| environment.extraSetup | Shell fragments to be run after the system environment has been created
|
| environment.etc | Set of files that have to be linked in /etc.
|
| environment.ldso | The executable to link into the normal FHS location of the ELF loader.
|
| environment.homeBinInPath | Include ~/bin/ in $PATH.
|
| environment.extraInit | Shell script code called during global environment initialisation
after all variables and profileVariables have been set
|
| environment.profiles | A list of profiles used to setup the global environment.
|
| environment.localBinInPath | Add ~/.local/bin/ to $PATH
|
| environment.pathsToLink | List of directories to be symlinked in /run/current-system/sw.
|
| environment.ldso32 | The executable to link into the normal FHS location of the 32-bit ELF loader
|
| environment.shells | A list of permissible login shells for user accounts
|
| environment.shellInit | Shell script code called during shell initialisation
|
| environment.freetds | Configure freetds database entries
|
| environment.etc.<name>.text | Text of the file.
|
| environment.profileRelativeEnvVars | Attribute set of environment variable
|
| environment.etc.<name>.gid | GID of created file
|
| environment.etc.<name>.uid | UID of created file
|
| environment.variables | A set of environment variables used in the global environment
|
| environment.loginShellInit | Shell script code called during login shell initialisation
|
| environment.etc.<name>.mode | If set to something else than symlink,
the file is copied instead of symlinked, with the given
file mode.
|
| services.gocd-agent.environment | Additional environment variables to be passed to the Go
|
| services.cage.environment | Additional environment variables to pass to Cage.
|
| services.livebook.environment | Environment variables to set
|
| services.bcg.environmentFiles | File to load as environment file
|
| environment.etc.<name>.source | Path of the source file.
|
| services.goss.environment | Environment variables to set for the goss service
|
| services.n8n.environment | Environment variables to pass to the n8n service
|
| services.karma.environment | Additional environment variables to provide to karma.
|
| environment.wordlist.enable | Whether to enable environment variables for lists of words.
|
| services.gocd-server.environment | Additional environment variables to be passed to the gocd-server process
|
| services.aesmd.environment | Additional environment variables to pass to the AESM service.
|
| environment.enableAllTerminfo | Whether to install all terminfo outputs
|
| environment.shellAliases | An attribute set that maps aliases (the top level attribute names in
this option) to command strings or directly to build outputs
|
| environment.etc.<name>.target | Name of symlink (relative to
/etc)
|
| environment.unixODBCDrivers | Specifies Unix ODBC drivers to be registered in
/etc/odbcinst.ini
|
| environment.etc.<name>.user | User name of file owner
|
| environment.etc.<name>.enable | Whether this /etc file should be generated
|
| services.fider.environment | Environment variables to set for the service
|
| services.renovate.environment | Extra environment variables to export to the Renovate process
from the systemd unit configuration
|
| services.coder.environment.file | Systemd environment file to add to Coder.
|
| services.pghero.environment | Environment variables to set for the service
|
| services.gotify.environment | Config environment variables for the gotify-server
|
| services.open-webui.environment | Extra environment variables for Open-WebUI
|
| services.lldap.environment | Environment variables passed to the service
|
| services.evcc.environmentFile | File with environment variables to pass into the runtime environment
|
| environment.stub-ld.enable | Install a stub ELF loader to print an informative error message
in the event that a user attempts to run an ELF binary not
compiled for NixOS.
|
| services.rke2.environmentVars | Environment variables for configuring the rke2 service/agent
|
| environment.etc.<name>.group | Group name of file owner
|
| services.jenkins.environment | Additional environment variables to be passed to the jenkins process
|
| services.sssd.environmentFile | Environment file as defined in systemd.exec(5)
|
| environment.lxqt.excludePackages | Which LXQt packages to exclude from the default environment
|
| environment.mate.excludePackages | Which MATE packages to exclude from the default environment
|
| environment.xfce.excludePackages | Which packages XFCE should exclude from the default environment
|
| services.slurm.rest.environment | Environment variables to set for the slurmrestd daemon, see slurmrestd(8).
|
| services.litellm.environment | Extra environment variables for LiteLLM.
|
| services.immich.environment | Extra configuration environment variables
|
| services.webhook.environment | Extra environment variables passed to webhook.
|
| services.gokapi.environment | Environment variables to be set for the gokapi service
|
| services.orthanc.environment | Extra environment variables
For more details see https://orthanc.uclouvain.be/book/users/configuration.html
|
| services.fider.environmentFiles | Files to load environment variables from
|
| services.beszel.hub.environment | Environment variables passed to the systemd service
|
| environment.gnome.excludePackages | Which packages gnome should exclude from the default environment
|
| environment.sessionVariables | A set of environment variables used in the global environment
|
| services.crabfit.api.environment | Environment variables for the crabfit API.
|
| services.coder.environment.extra | Extra environment variables to pass run Coder's server with
|
| services.haven.environmentFile | Path to a file containing sensitive environment variables
|
| systemd.services.<name>.environment | Environment variables passed to the service's processes.
|
| services.gotify.environmentFiles | Files containing additional config environment variables for gotify-server
|
| environment.extraOutputsToInstall | Entries listed here will be appended to the meta.outputsToInstall attribute for each package in environment.systemPackages, and the files from the corresponding derivation outputs symlinked into /run/current-system/sw
|
| services.pghero.environmentFiles | File to load environment variables from
|
| environment.budgie.excludePackages | Which packages Budgie should exclude from the default environment.
|
| environment.cosmic.excludePackages | List of packages to exclude from the COSMIC environment.
|
| services.telegraf.environmentFiles | File to load as environment file
|
| services.newt.environmentFile | Path to a file containing sensitive environment variables for Newt
|
| services.ersatztv.environment | Environment variables to set for the ErsatzTV service.
|
| services.dawarich.environment | Extra environment variables to pass to all dawarich services.
|
| environment.wordlist.lists | A set with the key names being the environment variable you'd like to
set and the values being a list of paths to text documents containing
lists of words
|
| services.murmur.environmentFile | Environment file as defined in systemd.exec(5)
|
| environment.systemPackages | The set of packages that appear in
/run/current-system/sw
|
| environment.enableDebugInfo | Some NixOS packages provide debug symbols
|
| environment.profileRelativeSessionVariables | Attribute set of environment variable used in the global
environment
|
| services.hadoop.hbase.rest.environment | Environment variables passed to rest.
|
| services.pairdrop.environment | Additional configuration (environment variables) for PairDrop, see
https://github.com/schlagmichdoch/PairDrop/blob/master/docs/host-your-own.md#environment-variables
for supported values.
|
| services.docling-serve.environment | Extra environment variables for Docling Serve
|
| systemd.user.services.<name>.environment | Environment variables passed to the service's processes.
|
| services.spoolman.environment | Environment variables to be passed to the spoolman service
|
| environment.wvdial.pppDefaults | Default ppp settings for wvdial.
|
| services.stirling-pdf.environment | Environment variables for the stirling-pdf app
|
| services.traefik.environmentFiles | Files to load as an environment file just before Traefik starts
|
| services.ddns-updater.environment | Environment variables to be set for the ddns-updater service
|
| services.wiki-js.environmentFile | Environment file to inject e.g. secrets into the configuration.
