| services.ceph.global.fsid | Filesystem ID, a generated uuid, its must be generated and set before
attempting to start a cluster
|
| services.cloud-init.xfs.enable | Allow the cloud-init service to operate xfs filesystem.
|
| services.cloud-init.ext4.enable | Allow the cloud-init service to operate ext4 filesystem.
|
| programs.dsearch.enable | Whether to enable dsearch, a fast filesystem search service with fuzzy matching.
|
| nix.settings.extra-sandbox-paths | Directories from the host filesystem to be included
in the sandbox.
|
| boot.specialFileSystems.<name>.enable | Whether to enable the filesystem mount.
|
| services.cloud-init.btrfs.enable | Allow the cloud-init service to operate btrfs filesystem.
|
| services.gitea-actions-runner.instances.<name>.labels | Labels used to map jobs to their runtime environment
|
| services.envfs.enable | Fuse filesystem that returns symlinks to executables based on the PATH
of the requesting process
|
| services.znapzend.noDestroy | Does all changes to the filesystem except destroy.
|
| services.multipath.pathGroups.*.fsType | Type of the filesystem
|
| services.k3s.autoDeployCharts.<name>.name | The name of the Helm chart
|
| services.k3s.autoDeployCharts.<name>.repo | The repo of the Helm chart
|
| services.autotierfs.enable | Whether to enable the autotier passthrough tiering filesystem.
|
| services.rke2.autoDeployCharts.<name>.name | The name of the Helm chart
|
| services.k3s.autoDeployCharts.<name>.hash | The hash of the packaged Helm chart
|
| services.rke2.autoDeployCharts.<name>.repo | The repo of the Helm chart
|
| services.rke2.autoDeployCharts.<name>.hash | The hash of the packaged Helm chart
|
| services.transmission.settings.script-torrent-done-enabled | Whether to run
services.transmission.settings.script-torrent-done-filename
at torrent completion.
|
| services.snapper.configs.<name>.FSTYPE | Filesystem type
|
| programs.xfs_quota.projects | Setup of xfs_quota projects
|
| services.hadoop.hdfs.datanode.dataDirs.*.path | Determines where on the local filesystem a data node should store its blocks.
|
| image.repart.partitions.<name>.contents | The contents to end up in the filesystem image.
|
| boot.initrd.luks.devices.<name>.yubikey.storage.fsType | The filesystem of the unencrypted device.
|
| services.k3s.autoDeployCharts.<name>.version | The version of the Helm chart
|
| services.znapzend.features.recvu | Whether to enable recvu feature which uses -u on the receiving end to keep the destination
filesystem unmounted
.
|
| hardware.firmware | List of packages containing firmware files
|
| services.rke2.autoDeployCharts.<name>.version | The version of the Helm chart
|
| services.dockerRegistry.storagePath | Docker registry storage path for the filesystem storage backend
|
| services.earlyoom.killHook | An absolute path to an executable to be run for each process killed
|
| services.tee-supplicant.reeFsParentPath | The directory where the secure filesystem will be stored in the rich
execution environment (REE FS).
|
| services.librespeed.secrets | Attribute set of filesystem paths
|
| systemd.enableEmergencyMode | Whether to enable emergency mode, which is an
sulogin shell started on the console if
mounting a filesystem fails
|
| networking.dhcpcd.runHook | Shell code that will be run after all other hooks
|
| services.tahoe.nodes.<name>.storage.reservedSpace | The amount of filesystem space to not use for storage.
|
| services.borgbackup.jobs.<name>.dumpCommand | Backup the stdout of this program instead of filesystem paths
|
| virtualisation.rootDevice | The path (inside the VM) to the device containing the root filesystem.
|
| nix.channel.enable | Whether the nix-channel command and state files are made available on the machine
|
| services.cloud-init.enable | Enable the cloud-init service
|
| boot.kernel.sysfs | sysfs attributes to be set as soon as they become available
|
| services.gitDaemon.repositories | A whitelist of paths of git repositories, or directories containing repositories
all of which would be published
|
| services.fcgiwrap.instances.<name>.socket.address | Socket address
|
| services.tarsnap.archives.<name>.directories | List of filesystem paths to archive.
|
| virtualisation.lxc.lxcfs.enable | This enables LXCFS, a FUSE filesystem for LXC
|
| virtualisation.writableStoreUseTmpfs | Use a tmpfs for the writable store instead of writing to the VM's
own filesystem.
|
| virtualisation.writableStore | If enabled, the Nix store in the VM is made writable by
layering an overlay filesystem on top of the host's Nix
store
|
| services.libeufin.nexus.settings.nexus-ebics.BANK_PUBLIC_KEYS_FILE | Filesystem location where Nexus should store the bank public keys.
|
| containers.<name>.ephemeral | Runs container in ephemeral mode with the empty root filesystem at boot
|
| services.zfs.autoReplication.localFilesystem | Local ZFS filesystem from which snapshots should be sent
|
| services.zfs.autoReplication.remoteFilesystem | Remote ZFS filesystem where snapshots should be sent.
