| options/nixos/services.prometheus.exporters.fastly.configFile | Path to a fastly-exporter configuration file
|
| options/nixos/services.mackerel-agent.apiKeyFile | Path to file containing the Mackerel API key
|
| options/home-manager/programs.vscode.argvSettings | Configuration written to Visual Studio Code's
argv.json
|
| options/nixos/services.thanos.query.store.sd-files | Path to files that contain addresses of store API servers
|
| options/nixos/services.outline.utilsSecretFile | File path that contains the utility secret key
|
| options/nixos/services.home-assistant.configDir | The config directory, where your configuration.yaml is located.
|
| options/nixos/services.datadog-agent.extraConfig | Extra configuration options that will be merged into the
main config file datadog.yaml.
|
| options/home-manager/fonts.fontconfig.configFile.<name>.source | Config file to source
|
| options/nixos/services.printing.browsedConf | The contents of the configuration. file of the CUPS Browsed daemon
(cups-browsed.conf)
|
| options/nixos/services.netbird.clients | Attribute set of NetBird client daemons, by default each one will:
- be manageable using dedicated tooling:
netbird-<name> script,
NetBird - netbird-<name> graphical interface when appropriate (see ui.enable),
- run as a
netbird-<name>.service,
- listen for incoming remote connections on the port
51820 (openFirewall by default),
- manage the
netbird-<name> wireguard interface,
- use the /var/lib/netbird-/config.json configuration file,
- override /var/lib/netbird-/config.json with values from /etc/netbird-/config.d/*.json,
- (
hardened) be locally manageable by netbird-<name> system group,
With following caveats:
- multiple daemons will interfere with each other's DNS resolution of
netbird.cloud, but
should remain fully operational otherwise
|
| options/home-manager/programs.keepassxc.settings | Configuration written to
$XDG_CONFIG_HOME/keepassxc/keepassxc.ini
|
| options/nixos/virtualisation.fileSystems.<name>.encrypted.keyFile | Path to a keyfile used to unlock the backing encrypted
device
|
| options/nixos/services.rtorrent.configText | The content of rtorrent.rc
|
| options/nixos/services.mqtt2influxdb.mqtt.keyfile | Key file for MQTT
|
| options/nixos/services.peering-manager.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/home-manager/xdg.dataFile.<name>.enable | Whether this file should be generated
|
| options/nixos/services.filesender.database.passwordFile | A file containing the password corresponding to
services.filesender.database.user.
|
| options/home-manager/launchd.agents.<name>.config.LimitLoadToHosts | This configuration file only applies to the hosts listed with this key
|
| options/home-manager/programs.ne.menus | Menu configuration file for ne.
|
| options/nixos/services.filebeat.package | The filebeat package to use.
|
| options/darwin/security.sandbox.profiles | Definition of sandbox profiles.
|
| options/nixos/services.minetest-server.config | Settings to add to the minetest config file
|
| options/nixos/security.doas.extraRules | Define specific rules to be set in the
/etc/doas.conf file
|
| options/nixos/services.outline.secretKeyFile | File path that contains the application secret key
|
| options/home-manager/programs.watson.settings | Configuration written to
$XDG_CONFIG_HOME/watson/config on Linux or
$HOME/Library/Application Support/watson/config on Darwin
|
| options/nixos/security.pam.services.<name>.p11Auth | If set, keys listed in
~/.ssh/authorized_keys and
~/.eid/authorized_certificates
can be used to log in with the associated PKCS#11 tokens.
|
| options/nixos/services.thermald.configFile | The thermald manual configuration file
|
| options/nixos/services.postfix.masterConfig | An attribute set of service options, which correspond to the service
definitions usually done within the Postfix
master.cf file.
|
| options/nixos/services.couchdb.uriFile | This file contains the full URI that can be used to access this
instance of CouchDB
|
| options/nixos/fonts.fontconfig.localConf | System-wide customization file contents, has higher priority than
defaultFonts settings.
|
| options/home-manager/programs.amfora.bookmarks | Bookmarks file for amfora
|
| options/nixos/services.fail2ban.jails | The configuration of each Fail2ban “jail”
|
| options/nixos/services.biboumi.credentialsFile | Path to a configuration file to be merged with the settings
|
| options/nixos/programs.schroot.profiles | Custom configuration profiles for schroot.
|
| options/home-manager/programs.firefox.profiles | Attribute set of Firefox profiles.
|
| options/nixos/services.cfssl.metadata | Metadata file for root certificate presence
|
| options/nixos/services.supybot.plugins | Attribute set of additional plugins that will be symlinked to the
plugin subdirectory
|
| options/nixos/services.prometheus.remoteWrite.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| options/home-manager/programs.zellij.settings | Configuration written to
$XDG_CONFIG_HOME/zellij/config.kdl
|
| options/nixos/services.pairdrop.rtcConfig | Configuration for STUN/TURN servers
|
| options/nixos/boot.tmp.useZram | Whether to mount a zram device on /tmp during boot.
