| options/home-manager/programs.bash.enableCompletion | Whether to enable Bash completion for all interactive Bash shells
|
| options/nixos/programs.steam.package | The Steam package to use
|
| options/nixos/services.hylafax.userAccessFile | The hosts.hfaxd
file entry in the spooling area
will be symlinked to the location given here
|
| options/nixos/programs.git.lfs.enablePureSSHTransfer | Whether to enable Enable pure SSH transfer in server side by adding git-lfs-transfer to environment.systemPackages.
|
| options/nixos/services.gitlab-runner.extraPackages | Extra packages to add to PATH for the gitlab-runner process
|
| options/nixos/services.swapspace.installWrapper | This will add swapspace wrapped with the generated config, to environment.systemPackages
|
| options/nixos/documentation.enable | Whether to install documentation of packages from
environment.systemPackages into the generated system path
|
| options/darwin/documentation.enable | Whether to install documentation of packages from
environment.systemPackages into the generated system path
|
| options/nixos/services.alloy.configPath | Alloy configuration file/directory path
|
| options/nixos/services.mqtt2influxdb.mqtt.password | MQTT password
|
| options/nixos/programs.steam.gamescopeSession.env | Environmental variables to be passed to GameScope for the session.
|
| options/nixos/services.maddy.secrets | A list of files containing the various secrets
|
| options/nixos/services.mqtt2influxdb.influxdb.password | Password for InfluxDB login
|
| options/nixos/programs.steam.extraCompatPackages | Extra packages to be used as compatibility tools for Steam on Linux
|
| options/nixos/hardware.nvidia.prime.offload.enableOffloadCmd | Whether to enable adding a nvidia-offload convenience script to environment.systemPackages
for offloading programs to an nvidia device
|
| options/nixos/services.atuin.database.uri | URI to the database
|
| options/nixos/services.eintopf.secrets | A list of files containing the various secrets
|
| options/nixos/services.evcc.settings | evcc configuration as a Nix attribute set
|
| options/nixos/services.vmagent.checkConfig | Check configuration
|
| options/nixos/services.pomerium.secretsFile | Path to file containing secrets for Pomerium, in systemd
EnvironmentFile format
|
| options/nixos/services.rspamd-trainer.secrets | A list of files containing the various secrets
|
| options/nixos/services.duplicity.secretFile | Path of a file containing secrets (gpg passphrase, access key...) in
the format of EnvironmentFile as described by
systemd.exec(5)
|
| options/nixos/services.ipfs-cluster.secretFile | File containing the cluster secret in the format of EnvironmentFile as described by
systemd.exec(5)
|
| options/nixos/programs.opengamepadui.gamescopeSession.env | Environmental variables to be passed to GameScope for the session.
|
| options/nixos/services.minio.rootCredentialsFile | File containing the MINIO_ROOT_USER, default is "minioadmin", and
MINIO_ROOT_PASSWORD (length >= 8), default is "minioadmin"; in the format of
an EnvironmentFile=, as described by systemd.exec(5).
|
| options/nixos/services.prefect.databasePasswordFile | path to a file containing e.g.:
DBPASSWORD=supersecret
stored outside the nix store, read by systemd as EnvironmentFile.
|
| options/nixos/services.mealie.credentialsFile | File containing credentials used in mealie such as POSTGRES_PASSWORD
or sensitive LDAP options
|
| options/nixos/services.pyload.credentialsFile | File containing PYLOAD_DEFAULT_USERNAME and
PYLOAD_DEFAULT_PASSWORD in the format of an EnvironmentFile=,
as described by systemd.exec(5)
|
| options/nixos/services.traccar.settings | config.xml configuration as a Nix attribute set
|
| options/nixos/services.mautrix-signal.settings | config.yaml configuration as a Nix attribute set
|
| options/nixos/services.firefox-syncserver.secrets | A file containing the various secrets
|
| options/nixos/services.mautrix-telegram.settings | config.yaml configuration as a Nix attribute set
|
| options/nixos/boot.isNspawnContainer | Whether the machine is running in an nspawn container
|
| options/nixos/services.rmfakecloud.extraSettings | Extra settings in the form of a set of key-value pairs
|
| options/nixos/services.miniflux.adminCredentialsFile | File containing the ADMIN_USERNAME and
ADMIN_PASSWORD (length >= 6) in the format of
an EnvironmentFile=, as described by systemd.exec(5).
