| packages/nixpkgs/uhk-udev-rules | udev rules for UHK keyboards from https://ultimatehackingkeyboard.com |
| packages/nixpkgs/qmk-udev-rules | Official QMK udev rules list |
| packages/nixpkgs/zsa-udev-rules | udev rules for ZSA devices |
| packages/nixpkgs/apio-udev-rules | Apio udev rules list |
| packages/nixpkgs/ledger-udev-rules | udev rules for Ledger devices |
| packages/nixpkgs/teensy-udev-rules | udev rules for the Teensy microcontrollers |
| packages/nixpkgs/trezor-udev-rules | Udev rules for Trezor |
| packages/nixpkgs/rPackages.rules | |
| packages/nixpkgs/sbclPackages.cl-rules | |
| packages/nixpkgs/android-udev-rules | Android udev rules list aimed to be the most comprehensive on the net |
| packages/nixpkgs/wooting-udev-rules | udev rules that give NixOS permission to communicate with Wooting keyboards |
| packages/nixpkgs/usb-blaster-udev-rules | udev rules that give NixOS permission to communicate with usb blasters |
| packages/nixpkgs/game-devices-udev-rules | Udev rules to make supported controllers available with user-grade permissions |
| packages/nixpkgs/sbclPackages.cl-rules-test | |
| packages/nixpkgs/nitrokey-udev-rules | udev rules for Nitrokey devices |
| packages/nixpkgs/meletrix-udev-rules | udev rules to configure Meletrix keyboards |
| packages/nixpkgs/numworks-udev-rules | Udev rules for Numworks calculators |
| packages/nixpkgs/keychron-udev-rules | Keychron Keyboard Udev Rules, fixes issues with keyboard detection on Linux & permissions on Keychron Launcher |
| packages/nixpkgs/steam-devices-udev-rules | Udev rules list for gaming devices |
| packages/nixpkgs/python313Packages.rules | Awesome Django authorization, without the database |
| packages/nixpkgs/python314Packages.rules | Awesome Django authorization, without the database |
| packages/nixpkgs/ananicy-rules-cachyos | CachyOS' ananicy-rules meant to be used with ananicy-cpp |
| packages/nixpkgs/picoprobe-udev-rules | Picoprobe udev rules list |
| packages/nixpkgs/haskellPackages.html-rules | Perform traversals of HTML structures using sets of rules |
| packages/nixpkgs/finalmouse-udev-rules | udev rules that give NixOS permission to communicate with Finalmouse mice |
| packages/nixpkgs/haskellPackages.layout-rules | A collection of different layout implementations |
| packages/nixpkgs/python312Packages.rules | Awesome Django authorization, without the database |
| packages/nixpkgs/roddhjav-apparmor-rules | Over 1500 AppArmor profiles aiming to confine most linux processes |
| packages/nixpkgs/haskellPackages.haskell-rules | A DSL for expressing natural deduction rules in Haskell |
| packages/nixpkgs/emacsPackages.firebase-rules-mode | |
| packages/nixpkgs/emacsPackages.flycheck-falco-rules | |
| packages/nixpkgs/rPackages.arules | |
| packages/nixpkgs/rPackages.arulesCBA | |
| packages/nixpkgs/rPackages.arulesViz | |
| packages/nixpkgs/haskellPackages.gogol-firebase-rules | Google Firebase Rules SDK |
| packages/nixpkgs/gnomeExtensions.gnome-window-rules | Makes windows matching user-defined titles sticky (on all workspaces), always-on-top, or both. |
| packages/nixpkgs/sbclPackages.cl-association-rules | |
| packages/nixpkgs/rPackages.RSarules | |
| packages/nixpkgs/rPackages.arulesNBMiner | |
| packages/nixpkgs/sbclPackages.cl-association-rules-tests | |
| packages/nixpkgs/haskellPackages.typelevel-rewrite-rules | Solve type equalities using custom type-level rewrite rules |
| packages/nixpkgs/haskellPackages.https-everywhere-rules | High-level access to HTTPS Everywhere rulesets |
| packages/nixpkgs/haskellPackages.https-everywhere-rules-raw | Low-level (i.e |
| packages/nixpkgs/rPackages.niarules | |
| packages/nixpkgs/tflint-plugins.tflint-ruleset-aws | TFLint ruleset plugin for Terraform AWS Provider |
| packages/nixpkgs/rPackages.editrules | |
| packages/nixpkgs/rPackages.tidyrules | |
| packages/nixpkgs/sbclPackages.parser_dot_common-rules | |
| packages/nixpkgs/logitech-udev-rules | Linux devices manager for the Logitech Unifying Receiver |
| packages/nixpkgs/tflint-plugins.tflint-ruleset-google | TFLint ruleset plugin for Terraform Google Provider |
| packages/nixpkgs/python313Packages.smdebug-rulesconfig | These builtin rules are available in Amazon SageMaker |
| packages/nixpkgs/python314Packages.smdebug-rulesconfig | These builtin rules are available in Amazon SageMaker |
| packages/nixpkgs/rPackages.bayesrules | |
| packages/nixpkgs/sbclPackages.parser_dot_common-rules_dot_operators | |
| packages/nixpkgs/python312Packages.smdebug-rulesconfig | These builtin rules are available in Amazon SageMaker |
| packages/nixpkgs/rPackages.arulesSequences | |
| packages/nixpkgs/texlivePackages.luahyphenrules | Loading patterns in LuaLaTeX with language.dat |
| options/home-manager/programs.boxxy.rules | List of boxxy rules
|
| options/nixos/services.opengfw.rules | Rules passed to OpenGFW. Example rules
|
| options/home-manager/services.grobi.rules | These are the rules grobi tries to match to the current
output configuration
|
| options/nixos/security.audit.rules | The ordered audit rules, with each string appearing as one line of the audit.rules file.
|
| options/home-manager/programs.claude-code.rules | Modular rule files for Claude Code
|
| options/nixos/services.opensnitch.rules | Declarative configuration of firewall rules
|
| options/nixos/boot.initrd.services.udev.rules | udev rules to include in the initrd
only
|
| options/nixos/systemd.tmpfiles.rules | Rules for creation, deletion and cleaning of volatile and temporary files
automatically
|
| options/home-manager/programs.boxxy.rules.*.env | Give certain environment variables for said match.
|
| options/home-manager/programs.boxxy.rules.*.mode | Does the current path redirect a file or a directory?
|
| options/home-manager/programs.boxxy.rules.*.only | Apply redirection ONLY to specified executable names.
|
| options/nixos/services.vmalert.rules | A list of the given alerting or recording rules against configured "datasource.url" compatible with
Prometheus HTTP API for vmalert to execute
|
| options/home-manager/systemd.user.tmpfiles.rules | Rules for creating and cleaning up temporary files
automatically
|
| options/home-manager/programs.boxxy.rules.*.name | Unique identifier of the boxxy rule
|
| options/nixos/programs.rush.rules | The rule statement configures a GNU Rush rule
|
| options/nixos/systemd.user.tmpfiles.rules | Global user rules for creation, deletion and cleaning of volatile and
temporary files automatically
|
| options/nixos/services.opengfw.rulesFile | Path to file containing OpenGFW rules.
