| options/nixos/services.weblate.smtp.passwordFile | Location of a file containing the SMTP password
|
| options/nixos/security.apparmor.policies.<name>.path | A path of a profile file to include
|
| options/nixos/services.duplicati.dataDir | The directory where Duplicati stores its data files.
If left as the default value this directory will automatically be created
before the Duplicati server starts, otherwise you are responsible for ensuring
the directory exists with appropriate ownership and permissions.
|
| options/nixos/services.tlsrpt.collectd.settings.socketmode | Permissions on the UNIX socket.
|
| options/nixos/services.mediawiki.uploadsDir | This directory is used for uploads of pictures
|
| options/nixos/services.evremap.settings.device_name | The name of the device that should be remapped
|
| options/nixos/services.canaille.smtpPasswordFile | File containing the SMTP password
|
| options/nixos/services.canaille.secretKeyFile | File containing the Flask secret key
|
| options/nixos/services.borgbackup.repos.<name>.path | Where to store the backups
|
| options/nixos/services.tlsrpt.configurePostfix | Whether to configure permissions to allow integration with Postfix.
|
| options/nixos/services.mpd.musicDirectory | The directory or NFS/SMB network share where MPD reads music from
|
| options/nixos/services.weblate.djangoSecretKeyFile | Location of the Django secret key
|
| options/home-manager/services.psd.package | The profile-sync-daemon package to use.
|
| options/nixos/services.postgresql.dataDir | The data directory for PostgreSQL
|
| options/darwin/services.postgresql.dataDir | The data directory for PostgreSQL
|
| options/nixos/services.roundcube.database.host | Host of the postgresql server
|
| options/nixos/services.nominatim.database.apiUser | Postgresql database user with read-only permissions used for Nominatim
web API service.
|
| options/nixos/services.trickster.profiler-port | Port that the /debug/pprof endpoint will listen on.
|
| options/nixos/services.jmusicbot.stateDir | The directory where config.txt and serversettings.json is saved
|
| options/nixos/services.snapper.configs.<name>.ALLOW_USERS | List of users allowed to operate with the config. "root" is always
implicitly included
|
| options/nixos/services.nominatim.database.host | Host of the postgresql server
|
| options/nixos/services.snapper.configs.<name>.ALLOW_GROUPS | List of groups allowed to operate with the config
|
| options/home-manager/manual.json.enable | Whether to install a JSON formatted list of all Home Manager
options
|
| options/nixos/services.canaille.jwtPrivateKeyFile | File containing the JWT private key
|
| options/nixos/i18n.inputMethod.fcitx5.settings.inputMethod | The input method configure in profile file in ini format.
|
| options/home-manager/i18n.inputMethod.fcitx5.settings.inputMethod | The input method configure in profile file in ini format.
|
| options/nixos/services.immichframe.settings.Accounts.*.ApiKeyFile | File containing an API key to talk to the Immich server
|
| options/nixos/services.wordpress.sites.<name>.uploadsDir | This directory is used for uploads of pictures
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.readPermissions | The read permissions to include for this token
|
| options/nixos/services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.profile | Named AWS profile used to connect to the API.
|
| options/nixos/services.reaction.runAsRoot | Whether to run reaction as root
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.writePermissions | The read permissions to include for this token
|
| options/nixos/services.immichframe.settings.Accounts.*.ApiKey | API key to talk to the Immich server
|
| options/nixos/services.neo4j.directories.certificates | Directory for storing certificates to be used by Neo4j for
TLS connections
|
| options/nixos/networking.networkmanager.ensureProfiles.profiles.<name>.connection.id | This is the name that will be displayed by NetworkManager and GUIs.
|
| options/nixos/services.mpd.playlistDirectory | The directory where MPD stores playlists
|
| options/nixos/networking.networkmanager.ensureProfiles.profiles.<name>.connection.type | The connection type defines the connection kind, like vpn, wireguard, gsm, wifi and more.
|
| options/nixos/services.pdfding.consume.enable | Bulk PDF import from consume directory
|
| options/nixos/services.neo4j.directories.data | Path of the data directory
|
| options/nixos/services.rtorrent.dataPermissions | Unix Permissions in octal on the rtorrent directory.
|
| options/nixos/services.patroni.postgresqlDataDir | The data directory for PostgreSQL
|
| options/nixos/services.snapper.configs.<name>.SUBVOLUME | Path of the subvolume or mount point
|
| options/nixos/services.tt-rss.auth.autoLogin | Automatically login user on remote or other kind of externally supplied
authentication, otherwise redirect to login form as normal
|
| options/nixos/services.healthchecks.dataDir | The directory used to store all data for healthchecks.
