| packages/nixpkgs/firezone-server-domain | Backend server for the Firezone zero-trust access platform |
| packages/nixpkgs/haskellPackages.domain | Codegen helping you define domain models |
| packages/nixpkgs/ocamlPackages.domain-name | RFC 1035 Internet domain names |
| packages/nixpkgs/haskellPackages.log-domain | Log-domain arithmetic |
| packages/nixpkgs/haskellPackages.domain-auth | Domain authentication library |
| packages/nixpkgs/haskellPackages.domain-core | Low-level API of "domain" |
| packages/nixpkgs/haskellPackages.time-domain | A library for time domains and durations |
| packages/nixpkgs/nxdomain | Domain (ad) block list creator |
| packages/nixpkgs/ocamlPackages_latest.domain-name | RFC 1035 Internet domain names |
| packages/nixpkgs/haskellPackages.domain-aeson | Integration of domain with aeson |
| packages/nixpkgs/ocamlPackages.domain-local-await | Scheduler independent blocking mechanism |
| packages/nixpkgs/v2ray-domain-list-community | Community managed domain list |
| packages/nixpkgs/haskellPackages.pms-domain-model | pms-domain-model |
| packages/nixpkgs/haskellPackages.domain-cereal | Integration of domain with cereal |
| packages/nixpkgs/haskellPackages.domain-optics | Integration of domain with optics |
| packages/nixpkgs/ocamlPackages.domain-local-timeout | Scheduler independent timeout mechanism |
| packages/nixpkgs/ocamlPackages_latest.domain-local-await | Scheduler independent blocking mechanism |
| packages/nixpkgs/haskellPackages.pms-domain-service | pms-domain-service |
| packages/nixpkgs/prometheus-domain-exporter | Exports the expiration time of your domains as prometheus metrics |
| packages/nixpkgs/findomain | Fastest and cross-platform subdomain enumerator |
| packages/nixpkgs/typodermic-public-domain | Vintage Typodermic fonts |
| packages/nixpkgs/ocamlPackages_latest.domain-local-timeout | Scheduler independent timeout mechanism |
| packages/nixpkgs/firezone-server | Backend server for the Firezone zero-trust access platform |
| packages/nixpkgs/rPackages.rdomains | |
| packages/nixpkgs/haskellPackages.time-domain_1_6 | A library for time domains and durations |
| packages/nixpkgs/python313Packages.colcon-ros-domain-id-coordinator | Extension for colcon-core to coordinate ROS_DOMAIN_ID values across multiple terminals |
| packages/nixpkgs/python314Packages.colcon-ros-domain-id-coordinator | Extension for colcon-core to coordinate ROS_DOMAIN_ID values across multiple terminals |
| packages/nixpkgs/ocamlPackages.domain_shims | Non-parallel implementation of Domains compatible with OCaml 4 |
| packages/nixpkgs/ocamlPackages.domainslib | Nested-parallel programming |
| packages/nixpkgs/emacsPackages.editorconfig-domain-specific | |
| packages/nixpkgs/python312Packages.colcon-ros-domain-id-coordinator | Extension for colcon-core to coordinate ROS_DOMAIN_ID values across multiple terminals |
| packages/nixpkgs/rubyPackages_3_2.domain_name | |
| packages/nixpkgs/rubyPackages_3_1.domain_name | |
| packages/nixpkgs/rubyPackages_3_5.domain_name | |
| packages/nixpkgs/haskellPackages.gogol-plus-domains | Google + Domains SDK |
| packages/nixpkgs/rubyPackages.domain_name | |
| packages/nixpkgs/rubyPackages_4_0.domain_name | |
| packages/nixpkgs/rubyPackages_3_4.domain_name | |
| packages/nixpkgs/rubyPackages_3_3.domain_name | |
| packages/nixpkgs/ocamlPackages_latest.domain_shims | Non-parallel implementation of Domains compatible with OCaml 4 |
| packages/nixpkgs/haskellPackages.numeric-domains | Numeric Domains |
| packages/nixpkgs/ocamlPackages_latest.domainslib | Nested-parallel programming |
| packages/nixpkgs/rPackages.viraldomain | |
| packages/nixpkgs/ldapdomaindump | Active Directory information dumper via LDAP |
| packages/nixpkgs/haskellPackages.domaindriven | Batteries included event sourcing and CQRS |
| packages/nixpkgs/haskellPackages.domaindriven-core | Batteries included event sourcing and CQRS |
| packages/nixpkgs/rPackages.domainsignatures | |
| packages/nixpkgs/texlivePackages.domaincoloring | Draw colored represenations of complex functions |
| packages/nixpkgs/haskellPackages.amazonka-route53-domains | Amazon Route 53 Domains SDK |
| packages/nixpkgs/python313Packages.whoisdomain | Module to perform whois lookups |
| packages/nixpkgs/python314Packages.whoisdomain | Module to perform whois lookups |
| packages/nixpkgs/python312Packages.whoisdomain | Module to perform whois lookups |
| packages/nixpkgs/python313Packages.disposable-email-domains | Set of disposable email domains |
| packages/nixpkgs/python314Packages.disposable-email-domains | Set of disposable email domains |
| packages/nixpkgs/python312Packages.disposable-email-domains | Set of disposable email domains |
| packages/nixpkgs/python313Packages.ldapdomaindump | Active Directory information dumper via LDAP |
| packages/nixpkgs/python314Packages.ldapdomaindump | Active Directory information dumper via LDAP |
| packages/nixpkgs/haskellPackages.amazonka-cloudsearch-domains | Amazon CloudSearch Domain SDK |
| packages/nixpkgs/python312Packages.ldapdomaindump | Active Directory information dumper via LDAP |
| packages/nixpkgs/python313Packages.mypy-boto3-route53domains | Type annotations for boto3 route53domains |
| packages/nixpkgs/python314Packages.mypy-boto3-route53domains | Type annotations for boto3 route53domains |
| packages/nixpkgs/python312Packages.mypy-boto3-route53domains | Type annotations for boto3 route53domains |
| packages/nixpkgs/python313Packages.django-crossdomainmedia | Django application to retrieve user's IP address |
| packages/nixpkgs/python314Packages.django-crossdomainmedia | Django application to retrieve user's IP address |
| packages/nixpkgs/python313Packages.sphinxcontrib-httpdomain | Provides a Sphinx domain for describing RESTful HTTP APIs |
| packages/nixpkgs/python314Packages.sphinxcontrib-httpdomain | Provides a Sphinx domain for describing RESTful HTTP APIs |
| packages/nixpkgs/python312Packages.django-crossdomainmedia | Django application to retrieve user's IP address |
| packages/nixpkgs/python312Packages.sphinxcontrib-httpdomain | Provides a Sphinx domain for describing RESTful HTTP APIs |
| packages/nixpkgs/python313Packages.sphinxcontrib-jinjadomain | Sphinx domain for describing jinja templates |
| packages/nixpkgs/python314Packages.sphinxcontrib-jinjadomain | Sphinx domain for describing jinja templates |
| packages/nixpkgs/python313Packages.azure-keyvault-securitydomain | Microsoft Corporation Azure Keyvault Securitydomain Client Library for Python |
| packages/nixpkgs/python314Packages.azure-keyvault-securitydomain | Microsoft Corporation Azure Keyvault Securitydomain Client Library for Python |
| packages/nixpkgs/python312Packages.sphinxcontrib-jinjadomain | Sphinx domain for describing jinja templates |
| packages/nixpkgs/python312Packages.azure-keyvault-securitydomain | Microsoft Corporation Azure Keyvault Securitydomain Client Library for Python |
| packages/nixpkgs/python313Packages.types-aiobotocore-route53domains | Type annotations for aiobotocore route53domains |
| packages/nixpkgs/python314Packages.types-aiobotocore-route53domains | Type annotations for aiobotocore route53domains |
| packages/nixpkgs/python313Packages.mypy-boto3-cloudsearchdomain | Type annotations for boto3 cloudsearchdomain |
| packages/nixpkgs/python314Packages.mypy-boto3-cloudsearchdomain | Type annotations for boto3 cloudsearchdomain |
| packages/nixpkgs/python312Packages.types-aiobotocore-route53domains | Type annotations for aiobotocore route53domains |
| packages/nixpkgs/python312Packages.mypy-boto3-cloudsearchdomain | Type annotations for boto3 cloudsearchdomain |
| packages/nixpkgs/python313Packages.types-aiobotocore-cloudsearchdomain | Type annotations for aiobotocore cloudsearchdomain |
| packages/nixpkgs/python314Packages.types-aiobotocore-cloudsearchdomain | Type annotations for aiobotocore cloudsearchdomain |
| packages/nixpkgs/python312Packages.types-aiobotocore-cloudsearchdomain | Type annotations for aiobotocore cloudsearchdomain |
| packages/nixpkgs/python313Packages.sphinxcontrib-moderncmakedomain | Sphinx extension which renders CMake documentation |
| packages/nixpkgs/python314Packages.sphinxcontrib-moderncmakedomain | Sphinx extension which renders CMake documentation |
| packages/nixpkgs/python312Packages.sphinxcontrib-moderncmakedomain | Sphinx extension which renders CMake documentation |
| options/nixos/security.ipa.domain | Domain of the IPA server.
