| launchd.agents.<name>.path | Packages added to the service's PATH
environment variable
|
| launchd.daemons.<name>.path | Packages added to the service's PATH
environment variable
|
| launchd.user.agents.<name>.path | Packages added to the service's PATH
environment variable
|
| nixpkgs.flake.source | The path to the nixpkgs sources used to build the system
|
| services.buildkite-agents.<name>.hooksPath | Path to the directory storing the hooks
|
| launchd.agents.<name>.serviceConfig.Sockets.<name>.SecureSocketWithKey | This optional key is a variant of SockPathName
|
| programs.vim.vimOptions.<name>.source | Path of the source file.
|
| launchd.daemons.<name>.serviceConfig.Sockets.<name>.SecureSocketWithKey | This optional key is a variant of SockPathName
|
| launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SecureSocketWithKey | This optional key is a variant of SockPathName
|
| programs.tmux.tmuxOptions.<name>.source | Path of the source file.
|
| environment.etc.<name>.source | Path of the source file.
|
| launchd.agents.<name>.serviceConfig.Sockets.<name>.SockPathName | This optional key implies SockFamily is set to "Unix"
|
| launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockPathName | This optional key implies SockFamily is set to "Unix"
|
| launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockPathName | This optional key implies SockFamily is set to "Unix"
|
| system.activationScripts.<name>.source | Path of the source file.
|
| environment.launchAgents.<name>.source | Path of the source file.
|
| services.github-runners.<name>.extraPackages | Extra packages to add to PATH of the service to make them available to workflows.
|
| environment.userLaunchAgents.<name>.source | Path of the source file.
|
| services.buildkite-agents.<name>.tokenPath | The token from your Buildkite "Agents" page
|
| environment.launchDaemons.<name>.source | Path of the source file.
|
| programs.ssh.knownHosts.<name>.publicKeyFile | The path to the public key file for the host
|
| services.gitlab-runner.services.<name>.buildsDir | Absolute path to a directory where builds will be stored
in context of selected executor (Locally, Docker, SSH).
|
| services.buildkite-agents.<name>.privateSshKeyPath | OpenSSH private key
A run-time path to the key file, which is supposed to be provisioned
outside of Nix store.
|
| networking.wg-quick.interfaces.<name>.privateKeyFile | Path to file containing this interface's private key.
|
| launchd.agents.<name>.serviceConfig.QueueDirectories | Much like the WatchPaths option, this key will watch the paths for modifications
|
| launchd.daemons.<name>.serviceConfig.QueueDirectories | Much like the WatchPaths option, this key will watch the paths for modifications
|
| launchd.user.agents.<name>.serviceConfig.QueueDirectories | Much like the WatchPaths option, this key will watch the paths for modifications
|
| networking.wg-quick.interfaces.<name>.peers.*.presharedKeyFile | Optional, path to file containing the pre-shared key for this peer.
|
| users.users.<name>.name | The name of the user account
|
| services.github-runners.<name>.tokenFile | The full path to a file which contains either
- a fine-grained personal access token (PAT),
- a classic PAT
- or a runner registration token
Changing this option or the tokenFile’s content triggers a new runner registration
|
| users.groups.<name>.name | The group's name
|
| services.gitlab-runner.services.<name>.registrationConfigFile | Absolute path to a file with environment variables
used for gitlab-runner registration
|
| services.offlineimap.path | List of derivations to put in Offlineimap's path.
|
| services.aerospace.settings.enable-normalization-flatten-containers | Containers that have only one child are "flattened".
|
| homebrew.casks.*.name | The name of the cask to install.
|
| homebrew.brews.*.name | The name of the formula to install.
|
| system.defaults.dock.persistent-others.*.folder.path | Path to a folder to be added to the dock.
|
| services.github-runners.<name>.name | Name of the runner to configure
|
| homebrew.taps.*.name | When clone_target is unspecified, this is the name of a formula
repository to tap from GitHub using HTTPS
|
| services.aerospace.settings.enable-normalization-opposite-orientation-for-nested-containers | Containers that nest into each other must have opposite orientations.
|
| users.users.<name>.uid | The user's UID.
|
| services.buildkite-agents.<name>.name | The name of the agent as seen in the buildkite dashboard.
|
| users.users.<name>.gid | The user's primary group.
|
| services.cachix-agent.name | Agent name, usually the same as the hostname.
|
| users.groups.<name>.gid | The group's GID.
|
| programs.vim.vimOptions.<name>.target | Name of symlink
|
| nix.registry.<name>.to | The flake reference from is rewritten to.
|
| programs.tmux.tmuxOptions.<name>.target | Name of symlink
|
| environment.etc.<name>.target | Name of symlink
|
| users.users.<name>.isHidden | Whether to make the user account hidden.
