| options/nixos/fileSystems.<name>.mountPoint | Location where the file system will be mounted
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.index | Adds index directive.
|
| options/nixos/systemd.sockets.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/systemd.targets.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/services.kanidm.unixSettings.hsm_pin_path | Path to a HSM pin.
|
| options/nixos/services.ndppd.proxies.<name>.rules.<name>.method | static: Immediately answer any Neighbor Solicitation Messages
(if they match the IP rule).
iface: Forward the Neighbor Solicitation Message through the specified
interface and only respond if a matching Neighbor Advertisement
Message is received.
auto: Same as iface, but instead of manually specifying the outgoing
interface, check for a matching route in /proc/net/ipv6_route.
|
| options/home-manager/services.podman.images.<name>.username | Username used to connect to registry.
|
| options/nixos/services.borgbackup.jobs.<name>.archiveBaseName | How to name the created archives
|
| options/nixos/systemd.units.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.timers.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/systemd.slices.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.crtc | Output video display controller.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.crtc | Output video display controller.
|
| options/nixos/systemd.user.slices.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/systemd.user.timers.<name>.wants | Start the specified units when this unit is started.
|
| options/home-manager/xdg.configFile.<name>.onChange | Shell commands to run when file has changed between
generations
|
| options/nixos/services.step-ca.intermediatePasswordFile | Path to the file containing the password for the intermediate
certificate private key.
Make sure to use a quoted absolute path instead of a path literal
to prevent it from being copied to the globally readable Nix
store.
|
| options/nixos/services.hydra.logo | Path to a file containing the logo of your Hydra instance.
|
| options/home-manager/services.skhd.outLogFile | Absolute path to log all stdout output.
|
| options/nixos/users.extraUsers.<name>.createHome | Whether to create the home directory and ensure ownership as well as
permissions to match the user.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.module | Optional PKCS#11 module name.
|
| options/nixos/services.bacula-fd.director.<name>.tls.verifyPeer | Verify peer certificate
|
| options/nixos/services.bacula-sd.director.<name>.tls.verifyPeer | Verify peer certificate
|
| options/nixos/services.httpd.virtualHosts.<name>.locations.<name>.index | Adds DirectoryIndex directive
|
| options/nixos/services.httpd.virtualHosts.<name>.locations.<name>.alias | Alias directory for requests
|
| options/nixos/services.netbird.clients | Attribute set of NetBird client daemons, by default each one will:
- be manageable using dedicated tooling:
netbird-<name> script,
NetBird - netbird-<name> graphical interface when appropriate (see ui.enable),
- run as a
netbird-<name>.service,
- listen for incoming remote connections on the port
51820 (openFirewall by default),
- manage the
netbird-<name> wireguard interface,
- use the /var/lib/netbird-/config.json configuration file,
- override /var/lib/netbird-/config.json with values from /etc/netbird-/config.d/*.json,
- (
hardened) be locally manageable by netbird-<name> system group,
With following caveats:
- multiple daemons will interfere with each other's DNS resolution of
netbird.cloud, but
should remain fully operational otherwise
|
| options/nixos/systemd.user.slices.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/systemd.user.timers.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/services.kanidm.unix.settings.hsm_pin_path | Path to a HSM pin.
|
| options/nixos/services.geth.<name>.package | The geth package to use.
|
| options/nixos/services.cgit.<name>.package | The cgit package to use.
|
| options/nixos/services.uhub.<name>.plugins | Uhub plugin configuration.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.tryFiles | Adds try_files directive.
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites.<name>.url | Start URL of the site.
|
| options/nixos/nix.registry.<name>.exact | Whether the from reference needs to match exactly
|
| options/home-manager/nix.registry.<name>.exact | Whether the from reference needs to match exactly
|
| options/darwin/nix.registry.<name>.exact | Whether the from reference needs to match exactly
|
| options/home-manager/launchd.agents.<name>.config | Define a launchd job
|
| options/nixos/systemd.slices.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.timers.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/fileSystems.<name>.encrypted.label | Label of the unlocked encrypted device
|
| options/nixos/services.stash.settings.scrapers_path | Path to scrapers
|
| options/nixos/systemd.timers.<name>.aliases | Aliases of that unit.
|
| options/nixos/systemd.slices.<name>.aliases | Aliases of that unit.
|
| options/nixos/services.quicktun.<name>.publicKey | Remote public key in hexadecimal form.
