| security.googleOsLogin.enable | Whether to enable Google OS Login
|
| programs.dconf.profiles | Attrset of dconf profiles
|
| services.mpd.credentials.*.permissions | List of permissions that are granted with this password
|
| security.wrappers.<name>.permissions | The permissions of the wrapper program
|
| programs.schroot.profiles | Custom configuration profiles for schroot.
|
| services.g810-led.profile | Keyboard profile to apply at boot time
|
| services.hledger-web.allow | User's access level for changing data.
- view: view only permission.
- add: view and add permissions.
- edit: view, add, and edit permissions.
- sandstorm: permissions from the
X-Sandstorm-Permissions request header.
|
| services.mail.sendmailSetuidWrapper.permissions | The permissions of the wrapper program
|
| services.postfix-tlspol.settings.server.socket-permissions | Permissions to the UNIX socket, if configured.
Due to hardening on the systemd unit the socket can never be created world readable/writable.
|
| security.acme.certs.<name>.profile | The certificate profile to choose if the CA offers multiple profiles.
|
| services.cachix-agent.profile | Profile name, defaults to 'system' (NixOS).
|
| programs.schroot.profiles.<name>.fstab | A file in the format described in fstab(5), used to mount filesystems inside the chroot
|
| security.acme.defaults.profile | The certificate profile to choose if the CA offers multiple profiles.
|
| services.angrr.settings.profile-policies.<name>.profile-paths | Paths to the Nix profile
|
| security.tpm2.fapi.profileName | Name of the default cryptographic profile chosen from the profile_dir directory.
|
| services.tuned.profiles | Profiles for TuneD
|
| services.oauth2-proxy.profileURL | Profile access endpoint.
|
| services.angrr.settings.profile-policies | Profile GC root policies.
|
| services.disnix.profiles | Names of the Disnix profiles to expose in the system's PATH
|
| programs.schroot.profiles.<name>.copyfiles | A list of files to copy into the chroot from the host system.
|
| services.autorandr.profiles.<name>.hooks | Profile hook scripts.
|
| services.autorandr.profiles.<name>.config | Per output profile configuration.
|
| security.tpm2.fapi.profileDir | Directory that contains all cryptographic profiles known to FAPI.
|
| security.apparmor.policies.<name>.profile | The profile file contents
|
| services.angrr.settings.profile-policies.<name>.keep-since | Retention period for the GC roots in this profile.
|
| services.mysql.ensureUsers | Ensures that the specified users exist and have at least the ensured permissions
|
| programs.wshowkeys.enable | Whether to enable wshowkeys (displays keypresses on screen on supported Wayland
compositors)
|
| services.angrr.settings.profile-policies.<name>.keep-latest-n | Keep the latest N GC roots in this profile.
|
| security.loginDefs.settings.TTYPERM | The terminal permissions: the login tty will be owned by the TTYGROUP group,
and the permissions will be set to TTYPERM
|
| services.autorandr.profiles | Autorandr profiles specification.
|
| services.tuned.ppdSettings.profiles | Map of PPD profiles to native TuneD profiles.
|
| environment.profiles | A list of profiles used to setup the global environment.
|
| services.asusd.profileConfig.text | Text of the file.
|
| services.asusd.profileConfig | The content of /etc/asusd/profile.ron
|
| services.syncoid.localTargetAllow | Permissions granted for the services.syncoid.user user
for local target datasets
|
| programs.schroot.profiles.<name>.nssdatabases | System databases (as described in /etc/nsswitch.conf on GNU/Linux systems) to copy into the chroot from the host.
|
| services.prometheus.remoteWrite.*.sigv4.profile | The named AWS profile used to authenticate.
|
| security.loginDefs.settings.TTYGROUP | The terminal permissions: the login tty will be owned by the TTYGROUP group,
and the permissions will be set to TTYPERM
|
| hardware.tuxedo-drivers.settings.charging-profile | The maximum charge level to help reduce battery wear:
high_capacity charges to 100% (driver default)
balanced charges to 90%
stationary charges to 80% (maximum lifespan)
Note: Regardless of the configured charging profile, the operating system will always report the battery as being charged to 100%.
