| services.transmission.settings.incomplete-dir-enabled | |
| services.transmission.settings.incomplete-dir | When enabled with
services.transmission.home
services.transmission.settings.incomplete-dir-enabled,
new torrents will download the files to this directory
|
| services.transmission.home | The directory where Transmission will create .config/transmission-daemon.
as well as Downloads/ unless
services.transmission.settings.download-dir is changed,
and .incomplete/ unless
services.transmission.settings.incomplete-dir is changed.
|
| services.transmission.settings.watch-dir-enabled | Whether to enable the
services.transmission.settings.watch-dir.
|
| services.transmission.downloadDirPermissions | If not null, is used as the permissions
set by system.activationScripts.transmission-daemon
on the directories services.transmission.settings.download-dir,
services.transmission.settings.incomplete-dir.
and services.transmission.settings.watch-dir
|
| services.bacula-dir.tls.enable | Specifies if TLS should be enabled
|
| services.bacula-dir.tls.require | Require TLS or TLS-PSK encryption
|
| boot.zfs.enabled | True if ZFS filesystem support is enabled
|
| services.bacula-sd.director.<name>.tls.require | Require TLS or TLS-PSK encryption
|
| services.bacula-fd.director.<name>.tls.require | Require TLS or TLS-PSK encryption
|
| services.bacula-sd.director.<name>.tls.enable | Specifies if TLS should be enabled
|
| services.bacula-fd.director.<name>.tls.enable | Specifies if TLS should be enabled
|
| services.transmission.settings.utp-enabled | Whether to enable Micro Transport Protocol (µTP).
|
| hardware.nvidia.enabled | True if NVIDIA support is enabled
|
| virtualisation.directBoot.enable | If enabled, the virtual machine will boot directly into the kernel instead of through a bootloader
|
| services.pihole-ftl.lists.*.enabled | Whether this list is enabled
|
| services.nghttpx.backends.*.params.redirect-if-not-tls | If true, a backend match requires the frontend connection be
TLS encrypted
|
| i18n.inputMethod.enabled | Deprecated - use type and enable = true instead
|
| services.wg-access-server.settings.dns.enabled | Enable/disable the embedded DNS proxy server
|
| services.grafana.settings.smtp.enabled | Whether to enable SMTP.
|
| services.frigate.settings.mqtt.enabled | Whether to enable MQTT support.
|
| services.aria2.settings.dir | Directory to store downloaded files.
|
| services.transmission.settings.watch-dir | Watch a directory for torrent files and add them to transmission.
|
| services.lemmy.settings.captcha.enabled | Enable Captcha.
|
| services.transmission.settings.script-torrent-done-enabled | Whether to run
services.transmission.settings.script-torrent-done-filename
at torrent completion.
|
| services.veilid.settings.logging.api.enabled | Events of type 'api' will be logged.
|
| services.opengfw.dir | Working directory of the OpenGFW service and home of opengfw.user.
|
| services.slskd.settings.directories.incomplete | Directory where incomplete downloading files are stored.
|
| services.transmission.settings.download-dir | Directory where to download torrents.
|
| services.xserver.xkb.dir | Path used for -xkbdir xserver parameter.
|
| services.matrix-synapse.settings.redis.enabled | Whether to use redis support
|
| services.nextcloud.settings."profile.enabled" | Makes user-profiles globally available under nextcloud.tld/u/user.name
|
| services.veilid.settings.logging.system.enabled | Events of type 'system' will be logged.
|
| services.immich.settings.newVersionCheck.enabled | Check for new versions
|
| services.xtreemfs.dir.enable | Whether to enable XtreemFS DIR service.
|
| services.snapserver.settings.tcp.enabled | Whether to enable the TCP JSON-RPC.
|
| services.watchdogd.settings.filenr.enabled | Whether to enable watchdogd plugin filenr.
|
| services.snapserver.settings.http.enabled | Whether to enable the HTTP JSON-RPC.
|
| services.suricata.settings.unix-command.enabled | Enable unix-command socket.
|
| services.headscale.settings.oidc.pkce.enabled | Enable or disable PKCE (Proof Key for Code Exchange) support
|
| services.hitch.ocsp-stapling.enabled | Whether to enable OCSP Stapling
|
| services.suricata.settings.outputs.*.<name>.enabled | Whether to enable .
|
| services.watchdogd.settings.loadavg.enabled | Whether to enable watchdogd plugin loadavg.
|
| services.watchdogd.settings.meminfo.enabled | Whether to enable watchdogd plugin meminfo.
|
| services.veilid.settings.logging.terminal.enabled | Events of type 'terminal' will be logged.
|
| services.xtreemfs.dir.port | The port to listen on for incoming connections (TCP).
|
| services.listmonk.database.settings.smtp.*.enabled | Whether to enable this SMTP server for listmonk.
|
| services.sourcehut.settings."meta.sr.ht::billing".enabled | Whether to enable the billing system.
|
| services.suricata.settings.app-layer.protocols.<name>.enabled | The option "enabled" takes 3 values - "yes", "no", "detection-only".
"yes" enables both detection and the parser, "no" disables both, and
"detection-only" enables protocol detection only (parser disabled).
|
| services.dendrite.settings.sync_api.search.enabled | Whether to enable Dendrite's full-text search engine.
|
| services.matrix-synapse.settings.presence.enabled | Whether to enable presence tracking
|
| services.snapserver.settings.tcp-control.enabled | Whether to enable the TCP JSON-RPC.
|
| services.bacula-dir.tls | TLS Options for the Director
|
| services.suricata.enabledSources | List of sources that should be enabled
|
| services.xtreemfs.dir.extraConfig | Configuration of XtreemFS DIR service
|
| services.xtreemfs.dir.httpPort | Specifies the listen port for the HTTP service that returns the
status page.
|
| services.dependency-track.settings."alpine.ldap.enabled" | Defines if LDAP will be used for user authentication
|
| services.bacula-dir.name | The director name used by the system administrator
|
| services.dependency-track.settings."alpine.oidc.enabled" | Defines if OpenID Connect will be used for user authentication
|
| services.prosody.virtualHosts.<name>.enabled | Whether to enable the virtual host
|
| services.bacula-dir.tls.key | The path of a PEM encoded TLS private key
|
| services.xtreemfs.dir.uuid | Must be set to a unique identifier, preferably a UUID according to
RFC 4122
|
| services.snapserver.settings.tcp-streaming.enabled | Whether to enable streaming via TCP.
|
| services.public-inbox.settings.coderepo.<name>.dir | Path to a git repository
|
| services.nextcloud.settings.enabledPreviewProviders | The preview providers that should be explicitly enabled.
|
| services.xtreemfs.dir.address | If specified, it defines the interface to listen on
|
| services.bacula-dir.enable | Whether to enable Bacula Director Daemon.
|
| services.traefik.dynamic.dir | Path to the directory Traefik should watch for configuration files.
Files in this directory matching the glob _nixos-* (reserved for Nix-managed dynamic configurations) will be deleted as part of
systemd-tmpfiles-resetup.service, regardless of their origin..
|
| services.netbird.tunnels.<name>.dir.baseName | A systemd service name to use (without .service suffix).
|
| services.netbird.clients.<name>.dir.baseName | A systemd service name to use (without .service suffix).
|
| services.autosuspend.checks.<name>.enabled | Whether to enable this activity check.
|
| services.netbird.clients.<name>.dir.state | A state directory used by NetBird client to store config.json, state.json & resolv.conf.
|
| services.netbird.tunnels.<name>.dir.state | A state directory used by NetBird client to store config.json, state.json & resolv.conf.
|
| services.postsrsd.settings.chroot-dir | Path to chroot into at runtime as an additional layer of protection.
We confine the runtime environment through systemd hardening instead, so this option is read-only.
|
| services.peertube-runner.enabledJobTypes | Job types that this runner will execute.
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mark_in | Netfilter mark and mask for input traffic
|
| services.bacula-dir.extraConfig | Extra configuration for Bacula Director Daemon.
|
| services.authelia.instances.<name>.settings.telemetry.metrics.enabled | Enable Metrics.
|
| services.autosuspend.wakeups.<name>.enabled | Whether to enable this wake-up check.
|
| services.bluemap.webserverSettings.enabled | Enable bluemap's built-in webserver
|
| services.bacula-dir.port | Specify the port (a positive integer) on which the Director daemon
will listen for Bacula Console connections
|
| services.firefox-syncserver.settings.tokenserver.enabled | Whether to enable the token service as well.
|
| services.netbird.tunnels.<name>.dir.runtime | A runtime directory used by NetBird client.
|
| services.netbird.clients.<name>.dir.runtime | A runtime directory used by NetBird client.
|
| services.typesense.settings.server.data-dir | Path to the directory where data will be stored on disk.
|
| services.chrony.initstepslew.enabled | DEPRECATED
|
| services.bacula-dir.password | Specifies the password that must be supplied for a Director.
|
| services.xtreemfs.dir.replication.enable | Whether to enable XtreemFS DIR replication plugin.
|
| services.suricata.settings.default-log-dir | The default logging directory
|
| services.strongswan.enabledPlugins | A list of additional plugins to enable if
managePlugins is true.
|
| services.filebrowser.settings.cache-dir | The directory where FileBrowser stores its cache.
|
| services.below.dirs.log | Where to store below's logs
|
| services.akkoma.config.":pleroma".":media_proxy".enabled | Whether to enable proxying of remote media through the instance's proxy.
|
| services.archisteamfarm.bots.<name>.enabled | Whether to enable the bot on startup.
|
| services.rustus.info_storage.dir | directory to store info about uploads
|
| services.cloudflared.tunnels.<name>.warp-routing.enabled | Enable warp routing
|
| services.xtreemfs.dir.replication.extraConfig | Configuration of XtreemFS DIR replication plugin
|
| services.bacula-dir.tls.allowedCN | Common name attribute of allowed peer certificates
|
| services.legit.settings.dirs.static | Directories where static files are located.
|
| services.transmission.settings.peer-port-random-low | The minimal peer port to listen to for incoming connections
when services.transmission.settings.peer-port-random-on-start is enabled.
|
| services.prometheus.exporters.frr.enabledCollectors | Collectors to enable
|
| services.apache-kafka.settings."log.dirs" | Log file directories.
|
| services.below.dirs.store | Where to store below's data
|
| services.prometheus.exporters.node.enabledCollectors | Collectors to enable
|
| services.transmission.settings.peer-port-random-high | The maximum peer port to listen to for incoming connections
when services.transmission.settings.peer-port-random-on-start is enabled.
|
| services.prometheus.exporters.opnsense.enabledExporter | Collectors to enable or disable
|
| services.bacula-dir.extraMessagesConfig | Extra configuration to be passed in Messages directive.
|
| services.bacula-dir.extraDirectorConfig | Extra configuration to be passed in Director directive.
|
| services.prometheus.exporters.chrony.enabledCollectors | Collectors to enable
|
| services.bacula-dir.tls.verifyPeer | Verify peer certificate
|
| programs.rush.wrap | Whether to wrap the rush binary with a SUID-enabled wrapper
|
| services.bacula-dir.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| services.routinator.settings.repository-dir | The path where the collected RPKI data is stored.
|
| programs.direnv.nix-direnv.enable | Whether to enable a faster, persistent implementation of use_nix and use_flake, to replace the builtin one
.
|
| services.xtreemfs.dir.syncMode | The sync mode influences how operations are committed to the disk
log before the operation is acknowledged to the caller.
