services.peering-manager.environmentFile
Environment file as defined in systemd.exec(5).
Secrets may be passed to the service without adding them to the world-readable Nix store, by specifying placeholder variables as the option value in Nix and setting these variables accordingly in the environment file.
# snippet of peering-manager-related config
services.peering-manager.settings.SOCIAL_AUTH_OIDC_SECRET = "$PM_OIDC_SECRET";
# content of the environment file
PM_OIDC_SECRET=topsecret
Note that this file needs to be available on the host on which
peering-manager is running.
- Type
null or absolute path- Default
null- Example
"/run/secrets/peering-manager.env"- Declared
- <nixpkgs/nixos/modules/services/web-apps/peering-manager.nix>