|
| options/nixos/services.odoo.domain | Domain to host Odoo with nginx
|
| options/nixos/services.r53-ddns.domain | The name of your domain in Route53
|
| options/nixos/services.pfix-srsd.domain | The domain for which to enable srs
|
| options/nixos/services.cntlm.domain | Proxy account domain/workgroup name.
|
| options/nixos/services.ente.api.domain | The domain under which the api will be served.
|
| options/nixos/services.movim.domain | Fully-qualified domain name (FQDN) for the Movim instance.
|
| options/nixos/services.flarum.domain | Domain to serve on.
|
| options/nixos/services.nar-serve.domain | When set, enables the feature of serving .
on top of /nix/store/-
|
| options/nixos/services.searx.domain | The domain under which searxng will be served
|
| options/nixos/services.samba-wsdd.domain | Set domain name (disables workgroup).
|
| options/nixos/services.skydns.domain | Skydns default domain if not specified by etcd config.
|
| options/nixos/networking.domain | The system domain name
|
| options/darwin/networking.domain | The domain
|
| options/nixos/services.oink.domains | List of attribute sets containing configuration for each domain
|
| options/nixos/services.gitlab.smtp.domain | HELO domain to use for outgoing mail.
|
| options/nixos/security.acme.certs.<name>.domain | Domain to fetch certificate for (defaults to the entry name).
|
| options/nixos/services.nixops-dns.domain | Fake domain name to resolve to NixOps virtual machines
|
| options/nixos/services.prosody.muc.*.domain | Domain name of the MUC
|
| options/nixos/services.postfix.domain | Domain to use
|
| options/nixos/services.keter.bundle.domain | The domain keter will bind to
|
| options/nixos/services.zammad.nginx.domain | The domain under which zammad will be reachable.
|
| options/nixos/services.lasuite-docs.domain | Domain name of the docs instance.
|
| options/nixos/services.lasuite-meet.domain | Domain name of the meet instance.
|
| options/nixos/services.pretix.nginx.domain | The domain name under which to set up the virtual host.
|
| options/nixos/services.avahi.domainName | Domain name for all advertisements.
|
| options/nixos/services.dolibarr.domain | Domain name of your server.
|
| options/nixos/services.iodine.server.domain | Domain or subdomain of which nameservers point to us
|
| options/nixos/services.pretalx.nginx.domain | The domain name under which to set up the virtual host.
|
| options/nixos/services.slskd.domain | If non-null, enables an nginx reverse proxy virtual host at this FQDN,
at the path configurated with services.slskd.web.url_base.
|
| options/nixos/services.automx2.domain | E-Mail-Domain for which mail client autoconfig/autoconfigure should be set up
|
| options/nixos/services.oauth2-proxy.cookie.domain | Optional cookie domains to force cookies to (ie: .yourcompany.com)
|
| options/nixos/services.avahi.publish.domain | Whether to announce the locally used domain name for browsing by other hosts.
|
| options/nixos/services.bird-lg.frontend.domain | Server name domain suffixes.
|
| options/nixos/services.netbird.server.domain | The domain under which the netbird server runs.
|
| options/nixos/services.paperless.domain | Domain under which paperless will be available.
|
| options/nixos/services.open-web-calendar.domain | The domain under which open-web-calendar is made available
|
| options/nixos/services.lxd-image-server.nginx.domain | Domain to use for nginx virtual host.
|
| options/nixos/services.oauth2-proxy.nginx.domain | The domain under which the oauth2-proxy will be accesible and the path of cookies are set to
|
| options/nixos/services.prosody.httpFileShare.domain | Domain name for a http_file_share service.
|
| options/nixos/services.prosody.uploadHttp.domain | Domain name for the http-upload service
|
| options/nixos/services.kanidm.serverSettings.domain | The domain that Kanidm manages
|
| options/nixos/services.kanidm.server.settings.domain | The domain that Kanidm manages
|
| options/nixos/services.kanboard.domain | FQDN for the Kanboard instance.
|
| options/nixos/services.pixelfed.domain | FQDN for the Pixelfed instance.
|
| options/nixos/services.dspam.domainSocket | Path to local domain socket which is used for communication with the daemon
|
| options/nixos/services.awstats.configs.<name>.domain | The domain name to collect stats for.
|
| options/nixos/security.pam.loginLimits.*.domain | Username, groupname, or wildcard this limit applies to
|
| options/nixos/services.homer.virtualHost.domain | Domain to use for the virtual host
|
| options/nixos/services.dashy.virtualHost.domain | Domain to use for the virtual host
|
| options/nixos/services.portunus.domain | Subdomain which gets reverse proxied to Portunus webserver.
|
| options/nixos/services.netbird.server.signal.domain | The domain name for the signal service.
|
| options/nixos/services.netbird.server.coturn.domain | The domain under which the coturn server runs.
|
| options/nixos/services.tailscale.derper.domain | Domain name under which the derper server is reachable.
|
| options/nixos/services.prosody.virtualHosts.<name>.domain | Domain name
|
| options/nixos/services.engelsystem.domain | Domain to serve on.
|
| options/nixos/services.mediagoblin.domain | Domain under which mediagoblin will be served.
|
| options/nixos/services.vaultwarden.domain | The domain under which VaultWarden will be reachable.
|
| options/nixos/services.acme-dns.settings.general.domain | Domain name to serve the requests off of.
|
| options/nixos/services.firezone.server.domain.enable | Whether to enable the Firezone domain server.
|
| options/nixos/services.invidious-router.nginx.domain | The domain on which invidious-router should be served.
|
| options/nixos/services.hedgedoc.settings.domain | Domain to use for website
|
| options/nixos/services.invidious.domain | The FQDN Invidious is reachable on
|
| options/nixos/services.firezone.server.domain.package | The firezone-server-domain package to use.
|
| options/nixos/services.dependency-track.nginx.domain | The domain name under which to set up the virtual host.
|
| options/nixos/services.netbird.server.dashboard.domain | The domain under which the dashboard runs.
|
| options/nixos/services.discourse.mail.outgoing.domain | HELO domain to use for outgoing mail.
|
| options/nixos/services.librespeed.domain | If not null, this will add an entry to services.librespeed.servers and
configure librespeed to use TLS.
|
| options/nixos/services.postsrsd.settings.srs-domain | Dedicated mail domain used for ephemeral SRS envelope addresses
|
| options/nixos/security.pam.services.<name>.limits.*.domain | Username, groupname, or wildcard this limit applies to
|
| options/nixos/services.grafana.settings.server.domain | The public facing domain name used to access grafana from a browser
|
| options/nixos/services.sympa.domains.<name>.webHost | Domain part of the web interface URL (no web interface for this domain if null)
|
| options/nixos/services.netbird.server.management.domain | The domain under which the management API runs.
|
| options/nixos/services.gitlab.pages.settings.pages-domain | The domain to serve static pages on.
|
| options/nixos/services.prometheus.exporters.domain.user | User name under which the domain exporter shall be run.
|
| options/nixos/services.prometheus.exporters.domain.group | Group under which the domain exporter shall be run.
|
| options/nixos/services.ente.web.domains.cast | The domain under which the cast frontend will be served.
|
| options/nixos/services.zeronsd.servedNetworks.<name>.settings.domain | Domain under which ZeroTier records will be available.
|
| options/nixos/services.jitsi-videobridge.xmppConfigs.<name>.domain | Domain part of JID of the XMPP user, if it is different from hostName.
|
| options/nixos/services.prometheus.exporters.domain.enable | Whether to enable the prometheus domain exporter.
|
| options/nixos/services.libretranslate.domain | The domain serving your LibreTranslate instance
|
| options/nixos/services.prometheus.exporters.domain.extraFlags | Extra commandline options to pass to the domain exporter.
|
| options/nixos/services.duckdns.domains | The domain(s) to update in DuckDNS
(without the .duckdns.org suffix)
|
| options/nixos/services.jibri.xmppEnvironments.<name>.call.login.domain | The domain part of the JID for the recorder.
|
| options/nixos/services.bitwarden-directory-connector-cli.domain | The domain the Bitwarden/Vaultwarden is accessible on.
|
| options/nixos/services.resolved.domains | A list of domains
|
| options/nixos/services.ente.web.domains.photos | The domain under which the photos frontend will be served.
|
| options/nixos/services.ente.web.domains.albums | The domain under which the albums frontend will be served.
|
| options/nixos/services.postsrsd.domains | Domain names for rewrite
|
| options/nixos/services.ente.web.domains.api | The domain under which the api is served
|
| options/nixos/services.sourcehut.settings."sr.ht".global-domain | Global domain name.
|
| options/nixos/services.ddclient.domains | Domain name(s) to synchronize.
|
| options/nixos/services.matrix-appservice-irc.settings.homeserver.domain | The 'domain' part for user IDs on this home server
|
| options/nixos/services.listmonk.database.settings."privacy.domain_blocklist" | E-mail addresses with these domains are disallowed from subscribing.
|
| options/nixos/services.duckdns.domainsFile | The path to a file containing a
newline-separated list of DuckDNS
domain(s) to be updated
(without the .duckdns.org suffix)
|
| options/nixos/services.jibri.xmppEnvironments.<name>.control.muc.domain | The domain part of the MUC to connect to for control.
|
| options/nixos/services.sourcehut.settings."pages.sr.ht".user-domain | Configures the user domain, if enabled
|
| options/nixos/services.jibri.xmppEnvironments.<name>.control.login.domain | The domain part of the JID for this Jibri instance.
