| options/home-manager/services.pass-secret-service.storePath | Absolute path to the password store
|
| options/home-manager/programs.password-store.enable | Whether to enable Password store.
|
| options/home-manager/programs.password-store.package | The pass package to use
|
| options/home-manager/programs.password-store.settings | The pass environment variables dictionary
|
| options/nixos/services.below.dirs.store | Where to store below's data
|
| options/nixos/boot.loader.grub.storePath | Path to the Nix store when looking for kernels at boot
|
| options/nixos/services.guix.storeDir | The store directory where the Guix service will serve to/from
|
| options/nixos/services.pict-rs.storePath | The directory where to store the uploaded images
|
| options/nixos/services.thanos.store.enable | Whether to enable the Thanos store node giving access to blocks in a bucket provider.
|
| options/nixos/services.thanos.store.objstore.config | Object store configuration
|
| options/nixos/services.stargazer.store | Path to the certificate store on disk
|
| options/nixos/boot.initrd.systemd.storePaths | Store paths to copy into the initrd as well.
|
| options/nixos/services.thanos.query.store.sd-files | Path to files that contain addresses of store API servers
|
| options/nixos/services.thanos.store.objstore.config-file | Path to YAML file that contains object store configuration
|
| options/nixos/boot.nixStoreMountOpts | Defines the mount options used on a bind mount for the /nix/store
|
| options/nixos/services.cachix-watch-store.jobs | Number of threads used for pushing store paths
|
| options/nixos/services.thanos.store.store.limits.request-samples | The maximum samples allowed for a single Series request
|
| options/darwin/nix.settings.auto-optimise-store | If set to true, Nix automatically detects files in the store that have
identical contents, and replaces them with hard links to a single copy
|
| options/nixos/services.thanos.store.stateDir | Data directory relative to /var/lib
in which to cache remote blocks.
|
| options/home-manager/services.home-manager.autoExpire.store.cleanup | Whether to enable to cleanup Nix store when the Home Manager expire service runs
|
| options/nixos/services.thanos.store.log.level | Log filtering level
|
| options/nixos/services.thanos.store.log.format | Log format to use.
|
| options/nixos/virtualisation.xen.store.path | Path to the Xen Store Daemon
|
| options/nixos/services.thanos.store.store.grpc.series-max-concurrency | Maximum number of concurrent Series calls
|
| options/nixos/boot.readOnlyNixStore | If set, NixOS will enforce the immutability of the Nix store
by making /nix/store a read-only bind
mount
|
| options/nixos/image.repart.verityStore.partitionIds.store | Specify the attribute name of the store partition.
|
| options/nixos/services.thanos.store.max-time | End of time range limit to serve
|
| options/nixos/services.thanos.store.min-time | Start of time range limit to serve
|
| options/nixos/nix.settings.auto-optimise-store | If set to true, Nix automatically detects files in the store that have
identical contents, and replaces them with hard links to a single copy
|
| options/nixos/services.cachix-watch-store.enable | Whether to enable Cachix Watch Store: https://docs.cachix.org.
|
| options/nixos/systemd.shutdownRamfs.storePaths | Store paths to copy into the shutdown ramfs as well.
|
| options/nixos/services.thanos.store.chunk-pool-size | Maximum size of concurrently allocatable bytes for chunks
|
| options/nixos/services.thanos.query.store.unhealthy-timeout | Timeout before an unhealthy store is cleaned from the store UI page
|
| options/nixos/services.thanos.query.store.response-timeout | If a Store doesn't send any data in this specified duration then a
Store will be ignored and partial data will be returned if it's
enabled. 0 disables timeout
|
| options/nixos/services.thanos.store.grpc-server-tls-key | TLS Key for the gRPC server, leave blank to disable TLS
|
| options/nixos/services.thanos.store.index-cache-size | Maximum size of items held in the index cache
|
| options/nixos/services.thanos.store.grpc-server-tls-cert | TLS Certificate for gRPC server, leave blank to disable TLS
|
| options/nixos/services.thanos.store.http-address | Listen host:port for HTTP endpoints
|
| options/nixos/services.thanos.store.arguments | Arguments to the thanos store command
|
| options/nixos/services.thanos.store.tracing.config | Tracing configuration
|
| options/nixos/services.nix-store-gcs-proxy | An attribute set describing an HTTP to GCS proxy that allows us to use GCS
bucket via HTTP protocol.
|
| options/nixos/nix.sshServe.enable | Whether to enable serving the Nix store as a remote store via SSH.
|
| options/nixos/services.thanos.store.grpc-address | Listen ip:port address for gRPC endpoints (StoreAPI)
|
| options/nixos/image.repart.partitions.<name>.nixStorePrefix | The prefix to use for store paths
|
| options/home-manager/programs.rofi.pass.stores | Directory roots of your password-stores.
|
| options/nixos/security.pam.services.<name>.gnupg.storeOnly | Don't send the password immediately after login, but store for PAM
session.
|
| options/nixos/services.cachix-watch-store.host | Cachix host to connect to
|
| options/nixos/services.cachix-watch-store.signingKeyFile | Optional file containing a self-managed signing key to sign uploaded store paths.
|
| options/nixos/image.repart.partitions.<name>.storePaths | The store paths to include in the partition.
|
| options/nixos/services.thanos.store.grpc-server-tls-client-ca | TLS CA to verify clients against
|
| options/nixos/services.thanos.query.store.sd-dns-interval | Interval between DNS resolutions
|
| options/nixos/services.thanos.store.tracing.config-file | Path to YAML file that contains tracing configuration
|
| options/nixos/services.thanos.store.sync-block-duration | Repeat interval for syncing the blocks between local and remote view
|
| options/nixos/services.thanos.query.store.sd-interval | Refresh interval to re-read file SD files
|
| options/nixos/services.nix-store-gcs-proxy.<name>.enable | Whether to enable proxy for this bucket
|
| options/nixos/boot.initrd.nix-store-veritysetup.enable | Whether to enable nix-store-veritysetup.
|
| options/nixos/boot.initrd.systemd.storePaths.*.target | Path of the symlink.
|
| options/nixos/boot.initrd.systemd.storePaths.*.source | Path of the source file.
|
| options/home-manager/services.home-manager.autoExpire.store.options | Options given to nix-collect-garbage when the service runs.
|
| options/nixos/services.cachix-watch-store.cacheName | Cachix binary cache name
|
| options/nixos/boot.initrd.systemd.storePaths.*.enable | Whether to enable copying of this file and symlinking it.
|
| options/nixos/services.nix-store-gcs-proxy.<name>.address | The address of the proxy.
|
| options/nixos/services.nix-store-gcs-proxy.<name>.bucketName | Name of Google storage bucket
|
| options/nixos/virtualisation.xen.store.settings.xenstored.log.file | Path to the Xen Store log file.
|
| options/nixos/virtualisation.xen.store.settings.xenstored.log.level | Logging level for the Xen Store.
|
| options/nixos/virtualisation.xen.store.settings | The OCaml-based Xen Store Daemon configuration
|
| options/nixos/services.cachix-watch-store.package | The cachix package to use.
|
| options/nixos/services.cachix-watch-store.verbose | Enable verbose output
|
| options/nixos/virtualisation.xen.store.settings.pidFile | Path to the Xen Store Daemon PID file.
|
| options/home-manager/programs.senpai.config.password | Your password, used for SASL authentication
|
| options/nixos/virtualisation.xen.store.settings.xenstored.accessLog.file | Path to the Xen Store access log file.
|
| options/nixos/systemd.shutdownRamfs.storePaths.*.target | Path of the symlink.
|
| options/home-manager/programs.mu.home | Directory to store Mu's database.
|
| options/nixos/services.thanos.rule.objstore.config | Object store configuration
|
| options/nixos/systemd.shutdownRamfs.storePaths.*.source | Path of the source file.
|
| options/nixos/services.cachix-watch-store.cachixTokenFile | Required file that needs to contain the cachix auth token.
|
| options/nixos/services.thanos.store.block-sync-concurrency | Number of goroutines to use when syncing blocks from object storage
|
| options/nixos/systemd.shutdownRamfs.storePaths.*.enable | Whether to enable copying of this file and symlinking it.
|
| options/nixos/image.repart.partitions.<name>.stripNixStorePrefix | Whether to strip /nix/store/ from the store paths
|
| options/nixos/services.pleroma.configs | Pleroma public configuration
|
| options/nixos/services.dae.config | WARNING: This option will expose store your config unencrypted world-readable in the nix store
|
| options/nixos/nix.sshServe.write | Whether to enable writing to the Nix store as a remote store via SSH
|
| options/home-manager/programs.senpai.config.password-cmd | Alternatively to providing your SASL authentication password
directly in plaintext, you can specify a command to be run to
fetch the password at runtime
|
| options/nixos/services.thanos.sidecar.objstore.config | Object store configuration
|
| options/nixos/services.thanos.compact.objstore.config | Object store configuration
|
| options/nixos/services.thanos.receive.objstore.config | Object store configuration
|
| options/nixos/services.kasmweb.datastorePath | The directory used to store all data for kasmweb.
|
| options/nixos/nixpkgs.flake.source | The path to the nixpkgs sources used to build the system
|
| options/home-manager/programs.hexchat.channels.<name>.password | Password to use
|
| options/darwin/nixpkgs.flake.source | The path to the nixpkgs sources used to build the system
|
| options/nixos/virtualisation.xen.store.settings.quota.maxSize | Size limit for transactions.
|
| options/nixos/services.redis.servers.<name>.requirePass | Password for database (STORED PLAIN TEXT, WORLD-READABLE IN NIX STORE)
|
| options/nixos/virtualisation.xen.store.settings.quota.maxPath | Path limit for the quota system.
|
| options/nixos/users.defaultUserShell | This option defines the default shell assigned to user
accounts
|
| options/nixos/boot.initrd.systemd.storePaths.*.dlopen.features | Features to enable via dlopen ELF notes
|
| options/nixos/image.repart.verityStore.partitionIds.store-verity | Specify the attribute name of the store's dm-verity hash partition.
|
| options/nixos/virtualisation.useNixStoreImage | Build and use a disk image for the Nix store, instead of
accessing the host's one through 9p
|
| options/nixos/virtualisation.xen.store.settings.quota.maxWatch | Maximum number of watches by the Xenstore Watchdog.
|
| options/nixos/services.rustus.storage | Storages are used to actually store your files
|
| options/nixos/virtualisation.xen.store.settings.quota.enable | Whether to enable the quota system.
|
| options/nixos/virtualisation.xen.store.settings.enableMerge | Whether to enable transaction merge support.
|
| options/nixos/boot.initrd.systemd.storePaths.*.dlopen.usePriority | Priority of dlopen ELF notes to include. "required" is
minimal, "recommended" includes "required", and
"suggested" includes "recommended"
|
| options/nixos/virtualisation.xen.store.settings.perms.enable | Whether to enable the node permission system.
|
| options/nixos/services.thanos.rule.objstore.config-file | Path to YAML file that contains object store configuration
|
| options/nixos/virtualisation.xen.store.settings.quota.maxEntity | Entity limit for transactions.
|
| options/nixos/nix.buildMachines | This option lists the machines to be used if distributed builds are
enabled (see nix.distributedBuilds)
|
| options/darwin/nix.buildMachines | This option lists the machines to be used if distributed builds are
enabled (see nix.distributedBuilds)
|
| options/home-manager/nix.buildMachines | This option lists the machines to be used if distributed builds are
enabled (see nix.distributedBuilds)
|
| options/nixos/services.davis.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.movim.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.slskd.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.snipe-it.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/home-manager/nix.channels | A declarative alternative to Nix channels
|
| options/nixos/services.thanos.downsample.objstore.config | Object store configuration
|
| options/nixos/services.honk.passwordFile | Password for admin account
|
| options/nixos/services.gancio.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.fluidd.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.akkoma.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.monica.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.matomo.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/virtualisation.xen.store.settings.quota.maxWatchEvents | Maximum number of outstanding watch events per watch.
|
| options/home-manager/programs.gpg.homedir | Directory to store keychains and configuration.
|
| options/nixos/services.inadyn.settings.custom.<name>.password | Password for this DDNS provider
|
| options/nixos/virtualisation.xen.store.settings.quota.maxRequests | Maximum number of requests per transaction.
|
| options/nixos/systemd.shutdownRamfs.storePaths.*.dlopen.features | Features to enable via dlopen ELF notes
|
| options/nixos/services.cachix-watch-store.compressionLevel | The compression level for ZSTD compression (between 0 and 16)
|
| options/home-manager/programs.kodi.datadir | Directory to store configuration and metadata.
|
| options/nixos/virtualisation.xen.store.settings.ringScanInterval | Perodic scanning for all the rings as a safenet for lazy clients
|
| options/nixos/boot.loader.grub.users.<name>.password | Specifies the clear text password for the account
|
| options/darwin/homebrew.masApps | Applications to install from Mac App Store using mas
|
| options/nixos/virtualisation.xen.store.settings.persistent | Whether to activate the filed base backend.
|
| options/nixos/services.ttyd.passwordFile | File containing the password to use for basic http authentication
|
| options/nixos/services.thanos.compact.objstore.config-file | Path to YAML file that contains object store configuration
|
| options/nixos/services.thanos.receive.objstore.config-file | Path to YAML file that contains object store configuration
|
| options/nixos/services.thanos.sidecar.objstore.config-file | Path to YAML file that contains object store configuration
|
| options/nixos/systemd.shutdownRamfs.storePaths.*.dlopen.usePriority | Priority of dlopen ELF notes to include. "required" is
minimal, "recommended" includes "required", and
"suggested" includes "recommended"
|
| options/nixos/programs.zsh.ohMyZsh.cacheDir | Cache directory to be used by oh-my-zsh
|
| options/nixos/services.veilid.settings.core.table_store.directory | The filesystem directory to store your table store within.
|
| options/nixos/services.veilid.settings.core.block_store.directory | The filesystem directory to store blocks for the block store.
|
| options/home-manager/programs.rofi.pass.enable | Whether to enable rofi integration with password-store.
|
| options/nixos/services.yandex-disk.password | Your yandex.com password
|
| options/home-manager/home.checks | Packages that are added as dependencies of the home's build, usually
for the purpose of validating some part of the configuration
|
| options/nixos/services.inadyn.settings.provider.<name>.password | Password for this DDNS provider
|
| options/home-manager/programs.gpg.publicKeys | A list of public keys to be imported into GnuPG
|
| options/nixos/services.nix-serve.secretKeyFile | The path to the file used for signing derivation data
|
| options/nixos/virtualisation.xen.store.settings.quota.transaction | Maximum number of transactions.
|
| options/nixos/services.librenms.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.agorakit.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.dolibarr.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.kanboard.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.fediwall.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.mainsail.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.pixelfed.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/virtualisation.xen.store.settings.perms.enableWatch | Whether to enable the watch permission system
|
| options/home-manager/programs.nh.clean.enable | Whether to enable periodic garbage collection for user profile and nix store with nh clean
user.
|
| options/nixos/virtualisation.xen.store.settings.quota.maxOutstanding | Maximum outstanding requests, i.e. in-flight requests / domain.
|
| options/nixos/services.radicle.httpd.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/programs.nncp.secrets | A list of paths to NNCP configuration files that should not be
in the Nix store
|
| options/nixos/services.nextcloud.appstoreEnable | Allow the installation and updating of apps from the Nextcloud appstore
|
| options/nixos/services.pleroma.secretConfigFile | Path to the file containing your secret pleroma configuration.
DO NOT POINT THIS OPTION TO THE NIX
STORE, the store being world-readable, it'll
compromise all your secrets.
|
| options/nixos/services.anuko-time-tracker.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.gitlab.smtp.passwordFile | File containing the password of the SMTP server for GitLab
|
| options/home-manager/programs.chromium.extensions | List of Chromium extensions to install
|
| options/nixos/services.nginx.virtualHosts.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/virtualisation.xen.store.settings.conflict.burstLimit | Limits applied to domains whose writes cause other domains' transaction
commits to fail
|
| options/nixos/services.chatgpt-retrieval-plugin.datastore | This specifies the vector database provider you want to use to store and query embeddings.
|
| options/nixos/virtualisation.writableStore | If enabled, the Nix store in the VM is made writable by
layering an overlay filesystem on top of the host's Nix
store
|
| options/nixos/services.bookstack.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.weblate.smtp.passwordFile | Location of a file containing the SMTP password
|
| options/nixos/services.pict-rs.dataDir | The directory where to store the uploaded images & database.
|
| options/nixos/boot.iscsi-initiator.extraConfigFile | Append an additional file's contents to /etc/iscsid.conf
|
| options/home-manager/services.podman.images.<name>.password | Password used to connect to registry. (Will be visible in nix store)
|
| options/nixos/programs.tmux.secureSocket | Store tmux socket under /run, which is more secure than /tmp, but as a
downside it doesn't survive user logout.
|
| options/nixos/services.thanos.downsample.objstore.config-file | Path to YAML file that contains object store configuration
|
| options/nixos/system.checks | Packages that are added as dependencies of the system's build, usually
for the purpose of validating some part of the configuration
|
| options/home-manager/programs.tmux.secureSocket | Store tmux socket under /run, which is more
secure than /tmp, but as a downside it doesn't
survive user logout.
|
| options/nixos/services.below.dirs.log | Where to store below's logs
|
| options/nixos/services.gns3-server.auth.passwordFile | A file containing the password to access the GNS3 Server.
