| services.ntpd-rs.settings | Settings to write to ntp.toml
See https://docs.ntpd-rs.pendulum-project.org/man/ntp.toml.5
for more information about available options.
|
| services.snipe-it.appKeyFile | A file containing the Laravel APP_KEY - a 32 character long,
base64 encoded key used for encryption where needed
|
| services.librechat.credentials | Environment variables which are loaded from the contents of files at a file paths, mainly used for secrets
|
| boot.binfmt.registrations.<name>.fixBinary | Whether to open the interpreter file as soon as the
registration is loaded, rather than waiting for a
relevant file to be invoked
|
| services.gitweb.extraConfig | Verbatim configuration text appended to the generated gitweb.conf file.
|
| services.actkbd.extraConfig | Literal contents to append to the end of actkbd configuration file.
|
| services.etcd.peerTrustedCaFile | Certificate authority file to use for peer to peer communication
|
| services.artalk.allowModify | allow Artalk store the settings to config file persistently
|
| services.pdnsd.globalConfig | Global configuration that should be added to the global directory
of pdnsd.conf.
|
| services.munin-node.extraConfig | munin-node.conf extra configuration
|
| services.pdnsd.serverConfig | Server configuration that should be added to the server directory
of pdnsd.conf.
|
| services.rspamd.extraConfig | Extra configuration to add at the end of the rspamd configuration
file.
|
| services.vsftpd.extraConfig | Extra configuration to add at the bottom of the generated configuration file.
|
| security.pam.services.<name>.allowNullPassword | Whether to allow logging into accounts that have no password
set (i.e., have an empty password field in
/etc/passwd or
/etc/group)
|
| services.prometheus.remoteWrite.*.sigv4.profile | The named AWS profile used to authenticate.
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.kubeconfig_file | Optional path to a kubeconfig file
|
| programs.ssh.extraConfig | Extra configuration text prepended to ssh_config
|
| services.k3s.agentTokenFile | File path containing the k3s token agents can use to connect to the server
|
| services.angrr.settings.profile-policies.<name>.enable | Whether to enable this angrr policy.
|
| services.prometheus.exporters.blackbox.configFile | Path to configuration file.
|
| services.bacula-sd.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| services.bacula-fd.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| security.doas.extraConfig | Extra configuration text appended to doas.conf
|
| services.dawarich.configureNginx | Configure nginx as a reverse proxy for dawarich
|
| services.kresd.extraConfig | Extra lines to be added verbatim to the generated configuration file
|
| services.angrr.settings.profile-policies.<name>.keep-since | Retention period for the GC roots in this profile.
|
| services.autofs.autoMaster | Contents of /etc/auto.master file
|
| services.aria2.rpcSecretFile | A file containing the RPC secret authorization token
|
| services.bind.extraOptions | Extra lines to be added verbatim to the options section of the
generated named configuration file.
|
| system.autoUpgrade.flags | Any additional flags passed to nixos-rebuild
|
| services.suricata.settings.unix-command.filename | Filename for unix-command socket.
|
| programs.niri.useNautilus | Whether to enable Nautilus as file-chooser for xdg-desktop-portal-gnome.
|
| services.bacula-dir.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| services.polipo.extraConfig | Polio configuration
|
| services.consul.extraConfig | Extra configuration options which are serialized to json and added
to the config.json file.
|
| services.ulogd.settings | Configuration for ulogd
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.kubernetes.kubeconfig.caFile | Default kubeconfig certificate authority file used to connect to kube-apiserver.
|
| environment.profileRelativeEnvVars | Attribute set of environment variable
|
| services.nagios.mainConfigFile | If non-null, overrides the main configuration file of Nagios.
|
| users.extraUsers.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| services.xserver.dpi | Force global DPI resolution to use for X server
|
| services.slskd.settings.retention.files.complete | Lifespan of completely downloaded files in minutes.
|
| services.nitter.preferences.stickyProfile | Make profile sidebar stick to top.
|
| services.zabbixWeb.extraConfig | Additional configuration to be copied verbatim into zabbix.conf.php.
|
| services.nextcloud.config.objectstore.s3.secretFile | The full path to a file that contains the access secret.
|
| networking.networkmanager.ensureProfiles.profiles.<name>.connection.id | This is the name that will be displayed by NetworkManager and GUIs.