-ASYNC mode the writes to the disk log are buffered in memory by the operating system
|
| programs.direnv.nix-direnv.package | The nix-direnv package to use
|
| services.pretix.settings.pretix.logdir | Directory for storing log files.
|
| programs.direnv.direnvrcExtra | Extra lines to append to the sourced direnvrc
|
| services.peertube.settings.video_transcription.enabled | Enable automatic transcription of videos.
|
| services.minidlna.settings.db_dir | Specify the directory to store database and album art cache.
|
| services.pretix.settings.pretix.datadir | Directory for storing user uploads and similar data.
|
| services.legit.settings.dirs.templates | Directories where template files are located.
|
| programs.direnv.settings | Direnv configuration
|
| services.garage.settings.data_dir | The directory in which Garage will store the data blocks of objects
|
| services.pretix.settings.pretix.cachedir | Directory for storing temporary files.
|
| services.artalk.workdir | Artalk working directory
|
| services.transmission.settings.trash-original-torrent-files | Whether to delete torrents added from the
services.transmission.settings.watch-dir.
|
| services.resilio.enable | If enabled, start the Resilio Sync daemon
|
| services.bacula-dir.tls.certificate | The full path to the PEM encoded TLS certificate
|
| programs.tuxclocker.enabledNVIDIADevices | Enable NVIDIA GPU controls for a device by index
|
| services.matrix-synapse.settings.url_preview_enabled | Is the preview URL API enabled? If enabled, you must specify an
explicit url_preview_ip_range_blacklist of IPs that the spider is
denied from accessing.
|
| services.part-db.enableNginx | Whether to enable nginx or not
|
| services.hickory-dns.settings.directory | The directory in which hickory-dns should look for .zone files,
whenever zones aren't specified by absolute path.
|
| services.bind.directory | Working directory of BIND.
|
| services.veilid.settings.client_api.ipc_enabled | veilid-server will respond to Python and other JSON client requests.
|
| nix.checkConfig | If enabled, checks that Nix can parse the generated nix.conf.
|
| services.znc.mutable | Indicates whether to allow the contents of the
dataDir directory to be changed by the user at
run-time
|
| services.bacula-sd.director | This option defines Director resources in Bacula Storage Daemon.
|
| services.bacula-fd.director | This option defines director resources in Bacula File Daemon.
|
| services.minidlna.settings.media_dir | Directories to be scanned for media files
|
| services.radicle.ci.broker.settings.report_dir | Directory where HTML and JSON report pages are written.
|
| services.lighttpd.cgit.subdir | The subdirectory in which to serve cgit
|
| services.kubo.dataDir | The data dir for Kubo
|
| services.prometheus.exporters.rasdaemon.enabledCollectors | List of error types to collect from the event database.
|
| users.ldap.useTLS | If enabled, use TLS (encryption) over an LDAP (port 389)
connection
|
| services.slskd.settings.shares.directories | Paths to shared directories
|
| services.tuned.settings.profile_dirs | Directories to search for profiles, separated by , or ;.
|
| services.dwm-status.settings.order | List of enabled features in order.
|
| programs.direnv.silent | Whether to enable the hiding of direnv logging
.
|
| services.chrony.directory | Directory where chrony state is stored.
|
| services.rss-bridge.config.system.enabled_bridges | Only enabled bridges are available for feed production
|
| services.szurubooru.server.settings.data_dir | Path to the static files.
|
| services.grafana.settings.analytics.reporting_enabled | When enabled Grafana will send anonymous usage statistics to stats.grafana.org
|
| services.vdirsyncer.jobs | vdirsyncer job configurations
|
| boot.swraid.enable | Whether to enable support for Linux MD RAID arrays
|
| programs.direnv.angrr.autoUse | Whether to automatically use angrr before loading .envrc.
|
| services.movim.h2o.tls.redirectCode | HTTP status used by globalRedirect & forceSSL
|
| services.bacula-sd.director.<name>.tls | TLS Options for the Director in this Configuration.
|
| services.bacula-fd.director.<name>.tls | TLS Options for the Director in this Configuration.
|
| services.oauth2-proxy.redirectURL | The OAuth2 redirect URL.
|
| services.firefly-iii.enableNginx | Whether to enable nginx or not
|
| services.garage.settings.metadata_dir | The metadata directory, put this on a fast disk (e.g
|
| nix.checkAllErrors | If enabled, checks the nix.conf parsing for any kind of error
|
| services.bacula-sd.director.<name>.tls.key | The path of a PEM encoded TLS private key
|
| services.bacula-fd.director.<name>.tls.key | The path of a PEM encoded TLS private key
|
| services.yandex-disk.directory | The directory to use for Yandex
|
| system.nssDatabases.group | List of group entries to configure in /etc/nsswitch.conf
|
| programs.direnv.package | The direnv package to use.
|
| services.hadoop.hbase.rootdir | This option will set "hbase.rootdir" in hbase-site.xml and determine
the directory shared by region servers and into which HBase persists
|
| services.rustus.storage.data_dir | path to the local directory where all files are stored
|
| programs.direnv.angrr.enable | Whether to enable angrr direnv integration.
|
| services.inspircd.package | The InspIRCd package to use
|
| services.davis.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.slskd.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.movim.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.davis.nginx.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| services.movim.nginx.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| services.slskd.nginx.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| services.ntp.enable | Whether to synchronise your machine's time using ntpd, as a peer in
the NTP network
|
| services.slskd.settings.directories.downloads | Directory where downloaded files are stored.
|
| services.freeciv.settings.Guests | Whether to enable guests to login if auth is enabled.
|
| services.vdirsyncer.enable | Whether to enable vdirsyncer.
|
| services.snipe-it.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.snipe-it.nginx.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| programs.direnv.loadInNixShell | Whether to enable loading direnv in nix-shell nix shell or nix develop
.
|
| system.nssDatabases.passwd | List of passwd entries to configure in /etc/nsswitch.conf
|
| services.bosun.ledisDir | Path to bosun's ledis data dir
|
| services.h2o.hosts.<name>.tls.redirectCode | HTTP status used by globalRedirect & forceSSL
|
| services.dwm-status.order | List of enabled features in order.
|
| services.veilid.settings.core.table_store.directory | The filesystem directory to store your table store within.
|
| services.veilid.settings.core.block_store.directory | The filesystem directory to store blocks for the block store.
|
| services.thanos.sidecar.reloader.rule-dirs | Rule directories for the reloader to refresh.
|
| security.krb5.settings.includedir | Directories containing files to include in the Kerberos configuration.
|
| services.searx.settingsFile | The path of the Searx server settings.yml file
|
| services.resilio.directoryRoot | Default directory to add folders in the web UI.
|
| services.akkoma.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.fluidd.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.gancio.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.monica.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.matomo.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.gancio.nginx.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| services.fluidd.nginx.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| services.akkoma.nginx.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| services.monica.nginx.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| services.matomo.nginx.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| services.actual.settings.dataDir | Directory under which Actual runs and saves its data
|
| services.charybdis.statedir | Location of the state directory of charybdis.
|
| power.ups.ups.<name>.directives | List of configuration directives for this UPS.
|
| services.bacula-sd.tls.require | Require TLS or TLS-PSK encryption
|
| services.bacula-fd.tls.require | Require TLS or TLS-PSK encryption
|
| services.vdirsyncer.jobs.<name>.user | User account to run vdirsyncer as, otherwise as a systemd
dynamic user
|
| services.vdirsyncer.package | The vdirsyncer package to use.
|
| services.waagent.settings.OS.EnableRDMA | If enabled, the agent attempts to install and then load an RDMA kernel driver
that matches the version of the firmware on the underlying hardware.
|
| programs.direnv.enable | Whether to enable direnv integration
|
| services.vdirsyncer.jobs.<name>.group | group to run vdirsyncer as
|
| services.dependency-track.settings."alpine.data.directory" | Defines the path to the data directory
|
| services.nextcloud.datadir | Nextcloud's data storage path
|
| programs.direnv.finalPackage | The wrapped direnv package.
|
| services.dolibarr.h2o.tls.redirectCode | HTTP status used by globalRedirect & forceSSL
|
| services.kubo.defaultMode | systemd service that is enabled by default
|
| programs.regreet.enable | Enable ReGreet, a clean and customizable greeter for greetd
|
| image.repart.split | Enables generation of split artifacts from partitions
|
| services.movim.h2o | With this option, you can customize an H2O virtual host which already
has sensible defaults for Movim
|
| services.tt-rss.pubSubHubbub.hub | URL to a PubSubHubbub-compatible hub server
|
| services.tomcat.baseDir | Location where Tomcat stores configuration files, web applications
and logfiles
|
| users.mysql.pam.verbose | If enabled, produces logs with detailed messages that describes what
pam_mysql is doing
|
| programs.gnupg.dirmngr.enable | Enables GnuPG network certificate management daemon with socket-activation for every user session.
|
| services.spark.worker.workDir | Spark worker work dir.
|
| services.sourcehut.settings."meta.sr.ht::settings".onboarding-redirect | Where to redirect new users upon registration.
|
| services.vdirsyncer.jobs.<name>.enable | Whether to enable this vdirsyncer job.
