| options/home-manager/services.podman.images.<name>.tlsVerify | Require HTTPS and verification of certificates when contacting registries.
|
| options/home-manager/services.podman.builds.<name>.tlsVerify | Require HTTPS and verification of certificates when contacting registries.
|
| options/nixos/services.autosuspend.wakeups.<name>.class | Name of the class implementing the check
|
| options/nixos/security.pam.services.<name>.p11Auth | If set, keys listed in
~/.ssh/authorized_keys and
~/.eid/authorized_certificates
can be used to log in with the associated PKCS#11 tokens.
|
| options/nixos/services.ndppd.proxies.<name>.rules | This is a rule that the target address is to match against
|
| options/nixos/services.i2pd.outTunnels.<name>.inbound.quantity | Number of simultaneous ‹name› tunnels.
|
| options/nixos/services.rspamd.locals.<name>.enable | Whether this file locals should be generated
|
| options/darwin/programs.ssh.knownHosts.<name>.hostNames | The set of system-wide known SSH hosts
|
| options/nixos/systemd.services.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/services.kimai.sites.<name>.database.host | Database host address.
|
| options/nixos/services.kimai.sites.<name>.database.port | Database host port.
|
| options/nixos/services.postfix.settings.master.<name>.wakeupUnusedComponent | If set to false the component will only be woken
up if it is used
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.tags.deleted | Tag for notmuch to use for messages stored in the mailbox labeled with the
Trash name attribute
|
| options/nixos/hardware.alsa.controls.<name>.card | Name of the PCM card to control (slave).
|
| options/nixos/services.geth.<name>.websocket.apis | APIs to enable over WebSocket
|
| options/nixos/services.nebula.networks.<name>.cert | Path to the host certificate.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.slot | Optional slot number of the token that stores the certificate.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels.<name>.nearPattern | Name for where mail coming from the remote (far) mail server will end up
locally
|
| options/nixos/services.ndppd.proxies.<name>.interface | Listen for any Neighbor Solicitation messages on this interface,
and respond to them according to a set of rules
|
| options/nixos/services.i2pd.inTunnels.<name>.accessList | I2P nodes that are allowed to connect to this service.
|
| options/nixos/services.drupal.sites.<name>.modulesDir | The location for users to install Drupal modules.
|
| options/nixos/services.openvpn.servers.<name>.down | Shell commands executed when the instance is shutting down.
|
| options/nixos/services.public-inbox.inboxes.<name>.url | URL where this inbox can be accessed over HTTP.
|
| options/nixos/services.ax25.axports.<name>.paclen | Default maximum packet size for this interface.
|
| options/nixos/services.ax25.axports.<name>.enable | Whether to enable Enables the axport interface.
|
| options/nixos/services.sabnzbd.settings.servers.<name>.expire_date | If Notifications are enabled and an expiry date is
set, warn 5 days before expiry
|
| options/nixos/services.wiki-js.settings.db.db | Name of the database to use.
|
| options/nixos/services.fedimintd.<name>.p2p.port | Port to bind on for p2p connections from peers (both TCP and UDP)
|
| options/nixos/services.fedimintd.<name>.p2p.bind | Address to bind on for p2p connections from peers (both TCP and UDP)
|
| options/nixos/services.github-runners.<name>.runnerGroup | Name of the runner group to add this runner to (defaults to the default runner group)
|
| options/darwin/services.github-runners.<name>.runnerGroup | Name of the runner group to add this runner to (defaults to the default runner group)
|
| options/nixos/services.openssh.knownHosts.<name>.hostNames | A list of host names and/or IP numbers used for accessing
the host's ssh service
|
| options/nixos/services.angrr.settings.temporary-root-policies.<name>.filter.program | Path to the external filter program.
|
| options/nixos/services.fedimintd.<name>.api.url | Public URL of the API address of the reverse proxy/tls terminator
|
| options/nixos/services.drupal.sites.<name>.poolConfig | Options for the Drupal PHP pool
|
| options/nixos/services.armagetronad.servers.<name>.settings | Armagetron Advanced server rules configuration
|
| options/nixos/services.hostapd.radios.<name>.noScan | Disables scan for overlapping BSSs in HT40+/- mode
|
| options/nixos/services.simplesamlphp.<name>.settings | Configuration options used by SimpleSAMLphp
|
| options/nixos/programs.tsmClient.servers.<name>.nodename | Target node name on the IBM TSM server.
|
| options/nixos/services.tor.relay.onionServices.<name>.map | See torrc manual.
|
| options/nixos/services.quicktun.<name>.privateKeyFile | Path to file containing local secret key in binary or hexadecimal form.
Not needed when services.quicktun..protocol is set to raw.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.file | Absolute path to the certificate to load
|
| options/nixos/services.quicktun.<name>.localPort | Local UDP port.
|
| options/nixos/services.redis.servers.<name>.user | User account under which this instance of redis-server runs.
