| options/nixos/services.httpd.virtualHosts.<name>.listen.*.ssl | Whether to enable SSL (https) support.
|
| options/nixos/services.restic.backups.<name>.exclude | Patterns to exclude when backing up
|
| options/nixos/systemd.user.targets.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/systemd.user.sockets.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/systemd.user.tmpfiles.users.<name>.rules | Per-user rules for creation, deletion and cleaning of volatile and
temporary files automatically
|
| options/nixos/systemd.network.netdevs.<name>.tunConfig | Each attribute in this set specifies an option in the
[Tun] section of the unit
|
| options/nixos/systemd.network.networks.<name>.vxlan | A list of vxlan interfaces to be added to the network section of the
unit
|
| options/nixos/systemd.network.netdevs.<name>.tapConfig | Each attribute in this set specifies an option in the
[Tap] section of the unit
|
| options/darwin/launchd.agents.<name>.serviceConfig.RunAtLoad | This optional key is used to control whether your job is launched once at the time the job is loaded
|
| options/home-manager/programs.ripgrep-all.custom_adapters.*.name | The unique identifier and name of this adapter; must only include a-z, 0-9, _
|
| options/nixos/services.geth.<name>.websocket.enable | Whether to enable Go Ethereum WebSocket API.
|
| options/nixos/services.nebula.networks.<name>.relays | List of IPs of relays that this node should allow traffic from.
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.recvTimeout | An application timeout on receiving data from the TCP socket.
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.recvTimeout | An application timeout on receiving data from the TCP socket.
|
| options/nixos/systemd.services.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Label | This required key uniquely identifies the job to launchd.
|
| options/home-manager/services.podman.builds.<name>.extraPodmanArgs | Extra arguments to pass to the podman build command.
|
| options/nixos/networking.bonds.<name>.miimon | DEPRECATED, use driverOptions
|
| options/nixos/users.users.<name>.ignoreShellProgramCheck | By default, nixos will check that programs
|
| options/nixos/services.borgbackup.jobs.<name>.appendFailedSuffix | Append a .failed suffix
to the archive name, which is only removed if
borg create has a zero exit status.
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.threads | Sets the number of worker threads to use
|
| options/darwin/launchd.agents.<name>.serviceConfig.UserName | This optional key specifies the user to run the job as
|
| options/nixos/boot.initrd.clevis.devices.<name>.secretFile | Clevis JWE file used to decrypt the device at boot, in concert with the chosen pin (one of TPM2, Tang server, or SSS).
|
| options/nixos/networking.wg-quick.interfaces.<name>.listenPort | 16-bit port for listening
|
| options/nixos/services.parsedmarc.settings.elasticsearch.cert_path | The path to a TLS certificate bundle used to verify
the server's certificate.
|
| options/nixos/services.prometheus.exporters.fritz.settings.devices.*.name | Name to use for the device.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/home-manager/fonts.fontconfig.configFile.<name>.text | Verbatim contents of the config file
|
| options/nixos/services.rss2email.feeds.<name>.to | Email address to which to send feed items
|
| options/nixos/services.redis.servers.<name>.group | Group account under which this instance of redis-server runs.
If left as the default value this group will automatically be
created on system activation, otherwise you are responsible for
ensuring the group exists before the redis service starts.
|
| options/nixos/services.sourcehut.settings."builds.sr.ht::worker".name | Listening address and listening port
of the build runner (with HTTP port if not 80).
|
| options/nixos/services.errbot.instances.<name>.dataDir | Data directory for errbot instance.
|
| options/nixos/services.geoclue2.appConfig.<name>.isSystem | Whether the application is a system component or not.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.node | The node where the rule should be applied.
|
| options/nixos/boot.loader.grub.extraFiles | A set of files to be copied to /boot
|
| options/nixos/services.rshim.device | Specify the device name to attach
|
| options/nixos/boot.specialFileSystems.<name>.stratis.poolUuid | UUID of the stratis pool that the fs is located in
This is only relevant if you are using stratis.
|
| options/nixos/services.nsd.zones.<name>.allowAXFRFallback | If NSD as secondary server should be allowed to AXFR if the primary
server does not allow IXFR.
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.gtk.cursorTheme.name | Name of the cursor theme to use for the lightdm-gtk-greeter.
|
| options/nixos/services.dokuwiki.sites.<name>.phpPackage | The php package to use.
|
| options/nixos/services.redis.servers.<name>.requirePassFile | File with password for the database.
|
| options/nixos/services.sanoid.templates.<name>.daily | Number of daily snapshots.
|
| options/nixos/services.vault-agent.instances.<name>.user | User under which this instance runs.
|
| options/home-manager/programs.fish.shellAbbrs.<name>.expansion | The command expanded by an abbreviation.
|
| options/nixos/services.agate.hostnames | Domain name of this Gemini server, enables checking hostname and port
in requests. (multiple occurrences means basic vhosts)
|
| options/nixos/services.firezone.server.provision.accounts.<name>.groups.<name>.forceMembers | Ensure that only the given members are part of this group at every server start.
|
| options/nixos/services.libinput.mouse.dev | Path for mouse device
|
| options/nixos/security.tpm2.pkcs11.enable | Whether to enable TPM2 PKCS#11 tool and shared library in system path
(/run/current-system/sw/lib/libtpm2_pkcs11.so)
.
|
| options/nixos/services.hadoop.hdfs.httpfs.tempPath | HTTPFS_TEMP path used by HTTPFS
|
| options/nixos/services.dendrite.tlsKey | The path to the TLS key.
