| options/nixos/services.alloy.environmentFile | EnvironmentFile as defined in systemd.exec(5).
|
| options/nixos/services.k3s.environmentFile | File path containing environment variables for configuring the k3s service in the format of an EnvironmentFile
|
| options/nixos/services.r53-ddns.environmentFile | File containing the AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY
in the format of an EnvironmentFile as described by systemd.exec(5)
|
| options/nixos/services.rke2.environmentFile | File path containing environment variables for configuring the rke2 service in the format of an EnvironmentFile
|
| options/nixos/services.dex.environmentFile | Environment file (see systemd.exec(5)
"EnvironmentFile=" section for the syntax) to define variables for dex
|
| options/nixos/services.searx.environmentFile | Environment file (see systemd.exec(5) "EnvironmentFile=" section for the syntax) to define variables for Searx
|
| options/nixos/services.paperless.environmentFile | Path to a file containing extra paperless config options in the systemd EnvironmentFile
format
|
| options/nixos/services.ntfy-sh.environmentFile | Path to a file containing extra ntfy environment variables in the systemd EnvironmentFile
format
|
| options/nixos/services.atticd.environmentFile | Path to an EnvironmentFile containing required environment
variables:
- ATTIC_SERVER_TOKEN_RS256_SECRET_BASE64: The base64-encoded RSA PEM PKCS1 of the
RS256 JWT secret
|
| options/nixos/services.screego.environmentFile | Environment file (see systemd.exec(5) "EnvironmentFile="
section for the syntax) passed to the service
|
| options/nixos/services.beszel.agent.environmentFile | File path containing environment variables for configuring the beszel-agent service in the format of an EnvironmentFile
|
| options/nixos/security.acme.certs.<name>.environmentFile | Path to an EnvironmentFile for the cert's service containing any required and
optional environment variables for your selected dnsProvider
|
| options/nixos/services.lubelogger.environmentFile | Path to a file containing extra LubeLogger config options in the systemd EnvironmentFile format
|
| options/nixos/services.monero.environmentFile | Path to an EnvironmentFile for the monero service as defined in systemd.exec(5)
|
| options/nixos/services.restic.backups.<name>.environmentFile | file containing the credentials to access the repository, in the
format of an EnvironmentFile as described by systemd.exec(5)
|
| options/nixos/security.acme.defaults.environmentFile | Path to an EnvironmentFile for the cert's service containing any required and
optional environment variables for your selected dnsProvider
|
| options/home-manager/services.restic.backups.<name>.environmentFile | A file containing the credentials to access the repository, in the
format of an EnvironmentFile as described by systemd.exec(5)
|
| options/nixos/services.mollysocket.environmentFile | Environment file (see systemd.exec(5) "EnvironmentFile="
section for the syntax) passed to the service
|
| options/nixos/services.woodpecker-server.environmentFile | File to load environment variables
from
|
| options/nixos/services.gotosocial.environmentFile | File path containing environment variables for configuring the GoToSocial service
in the format of an EnvironmentFile as described by systemd.exec(5)
|
| options/nixos/services.woodpecker-agents.agents.<name>.environmentFile | File to load environment variables
from
|
| options/nixos/services.mattermost.environmentFile | Environment file (see systemd.exec(5)
"EnvironmentFile=" section for the syntax) which sets config options
for mattermost (see the Mattermost documentation)
|
| options/nixos/services.prometheus.exporters.kafka.environmentFile | File containing the credentials to access the repository, in the
format of an EnvironmentFile as described by systemd.exec(5)
|
| options/nixos/services.prometheus.exporters.restic.environmentFile | File containing the credentials to access the repository, in the
format of an EnvironmentFile as described by systemd.exec(5)
|
| options/nixos/services.prometheus.exporters.snmp.environmentFile | EnvironmentFile as defined in systemd.exec(5)
|
| options/nixos/services.wiki-js.environmentFile | Environment file to inject e.g. secrets into the configuration.
