| launchd.agents.<name>.path | Packages added to the service's PATH
environment variable
|
| launchd.daemons.<name>.path | Packages added to the service's PATH
environment variable
|
| launchd.user.agents.<name>.path | Packages added to the service's PATH
environment variable
|
| services.offlineimap.path | List of derivations to put in Offlineimap's path.
|
| system.defaults.dock.persistent-others.*.folder.path | Path to a folder to be added to the dock.
|
| nixpkgs.flake.source | The path to the nixpkgs sources used to build the system
|
| nix.settings.extra-sandbox-paths | Directories from the host filesystem to be included
in the sandbox.
|
| environment.pathsToLink | List of directories to be symlinked in /run/current-system/sw.
|
| nix.buildMachines.*.sshKey | The path to the SSH private key with which to authenticate on
the build machine
|
| nix.nixPath | The default Nix expression search path, used by the Nix
evaluator to look up paths enclosed in angle brackets
(e.g. <nixpkgs>)
|
| services.emacs.additionalPath | This option specifies additional PATH that the emacs daemon would have
|
| services.redis.unixSocket | The path to the socket to bind to.
|
| environment.darwinConfig | The path of the darwin configuration.nix used to configure the system,
this updates the default darwin-config entry in NIX_PATH
|
| services.cachix-agent.logFile | Absolute path to log all stderr and stdout
|
| nixpkgs.source | The path to import Nixpkgs from
|
| homebrew.brewPrefix | The path prefix where the brew executable is located
|
| launchd.agents.<name>.serviceConfig.Sockets.<name>.SecureSocketWithKey | This optional key is a variant of SockPathName
|
| programs.vim.vimOptions.<name>.source | Path of the source file.
|
| environment.systemPath | The set of paths that are added to PATH.
|
| services.ofborg.configFile | Configuration file to use for ofborg
|
| launchd.daemons.<name>.serviceConfig.Sockets.<name>.SecureSocketWithKey | This optional key is a variant of SockPathName
|
| launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SecureSocketWithKey | This optional key is a variant of SockPathName
|
| environment.etc.<name>.source | Path of the source file.
|
| programs.tmux.tmuxOptions.<name>.source | Path of the source file.
|
| system.defaults.finder.ShowPathbar | Show path breadcrumbs in finder windows
|
| services.gitlab-runner.extraPackages | Extra packages to add to PATH for the gitlab-runner process.
|
| system.activationScripts.<name>.source | Path of the source file.
|
| environment.launchAgents.<name>.source | Path of the source file.
|
| homebrew.global.brewfile | Whether to enable Homebrew to automatically use the Brewfile that this module generates in
the Nix store, when you manually invoke brew bundle
|
| environment.userLaunchAgents.<name>.source | Path of the source file.
|
| services.github-runners.<name>.extraPackages | Extra packages to add to PATH of the service to make them available to workflows.
|
| environment.launchDaemons.<name>.source | Path of the source file.
|
| services.buildkite-agents.<name>.tokenPath | The token from your Buildkite "Agents" page
|
| services.sketchybar.extraPackages | Extra packages to add to PATH.
|
| documentation.enable | Whether to install documentation of packages from
environment.systemPackages into the generated system path
|
| programs.ssh.knownHosts.<name>.publicKeyFile | The path to the public key file for the host
|
| services.buildkite-agents.<name>.hooksPath | Path to the directory storing the hooks
|
| services.gitlab-runner.services.<name>.buildsDir | Absolute path to a directory where builds will be stored
in context of selected executor (Locally, Docker, SSH).
|
| services.buildkite-agents.<name>.privateSshKeyPath | OpenSSH private key
A run-time path to the key file, which is supposed to be provisioned
outside of Nix store.
|
| launchd.agents.<name>.serviceConfig.Sockets.<name>.SockPathName | This optional key implies SockFamily is set to "Unix"
|
| launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockPathName | This optional key implies SockFamily is set to "Unix"
|
| launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockPathName | This optional key implies SockFamily is set to "Unix"
|
| nixpkgs.flake.setFlakeRegistry | Whether to pin nixpkgs in the system-wide flake registry (/etc/nix/registry.json) to the
store path of the sources of nixpkgs used to build the nix-darwin system
|
| networking.wg-quick.interfaces.<name>.privateKeyFile | Path to file containing this interface's private key.
|
| services.hercules-ci-agent.settings.secretsJsonPath | Path to a JSON file containing secrets for effects
|
| services.hercules-ci-agent.settings.binaryCachesPath | Path to a JSON file containing binary cache secret keys
|
| system.defaults.screencapture.location | The filesystem path to which screencaptures should be written.
|
| launchd.agents.<name>.serviceConfig.QueueDirectories | Much like the WatchPaths option, this key will watch the paths for modifications
|
| launchd.daemons.<name>.serviceConfig.QueueDirectories | Much like the WatchPaths option, this key will watch the paths for modifications
|
| launchd.user.agents.<name>.serviceConfig.QueueDirectories | Much like the WatchPaths option, this key will watch the paths for modifications
|
| networking.wg-quick.interfaces.<name>.peers.*.presharedKeyFile | Optional, path to file containing the pre-shared key for this peer.
|
| services.gitlab-runner.services.<name>.registrationConfigFile | Absolute path to a file with environment variables
used for gitlab-runner registration
|
| services.github-runners.<name>.tokenFile | The full path to a file which contains either
- a fine-grained personal access token (PAT),
- a classic PAT
- or a runner registration token
Changing this option or the tokenFile’s content triggers a new runner registration
|
| networking.search | The list of search paths used when resolving domain names.
|
| launchd.agents.<name>.serviceConfig.WatchPaths | This optional key causes the job to be started if any one of the listed paths are modified.
|
| security.sandbox.profiles.<name>.closure | List of store paths to make accessible.
|
| launchd.daemons.<name>.serviceConfig.WatchPaths | This optional key causes the job to be started if any one of the listed paths are modified.
|
| launchd.user.agents.<name>.serviceConfig.WatchPaths | This optional key causes the job to be started if any one of the listed paths are modified.
|
| security.sandbox.profiles.<name>.readablePaths | List of paths that should be read-only inside the sandbox.
|
| security.sandbox.profiles.<name>.allowSystemPaths | Whether to allow read access to FHS paths like /etc and /var.
|
| security.sandbox.profiles.<name>.writablePaths | List of paths that should be read/write inside the sandbox.
|