| services.homer.settings | Settings serialized into config.yml before build
|
| services.zipline.environmentFiles | Files to load environment variables from (in addition to services.zipline.settings)
|
| services.dendrite.loadCredential | This can be used to pass secrets to the systemd service without adding them to
the nix store
|
| services.docling-serve.environmentFile | Environment file to be passed to the systemd service
|
| services.castopod.environmentFile | Environment file to inject e.g. secrets into the configuration
|
| services.trilium-server.environmentFile | File to load as the environment file
|
| services.sharkey.environmentFiles | List of paths to files containing environment variables for Sharkey to use at runtime
|
| services.pocket-id.credentials | Environment variables which are loaded from the contents of the specified file paths
|
| services.stirling-pdf.environmentFiles | Files containing additional environment variables to pass to Stirling PDF
|
| services.linkwarden.secretFiles | Attribute set containing paths to files to add to the environment of linkwarden
|
| services.monero.environmentFile | Path to an EnvironmentFile for the monero service as defined in systemd.exec(5)
|
| services.rmfakecloud.extraSettings | Extra settings in the form of a set of key-value pairs
|
| services.homebridge.environmentFile | Path to an environment-file which may contain secrets.
|
| services.dawarich.secretKeyBaseFile | Path to file containing the secret key base
|
| services.sssd.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.hercules-ci-agent.settings.baseDirectory | State directory (secrets, work directory, etc) for agent
|
| services.fedimintd.<name>.bitcoin.rpc.secretFile | If set the URL specified in bitcoin.rpc.url will get the content of this file added
as an URL password, so http://user@example.com will turn into http://user:SOMESECRET@example.com
|
| services.snips-sh.environmentFile | Additional environment file as defined in systemd.exec(5)
|
| services.telegraf.environmentFiles | File to load as environment file
|
| services.pocket-id.environmentFile | Path to an environment file to be loaded
|
| services.librechat.credentials | Environment variables which are loaded from the contents of files at a file paths, mainly used for secrets
|
| services.glitchtip.environmentFiles | Files to load environment variables from in addition to services.glitchtip.settings
|
| services.opencloud.environmentFile | An environment file as defined in systemd.exec(5)
|
| services.workout-tracker.environmentFile | An environment file as defined in systemd.exec(5)
|
| services.maubot.settings.homeservers | Known homeservers
|
| services.pds.environmentFiles | File to load environment variables from
|
| services.traccar.environmentFile | File containing environment variables to substitute in the configuration before starting Traccar
|
| networking.wireless.networks.<name>.auth | Use this option to configure advanced authentication methods
like EAP
|
| services.murmur.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.resilio.sharedFolders | Shared folder list
|
| services.frp.instances.<name>.environmentFiles | List of paths files that follows systemd environmentfile structure
|
| boot.initrd.network.openvpn.configuration | The configuration file for OpenVPN.
Unless your bootloader supports initrd secrets, this configuration
is stored insecurely in the global Nix store.
|
| services.paperless.environmentFile | Path to a file containing extra paperless config options in the systemd EnvironmentFile
format
|
| services.restic.backups.<name>.rcloneConfig | Configuration for the rclone remote being used for backup
|
| services.mollysocket.environmentFile | Environment file (see systemd.exec(5) "EnvironmentFile="
section for the syntax) passed to the service
|
| services.woodpecker-server.environmentFile | File to load environment variables
from
|
| services.nextcloud-whiteboard-server.settings | Settings to configure backend server
|
| services.bluesky-pds.environmentFiles | File to load environment variables from
|
| services.homepage-dashboard.environmentFile | The path to an environment file that contains environment variables to pass
to the homepage-dashboard service, for the purpose of passing secrets to
the service
|
| services.mautrix-discord.environmentFile | File containing environment variables to substitute when copying the configuration
out of Nix store to the services.mautrix-discord.dataDir
|
| services.hedgedoc.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.linkwarden.environmentFile | Path of a file with extra environment variables to be loaded from disk
|
| services.rmfakecloud.environmentFile | Path to an environment file loaded for the rmfakecloud service
|
| services.lubelogger.environmentFile | Path to a file containing extra LubeLogger config options in the systemd EnvironmentFile format
|
| services.teeworlds.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.dendrite.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.hercules-ci-agent.settings.staticSecretsDirectory | This is the default directory to look for statically configured secrets like cluster-join-token.key
|
| services.chhoto-url.settings.hash_algorithm | The hash algorithm to use for passwords and API keys
|
| services.woodpecker-agents.agents.<name>.environmentFile | File to load environment variables
from
|
| services.peering-manager.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.prometheus.exporters.mqtt.environmentFile | File to load as environment file
|
| services.gitlab-runner.services.<name>.environmentVariables | Custom environment variables injected to build environment
|
| services.livebook.environmentFile | Additional environment file as defined in systemd.exec(5)
|
| services.prometheus.alertmanager-ntfy.extraConfigFiles | Config files to merge into the settings defined in services.prometheus.alertmanager-ntfy.settings
|
| services.mqtt2influxdb.environmentFiles | File to load as environment file
|
| services.traefik.environmentFiles | Files to load as an environment file just before Traefik starts
|
| services.mautrix-meta.instances.<name>.environmentFile | File containing environment variables to substitute when copying the configuration
out of Nix store to the services.mautrix-meta.dataDir
|
| services.vaultwarden.environmentFile | Additional environment file or files as defined in systemd.exec(5)
|
| services.litestream.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.prometheus.exporters.restic.rcloneConfig | Configuration for the rclone remote being used for backup
|
| services.healthchecks.settings | Environment variables which are read by healthchecks (local)_settings.py
|
| services.prometheus.alertmanagerGotify.environmentFile | File containing additional config environment variables for alertmanager-gotify-bridge
|
| services.healthchecks.settingsFile | Environment variables which are read by healthchecks (local)_settings.py
|
| services.pufferpanel.environment | Environment variables to set for the service
|
| services.prometheus.exporters.snmp.environmentFile | EnvironmentFile as defined in systemd.exec(5)
|
| services.prometheus.exporters.php-fpm.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.matrix-synapse.settings.turn_shared_secret | The shared secret used to compute passwords for the TURN server
|
| services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".secret_key_base | Secret key used as a base to generate further secrets for encrypting and
signing data
|
| services.prometheus.exporters.postgres.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.matrix-synapse.settings.macaroon_secret_key | Secret key for authentication tokens
|
| services.influxdb2.provision.organizations.<name>.auths.<name>.readPermissions | The read permissions to include for this token
|
| services.influxdb2.provision.organizations.<name>.auths.<name>.writePermissions | The read permissions to include for this token
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.api_server | The API server addresses
|
| services.matrix-synapse.settings.registration_shared_secret | If set, allows registration by anyone who also has the shared
secret, even if registration is otherwise disabled
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.include_parameters | Whether to include the parameters as meta labels
|
| services.pinchflat.selfhosted | Use a weak secret
|