This should be a string, not a nix path, since nix paths
are copied into the world-readable nix store.
|
| options/nixos/services.dokuwiki.sites.<name>.acl | Access Control Lists: see https://www.dokuwiki.org/acl
Mutually exclusive with services.dokuwiki.aclFile
Set this to a value other than null to take precedence over aclFile option
|
| options/nixos/virtualisation.xen.store.settings.conflict.maxHistorySeconds | Limits applied to domains whose writes cause other domains' transaction
commits to fail
|
| options/nixos/services.openiscsi.extraConfigFile | Append an additional file's contents to /etc/iscsid.conf
|
| options/nixos/services.jirafeau.nginxConfig.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.cfssl.tlsKey | Other endpoint's CA private key
|
| options/darwin/homebrew.global.brewfile | Whether to enable Homebrew to automatically use the Brewfile that this module generates in
the Nix store, when you manually invoke brew bundle
|
| options/nixos/services.webdav.settings | Attrset that is converted and passed as config file
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.boinc.dataDir | The directory in which to store BOINC's configuration and data files.
|
| options/nixos/programs.chromium.extensions | List of chromium extensions to install
|
| options/nixos/services.gitea.database.password | The password corresponding to database.user
|
| options/nixos/virtualisation.oci-containers.containers.<name>.imageStream | Path to a script that streams the desired image on standard output
|
| options/nixos/services.pict-rs.repoPath | The directory where to store the database
|
| options/nixos/services.veilid.settings.core.protected_store.directory | The filesystem directory to store your protected store in.
|
| options/nixos/services.gitea.dump.type | Archive format used to store the dump file.
|
| options/nixos/services.davis.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.slskd.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.movim.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.metabase.ssl.keystore | Java KeyStore file containing the certificates.
|
| options/nixos/services.snipe-it.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.cfssl.caBundle | Path to root certificate store.
|
| options/nixos/services.pgadmin.emailServer.passwordFile | Password for SMTP email account
|
| options/nixos/services.ttyd.keyFile | SSL key file path
|
| options/nixos/services.mchprs.dataDir | Directory to store MCHPRS database and other state/data files.
|
| options/nixos/programs.nncp.settings | NNCP configuration, see
http://www.nncpgo.org/Configuration.html
|
| options/nixos/services.cfssl.intBundle | Path to intermediate certificate store.
|
| options/nixos/services.murmur.stateDir | Directory to store data for the server.
|
| options/nixos/services.netbird.server.coturn.password | The password of the user used by netbird to connect to the coturn server
|
| options/nixos/services.zammad.secretKeyBaseFile | The path to a file containing the
secret_key_base secret
|
| options/nixos/services.gancio.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.fedimintd.<name>.nginx.config.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.fluidd.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.akkoma.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.matomo.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.monica.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.tsidp.environmentFile | Path to an environment file loaded for the tsidp service
|
| options/nixos/services.firezone.server.smtp.passwordFile | File containing the password for the given username
|
| options/nixos/services.dashy.settings | Settings serialized into user-data/conf.yml before build
|
| options/nixos/services.discourse.redis.passwordFile | File containing the Redis password
|
| options/nixos/services.seafile.dataDir | Path in which to store user data
|
| options/home-manager/programs.gpg.mutableKeys | If set to true, you may manage your keyring as a user
using the gpg command
|
| options/nixos/services.invidious.extraSettingsFile | A file including Invidious settings
|
| options/nixos/services.discourse.admin.passwordFile | A path to a file containing the admin user's password
|
| options/nixos/virtualisation.xen.store.settings.conflict.rateLimitIsAggregate | If the conflict.rateLimitIsAggregate option is true, then after each
tick one point of conflict-credit is given to just one domain: the
one at the front of the queue
|
| options/nixos/services.pocket-id.dataDir | The directory where Pocket ID will store its data, such as the database when using SQLite.
|
| options/nixos/security.dhparams.stateful | Whether generation of Diffie-Hellman parameters should be stateful or
not
|
| options/nixos/virtualisation.additionalPaths | A list of paths whose closure should be made available to
the VM
|
| options/nixos/services.ncps.cache.dataPath | The local directory for storing configuration and cached store paths
|
| options/nixos/services.openvpn.servers.<name>.authUserPass.password | The password to store inside the credentials file.
|
| options/nixos/services.homer.settings | Settings serialized into config.yml before build
|
| options/nixos/services.graylog.dataDir | Directory used to store Graylog server state.
|
| options/nixos/services.redsocks.redsocks.*.password | Password to send to proxy
|
| options/nixos/services.k3s.token | The k3s token to use when connecting to a server.
WARNING: This option will expose your token unencrypted in the world-readable nix store
|
| options/nixos/services.openvpn.servers.<name>.authUserPass | This option can be used to store the username / password credentials
with the "auth-user-pass" authentication method
|
| options/nixos/services.biboumi.settings.password | The password used to authenticate the XMPP component to your XMPP server
|
| options/nixos/services.fediwall.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.kanboard.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.librenms.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.dolibarr.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.agorakit.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.mainsail.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.pixelfed.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.mjolnir.dataPath | The directory the bot should store various bits of information in.
|
| options/nixos/services.changedetection-io.datastorePath | The directory used to store all data for changedetection-io.
|
| options/nixos/services.rke2.token | The rke2 token to use when connecting to a server.
WARNING: This option will expose your token unencrypted in the world-readable nix store
|
| options/nixos/services.limesurvey.nginx.virtualHost.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.murmur.logDays | How long to store RPC logs for in the database
|
| options/nixos/services.pocket-id.credentials | Environment variables which are loaded from the contents of the specified file paths
|
| options/nixos/services.cfssl.configFile | Path to configuration file
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/programs.neovim.configure | Generate your init file from your list of plugins and custom commands
|
| options/nixos/services.roundcube.database.password | Password for the postgresql connection
|
| options/nixos/services.forgejo.dump.type | Archive format used to store the dump file.
|
| options/nixos/services.gitea.lfs.contentDir | Where to store LFS files.
|
| options/nixos/services.grafana.settings.smtp.password | Password used for authentication
|
| options/nixos/services.memos.dataDir | Specifies the directory where Memos will store its data.
|
| options/nixos/services.ncps.cache.hostName | The hostname of the cache server. This is used to generate the
private key used for signing store paths (.narinfo)
|
| options/nixos/services.guix.stateDir | The state directory where Guix service will store its data such as its
user-specific profiles, cache, and state files.
Changing it to something other than the default will rebuild the
package.
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/system.build.toplevel | This option contains the store path that typically represents a NixOS system
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.bookstack.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.discourse.secretKeyBaseFile | The path to a file containing the
secret_key_base secret
|
| options/nixos/services.ncps.cache.maxSize | The maximum size of the store
|
| options/nixos/services.certmgr.specs | Certificate specs as described by:
https://github.com/cloudflare/certmgr#certificate-specs
These will be added to the Nix store, so they will be world readable.
|
| options/nixos/services.hydra.useSubstitutes | Whether to use binary caches for downloading store paths
|
| options/nixos/services.pocket-id.environmentFile | Path to an environment file to be loaded
|
| options/nixos/services.discourse.database.passwordFile | File containing the Discourse database user password
|
| options/nixos/image.repart.verityStore.enable | Whether to enable building images with a dm-verity protected nix store.
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.blockbook-frontend.<name>.rpc.password | RPC password for JSON-RPC connections
|
| options/nixos/services.artalk.allowModify | allow Artalk store the settings to config file persistently
|
| options/nixos/services.dovecot2.mailUser | Default user to store mail for virtual users.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.aria2.settings.dir | Directory to store downloaded files.
|
| options/nixos/services.mailhog.storage | Store mails on disk or in memory.
|
| options/nixos/services.tt-rss.database.type | Database to store feeds
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.discourse.mail.outgoing.passwordFile | A file containing the password of the SMTP server account
|
| options/home-manager/programs.git.includes.*.contentSuffix | Nix store name for the git configuration text file,
when generating the configuration text from nix options.
|
| options/nixos/services.pingvin-share.dataDir | The path to the data directory in which Pingvin Share will store its data.
|
| options/nixos/services.bitlbee.configDir | Specify an alternative directory to store all the per-user configuration
files.
|
| options/home-manager/programs.vdirsyncer.statusPath | A directory where vdirsyncer will store some additional data for the next sync
|
| options/nixos/networking.wg-quick.interfaces.<name>.privateKey | Base64 private key generated by wg genkey
|
| options/nixos/services.mattermost.database.password | Password for local Mattermost database user
|
| options/nixos/nix.optimise.automatic | Automatically run the nix store optimiser at a specific time.
|
| options/darwin/nix.optimise.automatic | Automatically run the nix store optimiser at a specific time.
|
| options/nixos/services.etebase-server.dataDir | Directory to store the Etebase server data.
|
| options/darwin/programs.ssh.knownHosts.<name>.publicKeyFile | The path to the public key file for the host
|
| options/darwin/homebrew.global.lockfiles | Whether to enable Homebrew to generate lockfiles when you manually invoke
brew bundle [install]
|
| options/nixos/programs.msmtp.accounts | Named accounts and their respective configurations
|
| options/nixos/services.froide-govplan.dataDir | Directory to store the Froide-Govplan server data.
|
| options/nixos/services.dovecot2.mailGroup | Default group to store mail for virtual users.
|
| options/nixos/services.paperless.dataDir | Directory to store the Paperless data.
|
| options/nixos/services.sickbeard.dataDir | Path where to store data files.
|
| options/nixos/services.guix.publish.enable | Whether to enable substitute server for your Guix store directory.
|
| options/nixos/users.users.<name>.password | Specifies the (clear text) password for the user
|
| options/nixos/services.nar-serve.domain | When set, enables the feature of serving .
on top of /nix/store/-
|
| options/nixos/services.logstash.dataDir | A path to directory writable by logstash that it uses to store data
|
| options/nixos/services.node-red.userDir | The directory to store all user data, such as flow and credential files and all library data
|
| options/nixos/services.forgejo.lfs.contentDir | Where to store LFS files.
|
| options/nixos/services.sonarr.dataDir | The Sonarr home directory used to store all data
|
| options/nixos/services.alloy.configPath | Alloy configuration file/directory path
|
| options/darwin/services.ofborg.configFile | Configuration file to use for ofborg
|
| options/nixos/services.vlagent.enable | Whether to enable VictoriaMetrics's vlagent.
vlagent is a tiny agent which helps you collect logs from various sources and store them in VictoriaLogs .
|
| options/nixos/services.wasabibackend.rpc.password | RPC password for the bitcoin endpoint
|
| options/nixos/services.prosody.modules.mam | Store messages in an archive and allow users to access it
|
| options/home-manager/programs.chromium.extensions.*.id | The extension's ID from the Chrome Web Store url or the unpacked crx.
|
| options/nixos/services.prometheus.exporters.nut.passwordPath | A run-time path to the nutUser password file, which should be
provisioned outside of Nix store.
|
| options/nixos/services.grafana.settings.database.password | The database user's password (not applicable for sqlite3)
|
| options/nixos/services.mqtt2influxdb.mqtt.password | MQTT password
|
| options/nixos/services.stash.sessionStoreKeyFile | Path to file containing a secret for session store.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.paperless.mediaDir | Directory to store the Paperless documents.
|
| options/nixos/services.go-neb.secretFile | Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: $ENVIRONMENT
or ${VARIABLE}
|
| options/nixos/services.cadvisor.storageDriverPasswordFile | File that contains the cadvisor storage driver password.
storageDriverPasswordFile takes precedence over storageDriverPassword
Warning: when storageDriverPassword is non-empty this defaults to a file in the
world-readable Nix store that contains the value of storageDriverPassword
|
| options/nixos/services.prometheus.exporters.mysqld.configFile | Path to the services config file
|
| options/nixos/services.atuin.maxHistoryLength | The max length of each history item the atuin server should store.
|
| options/nixos/programs.ssh.knownHosts.<name>.publicKeyFile | The path to the public key file for the host
|
| options/nixos/services.syncplay.motd | Text to display when users join
|
| options/nixos/services.knot.keyFiles | A list of files containing additional configuration
to be included using the include directive
|
| options/nixos/services.k3s.agentToken | The k3s token agents can use to connect to the server
|
| options/home-manager/services.cliphist.allowImages | Store images in clipboard history.
|
| options/nixos/services.turn-rs.secretFile | Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: $ENVIRONMENT or
${VARIABLE}
|
| options/nixos/services.thanos.rule.enable | Whether to enable the Thanos ruler service which evaluates Prometheus rules against given Query nodes, exposing Store API and storing old blocks in bucket.
|
| options/nixos/services.thanos.query.enable | Whether to enable the Thanos query node exposing PromQL enabled Query API with data retrieved from multiple store nodes.
|
| options/nixos/services.syncplay.statsDBFile | Path to SQLite database file to store stats
|
| options/nixos/services.influxdb2.provision.users.<name>.passwordFile | Password for the user
|
| options/nixos/services.prosody.dataDir | The prosody home directory used to store all data
|
| options/nixos/users.extraUsers.<name>.password | Specifies the (clear text) password for the user
|
| options/nixos/services.athens.downloadMode | Defines how Athens behaves when a module@version
is not found in storage
|
| options/nixos/services.prometheus.exporters.snmp.enableConfigCheck | Whether to run a correctness check for the configuration file
|
| options/nixos/services.longview.apiKey | Longview API key
|
| options/nixos/services.prometheus.exporters.pve.configFile | Path to the service's config file
|
| options/nixos/services.cfssl.mutualTlsClientKey | Mutual TLS - client key to call remote instance requiring client certs
|
| options/nixos/services.syncplay.roomsDBFile | Path to SQLite database file to store room states
|
| options/nixos/services.mautrix-discord.environmentFile | File containing environment variables to substitute when copying the configuration
out of Nix store to the services.mautrix-discord.dataDir
|
| options/nixos/services.cfssl.responderKey | Private key for OCSP responder certificate
|
| options/nixos/services.postgrey.privacy | Store data using one-way hash functions (SHA1)
|
| options/nixos/services.ncps.cache.storage.local | The local directory for storing configuration and cached store
paths
|
| options/nixos/services.ncps.cache.lru.schedule | The cron spec for cleaning the store to keep it under
config.ncps.cache.maxSize
|
| options/nixos/services.rke2.agentToken | The rke2 token agents can use to connect to the server
|
| options/nixos/services.journald.storage | Controls where to store journal data
|
| options/nixos/services.headphones.dataDir | Path where to store data files.
|
| options/nixos/services.rmfakecloud.environmentFile | Path to an environment file loaded for the rmfakecloud service
|
| options/nixos/services.teamspeak3.logPath | Directory to store log files in.
|
| options/nixos/services.rss-bridge.config.FileCache.path | Directory where to store cache files (if cache.type = "file").
|
| options/nixos/services.influxdb2.provision.initialSetup.passwordFile | Password for primary user
|
| options/nixos/services.pixelfed.secretFile | A secret file to be sourced for the .env settings
|
| options/nixos/services.mautrix-discord.dataDir | Directory to store the bridge's configuration and database files
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/networking.wireguard.interfaces.<name>.privateKey | Base64 private key generated by wg genkey
|
| options/nixos/services.traefik.dataDir | Location for any persistent data Traefik creates, such as the ACME certificate store.
