| options/nixos/services.reposilite.useACMEHost | Host of an existing Let's Encrypt certificate to use for SSL
|
| options/nixos/security.acme.certs.<name>.group | Group running the ACME client.
|
| options/nixos/security.acme.certs | Attribute set of certificates to get signed and renewed
|
| options/nixos/security.acme.defaults | Default values inheritable by all configured certs
|
| options/nixos/services.prometheus.exporters.node-cert.group | Group under which the node-cert exporter shall be run.
|
| options/nixos/services.molly-brown.certPath | Path to TLS certificate
|
| options/nixos/security.acme.certs.<name>.csr | Path to a certificate signing request to apply when fetching the certificate.
|
| options/nixos/security.acme.certs.<name>.csrKey | Path to the private key to the matching certificate signing request.
|
| options/nixos/security.acme.certs.<name>.keyType | Key type to use for private keys
|
| options/nixos/security.acme.certs.<name>.postRun | Commands to run after new certificates go live
|
| options/nixos/security.acme.certs.<name>.email | Email address for account creation and correspondence from the CA
|
| options/nixos/security.acme.certs.<name>.domain | Domain to fetch certificate for (defaults to the entry name).
|
| options/nixos/security.acme.certs.<name>.validMinDays | Minimum remaining validity before renewal in days.
|
| options/nixos/security.acme.certs.<name>.s3Bucket | S3 bucket name to use for HTTP-01 based challenges
|
| options/nixos/security.acme.certs.<name>.server | ACME Directory Resource URI
|
| options/nixos/security.acme.certs.<name>.profile | The certificate profile to choose if the CA offers multiple profiles.
|
| options/nixos/security.acme.certs.<name>.listenHTTP | Interface and port to listen on to solve HTTP challenges
in the form [INTERFACE]:PORT
|
| options/nixos/security.acme.certs.<name>.extraLegoFlags | Additional global flags to pass to all lego commands.
|
| options/nixos/security.acme.certs.<name>.webroot | Where the webroot of the HTTP vhost is located.
.well-known/acme-challenge/ directory
will be created below the webroot if it doesn't exist.
http://example.org/.well-known/acme-challenge/ must also
be available (notice unencrypted HTTP).
|
| options/nixos/security.acme.certs.<name>.extraLegoRunFlags | Additional flags to pass to lego run.
|
| options/nixos/security.acme.certs.<name>.ocspMustStaple | Turns on the OCSP Must-Staple TLS extension
|
| options/nixos/security.acme.certs.<name>.enableDebugLogs | Whether to enable debug logging for this certificate.
|
| options/nixos/security.acme.certs.<name>.extraLegoRenewFlags | Additional flags to pass to lego renew.
|
| options/nixos/security.acme.certs.<name>.extraDomainNames | A list of extra domain names, which are included in the one certificate to be issued.
|
| options/nixos/security.acme.certs.<name>.dnsProvider | DNS Challenge provider
|
| options/nixos/security.acme.certs.<name>.dnsResolver | Set the resolver to use for performing recursive DNS queries
|
| options/nixos/security.acme.certs.<name>.directory | Directory where certificate and other state is stored.
|
| options/nixos/security.acme.certs.<name>.renewInterval | Systemd calendar expression when to check for renewal
|
| options/nixos/security.acme.certs.<name>.reloadServices | The list of systemd services to call systemctl try-reload-or-restart
on.
|
| options/nixos/security.acme.certs.<name>.inheritDefaults | Whether to inherit values set in security.acme.defaults or not.
|
| options/nixos/security.acme.defaults.group | Group running the ACME client.
|
| options/nixos/security.acme.certs.<name>.credentialFiles | Environment variables suffixed by "_FILE" to set for the cert's service
for your selected dnsProvider
|
| options/nixos/security.acme.certs.<name>.environmentFile | Path to an EnvironmentFile for the cert's service containing any required and
optional environment variables for your selected dnsProvider
|
| options/nixos/security.agnos.group | Group to run Agnos as
|
| options/nixos/security.acme.certs.<name>.dnsPropagationCheck | Toggles lego DNS propagation check, which is used alongside DNS-01
challenge to ensure the DNS entries required are available.
|
| options/nixos/security.pam.ussh.group | If set, then the authenticating user must be a member of this group
to use this module.
|
| options/nixos/users.users.<name>.group | The user's primary group.
|
| options/nixos/services.etcd.certFile | Cert file to use for clients
|
| options/nixos/power.ups.upsmon.group | Group for the default nutmon user
|
| options/nixos/services.coturn.cert | Certificate file in PEM format.
|
| options/nixos/services.ocis.group | The group to run oCIS under
|
| options/nixos/services.qui.group | Group to run qui as.
|
| options/nixos/services.znc.group | Group to own the ZNC process.
|
| options/nixos/services.node-red.group | Group under which Node-RED runs
|
| options/nixos/services.h2o.group | Group running H2O services
|
| options/nixos/services.bee.group | Group the bee binary should execute under.
|
| options/nixos/services.mpd.group | Group account under which MPD runs.
|
| options/nixos/services.vdr.group | Group under which the VDRvdr service runs.
|
| options/nixos/programs.nncp.group | The group under which NNCP files shall be owned
|
| options/nixos/security.wrappers.<name>.group | The group of the wrapper program.
|
| options/nixos/services.ente.api.group | Group under which museum runs
|
| options/nixos/services.nats.group | Group under which NATS runs.
|
| options/nixos/services.ombi.group | Group under which Ombi runs.
|
| options/nixos/services.plex.group | Group under which Plex runs.
|
| options/nixos/users.extraUsers.<name>.group | The user's primary group.
|
| options/nixos/services.caddy.group | Group under which caddy runs.
If left as the default value this group will automatically be created
on system activation, otherwise you are responsible for
ensuring the group exists before the Caddy service starts.
|
| options/nixos/services.ergo.group | The group as which to run the Ergo node.
|
| options/nixos/services.kubo.group | Group under which the Kubo daemon runs
|
| options/nixos/services.loki.group | Group under which the Loki service runs.
|
| options/nixos/services.unit.group | Group account under which unit runs.
|
| options/nixos/services.nscd.group | User group under which nscd runs.
|
| options/nixos/services.tcsd.group | Group account under which tcsd runs.
|
| options/nixos/services.bird-lg.group | Group to run the service.
|
| options/nixos/services.maddy.group | Group account under which maddy runs.
If left as the default value this group will automatically be created
on system activation, otherwise the sysadmin is responsible for
ensuring the group exists before the maddy service starts.
|
| options/nixos/services.guix.group | The group of the Guix build user pool.
|
| options/nixos/services.exim.group | Group to use when no root privileges are required.
|
| options/nixos/services.nifi.group | Group account where Apache NiFi runs.
|
| options/nixos/services.db-rest.group | Group under which db-rest runs.
|
| options/nixos/hardware.i2c.group | Grant access to i2c devices (/dev/i2c-*) to users in this group.
|
| options/nixos/services.hitch.group | The group to run as
|
| options/nixos/services.prosody.ssl.cert | Path to the certificate file.
|
| options/nixos/services.ntfy-sh.group | Primary group of ntfy-sh user.
|
| options/nixos/services.ytdl-sub.group | Group under which ytdl-sub runs.
|
| options/nixos/services.gitea.group | Group under which gitea runs.
|
| options/nixos/services.davis.group | Group davis runs as.
|
| options/nixos/services.komga.group | Group under which Komga runs.
|
| options/nixos/services.dspam.group | Group for the dspam daemon.
|
| options/nixos/services.amule.group | Group under which amule runs
|
| options/nixos/services.seatd.group | Group to own the seatd socket
|
| options/nixos/services.nexus.group | Group which runs Nexus3.
|
| options/nixos/services.slskd.group | Group under which slskd runs.
|
| options/nixos/services.omnom.group | The Omnom service group.
|
| options/nixos/services.mlmmj.group | mailinglist local group
|
| options/nixos/services.stash.group | Group under which Stash runs.
|
| options/nixos/services.memos.group | The group to run Memos as.
If changing the default value, you are responsible of creating the corresponding group with users.groups.
|
| options/nixos/services.cyrus-imap.group | Cyrus IMAP group name
|
| options/nixos/services.patroni.group | The group for the service
|
| options/nixos/services.sonarr.group | Group account under which Sonarr runs.
If left as the default value this group will automatically be created
on system activation, otherwise you are responsible for
ensuring the group exists before the Sonarr service starts.
|
| options/nixos/services.hound.group | Group the hound daemon should execute under.
|
| options/nixos/services.bosun.group | Group account under which bosun runs.
|
| options/nixos/services.legit.group | Group account under which legit runs.
|
| options/nixos/services.nginx.group | Group account under which nginx runs.
|
| options/nixos/services.movim.group | Group running Movim service
|
| options/nixos/services.rqbit.group | Group account under which rqbit runs.
|
| options/nixos/services.uwsgi.group | Group account under which uWSGI runs.
|
| options/nixos/services.murmur.group | The name of an existing group to use to run the service
|
| options/nixos/services.snipe-it.group | Group snipe-it runs as.
|
| options/nixos/hardware.cpu.amd.sev.group | Group to assign to the SEV device.
|
| options/nixos/services.felix.group | Group account under which Apache Felix runs.
|
| options/nixos/services.httpd.group | Group under which httpd children processes run.
|
| options/nixos/services.coder.group | Group under which the coder service runs.
If left as the default value this group will automatically be created
on system activation, otherwise it needs to be configured manually.
|
| options/nixos/programs.cdemu.group | Group that users must be in to use cdemu.
|
| options/nixos/hardware.cpu.x86.msr.group | Group to set for devices of the msr kernel subsystem.
|
| options/nixos/services.cgit.<name>.group | Group to run the cgit service as.
|
| options/nixos/services.outline.group | Group under which the service should run
|
| options/nixos/services.webhook.group | Webhook will be run under this group
|
| options/nixos/services.documize.cert | The cert.pem file used for https.
|
| options/nixos/services.kubernetes.pki.certs | List of certificate specs to feed to cert generator.
|
| options/nixos/services.ollama.group | Group under which to run ollama
|
| options/nixos/services.pgmanage.tls.cert | TLS certificate
|
| options/nixos/services.quorum.group | The group as which to run quorum.
|
| options/nixos/services.atticd.group | The group under which attic runs.
|
| options/nixos/services.bazarr.group | Group under which bazarr runs.
|
| options/nixos/services.lidarr.group | Group under which Lidarr runs.
|
| options/nixos/services.immich.group | The group immich should run as.
|
| options/nixos/services.artalk.group | Artalk group name.
|
| options/nixos/services.deluge.group | Group under which deluge runs.
|
| options/nixos/services.kismet.group | The group to run Kismet as.
|
| options/nixos/services.galene.group | Group under which galene runs.
|
| options/nixos/services.opkssh.group | System group for opkssh
|
| options/nixos/services.nzbget.group | Group under which NZBGet runs
|
| options/nixos/services.pretix.group | Group under which pretix should run.
|
| options/nixos/services.radarr.group | Group under which Radarr runs.
|
| options/nixos/services.monica.group | Group monica runs as.
|
| options/nixos/services.webdav.group | Group under which WebDAV runs.
|
| options/nixos/services.zammad.group | Name of the Zammad group.
|
| options/nixos/services.prosody.group | Group account under which prosody runs.
If left as the default value this group will automatically be created
on system activation, otherwise you are responsible for
ensuring the group exists before the prosody service starts.
|
| options/nixos/services.flannel.etcd.certFile | Etcd cert file
|
| options/nixos/services.code-server.group | The group to run code-server under
|
| options/nixos/services.mysql.group | Group account under which MySQL runs.
If left as the default value this group will automatically be created
on system activation, otherwise you are responsible for
ensuring the user exists before the MySQL service starts.
|
| options/nixos/services.ttyd.certFile | SSL certificate file path.
|
| options/nixos/services.flarum.group | System group to run Flarum
|
| options/nixos/services.akkoma.group | Group account under which Akkoma runs.
|
| options/nixos/services.cross-seed.group | Group to run cross-seed as.
|
| options/nixos/programs.ccache.group | Group owner of CCache directory
|
| options/nixos/services.sftpgo.group | Group name under which SFTPGo runs.
|
| options/nixos/services.github-runners.<name>.group | Group under which to run the service
|
| options/nixos/services.gollum.group | Specifies the owner group of the wiki directory
|
| options/nixos/services.baikal.group | Group account under which the web-application run.
|
| options/nixos/services.gitlab.group | Group to run gitlab and all related services.
|
| options/nixos/services.tomcat.group | Group account under which Apache Tomcat runs.
|
| options/nixos/services.rspamd.group | Group to use when no root privileges are required.
|
| options/nixos/services.pihole-ftl.group | Group to run the service as.
|
| options/nixos/services.pyload.group | Group under which pyLoad runs, and which owns the download directory.
|
| options/nixos/services.pocket-id.group | Group account under which Pocket ID runs.
|
| options/nixos/services.zeyple.group | Group to use to run Zeyple.
If left as the default value this group will automatically be created
on system activation, otherwise the sysadmin is responsible for
ensuring the user exists.
|
| options/nixos/services.gitDaemon.group | Group under which Git daemon would be running.
|
| options/nixos/services.rss-bridge.group | The group under which the web application runs.
|
| options/nixos/services.firefly-iii.group | Group under which firefly-iii runs
|
| options/nixos/services.public-inbox.imap.cert | Path to TLS certificate to use for connections to public-inbox-imapd(1).
|
| options/nixos/services.public-inbox.nntp.cert | Path to TLS certificate to use for connections to public-inbox-nntpd(1).
|
| options/nixos/security.duosec.groups | If specified, Duo authentication is required only for users
whose primary group or supplementary group list matches one
of the space-separated pattern lists
|
| options/nixos/services.gocd-agent.group | If the default user "gocd-agent" is configured then this is the primary
group of that user.
|
| options/nixos/services.syncoid.group | The group for the service.
|
| options/nixos/services.jupyter.group | Name of the group used to run the jupyter service
|
| options/nixos/services.traefik.group | Primary group under which Traefik runs
|
| options/nixos/services.dolibarr.group | Group account under which dolibarr runs.
If left as the default value this group will automatically be created
on system activation, otherwise you are responsible for
ensuring the group exists before the dolibarr application starts.
|
| options/nixos/services.pixelfed.group | Group account under which pixelfed runs.
If left as the default value this group will automatically be created
on system activation, otherwise you are responsible for
ensuring the group exists before the pixelfed application starts.
|
| options/nixos/hardware.cpu.amd.sevGuest.group | Group to assign to the SEV guest device.
|
| options/nixos/services.roon-bridge.group | Group to run the Roon Bridge as.
|
| options/nixos/services.roon-server.group | Group to run the Roon Server as.
|
| options/nixos/services.certspotter.startAtEnd | Whether to skip certificates issued before the first launch of Cert Spotter
|
| options/nixos/services.seafile.group | Group under which seafile runs.
|
| options/nixos/services.icecast.group | Group privileges for the server.
|
| options/nixos/services.corteza.group | The group to run Corteza under.
|
| options/nixos/services.jackett.group | Group under which Jackett runs.
|
| options/nixos/services.homebox.group | Group under which Homebox runs.
|
| options/nixos/services.forgejo.group | Group under which Forgejo runs.
|
| options/nixos/services.owncast.group | Group under which owncast runs.
|
| options/nixos/services.sabnzbd.group | Group to run the service as
|
| options/nixos/services.readarr.group | Group under which Readarr runs.
|
| options/nixos/services.pretalx.group | Group under which pretalx should run.
|
| options/nixos/services.netdata.group | Group under which netdata runs.
|
| options/nixos/services.pdfding.group | Group under which PdfDing runs
|
| options/nixos/services.redmine.group | Group under which Redmine is ran.
|
| options/nixos/services.polaris.group | Group under which Polaris is run.
|
| options/nixos/services.stunnel.group | The group under which stunnel runs.
|
| options/nixos/services.monetdb.group | Group under which MonetDB runs.
|
| options/nixos/services.unbound.group | Group under which unbound runs.
|
| options/nixos/services.zitadel.group | The group to run ZITADEL under.
|
| options/nixos/services.zerobin.group | The group 0bin should run as
|
| options/nixos/services.synergy.server.tls.cert | The TLS certificate to use for encryption.
|
| options/darwin/services.synergy.client.tls.cert | The TLS certificate to use for encryption.
|
| options/darwin/services.synergy.server.tls.cert | The TLS certificate to use for encryption.
|
| options/nixos/services.haproxy.group | Group account under which haproxy runs.
|
| options/nixos/services.couchdb.group | Group account under which couchdb runs.
|
| options/nixos/services.pleroma.group | Group account under which pleroma runs.
|
| options/nixos/services.usbmuxd.group | The group usbmuxd should use to run after startup.
|
| options/home-manager/services.syncthing.cert | Path to the cert.pem file, which will be copied into Syncthing's
config directory.
|
| options/nixos/programs.ydotool.group | Group which users must be in to use ydotool.
|
| options/nixos/services.postfix.group | What to call the Postfix group (must be used only for postfix).
|
| options/nixos/services.podgrab.group | Group under which Podgrab runs, and which owns the download directory.
|
| options/home-manager/services.podman.images.<name>.certDir | Path of certificates (*.{crt,cert,key}) used to connect to registry.
|
| options/nixos/services.syncthing.cert | Path to the cert.pem file, which will be copied into Syncthing's
configDir.
|
| options/nixos/services.gocd-server.group | If the default user "gocd-server" is configured then this is the primary group of that user.
|
| options/nixos/services.jenkins.group | If the default user "jenkins" is configured then this is the primary
group of that user.
|
| options/nixos/services.calibre-web.group | Group account under which Calibre-Web runs.
|
| options/nixos/services.rsync.jobs.<name>.group | The name of an existing user group under which the rsync process should run.
|
| options/nixos/services.actual.group | Group account under which Actual runs
|
| options/nixos/services.lavalink.group | The group of the service.
|
| options/nixos/services.opendkim.group | Group for the daemon.
|
| options/nixos/services.postsrsd.group | Group for the daemon
|
| options/nixos/services.redis.servers.<name>.group | Group account under which this instance of redis-server runs.
