| options/home-manager/xdg.configFile.<name>.ignorelinks | When recursive is enabled, adds -ignorelinks flag to lndir
It causes lndir to not treat symbolic links in the source directory specially
|
| options/nixos/services.slurm.nodeName | Name that SLURM uses to refer to a node (or base partition for BlueGene
systems)
|
| options/nixos/users.users.<name>.extraGroups | The user's auxiliary groups.
|
| options/nixos/services.ghostunnel.servers.<name>.key | Path to certificate private key (PEM with private key)
|
| options/nixos/services.movim.h2o.serverName | Server name to be used for this virtual host
|
| options/nixos/systemd.user.services.<name>.reloadIfChanged | Whether the service should be reloaded during a NixOS
configuration switch if its definition has changed
|
| options/nixos/services.klipper.firmwares.<name>.serial | Path to serial port this printer is connected to
|
| options/nixos/services.fedimintd.<name>.api.openFirewall | Opens port in firewall for fedimintd's api port
|
| options/nixos/services.pgbackrest.stanzas.<name>.jobs | Backups jobs to schedule for this stanza as described in:
https://pgbackrest.org/user-guide.html#quickstart/schedule-backup
|
| options/nixos/systemd.services.<name>.confinement.mode | The value full-apivfs (the default) sets up
private /dev, /proc,
/sys, /tmp and /var/tmp file systems
in a separate user name space
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.InitGroups | This optional key specifies whether initgroups(3) should be called before running the job
|
| options/darwin/launchd.agents.<name>.serviceConfig.ServiceIPC | This optional key specifies whether the job participates in advanced
communication with launchd
|
| options/nixos/security.pam.services.<name>.kwallet.forceRun | The force_run option is used to tell the PAM module for KWallet
to forcefully run even if no graphical session (such as a GUI
display manager) is detected
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockNodeName | This optional key specifies the node to connect(2) or bind(2) to.
|
| options/nixos/services.v4l2-relayd.instances.<name>.input.format | The video-format to read from input-stream.
|
| options/nixos/services.openvpn.servers.<name>.authUserPass | This option can be used to store the username / password credentials
with the "auth-user-pass" authentication method
|
| options/nixos/services.fedimintd.<name>.nginx.config.default | Makes this vhost the default.
|
| options/nixos/services.easytier.instances.<name>.extraSettings | Extra settings to add to easytier-‹name›.toml.
|
| options/home-manager/services.unison.pairs.<name>.commandOptions | Additional command line options as a dictionary to pass to the
unison program
|
| options/nixos/services.quicktun.<name>.remoteAddress | IP address or hostname of the remote end (use 0.0.0.0 for a floating/dynamic remote endpoint).
|
| options/darwin/launchd.daemons.<name>.serviceConfig.GroupName | This optional key specifies the group to run the job as
|
| options/nixos/services.rke2.autoDeployCharts.<name>.enable | Whether to enable the installation of this Helm chart
|
| options/nixos/services.mobilizon.settings.":mobilizon".":instance".name | The fallback instance name if not configured into the admin UI
|
| options/nixos/boot.loader.grub.extraFiles | A set of files to be copied to /boot
|
| options/nixos/services.wstunnel.clients.<name>.remoteToLocal | Listen on remote and forwards traffic from local
|
| options/nixos/services.firewalld.zones.<name>.sources.*.ipset | An ipset.
|
| options/nixos/services.firewalld.zones.<name>.forwardPorts | Ports to forward in the zone.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations | Declarative location config
|
| options/nixos/services.vault-agent.instances.<name>.package | The vault package to use.
|
| options/home-manager/services.podman.containers.<name>.labels | The labels to apply to the container.
