| services.typesense.apiKeyFile | Sets the admin api key for typesense
|
| services.rkvm.server.settings.key | TLS key path.
This should be generated with rkvm-certificate-gen.
|
| services.ergo.api.keyHash | Hex-encoded Blake2b256 hash of an API key as a 64-chars long Base16 string.
|
| services.gns3-server.ssl.keyFile | Private key file for the certificate.
|
| services.nsd.keys.<name>.keyFile | Path to the file which contains the actual base64 encoded
key
|
| services.morty.key | HMAC url validation key (hexadecimal encoded)
|
| console.keyMap | The keyboard mapping table for the virtual consoles.
|
| services.prosody.ssl.key | Path to the key file.
|
| services.nghttpx.tls.key | Path to the TLS key file.
|
| services.etcd.keyFile | Key file to use for clients
|
| services.bacula-sd.tls.key | The path of a PEM encoded TLS private key
|
| services.bacula-fd.tls.key | The path of a PEM encoded TLS private key
|
| services.bacula-dir.tls.key | The path of a PEM encoded TLS private key
|
| services.oauth2-proxy.tls.key | Path to private key file.
|
| services.rkvm.server.settings.switch-keys | A key list specifying a host switch combination.
A list of key names is available in https://github.com/htrefil/rkvm/blob/master/switch-keys.md.
|
| boot.initrd.luks.devices.<name>.keyFileSize | The size of the key file
|
| services.pgmanage.tls.key | TLS key
|
| services.llama-swap.tls.keyFile | Path to the TLS private key file
|
| services.thanos.rule.grpc-server-tls-key | TLS Key for the gRPC server, leave blank to disable TLS
|
| services.warpgate.settings.http.key | Path to HTTPS listener private key.
|
| boot.initrd.luks.devices.<name>.keyFileOffset | The offset of the key file
|
| services.btrbk.sshAccess.*.key | SSH public key allowed to login as user btrbk to run remote backups.
|
| services.thanos.store.grpc-server-tls-key | TLS Key for the gRPC server, leave blank to disable TLS
|
| services.thanos.query.grpc-server-tls-key | TLS Key for the gRPC server, leave blank to disable TLS
|
| services.public-inbox.nntp.key | Path to TLS key to use for connections to public-inbox-nntpd(1).
|
| services.public-inbox.imap.key | Path to TLS key to use for connections to public-inbox-imapd(1).
|
| services.warpgate.settings.mysql.key | Path to MySQL listener private key.
|
| services.ttyd.keyFile | SSL key file path
|
| services.ghostunnel.servers.<name>.key | Path to certificate private key (PEM with private key)
|
| security.acme.certs.<name>.keyType | Key type to use for private keys
|
| services.athens.storage.s3.key | Access key id for the S3 storage backend.
|
| services.journald.gateway.key | Specify the path to a file or AF_UNIX stream socket to read the
secret server key corresponding to the certificate specified with
services.journald.gateway.cert from
|
| services.livekit.keyFile | LiveKit key file holding one or multiple application secrets
|
| services.namecoind.rpc.key | Key file for securing RPC connections.
|
| services.kubernetes.apiserver.etcd.keyFile | Etcd key file.
|
| services.taskserver.pki.manual.server.key | Fully qualified path to the server key.
Setting this option will prevent automatic CA creation and handling.
|
| services.molly-brown.keyPath | Path to TLS key
|
| services.go-camo.keyFile | A file containing the HMAC key to use for signing URLs
|
| services.thanos.receive.grpc-server-tls-key | TLS Key for the gRPC server, leave blank to disable TLS
|
| services.thanos.sidecar.grpc-server-tls-key | TLS Key for the gRPC server, leave blank to disable TLS
|
| services.galene.keyFile | Path to the server's private key
|
| services.athens.storage.minio.key | Access key id for the minio storage backend.
|
| services.kanidm.server.settings.tls_key | TLS key in pem format.
|
| services.documize.key | The key.pem file used for https.
|
| security.acme.defaults.keyType | Key type to use for private keys
|
| programs.tmux.keyMode | VI or Emacs style shortcuts.
|
| services.warpgate.settings.postgres.key | Path to PostgreSQL listener private key.
|
| services.flannel.etcd.keyFile | Etcd key file
|
| services.sourcehut.settings.mail.pgp-privkey | An absolute file path (which should be outside the Nix-store)
to an OpenPGP private key
|
| services.nebula.networks.<name>.key | Path or reference to the host key.
|
| services.mycelium.keyFile | Optional path to a file containing the mycelium key material
|
| services.gitolite.adminPubkey | Initial administrative public key for Gitolite
|
| boot.initrd.luks.devices.<name>.yubikey.keyLength | Length of the LUKS slot key derived with PBKDF2 in byte.
|
| services.sourcehut.settings."sr.ht".service-key | An absolute file path (which should be outside the Nix-store)
to a key used for encrypting session cookies
|
| services.thanos.query-frontend.grpc-server-tls-key | TLS Key for the gRPC server, leave blank to disable TLS
|
| services.sourcehut.settings.mail.pgp-key-id | OpenPGP key identifier.
|
| services.prosody.virtualHosts.<name>.ssl.key | Path to the key file.
|
| services.bacula-sd.director.<name>.tls.key | The path of a PEM encoded TLS private key
|
| services.bacula-fd.director.<name>.tls.key | The path of a PEM encoded TLS private key
|
| services.grafana.settings.server.cert_key | Path to the certificate key file (if protocol is set to https or h2).
|
| services.lasuite-meet.livekit.keyFile | LiveKit key file holding one or multiple application secrets
|
| boot.initrd.luks.devices.<name>.keyFile | The name of the file (can be a raw device or a partition) that
should be used as the decryption key for the encrypted device
|
| services.sourcehut.settings."sr.ht".network-key | An absolute file path (which should be outside the Nix-store)
to a secret key to encrypt internal messages with
|
| services.kmonad.keyboards.<name>.defcfg.compose.key | The (optional) compose key to use.
|
| services.syncthing.key | Path to the key.pem file, which will be copied into Syncthing's
configDir.
|
| services.infinoted.keyFile | Private key to use for TLS
|
| services.sourcehut.settings.webhooks.private-key | An absolute file path (which should be outside the Nix-store)
to a base64-encoded Ed25519 key for signing webhook payloads
|
| services.thanos.query.grpc-client-tls-key | TLS Key for the client's certificate
|
| services.tarsnap.keyfile | The keyfile which associates this machine with your tarsnap
account
|
| services.misskey.settings.meilisearch.apiKey | The Meilisearch API key.
|
| nix.sshServe.keys | A list of SSH public keys allowed to access the binary cache via SSH.
|
| services.gitlab.registry.keyFile | Path to GitLab container registry certificate-key.
|
| services.coturn.pkey | Private key file in PEM format.
|
| services.foundationdb.tls.key | Private key file for the certificate.
|
| services.movim.h2o.tls.identity.*.key-file | Path to key file
|
| security.agnos.generateKeys.keySize | Key size in bits to use when generating new keys.
|
| services.cfdyndns.apikeyFile | The path to a file containing the API Key
used to authenticate with CloudFlare.
|
| services.keyd.enable | Whether to enable keyd, a key remapping daemon.
|
| programs.ssh.knownHosts.<name>.publicKey | The public key data for the host
|
| services.zeyple.keys | List of public key files that will be imported by gpg.
|
| services.nsd.zones.<name>.dnssecPolicy.ksk.keySize | Key size in bits
|
| services.nsd.zones.<name>.dnssecPolicy.zsk.keySize | Key size in bits
|
| boot.loader.systemd-boot.sortKey | The sort key used for the NixOS bootloader entries
|
| services.dkimproxy-out.keySize | Size of the RSA key to use to sign outgoing emails
|
| services.misskey.meilisearch.keyFile | The path to a file containing the Meilisearch API key
|
| services.crowdsec-firewall-bouncer.settings.api_key | API key to authenticate with a local crowdsec API
|
| services.nextcloud-spreed-signaling.settings.https.key | Path to the private key used for the HTTPS listener
|
| services.prometheus.exporters.pve.server.keyFile | Path to a SSL private key file for the server
|
| services.stash.settings.stash_boxes.*.apikey | Stash Box API key
|
| services.h2o.hosts.<name>.tls.identity.*.key-file | Path to key file
|
| nix.settings.trusted-public-keys | List of public keys used to sign binary caches
|
| services.sourcehut.settings.objects.s3-access-key | Access key to the S3-compatible object storage service
|
| services.komodo-periphery.ssl.keyFile | Path to SSL key file.
|
| services.schleuder.settings.keyserver | Key server from which to fetch and update keys
|
| services.keycloak.settings | Configuration options corresponding to parameters set in
conf/keycloak.conf
|
| services.reposilite.settings.keyPath | Path to the .jsk KeyStore or paths to the PKCS#8 certificate and private key, separated by a space (see example)
|
| services.sourcehut.settings.objects.s3-secret-key | An absolute file path (which should be outside the Nix-store)
to the secret key of the S3-compatible object storage service.
|
| services.kubernetes.kubelet.taints.<name>.key | Key of taint.
|
| services.bcg.mqtt.keyfile | Key file for MQTT server access.
|
| services.tarsnap.archives.<name>.keyfile | Set a specific keyfile for this archive
|
| services.invoiceplane.sites.<name>.cron.key | Cron key taken from the administration page.
|
| services.knot.keyFiles | A list of files containing additional configuration
to be included using the include directive
|
| programs.ssh.pubkeyAcceptedKeyTypes | Specifies the key lib.types that will be used for public key authentication.
|
| services.nix-serve.secretKeyFile | The path to the file used for signing derivation data
|
| services.openssh.knownHosts.<name>.publicKey | The public key data for the host
|
| services.tmate-ssh-server.keysDir | Directory containing ssh keys, defaulting to auto-generation
|
| services.dolibarr.h2o.tls.identity.*.key-file | Path to key file
|
| services.ncdns.dnssec.keys.public | Path to the file containing the KSK public key
|
| services.oink.settings.apiKey | API key to use when modifying DNS records.
|
| services.kanidm.serverSettings.tls_key | TLS key in pem format.
|
| services.sourcehut.settings."meta.sr.ht::billing".stripe-public-key | Public key for Stripe
|
| services.oauth2-proxy.keyFile | oauth2-proxy allows passing sensitive configuration via environment variables
|
| services.lk-jwt-service.keyFile | Path to a file containing the credential mapping (<keyname>: <secret>) to access LiveKit
|
| services.ncdns.dnssec.keys.zonePublic | Path to the file containing the ZSK public key
|
| services.opendkim.keyPath | The path that opendkim should put its generated private keys into
|
| security.tpm2.fapi.ekCertLess | A switch to disable Endorsement Key (EK) certificate verification
|
| services.sourcehut.settings."meta.sr.ht::billing".stripe-secret-key | An absolute file path (which should be outside the Nix-store)
to a secret key for Stripe
|
| services.nextcloud-spreed-signaling.settings.turn.apikeyFile | The path to the file containing the value for turn.apikey
|
| services.grafana.settings.smtp.key_file | File path to a key file.
|
| services.nextcloud.config.objectstore.s3.key | The access key for the S3 bucket.
|
| services.nsd.keys | Define your TSIG keys here.
