| options/nixos/services.typesense.apiKeyFile | Sets the admin api key for typesense
|
| options/nixos/services.rkvm.server.settings.key | TLS key path.
This should be generated with rkvm-certificate-gen.
|
| options/nixos/services.ergo.api.keyHash | Hex-encoded Blake2b256 hash of an API key as a 64-chars long Base16 string.
|
| options/nixos/services.nsd.keys.<name>.keyFile | Path to the file which contains the actual base64 encoded
key
|
| options/nixos/services.morty.key | HMAC url validation key (hexadecimal encoded)
|
| options/nixos/services.gns3-server.ssl.keyFile | Private key file for the certificate.
|
| options/home-manager/programs.git.signing.key | The default signing key fingerprint
|
| options/nixos/services.prosody.ssl.key | Path to the key file.
|
| options/nixos/services.nghttpx.tls.key | Path to the TLS key file.
|
| options/nixos/services.etcd.keyFile | Key file to use for clients
|
| options/nixos/services.bacula-sd.tls.key | The path of a PEM encoded TLS private key
|
| options/nixos/services.bacula-fd.tls.key | The path of a PEM encoded TLS private key
|
| options/nixos/console.keyMap | The keyboard mapping table for the virtual consoles.
|
| options/nixos/services.oauth2-proxy.tls.key | Path to private key file.
|
| options/nixos/services.bacula-dir.tls.key | The path of a PEM encoded TLS private key
|
| options/nixos/boot.initrd.luks.devices.<name>.keyFileSize | The size of the key file
|
| options/nixos/services.pgmanage.tls.key | TLS key
|
| options/home-manager/programs.kakoune.config.keyMappings.*.key | The key to be mapped
|
| options/nixos/services.llama-swap.tls.keyFile | Path to the TLS private key file
|
| options/nixos/services.rkvm.server.settings.switch-keys | A key list specifying a host switch combination.
A list of key names is available in https://github.com/htrefil/rkvm/blob/master/switch-keys.md.
|
| options/nixos/boot.initrd.luks.devices.<name>.keyFileOffset | The offset of the key file
|
| options/nixos/services.btrbk.sshAccess.*.key | SSH public key allowed to login as user btrbk to run remote backups.
|
| options/nixos/services.ghostunnel.servers.<name>.key | Path to certificate private key (PEM with private key)
|
| options/nixos/services.public-inbox.nntp.key | Path to TLS key to use for connections to public-inbox-nntpd(1).
|
| options/nixos/services.public-inbox.imap.key | Path to TLS key to use for connections to public-inbox-imapd(1).
|
| options/nixos/security.acme.certs.<name>.keyType | Key type to use for private keys
|
| options/nixos/services.thanos.rule.grpc-server-tls-key | TLS Key for the gRPC server, leave blank to disable TLS
|
| options/nixos/services.warpgate.settings.http.key | Path to HTTPS listener private key.
|
| options/home-manager/programs.anki.sync.keyFile | Path to a file containing the sync account sync key
|
| options/nixos/services.journald.gateway.key | Specify the path to a file or AF_UNIX stream socket to read the
secret server key corresponding to the certificate specified with
services.journald.gateway.cert from
|
| options/home-manager/programs.neomutt.binds.*.key | The key to bind
|
| options/nixos/services.athens.storage.s3.key | Access key id for the S3 storage backend.
|
| options/nixos/services.warpgate.settings.mysql.key | Path to MySQL listener private key.
|
| options/nixos/services.ttyd.keyFile | SSL key file path
|
| options/nixos/services.livekit.keyFile | LiveKit key file holding one or multiple application secrets
|
| options/home-manager/programs.mcfly.keyScheme | Key scheme to use.
|
| options/nixos/services.thanos.store.grpc-server-tls-key | TLS Key for the gRPC server, leave blank to disable TLS
|
| options/nixos/services.thanos.query.grpc-server-tls-key | TLS Key for the gRPC server, leave blank to disable TLS
|
| options/nixos/services.namecoind.rpc.key | Key file for securing RPC connections.
|
| options/home-manager/programs.neomutt.macros.*.key | The key to bind
|
| options/nixos/services.molly-brown.keyPath | Path to TLS key
|
| options/nixos/services.kubernetes.apiserver.etcd.keyFile | Etcd key file.
|
| options/home-manager/programs.ncmpcpp.bindings.*.key | Key to bind.
|
| options/nixos/services.nebula.networks.<name>.key | Path or reference to the host key.
|
| options/nixos/services.athens.storage.minio.key | Access key id for the minio storage backend.
|
| options/nixos/services.galene.keyFile | Path to the server's private key
|
| options/nixos/services.go-camo.keyFile | A file containing the HMAC key to use for signing URLs
|
| options/nixos/services.gitolite.adminPubkey | Initial administrative public key for Gitolite
|
| options/nixos/services.documize.key | The key.pem file used for https.
|
| options/nixos/security.acme.defaults.keyType | Key type to use for private keys
|
| options/nixos/services.sourcehut.settings.mail.pgp-privkey | An absolute file path (which should be outside the Nix-store)
to an OpenPGP private key
|
| options/home-manager/programs.gitui.keyConfig | Key config in Ron file format
|
| options/nixos/services.mycelium.keyFile | Optional path to a file containing the mycelium key material
|
| options/home-manager/accounts.email.accounts.<name>.gpg.key | The key to use as listed in gpg --list-keys.
|
| options/nixos/services.thanos.receive.grpc-server-tls-key | TLS Key for the gRPC server, leave blank to disable TLS
|
| options/nixos/services.thanos.sidecar.grpc-server-tls-key | TLS Key for the gRPC server, leave blank to disable TLS
|
| options/nixos/services.taskserver.pki.manual.server.key | Fully qualified path to the server key.
Setting this option will prevent automatic CA creation and handling.
|
| options/nixos/services.flannel.etcd.keyFile | Etcd key file
|
| options/home-manager/programs.anki.answerKeys.*.key | Keyboard shortcut for this answer button
|
| options/nixos/services.warpgate.settings.postgres.key | Path to PostgreSQL listener private key.
|
| options/nixos/programs.ssh.knownHosts.<name>.publicKey | The public key data for the host
|
| options/darwin/programs.ssh.knownHosts.<name>.publicKey | The public key data for the host
|
| options/nixos/programs.tmux.keyMode | VI or Emacs style shortcuts.
|
| options/home-manager/programs.tmux.keyMode | VI or Emacs style shortcuts.
|
| options/nixos/services.kanidm.server.settings.tls_key | TLS key in pem format.
|
| options/nixos/services.prosody.virtualHosts.<name>.ssl.key | Path to the key file.
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.hotkeys.<name>.*.key | The hotkey.
|
| options/nixos/services.bacula-sd.director.<name>.tls.key | The path of a PEM encoded TLS private key
|
| options/nixos/services.bacula-fd.director.<name>.tls.key | The path of a PEM encoded TLS private key
|
| options/nixos/boot.loader.systemd-boot.sortKey | The sort key used for the NixOS bootloader entries
|
| options/nixos/services.sourcehut.settings."sr.ht".service-key | An absolute file path (which should be outside the Nix-store)
to a key used for encrypting session cookies
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.keyLength | Length of the LUKS slot key derived with PBKDF2 in byte.
|
| options/darwin/system.keyboard.swapLeftCtrlAndFn | Whether to swap the left Control key and Fn (Globe) key.
|
| options/nixos/services.lasuite-meet.livekit.keyFile | LiveKit key file holding one or multiple application secrets
|
| options/home-manager/services.clipse.keyBindings | Custom key bindings
|
| options/nixos/services.kmonad.keyboards.<name>.defcfg.compose.key | The (optional) compose key to use.
|
| options/home-manager/services.syncthing.key | Path to the key.pem file, which will be copied into Syncthing's
config directory.
|
| options/nixos/services.tarsnap.keyfile | The keyfile which associates this machine with your tarsnap
account
|
| options/nixos/services.thanos.query-frontend.grpc-server-tls-key | TLS Key for the gRPC server, leave blank to disable TLS
|
| options/nixos/services.infinoted.keyFile | Private key to use for TLS
|
| options/home-manager/programs.qutebrowser.keyMappings | This setting can be used to map keys to other keys
|
| options/nixos/services.syncthing.key | Path to the key.pem file, which will be copied into Syncthing's
configDir.
|
| options/nixos/services.sourcehut.settings."sr.ht".network-key | An absolute file path (which should be outside the Nix-store)
to a secret key to encrypt internal messages with
|
| options/nixos/services.sourcehut.settings.mail.pgp-key-id | OpenPGP key identifier.
|
| options/nixos/boot.initrd.luks.devices.<name>.keyFile | The name of the file (can be a raw device or a partition) that
should be used as the decryption key for the encrypted device
|
| options/nixos/services.openssh.knownHosts.<name>.publicKey | The public key data for the host
|
| options/nixos/services.sourcehut.settings.webhooks.private-key | An absolute file path (which should be outside the Nix-store)
to a base64-encoded Ed25519 key for signing webhook payloads
|
| options/nixos/services.grafana.settings.server.cert_key | Path to the certificate key file (if protocol is set to https or h2).
|
| options/nixos/services.thanos.query.grpc-client-tls-key | TLS Key for the client's certificate
|
| options/nixos/services.nix-serve.secretKeyFile | The path to the file used for signing derivation data
|
| options/nixos/services.foundationdb.tls.key | Private key file for the certificate.
|
| options/nixos/services.coturn.pkey | Private key file in PEM format.
|
| options/nixos/services.gitlab.registry.keyFile | Path to GitLab container registry certificate-key.
|
| options/nixos/services.keyd.enable | Whether to enable keyd, a key remapping daemon.
|
| options/nixos/security.agnos.generateKeys.keySize | Key size in bits to use when generating new keys.
|
| options/home-manager/services.ssh-tpm-agent.keyDir | Path of the directory to look for TPM sealed keys in, defaults to $HOME/.ssh if unset
|
| options/nixos/services.misskey.settings.meilisearch.apiKey | The Meilisearch API key.
|
| options/nixos/services.zeyple.keys | List of public key files that will be imported by gpg.
|
| options/home-manager/services.xcape.mapExpression | The value has the grammar Key[|OtherKey]
|
| options/home-manager/launchd.agents.<name>.config.Program | This key maps to the first argument of execvp(3)
|
| options/nixos/services.movim.h2o.tls.identity.*.key-file | Path to key file
|
| options/nixos/services.tarsnap.archives.<name>.keyfile | Set a specific keyfile for this archive
|
| options/nixos/services.dkimproxy-out.keySize | Size of the RSA key to use to sign outgoing emails
|
| options/nixos/services.misskey.meilisearch.keyFile | The path to a file containing the Meilisearch API key
|
| options/home-manager/programs.qutebrowser.keyBindings | Key bindings mapping keys to commands in different modes
|
| options/nixos/services.cfdyndns.apikeyFile | The path to a file containing the API Key
used to authenticate with CloudFlare.
|
| options/nixos/services.nsd.zones.<name>.notify | This primary server will notify all given secondary servers about
zone changes
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.ksk.keySize | Key size in bits
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.zsk.keySize | Key size in bits
|
| options/nixos/services.crowdsec-firewall-bouncer.settings.api_key | API key to authenticate with a local crowdsec API
|
| options/nixos/services.kubernetes.kubelet.taints.<name>.key | Key of taint.
|
| options/nixos/services.nextcloud-spreed-signaling.settings.https.key | Path to the private key used for the HTTPS listener
|
| options/nixos/services.h2o.hosts.<name>.tls.identity.*.key-file | Path to key file
|
| options/nixos/services.komodo-periphery.ssl.keyFile | Path to SSL key file.
|
| options/darwin/system.keyboard.swapLeftCommandAndLeftAlt | Whether to swap the left Command key and left Alt key.
|
| options/nixos/services.stash.settings.stash_boxes.*.apikey | Stash Box API key
|
| options/home-manager/programs.keychain.keys | Keys to add to keychain.
|
| options/nixos/programs.ssh.pubkeyAcceptedKeyTypes | Specifies the key lib.types that will be used for public key authentication.
|
| options/nixos/services.invoiceplane.sites.<name>.cron.key | Cron key taken from the administration page.
|
| options/home-manager/programs.obsidian.defaultSettings.hotkeys.<name>.*.key | The hotkey.
|
| options/nixos/services.sourcehut.settings.objects.s3-access-key | Access key to the S3-compatible object storage service
|
| options/nixos/services.schleuder.settings.keyserver | Key server from which to fetch and update keys
|
| options/nixos/nix.settings.trusted-public-keys | List of public keys used to sign binary caches
|
| options/darwin/nix.settings.trusted-public-keys | List of public keys used to sign binary caches
|
| options/nixos/services.prometheus.exporters.pve.server.keyFile | Path to a SSL private key file for the server
|
| options/nixos/services.keycloak.settings | Configuration options corresponding to parameters set in
conf/keycloak.conf
|
| options/home-manager/programs.kakoune.config.keyMappings | User-defined key mappings
|
| options/nixos/services.bcg.mqtt.keyfile | Key file for MQTT server access.
|
| options/nixos/nix.sshServe.keys | A list of SSH public keys allowed to access the binary cache via SSH.
|
| options/home-manager/services.macos-remap-keys.keypad | Mapping of keypad keys to remap
|
| options/nixos/services.sourcehut.settings.objects.s3-secret-key | An absolute file path (which should be outside the Nix-store)
to the secret key of the S3-compatible object storage service.
|
| options/nixos/services.reposilite.settings.keyPath | Path to the .jsk KeyStore or paths to the PKCS#8 certificate and private key, separated by a space (see example)
|
| options/darwin/launchd.agents.<name>.serviceConfig.Program | This key maps to the first argument of execvp(3)
|
| options/nixos/services.dolibarr.h2o.tls.identity.*.key-file | Path to key file
|
| options/nixos/services.ncdns.dnssec.keys.public | Path to the file containing the KSK public key
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.key | Path to certificate private key (PEM with private key)
|
| options/nixos/security.tpm2.fapi.ekCertLess | A switch to disable Endorsement Key (EK) certificate verification
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Program | This key maps to the first argument of execvp(3)
|
| options/nixos/services.ncdns.dnssec.keys.zonePublic | Path to the file containing the ZSK public key
|
| options/nixos/services.nextcloud.config.objectstore.s3.key | The access key for the S3 bucket.
|
| options/nixos/programs.ssh.knownHosts.<name>.publicKeyFile | The path to the public key file for the host
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Program | This key maps to the first argument of execvp(3)
|
| options/home-manager/services.macos-remap-keys.enable | Whether to enable macOS key remapping service.
|
| options/nixos/services.sourcehut.settings."meta.sr.ht::billing".stripe-public-key | Public key for Stripe
|
| options/nixos/services.kanidm.serverSettings.tls_key | TLS key in pem format.
|
| options/nixos/services.meilisearch.masterKeyFile | Path to file which contains the master key
|
| options/nixos/swapDevices.*.randomEncryption.keySize | Set the encryption key size for the plain device
|
| options/nixos/services.spiped.config.<name>.keyfile | Name of a file containing the spiped key
|
| options/nixos/services.opendkim.keyPath | The path that opendkim should put its generated private keys into
|
| options/nixos/services.oauth2-proxy.keyFile | oauth2-proxy allows passing sensitive configuration via environment variables
|
| options/nixos/services.lk-jwt-service.keyFile | Path to a file containing the credential mapping (<keyname>: <secret>) to access LiveKit
|
| options/darwin/system.keyboard.nonUS.remapTilde | Whether to remap the Tilde key on non-us keyboards.
|
| options/nixos/services.lasuite-docs.secretKeyPath | Path to the Django secret key
|
| options/nixos/services.lasuite-meet.secretKeyPath | Path to the Django secret key
|
| options/home-manager/launchd.agents.<name>.config.InitGroups | This optional key specifies whether initgroups(3) should be called before running the job
|
| options/nixos/services.knot.keyFiles | A list of files containing additional configuration
to be included using the include directive
|
| options/nixos/services.ghostunnel.servers.<name>.keystore | Path to keystore (combined PEM with cert/key, or PKCS12 keystore)
|
| options/nixos/services.sourcehut.settings."meta.sr.ht::billing".stripe-secret-key | An absolute file path (which should be outside the Nix-store)
to a secret key for Stripe
|
| options/home-manager/launchd.agents.<name>.config.ProgramArguments | This key maps to the second argument of execvp(3)
|
| options/nixos/services.tmate-ssh-server.keysDir | Directory containing ssh keys, defaulting to auto-generation
|
| options/nixos/services.nextcloud-spreed-signaling.settings.turn.apikeyFile | The path to the file containing the value for turn.apikey
|
| options/home-manager/services.macos-remap-keys.keyboard | Mapping of keyboard keys to remap
|
| options/nixos/hardware.openrazer.keyStatistics | Collects number of keypresses per hour per key used to
generate a heatmap.
|
| options/nixos/services.prometheus.exporters.unbound.unbound.key | Path to the Unbound control socket key.
|
| options/nixos/services.dawarich.secretKeyBaseFile | Path to file containing the secret key base
|
| options/nixos/services.keyd.keyboards.<name>.settings | Configuration, except ids section, that is written to /etc/keyd/.conf
|
| options/nixos/services.maddy.tls.certificates.*.keyPath | Path to the private key used for TLS.
|
| options/nixos/services.grafana.settings.smtp.key_file | File path to a key file.
|
| options/nixos/services.keyd.keyboards.<name>.ids | Device identifiers, as shown by keyd(1).
|
| options/nixos/services.openssh.knownHosts.<name>.publicKeyFile | The path to the public key file for the host
|
| options/nixos/services.nsd.keys | Define your TSIG keys here.
|
| options/nixos/services.keyd.keyboards | Configuration for one or more device IDs
|
| options/nixos/services.oink.settings.apiKey | API key to use when modifying DNS records.
|
| options/darwin/system.keyboard.remapCapsLockToEscape | Whether to remap the Caps Lock key to Escape.
|
| options/nixos/services.warpgate.settings.http.sni_certificates.*.key | Path to private key.
|
| options/nixos/services.nsd.keys.<name>.algorithm | Authentication algorithm for this key.
|
| options/nixos/services.sourcehut.settings.mail.pgp-pubkey | OpenPGP public key.
|
| options/home-manager/programs.zsh.prezto.editor.keymap | Set the key mapping style to emacs or vi.
|
| options/home-manager/services.xcape.timeout | If you hold a key longer than this timeout, xcape will not
generate a key event
|
| options/nixos/services.docuseal.secretKeyBaseFile | Path to file containing the secret key base
|
| options/nixos/virtualisation.podman.networkSocket.tls.key | Path to the private key corresponding to the server certificate
|
| options/darwin/services.aerospace.settings.key-mapping.preset | Keymapping preset.
|
| options/nixos/services.nsd.zones.<name>.allowNotify | Listed primary servers are allowed to notify this secondary server
|
| options/nixos/services.pgbackrest.repos.<name>.sftp-private-key-file | SFTP private key file
|
| options/home-manager/home.keyboard | Keyboard configuration
|
| options/home-manager/programs.lf.previewer.keybinding | Key to bind to the script at previewer.source and
pipe through less
|
| options/nixos/boot.initrd.luks.devices.<name>.keyFileTimeout | The amount of time in seconds for a keyFile to appear before
timing out and trying passwords.
|
| options/nixos/security.pam.u2f.settings | Options to pass to the PAM module
|
| options/nixos/services.dendrite.settings.global.private_key | The path to the signing private key file, used to sign
requests and events.
nix-shell -p dendrite --command "generate-keys --private-key matrix_key.pem"
|
| options/nixos/services.ncdns.dnssec.keys.private | Path to the file containing the KSK private key.
|
| options/darwin/launchd.agents.<name>.serviceConfig.ProgramArguments | This key maps to the second argument of execvp(3)
|
| options/darwin/programs.ssh.knownHosts.<name>.publicKeyFile | The path to the public key file for the host
|
| options/darwin/system.keyboard.remapCapsLockToControl | Whether to remap the Caps Lock key to Control.
|
| options/nixos/services.kubernetes.kubeconfig.keyFile | Default kubeconfig client key file used to connect to kube-apiserver.
|
| options/darwin/launchd.agents.<name>.serviceConfig.InitGroups | This optional key specifies whether initgroups(3) should be called before running the job
|
| options/nixos/security.duosec.secretKeyFile | A file containing your secret key
|
| options/nixos/services.toxBootstrapd.keysFile | Node key file.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.ProgramArguments | This key maps to the second argument of execvp(3)
|
| options/nixos/users.users.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| options/darwin/users.users.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| options/home-manager/home.keyboard.model | Keyboard model.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.ProgramArguments | This key maps to the second argument of execvp(3)
|
| options/nixos/services.wgautomesh.settings.peers.*.pubkey | Wireguard public key of this peer.
|
| options/nixos/services.neo4j.ssl.policies.<name>.privateKey | The name of private PKCS #8 key file for this policy to be found
in the baseDirectory, or the absolute path to
the key file
|
| options/nixos/services.mastodon.secretKeyBaseFile | Path to file containing the secret key base
|
| options/nixos/services.minio.accessKey | Access key of 5 to 20 characters in length that clients use to access the server
|
| options/home-manager/services.gromit-mpx.undoKey | A keysym or raw keycode that causes gromit-mpx to undo the
last stroke
|
| options/home-manager/launchd.agents.<name>.config.UserName | This optional key specifies the user to run the job as
|
| options/nixos/services.ncdns.dnssec.keys.zonePrivate | Path to the file containing the ZSK private key.
|
| options/nixos/services.lokinet.settings.network.keyfile | The private key to persist address with
|
| options/nixos/services.sabnzbd.settings.misc.https_key | Path to the TLS key for the web UI
|
| options/darwin/launchd.daemons.<name>.serviceConfig.InitGroups | This optional key specifies whether initgroups(3) should be called before running the job
|
| options/nixos/services.dendrite.tlsKey | The path to the TLS key.
nix-shell -p dendrite --command "generate-keys --tls-cert server.crt --tls-key server.key"
|
| options/nixos/services.minio.secretKey | Specify the Secret key of 8 to 40 characters in length that clients use to access the server
|
| options/nixos/security.pam.rssh.settings | Options to pass to the pam_rssh module
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.InitGroups | This optional key specifies whether initgroups(3) should be called before running the job
|
| options/nixos/services.hockeypuck.enable | Whether to enable Hockeypuck OpenPGP Key Server.
|
| options/home-manager/programs.radio-active.aliases | Key/value pairs where the key is name of radio station and value is URL.
|
| options/nixos/services.reposilite.settings.keyPassword | Plaintext password used to unlock the Java KeyStore set in services.reposilite.settings.keyPath
|
| options/nixos/services.kubernetes.proxy.kubeconfig.keyFile | Kubernetes proxy client key file used to connect to kube-apiserver.
|
| options/nixos/services.zitadel.masterKeyFile | Path to a file containing a master encryption key for ZITADEL
|
| options/nixos/users.extraUsers.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| options/nixos/services.tor.relay.onionServices.<name>.secretKey | Secret key of the onion service
|
| options/nixos/services.tt-rss.feedCryptKey | Key used for encryption of passwords for password-protected feeds
in the database
|
| options/nixos/services.misskey.settings.db | Database settings.
|
| options/nixos/services.umurmur.settings.private_key | Path to your SSL key
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.ksk | Key policy for key signing keys
|
| options/nixos/programs.yazi.settings.keymap | Configuration included in keymap.toml
|
| options/nixos/services.misskey.settings | Configuration for Misskey, see
example.yml
for all supported options.
|
| options/home-manager/programs.kakoune.config.keyMappings.*.mode | The mode in which the mapping takes effect.
|
| options/nixos/services.dkimproxy-out.selector | The selector to use for DKIM key identification
|
| options/nixos/services.omnom.settings.activitypub.pubkey | ActivityPub public key
|
| options/nixos/services.sharkey.settings | Configuration options for Sharkey
|
| options/nixos/nix.buildMachines.*.sshKey | The path to the SSH private key with which to authenticate on
the build machine
|
| options/darwin/nix.buildMachines.*.sshKey | The path to the SSH private key with which to authenticate on
the build machine
|
| options/home-manager/nix.buildMachines.*.sshKey | The path to the SSH private key with which to authenticate on
the build machine
|
| options/nixos/services.misskey.settings.db.db | The database name.
|
| options/nixos/services.kubernetes.kubelet.kubeconfig.keyFile | Kubelet client key file used to connect to kube-apiserver.
|
| options/nixos/services.oink.apiKeyFile | Path to a file containing the API key to use when modifying DNS records.
|
| options/nixos/security.agnos.settings.accounts.*.private_key_path | Path of the PEM-encoded private key for this account
|
| options/home-manager/launchd.agents.<name>.config.MachServices | This optional key is used to specify Mach services to be registered with the Mach bootstrap sub-system
|
| options/nixos/services.sharkey.settings.id | The ID generation method for Sharkey to use
|
| options/nixos/services.tox-node.keysFile | Path to the file where DHT keys are stored.
|
| options/nixos/services.misskey.settings.port | The port your Misskey server should listen on.
|
| options/nixos/services.sharkey.settings.port | The port that Sharkey will listen on.
|
| options/nixos/services.misskey.settings.id | The ID generation method to use
|
| options/nixos/services.omnom.settings.activitypub.privkey | ActivityPub private key
|
| options/nixos/services.headscale.settings.derp.server.private_key_path | Path to derp private key file, generated automatically if it does not exist.
|
| options/nixos/services.sharkey.setupMeilisearch | Whether to automatically set up a local Meilisearch instance and configure Sharkey to use it
|
| options/nixos/services.outline.utilsSecretFile | File path that contains the utility secret key
|
| options/nixos/services.rosenpass.settings.public_key | Path to a file containing the public key of the local Rosenpass peer
|
| options/nixos/services.rosenpass.settings.secret_key | Path to a file containing the secret key of the local Rosenpass peer
|
| options/nixos/services.misskey.settings.db.port | The PostgreSQL port.
|
| options/nixos/services.misskey.settings.db.host | The PostgreSQL host.
|
| options/home-manager/programs.kakoune.config.keyMappings.*.effect | The sequence of keys to be mapped.
|
| options/home-manager/wayland.windowManager.sway.config.keybindings | An attribute set that assigns a key press to an action using a key symbol
|
| options/nixos/services.outline.secretKeyFile | File path that contains the application secret key
|
| options/nixos/services.meilisearch.masterKeyEnvironmentFile | Path to file which contains the master key
|
| options/nixos/services.sharkey.settings.url | The full URL that the Sharkey instance will be publically accessible on
|
| options/home-manager/xsession.windowManager.i3.config.keybindings | An attribute set that assigns a key press to an action using a key symbol
|
| options/nixos/services.misskey.settings.db.user | The user used for database authentication.
|
| options/nixos/services.misskey.settings.db.pass | The password used for database authentication.
|
| options/nixos/services.cfssl.metadata | Metadata file for root certificate presence
|
| options/home-manager/launchd.agents.<name>.config.GroupName | This optional key specifies the group to run the job as
|
| options/nixos/hardware.keyboard.qmk.keychronSupport | Whether to enable udev rules for keychron QMK based keyboards.
|
| options/nixos/services.rosenpass.settings.peers.*.public_key | Path to a file containing the public key of the remote Rosenpass peer.
|
| options/nixos/swapDevices.*.encrypted.keyFile | Path to a keyfile used to unlock the backing encrypted
device
|
| options/nixos/services.misskey.settings.redis | ioredis options
|
| options/home-manager/launchd.agents.<name>.config.ServiceIPC | This optional key specifies whether the job participates in advanced
communication with launchd
|
| options/nixos/services.journald.upload.settings.Upload.ServerKeyFile | SSL key in PEM format
|
| options/nixos/services.misskey.settings.db.extra | Extra connection options.
|
| options/nixos/services.resilio.apiKey | API key, which enables the developer API.
|
| options/nixos/services.go-camo.sslKey | Path to TLS private key.
|
| options/nixos/services.kubernetes.scheduler.kubeconfig.keyFile | Kubernetes scheduler client key file used to connect to kube-apiserver.
|
| options/nixos/services.keyd.package | The keyd package to use.
