| options/nixos/services.grafana.provision.alerting.contactPoints.path | Path to YAML contact points configuration
|
| options/nixos/services.lubelogger.environmentFile | Path to a file containing extra LubeLogger config options in the systemd EnvironmentFile format
|
| options/nixos/services.gitolite.extraGitoliteRc | Extra configuration to append to the default ~/.gitolite.rc
|
| options/nixos/services.grafana.provision.alerting.templates.path | Path to YAML templates configuration
|
| options/nixos/services.tarsnap.keyfile | The keyfile which associates this machine with your tarsnap
account
|
| options/nixos/services.teeworlds.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.veilid.settings.core.capabilities.disable | A list of capabilities to disable (for example, DHTV to say you cannot store DHT information).
|
| options/nixos/services.sourcehut.settings.webhooks.private-key | An absolute file path (which should be outside the Nix-store)
to a base64-encoded Ed25519 key for signing webhook payloads
|
| options/nixos/services.transmission.credentialsFile | Path to a JSON file to be merged with the settings
|
| options/nixos/services.dendrite.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/darwin/services.buildkite-agents.<name>.hooks.environment | The environment hook will run before all other commands, and can be used
to set up secrets, data, etc
|
| options/darwin/services.github-runners | Multiple GitHub Runners
|
| options/nixos/services.journald.rateLimitBurst | Configures the rate limiting burst limit (number of messages per
interval) that is applied to all messages generated on the system
|
| options/nixos/services.mattermost.database.fromEnvironment | Use services.mattermost.environmentFile to configure the database instead of writing the database URI
to the Nix store
|
| options/nixos/services.journald.remote.settings.Remote.ServerKeyFile | A path to a SSL secret key file in PEM format
|
| options/nixos/services.grafana.settings.security.secret_key | Secret key used for signing
|
| options/nixos/services.prometheus.exporters.deluge.delugePassword | Password to connect to deluge server
|
| options/nixos/services.peering-manager.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.prometheus.exporters.buildkite-agent.tokenPath | The token from your Buildkite "Agents" page
|
| options/nixos/virtualisation.credentials.<name>.text | Text content of the credential
|
| options/home-manager/services.activitywatch.watchers | Watchers to be included with the service alongside with their
configuration
|
| options/nixos/services.mattermost.environmentFile | Environment file (see systemd.exec(5)
"EnvironmentFile=" section for the syntax) which sets config options
for mattermost (see the Mattermost documentation)
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.cacert | Path to CA bundle file (PEM/X509)
|
| options/nixos/systemd.services.<name>.confinement.packages | Additional packages or strings with context to add to the closure of
the chroot
|
| options/nixos/services.fluent-bit.configurationFile | Fluent Bit configuration
|
| options/nixos/services.prometheus.exporters.mqtt.environmentFile | File to load as environment file
|
| options/nixos/virtualisation.fileSystems.<name>.neededForBoot | If set, this file system will be mounted in the initial ramdisk
|
| options/nixos/services.borgbackup.jobs.<name>.encryption.passphrase | The passphrase the backups are encrypted with
|
| options/nixos/services.prometheus.alertmanager-ntfy.extraConfigFiles | Config files to merge into the settings defined in services.prometheus.alertmanager-ntfy.settings
|
| options/nixos/services.magnetico.web.credentials | The credentials to access the web interface, in case authentication is
enabled, in the format username:hash
|
| options/nixos/services.mqtt2influxdb.environmentFiles | File to load as environment file
|
| options/nixos/services.opentelemetry-collector.validateConfigFile | Whether to enable Validate configuration file.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.password | The password for this entry
|
| options/nixos/services.geoipupdate.settings.DatabaseDirectory | The directory to store the database files in
|
| options/nixos/services.wstunnel.clients.<name>.upgradeCredentials | Use these credentials to authenticate during the HTTP upgrade request
(Basic authorization type, USER:[PASS]).
Passwords specified here will be world-readable in the Nix store!
To pass a password to the service, point the environmentFile option
to a file containing HTTP_PASSWORD=<your-password-here> and set this
option to <user>:$HTTP_PASSWORD
|
| options/nixos/services.vaultwarden.environmentFile | Additional environment file or files as defined in systemd.exec(5)
|
| options/nixos/services.litestream.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.gitlab.secrets.activeRecordDeterministicKeyFile | A file containing the secret used to encrypt some rails data in a deterministic way
in the DB
|
| options/nixos/services.fastnetmon-advanced.enableAdvancedTrafficPersistence | Store historical flow data in clickhouse
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.id | A unique identifier for this authentication token
|
| options/nixos/services.prometheus.exporters.restic.rcloneConfig | Configuration for the rclone remote being used for backup
|
| options/nixos/services.authelia.instances.<name>.environmentVariables | Additional environment variables to provide to authelia
|
| options/nixos/services.nipap.settings.auth.auth_cache_timeout | Seconds to store cached auth entries for.
