| services.filebeat.modules | Filebeat modules provide a quick way to get started
processing common log formats
|
| services.filebeat.modules.<name>.module | The name of the module
|
| services.metricbeat.modules | Metricbeat modules are responsible for reading metrics from the various sources
|
| image.modules | image-specific NixOS Modules used for system.build.images.
|
| services.filebeat.inputs | Inputs specify how Filebeat locates and processes input data
|
| services.xserver.modules | Packages to be added to the module search path of the X server.
|
| services.metricbeat.modules.<name>.module | The name of the module
|
| services.prosody.modules.mam | Store messages in an archive and allow users to access it
|
| services.prosody.modules.pep | Enables users to publish their mood, activity, playing music and more
|
| services.prosody.modules.tls | Add support for secure TLS on c2s/s2s connections
|
| services.speechd.modules | Configuration files of output modules.
|
| services.prosody.modules.csi | Implements the CSI protocol that allows clients to report their active/inactive state to the server
|
| services.prosody.modules.motd | Send a message to users when they log in
|
| services.prosody.modules.ping | Replies to XMPP pings with pongs
|
| services.prosody.modules.time | Let others know the time here on this server
|
| services.prosody.modules.bosh | Enable BOSH clients, aka 'Jabber over HTTP'
|
| services.zabbixProxy.modules | A set of modules to load.
|
| services.zabbixAgent.modules | A set of modules to load.
|
| services.znc.confOptions.modules | A list of modules to include in the znc.conf file.
|
| services.prosody.modules.disco | Service discovery
|
| services.prosody.modules.vcard | Allow users to set vCards
|
| services.zabbixServer.modules | A set of modules to load.
|
| services.drupal.sites.<name>.modulesDir | The location for users to install Drupal modules.
|
| services.prosody.modules.roster | Allow users to have a roster
|
| services.prosody.modules.groups | Shared roster support
|
| services.prosody.modules.uptime | Report how long server has been running
|
| services.prosody.modules.limits | Enable bandwidth limiting for XMPP connections
|
| services.prosody.modules.smacks | Allow a client to resume a disconnected session, and prevent message loss
|
| services.prosody.modules.version | Replies to server version requests
|
| services.prosody.modules.welcome | Welcome users who register accounts
|
| services.prosody.modules.carbons | Keep multiple clients in sync
|
| services.prosody.modules.private | Private XML storage (for room bookmarks, etc.)
|
| services.prosody.modules.proxy65 | Enables a file transfer proxy service which clients behind NAT can use
|
| services.prosody.modules.dialback | s2s dialback support
|
| services.prosody.modules.announce | Send announcement to all online users
|
| services.prosody.modules.saslauth | Authentication for clients and servers
|
| services.prosody.modules.register | Allow users to register on this server using a client and change passwords
|
| services.icingaweb2.modules.doc.enable | Whether to enable the icingaweb2 doc module.
|
| services.prosody.modules.websocket | Enable WebSocket support
|
| services.prosody.modules.blocklist | Allow users to block communications with other users
|
| services.prosody.modules.bookmarks | Allows interop between older clients that use XEP-0048: Bookmarks in its 1.0 version and recent clients which use it in PEP
|
| services.icingaweb2.modules.test.enable | Whether to enable the icingaweb2 test module.
|
| services.znc.confOptions.networks.<name>.modules | ZNC network modules to load.
|
| services.icingaweb2.modules.setup.enable | Whether to enable the icingaweb2 setup module.
|
| services.prosody.modules.http_files | Serve static files from a directory over HTTP
|
| services.prosody.modules.legacyauth | Legacy authentication
|
| services.icingaweb2.modules.migrate.enable | Whether to enable the icingaweb2 migrate module.
|
| services.prosody.modules.admin_adhoc | Allows administration via an XMPP client that supports ad-hoc commands
|
| programs.gtklock.modules | gtklock modules to load.
|
| services.prosody.modules.admin_telnet | Opens telnet console interface on localhost port 5582
|
| services.prosody.modules.vcard_legacy | Converts users profiles and Avatars between old and new formats
|
| services.prosody.modules.cloud_notify | Push notifications to inform users of new messages or other pertinent information even when they have no XMPP clients online
|
| services.icingaweb2.modules.monitoring.enable | Whether to enable the icingaweb2 monitoring module.