|
| options/home-manager/programs.boxxy.rules.*.target | What directory/file to redirect.
|
| options/nixos/services.opengfw.rules.*.log | Whether to enable logging for the rule.
|
| options/nixos/services.opengfw.rules.*.name | Name of the rule.
|
| options/home-manager/services.xsuspender.rules | Attribute set of XSuspender rules.
|
| options/nixos/services.prometheus.rules | Alerting and/or Recording rules to evaluate at runtime.
|
| options/home-manager/xsession.windowManager.bspwm.rules | Rule configuration
|
| options/home-manager/programs.boxxy.rules.*.rewrite | Where that file/directory should be rewritten to.
|
| options/home-manager/programs.claude-code.rulesDir | Path to a directory containing rule files for Claude Code
|
| options/home-manager/programs.boxxy.rules.*.context | Apply redirection ONLY when in a certain directory.
|
| options/nixos/services.opengfw.rules.*.expr | Expr Language expression using analyzers and functions.
|
| options/nixos/services.firewalld.zones.<name>.rules | Rich rules for the zone.
|
| options/nixos/systemd.user.tmpfiles.users.<name>.rules | Per-user rules for creation, deletion and cleaning of volatile and
temporary files automatically
|
| options/nixos/services.usbguard.rules | The USBGuard daemon will load this as the policy rule set
|
| options/nixos/services.xserver.imwheel.rules | Window class translation rules.
/etc/X11/imwheelrc is generated based on this config
which means this config is global for all users
|
| options/nixos/services.opengfw.rules.*.action | Action of the rule. Supported actions
|
| options/home-manager/programs.opencode.rules | You can provide global custom instructions to opencode
|
| options/nixos/services.ananicy.rulesProvider | Which package to copy default rules,types,cgroups from.
|
| options/nixos/services.ndppd.proxies.<name>.rules | This is a rule that the target address is to match against
|
| options/nixos/services.ndppd.proxies.<name>.rules.<name>.network | This is the target address is to match against
|
| options/nixos/services.vmalert.instances.<name>.rules | A list of the given alerting or recording rules against configured "datasource.url" compatible with
Prometheus HTTP API for vmalert to execute
|
| options/nixos/services.opengfw.rules.*.modifier | Modification of specified packets when using the modify action. Available modifiers
|
| options/nixos/services.opengfw.rules.*.modifier.name | Name of the modifier.
|
| options/nixos/services.opengfw.rules.*.modifier.args | Arguments passed to the modifier.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.node | The node where the rule should be applied.
|
| options/nixos/services.networkd-dispatcher.rules | Declarative configuration of networkd-dispatcher rules
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.state | The state in which a new window should spawn.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.layer | The layer where a new window should spawn.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.focus | Whether the node should gain focus on creation.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.splitDir | The direction where the container is going to be split.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.border | Whether the node should have border.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.hidden | Whether the node should occupy any space.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.follow | Whether focus should follow the node when it is moved.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.sticky | Whether the node should stay on the focused desktop.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.marked | Whether the node will be marked for deferred actions.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.locked | Whether the node should ignore node --close
messages.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.center | Whether the node will be put in the center, in floating mode.
|
| options/home-manager/services.xsuspender.rules.<name>.resumeFor | Resume duration in seconds.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.monitor | The monitor where the rule should be applied.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.desktop | The desktop where the rule should be applied.
|
| packages/nixpkgs/perlPackages.XMLRules | Parse XML and specify what and how to keep/process for individual tags |
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.splitRatio | The ratio between the new window and the previous existing window in
the desktop.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.private | Whether the node should stay in the same tiling position and size.
|
| packages/nixpkgs/perl5Packages.XMLRules | Parse XML and specify what and how to keep/process for individual tags |
| options/home-manager/xsession.windowManager.herbstluftwm.rules | Herbstluftwm rules.
|
| options/home-manager/services.xsuspender.rules.<name>.resumeEvery | Resume interval in seconds.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.manage | Whether the window should be managed by bspwm
|
| options/home-manager/services.xsuspender.rules.<name>.execResume | Before resuming, execute this shell script
|
| options/nixos/services.grafana.provision.alerting.rules.path | Path to YAML rules configuration
|
| options/home-manager/services.xsuspender.rules.<name>.autoSuspendOnBattery | Whether to auto-apply rules when switching to battery
power even if the window(s) didn't just lose focus.
|
| options/nixos/services.ndppd.proxies.<name>.rules.<name>.interface | Interface to use when method is iface.
|
| options/home-manager/services.xsuspender.rules.<name>.onlyOnBattery | Whether to enable process suspend only on battery.
|
| options/home-manager/services.xsuspender.rules.<name>.execSuspend | Before suspending, execute this shell script
|
| options/nixos/services.ndppd.proxies.<name>.rules.<name>.method | static: Immediately answer any Neighbor Solicitation Messages
(if they match the IP rule).
iface: Forward the Neighbor Solicitation Message through the specified
interface and only respond if a matching Neighbor Advertisement
Message is received.
auto: Same as iface, but instead of manually specifying the outgoing
interface, check for a matching route in /proc/net/ipv6_route.
|
| options/home-manager/services.xsuspender.rules.<name>.suspendDelay | Initial suspend delay in seconds.
|
| options/home-manager/services.xsuspender.rules.<name>.sendSignals | Whether to send SIGSTOP / SIGCONT signals or not
|
| packages/nixpkgs/haskellPackages.Nomyx-Rules | Language to express rules for Nomic |
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.rectangle | The node's geometry, in the format WxH+X+Y.
|
| options/nixos/services.grafana.provision.alerting.rules.settings | Grafana rules configuration in Nix
|
| options/nixos/services.networkd-dispatcher.rules.<name>.script | Shell commands executed on specified operational states.
|
| options/home-manager/services.xsuspender.rules.<name>.matchWmNameContains | Match windows where wm name contains string.
|
| options/nixos/services.opengfw.settings.ruleset | The path to load specific local geoip/geosite db files
|
| options/nixos/services.networkd-dispatcher.rules.<name>.onState | List of names of the systemd-networkd operational states which
should trigger the script
|
| options/home-manager/services.xsuspender.rules.<name>.matchWmClassContains | Match windows that wm class contains string.
|
| options/home-manager/services.xsuspender.rules.<name>.matchWmClassGroupContains | Match windows where wm class group contains string.
|
| options/home-manager/services.xsuspender.rules.<name>.suspendSubtreePattern | Also suspend descendant processes that match this regex.
|
| options/home-manager/services.xsuspender.rules.<name>.downclockOnBattery | Limit CPU consumption for this factor when on battery power
|
| options/nixos/networking.nftables.rulesetFile | The ruleset file to be used with nftables
|
| options/nixos/services.grafana.provision.alerting.rules.settings.groups | List of rule groups to import or update.
