| services.keycloak.database.port | Port of the database to connect to.
|
| services.evdevremapkeys.settings | config.yaml for evdevremapkeys
|
| services.journald.remote.settings.Remote.ServerKeyFile | A path to a SSL secret key file in PEM format
|
| services.postgrest.jwtSecretFile | The secret or JSON Web Key (JWK) (or set) used to decode JWT tokens clients provide for authentication
|
| services.printing.cups-pdf.instances.<name>.settings | Settings for a cups-pdf instance, see the descriptions in the template config file in the cups-pdf package
|
| boot.initrd.luks.devices.<name>.yubikey.gracePeriod | Time in seconds to wait for the YubiKey.
|
| services.arsenik.mac | Original key arrangement on your keyboard: Mac or PC.
|
| hardware.keyboard.zsa.enable | Whether to enable udev rules for keyboards from ZSA like the ErgoDox EZ, Planck EZ and Moonlander Mark I
|
| services.sharkey.settings.fulltextSearch.provider | Which provider to use for full text search
|
| services.misskey.redis.passwordFile | The path to a file containing the Redis password
|
| services.logind.powerKey | Specifies what to do when the power key is pressed.
|
| services.xserver.autoRepeatDelay | Sets the autorepeat delay (length of time in milliseconds that a key must be depressed before autorepeat starts).
|
| services.prometheus.exporters.sabnzbd.servers.*.apiKeyFile | The path to a file containing the API key
|
| services.immichframe.settings.Accounts.*.ApiKeyFile | File containing an API key to talk to the Immich server
|
| services.misskey.reverseProxy.enable | Whether to enable a HTTP reverse proxy for Misskey.
|
| services.misskey.reverseProxy.webserver.nginx.reuseport | Create an individual listening socket
|
| programs.wshowkeys.enable | Whether to enable wshowkeys (displays keypresses on screen on supported Wayland
compositors)
|
| services.vault.tlsKeyFile | TLS private key file
|
| services.coturn.dh-file | Use custom DH TLS key, stored in PEM format in the file.
|
| boot.initrd.luks.devices.<name>.yubikey.storage.fsType | The filesystem of the unencrypted device.
|
| programs.skim.keybindings | Whether to enable skim keybindings.
|
| services.keycloak.realmFiles | Realm files that the server is going to import during startup
|
| services.misskey.redis.createLocally | Create and use a local Redis instance
|
| i18n.extraLocaleSettings | A set of additional system-wide locale settings other than LANG
which can be configured with i18n.defaultLocale
|
| services.dysnomia.components | An attribute set in which each key represents a container and each value an attribute set in which each key represents a component and each value a derivation constructing its initial state
|
| services.immichframe.settings.Accounts.*.ApiKey | API key to talk to the Immich server
|
| services.postfix.settings.main | The main.cf configuration file as key value set
|
| services.keycloak.themes | Additional theme packages for Keycloak
|
| services.skydns.etcd.tlsPem | Skydns path of TLS client certificate - public key.
|
| services.skydns.etcd.tlsKey | Skydns path of TLS client certificate - private key.
|
| services.keycloak.database.useSSL | Whether the database connection should be secured by SSL / TLS
|
| nix.sshServe.write | Whether to enable writing to the Nix store as a remote store via SSH
|
| services.misskey.reverseProxy.webserver.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| services.prometheus.remoteRead.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.arsenik.wide | The right hand is moved one key to the right.
|
| boot.initrd.luks.devices.<name>.yubikey.storage.path | Absolute path of the salt on the unencrypted device with
that device's root directory as "/".
|
| services.wastebin.secretFile | Path to file containing sensitive environment variables
|
| services.tlsrpt.fetcher.settings | Flags from tlsrpt-fetcher(1) as key-value pairs.
|
| services.tlsrpt.reportd.settings | Flags from tlsrpt-reportd(1) as key-value pairs.
|
| services.kanata.keyboards.<name>.port | Port to run the TCP server on. null will not run the server.
|
| services.misskey.reverseProxy.webserver.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.pubkeys | List of raw public key candidates to use for
authentication
|
| services.misskey.reverseProxy.webserver.nginx.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| services.kubernetes.apiserver.kubeletClientKeyFile | Key to use for connections to kubelet.
|
| services.skydns.etcd.caCert | Skydns path of TLS certificate authority public key.
|
| services.misskey.reverseProxy.webserver.nginx.locations.<name>.root | Root directory for requests.
|
| services.gitea.camoHmacKeyFile | Path to a file containing the camo HMAC key.
