| services.nix-daemon.logFile | The logfile to use for the nix-daemon service
|
| services.nix-daemon.tempDir | The TMPDIR to use for nix-daemon.
|
| nix.daemonIOLowPriority | Whether the Nix daemon process should considered to be low priority when
doing file system I/O.
|
| nix.daemonProcessType | Nix daemon process resource limits class
|
| services.nix-daemon.enableSocketListener | Whether to make the nix-daemon service socket activated.
|
| nix.enable | Whether to enable Nix
|
| launchd.daemons | Definition of launchd daemons
|
| launchd.daemons.<name>.serviceConfig.Nice | This optional key specifies what nice(3) value should be applied to the daemon.
|
| services.autossh.sessions | List of AutoSSH sessions to start as launchd daemon
|
| launchd.daemons.<name>.path | Packages added to the service's PATH
environment variable
|
| launchd.daemons.<name>.script | Shell commands executed as the service's main process.
|
| launchd.daemons.<name>.serviceConfig.LowPriorityIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O.
|
| services.khd.enable | Whether to enable the khd hotkey daemon.
|
| services.ipfs.enable | Whether to enable the ipfs daemon.
|
| launchd.daemons.<name>.command | Command executed as the service's main process.
|
| services.skhd.enable | Whether to enable the skhd hotkey daemon.
|
| services.emacs.enable | Whether to enable the Emacs Daemon.
|
| nix.settings.trusted-users | A list of names of users that have additional rights when
connecting to the Nix daemon, such as the ability to specify
additional binary caches, or to import unsigned NARs
|
| nix.settings.allowed-users | A list of names of users (separated by whitespace) that are
allowed to connect to the Nix daemon
|
| services.mopidy.enable | Whether to enable the Mopidy Daemon.
|
| launchd.daemons.<name>.serviceConfig | Each attribute in this set specifies an option for a key in the plist.
https://developer.apple.com/legacy/library/documentation/Darwin/Reference/ManPages/man5/launchd.plist.5.html
|
| nix.linux-builder.workingDirectory | The working directory of the Linux builder daemon process.
|
| services.netdata.enable | Whether to enable Netdata daemon.
|
| services.netbird.enable | Whether to enable Netbird daemon.
|
| launchd.daemons.<name>.serviceConfig.Label | This required key uniquely identifies the job to launchd.
|
| services.synapse-bt.enable | Whether to run Synapse BitTorrent Daemon.
|
| launchd.daemons.<name>.serviceConfig.HardResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| launchd.daemons.<name>.serviceConfig.SoftResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| services.trezord.enable | Enable Trezor bridge daemon, for use with Trezor hardware wallets.
|
| launchd.daemons.<name>.serviceConfig.Debug | This optional key specifies that launchd should adjust its log mask temporarily to LOG_DEBUG while
dealing with this job.
|
| launchd.daemons.<name>.serviceConfig.RunAtLoad | This optional key is used to control whether your job is launched once at the time the job is loaded
|
| launchd.daemons.<name>.serviceConfig.LowPriorityBackgroundIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O when the process is throttled with the Darwin-background classification.
|
| launchd.daemons.<name>.serviceConfig.UserName | This optional key specifies the user to run the job as
|
| launchd.daemons.<name>.serviceConfig.Sockets | This optional key is used to specify launch on demand sockets that can be used to let launchd know when
to run the job
|
| launchd.daemons.<name>.serviceConfig.TimeOut | The recommended idle time out (in seconds) to pass to the job
|
| launchd.daemons.<name>.serviceConfig.inetdCompatibility | The presence of this key specifies that the daemon expects to be run as if it were launched from inetd.
|
| launchd.daemons.<name>.serviceConfig.Umask | This optional key specifies what value should be passed to umask(2) before running the job
|
| launchd.daemons.<name>.serviceConfig.ExitTimeOut | The amount of time launchd waits before sending a SIGKILL signal
|
| launchd.daemons.<name>.serviceConfig.WatchPaths | This optional key causes the job to be started if any one of the listed paths are modified.
|
| launchd.daemons.<name>.serviceConfig.StartOnMount | This optional key causes the job to be started every time a filesystem is mounted.
|
| launchd.daemons.<name>.serviceConfig.GroupName | This optional key specifies the group to run the job as
|
| launchd.daemons.<name>.environment | Environment variables passed to the service's processes.
|
| launchd.daemons.<name>.serviceConfig.SoftResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| launchd.daemons.<name>.serviceConfig.HardResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| launchd.daemons.<name>.serviceConfig.OnDemand | This key was used in Mac OS X 10.4 to control whether a job was kept alive or not
|
| launchd.daemons.<name>.serviceConfig.ServiceIPC | This optional key specifies whether the job participates in advanced
communication with launchd
|
| services.tailscale.enable | Whether to enable Tailscale client daemon.
|
| launchd.daemons.<name>.serviceConfig.InitGroups | This optional key specifies whether initgroups(3) should be called before running the job
|
| launchd.daemons.<name>.serviceConfig.LimitLoadToHosts | This configuration file only applies to the hosts listed with this key
|
| launchd.daemons.<name>.serviceConfig.Program | This key maps to the first argument of execvp(3)
|
| launchd.daemons.<name>.serviceConfig.LaunchOnlyOnce | This optional key specifies whether the job can only be run once and only once
|
| launchd.daemons.<name>.serviceConfig.LimitLoadFromHosts | This configuration file only applies to hosts NOT listed with this key
|
| launchd.daemons.<name>.serviceConfig.StandardInPath | This optional key specifies what file should be used for data being supplied to stdin when using
stdio(3).