|
| options/nixos/services.grafana.provision.alerting.rules.settings.groups.*.name | Name of the rule group
|
| options/nixos/services.grafana.provision.alerting.rules.settings.apiVersion | Config file version.
|
| packages/nixpkgs/perl538Packages.XMLRules | Parse XML and specify what and how to keep/process for individual tags |
| packages/nixpkgs/perl540Packages.XMLRules | Parse XML and specify what and how to keep/process for individual tags |
| options/nixos/services.grafana.provision.alerting.rules.settings.deleteRules | List of alert rule UIDs that should be deleted.
|
| options/nixos/services.grafana.provision.alerting.rules.settings.deleteRules.*.uid | Unique identifier for the rule
|
| options/nixos/services.anubis.defaultOptions.policy.extraBots | Additional bot rules appended to the policy
|
| options/nixos/services.grafana.provision.alerting.rules.settings.deleteRules.*.orgId | Organization ID, default = 1
|
| options/nixos/services.anubis.instances.<name>.policy.extraBots | Additional bot rules appended to the policy
|
| options/nixos/services.grafana.provision.alerting.rules.settings.groups.*.folder | Name of the folder the rule group will be stored in
|
| options/nixos/services.firewalld.settings.LogDenied | Add logging rules right before reject and drop rules in the INPUT, FORWARD and OUTPUT chains for the default rules and also final reject and drop rules in zones for the configured link-layer packet type.
|
| options/nixos/services.udev.extraRules | Additional udev rules
|
| options/nixos/services.grafana.provision.alerting.rules.settings.groups.*.interval | Interval that the rule group should be evaluated at
|
| options/nixos/services.opengfw.settings.ruleset.geoip | Path to geoip.dat.
|
| options/nixos/networking.nftables.ruleset | The ruleset to be used with nftables
|
| options/nixos/programs.pay-respects.runtimeRules | List of rules to be added to /etc/xdg/pay-respects/rules.
pay-respects will read the contents of these generated rules to recommend command corrections
|
| options/nixos/security.sudo.extraRules | Define specific rules to be in the sudoers file
|
| options/nixos/services.opengfw.settings.ruleset.geosite | Path to geosite.dat.
|
| options/nixos/security.sudo-rs.extraRules | Define specific rules to be in the sudoers file
|
| options/nixos/services.mediatomb.openFirewall | If false (the default), this is up to the user to declare the firewall rules
|
| options/nixos/security.doas.extraRules | Define specific rules to be set in the
/etc/doas.conf file
|
| options/nixos/services.vmalert.instances.<name>.settings.rule | Path to the files with alerting and/or recording rules.
|
| options/nixos/services.vmalert.settings.rule | Path to the files with alerting and/or recording rules.
Consider using the services.vmalert.rules option as a convenient alternative for declaring rules
directly in the nix language.
|
| packages/nixpkgs/udevCheckHook | Check validity of udev rules in outputs |
| packages/nixpkgs/karing | Simple & Powerful proxy utility, Support routing rules for clash/sing-box |
| options/nixos/services.thanos.query.query.replica-labels | Labels to treat as a replica indicator along which data is
deduplicated
|
| packages/nixpkgs/cuyo | Stacking blocks game, with different rules for each level |
| options/nixos/systemd.tmpfiles.packages | List of packages containing systemd-tmpfiles rules
|
| options/nixos/hardware.uni-sync.enable | Whether to enable udev rules and software for Lian Li Uni Controllers.
|
| options/nixos/services.udev.path | Packages added to the PATH environment variable when
executing programs from Udev rules.
coreutils, gnu{sed,grep}, util-linux and config.systemd.package are
automatically included.
|
| packages/nixpkgs/forge-mtg | Magic: the Gathering card game with rules enforcement |
| options/nixos/hardware.ledger.enable | Whether to enable udev rules for Ledger devices.
|
| options/nixos/power.ups.schedulerRules | File which contains the rules to handle UPS events.
|
| packages/nixpkgs/fishPlugins.fifc | Fzf powers on top of fish completion engine and allows customizable completion rules |
| options/nixos/services.crowdsec.hub | Hub collections, parsers, AppSec rules, etc.
|
| options/nixos/services.lvm.enable | Whether to enable lvm2.
The lvm2 package contains device-mapper udev rules and without those tools like cryptsetup do not fully function!
|
| options/nixos/services.cloudflared.tunnels.<name>.ingress | Ingress rules
|
| options/nixos/programs.light.enable | Whether to install Light backlight control command
and udev rules granting access to members of the "video" group.
|
| options/nixos/hardware.nfc-nci.enable | Whether to enable PN5xx kernel module with udev rules, libnfc-nci userland, and optional ifdnfc-nci PC/SC driver.
|
| options/nixos/services.picom.wintypes | Rules for specific window types.
|
| options/nixos/services.ndppd.network | Network that we proxy.
(Legacy option, use services.ndppd.proxies.<interface>.rules.<network> instead)
|
| options/home-manager/services.picom.wintypes | Rules for specific window types.
|
| options/nixos/hardware.libftdi.enable | Whether to enable udev rules for devices supported by libftdi.
|
| options/nixos/services.ferm.enable | Whether to enable Ferm Firewall.
Warning: Enabling this service WILL disable the existing NixOS
firewall! Default firewall rules provided by packages are not
considered at the moment.
|
| options/nixos/services.ndppd.proxies | This sets up a listener, that will listen for any Neighbor Solicitation
messages, and respond to them according to a set of rules.
|
| options/nixos/services.miredo.bindPort | Depending on the local firewall/NAT rules, you might need to force
Miredo to use a fixed UDP port and or IPv4 address.
|
| packages/nixpkgs/yarGen | Generator for YARA rules |
| options/nixos/services.udev.packages | List of packages containing udev rules
|
| options/nixos/services.postgresql.authentication | Defines how users authenticate themselves to the server
|
| options/darwin/services.postgresql.authentication | Defines how users authenticate themselves to the server
|
| options/nixos/hardware.bladeRF.enable | Enables udev rules for BladeRF devices
|
| options/nixos/hardware.saleae-logic.enable | Whether to enable udev rules for Saleae Logic devices.
|
| options/nixos/services.ananicy.extraRules | Rules to write in 'nixRules.rules'
|
| options/nixos/hardware.cpu.x86.msr.enable | Whether to enable the msr (Model-Specific Registers) kernel module and configure udev rules for its devices (usually /dev/cpu/*/msr).
|
| options/nixos/security.polkit.extraConfig | Any polkit rules to be added to config (in JavaScript ;-)
|
| options/nixos/services.picom.opacityRules | Rules that control the opacity of windows, in format PERCENT:PATTERN.
|
| options/home-manager/services.picom.opacityRules | Rules that control the opacity of windows, in format PERCENT:PATTERN.