|
| services.icingaweb2.modules.translation.enable | Whether to enable the icingaweb2 translation module.
|
| services.icingaweb2.modules.monitoring.backends | Monitoring backends to define
|
| services.icingaweb2.modules.monitoring.generalConfig.mutable | Make config.ini of the monitoring module mutable (e.g. via the web interface).
|
| services.icingaweb2.modules.monitoring.mutableBackends | Make backends.ini of the monitoring module mutable (e.g. via the web interface).
|
| services.icingaweb2.modules.monitoring.transports | Command transports to define
|
| services.vwifi.module.enable | Whether to enable mac80211_hwsim module.
|
| services.icingaweb2.modules.monitoring.mutableTransports | Make commandtransports.ini of the monitoring module mutable (e.g. via the web interface).
|
| hardware.system76.kernel-modules.enable | Whether to make the system76 out-of-tree kernel modules available
|
| services.icingaweb2.modules.monitoring.transports.<name>.type | Type of this transport
|
| services.icingaweb2.modules.monitoring.transports.<name>.host | Host for the api or remote transport
|
| services.icingaweb2.modules.monitoring.transports.<name>.path | Path to the socket for local or remote transports
|
| services.icingaweb2.modules.monitoring.transports.<name>.port | Port to connect to for the api or remote transport
|
| services.icingaweb2.modules.monitoring.backends.<name>.disabled | Disable this backend
|
| services.icingaweb2.modules.monitoring.backends.<name>.resource | Name of the IDO resource
|
| services.icingaweb2.modules.monitoring.generalConfig.protectedVars | List of string patterns for custom variables which should be excluded from user’s view.
|
| services.vwifi.module.numRadios | The number of virtual radio interfaces to create.
|
| services.icingaweb2.modules.monitoring.transports.<name>.password | Password for the api transport
|
| services.icingaweb2.modules.monitoring.transports.<name>.username | Username for the api or remote transport
|
| services.icingaweb2.modules.monitoring.transports.<name>.instance | Assign a icinga instance to this transport
|
| services.icingaweb2.modules.monitoring.transports.<name>.resource | SSH identity resource for the remote transport
|
| services.vwifi.module.macPrefix | The prefix for MAC addresses to use, without the trailing ':'
|
| services.prosody.modules.watchregistrations | Alert admins of registrations
|
| services.znc.modulePackages | A list of global znc module packages to add to znc.
|
| services.prosody.modules.server_contact_info | Publish contact information for this service
|
| services.xserver.moduleSection | Contents of the Module section of the X server configuration file.
|
| services.openafsClient.packages.module | OpenAFS kernel module package
|
| services.prometheus.scrapeConfigs.*.label_name_length_limit | Per-scrape limit on length of labels name that will be accepted for a sample
|
| _module.args | Additional arguments passed to each module in addition to ones
like lib, config,
and pkgs, modulesPath
|
| services.strongswan-swanctl.swanctl.secrets.token.<name>.module | Optional PKCS#11 module name to access the token.
|
| services.icingaweb2.modulePackages | Name-package attrset of Icingaweb 2 modules packages to enable
|
| security.krb5.settings.module | Modules to obtain Kerberos configuration from.
|
| services.davis.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.slskd.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.movim.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.snipe-it.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.akkoma.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.fluidd.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.gancio.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.monica.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.matomo.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.strongswan-swanctl.swanctl.authorities.<name>.module | Optional PKCS#11 module name.
|
| services.bacula-sd.director.<name>.tls.require | Require TLS or TLS-PSK encryption
|
| services.bacula-fd.director.<name>.tls.require | Require TLS or TLS-PSK encryption
|
| services.openssh.authorizedKeysFiles | Specify the rules for which files to read on the host
|
| services.kerberos_server.settings.module | Modules to obtain Kerberos configuration from.
|
| services.bacula-sd.director.<name>.tls.verifyPeer | Verify peer certificate
|
| services.bacula-fd.director.<name>.tls.verifyPeer | Verify peer certificate
|
| services.radicle.httpd.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.module | Optional PKCS#11 module name.
|
| services.kanboard.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.dolibarr.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.librenms.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.agorakit.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.fediwall.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.pixelfed.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.mainsail.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| programs.gdk-pixbuf.modulePackages | Packages providing GDK-Pixbuf modules, for cache generation.
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.module | Optional PKCS#11 module name.