If left as the default value this group will automatically be
created on system activation, otherwise you are responsible for
ensuring the group exists before the redis service starts.
|
| options/nixos/services.matrix-tuwunel.group | The group tuwunel is run as
|
| options/nixos/services.lxd-image-server.group | Group assigned to the user and the webroot directory.
|
| options/nixos/services.opencloud.group | The group to run OpenCloud under
|
| options/nixos/services.syncthing.group | The group to run Syncthing under
|
| options/nixos/services.movim.h2o.acme.useHost | An existing Let’s Encrypt certificate to use for this virtual
host
|
| options/nixos/services.dawarich.group | Group under which dawarich runs.
|
| options/nixos/services.crowdsec.group | The group to run crowdsec as
|
| options/nixos/services.jellyfin.group | Group under which jellyfin runs.
|
| options/nixos/services.agorakit.group | Group agorakit runs as.
|
| options/nixos/services.ejabberd.group | Group under which ejabberd is ran
|
| options/nixos/services.librenms.group | Name of the LibreNMS group.
|
| options/nixos/services.influxdb.group | Group under which influxdb runs
|
| options/nixos/services.kanboard.group | Group under which Kanboard runs.
|
| options/nixos/services.ersatztv.group | Group under which ErsatzTV runs.
|
| options/nixos/services.rtorrent.group | Group under which rtorrent runs.
|
| options/nixos/services.olivetin.group | The group under which OliveTin runs.
|
| options/nixos/services.peertube.group | Group under which Peertube runs.
|
| options/nixos/services.stalwart.group | Group ownership of service
|
| options/nixos/services.tautulli.group | Group under which Tautulli runs.
|
| options/nixos/services.mastodon.group | Group under which mastodon runs.
|
| options/nixos/services.sniproxy.group | Group under which sniproxy runs.
|
| options/nixos/services.whisparr.group | Group under which Whisparr runs.
|
| options/nixos/services.gammu-smsd.device.group | Owner group of the device
|
| options/nixos/boot.initrd.systemd.users.<name>.group | Group the user belongs to in initrd.
|
| options/nixos/services.dovecot2.group | Dovecot group name.
|
| options/nixos/services.openldap.group | Group account under which slapd runs.
|
| options/nixos/services.opentsdb.group | Group account under which OpenTSDB runs.
|
| options/nixos/services.oxidized.group | Group under which the oxidized service runs.
|
| options/nixos/services.nebula.networks.<name>.cert | Path to the host certificate.
|
| options/nixos/services.klipper.group | Group account under which Klipper runs
|
| options/nixos/services.nginx.gitweb.group | Group that the CGI process will belong to. (Set to config.services.gitolite.group if you are using gitolite.)
|
| options/nixos/services.gitolite.group | Primary group of the Gitolite user account.
|
| options/nixos/services.portunus.group | Group account under which Portunus runs its webserver.
|
| options/nixos/services.pingvin-share.group | Group under which Pingvin Share runs.
|
| options/nixos/services.webdav-server-rs.group | Group to run under when setuid is not enabled.
|
| options/nixos/services.phpfpm.pools.<name>.group | Group account under which this pool runs.
|
| options/nixos/services.inadyn.group | Group account under which inadyn runs.
If left as the default value this user will automatically be created
on system activation, otherwise you are responsible for
ensuring the user exists before the inadyn service starts.
|
| options/nixos/services.galene.certFile | Path to the server's certificate
|
| options/nixos/services.temporal.group | The group temporal runs as
|
| options/nixos/services.quickwit.group | The group quickwit runs as
|
| options/nixos/services.h2o.hosts.<name>.acme.useHost | An existing Let’s Encrypt certificate to use for this virtual
host
|
| options/nixos/services.mjpg-streamer.group | mjpg-streamer group name.
|
| options/nixos/services.llama-swap.tls.certFile | Path to the TLS certificate file
|
| options/nixos/services.jenkinsSlave.group | If the default slave agent user "jenkins" is configured then this is
the primary group of that user.
|
| options/nixos/services.bitcoind.<name>.group | The group as which to run bitcoind.
|
| options/nixos/services.calibre-server.group | The group under which calibre-server runs.
|
| options/nixos/services.certspotter.enable | Whether to enable Cert Spotter, a Certificate Transparency log monitor.
|
| options/nixos/services.octoprint.group | Group for the daemon.
|
| options/nixos/services.portunus.ldap.group | Group account under which Portunus runs its LDAP server.
|
| options/nixos/services.bookstack.group | Group bookstack runs as
|
| options/nixos/services.commafeed.group | Group under which CommaFeed runs.
|
| options/nixos/services.glitchtip.group | The group under which GlitchTip runs.
|
| options/nixos/hardware.bumblebee.group | Group for bumblebee socket
|
| options/nixos/services.blendfarm.group | Group under which blendfarm runs.
|
| options/nixos/services.kapacitor.group | Group under which Kapacitor runs
|
| options/nixos/services.librechat.group | The group to run the service as.
|
| options/nixos/services.pinchflat.group | Group under which Pinchflat runs.
|
| options/nixos/services.navidrome.group | Group under which Navidrome runs.
|
| options/nixos/services.recyclarr.group | Group under which recyclarr runs.
|
| options/nixos/services.sickbeard.group | Group to run the service as
|
| options/nixos/services.pgbouncer.group | The group pgbouncer is run as.
|
| options/darwin/services.github-runners.<name>.group | Group under which to run the service
|
| options/nixos/services.privatebin.group | Group under which privatebin runs
|
| options/nixos/services.headscale.group | Group under which headscale runs.
If left as the default value this group will automatically be created
on system activation, otherwise you are responsible for
ensuring the user exists before the headscale service starts.
|
| options/nixos/services.prosody.virtualHosts.<name>.ssl.cert | Path to the certificate file.
|
| options/nixos/services.charybdis.group | Charybdis IRC daemon group.
|
| options/nixos/services.cassandra.group | Run Apache Cassandra under this group.
|
| options/nixos/hardware.ubertooth.group | Group for Ubertooth's udev rules.
|
| options/nixos/services.bitmagnet.group | Group of user running bitmagnet
|
| options/nixos/services.stargazer.group | Group account under which stargazer runs.
|
| options/nixos/services.rethinkdb.group | Group which rethinkdb user belongs to.
|
| options/nixos/services.moonraker.group | Group account under which Moonraker runs.
|
| options/nixos/services.rutorrent.group | Group which runs the ruTorrent service.
|
| options/nixos/services.mediatomb.group | Group account under which the service runs.
|
| options/nixos/services.certspotter.extraFlags | Extra command-line arguments to pass to Cert Spotter
|
| options/nixos/services.varnish.listen.*.group | Group name who owns the socket file.
|
| options/nixos/security.tpm2.fapi.ekCertLess | A switch to disable Endorsement Key (EK) certificate verification
|
| options/nixos/programs.k40-whisperer.group | Group assigned to the device when connected.
|
| options/nixos/services.gns3-server.ssl.certFile | Path to the SSL certificate file
|
| options/nixos/services.tandoor-recipes.group | Group under which Tandoor runs.
|
| options/nixos/services.infinoted.group | What to call the primary group of the dedicated user under which infinoted is run
|
| options/nixos/services.syncplay.certDir | TLS certificates directory to use for encryption
|
| options/nixos/system.nssDatabases.group | List of group entries to configure in /etc/nsswitch.conf
|
| options/nixos/services.buildbot-master.group | Primary group of buildbot user.
|
| options/nixos/services.peertube-runner.group | Group under which peertube-runner runs.
|
| options/nixos/services.suwayomi-server.group | Group under which Suwayomi-Server runs.
|
| options/nixos/services.plantuml-server.group | Group which runs PlantUML server.
|
| options/nixos/services.dolibarr.h2o.acme.useHost | An existing Let’s Encrypt certificate to use for this virtual
host
|
| options/nixos/services.buildbot-worker.group | Primary group of buildbot Worker user.
|
| options/nixos/services.tailscaleAuth.group | Group which runs tailscale-nginx-auth
|
| options/nixos/users.groups.<name>.members | The user names of the group members, added to the
/etc/group file.
|
| options/home-manager/services.podman.volumes.<name>.group | The group ID owning the volume inside the container.
|
| options/nixos/users.groups.<name>.gid | The group GID
|
| options/nixos/services.yggdrasil.group | Group to grant access to the Yggdrasil control socket
|
| options/nixos/services.journald.gateway.cert | The path to a file or AF_UNIX stream socket to read the server
certificate from
|
| options/nixos/services.samba.usershares.group | Name of the group members of which will be allowed to create usershares
|
| options/nixos/services.taskserver.group | Group for Taskserver.
|
| options/home-manager/programs.kakoune.config.hooks.*.group | Add the hook to the named group.
|
| options/nixos/services.firefly-iii-data-importer.group | Group under which firefly-iii-data-importer runs
|
| options/nixos/services.headphones.group | Group to run the service as
|
| options/nixos/services.homebridge.group | Group to run homebridge as.
|
| options/nixos/services.govee2mqtt.group | Group under which Govee2MQTT should run.
|
| options/nixos/services.photoprism.group | Group under which photoprism runs.
|
| options/nixos/services.szurubooru.group | Group under which Szurubooru runs.
|
| options/nixos/services.microsocks.group | Group microsocks runs as.
|
| options/nixos/services.linkwarden.group | The group Linkwarden should run as.
|
| options/nixos/services.lubelogger.group | Group under which LubeLogger runs.
|
| options/nixos/services.reposilite.group | The group to run Reposilite under.
|
| options/nixos/services.mailman.ldap.groupSearch.type | Type of group to perform a group search against.
|
| options/nixos/services.sourcehut.hg.group | Group for hg.sr.ht
|
| options/nixos/services.borgbackup.jobs.<name>.group | The group borg is run as
|
| options/nixos/services.shairport-sync.group | Group account name under which to run shairport-sync
|
| options/nixos/services.mattermost.group | Group which runs the Mattermost service.
|
| options/nixos/services.scollector.group | Group account under which scollector runs.
|
| options/nixos/services.sourcehut.man.group | Group for man.sr.ht
|
| options/nixos/services.sourcehut.git.group | Group for git.sr.ht
|
| options/nixos/services.sourcehut.hub.group | Group for hub.sr.ht
|
| options/nixos/services.nullmailer.group | Group to use to run nullmailer-send.
|
| options/nixos/services.openvscode-server.group | The group to run openvscode-server under
|
| options/nixos/users.groups.<name>.name | The name of the group
|
| options/nixos/services.cockroachdb.certsDir | The path to the certificate directory.
|
| options/nixos/services.sourcehut.todo.group | Group for todo.sr.ht
|
| options/nixos/services.sourcehut.meta.group | Group for meta.sr.ht
|
| options/nixos/services.healthchecks.group | Group account under which healthchecks runs.
If left as the default value this group will automatically be created
on system activation, otherwise you are responsible for
ensuring the group exists before the healthchecks service starts.
|
| options/nixos/services.taskserver.pki.manual.ca.cert | Fully qualified path to the CA certificate.
Setting this option will prevent automatic CA creation and handling.
|
| options/nixos/services.komodo-periphery.group | Group under which the Periphery agent runs.
|
| options/nixos/services.opensearch.group | The group OpenSearch runs as
|
| options/nixos/services.cloudflare-ddns.group | Group under which the service runs.
|
| options/nixos/services.borgbackup.repos.<name>.group | The group borg serve is run as
|
| options/nixos/services.stargazer.certOrg | The name of the organization responsible for the X.509
certificate's /O name.
|
| options/nixos/hardware.cpu.intel.sgx.provision.group | Group to assign to the SGX provisioning device.
|
| options/nixos/services.ghostunnel.servers.<name>.cert | Path to certificate (PEM with certificate chain)
|
| options/nixos/services.thanos.rule.grpc-server-tls-cert | TLS Certificate for gRPC server, leave blank to disable TLS
|
| options/nixos/services.sourcehut.paste.group | Group for paste.sr.ht
|
| options/nixos/services.sourcehut.lists.group | Group for lists.sr.ht
|
| options/nixos/services.sourcehut.pages.group | Group for pages.sr.ht
|
| options/nixos/services.netbird.tunnels.<name>.user.group | A system group name for this client instance.
|
| options/nixos/services.netbird.clients.<name>.user.group | A system group name for this client instance.
|
| options/nixos/services.privoxy.certsLifetime | If inspectHttps is enabled, the time generated HTTPS
certificates will be stored in a temporary directory for reuse
|
| options/nixos/services.silverbullet.group | The group to run Silverbullet under
|
| options/nixos/services.maddy.tls.certificates.*.certPath | Path to the certificate used for TLS.
|
| options/nixos/services.thanos.query.grpc-client-tls-cert | TLS Certificates to use to identify this client to the server
|
| options/nixos/services.hbase-standalone.group | Group account under which HBase runs.
|
| options/nixos/services.wyoming.satellite.group | Group to run wyoming-satellite under.
|
| options/nixos/services.gitlab.registry.certFile | Path to GitLab container registry certificate.
|
| options/nixos/services.filebrowser.group | Group under which FileBrowser runs.
|
| options/nixos/services.meshtasticd.group | Group meshtasticd runs as.
|
| options/nixos/services.qbittorrent.group | Group under which qbittorrent runs.
|
| options/nixos/services.writefreely.group | Group under which Writefreely is ran.
|
| options/nixos/services.thanos.query.grpc-server-tls-cert | TLS Certificate for gRPC server, leave blank to disable TLS
|
| options/nixos/services.thanos.store.grpc-server-tls-cert | TLS Certificate for gRPC server, leave blank to disable TLS
|
| options/darwin/users.groups | Configuration for groups.
|
| options/nixos/environment.etc.<name>.group | Group name of file owner
|
| options/nixos/services.doh-server.useACMEHost | A host of an existing Let's Encrypt certificate to use.
Note that this option does not create any certificates, nor it does add subdomains to existing ones – you will need to create them manually using security.acme.certs.
|
| options/nixos/services.vdirsyncer.jobs.<name>.group | group to run vdirsyncer as
|
| options/nixos/services.sourcehut.builds.group | Group for builds.sr.ht
|
| options/nixos/services.athens.storage.mongo.certPath | Path to the certificate file for the mongo database.
|
| options/nixos/services.sillytavern.group | Group account under which the web-application run.
|
| options/nixos/security.tpm2.tssGroup | Group of the tpm kernel resource manager (tpmrm) device-group, set if
applyUdevRules is set.
|
| options/nixos/services.taskserver.pki.manual.server.cert | Fully qualified path to the server certificate.