|
| services.litestream.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.monero.environmentFile | Path to an EnvironmentFile for the monero service as defined in systemd.exec(5)
|
| services.k3s.environmentFile | File path containing environment variables for configuring the k3s service in the format of an EnvironmentFile
|
| services.beszel.agent.environment | Environment variables for configuring the beszel-agent service
|
| environment.debuginfodServers | List of urls of debuginfod servers for tools like gdb and valgrind to use
|
| services.rke2.environmentFile | File path containing environment variables for configuring the rke2 service in the format of an EnvironmentFile
|
| services.ocis.environment | Extra config options
|
| services.yarr.environmentFile | Environment file for specifying additional settings such as secrets
|
| services.n8n.environment.N8N_PORT | The HTTP port n8n runs on.
|
| services.hadoop.hbase.thrift.environment | Environment variables passed to thrift.
|
| services.hadoop.hbase.master.environment | Environment variables passed to master.
|
| environment.pantheon.excludePackages | Which packages pantheon should exclude from the default environment
|
| environment.cinnamon.excludePackages | Which packages cinnamon should exclude from the default environment
|
| services.stirling-pdf.environmentFiles | Files containing additional environment variables to pass to Stirling PDF
|
| services.castopod.environmentFile | Environment file to inject e.g. secrets into the configuration
|
| services.gotenberg.environmentFile | Environment file to load extra environment variables from.
|
| services.lldap.environmentFile | Environment file as defined in systemd.exec(5) passed to the service.
|
| services.sharkey.environmentFiles | List of paths to files containing environment variables for Sharkey to use at runtime
|
| services.displayManager.environment | Additional environment variables needed by the display manager.
|
| services.fedimintd.<name>.environment | Extra Environment variables to pass to the fedimintd.
|
| services.navidrome.environmentFile | Environment file, used to set any secret ND_* environment variables.
|
| services.caddy.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.dex.environmentFile | Environment file (see systemd.exec(5)
"EnvironmentFile=" section for the syntax) to define variables for dex
|
| services.hedgedoc.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.ocis.environmentFile | An environment file as defined in systemd.exec(5)
|
| services.pds.environmentFiles | File to load environment variables from
|
| services.pocket-id.environmentFile | Path to an environment file to be loaded
|
| services.centrifugo.environmentFiles | Files to load environment variables from
|
| services.webdav.environmentFile | Environment file as defined in systemd.exec(5).
|
| services.memos.environmentFile | The environment file to use when starting Memos.
By default, generated from .
|
| services.garage.environmentFile | File containing environment variables to be passed to the Garage server.
|
| environment.defaultPackages | Set of default packages that aren't strictly necessary
for a running system, entries can be removed for a more
minimal NixOS installation
|
| services.dendrite.environmentFile | Environment file as defined in systemd.exec(5)
|
| environment.corePackages | Set of core packages for a normal interactive system
|
| services.shiori.environmentFile | Path to file containing environment variables
|
| services.teeworlds.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.pangolin.environmentFile | Path to a file containing sensitive environment variables for Pangolin
|
| services.gatus.environmentFile | File to load as environment file
|
| services.netbird.tunnels.<name>.environment | Environment for the netbird service, used to pass configuration options.
|
| services.netbird.clients.<name>.environment | Environment for the netbird service, used to pass configuration options.
|
| services.crabfit.frontend.environment | Environment variables for the crabfit frontend.
|
| services.linkwarden.environment | Extra configuration environment variables
|
| services.send.environment | All the available config options and their defaults can be found here: https://github.com/timvisee/send/blob/master/server/config.js,
some descriptions can found here: https://github.com/timvisee/send/blob/master/docs/docker.md#environment-variables
Values under services.send.environment will override the predefined values in the Send service.
- Time/duration should be in seconds
- Filesize values should be in bytes
|
| services.komodo-periphery.environment | Environment variables to set for the service.
|
| services.traccar.environmentFile | File containing environment variables to substitute in the configuration before starting Traccar
|
| services.mattermost.environment | Extra environment variables to export to the Mattermost process
from the systemd unit configuration.
|
| services.commafeed.environment | Extra environment variables passed to CommaFeed, refer to
https://github.com/Athou/commafeed/blob/master/commafeed-server/config.yml.example
for supported values
|
| services.kapacitor.alerta.environment | Default Alerta environment
|
| environment.wvdial.dialerDefaults | Contents of the "Dialer Defaults" section of
/etc/wvdial.conf.
|
| services.searx.environmentFile | Environment file (see systemd.exec(5) "EnvironmentFile=" section for the syntax) to define variables for Searx
|
| environment.interactiveShellInit | Shell script code called during interactive shell initialisation
|
| services.pretix.environmentFile | Environment file to pass secret configuration values
|
| services.ecs-agent.extra-environment | The environment the ECS agent should run with
|
| services.opencloud.environment | Extra environment variables to set for the service
|
| services.opencloud.environmentFile | An environment file as defined in systemd.exec(5)
|
| services.open-webui.environmentFile | Environment file to be passed to the systemd service
|
| services.ntfy-sh.environmentFile | Path to a file containing extra ntfy environment variables in the systemd EnvironmentFile
format
|
| services.peering-manager.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.hadoop.hbase.regionServer.environment | Environment variables passed to regionServer.
|
| environment.deepin.excludePackages | List of default packages to exclude from the configuration
|
| services.tsidp.environmentFile | Path to an environment file loaded for the tsidp service
|
| services.komodo-periphery.environmentFile | Environment file for additional configuration via environment variables.
|
| services.mautrix-signal.environmentFile | File containing environment variables to be passed to the mautrix-signal service
|
| services.gerbil.environmentFile | Path to a file containing sensitive environment variables for Gerbil
|
| services.meilisearch.environment | Defines the running environment of MeiliSearch.
|
| services.atticd.environmentFile | Path to an EnvironmentFile containing required environment
variables:
- ATTIC_SERVER_TOKEN_RS256_SECRET_BASE64: The base64-encoded RSA PEM PKCS1 of the
RS256 JWT secret
|
| services.lidarr.environmentFiles | Environment file to pass secret configuration values
|
| services.sonarr.environmentFiles | Environment file to pass secret configuration values
|
| services.radarr.environmentFiles | Environment file to pass secret configuration values
|
| environment.plasma5.excludePackages | List of default packages to exclude from the configuration
|
| environment.plasma6.excludePackages | List of default packages to exclude from the configuration
|
| services.litellm.environmentFile | Environment file to be passed to the systemd service
|
| services.orthanc.environmentFile | Environment file to be passed to the systemd service
|
| services.screego.environmentFile | Environment file (see systemd.exec(5) "EnvironmentFile="
section for the syntax) passed to the service
|
| services.readeck.environmentFile | File containing environment variables to be passed to Readeck
|
| services.patroni.environmentFiles | Environment variables made available to Patroni as files content, useful for providing secrets from files.
|
| services.slurm.rest.environment.SLURM_JWT | This variable must be set to use JWT token authentication.
|
| services.beszel.hub.environmentFile | Environment file to be passed to the systemd service
|
| services.kimai.sites.<name>.environmentFile | Securely pass environment variabels to Kimai
|
| services.vikunja.environmentFiles | List of environment files set in the vikunja systemd service
|
| services.displayManager.generic.environment | Additional environment variables needed by the display manager.
|
| services.borgbackup.jobs.<name>.environment | Environment variables passed to the backup script
|
| services.woodpecker-server.environment | woodpecker-server config environment variables, for other options read the documentation
|
| security.acme.certs.<name>.environmentFile | Path to an EnvironmentFile for the cert's service containing any required and
optional environment variables for your selected dnsProvider
|
| services.pretalx.environmentFiles | Environment files that allow passing secret configuration values
|
| services.beszel.agent.environmentFile | File path containing environment variables for configuring the beszel-agent service in the format of an EnvironmentFile
|
| services.bluesky-pds.environmentFiles | File to load environment variables from
|
| services.chhoto-url.environmentFiles | Files to load environment variables from in addition to services.chhoto-url.settings
|
| services.prometheus.exporters.php-fpm.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.gokapi.environment.GOKAPI_PORT | Sets the port of the service.