|
| options/nixos/services.openssh.authorizedKeysFiles | Specify the rules for which files to read on the host
|
| options/nixos/hardware.nitrokey.enable | Enables udev rules for Nitrokey devices.
|
| options/nixos/services.rspamd.localLuaRules | Path of file to link to /etc/rspamd/rspamd.local.lua for local
rules written in Lua
|
| options/nixos/services.logcheck.ignore | This option defines extra ignore rules.
|
| options/nixos/services.anubis.defaultOptions.policy.useDefaultBotRules | Whether to include Anubis's default bot detection rules via the
(data)/meta/default-config.yaml import
|
| options/nixos/services.anubis.instances.<name>.policy.useDefaultBotRules | Whether to include Anubis's default bot detection rules via the
(data)/meta/default-config.yaml import
|
| options/nixos/programs.regreet.extraCss | Extra CSS rules to apply on top of the GTK theme
|
| options/nixos/systemd.user.tmpfiles.users | Per-user rules for creation, deletion and cleaning of volatile and
temporary files automatically.
|
| options/home-manager/programs.helix.ignores | List of paths that should be globally ignored for file picker
|
| options/nixos/hardware.ubertooth.group | Group for Ubertooth's udev rules.
|
| options/nixos/hardware.glasgow.enable | Enables Glasgow udev rules and ensures 'plugdev' group exists
|
| options/home-manager/programs.ssh.matchBlocks | Specify per-host settings
|
| options/nixos/programs.minipro.enable | Whether to enable minipro and its udev rules
|
| options/nixos/services.vmalert.enable | Wether to enable VictoriaMetrics's vmalert.
vmalert evaluates alerting and recording rules against a data source, sends notifications via Alertmanager.
|
| options/nixos/services.crowdsec.hub.appSecRules | List of hub appsec rules to install
|
| options/nixos/nix.firewall.allowLoopback | Whether to allow traffic on the loopback interface
|
| options/nixos/services.logcheck.ignoreCron | This option defines extra ignore rules for cronjobs.
|
| options/nixos/services.logcheck.extraRulesDirs | Directories with extra rules.
|
| options/nixos/nix.firewall.extraNftablesRules | Extra nftables rules to prepend to the generated ones
|
| options/nixos/services.opengfw.pcapReplay | Path to PCAP replay file
|
| options/nixos/hardware.rtl-sdr.enable | Enables rtl-sdr udev rules, ensures 'plugdev' group exists, and blacklists DVB kernel modules
|
| options/nixos/programs.flashrom.enable | Installs flashrom and configures udev rules for programmers
used by flashrom
|
| options/nixos/hardware.ubertooth.enable | Whether to enable Ubertooth software and its udev rules.
|
| options/nixos/services.miredo.bindAddress | Depending on the local firewall/NAT rules, you might need to force
Miredo to use a fixed UDP port and or IPv4 address.
|
| options/nixos/services.thanos.rule.enable | Whether to enable the Thanos ruler service which evaluates Prometheus rules against given Query nodes, exposing Store API and storing old blocks in bucket.
|
| options/nixos/programs.quark-goldleaf.enable | Whether to enable quark-goldleaf with udev rules applied.
|
| options/nixos/security.sudo.defaultOptions | Options used for the default rules, granting root and the
wheel group permission to run any command as any user.
|
| options/nixos/programs.flexoptix-app.enable | Whether to enable FLEXOPTIX app + udev rules.
|
| options/nixos/services.ndppd.interface | Interface which is on link-level with router.
(Legacy option, use services.ndppd.proxies.<interface>.rules.<network> instead)
|
| options/nixos/security.sudo-rs.defaultOptions | Options used for the default rules, granting root and the
wheel group permission to run any command as any user.
|
| options/nixos/programs.mouse-actions.enable | Whether to install and set up mouse-actions and it's udev rules
|
| options/nixos/programs.ns-usbloader.enable | Whether to enable ns-usbloader application with udev rules applied.
|
| options/nixos/hardware.hackrf.enable | Enables hackrf udev rules and ensures 'plugdev' group exists
|
| options/nixos/programs.flashprog.enable | Whether to enable configuring flashprog udev rules and
installing flashprog as system package
.
|
| options/nixos/hardware.steam-hardware.enable | Enable udev rules for Steam hardware such as the Steam Controller, other supported controllers and the HTC Vive
|
| options/nixos/services.sdrplayApi.enable | Whether to enable the SDRplay API service and udev rules.
To enable integration with SoapySDR and GUI applications like gqrx create an overlay containing
soapysdr-with-plugins = super.soapysdr.override { extraPackages = [ super.soapysdrplay ]; };
|
| options/nixos/hardware.sheep_net.enable | Enables sheep_net udev rules, ensures 'sheep_net' group exists, and adds
sheep-net to boot.kernelModules and boot.extraModulePackages
|
| options/nixos/services.prometheus.ruleFiles | Any additional rules files to include in this configuration.
|
| options/home-manager/programs.vesktop.vencord.extraQuickCss | Additional CSS rules.
|
| options/nixos/programs.feedbackd.enable | Whether to enable the feedbackd D-BUS service and udev rules
|
| options/nixos/services.suricata.disabledRules | List of rules that should be disabled.
|
| options/nixos/services.dokuwiki.sites.<name>.aclFile | Location of the dokuwiki acl rules
|
| options/nixos/services.suricata.settings.vars | Variables to be used within the suricata rules.
|
| options/nixos/hardware.kryoflux.enable | Enables kryoflux udev rules, ensures 'floppy' group exists
|
| options/nixos/services.usbguard.deviceRulesWithPort | Generate device specific rules including the "via-port" attribute.
|
| options/nixos/hardware.gpgSmartcards.enable | Whether to enable udev rules for gnupg smart cards.
|
| options/nixos/services.graphite.carbon.relayRules | Relay rules are used to send certain metrics to a certain backend.
|
| options/nixos/services.firewalld.zones.<name>.target | Action for packets that doesn't match any rules.
|
| packages/nixpkgs/typstPackages.numty | Numeric Typst: Perform mathematical operations on n-dimensional matrices, vectors and numbers with numpy-like broadcasting rules |
| options/nixos/boot.initrd.services.udev.packages | This will only be used when systemd is used in stage 1.
List of packages containing udev rules that will be copied to stage 1
|
| options/nixos/services.shorewall.enable | Whether to enable Shorewall IPv4 Firewall.
Enabling this service WILL disable the existing NixOS
firewall! Default firewall rules provided by packages are not
considered at the moment.
|
| options/nixos/systemd.tmpfiles.settings | Declare systemd-tmpfiles rules to create, delete, and clean up volatile
and temporary files and directories
|
| options/nixos/hardware.libjaylink.enable | Whether to enable udev rules for devices supported by libjaylink
|
| options/nixos/programs.dmrconfig.enable | Whether to configure system to enable use of dmrconfig
|
| packages/nixpkgs/filtron | Reverse HTTP proxy to filter requests by different rules |
| packages/nixpkgs/ananicy | Another auto nice daemon, with community rules support |
| options/nixos/hardware.flipperzero.enable | Whether to enable udev rules and software for Flipper Zero devices.
|
| options/nixos/security.doas.extraRules.*.setEnv | Keep or set the specified variables
|
| options/nixos/boot.initrd.services.udev.binPackages | This will only be used when systemd is used in stage 1.