|
| options/nixos/services.mautrix-whatsapp.settings | config.yaml configuration as a Nix attribute set
|
| options/nixos/services.mautrix-meta.instances.<name>.settings | config.yaml configuration as a Nix attribute set
|
| options/nixos/services.wstunnel.clients.<name>.httpProxy | Proxy to use to connect to the wstunnel server (USER:PASS@HOST:PORT).
Passwords specified here will be world-readable in the Nix store!
To pass a password to the service, point the environmentFile option
to a file containing PROXY_PASSWORD=<your-password-here> and set
this option to <user>:$PROXY_PASSWORD@<host>:<port>
|
| options/nixos/services.nextcloud-whiteboard-server.secrets | A list of files containing the various secrets
|
| options/nixos/services.mattermost.database.password | Password for local Mattermost database user
|
| options/nixos/services.icecream.daemon.user | User to run the icecream daemon as
|
| options/nixos/xdg.portal.extraPortals | List of additional portals to add to path
|
| options/nixos/programs.nm-applet.indicator | Whether to use indicator instead of status icon
|
| options/nixos/services.geoclue2.enableDemoAgent | Whether to use the GeoClue demo agent
|
| options/nixos/programs.dms-shell.systemd.target | The systemd target that will automatically start the DankMaterialShell service
|
| options/nixos/services.icecream.daemon.cacheLimit | Maximum size in Megabytes of cache used to store compile environments of compile clients.
|
| options/nixos/hardware.graphics.enable | Whether to enable hardware accelerated graphics drivers
|
| options/nixos/services.prometheus.exporters.pve.configFile | Path to the service's config file
|
| options/nixos/services.matrix-appservice-discord.settings | config.yaml configuration as a Nix attribute set
|
| options/nixos/services.victoriametrics.checkConfig | Check configuration
|
| options/nixos/services.prometheus.alertmanager.checkConfig | Check configuration with amtool check-config
|
| options/nixos/services.wstunnel.clients.<name>.upgradeCredentials | Use these credentials to authenticate during the HTTP upgrade request
(Basic authorization type, USER:[PASS]).
Passwords specified here will be world-readable in the Nix store!
To pass a password to the service, point the environmentFile option
to a file containing HTTP_PASSWORD=<your-password-here> and set this
option to <user>:$HTTP_PASSWORD
|
| options/nixos/services.icecream.daemon.schedulerHost | Explicit scheduler hostname, useful in firewalled environments
|
| options/home-manager/services.gpg-agent.noAllowExternalCache | Tell Pinentry not to enable features which use an external cache for
passphrases
|
| options/nixos/services.easytier.instances.<name>.settings.network_secret | EasyTier network credential used for verification and
encryption
|
| options/nixos/services.livekit.settings.rtc.use_external_ip | When set to true, attempts to discover the host's public IP via STUN
|
| options/nixos/services.headscale.settings.database.sqlite.write_ahead_log | Enable WAL mode for SQLite
|
| options/nixos/services.livekit.ingress.settings.rtc_config.use_external_ip | When set to true, attempts to discover the host's public IP via STUN
|
| options/nixos/virtualisation.xen.store.settings.conflict.rateLimitIsAggregate | If the conflict.rateLimitIsAggregate option is true, then after each
tick one point of conflict-credit is given to just one domain: the
one at the front of the queue
|
| packages/nixpkgs/forgejo | Self-hosted lightweight software forge |
| packages/nixpkgs/forgejo-lts | Self-hosted lightweight software forge |
| packages/nixpkgs/ectool | Dump the RAM of a laptop's Embedded/Environmental Controller (EC) |
| packages/nixpkgs/materialize | Streaming SQL materialized view engine for real-time applications |
| packages/nixpkgs/coder | Provision remote development environments via Terraform |
| packages/nixpkgs/pmix | Process Management Interface for HPC environments |