|
| services.jigasi.environmentFile | File containing environment variables to be passed to the jigasi service,
in which secret tokens can be specified securely by defining values for
JIGASI_SIPUSER,
JIGASI_SIPPWD,
JIGASI_SIPSERVER and
JIGASI_SIPPORT.
|
| services.lavalink.environmentFile | Add custom environment variables from a file
|
| services.slskd.environmentFile | Path to the environment file sourced on startup
|
| services.lasuite-docs.environmentFile | Path to environment file
|
| services.lasuite-meet.environmentFile | Path to environment file
|
| services.pufferpanel.environmentFile | File to load environment variables from
|
| services.gotosocial.environmentFile | File path containing environment variables for configuring the GoToSocial service
in the format of an EnvironmentFile as described by systemd.exec(5)
|
| services.zipline.environmentFiles | Files to load environment variables from (in addition to services.zipline.settings)
|
| services.readarr.environmentFiles | Environment file to pass secret configuration values
|
| services.mautrix-telegram.environmentFile | File containing environment variables to be passed to the mautrix-telegram service,
in which secret tokens can be specified securely by defining values for e.g.
MAUTRIX_TELEGRAM_APPSERVICE_AS_TOKEN,
MAUTRIX_TELEGRAM_APPSERVICE_HS_TOKEN,
MAUTRIX_TELEGRAM_TELEGRAM_API_ID,
MAUTRIX_TELEGRAM_TELEGRAM_API_HASH and optionally
MAUTRIX_TELEGRAM_TELEGRAM_BOT_TOKEN
|
| services.pufferpanel.environment | Environment variables to set for the service
|
| services.karakeep.environmentFile | An optional path to an environment file that will be used in the web and workers
services
|
| services.immich.machine-learning.environment | Extra configuration environment variables
|
| services.mautrix-whatsapp.environmentFile | File containing environment variables to be passed to the mautrix-whatsapp service
|
| services.gokapi.environment.GOKAPI_DATA_DIR | Sets the directory for the data.
|
| services.n8n.environment.N8N_USER_FOLDER | Provide the path where n8n will create the .n8n folder
|
| services.snips-sh.environmentFile | Additional environment file as defined in systemd.exec(5)
|
| services.mautrix-discord.environmentFile | File containing environment variables to substitute when copying the configuration
out of Nix store to the services.mautrix-discord.dataDir
|
| services.docling-serve.environmentFile | Environment file to be passed to the systemd service
|
| services.commafeed.environmentFile | Environment file as defined in systemd.exec(5).
|
| services.trilium-server.environmentFile | File to load as the environment file
|
| services.mqtt2influxdb.environmentFiles | File to load as environment file
|
| services.alloy.environmentFile | EnvironmentFile as defined in systemd.exec(5).
|
| services.prowlarr.environmentFiles | Environment file to pass secret configuration values
|
| services.whisparr.environmentFiles | Environment file to pass secret configuration values
|
| environment.checkConfigurationOptions | Alias of _module.check.
|
| services.homepage-dashboard.environmentFile | The path to an environment file that contains environment variables to pass
to the homepage-dashboard service, for the purpose of passing secrets to
the service
|
| services.prometheus.exporters.snmp.environmentFile | EnvironmentFile as defined in systemd.exec(5)
|
| services.prometheus.exporters.postgres.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.mattermost.environmentFile | Environment file (see systemd.exec(5)
"EnvironmentFile=" section for the syntax) which sets config options
for mattermost (see the Mattermost documentation)
|
| services.prometheus.exporters.pve.environmentFile | Path to the service's environment file
|
| services.r53-ddns.environmentFile | File containing the AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY
in the format of an EnvironmentFile as described by systemd.exec(5)
|
| services.easytier.instances.<name>.environmentFiles | Environment files for this instance
|
| security.acme.defaults.environmentFile | Path to an EnvironmentFile for the cert's service containing any required and
optional environment variables for your selected dnsProvider
|
| services.gokapi.environment.GOKAPI_CONFIG_DIR | Sets the directory for the config file.
|
| services.gokapi.environment.GOKAPI_CONFIG_FILE | Sets the filename for the config file.
|
| services.woodpecker-agents.agents.<name>.environment | woodpecker-agent config environment variables, for other options read the documentation
|
| services.homebridge.environmentFile | Path to an environment-file which may contain secrets.
|
| services.livekit.ingress.environmentFile | Environment file as defined in systemd.exec(5) passed to the service
|
| services.glitchtip.environmentFiles | Files to load environment variables from in addition to services.glitchtip.settings
|
| services.govee2mqtt.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.workout-tracker.environmentFile | An environment file as defined in systemd.exec(5)
|
| services.n8n.environment.GENERIC_TIMEZONE | The n8n instance timezone
|
| services.glance.environmentFile | Path to an environment file as defined in systemd.exec(5)
|
| services.wakapi.environmentFiles | Use this to set WAKAPI_PASSWORD_SALT and WAKAPI_MAIL_SMTP_PASS.
|
| environment.enlightenment.excludePackages | Which packages Enlightenment should exclude from the default environment
|
| services.prometheus.alertmanager.environmentFile | File to load as environment file
|
| services.mautrix-meta.instances.<name>.environmentFile | File containing environment variables to substitute when copying the configuration
out of Nix store to the services.mautrix-meta.dataDir
|
| services.ollama.environmentVariables | Set arbitrary environment variables for the ollama service
|
| services.gitlab-runner.services.<name>.environmentVariables | Custom environment variables injected to build environment
|
| services.prometheus.exporters.fastly.environmentFile | An environment file containg at least the FASTLY_API_TOKEN= environment
variable.
|
| services.mollysocket.environmentFile | Environment file (see systemd.exec(5) "EnvironmentFile="
section for the syntax) passed to the service
|
| services.woodpecker-server.environmentFile | File to load environment variables
from
|
| services.sourcehut.settings."sr.ht".environment | Values other than "production" adds a banner to each page.
|
| services.linkwarden.environmentFile | Path of a file with extra environment variables to be loaded from disk
|
| services.wstunnel.clients.<name>.environmentFile | Environment file to be passed to the systemd service
|
| services.wstunnel.servers.<name>.environmentFile | Environment file to be passed to the systemd service
|
| services.litellm.settings.environment_variables | Environment variables to pass to the Lite
|
| services.livebook.environmentFile | Additional environment file as defined in systemd.exec(5)
|
| services.rmfakecloud.environmentFile | Path to an environment file loaded for the rmfakecloud service
|
| services.postgres-websockets.environment | postgres-websockets configuration as defined in:
https://github.com/diogob/postgres-websockets/blob/master/src/PostgresWebsockets/Config.hs#L71-L87
PGWS_DB_URI is represented as an attribute set, see [`environment
|
| services.librenms.environmentFile | File containing env-vars to be substituted into the final config
|
| services.slurm.rest.environment.SLURMRESTD_LISTEN | Comma-delimited list of host:port pairs or unix sockets to listen on.
|
| services.slurm.rest.environment.SLURMRESTD_DEBUG | Set debug level explicitly
|
| services.postgresqlWalReceiver.receivers.<name>.environment | Environment variables passed to the service
|
| services.postgres-websockets.environment.PGWS_DB_URI | libpq connection parameters as documented in:
https://www.postgresql.org/docs/current/libpq-connect.html#LIBPQ-PARAMKEYWORDS
|
| services.prometheus.exporters.tailscale.environmentFile | Environment file containg at least the TAILSCALE_TAILNET,
TAILSCALE_OAUTH_CLIENT_ID, and TAILSCALE_OAUTH_CLIENT_SECRET
environment variables.
