| options/nixos/services.authelia.instances.<name>.environmentVariables | Additional environment variables to provide to authelia
|
| options/nixos/services.authelia.instances.<name>.name | Name is used as a suffix for the service name, user, and group
|
| options/nixos/services.authelia.instances | Multi-domain protection currently requires multiple instances of Authelia
|
| options/nixos/services.authelia.instances.<name>.secrets | It is recommended you keep your secrets separate from the configuration
|
| options/nixos/services.authelia.instances.<name>.settingsFiles | Here you can provide authelia with configuration files or directories
|
| options/nixos/services.authelia.instances.<name>.secrets.manual | Configuring authelia's secret files via the secrets attribute set
is intended to be convenient and help catch cases where values are required
to run at all
|
| options/nixos/services.authelia.instances.<name>.secrets.jwtSecretFile | Path to your JWT secret used during identity verificaton.
|
| options/nixos/services.authelia.instances.<name>.secrets.oidcHmacSecretFile | Path to your HMAC secret used to sign OIDC JWTs.
|
| options/nixos/services.authelia.instances.<name>.secrets.sessionSecretFile | Path to your session secret
|
| options/nixos/services.authelia.instances.<name>.secrets.oidcIssuerPrivateKeyFile | Path to your private key file used to encrypt OIDC JWTs.
|
| options/nixos/services.authelia.instances.<name>.secrets.storageEncryptionKeyFile | Path to your storage encryption key.
|
| options/nixos/services.livekit.keyFile | LiveKit key file holding one or multiple application secrets
|
| options/nixos/services.maddy.secrets | A list of files containing the various secrets
|
| options/nixos/services.lasuite-meet.livekit.keyFile | LiveKit key file holding one or multiple application secrets
|
| options/nixos/services.traccar.settings | config.xml configuration as a Nix attribute set
|
| options/nixos/services.frp.instances.<name>.environmentFiles | List of paths files that follows systemd environmentfile structure
|
| options/nixos/boot.initrd.secrets | Secrets to append to the initrd
|
| options/nixos/services.peertube.secrets.secretsFile | Secrets to run PeerTube
|
| options/nixos/services.eintopf.secrets | A list of files containing the various secrets
|
| options/nixos/services.mautrix-meta.instances.<name>.environmentFile | File containing environment variables to substitute when copying the configuration
out of Nix store to the services.mautrix-meta.dataDir
|
| options/nixos/services.authelia.instances.<name>.user | The name of the user for this authelia instance.
|
| options/nixos/services.rspamd-trainer.secrets | A list of files containing the various secrets
|
| options/nixos/services.authelia.instances.<name>.group | The name of the group for this authelia instance.
|
| options/nixos/services.ddclient.secretsFile | A file containing the secrets for the dynamic DNS provider
|
| options/nixos/services.authelia.instances.<name>.enable | Whether to enable Authelia instance.
|
| options/nixos/services.gitlab.secrets.otpFile | A file containing the secret used to encrypt secrets for OTP
tokens
|
| options/nixos/services.firefox-syncserver.secrets | A file containing the various secrets
|
| options/nixos/programs.nncp.secrets | A list of paths to NNCP configuration files that should not be
in the Nix store
|
| options/nixos/services.wg-access-server.secretsFile | yaml file containing all secrets. this needs to be in the same structure as the configuration
|
| options/nixos/services.immich.secretsFile | Path of a file with extra environment variables to be loaded from disk
|
| options/nixos/services.pomerium.secretsFile | Path to file containing secrets for Pomerium, in systemd
EnvironmentFile format
|
| options/nixos/services.nextcloud.secrets | Secret files to read into entries in config.php
|
| options/nixos/services.forgejo.secrets | This is a small wrapper over systemd's LoadCredential
|
| options/nixos/services.gitlab.secrets.dbFile | A file containing the secret used to encrypt variables in
the DB
|
| options/nixos/services.gitlab.secrets.jwsFile | A file containing the secret used to encrypt session
keys
|
| options/nixos/services.kubernetes.secretsPath | Default location for kubernetes secrets
|
| options/nixos/services.librespeed.secrets | Attribute set of filesystem paths
|
| options/nixos/services.strongswan.secrets | A list of paths to IPSec secret files
|
| options/nixos/services.draupnir.secrets.accessToken | File containing the access token for Draupnir's Matrix account
to be used in place of services.draupnir.settings.accessToken.
|
| options/nixos/services.gitlab.secrets.secretFile | A file containing the secret used to encrypt variables in
the DB
|
| options/nixos/services.authelia.instances.<name>.package | The authelia package to use.
|
| options/nixos/networking.wireless.secretsFile | File consisting of lines of the form varname=value
to define variables for the wireless configuration
|
| options/nixos/services.pfix-srsd.secretsFile | The secret data used to encode the SRS address.
to generate, use a command like:
for n in $(seq 5); do dd if=/dev/urandom count=1 bs=1024 status=none | sha256sum | sed 's/ -$//' | sed 's/^/ /'; done
|
| options/nixos/services.postsrsd.secretsFile | Secret keys used for signing and verification.
The secret will be generated, if it does not exist at the given path.
|
| options/nixos/services.nextcloud-whiteboard-server.secrets | A list of files containing the various secrets
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.eap | EAP secret section for a specific secret
|
| options/nixos/services.postsrsd.settings.secrets-file | Path to the file containing the secret keys.
Secrets are passed using LoadCredential= on the systemd unit,
so this options is read-only
|
| options/nixos/services.gitlab.secrets.activeRecordSaltFile | A file containing the salt for active record encryption in the DB
|
| options/nixos/services.authelia.instances.<name>.settings | Your Authelia config.yml as a Nix attribute set
|
| options/home-manager/programs.rclone.remotes.<name>.secrets | Sensitive configuration values such as passwords, API keys, and tokens
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ntlm | NTLM secret section for a specific secret
|
| options/nixos/services.authelia.instances.<name>.settings.theme | The theme to display.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.xauth | EAP secret section for a specific secret
|
| options/nixos/services.authelia.instances.<name>.settings.log.level | Level of verbosity for logs.
|
| options/nixos/services.authelia.instances.<name>.settings.log.format | Format the logs are written as.
|
| options/nixos/services.pinchflat.secretsFile | Secrets like SECRET_KEY_BASE and BASIC_AUTH_PASSWORD
should be passed to the service without adding them to the world-readable Nix store
|
| options/nixos/services.uwsgi.instance | uWSGI configuration
|
| options/nixos/services.trickster.instance-id | Instance ID for when running multiple processes (default null).
|
| options/nixos/services.trilium-server.instanceName | Instance name used to distinguish between different instances
|
| options/nixos/services.hercules-ci-agent.settings.secretsJsonPath | Path to a JSON file containing secrets for effects
|
| options/darwin/services.hercules-ci-agent.settings.secretsJsonPath | Path to a JSON file containing secrets for effects
|
| options/nixos/services.gitlab.secrets.activeRecordPrimaryKeyFile | A file containing the secret used to encrypt some rails data
in the DB
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.rsa | Private key decryption passphrase for a key in the rsa
folder.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ppk | Postquantum Preshared Key (PPK) section for a specific secret
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ike | IKE preshared secret section for a specific secret
|
| options/nixos/services.lifecycled.instanceId | The instance ID to listen for events for.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ecdsa | Private key decryption passphrase for a key in the
ecdsa folder.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.token | Definition for a private key that's stored on a token/smartcard/TPM.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs8 | Private key decryption passphrase for a key in the
pkcs8 folder.
|
| options/nixos/services.authelia.instances.<name>.settings.server.address | The address to listen on.
|
| options/nixos/services.zwave-js.secretsConfigFile | JSON file containing secret keys
|
| options/nixos/services.maddy.tls.loader | TLS certificates are obtained by modules called "certificate
loaders"
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.rsa.<name>.file | File name in the rsa folder for which this passphrase
should be used.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs12 | PKCS#12 decryption passphrase for a container in the
pkcs12 folder.
|
| options/nixos/services.authelia.instances.<name>.settings.log.file_path | File path where the logs will be written
|
| options/nixos/services.akkoma.config.":pleroma".":instance".name | Instance name.
|
| options/nixos/services.kanidm.provision.instanceUrl | The instance url to which the provisioning tool should connect.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ppk.<name>.id | PPK identity the PPK belongs to
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.eap.<name>.id | Identity the EAP/XAuth secret belongs to
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.token.<name>.slot | Optional slot number to access the token.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ike.<name>.id | IKE identity the IKE preshared secret belongs to
|
| options/nixos/services.crowdsec-firewall-bouncer.secrets.apiKeyPath | Path to the API key to authenticate with a local CrowdSec API
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ecdsa.<name>.file | File name in the ecdsa folder for which this
passphrase should be used.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs8.<name>.file | File name in the pkcs8 folder for which this
passphrase should be used.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ntlm.<name>.id | Identity the NTLM secret belongs to
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.private | Private key decryption passphrase for a key in the
private folder.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.rsa.<name>.secret | Value of decryption passphrase for RSA key.
|
| options/nixos/services.akkoma.config.":pleroma".":instance".email | Instance administrator email.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.token.<name>.pin | Optional PIN required to access the key on the token
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.xauth.<name>.id | Identity the EAP/XAuth secret belongs to
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs12.<name>.file | File name in the pkcs12 folder for which this
passphrase should be used.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ecdsa.<name>.secret | Value of decryption passphrase for ECDSA key.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs8.<name>.secret | Value of decryption passphrase for PKCS#8 key.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.token.<name>.module | Optional PKCS#11 module name to access the token.
|
| options/nixos/services.bitwarden-directory-connector-cli.secrets.ldap | Path to file that contains LDAP password for user in {option}`ldap.username
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.private.<name>.file | File name in the private folder for which this passphrase should be used.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.token.<name>.handle | Hex-encoded CKA_ID or handle of the private key on the token or TPM,
respectively.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.eap.<name>.secret | Value of the EAP/XAuth secret
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ike.<name>.secret | Value of the IKE preshared secret
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs12.<name>.secret | Value of decryption passphrase for PKCS#12 container.
|
| options/nixos/services.authelia.instances.<name>.settings.log.keep_stdout | Whether to also log to stdout when a file_path is defined.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ppk.<name>.secret | Value of the PPK
|
| options/nixos/services.btrbk.instances | Set of btrbk instances
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.private.<name>.secret | Value of decryption passphrase for private key.
|
| options/nixos/services.errbot.instances | Errbot instance configs
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.xauth.<name>.secret | Value of the EAP/XAuth secret
|
| options/nixos/services.draupnir.secrets.pantalaimon.password | File containing the password for Draupnir's Matrix account when used in
conjunction with Pantalaimon to be used in place of
services.draupnir.settings.pantalaimon.password.
|
| options/nixos/services.printing.cups-pdf.instances | Permits to raise one or more cups-pdf instances
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ntlm.<name>.secret | Value of the NTLM secret, which is the NT Hash of the actual secret,
that is, MD4(UTF-16LE(secret))
|
| options/nixos/services.authelia.instances.<name>.settings.telemetry.metrics.enabled | Enable Metrics.
|
| options/nixos/services.authelia.instances.<name>.settings.telemetry.metrics.address | The address to listen on for metrics
|
| options/nixos/services.btrbk.instances.<name>.onCalendar | How often this btrbk instance is started
|
| options/nixos/services.gitea-actions-runner.instances.<name>.name | The name identifying the runner instance towards the Gitea/Forgejo instance.
|
| options/nixos/networking.networkmanager.ensureProfiles.secrets.entries | A list of secrets to provide to NetworkManager by reading their values from configured files
|
| options/nixos/services.vault-agent.instances | Attribute set of vault-agent instances
|
| options/nixos/services.gitlab.secrets.activeRecordDeterministicKeyFile | A file containing the secret used to encrypt some rails data in a deterministic way
in the DB
|
| options/nixos/services.printing.cups-pdf.instances.<name>.installPrinter | Whether to enable a CUPS printer queue for this instance
|
| options/nixos/services.errbot.instances.<name>.dataDir | Data directory for errbot instance.
|
| options/nixos/services.vault-agent.instances.<name>.user | User under which this instance runs.
|
| options/nixos/services.v4l2-relayd.instances.<name>.name | The name of the instance.
|
| options/nixos/services.ytdl-sub.instances.<name>.enable | Whether to enable ytdl-sub instance.
|
| options/nixos/boot.initrd.network.ssh.hostKeys | Specify SSH host keys to import into the initrd
|
| options/nixos/services.vault-agent.instances.<name>.group | Group under which this instance runs.
|
| options/nixos/services.prometheus.exporters.varnish.instance | varnishstat -n value.
|
| options/nixos/services.anubis.instances.<name>.enable | Whether to enable this instance of Anubis.
|
| options/nixos/services.draupnir.secrets.web.synapseHTTPAntispam.authorization | File containing the secret token when using the Synapse HTTP Antispam module
to be used in place of
services.draupnir.settings.web.synapseHTTPAntispam.authorization
|
| options/nixos/services.bookstack.settings | Options for Bookstack configuration
|
| options/nixos/services.akkoma.config.":pleroma".":instance".description | Instance description.
|
| options/nixos/services.vault-agent.instances.<name>.enable | Whether to enable this vault-agent instance.
|
| options/nixos/services.mobilizon.settings.":mobilizon".":instance".name | The fallback instance name if not configured into the admin UI
|
| options/nixos/services.v4l2-relayd.instances.<name>.enable | Whether to enable this v4l2-relayd instance.
|
| options/nixos/services.easytier.instances.<name>.configServer | Configure the instance from config server
|
| options/nixos/services.easytier.instances.<name>.enable | Enable the instance.
|
| options/nixos/services.cross-seed.settings | Configuration options for cross-seed
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.instance | Assign a icinga instance to this transport
|
| options/nixos/services.frp.instances | Frp instances.
|
| options/nixos/services.transfer-sh.secretFile | Path to file containing environment variables
|
| options/nixos/services.wiki-js.settings | Settings to configure wiki-js
|
| options/nixos/services.consul-template.instances | Attribute set of consul-template instances
|
| options/nixos/services.caddy.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.consul-template.instances.<name>.user | User under which this instance runs.
|
| options/nixos/services.gitea-actions-runner.instances.<name>.url | Base URL of your Gitea/Forgejo instance.
|
| options/nixos/networking.networkmanager.ensureProfiles.secrets.entries.*.matchSetting | name of the setting section for which secrets are requested
|
| options/nixos/services.consul-template.instances.<name>.group | Group under which this instance runs.
|
| options/nixos/services.printing.cups-pdf.instances.<name>.enable | Whether to enable this cups-pdf instance.
|
| options/nixos/services.ytdl-sub.instances | Configuration for ytdl-sub instances.
|
| options/nixos/services.oncall.secretFile | A YAML file containing secrets such as database or user passwords
|
| options/nixos/services.easytier.instances.<name>.configFile | Path to easytier config file
|
| options/nixos/services.gitea-actions-runner.instances.<name>.token | Plain token to register at the configured Gitea/Forgejo instance.