|
| services.privatebin.enableNginx | Whether to enable nginx or not
|
| services.grav.maxUploadSize | The upload limit for files
|
| services.nghttpx.backends.*.params.affinity | If "ip" is given, client IP based session affinity is
enabled
|
| services.openafsClient.cache.directory | Cache directory.
|
| services.suricata.settings.stats | Engine statistics such as packet counters, memory use counters and others can be logged in several ways
|
| services.bacula-sd.director.<name>.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| services.bacula-fd.director.<name>.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| services.radicle.httpd.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.ollama.package | The ollama package to use
|
| services.radicle.httpd.nginx.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| services.freeciv.settings.Newusers | Whether to enable new users to login if auth is enabled.
|
| systemd.watchdog.kexecTime | The amount of time which can elapse when kexec is being executed before
a watchdog hardware device will automatically reboot the system
|
| services.vsftpd.anonymousMkdirEnable | Whether any uploads are permitted to anonymous users.
|
| services.sympa.web.https | Whether to use HTTPS
|
| services.vdirsyncer.jobs.<name>.config.pairs | vdirsyncer pair configurations
|
| security.pam.services.<name>.gnupg.enable | If enabled, pam_gnupg will attempt to automatically unlock the
user's GPG keys with the login password via
gpg-agent
|
| services.grafana-to-ntfy.settings.ntfyBAuthPass | The path to the password for the specified ntfy-sh user
|
| services.nats.dataDir | The NATS data directory
|
| services.webdav-server-rs.user | User to run under when setuid is not enabled.
|
| services.locate.enable | If enabled, NixOS will periodically update the database of
files used by the locate command.
|
| services.kbfs.enableRedirector | Whether to enable the Keybase root redirector service, allowing
any user to access KBFS files via /keybase,
which will show different contents depending on the requester.
|
| services.grafana-to-ntfy.settings.ntfyBAuthUser | The ntfy-sh user to use for authenticating with the ntfy-sh instance
|
| services.broadcast-box.settings | Attribute set of environment variables.
https://github.com/Glimesh/broadcast-box#environment-variables
The status API exposes stream keys so DISABLE_STATUS is enabled
by default.
|
| services.vdirsyncer.jobs.<name>.configFile | existing configuration file
|
| services.dolibarr.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.fediwall.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.kanboard.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.agorakit.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.librenms.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.mainsail.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.pixelfed.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| nix.settings.require-sigs | If enabled (the default), Nix will only download binaries from binary caches if
they are cryptographically signed with any of the keys listed in
nix.settings.trusted-public-keys
|
| services.nagios.virtualHost.globalRedirect | If set, all requests for this host are redirected permanently to
the given URL.
|
| services.moodle.virtualHost.globalRedirect | If set, all requests for this host are redirected permanently to
the given URL.
|
| services.fediwall.nginx.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| services.librenms.nginx.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| services.dolibarr.nginx.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| services.agorakit.nginx.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| services.kanboard.nginx.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| services.pixelfed.nginx.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| services.mainsail.nginx.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| services.neo4j.directories.home | Path of the Neo4j home directory
|
| services.watchdogd.settings.safe-exit | With safeExit enabled, the daemon will ask the driver to disable the WDT before exiting
|
| services.public-inbox.inboxes.<name>.inboxdir | The absolute path to the directory which hosts the public-inbox.
|
| services.mpd.settings.music_directory | The directory or URI where MPD reads music from
|
| services.postgrest.settings.db-config | Enables the in-database configuration.
https://docs.postgrest.org/en/stable/references/configuration.html#in-database-configuration
This is enabled by default upstream, but disabled by default in this module.
|
| services.neo4j.directories.data | Path of the data directory
|
| services.vdirsyncer.jobs.<name>.timerConfig | systemd timer configuration
|
| services.ipfs-cluster.dataDir | The data dir for ipfs-cluster.
|
| services.chhoto-url.settings.redirect_method | The redirect method to use.
|
| services.movim.nginx | With this option, you can customize an Nginx virtual host which
already has sensible defaults for Movim
|
| services.webdav-server-rs.group | Group to run under when setuid is not enabled.
|
| services.reposilite.settings.sslPort | SSL port to bind to
|
| services.anuko-time-tracker.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| i18n.inputMethod.enable | Whether to enable an additional input method type.
|
| services.bacula-fd.tls.enable | Specifies if TLS should be enabled
|
| services.bacula-sd.tls.enable | Specifies if TLS should be enabled
|
| services.zabbixWeb.httpd.virtualHost.globalRedirect | If set, all requests for this host are redirected permanently to
the given URL.
|
| services.anuko-time-tracker.nginx.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| services.veilid.settings.client_api.ipc_directory | IPC directory where file sockets are stored.
|
| services.vdirsyncer.jobs.<name>.config.statusPath | vdirsyncer's status path
|
| boot.crashDump.enable | If enabled, NixOS will set up a kernel that will
boot on crash, and leave the user in systemd rescue
to be able to save the crashed kernel dump at
/proc/vmcore
|
| services.journald.audit | If enabled systemd-journald will turn on auditing on start-up
|
| services.zabbixWeb.nginx.virtualHost.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.vdirsyncer.jobs.<name>.config.general | general configuration
|
| services.bookstack.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.zabbixWeb.nginx.virtualHost.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| services.firefly-iii-data-importer.enableNginx | Whether to enable nginx or not
|
| services.sabnzbd.settings.misc.https_key | Path to the TLS key for the web UI
|
| services.bookstack.nginx.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| services.xtreemfs.homeDir | XtreemFS home dir for the xtreemfs user.
|
| services.sourcehut.settings."pages.sr.ht".user-domain | Configures the user domain, if enabled
|
| services.syncplay.enable | If enabled, start the Syncplay server.
|
| services.canaille.settings.CANAILLE.SMTP | SMTP configuration
|
| security.acme.certs.<name>.directory | Directory where certificate and other state is stored.
|
| services.bacula-sd.director.<name>.tls.allowedCN | Common name attribute of allowed peer certificates
|
| services.bacula-fd.director.<name>.tls.allowedCN | Common name attribute of allowed peer certificates
|
| services.httpd.virtualHosts.<name>.globalRedirect | If set, all requests for this host are redirected permanently to
the given URL.
|
| services.syncthing.settings.folders | Folders which should be shared by Syncthing
|
| services.thanos.query.enable | Whether to enable the Thanos query node exposing PromQL enabled Query API with data retrieved from multiple store nodes.
|
| services.bacula-sd.director.<name>.monitor | If Monitor is set to no, this director will have
full access to this Storage daemon
|
| services.bacula-fd.director.<name>.monitor | If Monitor is set to no, this director will have
full access to this Storage daemon
|
| services.clamav.fangfrisch.settings | fangfrisch configuration
|
| services.syncthing.settings.devices | Peers/devices which Syncthing should communicate with
|
| services.jirafeau.nginxConfig.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.kanata.package | The kanata package to use. ::: {.note}
If danger-enable-cmd is enabled in any of the keyboards, the
kanata-with-cmd package should be used.
:::
|
| nix.settings.trusted-public-keys | List of public keys used to sign binary caches
|
| services.hickory-dns.quiet | Log ERROR level messages only
|
| services.headscale.settings.derp.auto_update_enabled | Whether to automatically update DERP maps on a set frequency.
|
| services.nginx.virtualHosts.<name>.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.jirafeau.nginxConfig.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| services.spacecookie.settings.log.hide-ips | If enabled, spacecookie will hide personal
information of users like IP addresses from
log output.
|
| services.redsocks.redsocks.*.doNotRedirect | Iptables filters that if matched will get the packet off of
redsocks.
|
| fileSystems.<name>.overlay.workdir | The path to the workdir
|
| i18n.inputMethod.fcitx5.addons | Enabled Fcitx5 addons.
|
| services.nextcloud.appstoreEnable | Allow the installation and updating of apps from the Nextcloud appstore
|
| services.spacecookie.settings.log.hide-time | If enabled, spacecookie will not print timestamps
at the beginning of every log line.
|
| services.drupal.sites.<name>.virtualHost.globalRedirect | If set, all requests for this host are redirected permanently to
the given URL.
|
| services.longview.enable | If enabled, system metrics will be sent to Linode LongView.
|
| services.nginx.virtualHosts.<name>.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| services.cgit.<name>.gitHttpBackend.checkExportOkFiles | Whether git-http-backend should only export repositories that contain a git-daemon-export-ok file
|
| services.eris-server.decode | Whether the HTTP service (when enabled) will decode ERIS content at /uri-res/N2R?urn:eris:
|
| services.znapzend.pure | Do not persist any stateful znapzend setups
|
| services.vdirsyncer.jobs.<name>.config.storages | vdirsyncer storage configurations
|
| services.lighttpd.mod_userdir | If true, requests in the form /~user/page.html are rewritten to take
the file public_html/page.html from the home directory of the user.
|
| services.hickory-dns.debug | Log DEBUG, INFO, WARN and ERROR messages
|
| services.paperless.exporter.directory | Directory to store export.
|
| services.tayga.wkpfStrict | Enable restrictions on the use of the well-known prefix (64:ff9b::/96) - prevents translation of non-global IPv4 ranges when using the well-known prefix
|
| users.ldap.extraConfig | Extra configuration options that will be added verbatim at
the end of the ldap configuration file (ldap.conf(5))
|
| services.davis.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.slskd.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.movim.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.veilid.settings.core.protected_store.directory | The filesystem directory to store your protected store in.
|
| services.sabnzbd.settings.misc.html_login | Prompt for login with an html login mask if enabled,
otherwise prompt for basic auth (useful for SSO)
|
| services.grafana.settings.users.verify_email_enabled | Require email validation before sign up completes.
|
| services.plausible.mail.smtp.user | The username/email in case SMTP auth is enabled.
|
| services.sabnzbd.settings.misc.https_cert | Path to the TLS certificate for the web UI
|
| i18n.inputMethod.type | Select the enabled input method
|
| services.devpi-server.replica | Run node as a replica
|
| services.snipe-it.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.neo4j.directories.imports | The root directory for file URLs used with the Cypher
LOAD CSV clause
|
| services.dbus.apparmor | AppArmor mode for dbus.
enabled enables mediation when it's
supported in the kernel, disabled
always disables AppArmor even with kernel support, and
required fails when AppArmor was not found
in the kernel.
|
| security.duosec.ssh.enable | If enabled, protect SSH logins with Duo Security.
