| options/nixos/services.firewalld.settings.LogDenied | Add logging rules right before reject and drop rules in the INPUT, FORWARD and OUTPUT chains for the default rules and also final reject and drop rules in zones for the configured link-layer packet type.
|
| options/nixos/security.acme.defaults.keyType | Key type to use for private keys
|
| options/darwin/nix.checkConfig | If enabled (the default), checks for data type mismatches and that Nix
can parse the generated nix.conf.
|
| options/home-manager/nix.checkConfig | If enabled (the default), checks for data type mismatches and that Nix
can parse the generated nix.conf.
|
| options/nixos/services._3proxy.services.*.auth | Authentication type
|
| options/nixos/services.waagent.settings.ResourceDisk.Format | If set to true, waagent formats and mounts the resource disk that the platform provides,
unless the file system type in `ResourceDisk
|
| options/nixos/services.taskserver.config | Configuration options to pass to Taskserver
|
| options/nixos/services.waagent.settings.ResourceDisk.FileSystem | The file system type for the resource disk
|
| options/nixos/services.minidlna.settings.log_level | Defines the type of messages that should be logged and down to which level of importance.
|
| options/nixos/services.libvirtd.autoSnapshot.snapshotType | Type of snapshot to create (internal or external).
|
| options/nixos/services.bonsaid.settings.*.command | Command to run when this transition is taken
|
| options/home-manager/services.wl-clip-persist.clipboardType | The clipboard type to persist.
regular: Persist the regular clipboard only (recommended).
primary: Persist the primary selection only.
both: Persist both regular and primary clipboards
|
| options/nixos/services.suricata.settings.outputs | Configure the type of alert (and other) logging you would like
|
| options/nixos/services.coturn.tls-listening-port | TURN listener port for TLS
|
| options/nixos/services.tinc.networks.<name>.interfaceType | The type of virtual interface used for the network connection.
|
| options/nixos/services.firefly-iii.settings.DB_CONNECTION | The type of database you wish to use
|
| options/nixos/services.mediawiki.database.createLocally | Create the database and database user locally
|
| options/nixos/services.homebridge.uiSettings.platform | Type of the homebridge UI platform
|
| options/nixos/services.gemstash.settings.db_adapter | Which database type to use
|
| options/nixos/services.limesurvey.database.createLocally | Create the database and database user locally
|
| options/nixos/services.matrix-synapse.settings.listeners.*.path | Unix domain socket path to bind this listener to.
|
| options/nixos/i18n.inputMethod.enable | Whether to enable an additional input method type.
|
| options/home-manager/i18n.inputMethod.enable | Whether to enable an additional input method type.
|
| options/nixos/services.glance.environmentFile | Path to an environment file as defined in systemd.exec(5)
|
| options/nixos/i18n.inputMethod.enabled | Deprecated - use type and enable = true instead
|
| options/home-manager/i18n.inputMethod.enabled | Deprecated - use type and enable = true instead
|
| options/nixos/services.gitlab.smtp.authentication | Authentication type to use, see http://api.rubyonrails.org/classes/ActionMailer/Base.html
|
| options/home-manager/services.ollama.acceleration | What interface to use for hardware acceleration.
null: default behavior
- if
nixpkgs.config.rocmSupport is enabled, uses "rocm"
- if
nixpkgs.config.cudaSupport is enabled, uses "cuda"
- otherwise defaults to
false
false: disable GPU, only use CPU
"rocm": supported by most modern AMD GPUs
- may require overriding gpu type with
services.ollama.rocmOverrideGfx
if rocm doesn't detect your AMD gpu
"cuda": supported by most modern NVIDIA GPUs
|
| options/nixos/services.bonsaid.settings.*.event_name | Name of the event which should trigger this transition when received by bonsaid
|
| options/nixos/services.headscale.settings.tls_letsencrypt_challenge_type | Type of ACME challenge to use, currently supported types:
HTTP-01 or TLS-ALPN-01.
