| options/nixos/services.openvpn.servers.<name>.config | Configuration of this OpenVPN instance
|
| options/home-manager/programs.lsd.icons | Configuration written to $XDG_CONFIG_HOME/lsd/icons.yaml
|
| options/nixos/hardware.sane.drivers.scanSnap.package | The epjitsu package to use
|
| options/nixos/services.firezone.relay.tokenFile | A file containing the firezone relay token
|
| options/nixos/services.gammu-smsd.backend.files.outboxPath | Where SMSes to be sent should be placed
|
| options/nixos/services.sympa.domains.<name>.settings | The robot.conf configuration file as key value set
|
| options/nixos/fonts.fontconfig.enable | If enabled, a Fontconfig configuration file will be built
pointing to a set of default fonts
|
| options/nixos/services.honk.extraCSS | An extra CSS file to be loaded by the client.
|
| options/home-manager/programs.matplotlib.extraConfig | Additional commands for matplotlib that will be added to the
matplotlibrc file.
|
| options/nixos/services.filesender.enable | Whether to enable FileSender.
|
| options/nixos/services.canaille.secretKeyFile | File containing the Flask secret key
|
| options/home-manager/programs.nvchecker.settings.__config__ | See https://nvchecker.readthedocs.io/en/stable/usage.html#configuration-files
|
| options/nixos/services.postgrest.pgpassFile | The password to authenticate to PostgreSQL with
|
| options/home-manager/launchd.agents.<name>.config.StandardErrorPath | This optional key specifies what file should be used for data being sent to stderr when using stdio(3).
|
| options/nixos/services.prometheus.exporters.postfix.logfilePath | Path where Postfix writes log entries
|
| options/nixos/services.rsyslogd.defaultConfig | The default syslog.conf file configures a
fairly standard setup of log files, which can be extended by
means of extraConfig.
|
| options/nixos/services.prosody-filer.settings | Configuration for Prosody Filer
|
| options/home-manager/launchd.agents.<name>.config.LimitLoadToSessionType | This configuration file only applies to sessions of the type specified
|
| options/nixos/boot.readOnlyNixStore | If set, NixOS will enforce the immutability of the Nix store
by making /nix/store a read-only bind
mount
|
| options/nixos/programs.openvpn3.netcfg.settings | Options stored in /etc/openvpn3/netcfg.json configuration file
|
| options/nixos/services.vaultwarden.config | The configuration of vaultwarden is done through environment variables,
therefore it is recommended to use upper snake case (e.g. DISABLE_2FA_REMEMBER)
|
| options/home-manager/xsession.windowManager.xmonad.libFiles | Additional files that will be saved in
~/.xmonad/lib/ and included in the configuration
build
|
| options/nixos/services.vsftpd.userlistFile | Newline separated list of names to be allowed/denied if userlistEnable
is true
|
| options/nixos/services.xrdp.sslKey | ssl private key path
A self-signed certificate will be generated if file not exists.
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites.<name>.desktopEntry.icon | Icon to display in file manager, menus, etc.
|
| options/nixos/services.neo4j.bolt.sslPolicy | Neo4j SSL policy for BOLT traffic
|
| options/home-manager/programs.taskwarrior.config | Key-value configuration written to
$XDG_CONFIG_HOME/task/taskrc.
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/power.ups.upsmon.monitor.<name>.passwordFile | The full path to a file containing the password from
upsd.users for accessing this UPS
|
| options/nixos/services.tox-node.keysFile | Path to the file where DHT keys are stored.
|
| options/nixos/virtualisation.fileSystems.<name>.overlay.workdir | The path to the workdir
|
| options/nixos/image.repart.split | Enables generation of split artifacts from partitions
|
| options/nixos/services.coturn.cert | Certificate file in PEM format.
|
| options/darwin/services.khd.khdConfig | Config to use for khdrc.
|
| options/darwin/services.kwm.kwmConfig | Config to use for kwmrc.
|
| options/nixos/services.rke2.extraKubeProxyConfig | Extra configuration to add to the kube-proxy's configuration file
|
| options/home-manager/programs.gpg.mutableTrust | If set to true, you may manage trust as a user using
the gpg command
|
| options/nixos/services.etebase-server.settings.global.secret_file | The path to a file containing the secret
used as django's SECRET_KEY.
|
| options/nixos/environment.profiles | A list of profiles used to setup the global environment.
|
| options/darwin/environment.profiles | A list of profiles used to setup the global environment.
|
| options/home-manager/services.kanshi.profiles.<name>.exec | Commands executed after the profile is successfully applied
|
| options/nixos/services.seafile.seahubAddress | Which address to bind the seahub server to, of the form:
|
| options/home-manager/programs.gemini-cli.context | An attribute set of context files to create in ~/.gemini/
|
| options/nixos/services.vdirsyncer.jobs.<name>.configFile | existing configuration file
|
| options/home-manager/programs.floorp.profiles.<name>.search | Declarative search engine configuration.
|
| options/home-manager/editorconfig.enable | Whether to enable EditorConfig home configuration file.
|
| options/nixos/services.sillytavern.configFile | Path to the SillyTavern configuration file.