nix-shell -p dendrite --command "generate-keys --tls-cert server.crt --tls-key server.key"
|
| options/nixos/services.harmonia.signKeyPath | DEPRECATED: Use services.harmonia.signKeyPaths instead
|
| options/nixos/hardware.deviceTree.dtbSource | Path to dtb directory that overlays and other processing will be applied to
|
| options/nixos/services.dovecot2.sslServerCert | Path to the server's public key.
|
| options/nixos/services.oauth2-proxy.keyFile | oauth2-proxy allows passing sensitive configuration via environment variables
|
| options/nixos/services.outline.sslCertFile | File path that contains the Base64-encoded certificate for HTTPS
termination
|
| options/nixos/services.radicle.httpd.nginx.root | The path of the web root directory.
|
| options/nixos/services.lk-jwt-service.keyFile | Path to a file containing the credential mapping (<keyname>: <secret>) to access LiveKit
|
| options/nixos/services.ncps.cache.secretKeyPath | The path to load the secretKey for signing narinfos
|
| options/nixos/services.routedns.configFile | Path to RouteDNS TOML configuration file.
|
| options/nixos/services.syncthing.cert | Path to the cert.pem file, which will be copied into Syncthing's
configDir.
|
| options/nixos/services.stash.sessionStoreKeyFile | Path to file containing a secret for session store.
|
| options/home-manager/programs.claude-code.agentsDir | Path to a directory containing agent files for Claude Code
|
| options/home-manager/programs.claude-code.skillsDir | Path to a directory containing skill files for Claude Code
|
| options/nixos/security.pam.services.<name>.gnupg.storeOnly | Don't send the password immediately after login, but store for PAM
session.
|
| options/nixos/services.snapper.configs.<name>.FSTYPE | Filesystem type
|
| options/home-manager/programs.ssh.matchBlocks.<name>.forwardAgent | Whether the connection to the authentication agent (if any)
will be forwarded to the remote machine.
|
| options/nixos/security.acme.certs.<name>.dnsResolver | Set the resolver to use for performing recursive DNS queries
|
| options/nixos/systemd.network.links.<name>.matchConfig | Each attribute in this set specifies an option in the
[Match] section of the unit
|
| options/home-manager/launchd.agents.<name>.config.LaunchOnlyOnce | This optional key specifies whether the job can only be run once and only once
|
| options/nixos/services.znapzend.zetup.<name>.destinations.<name>.postsend | Command to run after sending the snapshot to the destination
|
| options/nixos/programs.uwsm.waylandCompositors.<name>.prettyName | The full name of the desktop entry file.
|
| options/darwin/services.github-runners.<name>.workDir | Working directory, available as $GITHUB_WORKSPACE during workflow runs
and used as a default for repository checkouts
|
| options/darwin/users.users.<name>.ignoreShellProgramCheck | By default, nix-darwin will check that programs
|
| options/home-manager/launchd.agents.<name>.config.Program | This key maps to the first argument of execvp(3)
|
| options/nixos/boot.initrd.luks.devices.<name>.postOpenCommands | Commands that should be run right after we have mounted our LUKS device.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Label | This required key uniquely identifies the job to launchd.
|
| options/home-manager/services.podman.images.<name>.extraPodmanArgs | Extra arguments to pass to the podman image pull command.
|
| options/home-manager/services.podman.networks.<name>.autoStart | Whether to start the network on boot (requires user lingering).
|
| options/darwin/environment.launchAgents.<name>.text | Text of the file.
|
| options/nixos/services.znapzend.zetup.<name>.sendDelay | Specify delay (in seconds) before sending snaps to the destination
|
| options/nixos/services.multipath.devices.*.all_tg_pt | Set the 'all targets ports' flag when registering keys with mpathpersist
|
| options/home-manager/services.podman.volumes.<name>.extraConfig | INI sections and values to populate the Volume Quadlet.
|
| options/nixos/services.akkoma.initDb.username | Name of the database user to initialise the database with
|
| options/home-manager/programs.i3status-rust.bars.<name>.blocks | Configuration blocks to add to i3status-rust
config
|
| options/nixos/systemd.user.sockets.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.user.targets.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/services.jupyter.kernels.<name>.extraPaths | Extra paths to link in kernel directory
|
| options/nixos/services.ytdl-sub.instances.<name>.enable | Whether to enable ytdl-sub instance.
|
| options/nixos/services.easytier.instances.<name>.extraSettings | Extra settings to add to easytier-‹name›.toml.
|
| options/nixos/services.h2o.hosts.<name>.acme.useHost | An existing Let’s Encrypt certificate to use for this virtual
host
|
| options/nixos/services.wstunnel.clients.<name>.tlsSNI | Use this as the SNI while connecting via TLS
|
| options/nixos/systemd.timers.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.slices.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.services.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/home-manager/accounts.email.accounts.<name>.jmap.host | Hostname of JMAP server
|
| options/home-manager/launchd.agents.<name>.config.LimitLoadFromHosts | This configuration file only applies to hosts NOT listed with this key
|
| options/nixos/services.fedimintd.<name>.nginx.enable | Whether to configure nginx for fedimintd
|
| options/nixos/image.repart.partitions.<name>.storePaths | The store paths to include in the partition.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.hostName | Canonical hostname for the server.
|
| options/nixos/services.firewalld.zones.<name>.target | Action for packets that doesn't match any rules.
|