Setting this option will prevent automatic CA creation and handling.
|
| options/nixos/services.keepalived.vrrpScripts.<name>.group | Name of group to run the script under
|
| options/nixos/services.suricata.settings.run-as.group | Run Suricata with a specific group-id.
|
| options/nixos/security.sudo.extraRules.*.runAs | Under which user/group the specified command is allowed to run
|
| options/nixos/services.vault-agent.instances.<name>.group | Group under which this instance runs.
|
| options/nixos/security.sudo-rs.extraRules.*.runAs | Under which user/group the specified command is allowed to run
|
| options/nixos/services.mailman.ldap.groupSearch.ou | Organizational unit to look up a group.
|
| options/nixos/services.kubernetes.apiserver.etcd.certFile | Etcd cert file.
|
| options/nixos/services.anubis.defaultOptions.group | The group under which Anubis is run
|
| options/nixos/services.mail.sendmailSetuidWrapper.group | The group of the wrapper program.
|
| options/nixos/users.groups | Additional groups to be created automatically by the system.
|
| options/darwin/system.defaults.dock.expose-group-apps | Whether to group windows by application in Mission Control's Exposé
|
| options/home-manager/services.podman.containers.<name>.group | The group ID inside the container.
|
| options/nixos/services.anubis.instances.<name>.group | The group under which Anubis is run
|
| options/nixos/services.komodo-periphery.ssl.certFile | Path to SSL certificate file.
|
| options/nixos/services.xserver.desktopManager.phosh.group | The group to run the Phosh service.
|
| options/nixos/services.thanos.sidecar.grpc-server-tls-cert | TLS Certificate for gRPC server, leave blank to disable TLS
|
| options/nixos/services.thanos.receive.grpc-server-tls-cert | TLS Certificate for gRPC server, leave blank to disable TLS
|
| options/nixos/services.prometheus.exporters.chrony.group | Group under which the chrony exporter shall be run
|
| options/nixos/services.foundationdb.group | Group account under which FoundationDB runs.
|
| options/nixos/services.matterbridge.group | Group which runs the matterbridge service.
|
| options/nixos/services.transmission.group | Group account under which Transmission runs.
|
| options/nixos/services.prometheus.exporters.frr.group | Group under which the frr exporter shall be run
|
| options/nixos/services.authelia.instances.<name>.group | The name of the group for this authelia instance.
|
| options/nixos/services.blockbook-frontend.<name>.group | The group as which to run blockbook-frontend-‹name›.
|
| options/nixos/services.prometheus.exporters.node-cert.enable | Whether to enable the prometheus node-cert exporter.
|
| options/nixos/systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.group | The group of the file
|
| options/nixos/security.doas.extraRules.*.groups | The groups / GIDs this rule should apply for.
|
| options/nixos/security.sudo.extraRules.*.groups | The groups / GIDs this rule should apply for.
|
| options/nixos/services.certspotter.hooks | Scripts to run upon the detection of a new certificate
|
| options/nixos/services.nginx.tailscaleAuth.group | Alias of services.tailscaleAuth.group.
|
| options/nixos/services.sourcehut.settings."pages.sr.ht".gemini-certs | An absolute file path (which should be outside the Nix-store)
to Gemini certificates.
|
| options/nixos/security.ipa.certificate | IPA server CA certificate
|
| options/nixos/security.sudo-rs.extraRules.*.groups | The groups / GIDs this rule should apply for.
|
| options/nixos/services.mailman.ldap.groupSearch.query | Query to find a group associated to a user in the LDAP database.
|
| options/nixos/services.prometheus.exporters.node-cert.extraFlags | Extra commandline options to pass to the node-cert exporter.
|
| options/nixos/services.certspotter.package | The certspotter package to use.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.group | Members of this group can access the control socket for this interface.
|
| options/nixos/services.davis.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.movim.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.slskd.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/programs.ssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| options/darwin/programs.ssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| options/nixos/services.stargazer.certLifetime | How long certs generated by Stargazer should live for
|
| options/nixos/services.snipe-it.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.consul-template.instances.<name>.group | Group under which this instance runs.
|
| options/nixos/services.matrix-continuwuity.group | The group continuwuity is run as.
|
| options/nixos/services.wasabibackend.group | The group as which to run the wasabibackend node.
|
| options/nixos/services.fcgiwrap.instances.<name>.socket.group | Group to be set as owner of the UNIX socket.
|
| options/nixos/boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.group | The group of the file
|
| options/nixos/services.prometheus.exporters.sql.group | Group under which the sql exporter shall be run.
|
| options/nixos/services.prometheus.exporters.nut.group | Group under which the nut exporter shall be run.
|
| options/nixos/services.prometheus.exporters.kea.group | Group under which the kea exporter shall be run.
|
| options/nixos/services.prometheus.exporters.pve.group | Group under which the pve exporter shall be run.
|
| options/nixos/services.prometheus.exporters.zfs.group | Group under which the zfs exporter shall be run.
|
| options/nixos/services.prometheus.exporters.lnd.group | Group under which the lnd exporter shall be run.
|
| options/nixos/services.cockroachdb.group | User account under which CockroachDB runs
|
| options/nixos/services.akkoma.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.gancio.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.fluidd.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.matomo.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.monica.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/security.pki.certificates | A list of trusted root certificates in PEM format.
|
| options/darwin/security.pki.certificates | A list of trusted root certificates in PEM format.
|
| options/nixos/services.librespeed.useACMEHost | Use a certificate generated by the NixOS ACME module for the given host
|
| options/nixos/services.sourcehut.settings."todo.sr.ht::mail".sock-group | The lmtp daemon will make the unix socket group-read/write
for users in this group.
|
| options/nixos/services.nextcloud-spreed-signaling.group | Group under which to run the Spreed signaling server.
|
| options/nixos/services.prometheus.exporters.postfix.group | Group under which the postfix exporter shall be run
|
| options/nixos/services.prometheus.exporters.flow.group | Group under which the flow exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mail.group | Group under which the mail exporter shall be run.
|
| options/nixos/services.prometheus.exporters.snmp.group | Group under which the snmp exporter shall be run.
|
| options/nixos/services.prometheus.exporters.bind.group | Group under which the bind exporter shall be run.
|
| options/nixos/services.prometheus.exporters.bird.group | Group under which the bird exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mqtt.group | Group under which the mqtt exporter shall be run.
|
| options/nixos/services.prometheus.exporters.ebpf.group | Group under which the ebpf exporter shall be run.
|
| options/nixos/services.prometheus.exporters.ipmi.group | Group under which the ipmi exporter shall be run.
|
| options/nixos/services.prometheus.exporters.knot.group | Group under which the knot exporter shall be run.
|
| options/nixos/services.prometheus.exporters.nats.group | Group under which the nats exporter shall be run.
|
| options/nixos/services.prometheus.exporters.node.group | Group under which the node exporter shall be run.
|
| options/nixos/services.prometheus.exporters.ping.group | Group under which the ping exporter shall be run.
|
| options/nixos/services.prometheus.exporters.json.group | Group under which the json exporter shall be run.
|
| options/nixos/virtualisation.podman.networkSocket.tls.cert | Path to certificate describing the server.
|
| options/nixos/services.thanos.query-frontend.grpc-server-tls-cert | TLS Certificate for gRPC server, leave blank to disable TLS
|
| options/nixos/services.portunus.ldap.tls | Whether to enable LDAPS protocol
|
| options/nixos/services.prometheus.exporters.php-fpm.group | Group under which the php-fpm exporter shall be run.
|
| options/nixos/services.taskchampion-sync-server.group | Unix Group to run the server under
|
| options/darwin/users.groups.<name>.gid | The group's GID.
|
| options/nixos/services.fcgiwrap.instances.<name>.process.group | Group as which this instance of fcgiwrap will be run.
|
| options/nixos/services.prometheus.exporters.idrac.group | Group under which the idrac exporter shall be run.
|
| options/nixos/services.prometheus.exporters.dmarc.group | Group under which the dmarc exporter shall be run.
|
| options/nixos/services.prometheus.exporters.redis.group | Group under which the redis exporter shall be run.
|
| options/nixos/services.prometheus.exporters.fritz.group | Group under which the fritz exporter shall be run.
|
| options/nixos/services.prometheus.exporters.v2ray.group | Group under which the v2ray exporter shall be run.
|
| options/nixos/services.prometheus.exporters.kafka.group | Group under which the kafka exporter shall be run.
|
| options/nixos/services.prometheus.exporters.jitsi.group | Group under which the jitsi exporter shall be run.
|
| options/nixos/services.prometheus.exporters.nginx.group | Group under which the nginx exporter shall be run.
|
| options/nixos/services.dnsdist.dnscrypt.certLifetime | The lifetime (in minutes) of the resolver certificate
|
| options/nixos/boot.initrd.systemd.groups.<name>.gid | ID of the group in initrd.
|
| options/nixos/security.pki.certificateFiles | A list of files containing trusted root certificates in PEM
format
|
| options/darwin/security.pki.certificateFiles | A list of files containing trusted root certificates in PEM
format
|
| options/nixos/security.doas.extraRules.*.runAs | Which user or group the specified command is allowed to run as
|
| options/nixos/services.prometheus.exporters.dnssec.group | Group under which the dnssec exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mysqld.group | Group under which the mysqld exporter shall be run.
|
| options/nixos/services.prometheus.exporters.script.group | Group under which the script exporter shall be run.
|
| options/nixos/services.prometheus.exporters.fastly.group | Group under which the fastly exporter shall be run.
|
| options/nixos/services.prometheus.exporters.deluge.group | Group under which the deluge exporter shall be run.
|
| options/nixos/services.prometheus.exporters.shelly.group | Group under which the shelly exporter shall be run.
|
| options/nixos/services.prometheus.exporters.rspamd.group | Group under which the rspamd exporter shall be run.
|
| options/nixos/services.prometheus.exporters.tibber.group | Group under which the tibber exporter shall be run.
|
| options/nixos/services.prometheus.exporters.restic.group | Group under which the restic exporter shall be run.
|
| options/nixos/services.prometheus.exporters.statsd.group | Group under which the statsd exporter shall be run.
|
| options/nixos/services.prometheus.exporters.domain.group | Group under which the domain exporter shall be run.
|
| options/nixos/services.prometheus.exporters.pihole.group | Group under which the pihole exporter shall be run.
|
| options/nixos/services.librenms.distributedPoller.group | Group(s) of this poller.
|
| options/nixos/services.wstunnel.servers.<name>.useACMEHost | Use a certificate generated by the NixOS ACME module for the given host
|
| options/nixos/networking.wireless.userControlled.group | Members of this group can control wpa_supplicant.
|
| options/nixos/services.certspotter.sendmailPath | Path to the sendmail binary
|
| options/nixos/services.audiobookshelf.group | Group under which Audiobookshelf runs.
|
| options/nixos/services.libretranslate.group | Group account under which libretranslate runs.
|
| options/nixos/services.sourcehut.settings."lists.sr.ht::worker".sock-group | The lmtp daemon will make the unix socket group-read/write
for users in this group.
|
| options/nixos/services.prometheus.exporters.nvidia-gpu.group | Group under which the nvidia-gpu exporter shall be run.
|
| options/nixos/services.openssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| options/nixos/services.certspotter.watchlist | Domain names to watch
|
| options/home-manager/qt.kde.settings | A set of values to be modified by kwriteconfig6
|
| options/nixos/services.librenms.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.kanboard.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.agorakit.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.dolibarr.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.fediwall.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.pixelfed.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.mainsail.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.prometheus.exporters.libvirt.group | Group under which the libvirt exporter shall be run.
|
| options/nixos/services.prometheus.exporters.bitcoin.group | Group under which the bitcoin exporter shall be run.
|
| options/nixos/services.prometheus.exporters.dovecot.group | Group under which the dovecot exporter shall be run.
|
| options/nixos/services.prometheus.exporters.sabnzbd.group | Group under which the sabnzbd exporter shall be run.
|
| options/nixos/services.prometheus.exporters.varnish.group | Group under which the varnish exporter shall be run.
|
| options/nixos/services.prometheus.exporters.klipper.group | Group under which the klipper exporter shall be run.
|
| options/nixos/services.prometheus.exporters.unbound.group | Group under which the unbound exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mongodb.group | Group under which the mongodb exporter shall be run.
|
| options/nixos/services.prometheus.exporters.dnsmasq.group | Group under which the dnsmasq exporter shall be run.
|
| options/nixos/services.prometheus.exporters.ecoflow.group | Group under which the ecoflow exporter shall be run.
|
| options/nixos/services.prometheus.exporters.apcupsd.group | Group under which the apcupsd exporter shall be run.
|
| options/nixos/services.prometheus.exporters.process.group | Group under which the process exporter shall be run.
|
| options/nixos/services.prometheus.exporters.systemd.group | Group under which the systemd exporter shall be run.
|
| options/nixos/services.blockbook-frontend.<name>.certFile | To enable SSL, specify path to the name of certificate files without extension
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.cert | Path to certificate (PEM with certificate chain)
|
| options/nixos/services.radicle.httpd.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.caddy.virtualHosts.<name>.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.prometheus.exporters.rtl_433.group | Group under which the rtl_433 exporter shall be run.
|
| options/darwin/services.github-runners | Multiple GitHub Runners
|
| options/nixos/services.moodle.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.nagios.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.prometheus.exporters.node-cert.port | Port to listen on.
|
| options/nixos/services.prometheus.exporters.node-cert.user | User owning the certs.
|
| options/nixos/services.prometheus.exporters.py-air-control.group | Group under which the py-air-control exporter shall be run.
|
| options/nixos/services.anuko-time-tracker.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.prometheus.exporters.mikrotik.group | Group under which the mikrotik exporter shall be run.
|
| options/nixos/services.prometheus.exporters.opnsense.group | Group under which the opnsense exporter shall be run.
|
| options/nixos/services.prometheus.exporters.postgres.group | Group under which the postgres exporter shall be run.
|
| options/nixos/services.prometheus.exporters.nginxlog.group | Group under which the nginxlog exporter shall be run.
|
| options/nixos/services.prometheus.exporters.unpoller.group | Group under which the unpoller exporter shall be run.
|
| options/nixos/services.prometheus.exporters.graphite.group | Group under which the graphite exporter shall be run.
|
| options/nixos/services.prometheus.exporters.fritzbox.group | Group under which the fritzbox exporter shall be run.
|
| options/nixos/services.prometheus.exporters.smartctl.group | Group under which the smartctl exporter shall be run.
|
| options/nixos/services.prometheus.exporters.blackbox.group | Group under which the blackbox exporter shall be run.
|
| options/nixos/services.prometheus.exporters.influxdb.group | Group under which the influxdb exporter shall be run.
|
| options/nixos/services.prometheus.exporters.keylight.group | Group under which the keylight exporter shall be run.
|
| options/nixos/services.prometheus.exporters.collectd.group | Group under which the collectd exporter shall be run.
|
| options/nixos/services.certmgr.enable | Whether to enable certmgr.
|
| options/nixos/services.prometheus.exporters.mailman3.group | Group under which the mailman3 exporter shall be run.
|
| options/nixos/services.certmgr.validMin | The interval before a certificate expires to start attempting to renew it.
|
| options/nixos/services.httpd.virtualHosts.<name>.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.nginx.virtualHosts.<name>.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.bookstack.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.prometheus.exporters.node-cert.paths | List of paths to search for SSL certificates.
|
| options/nixos/services.grafana.settings.smtp.cert_file | File path to a cert file.
|
| options/nixos/services.prometheus.exporters.imap-mailstat.group | Group under which the imap-mailstat exporter shall be run.
|
| options/nixos/services.certmgr.specs | Certificate specs as described by:
https://github.com/cloudflare/certmgr#certificate-specs
These will be added to the Nix store, so they will be world readable.
|
| options/darwin/users.groups.<name>.name | The group's name
|
| options/nixos/services.bcg.mqtt.certfile | Certificate file for MQTT server access.
|
| options/nixos/services.changedetection-io.group | Group account under which changedetection-io runs.
|
| options/nixos/services.prometheus.exporters.borgmatic.group | Group under which the borgmatic exporter shall be run.
|
| options/nixos/services.prometheus.exporters.surfboard.group | Group under which the surfboard exporter shall be run.
|
| options/nixos/services.prometheus.exporters.rasdaemon.group | Group under which the rasdaemon exporter shall be run.
|
| options/nixos/services.prometheus.exporters.nextcloud.group | Group under which the nextcloud exporter shall be run.
|
| options/nixos/services.prometheus.exporters.smokeping.group | Group under which the smokeping exporter shall be run.
|
| options/nixos/services.prometheus.exporters.tailscale.group | Group under which the tailscale exporter shall be run.
|
| options/nixos/services.prometheus.exporters.pgbouncer.group | Group under which the pgbouncer exporter shall be run.
|
| options/nixos/services.prometheus.exporters.wireguard.group | Group under which the wireguard exporter shall be run.
|
| options/nixos/services.jirafeau.nginxConfig.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.kubernetes.kubeconfig.certFile | Default kubeconfig client certificate file used to connect to kube-apiserver.
|
| options/nixos/services.prometheus.exporters.junos-czerwonk.group | Group under which the junos-czerwonk exporter shall be run.
|
| options/nixos/services.certspotter.emailRecipients | A list of email addresses to send certificate updates to.
|
| options/nixos/services.prometheus.exporters.pve.server.certFile | Path to a SSL certificate file for the server
|
| options/nixos/services.drupal.sites.<name>.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.certmgr.package | The certmgr package to use.
|
| options/nixos/networking.supplicant.<name>.userControlled.group | Members of this group can control wpa_supplicant.
|
| options/nixos/services.kubernetes.proxy.kubeconfig.certFile | Kubernetes proxy client certificate file used to connect to kube-apiserver.
|
| options/nixos/services.prometheus.exporters.buildkite-agent.group | Group under which the buildkite-agent exporter shall be run.
|
| options/nixos/services.prometheus.exporters.storagebox.group | Group under which the storagebox exporter shall be run.
|
| options/nixos/services.prometheus.exporters.scaphandre.group | Group under which the scaphandre exporter shall be run.
|
| options/nixos/services.prometheus.exporters.exportarr-lidarr.group | Group under which the exportarr-lidarr exporter shall be run.
|
| options/nixos/services.prometheus.exporters.exportarr-sonarr.group | Group under which the exportarr-sonarr exporter shall be run.
|
| options/nixos/services.prometheus.exporters.exportarr-bazarr.group | Group under which the exportarr-bazarr exporter shall be run.
|
| options/nixos/services.prometheus.exporters.exportarr-radarr.group | Group under which the exportarr-radarr exporter shall be run.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert | Section for a certificate candidate to use for
authentication
|
| options/nixos/services.hologram-server.groupClassAttr | The objectclass attribute to search for groups when enableLdapRoles is true
|
| options/nixos/services.prometheus.exporters.node-cert.excludePaths | List of paths to exclute from searching for SSL certificates.
|
| options/home-manager/launchd.agents.<name>.config.GroupName | This optional key specifies the group to run the job as
|
| options/nixos/services.resilio.sharedFolders | Shared folder list
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert | Section for a certificate candidate to use for
authentication
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.slot | Optional slot number of the token that stores the certificate.
|
| options/nixos/services.prometheus.exporters.node-cert.listenAddress | Address to listen on.
|
| options/nixos/services.fedimintd.<name>.nginx.config.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.certmgr.metricsPort | The port for the Prometheus HTTP endpoint.
|
| options/nixos/services.prometheus.exporters.exportarr-readarr.group | Group under which the exportarr-readarr exporter shall be run.
|
| options/nixos/services.prometheus.exporters.node-cert.excludeGlobs | List files matching a pattern to include
|
| options/nixos/services.prometheus.exporters.node-cert.includeGlobs | List files matching a pattern to include
|
| options/nixos/services.prometheus.exporters.node-cert.openFirewall | Open port in firewall for incoming connections.
|
| options/nixos/services.prometheus.exporters.artifactory.group | Group under which the artifactory exporter shall be run.
|
| options/nixos/services.kubernetes.kubelet.kubeconfig.certFile | Kubelet client certificate file used to connect to kube-apiserver.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.slot | Optional slot number of the token that stores the certificate.
|
| options/nixos/services.mediawiki.httpd.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.module | Optional PKCS#11 module name.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.file | Absolute path to the certificate to load
|
| options/nixos/services.limesurvey.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups | Some email providers (Gmail) have a different directory hierarchy for
synchronized email messages
|
| options/nixos/services.firezone.server.provision.accounts.<name>.policies.<name>.group | The group which should be allowed access to the given resource.
|
| options/nixos/services.prometheus.exporters.exportarr-prowlarr.group | Group under which the exportarr-prowlarr exporter shall be run.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.module | Optional PKCS#11 module name.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.file | Absolute path to the certificate to load
|
| options/nixos/services.prometheus.exporters.node-cert.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.node-cert.openFirewall is true.
|
| options/nixos/hardware.sane.enable | Enable support for SANE scanners.
