| options/nixos/services.thanos.downsample.arguments | Arguments to the thanos downsample command
|
| options/nixos/programs.starship.transientPrompt.enable | Whether to enable Starship's transient prompt
feature in fish shells
|
| options/nixos/services.mautrix-whatsapp.environmentFile | File containing environment variables to be passed to the mautrix-whatsapp service
|
| options/nixos/services.rabbitmq.listenAddress | IP address on which RabbitMQ will listen for AMQP
connections
|
| options/home-manager/programs.qutebrowser.extraConfig | Extra lines added to qutebrowser config.py file.
|
| options/nixos/security.dhparams.params | Diffie-Hellman parameters to generate
|
| options/nixos/services.kubernetes.addons.dns.reconcileMode | Controls the addon manager reconciliation mode for the DNS addon
|
| options/nixos/services.netdata.extraPluginPaths | Extra paths to add to the netdata global "plugins directory"
option
|
| options/home-manager/programs.qutebrowser.settings | Options to add to qutebrowser config.py file
|
| options/nixos/boot.loader.generic-extlinux-compatible.useGenerationDeviceTree | Whether to generate Device Tree-related directives in the
extlinux configuration
|
| options/home-manager/home.sessionVariables | Environment variables to always set at login
|
| options/nixos/services.zigbee2mqtt.settings | Your configuration.yaml as a Nix attribute set
|
| options/nixos/services.crowdsec-firewall-bouncer.createRulesets | Whether to have the module create the appropriate firewall configuration
based on the bouncer settings
|
| options/nixos/services.engelsystem.settings | Options to be added to config.php, as a nix attribute set
|
| options/nixos/services.hercules-ci-agent.settings.staticSecretsDirectory | This is the default directory to look for statically configured secrets like cluster-join-token.key
|
| options/darwin/services.hercules-ci-agent.settings.staticSecretsDirectory | This is the default directory to look for statically configured secrets like cluster-join-token.key
|
| options/nixos/services.thanos.query-frontend.arguments | Arguments to the thanos query-frontend command
|
| options/nixos/networking.networkmanager.enable | Whether to use NetworkManager to obtain an IP address and other
configuration for all network interfaces that are not manually
configured
|
| options/nixos/services.scanservjs.extraDevicesConfig | Extra code to add to config.local.js's afterDevices.
|
| options/nixos/services.home-assistant.blueprints.script | List of script
blueprints to
install into ${config.services.home-assistant.configDir}/blueprints/script.
|
| options/nixos/services.pufferpanel.environment | Environment variables to set for the service
|
| options/nixos/services.suricata.settings.outputs | Configure the type of alert (and other) logging you would like
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.start_action | Action to perform after loading the configuration.
- The default of
none loads the connection only, which
then can be manually initiated or used as a responder configuration.
- The value
trap installs a trap policy, which triggers
the tunnel as soon as matching traffic has been detected.
- The value
start initiates the connection actively.
- Since version 5.9.6 two modes above can be combined with
trap|start,
to immediately initiate a connection for which trap policies have been installed
|
| options/nixos/services.nextcloud.settings | Extra options which should be appended to Nextcloud's config.php file.
|
| options/nixos/services.home-assistant.blueprints.template | List of template
blueprints to
install into ${config.services.home-assistant.configDir}/blueprints/template.
|
| options/nixos/services.nextcloud.secretFile | Secret options which will be appended to Nextcloud's config.php file (written as JSON, in the same
form as the services.nextcloud.settings option), for example
{"redis":{"password":"secret"}}.
|
| options/nixos/programs.bazecor.enable | Whether to enable Bazecor, the graphical configurator for Dygma Products.
|
| options/nixos/services.sourcehut.hg.group | Group for hg.sr.ht
|
| options/home-manager/programs.thunderbird.profiles.<name>.calendarAccountsOrder | Custom ordering of calendar accounts
|
| options/nixos/services.radicle.checkConfig | Whether to enable checking the config.json file resulting from services.radicle.settings.
|
| options/nixos/services.sourcehut.man.group | Group for man.sr.ht
|
| options/nixos/services.sourcehut.git.group | Group for git.sr.ht
|
| options/nixos/services.sourcehut.hub.group | Group for hub.sr.ht
|
| options/home-manager/programs.pet.settings | Settings written to config.toml
|
| options/nixos/hardware.block.defaultSchedulerRotational | Default block I/O scheduler for rotational drives (e.g. hard disks)
|
| options/nixos/services.nextcloud.datadir | Nextcloud's data storage path
|
| options/nixos/services.sourcehut.todo.group | Group for todo.sr.ht
|
| options/nixos/services.sourcehut.meta.group | Group for meta.sr.ht
|
| options/nixos/services.nextcloud.caching.redis | Whether to load the Redis module into PHP
|
| options/nixos/services.xserver.wacom.enable | Whether to enable the Wacom touchscreen/digitizer/tablet
|
| options/nixos/services.movim.h2o.acme.root | Directory for the ACME challenge, which is public
|
| options/home-manager/programs.jjui.settings | Options to add to the config.toml file
|
| options/nixos/services.nezha-agent.settings | Generate to config.json as a Nix attribute set
|
| options/nixos/services.home-assistant.blueprints.automation | List of automation
blueprints to
install into ${config.services.home-assistant.configDir}/blueprints/automation.
