| options/nixos/nix.settings.trusted-public-keys | List of public keys used to sign binary caches
|
| options/darwin/nix.settings.trusted-public-keys | List of public keys used to sign binary caches
|
| options/nixos/nix.settings.require-sigs | If enabled (the default), Nix will only download binaries from binary caches if
they are cryptographically signed with any of the keys listed in
nix.settings.trusted-public-keys
|
| options/darwin/nix.settings.require-sigs | If enabled (the default), Nix will only download binaries from binary caches if
they are cryptographically signed with any of the keys listed in
nix.settings.trusted-public-keys
|
| options/nixos/nix.sshServe.keys | A list of SSH public keys allowed to access the binary cache via SSH.
|
| options/nixos/services.ncdns.dnssec.keys.public | Path to the file containing the KSK public key
|
| options/nixos/services.zeyple.keys | List of public key files that will be imported by gpg.
|
| options/home-manager/programs.gpg.publicKeys | A list of public keys to be imported into GnuPG
|
| options/nixos/services.ncps.upstream.publicKeys | A list of public keys of upstream caches in the format
host[-[0-9]*]:public-key
|
| options/nixos/users.users.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| options/darwin/users.users.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| options/nixos/programs.ssh.knownHosts.<name>.publicKeyFile | The path to the public key file for the host
|
| options/nixos/users.extraUsers.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| options/nixos/services.ncps.cache.upstream.publicKeys | A list of public keys of upstream caches in the format
host[-[0-9]*]:public-key
|
| options/nixos/services.openssh.knownHosts.<name>.publicKeyFile | The path to the public key file for the host
|
| options/nixos/services.ncdns.dnssec.keys.zonePublic | Path to the file containing the ZSK public key
|
| options/nixos/nix.sshServe.trusted | Whether to add nix-ssh to the nix.settings.trusted-users
|
| options/nixos/services.userdbd.enableSSHSupport | Whether to enable exposing OpenSSH public keys defined in userdb
|
| options/home-manager/programs.gpg.publicKeys.*.trust | The amount of trust you have in the key ownership and the care the
owner puts into signing other keys
|
| options/nixos/services.sourcehut.settings."meta.sr.ht::billing".stripe-public-key | Public key for Stripe
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.pubkeys | List of raw public key candidates to use for
authentication
|
| options/nixos/services.movim.h2o.acme.root | Directory for the ACME challenge, which is public
|
| options/nixos/services.davis.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.slskd.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.movim.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.snipe-it.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.h2o.hosts.<name>.acme.root | Directory for the ACME challenge, which is public
|
| options/nixos/services.akkoma.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.gancio.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.fluidd.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.matomo.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.monica.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.rosenpass.settings.public_key | Path to a file containing the public key of the local Rosenpass peer
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.pubkeys | List of raw public keys to accept for
authentication
|
| options/nixos/services.dolibarr.h2o.acme.root | Directory for the ACME challenge, which is public
|
| options/nixos/services.fediwall.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.kanboard.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.dolibarr.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.librenms.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.agorakit.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.pixelfed.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.mainsail.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.moodle.virtualHost.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| options/nixos/services.nagios.virtualHost.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| options/nixos/services.radicle.httpd.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.anuko-time-tracker.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.httpd.virtualHosts.<name>.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| options/nixos/services.nginx.virtualHosts.<name>.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.bookstack.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.cryptpad.settings.adminKeys | List of public signing keys of users that can access the admin panel
|
| options/nixos/users.users.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| options/darwin/users.users.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| options/nixos/services.jirafeau.nginxConfig.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/users.extraUsers.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| options/nixos/services.drupal.sites.<name>.virtualHost.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| options/nixos/services.fwupd.extraTrustedKeys | Installing a public key allows firmware signed with a matching private key to be recognized as trusted, which may require less authentication to install than for untrusted files
|
| options/nixos/services.guix.publish.generateKeyPair | Whether to generate signing keys in /etc/guix which are
required to initialize a substitute server
|
| options/nixos/services.borgbackup.repos.<name>.authorizedKeys | Public SSH keys that are given full write access to this repository
|
| options/nixos/services.fedimintd.<name>.nginx.config.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.borgbackup.repos | Serve BorgBackup repositories to given public SSH keys,
restricting their access to the repository only
|
| options/nixos/services.neo4j.ssl.policies.<name>.allowKeyGeneration | Allows the generation of a private key and associated self-signed
certificate
|
| options/nixos/services.nsd.keys | Define your TSIG keys here.
|
| options/nixos/services.kubernetes.pki.caCertPathPrefix | Path-prefrix for the CA-certificate to be used for cfssl signing
|
| options/nixos/services.limesurvey.virtualHost.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| options/nixos/services.mediawiki.httpd.virtualHost.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| options/nixos/services.yggdrasil.settings.AllowedPublicKeys | List of peer public keys to allow incoming peering connections from
|
| options/nixos/services.limesurvey.httpd.virtualHost.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| options/nixos/services.limesurvey.nginx.virtualHost.acmeRoot | Directory for the ACME challenge, which is public
|
| options/home-manager/xdg.userDirs.publicShare | The Public share directory.
|
| options/nixos/services.libeufin.nexus.settings.nexus-ebics.BANK_PUBLIC_KEYS_FILE | Filesystem location where Nexus should store the bank public keys.
|
| options/nixos/services.openssh.authorizedKeysCommand | Specifies a program to be used to look up the user's public
keys
|
| options/nixos/services.kubernetes.apiserver.serviceAccountKeyFile | File containing PEM-encoded x509 RSA or ECDSA private or public keys,
used to verify ServiceAccount tokens
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/nix.settings.allowed-users | A list of names of users (separated by whitespace) that are
allowed to connect to the Nix daemon
|
| options/darwin/nix.settings.allowed-users | A list of names of users (separated by whitespace) that are
allowed to connect to the Nix daemon
|
| options/nixos/security.pam.rssh.settings.auth_key_file | Path to file with trusted public keys in OpenSSH's authorized_keys format
|
| options/nixos/nix.buildMachines.*.sshUser | The username to log in as on the remote host
|
| options/home-manager/nix.buildMachines.*.sshUser | The username to log in as on the remote host
|
| options/darwin/nix.buildMachines.*.sshUser | The username to log in as on the remote host
|
| options/nixos/services.matrix-tuwunel.settings.global.trusted_servers | Servers listed here will be used to gather public keys of other servers
(notary trusted key servers)
|
| options/nixos/nix.buildMachines.*.publicHostKey | The (base64-encoded) public host key of this builder
|
| options/home-manager/nix.buildMachines.*.publicHostKey | The (base64-encoded) public host key of this builder
|
| options/darwin/nix.buildMachines.*.publicHostKey | The (base64-encoded) public host key of this builder
|
| options/nixos/services.public-inbox.path | Additional packages to place in the path of public-inbox-mda,
public-inbox-watch, etc.
|
| options/nixos/services.borgbackup.repos.<name>.authorizedKeysAppendOnly | Public SSH keys that can only be used to append new data (archives) to the repository
|
| options/home-manager/programs.keychain.keys | Keys to add to keychain.
|
| options/nixos/services.tox-node.keysFile | Path to the file where DHT keys are stored.
|
| options/nixos/services.i2pd.proto.httpProxy.keys | File to persist HTTPPROXY keys.
|
| options/nixos/programs.ssh.knownHosts.<name>.publicKey | The public key data for the host
|
| options/darwin/programs.ssh.knownHosts.<name>.publicKey | The public key data for the host
|
| options/nixos/services.public-inbox.settings | Settings for the public-inbox config file.
|
| options/nixos/services.matrix-continuwuity.settings.global.trusted_servers | Servers listed here will be used to gather public keys of other servers
(notary trusted key servers)
|
| options/home-manager/programs.gpg.publicKeys.*.text | Text of an OpenPGP public key.
|
| options/nixos/services.i2pd.proto.socksProxy.keys | File to persist SOCKSPROXY keys.
|
| options/nixos/services.warpgate.settings.ssh.keys | Path to store SSH host & client keys.
|
| options/nixos/services.public-inbox.mda.args | Command-line arguments to pass to public-inbox-mda(1).
|
| options/nixos/services.public-inbox.nntp.key | Path to TLS key to use for connections to public-inbox-nntpd(1).
|
| options/nixos/services.public-inbox.imap.key | Path to TLS key to use for connections to public-inbox-imapd(1).
|
| options/darwin/programs.ssh.knownHosts.<name>.publicKeyFile | The path to the public key file for the host
|
| options/nixos/services.public-inbox.nntp.args | Command-line arguments to pass to public-inbox-nntpd(1).
|
| options/nixos/services.public-inbox.http.args | Command-line arguments to pass to public-inbox-httpd(1).
|
| options/nixos/services.public-inbox.imap.args | Command-line arguments to pass to public-inbox-imapd(1).
|
| options/home-manager/programs.gpg.publicKeys.*.source | Path of an OpenPGP public key file.
|
| options/nixos/services.public-inbox.enable | Whether to enable the public-inbox mail archiver.
|
| options/nixos/services.public-inbox.imap.cert | Path to TLS certificate to use for connections to public-inbox-imapd(1).
|
| options/nixos/services.public-inbox.nntp.cert | Path to TLS certificate to use for connections to public-inbox-nntpd(1).
|
| options/nixos/services.openssh.knownHosts.<name>.publicKey | The public key data for the host
|
| options/nixos/services.public-inbox.settings.publicinbox | public inboxes
|
| options/nixos/services.public-inbox.mda.enable | Whether to enable the public-inbox Mail Delivery Agent.
|
| options/nixos/services.public-inbox.package | The public-inbox package to use.
|
| options/home-manager/xsession.windowManager.fluxbox.keys | Keyboard shortcuts configuration for Fluxbox, written to
~/.fluxbox/keys
|
| options/nixos/services.radicle.publicKey | An SSH public key (as an absolute file path or directly as a string),
usually generated by rad auth.
|
| options/nixos/services.public-inbox.nntp.enable | Whether to enable the public-inbox NNTP server.
|
| options/nixos/services.public-inbox.http.enable | Whether to enable the public-inbox HTTP server.
|
| options/nixos/services.public-inbox.imap.enable | Whether to enable the public-inbox IMAP server.
|
| options/nixos/services.factorio.public | Game will be published on the official Factorio matching server.
|
| options/nixos/services.ente.api.settings.apps.public-albums | If you're running a self hosted instance and wish to serve public links,
set this to the URL where your albums web app is running.
|
| options/nixos/services.tmate-ssh-server.keysDir | Directory containing ssh keys, defaulting to auto-generation
|
| options/nixos/services.nsd.keys.<name>.keyFile | Path to the file which contains the actual base64 encoded
key
|
| options/home-manager/services.macos-remap-keys.keypad | Mapping of keypad keys to remap
|
| options/nixos/boot.initrd.luks.devices.<name>.gpgCard.publicKey | Path to the Public Key.
|
| options/nixos/services.i2pd.inTunnels.<name>.keys | Keyset used for tunnel identity.
|
| options/nixos/services.public-inbox.nntp.port | Listening port
|
| options/nixos/services.public-inbox.imap.port | Listening port
|
| options/nixos/services.i2pd.outTunnels.<name>.keys | Keyset used for tunnel identity.
|
| options/nixos/services.dragonflydb.keysOutputLimit | Maximum number of returned keys in keys command.
keys is a dangerous command
|
| options/nixos/services.public-inbox.http.mounts | Root paths or URLs that public-inbox will be served on
|
| options/nixos/services.thelounge.public | Make your The Lounge instance public
|
| options/nixos/services.immich-public-proxy.enable | Whether to enable Immich Public Proxy.
|
| options/nixos/services.firezone.relay.publicIpv4 | The public ipv4 address of this relay
|
| options/nixos/services.firezone.relay.publicIpv6 | The public ipv6 address of this relay
|
| options/nixos/services.keter.bundle.publicScript | Allows loading of public environment variables,
these are emitted to the log so it shouldn't contain secrets.
|
| options/nixos/services.immich-public-proxy.package | The immich-public-proxy package to use.
|
| options/nixos/services.ceph.global.publicNetwork | A comma-separated list of subnets that will be used as public networks in the cluster.
|
| options/nixos/services.actkbd.bindings.*.keys | List of keycodes to match.
|
| options/nixos/services.quicktun.<name>.publicKey | Remote public key in hexadecimal form.
Not needed when services.quicktun..protocol is set to raw.
|
| options/nixos/services.immich-public-proxy.settings | Configuration for IPP
|
| options/nixos/services.blockbook-frontend.<name>.public | Public http server binding [address]:port.
|
| options/nixos/services.nsd.keys.<name>.algorithm | Authentication algorithm for this key.
|
| options/nixos/services.public-inbox.settings.publicinbox.css | The local path name of a CSS file for the PSGI web interface.
|
| options/home-manager/services.macos-remap-keys.keyboard | Mapping of keyboard keys to remap
|
| options/nixos/services.ncdns.dnssec.keys.private | Path to the file containing the KSK private key.
|
| options/nixos/services.public-inbox.inboxes.<name>.watch | Paths for public-inbox-watch(1) to monitor for new mail.
|
| options/nixos/services.outline.publicUrl | The fully qualified, publicly accessible URL
|
| options/nixos/services.public-inbox.spamAssassinRules | SpamAssassin configuration specific to public-inbox.
|
| options/nixos/services.public-inbox.settings.publicinbox.nntpserver | NNTP URLs to this public-inbox instance
|
| options/nixos/services.public-inbox.settings.publicinbox.pop3server | POP3 URLs to this public-inbox instance
|
| options/nixos/services.public-inbox.settings.publicinbox.imapserver | IMAP URLs to this public-inbox instance
|
| options/nixos/services.ncdns.dnssec.keys.zonePrivate | Path to the file containing the ZSK private key.
|
| options/nixos/services.public-inbox.inboxes.<name>.address | The email addresses of the public-inbox.
|
| options/nixos/services.public-inbox.settings.publicinbox.wwwlisting | Controls which lists (if any) are listed for when the root
public-inbox URL is accessed over HTTP.
|
| options/nixos/services.flannel.publicIp | IP accessible by other nodes for inter-host communication
|
| options/nixos/services.immich-public-proxy.port | The port that IPP will listen on.
|
| options/nixos/services.public-inbox.settings.coderepo | code repositories
|
| options/nixos/services.public-inbox.inboxes | Inboxes to configure, where attribute names are inbox names.
|
| options/nixos/services.rkvm.server.settings.switch-keys | A key list specifying a host switch combination.
