| services.livebook.environmentFile | Additional environment file as defined in systemd.exec(5)
|
| services.crossfire-server.configFiles | Text to append to the corresponding configuration files
|
| services.home-assistant.lovelaceConfigFile | Your ui-lovelace.yaml managed as configuraton file
|
| services.filesender.poolSettings | Options for FileSender's PHP pool
|
| services.beesd.filesystems.<name>.workDir | Name (relative to the root of the filesystem) of the subvolume where
the hash table will be stored.
|
| services.kanidm.provision.adminPasswordFile | Path to a file containing the admin password for kanidm
|
| services.prosody.modules.http_files | Serve static files from a directory over HTTP
|
| services.github-runners.<name>.tokenFile | The full path to a file which contains either
- a fine-grained personal access token (PAT),
- a classic PAT
- or a runner registration token
Changing this option or the tokenFile’s content triggers a new runner registration
|
| services.galene.keyFile | Path to the server's private key
|
| services.bookstack.settings.APP_KEY_FILE | The path to your appkey
|
| services.prometheus.globalConfig.query_log_file | Path to the file prometheus should write its query log to.
|
| services.mastodon.vapidPrivateKeyFile | Path to file containing the private key used for Web Push
Voluntary Application Server Identification
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.bepasty.servers.<name>.secretKeyFile | A file that contains the server secret for safe session cookies, must be set.
secretKeyFile takes precedence over secretKey
|
| security.sudo-rs.extraConfig | Extra configuration text appended to sudoers.
|
| power.ups.schedulerRules | File which contains the rules to handle UPS events.
|
| services.filebrowser.settings.port | The port to listen on.
|
| services.nginx.sslDhparam | Path to DH parameters file.
|
| services.traefik.environmentFiles | Files to load as an environment file just before Traefik starts
|
| users.ldap.bind.passwordFile | The path to a file containing the credentials to use when binding
to the LDAP server (if not binding anonymously).
|
| services.sssd.settings | Contents of sssd.conf.
|
| users.extraUsers.<name>.pamMount | Attributes for user's entry in
pam_mount.conf.xml
|
| hardware.nvidia-container-toolkit.csv-files | The path to the list of CSV files to use when generating the CDI specification in CSV mode.
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.basic_auth.password_file | HTTP password file
|
| services.filebrowser.settings | Settings for FileBrowser
|
| services.apache-kafka.configFiles.serverProperties | Kafka server.properties configuration file path
|
| users.ldap.extraConfig | Extra configuration options that will be added verbatim at
the end of the ldap configuration file (ldap.conf(5))
|
| services.cron.systemCronJobs | A list of Cron jobs to be appended to the system-wide
crontab
|
| services.qui.secretFile | Path to a file that contains the session secret
|
| services.filebeat.modules | Filebeat modules provide a quick way to get started
processing common log formats
|
| services.galene.certFile | Path to the server's certificate
|
| services.flannel.etcd.caFile | Etcd certificate authority file
|
| services.flannel.etcd.keyFile | Etcd key file
|
| services.self-deploy.nixFile | Path to nix file in repository
|
| services.filebrowser.settings.root | The directory where FileBrowser stores files.
|
| services.kubernetes.addons.dns.corefile | Custom coredns corefile configuration
|
| services.bind.extraConfig | Extra lines to be added verbatim to the generated named configuration file.
|
| security.pam.services.<name>.gnupg.enable | If enabled, pam_gnupg will attempt to automatically unlock the
user's GPG keys with the login password via
gpg-agent
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.etcd.trustedCaFile | Certificate authority file to use for clients
|
| services.vault.extraConfig | Extra text appended to vault.hcl.
|
| security.pam.makeHomeDir.umask | The user file mode creation mask to use on home directories
newly created by pam_mkhomedir.
|
| services.hostapd.radios.<name>.networks.<name>.dynamicConfigScripts | All of these scripts will be executed in lexicographical order before hostapd
is started, right after the bss segment was generated and may dynamically
append bss options to the generated configuration file
|
| services.lemmy.pictrsApiKeyFile | File which contains the value of pictrs.api_key.
|
| services.mautrix-meta.instances.<name>.environmentFile | File containing environment variables to substitute when copying the configuration
out of Nix store to the services.mautrix-meta.dataDir
|
| services.filesender.settings.admin | UIDs (as per the configured saml_uid_attribute) of FileSender administrators
|
| swapDevices | The swap devices and swap files
|
| services.tsmBackup.servername | Create a systemd system service
tsm-backup.service that starts
a backup based on the given servername's stanza
|
| services.kubernetes.apiserver.serviceAccountKeyFile | File containing PEM-encoded x509 RSA or ECDSA private or public keys,
used to verify ServiceAccount tokens
|
| services.seafile.gc.randomizedDelaySec | Add a randomized delay before each garbage collection
|
| services.foundationdb.pidfile | Path to pidfile for fdbmonitor.
|
| services.pufferpanel.extraPackages | Packages to add to the PATH environment variable
|
| services.forgejo.dump.type | Archive format used to store the dump file.
|
| services.tftpd.enable | Whether to enable tftpd, a Trivial File Transfer Protocol server
|
| services.guacamole-client.settings | Configuration written to guacamole.properties.
