| options/nixos/fileSystems | The file systems to be mounted
|
| options/nixos/fileSystems.<name>.autoResize | If set, the filesystem is grown to its maximum size before
being mounted. (This is typically the size of the containing
partition.) This is currently only supported for ext2/3/4
filesystems that are mounted during early boot.
|
| options/nixos/fileSystems.<name>.encrypted.label | Label of the unlocked encrypted device
|
| options/nixos/services.btrfs.autoScrub.fileSystems | List of paths to btrfs filesystems to regularly call btrfs scrub on
|
| options/nixos/services.bcachefs.autoScrub.fileSystems | List of paths to bcachefs filesystems to regularly call bcachefs scrub on
|
| options/nixos/fileSystems.<name>.encrypted.keyFile | Path to a keyfile used to unlock the backing encrypted
device
|
| options/nixos/services.orangefs.client.fileSystems | The orangefs file systems to be mounted
|
| options/nixos/virtualisation.fileSystems.<name>.autoResize | If set, the filesystem is grown to its maximum size before
being mounted. (This is typically the size of the containing
partition.) This is currently only supported for ext2/3/4
filesystems that are mounted during early boot.
|
| options/nixos/virtualisation.fileSystems.<name>.encrypted.label | Label of the unlocked encrypted device
|
| options/nixos/virtualisation.fileSystems.<name>.encrypted.keyFile | Path to a keyfile used to unlock the backing encrypted
device
|
| options/nixos/fileSystems.<name>.noCheck | Disable running fsck on this filesystem.
|
| options/nixos/fileSystems.<name>.enable | Whether to enable the filesystem mount.
|
| options/nixos/fileSystems.<name>.fsType | Type of the file system
|
| options/nixos/fileSystems.<name>.label | Label of the device
|
| options/nixos/fileSystems.<name>.mountPoint | Location where the file system will be mounted
|
| options/nixos/fileSystems.<name>.autoFormat | If the device does not currently contain a filesystem (as
determined by blkid), then automatically
format it with the filesystem type specified in
fsType
|
| options/nixos/fileSystems.<name>.stratis.poolUuid | UUID of the stratis pool that the fs is located in
This is only relevant if you are using stratis.
|
| options/nixos/fileSystems.<name>.encrypted.blkDev | Location of the backing encrypted device.
|
| options/nixos/fileSystems.<name>.overlay.workdir | The path to the workdir
|
| options/nixos/fileSystems.<name>.encrypted.enable | The block device is backed by an encrypted one, adds this device as a initrd luks entry.
|
| options/nixos/fileSystems.<name>.device | The device as passed to mount
|
| options/nixos/fileSystems.<name>.options | Options used to mount the file system
|
| options/nixos/fileSystems.<name>.depends | List of paths that should be mounted before this one
|
| options/nixos/fileSystems.<name>.neededForBoot | If set, this file system will be mounted in the initial ramdisk
|
| options/nixos/fileSystems.<name>.overlay.upperdir | The path to the upperdir
|
| options/nixos/fileSystems.<name>.overlay.lowerdir | The list of path(s) to the lowerdir(s)
|
| options/nixos/boot.zfs.extraPools | Name or GUID of extra ZFS pools that you wish to import during boot
|
| options/nixos/fileSystems.<name>.overlay.useStage1BaseDirectories | If enabled, lowerdir, upperdir and workdir will be prefixed with /sysroot
|
| options/nixos/services.orangefs.server.fileSystems | These options will create the <FileSystem> sections of config file.
|
| options/nixos/services.orangefs.server.fileSystems.<name>.id | File system ID (must be unique within configuration).
|
| options/nixos/services.orangefs.client.fileSystems.*.target | Target URL
|
| options/nixos/services.orangefs.client.fileSystems.*.mountPoint | Mount point.
|
| options/nixos/services.orangefs.client.fileSystems.*.options | Mount options
|
| options/nixos/services.orangefs.server.fileSystems.<name>.troveSyncData | Sync data.