|
| options/nixos/services.authelia.instances.<name>.settings.default_2fa_method | Default 2FA method for new users and fallback for preferred but disabled methods.
|
| options/nixos/services.consul-template.instances.<name>.enable | Whether to enable this consul-template instance.
|
| options/nixos/services.microbin.passwordFile | Path to file containing environment variables
|
| options/nixos/services.fcgiwrap.instances.<name>.process.group | Group as which this instance of fcgiwrap will be run.
|
| options/nixos/services.v4l2-relayd.instances.<name>.extraPackages | Extra packages to add to GST_PLUGIN_PATH for the instance.
|
| options/nixos/services.gitea-actions-runner.instances.<name>.enable | Whether to enable Gitea Actions Runner instance.
|
| options/nixos/services.fcgiwrap.instances.<name>.process.user | User as which this instance of fcgiwrap will be run
|
| options/nixos/services.akkoma.config.":pleroma".":instance".upload_dir | Directory where Akkoma will put uploaded files.
|
| options/nixos/services.printing.cups-pdf.instances.<name>.confFileText | This will contain the contents of cups-pdf.conf for this instance, derived from settings
|
| options/nixos/nix.package | This option specifies the Nix package instance to use throughout the system.
|
| options/darwin/nix.package | This option specifies the Nix package instance to use throughout the system.
|
| options/nixos/services.bitwarden-directory-connector-cli.secrets.bitwarden.client_path_id | Path to file that contains Client ID.
|
| options/nixos/networking.networkmanager.ensureProfiles.secrets.package | The nm-file-secret-agent package to use.
|
| options/nixos/services.gitea-actions-runner.instances.<name>.tokenFile | Path to an environment file, containing the TOKEN environment
variable, that holds a token to register at the configured
Gitea/Forgejo instance.
|
| options/nixos/networking.networkmanager.ensureProfiles.secrets.entries.*.key | key in the setting section for which this entry provides a value
|
| options/nixos/networking.networkmanager.ensureProfiles.secrets.entries.*.file | file from which the secret value is read
|
| options/nixos/networking.networkmanager.ensureProfiles.secrets.entries.*.trim | whether leading and trailing whitespace should be stripped from the files content before being passed to NetworkManager
|
| options/nixos/services.v4l2-relayd.instances | v4l2-relayd instances to be created.
|
| options/nixos/services.vmalert.instances | Define multiple instances of vmalert.
|
| options/nixos/services.peertube-runner.instancesToRegister.<name>.url | URL of the PeerTube instance.
|
| options/nixos/services.anubis.instances.<name>.settings.BIND | The address that Anubis listens to
|
| options/nixos/networking.networkmanager.ensureProfiles.secrets.entries.*.matchIface | interface name of the NetworkManager connection
|
| options/nixos/services.kresd.instances | The number of instances to start
|
| options/nixos/services.frp.instances.<name>.enable | Whether to enable frp.
|
| options/nixos/services.akkoma.initSecrets | Whether to initialise non‐existent secrets with random values
|
| options/nixos/services.akkoma.config.":pleroma".":instance".static_dir | Directory of static files
|
| options/nixos/services.anubis.instances | An attribute set of Anubis instances
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.enable | Whether to enable this radicle-native-ci instance.
|
| options/nixos/networking.networkmanager.ensureProfiles.secrets.entries.*.matchUuid | UUID of the connection profile
UUIDs are assigned once on connection creation and should never change as long as the connection still applies to the same network.
|
| options/nixos/services.frp.instances.<name>.role | The frp consists of client and server
|
| options/nixos/networking.networkmanager.ensureProfiles.secrets.entries.*.matchType | NetworkManager connection type
The NetworkManager configuration settings reference roughly corresponds to connection types
|
| options/nixos/networking.networkmanager.ensureProfiles.secrets.entries.*.matchId | connection id used by NetworkManager
|
| options/nixos/services.n8n.environment | Environment variables to pass to the n8n service
|
| options/nixos/services.easytier.instances | EasyTier instances.
|
| options/nixos/services.stalwart.credentials | Credentials envs used to configure Stalwart secrets
|
| options/nixos/services.clamsmtp.instances | Instances of clamsmtp to run.
|
| options/nixos/services.fcgiwrap.instances | Configuration for fcgiwrap instances.
|
| options/nixos/services.nexus.home | Home directory of the Nexus3 instance.
|
| options/nixos/services.printing.cups-pdf.instances.<name>.settings | Settings for a cups-pdf instance, see the descriptions in the template config file in the cups-pdf package
|
| options/nixos/services.mobilizon.settings.":mobilizon".":instance".hostname | Your instance's hostname
|
| options/nixos/services.cfssl.configFile | Path to configuration file
|
| options/nixos/services.ytdl-sub.instances.<name>.config | Configuration for ytdl-sub
|
| options/nixos/services.mailpit.instances | Configure mailpit instances
|
| options/nixos/services.stalwart-mail.credentials | Credentials envs used to configure Stalwart-Mail secrets
|
| options/nixos/services.errbot.instances.<name>.logLevel | Errbot log level
|
| options/nixos/services.pgbackrest.stanzas.<name>.instances | An attribute set of database instances as described in:
https://pgbackrest.org/configuration.html#section-stanza
Each instance defaults to set pg-host to the attribute's name
|
| options/nixos/services.peertube-runner.instancesToRegister.<name>.runnerName | Runner name declared to the PeerTube instance.
|
| options/nixos/services.hydra.logo | Path to a file containing the logo of your Hydra instance.
|
| options/nixos/services.mailpit.instances.<name>.smtp | SMTP bind interface and port.
|
| options/home-manager/programs.rclone.requiresUnit | The name of a systemd user service that must complete before the rclone
configuration file is written
|
| options/nixos/services.pantalaimon-headless.instances | Declarative instance config
|
| options/nixos/services.anubis.instances.<name>.user | The user under which Anubis is run
|
| options/nixos/services.errbot.instances.<name>.admins | List of identifiers of errbot admins.
|
| options/nixos/services.actkbd.enable | Whether to enable the actkbd key mapping daemon
|
| options/nixos/services.bitwarden-directory-connector-cli.secrets.bitwarden.client_path_secret | Path to file that contains Client Secret.
|
| options/nixos/services.pdfding.backup.enable | Automatic backup of important data to a AWS S3 (or compatible) instance
|
| options/nixos/services.grocy.hostName | FQDN for the grocy instance.
|
| options/nixos/services.mautrix-meta.instances | Configuration of multiple mautrix-meta instances.
services.mautrix-meta.instances.facebook and services.mautrix-meta.instances.instagram
come preconfigured with network.mode, appservice.id, bot username, display name and avatar.
|
| options/nixos/services.anubis.instances.<name>.policy | Anubis policy configuration
|
| options/nixos/services.easytier.instances.<name>.environmentFiles | Environment files for this instance
|
| options/nixos/services.anubis.instances.<name>.group | The group under which Anubis is run
|
| options/nixos/services.nylon.<name>.name | The name of this nylon instance.
|
| options/nixos/services.mailpit.instances.<name>.max | Maximum number of emails to keep
|
| options/nixos/services.ytdl-sub.instances.<name>.readWritePaths | List of paths that ytdl-sub can write to.
|
| options/nixos/services.anubis.instances.<name>.extraFlags | A list of extra flags to be passed to Anubis.
|
| options/nixos/services.neo4j.readOnly | Only allow read operations from this Neo4j instance.
|
| options/nixos/services.v4l2-relayd.instances.<name>.cardLabel | The name the camera will show up as.
|
| options/nixos/services.errbot.instances.<name>.backend | Errbot backend name.
|
| options/nixos/services.mobilizon.settings.":mobilizon".":instance".email_from | The email for the From: header in emails
|
| options/nixos/services.errbot.instances.<name>.plugins | List of errbot plugin derivations.
|
| options/nixos/services.pds.settings | Environment variables to set for the service
|
| options/nixos/services.ntopng.redis.createInstance | Local Redis instance name
|
| options/nixos/services.mailpit.instances.<name>.listen | HTTP bind interface and port for UI.
|
| options/nixos/services.frp.instances.<name>.settings | Frp configuration, for configuration options
see the example of client
or server on github.
|
| options/nixos/services.easytier.instances.<name>.settings.instance_name | Identify different instances on same host
|
| options/nixos/services.v4l2-relayd.instances.<name>.input.width | The width to read from input-stream.
|
| options/nixos/services.gitea-actions-runner.instances | Gitea Actions Runner instances.
|
| options/nixos/services.errbot.instances.<name>.extraConfig | String to be appended to the config verbatim
|
| options/nixos/services.vault-agent.instances.<name>.package | The vault package to use.
|
| options/nixos/services.anubis.instances.<name>.settings.METRICS_BIND | The address Anubis' metrics server listens to
|
| options/nixos/services.movim.enable | Whether to enable a Movim instance.
|
| options/nixos/services.btrbk.instances.<name>.settings | configuration options for btrbk
|
| options/nixos/services.ytdl-sub.instances.<name>.schedule | How often to run ytdl-sub
|
| options/nixos/services.vmalert.instances.<name>.rules | A list of the given alerting or recording rules against configured "datasource.url" compatible with
Prometheus HTTP API for vmalert to execute
|
| options/nixos/services.movim.settings | .env settings for Movim
|
| options/nixos/services.jitsi-meet.hostName | FQDN of the Jitsi Meet instance.
|
| options/nixos/services.go-neb.secretFile | Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: $ENVIRONMENT
or ${VARIABLE}
|
| options/nixos/services.errbot.instances.<name>.identity | Errbot identity configuration
|
| options/nixos/services.v4l2-relayd.instances.<name>.input.height | The height to read from input-stream.
|
| options/nixos/services.hydra.hydraURL | The base URL for the Hydra webserver instance
|
| options/nixos/services.mautrix-meta.instances.<name>.dataDir | Path to the directory with database, registration, and other data for the bridge service
|
| options/nixos/services.clamsmtp.instances.*.listen | Address to wait for incoming SMTP connections on
|
| options/nixos/services.v4l2-relayd.instances.<name>.input.format | The video-format to read from input-stream.
|
| options/nixos/services.clamsmtp.instances.*.timeout | Time-out for network connections.
|
| options/nixos/services.evcc.settings | evcc configuration as a Nix attribute set
|
| options/nixos/services.jboss.serverDir | Location of the server instance files
|
| options/nixos/services.vmalert.instances.<name>.enable | Wether to enable VictoriaMetrics's vmalert.
vmalert evaluates alerting and recording rules against a data source, sends notifications via Alertmanager.
|
| options/nixos/services.clamsmtp.instances.*.header | A header to add to scanned messages
|
| options/nixos/services.uhub.<name>.enable | Whether to enable hub instance.
|
| options/nixos/services.easytier.instances.<name>.extraArgs | Extra args append to the easytier command-line.
|
| options/home-manager/services.colima.profiles | Profiles allow multiple colima configurations
|
| options/nixos/services.turn-rs.secretFile | Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: $ENVIRONMENT or
${VARIABLE}
|
| options/nixos/services.movim.domain | Fully-qualified domain name (FQDN) for the Movim instance.
|
| options/nixos/services.clamsmtp.instances.*.action | Action to take when a virus is detected
|
| options/nixos/services.grafana-to-ntfy.settings.ntfyBAuthUser | The ntfy-sh user to use for authenticating with the ntfy-sh instance
|
| options/nixos/services.mysql.replication.serverId | Id of the MySQL server instance
|
| options/nixos/services.mautrix-meta.instances.<name>.enable | Whether to enable Mautrix-Meta, a Matrix <-> Facebook and Matrix <-> Instagram hybrid puppeting/relaybot bridge.
|
| options/nixos/services.clamsmtp.instances.*.xClient | Send the XCLIENT command to the receiving server, for forwarding
client addresses and connection information if the receiving
server supports this feature.
|
| options/nixos/services.fcgiwrap.instances.<name>.socket.user | User to be set as owner of the UNIX socket.
|
| options/nixos/services.fcgiwrap.instances.<name>.socket.type | Socket type: 'unix', 'tcp' or 'tcp6'.
|
| options/nixos/services.v4l2-relayd.instances.<name>.output.format | The video-format to write to output-stream.
|
| options/nixos/services.maubot.settings | YAML settings for maubot
|
| options/nixos/services.clamsmtp.instances.*.outAddress | Address of the SMTP server to send email to once it has been
scanned.
|
| options/nixos/services.anubis.instances.<name>.botPolicy | Anubis policy configuration in Nix syntax
|
| options/nixos/services.fcgiwrap.instances.<name>.socket.mode | Mode to be set on the UNIX socket
|
| options/nixos/services.anubis.instances.<name>.settings | Freeform configuration via environment variables for Anubis
|
| options/nixos/services.anubis.instances.<name>.policy.extraBots | Additional bot rules appended to the policy
|
| options/nixos/services.fcgiwrap.instances.<name>.socket.group | Group to be set as owner of the UNIX socket.
|
| options/nixos/services.forgejo.customDir | Base directory for custom templates and other options
|
| options/nixos/services.listmonk.secretFile | A file containing secrets as environment variables
|
| options/nixos/services.prosody.extraConfig | Additional prosody configuration
The generated file is processed by envsubst to allow secrets to be passed securely via environment variables.
|
| options/nixos/services.dawarich.extraEnvFiles | Extra environment files to pass to all Dawarich services
|
| options/nixos/services.mastodon.extraEnvFiles | Extra environment files to pass to all mastodon services
|
| options/nixos/services.clamsmtp.instances.*.keepAlives | Number of seconds to wait between each NOOP sent to the sending
server. 0 to disable
|
| options/nixos/services.clamsmtp.instances.*.virusAction | Command to run when a virus is found
|
| options/nixos/services.vmalert.instances.<name>.settings | vmalert configuration, passed via command line flags
|
| options/nixos/services.sogo.timezone | Timezone of your SOGo instance
|
| options/nixos/services.sourcehut.hg.group | Group for hg.sr.ht
|
| options/nixos/services.v4l2-relayd.instances.<name>.input.pipeline | The gstreamer-pipeline to use for the input-stream.
|
| options/nixos/services.radicle.ci.adapters.native.instances | radicle-native-ci adapter instances.
|
| options/nixos/services.keter.bundle.publicScript | Allows loading of public environment variables,
these are emitted to the log so it shouldn't contain secrets.
|
| options/nixos/services.wstunnel.clients.<name>.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.wstunnel.servers.<name>.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.docuseal.extraEnvFiles | Extra environment files to pass to DocuSeal services
|
| options/nixos/services.sourcehut.man.group | Group for man.sr.ht
|
| options/nixos/services.sourcehut.git.group | Group for git.sr.ht
|
| options/nixos/services.sourcehut.hub.group | Group for hub.sr.ht
|
| options/nixos/services.easytier.instances.<name>.settings | Settings to generate easytier-‹name›.toml
|
| options/nixos/services.patroni.settings | The primary patroni configuration
|
| options/nixos/services.peertube-runner.instancesToRegister.<name>.runnerDescription | Runner description declared to the PeerTube instance.