|
| options/nixos/services.prometheus.exporters.domain.port | Port to listen on.
|
| options/nixos/services.dnscache.domainServers | Table of {hostname: server} pairs to use as authoritative servers for hosts (and subhosts)
|
| options/nixos/services.szurubooru.server.settings.domain | Full URL to the homepage of this szurubooru site (with no trailing slash).
|
| options/nixos/services.sourcehut.settings."lists.sr.ht".posting-domain | Posting domain.
|
| options/nixos/services.sourcehut.settings."git.sr.ht".outgoing-domain | Outgoing domain.
|
| options/nixos/services.sourcehut.settings."todo.sr.ht::mail".posting-domain | Posting domain.
|
| options/nixos/services.firezone.server.domain.settings | Environment variables for this component of the Firezone server
|
| options/nixos/services.ente.web.domains.accounts | The domain under which the accounts frontend will be served.
|
| options/nixos/services.prometheus.exporters.domain.listenAddress | Address to listen on.
|
| options/nixos/services.prometheus.exporters.domain.openFirewall | Open port in firewall for incoming connections.
|
| options/nixos/services.headscale.settings.dns.base_domain | Defines the base domain to create the hostnames for MagicDNS
|
| options/nixos/networking.fqdn | The fully qualified domain name (FQDN) of this host
|
| options/darwin/networking.fqdn | The fully qualified domain name (FQDN) of this host
|
| options/nixos/services.prometheus.exporters.domain.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.domain.openFirewall is true.
|
| options/nixos/services.movim.podConfig.xmppdomain | The default XMPP server domain
|
| options/nixos/services.sympa.domains | Email domains handled by this instance
|
| options/nixos/services.cloudflare-dyndns.domains | List of domain names to update records for.
|
| packages/nixpkgs/perlPackages.NetDomainTLD | Work with TLD names |
| packages/nixpkgs/perl5Packages.NetDomainTLD | Work with TLD names |
| options/nixos/services.prometheus.exporters.domain.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.domain.openFirewall
is true
|
| options/nixos/services.cloudflare-ddns.domains | List of domain names (FQDNs) to manage
|
| options/nixos/services.opendkim.domains | Local domains set (see opendkim(8) for more information on datasets)
|
| options/nixos/services.oauth2-proxy.email.domains | Authenticate emails with the specified domains
|
| options/nixos/services.grafana.settings.server.enforce_domain | Redirect to correct domain if the host header does not match the domain
|
| options/nixos/services.dkimproxy-out.domains | List of domains DKIMproxy can sign for.
|
| packages/nixpkgs/perl540Packages.NetDomainTLD | Work with TLD names |
| packages/nixpkgs/perl538Packages.NetDomainTLD | Work with TLD names |
| options/darwin/networking.fqdnOrHostName | Either the fully qualified domain name (FQDN), or just the host name if
it does not exists
|
| options/nixos/services.sympa.domains.<name>.webLocation | URL path part of the web interface.
|
| options/nixos/networking.fqdnOrHostName | Either the fully qualified domain name (FQDN), or just the host name if
it does not exist
|
| options/nixos/systemd.network.networks.<name>.domains | A list of domains to pass to the network config.
|
| options/nixos/services.nextcloud.settings.mail_domain | The return address that you want to appear on emails sent by the Nextcloud server, for example nc-admin@example.com, substituting your own domain, of course.
|
| options/nixos/services.sympa.domains.<name>.settings | The robot.conf configuration file as key value set
|
| packages/nixpkgs/perlPackages.DataValidateDomain | Domain and host name validation |
| options/nixos/services.postsrsd.settings.domains | List of local domains, that do not require rewriting.
|
| packages/nixpkgs/perl5Packages.DataValidateDomain | Domain and host name validation |
| packages/nixpkgs/bicep | Domain Specific Language (DSL) for deploying Azure resources declaratively |
| options/nixos/services.nextjs-ollama-llm-ui.ollamaUrl | The address (including host and port) under which we can access the Ollama backend server.
!Note that if the the UI service is running under a domain "https://ui.example.org",
the Ollama backend service must allow "CORS" requests from this domain, e.g. by adding
"services.ollama.environment
|
| options/nixos/security.ipa.enable | Whether to enable FreeIPA domain integration.
|
| options/nixos/virtualisation.xen.dom0Resources.maxVCPUs | Amount of virtual CPU cores allocated to Domain 0 on boot
|
| options/nixos/services.flarum.baseUrl | Change domain instead.
|
| options/nixos/services.ttyd.socket | UNIX domain socket path to bind.
|
| options/nixos/services.sympa.database.host | Database host address
|
| options/nixos/services.davis.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.slskd.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.movim.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| packages/nixpkgs/bicep-lsp | Domain Specific Language (DSL) for deploying Azure resources declaratively |
| options/nixos/virtualisation.xen.dom0Resources.memory | Amount of memory (in MiB) allocated to Domain 0 on boot
|
| options/nixos/services.bind.enable | Whether to enable BIND domain name server.
|
| options/nixos/services.snipe-it.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/darwin/networking.dns | The list of dns servers used when resolving domain names.
|
| options/nixos/services.parsedmarc.provision.localMail.hostname | The hostname to use when configuring Postfix
|
| options/nixos/services.akkoma.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.gancio.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.fluidd.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.monica.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.matomo.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/hardware.nvidia.prime.intelBusId | Bus ID of the Intel GPU
|
| options/nixos/services.pihole-web.hostName | Domain name for the website.
|
| packages/nixpkgs/perl538Packages.DataValidateDomain | Domain and host name validation |
| packages/nixpkgs/perl540Packages.DataValidateDomain | Domain and host name validation |
| options/nixos/hardware.nvidia.prime.nvidiaBusId | Bus ID of the NVIDIA GPU
|
| options/nixos/hardware.nvidia.prime.amdgpuBusId | Bus ID of the AMD APU
|
| options/nixos/services.prosody.httpFileShare.http_host | To avoid an additional DNS record and certificate, you may set this option to your primary domain (e.g. "example.com")
or use a reverse proxy to handle the HTTP for that domain.
|
| options/nixos/services.pihole-ftl.lists | Deny (or allow) domain lists to use
|
| options/nixos/services.headscale.settings.oidc.allowed_domains | Allowed principal domains. if an authenticated user's domain
is not in this list authentication request will be rejected.
|
| options/nixos/services.pangolin.dashboardDomain | The domain where the application will be hosted
|
| options/nixos/services.bluemap.host | Domain on which nginx will serve the bluemap webapp
|
| options/nixos/services.devpi-server.host | domain/ip address to listen on
|
| options/nixos/services.mlmmj.listDomain | Set the mailing list domain
|
| options/nixos/services.pihole-ftl.lists.*.url | URL of the domain list
|
| options/nixos/services.dkimproxy-out.selector | The selector to use for DKIM key identification
|
| options/nixos/services.certspotter.watchlist | Domain names to watch
|
| options/nixos/services.sks.hkpAddress | Domain names, IPv4 and/or IPv6 addresses to listen on for HKP
requests.
|
| options/darwin/services.yabai.config | Key/Value pairs to pass to yabai's 'config' domain, via the configuration file.
|
| options/nixos/services.agorakit.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.librenms.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.kanboard.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.dolibarr.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.fediwall.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.pixelfed.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.mainsail.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.radicle.httpd.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.coder.accessUrl | Access URL should be a external IP address or domain with DNS records pointing to Coder.
|
| options/nixos/services.anuko-time-tracker.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.nginx.virtualHosts.<name>.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/darwin/networking.search | The list of search paths used when resolving domain names.
|
| options/nixos/services.bookstack.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| packages/nixpkgs/jetbrains.mps | IDE for building domain-specific languages from JetBrains |
| options/nixos/services.jigasi.userDomain | Domain part of the JID for XMPP user connection.
|
| options/nixos/services.jicofo.userDomain | Domain part of the JID for XMPP user connection.
|
| options/nixos/services.sympa.mainDomain | Main domain to be used in sympa.conf
|
| options/nixos/services.dnsdist.enable | Whether to enable dnsdist domain name server.
|
| options/nixos/services.unbound.enable | Whether to enable Unbound domain name server.
|
| packages/nixpkgs/kodiPackages.idna | Internationalized Domain Names for Python |
| packages/nixpkgs/libhsts | Library to easily check a domain against the Chromium HSTS Preload list |
| options/nixos/services.jirafeau.nginxConfig.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.pingvin-share.https | Whether to enable HTTPS for the domain.
|
| options/nixos/security.ipa.ipaHostname | Fully-qualified hostname used to identify this host in the IPA domain.
|
| options/nixos/services.nezha-agent.genUuid | Whether to generate uuid from fqdn automatically
|
| options/nixos/services.privoxy.inspectHttps | Whether to configure Privoxy to inspect HTTPS requests, meaning all
encrypted traffic will be filtered as well
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| packages/nixpkgs/tldx | Domain availability research tool |
| options/nixos/virtualisation.xen.domains.extraConfig | Options defined here will override the defaults for xendomains
|
| options/nixos/services.jicofo.xmppDomain | Domain name of the XMMP server to which to connect as a component
|
| options/nixos/services.movim.h2o | With this option, you can customize an H2O virtual host which already
has sensible defaults for Movim
|
| options/nixos/services.postfix.lookupMX | Whether relay specified is just domain whose MX must be used.
