| options/nixos/services.k3s.autoDeployCharts.<name>.version | The version of the Helm chart
|
| options/nixos/services.wstunnel.clients.<name>.soMark | Mark network packets with the SO_MARK sockoption with the specified value
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.sendBufferSize | If given, sets the SO_SNDBUF option on the TCP socket to the given number of bytes
|
| options/nixos/services.redis.servers.<name>.requirePass | Password for database (STORED PLAIN TEXT, WORLD-READABLE IN NIX STORE)
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.sendBufferSize | If given, sets the SO_SNDBUF option on the TCP socket to the given number of bytes
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.recvBufferSize | If given, sets the SO_RCVBUF option on the TCP socket to the given number of bytes
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.recvBufferSize | If given, sets the SO_RCVBUF option on the TCP socket to the given number of bytes
|
| options/home-manager/services.xsuspender.defaults.autoSuspendOnBattery | Whether to auto-apply rules when switching to battery
power even if the window(s) didn't just lose focus.
|
| options/nixos/services.prometheus.exporters.redis.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.redis.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.fritz.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.fritz.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.idrac.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.idrac.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.dmarc.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.dmarc.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.v2ray.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.v2ray.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.kafka.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.kafka.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.jitsi.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.jitsi.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.nginx.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.nginx.openFirewall is true.
|
| options/nixos/services.kmonad.keyboards.<name>.config | Keyboard configuration.
|
| options/nixos/services.opkssh.providers.<name>.issuer | Issuer URI
|
| options/nixos/services.fedimintd.<name>.package | The fedimint package to use.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.http2 | Whether to enable HTTP 2
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.gamma | Output gamma configuration.
|
| options/nixos/services.tor.relay.onionServices.<name>.version | See torrc manual.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockPathMode | This optional key specifies the mode of the socket
|
| options/nixos/services.prometheus.exporters.fritz.settings.devices.*.name | Name to use for the device.
|
| options/nixos/security.pam.services.<name>.sssdStrictAccess | enforce sssd access control
|
| options/nixos/services.tinc.networks.<name>.rsaPrivateKeyFile | Path of the private RSA keyfile.
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.openFirewall | Open the appropriate ports in the firewall.
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.openFirewall | Open the appropriate ports in the firewall.
|
| options/nixos/services.public-inbox.inboxes.<name>.address | The email addresses of the public-inbox.
|
| options/home-manager/services.podman.containers.<name>.ip4 | Set an IPv4 address for the container.
|
| options/home-manager/services.podman.containers.<name>.ip6 | Set an IPv6 address for the container.
|
| options/nixos/systemd.targets.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.sockets.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/services.netbird.tunnels.<name>.login.setupKeyFile | A Setup Key file path used for automated login of the machine.
|
| options/nixos/services.netbird.clients.<name>.login.setupKeyFile | A Setup Key file path used for automated login of the machine.
|
| options/nixos/services.nbd.server.exports.<name>.extraOptions | Extra options for this export
|
| options/nixos/services.rke2.manifests.<name>.source | Path of the source .yaml file.
|
| options/nixos/services.rke2.manifests.<name>.enable | Whether this manifest file should be generated.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.extraFiles.<name>.text | Text of the file.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.hotkeys.<name>.*.key | The hotkey.
|
| options/nixos/services.geth.<name>.authrpc.jwtsecret | Path to a JWT secret for authenticated RPC endpoint.
|
| options/nixos/services.geth.<name>.websocket.address | Listen address of Go Ethereum WebSocket API.
|
| options/nixos/services.borgbackup.jobs.<name>.postInit | Shell commands to run after borg init.
|
| options/nixos/services.wstunnel.servers.<name>.autoStart | Whether to enable starting this wstunnel instance automatically.
|
| options/nixos/services.wstunnel.clients.<name>.autoStart | Whether to enable starting this wstunnel instance automatically.
|
| options/nixos/services.borgbackup.repos.<name>.path | Where to store the backups
|
| options/nixos/security.pam.services.<name>.logFailures | Whether to log authentication failures in /var/log/faillog.
|
| options/nixos/services.tinc.networks.<name>.settings | Configuration of the Tinc daemon for this network
|
| options/nixos/services.github-runners.<name>.url | Repository to add the runner to
|
| options/darwin/services.github-runners.<name>.url | Repository to add the runner to
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockFamily | This optional key can be used to specifically request that "IPv4" or "IPv6" socket(s) be created.