If left as the default value this user will automatically be
created on system activation, otherwise you are responsible for
ensuring the user exists before the redis service starts.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.scale | Output scale configuration
|
| options/nixos/services.consul-template.instances.<name>.settings.pid_file | Path to use for the pid file.
|
| options/nixos/systemd.user.services.<name>.startAt | Automatically start this unit at the given date/time, which
must be in the format described in
systemd.time(7)
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockPathMode | This optional key specifies the mode of the socket
|
| options/nixos/services.drupal.sites.<name>.phpOptions | Options for PHP's php.ini file for this Drupal site.
|
| options/nixos/services.geth.<name>.metrics.address | Listen address of Go Ethereum metrics service.
|
| options/nixos/services.nginx.proxyCachePath.<name>.enable | Whether to enable this proxy cache path entry.
|
| options/nixos/services.vmalert.instances.<name>.settings."datasource.url" | Datasource compatible with Prometheus HTTP API.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.cjdns.ETHInterface.connectTo.<name>.login | (optional) name your peer has for you
|
| options/nixos/services.cjdns.UDPInterface.connectTo.<name>.login | (optional) name your peer has for you
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockFamily | This optional key can be used to specifically request that "IPv4" or "IPv6" socket(s) be created.
|
| options/nixos/services.h2o.hosts.<name>.tls.identity.*.key-file | Path to key file
|
| options/nixos/services.nix-store-gcs-proxy.<name>.address | The address of the proxy.
|
| options/home-manager/programs.bat.themes.<name>.src | Path to the theme folder.
|
| options/home-manager/programs.alot.tags.<name>.focus | How to display the tag when focused.
|
| options/nixos/services.httpd.virtualHosts.<name>.hostName | Canonical hostname for the server.
|
| options/nixos/services.asusd.auraConfigs.<name>.source | Path of the source file.
|
| options/nixos/services.caddy.virtualHosts.<name>.hostName | Canonical hostname for the server.
|
| options/nixos/services.redis.servers.<name>.unixSocket | The path to the socket to bind to.
|
| options/nixos/services.rss2email.feeds.<name>.url | The URL at which to fetch the feed.
|
| options/home-manager/services.podman.volumes.<name>.driver | The volume driver to use.
|
| options/home-manager/services.podman.volumes.<name>.labels | The labels to apply to the volume.
|
| options/nixos/services.gitwatch.<name>.enable | Whether to enable watching for repo.
|
| options/nixos/services.bitcoind.<name>.enable | Whether to enable Bitcoin daemon.
|
| options/nixos/services.gitwatch.<name>.branch | Optional branch in remote repository
|
| options/nixos/services.gitwatch.<name>.remote | Optional url of remote repository
|
| options/nixos/services.authelia.instances.<name>.group | The name of the group for this authelia instance.
|
| options/nixos/services.pgbackrest.stanzas.<name>.instances.<name>.host | PostgreSQL host for operating remotely.
|
| options/nixos/services.openafsClient.cellServDB.<name>.*.ip | IP Address of a database server
|
| options/nixos/services.nginx.proxyCachePath.<name>.keysZoneSize | Set size to shared memory zone.
|
| options/nixos/services.openafsServer.cellServDB.<name>.*.ip | IP Address of a database server
|
| options/nixos/services.evremap.settings.phys | The physical device name to listen on
|
| options/home-manager/programs.papis.libraries.<name>.settings | Configuration for this library.
|
| options/nixos/services.tahoe.nodes.<name>.client.shares.total | The number of shares required to store a file.
|
| options/nixos/services.easytier.instances.<name>.settings.listeners | Listener addresses to accept connections from other peers
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels.<name>.extraConfig | Extra configuration lines to add to THIS channel's
configuration.
|
| options/nixos/services.geth.<name>.authrpc.address | Listen address of Go Ethereum Auth RPC API.
|
| options/nixos/services.phpfpm.pools.<name>.phpPackage | The PHP package to use for running this PHP-FPM pool.
|
| options/nixos/services.restic.backups.<name>.runCheck | Whether to run the check command with the provided checkOpts options.
|
| options/nixos/services.syncthing.settings.folders.<name>.versioning | How to keep changed/deleted files with Syncthing
|
| options/home-manager/services.syncthing.settings.folders.<name>.versioning | How to keep changed/deleted files with Syncthing
|
| options/nixos/services.fedimintd.<name>.api.bind | Address to bind on for API connections relied by the reverse proxy/tls terminator.
|
| options/nixos/services.fedimintd.<name>.api.port | Port to bind on for API connections relied by the reverse proxy/tls terminator.
|
| options/nixos/systemd.user.paths.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/services.consul-template.instances.<name>.settings.template | Template section of consul-template
|
| options/nixos/services.k3s.autoDeployCharts.<name>.repo | The repo of the Helm chart
|
| options/home-manager/xdg.stateFile.<name>.onChange | Shell commands to run when file has changed between
generations
|
| options/home-manager/xdg.cacheFile.<name>.onChange | Shell commands to run when file has changed between
generations
|
| options/nixos/services.tahoe.nodes.<name>.storage.enable | Whether to enable storage service.
|
| options/nixos/services.wyoming.piper.servers.<name>.uri | URI to bind the wyoming server to.
|
| options/nixos/services.bacula-sd.director.<name>.tls.key | The path of a PEM encoded TLS private key
|
| options/nixos/services.bacula-fd.director.<name>.tls.key | The path of a PEM encoded TLS private key
|
| options/nixos/services.tarsnap.archives.<name>.printStats | Print global archive statistics upon completion
|
| options/nixos/services.netbird.clients | Attribute set of NetBird client daemons, by default each one will:
- be manageable using dedicated tooling:
netbird-<name> script,
NetBird - netbird-<name> graphical interface when appropriate (see ui.enable),
- run as a
netbird-<name>.service,
- listen for incoming remote connections on the port
51820 (openFirewall by default),
- manage the
netbird-<name> wireguard interface,
- use the /var/lib/netbird-/config.json configuration file,
- override /var/lib/netbird-/config.json with values from /etc/netbird-/config.d/*.json,
- (
hardened) be locally manageable by netbird-<name> system group,
With following caveats:
- multiple daemons will interfere with each other's DNS resolution of
netbird.cloud, but
should remain fully operational otherwise
|