| packages/nixpkgs/sbclPackages.group-by | |
| packages/nixpkgs/sbclPackages.group-by-test | |
| packages/nixpkgs/rPackages.groupICA | |
| packages/nixpkgs/rPackages.groupWQS | |
| packages/nixpkgs/emacsPackages.tab-group | |
| packages/nixpkgs/rPackages.groupRemMap | |
| packages/nixpkgs/haskellPackages.group-with | Classify objects by key-generating function, like SQL GROUP BY |
| packages/nixpkgs/haskellPackages.glfw-group | GLFW package with window groups destroyed together |
| packages/nixpkgs/haskellPackages.group-by-date | Shell command for grouping files by dates into folders |
| packages/nixpkgs/haskellPackages.groupBy | Replacement definition of Data |
| packages/nixpkgs/azure-cli-extensions.ip-group | Microsoft Azure Command-Line Tools IpGroup Extension |
| packages/nixpkgs/haskellPackages.pipes-group | Group streams into substreams |
| packages/nixpkgs/haskellPackages.ascii-group | ASCII character groups |
| packages/nixpkgs/rPackages.groupTesting | |
| packages/nixpkgs/haskellPackages.group-theory | The theory of groups |
| packages/nixpkgs/rPackages.GB2group | |
| packages/nixpkgs/libcgroup | Library and tools to manage Linux cgroups |
| packages/nixpkgs/sway-assign-cgroups | Place GUI applications into systemd scopes for systemd-oomd compatibility |
| packages/nixpkgs/rPackages.groupr | |
| packages/nixpkgs/python313Packages.click-option-group | Option groups missing in Click |
| packages/nixpkgs/python314Packages.click-option-group | Option groups missing in Click |
| packages/nixpkgs/emacsPackages.elscreen-buffer-group | |
| packages/nixpkgs/python313Packages.click-default-group | Group to invoke a command without explicit subcommand name |
| packages/nixpkgs/python314Packages.click-default-group | Group to invoke a command without explicit subcommand name |
| packages/nixpkgs/python312Packages.click-option-group | Option groups missing in Click |
| packages/nixpkgs/sbclPackages.groupby | |
| packages/nixpkgs/python312Packages.click-default-group | Group to invoke a command without explicit subcommand name |
| packages/nixpkgs/rPackages.grouper | |
| packages/nixpkgs/rPackages.grouped | |
| packages/nixpkgs/fedigroups | Approximation of groups usable with Fediverse software that implements the Mastodon client API |
| packages/nixpkgs/rPackages.ggroups | |
| packages/nixpkgs/rPackages.ungroup | |
| packages/nixpkgs/home-assistant-component-tests.group | Open source home automation that puts local control and privacy first |
| packages/nixpkgs/rPackages.groupedSurv | |
| packages/nixpkgs/emacsPackages.tab-bar-groups | |
| packages/nixpkgs/rPackages.grouprar | |
| packages/nixpkgs/haskellPackages.groups | Groups |
| packages/nixpkgs/azure-cli-extensions.monitor-pipeline-group | Microsoft Azure Command-Line Tools MonitorPipelineGroup Extension |
| packages/nixpkgs/rPackages.subgroup | |
| packages/nixpkgs/emacsPackages.digit-groups | |
| packages/nixpkgs/emacsPackages.rcirc-groups | |
| packages/nixpkgs/sbclPackages.grouping-stack | |
| packages/nixpkgs/rPackages.groupwalk | |
| packages/nixpkgs/haskellPackages.linux-cgroup | Very basic interface to the Linux CGroup Virtual Filesystem |
| packages/nixpkgs/haskellPackages.grouped-list | Grouped lists |
| packages/nixpkgs/rPackages.freegroup | |
| packages/nixpkgs/rPackages.movegroup | |
| packages/nixpkgs/rPackages.metagroup | |
| packages/nixpkgs/rPackages.rsubgroup | |
| packages/nixpkgs/rPackages.groupdata2 | |
| packages/nixpkgs/haskellPackages.groupoid | A Groupoid class |
| packages/nixpkgs/haskellPackages.quiver-groups | Group and chunk values within a Quiver |
| packages/nixpkgs/emacsPackages.project-tab-groups | |
| packages/nixpkgs/haskellPackages.list-grouping | Functions for grouping a list into sublists |
| packages/nixpkgs/haskellPackages.groups-generic | Generically derive Group instances |
| packages/nixpkgs/python313Packages.cgroup-utils | Utility tools for control groups of Linux |
| packages/nixpkgs/python314Packages.cgroup-utils | Utility tools for control groups of Linux |
| packages/nixpkgs/haskellPackages.groupoids | This package has been absorbed into semigroupoids 4.0 |
| packages/nixpkgs/rPackages.multigroup | |
| packages/nixpkgs/haskellPackages.Semigroup | A semigroup |
| packages/nixpkgs/haskellPackages.cgroup-rts-threads | A container-/cgroup-aware substitute for the GHC RTS `-N` flag |
| packages/nixpkgs/rPackages.groupcompare | |
| packages/nixpkgs/python312Packages.cgroup-utils | Utility tools for control groups of Linux |
| packages/nixpkgs/emacsPackages.workgroups | |
| packages/nixpkgs/python313Packages.numpy-groupies | Optimised tools for group-indexing operations: aggregated sum and more |
| packages/nixpkgs/python314Packages.numpy-groupies | Optimised tools for group-indexing operations: aggregated sum and more |
| packages/nixpkgs/coqPackages.mathcomp-fingroup | |
| packages/nixpkgs/chickenPackages_5.chickenEggs.posix-groups | Access POSIX group information |
| packages/nixpkgs/rocqPackages.mathcomp-fingroup | |
| packages/nixpkgs/python312Packages.numpy-groupies | Optimised tools for group-indexing operations: aggregated sum and more |
| packages/nixpkgs/haskellPackages.semigroups | Anything that associates |
| packages/nixpkgs/rPackages.groupedHyperframe | |
| packages/nixpkgs/emacsPackages.workgroups2 | |
| packages/nixpkgs/haskellPackages.gogol-groups-settings | Google Groups Settings SDK |
| packages/nixpkgs/haskellPackages.either-semigroup | Either with a stricter Semigroup instance |
| packages/nixpkgs/haskellPackages.quickcheck-groups | Testing group class instances with QuickCheck |
| packages/nixpkgs/haskellPackages.partial-semigroup | A partial binary associative operator |
| packages/nixpkgs/haskellPackages.gogol-groups-migration | Google Groups Migration SDK |
| packages/nixpkgs/haskellPackages.finite-semigroups | Operations and classification for finite semigroups |
| packages/nixpkgs/gnomeExtensions.kolour-groups-windows | Advanced window management with grayscale effects and window grouping |
| packages/nixpkgs/haskellPackages.partial-semigroup-test | Testing utilities for the partial-semigroup package |
| packages/nixpkgs/rPackages.groupedHyperframe_random | |
| packages/nixpkgs/python313Packages.mypy-boto3-resource-groups | Type annotations for boto3 resource-groups |
| packages/nixpkgs/python314Packages.mypy-boto3-resource-groups | Type annotations for boto3 resource-groups |
| packages/nixpkgs/haskellPackages.semigroups-actions | Semigroups actions |
| packages/nixpkgs/python312Packages.mypy-boto3-resource-groups | Type annotations for boto3 resource-groups |
| packages/nixpkgs/python313Packages.dependency-groups | A standalone implementation of PEP 735 Dependency Groups |
| packages/nixpkgs/python314Packages.dependency-groups | A standalone implementation of PEP 735 Dependency Groups |
| packages/nixpkgs/rPackages.groupsubsetselection | |
| packages/nixpkgs/haskellPackages.papa-prelude-semigroups | Prelude with only useful functions |
| packages/nixpkgs/haskellPackages.numbered-semigroups | A sequence of semigroups, for composing stuff in multiple spatial directions |
| packages/nixpkgs/python312Packages.dependency-groups | A standalone implementation of PEP 735 Dependency Groups |
| packages/nixpkgs/haskellPackages.semigroupoids | Semigroupoids: Category sans id |
| packages/nixpkgs/ocamlPackages.class_group_vdf | Verifiable Delay Functions bindings to Chia's VDF |
| packages/nixpkgs/haskellPackages.semigroupoids-do | Support for QualifiedDo with semigroupoids classes |
| packages/nixpkgs/haskellPackages.semigroupoid-extras | Semigroupoids that depend on PolyKinds |
| packages/nixpkgs/haskellPackages.papa-semigroupoids | Prelude with only useful functions |
| packages/nixpkgs/haskellPackages.partial-semigroup-hedgehog | Property testing for partial semigroups using Hedgehog |
| packages/nixpkgs/ocamlPackages_latest.class_group_vdf | Verifiable Delay Functions bindings to Chia's VDF |
| packages/nixpkgs/haskellPackages.semigroupoids-syntax | RebindableSyntax using the semigroupoids package |
| packages/nixpkgs/haskellPackages.involutive-semigroups | Semigroups with involution |
| packages/nixpkgs/haskellPackages.sixfiguregroup | A six figure group of time |
| packages/nixpkgs/haskellPackages.papa-semigroupoids-export | export useful functions from `semigroupoids` |
| packages/nixpkgs/home-assistant-custom-components.climate_group | Group multiple climate devices to a single entity |
| packages/nixpkgs/haskellPackages.papa-prelude-semigroupoids | Prelude with only useful functions |
| packages/nixpkgs/haskellPackages.commutative-semigroups | Commutative semigroups |
| packages/nixpkgs/python313Packages.exceptiongroup | Backport of PEP 654 (exception groups) |
| packages/nixpkgs/python314Packages.exceptiongroup | Backport of PEP 654 (exception groups) |
| packages/nixpkgs/python312Packages.exceptiongroup | Backport of PEP 654 (exception groups) |
| packages/nixpkgs/haskellPackages.papa-semigroupoids-implement | useful `semigroupoids` functions reimplemented |
| packages/nixpkgs/python314Packages.types-aiobotocore-resource-groups | Type annotations for aiobotocore resource-groups |
| packages/nixpkgs/python313Packages.types-aiobotocore-resource-groups | Type annotations for aiobotocore resource-groups |
| packages/nixpkgs/python312Packages.types-aiobotocore-resource-groups | Type annotations for aiobotocore resource-groups |
| packages/nixpkgs/haskellPackages.amazonka-resourcegroups | Amazon Resource Groups SDK |
| packages/nixpkgs/python313Packages.azure-mgmt-managementgroups | This is the Microsoft Azure Management Groups Client Library |
| packages/nixpkgs/python314Packages.azure-mgmt-managementgroups | This is the Microsoft Azure Management Groups Client Library |
| packages/nixpkgs/python312Packages.azure-mgmt-managementgroups | This is the Microsoft Azure Management Groups Client Library |
| packages/nixpkgs/haskellPackages.stratosphere-resourcegroups | Stratosphere integration for AWS ResourceGroups |
| packages/nixpkgs/haskellPackages.amazonka-resourcegroupstagging | Amazon Resource Groups Tagging API SDK |
| packages/nixpkgs/python313Packages.mypy-boto3-resourcegroupstaggingapi | Type annotations for boto3 resourcegroupstaggingapi |
| packages/nixpkgs/python314Packages.mypy-boto3-resourcegroupstaggingapi | Type annotations for boto3 resourcegroupstaggingapi |
| packages/nixpkgs/python312Packages.mypy-boto3-resourcegroupstaggingapi | Type annotations for boto3 resourcegroupstaggingapi |
| packages/nixpkgs/python313Packages.types-aiobotocore-resourcegroupstaggingapi | Type annotations for aiobotocore resourcegroupstaggingapi |
| packages/nixpkgs/python314Packages.types-aiobotocore-resourcegroupstaggingapi | Type annotations for aiobotocore resourcegroupstaggingapi |
| packages/nixpkgs/python312Packages.types-aiobotocore-resourcegroupstaggingapi | Type annotations for aiobotocore resourcegroupstaggingapi |
| options/nixos/users.users.<name>.group | The user's primary group.
|
| options/nixos/power.ups.upsmon.group | Group for the default nutmon user
|
| options/nixos/services.ocis.group | The group to run oCIS under
|
| options/nixos/services.qui.group | Group to run qui as.
|
| options/nixos/services.znc.group | Group to own the ZNC process.
|
| options/nixos/services.node-red.group | Group under which Node-RED runs
|
| options/nixos/services.h2o.group | Group running H2O services
|
| options/nixos/services.bee.group | Group the bee binary should execute under.
|
| options/nixos/services.mpd.group | Group account under which MPD runs.
|
| options/nixos/services.vdr.group | Group under which the VDRvdr service runs.
|
| options/nixos/users.extraUsers.<name>.group | The user's primary group.
|
| options/nixos/security.agnos.group | Group to run Agnos as
|
| options/nixos/programs.nncp.group | The group under which NNCP files shall be owned
|
| options/nixos/services.nats.group | Group under which NATS runs.
|
| options/nixos/services.ombi.group | Group under which Ombi runs.
|
| options/nixos/services.plex.group | Group under which Plex runs.
|
| options/nixos/services.caddy.group | Group under which caddy runs.
If left as the default value this group will automatically be created
on system activation, otherwise you are responsible for
ensuring the group exists before the Caddy service starts.
|
| options/nixos/services.ente.api.group | Group under which museum runs
|
| options/nixos/services.ergo.group | The group as which to run the Ergo node.
|
| options/nixos/services.kubo.group | Group under which the Kubo daemon runs
|
| options/nixos/services.loki.group | Group under which the Loki service runs.
|
| options/nixos/services.unit.group | Group account under which unit runs.
|
| options/nixos/services.nscd.group | User group under which nscd runs.
|
| options/nixos/services.tcsd.group | Group account under which tcsd runs.
|
| options/nixos/services.bird-lg.group | Group to run the service.
|
| options/nixos/services.maddy.group | Group account under which maddy runs.