|
| options/nixos/services.yarr.environmentFile | Environment file for specifying additional settings such as secrets
|
| options/nixos/services.lldap.environmentFile | Environment file as defined in systemd.exec(5) passed to the service.
|
| options/nixos/services.webdav.environmentFile | Environment file as defined in systemd.exec(5).
|
| options/nixos/services.evcc.environmentFile | File with environment variables to pass into the runtime environment
|
| options/nixos/services.garage.environmentFile | File containing environment variables to be passed to the Garage server.
|
| options/nixos/services.ocis.environmentFile | An environment file as defined in systemd.exec(5)
|
| options/nixos/services.memos.environmentFile | The environment file to use when starting Memos.
By default, generated from .
|
| options/nixos/services.shiori.environmentFile | Path to file containing environment variables
|
| options/nixos/services.pretix.environmentFile | Environment file to pass secret configuration values
|
| options/nixos/services.open-webui.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.gatus.environmentFile | File to load as environment file
|
| options/nixos/services.haven.environmentFile | Path to a file containing sensitive environment variables
|
| options/nixos/services.gerbil.environmentFile | Path to a file containing sensitive environment variables for Gerbil
|
| options/nixos/services.tsidp.environmentFile | Path to an environment file loaded for the tsidp service
|
| options/nixos/services.litellm.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.orthanc.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.newt.environmentFile | Path to a file containing sensitive environment variables for Newt
|
| options/nixos/services.readeck.environmentFile | File containing environment variables to be passed to Readeck
|
| options/nixos/services.kimai.sites.<name>.environmentFile | Securely pass environment variabels to Kimai
|
| options/nixos/services.lavalink.environmentFile | Add custom environment variables from a file
|
| options/nixos/services.beszel.hub.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.lasuite-docs.environmentFile | Path to environment file
|
| options/nixos/services.lasuite-meet.environmentFile | Path to environment file
|
| options/nixos/services.karakeep.environmentFile | An optional path to an environment file that will be used in the web and workers
services
|
| options/nixos/services.librenms.environmentFile | File containing env-vars to be substituted into the final config
|
| options/nixos/services.commafeed.environmentFile | Environment file as defined in systemd.exec(5).
|
| options/nixos/services.gotenberg.environmentFile | Environment file to load extra environment variables from.
|
| options/nixos/services.frp.instances.<name>.environmentFiles | List of paths files that follows systemd environmentfile structure
|
| options/nixos/services.jigasi.environmentFile | File containing environment variables to be passed to the jigasi service,
in which secret tokens can be specified securely by defining values for
JIGASI_SIPUSER,
JIGASI_SIPPWD,
JIGASI_SIPSERVER and
JIGASI_SIPPORT.
|
| options/nixos/services.docling-serve.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.navidrome.environmentFile | Environment file, used to set any secret ND_* environment variables.
|
| options/nixos/services.castopod.environmentFile | Environment file to inject e.g. secrets into the configuration
|
| options/nixos/services.trilium-server.environmentFile | File to load as the environment file
|
| options/nixos/services.slskd.environmentFile | Path to the environment file sourced on startup
|
| options/nixos/services.homebridge.environmentFile | Path to an environment-file which may contain secrets.
|
| options/nixos/services.sssd.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.snips-sh.environmentFile | Additional environment file as defined in systemd.exec(5)
|
| options/nixos/services.livekit.ingress.environmentFile | Environment file as defined in systemd.exec(5) passed to the service
|
| options/nixos/services.pocket-id.environmentFile | Path to an environment file to be loaded
|
| options/nixos/services.pangolin.environmentFile | Path to a file containing sensitive environment variables for Pangolin
|
| options/nixos/services.govee2mqtt.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.komodo-periphery.environmentFile | Environment file for additional configuration via environment variables.
