| programs.neovim.runtime.<name>.source | Path of the source file.
|
| programs.neovim.runtime | Set of files that have to be linked in runtime.
|
| programs.neovim.runtime.<name>.text | Text of the file.
|
| programs.neovim.runtime.<name>.enable | Whether this runtime directory should be generated
|
| programs.neovim.runtime.<name>.target | Name of symlink
|
| programs.pay-respects.runtimeRules | List of rules to be added to /etc/xdg/pay-respects/rules.
pay-respects will read the contents of these generated rules to recommend command corrections
|
| programs.dms-shell.plugins.<name>.src | Source of the plugin package or path
|
| services.pds.settings.PDS_BSKY_APP_VIEW_DID | DID of bsky frontend
|
| services.pds.settings.PDS_BSKY_APP_VIEW_URL | URL of bsky frontend
|
| services.pds.settings.PDS_DID_PLC_URL | URL of DID PLC directory
|
| services.bluesky-pds.settings.PDS_BSKY_APP_VIEW_DID | DID of bsky frontend
|
| services.bluesky-pds.settings.PDS_BSKY_APP_VIEW_URL | URL of bsky frontend
|
| services.movim.runtimeDir | Runtime directory of the movim user which holds the application’s caches & temporary files.
|
| services.taler.runtimeDir | Runtime directory shared between the taler services
|
| services.bluesky-pds.settings.PDS_DID_PLC_URL | URL of DID PLC directory
|
| services.pds.settings.PDS_BLOB_UPLOAD_LIMIT | Size limit of uploaded blobs in bytes
|
| services.moosefs.chunkserver.settings.DATA_PATH | Directory for lock files and other runtime data.
|
| services.pds.settings.PDS_REPORT_SERVICE_DID | DID of mod service
|
| services.pds.settings.PDS_REPORT_SERVICE_URL | URL of mod service
|
| services.netbird.tunnels.<name>.dir.runtime | A runtime directory used by NetBird client.
|
| services.netbird.clients.<name>.dir.runtime | A runtime directory used by NetBird client.
|
| services.bluesky-pds.settings.PDS_BLOB_UPLOAD_LIMIT | Size limit of uploaded blobs in bytes
|
| security.loginDefs.settings.SYS_UID_MAX | Range of user IDs used for the creation of system users by useradd or newusers.
|
| security.loginDefs.settings.SYS_UID_MIN | Range of user IDs used for the creation of system users by useradd or newusers.
|
| security.loginDefs.settings.SYS_GID_MAX | Range of group IDs used for the creation of system groups by useradd, groupadd, or newusers
|
| security.loginDefs.settings.SYS_GID_MIN | Range of group IDs used for the creation of system groups by useradd, groupadd, or newusers
|
| services.pixelfed.runtimeDir | Ruutime directory of the pixelfed user which holds
the application's caches and temporary files.
|
| systemd.watchdog.runtimeTime | The amount of time which can elapse before a watchdog hardware device
will automatically reboot the system
|
| services.bluesky-pds.settings.PDS_REPORT_SERVICE_DID | DID of mod service
|
| services.lasuite-docs.settings.DJANGO_SECRET_KEY_FILE | The path to the file containing Django's secret key
|
| services.lasuite-meet.settings.DJANGO_SECRET_KEY_FILE | The path to the file containing Django's secret key
|
| services.bluesky-pds.settings.PDS_REPORT_SERVICE_URL | URL of mod service
|
| services.bluesky-pds.settings.PDS_RATE_LIMITS_ENABLED | Enable rate limiting
|
| networking.tempAddresses | Whether to enable IPv6 Privacy Extensions for interfaces not
configured explicitly in
networking.interfaces._name_.tempAddress
|
| services.wastebin.settings.WASTEBIN_MAX_BODY_SIZE | Number of bytes to accept for POST requests
|
| services.pocket-id.settings.PUBLIC_APP_URL | The URL where you will access the app.
|
| services.libeufin.nexus.settings.nexus-ebics.BANK_PUBLIC_KEYS_FILE | Filesystem location where Nexus should store the bank public keys.
|
| services.pds.settings.PDS_BLOBSTORE_DISK_LOCATION | Store blobs at this location, set to null to use e.g
|
| services.hatsu.settings.HATSU_LISTEN_HOST | Host where hatsu should listen for incoming requests.
|
| services.hatsu.settings.HATSU_LISTEN_PORT | Port where hatsu should listen for incoming requests.
|
| virtualisation.cri-o.runtime | Override the default runtime
|
| services.firefly-iii.settings.APP_KEY_FILE | The path to your appkey
|
| services.umami.settings.APP_SECRET_FILE | A file containing a secure random string
|
| nixpkgs.flake.source | The path to the nixpkgs sources used to build the system
|
| services.gitea.settings.server.STATIC_ROOT_PATH | Upper level of template and static files path.
|
| services.libeufin.nexus.settings.nexus-ebics.CLIENT_PRIVATE_KEYS_FILE | Filesystem location where Nexus should store the subscriber private keys.
|
| services.pds.settings.PDS_DATA_DIRECTORY | Directory to store state
|
| services.lasuite-meet.settings.DJANGO_DATA_DIR | Path to the data directory
|
| services.hatsu.settings.HATSU_DATABASE_URL | Database URL.
|
| services.renovate.runtimePackages | Packages available to renovate.
|
| services.firezone.server.settingsSecret.LIVE_VIEW_SIGNING_SALT | A file containing a unique base64 encoded secret for the
LIVE_VIEW_SIGNING_SALT
|
| services.snips-sh.settings.SNIPS_SSH_INTERNAL | The internal SSH address of the service
|
| services.umami.settings.TRACKER_SCRIPT_NAME | Allows you to assign a custom name to the tracker script different from the default script.js.
|
| services.bluesky-pds.settings.PDS_BLOBSTORE_DISK_LOCATION | Store blobs at this location, set to null to use e.g
|
| services.lasuite-meet.settings.LIVEKIT_API_URL | URL to the livekit server
|
| services.umami.settings.DATABASE_URL_FILE | A file containing a connection string for the database
|
| services.snips-sh.settings.SNIPS_HTTP_INTERNAL | The internal HTTP address of the service
|
| services.bookstack.settings.APP_KEY_FILE | The path to your appkey
|
| services.forgejo.settings.server.STATIC_ROOT_PATH | Upper level of template and static files path.
|
| boot.initrd.extraFiles.<name>.source | The object to make available inside the initrd.
|
| services.lasuite-meet.settings.CELERY_BROKER_URL | URL of the redis backend for celery
|
| services.lasuite-docs.settings.CELERY_BROKER_URL | URL of the redis backend for celery
|
| services.taler.settings.taler.CURRENCY_ROUND_UNIT | Smallest amount in this currency that can be transferred using the underlying RTGS
|
| services.libeufin.nexus.settings.nexus-ebics.HOST_BASE_URL | URL of the EBICS server.
|
| services.hatsu.settings.HATSU_PRIMARY_ACCOUNT | The primary account of your instance (eg 'example.com').
|
| services.corteza.settings.HTTP_WEBAPP_ENABLED | Whether to enable webapps.
|
| services.n8n.environment.N8N_USER_FOLDER | Provide the path where n8n will create the .n8n folder
|
| services.umami.settings.COLLECT_API_ENDPOINT | Allows you to send metrics to a location different than the default /api/send.
|
| boot.initrd.systemd.storePaths.*.source | Path of the source file.
|
| services.canaille.settings.CANAILLE_LDAP.BIND_PW | The LDAP bind password
|
| services.pds.settings.PDS_PORT | Port to listen on
|
| services.kubernetes.apiserver.runtimeConfig | Api runtime configuration
|
| services.asusd.asusdConfig.source | Path of the source file.
|
| services.asusd.animeConfig.source | Path of the source file.
|
| services.gokapi.environment.GOKAPI_DATA_DIR | Sets the directory for the data.
|
| services.wastebin.settings.WASTEBIN_BASE_URL | Base URL for the QR code display
|
| services.bluesky-pds.settings.PDS_DATA_DIRECTORY | Directory to store state
|
| services.heapster.source | Heapster metric source
|
| services.lasuite-meet.settings.DJANGO_ALLOWED_HOSTS | Comma-separated list of hosts that are able to connect to the server
|
| services.lasuite-docs.settings.DJANGO_ALLOWED_HOSTS | Comma-separated list of hosts that are able to connect to the server
|
| services.snapper.configs.<name>.TIMELINE_LIMIT_DAILY | Limits for timeline cleanup.
|
| services.bookstack.settings.DB_PASSWORD_FILE | The file containing your mysql/mariadb database password.
|
| services.wastebin.settings.WASTEBIN_CACHE_SIZE | Number of rendered syntax highlight items to cache
|
| services.ferretdb.settings.FERRETDB_SQLITE_URL | SQLite URI (directory) for 'sqlite' handler
|
| services.gokapi.environment.GOKAPI_CONFIG_DIR | Sets the directory for the config file.
|
| services.canaille.settings.CANAILLE_OIDC.JWT.PRIVATE_KEY | JWT private key
|
| services.snapper.configs.<name>.TIMELINE_LIMIT_HOURLY | Limits for timeline cleanup.
|
| services.snapper.configs.<name>.TIMELINE_LIMIT_WEEKLY | Limits for timeline cleanup.
|
| services.snapper.configs.<name>.TIMELINE_LIMIT_YEARLY | Limits for timeline cleanup.
|
| services.anubis.defaultOptions.settings.SERVE_ROBOTS_TXT | Whether to serve a default robots.txt that denies access to common AI bots by name and all other
bots by wildcard.
|
| services.gokapi.environment.GOKAPI_CONFIG_FILE | Sets the filename for the config file.
|
| services.gitea.settings.log.ROOT_PATH | Root path for log files.
|
| services.rspamd.locals.<name>.source | Path of the source file.
|
| services.asusd.userLedModesConfig.source | Path of the source file.
|
| services.asusd.fanCurvesConfig.source | Path of the source file.
|
| services.firezone.server.settingsSecret.TOKENS_KEY_BASE | A file containing a unique base64 encoded secret for the
TOKENS_KEY_BASE
|
| services.firezone.server.settingsSecret.SECRET_KEY_BASE | A file containing a unique base64 encoded secret for the
SECRET_KEY_BASE
|
| services.wastebin.settings.WASTEBIN_ADDRESS_PORT | Address and port to bind to
|
| services.canaille.settings.PREFERRED_URL_SCHEME | The url scheme by which canaille will be served.
|
| services.pocket-id.settings.APP_URL | The URL where you will access the app.
|
| services.snapper.configs.<name>.TIMELINE_LIMIT_MONTHLY | Limits for timeline cleanup.
|
| services.wastebin.settings.WASTEBIN_HTTP_TIMEOUT | Maximum number of seconds a request can be processed until wastebin responds with 408
|
| security.loginDefs.settings.UID_MIN | Range of user IDs used for the creation of regular users by useradd or newusers.
|
| security.loginDefs.settings.UID_MAX | Range of user IDs used for the creation of regular users by useradd or newusers.
|
| services.asusd.profileConfig.source | Path of the source file.
|
| security.loginDefs.settings.GID_MIN | Range of group IDs used for the creation of regular groups by useradd, groupadd, or newusers.