|
| options/nixos/services.sympa.domains | Email domains handled by this instance
|
| options/nixos/services.sourcehut.todo.group | Group for todo.sr.ht
|
| options/nixos/services.sourcehut.meta.group | Group for meta.sr.ht
|
| options/nixos/services.pixelfed.settings | .env settings for Pixelfed
|
| options/nixos/services.cross-seed.settingsFile | Path to a JSON file containing settings that will be merged with the
settings option
|
| options/nixos/services.vault-agent.instances.<name>.settings | Free-form settings written directly to the config.json file
|
| options/nixos/services.nitter.server.title | Title of the instance.
|
| options/nixos/services.lidarr.settings | Attribute set of arbitrary config options
|
| options/nixos/services.sonarr.settings | Attribute set of arbitrary config options
|
| options/nixos/services.radarr.settings | Attribute set of arbitrary config options
|
| options/nixos/services.consul-template.instances.<name>.package | The consul-template package to use.
|
| options/nixos/services.mobilizon.settings.":mobilizon".":instance".email_reply_to | The email for the Reply-To: header in emails
|
| options/nixos/services.livekit.redis.port | Port to bind local redis instance to.
|
| options/nixos/services.livekit.redis.host | Address to bind local redis instance to.
|
| options/nixos/services.bluesky-pds.settings | Environment variables to set for the service
|
| options/nixos/services.anubis.instances.<name>.settings.TARGET | The reverse proxy target that Anubis is protecting
|
| options/nixos/services.fcgiwrap.instances.<name>.socket.address | Socket address
|
| options/nixos/services.v4l2-relayd.instances.<name>.input.framerate | The framerate to read from input-stream.
|
| options/nixos/services.graylog.isMaster | Whether this is the master instance of your Graylog cluster
|
| options/nixos/services.easytier.instances.<name>.settings.dhcp | Automatically determine the IPv4 address of this peer based on
existing peers on network.
|
| options/nixos/services.mautrix-meta.instances.<name>.serviceUnit | The systemd unit (a service or a target) for other services to depend on if they
need to be started after matrix-synapse
|
| options/nixos/services.vmalert.instances.<name>.settings.rule | Path to the files with alerting and/or recording rules.
|
| options/nixos/services.syncthing.openDefaultPorts | Whether to open the default ports in the firewall: TCP/UDP 22000 for transfers
and UDP 21027 for discovery
|
| options/nixos/services.peertube-runner.instancesToRegister | PeerTube instances to register this runner with.
|
| options/nixos/services.mailpit.instances.<name>.database | Specify the local database filename to store persistent data
|
| options/nixos/services.zitadel.extraStepsPaths | A list of paths to extra steps files
|
| options/nixos/services.btrbk.instances.<name>.snapshotOnly | Whether to run in snapshot only mode
|
| options/nixos/services.sourcehut.paste.group | Group for paste.sr.ht
|
| options/nixos/services.sourcehut.lists.group | Group for lists.sr.ht
|
| options/nixos/services.sourcehut.pages.group | Group for pages.sr.ht
|
| options/nixos/services.mautrix-meta.instances.<name>.settings | config.yaml configuration as a Nix attribute set
|
| options/nixos/services.clamsmtp.instances.*.tempDirectory | Temporary directory that needs to be accessible to both clamd
and clamsmtpd.
|
| options/nixos/services.fcgiwrap.instances.<name>.process.prefork | Number of processes to prefork.
|
| options/nixos/services.easytier.instances.<name>.settings.peers | Peers to connect initially
|
| options/home-manager/programs.rclone.remotes | An attribute set of remote configurations
|
| options/nixos/services.microbin.settings | Additional configuration for MicroBin, see
https://microbin.eu/docs/installation-and-configuration/configuration/
for supported values
|
| options/nixos/services.wastebin.settings | Additional configuration for wastebin, see
https://github.com/matze/wastebin#usage for supported values
|
| options/nixos/services.gokapi.settingsFile | Path to config file to parse and append to settings
|
| options/nixos/services.lasuite-docs.secretKeyPath | Path to the Django secret key
|
| options/nixos/services.lasuite-meet.secretKeyPath | Path to the Django secret key
|
| options/nixos/services.easytier.instances.<name>.extraSettings | Extra settings to add to easytier-‹name›.toml.
|
| options/nixos/services.anubis.instances.<name>.policy.settings | Additional policy settings merged into the policy file
|
| options/nixos/services.easytier.instances.<name>.settings.ipv4 | IPv4 cidr address of this peer in the virtual network
|
| options/nixos/services.jirafeau.hostName | URL of instance
|
| options/nixos/services.lasuite-docs.domain | Domain name of the docs instance.
|
| options/nixos/services.lasuite-meet.domain | Domain name of the meet instance.
|
| options/nixos/services.printing.cups-pdf.instances.<name>.settings.Spool | spool directory
|
| options/nixos/services.maubot.extraConfigFile | A file for storing secrets
|
| options/nixos/services.pleroma.secretConfigFile | Path to the file containing your secret pleroma configuration.
DO NOT POINT THIS OPTION TO THE NIX
STORE, the store being world-readable, it'll
compromise all your secrets.
|
| options/nixos/services.peertube-runner.instancesToRegister.<name>.registrationTokenFile | Path to a file containing a registration token for the PeerTube instance
|
| options/nixos/services.readarr.settings | Attribute set of arbitrary config options
|
| options/nixos/services.transfer-sh.settings | Additional configuration for transfer-sh, see
https://github.com/dutchcoders/transfer.sh#usage-1
for supported values
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.name | Adapter name that is used in the radicle-ci-broker configuration
|
| options/nixos/services.printing.cups-pdf.instances.<name>.settings.Out | output directory;
${HOME} will be expanded to the user's home directory,
${USER} will be expanded to the user name.
|
| options/nixos/services.godns.loadCredential | This can be used to pass secrets to the systemd service without adding
them to the nix store.
|
| options/nixos/services.windmill.database.url | Database url
|
| options/nixos/services.anubis.instances.<name>.settings.POLICY_FNAME | The policy file to use
|
| options/nixos/services.taler.runtimeDir | Runtime directory shared between the taler services
|
| options/nixos/services.kanboard.domain | FQDN for the Kanboard instance.
|
| options/nixos/services.pixelfed.domain | FQDN for the Pixelfed instance.
|
| options/nixos/services.renovate.settings | Renovate's global configuration
|
| options/nixos/services.vault-agent.instances.<name>.settings.pid_file | Path to use for the pid file.
|
| options/nixos/services.sourcehut.builds.group | Group for builds.sr.ht
|
| options/nixos/services.ocis.package | Which package to use for the ownCloud Infinite Scale instance.
|
| options/nixos/services.clamsmtp.instances.*.quarantine | Whether to quarantine files that contain viruses by leaving them
in the temporary directory.
|
| options/nixos/services.h2o.hosts | The hosts config to be merged with the settings
|
| options/nixos/services.mongodb.replSetName | If this instance is part of a replica set, set its name here
|
| options/nixos/services.nomad.credentials | Credentials envs used to configure nomad secrets.
|
| options/nixos/services.pixelfed.enable | Whether to enable a Pixelfed instance.
|
| options/nixos/services.gitea-actions-runner.instances.<name>.settings | Configuration for act_runner daemon
|
| options/nixos/services.gitea-actions-runner.instances.<name>.labels | Labels used to map jobs to their runtime environment
|
| options/nixos/services.maddy.config | Server configuration, see
https://maddy.email for
more information
|
| options/nixos/services.rspamd-trainer.settings | IMAP authentication configuration for rspamd-trainer
|
| options/nixos/services.anubis.instances.<name>.policy.useDefaultBotRules | Whether to include Anubis's default bot detection rules via the
(data)/meta/default-config.yaml import
|
| options/nixos/services.printing.cups-pdf.instances.<name>.settings.AnonDirName | path for anonymously created PDF files
|
| options/nixos/services.powerdns.secretFile | Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: $ENVIRONMENT
or ${VARIABLE}
|
| options/nixos/services.anubis.instances.<name>.settings.SERVE_ROBOTS_TXT | Whether to serve a default robots.txt that denies access to common AI bots by name and all other
bots by wildcard.
|
| options/nixos/services.listmonk.settings | Static settings set in the config.toml, see https://github.com/knadh/listmonk/blob/master/config.toml.sample for details
|
| options/nixos/services.anubis.instances.<name>.settings.BIND_NETWORK | The network family that Anubis should bind to
|
| options/nixos/services.vault-agent.instances.<name>.settings.template | Template section of vault-agent
|
| options/nixos/services.duplicity.secretFile | Path of a file containing secrets (gpg passphrase, access key...) in
the format of EnvironmentFile as described by
systemd.exec(5)
|
| options/nixos/services.wiki-js.environmentFile | Environment file to inject e.g. secrets into the configuration.
|
| options/nixos/services.weblate.localDomain | The domain name serving your Weblate instance.
|
| options/nixos/services.froide-govplan.hostName | FQDN for the froide-govplan instance.
|
| options/nixos/services.canaille.secretKeyFile | File containing the Flask secret key
|
| options/nixos/services.olivetin.extraConfigFiles | Config files to merge into the settings defined in services.olivetin.settings
|
| options/nixos/programs.nncp.settings | NNCP configuration, see
http://www.nncpgo.org/Configuration.html
|
| options/nixos/services.matrix-synapse.settings | The primary synapse configuration
|
| options/nixos/services.nextcloud.occ | The nextcloud-occ program preconfigured to target this Nextcloud instance.
|
| options/nixos/services.pgbackrest.stanzas.<name>.instances.<name>.host | PostgreSQL host for operating remotely.
|
| options/nixos/services.vlagent.remoteWrite.url | Endpoint for the victorialogs instance
|
| options/nixos/services.webdav.settings | Attrset that is converted and passed as config file
|
| options/nixos/services.uptime.usesRemoteMongo | Whether the configuration file specifies a remote mongo instance
|
| options/nixos/services.gitea-actions-runner.instances.<name>.hostPackages | List of packages, that are available to actions, when the runner is configured
with a host execution label.
|
| options/nixos/services.smokeping.owner | Real name of the owner of the instance
|
| options/nixos/services.mautrix-meta.instances.<name>.registerToSynapse | Whether to add registration file to services.matrix-synapse.settings.app_service_config_files and
make Synapse wait for registration service.
|
| options/nixos/services.nextcloud.hostName | FQDN for the nextcloud instance.
|
| options/nixos/services.rutorrent.hostName | FQDN for the ruTorrent instance.
|
| options/nixos/services.prowlarr.settings | Attribute set of arbitrary config options
|
| options/nixos/services.whisparr.settings | Attribute set of arbitrary config options
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.package | The radicle-native-ci package to use.
|
| options/nixos/networking.jool.siit | Definitions of SIIT instances of Jool
|
| options/nixos/services.alerta.databaseName | Name of the database instance to connect to
|
| options/nixos/services.printing.cups-pdf.instances.<name>.settings.GhostScript | location of GhostScript binary
|
| options/nixos/services.sympa.mta.type | Mail transfer agent (MTA) integration
|
| options/nixos/services.yarr.environmentFile | Environment file for specifying additional settings such as secrets
|
| options/nixos/services.vmalert.instances.<name>.settings."notifier.url" | Prometheus Alertmanager URL
|
| options/nixos/services.easytier.instances.<name>.settings.hostname | Hostname shown in peer list and web console.
|
| options/nixos/services.clamsmtp.instances.*.maxConnections | Maximum number of connections to accept at once.
|
| options/nixos/services.plantuml-server.home | Home directory of the PlantUML server instance.
|
| options/home-manager/programs.git.package | The git package to use
|
| options/nixos/services.pghero.environment | Environment variables to set for the service
|
| options/nixos/services.consul-template.instances.<name>.settings | Free-form settings written directly to the config.json file
|
| options/nixos/services.k3s.autoDeployCharts.<name>.values | Override default chart values via Nix expressions
|
| options/nixos/networking.jool.nat64 | Definitions of NAT64 instances of Jool
|
| options/nixos/services.fider.environment | Environment variables to set for the service
|
| options/nixos/services.redis.servers.<name>.slaveOf | IP and port to which this redis instance acts as a slave.
|
| options/nixos/services.matrix-conduit.secretFile | Path to a file containing sensitive environment as described in {manpage}`systemd.exec(5)
|
| options/nixos/services.evcc.environmentFile | File with environment variables to pass into the runtime environment
|
| options/nixos/services.jitsi-meet.jibri.enable | Whether to enable a Jibri instance and configure it to connect to Prosody
|
| options/nixos/services.zwave-js.settings | Configuration settings for the generated config file
|
| options/nixos/services.openvpn.servers.<name>.up | Shell commands executed when the instance is starting.
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.settings | Configuration of radicle-native-ci
|
| options/nixos/services.dawarich.localDomain | The domain serving your Dawarich instance.
|
| options/nixos/services.castopod.localDomain | The domain serving your CastoPod instance.
|
| options/nixos/services.mastodon.localDomain | The domain serving your Mastodon instance.
|
| options/nixos/services.peertube.localDomain | The domain serving your PeerTube instance.
|
| options/nixos/services.jitsi-meet.jicofo.enable | Whether to enable JiCoFo instance and configure it to connect to Prosody
|
| options/nixos/services.cfssl.mutualTlsClientCert | Mutual TLS - client certificate to call remote instance requiring client certs.
|
| options/nixos/services.clamsmtp.instances.*.transparentProxy | Enable clamsmtp's transparent proxy support.
|
| options/nixos/services.pantalaimon-headless.instances.<name>.ssl | Whether or not SSL verification should be enabled for outgoing
connections to the homeserver.
|
| options/nixos/services.matrix-conduit.settings | Generates the conduit.toml configuration file
|
| options/nixos/services.printing.cups-pdf.instances.<name>.settings.Anonuser | User for anonymous PDF creation
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.settings.log | File where radicle-native-ci should write the run log.
|
| options/nixos/services.rke2.autoDeployCharts.<name>.values | Override default chart values via Nix expressions
|
| options/nixos/services.cfssl.mutualTlsClientKey | Mutual TLS - client key to call remote instance requiring client certs
|
| options/nixos/services.librenms.distributedPoller.enable | Configure this LibreNMS instance as a distributed poller
|
| options/nixos/services.zitadel.extraSettingsPaths | A list of paths to extra settings files
|
| options/nixos/services.shiori.environmentFile | Path to file containing environment variables
|
| options/nixos/services.jitsi-meet.jigasi.enable | Whether to enable jigasi instance and configure it to connect to Prosody
|
| options/nixos/services.immich-public-proxy.immichUrl | URL of the Immich instance
|
| options/nixos/services.pretix.settings.pretix.instance_name | The name of this installation.
|
| options/nixos/services.home-assistant.config | Your configuration.yaml as a Nix attribute set
|
| options/nixos/services.anubis.instances.<name>.settings.DIFFICULTY | The difficulty required for clients to solve the challenge
|
| options/nixos/services.mattermost.host | Host or address that this Mattermost instance listens on.
|
| options/nixos/services.ytdl-sub.instances.<name>.subscriptions | Subscriptions for ytdl-sub
|
| options/nixos/services.mtprotoproxy.users | Allowed users and their secrets
|
| options/nixos/services.nitter.server.hostname | Hostname of the instance.
|
| options/nixos/services.consul-template.instances.<name>.settings.pid_file | Path to use for the pid file.