Not needed when services.quicktun..protocol is set to raw.
|
| options/nixos/services.mpd.settings | Configuration for MPD
|
| options/nixos/users.users.<name>.useDefaultShell | If true, the user's shell will be set to
users.defaultUserShell.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.apIsolate | Isolate traffic between stations (clients) and prevent them from
communicating with each other.
|
| options/nixos/services.nginx.upstreams.<name>.servers.<name>.backup | Marks the server as a backup server
|
| options/nixos/services.h2o.hosts.<name>.host | Set the host address for this virtual host
|
| options/nixos/users.users.<name>.packages | The set of packages that should be made available to the user
|
| options/darwin/users.users.<name>.packages | The set of packages that should be made availabe to the user
|
| options/nixos/services.nylon.<name>.enable | Enables nylon as a running service upon activation.
|
| options/nixos/services.autorandr.profiles.<name>.config.<name>.gamma | Output gamma configuration.
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.gamma | Output gamma configuration.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockNodeName | This optional key specifies the node to connect(2) or bind(2) to.
|
| options/nixos/security.acme.certs.<name>.group | Group running the ACME client.
|
| options/home-manager/programs.fish.binds.<name>.erase | Whether to enable remove bind.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.logLevel | Levels (minimum value for logged events):
0 = verbose debugging
1 = debugging
2 = informational messages
3 = notification
4 = warning
|
| options/nixos/systemd.targets.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.sockets.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/services.murmur.sslKey | Path to your SSL key.
|
| options/nixos/services.ttyd.indexFile | Custom index.html path
|
| options/nixos/services.llama-cpp.model | Model path.
|
| options/nixos/services.murmur.sslCa | Path to your SSL CA certificate.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockFamily | This optional key can be used to specifically request that "IPv4" or "IPv6" socket(s) be created.
|
| options/nixos/services.multipath.devices.*.no_path_retry | Specify what to do when all paths are down
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.module | Optional PKCS#11 module name.
|
| options/nixos/services.znapzend.zetup.<name>.destinations.<name>.label | Label for this destination
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockPathMode | This optional key specifies the mode of the socket
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockNodeName | This optional key specifies the node to connect(2) or bind(2) to.
|
| options/nixos/services.h2o.hosts.<name>.tls.port | Override the default TLS port for this virtual host.
|
| options/nixos/systemd.sockets.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/systemd.targets.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/home-manager/accounts.email.accounts.<name>.userName | The server username of this account
|
| options/nixos/systemd.user.slices.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.user.timers.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/home-manager/programs.bat.themes.<name>.file | Subpath of the theme file within the source, if needed.
|
| options/nixos/environment.etc.<name>.user | User name of file owner
|
| options/nixos/programs.tsmClient.servers.<name>.servername | Local name of the IBM TSM server,
must not contain space or more than 64 chars.
|
| options/nixos/services.forgejo.secrets | This is a small wrapper over systemd's LoadCredential
|
| options/nixos/boot.initrd.extraFiles.<name>.source | The object to make available inside the initrd.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| options/nixos/fileSystems.<name>.autoFormat | If the device does not currently contain a filesystem (as
determined by blkid), then automatically
format it with the filesystem type specified in
fsType
|
| options/nixos/services.openvpn.servers | Each attribute of this option defines a systemd service that
runs an OpenVPN instance
|
| options/nixos/boot.initrd.systemd.users.<name>.uid | ID of the user in initrd.
|
| options/home-manager/xdg.desktopEntries.<name>.mimeType | The MIME type(s) supported by this application.
|
| options/nixos/users.users.<name>.subGidRanges.*.startGid | Start of the range of subordinate group ids that user is
allowed to use.
|
| options/nixos/users.users.<name>.subUidRanges.*.startUid | Start of the range of subordinate user ids that user is
allowed to use.
|
| options/nixos/services.fedimintd.<name>.nginx.config.serverName | Name of this virtual host
|
| options/nixos/services.awstats.configs.<name>.domain | The domain name to collect stats for.
|
| options/nixos/services.nsd.zones.<name>.dnssec | Whether to enable DNSSEC.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| options/nixos/systemd.user.slices.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/systemd.user.timers.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/services.bitcoind.<name>.rpc.users.<name>.passwordHMAC | Password HMAC-SHA-256 for JSON-RPC connections
|
| options/nixos/services.i2pd.dataDir | Alternative path to storage of i2pd data (RI, keys, peer profiles, ...)
|
| options/nixos/services.tox-node.keysFile | Path to the file where DHT keys are stored.
|