|
| launchd.daemons.<name>.serviceConfig.StandardOutPath | This optional key specifies what file should be used for data being sent to stdout when using stdio(3).
|
| launchd.daemons.<name>.serviceConfig.WaitForDebugger | This optional key specifies that launchd should instruct the kernel to have the job wait for a debugger
to attach before any code in the job is executed.
|
| launchd.daemons.<name>.serviceConfig.SessionCreate | This key specifies that the job should be spawned into a new security
audit session rather than the default session for the context is belongs
to
|
| launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockNodeName | This optional key specifies the node to connect(2) or bind(2) to.
|
| launchd.daemons.<name>.serviceConfig.RootDirectory | This optional key is used to specify a directory to chroot(2) to before running the job.
|
| launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| launchd.daemons.<name>.serviceConfig.EnableGlobbing | This flag causes launchd to use the glob(3) mechanism to update the program arguments before invocation.
|
| launchd.daemons.<name>.serviceConfig.StandardErrorPath | This optional key specifies what file should be used for data being sent to stderr when using stdio(3).
|
| launchd.daemons.<name>.serviceConfig.LimitLoadToSessionType | This configuration file only applies to sessions of the type specified
|
| launchd.daemons.<name>.serviceConfig.HardResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| launchd.daemons.<name>.serviceConfig.SoftResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockPathName | This optional key implies SockFamily is set to "Unix"
|
| launchd.daemons.<name>.serviceConfig.HardResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| launchd.daemons.<name>.serviceConfig.SoftResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockPathMode | This optional key specifies the mode of the socket
|
| launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockFamily | This optional key can be used to specifically request that "IPv4" or "IPv6" socket(s) be created.
|
| services.mopidy.mediakeys.enable | Whether to enable the Mopidy OSX Media Keys support daemon.
|
| launchd.daemons.<name>.serviceConfig.HardResourceLimits | Resource limits to be imposed on the job
|
| launchd.daemons.<name>.serviceConfig.SoftResourceLimits | Resource limits to be imposed on the job
|
| launchd.daemons.<name>.serviceConfig.HardResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| launchd.daemons.<name>.serviceConfig.SoftResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| launchd.daemons.<name>.serviceConfig.Sockets.<name>.Bonjour | This optional key can be used to request that the service be registered with the
mDNSResponder(8)
|
| launchd.daemons.<name>.serviceConfig.StartInterval | This optional key causes the job to be started every N seconds
|
| launchd.daemons.<name>.serviceConfig.HardResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| launchd.daemons.<name>.serviceConfig.SoftResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| launchd.daemons.<name>.serviceConfig.AbandonProcessGroup | When a job dies, launchd kills any remaining processes with the same process group ID as the job
|
| launchd.daemons.<name>.serviceConfig.WorkingDirectory | This optional key is used to specify a directory to chdir(2) to before running the job.
|
| launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockServiceName | This optional key specifies the service on the node to connect(2) or bind(2) to.
|
| launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockPassive | This optional key specifies whether listen(2) or connect(2) should be called on the created file
descriptor
|
| launchd.daemons.<name>.serviceConfig.MachServices | This optional key is used to specify Mach services to be registered with the Mach bootstrap sub-system
|
| launchd.daemons.<name>.serviceConfig.SoftResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| launchd.daemons.<name>.serviceConfig.HardResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| launchd.daemons.<name>.serviceConfig.LaunchEvents | Specifies higher-level event types to be used as launch-on-demand event
sources
|
| launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockProtocol | This optional key specifies the protocol to be passed to socket(2)
|
| launchd.daemons.<name>.serviceConfig.SoftResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| launchd.daemons.<name>.serviceConfig.HardResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| services.emacs.additionalPath | This option specifies additional PATH that the emacs daemon would have
|
| launchd.agents.<name>.serviceConfig.Nice | This optional key specifies what nice(3) value should be applied to the daemon.
|
| launchd.daemons.<name>.serviceConfig.KeepAlive | This optional key is used to control whether your job is to be kept continuously running or to let
demand and conditions control the invocation
|
| launchd.daemons.<name>.serviceConfig.ProgramArguments | This key maps to the second argument of execvp(3)
|
| launchd.user.agents.<name>.serviceConfig.Nice | This optional key specifies what nice(3) value should be applied to the daemon.
|
| launchd.daemons.<name>.serviceConfig.Sockets.<name>.SecureSocketWithKey | This optional key is a variant of SockPathName
|
| launchd.daemons.<name>.serviceConfig.QueueDirectories | Much like the WatchPaths option, this key will watch the paths for modifications
|
| services.ipfs.enableGarbageCollection | Passes --enable-gc flag to ipfs daemon.
|
| launchd.daemons.<name>.serviceConfig.ThrottleInterval | This key lets one override the default throttling policy imposed on jobs by launchd
|
| launchd.daemons.<name>.serviceConfig.ProcessType | This optional key describes, at a high level, the intended purpose of the job
|
| launchd.daemons.<name>.serviceConfig.HardResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|