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.module | Optional PKCS#11 module name.
|
| services.anuko-time-tracker.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.zabbixWeb.nginx.virtualHost.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.bacula-sd.director.<name>.tls.enable | Specifies if TLS should be enabled
|
| services.bacula-fd.director.<name>.tls.enable | Specifies if TLS should be enabled
|
| services.bookstack.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.jirafeau.nginxConfig.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.nginx.virtualHosts.<name>.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.postgresql.systemCallFilter | Configures the syscall filter for postgresql.service
|
| services.bacula-sd.director.<name>.tls.allowedCN | Common name attribute of allowed peer certificates
|
| services.bacula-fd.director.<name>.tls.allowedCN | Common name attribute of allowed peer certificates
|
| services.fedimintd.<name>.nginx.config.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.limesurvey.nginx.virtualHost.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.matrix-synapse.log | Default configuration for the loggers used by matrix-synapse and its workers
|
| services.nncp.daemon.socketActivation.listenStreams | TCP sockets to bind to
|
| services.misskey.reverseProxy.webserver.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.openssh.authorizedKeysInHomedir | Enables the use of the ~/.ssh/authorized_keys file
|
| services.syncthing.overrideFolders | Whether to delete the folders which are not configured via the
folders option
|
| services.pgbackrest.stanzas.<name>.settings | An attribute set of options as described in:
https://pgbackrest.org/configuration.html
All options can be used
|
| services.bacula-sd.director.<name>.tls.certificate | The full path to the PEM encoded TLS certificate
|
| services.bacula-fd.director.<name>.tls.certificate | The full path to the PEM encoded TLS certificate
|
| services.bacula-sd.director.<name>.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| services.bacula-fd.director.<name>.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| services.maddy.tls.loader | TLS certificates are obtained by modules called "certificate
loaders"
|
| hardware.inputmodule.enable | Whether to enable Support for Framework input modules.
|
| services.bcg.name | Name for the device
|
| networking.tempAddresses | Whether to enable IPv6 Privacy Extensions for interfaces not
configured explicitly in
networking.interfaces._name_.tempAddress
|
| services.wivrn.config.json | Configuration for WiVRn
|
| services.httpd.mpm | Multi-processing module to be used by Apache
|
| services.athens.goBinary | The Go package used by Athens at runtime
|
| services.athens.downloadMode | Defines how Athens behaves when a module@version
is not found in storage
|
| services.nfs.server.lockdPort | Use a fixed port for the NFS lock manager kernel module
(lockd/nlockmgr)
|
| services.xrdp.audio.package | The pulseaudio-module-xrdp package to use.
|
| services.tcsd.enable | Whether to enable tcsd, a Trusted Computing management service
that provides TCG Software Stack (TSS)
|
| services.httpd.enablePHP | Whether to enable the PHP module.
|
| services.vwifi.server.vsock.enable | Whether to enable vsock kernel module.
|
| services.spiped.enable | Enable the spiped service module.
|
| services.httpd.enablePerl | Whether to enable the Perl module (mod_perl).
|
| services.athens.enable | Whether to enable Go module datastore and proxy.
|
| services.keter.enable | Whether to enable keter, a web app deployment manager
|
| services.maddy.config | Server configuration, see
https://maddy.email for
more information
|
| services.netbox.enable | Enable Netbox
|
| services.atticd.mode | Mode in which to run the server.
'monolithic' runs all components, and is suitable for single-node deployments.
'api-server' runs only the API server, and is suitable for clustering.
'garbage-collector' only runs the garbage collector periodically
|
| services.newt.settings | Settings for Newt module, see Newt CLI docs for more information.
|
| services.cjdns.extraConfig | Extra configuration, given as attrs, that will be merged recursively
with the rest of the JSON generated by this module, at the root node.
|
| services.fprintd.enable | Whether to enable fprintd daemon and PAM module for fingerprint readers handling.
|
| services.httpd.enableMellon | Whether to enable the mod_auth_mellon module.
|
| services.howdy.enable | Whether to enable Howdy and its PAM module for face recognition
|
| services.rauc.settings | Rauc configuration that will be converted to INI
|
| services.znapzend.pure | Do not persist any stateful znapzend setups
|
| services.prosody.httpFileShare | Configures the http_file_share module to handle user uploads
|
| services.plex.extraPlugins | A list of paths to extra plugin bundles to install in Plex's plugin
directory
|
| services.listmonk.enable | Whether to enable Listmonk, this module assumes a reverse proxy to be set.