If left as the default value this group will automatically be created
on system activation, otherwise the sysadmin is responsible for
ensuring the group exists before the maddy service starts.
|
| options/nixos/services.guix.group | The group of the Guix build user pool.
|
| options/nixos/services.exim.group | Group to use when no root privileges are required.
|
| options/nixos/services.nifi.group | Group account where Apache NiFi runs.
|
| options/nixos/hardware.i2c.group | Grant access to i2c devices (/dev/i2c-*) to users in this group.
|
| options/nixos/services.db-rest.group | Group under which db-rest runs.
|
| options/nixos/services.hitch.group | The group to run as
|
| options/nixos/services.ntfy-sh.group | Primary group of ntfy-sh user.
|
| options/nixos/services.ytdl-sub.group | Group under which ytdl-sub runs.
|
| options/nixos/services.gitea.group | Group under which gitea runs.
|
| options/nixos/services.davis.group | Group davis runs as.
|
| options/nixos/services.komga.group | Group under which Komga runs.
|
| options/nixos/services.dspam.group | Group for the dspam daemon.
|
| options/nixos/services.amule.group | Group under which amule runs
|
| options/nixos/services.seatd.group | Group to own the seatd socket
|
| options/nixos/services.nexus.group | Group which runs Nexus3.
|
| options/nixos/services.slskd.group | Group under which slskd runs.
|
| options/nixos/services.omnom.group | The Omnom service group.
|
| options/nixos/services.mlmmj.group | mailinglist local group
|
| options/nixos/services.stash.group | Group under which Stash runs.
|
| options/nixos/services.memos.group | The group to run Memos as.
If changing the default value, you are responsible of creating the corresponding group with users.groups.
|
| options/nixos/services.cyrus-imap.group | Cyrus IMAP group name
|
| options/nixos/services.patroni.group | The group for the service
|
| options/nixos/services.sonarr.group | Group account under which Sonarr runs.
If left as the default value this group will automatically be created
on system activation, otherwise you are responsible for
ensuring the group exists before the Sonarr service starts.
|
| options/nixos/services.hound.group | Group the hound daemon should execute under.
|
| options/nixos/services.bosun.group | Group account under which bosun runs.
|
| options/nixos/services.legit.group | Group account under which legit runs.
|
| options/nixos/services.nginx.group | Group account under which nginx runs.
|
| options/nixos/services.movim.group | Group running Movim service
|
| options/nixos/services.rqbit.group | Group account under which rqbit runs.
|
| options/nixos/services.uwsgi.group | Group account under which uWSGI runs.
|
| options/nixos/services.snipe-it.group | Group snipe-it runs as.
|
| options/nixos/services.murmur.group | The name of an existing group to use to run the service
|
| options/nixos/services.felix.group | Group account under which Apache Felix runs.
|
| options/nixos/services.httpd.group | Group under which httpd children processes run.
|
| options/nixos/services.cgit.<name>.group | Group to run the cgit service as.
|
| options/nixos/services.coder.group | Group under which the coder service runs.
If left as the default value this group will automatically be created
on system activation, otherwise it needs to be configured manually.
|
| options/nixos/programs.cdemu.group | Group that users must be in to use cdemu.
|
| options/nixos/hardware.cpu.amd.sev.group | Group to assign to the SEV device.
|
| options/nixos/services.outline.group | Group under which the service should run
|
| options/nixos/services.webhook.group | Webhook will be run under this group
|
| options/nixos/services.ollama.group | Group under which to run ollama
|
| options/nixos/hardware.cpu.x86.msr.group | Group to set for devices of the msr kernel subsystem.
|
| options/nixos/services.quorum.group | The group as which to run quorum.
|
| options/nixos/services.atticd.group | The group under which attic runs.
|
| options/nixos/services.bazarr.group | Group under which bazarr runs.
|
| options/nixos/services.lidarr.group | Group under which Lidarr runs.
|
| options/nixos/services.immich.group | The group immich should run as.
|
| options/nixos/services.artalk.group | Artalk group name.
|
| options/nixos/services.deluge.group | Group under which deluge runs.
|
| options/nixos/services.kismet.group | The group to run Kismet as.
|
| options/nixos/services.galene.group | Group under which galene runs.
|
| options/nixos/services.opkssh.group | System group for opkssh
|
| options/nixos/services.nzbget.group | Group under which NZBGet runs
|
| options/nixos/services.pretix.group | Group under which pretix should run.
|
| options/nixos/services.radarr.group | Group under which Radarr runs.
|
| options/nixos/services.monica.group | Group monica runs as.
|
| options/nixos/services.webdav.group | Group under which WebDAV runs.
|
| options/nixos/services.zammad.group | Name of the Zammad group.
|
| options/nixos/services.github-runners.<name>.group | Group under which to run the service
|
| options/nixos/services.mysql.group | Group account under which MySQL runs.
If left as the default value this group will automatically be created
on system activation, otherwise you are responsible for
ensuring the user exists before the MySQL service starts.
|
| options/nixos/services.prosody.group | Group account under which prosody runs.
If left as the default value this group will automatically be created
on system activation, otherwise you are responsible for
ensuring the group exists before the prosody service starts.
|
| options/nixos/security.pam.ussh.group | If set, then the authenticating user must be a member of this group
to use this module.
|
| options/nixos/services.code-server.group | The group to run code-server under
|
| options/nixos/services.flarum.group | System group to run Flarum
|
| options/nixos/services.akkoma.group | Group account under which Akkoma runs.
|
| options/nixos/services.cross-seed.group | Group to run cross-seed as.
|
| options/nixos/programs.ccache.group | Group owner of CCache directory
|
| options/nixos/services.sftpgo.group | Group name under which SFTPGo runs.
|
| options/nixos/services.gollum.group | Specifies the owner group of the wiki directory
|
| options/nixos/services.baikal.group | Group account under which the web-application run.
|
| options/nixos/services.gitlab.group | Group to run gitlab and all related services.
|
| options/nixos/services.tomcat.group | Group account under which Apache Tomcat runs.
|
| options/nixos/services.rspamd.group | Group to use when no root privileges are required.
|
| options/nixos/services.pihole-ftl.group | Group to run the service as.
|
| options/nixos/services.pyload.group | Group under which pyLoad runs, and which owns the download directory.
|
| options/nixos/services.pocket-id.group | Group account under which Pocket ID runs.
|
| options/nixos/services.zeyple.group | Group to use to run Zeyple.
If left as the default value this group will automatically be created
on system activation, otherwise the sysadmin is responsible for
ensuring the user exists.
|
| options/nixos/services.gitDaemon.group | Group under which Git daemon would be running.
|
| options/nixos/services.rss-bridge.group | The group under which the web application runs.
|
| options/nixos/services.firefly-iii.group | Group under which firefly-iii runs
|
| options/nixos/services.gocd-agent.group | If the default user "gocd-agent" is configured then this is the primary
group of that user.
|
| options/nixos/services.syncoid.group | The group for the service.
|
| options/nixos/services.jupyter.group | Name of the group used to run the jupyter service
|
| options/nixos/services.traefik.group | Primary group under which Traefik runs
|
| options/nixos/services.dolibarr.group | Group account under which dolibarr runs.
If left as the default value this group will automatically be created
on system activation, otherwise you are responsible for
ensuring the group exists before the dolibarr application starts.
|
| options/nixos/services.pixelfed.group | Group account under which pixelfed runs.
If left as the default value this group will automatically be created
on system activation, otherwise you are responsible for
ensuring the group exists before the pixelfed application starts.
|
| options/nixos/services.roon-bridge.group | Group to run the Roon Bridge as.
|
| options/nixos/services.roon-server.group | Group to run the Roon Server as.
|
| options/nixos/services.seafile.group | Group under which seafile runs.
|
| options/nixos/services.icecast.group | Group privileges for the server.
|
| options/nixos/services.corteza.group | The group to run Corteza under.
|
| options/nixos/services.jackett.group | Group under which Jackett runs.
|
| options/nixos/services.homebox.group | Group under which Homebox runs.
|
| options/nixos/services.forgejo.group | Group under which Forgejo runs.
|
| options/nixos/services.owncast.group | Group under which owncast runs.
|
| options/nixos/services.sabnzbd.group | Group to run the service as
|
| options/nixos/services.readarr.group | Group under which Readarr runs.
|
| options/nixos/services.pretalx.group | Group under which pretalx should run.
|
| options/nixos/services.netdata.group | Group under which netdata runs.
|
| options/nixos/services.pdfding.group | Group under which PdfDing runs
|
| options/nixos/services.redmine.group | Group under which Redmine is ran.
|
| options/nixos/services.polaris.group | Group under which Polaris is run.
|
| options/nixos/services.stunnel.group | The group under which stunnel runs.
|
| options/nixos/services.monetdb.group | Group under which MonetDB runs.
|
| options/nixos/services.unbound.group | Group under which unbound runs.
|
| options/nixos/services.zitadel.group | The group to run ZITADEL under.
|
| options/nixos/services.zerobin.group | The group 0bin should run as
|
| options/nixos/services.haproxy.group | Group account under which haproxy runs.
|
| options/nixos/services.couchdb.group | Group account under which couchdb runs.
|
| options/nixos/services.pleroma.group | Group account under which pleroma runs.
|
| options/nixos/security.acme.certs.<name>.group | Group running the ACME client.
|
| options/nixos/services.usbmuxd.group | The group usbmuxd should use to run after startup.
|
| options/nixos/hardware.cpu.amd.sevGuest.group | Group to assign to the SEV guest device.
|
| options/nixos/programs.ydotool.group | Group which users must be in to use ydotool.
|
| options/nixos/services.postfix.group | What to call the Postfix group (must be used only for postfix).
|
| options/nixos/services.podgrab.group | Group under which Podgrab runs, and which owns the download directory.
|
| options/nixos/services.gocd-server.group | If the default user "gocd-server" is configured then this is the primary group of that user.
|
| options/nixos/services.jenkins.group | If the default user "jenkins" is configured then this is the primary
group of that user.
|
| options/nixos/services.rsync.jobs.<name>.group | The name of an existing user group under which the rsync process should run.
|
| options/nixos/services.calibre-web.group | Group account under which Calibre-Web runs.
|
| options/nixos/services.actual.group | Group account under which Actual runs
|
| options/nixos/services.dovecot2.group | Dovecot group name.
|
| options/nixos/services.lavalink.group | The group of the service.
|
| options/nixos/services.opendkim.group | Group for the daemon.
|
| options/nixos/services.postsrsd.group | Group for the daemon
|
| options/nixos/services.redis.servers.<name>.group | Group account under which this instance of redis-server runs.
If left as the default value this group will automatically be
created on system activation, otherwise you are responsible for
ensuring the group exists before the redis service starts.
|
| options/nixos/services.matrix-tuwunel.group | The group tuwunel is run as
|
| options/nixos/services.lxd-image-server.group | Group assigned to the user and the webroot directory.
|
| options/nixos/services.opencloud.group | The group to run OpenCloud under
|
| options/nixos/services.syncthing.group | The group to run Syncthing under
|
| options/nixos/services.dawarich.group | Group under which dawarich runs.
|
| options/nixos/services.crowdsec.group | The group to run crowdsec as
|
| options/nixos/services.jellyfin.group | Group under which jellyfin runs.
|
| options/nixos/services.agorakit.group | Group agorakit runs as.
|
| options/nixos/services.ejabberd.group | Group under which ejabberd is ran
|
| options/nixos/services.librenms.group | Name of the LibreNMS group.
|
| options/nixos/services.influxdb.group | Group under which influxdb runs
|
| options/nixos/services.kanboard.group | Group under which Kanboard runs.
|
| options/nixos/services.ersatztv.group | Group under which ErsatzTV runs.
|
| options/nixos/services.rtorrent.group | Group under which rtorrent runs.
|
| options/nixos/services.olivetin.group | The group under which OliveTin runs.
|
| options/nixos/services.peertube.group | Group under which Peertube runs.
|
| options/nixos/services.stalwart.group | Group ownership of service
|
| options/nixos/services.tautulli.group | Group under which Tautulli runs.
|
| options/nixos/services.mastodon.group | Group under which mastodon runs.
|
| options/nixos/services.sniproxy.group | Group under which sniproxy runs.
|
| options/nixos/services.whisparr.group | Group under which Whisparr runs.
|
| options/nixos/services.klipper.group | Group account under which Klipper runs
|
| options/nixos/services.openldap.group | Group account under which slapd runs.
|
| options/nixos/services.opentsdb.group | Group account under which OpenTSDB runs.
|
| options/nixos/services.oxidized.group | Group under which the oxidized service runs.
|
| options/nixos/services.gitolite.group | Primary group of the Gitolite user account.
|
| options/nixos/services.portunus.group | Group account under which Portunus runs its webserver.
|
| options/nixos/services.pingvin-share.group | Group under which Pingvin Share runs.
|
| options/nixos/services.gammu-smsd.device.group | Owner group of the device
|
| options/nixos/services.webdav-server-rs.group | Group to run under when setuid is not enabled.
|
| options/nixos/boot.initrd.systemd.users.<name>.group | Group the user belongs to in initrd.
|
| options/nixos/services.nginx.gitweb.group | Group that the CGI process will belong to. (Set to config.services.gitolite.group if you are using gitolite.)
|
| options/nixos/services.phpfpm.pools.<name>.group | Group account under which this pool runs.
|
| options/nixos/services.inadyn.group | Group account under which inadyn runs.
