| services.k3s.extraKubeProxyConfig | Extra configuration to add to the kube-proxy's configuration file
|
| services.autorandr.profiles.<name>.config.<name>.scale.y | Vertical scaling factor/pixels.
|
| services.autorandr.profiles.<name>.config.<name>.scale.x | Horizontal scaling factor/pixels.
|
| services.privoxy.settings.filterfile | List of paths to Privoxy filter files
|
| services.watchdogd.settings.filenr.interval | Amount of seconds between every poll.
|
| services.rsyslogd.defaultConfig | The default syslog.conf file configures a
fairly standard setup of log files, which can be extended by
means of extraConfig.
|
| networking.networkmanager.ensureProfiles.profiles.<name>.connection.id | This is the name that will be displayed by NetworkManager and GUIs.
|
| services.autorandr.profiles.<name>.config.<name>.enable | Whether to enable the output.
|
| services.autorandr.profiles.<name>.config.<name>.rotate | Output rotate configuration.
|
| services.libinput.mouse.accelProfile | Sets the pointer acceleration profile to the given profile
|
| services.seafile.ccnetSettings.General.SERVICE_URL | Seahub public URL.
|
| services.canaille.secretKeyFile | File containing the Flask secret key
|
| programs.openvpn3.netcfg.settings | Options stored in /etc/openvpn3/netcfg.json configuration file
|
| services.postgrest.pgpassFile | The password to authenticate to PostgreSQL with
|
| services.postfix.settings.master | The master.cf configuration file as an attribute set of service
defitions
|
| services.rke2.extraKubeProxyConfig | Extra configuration to add to the kube-proxy's configuration file
|
| services.dnscrypt-proxy.configFile | Path to TOML config file
|
| services.honk.extraJS | An extra JavaScript file to be loaded by the client.
|
| services.cfssl.caKey | CA private key -- accepts '[file:]fname' or 'env:varname'.
|
| boot.plymouth.logo | Logo which is displayed on the splash screen
|
| services.cfssl.ca | CA used to sign the new certificate -- accepts '[file:]fname' or 'env:varname'.
|
| services.hydra.logo | Path to a file containing the logo of your Hydra instance.
|
| services.arbtt.logFile | The log file for captured samples.
|
| services.firezone.relay.tokenFile | A file containing the firezone relay token
|
| services.vsftpd.userlistFile | Newline separated list of names to be allowed/denied if userlistEnable
is true
|
| services.prometheus.alertmanager.environmentFile | File to load as environment file
|
| hardware.sane.drivers.scanSnap.package | The epjitsu package to use
|
| services.angrr.settings.profile-policies.<name>.enable | Whether to enable this angrr policy.
|
| services.komodo-periphery.configFile | Path to the periphery configuration file
|
| boot.readOnlyNixStore | If set, NixOS will enforce the immutability of the Nix store
by making /nix/store a read-only bind
mount
|
| services.honk.extraCSS | An extra CSS file to be loaded by the client.
|
| services.sssd.config | Contents of sssd.conf.
|
| services.watchdogd.settings.filenr.critical | The critical watermark level
|
| networking.networkmanager.ensureProfiles.profiles.<name>.connection.type | The connection type defines the connection kind, like vpn, wireguard, gsm, wifi and more.
|
| services.angrr.settings.profile-policies.<name>.keep-since | Retention period for the GC roots in this profile.
|
| services.bacula-sd.device.<name>.archiveDevice | The specified name-string gives the system file name of the storage
device managed by this storage daemon
|
| services.thanos.downsample.objstore.config | Object store configuration
|
| services.nitter.preferences.stickyProfile | Make profile sidebar stick to top.
|
| power.ups.upsmon.monitor.<name>.passwordFile | The full path to a file containing the password from
upsd.users for accessing this UPS
|
| services.filesender.settings.admin_email | Email address of FileSender administrator(s)
|
| services.glance.environmentFile | Path to an environment file as defined in systemd.exec(5)
|
| services.hercules-ci-agent.settings.clusterJoinTokenPath | Location of the cluster-join-token.key file
|
| services.neo4j.bolt.sslPolicy | Neo4j SSL policy for BOLT traffic
|
| services.coturn.cert | Certificate file in PEM format.
|
| services.tox-node.keysFile | Path to the file where DHT keys are stored.
|
| services.xrdp.sslKey | ssl private key path
A self-signed certificate will be generated if file not exists.
