| options/nixos/services.nextjs-ollama-llm-ui.enable | Whether to enable Simple Ollama web UI service; an easy to use web frontend for a Ollama backend service
|
| options/nixos/services.postgresql.enableTCPIP | Whether PostgreSQL should listen on all network interfaces
|
| options/nixos/services.nominatim.database.host | Host of the postgresql server
|
| options/darwin/services.postgresql.enableTCPIP | Whether PostgreSQL should listen on all network interfaces
|
| options/nixos/hardware.i2c.enable | Whether to enable i2c devices support
|
| options/nixos/networking.dhcpcd.setHostname | Whether to set the machine hostname based on the information
received from the DHCP server.
The hostname will be changed only if the current one is
the empty string, localhost or nixos
|
| options/nixos/services.languagetool.public | Whether to enable access from anywhere (rather than just localhost).
|
| options/nixos/services.pgbackrest.repos | An attribute set of repositories as described in:
https://pgbackrest.org/configuration.html#section-repository
Each repository defaults to set repo-host to the attribute's name
|
| options/nixos/services.ipp-usb.enable | Whether to enable ipp-usb, a daemon to turn an USB printer/scanner supporting IPP everywhere (aka AirPrint, WSD, AirScan) into a locally accessible network printer/scanner.
|
| options/nixos/services.lokinet.useLocally | Whether to use Lokinet locally.
|
| options/nixos/services.nominatim.database.superUser | Postgresql database superuser used to create Nominatim database and
import data
|
| options/nixos/services.davis.database.name | Database name, only used when the databse is created locally.
|
| options/nixos/services.jitsi-meet.prosody.lockdown | Whether to disable Prosody features not needed by Jitsi Meet
|
| options/nixos/services.roundcube.database.username | Username for the postgresql connection
|
| options/nixos/services.meilisearch.listenAddress | The IP address that Meilisearch will listen on
|
| options/nixos/services.avahi.publish.domain | Whether to announce the locally used domain name for browsing by other hosts.
|
| options/nixos/services.homepage-dashboard.allowedHosts | Hosts that homepage-dashboard will be running under
|
| options/nixos/services.kanidm.provision.acceptInvalidCerts | Whether to allow invalid certificates when provisioning the target instance
|
| options/nixos/services.canaille.settings.CANAILLE.SMTP | SMTP configuration
|
| options/nixos/services.reposilite.settings.hostname | The hostname to bind to
|
| options/nixos/services.keter.globalKeterConfig.listeners | You want that ip-from-header in
the nginx setup case
|
| options/nixos/services.postfixadmin.database.host | Host of the postgresql server
|
| options/nixos/services.varnish.listen.*.address | If given an IP address, it can be a host name ("localhost"), an IPv4 dotted-quad
("127.0.0.1") or an IPv6 address enclosed in square brackets ("[::1]").
(VCL4.1 and higher) If given an absolute Path ("/path/to/listen.sock") or "@"
followed by the name of an abstract socket ("@myvarnishd") accept connections
on a Unix domain socket
|
| options/nixos/services.ghostunnel.servers.<name>.unsafeTarget | If set, does not limit target to localhost, 127.0.0.1, [::1], or UNIX sockets
|
| options/nixos/services.firezone.server.api.port | The port under which the api will be served locally
|
| options/nixos/services.prosody.modules.admin_telnet | Opens telnet console interface on localhost port 5582
|
| options/nixos/services.firezone.server.web.port | The port under which the web interface will be served locally
|
| options/nixos/services.matrix-tuwunel.settings.global.address | Addresses (IPv4 or IPv6) to listen on for connections by the reverse proxy/tls terminator
|
| options/darwin/security.sandbox.profiles.<name>.allowLocalNetworking | Whether to allow localhost network access inside the sandbox.
|
| options/home-manager/targets.darwin.defaults.NSGlobalDomain.AppleLocale | Configures the user locale.
|
| options/nixos/services.roundcube.database.passwordFile | Password file for the postgresql connection
|
| options/nixos/services.nebula.networks.<name>.lighthouse.dns.host | IP address on which nebula lighthouse should serve DNS.
'localhost' is a good default to ensure the service does not listen on public interfaces;
use a Nebula address like 10.0.0.5 to make DNS resolution available to nebula hosts only.
|
| options/nixos/services.stalwart.settings | Configuration options for the Stalwart server
|
| options/nixos/services.changedetection-io.chromePort | A free port on which webDriverSupport or playwrightSupport listen on localhost.
|
| options/nixos/services.ncdns.identity.address | The IP address the hostname specified in
services.ncdns.identity.hostname should resolve to
|
| options/nixos/services.tt-rss.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.postfixadmin.database.username | Username for the postgresql connection
|
| options/nixos/services.send.redis.passwordFile | The path to the file containing the Redis password
|
| options/nixos/services.pgbackrest.stanzas.<name>.instances | An attribute set of database instances as described in:
https://pgbackrest.org/configuration.html#section-stanza
Each instance defaults to set pg-host to the attribute's name
|
| options/nixos/services.wordpress.sites.<name>.fontsDir | This directory is used to download fonts from a remote location, e.g.
to host google fonts locally.
|
| options/nixos/services.stalwart-mail.settings | Configuration options for the Stalwart email server
|
| options/nixos/services.coder.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.davis.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.atuin.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.lldap.database.createLocally | Create the database and database user locally.
|
| options/nixos/boot.kernel.randstructSeed | Provides a custom seed for the RANDSTRUCT security
option of the Linux kernel
|
| options/nixos/services.snipe-it.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.monica.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.moodle.database.createLocally | Create the database and database user locally.