If left as the default value this user will automatically be created
on system activation, otherwise you are responsible for
ensuring the user exists before the inadyn service starts.
|
| options/nixos/security.wrappers.<name>.group | The group of the wrapper program.
|
| options/nixos/services.bitcoind.<name>.group | The group as which to run bitcoind.
|
| options/nixos/services.temporal.group | The group temporal runs as
|
| options/nixos/services.quickwit.group | The group quickwit runs as
|
| options/nixos/services.mjpg-streamer.group | mjpg-streamer group name.
|
| options/darwin/services.github-runners.<name>.group | Group under which to run the service
|
| options/nixos/services.jenkinsSlave.group | If the default slave agent user "jenkins" is configured then this is
the primary group of that user.
|
| options/nixos/services.calibre-server.group | The group under which calibre-server runs.
|
| options/nixos/services.octoprint.group | Group for the daemon.
|
| options/nixos/security.acme.defaults.group | Group running the ACME client.
|
| options/nixos/services.bookstack.group | Group bookstack runs as
|
| options/nixos/services.commafeed.group | Group under which CommaFeed runs.
|
| options/nixos/services.glitchtip.group | The group under which GlitchTip runs.
|
| options/nixos/hardware.bumblebee.group | Group for bumblebee socket
|
| options/nixos/services.blendfarm.group | Group under which blendfarm runs.
|
| options/nixos/services.kapacitor.group | Group under which Kapacitor runs
|
| options/nixos/services.librechat.group | The group to run the service as.
|
| options/nixos/services.pinchflat.group | Group under which Pinchflat runs.
|
| options/nixos/services.navidrome.group | Group under which Navidrome runs.
|
| options/nixos/services.recyclarr.group | Group under which recyclarr runs.
|
| options/nixos/services.sickbeard.group | Group to run the service as
|
| options/nixos/services.pgbouncer.group | The group pgbouncer is run as.
|
| options/nixos/services.privatebin.group | Group under which privatebin runs
|
| options/nixos/services.headscale.group | Group under which headscale runs.
If left as the default value this group will automatically be created
on system activation, otherwise you are responsible for
ensuring the user exists before the headscale service starts.
|
| options/nixos/services.charybdis.group | Charybdis IRC daemon group.
|
| options/nixos/services.cassandra.group | Run Apache Cassandra under this group.
|
| options/nixos/hardware.ubertooth.group | Group for Ubertooth's udev rules.
|
| options/nixos/services.bitmagnet.group | Group of user running bitmagnet
|
| options/nixos/services.stargazer.group | Group account under which stargazer runs.
|
| options/nixos/services.rethinkdb.group | Group which rethinkdb user belongs to.
|
| options/nixos/services.moonraker.group | Group account under which Moonraker runs.
|
| options/nixos/services.rutorrent.group | Group which runs the ruTorrent service.
|
| options/nixos/services.mediatomb.group | Group account under which the service runs.
|
| options/nixos/services.portunus.ldap.group | Group account under which Portunus runs its LDAP server.
|
| options/nixos/services.varnish.listen.*.group | Group name who owns the socket file.
|
| options/nixos/programs.k40-whisperer.group | Group assigned to the device when connected.
|
| options/nixos/services.tandoor-recipes.group | Group under which Tandoor runs.
|
| options/nixos/services.infinoted.group | What to call the primary group of the dedicated user under which infinoted is run
|
| options/nixos/system.nssDatabases.group | List of group entries to configure in /etc/nsswitch.conf
|
| options/nixos/users.groups.<name>.gid | The group GID
|
| options/nixos/services.buildbot-master.group | Primary group of buildbot user.
|
| options/nixos/services.peertube-runner.group | Group under which peertube-runner runs.
|
| options/nixos/services.suwayomi-server.group | Group under which Suwayomi-Server runs.
|
| options/nixos/services.plantuml-server.group | Group which runs PlantUML server.
|
| options/nixos/users.groups.<name>.members | The user names of the group members, added to the
/etc/group file.
|
| options/nixos/services.buildbot-worker.group | Primary group of buildbot Worker user.
|
| options/nixos/services.tailscaleAuth.group | Group which runs tailscale-nginx-auth
|
| options/home-manager/services.podman.volumes.<name>.group | The group ID owning the volume inside the container.
|
| options/nixos/services.yggdrasil.group | Group to grant access to the Yggdrasil control socket
|
| options/nixos/services.taskserver.group | Group for Taskserver.
|
| options/nixos/services.headphones.group | Group to run the service as
|
| options/nixos/services.homebridge.group | Group to run homebridge as.
|
| options/nixos/services.govee2mqtt.group | Group under which Govee2MQTT should run.
|
| options/nixos/services.photoprism.group | Group under which photoprism runs.
|
| options/nixos/services.szurubooru.group | Group under which Szurubooru runs.
|
| options/nixos/services.microsocks.group | Group microsocks runs as.
|
| options/nixos/services.linkwarden.group | The group Linkwarden should run as.
|
| options/nixos/services.lubelogger.group | Group under which LubeLogger runs.
|
| options/nixos/services.reposilite.group | The group to run Reposilite under.
|
| options/nixos/services.firefly-iii-data-importer.group | Group under which firefly-iii-data-importer runs
|
| options/nixos/users.groups.<name>.name | The name of the group
|
| options/nixos/services.samba.usershares.group | Name of the group members of which will be allowed to create usershares
|
| options/nixos/services.shairport-sync.group | Group account name under which to run shairport-sync
|
| options/nixos/services.mattermost.group | Group which runs the Mattermost service.
|
| options/nixos/services.scollector.group | Group account under which scollector runs.
|
| options/nixos/services.borgbackup.jobs.<name>.group | The group borg is run as
|
| options/home-manager/programs.kakoune.config.hooks.*.group | Add the hook to the named group.
|
| options/nixos/services.nullmailer.group | Group to use to run nullmailer-send.
|
| options/nixos/services.sourcehut.hg.group | Group for hg.sr.ht
|
| options/nixos/services.mailman.ldap.groupSearch.type | Type of group to perform a group search against.
|
| options/nixos/services.openvscode-server.group | The group to run openvscode-server under
|
| options/nixos/services.sourcehut.man.group | Group for man.sr.ht
|
| options/nixos/services.sourcehut.git.group | Group for git.sr.ht
|
| options/nixos/services.sourcehut.hub.group | Group for hub.sr.ht
|
| options/nixos/services.healthchecks.group | Group account under which healthchecks runs.
If left as the default value this group will automatically be created
on system activation, otherwise you are responsible for
ensuring the group exists before the healthchecks service starts.
|
| options/nixos/services.komodo-periphery.group | Group under which the Periphery agent runs.
|
| options/nixos/services.opensearch.group | The group OpenSearch runs as
|
| options/nixos/services.cloudflare-ddns.group | Group under which the service runs.
|
| options/nixos/services.sourcehut.todo.group | Group for todo.sr.ht
|
| options/nixos/services.sourcehut.meta.group | Group for meta.sr.ht
|
| options/nixos/services.borgbackup.repos.<name>.group | The group borg serve is run as
|
| options/darwin/users.groups | Configuration for groups.
|
| options/nixos/environment.etc.<name>.group | Group name of file owner
|
| options/nixos/services.silverbullet.group | The group to run Silverbullet under
|
| options/nixos/services.sourcehut.paste.group | Group for paste.sr.ht
|
| options/nixos/services.sourcehut.lists.group | Group for lists.sr.ht
|
| options/nixos/services.sourcehut.pages.group | Group for pages.sr.ht
|
| options/nixos/services.hbase-standalone.group | Group account under which HBase runs.
|
| options/nixos/services.netbird.tunnels.<name>.user.group | A system group name for this client instance.
|
| options/nixos/services.netbird.clients.<name>.user.group | A system group name for this client instance.
|
| options/nixos/services.filebrowser.group | Group under which FileBrowser runs.
|
| options/nixos/services.meshtasticd.group | Group meshtasticd runs as.
|
| options/nixos/services.qbittorrent.group | Group under which qbittorrent runs.
|
| options/nixos/services.writefreely.group | Group under which Writefreely is ran.
|
| options/nixos/services.vdirsyncer.jobs.<name>.group | group to run vdirsyncer as
|
| options/nixos/hardware.cpu.intel.sgx.provision.group | Group to assign to the SGX provisioning device.
|
| options/nixos/services.sillytavern.group | Group account under which the web-application run.
|
| options/nixos/services.wyoming.satellite.group | Group to run wyoming-satellite under.
|
| options/nixos/users.groups | Additional groups to be created automatically by the system.
|
| options/nixos/services.vault-agent.instances.<name>.group | Group under which this instance runs.
|
| options/nixos/services.sourcehut.builds.group | Group for builds.sr.ht
|
| options/nixos/services.keepalived.vrrpScripts.<name>.group | Name of group to run the script under
|
| options/nixos/services.suricata.settings.run-as.group | Run Suricata with a specific group-id.
|
| options/nixos/services.mailman.ldap.groupSearch.ou | Organizational unit to look up a group.
|
| options/nixos/services.anubis.defaultOptions.group | The group under which Anubis is run
|
| options/home-manager/services.podman.containers.<name>.group | The group ID inside the container.
|
| options/nixos/services.anubis.instances.<name>.group | The group under which Anubis is run
|
| options/nixos/services.mail.sendmailSetuidWrapper.group | The group of the wrapper program.
|
| options/darwin/system.defaults.dock.expose-group-apps | Whether to group windows by application in Mission Control's Exposé
|
| options/nixos/security.duosec.groups | If specified, Duo authentication is required only for users
whose primary group or supplementary group list matches one
of the space-separated pattern lists
|
| options/nixos/services.blockbook-frontend.<name>.group | The group as which to run blockbook-frontend-‹name›.
|
| options/nixos/services.foundationdb.group | Group account under which FoundationDB runs.
|
| options/nixos/services.matterbridge.group | Group which runs the matterbridge service.
|
| options/nixos/services.transmission.group | Group account under which Transmission runs.
|
| options/nixos/services.authelia.instances.<name>.group | The name of the group for this authelia instance.
|
| options/nixos/services.xserver.desktopManager.phosh.group | The group to run the Phosh service.
|
| options/nixos/systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.group | The group of the file
|
| options/nixos/services.prometheus.exporters.chrony.group | Group under which the chrony exporter shall be run
|
| options/nixos/services.prometheus.exporters.frr.group | Group under which the frr exporter shall be run
|
| options/darwin/users.groups.<name>.gid | The group's GID.
|
| options/nixos/services.nginx.tailscaleAuth.group | Alias of services.tailscaleAuth.group.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.group | Members of this group can access the control socket for this interface.
|
| options/nixos/services.mailman.ldap.groupSearch.query | Query to find a group associated to a user in the LDAP database.
|
| options/nixos/services.consul-template.instances.<name>.group | Group under which this instance runs.
|
| options/nixos/services.matrix-continuwuity.group | The group continuwuity is run as.
|
| options/nixos/services.wasabibackend.group | The group as which to run the wasabibackend node.
|
| options/nixos/services.cockroachdb.group | User account under which CockroachDB runs
|
| options/nixos/services.nextcloud-spreed-signaling.group | Group under which to run the Spreed signaling server.
|
| options/nixos/services.fcgiwrap.instances.<name>.socket.group | Group to be set as owner of the UNIX socket.
|
| options/nixos/services.taskchampion-sync-server.group | Unix Group to run the server under
|
| options/nixos/services.prometheus.exporters.sql.group | Group under which the sql exporter shall be run.
|
| options/nixos/services.prometheus.exporters.nut.group | Group under which the nut exporter shall be run.
|
| options/nixos/services.prometheus.exporters.kea.group | Group under which the kea exporter shall be run.
|
| options/nixos/services.prometheus.exporters.pve.group | Group under which the pve exporter shall be run.
|
| options/nixos/services.prometheus.exporters.zfs.group | Group under which the zfs exporter shall be run.
|
| options/nixos/services.prometheus.exporters.lnd.group | Group under which the lnd exporter shall be run.
|
| options/nixos/boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.group | The group of the file
|
| options/nixos/services.sourcehut.settings."todo.sr.ht::mail".sock-group | The lmtp daemon will make the unix socket group-read/write
for users in this group.
|
| options/nixos/services.prometheus.exporters.postfix.group | Group under which the postfix exporter shall be run
|
| options/nixos/services.prometheus.exporters.flow.group | Group under which the flow exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mail.group | Group under which the mail exporter shall be run.
|
| options/nixos/services.prometheus.exporters.snmp.group | Group under which the snmp exporter shall be run.
|
| options/nixos/services.prometheus.exporters.bind.group | Group under which the bind exporter shall be run.
|
| options/nixos/services.prometheus.exporters.bird.group | Group under which the bird exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mqtt.group | Group under which the mqtt exporter shall be run.
|
| options/nixos/services.prometheus.exporters.ebpf.group | Group under which the ebpf exporter shall be run.
|
| options/nixos/services.prometheus.exporters.ipmi.group | Group under which the ipmi exporter shall be run.
|
| options/nixos/services.prometheus.exporters.knot.group | Group under which the knot exporter shall be run.
|
| options/nixos/services.prometheus.exporters.nats.group | Group under which the nats exporter shall be run.
|
| options/nixos/services.prometheus.exporters.node.group | Group under which the node exporter shall be run.
|
| options/nixos/services.prometheus.exporters.ping.group | Group under which the ping exporter shall be run.
|
| options/nixos/services.prometheus.exporters.json.group | Group under which the json exporter shall be run.
|
| options/nixos/services.fcgiwrap.instances.<name>.process.group | Group as which this instance of fcgiwrap will be run.
|
| options/nixos/services.prometheus.exporters.php-fpm.group | Group under which the php-fpm exporter shall be run.
|
| options/nixos/services.prometheus.exporters.idrac.group | Group under which the idrac exporter shall be run.
|
| options/nixos/services.prometheus.exporters.dmarc.group | Group under which the dmarc exporter shall be run.
|
| options/nixos/services.prometheus.exporters.redis.group | Group under which the redis exporter shall be run.
|
| options/nixos/services.prometheus.exporters.fritz.group | Group under which the fritz exporter shall be run.
|
| options/nixos/services.prometheus.exporters.v2ray.group | Group under which the v2ray exporter shall be run.
|
| options/nixos/services.prometheus.exporters.kafka.group | Group under which the kafka exporter shall be run.
|
| options/nixos/services.prometheus.exporters.jitsi.group | Group under which the jitsi exporter shall be run.
|
| options/nixos/services.prometheus.exporters.nginx.group | Group under which the nginx exporter shall be run.
|
| options/nixos/services.audiobookshelf.group | Group under which Audiobookshelf runs.
|
| options/nixos/services.libretranslate.group | Group account under which libretranslate runs.