Users in the "scanner" group will gain access to the scanner, or the "lp" group if it's also a printer.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.handle | Hex-encoded CKA_ID or handle of the certificate on a token or TPM,
respectively
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.github-runners.<name>.user | User under which to run the service
|
| options/nixos/services.prometheus.exporters.modemmanager.group | Group under which the modemmanager exporter shall be run.
|
| options/darwin/users.groups.<name>.members | The group's members.
|
| options/nixos/services.limesurvey.nginx.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.limesurvey.httpd.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.certs | List of certificates to accept for authentication
|
| options/darwin/users.users.<name>.gid | The user's primary group.
|
| options/nixos/services.outline.user | User under which the service should run
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.handle | Hex-encoded CKA_ID or handle of the certificate on a token or TPM,
respectively
|
| options/nixos/services.certmgr.svcManager | This specifies the service manager to use for restarting or reloading services
|
| options/home-manager/targets.darwin.defaults."com.apple.dock".expose-group-apps | Whether to enable grouping of windows by application in Mission Control.
|
| options/nixos/security.agnos.settings.accounts.*.certificates | Certificates for agnos to issue or renew.
|
| options/nixos/services.certmgr.defaultRemote | The default CA host:port to use.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.certs | List of certificate candidates to use for
authentication
|
| options/nixos/services.kubernetes.scheduler.kubeconfig.certFile | Kubernetes scheduler client certificate file used to connect to kube-apiserver.
|
| options/nixos/users.extraGroups.<name>.members | The user names of the group members, added to the
/etc/group file.
|
| options/nixos/boot.initrd.systemd.groups | Groups to include in initrd.
|
| options/nixos/services.prometheus.exporters.node-cert.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.node-cert.openFirewall
is true
|
| options/nixos/services.misskey.reverseProxy.webserver.caddy.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/home-manager/programs.git-credential-keepassxc.groups | The KeePassXC groups used for storing and fetching of credentials
|
| options/nixos/security.sudo.execWheelOnly | Only allow members of the wheel group to execute sudo by
setting the executable's permissions accordingly
|
| options/nixos/security.isolate.cgRoot | Control group which subgroups are placed under
|
| options/nixos/services.etcd.peerCertFile | Cert file to use for peer to peer communication
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.groupPath | Group directory, relative to root.
|
| options/nixos/security.sudo-rs.execWheelOnly | Only allow members of the wheel group to execute sudo by
setting the executable's permissions accordingly
|
| options/home-manager/programs.mbsync.groups | Definition of groups.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.certmgr.renewInterval | How often to check certificate expirations and how often to update the cert_next_expires metric.
|
| options/nixos/services.certmgr.metricsAddress | The address for the Prometheus HTTP endpoint.
|
| options/darwin/launchd.agents.<name>.serviceConfig.GroupName | This optional key specifies the group to run the job as
|
| options/nixos/services.suricata.settings.vars.port-groups | The port group variables for suricata.
|
| options/nixos/services.galene.groupsDir | Web server directory.
|
| options/nixos/security.sudo.keepTerminfo | Whether to preserve the TERMINFO and TERMINFO_DIRS
environment variables, for root and the wheel group.
|
| options/darwin/security.sudo.keepTerminfo | Whether to preserve the TERMINFO and TERMINFO_DIRS
environment variables, for root and the admin group.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.GroupName | This optional key specifies the group to run the job as
|
| options/nixos/security.agnos.settings.accounts.*.certificates.*.domains | Domains the certificate represents
|
| options/darwin/launchd.daemons.<name>.serviceConfig.GroupName | This optional key specifies the group to run the job as
|
| options/nixos/services.davfs2.davGroup | The group of the running mount.davfs daemon
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels.<name>.name | The unique name for THIS channel in THIS group
|
| options/nixos/services.postfix.setgidGroup | How to call postfix setgid group (for postdrop)
|
| options/nixos/services.prometheus.remoteRead.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.kubernetes.controllerManager.kubeconfig.certFile | Kubernetes controller manager client certificate file used to connect to kube-apiserver.
|
| options/nixos/services.icingaweb2.groupBackends | groups.ini contents
|
| options/nixos/services.firezone.server.provision.accounts.<name>.groups | All groups to provision
|
| options/nixos/services.public-inbox.inboxes.<name>.newsgroup | NNTP group name for the inbox.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.name | The name of this group for this account
|
| options/nixos/services.prometheus.remoteWrite.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.quassel.dataDir | The directory holding configuration files, the SQlite database and the SSL Cert.
|
| options/nixos/services.kanidm.provision.groups.<name>.present | Whether to ensure that this group is present or absent.
|
| options/nixos/security.loginDefs.settings.GID_MAX | Range of group IDs used for the creation of regular groups by useradd, groupadd, or newusers.
|
| options/nixos/security.loginDefs.settings.GID_MIN | Range of group IDs used for the creation of regular groups by useradd, groupadd, or newusers.
|
| options/nixos/services.kanidm.provision.groups.<name>.members | List of kanidm entities (persons, groups, ...) which are part of this group.
|
| options/nixos/security.sudo.defaultOptions | Options used for the default rules, granting root and the
wheel group permission to run any command as any user.
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.groupNameAttribute | Attribute for a name of group.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacerts | List of CA certificates to accept for
authentication
|
| options/nixos/hardware.hackrf.enable | Enables hackrf udev rules and ensures 'plugdev' group exists
|
| options/nixos/services.prometheus.scrapeConfigs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/security.sudo-rs.defaultOptions | Options used for the default rules, granting root and the
wheel group permission to run any command as any user.
|
| options/nixos/services.ircdHybrid.certificate | IRCD server SSL certificate
|
| options/nixos/services.oauth2-proxy.tls.certificate | Path to certificate file.
|
| options/nixos/security.loginDefs.settings.SYS_GID_MAX | Range of group IDs used for the creation of system groups by useradd, groupadd, or newusers
|
| options/nixos/security.loginDefs.settings.SYS_GID_MIN | Range of group IDs used for the creation of system groups by useradd, groupadd, or newusers
|
| options/nixos/services.agate.certificatesDir | Root of the certificate directory.
|
| options/nixos/services.minio.certificatesDir | The directory where TLS certificates are stored.
|
| options/nixos/services.below.cgroupFilterOut | A regexp matching the full paths of cgroups whose data shouldn't be collected
|
| options/darwin/services.github-runners.<name>.user | User under which to run the service
|
| options/nixos/services.quassel.certificateFile | Path to the certificate used for SSL connections with clients.
|
| options/nixos/services.hardware.lcd.server.usbGroup | The group to use for settings permissions
|
| options/nixos/services.hitch.frontend | The port and interface of the listen endpoint in the
form [HOST]:PORT[+CERT].
|
| options/nixos/security.sudo.wheelNeedsPassword | Whether users of the wheel group must
provide a password to run commands as super user via sudo.
|
| options/nixos/security.doas.wheelNeedsPassword | Whether users of the wheel group must provide a password to
run commands as super user via doas.
|
| options/nixos/hardware.ckb-next.gid | Limit access to the ckb daemon to a particular group.
|
| options/nixos/services.ghostunnel.servers.<name>.keystore | Path to keystore (combined PEM with cert/key, or PKCS12 keystore)
|
| options/nixos/services.suricata.settings.vars.address-groups | The address group variables for suricata, if not defined the
default value of suricata (see example) will be used
|
| options/nixos/security.sudo-rs.wheelNeedsPassword | Whether users of the wheel group must
provide a password to run commands as super user via sudo.
|
| options/nixos/services.nsd.zones.<name>.zoneStats | When set to something distinct to null NSD is able to collect
statistics per zone
|
| options/nixos/services.onlyoffice.securityNonceFile | File holding nginx configuration that sets the nonce used to create secret links
|
| options/nixos/services.pgmanage.loginGroup | This tells pgmanage to only allow users in a certain PostgreSQL group to
login to pgmanage
|
| options/nixos/services.grafana.settings.server.cert_key | Path to the certificate key file (if protocol is set to https or h2).
|
| options/nixos/services.maddy.tls.certificates | A list of attribute sets containing paths to TLS certificates and
keys
|
| options/nixos/services.maddy.tls.certificates.*.keyPath | Path to the private key used for TLS.
|
| options/nixos/security.run0.wheelNeedsPassword | Whether users of the wheel group must
provide a password to run commands as super user via run0.
|
| options/nixos/services.dendrite.tlsKey | The path to the TLS key.
nix-shell -p dendrite --command "generate-keys --tls-cert server.crt --tls-key server.key"
|
| options/nixos/services.ghostunnel.servers.<name>.cacert | Path to CA bundle file (PEM/X509)
|
| options/nixos/services.slurm.extraCgroupConfig | Extra configuration for cgroup.conf
|
| options/nixos/services.oauth2-proxy.google.groups | Restrict logins to members of these Google groups.
|
| options/nixos/services.ananicy.extraCgroups | Cgroups to write in 'nixCgroups.cgroups'
|
| options/home-manager/accounts.email.certificatesFile | Path to default file containing certificate authorities that
should be used to validate the connection authenticity
|
| options/nixos/security.loginDefs.settings.TTYPERM | The terminal permissions: the login tty will be owned by the TTYGROUP group,
and the permissions will be set to TTYPERM
|
| options/nixos/services.namecoind.rpc.certificate | Certificate file for securing RPC connections.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.certificateFile | Specifies files from which the user certificate is read.
|
| options/nixos/services.jibri.ignoreCert | Whether to enable the flag "--ignore-certificate-errors" for the Chromium browser opened by Jibri
|
| options/nixos/services.samba-wsdd.workgroup | Set workgroup name (default WORKGROUP).
|
| options/nixos/services.grafana.settings.server.cert_file | Path to the certificate file (if protocol is set to https or h2).
|
| options/nixos/services.prosody.modules.groups | Shared roster support
|
| options/nixos/services.dendrite.tlsCert | The path to the TLS certificate.
nix-shell -p dendrite --command "generate-keys --tls-cert server.crt --tls-key server.key"
|
| options/nixos/services.bacula-sd.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/nixos/services.bacula-fd.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/nixos/security.pam.services.<name>.requireWheel | Whether to permit root access only to members of group wheel.
|
| options/nixos/security.please.wheelNeedsPassword | Whether users of the wheel group must provide a password to run
commands or edit files with please and
pleaseedit respectively.
|
| options/nixos/services.bacula-dir.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.groupFilter | LDAP filter for groups.
|
| options/nixos/services.infinoted.certificateFile | Server certificate to use for TLS
|
| options/nixos/users.extraGroups.<name>.gid | The group GID
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels | List of channels that should be grouped together into this group
|
| options/nixos/security.pam.services.<name>.enableAppArmor | Enable support for attaching AppArmor profiles at the
user/group level, e.g., as part of a role based access
control scheme.
|
| options/nixos/services.grafana.settings.database.client_cert_path | The path to the client cert
|
| options/nixos/programs.wireshark.enable | Whether to add Wireshark to the global environment and create a 'wireshark'
group
|
| options/nixos/services.movim.h2o.tls.identity.*.certificate-file | Path to certificate file
|
| options/nixos/security.googleOsLogin.enable | Whether to enable Google OS Login
|
| options/nixos/services.sabnzbd.settings.misc.https_cert | Path to the TLS certificate for the web UI
|
| options/nixos/services.rkvm.server.settings.certificate | TLS certificate path.
This should be generated with rkvm-certificate-gen.
|
| options/nixos/services.rkvm.client.settings.certificate | TLS ceritficate path.
This should be generated with rkvm-certificate-gen.
|
| options/nixos/security.loginDefs.settings.TTYGROUP | The terminal permissions: the login tty will be owned by the TTYGROUP group,
and the permissions will be set to TTYPERM
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.groupObjectClass | A class that groups will have.
|
| options/nixos/services.github-runners.<name>.runnerGroup | Name of the runner group to add this runner to (defaults to the default runner group)
|
| options/darwin/services.github-runners.<name>.runnerGroup | Name of the runner group to add this runner to (defaults to the default runner group)
|
| options/nixos/services.infinoted.certificateChain | Chain of CA-certificates to which our certificateFile is relative
|
| options/nixos/users.extraGroups.<name>.name | The name of the group
|
| options/nixos/services.umurmur.settings.certificate | Path to your SSL certificate
|
| options/nixos/users.mutableUsers | If set to true, you are free to add new users and groups to the system
with the ordinary useradd and
groupadd commands
|
| options/nixos/services.warpgate.settings.http.sni_certificates.*.certificate | Path to certificate.
|
| options/nixos/programs.wireshark.usbmon.enable | Whether to allow users in the 'wireshark' group to capture USB traffic
|
| options/nixos/services.firezone.server.provision.accounts.<name>.groups.<name>.name | The name of this group
|
| options/nixos/programs.wireshark.dumpcap.enable | Whether to allow users in the 'wireshark' group to capture network traffic
|
| options/darwin/users.groups.<name>.description | The group's description.
|
| options/nixos/services.h2o.hosts.<name>.tls.identity.*.certificate-file | Path to certificate file
|
| options/nixos/services.kanidm.provision.groups | Provisioning of kanidm groups
|
| options/nixos/security.polkit.adminIdentities | Specifies which users are considered “administrators”, for those
actions that require the user to authenticate as an
administrator (i.e. have an auth_admin
value)
|
| options/nixos/services.grafana.provision.alerting.rules.settings.groups.*.name | Name of the rule group
|
| options/nixos/services.mqtt2influxdb.mqtt.certfile | Certificate file for MQTT
|
| options/nixos/services.warpgate.settings.http.certificate | Path to HTTPS listener certificate.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.groups | Authorization group memberships to require
|
| options/nixos/services.warpgate.settings.mysql.certificate | Path to MySQL listener certificate.
|
| options/nixos/security.agnos.settings.accounts.*.certificates.*.key_output_file | Output path for the certificate private key
|
| options/nixos/services.dolibarr.h2o.tls.identity.*.certificate-file | Path to certificate file
|
| options/home-manager/programs.irssi.networks.<name>.server.ssl.certificateFile | Path to a file containing the certificate used for
client authentication to the server.
|
| options/nixos/services.grafana.provision.alerting.rules.settings.groups.*.folder | Name of the folder the rule group will be stored in
|
| options/nixos/services.kanidm.provision.groups.<name>.overwriteMembers | Whether the member list should be overwritten each time (true) or appended
(false)
|
| options/nixos/users.users.<name>.subGidRanges.*.count | Count of subordinate group ids
|
| options/nixos/services.prometheus.exporters.dovecot.socketPath | Path under which the stats socket is placed
|
| options/nixos/services.firezone.server.provision.accounts.<name>.groups.<name>.members | The members of this group
|
| options/nixos/users.users.<name>.subGidRanges | Subordinate group ids that user is allowed to use
|
| options/nixos/users.users.<name>.autoSubUidGidRange | Automatically allocate subordinate user and group ids for this user
|
| options/nixos/services.taskserver.organisations.<name>.groups | A list of group names that belong to the organization.
|
| options/nixos/services.grafana.provision.alerting.rules.settings.groups.*.interval | Interval that the rule group should be evaluated at
|
| options/nixos/systemd.enableCgroupAccounting | Whether to enable cgroup accounting; see cgroups(7).