Packages to search for binaries that are referenced by the udev rules in stage 1
|
| options/nixos/services.input-remapper.enableUdevRules | Whether to enable udev rules added by input-remapper to handle hotplugged devices
|
| options/nixos/hardware.keyboard.zsa.enable | Whether to enable udev rules for keyboards from ZSA like the ErgoDox EZ, Planck EZ and Moonlander Mark I
|
| options/nixos/services.earlyoom.killHook | An absolute path to an executable to be run for each process killed
|
| options/nixos/services.suricata.settings.rule-files | Files to load suricata-update managed rules, relative to 'default-rule-path'.
|
| options/nixos/services.shorewall6.enable | Whether to enable Shorewall IPv6 Firewall.
Enabling this service WILL disable the existing NixOS
firewall! Default firewall rules provided by packages are not
considered at the moment.
|
| options/home-manager/xsession.windowManager.spectrwm.quirks | Spectrwm quicks (custom window rules).
|
| options/nixos/nix.firewall.allowPrivateNetworks | Whether to allow traffic to local networks
|
| options/nixos/services.pcscd.ignoreReaderNames | List of reader name patterns for the PCSC daemon to ignore
|
| options/nixos/hardware.block.scheduler | Assign block I/O scheduler by device name pattern
|
| packages/nixpkgs/typstPackages.curryst | Typeset trees of inference rules |
| options/nixos/networking.firewall.extraInputRules | Additional nftables rules to be appended to the input-allow
chain
|
| options/nixos/services.ndppd.proxies.<name>.interface | Listen for any Neighbor Solicitation messages on this interface,
and respond to them according to a set of rules
|
| options/nixos/boot.initrd.systemd.tmpfiles.settings | Similar to systemd.tmpfiles.settings but the rules are
only applied by systemd-tmpfiles before initrd-switch-root.target
|
| options/nixos/services.nextcloud.webfinger | Enable this option if you plan on using the webfinger plugin
|
| options/nixos/hardware.keyboard.qmk.keychronSupport | Whether to enable udev rules for keychron QMK based keyboards.
|
| options/nixos/services.mirakurun.allowSmartCardAccess | Install polkit rules to allow Mirakurun to access smart card readers
which is commonly used along with tuner devices.
|
| packages/nixpkgs/eclipses.plugins.drools | Drools is a Business Rules Management System (BRMS) solution |
| options/nixos/programs.wireshark.usbmon.enable | Whether to allow users in the 'wireshark' group to capture USB traffic
|
| options/nixos/services.dovecot2.imapsieve.mailbox | Configure Sieve filtering rules on IMAP actions
|
| options/nixos/networking.jool.siit.<name>.framework | The framework to use for attaching Jool's translation to the exist
kernel packet processing rules
|
| packages/nixpkgs/typstPackages.linphon | Set phonological feature matrices, linear rewrite rules, and more |
| options/nixos/networking.vswitches.<name>.openFlowRules | OpenFlow rules to insert into the Open vSwitch
|
| options/nixos/networking.jool.nat64.<name>.framework | The framework to use for attaching Jool's translation to the exist
kernel packet processing rules
|
| options/nixos/services.suricata.settings.default-rule-path | Path in which suricata-update managed rules are stored by default.
|
| options/nixos/services.vmalert.instances.<name>.enable | Wether to enable VictoriaMetrics's vmalert.
vmalert evaluates alerting and recording rules against a data source, sends notifications via Alertmanager.
|
| options/nixos/services.reaction.runAsRoot | Whether to run reaction as root
|
| options/nixos/services.firewalld.settings.FlushAllOnReload | Whether to flush all runtime rules on a reload.
|
| options/nixos/networking.firewall.extraForwardRules | Additional nftables rules to be appended to the forward-allow
chain
|
| options/nixos/programs.tsmClient.servers | Server definitions ("stanzas")
for the client system-options file
|
| options/nixos/services.firewalld.settings.CleanupOnExit | Whether to clean up firewall rules when firewalld stops.
|
| options/nixos/services.logrotate.settings.<name>.files | Single or list of files for which rules are defined
|
| options/nixos/services.nebula.networks.<name>.firewall.inbound | Firewall rules for inbound traffic.
|
| options/nixos/services.tinyproxy.settings.Filter | Tinyproxy supports filtering of web sites based on URLs or domains
|
| options/nixos/hardware.digitalbitbox.enable | Enables udev rules for Digital Bitbox devices.
|
| options/nixos/systemd.network.networks.<name>.routingPolicyRules | A list of routing policy rules sections to be added to the unit
|
| options/nixos/services.trafficserver.remap | URL remapping rules used by Traffic Server
|
| options/nixos/services.trafficserver.cache | Caching rules that overrule the origin's caching policy
|
| options/nixos/services.opensnitch.settings.Rules.Path | Path to the directory where firewall rules can be found and will
get stored by the NixOS module.
|
| options/nixos/security.pki.useCompatibleBundle | Whether to enable usage of a compatibility bundle
|
| packages/nixpkgs/cargo-bazel | Part of the `crate_universe` collection of tools which use Cargo to generate build targets for Bazel |
| options/nixos/services.nebula.networks.<name>.firewall.outbound | Firewall rules for outbound traffic.
|
| options/nixos/hardware.digitalbitbox.package | The digitalbitbox package to use
|
| options/nixos/programs.digitalbitbox.package | The digitalbitbox package to use
|
| options/nixos/networking.firewall.extraReversePathFilterRules | Additional nftables rules to be appended to the rpfilter-allow
chain
|
| options/nixos/networking.getaddrinfo.scopev4 | Adds custom rules to the IPv4 scope table
|
| options/nixos/services.uvcvideo.dynctrl.packages | List of packages containing uvcvideo dynamic controls
rules
|
| options/nixos/services.crossfire-server.configFiles | Text to append to the corresponding configuration files
|
| options/nixos/services.firezone.server.settingsSecret | This is a convenience option which allows you to set secret values for
environment variables by specifying a file which will contain the value
at runtime
|
| packages/nixpkgs/reindeer | Generate Buck build rules from Rust Cargo dependencies |
| options/nixos/services.prometheus.exporters.nut.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.nut.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.lnd.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.lnd.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.sql.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.sql.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.frr.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.frr.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.pve.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.pve.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.zfs.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.zfs.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.kea.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.kea.openFirewall is true.
|
| packages/nixpkgs/kubectl-evict-pod | This plugin evicts the given pod and is useful for testing pod disruption budget rules |
| options/home-manager/services.xsuspender.defaults.autoSuspendOnBattery | Whether to auto-apply rules when switching to battery
power even if the window(s) didn't just lose focus.