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.key | Path to certificate private key (PEM with private key)
|
| services.nsd.zones.<name>.notify | This primary server will notify all given secondary servers about
zone changes
|
| services.keyd.keyboards.<name>.settings | Configuration, except ids section, that is written to /etc/keyd/.conf
|
| services.sourcehut.settings.mail.pgp-pubkey | OpenPGP public key.
|
| services.ghostunnel.servers.<name>.keystore | Path to keystore (combined PEM with cert/key, or PKCS12 keystore)
|
| services.spiped.config.<name>.keyfile | Name of a file containing the spiped key
|
| swapDevices.*.randomEncryption.keySize | Set the encryption key size for the plain device
|
| services.keyd.keyboards | Configuration for one or more device IDs
|
| services.keyd.keyboards.<name>.ids | Device identifiers, as shown by keyd(1).
|
| boot.initrd.luks.devices.<name>.keyFileTimeout | The amount of time in seconds for a keyFile to appear before
timing out and trying passwords.
|
| services.prometheus.exporters.unbound.unbound.key | Path to the Unbound control socket key.
|
| services.maddy.tls.certificates.*.keyPath | Path to the private key used for TLS.
|
| hardware.openrazer.keyStatistics | Collects number of keypresses per hour per key used to
generate a heatmap.
|
| services.misskey.settings.db.db | The database name.
|
| services.misskey.settings.db | Database settings.
|
| programs.yazi.settings.keymap | Configuration included in keymap.toml
|
| services.warpgate.settings.http.sni_certificates.*.key | Path to private key.
|
| services.lokinet.settings.network.keyfile | The private key to persist address with
|
| services.ncdns.dnssec.keys.private | Path to the file containing the KSK private key.
|
| services.sabnzbd.settings.misc.https_key | Path to the TLS key for the web UI
|
| security.pam.u2f.settings | Options to pass to the PAM module
|
| services.dendrite.settings.global.private_key | The path to the signing private key file, used to sign
requests and events.
nix-shell -p dendrite --command "generate-keys --private-key matrix_key.pem"
|
| services.nsd.keys.<name>.algorithm | Authentication algorithm for this key.
|
| virtualisation.podman.networkSocket.tls.key | Path to the private key corresponding to the server certificate
|
| services.misskey.settings.db.port | The PostgreSQL port.
|
| services.misskey.settings.db.host | The PostgreSQL host.
|
| services.wgautomesh.settings.peers.*.pubkey | Wireguard public key of this peer.
|
| services.sharkey.settings.id | The ID generation method for Sharkey to use
|
| services.misskey.settings | Configuration for Misskey, see
example.yml
for all supported options.
|
| services.misskey.settings.id | The ID generation method to use
|
| services.reposilite.settings.keyPassword | Plaintext password used to unlock the Java KeyStore set in services.reposilite.settings.keyPath
|
| services.misskey.settings.db.user | The user used for database authentication.
|
| services.misskey.settings.db.pass | The password used for database authentication.
|
| services.oink.apiKeyFile | Path to a file containing the API key to use when modifying DNS records.
|
| services.pgbackrest.repos.<name>.sftp-private-key-file | SFTP private key file
|
| services.misskey.settings.port | The port your Misskey server should listen on.
|
| services.sharkey.settings.port | The port that Sharkey will listen on.
|
| services.ncdns.dnssec.keys.zonePrivate | Path to the file containing the ZSK private key.
|
| services.sharkey.settings | Configuration options for Sharkey
|
| users.users.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| services.sharkey.settings.url | The full URL that the Sharkey instance will be publically accessible on
|
| security.pam.rssh.settings | Options to pass to the pam_rssh module
|
| services.kubernetes.kubeconfig.keyFile | Default kubeconfig client key file used to connect to kube-apiserver.
|
| services.misskey.settings.db.extra | Extra connection options.
|
| programs.ssh.knownHosts.<name>.publicKeyFile | The path to the public key file for the host
|
| services.omnom.settings.activitypub.pubkey | ActivityPub public key
|
| services.misskey.settings.redis | ioredis options
|
| services.umurmur.settings.private_key | Path to your SSL key
|
| services.toxBootstrapd.keysFile | Node key file.
|
| services.misskey.settings.redis.host | The Redis host.
|
| services.misskey.settings.redis.port | The Redis port.
|
| services.misskey.settings.url | The final user-facing URL
|
| services.tox-node.keysFile | Path to the file where DHT keys are stored.
|
| users.extraUsers.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| services.kubernetes.proxy.kubeconfig.keyFile | Kubernetes proxy client key file used to connect to kube-apiserver.
|
| services.lasuite-docs.secretKeyPath | Path to the Django secret key
|
| services.lasuite-meet.secretKeyPath | Path to the Django secret key
|
| services.meilisearch.masterKeyFile | Path to file which contains the master key
|
| services.omnom.settings.activitypub.privkey | ActivityPub private key
|
| services.headscale.settings.derp.server.private_key_path | Path to derp private key file, generated automatically if it does not exist.
|
| services.warpgate.settings.ssh.keys | Path to store SSH host & client keys.
|
| services.hockeypuck.enable | Whether to enable Hockeypuck OpenPGP Key Server.
|
| services.misskey.settings.socket | The UNIX socket your Misskey server should listen on.
|
| services.resilio.apiKey | API key, which enables the developer API.
|
| services.sharkey.settings.socket | If specified, creates a UNIX socket at the given path that Sharkey listens on.
|
| services.rosenpass.settings.public_key | Path to a file containing the public key of the local Rosenpass peer
|
| services.rosenpass.settings.secret_key | Path to a file containing the secret key of the local Rosenpass peer
|
| services.dawarich.secretKeyBaseFile | Path to file containing the secret key base
|
| services.kubernetes.kubelet.kubeconfig.keyFile | Kubelet client key file used to connect to kube-apiserver.
|
| services.keycloak.settings.http-host | On which address Keycloak should accept new connections.
|
| services.keycloak.settings.http-port | On which port Keycloak should listen for new HTTP connections.
|
| services.sharkey.settings.address | The address that Sharkey binds to.
|
| services.rosenpass.settings.peers.*.public_key | Path to a file containing the public key of the remote Rosenpass peer.
|
| hardware.keyboard.qmk.keychronSupport | Whether to enable udev rules for keychron QMK based keyboards.
|
| services.openssh.knownHosts.<name>.publicKeyFile | The path to the public key file for the host
|
| services.keyd.package | The keyd package to use.
|
| swapDevices.*.encrypted.keyFile | Path to a keyfile used to unlock the backing encrypted
device
|
| security.agnos.settings.accounts.*.private_key_path | Path of the PEM-encoded private key for this account
|
| services.keycloak.settings.https-port | On which port Keycloak should listen for new HTTPS connections.
|
| services.nsd.zones.<name>.allowNotify | Listed primary servers are allowed to notify this secondary server
|
| services.misskey.settings.chmodSocket | The file access mode of the UNIX socket.
|
| services.misskey.settings.redisForJobQueue.port | The Redis port.
|
| services.misskey.settings.redisForJobQueue.host | The Redis host.
|
| services.docuseal.secretKeyBaseFile | Path to file containing the secret key base
|
| services.misskey.settings.redisForJobQueue | ioredis options for the job queue
|
| services.misskey.settings.redisForPubsub.port | The Redis port.
|
| services.misskey.settings.redisForPubsub.host | The Redis host.
|
| fileSystems.<name>.encrypted.keyFile | Path to a keyfile used to unlock the backing encrypted
device
|
| services.keyd.keyboards.<name>.extraConfig | Extra configuration that is appended to the end of the file.
Do not write ids section here, use a separate option for it
|
| services.misskey.settings.redisForPubsub | ioredis options for pubsub
|
| services.headscale.settings.tls_key_path | Path to key for already created certificate.
|
| services.misskey.settings.db.disableCache | Whether to disable caching queries.
|
| services.sharkey.setupMeilisearch | Whether to automatically set up a local Meilisearch instance and configure Sharkey to use it
|
| services.journald.upload.settings.Upload.ServerKeyFile | SSL key in PEM format
|
| security.duosec.secretKeyFile | A file containing your secret key
|
| services.grafana.settings.security.secret_key | Secret key used for signing
|
| services.kubernetes.scheduler.kubeconfig.keyFile | Kubernetes scheduler client key file used to connect to kube-apiserver.
|
| services.minio.accessKey | Access key of 5 to 20 characters in length that clients use to access the server
|
| services.wg-access-server.secretsFile | yaml file containing all secrets. this needs to be in the same structure as the configuration
|
| services.neo4j.ssl.policies.<name>.privateKey | The name of private PKCS #8 key file for this policy to be found
in the baseDirectory, or the absolute path to
the key file
|
| services.minio.secretKey | Specify the Secret key of 8 to 40 characters in length that clients use to access the server
|
| services.i2pd.proto.httpProxy.keys | File to persist HTTPPROXY keys.
|
| services.dendrite.tlsKey | The path to the TLS key.
nix-shell -p dendrite --command "generate-keys --tls-cert server.crt --tls-key server.key"
|
| services.mastodon.secretKeyBaseFile | Path to file containing the secret key base
|
| services.reposilite.keyPasswordFile | Path the the file containing the password used to unlock the Java KeyStore file specified in services.reposilite.settings.keyPath
|
| services.firefly-iii.settings.APP_KEY_FILE | The path to your appkey
|
| services.tt-rss.feedCryptKey | Key used for encryption of passwords for password-protected feeds
in the database
|
| services.misskey.enable | Whether to enable misskey.
|
| services.zitadel.masterKeyFile | Path to a file containing a master encryption key for ZITADEL
|
| services.nsd.zones.<name>.dnssecPolicy.ksk | Key policy for key signing keys
|
| services.tor.relay.onionServices.<name>.secretKey | Secret key of the onion service
|
| networking.networkmanager.ensureProfiles.secrets.entries.*.key | key in the setting section for which this entry provides a value
|
| services.keybase.enable | Whether to start the Keybase service.