|
| options/nixos/services.prometheus.exporters.node-cert.group | Group under which the node-cert exporter shall be run.
|
| options/nixos/boot.initrd.systemd.groups.<name>.gid | ID of the group in initrd.
|
| options/darwin/users.groups.<name>.name | The group's name
|
| options/nixos/services.librenms.distributedPoller.group | Group(s) of this poller.
|
| options/nixos/networking.wireless.userControlled.group | Members of this group can control wpa_supplicant.
|
| options/nixos/services.prometheus.exporters.dnssec.group | Group under which the dnssec exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mysqld.group | Group under which the mysqld exporter shall be run.
|
| options/nixos/services.prometheus.exporters.script.group | Group under which the script exporter shall be run.
|
| options/nixos/services.prometheus.exporters.fastly.group | Group under which the fastly exporter shall be run.
|
| options/nixos/services.prometheus.exporters.deluge.group | Group under which the deluge exporter shall be run.
|
| options/nixos/services.prometheus.exporters.shelly.group | Group under which the shelly exporter shall be run.
|
| options/nixos/services.prometheus.exporters.rspamd.group | Group under which the rspamd exporter shall be run.
|
| options/nixos/services.prometheus.exporters.tibber.group | Group under which the tibber exporter shall be run.
|
| options/nixos/services.prometheus.exporters.restic.group | Group under which the restic exporter shall be run.
|
| options/nixos/services.prometheus.exporters.statsd.group | Group under which the statsd exporter shall be run.
|
| options/nixos/services.prometheus.exporters.domain.group | Group under which the domain exporter shall be run.
|
| options/nixos/services.prometheus.exporters.pihole.group | Group under which the pihole exporter shall be run.
|
| options/nixos/services.sourcehut.settings."lists.sr.ht::worker".sock-group | The lmtp daemon will make the unix socket group-read/write
for users in this group.
|
| options/nixos/services.prometheus.exporters.nvidia-gpu.group | Group under which the nvidia-gpu exporter shall be run.
|
| options/nixos/services.prometheus.exporters.rtl_433.group | Group under which the rtl_433 exporter shall be run.
|
| options/nixos/services.prometheus.exporters.libvirt.group | Group under which the libvirt exporter shall be run.
|
| options/nixos/services.prometheus.exporters.bitcoin.group | Group under which the bitcoin exporter shall be run.
|
| options/nixos/services.prometheus.exporters.dovecot.group | Group under which the dovecot exporter shall be run.
|
| options/nixos/services.prometheus.exporters.sabnzbd.group | Group under which the sabnzbd exporter shall be run.
|
| options/nixos/services.prometheus.exporters.varnish.group | Group under which the varnish exporter shall be run.
|
| options/nixos/services.prometheus.exporters.klipper.group | Group under which the klipper exporter shall be run.
|
| options/nixos/services.prometheus.exporters.unbound.group | Group under which the unbound exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mongodb.group | Group under which the mongodb exporter shall be run.
|
| options/nixos/services.prometheus.exporters.dnsmasq.group | Group under which the dnsmasq exporter shall be run.
|
| options/nixos/services.prometheus.exporters.ecoflow.group | Group under which the ecoflow exporter shall be run.
|
| options/nixos/services.prometheus.exporters.apcupsd.group | Group under which the apcupsd exporter shall be run.
|
| options/nixos/services.prometheus.exporters.process.group | Group under which the process exporter shall be run.
|
| options/nixos/services.prometheus.exporters.systemd.group | Group under which the systemd exporter shall be run.
|
| options/nixos/services.prometheus.exporters.py-air-control.group | Group under which the py-air-control exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mailman3.group | Group under which the mailman3 exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mikrotik.group | Group under which the mikrotik exporter shall be run.
|
| options/nixos/services.prometheus.exporters.opnsense.group | Group under which the opnsense exporter shall be run.
|
| options/nixos/services.prometheus.exporters.postgres.group | Group under which the postgres exporter shall be run.
|
| options/nixos/services.prometheus.exporters.nginxlog.group | Group under which the nginxlog exporter shall be run.
|
| options/nixos/services.prometheus.exporters.unpoller.group | Group under which the unpoller exporter shall be run.
|
| options/nixos/services.prometheus.exporters.graphite.group | Group under which the graphite exporter shall be run.
|
| options/nixos/services.prometheus.exporters.fritzbox.group | Group under which the fritzbox exporter shall be run.
|
| options/nixos/services.prometheus.exporters.smartctl.group | Group under which the smartctl exporter shall be run.
|
| options/nixos/services.prometheus.exporters.blackbox.group | Group under which the blackbox exporter shall be run.
|
| options/nixos/services.prometheus.exporters.influxdb.group | Group under which the influxdb exporter shall be run.
|
| options/nixos/services.prometheus.exporters.keylight.group | Group under which the keylight exporter shall be run.
|
| options/nixos/services.prometheus.exporters.collectd.group | Group under which the collectd exporter shall be run.
|
| options/nixos/services.changedetection-io.group | Group account under which changedetection-io runs.
|
| options/nixos/services.hologram-server.groupClassAttr | The objectclass attribute to search for groups when enableLdapRoles is true
|
| options/nixos/services.prometheus.exporters.imap-mailstat.group | Group under which the imap-mailstat exporter shall be run.
|
| options/nixos/networking.supplicant.<name>.userControlled.group | Members of this group can control wpa_supplicant.
|
| options/nixos/services.prometheus.exporters.borgmatic.group | Group under which the borgmatic exporter shall be run.
|
| options/nixos/services.prometheus.exporters.surfboard.group | Group under which the surfboard exporter shall be run.
|
| options/nixos/services.prometheus.exporters.rasdaemon.group | Group under which the rasdaemon exporter shall be run.
|
| options/nixos/services.prometheus.exporters.nextcloud.group | Group under which the nextcloud exporter shall be run.
|
| options/nixos/services.prometheus.exporters.smokeping.group | Group under which the smokeping exporter shall be run.
|
| options/nixos/services.prometheus.exporters.tailscale.group | Group under which the tailscale exporter shall be run.
|
| options/nixos/services.prometheus.exporters.pgbouncer.group | Group under which the pgbouncer exporter shall be run.
|
| options/nixos/services.prometheus.exporters.wireguard.group | Group under which the wireguard exporter shall be run.
|
| options/darwin/services.github-runners | Multiple GitHub Runners
|
| options/nixos/services.prometheus.exporters.junos-czerwonk.group | Group under which the junos-czerwonk exporter shall be run.
|
| options/darwin/users.groups.<name>.members | The group's members.
|
| options/home-manager/qt.kde.settings | A set of values to be modified by kwriteconfig6
|
| options/nixos/services.prometheus.exporters.buildkite-agent.group | Group under which the buildkite-agent exporter shall be run.
|
| options/nixos/services.prometheus.exporters.storagebox.group | Group under which the storagebox exporter shall be run.
|
| options/nixos/services.prometheus.exporters.scaphandre.group | Group under which the scaphandre exporter shall be run.
|
| options/nixos/services.prometheus.exporters.exportarr-lidarr.group | Group under which the exportarr-lidarr exporter shall be run.
|
| options/nixos/services.prometheus.exporters.exportarr-sonarr.group | Group under which the exportarr-sonarr exporter shall be run.
|
| options/nixos/services.prometheus.exporters.exportarr-bazarr.group | Group under which the exportarr-bazarr exporter shall be run.
|
| options/nixos/services.prometheus.exporters.exportarr-radarr.group | Group under which the exportarr-radarr exporter shall be run.
|
| options/nixos/services.prometheus.exporters.exportarr-readarr.group | Group under which the exportarr-readarr exporter shall be run.
|
| options/nixos/services.prometheus.exporters.artifactory.group | Group under which the artifactory exporter shall be run.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.policies.<name>.group | The group which should be allowed access to the given resource.
|
| options/nixos/services.prometheus.exporters.exportarr-prowlarr.group | Group under which the exportarr-prowlarr exporter shall be run.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups | Some email providers (Gmail) have a different directory hierarchy for
synchronized email messages
|
| options/nixos/security.sudo.extraRules.*.runAs | Under which user/group the specified command is allowed to run
|
| options/nixos/security.tpm2.tssGroup | Group of the tpm kernel resource manager (tpmrm) device-group, set if
applyUdevRules is set.
|
| options/nixos/services.resilio.sharedFolders | Shared folder list
|
| options/nixos/services.prometheus.exporters.modemmanager.group | Group under which the modemmanager exporter shall be run.
|
| options/nixos/security.sudo-rs.extraRules.*.runAs | Under which user/group the specified command is allowed to run
|
| options/home-manager/targets.darwin.defaults."com.apple.dock".expose-group-apps | Whether to enable grouping of windows by application in Mission Control.
|
| options/nixos/services.icingaweb2.groupBackends | groups.ini contents
|
| options/home-manager/launchd.agents.<name>.config.GroupName | This optional key specifies the group to run the job as
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.groupPath | Group directory, relative to root.
|
| options/home-manager/programs.git-credential-keepassxc.groups | The KeePassXC groups used for storing and fetching of credentials
|
| options/home-manager/programs.mbsync.groups | Definition of groups.
|
| options/nixos/services.galene.groupsDir | Web server directory.
|
| options/nixos/boot.initrd.systemd.groups | Groups to include in initrd.
|
| options/nixos/services.github-runners.<name>.user | User under which to run the service
|
| options/nixos/hardware.sane.enable | Enable support for SANE scanners.
Users in the "scanner" group will gain access to the scanner, or the "lp" group if it's also a printer.
|
| options/nixos/users.extraGroups.<name>.members | The user names of the group members, added to the
/etc/group file.
|
| options/darwin/users.users.<name>.gid | The user's primary group.
|
| options/nixos/services.outline.user | User under which the service should run
|
| options/nixos/services.suricata.settings.vars.port-groups | The port group variables for suricata.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels.<name>.name | The unique name for THIS channel in THIS group
|
| options/darwin/launchd.agents.<name>.serviceConfig.GroupName | This optional key specifies the group to run the job as
|
| options/nixos/services.public-inbox.inboxes.<name>.newsgroup | NNTP group name for the inbox.
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.groupNameAttribute | Attribute for a name of group.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.name | The name of this group for this account
|
| options/nixos/security.doas.extraRules.*.groups | The groups / GIDs this rule should apply for.
|
| options/nixos/security.sudo.extraRules.*.groups | The groups / GIDs this rule should apply for.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.groups | All groups to provision
|
| options/nixos/security.sudo-rs.extraRules.*.groups | The groups / GIDs this rule should apply for.
|
| options/nixos/services.kanidm.provision.groups.<name>.present | Whether to ensure that this group is present or absent.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.GroupName | This optional key specifies the group to run the job as
|
| options/nixos/services.kanidm.provision.groups.<name>.members | List of kanidm entities (persons, groups, ...) which are part of this group.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.GroupName | This optional key specifies the group to run the job as
|
| options/nixos/services.davfs2.davGroup | The group of the running mount.davfs daemon
|
| options/nixos/services.below.cgroupFilterOut | A regexp matching the full paths of cgroups whose data shouldn't be collected
|
| options/nixos/services.postfix.setgidGroup | How to call postfix setgid group (for postdrop)
|
| options/nixos/services.multipath.devices.*.path_grouping_policy | The default path grouping policy to apply to unspecified multipaths
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.groupFilter | LDAP filter for groups.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels | List of channels that should be grouped together into this group
|
| options/nixos/services.suricata.settings.vars.address-groups | The address group variables for suricata, if not defined the
default value of suricata (see example) will be used
|
| options/nixos/services.ananicy.extraCgroups | Cgroups to write in 'nixCgroups.cgroups'
|
| options/darwin/users.groups.<name>.description | The group's description.
|
| options/nixos/services.slurm.extraCgroupConfig | Extra configuration for cgroup.conf
|
| options/nixos/security.doas.extraRules.*.runAs | Which user or group the specified command is allowed to run as
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.groupObjectClass | A class that groups will have.
|
| options/nixos/services.oauth2-proxy.google.groups | Restrict logins to members of these Google groups.
|
| options/nixos/services.samba-wsdd.workgroup | Set workgroup name (default WORKGROUP).
|
| options/nixos/hardware.hackrf.enable | Enables hackrf udev rules and ensures 'plugdev' group exists
|
| options/darwin/services.github-runners.<name>.user | User under which to run the service
|
| options/nixos/services.prosody.modules.groups | Shared roster support
|
| options/nixos/services.nsd.zones.<name>.zoneStats | When set to something distinct to null NSD is able to collect
statistics per zone
|
| options/nixos/services.pgmanage.loginGroup | This tells pgmanage to only allow users in a certain PostgreSQL group to
login to pgmanage
|
| options/nixos/services.hardware.lcd.server.usbGroup | The group to use for settings permissions
|
| options/nixos/hardware.ckb-next.gid | Limit access to the ckb daemon to a particular group.
|
| options/nixos/services.kanidm.provision.groups | Provisioning of kanidm groups
|
| options/nixos/services.firezone.server.provision.accounts.<name>.groups.<name>.name | The name of this group
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.groups | Authorization group memberships to require
|
| options/nixos/users.mutableUsers | If set to true, you are free to add new users and groups to the system
with the ordinary useradd and
groupadd commands
|
| options/nixos/services.github-runners.<name>.runnerGroup | Name of the runner group to add this runner to (defaults to the default runner group)
|
| options/darwin/services.github-runners.<name>.runnerGroup | Name of the runner group to add this runner to (defaults to the default runner group)
|
| options/nixos/users.extraGroups.<name>.gid | The group GID
|
| options/nixos/systemd.enableCgroupAccounting | Whether to enable cgroup accounting; see cgroups(7).
|
| options/nixos/services.kanidm.provision.groups.<name>.overwriteMembers | Whether the member list should be overwritten each time (true) or appended
(false)
|
| options/nixos/services.grafana.provision.alerting.rules.settings.groups.*.name | Name of the rule group
|
| options/nixos/programs.wireshark.enable | Whether to add Wireshark to the global environment and create a 'wireshark'
group
|
| options/nixos/services.taskserver.organisations.<name>.groups | A list of group names that belong to the organization.