|
| services.httpd.extraModules | Additional Apache modules to be used
|
| services.nitter.settings | Add settings here to override NixOS module generated settings
|
| services.warpgate.enable | Whether to enable Warpgate
|
| services.inspircd.config | Verbatim inspircd.conf file
|
| services.slurm.enableSrunX11 | If enabled srun will accept the option "--x11" to allow for X11 forwarding
from within an interactive session or a batch job
|
| services.jenkins.plugins | A set of plugins to activate
|
| services.nextcloud.caching.apcu | Whether to load the APCu module into PHP.
|
| <imports = [ pkgs.php.services.default ]>.php-fpm.package | PHP package to use for php-fpm
|
| services.ddclient.configFile | Path to configuration file
|
| security.pam.services.<name>.rssh | If set, the calling user's SSH agent is used to authenticate
against the configured keys
|
| services.anubis.defaultOptions.user | The user under which Anubis is run
|
| security.pam.services.<name>.howdy.enable | Whether to enable the Howdy PAM module
|
| services.plex.extraScanners | A list of paths to extra scanners to install in Plex's scanners
directory
|
| services.thinkfan.enable | Whether to enable thinkfan, a fan control program.
This module targets IBM/Lenovo thinkpads by default, for
other hardware you will have configure it more carefully.
|
| services.syslog-ng.extraModulePaths | A list of paths that should be included in syslog-ng's
--module-path option
|
| services.step-ca.settings | Settings that go into ca.json
|
| services.factorio.configFile | The server's configuration file
|
| security.pam.services.<name>.howdy.control | This option sets the PAM "control" used for this module.
|
| services.oauth2-proxy.httpAddress | HTTPS listening address
|
| security.pam.services.<name>.mysqlAuth | If set, the pam_mysql module will be used to
authenticate users against a MySQL/MariaDB database.
|
| services.mjolnir.settings | Additional settings (see mjolnir default config for available settings)
|
| services.rtorrent.configText | The content of rtorrent.rc
|
| services.anubis.defaultOptions.group | The group under which Anubis is run
|
| services.nextcloud.caching.redis | Whether to load the Redis module into PHP
|
| services.maubot.configMutable | Whether maubot should write updated config into extraConfigFile. This will make your Nix module settings have no effect besides the initial config, as extraConfigFile takes precedence over NixOS settings!
|
| services.fail2ban.jails | The configuration of each Fail2ban “jail”
|
| services.prosody.uploadHttp.httpUploadPath | Directory where the uploaded files will be stored when the http_upload module is used
|
| services.dsnet.settings | The settings to use for dsnet
|
| services.kanata.keyboards.<name>.configFile | The config file
|
| security.pam.services.<name>.enableUMask | If enabled, the pam_umask module will be loaded.
|
| services.gitlab-runner.configFile | Configuration file for gitlab-runner.
configFile takes precedence over services.
checkInterval and concurrent will be ignored too
|
| services.librenms.finalPackage | The final package used by the module
|
| services.longview.nginxStatusUrl | The Nginx status page URL
|
| services.peering-manager.enable | Enable Peering Manager
|
| services.datadog-agent.checks | Configuration for all Datadog checks
|
| services.stalwart.settings | Configuration options for the Stalwart server
|
| services.scrutiny.influxdb.enable | Enables InfluxDB on the host system using the services.influxdb2 NixOS module
with default options
|
| services.opensnitch.settings.Rules.Path | Path to the directory where firewall rules can be found and will
get stored by the NixOS module.
|
| security.pam.services.<name>.kwallet.forceRun | The force_run option is used to tell the PAM module for KWallet
to forcefully run even if no graphical session (such as a GUI
display manager) is detected
|
| services.x2goserver.enable | Enables the x2goserver module
|
| services.librespeed.useACMEHost | Use a certificate generated by the NixOS ACME module for the given host
|
| services.ethercalc.enable | ethercalc, an online collaborative spreadsheet server
|
| services.mediatomb.customCfg | Allow the service to create and use its own config file inside the dataDir as
configured by services.mediatomb.dataDir
|
| services.stalwart-mail.settings | Configuration options for the Stalwart email server
|
| services.home-assistant.config | Your configuration.yaml as a Nix attribute set
|
| services.zwave-js.secretsConfigFile | JSON file containing secret keys
|
| services.postgrest.settings.db-config | Enables the in-database configuration.
