| options/nixos/virtualisation.oci-containers.containers.<name>.hostname | The hostname of the container.
|
| options/nixos/security.acme.certs.<name>.extraDomainNames | A list of extra domain names, which are included in the one certificate to be issued.
|
| options/nixos/services.kanidm.provision.groups.<name>.members | List of kanidm entities (persons, groups, ...) which are part of this group.
|
| options/nixos/systemd.user.paths.<name>.requisite | Similar to requires
|
| options/darwin/launchd.agents.<name>.serviceConfig.StandardErrorPath | This optional key specifies what file should be used for data being sent to stderr when using stdio(3).
|
| options/darwin/launchd.agents.<name>.serviceConfig.EnableGlobbing | This flag causes launchd to use the glob(3) mechanism to update the program arguments before invocation.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.StandardOutPath | This optional key specifies what file should be used for data being sent to stdout when using stdio(3).
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.token.<name>.module | Optional PKCS#11 module name to access the token.
|
| options/nixos/services.anubis.instances.<name>.policy.extraBots | Additional bot rules appended to the policy
|
| options/nixos/boot.initrd.systemd.contents.<name>.source | Path of the source file.
|
| options/darwin/launchd.agents.<name>.serviceConfig.LimitLoadToSessionType | This configuration file only applies to sessions of the type specified
|
| options/nixos/services.jitsi-videobridge.xmppConfigs.<name>.mucNickname | Videobridges use the same XMPP account and need to be distinguished by the
nickname (aka resource part of the JID)
|
| options/nixos/services.wstunnel.servers.<name>.restrictTo.*.port | The port.
|
| options/nixos/services.firewalld.zones.<name>.protocols | Protocols to allow in the zone.
|
| options/nixos/services.zeronsd.servedNetworks.<name>.package | The zeronsd package to use.
|
| options/nixos/services.restic.backups.<name>.createWrapper | Whether to generate and add a script to the system path, that has the same environment variables set
as the systemd service
|
| options/home-manager/services.restic.backups.<name>.createWrapper | Whether to generate and add a script to the system path, that has the
same environment variables set as the systemd service
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.restic.backups.<name>.rcloneConfigFile | Path to the file containing rclone configuration
|
| options/nixos/services.fedimintd.<name>.nginx.config.listen | Listen addresses and ports for this virtual host
|
| options/nixos/systemd.user.services.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/services.fedimintd.<name>.nginx.config.http2 | Whether to enable the HTTP/2 protocol
|
| options/home-manager/programs.i3status-rust.bars.<name>.theme | The theme to use
|
| options/nixos/services.wyoming.piper.servers.<name>.streaming | Whether to enable audio streaming on sentence boundaries.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.listen.*.ip | IP to listen on. 0.0.0.0 for IPv4 only, * for all.
|
| options/nixos/systemd.services.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.gitlab-runner.services.<name>.postBuildScript | Runner-specific command script executed after code is pulled
and just after build executes.
|
| options/darwin/services.gitlab-runner.services.<name>.postBuildScript | Runner-specific command script executed after code is pulled
and just after build executes.
|
| options/nixos/services.borgbackup.jobs.<name>.dumpCommand | Backup the stdout of this program instead of filesystem paths
|
| options/nixos/services.firewalld.zones.<name>.forwardPorts.*.to-addr | Destination IP address.
|
| options/nixos/services.gitlab-runner.services.<name>.dockerExtraHosts | Add a custom host-to-IP mapping.
|
| options/darwin/services.gitlab-runner.services.<name>.dockerExtraHosts | Add a custom host-to-IP mapping.
|
| options/nixos/services.github-runners.<name>.group | Group under which to run the service
|
| options/nixos/services.github-runners.<name>.extraPackages | Extra packages to add to PATH of the service to make them available to workflows.
|
| options/darwin/services.github-runners.<name>.extraPackages | Extra packages to add to PATH of the service to make them available to workflows.
|
| options/nixos/networking.bridges.<name>.rstp | Whether the bridge interface should enable rstp.
|
| options/nixos/networking.greTunnels.<name>.dev | The underlying network device on which the tunnel resides.