|
| services.openssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| services.prometheus.remoteWrite.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.zitadel.settings.TLS.Key | The TLS certificate private key, as a base64-encoded string
|
| services.gemstash.settings | Configuration for Gemstash
|
| services.unbound.checkconf | Whether to check the resulting config file with unbound checkconf for syntax errors
|
| security.acme.certs.<name>.csrKey | Path to the private key to the matching certificate signing request.
|
| services.misskey.reverseProxy.webserver.nginx.locations.<name>.index | Adds index directive.
|
| services.misskey.reverseProxy.webserver.nginx.listen.*.proxyProtocol | Enable PROXY protocol.
|
| services.misskey.reverseProxy.webserver.nginx.locations.<name>.alias | Alias directory for requests.
|
| services.kmonad.keyboards.<name>.config | Keyboard configuration.
|
| services.misskey.reverseProxy.webserver.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| services.misskey.reverseProxy.webserver.caddy.listenAddresses | A list of host interfaces to bind to for this virtual host.
|
| services.matrix-synapse.settings.trusted_key_servers | The trusted servers to download signing keys from.
|
| services.logind.rebootKey | Specifies what to do when the reboot key is pressed.
|
| services.searx.settingsFile | The path of the Searx server settings.yml file
|
| services.netbox.keycloakClientSecret | File that contains the keycloak client secret.
|
| services.sks.enable | Whether to enable SKS (synchronizing key server for OpenPGP) and start the database
server
|
| services.misskey.reverseProxy.webserver.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| services.kmonad.keyboards.<name>.device | Path to the keyboard's device file.
|
| programs.yubikey-touch-detector.enable | Whether to enable yubikey-touch-detector.
|
| services.dnsdist.dnscrypt.providerKey | The filepath to the provider secret key
|
| services.ncps.cache.hostName | The hostname of the cache server. This is used to generate the
private key used for signing store paths (.narinfo)
|
| services.misskey.reverseProxy.webserver.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| services.kanata.keyboards.<name>.extraArgs | Extra command line arguments passed to kanata.
|
| networking.wg-quick.interfaces.<name>.peers.*.presharedKeyFile | File pointing to preshared key as generated by wg genpsk
|
| services.misskey.reverseProxy.webserver.nginx.listenAddresses | Listen addresses for this virtual host
|
| services.unclutter.keystroke | Wait for a keystroke before hiding the cursor
|
| services.tlsrpt.collectd.settings | Flags from tlsrpt-collectd(1) as key-value pairs.
|
| services.evremap.settings.remap.*.input | The key sequence that should be remapped
|
| services.sympa.domains.<name>.settings | The robot.conf configuration file as key value set
|
| services.prometheus.scrapeConfigs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.keycloak.database.name | Database name to use when connecting to an external or
manually provisioned database; has no effect when a local
database is automatically provisioned
|
| services.misskey.reverseProxy.webserver.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| services.misskey.reverseProxy.webserver.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| services.buildkite-agents.<name>.privateSshKeyPath | OpenSSH private key
A run-time path to the key file, which is supposed to be provisioned
outside of Nix store.
|
| services.uptermd.hostKey | Path to SSH host key
|
| services.misskey.reverseProxy.webserver.nginx.sslCertificate | Path to server SSL certificate.
|
| services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".secret_key_base | Secret key used as a base to generate further secrets for encrypting and
signing data
|
| services.keycloak.database.host | Hostname of the database to connect to
|
| services.wstunnel.servers.<name>.tlsKey | TLS key to use instead of the hardcoded on in case of HTTPS connections
|
| services.misskey.reverseProxy.webserver.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| services.syncoid.sshKey | SSH private key file to use to login to the remote system
|
| programs.yubikey-touch-detector.verbose | Enables verbose logging
|
| services.canaille.settings.SECRET_KEY | Flask Secret Key
|
| services.self-deploy.sshKeyFile | Path to SSH private key used to fetch private repositories over
SSH.
|
| services.postfix.settings.master.<name>.name | The name of the service to run
|
| security.agnos.settings.accounts.*.certificates.*.key_output_file | Output path for the certificate private key
|
| services.zammad.database.settings | The database.yml configuration file as key value set
|
| services.keycloak.database.caCert | The SSL / TLS CA certificate that verifies the identity of the
database server
|
| services.nghttpx.tls | TLS certificate and key paths
|
| programs.tmux.shortcut | Ctrl following by this key is used as the main shortcut.
|
| services.kanata.keyboards.<name>.config | Configuration other than defcfg
|
| services.misskey.reverseProxy.webserver.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|