| fileSystems.<name>.neededForBoot | If set, this file system will be mounted in the initial ramdisk
|
| image.fileName | Filename of the image including all extensions (e.g image_1.raw or
image_1.raw.zst).
|
| fileSystems | The file systems to be mounted
|
| image.filePath | Path of the image, relative to $out in system.build.image
|
| fileSystems.<name>.fsType | Type of the file system
|
| services.gammu-smsd.log.file | Path to file where information about communication will be stored
|
| services.i2pd.reseed.file | Full path to SU3 file to reseed from.
|
| services.gns3-server.log.file | Path of the file GNS3 Server should log to.
|
| services.bind.zones.<name>.file | Zone file resource records contain columns of data, separated by whitespace, that define the record.
|
| fileSystems.<name>.noCheck | Disable running fsck on this filesystem.
|
| fileSystems.<name>.mountPoint | Location where the file system will be mounted
|
| services.gitea.dump.file | Filename to be used for the dump
|
| services.coturn.dh-file | Use custom DH TLS key, stored in PEM format in the file.
|
| fileSystems.<name>.enable | Whether to enable the filesystem mount.
|
| virtualisation.fileSystems.<name>.neededForBoot | If set, this file system will be mounted in the initial ramdisk
|
| services.traefik.static.file | Path to Traefik's static configuration file.
|
| fileSystems.<name>.label | Label of the device
|
| programs.file-roller.enable | Whether to enable File Roller, an archive manager for GNOME.
|
| services.forgejo.dump.file | Filename to be used for the dump
|
| services.gnunet.fileSharing.quota | Maximum file system usage (in MiB) for file sharing.
|
| services.traefik.dynamic.file | Path to Traefik's dynamic configuration file.
You cannot use this option alongside the declarative configuration options.
|
| programs.file-roller.package | The file-roller package to use.
|
| fileSystems.<name>.options | Options used to mount the file system
|
| fileSystems.<name>.autoFormat | If the device does not currently contain a filesystem (as
determined by blkid), then automatically
format it with the filesystem type specified in
fsType
|
| fileSystems.<name>.autoResize | If set, the filesystem is grown to its maximum size before
being mounted. (This is typically the size of the containing
partition.) This is currently only supported for ext2/3/4
filesystems that are mounted during early boot.
|
| services.filebeat.settings | Configuration for filebeat
|
| services.oauth2-proxy.htpasswd.file | Additionally authenticate against a htpasswd file
|
| services.tahoe.nodes.<name>.sftpd.accounts.file | Path to the accounts file.
|
| security.pam.u2f.settings.authfile | By default pam-u2f module reads the keys from
$XDG_CONFIG_HOME/Yubico/u2f_keys (or
$HOME/.config/Yubico/u2f_keys if XDG variable is
not set)
|
| services.coturn.static-auth-secret-file | Path to the file containing the static authentication secret.
|
| fileSystems.<name>.stratis.poolUuid | UUID of the stratis pool that the fs is located in
This is only relevant if you are using stratis.
|
| fileSystems.<name>.device | The device as passed to mount
|
| services.coder.environment.file | Systemd environment file to add to Coder.
|
| services.movim.h2o.tls.identity.*.key-file | Path to key file
|
| fileSystems.<name>.depends | List of paths that should be mounted before this one
|
| services.h2o.hosts.<name>.tls.identity.*.key-file | Path to key file
|
| services.hickory-dns.settings.zones.*.file | Path to the .zone file
|
| systemd.tmpfiles.packages | List of packages containing systemd-tmpfiles rules
|
| fileSystems.<name>.encrypted.blkDev | Location of the backing encrypted device.
|
| services.restic.server.htpasswd-file | The path to the servers .htpasswd file
|
| xdg.portal.config | Sets which portal backend should be used to provide the implementation
for the requested interface
|
| services.bcg.mqtt.cafile | Certificate Authority file for MQTT server access.
|
| services.thanos.rule.tracing.config-file | Path to YAML file that contains tracing configuration
|
| fileSystems.<name>.encrypted.keyFile | Path to a keyfile used to unlock the backing encrypted
device
|
| fileSystems.<name>.overlay.workdir | The path to the workdir
|
| services.orangefs.server.fileSystems | These options will create the <FileSystem> sections of config file.
|
| services.spiped.config.<name>.keyfile | Name of a file containing the spiped key
|
| services.thanos.query.tracing.config-file | Path to YAML file that contains tracing configuration
|
| services.thanos.store.tracing.config-file | Path to YAML file that contains tracing configuration
|
| services.routinator.settings.log-file | A string value containing the path to a file to which log messages will be appended if the log configuration value is set to file
|
| services.snipe-it.config | Snipe-IT configuration options to set in the
.env file
|
| virtualisation.qemu.drives.*.file | The file image used for this drive.