| packages/nixpkgs/itsx | Improved software detection and extraction of ITS1 and ITS2 from ribosomal ITS sequences of fungi and other eukaryotes for use in environmental sequencing |
| packages/nixpkgs/typstPackages.vienna-tech | An unofficial template for writing thesis at the TU Wien civil- and environmental engineering faculty |
| packages/nixpkgs/texlivePackages.newenviron | Processing an environment's body |
| packages/nixpkgs/envconsul | Read and set environmental variables for processes from Consul |
| packages/nixpkgs/typstPackages.vienna-tech_1_1_0 | An unofficial template for writing thesis at the TU Wien civil- and environmental engineering faculty |
| packages/nixpkgs/typstPackages.vienna-tech_0_1_0 | An unofficial template for writing thesis at the TU Wien civil- and environmental engineering faculty |
| packages/nixpkgs/typstPackages.vienna-tech_0_1_2 | An unofficial template for writing thesis at the TU Wien civil- and environmental engineering faculty |
| packages/nixpkgs/typstPackages.vienna-tech_0_1_1 | An unofficial template for writing thesis at the TU Wien civil- and environmental engineering faculty |
| packages/nixpkgs/typstPackages.vienna-tech_0_1_3 | An unofficial template for writing thesis at the TU Wien civil- and environmental engineering faculty |
| packages/nixpkgs/typstPackages.vienna-tech_1_0_0 | An unofficial template for writing thesis at the TU Wien civil- and environmental engineering faculty |
| packages/nixpkgs/ciel | Tool for controlling AOSC OS packaging environments using multi-layer filesystems and containers |
| packages/nixpkgs/pipx | Install and run Python applications in isolated environments |
| packages/nixpkgs/rye | Tool to easily manage python dependencies and environments |
| packages/nixpkgs/typstPackages.ergo | Customizable environments for note taking and homework assignments, designed for students in math, CS and physics |
| packages/nixpkgs/runapp | Application runner for Linux desktop environments that integrate with systemd |
| packages/nixpkgs/pip-audit | Tool for scanning Python environments for known vulnerabilities |
| packages/nixpkgs/aws-vault | Vault for securely storing and accessing AWS credentials in development environments |
| packages/nixpkgs/canta-theme | Flat Design theme for GTK based desktop environments |
| packages/nixpkgs/toast | Containerize your development and continuous integration environments |
| packages/nixpkgs/vagrant | Tool for building complete development environments |
| packages/nixpkgs/typstPackages.thmbox | Creating beautiful theorem environments in typst with ease |
| packages/nixpkgs/ddev | Docker-based local PHP+Node.js web development environments |
| packages/nixpkgs/typstPackages.frame-it | Beautiful, flexible, and integrated |
| packages/nixpkgs/pixi-pack | Pack and unpack conda environments created with pixi |
| packages/nixpkgs/repro-env | Dependency lockfiles for reproducible build environments |
| packages/nixpkgs/rocmPackages.rdc | Simplifies administration and addresses infrastructure challenges in cluster and datacenter environments |
| packages/nixpkgs/cyclone | Library of PureData classes, bringing some level of compatibility between Max/MSP and Pd environments |
| packages/nixpkgs/pulumi-esc | Pulumi ESC (Environments, Secrets, and Configuration) for cloud applications and infrastructure |
| packages/nixpkgs/toolbox | Tool for containerized command line environments on Linux |
| packages/nixpkgs/devenv | Fast, Declarative, Reproducible, and Composable Developer Environments |
| packages/nixpkgs/jumppad | Tool for building modern cloud native development environments |
| packages/nixpkgs/orchis-theme | Material Design theme for GNOME/GTK based desktop environments |
| packages/nixpkgs/novops | Cross-platform secret & config manager for development and CI environments |
| packages/nixpkgs/typstPackages.theofig | Simple theorem environments based on std.figure |
| packages/nixpkgs/kubeone | Automate cluster operations on all your cloud, on-prem, edge, and IoT environments |