| system.configurationRevision | The Git revision of the top-level flake from which this configuration was built.
|
| nixpkgs.config | Global configuration for Nixpkgs
|
| users.users | Configuration for users.
|
| users.groups | Configuration for groups.
|
| services.yabai.extraConfig | Extra arbitrary configuration to append to the configuration file
|
| nix.settings | Configuration for Nix, see
https://nixos.org/manual/nix/stable/#sec-conf-file
for avalaible options
|
| nix.linux-builder.config | This option specifies extra NixOS configuration for the builder
|
| services.spacebar.extraConfig | Extra arbitrary configuration to append to the configuration file.
|
| users.knownUsers | List of users owned and managed by nix-darwin
|
| services.sketchybar.config | Contents of sketchybar's configuration file
|
| users.knownGroups | List of groups owned and managed by nix-darwin
|
| launchd.agents.<name>.serviceConfig.Disabled | This optional key is used as a hint to launchctl(1) that it should not submit this job to launchd when
loading a job or jobs
|
| launchd.daemons.<name>.serviceConfig.Disabled | This optional key is used as a hint to launchctl(1) that it should not submit this job to launchd when
loading a job or jobs
|
| launchd.user.agents.<name>.serviceConfig.Disabled | This optional key is used as a hint to launchctl(1) that it should not submit this job to launchd when
loading a job or jobs
|
| programs.tmux.extraConfig | Extra configuration to add to tmux.conf.
|
| services.yabai.config | Key/Value pairs to pass to yabai's 'config' domain, via the configuration file.
|
| security.sudo.extraConfig | Extra configuration text appended to sudoers.
|
| services.netdata.config | Custom configuration for Netdata
|
| programs.ssh.extraConfig | Extra configuration text loaded in ssh_config
|
| nixpkgs.hostPlatform | Specifies the platform where the nix-darwin configuration will run
|
| system.startup.chime | Whether to enable the startup chime
|
| programs.direnv.settings | Direnv configuration
|
| programs.vim.enableSensible | Enable sensible configuration options for vim.
|
| services.synapse-bt.extraConfig | Extra configuration options for Synapse BitTorrent.
|
| services.ofborg.configFile | Configuration file to use for ofborg
|
| programs.tmux.enableSensible | Enable sensible configuration options for tmux.
|
| services.spacebar.config | Key/Value pairs to pass to spacebar's 'config' domain, via the configuration file.
|
| services.telegraf.extraConfig | Extra configuration options for telegraf
|
| services.openssh.extraConfig | Extra configuration text loaded in sshd_config
|
| services.synergy.server.configFile | The Synergy server configuration file.
|
| programs.fish.vendor.config.enable | Whether fish should source configuration snippets provided by other packages.
|
| nix.buildMachines.*.sshKey | The path to the SSH private key with which to authenticate on
the build machine
|
| services.spotifyd.settings | Configuration for spotifyd, see https://spotifyd.github.io/spotifyd/config/File.html
for supported values.
|
| services.synergy.server.screenName | Use the given name instead of the hostname to identify
this screen in the configuration.
|
| services.aerospace.settings | AeroSpace configuration, see
|
| system.stateVersion | Every once in a while, a new nix-darwin release may change
configuration defaults in a way incompatible with stateful
data
|
| services.postgresql.checkConfig | Check the syntax of the configuration file at compile time
|
| homebrew.enable | Whether to enable nix-darwin to manage installing/updating/upgrading Homebrew taps, formulae,
casks, Mac App Store apps, Visual Studio Code extensions, Go packages, and Cargo
crates using Homebrew Bundle
|
| services.chunkwm.plugins.tiling.config | Optional tiling plugin configuration.
|
| services.chunkwm.plugins.border.config | Optional border plugin configuration.
|
| nixpkgs.pkgs | If set, the pkgs argument to all nix-darwin modules is the value of
this option, extended with nixpkgs.overlays, if
that is also set
|
| services.buildkite-agents.<name>.extraConfig | Extra lines to be added verbatim to the configuration file.
|
| services.gitlab-runner.configFile | Configuration file for gitlab-runner.
configFile takes precedence over services.
checkInterval and concurrent will be ignored too
|
| launchd.agents.<name>.serviceConfig.LimitLoadToHosts | This configuration file only applies to the hosts listed with this key
|
| launchd.agents.<name>.serviceConfig.LimitLoadFromHosts | This configuration file only applies to hosts NOT listed with this key
|
| launchd.daemons.<name>.serviceConfig.LimitLoadToHosts | This configuration file only applies to the hosts listed with this key
|
| launchd.user.agents.<name>.serviceConfig.LimitLoadToHosts | This configuration file only applies to the hosts listed with this key
|
| launchd.daemons.<name>.serviceConfig.LimitLoadFromHosts | This configuration file only applies to hosts NOT listed with this key
|
| launchd.user.agents.<name>.serviceConfig.LimitLoadFromHosts | This configuration file only applies to hosts NOT listed with this key
|
| launchd.agents.<name>.serviceConfig.LimitLoadToSessionType | This configuration file only applies to sessions of the type specified
|
| services.postgresql.settings | PostgreSQL configuration
|
| environment.systemPackages | The set of packages that appear in
/run/current-system/sw
|
| launchd.daemons.<name>.serviceConfig.LimitLoadToSessionType | This configuration file only applies to sessions of the type specified
|
| launchd.user.agents.<name>.serviceConfig.LimitLoadToSessionType | This configuration file only applies to sessions of the type specified
|
| environment.defaultPackages | Set of default packages that aren't strictly necessary
for a running system, entries can be removed for a more
minimal NixOS installation
|
| services.github-runners.<name>.ephemeral | If enabled, causes the following behavior:
- Passes the
--ephemeral flag to the runner configuration script
- De-registers and stops the runner with GitHub after it has processed one job
- Restarts the service after its successful exit
- On start, wipes the state directory and configures a new runner
You should only enable this option if tokenFile points to a file which contains a
personal access token (PAT)
|
| services.hercules-ci-agent.settings.staticSecretsDirectory | This is the default directory to look for statically configured secrets like cluster-join-token.key
|
| launchd.agents.<name>.serviceConfig.Sockets | This optional key is used to specify launch on demand sockets that can be used to let launchd know when
to run the job
|
| launchd.daemons.<name>.serviceConfig.Sockets | This optional key is used to specify launch on demand sockets that can be used to let launchd know when
to run the job
|
| launchd.user.agents.<name>.serviceConfig.Sockets | This optional key is used to specify launch on demand sockets that can be used to let launchd know when
to run the job
|
| homebrew.onActivation.cleanup | This option manages what happens to packages installed by Homebrew that aren't present in
the Brewfile generated by this module, during nix-darwin system
activation
|
| services.github-runners.<name>.tokenFile | The full path to a file which contains either
- a fine-grained personal access token (PAT),
- a classic PAT
- or a runner registration token
Changing this option or the tokenFile’s content triggers a new runner registration
|
| environment.darwinConfig | The path of the darwin configuration.nix used to configure the system,
this updates the default darwin-config entry in NIX_PATH
|
| nixpkgs.flake.setNixPath | Whether to set NIX_PATH to include nixpkgs=flake:nixpkgs such that <nixpkgs>
lookups receive the version of nixpkgs that the system was built with, in concert with
nixpkgs.flake.setFlakeRegistry
|
| nixpkgs.flake.setFlakeRegistry | Whether to pin nixpkgs in the system-wide flake registry (/etc/nix/registry.json) to the
store path of the sources of nixpkgs used to build the nix-darwin system
|
| services.github-runners | Multiple GitHub Runners
|