|
| services.i2pd.proto.socksProxy.keys | File to persist SOCKSPROXY keys.
|
| services.matrix-synapse.settings.macaroon_secret_key | Secret key for authentication tokens
|
| hardware.onlykey.enable | Enable OnlyKey device (https://crp.to/p/) support.
|
| services.logkeys.enable | Whether to enable logkeys, a keylogger service.
|
| services.sharkey.enable | Whether to enable Sharkey, a Sharkish microblogging platform.
|
| services.keycloak.settings.hostname | The hostname part of the public URL used as base for
all frontend requests
|
| services.misskey.reverseProxy.webserver.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.datadog-agent.apiKeyFile | Path to a file containing the Datadog API key to associate the
agent with your account.
|
| services.misskey.reverseProxy.webserver.nginx.serverName | Name of this virtual host
|
| services.dkimproxy-out.selector | The selector to use for DKIM key identification
|
| services.quorum.nodekeyFile | Path to the nodekey.
|
| services.misskey.reverseProxy.webserver | The webserver to use as the reverse proxy.
|
| nix.buildMachines.*.sshKey | The path to the SSH private key with which to authenticate on
the build machine
|
| services.i2pd.inTunnels.<name>.keys | Keyset used for tunnel identity.
|
| security.tpm2.fapi.ekFingerprint | The fingerprint of the endorsement key
|
| services.pgpkeyserver-lite.hkpPort | Which port the sks-keyserver is listening on.
|
| services.evremap.settings.dual_role | List of dual-role remappings that output different key sequences based on whether the
input key is held or tapped.
|
| services.longview.apiKey | Longview API key
|
| services.sharkey.package | The sharkey package to use.
|
| services.misskey.package | The misskey package to use.
|
| services.i2pd.outTunnels.<name>.keys | Keyset used for tunnel identity.
|
| services.bookstack.settings.APP_KEY_FILE | The path to your appkey
|
| services.keycloak.sslCertificateKey | The path to a PEM formatted private key to use for TLS/SSL
connections.
|
| services.sharkey.settings.mediaDirectory | Path to the folder where Sharkey stores uploaded media such as images and attachments.
|
| services.kubernetes.controllerManager.kubeconfig.keyFile | Kubernetes controller manager client key file used to connect to kube-apiserver.
|
| services.misskey.settings.redisForTimelines.port | The Redis port.
|
| services.misskey.settings.redisForTimelines.host | The Redis host.
|
| services.outline.utilsSecretFile | File path that contains the utility secret key
|
| services.kmonad.keyboards.<name>.defcfg.compose.delay | The delay (in milliseconds) between compose key sequences.
|
| services.mastodon.vapidPrivateKeyFile | Path to file containing the private key used for Web Push
Voluntary Application Server Identification
|
| services.outline.secretKeyFile | File path that contains the application secret key
|
| services.logkeys.device | Use the given device as keyboard input event device instead of /dev/input/eventX default.
|
| services.go-camo.sslKey | Path to TLS private key.
|
| services.misskey.settings.redisForTimelines | ioredis options for timelines
|
| services.dendrite.settings.key_server.database.connection_string | Database for the Key Server (for end-to-end encryption).
|
| services.cfssl.metadata | Metadata file for root certificate presence
|
| services.evremap.settings.dual_role.*.tap | The key sequence that should be output when the input key is tapped
|
| services.longview.apiKeyFile | A file containing the Longview API key
|
| services.sharkey.setupRedis | Whether to automatically set up a local Redis cache and configure Sharkey to use it.
|
| hardware.nitrokey.enable | Enables udev rules for Nitrokey devices.
|
| services.misskey.reverseProxy.webserver.nginx.root | The path of the web root directory.
|
| services.hockeypuck.settings | Configuration file for hockeypuck, here you can override
certain settings (loglevel and
openpgp.db.dsn) by just setting those values
|
| users.users.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| services.kubernetes.apiserver.serviceAccountKeyFile | File containing PEM-encoded x509 RSA or ECDSA private or public keys,
used to verify ServiceAccount tokens
|
| services.evremap.settings.dual_role.*.hold | The key sequence that should be output when the input key is held
|
| services.coder.tlsKey | The path to the TLS key.
|
| nix.settings | Configuration for Nix, see
https://nixos.org/manual/nix/stable/command-ref/conf-file.html or
nix.conf(5) for available options
|
| services.misskey.reverseProxy.webserver.caddy | Extra configuration for the caddy virtual host of Misskey
|
| services.misskey.reverseProxy.webserver.nginx | Extra configuration for the nginx virtual host of Misskey
|
| services.keycloak.enable | Whether to enable the Keycloak identity and access management
server.
|
| services.kubernetes.apiserver.serviceAccountSigningKeyFile | Path to the file that contains the current private key of the service
account token issuer
|
| boot.initrd.luks.devices.<name>.yubikey.slot | Which slot on the YubiKey to challenge.
|
| services.meilisearch.masterKeyEnvironmentFile | Path to file which contains the master key
|
| services.misskey.reverseProxy.webserver.caddy.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.misskey.reverseProxy.webserver.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.pgpkeyserver-lite.enable | Whether to enable pgpkeyserver-lite on a nginx vHost proxying to a gpg keyserver.
|
| services.misskey.reverseProxy.webserver.caddy.hostName | Canonical hostname for the server.
|
| services.misskey.settings.meilisearch.ssl | Whether to connect via SSL.
|
| boot.initrd.luks.yubikeySupport | Enables support for authenticating with a YubiKey on LUKS devices
|
| services.misskey.settings.meilisearch | Meilisearch connection options.
|
| services.mqtt2influxdb.mqtt.keyfile | Key file for MQTT
|
| hardware.keyboard.qmk.enable | Whether to enable non-root access to the firmware of QMK keyboards.
|
| services.misskey.settings.meilisearch.host | The Meilisearch host.
|
| services.misskey.settings.meilisearch.port | The Meilisearch port.
|
| services.sympa.settings | The sympa.conf configuration file as key value set
|
| services.xserver.xkb.extraLayouts.<name>.keycodesFile | The path to the xkb keycodes file
|
| services.misskey.reverseProxy.webserver.nginx.quic | Whether to enable the QUIC transport protocol
|
| services.kubernetes.apiserver.tlsKeyFile | Kubernetes apiserver private key file.
|
| services.nextcloud-spreed-signaling.settings.sessions.blockkeyFile | The path to the file containing the value for sessions.blockkey
|
| services.pgpkeyserver-lite.package | The pgpkeyserver-lite package to use.
|
| services.keycloak.package | The keycloak package to use.
|
| services.misskey.reverseProxy.webserver.nginx.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services.actkbd.bindings.*.keys | List of keycodes to match.
|
| users.extraUsers.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| services.mackerel-agent.apiKeyFile | Path to file containing the Mackerel API key
|
| services.cfssl.caKey | CA private key -- accepts '[file:]fname' or 'env:varname'.
|
| services.misskey.settings.meilisearch.scope | The search scope.
|
| hardware.keyboard.teck.enable | Whether to enable non-root access to the firmware of TECK keyboards.
|
| services.misskey.reverseProxy.webserver.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.misskey.reverseProxy.webserver.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.misskey.settings.meilisearch.index | Meilisearch index to use.
|
| services.grafana.settings.database.client_key_path | The path to the client key
|
| services.kmonad.keyboards | Keyboard configuration.
|
| services.kanata.keyboards | Keyboard configurations.
|
| services.triggerhappy.bindings.*.keys | List of keys to match
|
| boot.initrd.luks.devices.<name>.yubikey | The options to use for this LUKS device in YubiKey-PBA
|
| services.misskey.reverseProxy.webserver.nginx.kTLS | Whether to enable kTLS support
|
| services.pgpkeyserver-lite.hkpAddress | Which IP address the sks-keyserver is listening on.
|
| services.yubikey-agent.package | The yubikey-agent package to use.
|
| services.misskey.reverseProxy.webserver.nginx.listen.*.ssl | Enable SSL.
|
| networking.wg-quick.interfaces.<name>.peers.*.presharedKey | Base64 preshared key generated by wg genpsk
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.keystore | Path to keystore (combined PEM with cert/key, or PKCS12 keystore)
|
| services.keycloak.settings.http-relative-path | The path relative to / for serving
resources.
In versions of Keycloak using Wildfly (<17),
this defaulted to /auth
|
| services.cfssl.tlsKey | Other endpoint's CA private key
|
| services.yggdrasil.settings.PrivateKeyPath | Path to the private key file on the host system
|
| services.actkbd.enable | Whether to enable the actkbd key mapping daemon
|
| services.misskey.reverseProxy.webserver.nginx.listen.*.addr | Listen address.
|
| services.hockeypuck.port | HKP port to listen on.
|
| services.murmur.sslKey | Path to your SSL key.
|
| services.misskey.reverseProxy.webserver.nginx.basicAuth | Basic Auth protection for a vhost
|
| services.oncall.secretFile | A YAML file containing secrets such as database or user passwords
|
| services.xrdp.sslKey | ssl private key path
A self-signed certificate will be generated if file not exists.
|
| services.misskey.reverseProxy.webserver.nginx.default | Makes this vhost the default.
|
| services.mympd.settings | Manages the configuration files declaratively
|
| services.matrix-synapse.settings.signing_key_path | Path to the signing key to sign messages with.
|
| services.misskey.reverseProxy.webserver.caddy.logFormat | Configuration for HTTP request logging (also known as access logs)
|
| services.pgpkeyserver-lite.hostname | Which hostname to set the vHost to that is proxying to sks.
|
| services.nntp-proxy.sslKey | Proxy ssl key path
|
| services.fwupd.extraTrustedKeys | Installing a public key allows firmware signed with a matching private key to be recognized as trusted, which may require less authentication to install than for untrusted files
|
| services.weblate.djangoSecretKeyFile | Location of the Django secret key
|
| services.crowdsec-firewall-bouncer.secrets.apiKeyPath | Path to the API key to authenticate with a local CrowdSec API
|
| services.misskey.reverseProxy.webserver.nginx.extraConfig | These lines go to the end of the vhost verbatim.
|
| programs.ssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| services.misskey.reverseProxy.webserver.nginx.listen.*.port | Port number to listen on
|
| services.etcd.peerKeyFile | Key file to use for peer to peer communication
|
| services.keycloak.plugins | Keycloak plugin jar, ear files or derivations containing
them
|
| services.misskey.reverseProxy.webserver.nginx.enableACME | Whether to ask Let's Encrypt to sign a certificate for this vhost
|
| programs.yubikey-manager.enable | Whether to enable yubikey-manager.