|
| hardware.facter.debug.nvd | A shell application which will produce an nvd diff of the system closure with and without facter enabled.
|
| services.emacs.defaultEditor | When enabled, configures emacsclient to be the default editor
using the EDITOR environment variable.
|
| services.neo4j.directories.plugins | Path of the database plugin directory
|
| services.goxlr-utility.autoStart.xdg | Start the daemon automatically using XDG autostart
|
| services.k3s.images | List of derivations that provide container images
|
| services.vdirsyncer.jobs.<name>.forceDiscover | Run yes | vdirsyncer discover prior to vdirsyncer sync
|
| services.fail2ban.enable | Whether to enable the fail2ban service
|
| services.biboumi.settings.policy_directory | A directory that should contain the policy files,
used to customize Botan’s behaviour
when negotiating the TLS connections with the IRC servers.
|
| services.httpd.logPerVirtualHost | If enabled, each virtual host gets its own
access.log and
error.log, namely suffixed by the
hostName of the virtual host.
|
| services.consul.leaveOnStop | If enabled, causes a leave action to be sent when closing consul
|
| services.waagent.settings.ResourceDisk.EnableSwap | If enabled, the agent creates a swap file (/swapfile) on the resource disk
and adds it to the system swap space
|
| services.suricata.settings.unix-command | Unix command socket that can be used to pass commands to Suricata
|
| swapDevices.*.encrypted.keyFile | Path to a keyfile used to unlock the backing encrypted
device
|
| security.duosec.pam.enable | If enabled, protect logins with Duo Security using PAM support.
|
| services.libreswan.disableRedirects | Whether to disable send and accept redirects for all network interfaces
|
| services.kerberos_server.settings.includedir | Directories containing files to include in the Kerberos configuration.
|
| services.undervolt.turbo | Changes the Intel Turbo feature status (1 is disabled and 0 is enabled).
|
| services.bacula-sd.director.<name>.tls.verifyPeer | Verify peer certificate
|
| services.bacula-fd.director.<name>.tls.verifyPeer | Verify peer certificate
|
| services.stash.settings.notifications_enabled | If we should send notifications to the desktop
|
| services.tarsnap.archives.<name>.cachedir | The cache allows tarsnap to identify previously stored data
blocks, reducing archival time and bandwidth usage
|
| services.mediawiki.httpd.virtualHost.globalRedirect | If set, all requests for this host are redirected permanently to
the given URL.
|
| services.dolibarr.h2o | With this option, you can customize an H2O virtual host which already
has sensible defaults for Dolibarr
|
| services.riemann-dash.dataDir | Location of the riemann-base dir
|
| services.akkoma.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.fluidd.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.gancio.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.monica.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.matomo.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.zitadel.tlsMode | The TLS mode to use
|
| services.mailman.webHosts | The list of hostnames and/or IP addresses from which the Mailman Web
UI will accept requests
|
| services.stunnel.clients | Define the client configurations
|
| services.fedimintd.<name>.nginx.config.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.openssh.authorizedKeysInHomedir | Enables the use of the ~/.ssh/authorized_keys file
|
| services.actkbd.bindings | Key bindings for actkbd
|
| fileSystems.<name>.encrypted.keyFile | Path to a keyfile used to unlock the backing encrypted
device
|
| services.fedimintd.<name>.nginx.config.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| nix.settings.sandbox | If set, Nix will perform builds in a sandboxed environment that it
will set up automatically for each build
|
| hardware.facter.debug.nix-diff | A shell application which will produce a nix-diff of the system closure with and without facter enabled.
|
| services.matomo.nginx | With this option, you can customize an nginx virtualHost which already has sensible defaults for Matomo
|
| services.gitolite.enable | Enable gitolite management under the
gitolite user
|
| services.tinyproxy.settings.Anonymous | If an Anonymous keyword is present, then anonymous proxying is enabled
|
| services.limesurvey.virtualHost.globalRedirect | If set, all requests for this host are redirected permanently to
the given URL.
|
| i18n.inputMethod.kime.daemonModules | List of enabled daemon modules
|
| services.firefly-iii.virtualHost | The hostname at which you wish firefly-iii to be served
|
| services.minetest-server.enable | If enabled, starts a Minetest Server.
|
| services.dovecot2.enablePop3 | Whether to enable starting the POP3 listener (when Dovecot is enabled).
|
| services.nginx.enableQuicBPF | Enables routing of QUIC packets using eBPF
|
| services.thinkfan.fans.*.type | The fan type, can be
hwmon for standard fans,
atasmart to read the temperature via
S
|
| services.limesurvey.httpd.virtualHost.globalRedirect | If set, all requests for this host are redirected permanently to
the given URL.
|
| system.autoUpgrade.enable | Whether to periodically upgrade NixOS to the latest
version
|
| services.dovecot2.enableImap | Whether to enable starting the IMAP listener (when Dovecot is enabled).
|
| services.dovecot2.enableLmtp | Whether to enable starting the LMTP listener (when Dovecot is enabled).
|
| fileSystems.<name>.overlay.upperdir | The path to the upperdir
|
| services.bitwarden-directory-connector-cli.ldap.ssl | Whether to use TLS.
|
| services.resolved.llmnr | Controls Link-Local Multicast Name Resolution support
(RFC 4795) on the local host
|
| services.pixelfed.nginx | With this option, you can customize an nginx virtual host which already has sensible defaults for Pixelfed
|
| hardware.nvidia.prime.sync.enable | Whether to enable NVIDIA Optimus support using the NVIDIA proprietary driver via PRIME
|
| services.bitwarden-directory-connector-cli.ldap.ad | Whether the LDAP Server is an Active Directory.
|
| services.rustus.storage.dir_structure | pattern of a directory structure locally and on s3
|
| services.limesurvey.nginx.virtualHost.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.maubot.settings.plugin_directories.load | The directories from which plugins should be loaded
|
| services.bitbox-bridge.runOnMount | Run bitbox-bridge.service only when hardware wallet is plugged, also registers the systemd device unit
|
| fileSystems.<name>.overlay.lowerdir | The list of path(s) to the lowerdir(s)
|
| services.limesurvey.nginx.virtualHost.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| services.kanboard.nginx | With this option, you can customize an NGINX virtual host which already
has sensible defaults for Kanboard
|
| services.tarsnap.archives.<name>.directories | List of filesystem paths to archive.
|
| services.wordpress.sites.<name>.virtualHost.globalRedirect | If set, all requests for this host are redirected permanently to
the given URL.
|
| security.pam.services.<name>.enableUMask | If enabled, the pam_umask module will be loaded.
|
| services.mobilizon.settings.":mobilizon"."Mobilizon.Storage.Repo".socket_dir | Path to the postgres socket directory
|
| services.ollama.acceleration | What interface to use for hardware acceleration
|
| services.mpd.settings.playlist_directory | The directory where MPD stores playlists
|
| services.bitwarden-directory-connector-cli.ldap.port | Port LDAP is accessible on.
|
| services.maubot.settings.plugin_directories | Plugin directory paths
|
| services.znapzend.features.compressed | Whether to enable compressed feature which adds the options -Lce to
the zfs send command
|
| hardware.tuxedo-drivers.settings.fn-lock | Enables or disables the laptop keyboard's Function (Fn) lock at boot
|
| services.tabby.acceleration | Specifies the device to use for hardware acceleration.
cpu: no acceleration just use the CPU
rocm: supported by modern AMD GPUs
cuda: supported by modern NVIDIA GPUs
metal: supported on darwin aarch64 machines
Tabby will try and determine what type of acceleration that is
already enabled in your configuration when acceleration = null.
- nixpkgs.config.cudaSupport
- nixpkgs.config.rocmSupport
- if stdenv.hostPlatform.isDarwin && stdenv.hostPlatform.isAarch64
IFF multiple acceleration methods are found to be enabled or if you
haven't set either cudaSupport or rocmSupport you will have to
specify the device type manually here otherwise it will default to
the first from the list above or to cpu.
|
| services.bacula-sd.director.<name>.password | Specifies the password that must be supplied for the default Bacula
Console to be authorized
|
| services.bacula-fd.director.<name>.password | Specifies the password that must be supplied for the default Bacula
Console to be authorized
|
| services.tomcat.purifyOnStart | On startup, the baseDir directory is populated with various files,
subdirectories and symlinks
|
| nix.channel.enable | Whether the nix-channel command and state files are made available on the machine
|
| services.maubot.settings.plugin_directories.trash | The directory where old plugin versions and conflicting plugins should be moved
|
| services.terraria.enable | If enabled, starts a Terraria server
|
| services.pdfding.backup.enable | Automatic backup of important data to a AWS S3 (or compatible) instance
|
| services.maubot.settings.plugin_directories.upload | The directory where uploaded new plugins should be stored.
|
| services.libinput.mouse.sendEventsMode | Sets the send events mode to disabled, enabled,
or disabled-on-external-mouse
|
| services.bitwarden-directory-connector-cli.sync.users | Sync users.
|
| services.radicle.httpd.nginx | With this option, you can customize an nginx virtual host which already has sensible defaults for radicle-httpd
|
| services.eternal-terminal.silent | If enabled, disables all logging.
|
| services.bitwarden-directory-connector-cli.user | User to run the program.
|
| services.firewalld.settings.NftablesTableOwner | If enabled, the generated nftables rule set will be owned exclusively by firewalld
|
| services.radicle.httpd.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.vsftpd.ssl_sslv2 | Only applies if ssl_enable is activated
|
| services.vsftpd.ssl_sslv3 | Only applies if ssl_enable is activated
|
| services.vsftpd.ssl_tlsv1 | Only applies if ssl_enable is activated
|
| services.misskey.reverseProxy.webserver.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.bitwarden-directory-connector-cli.ldap.rootPath | Root path for LDAP.
|
| services.misskey.reverseProxy.webserver.nginx.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| boot.initrd.network.udhcpc.extraArgs | Additional command-line arguments passed verbatim to
udhcpc if boot.initrd.network.enable and
boot.initrd.network.udhcpc.enable are enabled.
|
| services.bitwarden-directory-connector-cli.sync.userPath | User directory, relative to root.
|
| services.dolibarr.nginx | With this option, you can customize an nginx virtual host which already has sensible defaults for Dolibarr
|
| services.jitsi-meet.nginx.enable | Whether to enable nginx virtual host that will serve the javascript application and act as
a proxy for the XMPP server
|
| services.redsocks.redsocks.*.redirectInternetOnly | Exclude all non-globally-routable IPs from redsocks
|
| services.bitwarden-directory-connector-cli.ldap.startTls | Whether to use STARTTLS.