|
| security.loginDefs.settings.GID_MAX | Range of group IDs used for the creation of regular groups by useradd, groupadd, or newusers.
|
| services.taler.exchange.settings.exchange.MASTER_PUBLIC_KEY | Used by the exchange to verify information signed by the offline system.
|
| services.anubis.instances.<name>.settings.SERVE_ROBOTS_TXT | Whether to serve a default robots.txt that denies access to common AI bots by name and all other
bots by wildcard.
|
| services.umami.settings.BASE_PATH | Allows you to host Umami under a subdirectory
|
| boot.initrd.systemd.contents.<name>.source | Path of the source file.
|
| services.canaille.settings.CANAILLE_SQL.DATABASE_URI | The SQL server URI
|
| services.asusd.auraConfigs.<name>.source | Path of the source file.
|
| services.moosefs.cgiserver.settings.GUISERV_LISTEN_PORT | Port for GUI server to listen on.
|
| services.wastebin.settings.WASTEBIN_DATABASE_PATH | Path to the sqlite3 database file
|
| services.moosefs.cgiserver.settings.GUISERV_LISTEN_HOST | IP address to bind GUI server to (* means any).
|
| services.pds.settings.LOG_ENABLED | Enable logging
|
| services.buildkite-agents.<name>.runtimePackages | Add programs to the buildkite-agent environment
|
| services.gitea.settings.server.ROOT_URL | Full public URL of gitea server.
|
| services.healthchecks.settings.SECRET_KEY_FILE | Path to a file containing the secret key.
|
| services.sourcehut.settings."sr.ht".source-url | The source code for your fork of sr.ht.
|
| services.taler.exchange.settings.exchange.CURRENCY_ROUND_UNIT | Smallest amount in this currency that can be transferred using the underlying RTGS
|
| services.forgejo.settings.log.ROOT_PATH | Root path for log files.
|
| services.firezone.server.settingsSecret.COOKIE_SIGNING_SALT | A file containing a unique base64 encoded secret for the
COOKIE_SIGNING_SALT
|
| services.anubis.defaultOptions.settings.METRICS_BIND_NETWORK | The network family that the metrics server should bind to
|
| services.gitea.settings.server.HTTP_PORT | Listen port
|
| services.gitea.settings.server.HTTP_ADDR | Listen address
|
| services.n8n.environment.N8N_VERSION_NOTIFICATIONS_ENABLED | When enabled, n8n sends notifications of new versions and security updates.
|
| services.k3s.manifests.<name>.source | Path of the source .yaml file.
|
| services.bluesky-pds.settings.PDS_PORT | Port to listen on
|
| services.zipline.settings.CORE_PORT | The port to listen on.
|
| services.firefly-iii.settings.APP_ENV | The app environment
|
| services.gitea.settings.server.SSH_PORT | SSH port displayed in clone URL
|
| services.firefly-iii.settings.DB_PORT | The port your database is listening at. sqlite does not require
this value to be filled.
|
| services.snapper.configs.<name>.TIMELINE_LIMIT_QUARTERLY | Limits for timeline cleanup.
|
| environment.etc.<name>.source | Path of the source file.
|
| services.lasuite-docs.settings.DB_HOST | Host of the database
|
| services.lasuite-meet.settings.DB_USER | User of the database
|
| services.lasuite-meet.settings.DB_HOST | Host of the database
|
| services.lasuite-meet.settings.DB_NAME | Name of the database
|
| services.lasuite-docs.settings.DB_NAME | Name of the database
|
| services.lasuite-docs.settings.DB_USER | User of the database
|
| services.sympa.settingsFile.<name>.source | Path of the source file.
|
| systemd.shutdownRamfs.storePaths.*.source | Path of the source file.
|
| services.hatsu.settings.HATSU_DOMAIN | The domain name of your instance (eg 'hatsu.local').
|
| services.pds.settings.PDS_CRAWLERS | URL of crawlers
|
| services.lasuite-docs.settings.DATA_DIR | Path to the data directory
|
| services.ferretdb.settings.FERRETDB_POSTGRESQL_URL | PostgreSQL URL for 'pg' handler
|
| services.firefly-iii.settings.APP_URL | The APP_URL used by firefly-iii internally
|
| services.pds.settings.PDS_HOSTNAME | Instance hostname (base domain name)
|
| services.pocket-id.settings.TRUST_PROXY | Whether the app is behind a reverse proxy.
|
| services.radicle.ci.adapters.native.instances.<name>.runtimePackages | Packages added to the adapter's PATH.
|
| services.anubis.instances.<name>.settings.METRICS_BIND_NETWORK | The network family that the metrics server should bind to
|
| security.wrappers.<name>.source | The absolute path to the program to be wrapped.
|
| services.firefly-iii.settings.DB_HOST | The machine which hosts your database
|
| services.spiped.config.<name>.source | Address on which spiped should listen for incoming
connections
|
| services.miniflux.config.LISTEN_ADDR | Address to listen on
|
| services.lasuite-docs.settings.REDIS_URL | URL of the redis backend
|
| services.lasuite-meet.settings.REDIS_URL | URL of the redis backend
|
| services.forgejo.settings.server.ROOT_URL | Full public URL of Forgejo server.
|
| services.miniflux.config.CREATE_ADMIN | Create an admin user from environment variables.
|
| services.saunafs.master.settings.DATA_PATH | Data storage directory.
|
| services.part-db.settings.DATABASE_URL | The postgresql database server to connect to
|
| services.moosefs.master.settings.DATA_PATH | Directory for storing master metadata.
|
| services.forgejo.settings.server.HTTP_PORT | Listen port
|
| services.forgejo.settings.server.HTTP_ADDR | Listen address
|
| services.gitea.settings.server.DISABLE_SSH | Disable external SSH feature.
|
| security.loginDefs.settings.DEFAULT_HOME | Indicate if login is allowed if we can't cd to the home directory.
|
| services.rspamd.overrides.<name>.source | Path of the source file.
|
| services.syncoid.commands.<name>.source | Source ZFS dataset
|
| services.umami.settings.DATABASE_URL | Connection string for the database
|
| services.forgejo.settings.server.SSH_PORT | SSH port displayed in clone URL
|
| services.postgres-websockets.environment.PGWS_DB_URI | libpq connection parameters as documented in:
https://www.postgresql.org/docs/current/libpq-connect.html#LIBPQ-PARAMKEYWORDS
|
| services.wastebin.settings.RUST_LOG | Influences logging
|
| services.n8n.environment.N8N_DIAGNOSTICS_ENABLED | Whether to share selected, anonymous telemetry with n8n
|
| services.rke2.manifests.<name>.source | Path of the source .yaml file.
|
| services.n8n.environment.N8N_PORT | The HTTP port n8n runs on.
|
| services.bookstack.settings.DB_PORT | The port your database is listening at.
|
| services.firezone.server.settingsSecret.COOKIE_ENCRYPTION_SALT | A file containing a unique base64 encoded secret for the
COOKIE_ENCRYPTION_SALT
|
| services.bookstack.settings.DB_HOST | The IP or hostname which hosts your database.
|
| networking.defaultGateway.source | The default source address.
|
| services.bluesky-pds.settings.LOG_ENABLED | Enable logging
|
| services.canaille.settings.SECRET_KEY | Flask Secret Key
|
| services.miniflux.config.DATABASE_URL | Postgresql connection parameters
|
| services.bookstack.settings.APP_URL | The root URL that you want to host BookStack on
|
| services.netbox.settings.ALLOWED_HOSTS | A list of valid fully-qualified domain names (FQDNs) and/or IP
addresses that can be used to reach the NetBox service.
|
| systemd.shutdownRamfs.contents.<name>.source | Path of the source file.
|
| services.snapper.configs.<name>.ALLOW_USERS | List of users allowed to operate with the config. "root" is always
implicitly included
|
| services.canaille.settings.SERVER_NAME | The domain name on which canaille will be served.
|
| services.libeufin.nexus.settings.nexus-ebics.HOST_ID | Name of the EBICS host.
|
| services.gitea.settings.mailer.SENDMAIL_PATH | Path to sendmail binary or script.
|
| security.loginDefs.settings.ENCRYPT_METHOD | This defines the system default encryption algorithm for encrypting passwords.
|
| services.umami.settings.DISABLE_UPDATES | Disables the check for new versions of Umami.
|
| services.glitchtip.settings.ENABLE_USER_REGISTRATION | When true, any user will be able to register
|
| services.slurm.rest.environment.SLURM_JWT | This variable must be set to use JWT token authentication.
|
| services.forgejo.settings.server.DISABLE_SSH | Disable external SSH feature.
|
| services.libeufin.nexus.settings.nexus-ebics.USER_ID | User ID of the EBICS subscriber
|
| services.snapper.configs.<name>.ALLOW_GROUPS | List of groups allowed to operate with the config
|
| services.tuliprox.sourceSettings | Source definitions
Refer to the Tuliprox documentation for available attributes
|
| services.bluesky-pds.settings.PDS_CRAWLERS | URL of crawlers
|
| services.zipline.settings.CORE_HOSTNAME | The hostname to listen on.
|
| services.prometheus.scrapeConfigs.*.label_name_length_limit | Per-scrape limit on length of labels name that will be accepted for a sample
|
| services.gitea.settings.session.COOKIE_SECURE | Marks session cookies as "secure" as a hint for browsers to only send
them via HTTPS
|
| services.mail.sendmailSetuidWrapper.source | The absolute path to the program to be wrapped.
|
| services.bluesky-pds.settings.PDS_HOSTNAME | Instance hostname (base domain name)
|
| networking.nat.forwardPorts.*.sourcePort | Source port of the external interface; to specify a port range, use a string with a colon (e.g. "60000:61000")
|
| services.lasuite-docs.collaborationServer.settings.COLLABORATION_BACKEND_BASE_URL | URL to the backend server base
|
| services.firewalld.zones.<name>.sourcePorts | Source ports to allow in the zone.
|
| swapDevices.*.randomEncryption.source | Define the source of randomness to obtain a random key for encryption.
|
| networking.defaultGateway6.source | The default source address.
|
| services.moosefs.cgiserver.settings.DATA_PATH | Directory for lock files.
|
| services.moosefs.cgiserver.settings.BIND_HOST | IP address to bind CGI server to.
|
| services.suricata.settings.vars.address-groups.HOME_NET | HOME_NET variable.
|
| services.glitchtip.settings.ENABLE_ORGANIZATION_CREATION | When false, only superusers will be able to create new organizations after the first
|
| services.canaille.settings.CANAILLE_OIDC | OpenID Connect settings
|
| programs.nncp.settings | NNCP configuration, see
http://www.nncpgo.org/Configuration.html
|
| services.canaille.settings.CANAILLE_LDAP | Configuration for the LDAP backend
|
| services.gokapi.environment.GOKAPI_PORT | Sets the port of the service.
|
| services.miniflux.config.RUN_MIGRATIONS | Run database migrations.
|
| services.rsync.jobs.<name>.sources | Source directories.
|
| programs.gamescope.env | Default environment variables available to the GameScope process, overridable at runtime.