|
| options/nixos/services.trafficserver.sslMulticert | Configure SSL server certificates to terminate the SSL sessions
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.keystore | Path to keystore (combined PEM with cert/key, or PKCS12 keystore)
|
| options/nixos/virtualisation.podman.networkSocket.tls.cacert | Path to CA certificate to use for client authentication.
|
| options/nixos/services.diod.userdb | This option disables password/group lookups
|
| options/nixos/services.foundationdb.tls.certificate | Path to the TLS certificate file
|
| options/nixos/programs.light.enable | Whether to install Light backlight control command
and udev rules granting access to members of the "video" group.
|
| options/home-manager/accounts.email.accounts.<name>.smtp.tls.certificatesFile | Path to file containing certificate authorities that should
be used to validate the connection authenticity
|
| options/home-manager/accounts.email.accounts.<name>.imap.tls.certificatesFile | Path to file containing certificate authorities that should
be used to validate the connection authenticity
|
| options/nixos/services.bacula-sd.director.<name>.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/nixos/services.bacula-fd.director.<name>.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/nixos/services.warpgate.settings.postgres.certificate | Path to PostgreSQL listener certificate.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.groups.<name>.forceMembers | Ensure that only the given members are part of this group at every server start.
|
| options/nixos/services.jack.jackd.enable | Whether to enable JACK Audio Connection Kit
|
| options/nixos/services.unbound.localControlSocketPath | When not set to null this option defines the path
at which the unbound remote control socket should be created at
|
| options/nixos/hardware.i2c.enable | Whether to enable i2c devices support
|
| options/nixos/users.users.<name>.subGidRanges.*.startGid | Start of the range of subordinate group ids that user is
allowed to use.
|
| options/nixos/services.grafana.settings.database.ca_cert_path | The path to the CA certificate to use.
|
| options/nixos/hardware.brillo.enable | Whether to enable brillo in userspace
|
| options/nixos/services.kubernetes.pki.genCfsslAPICerts | Whether to automatically generate cfssl API webserver TLS cert and key,
if they don't exist.
|
| options/nixos/services.kubernetes.pki.cfsslAPIExtraSANs | Extra x509 Subject Alternative Names to be added to the cfssl API webserver TLS cert.
|
| options/nixos/security.pam.services.<name>.allowNullPassword | Whether to allow logging into accounts that have no password
set (i.e., have an empty password field in
/etc/passwd or
/etc/group)
|
| options/nixos/users.extraUsers.<name>.subGidRanges.*.count | Count of subordinate group ids
|
| options/nixos/hardware.bladeRF.enable | Enables udev rules for BladeRF devices
|
| options/nixos/services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/users.extraUsers.<name>.subGidRanges | Subordinate group ids that user is allowed to use
|
| options/nixos/services.headscale.settings.tls_cert_path | Path to already created certificate.
|
| options/nixos/services.kmonad.keyboards.<name>.extraGroups | Extra permission groups to attach to the KMonad instance for
this keyboard
|
| options/nixos/users.extraUsers.<name>.autoSubUidGidRange | Automatically allocate subordinate user and group ids for this user
|
| options/nixos/services.dependency-track.oidc.teams.claim | Defines the name of the claim that contains group memberships or role assignments in the provider's userinfo endpoint
|
| options/nixos/services.userdbd.enable | Whether to enable the systemd JSON user/group record lookup service
.
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.cacert | Path to CA bundle file (PEM/X509)
|
| options/nixos/services.saned.enable | Enable saned network daemon for remote connection to scanners.
saned would be run from scanner user; to allow
access to hardware that doesn't have scanner group
you should add needed groups to this user.
|
| options/nixos/programs.tcpdump.enable | Whether to configure a setcap wrapper for tcpdump
|
| options/nixos/services.kanidm.provision.persons.<name>.groups | List of groups this person should belong to.
|
| options/nixos/services.cloudflared.certificateFile | Account certificate file, necessary to create, delete and manage tunnels
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.ghostunnel.servers.<name>.allowAll | If true, allow all clients, do not check client cert subject.
|
| options/nixos/services.dnsdist.dnscrypt.providerName | The name that will be given to this DNSCrypt resolver.
The provider name must start with 2.dnscrypt-cert..
|
| options/nixos/hardware.glasgow.enable | Enables Glasgow udev rules and ensures 'plugdev' group exists
|
| options/nixos/services.suricata.settings.vars.address-groups.HOME_NET | HOME_NET variable.
|
| options/nixos/users.extraUsers.<name>.subGidRanges.*.startGid | Start of the range of subordinate group ids that user is
allowed to use.
|
| options/nixos/programs.minipro.enable | Whether to enable minipro and its udev rules
|
| options/nixos/services.unbound.checkconf | Whether to check the resulting config file with unbound checkconf for syntax errors
|
| options/nixos/programs.sedutil.enable | Whether to enable sedutil, to manage self encrypting drives that conform to the Trusted Computing Group OPAL 2.0 SSC specification.
|
| options/nixos/services.dovecot2.mailGroup | Default group to store mail for virtual users.
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.nginx.upstreams | Defines a group of servers to use as proxy target.
|
| options/nixos/services.pdfding.enable | Whether to enable PdfDing service
|
| options/nixos/hardware.rtl-sdr.enable | Enables rtl-sdr udev rules, ensures 'plugdev' group exists, and blacklists DVB kernel modules
|
| options/nixos/services.couchdb.configFile | Configuration file for persisting runtime changes
|
| options/nixos/systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.user | The user of the file
|
| options/nixos/services.smokeping.user | User that runs smokeping and (optionally) thttpd
|
| options/nixos/users.users.<name>.isNormalUser | Indicates whether this is an account for a “real” user
|
| options/nixos/users.allowNoPasswordLogin | Disable checking that at least the root user or a user in the wheel group can log in using
a password or an SSH key
|
| options/nixos/services.prometheus.exporters.unbound.unbound.certificate | Path to the Unbound control socket certificate
|
| options/nixos/services.timekpr.adminUsers | All listed users will become part of the timekpr group so they can manage timekpr settings without requiring sudo.
|
| options/nixos/services.grafana.settings.server.socket_gid | GID where the socket should be set when protocol=socket
|
| options/nixos/services.portunus.enable | Whether to enable Portunus, a self-contained user/group management and authentication service for LDAP.
|
| options/nixos/services.suricata.settings.vars.address-groups.DNP3_SERVER | DNP3_SERVER variable.
|
| options/nixos/services.suricata.settings.vars.address-groups.DNP3_CLIENT | DNP3_CLIENT variable.
|
| options/nixos/services.nomad.enableDocker | Enable Docker support
|
| options/nixos/services.kubernetes.apiserver.extraSANs | Extra x509 Subject Alternative Names to be added to the kubernetes apiserver tls cert.
|
| options/nixos/services.mailman.ldap.superUserGroup | Group where a user must be a member of to gain superuser rights.
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.cacert | The certificates may use a relative path from the swanctl
x509ca directory or an absolute path
|
| options/nixos/services.suricata.settings.vars.address-groups.ENIP_CLIENT | ENIP_CLIENT variable.
|
| options/nixos/services.suricata.settings.vars.address-groups.ENIP_SERVER | ENIP_SERVER variable.
|
| options/nixos/virtualisation.incus.enable | Whether to enable incusd, a daemon that manages containers and virtual machines
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/programs.flashrom.enable | Installs flashrom and configures udev rules for programmers
used by flashrom
|
| options/nixos/programs.gphoto2.enable | Whether to configure system to use gphoto2
|
| options/nixos/hardware.openrazer.users | Usernames to be added to the "openrazer" group, so that they
can start and interact with the OpenRazer userspace daemon.
|
| options/nixos/services.nextcloud-spreed-signaling.settings.https.certificate | Path to the certificate used for the HTTPS listener
|
| options/nixos/services.suricata.settings.vars.address-groups.DC_SERVERS | DC_SERVERS variable.
|
| options/nixos/services.cloudflared.tunnels.<name>.certificateFile | Account certificate file, necessary to create, delete and manage tunnels
|
| options/nixos/services.suricata.settings.vars.address-groups.AIM_SERVERS | AIM_SERVERS variable.
|
| options/nixos/services.suricata.settings.vars.address-groups.DNS_SERVERS | DNS_SERVERS variable.
|
| options/nixos/services.suricata.settings.vars.address-groups.SQL_SERVERS | SQL_SERVERS variable.
|
| options/nixos/services.neo4j.directories.certificates | Directory for storing certificates to be used by Neo4j for
TLS connections
|
| options/nixos/services.warpgate.settings.http.sni_certificates | Certificates for additional domains.
|
| options/nixos/services.suricata.settings.vars.address-groups.SMTP_SERVERS | SMTP_SERVERS variable.
|
| options/nixos/services.suricata.settings.vars.address-groups.HTTP_SERVERS | HTTP_SERVERS variable.
|
| options/nixos/services.hologram-server.roleAttr | Which LDAP group attribute to search for authorized role ARNs
|
| options/nixos/programs.mouse-actions.enable | Whether to install and set up mouse-actions and it's udev rules
|
| options/nixos/services.aria2.enable | Whether or not to enable the headless Aria2 daemon service
|
| options/nixos/networking.openconnect.interfaces.<name>.certificate | Certificate to authenticate with.
|
| options/nixos/boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.user | The user of the file
|
| options/nixos/services.dokuwiki.sites.<name>.acl.*.actor | User or group to restrict
|
| options/nixos/security.agnos.settings.accounts.*.certificates.*.fullchain_output_file | Output path for the full chain including the acquired certificate
|
| options/nixos/services.suricata.settings.vars.address-groups.MODBUS_CLIENT | MODBUS_CLIENT variable
|
| options/nixos/services.suricata.settings.vars.address-groups.MODBUS_SERVER | MODBUS_SERVER variable.
|
| options/nixos/services.warpgate.settings.http.sni_certificates.*.key | Path to private key.
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.quickwit.dataDir | Data directory for Quickwit
|
| options/nixos/services.temporal.dataDir | Data directory for Temporal
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert | Section for a CA certificate to accept for authentication
|
| options/nixos/services.parsedmarc.settings.elasticsearch.cert_path | The path to a TLS certificate bundle used to verify
the server's certificate.
|
| options/nixos/services.traefik.supplementaryGroups | Additional groups under which Traefik runs
|
| options/nixos/nix.settings.trusted-users | A list of names of users that have additional rights when
connecting to the Nix daemon, such as the ability to specify
additional binary caches, or to import unsigned NARs
|
| options/darwin/nix.settings.trusted-users | A list of names of users that have additional rights when
connecting to the Nix daemon, such as the ability to specify
additional binary caches, or to import unsigned NARs
|
| options/nixos/services.suricata.settings.vars.address-groups.EXTERNAL_NET | EXTERNAL_NET variable.
|
| options/nixos/users.extraUsers.<name>.isNormalUser | Indicates whether this is an account for a “real” user
|
| options/nixos/services.dependency-track.settings."alpine.oidc.teams.claim" | Defines the name of the claim that contains group memberships or role assignments in the provider's userinfo endpoint
|
| options/nixos/hardware.acpilight.enable | Enable acpilight
|
| options/nixos/services.privoxy.inspectHttps | Whether to configure Privoxy to inspect HTTPS requests, meaning all
encrypted traffic will be filtered as well
|
| options/nixos/programs.corectrl.enable | Whether to enable CoreCtrl, a tool to overclock amd graphics cards and processors
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.slot | Optional slot number of the token that stores the certificate.
|
| options/nixos/services.dependency-track.oidc.teamSynchronization | This option will ensure that team memberships for OpenID Connect users are dynamic and
synchronized with membership of OpenID Connect groups or assigned roles
|
| options/nixos/services.suricata.settings.vars.address-groups.TELNET_SERVERS | TELNET_SERVERS variable.
|
| options/nixos/hardware.sheep_net.enable | Enables sheep_net udev rules, ensures 'sheep_net' group exists, and adds
sheep-net to boot.kernelModules and boot.extraModulePackages
|
| options/nixos/networking.networkmanager.enable | Whether to use NetworkManager to obtain an IP address and other
configuration for all network interfaces that are not manually
configured
|
| options/nixos/virtualisation.podman.dockerSocket.enable | Make the Podman socket available in place of the Docker socket, so
Docker tools can find the Podman socket
|
| options/nixos/programs.mosh.withUtempter | Whether to enable libutempter for mosh
|
| options/nixos/programs.tmux.withUtempter | Whether to enable libutempter for tmux
|
| options/nixos/programs.feedbackd.enable | Whether to enable the feedbackd D-BUS service and udev rules
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.file | Absolute path to the certificate to load
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.module | Optional PKCS#11 module name.
|
| options/nixos/services.fastnetmon-advanced.hostgroups | Hostgroups to declaratively load into FastNetMon Advanced
|
| options/nixos/networking.wireless.networks.<name>.priority | By default, all networks will get same priority group (0)
|
| options/nixos/hardware.kryoflux.enable | Enables kryoflux udev rules, ensures 'floppy' group exists
|
| options/nixos/services.grafana.provision.alerting.rules.settings.groups | List of rule groups to import or update.
|
| options/nixos/services.netbird.clients.<name>.bin.suffix | A system group name for this client instance.
|
| options/nixos/services.netbird.tunnels.<name>.bin.suffix | A system group name for this client instance.
|
| options/nixos/services.mx-puppet-discord.enable | Whether to enable mx-puppet-discord is a discord puppeting bridge for matrix
|
| options/nixos/services.terraria.enable | If enabled, starts a Terraria server
|
| options/nixos/services.dovecot2.createMailUser | Whether to enable automatically creating the user
given in services.dovecot.user and the group
given in services.dovecot.group.
|
| options/nixos/services.grafana.settings.database.server_cert_name | The common name field of the certificate used by the mysql or postgres server
|
| options/nixos/services.kubernetes.apiserver.kubeletClientCaFile | Path to a cert file for connecting to kubelet.
|
| options/nixos/services.hardware.lcd.server.usbPermissions | Set group-write permissions on a USB device
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.send_cert | Send certificate payloads when using certificate authentication.
- With the default of
ifasked the daemon sends
certificate payloads only if certificate requests have been received.
never disables sending of certificate payloads
altogether,
always causes certificate payloads to be sent
unconditionally whenever certificate authentication is used
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.handle | Hex-encoded CKA_ID or handle of the certificate on a token or TPM,
respectively
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.groups | Whether to sync ldap groups into BitWarden.
|
| options/home-manager/programs.hexchat.channels.<name>.loginMethod | The login method
|
| options/nixos/programs.idescriptor.users | Users to be added to the idevice group.
|
| options/nixos/hardware.keyboard.uhk.enable | Whether to enable non-root access to the firmware of UHK keyboards
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/programs.soundmodem.enable | Whether to add Soundmodem to the global environment and configure a
wrapper for 'soundmodemconfig' for users in the 'soundmodem' group.
|
| options/nixos/services.netbird.tunnels.<name>.name | Primary name for use (as a suffix) in:
- systemd service name,
- hardened user name and group,
- systemd
*Directory= names,
- desktop application identification,
|
| options/nixos/services.netbird.clients.<name>.name | Primary name for use (as a suffix) in:
- systemd service name,
- hardened user name and group,
- systemd
*Directory= names,
- desktop application identification,
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels.<name>.extraConfig | Extra configuration lines to add to THIS channel's
configuration.
|
| options/nixos/services.beszel.agent.smartmon.enable | Include services.beszel.agent.smartmon.package in the Beszel agent path for disk monitoring and add the agent to the disk group.
|
| options/nixos/programs.benchexec.users | Users that intend to use BenchExec
|
| options/nixos/services.dependency-track.settings."alpine.oidc.team.synchronization" | This option will ensure that team memberships for OpenID Connect users are dynamic and
synchronized with membership of OpenID Connect groups or assigned roles
|
| options/nixos/hardware.libjaylink.enable | Whether to enable udev rules for devices supported by libjaylink
|
| options/nixos/services.sourcehut.settings."hg.sr.ht".changegroup-script | A changegroup script which is installed in every mercurial repo
|
| options/nixos/services.borgbackup.jobs.<name>.user | The user borg is run as
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.aria2.serviceUMask | The file mode creation mask for Aria2 service
|
| options/nixos/services.hologram-server.enableLdapRoles | Whether to assign user roles based on the user's LDAP group memberships
|
| options/nixos/services.opensearch.dataDir | Data directory for OpenSearch
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert_policy | List of certificate policy OIDs the peer's certificate
must have
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels.<name>.patterns | Instead of synchronizing just the mailboxes that
match the farPattern, use it as a prefix which is
not matched against the patterns, and is not affected by mailbox list
overrides.
|
| options/nixos/services.rke2.cisHardening | Enable CIS Hardening for RKE2
|
| options/nixos/services.smartdns.settings | A set that will be generated into configuration file, see the SmartDNS README for details of configuration parameters
|
| options/nixos/services.prometheus.remoteRead.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.borgbackup.repos.<name>.user | The user borg serve is run as
|
| options/nixos/services.pipewire.systemWide | If true, a system-wide PipeWire service and socket is enabled
allowing all users in the "pipewire" group to use it simultaneously
|
| options/nixos/services.displayManager.lemurs.enable | Whether to enable lemurs, a customizable TUI display/login manager.