|
| services.nginx.proxyCachePath.<name>.keysZoneName | Set name to shared memory zone.
|
| services.nginx.proxyCachePath.<name>.keysZoneSize | Set size to shared memory zone.
|
| services.headscale.settings.noise.private_key_path | Path to noise private key file, generated automatically if it does not exist.
|
| services.synergy.server.tls.enable | Whether TLS encryption should be used
|
| services.sharkey.openFirewall | Whether to open ports in the NixOS firewall for Sharkey.
|
| services.misskey.reverseProxy.webserver.caddy.extraConfig | Additional lines of configuration appended to this virtual host in the
automatically generated Caddyfile.
|
| services.misskey.reverseProxy.webserver.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.oink.settings.secretApiKey | Secret API key to use when modifying DNS records.
|
| services.netbird.server.management.settings | Configuration of the netbird management server
|
| services.misskey.reverseProxy.webserver.nginx.listen | Listen addresses and ports for this virtual host
|
| services.misskey.reverseProxy.webserver.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| services.misskey.reverseProxy.ssl | Whether to enable SSL for the reverse proxy
|
| programs.wshowkeys.package | The wshowkeys package to use.
|
| services.misskey.reverseProxy.webserver.caddy.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| services.misskey.reverseProxy.webserver.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| services.misskey.reverseProxy.webserver.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.yubikey-agent.enable | Whether to start yubikey-agent when you log in
|
| services.nsd.zones.<name>.dnssecPolicy.keyttl | TTL for dnssec records
|
| services.gitlab.secrets.jwsFile | A file containing the secret used to encrypt session
keys
|
| services.misskey.reverseProxy.webserver.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.metabase.ssl.keystore | Java KeyStore file containing the certificates.
|
| services.guix.publish.generateKeyPair | Whether to generate signing keys in /etc/guix which are
required to initialize a substitute server
|
| services.zitadel.settings.TLS.KeyPath | Path to the TLS certificate private key.
|
| services.prometheus.remoteWrite.*.sigv4.access_key | The Access Key ID.
|
| services.prometheus.remoteWrite.*.sigv4.secret_key | The Secret Access Key.
|
| services.misskey.reverseProxy.host | The fully qualified domain name to bind to
|
| services.misskey.reverseProxy.webserver.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| boot.initrd.luks.devices.<name>.yubikey.twoFactor | Whether to use a passphrase and a YubiKey (true), or only a YubiKey (false).
|
| services.keycloak.database.type | The type of database Keycloak should connect to.
|
| services.rauc.slots | RAUC slot definitions
|
| services.gnome.gnome-keyring.enable | Whether to enable GNOME Keyring daemon, a service designed to
take care of the user's security credentials,
such as user names and passwords
.
|
| networking.wireless.networks.<name>.pskRaw | Either the raw pre-shared key in hexadecimal format
or the name of the secret (as defined inside
networking.wireless.secretsFile and prefixed
with ext:) containing the network pre-shared key.
Be aware that this will be written to the Nix store
in plaintext! Always use an external reference.
The external secret can be either the plaintext
passphrase or the raw pre-shared key.
Mutually exclusive with psk and auth.
|
| services.kmonad.keyboards.<name>.defcfg.fallthrough | Whether to enable re-emitting unhandled key events.
|
| services.kubernetes.apiserver.proxyClientKeyFile | Key to use for connections to proxy.
|
| services.warpgate.settings.ssh.host_key_verification | Specify host key verification action when connecting to a SSH target with unknown/differing host key.
|
| hardware.keyboard.uhk.enable | Whether to enable non-root access to the firmware of UHK keyboards
|
| services.athens.tlsKeyFile | Path to the TLS key file.
|
| services.ircdHybrid.rsaKey | IRCD server RSA key.
|
| services.vsftpd.rsaKeyFile | RSA private key file.
|
| networking.wireguard.interfaces.<name>.peers.*.presharedKey | Base64 preshared key generated by wg genpsk
|
| services.postfix.sslKey | SSL key to use.
|
| services.misskey.reverseProxy.webserver.nginx.locations | Declarative location config
|
| boot.initrd.luks.devices.<name>.yubikey.saltLength | Length of the new salt in byte (64 is the effective maximum).
|
| programs.yubikey-manager.package | The yubikey-manager package to use.
|
| programs.fzf.keybindings | Whether to enable fzf keybindings.
|
| services.kmonad.keyboards.<name>.name | Keyboard name.
|
| services.matrix-tuwunel.settings.global.trusted_servers | Servers listed here will be used to gather public keys of other servers
(notary trusted key servers)
|
| services.nsd.remoteControl.serverKeyFile | Path to the server private key, which is used by the server
but not by nsd-control
|
| services.keycloak.database.port | Port of the database to connect to.
|
| services.evdevremapkeys.settings | config.yaml for evdevremapkeys
|
| services.journald.remote.settings.Remote.ServerKeyFile | A path to a SSL secret key file in PEM format
|
| services.postgrest.jwtSecretFile | The secret or JSON Web Key (JWK) (or set) used to decode JWT tokens clients provide for authentication
|
| services.printing.cups-pdf.instances.<name>.settings | Settings for a cups-pdf instance, see the descriptions in the template config file in the cups-pdf package
|
| boot.initrd.luks.devices.<name>.yubikey.gracePeriod | Time in seconds to wait for the YubiKey.
|
| services.arsenik.mac | Original key arrangement on your keyboard: Mac or PC.
|
| hardware.keyboard.zsa.enable | Whether to enable udev rules for keyboards from ZSA like the ErgoDox EZ, Planck EZ and Moonlander Mark I
|
| services.sharkey.settings.fulltextSearch.provider | Which provider to use for full text search
|
| services.misskey.redis.passwordFile | The path to a file containing the Redis password
|
| services.logind.powerKey | Specifies what to do when the power key is pressed.
|
| services.xserver.autoRepeatDelay | Sets the autorepeat delay (length of time in milliseconds that a key must be depressed before autorepeat starts).
|
| services.prometheus.exporters.sabnzbd.servers.*.apiKeyFile | The path to a file containing the API key
|
| services.immichframe.settings.Accounts.*.ApiKeyFile | File containing an API key to talk to the Immich server
|
| services.misskey.reverseProxy.enable | Whether to enable a HTTP reverse proxy for Misskey.
|
| services.misskey.reverseProxy.webserver.nginx.reuseport | Create an individual listening socket
|
| programs.wshowkeys.enable | Whether to enable wshowkeys (displays keypresses on screen on supported Wayland
compositors)
|
| services.vault.tlsKeyFile | TLS private key file
|
| services.coturn.dh-file | Use custom DH TLS key, stored in PEM format in the file.
|
| boot.initrd.luks.devices.<name>.yubikey.storage.fsType | The filesystem of the unencrypted device.
|
| programs.skim.keybindings | Whether to enable skim keybindings.
|
| services.keycloak.realmFiles | Realm files that the server is going to import during startup
|
| services.misskey.redis.createLocally | Create and use a local Redis instance
|
| i18n.extraLocaleSettings | A set of additional system-wide locale settings other than LANG
which can be configured with i18n.defaultLocale
|
| services.dysnomia.components | An attribute set in which each key represents a container and each value an attribute set in which each key represents a component and each value a derivation constructing its initial state
|
| services.immichframe.settings.Accounts.*.ApiKey | API key to talk to the Immich server
|
| services.postfix.settings.main | The main.cf configuration file as key value set
|
| services.keycloak.themes | Additional theme packages for Keycloak
|
| services.skydns.etcd.tlsPem | Skydns path of TLS client certificate - public key.
|
| services.skydns.etcd.tlsKey | Skydns path of TLS client certificate - private key.
|
| services.keycloak.database.useSSL | Whether the database connection should be secured by SSL / TLS
|
| nix.sshServe.write | Whether to enable writing to the Nix store as a remote store via SSH
|
| services.misskey.reverseProxy.webserver.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| services.prometheus.remoteRead.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.arsenik.wide | The right hand is moved one key to the right.
|
| boot.initrd.luks.devices.<name>.yubikey.storage.path | Absolute path of the salt on the unencrypted device with
that device's root directory as "/".
|
| services.wastebin.secretFile | Path to file containing sensitive environment variables
|
| services.tlsrpt.fetcher.settings | Flags from tlsrpt-fetcher(1) as key-value pairs.
|
| services.tlsrpt.reportd.settings | Flags from tlsrpt-reportd(1) as key-value pairs.
|
| services.kanata.keyboards.<name>.port | Port to run the TCP server on. null will not run the server.
|
| services.misskey.reverseProxy.webserver.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.pubkeys | List of raw public key candidates to use for
authentication
|
| services.misskey.reverseProxy.webserver.nginx.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| services.kubernetes.apiserver.kubeletClientKeyFile | Key to use for connections to kubelet.
|
| services.skydns.etcd.caCert | Skydns path of TLS certificate authority public key.
|
| services.misskey.reverseProxy.webserver.nginx.locations.<name>.root | Root directory for requests.
|
| services.gitea.camoHmacKeyFile | Path to a file containing the camo HMAC key.
|
| services.openssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| services.prometheus.remoteWrite.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.zitadel.settings.TLS.Key | The TLS certificate private key, as a base64-encoded string
|
| services.gemstash.settings | Configuration for Gemstash
|
| services.unbound.checkconf | Whether to check the resulting config file with unbound checkconf for syntax errors
|
| security.acme.certs.<name>.csrKey | Path to the private key to the matching certificate signing request.
|
| services.misskey.reverseProxy.webserver.nginx.locations.<name>.index | Adds index directive.
|
| services.misskey.reverseProxy.webserver.nginx.listen.*.proxyProtocol | Enable PROXY protocol.
|
| services.misskey.reverseProxy.webserver.nginx.locations.<name>.alias | Alias directory for requests.
|
| services.kmonad.keyboards.<name>.config | Keyboard configuration.
|
| services.misskey.reverseProxy.webserver.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| services.misskey.reverseProxy.webserver.caddy.listenAddresses | A list of host interfaces to bind to for this virtual host.
|
| services.matrix-synapse.settings.trusted_key_servers | The trusted servers to download signing keys from.
|
| services.logind.rebootKey | Specifies what to do when the reboot key is pressed.
|
| services.searx.settingsFile | The path of the Searx server settings.yml file
|
| services.netbox.keycloakClientSecret | File that contains the keycloak client secret.
|
| services.sks.enable | Whether to enable SKS (synchronizing key server for OpenPGP) and start the database
server
|
| services.misskey.reverseProxy.webserver.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| services.kmonad.keyboards.<name>.device | Path to the keyboard's device file.
