| services.opengfw.rulesFile | Path to file containing OpenGFW rules.
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.basic_auth.password_file | HTTP password file
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.basic_auth.password_file | HTTP password file
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.basic_auth.password_file | HTTP password file
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.basic_auth.password_file | HTTP password file
|
| boot.initrd.luks.devices | The encrypted disk that should be opened before the root
filesystem is mounted
|
| services.gollum.extraConfig | Content of the configuration file
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.printing.cups-pdf.instances.<name>.confFileText | This will contain the contents of cups-pdf.conf for this instance, derived from settings
|
| virtualisation.fileSystems.<name>.overlay.useStage1BaseDirectories | If enabled, lowerdir, upperdir and workdir will be prefixed with /sysroot
|
| services.dawarich.secretKeyBaseFile | Path to file containing the secret key base
|
| console.font | The font used for the virtual consoles
|
| services.grafana.settings.smtp.password | Password used for authentication
|
| services.filebrowser.settings.cache-dir | The directory where FileBrowser stores its cache.
|
| services.oink.secretApiKeyFile | Path to a file containing the secret API key to use when modifying DNS records.
|
| services.watchdogd.settings.filenr.enabled | Whether to enable watchdogd plugin filenr.
|
| users.extraGroups.<name>.members | The user names of the group members, added to the
/etc/group file.
|
| services.squid.extraConfig | Squid configuration
|
| services.pretalx.settings.filesystem.data | Base path for all other storage paths.
|
| services.chromadb.logFile | Specifies the location of file for logging output.
|
| services.netbox.secretKeyFile | Path to a file containing the secret key.
|
| services.wgautomesh.gossipSecretFile | File containing the gossip secret, a shared secret key to use for gossip
encryption
|
| services.strongswan.connections | A set of connections and their options for the ‘conn xxx’
sections of the ipsec.conf file.
|
| services.seafile.ccnetSettings.General.SERVICE_URL | Seahub public URL.
|
| services.watchdogd.settings.filenr.warning | The high watermark level
|
| services.kmscon.extraConfig | Extra contents of the kmscon.conf file.
|
| services.xserver.desktopManager.wallpaper.mode | The file ~/.background-image is used as a background image
|
| programs.tsmClient.defaultServername | If multiple server stanzas are declared with
programs.tsmClient.servers,
this option may be used to name a default
server stanza that IBM TSM uses in the absence of
a user-defined dsm.opt file
|
| services.code-server.socketMode | File mode of the socket.
|
| services.journald.remote.settings.Remote.SplitMode | With "host", a separate output file is used, based on the
hostname of the other endpoint of a connection
|
| services.xserver.xkb.extraLayouts.<name>.geometryFile | The path to the xkb geometry file
|
| users.users.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| users.extraUsers.<name>.subUidRanges | Subordinate user ids that user is allowed to use
|
| users.extraUsers.<name>.subGidRanges | Subordinate group ids that user is allowed to use
|
| services.watchdogd.settings.filenr.logmark | Whether to log current stats every poll interval.
|
| services.pretalx.settings.filesystem.logs | Path to the log directory, that pretalx logs message to.
|
| services.kanidm.provision.idmAdminPasswordFile | Path to a file containing the idm admin password for kanidm
|
| networking.getaddrinfo.reload | Determines whether a process should detect changes to the configuration file since it was last read
|
| services.stash.jwtSecretKeyFile | Path to file containing a secret used to sign JWT tokens.
|
| services.postgres-websockets.pgpassFile | The password to authenticate to PostgreSQL with
|
| services.unpoller.unifi.controllers.*.pass | Path of a file containing the password for the unifi service user
|
| services.duckdns.tokenFile | The path to a file containing the token
used to authenticate with DuckDNS.
|
| services.sogo.ealarmsCredFile | Optional path to a credentials file for email alarms
|
| services.kmonad.keyboards.<name>.extraGroups | Extra permission groups to attach to the KMonad instance for
this keyboard
|
| boot.loader.grub.extraPerEntryConfig | Additional GRUB commands inserted in the configuration file
at the start of each NixOS menu entry.
|
| services.filesender.database.hostname | Database hostname.
|
| services.rspamd.locals.<name>.text | Text of the file.