For Wayland compositors, your user must be in the "seat" group.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels.<name>.farPattern | IMAP4 patterns for which mailboxes on the remote mail server to sync
|
| options/nixos/services.prometheus.remoteWrite.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowAll | If true, allow all clients, do not check client cert subject.
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels.<name>.nearPattern | Name for where mail coming from the remote (far) mail server will end up
locally
|
| options/nixos/services.firezone.gui-client.allowedUsers | All listed users will become part of the firezone-client group so
they can control the tunnel service
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.send_certreq | Send certificate request payloads to offer trusted root CA certificates to
the peer
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.cert_uri_base | Defines the base URI for the Hash and URL feature supported by
IKEv2
|
| options/nixos/virtualisation.virtualbox.host.enableHardening | Enable hardened VirtualBox, which ensures that only the binaries in the
system path get access to the devices exposed by the kernel modules
instead of all users in the vboxusers group.
Disabling this can put your system's security at risk, as local users
in the vboxusers group can tamper with the VirtualBox device files.
|
| options/nixos/services.prometheus.scrapeConfigs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.nebula-lighthouse-service.user | The user and group to run nebula-lighthouse-service as.
|
| options/nixos/services.authelia.instances.<name>.name | Name is used as a suffix for the service name, user, and group
|
| options/home-manager/launchd.agents.<name>.config.AbandonProcessGroup | When a job dies, launchd kills any remaining processes with the same process group ID as the job
|
| options/nixos/services.oauth2-proxy.nginx.virtualHosts.<name>.allowed_groups | List of groups to allow access to this vhost, or null to allow all.
|
| options/nixos/services.multipath.devices.*.failback | Tell multipathd how to manage path group failback
|
| options/nixos/services.glusterfs.killMode | The systemd KillMode to use for glusterd.
glusterd spawns other daemons like gsyncd
|
| options/nixos/services.nominatim.database.superUser | Postgresql database superuser used to create Nominatim database and
import data
|
| options/nixos/programs.firefox.policies | Group policies to install
|
| options/nixos/services.dnsdist.dnscrypt.providerKey | The filepath to the provider secret key
|
| options/nixos/services.kubo.settings.Addresses.API | Multiaddr or array of multiaddrs describing the address to serve the local HTTP API on
|
| options/nixos/services.roundcube.database.username | Username for the postgresql connection
|
| options/nixos/services.matrix-synapse.settings.tls_certificate_path | PEM encoded X509 certificate for TLS
|
| options/nixos/programs.thunderbird.policies | Group policies to install
|
| options/nixos/services.lifecycled.cloudwatchGroup | Write logs to a specific Cloudwatch Logs group.
|
| options/nixos/services.openssh.authorizedKeysCommand | Specifies a program to be used to look up the user's public
keys
|
| options/nixos/services.pulseaudio.systemWide | If false, a PulseAudio server is launched automatically for
each user that tries to use the sound system
|
| options/nixos/services.varnish.listen.*.address | If given an IP address, it can be a host name ("localhost"), an IPv4 dotted-quad
("127.0.0.1") or an IPv6 address enclosed in square brackets ("[::1]").
(VCL4.1 and higher) If given an absolute Path ("/path/to/listen.sock") or "@"
followed by the name of an abstract socket ("@myvarnishd") accept connections
on a Unix domain socket
|
| options/darwin/launchd.agents.<name>.serviceConfig.AbandonProcessGroup | When a job dies, launchd kills any remaining processes with the same process group ID as the job
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.AbandonProcessGroup | When a job dies, launchd kills any remaining processes with the same process group ID as the job
|
| options/nixos/services.multipath.devices.*.rr_min_io | Number of I/O requests to route to a path before switching to the next in the
same path group
|
| options/nixos/services.aria2.downloadDirPermission | The permission for settings.dir
|
| options/darwin/launchd.daemons.<name>.serviceConfig.AbandonProcessGroup | When a job dies, launchd kills any remaining processes with the same process group ID as the job
|
| options/nixos/services.transmission.enable | Whether to enable the headless Transmission BitTorrent daemon
|
| options/nixos/services.journald.upload.settings.Upload.ServerKeyFile | SSL key in PEM format
|
| options/nixos/virtualisation.docker.enable | This option enables docker, a daemon that manages
linux containers
|
| options/home-manager/services.xsuspender.rules.<name>.matchWmClassGroupContains | Match windows where wm class group contains string.
|
| options/nixos/virtualisation.lxd.enable | This option enables lxd, a daemon that manages
containers
|
| options/nixos/services.anuko-time-tracker.settings.defaultLanguage | Defines Anuko Time Tracker default language
|
| options/home-manager/services.xsuspender.defaults.matchWmClassGroupContains | Match windows where wm class group contains string.
|
| options/nixos/virtualisation.kvmgt.enable | Whether to enable KVMGT (iGVT-g) VGPU support
|
| options/nixos/services.postfixadmin.database.username | Username for the postgresql connection
|
| options/nixos/services.matrix-continuwuity.settings.global.unix_socket_path | Listen on a UNIX socket at the specified path
|
| options/nixos/networking.wireless.userControlled | Allow users of the wpa_supplicant group to control wpa_supplicant
through wpa_gui or wpa_cli
|
| options/home-manager/launchd.agents.<name>.config.Sockets.<name>.MulticastGroup | This optional key can be used to request that the datagram socket join a multicast group
|
| options/nixos/virtualisation.libvirtd.enable | This option enables libvirtd, a daemon that manages
virtual machines
|
| options/nixos/services.firezone.server.provision.accounts.<name>.relayGroups | All relay groups to provision
|
| options/nixos/services.firezone.server.provision.accounts.<name>.relayGroups.<name>.name | The name of this relay group
|
| options/nixos/services.archisteamfarm.ipcPasswordFile | Path to a file containing the password
|
| options/nixos/services.multipath.devices.*.rr_min_io_rq | Number of I/O requests to route to a path before switching to the next in the
same path group
|
| options/nixos/services.netbird.clients | Attribute set of NetBird client daemons, by default each one will:
- be manageable using dedicated tooling:
netbird-<name> script,
NetBird - netbird-<name> graphical interface when appropriate (see ui.enable),
- run as a
netbird-<name>.service,
- listen for incoming remote connections on the port
51820 (openFirewall by default),
- manage the
netbird-<name> wireguard interface,
- use the /var/lib/netbird-/config.json configuration file,
- override /var/lib/netbird-/config.json with values from /etc/netbird-/config.d/*.json,
- (
hardened) be locally manageable by netbird-<name> system group,
With following caveats:
- multiple daemons will interfere with each other's DNS resolution of
netbird.cloud, but
should remain fully operational otherwise
|
| options/nixos/virtualisation.virtualbox.host.enable | Whether to enable VirtualBox.
In order to pass USB devices from the host to the guests, the user
needs to be in the vboxusers group.
|
| options/nixos/services.netbird.tunnels.<name>.hardened | Hardened service:
- runs as a dedicated user with minimal set of permissions (see caveats),
- restricts daemon configuration socket access to dedicated user group
(you can grant access to it with
users.users."<user>".extraGroups = [ netbird-‹name› ]),
Even though the local system resources access is restricted:
CAP_NET_RAW, CAP_NET_ADMIN and CAP_BPF still give unlimited network manipulation possibilites,
- older kernels don't have
CAP_BPF and use CAP_SYS_ADMIN instead,
Known security features that are not (yet) integrated into the module:
- 2024-02-14:
rosenpass is an experimental feature configurable solely
through --enable-rosenpass flag on the netbird up command,
see the docs
|
| options/nixos/services.netbird.clients.<name>.hardened | Hardened service:
- runs as a dedicated user with minimal set of permissions (see caveats),
- restricts daemon configuration socket access to dedicated user group
(you can grant access to it with
users.users."<user>".extraGroups = [ netbird-‹name› ]),
Even though the local system resources access is restricted:
CAP_NET_RAW, CAP_NET_ADMIN and CAP_BPF still give unlimited network manipulation possibilites,
- older kernels don't have
CAP_BPF and use CAP_SYS_ADMIN instead,
Known security features that are not (yet) integrated into the module:
- 2024-02-14:
rosenpass is an experimental feature configurable solely
through --enable-rosenpass flag on the netbird up command,
see the docs
|
| options/nixos/services.firezone.server.provision.accounts.<name>.gatewayGroups | All gateway groups (sites) to provision
|
| options/nixos/services.firezone.server.provision.accounts.<name>.gatewayGroups.<name>.name | The name of this gateway group
|
| options/nixos/services.prometheus.scrapeConfigs.*.triton_sd_configs.*.groups | A list of groups for which targets are retrieved, only supported when targeting the container role
|
| options/darwin/launchd.agents.<name>.serviceConfig.Sockets.<name>.MulticastGroup | This optional key can be used to request that the datagram socket join a multicast group
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.MulticastGroup | This optional key can be used to request that the datagram socket join a multicast group
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.removeDisabled | Remove users from bitwarden groups if no longer in the ldap group.
|
| options/nixos/services.keepalived.vrrpInstances.<name>.unicastPeers | Do not send VRRP adverts over VRRP multicast group
|
| options/nixos/services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.archisteamfarm.bots.<name>.passwordFile | Path to a file containing the password
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.MulticastGroup | This optional key can be used to request that the datagram socket join a multicast group
|
| options/nixos/services.multipath.devices.*.path_grouping_policy | The default path grouping policy to apply to unspecified multipaths
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.memberAttribute | Attribute that lists members in a LDAP group.
|
| options/nixos/services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.librenms.distributedPoller.distributedBilling | Enable distributed billing on this poller
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.static_configs.*.targets | The targets specified by the target group.
|
| options/nixos/services.kanidm.unix.settings.kanidm.pam_allowed_login_groups | Kanidm groups that are allowed to login using PAM.
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.kanidm.unixSettings.pam_allowed_login_groups | Kanidm groups that are allowed to login using PAM.
|
| options/nixos/services.matrix-tuwunel.settings.global.unix_socket_path | Listen on a UNIX socket at the specified path
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.transmission.downloadDirPermissions | If not null, is used as the permissions
set by system.activationScripts.transmission-daemon
on the directories services.transmission.settings.download-dir,
services.transmission.settings.incomplete-dir.
and services.transmission.settings.watch-dir
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.separator | The string by which Uyuni group names are joined into the groups label
Defaults to , in prometheus
when set to null.
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rekey_time | Time to schedule CHILD_SA rekeying
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rekey_bytes | Number of bytes processed before initiating CHILD_SA rekeying
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rekey_packets | Number of packets processed before initiating CHILD_SA rekeying
|
| packages/nixpkgs/cmctl | Command line utility to interact with a cert-manager instalation on Kubernetes |
| packages/nixpkgs/wad | Tool for detecting technologies used by web applications |
| packages/nixpkgs/ugm | Terminal based UNIX user and group browser |
| packages/nixpkgs/lie | Computer algebra package for Lie group computations |
| packages/nixpkgs/su-exec | Switch user and group id and exec |
| packages/nixpkgs/hfinger | Fingerprinting tool for HTTP requests |
| packages/nixpkgs/fatrop | Nonlinear optimal control problem solver that aims to be fast, support a broad class of optimal control problems and achieve a high numerical robustness |
| packages/nixpkgs/lnch | Launches a process and moves it out of the process group |
| packages/nixpkgs/lwgrp | Data structures and operations to group MPI processes as an ordered set |
| packages/nixpkgs/element-call | Group calls powered by Matrix |
| packages/nixpkgs/ursadb | Trigram database written in C++, suited for malware indexing |
| packages/nixpkgs/csa | Group of LADSPA Audio plugins for FM broadcast and more |
| packages/nixpkgs/sca2d | Experimental static code analyser for OpenSCAD |
| packages/nixpkgs/sdbus-cpp | High-level C++ D-Bus library designed to provide easy-to-use yet powerful API |
| packages/nixpkgs/ad-ldap-enum | LDAP based Active Directory user and group enumeration tool |
| packages/nixpkgs/libmsym | Molecular point group symmetry lib |
| packages/nixpkgs/fractal | Matrix group messaging app |
| packages/nixpkgs/sdbus-cpp_2 | High-level C++ D-Bus library designed to provide easy-to-use yet powerful API |
| packages/nixpkgs/regrippy | Modern Python-3-based alternative to RegRipper |
| packages/nixpkgs/portunus | Self-contained user/group management and authentication service |
| packages/nixpkgs/tg-archive | Tool for exporting Telegram group chats into static websites like mailing list archives |
| packages/nixpkgs/libipfix | C library that implements the IPFIX protocol defined by the IP Flow Information Export working group of the IETF |
| packages/nixpkgs/corosync | Group Communication System with features for implementing high availability within applications |
| packages/nixpkgs/lpac | C-based eUICC LPA |
| packages/nixpkgs/seafile-server | File syncing and sharing software with file encryption and group sharing, emphasis on reliability and high performance |
| packages/nixpkgs/libjpeg-tools | A complete implementation of 10918-1 (JPEG) coming from jpeg.org (the ISO group) with extensions for HDR, lossless and alpha channel coding standardized as ISO/IEC 18477 (JPEG XT) |
| packages/nixpkgs/pari-galdata | PARI database needed to compute Galois group in degrees 8 through 11 |
| packages/nixpkgs/lklug-sinhala | Unicode Sinhala font by Lanka Linux User Group |
| packages/nixpkgs/nss_wrapper | Wrapper for the user, group and hosts NSS API |
| packages/nixpkgs/hpx | C++ standard library for concurrency and parallelism |
| packages/nixpkgs/uid_wrapper | Wrapper for the user, group and hosts NSS API |
| packages/nixpkgs/resolv_wrapper | Wrapper for the user, group and hosts NSS API |
| packages/nixpkgs/coqPackages.wasmcert | Wasm mechanisation in Coq/Rocq |
| packages/nixpkgs/ghidra-extensions.kaiju | Java implementation of some features of the CERT Pharos Binary Analysis Framework for Ghidra |
| packages/nixpkgs/python314Packages.malduck | Helper for malware analysis |
| packages/nixpkgs/python313Packages.malduck | Helper for malware analysis |
| packages/nixpkgs/python313Packages.mwdblib | Python client library for the mwdb service |
| packages/nixpkgs/python314Packages.mwdblib | Python client library for the mwdb service |
| packages/nixpkgs/magnetophonDSP.CompBus | Group of compressors mixed into a bus, sidechained from that mix bus |
| packages/nixpkgs/python312Packages.malduck | Helper for malware analysis |
| packages/nixpkgs/python312Packages.mwdblib | Python client library for the mwdb service |
| packages/nixpkgs/typstPackages.parcio-thesis | A simple thesis template based on the ParCIO working group at OvGU Magdeburg |
| packages/nixpkgs/typstPackages.parcio-slides | A simple polylux slide template based on the ParCIO working group at OvGU Magdeburg |
| packages/nixpkgs/perlPackages.MozillaCA | Mozilla's CA cert bundle in PEM format |
| packages/nixpkgs/perl5Packages.MozillaCA | Mozilla's CA cert bundle in PEM format |
| packages/nixpkgs/typstPackages.deal-us-tfc-template | Template for TFCs at ETSII directed by the DEAL group |
| packages/nixpkgs/python312Packages.fatrop | Nonlinear optimal control problem solver that aims to be fast, support a broad class of optimal control problems and achieve a high numerical robustness |
| packages/nixpkgs/python313Packages.fatrop | Nonlinear optimal control problem solver that aims to be fast, support a broad class of optimal control problems and achieve a high numerical robustness |
| packages/nixpkgs/python314Packages.fatrop | Nonlinear optimal control problem solver that aims to be fast, support a broad class of optimal control problems and achieve a high numerical robustness |