https://docs.postgrest.org/en/stable/references/configuration.html#in-database-configuration
This is enabled by default upstream, but disabled by default in this module.
|
| services.anubis.instances.<name>.user | The user under which Anubis is run
|
| security.pam.services.<name>.duoSecurity.enable | If set, use the Duo Security pam module
pam_duo for authentication
|
| services.mediawiki.finalPackage | The final package used by the module
|
| services.nextcloud.finalPackage | Package to the finalized Nextcloud package, including all installed apps
|
| security.lockKernelModules | Disable kernel module loading once the system is fully initialised
|
| services.lighttpd.enableModules | List of lighttpd modules to enable
|
| services.rsnapshot.extraConfig | rsnapshot configuration option in addition to the defaults from
rsnapshot and this module
|
| services.anubis.instances.<name>.group | The group under which Anubis is run
|
| services.wstunnel.servers.<name>.useACMEHost | Use a certificate generated by the NixOS ACME module for the given host
|
| services.pulseaudio.extraConfig | Literal string to append to configFile
and the config file generated by the pulseaudio module.
|
| services.komodo-periphery.configFile | Path to the periphery configuration file
|
| services.airsonic.listenAddress | The host name or IP address on which to bind Airsonic
|
| services.vault.extraSettingsPaths | Configuration files to load besides the immutable one defined by the NixOS module
|
| services.matrix-synapse.package | Reference to the matrix-synapse wrapper with all extras
(e.g. for oidc or saml2) added to the PYTHONPATH of all executables
|
| services.openafsClient.packages.programs | OpenAFS programs package
|
| services.canaille.settings.CANAILLE_LDAP | Configuration for the LDAP backend
|
| services.dependency-track.database.type | h2 database is not recommended for a production setup.
postgresql this settings it recommended for production setups.
manual the module doesn't handle database settings.
|
| security.pam.u2f.settings.cue | By default pam-u2f module does not inform user
that he needs to use the u2f device, it just waits without a prompt
|
| services.nullmailer.config.helohost | Sets the environment variable $HELOHOST which is used by the
SMTP protocol module to set the parameter given to the HELO command
|
| services.rabbitmq.listenAddress | IP address on which RabbitMQ will listen for AMQP
connections
|
| security.pam.ussh.enable | Enables Uber's USSH PAM (pam-ussh) module
|
| services.nextcloud.caching.memcached | Whether to load the Memcached module into PHP
|
| services.jupyterhub.extraConfig | Extra contents appended to the jupyterhub configuration
Jupyterhub configuration is a normal python file using
Traitlets. https://jupyterhub.readthedocs.io/en/stable/getting-started/config-basics.html
|
| services.handheld-daemon.adjustor.loadAcpiCallModule | Whether to load the acpi_call kernel module
|
| meta.maintainers | List of maintainers of each module
|
| security.pam.ussh.group | If set, then the authenticating user must be a member of this group
to use this module.
|
| zramSwap.enable | Enable in-memory compressed devices and swap space provided by the zram
kernel module
|
| services.canaille.settings.CANAILLE_SQL.DATABASE_URI | The SQL server URI
|
| services.listmonk.database.mutableSettings | Database settings will be reset to the value set in this module if this is not enabled
|
| security.pam.oath.enable | Enable the OATH (one-time password) PAM module.
