| services.trilium-server.environmentFile | File to load as the environment file
|
| services.mqtt2influxdb.environmentFiles | File to load as environment file
|
| services.alloy.environmentFile | EnvironmentFile as defined in systemd.exec(5).
|
| services.prowlarr.environmentFiles | Environment file to pass secret configuration values
|
| services.whisparr.environmentFiles | Environment file to pass secret configuration values
|
| environment.checkConfigurationOptions | Alias of _module.check.
|
| services.homepage-dashboard.environmentFile | The path to an environment file that contains environment variables to pass
to the homepage-dashboard service, for the purpose of passing secrets to
the service
|
| services.prometheus.exporters.snmp.environmentFile | EnvironmentFile as defined in systemd.exec(5)
|
| services.prometheus.exporters.postgres.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.mattermost.environmentFile | Environment file (see systemd.exec(5)
"EnvironmentFile=" section for the syntax) which sets config options
for mattermost (see the Mattermost documentation)
|
| services.prometheus.exporters.pve.environmentFile | Path to the service's environment file
|
| services.r53-ddns.environmentFile | File containing the AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY
in the format of an EnvironmentFile as described by systemd.exec(5)
|
| services.easytier.instances.<name>.environmentFiles | Environment files for this instance
|
| security.acme.defaults.environmentFile | Path to an EnvironmentFile for the cert's service containing any required and
optional environment variables for your selected dnsProvider
|
| services.gokapi.environment.GOKAPI_CONFIG_DIR | Sets the directory for the config file.
|
| services.gokapi.environment.GOKAPI_CONFIG_FILE | Sets the filename for the config file.
|
| services.woodpecker-agents.agents.<name>.environment | woodpecker-agent config environment variables, for other options read the documentation
|
| services.homebridge.environmentFile | Path to an environment-file which may contain secrets.
|
| services.livekit.ingress.environmentFile | Environment file as defined in systemd.exec(5) passed to the service
|
| services.glitchtip.environmentFiles | Files to load environment variables from in addition to services.glitchtip.settings
|
| services.govee2mqtt.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.workout-tracker.environmentFile | An environment file as defined in systemd.exec(5)
|
| services.n8n.environment.GENERIC_TIMEZONE | The n8n instance timezone
|
| services.glance.environmentFile | Path to an environment file as defined in systemd.exec(5)
|
| services.wakapi.environmentFiles | Use this to set WAKAPI_PASSWORD_SALT and WAKAPI_MAIL_SMTP_PASS.
|
| environment.enlightenment.excludePackages | Which packages Enlightenment should exclude from the default environment
|
| services.prometheus.alertmanager.environmentFile | File to load as environment file
|
| services.mautrix-meta.instances.<name>.environmentFile | File containing environment variables to substitute when copying the configuration
out of Nix store to the services.mautrix-meta.dataDir
|
| services.ollama.environmentVariables | Set arbitrary environment variables for the ollama service
|
| services.gitlab-runner.services.<name>.environmentVariables | Custom environment variables injected to build environment
|
| services.prometheus.exporters.fastly.environmentFile | An environment file containg at least the FASTLY_API_TOKEN= environment
variable.
|
| services.mollysocket.environmentFile | Environment file (see systemd.exec(5) "EnvironmentFile="
section for the syntax) passed to the service
|
| services.woodpecker-server.environmentFile | File to load environment variables
from
|
| services.sourcehut.settings."sr.ht".environment | Values other than "production" adds a banner to each page.
|
| services.linkwarden.environmentFile | Path of a file with extra environment variables to be loaded from disk
|
| services.wstunnel.clients.<name>.environmentFile | Environment file to be passed to the systemd service
|
| services.wstunnel.servers.<name>.environmentFile | Environment file to be passed to the systemd service
|
| services.litellm.settings.environment_variables | Environment variables to pass to the Lite
|
| services.livebook.environmentFile | Additional environment file as defined in systemd.exec(5)
|
| services.rmfakecloud.environmentFile | Path to an environment file loaded for the rmfakecloud service
|
| services.postgres-websockets.environment | postgres-websockets configuration as defined in:
https://github.com/diogob/postgres-websockets/blob/master/src/PostgresWebsockets/Config.hs#L71-L87
PGWS_DB_URI is represented as an attribute set, see [`environment
|
| services.librenms.environmentFile | File containing env-vars to be substituted into the final config
|
| services.slurm.rest.environment.SLURMRESTD_LISTEN | Comma-delimited list of host:port pairs or unix sockets to listen on.
|
| services.slurm.rest.environment.SLURMRESTD_DEBUG | Set debug level explicitly
|
| services.postgresqlWalReceiver.receivers.<name>.environment | Environment variables passed to the service
|
| services.postgres-websockets.environment.PGWS_DB_URI | libpq connection parameters as documented in:
https://www.postgresql.org/docs/current/libpq-connect.html#LIBPQ-PARAMKEYWORDS
|
| services.prometheus.exporters.tailscale.environmentFile | Environment file containg at least the TAILSCALE_TAILNET,
TAILSCALE_OAUTH_CLIENT_ID, and TAILSCALE_OAUTH_CLIENT_SECRET
environment variables.
|
| services.woodpecker-agents.agents.<name>.environmentFile | File to load environment variables
from
|
| services.postgres-websockets.environment.PGWS_HOST | Address the server will listen for websocket connections.
