| services.webhook.hooks | The actual configuration of which hooks will be served
|
| services.buildkite-agents.<name>.hooksPath | Path to the directory storing the hooks
|
| services.webhook.hooks.<name>.id | The ID of your hook
|
| services.autorandr.hooks | Global hook scripts
|
| services.buildkite-agents.<name>.hooks | "Agent" hooks to install
|
| services.webhook.hooksTemplated | Same as hooks, but these hooks are specified as literal strings instead of Nix values,
and hence can include template syntax
which might not be representable as JSON
|
| services.apcupsd.hooks | Each attribute in this option names an apcupsd event and the string
value it contains will be executed in a shell, in response to that
event (prior to the default action)
|
| services.matrix-hookshot.enable | Whether to enable matrix-hookshot, a bridge between Matrix and project management services.
|
| services.matrix-hookshot.package | The matrix-hookshot package to use.
|
| virtualisation.libvirtd.hooks.lxc | Hooks that will be placed under /var/lib/libvirt/hooks/lxc.d/
and called for lxc domains begin/end events
|
| virtualisation.libvirtd.hooks.qemu | Hooks that will be placed under /var/lib/libvirt/hooks/qemu.d/
and called for qemu domains begin/end/migrate events
|
| services.webhook.hooks.<name>.execute-command | The command that should be executed when the hook is triggered.
|
| services.certspotter.hooks | Scripts to run upon the detection of a new certificate
|
| virtualisation.libvirtd.hooks.libxl | Hooks that will be placed under /var/lib/libvirt/hooks/libxl.d/
and called for libxl-handled xen domains begin/end events
|
| virtualisation.libvirtd.hooks | Hooks related options.
|
| services.autorandr.profiles.<name>.hooks | Profile hook scripts.
|
| virtualisation.libvirtd.hooks.daemon | Hooks that will be placed under /var/lib/libvirt/hooks/daemon.d/
and called for daemon start/shutdown/SIGHUP events
|
| hardware.nvidia-container-toolkit.enable-hooks | List of hooks to enable when generating the CDI specification
|
| services.matrix-hookshot.settings | config.yml configuration as a Nix attribute set
|
| virtualisation.libvirtd.hooks.network | Hooks that will be placed under /var/lib/libvirt/hooks/network.d/
and called for networks begin/end events
|
| hardware.nvidia-container-toolkit.disable-hooks | List of hooks to disable when generating the CDI specification
|
| services.xscreensaver.hooks | An attrset of events and commands to run upon each event
|
| services.autorandr.hooks.preswitch | Preswitch hook executed before mode switch.
|
| services.autorandr.hooks.predetect | Predetect hook executed before autorandr attempts to run xrandr.
|
| services.matrix-hookshot.settings.passFile | A passkey used to encrypt tokens stored inside the bridge
|
| services.autorandr.hooks.postswitch | Postswitch hook executed after mode switch.
|
| services.autorandr.profiles.<name>.hooks.preswitch | Preswitch hook executed before mode switch.
|
| services.autorandr.profiles.<name>.hooks.predetect | Predetect hook executed before autorandr attempts to run xrandr.
|
| services.autorandr.profiles.<name>.hooks.postswitch | Postswitch hook executed after mode switch.
|
| services.matrix-hookshot.registrationFile | Appservice registration file
|
| services.matrix-hookshot.serviceDependencies | List of Systemd services to require and wait for when starting the application service,
such as the Matrix homeserver if it's running on the same host.
|
| services.gitolite.commonHooks | A list of custom git hooks that get copied to ~/.gitolite/hooks/common.
|
| systemd.packages | Packages providing systemd units and hooks.
|
| networking.dhcpcd.runHook | Shell code that will be run after all other hooks
|
| services.sourcehut.hg.webhooks.extraArgs | Extra arguments passed to the Celery responsible for webhooks.
|
| services.sourcehut.git.webhooks.extraArgs | Extra arguments passed to the Celery responsible for webhooks.
|
| services.sourcehut.meta.webhooks.extraArgs | Extra arguments passed to the Celery responsible for webhooks.
|
| services.sourcehut.todo.webhooks.extraArgs | Extra arguments passed to the Celery responsible for webhooks.
|
| services.sourcehut.lists.webhooks.extraArgs | Extra arguments passed to the Celery responsible for webhooks.
|
| services.webhook.ip | The IP webhook should serve hooks on
|
| services.sourcehut.hg.webhooks.celeryConfig | Content of the celeryconfig.py used by the Celery responsible for webhooks.
|
| services.sourcehut.git.webhooks.celeryConfig | Content of the celeryconfig.py used by the Celery responsible for webhooks.
|
| services.sourcehut.settings."hg.sr.ht".webhooks | The Redis connection used for the webhooks worker.
|
| services.sourcehut.settings."git.sr.ht".webhooks | The Redis connection used for the webhooks worker.
|
| services.sourcehut.meta.webhooks.celeryConfig | Content of the celeryconfig.py used by the Celery responsible for webhooks.
|
| services.sourcehut.todo.webhooks.celeryConfig | Content of the celeryconfig.py used by the Celery responsible for webhooks.
|
| services.sourcehut.settings."meta.sr.ht".webhooks | The Redis connection used for the webhooks worker.
|
| services.sourcehut.settings."todo.sr.ht".webhooks | The Redis connection used for the webhooks worker.
|
| services.sourcehut.lists.webhooks.celeryConfig | Content of the celeryconfig.py used by the Celery responsible for webhooks.
|
| services.sourcehut.settings."lists.sr.ht".webhooks | The Redis connection used for the webhooks worker.
|
| services.webhook.urlPrefix | The URL path prefix to use for served hooks (protocol://yourserver:port/${prefix}/hook-id).
|
| boot.initrd.systemd.packages | Packages providing systemd units and hooks.
|
| services.webhook.enable | Whether to enable Webhook, a server written in Go that allows you to create HTTP endpoints (hooks),
which execute configured commands for any person or service that knows the URL
.
|
| services.sourcehut.settings.webhooks.private-key | An absolute file path (which should be outside the Nix-store)
to a base64-encoded Ed25519 key for signing webhook payloads
|
| networking.dhcpcd.allowSetuid | Whether to relax the security sandbox to allow running setuid
binaries (e.g. sudo) in the dhcpcd hooks.
|
| services.lifecycled.enable | Whether to enable lifecycled, a daemon for responding to AWS AutoScaling Lifecycle Hooks.
|
| services.webhook.enableTemplates | Enable the generated hooks file to be parsed as a Go template
|
| networking.networkmanager.dispatcherScripts.*.type | Dispatcher hook type
|