|
| options/nixos/security.pam.services.<name>.ttyAudit.enablePattern | For each user matching one of comma-separated
glob patterns, enable TTY auditing
|
| options/nixos/services.openafsServer.cellServDB.*.dnsname | DNS full-qualified domain name of a database server
|
| options/nixos/services.openafsClient.cellServDB.*.dnsname | DNS full-qualified domain name of a database server
|
| options/nixos/services.firewalld.zones.<name>.forward | Whether to enable intra-zone forwarding
|
| options/nixos/services.vmalert.instances.<name>.rules | A list of the given alerting or recording rules against configured "datasource.url" compatible with
Prometheus HTTP API for vmalert to execute
|
| options/nixos/services.firewalld.services.<name>.sourcePorts.*.port | |
| options/nixos/services.nebula.networks.<name>.staticHostMap | The static host map defines a set of hosts with fixed IP addresses on the internet (or any network)
|
| options/nixos/systemd.network.networks.<name>.ipv6SendRAConfig | Each attribute in this set specifies an option in the
[IPv6SendRA] section of the unit
|
| options/nixos/services.grafana.provision.alerting.muteTimings.settings.muteTimes.*.name | Name of the mute time interval, must be unique
|
| options/nixos/security.pam.services.<name>.duoSecurity.enable | If set, use the Duo Security pam module
pam_duo for authentication
|
| options/home-manager/services.kanshi.profiles.<name>.outputs.*.criteria | The criteria can either be an output name, an output description or "*"
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.ServiceIPC | This optional key specifies whether the job participates in advanced
communication with launchd
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/users.users.<name>.cryptHomeLuks | Path to encrypted luks device that contains
the user's home directory.
|
| options/nixos/services.postfix.settings.master.<name>.wakeup | Automatically wake up the service after the specified number of
seconds
|
| options/nixos/services.caddy.virtualHosts.<name>.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.httpd.virtualHosts.<name>.robotsEntries | Specification of pages to be ignored by web crawlers
|
| options/nixos/services.ghostunnel.servers.<name>.cert | Path to certificate (PEM with certificate chain)
|
| options/nixos/services.fedimintd.<name>.p2p.openFirewall | Opens port in firewall for fedimintd's p2p port (both TCP and UDP)
|
| options/nixos/services.httpd.virtualHosts.<name>.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.nginx.virtualHosts.<name>.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/home-manager/launchd.agents.<name>.config.MachServices.<name>.HideUntilCheckIn | Reserve the name in the namespace, but cause bootstrap_look_up() to fail until the job has
checked in with launchd.
|
| options/nixos/services.jibri.xmppEnvironments.<name>.call.login.username | User part of the JID for the recorder.
|
| options/nixos/services.atalkd.interfaces.<name>.config | Optional configuration string for this interface.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.auth | All authentication providers to provision
|
| options/home-manager/programs.rclone.remotes.<name>.mounts.<name>.logLevel | Set the log-level
|
| options/nixos/services.firewalld.services.<name>.includes | Services to include for the service.
|
| options/nixos/services.fedimintd.<name>.nginx.config.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.awstats.configs.<name>.webService.urlPrefix | The URL prefix under which the awstats pages appear.
|
| options/nixos/services.kimai.sites.<name>.database.createLocally | Create the database and database user locally.
|
| options/darwin/launchd.agents.<name>.serviceConfig.LimitLoadToHosts | This configuration file only applies to the hosts listed with this key
|
| options/nixos/services.openbao.settings.listener.<name>.type | The listener type to enable.
|
| options/nixos/services.public-inbox.settings.coderepo.<name>.dir | Path to a git repository
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.hostName | Canonical hostname for the server.
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| options/nixos/services.easytier.instances.<name>.settings.hostname | Hostname shown in peer list and web console.
|
| options/nixos/services.anubis.instances.<name>.settings.METRICS_BIND | The address Anubis' metrics server listens to
|
| options/darwin/launchd.agents.<name>.serviceConfig.Program | This key maps to the first argument of execvp(3)
|
| options/nixos/services.kanata.keyboards.<name>.extraDefCfg | Configuration of defcfg other than linux-dev (generated
from the devices option) and
linux-continue-if-no-devs-found (hardcoded to be yes)
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.rsa.<name>.file | File name in the rsa folder for which this passphrase
should be used.
|
| options/nixos/services.biboumi.settings.db_name | The name of the database to use
|
| options/nixos/services.namecoind.rpc.key | Key file for securing RPC connections.
|
| options/home-manager/programs.firefox.profiles.<name>.extraConfig | Extra preferences to add to user.js.
