| options/nixos/services.murmur.registerPassword | Public server registry password, used authenticate your
server to the registry to prevent impersonation; required for
subsequent registry updates.
|
| options/nixos/services.schleuder.lists | List of list addresses that should be handled by Schleuder
|
| options/nixos/services.yggdrasil.settings.PrivateKeyPath | Path to the private key file on the host system
|
| options/nixos/services.movim.minifyStaticFiles | Do minification on public static files which reduces the size of
assets — saving data for the server & users as well as offering a
performance improvement
|
| options/nixos/services.hercules-ci-agent.settings.binaryCachesPath | Path to a JSON file containing binary cache secret keys
|
| options/darwin/services.hercules-ci-agent.settings.binaryCachesPath | Path to a JSON file containing binary cache secret keys
|
| options/nixos/services.ncps.cache.lock.postgresKeyPrefix | Prefix for all PostgreSQL advisory lock keys (only used when
PostgreSQL is configured as lock backend).
|
| options/nixos/boot.loader.systemd-boot.windows.<name>.sortKey | systemd-boot orders the menu entries by their sort keys,
so if you want something to appear after all the NixOS entries,
it should start with o or onwards
|
| options/nixos/services.parsedmarc.settings | Configuration parameters to set in
parsedmarc.ini
|
| options/nixos/services.taskserver.pki.auto.bits | The bit size for generated keys.
|
| options/nixos/services.actkbd.enable | Whether to enable the actkbd key mapping daemon
|
| options/nixos/boot.initrd.luks.devices.<name>.preOpenCommands | Commands that should be run right before we try to mount our LUKS device
|
| options/nixos/services.writefreely.stateDir | The state directory where keys and data are stored.
|
| options/nixos/boot.initrd.network.ssh.authorizedKeys | Authorized keys for the root user on initrd
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.ksk.prePublish | How long in advance to publish new keys
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.zsk.prePublish | How long in advance to publish new keys
|
| options/nixos/services.mastodon.activeRecordEncryptionPrimaryKeyFile | This key must be set to enable the Active Record Encryption feature within
Rails that Mastodon uses to encrypt and decrypt some database attributes
|
| options/nixos/services.mysql.galeraCluster.sstMethod | Method for the initial state transfer (wsrep_sst_method) when a node joins the cluster
|
| options/nixos/services.prosody.muc.*.roomDefaultChangeSubject | If set, the rooms will display the public JIDs by default.
|
| options/nixos/services.rosenpass.settings.secret_key | Path to a file containing the secret key of the local Rosenpass peer
|
| options/nixos/services.your_spotify.settings.SPOTIFY_PUBLIC | The public client ID of your Spotify application
|
| options/nixos/services.cloud-init.enable | Enable the cloud-init service
|
| options/nixos/security.pam.services.<name>.sshAgentAuth | If set, the calling user's SSH agent is used to authenticate
against the keys in the calling user's
~/.ssh/authorized_keys
|
| options/home-manager/xsession.windowManager.xmonad.libFiles | Additional files that will be saved in
~/.xmonad/lib/ and included in the configuration
build
|
| options/nixos/services.snipe-it.config | Snipe-IT configuration options to set in the
.env file
|
| options/nixos/security.pam.services.<name>.forwardXAuth | Whether X authentication keys should be passed from the
calling user to the target user (e.g. for
su)
|
| options/nixos/services.sourcehut.settings."sr.ht".service-key | An absolute file path (which should be outside the Nix-store)
to a key used for encrypting session cookies
|
| options/nixos/services.dependency-track.settings."alpine.oidc.teams.claim" | Defines the name of the claim that contains group memberships or role assignments in the provider's userinfo endpoint
|
| options/nixos/networking.nat.forwardPorts.*.loopbackIPs | Public IPs for NAT reflection; for connections to loopbackip:sourcePort from the host itself and from other hosts behind NAT
|
| options/nixos/programs.ssh.knownHosts.<name>.hostNames | A list of host names and/or IP numbers used for accessing
the host's ssh service
|
| options/nixos/services.matrix-appservice-discord.settings | config.yaml configuration as a Nix attribute set
|
| options/nixos/services.tor.relay.onionServices.<name>.secretKey | Secret key of the onion service
|
| options/nixos/services.openssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| options/nixos/services.sourcehut.settings."meta.sr.ht::billing".stripe-secret-key | An absolute file path (which should be outside the Nix-store)
to a secret key for Stripe
|
| options/nixos/services.libeufin.nexus.settings.nexus-ebics.CLIENT_PRIVATE_KEYS_FILE | Filesystem location where Nexus should store the subscriber private keys.
