| services.stalwart.credentials | Credentials envs used to configure Stalwart secrets
|
| services.n8n.environment | Environment variables to pass to the n8n service
|
| services.stalwart-mail.credentials | Credentials envs used to configure Stalwart-Mail secrets
|
| services.cfssl.configFile | Path to configuration file
|
| services.pds.settings | Environment variables to set for the service
|
| services.movim.settings | .env settings for Movim
|
| services.go-neb.secretFile | Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: $ENVIRONMENT
or ${VARIABLE}
|
| services.evcc.settings | evcc configuration as a Nix attribute set
|
| services.maubot.settings | YAML settings for maubot
|
| services.turn-rs.secretFile | Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: $ENVIRONMENT or
${VARIABLE}
|
| services.wstunnel.clients.<name>.environmentFile | Environment file to be passed to the systemd service
|
| services.wstunnel.servers.<name>.environmentFile | Environment file to be passed to the systemd service
|
| services.listmonk.secretFile | A file containing secrets as environment variables
|
| services.forgejo.customDir | Base directory for custom templates and other options
|
| services.dawarich.extraEnvFiles | Extra environment files to pass to all Dawarich services
|
| services.prosody.extraConfig | Additional prosody configuration
The generated file is processed by envsubst to allow secrets to be passed securely via environment variables.
|
| services.mastodon.extraEnvFiles | Extra environment files to pass to all mastodon services
|
| services.lasuite-docs.secretKeyPath | Path to the Django secret key
|
| services.lasuite-meet.secretKeyPath | Path to the Django secret key
|
| programs.nncp.settings | NNCP configuration, see
http://www.nncpgo.org/Configuration.html
|
| services.docuseal.extraEnvFiles | Extra environment files to pass to DocuSeal services
|
| services.sourcehut.hg.group | Group for hg.sr.ht
|
| services.keter.bundle.publicScript | Allows loading of public environment variables,
these are emitted to the log so it shouldn't contain secrets.
|
| services.patroni.settings | The primary patroni configuration
|
| services.sourcehut.man.group | Group for man.sr.ht
|
| services.sourcehut.git.group | Group for git.sr.ht
|
| services.sourcehut.hub.group | Group for hub.sr.ht
|
| services.pixelfed.settings | .env settings for Pixelfed
|
| services.cross-seed.settingsFile | Path to a JSON file containing settings that will be merged with the
settings option
|
| services.sourcehut.todo.group | Group for todo.sr.ht
|
| services.sourcehut.meta.group | Group for meta.sr.ht
|
| services.bluesky-pds.settings | Environment variables to set for the service
|
| services.lidarr.settings | Attribute set of arbitrary config options
|
| services.sonarr.settings | Attribute set of arbitrary config options
|
| services.radarr.settings | Attribute set of arbitrary config options
|
| services.canaille.secretKeyFile | File containing the Flask secret key
|
| services.microbin.settings | Additional configuration for MicroBin, see
https://microbin.eu/docs/installation-and-configuration/configuration/
for supported values
|
| services.zitadel.extraStepsPaths | A list of paths to extra steps files
|
| services.wastebin.settings | Additional configuration for wastebin, see
https://github.com/matze/wastebin#usage for supported values
|
| services.sourcehut.paste.group | Group for paste.sr.ht
|
| services.sourcehut.lists.group | Group for lists.sr.ht
|
| services.sourcehut.pages.group | Group for pages.sr.ht
|
| services.gokapi.settingsFile | Path to config file to parse and append to settings
|
| services.godns.loadCredential | This can be used to pass secrets to the systemd service without adding
them to the nix store.
|
| services.transfer-sh.settings | Additional configuration for transfer-sh, see
https://github.com/dutchcoders/transfer.sh#usage-1
for supported values
|
| services.livekit.keyFile | LiveKit key file holding one or multiple application secrets
|
| services.pleroma.secretConfigFile | Path to the file containing your secret pleroma configuration.