|
| options/nixos/services.sshguard.blacklist_file | Blacklist an attacker when its score exceeds threshold
|
| options/nixos/virtualisation.fileSystems.<name>.device | The device as passed to mount
|
| options/home-manager/services.kanshi.settings.*.profile | profile attribute set.
|
| options/home-manager/targets.genericLinux.gpu.nvidia.sha256 | The hash of the downloaded driver file
|
| options/nixos/services.xrdp.sslCert | ssl certificate path
A self-signed certificate will be generated if file not exists.
|
| options/nixos/services.filebrowser.user | User account under which FileBrowser runs.
|
| options/nixos/systemd.tmpfiles.settings | Declare systemd-tmpfiles rules to create, delete, and clean up volatile
and temporary files and directories
|
| options/home-manager/programs.i3status-rust.bars | Attribute set of i3status-rust bars, each with their own configuration
|
| options/nixos/services.prometheus.alertmanager.environmentFile | File to load as environment file
|
| options/nixos/services.bacula-sd.device.<name>.archiveDevice | The specified name-string gives the system file name of the storage
device managed by this storage daemon
|
| options/nixos/services.autorandr.profiles | Autorandr profiles specification.
|
| options/home-manager/programs.autorandr.profiles | Autorandr profiles specification.
|
| options/nixos/services.etcd.peerKeyFile | Key file to use for peer to peer communication
|
| options/home-manager/programs.floorp.profiles.<name>.search.meta.maintainers | List of maintainers of each module
|
| options/nixos/services.hercules-ci-agent.settings.clusterJoinTokenPath | Location of the cluster-join-token.key file
|
| options/darwin/services.hercules-ci-agent.settings.clusterJoinTokenPath | Location of the cluster-join-token.key file
|
| options/nixos/programs.less.enable | Whether to enable less, a file pager.
|
| options/nixos/services.coturn.pkey | Private key file in PEM format.
|
| options/home-manager/services.kbfs.enable | Whether to enable Keybase File System.
|
| options/nixos/virtualisation.fileSystems.<name>.encrypted.label | Label of the unlocked encrypted device
|
| options/home-manager/programs.sketchybar.config.source | The path to be linked to .config/sketchybar if source is a directory,
or to .config/sketchybar/sketchybarrc if it is a file.
|
| options/nixos/services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.docuseal.secretKeyBaseFile | Path to file containing the secret key base
|
| options/home-manager/programs.opencode.skills | Custom agent skills for opencode
|
| options/nixos/services.zammad.database.settings | The database.yml configuration file as key value set
|
| options/nixos/services.glance.environmentFile | Path to an environment file as defined in systemd.exec(5)
|
| options/home-manager/programs.librewolf.profiles | Attribute set of LibreWolf profiles.
|
| options/nixos/programs.neovim.configure | Generate your init file from your list of plugins and custom commands
|
| options/nixos/virtualisation.fileSystems.<name>.encrypted.enable | The block device is backed by an encrypted one, adds this device as a initrd luks entry.
|
| options/darwin/homebrew.global.brewfile | Whether to enable Homebrew to automatically use the Brewfile that this module generates in
the Nix store, when you manually invoke brew bundle
|
| options/nixos/services.openafsClient.globalCellServDBFile | Global CellServDB file to be deployed
|
| options/home-manager/programs.kubecolor.settings | Configuration written to ~/.kube/color.yaml (Linux)
or Library/Application Support/kube/color.yaml (Darwin)
|
| options/darwin/system.defaults.screencapture.target | Target to which screencapture should save screenshot to
|
| options/nixos/services.hercules-ci-agent.settings | These settings are written to the agent.toml file
|
| options/darwin/services.github-runners.<name>.tokenFile | The full path to a file which contains either
- a fine-grained personal access token (PAT),
- a classic PAT
- or a runner registration token
Changing this option or the tokenFile’s content triggers a new runner registration
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/nixos/services.mastodon.otpSecretFile | Path to file containing the OTP secret
|
| options/nixos/services.consul-template.instances.<name>.settings.pid_file | Path to use for the pid file.
|
| options/nixos/virtualisation.fileSystems.<name>.depends | List of paths that should be mounted before this one
|
| options/nixos/services.oink.apiKeyFile | Path to a file containing the API key to use when modifying DNS records.
|
| options/nixos/services.matrix-synapse.settings.log_config | The file that holds the logging configuration.
|
| options/home-manager/services.way-displays.settings | The way-displays configuration written to
$XDG_CONFIG_HOME/way-displays/cfg.yml
|
| options/nixos/services.xserver.windowManager.i3.configFile | Path to the i3 configuration file
|
| options/nixos/services.k3s.tokenFile | File path containing the k3s token to use when connecting to a server.
|
| options/nixos/services.authelia.instances.<name>.settings.log.file_path | File path where the logs will be written
|
| options/home-manager/programs.alacritty.settings | Configuration written to
$XDG_CONFIG_HOME/alacritty/alacritty.yml or
$XDG_CONFIG_HOME/alacritty/alacritty.toml
(the latter being used for alacritty 0.13 and later)
|
| options/nixos/services.nsd.zonefilesWrite | Write changed secondary zones to their zonefile every N seconds
|