|
| programs.river.package | The river package to use
|
| services.netbird.tunnels.<name>.hardened | Hardened service:
- runs as a dedicated user with minimal set of permissions (see caveats),
- restricts daemon configuration socket access to dedicated user group
(you can grant access to it with
users.users."<user>".extraGroups = [ netbird-‹name› ]),
Even though the local system resources access is restricted:
CAP_NET_RAW, CAP_NET_ADMIN and CAP_BPF still give unlimited network manipulation possibilites,
- older kernels don't have
CAP_BPF and use CAP_SYS_ADMIN instead,
Known security features that are not (yet) integrated into the module:
- 2024-02-14:
rosenpass is an experimental feature configurable solely
through --enable-rosenpass flag on the netbird up command,
see the docs
|
| services.netbird.clients.<name>.hardened | Hardened service:
- runs as a dedicated user with minimal set of permissions (see caveats),
- restricts daemon configuration socket access to dedicated user group
(you can grant access to it with
users.users."<user>".extraGroups = [ netbird-‹name› ]),
Even though the local system resources access is restricted:
CAP_NET_RAW, CAP_NET_ADMIN and CAP_BPF still give unlimited network manipulation possibilites,
- older kernels don't have
CAP_BPF and use CAP_SYS_ADMIN instead,
Known security features that are not (yet) integrated into the module:
- 2024-02-14:
rosenpass is an experimental feature configurable solely
through --enable-rosenpass flag on the netbird up command,
see the docs
|
| services.open-web-calendar.calendarSettings | Configure the default calendar
|
| services.prosody.xmppComplianceSuite | The XEP-0423 defines a set of recommended XEPs to implement
for a server
|
| programs.sway.package | The sway package to use
|
| services.jitsi-meet.prosody.allowners_muc | Add module allowners, any user in chat is able to
kick other
|
| services.vaultwarden.config | The configuration of vaultwarden is done through environment variables,
therefore it is recommended to use upper snake case (e.g. DISABLE_2FA_REMEMBER)
|
| services.rsnapshot.enableManualRsnapshot | Whether to enable manual usage of the rsnapshot command with this module.
|
| services.pid-fan-controller.settings.fans.*.wildcardPath | Wildcard path of the hwmon pwm file
|
| hardware.cpu.x86.msr.enable | Whether to enable the msr (Model-Specific Registers) kernel module and configure udev rules for its devices (usually /dev/cpu/*/msr).
|
| services.nullmailer.config.sendtimeout | The time to wait for a remote module listed above to complete sending
a message before killing it and trying again, in seconds
|
| services.prometheus.exporters.dovecot.socketPath | Path under which the stats socket is placed
|
| services.transmission.settings | Settings whose options overwrite fields in
.config/transmission-daemon/settings.json
(each time the service starts)
|
| hardware.nvidia.open | Whether to enable the open source NVIDIA kernel module.
|
| services.dovecot2.pluginSettings | Plugin settings for dovecot in general, e.g. sieve, sieve_default, etc
|
| services.synapse-auto-compressor.postgresUrl | Connection string to postgresql in the
[rust postgres crate config format](https://docs.rs/postgres/latest/postgres/config/struct
|
| security.pam.dp9ik.enable | Whether to enable the dp9ik pam module provided by tlsclient
|
| security.pam.howdy.enable | Whether to enable the Howdy PAM module
|
| services.prosody.muc.*.allowners_muc | Add module allowners, any user in chat is able to
kick other
|
| security.pam.dp9ik.control | This option sets the pam "control" used for this module.
|
| security.pam.howdy.control | This option sets the PAM "control" used for this module.
|
| security.pam.enableUMask | Whether to enable the umask PAM module.
|
| security.pam.enableOTPW | Whether to enable the OTPW (one-time password) PAM module.
|
| services.nginx.experimentalZstdSettings | Enable alpha quality zstd module with recommended settings
|
| hardware.cpu.x86.msr.settings | Parameters for the msr kernel module.
|
| services.simplesamlphp | Instances of SimpleSAMLphp
|
| services.nextcloud.enableImagemagick | Whether to enable the ImageMagick module for PHP
|
| hardware.nfc-nci.enable | Whether to enable PN5xx kernel module with udev rules, libnfc-nci userland, and optional ifdnfc-nci PC/SC driver.
|
| services.draupnir.secrets.web.synapseHTTPAntispam.authorization | File containing the secret token when using the Synapse HTTP Antispam module
to be used in place of
services.draupnir.settings.web.synapseHTTPAntispam.authorization
|
| services.crowdsec-firewall-bouncer.createRulesets | Whether to have the module create the appropriate firewall configuration
based on the bouncer settings
|
| boot.initrd.availableKernelModules | The set of kernel modules in the initial ramdisk used during the
boot process
|
| security.pam.p11.enable | Enables P11 PAM (pam_p11) module
|
| services.icingaweb2.generalConfig | config.ini contents
|
| services.syncthing.settings.folders.<name>.ignorePatterns | Syncthing can be configured to ignore certain files in a folder using ignore patterns
|
| services.archisteamfarm.package | The archisteamfarm package to use. ::: {.warning}
Should always be the latest version, for security reasons,
since this module uses very new features and to not get out of sync with the Steam API.