If left as the default value, this directory will automatically be created
before the Traefik server starts, otherwise you are responsible for ensuring
the directory exists with appropriate ownership and permissions.
|
| options/nixos/nix.buildMachines.*.sshKey | The path to the SSH private key with which to authenticate on
the build machine
|
| options/darwin/nix.buildMachines.*.sshKey | The path to the SSH private key with which to authenticate on
the build machine
|
| options/home-manager/nix.buildMachines.*.sshKey | The path to the SSH private key with which to authenticate on
the build machine
|
| options/nixos/boot.loader.grub.users | User accounts for GRUB
|
| options/nixos/services.slurm.extraConfigPaths | Slurm expects config files for plugins in the same path
as slurm.conf
|
| options/nixos/services.librechat.dataDir | Absolute path for where the LibreChat server will use as its data directory to store logs, user uploads, and generated images.
|
| options/nixos/services.thanos.compact.enable | Whether to enable the Thanos compactor which continuously compacts blocks in an object store bucket.
|
| options/nixos/services.gammu-smsd.backend.service | Service to use to store sms data.
|
| options/nixos/services.outline.redisUrl | Connection to a redis server
|
| options/nixos/virtualisation.docker.liveRestore | Alias of virtualisation.docker.daemon.settings.live-restore.
|
| options/nixos/services.szurubooru.dataDir | The path to the data directory in which Szurubooru will store its data.
|
| options/nixos/services.selfoss.database.type | Database to store feeds
|
| options/nixos/services.nextcloud.config.objectstore.s3.key | The access key for the S3 bucket.
|
| options/nixos/services.teamspeak3.dataDir | Directory to store TS3 database and other state/data files.
|
| options/nixos/services.pgbackrest.commands.restore | Options for the 'restore' command
|
| options/nixos/services.hebbot.botPasswordFile | A path to the password file for your bot
|
| options/home-manager/programs.taskwarrior.dataLocation | Location where Task Warrior will store its data
|
| options/nixos/services.syncplay.salt | Salt to allow room operator passwords generated by this server
instance to still work when the server is restarted
|
| options/home-manager/programs.keepassxc.settings | Configuration written to
$XDG_CONFIG_HOME/keepassxc/keepassxc.ini
|
| options/nixos/services.nextcloud.config.objectstore.s3.useSsl | Use SSL for objectstore access.
|
| options/nixos/services.nextcloud.config.objectstore.s3.port | Required for some non-Amazon implementations.
|
| options/nixos/services.resilio.storagePath | Where BitTorrent Sync will store it's database files (containing
things like username info and licenses)
|
| options/darwin/nix.settings.sandbox | If set, Nix will perform builds in a sandboxed environment that it
will set up automatically for each build
|
| options/nixos/services.ghostunnel.servers.<name>.keystore | Path to keystore (combined PEM with cert/key, or PKCS12 keystore)
|
| options/nixos/services.snmpd.configText | The contents of the snmpd.conf
|
| options/nixos/security.ipa.offlinePasswords | Whether to store offline passwords when the server is down.
|
| options/nixos/services.podgrab.dataDirectory | Directory to store downloads.
|
| options/nixos/services.mqtt2influxdb.influxdb.password | Password for InfluxDB login
|
| options/nixos/services.gitolite.dataDir | The gitolite home directory used to store all repositories
|
| options/nixos/services.cfssl.metadata | Metadata file for root certificate presence
|
| options/darwin/nix.linux-builder.ephemeral | Whether to enable wipe the builder's filesystem on every restart
|
| options/home-manager/programs.awscli.credentials | Configuration written to $HOME/.aws/credentials
|
| options/nixos/services.cross-seed.settingsFile | Path to a JSON file containing settings that will be merged with the
settings option
|
| options/nixos/services.crowdsec-firewall-bouncer.settings.api_key | API key to authenticate with a local crowdsec API
|
| options/nixos/services.minecraft-server.dataDir | Directory to store Minecraft database and other state/data files.
|
| options/nixos/services.shellhub-agent.privateKey | Location where to store the ShellHub Agent private
key.
|
| options/nixos/services.lidarr.settings | Attribute set of arbitrary config options
|
| options/nixos/services.cross-seed.settings | Configuration options for cross-seed
|
| options/nixos/services.sonarr.settings | Attribute set of arbitrary config options
|
| options/nixos/services.radarr.settings | Attribute set of arbitrary config options
|
| options/nixos/services.immich.mediaLocation | Directory used to store media files
|
| options/nixos/services.patroni.namespace | Path within the configuration store where Patroni will keep information about the cluster.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.prometheus.exporters.blackbox.enableConfigCheck | Whether to run a correctness check for the configuration file
|
| options/nixos/services.nextcloud.config.objectstore.s3.bucket | The name of the S3 bucket.
|
| options/nixos/services.vault.storageConfig | HCL configuration to insert in the storageBackend section
|
| options/nixos/services.typesense.apiKeyFile | Sets the admin api key for typesense
|
| options/nixos/services.zitadel.extraStepsPaths | A list of paths to extra steps files
|
| options/nixos/services.xtreemfs.dir.extraConfig | Configuration of XtreemFS DIR service
|
| options/nixos/services.xtreemfs.osd.extraConfig | Configuration of XtreemFS OSD service
|
| options/nixos/services.xtreemfs.mrc.extraConfig | Configuration of XtreemFS MRC service
|
| options/nixos/services.couchdb.extraConfigFiles | Extra configuration files
|
| options/nixos/services.nextcloud.config.objectstore.s3.region | Required for some non-Amazon implementations.
|
| options/nixos/services.scollector.bosunHost | Host and port of the bosun server that will store the collected
data.
|
| options/nixos/services.tahoe.nodes.<name>.client.shares.total | The number of shares required to store a file.
|
| options/nixos/services.gokapi.settingsFile | Path to config file to parse and append to settings
|
| options/home-manager/programs.rclone.remotes.<name>.config | Regular configuration options as described in rclone's documentation
https://rclone.org/docs/
|
| options/nixos/services.mautrix-meta.instances.<name>.environmentFile | File containing environment variables to substitute when copying the configuration
out of Nix store to the services.mautrix-meta.dataDir
|
| options/nixos/services.stalwart.settings | Configuration options for the Stalwart server
|
| options/nixos/services.icecream.daemon.cacheLimit | Maximum size in Megabytes of cache used to store compile environments of compile clients.
|
| options/nixos/services.godns.loadCredential | This can be used to pass secrets to the systemd service without adding
them to the nix store.
|
| options/nixos/services.tahoe.nodes.<name>.client.shares.happy | The number of distinct storage nodes required to store
a file.
|
| options/nixos/services.fider.database.url | URI to use for the main PostgreSQL database
|
| options/nixos/services.buildbot-worker.workerPassFile | File used to store the Buildbot Worker password
|
| options/nixos/services.fedimintd.<name>.dataDir | Path to the data dir fedimintd will use to store its data
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.presharedKey | Base64 preshared key generated by wg genpsk
|
| options/nixos/services.warpgate.settings.ssh.keys | Path to store SSH host & client keys.
|
| options/nixos/services.gammu-smsd.backend.sql.database | Database name to store sms data
|
| options/nixos/services.immich.secretsFile | Path of a file with extra environment variables to be loaded from disk
|
| options/nixos/services.readarr.settings | Attribute set of arbitrary config options
|
| options/nixos/services.prometheus.exporters.pve.environmentFile | Path to the service's environment file
|
| options/nixos/services.nextcloud.config.objectstore.s3.secretFile | The full path to a file that contains the access secret.
|
| options/home-manager/programs.opencode.skills | Custom agent skills for opencode
|
| options/nixos/services.netbird.clients.<name>.dir.state | A state directory used by NetBird client to store config.json, state.json & resolv.conf.
|
| options/nixos/services.netbird.tunnels.<name>.dir.state | A state directory used by NetBird client to store config.json, state.json & resolv.conf.
|
| options/nixos/services.hadoop.hdfs.datanode.dataDirs.*.path | Determines where on the local filesystem a data node should store its blocks.
|
| options/nixos/boot.loader.grub.users.<name>.hashedPassword | Specifies the password hash for the account,
generated with grub-mkpasswd-pbkdf2
|
| options/nixos/security.dhparams.params.<name>.path | The resulting path of the generated Diffie-Hellman parameters
file for other services to reference
|
| options/nixos/services.prometheus.stateDir | Directory below /var/lib to store Prometheus metrics data
|
| options/nixos/services.sourcehut.builds.images | Images for builds.sr.ht
|
| options/darwin/homebrew.enable | Whether to enable nix-darwin to manage installing/updating/upgrading Homebrew taps, formulae,
casks, Mac App Store apps, Visual Studio Code extensions, Go packages, and Cargo
crates using Homebrew Bundle
|
| options/nixos/services.powerdns.secretFile | Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: $ENVIRONMENT
or ${VARIABLE}
|
| options/nixos/services.ncps.upstream.publicKeys | A list of public keys of upstream caches in the format
host[-[0-9]*]:public-key
|
| options/nixos/services.borgbackup.repos.<name>.path | Where to store the backups
|
| options/nixos/services.olivetin.extraConfigFiles | Config files to merge into the settings defined in services.olivetin.settings
|
| options/nixos/fileSystems.<name>.neededForBoot | If set, this file system will be mounted in the initial ramdisk
|
| options/nixos/services.stalwart-mail.settings | Configuration options for the Stalwart email server
|
| options/nixos/services.minidlna.settings.db_dir | Specify the directory to store database and album art cache.
|
| options/nixos/services.nextcloud.config.objectstore.s3.hostname | Required for some non-Amazon implementations.
|
| options/nixos/services.kubernetes.secretsPath | Default location for kubernetes secrets
|
| options/nixos/services.firezone.relay.tokenFile | A file containing the firezone relay token
|
| options/nixos/services.nextcloud.config.objectstore.s3.usePathStyle | Required for some non-Amazon S3 implementations
|
| options/nixos/services.weblate.djangoSecretKeyFile | Location of the Django secret key
|
| options/nixos/services.longview.mysqlPassword | The password corresponding to mysqlUser
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.remove | Propagate mailbox deletions to the given mail store.
|
| options/nixos/services.prowlarr.settings | Attribute set of arbitrary config options
|
| options/nixos/services.whisparr.settings | Attribute set of arbitrary config options
|
| options/nixos/services.usbguard.restoreControllerDeviceState | The USBGuard daemon modifies some attributes of controller
devices like the default authorization state of new child device
instances
|
| options/darwin/security.sandbox.profiles.<name>.closure | List of store paths to make accessible.
|
| options/nixos/services.quake3-server.baseq3 | Path to the baseq3 files (pak*.pk3)
|
| options/nixos/services.pds.settings.PDS_DATA_DIRECTORY | Directory to store state
|
| options/nixos/services.pyload.downloadDirectory | Directory to store downloads.
|
| options/nixos/services.nextcloud.config.objectstore.s3.enable | Whether to enable S3 object storage as primary storage
|
| options/nixos/security.apparmor.enableCache | Whether to enable caching of AppArmor policies
in /var/cache/apparmor/
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.create | Automatically create missing mailboxes within the
given mail store.
|
| options/nixos/services.searx.settingsFile | The path of the Searx server settings.yml file
|
| options/nixos/services.cassandra.jmxRoles | Roles that are allowed to access the JMX (e.g. nodetool)
BEWARE: The passwords will be stored world readable in the nix store
|
| options/nixos/services.outline.databaseUrl | URI to use for the main PostgreSQL database
|
| options/nixos/services.cross-seed.settings.torrentDir | Directory containing torrent files, or if you're using a torrent
client integration and injection - your torrent client's .torrent
file store/cache.
|
| options/nixos/services.moodle.initialPassword | Specifies the initial password for the admin, i.e. the password assigned if the user does not already exist
|
| options/nixos/services.graylog.messageJournalDir | The directory which will be used to store the message journal
|
| options/nixos/boot.initrd.systemd.suppressedStorePaths | Store paths specified in the storePaths option that
should not be copied.
|
| options/home-manager/targets.genericLinux.gpu.nvidia.sha256 | The hash of the downloaded driver file
|
| options/nixos/services.zitadel.settings.TLS.Key | The TLS certificate private key, as a base64-encoded string
|
| options/nixos/services.zitadel.settings.TLS.Cert | The TLS certificate, as a base64-encoded string
|
| options/nixos/services.k3s.autoDeployCharts.<name>.values | Override default chart values via Nix expressions
|
| options/home-manager/specialisation | A set of named specialized configurations
|
| options/nixos/services.postfix.masterConfig.<name>.chroot | Whether the service is chrooted to have only access to the
services.postfix.queueDir and the closure of
store paths specified by the program option.
|
| options/nixos/services.homebridge.userStoragePath | Path to store homebridge user files (needs to be writeable).
|
| options/nixos/services.tor.relay.onionServices.<name>.path | Path where to store the data files of the hidden service
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.presharedKey | Base64 preshared key generated by wg genpsk
|
| options/nixos/services.nextcloud.autoUpdateApps.enable | Run a regular auto-update of all apps installed from the Nextcloud app store.
|
| options/nixos/services.nextcloud.config.objectstore.s3.sseCKeyFile | If provided this is the full path to a file that contains the key
to enable [server-side encryption with customer-provided keys][1]
(SSE-C)
|
| options/nixos/services.ncps.cache.upstream.publicKeys | A list of public keys of upstream caches in the format
host[-[0-9]*]:public-key
|
| options/nixos/services.draupnir.settings.dataPath | The path Draupnir will store its state/data in.
This option is read-only.
If you want to customize where this data is stored, use a bind mount.
|
| options/nixos/services.biboumi.settings.db_name | The name of the database to use
|
| options/nixos/services.thanos.downsample.enable | Whether to enable the Thanos downsampler which continuously downsamples blocks in an object store bucket.
|
| options/nixos/services.journalbeat.stateDir | Directory below /var/lib/ to store journalbeat's
own logs and other data
|
| options/nixos/services.artalk.settings | The artalk configuration
|
| options/nixos/services.rke2.autoDeployCharts.<name>.values | Override default chart values via Nix expressions
|
| options/nixos/services.redis.servers.<name>.masterAuth | If the master is password protected (using the requirePass configuration)
it is possible to tell the slave to authenticate before starting the replication synchronization
process, otherwise the master will refuse the slave request.
(STORED PLAIN TEXT, WORLD-READABLE IN NIX STORE)
|
| options/nixos/services.gitlab.secrets.dbFile | A file containing the secret used to encrypt variables in
the DB
|
| options/nixos/services.gitlab.secrets.jwsFile | A file containing the secret used to encrypt session
keys
|
| options/nixos/services.buildkite-agents.<name>.tokenPath | The token from your Buildkite "Agents" page
|
| options/darwin/services.buildkite-agents.<name>.tokenPath | The token from your Buildkite "Agents" page
|
| options/nixos/services.healthchecks.settings | Environment variables which are read by healthchecks (local)_settings.py
|
| options/nixos/services.zitadel.extraSettingsPaths | A list of paths to extra settings files
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.expunge | Permanently remove messages marked for deletion from
the given mail store.
|
| options/nixos/services.zwave-js.settings | Configuration settings for the generated config file
|
| options/nixos/services.moodle.virtualHost.documentRoot | The path of Apache's document root directory
|
| options/nixos/services.nagios.virtualHost.documentRoot | The path of Apache's document root directory
|
| options/nixos/services.thanos.rule.tracing.config | Tracing configuration
|
| options/nixos/services.firezone.gateway.tokenFile | A file containing the firezone gateway token
|
| options/nixos/services.jenkins.jobBuilder.accessToken | User token in Jenkins used to reload config
|
| options/nixos/services.bepasty.servers.<name>.secretKey | server secret for safe session cookies, must be set
|
| options/nixos/services.healthchecks.settingsFile | Environment variables which are read by healthchecks (local)_settings.py
|
| options/nixos/boot.loader.generationsDir.copyKernels | Whether to copy the necessary boot files into /boot, so
/nix/store is not needed by the boot loader.
|
| options/nixos/services.gitlab.secrets.otpFile | A file containing the secret used to encrypt secrets for OTP
tokens
|
| options/nixos/virtualisation.docker.daemon.settings.live-restore | Allow dockerd to be restarted without affecting running container
|
| options/nixos/services.komodo-periphery.passkeys | Passkeys required to access the periphery API
|
| options/nixos/services.rustus.info_storage.dir | directory to store info about uploads
|
| options/nixos/services.nginx.logError | Configures logging
|
| options/nixos/services.thanos.query.tracing.config | Tracing configuration
|
| options/nixos/services.prometheus.exporters.idrac.configurationPath | Path to the service's config file
|
| options/nixos/services.open-webui.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/programs.singularity.enableExternalLocalStateDir | Whether to use top-level directories as LOCALSTATEDIR
instead of the store path ones
|
| options/nixos/services.matrix-synapse.settings.pid_file | The file to store the PID in.
|
| options/nixos/services.silverbullet.spaceDir | Folder to store Silverbullet's space/workspace
|
| options/nixos/services.crossfire-server.stateDir | Where to store runtime data (save files, persistent items, etc)
|
| options/nixos/services.gatus.environmentFile | File to load as environment file
|
| options/nixos/services.gitlab.initialRootPasswordFile | File containing the initial password of the root account if
this is a new install
|
| options/nixos/services.gitlab.databasePasswordFile | File containing the GitLab database user password
|
| options/nixos/services.httpd.virtualHosts.<name>.documentRoot | The path of Apache's document root directory
|
| options/nixos/services.linyaps.webStoreInstallerPackage | The linyaps-web-store-installer package to use.
|
| options/nixos/services.rabbitmq.unsafeCookie | Erlang cookie is a string of arbitrary length which must
be the same for several nodes to be allowed to communicate
|
| options/nixos/services.keepalived.secretFile | Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: $ENVIRONMENT
or ${VARIABLE}
|
| options/nixos/services.bcg.environmentFiles | File to load as environment file
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.extraConfig.local | Local store extra configuration.
|
| options/nixos/services.hadoop.yarn.nodemanager.localDir | List of directories to store localized files in.
|
| options/nixos/services.scrutiny.settings.web.influxdb.org | InfluxDB organisation under which to store data.