|
| options/nixos/services.beesd.filesystems | BTRFS filesystems to run block-level deduplication on.
|
| options/nixos/services.orangefs.server.fileSystems.<name>.troveSyncMeta | Sync meta data.
|
| options/nixos/services.orangefs.server.fileSystems.<name>.rootHandle | File system root ID.
|
| options/nixos/services.orangefs.server.fileSystems.<name>.extraConfig | Extra config for <FileSystem> section.
|
| options/nixos/virtualisation.fileSystems.<name>.noCheck | Disable running fsck on this filesystem.
|
| options/nixos/services.orangefs.server.fileSystems.<name>.extraStorageHints | Extra config for <StorageHints> section.
|
| options/nixos/virtualisation.fileSystems.<name>.enable | Whether to enable the filesystem mount.
|
| options/nixos/virtualisation.fileSystems.<name>.fsType | Type of the file system
|
| options/nixos/virtualisation.fileSystems.<name>.label | Label of the device
|
| options/nixos/virtualisation.fileSystems.<name>.mountPoint | Location where the file system will be mounted
|
| options/nixos/virtualisation.fileSystems.<name>.autoFormat | If the device does not currently contain a filesystem (as
determined by blkid), then automatically
format it with the filesystem type specified in
fsType
|
| options/nixos/virtualisation.fileSystems.<name>.stratis.poolUuid | UUID of the stratis pool that the fs is located in
This is only relevant if you are using stratis.
|
| options/nixos/virtualisation.fileSystems.<name>.encrypted.blkDev | Location of the backing encrypted device.
|
| options/nixos/virtualisation.fileSystems.<name>.overlay.workdir | The path to the workdir
|
| options/nixos/virtualisation.fileSystems | The file systems to be mounted
|
| options/nixos/virtualisation.fileSystems.<name>.encrypted.enable | The block device is backed by an encrypted one, adds this device as a initrd luks entry.
|
| options/nixos/virtualisation.fileSystems.<name>.device | The device as passed to mount
|
| options/nixos/virtualisation.fileSystems.<name>.options | Options used to mount the file system
|
| options/nixos/virtualisation.fileSystems.<name>.depends | List of paths that should be mounted before this one
|
| options/nixos/virtualisation.fileSystems.<name>.neededForBoot | If set, this file system will be mounted in the initial ramdisk
|
| options/nixos/services.beesd.filesystems.<name>.workDir | Name (relative to the root of the filesystem) of the subvolume where
the hash table will be stored.
|
| options/nixos/services.beesd.filesystems.<name>.spec | Description of how to identify the filesystem to be duplicated by this
instance of bees
|
| options/nixos/virtualisation.fileSystems.<name>.overlay.upperdir | The path to the upperdir
|
| options/nixos/virtualisation.fileSystems.<name>.overlay.lowerdir | The list of path(s) to the lowerdir(s)
|
| options/nixos/services.beesd.filesystems.<name>.extraOptions | Extra command-line options passed to the daemon
|
| options/nixos/services.beesd.filesystems.<name>.verbosity | Log verbosity (syslog keyword/level).
|
| options/nixos/virtualisation.fileSystems.<name>.overlay.useStage1BaseDirectories | If enabled, lowerdir, upperdir and workdir will be prefixed with /sysroot
|
| options/nixos/services.beesd.filesystems.<name>.hashTableSizeMB | Hash table size in MB; must be a multiple of 16
|
| options/nixos/programs.udevil.enable | Whether to enable udevil, to mount filesystems without password.
|
| options/nixos/security.pam.mount.enable | Enable PAM mount system to mount filesystems on user login.
|
| options/nixos/services.autofs.enable | Mount filesystems on demand
|
| options/nixos/boot.initrd.postMountCommands | Shell commands to be executed immediately after the stage 1
filesystems have been mounted.
