| services.teleport.settings | Contents of the teleport.yaml config file
|
| services.radicle.ci.broker.checkConfig | Whether to enable checking the ci-broker.yaml file resulting from services.radicle.ci.broker.settings.
|
| services.osrm.dataFile | Data file location
|
| services.nghttpx.rlimit-nofile | Set maximum number of open files (RLIMIT_NOFILE) to <N>
|
| services.gammu-smsd.backend.files.errorSMSPath | Where SMSes with error in transmission is placed
|
| services.tailscale.serve.configFile | Path to a Tailscale Serve configuration file in JSON format
|
| virtualisation.fileSystems.<name>.encrypted.blkDev | Location of the backing encrypted device.
|
| services.syslogd.defaultConfig | The default syslog.conf file configures a
fairly standard setup of log files, which can be extended by
means of extraConfig.
|
| services.dnsproxy.settings | Contents of the config.yaml config file
|
| services.openvpn.servers.<name>.config | Configuration of this OpenVPN instance
|
| services.mqtt2influxdb.environmentFiles | File to load as environment file
|
| services.maubot.extraConfigFile | A file for storing secrets
|
| services.pretalx.settings.files.upload_limit | Maximum file upload size in MiB.
|
| systemd.user.tmpfiles.users.<name>.rules | Per-user rules for creation, deletion and cleaning of volatile and
temporary files automatically
|
| services.mosquitto.listeners.*.users.<name>.hashedPasswordFile | Specifies the path to a file containing the
hashed password for the MQTT user
|
| services.weblate.smtp.passwordFile | Location of a file containing the SMTP password
|
| services.nominatim.database.passwordFile | Password file used for Nominatim database connection
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| boot.plymouth.font | Font file made available for displaying text on the splash screen.
|
| services.nextcloud.config.objectstore.s3.sseCKeyFile | If provided this is the full path to a file that contains the key
to enable [server-side encryption with customer-provided keys][1]
(SSE-C)
|
| swapDevices.*.device | Path of the device or swap file.
|
| services.ttyd.caFile | SSL CA file path for client certificate verification.
|
| services.seafile.ccnetSettings | Configuration for ccnet, see
https://manual.seafile.com/config/ccnet-conf/
for supported values.
|
| services.filebeat.inputs.<name>.type | The input type
|
| services.traccar.environmentFile | File containing environment variables to substitute in the configuration before starting Traccar
|
| services.send.redis.passwordFile | The path to the file containing the Redis password
|
| services.gammu-smsd.backend.files.outboxPath | Where SMSes to be sent should be placed
|
| services.etcd.certFile | Cert file to use for clients
|
| services.ttyd.certFile | SSL certificate file path.
|
| security.pam.rssh.settings.auth_key_file | Path to file with trusted public keys in OpenSSH's authorized_keys format
|
| fonts.fontconfig.enable | If enabled, a Fontconfig configuration file will be built
pointing to a set of default fonts
|
| services.unpoller.influxdb.pass | Path of a file containing the password for influxdb
|
| environment.etc.<name>.group | Group name of file owner
|
| services.rke2.extraKubeletConfig | Extra configuration to add to the kubelet's configuration file
|
| services.vaultwarden.config | The configuration of vaultwarden is done through environment variables,
therefore it is recommended to use upper snake case (e.g. DISABLE_2FA_REMEMBER)
|
| services.librechat.credentialsFile | Path to a file that contains environment variables
|
| services.filesender.enable | Whether to enable FileSender.
|
| services.prosody-filer.settings | Configuration for Prosody Filer
|
| boot.plymouth.logo | Logo which is displayed on the splash screen
|
| services.cfssl.ca | CA used to sign the new certificate -- accepts '[file:]fname' or 'env:varname'.
|
| boot.iscsi-initiator.extraConfigFile | Append an additional file's contents to /etc/iscsid.conf
|
| security.dhparams.params.<name>.path | The resulting path of the generated Diffie-Hellman parameters
file for other services to reference
|
| services.hylafax.sendmailPath | Path to sendmail program
|
| services.cfssl.caKey | CA private key -- accepts '[file:]fname' or 'env:varname'.
|
| services.hydra.logo | Path to a file containing the logo of your Hydra instance.