|
| options/nixos/services.caddy.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.opencloud.environmentFile | An environment file as defined in systemd.exec(5)
|
| options/nixos/services.workout-tracker.environmentFile | An environment file as defined in systemd.exec(5)
|
| options/nixos/services.traccar.environmentFile | File containing environment variables to substitute in the configuration before starting Traccar
|
| options/nixos/services.mautrix-signal.environmentFile | File containing environment variables to be passed to the mautrix-signal service
|
| options/nixos/services.murmur.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.pufferpanel.environmentFile | File to load environment variables from
|
| options/home-manager/services.podman.containers.<name>.environmentFile | Paths to files containing container environment variables.
|
| options/nixos/services.mautrix-whatsapp.environmentFile | File containing environment variables to be passed to the mautrix-whatsapp service
|
| options/nixos/services.glance.environmentFile | Path to an environment file as defined in systemd.exec(5)
|
| options/nixos/services.homepage-dashboard.environmentFile | The path to an environment file that contains environment variables to pass
to the homepage-dashboard service, for the purpose of passing secrets to
the service
|
| options/nixos/services.mautrix-discord.environmentFile | File containing environment variables to substitute when copying the configuration
out of Nix store to the services.mautrix-discord.dataDir
|
| options/nixos/services.hedgedoc.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.linkwarden.environmentFile | Path of a file with extra environment variables to be loaded from disk
|
| options/nixos/services.wstunnel.clients.<name>.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.wstunnel.servers.<name>.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.rmfakecloud.environmentFile | Path to an environment file loaded for the rmfakecloud service
|
| options/nixos/services.teeworlds.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.dendrite.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.peering-manager.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.prometheus.exporters.mail.environmentFile | File containing env-vars to be substituted into the exporter's config.
|
| options/nixos/services.matrix-appservice-discord.environmentFile | File containing environment variables to be passed to the matrix-appservice-discord service,
in which secret tokens can be specified securely by defining values for
APPSERVICE_DISCORD_AUTH_CLIENT_I_D and
APPSERVICE_DISCORD_AUTH_BOT_TOKEN.
|
| options/nixos/services.prometheus.exporters.mqtt.environmentFile | File to load as environment file
|
| options/nixos/services.prometheus.exporters.fastly.environmentFile | An environment file containg at least the FASTLY_API_TOKEN= environment
variable.
|
| options/nixos/services.livebook.environmentFile | Additional environment file as defined in systemd.exec(5)
|
| options/nixos/services.mautrix-meta.instances.<name>.environmentFile | File containing environment variables to substitute when copying the configuration
out of Nix store to the services.mautrix-meta.dataDir
|
| options/nixos/services.mautrix-telegram.environmentFile | File containing environment variables to be passed to the mautrix-telegram service,
in which secret tokens can be specified securely by defining values for e.g.
MAUTRIX_TELEGRAM_APPSERVICE_AS_TOKEN,
MAUTRIX_TELEGRAM_APPSERVICE_HS_TOKEN,
MAUTRIX_TELEGRAM_TELEGRAM_API_ID,
MAUTRIX_TELEGRAM_TELEGRAM_API_HASH and optionally
MAUTRIX_TELEGRAM_TELEGRAM_BOT_TOKEN
|
| options/nixos/services.prometheus.exporters.pve.environmentFile | Path to the service's environment file
|
| options/nixos/services.vaultwarden.environmentFile | Additional environment file or files as defined in systemd.exec(5)
|
| options/nixos/services.litestream.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.prometheus.exporters.junos-czerwonk.environmentFile | File containing env-vars to be substituted into the exporter's config.
|
| options/nixos/services.prometheus.exporters.tailscale.environmentFile | Environment file containg at least the TAILSCALE_TAILNET,
TAILSCALE_OAUTH_CLIENT_ID, and TAILSCALE_OAUTH_CLIENT_SECRET
environment variables.