:::
|
| security.pam.u2f.settings.appid | By default pam-u2f module sets the application
ID to pam://$HOSTNAME
|
| programs.river-classic.package | The river-classic package to use
|
| services.pantalaimon-headless.instances | Declarative instance config
|
| security.pam.u2f.settings | Options to pass to the PAM module
|
| boot.plymouth.extraConfig | Literal string to append to configFile
and the config file generated by the plymouth module.
|
| security.pam.yubico.enable | Enables Yubico PAM (yubico-pam) module
|
| boot.bcachefs.package | The bcachefs-tools package to use
|
| programs.usbtop.enable | Whether to enable usbtop and required kernel module, to show estimated USB bandwidth.
|
| boot.initrd.network.enable | Add network connectivity support to initrd
|
| security.googleOsLogin.enable | Whether to enable Google OS Login
|
| networking.nftables.enable | Whether to enable nftables and use nftables based firewall if enabled.
nftables is a Linux-based packet filtering framework intended to
replace frameworks like iptables
|
| security.pam.u2f.enable | Enables U2F PAM (pam-u2f) module
|
| programs.atop.netatop.enable | Whether to install and enable the netatop kernel module
|
| security.pam.rssh.settings | Options to pass to the pam_rssh module
|
| programs.throne.tunMode.setuid | Whether to enable setting suid bit for throne-core to run as root, which is less
secure than default setcap method but closer to upstream assumptions
|
| security.tpm2.enable | Whether to enable Trusted Platform Module 2 support.
|
| security.pam.u2f.settings.origin | By default pam-u2f module sets the origin
to pam://$HOSTNAME
|
| hardware.facter.detected.dhcp.enable | Whether to enable Facter dhcp module.
|
| hardware.new-lg4ff.enable | Enables improved Linux module drivers for Logitech driving wheels
|
| services.litellm.settings.litellm_settings | LiteLLM Module settings
|
| programs.neovim.enable | Whether to enable Neovim
|
| boot.initrd.kernelModules | Set of modules that are always loaded by the initrd
|
| security.apparmor.enable | Whether to enable the AppArmor Mandatory Access Control system
|
| programs.nekoray.tunMode.setuid | Whether to enable setting suid bit for nekobox_core to run as root, which is less
secure than default setcap method but closer to upstream assumptions
|
| hardware.mwProCapture.enable | Whether to enable the Magewell Pro Capture family kernel module.
|
| services.filesender.settings.log_facilities | Defines where FileSender logging is sent
|
| programs.corefreq.enable | Whether to enable Whether to enable the corefreq daemon and kernel module.
|
| services.postgresql.authentication | Defines how users authenticate themselves to the server
|
| programs.rust-motd.enableMotdInSSHD | Whether to let openssh print the
result when entering a new ssh-session
|
| hardware.facter.detected.graphics.amd.enable | Whether to enable Enable the AMD Graphics module.
|
| security.pam.enableEcryptfs | Whether to enable eCryptfs PAM module (mounting ecryptfs home directory on login).
|
| hardware.alsa.cardAliases.<name>.driver | Name of the kernel module that provides the card.
|
| programs.regreet.enable | Enable ReGreet, a clean and customizable greeter for greetd
|
| programs.hyprland.package | The hyprland package to use
|
| security.pam.u2f.settings.authfile | By default pam-u2f module reads the keys from
$XDG_CONFIG_HOME/Yubico/u2f_keys (or
$HOME/.config/Yubico/u2f_keys if XDG variable is
not set)
|
| hardware.facter.detected.graphics.enable | Whether to enable Enable the Graphics module.
|
| hardware.facter.detected.uefi.supported | Whether to enable the facter uefi module.
|
| services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.auth | Authentication to perform locally.
- The default
pubkey uses public key authentication
using a private key associated to a usable certificate.
psk uses pre-shared key authentication.
- The IKEv1 specific
xauth is used for XAuth or Hybrid
authentication,
- while the IKEv2 specific
eap keyword defines EAP
authentication.