|
| options/nixos/services.code-server.proxyDomain | Domain used for proxying ports.
|
| options/nixos/services.jigasi.xmppDomain | Domain name of the XMMP server to which to connect as a component
|
| options/nixos/services.nixops-dns.enable | Whether to enable the nixops-dns resolution
of NixOps virtual machines via dnsmasq and fake domain name.
|
| options/nixos/networking.search | The list of domain search paths that are considered for resolving
hostnames with fewer dots than configured in the ndots option,
which defaults to 1 if unset.
|
| options/nixos/services.tt-rss.database.host | Host of the database
|
| options/nixos/services.maddy.primaryDomain | Primary MX domain to use
|
| options/nixos/services.powerdns.enable | Whether to enable PowerDNS domain name server.
|
| options/nixos/services.weblate.localDomain | The domain name serving your Weblate instance.
|
| packages/nixpkgs/cero | Scrape domain names from SSL certificates of arbitrary hosts |
| options/nixos/services.headscale.settings.oidc.strip_email_domain | Whether the domain part of the email address should be removed when generating namespaces.
|
| options/nixos/services.cntlm.username | Proxy account name, without the possibility to include domain name ('at' sign is interpreted literally).
|
| options/nixos/services.fedimintd.<name>.nginx.config.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.davis.hostname | Domain of the host to serve davis under
|
| options/nixos/services.movim.nginx | With this option, you can customize an Nginx virtual host which
already has sensible defaults for Movim
|
| options/nixos/services.postfix.settings.main.relay_domains | List of domains delivered via the relay transport.
https://www.postfix.org/postconf.5.html#relay_domains
|
| options/darwin/services.spacebar.config | Key/Value pairs to pass to spacebar's 'config' domain, via the configuration file.
|
| options/nixos/services.dawarich.localDomain | The domain serving your Dawarich instance.
|
| options/nixos/services.castopod.localDomain | The domain serving your CastoPod instance.
|
| options/nixos/services.mastodon.localDomain | The domain serving your Mastodon instance.
|
| options/nixos/services.pangolin.baseDomain | Your base fully qualified domain name (without any subdomains).
|
| options/nixos/services.peertube.localDomain | The domain serving your PeerTube instance.
|
| options/nixos/security.ipa.chromiumSupport | Whether to whitelist the FreeIPA domain in Chromium.
|
| options/nixos/services.limesurvey.nginx.virtualHost.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/services.warpgate.settings.external_host | Configure the domain name of this Warpgate instance
|
| options/nixos/services.public-inbox.http.mounts | Root paths or URLs that public-inbox will be served on
|
| options/nixos/security.agnos.settings.accounts.*.certificates.*.domains | Domains the certificate represents
|
| packages/nixpkgs/sqlmc | Tool to check URLs of a domain for SQL injections |
| options/nixos/services.kresd.enable | Whether to enable knot-resolver (version 5) domain name server
|
| options/nixos/services.avahi.nssmdns4 | Whether to enable the mDNS NSS (Name Service Switch) plug-in for IPv4
|
| options/nixos/services.agate.hostnames | Domain name of this Gemini server, enables checking hostname and port
in requests. (multiple occurrences means basic vhosts)
|
| options/nixos/security.acme.certs.<name>.extraDomainNames | A list of extra domain names, which are included in the one certificate to be issued.
|
| options/nixos/services.nullmailer.config.defaultdomain | The content of this attribute is appended to any host name that
does not contain a period (except localhost), including defaulthost
and idhost
|
| packages/nixpkgs/wtfis | Passive hostname, domain and IP lookup tool for non-robots |
| options/nixos/services.dolibarr.h2o | With this option, you can customize an H2O virtual host which already
has sensible defaults for Dolibarr
|
| options/nixos/services.taskserver.fqdn | The fully qualified domain name of this server, which is also used
as the common name in the certificates.
|
| packages/nixpkgs/gallia | Extendable Pentesting Framework for the Automotive Domain |
| options/nixos/services.headscale.settings.dns.search_domains | Search domains to inject to Tailscale clients.
|
| options/nixos/services.pingvin-share.hostname | The domain name of your instance
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| options/nixos/virtualisation.xen.store.settings.conflict.rateLimitIsAggregate | If the conflict.rateLimitIsAggregate option is true, then after each
tick one point of conflict-credit is given to just one domain: the
one at the front of the queue
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.domain_name | At most one of domain_id and domain_name must be provided if using username
with Identity V3
|
| options/nixos/services.fedimintd.<name>.nginx.fqdn | Public domain of the API address of the reverse proxy/tls terminator.
|
| options/nixos/services.hatsu.settings.HATSU_DOMAIN | The domain name of your instance (eg 'hatsu.local').
|
| options/nixos/services.pds.settings.PDS_HOSTNAME | Instance hostname (base domain name)
|
| options/nixos/services.misskey.reverseProxy.host | The fully qualified domain name to bind to
|
| options/nixos/services.pixelfed.nginx | With this option, you can customize an nginx virtual host which already has sensible defaults for Pixelfed
|
| packages/nixpkgs/djbdns | Collection of Domain Name System tools |
| packages/nixpkgs/idnkit | Provides functionalities about i18n domain name processing |
| options/nixos/services.kanboard.nginx | With this option, you can customize an NGINX virtual host which already
has sensible defaults for Kanboard
|
| options/nixos/services.cryptpad.settings | Cryptpad configuration settings
|
| options/nixos/services.lemmy.settings.hostname | The domain name of your instance (eg 'lemmy.ml').
|
| options/nixos/services.knot-resolver.enable | Whether to enable knot-resolver (version 6) domain name server
|
| options/nixos/services.gitea.settings.server.DOMAIN | Domain name of your server.
|
| options/nixos/services.nextcloud.settings.trusted_domains | Trusted domains, from which the nextcloud installation will be
accessible
|
| options/nixos/services.filesender.localDomain | The domain serving your FileSender instance.
|
| packages/nixpkgs/lbd | Detect if a domain uses DNS and/or HTTP Load-Balancing |
| options/nixos/security.pam.loginLimits | Define resource limits that should apply to users or groups
|
| options/nixos/services.openafsServer.cellServDB.*.dnsname | DNS full-qualified domain name of a database server
|
| options/nixos/services.openafsClient.cellServDB.*.dnsname | DNS full-qualified domain name of a database server
|
| options/nixos/services.gancio.settings.hostname | The domain name under which the server is reachable.
|
| options/nixos/services.nghttpx.backends.*.server | Backend server location specified as either a host:port pair
or a unix domain docket.
|
| options/nixos/services.nextcloud.notify_push.bendDomainToLocalhost | Whether to add an entry to /etc/hosts for the configured nextcloud domain to point to localhost and add localhost to nextcloud's trusted_proxies config option
|
| options/nixos/services.dolibarr.nginx | With this option, you can customize an nginx virtual host which already has sensible defaults for Dolibarr
|
| options/nixos/services.postgrey.greylistText | Response status text for greylisted messages; use %%s for seconds left until greylisting is over and %%r for mail domain of recipient
|
| options/nixos/services.hedgedoc.settings.path | Path to UNIX domain socket to listen on
If specified, host and port will be ignored.
|
| options/nixos/services.skydns.nameservers | Skydns list of nameservers to forward DNS requests to when not authoritative for a domain.
|
| options/nixos/services.openafsClient.cellServDB.<name>.*.dnsname | DNS full-qualified domain name of a database server
|
| options/nixos/services.openafsServer.cellServDB.<name>.*.dnsname | DNS full-qualified domain name of a database server
|
| packages/nixpkgs/ip2unix | Turn IP sockets into Unix domain sockets |
| options/nixos/services.canaille.settings.SERVER_NAME | The domain name on which canaille will be served.
|
| options/nixos/services.forgejo.settings.server.DOMAIN | Domain name of your server.
|
| packages/nixpkgs/ocamlPackages.dns | Domain Name System (DNS) library |
| options/nixos/services.authelia.instances | Multi-domain protection currently requires multiple instances of Authelia
|
| packages/nixpkgs/libsv | Public domain cross-platform semantic versioning in C99 |
| options/darwin/services.dnsmasq.servers | List of upstream DNS servers to forward queries to
|
| options/nixos/services.bluesky-pds.settings.PDS_HOSTNAME | Instance hostname (base domain name)
|
| options/nixos/services.postgresql.enableTCPIP | Whether PostgreSQL should listen on all network interfaces
|
| options/nixos/services.memcached.enableUnixSocket | Whether to enable Unix Domain Socket at /run/memcached/memcached.sock instead of listening on an IP address and port
|
| options/darwin/services.postgresql.enableTCPIP | Whether PostgreSQL should listen on all network interfaces
|
| options/nixos/services.biboumi.settings.hostname | The hostname served by the XMPP gateway
|
| options/nixos/services.avahi.nssmdns6 | Whether to enable the mDNS NSS (Name Service Switch) plug-in for IPv6
|
| options/nixos/services.mosquitto.listeners.*.port | Port to listen on
|
| options/nixos/services.netbox.settings.ALLOWED_HOSTS | A list of valid fully-qualified domain names (FQDNs) and/or IP
addresses that can be used to reach the NetBox service.