|
| options/nixos/users.extraGroups.<name>.name | The name of the group
|
| options/nixos/services.firezone.server.provision.accounts.<name>.groups.<name>.members | The members of this group
|
| options/nixos/services.grafana.provision.alerting.rules.settings.groups.*.folder | Name of the folder the rule group will be stored in
|
| options/nixos/programs.wireshark.usbmon.enable | Whether to allow users in the 'wireshark' group to capture USB traffic
|
| options/nixos/programs.wireshark.dumpcap.enable | Whether to allow users in the 'wireshark' group to capture network traffic
|
| options/nixos/services.firezone.server.provision.accounts.<name>.groups.<name>.forceMembers | Ensure that only the given members are part of this group at every server start.
|
| options/nixos/services.grafana.provision.alerting.rules.settings.groups.*.interval | Interval that the rule group should be evaluated at
|
| packages/nixpkgs/ugm | Terminal based UNIX user and group browser |
| options/nixos/users.users.<name>.subGidRanges.*.count | Count of subordinate group ids
|
| options/nixos/users.users.<name>.subGidRanges | Subordinate group ids that user is allowed to use
|
| options/nixos/services.prometheus.exporters.dovecot.socketPath | Path under which the stats socket is placed
|
| options/nixos/services.reposilite.useACMEHost | Host of an existing Let's Encrypt certificate to use for SSL
|
| options/nixos/users.users.<name>.autoSubUidGidRange | Automatically allocate subordinate user and group ids for this user
|
| options/nixos/services.kanidm.provision.persons.<name>.groups | List of groups this person should belong to.
|
| packages/nixpkgs/lie | Computer algebra package for Lie group computations |
| options/nixos/services.diod.userdb | This option disables password/group lookups
|
| options/nixos/users.users.<name>.subGidRanges.*.startGid | Start of the range of subordinate group ids that user is
allowed to use.
|
| options/nixos/services.unbound.localControlSocketPath | When not set to null this option defines the path
at which the unbound remote control socket should be created at
|
| options/nixos/programs.light.enable | Whether to install Light backlight control command
and udev rules granting access to members of the "video" group.
|
| options/nixos/users.extraUsers.<name>.subGidRanges.*.count | Count of subordinate group ids
|
| options/nixos/services.kmonad.keyboards.<name>.extraGroups | Extra permission groups to attach to the KMonad instance for
this keyboard
|
| options/nixos/users.extraUsers.<name>.subGidRanges | Subordinate group ids that user is allowed to use
|
| packages/nixpkgs/su-exec | Switch user and group id and exec |
| options/nixos/services.suricata.settings.vars.address-groups.HOME_NET | HOME_NET variable.
|
| options/nixos/hardware.brillo.enable | Whether to enable brillo in userspace
|
| options/nixos/users.extraUsers.<name>.autoSubUidGidRange | Automatically allocate subordinate user and group ids for this user
|
| options/nixos/services.jack.jackd.enable | Whether to enable JACK Audio Connection Kit
|
| options/nixos/hardware.i2c.enable | Whether to enable i2c devices support
|
| packages/nixpkgs/fatrop | Nonlinear optimal control problem solver that aims to be fast, support a broad class of optimal control problems and achieve a high numerical robustness |
| options/nixos/hardware.bladeRF.enable | Enables udev rules for BladeRF devices
|
| options/nixos/services.userdbd.enable | Whether to enable the systemd JSON user/group record lookup service
.
|
| options/nixos/services.dependency-track.oidc.teams.claim | Defines the name of the claim that contains group memberships or role assignments in the provider's userinfo endpoint
|
| options/nixos/services.saned.enable | Enable saned network daemon for remote connection to scanners.
saned would be run from scanner user; to allow
access to hardware that doesn't have scanner group
you should add needed groups to this user.
|
| options/nixos/services.suricata.settings.vars.address-groups.DNP3_SERVER | DNP3_SERVER variable.
|
| options/nixos/services.suricata.settings.vars.address-groups.DNP3_CLIENT | DNP3_CLIENT variable.
|
| options/nixos/programs.tcpdump.enable | Whether to configure a setcap wrapper for tcpdump
|
| options/nixos/users.extraUsers.<name>.subGidRanges.*.startGid | Start of the range of subordinate group ids that user is
allowed to use.
|
| options/nixos/services.suricata.settings.vars.address-groups.ENIP_CLIENT | ENIP_CLIENT variable.
|
| options/nixos/services.suricata.settings.vars.address-groups.ENIP_SERVER | ENIP_SERVER variable.
|
| options/nixos/services.dovecot2.mailGroup | Default group to store mail for virtual users.
|
| options/nixos/security.isolate.cgRoot | Control group which subgroups are placed under
|
| packages/nixpkgs/lnch | Launches a process and moves it out of the process group |
| options/nixos/services.suricata.settings.vars.address-groups.DC_SERVERS | DC_SERVERS variable.
|
| options/nixos/security.sudo.execWheelOnly | Only allow members of the wheel group to execute sudo by
setting the executable's permissions accordingly
|
| options/nixos/security.sudo.keepTerminfo | Whether to preserve the TERMINFO and TERMINFO_DIRS
environment variables, for root and the wheel group.
|
| options/darwin/security.sudo.keepTerminfo | Whether to preserve the TERMINFO and TERMINFO_DIRS
environment variables, for root and the admin group.
|
| options/nixos/services.fastnetmon-advanced.hostgroups | Hostgroups to declaratively load into FastNetMon Advanced
|
| options/nixos/services.suricata.settings.vars.address-groups.AIM_SERVERS | AIM_SERVERS variable.
|
| options/nixos/services.suricata.settings.vars.address-groups.DNS_SERVERS | DNS_SERVERS variable.
|
| options/nixos/services.suricata.settings.vars.address-groups.SQL_SERVERS | SQL_SERVERS variable.
|
| options/nixos/systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.user | The user of the file
|
| options/nixos/security.sudo-rs.execWheelOnly | Only allow members of the wheel group to execute sudo by
setting the executable's permissions accordingly
|
| options/nixos/hardware.glasgow.enable | Enables Glasgow udev rules and ensures 'plugdev' group exists
|
| packages/nixpkgs/lwgrp | Data structures and operations to group MPI processes as an ordered set |
| options/nixos/services.suricata.settings.vars.address-groups.SMTP_SERVERS | SMTP_SERVERS variable.
|
| options/nixos/services.suricata.settings.vars.address-groups.HTTP_SERVERS | HTTP_SERVERS variable.
|
| options/nixos/programs.minipro.enable | Whether to enable minipro and its udev rules
|
| options/nixos/users.allowNoPasswordLogin | Disable checking that at least the root user or a user in the wheel group can log in using
a password or an SSH key
|
| options/nixos/services.suricata.settings.vars.address-groups.MODBUS_CLIENT | MODBUS_CLIENT variable
|
| options/nixos/services.suricata.settings.vars.address-groups.MODBUS_SERVER | MODBUS_SERVER variable.
|
| options/nixos/programs.sedutil.enable | Whether to enable sedutil, to manage self encrypting drives that conform to the Trusted Computing Group OPAL 2.0 SSC specification.
|
| options/nixos/services.nginx.upstreams | Defines a group of servers to use as proxy target.
|
| options/nixos/users.users.<name>.isNormalUser | Indicates whether this is an account for a “real” user
|
| options/nixos/virtualisation.incus.enable | Whether to enable incusd, a daemon that manages containers and virtual machines
|
| options/nixos/services.suricata.settings.vars.address-groups.EXTERNAL_NET | EXTERNAL_NET variable.
|
| options/nixos/programs.gphoto2.enable | Whether to configure system to use gphoto2
|
| options/nixos/services.couchdb.configFile | Configuration file for persisting runtime changes
|
| options/nixos/services.pdfding.enable | Whether to enable PdfDing service
|
| options/nixos/services.smokeping.user | User that runs smokeping and (optionally) thttpd
|
| packages/nixpkgs/element-call | Group calls powered by Matrix |
| options/nixos/services.onlyoffice.securityNonceFile | File holding nginx configuration that sets the nonce used to create secret links
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.groups | Whether to sync ldap groups into BitWarden.
|
| options/nixos/security.loginDefs.settings.GID_MAX | Range of group IDs used for the creation of regular groups by useradd, groupadd, or newusers.
|
| options/nixos/security.loginDefs.settings.GID_MIN | Range of group IDs used for the creation of regular groups by useradd, groupadd, or newusers.
|
| options/nixos/services.molly-brown.certPath | Path to TLS certificate
|
| options/nixos/services.timekpr.adminUsers | All listed users will become part of the timekpr group so they can manage timekpr settings without requiring sudo.
|
| options/nixos/services.portunus.enable | Whether to enable Portunus, a self-contained user/group management and authentication service for LDAP.
|
| options/nixos/services.grafana.settings.server.socket_gid | GID where the socket should be set when protocol=socket
|
| options/nixos/services.suricata.settings.vars.address-groups.TELNET_SERVERS | TELNET_SERVERS variable.
|
| options/nixos/hardware.rtl-sdr.enable | Enables rtl-sdr udev rules, ensures 'plugdev' group exists, and blacklists DVB kernel modules
|
| options/nixos/services.nomad.enableDocker | Enable Docker support
|
| options/nixos/services.traefik.supplementaryGroups | Additional groups under which Traefik runs
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels.<name>.extraConfig | Extra configuration lines to add to THIS channel's
configuration.
|
| options/nixos/programs.flashrom.enable | Installs flashrom and configures udev rules for programmers
used by flashrom
|
| options/nixos/hardware.openrazer.users | Usernames to be added to the "openrazer" group, so that they
can start and interact with the OpenRazer userspace daemon.
|
| options/nixos/security.loginDefs.settings.SYS_GID_MAX | Range of group IDs used for the creation of system groups by useradd, groupadd, or newusers
|
| options/nixos/security.loginDefs.settings.SYS_GID_MIN | Range of group IDs used for the creation of system groups by useradd, groupadd, or newusers
|
| options/nixos/services.aria2.enable | Whether or not to enable the headless Aria2 daemon service
|
| options/nixos/services.mailman.ldap.superUserGroup | Group where a user must be a member of to gain superuser rights.
|
| options/nixos/services.dependency-track.oidc.teamSynchronization | This option will ensure that team memberships for OpenID Connect users are dynamic and
synchronized with membership of OpenID Connect groups or assigned roles
|
| options/nixos/services.grafana.provision.alerting.rules.settings.groups | List of rule groups to import or update.
|
| options/nixos/services.hologram-server.roleAttr | Which LDAP group attribute to search for authorized role ARNs
|
| options/nixos/security.sudo.defaultOptions | Options used for the default rules, granting root and the
wheel group permission to run any command as any user.
|
| options/nixos/networking.networkmanager.enable | Whether to use NetworkManager to obtain an IP address and other
configuration for all network interfaces that are not manually
configured
|
| options/nixos/boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.user | The user of the file
|
| options/nixos/security.sudo-rs.defaultOptions | Options used for the default rules, granting root and the
wheel group permission to run any command as any user.
|
| options/nixos/services.dokuwiki.sites.<name>.acl.*.actor | User or group to restrict
|
| options/nixos/programs.mouse-actions.enable | Whether to install and set up mouse-actions and it's udev rules
|
| options/nixos/users.extraUsers.<name>.isNormalUser | Indicates whether this is an account for a “real” user
|
| options/nixos/networking.wireless.networks.<name>.priority | By default, all networks will get same priority group (0)
|
| options/nixos/nix.settings.trusted-users | A list of names of users that have additional rights when
connecting to the Nix daemon, such as the ability to specify
additional binary caches, or to import unsigned NARs
|
| options/darwin/nix.settings.trusted-users | A list of names of users that have additional rights when
connecting to the Nix daemon, such as the ability to specify
additional binary caches, or to import unsigned NARs
|
| options/nixos/hardware.acpilight.enable | Enable acpilight
|
| options/nixos/services.quickwit.dataDir | Data directory for Quickwit
|
| options/nixos/services.temporal.dataDir | Data directory for Temporal
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels.<name>.patterns | Instead of synchronizing just the mailboxes that
match the farPattern, use it as a prefix which is
not matched against the patterns, and is not affected by mailbox list
overrides.
|
| options/nixos/virtualisation.podman.dockerSocket.enable | Make the Podman socket available in place of the Docker socket, so
Docker tools can find the Podman socket
|
| options/nixos/services.dovecot2.createMailUser | Whether to enable automatically creating the user
given in services.dovecot.user and the group
given in services.dovecot.group.
|
| options/nixos/programs.corectrl.enable | Whether to enable CoreCtrl, a tool to overclock amd graphics cards and processors
|
| options/nixos/services.sourcehut.settings."hg.sr.ht".changegroup-script | A changegroup script which is installed in every mercurial repo
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels.<name>.farPattern | IMAP4 patterns for which mailboxes on the remote mail server to sync
|
| options/nixos/hardware.sheep_net.enable | Enables sheep_net udev rules, ensures 'sheep_net' group exists, and adds
sheep-net to boot.kernelModules and boot.extraModulePackages
|
| options/nixos/security.run0.wheelNeedsPassword | Whether users of the wheel group must
provide a password to run commands as super user via run0.
|
| options/nixos/services.dependency-track.settings."alpine.oidc.teams.claim" | Defines the name of the claim that contains group memberships or role assignments in the provider's userinfo endpoint
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels.<name>.nearPattern | Name for where mail coming from the remote (far) mail server will end up
locally
|
| options/nixos/security.sudo.wheelNeedsPassword | Whether users of the wheel group must
provide a password to run commands as super user via sudo.
|
| options/nixos/security.doas.wheelNeedsPassword | Whether users of the wheel group must provide a password to
run commands as super user via doas.
|
| options/nixos/programs.feedbackd.enable | Whether to enable the feedbackd D-BUS service and udev rules
|
| options/nixos/security.sudo-rs.wheelNeedsPassword | Whether users of the wheel group must
provide a password to run commands as super user via sudo.