|
| services.power-profiles-daemon.enable | Whether to enable power-profiles-daemon, a DBus daemon that allows
changing system behavior based upon user-selected power profiles.
|
| services.power-profiles-daemon.package | The power-profiles-daemon package to use.
|
| services.nextcloud.settings."profile.enabled" | Makes user-profiles globally available under nextcloud.tld/u/user.name
|
| services.qbittorrent.profileDir | the path passed to qbittorrent via --profile.
|
| services.crowdsec.localConfig.profiles | A list of profiles to enable
|
| services.asusd.profileConfig.source | Path of the source file.
|
| services.angrr.settings.profile-policies.<name>.enable | Whether to enable this angrr policy.
|
| services.syncoid.localSourceAllow | Permissions granted for the services.syncoid.user user
for local source datasets
|
| services.autorandr.profiles.<name>.config.<name>.dpi | Output DPI configuration.
|
| services.syncoid.commands.<name>.localTargetAllow | Permissions granted for the services.syncoid.user user
for local target datasets
|
| services.autorandr.profiles.<name>.config.<name>.mode | Output resolution.
|
| services.autorandr.profiles.<name>.config.<name>.rate | Output framerate.
|
| services.autorandr.profiles.<name>.config.<name>.scale.y | Vertical scaling factor/pixels.
|
| services.autorandr.profiles.<name>.config.<name>.scale.x | Horizontal scaling factor/pixels.
|
| services.autorandr.profiles.<name>.config.<name>.crtc | Output video display controller.
|
| environment.profileRelativeEnvVars | Attribute set of environment variable
|
| services.angrr.settings.profile-policies.<name>.keep-booted-system | Whether to keep the last booted system generation
|
| services.autorandr.profiles.<name>.config.<name>.gamma | Output gamma configuration.
|
| services.angrr.settings.profile-policies.<name>.keep-current-system | Whether to keep the current system generation
|
| services.autorandr.profiles.<name>.config.<name>.enable | Whether to enable the output.
|
| services.autorandr.profiles.<name>.config.<name>.rotate | Output rotate configuration.
|
| services.autorandr.profiles.<name>.config.<name>.scale.method | Output scaling method.
|
| users.users.<name>.createHome | Whether to create the home directory and ensure ownership as well as
permissions to match the user.
|
| services.system76-scheduler.settings.processScheduler.pipewireBoost.profile.nice | Niceness.
|
| services.autorandr.profiles.<name>.hooks.preswitch | Preswitch hook executed before mode switch.
|
| services.system76-scheduler.settings.processScheduler.pipewireBoost.profile.prio | CPU scheduler priority.
|
| services.autorandr.profiles.<name>.config.<name>.primary | Whether output should be marked as primary
|
| services.system76-scheduler.settings.processScheduler.pipewireBoost.profile.ioPrio | IO scheduler priority.
|
| services.autorandr.profiles.<name>.hooks.predetect | Predetect hook executed before autorandr attempts to run xrandr.
|
| services.autorandr.profiles.<name>.config.<name>.scale | Output scale configuration
|
| services.system76-scheduler.settings.processScheduler.pipewireBoost.profile.class | CPU scheduler class.
|
| services.libinput.mouse.accelProfile | Sets the pointer acceleration profile to the given profile
|
| services.system76-scheduler.settings.processScheduler.pipewireBoost.profile.ioClass | IO scheduler class.
|
| services.autorandr.profiles.<name>.config.<name>.position | Output position
|
| services.mysql.ensureUsers.*.ensurePermissions | Permissions to ensure for the user, specified as attribute set
|
| services.autorandr.profiles.<name>.hooks.postswitch | Postswitch hook executed after mode switch.
|
| services.system76-scheduler.settings.processScheduler.pipewireBoost.profile.matchers | Process matchers.
