| options/nixos/systemd.user.timers.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.user.slices.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.targets.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/systemd.sockets.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.gtk.theme.name | Name of the theme to use for the lightdm-gtk-greeter.
|
| options/nixos/security.pam.services.<name>.p11Auth | If set, keys listed in
~/.ssh/authorized_keys and
~/.eid/authorized_certificates
can be used to log in with the associated PKCS#11 tokens.
|
| options/nixos/services.ndppd.proxies.<name>.rules | This is a rule that the target address is to match against
|
| options/home-manager/launchd.agents.<name>.config.GroupName | This optional key specifies the group to run the job as
|
| options/nixos/services.mobilizon.settings.":mobilizon".":instance".name | The fallback instance name if not configured into the admin UI
|
| options/nixos/security.pam.services.<name>.limits.*.item | Item this limit applies to
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.packages | List of ‹name› add-on packages to install for this profile
|
| options/nixos/services.h2o.hosts.<name>.settings | Attrset to be transformed into YAML for host config
|
| options/nixos/security.pam.services.<name>.mysqlAuth | If set, the pam_mysql module will be used to
authenticate users against a MySQL/MariaDB database.
|
| options/nixos/services.multipath.devices.*.features | Specify any device-mapper features to be used
|
| options/nixos/services.multipath.devices.*.revision | Regular expression to match the product revision
|
| options/nixos/security.acme.certs.<name>.directory | Directory where certificate and other state is stored.
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.forward | The IP and port to forward all traffic to.
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.forward | The IP and port to forward all traffic to.
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.nodelay | Enables TCP_NODELAY on the TCP socket.
|
| options/nixos/services.nsd.zones.<name>.rrlWhitelist | Whitelists the given rrl-types.
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.nodelay | Enables TCP_NODELAY on the TCP socket.
|
| options/nixos/services.prometheus.exporters.rtl_433.channels.*.name | Name to match.
|
| options/nixos/services.homebridge.settings.accessories.*.name | Name of the accessory
|
| options/nixos/environment.etc.<name>.enable | Whether this /etc file should be generated
|
| options/nixos/networking.greTunnels.<name>.type | Whether the tunnel routes layer 2 (tap) or layer 3 (tun) traffic.
|
| options/nixos/boot.initrd.luks.devices.<name>.keyFileTimeout | The amount of time in seconds for a keyFile to appear before
timing out and trying passwords.
|
| options/nixos/services.jupyterhub.kernels.<name>.displayName | Name that will be shown to the user.
|
| options/nixos/services.kimai.sites.<name>.database.user | Database user.
|
| options/nixos/services.prosody.virtualHosts.<name>.ssl | Paths to SSL files
|
| options/nixos/services.nebula.networks.<name>.isRelay | Whether this node is a relay.
|
| options/nixos/services.logcheck.ignoreCron.<name>.user | User that runs the cronjob.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.preferShortUsername | Use 'name' instead of 'spn' in the preferred_username claim
|
| options/nixos/networking.interfaces.<name>.useDHCP | Whether this interface should be configured with DHCP
|
| options/nixos/services.firezone.server.provision.accounts.<name>.groups.<name>.members | The members of this group
|
| options/home-manager/accounts.contact.accounts.<name>.local.encoding | File encoding for items, both content and file name
|
| options/nixos/security.dhparams.params.<name>.bits | The bit size for the prime that is used during a Diffie-Hellman
key exchange.
|
| options/home-manager/services.podman.machines.<name>.swap | Swap size in MB for the machine
|
| options/home-manager/services.podman.machines.<name>.cpus | Number of CPUs to allocate to the machine
|
| options/nixos/systemd.user.services.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.user.services.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.postfix.masterConfig.<name>.type | The type of the service
|
| options/nixos/services.honk.servername | The server name.
|
| options/nixos/services.tor.relay.onionServices | See torrc manual.
Because tor.service runs in its own RootDirectory=,
when using a onion service to reverse-proxy to a Unix socket,
you need to make that Unix socket available
within the mount namespace of tor.service
|
| options/nixos/services.pingvin-share.dataDir | The path to the data directory in which Pingvin Share will store its data.
|
| options/nixos/services.knot.enableXDP | Extends the systemd unit with permissions to allow for the use of
the eXpress Data Path (XDP).
