| options/nixos/services.bitcoind.<name>.testnet | Whether to use the testnet instead of mainnet.
|
| options/nixos/services.inadyn.settings.custom.<name>.ssl | Whether to use HTTPS for this DDNS provider.
|
| options/nixos/services.rss2email.feeds.<name>.to | Email address to which to send feed items
|
| options/nixos/boot.initrd.luks.devices.<name>.device | Path of the underlying encrypted block device.
|
| options/home-manager/services.podman.machines.<name>.diskSize | Disk size in GB for the machine
|
| options/nixos/services.znapzend.zetup.<name>.destinations.<name>.plan | The znapzend backup plan to use for the source
|
| options/darwin/launchd.agents.<name>.serviceConfig.Umask | This optional key specifies what value should be passed to umask(2) before running the job
|
| options/nixos/services.sanoid.datasets.<name>.yearly | Number of yearly snapshots.
|
| options/nixos/services.sympa.settingsFile.<name>.source | Path of the source file.
|
| options/nixos/services.sanoid.datasets.<name>.hourly | Number of hourly snapshots.
|
| options/nixos/services.frp.instances.<name>.role | The frp consists of client and server
|
| options/nixos/programs.tsmClient.servers.<name>.servername | Local name of the IBM TSM server,
must not contain space or more than 64 chars.
|
| options/home-manager/xdg.desktopEntries.<name>.mimeType | The MIME type(s) supported by this application.
|
| options/nixos/services.dokuwiki.sites.<name>.acl | Access Control Lists: see https://www.dokuwiki.org/acl
Mutually exclusive with services.dokuwiki.aclFile
Set this to a value other than null to take precedence over aclFile option
|
| options/nixos/services.nginx.virtualHosts.<name>.kTLS | Whether to enable kTLS support
|
| options/darwin/environment.userLaunchAgents.<name>.target | Name of symlink
|
| options/nixos/fileSystems.<name>.encrypted.label | Label of the unlocked encrypted device
|
| options/nixos/services.metricbeat.modules.<name>.module | The name of the module
|
| options/nixos/services.nginx.virtualHosts.<name>.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.drupal.sites.<name>.privateFilesDir | The location of the Drupal private files directory.
|
| options/nixos/services.openvpn.servers.<name>.autoStart | Whether this OpenVPN instance should be started automatically.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Umask | This optional key specifies what value should be passed to umask(2) before running the job
|
| options/home-manager/systemd.user.services.<name>.Service.ExecStart | Command that is executed when this service is started.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.user | Specifies the user to log in as.
|
| options/nixos/systemd.paths.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/systemd.paths.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/home-manager/fonts.fontconfig.configFile.<name>.label | Label to use for the name of the config file.
|
| options/nixos/users.extraUsers.<name>.subUidRanges | Subordinate user ids that user is allowed to use
|
| options/nixos/users.extraUsers.<name>.subGidRanges | Subordinate group ids that user is allowed to use
|
| options/nixos/services.nghttpx.backends.*.params.dns | Name resolution of a backends host name is done at start up,
or configuration reload
|
| options/nixos/services.opensearch.settings."cluster.name" | The name of the cluster.
|
| options/nixos/services.public-inbox.inboxes.<name>.watch | Paths for public-inbox-watch(1) to monitor for new mail.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.groups.<name>.members | The members of this group
|
| options/home-manager/services.pizauth.accounts.<name>.authUri | The OAuth2 server's authentication URI.
|
| options/nixos/services.fedimintd.<name>.enable | Whether to enable fedimintd.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.restic.backups.<name>.paths | Which paths to backup, in addition to ones specified via
dynamicFilesFrom
|
| options/nixos/security.acme.certs.<name>.keyType | Key type to use for private keys
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Debug | This optional key specifies that launchd should adjust its log mask temporarily to LOG_DEBUG while
dealing with this job.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.preferShortUsername | Use 'name' instead of 'spn' in the preferred_username claim
|
| options/home-manager/services.activitywatch.watchers.<name>.settingsFilename | The filename of the generated settings file
|
| options/nixos/systemd.user.timers.<name>.aliases | Aliases of that unit.
|
| options/nixos/systemd.user.slices.<name>.aliases | Aliases of that unit.