|
| services.hardware.lcd.server.usbPermissions | Set group-write permissions on a USB device
|
| services.memos.dataDir | Specifies the directory where Memos will store its data.
|
| networking.networkmanager.ensureProfiles.profiles | Declaratively define NetworkManager profiles
|
| services.mpd.dataDir | The directory where MPD stores its state, tag cache, playlists etc
|
| services.syncoid.commands.<name>.localSourceAllow | Permissions granted for the services.syncoid.user user
for local source datasets
|
| users.extraUsers.<name>.createHome | Whether to create the home directory and ensure ownership as well as
permissions to match the user.
|
| services.autorandr.profiles.<name>.config.<name>.transform | Refer to
xrandr(1)
for the documentation of the transform matrix.
|
| services.libinput.touchpad.accelProfile | Sets the pointer acceleration profile to the given profile
|
| services.cfssl.dataDir | The work directory for CFSSL.
If left as the default value this directory will automatically be
created before the CFSSL server starts, otherwise you are
responsible for ensuring the directory exists with appropriate
ownership and permissions.
|
| services.caddy.logDir | Directory for storing Caddy access logs.
If left as the default value this directory will automatically be created
before the Caddy server starts, otherwise the sysadmin is responsible for
ensuring the directory exists with appropriate ownership and permissions.
|
| services.evremap.settings.phys | The physical device name to listen on
|
| services.autorandr.profiles.<name>.fingerprint | Output name to EDID mapping
|
| services.nomad.settings | Configuration for Nomad
|
| services.mysql.dataDir | The data directory for MySQL.
If left as the default value of /var/lib/mysql this directory will automatically be created before the MySQL
server starts, otherwise you are responsible for ensuring the directory exists with appropriate ownership and permissions.
|
| services.knot.enableXDP | Extends the systemd unit with permissions to allow for the use of
the eXpress Data Path (XDP).
Make sure to read up on functional limitations
when running in XDP mode.
|
| services.nats.dataDir | The NATS data directory
|
| services.zwave-js-ui.serialPort | Serial port for the Z-Wave controller
|
| security.sudo.execWheelOnly | Only allow members of the wheel group to execute sudo by
setting the executable's permissions accordingly
|
| services.node-red.userDir | The directory to store all user data, such as flow and credential files and all library data
|
| programs.wireshark.usbmon.enable | Whether to allow users in the 'wireshark' group to capture USB traffic
|
| services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.profile | Named AWS profile used to connect to the API.
|
| services.amule.settings.eMule.IncomingDir | Directory where aMule moves completed downloads
|
| security.sudo-rs.execWheelOnly | Only allow members of the wheel group to execute sudo by
setting the executable's permissions accordingly
|
| services.grafana.settings.server.socket | Path where the socket should be created when protocol=socket
|
| services.sonarr.dataDir | The Sonarr home directory used to store all data
|
| services.caddy.dataDir | The data directory for caddy.
If left as the default value this directory will automatically be created
before the Caddy server starts, otherwise you are responsible for ensuring
the directory exists with appropriate ownership and permissions
|
| services.galene.stateDir | The directory where Galene stores its internal state
|
| services.molly-brown.certPath | Path to TLS certificate
|
| services.tuned.settings.profile_dirs | Directories to search for profiles, separated by , or ;.
|
| services.umami.settings.APP_SECRET_FILE | A file containing a secure random string
|
| services.prosody.dataDir | The prosody home directory used to store all data
|
| services.owncast.dataDir | The directory where owncast stores its data files
|
| services.umami.settings.DATABASE_URL_FILE | A file containing a connection string for the database
|
| environment.profileRelativeSessionVariables | Attribute set of environment variable used in the global
environment
|
| services.traefik.dataDir | Location for any persistent data Traefik creates, such as the ACME certificate store.