Make sure to read up on functional limitations
when running in XDP mode.
|
| options/nixos/services.conman.configFile | The absolute path to the configuration file
|
| options/nixos/services.jenkinsSlave.home | The path to use as JENKINS_HOME
|
| options/nixos/services.gns3-server.ssl.certFile | Path to the SSL certificate file
|
| options/nixos/services.atalkd.configFile | Optional path to a custom atalkd.conf file
|
| options/nixos/services.snmpd.configFile | Path to the snmpd.conf file
|
| options/nixos/services.nipap.nipap-www.unixSocket | Path to UNIX socket to bind to.
|
| options/home-manager/programs.vivid.themes | An attribute set of vivid themes
|
| options/nixos/services.k3s.agentTokenFile | File path containing the k3s token agents can use to connect to the server
|
| options/nixos/services.opensearch.settings."cluster.name" | The name of the cluster.
|
| options/nixos/services.drupal.sites.<name>.virtualHost | Apache configuration can be done by adapting services.httpd.virtualHosts.
|
| options/home-manager/services.restic.backups.<name>.checkOpts | A list of options for 'restic check'
|
| options/nixos/systemd.user.slices.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/systemd.user.timers.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/services.buildkite-agents.<name>.tags | Tags for the agent.
|
| options/nixos/services.quicktun.<name>.protocol | Which protocol to use.
|
| options/darwin/services.buildkite-agents.<name>.tags | Tags for the agent.
|
| options/home-manager/xdg.dataFile.<name>.recursive | If the file source is a directory, then this option
determines whether the directory should be recursively
linked to the target location
|
| options/nixos/systemd.network.networks.<name>.vrf | A list of vrf interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.network.networks.<name>.dns | A list of dns servers to be added to the network section of the
unit
|
| options/nixos/systemd.network.networks.<name>.ntp | A list of ntp servers to be added to the network section of the
unit
|
| options/nixos/security.acme.certs.<name>.webroot | Where the webroot of the HTTP vhost is located.
.well-known/acme-challenge/ directory
will be created below the webroot if it doesn't exist.
http://example.org/.well-known/acme-challenge/ must also
be available (notice unencrypted HTTP).
|
| options/home-manager/programs.neovim.extraName | Extra name appended to the wrapper package name.
|
| options/nixos/services.anubis.instances | An attribute set of Anubis instances
|
| options/nixos/networking.greTunnels.<name>.local | The address of the local endpoint which the remote
side should send packets to.
|
| options/nixos/security.pam.services.<name>.updateWtmp | Whether to update /var/log/wtmp.
|
| options/nixos/services.bird-lg.frontend.nameFilter | Protocol names to hide in summary tables (RE2 syntax),
|
| options/nixos/services.nylon.<name>.bindInterface | Tell nylon which interface to use as an uplink, default is "enp3s0f0".
|
| options/darwin/launchd.agents.<name>.serviceConfig.Label | This required key uniquely identifies the job to launchd.
|
| options/nixos/services.nginx.virtualHosts.<name>.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.riemann.extraClasspathEntries | Extra entries added to the Java classpath when running Riemann.
|
| options/nixos/security.pam.services.<name>.enableUMask | If enabled, the pam_umask module will be loaded.
|
| options/nixos/services.acpid.handlers.<name>.action | Shell commands to execute when the event is triggered.
|
| options/nixos/services.logcheck.ignore.<name>.regex | Regex specifying which log lines to ignore.
|
| options/home-manager/services.restic.backups.<name>.runCheck | Whether to run 'restic check' with the provided checkOpts options
|
| options/nixos/systemd.sockets.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.targets.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/services.k3s.autoDeployCharts.<name>.repo | The repo of the Helm chart
|
| options/nixos/services.ax25.axports.<name>.callsign | The callsign of the physical interface to bind to.
|
| options/nixos/services.kimai.sites.<name>.database.host | Database host address.
|
| options/nixos/services.kimai.sites.<name>.database.port | Database host port.
|
| options/nixos/services.netbird.tunnels.<name>.logLevel | Log level of the NetBird daemon.
|
| options/nixos/services.netbird.clients.<name>.logLevel | Log level of the NetBird daemon.
|
| options/nixos/services.uhub.<name>.plugins.*.settings | Settings specific to this plugin.
|
| options/nixos/fileSystems.<name>.encrypted.enable | The block device is backed by an encrypted one, adds this device as a initrd luks entry.
|
| options/home-manager/programs.i3status-rust.bars.<name>.icons | The icons set to use
|
| options/darwin/services.github-runners.<name>.group | Group under which to run the service
|
| options/nixos/networking.wlanInterfaces | Creating multiple WLAN interfaces on top of one physical WLAN device (NIC)
|
| options/nixos/services.frp.instances.<name>.enable | Whether to enable frp.
|
| options/nixos/services.akkoma.frontends.<name>.ref | Akkoma frontend reference.
|
| options/nixos/services.redis.servers.<name>.unixSocketPerm | Change permissions for the socket
|
| options/nixos/services.tinc.networks.<name>.package | The tinc_pre package to use.
|
| options/nixos/services.github-runners.<name>.package | The github-runner package to use.
|
| options/darwin/services.github-runners.<name>.package | The github-runner package to use.
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.enso.theme.name | Name of the theme to use for the lightdm-enso-os-greeter
|