|
| services.woodpecker-agents.agents.<name>.environmentFile | File to load environment variables
from
|
| services.postgres-websockets.environment.PGWS_HOST | Address the server will listen for websocket connections.
|
| services.restic.backups.<name>.environmentFile | file containing the credentials to access the repository, in the
format of an EnvironmentFile as described by systemd.exec(5)
|
| services.matrix-appservice-discord.environmentFile | File containing environment variables to be passed to the matrix-appservice-discord service,
in which secret tokens can be specified securely by defining values for
APPSERVICE_DISCORD_AUTH_CLIENT_I_D and
APPSERVICE_DISCORD_AUTH_BOT_TOKEN.
|
| services.n8n.environment.N8N_DIAGNOSTICS_ENABLED | Whether to share selected, anonymous telemetry with n8n
|
| image.repart.mkfsOptions | Specify extra options for created file systems
|
| services.prometheus.exporters.mqtt.environmentFile | File to load as environment file
|
| services.vaultwarden.environmentFile | Additional environment file or files as defined in systemd.exec(5)
|
| services.paperless.environmentFile | Path to a file containing extra paperless config options in the systemd EnvironmentFile
format
|
| services.gitlab.extraEnv | Additional environment variables for the GitLab environment.
|
| services.frp.instances.<name>.environmentFiles | List of paths files that follows systemd environmentfile structure
|
| services.lubelogger.environmentFile | Path to a file containing extra LubeLogger config options in the systemd EnvironmentFile format
|
| virtualisation.oci-containers.containers.<name>.environment | Environment variables to set for this container.
|
| networking.networkmanager.ensureProfiles.environmentFiles | Files to load as environment file
|
| services.authelia.instances.<name>.environmentVariables | Additional environment variables to provide to authelia
|
| environment.memoryAllocator.provider | The system-wide memory allocator
|
| services.prometheus.exporters.exportarr-sonarr.environment | See the configuration guide for available options.
|
| services.prometheus.exporters.exportarr-lidarr.environment | See the configuration guide for available options.
|
| services.prometheus.exporters.exportarr-radarr.environment | See the configuration guide for available options.
|
| services.prometheus.exporters.exportarr-bazarr.environment | See the configuration guide for available options.
|
| services.n8n.environment.N8N_VERSION_NOTIFICATIONS_ENABLED | When enabled, n8n sends notifications of new versions and security updates.
|
| services.prometheus.alertmanagerGotify.environmentFile | File containing additional config environment variables for alertmanager-gotify-bridge
|
| services.prometheus.exporters.exportarr-readarr.environment | See the configuration guide for available options.
|
| services.pds.settings | Environment variables to set for the service
|
| services.prometheus.exporters.exportarr-prowlarr.environment | See the configuration guide for available options.
|
| security.doas.extraRules.*.keepEnv | If true, environment variables other than those
listed in
doas(1)
are kept when creating the environment for the new process.
|
| services.changedetection-io.environmentFile | Securely pass environment variables to changedetection-io
|
| services.snips-sh.settings | The configuration of snips-sh is done through environment variables,
therefore you must use upper snake case (e.g. SNIPS_HTTP_INTERNAL)
|
| services.prometheus.exporters.mail.environmentFile | File containing env-vars to be substituted into the exporter's config.
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.environment | The Azure environment
|
| services.openssh.settings.AcceptEnv | Specifies what environment variables sent by the client will be copied into the session's
environment
|
| services.prometheus.exporters.kafka.environmentFile | File containing the credentials to access the repository, in the
format of an EnvironmentFile as described by systemd.exec(5)
|
| services.librechat.env | Environment variables that will be set for the service
|
| services.prometheus.exporters.restic.environmentFile | File containing the credentials to access the repository, in the
format of an EnvironmentFile as described by systemd.exec(5)
|
| services.pocket-id.settings | Environment variables to be passed
|
| services.go-neb.secretFile | Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: $ENVIRONMENT
or ${VARIABLE}
|
| virtualisation.oci-containers.containers.<name>.environmentFiles | Environment files for this container.
|
| services.turn-rs.secretFile | Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: $ENVIRONMENT or
${VARIABLE}
|
| services.dawarich.extraEnvFiles | Extra environment files to pass to all Dawarich services
|
| security.soteria.enable | Whether to enable Soteria, a Polkit authentication agent
for any desktop environment.
You should only enable this if you are on a Desktop Environment that
does not provide a graphical polkit authentication agent, or you are on
a standalone window manager or Wayland compositor.
|
| services.prometheus.exporters.junos-czerwonk.environmentFile | File containing env-vars to be substituted into the exporter's config.
|
| nix.settings.sandbox | If set, Nix will perform builds in a sandboxed environment that it
will set up automatically for each build
|
| services.bluesky-pds.settings | Environment variables to set for the service
|
| services.castopod.settings | Environment variables used for Castopod
|
| services.wiki-js.settings | Settings to configure wiki-js
|
| services.traefik.useEnvSubst | Whether to use envSubst in the ExecStartPre phase to augment the generated static config
|
| services.powerdns.secretFile | Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: $ENVIRONMENT
or ${VARIABLE}
|
| security.doas.extraRules.*.setEnv | Keep or set the specified variables
|
| services.forgejo.secrets | This is a small wrapper over systemd's LoadCredential
|
| services.zenohd.env | Set environment variables consumed by zenohd and its plugins.
|
| programs.nh.flake | The string that will be used for the NH_FLAKE environment variable.
NH_FLAKE is used by nh as the default flake for performing actions, such as
nh os switch
|
| services.wivrn.monadoEnvironment | Environment variables to be passed to the Monado environment.
|
| services.hydra.extraEnv | Extra environment variables for Hydra.
|
| services.portunus.dex.oidcClients | List of OIDC clients
|
| services.athens.goEnv | Specifies the type of environment to run
|
| programs.mtr.enable | Whether to add mtr to the global environment and configure a
setcap wrapper for it.
|
| services.pufferpanel.enable | Whether to enable PufferPanel game management server
|
| services.uptime.nodeEnv | The node environment to run in (development, production, etc.)
|
| services.keepalived.secretFile | Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: $ENVIRONMENT
or ${VARIABLE}
|
| services.anubis.defaultOptions.settings | Freeform configuration via environment variables for Anubis
|
| services.anubis.instances.<name>.settings | Freeform configuration via environment variables for Anubis
|
| boot.extraSystemdUnitPaths | Additional paths that get appended to the SYSTEMD_UNIT_PATH environment variable
that can contain mutable unit files.
|
| services.udev.path | Packages added to the PATH environment variable when
executing programs from Udev rules.
coreutils, gnu{sed,grep}, util-linux and config.systemd.package are
automatically included.
|
| services.pdfding.envFiles | Environment variable files
|
| services.mediamtx.env | Extra environment variables for MediaMTX
|
| xdg.portal.lxqt.enable | Whether to enable the desktop portal for the LXQt desktop environment
|
| services.pocket-id.credentials | Environment variables which are loaded from the contents of the specified file paths
|
| services.youtrack.environmentalParameters | Environmental configuration parameters, set imperatively
|
| services.gitea-actions-runner.instances.<name>.tokenFile | Path to an environment file, containing the TOKEN environment
variable, that holds a token to register at the configured
Gitea/Forgejo instance.
|
| services.pretix.plugins | Pretix plugins to install into the Python environment.
