24).
|
| options/nixos/networking.interfaces.<name>.ipv6.addresses.*.prefixLength | Subnet mask of the interface, specified as the number of
bits in the prefix (64).
|
| options/nixos/fileSystems.<name>.autoFormat | If the device does not currently contain a filesystem (as
determined by blkid), then automatically
format it with the filesystem type specified in
fsType
|
| options/nixos/services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.librenms.database.database | Name of the database on the MySQL/MariaDB server.
|
| options/nixos/services.libreswan.policies | A set of policies to apply to the IPsec connections.
The policy name must match the one of connection it needs to apply to.
|
| options/nixos/services.athens.storage.azureblob.accountName | Account name for the Azure Blob storage backend.
|
| options/nixos/networking.openconnect.interfaces.<name>.extraOptions | Extra config to be appended to the interface config
|
| options/nixos/services.buildbot-worker.adminMessage | Name of the administrator of this worker
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.gtk.indicators | List of allowed indicator modules to use for the lightdm gtk
greeter panel
|
| options/nixos/services.prometheus.exporters.zfs.pools | Name of the pool(s) to collect, repeat for multiple pools (default: all pools).
|
| options/nixos/services.athens.singleFlight.redisSentinel.masterName | Name of the sentinel master server.
|
| options/nixos/services.prometheus.remoteRead.*.url | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.libeufin.nexus.settings.nexus-ebics.CURRENCY | Name of the fiat currency.
|
| options/nixos/services.thinkfan.sensors.*.query | The query string used to match one or more sensors: can be
a fullpath to the temperature file (single sensor) or a fullpath
to a driver directory (multiple sensors).
When multiple sensors match, the query can be restricted using the
name or indices options.
|
| options/nixos/services.resolved.settings.Resolve.Domains | List of search domains used to complete unqualified name lookups.
|
| options/nixos/services.prometheus.exporters.kafka.user | User name under which the kafka exporter shall be run.
|
| options/nixos/services.prometheus.exporters.redis.user | User name under which the redis exporter shall be run.
|
| options/nixos/services.prometheus.exporters.fritz.user | User name under which the fritz exporter shall be run.
|
| options/nixos/services.prometheus.exporters.idrac.user | User name under which the idrac exporter shall be run.
|
| options/nixos/services.prometheus.exporters.jitsi.user | User name under which the jitsi exporter shall be run.
|
| options/nixos/services.prometheus.exporters.dmarc.user | User name under which the dmarc exporter shall be run.
|
| options/nixos/services.prometheus.exporters.v2ray.user | User name under which the v2ray exporter shall be run.
|
| options/nixos/services.filebeat.modules | Filebeat modules provide a quick way to get started
processing common log formats
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.exactPermissions | When enabled,
programs.librewolf.profiles.<profile>.extensions.settings.<extensionID>.permissions
must specify the exact set of permissions that the
extension will request
|
| options/nixos/services.homebridge.uiSettings.log.service | Name of the systemd service to log to
|
| options/nixos/services.nominatim.database.superUser | Postgresql database superuser used to create Nominatim database and
import data
|
| options/nixos/services.nghttpx.frontends.*.params.sni-fwd | When performing a match to select a backend server, SNI host
name received from the client is used instead of the request
host
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.presharedKeyFile | File pointing to preshared key as generated by wg genpsk
|
| options/nixos/services.subsonic.listenAddress | The host name or IP address on which to bind Subsonic
|
| options/nixos/services.rosenpass.defaultDevice | Name of the network interface to use for all peers by default.
|
| options/nixos/services.radicle.ci.broker.settings.triggers.*.adapter | Adapter name.
|
| options/darwin/networking.wg-quick.interfaces.<name>.peers.*.persistentKeepalive | Interval in seconds to send keepalive packets
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.presharedKey | Base64 preshared key generated by wg genpsk
|
| options/nixos/services.lldap.environment | Environment variables passed to the service
|
| options/nixos/services.rsnapshot.extraConfig | rsnapshot configuration option in addition to the defaults from
rsnapshot and this module
|
| options/nixos/services.multipath.devices.*.vendor | Regular expression to match the vendor name
|
| options/nixos/services.consul.interface.advertise | The name of the interface to pull the advertise_addr from.
|
| options/nixos/services.tarsnap.keyfile | The keyfile which associates this machine with your tarsnap
account
|
| options/nixos/services.suricata.settings.default-log-dir | The default logging directory
|
| options/nixos/users.mysql.pam.updateTable | The name of the table used for password alteration
|
| options/nixos/containers.<name>.extraVeths.<name>.forwardPorts.*.protocol | The protocol specifier for port forwarding between host and container
|
| options/nixos/networking.wlanInterfaces | Creating multiple WLAN interfaces on top of one physical WLAN device (NIC)
|
| options/nixos/fileSystems.<name>.autoResize | If set, the filesystem is grown to its maximum size before
being mounted. (This is typically the size of the containing
partition.) This is currently only supported for ext2/3/4
filesystems that are mounted during early boot.
|
| options/nixos/services.journald.upload.settings.Upload.ServerKeyFile | SSL key in PEM format
|
| options/nixos/services.libeufin.nexus.settings.nexus-ebics.BANK_DIALECT | Name of the following combination: EBICS version and ISO20022
recommendations that Nexus would honor in the communication with the
bank
|
| options/nixos/services.prometheus.remoteWrite.*.url | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.rosenpass.settings.peers.*.device | Name of the local WireGuard interface to use for this peer.
|
| options/darwin/networking.computerName | The user-friendly name for the system, set in System Preferences > Sharing > Computer Name
|
| options/nixos/programs.foot.theme | Theme name
|
| options/nixos/services.prometheus.exporters.statsd.user | User name under which the statsd exporter shall be run.
|
| options/nixos/services.prometheus.exporters.dnssec.user | User name under which the dnssec exporter shall be run.
|
| options/nixos/services.prometheus.exporters.script.user | User name under which the script exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mysqld.user | User name under which the mysqld exporter shall be run.
|
| options/nixos/services.prometheus.exporters.deluge.user | User name under which the deluge exporter shall be run.
|
| options/nixos/services.prometheus.exporters.domain.user | User name under which the domain exporter shall be run.
|
| options/nixos/services.prometheus.exporters.fastly.user | User name under which the fastly exporter shall be run.
|
| options/nixos/services.prometheus.exporters.restic.user | User name under which the restic exporter shall be run.
|
| options/nixos/services.prometheus.exporters.pihole.user | User name under which the pihole exporter shall be run.
|
| options/nixos/services.prometheus.exporters.shelly.user | User name under which the shelly exporter shall be run.
|
| options/nixos/services.prometheus.exporters.rspamd.user | User name under which the rspamd exporter shall be run.
|
| options/nixos/services.prometheus.exporters.tibber.user | User name under which the tibber exporter shall be run.
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/home-manager/programs.opencode.agents | Custom agents for opencode
|
| options/nixos/services.sanoid.datasets.<name>.no_inconsistent_snapshot | Whether to take a snapshot if the pre script fails
|
| options/nixos/services.airsonic.listenAddress | The host name or IP address on which to bind Airsonic
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.password_command | Shell command which will print a password to stdout for basic HTTP
authentication
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.exhaustivePermissions | When enabled, the user must authorize requested
permissions for all extensions from
programs.floorp.profiles.<profile>.extensions.packages
in
programs.floorp.profiles.<profile>.extensions.settings.<extensionID>.permissions
|
| options/nixos/services.traefik.environmentFiles | Files to load as an environment file just before Traefik starts
|
| options/nixos/services.prometheus.exporters.nvidia-gpu.user | User name under which the nvidia-gpu exporter shall be run.
|
| options/nixos/networking.openconnect.interfaces.<name>.certificate | Certificate to authenticate with.
|
| options/nixos/services.icingaweb2.pool | Name of existing PHP-FPM pool that is used to run Icingaweb2
|
| options/nixos/services.sanoid.templates.<name>.no_inconsistent_snapshot | Whether to take a snapshot if the pre script fails
|
| options/nixos/services.prometheus.scrapeConfigs.*.http_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.bookstack.settings | Options for Bookstack configuration
|
| options/home-manager/services.kanshi.settings.*.output.criteria | The criteria can either be an output name, an output description or "*"
|
| options/nixos/services.multipath.devices.*.product | Regular expression to match the product name
|
| options/home-manager/programs.docker-cli.contexts | Attribute set of Docker context configurations
|
| options/nixos/services.sourcehut.settings."sr.ht".global-domain | Global domain name.
|
| options/nixos/networking.wireguard.interfaces.<name>.interfaceNamespace | The pre-existing network namespace the WireGuard
interface is moved to
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.exhaustivePermissions | When enabled, the user must authorize requested
permissions for all extensions from
programs.firefox.profiles.<profile>.extensions.packages
in
programs.firefox.profiles.<profile>.extensions.settings.<extensionID>.permissions
|
| options/nixos/users.mysql.database | The name of the database containing the users
|
| options/nixos/containers.<name>.path | As an alternative to specifying
config, you can specify the path to
the evaluated NixOS system configuration, typically a
symlink to a system profile.
|
| options/nixos/containers.<name>.config | A specification of the desired configuration of this
container, as a NixOS module.
|
| options/nixos/containers.<name>.autoStart | Whether the container is automatically started at boot-time.
|
| options/nixos/services.onlyoffice.postgresName | The name of database OnlyOffice should use.
|
| options/nixos/services.logrotate.settings | logrotate freeform settings: each attribute here will define its own section,
ordered by services.logrotate.settings.<name>.priority,
which can either define files to rotate with their settings
or settings common to all further files settings
|
| options/nixos/services.prometheus.exporters.systemd.user | User name under which the systemd exporter shall be run.
|
| options/nixos/services.prometheus.exporters.bitcoin.user | User name under which the bitcoin exporter shall be run.
|
| options/nixos/services.prometheus.exporters.varnish.user | User name under which the varnish exporter shall be run.
|
| options/nixos/services.prometheus.exporters.apcupsd.user | User name under which the apcupsd exporter shall be run.
|
| options/nixos/services.prometheus.exporters.ecoflow.user | User name under which the ecoflow exporter shall be run.
|
| options/nixos/services.prometheus.exporters.dovecot.user | User name under which the dovecot exporter shall be run.
|
| options/nixos/services.prometheus.exporters.process.user | User name under which the process exporter shall be run.
|
| options/nixos/services.prometheus.exporters.dnsmasq.user | User name under which the dnsmasq exporter shall be run.
|
| options/nixos/services.prometheus.exporters.libvirt.user | User name under which the libvirt exporter shall be run.
|
| options/nixos/services.prometheus.exporters.sabnzbd.user | User name under which the sabnzbd exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mongodb.user | User name under which the mongodb exporter shall be run.
|
| options/nixos/services.prometheus.exporters.postfix.user | User name under which the postfix exporter shall be run.
|
| options/nixos/services.prometheus.exporters.klipper.user | User name under which the klipper exporter shall be run.
|
| options/nixos/services.prometheus.exporters.unbound.user | User name under which the unbound exporter shall be run.
|
| options/nixos/networking.nameservers | The list of nameservers
|
| options/nixos/services.anubis.defaultOptions.settings.POLICY_FNAME | The policy file to use
|
| options/nixos/virtualisation.sharedDirectories | An attributes set of directories that will be shared with the
virtual machine using VirtFS (9P filesystem over VirtIO)
|
| options/nixos/services.prometheus.exporters.bitcoin.rpcUser | RPC user name.
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.username | Credentials are used to authenticate the requests to Uyuni API.
|
| options/nixos/services.prometheus.scrapeConfigs.*.label_name_length_limit | Per-scrape limit on length of labels name that will be accepted for a sample
|
| options/nixos/services.suricata.settings.unix-command | Unix command socket that can be used to pass commands to Suricata
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/containers.<name>.extraVeths.<name>.forwardPorts.*.containerPort | Target port of container
|
| options/nixos/networking.vlans | This option allows you to define vlan devices that tag packets
on top of a physical interface
|
| options/nixos/services.tailscale.interfaceName | The interface name for tunnel traffic
|
| options/nixos/services.nullmailer.config.remotes | A list of remote servers to which to send each message
|
| options/nixos/services.matrix-synapse.settings.database.args.database | Name of the database when using the psycopg2 backend,
path to the database location when using sqlite3.
|
| options/nixos/services.prometheus.exporters.chrony.user | User name under which the chrony exporter shall be run
|
| options/nixos/services.documize.stateDirectoryName | The name of the directory below /var/lib/private
where documize runs in and stores, for example, backups.
|
| options/home-manager/programs.opencode.themes | Custom themes for opencode
|
| options/home-manager/programs.lutris.runners.<name>.settings.runner.runner_executable | Specific option to point to a runner executable directly, don't set runner.package if you set this
|
| options/home-manager/programs.vicinae.themes | Theme settings to add to the themes folder in ~/.config/vicinae/themes
|
| options/nixos/services.public-inbox.settings.publicinbox.css | The local path name of a CSS file for the PSGI web interface.
|
| options/nixos/services.mjolnir.pantalaimon | pantalaimon options (enables E2E Encryption support)
|
| options/nixos/users.mysql.pam.logging.msgColumn | The name of the column in the log table to which the description
of the performed operation is stored.
|
| options/nixos/services.athens.storage.azureblob.containerName | Container name for the Azure Blob storage backend.
|
| options/nixos/services.suricata.settings.outputs | Configure the type of alert (and other) logging you would like
|
| options/nixos/services.anubis.defaultOptions.settings.SERVE_ROBOTS_TXT | Whether to serve a default robots.txt that denies access to common AI bots by name and all other
bots by wildcard.
|
| options/nixos/services.nullmailer.config.defaultdomain | The content of this attribute is appended to any host name that
does not contain a period (except localhost), including defaulthost
and idhost
|
| options/nixos/systemd.user.generators | Definition of systemd generators; see systemd.generator(5)
|
| options/nixos/containers.<name>.extraVeths | Extra veth-pairs to be created for the container.