|
| options/nixos/security.acme.certs.<name>.keyType | Key type to use for private keys
|
| options/nixos/services.borgbackup.jobs.<name>.preHook | Shell commands to run before the backup
|
| options/nixos/services.wstunnel.clients.<name>.addNetBind | Whether to enable Whether add CAP_NET_BIND_SERVICE to the tunnel service, this should be enabled if you want to bind port < 1024.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.user | Specifies the user to log in as.
|
| options/nixos/services.awstats.configs.<name>.logFormat | The log format being used
|
| options/nixos/services.znapzend.zetup.<name>.presnap | Command to run before snapshots are taken on the source dataset,
e.g. for database locking/flushing
|
| options/nixos/services.buildkite-agents.<name>.dataDir | The workdir for the agent
|
| options/darwin/services.buildkite-agents.<name>.dataDir | The workdir for the agent
|
| options/nixos/services.znc.confOptions.networks.<name>.server | IRC server address.
|
| options/nixos/hardware.digitalbitbox.enable | Enables udev rules for Digital Bitbox devices.
|
| options/nixos/services.rspamd.overrides.<name>.source | Path of the source file.
|
| options/nixos/services.sanoid.templates.<name>.hourly | Number of hourly snapshots.
|
| options/nixos/services.sanoid.templates.<name>.yearly | Number of yearly snapshots.
|
| options/nixos/services.davis.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.slskd.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.movim.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.firewalld.services.<name>.ports | Ports of the service.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.servedDirs | This option provides a simple way to serve static directories.
|
| options/home-manager/services.restic.backups.<name>.pruneOpts | A list of policy options for 'restic forget --prune', to automatically
prune old snapshots
|
| options/nixos/users.extraUsers.<name>.subUidRanges | Subordinate user ids that user is allowed to use
|
| options/nixos/users.extraUsers.<name>.subGidRanges | Subordinate group ids that user is allowed to use
|
| options/nixos/services.drupal.sites.<name>.virtualHost.logFormat | Log format for Apache's log files
|
| options/nixos/services.httpd.virtualHosts.<name>.sslServerChain | Path to server SSL chain file.
|
| options/nixos/services.tarsnap.archives.<name>.maxbwRateUp | Upload bandwidth rate limit in bytes.
|
| options/home-manager/services.colima.profiles.<name>.isService | Whether this profile will run as a service.
|
| options/nixos/services.prometheus.exporters.rtl_433.channels.*.name | Name to match.
|
| options/home-manager/services.podman.volumes.<name>.extraPodmanArgs | Extra arguments to pass to the podman volume create command.
|
| options/nixos/systemd.user.services.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/systemd.user.sockets.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/systemd.user.paths.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/systemd.user.targets.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/home-manager/xdg.desktopEntries.<name>.mimeType | The MIME type(s) supported by this application.
|
| options/nixos/services.gitlab-runner.services.<name>.cloneUrl | Overwrite the URL for the GitLab instance
|
| options/darwin/services.gitlab-runner.services.<name>.cloneUrl | Overwrite the URL for the GitLab instance
|
| options/nixos/services.caddy.virtualHosts.<name>.extraConfig | Additional lines of configuration appended to this virtual host in the
automatically generated Caddyfile.
|
| options/nixos/systemd.paths.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/systemd.paths.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.user.timers.<name>.aliases | Aliases of that unit.
|
| options/nixos/systemd.user.slices.<name>.aliases | Aliases of that unit.
|
| options/nixos/services.nginx.proxyCachePath.<name>.inactive | Cached data that has not been accessed for the time specified by
the inactive parameter is removed from the cache, regardless of
its freshness.
|
| options/nixos/services.nginx.virtualHosts.<name>.http2 | Whether to enable the HTTP/2 protocol
|
| options/nixos/services.netbird.clients.<name>.autoStart | Start the service with the system
|
| options/nixos/services.netbird.tunnels.<name>.autoStart | Start the service with the system
|
| options/nixos/services.openvpn.servers.<name>.config | Configuration of this OpenVPN instance
|
| options/nixos/services.postgresql.systemCallFilter.<name>.enable | Whether to enable ‹name› in postgresql's syscall filter.
|
| options/nixos/services.restic.backups.<name>.timerConfig | When to run the backup
|
| options/nixos/services.homebridge.settings.accessories.*.name | Name of the accessory
|
| options/nixos/services.firewalld.zones.<name>.version | Version of the zone.
|