|
| options/nixos/programs.mosh.withUtempter | Whether to enable libutempter for mosh
|
| options/nixos/programs.tmux.withUtempter | Whether to enable libutempter for tmux
|
| packages/nixpkgs/csa | Group of LADSPA Audio plugins for FM broadcast and more |
| options/nixos/services.mx-puppet-discord.enable | Whether to enable mx-puppet-discord is a discord puppeting bridge for matrix
|
| options/nixos/hardware.kryoflux.enable | Enables kryoflux udev rules, ensures 'floppy' group exists
|
| options/nixos/programs.idescriptor.users | Users to be added to the idevice group.
|
| options/nixos/services.terraria.enable | If enabled, starts a Terraria server
|
| packages/nixpkgs/sca2d | Experimental static code analyser for OpenSCAD |
| options/nixos/services.netbird.clients.<name>.bin.suffix | A system group name for this client instance.
|
| options/nixos/services.netbird.tunnels.<name>.bin.suffix | A system group name for this client instance.
|
| options/nixos/services.hardware.lcd.server.usbPermissions | Set group-write permissions on a USB device
|
| options/nixos/programs.soundmodem.enable | Whether to add Soundmodem to the global environment and configure a
wrapper for 'soundmodemconfig' for users in the 'soundmodem' group.
|
| packages/nixpkgs/sdbus-cpp | High-level C++ D-Bus library designed to provide easy-to-use yet powerful API |
| options/nixos/services.dependency-track.settings."alpine.oidc.team.synchronization" | This option will ensure that team memberships for OpenID Connect users are dynamic and
synchronized with membership of OpenID Connect groups or assigned roles
|
| options/nixos/security.pam.services.<name>.requireWheel | Whether to permit root access only to members of group wheel.
|
| options/nixos/services.netbird.tunnels.<name>.name | Primary name for use (as a suffix) in:
- systemd service name,
- hardened user name and group,
- systemd
*Directory= names,
- desktop application identification,
|
| options/nixos/services.netbird.clients.<name>.name | Primary name for use (as a suffix) in:
- systemd service name,
- hardened user name and group,
- systemd
*Directory= names,
- desktop application identification,
|
| options/nixos/services.oauth2-proxy.nginx.virtualHosts.<name>.allowed_groups | List of groups to allow access to this vhost, or null to allow all.
|
| options/nixos/programs.benchexec.users | Users that intend to use BenchExec
|
| options/nixos/services.aria2.serviceUMask | The file mode creation mask for Aria2 service
|
| options/nixos/hardware.libjaylink.enable | Whether to enable udev rules for devices supported by libjaylink
|
| options/nixos/security.loginDefs.settings.TTYPERM | The terminal permissions: the login tty will be owned by the TTYGROUP group,
and the permissions will be set to TTYPERM
|
| options/nixos/security.please.wheelNeedsPassword | Whether users of the wheel group must provide a password to run
commands or edit files with please and
pleaseedit respectively.
|
| options/nixos/hardware.keyboard.uhk.enable | Whether to enable non-root access to the firmware of UHK keyboards
|
| options/nixos/services.borgbackup.jobs.<name>.user | The user borg is run as
|
| options/nixos/services.rke2.cisHardening | Enable CIS Hardening for RKE2
|
| packages/nixpkgs/ad-ldap-enum | LDAP based Active Directory user and group enumeration tool |
| packages/nixpkgs/libmsym | Molecular point group symmetry lib |
| options/nixos/services.hologram-server.enableLdapRoles | Whether to assign user roles based on the user's LDAP group memberships
|
| options/nixos/security.pam.services.<name>.enableAppArmor | Enable support for attaching AppArmor profiles at the
user/group level, e.g., as part of a role based access
control scheme.
|
| packages/nixpkgs/fractal | Matrix group messaging app |
| options/nixos/services.beszel.agent.smartmon.enable | Include services.beszel.agent.smartmon.package in the Beszel agent path for disk monitoring and add the agent to the disk group.
|
| options/nixos/services.opensearch.dataDir | Data directory for OpenSearch
|
| options/nixos/services.borgbackup.repos.<name>.user | The user borg serve is run as
|
| options/nixos/services.smartdns.settings | A set that will be generated into configuration file, see the SmartDNS README for details of configuration parameters
|
| packages/nixpkgs/sdbus-cpp_2 | High-level C++ D-Bus library designed to provide easy-to-use yet powerful API |
| options/nixos/security.loginDefs.settings.TTYGROUP | The terminal permissions: the login tty will be owned by the TTYGROUP group,
and the permissions will be set to TTYPERM
|
| options/nixos/services.pipewire.systemWide | If true, a system-wide PipeWire service and socket is enabled
allowing all users in the "pipewire" group to use it simultaneously
|
| options/nixos/security.polkit.adminIdentities | Specifies which users are considered “administrators”, for those
actions that require the user to authenticate as an
administrator (i.e. have an auth_admin
value)
|
| options/nixos/services.displayManager.lemurs.enable | Whether to enable lemurs, a customizable TUI display/login manager.
For Wayland compositors, your user must be in the "seat" group.
|
| options/nixos/virtualisation.virtualbox.host.enableHardening | Enable hardened VirtualBox, which ensures that only the binaries in the
system path get access to the devices exposed by the kernel modules
instead of all users in the vboxusers group.
Disabling this can put your system's security at risk, as local users
in the vboxusers group can tamper with the VirtualBox device files.
|
| options/nixos/services.firezone.gui-client.allowedUsers | All listed users will become part of the firezone-client group so
they can control the tunnel service
|
| options/nixos/services.nebula-lighthouse-service.user | The user and group to run nebula-lighthouse-service as.
|
| options/nixos/services.authelia.instances.<name>.name | Name is used as a suffix for the service name, user, and group
|
| options/home-manager/launchd.agents.<name>.config.AbandonProcessGroup | When a job dies, launchd kills any remaining processes with the same process group ID as the job
|
| options/nixos/services.multipath.devices.*.failback | Tell multipathd how to manage path group failback
|
| options/nixos/services.glusterfs.killMode | The systemd KillMode to use for glusterd.
glusterd spawns other daemons like gsyncd
|
| options/nixos/services.nominatim.database.superUser | Postgresql database superuser used to create Nominatim database and
import data
|
| options/nixos/security.googleOsLogin.enable | Whether to enable Google OS Login
|
| options/nixos/programs.firefox.policies | Group policies to install
|
| options/nixos/services.dnsdist.dnscrypt.providerKey | The filepath to the provider secret key
|
| options/nixos/services.lifecycled.cloudwatchGroup | Write logs to a specific Cloudwatch Logs group.
|
| options/nixos/programs.thunderbird.policies | Group policies to install
|
| options/nixos/services.roundcube.database.username | Username for the postgresql connection
|
| options/nixos/services.aria2.downloadDirPermission | The permission for settings.dir
|
| options/nixos/services.openssh.authorizedKeysCommand | Specifies a program to be used to look up the user's public
keys
|
| packages/nixpkgs/portunus | Self-contained user/group management and authentication service |
| options/darwin/launchd.agents.<name>.serviceConfig.AbandonProcessGroup | When a job dies, launchd kills any remaining processes with the same process group ID as the job
|
| options/nixos/services.pulseaudio.systemWide | If false, a PulseAudio server is launched automatically for
each user that tries to use the sound system
|
| options/nixos/services.kubo.settings.Addresses.API | Multiaddr or array of multiaddrs describing the address to serve the local HTTP API on
|
| options/nixos/services.multipath.devices.*.rr_min_io | Number of I/O requests to route to a path before switching to the next in the
same path group
|
| packages/nixpkgs/tg-archive | Tool for exporting Telegram group chats into static websites like mailing list archives |
| options/nixos/services.varnish.listen.*.address | If given an IP address, it can be a host name ("localhost"), an IPv4 dotted-quad
("127.0.0.1") or an IPv6 address enclosed in square brackets ("[::1]").
(VCL4.1 and higher) If given an absolute Path ("/path/to/listen.sock") or "@"
followed by the name of an abstract socket ("@myvarnishd") accept connections
on a Unix domain socket
|
| options/nixos/services.prometheus.scrapeConfigs.*.triton_sd_configs.*.groups | A list of groups for which targets are retrieved, only supported when targeting the container role
|
| options/darwin/launchd.daemons.<name>.serviceConfig.AbandonProcessGroup | When a job dies, launchd kills any remaining processes with the same process group ID as the job
|
| packages/nixpkgs/libipfix | C library that implements the IPFIX protocol defined by the IP Flow Information Export working group of the IETF |
| options/darwin/launchd.user.agents.<name>.serviceConfig.AbandonProcessGroup | When a job dies, launchd kills any remaining processes with the same process group ID as the job
|
| options/nixos/security.pam.services.<name>.allowNullPassword | Whether to allow logging into accounts that have no password
set (i.e., have an empty password field in
/etc/passwd or
/etc/group)
|
| options/nixos/services.transmission.enable | Whether to enable the headless Transmission BitTorrent daemon
|
| options/home-manager/services.xsuspender.rules.<name>.matchWmClassGroupContains | Match windows where wm class group contains string.
|
| packages/nixpkgs/corosync | Group Communication System with features for implementing high availability within applications |
| packages/nixpkgs/magnetophonDSP.CompBus | Group of compressors mixed into a bus, sidechained from that mix bus |
| options/nixos/virtualisation.docker.enable | This option enables docker, a daemon that manages
linux containers
|
| options/nixos/virtualisation.lxd.enable | This option enables lxd, a daemon that manages
containers
|
| packages/nixpkgs/typstPackages.parcio-thesis | A simple thesis template based on the ParCIO working group at OvGU Magdeburg |
| packages/nixpkgs/typstPackages.parcio-slides | A simple polylux slide template based on the ParCIO working group at OvGU Magdeburg |
| options/nixos/virtualisation.kvmgt.enable | Whether to enable KVMGT (iGVT-g) VGPU support
|
| options/home-manager/services.xsuspender.defaults.matchWmClassGroupContains | Match windows where wm class group contains string.
|
| options/nixos/services.matrix-continuwuity.settings.global.unix_socket_path | Listen on a UNIX socket at the specified path
|
| options/nixos/services.anuko-time-tracker.settings.defaultLanguage | Defines Anuko Time Tracker default language
|
| options/nixos/services.journald.upload.settings.Upload.ServerKeyFile | SSL key in PEM format
|
| options/nixos/services.postfixadmin.database.username | Username for the postgresql connection
|
| options/nixos/networking.wireless.userControlled | Allow users of the wpa_supplicant group to control wpa_supplicant
through wpa_gui or wpa_cli
|
| options/nixos/virtualisation.libvirtd.enable | This option enables libvirtd, a daemon that manages
virtual machines
|
| packages/nixpkgs/typstPackages.deal-us-tfc-template | Template for TFCs at ETSII directed by the DEAL group |
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.MulticastGroup | This optional key can be used to request that the datagram socket join a multicast group
|
| options/nixos/services.archisteamfarm.ipcPasswordFile | Path to a file containing the password
|
| packages/nixpkgs/lpac | C-based eUICC LPA |
| options/nixos/services.multipath.devices.*.rr_min_io_rq | Number of I/O requests to route to a path before switching to the next in the
same path group
|
| packages/nixpkgs/python312Packages.fatrop | Nonlinear optimal control problem solver that aims to be fast, support a broad class of optimal control problems and achieve a high numerical robustness |
| packages/nixpkgs/python313Packages.fatrop | Nonlinear optimal control problem solver that aims to be fast, support a broad class of optimal control problems and achieve a high numerical robustness |
| packages/nixpkgs/python314Packages.fatrop | Nonlinear optimal control problem solver that aims to be fast, support a broad class of optimal control problems and achieve a high numerical robustness |
| options/nixos/services.firezone.server.provision.accounts.<name>.relayGroups | All relay groups to provision
|
| packages/nixpkgs/typstPackages.lacy-ubc-math-project | A UBC MATH 100/101 group project template |
| packages/nixpkgs/seafile-server | File syncing and sharing software with file encryption and group sharing, emphasis on reliability and high performance |
| options/nixos/services.firezone.server.provision.accounts.<name>.relayGroups.<name>.name | The name of this relay group
|
| options/nixos/virtualisation.virtualbox.host.enable | Whether to enable VirtualBox.
In order to pass USB devices from the host to the guests, the user
needs to be in the vboxusers group.
|
| options/nixos/services.netbird.tunnels.<name>.hardened | Hardened service:
- runs as a dedicated user with minimal set of permissions (see caveats),
- restricts daemon configuration socket access to dedicated user group
(you can grant access to it with
users.users."<user>".extraGroups = [ netbird-‹name› ]),
Even though the local system resources access is restricted:
CAP_NET_RAW, CAP_NET_ADMIN and CAP_BPF still give unlimited network manipulation possibilites,
- older kernels don't have
CAP_BPF and use CAP_SYS_ADMIN instead,
Known security features that are not (yet) integrated into the module:
- 2024-02-14:
rosenpass is an experimental feature configurable solely
through --enable-rosenpass flag on the netbird up command,
see the docs
|
| options/nixos/services.netbird.clients.<name>.hardened | Hardened service:
- runs as a dedicated user with minimal set of permissions (see caveats),
- restricts daemon configuration socket access to dedicated user group
(you can grant access to it with
users.users."<user>".extraGroups = [ netbird-‹name› ]),
Even though the local system resources access is restricted:
CAP_NET_RAW, CAP_NET_ADMIN and CAP_BPF still give unlimited network manipulation possibilites,
- older kernels don't have
CAP_BPF and use CAP_SYS_ADMIN instead,
Known security features that are not (yet) integrated into the module:
- 2024-02-14:
rosenpass is an experimental feature configurable solely
through --enable-rosenpass flag on the netbird up command,
see the docs
|
| options/nixos/services.firezone.server.provision.accounts.<name>.gatewayGroups | All gateway groups (sites) to provision
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.removeDisabled | Remove users from bitwarden groups if no longer in the ldap group.