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.domain_id | At most one of domain_id and domain_name must be provided if using username
with Identity V3
|
| options/nixos/virtualisation.xen.trace | Whether to enable Xen debug tracing and logging for Domain 0.
|
| options/nixos/services.invidious.nginx.enable | Whether to configure nginx as a reverse proxy for Invidious
|
| options/nixos/services.nghttpx.frontends.*.server | Frontend server interface binding specification as either a
host:port pair or a unix domain docket
|
| options/nixos/virtualisation.xen.debug | Whether to enable Xen debug features for Domain 0
|
| packages/nixpkgs/dnsutils | Domain name server |
| packages/nixpkgs/knot-dns | Authoritative-only DNS server from .cz domain registry |
| options/nixos/services.cloudflare-ddns.proxied | Whether the managed DNS records should be proxied through Cloudflare ('orange cloud')
|
| options/nixos/services.openafsServer.roles.backup.cellServDB.*.dnsname | DNS full-qualified domain name of a database server
|
| options/nixos/services.firezone.server.provision.enable | Whether to enable provisioning of the Firezone domain server.
|
| options/nixos/services.kubernetes.addons.dns.clusterDomain | Dns cluster domain
|
| options/nixos/services.crab-hole.settings.blocklist.include_subdomains | Whether to enable Include subdomains.
|
| packages/nixpkgs/jwhois | Client for the WHOIS protocol allowing you to query the owner of a domain name |
| options/nixos/services.netbird.server.management.dnsDomain | Domain used for peer resolution.
|
| options/nixos/services.kubernetes.kubelet.clusterDomain | Use alternative domain.
|
| options/nixos/services.postgrest.settings.server-unix-socket | Unix domain socket where to bind the PostgREST web server.
|
| options/nixos/services.hedgedoc.settings.protocolUseSSL | Use https:// for all links
|
| options/nixos/services.netbird.server.management.turnDomain | The domain of the TURN server to use.
|
| options/nixos/services.immich.settings.server.externalDomain | Domain for publicly shared links, including http(s)://.
|
| options/nixos/services.openafsServer.roles.backup.cellServDB.<name>.*.dnsname | DNS full-qualified domain name of a database server
|
| options/nixos/services.froide-govplan.settings.ALLOWED_HOSTS | A list of valid fully-qualified domain names (FQDNs) and/or IP
addresses that can be used to reach the Froide-Govplan service.
|
| options/home-manager/programs.qutebrowser.perDomainSettings | Options to set, as in settings but per domain
|
| options/nixos/virtualisation.xen.bootParams | Xen Command Line parameters passed to Domain 0 at boot time
|
| options/nixos/services.jibri.xmppEnvironments.<name>.xmppDomain | The base XMPP domain.
|
| options/nixos/services.matrix-synapse.settings.listeners.*.mode | File permissions on the UNIX domain socket.
|
| packages/nixpkgs/clps2c-compiler | Compiler for CLPS2C, a domain-specific language built specifically for writing PS2 cheat codes |
| packages/nixpkgs/ocamlPackages_latest.dns | Domain Name System (DNS) library |
| options/nixos/services.kubo.settings.Addresses.API | Multiaddr or array of multiaddrs describing the address to serve the local HTTP API on
|
| options/nixos/services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".url.host | Domain name of the instance.
|
| options/nixos/services.nginx.tailscaleAuth.expectedTailnet | If you want to prevent node sharing from allowing users to access services
across tailnets, declare your expected tailnets domain here.
|
| options/nixos/services.plausible.database.postgres.socket | Path to the UNIX domain-socket to communicate with postgres.
|
| options/nixos/services.trafficserver.hosting | Partition the cache according to origin server or domain
Consult the
upstream documentation for more details.
|
| options/nixos/services.sssd.environmentFile | Environment file as defined in systemd.exec(5)
|
| packages/nixpkgs/sockdump | Dump unix domain socket traffic with bpf |
| options/nixos/services.peering-manager.settings.ALLOWED_HOSTS | A list of valid fully-qualified domain names (FQDNs) and/or IP
addresses that can be used to reach the peering manager service.
|
| options/nixos/virtualisation.xen.boot.params | Xen Command Line parameters passed to Domain 0 at boot time.
|
| options/nixos/services.varnish.listen.*.address | If given an IP address, it can be a host name ("localhost"), an IPv4 dotted-quad
("127.0.0.1") or an IPv6 address enclosed in square brackets ("[::1]").
(VCL4.1 and higher) If given an absolute Path ("/path/to/listen.sock") or "@"
followed by the name of an abstract socket ("@myvarnishd") accept connections
on a Unix domain socket
|
| options/nixos/services.anubis.instances.<name>.settings.TARGET | The reverse proxy target that Anubis is protecting
|
| options/nixos/services.matrix-synapse.settings.listeners.*.tls | Whether to enable TLS on the listener socket.
This option will be ignored for UNIX domain sockets.
|
| packages/nixpkgs/dig | Domain name server |
| options/nixos/services.simplesamlphp.<name>.localDomain | The domain serving your SimpleSAMLphp instance
|
| options/nixos/services.taler.merchant.settings.merchant.SERVE | Whether the HTTP server should listen on a UNIX domain socket ("unix") or on a TCP socket ("tcp").
|
| packages/nixpkgs/dnstwist | Domain name permutation engine for detecting homograph phishing attacks |
| packages/nixpkgs/nodeinfo | Command line tool to query nodeinfo based on a given domain |
| options/nixos/virtualisation.xen.enable | Whether to enable the Xen Project Hypervisor, a virtualisation technology defined as a type-1 hypervisor, which allows multiple virtual machines, known as domains, to run concurrently on the physical machine
|
| options/nixos/services.sftpgo.settings.ftpd.bindings.*.address | Network listen address
|
| packages/nixpkgs/bind | Domain name server |
| packages/nixpkgs/host | Domain name server |
| packages/nixpkgs/ocamlPackages.apron | Numerical abstract domain library |
| options/nixos/services.sftpgo.settings.sftpd.bindings.*.address | Network listen address
|
| options/nixos/services.sftpgo.settings.httpd.bindings.*.address | Network listen address
|
| packages/nixpkgs/octavePackages.interval | Interval arithmetic to evaluate functions over subsets of their domain |
| options/nixos/services.dependency-track.frontend.baseUrl | The base URL of the API server
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.fqdn | Fully qualified domain name of the JMAP service.
mujmap looks up the JMAP SRV record for this host to determine the JMAP session
URL
|
| packages/nixpkgs/stb | Single-file public domain libraries for C/C++ |
| packages/nixpkgs/ocamlPackages.dns-mirage | Opinionated Domain Name System (DNS) library |
| options/nixos/services.cyrus-imap.imapdSettings.notifysocket | Unix domain socket that the mail notification daemon listens on.
|
| packages/nixpkgs/helmholtz | Time domain pitch tracker for Pure Data |
| options/nixos/services.jibri.xmppEnvironments.<name>.stripFromRoomDomain | The prefix to strip from the room's JID domain to derive the call URL.
|
| options/nixos/services.oauth2-proxy.nginx.virtualHosts.<name>.allowed_email_domains | List of email domains to allow access to this vhost, or null to allow all.
|
| options/nixos/services.akkoma.config.":pleroma"."Pleroma.Upload".base_url | Base path which uploads will be stored at
|
| options/nixos/services.matrix-synapse.settings.listeners.*.path | Unix domain socket path to bind this listener to.
|
| options/nixos/services.matrix-synapse.settings.listeners | List of ports that Synapse should listen on, their purpose and their configuration
|
| options/nixos/services.healthchecks.settings.ALLOWED_HOSTS | The host/domain names that this site can serve.
|
| options/nixos/networking.hostName | The name of the machine
|
| options/nixos/services.anubis.instances.<name>.settings.BIND | The address that Anubis listens to
|
| options/nixos/services.sftpgo.settings.webdavd.bindings.*.address | Network listen address
|
| packages/nixpkgs/mdns | Public domain mDNS/DNS-SD library in C |
| options/nixos/services.netbird.server.coturn.useAcmeCertificates | Whether to use ACME certificates corresponding to the given domain for the server.
|
| packages/nixpkgs/python313Packages.meep | Free finite-difference time-domain (FDTD) software for electromagnetic simulations |
| packages/nixpkgs/python314Packages.meep | Free finite-difference time-domain (FDTD) software for electromagnetic simulations |
| packages/nixpkgs/oksh | Portable OpenBSD ksh, based on the Public Domain Korn Shell (pdksh) |
| packages/nixpkgs/python313Packages.tld | Extracts the top level domain (TLD) from the URL given |
| packages/nixpkgs/python314Packages.tld | Extracts the top level domain (TLD) from the URL given |
| packages/nixpkgs/python313Packages.idna | Internationalized Domain Names in Applications (IDNA) |
| packages/nixpkgs/python314Packages.idna | Internationalized Domain Names in Applications (IDNA) |
| packages/nixpkgs/hostname-debian | Utility to set/show the host name or domain name |
| options/nixos/services.firefox-syncserver.database.createLocally | Whether to create database and user on the local machine if they do not exist
|
| options/nixos/services.prometheus.exporters.unbound.unbound.host | Path to the unbound control socket
|
| options/nixos/services.syncthing.settings.options.limitBandwidthInLan | Whether to apply bandwidth limits to devices in the same broadcast domain as the local device.
|
| options/home-manager/services.syncthing.settings.options.limitBandwidthInLan | Whether to apply bandwidth limits to devices in the same broadcast domain as the local device.
|
| options/nixos/services.dendrite.settings.global.server_name | The domain name of the server, with optional explicit port
|
| options/nixos/services.matrix-synapse.settings.server_name | The domain name of the server, with optional explicit port
|
| packages/nixpkgs/matrix-media-repo | Highly configurable multi-domain media repository for Matrix |
| options/nixos/services.nextcloud-spreed-signaling.configureNginx | Whether to set up and configure an nginx virtual host according to upstream's recommendations
|
| options/nixos/services.matrix-synapse.enableRegistrationScript | Whether to install the register_new_matrix_user script, that
allows account creation on the terminal.