|
| options/nixos/services.prefect.databasePasswordFile | path to a file containing e.g.:
DBPASSWORD=supersecret
stored outside the nix store, read by systemd as EnvironmentFile.
|
| options/nixos/services.writefreely.database.name | The name of the database to store data in.
|
| options/nixos/boot.loader.systemd-boot.xbootldrMountPoint | Where the XBOOTLDR partition is mounted
|
| options/nixos/services.garage.settings.data_dir | The directory in which Garage will store the data blocks of objects
|
| options/nixos/services.pgadmin.initialPasswordFile | Initial password file for the pgAdmin account
|
| options/nixos/services.openvpn.servers.<name>.authUserPass.username | The username to store inside the credentials file.
|
| options/nixos/services.actual.settings.serverFiles | The server will put an account.sqlite file in this directory, which will contain the (hashed) server password, a list of all the budget files the server knows about, and the active session token (along with anything else the server may want to store in the future).
|
| options/nixos/services.matrix-synapse.extraConfigFiles | Extra config files to include
|
| options/home-manager/programs.openstackclient.clouds | Configuration needed to connect to one or more clouds
|
| options/nixos/services.victorialogs.stateDir | Directory below /var/lib to store VictoriaLogs data
|
| options/home-manager/programs.nvchecker.settings.__config__.newver | The file to store 'new' (i.e. available) versions in
|
| options/nixos/services.postfix.settings.master.<name>.chroot | Whether the service is chrooted to have only access to the
services.postfix.queueDir and the closure of
store paths specified by the program option.
|
| options/home-manager/programs.nvchecker.settings.__config__.oldver | The file to store 'old' (i.e. installed) version information in
|
| options/nixos/services.litellm.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.orthanc.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.taskchampion-sync-server.dataDir | Directory in which to store data
|
| options/nixos/services.gitlab.secrets.secretFile | A file containing the secret used to encrypt variables in
the DB
|
| options/nixos/services.userborn.static | Whether to generate the password files at build time and store them directly
in the system closure, without requiring any services at boot time
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.extraConfig.remote | Remote store extra configuration.
|
| options/nixos/services.rathole.credentialsFile | Path to a TOML file to be merged with the settings
|
| options/nixos/services.ghostunnel.servers.<name>.cacert | Path to CA bundle file (PEM/X509)
|
| options/nixos/services.bluesky-pds.settings.PDS_DATA_DIRECTORY | Directory to store state
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.documentRoot | The path of Apache's document root directory
|
| options/nixos/services.beszel.hub.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.ntfy-sh.environmentFile | Path to a file containing extra ntfy environment variables in the systemd EnvironmentFile
format
|
| options/nixos/boot.loader.grub.mirroredBoots.*.efiBootloaderId | The id of the bootloader to store in efi nvram
|
| options/nixos/services.buildkite-agents.<name>.privateSshKeyPath | OpenSSH private key
A run-time path to the key file, which is supposed to be provisioned
outside of Nix store.
|
| options/darwin/services.buildkite-agents.<name>.privateSshKeyPath | OpenSSH private key
A run-time path to the key file, which is supposed to be provisioned
outside of Nix store.
|
| options/nixos/virtualisation.mountHostNixStore | Mount the host Nix store as a 9p mount.
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.keystore | Path to keystore (combined PEM with cert/key, or PKCS12 keystore)
|
| options/nixos/services.thanos.compact.tracing.config | Tracing configuration
|
| options/nixos/services.thanos.sidecar.tracing.config | Tracing configuration
|
| options/nixos/services.thanos.receive.tracing.config | Tracing configuration
|
| options/nixos/services.kanidm.provision.adminPasswordFile | Path to a file containing the admin password for kanidm
|
| options/nixos/services.chhoto-url.environmentFiles | Files to load environment variables from in addition to services.chhoto-url.settings
|
| options/nixos/services.paperless.exporter.directory | Directory to store export.
|
| options/nixos/services.bepasty.servers.<name>.secretKeyFile | A file that contains the server secret for safe session cookies, must be set.
secretKeyFile takes precedence over secretKey
|
| options/nixos/services.drupal.sites.<name>.virtualHost.documentRoot | The path of Apache's document root directory
|
| options/nixos/services.gemstash.settings.base_path | Path to store the gem files and the sqlite database
|
| options/nixos/networking.dhcpcd.persistent | Whether to leave interfaces configured on dhcpcd daemon
shutdown
|
| options/nixos/services.zipline.environmentFiles | Files to load environment variables from (in addition to services.zipline.settings)
|
| options/darwin/services.telegraf.environmentFiles | File to load as environment file
|
| options/nixos/services.beszel.agent.environment | Environment variables for configuring the beszel-agent service
|
| options/nixos/services.umami.settings.APP_SECRET_FILE | A file containing a secure random string
|
| options/nixos/services.healthchecks.dataDir | The directory used to store all data for healthchecks.
If left as the default value this directory will automatically be created before
the healthchecks server starts, otherwise you are responsible for ensuring the
directory exists with appropriate ownership and permissions.
|
| options/nixos/services.dendrite.loadCredential | This can be used to pass secrets to the systemd service without adding them to
the nix store
|
| options/nixos/services.scrutiny.settings.web.influxdb.bucket | InfluxDB bucket in which to store data.
|
| options/nixos/services.gitlab.secrets.activeRecordSaltFile | A file containing the salt for active record encryption in the DB
|
| options/nixos/services.docling-serve.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.sourcehut.settings."pages.sr.ht".gemini-certs | An absolute file path (which should be outside the Nix-store)
to Gemini certificates.
|
| options/nixos/systemd.network.netdevs.<name>.wireguardPeers | Each item in this array specifies an option in the
[WireGuardPeer] section of the unit
|
| options/nixos/nixpkgs.flake.setFlakeRegistry | Whether to pin nixpkgs in the system-wide flake registry (/etc/nix/registry.json) to the
store path of the sources of nixpkgs used to build the NixOS system
|
| options/nixos/services.trilium-server.environmentFile | File to load as the environment file
|
| options/nixos/nix.settings.sandbox | If set, Nix will perform builds in a sandboxed environment that it
will set up automatically for each build
|
| options/nixos/services.grafana.settings.security.admin_password | Default admin password
|
| options/nixos/services.strongswan-swanctl.includes | Extra configuration files to include in the swanctl configuration
|
| options/nixos/services.linkwarden.storageLocation | Directory used to store media files
|
| options/nixos/services.firezone.headless-client.tokenFile | A file containing the firezone client token
|
| options/nixos/services.linkwarden.secretFiles | Attribute set containing paths to files to add to the environment of linkwarden
|
| options/nixos/services.slskd.environmentFile | Path to the environment file sourced on startup
|
| options/nixos/services.zwave-js.secretsConfigFile | JSON file containing secret keys
|
| options/nixos/services.sharkey.environmentFiles | List of paths to files containing environment variables for Sharkey to use at runtime
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.macDeny | Specifies the MAC addresses to deny if macAcl is set to "deny" or "radius"
|
| options/nixos/services.warpgate.settings.recordings.path | Path to store session recordings.
|
| options/darwin/nixpkgs.flake.setFlakeRegistry | Whether to pin nixpkgs in the system-wide flake registry (/etc/nix/registry.json) to the
store path of the sources of nixpkgs used to build the nix-darwin system
|
| options/nixos/services.matterbridge.configFile | WARNING: THIS IS INSECURE, as your password will end up in
/nix/store, thus publicly readable
|
| options/nixos/networking.nftables.checkRuleset | Run nft check on the ruleset to spot syntax errors during build
|
| options/nixos/services.biboumi.credentialsFile | Path to a configuration file to be merged with the settings
|
| options/nixos/services.icingaweb2.resources | resources.ini contents
|
| options/nixos/systemd.network.netdevs.<name>.wireguardConfig | Each attribute in this set specifies an option in the
[WireGuard] section of the unit
|
| options/nixos/services.munin-node.extraPlugins | Additional Munin plugins to activate
|
| options/nixos/systemd.services.<name>.confinement.enable | If set, all the required runtime store paths for this service are
bind-mounted into a tmpfs-based
chroot(2).
|
| options/nixos/boot.initrd.network.ssh.hostKeys | Specify SSH host keys to import into the initrd
|
| options/nixos/services.discourse.mail.incoming.apiKeyFile | A file containing the Discourse API key used to add
posts and messages from mail
|
| options/nixos/networking.supplicant.<name>.extraConf | Configuration options for wpa_supplicant.conf
|
| options/nixos/services.pds.settings.PDS_BLOBSTORE_DISK_LOCATION | Store blobs at this location, set to null to use e.g
|
| options/nixos/services.nextjs-ollama-llm-ui.enable | Whether to enable Simple Ollama web UI service; an easy to use web frontend for a Ollama backend service
|
| options/nixos/services.sssd.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/darwin/homebrew.onActivation.upgrade | Whether to enable Homebrew to upgrade outdated formulae and Mac App Store apps during
nix-darwin system activation
|
| options/nixos/services.sourcehut.settings."sr.ht".network-key | An absolute file path (which should be outside the Nix-store)
to a secret key to encrypt internal messages with
|
| options/nixos/services.matrix-synapse.settings.media_store_path | Directory where uploaded images and attachments are stored.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.macAllow | Specifies the MAC addresses to allow if macAcl is set to "allow" or "radius"
|
| options/nixos/services.mjolnir.pantalaimon.options.dataPath | The directory where pantalaimon should store its state such as the database file.
|
| options/nixos/services.kanidm.provision.idmAdminPasswordFile | Path to a file containing the idm admin password for kanidm
|
| options/nixos/services.keycloak.settings | Configuration options corresponding to parameters set in
conf/keycloak.conf
|
| options/nixos/networking.wireless.networks.<name>.psk | The network's pre-shared key in plaintext defaulting
to being a network without any authentication.
Be aware that this will be written to the Nix store
in plaintext! Use pskRaw with an external
reference to keep it safe.
Mutually exclusive with pskRaw.
|
| options/nixos/services.duplicati.parameters | This option can be used to store some or all of the options given to the
commandline client
|
| options/nixos/services.openssh.knownHosts.<name>.publicKeyFile | The path to the public key file for the host
|
| options/nixos/services.druid.historical.segmentLocations | Locations where the historical will store its data.
|
| options/nixos/services.snips-sh.environmentFile | Additional environment file as defined in systemd.exec(5)
|
| options/nixos/services.sourcehut.settings.objects.s3-secret-key | An absolute file path (which should be outside the Nix-store)
to the secret key of the S3-compatible object storage service.
|
| options/nixos/services.rustus.info_storage | Info storages are used to store information about file uploads
|
| options/nixos/security.pki.caCertificateBlacklist | A list of blacklisted CA certificate names that won't be imported from
the Mozilla Trust Store into
/etc/ssl/certs/ca-certificates.crt
|
| options/darwin/security.pki.caCertificateBlacklist | A list of blacklisted CA certificate names that won't be imported from
the Mozilla Trust Store into
/etc/ssl/certs/ca-certificates.crt
|
| options/nixos/services.limesurvey.encryptionKeyFile | 32-byte key used to encrypt variables in the database
|
| options/nixos/services.cockroachdb.maxSqlMemory | The maximum in-memory storage capacity available to store temporary
data for SQL queries
|
| options/nixos/services.hercules-ci-agent.settings.secretsJsonPath | Path to a JSON file containing secrets for effects
|
| options/darwin/services.hercules-ci-agent.settings.secretsJsonPath | Path to a JSON file containing secrets for effects
|
| options/nixos/services.thanos.query-frontend.tracing.config | Tracing configuration
|
| options/nixos/services.telegraf.environmentFiles | File to load as environment file
|
| options/nixos/services.wstunnel.clients.<name>.httpProxy | Proxy to use to connect to the wstunnel server (USER:PASS@HOST:PORT).
Passwords specified here will be world-readable in the Nix store!
To pass a password to the service, point the environmentFile option
to a file containing PROXY_PASSWORD=<your-password-here> and set
this option to <user>:$PROXY_PASSWORD@<host>:<port>
|
| options/nixos/services.grafana.provision.alerting.rules.path | Path to YAML rules configuration
|
| options/nixos/services.munin-node.extraAutoPlugins | Additional Munin plugins to autoconfigure, using
munin-node-configure --suggest
|
| options/nixos/services.mediawiki.httpd.virtualHost.documentRoot | The path of Apache's document root directory
|
| options/nixos/services.limesurvey.virtualHost.documentRoot | The path of Apache's document root directory
|
| options/home-manager/programs.borgmatic.backups.<name>.location.excludeHomeManagerSymlinks | Whether to exclude Home Manager generated symbolic links from
the backups
|
| options/nixos/services.anubis.defaultOptions.policy.settings | Additional policy settings merged into the policy file
|
| options/nixos/services.glitchtip.environmentFiles | Files to load environment variables from in addition to services.glitchtip.settings
|
| options/nixos/services.caddy.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.authelia.instances.<name>.secrets | It is recommended you keep your secrets separate from the configuration
|
| options/nixos/services.cadvisor.storageDriverPassword | Cadvisor storage driver password
|
| options/nixos/services.mailpit.instances.<name>.database | Specify the local database filename to store persistent data
|
| options/nixos/services.ocis.environment | Extra config options
|
| options/nixos/services.druid.historical.segmentLocations.*.path | the path to store the segments
|
| options/nixos/services.stash.settings.blobs_storage | Where to store blobs
|
| options/nixos/services.yggdrasil.settings.PrivateKeyPath | Path to the private key file on the host system
|
| options/nixos/services.thanos.query.query.auto-downsampling | Enable automatic adjustment (step / 5) to what source of data should
be used in store gateways if no
max_source_resolution param is specified.
|
| options/nixos/services.duplicati.parametersFile | This file can be used to store some or all of the options given to the
commandline client
|
| options/nixos/services.workout-tracker.environmentFile | An environment file as defined in systemd.exec(5)
|
| options/nixos/services.limesurvey.encryptionNonceFile | 24-byte used to encrypt variables in the database
|
| options/nixos/services.anubis.instances.<name>.policy.settings | Additional policy settings merged into the policy file
|
| options/nixos/services.hercules-ci-agent.settings.binaryCachesPath | Path to a JSON file containing binary cache secret keys
|
| options/darwin/services.hercules-ci-agent.settings.binaryCachesPath | Path to a JSON file containing binary cache secret keys
|
| options/nixos/services.libeufin.nexus.settings.nexus-ebics.BANK_PUBLIC_KEYS_FILE | Filesystem location where Nexus should store the bank public keys.
|
| options/nixos/virtualisation.nixStore9pCache | Type of 9p cache to use when mounting host nix store. "none" provides
no caching. "loose" enables Linux's local VFS cache. "fscache" uses Linux's
fscache subsystem
|
| options/nixos/services.traccar.environmentFile | File containing environment variables to substitute in the configuration before starting Traccar
|
| options/nixos/services.vault.extraSettingsPaths | Configuration files to load besides the immutable one defined by the NixOS module
|
| options/nixos/services.victoriatraces.stateDir | Directory below /var/lib to store VictoriaTraces data
|
| options/nixos/networking.wireless.networks.<name>.auth | Use this option to configure advanced authentication methods
like EAP
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.documentRoot | The path of Apache's document root directory
|
| options/nixos/services.influxdb2.provision.initialSetup.tokenFile | API Token to set for the admin user
|
| options/nixos/services.mautrix-signal.environmentFile | File containing environment variables to be passed to the mautrix-signal service
|
| options/nixos/services.gitlab.secrets.activeRecordPrimaryKeyFile | A file containing the secret used to encrypt some rails data
in the DB
|
| options/nixos/services.xtreemfs.dir.replication.extraConfig | Configuration of XtreemFS DIR replication plugin
|
| options/nixos/services.xtreemfs.mrc.replication.extraConfig | Configuration of XtreemFS MRC replication plugin
|
| options/nixos/virtualisation.writableStoreUseTmpfs | Use a tmpfs for the writable store instead of writing to the VM's
own filesystem.
|
| options/nixos/services.reposilite.settings.keyPassword | Plaintext password used to unlock the Java KeyStore set in services.reposilite.settings.keyPath
|
| options/nixos/services.grafana.provision.dashboards.path | Path to YAML dashboard configuration
|
| options/nixos/system.forbiddenDependenciesRegexes | POSIX Extended Regular Expressions that match store paths that
should not appear in the system closure, with the exception of system.extraDependencies, which is not checked.
|
| options/nixos/services.nullmailer.config.remotes | A list of remote servers to which to send each message
|
| options/nixos/services.thanos.downsample.tracing.config | Tracing configuration
|
| options/nixos/services.murmur.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.limesurvey.httpd.virtualHost.documentRoot | The path of Apache's document root directory
|
| options/nixos/services.matrix-hookshot.registrationFile | Appservice registration file
|
| options/nixos/services.sourcehut.settings.mail.pgp-privkey | An absolute file path (which should be outside the Nix-store)
to an OpenPGP private key
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.password | The password for this entry
|
| options/nixos/boot.initrd.network.openvpn.configuration | The configuration file for OpenVPN.