|
| options/nixos/services.sourcehut.paste.group | Group for paste.sr.ht
|
| options/nixos/services.sourcehut.lists.group | Group for lists.sr.ht
|
| options/nixos/services.sourcehut.pages.group | Group for pages.sr.ht
|
| options/nixos/services.nextcloud-spreed-signaling.hostName | The host name to bind the nginx virtual host to, if
config.services.nextcloud-spreed-signaling.configureNginx is set to true.
|
| options/nixos/services.davis.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.slskd.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.movim.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.postgresqlWalReceiver.receivers.<name>.slot | Require pg_receivewal to use an existing replication slot (see
Section 26.2.6 of the PostgreSQL manual)
|
| options/nixos/services.snipe-it.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.h2o.hosts.<name>.acme.root | Directory for the ACME challenge, which is public
|
| options/nixos/services.sourcehut.builds.group | Group for builds.sr.ht
|
| options/nixos/services.displayManager.ly.settings | Extra settings merged in and overwriting defaults in config.ini.
|
| options/nixos/services.fluidd.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.akkoma.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.gancio.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.matomo.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.monica.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/home-manager/programs.numbat.settings | Options to add to config.toml
|
| options/darwin/homebrew.global | Options for configuring the behavior of Homebrew commands when you manually invoke them.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.reauth_time | Time to schedule IKE reauthentication
|
| options/nixos/services.epgstation.settings | Options to add to config.yml
|
| options/nixos/documentation.nixos.enable | Whether to install NixOS's own documentation.
|
| options/home-manager/programs.jujutsu.settings | Options to add to the config.toml file
|
| options/nixos/services.netbird.clients.<name>.dir.state | A state directory used by NetBird client to store config.json, state.json & resolv.conf.
|
| options/nixos/services.netbird.tunnels.<name>.dir.state | A state directory used by NetBird client to store config.json, state.json & resolv.conf.
|
| options/nixos/services.nextcloud.caching.memcached | Whether to load the Memcached module into PHP
|
| options/nixos/services.dolibarr.h2o.acme.root | Directory for the ACME challenge, which is public
|
| options/nixos/security.ipa.shells | List of shells which binaries should be installed to /bin/
|
| options/home-manager/services.kanshi.enable | Whether to enable kanshi, a Wayland daemon that automatically configures outputs.
|
| options/nixos/services.nextcloud-spreed-signaling.settings.https.key | Path to the private key used for the HTTPS listener
|
| options/nixos/services.kanboard.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.librenms.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.fediwall.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.dolibarr.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.agorakit.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.mainsail.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.pixelfed.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.jenkinsSlave.enable | If true the system will be configured to work as a jenkins slave
|
| options/nixos/services.caddy.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.moodle.virtualHost.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| options/nixos/services.nagios.virtualHost.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| options/nixos/services.github-runners.<name>.tokenFile | The full path to a file which contains either
- a fine-grained personal access token (PAT),
- a classic PAT
- or a runner registration token
Changing this option or the tokenFile’s content triggers a new runner registration
|
| options/nixos/services.radicle.httpd.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/programs.rush.rules | The rule statement configures a GNU Rush rule
|
| options/nixos/services.nextcloud-spreed-signaling.settings.app.debug | Set to "true" to install pprof debug handlers
|
| options/nixos/systemd.nspawn | Definition of systemd-nspawn configurations.
|
| options/nixos/services.httpd.virtualHosts.<name>.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| options/nixos/services.anuko-time-tracker.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.nginx.virtualHosts.<name>.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.bookstack.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/documentation.nixos.includeAllModules | Whether the generated NixOS's documentation should include documentation for all
the options from all the NixOS modules included in the current
configuration.nix
|
| options/darwin/services.github-runners.<name>.tokenFile | The full path to a file which contains either
- a fine-grained personal access token (PAT),
- a classic PAT
- or a runner registration token
Changing this option or the tokenFile’s content triggers a new runner registration
|
| options/nixos/services.forgejo.settings | Free-form settings written directly to the app.ini configfile file
|
| options/nixos/services.listmonk.settings | Static settings set in the config.toml, see https://github.com/knadh/listmonk/blob/master/config.toml.sample for details
|
| options/nixos/services.nginx.resolver | Configures name servers used to resolve names of upstream servers into addresses
|
| options/nixos/services.jirafeau.nginxConfig.acmeRoot | Directory for the ACME challenge, which is public
|