|
| services.restic.backups.<name>.environmentFile | file containing the credentials to access the repository, in the
format of an EnvironmentFile as described by systemd.exec(5)
|
| services.matrix-appservice-discord.environmentFile | File containing environment variables to be passed to the matrix-appservice-discord service,
in which secret tokens can be specified securely by defining values for
APPSERVICE_DISCORD_AUTH_CLIENT_I_D and
APPSERVICE_DISCORD_AUTH_BOT_TOKEN.
|
| services.n8n.environment.N8N_DIAGNOSTICS_ENABLED | Whether to share selected, anonymous telemetry with n8n
|
| image.repart.mkfsOptions | Specify extra options for created file systems
|
| services.prometheus.exporters.mqtt.environmentFile | File to load as environment file
|
| services.vaultwarden.environmentFile | Additional environment file or files as defined in systemd.exec(5)
|
| services.paperless.environmentFile | Path to a file containing extra paperless config options in the systemd EnvironmentFile
format
|
| services.gitlab.extraEnv | Additional environment variables for the GitLab environment.
|
| services.frp.instances.<name>.environmentFiles | List of paths files that follows systemd environmentfile structure
|
| services.lubelogger.environmentFile | Path to a file containing extra LubeLogger config options in the systemd EnvironmentFile format
|
| virtualisation.oci-containers.containers.<name>.environment | Environment variables to set for this container.
|
| networking.networkmanager.ensureProfiles.environmentFiles | Files to load as environment file
|
| services.authelia.instances.<name>.environmentVariables | Additional environment variables to provide to authelia
|
| environment.memoryAllocator.provider | The system-wide memory allocator
|
| services.prometheus.exporters.exportarr-sonarr.environment | See the configuration guide for available options.
|
| services.prometheus.exporters.exportarr-lidarr.environment | See the configuration guide for available options.
|
| services.prometheus.exporters.exportarr-radarr.environment | See the configuration guide for available options.
|
| services.prometheus.exporters.exportarr-bazarr.environment | See the configuration guide for available options.
|
| services.n8n.environment.N8N_VERSION_NOTIFICATIONS_ENABLED | When enabled, n8n sends notifications of new versions and security updates.
|
| services.prometheus.alertmanagerGotify.environmentFile | File containing additional config environment variables for alertmanager-gotify-bridge
|
| services.prometheus.exporters.exportarr-readarr.environment | See the configuration guide for available options.
|
| services.pds.settings | Environment variables to set for the service
|
| services.prometheus.exporters.exportarr-prowlarr.environment | See the configuration guide for available options.
|
| security.doas.extraRules.*.keepEnv | If true, environment variables other than those
listed in
doas(1)
are kept when creating the environment for the new process.
|
| services.changedetection-io.environmentFile | Securely pass environment variables to changedetection-io
|
| services.snips-sh.settings | The configuration of snips-sh is done through environment variables,
therefore you must use upper snake case (e.g. SNIPS_HTTP_INTERNAL)
|
| services.prometheus.exporters.mail.environmentFile | File containing env-vars to be substituted into the exporter's config.
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.environment | The Azure environment
|
| services.openssh.settings.AcceptEnv | Specifies what environment variables sent by the client will be copied into the session's
environment
|
| services.prometheus.exporters.kafka.environmentFile | File containing the credentials to access the repository, in the
format of an EnvironmentFile as described by systemd.exec(5)
|
| services.librechat.env | Environment variables that will be set for the service
|
| services.prometheus.exporters.restic.environmentFile | File containing the credentials to access the repository, in the
format of an EnvironmentFile as described by systemd.exec(5)
|
| services.pocket-id.settings | Environment variables to be passed
|
| services.go-neb.secretFile | Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: $ENVIRONMENT
or ${VARIABLE}
|
| virtualisation.oci-containers.containers.<name>.environmentFiles | Environment files for this container.
|
| services.turn-rs.secretFile | Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: $ENVIRONMENT or
${VARIABLE}
|
| services.dawarich.extraEnvFiles | Extra environment files to pass to all Dawarich services
|
| security.soteria.enable | Whether to enable Soteria, a Polkit authentication agent
for any desktop environment.
You should only enable this if you are on a Desktop Environment that
does not provide a graphical polkit authentication agent, or you are on
a standalone window manager or Wayland compositor.
|
| services.prometheus.exporters.junos-czerwonk.environmentFile | File containing env-vars to be substituted into the exporter's config.
|
| nix.settings.sandbox | If set, Nix will perform builds in a sandboxed environment that it
will set up automatically for each build
|
| services.bluesky-pds.settings | Environment variables to set for the service
|
| services.castopod.settings | Environment variables used for Castopod
|
| services.wiki-js.settings | Settings to configure wiki-js
|
| services.traefik.useEnvSubst | Whether to use envSubst in the ExecStartPre phase to augment the generated static config
|
| services.powerdns.secretFile | Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: $ENVIRONMENT
or ${VARIABLE}
|
| security.doas.extraRules.*.setEnv | Keep or set the specified variables
|
| services.forgejo.secrets | This is a small wrapper over systemd's LoadCredential
|
| services.zenohd.env | Set environment variables consumed by zenohd and its plugins.
|
| programs.nh.flake | The string that will be used for the NH_FLAKE environment variable.
NH_FLAKE is used by nh as the default flake for performing actions, such as
nh os switch
|
| services.wivrn.monadoEnvironment | Environment variables to be passed to the Monado environment.
|
| services.hydra.extraEnv | Extra environment variables for Hydra.
|