|
| programs.yubikey-touch-detector.enable | Whether to enable yubikey-touch-detector.
|
| services.dnsdist.dnscrypt.providerKey | The filepath to the provider secret key
|
| services.ncps.cache.hostName | The hostname of the cache server. This is used to generate the
private key used for signing store paths (.narinfo)
|
| services.misskey.reverseProxy.webserver.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| services.kanata.keyboards.<name>.extraArgs | Extra command line arguments passed to kanata.
|
| networking.wg-quick.interfaces.<name>.peers.*.presharedKeyFile | File pointing to preshared key as generated by wg genpsk
|
| services.misskey.reverseProxy.webserver.nginx.listenAddresses | Listen addresses for this virtual host
|
| services.unclutter.keystroke | Wait for a keystroke before hiding the cursor
|
| services.tlsrpt.collectd.settings | Flags from tlsrpt-collectd(1) as key-value pairs.
|
| services.evremap.settings.remap.*.input | The key sequence that should be remapped
|
| services.sympa.domains.<name>.settings | The robot.conf configuration file as key value set
|
| services.prometheus.scrapeConfigs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.keycloak.database.name | Database name to use when connecting to an external or
manually provisioned database; has no effect when a local
database is automatically provisioned
|
| services.misskey.reverseProxy.webserver.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| services.misskey.reverseProxy.webserver.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| services.buildkite-agents.<name>.privateSshKeyPath | OpenSSH private key
A run-time path to the key file, which is supposed to be provisioned
outside of Nix store.
|
| services.uptermd.hostKey | Path to SSH host key
|
| services.misskey.reverseProxy.webserver.nginx.sslCertificate | Path to server SSL certificate.
|
| services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".secret_key_base | Secret key used as a base to generate further secrets for encrypting and
signing data
|
| services.keycloak.database.host | Hostname of the database to connect to
|
| services.wstunnel.servers.<name>.tlsKey | TLS key to use instead of the hardcoded on in case of HTTPS connections
|
| services.misskey.reverseProxy.webserver.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| services.syncoid.sshKey | SSH private key file to use to login to the remote system
|
| programs.yubikey-touch-detector.verbose | Enables verbose logging
|
| services.canaille.settings.SECRET_KEY | Flask Secret Key
|
| services.self-deploy.sshKeyFile | Path to SSH private key used to fetch private repositories over
SSH.
|
| services.postfix.settings.master.<name>.name | The name of the service to run
|
| security.agnos.settings.accounts.*.certificates.*.key_output_file | Output path for the certificate private key
|
| services.zammad.database.settings | The database.yml configuration file as key value set
|
| services.keycloak.database.caCert | The SSL / TLS CA certificate that verifies the identity of the
database server
|
| services.nghttpx.tls | TLS certificate and key paths
|
| programs.tmux.shortcut | Ctrl following by this key is used as the main shortcut.
|
| services.kanata.keyboards.<name>.config | Configuration other than defcfg
|
| services.misskey.reverseProxy.webserver.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| security.pam.rssh.settings.auth_key_file | Path to file with trusted public keys in OpenSSH's authorized_keys format
|
| services.oink.secretApiKeyFile | Path to a file containing the secret API key to use when modifying DNS records.
|
| boot.initrd.luks.devices.<name>.yubikey.storage.device | An unencrypted device that will temporarily be mounted in stage-1
|
| services.matrix-synapse.settings.trusted_key_servers.*.server_name | Hostname of the trusted server.
|
| services.postfix.config | The main.cf configuration file as key value set.
|
| services.netbox.secretKeyFile | Path to a file containing the secret key.
|
| services.logind.suspendKey | Specifies what to do when the suspend key is pressed.
|
| services.munge.password | The path to a daemon's secret key.
|
| virtualisation.fileSystems.<name>.encrypted.keyFile | Path to a keyfile used to unlock the backing encrypted
device
|
| services.wastebin.settings.RUST_LOG | Influences logging
|
| services.misskey.database.passwordFile | The path to a file containing the database password
|
| services.gitea.captcha.siteKey | CAPTCHA site key to use for Gitea.
|
| services.sharkey.setupPostgresql | Whether to automatically set up a local PostgreSQL database and configure Sharkey to use it.
|
| services.flannel.etcd.prefix | Etcd key prefix
|
| services.misskey.reverseProxy.webserver.nginx.listen.*.extraParameters | Extra parameters of this listen directive.
|
| services.matrix-continuwuity.settings.global.trusted_servers | Servers listed here will be used to gather public keys of other servers
(notary trusted key servers)
|
| services.arsenik.enable | Whether to enable A 33-key layout that works with all keyboards..
|
| programs.yubikey-touch-detector.unixSocket | If set to true, yubikey-touch-detector will send notifications to a unix socket
|
| services.druid.commonConfig | (key=value) Configuration to be written to common.runtime.properties
|
| services.misskey.reverseProxy.webserver.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| services.evremap.settings.remap.*.output | The key sequence that should be output when the input sequence is entered
|
| boot.initrd.luks.devices.<name>.yubikey.iterationStep | How much the iteration count for PBKDF2 is increased at each successful authentication.
|
| services.strongswan-swanctl.swanctl.secrets.rsa | Private key decryption passphrase for a key in the rsa
folder.
|
| services.mpd.settings | Configuration for MPD
|
| services.gitea.minioAccessKeyId | Path to a file containing the Minio access key id.
|
| services.rosenpass.settings.peers.*.peer | WireGuard public key corresponding to the remote Rosenpass peer.
|
| services.discourse.mail.incoming.apiKeyFile | A file containing the Discourse API key used to add
posts and messages from mail
|
| services.snipe-it.appKeyFile | A file containing the Laravel APP_KEY - a 32 character long,
base64 encoded key used for encryption where needed
|
| services.keycloak.settings.hostname-backchannel-dynamic | Enables dynamic resolving of backchannel URLs,
including hostname, scheme, port and context path
|
| services.misskey.reverseProxy.webserver.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| services.traccar.settings | config.xml configuration as a Nix attribute set
|
| programs.pay-respects.aiIntegration | Whether to enable pay-respects' LLM integration
|
| services.misskey.database.createLocally | Create the PostgreSQL database locally
|
| services.logind.powerKeyLongPress | Specifies what to do when the power key is long-pressed.
|
| programs.tsmClient.servers | Server definitions ("stanzas")
for the client system-options file
|
| services.matrix-synapse.settings.tls_private_key_path | PEM encoded private key for TLS
|
| services.komodo-periphery.passkeys | Passkeys required to access the periphery API
|
| services.dovecot2.sslCACert | Path to the server's CA certificate key.
|
| services.nextcloud-spreed-signaling.settings.sessions.hashkeyFile | The path to the file containing the value for sessions.hashkey
|
| services.kanata.keyboards.<name>.devices | Paths to keyboard devices
|
| services.strongswan-swanctl.swanctl.secrets.ecdsa | Private key decryption passphrase for a key in the
ecdsa folder.
|
| services.strongswan-swanctl.swanctl.secrets.pkcs8 | Private key decryption passphrase for a key in the
pkcs8 folder.
|
| services.druid.broker.config | (key=value) Configuration to be written to runtime.properties of the druid Druid Broker
https://druid.apache.org/docs/latest/configuration/index.html
|
| services.druid.router.config | (key=value) Configuration to be written to runtime.properties of the druid Druid Router
https://druid.apache.org/docs/latest/configuration/index.html
|
| services.kanata.keyboards.<name>.extraDefCfg | Configuration of defcfg other than linux-dev (generated
from the devices option) and
linux-continue-if-no-devs-found (hardcoded to be yes)
|
| services.movim.h2o.tls.identity | Key / certificate pairs for the virtual host.
|
| services.cjdns.enable | Whether to enable the cjdns network encryption
and routing engine
|
| networking.wireguard.interfaces.<name>.peers.*.presharedKeyFile | File pointing to preshared key as generated by wg genpsk
|
| services.misskey.reverseProxy.webserver.nginx.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| services.btrbk.sshAccess.*.roles | What actions can be performed with this SSH key
|
| services.dsnet.settings | The settings to use for dsnet
|
| services.misskey.reverseProxy.webserver.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| programs.ssh.startAgent | Whether to start the OpenSSH agent when you log in
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.auth | Authentication to expect from remote
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.esp_proposals | ESP proposals to offer for the CHILD_SA
|
| services.ncps.cache.secretKeyPath | The path to load the secretKey for signing narinfos
|
| services.kmonad.keyboards.<name>.defcfg.enable | Whether to enable automatic generation of the defcfg block
|
| services.filebeat.settings | Configuration for filebeat
|
| programs.tsmClient.dsmSysText | This configuration key contains the effective text
of the client system-options file "dsm.sys"
|
| services.xserver.xkb.extraLayouts.<name>.typesFile | The path to the xkb types file
|
| services.mastodon.vapidPublicKeyFile | Path to file containing the public key used for Web Push
Voluntary Application Server Identification
|
| services.keycloak.sslCertificate | The path to a PEM formatted certificate to use for TLS/SSL
connections.
|
| services.outline.sslKeyFile | File path that contains the Base64-encoded private key for HTTPS
termination
|
| networking.wg-quick.interfaces.<name>.privateKey | Base64 private key generated by wg genkey
|
| image.repart.partitions | Specify partitions as a set of the names of the partitions with their
configuration as the key.
|
| services.monica.appKeyFile | A file containing the Laravel APP_KEY - a 32 character long,
base64 encoded key used for encryption where needed
|
| boot.initrd.luks.devices.<name>.gpgCard.publicKey | Path to the Public Key.
|
| services.logind.rebootKeyLongPress | Specifies what to do when the reboot key is long-pressed.
|
| services.radicle.publicKey | An SSH public key (as an absolute file path or directly as a string),
usually generated by rad auth.
|
| services.tinc.networks.<name>.hostSettings.<name>.rsaPublicKey | Legacy RSA public key of the host in PEM format, including start and
end markers
|
| services.nsd.zones.<name>.requestXFR | Format: [AXFR|UDP] <ip-address> <key-name | NOKEY>
|
| services.lasuite-docs.settings.DJANGO_SECRET_KEY_FILE | The path to the file containing Django's secret key
|
| services.lasuite-meet.settings.DJANGO_SECRET_KEY_FILE | The path to the file containing Django's secret key
|
| services.strongswan-swanctl.swanctl.secrets.private | Private key decryption passphrase for a key in the
private folder.