|
| services.forgejo.settings.session.COOKIE_SECURE | Marks session cookies as "secure" as a hint for browsers to only send
them via HTTPS
|
| services.libeufin.nexus.settings.nexus-ebics.PARTNER_ID | Partner ID of the EBICS subscriber
|
| services.seafile.ccnetSettings.General.SERVICE_URL | Seahub public URL.
|
| services.wastebin.settings.WASTEBIN_TITLE | Overrides the HTML page title
|
| image.repart.partitions.<name>.contents.<name>.source | Path of the source file.
|
| services.froide-govplan.settings.ALLOWED_HOSTS | A list of valid fully-qualified domain names (FQDNs) and/or IP
addresses that can be used to reach the Froide-Govplan service.
|
| services.snapserver.settings.stream.source | One or multiple URIs to PCM input streams.
|
| services.libeufin.nexus.settings.nexus-ebics.BANK_DIALECT | Name of the following combination: EBICS version and ISO20022
recommendations that Nexus would honor in the communication with the
bank
|
| services.saunafs.metalogger.settings.DATA_PATH | Data storage directory
|
| services.moosefs.metalogger.settings.DATA_PATH | Directory for storing metalogger data.
|
| services.umami.settings.DISABLE_TELEMETRY | Umami collects completely anonymous telemetry data in order help improve the application
|
| services.open-web-calendar.settings.ALLOWED_HOSTS | The hosts that the Open Web Calendar permits
|
| services.snapper.configs.<name>.TIMELINE_CREATE | Defines whether hourly snapshots should be created.
|
| services.suricata.settings.vars.address-groups.ENIP_SERVER | ENIP_SERVER variable.
|
| services.suricata.settings.vars.address-groups.ENIP_CLIENT | ENIP_CLIENT variable.
|
| services.libeufin.bank.settings.libeufin-bank.SUGGESTED_WITHDRAWAL_EXCHANGE | Exchange that is suggested to wallets when withdrawing
|
| services.anubis.defaultOptions.settings.POLICY_FNAME | The policy file to use
|
| services.suricata.settings.vars.address-groups.DC_SERVERS | DC_SERVERS variable.
|
| services.firefly-iii.settings.DB_CONNECTION | The type of database you wish to use
|
| services.firezone.server.provision.accounts | All accounts to provision
|
| services.peering-manager.settings.ALLOWED_HOSTS | A list of valid fully-qualified domain names (FQDNs) and/or IP
addresses that can be used to reach the peering manager service.
|
| services.suricata.settings.vars.address-groups.AIM_SERVERS | AIM_SERVERS variable.
|
| services.suricata.settings.vars.address-groups.SQL_SERVERS | SQL_SERVERS variable.
|
| services.suricata.settings.vars.address-groups.DNS_SERVERS | DNS_SERVERS variable.
|
| services.firezone.server.settingsSecret.TOKENS_SALT | A file containing a unique base64 encoded secret for the
TOKENS_SALT
|
| services.firewalld.zones.<name>.sourcePorts.*.port | |
| services.anubis.defaultOptions.settings.BIND_NETWORK | The network family that Anubis should bind to
|
| services.firewalld.services.<name>.sourcePorts | Source ports for the service.
|
| services.ferretdb.settings.FERRETDB_HANDLER | Backend handler
|
| services.suricata.settings.vars.address-groups.HTTP_SERVERS | HTTP_SERVERS variable.
|
| services.suricata.settings.vars.address-groups.SMTP_SERVERS | SMTP_SERVERS variable.
|
| services.healthchecks.settings.DB_NAME | Database name.
|
| services.snapper.configs.<name>.TIMELINE_CLEANUP | Defines whether the timeline cleanup algorithm should be run for the config.
|
| services.suricata.settings.vars.address-groups.MODBUS_SERVER | MODBUS_SERVER variable.
|
| services.suricata.settings.vars.address-groups.MODBUS_CLIENT | MODBUS_CLIENT variable
|
| services.saunafs.chunkserver.settings.DATA_PATH | Directory for chunck meta data
|
| services.suricata.settings.vars.address-groups.EXTERNAL_NET | EXTERNAL_NET variable.
|
| services.pocket-id.settings.ANALYTICS_DISABLED | Whether to disable analytics
|
| services.sourcehut.hg.user | User for hg.sr.ht.
|
| services.anubis.instances.<name>.settings.POLICY_FNAME | The policy file to use
|
| services.sourcehut.hg.port | Port on which the "hg" backend should listen.
|
| services.n8n.environment.GENERIC_TIMEZONE | The n8n instance timezone
|
| services.sourcehut.git.user | User for git.sr.ht.
|
| services.sourcehut.man.user | User for man.sr.ht.
|
| services.sourcehut.hub.user | User for hub.sr.ht.
|
| services.suricata.settings.vars.address-groups.TELNET_SERVERS | TELNET_SERVERS variable.
|
| services.sourcehut.git.port | Port on which the "git" backend should listen.
|
| services.sourcehut.hub.port | Port on which the "hub" backend should listen.
|
| services.sourcehut.man.port | Port on which the "man" backend should listen.
|
| services.anubis.instances.<name>.settings.BIND_NETWORK | The network family that Anubis should bind to
|
| services.glitchtip.settings.GLITCHTIP_DOMAIN | The URL under which GlitchTip is externally reachable.
|
| services.sourcehut.todo.user | User for todo.sr.ht.
|
| services.sourcehut.meta.user | User for meta.sr.ht.
|
| services.firezone.server.settingsSecret.RELEASE_COOKIE | A file containing a unique secret identifier for the Erlang
cluster
|
| services.sourcehut.meta.port | Port on which the "meta" backend should listen.
|
| services.sourcehut.todo.port | Port on which the "todo" backend should listen.
|
| services.sourcehut.hg.group | Group for hg.sr.ht
|
| services.ferretdb.settings.FERRETDB_TELEMETRY | Enable or disable basic telemetry
|
| services.slurm.rest.environment.SLURMRESTD_DEBUG | Set debug level explicitly
|
| services.anubis.defaultOptions.settings.WEBMASTER_EMAIL | If set, shows a contact email address when rendering error pages
|
| services.sourcehut.hg.redis.host | The redis host URL
|
| services.sourcehut.man.group | Group for man.sr.ht
|
| services.sourcehut.git.group | Group for git.sr.ht
|
| services.sourcehut.hub.group | Group for hub.sr.ht
|
| services.sourcehut.lists.user | User for lists.sr.ht.
|
| services.sourcehut.pages.user | User for pages.sr.ht.
|
| services.sourcehut.paste.user | User for paste.sr.ht.
|
| services.sourcehut.lists.port | Port on which the "lists" backend should listen.
|
| services.sourcehut.paste.port | Port on which the "paste" backend should listen.
|
| services.sourcehut.pages.port | Port on which the "pages" backend should listen.
|
| services.slurm.rest.environment.SLURMRESTD_LISTEN | Comma-delimited list of host:port pairs or unix sockets to listen on.
|
| services.sourcehut.git.redis.host | The redis host URL
|
| services.sourcehut.hub.redis.host | The redis host URL
|
| services.sourcehut.man.redis.host | The redis host URL
|
| services.anubis.instances.<name>.settings.METRICS_BIND | The address Anubis' metrics server listens to
|
| services.firewalld.services.<name>.sourcePorts.*.port | |
| services.sourcehut.hg.enable | Whether to enable hg service.
|
| services.sourcehut.todo.group | Group for todo.sr.ht
|
| services.sourcehut.meta.group | Group for meta.sr.ht
|
| services.lasuite-docs.collaborationServer.settings.COLLABORATION_SERVER_ORIGIN | Origins allowed to connect to the collaboration server
|
| services.healthchecks.settings.ALLOWED_HOSTS | The host/domain names that this site can serve.
|
| services.sourcehut.git.enable | Whether to enable git service.
|
| services.sourcehut.man.enable | Whether to enable man service.
|
| services.sourcehut.hub.enable | Whether to enable hub service.
|
| services.sourcehut.meta.redis.host | The redis host URL
|
| services.sourcehut.todo.redis.host | The redis host URL
|
| programs.obs-studio.enable | Whether to enable Free and open source software for video recording and live streaming.
|
| services.firewalld.zones.<name>.sourcePorts.*.protocol | |
| programs.fish.vendor.config.enable | Whether fish should source configuration snippets provided by other packages.
|
| services.sourcehut.builds.user | User for builds.sr.ht.
|
| services.sourcehut.meta.enable | Whether to enable meta service.
|
| services.sourcehut.todo.enable | Whether to enable todo service.
|
| services.sourcehut.builds.port | Port on which the "builds" backend should listen.
|
| services.anubis.instances.<name>.settings.WEBMASTER_EMAIL | If set, shows a contact email address when rendering error pages
|
| services.sourcehut.paste.group | Group for paste.sr.ht
|
| services.sourcehut.lists.group | Group for lists.sr.ht
|
| services.sourcehut.pages.group | Group for pages.sr.ht
|
| services.your_spotify.settings.SPOTIFY_PUBLIC | The public client ID of your Spotify application
|
| services.anubis.defaultOptions.settings.OG_PASSTHROUGH | Whether to enable Open Graph tag passthrough
|
| services.your_spotify.settings.MONGO_ENDPOINT | The endpoint of the Mongo database.
|
| services.sourcehut.pages.redis.host | The redis host URL
|
| services.sourcehut.paste.redis.host | The redis host URL
|
| services.sourcehut.lists.redis.host | The redis host URL
|
| services.your_spotify.settings.API_ENDPOINT | The endpoint of your server
This api has to be reachable from the device you use the website from not from the server
|
| services.sourcehut.hg.package | The hgsrht package to use.
|
| programs.htop.settings | Extra global default configuration for htop
which is read on first startup only
|
| services.oauth2-proxy.azure.resource | The resource that is protected.
|
| services.sourcehut.git.package | The gitsrht package to use.
|
| services.sourcehut.man.package | The mansrht package to use.
|
| services.sourcehut.hub.package | The hubsrht package to use.
|
| services.sourcehut.lists.enable | Whether to enable lists service.
|
| services.sourcehut.paste.enable | Whether to enable paste service.
|
| services.sourcehut.pages.enable | Whether to enable pages service.
|
| services.sourcehut.nginx.enable | Whether to enable local nginx integration.
|
| services.sourcehut.minio.enable | Whether to enable local minio integration.
|
| services.your_spotify.settings.CLIENT_ENDPOINT | The endpoint of your web application
|
| services.sourcehut.redis.enable | Whether to enable local redis integration in a dedicated redis-server.
|
| services.gitea.settings.service.DISABLE_REGISTRATION | By default any user can create an account on this gitea instance
|
| services.postgres-websockets.environment.PGWS_HOST | Address the server will listen for websocket connections.
|
| services.sourcehut.builds.redis.host | The redis host URL
|
| services.sourcehut.builds.group | Group for builds.sr.ht
|
| services.sourcehut.meta.package | The metasrht package to use.
|
| services.sourcehut.git.gitPackage | The git package to use.
|
| services.sourcehut.todo.package | The todosrht package to use.
|
| services.sourcehut.enable | Whether to enable sourcehut - git hosting, continuous integration, mailing list, ticket tracking, wiki
and account management services
.