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.settings.state | Directory where per-run directories are stored.
|
| options/nixos/services.hologram-agent.enable | Whether to enable the Hologram agent for AWS instance credentials
|
| options/nixos/services.openvpn.servers.<name>.down | Shell commands executed when the instance is shutting down.
|
| options/nixos/services.anubis.instances.<name>.settings.WEBMASTER_EMAIL | If set, shows a contact email address when rendering error pages
|
| options/nixos/services.vmalert.instances.<name>.settings."datasource.url" | Datasource compatible with Prometheus HTTP API.
|
| options/nixos/services.anubis.instances.<name>.settings.METRICS_BIND_NETWORK | The network family that the metrics server should bind to
|
| options/nixos/services.schleuder.extraSettingsFile | YAML file to merge into the schleuder config at runtime
|
| options/nixos/services.pantalaimon-headless.instances.<name>.logLevel | Set the log level of the daemon.
|
| options/nixos/services.pantalaimon-headless.instances.<name>.dataPath | The directory where pantalaimon should store its state such as the database file.
|
| options/nixos/services.consul-template.instances.<name>.settings.template | Template section of consul-template
|
| options/nixos/services.open-webui.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.wastebin.secretFile | Path to file containing sensitive environment variables
|
| options/nixos/services.rethinkdb.dbpath | Location where RethinkDB stores its data, 1 data directory per instance.
|
| options/nixos/services.dashy.settings | Settings serialized into user-data/conf.yml before build
|
| options/nixos/services.gatus.environmentFile | File to load as environment file
|
| options/nixos/services.syncplay.salt | Salt to allow room operator passwords generated by this server
instance to still work when the server is restarted
|
| options/nixos/services.couchdb.uriFile | This file contains the full URI that can be used to access this
instance of CouchDB
|
| options/nixos/services.keepalived.secretFile | Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: $ENVIRONMENT
or ${VARIABLE}
|
| options/nixos/services.easytier.instances.<name>.settings.listeners | Listener addresses to accept connections from other peers
|
| options/nixos/services.bcg.environmentFiles | File to load as environment file
|
| options/nixos/services.mautrix-meta.instances.<name>.registrationFile | Path to the yaml registration file of the appservice.
|
| options/nixos/services.sharkey.settings.url | The full URL that the Sharkey instance will be publically accessible on
|
| options/nixos/services.mattermost.siteUrl | URL this Mattermost instance is reachable under, without trailing slash.
|
| options/nixos/services.gotify.environmentFiles | Files containing additional config environment variables for gotify-server
|
| options/nixos/services.matrix-synapse.extraConfigFiles | Extra config files to include
|
| options/nixos/services.pretalx.settings.site.url | The base URI below which your pretalx instance will be reachable.
|
| options/home-manager/programs.pianobar.settings | Apply configurations for pianobar via key/value attributes
|
| options/nixos/services.hologram-server.enable | Whether to enable the Hologram server for AWS instance credentials
|
| options/nixos/services.tsidp.environmentFile | Path to an environment file loaded for the tsidp service
|
| options/nixos/services.netbird.clients.<name>.user.name | A system user name for this client instance.
|
| options/nixos/services.netbird.tunnels.<name>.user.name | A system user name for this client instance.
|
| options/nixos/services.homer.settings | Settings serialized into config.yml before build
|
| options/nixos/services.akkoma.installWrapper | Whether to install a wrapper around pleroma_ctl to simplify administration of the
Akkoma instance.
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.runtimePackages | Packages added to the adapter's PATH.
|
| options/nixos/services.openvpn.servers | Each attribute of this option defines a systemd service that
runs an OpenVPN instance
|
| options/nixos/services.openssh.startWhenNeeded | If set, sshd is socket-activated; that
is, instead of having it permanently running as a daemon,
systemd will start an instance for each incoming connection.
|
| options/nixos/services.roundcube.extraConfig | Extra configuration for roundcube webmail instance
|
| options/nixos/services.syncplay.saltFile | Path to the file that contains the server salt
|
| options/nixos/services.litellm.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.orthanc.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.patroni.environmentFiles | Environment variables made available to Patroni as files content, useful for providing secrets from files.
|
| options/nixos/services.beszel.hub.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.ntfy-sh.environmentFile | Path to a file containing extra ntfy environment variables in the systemd EnvironmentFile
format
|
| options/nixos/services.invidious.extraSettingsFile | A file including Invidious settings
|
| options/nixos/services.anubis.instances.<name>.settings.OG_PASSTHROUGH | Whether to enable Open Graph tag passthrough
|
| options/nixos/services.pingvin-share.hostname | The domain name of your instance
|
| options/nixos/services.librechat.enableLocalDB | Whether to enable a local mongodb instance.
|
| options/nixos/services.hatsu.settings.HATSU_DOMAIN | The domain name of your instance (eg 'hatsu.local').
|
| options/nixos/services.openvpn.servers.<name>.autoStart | Whether this OpenVPN instance should be started automatically.
|
| options/nixos/services.netbird.tunnels.<name>.user.group | A system group name for this client instance.
|
| options/nixos/services.netbird.clients.<name>.user.group | A system group name for this client instance.
|
| options/nixos/services.redis.servers.<name>.user | User account under which this instance of redis-server runs.
If left as the default value this user will automatically be
created on system activation, otherwise you are responsible for
ensuring the user exists before the redis service starts.
|
| options/nixos/services.pds.settings.PDS_HOSTNAME | Instance hostname (base domain name)
|
| options/nixos/services.lasuite-docs.environmentFile | Path to environment file
|
| options/nixos/services.lasuite-meet.environmentFile | Path to environment file
|
| options/nixos/services.pantalaimon-headless.instances.<name>.listenPort | The port where the daemon will listen to client connections for
this homeserver
|
| options/nixos/services.peertube.enableWebHttps | Whether clients will access your PeerTube instance with HTTPS
|
| options/nixos/services.chhoto-url.environmentFiles | Files to load environment variables from in addition to services.chhoto-url.settings
|
| options/nixos/services.screego.environmentFile | Environment file (see systemd.exec(5) "EnvironmentFile="
section for the syntax) passed to the service
|
| options/nixos/services.livekit.redis.createLocally | Whether to set up a local redis instance.
|
| options/nixos/services.radicle.ci.adapters.native.instances.<name>.settings.base_url | Base URL for build logs (mandatory for access from CI broker page).
|
| options/nixos/services.teamspeak3.queryIP | IP on which the server instance will listen for incoming ServerQuery connections
|
| options/nixos/services.teamspeak3.voiceIP | IP on which the server instance will listen for incoming voice connections
|
| options/nixos/services.netbird.clients.<name>.bin.suffix | A system group name for this client instance.
|
| options/nixos/services.netbird.tunnels.<name>.bin.suffix | A system group name for this client instance.
|
| options/nixos/services.zipline.environmentFiles | Files to load environment variables from (in addition to services.zipline.settings)
|
| options/nixos/services.dendrite.loadCredential | This can be used to pass secrets to the systemd service without adding them to
the nix store
|
| options/nixos/services.librenms.environmentFile | File containing env-vars to be substituted into the final config
|
| options/nixos/services.lemmy.settings.hostname | The domain name of your instance (eg 'lemmy.ml').
|
| options/nixos/services.grafana-image-renderer.settings.rendering.mode | Rendering mode of grafana-image-renderer:
default: Creates on browser-instance
per rendering request.
reusable: One browser instance
will be started and reused for each rendering request.
clustered: allows to precisely
configure how many browser-instances are supposed to be used
|
| options/darwin/services.telegraf.environmentFiles | File to load as environment file
|
| options/nixos/services.send.redis.passwordFile | The path to the file containing the Redis password
|
| options/nixos/services.misskey.redis.createLocally | Create and use a local Redis instance
|
| options/nixos/services.cryptpad.settings | Cryptpad configuration settings
|
| options/nixos/services.mautrix-meta.instances.<name>.serviceDependencies | List of Systemd services to require and wait for when starting the application service.
|
| options/nixos/services.redis.servers.<name>.group | Group account under which this instance of redis-server runs.
If left as the default value this group will automatically be
created on system activation, otherwise you are responsible for
ensuring the group exists before the redis service starts.
|
| options/nixos/services.docling-serve.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.pgmanage.superOnly | This tells pgmanage whether or not to only allow super users to
login
|
| options/nixos/services.linkwarden.secretFiles | Attribute set containing paths to files to add to the environment of linkwarden
|
| options/nixos/services.pocket-id.credentials | Environment variables which are loaded from the contents of the specified file paths
|
| options/nixos/services.castopod.environmentFile | Environment file to inject e.g. secrets into the configuration
|
| options/nixos/services.dawarich.secretKeyBaseFile | Path to file containing the secret key base
|
| options/nixos/services.anubis.defaultOptions.enable | Whether to enable this instance of Anubis.
|
| options/nixos/services.pantalaimon-headless.instances.<name>.listenAddress | The address where the daemon will listen to client connections
for this homeserver.
|
| options/nixos/security.pam.sshAgentAuth.enable | Whether to enable authenticating using a signature performed by the ssh-agent
|
| options/nixos/services.easytier.instances.<name>.settings.network_name | EasyTier network name.
|
| options/nixos/services.trilium-server.environmentFile | File to load as the environment file
|
| options/nixos/services.wstunnel.clients.<name>.enable | Whether to enable this wstunnel instance.
|
| options/nixos/services.wstunnel.servers.<name>.enable | Whether to enable this wstunnel instance.
|
| options/nixos/services.monero.environmentFile | Path to an EnvironmentFile for the monero service as defined in systemd.exec(5)
|
| options/nixos/services.filesender.localDomain | The domain serving your FileSender instance.
|
| options/nixos/services.sharkey.environmentFiles | List of paths to files containing environment variables for Sharkey to use at runtime
|
| options/nixos/services.stirling-pdf.environmentFiles | Files containing additional environment variables to pass to Stirling PDF
|
| options/nixos/services.pantalaimon-headless.instances.<name>.extraSettings | Extra configuration options
|
| options/nixos/services.ncps.cache.redis.addresses | A list of host:port for the Redis servers that are part of a cluster
|
| options/nixos/services.sssd.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.rmfakecloud.extraSettings | Extra settings in the form of a set of key-value pairs
|
| options/nixos/services.wstunnel.clients.<name>.autoStart | Whether to enable starting this wstunnel instance automatically.
|
| options/nixos/services.wstunnel.servers.<name>.autoStart | Whether to enable starting this wstunnel instance automatically.
|
| options/nixos/services.kanidm.serverSettings.origin | The origin of your Kanidm instance
|
| options/nixos/services.actual.settings.dataDir | Directory under which Actual runs and saves its data
|
| options/nixos/services.lemmy.database.createLocally | Whether to enable creation of database on the instance.
|
| options/nixos/services.kanidm.server.settings.origin | The origin of your Kanidm instance
|
| options/nixos/services.mysql.replication.role | Role of the MySQL server instance.
|
| options/nixos/services.fedimintd.<name>.bitcoin.rpc.secretFile | If set the URL specified in bitcoin.rpc.url will get the content of this file added
as an URL password, so http://user@example.com will turn into http://user:SOMESECRET@example.com
|
| options/nixos/services.hercules-ci-agent.settings.baseDirectory | State directory (secrets, work directory, etc) for agent
|
| options/darwin/services.hercules-ci-agent.settings.baseDirectory | State directory (secrets, work directory, etc) for agent
|
| options/nixos/services.snips-sh.environmentFile | Additional environment file as defined in systemd.exec(5)
|
| options/nixos/services.onlyoffice.hostname | FQDN for the OnlyOffice instance.
|
| options/nixos/services.pfix-srsd.configurePostfix | Whether to configure the required settings to use pfix-srsd in the local Postfix instance.
|
| options/nixos/services.homebridge.environmentFile | Path to an environment-file which may contain secrets.
|
| options/nixos/services.nextcloud.datadir | Nextcloud's data storage path
|
| options/nixos/services.pocket-id.environmentFile | Path to an environment file to be loaded
|
| options/nixos/services.karakeep.browser.enable | Enable the karakeep-browser service that runs a chromium instance in
the background with debugging ports exposed
|
| options/nixos/services.telegraf.environmentFiles | File to load as environment file
|
| options/nixos/services.librechat.credentials | Environment variables which are loaded from the contents of files at a file paths, mainly used for secrets
|
| options/nixos/services.gitlab-runner.services.<name>.cloneUrl | Overwrite the URL for the GitLab instance
|
| options/darwin/services.gitlab-runner.services.<name>.cloneUrl | Overwrite the URL for the GitLab instance
|
| options/nixos/services.pds.environmentFiles | File to load environment variables from
|
| options/nixos/services.glitchtip.environmentFiles | Files to load environment variables from in addition to services.glitchtip.settings
|
| options/nixos/services.maubot.settings.homeservers | Known homeservers
|
| options/nixos/services.mautrix-meta.instances.<name>.registrationServiceUnit | The registration service that generates the registration file
|
| options/nixos/services.openvpn.servers.<name>.config | Configuration of this OpenVPN instance
|
| options/nixos/services.pantalaimon-headless.instances.<name>.homeserver | The URI of the homeserver that the pantalaimon proxy should
forward requests to, without the matrix API path but including
the http(s) schema.
|
| options/nixos/services.nitter.sessionsFile | Path to the session tokens file
|
| options/nixos/nix.settings.trusted-users | A list of names of users that have additional rights when
connecting to the Nix daemon, such as the ability to specify
additional binary caches, or to import unsigned NARs
|
| options/darwin/nix.settings.trusted-users | A list of names of users that have additional rights when
connecting to the Nix daemon, such as the ability to specify
additional binary caches, or to import unsigned NARs
|
| options/nixos/services.opencloud.environmentFile | An environment file as defined in systemd.exec(5)
|
| options/nixos/services.nitter.preferences.theme | Instance theme.
|
| options/nixos/services.nextcloud.package | Which package to use for the Nextcloud instance.
|
| options/nixos/services.thelounge.public | Make your The Lounge instance public
|
| options/nixos/services.paperless.enable | Whether to enable Paperless-ngx
|
| options/nixos/services.traccar.environmentFile | File containing environment variables to substitute in the configuration before starting Traccar
|
| options/nixos/services.resilio.sharedFolders | Shared folder list
|
| options/nixos/services.livekit.settings.redis.address | Host and port used to connect to a redis instance.
|
| options/nixos/services.workout-tracker.environmentFile | An environment file as defined in systemd.exec(5)
|
| options/nixos/services.ente.api.settings.apps.public-albums | If you're running a self hosted instance and wish to serve public links,
set this to the URL where your albums web app is running.
|
| options/nixos/services.glitchtip.redis.createLocally | Whether to enable and configure a local Redis instance.