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.MulticastGroup | This optional key can be used to request that the datagram socket join a multicast group
|
| options/nixos/services.keepalived.vrrpInstances.<name>.unicastPeers | Do not send VRRP adverts over VRRP multicast group
|
| options/nixos/services.netbird.clients | Attribute set of NetBird client daemons, by default each one will:
- be manageable using dedicated tooling:
netbird-<name> script,
NetBird - netbird-<name> graphical interface when appropriate (see ui.enable),
- run as a
netbird-<name>.service,
- listen for incoming remote connections on the port
51820 (openFirewall by default),
- manage the
netbird-<name> wireguard interface,
- use the /var/lib/netbird-/config.json configuration file,
- override /var/lib/netbird-/config.json with values from /etc/netbird-/config.d/*.json,
- (
hardened) be locally manageable by netbird-<name> system group,
With following caveats:
- multiple daemons will interfere with each other's DNS resolution of
netbird.cloud, but
should remain fully operational otherwise
|
| options/nixos/services.firezone.server.provision.accounts.<name>.gatewayGroups.<name>.name | The name of this gateway group
|
| options/nixos/services.archisteamfarm.bots.<name>.passwordFile | Path to a file containing the password
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.MulticastGroup | This optional key can be used to request that the datagram socket join a multicast group
|
| packages/nixpkgs/python313Packages.vultr | Vultr.com API Client |
| packages/nixpkgs/python314Packages.vultr | Vultr.com API Client |
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.MulticastGroup | This optional key can be used to request that the datagram socket join a multicast group
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.memberAttribute | Attribute that lists members in a LDAP group.
|
| options/nixos/services.kanidm.unixSettings.pam_allowed_login_groups | Kanidm groups that are allowed to login using PAM.
|
| packages/nixpkgs/typstPackages.upb-cn-templates | Templates for seminar reports, thesis proposals, and theses at the Computer Networks Group of Paderborn University |
| packages/nixpkgs/python313Packages.low-index | Enumerates low index subgroups of a finitely presented group |
| packages/nixpkgs/python314Packages.low-index | Enumerates low index subgroups of a finitely presented group |
| options/nixos/services.kanidm.unix.settings.kanidm.pam_allowed_login_groups | Kanidm groups that are allowed to login using PAM.
|
| packages/nixpkgs/typstPackages.storytiles | 4 images per slide, for group meeting |
| packages/nixpkgs/libjpeg-tools | A complete implementation of 10918-1 (JPEG) coming from jpeg.org (the ISO group) with extensions for HDR, lossless and alpha channel coding standardized as ISO/IEC 18477 (JPEG XT) |
| packages/nixpkgs/python313Packages.clikit | Group of utilities to build beautiful and testable command line interfaces |
| packages/nixpkgs/python314Packages.clikit | Group of utilities to build beautiful and testable command line interfaces |
| options/nixos/services.librenms.distributedPoller.distributedBilling | Enable distributed billing on this poller
|
| options/nixos/services.prometheus.scrapeConfigs.*.static_configs.*.targets | The targets specified by the target group.
|
| packages/nixpkgs/python312Packages.vultr | Vultr.com API Client |
| packages/nixpkgs/python313Packages.ge25519 | Python implementation of Ed25519 group elements and operations |
| packages/nixpkgs/python314Packages.ge25519 | Python implementation of Ed25519 group elements and operations |
| packages/nixpkgs/texlivePackages.gu | Typeset crystallographic group-subgroup-schemes |
| packages/nixpkgs/python312Packages.low-index | Enumerates low index subgroups of a finitely presented group |
| packages/nixpkgs/pari-galdata | PARI database needed to compute Galois group in degrees 8 through 11 |
| options/nixos/services.transmission.downloadDirPermissions | If not null, is used as the permissions
set by system.activationScripts.transmission-daemon
on the directories services.transmission.settings.download-dir,
services.transmission.settings.incomplete-dir.
and services.transmission.settings.watch-dir
|
| packages/nixpkgs/python312Packages.clikit | Group of utilities to build beautiful and testable command line interfaces |
| packages/nixpkgs/python312Packages.seaserv | File syncing and sharing software with file encryption and group sharing, emphasis on reliability and high performance |
| packages/nixpkgs/typstPackages.parcio-thesis_0_2_0 | A simple thesis template based on the ParCIO working group at OvGU Magdeburg |
| packages/nixpkgs/typstPackages.parcio-thesis_0_2_3 | A simple thesis template based on the ParCIO working group at OvGU Magdeburg |
| packages/nixpkgs/typstPackages.parcio-thesis_0_2_2 | A simple thesis template based on the ParCIO working group at OvGU Magdeburg |
| packages/nixpkgs/typstPackages.parcio-thesis_0_1_0 | A simple thesis template based on the ParCIO working group at OvGU Magdeburg |
| packages/nixpkgs/typstPackages.parcio-thesis_0_2_1 | A simple thesis template based on the ParCIO working group at OvGU Magdeburg |
| packages/nixpkgs/haskellPackages.agum | Unification and Matching in an Abelian Group |
| packages/nixpkgs/typstPackages.parcio-slides_0_1_2 | A simple polylux slide template based on the ParCIO working group at OvGU Magdeburg |
| packages/nixpkgs/typstPackages.parcio-slides_0_1_1 | A simple polylux slide templated based on the ParCIO working group at OvGU Magdeburg |
| packages/nixpkgs/typstPackages.parcio-slides_0_1_0 | A simple polylux slide templated based on the ParCIO working group at OvGU Magdeburg |
| packages/nixpkgs/lklug-sinhala | Unicode Sinhala font by Lanka Linux User Group |
| packages/nixpkgs/texlivePackages.es-tex-faq | CervanTeX (Spanish TeX Group) FAQ |
| packages/nixpkgs/haskellPackages.hgal | library for computation automorphism group and canonical labelling of a graph |
| packages/nixpkgs/haskellPackages.woot | Real time group editor without operational transform |
| options/nixos/services.matrix-tuwunel.settings.global.unix_socket_path | Listen on a UNIX socket at the specified path
|
| packages/nixpkgs/haskellPackages.th-sccs | Binding group analysis in Template Haskell |
| packages/nixpkgs/python313Packages.seaserv | File syncing and sharing software with file encryption and group sharing, emphasis on reliability and high performance |
| packages/nixpkgs/python312Packages.ge25519 | Python implementation of Ed25519 group elements and operations |
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.separator | The string by which Uyuni group names are joined into the groups label
Defaults to , in prometheus
when set to null.
|
| packages/nixpkgs/haskellPackages.zyre2 | Haskell zyre bindings for reliable group messaging over local area networks |
| packages/nixpkgs/haskellPackages.warp-tls-uid | set group and user id before running server |
| packages/nixpkgs/perlPackages.Linuxusermod | This module adds, removes and modify user and group accounts according to the passwd and shadow files syntax |
| packages/nixpkgs/typstPackages.lacy-ubc-math-project_0_1_0 | A UBC MATH 100 group project template |
| packages/nixpkgs/typstPackages.lacy-ubc-math-project_0_1_1 | A UBC MATH 100/101 group project template |
| packages/nixpkgs/typstPackages.lacy-ubc-math-project_0_2_0 | A UBC MATH 100/101 group project template |
| packages/nixpkgs/perl5Packages.Linuxusermod | This module adds, removes and modify user and group accounts according to the passwd and shadow files syntax |
| packages/nixpkgs/typstPackages.deal-us-tfc-template_1_1_0 | Template for TFCs at ETSII directed by the DEAL group |
| packages/nixpkgs/typstPackages.deal-us-tfc-template_1_0_0 | Template for TFCs at ETSII directed by the DEAL group |
| packages/nixpkgs/haskellPackages.DigitGroup | Group the digits of numbers by lots |
| packages/nixpkgs/texlivePackages.letgut | Class for the newsletter "La Lettre GUTenberg" of the French TeX User Group GUTenberg |
| packages/nixpkgs/haskellPackages.smartGroup | group strings or bytestrings by words in common |
| packages/nixpkgs/haskellPackages.monoid-map | A monoidal map with the right group instance |
| packages/nixpkgs/nss_wrapper | Wrapper for the user, group and hosts NSS API |
| packages/nixpkgs/haskellPackages.data-tensor | Tensor and Group typeclasses |
| packages/nixpkgs/haskellPackages.pipes-break | Pipes to group by any delimiter (such as lines with carriage returns) |
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rekey_time | Time to schedule CHILD_SA rekeying
|
| packages/nixpkgs/hpx | C++ standard library for concurrency and parallelism |
| packages/nixpkgs/texlivePackages.sugconf | SAS(R) user group conference proceedings document class |
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rekey_bytes | Number of bytes processed before initiating CHILD_SA rekeying
|
| packages/nixpkgs/perl540Packages.Linuxusermod | This module adds, removes and modify user and group accounts according to the passwd and shadow files syntax |
| packages/nixpkgs/perl538Packages.Linuxusermod | This module adds, removes and modify user and group accounts according to the passwd and shadow files syntax |
| packages/nixpkgs/texlivePackages.calxxxx-yyyy | Print a calendar for a group of years |
| packages/nixpkgs/python313Packages.betamax-matchers | Group of experimental matchers for Betamax |
| packages/nixpkgs/python314Packages.betamax-matchers | Group of experimental matchers for Betamax |
| packages/nixpkgs/texlivePackages.atableau | A LaTeX package for symmetric group combinatorics |
| packages/nixpkgs/haskellPackages.zampolit | A tool for checking how much work is done on group projects |
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rekey_packets | Number of packets processed before initiating CHILD_SA rekeying
|
| packages/nixpkgs/typstPackages.upb-cn-templates_0_1_0 | Templates for seminar reports and thesis proposals at the Computer Networks Group of Paderborn University |
| packages/nixpkgs/typstPackages.upb-cn-templates_0_2_0 | Templates for seminar reports, thesis proposals, and theses at the Computer Networks Group of Paderborn University |
| packages/nixpkgs/haskellPackages.HaskellForMaths | Combinatorics, group theory, commutative algebra, non-commutative algebra |
| packages/nixpkgs/haskellPackages.threads-extras | Extends the threads package with a bounded thread group |
| packages/nixpkgs/python312Packages.betamax-matchers | Group of experimental matchers for Betamax |
| packages/nixpkgs/typstPackages.storytiles_0_0_1 | 4 images per slide, for group meeting |
| packages/nixpkgs/uid_wrapper | Wrapper for the user, group and hosts NSS API |
| packages/nixpkgs/haskellPackages.list-duplicate | Group and delete duplicates from a list |
| packages/nixpkgs/resolv_wrapper | Wrapper for the user, group and hosts NSS API |
| packages/nixpkgs/haskellPackages.haskell-throttle | A simple throttling library, which drops messages from same group |
| packages/nixpkgs/haskellPackages.gogol-replicapool-updater | Google Compute Engine Instance Group Updater SDK |
| options/nixos/services.sogo.enable | Whether to enable SOGo groupware.
|
| options/nixos/systemd.sysusers.enable | If enabled, users are created with systemd-sysusers instead of with
the custom update-users-groups.pl script
|
| options/nixos/services.usbguard.IPCAllowedGroups | A list of groupnames that the daemon will accept IPC connections
from.
|
| options/nixos/security.pam.loginLimits.*.domain | Username, groupname, or wildcard this limit applies to
|
| options/nixos/security.pam.services.<name>.limits.*.domain | Username, groupname, or wildcard this limit applies to
|
| options/darwin/users.knownGroups | List of groups owned and managed by nix-darwin
|
| options/nixos/services.nsd.ratelimit.ipv4PrefixLength | IPv4 prefix length
|
| options/nixos/services.nsd.ratelimit.ipv6PrefixLength | IPv6 prefix length
|
| options/nixos/virtualisation.oci-containers.containers.<name>.user | Override the username or UID (and optionally groupname or GID) used
in the container.
|
| options/darwin/system.defaults.WindowManager.AppWindowGroupingBehavior | Grouping strategy when showing windows from an application.
false means "One at a time"
true means "All at once"
|
| options/nixos/services.netbird.server.management.singleAccountModeDomain | Enables single account mode
|
| options/nixos/users.users.<name>.extraGroups | The user's auxiliary groups.
|
| options/nixos/users.extraUsers.<name>.extraGroups | The user's auxiliary groups.
|
| options/nixos/services.mympd.extraGroups | Additional groups for the systemd service.
|
| options/nixos/services.postgresql.systemCallFilter.<name>.priority | Set the priority of the system call filter setting
|
| options/nixos/services.pghero.extraGroups | Additional groups for the systemd service.
|
| options/nixos/services.tomcat.extraGroups | Defines extra groups to which the tomcat user belongs.
|
| options/nixos/services.gocd-agent.extraGroups | List of extra groups that the "gocd-agent" user should be a part of.
|
| options/nixos/services.postgresql.systemCallFilter | Configures the syscall filter for postgresql.service
|
| options/nixos/services.polaris.extraGroups | Polaris' auxiliary groups.
|
| options/nixos/services.code-server.extraGroups | An array of additional groups for the code-server user.
|
| options/nixos/services.jenkins.extraGroups | List of extra groups that the "jenkins" user should be a part of.
|
| options/nixos/services.gocd-server.extraGroups | List of extra groups that the "gocd-server" user should be a part of.
|
| options/nixos/services.nagios.objectDefs | A list of Nagios object configuration files that must define
the hosts, host groups, services and contacts for the
network that you want Nagios to monitor.
|
| options/nixos/users.enforceIdUniqueness | Whether to require that no two users/groups share the same uid/gid.
|
| options/nixos/services.multipath.pathGroups | This option allows you to define multipath groups as described
in http://christophe.varoqui.free.fr/usage.html.
|
| options/nixos/services.logcheck.extraGroups | Extra groups for the logcheck user, for example to be able to use sendmail,
or to access certain log files.
|
| options/nixos/services.multipath.devices | This option allows you to define arrays for use in multipath
groups.