|
| services.dolibarr.h2o.tls.identity.*.key-file | Path to key file
|
| services.pgbackrest.repos.<name>.sftp-private-key-file | SFTP private key file
|
| fileSystems.<name>.encrypted.label | Label of the unlocked encrypted device
|
| services.bcg.mqtt.keyfile | Key file for MQTT server access.
|
| services.thanos.rule.objstore.config-file | Path to YAML file that contains object store configuration
|
| services.orangefs.client.fileSystems | The orangefs file systems to be mounted
|
| services.orangefs.server.fileSystems.<name>.id | File system ID (must be unique within configuration).
|
| services.thanos.store.objstore.config-file | Path to YAML file that contains object store configuration
|
| services.suricata.settings.logging.outputs.file.filename | Filename of the logfile.
|
| fileSystems.<name>.encrypted.enable | The block device is backed by an encrypted one, adds this device as a initrd luks entry.
|
| services.thanos.sidecar.tracing.config-file | Path to YAML file that contains tracing configuration
|
| services.thanos.receive.tracing.config-file | Path to YAML file that contains tracing configuration
|
| services.thanos.compact.tracing.config-file | Path to YAML file that contains tracing configuration
|
| services.teamspeak3.fileTransferPort | TCP port opened for file transfers.
|
| virtualisation.fileSystems | The file systems to be mounted
|
| services.teamspeak3.fileTransferIP | IP on which the server instance will listen for incoming file transfer connections
|
| boot.loader.grub.extraFiles | A set of files to be copied to /boot
|
| services.thanos.sidecar.reloader.config-file | Config file watched by the reloader.
|
| services.seafile.seafileSettings.fileserver.port | The tcp port used by seafile fileserver.
|
| fileSystems.<name>.overlay.upperdir | The path to the upperdir
|
| systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.mode | The file access mode to use when creating this file or directory.
|
| services.thanos.sidecar.reloader.config-envsubst-file | Output file for environment variable substituted config file.
|
| services.bcg.mqtt.certfile | Certificate file for MQTT server access.
|
| fileSystems.<name>.overlay.lowerdir | The list of path(s) to the lowerdir(s)
|
| services.thanos.compact.objstore.config-file | Path to YAML file that contains object store configuration
|
| services.thanos.receive.objstore.config-file | Path to YAML file that contains object store configuration
|
| services.thanos.sidecar.objstore.config-file | Path to YAML file that contains object store configuration
|
| systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.age | Delete a file when it reaches a certain age
|
| services.postfix-tlspol.settings.server.cache-file | Path to the cache file.
|
| services.suricata.settings.logging.outputs.file.enable | Whether to enable logging to file.
|
| services.orangefs.server.fileSystems.<name>.rootHandle | File system root ID.
|
| services.i2pd.reseed.zipfile | Path to local .zip file to reseed from.
|
| services.postsrsd.settings.secrets-file | Path to the file containing the secret keys.
Secrets are passed using LoadCredential= on the systemd unit,
so this options is read-only
|
| services.bookstack.config | BookStack configuration options to set in the
.env file
|
| services.strongswan-swanctl.swanctl.secrets.rsa.<name>.file | File name in the rsa folder for which this passphrase
should be used.
|
| services.hardware.pommed.configFile | The path to the pommed.conf file
|
| services.thanos.query-frontend.tracing.config-file | Path to YAML file that contains tracing configuration
|
| services.suricata.settings.threshold-file | Suricata threshold configuration file.
|
| services.prosody-filer.enable | Whether to enable Prosody Filer XMPP upload file server.
|
| services.seafile.seafileSettings.fileserver.host | The bind address used by seafile fileserver
|
| services.thanos.rule.query.sd-files | Path to file that contain addresses of query peers
|
| services.strongswan-swanctl.swanctl.secrets.ecdsa.<name>.file | File name in the ecdsa folder for which this
passphrase should be used.
|
| services.strongswan-swanctl.swanctl.secrets.pkcs8.<name>.file | File name in the pkcs8 folder for which this
passphrase should be used.
|
| services.seafile.seafileSettings | Configuration for seafile-server, see
https://manual.seafile.com/config/seafile-conf/
for supported values.
|
| services.asusd.profileConfig.text | Text of the file.
|
| services.gitlab.extraConfig | Extra options to be added under
production in
config/gitlab.yml, as a nix attribute
set
|
| systemd.services.<name>.confinement.mode | The value full-apivfs (the default) sets up
private /dev, /proc,
/sys, /tmp and /var/tmp file systems
in a separate user name space
|
| services.btrfs.autoScrub.fileSystems | List of paths to btrfs filesystems to regularly call btrfs scrub on
|