| services.aerospace.settings.on-window-detected.*."if".app-name-regex-substring | Regex substring to match the app name (optional).
|
| services.aerospace.settings.on-window-detected.*."if".workspace | The workspace name to match (optional).
|
| services.aerospace.settings.workspace-to-monitor-force-assignment | Map workspaces to specific monitors
|
| users.users.<name>.name | The name of the user account
|
| users.groups.<name>.name | The group's name
|
| services.hercules-ci-agent.settings | These settings are written to the agent.toml file
|
| services.github-runners.<name>.name | Name of the runner to configure
|
| services.buildkite-agents.<name>.name | The name of the agent as seen in the buildkite dashboard.
|
| services.cachix-agent.name | Agent name, usually the same as the hostname.
|
| homebrew.casks.*.name | The name of the cask to install.
|
| homebrew.brews.*.name | The name of the formula to install.
|
| homebrew.taps.*.name | When clone_target is unspecified, this is the name of a formula
repository to tap from GitHub using HTTPS
|
| nix.settings | Configuration for Nix, see
https://nixos.org/manual/nix/stable/#sec-conf-file
for avalaible options
|
| services.spotifyd.settings | Configuration for spotifyd, see https://spotifyd.github.io/spotifyd/config/File.html
for supported values.
|
| users.users.<name>.uid | The user's UID.
|
| users.users.<name>.gid | The user's primary group.
|
| nix.settings.max-jobs | This option defines the maximum number of jobs that Nix will try to
build in parallel
|
| nix.settings.extra-sandbox-paths | Directories from the host filesystem to be included
in the sandbox.
|
| services.aerospace.settings | AeroSpace configuration, see
|
| programs.direnv.settings | Direnv configuration
|
| services.autossh.sessions.*.name | Name of the local AutoSSH session
|
| services.dnscrypt-proxy.settings | Attrset that is converted and passed as TOML config file
|
| nix.settings.cores | This option defines the maximum number of concurrent tasks during
one build
|
| users.groups.<name>.gid | The group's GID.
|
| services.buildkite-agents.<name>.hooksPath | Path to the directory storing the hooks
|
| launchd.agents.<name>.serviceConfig.Sockets.<name>.Bonjour | This optional key can be used to request that the service be registered with the
mDNSResponder(8)
|
| services.github-runners.<name>.replace | Replace any existing runner with the same name
|
| nix.settings.sandbox | If set, Nix will perform builds in a sandboxed environment that it
will set up automatically for each build
|
| nix.settings.trusted-users | A list of names of users that have additional rights when
connecting to the Nix daemon, such as the ability to specify
additional binary caches, or to import unsigned NARs
|
| nix.settings.require-sigs | If enabled (the default), Nix will only download binaries from binary caches if
they are cryptographically signed with any of the keys listed in
nix.settings.trusted-public-keys
|
| nix.settings.allowed-users | A list of names of users (separated by whitespace) that are
allowed to connect to the Nix daemon
|
| launchd.daemons.<name>.serviceConfig.Sockets.<name>.Bonjour | This optional key can be used to request that the service be registered with the
mDNSResponder(8)
|
| services.aerospace.settings.start-at-login | Do not start AeroSpace at login. (Managed by launchd instead)
|
| launchd.user.agents.<name>.serviceConfig.Sockets.<name>.Bonjour | This optional key can be used to request that the service be registered with the
mDNSResponder(8)
|
| programs.vim.vimOptions.<name>.target | Name of symlink
|
| services.hercules-ci-agent.settings.apiBaseUrl | API base URL that the agent will connect to
|
| services.postgresql.ensureUsers.*.name | Name of the user to ensure.
|
| launchd.agents.<name>.serviceConfig.Sockets.<name>.SockNodeName | This optional key specifies the node to connect(2) or bind(2) to.
|
| launchd.agents.<name>.serviceConfig.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| services.postgresql.settings | PostgreSQL configuration
|
| nix.settings.trusted-public-keys | List of public keys used to sign binary caches
|
| programs.tmux.tmuxOptions.<name>.target | Name of symlink
|
| environment.etc.<name>.target | Name of symlink
|
| nix.registry.<name>.to | The flake reference from is rewritten to.
|
| launchd.agents.<name>.serviceConfig.Sockets.<name>.SockPathName | This optional key implies SockFamily is set to "Unix"
|
| launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockNodeName | This optional key specifies the node to connect(2) or bind(2) to.
|
| launchd.agents.<name>.serviceConfig.Sockets.<name>.SockPathMode | This optional key specifies the mode of the socket
|
| launchd.agents.<name>.serviceConfig.Sockets.<name>.SockFamily | This optional key can be used to specifically request that "IPv4" or "IPv6" socket(s) be created.
|
| launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockNodeName | This optional key specifies the node to connect(2) or bind(2) to.
|
| launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| services.aerospace.settings.on-focus-changed | Commands to run every time focused window or workspace changes.