|
| options/nixos/nix.settings.allowed-users | A list of names of users (separated by whitespace) that are
allowed to connect to the Nix daemon
|
| options/darwin/nix.settings.allowed-users | A list of names of users (separated by whitespace) that are
allowed to connect to the Nix daemon
|
| options/nixos/services.portunus.seedSettings | Seed settings for users and groups
|
| options/nixos/services.buildbot-master.extraGroups | List of extra groups that the buildbot user should be a part of.
|
| options/nixos/services.buildbot-worker.extraGroups | List of extra groups that the Buildbot Worker user should be a part of.
|
| options/nixos/services.centrifugo.extraGroups | Additional groups for the systemd service.
|
| options/nixos/security.pam.loginLimits | Define resource limits that should apply to users or groups
|
| options/nixos/services.collabora-online.aliasGroups | Alias groups to use.
|
| options/nixos/services.kanidm.provision.enable | Whether to enable provisioning of groups, users and oauth2 resource servers.
|
| options/nixos/services.synapse-auto-compressor.settings.chunk_size | The number of state groups to work on at once
|
| options/nixos/services.buildkite-agents.<name>.extraGroups | Groups the user for this buildkite agent should belong to
|
| options/nixos/services.snapper.configs.<name>.ALLOW_GROUPS | List of groups allowed to operate with the config
|
| options/nixos/services.pufferpanel.extraGroups | Additional groups for the systemd service.
|
| options/nixos/services.openssh.settings.AllowGroups | If specified, login is allowed only for users part of the
listed groups
|
| options/nixos/services.openssh.settings.DenyGroups | If specified, login is denied for all users part of the listed
groups
|
| options/nixos/services.openvscode-server.extraGroups | An array of additional groups for the openvscode-server user.
|
| options/nixos/services.kanidm.provision.extraJsonFile | A JSON file for provisioning persons, groups & systems
|
| options/nixos/services.woodpecker-agents.agents.<name>.extraGroups | Additional groups for the systemd service.
|
| options/darwin/system.defaults.loginwindow.autoLoginUser | Apple menu > System Preferences > Users and Groups > Login Options
Auto login the supplied user on boot
|
| options/nixos/services.scrutiny.collector.settings.host.id | Host ID for identifying/labelling groups of disks
|
| options/nixos/services.anuko-time-tracker.settings.multiorgMode | Defines whether users see the Register option in the menu of Time Tracker that allows them
to self-register and create new organizations (top groups).
|
| options/nixos/services.crab-hole.supplementaryGroups | Adds additional groups to the crab-hole service
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.scopeMaps | Maps kanidm groups to returned oauth scopes
|
| options/nixos/services.vdirsyncer.jobs.<name>.additionalGroups | additional groups to add the dynamic user to
|
| options/darwin/system.defaults.loginwindow.GuestEnabled | Apple menu > System Preferences > Users and Groups > Login Options
Allow users to login to the machine as guests using the Guest account
|
| options/nixos/services.anuko-time-tracker.settings.defaultCurrency | Defines a default currency symbol for new groups
|
| options/nixos/services.thanos.compact.compact.concurrency | Number of goroutines to use when compacting groups
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.claimMaps | Adds additional claims (and values) based on which kanidm groups an authenticating party belongs to
|
| options/darwin/system.defaults.loginwindow.SleepDisabled | Apple menu > System Preferences > Users and Groups > Login Options
Hides the Sleep button on the login screen
|
| options/darwin/system.defaults.loginwindow.ShutDownDisabled | Apple menu > System Preferences > Users and Groups > Login Options
Hides the Shut Down button on the login screen
|
| options/darwin/system.defaults.loginwindow.RestartDisabled | Apple menu > System Preferences > Users and Groups > Login Options
Hides the Restart button on the login screen
|
| options/nixos/services.taskserver.organisations | An attribute set where the keys name the organisation and the values
are a set of lists of users and
groups.
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.largeImport | Enable if you are syncing more than 2000 users/groups.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.claimMaps.<name>.valuesByGroup | Maps kanidm groups to values for the claim.
|
| options/darwin/system.defaults.loginwindow.ShutDownDisabledWhileLoggedIn | Apple menu > System Preferences > Users and Groups > Login Options
Disables the "Shutdown" option when users are logged in
|
| options/darwin/system.defaults.loginwindow.PowerOffDisabledWhileLoggedIn | Apple menu > System Preferences > Users and Groups > Login Options
If set to true, the Power Off menu item will be disabled when the user is logged in
|
| options/darwin/system.defaults.loginwindow.RestartDisabledWhileLoggedIn | Apple menu > System Preferences > Users and Groups > Login Options
Disables the “Restart” option when users are logged in
|
| options/darwin/system.defaults.loginwindow.SHOWFULLNAME | Apple menu > System Preferences > Users and Groups > Login Options
Displays login window as a name and password field instead of a list of users
|
| options/nixos/services.prometheus.scrapeConfigs.*.static_configs | List of labeled target groups for this job.
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.overwriteExisting | Remove and re-add users/groups, See https://bitwarden.com/help/user-group-filters/#overwriting-syncs for more details.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.resources.<name>.gatewayGroups | A list of gateway groups (sites) which can reach the resource and may be used to connect to it.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.supplementaryScopeMaps | Maps kanidm groups to additionally returned oauth scopes
|
| options/nixos/services.prometheus.scrapeConfigs.*.file_sd_configs.*.files | Patterns for files from which target groups are extracted
|
| packages/nixpkgs/su | Suite containing authentication-related tools such as passwd and su |
| packages/nixpkgs/tet | Test Environment Toolkit is used in test applications like The Open Group's UNIX Certification program and the Free Standards Group's LSB Certification program |
| packages/nixpkgs/sogo | Very fast and scalable modern collaboration suite (groupware) |
| packages/nixpkgs/kent | UCSC Genome Bioinformatics Group's suite of biological analysis tools, i.e. the kent utilities |
| packages/nixpkgs/nsss | Implementation of a subset of the pwd.h, group.h and shadow.h family of functions |
| packages/nixpkgs/kapp | CLI tool that encourages Kubernetes users to manage bulk resources with an application abstraction for grouping |
| packages/nixpkgs/nethogs | Small 'net top' tool, grouping bandwidth by process |
| packages/nixpkgs/skawarePackages.nsss | Implementation of a subset of the pwd.h, group.h and shadow.h family of functions |
| packages/nixpkgs/bedtools | Powerful toolset for genome arithmetic |
| packages/nixpkgs/haskellPackages.toxcore-c | Haskell bindings to the C reference implementation of Tox |
| packages/nixpkgs/agorakit | Web-based, open-source groupware |
| packages/nixpkgs/mwic | Spell-checker that groups possible misspellings and shows them in their contexts |
| packages/nixpkgs/nerd-fonts.daddy-time-mono | Nerd Fonts: A monospaced font for programmers and other terminal groupies |
| packages/nixpkgs/translatepy | Module grouping multiple translation APIs |
| packages/nixpkgs/weechatScripts.autosort | autosort automatically keeps your buffers sorted and grouped by server |
| packages/nixpkgs/haskellPackages.phonetic-languages-simplified-base | A basics of the phonetic-languages functionality that can be groupped |
| packages/nixpkgs/haskellPackages.pipes-lines | Pipes for grouping by lines with carriage returns |
| packages/nixpkgs/bliss | Open source tool for computing automorphism groups and canonical forms of graphs |
| packages/nixpkgs/tshock | Modded server software for Terraria, providing a plugin system and inbuilt tools such as anti-cheat, server-side characters, groups, permissions, and item bans |
| packages/nixpkgs/python313Packages.translatepy | Module grouping multiple translation APIs |
| packages/nixpkgs/python314Packages.translatepy | Module grouping multiple translation APIs |
| packages/nixpkgs/python312Packages.translatepy | Module grouping multiple translation APIs |
| packages/nixpkgs/scmutils | Scheme library for mathematical physics |
| packages/nixpkgs/cf-tool | Codeforces CLI (Submit, Parse, Test, etc.) |
| packages/nixpkgs/lauti | Open source calendar for events, groups and places |
| packages/nixpkgs/mobilizon | Mobilizon is an online tool to help manage your events, your profiles and your groups |
| packages/nixpkgs/userborn | Declaratively bear (manage) Linux users and groups |
| packages/nixpkgs/sophus | C++ implementation of Lie Groups using Eigen |
| packages/nixpkgs/python313Packages.cloup | Click extended with option groups, constraints, aliases, help themes |
| packages/nixpkgs/python314Packages.cloup | Click extended with option groups, constraints, aliases, help themes |
| packages/nixpkgs/dvd-slideshow | Suite of command line programs that creates a slideshow-style video from groups of pictures |
| packages/nixpkgs/go-chromecast | CLI for Google Chromecast, Home devices and Cast Groups |
| packages/nixpkgs/python314Packages.propka | Predictor of the pKa values of ionizable groups in proteins and protein-ligand complexes based in the 3D structure |
| packages/nixpkgs/python313Packages.propka | Predictor of the pKa values of ionizable groups in proteins and protein-ligand complexes based in the 3D structure |
| packages/nixpkgs/nauty | Programs for computing automorphism groups of graphs and digraphs |
| packages/nixpkgs/python312Packages.cloup | Click extended with option groups, constraints, aliases, help themes |
| packages/nixpkgs/python312Packages.propka | Predictor of the pKa values of ionizable groups in proteins and protein-ligand complexes based in the 3D structure |
| packages/nixpkgs/haskellPackages.oalg-abg | Finitely generated abelian groups |
| packages/nixpkgs/haskellPackages.word-note-sox | SoX for algorithmic composition with groups of notes liken to words |
| packages/nixpkgs/texlivePackages.tokmap | Iterate over a token list expandably, without dropping spaces or braced groups |
| packages/nixpkgs/chickenPackages_5.chickenEggs.system | load and compile groups of files |
| packages/nixpkgs/haskellPackages.async-pool | A modified version of async that supports worker groups and many-to-many task dependencies |
| packages/nixpkgs/gancioPlugins.telegram-bridge | Telegram bridge for Gancio, republishes content to Telegram channels or groups |
| packages/nixpkgs/texlivePackages.permute | Support for symmetric groups |
| packages/nixpkgs/autospotting | Automatically convert your existing AutoScaling groups to up to 90% cheaper spot instances with minimal configuration changes |
| packages/nixpkgs/perlPackages.EmailAddressXS | Parse and format RFC 5322 email addresses and groups |
| packages/nixpkgs/perl5Packages.EmailAddressXS | Parse and format RFC 5322 email addresses and groups |
| packages/nixpkgs/texlivePackages.longmath | Nested delimiter groups extending over multiple array cells or lines |
| packages/nixpkgs/libbraiding | C++ library for computations on braid groups |
| packages/nixpkgs/perl538Packages.EmailAddressXS | Parse and format RFC 5322 email addresses and groups |
| packages/nixpkgs/perl540Packages.EmailAddressXS | Parse and format RFC 5322 email addresses and groups |
| packages/nixpkgs/chickenPackages_5.chickenEggs.elliptic-curves | Arithmetic and Cryptography on Elliptic Curve Groups over Finite Fields |
| packages/nixpkgs/coreutils | GNU Core Utilities |
| packages/nixpkgs/haskellPackages.supervisors | Monitor groups of threads with non-hierarchical lifetimes |
| packages/nixpkgs/texlivePackages.hereapplies | A LaTeX package for referencing groups of pages that share something in common |
| packages/nixpkgs/coreutils-full | GNU Core Utilities |
| packages/nixpkgs/uutils-coreutils-noprefix | Cross-platform Rust rewrite of the GNU coreutils |
| packages/nixpkgs/haskellPackages.gogol-resourceviews | Google Compute Engine Instance Groups SDK |
| packages/nixpkgs/toybox | Lightweight implementation of some Unix command line utilities |
| packages/nixpkgs/busybox | Tiny versions of common UNIX utilities in a single small executable |
| packages/nixpkgs/rPackages.GroupBN | |
| packages/nixpkgs/rPackages.GroupSeq | |
| packages/nixpkgs/perlPackages.ClassAccessorGrouped | Lets you build groups of accessors |
| packages/nixpkgs/perl5Packages.ClassAccessorGrouped | Lets you build groups of accessors |
| packages/nixpkgs/rPackages.GroupTest | |
| packages/nixpkgs/perl538Packages.ClassAccessorGrouped | Lets you build groups of accessors |
| packages/nixpkgs/perl540Packages.ClassAccessorGrouped | Lets you build groups of accessors |
| packages/nixpkgs/rPackages.Grouphmap | |
| packages/nixpkgs/rPackages.GroupComparisons | |
| packages/nur/linyinfeng.lpac | C-based eUICC LPA |
| packages/nur/xddxdd.dingtalk | Enterprise communication and collaboration platform developed by Alibaba Group |
| packages/nur/sikmir.osm-lump-ways | Group OSM ways together based on topology & tags |
| packages/nur/xddxdd.uncategorized.dingtalk | Enterprise communication and collaboration platform developed by Alibaba Group |
| packages/nur/rycee.firefox-addons.sidebery | Vertical tabs tree and bookmarks in sidebar with advanced containers configuration, grouping and many other features. |
| packages/nur/rycee.firefox-addons.container-tabs-sidebar | Show tabs in a sidebar grouped by privacy containers. |
| packages/nur/zerozawa.mihomo-smart | A rule-based tunnel in Go with Smart Groups functionality (fork of mihomo) |
| packages/nur/rycee.firefox-addons.shinigami-eyes | Highlights transphobic/anti-LGBT and trans-friendly subreddits/facebook pages/groups with different colors |
| packages/nur/dcsunset.i3-focus-group | Create a group for i3/sway containers to easily switch focus between |
| packages/nur/rycee.firefox-addons.simple-tab-groups | Create, modify, and quickly change tab groups |
| packages/nur/rycee.firefox-addons.container-tab-groups | Chrome-like tab groups using private and isolated containers: The ultimate tab manager and groups for Firefox. |
| packages/nur/rycee.firefox-addons.youtube-subscription-groups | The best way to group your subscriptions
Using this simple extension you can create collections that seamlessly fit into YouTube's layout. |
| packages/nur/999eagle.synapse-find-unreferenced-state-groups | Finds unreferenced state groups persisted by synapse |