|
| services.vaultwarden.config | The configuration of vaultwarden is done through environment variables,
therefore it is recommended to use upper snake case (e.g. DISABLE_2FA_REMEMBER)
|
| services.n8n.webhookUrl | WEBHOOK_URL for n8n, in case we're running behind a reverse proxy
|
| services.athens.goBinaryEnvVars | Environment variables to pass to the Go binary.
|
| services.rauc.client.enable | Whether to enable RAUC client in the system environment.
|
| services.slurm.clusterName | Necessary to distinguish accounting records in a multi-cluster environment.
|
| services.phpfpm.pools.<name>.phpEnv | Environment variables used for this PHP-FPM pool.
|
| services.librechat.credentials | Environment variables which are loaded from the contents of files at a file paths, mainly used for secrets
|
| programs.wavemon.enable | Whether to add wavemon to the global environment and configure a
setcap wrapper for it.
|
| networking.proxy.allProxy | This option specifies the all_proxy environment variable.
|
| networking.proxy.ftpProxy | This option specifies the ftp_proxy environment variable.
|
| services.youtrack.environmentalParameters.listen-port | The port YouTrack will listen on.
|
| services.librechat.credentialsFile | Path to a file that contains environment variables
|
| services.pretalx.plugins | Pretalx plugins to install into the Python environment.
|
| programs.less.envVariables | Defines environment variables.
|
| networking.proxy.httpProxy | This option specifies the http_proxy environment variable.
|
| services.umami.settings | Additional configuration (environment variables) for Umami, see
https://umami.is/docs/environment-variables for supported values.
|
| services.skydns.extraConfig | Skydns attribute set of extra config options passed as environment variables.
|
| systemd.services.<name>.path | Packages added to the service's PATH
environment variable
|
| services.firezone.server.settingsSecret | This is a convenience option which allows you to set secret values for
environment variables by specifying a file which will contain the value
at runtime
|
| services.cassandra.jvmOpts | Populate the JVM_OPT environment variable.
|
| security.sudo.keepTerminfo | Whether to preserve the TERMINFO and TERMINFO_DIRS
environment variables, for root and the wheel group.
|
| services.hadoop.hdfs.zkfc.extraEnv | Extra environment variables for HDFS ZooKeeper failover controller
|
| programs.gamescope.env | Default environment variables available to the GameScope process, overridable at runtime.
|
| services.maddy.config | Server configuration, see
https://maddy.email for
more information
|
| xdg.portal.xdgOpenUsePortal | Sets environment variable NIXOS_XDG_OPEN_USE_PORTAL to 1
This will make xdg-open use the portal to open programs, which resolves bugs involving
programs opening inside FHS envs or with unexpected env vars set from wrappers
|
| programs.java.enable | Install and setup the Java development kit.
This adds JAVA_HOME to the global environment, by sourcing the
jdk's setup-hook on shell init
|
| services.youtrack.environmentalParameters.listen-address | The interface YouTrack will listen on.
|
| programs.steam.extraPackages | Additional packages to add to the Steam environment.
|
| networking.proxy.httpsProxy | This option specifies the https_proxy environment variable.
|
| networking.proxy.rsyncProxy | This option specifies the rsync_proxy environment variable.
|
| programs.ssh.enableAskPassword | Whether to configure SSH_ASKPASS in the environment.
|
| programs.light.brightnessKeys.enable | Whether to enable brightness control with keyboard keys
|
| services.n8n.customNodes | List of custom n8n community node packages to load
|
| services.oauth2-proxy.keyFile | oauth2-proxy allows passing sensitive configuration via environment variables
|
| services.emacs.defaultEditor | When enabled, configures emacsclient to be the default editor
using the EDITOR environment variable.
|
| services.dex.settings | The available options can be found in
the example configuration
|
| services.whoogle-search.extraEnv | Extra environment variables to pass to Whoogle, see
https://github.com/benbusby/whoogle-search?tab=readme-ov-file#environment-variables
|
| services.zwave-js-ui.settings | Extra environment variables passed to the zwave-js-ui process
|
| security.tpm2.fapi.tcti | The TCTI which will be used
|
| services.jupyter.kernels.<name>.env | Environment variables to set for the kernel.
|
| services.hadoop.hdfs.httpfs.extraEnv | Extra environment variables for HDFS JournalNode
|
| systemd.user.services.<name>.path | Packages added to the service's PATH
environment variable
|
| networking.proxy.noProxy | This option specifies the no_proxy environment variable
|
| services.kubo.enable | Whether to enable the Interplanetary File System (WARNING: may cause severe network degradation)
|
| services.qui.settings | qui configuration options
|
| services.mastodon.extraEnvFiles | Extra environment files to pass to all mastodon services
|
| services.deepin.dde-api.enable | Whether to enable the DDE API, which provides some dbus interfaces that is used for screen zone detecting,
thumbnail generating, and sound playing in Deepin Desktop Environment
.
|
| services.librechat.env.PORT | The value that will be passed to the PORT environment variable, telling LibreChat what to listen on.
|
| services.corteza.settings | Configuration for Corteza, will be passed as environment variables
|
| services.docuseal.extraConfig | Extra environment variables to pass to DocuSeal services.
|
| services.mastodon.extraConfig | Extra environment variables to pass to all mastodon services.
|
| services.keter.bundle.secretScript | Allows loading of private environment variables
|
| programs.vscode.defaultEditor | When enabled, configures VSCode to be the default editor
using the EDITOR environment variable.
|
| services.pretix.settings | pretix configuration as a Nix attribute set
|
| services.listmonk.secretFile | A file containing secrets as environment variables
|
| services.docuseal.extraEnvFiles | Extra environment files to pass to DocuSeal services
|
| programs.bandwhich.enable | Whether to add bandwhich to the global environment and configure a
setcap wrapper for it.
|
| programs.nexttrace.enable | Whether to enable Nexttrace to the global environment and configure a setcap wrapper for it.
|
| services.prosody.extraConfig | Additional prosody configuration
The generated file is processed by envsubst to allow secrets to be passed securely via environment variables.
|
| programs.neovim.defaultEditor | When enabled, installs neovim and configures neovim to be the default editor
using the EDITOR environment variable.
|
| services.homebox.settings | The homebox configuration as environment variables
|
| services.outline.redisUrl | Connection to a redis server
|
| services.keter.bundle.publicScript | Allows loading of public environment variables,
these are emitted to the log so it shouldn't contain secrets.
|
| services.jupyter.extraPackages | Extra packages to be available in the jupyter runtime environment
|
| programs.fish.useBabelfish | If enabled, the configured environment will be translated to native fish using babelfish
|
| services.podgrab.passwordFile | The path to a file containing the PASSWORD environment variable
definition for Podgrab's authentication.
|
| services.pretalx.settings | pretalx configuration as a Nix attribute set
|
| services.kubernetes.path | Packages added to the services' PATH environment variable
|
| services.memos.settings | The environment variables to configure Memos.
At time of writing, there is no clear documentation about possible values
|
| services.xserver.windowManager.i3.updateSessionEnvironment | Whether to run dbus-update-activation-environment and systemctl import-environment before session start
|
| services.transfer-sh.secretFile | Path to file containing environment variables
|
| services.frigate.preCheckConfig | This script gets run before the config is checked
|
| systemd.globalEnvironment | Environment variables passed to all systemd units.
|
| services.vector.validateConfig | Enable the checking of the vector config during build time
|
| services.datadog-agent.package | The datadog-agent package to use. ::: {.note}
The provided package is expected to have an overridable pythonPackages-attribute
which configures the Python environment with the Datadog checks.