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.presharedKey | Base64 preshared key generated by wg genpsk
|
| options/darwin/launchd.agents.<name>.serviceConfig.UserName | This optional key specifies the user to run the job as
|
| options/nixos/fileSystems.<name>.encrypted.keyFile | Path to a keyfile used to unlock the backing encrypted
device
|
| options/nixos/services.misskey.settings.url | The final user-facing URL
|
| options/nixos/services.misskey.settings.redis.host | The Redis host.
|
| options/nixos/services.misskey.settings.redis.port | The Redis port.
|
| options/nixos/services.keyd.keyboards.<name>.extraConfig | Extra configuration that is appended to the end of the file.
Do not write ids section here, use a separate option for it
|
| options/nixos/services.coder.tlsKey | The path to the TLS key.
|
| options/home-manager/programs.fish.binds | Manage key bindings
|
| options/home-manager/launchd.agents.<name>.config.OnDemand | This key was used in Mac OS X 10.4 to control whether a job was kept alive or not
|
| options/nixos/services.misskey.settings.socket | The UNIX socket your Misskey server should listen on.
|
| options/nixos/networking.networkmanager.ensureProfiles.secrets.entries.*.key | key in the setting section for which this entry provides a value
|
| options/nixos/services.wg-access-server.secretsFile | yaml file containing all secrets. this needs to be in the same structure as the configuration
|
| options/nixos/services.headscale.settings.tls_key_path | Path to key for already created certificate.
|
| options/home-manager/launchd.agents.<name>.config.LaunchOnlyOnce | This optional key specifies whether the job can only be run once and only once
|
| options/nixos/services.matrix-synapse.settings.macaroon_secret_key | Secret key for authentication tokens
|
| options/darwin/launchd.agents.<name>.serviceConfig.MachServices | This optional key is used to specify Mach services to be registered with the Mach bootstrap sub-system
|
| options/home-manager/xdg.userDirs.extraConfig | Other user directories
|
| options/home-manager/services.keynav.enable | Whether to enable keynav.
|
| options/home-manager/programs.yazi.keymap | Configuration written to
$XDG_CONFIG_HOME/yazi/keymap.toml
|
| options/nixos/services.sharkey.settings.socket | If specified, creates a UNIX socket at the given path that Sharkey listens on.
|
| options/home-manager/nix.settings | Configuration for Nix; see nix.conf(5) for available options
|
| options/nixos/services.firefly-iii.settings.APP_KEY_FILE | The path to your appkey
|
| options/nixos/services.reposilite.keyPasswordFile | Path the the file containing the password used to unlock the Java KeyStore file specified in services.reposilite.settings.keyPath
|
| options/home-manager/home.keyboard.options | X keyboard options; layout switching goes here.
|
| options/nixos/services.keycloak.settings.http-host | On which address Keycloak should accept new connections.
|
| options/nixos/services.warpgate.settings.ssh.keys | Path to store SSH host & client keys.
|
| options/home-manager/launchd.agents.<name>.config.Disabled | This optional key is used as a hint to launchctl(1) that it should not submit this job to launchd when
loading a job or jobs
|
| options/darwin/launchd.daemons.<name>.serviceConfig.UserName | This optional key specifies the user to run the job as
|
| options/nixos/services.sharkey.settings.address | The address that Sharkey binds to.
|
| options/nixos/services.keycloak.settings.http-port | On which port Keycloak should listen for new HTTP connections.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.MachServices | This optional key is used to specify Mach services to be registered with the Mach bootstrap sub-system
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.UserName | This optional key specifies the user to run the job as
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.MachServices | This optional key is used to specify Mach services to be registered with the Mach bootstrap sub-system
|
| options/nixos/services.actkbd.enable | Whether to enable the actkbd key mapping daemon
|
| options/nixos/programs.ssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| options/nixos/services.oncall.secretFile | A YAML file containing secrets such as database or user passwords
|
| options/nixos/services.weblate.djangoSecretKeyFile | Location of the Django secret key
|
| options/darwin/programs.ssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| options/home-manager/programs.gpg.publicKeys.*.trust | The amount of trust you have in the key ownership and the care the
owner puts into signing other keys
|
| options/nixos/services.cfssl.caKey | CA private key -- accepts '[file:]fname' or 'env:varname'.
|
| options/home-manager/home.keyboard.layout | Keyboard layout
|
| options/nixos/services.fwupd.extraTrustedKeys | Installing a public key allows firmware signed with a matching private key to be recognized as trusted, which may require less authentication to install than for untrusted files
|
| options/nixos/services.grafana.settings.security.secret_key | Secret key used for signing
|
| options/nixos/services.keycloak.settings.https-port | On which port Keycloak should listen for new HTTPS connections.
|
| options/nixos/services.misskey.settings.chmodSocket | The file access mode of the UNIX socket.
|
| options/nixos/services.cfssl.tlsKey | Other endpoint's CA private key
|
| options/nixos/services.murmur.sslKey | Path to your SSL key.
|
| options/nixos/security.tpm2.fapi.ekFingerprint | The fingerprint of the endorsement key
|
| options/nixos/services.keycloak.sslCertificateKey | The path to a PEM formatted private key to use for TLS/SSL
connections.
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| options/home-manager/programs.kodi.addonSettings | Attribute set with the plugin namespace as toplevel key and the plugins
settings as lower level key/value pairs
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.presharedKey | Base64 preshared key generated by wg genpsk
|
| options/nixos/services.misskey.settings.redisForJobQueue | ioredis options for the job queue
|
| options/nixos/services.nntp-proxy.sslKey | Proxy ssl key path
|
| options/nixos/services.xrdp.sslKey | ssl private key path
A self-signed certificate will be generated if file not exists.
|
| options/nixos/services.misskey.enable | Whether to enable misskey.
|
| options/home-manager/services.keynav.package | The keynav package to use.
|
| options/home-manager/services.keybase.enable | Whether to enable Keybase.
|
| options/home-manager/programs.kakoune.config.keyMappings.*.docstring | Optional documentation text to display in info boxes.
|
| options/nixos/networking.wireless.networks.<name>.pskRaw | Either the raw pre-shared key in hexadecimal format
or the name of the secret (as defined inside
networking.wireless.secretsFile and prefixed
with ext:) containing the network pre-shared key.
Be aware that this will be written to the Nix store
in plaintext! Always use an external reference.
The external secret can be either the plaintext
passphrase or the raw pre-shared key.
Mutually exclusive with psk and auth.
|
| options/nixos/services.evremap.settings.dual_role | List of dual-role remappings that output different key sequences based on whether the
input key is held or tapped.
|
| options/darwin/launchd.agents.<name>.serviceConfig.GroupName | This optional key specifies the group to run the job as
|
| options/nixos/services.misskey.settings.redisForPubsub | ioredis options for pubsub
|
| options/nixos/services.misskey.settings.redisForJobQueue.port | The Redis port.
|
| options/nixos/services.misskey.settings.redisForJobQueue.host | The Redis host.
|
| options/nixos/services.mastodon.vapidPrivateKeyFile | Path to file containing the private key used for Web Push
Voluntary Application Server Identification
|
| options/nixos/services.keybase.enable | Whether to start the Keybase service.
|
| options/nixos/services.etcd.peerKeyFile | Key file to use for peer to peer communication
|
| options/darwin/launchd.agents.<name>.serviceConfig.Disabled | This optional key is used as a hint to launchctl(1) that it should not submit this job to launchd when
loading a job or jobs
|
| options/nixos/services.kubernetes.controllerManager.kubeconfig.keyFile | Kubernetes controller manager client key file used to connect to kube-apiserver.
|
| options/home-manager/programs.lapce.keymaps | Keymaps written to $XDG_CONFIG_HOME/lapce/keymaps.toml
|
| options/nixos/services.bookstack.settings.APP_KEY_FILE | The path to your appkey
|
| options/darwin/launchd.agents.<name>.serviceConfig.ServiceIPC | This optional key specifies whether the job participates in advanced
communication with launchd
|
| options/nixos/hardware.onlykey.enable | Enable OnlyKey device (https://crp.to/p/) support.
|
| options/nixos/services.logkeys.enable | Whether to enable logkeys, a keylogger service.
|
| options/darwin/nix.settings | Configuration for Nix, see
https://nixos.org/manual/nix/stable/#sec-conf-file
for avalaible options
|
| options/nixos/services.misskey.settings.redisForPubsub.port | The Redis port.
|
| options/nixos/services.misskey.settings.redisForPubsub.host | The Redis host.
|
| options/nixos/services.guix.publish.generateKeyPair | Whether to generate signing keys in /etc/guix which are
required to initialize a substitute server
|
| options/nixos/services.evremap.settings.dual_role.*.tap | The key sequence that should be output when the input key is tapped
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Disabled | This optional key is used as a hint to launchctl(1) that it should not submit this job to launchd when
loading a job or jobs
|
| options/home-manager/home.keyboard.variant | X keyboard variant
|
| options/nixos/services.sharkey.enable | Whether to enable Sharkey, a Sharkish microblogging platform.
|
| options/nixos/services.gitlab.secrets.jwsFile | A file containing the secret used to encrypt session
keys
|
| options/nixos/services.postgrest.jwtSecretFile | The secret or JSON Web Key (JWK) (or set) used to decode JWT tokens clients provide for authentication
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Disabled | This optional key is used as a hint to launchctl(1) that it should not submit this job to launchd when
loading a job or jobs
|
| options/nixos/services.misskey.settings.db.disableCache | Whether to disable caching queries.
|
| options/nixos/services.kmonad.keyboards.<name>.defcfg.compose.delay | The delay (in milliseconds) between compose key sequences.
|
| options/nixos/services.quorum.nodekeyFile | Path to the nodekey.
|
| options/home-manager/programs.tmux.prefix | Set the prefix key
|
| options/nixos/i18n.extraLocaleSettings | A set of additional system-wide locale settings other than LANG
which can be configured with i18n.defaultLocale
|
| options/darwin/launchd.agents.<name>.serviceConfig.OnDemand | This key was used in Mac OS X 10.4 to control whether a job was kept alive or not
|
| options/darwin/launchd.daemons.<name>.serviceConfig.GroupName | This optional key specifies the group to run the job as
|
| options/home-manager/launchd.agents.<name>.config.Sockets | This optional key is used to specify launch on demand sockets that can be used to let launchd know when
to run the job
|
| options/nixos/services.evremap.settings.dual_role.*.hold | The key sequence that should be output when the input key is held
|
| options/nixos/services.i2pd.proto.httpProxy.keys | File to persist HTTPPROXY keys.
|
| options/nixos/services.dysnomia.components | An attribute set in which each key represents a container and each value an attribute set in which each key represents a component and each value a derivation constructing its initial state
|
| options/darwin/launchd.agents.<name>.serviceConfig.LaunchOnlyOnce | This optional key specifies whether the job can only be run once and only once
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.GroupName | This optional key specifies the group to run the job as
|
| options/darwin/launchd.daemons.<name>.serviceConfig.ServiceIPC | This optional key specifies whether the job participates in advanced
communication with launchd
|
| options/nixos/services.postfix.sslKey | SSL key to use.
|
| options/nixos/services.athens.tlsKeyFile | Path to the TLS key file.
|
| options/nixos/services.ircdHybrid.rsaKey | IRCD server RSA key.
|
| options/nixos/services.rauc.slots | RAUC slot definitions
|
| options/nixos/services.vsftpd.rsaKeyFile | RSA private key file.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.i2pd.inTunnels.<name>.keys | Keyset used for tunnel identity.
|
| options/nixos/services.mqtt2influxdb.mqtt.keyfile | Key file for MQTT
|
| options/nixos/services.sharkey.package | The sharkey package to use.
|
| options/nixos/services.misskey.package | The misskey package to use.
|
| options/home-manager/services.keybase.package | The keybase package to use.
|
| options/home-manager/programs.keychain.agents | Agents to add.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.ServiceIPC | This optional key specifies whether the job participates in advanced
communication with launchd
|
| options/nixos/services.triggerhappy.bindings.*.keys | List of keys to match
|
| options/home-manager/qt.kde.settings | A set of values to be modified by kwriteconfig6
|
| options/nixos/services.i2pd.outTunnels.<name>.keys | Keyset used for tunnel identity.
|
| options/nixos/services.logind.powerKey | Specifies what to do when the power key is pressed.
|
| options/nixos/services.arsenik.mac | Original key arrangement on your keyboard: Mac or PC.
|
| options/nixos/services.openssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| options/home-manager/programs.keychain.enable | Whether to enable keychain.
|
| options/nixos/services.pgpkeyserver-lite.hkpPort | Which port the sks-keyserver is listening on.
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.keystore | Path to keystore (combined PEM with cert/key, or PKCS12 keystore)
|
| options/nixos/users.users.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| options/darwin/users.users.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| options/nixos/services.dendrite.settings.key_server.database.connection_string | Database for the Key Server (for end-to-end encryption).
|
| options/nixos/services.datadog-agent.apiKeyFile | Path to a file containing the Datadog API key to associate the
agent with your account.
|
| options/nixos/services.wastebin.secretFile | Path to file containing sensitive environment variables
|
| options/darwin/launchd.daemons.<name>.serviceConfig.OnDemand | This key was used in Mac OS X 10.4 to control whether a job was kept alive or not
|
| options/nixos/services.i2pd.proto.socksProxy.keys | File to persist SOCKSPROXY keys.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.OnDemand | This key was used in Mac OS X 10.4 to control whether a job was kept alive or not
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LaunchOnlyOnce | This optional key specifies whether the job can only be run once and only once
|
| options/nixos/services.coturn.dh-file | Use custom DH TLS key, stored in PEM format in the file.
|
| options/nixos/services.vault.tlsKeyFile | TLS private key file
|
| options/nixos/services.kubernetes.apiserver.serviceAccountSigningKeyFile | Path to the file that contains the current private key of the service
account token issuer
|
| options/nixos/services.kubernetes.apiserver.serviceAccountKeyFile | File containing PEM-encoded x509 RSA or ECDSA private or public keys,
used to verify ServiceAccount tokens
|
| options/home-manager/programs.broot.settings.verbs | Define new verbs
|
| options/nixos/services.buildkite-agents.<name>.privateSshKeyPath | OpenSSH private key
A run-time path to the key file, which is supposed to be provisioned
outside of Nix store.
|
| options/nixos/services.unbound.checkconf | Whether to check the resulting config file with unbound checkconf for syntax errors
|
| options/darwin/services.buildkite-agents.<name>.privateSshKeyPath | OpenSSH private key
A run-time path to the key file, which is supposed to be provisioned
outside of Nix store.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LaunchOnlyOnce | This optional key specifies whether the job can only be run once and only once
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.presharedKeyFile | File pointing to preshared key as generated by wg genpsk
|
| options/nixos/hardware.nitrokey.enable | Enables udev rules for Nitrokey devices.
|
| options/home-manager/services.gnome-keyring.enable | Whether to enable GNOME Keyring.
|
| options/nixos/services.logkeys.device | Use the given device as keyboard input event device instead of /dev/input/eventX default.
|
| options/home-manager/targets.darwin.defaults.NSGlobalDomain.KeyRepeat | Interval between key repetitions when holding down a key
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockProtocol | This optional key specifies the protocol to be passed to socket(2)
|
| options/nixos/services.arsenik.wide | The right hand is moved one key to the right.
|
| options/home-manager/services.ssh-agent.enable | Whether to enable OpenSSH private key agent.
|
| options/home-manager/services.gpg-agent.enable | Whether to enable GnuPG private key agent.
|
| options/nixos/services.keycloak.settings.hostname | The hostname part of the public URL used as base for
all frontend requests
|
| options/nixos/services.sharkey.setupRedis | Whether to automatically set up a local Redis cache and configure Sharkey to use it.
|
| options/nixos/services.misskey.reverseProxy.webserver | The webserver to use as the reverse proxy.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| options/nixos/services.gitea.camoHmacKeyFile | Path to a file containing the camo HMAC key.
|
| options/home-manager/programs.gpg.publicKeys.*.text | Text of an OpenPGP public key.
|
| options/nixos/services.yggdrasil.settings.PrivateKeyPath | Path to the private key file on the host system
|
| options/nixos/services.keycloak.enable | Whether to enable the Keycloak identity and access management
server.
|
| options/home-manager/services.yubikey-agent.enable | Whether to enable Seamless ssh-agent for YubiKeys.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets | This optional key is used to specify launch on demand sockets that can be used to let launchd know when
to run the job
|
| options/nixos/users.extraUsers.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| options/home-manager/programs.keychain.extraFlags | Extra flags to pass to keychain.
|
| options/home-manager/programs.zsh.historySubstringSearch.searchUpKey | The key codes to be used when searching up
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.hotkeys | Hotkeys to configure.
|
| options/nixos/services.longview.apiKey | Longview API key
|
| options/nixos/services.logind.rebootKey | Specifies what to do when the reboot key is pressed.
|
| options/nixos/security.acme.certs.<name>.csrKey | Path to the private key to the matching certificate signing request.
|
| options/nixos/services.skydns.etcd.tlsPem | Skydns path of TLS client certificate - public key.
|
| options/nixos/services.skydns.etcd.tlsKey | Skydns path of TLS client certificate - private key.
|
| options/darwin/services.yabai.config | Key/Value pairs to pass to yabai's 'config' domain, via the configuration file.
|
| options/nixos/services.keycloak.package | The keycloak package to use.
|
| options/home-manager/programs.keychain.package | The keychain package to use.
|
| options/nixos/services.dnsdist.dnscrypt.providerKey | The filepath to the provider secret key
|
| options/nixos/services.sympa.settings | The sympa.conf configuration file as key value set
|
| options/nixos/services.sharkey.settings.mediaDirectory | Path to the folder where Sharkey stores uploaded media such as images and attachments.
|
| options/nixos/services.prometheus.remoteWrite.*.sigv4.access_key | The Access Key ID.
|
| options/nixos/services.prometheus.remoteWrite.*.sigv4.secret_key | The Secret Access Key.
|
| options/nixos/services.skydns.etcd.caCert | Skydns path of TLS certificate authority public key.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets | This optional key is used to specify launch on demand sockets that can be used to let launchd know when
to run the job
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| options/nixos/services.actkbd.bindings.*.keys | List of keycodes to match.
|
| options/nixos/services.pgpkeyserver-lite.enable | Whether to enable pgpkeyserver-lite on a nginx vHost proxying to a gpg keyserver.
|
| options/nixos/services.longview.apiKeyFile | A file containing the Longview API key
|
| options/nixos/services.nextcloud-spreed-signaling.settings.sessions.blockkeyFile | The path to the file containing the value for sessions.blockkey
|
| options/nixos/services.misskey.settings.redisForTimelines | ioredis options for timelines
|
| options/nixos/services.kmonad.keyboards | Keyboard configuration.
|
| options/nixos/services.kanata.keyboards | Keyboard configurations.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets | This optional key is used to specify launch on demand sockets that can be used to let launchd know when
to run the job
|
| options/home-manager/programs.joshuto.keymap | Configuration written to
$XDG_CONFIG_HOME/joshuto/keymap.toml
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| options/home-manager/programs.zsh.historySubstringSearch.searchDownKey | The key codes to be used when searching down
|
| options/nixos/services.matrix-synapse.settings.signing_key_path | Path to the signing key to sign messages with.
|
| options/nixos/services.grafana.settings.database.client_key_path | The path to the client key
|
| options/home-manager/programs.gradle.settings | Key value pairs to write to gradle.properties in the Gradle
home directory.
|
| options/nixos/services.pgpkeyserver-lite.package | The pgpkeyserver-lite package to use.
|
| options/nixos/services.yubikey-agent.package | The yubikey-agent package to use.
|
| options/home-manager/services.gnome-keyring.package | The gnome-keyring package to use.
|
| options/home-manager/services.yubikey-agent.package | The yubikey-agent package to use.
|
| options/nixos/services.sks.enable | Whether to enable SKS (synchronizing key server for OpenPGP) and start the database
server
|
| options/home-manager/vdirsyncer.authCert | Either a path to a certificate with a client certificate and
the key or a list of paths to the files with them.
|
| options/nixos/services.hockeypuck.settings | Configuration file for hockeypuck, here you can override
certain settings (loglevel and
openpgp.db.dsn) by just setting those values
|
| options/nixos/services.misskey.settings.redisForTimelines.port | The Redis port.
|
| options/nixos/services.misskey.settings.redisForTimelines.host | The Redis host.
|
| options/darwin/system.keyboard.enableKeyMapping | Whether to enable keyboard mappings.
|
| options/nixos/services.hockeypuck.port | HKP port to listen on.
|
| options/home-manager/programs.mc.keymapSettings | Settings for mc/mc.keymap file
|
| options/nixos/nix.sshServe.write | Whether to enable writing to the Nix store as a remote store via SSH
|
| options/nixos/services.uptermd.hostKey | Path to SSH host key
|
| options/home-manager/programs.gpg.publicKeys | A list of public keys to be imported into GnuPG
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.serverName | Name of this virtual host
|
| options/nixos/hardware.keyboard.qmk.enable | Whether to enable non-root access to the firmware of QMK keyboards.
|
| options/nixos/services.crowdsec-firewall-bouncer.secrets.apiKeyPath | Path to the API key to authenticate with a local CrowdSec API
|
| options/nixos/services.pgpkeyserver-lite.hkpAddress | Which IP address the sks-keyserver is listening on.
|
| options/nixos/services.kmonad.keyboards.<name>.defcfg.fallthrough | Whether to enable re-emitting unhandled key events.
|
| options/nixos/programs.tmux.shortcut | Ctrl following by this key is used as the main shortcut.
|
| options/nixos/services.self-deploy.sshKeyFile | Path to SSH private key used to fetch private repositories over
SSH.
|
| options/nixos/services.syncoid.sshKey | SSH private key file to use to login to the remote system
|
| options/home-manager/programs.tmux.shortcut | CTRL following by this key is used as the main shortcut.
|
| options/nixos/services.misskey.settings.meilisearch | Meilisearch connection options.
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.slot | Which slot on the YubiKey to challenge.
|
| options/nixos/services.kubernetes.apiserver.tlsKeyFile | Kubernetes apiserver private key file.
|
| options/nixos/nix.settings | Configuration for Nix, see
https://nixos.org/manual/nix/stable/command-ref/conf-file.html or
nix.conf(5) for available options
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.presharedKeyFile | File pointing to preshared key as generated by wg genpsk
|
| options/nixos/services.mackerel-agent.apiKeyFile | Path to file containing the Mackerel API key
|
| options/nixos/boot.initrd.luks.yubikeySupport | Enables support for authenticating with a YubiKey on LUKS devices
|
| options/nixos/hardware.keyboard.teck.enable | Whether to enable non-root access to the firmware of TECK keyboards.
|
| options/darwin/system.defaults.NSGlobalDomain.InitialKeyRepeat | Apple menu > System Preferences > Keyboard
If you press and hold certain keyboard keys when in a text area, the key’s character begins to repeat
|
| options/nixos/programs.pay-respects.aiIntegration | Whether to enable pay-respects' LLM integration
|
| options/nixos/services.logind.suspendKey | Specifies what to do when the suspend key is pressed.
|
| options/nixos/services.postfix.config | The main.cf configuration file as key value set.
|
| options/nixos/services.dovecot2.sslCACert | Path to the server's CA certificate key.
|
| options/nixos/services.munge.password | The path to a daemon's secret key.
|
| options/nixos/services.netbox.secretKeyFile | Path to a file containing the secret key.
|
| options/nixos/services.oink.secretApiKeyFile | Path to a file containing the secret API key to use when modifying DNS records.
|
| options/nixos/services.ncps.cache.hostName | The hostname of the cache server. This is used to generate the
private key used for signing store paths (.narinfo)
|
| options/nixos/services.nghttpx.tls | TLS certificate and key paths
|
| options/nixos/services.mympd.settings | Manages the configuration files declaratively
|
| options/nixos/services.warpgate.settings.ssh.host_key_verification | Specify host key verification action when connecting to a SSH target with unknown/differing host key.
|
| options/nixos/programs.yubikey-manager.enable | Whether to enable yubikey-manager.
|
| options/nixos/services.misskey.reverseProxy.webserver.caddy | Extra configuration for the caddy virtual host of Misskey
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx | Extra configuration for the nginx virtual host of Misskey
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.esp_proposals | ESP proposals to offer for the CHILD_SA
|
| options/nixos/services.pgpkeyserver-lite.hostname | Which hostname to set the vHost to that is proxying to sks.
|
| options/nixos/services.immichframe.settings.Accounts.*.ApiKeyFile | File containing an API key to talk to the Immich server
|
| options/nixos/services.headscale.settings.noise.private_key_path | Path to noise private key file, generated automatically if it does not exist.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.pubkeys | List of raw public key candidates to use for
authentication
|
| options/nixos/services.xserver.xkb.extraLayouts.<name>.keycodesFile | The path to the xkb keycodes file
|
| options/nixos/services.nginx.proxyCachePath.<name>.keysZoneName | Set name to shared memory zone.
|
| options/nixos/services.nginx.proxyCachePath.<name>.keysZoneSize | Set size to shared memory zone.
|
| options/nixos/services.sharkey.openFirewall | Whether to open ports in the NixOS firewall for Sharkey.
|
| options/home-manager/programs.keychain.inheritType | Inherit type to attempt from agent variables from the environment.
|
| options/nixos/services.druid.commonConfig | (key=value) Configuration to be written to common.runtime.properties
|
| options/nixos/services.arsenik.enable | Whether to enable A 33-key layout that works with all keyboards..
|
| options/home-manager/launchd.agents.<name>.config.Nice | This optional key specifies what nice(3) value should be applied to the daemon.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.rsa | Private key decryption passphrase for a key in the rsa
folder.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockProtocol | This optional key specifies the protocol to be passed to socket(2)
|
| options/nixos/programs.wshowkeys.package | The wshowkeys package to use.
|
| options/nixos/services.keycloak.plugins | Keycloak plugin jar, ear files or derivations containing
them
|
| options/nixos/services.misskey.settings.meilisearch.ssl | Whether to connect via SSL.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.root | The path of the web root directory.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.auth | Authentication to expect from remote
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey | The options to use for this LUKS device in YubiKey-PBA
|
| options/nixos/services.misskey.settings.meilisearch.host | The Meilisearch host.
|
| options/nixos/services.misskey.settings.meilisearch.port | The Meilisearch port.
|
| options/nixos/services.printing.cups-pdf.instances.<name>.settings | Settings for a cups-pdf instance, see the descriptions in the template config file in the cups-pdf package
|
| options/home-manager/programs.wlogout.layout.*.keybind | Keyboard character to trigger this action.
|
| options/home-manager/programs.cudatext.lexerHotkeys | Hotkeys settings specific to each lexer.
|
| options/nixos/services.gitea.minioAccessKeyId | Path to a file containing the Minio access key id.
|
| options/home-manager/programs.gpg.publicKeys.*.source | Path of an OpenPGP public key file.
|
| options/home-manager/launchd.agents.<name>.config.Label | This required key uniquely identifies the job to launchd.
|
| options/home-manager/xdg.desktopEntries.<name>.settings | Extra key-value pairs to add to the [Desktop Entry] section
|
| options/nixos/services.immichframe.settings.Accounts.*.ApiKey | API key to talk to the Immich server
|
| options/nixos/services.prometheus.remoteRead.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/home-manager/programs.ne.keybindings | Keybinding file for ne.
|
| options/nixos/services.logind.powerKeyLongPress | Specifies what to do when the power key is long-pressed.
|
| options/nixos/services.gitea.captcha.siteKey | CAPTCHA site key to use for Gitea.
|
| options/nixos/services.flannel.etcd.prefix | Etcd key prefix
|
| options/nixos/services.misskey.reverseProxy.webserver.caddy.hostName | Canonical hostname for the server.
|
| options/nixos/services.misskey.settings.meilisearch.scope | The search scope.
|
| options/nixos/networking.wg-quick.interfaces.<name>.privateKey | Base64 private key generated by wg genkey
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ecdsa | Private key decryption passphrase for a key in the
ecdsa folder.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs8 | Private key decryption passphrase for a key in the
pkcs8 folder.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockProtocol | This optional key specifies the protocol to be passed to socket(2)
|
| options/nixos/services.oink.settings.secretApiKey | Secret API key to use when modifying DNS records.
|
| options/nixos/services.misskey.settings.meilisearch.index | Meilisearch index to use.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockProtocol | This optional key specifies the protocol to be passed to socket(2)
|
| options/nixos/services.snipe-it.appKeyFile | A file containing the Laravel APP_KEY - a 32 character long,
base64 encoded key used for encryption where needed
|
| options/nixos/services.prometheus.remoteWrite.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.misskey.reverseProxy.webserver.caddy.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| options/home-manager/programs.cudatext.hotkeys | Hotkeys for Cudatext
|
| options/home-manager/services.polybar.settings | Polybar configuration
|
| options/nixos/services.xserver.autoRepeatDelay | Sets the autorepeat delay (length of time in milliseconds that a key must be depressed before autorepeat starts).
|
| options/nixos/programs.yubikey-manager.package | The yubikey-manager package to use.
|
| options/nixos/programs.fzf.keybindings | Whether to enable fzf keybindings.
|
| options/nixos/services.kmonad.keyboards.<name>.name | Keyboard name.
|
| options/nixos/services.yubikey-agent.enable | Whether to start yubikey-agent when you log in
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.rsaPublicKey | Legacy RSA public key of the host in PEM format, including start and
end markers
|
| options/nixos/services.keycloak.settings.http-relative-path | The path relative to / for serving
resources.