A list of key names is available in https://github.com/htrefil/rkvm/blob/master/switch-keys.md.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.public | Whether this is a public client (enforces PKCE, doesn't use a basic secret)
|
| options/nixos/services.public-inbox.inboxes.<name>.inboxdir | The absolute path to the directory which hosts the public-inbox.
|
| options/nixos/services.public-inbox.http.port | Listening port or systemd's ListenStream= entry
to be used as a reverse proxy, eg. in nginx:
locations."/inbox".proxyPass = "http://unix:${config.services.public-inbox.http.port}:/inbox";
Set to null and use systemd.sockets.public-inbox-httpd.listenStreams
if you need a more advanced listening.
|
| options/nixos/services.public-inbox.settings.coderepo.<name>.dir | Path to a git repository
|
| options/home-manager/services.macos-remap-keys.enable | Whether to enable macOS key remapping service.
|
| options/nixos/services.public-inbox.settings.coderepo.<name>.cgitUrl | URL of a cgit instance
|
| options/nixos/services.immich-public-proxy.immichUrl | URL of the Immich instance
|
| options/nixos/services.public-inbox.inboxes.<name>.url | URL where this inbox can be accessed over HTTP.
|
| options/nixos/services.languagetool.public | Whether to enable access from anywhere (rather than just localhost).
|
| options/home-manager/programs.radicle.settings.publicExplorer | HTTPS URL pattern used to generate links to view content on Radicle via the browser.
|
| options/nixos/services.public-inbox.settings.publicinboxmda.spamcheck | If set to spamc, public-inbox-watch(1) will filter spam
using SpamAssassin.
|
| options/nixos/services.public-inbox.postfix.enable | Whether to enable the integration into Postfix.
|
| options/nixos/services.cjdns.UDPInterface.connectTo.<name>.publicKey | Public key at the opposite end of the tunnel.
|
| options/nixos/services.cjdns.ETHInterface.connectTo.<name>.publicKey | Public key at the opposite end of the tunnel.
|
| options/nixos/services.public-inbox.openFirewall | Whether to enable opening the firewall when using a port option.
|
| options/nixos/boot.initrd.network.ssh.hostKeys | Specify SSH host keys to import into the initrd
|
| options/nixos/services.triggerhappy.bindings.*.keys | List of keys to match
|
| options/nixos/services.jitsi-videobridge.nat.publicAddress | Public address to assume when running behind NAT.
|
| options/nixos/services.nginx.proxyCachePath.<name>.keysZoneName | Set name to shared memory zone.
|
| options/nixos/services.nginx.proxyCachePath.<name>.keysZoneSize | Set size to shared memory zone.
|
| options/nixos/services.public-inbox.settings.publicinboxwatch.spamcheck | If set to spamc, public-inbox-watch(1) will filter spam
using SpamAssassin.
|
| options/nixos/services.neo4j.ssl.policies.<name>.publicCertificate | The name of public X.509 certificate (chain) file in PEM format
for this policy to be found in the baseDirectory,
or the absolute path to the certificate file
|
| options/darwin/networking.wg-quick.interfaces.<name>.peers.*.publicKey | The public key for this peer.
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.publicKey | The base64 public key to the peer.
|
| options/nixos/services.immich-public-proxy.openFirewall | Whether to open the IPP port in the firewall
|
| options/nixos/services.toxBootstrapd.keysFile | Node key file.
|
| options/nixos/services.maubot.settings.server.public_url | Public base URL where the server is visible.
|
| options/nixos/services.public-inbox.inboxes.<name>.watchheader | If specified, public-inbox-watch(1) will only process
mail containing a matching header.
|
| options/nixos/services.chhoto-url.settings.public_mode | Whether to enable public mode.
|
| options/nixos/services.public-inbox.inboxes.<name>.coderepo | Nicknames of a 'coderepo' section associated with the inbox.
|
| options/home-manager/services.gpg-agent.sshKeys | Which GPG keys (by keygrip) to expose as SSH keys.
|
| options/nixos/services.public-inbox.inboxes.<name>.newsgroup | NNTP group name for the inbox.
|
| options/nixos/services.public-inbox.settings.publicinboxwatch.watchspam | If set, mail in this maildir will be trained as spam and
deleted from all watched inboxes
|
| options/nixos/services.matrix-appservice-irc.settings.ircService.mediaProxy.publicUrl | URL under which the media proxy is publicly acccessible.
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.publicKey | The base64 public key of the peer.
|
| options/nixos/boot.loader.limine.secureBoot.enable | Whether to use sign the limine binary with sbctl.
This requires you to already have generated the keys and enrolled them with sbctl
|
| options/nixos/services.rosenpass.settings.peers.*.public_key | Path to a file containing the public key of the remote Rosenpass peer.
|
| options/nixos/services.schleuder.settings.keyserver | Key server from which to fetch and update keys
|
| options/darwin/services.mopidy.mediakeys.enable | Whether to enable the Mopidy OSX Media Keys support daemon.
|
| options/home-manager/programs.openstackclient.publicClouds | Public information about clouds
|
| options/nixos/services.gitlab.pages.settings | Configuration options to set in the GitLab Pages config
file
|
| options/nixos/services.public-inbox.inboxes.<name>.description | User-visible description for the repository.
|
| options/nixos/services.foundationdb.publicAddress | Publicly visible IP address of the process
|
| options/home-manager/programs.gpg.mutableTrust | If set to true, you may manage trust as a user using
the gpg command
|
| options/nixos/services.xonotic.settings.sv_public | Controls whether the server will be publicly listed.
|
| options/nixos/services.logkeys.enable | Whether to enable logkeys, a keylogger service.
|
| options/nixos/services.h2o.hosts | The hosts config to be merged with the settings
|
| options/nixos/services.matrix-synapse.settings.public_baseurl | The public-facing base URL for the client API (not including _matrix/...)
|
| options/nixos/services.evremap.settings.remap.*.input | The key sequence that should be remapped
|
| options/nixos/services.logkeys.device | Use the given device as keyboard input event device instead of /dev/input/eventX default.
|
| options/nixos/services.go-neb.baseUrl | Public-facing endpoint that can receive webhooks.
|
| options/nixos/services.neo4j.ssl.policies.<name>.trustedDir | Path to directory of X.509 certificates in PEM format for
trusted parties
|
| options/nixos/services.evremap.settings.remap.*.output | The key sequence that should be output when the input sequence is entered
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.hotkeys | Hotkeys to configure.
|
| options/nixos/services.gitolite.adminPubkey | Initial administrative public key for Gitolite
|
| options/nixos/services.nix-serve.secretKeyFile | The path to the file used for signing derivation data
|
| options/home-manager/programs.qutebrowser.keyBindings | Key bindings mapping keys to commands in different modes
|
| options/nixos/services.yggdrasil.settings | Configuration for yggdrasil, as a structured Nix attribute set
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.hotkeys.<name>.*.key | The hotkey.
|
| options/nixos/services.tor.relay.role | Your role in Tor network
|
| options/home-manager/programs.gpg.mutableKeys | If set to true, you may manage your keyring as a user
using the gpg command
|
| options/home-manager/programs.lf.keybindings | Keys to bind
|
| options/nixos/services.evremap.settings.dual_role.*.tap | The key sequence that should be output when the input key is tapped
|
| options/nixos/security.pam.services.<name>.rssh | If set, the calling user's SSH agent is used to authenticate
against the configured keys
|
| options/nixos/services.maubot.extraConfigFile | A file for storing secrets
|
| options/nixos/programs.wshowkeys.package | The wshowkeys package to use.
|
| options/home-manager/programs.broot.settings.verbs | Define new verbs
|
| options/nixos/services.evremap.settings.dual_role.*.input | The key that should be remapped
|
| options/nixos/services.evremap.settings.dual_role.*.hold | The key sequence that should be output when the input key is held
|
| options/home-manager/programs.cudatext.lexerHotkeys | Hotkeys settings specific to each lexer.
|
| options/home-manager/programs.cudatext.hotkeys | Hotkeys for Cudatext
|
| options/nixos/services.frp.role | The frp consists of client and server
|
| options/home-manager/programs.qutebrowser.keyMappings | This setting can be used to map keys to other keys
|
| options/home-manager/programs.gpg.settings | GnuPG configuration options
|
| options/nixos/services.metabase.ssl.keystore | Java KeyStore file containing the certificates.
|
| options/nixos/services.openssh.generateHostKeys | Whether to generate SSH host keys
|
| options/nixos/services.i2pd.dataDir | Alternative path to storage of i2pd data (RI, keys, peer profiles, ...)
|
| options/home-manager/programs.lf.cmdKeybindings | Keys to bind to command line commands which can only be one of the
builtin commands
|
| options/nixos/security.agnos.generateKeys.enable | Enable automatic generation of account keys
|
| options/nixos/programs.wshowkeys.enable | Whether to enable wshowkeys (displays keypresses on screen on supported Wayland
compositors)
|
| options/nixos/services.skydns.etcd.tlsPem | Skydns path of TLS client certificate - public key.
|
| options/nixos/programs.light.brightnessKeys.enable | Whether to enable brightness control with keyboard keys
|
| options/nixos/services.forgejo.secrets | This is a small wrapper over systemd's LoadCredential
|
| options/home-manager/programs.intelli-shell.shellHotkeys | Settings for customizing the keybinding to integrate your shell with intelli-shell
|
| options/nixos/services.skydns.etcd.caCert | Skydns path of TLS certificate authority public key.
|
| options/nixos/services.confd.prefix | The string to prefix to keys.
|
| options/nixos/services.gitea.settings.server.ROOT_URL | Full public URL of gitea server.
|
| options/nixos/services.stubby.settings | Content of the Stubby configuration file
|
| options/nixos/services.evdevremapkeys.settings | config.yaml for evdevremapkeys
|
| options/nixos/services.veilid.settings | Build veilid-server.conf with nix expression
|
| options/nixos/services.dkimproxy-out.selector | The selector to use for DKIM key identification
|
| options/home-manager/programs.superfile.hotkeys | Hotkey configuration written to $XDG_CONFIG_HOME/superfile/hotkeys.toml
(linux) or Library/Application Support/superfile/hotkeys.toml (darwin), See
https://superfile.netlify.app/configure/custom-hotkeys/ for supported values.
|
| options/darwin/services.mopidy.mediakeys.package | This option specifies the mediakeys package to use.
|
| options/nixos/programs.nncp.group | The group under which NNCP files shall be owned
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.coverage | The length of time to ensure that keys will be correct; no action will be taken to create new keys to be activated after this time.
|
| options/nixos/services.gokapi.enable | Whether to enable Lightweight selfhosted Firefox Send alternative without public upload.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.hotkeys.<name>.*.modifiers | The hotkey modifiers.
|
| options/nixos/services.marytts.settings | Settings for MaryTTS
|
| options/nixos/services.unclutter.keystroke | Wait for a keystroke before hiding the cursor
|
| options/home-manager/services.ssh-tpm-agent.keyDir | Path of the directory to look for TPM sealed keys in, defaults to $HOME/.ssh if unset
|
| options/nixos/services.lldap.settings.http_url | The public URL of the server, for password reset links.
|
| options/nixos/services.minio.configDir | The config directory, for the access keys and other settings.
|
| options/nixos/services.yggdrasil.persistentKeys | Whether to enable automatic generation and persistence of keys
|
| options/nixos/services.btrbk.sshAccess.*.key | SSH public key allowed to login as user btrbk to run remote backups.
|
| options/nixos/security.pam.ussh.caFile | By default pam-ussh reads the trusted user CA keys
from /etc/ssh/trusted_user_ca
|
| options/home-manager/wayland.windowManager.sway.config.bindkeysToCode | Whether to make use of --to-code in keybindings.
|
| options/home-manager/services.polybar.settings | Polybar configuration
|
| options/darwin/system.defaults.NSGlobalDomain."com.apple.keyboard.fnState" | Use F1, F2, etc. keys as standard function keys.
|
| options/nixos/services.ntfy-sh.settings.base-url | Public facing base URL of the service
This setting is required for any of the following features:
- attachments (to return a download URL)
- e-mail sending (for the topic URL in the email footer)
- iOS push notifications for self-hosted servers
(to calculate the Firebase poll_request topic)
- Matrix Push Gateway (to validate that the pushkey is correct)
|
| options/nixos/services.forgejo.settings.server.ROOT_URL | Full public URL of Forgejo server.
|
| options/nixos/services.tsidp.settings.enableFunnel | Use Tailscale Funnel to make tsidp available on the public internet so it works with SaaS products.
|
| options/nixos/services.matrix-conduit.settings.global.trusted_servers | Servers trusted with signing server keys.
|
| options/nixos/xdg.terminal-exec.settings | Configuration options for the Default Terminal Execution Specification
|
| options/nixos/services.fediwall.settings.loadPublic | Load public posts
|
| options/nixos/services.btrbk.sshAccess | SSH keys that should be able to make or push snapshots on this system remotely with btrbk
|
| options/home-manager/xdg.terminal-exec.settings | Configuration options for the Default Terminal Execution Specification
|
| options/nixos/services.tcsd.stateDir | The location of the system persistent storage file
|
| options/nixos/services.pgpkeyserver-lite.hkpPort | Which port the sks-keyserver is listening on.
|
| options/nixos/security.pam.services.<name>.gnupg.enable | If enabled, pam_gnupg will attempt to automatically unlock the
user's GPG keys with the login password via
gpg-agent
|
| options/nixos/programs.less.commands | Defines new command keys.
|
| options/nixos/services.komodo-periphery.passkeys | Passkeys required to access the periphery API
|
| options/nixos/services.gitlab.pages.settings.gitlab-server | Public GitLab server URL.
|
| options/nixos/services.rathole.role | Select whether rathole needs to be run as a client or a server
|
| options/nixos/services.ncps.cache.secretKeyPath | The path to load the secretKey for signing narinfos
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.rsaPublicKey | Legacy RSA public key of the host in PEM format, including start and
end markers
|
| options/nixos/services.zwave-js.secretsConfigFile | JSON file containing secret keys
|
| options/nixos/services.sympa.domains | Email domains handled by this instance
|
| options/nixos/services.opencloud.url | Web interface root public URL, including scheme and port (if non-default).
