Skip to content

Gitlab

services.gitlab.backup.keepTime

How long to keep the backups around, in hours. 0 means “keep forever”.

Type: signed integer

Default

0

Example

48

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.backup.path

GitLab path for backups. Type: string

Default

config.services.gitlab.statePath + "/backup"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.backup.skip

Directories to exclude from the backup. The example excludes CI artifacts and LFS objects from the backups. The tar option skips the creation of a tar file.

Refer to https://docs.gitlab.com/ee/raketasks/backup_restore.html#excluding-specific-directories-from-the-backup for more information.

Type: one of "db", "uploads", "builds", "artifacts", "lfs", "registry", "pages", "repositories", "tar" or list of (one of "db", "uploads", "builds", "artifacts", "lfs", "registry", "pages", "repositories", "tar")

Default

[ ]

Example

["artifacts""lfs"]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.backup.startAt

The time(s) to run automatic backup of GitLab state. Specified in systemd's time format; see {manpage}systemd.time(7).

Type: string or list of string

Default

[ ]

Example

"03:00"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.backup.uploadOptions

GitLab automatic upload specification. Tells GitLab to upload the backup to a remote location when done.

Attributes specified here are added under production -> backup -> upload in {file}config/gitlab.yml.

Type: attribute set

Default

{ }

Example

`#!nix { # Fog storage connection settings, see http://fog.io/storage/ connection = { provider = "AWS"; region = "eu-north-1"; aws_access_key_id = "AKIAXXXXXXXXXXXXXXXX"; aws_secret_access_key = { _secret = config.deployment.keys.aws_access_key.path; }; };

# The remote 'directory' to store your backups in. # For S3, this would be the bucket name. remote_directory = "my-gitlab-backups";

# Use multipart uploads when file size reaches 100MB, see # http://docs.aws.amazon.com/AmazonS3/latest/dev/uploadobjusingmpu.html multipart_chunk_size = 104857600;

# Turns on AWS Server-Side Encryption with Amazon S3-Managed Keys for backups, this is optional encryption = "AES256";

# Specifies Amazon S3 storage class to use for backups, this is optional storage_class = "STANDARD"; }; `

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.databaseCreateLocally

Whether a database should be automatically created on the local host. Set this to false if you plan on provisioning a local database yourself. This has no effect if {option}services.gitlab.databaseHost is customized.

Type: boolean

Default

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.databaseHost

GitLab database hostname. An empty string means “use local unix socket connection”.

Type: string

Default

""

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.databaseName

GitLab database name. Type: string

Default

"gitlab"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.databasePasswordFile

File containing the GitLab database user password.

This should be a string, not a nix path, since nix paths are copied into the world-readable nix store.

Type: null or path

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.databasePool

Database connection pool size. Type: signed integer

Default

5

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.databaseUsername

GitLab database user. Type: string

Default

"gitlab"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.enable

Enable the gitlab service.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.extraConfig

Extra options to be added under production in {file}config/gitlab.yml, as a nix attribute set.

Options containing secret data should be set to an attribute set containing the attribute _secret - a string pointing to a file containing the value the option should be set to. See the example to get a better picture of this: in the resulting {file}config/gitlab.yml file, the production.omniauth.providers[0].args.client_options.secret key will be set to the contents of the {file}/var/keys/gitlab_oidc_secret file.

Type: YAML value

Default

{ }

Example

{gitlab = {default_projects_features = {builds = false;};};omniauth = {enabled = true;auto_sign_in_with_provider = "openid_connect";allow_single_sign_on = ["openid_connect"];block_auto_created_users = false;providers = [{name = "openid_connect";label = "OpenID Connect";args = {name = "openid_connect";scope = ["openid" "profile"];response_type = "code";issuer = "https://keycloak.example.com/auth/realms/My%20Realm";discovery = true;client_auth_method = "query";uid_field = "preferred_username";client_options = {identifier = "gitlab";secret = { _secret = "/var/keys/gitlab_oidc_secret"; };redirect_uri = "https://git.example.com/users/auth/openid_connect/callback";};};}];};};

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.extraDatabaseConfig

Extra configuration in config/database.yml. Type: attribute set

Default

{ }

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.extraEnv

Additional environment variables for the GitLab environment.

Type: attribute set of string

Default

{ }

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.extraGitlabRb

Extra configuration to be placed in config/extra-gitlab.rb. This can be used to add configuration not otherwise exposed through this module's options.

Type: string

Default

""

Example

'' if Rails.env.production? Rails.application.config.action_mailer.delivery_method = :sendmail ActionMailer::Base.delivery_method = :sendmail ActionMailer::Base.sendmail_settings = { location: "/run/wrappers/bin/sendmail", arguments: "-i -t" } end''

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.extraShellConfig

Extra configuration to merge into shell-config.yml Type: attribute set

Default

{ }

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.group

Group to run gitlab and all related services. Type: string

Default

"gitlab"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.host

GitLab host name. Used e.g. for copy-paste URLs. Type: string

Default

config.networking.hostName

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.https

Whether gitlab prints URLs with https as scheme. Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.initialRootEmail

Initial email address of the root account if this is a new install.

