| services.prometheus.exporters.php-fpm.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.changedetection-io.environmentFile | Securely pass environment variables to changedetection-io
|
| services.prometheus.exporters.postgres.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.ocis.environment | Extra config options
|
| services.pds.settings | Environment variables to set for the service
|
| services.maddy.secrets | A list of files containing the various secrets
|
| services.eintopf.secrets | A list of files containing the various secrets
|
| services.atuin.database.uri | URI to the database
|
| services.evcc.settings | evcc configuration as a Nix attribute set
|
| services.vmagent.checkConfig | Check configuration
|
| services.bluesky-pds.settings | Environment variables to set for the service
|
| services.pomerium.secretsFile | Path to file containing secrets for Pomerium, in systemd
EnvironmentFile format
|
| services.rspamd-trainer.secrets | A list of files containing the various secrets
|
| services.duplicity.secretFile | Path of a file containing secrets (gpg passphrase, access key...) in
the format of EnvironmentFile as described by
systemd.exec(5)
|
| services.pghero.environment | Environment variables to set for the service
|
| services.webdav.settings | Attrset that is converted and passed as config file
|
| services.ipfs-cluster.secretFile | File containing the cluster secret in the format of EnvironmentFile as described by
systemd.exec(5)
|
| services.minio.rootCredentialsFile | File containing the MINIO_ROOT_USER, default is "minioadmin", and
MINIO_ROOT_PASSWORD (length >= 8), default is "minioadmin"; in the format of
an EnvironmentFile=, as described by systemd.exec(5).
|
| services.prefect.databasePasswordFile | path to a file containing e.g.:
DBPASSWORD=supersecret
stored outside the nix store, read by systemd as EnvironmentFile.
|
| services.mealie.credentialsFile | File containing credentials used in mealie such as POSTGRES_PASSWORD
or sensitive LDAP options
|
| services.pyload.credentialsFile | File containing PYLOAD_DEFAULT_USERNAME and
PYLOAD_DEFAULT_PASSWORD in the format of an EnvironmentFile=,
as described by systemd.exec(5)
|
| services.traccar.settings | config.xml configuration as a Nix attribute set
|
| services.mautrix-signal.settings | config.yaml configuration as a Nix attribute set
|
| services.firefox-syncserver.secrets | A file containing the various secrets
|
| services.mautrix-telegram.settings | config.yaml configuration as a Nix attribute set
|
| services.beszel.agent.environment | Environment variables for configuring the beszel-agent service
|
| services.miniflux.adminCredentialsFile | File containing the ADMIN_USERNAME and
ADMIN_PASSWORD (length >= 6) in the format of
an EnvironmentFile=, as described by systemd.exec(5).
|
| services.rmfakecloud.extraSettings | Extra settings in the form of a set of key-value pairs
|
| services.mautrix-whatsapp.settings | config.yaml configuration as a Nix attribute set
|
| services.mautrix-meta.instances.<name>.settings | config.yaml configuration as a Nix attribute set
|
| services.wstunnel.clients.<name>.httpProxy | Proxy to use to connect to the wstunnel server (USER:PASS@HOST:PORT).
Passwords specified here will be world-readable in the Nix store!
To pass a password to the service, point the environmentFile option
to a file containing PROXY_PASSWORD=<your-password-here> and set
this option to <user>:$PROXY_PASSWORD@<host>:<port>
|
| services.mattermost.database.password | Password for local Mattermost database user
|
| services.nextcloud-whiteboard-server.secrets | A list of files containing the various secrets
|
| services.prometheus.exporters.pve.configFile | Path to the service's config file
|
| services.matrix-appservice-discord.settings | config.yaml configuration as a Nix attribute set
|
| services.victoriametrics.checkConfig | Check configuration
|
| services.prometheus.alertmanager.checkConfig | Check configuration with amtool check-config
|
| services.wstunnel.clients.<name>.upgradeCredentials | Use these credentials to authenticate during the HTTP upgrade request
(Basic authorization type, USER:[PASS]).
Passwords specified here will be world-readable in the Nix store!
To pass a password to the service, point the environmentFile option
to a file containing HTTP_PASSWORD=<your-password-here> and set this
option to <user>:$HTTP_PASSWORD
|
| services.easytier.instances.<name>.settings.network_secret | EasyTier network credential used for verification and
encryption
|
| services.pufferpanel.environment | Environment variables to set for the service
|
| services.wakapi.environmentFiles | Use this to set WAKAPI_PASSWORD_SALT and WAKAPI_MAIL_SMTP_PASS.
|
| services.fider.environmentFiles | Files to load environment variables from
|
| services.pghero.environmentFiles | File to load environment variables from
|
| services.bcg.environmentFiles | File to load as environment file
|
| services.gotify.environmentFiles | Files containing additional config environment variables for gotify-server
|
| services.patroni.environmentFiles | Environment variables made available to Patroni as files content, useful for providing secrets from files.
|
| services.lidarr.environmentFiles | Environment file to pass secret configuration values
|
| services.sonarr.environmentFiles | Environment file to pass secret configuration values
|
| services.radarr.environmentFiles | Environment file to pass secret configuration values
|
| services.vikunja.environmentFiles | List of environment files set in the vikunja systemd service
|
| services.pretalx.environmentFiles | Environment files that allow passing secret configuration values
|
| services.chhoto-url.environmentFiles | Files to load environment variables from in addition to services.chhoto-url.settings
|
| services.zipline.environmentFiles | Files to load environment variables from (in addition to services.zipline.settings)
|
| services.readarr.environmentFiles | Environment file to pass secret configuration values
|
| services.sharkey.environmentFiles | List of paths to files containing environment variables for Sharkey to use at runtime
|
| services.stirling-pdf.environmentFiles | Files containing additional environment variables to pass to Stirling PDF
|
| services.prowlarr.environmentFiles | Environment file to pass secret configuration values
|
| services.whisparr.environmentFiles | Environment file to pass secret configuration values
|
| services.telegraf.environmentFiles | File to load as environment file
|
| services.glitchtip.environmentFiles | Files to load environment variables from in addition to services.glitchtip.settings
|
| services.pds.environmentFiles | File to load environment variables from
|
| services.centrifugo.environmentFiles | Files to load environment variables from
|
| services.bluesky-pds.environmentFiles | File to load environment variables from
|
| services.easytier.instances.<name>.environmentFiles | Environment files for this instance
|
| services.traefik.environmentFiles | Files to load as an environment file just before Traefik starts
|
| services.mqtt2influxdb.environmentFiles | File to load as environment file
|
| virtualisation.oci-containers.containers.<name>.environmentFiles | Environment files for this container.
|
| networking.networkmanager.ensureProfiles.environmentFiles | Files to load as environment file
|