|
| options/nixos/services.geoipupdate.settings | geoipupdate configuration options
|
| options/nixos/services.maddy.tls.loader | TLS certificates are obtained by modules called "certificate
loaders"
|
| options/nixos/services.sourcehut.settings."meta.sr.ht::settings".registration | Whether to enable public registration.
|
| options/home-manager/programs.kakoune.config.keyMappings.*.effect | The sequence of keys to be mapped.
|
| options/nixos/services.gitlab.secrets.jwsFile | A file containing the secret used to encrypt session
keys
|
| options/nixos/services.netbird.clients.<name>.openFirewall | Opens up firewall port for communication between NetBird peers directly over LAN or public IP,
without using (internet-hosted) TURN servers as intermediaries.
|
| options/nixos/services.netbird.tunnels.<name>.openFirewall | Opens up firewall port for communication between NetBird peers directly over LAN or public IP,
without using (internet-hosted) TURN servers as intermediaries.
|
| options/nixos/boot.initrd.network.ssh.authorizedKeyFiles | Authorized keys taken from files for the root user on initrd
|
| options/nixos/boot.initrd.luks.mitigateDMAAttacks | Unless enabled, encryption keys can be easily recovered by an attacker with physical
access to any machine with PCMCIA, ExpressCard, ThunderBolt or FireWire port
|
| options/nixos/services.stargazer.routes | Routes that Stargazer should server
|
| options/nixos/services.mastodon.vapidPublicKeyFile | Path to file containing the public key used for Web Push
Voluntary Application Server Identification
|
| options/nixos/boot.loader.systemd-boot.memtest86.sortKey | systemd-boot orders the menu entries by their sort keys,
so if you want something to appear after all the NixOS entries,
it should start with o or onwards
|
| options/nixos/services.pleroma.configs | Pleroma public configuration
|
| options/nixos/services.seafile.ccnetSettings.General.SERVICE_URL | Seahub public URL.
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.settings | Attribute set of options for each extension
|
| options/nixos/hardware.tuxedo-drivers.enable | Whether to enable The tuxedo-drivers driver enables access to the following on TUXEDO notebooks:
- Driver for Fn-keys
- SysFS control of brightness/color/mode for most TUXEDO keyboards
- Hardware I/O driver for TUXEDO Control Center
For more inforation it is best to check at the source code description: https://gitlab.com/tuxedocomputers/development/packages/tuxedo-drivers
.
|
| options/nixos/services.beszel.agent.environment | Environment variables for configuring the beszel-agent service
|
| options/nixos/services.akkoma.config.":web_push_encryption".":vapid_details".public_key | base64-encoded public ECDH key.
|
| options/home-manager/programs.kakoune.config.ui.shiftFunctionKeys | Amount by which shifted function keys are offset
|
| options/nixos/fileSystems.<name>.depends | List of paths that should be mounted before this one
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.keystore | Path to keystore (combined PEM with cert/key, or PKCS12 keystore)
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits | Resource limits to be imposed on the job
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits | Resource limits to be imposed on the job
|
| options/home-manager/programs.feh.keybindings | Override feh's default keybindings
|
| options/nixos/services.dendrite.settings.global.private_key | The path to the signing private key file, used to sign
requests and events.