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.threads | Sets the number of worker threads to use
|
| options/nixos/systemd.user.sockets.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/systemd.user.paths.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/systemd.user.targets.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/darwin/launchd.agents.<name>.serviceConfig.ExitTimeOut | The amount of time launchd waits before sending a SIGKILL signal
|
| options/nixos/services.neo4j.ssl.policies.<name>.trustAll | Makes this policy trust all remote parties
|
| options/darwin/environment.launchDaemons.<name>.target | Name of symlink
|
| options/nixos/services.reposilite.settings.hostname | The hostname to bind to
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.enso.cursorTheme.name | Name of the cursor theme to use for the lightdm-enso-os-greeter
|
| options/nixos/services.dokuwiki.sites.<name>.package | The dokuwiki package to use.
|
| options/home-manager/services.restic.backups.<name>.ssh-package | The openssh package to use.
|
| options/nixos/services.znapzend.zetup.<name>.dataset | The dataset to use for this source.
|
| options/nixos/systemd.user.services.<name>.serviceConfig | Each attribute in this set specifies an option in the
[Service] section of the unit
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.ExitTimeOut | The amount of time launchd waits before sending a SIGKILL signal
|
| options/nixos/services.grafana.provision.alerting.rules.settings.groups.*.name | Name of the rule group
|
| options/nixos/systemd.user.services.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/services.graylog.rootUsername | Name of the default administrator user
|
| options/nixos/security.pam.services.<name>.usshAuth | If set, users with an SSH certificate containing an authorized principal
in their SSH agent are able to log in
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.enableLocalhostRedirects | Allow localhost redirects
|
| options/darwin/launchd.daemons.<name>.serviceConfig.RunAtLoad | This optional key is used to control whether your job is launched once at the time the job is loaded
|
| options/home-manager/services.podman.machines.<name>.autoStart | Whether to automatically start this machine on login.
|
| options/nixos/environment.etc.<name>.user | User name of file owner
|
| options/nixos/services.znapzend.zetup.<name>.sendDelay | Specify delay (in seconds) before sending snaps to the destination
|
| options/nixos/networking.vlans.<name>.id | The vlan identifier
|
| options/nixos/systemd.paths.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/systemd.paths.<name>.pathConfig | Each attribute in this set specifies an option in the
[Path] section of the unit
|
| options/nixos/services.kimai.sites.<name>.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/security.pam.services.<name>.howdy.control | This option sets the PAM "control" used for this module.
|
| options/nixos/services.sourcehut.settings."builds.sr.ht::worker".name | Listening address and listening port
of the build runner (with HTTP port if not 80).
|
| options/nixos/services.httpd.virtualHosts.<name>.listen.*.ssl | Whether to enable SSL (https) support.
|
| options/nixos/services.restic.backups.<name>.exclude | Patterns to exclude when backing up
|
| options/darwin/services.gitlab-runner.services.<name>.tagList | Tag list.
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SecureSocketWithKey | This optional key is a variant of SockPathName
|
| options/nixos/security.acme.certs.<name>.postRun | Commands to run after new certificates go live
|
| options/darwin/launchd.agents.<name>.serviceConfig.WatchPaths | This optional key causes the job to be started if any one of the listed paths are modified.
|
| options/nixos/networking.sits.<name>.dev | The underlying network device on which the tunnel resides.
|
| options/darwin/launchd.agents.<name>.command | Command executed as the service's main process.
|
| options/nixos/services.nsd.zones.<name>.allowAXFRFallback | If NSD as secondary server should be allowed to AXFR if the primary
server does not allow IXFR.
|
| options/nixos/hardware.alsa.cardAliases.<name>.id | The ID of the sound card
|
| options/nixos/services.httpd.virtualHosts.<name>.listen.*.port | Port to listen on
|
| options/nixos/services.borgbackup.jobs.<name>.repo | Remote or local repository to back up to.
|
| options/nixos/services.iodine.clients.<name>.extraConfig | Additional command line parameters
|
| options/nixos/services.nginx.virtualHosts.<name>.listen.*.addr | Listen address.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.UserName | This optional key specifies the user to run the job as
|
| options/home-manager/launchd.agents.<name>.config.Label | This required key uniquely identifies the job to launchd.
|
| options/nixos/users.extraGroups.<name>.members | The user names of the group members, added to the
/etc/group file.
|
| options/nixos/systemd.slices.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.timers.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/services.geth.<name>.websocket.enable | Whether to enable Go Ethereum WebSocket API.
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.recvTimeout | An application timeout on receiving data from the TCP socket.
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.recvTimeout | An application timeout on receiving data from the TCP socket.
|
| options/home-manager/services.podman.builds.<name>.extraPodmanArgs | Extra arguments to pass to the podman build command.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.WatchPaths | This optional key causes the job to be started if any one of the listed paths are modified.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.MulticastGroup | This optional key can be used to request that the datagram socket join a multicast group
|
| options/nixos/security.pam.services.<name>.ttyAudit.openOnly | Set the TTY audit flag when opening the session,
but do not restore it when closing the session
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.zsk.prePublish | How long in advance to publish new keys
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.ksk.prePublish | How long in advance to publish new keys
|