| options/darwin/launchd.user.agents.<name>.serviceConfig.LimitLoadFromHosts | This configuration file only applies to hosts NOT listed with this key
|
| options/nixos/services.fluidd.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.gancio.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.akkoma.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.fedimintd.<name>.nginx.config.extraConfig | These lines go to the end of the vhost verbatim.
|
| options/nixos/services.matomo.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/services.monica.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/home-manager/accounts.contact.accounts.<name>.pimsync.enable | Whether to enable synchronization using pimsync.
|
| options/nixos/services.postfix.masterConfig.<name>.private | Whether the service's sockets and storage directory is restricted to
be only available via the mail system
|
| options/nixos/services.restic.backups.<name>.dynamicFilesFrom | A script that produces a list of files to back up
|
| options/home-manager/services.xsuspender.rules.<name>.execResume | Before resuming, execute this shell script
|
| options/nixos/services.sanoid.datasets.<name>.autoprune | Whether to automatically prune old snapshots.
|
| options/home-manager/services.unison.pairs.<name>.commandOptions | Additional command line options as a dictionary to pass to the
unison program
|
| options/nixos/systemd.sockets.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/systemd.targets.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/services.gitlab-runner.services.<name>.buildsDir | Absolute path to a directory where builds will be stored
in context of selected executor (Locally, Docker, SSH).
|
| options/darwin/services.gitlab-runner.services.<name>.buildsDir | Absolute path to a directory where builds will be stored
in context of selected executor (Locally, Docker, SSH).
|
| options/darwin/launchd.agents.<name>.serviceConfig.LowPriorityIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O.
|
| options/nixos/security.pam.services.<name>.kwallet.enable | If enabled, pam_wallet will attempt to automatically unlock the
user's default KDE wallet upon login
|
| options/nixos/services.hylafax.modems.<name>.config | Attribute set of values for the given modem
|
| options/nixos/services.mautrix-meta.instances.<name>.dataDir | Path to the directory with database, registration, and other data for the bridge service
|
| options/darwin/launchd.daemons.<name>.serviceConfig.ServiceIPC | This optional key specifies whether the job participates in advanced
communication with launchd
|
| options/home-manager/launchd.agents.<name>.config.AbandonProcessGroup | When a job dies, launchd kills any remaining processes with the same process group ID as the job
|
| options/home-manager/accounts.calendar.accounts.<name>.primary | Whether this is the primary account
|
| options/nixos/services.buildkite-agents.<name>.tokenPath | The token from your Buildkite "Agents" page
|
| options/darwin/services.buildkite-agents.<name>.tokenPath | The token from your Buildkite "Agents" page
|
| options/home-manager/launchd.agents.<name>.config.StartInterval | This optional key causes the job to be started every N seconds
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.certs | List of certificate candidates to use for
authentication
|
| options/nixos/services.netbird.clients.<name>.hardened | Hardened service:
- runs as a dedicated user with minimal set of permissions (see caveats),
- restricts daemon configuration socket access to dedicated user group
(you can grant access to it with
users.users."<user>".extraGroups = [ netbird-‹name› ]),
Even though the local system resources access is restricted:
CAP_NET_RAW, CAP_NET_ADMIN and CAP_BPF still give unlimited network manipulation possibilites,
- older kernels don't have
CAP_BPF and use CAP_SYS_ADMIN instead,
Known security features that are not (yet) integrated into the module:
- 2024-02-14:
rosenpass is an experimental feature configurable solely
through --enable-rosenpass flag on the netbird up command,
see the docs
|
| options/nixos/services.netbird.tunnels.<name>.hardened | Hardened service:
- runs as a dedicated user with minimal set of permissions (see caveats),
- restricts daemon configuration socket access to dedicated user group
(you can grant access to it with
users.users."<user>".extraGroups = [ netbird-‹name› ]),
Even though the local system resources access is restricted:
CAP_NET_RAW, CAP_NET_ADMIN and CAP_BPF still give unlimited network manipulation possibilites,
- older kernels don't have
CAP_BPF and use CAP_SYS_ADMIN instead,
Known security features that are not (yet) integrated into the module:
- 2024-02-14:
rosenpass is an experimental feature configurable solely
through --enable-rosenpass flag on the netbird up command,
see the docs
|
| options/darwin/launchd.daemons.<name>.serviceConfig.OnDemand | This key was used in Mac OS X 10.4 to control whether a job was kept alive or not
|
| options/nixos/systemd.user.services.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.fediwall.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.agorakit.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.kanboard.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.librenms.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.mainsail.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.vdirsyncer.jobs.<name>.config.statusPath | vdirsyncer's status path
|
| options/home-manager/programs.gnome-terminal.profile.<name>.colors.cursor | The color for the terminal cursor.
|
| options/nixos/services.postfix.settings.master.<name>.chroot | Whether the service is chrooted to have only access to the
services.postfix.queueDir and the closure of
store paths specified by the program option.