|
| options/nixos/services.nextcloud-spreed-signaling.settings.grpc.targets | For target type static: List of GRPC targets to connect to for clustering mode.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.auth.<name>.adapter | The auth adapter type
|
| options/nixos/services.bonsaid.settings.*.delay_duration | Nanoseconds to wait after the previous state change before performing this transition
|
| options/nixos/services.networkd-dispatcher.rules.<name>.onState | List of names of the systemd-networkd operational states which
should trigger the script
|
| options/nixos/services.ollama.acceleration | What interface to use for hardware acceleration
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_app | Type of this worker
|
| options/nixos/services.gotosocial.setupPostgresqlDB | Whether to setup a local postgres database and populate the
db-type fields in services.gotosocial.settings.
|
| options/nixos/services.prometheus.exporters.ecoflow.exporterType | The type of exporter you'd like to use
|
| options/nixos/services.grafana.provision.dashboards.settings.providers.*.options.path | Path grafana will watch for dashboards
|
| options/nixos/services.homebridge.settings.platforms.*.platform | Platform type
|
| options/nixos/services.jitsi-meet.secureDomain.authentication | The authentication type to be used by jitsi
|
| options/nixos/services.postgresqlBackup.compression | The type of compression to use on the generated database dump.
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.proxyType | cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP
|
| options/darwin/nixpkgs.system | Specifies the Nix platform type on which nix-darwin should be built
|
| options/nixos/services.discourse.mail.outgoing.authentication | Authentication type to use, see https://api.rubyonrails.org/classes/ActionMailer/Base.html
|
| options/nixos/programs.ssh.startAgent | Whether to start the OpenSSH agent when you log in
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.address | The address of this resource
|
| options/nixos/services.pipewire.wireplumber.extraScripts | Additional scripts for WirePlumber to be used by configuration files
|
| options/nixos/services.multipath.devices.*.alias_prefix | The user_friendly_names prefix to use for this device type, instead of the default mpath
|
| options/nixos/services.healthchecks.settings | Environment variables which are read by healthchecks (local)_settings.py
|
| options/nixos/services.prometheus.exporters.mail.configuration.servers | List of servers that should be probed.
Note: if your mailserver has rspamd(8) configured,
it can happen that emails from this exporter are marked as spam
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.local_ts | List of local traffic selectors to include in CHILD_SA
|
| options/nixos/services.healthchecks.settingsFile | Environment variables which are read by healthchecks (local)_settings.py
|
| options/nixos/services.bacula-sd.autochanger.<name>.changerDevice | The specified name-string must be the generic SCSI device name of the
autochanger that corresponds to the normal read/write Archive Device
specified in the Device resource
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.auth | Authentication to expect from remote
|
| options/home-manager/programs.joplin-desktop.sync.target | What is the type of sync target.
|
| options/nixos/services.homebridge.settings.accessories.*.accessory | Accessory type
|
| options/nixos/nixpkgs.system | This option does not need to be specified for NixOS configurations
with a recently generated hardware-configuration.nix
|
| options/nixos/services.wstunnel.clients.<name>.upgradeCredentials | Use these credentials to authenticate during the HTTP upgrade request
(Basic authorization type, USER:[PASS]).
Passwords specified here will be world-readable in the Nix store!
To pass a password to the service, point the environmentFile option
to a file containing HTTP_PASSWORD=<your-password-here> and set this
option to <user>:$HTTP_PASSWORD
|
| options/nixos/fonts.fontconfig.allowType1 | Allow Type-1 fonts
|
| options/home-manager/programs.kodi.sources | Contents to populate the file sources.xml in kodis
userdata directory
|
| options/nixos/security.pam.loginLimits | Define resource limits that should apply to users or groups
|
| options/home-manager/xdg.desktopEntries.<name>.mimeType | The MIME type(s) supported by this application.