If left as the default value this directory will automatically be created before
the healthchecks server starts, otherwise you are responsible for ensuring the
directory exists with appropriate ownership and permissions.
|
| options/nixos/services.transmission.downloadDirPermissions | If not null, is used as the permissions
set by system.activationScripts.transmission-daemon
on the directories services.transmission.settings.download-dir,
services.transmission.settings.incomplete-dir.
and services.transmission.settings.watch-dir
|
| options/nixos/services.osquery.flags.logger_path | Base directory used for logging.
If left as the default value, this directory will be automatically created before the
service starts, otherwise you are responsible for ensuring the directory exists with
the appropriate ownership and permissions.
|
| options/nixos/services.neo4j.ssl.policies.<name>.revokedDir | Path to directory of CRLs (Certificate Revocation Lists) in
PEM format
|
| options/nixos/services.mpd.settings.music_directory | The directory or URI where MPD reads music from
|
| options/nixos/services.varnish.listen.*.address | If given an IP address, it can be a host name ("localhost"), an IPv4 dotted-quad
("127.0.0.1") or an IPv6 address enclosed in square brackets ("[::1]").
(VCL4.1 and higher) If given an absolute Path ("/path/to/listen.sock") or "@"
followed by the name of an abstract socket ("@myvarnishd") accept connections
on a Unix domain socket
|
| options/nixos/services.postfixadmin.database.host | Host of the postgresql server
|
| options/nixos/services.invoiceplane.sites.<name>.stateDir | This directory is used for uploads of attachments and cache
|
| options/nixos/services.geoipupdate.settings.DatabaseDirectory | The directory to store the database files in
|
| options/nixos/services.kmonad.keyboards.<name>.extraGroups | Extra permission groups to attach to the KMonad instance for
this keyboard
|
| options/nixos/services.neo4j.ssl.policies.<name>.trustedDir | Path to directory of X.509 certificates in PEM format for
trusted parties
|
| options/nixos/services.neo4j.ssl.policies.<name>.baseDirectory | The mandatory base directory for cryptographic objects of this
policy
|
| options/nixos/services.hedgedoc.settings.allowGravatar | Whether to enable Libravatar as
profile picture source on your instance
|
| options/nixos/services.bepasty.servers.<name>.defaultPermissions | default permissions for all unauthenticated accesses.
|
| options/nixos/services.uwsgi.capabilities | Grant capabilities to the uWSGI instance
|
| options/nixos/services.osquery.flags.database_path | Path used for the database file.
If left as the default value, this directory will be automatically created before the
service starts, otherwise you are responsible for ensuring the directory exists with
the appropriate ownership and permissions.
|
| options/home-manager/xdg.portal.extraPortals | List of additional portals that should be added to the environment
|
| options/home-manager/services.colima.dockerPackage | The docker package to use
|
| options/nixos/services.archisteamfarm.dataDir | The ASF home directory used to store all data
|
| options/nixos/services.tuned.ppdSettings.main.default | Default PPD profile.
|
| options/nixos/services.libinput.mouse.accelSpeed | Cursor acceleration (how fast speed increases from minSpeed to maxSpeed)
|
| options/nixos/virtualisation.incus.enable | Whether to enable incusd, a daemon that manages containers and virtual machines
|
| options/nixos/services.freshrss.api.enable | Whether to enable API access for mobile apps and third-party clients (Google Reader API and Fever API)
|
| options/nixos/services.prometheus.exporters.sabnzbd.servers.*.apiKeyFile | The path to a file containing the API key
|
| options/nixos/services.outline.slackAuthentication | To configure Slack auth, you'll need to create an Application at
https://api.slack.com/apps
When configuring the Client ID, add a redirect URL under "OAuth & Permissions"
to https://[publicUrl]/auth/slack.callback.
