| options/nixos/services.github-runners.<name>.nodeRuntimes | List of Node.js runtimes the runner should support.
|
| options/darwin/services.github-runners.<name>.nodeRuntimes | List of Node.js runtimes the runner should support.
|
| options/nixos/systemd.timers.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/systemd.slices.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/systemd.services.<name>.stopIfChanged | If set, a changed unit is restarted by calling
systemctl stop in the old configuration,
then systemctl start in the new one
|
| options/nixos/programs.dms-shell.plugins.<name>.enable | Whether to enable this plugin
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.jibri.xmppEnvironments.<name>.control.muc.nickname | The nickname for this Jibri instance in the MUC.
|
| options/nixos/services.slurm.nodeName | Name that SLURM uses to refer to a node (or base partition for BlueGene
systems)
|
| options/nixos/users.extraUsers.<name>.isNormalUser | Indicates whether this is an account for a “real” user
|
| options/nixos/services.prosody.virtualHosts.<name>.ssl.extraOptions | Extra SSL configuration options.
|
| options/nixos/systemd.paths.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/networking.jool.nat64 | Definitions of NAT64 instances of Jool
|
| options/nixos/services.postfix.settings.master.<name>.wakeup | Automatically wake up the service after the specified number of
seconds
|
| options/nixos/boot.initrd.luks.devices.<name>.keyFileTimeout | The amount of time in seconds for a keyFile to appear before
timing out and trying passwords.
|
| options/nixos/security.acme.certs.<name>.ocspMustStaple | Turns on the OCSP Must-Staple TLS extension
|
| options/nixos/services.btrbk.instances.<name>.settings | configuration options for btrbk
|
| options/nixos/security.pam.services.<name>.duoSecurity.enable | If set, use the Duo Security pam module
pam_duo for authentication
|
| options/nixos/services.honk.username | The admin account username.
|
| options/nixos/security.wrappers.<name>.enable | Whether to enable the wrapper.
|
| options/home-manager/accounts.email.accounts.<name>.meli.mailboxAliases | Folder display name
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.WaitForDebugger | This optional key specifies that launchd should instruct the kernel to have the job wait for a debugger
to attach before any code in the job is executed.
|
| options/nixos/services.postfix.masterConfig.<name>.maxproc | The maximum number of processes to spawn for this service
|
| options/nixos/boot.initrd.luks.devices.<name>.keyFileSize | The size of the key file
|
| options/home-manager/programs.fish.functions.<name>.body | The function body.
|
| options/home-manager/programs.floorp.profiles.<name>.path | Profile path.
|
| options/home-manager/launchd.agents.<name>.config.MachServices.<name>.ResetAtClose | If this boolean is false, the port is recycled, thus leaving clients to remain oblivious to the
demand nature of job
|
| options/nixos/users.users.<name>.linger | Whether to enable or disable lingering for this user
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert | Section for a certificate candidate to use for
authentication
|
| options/nixos/services.ytdl-sub.instances.<name>.schedule | How often to run ytdl-sub
|
| options/nixos/services.snapserver.streams.<name>.codec | Default audio compression method.
|
| options/nixos/systemd.paths.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.units.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/services.grafana.provision.dashboards.settings.providers.*.name | A unique provider name.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.id | IKE identity to expect for authentication round
|
| options/nixos/services.fediwall.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.kanboard.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.librenms.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.agorakit.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.kanboard.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.fediwall.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.librenms.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.agorakit.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.sabnzbd.settings.servers.<name>.enable | Enable this server by default
|
| options/nixos/services.pixelfed.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.mainsail.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.mainsail.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.firewalld.zones.<name>.forward | Whether to enable intra-zone forwarding
|
| options/nixos/services.vmalert.instances.<name>.rules | A list of the given alerting or recording rules against configured "datasource.url" compatible with
Prometheus HTTP API for vmalert to execute
|
| options/nixos/services.borgbackup.jobs.<name>.extraInitArgs | Additional arguments for borg init
|
| options/nixos/services.mosquitto.bridges.<name>.topics | Topic patterns to be shared between the two brokers
|
| options/home-manager/services.pizauth.accounts.<name>.extraConfig | Additional configuration that will be added to the account configuration
|
| options/nixos/systemd.user.slices.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/systemd.user.timers.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/services.httpd.virtualHosts.<name>.locations | Declarative location config
|
| options/home-manager/programs.autorandr.profiles.<name>.config.<name>.transform | Refer to
xrandr(1)
for the documentation of the transform matrix.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.eap_id | Client EAP-Identity to use in EAP-Identity exchange and the EAP method.