| packages/nixpkgs/typstPackages.lacy-ubc-math-project | A UBC MATH 100/101 group project template |
| packages/nixpkgs/python314Packages.karton-autoit-ripper | AutoIt script ripper for Karton framework |
| packages/nixpkgs/python313Packages.karton-autoit-ripper | AutoIt script ripper for Karton framework |
| packages/nixpkgs/perl538Packages.MozillaCA | Mozilla's CA cert bundle in PEM format |
| packages/nixpkgs/perl540Packages.MozillaCA | Mozilla's CA cert bundle in PEM format |
| packages/nixpkgs/python313Packages.vultr | Vultr.com API Client |
| packages/nixpkgs/python314Packages.vultr | Vultr.com API Client |
| packages/nixpkgs/python314Packages.karton-mwdb-reporter | Karton service that uploads analyzed artifacts and metadata to MWDB Core |
| packages/nixpkgs/python313Packages.karton-mwdb-reporter | Karton service that uploads analyzed artifacts and metadata to MWDB Core |
| packages/nixpkgs/python314Packages.karton-dashboard | Web application that allows for Karton task and queue introspection |
| packages/nixpkgs/python312Packages.karton-autoit-ripper | AutoIt script ripper for Karton framework |
| packages/nixpkgs/python313Packages.karton-dashboard | Web application that allows for Karton task and queue introspection |
| packages/nixpkgs/python313Packages.low-index | Enumerates low index subgroups of a finitely presented group |
| packages/nixpkgs/python314Packages.low-index | Enumerates low index subgroups of a finitely presented group |
| packages/nixpkgs/typstPackages.upb-cn-templates | Templates for seminar reports, thesis proposals, and theses at the Computer Networks Group of Paderborn University |
| packages/nixpkgs/typstPackages.storytiles | 4 images per slide, for group meeting |
| packages/nixpkgs/python313Packages.clikit | Group of utilities to build beautiful and testable command line interfaces |
| packages/nixpkgs/python314Packages.clikit | Group of utilities to build beautiful and testable command line interfaces |
| packages/nixpkgs/python312Packages.karton-mwdb-reporter | Karton service that uploads analyzed artifacts and metadata to MWDB Core |
| packages/nixpkgs/python313Packages.sleekxmppfs | Fork of SleekXMPP with TLS cert validation disabled, intended only to be used with the sucks project |
| packages/nixpkgs/python314Packages.sleekxmppfs | Fork of SleekXMPP with TLS cert validation disabled, intended only to be used with the sucks project |
| packages/nixpkgs/python314Packages.karton-classifier | File type classifier for the Karton framework |
| packages/nixpkgs/python313Packages.karton-classifier | File type classifier for the Karton framework |
| packages/nixpkgs/python314Packages.karton-asciimagic | Decoders for ascii-encoded executables for the Karton framework |
| packages/nixpkgs/python312Packages.karton-dashboard | Web application that allows for Karton task and queue introspection |
| packages/nixpkgs/python313Packages.karton-asciimagic | Decoders for ascii-encoded executables for the Karton framework |
| packages/nixpkgs/python312Packages.vultr | Vultr.com API Client |
| packages/nixpkgs/python314Packages.karton-config-extractor | Static configuration extractor for the Karton framework |
| packages/nixpkgs/texlivePackages.gu | Typeset crystallographic group-subgroup-schemes |
| packages/nixpkgs/python313Packages.karton-config-extractor | Static configuration extractor for the Karton framework |
| packages/nixpkgs/python313Packages.ge25519 | Python implementation of Ed25519 group elements and operations |
| packages/nixpkgs/python314Packages.ge25519 | Python implementation of Ed25519 group elements and operations |
| packages/nixpkgs/python312Packages.low-index | Enumerates low index subgroups of a finitely presented group |
| packages/nixpkgs/python312Packages.sleekxmppfs | Fork of SleekXMPP with TLS cert validation disabled, intended only to be used with the sucks project |
| packages/nixpkgs/python312Packages.karton-classifier | File type classifier for the Karton framework |
| packages/nixpkgs/python312Packages.karton-asciimagic | Decoders for ascii-encoded executables for the Karton framework |
| packages/nixpkgs/haskellPackages.agum | Unification and Matching in an Abelian Group |
| packages/nixpkgs/python312Packages.clikit | Group of utilities to build beautiful and testable command line interfaces |
| packages/nixpkgs/python314Packages.karton-yaramatcher | File and analysis artifacts yara matcher for the Karton framework |
| packages/nixpkgs/python313Packages.karton-yaramatcher | File and analysis artifacts yara matcher for the Karton framework |
| packages/nixpkgs/haskellPackages.hgal | library for computation automorphism group and canonical labelling of a graph |
| packages/nixpkgs/haskellPackages.woot | Real time group editor without operational transform |
| packages/nixpkgs/texlivePackages.es-tex-faq | CervanTeX (Spanish TeX Group) FAQ |
| packages/nixpkgs/python312Packages.seaserv | File syncing and sharing software with file encryption and group sharing, emphasis on reliability and high performance |
| packages/nixpkgs/python312Packages.karton-config-extractor | Static configuration extractor for the Karton framework |
| packages/nixpkgs/haskellPackages.th-sccs | Binding group analysis in Template Haskell |
| packages/nixpkgs/typstPackages.parcio-thesis_0_2_0 | A simple thesis template based on the ParCIO working group at OvGU Magdeburg |
| packages/nixpkgs/typstPackages.parcio-thesis_0_2_3 | A simple thesis template based on the ParCIO working group at OvGU Magdeburg |
| packages/nixpkgs/typstPackages.parcio-thesis_0_2_2 | A simple thesis template based on the ParCIO working group at OvGU Magdeburg |
| packages/nixpkgs/typstPackages.parcio-thesis_0_1_0 | A simple thesis template based on the ParCIO working group at OvGU Magdeburg |
| packages/nixpkgs/typstPackages.parcio-thesis_0_2_1 | A simple thesis template based on the ParCIO working group at OvGU Magdeburg |
| packages/nixpkgs/typstPackages.parcio-slides_0_1_2 | A simple polylux slide template based on the ParCIO working group at OvGU Magdeburg |
| packages/nixpkgs/typstPackages.parcio-slides_0_1_1 | A simple polylux slide templated based on the ParCIO working group at OvGU Magdeburg |
| packages/nixpkgs/typstPackages.parcio-slides_0_1_0 | A simple polylux slide templated based on the ParCIO working group at OvGU Magdeburg |
| packages/nixpkgs/python313Packages.seaserv | File syncing and sharing software with file encryption and group sharing, emphasis on reliability and high performance |
| packages/nixpkgs/python312Packages.ge25519 | Python implementation of Ed25519 group elements and operations |
| packages/nixpkgs/haskellPackages.zyre2 | Haskell zyre bindings for reliable group messaging over local area networks |
| packages/nixpkgs/haskellPackages.warp-tls-uid | set group and user id before running server |
| packages/nixpkgs/python312Packages.karton-yaramatcher | File and analysis artifacts yara matcher for the Karton framework |
| packages/nixpkgs/perlPackages.Linuxusermod | This module adds, removes and modify user and group accounts according to the passwd and shadow files syntax |
| packages/nixpkgs/texlivePackages.letgut | Class for the newsletter "La Lettre GUTenberg" of the French TeX User Group GUTenberg |
| packages/nixpkgs/perl5Packages.Linuxusermod | This module adds, removes and modify user and group accounts according to the passwd and shadow files syntax |
| packages/nixpkgs/typstPackages.lacy-ubc-math-project_0_1_0 | A UBC MATH 100 group project template |
| packages/nixpkgs/haskellPackages.DigitGroup | Group the digits of numbers by lots |
| packages/nixpkgs/typstPackages.lacy-ubc-math-project_0_1_1 | A UBC MATH 100/101 group project template |
| packages/nixpkgs/typstPackages.lacy-ubc-math-project_0_2_0 | A UBC MATH 100/101 group project template |
| packages/nixpkgs/haskellPackages.monoid-map | A monoidal map with the right group instance |
| packages/nixpkgs/haskellPackages.smartGroup | group strings or bytestrings by words in common |
| packages/nixpkgs/haskellPackages.data-tensor | Tensor and Group typeclasses |
| packages/nixpkgs/typstPackages.deal-us-tfc-template_1_1_0 | Template for TFCs at ETSII directed by the DEAL group |
| packages/nixpkgs/typstPackages.deal-us-tfc-template_1_0_0 | Template for TFCs at ETSII directed by the DEAL group |
| packages/nixpkgs/haskellPackages.pipes-break | Pipes to group by any delimiter (such as lines with carriage returns) |
| packages/nixpkgs/texlivePackages.sugconf | SAS(R) user group conference proceedings document class |
| packages/nixpkgs/texlivePackages.calxxxx-yyyy | Print a calendar for a group of years |
| packages/nixpkgs/perl540Packages.Linuxusermod | This module adds, removes and modify user and group accounts according to the passwd and shadow files syntax |
| packages/nixpkgs/perl538Packages.Linuxusermod | This module adds, removes and modify user and group accounts according to the passwd and shadow files syntax |
| packages/nixpkgs/texlivePackages.atableau | A LaTeX package for symmetric group combinatorics |
| packages/nixpkgs/python313Packages.betamax-matchers | Group of experimental matchers for Betamax |
| packages/nixpkgs/python314Packages.betamax-matchers | Group of experimental matchers for Betamax |
| packages/nixpkgs/haskellPackages.zampolit | A tool for checking how much work is done on group projects |
| packages/nixpkgs/haskellPackages.HaskellForMaths | Combinatorics, group theory, commutative algebra, non-commutative algebra |
| packages/nixpkgs/typstPackages.upb-cn-templates_0_1_0 | Templates for seminar reports and thesis proposals at the Computer Networks Group of Paderborn University |
| packages/nixpkgs/typstPackages.upb-cn-templates_0_2_0 | Templates for seminar reports, thesis proposals, and theses at the Computer Networks Group of Paderborn University |
| packages/nixpkgs/haskellPackages.threads-extras | Extends the threads package with a bounded thread group |
| packages/nixpkgs/vimPlugins.nvim-treesitter-parsers.powershell | Tree-sitter grammar for powershell |
| packages/nixpkgs/python312Packages.betamax-matchers | Group of experimental matchers for Betamax |
| packages/nixpkgs/typstPackages.storytiles_0_0_1 | 4 images per slide, for group meeting |
| packages/nixpkgs/haskellPackages.list-duplicate | Group and delete duplicates from a list |
| packages/nixpkgs/haskellPackages.haskell-throttle | A simple throttling library, which drops messages from same group |
| packages/nixpkgs/haskellPackages.gogol-replicapool-updater | Google Compute Engine Instance Group Updater SDK |
| packages/nixpkgs/ocamlPackages.ca-certs | Detect root CA certificates from the operating system |
| packages/nixpkgs/ocamlPackages.ca-certs-nss | X.509 trust anchors extracted from Mozilla's NSS |
| packages/nixpkgs/ocamlPackages_latest.ca-certs | Detect root CA certificates from the operating system |
| packages/nixpkgs/ocamlPackages_latest.ca-certs-nss | X.509 trust anchors extracted from Mozilla's NSS |
| packages/nixpkgs/haskellPackages.test-certs | create temporary SSL certificates in tests |
| packages/nixpkgs/python314Packages.pip-system-certs | Live patches pip and requests to use system certs by default |
| packages/nixpkgs/python313Packages.pip-system-certs | Live patches pip and requests to use system certs by default |
| packages/nixpkgs/python312Packages.pip-system-certs | Live patches pip and requests to use system certs by default |
| packages/nixpkgs/python313Packages.mscerts | Makes the Microsoft Trusted Root Program's Certificate Trust Lists available in Python |
| packages/nixpkgs/python314Packages.mscerts | Makes the Microsoft Trusted Root Program's Certificate Trust Lists available in Python |
| packages/nixpkgs/certsync | Dump NTDS with golden certificates and UnPAC the hash |
| packages/nixpkgs/traefik-certs-dumper | Dump ACME data from traefik to certificates |
| packages/nixpkgs/python312Packages.mscerts | Makes the Microsoft Trusted Root Program's Certificate Trust Lists available in Python |
| packages/nixpkgs/certstrap | Tools to bootstrap CAs, certificate requests, and signed certificates |
| packages/nixpkgs/jre-generate-cacerts | |
| packages/nixpkgs/sbclPackages.group-by | |
| packages/nixpkgs/certspotter | Certificate Transparency Log Monitor |
| packages/nixpkgs/sbclPackages.group-by-test | |
| packages/nixpkgs/certstream-server-go | Drop-in replacement in Golang for the certstream server by Calidog |
| packages/nixpkgs/ssl-cert-check | Bourne shell script that can be used to report on expiring SSL certificates |
| packages/nixpkgs/azure-sdk-for-cpp.security-keyvault-certificates | Azure Key Vault Certificates client library for C++ |
| packages/nixpkgs/cert-viewer | Admin tool to view and inspect multiple x509 Certificates |
| packages/nixpkgs/emacsPackages.tab-group | |
| packages/nixpkgs/haskellPackages.group-with | Classify objects by key-generating function, like SQL GROUP BY |
| packages/nixpkgs/rPackages.groupICA | |
| packages/nixpkgs/rPackages.groupWQS | |
| packages/nixpkgs/haskellPackages.glfw-group | GLFW package with window groups destroyed together |
| packages/nixpkgs/haskellPackages.pipes-group | Group streams into substreams |
| packages/nixpkgs/haskellPackages.group-by-date | Shell command for grouping files by dates into folders |
| packages/nixpkgs/rPackages.groupRemMap | |
| packages/nixpkgs/azure-cli-extensions.ip-group | Microsoft Azure Command-Line Tools IpGroup Extension |
| packages/nixpkgs/haskellPackages.ascii-group | ASCII character groups |
| packages/nixpkgs/certi | ADCS abuser |
| packages/nixpkgs/haskellPackages.group-theory | The theory of groups |
| packages/nixpkgs/haskellPackages.groupBy | Replacement definition of Data |
| packages/nixpkgs/kodiPackages.certifi | Python package for providing Mozilla's CA Bundle |
| packages/nixpkgs/rPackages.GB2group | |
| packages/nixpkgs/python313Packages.cert-chain-resolver | Resolve / obtain the certificate intermediates of a x509 certificate |
| packages/nixpkgs/python314Packages.cert-chain-resolver | Resolve / obtain the certificate intermediates of a x509 certificate |
| packages/nixpkgs/certbot-full | |
| packages/nixpkgs/python313Packages.click-default-group | Group to invoke a command without explicit subcommand name |
| packages/nixpkgs/python314Packages.click-default-group | Group to invoke a command without explicit subcommand name |
| packages/nixpkgs/python313Packages.click-option-group | Option groups missing in Click |
| packages/nixpkgs/python314Packages.click-option-group | Option groups missing in Click |
| packages/nixpkgs/coqPackages.compcert | Formally verified C compiler |
| packages/nixpkgs/python312Packages.cert-chain-resolver | Resolve / obtain the certificate intermediates of a x509 certificate |
| packages/nixpkgs/rPackages.groupTesting | |
| packages/nixpkgs/mkcert | Simple tool for making locally-trusted development certificates |
| packages/nixpkgs/sbclPackages.groupby | |
| packages/nixpkgs/python312Packages.click-default-group | Group to invoke a command without explicit subcommand name |
| packages/nixpkgs/ocamlPackages.dns-certify | MirageOS let's encrypt certificate retrieval |
| packages/nixpkgs/python312Packages.click-option-group | Option groups missing in Click |
| packages/nixpkgs/emacsPackages.elscreen-buffer-group | |
| packages/nixpkgs/rPackages.groupr | |
| packages/nixpkgs/certmgr | Cloudflare's automated certificate management using a CFSSL CA |
| packages/nixpkgs/prometheus-node-cert-exporter | Prometheus exporter for SSL certificate |
| packages/nixpkgs/ocamlPackages_latest.dns-certify | MirageOS let's encrypt certificate retrieval |
| packages/nixpkgs/rPackages.icertool | |
| packages/nixpkgs/compcert | Formally verified C compiler |
| packages/nixpkgs/python313Packages.certipy | Utility to create and sign CAs and certificates |
| packages/nixpkgs/python314Packages.certipy | Utility to create and sign CAs and certificates |
| packages/nixpkgs/python313Packages.certifi | Python package for providing Mozilla's CA Bundle |
| packages/nixpkgs/python314Packages.certifi | Python package for providing Mozilla's CA Bundle |
| packages/nixpkgs/certigo | Utility to examine and validate certificates in a variety of formats |
| packages/nixpkgs/certdump | Dump certificates from PE files in different formats |
| packages/nixpkgs/home-assistant-component-tests.group | Open source home automation that puts local control and privacy first |
| packages/nixpkgs/python313Packages.certipy-ad | Library and CLI tool to enumerate and abuse misconfigurations in Active Directory Certificate Services |
| packages/nixpkgs/python314Packages.certipy-ad | Library and CLI tool to enumerate and abuse misconfigurations in Active Directory Certificate Services |
| packages/nixpkgs/python313Packages.certbot | ACME client that can obtain certs and extensibly update server configurations |
| packages/nixpkgs/python314Packages.certbot | ACME client that can obtain certs and extensibly update server configurations |
| packages/nixpkgs/certipy | Library and CLI tool to enumerate and abuse misconfigurations in Active Directory Certificate Services |
| packages/nixpkgs/rPackages.grouped | |
| packages/nixpkgs/rPackages.ggroups | |
| packages/nixpkgs/rPackages.grouper | |
| packages/nixpkgs/rPackages.ungroup | |
| packages/nixpkgs/cacert | Bundle of X.509 certificates of public Certificate Authorities (CA) |
| packages/nixpkgs/sbclPackages.grouping-stack | |