|
| options/nixos/services.searx.runInUwsgi | Whether to run searx in uWSGI as a "vassal", instead of using its
built-in HTTP server
|
| options/nixos/security.pam.p11.enable | Enables P11 PAM (pam_p11) module
|
| options/nixos/programs.less.lineEditingKeys | Defines new line-editing keys.
|
| options/nixos/services.rosenpass.settings.peers.*.peer | WireGuard public key corresponding to the remote Rosenpass peer.
|
| options/home-manager/programs.broot.settings.skin | Color configuration
|
| options/nixos/services.sourcehut.settings.mail.pgp-pubkey | OpenPGP public key.
|
| options/nixos/services.siproxd.ifOutbound | Public network interface
|
| options/nixos/programs.ssh.agentTimeout | How long to keep the private keys in memory
|
| options/nixos/services.pgpkeyserver-lite.enable | Whether to enable pgpkeyserver-lite on a nginx vHost proxying to a gpg keyserver.
|
| options/nixos/services.apache-kafka.settings | Kafka broker configuration
server.properties
|
| options/nixos/services.rosenpass.settings.peers | List of peers to exchange keys with.
|
| options/nixos/services.outline.cdnUrl | If using a Cloudfront/Cloudflare distribution or similar it can be set
using this option
|
| options/nixos/services.tor.relay.onionServices.<name>.authorizedClients | Authorized clients for a v3 onion service,
as a list of public key, in the format:
descriptor:x25519:<base32-public-key>
See torrc manual.
|
| options/nixos/services.pgpkeyserver-lite.package | The pgpkeyserver-lite package to use.
|
| options/nixos/services.mastodon.configureNginx | Configure nginx as a reverse proxy for mastodon
|
| options/nixos/services.grafana.settings.server.domain | The public facing domain name used to access grafana from a browser
|
| options/nixos/services.dovecot2.sslServerCert | Path to the server's public key.
|
| options/nixos/services.firewalld.settings.RFC3964_IPv4 | Whether to filter IPv6 traffic with 6to4 destination addresses that correspond to IPv4 addresses that should not be routed over the public internet.
|
| options/nixos/services.mycelium.peers | List of peers to connect to, in the formats:
quic://[2001:0db8::1]:9651
quic://192.0.2.1:9651
tcp://[2001:0db8::1]:9651
tcp://192.0.2.1:9651
If addHostedPublicNodes is set to true, the hosted public nodes will also be added.
|
| options/nixos/security.acme.certs.<name>.keyType | Key type to use for private keys
|
| options/nixos/services.part-db.enableNginx | Whether to enable nginx or not
|
| options/home-manager/programs.obsidian.defaultSettings.hotkeys | Hotkeys to configure
|
| options/nixos/services.fedimintd.<name>.p2p.url | Public address for p2p connections from peers (if TCP is used)
|
| options/nixos/services.kanidm.unix.sshIntegration | Whether to enable Kanidm SSH keys login.
|
| options/nixos/services.pgpkeyserver-lite.hkpAddress | Which IP address the sks-keyserver is listening on.
|
| options/home-manager/programs.obsidian.defaultSettings.hotkeys.<name>.*.key | The hotkey.
|
| options/nixos/services.keycloak.settings.hostname | The hostname part of the public URL used as base for
all frontend requests
|
| options/nixos/services.vault.extraSettingsPaths | Configuration files to load besides the immutable one defined by the NixOS module
|
| options/nixos/programs.ssh.startAgent | Whether to start the OpenSSH agent when you log in
|
| options/home-manager/programs.password-store.settings | The pass environment variables dictionary
|
| options/nixos/services.lk-jwt-service.livekitUrl | The public websocket URL for livekit
|
| options/home-manager/services.xcape.mapExpression | The value has the grammar Key[|OtherKey]
|
| options/nixos/services.broadcast-box.settings | Attribute set of environment variables.
https://github.com/Glimesh/broadcast-box#environment-variables
The status API exposes stream keys so DISABLE_STATUS is enabled
by default.
|
| options/nixos/programs.ssh.knownHostsFiles | Files containing SSH host keys to set as global known hosts.
/etc/ssh/ssh_known_hosts (which is
generated by programs.ssh.knownHosts) is
always included.
|
| options/nixos/services.wastebin.settings.RUST_LOG | Influences logging
|
| options/nixos/services.pgpkeyserver-lite.hostname | Which hostname to set the vHost to that is proxying to sks.
|
| options/nixos/services.fedimintd.<name>.api.url | Public URL of the API address of the reverse proxy/tls terminator
|
| options/nixos/services.opendkim.keyPath | The path that opendkim should put its generated private keys into
|
| options/nixos/services.homer.settings | Settings serialized into config.yml before build
|
| options/nixos/services.harmonia.signKeyPaths | Paths to the signing keys to use for signing the cache
|
| options/nixos/services.dendrite.tlsKey | The path to the TLS key.
nix-shell -p dendrite --command "generate-keys --tls-cert server.crt --tls-key server.key"
|
| options/nixos/services.wgautomesh.settings.peers.*.pubkey | Wireguard public key of this peer.
|
| options/nixos/hardware.tuxedo-drivers.settings.fn-lock | Enables or disables the laptop keyboard's Function (Fn) lock at boot
|
| options/nixos/services.ncps.cache.lock.redisKeyPrefix | Prefix for all Redis lock keys (only used when Redis is
configured).
|
| options/nixos/services.postgrest.settings.server-host | Where to bind the PostgREST web server.
The admin server will also bind here, but potentially exposes sensitive information
|
| options/nixos/services.matrix-synapse.settings.turn_uris | The public URIs of the TURN server to give to clients
|
| options/nixos/programs.ssh.pubkeyAcceptedKeyTypes | Specifies the key lib.types that will be used for public key authentication.
|
| options/nixos/services.knot.keyFiles | A list of files containing additional configuration
to be included using the include directive
|
| options/nixos/services.chhoto-url.settings.public_mode_expiry_delay | The maximum expiry delay in seconds to force in public mode.
|
| options/nixos/services.murmur.registerName | Public server registration name, and also the name of the
Root channel
|
| options/nixos/security.pam.sshAgentAuth.enable | Whether to enable authenticating using a signature performed by the ssh-agent
|
| options/nixos/services.molly-brown.certPath | Path to TLS certificate
|
| options/nixos/services.tahoe.nodes.<name>.sftpd.hostPublicKeyFile | Path to the SSH host public key.
|
| options/nixos/services.peertube.listenWeb | The public-facing port that PeerTube will be accessible at (likely 80 or 443 if running behind a reverse proxy)
|
| options/nixos/services.dendrite.tlsCert | The path to the TLS certificate.
nix-shell -p dendrite --command "generate-keys --tls-cert server.crt --tls-key server.key"
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.zsk | Key policy for zone signing keys
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.ksk | Key policy for key signing keys
|
| options/nixos/services.openssh.hostKeys | NixOS can automatically generate SSH host keys
|
| options/nixos/programs.seahorse.enable | Whether to enable Seahorse, a GNOME application for managing encryption keys and passwords in the GNOME Keyring.
|
| options/nixos/services.fedimintd.<name>.nginx.fqdn | Public domain of the API address of the reverse proxy/tls terminator.
|
| options/home-manager/vdirsyncer.metadata | Metadata keys that should be synchronized when vdirsyncer
metasync is executed.
|
| options/nixos/services.writefreely.host | The public host name to serve.
|
| options/nixos/services.ghostunnel.servers.<name>.keystore | Path to keystore (combined PEM with cert/key, or PKCS12 keystore)
|
| options/nixos/security.acme.defaults.keyType | Key type to use for private keys
|
| options/nixos/services.plausible.server.baseUrl | Public URL where plausible is available
|
| options/home-manager/services.gpg-agent.enableSshSupport | Whether to use the GnuPG key agent for SSH keys.
|
| options/nixos/services.matrix-synapse.settings.trusted_key_servers | The trusted servers to download signing keys from.
|
| options/nixos/services.factorio.password | Your factorio.com login credentials
|
| options/nixos/services.factorio.username | Your factorio.com login credentials
|
| options/home-manager/accounts.email.accounts.<name>.gpg.key | The key to use as listed in gpg --list-keys.
|
| options/nixos/security.agnos.generateKeys.keySize | Key size in bits to use when generating new keys.
|
| options/nixos/services.filebeat.settings | Configuration for filebeat
|
| options/nixos/services.omnom.settings.activitypub.pubkey | ActivityPub public key
|
| options/nixos/services.evdevremapkeys.enable | Whether to enable evdevremapkeys, a daemon to remap events on linux input devices.
|
| options/nixos/boot.initrd.network.ssh.ignoreEmptyHostKeys | Allow leaving config.boot.initrd.network.ssh.hostKeys empty,
to deploy ssh host keys out of band.
|
| options/nixos/services.jitsi-videobridge.nat.harvesterAddresses | Addresses of public STUN services to use to automatically find
the public and local addresses of this Jitsi-Videobridge instance
without the need for manual configuration
|
| options/nixos/services.prosody.muc.*.roomDefaultPublic | If set, the MUC rooms will be public by default.
|
| options/nixos/services.postsrsd.settings.secrets-file | Path to the file containing the secret keys.
Secrets are passed using LoadCredential= on the systemd unit,
so this options is read-only
|
| options/home-manager/services.gpg-agent.defaultCacheTtlSsh | Set the time a cache entry used for SSH keys is valid to the
given number of seconds.
|
| options/nixos/services.tarsnap.archives.<name>.keyfile | Set a specific keyfile for this archive
|
| options/home-manager/xsession.windowManager.bspwm.rules | Rule configuration
|
| options/nixos/services.fedimintd.<name>.api_ws.url | Public URL of the API address of the reverse proxy/tls terminator
|
| options/nixos/services.frp.instances.<name>.role | The frp consists of client and server
|
| options/nixos/services.gitDaemon.enable | Enable Git daemon, which allows public hosting of git repositories
without any access controls
|
| options/nixos/services.keyd.keyboards | Configuration for one or more device IDs
|
| options/nixos/security.pam.u2f.settings.authfile | By default pam-u2f module reads the keys from
$XDG_CONFIG_HOME/Yubico/u2f_keys (or
$HOME/.config/Yubico/u2f_keys if XDG variable is
not set)
|
| options/home-manager/programs.termite.modifyOtherKeys | Emit escape sequences for extra keys,
like the modifyOtherKeys resource for
xterm(1).
|
| options/home-manager/services.gpg-agent.maxCacheTtlSsh | Set the maximum time a cache entry used for SSH keys is valid to n
seconds
|
| options/nixos/services.keyd.keyboards.<name>.settings | Configuration, except ids section, that is written to /etc/keyd/.conf
|
| options/nixos/services.keycloak.settings | Configuration options corresponding to parameters set in
conf/keycloak.conf
|
| options/nixos/services.draupnir.settings.homeserverUrl | Base URL of the Matrix homeserver that provides the Client-Server API.
|
| options/nixos/services.kerberos_server.settings.realms.<name>.acl.*.access | The changes the principal is allowed to make.
The "all" permission does not imply the "get-keys" permission
|
| options/nixos/security.pam.services.<name>.p11Auth | If set, keys listed in
~/.ssh/authorized_keys and
~/.eid/authorized_certificates
can be used to log in with the associated PKCS#11 tokens.
|
| options/nixos/services.teeworlds.register | Whether the server registers as a public server in the global server list
|
| options/nixos/services.prosody.muc.*.roomDefaultPublicJids | If set, the MUC rooms will display the public JIDs by default.
|
| options/nixos/boot.loader.systemd-boot.edk2-uefi-shell.sortKey | systemd-boot orders the menu entries by their sort keys,
so if you want something to appear after all the NixOS entries,
it should start with o or onwards
|
| options/nixos/programs.ssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| options/darwin/programs.ssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| options/nixos/networking.nat.externalIP | The public IP address to which packets from the local
network are to be rewritten
|
| options/nixos/services.draupnir.settings.rawHomeserverUrl | Public base URL of the Matrix homeserver that provides the Client-Server API when using the Draupnir's
Report forwarding feature.
When using Pantalaimon, do not set this to the Pantalaimon URL!
|
| options/nixos/services.syncthing.configDir | The path where the settings and keys will exist.
|
| options/nixos/services.postsrsd.secretsFile | Secret keys used for signing and verification.
The secret will be generated, if it does not exist at the given path.
|
| options/nixos/services.suwayomi-server.settings.server.basicAuthEnabled | Whether to enable basic access authentication for Suwayomi-Server
|
| options/home-manager/programs.obsidian.defaultSettings.hotkeys.<name>.*.modifiers | The hotkey modifiers.
|
| options/nixos/services.netbird.server.dashboard.settings | An attribute set that will be used to substitute variables when building the dashboard
|
| options/nixos/networking.nat.externalIPv6 | The public IPv6 address to which packets from the local
network are to be rewritten
|
| options/nixos/services.livekit.keyFile | LiveKit key file holding one or multiple application secrets
|
| options/nixos/services.kubernetes.easyCerts | Automatically setup x509 certificates and keys for the entire cluster.
|
| options/nixos/programs.captive-browser.interface | your public network interface (wlp3s0, wlan0, eth0, ...)
|
| options/nixos/programs.rust-motd.order | The order of the sections in programs.rust-motd.settings
|
| options/nixos/services.searx.configureUwsgi | Whether to run searx in uWSGI as a "vassal", instead of using its
built-in HTTP server
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.zsk.rollPeriod | How frequently to change keys
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.ksk.rollPeriod | How frequently to change keys
|
| options/nixos/services.murmur.registerPassword | Public server registry password, used authenticate your
server to the registry to prevent impersonation; required for
subsequent registry updates.
|
| options/nixos/services.schleuder.lists | List of list addresses that should be handled by Schleuder
|
| options/nixos/services.yggdrasil.settings.PrivateKeyPath | Path to the private key file on the host system
|
| options/nixos/services.movim.minifyStaticFiles | Do minification on public static files which reduces the size of
assets — saving data for the server & users as well as offering a
performance improvement
|
| options/nixos/services.hercules-ci-agent.settings.binaryCachesPath | Path to a JSON file containing binary cache secret keys
|
| options/darwin/services.hercules-ci-agent.settings.binaryCachesPath | Path to a JSON file containing binary cache secret keys
|
| options/nixos/services.ncps.cache.lock.postgresKeyPrefix | Prefix for all PostgreSQL advisory lock keys (only used when
PostgreSQL is configured as lock backend).
