| systemd.services | Definition of systemd service units; see systemd.service(5).
|
| boot.initrd.systemd.enable | Whether to enable systemd in initrd
|
| services.nginx.enableReload | Reload nginx when configuration file changes (instead of restart)
|
| services.tailscale.authKeyFile | A file containing the auth key
|
| services.nextcloud.autoUpdateApps.startAt | When to run the update
|
| networking.fooOverUDP.<name>.local.address | Local address to bind to
|
| services.freeswitch.enableReload | Issue the reloadxml command to FreeSWITCH when configuration directory changes (instead of restart)
|
| services.tor.relay.onionServices | See torrc manual.
Because tor.service runs in its own RootDirectory=,
when using a onion service to reverse-proxy to a Unix socket,
you need to make that Unix socket available
within the mount namespace of tor.service
|
| systemd.services.<name>.preStop | Shell commands executed to stop the service.
|
| systemd.services.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| systemd.services.<name>.wants | Start the specified units when this unit is started.
|
| systemd.services.<name>.name | The name of this systemd unit, including its extension
|
| systemd.services.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| systemd.services.<name>.path | Packages added to the service's PATH
environment variable
|
| systemd.services.<name>.postStop | Shell commands executed after the service's main process
has exited.
|
| systemd.services.<name>.preStart | Shell commands executed before the service's main process
is started.
|
| systemd.services.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| systemd.services.<name>.script | Shell commands executed as the service's main process.
|
| systemd.services.<name>.postStart | Shell commands executed after the service's main process
is started.
|
| systemd.services.<name>.reload | Shell commands executed when the service's main process
is reloaded.
|
| systemd.services.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| systemd.services.<name>.aliases | Aliases of that unit.
|
| systemd.services.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| systemd.services.<name>.startAt | Automatically start this unit at the given date/time, which
must be in the format described in
systemd.time(7)
|
| systemd.services.<name>.upholds | Keeps the specified running while this unit is running
|
| systemd.services.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| systemd.services.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| systemd.services.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| systemd.services.<name>.scriptArgs | Arguments passed to the main process script
|
| systemd.services.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| systemd.services.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| systemd.services.<name>.startLimitBurst | Configure unit start rate limiting
|
| systemd.services.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| systemd.services.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| systemd.services.<name>.serviceConfig | Each attribute in this set specifies an option in the
[Service] section of the unit
|
| systemd.services.<name>.requisite | Similar to requires
|
| systemd.services.<name>.restartIfChanged | Whether the service should be restarted during a NixOS
configuration switch if its definition has changed.
|
| systemd.services.<name>.stopIfChanged | If set, a changed unit is restarted by calling
systemctl stop in the old configuration,
then systemctl start in the new one
|
| systemd.services.<name>.enableDefaultPath | Whether to append a minimal default PATH environment variable to the service, containing common system utilities.
|
| systemd.services.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| systemd.services.<name>.reloadIfChanged | Whether the service should be reloaded during a NixOS
configuration switch if its definition has changed
|
| systemd.services.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| systemd.services.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| systemd.services.<name>.confinement.binSh | The program to make available as /bin/sh inside
the chroot
|
| systemd.services.<name>.confinement.enable | If set, all the required runtime store paths for this service are
bind-mounted into a tmpfs-based
chroot(2).
|
| systemd.services.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| systemd.services.<name>.environment | Environment variables passed to the service's processes.
|
| systemd.services.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| systemd.services.<name>.notSocketActivated | If set, a changed unit is never assumed to be
socket-activated on configuration switch, even if
it might have associated socket units
|
| systemd.services.<name>.confinement.fullUnit | Whether to include the full closure of the systemd unit file into the
chroot, instead of just the dependencies for the executables.
While it may be tempting to just enable this option to
make things work quickly, please be aware that this might add paths
to the closure of the chroot that you didn't anticipate
|
| systemd.services.<name>.enableStrictShellChecks | Enable running shellcheck on the generated scripts for this unit
|
| systemd.services.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| systemd.services.<name>.confinement.mode | The value full-apivfs (the default) sets up
private /dev, /proc,
/sys, /tmp and /var/tmp file systems
in a separate user name space
|
| systemd.services.<name>.confinement.packages | Additional packages or strings with context to add to the closure of
the chroot
|
| systemd.services.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| services.reaction.runAsRoot | Whether to run reaction as root
|
| services.send.dataDir | Directory for uploaded files
|
| services.httpd.user | User account under which httpd children processes run
|
| services.molly-brown.certPath | Path to TLS certificate
|
| services.earlyoom.killHook | An absolute path to an executable to be run for each process killed
|
| networking.dhcpcd.runHook | Shell code that will be run after all other hooks
|
| services.reaction.stopForFirewall | Whether to stop reaction when reloading the firewall
|
| services.alloy.configPath | Alloy configuration file/directory path
|
| services.logrotate.checkConfig | Whether the config should be checked at build time
|
| services.openssh.listenAddresses | List of addresses and ports to listen on (ListenAddress directive
in config)
|
| nix.daemonCPUSchedPolicy | Nix daemon process CPU scheduling policy
|
| services.jellyfin.hardwareAcceleration.device | Path to the hardware acceleration device that Jellyfin should use
|
| services.transmission.downloadDirPermissions | If not null, is used as the permissions
set by system.activationScripts.transmission-daemon
on the directories services.transmission.settings.download-dir,
services.transmission.settings.incomplete-dir.
and services.transmission.settings.watch-dir
|