In versions of Keycloak using Wildfly (<17),
this defaulted to /auth
|
| options/nixos/services.btrbk.sshAccess.*.roles | What actions can be performed with this SSH key
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.keyttl | TTL for dnssec records
|
| options/nixos/services.matrix-tuwunel.settings.global.trusted_servers | Servers listed here will be used to gather public keys of other servers
(notary trusted key servers)
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.quic | Whether to enable the QUIC transport protocol
|
| options/nixos/services.misskey.reverseProxy.ssl | Whether to enable SSL for the reverse proxy
|
| options/home-manager/programs.rclone.remotes.<name>.config | Regular configuration options as described in rclone's documentation
https://rclone.org/docs/
|
| options/nixos/services.journald.remote.settings.Remote.ServerKeyFile | A path to a SSL secret key file in PEM format
|
| options/nixos/services.metabase.ssl.keystore | Java KeyStore file containing the certificates.
|
| options/nixos/services.cjdns.enable | Whether to enable the cjdns network encryption
and routing engine
|
| options/nixos/services.keycloak.database.type | The type of database Keycloak should connect to.
|
| options/nixos/programs.skim.keybindings | Whether to enable skim keybindings.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.listen.*.ssl | Enable SSL.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| options/home-manager/programs.lf.keybindings | Keys to bind
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| options/nixos/services.evdevremapkeys.settings | config.yaml for evdevremapkeys
|
| options/nixos/services.logind.rebootKeyLongPress | Specifies what to do when the reboot key is long-pressed.
|
| options/nixos/services.druid.broker.config | (key=value) Configuration to be written to runtime.properties of the druid Druid Broker
https://druid.apache.org/docs/latest/configuration/index.html
|
| options/nixos/programs.ssh.startAgent | Whether to start the OpenSSH agent when you log in
|
| options/nixos/services.dovecot2.sslServerKey | Path to the server's private key.
|
| options/nixos/image.repart.partitions | Specify partitions as a set of the names of the partitions with their
configuration as the key.
|
| options/nixos/services.druid.router.config | (key=value) Configuration to be written to runtime.properties of the druid Druid Router
https://druid.apache.org/docs/latest/configuration/index.html
|
| options/home-manager/launchd.agents.<name>.config.Debug | This optional key specifies that launchd should adjust its log mask temporarily to LOG_DEBUG while
dealing with this job.
|
| options/nixos/services.misskey.reverseProxy.host | The fully qualified domain name to bind to
|
| options/nixos/services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".secret_key_base | Secret key used as a base to generate further secrets for encrypting and
signing data
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.listen.*.addr | Listen address.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.default | Makes this vhost the default.
|
| options/home-manager/programs.spotify-player.keymaps | Configuration written to the keymaps field of
$XDG_CONFIG_HOME/spotify-player/keymap.toml
|
| options/home-manager/programs.kitty.keybindings | Mapping of keybindings to actions.
|
| options/home-manager/programs.urxvt.keybindings | Mapping of keybindings to actions
|
| options/nixos/services.zitadel.settings.TLS.KeyPath | Path to the TLS certificate private key.
|
| options/home-manager/programs.intelli-shell.shellHotkeys | Settings for customizing the keybinding to integrate your shell with intelli-shell
|
| options/nixos/services.prometheus.scrapeConfigs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.private | Private key decryption passphrase for a key in the
private folder.
|
| options/nixos/programs.tsmClient.dsmSysText | This configuration key contains the effective text
of the client system-options file "dsm.sys"
|
| options/nixos/services.iperf3.rsaPrivateKey | Path to the RSA private key (not password-protected) used to decrypt authentication credentials from the client.
|
| options/nixos/services.dovecot2.enableDHE | Whether to enable ssl_dh and generation of primes for the key exchange.
|
| options/nixos/services.radicle.publicKey | An SSH public key (as an absolute file path or directly as a string),
usually generated by rad auth.
|
| options/nixos/services.nsd.zones.<name>.requestXFR | Format: [AXFR|UDP] <ip-address> <key-name | NOKEY>
|
| options/nixos/services.outline.sslKeyFile | File path that contains the Base64-encoded private key for HTTPS
termination
|
| options/nixos/users.allowNoPasswordLogin | Disable checking that at least the root user or a user in the wheel group can log in using
a password or an SSH key
|
| options/home-manager/launchd.agents.<name>.config.RunAtLoad | This optional key is used to control whether your job is launched once at the time the job is loaded
|
| options/nixos/programs.wshowkeys.enable | Whether to enable wshowkeys (displays keypresses on screen on supported Wayland
compositors)
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.kubernetes.apiserver.proxyClientKeyFile | Key to use for connections to proxy.
|
| options/nixos/services.keycloak.database.port | Port of the database to connect to.
|
| options/nixos/services.gnome.gnome-keyring.enable | Whether to enable GNOME Keyring daemon, a service designed to
take care of the user's security credentials,
such as user names and passwords
.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.kanata.keyboards.<name>.port | Port to run the TCP server on. null will not run the server.
|
| options/nixos/services.harmonia.signKeyPath | DEPRECATED: Use services.harmonia.signKeyPaths instead
|
| options/nixos/services.dovecot2.sslServerCert | Path to the server's public key.
|
| options/nixos/services.movim.h2o.tls.identity | Key / certificate pairs for the virtual host.
|
| options/nixos/services.ncps.cache.secretKeyPath | The path to load the secretKey for signing narinfos
|
| options/nixos/services.monica.appKeyFile | A file containing the Laravel APP_KEY - a 32 character long,
base64 encoded key used for encryption where needed
|
| options/nixos/services.nsd.dnssecInterval | How often to check whether dnssec key rollover is required
|
| options/home-manager/services.podman.images.<name>.certDir | Path of certificates (*.{crt,cert,key}) used to connect to registry.
|
| options/nixos/services.misskey.redis.passwordFile | The path to a file containing the Redis password
|
| options/nixos/services.misskey.reverseProxy.webserver.caddy.logFormat | Configuration for HTTP request logging (also known as access logs)
|
| options/nixos/services.misskey.reverseProxy.enable | Whether to enable a HTTP reverse proxy for Misskey.
|
| options/home-manager/services.sxhkd.keybindings | An attribute set that assigns hotkeys to commands.
|
| options/nixos/services.synergy.server.tls.enable | Whether TLS encryption should be used
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.extraConfig | These lines go to the end of the vhost verbatim.
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.twoFactor | Whether to use a passphrase and a YubiKey (true), or only a YubiKey (false).
|
| options/nixos/services.keycloak.realmFiles | Realm files that the server is going to import during startup
|
| options/nixos/services.misskey.redis.createLocally | Create and use a local Redis instance
|
| options/nixos/services.nsd.remoteControl.serverKeyFile | Path to the server private key, which is used by the server
but not by nsd-control
|
| options/darwin/launchd.agents.<name>.serviceConfig | Each attribute in this set specifies an option for a key in the plist.
https://developer.apple.com/legacy/library/documentation/Darwin/Reference/ManPages/man5/launchd.plist.5.html
|
| options/darwin/services.spacebar.config | Key/Value pairs to pass to spacebar's 'config' domain, via the configuration file.
|
| options/nixos/services.tor.relay.onionServices.<name>.authorizedClients | Authorized clients for a v3 onion service,
as a list of public key, in the format:
descriptor:x25519:<base32-public-key>
See torrc manual.
|
| options/nixos/services.kmonad.keyboards.<name>.config | Keyboard configuration.
|
| options/home-manager/programs.powerline-go.settings | This can be any key/value pair as described in
https://github.com/justjanne/powerline-go.
|
| options/nixos/services.gemstash.settings | Configuration for Gemstash
|
| options/home-manager/programs.hyprlock.settings | Hyprlock configuration written in Nix
|
| options/home-manager/services.hypridle.settings | Hypridle configuration written in Nix
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.listen.*.port | Port number to listen on
|
| options/darwin/services.synergy.server.tls.enable | Whether to enable Whether TLS encryption should be used
|
| options/nixos/services.dendrite.tlsCert | The path to the TLS certificate.
nix-shell -p dendrite --command "generate-keys --tls-cert server.crt --tls-key server.key"
|
| options/nixos/services.molly-brown.certPath | Path to TLS certificate
|
| options/nixos/services.sshwifty.sharedKeyFile | Path to a file containing the shared key.
|
| options/nixos/services.netbox.keycloakClientSecret | File that contains the keycloak client secret.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.enableACME | Whether to ask Let's Encrypt to sign a certificate for this vhost
|
| options/nixos/services.tlsrpt.fetcher.settings | Flags from tlsrpt-fetcher(1) as key-value pairs.
|
| options/nixos/services.tlsrpt.reportd.settings | Flags from tlsrpt-reportd(1) as key-value pairs.
|
| options/nixos/services.misskey.reverseProxy.webserver.caddy.extraConfig | Additional lines of configuration appended to this virtual host in the
automatically generated Caddyfile.
|
| options/nixos/hardware.keyboard.uhk.enable | Whether to enable non-root access to the firmware of UHK keyboards
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.saltLength | Length of the new salt in byte (64 is the effective maximum).
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.auth | Authentication to perform locally.
- The default
pubkey uses public key authentication
using a private key associated to a usable certificate.
psk uses pre-shared key authentication.
- The IKEv1 specific
xauth is used for XAuth or Hybrid
authentication,
- while the IKEv2 specific
eap keyword defines EAP
authentication.
- For
xauth, a specific backend name may be appended,
separated by a dash
|
| options/darwin/services.mopidy.mediakeys.enable | Whether to enable the Mopidy OSX Media Keys support daemon.
|
| options/nixos/services.matrix-synapse.settings.trusted_key_servers | The trusted servers to download signing keys from.
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.gracePeriod | Time in seconds to wait for the YubiKey.
|
| options/nixos/services.kmonad.keyboards.<name>.device | Path to the keyboard's device file.
|
| options/home-manager/wayland.windowManager.sway.config.keycodebindings | An attribute set that assigns keypress to an action using key code
|
| options/nixos/programs.yubikey-touch-detector.enable | Whether to enable yubikey-touch-detector.
|
| options/nixos/services.postfix.settings.main | The main.cf configuration file as key value set
|
| options/nixos/services.keycloak.database.useSSL | Whether the database connection should be secured by SSL / TLS
|
| options/nixos/services.netbird.server.management.settings | Configuration of the netbird management server
|
| options/nixos/services.logind.suspendKeyLongPress | Specifies what to do when the suspend key is long-pressed.
|
| options/nixos/services.gitea.minioSecretAccessKey | Path to a file containing the Minio secret access key.
|
| options/nixos/boot.initrd.luks.devices.<name>.gpgCard.publicKey | Path to the Public Key.
|
| options/nixos/services.openssh.hostKeys | NixOS can automatically generate SSH host keys
|
| options/home-manager/programs.sftpman.mounts.<name>.sshKey | Path to the SSH key to use for authentication
|
| options/home-manager/launchd.agents.<name>.config.WatchPaths | This optional key causes the job to be started if any one of the listed paths are modified.
|
| options/home-manager/services.gpg-agent.enableSshSupport | Whether to use the GnuPG key agent for SSH keys.
|
| options/home-manager/programs.sftpman.defaultSshKey | Path to the SSH key to be used by default
|
| options/home-manager/programs.nnn.plugins.mappings | Key mappings to the plugins.
|
| options/nixos/services.keycloak.themes | Additional theme packages for Keycloak
|
| options/home-manager/xsession.windowManager.i3.config.keycodebindings | An attribute set that assigns keypress to an action using key code
|
| options/nixos/services.unclutter.keystroke | Wait for a keystroke before hiding the cursor
|
| options/nixos/services.wstunnel.servers.<name>.tlsKey | TLS key to use instead of the hardcoded on in case of HTTPS connections
|
| options/home-manager/programs.superfile.hotkeys | Hotkey configuration written to $XDG_CONFIG_HOME/superfile/hotkeys.toml
(linux) or Library/Application Support/superfile/hotkeys.toml (darwin), See
https://superfile.netlify.app/configure/custom-hotkeys/ for supported values.
|
| options/nixos/services.logind.hibernateKey | Specifies what to do when the hibernate key is pressed.
|
| options/nixos/services.cfssl.mutualTlsClientKey | Mutual TLS - client key to call remote instance requiring client certs
|
| options/nixos/services.gitea.captcha.secretFile | Path to a file containing the CAPTCHA secret key.
|
| options/nixos/services.cfssl.responderKey | Private key for OCSP responder certificate
|
| options/nixos/services.h2o.hosts.<name>.tls.identity | Key / certificate pairs for the virtual host.
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.zsk | Key policy for zone signing keys
|
| options/home-manager/launchd.agents.<name>.config.StartOnMount | This optional key causes the job to be started every time a filesystem is mounted.
|
| options/home-manager/wayland.windowManager.sway.config.up | Home row direction key for moving up.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.listen | Listen addresses and ports for this virtual host
|
| options/nixos/services.kanata.keyboards.<name>.extraArgs | Extra command line arguments passed to kanata.
|
| options/home-manager/xsession.windowManager.fluxbox.keys | Keyboard shortcuts configuration for Fluxbox, written to
~/.fluxbox/keys
|
| options/home-manager/programs.obsidian.vaults.<name>.settings.hotkeys.<name>.*.modifiers | The hotkey modifiers.
|
| options/nixos/hardware.keyboard.zsa.enable | Whether to enable udev rules for keyboards from ZSA like the ErgoDox EZ, Planck EZ and Moonlander Mark I
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/darwin/services.mopidy.mediakeys.package | This option specifies the mediakeys package to use.
|
| options/nixos/services.kubernetes.apiserver.kubeletClientKeyFile | Key to use for connections to kubelet.
|
| options/home-manager/programs.pianobar.settings | Apply configurations for pianobar via key/value attributes
|
| options/nixos/security.agnos.settings.accounts.*.certificates.*.key_output_file | Output path for the certificate private key
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| options/nixos/networking.wireguard.interfaces.<name>.privateKey | Base64 private key generated by wg genkey
|
| options/nixos/programs.ssh.kexAlgorithms | Specifies the available KEX (Key Exchange) algorithms.
|
| options/home-manager/services.grobi.rules | These are the rules grobi tries to match to the current
output configuration
|
| options/nixos/services.sympa.domains.<name>.settings | The robot.conf configuration file as key value set
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| options/nixos/services.misskey.reverseProxy.webserver.caddy.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/programs.yubikey-touch-detector.verbose | Enables verbose logging
|
| options/nixos/virtualisation.fileSystems.<name>.encrypted.keyFile | Path to a keyfile used to unlock the backing encrypted
device
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations | Declarative location config
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.storage.fsType | The filesystem of the unencrypted device.
|
| options/nixos/services.librespeed.tlsKey | TLS private key to use
|
| options/nixos/services.galene.insecure | Whether Galene should listen in http or in https
|
| options/darwin/launchd.daemons.<name>.serviceConfig | Each attribute in this set specifies an option for a key in the plist.
https://developer.apple.com/legacy/library/documentation/Darwin/Reference/ManPages/man5/launchd.plist.5.html
|
| options/home-manager/services.grobi.executeAfter | Commands to be run after an output configuration was
changed
|
| options/home-manager/launchd.agents.<name>.config.Umask | This optional key specifies what value should be passed to umask(2) before running the job
|
| options/nixos/services.searx.settingsFile | The path of the Searx server settings.yml file
|
| options/nixos/services.prometheus.exporters.sabnzbd.servers.*.apiKeyFile | The path to a file containing the API key
|
| options/nixos/services.froide-govplan.secretKeyFile | Path to a file containing the secret key.
|
| options/nixos/services.actkbd.bindings | Key bindings for actkbd
|
| options/nixos/services.sks.extraDbConfig | Set contents of the files "KDB/DB_CONFIG" and "PTree/DB_CONFIG" within
the ${dataDir} directory
|
| options/darwin/launchd.user.agents.<name>.serviceConfig | Each attribute in this set specifies an option for a key in the plist.
https://developer.apple.com/legacy/library/documentation/Darwin/Reference/ManPages/man5/launchd.plist.5.html
|
| options/home-manager/services.gpg-agent.enableExtraSocket | Whether to enable extra socket of the GnuPG key agent (useful for GPG
Agent forwarding).
|
| options/home-manager/wayland.windowManager.sway.config.down | Home row direction key for moving down.
|
| options/nixos/services.tlsrpt.collectd.settings | Flags from tlsrpt-collectd(1) as key-value pairs.
|
| options/home-manager/services.hyprpaper.settings | hyprpaper configuration written in Nix
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.sharkey.settings.fulltextSearch.provider | Which provider to use for full text search
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.reuseport | Create an individual listening socket
|
| options/nixos/services.kanata.keyboards.<name>.config | Configuration other than defcfg
|
| options/nixos/nix.buildMachines.*.publicHostKey | The (base64-encoded) public host key of this builder
|
| options/nixos/services.outline.storage.accessKey | S3 access key.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Nice | This optional key specifies what nice(3) value should be applied to the daemon.
|
| options/darwin/nix.buildMachines.*.publicHostKey | The (base64-encoded) public host key of this builder
|
| options/home-manager/wayland.windowManager.sway.config.left | Home row direction key for moving left.
|
| options/home-manager/nix.buildMachines.*.publicHostKey | The (base64-encoded) public host key of this builder
|
| options/nixos/services.evremap.settings.remap.*.input | The key sequence that should be remapped
|
| options/nixos/services.matrix-synapse.settings.trusted_key_servers.*.server_name | Hostname of the trusted server.
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.storage.path | Absolute path of the salt on the unencrypted device with
that device's root directory as "/".
|
| options/nixos/services.canaille.settings.SECRET_KEY | Flask Secret Key
|
| options/nixos/services.druid.overlord.config | (key=value) Configuration to be written to runtime.properties of the druid Druid Overlord
https://druid.apache.org/docs/latest/configuration/index.html
|
| options/nixos/services.athens.storage.gcp.jsonKey | Base64 encoded GCP service account key
|
| options/nixos/security.dhparams.params.<name>.bits | The bit size for the prime that is used during a Diffie-Hellman
key exchange.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Label | This required key uniquely identifies the job to launchd.
|
| options/nixos/services.sharkey.setupPostgresql | Whether to automatically set up a local PostgreSQL database and configure Sharkey to use it.
|
| options/nixos/services.matrix-continuwuity.settings.global.trusted_servers | Servers listed here will be used to gather public keys of other servers
(notary trusted key servers)
|
| options/nixos/services.postfix.settings.master.<name>.name | The name of the service to run
|
| options/nixos/services.zitadel.settings.TLS.Key | The TLS certificate private key, as a base64-encoded string
|
| options/nixos/services.matrix-synapse.settings.tls_private_key_path | PEM encoded private key for TLS
|
| options/nixos/programs.yubikey-touch-detector.unixSocket | If set to true, yubikey-touch-detector will send notifications to a unix socket
|
| options/home-manager/services.gnome-keyring.components | The GNOME keyring components to start
|
| options/nixos/boot.initrd.luks.devices.<name>.fido2.gracePeriod | Time in seconds to wait for the FIDO2 key.
|
| options/nixos/services.quicktun.<name>.publicKey | Remote public key in hexadecimal form.
Not needed when services.quicktun..protocol is set to raw.
|
| options/home-manager/programs.feh.keybindings | Override feh's default keybindings
|
| options/nixos/services.zammad.database.settings | The database.yml configuration file as key value set
|
| options/home-manager/targets.darwin.keybindings | This will configure the default keybindings for text fields in macOS
applications
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| options/nixos/services.agorakit.appKeyFile | A file containing the Laravel APP_KEY - a 32 character long,
base64 encoded key used for encryption where needed
|
| options/nixos/services.athens.storage.s3.secret | Secret key for the S3 storage backend
|
| options/nixos/services.moodle.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| options/nixos/services.nagios.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| options/nixos/services.shellhub-agent.privateKey | Location where to store the ShellHub Agent private
key.
|
| options/home-manager/wayland.windowManager.sway.config.right | Home row direction key for moving right.
|
| options/nixos/services.nextcloud.config.objectstore.s3.sseCKeyFile | If provided this is the full path to a file that contains the key
to enable [server-side encryption with customer-provided keys][1]
(SSE-C)
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.root | Root directory for requests.
|
| options/nixos/services.keycloak.database.name | Database name to use when connecting to an external or
manually provisioned database; has no effect when a local
database is automatically provisioned
|
| options/nixos/programs.ssh.hostKeyAlgorithms | Specifies the host key algorithms that the client wants to use in order of preference.
|
| options/nixos/services.dovecot2.sieve.scripts | Sieve scripts to be executed
|
| options/nixos/services.oauth2-proxy.signatureKey | GAP-Signature request signature key.
|
| options/nixos/services.peering-manager.secretKeyFile | Path to a file containing the secret key.
|
| options/nixos/services.keycloak.database.host | Hostname of the database to connect to
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/home-manager/launchd.agents.<name>.config.ProcessType | This optional key describes, at a high level, the intended purpose of the job
|
| options/nixos/services.misskey.database.passwordFile | The path to a file containing the database password
|
| options/home-manager/wayland.windowManager.sway.config.bindkeysToCode | Whether to make use of --to-code in keybindings.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.listen.*.proxyProtocol | Enable PROXY protocol.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.alias | Alias directory for requests.
|
| options/nixos/services.postfix.masterConfig.<name>.name | The name of the service to run
|
| options/nixos/services.dkimproxy-out.enable | Whether to enable dkimproxy_out
|
| options/nixos/services.tahoe.nodes.<name>.sftpd.hostPublicKeyFile | Path to the SSH host public key.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Nice | This optional key specifies what nice(3) value should be applied to the daemon.
|
| options/home-manager/programs.zsh.siteFunctions | Functions that are added to the Zsh environment and are subject to
autoloading
|
| options/nixos/services.komodo-periphery.passkeys | Passkeys required to access the periphery API
|
| options/nixos/services.misskey.reverseProxy.webserver.caddy.listenAddresses | A list of host interfaces to bind to for this virtual host.
|
| options/nixos/services.rosenpass.settings.peers.*.peer | WireGuard public key corresponding to the remote Rosenpass peer.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| options/nixos/services.keycloak.database.caCert | The SSL / TLS CA certificate that verifies the identity of the
database server
|
| options/nixos/services.httpd.virtualHosts.<name>.sslServerKey | Path to server SSL certificate key.
|
| options/nixos/services.druid.middleManager.config | (key=value) Configuration to be written to runtime.properties of the druid Druid middleManager
https://druid.apache.org/docs/latest/configuration/index.html
|
| options/darwin/launchd.agents.<name>.serviceConfig.Debug | This optional key specifies that launchd should adjust its log mask temporarily to LOG_DEBUG while
dealing with this job.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Nice | This optional key specifies what nice(3) value should be applied to the daemon.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Label | This required key uniquely identifies the job to launchd.
|
| options/home-manager/launchd.agents.<name>.config.LimitLoadToHosts | This configuration file only applies to the hosts listed with this key
|
| options/nixos/services.evremap.settings.remap.*.output | The key sequence that should be output when the input sequence is entered
|
| options/home-manager/services.hyprsunset.settings | Hyprsunset configuration written in Nix
|
| options/nixos/services.wastebin.settings.RUST_LOG | Influences logging
|
| options/nixos/services.kanata.keyboards.<name>.devices | Paths to keyboard devices
|
| options/nixos/services.buildkite-agents | Attribute set of buildkite agents
|
| options/nixos/services.dolibarr.h2o.tls.identity | Key / certificate pairs for the virtual host.
|
| options/nixos/security.pam.ussh.enable | Enables Uber's USSH PAM (pam-ussh) module
|
| options/nixos/services.outline.storage.secretKeyFile | File path that contains the S3 secret key.
|
| options/nixos/services.sogo.configReplaces | Replacement-filepath mapping for sogo.conf
|
| options/nixos/services.ncps.cache.storage.s3.accessKeyIdPath | The path to a file containing only the access-key-id.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Label | This required key uniquely identifies the job to launchd.
|
| options/darwin/services.buildkite-agents | Attribute set of buildkite agents
|
| options/darwin/launchd.agents.<name>.serviceConfig.RunAtLoad | This optional key is used to control whether your job is launched once at the time the job is loaded
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.kanata.keyboards.<name>.extraDefCfg | Configuration of defcfg other than linux-dev (generated
from the devices option) and
linux-continue-if-no-devs-found (hardcoded to be yes)
|
| options/nixos/services.logind.hibernateKeyLongPress | Specifies what to do when the hibernate key is long-pressed.
|
| options/nixos/services.bookstack.appKeyFile | A file containing the Laravel APP_KEY - a 32 character long,
base64 encoded key used for encryption where needed
|
| options/nixos/programs.i3lock.u2fSupport | Whether to enable U2F support in the i3lock program
|
| options/nixos/services.ddclient.passwordFile | A file containing the password or a TSIG key in named format when using the nsupdate protocol.
|
| options/nixos/services.cachix-watch-store.signingKeyFile | Optional file containing a self-managed signing key to sign uploaded store paths.
|
| options/darwin/system.defaults.dock.slow-motion-allowed | Allow for slow-motion minimize effect while holding Shift key
|
| options/nixos/services.rustus.storage.s3_access_key_file | File path that contains the S3 access key.
|
| options/nixos/services.rustus.storage.s3_secret_key_file | File path that contains the S3 secret key.
|
| options/nixos/services.misskey.database.createLocally | Create the PostgreSQL database locally
|
| options/nixos/services.snapserver.streams.<name>.query | Key-value pairs that convey additional parameters about a stream.
|
| options/nixos/services.keycloak.sslCertificate | The path to a PEM formatted certificate to use for TLS/SSL
connections.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.ah_proposals | AH proposals to offer for the CHILD_SA
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.listenAddresses | Listen addresses for this virtual host
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.sslCertificate | Path to server SSL certificate.
|
| options/nixos/services.traccar.settings | config.xml configuration as a Nix attribute set
|
| options/nixos/security.pam.services.<name>.rssh | If set, the calling user's SSH agent is used to authenticate
against the configured keys
|
| options/nixos/services.soju.tlsCertificateKey | Path to server TLS certificate key.
|
| options/nixos/services.tailscale.authKeyFile | A file containing the auth key
|
| options/home-manager/launchd.agents.<name>.config.LimitLoadFromHosts | This configuration file only applies to hosts NOT listed with this key
|
| options/home-manager/launchd.agents.<name>.config.LowPriorityIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O.