:::
|
| services.hadoop.hdfs.namenode.extraEnv | Extra environment variables for HDFS NameNode
|
| services.hadoop.hdfs.datanode.extraEnv | Extra environment variables for HDFS DataNode
|
| services.searx.settings | Searx settings
|
| programs.nethoscope.enable | Whether to add nethoscope to the global environment and configure a
setcap wrapper for it.
|
| services.screego.settings | Screego settings passed as Nix attribute set, they will be merged with
the defaults
|
| programs.sway.wrapperFeatures.gtk | Whether to enable the wrapGAppsHook wrapper to execute sway with required environment
variables for GTK applications.
|
| services.firefly-iii.settings.APP_ENV | The app environment
|
| services.jupyter.kernels | Declarative kernel config
|
| xdg.terminal-exec.settings | Configuration options for the Default Terminal Execution Specification
|
| services.mastodon.user | User under which mastodon runs
|
| services.immich.secretsFile | Path of a file with extra environment variables to be loaded from disk
|
| programs.soundmodem.enable | Whether to add Soundmodem to the global environment and configure a
wrapper for 'soundmodemconfig' for users in the 'soundmodem' group.
|
| services.lavalink.extraConfig | Configuration to write to application.yml
|
| services.miniflux.config.CREATE_ADMIN | Create an admin user from environment variables.
|
| services.xserver.excludePackages | Which X11 packages to exclude from the default environment
|
| services.fider.database.url | URI to use for the main PostgreSQL database
|
| services.pinchflat.extraConfig | The configuration of Pinchflat is handled through environment variables
|
| services.mollysocket.logLevel | Set the RUST_LOG environment variable
|
| i18n.inputMethod.ibus.waylandFrontend | Use the Wayland input method frontend
|
| services.desktopManager.cosmic.enable | Whether to enable COSMIC desktop environment.
|
| programs.sway.extraSessionCommands | Shell commands executed just before Sway is started
|
| services.listmonk.settings | Static settings set in the config.toml, see https://github.com/knadh/listmonk/blob/master/config.toml.sample for details
|
| services.portunus.dex.enable | Whether to enable Dex ldap connector
|
| services.open-web-calendar.settings | Configuration for the server
|
| systemd.managerEnvironment | Environment variables of PID 1
|
| services.pdfding.backup.enable | Automatic backup of important data to a AWS S3 (or compatible) instance
|
| services.webdav.settings | Attrset that is converted and passed as config file
|
| systemd.services.<name>.enableDefaultPath | Whether to append a minimal default PATH environment variable to the service, containing common system utilities.
|
| services.jupyter.kernels.<name>.language | Language of the environment
|
| security.duosec.acceptEnvFactor | Look for factor selection or passcode in the
$DUO_PASSCODE environment variable before
prompting the user for input
|
| services.jupyterhub.kernels.<name>.env | Environment variables to set for the kernel.
|
| services.microbin.passwordFile | Path to file containing environment variables
|
| programs.wireshark.enable | Whether to add Wireshark to the global environment and create a 'wireshark'
group
|
| services.desktopManager.plasma6.enable | Enable the Plasma 6 (KDE 6) desktop environment.
|
| services.earlyoom.killHook | An absolute path to an executable to be run for each process killed
|
| services.tor.torsocks.socks5Username | SOCKS5 username
|
| services.outline.databaseUrl | URI to use for the main PostgreSQL database
|
| services.tee-supplicant.reeFsParentPath | The directory where the secure filesystem will be stored in the rich
execution environment (REE FS).
|
| services.tor.torsocks.socks5Password | SOCKS5 password
|
| services.broadcast-box.settings | Attribute set of environment variables.
https://github.com/Glimesh/broadcast-box#environment-variables
The status API exposes stream keys so DISABLE_STATUS is enabled
by default.
|
| programs.gnupg.agent.enableSSHSupport | Enable SSH agent support in GnuPG agent
|
| services.tomcat.extraEnvironment | Environment Variables to pass to the tomcat service
|
| services.matrix-conduit.secretFile | Path to a file containing sensitive environment as described in {manpage}`systemd.exec(5)
|
| services.mattermost.socket.export | Whether to enable Export socket control to system environment variables.
|
| services.healthchecks.settings | Environment variables which are read by healthchecks (local)_settings.py
|
| services.garage.extraEnvironment | Extra environment variables to pass to the Garage server.
|
| systemd.user.services.<name>.enableDefaultPath | Whether to append a minimal default PATH environment variable to the service, containing common system utilities.
|
| services.xserver.desktopManager.cde.enable | Whether to enable Common Desktop Environment.
|
| services.glance.settings | Configuration written to a yaml file that is read by glance
|
| services.xserver.desktopManager.mate.enable | Enable the MATE desktop environment
|
| services.xserver.desktopManager.xfce.enable | Enable the Xfce desktop environment.
|
| services.healthchecks.settingsFile | Environment variables which are read by healthchecks (local)_settings.py
|
| services.cloudflare-ddns.ip4Domains | Explicit list of domains to manage only for IPv4
|
| services.cloudflare-ddns.ip6Domains | Explicit list of domains to manage only for IPv6
|
| services.librechat.settings | A free-form attribute set that will be written to librechat.yaml
|
| hardware.alsa.defaultDevice.capture | The default capture device (i.e. microphone)
|
| services.pdfding.extraEnvironment | Additional environment variables
|
| services.silverbullet.envFile | File containing extra environment variables
|
| services.uvcvideo.dynctrl.enable | Whether to enable uvcvideo dynamic controls
|
| networking.firewall.extraPackages | Additional packages to be included in the environment of the system
as well as the path of networking.firewall.extraCommands.
|
| services.code-server.extraEnvironment | Additional environment variables to pass to code-server.
|
| services.displayManager.sddm.extraPackages | Extra Qt plugins / QML libraries to add to the environment.
|
| services.postsrsd.settings.chroot-dir | Path to chroot into at runtime as an additional layer of protection.
We confine the runtime environment through systemd hardening instead, so this option is read-only.
|
| services.maddy.tls.loader | TLS certificates are obtained by modules called "certificate
loaders"
|
| security.tpm2.tctiEnvironment.enable | Set common TCTI environment variables to the specified value
|
| hardware.alsa.defaultDevice.playback | The default playback device
|
| services.syncthing.all_proxy | Overwrites the all_proxy environment variable for the Syncthing process to
the given value
|
| services.hadoop.yarn.nodemanager.extraEnv | Extra environment variables
|
| services.rabbitmq.unsafeCookie | Erlang cookie is a string of arbitrary length which must
be the same for several nodes to be allowed to communicate
|
| services.jupyterhub.kernels | Declarative kernel config
Kernels can be declared in any language that supports and has
the required dependencies to communicate with a jupyter server
|
| services.xserver.displayManager.xpra.desktop | Start a desktop environment instead of seamless mode
|
| services.datadog-agent.processAgentPackage | Which DataDog v7 agent package to use
|
| services.hadoop.hdfs.journalnode.extraEnv | Extra environment variables for HDFS JournalNode
|
| services.spark.worker.extraEnvironment | Extra environment variables to pass to spark worker.
