| options/home-manager/programs.vicinae.extensions | List of Vicinae extensions to install
|
| packages/nixpkgs/amber-secret | Manage secret values in-repo via public key cryptography |
| packages/nixpkgs/git-fast-export | Import mercurial into git |
| packages/nixpkgs/cagebreak | Wayland tiling compositor inspired by ratpoison |
| packages/nixpkgs/githooks | Git hooks manager with per-repo and shared Git hooks including version control |
| packages/nixpkgs/typstPackages.lasaveur | Porting vim-latex's math shorthands to Typst |
| packages/nixpkgs/deepin.dde-qt-dbus-factory | Repo of auto-generated D-Bus source code which DDE used |
| packages/nixpkgs/star-history | Command line program to generate a graph showing number of GitHub stars of a user, org or repo over time |
| packages/nixpkgs/python313Packages.whey | Simple Python wheel builder for simple projects |
| packages/nixpkgs/python314Packages.whey | Simple Python wheel builder for simple projects |
| options/nixos/services.sourcehut.settings."hg.sr.ht".changegroup-script | A changegroup script which is installed in every mercurial repo
|
| options/nixos/services.opkssh.authorizations.*.principal | Principal identifier (email, repo, etc.)
|
| packages/nixpkgs/python313Packages.whey-pth | Extension to whey to support .pth files |
| packages/nixpkgs/python314Packages.whey-pth | Extension to whey to support .pth files |
| options/nixos/services.prometheus.exporters.ecoflow.ecoflowEmailFile | Path to the file with your personal ecoflow app login email address
|
| packages/nixpkgs/python313Packages.dist-meta | Parse and create Python distribution metadata |
| packages/nixpkgs/python314Packages.dist-meta | Parse and create Python distribution metadata |
| packages/nixpkgs/kubo-migrator | Run the appropriate migrations for migrating the filesystem repository of Kubo |
| options/nixos/services.prometheus.exporters.ecoflow.ecoflowAccessKeyFile | Path to the file with your personal api access string from the Ecoflow development website https://developer-eu.ecoflow.com
|
| options/nixos/services.prometheus.exporters.ecoflow.ecoflowSecretKeyFile | Path to the file with your personal api secret string from the Ecoflow development website https://developer-eu.ecoflow.com
|
| packages/nixpkgs/world-serpant-search | Command-line tool for vulnerability detection |
| options/nixos/services.prometheus.exporters.ecoflow.ecoflowPasswordFile | Path to the file with your personal ecoflow app login email password
|
| packages/nixpkgs/python312Packages.whey | Simple Python wheel builder for simple projects |
| packages/nixpkgs/emacsPackages.erk | |
| packages/nixpkgs/python312Packages.whey-pth | Extension to whey to support .pth files |
| packages/nixpkgs/cdimgtools | Tools to inspect and manipulate CD/DVD optical disc images |
| packages/nixpkgs/python313Packages.fschat | Open platform for training, serving, and evaluating large language models |
| packages/nixpkgs/python314Packages.fschat | Open platform for training, serving, and evaluating large language models |
| options/nixos/services.prometheus.exporters.ecoflow.ecoflowDevicesFile | File must contain one line, example: R3300000,R3400000,NC430000,...
