| services.autossh.sessions.*.user | Name of the user the AutoSSH session should run as
|
| services.synergy.client.screenName | Use the given name instead of the hostname to identify
ourselves to the server.
|
| services.synergy.server.screenName | Use the given name instead of the hostname to identify
this screen in the configuration.
|
| system.defaults.finder._FXSortFoldersFirst | Keep folders on top when sorting by name
|
| services.postgresql.identMap | Defines the mapping from system users to database users
|
| nixpkgs.flake.source | The path to the nixpkgs sources used to build the system
|
| system.defaults.finder._FXSortFoldersFirstOnDesktop | Keep folders on top when sorting by name on the desktop
|
| services.postgresql.ensureUsers | Ensures that the specified users exist and have at least the ensured permissions
|
| services.aerospace.settings.on-window-detected.*."if".workspace | The workspace name to match (optional).
|
| system.defaults.loginwindow.SHOWFULLNAME | Apple menu > System Preferences > Users and Groups > Login Options
Displays login window as a name and password field instead of a list of users
|
| services.aerospace.settings.workspace-to-monitor-force-assignment | Map workspaces to specific monitors
|
| nix.settings.sandbox | If set, Nix will perform builds in a sandboxed environment that it
will set up automatically for each build
|
| nix.nixPath | The default Nix expression search path, used by the Nix
evaluator to look up paths enclosed in angle brackets
(e.g. <nixpkgs>)
|
| system.darwinLabel | Label to be used in the names of generated outputs.
|
| services.autossh.sessions | List of AutoSSH sessions to start as launchd daemon
|
| networking.dns | The list of dns servers used when resolving domain names.
|
| networking.search | The list of search paths used when resolving domain names.
|
| security.pki.caCertificateBlacklist | A list of blacklisted CA certificate names that won't be imported from
the Mozilla Trust Store into
/etc/ssl/certs/ca-certificates.crt
|
| nix.settings.trusted-users | A list of names of users that have additional rights when
connecting to the Nix daemon, such as the ability to specify
additional binary caches, or to import unsigned NARs
|
| nix.settings.allowed-users | A list of names of users (separated by whitespace) that are
allowed to connect to the Nix daemon
|
| environment.shellAliases | An attribute set that maps aliases (the top level attribute names in
this option) to command strings or directly to build outputs
|
| services.postgresql.ensureUsers.*.ensurePermissions | Permissions to ensure for the user, specified as an attribute set
|