|
| services.wastebin.secretFile | Path to file containing sensitive environment variables
|
| services.cloud-init.enable | Enable the cloud-init service
|
| boot.initrd.systemd.managerEnvironment | Environment variables of PID 1
|
| programs.hyprland.systemd.setPath.enable | Set environment path of systemd to include the current system's bin directory
|
| networking.nftables.preCheckRuleset | This script gets run before the ruleset is checked
|
| services.cloudflare-ddns.domains | List of domain names (FQDNs) to manage
|
| services.restic.backups.<name>.createWrapper | Whether to generate and add a script to the system path, that has the same environment variables set
as the systemd service
|
| services.renovate.credentials | Allows configuring environment variable credentials for renovate, read from files
|
| services.spark.master.extraEnvironment | Extra environment variables to pass to spark master
|
| services.tinc.networks.<name>.chroot | Change process root directory to the directory where the config file is located (/etc/tinc/netname/), for added security
|
| security.pam.services.<name>.setEnvironment | Whether the service should set the environment variables
listed in environment.sessionVariables
using pam_env.so.
|
| services.xserver.desktopManager.plasma5.enable | Enable the Plasma 5 (KDE 5) desktop environment.
|
| services.xserver.updateDbusEnvironment | Whether to update the DBus activation environment after launching the
desktop manager.
|
| services.jupyterhub.kernels.<name>.language | Language of the environment
|
| services.sunshine.applications.env | Environment variables to be set for the applications.
|
| services.matrix-conduit.extraEnvironment | Extra Environment variables to pass to the conduit server.
|
| services.matrix-tuwunel.extraEnvironment | Extra Environment variables to pass to the tuwunel server.
|
| services.buildkite-agents.<name>.runtimePackages | Add programs to the buildkite-agent environment
|
| services.mediagoblin.pluginPackages | Plugins to add to the environment of MediaGoblin
|
| services.pufferpanel.extraPackages | Packages to add to the PATH environment variable
|
| system.nixos.label | NixOS version name to be used in the names of generated
outputs and boot labels
|
| services.gitlab-runner.services.<name>.registrationConfigFile | Absolute path to a file with environment variables
used for gitlab-runner registration with runner registration
tokens
|
| services.karakeep.extraEnvironment | Environment variables to pass to Karakaeep
|
| security.acme.certs.<name>.credentialFiles | Environment variables suffixed by "_FILE" to set for the cert's service
for your selected dnsProvider
|
| networking.nftables.checkRuleset | Run nft check on the ruleset to spot syntax errors during build
|
| services.firezone.server.settings | Environment variables for the Firezone server
|
| services.nullmailer.config.helohost | Sets the environment variable $HELOHOST which is used by the
SMTP protocol module to set the parameter given to the HELO command
|
| services.gitlab-runner.services.<name>.authenticationTokenConfigFile | Absolute path to a file containing environment variables used for
gitlab-runner registrations with runner authentication tokens
|
| services.linkwarden.secretFiles | Attribute set containing paths to files to add to the environment of linkwarden
|
| services.github-runners.<name>.extraEnvironment | Extra environment variables to set for the runner, as an attrset.
|
| services.radicle.ci.broker.settings.adapters.<name>.env | Environment variables to add when running the adapter.
|
| services.transmission.webHome | If not null, sets the value of the TRANSMISSION_WEB_HOME
environment variable used by the service
|
| services.centrifugo.credentials | Environment variables with absolute paths to credentials files to load
on service startup.
|
| services.cassandra.maxHeapSize | Must be left blank or set together with heapNewSize
|
| services.guacamole-server.extraEnvironment | Environment variables to pass to guacd.
|
| services.thanos.sidecar.reloader.config-envsubst-file | Output file for environment variable substituted config file.
|
| services.firezone.server.web.settings | Environment variables for this component of the Firezone server
|
| programs.gnupg.agent.pinentryPackage | Which pinentry package to use
|
| services.jupyterhub.jupyterhubEnv | Python environment to run jupyterhub
Customizing will affect the packages available in the hub and
proxy
|
| services.firezone.server.api.settings | Environment variables for this component of the Firezone server
|
| security.acme.defaults.credentialFiles | Environment variables suffixed by "_FILE" to set for the cert's service
for your selected dnsProvider
|
| services.prometheus.exporters.bitcoin.extraEnv | Extra environment variables for the exporter.
|
| services.jupyterhub.jupyterlabEnv | Python environment to run jupyterlab
Customizing will affect the packages available in the
jupyterlab server and the default kernel provided
|
| programs.opengamepadui.extraPackages | Additional packages to add to the OpenGamepadUI environment.
|
| services.peertube.serviceEnvironmentFile | Set environment variables for the service
|
| services.boinc.extraEnvPackages | Additional packages to make available in the environment in which
BOINC will run
|
| services.reposilite.settings.keyPath | Path to the .jsk KeyStore or paths to the PKCS#8 certificate and private key, separated by a space (see example)
|
| services.jupyter.extraEnvironmentVariables | Extra environment variables to be set in the runtime context of jupyter notebook
|
| services.gitea-actions-runner.instances.<name>.labels | Labels used to map jobs to their runtime environment
|
| services.firezone.server.domain.settings | Environment variables for this component of the Firezone server
|
| services.openvscode-server.extraEnvironment | Additional environment variables to pass to openvscode-server.
|
| services.waagent.settings.ResourceDisk.FileSystem | The file system type for the resource disk
|
| services.sharkey.setupMeilisearch | Whether to automatically set up a local Meilisearch instance and configure Sharkey to use it
|
| services.cassandra.heapNewSize | Must be left blank or set together with heapNewSize
|
| services.kubernetes.pki.etcClusterAdminKubeconfig | Symlink a kubeconfig with cluster-admin privileges to environment path
(/etc/<path>).
|
| services.klipper.firmwares.<name>.enableKlipperFlash | Whether to enable flashings scripts for firmware
|
| services.pinnwand.settings.database_uri | Database URI compatible with SQLAlchemy
|
| services.nextcloud-whiteboard-server.settings | Settings to configure backend server
|
| documentation.man.mandoc.manPath | Change the paths included in the MANPATH environment variable,
i. e. the directories where man(1)
looks for section-specific directories of man pages
|
| services.athens.downloadMode | Defines how Athens behaves when a module@version
is not found in storage
|
| services.foundationdb.extraReadWritePaths | An extra set of filesystem paths that FoundationDB can read to
and write from
|
| services.hadoop.yarn.resourcemanager.extraEnv | Extra environment variables
|
| services.matrix-continuwuity.extraEnvironment | Extra Environment variables to pass to the continuwuity server.
|
| services.xserver.displayManager.startx.generateScript | Whether to generate the system-wide xinitrc script (/etc/X11/xinit/xinitrc)
|
| services.keepalived.vrrpInstances.<name>.unicastPeers | Do not send VRRP adverts over VRRP multicast group
|
| services.xserver.desktopManager.enlightenment.enable | Enable the Enlightenment desktop environment.
|
| services.sabnzbd.settings.ntfosd.ntfosd_enable | Whether to enable NotifyOSD alerts
|
| services.suricata.settings.dpdk | Data Plane Development Kit is a framework for fast packet processing in data plane applications running on a wide variety of CPU architectures
|
| services.xserver.windowManager.xmonad.enableConfiguredRecompile | Enable recompilation even if config is set to a
non-null value
|
| programs.pay-respects.aiIntegration | Whether to enable pay-respects' LLM integration
|
| virtualisation.directBoot.enable | If enabled, the virtual machine will boot directly into the kernel instead of through a bootloader
|
| services.prometheus.exporters.pgbouncer.connectionEnvFile | File that must contain the environment variable
PGBOUNCER_EXPORTER_CONNECTION_STRING which is set to the connection
string used by pgbouncer
|
| services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.secret_key | The AWS API key secret
|
| services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.access_key | The AWS API key id
|
| services.xserver.windowManager.xmonad.config | Configuration from which XMonad gets compiled
|
| services.system76-scheduler.settings.processScheduler.foregroundBoost.enable | Boost foreground process priorities.