The Guacamole web application uses one main configuration file called
guacamole.properties
|
| services.seafile.gc.persistent | Takes a boolean argument
|
| services.grav.maxUploadSize | The upload limit for files
|
| services.home-assistant.lovelaceConfig | Your ui-lovelace.yaml as a Nix attribute set
|
| services.klipper.logFile | Path of the file Klipper should log to
|
| boot.plymouth.extraConfig | Literal string to append to configFile
and the config file generated by the plymouth module.
|
| services.rspamd.locals | Local configuration files, written into /etc/rspamd/local.d/{name}.
|
| services._3proxy.confFile | Ignore all other 3proxy options and load configuration from this file.
|
| services.zitadel.steps | Contents of the database initialization config file
|
| users.ldap.daemon.extraConfig | Extra configuration options that will be added verbatim at
the end of the nslcd configuration file (nslcd.conf(5)).
|
| services.castopod.environmentFile | Environment file to inject e.g. secrets into the configuration
|
| programs.bat.settings | Parameters to be written to the system-wide bat configuration file.
|
| environment.etc | Set of files that have to be linked in /etc.
|
| services.llama-swap.tls.keyFile | Path to the TLS private key file
|
| services.trilium-server.environmentFile | File to load as the environment file
|
| services.graylog.nodeIdFile | Path of the file containing the graylog node-id
|
| services.pdnsd.extraConfig | Extra configuration directives that should be added to
pdnsd.conf.
|
| programs.atop.settings | Parameters to be written to /etc/atoprc.
|
| services.vault.storagePath | Data directory for file backend
|
| services.llama-swap.tls.certFile | Path to the TLS certificate file
|
| services.firezone.headless-client.tokenFile | A file containing the firezone client token
|
| services.bacula-fd.port | This specifies the port number on which the Client listens for
Director connections
|
| services.kubernetes.kubelet.extraConfig | Kubernetes kubelet extra configuration file entries
|
| services.i2pd.proto.httpProxy.keys | File to persist HTTPPROXY keys.
|
| services.homer.enable | Whether to enable A dead simple static HOMepage for your servER to keep your services on hand, from a simple yaml configuration file.
.
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| services.pocket-id.credentials | Environment variables which are loaded from the contents of the specified file paths
|
| services.hylafax.commonModemConfig | Attribute set of default values for
modem config files etc/config.*
|
| services.syncoid.sshKey | SSH private key file to use to login to the remote system
|
| services.filebrowser.openFirewall | Whether to enable opening firewall ports for FileBrowser.
|
| services.logrotate.settings.<name>.files | Single or list of files for which rules are defined
|
| services.flannel.etcd.certFile | Etcd cert file
|
| programs.rush.rules | The rule statement configures a GNU Rush rule
|
| services.sympa.mainDomain | Main domain to be used in sympa.conf
|
| services.patroni.dataDir | Folder where Patroni data will be written, this is where the pgpass password file will be written.
|
| services.asusd.animeConfig.text | Text of the file.
|
| services.asusd.asusdConfig.text | Text of the file.
|
| services.xserver.xkb.extraLayouts.<name>.keycodesFile | The path to the xkb keycodes file
|
| services.couchdb.argsFile | vm.args configuration
|
| services.cntlm.extraConfig | Additional config appended to the end of the generated cntlm.conf.
|
| services.gitea.extraConfig | Configuration lines appended to the generated gitea configuration file.
|
| virtualisation.sharedDirectories.<name>.securityModel | The security model to use for this share:
passthrough: files are stored using the same credentials as they are created on the guest (this requires QEMU to run as root)
mapped-xattr: some of the file attributes like uid, gid, mode bits and link target are stored as file attributes
mapped-file: the attributes are stored in the hidden .virtfs_metadata directory
|
| services.monero.environmentFile | Path to an EnvironmentFile for the monero service as defined in systemd.exec(5)
|
| programs.neovim.runtime | Set of files that have to be linked in runtime.
|
| services.turn-rs.settings | Turn-rs server config file
|