Unless your bootloader supports initrd secrets, this configuration
is stored insecurely in the global Nix store.
|
| options/nixos/services.pinchflat.secretsFile | Secrets like SECRET_KEY_BASE and BASIC_AUTH_PASSWORD
should be passed to the service without adding them to the world-readable Nix store
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.cache_dir | The cache directory in which to store mail files while they are being
downloaded
|
| options/nixos/services.prometheus.pushgateway.stateDir | Directory below /var/lib to store metrics
|
| options/nixos/services.bluesky-pds.settings.PDS_BLOBSTORE_DISK_LOCATION | Store blobs at this location, set to null to use e.g
|
| options/nixos/services.prometheus.exporters.py-air-control.stateDir | Directory below /var/lib to store runtime data
|
| options/nixos/services.archisteamfarm.dataDir | The ASF home directory used to store all data
|
| options/nixos/services.sourcehut.settings."meta.sr.ht::billing".stripe-secret-key | An absolute file path (which should be outside the Nix-store)
to a secret key for Stripe
|
| options/nixos/services.restic.backups.<name>.rcloneConfig | Configuration for the rclone remote being used for backup
|
| options/nixos/services.chatgpt-retrieval-plugin.qdrantCollection | name of the qdrant collection used to store documents.
|
| options/nixos/services.grafana.provision.alerting.muteTimings.path | Path to YAML mute timings configuration
|
| options/nixos/services.step-ca.intermediatePasswordFile | Path to the file containing the password for the intermediate
certificate private key.
Make sure to use a quoted absolute path instead of a path literal
to prevent it from being copied to the globally readable Nix
store.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.basicSecretFile | The basic secret to use for this service
|
| options/nixos/services.sourcehut.settings."sr.ht".service-key | An absolute file path (which should be outside the Nix-store)
to a key used for encrypting session cookies
|
| options/nixos/services.paperless.environmentFile | Path to a file containing extra paperless config options in the systemd EnvironmentFile
format
|
| options/nixos/services.libeufin.nexus.settings.nexus-ebics.CLIENT_PRIVATE_KEYS_FILE | Filesystem location where Nexus should store the subscriber private keys.
|
| options/nixos/services.grafana.provision.alerting.policies.path | Path to YAML notification policies configuration
|
| options/nixos/services.grafana.provision.datasources.path | Path to YAML datasource configuration
|
| options/nixos/services.hercules-ci-agent.settings.clusterJoinTokenPath | Location of the cluster-join-token.key file
|
| options/darwin/services.hercules-ci-agent.settings.clusterJoinTokenPath | Location of the cluster-join-token.key file
|
| options/nixos/services.mautrix-whatsapp.environmentFile | File containing environment variables to be passed to the mautrix-whatsapp service
|
| options/nixos/systemd.services.<name>.confinement.fullUnit | Whether to include the full closure of the systemd unit file into the
chroot, instead of just the dependencies for the executables.
While it may be tempting to just enable this option to
make things work quickly, please be aware that this might add paths
to the closure of the chroot that you didn't anticipate
|
| options/nixos/services.victoriametrics.stateDir | Directory below /var/lib to store VictoriaMetrics metrics data
|
| options/nixos/networking.wireless.secretsFile | File consisting of lines of the form varname=value
to define variables for the wireless configuration
|
| options/nixos/networking.wireless.networks.<name>.pskRaw | Either the raw pre-shared key in hexadecimal format
or the name of the secret (as defined inside
networking.wireless.secretsFile and prefixed
with ext:) containing the network pre-shared key.
Be aware that this will be written to the Nix store
in plaintext! Always use an external reference.
The external secret can be either the plaintext
passphrase or the raw pre-shared key.
Mutually exclusive with psk and auth.
|
| options/nixos/services.suricata.settings.outputs | Configure the type of alert (and other) logging you would like
|
| options/nixos/services.pantalaimon-headless.instances.<name>.dataPath | The directory where pantalaimon should store its state such as the database file.
|
| options/nixos/services.grafana.provision.alerting.contactPoints.path | Path to YAML contact points configuration
|
| options/nixos/virtualisation.podman.networkSocket.tls.key | Path to the private key corresponding to the server certificate
|
| options/nixos/services.immichframe.settings.Accounts.*.ApiKey | API key to talk to the Immich server
|
| options/nixos/services.grafana.provision.alerting.templates.path | Path to YAML templates configuration
|
| options/nixos/services.tarsnap.keyfile | The keyfile which associates this machine with your tarsnap
account
|
| options/nixos/services.tarsnap.archives.<name>.keyfile | Set a specific keyfile for this archive
|
| options/nixos/services.veilid.settings.core.capabilities.disable | A list of capabilities to disable (for example, DHTV to say you cannot store DHT information).
|
| options/nixos/services.hedgedoc.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.linkwarden.environmentFile | Path of a file with extra environment variables to be loaded from disk
|
| options/nixos/services.gitolite.extraGitoliteRc | Extra configuration to append to the default ~/.gitolite.rc
|
| options/nixos/services.wstunnel.clients.<name>.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.wstunnel.servers.<name>.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.sourcehut.settings.webhooks.private-key | An absolute file path (which should be outside the Nix-store)
to a base64-encoded Ed25519 key for signing webhook payloads
|
| options/nixos/services.lubelogger.environmentFile | Path to a file containing extra LubeLogger config options in the systemd EnvironmentFile format
|
| options/nixos/services.journald.remote.settings.Remote.ServerKeyFile | A path to a SSL secret key file in PEM format
|
| options/nixos/services.teeworlds.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.journald.rateLimitBurst | Configures the rate limiting burst limit (number of messages per
interval) that is applied to all messages generated on the system
|
| options/nixos/services.dendrite.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/darwin/services.github-runners | Multiple GitHub Runners
|
| options/nixos/services.transmission.credentialsFile | Path to a JSON file to be merged with the settings
|
| options/darwin/services.buildkite-agents.<name>.hooks.environment | The environment hook will run before all other commands, and can be used
to set up secrets, data, etc
|
| options/nixos/services.grafana.settings.security.secret_key | Secret key used for signing
|
| options/nixos/services.mattermost.database.fromEnvironment | Use services.mattermost.environmentFile to configure the database instead of writing the database URI
to the Nix store
|
| options/nixos/services.prometheus.exporters.deluge.delugePassword | Password to connect to deluge server
|
| options/nixos/services.prometheus.exporters.buildkite-agent.tokenPath | The token from your Buildkite "Agents" page
|
| options/nixos/services.peering-manager.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/home-manager/services.activitywatch.watchers | Watchers to be included with the service alongside with their
configuration
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.cacert | Path to CA bundle file (PEM/X509)
|
| options/nixos/services.mattermost.environmentFile | Environment file (see systemd.exec(5)
"EnvironmentFile=" section for the syntax) which sets config options
for mattermost (see the Mattermost documentation)
|
| options/nixos/systemd.services.<name>.confinement.packages | Additional packages or strings with context to add to the closure of
the chroot
|
| options/nixos/virtualisation.credentials.<name>.text | Text content of the credential
|
| options/nixos/services.prometheus.exporters.mqtt.environmentFile | File to load as environment file
|
| options/nixos/services.fluent-bit.configurationFile | Fluent Bit configuration
|
| options/nixos/services.magnetico.web.credentials | The credentials to access the web interface, in case authentication is
enabled, in the format username:hash
|
| options/nixos/services.borgbackup.jobs.<name>.encryption.passphrase | The passphrase the backups are encrypted with
|
| options/nixos/services.prometheus.alertmanager-ntfy.extraConfigFiles | Config files to merge into the settings defined in services.prometheus.alertmanager-ntfy.settings
|
| options/nixos/virtualisation.fileSystems.<name>.neededForBoot | If set, this file system will be mounted in the initial ramdisk
|
| options/nixos/services.mqtt2influxdb.environmentFiles | File to load as environment file
|
| options/nixos/services.opentelemetry-collector.validateConfigFile | Whether to enable Validate configuration file.
|
| options/nixos/services.geoipupdate.settings.DatabaseDirectory | The directory to store the database files in
|
| options/nixos/services.wstunnel.clients.<name>.upgradeCredentials | Use these credentials to authenticate during the HTTP upgrade request
(Basic authorization type, USER:[PASS]).
Passwords specified here will be world-readable in the Nix store!
To pass a password to the service, point the environmentFile option
to a file containing HTTP_PASSWORD=<your-password-here> and set this
option to <user>:$HTTP_PASSWORD
|
| options/nixos/services.vaultwarden.environmentFile | Additional environment file or files as defined in systemd.exec(5)
|
| options/nixos/services.litestream.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.prometheus.exporters.restic.rcloneConfig | Configuration for the rclone remote being used for backup
|
| options/nixos/services.gitlab.secrets.activeRecordDeterministicKeyFile | A file containing the secret used to encrypt some rails data in a deterministic way
in the DB
|
| options/nixos/services.nextcloud.config.objectstore.s3.verify_bucket_exists | Create the objectstore bucket if it does not exist.
|
| options/nixos/services.fastnetmon-advanced.enableAdvancedTrafficPersistence | Store historical flow data in clickhouse
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.id | A unique identifier for this authentication token
|
| options/nixos/services.authelia.instances.<name>.environmentVariables | Additional environment variables to provide to authelia
|
| options/nixos/services.nipap.settings.auth.auth_cache_timeout | Seconds to store cached auth entries for.
|
| options/nixos/services.prometheus.exporters.snmp.environmentFile | EnvironmentFile as defined in systemd.exec(5)
|
| options/nixos/services.prometheus.exporters.pgbouncer.connectionString | Connection string for accessing pgBouncer
|
| options/nixos/services.prometheus.exporters.php-fpm.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/virtualisation.oci-containers.containers.<name>.volumes | List of volumes to attach to this container
|
| options/nixos/services.amazon-cloudwatch-agent.configurationFile | Amazon CloudWatch Agent configuration file
|
| options/nixos/services.amazon-cloudwatch-agent.commonConfigurationFile | Amazon CloudWatch Agent common configuration
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.wpaPasswordFile | Sets the password for WPA-PSK
|
| options/nixos/services.prometheus.exporters.postgres.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.gitlab-runner.services.<name>.registrationConfigFile | Absolute path to a file with environment variables
used for gitlab-runner registration with runner registration
tokens
|
| options/nixos/services.grafana.provision.datasources.settings.datasources.*.secureJsonData | Datasource specific secure configuration
|
| options/nixos/services.gitlab-runner.services.<name>.authenticationTokenConfigFile | Absolute path to a file containing environment variables used for
gitlab-runner registrations with runner authentication tokens
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords | Sets allowed passwords for WPA3-SAE
|
| options/nixos/services.veilid.settings.core.protected_store.allow_insecure_fallback | If we can't use system-provided secure storage, should we proceed anyway?
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.wpaPassword | Sets the password for WPA-PSK that will be converted to the pre-shared key
|
| options/nixos/users.users.<name>.initialPassword | Specifies the initial password for the user, i.e. the
password assigned if the user does not already exist
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswordsFile | Sets the password for WPA3-SAE
|
| options/nixos/users.extraUsers.<name>.initialPassword | Specifies the initial password for the user, i.e. the
password assigned if the user does not already exist
|
| options/nixos/services.sourcehut.settings."hg.sr.ht".clone_bundle_threshold | .hg/store size (in MB) past which the nightly job generates clone bundles.
|
| options/nixos/services.veilid.settings.core.protected_store.always_use_insecure_storage | Should we bypass any attempt to use system-provided secure storage?
|
| options/nixos/services.nixseparatedebuginfod2.substituters | nix substituter to fetch debuginfo from
|
| packages/nixpkgs/mas | Mac App Store command line interface |
| packages/nixpkgs/steam | Digital distribution platform |
| packages/nixpkgs/enpass-mac | Choose your own safest place to store passwords |
| packages/nixpkgs/garnet | Remote cache-store from Microsoft Research |
| packages/nixpkgs/ocs-url | Open Collaboration System for use with DE store websites |
| packages/nixpkgs/etcd | Distributed reliable key-value store for the most critical data of a distributed system |
| packages/nixpkgs/git-publish | Prepare and store patch revisions as git tags |
| packages/nixpkgs/hbase2 | Distributed, scalable, big data store |
| packages/nixpkgs/wofi-pass | Script to make wofi work with password-store |
| packages/nixpkgs/rofi-pass | Script to make rofi work with password-store |
| packages/nixpkgs/c2fmzq | Securely encrypt, store, and share files, including but not limited to pictures and videos |
| packages/nixpkgs/gokey | Vault-less password store |
| packages/nixpkgs/ssmsh | Interactive shell for AWS Parameter Store |
| packages/nixpkgs/bazaar | FlatHub-first app store for GNOME |
| packages/nixpkgs/serigy | Store important information from your clipboard selectively and securely |
| packages/nixpkgs/skate | Personal multi-machine syncable key value store |
| packages/nixpkgs/nix-du | Tool to determine which gc-roots take space in your nix store |
| packages/nixpkgs/nix-web | Web interface for the Nix store |
| packages/nixpkgs/etcd_3_6 | Distributed reliable key-value store for the most critical data of a distributed system |
| packages/nixpkgs/imgpkg | Store application configuration files in Docker/OCI registries |
| packages/nixpkgs/balatro | Poker roguelike |
| packages/nixpkgs/etcd_3_5 | Distributed reliable key-value store for the most critical data of a distributed system |
| packages/nixpkgs/plakar | Encrypted, queryable backups for engineers based on an immutable data store and portable archives |
| packages/nixpkgs/cocoon | ATProtocol Personal Data Server written in Go with a SQLite block and blob store |
| packages/nixpkgs/hbase_2_6 | Distributed, scalable, big data store |
| packages/nixpkgs/hbase_3_0 | Distributed, scalable, big data store |
| packages/nixpkgs/rofi-pass-wayland | Script to make rofi work with password-store |
| packages/nixpkgs/secretive | Store SSH keys in the Secure Enclave |
| packages/nixpkgs/hbase | Distributed, scalable, big data store |
| packages/nixpkgs/s2png | Store any data in PNG images |
| packages/nixpkgs/etcd_3_4 | Distributed reliable key-value store for the most critical data of a distributed system |
| packages/nixpkgs/hbase3 | Distributed, scalable, big data store |
| packages/nixpkgs/chamber | Tool for managing secrets by storing them in AWS SSM Parameter Store |
| packages/nixpkgs/garage | S3-compatible object store for small self-hosted geo-distributed deployments |
| packages/nixpkgs/kepler | NIST-based CVE lookup store and API powered by Rust |
| packages/nixpkgs/dvgrab | Receive and store audio & video over IEEE1394 |
| packages/nixpkgs/nix-serve | Utility for sharing a Nix store as a binary cache |
| packages/nixpkgs/steam-unwrapped | Digital distribution platform |
| packages/nixpkgs/ipatool | Command-line tool that allows searching and downloading app packages (known as ipa files) from the iOS App Store |
| packages/nixpkgs/sidequest | Open app store and side-loading tool for Android-based VR devices such as the Oculus Go, Oculus Quest or Moverio BT 300 |
| packages/nixpkgs/garage_1 | S3-compatible object store for small self-hosted geo-distributed deployments |
| packages/nixpkgs/garage_2 | S3-compatible object store for small self-hosted geo-distributed deployments |
| packages/nixpkgs/eureka-ideas | CLI tool to input and store your ideas without leaving the terminal |
| packages/nixpkgs/gnome-keyring | Collection of components in GNOME that store secrets, passwords, keys, certificates and make them available to applications |
| packages/nixpkgs/comical | Viewer of CBR and CBZ files, often used to store scanned comics |
| packages/nixpkgs/softhsm | Cryptographic store accessible through a PKCS #11 interface |
| packages/nixpkgs/trillian | Transparent, highly scalable and cryptographically verifiable data store |
