| services.cryptpad.settings | Cryptpad configuration settings
|
| services.pocket-id.credentials | Environment variables which are loaded from the contents of the specified file paths
|
| services.netbird.tunnels.<name>.bin.suffix | A system group name for this client instance.
|
| services.netbird.clients.<name>.bin.suffix | A system group name for this client instance.
|
| services.lemmy.settings.hostname | The domain name of your instance (eg 'lemmy.ml').
|
| services.sharkey.environmentFiles | List of paths to files containing environment variables for Sharkey to use at runtime
|
| services.stirling-pdf.environmentFiles | Files containing additional environment variables to pass to Stirling PDF
|
| services.monero.environmentFile | Path to an EnvironmentFile for the monero service as defined in systemd.exec(5)
|
| services.redis.servers.<name>.group | Group account under which this instance of redis-server runs.
If left as the default value this group will automatically be
created on system activation, otherwise you are responsible for
ensuring the group exists before the redis service starts.
|
| services.misskey.redis.createLocally | Create and use a local Redis instance
|
| services.wstunnel.servers.<name>.enable | Whether to enable this wstunnel instance.
|
| services.wstunnel.clients.<name>.enable | Whether to enable this wstunnel instance.
|
| services.dawarich.secretKeyBaseFile | Path to file containing the secret key base
|
| services.radicle.ci.adapters.native.instances.<name>.runtimePackages | Packages added to the adapter's PATH.
|
| services.rmfakecloud.extraSettings | Extra settings in the form of a set of key-value pairs
|
| services.filesender.localDomain | The domain serving your FileSender instance.
|
| nix.settings.trusted-users | A list of names of users that have additional rights when
connecting to the Nix daemon, such as the ability to specify
additional binary caches, or to import unsigned NARs
|
| services.mautrix-meta.instances.<name>.serviceDependencies | List of Systemd services to require and wait for when starting the application service.
|
| services.pgmanage.superOnly | This tells pgmanage whether or not to only allow super users to
login
|
| services.send.redis.passwordFile | The path to the file containing the Redis password
|
| services.anubis.defaultOptions.enable | Whether to enable this instance of Anubis.
|
| services.sssd.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.homebridge.environmentFile | Path to an environment-file which may contain secrets.
|
| services.pantalaimon-headless.instances.<name>.listenAddress | The address where the daemon will listen to client connections
for this homeserver.
|
| services.wstunnel.servers.<name>.autoStart | Whether to enable starting this wstunnel instance automatically.
|
| services.wstunnel.clients.<name>.autoStart | Whether to enable starting this wstunnel instance automatically.
|
| services.hercules-ci-agent.settings.baseDirectory | State directory (secrets, work directory, etc) for agent
|
| services.snips-sh.environmentFile | Additional environment file as defined in systemd.exec(5)
|
| services.onlyoffice.hostname | FQDN for the OnlyOffice instance.
|
| services.fedimintd.<name>.bitcoin.rpc.secretFile | If set the URL specified in bitcoin.rpc.url will get the content of this file added
as an URL password, so http://user@example.com will turn into http://user:SOMESECRET@example.com
|
| services.pantalaimon-headless.instances.<name>.extraSettings | Extra configuration options
|
| services.pocket-id.environmentFile | Path to an environment file to be loaded
|
| services.pfix-srsd.configurePostfix | Whether to configure the required settings to use pfix-srsd in the local Postfix instance.
|
| services.kanidm.serverSettings.origin | The origin of your Kanidm instance
|
| services.lemmy.database.createLocally | Whether to enable creation of database on the instance.
|
| services.easytier.instances.<name>.settings.network_name | EasyTier network name.
|
| services.mysql.replication.role | Role of the MySQL server instance.
|
| services.telegraf.environmentFiles | File to load as environment file
|
| services.librechat.credentials | Environment variables which are loaded from the contents of files at a file paths, mainly used for secrets
|
| services.glitchtip.environmentFiles | Files to load environment variables from in addition to services.glitchtip.settings
|
| services.nextcloud.datadir | Nextcloud's data storage path
|
| services.ncps.cache.redis.addresses | A list of host:port for the Redis servers that are part of a cluster
|
| programs.captive-browser.enable | Whether to enable captive browser, a dedicated Chrome instance to log into captive portals without messing with DNS settings.
|
| nixpkgs.buildPlatform | Specifies the platform on which NixOS should be built
|
| services.opencloud.environmentFile | An environment file as defined in systemd.exec(5)
|
| services.radicle.ci.adapters.native.instances.<name>.settings.base_url | Base URL for build logs (mandatory for access from CI broker page).