|
| options/nixos/systemd.slices.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.nspawn.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.timers.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.user.timers.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.user.slices.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/home-manager/services.unison.pairs.<name>.commandOptions | Additional command line options as a dictionary to pass to the
unison program
|
| options/nixos/services.firezone.server.provision.accounts.<name>.actors | All actors (users) to provision
|
| options/nixos/services.fedimintd.<name>.bitcoin.network | Bitcoin network to participate in.
|
| options/nixos/services.geoclue2.appConfig.<name>.isAllowed | Whether the application will be allowed access to location information.
|
| options/nixos/services.wordpress.sites.<name>.settings | Structural Wordpress configuration
|
| options/home-manager/programs.librewolf.profiles.<name>.containers.<name>.color | Container color.
|
| options/nixos/systemd.user.services.<name>.reloadIfChanged | Whether the service should be reloaded during a NixOS
configuration switch if its definition has changed
|
| options/home-manager/i18n.inputMethod.fcitx5.themes.<name>.panelImage | Path to the SVG of the panel.
|
| options/darwin/launchd.agents.<name>.serviceConfig.WaitForDebugger | This optional key specifies that launchd should instruct the kernel to have the job wait for a debugger
to attach before any code in the job is executed.
|
| options/nixos/security.pam.services.<name>.startSession | If set, the service will register a new session with
systemd's login manager
|
| options/nixos/users.extraUsers.<name>.isSystemUser | Indicates if the user is a system user or not
|
| options/home-manager/xdg.dataFile.<name>.executable | Set the execute bit
|
| options/nixos/services.tahoe.nodes.<name>.client.introducer | The furl for a Tahoe introducer node
|
| options/home-manager/services.muchsync.remotes.<name>.remote.importNew | Whether to begin the synchronisation by running
notmuch new on the remote side.
|
| options/nixos/systemd.user.units.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.user.paths.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.user.paths.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/home-manager/programs.floorp.profiles.<name>.id | Profile ID
|
| options/nixos/services.biboumi.settings.db_name | The name of the database to use
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LimitLoadFromHosts | This configuration file only applies to hosts NOT listed with this key
|
| options/nixos/services.tarsnap.archives.<name>.excludes | Exclude files and directories matching these patterns.
|
| options/nixos/networking.fooOverUDP.<name>.local | Local address (and optionally device) to bind to using the given port.
|
| options/nixos/services.easytier.instances.<name>.enable | Enable the instance.
|
| options/nixos/services.opkssh.providers.<name>.lifetime | Token lifetime
|
| options/nixos/services.postfix.settings.master.<name>.chroot | Whether the service is chrooted to have only access to the
services.postfix.queueDir and the closure of
store paths specified by the program option.
|
| options/nixos/services.ttyd.username | Username for basic http authentication.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.round | Optional numeric identifier by which authentication rounds are
sorted
|
| options/home-manager/services.podman.containers.<name>.autoStart | Whether to start the container on boot (requires user lingering).
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.ports.*.from | The start of the port range, inclusive.
|
| options/nixos/services.borgbackup.jobs.<name>.prune.prefix | Only consider archive names starting with this prefix for pruning
|
| options/nixos/security.wrappers.<name>.source | The absolute path to the program to be wrapped.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SessionCreate | This key specifies that the job should be spawned into a new security
audit session rather than the default session for the context is belongs
to
|
| options/nixos/services.kmonad.keyboards.<name>.defcfg.compose.key | The (optional) compose key to use.
|
| options/nixos/services.klipper.firmwares.<name>.package | Path to the built firmware package.
|