|
| options/nixos/boot.loader.systemd-boot.windows.<name>.sortKey | systemd-boot orders the menu entries by their sort keys,
so if you want something to appear after all the NixOS entries,
it should start with o or onwards
|
| options/nixos/services.parsedmarc.settings | Configuration parameters to set in
parsedmarc.ini
|
| options/nixos/services.taskserver.pki.auto.bits | The bit size for generated keys.
|
| options/nixos/services.actkbd.enable | Whether to enable the actkbd key mapping daemon
|
| options/nixos/boot.initrd.luks.devices.<name>.preOpenCommands | Commands that should be run right before we try to mount our LUKS device
|
| options/nixos/services.writefreely.stateDir | The state directory where keys and data are stored.
|
| options/nixos/boot.initrd.network.ssh.authorizedKeys | Authorized keys for the root user on initrd
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.ksk.prePublish | How long in advance to publish new keys
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.zsk.prePublish | How long in advance to publish new keys
|
| options/nixos/services.mastodon.activeRecordEncryptionPrimaryKeyFile | This key must be set to enable the Active Record Encryption feature within
Rails that Mastodon uses to encrypt and decrypt some database attributes
|
| options/nixos/services.mysql.galeraCluster.sstMethod | Method for the initial state transfer (wsrep_sst_method) when a node joins the cluster
|
| options/nixos/services.prosody.muc.*.roomDefaultChangeSubject | If set, the rooms will display the public JIDs by default.
|
| options/nixos/services.rosenpass.settings.secret_key | Path to a file containing the secret key of the local Rosenpass peer
|
| options/nixos/services.your_spotify.settings.SPOTIFY_PUBLIC | The public client ID of your Spotify application
|
| options/nixos/services.cloud-init.enable | Enable the cloud-init service
|
| options/nixos/security.pam.services.<name>.sshAgentAuth | If set, the calling user's SSH agent is used to authenticate
against the keys in the calling user's
~/.ssh/authorized_keys
|
| options/home-manager/xsession.windowManager.xmonad.libFiles | Additional files that will be saved in
~/.xmonad/lib/ and included in the configuration
build
|
| options/nixos/services.snipe-it.config | Snipe-IT configuration options to set in the
.env file
|
| options/nixos/security.pam.services.<name>.forwardXAuth | Whether X authentication keys should be passed from the
calling user to the target user (e.g. for
su)
|
| options/nixos/services.sourcehut.settings."sr.ht".service-key | An absolute file path (which should be outside the Nix-store)
to a key used for encrypting session cookies
|
| options/nixos/services.dependency-track.settings."alpine.oidc.teams.claim" | Defines the name of the claim that contains group memberships or role assignments in the provider's userinfo endpoint
|
| options/nixos/networking.nat.forwardPorts.*.loopbackIPs | Public IPs for NAT reflection; for connections to loopbackip:sourcePort from the host itself and from other hosts behind NAT
|
| options/nixos/programs.ssh.knownHosts.<name>.hostNames | A list of host names and/or IP numbers used for accessing
the host's ssh service
|
| options/nixos/services.matrix-appservice-discord.settings | config.yaml configuration as a Nix attribute set
|
| options/nixos/services.tor.relay.onionServices.<name>.secretKey | Secret key of the onion service
|
| options/nixos/services.openssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| options/nixos/services.sourcehut.settings."meta.sr.ht::billing".stripe-secret-key | An absolute file path (which should be outside the Nix-store)
to a secret key for Stripe
|
| options/nixos/services.libeufin.nexus.settings.nexus-ebics.CLIENT_PRIVATE_KEYS_FILE | Filesystem location where Nexus should store the subscriber private keys.
|
| options/nixos/services.geoipupdate.settings | geoipupdate configuration options
|
| options/nixos/services.maddy.tls.loader | TLS certificates are obtained by modules called "certificate
loaders"
|
| options/nixos/services.sourcehut.settings."meta.sr.ht::settings".registration | Whether to enable public registration.
|
| options/home-manager/programs.kakoune.config.keyMappings.*.effect | The sequence of keys to be mapped.
|
| options/nixos/services.gitlab.secrets.jwsFile | A file containing the secret used to encrypt session
keys
|
| options/nixos/services.netbird.tunnels.<name>.openFirewall | Opens up firewall port for communication between NetBird peers directly over LAN or public IP,
without using (internet-hosted) TURN servers as intermediaries.
|
| options/nixos/services.netbird.clients.<name>.openFirewall | Opens up firewall port for communication between NetBird peers directly over LAN or public IP,
without using (internet-hosted) TURN servers as intermediaries.
|
| options/nixos/boot.initrd.network.ssh.authorizedKeyFiles | Authorized keys taken from files for the root user on initrd
|
| options/nixos/boot.initrd.luks.mitigateDMAAttacks | Unless enabled, encryption keys can be easily recovered by an attacker with physical
access to any machine with PCMCIA, ExpressCard, ThunderBolt or FireWire port
|
| options/nixos/services.stargazer.routes | Routes that Stargazer should server
|
| options/nixos/services.mastodon.vapidPublicKeyFile | Path to file containing the public key used for Web Push
Voluntary Application Server Identification
|
| options/nixos/boot.loader.systemd-boot.memtest86.sortKey | systemd-boot orders the menu entries by their sort keys,
so if you want something to appear after all the NixOS entries,
it should start with o or onwards
|
| options/nixos/services.pleroma.configs | Pleroma public configuration
|
| options/nixos/services.seafile.ccnetSettings.General.SERVICE_URL | Seahub public URL.
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.settings | Attribute set of options for each extension
|
| options/nixos/hardware.tuxedo-drivers.enable | Whether to enable The tuxedo-drivers driver enables access to the following on TUXEDO notebooks:
- Driver for Fn-keys
- SysFS control of brightness/color/mode for most TUXEDO keyboards
- Hardware I/O driver for TUXEDO Control Center
For more inforation it is best to check at the source code description: https://gitlab.com/tuxedocomputers/development/packages/tuxedo-drivers
.
|
| options/nixos/services.beszel.agent.environment | Environment variables for configuring the beszel-agent service
|
| options/nixos/services.akkoma.config.":web_push_encryption".":vapid_details".public_key | base64-encoded public ECDH key.
|
| options/home-manager/programs.kakoune.config.ui.shiftFunctionKeys | Amount by which shifted function keys are offset
|
| options/nixos/fileSystems.<name>.depends | List of paths that should be mounted before this one
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.keystore | Path to keystore (combined PEM with cert/key, or PKCS12 keystore)
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits | Resource limits to be imposed on the job
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits | Resource limits to be imposed on the job
|
| options/home-manager/programs.feh.keybindings | Override feh's default keybindings
|
| options/nixos/services.dendrite.settings.global.private_key | The path to the signing private key file, used to sign
requests and events.
nix-shell -p dendrite --command "generate-keys --private-key matrix_key.pem"
|
| options/nixos/services.engelsystem.settings | Options to be added to config.php, as a nix attribute set
|
| options/darwin/system.defaults.NSGlobalDomain.KeyRepeat | Apple menu > System Preferences > Keyboard
If you press and hold certain keyboard keys when in a text area, the key’s character begins to repeat
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.settings | Attribute set of options for each extension
|
| options/nixos/services.ecs-agent.extra-environment | The environment the ECS agent should run with
|
| options/nixos/services.dex.environmentFile | Environment file (see systemd.exec(5)
"EnvironmentFile=" section for the syntax) to define variables for dex
|
| options/nixos/services.monica.config | monica configuration options to set in the
.env file
|
| options/nixos/services.schleuder.extraSettingsFile | YAML file to merge into the schleuder config at runtime
|
| options/nixos/services.gitlab.extraConfig | Extra options to be added under
production in
config/gitlab.yml, as a nix attribute
set
|
| options/nixos/boot.loader.systemd-boot.netbootxyz.sortKey | systemd-boot orders the menu entries by their sort keys,
so if you want something to appear after all the NixOS entries,
it should start with o or onwards
|
| options/nixos/services.lasuite-meet.livekit.keyFile | LiveKit key file holding one or multiple application secrets
|
| options/nixos/services.xserver.xkb.extraLayouts.<name>.typesFile | The path to the xkb types file
|
| options/nixos/services.mastodon.activeRecordEncryptionKeyDerivationSaltFile | This key must be set to enable the Active Record Encryption feature within
Rails that Mastodon uses to encrypt and decrypt some database attributes
|
| options/nixos/services.veilid.settings.core.network.routing_table.node_id | Base64-encoded public key for the node, used as the node's ID.
|
| options/nixos/services.dependency-track.settings."alpine.data.directory" | Defines the path to the data directory
|
| options/nixos/services.fedimintd.<name>.bitcoin.rpc.secretFile | If set the URL specified in bitcoin.rpc.url will get the content of this file added
as an URL password, so http://user@example.com will turn into http://user:SOMESECRET@example.com
|
| options/nixos/services.cloudflare-ddns.detectionTimeout | Timeout for detecting the public IP address.
|
| options/nixos/services.waagent.settings.Provisioning.Enable | Whether to enable provisioning functionality in the agent
|
| options/nixos/services.searx.environmentFile | Environment file (see systemd.exec(5) "EnvironmentFile=" section for the syntax) to define variables for Searx
|
| options/nixos/services.matrix-synapse.extraConfigFiles | Extra config files to include
|
| options/nixos/services.openssh.knownHosts.<name>.hostNames | A list of host names and/or IP numbers used for accessing
the host's ssh service
|
| options/nixos/services.dawarich.configureNginx | Configure nginx as a reverse proxy for dawarich
|
| options/nixos/services.maddy.tls.certificates | A list of attribute sets containing paths to TLS certificates and
keys
|
| options/nixos/services.dependency-track.oidc.teams.claim | Defines the name of the claim that contains group memberships or role assignments in the provider's userinfo endpoint
|
| options/nixos/services.chhoto-url.settings.hash_algorithm | The hash algorithm to use for passwords and API keys
|
| options/nixos/security.googleOsLogin.enable | Whether to enable Google OS Login
|
| options/home-manager/programs.firefoxpwa.profiles | Attribute set of profile options
|
| options/nixos/services.livekit.settings.rtc.use_external_ip | When set to true, attempts to discover the host's public IP via STUN
|
| options/nixos/boot.specialFileSystems.<name>.depends | List of paths that should be mounted before this one
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.settings | Attribute set of options for each extension
|
| options/nixos/services.slurm.enableSrunX11 | If enabled srun will accept the option "--x11" to allow for X11 forwarding
from within an interactive session or a batch job
|
| options/nixos/services.datadog-agent.checks | Configuration for all Datadog checks
|
| options/nixos/services.kerberos_server.settings.realms | The realm(s) to serve keys for.
|
| options/home-manager/programs.rclone.remotes.<name>.secrets | Sensitive configuration values such as passwords, API keys, and tokens
|
| options/nixos/boot.initrd.luks.reusePassphrases | When opening a new LUKS device try reusing last successful
passphrase
|
| options/nixos/boot.initrd.luks.devices.<name>.fido2.credentials | List of FIDO2 credential IDs
|
| options/nixos/services.multipath.devices.*.all_tg_pt | Set the 'all targets ports' flag when registering keys with mpathpersist
|
| options/nixos/services.agorakit.config | Agorakit configuration options to set in the
.env file
|
| options/nixos/services.bookstack.config | BookStack configuration options to set in the
.env file
|
| options/nixos/services.karakeep.environmentFile | An optional path to an environment file that will be used in the web and workers
services
|
| options/home-manager/wayland.windowManager.sway.config.floating.modifier | Modifier key or keys that can be used to drag floating windows.
|
| options/nixos/services.nebula.networks.<name>.lighthouse.dns.host | IP address on which nebula lighthouse should serve DNS.
'localhost' is a good default to ensure the service does not listen on public interfaces;
use a Nebula address like 10.0.0.5 to make DNS resolution available to nebula hosts only.
|
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits | Resource limits to be imposed on the job
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits | Resource limits to be imposed on the job
|
| options/nixos/services.prometheus.exporters.postfix.group | Group under which the postfix exporter shall be run
|
| options/nixos/services.mastodon.activeRecordEncryptionDeterministicKeyFile | This key must be set to enable the Active Record Encryption feature within
Rails that Mastodon uses to encrypt and decrypt some database attributes
|
| options/nixos/services.munin-node.extraPlugins | Additional Munin plugins to activate
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits | Resource limits to be imposed on the job
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits | Resource limits to be imposed on the job
|
| options/home-manager/xsession.windowManager.i3.config.floating.modifier | Modifier key or keys that can be used to drag floating windows.
|
| options/darwin/system.defaults.NSGlobalDomain.InitialKeyRepeat | Apple menu > System Preferences > Keyboard
If you press and hold certain keyboard keys when in a text area, the key’s character begins to repeat
|
| options/nixos/services.kmonad.keyboards.<name>.defcfg.allowCommands | Whether to enable keys to run shell commands.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits | Resource limits to be imposed on the job
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits | Resource limits to be imposed on the job
|
| options/nixos/services.openssh.authorizedKeysInHomedir | Enables the use of the ~/.ssh/authorized_keys file
|
| options/nixos/services.openssh.authorizedKeysCommandUser | Specifies the user under whose account the AuthorizedKeysCommand
is run
|
| options/nixos/services.gitlab.workhorse.config | Configuration options to add to Workhorse's configuration
file
|
| options/home-manager/programs.firefoxpwa.profiles.<name>.sites | Attribute set of site options for this profile
|
| options/nixos/services.openssh.authorizedKeysFiles | Specify the rules for which files to read on the host
|
| options/home-manager/launchd.agents.<name>.config.KeepAlive | This optional key is used to control whether your job is to be kept continuously running or to let
demand and conditions control the invocation
|
| options/nixos/services.libretranslate.enableApiKeys | Whether to enable the API keys database.
|
| options/nixos/services.prometheus.exporters.ecoflow.ecoflowEmailFile | Path to the file with your personal ecoflow app login email address
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.metadata | Metadata keys that should be synchronized when vdirsyncer
metasync is executed.