| packages/nixpkgs/hbase_2_4 | Distributed, scalable, big data store |
| packages/nixpkgs/hbase_2_5 | Distributed, scalable, big data store |
| packages/nixpkgs/ace-of-penguins | Solitaire games in X11 |
| packages/nixpkgs/gnome-software | Software store that lets you install and update applications and system extensions |
| packages/nixpkgs/garage_1_x | S3-compatible object store for small self-hosted geo-distributed deployments |
| packages/nixpkgs/nix-query-tree-viewer | GTK viewer for the output of `nix store --query --tree` |
| packages/nixpkgs/paperkey | Store OpenPGP or GnuPG on paper |
| packages/nixpkgs/garage_0_9 | S3-compatible object store for small self-hosted geo-distributed deployments |
| packages/nixpkgs/garage_0_8 | S3-compatible object store for small self-hosted geo-distributed deployments |
| packages/nixpkgs/imagelol | Simple program to store a file into a PNG image |
| packages/nixpkgs/nix-tree | Interactively browse a Nix store paths dependencies |
| packages/nixpkgs/opencloud | OpenCloud gives you a secure and private way to store, access, and share your files |
| packages/nixpkgs/s3backer | FUSE-based single file backing store via Amazon S3 |
| packages/nixpkgs/redis | Open source, advanced key-value store |
| packages/nixpkgs/nika-fonts | Persian/Arabic Open Source Font |
| packages/nixpkgs/redict | Distributed key/value store |
| packages/nixpkgs/emulsion-palette | Store your color palettes in an easy way |
| packages/nixpkgs/leafnode | Implementation of a store & forward NNTP proxy, under development |
| packages/nixpkgs/c-blosc2 | Fast, compressed, persistent binary data store library for C |
| packages/nixpkgs/leafnode1 | Implementation of a store & forward NNTP proxy, stable release |
| packages/nixpkgs/caerbannog | Mobile-friendly Gtk frontend for password-store |
| packages/nixpkgs/git-secret | Bash-tool to store your private data inside a git repository |
| packages/nixpkgs/garage_0_9_4 | S3-compatible object store for small self-hosted geo-distributed deployments |
| packages/nixpkgs/garage_1_3_0 | S3-compatible object store for small self-hosted geo-distributed deployments |
| packages/nixpkgs/garage_0_8_7 | S3-compatible object store for small self-hosted geo-distributed deployments |
| packages/nixpkgs/garage_2_1_0 | S3-compatible object store for small self-hosted geo-distributed deployments |
| packages/nixpkgs/nncp | Secure UUCP-like store-and-forward exchanging |
| packages/nixpkgs/groonga | Open-source fulltext search engine and column store |
| packages/nixpkgs/icepeak | A fast JSON document store with push notification support |
| packages/nixpkgs/rocksdb | Library that provides an embeddable, persistent key-value store for fast storage |
| packages/nixpkgs/behdad-fonts | Persian/Arabic Open Source Font |
| packages/nixpkgs/nix-binary-cache | Set of scripts to serve the Nix store as a binary cache |
| packages/nixpkgs/blackbox | Safely store secrets in a VCS repo |
| packages/nixpkgs/tinysparql | Desktop-neutral user information store, search tool and indexer |
| packages/nixpkgs/foundationdb | Open source, distributed, transactional key-value store |
| packages/nixpkgs/owntracks-recorder | Store and access data published by OwnTracks apps |
| packages/nixpkgs/localsearch | Desktop-neutral user information store, search tool and indexer |
| packages/nixpkgs/rocksdb_8_3 | Library that provides an embeddable, persistent key-value store for fast storage |
| packages/nixpkgs/hyperblobs | Blob Store for Hypercore |
| packages/nixpkgs/rocksdb_7_10 | Library that provides an embeddable, persistent key-value store for fast storage |
| packages/nixpkgs/rocksdb_9_10 | Library that provides an embeddable, persistent key-value store for fast storage |
| packages/nixpkgs/rocksdb_8_11 | Library that provides an embeddable, persistent key-value store for fast storage |
| packages/nixpkgs/rocksdb_6_23 | Library that provides an embeddable, persistent key-value store for fast storage |
| packages/nixpkgs/distribution | Toolkit to pack, ship, store, and deliver container content |
| packages/nixpkgs/gitlab-container-registry | GitLab Docker toolset to pack, ship, store, and deliver content |
| packages/nixpkgs/git-credential-keepassxc | Helper that allows Git (and shell scripts) to use KeePassXC as credential store |
| packages/nixpkgs/pass | Stores, retrieves, generates, and synchronizes passwords securely |
| packages/nixpkgs/pass-nodmenu | Stores, retrieves, generates, and synchronizes passwords securely |
| packages/nixpkgs/pass-wayland | Stores, retrieves, generates, and synchronizes passwords securely |
| packages/nixpkgs/eventstore | Event sourcing database with processing logic in JavaScript |
| packages/nixpkgs/fishPlugins.sponge | Keeps your fish shell history clean from typos, incorrectly used commands and everything you don't want to store due to privacy reasons |
| packages/nixpkgs/tmuxPlugins.pass | Password-store browser using fzf in tmux |
| packages/nixpkgs/ocamlPackages.irmin-chunk | Irmin backend which allow to store values into chunks |
| packages/nixpkgs/ocamlPackages_latest.irmin-chunk | Irmin backend which allow to store values into chunks |
| packages/nixpkgs/python313Packages.redis | Python client for Redis key-value store |
| packages/nixpkgs/python314Packages.redis | Python client for Redis key-value store |
| packages/nixpkgs/python313Packages.minidb | SQLite3-based store for Python objects |
| packages/nixpkgs/python314Packages.minidb | SQLite3-based store for Python objects |
| packages/nixpkgs/passExtensions.pass-file | Pass extension that allows to add files to password-store |
| packages/nixpkgs/passExtensions.pass-tomb | Pass extension that keeps the password store encrypted inside a tomb |
| packages/nixpkgs/python313Packages.valkey | Python client for Redis key-value store |
| packages/nixpkgs/python314Packages.valkey | Python client for Redis key-value store |
| packages/nixpkgs/pantheon.appcenter | Open, pay-what-you-want app store for indie developers, designed for elementary OS |
| packages/nixpkgs/python312Packages.redis | Python client for Redis key-value store |
| packages/nixpkgs/python312Packages.minidb | SQLite3-based store for Python objects |
| packages/nixpkgs/perlPackages.MLDBM | Store multi-level Perl hash structure in single level tied hash |
| packages/nixpkgs/haskellPackages.tripLL | A very simple triple store |
| packages/nixpkgs/python312Packages.valkey | Python client for Redis key-value store |
| packages/nixpkgs/python313Packages.eth-keyfile | Tools for handling the encrypted keyfile format used to store private keys |
| packages/nixpkgs/python314Packages.eth-keyfile | Tools for handling the encrypted keyfile format used to store private keys |
| packages/nixpkgs/haskellPackages.Neks | Simple networked key/value store |
| packages/nixpkgs/haskellPackages.kawa | Key-value store in single files |
| packages/nixpkgs/perl5Packages.MLDBM | Store multi-level Perl hash structure in single level tied hash |
| packages/nixpkgs/akkuPackages.r6rs-redis | Client for the Redis key-value store |
| packages/nixpkgs/python313Packages.keyring-pass | Password Store (pass) backend for python's keyring |
| packages/nixpkgs/python314Packages.keyring-pass | Password Store (pass) backend for python's keyring |
| packages/nixpkgs/haskellPackages.bdcs | Tools for managing a content store of software packages |
| packages/nixpkgs/haskellPackages.riak | A Haskell client for the Riak decentralized data store |
| packages/nixpkgs/haskellPackages.etcd | Client for etcd, a highly-available key value store |
| packages/nixpkgs/python313Packages.simplekv | Simple key-value store for binary data |
| packages/nixpkgs/python314Packages.simplekv | Simple key-value store for binary data |
| packages/nixpkgs/haskellPackages.arena | A journaled data store |
| packages/nixpkgs/python313Packages.keyring | Store and access your passwords safely |
| packages/nixpkgs/python314Packages.keyring | Store and access your passwords safely |
| packages/nixpkgs/python313Packages.itunespy | Simple library to fetch data from the iTunes Store API |
| packages/nixpkgs/python314Packages.itunespy | Simple library to fetch data from the iTunes Store API |
| packages/nixpkgs/haskellPackages.vault | a persistent store for values of arbitrary types |
| packages/nixpkgs/haskellPackages.HongoDB | A Simple Key Value Store |
| packages/nixpkgs/python313Packages.pytest-expect | py.test plugin to store test expectations and mark tests based on them |
| packages/nixpkgs/python314Packages.pytest-expect | py.test plugin to store test expectations and mark tests based on them |
| packages/nixpkgs/haskellPackages.nix-tree | Interactively browse a Nix store paths dependencies |
| packages/nixpkgs/haskellPackages.cache | An in-memory key/value store with expiration support |
| packages/nixpkgs/haskellPackages.nixdu | Interactively browse a Nix store paths dependencies |
| packages/nixpkgs/haskellPackages.key-vault | Store of values of arbitrary types |
| packages/nixpkgs/haskellPackages.gitson | A document store library for Git + JSON |
| packages/nixpkgs/perlPackages.HashMultiValue | Store multiple values per key |
| packages/nixpkgs/python313Packages.docker-pycreds | Python bindings for the docker credentials store API |
| packages/nixpkgs/python314Packages.docker-pycreds | Python bindings for the docker credentials store API |
| packages/nixpkgs/python312Packages.eth-keyfile | Tools for handling the encrypted keyfile format used to store private keys |
| packages/nixpkgs/texlivePackages.dbshow | A package to store and display data with custom filters, orders, and styles |
| packages/nixpkgs/haskellPackages.haskey | A transactional, ACID compliant, embeddable key-value store |
| packages/nixpkgs/python312Packages.keyring-pass | Password Store (pass) backend for python's keyring |
| packages/nixpkgs/perl540Packages.MLDBM | Store multi-level Perl hash structure in single level tied hash |
| packages/nixpkgs/perl538Packages.MLDBM | Store multi-level Perl hash structure in single level tied hash |
| packages/nixpkgs/perl5Packages.HashMultiValue | Store multiple values per key |
| packages/nixpkgs/python312Packages.keyring | Store and access your passwords safely |
| packages/nixpkgs/python312Packages.simplekv | Simple key-value store for binary data |
| packages/nixpkgs/python312Packages.itunespy | Simple library to fetch data from the iTunes Store API |
| packages/nixpkgs/texlivePackages.metastr | Store and compose strings |
| packages/nixpkgs/python312Packages.pytest-expect | py.test plugin to store test expectations and mark tests based on them |
| packages/nixpkgs/python313Packages.pytest-harvest | Store data created during your `pytest` tests execution, and retrieve it at the end of the session, e.g. for applicative benchmarking purposes |
| packages/nixpkgs/python314Packages.pytest-harvest | Store data created during your `pytest` tests execution, and retrieve it at the end of the session, e.g. for applicative benchmarking purposes |
| packages/nixpkgs/haskellPackages.libmdbx | Bindings for libmdbx, an embedded key/value store |
| packages/nixpkgs/haskellPackages.icepeak | A fast JSON document store with push notification support |
| packages/nixpkgs/haskellPackages.io-storage | A key-value store in the IO monad |
| packages/nixpkgs/haskellPackages.git-remote-ipfs | Git remote helper to store git objects on IPFS |
| packages/nixpkgs/python312Packages.docker-pycreds | Python bindings for the docker credentials store API |
| packages/nixpkgs/chickenPackages_5.chickenEggs.rocksdb | Bindings to Facebooks's RocksDB Key-Value Store |
| packages/nixpkgs/chickenPackages_5.chickenEggs.leveldb | Bindings to Google's LevelDB Key-Value Store |
| packages/nixpkgs/haskellPackages.mysql-json-table | Using MySQL to store id-to-json tables |
| packages/nixpkgs/perl538Packages.HashMultiValue | Store multiple values per key |
| packages/nixpkgs/perl540Packages.HashMultiValue | Store multiple values per key |
| packages/nixpkgs/haskellPackages.libgraph | Store and manipulate data in a graph |
| packages/nixpkgs/python313Packages.kde-material-you-colors | Automatic color scheme generator from your wallpaper for KDE Plasma powered by Material You |
| packages/nixpkgs/python314Packages.kde-material-you-colors | Automatic color scheme generator from your wallpaper for KDE Plasma powered by Material You |
| packages/nixpkgs/haskellPackages.HsOpenSSL-x509-system | Use the system's native CA certificate store with HsOpenSSL |
| packages/nixpkgs/python312Packages.pytest-harvest | Store data created during your `pytest` tests execution, and retrieve it at the end of the session, e.g. for applicative benchmarking purposes |
| packages/nixpkgs/python313Packages.sqlalchemy-utc | SQLAlchemy type to store aware datetime values |
| packages/nixpkgs/python314Packages.sqlalchemy-utc | SQLAlchemy type to store aware datetime values |
| packages/nixpkgs/python312Packages.jsonfield | Reusable model field that allows you to store validated JSON, automatically handling serialization to and from the database |
| packages/nixpkgs/python313Packages.jsonfield | Reusable model field that allows you to store validated JSON, automatically handling serialization to and from the database |
| packages/nixpkgs/python313Packages.django-simple-history | Module to store Django model state on every create/update/delete |
| packages/nixpkgs/python314Packages.django-simple-history | Module to store Django model state on every create/update/delete |
| packages/nixpkgs/haskellPackages.amazonka-ebs | Amazon Elastic Block Store SDK |
| packages/nixpkgs/python313Packages.django-i18nfield | Store internationalized strings in Django models |
| packages/nixpkgs/python314Packages.django-i18nfield | Store internationalized strings in Django models |
| packages/nixpkgs/python313Packages.django-hierarkey | Flexible and powerful hierarchical key-value store for your Django models |
| packages/nixpkgs/python314Packages.django-hierarkey | Flexible and powerful hierarchical key-value store for your Django models |
| packages/nixpkgs/haskellPackages.wai-session-mysql | MySQL backed Wai session store |
| packages/nixpkgs/texlivePackages.statistik | Store statistics of a document |
| packages/nixpkgs/haskellPackages.quantum-random | Retrieve, store and manage real quantum random data |
| packages/nixpkgs/haskellPackages.mealstrom | Manipulate FSMs and store them in PostgreSQL |
| packages/nixpkgs/texlivePackages.readarray | Read, store and recall array-formatted data |
| packages/nixpkgs/texlivePackages.jsonparse | Parse, store and access JSON data in LaTeX documents |
| packages/nixpkgs/python312Packages.kde-material-you-colors | Automatic color scheme generator from your wallpaper for KDE Plasma powered by Material You |
| packages/nixpkgs/python313Packages.starlette-context | Middleware for Starlette that allows you to store and access the context data of a request |
| packages/nixpkgs/python314Packages.starlette-context | Middleware for Starlette that allows you to store and access the context data of a request |
| packages/nixpkgs/python312Packages.sqlalchemy-utc | SQLAlchemy type to store aware datetime values |
| packages/nixpkgs/python312Packages.django-simple-history | Module to store Django model state on every create/update/delete |
| packages/nixpkgs/python312Packages.django-i18nfield | Store internationalized strings in Django models |
| packages/nixpkgs/python312Packages.django-hierarkey | Flexible and powerful hierarchical key-value store for your Django models |
| packages/nixpkgs/texlivePackages.cntperchap | Store counter values per chapter |
| packages/nixpkgs/haskellPackages.superevent | A simple opinionated event store implementation |
| packages/nixpkgs/haskellPackages.compactmap | A read-only memory-efficient key-value store |
| packages/nixpkgs/python312Packages.starlette-context | Middleware for Starlette that allows you to store and access the context data of a request |
| packages/nixpkgs/python313Packages.compressed-tensors | Safetensors extension to efficiently store sparse quantized tensors on disk |
| packages/nixpkgs/python314Packages.compressed-tensors | Safetensors extension to efficiently store sparse quantized tensors on disk |
| packages/nixpkgs/gnomeExtensions.screenshot-tool | Conveniently create, copy, store and upload screenshots |
| packages/nixpkgs/lomiri.libusermetrics | Enables apps to locally store interesting numerical data for later presentation |
| packages/nixpkgs/python313Packages.django-currentuser | Conveniently store reference to request user on thread/db level |
| packages/nixpkgs/python314Packages.django-currentuser | Conveniently store reference to request user on thread/db level |
| packages/nixpkgs/python312Packages.compressed-tensors | Safetensors extension to efficiently store sparse quantized tensors on disk |
| packages/nixpkgs/matrix-synapse-plugins.matrix-synapse-s3-storage-provider | Synapse storage provider to fetch and store media in Amazon S3 |
| packages/nixpkgs/python312Packages.django-currentuser | Conveniently store reference to request user on thread/db level |
| packages/nixpkgs/haskellPackages.wai-session-postgresql | PostgreSQL backed Wai session store |
| packages/nixpkgs/haskellPackages.terraform-http-backend-pass | HTTP backend to store terraform state using pass and git |
| packages/nixpkgs/haskellPackages.keyvaluehash | Pure Haskell key/value store implementation |