If left as the default value, this directory will automatically be created
before the Traefik server starts, otherwise you are responsible for ensuring
the directory exists with appropriate ownership and permissions.
|
| services.mysql.initialScript | A file containing SQL statements to be executed on the first startup
|
| services.hledger-web.stateDir | Path the service has access to
|
| services.namecoind.wallet | Wallet file
|
| security.wrappers | This option effectively allows adding setuid/setgid bits, capabilities,
changing file ownership and permissions of a program without directly
modifying it
|
| services.goeland.stateDir | The data directory for goeland where the database will reside if using the unseen filter
|
| services.hardware.lcd.server.usbGroup | The group to use for settings permissions
|
| services.gitolite.dataDir | The gitolite home directory used to store all repositories
|
| services.redis.servers.<name>.unixSocketPerm | Change permissions for the socket
|
| services.usbguard.ruleFile | This tells the USBGuard daemon which file to load as policy rule set
|
| services.matrix-synapse.settings.listeners.*.mode | File permissions on the UNIX domain socket.
|
| services.psd.enable | Whether to enable the Profile Sync daemon.
|
| services.mpd.credentials | Credentials and permissions for accessing the mpd server.
|
| services.weblate.smtp.passwordFile | Location of a file containing the SMTP password
|
| services.tlsrpt.collectd.settings.socketmode | Permissions on the UNIX socket.
|
| security.apparmor.policies.<name>.path | A path of a profile file to include
|
| services.duplicati.dataDir | The directory where Duplicati stores its data files.
If left as the default value this directory will automatically be created
before the Duplicati server starts, otherwise you are responsible for ensuring
the directory exists with appropriate ownership and permissions.
|
| services.evremap.settings.device_name | The name of the device that should be remapped
|
| services.mediawiki.uploadsDir | This directory is used for uploads of pictures
|
| services.canaille.smtpPasswordFile | File containing the SMTP password
|
| services.trickster.profiler-port | Port that the /debug/pprof endpoint will listen on.
|
| services.canaille.secretKeyFile | File containing the Flask secret key
|
| services.borgbackup.repos.<name>.path | Where to store the backups
|
| services.mpd.musicDirectory | The directory or NFS/SMB network share where MPD reads music from
|
| services.tlsrpt.configurePostfix | Whether to configure permissions to allow integration with Postfix.
|
| services.weblate.djangoSecretKeyFile | Location of the Django secret key
|
| services.roundcube.database.host | Host of the postgresql server
|
| services.postgresql.dataDir | The data directory for PostgreSQL
|
| services.nominatim.database.apiUser | Postgresql database user with read-only permissions used for Nominatim
web API service.
|
| services.jmusicbot.stateDir | The directory where config.txt and serversettings.json is saved
|
| networking.networkmanager.ensureProfiles.profiles.<name>.connection.id | This is the name that will be displayed by NetworkManager and GUIs.
|
| services.snapper.configs.<name>.ALLOW_USERS | List of users allowed to operate with the config. "root" is always
implicitly included
|
| i18n.inputMethod.fcitx5.settings.inputMethod | The input method configure in profile file in ini format.
|
| services.nominatim.database.host | Host of the postgresql server
|
| services.snapper.configs.<name>.ALLOW_GROUPS | List of groups allowed to operate with the config
|
| networking.networkmanager.ensureProfiles.profiles.<name>.connection.type | The connection type defines the connection kind, like vpn, wireguard, gsm, wifi and more.
|
| services.canaille.jwtPrivateKeyFile | File containing the JWT private key
|
| services.immichframe.settings.Accounts.*.ApiKeyFile | File containing an API key to talk to the Immich server
|
| services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.profile | Named AWS profile used to connect to the API.
|
| services.immichframe.settings.Accounts.*.ApiKey | API key to talk to the Immich server
|
| services.wordpress.sites.<name>.uploadsDir | This directory is used for uploads of pictures
|
| services.reaction.runAsRoot | Whether to run reaction as root
|
| services.influxdb2.provision.organizations.<name>.auths.<name>.readPermissions | The read permissions to include for this token
|
| services.neo4j.directories.certificates | Directory for storing certificates to be used by Neo4j for
TLS connections
|
| services.influxdb2.provision.organizations.<name>.auths.<name>.writePermissions | The read permissions to include for this token
|
| services.mpd.playlistDirectory | The directory where MPD stores playlists
|
| services.pdfding.consume.enable | Bulk PDF import from consume directory
|
| services.neo4j.directories.data | Path of the data directory
|
| services.rtorrent.dataPermissions | Unix Permissions in octal on the rtorrent directory.