|
| options/nixos/services.sssd.sshAuthorizedKeysIntegration | Whether to make sshd look up authorized keys from SSS
|
| options/nixos/services.livekit.ingress.settings.rtc_config.use_external_ip | When set to true, attempts to discover the host's public IP via STUN
|
| options/nixos/services.prometheus.exporters.ecoflow.ecoflowSecretKeyFile | Path to the file with your personal api secret string from the Ecoflow development website https://developer-eu.ecoflow.com
|
| options/nixos/services.prometheus.exporters.ecoflow.ecoflowAccessKeyFile | Path to the file with your personal api access string from the Ecoflow development website https://developer-eu.ecoflow.com
|
| options/nixos/services.prometheus.exporters.pve.configFile | Path to the service's config file
|
| options/nixos/security.pam.sshAgentAuth.authorizedKeysFiles | A list of paths to files in OpenSSH's authorized_keys format, containing
the keys that will be trusted by the pam_ssh_agent_auth module
|
| options/nixos/boot.zfs.requestEncryptionCredentials | If true on import encryption keys or passwords for all encrypted datasets
are requested
|
| options/nixos/boot.loader.systemd-boot.sortKey | The sort key used for the NixOS bootloader entries
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.metadata | Metadata keys that should be synchronized when vdirsyncer
metasync is executed.
|
| options/home-manager/programs.thunderbird.profiles.<name>.withExternalGnupg | Allow using external GPG keys with GPGME.
|
| options/nixos/services.tailscale.serve.services.<name>.endpoints | Map of incoming traffic patterns to local targets
|
| options/nixos/services.prometheus.alertmanager-ntfy.settings.ntfy.notification.topic | Note: when using ntfy.sh and other public instances
it is recommended to set this option to an empty string and set the actual topic via
services.prometheus.alertmanager-ntfy.extraConfigFiles since
the topic in ntfy.sh is essentially a password
|
| options/nixos/services.guix.substituters.authorizedKeys | A list of signing keys for each substitute server to be authorized as
a source of substitutes
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.presharedKeyFile | File pointing to preshared key as generated by wg genpsk
|
| options/nixos/services.prometheus.exporters.ecoflow.ecoflowPasswordFile | Path to the file with your personal ecoflow app login email password
|
| options/home-manager/launchd.agents.<name>.config.Sockets | This optional key is used to specify launch on demand sockets that can be used to let launchd know when
to run the job
|
| options/nixos/services.taskserver.organisations | An attribute set where the keys name the organisation and the values
are a set of lists of users and
groups.
|
| options/darwin/launchd.agents.<name>.serviceConfig.KeepAlive | This optional key is used to control whether your job is to be kept continuously running or to let
demand and conditions control the invocation
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.KeepAlive | This optional key is used to control whether your job is to be kept continuously running or to let
demand and conditions control the invocation
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.presharedKey | Base64 preshared key generated by wg genpsk
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.enableLocalhostRedirects | Allow localhost redirects
|
| options/nixos/services.discourse.siteSettings | Discourse site settings
|
| options/darwin/launchd.daemons.<name>.serviceConfig.KeepAlive | This optional key is used to control whether your job is to be kept continuously running or to let
demand and conditions control the invocation
|
| options/nixos/security.agnos.settings.accounts.*.private_key_path | Path of the PEM-encoded private key for this account
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.allowInsecureClientDisablePkce | Disable PKCE on this oauth2 resource server to work around insecure clients
that may not support it
|
| options/nixos/services.nextcloud.config.objectstore.s3.sseCKeyFile | If provided this is the full path to a file that contains the key
to enable [server-side encryption with customer-provided keys][1]
(SSE-C)
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.availability | The availability of the endpoint to connect to
|
| options/nixos/services.prometheus.exporters.ecoflow.ecoflowDevicesFile | File must contain one line, example: R3300000,R3400000,NC430000,...
|
| options/home-manager/targets.darwin.defaults."com.googlecode.iterm2".AlternateMouseScroll | Whether to enable arrow keys when scrolling in alternate screen mode.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.auth | Authentication to perform locally.
- The default
pubkey uses public key authentication
using a private key associated to a usable certificate.
psk uses pre-shared key authentication.
- The IKEv1 specific
xauth is used for XAuth or Hybrid
authentication,
- while the IKEv2 specific
eap keyword defines EAP
authentication.
- For
xauth, a specific backend name may be appended,
separated by a dash
|
| options/nixos/services.prometheus.exporters.collectd.collectdBinary.authFile | File mapping user names to pre-shared keys (passwords).
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets | This optional key is used to specify launch on demand sockets that can be used to let launchd know when
to run the job
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets | This optional key is used to specify launch on demand sockets that can be used to let launchd know when
to run the job
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.presharedKeyFile | File pointing to preshared key as generated by wg genpsk
|
| options/nixos/services.prometheus.exporters.pve.environmentFile | Path to the service's environment file
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets | This optional key is used to specify launch on demand sockets that can be used to let launchd know when
to run the job
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.presharedKey | Base64 preshared key generated by wg genpsk
|
| options/nixos/virtualisation.fileSystems.<name>.depends | List of paths that should be mounted before this one
|
| options/nixos/services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.port | The port to scrape metrics from
|
| options/nixos/services.prometheus.scrapeConfigs.*.gce_sd_configs.*.port | The port to scrape metrics from
|
| options/nixos/services.arsenik.long_hold_timeout | Slightly higher value for typing keys, to prevent unexpected hold effect.
|
| options/nixos/services.prometheus.exporters.ecoflow.ecoflowDevicesPrettyNamesFile | File must contain one line, example: {"R3300000":"Delta 2","R3400000":"Delta Pro",...}
The key/value map of custom names for your devices
|
| options/nixos/users.users.<name>.password | Specifies the (clear text) password for the user
|
| options/nixos/services.postgresql.systemCallFilter | Configures the syscall filter for postgresql.service
|
| options/nixos/services.postfix.settings.main.smtpd_tls_chain_files | List of paths to the server private keys and certificates.
The order of items matters and a private key must always be followed by the corresponding certificate.
https://www.postfix.org/postconf.5.html#smtpd_tls_chain_files
|
| options/nixos/users.extraUsers.<name>.password | Specifies the (clear text) password for the user
|
| options/nixos/services.stash.settings.dangerous_allow_public_without_auth | Learn more at https://docs.stashapp.cc/networking/authentication-required-when-accessing-stash-from-the-internet/
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.pk | If this attribute is given, SAE-PK will be enabled for this connection
|
| options/nixos/services.prometheus.exporters.idrac.configurationPath | Path to the service's config file
|
| options/nixos/services.prometheus.scrapeConfigs.*.azure_sd_configs.*.port | The port to scrape metrics from
|
| options/nixos/services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.role_arn | AWS Role ARN, an alternative to using AWS API keys.
|
| options/nixos/services.akkoma.config.":web_push_encryption" | Web Push Notifications configuration
|
| options/nixos/services.wgautomesh.settings.upnp_forward_external_port | Public port number to try to redirect to this machine's Wireguard
daemon using UPnP IGD.
|
| options/nixos/services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.port | The port to scrape metrics from
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.port | The port to scrape metrics from
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.pairwiseCiphers | Set of accepted cipher suites (encryption algorithms) for pairwise keys (unicast packets)
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.auth | Authentication to expect from remote
|
| options/nixos/services.stash.settings.security_tripwire_accessed_from_public_internet | Learn more at https://docs.stashapp.cc/networking/authentication-required-when-accessing-stash-from-the-internet/
|
| options/nixos/services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.role_arn | AWS Role ARN, an alternative to using AWS API keys.
|
| options/nixos/services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.access_key | The AWS API keys
|
| options/nixos/services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.secret_key | The AWS API keys
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.esp_proposals | ESP proposals to offer for the CHILD_SA
|
| packages/nixpkgs/ssh-tpm-agent | SSH agent with support for TPM sealed keys for public key authentication |
| packages/nixpkgs/ssh-copy-id | Tool to copy SSH public keys to a remote machine |
| packages/nixpkgs/bzrtp | Opensource implementation of ZRTP keys exchange protocol |
| packages/nixpkgs/xcape | Utility to configure modifier keys to act as other keys |
| packages/nixpkgs/ssh-to-age | Convert ssh private keys in ed25519 format to age keys |
| packages/nixpkgs/kssd | K-mer substring space decomposition |
| packages/nixpkgs/cask-server | Public server and API to interface with Cask features |
| packages/nixpkgs/repseek | Tool to retrieve approximate repeats from large DNA sequences |
| packages/nixpkgs/tut | TUI for Mastodon with vim inspired keys |
| packages/nixpkgs/i2pd-tools | Toolsuite to work with keys and eepsites |
| packages/nixpkgs/libsForQt5.ktrip | Public transport trip planner |
| packages/nixpkgs/b4 | Helper utility to work with patches made available via a public-inbox archive |
| packages/nixpkgs/key-rack | View and edit your apps’ keys |
| packages/nixpkgs/hpe-ltfs | HPE's implementation of the open-source tape filesystem standard ltfs |
| packages/nixpkgs/rana | Nostr public key mining tool |
| packages/nixpkgs/gandi-cli | Command-line interface to the public Gandi.net API |
| packages/nixpkgs/gokapi | Lightweight selfhosted Firefox Send alternative without public upload |
| packages/nixpkgs/melt | Backup and restore Ed25519 SSH keys with seed words |
| packages/nixpkgs/tgpt | ChatGPT in terminal without needing API keys |
| packages/nixpkgs/age | Modern encryption tool with small explicit keys |
| packages/nixpkgs/ssh-to-pgp | Convert ssh private keys to PGP |
| packages/nixpkgs/scion-apps | Public repository for SCION applications |
| packages/nixpkgs/flywheel-cli | Library and command line interface for interacting with a Flywheel site |
| packages/nixpkgs/pkarr | Public Key Addressable Resource Records (sovereign TLDs) |
| packages/nixpkgs/sigsum | System for public and transparent logging of signed checksums |
| packages/nixpkgs/libsv | Public domain cross-platform semantic versioning in C99 |
| packages/nixpkgs/rdedup | Data deduplication with compression and public key encryption |
| packages/nixpkgs/tzpfms | TPM-based encryption keys for ZFS datasets. |
| packages/nixpkgs/l2md | Convert public-inbox archives to maildir messages |
| packages/nixpkgs/libsForQt5.mauiman | Maui Manager Library |
| packages/nixpkgs/gnome-user-share | Service that exports the contents of the Public folder in your home directory on the local network |
| packages/nixpkgs/cosign | Container Signing CLI with support for ephemeral keys and Sigstore signing |
| packages/nixpkgs/mokutil | Utility to manipulate machines owner keys |
| packages/nixpkgs/checkip | CLI tool that checks an IP address using various public services |
| packages/nixpkgs/gitxray | Tool which leverages Public GitHub REST APIs for various tasks |
| packages/nixpkgs/bc-decaf | Elliptic curve library supporting Ed448-Goldilocks and Curve25519 |
| packages/nixpkgs/rage | Simple, secure and modern encryption tool with small explicit keys, no config options, and UNIX-style composability |
| packages/nixpkgs/pam_gnupg | Unlock GnuPG keys on login |
| packages/nixpkgs/ssh-vault | Encrypt/decrypt using SSH keys |
| packages/nixpkgs/asahi-btsync | Tool to sync Bluetooth pairing keys with macos on ARM Macs |
| packages/nixpkgs/secretive | Store SSH keys in the Secure Enclave |
| packages/nixpkgs/televido | Viewer for German-language public broadcasting live streams and archives |
| packages/nixpkgs/redis-dump-go | Dump Redis keys to a file in RESP format using multiple connections |
| packages/nixpkgs/solo2-cli | CLI tool for managing SoloKeys' Solo2 USB security keys |
| packages/nixpkgs/xca | X509 certificate generation tool, handling RSA, DSA and EC keys, certificate signing requests (PKCS#10) and CRLs |
| packages/nixpkgs/pius | PGP Individual UID Signer (PIUS), quickly and easily sign UIDs on a set of PGP keys |
| packages/nixpkgs/ssh-import-id | Retrieves an SSH public key and installs it locally |
| packages/nixpkgs/step-kms-plugin | Step plugin to manage keys and certificates on cloud KMSs and HSMs |
| packages/nixpkgs/amber-secret | Manage secret values in-repo via public key cryptography |
| packages/nixpkgs/bctoolbox | Utilities library for Linphone |
| packages/nixpkgs/all-the-package-names | List of all the public package names on npm |
| packages/nixpkgs/age-plugin-sss | Age plugin to split keys and wrap them with different recipients using Shamir's Secret Sharing |