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.passwordFile | Specifies the path to a file containing the
clear text password for the MQTT user
|
| options/nixos/services.cloudflare-ddns.credentialsFile | Path to a file containing the Cloudflare API authentication token
|
| options/nixos/services.mpd.settings.playlist_directory | The directory where MPD stores playlists
|
| options/nixos/system.activatable | Whether to add the activation script to the system profile
|
| options/nixos/services.matrix-tuwunel.settings.global.unix_socket_perms | The default permissions (in octal) to create the UNIX socket with.
|
| options/nixos/services.netbird.tunnels.<name>.hardened | Hardened service:
- runs as a dedicated user with minimal set of permissions (see caveats),
- restricts daemon configuration socket access to dedicated user group
(you can grant access to it with
users.users."<user>".extraGroups = [ netbird-‹name› ]),
Even though the local system resources access is restricted:
CAP_NET_RAW, CAP_NET_ADMIN and CAP_BPF still give unlimited network manipulation possibilites,
- older kernels don't have
CAP_BPF and use CAP_SYS_ADMIN instead,
Known security features that are not (yet) integrated into the module:
- 2024-02-14:
rosenpass is an experimental feature configurable solely
through --enable-rosenpass flag on the netbird up command,
see the docs
|
| options/nixos/services.netbird.clients.<name>.hardened | Hardened service:
- runs as a dedicated user with minimal set of permissions (see caveats),
- restricts daemon configuration socket access to dedicated user group
(you can grant access to it with
users.users."<user>".extraGroups = [ netbird-‹name› ]),
Even though the local system resources access is restricted:
CAP_NET_RAW, CAP_NET_ADMIN and CAP_BPF still give unlimited network manipulation possibilites,
- older kernels don't have
CAP_BPF and use CAP_SYS_ADMIN instead,
Known security features that are not (yet) integrated into the module:
- 2024-02-14:
rosenpass is an experimental feature configurable solely
through --enable-rosenpass flag on the netbird up command,
see the docs
|
| options/nixos/services.traefik.supplementaryGroups | Additional groups under which Traefik runs
|
| options/nixos/services.mobilizon.settings.":mobilizon"."Mobilizon.Storage.Repo".socket_dir | Path to the postgres socket directory
|
| options/nixos/virtualisation.xen.store.settings.conflict.rateLimitIsAggregate | If the conflict.rateLimitIsAggregate option is true, then after each
tick one point of conflict-credit is given to just one domain: the
one at the front of the queue
|
| options/nixos/containers.<name>.path | As an alternative to specifying
config, you can specify the path to
the evaluated NixOS system configuration, typically a
symlink to a system profile.
|
| options/nixos/services.cloudflared.certificateFile | Account certificate file, necessary to create, delete and manage tunnels
|
| options/nixos/services.libinput.mouse.accelStepScroll | Sets the step between the points of the scroll acceleration function
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.inherit | Grants the user created inherit permissions
|
| options/nixos/services.libinput.mouse.accelStepMotion | Sets the step between the points of the (pointer) motion acceleration function
|
| options/nixos/services.libinput.touchpad.accelSpeed | Cursor acceleration (how fast speed increases from minSpeed to maxSpeed)
|
| options/nixos/services.dependency-track.settings."alpine.oidc.team.synchronization" | This option will ensure that team memberships for OpenID Connect users are dynamic and
synchronized with membership of OpenID Connect groups or assigned roles
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.hashedPasswordFile | Specifies the path to a file containing the
hashed password for the MQTT user
|
| options/nixos/services.rke2.cisHardening | Enable CIS Hardening for RKE2
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.createdb | Grants the user, created by the ensureUser attr, createdb permissions
|
| options/nixos/services.libinput.mouse.accelPointsScroll | Sets the points of the scroll acceleration function
|
| options/home-manager/services.psd.browsers | A list of browsers to sync
|
| options/nixos/services.libinput.mouse.accelPointsMotion | Sets the points of the (pointer) motion acceleration function
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.login | Grants the user, created by the ensureUser attr, login permissions
|
| options/nixos/services.matrix-continuwuity.settings.global.unix_socket_perms | The default permissions (in octal) to create the UNIX socket with.
|
| options/nixos/services.nitter.preferences.hideBanner | Hide profile banner.
|
| options/nixos/services.hardware.openrgb.startupProfile | The profile file to load from "/var/lib/OpenRGB" at startup.
|
| options/nixos/services.libinput.mouse.accelStepFallback | Sets the step between the points of the fallback acceleration function
|
| options/nixos/hardware.nvidia-container-toolkit.mounts | Mounts to be added to every container under the Nvidia CDI profile.
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.bypassrls | Grants the user, created by the ensureUser attr, replication permissions
|
| options/nixos/services.cloudflared.tunnels.<name>.certificateFile | Account certificate file, necessary to create, delete and manage tunnels
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.superuser | Grants the user, created by the ensureUser attr, superuser permissions
|