nix-shell -p dendrite --command "generate-keys --private-key matrix_key.pem"
|
| options/nixos/services.engelsystem.settings | Options to be added to config.php, as a nix attribute set
|
| options/darwin/system.defaults.NSGlobalDomain.KeyRepeat | Apple menu > System Preferences > Keyboard
If you press and hold certain keyboard keys when in a text area, the key’s character begins to repeat
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.settings | Attribute set of options for each extension
|
| options/nixos/services.ecs-agent.extra-environment | The environment the ECS agent should run with
|
| options/nixos/services.dex.environmentFile | Environment file (see systemd.exec(5)
"EnvironmentFile=" section for the syntax) to define variables for dex
|
| options/nixos/services.monica.config | monica configuration options to set in the
.env file
|
| options/nixos/services.schleuder.extraSettingsFile | YAML file to merge into the schleuder config at runtime
|
| options/nixos/services.gitlab.extraConfig | Extra options to be added under
production in
config/gitlab.yml, as a nix attribute
set
|
| options/nixos/boot.loader.systemd-boot.netbootxyz.sortKey | systemd-boot orders the menu entries by their sort keys,
so if you want something to appear after all the NixOS entries,
it should start with o or onwards
|
| options/nixos/services.lasuite-meet.livekit.keyFile | LiveKit key file holding one or multiple application secrets
|
| options/nixos/services.xserver.xkb.extraLayouts.<name>.typesFile | The path to the xkb types file
|
| options/nixos/services.mastodon.activeRecordEncryptionKeyDerivationSaltFile | This key must be set to enable the Active Record Encryption feature within
Rails that Mastodon uses to encrypt and decrypt some database attributes
|
| options/nixos/services.veilid.settings.core.network.routing_table.node_id | Base64-encoded public key for the node, used as the node's ID.
|
| options/nixos/services.dependency-track.settings."alpine.data.directory" | Defines the path to the data directory
|
| options/nixos/services.fedimintd.<name>.bitcoin.rpc.secretFile | If set the URL specified in bitcoin.rpc.url will get the content of this file added
as an URL password, so http://user@example.com will turn into http://user:SOMESECRET@example.com
|
| options/nixos/services.cloudflare-ddns.detectionTimeout | Timeout for detecting the public IP address.
|
| options/nixos/services.waagent.settings.Provisioning.Enable | Whether to enable provisioning functionality in the agent
|
| options/nixos/services.searx.environmentFile | Environment file (see systemd.exec(5) "EnvironmentFile=" section for the syntax) to define variables for Searx
|
| options/nixos/services.matrix-synapse.extraConfigFiles | Extra config files to include
|
| options/nixos/services.openssh.knownHosts.<name>.hostNames | A list of host names and/or IP numbers used for accessing
the host's ssh service
|
| options/nixos/services.dawarich.configureNginx | Configure nginx as a reverse proxy for dawarich
|
| options/nixos/services.maddy.tls.certificates | A list of attribute sets containing paths to TLS certificates and
keys
|
| options/nixos/services.dependency-track.oidc.teams.claim | Defines the name of the claim that contains group memberships or role assignments in the provider's userinfo endpoint
|
| options/nixos/services.chhoto-url.settings.hash_algorithm | The hash algorithm to use for passwords and API keys
|
| options/nixos/security.googleOsLogin.enable | Whether to enable Google OS Login
|
| options/home-manager/programs.firefoxpwa.profiles | Attribute set of profile options
|
| options/nixos/services.livekit.settings.rtc.use_external_ip | When set to true, attempts to discover the host's public IP via STUN
|
| options/nixos/boot.specialFileSystems.<name>.depends | List of paths that should be mounted before this one
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.settings | Attribute set of options for each extension
|
| options/nixos/services.slurm.enableSrunX11 | If enabled srun will accept the option "--x11" to allow for X11 forwarding
from within an interactive session or a batch job
|
| options/nixos/services.datadog-agent.checks | Configuration for all Datadog checks
|
| options/nixos/services.kerberos_server.settings.realms | The realm(s) to serve keys for.
|
| options/home-manager/programs.rclone.remotes.<name>.secrets | Sensitive configuration values such as passwords, API keys, and tokens
|
| options/nixos/boot.initrd.luks.reusePassphrases | When opening a new LUKS device try reusing last successful
passphrase
|
| options/nixos/boot.initrd.luks.devices.<name>.fido2.credentials | List of FIDO2 credential IDs
|
| options/nixos/services.multipath.devices.*.all_tg_pt | Set the 'all targets ports' flag when registering keys with mpathpersist
|
| options/nixos/services.agorakit.config | Agorakit configuration options to set in the
.env file
|
| options/nixos/services.bookstack.config | BookStack configuration options to set in the
.env file
|
| options/nixos/services.karakeep.environmentFile | An optional path to an environment file that will be used in the web and workers
services
|
| options/home-manager/wayland.windowManager.sway.config.floating.modifier | Modifier key or keys that can be used to drag floating windows.
|