|
| services.patroni.postgresqlDataDir | The data directory for PostgreSQL
|
| services.tt-rss.auth.autoLogin | Automatically login user on remote or other kind of externally supplied
authentication, otherwise redirect to login form as normal
|
| services.snapper.configs.<name>.SUBVOLUME | Path of the subvolume or mount point
|
| services.healthchecks.dataDir | The directory used to store all data for healthchecks.
If left as the default value this directory will automatically be created before
the healthchecks server starts, otherwise you are responsible for ensuring the
directory exists with appropriate ownership and permissions.
|
| services.transmission.downloadDirPermissions | If not null, is used as the permissions
set by system.activationScripts.transmission-daemon
on the directories services.transmission.settings.download-dir,
services.transmission.settings.incomplete-dir.
and services.transmission.settings.watch-dir
|
| services.mpd.settings.music_directory | The directory or URI where MPD reads music from
|
| services.osquery.flags.logger_path | Base directory used for logging.
If left as the default value, this directory will be automatically created before the
service starts, otherwise you are responsible for ensuring the directory exists with
the appropriate ownership and permissions.
|
| services.neo4j.ssl.policies.<name>.revokedDir | Path to directory of CRLs (Certificate Revocation Lists) in
PEM format
|
| services.geoipupdate.settings.DatabaseDirectory | The directory to store the database files in
|
| services.varnish.listen.*.address | If given an IP address, it can be a host name ("localhost"), an IPv4 dotted-quad
("127.0.0.1") or an IPv6 address enclosed in square brackets ("[::1]").
(VCL4.1 and higher) If given an absolute Path ("/path/to/listen.sock") or "@"
followed by the name of an abstract socket ("@myvarnishd") accept connections
on a Unix domain socket
|
| services.postfixadmin.database.host | Host of the postgresql server
|
| services.invoiceplane.sites.<name>.stateDir | This directory is used for uploads of attachments and cache
|
| services.kmonad.keyboards.<name>.extraGroups | Extra permission groups to attach to the KMonad instance for
this keyboard
|
| services.neo4j.ssl.policies.<name>.trustedDir | Path to directory of X.509 certificates in PEM format for
trusted parties
|
| services.hedgedoc.settings.allowGravatar | Whether to enable Libravatar as
profile picture source on your instance
|
| services.neo4j.ssl.policies.<name>.baseDirectory | The mandatory base directory for cryptographic objects of this
policy
|
| services.uwsgi.capabilities | Grant capabilities to the uWSGI instance
|
| services.bepasty.servers.<name>.defaultPermissions | default permissions for all unauthenticated accesses.
|
| services.osquery.flags.database_path | Path used for the database file.
If left as the default value, this directory will be automatically created before the
service starts, otherwise you are responsible for ensuring the directory exists with
the appropriate ownership and permissions.
|
| services.tuned.ppdSettings.main.default | Default PPD profile.
|
| services.archisteamfarm.dataDir | The ASF home directory used to store all data
|
| services.libinput.mouse.accelSpeed | Cursor acceleration (how fast speed increases from minSpeed to maxSpeed)
|
| services.freshrss.api.enable | Whether to enable API access for mobile apps and third-party clients (Google Reader API and Fever API)
|
| virtualisation.incus.enable | Whether to enable incusd, a daemon that manages containers and virtual machines
|
| services.prometheus.exporters.sabnzbd.servers.*.apiKeyFile | The path to a file containing the API key
|
| services.mpd.settings.playlist_directory | The directory where MPD stores playlists
|
| services.matrix-tuwunel.settings.global.unix_socket_perms | The default permissions (in octal) to create the UNIX socket with.