| packages/nixpkgs/mpvScripts.eisa01.simplehistory | Store videos in a history file, continue watching your last played or resume previously played videos, manage and play from your history, and more |
| packages/nixpkgs/haskellPackages.clientsession | Securely store session data in a client-side cookie |
| packages/nixpkgs/haskellPackages.wai-session-tokyocabinet | Session store based on Tokyo Cabinet |
| packages/nixpkgs/haskellPackages.morphisms-functors-inventory | Inventory is state and store |
| packages/nixpkgs/haskellPackages.wai-session-clientsession | Session store based on clientsession |
| packages/nixpkgs/emacsPackages.password-store | |
| packages/nixpkgs/emacsPackages.password-store-otp | |
| packages/nixpkgs/emacsPackages.password-store-menu | |
| packages/nixpkgs/sub-store | Advanced Subscription Manager for QX, Loon, Surge, Stash, Egern and Shadowrocket |
| packages/nixpkgs/sbclPackages.cl-store | |
| packages/nixpkgs/lomiri.trust-store | Common implementation of a trust store to be used by trusted helpers |
| packages/nixpkgs/haskellPackages.store | Fast binary serialization |
| packages/nixpkgs/sbclPackages.cl-store-tests | |
| packages/nixpkgs/cosmic-store | App Store for the COSMIC Desktop Environment |
| packages/nixpkgs/sbclPackages.cl-binary-store | |
| packages/nixpkgs/python313Packages.ds-store | Manipulate Finder |
| packages/nixpkgs/python314Packages.ds-store | Manipulate Finder |
| packages/nixpkgs/nix-store-gcs-proxy | HTTP nix store that proxies requests to Google Storage |
| packages/nixpkgs/haskellPackages.pg-store | Simple storage interface to PostgreSQL |
| packages/nixpkgs/config-store | Simple key-value store designed to be used from shell scripts written in Rust |
| packages/nixpkgs/haskellPackages.cas-store | A content-addressed storage |
| packages/nixpkgs/python313Packages.keyrings-passwordstore | Keyring backend for password-store |
| packages/nixpkgs/python312Packages.keyrings-passwordstore | Keyring backend for password-store |
| packages/nixpkgs/haskellPackages.hnix-store-db | Nix store database support |
| packages/nixpkgs/haskellPackages.mpi-hs-store | MPI bindings for Haskell |
| packages/nixpkgs/haskellPackages.hash-store | Hash as cache |
| packages/nixpkgs/haskellPackages.store-core | Fast and lightweight binary serialization |
| packages/nixpkgs/haskellPackages.x509-store | X.509 collection accessing and storing methods |
| packages/nixpkgs/haskellPackages.data-store | Type safe, in-memory dictionary with multidimensional keys |
| packages/nixpkgs/gnomeExtensions.passwordstore-manager | Access your passwords from pass (passwordstore.org) from the GNOME Shell. |
| packages/nixpkgs/haskellPackages.hnix-store-core | Core effects for interacting with the Nix store |
| packages/nixpkgs/haskellPackages.hnix-store-nar | NAR file format |
| packages/nixpkgs/haskellPackages.delta-store | Facilities for storing a Haskell value, using delta types |
| packages/nixpkgs/sub-store-frontend | Sub-Store Progressive Web App |
| packages/nixpkgs/sbclPackages.lack-session-store-dbi | |
| packages/nixpkgs/storeBackup | Backup suite that stores files on other disks |
| packages/nixpkgs/haskellPackages.hnix-store-json | JSON serialization for core types |
| packages/nixpkgs/haskellPackages.binary-store | Format to store data using the binary transform |
| packages/nixpkgs/haskellPackages.safe-money-store | Instances from the store library for the safe-money library |
| packages/nixpkgs/rubyPackages.redis-store | |
| packages/nixpkgs/mstore | Molecular structure store for testing |
| packages/nixpkgs/haskellPackages.content-store | Store and retrieve data from an on-disk store |
| packages/nixpkgs/python313Packages.pycrdt-store | Persistent storage for pycrdt |
| packages/nixpkgs/python314Packages.pycrdt-store | Persistent storage for pycrdt |
| packages/nixpkgs/python312Packages.craft-store | Interfaces for communicating with Canonical Stores (e.g |
| packages/nixpkgs/python313Packages.craft-store | Interfaces for communicating with Canonical Stores (e.g |
| packages/nixpkgs/python312Packages.ds-store | Manipulate Finder |
| packages/nixpkgs/haskellPackages.hnix-store-tests | Test utilities and instances |
| packages/nixpkgs/haskellPackages.hnix-store-remote | Remote hnix store |
| packages/nixpkgs/sbclPackages.lack-session-store-redis | |
| packages/nixpkgs/haskellPackages.foreign-store | Store a stable pointer in a foreign context to be retrieved later |
| packages/nixpkgs/sbclPackages.cl4store | |
| packages/nixpkgs/haskellPackages.haskoin-store-data | Data for Haskoin Store |
| packages/nixpkgs/haskellPackages.haskoin-store | Storage and index for Bitcoin and Bitcoin Cash |
| packages/nixpkgs/python312Packages.pycrdt-store | Persistent storage for pycrdt |
| packages/nixpkgs/haskellPackages.hnix-store-core_0_6_1_0 | Core effects for interacting with the Nix store |
| packages/nixpkgs/haskellPackages.hnix-store-core_0_8_0_0 | Core types used for interacting with the Nix store |
| packages/nixpkgs/haskellPackages.crypton-x509-store | X.509 collection accessing and storing methods |
| packages/nixpkgs/haskellPackages.hnix-store-readonly | Read-only Nix store |
| packages/nixpkgs/haskellPackages.safecopy-store | Binary serialization with version control |
| packages/nixpkgs/haskellPackages.store-streaming | Streaming interfaces for `store` |
| packages/nixpkgs/python313Packages.azure-datalake-store | This project is the Python filesystem library for Azure Data Lake Store |
| packages/nixpkgs/python314Packages.azure-datalake-store | This project is the Python filesystem library for Azure Data Lake Store |
| packages/nixpkgs/gnomeExtensions.commands-store | A simple GNOME Shell extension to store and manage commands |
| packages/nixpkgs/python313Packages.azure-mgmt-datalake-store | This is the Microsoft Azure Data Lake Store Management Client Library |
| packages/nixpkgs/python314Packages.azure-mgmt-datalake-store | This is the Microsoft Azure Data Lake Store Management Client Library |
| packages/nixpkgs/haskellPackages.hnix-store-remote_0_7_0_0 | Remote hnix store |
| packages/nixpkgs/haskellPackages.hercules-ci-cnix-store | Haskell bindings for Nix's libstore |
| packages/nixpkgs/rubyPackages_3_2.redis-store | |
| packages/nixpkgs/rubyPackages_3_1.redis-store | |
| packages/nixpkgs/rubyPackages_3_5.redis-store | |
| packages/nixpkgs/rubyPackages_4_0.redis-store | |
| packages/nixpkgs/rubyPackages_3_4.redis-store | |
| packages/nixpkgs/rubyPackages_3_3.redis-store | |
| packages/nixpkgs/python312Packages.azure-datalake-store | This project is the Python filesystem library for Azure Data Lake Store |
| packages/nixpkgs/haskellPackages.credential-store | Library to access secure credential storage providers |
| packages/nixpkgs/linyaps-web-store-installer | URI Handler for Linyaps Web Store |
| packages/nixpkgs/python312Packages.azure-mgmt-datalake-store | This is the Microsoft Azure Data Lake Store Management Client Library |
| packages/nixpkgs/haskellPackages.eventsource-stub-store | An in-memory stub store implementation |
| packages/nixpkgs/python313Packages.langgraph-store-mongodb | Integrations between MongoDB, Atlas, LangChain, and LangGraph |
| packages/nixpkgs/python314Packages.langgraph-store-mongodb | Integrations between MongoDB, Atlas, LangChain, and LangGraph |
| packages/nixpkgs/haskellPackages.eventsource-store-specs | Provides common test specification for Store implementation |
| packages/nixpkgs/redstore | HTTP interface to Redland RDF store |
| packages/nixpkgs/yaziPlugins.restore | Undo/Recover trashed files/folders |
| packages/nixpkgs/rPackages.RestoreNet | |
| packages/nixpkgs/rPackages.simRestore | |
| packages/nixpkgs/python312Packages.langgraph-store-mongodb | Integrations between MongoDB, Atlas, LangChain, and LangGraph |
| packages/nixpkgs/metastore | Store and restore metadata from a filesystem |
| packages/nixpkgs/ocamlPackages.xenstore | Xenstore protocol in pure OCaml |
| packages/nixpkgs/haskellPackages.eventsource-geteventstore-store | GetEventStore store implementation |
| packages/nixpkgs/vimPlugins.restore-view-vim | |
| packages/nixpkgs/sbclPackages.weblocks-stores | |
| packages/nixpkgs/texlivePackages.storecmd | Store the name of a defined command in a container |
| packages/nixpkgs/ocamlPackages.xenstore-tool | Command line tool for interfacing with xenstore |
| packages/nixpkgs/sbclPackages.specialization-store | |
| packages/nixpkgs/haskellPackages.crypton-x509-store_1_6_11 | X.509 collection accessing and storing methods |
| packages/nixpkgs/ocamlPackages_latest.xenstore | Xenstore protocol in pure OCaml |
| packages/nixpkgs/emacsPackages.pdf-view-restore | |
| packages/nixpkgs/haskellPackages.pwstore-cli | Command line interface for the pwstore library |
| packages/nixpkgs/sbclPackages.specialization-store-tests | |
| packages/nixpkgs/haskellPackages.pwstore-fast | Secure password storage |
| packages/nixpkgs/python313Packages.epicstore-api | Epic Games Store Web API Wrapper written in Python |
| packages/nixpkgs/python314Packages.epicstore-api | Epic Games Store Web API Wrapper written in Python |
| packages/nixpkgs/python313Packages.sigstore | Codesigning tool for Python packages |
| packages/nixpkgs/python314Packages.sigstore | Codesigning tool for Python packages |
| packages/nixpkgs/texlivePackages.storebox | Storing information for reuse |
| packages/nixpkgs/emacsPackages.keystore-mode | |
| packages/nixpkgs/haskellPackages.xenstore | Xenstore client access |
| packages/nixpkgs/haskellPackages.keystore | Managing stores of secret things |
| packages/nixpkgs/rPackages.neonstore | |
| packages/nixpkgs/ocamlPackages_latest.xenstore-tool | Command line tool for interfacing with xenstore |
| packages/nixpkgs/tmuxPlugins.lazy-restore | session manager plugin that allows sessions to be lazily restored in order to save memory and processing power |
| packages/nixpkgs/nix-store-veritysetup-generator | Systemd unit generator for a verity protected Nix Store |
| packages/nixpkgs/emacsPackages.scroll-restore | |
| packages/nixpkgs/corestore | Simple corestore that wraps a random-access-storage module |
| packages/nixpkgs/sbclPackages.specialization-store-features | |
| packages/nixpkgs/haskellPackages.eventstore | EventStore TCP Client |
| packages/nixpkgs/python312Packages.epicstore-api | Epic Games Store Web API Wrapper written in Python |
| packages/nixpkgs/python313Packages.llama-index-graph-stores-neo4j | LlamaIndex Graph Store Integration for Neo4j |
| packages/nixpkgs/python314Packages.llama-index-graph-stores-neo4j | LlamaIndex Graph Store Integration for Neo4j |
| packages/nixpkgs/haskellPackages.filestore | Interface for versioning file stores |
| packages/nixpkgs/haskellPackages.firestore | Wrapper for Google Firestore/Datastore API |
| packages/nixpkgs/haskellPackages.megastore | Bulk image or strict bytestring storage |
| packages/nixpkgs/python313Packages.llama-index-graph-stores-nebula | LlamaIndex Graph Store Integration for Nebula |
| packages/nixpkgs/python314Packages.llama-index-graph-stores-nebula | LlamaIndex Graph Store Integration for Nebula |
| packages/nixpkgs/brickstore | BrickLink offline management tool |
| packages/nixpkgs/python313Packages.sigstore-models | Pydantic-based, protobuf-free data models for Sigstore |
| packages/nixpkgs/python314Packages.sigstore-models | Pydantic-based, protobuf-free data models for Sigstore |
| packages/nixpkgs/python313Packages.llama-index-vector-stores-chroma | LlamaIndex Vector Store Integration for Chroma |
| packages/nixpkgs/python313Packages.llama-index-vector-stores-google | LlamaIndex Vector Store Integration for Google |
| packages/nixpkgs/python313Packages.llama-index-vector-stores-qdrant | LlamaIndex Vector Store Integration for Qdrant |
| packages/nixpkgs/python314Packages.llama-index-vector-stores-google | LlamaIndex Vector Store Integration for Google |
| packages/nixpkgs/python314Packages.llama-index-vector-stores-chroma | LlamaIndex Vector Store Integration for Chroma |
| packages/nixpkgs/python314Packages.llama-index-vector-stores-qdrant | LlamaIndex Vector Store Integration for Qdrant |
| packages/nixpkgs/python312Packages.sigstore | Codesigning tool for Python packages |
| packages/nixpkgs/python312Packages.llama-index-graph-stores-neo4j | LlamaIndex Graph Store Integration for Neo4j |
| packages/nixpkgs/python313Packages.llama-index-graph-stores-neptune | LlamaIndex Graph Store Integration for Neptune |
| packages/nixpkgs/python314Packages.llama-index-graph-stores-neptune | LlamaIndex Graph Store Integration for Neptune |
| packages/nixpkgs/python313Packages.sigstore-rekor-types | Python models for Rekor's API types |
| packages/nixpkgs/python314Packages.sigstore-rekor-types | Python models for Rekor's API types |
| packages/nixpkgs/python313Packages.truststore | Verify certificates using native system trust stores |
| packages/nixpkgs/python314Packages.truststore | Verify certificates using native system trust stores |
| packages/nixpkgs/haskellPackages.gogol-firestore | Google Cloud Firestore SDK |
| packages/nixpkgs/haskellPackages.gogol-datastore | Google Cloud Datastore SDK |
| packages/nixpkgs/python312Packages.llama-index-graph-stores-nebula | LlamaIndex Graph Store Integration for Nebula |
| packages/nixpkgs/haskellPackages.polysemy-kvstore | KVStore effect for polysemy |
| packages/nixpkgs/haskellPackages.openapi-petstore | Auto-generated openapi-petstore API Client |
| packages/nixpkgs/haskellPackages.swagger-petstore | Auto-generated openapi-petstore API Client |
| packages/nixpkgs/python312Packages.llama-index-vector-stores-qdrant | LlamaIndex Vector Store Integration for Qdrant |
| packages/nixpkgs/python312Packages.llama-index-vector-stores-chroma | LlamaIndex Vector Store Integration for Chroma |
| packages/nixpkgs/python312Packages.llama-index-vector-stores-google | LlamaIndex Vector Store Integration for Google |
| packages/nixpkgs/emacsPackages.eyebrowse-restore | |
| packages/nixpkgs/haskellPackages.hakyll-filestore | FileStore utilities for Hakyll |
| packages/nixpkgs/python312Packages.sigstore-models | Pydantic-based, protobuf-free data models for Sigstore |
| packages/nixpkgs/python312Packages.llama-index-graph-stores-neptune | LlamaIndex Graph Store Integration for Neptune |
| packages/nixpkgs/python313Packages.llama-index-vector-stores-postgres | LlamaIndex Vector Store Integration for Postgres |
| packages/nixpkgs/python314Packages.llama-index-vector-stores-postgres | LlamaIndex Vector Store Integration for Postgres |
| packages/nixpkgs/python313Packages.hive-metastore-client | Client for connecting and running DDLs on hive metastore |
| packages/nixpkgs/python314Packages.hive-metastore-client | Client for connecting and running DDLs on hive metastore |
| packages/nixpkgs/python312Packages.sigstore-rekor-types | Python models for Rekor's API types |
| packages/nixpkgs/python312Packages.truststore | Verify certificates using native system trust stores |
| packages/nixpkgs/python313Packages.bucketstore | Library for interacting with Amazon S3 |
| packages/nixpkgs/python314Packages.bucketstore | Library for interacting with Amazon S3 |
| packages/nixpkgs/python313Packages.tensorstore | Library for reading and writing large multi-dimensional arrays |
| packages/nixpkgs/python314Packages.tensorstore | Library for reading and writing large multi-dimensional arrays |
| packages/nixpkgs/python313Packages.google-cloud-datastore | Google Cloud Datastore API client library |
| packages/nixpkgs/python314Packages.google-cloud-datastore | Google Cloud Datastore API client library |
| packages/nixpkgs/python314Packages.google-cloud-firestore | Google Cloud Firestore API client library |
| packages/nixpkgs/python313Packages.llama-index-vector-stores-milvus | Llama-index vector_stores milvus integration |
| packages/nixpkgs/python313Packages.google-cloud-firestore | Google Cloud Firestore API client library |
| packages/nixpkgs/python314Packages.llama-index-vector-stores-milvus | Llama-index vector_stores milvus integration |
| packages/nixpkgs/haskellPackages.cryptostore | Serialization of cryptographic data types |
| packages/nixpkgs/python313Packages.mypy-boto3-mediastore | Type annotations for boto3 mediastore |
| packages/nixpkgs/python314Packages.mypy-boto3-mediastore | Type annotations for boto3 mediastore |
| packages/nixpkgs/python313Packages.snapshot-restore-py | Snapshot Restore for Python library which can be used for registering runtime hooks in Snapstart enabled Python Lambda functions |
| packages/nixpkgs/python314Packages.snapshot-restore-py | Snapshot Restore for Python library which can be used for registering runtime hooks in Snapstart enabled Python Lambda functions |
| packages/nixpkgs/python313Packages.django-paintstore | Django app that integrates jQuery ColorPicker with the Django admin |
| packages/nixpkgs/python314Packages.django-paintstore | Django app that integrates jQuery ColorPicker with the Django admin |
| packages/nixpkgs/rPackages.diseasystore | |
| packages/nixpkgs/rPackages.restorepoint | |
| packages/nixpkgs/python312Packages.llama-index-vector-stores-postgres | LlamaIndex Vector Store Integration for Postgres |
| packages/nixpkgs/jsonSchemaCatalogs.json-patch-schemastore | JSON Schema Catalog for JSON Patch as maintained by the https://www.schemastore.org community |
| packages/nixpkgs/keystore-explorer | Open source GUI replacement for the Java command-line utilities keytool and jarsigner |
| packages/nixpkgs/postgresql13Packages.cstore_fdw | Columnar storage for PostgreSQL |
| packages/nixpkgs/postgresql14Packages.cstore_fdw | Columnar storage for PostgreSQL |