|
| options/nixos/services.borgbackup.jobs.<name>.extraInitArgs | Additional arguments for borg init
|
| options/nixos/services.mosquitto.bridges.<name>.topics | Topic patterns to be shared between the two brokers
|
| options/nixos/services.ytdl-sub.instances.<name>.schedule | How often to run ytdl-sub
|
| options/nixos/services.firezone.server.provision.accounts.<name>.policies.<name>.resource | The resource to which access should be allowed.
|
| options/nixos/services.btrbk.instances.<name>.settings | configuration options for btrbk
|
| options/home-manager/services.pizauth.accounts.<name>.clientSecret | The OAuth2 client secret.
|
| options/nixos/systemd.network.networks.<name>.matchConfig | Each attribute in this set specifies an option in the
[Match] section of the unit
|
| options/nixos/services.anubis.instances.<name>.settings.SERVE_ROBOTS_TXT | Whether to serve a default robots.txt that denies access to common AI bots by name and all other
bots by wildcard.
|
| options/home-manager/programs.rclone.remotes.<name>.mounts.<name>.enable | Whether to enable this mount.
|
| options/nixos/services.neo4j.ssl.policies.<name>.revokedDir | Path to directory of CRLs (Certificate Revocation Lists) in
PEM format
|
| options/nixos/services.prosody.virtualHosts.<name>.ssl.extraOptions | Extra SSL configuration options.
|
| options/nixos/services.borgbackup.jobs.<name>.prune.prefix | Only consider archive names starting with this prefix for pruning
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/nixos/systemd.network.netdevs.<name>.macvlanConfig | Each attribute in this set specifies an option in the
[MACVLAN] section of the unit
|
| options/nixos/services.postfix.settings.master.<name>.chroot | Whether the service is chrooted to have only access to the
services.postfix.queueDir and the closure of
store paths specified by the program option.
|
| options/darwin/users.users.<name>.description | A short description of the user account, typically the
user's full name
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LimitLoadToHosts | This configuration file only applies to the hosts listed with this key
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Program | This key maps to the first argument of execvp(3)
|
| options/nixos/services.wordpress.sites.<name>.settings | Structural Wordpress configuration
|
| options/nixos/ec2.zfs.datasets.<name>.mount | Where to mount this dataset.
|
| options/home-manager/services.muchsync.remotes.<name>.remote.importNew | Whether to begin the synchronisation by running
notmuch new on the remote side.
|
| options/nixos/services.tahoe.nodes.<name>.client.introducer | The furl for a Tahoe introducer node
|
| options/nixos/services.netbird.clients.<name>.hardened | Hardened service:
- runs as a dedicated user with minimal set of permissions (see caveats),
- restricts daemon configuration socket access to dedicated user group
(you can grant access to it with
users.users."<user>".extraGroups = [ netbird-‹name› ]),
Even though the local system resources access is restricted:
CAP_NET_RAW, CAP_NET_ADMIN and CAP_BPF still give unlimited network manipulation possibilites,
- older kernels don't have
CAP_BPF and use CAP_SYS_ADMIN instead,
Known security features that are not (yet) integrated into the module:
- 2024-02-14:
rosenpass is an experimental feature configurable solely
through --enable-rosenpass flag on the netbird up command,
see the docs
|
| options/nixos/services.netbird.tunnels.<name>.hardened | Hardened service:
- runs as a dedicated user with minimal set of permissions (see caveats),
- restricts daemon configuration socket access to dedicated user group
(you can grant access to it with
users.users."<user>".extraGroups = [ netbird-‹name› ]),
Even though the local system resources access is restricted:
CAP_NET_RAW, CAP_NET_ADMIN and CAP_BPF still give unlimited network manipulation possibilites,
- older kernels don't have
CAP_BPF and use CAP_SYS_ADMIN instead,
Known security features that are not (yet) integrated into the module:
- 2024-02-14:
rosenpass is an experimental feature configurable solely
through --enable-rosenpass flag on the netbird up command,
see the docs
|
| options/nixos/services.httpd.virtualHosts.<name>.locations | Declarative location config
|
| options/nixos/services.tinc.networks.<name>.interfaceType | The type of virtual interface used for the network connection.
|