Large Nix builds can fail if the mounted zram device is not large enough
|
| options/nixos/services.discourse.backendSettings | Additional settings to put in the
discourse.conf file
|
| options/nixos/services.phpfpm.pools.<name>.phpOptions | "Options appended to the PHP configuration file php.ini used for this PHP-FPM pool."
|
| options/nixos/services.apcupsd.configText | Contents of the runtime configuration file, apcupsd.conf
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.file | Absolute path to the certificate to load
|
| options/nixos/services.mpd.settings.db_file | The path to MPD's database.
|
| options/nixos/services.sssd.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/home-manager/programs.dircolors.extraConfig | Extra lines added to .dir_colors file.
|
| options/home-manager/programs.vivid.filetypes | Filetype database for vivid
|
| options/nixos/services.znc.config | Configuration for ZNC, see
https://wiki.znc.in/Configuration for details
|
| options/nixos/services.prometheus.exporters.mysqld.configFile | Path to the services config file
|
| options/nixos/services.logrotate.configFile | Override the configuration file used by logrotate
|
| options/home-manager/programs.opencode.themes | Custom themes for opencode
|
| options/nixos/programs.zsh.histFile | Change history file.
|
| options/darwin/programs.zsh.histFile | Change history file.
|
| options/nixos/services.neo4j.https.sslPolicy | Neo4j SSL policy for HTTPS traffic
|
| options/home-manager/xdg.cacheFile.<name>.target | Path to target file relative to xdg.cacheHome.
|
| options/nixos/virtualisation.fileSystems.<name>.label | Label of the device
|
| options/nixos/boot.tmp.useTmpfs | Whether to mount a tmpfs on /tmp during boot.
Large Nix builds can fail if the mounted tmpfs is not large enough
|
| options/nixos/services.prometheus.exporters.pve.configFile | Path to the service's config file
|
| options/nixos/systemd.mounts.*.type | File system type.
|
| options/nixos/services.pangolin.settings | Additional attributes to be merged with the configuration options and written to Pangolin's config.yml file.
|
| options/nixos/services.syncplay.saltFile | Path to the file that contains the server salt
|
| options/nixos/programs.less.lessclose | When less closes a file opened in such a way, it will call another program, called the input postprocessor,
which may perform any desired clean-up action (such as deleting the replacement file created by LESSOPEN).
|
| options/home-manager/programs.aichat.settings | Configuration written to
$XDG_CONFIG_HOME/aichat/config.yaml
on Linux or on Darwin if xdg.enable is set, otherwise
~/Library/Application Support/aichat/config.yaml
|
| options/home-manager/launchd.agents.<name>.config.LimitLoadFromHosts | This configuration file only applies to hosts NOT listed with this key
|
| options/home-manager/wayland.windowManager.sway.config.bars.*.id | Specifies the bar ID for the configured bar instance
|
| options/nixos/services.nsd.zonefilesCheck | Whether to check mtime of all zone files on start and sighup.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.file | Absolute path to the certificate to load
|
| options/nixos/services.filesender.user | User under which filesender runs.
|
| options/nixos/services.ifm.dataDir | Directory to serve throught the file managing service
|
| options/nixos/services.mqtt2influxdb.mqtt.certfile | Certificate file for MQTT
|
| options/nixos/services.etcd.keyFile | Key file to use for clients
|
| options/nixos/services.vault-agent.instances.<name>.settings.pid_file | Path to use for the pid file.
|
| options/home-manager/programs.alot.hooks | Content of the hooks file.
|
| options/home-manager/xdg.stateFile.<name>.target | Path to target file relative to xdg.stateHome.
|
| options/darwin/fonts.packages | List of fonts to install into /Library/Fonts/Nix Fonts.
|
| options/nixos/networking.networkmanager.ensureProfiles.environmentFiles | Files to load as environment file
|
| options/nixos/services.postfix.settings.main.smtp_tls_CAfile | File containing CA certificates of root CAs trusted to sign either remote SMTP server certificates or intermediate CA certificates
|
| options/home-manager/programs.mullvad-vpn.settings | Written to XDG_CONFIG_HOME/Mullvad VPN/gui_settings.json or
~/Library/Application Support/Mullvad VPN/gui_settings.json
|
| options/nixos/services.headphones.configFile | Path to config file.
|
| options/home-manager/launchd.agents.<name>.config.LowPriorityIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O.
|
| options/home-manager/programs.floorp.profiles.<name>.name | Profile name.
|
| options/home-manager/services.kanshi.profiles.<name>.name | Profile name
|
| options/home-manager/services.colima.profiles.<name>.name | The profile's name.
|
| options/home-manager/programs.floorp.profiles.<name>.path | Profile path.
|
| options/nixos/hardware.deviceTree.overlays.*.dtsFile | Path to .dts overlay file, overlay is applied to
each .dtb file matching "compatible" of the overlay.
|
| options/nixos/services.strongswan.setup | A set of options for the ‘config setup’ section of the
ipsec.conf file
|
| options/nixos/fonts.fontDir.enable | Whether to create a directory with links to all fonts in
/run/current-system/sw/share/X11/fonts.
|
| options/home-manager/services.devilspie2.config | Content of file placed in the devilspie2 config directory.
|
| options/nixos/services.calibre-server.auth.userDb | Choose users database file to use for authentication
|
| options/home-manager/programs.thunderbird.profiles.<name>.extraConfig | Extra preferences to add to user.js.
|
| options/nixos/environment.etc.<name>.user | User name of file owner
|
| options/home-manager/programs.floorp.profiles.<name>.id | Profile ID
|
| options/nixos/services.k3s.extraKubeletConfig | Extra configuration to add to the kubelet's configuration file
|
| options/home-manager/services.podman.settings.policy | Signature verification policy file
|
| options/nixos/services.prometheus.exporters.snmp.environmentFile | EnvironmentFile as defined in systemd.exec(5)
|
| options/nixos/services.livekit.keyFile | LiveKit key file holding one or multiple application secrets
|
| options/nixos/services.gokapi.settingsFile | Path to config file to parse and append to settings
|
| options/nixos/virtualisation.fileSystems.<name>.autoFormat | If the device does not currently contain a filesystem (as
determined by blkid), then automatically
format it with the filesystem type specified in
fsType
|