| services.xserver.xkb.extraLayouts.<name>.geometryFile | The path to the xkb geometry file
|
| services.discourse.mail.incoming.apiKeyFile | A file containing the Discourse API key used to add
posts and messages from mail
|
| services.discourse.database.passwordFile | File containing the Discourse database user password
|
| services.sourcehut.settings."lists.sr.ht::worker".sock | Path for the lmtp daemon's unix socket
|
| services.anuko-time-tracker.settings.email.smtpPasswordFile | Path to file containing the MTA authentication password.
|
| hardware.graphics.extraPackages32 | Additional packages to add to 32-bit graphics driver lookup path on 64-bit systems
|
| services.filebrowser.settings.database | The path to FileBrowser's Bolt database.
|
| services.blendfarm.basicSecurityPasswordFile | Path to the password file the client needs to connect to the server
|
| services.rustus.info_storage | Info storages are used to store information about file uploads
|
| services.rkvm.client.settings.certificate | TLS ceritficate path.
This should be generated with rkvm-certificate-gen.
|
| services.sabnzbd.settings.misc.https_cert | Path to the TLS certificate for the web UI
|
| services.limesurvey.encryptionKeyFile | 32-byte key used to encrypt variables in the database
|
| services.suwayomi-server.settings.server.localSourcePath | Path to the local source folder.
|
| services.openssh.knownHosts.<name>.publicKeyFile | The path to the public key file for the host
|
| services.nextcloud.notify_push.socketPath | Socket path to use for notify_push
|
| services.rkvm.server.settings.certificate | TLS certificate path.
This should be generated with rkvm-certificate-gen.
|
| services.unpoller.unifi.controllers.*.pass | Path of a file containing the password for the unifi service user
|
| services.kanidm.provision.idmAdminPasswordFile | Path to a file containing the idm admin password for kanidm
|
| services.zabbixWeb.nginx.virtualHost.sslCertificate | Path to server SSL certificate.
|
| services.librespeed.frontend.servers.*.getIpURL | URL path to IP lookup on this server
|
| services.onlyoffice.postgresPasswordFile | Path to a file that contains the password OnlyOffice should use to connect to Postgresql
|
| services.mosquitto.listeners.*.authPlugins.*.plugin | Plugin path to load, should be a .so file.
|
| services.pocket-id.environmentFile | Path to an environment file to be loaded
|
| services.pangolin.environmentFile | Path to a file containing sensitive environment variables for Pangolin
|
| services.prometheus.exporters.pve.server.keyFile | Path to a SSL private key file for the server
|
| services.jirafeau.nginxConfig.sslCertificateKey | Path to server SSL certificate key.
|
| services.sourcehut.settings.objects.s3-secret-key | An absolute file path (which should be outside the Nix-store)
to the secret key of the S3-compatible object storage service.
|
| security.acme.defaults.environmentFile | Path to an EnvironmentFile for the cert's service containing any required and
optional environment variables for your selected dnsProvider
|
| services.h2o.hosts.<name>.tls.identity.*.certificate-file | Path to certificate file
|
| programs.gnupg.agent.pinentryPackage | Which pinentry package to use
|
| services.authelia.instances.<name>.secrets.jwtSecretFile | Path to your JWT secret used during identity verificaton.
|
| services.nextcloud.notify_push.dbpassFile | The full path to a file that contains the database password.
|
| services.prometheus.exporters.pve.server.certFile | Path to a SSL certificate file for the server
|
| services.ocsinventory-agent.settings.ca | Path to CA certificates file in PEM format, for server
SSL certificate validation.
|
| services.reposilite.database.passwordFile | Path to the file containing the password for the database connection
|
| services.prometheus.exporters.ipmi.webConfigFile | Path to configuration file that can enable TLS or authentication.
|
| services.prometheus.exporters.knot.knotSocketPath | Socket path of knotd(8).
|
| virtualisation.incus.clientPackage | The incus client package to use
|
| services.hercules-ci-agent.settings.secretsJsonPath | Path to a JSON file containing secrets for effects
|
| services.thanos.rule.web.prefix-header | Name of HTTP request header used for dynamic prefixing of UI links and
redirects
|
| services.limesurvey.virtualHost.documentRoot | The path of Apache's document root directory
|
| services.dependency-track.database.passwordFile | The path to a file containing the database password.
|
| services.interception-tools.udevmonConfig | String of udevmon YAML configuration, or path to a udevmon YAML
configuration file.
|
| services.librespeed.frontend.servers.*.pingURL | URL path to latency/jitter test on this server
|
| services.szurubooru.server.settings.data_dir | Path to the static files.
|
| services.sftpgo.settings.ftpd.bindings.*.address | Network listen address
|
| services.mailpit.instances.<name>.database | Specify the local database filename to store persistent data
|
| services.zabbixWeb.nginx.virtualHost.sslCertificateKey | Path to server SSL certificate key.