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.persistentKeepalive | This is optional and is by default off, because most
users will not need it
|
| options/nixos/services.prometheus.exporters.py-air-control.user | User name under which the py-air-control exporter shall be run.
|
| options/nixos/services.metricbeat.modules | Metricbeat modules are responsible for reading metrics from the various sources
|
| options/nixos/services.sourcehut.hg.postgresql.database | PostgreSQL database name for the hg.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.nextcloud-spreed-signaling.backends | A list of backends from which clients are allowed to connect from
|
| options/nixos/services.consul-template.instances | Attribute set of consul-template instances
|
| options/nixos/systemd.network.networks.<name>.enhancedTransmissionSelectionConfig | Each attribute in this set specifies an option in the
[EnhancedTransmissionSelection] section of the unit
|
| options/nixos/services.unpoller.unifi.controllers.*.user | Unifi service user name.
|
| options/nixos/services.prometheus.exporters.postfix.systemd.unit | Name of the postfix systemd unit.
|
| options/nixos/services.postgresqlBackup.backupAll | Backup all databases using pg_dumpall
|
| options/nixos/boot.initrd.luks.devices | The encrypted disk that should be opened before the root
filesystem is mounted
|
| options/nixos/networking.domain | The system domain name
|
| options/nixos/services.sourcehut.man.postgresql.database | PostgreSQL database name for the man.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.sourcehut.git.postgresql.database | PostgreSQL database name for the git.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.sourcehut.hub.postgresql.database | PostgreSQL database name for the hub.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/boot.zfs.forceImportAll | Forcibly import all ZFS pool(s)
|
| options/nixos/networking.bonds | This option allows you to define bond devices that aggregate multiple,
underlying networking interfaces together
|
| options/nixos/containers.<name>.bindMounts | An extra list of directories that is bound to the container.
|
| options/nixos/services.matrix-tuwunel.stateDirectory | The name of the directory under /var/lib/ where the database will be stored
|
| options/nixos/services.prometheus.exporters.influxdb.user | User name under which the influxdb exporter shall be run.
|
| options/nixos/services.prometheus.exporters.opnsense.user | User name under which the opensense exporter shall be run.
|
| options/nixos/services.prometheus.exporters.smartctl.user | User name under which the smartctl exporter shall be run.
|
| options/nixos/services.prometheus.exporters.fritzbox.user | User name under which the fritzbox exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mikrotik.user | User name under which the mikrotik exporter shall be run.
|
| options/nixos/services.prometheus.exporters.postgres.user | User name under which the postgres exporter shall be run.
|
| options/nixos/services.prometheus.exporters.unpoller.user | User name under which the unpoller exporter shall be run.
|
| options/nixos/services.prometheus.exporters.graphite.user | User name under which the graphite exporter shall be run.
|
| options/nixos/services.prometheus.exporters.blackbox.user | User name under which the blackbox exporter shall be run.
|
| options/nixos/services.prometheus.exporters.keylight.user | User name under which the keylight exporter shall be run.
|
| options/nixos/services.prometheus.exporters.collectd.user | User name under which the collectd exporter shall be run.
|
| options/nixos/users.mysql.pam.logging.pidColumn | The name of the column in the log table to which the pid of the
process utilising the pam_mysql authentication
service is stored.
|
| options/nixos/services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.name_filter | Specify a name filter (works as a LIKE) to apply on the server listing request.
|
| options/nixos/services.postgresql.ensureUsers | Ensures that the specified users exist
|
| options/nixos/networking.bonds.<name>.xmit_hash_policy | DEPRECATED, use driverOptions
|
| options/nixos/networking.networkmanager.ensureProfiles.profiles.<name>.connection.type | The connection type defines the connection kind, like vpn, wireguard, gsm, wifi and more.
|
| options/nixos/users.mysql.pam.logging.timeColumn | The name of the column in the log table to which the timestamp of the
log entry is stored.
|
| options/nixos/services.sourcehut.todo.postgresql.database | PostgreSQL database name for the todo.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.sourcehut.meta.postgresql.database | PostgreSQL database name for the meta.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.exhaustivePermissions | When enabled, the user must authorize requested
permissions for all extensions from
programs.librewolf.profiles.<profile>.extensions.packages
in
programs.librewolf.profiles.<profile>.extensions.settings.<extensionID>.permissions
|
| options/nixos/services.firezone.server.provision.accounts | All accounts to provision
|
| options/nixos/services.multipath.devices.*.user_friendly_names | If set to "yes", using the bindings file /etc/multipath/bindings
to assign a persistent and unique alias to the multipath, in the
form of mpath
|
| options/nixos/services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/xdg.portal.config | Sets which portal backend should be used to provide the implementation
for the requested interface
|
| options/home-manager/xdg.portal.config | Sets which portal backend should be used to provide the implementation
for the requested interface
|
| options/nixos/services.firefox-syncserver.database.host | Database host name. localhost is treated specially and inserts
systemd dependencies, other hostnames or IP addresses of the local machine do not.
|
| options/darwin/services.postgresql.ensureUsers | Ensures that the specified users exist and have at least the ensured permissions
|
| options/nixos/services.healthchecks.settings.DB_NAME | Database name.
|
| options/nixos/services.prometheus.exporters.postfix.systemd.slice | Name of the postfix systemd slice
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.username | Consul username
|
| options/nixos/services._3proxy.resolution.nscache | Set name cache size for IPv4.
|
| options/nixos/services.headscale.settings.tls_letsencrypt_hostname | Domain name to request a TLS certificate for.
|
| options/home-manager/programs.btop.themes | Themes to be written to $XDG_CONFIG_HOME/btop/themes/${name}.theme
|
| options/home-manager/programs.opencode.commands | Custom commands for opencode
|
| options/nixos/networking.wireguard.interfaces.<name>.dynamicEndpointRefreshSeconds | Periodically refresh the endpoint hostname or address for all peers
|
| options/nixos/services.movim.h2o.tls.recommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|
| options/nixos/security.dhparams.params | Diffie-Hellman parameters to generate
|
| options/nixos/services.sourcehut.lists.postgresql.database | PostgreSQL database name for the lists.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.sourcehut.paste.postgresql.database | PostgreSQL database name for the paste.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.sourcehut.pages.postgresql.database | PostgreSQL database name for the pages.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/services.pds.environmentFiles | File to load environment variables from
|
| options/nixos/services.prometheus.exporters.imap-mailstat.user | User name under which the imap-mailstat exporter shall be run.
|
| options/home-manager/programs.gemini-cli.commands | An attribute set of custom commands that will be globally available
|
| options/nixos/boot.loader.systemd-boot.extraEntries | Any additional entries you want added to the systemd-boot menu
|
| options/nixos/services._3proxy.resolution | Use this option to configure name resolution and DNS caching.
|
| options/nixos/networking.fqdn | The fully qualified domain name (FQDN) of this host
|
| options/darwin/networking.fqdn | The fully qualified domain name (FQDN) of this host
|
| options/nixos/services.nextcloud.config.objectstore.s3.bucket | The name of the S3 bucket.
|
| options/nixos/boot.loader.limine.additionalFiles | A set of files to be copied to /boot
|
| options/nixos/boot.loader.refind.additionalFiles | A set of files to be copied to /boot
|
| options/nixos/services.grafana.provision.alerting.rules.settings.groups.*.folder | Name of the folder the rule group will be stored in
|
| options/darwin/homebrew.taps | List of Homebrew formula repositories to tap
|
| options/nixos/services.cassandra.listenAddress | Address or interface to bind to and tell other Cassandra nodes
to connect to
|
| options/nixos/services.sanoid.datasets.<name>.force_post_snapshot_script | Whether to run the post script if the pre script fails
|
| options/nixos/services.hockeypuck.settings | Configuration file for hockeypuck, here you can override
certain settings (loglevel and
openpgp.db.dsn) by just setting those values
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.exporters.rtl_433.user | User name under which the rtl_433 exporter shall be run.
|
| options/nixos/services.prometheus.exporters.surfboard.user | User name under which the surfboard exporter shall be run.
|
| options/nixos/services.prometheus.exporters.tailscale.user | User name under which the tailscale exporter shall be run.
|
| options/nixos/services.prometheus.exporters.wireguard.user | User name under which the wireguard exporter shall be run.
|
| options/nixos/services.prometheus.exporters.rasdaemon.user | User name under which the rasdaemon exporter shall be run.
|
| options/nixos/services.prometheus.exporters.borgmatic.user | User name under which the borgmatic exporter shall be run.
|
| options/nixos/services.prometheus.exporters.smokeping.user | User name under which the smokeping exporter shall be run.
|
| options/nixos/services.prometheus.exporters.pgbouncer.user | User name under which the pgbouncer exporter shall be run.
|
| options/nixos/services.prometheus.exporters.nextcloud.user | User name under which the nextcloud exporter shall be run.
|
| options/nixos/services.prometheus.exporters.junos-czerwonk.user | User name under which the junos-czerwonk exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mongodb.collectAll | Enable all collectors
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags.directory_separator | Directory separator for mapping notmuch tags to maildirs.
|
| options/nixos/services._3proxy.resolution.nserver | List of nameservers to use
|
| options/nixos/services.sourcehut.builds.postgresql.database | PostgreSQL database name for the builds.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| options/nixos/systemd.generators | Definition of systemd generators; see systemd.generator(5)
|
| options/nixos/containers.<name>.extraFlags | Extra flags passed to the systemd-nspawn command
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.matrix-synapse.settings.trusted_key_servers.*.server_name | Hostname of the trusted server.
|
| options/nixos/services.sanoid.templates.<name>.force_post_snapshot_script | Whether to run the post script if the pre script fails
|
| options/nixos/services.pipewire.wireplumber.extraScripts | Additional scripts for WirePlumber to be used by configuration files
|
| options/darwin/homebrew.brews | List of Homebrew formulae to install
|
| options/nixos/containers.<name>.enableTun | Allows the container to create and setup tunnel interfaces
by granting the NET_ADMIN capability and
enabling access to /dev/net/tun.
|
| options/nixos/services.biboumi.settings.realname_customization | Whether the users will be able to use
the ad-hoc commands that lets them configure
their realname and username.
|
| options/darwin/networking.localHostName | The local hostname, or local network name, is displayed beneath the computer's name at the
top of the Sharing preferences pane
|
| options/nixos/security.ipa.shells | List of shells which binaries should be installed to /bin/
|
| options/nixos/services.nullmailer.config.adminaddr | If set, all recipients to users at either "localhost" (the literal string)
or the canonical host name (from the me control attribute) are remapped to this address
|
| options/nixos/services._3proxy.resolution.nscache6 | Set name cache size for IPv6.
|
| options/nixos/containers.<name>.hostBridge | Put the host-side of the veth-pair into the named bridge
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.dynamicEndpointRefreshSeconds | Periodically re-execute the wg utility every
this many seconds in order to let WireGuard notice DNS / hostname
changes
|
| options/nixos/services.prometheus.exporters.ecoflow.ecoflowDevicesPrettyNamesFile | File must contain one line, example: {"R3300000":"Delta 2","R3400000":"Delta Pro",...}
The key/value map of custom names for your devices
|
| options/nixos/containers.<name>.privateNetwork | Whether to give the container its own private virtual
Ethernet interface
|
| options/nixos/fileSystems.<name>.device | The device as passed to mount
|
| options/nixos/services.foundationdb.tls.allowedPeers | "Peer verification string"
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.persistentKeepalive | This is optional and is by default off, because most
users will not need it
|
| options/darwin/networking.fqdnOrHostName | Either the fully qualified domain name (FQDN), or just the host name if
it does not exists
|
| options/nixos/services.influxdb2.provision.initialSetup.bucket | Primary bucket name
|
| options/nixos/containers.<name>.tmpfs | Mounts a set of tmpfs file systems into the container
|
| options/nixos/services.certspotter.watchlist | Domain names to watch
|
| options/home-manager/programs.rofi.theme | Name of theme or path to theme file in rasi format or attribute set with
theme configuration
|
| options/home-manager/services.xidlehook.environment | Extra environment variables to be exported in the script
|
| options/darwin/homebrew.casks | List of Homebrew casks to install
|
| options/nixos/networking.fqdnOrHostName | Either the fully qualified domain name (FQDN), or just the host name if
it does not exist
|
| options/home-manager/programs.oh-my-posh.useTheme | Use one of the official themes
|
| options/nixos/services.prometheus.exporters.mailman3.user | User name under which the mailman3 exporter shall be run.
|
| options/nixos/boot.zfs.extraPools | Name or GUID of extra ZFS pools that you wish to import during boot
|
| options/nixos/services.journaldriver.logName | Configures the name of the target log in Stackdriver Logging
|
| options/nixos/containers.<name>.hostAddress | The IPv4 address assigned to the host interface.