| packages/nixpkgs/azure-cli-extensions.monitor-pipeline-group | Microsoft Azure Command-Line Tools MonitorPipelineGroup Extension |
| packages/nixpkgs/certbot | ACME client that can obtain certs and extensibly update server configurations |
| packages/nixpkgs/haskellPackages.groups | Groups |
| packages/nixpkgs/emacsPackages.tab-bar-groups | |
| packages/nixpkgs/python314Packages.certbot-dns-ovh | OVH DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python313Packages.certbot-dns-ovh | OVH DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python313Packages.certbot-dns-inwx | INWX DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python314Packages.certbot-dns-inwx | INWX DNS Authenticator plugin for Certbot |
| packages/nixpkgs/rPackages.occUncertain | |
| packages/nixpkgs/python313Packages.certauth | Simple CertificateAuthority and host certificate creation, useful for man-in-the-middle HTTPS proxy |
| packages/nixpkgs/python314Packages.certauth | Simple CertificateAuthority and host certificate creation, useful for man-in-the-middle HTTPS proxy |
| packages/nixpkgs/python312Packages.certipy | Utility to create and sign CAs and certificates |
| packages/nixpkgs/rPackages.groupedSurv | |
| packages/nixpkgs/python312Packages.certifi | Python package for providing Mozilla's CA Bundle |
| packages/nixpkgs/rubyPackages.certified | |
| packages/nixpkgs/rPackages.uncertainUCDP | |
| packages/nixpkgs/python313Packages.certbot-nginx | Nginx plugin for Certbot |
| packages/nixpkgs/python314Packages.certbot-nginx | Nginx plugin for Certbot |
| packages/nixpkgs/python312Packages.certipy-ad | Library and CLI tool to enumerate and abuse misconfigurations in Active Directory Certificate Services |
| packages/nixpkgs/emacsPackages.digit-groups | |
| packages/nixpkgs/emacsPackages.rcirc-groups | |
| packages/nixpkgs/certinfo | Print x509 certificate info |
| packages/nixpkgs/python312Packages.certbot | ACME client that can obtain certs and extensibly update server configurations |
| packages/nixpkgs/rPackages.grouprar | |
| packages/nixpkgs/rPackages.subgroup | |
| packages/nixpkgs/dn42-cacert | DN42 Root CA certificate |
| packages/nixpkgs/haskellPackages.quiver-groups | Group and chunk values within a Quiver |
| packages/nixpkgs/rPackages.Xcertainty | |
| packages/nixpkgs/certinfo-go | Tool to analyze and troubleshoot x.509 & ssh certificates, encoded keys |
| packages/nixpkgs/minio-certgen | Simple Minio tool to generate self-signed certificates, and provides SAN certificates with DNS and IP entries |
| packages/nixpkgs/python312Packages.certbot-dns-inwx | INWX DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python312Packages.certbot-dns-ovh | OVH DNS Authenticator plugin for Certbot |
| packages/nixpkgs/haskellPackages.uncertain | Manipulating numbers with inherent experimental/measurement uncertainty |
| packages/nixpkgs/python312Packages.certauth | Simple CertificateAuthority and host certificate creation, useful for man-in-the-middle HTTPS proxy |
| packages/nixpkgs/python313Packages.certbot-dns-google | Google Cloud DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python314Packages.certbot-dns-google | Google Cloud DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python314Packages.cgroup-utils | Utility tools for control groups of Linux |
| packages/nixpkgs/python313Packages.cgroup-utils | Utility tools for control groups of Linux |
| packages/nixpkgs/python312Packages.certbot-nginx | Nginx plugin for Certbot |
| packages/nixpkgs/haskellPackages.linux-cgroup | Very basic interface to the Linux CGroup Virtual Filesystem |
| packages/nixpkgs/haskellPackages.groups-generic | Generically derive Group instances |
| packages/nixpkgs/python313Packages.numpy-groupies | Optimised tools for group-indexing operations: aggregated sum and more |
| packages/nixpkgs/python314Packages.numpy-groupies | Optimised tools for group-indexing operations: aggregated sum and more |
| packages/nixpkgs/rPackages.freegroup | |
| packages/nixpkgs/rPackages.movegroup | |
| packages/nixpkgs/rPackages.metagroup | |
| packages/nixpkgs/rPackages.rsubgroup | |
| packages/nixpkgs/rPackages.groupwalk | |
| packages/nixpkgs/nagiosPlugins.check_ssl_cert | Nagios plugin to check the CA and validity of an X.509 certificate |
| packages/nixpkgs/haskellPackages.grouped-list | Grouped lists |
| packages/nixpkgs/python313Packages.certbot-dns-route53 | Route53 DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python314Packages.certbot-dns-route53 | Route53 DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python313Packages.certbot-dns-rfc2136 | RFC 2136 DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python314Packages.certbot-dns-rfc2136 | RFC 2136 DNS Authenticator plugin for Certbot |
| packages/nixpkgs/rPackages.uncertainty | |
| packages/nixpkgs/haskellPackages.groupoid | A Groupoid class |
| packages/nixpkgs/chickenPackages_5.chickenEggs.posix-groups | Access POSIX group information |
| packages/nixpkgs/python312Packages.certbot-dns-google | Google Cloud DNS Authenticator plugin for Certbot |
| packages/nixpkgs/emacsPackages.project-tab-groups | |
| packages/nixpkgs/certgraph | Intelligence tool to crawl the graph of certificate alternate names |
| packages/nixpkgs/rPackages.rankUncertainty | |
| packages/nixpkgs/python312Packages.cgroup-utils | Utility tools for control groups of Linux |
| packages/nixpkgs/rPackages.UncertainInterval | |
| packages/nixpkgs/python312Packages.numpy-groupies | Optimised tools for group-indexing operations: aggregated sum and more |
| packages/nixpkgs/python312Packages.certbot-dns-route53 | Route53 DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python312Packages.certbot-dns-rfc2136 | RFC 2136 DNS Authenticator plugin for Certbot |
| packages/nixpkgs/certmitm | Tool for testing for certificate validation vulnerabilities of TLS connections |
| packages/nixpkgs/haskellPackages.list-grouping | Functions for grouping a list into sublists |
| packages/nixpkgs/rPackages.groupdata2 | |
| packages/nixpkgs/rPackages.multigroup | |
| packages/nixpkgs/haskellPackages.certificate | Certificates and Key Reader/Writer |
| packages/nixpkgs/python313Packages.certomancer | Quickly construct, mock & deploy PKI test configurations using simple declarative configuration |
| packages/nixpkgs/python314Packages.certomancer | Quickly construct, mock & deploy PKI test configurations using simple declarative configuration |
| packages/nixpkgs/haskellPackages.Semigroup | A semigroup |
| packages/nixpkgs/haskellPackages.groupoids | This package has been absorbed into semigroupoids 4.0 |
| packages/nixpkgs/haskellPackages.cgroup-rts-threads | A container-/cgroup-aware substitute for the GHC RTS `-N` flag |
| packages/nixpkgs/coqPackages.mathcomp-fingroup | |
| packages/nixpkgs/emacsPackages.workgroups | |
| packages/nixpkgs/rocqPackages.mathcomp-fingroup | |
| packages/nixpkgs/home-assistant-component-tests.cert_expiry | Open source home automation that puts local control and privacy first |
| packages/nixpkgs/python312Packages.certomancer | Quickly construct, mock & deploy PKI test configurations using simple declarative configuration |
| packages/nixpkgs/zscaler-cacert | ZScaler Root CA certificate |
| packages/nixpkgs/haskellPackages.quickcheck-groups | Testing group class instances with QuickCheck |
| packages/nixpkgs/python313Packages.certbot-dns-cloudflare | Cloudflare DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python314Packages.certbot-dns-cloudflare | Cloudflare DNS Authenticator plugin for Certbot |
| packages/nixpkgs/haskellPackages.semigroups | Anything that associates |
| packages/nixpkgs/emacsPackages.workgroups2 | |
| packages/nixpkgs/haskellPackages.either-semigroup | Either with a stricter Semigroup instance |
| packages/nixpkgs/haskellPackages.gogol-groups-settings | Google Groups Settings SDK |
| packages/nixpkgs/python312Packages.certbot-dns-cloudflare | Cloudflare DNS Authenticator plugin for Certbot |
| packages/nixpkgs/home-assistant-custom-components.climate_group | Group multiple climate devices to a single entity |
| packages/nixpkgs/python313Packages.certvalidator | Validates X.509 certificates and paths |
| packages/nixpkgs/python314Packages.certvalidator | Validates X.509 certificates and paths |
| packages/nixpkgs/python313Packages.uncertainties | Transparent calculations with uncertainties on the quantities involved (aka error propagation) |
| packages/nixpkgs/python314Packages.uncertainties | Transparent calculations with uncertainties on the quantities involved (aka error propagation) |
| packages/nixpkgs/rPackages.groupedHyperframe | |
| packages/nixpkgs/python314Packages.mypy-boto3-resource-groups | Type annotations for boto3 resource-groups |
| packages/nixpkgs/python313Packages.mypy-boto3-resource-groups | Type annotations for boto3 resource-groups |
| packages/nixpkgs/haskellPackages.partial-semigroup | A partial binary associative operator |
| packages/nixpkgs/sway-assign-cgroups | Place GUI applications into systemd scopes for systemd-oomd compatibility |
| packages/nixpkgs/rPackages.groupcompare | |
| packages/nixpkgs/python312Packages.certvalidator | Validates X.509 certificates and paths |
| packages/nixpkgs/haskellPackages.gogol-groups-migration | Google Groups Migration SDK |
| packages/nixpkgs/python312Packages.uncertainties | Transparent calculations with uncertainties on the quantities involved (aka error propagation) |
| packages/nixpkgs/fedigroups | Approximation of groups usable with Fediverse software that implements the Mastodon client API |
| packages/nixpkgs/gnomeExtensions.kolour-groups-windows | Advanced window management with grayscale effects and window grouping |
| packages/nixpkgs/haskellPackages.finite-semigroups | Operations and classification for finite semigroups |
| packages/nixpkgs/libcgroup | Library and tools to manage Linux cgroups |
| packages/nixpkgs/python313Packages.dependency-groups | A standalone implementation of PEP 735 Dependency Groups |
| packages/nixpkgs/python314Packages.dependency-groups | A standalone implementation of PEP 735 Dependency Groups |
| packages/nixpkgs/haskellPackages.partial-semigroup-test | Testing utilities for the partial-semigroup package |
| packages/nixpkgs/ocamlPackages.class_group_vdf | Verifiable Delay Functions bindings to Chia's VDF |
| packages/nixpkgs/python312Packages.mypy-boto3-resource-groups | Type annotations for boto3 resource-groups |
| packages/nixpkgs/haskellPackages.semigroups-actions | Semigroups actions |
| packages/nixpkgs/certificate-ripper | CLI tool to extract server certificates |
| packages/nixpkgs/python312Packages.dependency-groups | A standalone implementation of PEP 735 Dependency Groups |
| packages/nixpkgs/python313Packages.pyhanko-certvalidator | Python library for validating X.509 certificates and paths |
| packages/nixpkgs/python314Packages.pyhanko-certvalidator | Python library for validating X.509 certificates and paths |
| packages/nixpkgs/rPackages.groupedHyperframe_random | |
| packages/nixpkgs/haskellPackages.papa-prelude-semigroups | Prelude with only useful functions |
| packages/nixpkgs/ocamlPackages_latest.class_group_vdf | Verifiable Delay Functions bindings to Chia's VDF |
| packages/nixpkgs/python313Packages.azure-keyvault-certificates | Microsoft Azure Key Vault Certificates Client Library for Python |
| packages/nixpkgs/python314Packages.azure-keyvault-certificates | Microsoft Azure Key Vault Certificates Client Library for Python |
| packages/nixpkgs/haskellPackages.numbered-semigroups | A sequence of semigroups, for composing stuff in multiple spatial directions |
| packages/nixpkgs/haskellPackages.sixfiguregroup | A six figure group of time |
| packages/nixpkgs/python312Packages.pyhanko-certvalidator | Python library for validating X.509 certificates and paths |
| packages/nixpkgs/rubyPackages_3_1.certified | |
| packages/nixpkgs/rubyPackages_3_2.certified | |
| packages/nixpkgs/rubyPackages_3_3.certified | |
| packages/nixpkgs/python312Packages.azure-keyvault-certificates | Microsoft Azure Key Vault Certificates Client Library for Python |
| packages/nixpkgs/rubyPackages_3_5.certified | |
| packages/nixpkgs/rubyPackages_4_0.certified | |
| packages/nixpkgs/rubyPackages_3_4.certified | |
| packages/nixpkgs/haskellPackages.semigroupoids | Semigroupoids: Category sans id |
| packages/nixpkgs/haskellPackages.semigroupoid-extras | Semigroupoids that depend on PolyKinds |
| packages/nixpkgs/haskellPackages.partial-semigroup-hedgehog | Property testing for partial semigroups using Hedgehog |
| packages/nixpkgs/haskellPackages.semigroupoids-do | Support for QualifiedDo with semigroupoids classes |
| packages/nixpkgs/haskellPackages.papa-semigroupoids | Prelude with only useful functions |
| packages/nixpkgs/haskellPackages.involutive-semigroups | Semigroups with involution |
| packages/nixpkgs/haskellPackages.semigroupoids-syntax | RebindableSyntax using the semigroupoids package |
| packages/nixpkgs/python313Packages.exceptiongroup | Backport of PEP 654 (exception groups) |
| packages/nixpkgs/python314Packages.exceptiongroup | Backport of PEP 654 (exception groups) |
| packages/nixpkgs/kdePackages.khealthcertificate | Handling of digital vaccination, test and recovery certificates. |
| packages/nixpkgs/haskellPackages.papa-semigroupoids-export | export useful functions from `semigroupoids` |
| packages/nixpkgs/haskellPackages.commutative-semigroups | Commutative semigroups |
| packages/nixpkgs/python312Packages.exceptiongroup | Backport of PEP 654 (exception groups) |
| packages/nixpkgs/python314Packages.types-aiobotocore-resource-groups | Type annotations for aiobotocore resource-groups |
| packages/nixpkgs/python313Packages.types-aiobotocore-resource-groups | Type annotations for aiobotocore resource-groups |
| packages/nixpkgs/haskellPackages.papa-prelude-semigroupoids | Prelude with only useful functions |
| packages/nixpkgs/python312Packages.types-aiobotocore-resource-groups | Type annotations for aiobotocore resource-groups |
| packages/nixpkgs/haskellPackages.papa-semigroupoids-implement | useful `semigroupoids` functions reimplemented |
| packages/nixpkgs/haskellPackages.amazonka-resourcegroups | Amazon Resource Groups SDK |
| packages/nixpkgs/haskellPackages.amazonka-certificatemanager | Amazon Certificate Manager SDK |
| packages/nixpkgs/haskellPackages.amazonka-certificatemanager-pca | Amazon Certificate Manager Private Certificate Authority SDK |
| packages/nixpkgs/python313Packages.azure-mgmt-managementgroups | This is the Microsoft Azure Management Groups Client Library |
| packages/nixpkgs/python314Packages.azure-mgmt-managementgroups | This is the Microsoft Azure Management Groups Client Library |
| packages/nixpkgs/python312Packages.azure-mgmt-managementgroups | This is the Microsoft Azure Management Groups Client Library |
| packages/nixpkgs/haskellPackages.stratosphere-resourcegroups | Stratosphere integration for AWS ResourceGroups |
| packages/nixpkgs/haskellPackages.stratosphere-certificatemanager | Stratosphere integration for AWS CertificateManager |
| packages/nixpkgs/rPackages.groupsubsetselection | |
| packages/nixpkgs/haskellPackages.amazonka-resourcegroupstagging | Amazon Resource Groups Tagging API SDK |
| packages/nixpkgs/python313Packages.mypy-boto3-resourcegroupstaggingapi | Type annotations for boto3 resourcegroupstaggingapi |
| packages/nixpkgs/python314Packages.mypy-boto3-resourcegroupstaggingapi | Type annotations for boto3 resourcegroupstaggingapi |
| packages/nixpkgs/python312Packages.mypy-boto3-resourcegroupstaggingapi | Type annotations for boto3 resourcegroupstaggingapi |
| packages/nixpkgs/python313Packages.types-aiobotocore-resourcegroupstaggingapi | Type annotations for aiobotocore resourcegroupstaggingapi |
| packages/nixpkgs/python314Packages.types-aiobotocore-resourcegroupstaggingapi | Type annotations for aiobotocore resourcegroupstaggingapi |
| packages/nixpkgs/python312Packages.types-aiobotocore-resourcegroupstaggingapi | Type annotations for aiobotocore resourcegroupstaggingapi |
| packages/nur/Red-Flake.evil-winrm-py | Interactive WinRM shell (Python) with NTLM/hash/cert/Kerberos and in-memory ops |
| packages/nur/linyinfeng.lpac | C-based eUICC LPA |
| packages/nur/xddxdd.dingtalk | Enterprise communication and collaboration platform developed by Alibaba Group |
| packages/nur/sikmir.osm-lump-ways | Group OSM ways together based on topology & tags |
| packages/nur/xddxdd.uncategorized.dingtalk | Enterprise communication and collaboration platform developed by Alibaba Group |
| packages/nur/dcsunset.i3-focus-group | Create a group for i3/sway containers to easily switch focus between |
| packages/nur/sikmir.gemcert | A simple tool for creating self-signed certs for use in Geminispace |
| packages/nur/rycee.firefox-addons.simple-tab-groups | Create, modify, and quickly change tab groups |
| packages/nur/rycee.firefox-addons.container-tab-groups | Chrome-like tab groups using private and isolated containers: The ultimate tab manager and groups for Firefox. |
| packages/nur/rycee.firefox-addons.youtube-subscription-groups | The best way to group your subscriptions
Using this simple extension you can create collections that seamlessly fit into YouTube's layout. |
| packages/nur/999eagle.synapse-find-unreferenced-state-groups | Finds unreferenced state groups persisted by synapse |