|
| services.actual.settings.dataDir | Directory under which Actual runs and saves its data
|
| services.kanidm.server.settings.origin | The origin of your Kanidm instance
|
| services.workout-tracker.environmentFile | An environment file as defined in systemd.exec(5)
|
| services.pds.environmentFiles | File to load environment variables from
|
| services.maubot.settings.homeservers | Known homeservers
|
| services.traccar.environmentFile | File containing environment variables to substitute in the configuration before starting Traccar
|
| services.karakeep.browser.enable | Enable the karakeep-browser service that runs a chromium instance in
the background with debugging ports exposed
|
| services.gitlab-runner.services.<name>.cloneUrl | Overwrite the URL for the GitLab instance
|
| services.openvpn.servers.<name>.config | Configuration of this OpenVPN instance
|
| services.nextcloud.package | Which package to use for the Nextcloud instance.
|
| services.nitter.preferences.theme | Instance theme.
|
| services.nitter.sessionsFile | Path to the session tokens file
|
| services.thelounge.public | Make your The Lounge instance public
|
| services.paperless.enable | Whether to enable Paperless-ngx
|
| services.resilio.sharedFolders | Shared folder list
|
| services.murmur.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.pantalaimon-headless.instances.<name>.homeserver | The URI of the homeserver that the pantalaimon proxy should
forward requests to, without the matrix API path but including
the http(s) schema.
|
| services.mautrix-meta.instances.<name>.registrationServiceUnit | The registration service that generates the registration file
|
| services.livekit.settings.redis.address | Host and port used to connect to a redis instance.
|
| services.glitchtip.redis.createLocally | Whether to enable and configure a local Redis instance.
|
| services.movim.podConfig.description | General description of the instance
|
| services.bluesky-pds.settings.PDS_HOSTNAME | Instance hostname (base domain name)
|
| services.restic.backups.<name>.rcloneConfig | Configuration for the rclone remote being used for backup
|
| services.pretix.database.createLocally | Whether to automatically set up the database on the local DBMS instance
|
| services.ente.api.settings.apps.public-albums | If you're running a self hosted instance and wish to serve public links,
set this to the URL where your albums web app is running.
|
| services.grafana-to-ntfy.settings.ntfyBAuthPass | The path to the password for the specified ntfy-sh user
|
| services.tandoor-recipes.enable | Enable Tandoor Recipes
|
| services.mjolnir.pantalaimon | pantalaimon options (enables E2E Encryption support)
|
| services.teamspeak3.fileTransferIP | IP on which the server instance will listen for incoming file transfer connections
|
| services.paperless.environmentFile | Path to a file containing extra paperless config options in the systemd EnvironmentFile
format
|
| networking.wireless.networks.<name>.auth | Use this option to configure advanced authentication methods
like EAP
|
| services.postsrsd.configurePostfix | Whether to configure the required settings to use postsrsd in the local Postfix instance.
|
| services.mollysocket.environmentFile | Environment file (see systemd.exec(5) "EnvironmentFile="
section for the syntax) passed to the service
|
| services.woodpecker-server.environmentFile | File to load environment variables
from
|
| services.scrutiny.influxdb.enable | Enables InfluxDB on the host system using the services.influxdb2 NixOS module
with default options
|
| services.hatsu.settings.HATSU_PRIMARY_ACCOUNT | The primary account of your instance (eg 'example.com').
|
| services.librenms.enableLocalBilling | Enable billing Cron-Jobs on the local instance
|
| services.btrbk.instances.<name>.settings.stream_compress | Compress the btrfs send stream before transferring it from/to remote locations using a
compression command.
|
| services.nextcloud-whiteboard-server.settings | Settings to configure backend server
|
| services.bluesky-pds.environmentFiles | File to load environment variables from
|
| services.cryptpad.settings.httpUnsafeOrigin | This is the URL that users will enter to load your instance
|
| services.easytier.instances.<name>.settings.network_secret | EasyTier network credential used for verification and
encryption
|
| services.pretalx.database.createLocally | Whether to automatically set up the database on the local DBMS instance
|
| services.public-inbox.settings.coderepo.<name>.cgitUrl | URL of a cgit instance
|
| services.homepage-dashboard.environmentFile | The path to an environment file that contains environment variables to pass
to the homepage-dashboard service, for the purpose of passing secrets to
the service
|
| services.mautrix-discord.environmentFile | File containing environment variables to substitute when copying the configuration
out of Nix store to the services.mautrix-discord.dataDir
|
| services.hedgedoc.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.your_spotify.enableLocalDB | Whether to enable a local mongodb instance.
|
| services.cryptpad.configureNginx | Configure Nginx as a reverse proxy for Cryptpad
|
| services.linkwarden.environmentFile | Path of a file with extra environment variables to be loaded from disk
|
| services.reposilite.settings.basePath | Custom base path for this Reposilite instance
|
| services.ncps.cache.lock.backend | Lock backend to use: 'local' (single instance), 'redis'
(distributed), 'postgres' (distributed, requires PostgreSQL)
|
| services.scrutiny.settings.web.influxdb.port | The port of the InfluxDB instance.
|
| services.lubelogger.environmentFile | Path to a file containing extra LubeLogger config options in the systemd EnvironmentFile format
|