(Not used when hostBridge is set.)
|
| options/nixos/_module.args | Additional arguments passed to each module in addition to ones
like lib, config,
and pkgs, modulesPath
|
| options/darwin/_module.args | Additional arguments passed to each module in addition to ones
like lib, config,
and pkgs, modulesPath
|
| options/home-manager/_module.args | Additional arguments passed to each module in addition to ones
like lib, config,
and pkgs, modulesPath
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.basic_auth.username | HTTP username
|
| options/home-manager/services.xsuspender.defaults.matchWmNameContains | Match windows where wm name contains string.
|
| options/nixos/services.prometheus.exporters.buildkite-agent.user | User name under which the buildkite-agent exporter shall be run.
|
| options/nixos/users.mysql.pam.passwordColumn | The name of the column that contains a (encrypted) password string.
|
| options/nixos/security.tpm2.tssUser | Name of the tpm device-owner and service user, set if applyUdevRules is
set.
|
| options/nixos/services.discourse.siteSettings | Discourse site settings
|
| options/nixos/services.pufferpanel.enable | Whether to enable PufferPanel game management server
|
| options/nixos/services.miniupnpd.externalInterface | Name of the external interface.
|
| options/nixos/networking.bridges | This option allows you to define Ethernet bridge devices
that connect physical networks together
|
| options/nixos/services.prometheus.exporters.scaphandre.user | User name under which the scaphandre exporter shall be run.
|
| options/nixos/services.prometheus.exporters.storagebox.user | User name under which the storagebox exporter shall be run.
|
| options/nixos/services.pgmanage.connections | pgmanage requires at least one PostgreSQL server be defined
|
| options/nixos/services.dolibarr.h2o.tls.recommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|
| options/nixos/services.crowdsec-firewall-bouncer.secrets.apiKeyPath | Path to the API key to authenticate with a local CrowdSec API
|
| options/nixos/services.nextcloud-spreed-signaling.hostName | The host name to bind the nginx virtual host to, if
config.services.nextcloud-spreed-signaling.configureNginx is set to true.
|
| options/nixos/services.glance.environmentFile | Path to an environment file as defined in systemd.exec(5)
|
| options/nixos/containers.<name>.hostAddress6 | The IPv6 address assigned to the host interface.
(Not used when hostBridge is set.)
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.yggdrasil.openMulticastPort | Whether to open the UDP port used for multicast peer discovery
|
| options/home-manager/services.kanshi.settings.*.profile.outputs.*.criteria | The criteria can either be an output name, an output description or "*"
|
| options/nixos/services.grafana.settings.smtp.ehlo_identity | Name to be used as client identity for EHLO in SMTP dialog.
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.dynamicEndpointRefreshRestartSeconds | When the dynamic endpoint refresh that is configured via
dynamicEndpointRefreshSeconds exits (likely due to a failure),
restart that service after this many seconds
|
| options/nixos/services.home-assistant.extraComponents | List of components that have their dependencies included in the package
|
| options/nixos/services.desktopManager.gnome.flashback.customSessions.*.wmLabel | The name of the window manager to show in the session chooser.
|
| options/nixos/services.gmediarender.friendlyName | A "friendly name" for identifying the endpoint.
|
| options/nixos/services.pufferpanel.environment | Environment variables to set for the service
|
| options/nixos/services.prometheus.exporters.exportarr-lidarr.user | User name under which the exportarr-lidarr exporter shall be run.
|
| options/nixos/services.prometheus.exporters.exportarr-sonarr.user | User name under which the exportarr-sonarr exporter shall be run.
|
| options/nixos/services.prometheus.exporters.exportarr-radarr.user | User name under which the exportarr-radarr exporter shall be run.
|
| options/nixos/services.prometheus.exporters.exportarr-bazarr.user | User name under which the exportarr-bazarr exporter shall be run.
|
| options/nixos/services.zfs.autoReplication.localFilesystem | Local ZFS filesystem from which snapshots should be sent
|
| options/nixos/services.archisteamfarm.bots | Bots name and configuration.
|
| options/nixos/services.nextcloud.settings."profile.enabled" | Makes user-profiles globally available under nextcloud.tld/u/user.name
|
| options/nixos/programs.tsmClient.servers | Server definitions ("stanzas")
for the client system-options file
|
| options/nixos/services.matrix-synapse.settings.log_config | The file that holds the logging configuration.
|
| options/nixos/fileSystems.<name>.options | Options used to mount the file system
|
| options/nixos/fileSystems.<name>.depends | List of paths that should be mounted before this one
|
| options/home-manager/programs.astroid.externalEditor | You can use the following variables:
%1
: file name
%2
: server name
%3
: socket ID
See Customizing editor
on the Astroid wiki.
|
| options/home-manager/programs.sapling.userName | Default user name to use.
|
| options/nixos/services.umami.createPostgresqlDatabase | Whether to automatically create the database for Umami using PostgreSQL
|
| options/nixos/programs.zsh.enable | Whether to configure zsh as an interactive shell
|
| options/nixos/services.xserver.desktopManager.gnome.flashback.customSessions.*.wmLabel | The name of the window manager to show in the session chooser.
|
| options/nixos/services.dependency-track.database.databaseName | Database name to use when connecting to an external or
manually provisioned database; has no effect when a local
database is automatically provisioned
|
| options/home-manager/i18n.inputMethod.fcitx5.themes | Themes to be written to $XDG_DATA_HOME/fcitx5/themes/${name}
|
| options/nixos/containers.<name>.specialArgs | A set of special arguments to be passed to NixOS modules
|
| options/nixos/fileSystems.<name>.neededForBoot | If set, this file system will be mounted in the initial ramdisk
|
| options/home-manager/programs.termite.iconName | The name of the icon to be used for the terminal process.
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/console.font | The font used for the virtual consoles
|
| options/nixos/services.journaldriver.logStream | Configures the name of the Stackdriver Logging log stream into
which to write journald entries
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.ignore_remote_labels | Set Gmail labels to ignore when syncing from remote labels to
local tags (before translations).
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.exporters.exportarr-readarr.user | User name under which the exportarr-readarr exporter shall be run.
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.ignore_empty_history | Work around a Gmail API quirk where an empty change history
is sometimes returned
|
| options/nixos/boot.initrd.secrets | Secrets to append to the initrd
|
| options/nixos/services.prometheus.exporters.artifactory.user | User name under which the artifactory exporter shall be run.
|
| options/nixos/services.prometheus.exporters.restic.rcloneConfig | Configuration for the rclone remote being used for backup
|
| options/nixos/services.prometheus.exporters.mqtt.prometheusPrefix | Prefix added to the metric name.
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowCN | Allow client if common name appears in the list.
|
| options/nixos/services.journald.upload.settings.Upload.ServerCertificateFile | SSL CA certificate in PEM format
|
| options/nixos/services.bluesky-pds.environmentFiles | File to load environment variables from
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowOU | Allow client if organizational unit name appears in the list.
|
| options/home-manager/programs.kitty.themeFile | Apply a Kitty color theme
|
| options/nixos/containers.<name>.macvlans | The list of host interfaces from which macvlans will be
created
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowDNS | Allow client if DNS subject alternative name appears in the list.
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowURI | Allow client if URI subject alternative name appears in the list.
|
| options/nixos/services.prometheus.exporters.exportarr-prowlarr.user | User name under which the exportarr-prowlarr exporter shall be run.
|
| options/nixos/services.yggdrasil.denyDhcpcdInterfaces | Disable the DHCP client for any interface whose name matches
any of the shell glob patterns in this list
|
| options/nixos/services.matrix-appservice-irc.settings.homeserver.domain | The 'domain' part for user IDs on this home server
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.veilid.settings.core.network.routing_table.bootstrap | Host name of existing well-known Veilid bootstrap servers for the network to connect to.
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.remove_local_messages | Remove local messages that have been deleted on the remote.
|
| options/nixos/containers.<name>.allowedDevices | A list of device nodes to which the containers has access to.
|
| options/nixos/services.crowdsec-firewall-bouncer.settings.api_key | API key to authenticate with a local crowdsec API
|
| options/nixos/systemd.mounts.*.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/services.nipap.settings.auth.default_backend | Name of auth backend to use by default.
|
| options/nixos/services.mqtt2influxdb.influxdb.database | Name of the InfluxDB database.
|
| options/home-manager/programs.yazi.plugins | Lua plugins
|
| options/nixos/boot.iscsi-initiator.target | Name of the iSCSI target to boot from.
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.username | username is required if using Identity V2 API
|
| options/nixos/containers.<name>.forwardPorts.*.hostPort | Source port of the external interface on host
|
| options/nixos/services.matrix-alertmanager.matrixRooms | Combination of Alertmanager receiver(s) and rooms for the bot to join
|
| options/nixos/containers.<name>.timeoutStartSec | Time for the container to start
|
| options/nixos/services.prometheus.exporters.modemmanager.user | User name under which the modemmanager exporter shall be run.
|
| options/nixos/services.mosquitto.listeners.*.omitPasswordAuth | Omits password checking, allowing anyone to log in with any user name unless
other mandatory authentication methods (eg TLS client certificates) are configured.
|
| options/home-manager/programs.yazi.flavors | Pre-made themes
|
| options/nixos/hardware.display.edid.linuxhw | Exposes EDID files from users-sourced database at https://github.com/linuxhw/EDID
Attribute names will be mapped to EDID filenames <NAME>.bin
|
| options/nixos/programs.regreet.font.package | The package that provides the font given in the name option.
|
| options/nixos/services.warpgate.settings.external_host | Configure the domain name of this Warpgate instance
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.inherit | Grants the user created inherit permissions
|
| options/nixos/services.datadog-agent.extraIntegrations | Extra integrations from the Datadog core-integrations
repository that should be built and included
|
| options/home-manager/programs.claude-code.hooks | Custom hooks for Claude Code
|
| options/nixos/security.tpm2.fapi.profileName | Name of the default cryptographic profile chosen from the profile_dir directory.
|
| options/nixos/services.postgresql.systemCallFilter | Configures the syscall filter for postgresql.service
|
| options/nixos/containers.<name>.forwardPorts | List of forwarded ports from host to container
|
| options/nixos/users.mysql.pam.statusColumn | The name of the column or an SQL expression that indicates the status of
the user
|
| options/nixos/networking.vswitches | This option allows you to define Open vSwitches that connect
physical networks together
|
| options/home-manager/programs.yazi.shellWrapperName | Name of the shell wrapper to be called.
|
| options/nixos/containers.<name>.restartIfChanged | Whether the container should be restarted during a NixOS
configuration switch if its definition has changed.
|
| options/nixos/services.centrifugo.environmentFiles | Files to load environment variables from
|
| options/nixos/services.icingaweb2.modulePackages | Name-package attrset of Icingaweb 2 modules packages to enable
|
| options/nixos/containers.<name>.localAddress | The IPv4 address assigned to the interface in the container
|
| options/darwin/services.aerospace.settings.on-window-detected.*."if".workspace | The workspace name to match (optional).
|
| options/nixos/containers.<name>.allowedDevices.*.node | Path to device node
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/containers.<name>.interfaces | The list of interfaces to be moved into the container.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections | Section defining IKE connection configurations, each in its own subsection
with an arbitrary yet unique name
|
| options/nixos/services.matrix-appservice-discord.settings | config.yaml configuration as a Nix attribute set
|
| options/nixos/containers.<name>.localAddress6 | The IPv6 address assigned to the interface in the container
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities | Section defining complementary attributes of certification authorities, each
in its own subsection with an arbitrary yet unique name
|
| options/nixos/services.postgresql.ensureUsers.*.ensureDBOwnership | Grants the user ownership to a database with the same name
|
| options/nixos/services.crowdsec-firewall-bouncer.registerBouncer.bouncerName | Name to register the bouncer as to the CrowdSec API
|
| options/nixos/services.pgbouncer.settings.pgbouncer.listen_addr | Specifies a list (comma-separated) of addresses where to listen for TCP connections
|
| options/nixos/programs.regreet.theme.package | The package that provides the theme given in the name option.
|
| options/nixos/services.outline.oidcAuthentication.displayName | Display name for OIDC authentication.
|
| options/nixos/image.repart.verityStore.partitionIds.esp | Specify the attribute name of the ESP.