DO NOT POINT THIS OPTION TO THE NIX
STORE, the store being world-readable, it'll
compromise all your secrets.
|
| services.zwave-js.settings | Configuration settings for the generated config file
|
| services.renovate.settings | Renovate's global configuration
|
| services.nomad.credentials | Credentials envs used to configure nomad secrets.
|
| services.maubot.extraConfigFile | A file for storing secrets
|
| services.readarr.settings | Attribute set of arbitrary config options
|
| services.rspamd-trainer.settings | IMAP authentication configuration for rspamd-trainer
|
| services.windmill.database.url | Database url
|
| services.sourcehut.builds.group | Group for builds.sr.ht
|
| services.listmonk.settings | Static settings set in the config.toml, see https://github.com/knadh/listmonk/blob/master/config.toml.sample for details
|
| services.wiki-js.environmentFile | Environment file to inject e.g. secrets into the configuration.
|
| services.duplicity.secretFile | Path of a file containing secrets (gpg passphrase, access key...) in
the format of EnvironmentFile as described by
systemd.exec(5)
|
| services.powerdns.secretFile | Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: $ENVIRONMENT
or ${VARIABLE}
|
| services.olivetin.extraConfigFiles | Config files to merge into the settings defined in services.olivetin.settings
|
| services.matrix-synapse.settings | The primary synapse configuration
|
| services.prowlarr.settings | Attribute set of arbitrary config options
|
| services.whisparr.settings | Attribute set of arbitrary config options
|
| services.yarr.environmentFile | Environment file for specifying additional settings such as secrets
|
| services.pghero.environment | Environment variables to set for the service
|
| services.webdav.settings | Attrset that is converted and passed as config file
|
| services.fider.environment | Environment variables to set for the service
|
| services.authelia.instances.<name>.environmentVariables | Additional environment variables to provide to authelia
|
| services.evcc.environmentFile | File with environment variables to pass into the runtime environment
|
| services.k3s.autoDeployCharts.<name>.values | Override default chart values via Nix expressions
|
| services.matrix-conduit.secretFile | Path to a file containing sensitive environment as described in {manpage}`systemd.exec(5)
|
| services.rke2.autoDeployCharts.<name>.values | Override default chart values via Nix expressions
|
| services.shiori.environmentFile | Path to file containing environment variables
|
| services.matrix-conduit.settings | Generates the conduit.toml configuration file
|
| services.zitadel.extraSettingsPaths | A list of paths to extra settings files
|
| services.mtprotoproxy.users | Allowed users and their secrets
|
| services.schleuder.extraSettingsFile | YAML file to merge into the schleuder config at runtime
|
| services.home-assistant.config | Your configuration.yaml as a Nix attribute set
|
| services.open-webui.environmentFile | Environment file to be passed to the systemd service
|
| services.gatus.environmentFile | File to load as environment file
|
| services.bcg.environmentFiles | File to load as environment file
|
| services.keepalived.secretFile | Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: $ENVIRONMENT
or ${VARIABLE}
|
| services.gotify.environmentFiles | Files containing additional config environment variables for gotify-server
|
| services.tsidp.environmentFile | Path to an environment file loaded for the tsidp service
|
| services.matrix-synapse.extraConfigFiles | Extra config files to include
|
| services.wastebin.secretFile | Path to file containing sensitive environment variables
|
| services.patroni.environmentFiles | Environment variables made available to Patroni as files content, useful for providing secrets from files.
|
| services.litellm.environmentFile | Environment file to be passed to the systemd service
|
| services.orthanc.environmentFile | Environment file to be passed to the systemd service
|
| services.lasuite-meet.livekit.keyFile | LiveKit key file holding one or multiple application secrets
|
| services.dashy.settings | Settings serialized into user-data/conf.yml before build
|
| services.invidious.extraSettingsFile | A file including Invidious settings
|
| services.traccar.settings | config.xml configuration as a Nix attribute set
|
| services.ntfy-sh.environmentFile | Path to a file containing extra ntfy environment variables in the systemd EnvironmentFile
format
|
| services.beszel.hub.environmentFile | Environment file to be passed to the systemd service
|
| services.lasuite-docs.environmentFile | Path to environment file
|
| services.lasuite-meet.environmentFile | Path to environment file
|
| services.chhoto-url.environmentFiles | Files to load environment variables from in addition to services.chhoto-url.settings
|
| services.screego.environmentFile | Environment file (see systemd.exec(5) "EnvironmentFile="
section for the syntax) passed to the service
|
| services.librenms.environmentFile | File containing env-vars to be substituted into the final config
|