|
| nix.registry.<name>.from | The flake reference to be rewritten.
|
| services.autossh.sessions.*.name | Name of the local AutoSSH session
|
| users.users.<name>.home | The user's home directory
|
| users.users.<name>.createHome | Create the home directory when creating the user.
|
| users.users.<name>.description | A short description of the user account, typically the
user's full name
|
| nix.registry.<name>.flake | The flake input from is rewritten to.
|
| users.groups.<name>.members | The group's members.
|
| services.github-runners.<name>.replace | Replace any existing runner with the same name
|
| nix.buildMachines.*.sshKey | The path to the SSH private key with which to authenticate on
the build machine
|
| launchd.agents.<name>.serviceConfig.Sockets.<name>.Bonjour | This optional key can be used to request that the service be registered with the
mDNSResponder(8)
|
| programs.ssh.knownHosts.<name>.hostNames | The set of system-wide known SSH hosts
|
| system.activationScripts.<name>.target | Name of symlink
|
| nix.settings.extra-sandbox-paths | Directories from the host filesystem to be included
in the sandbox.
|
| launchd.daemons.<name>.serviceConfig.Sockets.<name>.Bonjour | This optional key can be used to request that the service be registered with the
mDNSResponder(8)
|
| launchd.user.agents.<name>.serviceConfig.Sockets.<name>.Bonjour | This optional key can be used to request that the service be registered with the
mDNSResponder(8)
|
| services.postgresql.ensureUsers.*.name | Name of the user to ensure.
|
| environment.launchAgents.<name>.target | Name of symlink
|
| environment.pathsToLink | List of directories to be symlinked in /run/current-system/sw.
|
| users.users.<name>.shell | The user's shell
|
| launchd.agents.<name>.serviceConfig.Sockets.<name>.SockNodeName | This optional key specifies the node to connect(2) or bind(2) to.
|
| launchd.agents.<name>.script | Shell commands executed as the service's main process.
|
| environment.userLaunchAgents.<name>.target | Name of symlink
|
| nix.nixPath | The default Nix expression search path, used by the Nix
evaluator to look up paths enclosed in angle brackets
(e.g. <nixpkgs>)
|
| launchd.agents.<name>.serviceConfig.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| environment.launchDaemons.<name>.target | Name of symlink
|
| nix.registry.<name>.exact | Whether the from reference needs to match exactly
|
| users.users.<name>.packages | The set of packages that should be made availabe to the user
|
| launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockNodeName | This optional key specifies the node to connect(2) or bind(2) to.
|
| launchd.agents.<name>.serviceConfig.Sockets.<name>.SockFamily | This optional key can be used to specifically request that "IPv4" or "IPv6" socket(s) be created.
|
| launchd.agents.<name>.serviceConfig.Sockets.<name>.SockPathMode | This optional key specifies the mode of the socket
|
| launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockNodeName | This optional key specifies the node to connect(2) or bind(2) to.
|
| launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| launchd.agents.<name>.command | Command executed as the service's main process.
|
| launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockFamily | This optional key can be used to specifically request that "IPv4" or "IPv6" socket(s) be created.
|
| launchd.daemons.<name>.script | Shell commands executed as the service's main process.
|
| launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockPathMode | This optional key specifies the mode of the socket
|
| launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockFamily | This optional key can be used to specifically request that "IPv4" or "IPv6" socket(s) be created.
|
| launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockPathMode | This optional key specifies the mode of the socket
|
| launchd.user.agents.<name>.script | Shell commands executed as the service's main process.
|
| services.emacs.additionalPath | This option specifies additional PATH that the emacs daemon would have
|
| launchd.agents.<name>.serviceConfig.Sockets.<name>.SockServiceName | This optional key specifies the service on the node to connect(2) or bind(2) to.
|
| launchd.agents.<name>.serviceConfig.Sockets.<name>.SockPassive | This optional key specifies whether listen(2) or connect(2) should be called on the created file
descriptor
|
| programs.vim.vimOptions.<name>.text | Text of the file.
|
| launchd.agents.<name>.serviceConfig.Sockets.<name>.SockProtocol | This optional key specifies the protocol to be passed to socket(2)
|
| launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockServiceName | This optional key specifies the service on the node to connect(2) or bind(2) to.
|
| launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockServiceName | This optional key specifies the service on the node to connect(2) or bind(2) to.
|
| launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockPassive | This optional key specifies whether listen(2) or connect(2) should be called on the created file
descriptor
|
| launchd.daemons.<name>.command | Command executed as the service's main process.
|
| launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockPassive | This optional key specifies whether listen(2) or connect(2) should be called on the created file
descriptor
|