|
| services.anubis.instances.<name>.settings.OG_PASSTHROUGH | Whether to enable Open Graph tag passthrough
|
| services.firewalld.zones.<name>.sources | Source addresses, address ranges, MAC addresses or ipsets to bind.
|
| services.sourcehut.builds.enable | Whether to enable builds service.
|
| networking.sits.<name>.encapsulation.sourcePort | Source port when using UDP encapsulation
|
| services.taler.merchant.settings.merchant.LEGAL_PRESERVATION | How long to keep data in the database for tax audits after the transaction has completed.
|
| services.sourcehut.lists.package | The listssrht package to use.
|
| services.sourcehut.pages.package | The pagessrht package to use.
|
| services.sourcehut.paste.package | The pastesrht package to use.
|
| services.sourcehut.builds.images | Images for builds.sr.ht
|
| services.firewalld.services.<name>.sourcePorts.*.protocol | |
| services.sourcehut.settings.mail.pgp-key-id | OpenPGP key identifier.
|
| services.sourcehut.hg.cloneBundles | Generate clonebundles (which require more disk space but dramatically speed up cloning large repositories).
|
| services.davis.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.movim.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.slskd.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.openssh.authorizedKeysFiles | Specify the rules for which files to read on the host
|
| services.sourcehut.settings.mail.smtp-from | Outgoing SMTP FROM.
|
| services.sourcehut.settings."hg.sr.ht".repos | Path to mercurial repositories on disk
|
| services.sourcehut.settings.mail.smtp-port | Outgoing SMTP port.
|
| services.sourcehut.settings.mail.smtp-host | Outgoing SMTP host.
|
| services.sourcehut.settings.mail.smtp-user | Outgoing SMTP user.
|
| services.sourcehut.builds.package | The buildsrht package to use.
|
| services.sourcehut.settings.mail.error-to | Address receiving application exceptions
|
| services.sourcehut.hg.gunicorn.extraArgs | Extra arguments passed to Gunicorn.
|
| services.sourcehut.postfix.enable | Whether to enable local postfix integration.
|
| services.sourcehut.hg.webhooks.extraArgs | Extra arguments passed to the Celery responsible for webhooks.
|
| services.snipe-it.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.sourcehut.lists.process.extraArgs | Extra arguments passed to the Celery responsible for processing mails.
|
| services.sourcehut.settings."git.sr.ht".repos | Path to git repositories on disk
|
| services.bacula-fd.director.<name>.tls.require | Require TLS or TLS-PSK encryption
|
| services.bacula-sd.director.<name>.tls.require | Require TLS or TLS-PSK encryption
|
| services.sourcehut.nginx.virtualHost | Virtual-host configuration merged with all Sourcehut's virtual-hosts.
|
| services.sourcehut.man.gunicorn.extraArgs | Extra arguments passed to Gunicorn.
|
| services.sourcehut.git.gunicorn.extraArgs | Extra arguments passed to Gunicorn.
|
| services.sourcehut.hub.gunicorn.extraArgs | Extra arguments passed to Gunicorn.
|
| services.sourcehut.git.webhooks.extraArgs | Extra arguments passed to the Celery responsible for webhooks.
|
| services.sourcehut.settings."hg.sr.ht".origin | URL hg.sr.ht is being served at (protocol://domain)
|
| services.sourcehut.settings."hg.sr.ht".hg_ssh | Path to hg-ssh (if not in $PATH).
|
| services.sourcehut.settings."hg.sr.ht".debug-host | Address to bind the debug server to.
|
| services.sourcehut.settings."hg.sr.ht".debug-port | Port to bind the debug server to.
|
| services.bacula-fd.director.<name>.tls.verifyPeer | Verify peer certificate
|
| services.bacula-sd.director.<name>.tls.verifyPeer | Verify peer certificate
|
| services.sourcehut.settings.mail.error-from | Address sending application exceptions
|
| services.sourcehut.settings."hub.sr.ht".debug-port | Port to bind the debug server to.
|
| services.sourcehut.todo.gunicorn.extraArgs | Extra arguments passed to Gunicorn.
|
| services.sourcehut.settings."man.sr.ht".debug-host | Address to bind the debug server to.
|
| services.sourcehut.settings."git.sr.ht".debug-port | Port to bind the debug server to.
|
| services.sourcehut.meta.gunicorn.extraArgs | Extra arguments passed to Gunicorn.
|
| services.sourcehut.settings."man.sr.ht".debug-port | Port to bind the debug server to.
|
| services.sourcehut.settings."git.sr.ht".debug-host | Address to bind the debug server to.
|
| services.sourcehut.settings."man.sr.ht".origin | URL man.sr.ht is being served at (protocol://domain)
|
| services.sourcehut.settings."hub.sr.ht".debug-host | Address to bind the debug server to.
|
| services.sourcehut.settings."git.sr.ht".origin | URL git.sr.ht is being served at (protocol://domain)
|
| services.sourcehut.settings."hub.sr.ht".origin | URL hub.sr.ht is being served at (protocol://domain)
|
| services.sourcehut.meta.webhooks.extraArgs | Extra arguments passed to the Celery responsible for webhooks.
|
| services.sourcehut.todo.webhooks.extraArgs | Extra arguments passed to the Celery responsible for webhooks.
|
| virtualisation.credentials.<name>.source | Source file on the host containing the credential data.
|
| services.sourcehut.settings | The configuration for the sourcehut network.
|
| services.sourcehut.settings."lists.sr.ht".redis | The Redis connection used for the Celery worker.
|
| services.gancio.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.akkoma.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.fluidd.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.matomo.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.monica.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.sourcehut.settings."todo.sr.ht::mail".sock | Path for the lmtp daemon's unix socket
|
| services.sourcehut.settings.mail.pgp-pubkey | OpenPGP public key.
|
| services.sourcehut.settings."todo.sr.ht".origin | URL todo.sr.ht is being served at (protocol://domain)
|
| services.sourcehut.settings."meta.sr.ht".debug-port | Port to bind the debug server to.
|
| services.sourcehut.settings."todo.sr.ht".debug-port | Port to bind the debug server to.
|
| services.sourcehut.settings."meta.sr.ht".debug-host | Address to bind the debug server to.
|
| services.sourcehut.settings."todo.sr.ht".debug-host | Address to bind the debug server to.
|
| services.sourcehut.settings."meta.sr.ht".origin | URL meta.sr.ht is being served at (protocol://domain)
|
| services.sourcehut.settings."hg.sr.ht".api-origin | Origin URL for the API
|
| services.sourcehut.pages.gunicorn.extraArgs | Extra arguments passed to Gunicorn.
|
| services.sourcehut.lists.gunicorn.extraArgs | Extra arguments passed to Gunicorn.
|
| services.sourcehut.paste.gunicorn.extraArgs | Extra arguments passed to Gunicorn.
|
| services.sourcehut.settings."sr.ht".site-info | The top-level info page for your site.
|
| services.sourcehut.settings."sr.ht".site-name | The name of your network of sr.ht-based sites.
|
| services.sourcehut.settings."git.sr.ht".api-origin | Origin URL for the API
|
| services.sourcehut.settings."hub.sr.ht".api-origin | Origin URL for the API
|
| services.sourcehut.settings."man.sr.ht".api-origin | Origin URL for the API
|
| services.sourcehut.lists.webhooks.extraArgs | Extra arguments passed to the Celery responsible for webhooks.
|
| services._3proxy.services.*.acl.*.sources | List of source IP range, use empty list for any.
|
| services.sourcehut.settings."pages.sr.ht".max-site-size | Maximum size of any given site (post-gunzip), in MiB.
|
| services.sourcehut.settings."hg.sr.ht".srhtext | Path to the srht mercurial extension
(defaults to where the hgsrht code is)
|
| services.sourcehut.settings."paste.sr.ht".debug-port | Port to bind the debug server to.
|
| services.sourcehut.settings."pages.sr.ht".debug-port | Port to bind the debug server to.
|
| services.sourcehut.settings."pages.sr.ht".origin | URL pages.sr.ht is being served at (protocol://domain)
|
| services.sourcehut.settings."lists.sr.ht".debug-port | Port to bind the debug server to.
|
| services.sourcehut.settings."paste.sr.ht".origin | URL paste.sr.ht is being served at (protocol://domain)
|
| services.sourcehut.settings."paste.sr.ht".debug-host | Address to bind the debug server to.
|
| services.sourcehut.settings."lists.sr.ht".origin | URL lists.sr.ht is being served at (protocol://domain)
|
| services.sourcehut.settings."pages.sr.ht".debug-host | Address to bind the debug server to.
|
| services.sourcehut.settings."lists.sr.ht".debug-host | Address to bind the debug server to.
|
| services.sourcehut.settings."meta.sr.ht".api-origin | Origin URL for the API
|
| services.sourcehut.settings."todo.sr.ht".api-origin | Origin URL for the API
|
| services.sourcehut.settings."builds.sr.ht".redis | The Redis connection used for the Celery worker.
|
| programs.localsend.enable | Whether to enable localsend, an open source cross-platform alternative to AirDrop.
|
| services.sourcehut.settings."sr.ht".site-blurb | Blurb for your site.
|
| services.sourcehut.settings."sr.ht".owner-name | Owner's name.
|
| services.sourcehut.settings."todo.sr.ht".notify-from | Outgoing email for notifications generated by users.
|
| services.sourcehut.listenAddress | Address to bind to.
|
| services.sourcehut.builds.gunicorn.extraArgs | Extra arguments passed to Gunicorn.
|
| services.sourcehut.settings."hg.sr.ht".oauth-client-id | hg.sr.ht's OAuth client id for meta.sr.ht.
|
| services.sourcehut.settings."todo.sr.ht::mail".sock-group | The lmtp daemon will make the unix socket group-read/write
for users in this group.
|
| services.sourcehut.settings."meta.sr.ht::aliases" | Aliases for the client IDs of commonly used OAuth clients.
|
| services.healthchecks.settings.REGISTRATION_OPEN | A boolean that controls whether site visitors can create new accounts
|
| services.sourcehut.settings."pages.sr.ht".api-origin | Origin URL for the API
|
| services.sourcehut.settings."lists.sr.ht".api-origin | Origin URL for the API
|
| services.sourcehut.settings."paste.sr.ht".api-origin | Origin URL for the API
|
| services.sourcehut.settings."man.sr.ht".oauth-client-id | man.sr.ht's OAuth client id for meta.sr.ht.
|
| services.sourcehut.settings."git.sr.ht".oauth-client-id | git.sr.ht's OAuth client id for meta.sr.ht.
|
| services.sourcehut.settings."hub.sr.ht".oauth-client-id | hub.sr.ht's OAuth client id for meta.sr.ht.
|
| services.sourcehut.lists.process.celeryConfig | Content of the celeryconfig.py used by the Celery of listssrht-process.
|
| services.sourcehut.hg.webhooks.celeryConfig | Content of the celeryconfig.py used by the Celery responsible for webhooks.
|
| services.sourcehut.settings."builds.sr.ht".shell | Scripts used to launch on SSH connection.