|
| options/nixos/boot.binfmt.addEmulatedSystemsToNixSandbox | Whether to add the boot.binfmt.emulatedSystems to nix.settings.extra-platforms
|
| options/nixos/services.mailcatcher.enable | Whether to enable MailCatcher, an SMTP server and web interface to locally test outbound emails.
|
| options/nixos/services.oncall.database.createLocally | Whether to enable Create the database and database user locally..
|
| options/nixos/services.postfix.destination | Full (!) list of domains we deliver locally
|
| options/nixos/services.redmine.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.prometheus.alertmanager.listenAddress | Address to listen on for the web interface and API
|
| options/nixos/services.nullmailer.config.defaultdomain | The content of this attribute is appended to any host name that
does not contain a period (except localhost), including defaulthost
and idhost
|
| options/darwin/services.offlineimap.runQuick | Run only quick synchronizations
|
| options/nixos/services.akkoma.initDb.enable | Whether to automatically initialise the database on startup
|
| options/nixos/services.gitlab-runner.services.<name>.buildsDir | Absolute path to a directory where builds will be stored
in context of selected executor (Locally, Docker, SSH).
|
| options/darwin/services.gitlab-runner.services.<name>.buildsDir | Absolute path to a directory where builds will be stored
in context of selected executor (Locally, Docker, SSH).
|
| options/nixos/services.matrix-continuwuity.settings.global.address | Addresses (IPv4 or IPv6) to listen on for connections by the reverse proxy/tls terminator
|
| options/nixos/services.kimai.sites.<name>.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.castopod.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.agorakit.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.dolibarr.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.cloudlog.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.misskey.database.createLocally | Create the PostgreSQL database locally
|
| options/nixos/services.zoneminder.enable | Whether to enable ZoneMinder
|
| options/nixos/services.tailscale.derper.verifyClients | Whether to verify clients against a locally running tailscale daemon if they are allowed to connect to this node or not.
|
| options/nixos/services.ncdns.identity.hostmaster | An email address for the SOA record at the bit zone
|
| options/nixos/services.listmonk.database.createLocally | Create the PostgreSQL database and database user locally.
|
| options/nixos/services.drupal.sites.<name>.database.createLocally | Create the database and database user locally.
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.unsafeTarget | If set, does not limit target to localhost, 127.0.0.1, [::1], or UNIX sockets
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.enableLocalhostRedirects | Allow localhost redirects
|
| options/nixos/services.anuko-time-tracker.database.createLocally | Create the database and database user locally.
|
| options/nixos/networking.wlanInterfaces.<name>.mac | MAC address to use for the device
|
| options/nixos/services.bookstack.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.nextcloud.database.createLocally | Whether to create the database and database user locally.
|
| options/nixos/services.nextcloud-spreed-signaling.settings.stats.allowed_ips | List of IP addresses that are allowed to access the debug, stats and metrics endpoints
|
| options/nixos/services.flarum.createDatabaseLocally | Create the database and database user locally, and run installation
|
| options/nixos/services.ncdns.identity.hostname | The hostname of this ncdns instance, which defaults to the machine
hostname
|
| options/nixos/services.transmission.webHome | If not null, sets the value of the TRANSMISSION_WEB_HOME
environment variable used by the service
|
| options/nixos/services.mediawiki.database.createLocally | Create the database and database user locally
|
| options/nixos/services.zoneminder.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.filesender.database.createLocally | Create the PostgreSQL database and database user locally.
|
| options/nixos/services.wstunnel.clients.<name>.httpProxy | Proxy to use to connect to the wstunnel server (USER:PASS@HOST:PORT).
Passwords specified here will be world-readable in the Nix store!
To pass a password to the service, point the environmentFile option
to a file containing PROXY_PASSWORD=<your-password-here> and set
this option to <user>:$PROXY_PASSWORD@<host>:<port>
|
| options/nixos/services.wordpress.sites.<name>.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.limesurvey.database.createLocally | Create the database and database user locally
|
| options/nixos/services.rustus.storage.dir_structure | pattern of a directory structure locally and on s3
|
| options/nixos/services.writefreely.database.createLocally | When services.writefreely.database.type is set to
"mysql", this option will enable the MySQL service locally.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.bssid | Specifies the BSSID for this BSS
|
| options/nixos/services.sabnzbd.settings.servers.<name>.ssl_verify | Level of TLS verification
|
| options/nixos/services.wstunnel.clients.<name>.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.wstunnel.servers.<name>.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.resolved.dnssec | If set to
"true":
all DNS lookups are DNSSEC-validated locally (excluding
LLMNR and Multicast DNS)
|
| options/nixos/services.invoiceplane.sites.<name>.database.createLocally | Create the database and database user locally.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.ports | Network ports to publish from the container to the outer host
|
| options/nixos/services.crowdsec-firewall-bouncer.registerBouncer.enable | Whether to automatically register the bouncer to the locally running
crowdsec service
|
| options/nixos/services.netbird.clients | Attribute set of NetBird client daemons, by default each one will:
- be manageable using dedicated tooling:
netbird-<name> script,
NetBird - netbird-<name> graphical interface when appropriate (see ui.enable),
- run as a
netbird-<name>.service,
- listen for incoming remote connections on the port
51820 (openFirewall by default),
- manage the
netbird-<name> wireguard interface,
- use the /var/lib/netbird-/config.json configuration file,
- override /var/lib/netbird-/config.json with values from /etc/netbird-/config.d/*.json,
- (
hardened) be locally manageable by netbird-<name> system group,
With following caveats:
- multiple daemons will interfere with each other's DNS resolution of
netbird.cloud, but
should remain fully operational otherwise
|
| options/nixos/services.tabby.model | Specify the model that tabby will use to generate completions
|