| packages/nixpkgs/gnome-secrets | Password manager for GNOME which makes use of the KeePass v.4 format |
| packages/nixpkgs/git-secrets | Prevents you from committing secrets and credentials into git repositories |
| packages/nixpkgs/tell-me-your-secrets | Tools to find secrets from various signatures |
| packages/nixpkgs/detect-secrets | Enterprise friendly way of detecting and preventing secrets in code |
| packages/nixpkgs/secrets-extractor | Tool to check packets for secrets |
| packages/nixpkgs/emacsPackages.hide-secrets | |
| packages/nixpkgs/haskellPackages.aws-secrets | Fetch data from AWS Secrets Manager |
| packages/nixpkgs/kubernetes-helmPlugins.helm-secrets | Helm plugin that helps manage secrets |
| packages/nixpkgs/python313Packages.detect-secrets | Enterprise friendly way of detecting and preventing secrets in code |
| packages/nixpkgs/python314Packages.detect-secrets | Enterprise friendly way of detecting and preventing secrets in code |
| packages/nixpkgs/python313Packages.bc-detect-secrets | Tool to detect secrets in the code |
| packages/nixpkgs/python314Packages.bc-detect-secrets | Tool to detect secrets in the code |
| packages/nixpkgs/secretspec | Declarative secrets, every environment, any provider |
| packages/nixpkgs/python312Packages.detect-secrets | Enterprise friendly way of detecting and preventing secrets in code |
| packages/nixpkgs/python312Packages.bc-detect-secrets | Tool to detect secrets in the code |
| packages/nixpkgs/badsecrets | Module for detecting known secrets across many web frameworks |
| packages/nixpkgs/azure-sdk-for-cpp.security-keyvault-secrets | Azure Security Keyvault Secrets Package client library for C++ |
| packages/nixpkgs/ripsecrets | Command-line tool to prevent committing secret keys into your source code |
| packages/nixpkgs/python313Packages.azure-keyvault-secrets | Microsoft Azure Key Vault Secrets Client Library for Python |
| packages/nixpkgs/python314Packages.azure-keyvault-secrets | Microsoft Azure Key Vault Secrets Client Library for Python |
| packages/nixpkgs/python312Packages.azure-keyvault-secrets | Microsoft Azure Key Vault Secrets Client Library for Python |
| packages/nixpkgs/secretscanner | Tool to find secrets and passwords in container images and file systems |
| packages/nixpkgs/deepsecrets | Secrets scanner that understands code |
| packages/nixpkgs/python313Packages.badsecrets | Module for detecting known secrets across many web frameworks |
| packages/nixpkgs/python314Packages.badsecrets | Module for detecting known secrets across many web frameworks |
| packages/nixpkgs/python314Packages.secretstorage | Python bindings to FreeDesktop.org Secret Service API |
| packages/nixpkgs/python313Packages.secretstorage | Python bindings to FreeDesktop.org Secret Service API |
| packages/nixpkgs/python312Packages.badsecrets | Module for detecting known secrets across many web frameworks |
| packages/nixpkgs/python312Packages.secretstorage | Python bindings to FreeDesktop.org Secret Service API |
| packages/nixpkgs/python313Packages.mypy-boto3-secretsmanager | Type annotations for boto3 secretsmanager |
| packages/nixpkgs/python314Packages.mypy-boto3-secretsmanager | Type annotations for boto3 secretsmanager |
| packages/nixpkgs/haskellPackages.amazonka-secretsmanager | Amazon Secrets Manager SDK |
| packages/nixpkgs/python313Packages.aws-secretsmanager-caching | Client-side AWS secrets manager caching library |
| packages/nixpkgs/python314Packages.aws-secretsmanager-caching | Client-side AWS secrets manager caching library |
| packages/nixpkgs/python313Packages.pysecretsocks | Socks server for tunneling a connection over another channel |
| packages/nixpkgs/python314Packages.pysecretsocks | Socks server for tunneling a connection over another channel |
| packages/nixpkgs/python312Packages.mypy-boto3-secretsmanager | Type annotations for boto3 secretsmanager |
| packages/nixpkgs/python312Packages.aws-secretsmanager-caching | Client-side AWS secrets manager caching library |
| packages/nixpkgs/python312Packages.pysecretsocks | Socks server for tunneling a connection over another channel |
| packages/nixpkgs/rPackages.ropensecretsapi | |
| packages/nixpkgs/haskellPackages.stratosphere-secretsmanager | Stratosphere integration for AWS SecretsManager |
| packages/nixpkgs/python314Packages.types-aiobotocore-secretsmanager | Type annotations for aiobotocore secretsmanager |
| packages/nixpkgs/python313Packages.types-aiobotocore-secretsmanager | Type annotations for aiobotocore secretsmanager |
| packages/nixpkgs/python312Packages.types-aiobotocore-secretsmanager | Type annotations for aiobotocore secretsmanager |
| options/nixos/boot.initrd.secrets | Secrets to append to the initrd
|
| options/nixos/services.maddy.secrets | A list of files containing the various secrets
|
| options/nixos/services.peertube.secrets.secretsFile | Secrets to run PeerTube
|
| options/nixos/services.eintopf.secrets | A list of files containing the various secrets
|
| options/nixos/programs.nncp.secrets | A list of paths to NNCP configuration files that should not be
in the Nix store
|
| options/nixos/services.ddclient.secretsFile | A file containing the secrets for the dynamic DNS provider
|
| options/nixos/services.rspamd-trainer.secrets | A list of files containing the various secrets
|
| options/nixos/networking.wireless.secretsFile | File consisting of lines of the form varname=value
to define variables for the wireless configuration
|
| options/nixos/services.gitlab.secrets.otpFile | A file containing the secret used to encrypt secrets for OTP
tokens
|
| options/nixos/services.wg-access-server.secretsFile | yaml file containing all secrets. this needs to be in the same structure as the configuration
|
| options/nixos/services.firefox-syncserver.secrets | A file containing the various secrets
