| launchd.agents.<name>.serviceConfig.QueueDirectories | Much like the WatchPaths option, this key will watch the paths for modifications
|
| services.gitlab-runner.services.<name>.dockerAllowedServices | Whitelist allowed services.
|
| services.buildkite-agents.<name>.runtimePackages | Add programs to the buildkite-agent environment
|
| security.sandbox.profiles.<name>.closure | List of store paths to make accessible.
|
| launchd.agents.<name>.serviceConfig.ProcessType | This optional key describes, at a high level, the intended purpose of the job
|
| launchd.agents.<name>.serviceConfig.ThrottleInterval | This key lets one override the default throttling policy imposed on jobs by launchd
|
| launchd.user.agents.<name>.environment | Environment variables passed to the service's processes.
|
| launchd.agents.<name>.environment | Environment variables passed to the service's processes.
|
| services.github-runners.<name>.extraEnvironment | Extra environment variables to set for the runner, as an attrset.
|
| launchd.user.agents.<name>.serviceConfig.Disabled | This optional key is used as a hint to launchctl(1) that it should not submit this job to launchd when
loading a job or jobs
|
| launchd.daemons.<name>.serviceConfig.HardResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| launchd.daemons.<name>.serviceConfig.SoftResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| system.activationScripts.<name>.source | Path of the source file.
|
| launchd.daemons.<name>.serviceConfig.QueueDirectories | Much like the WatchPaths option, this key will watch the paths for modifications
|
| environment.userLaunchAgents.<name>.text | Text of the file.
|
| launchd.user.agents.<name>.serviceConfig.LowPriorityBackgroundIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O when the process is throttled with the Darwin-background classification.
|
| environment.launchDaemons.<name>.text | Text of the file.
|
| launchd.daemons.<name>.serviceConfig.ThrottleInterval | This key lets one override the default throttling policy imposed on jobs by launchd
|
| launchd.daemons.<name>.serviceConfig.ProcessType | This optional key describes, at a high level, the intended purpose of the job
|
| services.github-runners.<name>.ephemeral | If enabled, causes the following behavior:
- Passes the
--ephemeral flag to the runner configuration script
- De-registers and stops the runner with GitHub after it has processed one job
- Restarts the service after its successful exit
- On start, wipes the state directory and configures a new runner
You should only enable this option if tokenFile points to a file which contains a
personal access token (PAT)
|
| launchd.agents.<name>.serviceConfig.Disabled | This optional key is used as a hint to launchctl(1) that it should not submit this job to launchd when
loading a job or jobs
|
| launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| launchd.user.agents.<name>.serviceConfig.HardResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| launchd.agents.<name>.serviceConfig.LowPriorityBackgroundIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O when the process is throttled with the Darwin-background classification.
|
| system.activationScripts.<name>.enable | Whether this file should be generated
|
| environment.launchAgents.<name>.source | Path of the source file.
|
| launchd.agents.<name>.serviceConfig.SoftResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| launchd.agents.<name>.serviceConfig.HardResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| networking.wg-quick.interfaces.<name>.dns | List of DNS servers for this interface.
|
| launchd.daemons.<name>.environment | Environment variables passed to the service's processes.
|
| networking.computerName | The user-friendly name for the system, set in System Preferences > Sharing > Computer Name
|
| launchd.user.agents.<name>.serviceConfig.inetdCompatibility | The presence of this key specifies that the daemon expects to be run as if it were launched from inetd.
|
| networking.wg-quick.interfaces.<name>.mtu | MTU to set for this interface, automatically set if not specified
|
| networking.wg-quick.interfaces.<name>.preUp | List of commands to run before interface setup.
|
| launchd.daemons.<name>.serviceConfig.Disabled | This optional key is used as a hint to launchctl(1) that it should not submit this job to launchd when
loading a job or jobs
|
| launchd.daemons.<name>.serviceConfig.LowPriorityBackgroundIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O when the process is throttled with the Darwin-background classification.
|
| launchd.user.agents.<name>.serviceConfig.EnvironmentVariables | This optional key is used to specify additional environment variables to be set before running the
job.
|
| services.gitlab-runner.services.<name>.requestConcurrency | Limit number of concurrent requests for new jobs from GitLab.
|
| launchd.user.agents.<name>.serviceConfig.EnableTransactions | This flag instructs launchd that the job promises to use vproc_transaction_begin(3) and
vproc_transaction_end(3) to track outstanding transactions that need to be reconciled before the
process can safely terminate
|
| launchd.daemons.<name>.serviceConfig.HardResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| launchd.daemons.<name>.serviceConfig.SoftResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| launchd.agents.<name>.serviceConfig.inetdCompatibility | The presence of this key specifies that the daemon expects to be run as if it were launched from inetd.
|
| environment.launchAgents.<name>.enable | Whether this file should be generated
|
| networking.wg-quick.interfaces.<name>.postUp | List of commands to run after interface setup.
|
| environment.userLaunchAgents.<name>.source | Path of the source file.
|
| security.sandbox.profiles.<name>.allowSystemPaths | Whether to allow read access to FHS paths like /etc and /var.
|
| networking.wg-quick.interfaces.<name>.preDown | List of commands to run before interface shutdown.
|
| launchd.agents.<name>.serviceConfig.EnvironmentVariables | This optional key is used to specify additional environment variables to be set before running the
job.