|
| launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| users.users.<name>.isHidden | Whether to make the user account hidden.
|
| launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockPathName | This optional key implies SockFamily is set to "Unix"
|
| services.aerospace.settings.key-mapping.preset | Keymapping preset.
|
| nix.registry.<name>.from | The flake reference to be rewritten.
|
| launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockPathName | This optional key implies SockFamily is set to "Unix"
|
| launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockPathMode | This optional key specifies the mode of the socket
|
| launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockFamily | This optional key can be used to specifically request that "IPv4" or "IPv6" socket(s) be created.
|
| launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockPathMode | This optional key specifies the mode of the socket
|
| launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockFamily | This optional key can be used to specifically request that "IPv4" or "IPv6" socket(s) be created.
|
| users.users.<name>.description | A short description of the user account, typically the
user's full name
|
| services.aerospace.settings.after-login-command | Do not use AeroSpace to run commands after login. (Managed by launchd instead)
|
| launchd.agents.<name>.serviceConfig.Sockets.<name>.SockServiceName | This optional key specifies the service on the node to connect(2) or bind(2) to.
|
| launchd.agents.<name>.serviceConfig.Sockets.<name>.SockPassive | This optional key specifies whether listen(2) or connect(2) should be called on the created file
descriptor
|
| services.aerospace.settings.on-window-detected.*."if" | Conditions for detecting a window.
|
| services.hercules-ci-agent.settings.baseDirectory | State directory (secrets, work directory, etc) for agent
|
| users.users.<name>.createHome | Create the home directory when creating the user.
|
| services.hercules-ci-agent.settings.labels | A key-value map of user data
|
| services.hercules-ci-agent.settings.secretsJsonPath | Path to a JSON file containing secrets for effects
|
| services.aerospace.settings.on-window-detected | Commands to run every time a new window is detected with optional conditions.
|
| users.users.<name>.home | The user's home directory
|
| launchd.agents.<name>.serviceConfig.Sockets.<name>.SockProtocol | This optional key specifies the protocol to be passed to socket(2)
|
| services.aerospace.settings.on-window-detected.*.run | Commands to execute when the conditions match (required).
|
| services.hercules-ci-agent.settings.workDirectory | The directory in which temporary subdirectories are created for task state
|
| launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockServiceName | This optional key specifies the service on the node to connect(2) or bind(2) to.
|
| launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockPassive | This optional key specifies whether listen(2) or connect(2) should be called on the created file
descriptor
|
| launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockServiceName | This optional key specifies the service on the node to connect(2) or bind(2) to.
|
| services.aerospace.settings.after-startup-command | Add commands that run after AeroSpace startup
|
| nix.registry.<name>.flake | The flake input from is rewritten to.
|
| launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockPassive | This optional key specifies whether listen(2) or connect(2) should be called on the created file
descriptor
|
| services.aerospace.settings.on-window-detected.*."if".app-id | The application ID to match (optional).
|
| services.hercules-ci-agent.settings.binaryCachesPath | Path to a JSON file containing binary cache secret keys
|
| nix.settings.substituters | List of binary cache URLs used to obtain pre-built binaries
of Nix packages
|
| launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockProtocol | This optional key specifies the protocol to be passed to socket(2)
|
| users.groups.<name>.members | The group's members.
|
| nix.settings.auto-optimise-store | If set to true, Nix automatically detects files in the store that have
identical contents, and replaces them with hard links to a single copy
|
| launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockProtocol | This optional key specifies the protocol to be passed to socket(2)
|
| services.github-runners.<name>.runnerGroup | Name of the runner group to add this runner to (defaults to the default runner group)
|
| services.aerospace.settings.accordion-padding | Padding between windows in an accordion container.
|
| launchd.agents.<name>.serviceConfig.Sockets.<name>.SecureSocketWithKey | This optional key is a variant of SockPathName
|
| system.activationScripts.<name>.target | Name of symlink
|
| services.aerospace.settings.exec-on-workspace-change | Commands to run every time workspace changes.
|
| programs.ssh.knownHosts.<name>.hostNames | The set of system-wide known SSH hosts
|
| launchd.agents.<name>.serviceConfig | Each attribute in this set specifies an option for a key in the plist.
https://developer.apple.com/legacy/library/documentation/Darwin/Reference/ManPages/man5/launchd.plist.5.html
|
| launchd.daemons.<name>.serviceConfig.Sockets.<name>.SecureSocketWithKey | This optional key is a variant of SockPathName
|
| services.aerospace.settings.on-focused-monitor-changed | Commands to run every time focused monitor changes.
|
| launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SecureSocketWithKey | This optional key is a variant of SockPathName
|
| environment.launchAgents.<name>.target | Name of symlink
|
| services.hercules-ci-agent.settings.clusterJoinTokenPath | Location of the cluster-join-token.key file
|