| packages/nixpkgs/e-imzo-manager | GTK application for managing E-IMZO keys |
| packages/nixpkgs/seahorse | Application for managing encryption keys and passwords in the GnomeKeyring |
| packages/nixpkgs/stb | Single-file public domain libraries for C/C++ |
| packages/nixpkgs/gen-oath-safe | Script for generating HOTP/TOTP keys (and QR code) |
| packages/nixpkgs/github-to-sops | Tool for managing infrastructure secrets in git repositories using SOPS and GitHub SSH keys |
| packages/nixpkgs/fileshare | Small HTTP Server for quickly sharing files over the network |
| packages/nixpkgs/tunnelto | Expose your local web server to the internet with a public URL |
| packages/nixpkgs/mdns | Public domain mDNS/DNS-SD library in C |
| packages/nixpkgs/vid-stab | Video stabilization library |
| packages/nixpkgs/openpgp-ca | Tool for managing OpenPGP keys within organizations |
| packages/nixpkgs/belr | Belledonne Communications' language recognition library |
| packages/nixpkgs/libnspsl | NetSurf Public Suffix List - Handling library |
| packages/nixpkgs/oksh | Portable OpenBSD ksh, based on the Public Domain Korn Shell (pdksh) |
| packages/nixpkgs/asc-key-to-qr-code-gif | Convert ASCII-armored PGP keys to animated QR code |
| packages/nixpkgs/enumerepo | Tool to list all public repositories for (valid) GitHub usernames |
| packages/nixpkgs/avbroot | Sign (and root) Android A/B OTAs with custom keys while preserving Android Verified Boot |
| packages/nixpkgs/flatito | Grep for keys in YAML and JSON files |
| packages/nixpkgs/mobroute | General purpose public transportation router based on GTFS |
| packages/nixpkgs/transito | Data-provider-agnostic (GTFS) public transportation app |
| packages/nixpkgs/certinfo-go | Tool to analyze and troubleshoot x.509 & ssh certificates, encoded keys |
| packages/nixpkgs/gnome-keyring | Collection of components in GNOME that store secrets, passwords, keys, certificates and make them available to applications |
| packages/nixpkgs/aeskeyfind | Locates 128-bit and 256-bit AES keys in a captured memory image |
| packages/nixpkgs/global-platform-pro | Command-line utility for managing applets and keys on Java Cards |
| packages/nixpkgs/linalg | Single-header, public domain, short vector math library for C++ |
| packages/nixpkgs/screenkey | Screencast tool to display your keys inspired by Screenflick |
| packages/nixpkgs/goudy-bookletter-1911 | Public domain font based on Frederic Goudy’s Kennerley Oldstyle |
| packages/nixpkgs/xfce4-volumed-pulse | Volume keys control daemon for Xfce using pulseaudio |
| packages/nixpkgs/belle-sip | Modern library implementing SIP (RFC 3261) transport, transaction and dialog layers |
| packages/nixpkgs/cacert | Bundle of X.509 certificates of public Certificate Authorities (CA) |
| packages/nixpkgs/exploitdb | Archive of public exploits and corresponding vulnerable software |
| packages/nixpkgs/wxsqlite3 | C++ wrapper around the public domain SQLite 3.x for wxWidgets |
| packages/nixpkgs/keychain | Manage SSH and GPG keys in a convenient and secure manner |
| packages/nixpkgs/pdpmake | Public domain POSIX make |
| packages/nixpkgs/sshd-openpgp-auth | Command-line tool for creating and managing OpenPGP based trust anchors for SSH host keys |
| packages/nixpkgs/belcard | C++ library to manipulate VCard standard format |
| packages/nixpkgs/bc-soci | Database access library for C++ |
| packages/nixpkgs/bcunit | Belledonne Communications' fork of CUnit test framework |
| packages/nixpkgs/age-plugin-1p | Use SSH keys from 1Password with age |
| packages/nixpkgs/eigenlayer | Utility that manages core operator functionalities like local keys, operator registration and updates |
| packages/nixpkgs/volume_key | Library for manipulating storage volume encryption keys and storing them separately from volumes to handle forgotten passphrases, and the associated command-line tool |
| packages/nixpkgs/ripsecrets | Command-line tool to prevent committing secret keys into your source code |
| packages/nixpkgs/theharvester | Gather E-mails, subdomains and names from different public sources |
| packages/nixpkgs/nebula-lighthouse-service | Public Nebula VPN Lighthouse Service |
| packages/nixpkgs/showmethekey | Show keys you typed on screen |
| packages/nixpkgs/msoffcrypto-tool | Python tool and library for decrypting MS Office files with passwords or other keys |
| packages/nixpkgs/passdetective | Scans command history to detect mistakenly written passwords, API keys, and secrets |
| packages/nixpkgs/python313Packages.asn1crypto | Fast ASN.1 parser and serializer with definitions for private keys, public keys, certificates, CRL, OCSP, CMS, PKCS#3, PKCS#7, PKCS#8, PKCS#12, PKCS#5, X.509 and TSP |
| packages/nixpkgs/python314Packages.asn1crypto | Fast ASN.1 parser and serializer with definitions for private keys, public keys, certificates, CRL, OCSP, CMS, PKCS#3, PKCS#7, PKCS#8, PKCS#12, PKCS#5, X.509 and TSP |
| packages/nixpkgs/python312Packages.asn1crypto | Fast ASN.1 parser and serializer with definitions for private keys, public keys, certificates, CRL, OCSP, CMS, PKCS#3, PKCS#7, PKCS#8, PKCS#12, PKCS#5, X.509 and TSP |
| packages/nixpkgs/linphonePackages.bzrtp | Opensource implementation of ZRTP keys exchange protocol |
| packages/nixpkgs/haskellPackages.crypto-pubkey-types | Generic cryptography Public keys algorithm types |
| packages/nixpkgs/python313Packages.dbt-protos | dbt public protos |
| packages/nixpkgs/python314Packages.dbt-protos | dbt public protos |
| packages/nixpkgs/python312Packages.dbt-protos | dbt public protos |
| packages/nixpkgs/kdePackages.ktrip | Public Transport Assistance for Mobile Devices |
| packages/nixpkgs/luajitPackages.psl | Bindings to libpsl, a C library that handles the Public Suffix List (PSL) |
| packages/nixpkgs/typstPackages.gibz-script | Template and components (tasks, hints, supplementary, code box) with DE/EN i18n and a clean flat API to be used at GIBZ for creating teaching materials |
| packages/nixpkgs/luaPackages.psl | Bindings to libpsl, a C library that handles the Public Suffix List (PSL) |
| packages/nixpkgs/lua55Packages.psl | Bindings to libpsl, a C library that handles the Public Suffix List (PSL) |
| packages/nixpkgs/lua53Packages.psl | Bindings to libpsl, a C library that handles the Public Suffix List (PSL) |
| packages/nixpkgs/lua52Packages.psl | Bindings to libpsl, a C library that handles the Public Suffix List (PSL) |
| packages/nixpkgs/lua54Packages.psl | Bindings to libpsl, a C library that handles the Public Suffix List (PSL) |
| packages/nixpkgs/lua51Packages.psl | Bindings to libpsl, a C library that handles the Public Suffix List (PSL) |
| packages/nixpkgs/mate.mate-user-share | User level public file sharing for the MATE desktop |
| packages/nixpkgs/python313Packages.hko | Unofficial Python wrapper for the Hong Kong Observatory public API |
| packages/nixpkgs/python314Packages.hko | Unofficial Python wrapper for the Hong Kong Observatory public API |
| packages/nixpkgs/deepin.dtkcommon | Public project for building DTK Library |
| packages/nixpkgs/linphonePackages.bc-decaf | Elliptic curve library supporting Ed448-Goldilocks and Curve25519 |
| packages/nixpkgs/python313Packages.vtjp | Python wrapper and cli for Västtrafik public API |
| packages/nixpkgs/python314Packages.vtjp | Python wrapper and cli for Västtrafik public API |
| packages/nixpkgs/python313Packages.pygti | Access public transport information in Hamburg, Germany |
| packages/nixpkgs/python314Packages.pygti | Access public transport information in Hamburg, Germany |
| packages/nixpkgs/kdePackages.libkgapi | Library for accessing various Google services via their public API |
| packages/nixpkgs/python313Packages.namex | Simple utility to separate the implementation of your Python package and its public API surface |
| packages/nixpkgs/python314Packages.namex | Simple utility to separate the implementation of your Python package and its public API surface |
| packages/nixpkgs/ocamlPackages.mirage-crypto-pk | Simple public-key cryptography for the modern age |
| packages/nixpkgs/python312Packages.hko | Unofficial Python wrapper for the Hong Kong Observatory public API |
| packages/nixpkgs/xfce.xfce4-volumed-pulse | Volume keys control daemon for Xfce using pulseaudio |
| packages/nixpkgs/python313Packages.pyhibp | Python interface to Troy Hunt's 'Have I Been Pwned?' public API |
| packages/nixpkgs/python314Packages.pyhibp | Python interface to Troy Hunt's 'Have I Been Pwned?' public API |
| packages/nixpkgs/python312Packages.vtjp | Python wrapper and cli for Västtrafik public API |
| packages/nixpkgs/python312Packages.pygti | Access public transport information in Hamburg, Germany |
| packages/nixpkgs/python313Packages.ed25519 | Ed25519 public-key signatures |
| packages/nixpkgs/python314Packages.ed25519 | Ed25519 public-key signatures |
| packages/nixpkgs/python312Packages.namex | Simple utility to separate the implementation of your Python package and its public API surface |
| packages/nixpkgs/ocamlPackages_latest.mirage-crypto-pk | Simple public-key cryptography for the modern age |
| packages/nixpkgs/netsurf.libnspsl | NetSurf Public Suffix List - Handling library |
| packages/nixpkgs/python313Packages.edge-tts | Microsoft Edge text-to-speech service WITHOUT Edge, Windows and API keys |
| packages/nixpkgs/python314Packages.edge-tts | Microsoft Edge text-to-speech service WITHOUT Edge, Windows and API keys |
| packages/nixpkgs/typstPackages.gibz-script_0_1_0 | Template and components (tasks, hints, supplementary, code box) with DE/EN i18n and a clean flat API to be used at GIBZ for creating teaching materials |
| packages/nixpkgs/haskellPackages.hpke | Hybrid Public Key Encryption |
| packages/nixpkgs/haskellPackages.pvss | Public Verifiable Secret Sharing |
| packages/nixpkgs/python313Packages.uasiren | Implements siren.pp.ua API - public wrapper for api.ukrainealarm.com API that returns info about Ukraine air-raid alarms |
| packages/nixpkgs/python314Packages.uasiren | Implements siren.pp.ua API - public wrapper for api.ukrainealarm.com API that returns info about Ukraine air-raid alarms |
| packages/nixpkgs/python312Packages.pyhibp | Python interface to Troy Hunt's 'Have I Been Pwned?' public API |
| packages/nixpkgs/python313Packages.dotty-dict | Dictionary wrapper for quick access to deeply nested keys |
| packages/nixpkgs/python314Packages.dotty-dict | Dictionary wrapper for quick access to deeply nested keys |
| packages/nixpkgs/python313Packages.bip-utils | Implementation of BIP39, BIP32, BIP44, BIP49 and BIP84 for wallet seeds, keys and addresses generation |
| packages/nixpkgs/python314Packages.bip-utils | Implementation of BIP39, BIP32, BIP44, BIP49 and BIP84 for wallet seeds, keys and addresses generation |
| packages/nixpkgs/haskellPackages.VKHS | Provides access to Vkontakte social network via public API |
| packages/nixpkgs/linphonePackages.bctoolbox | Utilities library for Linphone |
| packages/nixpkgs/python312Packages.ed25519 | Ed25519 public-key signatures |
| packages/nixpkgs/perlPackages.TieRefHash | Use references as hash keys |
| packages/nixpkgs/linphonePackages.lime | End-to-end encryption library for instant messaging |
| packages/nixpkgs/perlPackages.AltCryptRSABigInt | RSA public-key cryptosystem, using Math::BigInt |
| packages/nixpkgs/python312Packages.edge-tts | Microsoft Edge text-to-speech service WITHOUT Edge, Windows and API keys |
| packages/nixpkgs/python313Packages.preshed | Cython hash tables that assume keys are pre-hashed |
| packages/nixpkgs/python314Packages.preshed | Cython hash tables that assume keys are pre-hashed |
| packages/nixpkgs/linphonePackages.ortp | Real-Time Transport Protocol (RFC3550) stack |
| packages/nixpkgs/linphonePackages.bc-soci | Database access library for C++ |
| packages/nixpkgs/perl5Packages.AltCryptRSABigInt | RSA public-key cryptosystem, using Math::BigInt |
| packages/nixpkgs/perl5Packages.TieRefHash | Use references as hash keys |
| packages/nixpkgs/python312Packages.uasiren | Implements siren.pp.ua API - public wrapper for api.ukrainealarm.com API that returns info about Ukraine air-raid alarms |
| packages/nixpkgs/gnomeExtensions.ip-finder | Displays useful information about your public IP Address and VPN status. |
| packages/nixpkgs/linphonePackages.belr | Belledonne Communications' language recognition library (a SIP parsing library) |
| packages/nixpkgs/python313Packages.pyhumps | Module to convert strings (and dictionary keys) between snake case, camel case and pascal case |
| packages/nixpkgs/python314Packages.pyhumps | Module to convert strings (and dictionary keys) between snake case, camel case and pascal case |
| packages/nixpkgs/akkuPackages.chibi-crypto-rsa | RSA public key cryptography implementation |
| packages/nixpkgs/python312Packages.dotty-dict | Dictionary wrapper for quick access to deeply nested keys |
| packages/nixpkgs/python313Packages.iamdata | Module for utilizing AWS IAM data for Services, Actions, Resources, and Condition Keys |
| packages/nixpkgs/python314Packages.iamdata | Module for utilizing AWS IAM data for Services, Actions, Resources, and Condition Keys |
| packages/nixpkgs/python312Packages.bip-utils | Implementation of BIP39, BIP32, BIP44, BIP49 and BIP84 for wallet seeds, keys and addresses generation |
| packages/nixpkgs/python313Packages.eth-keyfile | Tools for handling the encrypted keyfile format used to store private keys |
| packages/nixpkgs/python314Packages.eth-keyfile | Tools for handling the encrypted keyfile format used to store private keys |
| packages/nixpkgs/haskellPackages.knit | Ties the knot on data structures that reference each other by unique keys |
| packages/nixpkgs/linphonePackages.bc-ispell | Interactive spelling checker |
| packages/nixpkgs/linphonePackages.bcunit | Fork of the defunct project CUnit, a unit testing framework |
| packages/nixpkgs/texlivePackages.tipfr | Produces calculator's keys with the help of TikZ |