|
| options/nixos/services.firewalld.settings.NftablesTableOwner | If enabled, the generated nftables rule set will be owned exclusively by firewalld
|
| options/nixos/services.prometheus.exporters.nats.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.nats.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.bind.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.bind.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.ping.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.ping.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.flow.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.flow.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.json.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.json.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.ipmi.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.ipmi.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.bird.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.bird.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.mail.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.mail.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.ebpf.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.ebpf.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.knot.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.knot.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.node.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.node.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.snmp.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.snmp.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.mqtt.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.mqtt.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.php-fpm.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.php-fpm.openFirewall is true.
|
| packages/nixpkgs/rfkill_udev | Rules+hook for udev to catch rfkill state changes |
| options/nixos/services.prometheus.exporters.nginx.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.nginx.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.redis.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.redis.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.kafka.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.kafka.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.idrac.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.idrac.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.v2ray.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.v2ray.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.jitsi.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.jitsi.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.fritz.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.fritz.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.dmarc.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.dmarc.openFirewall is true.
|
| packages/nixpkgs/threatest | Framework for end-to-end testing threat detection rules |
| options/nixos/services.firewalld.settings.FirewallBackend | The firewall backend implementation
|
| options/nixos/virtualisation.restrictNetwork | If this option is enabled, the guest will be isolated, i.e. it will
not be able to contact the host and no guest IP packets will be
routed over the host to the outside
|
| options/nixos/services.armagetronad.servers.<name>.settings | Armagetron Advanced server rules configuration
|
| options/nixos/services.prometheus.exporters.node-cert.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.node-cert.openFirewall is true.
|
| packages/nixpkgs/nrf-udev | Udev rules for nRF (Nordic Semiconductor) development kits |
| packages/nixpkgs/typstPackages.numty_0_1_0 | Numeric Typst: Perform mathematical operations on n-dimensional matrices, vectors and numbers with numpy-like broadcasting rules |
| options/nixos/services.prometheus.exporters.fastly.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.fastly.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.shelly.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.shelly.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.statsd.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.statsd.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.domain.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.domain.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.tibber.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.tibber.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.rspamd.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.rspamd.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.deluge.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.deluge.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.chrony.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.chrony.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.pihole.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.pihole.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.script.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.script.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.dnssec.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.dnssec.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.restic.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.restic.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.mysqld.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.mysqld.openFirewall is true.
|
| options/nixos/networking.interfaces.<name>.proxyARP | Turn on proxy_arp for this device
|
| options/nixos/services.prometheus.exporters.nvidia-gpu.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.nvidia-gpu.openFirewall is true.
|
| options/nixos/services.firewalld.settings.StrictForwardPorts | If enabled, the generated destination NAT (DNAT) rules will NOT accept traffic that was DNAT'd by other entities, e.g. docker
|
| options/nixos/services.prometheus.exporters.bitcoin.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.bitcoin.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.dnsmasq.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.dnsmasq.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.unbound.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.unbound.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.apcupsd.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.apcupsd.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.libvirt.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.libvirt.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.rtl_433.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.rtl_433.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.varnish.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.varnish.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.postfix.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.postfix.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.sabnzbd.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.sabnzbd.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.ecoflow.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.ecoflow.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.klipper.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.klipper.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.systemd.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.systemd.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.dovecot.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.dovecot.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.mongodb.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.mongodb.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.process.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.process.openFirewall is true.
|
| options/nixos/virtualisation.libvirtd.firewallBackend | The backend used to setup virtual network firewall rules.
|
| options/nixos/hardware.opentabletdriver.enable | Enable OpenTabletDriver udev rules, user service and blacklist kernel
modules known to conflict with OpenTabletDriver.
|
| options/nixos/services.prometheus.exporters.py-air-control.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.py-air-control.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.unpoller.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.unpoller.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.blackbox.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.blackbox.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.influxdb.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.influxdb.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.collectd.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.collectd.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.mikrotik.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.mikrotik.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.fritzbox.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.fritzbox.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.graphite.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.graphite.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.nginxlog.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.nginxlog.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.mailman3.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.mailman3.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.postgres.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.postgres.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.keylight.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.keylight.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.opnsense.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.opnsense.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.smartctl.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.smartctl.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.imap-mailstat.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.imap-mailstat.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.pgbouncer.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.pgbouncer.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.nextcloud.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.nextcloud.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.surfboard.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.surfboard.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.smokeping.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.smokeping.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.wireguard.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.wireguard.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.rasdaemon.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.rasdaemon.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.borgmatic.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.borgmatic.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.tailscale.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.tailscale.openFirewall is true.
|
| packages/nixpkgs/python313Packages.yaramod | Parsing of YARA rules into AST and building new rulesets in C++ |
| packages/nixpkgs/python314Packages.yaramod | Parsing of YARA rules into AST and building new rulesets in C++ |
| packages/nixpkgs/cloud-custodian | Rules engine for cloud security, cost optimization, and governance |
| packages/nixpkgs/python313Packages.plyara | Parse YARA rules |
| packages/nixpkgs/python314Packages.plyara | Parse YARA rules |
| options/nixos/services.prometheus.exporters.junos-czerwonk.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.junos-czerwonk.openFirewall is true.
|
| packages/nixpkgs/usb-modeswitch-data | Device database and the rules file for 'multi-mode' USB devices |
| options/nixos/services.prometheus.exporters.scaphandre.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.scaphandre.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.storagebox.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.storagebox.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.buildkite-agent.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.buildkite-agent.openFirewall is true.
|
| packages/nixpkgs/typstPackages.curryst_0_1_1 | Typesetting of trees of inference rules in Typst |
| packages/nixpkgs/typstPackages.curryst_0_1_0 | Typesetting of trees of inference rules in Typst |
| options/nixos/services.prometheus.exporters.exportarr-sonarr.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.exportarr-sonarr.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.exportarr-lidarr.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.exportarr-lidarr.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.exportarr-bazarr.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.exportarr-bazarr.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.exportarr-radarr.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.exportarr-radarr.openFirewall is true.
|
| packages/nixpkgs/oathkeeper | Open-source identity and access proxy that authorizes HTTP requests based on sets of rules |
| packages/nixpkgs/python313Packages.pproxy | Proxy server that can tunnel among remote servers by regex rules |
| packages/nixpkgs/python314Packages.pproxy | Proxy server that can tunnel among remote servers by regex rules |
| packages/nixpkgs/typstPackages.leipzig-glossing | Linguistic interlinear glosses according to the Leipzig Glossing rules |
| packages/nixpkgs/commitizen | Tool to create committing rules for projects, auto bump versions, and generate changelogs |
| packages/nixpkgs/typstPackages.curryst_0_6_0 | Typeset trees of inference rules |
| packages/nixpkgs/typstPackages.curryst_0_2_0 | Typeset trees of inference rules |
| packages/nixpkgs/typstPackages.curryst_0_5_0 | Typeset trees of inference rules |
| packages/nixpkgs/typstPackages.curryst_0_5_1 | Typeset trees of inference rules |
| packages/nixpkgs/typstPackages.curryst_0_4_0 | Typeset trees of inference rules |
| packages/nixpkgs/typstPackages.curryst_0_3_0 | Typeset trees of inference rules |
| options/nixos/services.prometheus.exporters.exportarr-readarr.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.exportarr-readarr.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.artifactory.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.artifactory.openFirewall is true.