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.iterationStep | How much the iteration count for PBKDF2 is increased at each successful authentication.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| options/nixos/services.athens.storage.minio.secret | Secret key for the minio storage backend
|
| options/nixos/services.radicle.privateKeyFile | Absolute file path to an SSH private key,
usually generated by rad auth
|
| options/nixos/services.ncps.cache.storage.s3.forcePathStyle | Force path-style S3 addressing (bucket/key vs key.bucket).
|
| options/nixos/services.syncoid.commands.<name>.sshKey | SSH private key file to use to login to the remote system
|
| options/nixos/services.tahoe.nodes.<name>.sftpd.hostPrivateKeyFile | Path to the SSH host private key.
|
| options/home-manager/programs.tmate.rsaFingerprint | Tmate server RSA key fingerprint.
|
| options/home-manager/launchd.agents.<name>.config.StandardInPath | This optional key specifies what file should be used for data being supplied to stdin when using
stdio(3).
|
| options/home-manager/programs.tmate.dsaFingerprint | Tmate server EdDSA key fingerprint.
|
| options/nixos/programs.tsmClient.servers | Server definitions ("stanzas")
for the client system-options file
|
| options/nixos/services.keycloak.settings.hostname-backchannel-dynamic | Enables dynamic resolving of backchannel URLs,
including hostname, scheme, port and context path
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/security.duosec.integrationKey | Integration key.
|
| options/nixos/services.lavalink.plugins.*.configName | The name of the plugin to use as the key for the plugin configuration.
|
| options/nixos/services.invidious.hmacKeyFile | A path to a file containing the hmac_key
|
| options/darwin/launchd.agents.<name>.serviceConfig.WatchPaths | This optional key causes the job to be started if any one of the listed paths are modified.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Debug | This optional key specifies that launchd should adjust its log mask temporarily to LOG_DEBUG while
dealing with this job.
|
| options/home-manager/launchd.agents.<name>.config.StandardOutPath | This optional key specifies what file should be used for data being sent to stdout when using stdio(3).
|
| options/home-manager/services.mpdris2.multimediaKeys | Whether to enable multimedia key support.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.storage.device | An unencrypted device that will temporarily be mounted in stage-1
|
| options/nixos/services.xserver.xkb.extraLayouts.<name>.typesFile | The path to the xkb types file
|
| options/nixos/services.duplicity.secretFile | Path of a file containing secrets (gpg passphrase, access key...) in
the format of EnvironmentFile as described by
systemd.exec(5)
|
| options/darwin/launchd.agents.<name>.serviceConfig.StartOnMount | This optional key causes the job to be started every time a filesystem is mounted.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.RunAtLoad | This optional key is used to control whether your job is launched once at the time the job is loaded
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Debug | This optional key specifies that launchd should adjust its log mask temporarily to LOG_DEBUG while
dealing with this job.
|
| options/home-manager/programs.wezterm.colorSchemes | Attribute set of additional color schemes to be written to
$XDG_CONFIG_HOME/wezterm/colors, where each key is
taken as the name of the corresponding color scheme
|
| options/home-manager/programs.termite.scrollOnKeystroke | Scroll to the bottom automatically when a key is pressed.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.userKnownHostsFile | Specifies one or more files to use for the user host key
database, separated by whitespace
|
| options/nixos/services.mastodon.vapidPublicKeyFile | Path to file containing the public key used for Web Push
Voluntary Application Server Identification
|
| options/darwin/launchd.agents.<name>.serviceConfig.ProcessType | This optional key describes, at a high level, the intended purpose of the job
|
| options/nixos/services.lasuite-docs.settings.DJANGO_SECRET_KEY_FILE | The path to the file containing Django's secret key
|
| options/nixos/services.lasuite-meet.settings.DJANGO_SECRET_KEY_FILE | The path to the file containing Django's secret key
|
| options/nixos/services.ncps.upstream.publicKeys | A list of public keys of upstream caches in the format
host[-[0-9]*]:public-key
|
| options/nixos/security.pam.services.<name>.u2fAuth | If set, users listed in
$XDG_CONFIG_HOME/Yubico/u2f_keys (or
$HOME/.config/Yubico/u2f_keys if XDG variable is
not set) are able to log in with the associated U2F key
|
| options/nixos/programs.less.clearDefaultCommands | Clear all default commands
|
| options/nixos/services.kubernetes.pki.genCfsslCACert | Whether to automatically generate cfssl CA certificate and key,
if they don't exist.
|
| options/darwin/services.synergy.client.tls.enable | Whether to enable Whether TLS encryption should be used
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.RunAtLoad | This optional key is used to control whether your job is launched once at the time the job is loaded
|
| options/home-manager/programs.neovim.generatedConfigs | Generated configurations with as key their language (set via type).
|
| options/home-manager/launchd.agents.<name>.config.WaitForDebugger | This optional key specifies that launchd should instruct the kernel to have the job wait for a debugger
to attach before any code in the job is executed.
|
| options/nixos/services.filebeat.settings | Configuration for filebeat
|
| options/nixos/programs.yubikey-touch-detector.libnotify | If set to true, yubikey-touch-detctor will send notifications using libnotify
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.listen.*.extraParameters | Extra parameters of this listen directive.
|
| options/nixos/services.kmonad.keyboards.<name>.defcfg.enable | Whether to enable automatic generation of the defcfg block
|
| options/nixos/services.dragonflydb.keysOutputLimit | Maximum number of returned keys in keys command.
keys is a dangerous command
|
| options/nixos/services.hqplayerd.licenseFile | Path to the HQPlayer license key file
|
| options/nixos/services.canaille.secretKeyFile | File containing the Flask secret key
|
| options/nixos/swapDevices.*.randomEncryption.source | Define the source of randomness to obtain a random key for encryption.
|
| options/nixos/systemd.repart.partitions | Specify partitions as a set of the names of the definition files as the
key and the partition configuration as its value
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Umask | This optional key specifies what value should be passed to umask(2) before running the job
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockNodeName | This optional key specifies the node to connect(2) or bind(2) to.
|
| options/home-manager/launchd.agents.<name>.config.RootDirectory | This optional key is used to specify a directory to chroot(2) to before running the job.
|
| options/home-manager/programs.alot.tags.<name>.translated | Fixed string representation for this tag
|
| options/nixos/services.keycloak.initialAdminPassword | Initial password set for the temporary admin user
|
| options/darwin/system.defaults.NSGlobalDomain."com.apple.keyboard.fnState" | Use F1, F2, etc. keys as standard function keys.
|
| options/nixos/services.mpd.settings | Configuration for MPD
|
| options/nixos/services.kanata.keyboards.<name>.configFile | The config file
|
| options/nixos/services.quicktun.<name>.privateKeyFile | Path to file containing local secret key in binary or hexadecimal form.
Not needed when services.quicktun..protocol is set to raw.
|
| options/home-manager/programs.taskwarrior.config | Key-value configuration written to
$XDG_CONFIG_HOME/task/taskrc.
|
| options/nixos/services.tor.client.onionServices.<name>.clientAuthorizations | Clients' authorizations for a v3 onion service,
as a list of files containing each one private key, in the format:
descriptor:x25519:<base32-private-key>
See torrc manual.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.ProcessType | This optional key describes, at a high level, the intended purpose of the job
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.ProcessType | This optional key describes, at a high level, the intended purpose of the job
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.drupal.sites.<name>.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| options/nixos/services.druid.historical.config | (key=value) Configuration to be written to runtime.properties of the druid Druid Historical
https://druid.apache.org/docs/latest/configuration/index.html
|
| options/nixos/services.nsd.remoteControl.controlKeyFile | Path to the client private key, which is used by nsd-control
but not by the server
|
| options/darwin/launchd.daemons.<name>.serviceConfig.WatchPaths | This optional key causes the job to be started if any one of the listed paths are modified.
|
| options/home-manager/launchd.agents.<name>.config.SessionCreate | This key specifies that the job should be spawned into a new security
audit session rather than the default session for the context is belongs
to
|
| options/home-manager/programs.zathura.mappings | Add :map mappings to zathura and make
them permanent
|
| options/home-manager/launchd.agents.<name>.config.StandardErrorPath | This optional key specifies what file should be used for data being sent to stderr when using stdio(3).
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.proposals | A proposal is a set of algorithms
|
| options/nixos/services.keycloak.database.createLocally | Whether a database should be automatically created on the
local host
|
| options/home-manager/programs.keychain.enableZshIntegration | Whether to enable Zsh integration.
|
| options/nixos/services.nextcloud-spreed-signaling.settings.sessions.hashkeyFile | The path to the file containing the value for sessions.hashkey
|
| options/nixos/services.discourse.mail.incoming.apiKeyFile | A file containing the Discourse API key used to add
posts and messages from mail
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/home-manager/programs.obsidian.defaultSettings.hotkeys | Hotkeys to configure
|
| options/nixos/security.pam.rssh.settings.auth_key_file | Path to file with trusted public keys in OpenSSH's authorized_keys format
|
| options/nixos/security.agnos.generateKeys.enable | Enable automatic generation of account keys
|
| options/nixos/services.forgejo.secrets | This is a small wrapper over systemd's LoadCredential
|
| options/nixos/services.ncps.cache.storage.s3.secretAccessKeyPath | The path to a file containing only the secret-access-key.
|
| options/nixos/services.quicktun.<name>.privateKey | Local secret key in hexadecimal form.
This option is deprecated
|
| options/nixos/services.snipe-it.config | Snipe-IT configuration options to set in the
.env file
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.WatchPaths | This optional key causes the job to be started if any one of the listed paths are modified.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.StartOnMount | This optional key causes the job to be started every time a filesystem is mounted.
|
| options/home-manager/wayland.windowManager.sway.config.modifier | Modifier key that is used for all default keybindings.
|
| options/home-manager/launchd.agents.<name>.config.LimitLoadToSessionType | This configuration file only applies to sessions of the type specified
|
| options/nixos/services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.secret_key | The AWS API key secret
|
| options/nixos/services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.access_key | The AWS API key id
|
| options/nixos/services.dsnet.settings | The settings to use for dsnet
|
| options/nixos/services.sharkey.environmentFiles | List of paths to files containing environment variables for Sharkey to use at runtime
|
| options/nixos/services.glusterfs.tlsSettings.tlsKeyPath | Path to the private key used for TLS.
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.ksk.postPublish | How long after deactivation to keep a key in the zone
|
| options/nixos/services.nsd.zones.<name>.dnssecPolicy.zsk.postPublish | How long after deactivation to keep a key in the zone
|
| options/nixos/services.netbird.clients.<name>.login.setupKeyFile | A Setup Key file path used for automated login of the machine.
|
| options/nixos/services.netbird.tunnels.<name>.login.setupKeyFile | A Setup Key file path used for automated login of the machine.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StartOnMount | This optional key causes the job to be started every time a filesystem is mounted.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.addKeysToAgent | When enabled, a private key that is used during authentication will be
added to ssh-agent if it is running (with confirmation enabled if
set to 'confirm')
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockPathName | This optional key implies SockFamily is set to "Unix"
|
| options/nixos/services.keycloak.database.username | Username to use when connecting to an external or manually
provisioned database; has no effect when a local database is
automatically provisioned
|
| options/home-manager/programs.keychain.enableBashIntegration | Whether to enable Bash integration.
|
| options/home-manager/programs.keychain.enableFishIntegration | Whether to enable Fish integration.
|
| options/nixos/services.xserver.xkb.extraLayouts.<name>.symbolsFile | The path to the xkb symbols file
|
| options/home-manager/wayland.windowManager.hyprland.settings | Hyprland configuration written in Nix
|
| options/nixos/services.hostapd.radios.<name>.settings | Extra configuration options to put at the end of global initialization, before defining BSSs
|
| options/nixos/services.evremap.settings.dual_role.*.input | The key that should be remapped
|
| options/nixos/services.keycloak.database.passwordFile | The path to a file containing the database password
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| options/nixos/services.stargazer.routes | Routes that Stargazer should server
|
| options/nixos/services.kubernetes.pki.genCfsslAPICerts | Whether to automatically generate cfssl API webserver TLS cert and key,
if they don't exist.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Umask | This optional key specifies what value should be passed to umask(2) before running the job
|
| options/home-manager/xsession.windowManager.i3.config.modifier | Modifier key that is used for all default keybindings.
|
| options/home-manager/programs.quickshell.configs | A set of configs to include in the quickshell config directory
|
| options/nixos/services.openssh.settings.KexAlgorithms | Allowed key exchange algorithms
Uses the lower bound recommended in both
https://stribika.github.io/2015/01/04/secure-secure-shell.html
and
https://infosec.mozilla.org/guidelines/openssh#modern-openssh-67
|
| options/nixos/services.akkoma.config.":web_push_encryption".":vapid_details".public_key | base64-encoded public ECDH key.
|
| options/nixos/services.canaille.jwtPrivateKeyFile | File containing the JWT private key
|
| options/nixos/services.dysnomia.containers | An attribute set in which each key represents a container and each value an attribute set providing its configuration properties
|
| options/nixos/services.arsenik.tap_timeout | The key must be pressed twice in XX ms to enable repetitions.
|
| options/nixos/services.kubernetes.kubelet.tlsKeyFile | File containing x509 private key matching tlsCertFile.
|
| options/nixos/services.hylafax.faxqConfig | Attribute set of lines for the global
faxq config file etc/config
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Umask | This optional key specifies what value should be passed to umask(2) before running the job
|
| options/home-manager/programs.kakoune.config.ui.useBuiltinKeyParser | Bypass ncurses key parser and use an internal one.
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockFamily | This optional key can be used to specifically request that "IPv4" or "IPv6" socket(s) be created.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| options/nixos/services.kmonad.keyboards.<name>.extraGroups | Extra permission groups to attach to the KMonad instance for
this keyboard
|
| options/nixos/services.davis.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.slskd.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.ntopng.enable | Enable ntopng, a high-speed web-based traffic analysis and flow
collection tool
|
| options/nixos/services.movim.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockPathMode | This optional key specifies the mode of the socket
|
| options/home-manager/programs.ssh.matchBlocks.<name>.kexAlgorithms | Specifies the available KEX (Key Exchange) algorithms.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.rekey_time | IKE rekeying refreshes key material using a Diffie-Hellman exchange, but
does not re-check associated credentials
|
| options/nixos/services.kmonad.keyboards.<name>.defcfg.allowCommands | Whether to enable keys to run shell commands.
|
| options/nixos/services.ncps.cache.upstream.publicKeys | A list of public keys of upstream caches in the format
host[-[0-9]*]:public-key
|
| options/nixos/services.snipe-it.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.pgmanage.tls | These options tell pgmanage where the TLS Certificate and Key files
reside
|
| options/nixos/systemd.sysupdate.transfers | Specify transfers as a set of the names of the transfer files as the
key and the configuration as its value
|
| options/darwin/launchd.agents.<name>.serviceConfig.LimitLoadToHosts | This configuration file only applies to the hosts listed with this key
|
| options/nixos/services.gitlab.secrets.dbFile | A file containing the secret used to encrypt variables in
the DB
|
| options/nixos/services.rss2email.config | The configuration to give rss2email
|
| options/nixos/services.hylafax.hfaxdConfig | Attribute set of lines for the global
hfaxd config file etc/hfaxd.conf
|
| options/nixos/services.openafsServer.enable | Whether to enable the OpenAFS server
|
| options/nixos/services.akkoma.config.":web_push_encryption".":vapid_details".private_key | base64-encoded private ECDH key
|
| options/nixos/services.fluidd.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.druid.coordinator.config | (key=value) Configuration to be written to runtime.properties of the druid Druid Coordinator
https://druid.apache.org/docs/latest/configuration/index.html
|
| options/nixos/services.gancio.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.akkoma.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.monica.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.peering-manager.peeringdbApiKeyFile | Path to a file containing the PeeringDB API key.
|
| options/nixos/services.matomo.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/darwin/launchd.agents.<name>.serviceConfig.LimitLoadFromHosts | This configuration file only applies to hosts NOT listed with this key
|
| options/darwin/launchd.agents.<name>.serviceConfig.LowPriorityIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O.
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.Bonjour | This optional key can be used to request that the service be registered with the
mDNSResponder(8)
|
| options/home-manager/programs.rclone.remotes.<name>.mounts | An attribute set mapping remote file paths to their corresponding mount
point configurations
|
| options/home-manager/programs.vscode.profiles.<name>.keybindings | Keybindings written to Visual Studio Code's
keybindings.json
|
| options/nixos/services.prometheus.exporters.keylight.port | Port to listen on.
|
| options/nixos/services.prometheus.exporters.opnsense.apiKeyFile | File containing the api key.
|
| options/nixos/services.gitlab.secrets.otpFile | A file containing the secret used to encrypt secrets for OTP
tokens
|
| options/nixos/services.syncoid.localTargetAllow | Permissions granted for the services.syncoid.user user
for local target datasets
|
| options/nixos/services.nghttpx.frontends.*.params.tls | Enable or disable TLS
|
| options/darwin/launchd.agents.<name>.serviceConfig.StandardInPath | This optional key specifies what file should be used for data being supplied to stdin when using
stdio(3).
|
| options/home-manager/launchd.agents.<name>.config.WorkingDirectory | This optional key is used to specify a directory to chdir(2) to before running the job.
|
| options/home-manager/services.podman.images.<name>.decryptionKeyFile | Path to key used for decryption of images.
|
| options/home-manager/launchd.agents.<name>.config.AbandonProcessGroup | When a job dies, launchd kills any remaining processes with the same process group ID as the job
|
| options/nixos/hardware.facter.detected.boot.keyboard.kernelModules | List of kernel modules to include in the initrd to support the keyboard.
|
| options/nixos/services.evdevremapkeys.enable | Whether to enable evdevremapkeys, a daemon to remap events on linux input devices.
|
| options/nixos/services.kmonad.keyboards.<name>.enableHardening | Whether to enable systemd hardening.
If KMonad is used to execute shell commands, hardening may make some of them fail.
|
| options/nixos/boot.loader.systemd-boot.extraEntries | Any additional entries you want added to the systemd-boot menu
|
| options/darwin/system.defaults.hitoolbox.AppleFnUsageType | Chooses what happens when you press the Fn key on the keyboard
|
| options/darwin/launchd.agents.<name>.serviceConfig.StandardOutPath | This optional key specifies what file should be used for data being sent to stdout when using stdio(3).
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LimitLoadToHosts | This configuration file only applies to the hosts listed with this key
|
| options/darwin/system.defaults.NSGlobalDomain.KeyRepeat | Apple menu > System Preferences > Keyboard
If you press and hold certain keyboard keys when in a text area, the key’s character begins to repeat
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockServiceName | This optional key specifies the service on the node to connect(2) or bind(2) to.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.misskey.meilisearch.createLocally | Create and use a local Meilisearch instance
|
| options/nixos/services.hercules-ci-agent.settings.labels | A key-value map of user data
|
| options/darwin/services.hercules-ci-agent.settings.labels | A key-value map of user data
|
| options/nixos/services.prometheus.exporters.ecoflow.ecoflowDevicesPrettyNamesFile | File must contain one line, example: {"R3300000":"Delta 2","R3400000":"Delta Pro",...}
The key/value map of custom names for your devices
|
| options/nixos/services.gitlab.extraConfig | Extra options to be added under
production in
config/gitlab.yml, as a nix attribute
set
|
| options/nixos/services.monica.config | monica configuration options to set in the
.env file
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LimitLoadToHosts | This configuration file only applies to the hosts listed with this key
|
| options/home-manager/programs.keychain.enableNushellIntegration | Whether to enable Nushell integration.
|
| options/nixos/services.prometheus.exporters.keylight.user | User name under which the keylight exporter shall be run.
|
| options/nixos/services.limesurvey.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| options/nixos/services.etesync-dav.sslCertificateKey | Path to server SSL certificate key
|
| options/nixos/services.tailscale.authKeyParameters | Extra parameters to pass after the auth key
|
| options/darwin/launchd.agents.<name>.serviceConfig.WaitForDebugger | This optional key specifies that launchd should instruct the kernel to have the job wait for a debugger
to attach before any code in the job is executed.
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SockPassive | This optional key specifies whether listen(2) or connect(2) should be called on the created file
descriptor
|
| options/nixos/services.parsedmarc.settings | Configuration parameters to set in
parsedmarc.ini
|
| options/nixos/services.cloud-init.enable | Enable the cloud-init service
|
| options/nixos/services.arsenik.hold_timeout | The key must be held XX ms to become a layer shift.
|
| options/nixos/services.kasmweb.sslCertificateKey | The SSL certificate's key to be used for kasmweb
|
| options/nixos/services.mediawiki.httpd.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LimitLoadFromHosts | This configuration file only applies to hosts NOT listed with this key
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockNodeName | This optional key specifies the node to connect(2) or bind(2) to.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LowPriorityIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O.
|
| options/darwin/launchd.agents.<name>.serviceConfig.RootDirectory | This optional key is used to specify a directory to chroot(2) to before running the job.
|
| options/home-manager/programs.git.maintenance.timers | Systemd timers to create for scheduled git maintenance
|
| options/nixos/services.prometheus.exporters.keylight.group | Group under which the keylight exporter shall be run.
|
| options/nixos/security.pam.u2f.enable | Enables U2F PAM (pam-u2f) module
|
| options/nixos/services.cjdns.ETHInterface.connectTo.<name>.publicKey | Public key at the opposite end of the tunnel.
|
| options/nixos/services.cjdns.UDPInterface.connectTo.<name>.publicKey | Public key at the opposite end of the tunnel.
|
| options/nixos/services.readeck.environmentFile | File containing environment variables to be passed to Readeck
|
| options/darwin/launchd.daemons.<name>.serviceConfig.StandardInPath | This optional key specifies what file should be used for data being supplied to stdin when using
stdio(3).
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LowPriorityIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LimitLoadFromHosts | This configuration file only applies to hosts NOT listed with this key
|
| options/home-manager/launchd.agents.<name>.config.StartInterval | This optional key causes the job to be started every N seconds
|
| options/nixos/services.chatgpt-retrieval-plugin.openaiApiKeyPath | Path to the secret openai api key used for embeddings.
|
| options/nixos/services.triggerhappy.bindings | Key bindings for triggerhappy.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StandardInPath | This optional key specifies what file should be used for data being supplied to stdin when using
stdio(3).
|
| options/darwin/services.offlineimap.startInterval | Optional key to start offlineimap services each N seconds
|
| options/darwin/launchd.agents.<name>.serviceConfig.SessionCreate | This key specifies that the job should be spawned into a new security
audit session rather than the default session for the context is belongs
to
|
| options/darwin/launchd.agents.<name>.serviceConfig.StandardErrorPath | This optional key specifies what file should be used for data being sent to stderr when using stdio(3).
|
| options/darwin/launchd.daemons.<name>.serviceConfig.StandardOutPath | This optional key specifies what file should be used for data being sent to stdout when using stdio(3).
|
| options/home-manager/programs.atuin.enableFishIntegration | Whether to enable Fish integration
|
| options/home-manager/programs.atuin.enableZshIntegration | Whether to enable Zsh integration
|
| options/nixos/services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.headscale.settings.oidc.pkce.enabled | Enable or disable PKCE (Proof Key for Code Exchange) support
|
| options/nixos/services.geoipupdate.settings.LicenseKey | A file containing the MaxMind license key
|
| options/home-manager/programs.keychain.enableXsessionIntegration | Whether to run keychain from your ~/.xsession.
|
| options/nixos/services.healthchecks.settings.SECRET_KEY_FILE | Path to a file containing the secret key.
|
| options/nixos/services.canaille.settings.CANAILLE_OIDC.JWT.PRIVATE_KEY | JWT private key
|
| options/nixos/services.gitlab.secrets.secretFile | A file containing the secret used to encrypt variables in
the DB
|
| options/nixos/services.networking.websockify.sslKey | Path to the SSL key.
|
| options/darwin/launchd.agents.<name>.serviceConfig.LimitLoadToSessionType | This configuration file only applies to sessions of the type specified
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StandardOutPath | This optional key specifies what file should be used for data being sent to stdout when using stdio(3).
|
| options/nixos/services.prometheus.exporters.keylight.enable | Whether to enable the prometheus keylight exporter.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockPathName | This optional key implies SockFamily is set to "Unix"
|
| options/darwin/launchd.daemons.<name>.serviceConfig.WaitForDebugger | This optional key specifies that launchd should instruct the kernel to have the job wait for a debugger
to attach before any code in the job is executed.
|
| options/home-manager/programs.qutebrowser.greasemonkey | Greasemonkey userscripts to add to qutebrowser's greasemonkey
directory.
|
| options/home-manager/xsession.windowManager.herbstluftwm.keybinds | Herbstluftwm keybinds.
|
| options/nixos/services.hylafax.modems.<name>.config | Attribute set of values for the given modem
|
| options/darwin/launchd.daemons.<name>.serviceConfig.RootDirectory | This optional key is used to specify a directory to chroot(2) to before running the job.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.WaitForDebugger | This optional key specifies that launchd should instruct the kernel to have the job wait for a debugger
to attach before any code in the job is executed.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockNodeName | This optional key specifies the node to connect(2) or bind(2) to.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rekey_time | Time to schedule CHILD_SA rekeying
|
| options/nixos/services.librenms.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.agorakit.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.kanboard.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.fediwall.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.dolibarr.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.mainsail.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.pixelfed.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.n8n.environment.N8N_USER_FOLDER | Provide the path where n8n will create the .n8n folder
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockFamily | This optional key can be used to specifically request that "IPv4" or "IPv6" socket(s) be created.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockNodeName | This optional key specifies the node to connect(2) or bind(2) to.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.RootDirectory | This optional key is used to specify a directory to chroot(2) to before running the job.
|
| options/nixos/services.geoipupdate.settings | geoipupdate configuration options
|
| options/nixos/services.discourse.sslCertificateKey | The path to the server SSL certificate key
|
| options/nixos/services.beszel.agent.environment | Environment variables for configuring the beszel-agent service
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockPathMode | This optional key specifies the mode of the socket
|
| options/darwin/launchd.daemons.<name>.serviceConfig.StandardErrorPath | This optional key specifies what file should be used for data being sent to stderr when using stdio(3).
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SessionCreate | This key specifies that the job should be spawned into a new security
audit session rather than the default session for the context is belongs
to
|
| options/nixos/services.prometheus.exporters.keylight.extraFlags | Extra commandline options to pass to the keylight exporter.
|
| options/nixos/services.bookstack.config | BookStack configuration options to set in the
.env file
|
| options/nixos/services.discourse.mail.contactEmailAddress | Email address of key contact responsible for this
site
|
| options/nixos/services.limesurvey.httpd.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LimitLoadToSessionType | This configuration file only applies to sessions of the type specified
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StandardErrorPath | This optional key specifies what file should be used for data being sent to stderr when using stdio(3).
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SessionCreate | This key specifies that the job should be spawned into a new security
audit session rather than the default session for the context is belongs
to
|
| options/nixos/services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.agorakit.config | Agorakit configuration options to set in the
.env file
|
| options/nixos/services.radicle.httpd.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockPathName | This optional key implies SockFamily is set to "Unix"
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LimitLoadToSessionType | This configuration file only applies to sessions of the type specified
|
| options/nixos/environment.wordlist.lists | A set with the key names being the environment variable you'd like to
set and the values being a list of paths to text documents containing
lists of words
|
| options/nixos/services.athens.storage.azureblob.accountKey | Account key for the Azure Blob storage backend
|
| options/nixos/services.zfs.autoReplication.identityFilePath | Path to SSH key used to login to host.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockPathName | This optional key implies SockFamily is set to "Unix"
|
| options/nixos/services.prometheus.exporters.exportarr-sonarr.apiKeyFile | File containing the api-key.
|
| options/nixos/services.prometheus.exporters.exportarr-lidarr.apiKeyFile | File containing the api-key.
|
| options/nixos/services.prometheus.exporters.exportarr-bazarr.apiKeyFile | File containing the api-key.
|
| options/nixos/services.prometheus.exporters.exportarr-radarr.apiKeyFile | File containing the api-key.
|
| options/home-manager/programs.obsidian.defaultSettings.hotkeys.<name>.*.modifiers | The hotkey modifiers.
|
| options/nixos/services.anuko-time-tracker.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.rmfakecloud.extraSettings | Extra settings in the form of a set of key-value pairs
|
| options/nixos/services.nginx.virtualHosts.<name>.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.hylafax.commonModemConfig | Attribute set of default values for
modem config files etc/config.*
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockFamily | This optional key can be used to specifically request that "IPv4" or "IPv6" socket(s) be created.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.Bonjour | This optional key can be used to request that the service be registered with the
mDNSResponder(8)
|
| options/darwin/networking.wg-quick.interfaces.<name>.peers.*.publicKey | The public key for this peer.