|
| services.vmalert.instances.<name>.settings.rule | Path to the files with alerting and/or recording rules.
|
| services.vault-agent.instances.<name>.settings.pid_file | Path to use for the pid file.
|
| documentation.man.man-db.manualPages | The manual pages to generate caches for if documentation.man.generateCaches
is enabled
|
| services.ghostunnel.servers.<name>.keystore | Path to keystore (combined PEM with cert/key, or PKCS12 keystore)
|
| services.thanos.downsample.objstore.config-file | Path to YAML file that contains object store configuration
|
| services.neo4j.directories.plugins | Path of the database plugin directory
|
| services.pretix.settings.memcached.location | The host:port combination or the path to the UNIX socket of a memcached instance
|
| services.limesurvey.encryptionNonceFile | 24-byte used to encrypt variables in the database
|
| services.mediawiki.httpd.virtualHost.documentRoot | The path of Apache's document root directory
|
| services.thanos.query-frontend.tracing.config | Tracing configuration
|
| services.lighttpd.collectd.collectionCgi | Path to collection.cgi script from (collectd sources)/contrib/collection.cgi
This option allows to use a customized version
|
| services.public-inbox.settings.publicinbox.css | The local path name of a CSS file for the PSGI web interface.
|
| services.discourse.mail.outgoing.passwordFile | A file containing the password of the SMTP server account
|
| services.xserver.desktopManager.gnome.sessionPath | Additional list of packages to be added to the session search path
|
| boot.kernelPatches | A list of additional patches to apply to the kernel
|
| services.openvscode-server.connectionTokenFile | Path to a file that contains the connection token.
|
| services.opensnitch.settings.Server.Address | Unix socket path (unix:///tmp/osui.sock, the "unix:///" part is
mandatory) or TCP socket (192.168.1.100:50051).
|
| services.prometheus.exporters.lnd.lndMacaroonDir | Path to lnd macaroons.
|
| services.tlsrpt.collectd.settings.socketname | Path at which the UNIX socket will be created.
|
| services.yggdrasil.settings.PrivateKeyPath | Path to the private key file on the host system
|
| services.xserver.desktopManager.budgie.sessionPath | Additional list of packages to be added to the session search path
|
| services.dolibarr.nginx.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| services.kanboard.nginx.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| services.librenms.nginx.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| services.agorakit.nginx.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| services.bacula-sd.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| services.bacula-fd.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| services.fediwall.nginx.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| services.prometheus.exporters.knot.knotLibraryPath | Path to the library of knot-dns.
|
| services.prometheus.exporters.postfix.showqPath | Path where Postfix places its showq socket.
|
| services.sftpgo.settings.httpd.bindings.*.address | Network listen address
|
| services.pixelfed.nginx.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| services.mainsail.nginx.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| services.sftpgo.settings.sftpd.bindings.*.address | Network listen address
|
| services.warpgate.settings.http.certificate | Path to HTTPS listener certificate.
|
| services.hercules-ci-agent.settings.binaryCachesPath | Path to a JSON file containing binary cache secret keys
|
| services.thanos.query.web.prefix-header | Name of HTTP request header used for dynamic prefixing of UI links and
redirects
|
| services.displayManager.dms-greeter.configHome | Path to a user's home directory from which to copy DankMaterialShell
configuration files
|
| services.bacula-dir.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| services.librechat.credentialsFile | Path to a file that contains environment variables
|
| virtualisation.podman.extraPackages | Extra dependencies for podman to be placed on $PATH in the wrapper.
|
| services.waagent.settings.ResourceDisk.MountPoint | This option specifies the path at which the resource disk is mounted
|
| services.reposilite.settings.keyPath | Path to the .jsk KeyStore or paths to the PKCS#8 certificate and private key, separated by a space (see example)
|
| services.gitlab.secrets.activeRecordPrimaryKeyFile | A file containing the secret used to encrypt some rails data
in the DB
|
| hardware.nvidia-container-toolkit.mounts.*.containerPath | Container path.
|
| services.btrbk.instances.<name>.snapshotOnly | Whether to run in snapshot only mode
|
| services.healthchecks.settings.SECRET_KEY_FILE | Path to a file containing the secret key.
|
| services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".http.ip | Listener IP address or Unix socket path
|
| services.printing.cups-pdf.instances.<name>.settings.AnonDirName | path for anonymously created PDF files
|
| services.prometheus.exporters.dnsmasq.leasesPath | Path to the dnsmasq.leases file.
|
| services.rosenpass.settings.public_key | Path to a file containing the public key of the local Rosenpass peer
|
| services.maddy.ensureCredentials.<name>.passwordFile | Specifies the path to a file containing the
clear text password for the user.
|