| packages/nixpkgs/texlivePackages.xcite | Use citation keys from a different document |
| packages/nixpkgs/linphonePackages.msopenh264 | H.264 encoder/decoder plugin for mediastreamer2 |
| packages/nixpkgs/gnomeExtensions.mypubip | A simple extension that let the user to view and copy the public IPv4 and IPv6 address, by using ipify.org services. |
| packages/nixpkgs/linphonePackages.belle-sip | Modern library implementing SIP (RFC 3261) transport, transaction and dialog layers |
| packages/nixpkgs/haskellPackages.tie-knot | "Ties the knot" on a given set of structures that reference each other by keys |
| packages/nixpkgs/python313Packages.flatdict | Python module for interacting with nested dicts as a single level dict with delimited keys |
| packages/nixpkgs/python314Packages.flatdict | Python module for interacting with nested dicts as a single level dict with delimited keys |
| packages/nixpkgs/python313Packages.ed25519-blake2b | Ed25519 public-key signatures (BLAKE2b fork) |
| packages/nixpkgs/python314Packages.ed25519-blake2b | Ed25519 public-key signatures (BLAKE2b fork) |
| packages/nixpkgs/python312Packages.preshed | Cython hash tables that assume keys are pre-hashed |
| packages/nixpkgs/perl538Packages.AltCryptRSABigInt | RSA public-key cryptosystem, using Math::BigInt |
| packages/nixpkgs/perl540Packages.AltCryptRSABigInt | RSA public-key cryptosystem, using Math::BigInt |
| packages/nixpkgs/perlPackages.TieRegexpHash | Use regular expressions as hash keys |
| packages/nixpkgs/perl540Packages.TieRefHash | Use references as hash keys |
| packages/nixpkgs/perl538Packages.TieRefHash | Use references as hash keys |
| packages/nixpkgs/haskellPackages.hackage-diff | Compare the public API of different versions of a Hackage library |
| packages/nixpkgs/python312Packages.pyhumps | Module to convert strings (and dictionary keys) between snake case, camel case and pascal case |
| packages/nixpkgs/haskellPackages.crypto-pubkey | Public Key cryptography |
| packages/nixpkgs/haskellPackages.holidays | Library for country public holidays |
| packages/nixpkgs/haskellPackages.zcache | Zobrist keys for game state tracking |
| packages/nixpkgs/python313Packages.sensoterra | Query Sensoterra probes using the Customer API |
| packages/nixpkgs/python314Packages.sensoterra | Query Sensoterra probes using the Customer API |
| packages/nixpkgs/vimPlugins.jsonfly-nvim | Search blazingly fast for JSON / XML / YAML keys via Telescope |
| packages/nixpkgs/linphonePackages.bc-mbedtls | Portable cryptographic and TLS library, formerly known as PolarSSL (Linphone fork) |
| packages/nixpkgs/python312Packages.iamdata | Module for utilizing AWS IAM data for Services, Actions, Resources, and Condition Keys |
| packages/nixpkgs/perl5Packages.TieRegexpHash | Use regular expressions as hash keys |
| packages/nixpkgs/haskellPackages.data-store | Type safe, in-memory dictionary with multidimensional keys |
| packages/nixpkgs/haskellPackages.tables | In-memory storage with multiple keys using lenses and traversals |
| packages/nixpkgs/python313Packages.sensorpush-api | SensorPush Public API for Python |
| packages/nixpkgs/python314Packages.sensorpush-api | SensorPush Public API for Python |
| packages/nixpkgs/python312Packages.eth-keyfile | Tools for handling the encrypted keyfile format used to store private keys |
| packages/nixpkgs/linphonePackages.belcard | C++ library to manipulate VCard standard format |
| packages/nixpkgs/haskellPackages.list-tries | Tries and Patricia tries: finite sets and maps for list keys |
| packages/nixpkgs/python313Packages.lunatone-rest-api-client | Client library for accessing the Lunatone REST API |
| packages/nixpkgs/python314Packages.lunatone-rest-api-client | Client library for accessing the Lunatone REST API |
| packages/nixpkgs/python312Packages.ed25519-blake2b | Ed25519 public-key signatures (BLAKE2b fork) |
| packages/nixpkgs/texlivePackages.esindex | Generate sorting keys for indexes |
| packages/nixpkgs/gnomeExtensions.custom-osd | Fully customize your OSD ( On Screen Display ) pop ups like Volume , Brightness or Caffeine , Lock Keys etc. |
| packages/nixpkgs/linphonePackages.liblinphone | Library for SIP calls and instant messaging |
| packages/nixpkgs/python312Packages.flatdict | Python module for interacting with nested dicts as a single level dict with delimited keys |
| packages/nixpkgs/texlivePackages.graph35 | Draw keys and screen items of several Casio calculators |
| packages/nixpkgs/haskellPackages.commsec | Provide communications security using symmetric ephemeral keys |
| packages/nixpkgs/haskellPackages.keycode | Maps web browser keycodes to their corresponding keyboard keys |
| packages/nixpkgs/gnomeExtensions.ping-bot | Monitor your important websites at a glance |
| packages/nixpkgs/haskellPackages.crypto-totp | Provides generation and verification services for time-based one-time keys |
| packages/nixpkgs/python312Packages.sensoterra | Query Sensoterra probes using the Customer API |
| packages/nixpkgs/python313Packages.binance-connector | Simple connector to Binance Public API |
| packages/nixpkgs/python314Packages.binance-connector | Simple connector to Binance Public API |
| packages/nixpkgs/python312Packages.sensorpush-api | SensorPush Public API for Python |
| packages/nixpkgs/haskellPackages.typerep-map | Efficient implementation of a dependent map with types as keys |
| packages/nixpkgs/perlPackages.DirManifest | Treat a directory and a manifest file as a hash/dictionary of keys to texts or blobs |
| packages/nixpkgs/perl540Packages.TieRegexpHash | Use regular expressions as hash keys |
| packages/nixpkgs/perl538Packages.TieRegexpHash | Use regular expressions as hash keys |
| packages/nixpkgs/python313Packages.py-nextbusnext | Minimalistic Python client for the NextBus public API |
| packages/nixpkgs/python314Packages.py-nextbusnext | Minimalistic Python client for the NextBus public API |
| packages/nixpkgs/haskellPackages.generic-trie | A map, where the keys may be complex structured data |
| packages/nixpkgs/python312Packages.lunatone-rest-api-client | Client library for accessing the Lunatone REST API |
| packages/nixpkgs/haskellPackages.bytetrie | Tries with Bytes as keys |
| packages/nixpkgs/texlivePackages.dichokey | Construct dichotomous identification keys |
| packages/nixpkgs/perl5Packages.DirManifest | Treat a directory and a manifest file as a hash/dictionary of keys to texts or blobs |
| packages/nixpkgs/vimPlugins.demicolon-nvim | Overloaded ; and , keys in Neovim |
| packages/nixpkgs/texlivePackages.identkey | Typesetting bracketed dichotomous identification keys |
| packages/nixpkgs/idrisPackages.patricia | Immutable map from integer keys to values based on patricia tree |
| packages/nixpkgs/haskellPackages.bank-holiday-germany | German bank holidays and public holidays |
| packages/nixpkgs/haskellPackages.config-parser | Parse config files using parsec and generate parse errors on unhandled keys |
| packages/nixpkgs/python312Packages.binance-connector | Simple connector to Binance Public API |
| packages/nixpkgs/python312Packages.py-nextbusnext | Minimalistic Python client for the NextBus public API |
| packages/nixpkgs/haskellPackages.xinput-conduit | Conduit of keys pressed by xinput |
| packages/nixpkgs/haskellPackages.xmonad-spotify | Bind media keys to work with Spotify |
| packages/nixpkgs/texlivePackages.edichokey | Typeset dichotomous identification keys |
| packages/nixpkgs/haskellPackages.data-map-multikey | Data |
| packages/nixpkgs/python313Packages.pymeteireann | Python module to communicate with the Met Éireann Public Weather Forecast API |
| packages/nixpkgs/python314Packages.pymeteireann | Python module to communicate with the Met Éireann Public Weather Forecast API |
| packages/nixpkgs/texlivePackages.ticollege | Graphical representation of keys on a standard scientific calculator |
| packages/nixpkgs/perl540Packages.DirManifest | Treat a directory and a manifest file as a hash/dictionary of keys to texts or blobs |
| packages/nixpkgs/perl538Packages.DirManifest | Treat a directory and a manifest file as a hash/dictionary of keys to texts or blobs |
| packages/nixpkgs/gnomeExtensions.ip-address-extension | Shows Current Public IP Address of the system uses ipify API |
| packages/nixpkgs/gnomeExtensions.smart-tiling | This GNOME extension brings Windows 10–style window tiling to your desktop |
| packages/nixpkgs/haskellPackages.battleplace-api | Public API definitions of BattlePlace.io service |
| packages/nixpkgs/haskellPackages.rest-stringmap | Maps with stringy keys that can be transcoded to JSON and XML |
| packages/nixpkgs/haskellPackages.amazonka-finspace-data | Amazon FinSpace Public API SDK |
| packages/nixpkgs/python312Packages.pymeteireann | Python module to communicate with the Met Éireann Public Weather Forecast API |
| packages/nixpkgs/texlivePackages.bracketkey | Produce bracketed identification keys |
| packages/nixpkgs/python313Packages.msoffcrypto-tool | Python tool and library for decrypting MS Office files with passwords or other keys |
| packages/nixpkgs/python314Packages.msoffcrypto-tool | Python tool and library for decrypting MS Office files with passwords or other keys |
| packages/nixpkgs/haskellPackages.enummapset | IntMap and IntSet with Enum keys/elements |
| packages/nixpkgs/haskellPackages.enummapmap | Map of maps using Enum types as keys |
| packages/nixpkgs/haskellPackages.polysemy-keyed-state | Effect for a set of stateful values indexed by a type of keys |
| packages/nixpkgs/haskellPackages.crypto-pubkey-openssh | OpenSSH keys decoder/encoder |
| packages/nixpkgs/haskellPackages.private-hackage-uploader | Upload a package to the public or private hackage, building its docs |
| packages/nixpkgs/haskellPackages.byte-containers | Sets and maps with 8-bit words for keys |
| packages/nixpkgs/python312Packages.msoffcrypto-tool | Python tool and library for decrypting MS Office files with passwords or other keys |
| packages/nixpkgs/linphonePackages.mediastreamer2 | Powerful and lightweight streaming engine specialized for voice/video telephony applications |
| packages/nixpkgs/haskellPackages.multihashmap | hashmap from keys to hashsets |
| packages/nixpkgs/haskellPackages.bank-holiday-germany_2_1_0_0 | German bank holidays and public holidays |
| packages/nixpkgs/gnomeExtensions.keyboard-modifiers-status | Shows keyboard modifiers status |
| packages/nixpkgs/mpvScripts.eisa01.simplebookmark | Simple bookmarks script based on assigning keys |
| packages/nixpkgs/gnomeExtensions.wintile-windows-10-window-tiling-for-gnome | WinTile is a hotkey driven window tiling system for GNOME that imitates the standard Win-Arrow keys of Windows 10, allowing you to maximize, maximize to sides, or 1/4 sized to corner across a single or multiple monitors using just Super+Arrow. |
| packages/nixpkgs/perlPackages.PerlCriticPolicyVariablesProhibitLoopOnHash | Don't write loops on hashes, only on keys and values of hashes |
| packages/nixpkgs/perl5Packages.PerlCriticPolicyVariablesProhibitLoopOnHash | Don't write loops on hashes, only on keys and values of hashes |
| packages/nixpkgs/perl540Packages.PerlCriticPolicyVariablesProhibitLoopOnHash | Don't write loops on hashes, only on keys and values of hashes |
| packages/nixpkgs/perl538Packages.PerlCriticPolicyVariablesProhibitLoopOnHash | Don't write loops on hashes, only on keys and values of hashes |
| packages/nixpkgs/python313Packages.yamlordereddictloader | YAML loader and dump for PyYAML allowing to keep keys order |
| packages/nixpkgs/python314Packages.yamlordereddictloader | YAML loader and dump for PyYAML allowing to keep keys order |
| packages/nixpkgs/python312Packages.yamlordereddictloader | YAML loader and dump for PyYAML allowing to keep keys order |
| packages/nixpkgs/nkeys | Public-key signature system for NATS |
| packages/nixpkgs/badkeys | Tool to find common vulnerabilities in cryptographic public keys |
| packages/nixpkgs/rPackages.keys | |
| packages/nixpkgs/sbclPackages.cl-ssh-keys | |
| packages/nixpkgs/haskellPackages.keys | Keyed functors and containers |
| packages/nixpkgs/a-keys-path | Short puzzle-platformer game made with Godot, running on GLES 2.0 |
| packages/nixpkgs/emacsPackages.slow-keys | |
| packages/nixpkgs/emacsPackages.free-keys | |
| packages/nixpkgs/emacsPackages.xah-fly-keys | |
| packages/nixpkgs/python313Packages.eth-keys | Common API for Ethereum key operations |
| packages/nixpkgs/python314Packages.eth-keys | Common API for Ethereum key operations |
| packages/nixpkgs/python313Packages.sshpubkeys | OpenSSH Public Key Parser for Python |
| packages/nixpkgs/python314Packages.sshpubkeys | OpenSSH Public Key Parser for Python |
| packages/nixpkgs/emacsPackages.wakib-keys | |
| packages/nixpkgs/emacsPackages.evil-swap-keys | |
| packages/nixpkgs/python312Packages.sshpubkeys | OpenSSH Public Key Parser for Python |
| packages/nixpkgs/haskellPackages.emacs-keys | library to parse emacs style keybinding into the modifiers and the chars |
| packages/nixpkgs/python313Packages.mypy-boto3-ecr-public | Type annotations for boto3 ecr-public |
| packages/nixpkgs/python314Packages.mypy-boto3-ecr-public | Type annotations for boto3 ecr-public |
| packages/nixpkgs/cargo-public-api | List and diff the public API of Rust library crates between releases and commits |
| packages/nixpkgs/public-sans | Strong, neutral, principles-driven, open source typeface for text or display |
| packages/nixpkgs/python312Packages.eth-keys | Common API for Ethereum key operations |
| packages/nixpkgs/gnomeExtensions.otp-keys | Show and copy otp keys |
| packages/nixpkgs/haskellPackages.amazonka-ecr-public | Amazon Elastic Container Registry Public SDK |
| packages/nixpkgs/haskellPackages.bitcoin-keys | Bitcoin keys |
| packages/nixpkgs/python312Packages.mypy-boto3-ecr-public | Type annotations for boto3 ecr-public |
| packages/nixpkgs/gnomeExtensions.lock-keys | Visualize lock keys |
| packages/nixpkgs/haskellPackages.crypto-keys-ssh | Like crypto-pubkey-openssh but not dependent on any specific crypto library |