/usr/bin/master-shell on master,
/usr/bin/runner-shell on runner
|
| services.sourcehut.settings."sr.ht".owner-email | Owner's email.
|
| services.sourcehut.settings."builds.sr.ht".debug-host | Address to bind the debug server to.
|
| services.sourcehut.settings."builds.sr.ht".origin | URL builds.sr.ht is being served at (protocol://domain)
|
| services.sourcehut.settings."builds.sr.ht".debug-port | Port to bind the debug server to.
|
| services.waagent.settings.ResourceDisk.SwapSizeMB | Specifies the size of the swap file in MiB (1024×1024 bytes)
|
| services.sourcehut.builds.enableWorker | Whether to enable worker for builds.sr.ht
For smaller deployments, job runners can be installed alongside the master server
but even if you only build your own software, integration with other services
may cause you to run untrusted builds
(e.g. automatic testing of patches via listssrht)
|
| services.sourcehut.settings."lists.sr.ht".notify-from | Outgoing email for notifications generated by users.
|
| services.sourcehut.git.webhooks.celeryConfig | Content of the celeryconfig.py used by the Celery responsible for webhooks.
|
| services.sourcehut.settings."builds.sr.ht".allow-free | Whether to enable nonpaying users to submit builds.
|
| services.sourcehut.settings."pages.sr.ht".user-domain | Configures the user domain, if enabled
|
| services.radicle.httpd.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.firewalld.zones.<name>.sources.*.mac | A MAC address.
|
| services.sourcehut.settings."hg.sr.ht".webhooks | The Redis connection used for the webhooks worker.
|
| services.sourcehut.settings."lists.sr.ht".allow-new-lists | Whether to enable creation of new lists.
|
| services.sourcehut.settings."todo.sr.ht".oauth-client-id | todo.sr.ht's OAuth client id for meta.sr.ht.
|
| services.sourcehut.settings."git.sr.ht".webhooks | The Redis connection used for the webhooks worker.
|
| services.sourcehut.meta.webhooks.celeryConfig | Content of the celeryconfig.py used by the Celery responsible for webhooks.
|
| services.sourcehut.todo.webhooks.celeryConfig | Content of the celeryconfig.py used by the Celery responsible for webhooks.
|
| services.sourcehut.settings."lists.sr.ht::worker".sock | Path for the lmtp daemon's unix socket
|
| services.sourcehut.settings.mail.pgp-privkey | An absolute file path (which should be outside the Nix-store)
to an OpenPGP private key
|
| services.sourcehut.settings."builds.sr.ht".api-origin | Origin URL for the API
|
| services.sourcehut.settings."pages.sr.ht".gemini-certs | An absolute file path (which should be outside the Nix-store)
to Gemini certificates.
|
| services.sourcehut.settings."meta.sr.ht".webhooks | The Redis connection used for the webhooks worker.
|
| services.sourcehut.settings."todo.sr.ht".webhooks | The Redis connection used for the webhooks worker.
|
| services.sourcehut.settings."lists.sr.ht".oauth-client-id | lists.sr.ht's OAuth client id for meta.sr.ht.
|
| services.sourcehut.settings."pages.sr.ht".oauth-client-id | pages.sr.ht's OAuth client id for meta.sr.ht.
|
| services.sourcehut.settings."paste.sr.ht".oauth-client-id | paste.sr.ht's OAuth client id for meta.sr.ht.
|
| services.sourcehut.settings."builds.sr.ht::worker".name | Listening address and listening port
of the build runner (with HTTP port if not 80).
|
| services.sourcehut.lists.webhooks.celeryConfig | Content of the celeryconfig.py used by the Celery responsible for webhooks.
|
| services.grafana.provision.datasources.settings.datasources | List of datasources to insert/update.
|
| services.waagent.settings.ResourceDisk.Format | If set to true, waagent formats and mounts the resource disk that the platform provides,
unless the file system type in `ResourceDisk
|
| services.sourcehut.settings.mail.smtp-password | Outgoing SMTP password.
|
| services.kanboard.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.librenms.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.dolibarr.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.agorakit.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.fediwall.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.pixelfed.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.mainsail.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.waagent.settings.ResourceDisk.MountPoint | This option specifies the path at which the resource disk is mounted
|
| services.sourcehut.settings.objects.s3-access-key | Access key to the S3-compatible object storage service
|
| services.grafana.provision.datasources.settings.datasources.*.url | Url of the datasource.
|
| services.waagent.settings.ResourceDisk.EnableSwap | If enabled, the agent creates a swap file (/swapfile) on the resource disk
and adds it to the system swap space
|
| services.firewalld.zones.<name>.sources.*.ipset | An ipset.
|
| services.sourcehut.settings."lists.sr.ht".webhooks | The Redis connection used for the webhooks worker.
|
| services.sourcehut.settings."git.sr.ht".post-update-script | A post-update script which is installed in every git repo
|
| services.waagent.settings.ResourceDisk.FileSystem | The file system type for the resource disk
|
| services.sourcehut.settings.objects.s3-secret-key | An absolute file path (which should be outside the Nix-store)
to the secret key of the S3-compatible object storage service.
|
| services.grafana.provision.datasources.settings.datasources.*.uid | Custom UID which can be used to reference this datasource in other parts of the configuration, if not specified will be generated automatically.
|
| services.grafana.provision.datasources.settings.datasources.*.type | Datasource type
|
| services.grafana.provision.datasources.settings.datasources.*.name | Name of the datasource
|
| services.sourcehut.settings."builds.sr.ht".oauth-client-id | builds.sr.ht's OAuth client id for meta.sr.ht.
|
| services.sourcehut.settings."hg.sr.ht".oauth-client-secret | hg.sr.ht's OAuth client secret for meta.sr.ht.
|
| services.sourcehut.settings."sr.ht".network-key | An absolute file path (which should be outside the Nix-store)
to a secret key to encrypt internal messages with
|
| services.sourcehut.settings."lists.sr.ht::worker".sock-group | The lmtp daemon will make the unix socket group-read/write
for users in this group.
|
| services.sourcehut.settings."lists.sr.ht::worker".reject-url | Reject URL.
|
| services.sourcehut.hg.mercurialPackage | The mercurial package to use.
|
| services.sourcehut.settings."sr.ht".global-domain | Global domain name.
|
| virtualisation.sharedDirectories.<name>.source | The path of the directory to share, can be a shell variable
|
| services.sourcehut.settings."git.sr.ht".oauth-client-secret | git.sr.ht's OAuth client secret for meta.sr.ht.
|
| services.sourcehut.settings."hub.sr.ht".oauth-client-secret | hub.sr.ht's OAuth client secret for meta.sr.ht.
|
| services.sourcehut.settings."man.sr.ht".oauth-client-secret | man.sr.ht's OAuth client secret for meta.sr.ht.
|
| services.sourcehut.settings."meta.sr.ht".welcome-emails | Whether to enable sending stock sourcehut welcome emails after signup.
|
| services.hadoop.yarn.nodemanager.resource.cpuVCores | Number of vcores that can be allocated for containers.
|
| services.sourcehut.git.fcgiwrap.preforkProcess | Number of fcgiwrap processes to prefork.
|
| services.grafana.provision.datasources.settings.datasources.*.jsonData | Extra data for datasource plugins.
|
| services.sourcehut.settings."todo.sr.ht".oauth-client-secret | todo.sr.ht's OAuth client secret for meta.sr.ht.
|
| services.vmalert.settings."datasource.url" | Datasource compatible with Prometheus HTTP API.
|
| services.sourcehut.postgresql.enable | Whether to enable local postgresql integration.
|
| services.sourcehut.settings."lists.sr.ht".posting-domain | Posting domain.
|
| services.sourcehut.settings."sr.ht".service-key | An absolute file path (which should be outside the Nix-store)
to a key used for encrypting session cookies
|
| services.grafana.provision.datasources.settings.deleteDatasources | List of datasources that should be deleted from the database.
|
| services.anuko-time-tracker.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.hadoop.yarn.nodemanager.resource.memoryMB | Amount of physical memory, in MB, that can be allocated for containers.
|
| services.zabbixWeb.nginx.virtualHost.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.sourcehut.settings."hg.sr.ht".migrate-on-upgrade | Whether to enable automatic migrations on package upgrade.
|
| services.sourcehut.settings."git.sr.ht".outgoing-domain | Outgoing domain.
|
| services.sourcehut.settings."todo.sr.ht::mail".posting-domain | Posting domain.
|
| services.grafana.provision.datasources.settings.datasources.*.access | Access mode. proxy or direct (Server or Browser in the UI)
|
| services.sourcehut.settings."git.sr.ht::api".internal-ipnet | Set of IP subnets which are permitted to utilize internal API
authentication
|
| services.sourcehut.settings."git.sr.ht".migrate-on-upgrade | Whether to enable automatic migrations on package upgrade.
|
| services.sourcehut.settings."man.sr.ht".migrate-on-upgrade | Whether to enable automatic migrations on package upgrade.
|
| services.sourcehut.settings."hub.sr.ht".migrate-on-upgrade | Whether to enable automatic migrations on package upgrade.
|
| services.bacula-sd.director.<name>.tls.enable | Specifies if TLS should be enabled
|
| services.bacula-fd.director.<name>.tls.enable | Specifies if TLS should be enabled
|
| services.grafana.provision.datasources.settings.deleteDatasources.*.orgId | Organization ID of the datasource to delete.
|
| services.sourcehut.settings."meta.sr.ht::billing".enabled | Whether to enable the billing system.
|
| services.sourcehut.settings."lists.sr.ht".oauth-client-secret | lists.sr.ht's OAuth client secret for meta.sr.ht.
|
| services.sourcehut.settings."paste.sr.ht".oauth-client-secret | paste.sr.ht's OAuth client secret for meta.sr.ht.
|
| services.sourcehut.settings."pages.sr.ht".oauth-client-secret | pages.sr.ht's OAuth client secret for meta.sr.ht.
|
| services.filebeat.inputs | Inputs specify how Filebeat locates and processes input data
|
| services.waagent.settings.ResourceDisk.MountOptions | This option specifies disk mount options to be passed to the mount -o command
|
| services.grafana.provision.datasources.settings.deleteDatasources.*.name | Name of the datasource to delete.
|
| services.bookstack.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.sourcehut.hg.postgresql.database | PostgreSQL database name for the hg.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| services.sourcehut.settings."meta.sr.ht::api".internal-ipnet | Set of IP subnets which are permitted to utilize internal API
authentication
|
| services.sourcehut.settings.objects.s3-upstream | Configure the S3-compatible object storage service.
|
| services.sourcehut.settings."meta.sr.ht".migrate-on-upgrade | Whether to enable automatic migrations on package upgrade.
|
| services.sourcehut.settings."todo.sr.ht".migrate-on-upgrade | Whether to enable automatic migrations on package upgrade.
|
| networking.networkmanager.dispatcherScripts.*.source | Path to the hook script.
|
| services.sourcehut.man.postgresql.database | PostgreSQL database name for the man.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| services.sourcehut.git.postgresql.database | PostgreSQL database name for the git.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| services.sourcehut.hub.postgresql.database | PostgreSQL database name for the hub.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| services.sourcehut.settings."builds.sr.ht::worker".timeout | Max build duration
|
| services.sourcehut.todo.postgresql.database | PostgreSQL database name for the todo.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| services.sourcehut.meta.postgresql.database | PostgreSQL database name for the meta.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| services.sourcehut.settings."builds.sr.ht".oauth-client-secret | builds.sr.ht's OAuth client secret for meta.sr.ht.