|
| packages/nixpkgs/python312Packages.dist-meta | Parse and create Python distribution metadata |
| packages/nixpkgs/blackbox | Safely store secrets in a VCS repo |
| packages/nixpkgs/svn-all-fast-export | Fast-import based converter for an svn repo to git repos |
| options/nixos/services.prometheus.exporters.ecoflow.ecoflowDevicesPrettyNamesFile | File must contain one line, example: {"R3300000":"Delta 2","R3400000":"Delta Pro",...}
The key/value map of custom names for your devices
|
| packages/nixpkgs/python312Packages.fschat | Open platform for training, serving, and evaluating large language models |
| packages/nixpkgs/kubo-migrator-unwrapped | Run the appropriate migrations for migrating the filesystem repository of Kubo (migrations not included) |
| options/nixos/services.github-runners.<name>.tokenFile | The full path to a file which contains either
- a fine-grained personal access token (PAT),
- a classic PAT
- or a runner registration token
Changing this option or the tokenFile’s content triggers a new runner registration
|
| packages/nixpkgs/haskellPackages.git-embed | Use TH to embed Git repo information |
| packages/nixpkgs/typstPackages.lasaveur_0_1_4 | Porting vim-latex's math shorthands to Typst |
| packages/nixpkgs/typstPackages.lasaveur_0_1_3 | Porting vim-latex's math shorthands to Typst |
| packages/nixpkgs/haskellPackages.cabalg | alias for cabal install from given git repo |
| options/darwin/services.github-runners.<name>.tokenFile | The full path to a file which contains either
- a fine-grained personal access token (PAT),
- a classic PAT
- or a runner registration token
Changing this option or the tokenFile’s content triggers a new runner registration
|
| options/nixos/services.grafana.settings.security.content_security_policy_report_only | Set to true to add the Content-Security-Policy-Report-Only header to your requests
|
| packages/nixpkgs/git-relevant-history | Extract only relevant history from git repo |
| packages/nixpkgs/python313Packages.pyproject-parser | Parser for ‘pyproject.toml’ |
| packages/nixpkgs/python313Packages.bundlewrap-pass | Use secrets from pass in your BundleWrap repo |
| packages/nixpkgs/python314Packages.pyproject-parser | Parser for ‘pyproject.toml’ |
| packages/nixpkgs/python314Packages.bundlewrap-pass | Use secrets from pass in your BundleWrap repo |
| packages/nixpkgs/haskellPackages.infer-upstream | Find the repository from where a given repo was forked |
| packages/nixpkgs/python312Packages.pyproject-parser | Parser for ‘pyproject.toml’ |
| packages/nixpkgs/python312Packages.bundlewrap-pass | Use secrets from pass in your BundleWrap repo |
| packages/nixpkgs/git-extras | GIT utilities -- repo summary, repl, changelog population, author commit percentages and more |
| packages/nixpkgs/python313Packages.bundlewrap-keepass | Use secrets from keepass in your BundleWrap repo |
| packages/nixpkgs/python314Packages.bundlewrap-keepass | Use secrets from keepass in your BundleWrap repo |
| packages/nixpkgs/python312Packages.bundlewrap-keepass | Use secrets from keepass in your BundleWrap repo |
| packages/nixpkgs/python313Packages.bundlewrap-teamvault | Pull secrets from TeamVault into your BundleWrap repo |
| packages/nixpkgs/python314Packages.bundlewrap-teamvault | Pull secrets from TeamVault into your BundleWrap repo |
| packages/nixpkgs/python313Packages.hatch-requirements-txt | Hatchling plugin to read project dependencies from requirements.txt |
| packages/nixpkgs/python314Packages.hatch-requirements-txt | Hatchling plugin to read project dependencies from requirements.txt |
| packages/nixpkgs/python312Packages.bundlewrap-teamvault | Pull secrets from TeamVault into your BundleWrap repo |
| packages/nixpkgs/python312Packages.hatch-requirements-txt | Hatchling plugin to read project dependencies from requirements.txt |
| packages/nixpkgs/python313Packages.setuptools-git-versioning | Use git repo data (latest tag, current commit hash, etc) for building a version number according PEP-440 |
| packages/nixpkgs/python314Packages.setuptools-git-versioning | Use git repo data (latest tag, current commit hash, etc) for building a version number according PEP-440 |
| packages/nixpkgs/python312Packages.setuptools-git-versioning | Use git repo data (latest tag, current commit hash, etc) for building a version number according PEP-440 |