|
| options/nixos/services.murmur.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.movim.podConfig.description | General description of the instance
|
| options/nixos/services.bluesky-pds.settings.PDS_HOSTNAME | Instance hostname (base domain name)
|
| options/nixos/services.pretix.database.createLocally | Whether to automatically set up the database on the local DBMS instance
|
| options/nixos/services.grafana-to-ntfy.settings.ntfyBAuthPass | The path to the password for the specified ntfy-sh user
|
| options/nixos/services.tandoor-recipes.enable | Enable Tandoor Recipes
|
| options/nixos/services.ncps.cache.lock.backend | Lock backend to use: 'local' (single instance), 'redis'
(distributed), 'postgres' (distributed, requires PostgreSQL)
|
| options/nixos/services.restic.backups.<name>.rcloneConfig | Configuration for the rclone remote being used for backup
|
| options/nixos/services.btrbk.instances.<name>.settings.stream_compress | Compress the btrfs send stream before transferring it from/to remote locations using a
compression command.
|
| options/nixos/programs.captive-browser.enable | Whether to enable captive browser, a dedicated Chrome instance to log into captive portals without messing with DNS settings.
|
| options/nixos/services.scrutiny.influxdb.enable | Enables InfluxDB on the host system using the services.influxdb2 NixOS module
with default options
|
| options/nixos/services.easytier.instances.<name>.settings.network_secret | EasyTier network credential used for verification and
encryption
|
| options/nixos/services.mjolnir.pantalaimon | pantalaimon options (enables E2E Encryption support)
|
| options/nixos/nixpkgs.buildPlatform | Specifies the platform on which NixOS should be built
|
| options/nixos/services.paperless.environmentFile | Path to a file containing extra paperless config options in the systemd EnvironmentFile
format
|
| options/nixos/services.hatsu.settings.HATSU_PRIMARY_ACCOUNT | The primary account of your instance (eg 'example.com').
|
| options/nixos/services.scrutiny.settings.web.influxdb.port | The port of the InfluxDB instance.
|
| options/nixos/services.postsrsd.configurePostfix | Whether to configure the required settings to use postsrsd in the local Postfix instance.
|
| options/nixos/services.cryptpad.settings.httpUnsafeOrigin | This is the URL that users will enter to load your instance
|
| options/nixos/services.pretalx.database.createLocally | Whether to automatically set up the database on the local DBMS instance
|
| options/nixos/services.librenms.enableLocalBilling | Enable billing Cron-Jobs on the local instance
|
| options/nixos/services.scrutiny.settings.web.influxdb.host | IP or hostname of the InfluxDB instance.
|
| options/darwin/system.stateVersion | Every once in a while, a new nix-darwin release may change
configuration defaults in a way incompatible with stateful
data
|
| options/nixos/services.teamspeak3.fileTransferIP | IP on which the server instance will listen for incoming file transfer connections
|
| options/nixos/services.public-inbox.settings.coderepo.<name>.cgitUrl | URL of a cgit instance
|
| options/darwin/nixpkgs.buildPlatform | Specifies the platform on which nix-darwin should be built
|
| options/nixos/services.mollysocket.environmentFile | Environment file (see systemd.exec(5) "EnvironmentFile="
section for the syntax) passed to the service
|
| options/nixos/services.woodpecker-server.environmentFile | File to load environment variables
from
|
| options/nixos/services.bluesky-pds.environmentFiles | File to load environment variables from
|
| options/nixos/services.reposilite.settings.basePath | Custom base path for this Reposilite instance
|
| options/nixos/services.prometheus.exporters.lnd.lndHost | lnd instance gRPC address:port.
|
| options/nixos/services.cryptpad.configureNginx | Configure Nginx as a reverse proxy for Cryptpad
|
| options/nixos/services.jitsi-meet.videobridge.enable | Jitsi Videobridge instance and configure it to connect to Prosody
|
| options/nixos/services.nextcloud-whiteboard-server.settings | Settings to configure backend server
|
| options/nixos/services.hedgedoc.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.kanidm.server.settings.domain | The domain that Kanidm manages
|
| options/nixos/services.immich-kiosk.settings.immich_url | URL of the immich instance.
|
| options/nixos/services.your_spotify.enableLocalDB | Whether to enable a local mongodb instance.
|
| options/nixos/services.kanidm.serverSettings.domain | The domain that Kanidm manages
|
| options/nixos/services.mautrix-discord.environmentFile | File containing environment variables to substitute when copying the configuration
out of Nix store to the services.mautrix-discord.dataDir
|
| options/home-manager/wayland.windowManager.sway.config.bars.*.id | Specifies the bar ID for the configured bar instance
|
| options/nixos/services.homepage-dashboard.environmentFile | The path to an environment file that contains environment variables to pass
to the homepage-dashboard service, for the purpose of passing secrets to
the service
|
| options/nixos/services.linkwarden.environmentFile | Path of a file with extra environment variables to be loaded from disk
|
| options/nixos/services.postfix-tlspol.configurePostfix | Whether to configure the required settings to use postfix-tlspol in the local Postfix instance.
|
| options/nixos/services.tuned.settings.default_instance_priority | Default instance (unit) priority.
|
| options/nixos/services.oncall.settings.oncall_host | FQDN for the Oncall instance.
|
| options/nixos/services.ncdns.identity.hostname | The hostname of this ncdns instance, which defaults to the machine
hostname
|
| options/nixos/services.lubelogger.environmentFile | Path to a file containing extra LubeLogger config options in the systemd EnvironmentFile format
|
| options/nixos/services.teeworlds.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.postfixadmin.extraConfig | Extra configuration for the postfixadmin instance, see postfixadmin's config.inc.php for available options.
|
| options/nixos/services.rmfakecloud.environmentFile | Path to an environment file loaded for the rmfakecloud service
|
| options/nixos/services.invidious.serviceScale | How many invidious instances to run
|
| options/nixos/services.dendrite.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/home-manager/accounts.contact.accounts.<name>.khal.color | Color in which events in this calendar are displayed
|
| options/nixos/services.plausible.database.postgres.setup | Whether to enable creating a postgresql instance.
|
| options/nixos/services.matrix-conduit.settings.global.port | The port Conduit will be running on
|
| options/nixos/networking.wireless.networks.<name>.auth | Use this option to configure advanced authentication methods
like EAP
|
| options/home-manager/xsession.windowManager.i3.config.bars.*.id | Specifies the bar ID for the configured bar instance
|
| options/nixos/services.hercules-ci-agent.settings.staticSecretsDirectory | This is the default directory to look for statically configured secrets like cluster-join-token.key
|
| options/darwin/services.hercules-ci-agent.settings.staticSecretsDirectory | This is the default directory to look for statically configured secrets like cluster-join-token.key
|
| options/nixos/services.nitter.preferences.replaceYouTube | Replace YouTube links with links to this instance (blank to disable).
|
| options/nixos/services.matrix-tuwunel.settings.global.port | The port(s) tuwunel will be running on
|
| options/darwin/services.buildkite-agents.<name>.hooks.environment | The environment hook will run before all other commands, and can be used
to set up secrets, data, etc
|
| options/nixos/services.chhoto-url.settings.hash_algorithm | The hash algorithm to use for passwords and API keys
|
| options/nixos/services.peering-manager.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/home-manager/programs.rclone.remotes.<name>.config | Regular configuration options as described in rclone's documentation
https://rclone.org/docs/
|
| options/nixos/services.kanidm.provision.acceptInvalidCerts | Whether to allow invalid certificates when provisioning the target instance
|
| options/nixos/services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".url.host | Domain name of the instance.
|
| options/nixos/services.hedgedoc.settings.allowGravatar | Whether to enable Libravatar as
profile picture source on your instance
|
| options/nixos/services.woodpecker-agents.agents.<name>.environmentFile | File to load environment variables
from
|
| options/nixos/boot.initrd.network.openvpn.configuration | The configuration file for OpenVPN.
Unless your bootloader supports initrd secrets, this configuration
is stored insecurely in the global Nix store.
|
| options/home-manager/accounts.calendar.accounts.<name>.khal.color | Color in which events in this calendar are displayed
|
| options/nixos/services.nitter.preferences.replaceReddit | Replace Reddit links with links to this instance (blank to disable).
|
| options/nixos/services.prometheus.exporters.mqtt.environmentFile | File to load as environment file
|
| options/nixos/services.livebook.environmentFile | Additional environment file as defined in systemd.exec(5)
|
| options/nixos/services.kmonad.keyboards.<name>.extraGroups | Extra permission groups to attach to the KMonad instance for
this keyboard
|
| options/nixos/services.gitlab-runner.services.<name>.environmentVariables | Custom environment variables injected to build environment
|
| options/darwin/services.gitlab-runner.services.<name>.environmentVariables | Custom environment variables injected to build environment
|
| options/nixos/services.hydra.useSubstitutes | Whether to use binary caches for downloading store paths
|
| options/nixos/services.traefik.environmentFiles | Files to load as an environment file just before Traefik starts
|
| options/nixos/services.n8n.environment.GENERIC_TIMEZONE | The n8n instance timezone
|
| options/nixos/services.hddfancontrol.settings | Parameter-sets for each instance of hddfancontrol.
|
| options/nixos/services.lifecycled.cloudwatchStream | Write logs to a specific Cloudwatch Logs stream
|
| options/nixos/services.pretix.settings.memcached.location | The host:port combination or the path to the UNIX socket of a memcached instance
|
| options/nixos/services.matrix-synapse.package | Reference to the matrix-synapse wrapper with all extras
(e.g. for oidc or saml2) added to the PYTHONPATH of all executables
|
| options/nixos/services.nitter.preferences.replaceTwitter | Replace Twitter links with links to this instance (blank to disable).
|
| options/nixos/services.simplesamlphp.<name>.phpfpmPool | The PHP-FPM pool that serves SimpleSAMLphp instance.
|
| options/nixos/services.prometheus.alertmanager-ntfy.extraConfigFiles | Config files to merge into the settings defined in services.prometheus.alertmanager-ntfy.settings
|
| options/nixos/services.victorialogs.basicAuthUsername | Basic Auth username used to protect VictoriaLogs instance by authorization
|
| options/nixos/services.misskey.meilisearch.createLocally | Create and use a local Meilisearch instance
|
| options/nixos/services.prometheus.exporters.pihole.timeout | Controls the timeout to connect to a Pi-Hole instance
|
| options/home-manager/programs.radicle.uri.rad.browser.preferredNode | The hostname of an instance of radicle-node, reachable via HTTPS.
|
| options/nixos/services.mqtt2influxdb.environmentFiles | File to load as environment file
|
| options/nixos/services.libretranslate.domain | The domain serving your LibreTranslate instance
|
| options/nixos/services.mpdscribble.passwordFile | File containing the password for the mpd daemon
|
| options/nixos/services.plausible.database.clickhouse.setup | Whether to enable creating a clickhouse instance.
|
| options/nixos/services.simplesamlphp.<name>.localDomain | The domain serving your SimpleSAMLphp instance
|
| options/nixos/boot.kernelPackages | This option allows you to override the Linux kernel used by
NixOS
|
| options/home-manager/xdg.mimeApps.defaultApplications | The default application to be used for a given mimetype
|
| options/nixos/security.googleOsLogin.enable | Whether to enable Google OS Login
|
| options/nixos/services.victorialogs.basicAuthPasswordFile | File that contains the Basic Auth password used to protect VictoriaLogs instance by authorization
|
| options/nixos/services.prometheus.exporters.chrony.user | User name under which the chrony exporter shall be run
|
| options/nixos/services.sharkey.setupMeilisearch | Whether to automatically set up a local Meilisearch instance and configure Sharkey to use it
|
| options/nixos/services.prometheus.exporters.restic.rcloneConfig | Configuration for the rclone remote being used for backup
|
| options/nixos/services.litestream.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.uwsgi.capabilities | Grant capabilities to the uWSGI instance
|
| options/nixos/services.vaultwarden.environmentFile | Additional environment file or files as defined in systemd.exec(5)
|
| options/nixos/services.beesd.filesystems.<name>.spec | Description of how to identify the filesystem to be duplicated by this
instance of bees
|
| options/nixos/services.nextcloud-spreed-signaling.backends.<name>.urls | List of URLs of the Nextcloud instance
|
| options/nixos/services.prometheus.exporters.chrony.group | Group under which the chrony exporter shall be run
|
| options/nixos/services.homebridge.settings.description | Description of the homebridge instance.
|
| options/nixos/services.mastodon.configureNginx | Configure nginx as a reverse proxy for mastodon
|
| options/nixos/services.jibri.xmppEnvironments.<name>.control.login.domain | The domain part of the JID for this Jibri instance.
|
| options/nixos/services.librenms.useDistributedPollers | Enables distributed pollers
for this LibreNMS instance
|
| options/nixos/services.matrix-synapse.log | Default configuration for the loggers used by matrix-synapse and its workers
|
| options/nixos/services.healthchecks.settings | Environment variables which are read by healthchecks (local)_settings.py
|
| options/home-manager/programs.prismlauncher.icons | List of paths to instance icons
|
| options/nixos/services.prometheus.exporters.ecoflow.prefix | The prefix that will be added to all metrics
|
| options/nixos/services.healthchecks.settingsFile | Environment variables which are read by healthchecks (local)_settings.py
|
| options/nixos/services.jibri.xmppEnvironments.<name>.control.muc.nickname | The nickname for this Jibri instance in the MUC.
|
| options/nixos/networking.wireless.interfaces | The interfaces wpa_supplicant will use
|
| options/nixos/services.prometheus.alertmanagerGotify.environmentFile | File containing additional config environment variables for alertmanager-gotify-bridge
|
| options/nixos/services.parsedmarc.provision.grafana.dashboard | Whether the official parsedmarc grafana dashboard should
be provisioned to the local grafana instance.
|
| options/nixos/services.warpgate.settings.external_host | Configure the domain name of this Warpgate instance
|
| options/nixos/services.victoriatraces.basicAuthUsername | Basic Auth username used to protect VictoriaTraces instance by authorization
|
| options/nixos/security.apparmor.enable | Whether to enable the AppArmor Mandatory Access Control system
|
| options/nixos/services.pufferpanel.environment | Environment variables to set for the service
|
| options/nixos/services.prometheus.exporters.snmp.environmentFile | EnvironmentFile as defined in systemd.exec(5)
|
| options/nixos/services.prometheus.exporters.php-fpm.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.matrix-continuwuity.settings.global.port | The port(s) continuwuity will be running on
|
| options/nixos/services.victoriatraces.basicAuthPasswordFile | File that contains the Basic Auth password used to protect VictoriaTraces instance by authorization
|
| options/nixos/services.public-inbox.settings.publicinbox.nntpserver | NNTP URLs to this public-inbox instance
|
| options/nixos/services.public-inbox.settings.publicinbox.pop3server | POP3 URLs to this public-inbox instance
|
| options/nixos/services.public-inbox.settings.publicinbox.imapserver | IMAP URLs to this public-inbox instance
|
| options/nixos/boot.loader.generic-extlinux-compatible.enable | Whether to generate an extlinux-compatible configuration file
under /boot/extlinux.conf
|
| options/nixos/services.biboumi.settings.xmpp_server_ip | The IP address to connect to the XMPP server on
|
| options/nixos/services.parsedmarc.provision.grafana.datasource | Whether the automatically provisioned Elasticsearch
instance should be added as a grafana datasource
|
| options/darwin/services.jankyborders.active_color | Sets the border color for the focused window (format: 0xAARRGGBB)
|
| options/nixos/programs.captive-browser.browser | The shell (/bin/sh) command executed once the proxy starts
|
| options/nixos/services.victoriametrics.basicAuthUsername | Basic Auth username used to protect VictoriaMetrics instance by authorization
|
| options/nixos/services.prometheus.exporters.deluge.exportPerTorrentMetrics | Enable per-torrent metrics
|
| options/nixos/services.jitsi-videobridge.nat.harvesterAddresses | Addresses of public STUN services to use to automatically find
the public and local addresses of this Jitsi-Videobridge instance
without the need for manual configuration
|
| options/nixos/services.gitea.settings.service.DISABLE_REGISTRATION | By default any user can create an account on this gitea instance
|
| options/nixos/services.prometheus.exporters.postgres.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.parsedmarc.provision.elasticsearch | Whether to set up and use a local instance of Elasticsearch.