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.publicKey | The base64 public key to the peer.
|
| options/darwin/launchd.agents.<name>.serviceConfig.AbandonProcessGroup | When a job dies, launchd kills any remaining processes with the same process group ID as the job
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockFamily | This optional key can be used to specifically request that "IPv4" or "IPv6" socket(s) be created.
|
| options/darwin/launchd.agents.<name>.serviceConfig.WorkingDirectory | This optional key is used to specify a directory to chdir(2) to before running the job.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockPathMode | This optional key specifies the mode of the socket
|
| options/home-manager/launchd.agents.<name>.config.QueueDirectories | Much like the WatchPaths option, this key will watch the paths for modifications
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.SecureSocketWithKey | This optional key is a variant of SockPathName
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rekey_bytes | Number of bytes processed before initiating CHILD_SA rekeying
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.settings | Extra configuration options to put at the end of this BSS's defintion in the
hostapd.conf for the associated interface
|
| options/nixos/services.bookstack.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.wgautomesh.gossipSecretFile | File containing the gossip secret, a shared secret key to use for gossip
encryption
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockPathMode | This optional key specifies the mode of the socket
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockServiceName | This optional key specifies the service on the node to connect(2) or bind(2) to.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/darwin/networking.wg-quick.interfaces.<name>.privateKeyFile | Path to file containing this interface's private key.
|
| options/home-manager/wayland.windowManager.sway.config.floating.modifier | Modifier key or keys that can be used to drag floating windows.
|
| options/nixos/services.prometheus.exporters.exportarr-readarr.apiKeyFile | File containing the api-key.
|
| options/nixos/services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.exporters.keylight.listenAddress | Address to listen on.
|
| options/nixos/services.engelsystem.settings | Options to be added to config.php, as a nix attribute set
|
| options/nixos/networking.wg-quick.interfaces.<name>.privateKeyFile | Private key file as generated by wg genkey.
|
| options/nixos/networking.wireless.networks.<name>.psk | The network's pre-shared key in plaintext defaulting
to being a network without any authentication.
Be aware that this will be written to the Nix store
in plaintext! Use pskRaw with an external
reference to keep it safe.
Mutually exclusive with pskRaw.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SockPassive | This optional key specifies whether listen(2) or connect(2) should be called on the created file
descriptor
|
| options/home-manager/launchd.agents.<name>.config.LaunchEvents | Specifies higher-level event types to be used as launch-on-demand event
sources
|
| options/nixos/services.limesurvey.encryptionKeyFile | 32-byte key used to encrypt variables in the database
|
| options/nixos/services.rabbitmq.configItems | Configuration options in RabbitMQ's new config file format,
which is a simple key-value format that can not express nested
data structures
|
| options/nixos/services.znapzend.features.sendRaw | Whether to enable sendRaw feature which adds the options -w to the
zfs send command
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.Bonjour | This optional key can be used to request that the service be registered with the
mDNSResponder(8)
|
| options/home-manager/xsession.windowManager.i3.config.floating.modifier | Modifier key or keys that can be used to drag floating windows.
|
| options/nixos/services.prometheus.exporters.keylight.openFirewall | Open port in firewall for incoming connections.
|
| options/nixos/services.pocket-id.environmentFile | Path to an environment file to be loaded
|
| options/nixos/services.jirafeau.nginxConfig.sslCertificateKey | Path to server SSL certificate key.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.AbandonProcessGroup | When a job dies, launchd kills any remaining processes with the same process group ID as the job
|
| options/darwin/launchd.agents.<name>.serviceConfig.StartInterval | This optional key causes the job to be started every N seconds
|
| options/darwin/launchd.daemons.<name>.serviceConfig.WorkingDirectory | This optional key is used to specify a directory to chdir(2) to before running the job.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.Bonjour | This optional key can be used to request that the service be registered with the
mDNSResponder(8)
|
| options/nixos/services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.access_key | Access key to use. https://console.scaleway.com/project/credentials
|
| options/nixos/services.your_spotify.spotifySecretFile | A file containing the secret key of your Spotify application
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockServiceName | This optional key specifies the service on the node to connect(2) or bind(2) to.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.AbandonProcessGroup | When a job dies, launchd kills any remaining processes with the same process group ID as the job
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.WorkingDirectory | This optional key is used to specify a directory to chdir(2) to before running the job.
|
| options/nixos/boot.loader.systemd-boot.rebootForBitlocker | Enable EXPERIMENTAL BitLocker support
|
| options/nixos/services.privoxy.inspectHttps | Whether to configure Privoxy to inspect HTTPS requests, meaning all
encrypted traffic will be filtered as well
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.sslCertificateKey | Path to server SSL certificate key.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockServiceName | This optional key specifies the service on the node to connect(2) or bind(2) to.
|
| options/home-manager/targets.darwin.defaults.NSGlobalDomain.ApplePressAndHoldEnabled | Repeat a key when it is held down (false) or display the accented character selector (true)
|
| options/nixos/services.prometheus.exporters.exportarr-prowlarr.apiKeyFile | File containing the api-key.
|
| options/nixos/services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.secret_key | Secret key to use when listing targets. https://console.scaleway.com/project/credentials
It is mutually exclusive with secret_key_file.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockPassive | This optional key specifies whether listen(2) or connect(2) should be called on the created file
descriptor
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.authCert | Either a path to a certificate with a client certificate and
the key or a list of paths to the files with them.
|
| options/nixos/services.invoiceplane.sites.<name>.cron.enable | Enable cron service which periodically runs Invoiceplane tasks
|
| options/nixos/services.gitlab.workhorse.config | Configuration options to add to Workhorse's configuration
file
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockPassive | This optional key specifies whether listen(2) or connect(2) should be called on the created file
descriptor
|
| options/home-manager/launchd.agents.<name>.config.LowPriorityBackgroundIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O when the process is throttled with the Darwin-background classification.
|
| options/home-manager/programs.qutebrowser.enableDefaultBindings | Disable to prevent loading default key bindings.
|
| options/nixos/services.prometheus.exporters.keylight.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.keylight.openFirewall is true.
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.foundationdb.locality.zoneId | Zone identifier key
|
| options/darwin/launchd.daemons.<name>.serviceConfig.StartInterval | This optional key causes the job to be started every N seconds
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rekey_packets | Number of packets processed before initiating CHILD_SA rekeying
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.token | Definition for a private key that's stored on a token/smartcard/TPM.
|
| options/nixos/services.mautrix-signal.environmentFile | File containing environment variables to be passed to the mautrix-signal service
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StartInterval | This optional key causes the job to be started every N seconds
|
| options/nixos/services.borgbackup.jobs.<name>.environment | Environment variables passed to the backup script
|
| options/nixos/services.syncoid.commands.<name>.localTargetAllow | Permissions granted for the services.syncoid.user user
for local target datasets
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ppk | Postquantum Preshared Key (PPK) section for a specific secret
|
| options/home-manager/launchd.agents.<name>.config.ThrottleInterval | This key lets one override the default throttling policy imposed on jobs by launchd
|
| options/home-manager/launchd.agents.<name>.config.inetdCompatibility | The presence of this key specifies that the daemon expects to be run as if it were launched from inetd.
|
| options/nixos/services.mosquitto.listeners.*.authPlugins.*.options | Options for the auth plugin
|
| options/nixos/services.kubernetes.controllerManager.tlsKeyFile | Kubernetes controller-manager private key file.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.authCert | Either a path to a certificate with a client certificate and
the key or a list of paths to the files with them.
|
| options/nixos/services.foundationdb.locality.dataHall | Data hall identifier key
|
| options/home-manager/launchd.agents.<name>.config.EnvironmentVariables | This optional key is used to specify additional environment variables to be set before running the
job.
|
| options/nixos/swapDevices.*.randomEncryption | Encrypt swap device with a random key
|
| options/darwin/launchd.agents.<name>.serviceConfig.QueueDirectories | Much like the WatchPaths option, this key will watch the paths for modifications
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.SecureSocketWithKey | This optional key is a variant of SockPathName
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.fedimintd.<name>.nginx.config.sslCertificateKey | Path to server SSL certificate key.
|
| options/home-manager/launchd.agents.<name>.config.KeepAlive | This optional key is used to control whether your job is to be kept continuously running or to let
demand and conditions control the invocation
|
| options/nixos/services.prometheus.exporters.keylight.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.keylight.openFirewall
is true
|
| options/nixos/services.matrix-appservice-irc.settings.ircService.mediaProxy.signingKeyPath | Path to the signing key file for authenticated media.
|
| options/nixos/services.beesd.filesystems.<name>.spec | Description of how to identify the filesystem to be duplicated by this
instance of bees
|
| options/nixos/services.coturn.use-auth-secret | TURN REST API flag
|
| options/nixos/services.step-ca.intermediatePasswordFile | Path to the file containing the password for the intermediate
certificate private key.
Make sure to use a quoted absolute path instead of a path literal
to prevent it from being copied to the globally readable Nix
store.
|
| options/darwin/launchd.agents.<name>.serviceConfig.LaunchEvents | Specifies higher-level event types to be used as launch-on-demand event
sources
|
| options/nixos/boot.zfs.requestEncryptionCredentials | If true on import encryption keys or passwords for all encrypted datasets
are requested
|
| options/nixos/services.cadvisor.storageDriverPasswordFile | File that contains the cadvisor storage driver password.
storageDriverPasswordFile takes precedence over storageDriverPassword
Warning: when storageDriverPassword is non-empty this defaults to a file in the
world-readable Nix store that contains the value of storageDriverPassword
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.publicKey | The base64 public key of the peer.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.rsa.<name>.secret | Value of decryption passphrase for RSA key.
|
| options/nixos/swapDevices.*.randomEncryption.enable | Encrypt swap device with a random key
|
| options/darwin/launchd.daemons.<name>.serviceConfig.QueueDirectories | Much like the WatchPaths option, this key will watch the paths for modifications
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SecureSocketWithKey | This optional key is a variant of SockPathName
|
| options/nixos/services.mautrix-whatsapp.environmentFile | File containing environment variables to be passed to the mautrix-whatsapp service
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.QueueDirectories | Much like the WatchPaths option, this key will watch the paths for modifications
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SecureSocketWithKey | This optional key is a variant of SockPathName
|
| options/nixos/services.foundationdb.locality.machineId | Machine identifier key
|
| options/nixos/services.borgbackup.repos.<name>.authorizedKeys | Public SSH keys that are given full write access to this repository
|
| options/nixos/networking.wireguard.interfaces.<name>.privateKeyFile | Private key file as generated by wg genkey.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LaunchEvents | Specifies higher-level event types to be used as launch-on-demand event
sources
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.MulticastGroup | This optional key can be used to request that the datagram socket join a multicast group
|
| options/home-manager/programs.gnome-terminal.profile.<name>.deleteBinding | Which string the terminal should send to an application when the user
presses the Delete key.
auto
: Send the @7 control sequence.
ascii-backspace
: Send an ASCII backspace character (0x08).
ascii-delete
: Send an ASCII delete character (0x7F).
delete-sequence
: Send the @7 control sequence.
tty
: Send terminal's "erase" setting.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LaunchEvents | Specifies higher-level event types to be used as launch-on-demand event
sources
|
| options/darwin/launchd.agents.<name>.serviceConfig.LowPriorityBackgroundIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O when the process is throttled with the Darwin-background classification.
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.token.<name>.pin | Optional PIN required to access the key on the token
|
| options/nixos/services.outline.slackAuthentication.clientId | Authentication key.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ecdsa.<name>.secret | Value of decryption passphrase for ECDSA key.
|
| options/darwin/networking.wg-quick.interfaces.<name>.peers.*.presharedKeyFile | Optional, path to file containing the pre-shared key for this peer.
|
| options/nixos/networking.wg-quick.interfaces.<name>.generatePrivateKeyFile | Automatically generate a private key with
wg genkey, at the privateKeyFile location.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs8.<name>.secret | Value of decryption passphrase for PKCS#8 key.
|
| options/nixos/services.prometheus.exporters.postgres.dataSourceName | Accepts PostgreSQL URI form and key=value form arguments.
|
| options/nixos/services.authelia.instances.<name>.secrets.oidcIssuerPrivateKeyFile | Path to your private key file used to encrypt OIDC JWTs.
|
| options/darwin/launchd.agents.<name>.serviceConfig.ThrottleInterval | This key lets one override the default throttling policy imposed on jobs by launchd
|
| options/darwin/launchd.agents.<name>.serviceConfig.inetdCompatibility | The presence of this key specifies that the daemon expects to be run as if it were launched from inetd.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.token.<name>.handle | Hex-encoded CKA_ID or handle of the private key on the token or TPM,
respectively.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LowPriorityBackgroundIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O when the process is throttled with the Darwin-background classification.
|
| options/nixos/services.veilid.settings.core.network.routing_table.node_id | Base64-encoded public key for the node, used as the node's ID.
|
| options/nixos/services.limesurvey.nginx.virtualHost.sslCertificateKey | Path to server SSL certificate key.
|
| options/nixos/services.neo4j.ssl.policies.<name>.allowKeyGeneration | Allows the generation of a private key and associated self-signed
certificate
|
| options/darwin/launchd.agents.<name>.serviceConfig.EnvironmentVariables | This optional key is used to specify additional environment variables to be set before running the
job.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LowPriorityBackgroundIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O when the process is throttled with the Darwin-background classification.
|
| options/nixos/services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.secret_key_file | Sets the secret key with the credentials read from the configured file
|
| options/nixos/networking.openconnect.interfaces.<name>.privateKey | Private key to authenticate with.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.ThrottleInterval | This key lets one override the default throttling policy imposed on jobs by launchd
|
| options/darwin/launchd.daemons.<name>.serviceConfig.inetdCompatibility | The presence of this key specifies that the daemon expects to be run as if it were launched from inetd.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.inetdCompatibility | The presence of this key specifies that the daemon expects to be run as if it were launched from inetd.
|
| options/darwin/launchd.agents.<name>.serviceConfig.KeepAlive | This optional key is used to control whether your job is to be kept continuously running or to let
demand and conditions control the invocation
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.ThrottleInterval | This key lets one override the default throttling policy imposed on jobs by launchd
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.private.<name>.secret | Value of decryption passphrase for private key.
|
| options/nixos/services.matrix-appservice-irc.passwordEncryptionKeyLength | Length of the key to encrypt IRC passwords with
|
| options/darwin/launchd.daemons.<name>.serviceConfig.EnvironmentVariables | This optional key is used to specify additional environment variables to be set before running the
job.
|
| options/nixos/services.discourse.siteSettings | Discourse site settings
|
| options/nixos/services.netbird.clients.<name>.login.systemdDependencies | Additional systemd dependencies required to succeed before the Setup Key file becomes available.
|
| options/nixos/services.netbird.tunnels.<name>.login.systemdDependencies | Additional systemd dependencies required to succeed before the Setup Key file becomes available.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.EnvironmentVariables | This optional key is used to specify additional environment variables to be set before running the
job.
|
| options/nixos/services.yggdrasil.persistentKeys | Whether to enable automatic generation and persistence of keys
|
| options/nixos/services.prometheus.exporters.klipper.moonrakerApiKey | API Key to authenticate with the Moonraker APIs
|
| options/darwin/launchd.daemons.<name>.serviceConfig.KeepAlive | This optional key is used to control whether your job is to be kept continuously running or to let
demand and conditions control the invocation
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.KeepAlive | This optional key is used to control whether your job is to be kept continuously running or to let
demand and conditions control the invocation
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.MulticastGroup | This optional key can be used to request that the datagram socket join a multicast group
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.foundationdb.locality.datacenterId | Data center identifier key
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.MulticastGroup | This optional key can be used to request that the datagram socket join a multicast group
|
| options/home-manager/programs.gnome-terminal.profile.<name>.backspaceBinding | Which string the terminal should send to an application when the user
presses the Backspace key.
auto
: Attempt to determine the right value from the terminal's IO settings.
ascii-backspace
: Send an ASCII backspace character (0x08).
ascii-delete
: Send an ASCII delete character (0x7F).
delete-sequence
: Send the @7 control sequence.
tty
: Send terminal's "erase" setting.
|
| options/nixos/services.matrix-appservice-irc.settings.ircService.passwordEncryptionKeyPath | Location of the key with which IRC passwords are encrypted
for storage
|
| options/nixos/services.authelia.instances.<name>.secrets.storageEncryptionKeyFile | Path to your storage encryption key.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.MulticastGroup | This optional key can be used to request that the datagram socket join a multicast group
|
| options/home-manager/programs.ripgrep-all.custom_adapters.*.version | The version identifier used to key cache entries; change if the configuration or program changes
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.pubkeys | List of raw public keys to accept for
authentication
|
| options/nixos/networking.wireguard.interfaces.<name>.generatePrivateKeyFile | Automatically generate a private key with
wg genkey, at the privateKeyFile location.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.ppk_id | String identifying the Postquantum Preshared Key (PPK) to be used.
|
| options/home-manager/launchd.agents.<name>.config.StartCalendarInterval | This optional key causes the job to be started every calendar interval as specified
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.kubernetes.controllerManager.serviceAccountKeyFile | Kubernetes controller manager PEM-encoded private RSA key file used to
sign service account tokens
|
| options/nixos/services.mastodon.activeRecordEncryptionPrimaryKeyFile | This key must be set to enable the Active Record Encryption feature within
Rails that Mastodon uses to encrypt and decrypt some database attributes
|
| options/nixos/services.cockroachdb.locality | An ordered, comma-separated list of key-value pairs that describe the
topography of the machine
|
| options/nixos/services.xserver.windowManager.xmonad.config | Configuration from which XMonad gets compiled
|
| options/darwin/system.defaults.universalaccess.closeViewScrollWheelToggle | Use scroll gesture with the Ctrl (^) modifier key to zoom
|
| options/nixos/networking.openconnect.interfaces.<name>.extraOptions | Extra config to be appended to the interface config
|
| options/darwin/launchd.agents.<name>.serviceConfig.StartCalendarInterval | This optional key causes the job to be started every calendar interval as specified
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.keyingtries | Number of retransmission sequences to perform during initial
connect
|
| options/darwin/launchd.daemons.<name>.serviceConfig.StartCalendarInterval | This optional key causes the job to be started every calendar interval as specified
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StartCalendarInterval | This optional key causes the job to be started every calendar interval as specified
|
| options/home-manager/targets.darwin.defaults."com.googlecode.iterm2".ExperimentalKeyHandling | Whether to enable experimental key handling for AquaSKK compatibility.
|
| options/nixos/services.mastodon.activeRecordEncryptionKeyDerivationSaltFile | This key must be set to enable the Active Record Encryption feature within
Rails that Mastodon uses to encrypt and decrypt some database attributes
|
| options/nixos/services.neo4j.directories.certificates | Directory for storing certificates to be used by Neo4j for
TLS connections
|
| options/nixos/services.journaldriver.applicationCredentials | Path to the service account private key (in JSON-format) used
to forward log entries to Stackdriver Logging on non-GCP
instances
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.ppk_required | Whether a Postquantum Preshared Key (PPK) is required for this connection
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.aggressive | Enables Aggressive Mode instead of Main Mode with Identity
Protection
|
| options/nixos/services.mastodon.activeRecordEncryptionDeterministicKeyFile | This key must be set to enable the Active Record Encryption feature within
Rails that Mastodon uses to encrypt and decrypt some database attributes
|
| options/nixos/services.akkoma.config.":web_push_encryption" | Web Push Notifications configuration
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.pk | If this attribute is given, SAE-PK will be enabled for this connection
|
| options/nixos/services.matrix-synapse.settings.tls_certificate_path | PEM encoded X509 certificate for TLS
|
| options/nixos/services.postfix.settings.main.smtpd_tls_chain_files | List of paths to the server private keys and certificates.
The order of items matters and a private key must always be followed by the corresponding certificate.