|
| services.outline.slackAuthentication | To configure Slack auth, you'll need to create an Application at
https://api.slack.com/apps
When configuring the Client ID, add a redirect URL under "OAuth & Permissions"
to https://[publicUrl]/auth/slack.callback.
|
| services.mobilizon.settings.":mobilizon"."Mobilizon.Storage.Repo".socket_dir | Path to the postgres socket directory
|
| services.mosquitto.listeners.*.users.<name>.passwordFile | Specifies the path to a file containing the
clear text password for the MQTT user
|
| virtualisation.xen.store.settings.conflict.rateLimitIsAggregate | If the conflict.rateLimitIsAggregate option is true, then after each
tick one point of conflict-credit is given to just one domain: the
one at the front of the queue
|
| services.cloudflare-ddns.credentialsFile | Path to a file containing the Cloudflare API authentication token
|
| system.activatable | Whether to add the activation script to the system profile
|
| services.netbird.tunnels.<name>.hardened | Hardened service:
- runs as a dedicated user with minimal set of permissions (see caveats),
- restricts daemon configuration socket access to dedicated user group
(you can grant access to it with
users.users."<user>".extraGroups = [ netbird-‹name› ]),
Even though the local system resources access is restricted:
CAP_NET_RAW, CAP_NET_ADMIN and CAP_BPF still give unlimited network manipulation possibilites,
- older kernels don't have
CAP_BPF and use CAP_SYS_ADMIN instead,
Known security features that are not (yet) integrated into the module:
- 2024-02-14:
rosenpass is an experimental feature configurable solely
through --enable-rosenpass flag on the netbird up command,
see the docs
|
| services.netbird.clients.<name>.hardened | Hardened service:
- runs as a dedicated user with minimal set of permissions (see caveats),
- restricts daemon configuration socket access to dedicated user group
(you can grant access to it with
users.users."<user>".extraGroups = [ netbird-‹name› ]),
Even though the local system resources access is restricted:
CAP_NET_RAW, CAP_NET_ADMIN and CAP_BPF still give unlimited network manipulation possibilites,
- older kernels don't have
CAP_BPF and use CAP_SYS_ADMIN instead,
Known security features that are not (yet) integrated into the module:
- 2024-02-14:
rosenpass is an experimental feature configurable solely
through --enable-rosenpass flag on the netbird up command,
see the docs
|
| services.traefik.supplementaryGroups | Additional groups under which Traefik runs
|
| containers.<name>.path | As an alternative to specifying
config, you can specify the path to
the evaluated NixOS system configuration, typically a
symlink to a system profile.
|
| services.libinput.mouse.accelStepScroll | Sets the step between the points of the scroll acceleration function
|
| services.cloudflared.certificateFile | Account certificate file, necessary to create, delete and manage tunnels
|
| services.postgresql.ensureUsers.*.ensureClauses.inherit | Grants the user created inherit permissions
|
| services.libinput.mouse.accelStepMotion | Sets the step between the points of the (pointer) motion acceleration function
|
| services.dependency-track.settings."alpine.oidc.team.synchronization" | This option will ensure that team memberships for OpenID Connect users are dynamic and
synchronized with membership of OpenID Connect groups or assigned roles
|
| services.libinput.touchpad.accelSpeed | Cursor acceleration (how fast speed increases from minSpeed to maxSpeed)
|
| services.mosquitto.listeners.*.users.<name>.hashedPasswordFile | Specifies the path to a file containing the
hashed password for the MQTT user
|
| services.postgresql.ensureUsers.*.ensureClauses.createdb | Grants the user, created by the ensureUser attr, createdb permissions
|
| services.rke2.cisHardening | Enable CIS Hardening for RKE2
|
| services.libinput.mouse.accelPointsScroll | Sets the points of the scroll acceleration function
|
| services.libinput.mouse.accelPointsMotion | Sets the points of the (pointer) motion acceleration function
|
| services.matrix-continuwuity.settings.global.unix_socket_perms | The default permissions (in octal) to create the UNIX socket with.