|
| services.sourcehut.settings."pages.sr.ht::api".internal-ipnet | Set of IP subnets which are permitted to utilize internal API
authentication
|
| services.sourcehut.settings."pages.sr.ht".migrate-on-upgrade | Whether to enable automatic migrations on package upgrade.
|
| services.sourcehut.settings."lists.sr.ht".migrate-on-upgrade | Whether to enable automatic migrations on package upgrade.
|
| services.sourcehut.settings."paste.sr.ht".migrate-on-upgrade | Whether to enable automatic migrations on package upgrade.
|
| services.grafana.provision.datasources.settings.datasources.*.editable | Allow users to edit datasources from the UI.
|
| services.jirafeau.nginxConfig.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.grafana.provision.datasources.settings.datasources.*.secureJsonData | Datasource specific secure configuration
|
| services.sourcehut.settings.webhooks.private-key | An absolute file path (which should be outside the Nix-store)
to a base64-encoded Ed25519 key for signing webhook payloads
|
| services.sourcehut.settings."builds.sr.ht::worker".bind-address | HTTP bind address for serving local build information/monitoring.
|
| services.sourcehut.lists.postgresql.database | PostgreSQL database name for the lists.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| services.sourcehut.paste.postgresql.database | PostgreSQL database name for the paste.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| services.sourcehut.pages.postgresql.database | PostgreSQL database name for the pages.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| services.sourcehut.settings."builds.sr.ht".migrate-on-upgrade | Whether to enable automatic migrations on package upgrade.
|
| services.sourcehut.settings."meta.sr.ht::billing".stripe-public-key | Public key for Stripe
|
| services.grafana.provision.datasources.path | Path to YAML datasource configuration
|
| services.nginx.virtualHosts.<name>.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.firewalld.zones.<name>.sources.*.address | An IP address or a network IP address with a mask for IPv4 or IPv6
|
| services.sourcehut.settings."meta.sr.ht::billing".stripe-secret-key | An absolute file path (which should be outside the Nix-store)
to a secret key for Stripe
|
| services.postgresql.systemCallFilter | Configures the syscall filter for postgresql.service
|
| services.sourcehut.builds.postgresql.database | PostgreSQL database name for the builds.sr.ht service,
used if services.sourcehut.postgresql.enable is true.
|
| services.sourcehut.settings."meta.sr.ht::settings".user-invites | How many invites each user is issued upon registration
(only applicable if open registration is disabled).
|
| services.grafana.provision.datasources | Declaratively provision Grafana's datasources.
|
| services.sourcehut.settings."hg.sr.ht".connection-string | SQLAlchemy connection string for the database.
|
| programs.steam.dedicatedServer.openFirewall | Open ports in the firewall for Source Dedicated Server.
|
| services.sourcehut.settings."hub.sr.ht".connection-string | SQLAlchemy connection string for the database.
|
| services.sourcehut.settings."git.sr.ht".connection-string | SQLAlchemy connection string for the database.
|
| services.sourcehut.settings."man.sr.ht".connection-string | SQLAlchemy connection string for the database.
|
| services.sourcehut.settings."builds.sr.ht::worker".buildlogs | Path to write build logs.
|
| services.sourcehut.settings."meta.sr.ht".connection-string | SQLAlchemy connection string for the database.
|
| services.sourcehut.settings."todo.sr.ht".connection-string | SQLAlchemy connection string for the database.
|
| services.sourcehut.settings."pages.sr.ht".connection-string | SQLAlchemy connection string for the database.
|
| services.sourcehut.settings."paste.sr.ht".connection-string | SQLAlchemy connection string for the database.
|
| services.sourcehut.settings."lists.sr.ht".connection-string | SQLAlchemy connection string for the database.
|
| services.fedimintd.<name>.nginx.config.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.sourcehut.settings."sr.ht".environment | Values other than "production" adds a banner to each page.
|
| services.bacula-fd.director.<name>.tls.allowedCN | Common name attribute of allowed peer certificates
|
| services.bacula-sd.director.<name>.tls.allowedCN | Common name attribute of allowed peer certificates
|
| services.grafana.provision.datasources.settings.prune | When true, provisioned datasources from this file will be deleted
automatically when removed from
services.grafana.provision.datasources.settings.datasources.
|
| services.icingaweb2.resources | resources.ini contents
|
| services.filebeat.modules | Filebeat modules provide a quick way to get started
processing common log formats
|
| virtualisation.xen.dom0Resources.maxVCPUs | Amount of virtual CPU cores allocated to Domain 0 on boot
|
| services.sourcehut.settings."builds.sr.ht".connection-string | SQLAlchemy connection string for the database.
|
| services.sourcehut.settings."hg.sr.ht".changegroup-script | A changegroup script which is installed in every mercurial repo
|
| services.traefik.dynamic.dir | Path to the directory Traefik should watch for configuration files.
Files in this directory matching the glob _nixos-* (reserved for Nix-managed dynamic configurations) will be deleted as part of
systemd-tmpfiles-resetup.service, regardless of their origin..
|
| services.grafana.provision.datasources.settings | Grafana datasource configuration in Nix
|
| services.sourcehut.settings."lists.sr.ht::worker".reject-mimetypes | Comma-delimited list of Content-Types to reject
|
| services.limesurvey.nginx.virtualHost.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.nncp.daemon.socketActivation.listenStreams | TCP sockets to bind to
|
| services.metricbeat.modules | Metricbeat modules are responsible for reading metrics from the various sources
|
| services.hadoop.yarn.resourcemanager.extraEnv | Extra environment variables
|
| services.hadoop.yarn.resourcemanager.enable | Whether to enable Hadoop YARN ResourceManager.
|
| virtualisation.xen.dom0Resources.memory | Amount of memory (in MiB) allocated to Domain 0 on boot
|
| services.firezone.server.provision.accounts.<name>.resources | All resources to provision
|
| virtualisation.xen.dom0Resources.maxMemory | Maximum amount of memory (in MiB) that Domain 0 can
dynamically allocate to itself
|
| services.matrix-synapse.settings.listeners.*.resources | List of HTTP resources to serve on this listener.
|
| services.grafana.provision.datasources.settings.apiVersion | Config file version.
|
| services.misskey.reverseProxy.webserver.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.parsedmarc.provision.grafana.datasource | Whether the automatically provisioned Elasticsearch
instance should be added as a grafana datasource
|
| services.hadoop.yarn.resourcemanager.extraFlags | Extra command line flags to pass to the service
|
| services.prometheus.exporters.pve.collectors.resources | Collect PVE resources info
|
| services.vmalert.instances.<name>.settings."datasource.url" | Datasource compatible with Prometheus HTTP API.
|
| boot.kernel.sysctl | Runtime parameters of the Linux kernel, as set by
sysctl(8)
|
| services.openssh.authorizedKeysInHomedir | Enables the use of the ~/.ssh/authorized_keys file
|
| services.firezone.server.provision.accounts.<name>.resources.<name>.name | The name of this resource
|
| services.firezone.server.provision.accounts.<name>.resources.<name>.type | The resource type
|
| services.hadoop.yarn.nodemanager.resource.maximumAllocationMB | The maximum physical memory any container can be allocated.
|
| services.matrix-synapse.settings.listeners.*.resources.*.names | List of resources to host on this listener.
|
| services.syncthing.overrideFolders | Whether to delete the folders which are not configured via the
folders option
|
| services.monado.defaultRuntime | Whether to enable Monado as the default OpenXR runtime on the system
|
| services.wivrn.defaultRuntime | Whether to enable WiVRn as the default OpenXR runtime on the system
|
| services.hadoop.yarn.nodemanager.resource.maximumAllocationVCores | The maximum virtual CPU cores any container can be allocated.
|
| services.hadoop.yarn.resourcemanager.openFirewall | Open firewall ports for resourcemanager
|
| services.postsrsd.settings.chroot-dir | Path to chroot into at runtime as an additional layer of protection.
We confine the runtime environment through systemd hardening instead, so this option is read-only.
|
| services.matrix-synapse.log | Default configuration for the loggers used by matrix-synapse and its workers
|
| services.galene.keyFile | Path to the server's private key
|
| services.scx.extraArgs | Parameters passed to the chosen scheduler at runtime.
Run chosen-scx-scheduler --help to see the available options
|
| services.sourcehut.settings."meta.sr.ht::settings".registration | Whether to enable public registration.
|
| services.firezone.server.provision.accounts.<name>.policies.<name>.resource | The resource to which access should be allowed.
|
| services.node-red.withNpmAndGcc | Give Node-RED access to NPM and GCC at runtime, so 'Nodes' can be
downloaded and managed imperatively via the 'Palette Manager'.
|
| services.sourcehut.settings."meta.sr.ht::settings".onboarding-redirect | Where to redirect new users upon registration.
|
| services.firezone.server.provision.accounts.<name>.resources.<name>.filters | A list of filter to restrict traffic
|
| services.firezone.server.provision.accounts.<name>.resources.<name>.address | The address of this resource
|
| services.galene.certFile | Path to the server's certificate
|
| services.pgbackrest.stanzas.<name>.settings | An attribute set of options as described in:
https://pgbackrest.org/configuration.html
All options can be used
|
| services.traefik.dynamic.files | Dynamic configuration files to write
|
| services.outline.azureAuthentication.resourceAppId | Authentication application resource ID.
|
| services.bacula-sd.director.<name>.tls.certificate | The full path to the PEM encoded TLS certificate
|
| services.bacula-fd.director.<name>.tls.certificate | The full path to the PEM encoded TLS certificate
|
| services.hadoop.yarn.resourcemanager.restartIfChanged | Automatically restart the service on config change
|
| services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.ports | Either a single port or port range to allow
|
| services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.ports.*.to | The end of the port range, inclusive.
|
| services.matrix-synapse.settings.listeners.*.resources.*.compress | Whether synapse should compress HTTP responses to clients that support it
|
| services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.ports.*.from | The start of the port range, inclusive.
|
| services.firezone.server.provision.accounts.<name>.resources.<name>.gatewayGroups | A list of gateway groups (sites) which can reach the resource and may be used to connect to it.
|
| virtualisation.rosetta.mountTag | The VirtioFS mount tag for the Rosetta runtime, exposed by the host's virtualisation software
|
| services.bacula-fd.director.<name>.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| services.bacula-sd.director.<name>.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| services.icingaweb2.modules.monitoring.backends.<name>.resource | Name of the IDO resource
|
| hardware.amdgpu.opencl.enable | Whether to enable OpenCL support using ROCM runtime library.
|
| services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.protocol | The protocol to allow
|
| services.wiki-js.settings.logLevel | Define how much detail is supposed to be logged at runtime.
|
| services.linyaps.enable | Whether to enable linyaps, a cross-distribution package manager with sandboxed apps and shared runtime.
|
| services.borgmatic.settings.source_directories | List of source directories and files to backup
|
| services.icingaweb2.modules.monitoring.transports.<name>.resource | SSH identity resource for the remote transport
|
| services.bird.preCheckConfig | Commands to execute before the config file check
|
| services.athens.goBinary | The Go package used by Athens at runtime
|
| services.couchdb.configFile | Configuration file for persisting runtime changes
|
| services.maddy.tls.loader | TLS certificates are obtained by modules called "certificate
loaders"
|
| services.szurubooru.server.settings.delete_source_files | Whether to delete thumbnails and source files on post delete.
|
| services.firezone.server.provision.accounts.<name>.resources.<name>.addressDescription | An optional description for resource address, usually a full link to the resource including a schema.
|
| services.forgejo.customDir | Base directory for custom templates and other options
|
| services.lighttpd.cgit.configText | Verbatim contents of the cgit runtime configuration file
|
| services.zitadel.settings | Contents of the runtime configuration file
|
| services.unifi.maximumJavaHeapSize | Set the maximum heap size for the JVM in MB
|
| services.unifi.initialJavaHeapSize | Set the initial heap size for the JVM in MB
|
| system.nixos.label | NixOS version name to be used in the names of generated
outputs and boot labels
|
| hardware.amdgpu.amdvlk.settings | Runtime settings for AMDVLK to be configured /etc/amd/amdVulkanSettings.cfg
|
| services.wivrn.config.json | Configuration for WiVRn
|
| services.prometheus.rules | Alerting and/or Recording rules to evaluate at runtime.
|
| services.rkvm.server.settings.switch-keys | A key list specifying a host switch combination.