|
| packages/nixpkgs/python313Packages.pysigma | Library to parse and convert Sigma rules into queries |
| packages/nixpkgs/python314Packages.pysigma | Library to parse and convert Sigma rules into queries |
| options/nixos/services.prometheus.exporters.exportarr-prowlarr.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.exportarr-prowlarr.openFirewall is true.
|
| packages/nixpkgs/typstPackages.linphon_0_1_0 | Set phonological feature matrices, linear rewrite rules, and more |
| packages/nixpkgs/python312Packages.yaramod | Parsing of YARA rules into AST and building new rulesets in C++ |
| packages/nixpkgs/python312Packages.plyara | Parse YARA rules |
| options/nixos/services.prometheus.exporters.modemmanager.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.modemmanager.openFirewall is true.
|
| packages/nixpkgs/autoprefixer | Parse CSS and add vendor prefixes to CSS rules using values from the Can I Use website |
| packages/nixpkgs/texlivePackages.gs1 | Typeset EAN barcodes using TeX rules, only |
| packages/nixpkgs/haskellPackages.tak | A library encoding the rules of Tak, and a playtak.com client. |
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local | Section for a local authentication round
|
| packages/nixpkgs/texlivePackages.abnt | Typesetting academic works according to ABNT rules |
| packages/nixpkgs/python312Packages.pproxy | Proxy server that can tunnel among remote servers by regex rules |
| packages/nixpkgs/haskellPackages.chr-core | Constraint Handling Rules |
| packages/nixpkgs/haskellPackages.halma | Library implementing Halma rules |
| packages/nixpkgs/haskellPackages.pugs-DrIFT | DrIFT with pugs-specific rules |
| packages/nixpkgs/python312Packages.pysigma | Library to parse and convert Sigma rules into queries |
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.wpaPasswordFile | Sets the password for WPA-PSK
|
| packages/nixpkgs/texlivePackages.mohe-book | Typeset authored, translated, and research books according to mohe rules |
| packages/nixpkgs/haskellPackages.shake-ccjs | Shake rules for CCJS |
| packages/nixpkgs/haskellPackages.Emping | derives heuristic rules from nominal data |
| packages/nixpkgs/texlivePackages.cstypo | Czech typography rules enforced through LuaTeX hooks |
| packages/nixpkgs/nixpkgs-hammering | Set of nit-picky rules that aim to point out and explain common mistakes in nixpkgs package pull requests |
| packages/nixpkgs/perlPackages.FileFindRulePerl | Common rules for searching for Perl things |
| packages/nixpkgs/perl5Packages.FileFindRulePerl | Common rules for searching for Perl things |
| packages/nixpkgs/haskellPackages.shake-bench | Build rules for historical benchmarking |
| packages/nixpkgs/haskellPackages.clash-shake | Shake rules for building Clash programs |
| packages/nixpkgs/ocamlPackages.ocamlbuild | Build system with builtin rules to easily build most OCaml projects |
| options/nixos/services.postfix.settings.main.recipient_delimiter | Set of characters used as the delimiters for address extensions
|
| packages/nixpkgs/texlivePackages.apacite | Citation style following the rules of the APA |
| packages/nixpkgs/haskellPackages.haverer | Implementation of the rules of Love Letter |
| packages/nixpkgs/texlivePackages.abntex2 | Typeset technical and scientific Brazilian documents based on ABNT rules |
| options/nixos/services.prometheus.globalConfig.evaluation_interval | How frequently to evaluate rules by default
|
| packages/nixpkgs/haskellPackages.shake-minify | Shake Minify Rules |
| packages/nixpkgs/haskellPackages.joy-rewrite | Transform Joy code using conditional rewrite rules |
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswordsFile | Sets the password for WPA3-SAE
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mark_out | Netfilter mark and mask for output traffic
|
| packages/nixpkgs/haskellPackages.shake-minify-css | Shake rules for CSS |
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mark_in | Netfilter mark and mask for input traffic
|
| packages/nixpkgs/perl540Packages.FileFindRulePerl | Common rules for searching for Perl things |
| packages/nixpkgs/perl538Packages.FileFindRulePerl | Common rules for searching for Perl things |
| packages/nixpkgs/texlivePackages.dashrule | Draw dashed rules |
| packages/nixpkgs/texlivePackages.phonrule | Typeset linear phonological rules |
| packages/nixpkgs/haskellPackages.CSPM-FiringRules | Firing rules semantic of CSPM |
| packages/nixpkgs/texlivePackages.chletter | Class for typesetting letters to Swiss rules |
| packages/nixpkgs/texlivePackages.vertbars | Mark vertical rules in margin of text |
| packages/nixpkgs/haskellPackages.http-grammar | Attoparsec-based parsers for the RFC-2616 HTTP grammar rules |
| packages/nixpkgs/texlivePackages.fillwith | Fill vertical space with solid rules or dotted lines |
| packages/nixpkgs/texlivePackages.yathesis | A LaTeX class for writing a thesis following French rules |
| packages/nixpkgs/haskellPackages.shake-bindist | Rules for binary distributions |
| packages/nixpkgs/haskellPackages.nomyx-library | Library of rules for Nomyx |
| packages/nixpkgs/ocamlPackages_latest.ocamlbuild | Build system with builtin rules to easily build most OCaml projects |
| packages/nixpkgs/python313Packages.pluralizer | Singularize or pluralize a given word using a pre-defined list of rules |
| packages/nixpkgs/python314Packages.pluralizer | Singularize or pluralize a given word using a pre-defined list of rules |
| packages/nixpkgs/haskellPackages.konnakol | Formalising the rules of Konnakol, an Indian percussional art form |
| packages/nixpkgs/haskellPackages.kansas-lava-shake | Shake rules for building Kansas Lava projects |
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.wpaPskFile | Sets the password(s) for WPA-PSK
|
| packages/nixpkgs/texlivePackages.biblatex-abnt | BibLaTeX style for Brazil's ABNT rules |
| packages/nixpkgs/typstPackages.leipzig-glossing_0_4_0 | Linguistic interlinear glosses according to the Leipzig Glossing rules |
| packages/nixpkgs/typstPackages.leipzig-glossing_0_2_0 | Linguistic interlinear glosses according to the Leipzig Glossing rules |
| packages/nixpkgs/typstPackages.leipzig-glossing_0_5_0 | Linguistic interlinear glosses according to the Leipzig Glossing rules |
| packages/nixpkgs/typstPackages.leipzig-glossing_0_3_0 | Linguistic interlinear glosses according to the Leipzig Glossing rules |
| packages/nixpkgs/typstPackages.leipzig-glossing_0_1_0 | Linguistic interlinear glosses according to the Leipzig Glossing rules |
| packages/nixpkgs/texlivePackages.dashrulex | Draw dashed rules |
| packages/nixpkgs/haskellPackages.Nomyx-Language | Language to express rules for Nomic |
| packages/nixpkgs/haskellPackages.librarian | Move/rename according a set of rules |
| packages/nixpkgs/haskellPackages.nomyx-language | Language to express rules for Nomic |
| packages/nixpkgs/haskellPackages.shake-literate | Rules for building literate programs in shake |
| packages/nixpkgs/haskellPackages.parser241 | An interface to create production rules using augmented grammars |
| packages/nixpkgs/python312Packages.pluralizer | Singularize or pluralize a given word using a pre-defined list of rules |
| packages/nixpkgs/python312Packages.commitizen | Tool to create committing rules for projects, auto bump versions, and generate changelogs |
| packages/nixpkgs/haskellPackages.ho-rewriting | Generic rewrite rules with safe treatment of variables and binders |
| packages/nixpkgs/python313Packages.commitizen | Tool to create committing rules for projects, auto bump versions, and generate changelogs |
| packages/nixpkgs/modsecurity-crs | The OWASP ModSecurity Core Rule Set is a set of generic attack detection
rules for use with ModSecurity or compatible web application firewalls.