|
| services.nextcloud.settings.skeletondirectory | The directory where the skeleton files are located
|
| services.nsd.zones.<name>.multiMasterCheck | If enabled, checks all masters for the last zone version
|
| services.nextcloud.maxUploadSize | The upload limit for files
|
| services.vdirsyncer.jobs.<name>.additionalGroups | additional groups to add the dynamic user to
|
| services.cloudlog.upload-qrz.enable | Whether to periodically upload logs to QRZ
|
| services.archisteamfarm.enable | If enabled, starts the ArchisSteamFarm service
|
| services.caddy.adapter | Name of the config adapter to use
|
| systemd.sysusers.enable | If enabled, users are created with systemd-sysusers instead of with
the custom update-users-groups.pl script
|
| services.cloudlog.update-dok.enable | Whether to periodically update the DOK resource file
|
| nix.buildMachines | This option lists the machines to be used if distributed builds are
enabled (see nix.distributedBuilds)
|
| system.nssDatabases.services | List of services entries to configure in /etc/nsswitch.conf
|
| services.getty.autologinOnce | If enabled the automatic login will only happen in the first tty
once per boot
|
| services.dolibarr.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.fediwall.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.agorakit.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.librenms.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.kanboard.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.pixelfed.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.mainsail.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.bacula-sd.director.<name>.tls.certificate | The full path to the PEM encoded TLS certificate
|
| services.bacula-fd.director.<name>.tls.certificate | The full path to the PEM encoded TLS certificate
|
| services.bitwarden-directory-connector-cli.sync.groupPath | Group directory, relative to root.
|
| services.mchprs.whitelist.enable | Whether or not the whitelist (in whitelist.json) shoud be enabled
|
| services.firewalld.settings.StrictForwardPorts | If enabled, the generated destination NAT (DNAT) rules will NOT accept traffic that was DNAT'd by other entities, e.g. docker
|
| services.matrix-synapse.workers | Options for configuring workers
|
| services.bitwarden-directory-connector-cli.sync.groups | Whether to sync ldap groups into BitWarden.
|
| services.longview.nginxStatusUrl | The Nginx status page URL
|
| services.cloudlog.update-sota.enable | Whether to periodically update the SOTA database
|
| services.cloudlog.update-wwff.enable | Whether to periodically update the WWFF database
|
| security.pam.services.<name>.failDelay.enable | If enabled, this will replace the FAIL_DELAY setting from login.defs
|
| services.cloudlog.upload-lotw.enable | Whether to periodically upload logs to LoTW
|
| services.nghttpx.single-thread | Run everything in one thread inside the worker process
|
| services.mchprs.whitelist.list | Whitelisted players, only has an effect when
services.mchprs.declarativeWhitelist is
true and the whitelist is enabled
via services.mchprs.whitelist.enable
|
| services.akkoma.config.":pleroma".":instance".upload_dir | Directory where Akkoma will put uploaded files.
|
| services.crossfire-server.enable | If enabled, the Crossfire game server will be started at boot.
|
| services.bitwarden-directory-connector-cli.domain | The domain the Bitwarden/Vaultwarden is accessible on.
|
| services.etebase-server.enable | Whether to enable the Etebase server
|
| services.bitwarden-directory-connector-cli.sync.userFilter | LDAP filter for users.
|
| services.gitlab.secrets.otpFile | A file containing the secret used to encrypt secrets for OTP
tokens
|
| services.grafana.settings.analytics.feedback_links_enabled | Set to false to remove all feedback links from the UI.
|
| services.bitwarden-directory-connector-cli.enable | Whether to enable Bitwarden Directory Connector.
|
| services.printing.webInterface | Specifies whether the web interface is enabled.
|
| services.rsyncd.socketActivated | If enabled Rsync will be socket-activated rather than run persistently.
|
| programs.neovim.enable | Whether to enable Neovim
|
| services.longview.apacheStatusUrl | The Apache status page URL
|
| programs.direnv.enableZshIntegration | Whether to enable Zsh integration
.
|
| services.bitwarden-directory-connector-cli.ldap | Options to configure the LDAP connection
|
| services.bitwarden-directory-connector-cli.sync | Options to configure what gets synced
|
| services.dnsmasq.alwaysKeepRunning | If enabled, systemd will always respawn dnsmasq even if shut down manually
|
| boot.loader.systemd-boot.editor | Whether to allow editing the kernel command-line before
boot
|
| services.openssh.generateHostKeys | Whether to generate SSH host keys
|
| services.bitwarden-directory-connector-cli.sync.groupFilter | LDAP filter for groups.
|
| hardware.sane.brscan4.enable | When enabled, will automatically register the "brscan4" sane
backend and bring configuration files to their expected location.
|
| services.borgmatic.settings.source_directories | List of source directories and files to backup
|
| i18n.inputMethod.ibus.engines | Enabled IBus engines
|
| services.bitwarden-directory-connector-cli.secrets.ldap | Path to file that contains LDAP password for user in {option}`ldap.username
|
| services.suricata.settings.logging.stacktrace-on-signal | Requires libunwind to be available when Suricata is configured and built
|
| services.bitwarden-directory-connector-cli.sync.emailSuffix | Suffix for the email, normally @example.com.
|
| services.bitwarden-directory-connector-cli.sync.largeImport | Enable if you are syncing more than 2000 users/groups.
|
| services.anuko-time-tracker.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| programs.direnv.enableBashIntegration | Whether to enable Bash integration
.
|
| programs.direnv.enableFishIntegration | Whether to enable Fish integration
.
|
| services.bitwarden-directory-connector-cli.ldap.pagedSearch | Whether the LDAP server paginates search results.
|
| services.vsftpd.virtualUseLocalPrivs | If enabled, virtual users will use the same privileges as local
users
|
| services.oink.domains | List of attribute sets containing configuration for each domain
|
| boot.zfs.forceImportRoot | Forcibly import the ZFS root pool(s) during early boot
|
| systemd.network.links.<name>.enable | Whether to enable this .link unit
|
| users.ldap.daemon.enable | Whether to let the nslcd daemon (nss-pam-ldapd) handle the
LDAP lookups for NSS and PAM
|
| services.thinkfan.sensors.*.type | The sensor type, can be
hwmon for standard sensors,
atasmart to read the temperature via
S
|
| services.minecraft-server.enable | If enabled, start a Minecraft Server
|
| services.pipewire.systemWide | If true, a system-wide PipeWire service and socket is enabled
allowing all users in the "pipewire" group to use it simultaneously
|
| services.plausible.mail.smtp.passwordFile | The path to the file with the password in case SMTP auth is enabled.
|
| services.bitwarden-directory-connector-cli.ldap.username | The user to authenticate as.
|
| services.bitwarden-directory-connector-cli.package | The bitwarden-directory-connector-cli package to use.
|
| system.nssDatabases.hosts | List of hosts entries to configure in /etc/nsswitch.conf
|
| services.wstunnel.clients.<name>.addNetBind | Whether to enable Whether add CAP_NET_BIND_SERVICE to the tunnel service, this should be enabled if you want to bind port < 1024.
|
| services.bitwarden-directory-connector-cli.sync.userObjectClass | Class that users must have.
|
| services.bitwarden-directory-connector-cli.ldap.hostname | The host the LDAP is accessible on.
|
| security.pam.ussh.enable | Enables Uber's USSH PAM (pam-ussh) module
|
| services.zabbixWeb.nginx.virtualHost.http2 | Whether to enable the HTTP/2 protocol
|
| networking.nftables.enable | Whether to enable nftables and use nftables based firewall if enabled.
nftables is a Linux-based packet filtering framework intended to
replace frameworks like iptables
|
| services.sabnzbd.settings.servers.<name>.expire_date | If Notifications are enabled and an expiry date is
set, warn 5 days before expiry
|
| services.bookstack.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.invidious.nginx.enable | Whether to configure nginx as a reverse proxy for Invidious
|
| system.nssDatabases.shadow | List of shadow entries to configure in /etc/nsswitch.conf
|
| security.auditd.plugins.<name>.direction | The option is dictated by the plugin
|
| programs.direnv.enableXonshIntegration | Whether to enable Xonsh integration
.
|
| services.davis.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| services.davis.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| services.movim.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| services.slskd.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| services.movim.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| services.slskd.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| services.dovecot2.protocols | Additional listeners to start when Dovecot is enabled.
|
| virtualisation.writableStore | If enabled, the Nix store in the VM is made writable by
layering an overlay filesystem on top of the host's Nix
store
|
| services.nomad.extraSettingsPlugins | Additional plugins dir used to configure nomad.
|
| services.znc.useLegacyConfig | Whether to propagate the legacy options under
services.znc.confOptions.* to the znc config
|
| services.udisks2.mountOnMedia | When enabled, instructs udisks2 to mount removable drives under /media/ directory, instead of the
default, ACL-controlled /run/media/$USER/
|
| services.cloudlog.update-lotw-users.enable | Whether to periodically update the list of LoTW users
|
| services.znc.config | Configuration for ZNC, see
https://wiki.znc.in/Configuration for details
|
| services.opensearch.settings."plugins.security.disabled" | Whether to enable the security plugin,
plugins.security.ssl.transport.keystore_filepath or
plugins.security.ssl.transport.server.pemcert_filepath and
plugins.security.ssl.transport.client.pemcert_filepath
must be set for this plugin to be enabled.
|
| services.hostapd.radios.<name>.wifi4.enable | Enables support for IEEE 802.11n (WiFi 4, HT)
|
| services.bitwarden-directory-connector-cli.sync.groupObjectClass | A class that groups will have.
|
| services.snipe-it.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| services.snipe-it.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| services.postgresql.initdbArgs | Additional arguments passed to initdb during data dir
initialisation.
|
| programs.vscode.defaultEditor | When enabled, configures VSCode to be the default editor
using the EDITOR environment variable.
|
| services.part-db.enablePostgresql | Whether to configure the postgresql database for part-db
|
| services.anubis.instances.<name>.settings.METRICS_BIND | The address Anubis' metrics server listens to
|
| services.matrix-synapse.extras | Explicitly install extras provided by matrix-synapse
|
| services.broadcast-box.web.openFirewall | Whether to enable opening the HTTP server port and, if enabled, the HTTPS redirect server
port in the firewall.