- For
xauth, a specific backend name may be appended,
separated by a dash
|
| hardware.rasdaemon.labels | Additional memory module label descriptions to be placed in /etc/ras/dimm_labels.d/labels
|
| boot.kernelModules | The set of kernel modules to be loaded in the second stage of
the boot process
|
| boot.extraModprobeConfig | Any additional configuration to be appended to the generated
modprobe.conf
|
| virtualisation.libvirtd.nss.enableGuest | This option enables the newer libvirt_guest NSS module
|
| hardware.facetimehd.enable | Whether to enable the facetimehd kernel module.
|
| hardware.facter.detected.bluetooth.enable | Whether to enable Enable the Facter bluetooth module.
|
| nixpkgs.overlays | List of overlays to apply to Nixpkgs
|
| nixpkgs.pkgs | If set, the pkgs argument to all NixOS modules is the value of
this option, extended with nixpkgs.overlays, if
that is also set
|
| networking.nat.extraCommands | Additional shell commands executed as part of the nat
initialisation script
|
| programs.obs-studio.enableVirtualCamera | Installs and sets up the v4l2loopback kernel module, necessary for OBS
to start a virtual camera.
|
| networking.nat.extraStopCommands | Additional shell commands executed as part of the nat
teardown script
|
| networking.jool.enable | Whether to enable Jool, an Open Source implementation of IPv4/IPv6
translation on Linux
|
| hardware.facter.detected.networking.intel._2200BG.enable | Whether to enable the Facter Intel 2200BG module.
|
| hardware.facter.detected.networking.intel._3945ABG.enable | Whether to enable the Facter Intel 3945ABG module.
|
| programs.hyprland.portalPackage | The xdg-desktop-portal-hyprland package to use
|
| security.pam.yubico.challengeResponsePath | If not null, set the path used by yubico pam module where the challenge expected response is stored
|
| programs.pay-respects.runtimeRules | List of rules to be added to /etc/xdg/pay-respects/rules.
pay-respects will read the contents of these generated rules to recommend command corrections
|
| networking.wireguard.enable | Whether to enable WireGuard.
By default, this module is powered by a script-based backend
|
| security.dhparams.params | Diffie-Hellman parameters to generate
|
| boot.kernelPackages | This option allows you to override the Linux kernel used by
NixOS
|
| nixops.enableDeprecatedAutoLuks | Whether to enable the deprecated NixOps AutoLuks module.
|
| boot.modprobeConfig.useUbuntuModuleBlacklist | Whether to enable Ubuntu distro's module blacklist.
|
| security.pam.sshAgentAuth.authorizedKeysFiles | A list of paths to files in OpenSSH's authorized_keys format, containing
the keys that will be trusted by the pam_ssh_agent_auth module
|
| networking.enableB43Firmware | Turn on this option if you want firmware for the NICs supported by the b43 module.
|
| hardware.facter.detected.virtualisation.qemu.enable | Whether to enable Enable the Facter Virtualisation Qemu module.
|
| hardware.facter.detected.virtualisation.none.enable | Whether to enable Enable the Facter Virtualisation None module.
|
| networking.resolvconf.package | The package that provides the system-wide resolvconf command
|
| programs.digitalbitbox.enable | Installs the Digital Bitbox application and enables the complementary hardware module.
|
| virtualisation.libvirtd.nss.enable | This option enables the older libvirt NSS module
|
| virtualisation.libvirtd.nss | libvirt NSS module options.
|
| hardware.facter.detected.virtualisation.oracle.enable | Whether to enable Enable the Facter Virtualisation Oracle module.
|
| hardware.facter.detected.virtualisation.hyperv.enable | Whether to enable Enable the Facter Virtualisation Hyper-V module.
|
| documentation.nixos.extraModuleSources | Which extra NixOS module paths the generated NixOS's documentation should strip
from options.
|
| hardware.facter.detected.virtualisation.parallels.enable | Whether to enable Enable the Facter Virtualisation Parallels module.
|
| environment.variables | A set of environment variables used in the global environment
|
| hardware.facter.detected.virtualisation.virtio_scsi.enable | Whether to enable Enable the Facter Virtualisation Virtio SCSI module.
|
| virtualisation.containers.enable | This option enables the common /etc/containers configuration module.
|
| programs.pay-respects.aiIntegration | Whether to enable pay-respects' LLM integration
|
| programs.zsh.autosuggestions.strategy | ZSH_AUTOSUGGEST_STRATEGY is an array that specifies how suggestions should be generated
|
| environment.sessionVariables | A set of environment variables used in the global environment
|
| containers.<name>.config | A specification of the desired configuration of this
container, as a NixOS module.
|