|
| options/nixos/services.btrfs.autoScrub.limit | The scrub throughput limit applied on all scrubbed filesystems
|
| options/nixos/boot.initrd.checkJournalingFS | Whether to run fsck on journaling filesystems such as ext3.
|
| options/nixos/security.pam.services.<name>.pamMount | Enable PAM mount (pam_mount) system to mount filesystems on user login.
|
| options/nixos/boot.initrd.systemd.root | Controls how systemd will interpret the root FS in initrd
|
| options/nixos/swapDevices.*.encrypted.label | Label of the unlocked encrypted device
|
| options/nixos/boot.loader.grub.enableCryptodisk | Enable support for encrypted partitions
|
| options/nixos/services.btrfs.autoScrub.interval | Systemd calendar expression for when to scrub btrfs filesystems
|
| options/nixos/services.cachefilesd.enable | Whether to enable cachefilesd network filesystems caching daemon.
|
| packages/nixpkgs/fatcat | FAT filesystems explore, extract, repair, and forensic tool |
| options/nixos/programs.schroot.profiles.<name>.fstab | A file in the format described in fstab(5), used to mount filesystems inside the chroot
|
| options/nixos/services.hadoop.hbase.rootdir | This option will set "hbase.rootdir" in hbase-site.xml and determine
the directory shared by region servers and into which HBase persists
|
| options/nixos/services.bcachefs.autoScrub.interval | Systemd calendar expression for when to scrub bcachefs filesystems
|
| options/nixos/swapDevices.*.encrypted.keyFile | Path to a keyfile used to unlock the backing encrypted
device
|
| options/nixos/security.pam.mount.additionalSearchPaths | Additional programs to include in the search path of pam_mount
|
| options/nixos/boot.supportedFilesystems | Names of supported filesystem types, or an attribute set of file system types
and their state
|
| options/nixos/boot.initrd.supportedFilesystems | Names of supported filesystem types, or an attribute set of file system types
and their state
|
| packages/nixpkgs/fuse2 | Library that allows filesystems to be implemented in user space |
| packages/nixpkgs/fuse | Library that allows filesystems to be implemented in user space |
| packages/nixpkgs/ciel | Tool for controlling AOSC OS packaging environments using multi-layer filesystems and containers |
| packages/nixpkgs/fuse3 | Library that allows filesystems to be implemented in user space |
| options/nixos/virtualisation.useDefaultFilesystems | If enabled, the boot disk of the virtual machine will be
formatted and mounted with the default filesystems for
testing
|
| packages/nixpkgs/syft | CLI tool and library for generating a Software Bill of Materials from container images and filesystems |
| packages/nixpkgs/grype | Vulnerability scanner for container images and filesystems |
| packages/nixpkgs/xeol | Scanner for end-of-life (EOL) software and dependencies in container images, filesystems, and SBOMs |
| packages/nixpkgs/sshfs | FUSE-based filesystem that allows remote filesystems to be mounted over SSH |
| packages/nixpkgs/btrfs-snap | Create and maintain the history of snapshots of btrfs filesystems |
| packages/nixpkgs/gigolo | Frontend to easily manage connections to remote filesystems |
| packages/nixpkgs/sshfs-fuse | FUSE-based filesystem that allows remote filesystems to be mounted over SSH |
| packages/nixpkgs/hot-resize | Tool for hot resizing disk partitions and filesystems without rebooting |
| packages/nixpkgs/xfce.gigolo | Frontend to easily manage connections to remote filesystems |
| packages/nixpkgs/gfs2-utils | Tools for creating, checking and working with gfs2 filesystems |
| packages/nixpkgs/cifs-utils | Tools for managing Linux CIFS client filesystems |
| packages/nixpkgs/chunkfs | FUSE filesystems for viewing chunksync-style directory trees as a block device and vice versa |
| packages/nixpkgs/ksmbd-tools | Userspace utilities for the ksmbd kernel SMB server |