This script does not work when the client listener uses UNIX domain sockets
|
| options/nixos/virtualisation.xen.dom0Resources.maxMemory | Maximum amount of memory (in MiB) that Domain 0 can
dynamically allocate to itself
|
| options/nixos/services.akkoma.config.":pleroma".":media_proxy".base_url | Base path for the media proxy
|
| options/nixos/services.hostapd.radios.<name>.countryCode | Country code (ISO/IEC 3166-1)
|
| options/nixos/services.netbird.server.management.singleAccountModeDomain | Enables single account mode
|
| options/nixos/services.postfix.settings.main.mydestination | List of domain names intended for local delivery using /etc/passwd and /etc/aliases.
Do not include virtual domains in this list.
https://www.postfix.org/postconf.5.html#mydestination
|
| packages/nixpkgs/ocamlPackages_latest.apron | Numerical abstract domain library |
| packages/nixpkgs/fast-downward | Domain-independent planning system |
| packages/nixpkgs/python313Packages.textx | Domain-specific languages and parsers in Python |
| packages/nixpkgs/python314Packages.textx | Domain-specific languages and parsers in Python |
| packages/nixpkgs/python312Packages.sirius | Domain specific library for electronic structure calculations |
| packages/nixpkgs/bloodhound-ce | Six Degrees of Domain Admin |
| packages/nixpkgs/linalg | Single-header, public domain, short vector math library for C++ |
| packages/nixpkgs/ocamlPackages_latest.dns-mirage | Opinionated Domain Name System (DNS) library |
| packages/nixpkgs/python313Packages.cvxpy | Domain-specific language for modeling convex optimization problems in Python |
| packages/nixpkgs/python313Packages.masky | Library to remotely dump domain credentials |
| packages/nixpkgs/python314Packages.masky | Library to remotely dump domain credentials |
| packages/nixpkgs/python314Packages.cvxpy | Domain-specific language for modeling convex optimization problems in Python |
| options/nixos/services.discourse.mail.notificationEmailAddress | The from: email address used when
sending all essential system emails
|
| packages/nixpkgs/knot-resolver | Caching validating DNS resolver, from .cz domain registry |
| packages/nixpkgs/goudy-bookletter-1911 | Public domain font based on Frederic Goudy’s Kennerley Oldstyle |
| packages/nixpkgs/libidn | Library for internationalized domain names |
| packages/nixpkgs/python312Packages.meep | Free finite-difference time-domain (FDTD) software for electromagnetic simulations |
| packages/nixpkgs/python313Packages.qudida | QUick and DIrty Domain Adaptation |
| packages/nixpkgs/python314Packages.qudida | QUick and DIrty Domain Adaptation |
| options/nixos/virtualisation.xen.store.settings.conflict.burstLimit | Limits applied to domains whose writes cause other domains' transaction
commits to fail
|
| packages/nixpkgs/python312Packages.tld | Extracts the top level domain (TLD) from the URL given |
| packages/nixpkgs/ldapnomnom | Tool to anonymously bruteforce usernames from Domain controllers |
| packages/nixpkgs/python312Packages.idna | Internationalized Domain Names in Applications (IDNA) |
| packages/nixpkgs/xurlfind3r | Tool to discover URLs for a given domain |
| packages/nixpkgs/wxsqlite3 | C++ wrapper around the public domain SQLite 3.x for wxWidgets |
| packages/nixpkgs/python313Packages.whodap | Python RDAP utility for querying and parsing information about domain names |
| packages/nixpkgs/python314Packages.whodap | Python RDAP utility for querying and parsing information about domain names |
| options/nixos/services.anubis.instances.<name>.settings.METRICS_BIND | The address Anubis' metrics server listens to
|
| options/nixos/programs.tsmClient.servers.<name>.tcpserveraddress | Host/domain name or IP address of the IBM TSM server.
|
| packages/nixpkgs/pdpmake | Public domain POSIX make |
| packages/nixpkgs/massdns | Resolve large amounts of domain names |
| packages/nixpkgs/sccmhunter | Post exploitation tool to identify and attack SCCM related assets in an Active Directory domain |
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.address | The address of this resource
|
| options/nixos/virtualisation.xen.store.settings.quota.maxOutstanding | Maximum outstanding requests, i.e. in-flight requests / domain.
|
| packages/nixpkgs/python312Packages.textx | Domain-specific languages and parsers in Python |
| packages/nixpkgs/perlPackages.NetDNS | Perl Interface to the Domain Name System |
| packages/nixpkgs/python312Packages.masky | Library to remotely dump domain credentials |
| packages/nixpkgs/python312Packages.cvxpy | Domain-specific language for modeling convex optimization problems in Python |
| packages/nixpkgs/perl5Packages.NetDNS | Perl Interface to the Domain Name System |
| packages/nixpkgs/sing-geosite | Community managed domain list |
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.mode | File permissions on the UNIX domain socket.
|
| packages/nixpkgs/python312Packages.qudida | QUick and DIrty Domain Adaptation |
| options/nixos/virtualisation.xen.store.settings.conflict.maxHistorySeconds | Limits applied to domains whose writes cause other domains' transaction
commits to fail
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.tls | Whether to enable TLS on the listener socket.
This option will be ignored for UNIX domain sockets.
|
| packages/nixpkgs/python312Packages.pkuseg | Toolkit for multi-domain Chinese word segmentation |
| packages/nixpkgs/python313Packages.pkuseg | Toolkit for multi-domain Chinese word segmentation |
| packages/nixpkgs/python313Packages.spacy-pkuseg | Toolkit for multi-domain Chinese word segmentation (spaCy fork) |
| packages/nixpkgs/python314Packages.spacy-pkuseg | Toolkit for multi-domain Chinese word segmentation (spaCy fork) |
| packages/nixpkgs/python312Packages.whodap | Python RDAP utility for querying and parsing information about domain names |
| packages/nixpkgs/haskellPackages.ForSyDe | ForSyDe's Haskell-embedded Domain Specific Language |
| packages/nixpkgs/waybackurls | Tool to fetch all the URLs that the Wayback Machine knows about for a domain |
| packages/nixpkgs/silenthound | Tool to enumerate an Active Directory Domain |
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.path | Unix domain socket path to bind this listener to.