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.replace_slash_with_dot | Replace '/' with '.' in Gmail labels.
|
| options/home-manager/programs.gnome-shell.theme.package | Package providing a GNOME Shell theme in
$out/share/themes/${name}/gnome-shell.
|
| options/nixos/services.warpgate.settings.sso_providers.*.label | SSO provider name displayed on login page.
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.domain_name | At most one of domain_id and domain_name must be provided if using username
with Identity V3
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.createdb | Grants the user, created by the ensureUser attr, createdb permissions
|
| options/nixos/services.pgbouncer.settings.pgbouncer.max_client_conn | Maximum number of client connections allowed
|
| options/nixos/services.h2o.defaultTLSRecommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|
| options/nixos/services.prometheus.exporters.unpoller.controllers.*.user | Unifi service user name.
|
| options/nixos/containers.<name>.nixpkgs | A path to the nixpkgs that provide the modules, pkgs and lib for evaluating the container
|
| options/nixos/services.chatgpt-retrieval-plugin.qdrantCollection | name of the qdrant collection used to store documents.
|
| options/nixos/boot.kernelPatches | A list of additional patches to apply to the kernel
|
| options/nixos/networking.supplicant | Interfaces for which to start wpa_supplicant
|
| options/home-manager/programs.radicle.uri.web-rad.browser | Name of the XDG Desktop Entry for your browser
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.namespaces | Optional namespace discovery
|
| options/nixos/services.journaldriver.googleCloudProject | Configures the name of the Google Cloud project to which to
forward journald logs
|
| options/nixos/services.prometheus.exporters.wireguard.wireguardConfig | Path to the Wireguard Config to
add the peer's name to the stats of a peer
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/systemd.network.config.routeTables | Defines route table names as an attrset of name to number
|
| options/nixos/services.taskserver.organisations | An attribute set where the keys name the organisation and the values
are a set of lists of users and
groups.
|
| options/nixos/services.mosquitto.listeners.*.authPlugins.*.denySpecialChars | Automatically disallow all clients using #
or + in their name/id.
|
| options/home-manager/programs.vicinae.extensions | List of Vicinae extensions to install
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.project_name | The project_id and project_name fields are optional for the Identity V2 API
|
| options/nixos/nixpkgs.flake.source | The path to the nixpkgs sources used to build the system
|
| options/nixos/system.nixos.label | NixOS version name to be used in the names of generated
outputs and boot labels
|
| options/nixos/programs.regreet.iconTheme.package | The package that provides the icon theme given in the name option.
|
| options/darwin/nixpkgs.flake.source | The path to the nixpkgs sources used to build the system
|
| options/nixos/services.mautrix-telegram.environmentFile | File containing environment variables to be passed to the mautrix-telegram service,
in which secret tokens can be specified securely by defining values for e.g.
MAUTRIX_TELEGRAM_APPSERVICE_AS_TOKEN,
MAUTRIX_TELEGRAM_APPSERVICE_HS_TOKEN,
MAUTRIX_TELEGRAM_TELEGRAM_API_ID,
MAUTRIX_TELEGRAM_TELEGRAM_API_HASH and optionally
MAUTRIX_TELEGRAM_TELEGRAM_BOT_TOKEN
|
| options/nixos/image.repart.verityStore.partitionIds.store | Specify the attribute name of the store partition.
|
| options/home-manager/programs.mercurial.userName | Default user name to use.
|
| options/home-manager/programs.radio-active.aliases | Key/value pairs where the key is name of radio station and value is URL.
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.drop_non_existing_label | Allow missing labels on the Gmail side to be dropped.
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.bypassrls | Grants the user, created by the ensureUser attr, replication permissions
|
| options/home-manager/programs.zsh.prezto.tmux.defaultSessionName | Set the default session name.
|
| options/nixos/services.prometheus.exporters.mqtt.zigbee2MqttAvailability | Whether to enable Normalize sensor name for device availability metric added by Zigbee2MQTT..
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.superuser | Grants the user, created by the ensureUser attr, superuser permissions
|
| options/home-manager/programs.neomutt.sidebar.shortPath | By default sidebar shows the full path of the mailbox, but
with this enabled only the relative name is shown.
|
| options/nixos/services.prometheus.exporters.pgbouncer.connectionEnvFile | File that must contain the environment variable
PGBOUNCER_EXPORTER_CONNECTION_STRING which is set to the connection
string used by pgbouncer
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.groupNameAttribute | Attribute for a name of group.
|
| options/nixos/services.mobilizon.settings.":mobilizon"."Mobilizon.Storage.Repo".database | Name of the database
|
| options/home-manager/programs.claude-code.rules | Modular rule files for Claude Code
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.basic_auth.username | HTTP username
|
| options/home-manager/programs.claude-code.agents | Custom agents for Claude Code
|
| options/nixos/containers.<name>.forwardPorts.*.protocol | The protocol specifier for port forwarding between host and container
|
| options/nixos/hardware.nvidia-container-toolkit.enable-hooks | List of hooks to enable when generating the CDI specification
|
| options/home-manager/programs.sbt.plugins.*.artifact | The name of the artifact.
|
| options/nixos/services.influxdb2.provision.initialSetup.organization | Primary organization name
|
| options/nixos/boot.loader.systemd-boot.windows | Make Windows bootable from systemd-boot
|
| options/nixos/services.prometheus.exporters.pgbouncer.connectionString | Connection string for accessing pgBouncer
|
| options/home-manager/programs.sbt.repositories | A list of repositories to use when resolving dependencies
|
| options/nixos/users.ldap.daemon.rootpwmoddn | The distinguished name to use to bind to the LDAP server
when the root user tries to modify a user's password.
|
| options/home-manager/programs.ncmpcpp.settings | Attribute set from name of a setting to its value
|
| options/nixos/programs.regreet.cursorTheme.package | The package that provides the cursor theme given in the name option.
|
| options/nixos/hardware.nvidia-container-toolkit.disable-hooks | List of hooks to disable when generating the CDI specification
|
| options/home-manager/programs.lazygit.shellWrapperName | Name of the shell wrapper to be called.
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.createrole | Grants the user, created by the ensureUser attr, createrole permissions
|
| options/nixos/security.doas.extraRules.*.setEnv | Keep or set the specified variables
|
| options/darwin/services.aerospace.settings.workspace-to-monitor-force-assignment | Map workspaces to specific monitors
|
| options/nixos/services.mqtt2influxdb.points.*.measurement | Name of the measurement
|
| options/home-manager/programs.zsh.siteFunctions | Functions that are added to the Zsh environment and are subject to
autoloading
|
| options/nixos/networking.hostName | The name of the machine
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.replication | Grants the user, created by the ensureUser attr, replication permissions
|
| options/nixos/hardware.display.edid.modelines | Attribute set of XFree86 Modelines automatically converted
and exposed as edid/<name>.bin files in initrd
|
| options/nixos/containers.<name>.forwardPorts.*.containerPort | Target port of container
|
| options/nixos/boot.loader.grub.fsIdentifier | Determines how GRUB will identify devices when generating the
configuration file
|
| options/nixos/image.repart.verityStore.partitionIds.store-verity | Specify the attribute name of the store's dm-verity hash partition.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.auto_create_new_mailboxes | Whether to create new mailboxes automatically on the server from notmuch
tags.
|
| options/nixos/services.filesender.settings.log_facilities | Defines where FileSender logging is sent
|
| options/nixos/systemd.automounts.*.wantedBy | Units that want (i.e. depend on) this unit
|
| options/home-manager/programs.gemini-cli.context | An attribute set of context files to create in ~/.gemini/
|
| options/home-manager/programs.claude-code.commands | Custom commands for Claude Code
|
| options/nixos/networking.ucarp.upscript | Command to run after become master, the interface name, virtual address
and optional extra parameters are passed as arguments.
|
| options/home-manager/programs.qutebrowser.searchEngines | Search engines that can be used via the address bar
|
| options/home-manager/programs.wezterm.colorSchemes | Attribute set of additional color schemes to be written to
$XDG_CONFIG_HOME/wezterm/colors, where each key is
taken as the name of the corresponding color scheme
|
| options/nixos/boot.loader.systemd-boot.sortKey | The sort key used for the NixOS bootloader entries
|
| options/darwin/system.defaults.finder._FXSortFoldersFirst | Keep folders on top when sorting by name
|
| options/home-manager/vdirsyncer.userNameCommand | A command that prints the user name to standard output.
|
| options/nixos/programs.msmtp.accounts | Named accounts and their respective configurations
|
| options/home-manager/programs.gnome-terminal.profile | A set of Gnome Terminal profiles
|
| options/nixos/containers.<name>.allowedDevices.*.modifier | Device node access modifier
|
| options/home-manager/programs.zed-editor.extensions | A list of the extensions Zed should install on startup
|
| options/nixos/hardware.trackpoint.device | The device name of the trackpoint
|
| options/nixos/hardware.nvidia.prime.offload.offloadCmdMainProgram | Specifies the CLI name of the hardware.nvidia.prime.offload.enableOffloadCmd
convenience script for offloading programs to an nvidia device.
|
| options/nixos/swapDevices.*.encrypted.label | Label of the unlocked encrypted device
|
| options/nixos/programs.kubeswitch.commandName | The name of the command to use
|
| options/home-manager/programs.kubeswitch.commandName | The name of the command to use
|
| options/nixos/containers.<name>.ephemeral | Runs container in ephemeral mode with the empty root filesystem at boot
|
| options/nixos/users.ldap.bind.distinguishedName | The distinguished name to bind to the LDAP server with
|
| options/nixos/hardware.firmware | List of packages containing firmware files
|
| options/nixos/boot.loader.grub.configurationName | GRUB entry name instead of default.
|
| options/home-manager/programs.git.includes.*.contentSuffix | Nix store name for the git configuration text file,
when generating the configuration text from nix options.
|
| options/home-manager/programs.rclone.requiresUnit | The name of a systemd user service that must complete before the rclone
configuration file is written
|
| options/home-manager/programs.powerline-go.pathAliases | Pairs of full-path and corresponding desired short name
|
| options/nixos/containers.<name>.privateUsers | Whether to give the container its own private UIDs/GIDs space (user namespacing)
|
| options/nixos/security.pam.rssh.settings.auth_key_file | Path to file with trusted public keys in OpenSSH's authorized_keys format
|
| options/home-manager/programs.element-desktop.profiles | Extra profiles for Element
|
| options/nixos/boot.initrd.compressor | The compressor to use on the initrd image
|
| options/home-manager/programs.quickshell.configs | A set of configs to include in the quickshell config directory
|
| options/nixos/boot.loader.grub.mirroredBoots.*.efiBootloaderId | The id of the bootloader to store in efi nvram
|
| options/nixos/programs.pay-respects.runtimeRules | List of rules to be added to /etc/xdg/pay-respects/rules.
pay-respects will read the contents of these generated rules to recommend command corrections
|
| options/nixos/networking.ucarp.downscript | Command to run after become backup, the interface name, virtual address
and optional extra parameters are passed as arguments.
|
| options/nixos/containers.<name>.networkNamespace | Takes the path to a file representing a kernel network namespace that the container
shall run in
|
| options/nixos/specialisation.<name>.inheritParentConfig | Include the entire system's configuration
|
| options/home-manager/programs.quickshell.activeConfig | The name of the config to use
|
| options/nixos/networking.nat.externalInterface | The name of the external network interface.
|
| options/darwin/system.defaults.finder._FXSortFoldersFirstOnDesktop | Keep folders on top when sorting by name on the desktop
|
| options/nixos/networking.networkmanager.ensureProfiles.profiles | Declaratively define NetworkManager profiles
|
| options/nixos/documentation.man.mandoc.settings.output.man | A template for linked manuals (usually via the Xr macro) in HTML
output
|
| options/home-manager/wayland.windowManager.sway.config.workspaceOutputAssign.*.output | Name(s) of the output(s) from {command}swaymsg -t get_outputs.
|
| options/nixos/networking.dhcpcd.denyInterfaces | Disable the DHCP client for any interface whose name matches
any of the shell glob patterns in this list
|
| options/nixos/containers.<name>.additionalCapabilities | Grant additional capabilities to the container
|
| options/nixos/hardware.printers.ensurePrinters | Will regularly ensure that the given CUPS printers are configured as declared here
|
| options/nixos/security.tpm2.tctiEnvironment.tabrmdConf | Configuration part of the tabrmd TCTI, like the D-Bus bus name
|
| options/nixos/networking.dhcpcd.allowInterfaces | Enable the DHCP client for any interface whose name matches
any of the shell glob patterns in this list
|
| options/nixos/documentation.man.mandoc.settings.output.paper | This option is for generating PostScript and PDF output
|
| options/home-manager/specialisation.<name>.configuration | Arbitrary Home Manager configuration settings.
|
| options/nixos/hardware.block.defaultSchedulerExclude | Device name pattern to exclude from default scheduler assignment
through config.hardware.block.defaultScheduler and
config.hardware.block.defaultSchedulerRotational
|
| options/nixos/security.tpm2.tctiEnvironment.interface | The name of the TPM command transmission interface (TCTI) library to
use.
|
| options/home-manager/wayland.windowManager.sway.config.workspaceOutputAssign.*.workspace | Name of the workspace to assign.
|
| options/home-manager/xsession.windowManager.i3.config.workspaceOutputAssign.*.output | Name(s) of the output(s) from {command}i3-msg -t get_outputs.