|
| options/home-manager/services.restic.backups.<name>.inhibitsSleep | Prevents the system from sleeping while backing up
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.eap_id | Identity to use as peer identity during EAP authentication
|
| options/nixos/services.tarsnap.archives.<name>.includes | Include only files and directories matching these
patterns (the empty list includes everything)
|
| options/nixos/services.mautrix-meta.instances.<name>.enable | Whether to enable Mautrix-Meta, a Matrix <-> Facebook and Matrix <-> Instagram hybrid puppeting/relaybot bridge.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/home-manager/xdg.cacheFile.<name>.executable | Set the execute bit
|
| options/home-manager/xdg.stateFile.<name>.executable | Set the execute bit
|
| options/nixos/services.httpd.virtualHosts.<name>.globalRedirect | If set, all requests for this host are redirected permanently to
the given URL.
|
| options/nixos/services.buildkite-agents.<name>.extraGroups | Groups the user for this buildkite agent should belong to
|
| options/nixos/services.bacula-fd.director.<name>.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/nixos/services.bacula-sd.director.<name>.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/nixos/services.kanboard.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.librenms.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.agorakit.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.fcgiwrap.instances.<name>.socket.group | Group to be set as owner of the UNIX socket.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.invoiceplane.sites.<name>.cron.key | Cron key taken from the administration page.
|
| options/nixos/services.fediwall.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.mainsail.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/systemd.user.tmpfiles.users.<name>.rules | Per-user rules for creation, deletion and cleaning of volatile and
temporary files automatically
|
| options/nixos/services.davis.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.slskd.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.movim.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/nixos/services.dokuwiki.sites.<name>.templates | List of path(s) to respective template(s) which are copied into the 'tpl' directory.
These templates need to be packaged before use, see example.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.documentRoot | The path of Apache's document root directory
|
| options/nixos/services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".url.host | Domain name of the instance.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.policies.<name>.description | The description of this policy
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.xauth_id | Client XAuth username used in the XAuth exchange.
|
| options/darwin/services.gitlab-runner.services.<name>.executor | Select executor, eg. shell, docker, etc
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.private.<name>.file | File name in the private folder for which this passphrase should be used.
|
| options/nixos/services.kubernetes.kubelet.taints.<name>.value | Value of taint.
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.keyLength | Length of the LUKS slot key derived with PBKDF2 in byte.
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.twoFactor | Whether to use a passphrase and a YubiKey (true), or only a YubiKey (false).
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.protocol | The protocol to allow
|
| options/home-manager/launchd.agents.<name>.config.MachServices | This optional key is used to specify Mach services to be registered with the Mach bootstrap sub-system
|
| options/darwin/launchd.daemons.<name>.serviceConfig.WaitForDebugger | This optional key specifies that launchd should instruct the kernel to have the job wait for a debugger
to attach before any code in the job is executed.
|
| options/nixos/fileSystems.<name>.fsType | Type of the file system
|
| options/nixos/systemd.timers.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/systemd.slices.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/services.consul-template.instances.<name>.user | User under which this instance runs.
|
| options/home-manager/services.git-sync.repositories.<name>.path | The path at which to sync the repository
|
| options/nixos/boot.initrd.clevis.devices.<name>.secretFile | Clevis JWE file used to decrypt the device at boot, in concert with the chosen pin (one of TPM2, Tang server, or SSS).
|
| options/nixos/security.dhparams.params.<name>.bits | The bit size for the prime that is used during a Diffie-Hellman
key exchange.
|
| options/nixos/environment.etc.<name>.source | Path of the source file.
|
| options/darwin/environment.etc.<name>.source | Path of the source file.
|
| options/nixos/services.wordpress.sites.<name>.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/services.buildkite-agents.<name>.extraConfig | Extra lines to be added verbatim to the configuration file.
|
| options/darwin/services.buildkite-agents.<name>.extraConfig | Extra lines to be added verbatim to the configuration file.
|
| options/home-manager/home.file.<name>.recursive | If the file source is a directory, then this option
determines whether the directory should be recursively
linked to the target location
|
| options/nixos/systemd.services.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.gitea-actions-runner.instances.<name>.url | Base URL of your Gitea/Forgejo instance.
|
| options/home-manager/services.podman.images.<name>.decryptionKeyFile | Path to key used for decryption of images.
|
| options/home-manager/services.xsuspender.rules.<name>.onlyOnBattery | Whether to enable process suspend only on battery.
|
| options/nixos/services.gitlab-runner.services.<name>.dockerPullPolicy | Default pull-policy for Docker images
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.settings.<name>.force | Forcibly override any existing configuration for
this extension.
|
| options/nixos/services.netbird.tunnels.<name>.openFirewall | Opens up firewall port for communication between NetBird peers directly over LAN or public IP,
without using (internet-hosted) TURN servers as intermediaries.
|