|
| services.prometheus.exporters.postfix.logfilePath | Path where Postfix writes log entries
|
| services.honk.extraJS | An extra JavaScript file to be loaded by the client.
|
| programs.hyprland.enable | Whether to enable Hyprland, the dynamic tiling Wayland compositor that doesn't sacrifice on its looks
|
| services.arbtt.logFile | The log file for captured samples.
|
| services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.vdirsyncer.jobs.<name>.configFile | existing configuration file
|
| systemd.mounts.*.what | Absolute path of device node, file or other resource. (Mandatory)
|
| services.sillytavern.configFile | Path to the SillyTavern configuration file.
|
| services.ddclient.secretsFile | A file containing the secrets for the dynamic DNS provider
|
| virtualisation.fileSystems.<name>.overlay.workdir | The path to the workdir
|
| services.seafile.seahubAddress | Which address to bind the seahub server to, of the form:
|
| services.k3s.extraKubeProxyConfig | Extra configuration to add to the kube-proxy's configuration file
|
| services.immich.settings | Configuration for Immich
|
| security.pam.services.<name>.u2fAuth | If set, users listed in
$XDG_CONFIG_HOME/Yubico/u2f_keys (or
$HOME/.config/Yubico/u2f_keys if XDG variable is
not set) are able to log in with the associated U2F key
|
| environment.profiles | A list of profiles used to setup the global environment.
|
| services.postfix.settings.master | The master.cf configuration file as an attribute set of service
defitions
|
| services.etebase-server.settings.global.secret_file | The path to a file containing the secret
used as django's SECRET_KEY.
|
| virtualisation.fileSystems.<name>.device | The device as passed to mount
|
| hardware.sane.drivers.scanSnap.package | The epjitsu package to use
|
| systemd.tmpfiles.settings | Declare systemd-tmpfiles rules to create, delete, and clean up volatile
and temporary files and directories
|
| services.firezone.relay.tokenFile | A file containing the firezone relay token
|
| services.filebrowser.user | User account under which FileBrowser runs.
|
| services.honk.extraCSS | An extra CSS file to be loaded by the client.
|
| services.sympa.domains.<name>.settings | The robot.conf configuration file as key value set
|
| services.autorandr.profiles | Autorandr profiles specification.
|
| services.sshguard.blacklist_file | Blacklist an attacker when its score exceeds threshold
|
| services.canaille.secretKeyFile | File containing the Flask secret key
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.postgrest.pgpassFile | The password to authenticate to PostgreSQL with
|
| virtualisation.fileSystems.<name>.encrypted.label | Label of the unlocked encrypted device
|
| services.xserver.windowManager.i3.configFile | Path to the i3 configuration file
|
| programs.neovim.configure | Generate your init file from your list of plugins and custom commands
|
| boot.readOnlyNixStore | If set, NixOS will enforce the immutability of the Nix store
by making /nix/store a read-only bind
mount
|
| services.rsyslogd.defaultConfig | The default syslog.conf file configures a
fairly standard setup of log files, which can be extended by
means of extraConfig.
|
| services.xrdp.sslKey | ssl private key path
A self-signed certificate will be generated if file not exists.
|
| services.neo4j.bolt.sslPolicy | Neo4j SSL policy for BOLT traffic
|
| programs.openvpn3.netcfg.settings | Options stored in /etc/openvpn3/netcfg.json configuration file
|
| services.vsftpd.userlistFile | Newline separated list of names to be allowed/denied if userlistEnable
is true
|
| virtualisation.fileSystems.<name>.encrypted.enable | The block device is backed by an encrypted one, adds this device as a initrd luks entry.
|
| services.nsd.zonefilesWrite | Write changed secondary zones to their zonefile every N seconds
|
| services.hylafax.modems.<name>.config | Attribute set of values for the given modem
|
| power.ups.upsmon.monitor.<name>.passwordFile | The full path to a file containing the password from
upsd.users for accessing this UPS
|
| image.repart.split | Enables generation of split artifacts from partitions
|
| virtualisation.fileSystems.<name>.depends | List of paths that should be mounted before this one
|
| services.tox-node.keysFile | Path to the file where DHT keys are stored.
|
| services.coturn.cert | Certificate file in PEM format.
|