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.application_credential_name | The application_credential_id or application_credential_name fields are
required if using an application credential to authenticate
|
| options/nixos/specialisation.<name>.configuration | Arbitrary NixOS configuration
|
| options/nixos/containers | A set of NixOS system configurations to be run as lightweight
containers
|
| options/nixos/hardware.block.scheduler | Assign block I/O scheduler by device name pattern
|
| options/home-manager/xsession.windowManager.i3.config.workspaceOutputAssign.*.workspace | Name of the workspace to assign.
|
| options/darwin/system.defaults.loginwindow.SHOWFULLNAME | Apple menu > System Preferences > Users and Groups > Login Options
Displays login window as a name and password field instead of a list of users
|
| options/nixos/system.replaceDependencies.replacements | List of packages to override without doing a full rebuild
|
| options/nixos/security.apparmor.killUnconfinedConfinables | Whether to enable killing of processes which have an AppArmor profile enabled
(in security.apparmor.policies)
but are not confined (because AppArmor can only confine new processes)
|
| options/nixos/networking.networkmanager.ensureProfiles.secrets.entries.*.matchIface | interface name of the NetworkManager connection
|
| options/nixos/networking.networkmanager.unmanaged | List of interfaces that will not be managed by NetworkManager
|
| options/nixos/networking.networkmanager.ensureProfiles.secrets.entries.*.matchId | connection id used by NetworkManager
|
| options/nixos/networking.networkmanager.ensureProfiles.secrets.entries.*.matchSetting | name of the setting section for which secrets are requested
|
| options/home-manager/programs.ripgrep-all.custom_adapters.*.mimetypes | If not null and --rga-accurate is enabled, mime type matching is used instead of file name matching
|
| options/nixos/networking.networkmanager.appendNameservers | A list of name servers that should be appended
to the ones configured in NetworkManager or received by DHCP.
|
| options/nixos/networking.networkmanager.insertNameservers | A list of name servers that should be inserted before
the ones configured in NetworkManager or received by DHCP.
|
| options/home-manager/programs.qutebrowser.keyBindings | Key bindings mapping keys to commands in different modes
|
| packages/nixpkgs/dlx | DLX simulator written in C |
| packages/nixpkgs/seppo | Personal Social Web |
| packages/nixpkgs/parpd | Proxy ARP Daemon that complies with RFC 1027 |
| packages/nixpkgs/quisk | SDR transceiver for radios that use the Hermes protocol |
| packages/nixpkgs/unscd | Less buggy replacement for the glibc name service cache daemon |
| packages/nixpkgs/ls-lint | Extremely fast file and directory name linter |
| packages/nixpkgs/alfis | Alternative Free Identity System |
| packages/nixpkgs/iro | CLI tool to convet Hex color code or RGB to color code, RGB, HSL and color name |
| packages/nixpkgs/dhcpcd | Client for the Dynamic Host Configuration Protocol (DHCP) |
| packages/nixpkgs/djbdns | Collection of Domain Name System tools |
| packages/nixpkgs/idnkit | Provides functionalities about i18n domain name processing |
| packages/nixpkgs/nsncd | Name service non-caching daemon |
| packages/nixpkgs/nixos-install | Install bootloader and NixOS |
| packages/nixpkgs/alfis-nogui | Alternative Free Identity System |
| packages/nixpkgs/upspin | Global name space for storing data akin to a filesystem |
| packages/nixpkgs/nsd | Authoritative only, high performance, simple and open source name server |
| packages/nixpkgs/nixos-enter | Run a command in a NixOS chroot environment |
| packages/nixpkgs/aewan | Ascii-art Editor Without A Name |
| packages/nixpkgs/mimeo | Open files by MIME-type or file name using regular expressions |
| packages/nixpkgs/git-crypt | Transparent file encryption in git |
| packages/nixpkgs/uniscribe | Explains Unicode characters/code points: Displays their name, category, and shows compositions |
| packages/nixpkgs/vpnc-scripts | Script for vpnc to configure the network routing and name service |
| packages/nixpkgs/detect | Expression-based file search combining name, content, metadata, and structured data predicates |
| packages/nixpkgs/dnsutils | Domain name server |
| packages/nixpkgs/getopt | Parses command-line arguments from shell scripts |
| packages/nixpkgs/jwhois | Client for the WHOIS protocol allowing you to query the owner of a domain name |
| packages/nixpkgs/nssmdns | MDNS Name Service Switch (NSS) plug-in |
| packages/nixpkgs/figurine | Print your name in style |
| packages/nixpkgs/filegive | Easy p2p file sending program |
| packages/nixpkgs/dig | Domain name server |
| packages/nixpkgs/dnstwist | Domain name permutation engine for detecting homograph phishing attacks |
| packages/nixpkgs/bind | Domain name server |
| packages/nixpkgs/host | Domain name server |
| packages/nixpkgs/nixpkgs-vet | Tool to vet (check) Nixpkgs, including its pkgs/by-name directory |
| packages/nixpkgs/spotifywm | Wrapper around Spotify that correctly sets class name before opening the window |
| packages/nixpkgs/geticons | CLI utility to get icons for apps on your system or other generic icons by name |
| packages/nixpkgs/eschalot | Tor hidden service name generator |
| packages/nixpkgs/nixos-rebuild-ng | Rebuild your NixOS configuration and switch to it, on local hosts and remote |
| packages/nixpkgs/ascii | Interactive ASCII name and synonym chart |
| packages/nixpkgs/git-remote-gcrypt | Git remote helper for GPG-encrypted remotes |
| packages/nixpkgs/xml2 | Tools for command line processing of XML, HTML, and CSV |
| packages/nixpkgs/spooftooph | Automate spoofing or clone Bluetooth device Name, Class, and Address |
| packages/nixpkgs/wiggle | Tool for applying patches with conflicts |
| packages/nixpkgs/gnu-config | Attempt to guess a canonical system name |
| packages/nixpkgs/profont | Monospaced font created to be a most readable font for programming |
| packages/nixpkgs/nix-required-mounts | A --pre-build-hook for Nix, that allows to expose extra paths in the build sandbox based on derivations' requiredSystemFeatrues |
| packages/nixpkgs/openresolv | Program to manage /etc/resolv.conf |
| packages/nixpkgs/libasyncns | C library for Linux/Unix for executing name service queries asynchronously |
| packages/nixpkgs/zstxtns-utils | Utilities to deal with text based name service databases |
| packages/nixpkgs/libcanberra | Implementation of the XDG Sound Theme and Name Specifications |
| packages/nixpkgs/libcanberra-gtk3 | Implementation of the XDG Sound Theme and Name Specifications |
| packages/nixpkgs/libcanberra-gtk2 | Implementation of the XDG Sound Theme and Name Specifications |
| packages/nixpkgs/dnstracer | Determines where a given Domain Name Server (DNS) gets its information from, and follows the chain of DNS servers back to the servers which know the data |
| packages/nixpkgs/moreutils | Growing collection of the unix tools that nobody thought to write long ago when unix was young |
| packages/nixpkgs/luarocks-packages-updater | Module to update luarocks-packages |
| packages/nixpkgs/libcanberra_kde | Implementation of the XDG Sound Theme and Name Specifications |
| packages/nixpkgs/nth | Module and CLI for the identification of hashes |
| packages/nixpkgs/fixDarwinDylibNames | |
| packages/nixpkgs/ocamlPackages.dns | Domain Name System (DNS) library |
| packages/nixpkgs/ocamlPackages_latest.dns | Domain Name System (DNS) library |
| packages/nixpkgs/ocamlPackages.dns-mirage | Opinionated Domain Name System (DNS) library |
| packages/nixpkgs/ocamlPackages.uuidm | OCaml module implementing 128 bits universally unique identifiers version 3, 5 (name based with MD5, SHA-1 hashing) and 4 (random based) according to RFC 4122 |
| packages/nixpkgs/ibus-engines.uniemoji | Input method (ibus) for entering unicode symbols and emoji by name |
| packages/nixpkgs/perlPackages.NetDNS | Perl Interface to the Domain Name System |
| packages/nixpkgs/ocamlPackages_latest.dns-mirage | Opinionated Domain Name System (DNS) library |
| packages/nixpkgs/perl5Packages.NetDNS | Perl Interface to the Domain Name System |
| packages/nixpkgs/ocamlPackages_latest.uuidm | OCaml module implementing 128 bits universally unique identifiers version 3, 5 (name based with MD5, SHA-1 hashing) and 4 (random based) according to RFC 4122 |
| packages/nixpkgs/perlPackages.ProcFind | Find processes by name, PID, or some other attributes |
| packages/nixpkgs/haskellPackages.nom | Name-binding & alpha-equivalence |
| packages/nixpkgs/yaziPlugins.jump-to-char | Vim-like f<char>, jump to the next file whose name starts with <char>. |
| packages/nixpkgs/perl5Packages.ProcFind | Find processes by name, PID, or some other attributes |
| packages/nixpkgs/perlPackages.DataOptList | Parse and validate simple name/value option pairs |
| packages/nixpkgs/perlPackages.ClassLoad | Working (require "Class::Name") and more |
| packages/nixpkgs/texlivePackages.fink | The LaTeX2e File Name Keeper |
| packages/nixpkgs/perlPackages.FileMimeInfo | Determine file type from the file name |
| packages/nixpkgs/haskellPackages.HPath | Extract Haskell declarations by name |
| packages/nixpkgs/perl5Packages.DataOptList | Parse and validate simple name/value option pairs |
| packages/nixpkgs/haskellPackages.zenc | GHC style name Z-encoding and Z-decoding |
| packages/nixpkgs/perl5Packages.ClassLoad | Working (require "Class::Name") and more |
| packages/nixpkgs/akkuPackages.chibi-net-dns | Domain Name Service library, with high-level utilities for address, mx and text record lookups |
| packages/nixpkgs/haskellPackages.rpm-nvr | RPM package name-version-release data types |
| packages/nixpkgs/python313Packages.wcmatch | Wilcard File Name matching library |
| packages/nixpkgs/python314Packages.wcmatch | Wilcard File Name matching library |
| packages/nixpkgs/perlPackages.TryTinyByClass | Selectively catch exceptions by class name |
| packages/nixpkgs/perl538Packages.NetDNS | Perl Interface to the Domain Name System |
| packages/nixpkgs/perl540Packages.NetDNS | Perl Interface to the Domain Name System |
| packages/nixpkgs/perl5Packages.FileMimeInfo | Determine file type from the file name |
| packages/nixpkgs/perlPackages.ModuleUtil | Module name tools and transformations |
| packages/nixpkgs/perl5Packages.TryTinyByClass | Selectively catch exceptions by class name |
| packages/nixpkgs/perl5Packages.ModuleUtil | Module name tools and transformations |
| packages/nixpkgs/ocamlPackages.yuujinchou | Name pattern combinators |
| packages/nixpkgs/perl540Packages.ProcFind | Find processes by name, PID, or some other attributes |
| packages/nixpkgs/perl538Packages.ProcFind | Find processes by name, PID, or some other attributes |
| packages/nixpkgs/haskellPackages.hcount | Haskell artifact name counts |
| packages/nixpkgs/haskellPackages.gender | Identify a persons gender by their first name |
| packages/nixpkgs/haskellPackages.lsfrom | List directory files starting from a specific name |
| packages/nixpkgs/python312Packages.wcmatch | Wilcard File Name matching library |
| packages/nixpkgs/akkuPackages.r6rs-psystem | OS name and libc-loading for PFFI |
| packages/nixpkgs/haskellPackages.resolv | Domain Name Service (DNS) lookup via the libresolv standard library routines |
| packages/nixpkgs/haskellPackages.windns | Domain Name Service (DNS) lookup via the <windns.h>/dnsapi.dll standard library |
| packages/nixpkgs/gnomeExtensions.xremap | Allow xremap to fetch the focused app name using D-Bus or local socket. |
| packages/nixpkgs/perl538Packages.DataOptList | Parse and validate simple name/value option pairs |
| packages/nixpkgs/perl540Packages.DataOptList | Parse and validate simple name/value option pairs |
| packages/nixpkgs/perl538Packages.ClassLoad | Working (require "Class::Name") and more |
| packages/nixpkgs/perl540Packages.ClassLoad | Working (require "Class::Name") and more |