https://www.postfix.org/postconf.5.html#smtpd_tls_chain_files
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.send_certreq | Send certificate request payloads to offer trusted root CA certificates to
the peer
|
| options/nixos/services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.secret_key | The AWS API keys
|
| options/nixos/services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.access_key | The AWS API keys
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.wpaPassword | Sets the password for WPA-PSK that will be converted to the pre-shared key
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.childless | Use childless IKE_SA initiation (allow, prefer, force or never)
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.wpaPskFile | Sets the password(s) for WPA-PSK
|
| packages/nixpkgs/aesfix | Correct bit errors in an AES key schedules |
| packages/nixpkgs/dns-root-data | DNS root data including root hints and DNSSEC root trust anchor + key |
| packages/nixpkgs/e-imzo | For uzbek state web identity proving & key signing |
| packages/nixpkgs/sbctl | Secure Boot key manager |
| packages/nixpkgs/zenoh | Communication protocol that combines pub/sub with key value storage and computation |
| packages/nixpkgs/libdict | C library of key-value data structures |
| packages/nixpkgs/etcd | Distributed reliable key-value store for the most critical data of a distributed system |
| packages/nixpkgs/alp | Convenient authentication method that lets you use your android device as a key for your Linux machine |
| packages/nixpkgs/linux | The Linux kernel (with patches: bridge-stp-helper, request-key-helper) |
| packages/nixpkgs/tpm-luks | LUKS key storage in TPM NVRAM |
| packages/nixpkgs/xorex | XOR Key Extractor |
| packages/nixpkgs/skate | Personal multi-machine syncable key value store |
| packages/nixpkgs/linux-rt | The Linux kernel (with patches: rt, bridge-stp-helper, request-key-helper, export-rt-sched-migrate) |
| packages/nixpkgs/rana | Nostr public key mining tool |
| packages/nixpkgs/linux-libre | The Linux kernel (with patches: bridge-stp-helper, request-key-helper) |
| packages/nixpkgs/etcd_3_6 | Distributed reliable key-value store for the most critical data of a distributed system |
| packages/nixpkgs/nyan | Typesafe hierarchical key-value database |
| packages/nixpkgs/pykms | Windows KMS (Key Management Service) server written in Python |
| packages/nixpkgs/badger | Fast key-value DB in Go |
| packages/nixpkgs/ares-rs | Automated decoding of encrypted text without knowing the key or ciphers used |
| packages/nixpkgs/ssh-tpm-agent | SSH agent with support for TPM sealed keys for public key authentication |
| packages/nixpkgs/etcd_3_5 | Distributed reliable key-value store for the most critical data of a distributed system |
| packages/nixpkgs/felix-fm | Tui file manager with vim-like key mapping |
| packages/nixpkgs/mantra | Tool used to hunt down API key leaks in JS files and pages |
| packages/nixpkgs/pkarr | Public Key Addressable Resource Records (sovereign TLDs) |
| packages/nixpkgs/xremap | Key remapper for X11 and Wayland (wlroots support) |
| packages/nixpkgs/nasty | Recover the passphrase of your PGP or GPG-key |
| packages/nixpkgs/immudb | Immutable database based on zero trust, SQL and Key-Value, tamperproof, data change history |
| packages/nixpkgs/rdedup | Data deduplication with compression and public key encryption |
| packages/nixpkgs/arangodb | Native multi-model database with flexible data models for documents, graphs, and key-values |
| packages/nixpkgs/etcd_3_4 | Distributed reliable key-value store for the most critical data of a distributed system |
| packages/nixpkgs/vault-ssh-plus | Automatically use HashiCorp Vault SSH Client Key Signing with ssh(1) |
| packages/nixpkgs/vertcoin | Digital currency with mining decentralisation and ASIC resistance as a key focus |
| packages/nixpkgs/vertcoind | Digital currency with mining decentralisation and ASIC resistance as a key focus |
| packages/nixpkgs/linux-rt_latest | The Linux kernel (with patches: rt, bridge-stp-helper, request-key-helper, export-rt-sched-migrate) |
| packages/nixpkgs/ssh-import-id | Retrieves an SSH public key and installs it locally |
| packages/nixpkgs/config-store | Simple key-value store designed to be used from shell scripts written in Rust |
| packages/nixpkgs/amber-secret | Manage secret values in-repo via public key cryptography |
| packages/nixpkgs/sorted-grep | Sgrep (sorted grep) searches sorted input files for lines that match a search key |
| packages/nixpkgs/sbsigntool | Tools for maintaining UEFI signature databases |
| packages/nixpkgs/libreswan | Free software implementation of the VPN protocol based on IPSec and the Internet Key Exchange |
| packages/nixpkgs/sh4d0wup | Signing-key abuse and update exploitation framework |
| packages/nixpkgs/linux_latest | The Linux kernel (with patches: bridge-stp-helper, request-key-helper) |
| packages/nixpkgs/gdbm | GNU dbm key/value database library |
| packages/nixpkgs/fzf-git-sh | Bash, zsh and fish key bindings for Git objects, powered by fzf |
| packages/nixpkgs/earlybird | Sensitive data detection tool capable of scanning source code repositories for passwords, key files, and more |
| packages/nixpkgs/redis | Open source, advanced key-value store |
| packages/nixpkgs/mcuboot-imgtool | MCUboot's image signing and key management |
| packages/nixpkgs/linux_testing | The Linux kernel (with patches: bridge-stp-helper, request-key-helper) |
| packages/nixpkgs/redict | Distributed key/value store |
| packages/nixpkgs/arsenik | 33-key layout that works with all keyboards |
| packages/nixpkgs/leveldb | Fast and lightweight key/value database library by Google |
| packages/nixpkgs/rocksdb | Library that provides an embeddable, persistent key-value store for fast storage |
| packages/nixpkgs/foundationdb | Open source, distributed, transactional key-value store |
| packages/nixpkgs/libxeddsa | Toolkit around Curve25519 and Ed25519 key pairs |
| packages/nixpkgs/libargon2 | Key derivation function that was selected as the winner of the Password Hashing Competition in July 2015 |
| packages/nixpkgs/libcredis | C client library for Redis (key-value database) |
| packages/nixpkgs/rocksdb_8_3 | Library that provides an embeddable, persistent key-value store for fast storage |
| packages/nixpkgs/persistent-cache-cpp | Cache of key-value pairs with persistent storage for C++ 11 |
| packages/nixpkgs/rocksdb_7_10 | Library that provides an embeddable, persistent key-value store for fast storage |
| packages/nixpkgs/rocksdb_9_10 | Library that provides an embeddable, persistent key-value store for fast storage |
| packages/nixpkgs/rocksdb_8_11 | Library that provides an embeddable, persistent key-value store for fast storage |
| packages/nixpkgs/rocksdb_6_23 | Library that provides an embeddable, persistent key-value store for fast storage |
| packages/nixpkgs/zsh-system-clipboard | Plugin that adds key bindings support for ZLE (Zsh Line Editor) clipboard operations for vi emulation keymaps |
| packages/nixpkgs/passphrase2pgp | Predictable, passphrase-based PGP key generator |
| packages/nixpkgs/fishPlugins.fzf-fish | Augment your fish command line with fzf key bindings |
| packages/nixpkgs/typstPackages.staves | Draw musical clefs and key signatures |
| packages/nixpkgs/python313Packages.heapdict | Heap with decrease-key and increase-key operations |
| packages/nixpkgs/python314Packages.heapdict | Heap with decrease-key and increase-key operations |
| packages/nixpkgs/ocamlPackages.kdf | Key Derivation Functions: HKDF RFC 5869, PBKDF RFC 2898, SCRYPT RFC 7914 |
| packages/nixpkgs/python312Packages.heapdict | Heap with decrease-key and increase-key operations |
| packages/nixpkgs/ocamlPackages.hkdf | HMAC-based Extract-and-Expand Key Derivation Function (RFC 5869) |
| packages/nixpkgs/ocamlPackages.ringo | Caches (bounded-size key-value stores) and other bounded-size stores |
| packages/nixpkgs/ocamlPackages.pbkdf | Password based key derivation functions (PBKDF) from PKCS#5 |
| packages/nixpkgs/linuxPackages.kernel | The Linux kernel (with patches: bridge-stp-helper, request-key-helper) |
| packages/nixpkgs/ocamlPackages.mirage-kv | MirageOS signatures for key/value devices |
| packages/nixpkgs/ocamlPackages_latest.kdf | Key Derivation Functions: HKDF RFC 5869, PBKDF RFC 2898, SCRYPT RFC 7914 |
| packages/nixpkgs/ocamlPackages_latest.hkdf | HMAC-based Extract-and-Expand Key Derivation Function (RFC 5869) |
| packages/nixpkgs/ocamlPackages_latest.ringo | Caches (bounded-size key-value stores) and other bounded-size stores |
| packages/nixpkgs/python313Packages.kvf | The key-value file format with sections |
| packages/nixpkgs/python314Packages.kvf | The key-value file format with sections |
| packages/nixpkgs/linuxKernel.kernels.linux_rpi2 | The Linux kernel (with patches: bridge-stp-helper, request-key-helper) |
| packages/nixpkgs/linuxKernel.kernels.linux_rpi1 | The Linux kernel (with patches: bridge-stp-helper, request-key-helper) |
| packages/nixpkgs/ocamlPackages_latest.pbkdf | Password based key derivation functions (PBKDF) from PKCS#5 |
| packages/nixpkgs/linuxKernel.kernels.linux_rpi4 | The Linux kernel (with patches: bridge-stp-helper, request-key-helper) |
| packages/nixpkgs/linuxKernel.kernels.linux_rpi3 | The Linux kernel (with patches: bridge-stp-helper, request-key-helper) |
| packages/nixpkgs/linuxPackages_latest.kernel | The Linux kernel (with patches: bridge-stp-helper, request-key-helper) |
| packages/nixpkgs/linuxKernel.kernels.linux_6_1 | The Linux kernel (with patches: bridge-stp-helper, request-key-helper) |
| packages/nixpkgs/linuxKernel.kernels.linux_6_6 | The Linux kernel (with patches: bridge-stp-helper, request-key-helper) |
| packages/nixpkgs/ocamlPackages_latest.mirage-kv | MirageOS signatures for key/value devices |
| packages/nixpkgs/python313Packages.partd | Appendable key-value storage |
| packages/nixpkgs/python314Packages.partd | Appendable key-value storage |
| packages/nixpkgs/linuxKernel.kernels.linux_5_4 | The Linux kernel (with patches: bridge-stp-helper, request-key-helper, rtl8761b-support) |
| packages/nixpkgs/python313Packages.x3dh | Python Implementation of the Extended Triple Diffie-Hellman key Agreement Protocol |
| packages/nixpkgs/python314Packages.x3dh | Python Implementation of the Extended Triple Diffie-Hellman key Agreement Protocol |
| packages/nixpkgs/python313Packages.redis | Python client for Redis key-value store |
| packages/nixpkgs/python313Packages.bip32 | Minimalistic implementation of the BIP32 key derivation scheme |
| packages/nixpkgs/python314Packages.bip32 | Minimalistic implementation of the BIP32 key derivation scheme |
| packages/nixpkgs/python314Packages.redis | Python client for Redis key-value store |
| packages/nixpkgs/typstPackages.staves_0_1_0 | Draw musical clefs and key signatures |
| packages/nixpkgs/python313Packages.uuid6 | New time-based UUID formats which are suited for use as a database key |
| packages/nixpkgs/python314Packages.uuid6 | New time-based UUID formats which are suited for use as a database key |
| packages/nixpkgs/ocamlPackages.mirage-crypto-pk | Simple public-key cryptography for the modern age |
| packages/nixpkgs/linuxKernel.kernels.linux_6_17 | The Linux kernel (with patches: bridge-stp-helper, request-key-helper) |
| packages/nixpkgs/linuxKernel.kernels.linux_6_19 | The Linux kernel (with patches: bridge-stp-helper, request-key-helper) |
| packages/nixpkgs/linuxKernel.kernels.linux_6_12 | The Linux kernel (with patches: bridge-stp-helper, request-key-helper) |
| packages/nixpkgs/linuxKernel.kernels.linux_6_18 | The Linux kernel (with patches: bridge-stp-helper, request-key-helper) |
| packages/nixpkgs/linuxKernel.kernels.linux_5_15 | The Linux kernel (with patches: bridge-stp-helper, request-key-helper) |
| packages/nixpkgs/linuxKernel.kernels.linux_5_10 | The Linux kernel (with patches: bridge-stp-helper, request-key-helper) |
| packages/nixpkgs/python313Packages.web-cache | Simple Python key-value storage backed up by sqlite3 database |
| packages/nixpkgs/python314Packages.web-cache | Simple Python key-value storage backed up by sqlite3 database |
| packages/nixpkgs/python313Packages.elgato | Python client for Elgato Key Lights |
| packages/nixpkgs/python314Packages.elgato | Python client for Elgato Key Lights |
| packages/nixpkgs/python313Packages.scrypt | Python bindings for the scrypt key derivation function |
| packages/nixpkgs/python313Packages.spake2 | SPAKE2 password-authenticated key exchange library |
| packages/nixpkgs/python314Packages.spake2 | SPAKE2 password-authenticated key exchange library |
| packages/nixpkgs/python314Packages.scrypt | Python bindings for the scrypt key derivation function |
| packages/nixpkgs/python312Packages.partd | Appendable key-value storage |
| packages/nixpkgs/linuxKernel.packages.linux_6_1.kernel | The Linux kernel (with patches: bridge-stp-helper, request-key-helper) |
| packages/nixpkgs/linuxKernel.packages.linux_6_6.kernel | The Linux kernel (with patches: bridge-stp-helper, request-key-helper) |
| packages/nixpkgs/python312Packages.x3dh | Python Implementation of the Extended Triple Diffie-Hellman key Agreement Protocol |
| packages/nixpkgs/python312Packages.bip32 | Minimalistic implementation of the BIP32 key derivation scheme |
| packages/nixpkgs/python312Packages.redis | Python client for Redis key-value store |
| packages/nixpkgs/python313Packages.ed25519 | Ed25519 public-key signatures |
| packages/nixpkgs/python314Packages.ed25519 | Ed25519 public-key signatures |
| packages/nixpkgs/texlivePackages.yax | Yet Another Key System |
| packages/nixpkgs/python312Packages.uuid6 | New time-based UUID formats which are suited for use as a database key |
| packages/nixpkgs/haskellPackages.Map | Class of key-value maps |
| packages/nixpkgs/perlPackages.CryptDH | Diffie-Hellman key exchange system |
| packages/nixpkgs/perlPackages.CryptDSA | DSA Signatures and Key Generation |
| packages/nixpkgs/ocamlPackages_latest.mirage-crypto-pk | Simple public-key cryptography for the modern age |
| packages/nixpkgs/python312Packages.web-cache | Simple Python key-value storage backed up by sqlite3 database |
| packages/nixpkgs/perl5Packages.CryptDH | Diffie-Hellman key exchange system |
| packages/nixpkgs/linuxKernel.packages.linux_5_10.kernel | The Linux kernel (with patches: bridge-stp-helper, request-key-helper) |
| packages/nixpkgs/linuxKernel.packages.linux_6_19.kernel | The Linux kernel (with patches: bridge-stp-helper, request-key-helper) |
| packages/nixpkgs/linuxKernel.packages.linux_5_15.kernel | The Linux kernel (with patches: bridge-stp-helper, request-key-helper) |
| packages/nixpkgs/linuxKernel.packages.linux_6_12.kernel | The Linux kernel (with patches: bridge-stp-helper, request-key-helper) |
| packages/nixpkgs/linuxKernel.packages.linux_6_18.kernel | The Linux kernel (with patches: bridge-stp-helper, request-key-helper) |
| packages/nixpkgs/haskellPackages.hpke | Hybrid Public Key Encryption |
| packages/nixpkgs/python312Packages.elgato | Python client for Elgato Key Lights |
| packages/nixpkgs/perl5Packages.CryptDSA | DSA Signatures and Key Generation |
| packages/nixpkgs/haskellPackages.Neks | Simple networked key/value store |
| packages/nixpkgs/haskellPackages.kawa | Key-value store in single files |
| packages/nixpkgs/python312Packages.scrypt | Python bindings for the scrypt key derivation function |
| packages/nixpkgs/python312Packages.spake2 | SPAKE2 password-authenticated key exchange library |
| packages/nixpkgs/akkuPackages.r6rs-redis | Client for the Redis key-value store |
| packages/nixpkgs/linuxKernel.kernels.linux_latest | The Linux kernel (with patches: bridge-stp-helper, request-key-helper) |
| packages/nixpkgs/python313Packages.ruamel-yaml | YAML parser/emitter that supports roundtrip preservation of comments, seq/map flow style, and map key order |
| packages/nixpkgs/python314Packages.ruamel-yaml | YAML parser/emitter that supports roundtrip preservation of comments, seq/map flow style, and map key order |
| packages/nixpkgs/haskellPackages.ui | Minimalistic console UI (getLine), arrow key support (edit, browse cmd history) |
| packages/nixpkgs/linuxKernel.kernels.linux_rt_5_4 | The Linux kernel (with patches: rt, bridge-stp-helper, request-key-helper) |
| packages/nixpkgs/haskellPackages.etcd | Client for etcd, a highly-available key value store |
| packages/nixpkgs/python312Packages.py-scrypt | Bindings for scrypt key derivation function library |
| packages/nixpkgs/python313Packages.py-scrypt | Bindings for scrypt key derivation function library |
| packages/nixpkgs/texlivePackages.conv-xkv | Create new key-value syntax |
| packages/nixpkgs/texlivePackages.ccool | A key-value document command parser |
| packages/nixpkgs/haskellPackages.liszt | Append only key-list database |
| packages/nixpkgs/python313Packages.simplekv | Simple key-value store for binary data |
| packages/nixpkgs/python314Packages.simplekv | Simple key-value store for binary data |
| packages/nixpkgs/haskellPackages.deep-map | Deeply-nested, multiple key type maps |
| packages/nixpkgs/haskellPackages.bimap | Bidirectional mapping between two key types |
| packages/nixpkgs/haskellPackages.redis | A driver for Redis key-value database |
| packages/nixpkgs/linuxKernel.kernels.linux_rt_6_1 | The Linux kernel (with patches: rt, bridge-stp-helper, request-key-helper, export-rt-sched-migrate) |
| packages/nixpkgs/linuxKernel.kernels.linux_rt_6_6 | The Linux kernel (with patches: rt, bridge-stp-helper, request-key-helper, export-rt-sched-migrate) |
| packages/nixpkgs/haskellPackages.HongoDB | A Simple Key Value Store |
| packages/nixpkgs/python313Packages.readchar | Python library to read characters and key strokes |
| packages/nixpkgs/python314Packages.readchar | Python library to read characters and key strokes |
| packages/nixpkgs/haskellPackages.cache | An in-memory key/value store with expiration support |
| packages/nixpkgs/haskellPackages.mlkem | Module-Lattice-based Key-Encapsulation Mechanism |
| packages/nixpkgs/haskellPackages.vimus | An MPD client with vim-like key bindings |
| packages/nixpkgs/haskellPackages.CurryDB | CurryDB: In-memory Key/Value Database |
| packages/nixpkgs/haskellPackages.wild-bind | Dynamic key binding framework |
| packages/nixpkgs/python312Packages.ed25519 | Ed25519 public-key signatures |
| packages/nixpkgs/python313Packages.nonbloat-db | Simple key-value database for my small projects |
| packages/nixpkgs/python314Packages.nonbloat-db | Simple key-value database for my small projects |
| packages/nixpkgs/haskellPackages.phkdf | Toolkit for self-documenting password hash and key derivation functions |
| packages/nixpkgs/haskellPackages.ppad-hkdf | A HMAC-based key derivation function |
| packages/nixpkgs/perlPackages.CryptArgon2 | Perl interface to the Argon2 key derivation functions |
| packages/nixpkgs/python313Packages.ruamel-yaml-clib | YAML parser/emitter that supports roundtrip preservation of comments, seq/map flow style, and map key order |
| packages/nixpkgs/python314Packages.ruamel-yaml-clib | YAML parser/emitter that supports roundtrip preservation of comments, seq/map flow style, and map key order |
| packages/nixpkgs/yaziPlugins.smart-enter | Open files or enter directories all in one key |
| packages/nixpkgs/linuxKernel.kernels.linux_testing | The Linux kernel (with patches: bridge-stp-helper, request-key-helper) |
| packages/nixpkgs/linuxKernel.kernels.linux_default | The Linux kernel (with patches: bridge-stp-helper, request-key-helper) |
| packages/nixpkgs/perlPackages.AltCryptRSABigInt | RSA public-key cryptosystem, using Math::BigInt |
| packages/nixpkgs/python313Packages.google-cloud-kms | Cloud Key Management Service (KMS) API API client library |
| packages/nixpkgs/python314Packages.google-cloud-kms | Cloud Key Management Service (KMS) API API client library |
| packages/nixpkgs/chickenPackages_5.chickenEggs.lmdb-ht | Hashtable-like interface to the LMDB key-value database. |
| packages/nixpkgs/haskellPackages.sortee | Generate string for sort key |
| packages/nixpkgs/perl5Packages.CryptArgon2 | Perl interface to the Argon2 key derivation functions |
| packages/nixpkgs/haskellPackages.tahoe-chk | The Tahoe-LAFS' Content-Hash-Key (CHK) cryptographic protocol |
| packages/nixpkgs/texlivePackages.lparse | A Lua module for parsing key-value options |
| packages/nixpkgs/perlPackages.HashMultiValue | Store multiple values per key |
| packages/nixpkgs/perl540Packages.CryptDH | Diffie-Hellman key exchange system |
| packages/nixpkgs/perl538Packages.CryptDH | Diffie-Hellman key exchange system |
| packages/nixpkgs/haskellPackages.ppad-pbkdf | A password-based key derivation function |
| packages/nixpkgs/perl5Packages.AltCryptRSABigInt | RSA public-key cryptosystem, using Math::BigInt |
| packages/nixpkgs/perl540Packages.CryptDSA | DSA Signatures and Key Generation |
| packages/nixpkgs/perl538Packages.CryptDSA | DSA Signatures and Key Generation |
| packages/nixpkgs/python312Packages.ruamel-yaml | YAML parser/emitter that supports roundtrip preservation of comments, seq/map flow style, and map key order |
| packages/nixpkgs/haskellPackages.spake2 | Implementation of the SPAKE2 Password-Authenticated Key Exchange algorithm |
| packages/nixpkgs/texlivePackages.ctable | Flexible typesetting of table and figure floats using key/value directives |
| packages/nixpkgs/linuxKernel.kernels.linux_rt_5_10 | The Linux kernel (with patches: rt, bridge-stp-helper, request-key-helper, export-rt-sched-migrate) |
| packages/nixpkgs/linuxKernel.kernels.linux_rt_5_15 | The Linux kernel (with patches: rt, bridge-stp-helper, request-key-helper, export-rt-sched-migrate) |
| packages/nixpkgs/akkuPackages.chibi-crypto-rsa | RSA public key cryptography implementation |
| packages/nixpkgs/perl5Packages.HashMultiValue | Store multiple values per key |
| packages/nixpkgs/chickenPackages_5.chickenEggs.llrb-tree | LLRB tree general and customized to key types. |
| packages/nixpkgs/haskellPackages.group-with | Classify objects by key-generating function, like SQL GROUP BY |
| packages/nixpkgs/perlPackages.CryptScryptKDF | Scrypt password based key derivation function |
| packages/nixpkgs/python312Packages.simplekv | Simple key-value store for binary data |
| packages/nixpkgs/python312Packages.readchar | Python library to read characters and key strokes |
| packages/nixpkgs/texlivePackages.clefval | Key/value support with a hash |
| packages/nixpkgs/perl5Packages.CryptScryptKDF | Scrypt password based key derivation function |
| packages/nixpkgs/chickenPackages_5.chickenEggs.pbkdf2 | Password-Based Key Derivation Function as defined in RFC2898 |
| packages/nixpkgs/python312Packages.nonbloat-db | Simple key-value database for my small projects |
| packages/nixpkgs/haskellPackages.Twofish | An implementation of the Twofish Symmetric-key cipher |
| packages/nixpkgs/emacsPackages.control-lock | Like caps-lock, but for your control key |
| packages/nixpkgs/python312Packages.ruamel-yaml-clib | YAML parser/emitter that supports roundtrip preservation of comments, seq/map flow style, and map key order |
| packages/nixpkgs/haskellPackages.libmdbx | Bindings for libmdbx, an embedded key/value store |
| packages/nixpkgs/texlivePackages.options | Provides convenient key-value options for LaTeX package writers |
| packages/nixpkgs/haskellPackages.newhope | Library implementing the NewHope cryptographic key-exchange protocol |
| packages/nixpkgs/haskellPackages.type-level-kv-list | Type level Key-Value list |
| packages/nixpkgs/ocamlPackages.ocsipersist | Persistent key/value storage for OCaml using multiple backends |
| packages/nixpkgs/haskellPackages.io-storage | A key-value store in the IO monad |
| packages/nixpkgs/python312Packages.google-cloud-kms | Cloud Key Management Service (KMS) API API client library |
| packages/nixpkgs/texlivePackages.expkv-bundle | An expandable key=val implementation and friends |
| packages/nixpkgs/perl538Packages.CryptArgon2 | Perl interface to the Argon2 key derivation functions |
| packages/nixpkgs/perl540Packages.CryptArgon2 | Perl interface to the Argon2 key derivation functions |
| packages/nixpkgs/ocamlPackages.ocsipersist-lib | Persistent key/value storage (for Ocsigen) - support library |
| packages/nixpkgs/python313Packages.ed25519-blake2b | Ed25519 public-key signatures (BLAKE2b fork) |
| packages/nixpkgs/python314Packages.ed25519-blake2b | Ed25519 public-key signatures (BLAKE2b fork) |
| packages/nixpkgs/gnomeExtensions.quick-web-search | Use Super key for quick web search |
| packages/nixpkgs/haskellPackages.map-classes | A set of classes and instances for working with key/value mappings |
| packages/nixpkgs/perl538Packages.AltCryptRSABigInt | RSA public-key cryptosystem, using Math::BigInt |
| packages/nixpkgs/perl540Packages.AltCryptRSABigInt | RSA public-key cryptosystem, using Math::BigInt |
| packages/nixpkgs/interception-tools-plugins.caps2esc | Transforming the most useless key ever into the most useful one |
| packages/nixpkgs/chickenPackages_5.chickenEggs.rocksdb | Bindings to Facebooks's RocksDB Key-Value Store |
| packages/nixpkgs/chickenPackages_5.chickenEggs.leveldb | Bindings to Google's LevelDB Key-Value Store |
| packages/nixpkgs/haskellPackages.url-generic | Parse/format generic key/value URLs from record data types |
| packages/nixpkgs/perl538Packages.HashMultiValue | Store multiple values per key |
| packages/nixpkgs/perl540Packages.HashMultiValue | Store multiple values per key |
| packages/nixpkgs/texlivePackages.multienv | Multiple environments using a "key=value" syntax |
| packages/nixpkgs/texlivePackages.simplekv | A simple key/value system for TeX and LaTeX |
| packages/nixpkgs/haskellPackages.kvitable | Key/Value Indexed Table container and formatting library |
| packages/nixpkgs/perl538Packages.CryptScryptKDF | Scrypt password based key derivation function |
| packages/nixpkgs/perl540Packages.CryptScryptKDF | Scrypt password based key derivation function |
| packages/nixpkgs/ocamlPackages.ocsipersist-pgsql | Persistent key/value storage for OCaml using PostgreSQL |
| packages/nixpkgs/haskellPackages.amazonka-kms | Amazon Key Management Service SDK |
| packages/nixpkgs/haskellPackages.int-multimap | A data structure that associates each Int key with a set of values |
| packages/nixpkgs/ocamlPackages_latest.ocsipersist | Persistent key/value storage for OCaml using multiple backends |
| packages/nixpkgs/tmuxPlugins.minimal-tmux-status | Minimal tmux status line plugin with prefix key indicator |
| packages/nixpkgs/python312Packages.ed25519-blake2b | Ed25519 public-key signatures (BLAKE2b fork) |
| packages/nixpkgs/ocamlPackages_latest.ocsipersist-lib | Persistent key/value storage (for Ocsigen) - support library |
| packages/nixpkgs/linuxKernel.kernels.linux_hardened | The Linux kernel (with patches: bridge-stp-helper, request-key-helper, linux-hardened-v6.12.66-hardened1) |
| packages/nixpkgs/ocamlPackages.ocsipersist-sqlite | Persistent key/value storage for OCaml using SQLite |
| packages/nixpkgs/texlivePackages.kvoptions | Key value format for package options |
| packages/nixpkgs/haskellPackages.gogol-cloudkms | Google Cloud Key Management Service (KMS) SDK |
| packages/nixpkgs/ocamlPackages_latest.ocsipersist-pgsql | Persistent key/value storage for OCaml using PostgreSQL |
| packages/nixpkgs/gnomeExtensions.go-to-last-workspace | Quickly toggle between two workspaces with one key |
| packages/nixpkgs/linuxKernel.packages.linux_hardened.kernel | The Linux kernel (with patches: bridge-stp-helper, request-key-helper, linux-hardened-v6.12.66-hardened1) |
| packages/nixpkgs/gnomeExtensions.gamebar-overlay | A fullscreen overlay widget for GNOME that displays useful information, audio controls and more |
| packages/nixpkgs/python313Packages.groestlcoin-hash | Bindings for groestl key derivation function library used in Groestlcoin |
| packages/nixpkgs/python314Packages.groestlcoin-hash | Bindings for groestl key derivation function library used in Groestlcoin |
| packages/nixpkgs/ocamlPackages_latest.ocsipersist-sqlite | Persistent key/value storage for OCaml using SQLite |
| packages/nixpkgs/haskellPackages.compactmap | A read-only memory-efficient key-value store |
| packages/nixpkgs/haskellPackages.downloader | A small, low-dependency library that provides turn-key file download over HTTP and HTTPS |