|
| environment.launchDaemons.<name>.source | Path of the source file.
|
| networking.wg-quick.interfaces.<name>.peers | List of peers associated with this interface.
|
| launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| launchd.user.agents.<name>.serviceConfig.HardResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| security.sandbox.profiles.<name>.readablePaths | List of paths that should be read-only inside the sandbox.
|
| launchd.user.agents.<name>.serviceConfig.StartCalendarInterval | This optional key causes the job to be started every calendar interval as specified
|
| launchd.agents.<name>.serviceConfig.EnableTransactions | This flag instructs launchd that the job promises to use vproc_transaction_begin(3) and
vproc_transaction_end(3) to track outstanding transactions that need to be reconciled before the
process can safely terminate
|
| launchd.user.agents.<name>.serviceConfig.inetdCompatibility.Wait | This flag corresponds to the "wait" or "nowait" option of inetd
|
| security.sandbox.profiles.<name>.writablePaths | List of paths that should be read/write inside the sandbox.
|
| networking.wg-quick.interfaces.<name>.postDown | List of commands to run after interface shutdown
|
| launchd.agents.<name>.serviceConfig.SoftResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| launchd.agents.<name>.serviceConfig.HardResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| launchd.daemons.<name>.serviceConfig.inetdCompatibility | The presence of this key specifies that the daemon expects to be run as if it were launched from inetd.
|
| services.buildkite-agents.<name>.hooks.environment | The environment hook will run before all other commands, and can be used
to set up secrets, data, etc
|
| users.users.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| services.gitlab-runner.services.<name>.registrationFlags | Extra command-line flags passed to
gitlab-runner register
|
| environment.userLaunchAgents.<name>.enable | Whether this file should be generated
|
| launchd.agents.<name>.serviceConfig.inetdCompatibility.Wait | This flag corresponds to the "wait" or "nowait" option of inetd
|
| users.users.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| launchd.daemons.<name>.serviceConfig.EnvironmentVariables | This optional key is used to specify additional environment variables to be set before running the
job.
|
| environment.launchDaemons.<name>.enable | Whether this file should be generated
|
| launchd.agents.<name>.serviceConfig.StartCalendarInterval | This optional key causes the job to be started every calendar interval as specified
|
| launchd.daemons.<name>.serviceConfig.EnableTransactions | This flag instructs launchd that the job promises to use vproc_transaction_begin(3) and
vproc_transaction_end(3) to track outstanding transactions that need to be reconciled before the
process can safely terminate
|
| launchd.daemons.<name>.serviceConfig.SoftResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| launchd.daemons.<name>.serviceConfig.HardResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| services.buildkite-agents | Attribute set of buildkite agents
|
| launchd.daemons.<name>.serviceConfig.inetdCompatibility.Wait | This flag corresponds to the "wait" or "nowait" option of inetd
|
| programs.ssh.knownHosts | The set of system-wide known SSH hosts
|
| launchd.daemons.<name>.serviceConfig.StartCalendarInterval | This optional key causes the job to be started every calendar interval as specified
|
| networking.wg-quick.interfaces.<name>.listenPort | Port to listen on, randomly selected if not specified.
|
| networking.wg-quick.interfaces.<name>.address | List of IP addresses for this interface.
|
| services.gitlab-runner.services.<name>.environmentVariables | Custom environment variables injected to build environment
|
| networking.wg-quick.interfaces.<name>.table | Controls the routing table to which routes are added
|
| services.gitlab-runner.services.<name>.registrationConfigFile | Absolute path to a file with environment variables
used for gitlab-runner registration
|
| networking.wg-quick.interfaces.<name>.peers.*.publicKey | The public key for this peer.
|
| networking.wg-quick.interfaces.<name>.privateKeyFile | Path to file containing this interface's private key.
|
| security.sandbox.profiles.<name>.allowNetworking | Whether to allow network access inside the sandbox.
|
| services.github-runners | Multiple GitHub Runners
|
| networking.fqdn | The fully qualified domain name (FQDN) of this host
|
| networking.localHostName | The local hostname, or local network name, is displayed beneath the computer's name at the
top of the Sharing preferences pane
|
| networking.wg-quick.interfaces.<name>.peers.*.allowedIPs | List of IP addresses associated with this peer.
|
| networking.wg-quick.interfaces.<name>.autostart | Whether to bring up this interface automatically during boot.
|
| networking.fqdnOrHostName | Either the fully qualified domain name (FQDN), or just the host name if
it does not exists
|
| networking.wg-quick.interfaces.<name>.peers.*.endpoint | IP and port to connect to this peer at.
|
| security.sandbox.profiles.<name>.allowLocalNetworking | Whether to allow localhost network access inside the sandbox.
|
| homebrew.taps | List of Homebrew formula repositories to tap
|
| homebrew.brews | List of Homebrew formulae to install
|
| homebrew.casks | List of Homebrew casks to install
|
| networking.wg-quick.interfaces.<name>.peers.*.presharedKeyFile | Optional, path to file containing the pre-shared key for this peer.
|
| services.gitlab-runner.sentryDSN | Data Source Name for tracking of all system level errors to Sentry.
|
| services.synergy.client.screenName | Use the given name instead of the hostname to identify
ourselves to the server.
|
| services.synergy.server.screenName | Use the given name instead of the hostname to identify
this screen in the configuration.
|