|
| options/nixos/services.reposilite.settings.compressionStrategy | Compression algorithm used by this instance of Reposilite.
none reduces usage of CPU & memory, but requires transfering more data.
|
| options/nixos/services.victoriametrics.basicAuthPasswordFile | File that contains the Basic Auth password used to protect VictoriaMetrics instance by authorization
|
| options/nixos/services.matrix-synapse.settings.turn_shared_secret | The shared secret used to compute passwords for the TURN server
|
| options/nixos/services.prometheus.alertmanager-ntfy.settings.ntfy.baseurl | The base URL of the ntfy.sh instance.
|
| options/nixos/services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".secret_key_base | Secret key used as a base to generate further secrets for encrypting and
signing data
|
| options/nixos/services.redsocks.redsocks.*.redirectCondition | Conditions to make outbound packets go through this redsocks
instance
|
| options/nixos/services.mobilizon.settings.":mobilizon"."Mobilizon.Web.Endpoint".url.host | Your instance's hostname for generating URLs throughout the app
|
| options/nixos/services.prometheus.exporters.ecoflow.ecoflowDevicesFile | File must contain one line, example: R3300000,R3400000,NC430000,...
|
| options/nixos/services.pipewire.wireplumber.extraConfig | Additional configuration for the WirePlumber daemon when run in
single-instance mode (the default in nixpkgs and currently the only
supported way to run WirePlumber configured via extraConfig)
|
| options/nixos/services.maubot.settings.server.plugin_base_path | The base path for plugin endpoints
|
| options/nixos/services.matrix-synapse.settings.macaroon_secret_key | Secret key for authentication tokens
|
| options/nixos/virtualisation.docker.rootless.setSocketVariable | Point DOCKER_HOST to rootless Docker instance for
normal users by default.
|
| options/nixos/services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.region | The AWS Region
|
| options/nixos/networking.usePredictableInterfaceNames | Whether to assign predictable names to network interfaces
|
| options/nixos/services.healthchecks.settings.REGISTRATION_OPEN | A boolean that controls whether site visitors can create new accounts
|
| options/nixos/services.transmission.performanceNetParameters | Whether to enable tweaking of kernel parameters
to open many more connections at the same time
|
| options/nixos/services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.filters | Filters can be used optionally to filter the instance list by other criteria.
|
| options/nixos/services.matrix-conduit.settings.global.database_backend | The database backend for the service
|
| options/nixos/services.prometheus.scrapeConfigs.*.gce_sd_configs.*.filter | Filter can be used optionally to filter the instance list by other
criteria Syntax of this filter string is described here in the filter
query parameter section: https://cloud.google.com/compute/docs/reference/latest/instances/list.
|
| options/nixos/virtualisation.tpm.provisioning | Script to provision the TPM before control is handed off to the VM.
TPM2TOOLS_TCTI will be provided to configure tpm2-tools to use the
swtpm instance transparently.
TCTI is also provided as a generic value, consumer is expected to
re-export it however it may need (TPM2OPENSSL_TCTI, TPM2_PKCS11_TCTI,
...).
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.readPermissions | The read permissions to include for this token
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.writePermissions | The read permissions to include for this token
|
| options/nixos/services.prometheus.scrapeConfigs.*.honor_labels | Controls how Prometheus handles conflicts between labels
that are already present in scraped data and labels that
Prometheus would attach server-side ("job" and "instance"
labels, manually configured target labels, and labels
generated by service discovery implementations)
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.if_id_in | XFRM interface ID set on inbound policies/SA
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.if_id_out | XFRM interface ID set on outbound policies/SA
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mark_out | Netfilter mark and mask for output traffic
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mark_in | Netfilter mark and mask for input traffic
|
| options/nixos/services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.role | Role of the targets to retrieve
|
| options/nixos/services.prometheus.scrapeConfigs.*.gce_sd_configs.*.tag_separator | The tag separator used to separate concatenated GCE instance network tags
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.api_server | The API server addresses
|
| options/nixos/services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.region | The AWS region
|
| options/nixos/services.matrix-synapse.settings.registration_shared_secret | If set, allows registration by anyone who also has the shared
secret, even if registration is otherwise disabled
|
| options/nixos/services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.refresh_interval | Refresh interval to re-read the instance list
|
| options/nixos/services.prometheus.scrapeConfigs.*.gce_sd_configs.*.refresh_interval | Refresh interval to re-read the cloud instance list
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tag_separator | The string by which Linode Instance tags are joined into the tag label
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.include_parameters | Whether to include the parameters as meta labels
|
| options/nixos/services.prometheus.scrapeConfigs.*.azure_sd_configs.*.refresh_interval | Refresh interval to re-read the instance list
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.all_tenants | Whether the service discovery should list all instances for all projects
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.refresh_interval | Refresh interval to re-read the instance list
|
| options/nixos/services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.refresh_interval | Refresh interval to re-read the instance list
|
| options/nixos/services.maubot.settings.plugin_databases.postgres_max_conns_per_plugin | Maximum number of connections per plugin instance.
|
| packages/nixpkgs/ks | Command-line secrets manager powered by macOS keychains |
| packages/nixpkgs/bws | Bitwarden Secrets Manager CLI |
| packages/nixpkgs/vault-bin | Tool for managing secrets, this binary includes the UI |
| packages/nixpkgs/kubeseal | Kubernetes controller and tool for one-way encrypted Secrets |
| packages/nixpkgs/sops | Simple and flexible tool for managing secrets |
| packages/nixpkgs/ots | Share end-to-end encrypted secrets with others via a one-time URL |
| packages/nixpkgs/senv | Friends don't let friends leak secrets on their terminal window |
| packages/nixpkgs/vault | Tool for managing secrets |
| packages/nixpkgs/argocd-vault-plugin | Argo CD plugin to retrieve secrets from Secret Management tools and inject them into Kubernetes secrets |
| packages/nixpkgs/proton-pass-cli | Command-line interface for managing your Proton Pass vaults, items, and secrets |
| packages/nixpkgs/cliqr | Transfer, share data & secrets via console qr codes |
| packages/nixpkgs/ejson | Small library to manage encrypted secrets using asymmetric encryption |
| packages/nixpkgs/decoder | "secrets" decoding for FRITZ!OS devices |
| packages/nixpkgs/summon | CLI that provides on-demand secrets access for common DevOps tools |
| packages/nixpkgs/ragenix | Age-encrypted secrets for NixOS, drop-in replacement for agenix |
| packages/nixpkgs/paper-age | Easy and secure paper backups of secrets |
| packages/nixpkgs/go-secdump | Tool to remotely dump secrets from the Windows registry |
| packages/nixpkgs/nms | A command line tool that recreates the famous data decryption
effect seen in the 1992 movie Sneakers.
|
| packages/nixpkgs/teller | Cloud native secrets management for developers |
| packages/nixpkgs/pulumi-esc | Pulumi ESC (Environments, Secrets, and Configuration) for cloud applications and infrastructure |
| packages/nixpkgs/tilt | Local development tool to manage your developer instance when your team deploys to Kubernetes in production |
| packages/nixpkgs/doppler | Official CLI for interacting with your Doppler Enclave secrets and configuration |
| packages/nixpkgs/berglas | Tool for managing secrets on Google Cloud |
| packages/nixpkgs/chamber | Tool for managing secrets by storing them in AWS SSM Parameter Store |
| packages/nixpkgs/entropy | Tool to scan your codebase for high entropy lines, which are often secrets |
| packages/nixpkgs/tartufo | Tool to search through git repositories for high entropy strings and secrets |
| packages/nixpkgs/jsluice | Tool for extracting URLs, paths, secrets, and other data from JavaScript source code |
| packages/nixpkgs/vault-medusa | Cli tool for importing and exporting Hashicorp Vault secrets |
| packages/nixpkgs/github-to-sops | Tool for managing infrastructure secrets in git repositories using SOPS and GitHub SSH keys |
| packages/nixpkgs/gitleaks | Scan git repos (or files) for secrets |
| packages/nixpkgs/qui | Modern alternative webUI for qBittorrent, with multi-instance support |
| packages/nixpkgs/apkleaks | Scanning APK file for URIs, endpoints and secrets |
| packages/nixpkgs/whispers | Tool to identify hardcoded secrets in static structured text |
| packages/nixpkgs/ggshield | Tool to find and fix various types of hardcoded secrets and infrastructure-as-code misconfigurations |
| packages/nixpkgs/gnome-keyring | Collection of components in GNOME that store secrets, passwords, keys, certificates and make them available to applications |
| packages/nixpkgs/dismember | Tool to scan memory for secrets |
| packages/nixpkgs/snac2 | Simple, minimalistic ActivityPub instance (2.x, C) |
| packages/nixpkgs/buttercup-desktop | Cross-Platform Passwords & Secrets Vault |
| packages/nixpkgs/ejson2env | Decrypt EJSON secrets and export them as environment variables |
| packages/nixpkgs/credstash | Utility for managing secrets in the cloud using AWS KMS and DynamoDB |
| packages/nixpkgs/regpg | GPG wrapper utility for storing secrets in VCS |
| packages/nixpkgs/lssecret | Tool to list passwords and other secrets stored using the org.freedesktop.secrets dbus api |
| packages/nixpkgs/kubectl-view-secret | Kubernetes CLI plugin to decode Kubernetes secrets |
| packages/nixpkgs/lspmux | Share one language server instance between multiple LSP clients to save resources |
| packages/nixpkgs/jsubfinder | Tool to search for in Javascript hidden subdomains and secrets |
| packages/nixpkgs/libsecret | Library for storing and retrieving passwords and other secrets |
| packages/nixpkgs/eludris | Simple CLI to help you with setting up and managing your Eludris instance |
| packages/nixpkgs/wayland-logout | A utility designed to kill a single instance of a wayland compositor
|
| packages/nixpkgs/libunique | Library for writing single instance applications |
| packages/nixpkgs/blackbox | Safely store secrets in a VCS repo |
| packages/nixpkgs/libgnome-keyring | Framework for managing passwords and other secrets |
| packages/nixpkgs/vaultenv | Runs processes with secrets from HashiCorp Vault |
| packages/nixpkgs/immich-public-proxy | Share your Immich photos and albums in a safe way without exposing your Immich instance to the public |
| packages/nixpkgs/secrethound | A powerful CLI tool designed to find secrets in JavaScript files, web pages, and other text sources. |
| packages/nixpkgs/noseyparker | Find secrets and sensitive information in textual data |
| packages/nixpkgs/amazon-ssm-agent | Agent to enable remote management of your Amazon EC2 instance configuration |
| packages/nixpkgs/libunique3 | Library for writing single instance applications |
| packages/nixpkgs/vimer | A convenience wrapper for gvim/mvim --remote(-tab)-silent to open files
in an existing instance of GVim or MacVim.