|
| options/nixos/services.immich.secretsFile | Path of a file with extra environment variables to be loaded from disk
|
| options/nixos/services.pomerium.secretsFile | Path to file containing secrets for Pomerium, in systemd
EnvironmentFile format
|
| options/nixos/services.authelia.instances.<name>.secrets | It is recommended you keep your secrets separate from the configuration
|
| options/home-manager/programs.rclone.remotes.<name>.secrets | Sensitive configuration values such as passwords, API keys, and tokens
|
| options/nixos/services.nextcloud.secrets | Secret files to read into entries in config.php
|
| options/nixos/services.forgejo.secrets | This is a small wrapper over systemd's LoadCredential
|
| options/nixos/services.kubernetes.secretsPath | Default location for kubernetes secrets
|
| options/nixos/services.gitlab.secrets.dbFile | A file containing the secret used to encrypt variables in
the DB
|
| options/nixos/services.gitlab.secrets.jwsFile | A file containing the secret used to encrypt session
keys
|
| options/nixos/services.librespeed.secrets | Attribute set of filesystem paths
|
| options/nixos/services.strongswan.secrets | A list of paths to IPSec secret files
|
| options/nixos/services.draupnir.secrets.accessToken | File containing the access token for Draupnir's Matrix account
to be used in place of services.draupnir.settings.accessToken.
|
| options/nixos/services.pfix-srsd.secretsFile | The secret data used to encode the SRS address.
to generate, use a command like:
for n in $(seq 5); do dd if=/dev/urandom count=1 bs=1024 status=none | sha256sum | sed 's/ -$//' | sed 's/^/ /'; done
|
| options/nixos/services.gitlab.secrets.secretFile | A file containing the secret used to encrypt variables in
the DB
|
| options/nixos/services.postsrsd.secretsFile | Secret keys used for signing and verification.
The secret will be generated, if it does not exist at the given path.
|
| options/nixos/services.postsrsd.settings.secrets-file | Path to the file containing the secret keys.
Secrets are passed using LoadCredential= on the systemd unit,
so this options is read-only
|
| options/nixos/services.nextcloud-whiteboard-server.secrets | A list of files containing the various secrets
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.eap | EAP secret section for a specific secret
|
| options/nixos/services.authelia.instances.<name>.secrets.manual | Configuring authelia's secret files via the secrets attribute set
is intended to be convenient and help catch cases where values are required
to run at all
|
| options/nixos/services.gitlab.secrets.activeRecordSaltFile | A file containing the salt for active record encryption in the DB
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ntlm | NTLM secret section for a specific secret
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.xauth | EAP secret section for a specific secret
|
| options/nixos/services.pinchflat.secretsFile | Secrets like SECRET_KEY_BASE and BASIC_AUTH_PASSWORD
should be passed to the service without adding them to the world-readable Nix store
|
| options/nixos/services.hercules-ci-agent.settings.secretsJsonPath | Path to a JSON file containing secrets for effects
|
| options/darwin/services.hercules-ci-agent.settings.secretsJsonPath | Path to a JSON file containing secrets for effects
|
| packages/nixpkgs/ks | Command-line secrets manager powered by macOS keychains |
| options/nixos/services.gitlab.secrets.activeRecordPrimaryKeyFile | A file containing the secret used to encrypt some rails data
in the DB
|
| options/nixos/services.authelia.instances.<name>.secrets.jwtSecretFile | Path to your JWT secret used during identity verificaton.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.rsa | Private key decryption passphrase for a key in the rsa
folder.
|
| options/nixos/services.zwave-js.secretsConfigFile | JSON file containing secret keys
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ppk | Postquantum Preshared Key (PPK) section for a specific secret
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ike | IKE preshared secret section for a specific secret
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ecdsa | Private key decryption passphrase for a key in the
ecdsa folder.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.token | Definition for a private key that's stored on a token/smartcard/TPM.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs8 | Private key decryption passphrase for a key in the
pkcs8 folder.
|
| options/nixos/services.authelia.instances.<name>.secrets.oidcHmacSecretFile | Path to your HMAC secret used to sign OIDC JWTs.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.rsa.<name>.file | File name in the rsa folder for which this passphrase
should be used.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs12 | PKCS#12 decryption passphrase for a container in the
pkcs12 folder.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ppk.<name>.id | PPK identity the PPK belongs to
|
| options/nixos/services.crowdsec-firewall-bouncer.secrets.apiKeyPath | Path to the API key to authenticate with a local CrowdSec API
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.eap.<name>.id | Identity the EAP/XAuth secret belongs to
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.token.<name>.slot | Optional slot number to access the token.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ike.<name>.id | IKE identity the IKE preshared secret belongs to
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ecdsa.<name>.file | File name in the ecdsa folder for which this
passphrase should be used.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs8.<name>.file | File name in the pkcs8 folder for which this
passphrase should be used.
|