| packages/nixpkgs/python313Packages.outdated | Mini-library which, given a package name and a version, checks if it's the latest version available on PyPI |
| packages/nixpkgs/python314Packages.outdated | Mini-library which, given a package name and a version, checks if it's the latest version available on PyPI |
| packages/nixpkgs/perl540Packages.FileMimeInfo | Determine file type from the file name |
| packages/nixpkgs/perl538Packages.FileMimeInfo | Determine file type from the file name |
| packages/nixpkgs/haskellPackages.system-info | Get the name of the operating system |
| packages/nixpkgs/haskellPackages.resolve | A name resolusion library |
| packages/nixpkgs/haskellPackages.path-tagged | A wrapper around the @path@ library, tagged with semantic name |
| packages/nixpkgs/texlivePackages.grffile | Extended file name support for graphics (legacy package) |
| packages/nixpkgs/perl538Packages.TryTinyByClass | Selectively catch exceptions by class name |
| packages/nixpkgs/perl540Packages.TryTinyByClass | Selectively catch exceptions by class name |
| packages/nixpkgs/haskellPackages.ConsStream | Trivial re-export of Wouter Swierstra's Stream package, avoiding module name clash |
| packages/nixpkgs/perl540Packages.ModuleUtil | Module name tools and transformations |
| packages/nixpkgs/perl538Packages.ModuleUtil | Module name tools and transformations |
| packages/nixpkgs/haskellPackages.CabalSearch | Search cabal packages by name |
| packages/nixpkgs/haskellPackages.daemons | Daemons in Haskell made fun and easy |
| packages/nixpkgs/haskellPackages.window-utils | OS window icon/name utilities |
| packages/nixpkgs/haskellPackages.network-dns | Domain Name System data structures |
| packages/nixpkgs/haskellPackages.itanium-abi | An implementation of name mangling/demangling for the Itanium ABI |
| packages/nixpkgs/ocamlPackages_latest.yuujinchou | Name pattern combinators |
| packages/nixpkgs/nodePackages.poor-mans-t-sql-formatter-cli | A T-SQL formatting utility in JS, transpiled from the C# library of the same name. |
| packages/nixpkgs/gnomeExtensions.user-id-in-top-panel | Add ( user name :: user id @ host ) in top panel |
| packages/nixpkgs/haskellPackages.acme-omitted | A name for omitted definitions |
| packages/nixpkgs/python313Packages.srvlookup | Wrapper for dnspython to return SRV records for a given host, protocol, and domain name |
| packages/nixpkgs/python314Packages.srvlookup | Wrapper for dnspython to return SRV records for a given host, protocol, and domain name |
| packages/nixpkgs/python312Packages.outdated | Mini-library which, given a package name and a version, checks if it's the latest version available on PyPI |
| packages/nixpkgs/haskellPackages.haskell-docs | A program to find and display the docs and type of a name |
| packages/nixpkgs/python313Packages.click-default-group | Group to invoke a command without explicit subcommand name |
| packages/nixpkgs/python314Packages.click-default-group | Group to invoke a command without explicit subcommand name |
| packages/nixpkgs/texlivePackages.fetchcls | Fetch the current class name |
| packages/nixpkgs/texlivePackages.storecmd | Store the name of a defined command in a container |
| packages/nixpkgs/texlivePackages.etexcmds | Avoid name clashes with e-TeX commands |
| packages/nixpkgs/texlivePackages.currfile | Provide file name and path of input files |
| packages/nixpkgs/texlivePackages.refenums | Define named items and provide back-references with that name |
| packages/nixpkgs/vimPlugins.yaml-companion-nvim | |
| packages/nixpkgs/haskellPackages.dns-patterns | DNS name parsing and pattern matching utilities |
| packages/nixpkgs/python312Packages.srvlookup | Wrapper for dnspython to return SRV records for a given host, protocol, and domain name |
| packages/nixpkgs/python312Packages.click-default-group | Group to invoke a command without explicit subcommand name |
| packages/nixpkgs/gnomeExtensions.toggle-window | For security reasons, since Gnome 41, cann't invoke '**org.gnome |
| packages/nixpkgs/texlivePackages.cmdstring | Get command name reliably |
| packages/nixpkgs/nodePackages_latest.poor-mans-t-sql-formatter-cli | A T-SQL formatting utility in JS, transpiled from the C# library of the same name. |
| packages/nixpkgs/perlPackages.DataValidateDomain | Domain and host name validation |
| packages/nixpkgs/gnomeExtensions.vpn-indicator | Display current VPN name in panel. |
| packages/nixpkgs/perl5Packages.DataValidateDomain | Domain and host name validation |
| packages/nixpkgs/python313Packages.libasyncns | Libasyncns-python is a python binding for the asynchronous name service query library |
| packages/nixpkgs/python314Packages.libasyncns | Libasyncns-python is a python binding for the asynchronous name service query library |
| packages/nixpkgs/haskellPackages.NameGenerator | A name generator written in Haskell |
| packages/nixpkgs/gnomeExtensions.ip-indicator | Displays the current IP address of the network with it's relevant interface name |
| packages/nixpkgs/texlivePackages.noconflict | Resolve macro name conflict between packages |
| packages/nixpkgs/texlivePackages.savefnmark | Save name of the footnote mark for reuse |
| packages/nixpkgs/haskellPackages.denominate | Functions supporting bulk file and directory name normalization |
| packages/nixpkgs/python312Packages.libasyncns | Libasyncns-python is a python binding for the asynchronous name service query library |
| packages/nixpkgs/perl538Packages.DataValidateDomain | Domain and host name validation |
| packages/nixpkgs/perl540Packages.DataValidateDomain | Domain and host name validation |
| packages/nixpkgs/perlPackages.Apppapersway | PaperWM-like scrollable tiling window management for Sway/i3wm |
| packages/nixpkgs/haskellPackages.hs-nombre-generator | Name generator |
| packages/nixpkgs/perl5Packages.Apppapersway | PaperWM-like scrollable tiling window management for Sway/i3wm |
| packages/nixpkgs/python313Packages.pyaxmlparser | Python3 Parser for Android XML file and get Application Name without using Androguard |
| packages/nixpkgs/python314Packages.pyaxmlparser | Python3 Parser for Android XML file and get Application Name without using Androguard |
| packages/nixpkgs/perl540Packages.Apppapersway | PaperWM-like scrollable tiling window management for Sway/i3wm |
| packages/nixpkgs/perl538Packages.Apppapersway | PaperWM-like scrollable tiling window management for Sway/i3wm |
| packages/nixpkgs/python312Packages.publicsuffix | Allows to get the public suffix of a domain name |
| packages/nixpkgs/python313Packages.publicsuffix | Allows to get the public suffix of a domain name |
| packages/nixpkgs/python312Packages.pyaxmlparser | Python3 Parser for Android XML file and get Application Name without using Androguard |
| packages/nixpkgs/python313Packages.publicsuffix2 | Get a public suffix for a domain name using the Public Suffix List |
| packages/nixpkgs/python314Packages.publicsuffix2 | Get a public suffix for a domain name using the Public Suffix List |
| packages/nixpkgs/perlPackages.MooseXSemiAffordanceAccessor | Name your accessors foo() and set_foo() |
| packages/nixpkgs/perl5Packages.MooseXSemiAffordanceAccessor | Name your accessors foo() and set_foo() |
| packages/nixpkgs/python312Packages.publicsuffix2 | Get a public suffix for a domain name using the Public Suffix List |
| packages/nixpkgs/perl540Packages.MooseXSemiAffordanceAccessor | Name your accessors foo() and set_foo() |
| packages/nixpkgs/perl538Packages.MooseXSemiAffordanceAccessor | Name your accessors foo() and set_foo() |
| packages/nixpkgs/python313Packages.cv2-enumerate-cameras | Retrieve the connected camera's name, VID, PID, and the corresponding OpenCV index |
| packages/nixpkgs/python314Packages.cv2-enumerate-cameras | Retrieve the connected camera's name, VID, PID, and the corresponding OpenCV index |
| packages/nixpkgs/gnomeExtensions.applications-overview-tooltip | Shows a tooltip over applications icons on applications overview with application name and/or description. |
| packages/nixpkgs/python312Packages.cv2-enumerate-cameras | Retrieve the connected camera's name, VID, PID, and the corresponding OpenCV index |
| packages/nixpkgs/gnomeExtensions.transcodeappsearch | Searching apps both direct and transcoded name (English, Russian, Ukrainian langs) |
| packages/nixpkgs/rPackages.name | |
| packages/nixpkgs/typstPackages.name-it | Get the English names of integers |
| packages/nixpkgs/nltk-data.names | NLTK Data |
| packages/nixpkgs/typstPackages.name-it_0_1_0 | Get the English names of integers |
| packages/nixpkgs/typstPackages.name-it_0_1_1 | Get the English names of integers |
| packages/nixpkgs/typstPackages.name-it_0_1_2 | Get the English names of integers |
| packages/nixpkgs/haskellPackages.say-my-name | Require explicit type application for some type variables |
| packages/nixpkgs/haskellPackages.true-name | Template Haskell hack to violate module abstractions |
| packages/nixpkgs/ocamlPackages.domain-name | RFC 1035 Internet domain names |
| packages/nixpkgs/rnd-name | Random strings that are easy to recognize |
| packages/nixpkgs/emacsPackages.name-this-color | |
| packages/nixpkgs/rubyPackages.unicode-name | |
| packages/nixpkgs/ocamlPackages_latest.domain-name | RFC 1035 Internet domain names |
| packages/nixpkgs/python313Packages.name-that-hash | Module and CLI for the identification of hashes |
| packages/nixpkgs/python314Packages.name-that-hash | Module and CLI for the identification of hashes |
| packages/nixpkgs/vimPlugins.vim-haskell-module-name | |
| packages/nixpkgs/rPackages.namer | |
| packages/nixpkgs/python312Packages.name-that-hash | Module and CLI for the identification of hashes |
| packages/nixpkgs/vimPlugins.Rename | |
| packages/nixpkgs/haskellPackages.hls-module-name-plugin | Module name plugin for Haskell Language Server |
| packages/nixpkgs/emacsPackages.names | |
| packages/nixpkgs/emacsPackages.buffer-name-relative | |
| packages/nixpkgs/rPackages.rnames | |
| packages/nixpkgs/lomiri.geonames | Parse and query the geonames database dump |
| packages/nixpkgs/vimPlugins.inc-rename-nvim | |
| packages/nixpkgs/haskellPackages.names-th | Manipulate name strings for TH |
| packages/nixpkgs/haskellPackages.names | Type level names |
| packages/nixpkgs/haskellPackages.named | Named parameters (keyword arguments) for Haskell |
| packages/nixpkgs/vimPlugins.live-rename-nvim | |
| packages/nixpkgs/sbclPackages.list-named-class | |
| packages/nixpkgs/emacsPackages.go-rename | |
| packages/nixpkgs/python313Packages.pkgutil-resolve-name | Backport of Python 3.9’s pkgutil.resolve_name |
| packages/nixpkgs/python314Packages.pkgutil-resolve-name | Backport of Python 3.9’s pkgutil.resolve_name |
| packages/nixpkgs/haskellPackages.named-sop | Dependently-typed sums and products, tagged by field name |
| packages/nixpkgs/vimPlugins.renamer-nvim | |
| packages/nixpkgs/gnomeExtensions.app-name-indicator | A GNOME Shell extension that shows the active app's name and icon on the left side of the top panel, like it used to. |
| packages/nixpkgs/rPackages.TouRnament | |
| packages/nixpkgs/emacsPackages.named-timer | |
| packages/nixpkgs/vimPlugins.nvim-rename-state | |
| packages/nixpkgs/python312Packages.pkgutil-resolve-name | Backport of Python 3.9’s pkgutil.resolve_name |
| packages/nixpkgs/texlivePackages.eqname | Name tags for equations |
| packages/nixpkgs/sbclPackages.named-read-macros | |
| packages/nixpkgs/emacsPackages.wfnames | |
| packages/nixpkgs/python313Packages.names | Generate random names |
| packages/nixpkgs/python314Packages.names | Generate random names |
| packages/nixpkgs/texlivePackages.aaai-named | BibTeX style for AAAI |
| packages/nixpkgs/haskellPackages.lens-named | Helper for use with lens |
| packages/nixpkgs/haskellPackages.data-named | Data types for named entities |
| packages/nixpkgs/haskellPackages.named-lock | A named lock that is created on demand |