| packages/nixpkgs/gnomeExtensions.switch-workspace | Switch workspace like using ALT+TAB key to switch windows |
| packages/nixpkgs/python313Packages.headerparser | Module to parse key-value pairs in the style of RFC 822 (e-mail) headers |
| packages/nixpkgs/python314Packages.headerparser | Module to parse key-value pairs in the style of RFC 822 (e-mail) headers |
| packages/nixpkgs/python312Packages.groestlcoin-hash | Bindings for groestl key derivation function library used in Groestlcoin |
| packages/nixpkgs/gnomeExtensions.alt-tab-current-monitor | Enhances window switching for multi-monitor setups: shows only windows from the current monitor in Alt+Tab, allows switching to windows on other monitors with a modifier key, prevents focus from jumping between monitors when switching workspaces and more. |
| packages/nixpkgs/haskellPackages.certificate | Certificates and Key Reader/Writer |
| packages/nixpkgs/texlivePackages.affilauthor | Tag author and affiliation information in a key-value style |
| packages/nixpkgs/linuxKernel.kernels.linux_latest_libre | The Linux kernel (with patches: bridge-stp-helper, request-key-helper) |
| packages/nixpkgs/haskellPackages.DescriptiveKeys | A library for specifying xmonad key bindings with functionality |
| packages/nixpkgs/python312Packages.headerparser | Module to parse key-value pairs in the style of RFC 822 (e-mail) headers |
| packages/nixpkgs/gnomeExtensions.resource-monitor | Resource Monitor is a GNOME Shell extension that provides real-time monitoring of key system resources directly in the GNOME Shell top bar |
| packages/nixpkgs/haskellPackages.refined-containers | Type-checked proof that a key exists in a container and can be safely indexed |
| packages/nixpkgs/linuxKernel.kernels.linux_6_6_hardened | The Linux kernel (with patches: bridge-stp-helper, request-key-helper, linux-hardened-v6.6.115-hardened1) |
| packages/nixpkgs/linuxKernel.kernels.linux_6_1_hardened | The Linux kernel (with patches: bridge-stp-helper, request-key-helper, linux-hardened-v6.1.158-hardened1) |
| packages/nixpkgs/linuxKernel.kernels.linux_5_4_hardened | The Linux kernel (with patches: bridge-stp-helper, request-key-helper, rtl8761b-support, linux-hardened-v5.4.301-hardened1) |
| packages/nixpkgs/gnomeExtensions.duckduckbang | Use Super key for quick web search and add custom !bangs |
| packages/nixpkgs/gnomeExtensions.dfx-currency-converter | Configurable multiple currency converter |
| packages/nixpkgs/linuxKernel.kernels.linux_5_15_hardened | The Linux kernel (with patches: bridge-stp-helper, request-key-helper, linux-hardened-v5.15.196-hardened1) |
| packages/nixpkgs/linuxKernel.kernels.linux_5_10_hardened | The Linux kernel (with patches: bridge-stp-helper, request-key-helper, linux-hardened-v5.10.246-hardened1) |
| packages/nixpkgs/linuxKernel.kernels.linux_6_12_hardened | The Linux kernel (with patches: bridge-stp-helper, request-key-helper, linux-hardened-v6.12.66-hardened1) |
| packages/nixpkgs/haskellPackages.justified-containers | Keyed container types with type-checked proofs of key presence |
| packages/nixpkgs/linuxKernel.packages.linux_6_12_hardened.kernel | The Linux kernel (with patches: bridge-stp-helper, request-key-helper, linux-hardened-v6.12.66-hardened1) |
| packages/nixpkgs/vscode-extensions.jamesyang999.vscode-emacs-minimum | Minimal emacs key bindings for VSCode |
| packages/nixpkgs/haskellPackages.composable-associations | Types and helpers for composing types into a single larger key-value type |
| packages/nixpkgs/key | Java formal verification tool |
| packages/nixpkgs/haskellPackages.key | Type-safe unconstrained dynamic typing |
| packages/nixpkgs/key-rack | View and edit your apps’ keys |
| packages/nixpkgs/emacsPackages.key-seq | |
| packages/nixpkgs/sbclPackages.openid-key | |
| packages/nixpkgs/emacsPackages.key-quiz | |
| packages/nixpkgs/emacsPackages.key-leap | |
| packages/nixpkgs/emacsPackages.bind-key | |
| packages/nixpkgs/wlr-which-key | Keymap manager for wlroots-based compositors |
| packages/nixpkgs/vimPlugins.vim-which-key | |
| packages/nixpkgs/keyd | Key remapping daemon for Linux |
| packages/nixpkgs/sbclPackages.openid-key-test | |
| packages/nixpkgs/rPackages.keyATM | |
| packages/nixpkgs/python313Packages.py-key-value-aio | Async Key-Value |
| packages/nixpkgs/python314Packages.py-key-value-aio | Async Key-Value |
| packages/nixpkgs/emacsPackages.key-chord | |
| packages/nixpkgs/emacsPackages.key-combo | |
| packages/nixpkgs/emacsPackages.which-key | |
| packages/nixpkgs/emacsPackages.guide-key | |
| packages/nixpkgs/vimPlugins.which-key-nvim | |
| packages/nixpkgs/haskellPackages.key-state | Manage key and button states and statuses |
| packages/nixpkgs/emacsPackages.helm-bind-key | |
| packages/nixpkgs/emacsPackages.guide-key-tip | |
| packages/nixpkgs/aws-rotate-key | Easily rotate your AWS key |
| packages/nixpkgs/haskellPackages.key-vault | Store of values of arbitrary types |
| packages/nixpkgs/emacsPackages.leader-key | |
| packages/nixpkgs/emacsPackages.key-assist | |
| packages/nixpkgs/keym | C tool to control mouse with keyboard for X11 |
| packages/nixpkgs/python313Packages.py-key-value-shared | Shared code between key-value-aio and key-value-sync |
| packages/nixpkgs/python314Packages.py-key-value-shared | Shared code between key-value-aio and key-value-sync |
| packages/nixpkgs/asc-key-to-qr-code-gif | Convert ASCII-armored PGP keys to animated QR code |
| packages/nixpkgs/python313Packages.multi-key-dict | Multi_key_dict |
| packages/nixpkgs/python314Packages.multi-key-dict | Multi_key_dict |
| packages/nixpkgs/sbclPackages.cl-ssh-keys | |
| packages/nixpkgs/python313Packages.py-key-value-shared-test | Utils for key-value-shared |
| packages/nixpkgs/python314Packages.py-key-value-shared-test | Utils for key-value-shared |
| packages/nixpkgs/typstPackages.knowledge-key | A compact cheat-sheet |
| packages/nixpkgs/tmuxPlugins.tmux-which-key | Tmux plugin that allows users to select actions from a customizable popup menu |
| packages/nixpkgs/haskellPackages.pipes-key-value-csv | Streaming processing of CSV files preceded by key-value pairs |
| packages/nixpkgs/nkeys | Public-key signature system for NATS |
| packages/nixpkgs/gnomeExtensions.super-key | Fork of Pop Launcher Super-Key: Bind the Super-Key to a custom action |
| packages/nixpkgs/typstPackages.keyle | This package provides a simple way to style keyboard shortcuts in your documentation |
| packages/nixpkgs/rPackages.keys | |
| packages/nixpkgs/python312Packages.multi-key-dict | Multi_key_dict |
| packages/nixpkgs/a-keys-path | Short puzzle-platformer game made with Godot, running on GLES 2.0 |
| packages/nixpkgs/mid2key | Simple tool which maps midi notes to simulated keystrokes |
| packages/nixpkgs/kodiPackages.keymap | GUI for configuring mappings for remotes, keyboard and other inputs supported by Kodi |
| packages/nixpkgs/gokey | Vault-less password store |
| packages/nixpkgs/python313Packages.eth-keys | Common API for Ethereum key operations |
| packages/nixpkgs/python314Packages.eth-keys | Common API for Ethereum key operations |
| packages/nixpkgs/emacsPackages.key-intercept | |
| packages/nixpkgs/emacsPackages.which-key-posframe | |
| packages/nixpkgs/ssh-key-confirmer | Test ssh login key acceptance without having the private key |
| packages/nixpkgs/azure-sdk-for-cpp.security-keyvault-keys | Azure Key Vault Key client library for C++ |
| packages/nixpkgs/rPackages.keyToEnglish | |
| packages/nixpkgs/pgpkeyserver-lite | Lightweight static front-end for a sks keyserver |
| packages/nixpkgs/haskellPackages.keys | Keyed functors and containers |
| packages/nixpkgs/rPackages.rskey | |
| packages/nixpkgs/rPackages.TukeyC | |
| packages/nixpkgs/rPackages.tukeyGH | |
| packages/nixpkgs/rPackages.TukeyGH77 | |
| packages/nixpkgs/sbclPackages.cl-xkeysym | |
| packages/nixpkgs/python313Packages.azure-keyvault-keys | Microsoft Azure Key Vault Keys Client Library for Python |
| packages/nixpkgs/python314Packages.azure-keyvault-keys | Microsoft Azure Key Vault Keys Client Library for Python |
| packages/nixpkgs/emacsPackages.makey | |
| packages/nixpkgs/emacsPackages.slow-keys | |
| packages/nixpkgs/emacsPackages.free-keys | |
| packages/nixpkgs/emacsPackages.xah-fly-keys | |
| packages/nixpkgs/donkey | Alternative for S/KEY's 'key' command |
| packages/nixpkgs/vimPlugins.unimpaired-which-key-nvim | |
| packages/nixpkgs/python314Packages.getkey | Read single characters and key-strokes |
| packages/nixpkgs/python313Packages.getkey | Read single characters and key-strokes |
| packages/nixpkgs/python313Packages.valkey | Python client for Redis key-value store |
| packages/nixpkgs/python314Packages.valkey | Python client for Redis key-value store |
| packages/nixpkgs/keynav | Generate X11 mouse clicks from keyboard |
| packages/nixpkgs/emacsPackages.term+key-intercept | |
| packages/nixpkgs/vkeybd | Virtual MIDI keyboard |
| packages/nixpkgs/rPackages.sankey | |
| packages/nixpkgs/python312Packages.azure-keyvault-keys | Microsoft Azure Key Vault Keys Client Library for Python |
| packages/nixpkgs/kdePackages.qhotkey | Global shortcut/hotkey for Desktop Qt-Applications |
| packages/nixpkgs/qt6Packages.qhotkey | Global shortcut/hotkey for Desktop Qt-Applications |
| packages/nixpkgs/haskellPackages.keyed | Generic indexing for many data structures |
| packages/nixpkgs/haskellPackages.nkeys | Nkeys ed25519 encoding for use with NATS |
| packages/nixpkgs/rPackages.hockeyR | |
| packages/nixpkgs/sbclPackages.nkeymaps | |
| packages/nixpkgs/sbclPackages.keystone | |
| packages/nixpkgs/haskellPackages.popkey | Static key-value storage backed by poppy |
| packages/nixpkgs/typstPackages.keyle_0_2_0 | This package provides a simple way to style keyboard shortcuts in your documentation |
| packages/nixpkgs/typstPackages.keyle_0_1_0 | This package provides a simple way to style keyboard shortcuts in your documentation |
| packages/nixpkgs/typstPackages.keyle_0_1_1 | This package provides a simple way to style keyboard shortcuts in your documentation |
| packages/nixpkgs/haskellPackages.haskey | A transactional, ACID compliant, embeddable key-value store |
| packages/nixpkgs/keydb | Multithreaded Fork of Redis |
| packages/nixpkgs/sbclPackages.cl-keycloak | |
| packages/nixpkgs/typstPackages.knowledge-key_1_0_2 | A compact cheat-sheet |
| packages/nixpkgs/typstPackages.knowledge-key_1_0_1 | A compact cheat-sheet |
| packages/nixpkgs/typstPackages.knowledge-key_1_0_0 | A compact cheat-sheet |
| packages/nixpkgs/vimPlugins.mini-keymap | |
| packages/nixpkgs/emacsPackages.keydef | |
| packages/nixpkgs/emacsPackages.keyset | |
| packages/nixpkgs/keybase-gui | Keybase official GUI |
| packages/nixpkgs/emacsPackages.wakib-keys | |
| packages/nixpkgs/emacsPackages.keytar | |
| packages/nixpkgs/emacsPackages.evil-swap-keys | |
| packages/nixpkgs/python312Packages.eth-keys | Common API for Ethereum key operations |
| packages/nixpkgs/python313Packages.rsskey | RSS feed mirror on Misskey |
| packages/nixpkgs/python314Packages.rsskey | RSS feed mirror on Misskey |
| packages/nixpkgs/texlivePackages.ltxkeys | A robust key parser for LaTeX |
| packages/nixpkgs/kdePackages.fcitx5-unikey | Unikey engine support for Fcitx5 |
| packages/nixpkgs/qt6Packages.fcitx5-unikey | Unikey engine support for Fcitx5 |
| packages/nixpkgs/texlivePackages.luakeys | A Lua module for parsing key-value options |
| packages/nixpkgs/haskellPackages.keysafe | back up a secret key securely to the cloud |
| packages/nixpkgs/rPackages.Rlabkey | |
| packages/nixpkgs/rPackages.keyperm | |
| packages/nixpkgs/rPackages.keyring | |
| packages/nixpkgs/texlivePackages.skeyval | Key-value parsing combining features of xkeyval and pgfkeys |
| packages/nixpkgs/valkey | High-performance data structure server that primarily serves key/value workloads |
| packages/nixpkgs/canokey-qemu | CanoKey QEMU Virt Card |
| packages/nixpkgs/texlivePackages.sankey | Draw Sankey diagrams with TikZ |
| packages/nixpkgs/nodePackages.keyoxide | CLI for Keyoxide |
| packages/nixpkgs/kdePackages.keysmith | OTP client for Plasma Mobile and Desktop |
| packages/nixpkgs/haskellPackages.lackey | Generate Ruby clients from Servant APIs |
| packages/nixpkgs/haskellPackages.keyed-vals | An abstract Handle for accessing collections in stores like Redis |
| packages/nixpkgs/haskellPackages.emacs-keys | library to parse emacs style keybinding into the modifiers and the chars |
| packages/nixpkgs/sbclPackages.xkeyboard | |
| packages/nixpkgs/emacsPackages.evil-keypad | |
| packages/nixpkgs/onlykey | Setup and configure OnlyKey |
| packages/nixpkgs/rPackages.TukeyRegion | |
| packages/nixpkgs/sharkey | Sharkish microblogging platform |
| packages/nixpkgs/python312Packages.getkey | Read single characters and key-strokes |
| packages/nixpkgs/keymapp | Application for ZSA keyboards |
| packages/nixpkgs/emacsPackages.keyfreq | |
| packages/nixpkgs/emacsPackages.keycast | |
| packages/nixpkgs/keyleds | Advanced RGB animation service for Logitech keyboards |
| packages/nixpkgs/emacsPackages.keyswap | |
| packages/nixpkgs/python312Packages.valkey | Python client for Redis key-value store |
| packages/nixpkgs/ksuperkey | Tool to be able to bind the super key as a key rather than a modifier |
| packages/nixpkgs/tkey-ssh-agent | SSH Agent for TKey, the flexible open hardware/software USB security key |
| packages/nixpkgs/logkeys | GNU/Linux keylogger that works |
| packages/nixpkgs/autokey | Desktop automation utility for Linux and X11 |
| packages/nixpkgs/haskellPackages.haskey-mtl | A monad transformer supporting Haskey transactions |
| packages/nixpkgs/keyutils | Tools used to control the Linux kernel key management system |
| packages/nixpkgs/vimPlugins.showkeys | |
| packages/nixpkgs/keyfuzz | Manipulate the scancode/keycode translation tables of keyboard drivers |
| packages/nixpkgs/keybase | Keybase official command-line utility and service |
| packages/nixpkgs/vimPlugins.keymap-layer-nvim | |
| packages/nixpkgs/haskellPackages.keyed-vals-mem | Implements a keyed-vals Handle using in-process memory |
| packages/nixpkgs/rPackages.fastRhockey | |
| packages/nixpkgs/sbclPackages.cl-ssh-keys_dot_test | |
| packages/nixpkgs/keycastr | Open-source keystroke visualizer |
| packages/nixpkgs/haskellPackages.yi-keymap-vim | Vim keymap for Yi editor |
| packages/nixpkgs/haskellPackages.yi-keymap-cua | Cua keymap for Yi editor |
| packages/nixpkgs/ic-keysmith | Hierarchical Deterministic Key Derivation for the Internet Computer |
| packages/nixpkgs/sbclPackages.monkeylib-html | |
| packages/nixpkgs/sbclPackages.xkeyboard-test | |
| packages/nixpkgs/emacsPackages.vterm-hotkey | |
| packages/nixpkgs/emacsPackages.keymap-utils | |
| packages/nixpkgs/texlivePackages.keyparse | Key based parser |
| packages/nixpkgs/texlivePackages.keyindex | Index entries by key lookup |
| packages/nixpkgs/badkeys | Tool to find common vulnerabilities in cryptographic public keys |
| packages/nixpkgs/haskellPackages.crypto-pubkey | Public Key cryptography |
| packages/nixpkgs/texlivePackages.keyfloat | Provides a key/value interface for generating floats |
| packages/nixpkgs/python313Packages.keepkey | KeepKey Python client |
| packages/nixpkgs/python314Packages.keepkey | KeepKey Python client |
| packages/nixpkgs/texlivePackages.keyval2e | A lightweight and robust key-value parser |
| packages/nixpkgs/rPackages.keyringr | |
| packages/nixpkgs/rPackages.quadkeyr | |
| packages/nixpkgs/rPackages.keypress | |
| packages/nixpkgs/rPackages.keyclust | |
| packages/nixpkgs/texlivePackages.xkeyval | Extension of the keyval package |
| packages/nixpkgs/haskellPackages.keyring | Keyring access |
| packages/nixpkgs/texlivePackages.pgfkeyx | Extended and more robust version of pgfkeys |
| packages/nixpkgs/keyscope | Key and secret workflow (validation, invalidation, etc.) tool |
| packages/nixpkgs/haskellPackages.jmonkey | Jmonkey is very restricted but handy EDSL for JavaScript |
| packages/nixpkgs/volume_key | Library for manipulating storage volume encryption keys and storing them separately from volumes to handle forgotten passphrases, and the associated command-line tool |
| packages/nixpkgs/haskellPackages.keycode | Maps web browser keycodes to their corresponding keyboard keys |
| packages/nixpkgs/haskellPackages.osdkeys | Show keys pressed with an on-screen display (Linux only) |
| packages/nixpkgs/nodePackages_latest.keyoxide | CLI for Keyoxide |
| packages/nixpkgs/sbclPackages.quine-mccluskey | |
| packages/nixpkgs/lxqt.lxqt-globalkeys | LXQt service for global keyboard shortcuts registration |
| packages/nixpkgs/perlPackages.MockMonkeyPatch | Monkey patching with test mocking in mind |
| packages/nixpkgs/python313Packages.keyring | Store and access your passwords safely |
| packages/nixpkgs/python314Packages.keyring | Store and access your passwords safely |
| packages/nixpkgs/keyoxide-cli | Command-line interface to locally verify decentralized identities |
| packages/nixpkgs/nitrokey-app | Provides extra functionality for the Nitrokey Pro and Storage |
| packages/nixpkgs/emacsPackages.chronometrist-key-values | |
| packages/nixpkgs/keycard-cli | Command line tool and shell to manage keycards |
| packages/nixpkgs/hawkeye | Simple license header checker and formatter, in multiple distribution forms |
| packages/nixpkgs/texlivePackages.epigraph-keys | Epigraphs using key values |
| packages/nixpkgs/haskellPackages.crypto-keys-ssh | Like crypto-pubkey-openssh but not dependent on any specific crypto library |
| packages/nixpkgs/onlykey-cli | OnlyKey client and command-line tool |
| packages/nixpkgs/python313Packages.eth-keyfile | Tools for handling the encrypted keyfile format used to store private keys |
| packages/nixpkgs/python314Packages.eth-keyfile | Tools for handling the encrypted keyfile format used to store private keys |
| packages/nixpkgs/keycloak | Identity and access management for modern applications and services |
| packages/nixpkgs/emacsPackages.custom-keymap | |
| packages/nixpkgs/perl5Packages.MockMonkeyPatch | Monkey patching with test mocking in mind |
| packages/nixpkgs/haskellPackages.haskey-btree | B+-tree implementation in Haskell |
| packages/nixpkgs/misskey | Open source, federated social media platform |
| packages/nixpkgs/haskellPackages.keyed-vals-redis | Access Redis using a keyed-vals Handle |
| packages/nixpkgs/python313Packages.azure-keyvault | This is the Microsoft Azure Key Vault Client Library |
| packages/nixpkgs/python314Packages.azure-keyvault | This is the Microsoft Azure Key Vault Client Library |
| packages/nixpkgs/keybinder | Library for registering global key bindings |
| packages/nixpkgs/rPackages.ThreeWiseMonkeys | |
| packages/nixpkgs/haskellPackages.yi-keymap-emacs | Emacs keymap for Yi editor |
| packages/nixpkgs/python312Packages.rsskey | RSS feed mirror on Misskey |
| packages/nixpkgs/python313Packages.keyring-pass | Password Store (pass) backend for python's keyring |
| packages/nixpkgs/python314Packages.keyring-pass | Password Store (pass) backend for python's keyring |
| packages/nixpkgs/kdePackages.plasma-keyboard | Virtual Keyboard for Qt based desktops |
| packages/nixpkgs/haskellPackages.bitcoin-keys | Bitcoin keys |
| packages/nixpkgs/texlivePackages.kvsetkeys | Key value parser with default handler support |
| packages/nixpkgs/python313Packages.keyboard | Hook and simulate keyboard events on Windows and Linux |
| packages/nixpkgs/python314Packages.keyboard | Hook and simulate keyboard events on Windows and Linux |
| packages/nixpkgs/keymapper | Cross-platform context-aware key remapper |
| packages/nixpkgs/haskellPackages.special-keys | Simple data types that help me here and there |
| packages/nixpkgs/monkeysAudio | APE codec and decompressor |
| packages/nixpkgs/monkeys-audio | APE codec and decompressor |
| packages/nixpkgs/haskellPackages.keyword-args | Extract data from a keyword-args config file format |
| packages/nixpkgs/keypunch | Practice your typing skills |
| packages/nixpkgs/gnomeExtensions.otp-keys | Show and copy otp keys |
| packages/nixpkgs/python313Packages.keyutils | Set of python bindings for keyutils |
| packages/nixpkgs/python314Packages.keyutils | Set of python bindings for keyutils |
| packages/nixpkgs/python313Packages.nitrokey | Python SDK for Nitrokey devices |
| packages/nixpkgs/python314Packages.nitrokey | Python SDK for Nitrokey devices |
| packages/nixpkgs/python313Packages.keymap-drawer | Module and CLI tool to help parse and draw keyboard layouts |
| packages/nixpkgs/python314Packages.keymap-drawer | Module and CLI tool to help parse and draw keyboard layouts |
| packages/nixpkgs/emacsPackages.keystore-mode | |
| packages/nixpkgs/emacsPackages.leaf-keywords | |
| packages/nixpkgs/python313Packages.azure-mgmt-keyvault | This is the Microsoft Azure Key Vault Management Client Library |
| packages/nixpkgs/python314Packages.azure-mgmt-keyvault | This is the Microsoft Azure Key Vault Management Client Library |
| packages/nixpkgs/texlivePackages.xkeymask | An extension of xkeyval with a mask |
| packages/nixpkgs/emacsPackages.auth-source-keytar | |
| packages/nixpkgs/rPackages.keyplayer | |
| packages/nixpkgs/rPackages.oskeyring | |
| packages/nixpkgs/rPackages.keyholder | |
| packages/nixpkgs/texlivePackages.dichokey | Construct dichotomous identification keys |
| packages/nixpkgs/texlivePackages.identkey | Typesetting bracketed dichotomous identification keys |
| packages/nixpkgs/haskellPackages.keystore | Managing stores of secret things |
| packages/nixpkgs/texlivePackages.menukeys | Format menu sequences, paths and keystrokes from lists |
| packages/nixpkgs/python313Packages.keepkey-agent | Using KeepKey as hardware-based SSH/PGP agent |
| packages/nixpkgs/python314Packages.keepkey-agent | Using KeepKey as hardware-based SSH/PGP agent |
| packages/nixpkgs/gnomeExtensions.lock-keys | Visualize lock keys |
| packages/nixpkgs/rubyPackages.ruby-keychain | |
| packages/nixpkgs/emacsPackages.keyword-search | |
| packages/nixpkgs/haskellPackages.keycloak-hs | |
| packages/nixpkgs/python313Packages.keyrings-alt | Alternate keyring implementations |
| packages/nixpkgs/python314Packages.keyrings-alt | Alternate keyring implementations |
| packages/nixpkgs/hockeypuck-web | OpenPGP Key Server web resources |
| packages/nixpkgs/sbclPackages.monkeylib-markup-html | |
| packages/nixpkgs/sbclPackages.monkeylib-text-output | |
| packages/nixpkgs/haskellPackages.gnome-keyring | Bindings for libgnome-keyring |
| packages/nixpkgs/keyguard | Alternative client for the Bitwarden platform, created to provide the best user experience possible |
| packages/nixpkgs/yubikey-agent | Seamless ssh-agent for YubiKeys |
| packages/nixpkgs/python312Packages.keepkey | KeepKey Python client |
| packages/nixpkgs/libxcb-keysyms | Standard X key constants and conversion to/from keycodes |
| packages/nixpkgs/python313Packages.azure-keyvault-nspkg | Microsoft Azure Key Vault Namespace Package [Internal] |
| packages/nixpkgs/python314Packages.azure-keyvault-nspkg | Microsoft Azure Key Vault Namespace Package [Internal] |
| packages/nixpkgs/libsForQt5.khotkeys | |
| packages/nixpkgs/python313Packages.sshpubkeys | OpenSSH Public Key Parser for Python |
| packages/nixpkgs/python314Packages.sshpubkeys | OpenSSH Public Key Parser for Python |
| packages/nixpkgs/python313Packages.pykeyatome | Python module to get data from Atome Key |
| packages/nixpkgs/python314Packages.pykeyatome | Python module to get data from Atome Key |
| packages/nixpkgs/python312Packages.virtkey | Extension to emulate keypresses and to get the layout information from the X server |
| packages/nixpkgs/python313Packages.virtkey | Extension to emulate keypresses and to get the layout information from the X server |
| packages/nixpkgs/hyprkeys | Simple, scriptable keybind retrieval utility for Hyprland |
| packages/nixpkgs/python312Packages.azure-keyvault | This is the Microsoft Azure Key Vault Client Library |
| packages/nixpkgs/vimPlugins.nvim-whichkey-setup-lua | |
| packages/nixpkgs/xorg.xcbutilkeysyms | |
| packages/nixpkgs/sbclPackages.qtools-ui-keychord-editor | |
| packages/nixpkgs/haskellPackages.keyed-vals-hspec-tests | Validate a keyed-vals Handle |
| packages/nixpkgs/gnome-keysign | GTK/GNOME application to use GnuPG for signing other peoples’ keys |
| packages/nixpkgs/keymap-drawer | Module and CLI tool to help parse and draw keyboard layouts |
| packages/nixpkgs/perl538Packages.MockMonkeyPatch | Monkey patching with test mocking in mind |
| packages/nixpkgs/perl540Packages.MockMonkeyPatch | Monkey patching with test mocking in mind |
| packages/nixpkgs/emacsPackages.mode-line-keyboard | |
| packages/nixpkgs/emacsPackages.quick-shell-keybind | |
| packages/nixpkgs/python313Packages.ekey-bionyxpy | Interact with the bionyx third party API of the ekey biometric systems |
| packages/nixpkgs/python314Packages.ekey-bionyxpy | Interact with the bionyx third party API of the ekey biometric systems |
| packages/nixpkgs/emacsPackages.standard-keys-mode | |
| packages/nixpkgs/kdePackages.qtkeychain | Platform-independent Qt API for storing passwords securely |
| packages/nixpkgs/qt6Packages.qtkeychain | Platform-independent Qt API for storing passwords securely |
| packages/nixpkgs/emacsPackages."term+key-intercept" | |
| packages/nixpkgs/python312Packages.keyring | Store and access your passwords safely |
| packages/nixpkgs/texlivePackages.keycommand | Simple creation of commands with key-value arguments |
| packages/nixpkgs/gnomeExtensions.application-and-window-view-key-remapper | Changes the Keyboard shortcuts for the application view and the window view |
| packages/nixpkgs/vimPlugins.tinykeymap | |
| packages/nixpkgs/libsForQt5.fcitx5-unikey | Unikey engine support for Fcitx5 |
| packages/nixpkgs/gnome-keyring | Collection of components in GNOME that store secrets, passwords, keys, certificates and make them available to applications |
| packages/nixpkgs/keepkey-agent | Using KeepKey as hardware-based SSH/PGP agent |
| packages/nixpkgs/python312Packages.eth-keyfile | Tools for handling the encrypted keyfile format used to store private keys |
| packages/nixpkgs/libsForQt5.keysmith | OTP client for Plasma Mobile and Desktop |
| packages/nixpkgs/onlykey-agent | Middleware that lets you use OnlyKey as a hardware SSH/GPG device |
| packages/nixpkgs/python313Packages.django-hierarkey | Flexible and powerful hierarchical key-value store for your Django models |
| packages/nixpkgs/python314Packages.django-hierarkey | Flexible and powerful hierarchical key-value store for your Django models |
| packages/nixpkgs/interception-tools-plugins.dual-function-keys | Tap for one key, hold for another |
| packages/nixpkgs/python312Packages.azure-mgmt-keyvault | This is the Microsoft Azure Key Vault Management Client Library |
| packages/nixpkgs/maliit-keyboard | Virtual keyboard |
| packages/nixpkgs/python312Packages.keyring-pass | Password Store (pass) backend for python's keyring |
| packages/nixpkgs/keylight-cli | CLI tool to control Elgato Key Light devices |
| packages/nixpkgs/python312Packages.keyboard | Hook and simulate keyboard events on Windows and Linux |
| packages/nixpkgs/emacsPackages.helm-bibtexkey | |
| packages/nixpkgs/haskellPackages.data-map-multikey | Data |
| packages/nixpkgs/mldonkey | Client for many p2p networks, with multiple frontends |
| packages/nixpkgs/paperkey | Store OpenPGP or GnuPG on paper |
| packages/nixpkgs/emacsPackages.gnu-elpa-keyring-update | |
| packages/nixpkgs/texlivePackages.keyreader | A robust interface to xkeyval |
| packages/nixpkgs/rubyPackages.keystone-engine | |
| packages/nixpkgs/rubyPackages.cocoapods-keys | |
| packages/nixpkgs/texlivePackages.keystroke | Graphical representation of keys on keyboard |
| packages/nixpkgs/texlivePackages.edichokey | Typeset dichotomous identification keys |
| packages/nixpkgs/sbclPackages.incognito-keywords | |
| packages/nixpkgs/python313Packages.monkeyhex | Small library to assist users of the python shell who work in contexts where printed numbers are more usefully viewed in hexadecimal |
| packages/nixpkgs/python314Packages.monkeyhex | Small library to assist users of the python shell who work in contexts where printed numbers are more usefully viewed in hexadecimal |
| packages/nixpkgs/rPackages.tukeytrend | |
| packages/nixpkgs/keychain | Manage SSH and GPG keys in a convenient and secure manner |