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.allAccess | Grants all permissions in the associated organization.
|
| options/nixos/services.prefect.workerPools.<name>.installPolicy | install policy for the worker (always, if-not-present, never, prompt)
|
| options/nixos/services.kanata.keyboards.<name>.devices | Paths to keyboard devices
|
| options/nixos/services.httpd.virtualHosts.<name>.documentRoot | The path of Apache's document root directory
|
| options/nixos/services.buildkite-agents.<name>.extraGroups | Groups the user for this buildkite agent should belong to
|
| options/nixos/services.restic.backups.<name>.initialize | Create the repository if it doesn't exist.
|
| options/home-manager/services.podman.containers.<name>.volumes | The volumes to mount into the container.
|
| options/home-manager/services.podman.containers.<name>.devices | The devices to mount into the container
|
| options/nixos/services.kmonad.keyboards.<name>.defcfg.compose.key | The (optional) compose key to use.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.extraConfig.remote | Remote store extra configuration.
|
| options/nixos/services.orangefs.server.fileSystems.<name>.troveSyncData | Sync data.
|
| options/nixos/services.vdirsyncer.jobs.<name>.config.general | general configuration
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.InitGroups | This optional key specifies whether initgroups(3) should be called before running the job
|
| options/nixos/services.peertube-runner.instancesToRegister.<name>.runnerName | Runner name declared to the PeerTube instance.
|
| options/nixos/services.nebula.networks.<name>.staticHostMap | The static host map defines a set of hosts with fixed IP addresses on the internet (or any network)
|
| options/nixos/systemd.user.services.<name>.reloadIfChanged | Whether the service should be reloaded during a NixOS
configuration switch if its definition has changed
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LowPriorityIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.relayGroups | All relay groups to provision
|
| options/nixos/services.easytier.instances.<name>.extraArgs | Extra args append to the easytier command-line.
|
| options/nixos/services.logrotate.settings.<name>.enable | Whether to enable setting individual kill switch.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.dynamicForwards.*.port | Specifies port number to bind to.
|
| options/nixos/services.borgbackup.jobs.<name>.prune.prefix | Only consider archive names starting with this prefix for pruning
|
| options/nixos/networking.ucarp.downscript | Command to run after become backup, the interface name, virtual address
and optional extra parameters are passed as arguments.
|
| options/nixos/services.openvpn.servers.<name>.authUserPass.password | The password to store inside the credentials file.
|
| options/nixos/services.fcgiwrap.instances.<name>.socket.type | Socket type: 'unix', 'tcp' or 'tcp6'.
|
| options/nixos/services.fcgiwrap.instances.<name>.socket.user | User to be set as owner of the UNIX socket.
|
| options/nixos/services.v4l2-relayd.instances.<name>.output.format | The video-format to write to output-stream.
|
| options/nixos/services.znc.confOptions.networks.<name>.password | IRC server password, such as for a Slack gateway.
|
| options/nixos/services.github-runners.<name>.extraPackages | Extra packages to add to PATH of the service to make them available to workflows.
|
| options/darwin/services.github-runners.<name>.extraPackages | Extra packages to add to PATH of the service to make them available to workflows.
|
| options/nixos/containers.<name>.bindMounts | An extra list of directories that is bound to the container.
|
| options/nixos/services.rke2.autoDeployCharts.<name>.enable | Whether to enable the installation of this Helm chart
|
| options/home-manager/xdg.configFile.<name>.ignorelinks | When recursive is enabled, adds -ignorelinks flag to lndir
It causes lndir to not treat symbolic links in the source directory specially
|
| options/nixos/services.spiped.config.<name>.weakHandshake | Use fast/weak handshaking: This reduces the CPU time spent
in the initial connection setup, at the expense of losing
perfect forward secrecy.
|
| options/home-manager/accounts.contact.accounts.<name>.khal.priority | Priority of a calendar used for coloring (calendar with highest priority is preferred).
|
| options/home-manager/programs.hexchat.channels.<name>.password | Password to use
|
| options/home-manager/programs.i3status.modules.<name>.settings | Configuration to add to this i3status module
|
| options/nixos/services.xonotic.settings.hostname | The name that will appear in the server list. $g_xonoticversion
gets replaced with the current version.
|
| options/nixos/services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.help | A human-readable description of this metric.
|
| options/nixos/security.pam.services.<name>.startSession | If set, the service will register a new session with
systemd's login manager
|
| options/nixos/services.kanata.keyboards.<name>.extraDefCfg | Configuration of defcfg other than linux-dev (generated
from the devices option) and
linux-continue-if-no-devs-found (hardcoded to be yes)
|
| options/nixos/services.keyd.keyboards.<name>.extraConfig | Extra configuration that is appended to the end of the file.
Do not write ids section here, use a separate option for it
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.tokenFile | The token value
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacerts | List of CA certificates to accept for
authentication
|
| options/nixos/services.wstunnel.servers.<name>.listen.enableHTTPS | Use HTTPS for the tunnel server.
|
| options/nixos/services.kanidm.provision.persons.<name>.groups | List of groups this person should belong to.
|
| options/nixos/services.syncoid.commands.<name>.sendOptions | Advanced options to pass to zfs send
|
| options/nixos/services.syncoid.commands.<name>.recvOptions | Advanced options to pass to zfs recv
|
| options/nixos/systemd.network.networks.<name>.dhcpServerConfig | Each attribute in this set specifies an option in the
[DHCPServer] section of the unit
|
| options/nixos/systemd.network.networks.<name>.pfifoHeadDropConfig | Each attribute in this set specifies an option in the
[PFIFOHeadDrop] section of the unit
|
| options/nixos/systemd.services.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.bacula-fd.director.<name>.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/nixos/services.bacula-sd.director.<name>.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/home-manager/accounts.email.accounts.<name>.neomutt.mailboxType | Whether this account uses maildir folders or IMAP mailboxes
|
| options/nixos/services.vmalert.instances.<name>.enable | Wether to enable VictoriaMetrics's vmalert.
vmalert evaluates alerting and recording rules against a data source, sends notifications via Alertmanager.
|