| packages/nixpkgs/haskellPackages.named-text | A parameterized named text type and associated functionality |
| packages/nixpkgs/python313Packages.namex | Simple utility to separate the implementation of your Python package and its public API surface |
| packages/nixpkgs/python314Packages.namex | Simple utility to separate the implementation of your Python package and its public API surface |
| packages/nixpkgs/sbclPackages.named-closure | |
| packages/nixpkgs/emacsPackages.auto-rename-tag | |
| packages/nixpkgs/rPackages.envnames | |
| packages/nixpkgs/rPackages.codename | |
| packages/nixpkgs/rPackages.acroname | |
| packages/nixpkgs/rPackages.geonames | |
| packages/nixpkgs/rPackages.taxnames | |
| packages/nixpkgs/gnomeExtensions.current-workspace-name | Displays the current workspace name in the panel |
| packages/nixpkgs/rPackages.namedCapture | |
| packages/nixpkgs/rPackages.namedropR | |
| packages/nixpkgs/sbclPackages.named-read-macros-test | |
| packages/nixpkgs/unixtools.hostname | |
| packages/nixpkgs/haskellPackages.pdfname | Name a PDF file using information from the pdfinfo command |
| packages/nixpkgs/emacsPackages.date2name | |
| packages/nixpkgs/haskellPackages.valid-names | Valid operator/module characters |
| packages/nixpkgs/haskellPackages.by-other-names | Give aliases to record fields |
| packages/nixpkgs/emacsPackages.nameless | |
| packages/nixpkgs/texlivePackages.namedef | TeX definitions with named parameters |
| packages/nixpkgs/texlivePackages.numname | Convert a number to its English expression |
| packages/nixpkgs/texlivePackages.namespc | Rudimentary C++-like namespaces in LaTeX |
| packages/nixpkgs/haskellPackages.horname | Rename function definitions returned by SMT solvers |
| packages/nixpkgs/sbclPackages.pathname-utils | |
| packages/nixpkgs/python313Packages.nameko | Microservices framework that lets service developers concentrate on application logic and encourages testability |
| packages/nixpkgs/python314Packages.nameko | Microservices framework that lets service developers concentrate on application logic and encourages testability |
| packages/nixpkgs/perlPackages.TestFilename | Portable filename comparison |
| packages/nixpkgs/sbclPackages.pcl-pathnames | |
| packages/nixpkgs/perlPackages.ParseDistname | Parse a distribution name |
| packages/nixpkgs/haskellPackages.random-names | Expose Random and Arbitrary instances |
| packages/nixpkgs/haskellPackages.batch-rename | Make Linux or MacOS do things like "rename *.mp3 *.mp4" |
| packages/nixpkgs/python313Packages.html-tag-names | List of known HTML tags |
| packages/nixpkgs/python314Packages.html-tag-names | List of known HTML tags |
| packages/nixpkgs/rPackages.babynames | |
| packages/nixpkgs/rPackages.filenamer | |
| packages/nixpkgs/rPackages.namespace | |
| packages/nixpkgs/akkuPackages.slib-filename | String matching for filenames (glob, a la BASH) |
| packages/nixpkgs/perlPackages.CPANDistnameInfo | Extract distribution name and version from a distribution filename |
| packages/nixpkgs/sbclPackages.trivial-renamer | |
| packages/nixpkgs/python312Packages.names | Generate random names |
| packages/nixpkgs/rPackages.babynamesIL | |
| packages/nixpkgs/python312Packages.namex | Simple utility to separate the implementation of your Python package and its public API surface |
| packages/nixpkgs/texlivePackages.nameauth | Name authority mechanism for consistency in body text and index |
| packages/nixpkgs/sbclPackages.lisp-namespace | |
| packages/nixpkgs/sbclPackages.pathname-utils-test | |
| packages/nixpkgs/emacsPackages.info-rename-buffer | |
| packages/nixpkgs/perlPackages.SysHostnameLong | Try every conceivable way to get full hostname |
| packages/nixpkgs/perl5Packages.TestFilename | Portable filename comparison |
| packages/nixpkgs/perl5Packages.ParseDistname | Parse a distribution name |
| packages/nixpkgs/haskellPackages.named-binary-tag | NBT (named binary tag) serialization and deserialization |
| packages/nixpkgs/haskellPackages.haskell-names | Name resolution library for Haskell |
| packages/nixpkgs/perl5Packages.CPANDistnameInfo | Extract distribution name and version from a distribution filename |
| packages/nixpkgs/CuboCore.corerenamer | Batch file renamer from the C Suite |
| packages/nixpkgs/haskellPackages.vinyl-named-sugar | Syntax sugar for vinyl records using overloaded labels |
| packages/nixpkgs/akkuPackages.chibi-pathname | A general, non-filesystem-specific pathname library |
| packages/nixpkgs/sbclPackages.lunamech-matrix-api | |
| packages/nixpkgs/edname | Mass renamer using $EDITOR |
| packages/nixpkgs/perl5Packages.SysHostnameLong | Try every conceivable way to get full hostname |
| packages/nixpkgs/texlivePackages.fontname | Scheme for naming fonts in TeX |
| packages/nixpkgs/texlivePackages.hepnames | Pre-defined high energy particle names |
| packages/nixpkgs/haskellPackages.namelist | fortran90 namelist parser/pretty printer |
| packages/nixpkgs/haskellPackages.epubname | Rename epub ebook files based on meta information |
| packages/nixpkgs/haskellPackages.hostname | A very simple package providing a cross-platform means of determining the hostname |
| packages/nixpkgs/emacsPackages.nameframe | |
| packages/nixpkgs/python312Packages.nameko | Microservices framework that lets service developers concentrate on application logic and encourages testability |
| packages/nixpkgs/haskellPackages.servant-named | Add named endpoints to servant |
| packages/nixpkgs/haskellPackages.named-records | Flexible records with named fields |
| packages/nixpkgs/haskellPackages.unicode-names | Unicode 3.2.0 character names |
| packages/nixpkgs/haskellPackages.named-formlet | A simple formlet library with named formlets |
| packages/nixpkgs/haskellPackages.named-servant | support records and named (from the named package) parameters in servant |
| packages/nixpkgs/haskellPackages.hls-rename-plugin | Rename plugin for Haskell Language Server |
| packages/nixpkgs/python313Packages.coolname | Random Name and Slug Generator |
| packages/nixpkgs/python314Packages.coolname | Random Name and Slug Generator |
| packages/nixpkgs/python312Packages.html-tag-names | List of known HTML tags |
| packages/nixpkgs/texlivePackages.langnames | Name languages and their genetic affiliations consistently |
| packages/nixpkgs/texlivePackages.numnameru | Converts a number to the russian spelled out name |
| packages/nixpkgs/rPackages.nametagger | |
| packages/nixpkgs/rPackages.matsbyname | |
| packages/nixpkgs/emacsPackages.with-namespace | |
| packages/nixpkgs/texlivePackages.jobname-suffix | Compile differently based on the filename |
| packages/nixpkgs/haskellPackages.unicode-data-names | Unicode characters names and aliases |
| packages/nixpkgs/wmname | Prints or set the window manager name property of the root window |
| packages/nixpkgs/perl540Packages.ParseDistname | Parse a distribution name |
| packages/nixpkgs/perl538Packages.ParseDistname | Parse a distribution name |
| packages/nixpkgs/perl538Packages.TestFilename | Portable filename comparison |
| packages/nixpkgs/perl540Packages.TestFilename | Portable filename comparison |
| packages/nixpkgs/perl538Packages.CPANDistnameInfo | Extract distribution name and version from a distribution filename |
| packages/nixpkgs/perl540Packages.CPANDistnameInfo | Extract distribution name and version from a distribution filename |
| packages/nixpkgs/perlPackages.Perlosnames | List possible $^O ($OSNAME) values, with description |
| packages/nixpkgs/haskellPackages.namespace | A Generic Haskell library for managing namespaces |
| packages/nixpkgs/haskellPackages.bindings-uname | Low-level binding to POSIX uname(3) |
| packages/nixpkgs/haskellPackages.photoname | Rename photo image files based on EXIF shoot date |
| packages/nixpkgs/python312Packages.coolname | Random Name and Slug Generator |
| packages/nixpkgs/sbclPackages.named-readtables | |
| packages/nixpkgs/mnamer | Intelligent and highly configurable media organization utility |
| packages/nixpkgs/perl538Packages.SysHostnameLong | Try every conceivable way to get full hostname |
| packages/nixpkgs/perl540Packages.SysHostnameLong | Try every conceivable way to get full hostname |
| packages/nixpkgs/emacsPackages.namespaces | |
| packages/nixpkgs/perl5Packages.Perlosnames | List possible $^O ($OSNAME) values, with description |
| packages/nixpkgs/rubyPackages.domain_name | |
| packages/nixpkgs/haskellPackages.foscam-filename | Foscam File format |
| packages/nixpkgs/emacsPackages.hippie-namespace | |
| packages/nixpkgs/haskellPackages.namecoin-update | Tool to keep namecoin names updated and well |
| packages/nixpkgs/sbclPackages.named-readtables-test | |
| packages/nixpkgs/sbclPackages.symbol-namespaces | |
| packages/nixpkgs/haskellPackages.named-servant-server | server support for named-servant |
| packages/nixpkgs/haskellPackages.named-servant-client | client support for named-servant |
| packages/nixpkgs/rPackages.ozbabynames | |
| packages/nixpkgs/rPackages.onbabynames | |
| packages/nixpkgs/rPackages.ukbabynames | |
| packages/nixpkgs/python313Packages.namedlist | Similar to namedtuple, but instances are mutable |
| packages/nixpkgs/python314Packages.namedlist | Similar to namedtuple, but instances are mutable |
| packages/nixpkgs/python313Packages.wheel-filename | Parse wheel filenames |
| packages/nixpkgs/python314Packages.wheel-filename | Parse wheel filenames |
| packages/nixpkgs/python313Packages.ipynbname | Simply returns either notebook filename or the full path to the notebook |
| packages/nixpkgs/python314Packages.ipynbname | Simply returns either notebook filename or the full path to the notebook |
| packages/nixpkgs/haskellPackages.hedis-namespace | Initial project template from stack |
| packages/nixpkgs/haskellPackages.multipart-names | Handling of multipart names in various casing styles |
| packages/nixpkgs/rename | Rename files according to a Perl rewrite expression |
| packages/nixpkgs/sbclPackages.slynk-named-readtables | |
| packages/nixpkgs/haskellPackages.Tournament | Tournament related algorithms |
| packages/nixpkgs/haskellPackages.hashrename | Rename every file in a directory with his SHA1 hash |
| packages/nixpkgs/emacsPackages.visual-filename-abbrev | |
| packages/nixpkgs/emacsPackages.nameframe-project | |
| packages/nixpkgs/skkDictionaries.fullname | SKK dictionary for celebrities |
| packages/nixpkgs/emacsPackages.sly-named-readtables | |
| packages/nixpkgs/haskellPackages.DAG-Tournament | Real-Time Game Tournament Evaluator |
| packages/nixpkgs/gnomeExtensions.show-hostname-and-ip | Displays the machine’s hostname and local IP address directly on the desktop. |
| packages/nixpkgs/perl540Packages.Perlosnames | List possible $^O ($OSNAME) values, with description |
| packages/nixpkgs/perl538Packages.Perlosnames | List possible $^O ($OSNAME) values, with description |
| packages/nixpkgs/python312Packages.namedlist | Similar to namedtuple, but instances are mutable |
| packages/nixpkgs/python312Packages.wheel-filename | Parse wheel filenames |
| packages/nixpkgs/python312Packages.ipynbname | Simply returns either notebook filename or the full path to the notebook |
| packages/nixpkgs/gnomeExtensions.hostname-on-panel | Displays the Hostname on the Gnome Panel |
| packages/nixpkgs/haskellPackages.linux-namespaces | Work with linux namespaces: create new or enter existing ones |
| packages/nixpkgs/chickenPackages_5.chickenEggs.unitex-named-chars | Unicode & LaTeX Named Chars |
| packages/nixpkgs/sbclPackages.illogical-pathnames | |
| packages/nixpkgs/python313Packages.lance-namespace | Open specification on top of the storage-based Lance table and file format to standardize access to a collection of Lance tables |
| packages/nixpkgs/python314Packages.lance-namespace | Open specification on top of the storage-based Lance table and file format to standardize access to a collection of Lance tables |
| packages/nixpkgs/python313Packages.nameparser | Module for parsing human names into their individual components |