|
| services.docuseal.secretKeyBaseFile | Path to file containing the secret key base
|
| services.openafsClient.globalCellServDBFile | Global CellServDB file to be deployed
|
| services.hercules-ci-agent.settings | These settings are written to the agent.toml file
|
| services.prometheus.remoteRead.*.basic_auth.password_file | HTTP password file
|
| services.autorandr.profiles.<name>.config.<name>.primary | Whether output should be marked as primary
|
| services.mastodon.otpSecretFile | Path to file containing the OTP secret
|
| services.dnscrypt-proxy2.configFile | Path to TOML config file
|
| services.ocis.environmentFile | An environment file as defined in systemd.exec(5)
|
| services.zammad.database.settings | The database.yml configuration file as key value set
|
| services.tarsnap.archives.<name>.keyfile | Set a specific keyfile for this archive
|
| services.printing.cups-pdf.instances.<name>.settings | Settings for a cups-pdf instance, see the descriptions in the template config file in the cups-pdf package
|
| services.prometheus.remoteWrite.*.basic_auth.password_file | HTTP password file
|
| services.etcd.peerKeyFile | Key file to use for peer to peer communication
|
| image.repart.split | Enables generation of split artifacts from partitions
|
| services.coturn.pkey | Private key file in PEM format.
|
| programs.less.enable | Whether to enable less, a file pager.
|
| services.xrdp.sslCert | ssl certificate path
A self-signed certificate will be generated if file not exists.
|
| services.mosquitto.listeners.*.users.<name>.passwordFile | Specifies the path to a file containing the
clear text password for the MQTT user
|
| services.mautrix-discord.environmentFile | File containing environment variables to substitute when copying the configuration
out of Nix store to the services.mautrix-discord.dataDir
|
| services.duplicity.excludeFileList | File containing newline-separated list of paths to exclude into the
backups
|
| services.duplicity.includeFileList | File containing newline-separated list of paths to include into the
backups
|
| services.blockbook-frontend.<name>.cssDir | Location of the dir with main.css CSS file
|
| services.shairport-sync.settings | Configuration options for Shairport-Sync
|
| services.warpgate.databaseUrlFile | Path to file containing database connection string with credentials
|
| networking.networkmanager.ensureProfiles.secrets.package | The nm-file-secret-agent package to use.
|
| services.privoxy.settings.actionsfile | List of paths to Privoxy action files
|
| services.athens.downloadMode | Defines how Athens behaves when a module@version
is not found in storage
|
| services.autorandr.profiles.<name>.config.<name>.scale.method | Output scaling method.
|
| services.angrr.settings.profile-policies.<name>.keep-latest-n | Keep the latest N GC roots in this profile.
|
| services.glance.settings | Configuration written to a yaml file that is read by glance
|
| services.cloudflare-ddns.credentialsFile | Path to a file containing the Cloudflare API authentication token
|
| services.slskd.settings.retention.files.complete | Lifespan of completely downloaded files in minutes.
|
| services.cjdns.confFile | Ignore all other cjdns options and load configuration from this file.
|
| services.diod.enable | Whether to enable the diod 9P file server.
|
| programs.yazi.enable | Whether to enable yazi terminal file manager.
|
| services.oink.apiKeyFile | Path to a file containing the API key to use when modifying DNS records.
|
| services.k3s.tokenFile | File path containing the k3s token to use when connecting to a server.
|
| users.users.<name>.pamMount | Attributes for user's entry in
pam_mount.conf.xml
|
| services.gitolite.extraGitoliteRc | Extra configuration to append to the default ~/.gitolite.rc
|
| services.foundationdb.logSize | Roll over to a new log file after the current log file
reaches the specified size.
|
| programs.openvpn3.log-service.settings | Options stored in /etc/openvpn3/log-service.json configuration file
|
| services.factorio.extraSettingsFile | File, which is dynamically applied to server-settings.json before
startup
|
| services.timesyncd.servers | The set of NTP servers from which to synchronise
|
| services.unpoller.unifi.defaults.pass | Path of a file containing the password for the unifi service user
|
| services.autorandr.profiles.<name>.config.<name>.position | Output position
|
| services.rustus.storage.s3_access_key_file | File path that contains the S3 access key.
|
| services.rustus.storage.s3_secret_key_file | File path that contains the S3 secret key.
|
| services.buffyboard.configFile | Path to an INI format configuration file to provide Buffyboard
|
| boot.loader.grub.users.<name>.hashedPasswordFile | Specifies the path to a file containing the password hash
for the account, generated with grub-mkpasswd-pbkdf2
|
| services.scrutiny.settings | Scrutiny settings to be rendered into the configuration file
|
| services.home-assistant.config | Your configuration.yaml as a Nix attribute set
|
| services.headscale.settings.database.postgres.password_file | A file containing the password corresponding to
database.user.
|
| services.engelsystem.settings | Options to be added to config.php, as a nix attribute set
|
| services.autorandr.profiles.<name>.hooks.preswitch | Preswitch hook executed before mode switch.
|