|
| hardware.firmwareCompression | Whether to compress firmware files
|
| programs.nncp.secrets | A list of paths to NNCP configuration files that should not be
in the Nix store
|
| services.libeufin.nexus.settings.nexus-ebics.CLIENT_PRIVATE_KEYS_FILE | Filesystem location where Nexus should store the subscriber private keys.
|
| services.tomcat.sharedLibs | List containing JAR files or directories with JAR files which are libraries shared by the web applications
|
| services.rustus.storage | Storages are used to actually store your files
|
| services.tomcat.webapps | List containing WAR files or directories with WAR files which are web applications to be deployed on Tomcat
|
| services.veilid.settings.core.block_store.directory | The filesystem directory to store blocks for the block store.
|
| services.veilid.settings.core.table_store.directory | The filesystem directory to store your table store within.
|
| services.tomcat.commonLibs | List containing JAR files or directories with JAR files which are libraries shared by the web applications and the servlet container
|
| services.nextcloud.config.objectstore.s3.enable | Whether to enable S3 object storage as primary storage
|
| virtualisation.sharedDirectories | An attributes set of directories that will be shared with the
virtual machine using VirtFS (9P filesystem over VirtIO)
|
| services.bird.checkConfig | Whether the config should be checked at build time
|
| virtualisation.useNixStoreImage | Build and use a disk image for the Nix store, instead of
accessing the host's one through 9p
|
| xdg.menus.enable | Whether to install files to support the
XDG Desktop Menu specification.
|
| xdg.icons.enable | Whether to install files to support the
XDG Icon Theme specification.
|
| xdg.mime.enable | Whether to install files to support the
XDG Shared MIME-info specification and the
XDG MIME Applications specification.
|
| services.tomcat.axis2.services | List containing AAR files or directories with AAR files which are web services to be deployed on Axis2
|
| xdg.sounds.enable | Whether to install files to support the
XDG Sound Theme specification.
|
| boot.initrd.extraFiles | Extra files to link and copy in to the initrd.
|
| services.userborn.passwordFilesLocation | The location of the original password files
|
| services.displayManager.dms-greeter.configHome | Path to a user's home directory from which to copy DankMaterialShell
configuration files
|
| services.veilid.settings.core.protected_store.directory | The filesystem directory to store your protected store in.
|
| boot.initrd.prepend | Other initrd files to prepend to the final initrd we are building.
|
| services.tftpd.path | Where the tftp server files are stored.
|
| services.ombi.dataDir | The directory where Ombi stores its data files.
|
| services.plex.dataDir | The directory where Plex stores its data files.
|
| services.moonraker.configDir | Deprecated directory containing client-writable configuration files
|
| services.keycloak.realmFiles | Realm files that the server is going to import during startup
|
| services.firewalld.packages | Packages providing firewalld zones and other files
|
| services.traefik.dynamic.dir | Path to the directory Traefik should watch for configuration files.
Files in this directory matching the glob _nixos-* (reserved for Nix-managed dynamic configurations) will be deleted as part of
systemd-tmpfiles-resetup.service, regardless of their origin..
|
| services.httpd.logDir | Directory for Apache's log files
|
| services.stash.dataDir | The directory where Stash stores its files.
|
| nix.settings.auto-optimise-store | If set to true, Nix automatically detects files in the store that have
identical contents, and replaces them with hard links to a single copy
|
| services.tomcat.virtualHosts.*.webapps | List containing web application WAR files and/or directories containing
web applications and configuration files for the virtual host.
|
| services.jboss.tempDir | Location where JBoss stores its temp files
|
| services.omnom.dataDir | The directory where Omnom stores its data files.
|
| services.boinc.dataDir | The directory in which to store BOINC's configuration and data files.
|
| services.send.dataDir | Directory for uploaded files
|
| services.mosquitto.includeDirs | Directories to be scanned for further config files to include
|
| power.ups.mode | The MODE determines which part of the NUT is to be started, and
which configuration files must be modified
|
| users.mutableUsers | If set to true, you are free to add new users and groups to the system
with the ordinary useradd and
groupadd commands
|
| programs.firefox.autoConfigFiles | AutoConfig files can be used to set and lock preferences that are not covered
by the policies.json for Mac and Linux
|
| services.amule.dataDir | Directory holding configuration and by default also incoming and temporary files
|
| services.sks.dataDir | Data directory (-basedir) for SKS, where the database and all
configuration files are located (e.g
|
| services.prosody.ssl | Paths to SSL files
|
| services.kubo.emptyRepo | If set to false, the repo will be initialized with help files
|
| services.deluge.dataDir | The directory where deluge will create files.
|
| services.lidarr.dataDir | The directory where Lidarr stores its data files.
|
| services.bazarr.dataDir | The directory where Bazarr stores its data files.
|
| services.sftpgo.dataDir | The directory where SFTPGo stores its data files.
|