|
| options/nixos/services.prometheus.alertmanager.environmentFile | File to load as environment file
|
| options/nixos/services.prometheus.alertmanagerGotify.environmentFile | File containing additional config environment variables for alertmanager-gotify-bridge
|
| options/nixos/services.prometheus.exporters.php-fpm.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.changedetection-io.environmentFile | Securely pass environment variables to changedetection-io
|
| options/nixos/services.prometheus.exporters.postgres.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.ocis.environment | Extra config options
|
| options/nixos/services.pds.settings | Environment variables to set for the service
|
| options/nixos/services.maddy.secrets | A list of files containing the various secrets
|
| options/nixos/services.eintopf.secrets | A list of files containing the various secrets
|
| options/nixos/services.atuin.database.uri | URI to the database
|
| options/nixos/services.evcc.settings | evcc configuration as a Nix attribute set
|
| options/nixos/services.vmagent.checkConfig | Check configuration
|
| options/nixos/services.bluesky-pds.settings | Environment variables to set for the service
|
| options/nixos/services.pomerium.secretsFile | Path to file containing secrets for Pomerium, in systemd
EnvironmentFile format
|
| options/nixos/services.rspamd-trainer.secrets | A list of files containing the various secrets
|
| options/nixos/services.duplicity.secretFile | Path of a file containing secrets (gpg passphrase, access key...) in
the format of EnvironmentFile as described by
systemd.exec(5)
|
| options/nixos/services.pghero.environment | Environment variables to set for the service
|
| options/nixos/services.webdav.settings | Attrset that is converted and passed as config file
|
| options/nixos/services.ipfs-cluster.secretFile | File containing the cluster secret in the format of EnvironmentFile as described by
systemd.exec(5)
|
| options/nixos/services.minio.rootCredentialsFile | File containing the MINIO_ROOT_USER, default is "minioadmin", and
MINIO_ROOT_PASSWORD (length >= 8), default is "minioadmin"; in the format of
an EnvironmentFile=, as described by systemd.exec(5).
|
| options/nixos/services.prefect.databasePasswordFile | path to a file containing e.g.:
DBPASSWORD=supersecret
stored outside the nix store, read by systemd as EnvironmentFile.
|
| options/nixos/services.mealie.credentialsFile | File containing credentials used in mealie such as POSTGRES_PASSWORD
or sensitive LDAP options
|
| options/nixos/services.pyload.credentialsFile | File containing PYLOAD_DEFAULT_USERNAME and
PYLOAD_DEFAULT_PASSWORD in the format of an EnvironmentFile=,
as described by systemd.exec(5)
|
| options/nixos/services.traccar.settings | config.xml configuration as a Nix attribute set
|
| options/nixos/services.mautrix-signal.settings | config.yaml configuration as a Nix attribute set
|
| options/nixos/services.firefox-syncserver.secrets | A file containing the various secrets
|
| options/nixos/services.mautrix-telegram.settings | config.yaml configuration as a Nix attribute set
|
| options/nixos/services.beszel.agent.environment | Environment variables for configuring the beszel-agent service
|
| options/nixos/services.miniflux.adminCredentialsFile | File containing the ADMIN_USERNAME and
ADMIN_PASSWORD (length >= 6) in the format of
an EnvironmentFile=, as described by systemd.exec(5).
|
| options/nixos/services.rmfakecloud.extraSettings | Extra settings in the form of a set of key-value pairs
|
| options/nixos/services.mautrix-whatsapp.settings | config.yaml configuration as a Nix attribute set
|
| options/nixos/services.mautrix-meta.instances.<name>.settings | config.yaml configuration as a Nix attribute set
|
| options/nixos/services.wstunnel.clients.<name>.httpProxy | Proxy to use to connect to the wstunnel server (USER:PASS@HOST:PORT).
Passwords specified here will be world-readable in the Nix store!