| packages/nixpkgs/keystone | Lightweight multi-platform, multi-architecture assembler framework |
| packages/nixpkgs/python312Packages.keyutils | Set of python bindings for keyutils |
| packages/nixpkgs/keyfinder-cli | Musical key detection for digital audio (command-line tool) |
| packages/nixpkgs/python312Packages.nitrokey | Python SDK for Nitrokey devices |
| packages/nixpkgs/haskellPackages.crypto-pubkey-types | Generic cryptography Public keys algorithm types |
| packages/nixpkgs/nitrokey-udev-rules | udev rules for Nitrokey devices |
| packages/nixpkgs/haskellPackages.gi-keybinder | Libkeybinder bindings |
| packages/nixpkgs/python312Packages.azure-keyvault-nspkg | Microsoft Azure Key Vault Namespace Package [Internal] |
| packages/nixpkgs/python312Packages.keymap-drawer | Module and CLI tool to help parse and draw keyboard layouts |
| packages/nixpkgs/python312Packages.sshpubkeys | OpenSSH Public Key Parser for Python |
| packages/nixpkgs/python312Packages.pykeyatome | Python module to get data from Atome Key |
| packages/nixpkgs/python313Packages.onlykey-solo-python | Python library for OnlyKey with Solo FIDO2 |
| packages/nixpkgs/python314Packages.onlykey-solo-python | Python library for OnlyKey with Solo FIDO2 |
| packages/nixpkgs/emacsPackages.org-multiple-keymap | |
| packages/nixpkgs/python312Packages.keepkey-agent | Using KeepKey as hardware-based SSH/PGP agent |
| packages/nixpkgs/CuboCore.corekeyboard | Virtual keyboard for X11 from the C Suite |
| packages/nixpkgs/python313Packages.ctap-keyring-device | CTAP (client-to-authenticator-protocol) device backed by python's keyring library |
| packages/nixpkgs/python314Packages.ctap-keyring-device | CTAP (client-to-authenticator-protocol) device backed by python's keyring library |
| packages/nixpkgs/python312Packages.keyrings-alt | Alternate keyring implementations |
| packages/nixpkgs/emacsPackages.xterm-keybinder | |
| packages/nixpkgs/haskellPackages.openssh-github-keys | Fetch OpenSSH keys from a GitHub team |
| packages/nixpkgs/emacsPackages.keypress-multi-event | |
| packages/nixpkgs/nitrokey-app2 | This application allows to manage Nitrokey 3 devices |
| packages/nixpkgs/python313Packages.python-keycloak | Provides access to the Keycloak API |
| packages/nixpkgs/python314Packages.python-keycloak | Provides access to the Keycloak API |
| packages/nixpkgs/python313Packages.azure-keyvault-secrets | Microsoft Azure Key Vault Secrets Client Library for Python |
| packages/nixpkgs/python314Packages.azure-keyvault-secrets | Microsoft Azure Key Vault Secrets Client Library for Python |
| packages/nixpkgs/emacsPackages.monkeytype | |
| packages/nixpkgs/python313Packages.keystone-engine | Lightweight multi-platform, multi-architecture assembler framework |
| packages/nixpkgs/python314Packages.keystone-engine | Lightweight multi-platform, multi-architecture assembler framework |
| packages/nixpkgs/plasma5Packages.qtkeychain | Platform-independent Qt API for storing passwords securely |
| packages/nixpkgs/hockeypuck | OpenPGP Key Server |
| packages/nixpkgs/python312Packages.django-hierarkey | Flexible and powerful hierarchical key-value store for your Django models |
| packages/nixpkgs/python313Packages.py-dormakaba-dkey | Library to interact with a Dormakaba dkey lock |
| packages/nixpkgs/python314Packages.py-dormakaba-dkey | Library to interact with a Dormakaba dkey lock |
| packages/nixpkgs/python313Packages.proton-keyring-linux | ProtonVPN core component to access Linux's keyring |
| packages/nixpkgs/python314Packages.proton-keyring-linux | ProtonVPN core component to access Linux's keyring |
| packages/nixpkgs/perlPackages.SortKey | Fastest way to sort anything in Perl |
| packages/nixpkgs/python312Packages.ekey-bionyxpy | Interact with the bionyx third party API of the ekey biometric systems |
| packages/nixpkgs/home-assistant-custom-lovelace-modules.sankey-chart | Home Assistant lovelace card to display a sankey chart |
| packages/nixpkgs/screenkey | Screencast tool to display your keys inspired by Screenflick |
| packages/nixpkgs/xkeysnail | Yet another keyboard remapping tool for X environment |
| packages/nixpkgs/gnomeExtensions.vkeybind | No longer maintained. |
| packages/nixpkgs/perl5Packages.SortKey | Fastest way to sort anything in Perl |
| packages/nixpkgs/xbindkeys | Launch shell commands with your keyboard or your mouse under X Window |
| packages/nixpkgs/keymapviz | Qmk keymap.c visualizer |
| packages/nixpkgs/gnomeExtensions.happy-appy-hotkey | Assign hotkeys to applications to give them focus or launch them |
| packages/nixpkgs/python313Packages.pynitrokey | Python client for Nitrokey devices |
| packages/nixpkgs/python314Packages.pynitrokey | Python client for Nitrokey devices |
| packages/nixpkgs/keybinder3 | Library for registering global key bindings |
| packages/nixpkgs/haskellPackages.packed-multikey-map | Efficient “spreadsheet table” like maps with multiple marginals |
| packages/nixpkgs/deepin.dpa-ext-gnomekeyring | GNOME keyring extension for dde-polkit-agent |
| packages/nixpkgs/python314Packages.monkeytype | Python library that generates static type annotations by collecting runtime types |
| packages/nixpkgs/python313Packages.monkeytype | Python library that generates static type annotations by collecting runtime types |
| packages/nixpkgs/xchainkeys | Standalone X11 program to create chained key bindings |
| packages/nixpkgs/haskellPackages.polysemy-keyed-state | Effect for a set of stateful values indexed by a type of keys |
| packages/nixpkgs/texlivePackages.bracketkey | Produce bracketed identification keys |
| packages/nixpkgs/kodiPackages.jurialmunkey | Common code required by TMDbHelper and other related jurialmunkey add-ons |
| packages/nixpkgs/haskellPackages.keylayouts | Tools for macOS .keylayout files |
| packages/nixpkgs/python312Packages.monkeyhex | Small library to assist users of the python shell who work in contexts where printed numbers are more usefully viewed in hexadecimal |
| packages/nixpkgs/rPackages.hockeystick | |
| packages/nixpkgs/rPackages.sankeywheel | |
| packages/nixpkgs/python312Packages.azure-keyvault-secrets | Microsoft Azure Key Vault Secrets Client Library for Python |
| packages/nixpkgs/python312Packages.onlykey-solo-python | Python library for OnlyKey with Solo FIDO2 |
| packages/nixpkgs/haskellPackages.crypto-pubkey-openssh | OpenSSH keys decoder/encoder |
| packages/nixpkgs/python313Packages.mypy-boto3-keyspaces | Type annotations for boto3 keyspaces |
| packages/nixpkgs/python314Packages.mypy-boto3-keyspaces | Type annotations for boto3 keyspaces |
| packages/nixpkgs/sbclPackages.monkeylib-text-languages | |
| packages/nixpkgs/python312Packages.ctap-keyring-device | CTAP (client-to-authenticator-protocol) device backed by python's keyring library |
| packages/nixpkgs/age-plugin-yubikey | YubiKey plugin for age |
| packages/nixpkgs/aeskeyfind | Locates 128-bit and 256-bit AES keys in a captured memory image |
| packages/nixpkgs/python312Packages.python-keycloak | Provides access to the Keycloak API |
| packages/nixpkgs/haskellPackages.mono-traversable-keys | Type-classes for interacting with monomorphic containers with a key |
| packages/nixpkgs/ibus-engines.openbangla-keyboard | OpenSource, Unicode compliant Bengali Input Method |
| packages/nixpkgs/python312Packages.keystone-engine | Lightweight multi-platform, multi-architecture assembler framework |
| packages/nixpkgs/keychron-udev-rules | Keychron Keyboard Udev Rules, fixes issues with keyboard detection on Linux & permissions on Keychron Launcher |
| packages/nixpkgs/gnomeExtensions.keyboard-informer | Shows keyboard modifiers status and provides notifications for key state changes. |
| packages/nixpkgs/canokey-usbip | CanoKey USB/IP Virt Card |
| packages/nixpkgs/xf86-input-keyboard | Keyboard input driver for non-Linux platforms for the Xorg X server |
| packages/nixpkgs/yubikey-manager-qt | Cross-platform application for configuring any YubiKey over all USB interfaces |
| packages/nixpkgs/gnomeExtensions.layout-hotkeys | Add hotkeys to switch keyboard layout directly via Shift + Alt + [1-9]. |
| packages/nixpkgs/emacsPackages.keypression | |
| packages/nixpkgs/haskellPackages.keyvaluehash | Pure Haskell key/value store implementation |
| packages/nixpkgs/python312Packages.py-dormakaba-dkey | Library to interact with a Dormakaba dkey lock |
| packages/nixpkgs/python312Packages.proton-keyring-linux | ProtonVPN core component to access Linux's keyring |
| packages/nixpkgs/gnomeExtensions.monkeybar | See your weekly Monkeytype typing activity in top bar |
| packages/nixpkgs/gnomeExtensions.keyboard-reset | Reset keyboard to default layout on screensaver activation |
| packages/nixpkgs/keepass-otpkeyprov | |
| packages/nixpkgs/python312Packages.pynitrokey | Python client for Nitrokey devices |
| packages/nixpkgs/xorg.xf86inputkeyboard | |
| packages/nixpkgs/python312Packages.monkeytype | Python library that generates static type annotations by collecting runtime types |
| packages/nixpkgs/haskellPackages.openssl-createkey | Create OpenSSL keypairs |
| packages/nixpkgs/haskellPackages.commsec-keyexchange | Key agreement for commsec |
| packages/nixpkgs/texlivePackages.keytheorems | An l3keys interface to amsthm |
| packages/nixpkgs/terraform-providers.keycloak | |
| packages/nixpkgs/texlivePackages.skeycommand | Create commands using parameters and keyval in parallel |
| packages/nixpkgs/texlivePackages.keyvaltable | Re-usable table layouts separating content and presentation |
| packages/nixpkgs/python312Packages.mypy-boto3-keyspaces | Type annotations for boto3 keyspaces |
| packages/nixpkgs/libfakekey | X virtual keyboard library |
| packages/nixpkgs/rPackages.ggsankeyfier | |
| packages/nixpkgs/yubikey-manager | Command line tool for configuring any YubiKey over all USB transports |
| packages/nixpkgs/vscode-extensions.ms-toolsai.jupyter-keymap | |
| packages/nixpkgs/gnomeExtensions.hide-keyboard-layout | Hide keyboard layout indicator in status bar |
| packages/nixpkgs/wireguard-vanity-keygen | WireGuard vanity key generator |
| packages/nixpkgs/conkeyscan | Tool to scan Confluence for keywords |
| packages/nixpkgs/pynitrokey | Python client for Nitrokey devices |
| packages/nixpkgs/python313Packages.keyrings-cryptfile | Encrypted file keyring backend |
| packages/nixpkgs/python314Packages.keyrings-cryptfile | Encrypted file keyring backend |
| packages/nixpkgs/keyboard-layout-editor | Keyboard layout editor for XKB |
| packages/nixpkgs/wshowkeys | Displays keys being pressed on a Wayland session |
| packages/nixpkgs/gnomeExtensions.keyring-autolock | Show the keyring's locked state, and automatically lock it after a certain amount of time. |
| packages/nixpkgs/haskellPackages.amazonka-keyspaces | Amazon Keyspaces SDK |
| packages/nixpkgs/terraform-providers.keycloak_keycloak | |
| packages/nixpkgs/libnitrokey | Communicate with Nitrokey devices in a clean and easy manner |
| packages/nixpkgs/azure-sdk-for-cpp.security-keyvault-secrets | Azure Security Keyvault Secrets Package client library for C++ |
| packages/nixpkgs/vscode-extensions.vspacecode.whichkey | |
| packages/nixpkgs/xbindkeys-config | Graphical interface for configuring xbindkeys |
| packages/nixpkgs/pantheon.switchboard-plug-keyboard | Switchboard Keyboard Plug |
| packages/nixpkgs/libtermkey | Terminal keypress reading library |
| packages/nixpkgs/texlivePackages.kvdefinekeys | Define keys for use in the kvsetkeys package |
| packages/nixpkgs/texlivePackages.pgfkeysearch | Find keys in a given path 'recursively' |
| packages/nixpkgs/haskellPackages.yamlkeysdiff | Compares the keys from two yaml files |
| packages/nixpkgs/python312Packages.keyrings-cryptfile | Encrypted file keyring backend |
| packages/nixpkgs/gnomeExtensions.keylightd-control | Control keylightd via the GNOME Shell Quick Settings menu. |
| packages/nixpkgs/libgnome-keyring | Framework for managing passwords and other secrets |
| packages/nixpkgs/emacsPackages.minibuffer-modifier-keys | |
| packages/nixpkgs/gnomeExtensions.keyboard-accent-color-sync | Customization of the keyboard backlight via the quick access toolbar, with the ability to synchronize with the accent color selected in the system using OpenRGB |
| packages/nixpkgs/libyubikey | C library for manipulating Yubico YubiKey One-Time Passwords (OTPs) |
| packages/nixpkgs/vscode-extensions.smcpeak.default-keys-windows | VSCode extension that provides default Windows keybindings on any platform |
| packages/nixpkgs/pantheon.wingpanel-indicator-keyboard | Keyboard Indicator for Wingpanel |
| packages/nixpkgs/yubikey-touch-detector | Tool to detect when your YubiKey is waiting for a touch |
| packages/nixpkgs/libkeyfinder | Musical key detection for digital audio (C++ library) |
| packages/nixpkgs/prometheus-keylight-exporter | Prometheus exporter for Elgato Key Light devices |
| packages/nixpkgs/emacsPackages.keychain-environment | |
| packages/nixpkgs/libsForQt5.qtkeychain | Platform-independent Qt API for storing passwords securely |
| packages/nixpkgs/xkeyboard-config | Provides a consistent, well-structured, database of keyboard configuration data |
| packages/nixpkgs/python313Packages.azure-keyvault-certificates | Microsoft Azure Key Vault Certificates Client Library for Python |
| packages/nixpkgs/python314Packages.azure-keyvault-certificates | Microsoft Azure Key Vault Certificates Client Library for Python |
| packages/nixpkgs/emacsPackages.pager-default-keybindings | |
| packages/nixpkgs/python313Packages.keystoneauth1 | Authentication Library for OpenStack Identity |
| packages/nixpkgs/python314Packages.keystoneauth1 | Authentication Library for OpenStack Identity |
| packages/nixpkgs/cloudmonkey | CLI for Apache CloudStack |
| packages/nixpkgs/perl538Packages.SortKey | Fastest way to sort anything in Perl |
| packages/nixpkgs/perl540Packages.SortKey | Fastest way to sort anything in Perl |
| packages/nixpkgs/keystore-explorer | Open source GUI replacement for the Java command-line utilities keytool and jarsigner |
| packages/nixpkgs/azure-sdk-for-cpp.security-keyvault-certificates | Azure Key Vault Certificates client library for C++ |
| packages/nixpkgs/python312Packages.azure-keyvault-certificates | Microsoft Azure Key Vault Certificates Client Library for Python |
| packages/nixpkgs/haskellPackages.tls-sslkeylogfile | SSLKEYLOGFILE support for Haskell |
| packages/nixpkgs/python312Packages.keystoneauth1 | Authentication Library for OpenStack Identity |
| packages/nixpkgs/nitrokey-pro-firmware | Firmware for the Nitrokey Pro device |
| packages/nixpkgs/gnomeExtensions.application-hotkeys | Launch, show, and hide applications using hotkeys. |
| packages/nixpkgs/gnomeExtensions.keyboard-backlight-slider | Allow setting the keyboard backlight brightness with a slider in the main menu |
| packages/nixpkgs/gnomeExtensions.keyboard-modifiers-status | Shows keyboard modifiers status |
| packages/nixpkgs/rubyPackages.ruby2_keywords | |
| packages/nixpkgs/haskellPackages.abstractly-keyed-implicits | Manage the implicit parameter namespace dynamically at compile time |
| packages/nixpkgs/home-assistant-component-tests.ekeybionyx | Open source home automation that puts local control and privacy first |
| packages/nixpkgs/rubyPackages_3_1.ruby-keychain | |
| packages/nixpkgs/rubyPackages_3_2.ruby-keychain | |
| packages/nixpkgs/rubyPackages_3_5.ruby-keychain | |
| packages/nixpkgs/rubyPackages_4_0.ruby-keychain | |
| packages/nixpkgs/rubyPackages_3_3.ruby-keychain | |
| packages/nixpkgs/rubyPackages_3_4.ruby-keychain | |
| packages/nixpkgs/nitrokey-storage-firmware | Firmware for the Nitrokey Storage device |
| packages/nixpkgs/vscode-extensions.stephlin.vscode-tmux-keybinding | Simple extension for tmux behavior in vscode terminal |
| packages/nixpkgs/nitrokey-trng-rs232-firmware | Firmware for the Nitrokey TRNG RS232 device |
| packages/nixpkgs/showmethekey | Show keys you typed on screen |
| packages/nixpkgs/python313Packages.types-aiobotocore-keyspaces | Type annotations for aiobotocore keyspaces |
| packages/nixpkgs/python314Packages.types-aiobotocore-keyspaces | Type annotations for aiobotocore keyspaces |
| packages/nixpkgs/nitrokey-start-firmware | Firmware for the Nitrokey Start device |
| packages/nixpkgs/nitrokey-fido2-firmware | Firmware for the Nitrokey FIDO2 device |
| packages/nixpkgs/python313Packages.azure-keyvault-administration | Microsoft Azure Key Vault Administration Client Library for Python |
| packages/nixpkgs/python314Packages.azure-keyvault-administration | Microsoft Azure Key Vault Administration Client Library for Python |
| packages/nixpkgs/vscode-extensions.k--kato.intellij-idea-keybindings | Visual Studio Code extension for IntelliJ IDEA keybindings |
| packages/nixpkgs/rPackages.turkeyelections | |
| packages/nixpkgs/home-assistant-component-tests.keymitt_ble | Open source home automation that puts local control and privacy first |
| packages/nixpkgs/monkeysphere | Leverage the OpenPGP web of trust for SSH and TLS authentication |
| packages/nixpkgs/gnomeExtensions.prapor-keyboard-layout-indicator | Shows the current keyboard layout as a country flag in the top panel |
| packages/nixpkgs/python312Packages.types-aiobotocore-keyspaces | Type annotations for aiobotocore keyspaces |
| packages/nixpkgs/python312Packages.azure-keyvault-administration | Microsoft Azure Key Vault Administration Client Library for Python |
| packages/nixpkgs/rubyPackages_3_1.keystone-engine | |
| packages/nixpkgs/rubyPackages_3_2.cocoapods-keys | |
| packages/nixpkgs/rubyPackages_3_2.keystone-engine | |
| packages/nixpkgs/rubyPackages_3_1.cocoapods-keys | |
| packages/nixpkgs/python313Packages.python-keystoneclient | Client Library for OpenStack Identity |
| packages/nixpkgs/python314Packages.python-keystoneclient | Client Library for OpenStack Identity |
| packages/nixpkgs/rubyPackages_3_4.keystone-engine | |
| packages/nixpkgs/rubyPackages_3_3.cocoapods-keys | |
| packages/nixpkgs/rubyPackages_4_0.cocoapods-keys | |
| packages/nixpkgs/rubyPackages_4_0.keystone-engine | |
| packages/nixpkgs/rubyPackages_3_5.cocoapods-keys | |
| packages/nixpkgs/rubyPackages_3_5.keystone-engine | |
| packages/nixpkgs/rubyPackages_3_4.cocoapods-keys | |
| packages/nixpkgs/rubyPackages_3_3.keystone-engine | |
| packages/nixpkgs/gnomeExtensions.bandera-keyboard-layout-indicator | Shows the current keyboard layout as a country flag in the top panel |
| packages/nixpkgs/keyspersecond | Keys-per-second meter and counter for rhythm games |
| packages/nixpkgs/python312Packages.keyrings-passwordstore | Keyring backend for password-store |
| packages/nixpkgs/python313Packages.keyrings-passwordstore | Keyring backend for password-store |
| packages/nixpkgs/fcitx5-openbangla-keyboard | OpenSource, Unicode compliant Bengali Input Method |
| packages/nixpkgs/python312Packages.python-keystoneclient | Client Library for OpenStack Identity |
| packages/nixpkgs/gnomeExtensions.fnlock-switch-thinkpad-compact-usb-keyboard | FnLock switch for Lenovo ThinkPad Compact USB Keyboard and Lenovo ThinkPad Trackpoint Keyboard II |
| packages/nixpkgs/azure-sdk-for-cpp.security-keyvault-administration | Azure Security KeyVault Administration client library for C++ |
| packages/nixpkgs/kdePackages.qtvirtualkeyboard | Cross-platform application framework for C++ |
| packages/nixpkgs/qt6Packages.qtvirtualkeyboard | Cross-platform application framework for C++ |
| packages/nixpkgs/python313Packages.azure-keyvault-securitydomain | Microsoft Corporation Azure Keyvault Securitydomain Client Library for Python |
| packages/nixpkgs/python314Packages.azure-keyvault-securitydomain | Microsoft Corporation Azure Keyvault Securitydomain Client Library for Python |
| packages/nixpkgs/xkeyboard_config | Provides a consistent, well-structured, database of keyboard configuration data |
| packages/nixpkgs/tkey-verification | Vendor signing and user verification of TKey genuineness |
| packages/nixpkgs/python312Packages.azure-keyvault-securitydomain | Microsoft Corporation Azure Keyvault Securitydomain Client Library for Python |
| packages/nixpkgs/plasma5Packages.qtvirtualkeyboard | Cross-platform application framework for C++ |
| packages/nixpkgs/plasma5Packages.qt5.qtvirtualkeyboard | Cross-platform application framework for C++ |
| packages/nixpkgs/home-assistant-component-tests.dormakaba_dkey | Open source home automation that puts local control and privacy first |
| packages/nixpkgs/python313Packages.nskeyedunarchiver | Unserializes plist data into a usable Python dict |
| packages/nixpkgs/python314Packages.nskeyedunarchiver | Unserializes plist data into a usable Python dict |
| packages/nixpkgs/spidermonkey_91 | Mozilla's JavaScript engine written in C/C++ |
| packages/nixpkgs/evdevremapkeys | Daemon to remap events on linux input devices |
| packages/nixpkgs/python312Packages.nskeyedunarchiver | Unserializes plist data into a usable Python dict |
| packages/nixpkgs/spidermonkey_128 | Mozilla's JavaScript engine written in C/C++ |
| packages/nixpkgs/spidermonkey_140 | Mozilla's JavaScript engine written in C/C++ |
| packages/nixpkgs/spidermonkey_115 | Mozilla's JavaScript engine written in C/C++ |
| packages/nixpkgs/python314Packages.keyrings-google-artifactregistry-auth | Python package which allows you to configure keyring to interact with Python repositories stored in Artifact Registry |
| packages/nixpkgs/python313Packages.keyrings-google-artifactregistry-auth | Python package which allows you to configure keyring to interact with Python repositories stored in Artifact Registry |
| packages/nixpkgs/python312Packages.keyrings-google-artifactregistry-auth | Python package which allows you to configure keyring to interact with Python repositories stored in Artifact Registry |
| packages/nixpkgs/sbclPackages.com_dot_gigamonkeys_dot_json | |
| packages/nixpkgs/system76-keyboard-configurator | Keyboard configuration application for System76 keyboards and laptops |
| packages/nixpkgs/sbclPackages.com_dot_gigamonkeys_dot_prose-diff | |
| packages/nixpkgs/sbclPackages.com_dot_gigamonkeys_dot_parser | |
| packages/nixpkgs/sbclPackages.com_dot_gigamonkeys_dot_markup | |
| packages/nixpkgs/rubyPackages_3_1.ruby2_keywords | |
| packages/nixpkgs/rubyPackages_3_2.ruby2_keywords | |
| packages/nixpkgs/rubyPackages_3_5.ruby2_keywords | |
| packages/nixpkgs/rubyPackages_3_3.ruby2_keywords | |
| packages/nixpkgs/rubyPackages_4_0.ruby2_keywords | |
| packages/nixpkgs/rubyPackages_3_4.ruby2_keywords | |
| packages/nixpkgs/sbclPackages.com_dot_gigamonkeys_dot_binary-data | |
| packages/nixpkgs/yubikey-personalization | Library and command line tool to personalize YubiKeys |
| packages/nixpkgs/sbclPackages.com_dot_gigamonkeys_dot_test-framework | |
| packages/nixpkgs/keylight-controller-mschneider82 | Desktop application to control Elgato Keylights |
| packages/nixpkgs/yubikey-personalization-gui | QT based cross-platform utility designed to facilitate reconfiguration of the Yubikey |
| packages/nixpkgs/sbclPackages.com_dot_gigamonkeys_dot_macro-utilities | |
| packages/nixpkgs/qt6.qtvirtualkeyboard | Cross-platform application framework for C++ |
| packages/nixpkgs/qt5.qtvirtualkeyboard | Cross-platform application framework for C++ |
| packages/nixpkgs/libsForQt5.qtvirtualkeyboard | Cross-platform application framework for C++ |
| packages/nixpkgs/libsForQt5.qt5.qtvirtualkeyboard | Cross-platform application framework for C++ |
| packages/nixpkgs/sbclPackages.com_dot_gigamonkeys_dot_pathnames | |
| packages/nixpkgs/sbclPackages.com_dot_gigamonkeys_dot_utilities | |
| packages/nur/ataraxiasjel.kes | Key Managament Server for Object Storage and more |
| packages/nur/vladexa.arangodb | Native multi-model database with flexible data models for documents, graphs, and key-values |
| packages/nur/xyenon.yaziPlugins.yazi-rs.smart-enter | [`Open`][open] files or [`enter`][enter] directories all in one key |
| packages/nur/sikmir.kvtiles | Self hosted maps, PMTiles, MBTiles key value storage and server |
| packages/nur/xddxdd.edge-tts | Use Microsoft Edge's online text-to-speech service from Python WITHOUT needing Microsoft Edge or Windows or an API key |
| packages/nur/lonerOrz.wayclick | Low-latency key click sound engine using evdev + pygame |
| packages/nur/kokakiwi.agree | A CLI application that implements multi-key-turn security via Shamir's Secret Sharing |
| packages/nur/charmbracelet.skate | A personal key value store 🛼 |
| packages/nur/sikmir.libmdbx | Extremely fast, compact, powerful, embedded, transactional key-value database |
| packages/nur/xyenon.kvrocks | Distributed key value NoSQL database that uses RocksDB as storage engine and is compatible with Redis protocol |
| packages/nur/xddxdd.python3Packages.edge-tts | Use Microsoft Edge's online text-to-speech service from Python WITHOUT needing Microsoft Edge or Windows or an API key |
| packages/nur/xddxdd.pyosmocom | Python implementation of key Osmocom protocols/interfaces |
| packages/nur/moraxyc.boringssl-oqs | Fork of BoringSSL that includes prototype quantum-resistant key exchange and authentication in the TLS handshake based on liboqs |
| packages/nur/xddxdd.boringssl-oqs | Fork of BoringSSL that includes prototype quantum-resistant key exchange and authentication in the TLS handshake based on liboqs |
| packages/nur/xddxdd.python3Packages.pyosmocom | Python implementation of key Osmocom protocols/interfaces |
| packages/nur/xddxdd.uncategorized.boringssl-oqs | Fork of BoringSSL that includes prototype quantum-resistant key exchange and authentication in the TLS handshake based on liboqs |
| packages/nur/josh.restic-age-key | Use asymmetric age keys instead of a password on your restic repository |
| packages/nur/xddxdd.one-api | OpenAI key management & redistribution system, using a single API for all LLMs |
| packages/nur/rycee.firefox-addons.saka-key | A keyboard interface to the web |
| packages/nur/DanNixon.keyprs | A very barebones tool to backup secrets to paper. |
| packages/nur/oluceps.misskey | Please invoke this with flake input, not avaliable with nur.repos.me.* |
| packages/nur/aster-void.fcitx5-hazkey | Japanese input method for fcitx5, powered by azooKey engine |
| packages/nur/xddxdd.uncategorized.one-api | OpenAI key management & redistribution system, using a single API for all LLMs |
| packages/nur/crazazy.seamonkey | Seamonkey browser. |
| packages/nur/aster-void.fcitx5-hazkey-git | Japanese input method for fcitx5, powered by azooKey engine |
| packages/nur/oluceps.canokey-manager | Please invoke this with flake input, not avaliable with nur.repos.me.* |
| packages/nur/rycee.firefox-addons.keybase | A secure chat button for every profile. |
| packages/nur/linyinfeng.canokey-udev-rules | udev rules for CanoKey |
| packages/nur/rycee.firefox-addons.libkey-nomad | One-click access to millions of scholarly articles. |
| packages/nur/bbjubjub.mnemonikey | |
| packages/nur/mweinelt.hassLovelaceModules.ha-sankey-chart | A Home Assistant lovelace card to display a sankey chart |
| packages/nur/colinsane.pkgs.sane-scripts.secrets-update-keys | |
| packages/nur/wrvsrx.python3Packages.keymap-drawer | |
| packages/nur/AndrewKvalheim.ch57x-keyboard-tool | Command-line tool for programming ch57x keyboard |
| packages/nur/rycee.firefox-addons.shortkeys | Easily customizable custom keyboard shortcuts for Firefox |
| packages/nur/ocfox.showmethekey | Show keys you typed on screen |
| packages/nur/rycee.firefox-addons.firemonkey | Super Lightweight User Script and Style Manager |
| packages/nur/rycee.firefox-addons.surfingkeys | Rich shortcuts for you to click links / switch tabs / scroll pages or DIVs / capture full page or DIV etc, let you use the browser like vim, plus an embed vim editor.
https://github.com/brookhong/Surfingkeys |
| packages/nur/rycee.firefox-addons.tampermonkey | Tampermonkey is the world's most popular userscript manager. |
| packages/nur/rycee.firefox-addons.greasemonkey | Customize the way a web page displays or behaves, by using small bits of JavaScript. |
| packages/nur/dtomvan.violentmonkey | Violentmonkey provides userscripts support for browsers |
| packages/nur/rycee.firefox-addons.violentmonkey | Userscript support for browsers, open source. |
| packages/nur/fliegendewurst.microsoft-ergonomic-keyboard | A kernel module to fix the office key on MS ergonomic keyboards |