A list of key names is available in https://github.com/htrefil/rkvm/blob/master/switch-keys.md.
|
| services.riemann.configFiles | Extra files containing Riemann configuration
|
| services.jupyter.extraPackages | Extra packages to be available in the jupyter runtime environment
|
| services.firezone.server.provision.accounts.<name>.features.internet_resource | Whether to enable the internet_resource feature for this account.
|
| services.flannel.storageBackend | Determines where flannel stores its configuration at runtime
|
| hardware.alsa.defaultDevice.capture | The default capture device (i.e. microphone)
|
| services.apcupsd.configText | Contents of the runtime configuration file, apcupsd.conf
|
| services.netdata.python.extraPackages | Extra python packages available at runtime
to enable additional python plugins.
|
| services.deluge.extraPackages | Extra packages available at runtime to enable Deluge's plugins
|
| services.prometheus.scrapeConfigs.*.relabel_configs.*.source_labels | The source labels select values from existing labels
|
| services.matrix-synapse.workers.<name>.worker_listeners.*.resources | List of HTTP resources to serve on this listener.
|
| services.activemq.extraJavaOptions | Add extra options here that you want to be sent to the
Java runtime when the broker service is started.
|
| services.moonraker.analysis.enable | Whether to enable Runtime analysis with klipper-estimator.
|
| hardware.alsa.defaultDevice.playback | The default playback device
|
| services.gotify.stateDirectoryName | The name of the directory below /var/lib where
gotify stores its runtime data.
|
| services.nginx.uwsgiResolveWhileRunning | Resolves domains of uwsgi targets at runtime
and not only at start, you have to set
services.nginx.resolver, too.
|
| services.matrix-synapse.workers.<name>.worker_listeners.*.resources.*.names | List of resources to host on this listener.
|
| boot.loader.grub.extraFiles | A set of files to be copied to /boot
|
| services.userdbd.enableSSHSupport | Whether to enable exposing OpenSSH public keys defined in userdb
|
| services.monado.forceDefaultRuntime | Whether to ensure that Monado is the active runtime set for the current
user
|
| services.rabbitmq.config | Verbatim advanced configuration file contents using the Erlang syntax
|
| services.evcc.environmentFile | File with environment variables to pass into the runtime environment
|
| services.borgmatic.configurations.<name>.source_directories | List of source directories and files to backup
|
| services.maubot.settings.server.override_resource_path | Override path from where to load UI resources.
|
| services.firewalld.settings.FlushAllOnReload | Whether to flush all runtime rules on a reload.
|
| services.firezone.server.provision.accounts.<name>.features.multi_site_resources | Whether to enable the multi_site_resources feature for this account.
|
| services.mirakurun.tunerSettings | Options which are added to tuners.yml
|
| services.matrix-synapse.workers.<name>.worker_listeners.*.resources.*.compress | Whether synapse should compress HTTP responses to clients that support it
|
| services.crossfire-server.stateDir | Where to store runtime data (save files, persistent items, etc)
|
| services.buffyboard.settings.theme.default | Selects the default theme on boot
|
| services.nginx.proxyResolveWhileRunning | Resolves domains of proxyPass targets at runtime and not only at startup
|
| services.sourcehut.settings."hg.sr.ht".clone_bundle_threshold | .hg/store size (in MB) past which the nightly job generates clone bundles.
|
| services.borgbackup.jobs.<name>.extraInitArgs | Additional arguments for borg init
|
| services.schleuder.extraSettingsFile | YAML file to merge into the schleuder config at runtime
|
| services.borgbackup.jobs.<name>.extraPruneArgs | Additional arguments for borg prune
|
| services.grafana.settings.security.data_source_proxy_whitelist | Define a whitelist of allowed IP addresses or domains, with ports,
to be used in data source URLs with the Grafana data source proxy
|
| services.rabbitmq.configItems | Configuration options in RabbitMQ's new config file format,
which is a simple key-value format that can not express nested
data structures
|
| hardware.nvidia.open | Whether to enable the open source NVIDIA kernel module.
|
| services.mirakurun.channelSettings | Options which are added to channels.yml
|
| services.odoo.enable | Whether to enable odoo, an open source ERP and CRM system.
|
| services.thanos.rule.alert.query-url | The external Thanos Query URL that would be set in all alerts 'Source' field.
|
| services.borgbackup.jobs.<name>.extraCreateArgs | Additional arguments for borg create
|
| virtualisation.cri-o.enable | Whether to enable Container Runtime Interface for OCI (CRI-O).
|
| services.firezone.server.settingsSecret | This is a convenience option which allows you to set secret values for
environment variables by specifying a file which will contain the value
at runtime
|
| services.go2rtc.settings.streams | Stream source configuration
|
| services.prometheus.exporters.py-air-control.stateDir | Directory below /var/lib to store runtime data
|
| services.borgbackup.jobs.<name>.extraCompactArgs | Additional arguments for borg compact
|
| services.wstunnel.clients.<name>.httpProxy | Proxy to use to connect to the wstunnel server (USER:PASS@HOST:PORT).
Passwords specified here will be world-readable in the Nix store!
To pass a password to the service, point the environmentFile option
to a file containing PROXY_PASSWORD=<your-password-here> and set
this option to <user>:$PROXY_PASSWORD@<host>:<port>
|
| services.maddy.enable | Whether to enable Maddy, a free an open source mail server.
|
| services.prometheus.exporters.varnish.withGoMetrics | Export go runtime and http handler metrics.
|
| services.sharkey.environmentFiles | List of paths to files containing environment variables for Sharkey to use at runtime
|
| services.komga.enable | Whether to enable Komga, a free and open source comics/mangas media server.
|
| services.thanos.rule.labels | Labels to be applied to all generated metrics
|
| services.prometheus.remoteWrite.*.write_relabel_configs.*.source_labels | The source labels select values from existing labels
|
| services.snipe-it.enable | Whether to enable snipe-it, a free open source IT asset/license management system.
|
| systemd.services.<name>.confinement.enable | If set, all the required runtime store paths for this service are
bind-mounted into a tmpfs-based
chroot(2).
|
| services.borgbackup.jobs.<name>.archiveBaseName | How to name the created archives
|
| services.authelia.instances.<name>.secrets | It is recommended you keep your secrets separate from the configuration
|
| boot.loader.systemd-boot.extraFiles | A set of files to be copied to $BOOT
|
| services.zammad.enable | Whether to enable Zammad, a web-based, open source user support/ticketing solution.
|
| networking.ucarp.srcIp | Source (real) IP address of this host.
|
| services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.source_labels | The source labels select values from existing labels
|
| services.amule.settings.eMule.UDPPort | UDP port for eD2k traffic (searches, source exchange) and all Kad network communication
|
| nixpkgs.pkgs | If set, the pkgs argument to all NixOS modules is the value of
this option, extended with nixpkgs.overlays, if
that is also set
|
| services.gitea-actions-runner.instances.<name>.labels | Labels used to map jobs to their runtime environment
|
| hardware.nvidia.powerManagement.finegrained | Whether to enable experimental power management of PRIME offload
|
| services.tayga.ipv4.address | The source IPv4 address of the TAYGA server.
|
| services.tayga.ipv6.address | The source IPv6 address of the TAYGA server.
|
| services.znapzend.zetup.<name>.timestampFormat | The timestamp format to use for constructing snapshot names
|
| networking.hostName | The name of the machine
|
| services.gpsd.devices | List of devices that gpsd should subscribe to
|
| services.traccar.enable | Whether to enable Traccar, an open source GPS tracking system.
|
| services.jupyter.extraEnvironmentVariables | Extra environment variables to be set in the runtime context of jupyter notebook
|
| services.crowdsec-firewall-bouncer.settings.api_key | API key to authenticate with a local crowdsec API
|
| services.opengfw.enable | Whether to enable OpenGFW, A flexible, easy-to-use, open source implementation of GFW on Linux
.
|
| hardware.nvidia-container-toolkit.device-name-strategy | Specify the strategy for generating device names,
passed to nvidia-ctk cdi generate
|
| virtualisation.podman.extraRuntimes | Extra runtime packages to be installed in the Podman wrapper
|
| security.allowUserNamespaces | Whether to allow creation of user namespaces
|
| services.kubernetes.kubelet.containerRuntimeEndpoint | Endpoint at which to find the container runtime api interface/socket
|
| virtualisation.containerd.enable | Whether to enable containerd container runtime.
|
| services.firefly-iii.enable | Whether to enable Firefly III: A free and open source personal finance manager.
|
| services.qui.settings | qui configuration options
|
| services.vmalert.enable | Wether to enable VictoriaMetrics's vmalert.
vmalert evaluates alerting and recording rules against a data source, sends notifications via Alertmanager.
|
| services.wstunnel.clients.<name>.environmentFile | Environment file to be passed to the systemd service
|
| services.wstunnel.servers.<name>.environmentFile | Environment file to be passed to the systemd service
|
| services.ferretdb.enable | Whether to enable FerretDB, an Open Source MongoDB alternative.
|
| services.docuseal.enable | Whether to enable DocuSeal, open source document signing.
|
| services.sks.webroot | Source directory (will be symlinked, if not null) for the files the
built-in webserver should serve
|
| services.chromadb.enable | Whether to enable ChromaDB, an open-source AI application database..
|
| services.tee-supplicant.trustedApplications | A list of full paths to trusted applications that will be loaded at
runtime by tee-supplicant.
|
| services.ebusd.device | Use DEV as eBUS device [/dev/ttyUSB0]
|
| xdg.icons.fallbackCursorThemes | Names of the fallback cursor themes, in order of preference, to be used when no other icon source can be found
|
| services.airsonic.enable | Whether to enable Airsonic, the Free and Open Source media streaming server (fork of Subsonic and Libresonic).