| packages/nixpkgs/nodePackages."@microsoft/rush" | A professional solution for consolidating all your JavaScript projects in one Git repo |
| packages/nixpkgs/nodePackages_latest."@microsoft/rush" | A professional solution for consolidating all your JavaScript projects in one Git repo |
| options/nixos/services.gitDaemon.exportAll | Publish all directories that look like Git repositories (have the objects
and refs subdirectories), even if they do not have the git-daemon-export-ok file
|
| options/nixos/services.cgit.<name>.gitHttpBackend.checkExportOkFiles | Whether git-http-backend should only export repositories that contain a git-daemon-export-ok file
|
| options/nixos/services.restic.server.privateRepos | Enable private repos
|
| options/nixos/services.gitDaemon.enable | Enable Git daemon, which allows public hosting of git repositories
without any access controls
|
| options/nixos/services.pgbackrest.settings | An attribute set of options as described in:
https://pgbackrest.org/configuration.html
All globally available options, i.e. all except stanza options, can be used
|
| options/nixos/services.cgit.<name>.gitHttpBackend.enable | Whether to bypass cgit and use git-http-backend for HTTP clones
|
| options/nixos/services.pgbackrest.commands.help | Options for the 'help' command
|
| options/nixos/services.pgbackrest.commands.info | Options for the 'info' command
|
| options/nixos/services.pgbackrest.commands.stop | Options for the 'stop' command
|
| options/nixos/services.pgbackrest.commands.check | Options for the 'check' command
|
| options/nixos/services.pgbackrest.commands.start | Options for the 'start' command
|
| options/nixos/services.docuum.keep | Prevents deletion of images for which repository:tag matches the specified regex.
|
| options/nixos/services.pgbackrest.commands.server | Options for the 'server' command
|
| options/nixos/services.pgbackrest.commands.backup | Options for the 'backup' command
|
| options/nixos/services.pgbackrest.commands.verify | Options for the 'verify' command
|
| options/nixos/services.pgbackrest.commands.expire | Options for the 'expire' command
|
| options/nixos/services.pgbackrest.commands.server-ping | Options for the 'server-ping' command
|
| options/nixos/services.pgbackrest.commands.version | Options for the 'version' command
|
| options/nixos/services.pgbackrest.commands.restore | Options for the 'restore' command
|
| options/nixos/services.pgbackrest.commands.archive-get | Options for the 'archive-get' command
|
| options/nixos/services.pgbackrest.commands.archive-push | Options for the 'archive-push' command
|
| options/nixos/services.pgbackrest.stanzas.<name>.settings | An attribute set of options as described in:
https://pgbackrest.org/configuration.html
All options can be used
|
| options/nixos/services.pgbackrest.commands.annotate | Options for the 'annotate' command
|
| options/nixos/services.pgbackrest.commands.stanza-delete | Options for the 'stanza-delete' command
|
| options/nixos/services.pgbackrest.commands.stanza-create | Options for the 'stanza-create' command
|
| options/nixos/services.pgbackrest.commands.stanza-upgrade | Options for the 'stanza-upgrade' command
|
| options/nixos/services.prometheus.exporters.dmarc.deduplicationMaxSeconds | How long individual report IDs will be remembered to avoid
counting double delivered reports twice.
|
| options/nixos/services.tlsrpt.collectd.extraFlags | List of extra flags to pass to the tlsrpt-reportd executable
|
| options/nixos/services.tlsrpt.package | The tlsrpt-reporter package to use.
|
| options/nixos/services.foldingathome.user | The user associated with the reported computation results
|
| options/nixos/services.taskserver.allowedClientIDs | A list of regular expressions that are matched against the reported
client id (such as task 2.3.0)
|
| options/nixos/services.librespeed.frontend.useNginx | Configure nginx for the LibreSpeed frontend
|
| options/nixos/services.foldingathome.team | The team ID associated with the reported computation results
|
| options/nixos/services.self-deploy.nixFile | Path to nix file in repository
|
| options/nixos/services.taskserver.disallowedClientIDs | A list of regular expressions that are matched against the reported
client id (such as task 2.3.0)
|