| packages/nixpkgs/postgresql17Packages.cstore_fdw | Columnar storage for PostgreSQL |
| packages/nixpkgs/postgresql15Packages.cstore_fdw | Columnar storage for PostgreSQL |
| packages/nixpkgs/postgresql16Packages.cstore_fdw | Columnar storage for PostgreSQL |
| packages/nixpkgs/postgresql18Packages.cstore_fdw | Columnar storage for PostgreSQL |
| packages/nixpkgs/k8s-manifest-sigstore | Kubectl plugin for signing Kubernetes manifest YAML files with sigstore |
| packages/nixpkgs/python313Packages.sigstore-protobuf-specs | Library for serializing and deserializing Sigstore messages |
| packages/nixpkgs/python314Packages.sigstore-protobuf-specs | Library for serializing and deserializing Sigstore messages |
| packages/nixpkgs/python313Packages.mypy-boto3-mediastore-data | Type annotations for boto3 mediastore-data |
| packages/nixpkgs/python314Packages.mypy-boto3-mediastore-data | Type annotations for boto3 mediastore-data |
| packages/nixpkgs/python312Packages.hive-metastore-client | Client for connecting and running DDLs on hive metastore |
| packages/nixpkgs/gnomeExtensions.restore-geometry | An extension to automatically restore its previous geometry of window upon its opening |
| packages/nixpkgs/haskellPackages.polysemy-fskvstore | Run a KVStore as a filesystem in polysemy |
| packages/nixpkgs/python312Packages.bucketstore | Library for interacting with Amazon S3 |
| packages/nixpkgs/python312Packages.tensorstore | Library for reading and writing large multi-dimensional arrays |
| packages/nixpkgs/haskellPackages.HDBC-postgresql-hstore | Manipulate data in PostgreSQL "hstore" columns |
| packages/nixpkgs/haskellPackages.hdbc-postgresql-hstore | Manipulate data in PostgreSQL "hstore" columns |
| packages/nixpkgs/python312Packages.google-cloud-datastore | Google Cloud Datastore API client library |
| packages/nixpkgs/python312Packages.google-cloud-firestore | Google Cloud Firestore API client library |
| packages/nixpkgs/sbclPackages.bknr_dot_datastore | |
| packages/nixpkgs/python312Packages.llama-index-vector-stores-milvus | Llama-index vector_stores milvus integration |
| packages/nixpkgs/python312Packages.mypy-boto3-mediastore | Type annotations for boto3 mediastore |
| packages/nixpkgs/python312Packages.django-paintstore | Django app that integrates jQuery ColorPicker with the Django admin |
| packages/nixpkgs/python312Packages.snapshot-restore-py | Snapshot Restore for Python library which can be used for registering runtime hooks in Snapstart enabled Python Lambda functions |
| packages/nixpkgs/python312Packages.sigstore-protobuf-specs | Library for serializing and deserializing Sigstore messages |
| packages/nixpkgs/python312Packages.mypy-boto3-mediastore-data | Type annotations for boto3 mediastore-data |
| packages/nixpkgs/haskellPackages.amazonka-mediastore | Amazon Elemental MediaStore SDK |
| packages/nixpkgs/haskellPackages.polysemy-kvstore-jsonfile | Run a KVStore as a single json file in polysemy |
| packages/nixpkgs/haskellPackages.pwstore-purehaskell | Secure password storage, in pure Haskell |
| packages/nixpkgs/vscode-extensions.ethansk.restore-terminals | |
| packages/nixpkgs/haskellPackages.amazonka-identitystore | Amazon SSO Identity Store SDK |
| packages/nixpkgs/python314Packages.mypy-boto3-identitystore | Type annotations for boto3 identitystore |
| packages/nixpkgs/python313Packages.mypy-boto3-identitystore | Type annotations for boto3 identitystore |
| packages/nixpkgs/ocamlPackages.stored_reversed | Library for representing a list temporarily stored in reverse order |
| packages/nixpkgs/python312Packages.mypy-boto3-identitystore | Type annotations for boto3 identitystore |
| packages/nixpkgs/ocamlPackages.janeStreet.stored_reversed | Library for representing a list temporarily stored in reverse order |
| packages/nixpkgs/ocamlPackages_latest.stored_reversed | Library for representing a list temporarily stored in reverse order |
| packages/nixpkgs/python313Packages.types-aiobotocore-mediastore | Type annotations for aiobotocore mediastore |
| packages/nixpkgs/python314Packages.types-aiobotocore-mediastore | Type annotations for aiobotocore mediastore |
| packages/nixpkgs/haskellPackages.amazonka-mediastore-dataplane | Amazon Elemental MediaStore Data Plane SDK |
| packages/nixpkgs/python313Packages.types-aiobotocore-mediastore-data | Type annotations for aiobotocore mediastore-data |
| packages/nixpkgs/python314Packages.types-aiobotocore-mediastore-data | Type annotations for aiobotocore mediastore-data |
| packages/nixpkgs/haskellPackages.stratosphere-mediastore | Stratosphere integration for AWS MediaStore |
| packages/nixpkgs/home-assistant-component-tests.epic_games_store | Open source home automation that puts local control and privacy first |
| packages/nixpkgs/ocamlPackages_latest.janeStreet.stored_reversed | Library for representing a list temporarily stored in reverse order |
| packages/nixpkgs/haskellPackages.amazonka-sagemaker-featurestore-runtime | Amazon SageMaker Feature Store Runtime SDK |
| packages/nixpkgs/python312Packages.types-aiobotocore-mediastore | Type annotations for aiobotocore mediastore |
| packages/nixpkgs/python312Packages.types-aiobotocore-mediastore-data | Type annotations for aiobotocore mediastore-data |
| packages/nixpkgs/idevicerestore | Restore/upgrade firmware of iOS devices |
| packages/nixpkgs/python313Packages.mypy-boto3-sagemaker-featurestore-runtime | Type annotations for boto3 sagemaker-featurestore-runtime |
| packages/nixpkgs/python314Packages.mypy-boto3-sagemaker-featurestore-runtime | Type annotations for boto3 sagemaker-featurestore-runtime |
| packages/nixpkgs/azure-sdk-for-cpp.messaging-eventhubs-checkpointstore-blob | Azure Event Hubs Blob Storage Checkpoint Store for C++ |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v29.android-automotive-playstore.x86 | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v28.android-automotive-playstore.x86 | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/python312Packages.mypy-boto3-sagemaker-featurestore-runtime | Type annotations for boto3 sagemaker-featurestore-runtime |
| packages/nixpkgs/gnomeExtensions.all-windows-saverestore-window-positions | List open windows of all workspaces, plus Save/Restore window positions (run automatically on Suspend/Resume, a workaround for Ubuntu bug #1778983). |
| packages/nixpkgs/python313Packages.types-aiobotocore-identitystore | Type annotations for aiobotocore identitystore |
| packages/nixpkgs/python314Packages.types-aiobotocore-identitystore | Type annotations for aiobotocore identitystore |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v32.android-automotive-playstore.arm64-v8a | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/ocamlPackages.xenstore_transport | Low-level libraries for connecting to a xenstore service on a xen host |
| packages/nixpkgs/haskellPackages.stratosphere-identitystore | Stratosphere integration for AWS IdentityStore |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v30.android-automotive-playstore.x86_64 | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v32.android-automotive-playstore.x86_64 | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/python312Packages.types-aiobotocore-identitystore | Type annotations for aiobotocore identitystore |
| packages/nixpkgs/ocamlPackages_latest.xenstore_transport | Low-level libraries for connecting to a xenstore service on a xen host |
| packages/nixpkgs/python313Packages.types-aiobotocore-sagemaker-featurestore-runtime | Type annotations for aiobotocore sagemaker-featurestore-runtime |
| packages/nixpkgs/python314Packages.types-aiobotocore-sagemaker-featurestore-runtime | Type annotations for aiobotocore sagemaker-featurestore-runtime |
| packages/nixpkgs/python312Packages.types-aiobotocore-sagemaker-featurestore-runtime | Type annotations for aiobotocore sagemaker-featurestore-runtime |
| packages/nixpkgs/sbclPackages.cl-glfw-opengl-nv__shader__buffer__store | |
| packages/nixpkgs/perlPackages.CatalystPluginSessionStoreFile | File storage backend for session data |
| packages/nixpkgs/perl5Packages.CatalystPluginSessionStoreFile | File storage backend for session data |
| packages/nixpkgs/perlPackages.CatalystPluginSessionStoreFastMmap | FastMmap session storage backend |
| packages/nixpkgs/perl5Packages.CatalystPluginSessionStoreFastMmap | FastMmap session storage backend |
| packages/nixpkgs/perl538Packages.CatalystPluginSessionStoreFile | File storage backend for session data |
| packages/nixpkgs/perl540Packages.CatalystPluginSessionStoreFile | File storage backend for session data |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v25.google_apis_playstore.x86 | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v27.google_apis_playstore.x86 | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v29.google_apis_playstore.x86 | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v24.google_apis_playstore.x86 | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v28.google_apis_playstore.x86 | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v30.google_apis_playstore.x86 | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v26.google_apis_playstore.x86 | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/perl540Packages.CatalystPluginSessionStoreFastMmap | FastMmap session storage backend |
| packages/nixpkgs/perl538Packages.CatalystPluginSessionStoreFastMmap | FastMmap session storage backend |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v34.google_apis_playstore.arm64-v8a | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v36.google_apis_playstore.arm64-v8a | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v32.google_apis_playstore.arm64-v8a | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v31.google_apis_playstore.arm64-v8a | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v29.google_apis_playstore.arm64-v8a | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v28.google_apis_playstore.arm64-v8a | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v35.google_apis_playstore.arm64-v8a | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v30.google_apis_playstore.arm64-v8a | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v33.google_apis_playstore.arm64-v8a | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v33x.google_apis_playstore.arm64-v8a | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v34x.google_apis_playstore.arm64-v8a | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v36x.google_apis_playstore.arm64-v8a | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v35x.google_apis_playstore.arm64-v8a | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v33.google_apis_playstore.x86_64 | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v32.google_apis_playstore.x86_64 | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v28.google_apis_playstore.x86_64 | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v30.google_apis_playstore.x86_64 | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v29.google_apis_playstore.x86_64 | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v31.google_apis_playstore.x86_64 | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v34.google_apis_playstore.x86_64 | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v35.google_apis_playstore.x86_64 | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v36.google_apis_playstore.x86_64 | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v34x.google_apis_playstore.x86_64 | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v33x.google_apis_playstore.x86_64 | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v36x.google_apis_playstore.x86_64 | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v35x.google_apis_playstore.x86_64 | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v36_1.google_apis_playstore.arm64-v8a | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.v36_1.google_apis_playstore.x86_64 | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.CANARY.google_apis_playstore.arm64-v8a | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.CANARY.google_apis_playstore.x86_64 | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.Baklava.google_apis_playstore.arm64-v8a | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.Baklava.google_apis_playstore.x86_64 | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/sbclPackages.cl-glfw-opengl-ext__shader__image__load__store | |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.VanillaIceCream.google_apis_playstore.arm64-v8a | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.VanillaIceCream.google_apis_playstore.x86_64 | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.UpsideDownCakePrivacySandbox.google_apis_playstore.arm64-v8a | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.UpsideDownCakePrivacySandbox.google_apis_playstore.x86_64 | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.TiramisuPrivacySandbox.google_apis_playstore.arm64-v8a | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/androidenv.androidPkgs.all.system-images.TiramisuPrivacySandbox.google_apis_playstore.x86_64 | Android SDK tools, packaged in Nixpkgs |
| packages/nixpkgs/perlPackages.CatalystAuthenticationStoreLDAP | Authenticate Users against LDAP Directories |
| packages/nixpkgs/perl5Packages.CatalystAuthenticationStoreLDAP | Authenticate Users against LDAP Directories |
| packages/nixpkgs/perlPackages.CatalystAuthenticationStoreDBIxClass | Extensible and flexible object <-> relational mapper |
| packages/nixpkgs/perl5Packages.CatalystAuthenticationStoreDBIxClass | Extensible and flexible object <-> relational mapper |
| packages/nixpkgs/perl540Packages.CatalystAuthenticationStoreLDAP | Authenticate Users against LDAP Directories |
| packages/nixpkgs/perl538Packages.CatalystAuthenticationStoreLDAP | Authenticate Users against LDAP Directories |
| packages/nixpkgs/perl540Packages.CatalystAuthenticationStoreDBIxClass | Extensible and flexible object <-> relational mapper |
| packages/nixpkgs/perl538Packages.CatalystAuthenticationStoreDBIxClass | Extensible and flexible object <-> relational mapper |
| packages/nixpkgs/perlPackages.CatalystAuthenticationStoreHtpasswd | Authen::Htpasswd based user storage/authentication |
| packages/nixpkgs/perl5Packages.CatalystAuthenticationStoreHtpasswd | Authen::Htpasswd based user storage/authentication |
| packages/nixpkgs/perl538Packages.CatalystAuthenticationStoreHtpasswd | Authen::Htpasswd based user storage/authentication |
| packages/nixpkgs/perl540Packages.CatalystAuthenticationStoreHtpasswd | Authen::Htpasswd based user storage/authentication |
| packages/nur/forkprince.steam | Digital distribution platform |
| packages/nur/toonn.sotp | Small utility to store AWS TOTP secrets into Sops encryptedfiles and generate OTP on the command line |
| packages/nur/sikmir.musig | A shazam like tool to store songs fingerprints and retrieve them |
| packages/nur/charmbracelet.skate | A personal key value store 🛼 |
| packages/nur/shelvacu.vacu-history | program to store bash command history in a sqlite file |
| packages/nur/jonhermansen.moonring | Retro, Ultima-inspired RPG |
| packages/nur/rycee.firefox-addons.passff | Add-on that allows users of the unix password manager 'pass' to access their password store from Firefox |
| packages/nur/xddxdd.vuetorrent-backend | FSimple backend service to store configuration server-side |
| packages/nur/xddxdd.plasma-smart-video-wallpaper-reborn | Plasma 6 wallpaper plugin to play videos on your Desktop/Lock Screen |
| packages/nur/rycee.firefox-addons.tokyo-night-v2 | A Tokyo Night theme, based on enkia's VS Code theme |
| packages/nur/rycee.firefox-addons.zybooks-auto | A firefox port of Zybooks Auto from the chrome web store |
| packages/nur/rycee.firefox-addons.steam-database | Adds SteamDB links and new features on the Steam store and community |
| packages/nur/xddxdd.uncategorized.vuetorrent-backend | FSimple backend service to store configuration server-side |
| packages/nur/xddxdd.uncategorized.plasma-smart-video-wallpaper-reborn | Plasma 6 wallpaper plugin to play videos on your Desktop/Lock Screen |
| packages/nur/rycee.firefox-addons.browserpass | Browserpass is a browser extension for Firefox and Chrome to retrieve login details from zx2c4's pass (passwordstore.org) straight from your browser |
| packages/nur/rycee.firefox-addons.temporary-containers | Open tabs, websites, and links in automatically managed disposable containers which isolate the data websites store (cookies, storage, and more) from each other, enhancing your privacy and security while you browse. |
| packages/nur/rycee.firefox-addons.temporary-containers-plus | Open tabs, websites, and links in automatically managed disposable containers |
| packages/nur/mio.github-store | Cross-platform app store for GitHub releases |
| packages/nur/shirok1.sub-store | Sub-Store bundle (node) + front-end dist, with clean wrapper |
| packages/nur/shirok1.sub-store-http-meta | http-meta bundle (node) + tpl.yaml + mihomo from nixpkgs in META_FOLDER |
| packages/nur/rycee.firefox-addons.onepassword-password-manager | The best way to experience 1Password in your browser |
| packages/nur/xddxdd.sidestore-vpn | Allow SideStore to work across all iOS devices on your local network |
| packages/nur/shelvacu.borgstore | |
| packages/nur/xddxdd.uncategorized.sidestore-vpn | Allow SideStore to work across all iOS devices on your local network |
| packages/nur/rycee.firefox-addons.annotations-restored | Brings annotation support back to YouTube™! |