| packages/nixpkgs/python314Packages.nameparser | Module for parsing human names into their individual components |
| packages/nixpkgs/texlivePackages.babel-vietnamese | Babel support for typesetting Vietnamese |
| packages/nixpkgs/haskellPackages.hostname-validate | Validate hostnames e.g. localhost or foo.co.uk. |
| packages/nixpkgs/haskellPackages.postgresql-named | Generic deserialization of PostgreSQL rows based on column names |
| packages/nixpkgs/gnomeExtensions.add-username-to-top-panel | Simply add your username to topbar panel quick settings menu. |
| packages/nixpkgs/haskellPackages.servant-namedargs | Combinators for servant providing named parameters |
| packages/nixpkgs/texlivePackages.namedtensor | Macros for named tensor notation |
| packages/nixpkgs/texlivePackages.pgfornament | Drawing of Vectorian ornaments with PGF/TikZ |
| packages/nixpkgs/texlivePackages.hyphen-vietnamese | Vietnamese hyphenation patterns. |
| packages/nixpkgs/python313Packages.zope-dottedname | Resolver for Python dotted names |
| packages/nixpkgs/python314Packages.zope-dottedname | Resolver for Python dotted names |
| packages/nixpkgs/texlivePackages.lshort-vietnamese | Vietnamese version of the LaTeX introduction |
| packages/nixpkgs/python312Packages.lance-namespace | Open specification on top of the storage-based Lance table and file format to standardize access to a collection of Lance tables |
| packages/nixpkgs/texlivePackages.pgfornament-han | pgfornament library for Chinese traditional motifs and patterns |
| packages/nixpkgs/python312Packages.nameparser | Module for parsing human names into their individual components |
| packages/nixpkgs/pipe-rename | Rename your files using your favorite text editor |
| packages/nixpkgs/chickenPackages_5.chickenEggs.pathname-expand | |
| packages/nixpkgs/akkuPackages.retropikzel-named-pipes | Library for using named pipes |
| packages/nixpkgs/texlivePackages.biblatex-morenames | New names for standard BibLaTeX entry type |
| packages/nixpkgs/python312Packages.zope-dottedname | Resolver for Python dotted names |
| packages/nixpkgs/terraform-providers.namecheap | |
| packages/nixpkgs/haskellPackages.time-locale-vietnamese | Vietnamese locale for date and time format |
| packages/nixpkgs/python313Packages.pynamecheap | Namecheap API client in Python |
| packages/nixpkgs/python314Packages.pynamecheap | Namecheap API client in Python |
| packages/nixpkgs/sbclPackages.trivial-package-local-nicknames | |
| packages/nixpkgs/gnomeExtensions.username-in-top-panel-right-side | Displays the current username in the top panel, positioned at the far right after the power button. |
| packages/nixpkgs/rPackages.vietnameseConverter | |
| packages/nixpkgs/tvnamer | Automatic TV episode file renamer, uses data from thetvdb.com via tvdb_api |
| packages/nixpkgs/regname | Mass renamer TUI written in Rust |
| packages/nixpkgs/haskellPackages.postgresql-simple-named | Implementation of named parameters for `postgresql-simple` library |
| packages/nixpkgs/texlivePackages.mpcolornames | Extend list of predefined colour names for MetaPost |
| packages/nixpkgs/haskellPackages.servant-client-namedargs | Automatically derive API client functions with named and optional parameters |
| packages/nixpkgs/haskellPackages.servant-server-namedargs | Automatically derive API server functions with named and optional parameters |
| packages/nixpkgs/python312Packages.pynamecheap | Namecheap API client in Python |
| packages/nixpkgs/krename | Powerful batch renamer for KDE |
| packages/nixpkgs/haskellPackages.xmonad-windownames | A library to automatically put named windows into the DynamicLog |
| packages/nixpkgs/file-rename | Perl extension for renaming multiple files |
| packages/nixpkgs/perlPackages.namespaceclean | Keep imports and functions out of your namespace |
| packages/nixpkgs/haskellPackages.hls-qualify-imported-names-plugin | A Haskell Language Server plugin that qualifies imported names |
| packages/nixpkgs/emacsPackages.nameframe-projectile | |
| packages/nixpkgs/perl5Packages.namespaceclean | Keep imports and functions out of your namespace |
| packages/nixpkgs/dnsname-cni | DNS name resolution for containers |
| packages/nixpkgs/python313Packages.lance-namespace-urllib3-client | Lance namespace OpenAPI specification |
| packages/nixpkgs/python314Packages.lance-namespace-urllib3-client | Lance namespace OpenAPI specification |
| packages/nixpkgs/python313Packages.pytest-helpers-namespace | PyTest Helpers Namespace |
| packages/nixpkgs/python314Packages.pytest-helpers-namespace | PyTest Helpers Namespace |
| packages/nixpkgs/haskellPackages.primitive-stablename | primitive operations on StableNames |
| packages/nixpkgs/python312Packages.pytest-helpers-namespace | PyTest Helpers Namespace |
| packages/nixpkgs/python312Packages.lance-namespace-urllib3-client | Lance namespace OpenAPI specification |
| packages/nixpkgs/emacsPackages.nameframe-perspective | |
| packages/nixpkgs/perlPackages.TestRunPluginTrimDisplayedFilenames | Trim the first components |
| packages/nixpkgs/perl540Packages.namespaceclean | Keep imports and functions out of your namespace |
| packages/nixpkgs/perl538Packages.namespaceclean | Keep imports and functions out of your namespace |
| packages/nixpkgs/gprename | Complete batch renamer for files and directories |
| packages/nixpkgs/flut-renamer | Bulk file renamer written in flutter |
| packages/nixpkgs/terraform-providers.namecheap_namecheap | |
| packages/nixpkgs/perl5Packages.TestRunPluginTrimDisplayedFilenames | Trim the first components |
| packages/nixpkgs/sbclPackages.cl-ana_dot_pathname-utils | |
| packages/nixpkgs/rubyPackages_3_2.unicode-name | |
| packages/nixpkgs/rubyPackages_3_1.unicode-name | |
| packages/nixpkgs/rubyPackages_3_5.unicode-name | |
| packages/nixpkgs/rubyPackages_3_3.unicode-name | |
| packages/nixpkgs/rubyPackages_3_4.unicode-name | |
| packages/nixpkgs/rubyPackages_4_0.unicode-name | |
| packages/nixpkgs/vscode-extensions.usernamehw.errorlens | Visual Studio Code extension that improves highlighting of errors, warnings and other language diagnostics |
| packages/nixpkgs/rust-petname | Generate human readable random names |
| packages/nixpkgs/hostname | |
| packages/nixpkgs/rPackages.proceduralnames | |
| packages/nixpkgs/gnomeExtensions.quick-settings-audio-devices-renamer | It lets you change the names of your audio devices in the Quick Settings Audio Panel |
| packages/nixpkgs/perl538Packages.TestRunPluginTrimDisplayedFilenames | Trim the first components |
| packages/nixpkgs/perl540Packages.TestRunPluginTrimDisplayedFilenames | Trim the first components |
| packages/nixpkgs/ocamlPackages.username_kernel | Identifier for a user |
| packages/nixpkgs/texlivePackages.varsfromjobname | Extract variables from the name of the LaTeX file |
| packages/nixpkgs/ocamlPackages.janeStreet.username_kernel | Identifier for a user |
| packages/nixpkgs/vscode-extensions.formulahendry.auto-rename-tag | |
| packages/nixpkgs/home-assistant-component-tests.namecheapdns | Open source home automation that puts local control and privacy first |
| packages/nixpkgs/sbclPackages.lisp-namespace_dot_test | |
| packages/nixpkgs/ocamlPackages_latest.username_kernel | Identifier for a user |
| packages/nixpkgs/hostname-debian | Utility to set/show the host name or domain name |
| packages/nixpkgs/unnamed-sdvx-clone | Game based on K-Shoot MANIA and Sound Voltex |
| packages/nixpkgs/ocamlPackages_latest.janeStreet.username_kernel | Identifier for a user |
| packages/nixpkgs/all-the-package-names | List of all the public package names on npm |
| packages/nixpkgs/texlivePackages.longnamefilelist | Tidy \listfiles with long file names |
| packages/nixpkgs/perlPackages.namespaceautoclean | Keep imports out of your namespace |
| packages/nixpkgs/haskellPackages.linux-namespaces_0_2_0_1 | Work with linux namespaces: create new or enter existing ones |
| packages/nixpkgs/perl5Packages.namespaceautoclean | Keep imports out of your namespace |
| packages/nixpkgs/namecoind | Decentralized open source information registration and transfer system based on the Bitcoin cryptocurrency |
| packages/nixpkgs/perl538Packages.namespaceautoclean | Keep imports out of your namespace |
| packages/nixpkgs/perl540Packages.namespaceautoclean | Keep imports out of your namespace |
| packages/nixpkgs/namespace-cli | Command line interface for the Namespaces platform |
| packages/nixpkgs/wg-friendly-peer-names | Small shellscript that makes it possible to give peers a friendlier and more readable name in the `wg` peer list |
| packages/nixpkgs/rPackages.touRnamentofchampions | |
| packages/nixpkgs/uutils-hostname | Rust reimplementation of the hostname project |
| packages/nixpkgs/mozcdic-ut-place-names | Dictionary converted from the Japan Post's ZIP code data for Mozc |
| packages/nixpkgs/luarenamer | Plugin for Shoko that allows users to rename their collection using Lua |
| packages/nixpkgs/deterministic-uname | Print certain system information (hardcoded with lib/system values) |
| packages/nixpkgs/deterministic-host-uname | Print certain system information (hardcoded with lib/system values) |
| packages/nixpkgs/username-anarchy | Username generator tool for penetration testing |
| packages/nixpkgs/sbclPackages.cl-glfw-opengl-amd__name__gen__delete | |
| packages/nixpkgs/biosdevname | Udev helper for naming devices per BIOS names |
| packages/nixpkgs/renameutils | Set of programs to make renaming of files faster |
| packages/nixpkgs/mozcdic-ut-personal-names | Dictionary for Mozc |
| packages/nixpkgs/reattach-to-user-namespace | Wrapper that provides access to the Mac OS X pasteboard service |
| packages/nixpkgs/namespaced-openvpn | Network namespace isolation for OpenVPN tunnels |
| packages/nixpkgs/rubyPackages_3_2.domain_name | |
| packages/nixpkgs/rubyPackages_3_1.domain_name | |
| packages/nixpkgs/rubyPackages_3_5.domain_name | |
| packages/nixpkgs/perlPackages.SubName | (Re)name a sub |
| packages/nixpkgs/perl5Packages.SubName | (Re)name a sub |
| packages/nixpkgs/rubyPackages_3_3.domain_name | |
| packages/nixpkgs/rubyPackages_4_0.domain_name | |
| packages/nixpkgs/rubyPackages_3_4.domain_name | |
| packages/nixpkgs/sbclPackages.com_dot_gigamonkeys_dot_pathnames | |
| packages/nixpkgs/hyprland-autoname-workspaces | Automatically rename workspaces with icons of started applications |
| packages/nixpkgs/perl540Packages.SubName | (Re)name a sub |
| packages/nixpkgs/perl538Packages.SubName | (Re)name a sub |
| packages/nixpkgs/libuninameslist | Library of Unicode names and annotation data |
| packages/nixpkgs/perlPackages.SymbolGlobalName | Finds name and type of a global variable |
| packages/nixpkgs/perl5Packages.SymbolGlobalName | Finds name and type of a global variable |
| packages/nixpkgs/perl540Packages.SymbolGlobalName | Finds name and type of a global variable |
| packages/nixpkgs/perl538Packages.SymbolGlobalName | Finds name and type of a global variable |
| packages/nixpkgs/python312Packages.pythonNamespacesHook | |
| packages/nixpkgs/python313Packages.pythonNamespacesHook | |
| packages/nixpkgs/python314Packages.pythonNamespacesHook | |
| packages/nur/nagy.unum | Utility for looking up Unicode characters and HTML entities by code, name, block, or description |
| packages/nur/xddxdd.soggy | Experimental server emulator for a game I forgot its name |
| packages/nur/shadowrz.mkxp-z | RGSS on Steroids |
| packages/nur/xyenon.yaziPlugins.yazi-rs.jump-to-char | Vim-like `f<char>`, jump to the next file whose name starts with `<char>` |
| packages/nur/xddxdd.uncategorized.soggy | Experimental server emulator for a game I forgot its name |
| packages/nur/rycee.firefox-addons.matte-black-red | A modern dark / Matte Black theme with a red accent color |
| packages/nur/codgician.ms213x-rename | A tool that helps you modify the basic EDID information in the MS213X collector firmware, such as the display name, serial number etc. |