|
| services.keycloak.database.createLocally | Whether a database should be automatically created on the
local host
|
| services.harmonia.signKeyPath | DEPRECATED: Use services.harmonia.signKeyPaths instead
|
| services.keycloak.database.username | Username to use when connecting to an external or manually
provisioned database; has no effect when a local database is
automatically provisioned
|
| services.snapserver.streams.<name>.query | Key-value pairs that convey additional parameters about a stream.
|
| services.kanata.keyboards.<name>.configFile | The config file
|
| services.nsd.dnssecInterval | How often to check whether dnssec key rollover is required
|
| services.molly-brown.certPath | Path to TLS certificate
|
| services.keycloak.database.passwordFile | The path to a file containing the database password
|
| services.dragonflydb.keysOutputLimit | Maximum number of returned keys in keys command.
keys is a dangerous command
|
| services.misskey.reverseProxy.webserver.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| services.keycloak.initialAdminPassword | Initial password set for the temporary admin user
|
| services.dendrite.tlsCert | The path to the TLS certificate.
nix-shell -p dendrite --command "generate-keys --tls-cert server.crt --tls-key server.key"
|
| services.h2o.hosts.<name>.tls.identity | Key / certificate pairs for the virtual host.
|
| services.nsd.zones.<name>.dnssecPolicy.zsk | Key policy for zone signing keys
|
| services.gitea.captcha.secretFile | Path to a file containing the CAPTCHA secret key.
|
| services.openssh.hostKeys | NixOS can automatically generate SSH host keys
|
| programs.yubikey-touch-detector.libnotify | If set to true, yubikey-touch-detctor will send notifications using libnotify
|
| users.allowNoPasswordLogin | Disable checking that at least the root user or a user in the wheel group can log in using
a password or an SSH key
|
| services.dovecot2.sslServerKey | Path to the server's private key.
|
| services.hostapd.radios.<name>.settings | Extra configuration options to put at the end of global initialization, before defining BSSs
|
| services.sshwifty.sharedKeyFile | Path to a file containing the shared key.
|
| services.evremap.settings.dual_role.*.input | The key that should be remapped
|
| services.iperf3.rsaPrivateKey | Path to the RSA private key (not password-protected) used to decrypt authentication credentials from the client.
|
| hardware.facter.detected.boot.keyboard.kernelModules | List of kernel modules to include in the initrd to support the keyboard.
|
| services.tor.relay.onionServices.<name>.authorizedClients | Authorized clients for a v3 onion service,
as a list of public key, in the format:
descriptor:x25519:<base32-public-key>
See torrc manual.
|
| services.dovecot2.enableDHE | Whether to enable ssl_dh and generation of primes for the key exchange.
|
| services.athens.storage.gcp.jsonKey | Base64 encoded GCP service account key
|
| services.xserver.xkb.extraLayouts.<name>.symbolsFile | The path to the xkb symbols file
|
| services.gitea.minioSecretAccessKey | Path to a file containing the Minio secret access key.
|
| services.sharkey.environmentFiles | List of paths to files containing environment variables for Sharkey to use at runtime
|
| services.prometheus.exporters.opnsense.apiKeyFile | File containing the api key.
|
| services.rustus.storage.s3_access_key_file | File path that contains the S3 access key.
|
| services.rustus.storage.s3_secret_key_file | File path that contains the S3 secret key.
|
| services.logind.suspendKeyLongPress | Specifies what to do when the suspend key is long-pressed.
|
| services.openssh.settings.KexAlgorithms | Allowed key exchange algorithms
Uses the lower bound recommended in both
https://stribika.github.io/2015/01/04/secure-secure-shell.html
and
https://infosec.mozilla.org/guidelines/openssh#modern-openssh-67
|
| services.cfssl.mutualTlsClientKey | Mutual TLS - client key to call remote instance requiring client certs
|
| services.kmonad.keyboards.<name>.extraGroups | Extra permission groups to attach to the KMonad instance for
this keyboard
|
| services.cfssl.responderKey | Private key for OCSP responder certificate
|
| services.dovecot2.sslServerCert | Path to the server's public key.
|
| services.logind.hibernateKey | Specifies what to do when the hibernate key is pressed.
|
| services.sks.extraDbConfig | Set contents of the files "KDB/DB_CONFIG" and "PTree/DB_CONFIG" within
the ${dataDir} directory
|
| services.kmonad.keyboards.<name>.defcfg.allowCommands | Whether to enable keys to run shell commands.
|
| services.headscale.settings.oidc.pkce.enabled | Enable or disable PKCE (Proof Key for Code Exchange) support
|
| programs.ssh.kexAlgorithms | Specifies the available KEX (Key Exchange) algorithms.
|
| services.galene.insecure | Whether Galene should listen in http or in https
|
| services.prometheus.exporters.keylight.port | Port to listen on.
|
| services.outline.storage.accessKey | S3 access key.
|
| services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.auth | Authentication to perform locally.
- The default
pubkey uses public key authentication
using a private key associated to a usable certificate.
psk uses pre-shared key authentication.
- The IKEv1 specific
xauth is used for XAuth or Hybrid
authentication,
- while the IKEv2 specific
eap keyword defines EAP
authentication.
- For
xauth, a specific backend name may be appended,
separated by a dash
|
| services.druid.overlord.config | (key=value) Configuration to be written to runtime.properties of the druid Druid Overlord
https://druid.apache.org/docs/latest/configuration/index.html
|
| services.hercules-ci-agent.settings.labels | A key-value map of user data
|
| services.librespeed.tlsKey | TLS private key to use
|
| services.actkbd.bindings | Key bindings for actkbd
|
| security.pam.ussh.enable | Enables Uber's USSH PAM (pam-ussh) module
|
| boot.initrd.luks.devices.<name>.fido2.gracePeriod | Time in seconds to wait for the FIDO2 key.
|
| services.prometheus.exporters.keylight.user | User name under which the keylight exporter shall be run.
|
| services.froide-govplan.secretKeyFile | Path to a file containing the secret key.
|
| services.athens.storage.s3.secret | Secret key for the S3 storage backend
|
| services.moodle.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| services.nagios.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| services.canaille.settings.CANAILLE_OIDC.JWT.PRIVATE_KEY | JWT private key
|
| services.prometheus.exporters.keylight.group | Group under which the keylight exporter shall be run.
|
| security.dhparams.params.<name>.bits | The bit size for the prime that is used during a Diffie-Hellman
key exchange.
|
| services.misskey.meilisearch.createLocally | Create and use a local Meilisearch instance
|
| networking.wireguard.interfaces.<name>.privateKey | Base64 private key generated by wg genkey
|
| services.ncps.cache.storage.s3.accessKeyIdPath | The path to a file containing only the access-key-id.
|
| services.agorakit.appKeyFile | A file containing the Laravel APP_KEY - a 32 character long,
base64 encoded key used for encryption where needed
|
| services.dolibarr.h2o.tls.identity | Key / certificate pairs for the virtual host.
|
| services.tahoe.nodes.<name>.sftpd.hostPublicKeyFile | Path to the SSH host public key.
|
| services.nextcloud.config.objectstore.s3.sseCKeyFile | If provided this is the full path to a file that contains the key
to enable [server-side encryption with customer-provided keys][1]
(SSE-C)
|
| services.parsedmarc.settings | Configuration parameters to set in
parsedmarc.ini
|
| nix.buildMachines.*.publicHostKey | The (base64-encoded) public host key of this builder
|
| services.druid.middleManager.config | (key=value) Configuration to be written to runtime.properties of the druid Druid middleManager
https://druid.apache.org/docs/latest/configuration/index.html
|
| services.kmonad.keyboards.<name>.enableHardening | Whether to enable systemd hardening.
If KMonad is used to execute shell commands, hardening may make some of them fail.
|
| services.prometheus.exporters.keylight.enable | Whether to enable the prometheus keylight exporter.
|
| services.shellhub-agent.privateKey | Location where to store the ShellHub Agent private
key.
|
| services.athens.storage.minio.secret | Secret key for the minio storage backend
|
| services.evdevremapkeys.enable | Whether to enable evdevremapkeys, a daemon to remap events on linux input devices.
|
| services.ncps.cache.storage.s3.forcePathStyle | Force path-style S3 addressing (bucket/key vs key.bucket).
|
| programs.ssh.hostKeyAlgorithms | Specifies the host key algorithms that the client wants to use in order of preference.
|
| services.dovecot2.sieve.scripts | Sieve scripts to be executed
|
| services.outline.storage.secretKeyFile | File path that contains the S3 secret key.
|
| services.strongswan-swanctl.swanctl.connections.<name>.rekey_time | IKE rekeying refreshes key material using a Diffie-Hellman exchange, but
does not re-check associated credentials
|
| services.misskey.reverseProxy.webserver.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| services.misskey.reverseProxy.webserver.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| services.akkoma.config.":web_push_encryption".":vapid_details".public_key | base64-encoded public ECDH key.
|
| services.oauth2-proxy.signatureKey | GAP-Signature request signature key.
|
| services.peering-manager.secretKeyFile | Path to a file containing the secret key.
|
| services.geoipupdate.settings.LicenseKey | A file containing the MaxMind license key
|
| services.dkimproxy-out.enable | Whether to enable dkimproxy_out
|
| services.postfix.masterConfig.<name>.name | The name of the service to run
|
| services.prometheus.exporters.keylight.extraFlags | Extra commandline options to pass to the keylight exporter.
|
| services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.secret_key | The AWS API key secret
|
| services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.access_key | The AWS API key id
|
| services.prometheus.exporters.exportarr-sonarr.apiKeyFile | File containing the api-key.
|
| services.prometheus.exporters.exportarr-lidarr.apiKeyFile | File containing the api-key.
|
| services.prometheus.exporters.exportarr-bazarr.apiKeyFile | File containing the api-key.
|
| services.prometheus.exporters.exportarr-radarr.apiKeyFile | File containing the api-key.
|
| programs.i3lock.u2fSupport | Whether to enable U2F support in the i3lock program
|
| services.sogo.configReplaces | Replacement-filepath mapping for sogo.conf
|
| services.quicktun.<name>.publicKey | Remote public key in hexadecimal form.