.
|
| services.libinput.mouse.tappingDragLock | Enables or disables drag lock during tapping behavior
|
| services.easytier.allowSystemForward | Whether to enable Allow the system to forward packets from easytier
|
| services.rke2.cisHardening | Enable CIS Hardening for RKE2
|
| services.traefik.dynamic.files | Dynamic configuration files to write
|
| services.privatebin.virtualHost | The hostname at which you wish privatebin to be served
|
| services.akkoma.config.":pleroma".":instance".static_dir | Directory of static files
|
| services.bitwarden-directory-connector-cli.interval | The interval when to run the connector
|
| services.jirafeau.nginxConfig.http2 | Whether to enable the HTTP/2 protocol
|
| programs.neovim.defaultEditor | When enabled, installs neovim and configures neovim to be the default editor
using the EDITOR environment variable.
|
| services.sabnzbd.secretFiles | Path to a list of ini file containing confidential settings such as credentials
|
| hardware.nvidia.prime.reverseSync.enable | Whether to enable NVIDIA Optimus support using the NVIDIA proprietary driver via reverse
PRIME
|
| services.libinput.touchpad.sendEventsMode | Sets the send events mode to disabled, enabled,
or disabled-on-external-mouse
|
| services.nghttpx.frontends.*.params.tls | Enable or disable TLS
|
| services.fluidd.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| services.fluidd.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| services.akkoma.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| services.akkoma.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| services.gancio.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| services.gancio.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| services.matomo.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| services.matomo.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| services.monica.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| services.monica.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| services.akkoma.initSecrets | Whether to initialise non‐existent secrets with random values
|
| services.nginx.virtualHosts.<name>.http2 | Whether to enable the HTTP/2 protocol
|
| services.netbird.tunnels.<name>.dns-resolver.port | A port to serve DNS entries on when dns-resolver.address is enabled.
|
| services.netbird.clients.<name>.dns-resolver.port | A port to serve DNS entries on when dns-resolver.address is enabled.
|
| boot.initrd.network.enable | Add network connectivity support to initrd
|
| services.fedimintd.<name>.dataDir | Path to the data dir fedimintd will use to store its data
|
| services.slurm.enableSrunX11 | If enabled srun will accept the option "--x11" to allow for X11 forwarding
from within an interactive session or a batch job
|
| programs.fish.useBabelfish | If enabled, the configured environment will be translated to native fish using babelfish
|
| services.nextcloud.extraAppsEnable | Automatically enable the apps in services.nextcloud.extraApps every time Nextcloud starts
|
| services.cloudlog.upload-clublog.enable | Whether to periodically upload logs to Clublog
|
| services.gitlab-runner.clear-docker-cache.enable | Whether to periodically prune gitlab runner's Docker resources
|
| services.thanos.rule.web.prefix-header | Name of HTTP request header used for dynamic prefixing of UI links and
redirects
|
| services.borgbackup.repos.<name>.quota | Storage quota for the repository
|
| programs.tsmClient.servers.<name>.passworddir | Directory that holds the TSM
node's password information.
|
| services.pdfding.consume.enable | Bulk PDF import from consume directory
|
| system.nssDatabases.sudoers | List of sudoers entries to configure in /etc/nsswitch.conf
|
| i18n.inputMethod.fcitx5.ignoreUserConfig | Ignore the user configures. Warning: When this is enabled, the
user config files are totally ignored and the user dict can't be saved
and loaded.
|
| services.rstudio-server.serverWorkingDir | Default working directory for server (server-working-dir in rserver.conf).
|
| services.mediatomb.customCfg | Allow the service to create and use its own config file inside the dataDir as
configured by services.mediatomb.dataDir
|
| services.mongodb.initialRootPasswordFile | Path to the file containing the password for the root user if auth is enabled.
|
| services.bitwarden-directory-connector-cli.sync.useEmailPrefixSuffix | If a user has no email address, combine a username prefix with a suffix value to form an email.
|
| services.stargazer.allowCgiUser | When enabled, the stargazer process will be given CAP_SETGID
and CAP_SETUID so that it can run cgi processes as a different
user
|
| services.cloudlog.update-clublog-scp.enable | Whether to periodically update the Clublog SCP database
|
| services.thanos.query.store.response-timeout | If a Store doesn't send any data in this specified duration then a
Store will be ignored and partial data will be returned if it's
enabled. 0 disables timeout
|
| services.bitwarden-directory-connector-cli.sync.removeDisabled | Remove users from bitwarden groups if no longer in the ldap group.
|
| services.mediagoblin.settings.mediagoblin.plugins | Plugins to enable
|
| security.pam.services.<name>.kwallet.enable | If enabled, pam_wallet will attempt to automatically unlock the
user's default KDE wallet upon login
|
| services.redsocks.redsocks.*.redirectCondition | Conditions to make outbound packets go through this redsocks
instance
|
| services.meilisearch.package | The meilisearch package to use
|
| services.thanos.query.web.prefix-header | Name of HTTP request header used for dynamic prefixing of UI links and
redirects
|
| system.autoUpgrade.rebootWindow | Define a lower and upper time value (in HH:MM format) which
constitute a time window during which reboots are allowed after an upgrade
|
| services.displayManager.dms-greeter.package | The DankMaterialShell package to use for the greeter
|
| services.reposilite.openFirewall | Whether to open the firewall ports for Reposilite
|
| hardware.sane.dsseries.enable | When enabled, will automatically register the "dsseries" SANE backend
|
| fonts.fontconfig.enable | If enabled, a Fontconfig configuration file will be built
pointing to a set of default fonts
|
| services.firewalld.zones.<name>.forward | Whether to enable intra-zone forwarding
|
| services.cyrus-imap.imapdSettings.configdirectory | The pathname of the IMAP configuration directory.
|
| networking.nat.forwardPorts | List of forwarded ports from the external interface to
internal destinations by using DNAT
|
| services.bitwarden-directory-connector-cli.sync.groupNameAttribute | Attribute for a name of group.
|
| services.bitwarden-directory-connector-cli.sync.userEmailAttribute | Attribute for a users email.
|
| services.postgresqlWalReceiver.receivers.<name>.directory | Directory to write the output to.
|
| systemd.enableStrictShellChecks | Whether to run shellcheck on the generated scripts for systemd
units
|
| programs.i3lock.u2fSupport | Whether to enable U2F support in the i3lock program
|
| documentation.nixos.checkRedirects | Check redirects for manualHTML.
|
| services.gitlab.registry.defaultForProjects | If GitLab container registry should be enabled by default for projects.
|
| services.bitwarden-directory-connector-cli.sync.memberAttribute | Attribute that lists members in a LDAP group.
|
| services.librenms.enableLocalBilling | Enable billing Cron-Jobs on the local instance
|
| services.prosody.s2sInsecureDomains | Some servers have invalid or self-signed certificates
|
| services.radicle.httpd.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| services.radicle.httpd.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| services.chrony.autotrimThreshold | Maximum estimated error threshold for the rtcautotrim command
|
| systemd.user.services.<name>.reloadIfChanged | Whether the service should be reloaded during a NixOS
configuration switch if its definition has changed
|
| services.healthchecks.settings | Environment variables which are read by healthchecks (local)_settings.py
|
| services.kanidm.provision.systems.oauth2.<name>.enableLocalhostRedirects | Allow localhost redirects
|
| services.journalwatch.enable | If enabled, periodically check the journal with journalwatch and report the results by mail.
|
| hardware.graphics.enable | Whether to enable hardware accelerated graphics drivers
|
| systemd.sysupdate.enable | Atomically update the host OS, container images, portable service
images or other sources
|
| services.privoxy.certsLifetime | If inspectHttps is enabled, the time generated HTTPS
certificates will be stored in a temporary directory for reuse
|
| boot.initrd.network.flushBeforeStage2 | Whether to clear the configuration of the interfaces that were set up in
the initrd right before stage 2 takes over
|
| services.libinput.mouse.middleEmulation | Enables middle button emulation
|
| services.munin-node.extraPlugins | Additional Munin plugins to activate
|
| services.mjolnir.pantalaimon.options.ssl | Whether or not SSL verification should be enabled for outgoing
connections to the homeserver.
|
| services.healthchecks.settingsFile | Environment variables which are read by healthchecks (local)_settings.py
|
| services.dolibarr.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| services.librenms.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| services.dolibarr.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| services.librenms.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| services.kanboard.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| services.kanboard.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| services.fediwall.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| services.fediwall.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| services.agorakit.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| services.agorakit.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| services.mainsail.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| services.pixelfed.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| services.pixelfed.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| services.mainsail.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| services.neo4j.directories.certificates | Directory for storing certificates to be used by Neo4j for
TLS connections
|
| networking.nftables.checkRulesetRedirects | Set of paths that should be intercepted and rewritten while checking the ruleset
using pkgs.buildPackages.libredirect.
|
| services.firefly-iii-data-importer.virtualHost | The hostname at which you wish firefly-iii-data-importer to be served
|
| services.bitwarden-directory-connector-cli.sync.emailPrefixAttribute | The attribute that contains the users username.
|
| services.fedimintd.<name>.nginx.config.http2 | Whether to enable the HTTP/2 protocol
|
| services.netbird.useRoutingFeatures | Enables settings required for NetBird's routing features: Network Resources, Network Routes & Exit Nodes
|
| services.nebula.networks.<name>.enableReload | Enable automatic config reload on config change
|
| systemd.services.<name>.reloadIfChanged | Whether the service should be reloaded during a NixOS
configuration switch if its definition has changed
|
| networking.interfaces.<name>.tempAddress | When IPv6 is enabled with SLAAC, this option controls the use of
temporary address (aka privacy extensions) on this
interface
|
| services.libinput.touchpad.tappingDragLock | Enables or disables drag lock during tapping behavior
|
| virtualisation.directBoot.initrd | In direct boot situations, you may want to influence the initrd to load
to use your own customized payload
|
| services.patroni.postgresqlPackage | PostgreSQL package to use
|
| boot.kernel.randstructSeed | Provides a custom seed for the RANDSTRUCT security
option of the Linux kernel
|
| services.pufferpanel.environment | Environment variables to set for the service
|
| hardware.nvidia.prime.offload.enable | Whether to enable render offload support using the NVIDIA proprietary driver via PRIME
|
| services.strongswan-swanctl.swanctl.connections.<name>.mobike | Enables MOBIKE on IKEv2 connections
|
| hardware.graphics.package32 | The package that provides the 32-bit driver set
|
| services.munin-node.extraAutoPlugins | Additional Munin plugins to autoconfigure, using
munin-node-configure --suggest
|
| services.tailscale.derper.configureNginx | Whether to enable nginx reverse proxy for derper
|
| services.bitwarden-directory-connector-cli.sync.overwriteExisting | Remove and re-add users/groups, See https://bitwarden.com/help/user-group-filters/#overwriting-syncs for more details.