|
| options/nixos/services.prometheus.exporters.snmp.environmentFile | EnvironmentFile as defined in systemd.exec(5)
|
| options/nixos/virtualisation.oci-containers.containers.<name>.volumes | List of volumes to attach to this container
|
| options/nixos/services.amazon-cloudwatch-agent.configurationFile | Amazon CloudWatch Agent configuration file
|
| options/nixos/services.prometheus.exporters.pgbouncer.connectionString | Connection string for accessing pgBouncer
|
| options/nixos/services.prometheus.exporters.php-fpm.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.amazon-cloudwatch-agent.commonConfigurationFile | Amazon CloudWatch Agent common configuration
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.wpaPasswordFile | Sets the password for WPA-PSK
|
| options/nixos/services.nextcloud.config.objectstore.s3.verify_bucket_exists | Create the objectstore bucket if it does not exist.
|
| options/nixos/services.gitlab-runner.services.<name>.registrationConfigFile | Absolute path to a file with environment variables
used for gitlab-runner registration with runner registration
tokens
|
| options/nixos/services.prometheus.exporters.postgres.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.gitlab-runner.services.<name>.authenticationTokenConfigFile | Absolute path to a file containing environment variables used for
gitlab-runner registrations with runner authentication tokens
|
| options/nixos/services.grafana.provision.datasources.settings.datasources.*.secureJsonData | Datasource specific secure configuration
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords | Sets allowed passwords for WPA3-SAE
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.wpaPassword | Sets the password for WPA-PSK that will be converted to the pre-shared key
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswordsFile | Sets the password for WPA3-SAE
|
| options/nixos/users.users.<name>.initialPassword | Specifies the initial password for the user, i.e. the
password assigned if the user does not already exist
|
| options/nixos/users.extraUsers.<name>.initialPassword | Specifies the initial password for the user, i.e. the
password assigned if the user does not already exist
|
| options/nixos/services.veilid.settings.core.protected_store.allow_insecure_fallback | If we can't use system-provided secure storage, should we proceed anyway?
|
| options/nixos/services.sourcehut.settings."hg.sr.ht".clone_bundle_threshold | .hg/store size (in MB) past which the nightly job generates clone bundles.
|
| options/nixos/services.nixseparatedebuginfod2.substituters | nix substituter to fetch debuginfo from
|
| options/nixos/services.veilid.settings.core.protected_store.always_use_insecure_storage | Should we bypass any attempt to use system-provided secure storage?
|
| packages/nixpkgs/mas | Mac App Store command line interface |
| packages/nixpkgs/steam | Digital distribution platform |
| packages/nixpkgs/enpass-mac | Choose your own safest place to store passwords |
| packages/nixpkgs/garnet | Remote cache-store from Microsoft Research |
| packages/nixpkgs/ocs-url | Open Collaboration System for use with DE store websites |
| packages/nixpkgs/etcd | Distributed reliable key-value store for the most critical data of a distributed system |
| packages/nixpkgs/git-publish | Prepare and store patch revisions as git tags |
| packages/nixpkgs/hbase2 | Distributed, scalable, big data store |
| packages/nixpkgs/wofi-pass | Script to make wofi work with password-store |
| packages/nixpkgs/rofi-pass | Script to make rofi work with password-store |
| packages/nixpkgs/c2fmzq | Securely encrypt, store, and share files, including but not limited to pictures and videos |
| packages/nixpkgs/gokey | Vault-less password store |
| packages/nixpkgs/ssmsh | Interactive shell for AWS Parameter Store |
| packages/nixpkgs/bazaar | FlatHub-first app store for GNOME |
| packages/nixpkgs/serigy | Store important information from your clipboard selectively and securely |
| packages/nixpkgs/skate | Personal multi-machine syncable key value store |
| packages/nixpkgs/nix-du | Tool to determine which gc-roots take space in your nix store |
| packages/nixpkgs/nix-web | Web interface for the Nix store |
| packages/nixpkgs/etcd_3_6 | Distributed reliable key-value store for the most critical data of a distributed system |
| packages/nixpkgs/imgpkg | Store application configuration files in Docker/OCI registries |
| packages/nixpkgs/balatro | Poker roguelike |
| packages/nixpkgs/etcd_3_5 | Distributed reliable key-value store for the most critical data of a distributed system |
| packages/nixpkgs/plakar | Encrypted, queryable backups for engineers based on an immutable data store and portable archives |
| packages/nixpkgs/cocoon | ATProtocol Personal Data Server written in Go with a SQLite block and blob store |
| packages/nixpkgs/hbase_2_6 | Distributed, scalable, big data store |
| packages/nixpkgs/hbase_3_0 | Distributed, scalable, big data store |
| packages/nixpkgs/rofi-pass-wayland | Script to make rofi work with password-store |
| packages/nixpkgs/secretive | Store SSH keys in the Secure Enclave |
| packages/nixpkgs/hbase | Distributed, scalable, big data store |
| packages/nixpkgs/s2png | Store any data in PNG images |
| packages/nixpkgs/etcd_3_4 | Distributed reliable key-value store for the most critical data of a distributed system |
| packages/nixpkgs/hbase3 | Distributed, scalable, big data store |
| packages/nixpkgs/chamber | Tool for managing secrets by storing them in AWS SSM Parameter Store |
| packages/nixpkgs/garage | S3-compatible object store for small self-hosted geo-distributed deployments |
| packages/nixpkgs/kepler | NIST-based CVE lookup store and API powered by Rust |
| packages/nixpkgs/dvgrab | Receive and store audio & video over IEEE1394 |