|
| packages/nixpkgs/captive-browser | Dedicated Chrome instance to log into captive portals without messing with DNS settings |
| packages/nixpkgs/cloud-init | Provides configuration and customization of cloud instance |
| packages/nixpkgs/xmonadctl | Send commands to a running instance of xmonad |
| packages/nixpkgs/collada-dom | API that provides a C++ object representation of a COLLADA XML instance document |
| packages/nixpkgs/adguardian | Terminal-based, real-time traffic monitoring and statistics for your AdGuard Home instance |
| packages/nixpkgs/passdetective | Scans command history to detect mistakenly written passwords, API keys, and secrets |
| packages/nixpkgs/pretty-simple | pretty printer for data types with a 'Show' instance |
| packages/nixpkgs/kdsingleapplication | KDAB's helper class for single-instance policy applications |
| packages/nixpkgs/emiluaPlugins.botan | Securely clears secrets from memory in Emilua |
| packages/nixpkgs/nodePackages.dotenv-vault | Secrets manager for .env files – from the same people that pioneered dotenv |
| packages/nixpkgs/python313Packages.ixia | Connecting secrets' security with random's versatility |
| packages/nixpkgs/python314Packages.ixia | Connecting secrets' security with random's versatility |
| packages/nixpkgs/ocamlPackages.dune-rpc | Library to connect and control a running dune instance |
| packages/nixpkgs/python313Packages.sslib | Python3 library for sharing secrets |
| packages/nixpkgs/python314Packages.sslib | Python3 library for sharing secrets |
| packages/nixpkgs/nodePackages_latest.dotenv-vault | Secrets manager for .env files – from the same people that pioneered dotenv |
| packages/nixpkgs/python312Packages.ixia | Connecting secrets' security with random's versatility |
| packages/nixpkgs/python312Packages.sslib | Python3 library for sharing secrets |
| packages/nixpkgs/ocamlPackages_latest.dune-rpc | Library to connect and control a running dune instance |
| packages/nixpkgs/python313Packages.whispers | Tool to identify hardcoded secrets in static structured text |
| packages/nixpkgs/python314Packages.whispers | Tool to identify hardcoded secrets in static structured text |
| packages/nixpkgs/python313Packages.hole | Python API for interacting with a Pihole instance |
| packages/nixpkgs/python314Packages.hole | Python API for interacting with a Pihole instance |
| packages/nixpkgs/python313Packages.credstash | Utility for managing secrets in the cloud using AWS KMS and DynamoDB |
| packages/nixpkgs/python312Packages.whispers | Tool to identify hardcoded secrets in static structured text |
| packages/nixpkgs/python314Packages.credstash | Utility for managing secrets in the cloud using AWS KMS and DynamoDB |
| packages/nixpkgs/python313Packages.zwave-me-ws | Library to connect to a ZWave-Me instance |
| packages/nixpkgs/python314Packages.zwave-me-ws | Library to connect to a ZWave-Me instance |
| packages/nixpkgs/python312Packages.hole | Python API for interacting with a Pihole instance |
| packages/nixpkgs/python312Packages.credstash | Utility for managing secrets in the cloud using AWS KMS and DynamoDB |
| packages/nixpkgs/haskellPackages.vaultenv | Runs processes with secrets from HashiCorp Vault |
| packages/nixpkgs/haskellPackages.mi | Multiple Instance for Haskell |
| packages/nixpkgs/python313Packages.django-pwa | Django app to include a manifest.json and Service Worker instance to enable progressive web app behavior |
| packages/nixpkgs/python314Packages.django-pwa | Django app to include a manifest.json and Service Worker instance to enable progressive web app behavior |
| packages/nixpkgs/python313Packages.bundlewrap-pass | Use secrets from pass in your BundleWrap repo |
| packages/nixpkgs/python314Packages.bundlewrap-pass | Use secrets from pass in your BundleWrap repo |
| packages/nixpkgs/python313Packages.pylacus | Module to enqueue and query a remote Lacus instance |
| packages/nixpkgs/python314Packages.pylacus | Module to enqueue and query a remote Lacus instance |
| packages/nixpkgs/python312Packages.zwave-me-ws | Library to connect to a ZWave-Me instance |
| packages/nixpkgs/haskellPackages.ANum | Num instance for Applicatives provided via the ANum newtype |
| packages/nixpkgs/haskellPackages.both | Like Maybe, but with a different Monoid instance |
| packages/nixpkgs/python312Packages.bundlewrap-pass | Use secrets from pass in your BundleWrap repo |
| packages/nixpkgs/perlPackages.Gtk2Unique | (DEPRECATED) Use single instance applications |
| packages/nixpkgs/haskellPackages.valid | Type isomorphic to `Either` with `Applicative` instance which combines errors |
| packages/nixpkgs/python312Packages.django-pwa | Django app to include a manifest.json and Service Worker instance to enable progressive web app behavior |
| packages/nixpkgs/python312Packages.pylacus | Module to enqueue and query a remote Lacus instance |
| packages/nixpkgs/perl5Packages.Gtk2Unique | (DEPRECATED) Use single instance applications |
| packages/nixpkgs/haskellPackages.ekg-bosun | Send ekg metrics to a Bosun instance |
| packages/nixpkgs/python313Packages.bundlewrap-keepass | Use secrets from keepass in your BundleWrap repo |
| packages/nixpkgs/python314Packages.bundlewrap-keepass | Use secrets from keepass in your BundleWrap repo |
| packages/nixpkgs/haskellPackages.snow-white | encode any binary instance to white space |
| packages/nixpkgs/haskellPackages.monoid-map | A monoidal map with the right group instance |
| packages/nixpkgs/python313Packages.django-cleanup | Automatically deletes old file for FileField and ImageField |
| packages/nixpkgs/python314Packages.django-cleanup | Automatically deletes old file for FileField and ImageField |
| packages/nixpkgs/haskellPackages.derive-gadt | Instance deriving for (a subset of) GADTs |
| packages/nixpkgs/python312Packages.bundlewrap-keepass | Use secrets from keepass in your BundleWrap repo |
| packages/nixpkgs/obs-studio-plugins.obs-aitum-multistream | Plugin to stream everywhere from a single instance of OBS |
| packages/nixpkgs/haskellPackages.web-routes-hsp | Adds XMLGenerator instance for RouteT monad |
| packages/nixpkgs/haskellPackages.xmonad-eval | Module for evaluation Haskell expressions in the running xmonad instance |
| packages/nixpkgs/haskellPackages.th-context | Test instance context |
| packages/nixpkgs/python313Packages.py-deprecate | Module for marking deprecated functions or classes and re-routing to the new successors' instance |
| packages/nixpkgs/python314Packages.py-deprecate | Module for marking deprecated functions or classes and re-routing to the new successors' instance |
| packages/nixpkgs/perl540Packages.Gtk2Unique | (DEPRECATED) Use single instance applications |
| packages/nixpkgs/perl538Packages.Gtk2Unique | (DEPRECATED) Use single instance applications |
| packages/nixpkgs/python313Packages.weaviate-client | Python native client for easy interaction with a Weaviate instance |
| packages/nixpkgs/python314Packages.weaviate-client | Python native client for easy interaction with a Weaviate instance |
| packages/nixpkgs/python313Packages.bundlewrap-teamvault | Pull secrets from TeamVault into your BundleWrap repo |
| packages/nixpkgs/python314Packages.bundlewrap-teamvault | Pull secrets from TeamVault into your BundleWrap repo |
| packages/nixpkgs/haskellPackages.hunit-parsec | An HUnit Testable instance for Parsec parser unit tests |
| packages/nixpkgs/python313Packages.annotatedyaml | Annotated YAML that supports secrets for Python |
| packages/nixpkgs/python314Packages.annotatedyaml | Annotated YAML that supports secrets for Python |
| packages/nixpkgs/haskellPackages.writer-cps-morph | MFunctor instance for CPS style WriterT and RWST |
| packages/nixpkgs/haskellPackages.either-result | The simplest ‘MonadFail’ instance |
| packages/nixpkgs/haskellPackages.hls-class-plugin | Class/instance management plugin for Haskell Language Server |
| packages/nixpkgs/python312Packages.django-cleanup | Automatically deletes old file for FileField and ImageField |
| packages/nixpkgs/haskellPackages.syntax-pretty | Syntax instance for pretty, the pretty printing library |
| packages/nixpkgs/haskellPackages.pretty-simple | pretty printer for data types with a 'Show' instance |
| packages/nixpkgs/python312Packages.py-deprecate | Module for marking deprecated functions or classes and re-routing to the new successors' instance |
| packages/nixpkgs/python312Packages.bundlewrap-teamvault | Pull secrets from TeamVault into your BundleWrap repo |
| packages/nixpkgs/python312Packages.annotatedyaml | Annotated YAML that supports secrets for Python |
| packages/nixpkgs/python312Packages.weaviate-client | Python native client for easy interaction with a Weaviate instance |
| packages/nixpkgs/haskellPackages.ihaskell-plot | IHaskell display instance for Plot (from plot package) |
| packages/nixpkgs/haskellPackages.collect-errors | Error monad with a Float instance |
| packages/nixpkgs/haskellPackages.netwire-input-glfw | GLFW instance of netwire-input |
| packages/nixpkgs/perlPackages.ClassDataAccessor | Inheritable, overridable class and instance data accessor creation |
| packages/nixpkgs/haskellPackages.storable-tuple | Storable instance for pairs and triples |
| packages/nixpkgs/haskellPackages.ihaskell-hvega | IHaskell display instance for hvega types |
| packages/nixpkgs/perl5Packages.ClassDataAccessor | Inheritable, overridable class and instance data accessor creation |
| packages/nixpkgs/haskellPackages.deriving-aeson | Type driven generic aeson instance customisation |
| packages/nixpkgs/haskellPackages.generic-lens-labels | GHC |
| packages/nixpkgs/python313Packages.playwright-stealth | Make your playwright instance stealthy |
| packages/nixpkgs/python314Packages.playwright-stealth | Make your playwright instance stealthy |
| packages/nixpkgs/haskellPackages.bindynamic | A variation of Data |
| packages/nixpkgs/haskellPackages.storable-complex | Storable instance for Complex |
| packages/nixpkgs/perl540Packages.ClassDataAccessor | Inheritable, overridable class and instance data accessor creation |
| packages/nixpkgs/perl538Packages.ClassDataAccessor | Inheritable, overridable class and instance data accessor creation |
| packages/nixpkgs/haskellPackages.newtype-deriving | Instance derivers for newtype wrappers |
| packages/nixpkgs/haskellPackages.deriving-show-simple | Derive a Show instance without field selector names |
| packages/nixpkgs/haskellPackages.ihaskell-gnuplot | IHaskell display instance for Gnuplot (from gnuplot package) |
| packages/nixpkgs/haskellPackages.parseerror-eq | Adds and Eq instance for Parsec's ParseError if needed |
| packages/nixpkgs/haskellPackages.either-semigroup | Either with a stricter Semigroup instance |
| packages/nixpkgs/haskellPackages.bits-bytestring | Bits instance for bytestrings |
| packages/nixpkgs/haskellPackages.fixed-storable-array | Fixed-size wrapper for StorableArray, providing a Storable instance |
| packages/nixpkgs/haskellPackages.quickcheck-text | Alternative arbitrary instance for Text |
| packages/nixpkgs/haskellPackages.envy-extensible | Provides FromEnv in envy instance for Record of extensible |
| packages/nixpkgs/haskellPackages.WebBits-multiplate | A Multiplate instance for JavaScript |
| packages/nixpkgs/gnomeExtensions.uptime-kuma-indicator | Displays the status of an Uptime Kuma instance in the panel. |
| packages/nixpkgs/python312Packages.playwright-stealth | Make your playwright instance stealthy |
| packages/nixpkgs/haskellPackages.ihaskell-graphviz | IHaskell display instance for GraphViz (external binary) |
| packages/nixpkgs/haskellPackages.bits-bytestring-lazy | Bits instance for lazy bytestrings |
| packages/nixpkgs/haskellPackages.messagepack | Serialize instance for Message Pack Object |
| packages/nixpkgs/python313Packages.microsoft-security-utilities-secret-masker | Tool for detecting and masking secrets |
| packages/nixpkgs/python314Packages.microsoft-security-utilities-secret-masker | Tool for detecting and masking secrets |
| packages/nixpkgs/perlPackages.MooseXAttributeChained | Attribute that returns the instance to allow for chaining |
| packages/nixpkgs/haskellPackages.alternative-io | IO as Alternative instance (deprecated) |
| packages/nixpkgs/haskellPackages.wrapped-generic-default | A Generic instance of Default |
| packages/nixpkgs/perl5Packages.MooseXAttributeChained | Attribute that returns the instance to allow for chaining |
| packages/nixpkgs/haskellPackages.relational-query-HDBC | HDBC instance of relational-query and typed query interface for HDBC |
| packages/nixpkgs/haskellPackages.hs-swisstable-hashtables-class | Data |
| packages/nixpkgs/python312Packages.testing-postgresql | Use temporary postgresql instance in testing |
| packages/nixpkgs/python313Packages.testing-postgresql | Use temporary postgresql instance in testing |
| packages/nixpkgs/python312Packages.microsoft-security-utilities-secret-masker | Tool for detecting and masking secrets |
| packages/nixpkgs/perl540Packages.MooseXAttributeChained | Attribute that returns the instance to allow for chaining |
| packages/nixpkgs/perl538Packages.MooseXAttributeChained | Attribute that returns the instance to allow for chaining |
| packages/nixpkgs/haskellPackages.postgresql-typed-lifted | postgresql-typed operations lifted to any instance of MonadBase or MonadBaseControl |
| packages/nixpkgs/haskellPackages.constraints-emerge | Defer instance lookups until runtime |
| packages/nixpkgs/python313Packages.django-dynamic-preferences | Dynamic global and instance settings for your django project |
| packages/nixpkgs/python314Packages.django-dynamic-preferences | Dynamic global and instance settings for your django project |
| packages/nixpkgs/python313Packages.jupyter-highlight-selected-word | Jupyter notebook extension that enables highlighting every instance of the current word in the notebook |
| packages/nixpkgs/python314Packages.jupyter-highlight-selected-word | Jupyter notebook extension that enables highlighting every instance of the current word in the notebook |
| packages/nixpkgs/haskellPackages.sized-wrapper-quickcheck | QuickCheck instance for 'Sized' |
| packages/nixpkgs/haskellPackages.netwire-input-javascript | JavaScript instance of netwire-input |
| packages/nixpkgs/python312Packages.django-dynamic-preferences | Dynamic global and instance settings for your django project |
| packages/nixpkgs/python312Packages.jupyter-highlight-selected-word | Jupyter notebook extension that enables highlighting every instance of the current word in the notebook |
| packages/nixpkgs/haskellPackages.mono-traversable-wrapper | Wrapper providing Foldable instance for MonoFoldables |
| packages/nixpkgs/haskellPackages.standalone-derive-topdown | This package will derive class instance along the data type declaration tree. (Deprecated) |
| packages/nixpkgs/haskellPackages.gogol-replicapool-updater | Google Compute Engine Instance Group Updater SDK |
| packages/nixpkgs/haskellPackages.gogol-resourceviews | Google Compute Engine Instance Groups SDK |
| packages/nixpkgs/haskellPackages.nonempty-wrapper-quickcheck | QuickCheck instance for 'NonEmpty' |
| packages/nixpkgs/perlPackages.CatalystComponentInstancePerContext | Moose role to create only one instance of component per context |
| packages/nixpkgs/haskellPackages.intrinsic-superclasses | A quasiquoter for better instance deriving and default methods |
| packages/nixpkgs/perl5Packages.CatalystComponentInstancePerContext | Moose role to create only one instance of component per context |
| packages/nixpkgs/perl538Packages.CatalystComponentInstancePerContext | Moose role to create only one instance of component per context |
| packages/nixpkgs/perl540Packages.CatalystComponentInstancePerContext | Moose role to create only one instance of component per context |
| packages/nixpkgs/gnome-secrets | Password manager for GNOME which makes use of the KeePass v.4 format |
| packages/nixpkgs/git-secrets | Prevents you from committing secrets and credentials into git repositories |
| packages/nixpkgs/haskellPackages.aws-secrets | Fetch data from AWS Secrets Manager |
| packages/nixpkgs/emacsPackages.hide-secrets | |
| packages/nixpkgs/tell-me-your-secrets | Tools to find secrets from various signatures |
| packages/nixpkgs/detect-secrets | Enterprise friendly way of detecting and preventing secrets in code |