|
| services.unbound.localControlSocketPath | When not set to null this option defines the path
at which the unbound remote control socket should be created at
|
| services.anuko-time-tracker.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| services.anuko-time-tracker.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| services.teeworlds.game.tournamentMode | Whether to enable tournament mode
|
| security.pam.services.<name>.enableGnomeKeyring | If enabled, pam_gnome_keyring will attempt to automatically unlock the
user's default Gnome keyring upon login
|
| boot.initrd.luks.mitigateDMAAttacks | Unless enabled, encryption keys can be easily recovered by an attacker with physical
access to any machine with PCMCIA, ExpressCard, ThunderBolt or FireWire port
|
| services.zabbixWeb.nginx.virtualHost.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| services.zabbixWeb.nginx.virtualHost.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| services.bitwarden-directory-connector-cli.sync.creationDateAttribute | Attribute that lists a user's creation date.
|
| services.mediawiki.extensions | Attribute set of paths whose content is copied to the extensions
subdirectory of the MediaWiki installation and enabled in configuration
|
| services.openafsServer.dottedPrincipals | If enabled, allow principal names containing (.) dots
|
| services.prometheus.exporters.nginx.scrapeUri | Address to access the nginx status page
|
| services.bookstack.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| services.bookstack.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| services.limesurvey.nginx.virtualHost.http2 | Whether to enable the HTTP/2 protocol
|
| boot.loader.limine.secureBoot.enable | Whether to use sign the limine binary with sbctl.
This requires you to already have generated the keys and enrolled them with sbctl
|
| services.firezone.server.openClusterFirewall | Opens up the erlang distribution port of all enabled components to
allow reaching the server cluster from the internet
|
| services.kanidm.provision.idmAdminPasswordFile | Path to a file containing the idm admin password for kanidm
|
| containers.<name>.privateUsers | Whether to give the container its own private UIDs/GIDs space (user namespacing)
|
| services.blockbook-frontend.<name>.cssDir | Location of the dir with main.css CSS file
|
| services.xserver.displayManager.lightdm.greeter.enable | If set to false, run lightdm in greeterless mode
|
| networking.bonds.<name>.miimon | DEPRECATED, use driverOptions
|
| systemd.network.wait-online.enable | Whether to enable the systemd-networkd-wait-online service.
systemd-networkd-wait-online can timeout and fail if there are no network interfaces
available for it to manage
|
| services.mediagoblin.pluginPackages | Plugins to add to the environment of MediaGoblin
|
| services.postgresqlBackup.pgdumpOptions | Command line options for pg_dump
|
| services.jirafeau.nginxConfig.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| services.jirafeau.nginxConfig.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| services.listmonk.database.mutableSettings | Database settings will be reset to the value set in this module if this is not enabled
|
| services.resilio.sharedFolders | Shared folder list
|
| programs.hyprland.systemd.setPath.enable | Set environment path of systemd to include the current system's bin directory
|
| services.misskey.reverseProxy.webserver.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.nginx.virtualHosts.<name>.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| services.nginx.virtualHosts.<name>.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| services.libinput.touchpad.middleEmulation | Enables middle button emulation
|
| services.borgbackup.repos.<name>.allowSubRepos | Allow clients to create repositories in subdirectories of the
specified path
|
| systemd.network.wait-online.anyInterface | Whether to consider the network online when any interface is online, as opposed to all of them
|
| services.minecraft-server.whitelist | Whitelisted players, only has an effect when
services.minecraft-server.declarative is
true and the whitelist is enabled
via services.minecraft-server.serverProperties by
setting white-list to true
|
| services.prometheus.exporters.postfix.group | Group under which the postfix exporter shall be run
|
| services.bacula-sd.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| services.bacula-fd.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| services.firewalld.zones.<name>.icmpBlockInversion | Whether to invert the icmp block handling
|
| services.mattermost.mutableConfig | Whether the Mattermost config.json is writeable by Mattermost
|
| services.mastodon.elasticsearch.host | Elasticsearch host
|
| boot.initrd.systemd.network.wait-online.enable | Whether to enable the systemd-networkd-wait-online service.
systemd-networkd-wait-online can timeout and fail if there are no network interfaces
available for it to manage
|
| virtualisation.fileSystems.<name>.encrypted.keyFile | Path to a keyfile used to unlock the backing encrypted
device
|
| services.logrotate.checkConfig | Whether the config should be checked at build time
|
| services.nextcloud.phpExtraExtensions | Additional PHP extensions to use for Nextcloud
|
| systemd.user.services.<name>.enableStrictShellChecks | Enable running shellcheck on the generated scripts for this unit
|
| hardware.sane.disabledDefaultBackends | Names of backends which are enabled by default but should be disabled
|
| services.chhoto-url.settings.custom_landing_directory | The path of a directory which contains a custom landing page.
|
| services.prometheus.pushgateway.stateDir | Directory below /var/lib to store metrics
|
| services.synapse-auto-compressor.postgresUrl | Connection string to postgresql in the
[rust postgres crate config format](https://docs.rs/postgres/latest/postgres/config/struct
|
| services.fedimintd.<name>.nginx.config.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| services.fedimintd.<name>.nginx.config.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.sha256_96 | HMAC-SHA-256 is used with 128-bit truncation with IPsec
|
| boot.initrd.systemd.network.wait-online.anyInterface | Whether to consider the network online when any interface is online, as opposed to all of them
|
| networking.firewall.logReversePathDrops | Logs dropped packets failing the reverse path filter test if
the option networking.firewall.checkReversePath is enabled.
|
| services.displayManager.dms-greeter.quickshell.package | The Quickshell package to use for the greeter
|
| services.prometheus.exporters.mongodb.collector | Enabled collectors
|
| boot.initrd.systemd.additionalUpstreamUnits | Additional units shipped with systemd that shall be enabled.
|
| programs.fish.extraCompletionPackages | Additional packages to generate completions from, if programs.fish.generateCompletions is enabled.
|
| services.displayManager.dms-greeter.compositor.name | The Wayland compositor to run the greeter in
|
| services.nextcloud.config.objectstore.s3.usePathStyle | Required for some non-Amazon S3 implementations
|
| security.dhparams.stateful | Whether generation of Diffie-Hellman parameters should be stateful or
not
|
| services.tailscale.useRoutingFeatures | Enables settings required for Tailscale's routing features like subnet routers and exit nodes
|
| services.paperless.consumptionDirIsPublic | Whether all users can write to the consumption dir.
|
| virtualisation.fileSystems.<name>.overlay.workdir | The path to the workdir
|
| services.limesurvey.nginx.virtualHost.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| services.limesurvey.nginx.virtualHost.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| systemd.services.<name>.enableStrictShellChecks | Enable running shellcheck on the generated scripts for this unit
|
| programs.steam.protontricks.enable | Whether to enable protontricks, a simple wrapper for running Winetricks commands for Proton-enabled games.
|
| programs.tsmClient.servers.<name>.genPasswd | Whether to enable automatic client password generation
|
| services.sssd.sshAuthorizedKeysIntegration | Whether to make sshd look up authorized keys from SSS
|
| hardware.nvidia.videoAcceleration | Whether to enable Whether video acceleration (VA-API) should be enabled.
.
|
| services.firefox-syncserver.enable | Whether to enable the Firefox Sync storage service
|
| virtualisation.useEFIBoot | If enabled, the virtual machine will provide a EFI boot
manager.
useEFIBoot is ignored if useBootLoader == false.
|
| services.misskey.reverseProxy.webserver.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| services.misskey.reverseProxy.webserver.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| systemd.additionalUpstreamSystemUnits | Additional units shipped with systemd that shall be enabled.
|
| programs.gnupg.agent.pinentryPackage | Which pinentry package to use
|
| services.prometheus.exporters.chrony.chronyServerAddress | ChronyServerAddress of the chrony server side command port. (Not enabled by default.)
Defaults to the local unix socket.
|
| services.pantalaimon-headless.instances.<name>.ssl | Whether or not SSL verification should be enabled for outgoing
connections to the homeserver.
|
| virtualisation.useHostCerts | If enabled, when NIX_SSL_CERT_FILE is set on the host,
pass the CA certificates from the host to the VM.
|
| virtualisation.fileSystems.<name>.overlay.upperdir | The path to the upperdir
|
| services.grafana.settings.analytics.check_for_updates | When set to false, disables checking for new versions of Grafana from Grafana's GitHub repository
|
| virtualisation.fileSystems.<name>.overlay.lowerdir | The list of path(s) to the lowerdir(s)
|
| services.postgresqlBackup.compressionLevel | The compression level used when compression is enabled.
gzip accepts levels 1 to 9. zstd accepts levels 1 to 19.
|
| services.magnetico.web.credentials | The credentials to access the web interface, in case authentication is
enabled, in the format username:hash
|
| services.yggdrasil.persistentKeys | Whether to enable automatic generation and persistence of keys
|
| virtualisation.useBIOSBoot | If enabled for legacy MBR VMs, the VM image will have a separate boot
partition mounted at /boot.
useBIOSBoot is ignored if useEFIBoot == true.
|
| boot.loader.generationsDir.enable | Whether to create symlinks to the system generations under
/boot
|
| documentation.man.man-db.manualPages | The manual pages to generate caches for if documentation.man.generateCaches
is enabled
|
| services.bitwarden-directory-connector-cli.secrets.bitwarden.client_path_id | Path to file that contains Client ID.
|
| services.discourse.database.ignorePostgresqlVersion | Whether to allow other versions of PostgreSQL than the
recommended one
|
| services.parsedmarc.provision.grafana.datasource | Whether the automatically provisioned Elasticsearch
instance should be added as a grafana datasource
|
| virtualisation.lxd.zfsSupport | Enables lxd to use zfs as a storage for containers
|
| networking.resolvconf.package | The package that provides the system-wide resolvconf command
|
| virtualisation.spiceUSBRedirection.enable | Install the SPICE USB redirection helper with setuid
privileges
|
| services.prometheus.exporters.frr.disabledCollectors | Collectors to disable which are enabled by default.
|
| services.jellyfin.forceEncodingConfig | Whether to overwrite Jellyfin's encoding.xml configuration file on each service start
|
| hardware.nvidia-container-toolkit.mount-nvidia-docker-1-directories | Mount nvidia-docker-1 directories on containers: /usr/local/nvidia/lib and
/usr/local/nvidia/lib64.
|
| services.prometheus.exporters.node.disabledCollectors | Collectors to disable which are enabled by default.
|
| networking.getaddrinfo.reload | Determines whether a process should detect changes to the configuration file since it was last read
|
| services.nextcloud-spreed-signaling.configureNginx | Whether to set up and configure an nginx virtual host according to upstream's recommendations
|
| networking.firewall.logRefusedUnicastsOnly | If networking.firewall.logRefusedPackets
and this option are enabled, then only log packets
specifically directed at this machine, i.e., not broadcasts
or multicasts.
|
| networking.interfaces.<name>.useDHCP | Whether this interface should be configured with DHCP
|
| services.jellyfin.transcoding.hardwareEncodingCodecs | Which codecs to enable for hardware encoding. h264 is always enabled.