Not needed when services.quicktun..protocol is set to raw.
|
| services.healthchecks.settings.SECRET_KEY_FILE | Path to a file containing the secret key.
|
| services.httpd.virtualHosts.<name>.sslServerKey | Path to server SSL certificate key.
|
| services.bookstack.appKeyFile | A file containing the Laravel APP_KEY - a 32 character long,
base64 encoded key used for encryption where needed
|
| services.tahoe.nodes.<name>.sftpd.hostPrivateKeyFile | Path to the SSH host private key.
|
| security.pam.services.<name>.rssh | If set, the calling user's SSH agent is used to authenticate
against the configured keys
|
| services.geoipupdate.settings | geoipupdate configuration options
|
| services.akkoma.config.":web_push_encryption".":vapid_details".private_key | base64-encoded private ECDH key
|
| services.tailscale.authKeyFile | A file containing the auth key
|
| services.cachix-watch-store.signingKeyFile | Optional file containing a self-managed signing key to sign uploaded store paths.
|
| services.ddclient.passwordFile | A file containing the password or a TSIG key in named format when using the nsupdate protocol.
|
| services.zabbixWeb.httpd.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| services.ncps.upstream.publicKeys | A list of public keys of upstream caches in the format
host[-[0-9]*]:public-key
|
| services.prometheus.exporters.exportarr-readarr.apiKeyFile | File containing the api-key.
|
| services.logind.hibernateKeyLongPress | Specifies what to do when the hibernate key is long-pressed.
|
| services.radicle.privateKeyFile | Absolute file path to an SSH private key,
usually generated by rad auth
|
| services.soju.tlsCertificateKey | Path to server TLS certificate key.
|
| services.syncoid.commands.<name>.sshKey | SSH private key file to use to login to the remote system
|
| services.invidious.hmacKeyFile | A path to a file containing the hmac_key
|
| services.kubernetes.pki.genCfsslCACert | Whether to automatically generate cfssl CA certificate and key,
if they don't exist.
|
| security.pam.services.<name>.u2fAuth | If set, users listed in
$XDG_CONFIG_HOME/Yubico/u2f_keys (or
$HOME/.config/Yubico/u2f_keys if XDG variable is
not set) are able to log in with the associated U2F key
|
| services.ncps.cache.storage.s3.secretAccessKeyPath | The path to a file containing only the secret-access-key.
|
| services.buildkite-agents | Attribute set of buildkite agents
|
| services.duplicity.secretFile | Path of a file containing secrets (gpg passphrase, access key...) in
the format of EnvironmentFile as described by
systemd.exec(5)
|
| services.lavalink.plugins.*.configName | The name of the plugin to use as the key for the plugin configuration.
|
| services.snipe-it.config | Snipe-IT configuration options to set in the
.env file
|
| services.prometheus.exporters.keylight.listenAddress | Address to listen on.
|
| services.nsd.zones.<name>.dnssecPolicy.ksk.postPublish | How long after deactivation to keep a key in the zone
|
| services.nsd.zones.<name>.dnssecPolicy.zsk.postPublish | How long after deactivation to keep a key in the zone
|
| security.duosec.integrationKey | Integration key.
|
| services.prometheus.exporters.exportarr-prowlarr.apiKeyFile | File containing the api-key.
|
| security.agnos.generateKeys.enable | Enable automatic generation of account keys
|
| services.nsd.remoteControl.controlKeyFile | Path to the client private key, which is used by nsd-control
but not by the server
|
| services.canaille.secretKeyFile | File containing the Flask secret key
|
| services.prometheus.exporters.keylight.openFirewall | Open port in firewall for incoming connections.
|
| services.druid.historical.config | (key=value) Configuration to be written to runtime.properties of the druid Druid Historical
https://druid.apache.org/docs/latest/configuration/index.html
|
| programs.less.clearDefaultCommands | Clear all default commands
|
| systemd.repart.partitions | Specify partitions as a set of the names of the definition files as the
key and the partition configuration as its value
|
| services.drupal.sites.<name>.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| services.engelsystem.settings | Options to be added to config.php, as a nix attribute set
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.ah_proposals | AH proposals to offer for the CHILD_SA
|
| services.hqplayerd.licenseFile | Path to the HQPlayer license key file
|
| services.hostapd.radios.<name>.networks.<name>.settings | Extra configuration options to put at the end of this BSS's defintion in the
hostapd.conf for the associated interface
|
| services.ncps.cache.upstream.publicKeys | A list of public keys of upstream caches in the format
host[-[0-9]*]:public-key
|
| services.forgejo.secrets | This is a small wrapper over systemd's LoadCredential
|
| services.netbird.clients.<name>.login.setupKeyFile | A Setup Key file path used for automated login of the machine.
|
| services.netbird.tunnels.<name>.login.setupKeyFile | A Setup Key file path used for automated login of the machine.
|
| services.gitlab.secrets.dbFile | A file containing the secret used to encrypt variables in
the DB
|
| services.glusterfs.tlsSettings.tlsKeyPath | Path to the private key used for TLS.
|
| services.kubernetes.pki.genCfsslAPICerts | Whether to automatically generate cfssl API webserver TLS cert and key,
if they don't exist.
|
| services.ntopng.enable | Enable ntopng, a high-speed web-based traffic analysis and flow
collection tool
|
| services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rekey_time | Time to schedule CHILD_SA rekeying
|
| services.prometheus.exporters.keylight.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.keylight.openFirewall is true.
|
| services.hylafax.faxqConfig | Attribute set of lines for the global
faxq config file etc/config
|
| security.pam.u2f.enable | Enables U2F PAM (pam-u2f) module
|
| services.pgmanage.tls | These options tell pgmanage where the TLS Certificate and Key files
reside
|
| services.kubernetes.kubelet.tlsKeyFile | File containing x509 private key matching tlsCertFile.
|
| services.stargazer.routes | Routes that Stargazer should server
|
| services.tor.client.onionServices.<name>.clientAuthorizations | Clients' authorizations for a v3 onion service,
as a list of files containing each one private key, in the format:
descriptor:x25519:<base32-private-key>
See torrc manual.
|
| services.gitlab.secrets.otpFile | A file containing the secret used to encrypt secrets for OTP
tokens
|
| services.davis.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.slskd.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.movim.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.canaille.jwtPrivateKeyFile | File containing the JWT private key
|
| services.strongswan-swanctl.swanctl.connections.<name>.proposals | A proposal is a set of algorithms
|
| services.snipe-it.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| boot.loader.systemd-boot.extraEntries | Any additional entries you want added to the systemd-boot menu
|
| swapDevices.*.randomEncryption.source | Define the source of randomness to obtain a random key for encryption.
|
| services.quicktun.<name>.privateKeyFile | Path to file containing local secret key in binary or hexadecimal form.
Not needed when services.quicktun..protocol is set to raw.
|
| services.hylafax.hfaxdConfig | Attribute set of lines for the global
hfaxd config file etc/hfaxd.conf
|
| services.dysnomia.containers | An attribute set in which each key represents a container and each value an attribute set providing its configuration properties
|
| services.arsenik.tap_timeout | The key must be pressed twice in XX ms to enable repetitions.
|
| services.rss2email.config | The configuration to give rss2email
|
| services.matrix-appservice-irc.settings.ircService.mediaProxy.signingKeyPath | Path to the signing key file for authenticated media.
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.quicktun.<name>.privateKey | Local secret key in hexadecimal form.
This option is deprecated
|
| services.openafsServer.enable | Whether to enable the OpenAFS server
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rekey_bytes | Number of bytes processed before initiating CHILD_SA rekeying
|
| systemd.sysupdate.transfers | Specify transfers as a set of the names of the transfer files as the
key and the configuration as its value
|
| services.monica.config | monica configuration options to set in the
.env file
|
| services.prometheus.exporters.keylight.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.keylight.openFirewall
is true
|
| services.druid.coordinator.config | (key=value) Configuration to be written to runtime.properties of the druid Druid Coordinator
https://druid.apache.org/docs/latest/configuration/index.html
|
| services.nghttpx.frontends.*.params.tls | Enable or disable TLS
|
| services.fluidd.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.gancio.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.akkoma.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.monica.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.matomo.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.gitlab.extraConfig | Extra options to be added under
production in
config/gitlab.yml, as a nix attribute
set
|
| services.cloud-init.enable | Enable the cloud-init service
|
| services.syncoid.localTargetAllow | Permissions granted for the services.syncoid.user user
for local target datasets
|
| services.mediawiki.httpd.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| services.gitlab.secrets.secretFile | A file containing the secret used to encrypt variables in
the DB
|
| services.peering-manager.peeringdbApiKeyFile | Path to a file containing the PeeringDB API key.
|
| services.limesurvey.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| services.veilid.settings.core.network.routing_table.node_id | Base64-encoded public key for the node, used as the node's ID.
|
| services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.exporters.ecoflow.ecoflowDevicesPrettyNamesFile | File must contain one line, example: {"R3300000":"Delta 2","R3400000":"Delta Pro",...}
The key/value map of custom names for your devices
|
| services.cjdns.ETHInterface.connectTo.<name>.publicKey | Public key at the opposite end of the tunnel.
|
| services.cjdns.UDPInterface.connectTo.<name>.publicKey | Public key at the opposite end of the tunnel.
|
| services.etesync-dav.sslCertificateKey | Path to server SSL certificate key
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rekey_packets | Number of packets processed before initiating CHILD_SA rekeying
|
| services.tailscale.authKeyParameters | Extra parameters to pass after the auth key
|
| services.networking.websockify.sslKey | Path to the SSL key.
|
| services.kasmweb.sslCertificateKey | The SSL certificate's key to be used for kasmweb
|
| services.wordpress.sites.<name>.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| services.arsenik.hold_timeout | The key must be held XX ms to become a layer shift.
|
| services.readeck.environmentFile | File containing environment variables to be passed to Readeck
|
| services.limesurvey.httpd.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| services.hylafax.modems.<name>.config | Attribute set of values for the given modem
|
| services.n8n.environment.N8N_USER_FOLDER | Provide the path where n8n will create the .n8n folder
|
| services.beszel.agent.environment | Environment variables for configuring the beszel-agent service
|
| services.radicle.httpd.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.athens.storage.azureblob.accountKey | Account key for the Azure Blob storage backend
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.librenms.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.agorakit.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.kanboard.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.fediwall.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.dolibarr.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.mainsail.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.pixelfed.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.chatgpt-retrieval-plugin.openaiApiKeyPath | Path to the secret openai api key used for embeddings.
|
| services.triggerhappy.bindings | Key bindings for triggerhappy.
|
| services.agorakit.config | Agorakit configuration options to set in the
.env file
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.access_key | Access key to use. https://console.scaleway.com/project/credentials
|
| services.bookstack.config | BookStack configuration options to set in the
.env file
|
| services.discourse.mail.contactEmailAddress | Email address of key contact responsible for this
site
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.secret_key | Secret key to use when listing targets. https://console.scaleway.com/project/credentials
It is mutually exclusive with secret_key_file.
|
| services.xserver.windowManager.xmonad.config | Configuration from which XMonad gets compiled
|
| services.zfs.autoReplication.identityFilePath | Path to SSH key used to login to host.