| packages/nixpkgs/gnomeExtensions.public-ip-address | Shows an public IPv4 and IPv6 address. |
| packages/nixpkgs/immich-public-proxy | Share your Immich photos and albums in a safe way without exposing your Immich instance to the public |
| packages/nixpkgs/haskellPackages.special-keys | Simple data types that help me here and there |
| packages/nixpkgs/public-inbox | |
| packages/nixpkgs/gnomeExtensions.show-current-public-ip | Simple GNOME Shell Extension that shows your current public IP address |
| packages/nixpkgs/emacsPackages.standard-keys-mode | |
| packages/nixpkgs/texlivePackages.epigraph-keys | Epigraphs using key values |
| packages/nixpkgs/haskellPackages.openssh-github-keys | Fetch OpenSSH keys from a GitHub team |
| packages/nixpkgs/python313Packages.azure-keyvault-keys | Microsoft Azure Key Vault Keys Client Library for Python |
| packages/nixpkgs/python314Packages.azure-keyvault-keys | Microsoft Azure Key Vault Keys Client Library for Python |
| packages/nixpkgs/sbclPackages.cl-xkeysym | |
| packages/nixpkgs/rubyPackages.cocoapods-keys | |
| packages/nixpkgs/python312Packages.azure-keyvault-keys | Microsoft Azure Key Vault Keys Client Library for Python |
| packages/nixpkgs/azure-sdk-for-cpp.security-keyvault-keys | Azure Key Vault Key client library for C++ |
| packages/nixpkgs/sbclPackages.cl-ssh-keys_dot_test | |
| packages/nixpkgs/interception-tools-plugins.dual-function-keys | Tap for one key, hold for another |
| packages/nixpkgs/python313Packages.types-aiobotocore-ecr-public | Type annotations for aiobotocore ecr-public |
| packages/nixpkgs/python314Packages.types-aiobotocore-ecr-public | Type annotations for aiobotocore ecr-public |
| packages/nixpkgs/sbclPackages.keystone | |
| packages/nixpkgs/python314Packages.atpublic | Python decorator and function which populates a module's __all__ and globals |
| packages/nixpkgs/python313Packages.atpublic | Python decorator and function which populates a module's __all__ and globals |
| packages/nixpkgs/haskellPackages.nkeys | Nkeys ed25519 encoding for use with NATS |
| packages/nixpkgs/python312Packages.types-aiobotocore-ecr-public | Type annotations for aiobotocore ecr-public |
| packages/nixpkgs/emacsPackages.keyset | |
| packages/nixpkgs/haskellPackages.mono-traversable-keys | Type-classes for interacting with monomorphic containers with a key |
| packages/nixpkgs/python312Packages.atpublic | Python decorator and function which populates a module's __all__ and globals |
| packages/nixpkgs/kdePackages.keysmith | OTP client for Plasma Mobile and Desktop |
| packages/nixpkgs/haskellPackages.osdkeys | Show keys pressed with an on-screen display (Linux only) |
| packages/nixpkgs/emacsPackages.minibuffer-modifier-keys | |
| packages/nixpkgs/vscode-extensions.smcpeak.default-keys-windows | VSCode extension that provides default Windows keybindings on any platform |
| packages/nixpkgs/emacsPackages.keyswap | |
| packages/nixpkgs/vimPlugins.showkeys | |
| packages/nixpkgs/logkeys | GNU/Linux keylogger that works |
| packages/nixpkgs/lxqt.lxqt-globalkeys | LXQt service for global keyboard shortcuts registration |
| packages/nixpkgs/texlivePackages.ltxkeys | A robust key parser for LaTeX |
| packages/nixpkgs/haskellPackages.keysafe | back up a secret key securely to the cloud |
| packages/nixpkgs/texlivePackages.luakeys | A Lua module for parsing key-value options |
| packages/nixpkgs/gnome-keysign | GTK/GNOME application to use GnuPG for signing other peoples’ keys |
| packages/nixpkgs/rPackages.ThreeWiseMonkeys | |
| packages/nixpkgs/texlivePackages.keystroke | Graphical representation of keys on keyboard |
| packages/nixpkgs/emacsPackages.keystore-mode | |
| packages/nixpkgs/rubyPackages.public_suffix | |
| packages/nixpkgs/haskellPackages.keystore | Managing stores of secret things |
| packages/nixpkgs/texlivePackages.menukeys | Format menu sequences, paths and keystrokes from lists |
| packages/nixpkgs/python313Packages.publicsuffix2 | Get a public suffix for a domain name using the Public Suffix List |
| packages/nixpkgs/python314Packages.publicsuffix2 | Get a public suffix for a domain name using the Public Suffix List |
| packages/nixpkgs/monkeysAudio | APE codec and decompressor |
| packages/nixpkgs/monkeys-audio | APE codec and decompressor |
| packages/nixpkgs/python312Packages.publicsuffix2 | Get a public suffix for a domain name using the Public Suffix List |
| packages/nixpkgs/xorg.xcbutilkeysyms | |
| packages/nixpkgs/haskellPackages.hyperpublic | A thin wrapper for the Hyperpublic API |
| packages/nixpkgs/typodermic-public-domain | Vintage Typodermic fonts |
| packages/nixpkgs/python312Packages.publicsuffix | Allows to get the public suffix of a domain name |
| packages/nixpkgs/python313Packages.publicsuffix | Allows to get the public suffix of a domain name |
| packages/nixpkgs/rubyPackages.keystone-engine | |
| packages/nixpkgs/hyprkeys | Simple, scriptable keybind retrieval utility for Hyprland |
| packages/nixpkgs/rPackages.public_ctn0094data | |
| packages/nixpkgs/libsForQt5.khotkeys | |
| packages/nixpkgs/texlivePackages.kvsetkeys | Key value parser with default handler support |
| packages/nixpkgs/ic-keysmith | Hierarchical Deterministic Key Derivation for the Internet Computer |
| packages/nixpkgs/keyscope | Key and secret workflow (validation, invalidation, etc.) tool |
| packages/nixpkgs/libsForQt5.keysmith | OTP client for Plasma Mobile and Desktop |
| packages/nixpkgs/rubyPackages_3_1.cocoapods-keys | |
| packages/nixpkgs/rubyPackages_3_2.cocoapods-keys | |
| packages/nixpkgs/rubyPackages_3_5.cocoapods-keys | |
| packages/nixpkgs/rubyPackages_4_0.cocoapods-keys | |
| packages/nixpkgs/rubyPackages_3_4.cocoapods-keys | |
| packages/nixpkgs/rubyPackages_3_3.cocoapods-keys | |
| packages/nixpkgs/python313Packages.keystone-engine | Lightweight multi-platform, multi-architecture assembler framework |
| packages/nixpkgs/python314Packages.keystone-engine | Lightweight multi-platform, multi-architecture assembler framework |
| packages/nixpkgs/keystone | Lightweight multi-platform, multi-architecture assembler framework |
| packages/nixpkgs/haskellPackages.publicsuffix | The publicsuffix list exposed as proper Haskell types |
| packages/nixpkgs/rPackages.public_ctn0094extra | |
| packages/nixpkgs/wshowkeys | Displays keys being pressed on a Wayland session |
| packages/nixpkgs/rPackages.hockeystick | |
| packages/nixpkgs/gnomeExtensions.layout-hotkeys | Add hotkeys to switch keyboard layout directly via Shift + Alt + [1-9]. |
| packages/nixpkgs/xkeysnail | Yet another keyboard remapping tool for X environment |
| packages/nixpkgs/python313Packages.mypy-boto3-keyspaces | Type annotations for boto3 keyspaces |
| packages/nixpkgs/python314Packages.mypy-boto3-keyspaces | Type annotations for boto3 keyspaces |
| packages/nixpkgs/python312Packages.keystone-engine | Lightweight multi-platform, multi-architecture assembler framework |
| packages/nixpkgs/xbindkeys | Launch shell commands with your keyboard or your mouse under X Window |
| packages/nixpkgs/texlivePackages.pgfkeysearch | Find keys in a given path 'recursively' |
| packages/nixpkgs/texlivePackages.kvdefinekeys | Define keys for use in the kvsetkeys package |
| packages/nixpkgs/haskellPackages.yamlkeysdiff | Compares the keys from two yaml files |
| packages/nixpkgs/kdePackages.kpublictransport | Library to assist with accessing public transport timetables and other data |
| packages/nixpkgs/libxcb-keysyms | Standard X key constants and conversion to/from keycodes |
| packages/nixpkgs/python312Packages.mypy-boto3-keyspaces | Type annotations for boto3 keyspaces |
| packages/nixpkgs/haskellPackages.amazonka-keyspaces | Amazon Keyspaces SDK |
| packages/nixpkgs/python313Packages.publicsuffixlist | Public Suffix List parser implementation |
| packages/nixpkgs/python314Packages.publicsuffixlist | Public Suffix List parser implementation |
| packages/nixpkgs/python312Packages.publicsuffixlist | Public Suffix List parser implementation |
| packages/nixpkgs/conkeyscan | Tool to scan Confluence for keywords |
| packages/nixpkgs/xbindkeys-config | Graphical interface for configuring xbindkeys |
| packages/nixpkgs/xchainkeys | Standalone X11 program to create chained key bindings |
| packages/nixpkgs/publicsuffix-list | Cross-vendor public domain suffix database |
| packages/nixpkgs/python313Packages.keystoneauth1 | Authentication Library for OpenStack Identity |
| packages/nixpkgs/python314Packages.keystoneauth1 | Authentication Library for OpenStack Identity |
| packages/nixpkgs/haskellPackages.publicsuffixlist | Is a given string a domain suffix? |
| packages/nixpkgs/gnomeExtensions.application-hotkeys | Launch, show, and hide applications using hotkeys. |
| packages/nixpkgs/python312Packages.keystoneauth1 | Authentication Library for OpenStack Identity |
| packages/nixpkgs/keyspersecond | Keys-per-second meter and counter for rhythm games |
| packages/nixpkgs/rubyPackages_3_2.public_suffix | |
| packages/nixpkgs/rubyPackages_3_1.public_suffix | |
| packages/nixpkgs/keystore-explorer | Open source GUI replacement for the Java command-line utilities keytool and jarsigner |
| packages/nixpkgs/rubyPackages_3_5.public_suffix | |
| packages/nixpkgs/rubyPackages_3_3.public_suffix | |
| packages/nixpkgs/rubyPackages_3_4.public_suffix | |
| packages/nixpkgs/rubyPackages_4_0.public_suffix | |
| packages/nixpkgs/python313Packages.types-aiobotocore-keyspaces | Type annotations for aiobotocore keyspaces |
| packages/nixpkgs/python314Packages.types-aiobotocore-keyspaces | Type annotations for aiobotocore keyspaces |
| packages/nixpkgs/pgpkeyserver-lite | Lightweight static front-end for a sks keyserver |
| packages/nixpkgs/python312Packages.types-aiobotocore-keyspaces | Type annotations for aiobotocore keyspaces |
| packages/nixpkgs/python313Packages.python-keystoneclient | Client Library for OpenStack Identity |
| packages/nixpkgs/python314Packages.python-keystoneclient | Client Library for OpenStack Identity |
| packages/nixpkgs/python312Packages.python-keystoneclient | Client Library for OpenStack Identity |
| packages/nixpkgs/monkeysphere | Leverage the OpenPGP web of trust for SSH and TLS authentication |
| packages/nixpkgs/rubyPackages_3_1.keystone-engine | |
| packages/nixpkgs/rubyPackages_3_2.keystone-engine | |
| packages/nixpkgs/rubyPackages_3_5.keystone-engine | |
| packages/nixpkgs/rubyPackages_3_3.keystone-engine | |
| packages/nixpkgs/rubyPackages_3_4.keystone-engine | |
| packages/nixpkgs/rubyPackages_4_0.keystone-engine | |
| packages/nixpkgs/home-assistant-component-tests.swiss_public_transport | Open source home automation that puts local control and privacy first |
| packages/nixpkgs/evdevremapkeys | Daemon to remap events on linux input devices |
| packages/nixpkgs/haskellPackages.publicsuffixlistcreate | Create the publicsuffixlist package |
| packages/nixpkgs/libsForQt5.kpublictransport | |
| packages/nixpkgs/sbclPackages.com_dot_gigamonkeys_dot_json | |
| packages/nixpkgs/sbclPackages.com_dot_gigamonkeys_dot_prose-diff | |
| packages/nixpkgs/sbclPackages.com_dot_gigamonkeys_dot_markup | |
| packages/nixpkgs/sbclPackages.com_dot_gigamonkeys_dot_parser | |
| packages/nixpkgs/traderepublic-portfolio-downloader | Downloads trade republic portfolio data |
| packages/nixpkgs/sbclPackages.com_dot_gigamonkeys_dot_binary-data | |
| packages/nixpkgs/sbclPackages.com_dot_gigamonkeys_dot_test-framework | |
| packages/nixpkgs/sbclPackages.com_dot_gigamonkeys_dot_macro-utilities | |
| packages/nixpkgs/sbclPackages.com_dot_gigamonkeys_dot_pathnames | |
| packages/nixpkgs/sbclPackages.com_dot_gigamonkeys_dot_utilities | |
| packages/nur/make-42.nezumi-p | A simple TUI for viewing Parisian public transport departure times. |
| packages/nur/xddxdd._meta.howto | This NUR has a binary cache |
| packages/nur/reedrw.jkps | A keys-per-second meter for rhythm games, useful for streaming and making videos |
| packages/nur/xddxdd.cockpy | Public and open source version of the cbt2 ps im working on |
| packages/nur/minegameYTB.sshrm | A tool to remove quickly all keys belonging to the specified host from a known_hosts file. |
| packages/nur/shados.sfutils | Solarflare Utilities for updating firmware, configuring boot ROMs, managing license keys, and configuring driver/hardware parameters |
| packages/nur/xeals.pam_gnupg | Unlock GnuPG keys on login |
| packages/nur/charmbracelet.melt | Backup and restore Ed25519 SSH keys with seed words |
| packages/nur/colinsane.pkgs.sofia-sip-bc | Open-source SIP User-Agent library, compliant with the IETF RFC3261 specification |
| packages/nur/xddxdd.uncategorized.cockpy | Public and open source version of the cbt2 ps im working on |
| packages/nur/linyinfeng.aws-s3-reverse-proxy | Reverse-proxy all incoming S3 API calls to the public AWS S3 backend |
| packages/nur/josh.restic-age-key | Use asymmetric age keys instead of a password on your restic repository |
| packages/nur/sikmir.osmptparser | Open Street Map Public Transport Parser |
| packages/nur/eownerdead.pdpmake | Public domain POSIX make |
| packages/nur/rycee.firefox-addons.codecov | Codecov Browser Extension
adds Codecov coverage data and line annotations to public and private repositories on GitHub. |
| packages/nur/colinsane.pkgs.podcastindex-db | csv database of 800k+ known public podcasts |
| packages/nur/ocfox.showmethekey | Show keys you typed on screen |
| packages/nur/rycee.firefox-addons.overbitewx | Re-enables the Gopher protocol in Firefox 56 and above, allowing you to enter Gopher URLs and click on Gopher links |
| packages/nur/colinsane.pkgs.sane-scripts.secrets-update-keys | |
| packages/nur/rycee.firefox-addons.shortkeys | Easily customizable custom keyboard shortcuts for Firefox |
| packages/nur/rycee.firefox-addons.surfingkeys | Rich shortcuts for you to click links / switch tabs / scroll pages or DIVs / capture full page or DIV etc, let you use the browser like vim, plus an embed vim editor.
https://github.com/brookhong/Surfingkeys |