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| services.pretalx.settings.filesystem.static | Path to the directory that contains static files.
|
| services.tuned.settings.profile_dirs | Directories to search for profiles, separated by , or ;.
|
| security.isolate.cgRoot | Control group which subgroups are placed under
|
| services.prometheus.exporters.idrac.configurationPath | Path to the service's config file
|
| services.libinput.mouse.accelProfile | Sets the pointer acceleration profile to the given profile
|
| services.rustus.storage.s3_secret_key_file | File path that contains the S3 secret key.
|
| services.rustus.storage.s3_access_key_file | File path that contains the S3 access key.
|
| services.kubernetes.kubeconfig.keyFile | Default kubeconfig client key file used to connect to kube-apiserver.
|
| services.gitea.database.path | Path to the sqlite3 database file.
|
| boot.extraModprobeConfig | Any additional configuration to be appended to the generated
modprobe.conf
|
| services.asusd.fanCurvesConfig.text | Text of the file.
|
| services.asusd.userLedModesConfig.text | Text of the file.
|
| services.vault.extraSettingsPaths | Configuration files to load besides the immutable one defined by the NixOS module
|
| services.gerrit.plugins | List of plugins to add to Gerrit
|
| users.extraUsers.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| services.mpdscribble.passwordFile | File containing the password for the mpd daemon
|
| programs.dconf.packages | A list of packages which provide dconf profiles and databases in /etc/dconf.
|
| networking.hostFiles | Files that should be concatenated together to form /etc/hosts.
|
| services.cjdns.enable | Whether to enable the cjdns network encryption
and routing engine
|
| services.watchdogd.settings.filenr.critical | The critical watermark level
|
| services.autobrr.secretFile | File containing the session secret for the Autobrr web interface.
|
| services.varnish.listen.*.user | User name who owns the socket file.
|
| security.pam.services.<name>.text | Contents of the PAM service file.
|
| boot.initrd.luks.devices.<name>.header | The name of the file or block device that
should be used as header for the encrypted device.
|
| services.scrutiny.collector.settings | Collector settings to be rendered into the collector configuration file
|
| services.cyrus-imap.cyrusConfigFile | Path to the configuration file used for Cyrus.
|
| services.omnom.passwordFile | File containing the password for the SMTP user.
|
| services.nfs.server.exports | Contents of the /etc/exports file
|
| services.bitcoind.<name>.pidFile | Location of bitcoind pid file.
|
| services.openssh.extraConfig | Verbatim contents of sshd_config.
|
| environment.etc.<name>.text | Text of the file.
|
| services.rdnssd.enable | Whether to enable the RDNSS daemon
(rdnssd), which configures DNS servers in
/etc/resolv.conf from RDNSS
advertisements sent by IPv6 routers.
|
| boot.loader.generic-extlinux-compatible.enable | Whether to generate an extlinux-compatible configuration file
under /boot/extlinux.conf
|
| services.hostapd.radios.<name>.dynamicConfigScripts | All of these scripts will be executed in lexicographical order before hostapd
is started, right after the global segment was generated and may dynamically
append global options the generated configuration file
|
| services.cjdns.addExtraHosts | Whether to add cjdns peers with an associated hostname to
/etc/hosts
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.basic_auth.password_file | HTTP password file
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.basic_auth.password_file | HTTP password file
|
| services.mautrix-signal.environmentFile | File containing environment variables to be passed to the mautrix-signal service
|
| services.prometheus.exporters.mikrotik.configFile | Path to a mikrotik exporter configuration file
|
| services.namecoind.rpc.key | Key file for securing RPC connections.
|
| services.nvme-rs.settings.email.smtp_password_file | File containing SMTP password
|
| services.httpd.extraConfig | Configuration lines appended to the generated Apache
configuration file
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.secret_key_file | Sets the secret key with the credentials read from the configured file
|
| services.filesender.database.createLocally | Create the PostgreSQL database and database user locally.
|
| services.athens.unixSocket | Path to the unix socket file
|
| services.prometheus.scrapeConfigs.*.basic_auth.password_file | HTTP password file
|
| services.monero.banlist | Path to a text file containing IPs to block
|
| services.kubernetes.kubeconfig.certFile | Default kubeconfig client certificate file used to connect to kube-apiserver.
|
| security.duosec.secretKeyFile | A file containing your secret key
|
| services.firezone.server.settingsSecret | This is a convenience option which allows you to set secret values for
environment variables by specifying a file which will contain the value
at runtime
|
| services.beesd.filesystems.<name>.extraOptions | Extra command-line options passed to the daemon
|
| programs.command-not-found.dbPath | Absolute path to programs.sqlite
|