| packages/nixpkgs/kubernetes-helmPlugins.helm-secrets | Helm plugin that helps manage secrets |
| packages/nixpkgs/python313Packages.detect-secrets | Enterprise friendly way of detecting and preventing secrets in code |
| packages/nixpkgs/python314Packages.detect-secrets | Enterprise friendly way of detecting and preventing secrets in code |
| packages/nixpkgs/python313Packages.bc-detect-secrets | Tool to detect secrets in the code |
| packages/nixpkgs/python314Packages.bc-detect-secrets | Tool to detect secrets in the code |
| packages/nixpkgs/python312Packages.detect-secrets | Enterprise friendly way of detecting and preventing secrets in code |
| packages/nixpkgs/python312Packages.bc-detect-secrets | Tool to detect secrets in the code |
| packages/nixpkgs/secrets-extractor | Tool to check packets for secrets |
| packages/nixpkgs/python313Packages.azure-keyvault-secrets | Microsoft Azure Key Vault Secrets Client Library for Python |
| packages/nixpkgs/python314Packages.azure-keyvault-secrets | Microsoft Azure Key Vault Secrets Client Library for Python |
| packages/nixpkgs/haskellPackages.ban-instance | For when a type should never be an instance of a class |
| packages/nixpkgs/haskellPackages.if-instance | Branch on whether a constraint is satisfied |
| packages/nixpkgs/python312Packages.azure-keyvault-secrets | Microsoft Azure Key Vault Secrets Client Library for Python |
| packages/nixpkgs/haskellPackages.instance-map | Template haskell utilities for helping with deserialization etc. of existential types |
| packages/nixpkgs/azure-sdk-for-cpp.security-keyvault-secrets | Azure Security Keyvault Secrets Package client library for C++ |
| packages/nixpkgs/sbclPackages.instance-tracking | |
| packages/nixpkgs/haskellPackages.multi-instance | Typeclasses augmented with a phantom type parameter |
| packages/nixpkgs/haskellPackages.path-binary-instance | Binary instance for Path |
| packages/nixpkgs/haskellPackages.flag-dhall-instance | FromDhall and ToDhall instances for flag |
| packages/nixpkgs/haskellPackages.path-dhall-instance | ToDhall and FromDhall instances for Path |
| packages/nixpkgs/haskellPackages.instance-control | Controls how the compiler searches for instances using type families |
| packages/nixpkgs/haskellPackages.ixset-typed-binary-instance | Binary instance for ixset-typed |
| packages/nixpkgs/gnomeExtensions.launch-new-instance | Always launch a new instance when clicking in the dash or the application view. |
| packages/nixpkgs/ec2-instance-selector | Recommends instance types based on resource criteria like vcpus and memory |
| packages/nixpkgs/haskellPackages.errorcall-eq-instance | An orphan Eq instance for ErrorCall |
| packages/nixpkgs/python313Packages.mypy-boto3-ec2-instance-connect | Type annotations for boto3 ec2-instance-connect |
| packages/nixpkgs/python314Packages.mypy-boto3-ec2-instance-connect | Type annotations for boto3 ec2-instance-connect |
| packages/nixpkgs/haskellPackages.ixset-typed-hashable-instance | Hashable instance for ixset-typed |
| packages/nixpkgs/haskellPackages.amazonka-ec2-instance-connect | Amazon EC2 Instance Connect SDK |
| packages/nixpkgs/python312Packages.mypy-boto3-ec2-instance-connect | Type annotations for boto3 ec2-instance-connect |
| packages/nixpkgs/python313Packages.badsecrets | Module for detecting known secrets across many web frameworks |
| packages/nixpkgs/badsecrets | Module for detecting known secrets across many web frameworks |
| packages/nixpkgs/python314Packages.badsecrets | Module for detecting known secrets across many web frameworks |
| packages/nixpkgs/secretspec | Declarative secrets, every environment, any provider |
| packages/nixpkgs/haskellPackages.version-natural-dhall-instance | FromDhall and ToDhall instances for version-natural |
| packages/nixpkgs/python312Packages.badsecrets | Module for detecting known secrets across many web frameworks |
| packages/nixpkgs/haskellPackages.th-instance-reification | Fixed versions of instances reification functions |
| packages/nixpkgs/sbclPackages.structure-ext_dot_make-instance | |
| packages/nixpkgs/deepsecrets | Secrets scanner that understands code |
| packages/nixpkgs/ripsecrets | Command-line tool to prevent committing secret keys into your source code |
| packages/nixpkgs/python313Packages.types-aiobotocore-ec2-instance-connect | Type annotations for aiobotocore ec2-instance-connect |
| packages/nixpkgs/python314Packages.types-aiobotocore-ec2-instance-connect | Type annotations for aiobotocore ec2-instance-connect |
| packages/nixpkgs/python312Packages.types-aiobotocore-ec2-instance-connect | Type annotations for aiobotocore ec2-instance-connect |
| packages/nixpkgs/secretscanner | Tool to find secrets and passwords in container images and file systems |
| packages/nixpkgs/haskellPackages.th-instances | A place to collect orphan instances for Template Haskell |
| packages/nixpkgs/haskellPackages.ghc-instances | Easily import all instances contained in GHC distributed libraries |
| packages/nixpkgs/haskellPackages.subG-instances | Additional instances for the InsertLeft class from subG package |
| packages/nixpkgs/haskellPackages.prim-instances | Prim typeclass instances |
| packages/nixpkgs/haskellPackages.th-lift-instances | Lift instances for template-haskell for common data types |
| packages/nixpkgs/haskellPackages.syb-with-class-instances-text | Scrap Your Boilerplate With Class Text instance |
| packages/nixpkgs/haskellPackages.mtl-evil-instances | Instances for the mtl classes for all monad transformers |
| packages/nixpkgs/haskellPackages.dlist-instances | Difference lists instances |
| packages/nixpkgs/haskellPackages.exist-instances | Instances for "exist" package (requires more language extensions and dependencies) |
| packages/nixpkgs/haskellPackages.wide-word-instances | Instances for wide-word |
| packages/nixpkgs/haskellPackages.text-show-instances | Additional instances for text-show |
| packages/nixpkgs/python313Packages.secretstorage | Python bindings to FreeDesktop.org Secret Service API |
| packages/nixpkgs/python314Packages.secretstorage | Python bindings to FreeDesktop.org Secret Service API |
| packages/nixpkgs/python313Packages.pysecretsocks | Socks server for tunneling a connection over another channel |
| packages/nixpkgs/python314Packages.pysecretsocks | Socks server for tunneling a connection over another channel |
| packages/nixpkgs/haskellPackages.one-liner-instances | Generics-based implementations for common typeclasses |
| packages/nixpkgs/haskellPackages.binary-instances | Orphan instances for binary |
| packages/nixpkgs/haskellPackages.binrep-instances | Orphan instances for binrep |
| packages/nixpkgs/haskellPackages.vector-instances | Orphan Instances for 'Data |
| packages/nixpkgs/haskellPackages.quiver-instances | Extra instances for Quiver |
| packages/nixpkgs/haskellPackages.to-string-instances | Instances for the ToString class |
| packages/nixpkgs/python312Packages.secretstorage | Python bindings to FreeDesktop.org Secret Service API |
| packages/nixpkgs/python312Packages.pysecretsocks | Socks server for tunneling a connection over another channel |
| packages/nixpkgs/haskellPackages.first-class-instances | First-class typeclass instances |
| packages/nixpkgs/python313Packages.aws-secretsmanager-caching | Client-side AWS secrets manager caching library |
| packages/nixpkgs/python314Packages.aws-secretsmanager-caching | Client-side AWS secrets manager caching library |
| packages/nixpkgs/haskellPackages.vector-read-instances | (deprecated) Read instances for 'Data |
| packages/nixpkgs/haskellPackages.runtime-instances | Look up class instances at runtime |
| packages/nixpkgs/haskellPackages.deepseq-instances | Candidate NFData Instances for Types in base |
| packages/nixpkgs/haskellPackages.amazonka-secretsmanager | Amazon Secrets Manager SDK |
| packages/nixpkgs/python312Packages.aws-secretsmanager-caching | Client-side AWS secrets manager caching library |
| packages/nixpkgs/haskellPackages.ghc-generic-instances | Derived instances of GHC |
| packages/nixpkgs/haskellPackages.vector-bytes-instances | Serial (from the bytes package) for Vector (from the vector package) |
| packages/nixpkgs/haskellPackages.tuple-append-instances | Extra instances for the typeclasses in the tuple-append package |
| packages/nixpkgs/haskellPackages.heavy-logger-instances | Orphan instances for data types in heavy-logger package |
| packages/nixpkgs/rPackages.ropensecretsapi | |
| packages/nixpkgs/haskellPackages.discover-instances | |
| packages/nixpkgs/haskellPackages.listlike-instances | Extra instances of the ListLike class |
| packages/nixpkgs/haskellPackages.password-instances | typeclass instances for password package |
| packages/nixpkgs/haskellPackages.vector-binary-instances | Instances of Data |
| packages/nixpkgs/haskellPackages.derive-lifted-instances | Derive class instances though various kinds of lifting |
| packages/nixpkgs/python313Packages.mypy-boto3-secretsmanager | Type annotations for boto3 secretsmanager |
| packages/nixpkgs/python314Packages.mypy-boto3-secretsmanager | Type annotations for boto3 secretsmanager |
| packages/nixpkgs/haskellPackages.data-default-instances-base | Default instances for types in base |
| packages/nixpkgs/haskellPackages.data-default-instances-text | Default instances for (lazy and strict) Text and Text Builder |
| packages/nixpkgs/haskellPackages.universe-instances-base | Universe instances for types from the base package |
| packages/nixpkgs/haskellPackages.data-default-instances-new-base | Default instances for types in newer versions of base package |
| packages/nixpkgs/haskellPackages.generic-pretty-instances | GenericPretty canonical instances |
| packages/nixpkgs/haskellPackages.data-default-instances-dlist | Default instances for types in dlist |
| packages/nixpkgs/python312Packages.mypy-boto3-secretsmanager | Type annotations for boto3 secretsmanager |
| packages/nixpkgs/haskellPackages.leancheck-instances | Common LeanCheck instances |
| packages/nixpkgs/haskellPackages.serialize-instances | Instances for Serialize of cereal |
| packages/nixpkgs/haskellPackages.universe-instances-trans | Universe instances for types from the transformers and mtl packages |
| packages/nixpkgs/haskellPackages.data-default-instances-vector | Default instances for types defined in vector package |
| packages/nixpkgs/haskellPackages.leancheck-enum-instances | listable instances for small enum types |
| packages/nixpkgs/haskellPackages.data-default-instances-old-locale | Default instances for types in old-locale |
| packages/nixpkgs/sbclPackages.structure-ext_dot_make-instance_dot_test | |
| packages/nixpkgs/haskellPackages.quickcheck-instances | Common quickcheck instances |
| packages/nixpkgs/haskellPackages.function-instances-algebra | Instances of the Algebra.* classes for functions |
| packages/nixpkgs/haskellPackages.universe-reverse-instances | Instances of standard classes that are made possible by enumerations |
| packages/nixpkgs/haskellPackages.quickcheck-enum-instances | arbitrary instances for small enum types |
| packages/nixpkgs/haskellPackages.universe-instances-extended | Universe instances for types from selected extra packages |
| packages/nixpkgs/haskellPackages.bidirectional-instances | Make instance constraints bidirectional |
| packages/nixpkgs/haskellPackages.data-default-instances-case-insensitive | Default instance for CI type from case-insensitive package |
| packages/nixpkgs/haskellPackages.tupleinstances | Functor, Applicative and Monad for n-ary tuples |
| packages/nixpkgs/haskellPackages.mono-traversable-instances | Extra typeclass instances for mono-traversable |
| packages/nixpkgs/haskellPackages.collections-base-instances | Useful standard collections types and related functions |
| packages/nixpkgs/python313Packages.types-aiobotocore-secretsmanager | Type annotations for aiobotocore secretsmanager |
| packages/nixpkgs/python314Packages.types-aiobotocore-secretsmanager | Type annotations for aiobotocore secretsmanager |
| packages/nixpkgs/haskellPackages.persistent-instances-iproute | Persistent instances for types in iproute |
| packages/nixpkgs/haskellPackages.stratosphere-secretsmanager | Stratosphere integration for AWS SecretsManager |
| packages/nixpkgs/haskellPackages.vector-instances-collections | Instances of the Data |
| packages/nixpkgs/haskellPackages.data-default-instances-containers | Default instances for types in containers |
| packages/nixpkgs/python312Packages.types-aiobotocore-secretsmanager | Type annotations for aiobotocore secretsmanager |
| packages/nixpkgs/haskellPackages.data-default-instances-bytestring | Default instances for (lazy and strict) ByteString, Builder and ShortByteString |
| packages/nixpkgs/haskellPackages.indexed-traversable-instances | More instances of FunctorWithIndex, FoldableWithIndex, TraversableWithIndex |
| packages/nixpkgs/haskellPackages.constrained-platform-instances | Instances of standard platform types for 'constrained' package |
| packages/nixpkgs/python313Packages.azure-mgmt-containerinstance | This is the Microsoft Azure Container Instance Client Library |
| packages/nixpkgs/python314Packages.azure-mgmt-containerinstance | This is the Microsoft Azure Container Instance Client Library |
| packages/nixpkgs/python312Packages.azure-mgmt-containerinstance | This is the Microsoft Azure Container Instance Client Library |
| packages/nixpkgs/haskellPackages.data-default-instances-unordered-containers | Default instances for unordered-containers |
| packages/nixpkgs/python313Packages.ec2instanceconnectcli | Command Line Interface for AWS EC2 Instance Connect |
| packages/nixpkgs/python314Packages.ec2instanceconnectcli | Command Line Interface for AWS EC2 Instance Connect |
| packages/nixpkgs/python312Packages.ec2instanceconnectcli | Command Line Interface for AWS EC2 Instance Connect |
| packages/nixpkgs/azure-cli-extensions.azurelargeinstance | Microsoft Azure Command-Line Tools Azurelargeinstance Extension |
| packages/nixpkgs/sbclPackages.cl-glfw-opengl-arb__draw__instanced | |
| packages/nixpkgs/sbclPackages.cl-glfw-opengl-ext__draw__instanced | |
| packages/nixpkgs/rubyPackages.track_open_instances | |
| packages/nixpkgs/sbclPackages.cl-glfw-opengl-arb__instanced__arrays | |
| packages/nixpkgs/qtappinstancemanager | Single application instance manager for Qt6 |
| packages/nixpkgs/haskellPackages.stratosphere-workspacesinstances | Stratosphere integration for AWS WorkspacesInstances |
| packages/nixpkgs/rubyPackages_3_5.track_open_instances | |
| packages/nixpkgs/rubyPackages_3_3.track_open_instances | |
| packages/nixpkgs/rubyPackages_3_4.track_open_instances | |
| packages/nixpkgs/rubyPackages_4_0.track_open_instances | |
| packages/nur/xddxdd.drone-vault | Drone plugin for integrating with the Vault secrets manager |
| packages/nur/toonn.sotp | Small utility to store AWS TOTP secrets into Sops encryptedfiles and generate OTP on the command line |
| packages/nur/xddxdd.uncategorized.drone-vault | Drone plugin for integrating with the Vault secrets manager |
| packages/nur/DanNixon.keyprs | A very barebones tool to backup secrets to paper. |
| packages/nur/binarycat.redox-demo | A transient redox OS instance within QEMU |
| packages/nur/xddxdd.drone-file-secret | Secret provider for Drone CI that reads secrets from a given folder |
| packages/nur/chrjabs.gbd | Management of Benchmark Instances and Instance Attributes |
| packages/nur/chrjabs.gbdc-tool | Instance Identification, Feature Extraction, and Problem Transformation |
| packages/nur/renesat.linkding-cli | A CLI to interface with an instance of linkding |
| packages/nur/xddxdd.uncategorized.drone-file-secret | Secret provider for Drone CI that reads secrets from a given folder |
| packages/nur/chrjabs.gbdc | Instance Identification, Feature Extraction, and Problem Transformation |
| packages/nur/dtomvan.pandora-launcher | Pandora is a modern Minecraft launcher that balances ease-of-use with powerful instance management features |
| packages/nur/rycee.firefox-addons.substitoot | A transparent toot fetcher for Mastodon |
| packages/nur/meain.firefox-addons.mastodon4-redirect | Redirects users from Mastodon4 supported instances to their home instance |
| packages/nur/colinsane.pkgs.sane-scripts.secrets-dump | |
| packages/nur/colinsane.pkgs.sane-scripts.secrets-unlock | |
| packages/nur/colinsane.pkgs.sane-scripts.secrets-update-keys | |