|
| packages/nixpkgs/haskellPackages.HaXPath | An XPath-generating embedded domain specific language |
| packages/nixpkgs/perlPackages.TestUNIXSock | Testing UNIX domain socket program |
| packages/nixpkgs/knot-resolver_6 | Caching validating DNS resolver, from .cz domain registry |
| packages/nixpkgs/knot-resolver_5 | Caching validating DNS resolver, from .cz domain registry |
| packages/nixpkgs/sirius | Domain specific library for electronic structure calculations |
| packages/nixpkgs/perl5Packages.TestUNIXSock | Testing UNIX domain socket program |
| packages/nixpkgs/perl538Packages.NetDNS | Perl Interface to the Domain Name System |
| packages/nixpkgs/perl540Packages.NetDNS | Perl Interface to the Domain Name System |
| packages/nixpkgs/akkuPackages.chibi-net-dns | Domain Name Service library, with high-level utilities for address, mx and text record lookups |
| packages/nixpkgs/haskellPackages.units | A domain-specific type system for dimensional analysis |
| packages/nixpkgs/haskellPackages.nacre | Domain-specific languages for describing composable web services |
| packages/nixpkgs/assetfinder | Find domains and subdomains related to a given domain |
| packages/nixpkgs/perlPackages.NetIDNEncode | Internationalizing Domain Names in Applications (UTS #46) |
| packages/nixpkgs/python313Packages.sphinx-fortran | Fortran domain and autodoc extensions to Sphinx |
| packages/nixpkgs/python314Packages.sphinx-fortran | Fortran domain and autodoc extensions to Sphinx |
| packages/nixpkgs/python312Packages.spacy-pkuseg | Toolkit for multi-domain Chinese word segmentation (spaCy fork) |
| packages/nixpkgs/haskellPackages.ideas-math | Interactive domain reasoner for logic and mathematics |
| packages/nixpkgs/perl5Packages.NetIDNEncode | Internationalizing Domain Names in Applications (UTS #46) |
| packages/nixpkgs/perlPackages.IOSocketINET6 | [DEPRECATED] Object interface for AF_INET/AF_INET6 domain sockets |
| packages/nixpkgs/haskellPackages.resolv | Domain Name Service (DNS) lookup via the libresolv standard library routines |
| packages/nixpkgs/haskellPackages.windns | Domain Name Service (DNS) lookup via the <windns.h>/dnsapi.dll standard library |
| packages/nixpkgs/perl5Packages.IOSocketINET6 | [DEPRECATED] Object interface for AF_INET/AF_INET6 domain sockets |
| packages/nixpkgs/haskellPackages.socket-unix | Unix domain sockets |
| packages/nixpkgs/python313Packages.srvlookup | Wrapper for dnspython to return SRV records for a given host, protocol, and domain name |
| packages/nixpkgs/python314Packages.srvlookup | Wrapper for dnspython to return SRV records for a given host, protocol, and domain name |
| packages/nixpkgs/perl540Packages.TestUNIXSock | Testing UNIX domain socket program |
| packages/nixpkgs/perl538Packages.TestUNIXSock | Testing UNIX domain socket program |
| packages/nixpkgs/dnstracer | Determines where a given Domain Name Server (DNS) gets its information from, and follows the chain of DNS servers back to the servers which know the data |
| packages/nixpkgs/haskellPackages.network-dns | Domain Name System data structures |
| packages/nixpkgs/haskellPackages.ideas-math-types | Common types for mathematical domain reasoners |
| packages/nixpkgs/perl540Packages.NetIDNEncode | Internationalizing Domain Names in Applications (UTS #46) |
| packages/nixpkgs/perl538Packages.NetIDNEncode | Internationalizing Domain Names in Applications (UTS #46) |
| packages/nixpkgs/haskellPackages.forsyde-deep | ForSyDe's Haskell-embedded Domain Specific Language |
| packages/nixpkgs/perl538Packages.IOSocketINET6 | [DEPRECATED] Object interface for AF_INET/AF_INET6 domain sockets |
| packages/nixpkgs/perl540Packages.IOSocketINET6 | [DEPRECATED] Object interface for AF_INET/AF_INET6 domain sockets |
| packages/nixpkgs/knot-resolver-manager_6 | Caching validating DNS resolver, from .cz domain registry |
| packages/nixpkgs/haskellPackages.logfloat | Log-domain floating point numbers |
| packages/nixpkgs/python313Packages.tldextract | Python module to accurately separate the TLD from the domain of an URL |
| packages/nixpkgs/python314Packages.tldextract | Python module to accurately separate the TLD from the domain of an URL |
| packages/nixpkgs/python312Packages.srvlookup | Wrapper for dnspython to return SRV records for a given host, protocol, and domain name |
| packages/nixpkgs/haskellPackages.diagrams | Embedded domain-specific language for declarative vector graphics |
| packages/nixpkgs/haskellPackages.cookbook | Tiered general-purpose libraries with domain-specific applications |
| packages/nixpkgs/haskellPackages.bindings-DSL | FFI domain specific language, on top of hsc2hs |
| packages/nixpkgs/haskellPackages.diagrams-lib | Embedded domain-specific language for declarative graphics |
| packages/nixpkgs/haskellPackages.symantic-base | Basic symantic combinators for Embedded Domain-Specific Languages (EDSL) |
| packages/nixpkgs/python312Packages.sphinx-fortran | Fortran domain and autodoc extensions to Sphinx |
| packages/nixpkgs/python312Packages.tldextract | Python module to accurately separate the TLD from the domain of an URL |
| options/nixos/services.grafana.settings.security.strict_transport_security_subdomains | Set to true to enable HSTS includeSubDomains option
|
| packages/nixpkgs/haskellPackages.diagrams-lib_1_5 | Embedded domain-specific language for declarative graphics |
| packages/nixpkgs/python313Packages.noisereduce | Noise reduction using spectral gating (speech, bioacoustics, audio, time-domain signals |
| packages/nixpkgs/python314Packages.noisereduce | Noise reduction using spectral gating (speech, bioacoustics, audio, time-domain signals |
| packages/nixpkgs/haskellPackages.forsyde-shallow | ForSyDe's Haskell-embedded Domain Specific Language |
| packages/nixpkgs/python313Packages.sirius | Domain specific library for electronic structure calculations |
| packages/nixpkgs/python314Packages.sirius | Domain specific library for electronic structure calculations |
| options/nixos/services.headscale.settings.tls_letsencrypt_hostname | Domain name to request a TLS certificate for.
|
| packages/nixpkgs/publicsuffix-list | Cross-vendor public domain suffix database |
| packages/nixpkgs/python312Packages.noisereduce | Noise reduction using spectral gating (speech, bioacoustics, audio, time-domain signals |
| packages/nixpkgs/haskellPackages.ideas-statistics | Interactive domain reasoner for statistics |
| packages/nixpkgs/python313Packages.requests-unixsocket | Use requests to talk HTTP via a UNIX domain socket |
| packages/nixpkgs/python314Packages.requests-unixsocket | Use requests to talk HTTP via a UNIX domain socket |
| packages/nixpkgs/python312Packages.publicsuffix | Allows to get the public suffix of a domain name |
| packages/nixpkgs/python313Packages.publicsuffix | Allows to get the public suffix of a domain name |
| packages/nixpkgs/haskellPackages.ip2location-io | IP2Location.io Haskell package for IP geolocation and domain WHOIS. |
| packages/nixpkgs/python312Packages.requests-unixsocket | Use requests to talk HTTP via a UNIX domain socket |
| packages/nixpkgs/python313Packages.publicsuffix2 | Get a public suffix for a domain name using the Public Suffix List |
| packages/nixpkgs/python314Packages.publicsuffix2 | Get a public suffix for a domain name using the Public Suffix List |
| packages/nixpkgs/python313Packages.requests-unixsocket2 | Use requests to talk HTTP via a UNIX domain socket |
| packages/nixpkgs/python314Packages.requests-unixsocket2 | Use requests to talk HTTP via a UNIX domain socket |
| packages/nixpkgs/haskellPackages.enumerate-function | simple package for inverting functions and testing totality, via brute enumeration of the domain |
| packages/nixpkgs/python312Packages.publicsuffix2 | Get a public suffix for a domain name using the Public Suffix List |
| packages/nixpkgs/python312Packages.requests-unixsocket2 | Use requests to talk HTTP via a UNIX domain socket |
| packages/nixpkgs/haskellPackages.polysemy-methodology | Domain modelling algebra for polysemy |
| packages/nixpkgs/python313Packages.sphinxcontrib-plantuml | Provides a Sphinx domain for embedding UML diagram with PlantUML |
| packages/nixpkgs/python314Packages.sphinxcontrib-plantuml | Provides a Sphinx domain for embedding UML diagram with PlantUML |
| packages/nixpkgs/python312Packages.sphinxcontrib-plantuml | Provides a Sphinx domain for embedding UML diagram with PlantUML |
| packages/nixpkgs/haskellPackages.publicsuffixlist | Is a given string a domain suffix? |
| packages/nixpkgs/junixsocket-common | Java/JNI library that allows the use of Unix Domain Sockets (AF_UNIX sockets) and other socket types, such as AF_TIPC and AF_VSOCK, from Java, using the standard Socket API |
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.userid | username is required if using Identity V2 API
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.username | username is required if using Identity V2 API
|
| options/nixos/services.zapret.blacklist | Specify a list of domains NOT to bypass
|
| options/nixos/services.zapret.whitelist | Specify a list of domains to bypass
|
| options/nixos/services.prometheus.exporters.mail.configuration.servers | List of servers that should be probed.
Note: if your mailserver has rspamd(8) configured,
it can happen that emails from this exporter are marked as spam
|
| options/nixos/services.cloudflare-ddns.ip4Domains | Explicit list of domains to manage only for IPv4
|
| options/nixos/services.cloudflare-ddns.ip6Domains | Explicit list of domains to manage only for IPv6
|
| options/nixos/services.cntlm.noproxy | A list of domains where the proxy is skipped.
|
| options/nixos/services.realmd.enable | Whether to enable realmd service for managing system enrollment in Active Directory domains.
|
| options/nixos/services.pihole-ftl.lists.*.type | Whether domains on this list should be explicitly allowed, or blocked
|
| options/nixos/services.maddy.localDomains | Define list of allowed domains.
|
| options/nixos/services.ncdns.enable | Whether to enable ncdns, a Go daemon to bridge Namecoin to DNS
|
| options/nixos/services.awstats.configs | Attribute set of domains to collect stats for.
|
| options/nixos/services.avahi.browseDomains | List of non-local DNS domains to be browsed.
|
| options/nixos/services.pdfding.allowedHosts | Domains where PdfDing is allowed to run
|
| options/nixos/services.postfix.relayDomains | List of domains we agree to relay to
|
| options/nixos/services.sympa.mta.type | Mail transfer agent (MTA) integration
|
| options/darwin/services.dnsmasq.addresses | List of domains that will be redirected by the DNSmasq.
|
| options/nixos/services.coder.wildcardAccessUrl | If you are providing TLS certificates directly to the Coder server, you must use a single certificate for the root and wildcard domains.
|
| options/nixos/services.pdns-recursor.serveRFC1918 | Whether to directly resolve the RFC1918 reverse-mapping domains:
10.in-addr.arpa,
168.192.in-addr.arpa,
16-31.172.in-addr.arpa
This saves load on the AS112 servers.
|
| options/nixos/services.prosody.s2sSecureDomains | Even if you leave s2s_secure_auth disabled, you can still require valid
certificates for some domains by specifying a list here.
|
| options/nixos/services.stash.settings.no_proxy | A list of domains for which the proxy must not be used
|
| options/nixos/services.nginx.uwsgiResolveWhileRunning | Resolves domains of uwsgi targets at runtime
and not only at start, you have to set
services.nginx.resolver, too.