Type: string

Default

"admin@local.host"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.initialRootPasswordFile

File containing the initial password of the root account if this is a new install.

This should be a string, not a nix path, since nix paths are copied into the world-readable nix store.

Type: null or path

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.logrotate.enable

Enable rotation of log files.

Type: boolean

Default

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.logrotate.frequency

How often to rotate the logs. Type: string

Default

"daily"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.logrotate.keep

How many rotations to keep. Type: signed integer

Default

30

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.packages.gitaly

The gitaly package to use. Type: package

Default

pkgs.gitaly

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.packages.gitlab

The gitlab package to use. Type: package

Default

pkgs.gitlab

Example

gitlab-ee

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.packages.gitlab-shell

The gitlab-shell package to use. Type: package

Default

pkgs.gitlab-shell

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.packages.gitlab-workhorse

The gitlab-workhorse package to use. Type: package

Default

pkgs.gitlab-workhorse

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.packages.pages

The gitlab-pages package to use. Type: package

Default

pkgs.gitlab-pages

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.pages.enable

Whether to enable the GitLab Pages service. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.pages.settings

Configuration options to set in the GitLab Pages config file.

Options containing secret data should be set to an attribute set containing the attribute _secret - a string pointing to a file containing the value the option should be set to. See the example to get a better picture of this: in the resulting configuration file, the auth-client-secret and auth-secret keys will be set to the contents of the {file}/var/keys/auth-client-secret and {file}/var/keys/auth-secret files respectively.

Type: attribute set of (null or string or signed integer or boolean or (attribute set))

Example

{pages-domain = "example.com";auth-client-id = "generated-id-xxxxxxx";auth-client-secret = { _secret = "/var/keys/auth-client-secret"; };auth-redirect-uri = "https://projects.example.com/auth";auth-secret = { _secret = "/var/keys/auth-secret"; };auth-server = "https://gitlab.example.com";}

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.pages.settings.artifacts-server

API URL to proxy artifact requests to.

Type: null or string

Default

"http(s)://<services.gitlab.host>/api/v4"

Example

"https://gitlab.example.com/api/v4"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.pages.settings.gitlab-server

Public GitLab server URL.

Type: null or string

Default

"http(s)://<services.gitlab.host>"

Example

"https://gitlab.example.com"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.pages.settings.internal-gitlab-server

Internal GitLab server used for API requests, useful if you want to send that traffic over an internal load balancer. By default, the value of services.gitlab.pages.settings.gitlab-server is used.

Type: null or string

Default

"http(s)://<services.gitlab.host>"

Example

"https://gitlab.example.internal"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.pages.settings.listen-http

The address(es) to listen on for HTTP requests.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.pages.settings.listen-https

The address(es) to listen on for HTTPS requests.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.pages.settings.listen-proxy

The address(es) to listen on for proxy requests.

Type: list of string

Default

["127.0.0.1:8090"]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.pages.settings.pages-domain

The domain to serve static pages on.

Type: null or string

Example

"example.com"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.pages.settings.pages-root

The directory where pages are stored.

Type: string

Default

config.services.gitlab.extraConfig.production.shared.path + "/pages"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.port

GitLab server port for copy-paste URLs, e.g. 80 or 443 if you're service over https.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

8080

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.puma.threadsMax

The maximum number of threads Puma should use per worker. This limits how many threads Puma will automatically spawn in response to requests. In contrast to workers, threads will never be able to run Ruby code in parallel, but give higher IO parallelism.

::: {.note} Each thread consumes memory and contributes to Global VM Lock contention, so be careful when increasing this. :::

Type: signed integer

Default

4

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.puma.threadsMin

The minimum number of threads Puma should use per worker.

::: {.note} Each thread consumes memory and contributes to Global VM Lock contention, so be careful when increasing this. :::

Type: signed integer

Default

0

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.puma.workers

The number of worker processes Puma should spawn. This controls the amount of parallel Ruby code can be executed. GitLab recommends Number of CPU cores - 1, but at least two.

::: {.note} Each worker consumes quite a bit of memory, so be careful when increasing this. :::

Type: signed integer

Default

2

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.redisUrl

Redis URL for all GitLab services. Type: string

Default

"unix:/run/gitlab/redis.sock"

Example

"redis://localhost:6379/"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.registry.certFile

Path to GitLab container registry certificate. Type: path

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.registry.defaultForProjects

If GitLab container registry should be enabled by default for projects. Type: boolean

Default

config.services.gitlab.registry.enable

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.registry.enable

Enable GitLab container registry. Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.registry.externalAddress

External address used to access registry from the internet Type: string

Default

""

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.registry.externalPort

External port used to access registry from the internet Type: signed integer

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.registry.host

GitLab container registry host name. Type: string

Default

config.services.gitlab.host

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.registry.issuer

GitLab container registry issuer. Type: string

Default

"gitlab-issuer"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.registry.keyFile

Path to GitLab container registry certificate-key. Type: path

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.registry.package

Container registry package to use.

