| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.filters | A list of filter to restrict traffic
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.address | The address of this resource
|
| options/nixos/services.kanboard.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.dolibarr.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.librenms.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.agorakit.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.fediwall.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.pixelfed.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.mainsail.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.postgresql.systemCallFilter | Configures the syscall filter for postgresql.service
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/nixos/services.filebeat.inputs | Inputs specify how Filebeat locates and processes input data
|
| options/nixos/services.radicle.httpd.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.vmalert.instances.<name>.settings."datasource.url" | Datasource compatible with Prometheus HTTP API.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.ports | Either a single port or port range to allow
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.ports.*.to | The end of the port range, inclusive.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/nixos/services.anuko-time-tracker.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/home-manager/programs.borgmatic.backups.<name>.location.patterns | Patterns to include/exclude
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.ports.*.from | The start of the port range, inclusive.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.gatewayGroups | A list of gateway groups (sites) which can reach the resource and may be used to connect to it.
|
| options/nixos/services.bookstack.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.bacula-sd.director.<name>.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/nixos/services.bacula-fd.director.<name>.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/nixos/services.tuliprox.sourceSettings | Source definitions
Refer to the Tuliprox documentation for available attributes
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources | All resources to provision
|
| options/nixos/services.jirafeau.nginxConfig.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.protocol | The protocol to allow
|
| options/home-manager/programs.neomutt.sourcePrimaryAccount | Whether to enable source the primary account by default.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.bacula-sd.director.<name>.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| options/nixos/services.bacula-fd.director.<name>.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/nixos/networking.nat.forwardPorts.*.sourcePort | Source port of the external interface; to specify a port range, use a string with a colon (e.g. "60000:61000")
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/home-manager/home.file.<name>.recursive | If the file source is a directory, then this option
determines whether the directory should be recursively
linked to the target location
|
| options/home-manager/wayland.windowManager.hyprland.sourceFirst | Whether to enable putting source entries at the top of the configuration
.
|
| options/nixos/services.mail.sendmailSetuidWrapper.source | The absolute path to the program to be wrapped.
|
| options/home-manager/programs.thunderbird.profiles.<name>.extensions | List of ‹name› add-on packages to install for this profile
|
| options/home-manager/services.activitywatch.watchers.<name>.settings | The settings for the individual watcher in TOML format
|
| options/nixos/services.metricbeat.modules | Metricbeat modules are responsible for reading metrics from the various sources
|
| options/nixos/services.openssh.authorizedKeysInHomedir | Enables the use of the ~/.ssh/authorized_keys file
|
| options/nixos/services.icingaweb2.modules.monitoring.backends.<name>.resource | Name of the IDO resource
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.packages | List of ‹name› add-on packages to install for this profile
|
| options/nixos/services.filebeat.modules | Filebeat modules provide a quick way to get started
processing common log formats
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.addressDescription | An optional description for resource address, usually a full link to the resource including a schema.
|
| options/nixos/services.matrix-synapse.settings.listeners.*.resources.*.names | List of resources to host on this listener.
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.packages | List of ‹name› add-on packages to install for this profile
|
| options/nixos/services.syncthing.overrideFolders | Whether to delete the folders which are not configured via the
folders option
|
| options/nixos/services.nncp.daemon.socketActivation.listenStreams | TCP sockets to bind to
|
| options/home-manager/programs.obsidian.defaultSettings.cssSnippets.*.source | Path of the source file.
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.resource | SSH identity resource for the remote transport
|
| options/nixos/services.limesurvey.nginx.virtualHost.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.packages | List of ‹name› add-on packages to install for this profile
|
| options/home-manager/home.file.<name>.force | Whether the target path should be unconditionally replaced
by the managed file source
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.resources.*.names | List of resources to host on this listener.
|
| options/nixos/services.snapserver.settings.stream.source | One or multiple URIs to PCM input streams.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/home-manager/xresources.path | Path where Home Manager should link the {file}`
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.resources | List of HTTP resources to serve on this listener.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.password_command | Shell command which will print a password to stdout for basic HTTP
authentication
|
| options/nixos/services.matrix-synapse.log | Default configuration for the loggers used by matrix-synapse and its workers
|
| options/nixos/services.borgmatic.configurations.<name>.source_directories | List of source directories and files to backup
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.resources.*.compress | Whether synapse should compress HTTP responses to clients that support it
|
| options/nixos/services._3proxy.services.*.acl.*.sources | List of source IP range, use empty list for any.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.features.internet_resource | Whether to enable the internet_resource feature for this account.
|
| options/home-manager/programs.kodi.sources | Contents to populate the file sources.xml in kodis
userdata directory
|
| options/nixos/services.sourcehut.hg.user | User for hg.sr.ht.
|
| options/nixos/services.sourcehut.git.user | User for git.sr.ht.
|
| options/nixos/services.sourcehut.man.user | User for man.sr.ht.
|
| options/nixos/services.sourcehut.hub.user | User for hub.sr.ht.
|
| options/nixos/services.sourcehut.hg.port | Port on which the "hg" backend should listen.
|
| options/home-manager/xresources.extraConfig | Additional X server resources contents
|
| options/nixos/services.sourcehut.git.port | Port on which the "git" backend should listen.
|
| options/nixos/services.sourcehut.hub.port | Port on which the "hub" backend should listen.
|
| options/nixos/services.sourcehut.man.port | Port on which the "man" backend should listen.
|
| options/nixos/services.sourcehut.todo.user | User for todo.sr.ht.
|
| options/nixos/services.sourcehut.meta.user | User for meta.sr.ht.
|
| options/nixos/services.sourcehut.meta.port | Port on which the "meta" backend should listen.
|
| options/nixos/services.sourcehut.todo.port | Port on which the "todo" backend should listen.
|
| options/home-manager/home.file.<name>.ignorelinks | When recursive is enabled, adds -ignorelinks flag to lndir
It causes lndir to not treat symbolic links in the source directory specially
|
| options/nixos/services.sourcehut.lists.user | User for lists.sr.ht.
|
| options/nixos/services.sourcehut.pages.user | User for pages.sr.ht.
|
| options/nixos/services.sourcehut.paste.user | User for paste.sr.ht.
|
| options/nixos/services.sourcehut.lists.port | Port on which the "lists" backend should listen.
|
| options/nixos/services.sourcehut.paste.port | Port on which the "paste" backend should listen.
|
| options/nixos/services.sourcehut.pages.port | Port on which the "pages" backend should listen.
|
| options/nixos/services.sourcehut.hg.group | Group for hg.sr.ht
|
| options/nixos/services.sourcehut.hg.enable | Whether to enable hg service.
|
| options/nixos/services.sourcehut.man.group | Group for man.sr.ht
|
| options/nixos/services.sourcehut.git.group | Group for git.sr.ht
|
| options/nixos/services.sourcehut.hub.group | Group for hub.sr.ht
|