To pass a password to the service, point the environmentFile option
to a file containing PROXY_PASSWORD=<your-password-here> and set
this option to <user>:$PROXY_PASSWORD@<host>:<port>
|
| options/nixos/services.mattermost.database.password | Password for local Mattermost database user
|
| options/nixos/services.nextcloud-whiteboard-server.secrets | A list of files containing the various secrets
|
| options/nixos/services.prometheus.exporters.pve.configFile | Path to the service's config file
|
| options/nixos/services.matrix-appservice-discord.settings | config.yaml configuration as a Nix attribute set
|
| options/nixos/services.victoriametrics.checkConfig | Check configuration
|
| options/nixos/services.prometheus.alertmanager.checkConfig | Check configuration with amtool check-config
|
| options/nixos/services.wstunnel.clients.<name>.upgradeCredentials | Use these credentials to authenticate during the HTTP upgrade request
(Basic authorization type, USER:[PASS]).
Passwords specified here will be world-readable in the Nix store!
To pass a password to the service, point the environmentFile option
to a file containing HTTP_PASSWORD=<your-password-here> and set this
option to <user>:$HTTP_PASSWORD
|
| options/nixos/services.easytier.instances.<name>.settings.network_secret | EasyTier network credential used for verification and
encryption
|
| options/nixos/services.pufferpanel.environment | Environment variables to set for the service
|
| options/nixos/services.wakapi.environmentFiles | Use this to set WAKAPI_PASSWORD_SALT and WAKAPI_MAIL_SMTP_PASS.
|
| options/nixos/services.fider.environmentFiles | Files to load environment variables from
|
| options/nixos/services.pghero.environmentFiles | File to load environment variables from
|
| options/nixos/services.bcg.environmentFiles | File to load as environment file
|
| options/nixos/services.gotify.environmentFiles | Files containing additional config environment variables for gotify-server
|
| options/nixos/services.patroni.environmentFiles | Environment variables made available to Patroni as files content, useful for providing secrets from files.
|
| options/nixos/services.lidarr.environmentFiles | Environment file to pass secret configuration values
|
| options/nixos/services.sonarr.environmentFiles | Environment file to pass secret configuration values
|
| options/nixos/services.radarr.environmentFiles | Environment file to pass secret configuration values
|
| options/nixos/services.vikunja.environmentFiles | List of environment files set in the vikunja systemd service
|
| options/nixos/services.pretalx.environmentFiles | Environment files that allow passing secret configuration values
|
| options/nixos/services.chhoto-url.environmentFiles | Files to load environment variables from in addition to services.chhoto-url.settings
|
| options/nixos/services.zipline.environmentFiles | Files to load environment variables from (in addition to services.zipline.settings)
|
| options/darwin/services.telegraf.environmentFiles | File to load as environment file
|
| options/nixos/services.readarr.environmentFiles | Environment file to pass secret configuration values
|
| options/nixos/services.sharkey.environmentFiles | List of paths to files containing environment variables for Sharkey to use at runtime
|
| options/nixos/services.stirling-pdf.environmentFiles | Files containing additional environment variables to pass to Stirling PDF
|
| options/nixos/services.prowlarr.environmentFiles | Environment file to pass secret configuration values
|
| options/nixos/services.whisparr.environmentFiles | Environment file to pass secret configuration values
|
| options/nixos/services.telegraf.environmentFiles | File to load as environment file
|
| options/nixos/services.glitchtip.environmentFiles | Files to load environment variables from in addition to services.glitchtip.settings
|
| options/nixos/services.pds.environmentFiles | File to load environment variables from
|
| options/nixos/services.centrifugo.environmentFiles | Files to load environment variables from
|
| options/nixos/services.bluesky-pds.environmentFiles | File to load environment variables from
|
| options/nixos/services.easytier.instances.<name>.environmentFiles | Environment files for this instance
|
| options/nixos/services.traefik.environmentFiles | Files to load as an environment file just before Traefik starts
|
| options/nixos/services.mqtt2influxdb.environmentFiles | File to load as environment file
|
| options/nixos/virtualisation.oci-containers.containers.<name>.environmentFiles | Environment files for this container.
|
| options/nixos/networking.networkmanager.ensureProfiles.environmentFiles | Files to load as environment file
|