|
| users.users.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| services.duplicati.parameters | This option can be used to store some or all of the options given to the
commandline client
|
| services.timesyncd.fallbackServers | The set of fallback NTP servers from which to synchronise
|
| boot.initrd.network.ssh.extraConfig | Verbatim contents of sshd_config.
|
| services.i2pd.proto.socksProxy.keys | File to persist SOCKSPROXY keys.
|
| services.vault-agent.instances.<name>.settings | Free-form settings written directly to the config.json file
|
| hardware.deviceTree.name | The name of an explicit dtb to be loaded, relative to the dtb base
|
| services.snips-sh.environmentFile | Additional environment file as defined in systemd.exec(5)
|
| security.please.enable | Whether to enable please, a Sudo clone which allows a users to execute a command or edit a
file as another user
.
|
| services.gnunet.enable | Whether to run the GNUnet daemon
|
| services.prometheus.remoteRead.*.basic_auth.password_file | HTTP password file
|
| services.matrix-synapse.settings.app_service_config_files | A list of application service config file to use
|
| services.rustus.info_storage | Info storages are used to store information about file uploads
|
| systemd.services.<name>.confinement.binSh | The program to make available as /bin/sh inside
the chroot
|
| services.slurm.extraConfig | Extra configuration options that will be added verbatim at
the end of the slurm configuration file.
|
| services.athens.basicAuthPass | Password for basic auth
|
| services.goss.settings | The global options in config file in yaml format
|
| services.netbox.enableLdap | Enable LDAP-Authentication for Netbox
|
| programs.spacefm.enable | Whether to install SpaceFM and create /etc/spacefm/spacefm.conf.
|
| services.privoxy.settings.filterfile | List of paths to Privoxy filter files
|
| services.gitea.minioAccessKeyId | Path to a file containing the Minio access key id.
|
| security.pki.caCertificateBlacklist | A list of blacklisted CA certificate names that won't be imported from
the Mozilla Trust Store into
/etc/ssl/certs/ca-certificates.crt
|
| networking.networkmanager.ensureProfiles.secrets.package | The nm-file-secret-agent package to use.
|
| services.athens.extraConfig | Extra configuration options for the athens config file.
|
| services.chrony.extraConfig | Extra configuration directives that should be added to
chrony.conf
|
| services.howdy.settings | Howdy configuration file
|
| services.omnom.settings | Configuration options for the /etc/omnom/config.yml file.
|
| services.cloudflared.tunnels.<name>.certificateFile | Account certificate file, necessary to create, delete and manage tunnels
|
| services.pocket-id.environmentFile | Path to an environment file to be loaded
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| services.reposilite.database.passwordFile | Path to the file containing the password for the database connection
|
| networking.supplicant.<name>.configFile.writable | Whether the configuration file at configFile.path should be written to by
wpa_supplicant.
|
| services.mailman.restApiPassFile | Path to the file containing the value for MAILMAN_REST_API_PASS.
|
| services.gns3-server.ssl.certFile | Path to the SSL certificate file
|
| services.privoxy.inspectHttps | Whether to configure Privoxy to inspect HTTPS requests, meaning all
encrypted traffic will be filtered as well
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.basic_auth.password_file | HTTP password file
|
| services.tarsnap.keyfile | The keyfile which associates this machine with your tarsnap
account
|
| services.pangolin.environmentFile | Path to a file containing sensitive environment variables for Pangolin
|
| services.headscale.settings.database.postgres.password_file | A file containing the password corresponding to
database.user.
|
| services.slurm.mpi.extraMpiConfig | Extra configuration for that will be added to mpi.conf.
|
| services.prometheus.remoteWrite.*.basic_auth.password_file | HTTP password file
|
| services.calibre-web.dataDir | Where Calibre-Web stores its data
|
| services.lasuite-meet.bind | The path, host/port or file descriptior to bind the gunicorn socket to
|
| services.lasuite-docs.bind | The path, host/port or file descriptior to bind the gunicorn socket to
|
| services.watchdogd.settings.filenr.interval | Amount of seconds between every poll.
|
| services.openafsServer.roles.fileserver.enable | Fileserver role, serves files and volumes from its local storage.
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.filebrowser.settings.address | The address to listen on.
|