|
| options/home-manager/programs.kodi.settings | Configuration to write to the advancedsettings.xml
file in kodis userdata directory
|
| options/darwin/nix.daemonProcessType | Nix daemon process resource limits class
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.per_cpu_sas | Enable per-CPU CHILD_SAs
|
| options/home-manager/programs.keychain.inheritType | Inherit type to attempt from agent variables from the environment.
|
| options/nixos/nix.buildMachines.*.system | The system type the build machine can execute derivations on
|
| options/darwin/nix.buildMachines.*.system | The system type the build machine can execute derivations on
|
| options/nixos/programs.ssh.knownHosts.<name>.publicKey | The public key data for the host
|
| options/darwin/programs.ssh.knownHosts.<name>.publicKey | The public key data for the host
|
| options/home-manager/accounts.contact.accounts.<name>.khard.glob | The glob expansion to be searched for contacts when
type is set to discover.
|
| options/home-manager/dconf.settings | Settings to write to the dconf configuration system
|
| options/home-manager/accounts.calendar.accounts.<name>.khal.glob | The glob expansion to be searched for events or birthdays when
type is set to discover.
|
| options/nixos/services.prometheus.scrapeConfigs.*.dns_sd_configs.*.port | The port number used if the query type is not SRV.
|
| options/nixos/boot.specialFileSystems.<name>.fsType | Type of the file system
|
| options/nixos/services.multipath.devices.*.hardware_handler | The hardware handler to use for this device type
|
| options/home-manager/wayland.windowManager.sway.swaynag.settings | Configuration written to
$XDG_CONFIG_HOME/swaynag/config
|
| options/nixos/networking.dhcpcd.wait | This option specifies when the dhcpcd service will fork to background
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.path | Unix domain socket path to bind this listener to.
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| options/home-manager/programs.neovim.generatedConfigs | Generated configurations with as key their language (set via type).
|
| options/home-manager/launchd.agents.<name>.config.LimitLoadToSessionType | This configuration file only applies to sessions of the type specified
|
| options/home-manager/programs.sketchybar.configType | The type of configuration to generate
|
| options/nixos/nixpkgs.localSystem | Systems with a recently generated hardware-configuration.nix
do not need to specify this option, unless cross-compiling, in which case
you should set only nixpkgs.buildPlatform
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LimitLoadToSessionType | This configuration file only applies to sessions of the type specified
|
| options/nixos/services.prometheus.scrapeConfigs.*.triton_sd_configs.*.role | The type of targets to discover, can be set to:
- "container" to discover virtual machines (SmartOS zones, lx/KVM/bhyve branded zones) running on Triton
- "cn" to discover compute nodes (servers/global zones) making up the Triton infrastructure
Defaults to container in prometheus
when set to null.
|
| options/home-manager/programs.pistol.associations.*.mime | Mime type regex that this association should match.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| options/darwin/launchd.agents.<name>.serviceConfig.LimitLoadToSessionType | This configuration file only applies to sessions of the type specified
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LimitLoadToSessionType | This configuration file only applies to sessions of the type specified
|
| options/home-manager/xdg.mimeApps.defaultApplicationPackages | Packages whose .desktop files will be used to establish default
mimetype associations
|
| options/nixos/fileSystems.<name>.fsType | Type of the file system
|
| options/nixos/virtualisation.xen.enable | Whether to enable the Xen Project Hypervisor, a virtualisation technology defined as a type-1 hypervisor, which allows multiple virtual machines, known as domains, to run concurrently on the physical machine
|
| options/nixos/networking.wlanInterfaces.<name>.meshID | MeshID of interface with type mesh.
|
| options/nixos/networking.wlanInterfaces.<name>.flags | Flags for interface of type monitor.
|
| options/nixos/services.filesender.settings.storage_filesystem_path | When using storage type filesystem this is the absolute path to the file system where uploaded files are stored until they expire
|
| options/nixos/networking.wlanInterfaces.<name>.fourAddr | Whether to enable 4-address mode with type managed.
|