External container registries such as pkgs.docker-distribution are not supported anymore since GitLab 16.0.0.

Type: package

Default

pkgs.docker-distribution

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.registry.port

GitLab container registry port. Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

4567

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.registry.serviceName

GitLab container registry service name. Type: string

Default

"container_registry"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.secrets.dbFile

A file containing the secret used to encrypt variables in the DB. If you change or lose this key you will be unable to access variables stored in database.

Make sure the secret is at least 32 characters and all random, no regular words or you'll be exposed to dictionary attacks.

This should be a string, not a nix path, since nix paths are copied into the world-readable nix store.

Type: null or path

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.secrets.jwsFile

A file containing the secret used to encrypt session keys. If you change or lose this key, users will be disconnected.

Make sure the secret is an RSA private key in PEM format. You can generate one with

openssl genrsa 2048

This should be a string, not a nix path, since nix paths are copied into the world-readable nix store.

Type: null or path

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.secrets.otpFile

A file containing the secret used to encrypt secrets for OTP tokens. If you change or lose this key, users which have 2FA enabled for login won't be able to login anymore.

Make sure the secret is at least 32 characters and all random, no regular words or you'll be exposed to dictionary attacks.

This should be a string, not a nix path, since nix paths are copied into the world-readable nix store.

Type: null or path

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.secrets.secretFile

A file containing the secret used to encrypt variables in the DB. If you change or lose this key you will be unable to access variables stored in database.

Make sure the secret is at least 32 characters and all random, no regular words or you'll be exposed to dictionary attacks.

This should be a string, not a nix path, since nix paths are copied into the world-readable nix store.

Type: null or path

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.sidekiq.concurrency

How many processor threads to use for processing sidekiq background job queues. When null, the GitLab default is used.

See https://docs.gitlab.com/ee/administration/sidekiq/extra_sidekiq_processes.html#manage-thread-counts-explicitly for details.

Type: null or signed integer

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.sidekiq.memoryKiller.enable

Whether the Sidekiq MemoryKiller should be turned on. MemoryKiller kills Sidekiq when its memory consumption exceeds a certain limit.

See https://docs.gitlab.com/ee/administration/operations/sidekiq_memory_killer.html for details.

Type: boolean

Default

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.sidekiq.memoryKiller.graceTime

The time MemoryKiller waits after noticing excessive memory consumption before killing Sidekiq.

Type: signed integer

Default

900

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.sidekiq.memoryKiller.maxMemory

The maximum amount of memory, in MiB, a Sidekiq worker is allowed to consume before being killed.

Type: signed integer

Default

2000

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.sidekiq.memoryKiller.shutdownWait

The time allowed for all jobs to finish before Sidekiq is killed forcefully.

Type: signed integer

Default

30

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.smtp.address

Address of the SMTP server for GitLab. Type: string

Default

"localhost"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.smtp.authentication

Authentication type to use, see http://api.rubyonrails.org/classes/ActionMailer/Base.html Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.smtp.domain

HELO domain to use for outgoing mail. Type: string

Default

"localhost"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.smtp.enable

Enable gitlab mail delivery over SMTP. Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.smtp.enableStartTLSAuto

Whether to try to use StartTLS. Type: boolean

Default

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.smtp.opensslVerifyMode

How OpenSSL checks the certificate, see http://api.rubyonrails.org/classes/ActionMailer/Base.html Type: string

Default

"peer"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.smtp.passwordFile

File containing the password of the SMTP server for GitLab.

This should be a string, not a nix path, since nix paths are copied into the world-readable nix store.

Type: null or path

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.smtp.port

Port of the SMTP server for GitLab. Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

25

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.smtp.tls

Whether to use TLS wrapper-mode. Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.smtp.username

Username of the SMTP server for GitLab. Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.statePath

GitLab state directory. Configuration, repositories and logs, among other things, are stored here.

The directory will be created automatically if it doesn't exist already. Its parent directories must be owned by either root or the user set in {option}services.gitlab.user.

Type: string

Default

"/var/gitlab/state"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.user

User to run gitlab and all related services. Type: string

Default

"gitlab"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix

services.gitlab.workhorse.config

Configuration options to add to Workhorse's configuration file.

See https://gitlab.com/gitlab-org/gitlab/-/blob/master/workhorse/config.toml.example and https://docs.gitlab.com/ee/development/workhorse/configuration.html for examples and option documentation.

Options containing secret data should be set to an attribute set containing the attribute _secret - a string pointing to a file containing the value the option should be set to. See the example to get a better picture of this: in the resulting configuration file, the object_storage.s3.aws_secret_access_key key will be set to the contents of the {file}/var/keys/aws_secret_access_key file.

Type: TOML value

Default

{ }

Example

{object_storage.provider = "AWS";object_storage.s3 = {aws_access_key_id = "AKIAXXXXXXXXXXXXXXXX";aws_secret_access_key = { _secret = "/var/keys/aws_secret_access_key"; };};};

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/misc/gitlab.nix