(And de-boost background ones)
|
| services.headscale.settings.oidc.client_secret_path | Path to OpenID Connect client secret file
|
| services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.secret_key | The AWS API keys
|
| services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.access_key | The AWS API keys
|
| services.doh-server.settings.ecs_allow_non_global_ip | By default, non global IP addresses are never forwarded to upstream servers
|
| programs.zsh.shellAliases | Set of aliases for zsh shell, which overrides environment.shellAliases
|
| programs.fish.shellAliases | Set of aliases for fish shell, which overrides environment.shellAliases
|
| programs.bash.shellAliases | Set of aliases for bash shell, which overrides environment.shellAliases
|
| qt.enable | Whether to enable Qt configuration, including theming
|
| users.users.<name>.packages | The set of packages that should be made available to the user
|
| services.patroni.settings | The primary patroni configuration
|
| services.netdata.configDir | Complete netdata config directory except netdata.conf
|
| users.extraUsers.<name>.packages | The set of packages that should be made available to the user
|
| services.xserver.wacom.enable | Whether to enable the Wacom touchscreen/digitizer/tablet
|
| programs.steam.package | The Steam package to use
|
| services.hylafax.userAccessFile | The hosts.hfaxd
file entry in the spooling area
will be symlinked to the location given here
|
| programs.git.lfs.enablePureSSHTransfer | Whether to enable Enable pure SSH transfer in server side by adding git-lfs-transfer to environment.systemPackages.
|
| services.gitlab-runner.extraPackages | Extra packages to add to PATH for the gitlab-runner process
|
| services.swapspace.installWrapper | This will add swapspace wrapped with the generated config, to environment.systemPackages
|
| documentation.enable | Whether to install documentation of packages from
environment.systemPackages into the generated system path
|
| services.alloy.configPath | Alloy configuration file/directory path
|
| services.mqtt2influxdb.mqtt.password | MQTT password
|
| programs.steam.gamescopeSession.env | Environmental variables to be passed to GameScope for the session.
|
| services.maddy.secrets | A list of files containing the various secrets
|
| services.mqtt2influxdb.influxdb.password | Password for InfluxDB login
|
| programs.steam.extraCompatPackages | Extra packages to be used as compatibility tools for Steam on Linux
|
| hardware.nvidia.prime.offload.enableOffloadCmd | Whether to enable adding a nvidia-offload convenience script to environment.systemPackages
for offloading programs to an nvidia device
|
| services.eintopf.secrets | A list of files containing the various secrets
|
| services.atuin.database.uri | URI to the database
|
| services.evcc.settings | evcc configuration as a Nix attribute set
|
| services.vmagent.checkConfig | Check configuration
|
| services.pomerium.secretsFile | Path to file containing secrets for Pomerium, in systemd
EnvironmentFile format
|
| services.rspamd-trainer.secrets | A list of files containing the various secrets
|
| services.duplicity.secretFile | Path of a file containing secrets (gpg passphrase, access key...) in
the format of EnvironmentFile as described by
systemd.exec(5)
|
| services.ipfs-cluster.secretFile | File containing the cluster secret in the format of EnvironmentFile as described by
systemd.exec(5)
|
| programs.opengamepadui.gamescopeSession.env | Environmental variables to be passed to GameScope for the session.
|
| services.minio.rootCredentialsFile | File containing the MINIO_ROOT_USER, default is "minioadmin", and
MINIO_ROOT_PASSWORD (length >= 8), default is "minioadmin"; in the format of
an EnvironmentFile=, as described by systemd.exec(5).
|
| services.prefect.databasePasswordFile | path to a file containing e.g.:
DBPASSWORD=supersecret
stored outside the nix store, read by systemd as EnvironmentFile.
|
| services.mealie.credentialsFile | File containing credentials used in mealie such as POSTGRES_PASSWORD
or sensitive LDAP options
|
| services.pyload.credentialsFile | File containing PYLOAD_DEFAULT_USERNAME and
PYLOAD_DEFAULT_PASSWORD in the format of an EnvironmentFile=,
as described by systemd.exec(5)
|
| services.traccar.settings | config.xml configuration as a Nix attribute set
|
| services.mautrix-signal.settings | config.yaml configuration as a Nix attribute set
|
| services.firefox-syncserver.secrets | A file containing the various secrets
|
| services.mautrix-telegram.settings | config.yaml configuration as a Nix attribute set
|
| boot.isNspawnContainer | Whether the machine is running in an nspawn container
|
| services.miniflux.adminCredentialsFile | File containing the ADMIN_USERNAME and
ADMIN_PASSWORD (length >= 6) in the format of
an EnvironmentFile=, as described by systemd.exec(5).
|
| services.rmfakecloud.extraSettings | Extra settings in the form of a set of key-value pairs
|
| services.mautrix-whatsapp.settings | config.yaml configuration as a Nix attribute set
|
| services.mautrix-meta.instances.<name>.settings | config.yaml configuration as a Nix attribute set
|
| services.wstunnel.clients.<name>.httpProxy | Proxy to use to connect to the wstunnel server (USER:PASS@HOST:PORT).
Passwords specified here will be world-readable in the Nix store!
To pass a password to the service, point the environmentFile option
to a file containing PROXY_PASSWORD=<your-password-here> and set
this option to <user>:$PROXY_PASSWORD@<host>:<port>
|
| services.mattermost.database.password | Password for local Mattermost database user
|
| services.nextcloud-whiteboard-server.secrets | A list of files containing the various secrets
|
| services.icecream.daemon.user | User to run the icecream daemon as
|
| xdg.portal.extraPortals | List of additional portals to add to path
|
| programs.nm-applet.indicator | Whether to use indicator instead of status icon
|
| services.geoclue2.enableDemoAgent | Whether to use the GeoClue demo agent
|
| programs.dms-shell.systemd.target | The systemd target that will automatically start the DankMaterialShell service
|
| hardware.graphics.enable | Whether to enable hardware accelerated graphics drivers
|
| services.icecream.daemon.cacheLimit | Maximum size in Megabytes of cache used to store compile environments of compile clients.
|
| services.prometheus.exporters.pve.configFile | Path to the service's config file
|
| services.matrix-appservice-discord.settings | config.yaml configuration as a Nix attribute set
|
| services.victoriametrics.checkConfig | Check configuration
|
| services.prometheus.alertmanager.checkConfig | Check configuration with amtool check-config
|
| services.wstunnel.clients.<name>.upgradeCredentials | Use these credentials to authenticate during the HTTP upgrade request
(Basic authorization type, USER:[PASS]).
Passwords specified here will be world-readable in the Nix store!
To pass a password to the service, point the environmentFile option
to a file containing HTTP_PASSWORD=<your-password-here> and set this
option to <user>:$HTTP_PASSWORD
|
| services.icecream.daemon.schedulerHost | Explicit scheduler hostname, useful in firewalled environments
|
| services.easytier.instances.<name>.settings.network_secret | EasyTier network credential used for verification and
encryption
|
| services.livekit.settings.rtc.use_external_ip | When set to true, attempts to discover the host's public IP via STUN
|
| services.headscale.settings.database.sqlite.write_ahead_log | Enable WAL mode for SQLite
|
| services.livekit.ingress.settings.rtc_config.use_external_ip | When set to true, attempts to discover the host's public IP via STUN
|
| virtualisation.xen.store.settings.conflict.rateLimitIsAggregate | If the conflict.rateLimitIsAggregate option is true, then after each
tick one point of conflict-credit is given to just one domain: the
one at the front of the queue
|