|
| services.postgresql.ensureUsers.*.ensureClauses.login | Grants the user, created by the ensureUser attr, login permissions
|
| services.nitter.preferences.hideBanner | Hide profile banner.
|
| services.libinput.mouse.accelStepFallback | Sets the step between the points of the fallback acceleration function
|
| services.hardware.openrgb.startupProfile | The profile file to load from "/var/lib/OpenRGB" at startup.
|
| hardware.nvidia-container-toolkit.mounts | Mounts to be added to every container under the Nvidia CDI profile.
|
| services.postgresql.ensureUsers.*.ensureClauses.bypassrls | Grants the user, created by the ensureUser attr, replication permissions
|
| services.cloudflared.tunnels.<name>.certificateFile | Account certificate file, necessary to create, delete and manage tunnels
|
| services.postgresql.ensureUsers.*.ensureClauses.superuser | Grants the user, created by the ensureUser attr, superuser permissions
|
| services.libinput.touchpad.accelStepScroll | Sets the step between the points of the scroll acceleration function
|
| services.libinput.touchpad.accelStepMotion | Sets the step between the points of the (pointer) motion acceleration function
|
| services.libinput.mouse.accelPointsFallback | Sets the points of the fallback acceleration function
|
| services.influxdb2.provision.organizations.<name>.auths.<name>.allAccess | Grants all permissions in the associated organization.
|
| system.build.separateActivationScript | A separate activation script package that's not part of the system profile
|
| services.libinput.touchpad.accelPointsScroll | Sets the points of the scroll acceleration function
|
| services.matrix-synapse.workers.<name>.worker_listeners.*.mode | File permissions on the UNIX domain socket.
|
| services.nitter.preferences.squareAvatars | Square profile pictures.
|
| services.libinput.touchpad.accelPointsMotion | Sets the points of the (pointer) motion acceleration function
|
| services.nitter.preferences.stickyProfile | Make profile sidebar stick to top.
|
| services.influxdb2.provision.organizations.<name>.auths.<name>.operator | Grants all permissions in all organizations.
|
| services.postgresql.ensureUsers.*.ensureClauses.replication | Grants the user, created by the ensureUser attr, replication permissions
|
| security.apparmor.enable | Whether to enable the AppArmor Mandatory Access Control system
|
| services.postgresql.ensureUsers.*.ensureClauses.createrole | Grants the user, created by the ensureUser attr, createrole permissions
|
| services.libinput.touchpad.accelStepFallback | Sets the step between the points of the fallback acceleration function
|
| services.grafana.settings.security.disable_gravatar | Set to true to disable the use of Gravatar for user profile images.
|
| environment.systemPackages | The set of packages that appear in
/run/current-system/sw
|
| services.libinput.touchpad.accelPointsFallback | Sets the points of the fallback acceleration function
|
| environment.variables | A set of environment variables used in the global environment
|
| services.dependency-track.oidc.teamSynchronization | This option will ensure that team memberships for OpenID Connect users are dynamic and
synchronized with membership of OpenID Connect groups or assigned roles
|
| security.unprivilegedUsernsClone | When disabled, unprivileged users will not be able to create new namespaces
|
| services.system76-scheduler.assignments | Process profile assignments.
|
| services.qbittorrent.serverConfig | Free-form settings mapped to the qBittorrent.conf file in the profile
|
| security.apparmor.killUnconfinedConfinables | Whether to enable killing of processes which have an AppArmor profile enabled
(in security.apparmor.policies)
but are not confined (because AppArmor can only confine new processes)
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.all_tenants | Whether the service discovery should list all instances for all projects
|
| networking.networkmanager.ensureProfiles.secrets.entries.*.matchUuid | UUID of the connection profile
UUIDs are assigned once on connection creation and should never change as long as the connection still applies to the same network.
|
| services.pipewire.wireplumber.extraScripts | Additional scripts for WirePlumber to be used by configuration files
|