|
| services.hylafax.commonModemConfig | Attribute set of default values for
modem config files etc/config.*
|
| services.znapzend.features.sendRaw | Whether to enable sendRaw feature which adds the options -w to the
zfs send command
|
| environment.wordlist.lists | A set with the key names being the environment variable you'd like to
set and the values being a list of paths to text documents containing
lists of words
|
| services.anuko-time-tracker.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.discourse.sslCertificateKey | The path to the server SSL certificate key
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.bookstack.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.rabbitmq.configItems | Configuration options in RabbitMQ's new config file format,
which is a simple key-value format that can not express nested
data structures
|
| boot.loader.systemd-boot.rebootForBitlocker | Enable EXPERIMENTAL BitLocker support
|
| services.rmfakecloud.extraSettings | Extra settings in the form of a set of key-value pairs
|
| services.gitlab.workhorse.config | Configuration options to add to Workhorse's configuration
file
|
| services.wgautomesh.gossipSecretFile | File containing the gossip secret, a shared secret key to use for gossip
encryption
|
| services.zabbixWeb.nginx.virtualHost.sslCertificateKey | Path to server SSL certificate key.
|
| services.nginx.virtualHosts.<name>.sslCertificateKey | Path to server SSL certificate key.
|
| services.privoxy.inspectHttps | Whether to configure Privoxy to inspect HTTPS requests, meaning all
encrypted traffic will be filtered as well
|
| networking.wg-quick.interfaces.<name>.peers.*.publicKey | The base64 public key to the peer.
|
| services.jirafeau.nginxConfig.sslCertificateKey | Path to server SSL certificate key.
|
| networking.wireless.networks.<name>.psk | The network's pre-shared key in plaintext defaulting
to being a network without any authentication.
Be aware that this will be written to the Nix store
in plaintext! Use pskRaw with an external
reference to keep it safe.
Mutually exclusive with pskRaw.
|
| services.matrix-appservice-irc.settings.ircService.passwordEncryptionKeyPath | Location of the key with which IRC passwords are encrypted
for storage
|
| services.pocket-id.environmentFile | Path to an environment file to be loaded
|
| services.strongswan-swanctl.swanctl.secrets.token | Definition for a private key that's stored on a token/smartcard/TPM.
|
| services.strongswan-swanctl.swanctl.secrets.ppk | Postquantum Preshared Key (PPK) section for a specific secret
|
| networking.wg-quick.interfaces.<name>.privateKeyFile | Private key file as generated by wg genkey.
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.pubkeys | List of raw public keys to accept for
authentication
|
| services.invoiceplane.sites.<name>.cron.enable | Enable cron service which periodically runs Invoiceplane tasks
|
| services.limesurvey.encryptionKeyFile | 32-byte key used to encrypt variables in the database
|
| services.foundationdb.locality.zoneId | Zone identifier key
|
| services.your_spotify.spotifySecretFile | A file containing the secret key of your Spotify application
|
| services.coturn.use-auth-secret | TURN REST API flag
|
| services.foundationdb.locality.dataHall | Data hall identifier key
|
| services.syncoid.commands.<name>.localTargetAllow | Permissions granted for the services.syncoid.user user
for local target datasets
|
| services.mautrix-signal.environmentFile | File containing environment variables to be passed to the mautrix-signal service
|
| services.kubernetes.controllerManager.tlsKeyFile | Kubernetes controller-manager private key file.
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.borgbackup.jobs.<name>.environment | Environment variables passed to the backup script
|
| services.strongswan-swanctl.swanctl.secrets.rsa.<name>.secret | Value of decryption passphrase for RSA key.
|
| services.fedimintd.<name>.nginx.config.sslCertificateKey | Path to server SSL certificate key.
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.secret_key_file | Sets the secret key with the credentials read from the configured file
|
| services.mosquitto.listeners.*.authPlugins.*.options | Options for the auth plugin
|
| services.beesd.filesystems.<name>.spec | Description of how to identify the filesystem to be duplicated by this
instance of bees
|
| services.strongswan-swanctl.swanctl.secrets.token.<name>.pin | Optional PIN required to access the key on the token
|
| services.strongswan-swanctl.swanctl.secrets.ecdsa.<name>.secret | Value of decryption passphrase for ECDSA key.
|
| services.foundationdb.locality.machineId | Machine identifier key
|
| services.strongswan-swanctl.swanctl.secrets.pkcs8.<name>.secret | Value of decryption passphrase for PKCS#8 key.
|
| services.prometheus.exporters.postgres.dataSourceName | Accepts PostgreSQL URI form and key=value form arguments.
|
| services.step-ca.intermediatePasswordFile | Path to the file containing the password for the intermediate
certificate private key.
Make sure to use a quoted absolute path instead of a path literal
to prevent it from being copied to the globally readable Nix
store.
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.cadvisor.storageDriverPasswordFile | File that contains the cadvisor storage driver password.
storageDriverPasswordFile takes precedence over storageDriverPassword
Warning: when storageDriverPassword is non-empty this defaults to a file in the
world-readable Nix store that contains the value of storageDriverPassword
|
| services.strongswan-swanctl.swanctl.connections.<name>.keyingtries | Number of retransmission sequences to perform during initial
connect
|
| boot.zfs.requestEncryptionCredentials | If true on import encryption keys or passwords for all encrypted datasets
are requested
|
| services.strongswan-swanctl.swanctl.secrets.token.<name>.handle | Hex-encoded CKA_ID or handle of the private key on the token or TPM,
respectively.
|
| services.mautrix-whatsapp.environmentFile | File containing environment variables to be passed to the mautrix-whatsapp service
|
| networking.wireguard.interfaces.<name>.peers.*.publicKey | The base64 public key of the peer.
|
| services.outline.slackAuthentication.clientId | Authentication key.
|
| services.limesurvey.nginx.virtualHost.sslCertificateKey | Path to server SSL certificate key.
|
| services.neo4j.ssl.policies.<name>.allowKeyGeneration | Allows the generation of a private key and associated self-signed
certificate
|
| services.borgbackup.repos.<name>.authorizedKeys | Public SSH keys that are given full write access to this repository
|
| services.authelia.instances.<name>.secrets.oidcIssuerPrivateKeyFile | Path to your private key file used to encrypt OIDC JWTs.
|
| swapDevices.*.randomEncryption.enable | Encrypt swap device with a random key
|
| networking.wireguard.interfaces.<name>.privateKeyFile | Private key file as generated by wg genkey.
|
| services.strongswan-swanctl.swanctl.secrets.private.<name>.secret | Value of decryption passphrase for private key.
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| networking.wg-quick.interfaces.<name>.generatePrivateKeyFile | Automatically generate a private key with
wg genkey, at the privateKeyFile location.
|
| services.prometheus.exporters.klipper.moonrakerApiKey | API Key to authenticate with the Moonraker APIs
|
| services.discourse.siteSettings | Discourse site settings
|
| services.netbird.clients.<name>.login.systemdDependencies | Additional systemd dependencies required to succeed before the Setup Key file becomes available.
|
| services.netbird.tunnels.<name>.login.systemdDependencies | Additional systemd dependencies required to succeed before the Setup Key file becomes available.
|
| services.yggdrasil.persistentKeys | Whether to enable automatic generation and persistence of keys
|
| networking.openconnect.interfaces.<name>.privateKey | Private key to authenticate with.
|
| services.matrix-appservice-irc.passwordEncryptionKeyLength | Length of the key to encrypt IRC passwords with
|
| services.foundationdb.locality.datacenterId | Data center identifier key
|
| services.authelia.instances.<name>.secrets.storageEncryptionKeyFile | Path to your storage encryption key.
|
| swapDevices.*.randomEncryption | Encrypt swap device with a random key
|
| services.strongswan-swanctl.swanctl.connections.<name>.ppk_id | String identifying the Postquantum Preshared Key (PPK) to be used.
|
| services.kubernetes.controllerManager.serviceAccountKeyFile | Kubernetes controller manager PEM-encoded private RSA key file used to
sign service account tokens
|
| services.cockroachdb.locality | An ordered, comma-separated list of key-value pairs that describe the
topography of the machine
|
| networking.wireguard.interfaces.<name>.generatePrivateKeyFile | Automatically generate a private key with
wg genkey, at the privateKeyFile location.
|
| services.mastodon.activeRecordEncryptionPrimaryKeyFile | This key must be set to enable the Active Record Encryption feature within
Rails that Mastodon uses to encrypt and decrypt some database attributes
|
| services.postfix.settings.main.smtpd_tls_chain_files | List of paths to the server private keys and certificates.
The order of items matters and a private key must always be followed by the corresponding certificate.
https://www.postfix.org/postconf.5.html#smtpd_tls_chain_files
|
| services.matrix-synapse.settings.tls_certificate_path | PEM encoded X509 certificate for TLS
|
| networking.openconnect.interfaces.<name>.extraOptions | Extra config to be appended to the interface config
|
| services.neo4j.directories.certificates | Directory for storing certificates to be used by Neo4j for
TLS connections
|
| services.mastodon.activeRecordEncryptionKeyDerivationSaltFile | This key must be set to enable the Active Record Encryption feature within
Rails that Mastodon uses to encrypt and decrypt some database attributes
|
| services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.secret_key | The AWS API keys
|
| services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.access_key | The AWS API keys
|
| services.strongswan-swanctl.swanctl.connections.<name>.ppk_required | Whether a Postquantum Preshared Key (PPK) is required for this connection
|
| services.journaldriver.applicationCredentials | Path to the service account private key (in JSON-format) used
to forward log entries to Stackdriver Logging on non-GCP
instances
|
| services.strongswan-swanctl.swanctl.connections.<name>.aggressive | Enables Aggressive Mode instead of Main Mode with Identity
Protection
|
| services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.pk | If this attribute is given, SAE-PK will be enabled for this connection
|
| services.mastodon.activeRecordEncryptionDeterministicKeyFile | This key must be set to enable the Active Record Encryption feature within
Rails that Mastodon uses to encrypt and decrypt some database attributes
|
| services.akkoma.config.":web_push_encryption" | Web Push Notifications configuration
|
| services.strongswan-swanctl.swanctl.connections.<name>.send_certreq | Send certificate request payloads to offer trusted root CA certificates to
the peer
|
| services.hostapd.radios.<name>.networks.<name>.authentication.wpaPassword | Sets the password for WPA-PSK that will be converted to the pre-shared key
|
| services.strongswan-swanctl.swanctl.connections.<name>.childless | Use childless IKE_SA initiation (allow, prefer, force or never)
|
| services.hostapd.radios.<name>.networks.<name>.authentication.wpaPskFile | Sets the password(s) for WPA-PSK
|