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.per_cpu_sas | Enable per-CPU CHILD_SAs
|
| services.prometheus.exporters.opnsense.disabledExporter | Collectors to enable or disable
|
| security.pam.services.<name>.googleAuthenticator.enable | If set, users with enabled Google Authenticator (created
~/.google_authenticator) will be required
to provide Google Authenticator token to log in.
|
| services.prometheus.pushgateway.persistMetrics | Whether to persist metrics to a file
|
| programs.singularity.enableFakeroot | Whether to enable the --fakeroot support of Singularity/Apptainer
|
| services.prometheus.exporters.wireguard.singleSubnetPerField | By default, all allowed IPs and subnets are comma-separated in the
allowed_ips field
|
| networking.tempAddresses | Whether to enable IPv6 Privacy Extensions for interfaces not
configured explicitly in
networking.interfaces._name_.tempAddress
|
| services.github-runners.<name>.ephemeral | If enabled, causes the following behavior:
- Passes the
--ephemeral flag to the runner configuration script
- De-registers and stops the runner with GitHub after it has processed one job
- On stop, systemd wipes the runtime directory (this always happens, even without using the ephemeral option)
- Restarts the service after its successful exit
- On start, wipes the state directory and configures a new runner
You should only enable this option if tokenFile points to a file which contains a
personal access token (PAT)
|
| environment.memoryAllocator.provider | The system-wide memory allocator
|
| services.wyoming.faster-whisper.servers.<name>.model | Name of the voice model to use
|
| hardware.nvidia.modesetting.enable | Whether to enable kernel modesetting when using the NVIDIA proprietary driver
|
| virtualisation.podman.autoPrune.enable | Whether to periodically prune Podman resources
|
| virtualisation.docker.autoPrune.enable | Whether to periodically prune Docker resources
|
| programs.starship.transientPrompt.enable | Whether to enable Starship's transient prompt
feature in fish shells
|
| services.prometheus.exporters.chrony.disabledCollectors | Collectors to disable which are enabled by default
|
| virtualisation.docker.enableOnBoot | When enabled dockerd is started on boot
|
| virtualisation.oci-containers.containers.<name>.workdir | Override the default working directory for the container.
|
| virtualisation.graphics | Whether to run QEMU with a graphics window, or in nographic mode
|
| hardware.wirelessRegulatoryDatabase | Whether to enable loading the wireless regulatory database at boot.
|
| virtualisation.nixStore9pCache | Type of 9p cache to use when mounting host nix store. "none" provides
no caching. "loose" enables Linux's local VFS cache. "fscache" uses Linux's
fscache subsystem
|
| networking.wireless.athUserRegulatoryDomain | If enabled, sets the ATH_USER_REGD kernel config switch to true to
disable the enforcement of EEPROM regulatory restrictions for ath
drivers
|
| system.copySystemConfiguration | If enabled, copies the NixOS configuration file
(usually /etc/nixos/configuration.nix)
and symlinks it from the resulting system
(getting to /run/current-system/configuration.nix)
|
| fileSystems.<name>.overlay.useStage1BaseDirectories | If enabled, lowerdir, upperdir and workdir will be prefixed with /sysroot
|
| services.prometheus.alertmanagerGotify.dispatchErrors | When enabled, alerts will be tried to dispatch with an error message regarding faulty templating or missing fields to help debugging.
|
| services.prometheus.alertmanagerGotify.extendedDetails | When enabled, alerts are presented in HTML format and include colorized status (FIR|RES), alert start time, and a link to the generator of the alert.
|
| documentation.man.mandoc.cachePath | Change the paths where mandoc makewhatis(8)generates the
manual page index caches. documentation.man.generateCaches
should be enabled to allow cache generation
|
| services.bitwarden-directory-connector-cli.secrets.bitwarden.client_path_secret | Path to file that contains Client Secret.
|
| swapDevices.*.randomEncryption.enable | Encrypt swap device with a random key
|
| virtualisation.forwardPorts | When using the SLiRP user networking (default), this option allows to
forward ports to/from the host/guest.
If the NixOS firewall on the virtual machine is enabled, you also
have to open the guest ports to enable the traffic between host and
guest.
Currently QEMU supports only IPv4 forwarding.
|
| services.n8n.environment.N8N_VERSION_NOTIFICATIONS_ENABLED | When enabled, n8n sends notifications of new versions and security updates.
|
| services.postfix.settings.main.smtp_tls_security_level | The client TLS security level.
Use dane with a local DNSSEC validating DNS resolver enabled.
https://www.postfix.org/postconf.5.html#smtp_tls_security_level
|
| services.borgmatic.configurations.<name>.source_directories | List of source directories and files to backup
|
| virtualisation.restrictNetwork | If this option is enabled, the guest will be isolated, i.e. it will
not be able to contact the host and no guest IP packets will be
routed over the host to the outside
|
| networking.networkmanager.enable | Whether to use NetworkManager to obtain an IP address and other
configuration for all network interfaces that are not manually
configured
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.ipcomp | Enable IPComp compression before encryption
|
| system.includeBuildDependencies | Whether to include the build closure of the whole system in
its runtime closure
|
| services.strongswan-swanctl.swanctl.connections.<name>.mediated_by | The name of the connection to mediate this connection through
|
| services.prometheus.scrapeConfigs.*.http_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.strongswan-swanctl.swanctl.connections.<name>.if_id_in | XFRM interface ID set on inbound policies/SA, can be overridden by child
config, see there for details
|
| boot.loader.generic-extlinux-compatible.useGenerationDeviceTree | Whether to generate Device Tree-related directives in the
extlinux configuration
|
| security.apparmor.killUnconfinedConfinables | Whether to enable killing of processes which have an AppArmor profile enabled
(in security.apparmor.policies)
but are not confined (because AppArmor can only confine new processes)
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.strongswan-swanctl.swanctl.connections.<name>.if_id_out | XFRM interface ID set on outbound policies/SA, can be overridden by child
config, see there for details
|
| services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.pk | If this attribute is given, SAE-PK will be enabled for this connection
|
| virtualisation.libvirtd.shutdownTimeout | Number of seconds we're willing to wait for a guest to shut down
|
| networking.usePredictableInterfaceNames | Whether to assign predictable names to network interfaces
|
| containers.<name>.ephemeral | Runs container in ephemeral mode with the empty root filesystem at boot
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| swapDevices.*.randomEncryption | Encrypt swap device with a random key
|
| services.grafana.settings.analytics.check_for_plugin_updates | When set to false, disables checking for new versions of installed plugins from https://grafana.com
|
| virtualisation.useDefaultFilesystems | If enabled, the boot disk of the virtual machine will be
formatted and mounted with the default filesystems for
testing
|
| services.strongswan-swanctl.swanctl.connections.<name>.send_certreq | Send certificate request payloads to offer trusted root CA certificates to
the peer
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.grafana.settings.security.strict_transport_security | Set to true if you want to enable HTTP Strict-Transport-Security (HSTS) response header
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.if_id_in | XFRM interface ID set on inbound policies/SA
|
| virtualisation.oci-containers.containers.<name>.autoStart | When enabled, the container is automatically started on boot
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.if_id_out | XFRM interface ID set on outbound policies/SA
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mark_out | Netfilter mark and mask for output traffic
|
| services.matrix-continuwuity.settings.global.allow_announcements_check | If enabled, continuwuity will send a simple GET request periodically to
https://continuwuity.org/.well-known/continuwuity/announcements for any new announcements made.
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.auth | Authentication to expect from remote
|
| virtualisation.fileSystems.<name>.overlay.useStage1BaseDirectories | If enabled, lowerdir, upperdir and workdir will be prefixed with /sysroot
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.set_mark_in | Netfilter mark applied to packets after the inbound IPsec SA processed
them
|
| networking.wireguard.interfaces.<name>.peers.*.dynamicEndpointRefreshSeconds | Periodically re-execute the wg utility every
this many seconds in order to let WireGuard notice DNS / hostname
changes
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.set_mark_out | Netfilter mark applied to packets after the outbound IPsec SA processed
them
|
| services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.auth | Authentication to perform locally.
- The default
pubkey uses public key authentication
using a private key associated to a usable certificate.
psk uses pre-shared key authentication.
- The IKEv1 specific
xauth is used for XAuth or Hybrid
authentication,
- while the IKEv2 specific
eap keyword defines EAP
authentication.
- For
xauth, a specific backend name may be appended,
separated by a dash
|
| services.hostapd.radios.<name>.networks.<name>.authentication.enableRecommendedPairwiseCiphers | Additionally enable the recommended set of pairwise ciphers
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| networking.networkmanager.ensureProfiles.profiles | Declaratively define NetworkManager profiles
|
| services.grafana.settings.security.strict_transport_security_preload | Set to true to enable HSTS preloading option
|
| services.grafana.settings.security.strict_transport_security_subdomains | Set to true to enable HSTS includeSubDomains option
|
| services.grafana.settings.security.strict_transport_security_max_age_seconds | Sets how long a browser should cache HSTS in seconds
|