|
| services.cockroachdb.package | The cockroachdb package to use
|
| services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".signing_salt | Signing salt
|
| boot.loader.grub.extraGrubInstallArgs | Additional arguments passed to grub-install
|
| services.dashy.enable | Whether to enable Dashy, a highly customizable, easy to use, privacy-respecting dashboard app
|
| services.ntp.restrictSource | The restriction flags to be set on source
|
| services.discourse.enable | Whether to enable Discourse, an open source discussion platform.
|
| boot.loader.limine.additionalFiles | A set of files to be copied to /boot
|
| boot.loader.refind.additionalFiles | A set of files to be copied to /boot
|
| services.headscale.enable | Whether to enable headscale, Open Source coordination server for Tailscale.
|
| services.journald.remote.output | The location of the output journal
|
| services.geoclue2.enableStatic | Whether to enable the static source
|
| services.github-runners.<name>.ephemeral | If enabled, causes the following behavior:
- Passes the
--ephemeral flag to the runner configuration script
- De-registers and stops the runner with GitHub after it has processed one job
- On stop, systemd wipes the runtime directory (this always happens, even without using the ephemeral option)
- Restarts the service after its successful exit
- On start, wipes the state directory and configures a new runner
You should only enable this option if tokenFile points to a file which contains a
personal access token (PAT)
|
| services.akkoma.config.":joken".":default_signer" | JWT signing secret
|
| services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".live_view.signing_salt | LiveView signing salt
|
| services.healthchecks.settings | Environment variables which are read by healthchecks (local)_settings.py
|
| services.syncthing.enable | Whether to enable Syncthing, a self-hosted open-source alternative to Dropbox and Bittorrent Sync.
|
| virtualisation.qemu.networkingOptions | Networking-related command-line options that should be passed to qemu
|
| system.includeBuildDependencies | Whether to include the build closure of the whole system in
its runtime closure
|
| services.wstunnel.clients.<name>.upgradeCredentials | Use these credentials to authenticate during the HTTP upgrade request
(Basic authorization type, USER:[PASS]).
Passwords specified here will be world-readable in the Nix store!
To pass a password to the service, point the environmentFile option
to a file containing HTTP_PASSWORD=<your-password-here> and set this
option to <user>:$HTTP_PASSWORD
|
| services.znapzend.zetup.<name>.enable | Whether to enable this source.
|
| services.syncoid.localSourceAllow | Permissions granted for the services.syncoid.user user
for local source datasets
|
| services.healthchecks.settingsFile | Environment variables which are read by healthchecks (local)_settings.py
|
| boot.loader.grub.memtest86.params | Parameters added to the Memtest86+ command line
|
| services.logmein-hamachi.enable | Whether to enable LogMeIn Hamachi, a proprietary
(closed source) commercial VPN software.
|
| services.spiped.config.<name>.encrypt | Take unencrypted connections from the
source socket and send encrypted
connections to the target socket.
|
| services.spiped.config.<name>.decrypt | Take encrypted connections from the
source socket and send unencrypted
connections to the target socket.
|
| hardware.deviceTree.kernelPackage | Kernel package where device tree include directory is from
|
| services.suwayomi-server.enable | Whether to enable Suwayomi, a free and open source manga reader server that runs extensions built for Tachiyomi.
|
| services.znapzend.zetup.<name>.dataset | The dataset to use for this source.
|
| systemd.sysupdate.reboot.enable | Whether to automatically reboot after an update
|
| services.nsd.ratelimit.ratelimit | Max qps allowed from any query source.
0 means unlimited
|
| services.spiped.config.<name>.waitForDNS | Wait for DNS
|
| virtualisation.oci-containers.containers.<name>.labels | Labels to attach to the container at runtime.
|
| hardware.tuxedo-drivers.enable | Whether to enable The tuxedo-drivers driver enables access to the following on TUXEDO notebooks:
- Driver for Fn-keys
- SysFS control of brightness/color/mode for most TUXEDO keyboards
- Hardware I/O driver for TUXEDO Control Center
For more inforation it is best to check at the source code description: https://gitlab.com/tuxedocomputers/development/packages/tuxedo-drivers
.
|
| services.znapzend.features.sendRaw | Whether to enable sendRaw feature which adds the options -w to the
zfs send command
|
| services.sabnzbd.allowConfigWrite | By default we create the sabnzbd configuration read-only,
which keeps the nixos configuration as the single source
of truth
|
| services.snapserver.streams | The definition for an input source.
|
| services.privatebin.enable | Whether to enable Privatebin: A minimalist, open source online
pastebin where the server has zero knowledge of pasted data..
|
| services.lubelogger.enable | Whether to enable LubeLogger, a self-hosted, open-source, web-based vehicle maintenance and fuel milage tracker.
|
| services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".secret_key_base | Secret key used as a base to generate further secrets for encrypting and
signing data
|
| services.znapzend.features.oracleMode | Whether to enable destroying snapshots one by one instead of using one long argument list
|
| networking.jool.enable | Whether to enable Jool, an Open Source implementation of IPv4/IPv6
translation on Linux
|
| services.znapzend.zetup.<name>.presnap | Command to run before snapshots are taken on the source dataset,
e.g. for database locking/flushing
|
| services.rke2.images | List of derivations that provide container images
|
| services.geoclue2.enableWifi | Whether to enable WiFi source.
|
| services.geoclue2.enableCDMA | Whether to enable CDMA source.
|
| services.suwayomi-server.settings.server.localSourcePath | Path to the local source folder.
|
| services.thanos.query.query.auto-downsampling | Enable automatic adjustment (step / 5) to what source of data should
be used in store gateways if no
max_source_resolution param is specified.
|
| services.geoclue2.enable3G | Whether to enable 3G source.
|
| services.firewalld.settings.IPv6_rpfilter | Performs reverse path filtering (RPF) on IPv6 packets as per RFC 3704
|
| services.znapzend.zetup.<name>.postsnap | Command to run after snapshots are taken on the source dataset,
e.g. for database unlocking
|
| services.opencloud.settings | Additional YAML configuration for OpenCloud services
|
| services.qbittorrent.extraArgs | Extra arguments passed to qbittorrent
|
| services.znapzend.zetup.<name>.plan | The znapzend backup plan to use for the source
|
| services.hedgedoc.settings.allowGravatar | Whether to enable Libravatar as
profile picture source on your instance
|
| services.znapzend.features.skipIntermediates | Whether to enable the skipIntermediates feature to send a single increment
between latest common snapshot and the newly made one
|
| documentation.man.man-db.manualPages | The manual pages to generate caches for if documentation.man.generateCaches
is enabled
|
| services.geoclue2.enableModemGPS | Whether to enable Modem-GPS source.
|
| boot.kernelPatches | A list of additional patches to apply to the kernel
|
| services.ntpd-rs.useNetworkingTimeServers | Use source time servers from networking.timeServers in config.
|
| specialisation | Additional configurations to build
|
| services.vmalert.instances.<name>.enable | Wether to enable VictoriaMetrics's vmalert.
vmalert evaluates alerting and recording rules against a data source, sends notifications via Alertmanager.
|
| services.pid-fan-controller.settings.heatSources.*.name | Name of the heat source.
|
| services.xserver.windowManager.xmonad.config | Configuration from which XMonad gets compiled
|
| services.hostapd.radios.<name>.settings | Extra configuration options to put at the end of global initialization, before defining BSSs
|
| services.victorialogs.enable | Whether to enable VictoriaLogs is an open source user-friendly database for logs from VictoriaMetrics.
|
| services.silverbullet.enable | Whether to enable Silverbullet, an open-source, self-hosted, offline-capable Personal Knowledge Management (PKM) web application.
|
| services.netbird.clients.<name>.config | Additional configuration that exists before the first start and
later overrides the existing values in config.json
|
| services.netbird.tunnels.<name>.config | Additional configuration that exists before the first start and
later overrides the existing values in config.json
|
| services.syncoid.commands.<name>.localSourceAllow | Permissions granted for the services.syncoid.user user
for local source datasets
|
| services.shadowsocks.extraConfig | Additional configuration for shadowsocks that is not covered by the
provided options
|
| virtualisation.oci-containers.containers.<name>.capabilities | Capabilities to configure for the container
|
| boot.specialFileSystems.<name>.device | The device as passed to mount
|
| services.pufferpanel.environment | Environment variables to set for the service
|
| services.geoclue2.staticAltitude | Altitude in meters to use for the static source.
|
| networking.interfaces.<name>.tempAddress | When IPv6 is enabled with SLAAC, this option controls the use of
temporary address (aka privacy extensions) on this
interface
|
| services.geoclue2.staticAccuracy | Accuracy radius in meters to use for the static source.
|
| services.geoclue2.staticLatitude | Latitude to use for the static source
|
| security.allowSimultaneousMultithreading | Whether to allow SMT/hyperthreading
|
| services.guix.substituters.authorizedKeys | A list of signing keys for each substitute server to be authorized as
a source of substitutes
|
| networking.firewall.checkReversePath | Performs a reverse path filter test on a packet
|
| swapDevices.*.randomEncryption.keySize | Set the encryption key size for the plain device
|
| services.geoclue2.staticLongitude | Longitude to use for the static source
|
| services.victoriatraces.enable | Whether to enable VictoriaTraces is an open source distributed traces storage and query engine from VictoriaMetrics.
|
| services.jellyfin.forceEncodingConfig | Whether to overwrite Jellyfin's encoding.xml configuration file on each service start
|
| services.hostapd.radios.<name>.networks.<name>.settings | Extra configuration options to put at the end of this BSS's defintion in the
hostapd.conf for the associated interface
|
| services.prometheus.alertmanagerIrcRelay.settings | Configuration for Alertmanager IRC Relay as a Nix attribute set
|
| services.warpgate.settings.config_provider | Source of truth of users
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.per_cpu_sas | Enable per-CPU CHILD_SAs
|
| services.znapzend.zetup.<name>.destinations.<name>.plan | The znapzend backup plan to use for the source
|
| virtualisation.fileSystems.<name>.device | The device as passed to mount
|
| virtualisation.credentials.<name>.text | Text content of the credential
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote_addrs | Remote address(es) to use for IKE communication
|
| services.prometheus.scrapeConfigs.*.relabel_configs.*.modulus | Modulus to take of the hash of the source label values.
|
| services.prometheus.scrapeConfigs.*.relabel_configs.*.separator | Separator placed between concatenated source label values
|
| services.nixseparatedebuginfod.enable | Whether to enable separatedebuginfod, a debuginfod server providing source and debuginfo for nix packages.
|
| fileSystems.<name>.device | The device as passed to mount
|
| containers.<name>.forwardPorts.*.hostPort | Source port of the external interface on host
|
| services.prometheus.remoteWrite.*.write_relabel_configs.*.modulus | Modulus to take of the hash of the source label values.
|
| containers.<name>.extraVeths.<name>.forwardPorts.*.hostPort | Source port of the external interface on host
|
| services.prometheus.remoteWrite.*.write_relabel_configs.*.separator | Separator placed between concatenated source label values
|
| services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.modulus | Modulus to take of the hash of the source label values.
|
| services.nixseparatedebuginfod2.enable | Whether to enable nixseparatedebuginfod2, a debuginfod server providing source and debuginfo for nix packages.
|
| services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.separator | Separator placed between concatenated source label values
|