|
| options/nixos/services.hedgedoc.settings.allowOrigin | List of domains to whitelist.
|
| options/nixos/services.postfix.destination | Full (!) list of domains we deliver locally
|
| options/nixos/services.pdns-recursor.resolveNamecoin | Resolve .bit top-level domains using ncdns and namecoin.
|
| options/nixos/services.headscale.settings.dns.split | Split DNS configuration (map of domains and which DNS server to use for each)
|
| options/nixos/services.nginx.proxyResolveWhileRunning | Resolves domains of proxyPass targets at runtime and not only at startup
|
| options/nixos/services.gotenberg.downloadFrom.denyList | Deny accepting URLs from these domains in the downloadFrom API field
|
| options/nixos/services.invidious-router.nginx.extraDomains | Additional domains to serve invidious-router on.
|
| options/nixos/services.prosody.s2sInsecureDomains | Some servers have invalid or self-signed certificates
|
| options/nixos/services.tinyproxy.settings.Filter | Tinyproxy supports filtering of web sites based on URLs or domains
|
| options/nixos/services.resolved.settings.Resolve.Domains | List of search domains used to complete unqualified name lookups.
|
| options/nixos/networking.stevenblack.whitelist | Domains to exclude from blocking.
|
| options/nixos/virtualisation.libvirtd.hooks.lxc | Hooks that will be placed under /var/lib/libvirt/hooks/lxc.d/
and called for lxc domains begin/end events
|
| options/nixos/virtualisation.libvirtd.hooks.qemu | Hooks that will be placed under /var/lib/libvirt/hooks/qemu.d/
and called for qemu domains begin/end/migrate events
|
| options/nixos/virtualisation.libvirtd.hooks.libxl | Hooks that will be placed under /var/lib/libvirt/hooks/libxl.d/
and called for libxl-handled xen domains begin/end events
|
| options/nixos/services.spamassassin.config | The SpamAssassin local.cf config
If you are using this configuration:
add_header all Status _YESNO_, score=_SCORE_ required=_REQD_ tests=_TESTS_ autolearn=_AUTOLEARN_ version=_VERSION_
Then you can Use this sieve filter:
require ["fileinto", "reject", "envelope"];
if header :contains "X-Spam-Flag" "YES" {
fileinto "spam";
}
Or this procmail filter:
:0:
* ^X-Spam-Flag: YES
/var/vpopmail/domains/lastlog.de/js/.maildir/.spam/new
To filter your messages based on the additional mail headers added by spamassassin.
|
| options/nixos/services.warpgate.settings.http.sni_certificates | Certificates for additional domains.
|
| options/nixos/services.grafana.settings.security.data_source_proxy_whitelist | Define a whitelist of allowed IP addresses or domains, with ports,
to be used in data source URLs with the Grafana data source proxy
|
| options/nixos/services.dendrite.settings.global.trusted_third_party_id_servers | Lists of domains that the server will trust as identity
servers to verify third party identifiers such as phone
numbers and email addresses
|
| packages/nixpkgs/net-tools | Set of tools for controlling the network subsystem in Linux |
| packages/nixpkgs/nettools | Set of tools for controlling the network subsystem in Linux |
| packages/nixpkgs/circt | Circuit IR compilers and tools |
| packages/nixpkgs/bftools | Bundle of scripts for using Bio-Formats on the command line with bioformats_package.jar already included |
| packages/nixpkgs/azure-cli-extensions.ad | Microsoft Azure Command-Line Tools DomainServicesResourceProvider Extension |
| packages/nixpkgs/akkuPackages.industria | Cryptography, OTR, SSH, OpenPGP, etc. |
| packages/nixpkgs/perlPackages.MailDKIM | Signs/verifies Internet mail with DKIM/DomainKey signatures |
| packages/nixpkgs/perl5Packages.MailDKIM | Signs/verifies Internet mail with DKIM/DomainKey signatures |
| packages/nixpkgs/parsedmarc | Python module and CLI utility for parsing DMARC reports |
| packages/nixpkgs/perl540Packages.MailDKIM | Signs/verifies Internet mail with DKIM/DomainKey signatures |
| packages/nixpkgs/perl538Packages.MailDKIM | Signs/verifies Internet mail with DKIM/DomainKey signatures |
| packages/nixpkgs/dns-root-data | DNS root data including root hints and DNSSEC root trust anchor + key |
| packages/nixpkgs/virt-top | Top-like utility for showing stats of virtualized domains |
| packages/nixpkgs/python313Packages.checkdmarc | Parser for SPF and DMARC DNS records |
| packages/nixpkgs/python314Packages.checkdmarc | Parser for SPF and DMARC DNS records |
| packages/nixpkgs/python313Packages.parsedmarc | Python module and CLI utility for parsing DMARC reports |
| packages/nixpkgs/python314Packages.parsedmarc | Python module and CLI utility for parsing DMARC reports |
| packages/nixpkgs/python312Packages.checkdmarc | Parser for SPF and DMARC DNS records |
| packages/nixpkgs/python312Packages.parsedmarc | Python module and CLI utility for parsing DMARC reports |
| packages/nixpkgs/godns | Dynamic DNS client tool supports AliDNS, Cloudflare, Google Domains, DNSPod, HE.net & DuckDNS & DreamHost, etc |
| packages/nixpkgs/haskellPackages.tld | This project separates subdomains, domains, and top-level-domains from URLs |
| packages/nixpkgs/cudaPackages.imex | Service which supports GPU memory export and import (NVLink P2P) and shared memory operations across OS domains in an NVLink multi-node deployment |
| packages/nixpkgs/hblock | Improve your security and privacy by blocking ads, tracking and malware domains |
| packages/nixpkgs/httprobe | Take a list of domains and probe for working HTTP and HTTPS servers |
| packages/nixpkgs/maltego | Open source intelligence and forensics application, enabling to easily gather information about DNS, domains, IP addresses, websites, persons, and so on |
| packages/nixpkgs/python313Packages.idna-ssl | Patch ssl.match_hostname for Unicode(idna) domains support |
| packages/nixpkgs/python314Packages.idna-ssl | Patch ssl.match_hostname for Unicode(idna) domains support |
| packages/nixpkgs/python313Packages.nitime | Algorithms and containers for time-series analysis in time and spectral domains |
| packages/nixpkgs/python314Packages.nitime | Algorithms and containers for time-series analysis in time and spectral domains |
| packages/nixpkgs/trustymail | Tool to scan domains and return data based on trustworthy email best practices |
| packages/nixpkgs/python312Packages.idna-ssl | Patch ssl.match_hostname for Unicode(idna) domains support |
| packages/nixpkgs/gprolog | GNU Prolog, a free Prolog compiler with constraint solving over finite domains |
| packages/nixpkgs/python312Packages.nitime | Algorithms and containers for time-series analysis in time and spectral domains |
| packages/nixpkgs/haskellPackages.finito | Constraint Solver for Finite Domains |
| packages/nixpkgs/haskellPackages.array-memoize | Memoization combinators using arrays for finite sub-domains of functions |
| packages/nixpkgs/python313Packages.ms-active-directory | Python module for integrating with Microsoft Active Directory domains |
| packages/nixpkgs/python314Packages.ms-active-directory | Python module for integrating with Microsoft Active Directory domains |
| packages/nixpkgs/python312Packages.ms-active-directory | Python module for integrating with Microsoft Active Directory domains |
| packages/nixpkgs/hednsextractor | Tool suite for hunting suspicious targets, expose domains and phishing discovery |
| packages/nur/xddxdd.oci-arm-host-capacity | This script allows to bypass Oracle Cloud Infrastructure 'Out of host capacity' error immediately when additional OCI capacity will appear in your Home Region / Availability domain |
| packages/nur/linyinfeng.matrix-media-repo | Matrix media repository with multi-domain in mind |
| packages/nur/eownerdead.pdpmake | Public domain POSIX make |
| packages/nur/rycee.firefox-addons.tab-retitle | Change tab titles easily!
+ Persists through sessions
+ Domain level re-titling
+ Regex replacements
and much more! |
| packages/nur/xddxdd.uncategorized.oci-arm-host-capacity | This script allows to bypass Oracle Cloud Infrastructure 'Out of host capacity' error immediately when additional OCI capacity will appear in your Home Region / Availability domain |
| packages/nur/AndrewKvalheim.fediblockhole | Tool for automatically syncing Mastodon admin domain blocks |
| packages/nur/meain.firefox-addons.containerise | Automatically open websites in a dedicated container |
| packages/nur/rycee.firefox-addons.containerise | Automatically open websites in a dedicated container |
| packages/nur/rycee.firefox-addons.disable-javascript | Adds the ability to disable JavaScript for specific sites or specific tabs |
| packages/nur/rycee.firefox-addons.reddit-moderator-toolbox | This is bundled extension of the /r/toolbox moderator tools for reddit.com
Containing:
Mod Tools Enhanced
Mod Button
Mod Mail Pro
Mod Domain Tagger
Toolbox Notifier
Mod User Notes
Toolbox Config |
| packages/nur/rycee.firefox-addons.widegithub | Makes GitHub wide on Mozilla Firefox |
| packages/nur/rycee.firefox-addons.forget_me_not | Make the browser forget website data (like cookies, local storage, etc.), except for the data you want to keep by adding domains to a whitelist, graylist, blacklist, or redlist. |