|
| packages/nixpkgs/texlivePackages.frenchmath | Typesetting mathematics according to French rules |
| packages/nixpkgs/texlivePackages.mathpartir | Typesetting sequences of math formulas, e.g. type inference rules |
| packages/nixpkgs/haskellPackages.iptables-helpers | iptables rules parser/printer library |
| packages/nixpkgs/haskellPackages.hist-pl-transliter | A simple EDSL for transliteration rules |
| packages/nixpkgs/gnomeExtensions.bowser-gnome-extension | Create rules to open specific websites in specific web browsers for links clicked in any application on your computer. (emails, chat etc) |
| packages/nixpkgs/texlivePackages.multicolrule | Decorative rules between columns |
| packages/nixpkgs/texlivePackages.archaeologie | A citation-style which covers rules of the German Archaeological Institute |
| packages/nixpkgs/haskellPackages.shake-google-closure-compiler | Shake rules for the Google closure compiler |
| packages/nixpkgs/haskellPackages.hack-middleware-cleanpath | Applies some basic redirect rules to get cleaner paths. (deprecated) |
| packages/nixpkgs/haskellPackages.multisetrewrite | Multi-set rewrite rules with guards and a parallel execution scheme |
| options/nixos/networking.nftables.preCheckRuleset | This script gets run before the ruleset is checked
|
| options/nixos/services.usbguard.ruleFile | This tells the USBGuard daemon which file to load as policy rule set
|
| options/nixos/networking.nftables.checkRuleset | Run nft check on the ruleset to spot syntax errors during build
|
| options/nixos/services.bluemap.defaultWorld | The world used by the default map ruleset
|
| options/nixos/networking.nftables.tables | Tables to be added to ruleset
|
| options/nixos/networking.nftables.flushRuleset | Whether to enable flushing the entire ruleset on each reload.
|
| options/nixos/networking.nftables.checkRulesetRedirects | Set of paths that should be intercepted and rewritten while checking the ruleset
using pkgs.buildPackages.libredirect.
|
| packages/nixpkgs/vitess | Database clustering system for horizontal scaling of MySQL |
| packages/nixpkgs/hashcat-utils | Small utilities that are useful in advanced password cracking |
| packages/nixpkgs/john | John the Ripper password cracker |
| packages/nixpkgs/iptables-legacy | Program to configure the Linux IP packet filtering ruleset |
| packages/nixpkgs/iptables-nftables-compat | Program to configure the Linux IP packet filtering ruleset |
| packages/nixpkgs/haskellPackages.bazel-coverage-report-renderer | HTML Coverage Reports for Rules_Haskell |
| packages/nixpkgs/iptables | Program to configure the Linux IP packet filtering ruleset |
| packages/nixpkgs/modsecurity_standalone | Open source, cross-platform web application firewall (WAF) |
| packages/nixpkgs/rPackages.RulesTools | |
| packages/nur/meain.html-to-markdown | Convert HTML to Markdown |
| packages/nur/foolnotion.cmake-init | Modern CMake (3.14+) project initializer that generates FetchContent-ready projects, separates consumer and developer targets, provides install rules with proper relocatable CMake packages. |
| packages/nur/xddxdd.peerbanhelper | Automatically bans unwanted, leeching, and anomalous BT clients, with support for custom rules for qBittorrent and Transmission |
| packages/nur/shirok1.peerbanhelper | Automatically block unwanted, leeches and abnormal BT peers with support for customized and cloud rules. |
| packages/nur/rycee.firefox-addons.localcdn | Emulates remote frameworks (e.g. jQuery, Bootstrap, AngularJS) and delivers them as local resource |
| packages/nur/rycee.firefox-addons.smartproxy | SmartProxy is a smart automatic proxy switcher that will automatically enable/disable proxy for the sites you visit, based on customizable rules. |
| packages/nur/xddxdd.uncategorized.peerbanhelper | Automatically bans unwanted, leeching, and anomalous BT clients, with support for custom rules for qBittorrent and Transmission |
| packages/nur/meain.firefox-addons.containerise | Automatically open websites in a dedicated container |
| packages/nur/rycee.firefox-addons.containerise | Automatically open websites in a dedicated container |
| packages/nur/wrvsrx.v2ray-rules-dat | |
| packages/nur/oluceps.nrf-udev-rules | Please invoke this with flake input, not avaliable with nur.repos.me.* |
| packages/nur/moraxyc.v2ray-rules-dat | Enhanced edition of V2Ray rules dat files |
| packages/nur/abszero.v2ray-rules-dat | Enhanced edition of V2Ray rules dat files |
| packages/nur/oluceps.jlink-udev-rules | Please invoke this with flake input, not avaliable with nur.repos.me.* |
| packages/nur/oluceps.opensk-udev-rules | Please invoke this with flake input, not avaliable with nur.repos.me.* |
| packages/nur/guanran928.v2ray-rules-dat | Enhanced edition of V2Ray rules dat files |
| packages/nur/linyinfeng.canokey-udev-rules | udev rules for CanoKey |
| packages/nur/dmfrpro.rkflashtool-udev-rules | Rockchip rkflashtool Udev Rules |
| packages/nur/dmfrpro.spflashtool-udev-rules | SP Flash Tool Udev Rules |
| packages/nur/alarsyo.kaleidoscope-udev-rules | udev rules for kaleidoscope firmware keyboards |
| packages/nur/oluceps.disallow-generic-driver-for-switch-rules | Please invoke this with flake input, not avaliable with nur.repos.me.* |