| packages/nixpkgs/qemu-user | QEMU User space emulator - launch executables compiled for one CPU on another CPU |
| packages/nixpkgs/xdg-user-dirs | Tool to help manage well known user directories like the desktop folder and the music folder |
| packages/nixpkgs/smtp-user-enum | SMTP user enumeration via VRFY, EXPN and RCPT with clever timeout, retry and reconnect functionality |
| packages/nixpkgs/xdg-user-dirs-gtk | Companion to xdg-user-dirs that integrates it into the GNOME desktop and GTK applications |
| packages/nixpkgs/gnome-user-docs | User and system administration help for the GNOME desktop |
| packages/nixpkgs/rshim-user-space | User-space rshim driver for the BlueField SoC |
| packages/nixpkgs/nezha-theme-user | Nezha monitoring user frontend based on next.js |
| packages/nixpkgs/gnome-user-share | Service that exports the contents of the Public folder in your home directory on the local network |
| packages/nixpkgs/mate.mate-user-share | User level public file sharing for the MATE desktop |
| packages/nixpkgs/mate.mate-user-guide | MATE User Guide |
| packages/nixpkgs/apache-users | Username Enumeration through Apache UserDir |
| packages/nixpkgs/sbclPackages.with-user-abort | |
| packages/nixpkgs/vimPlugins.vim-textobj-user | |
| packages/nixpkgs/userborn | Declaratively bear (manage) Linux users and groups |
| packages/nixpkgs/trousers | Trusted computing software stack |
| packages/nixpkgs/vimPlugins.vim-operator-user | |
| packages/nixpkgs/budgie-user-indicator-redux | Manage your user session from the Budgie panel |
| packages/nixpkgs/haskellPackages.super-user-spark | Configure your dotfile deployment with a DSL |
| packages/nixpkgs/userhosts | Libc wrapper providing per-user hosts file |
| packages/nixpkgs/python314Packages.user-agents | Python library to identify devices by parsing user agent strings |
| packages/nixpkgs/python313Packages.user-agents | Python library to identify devices by parsing user agent strings |
| packages/nixpkgs/reattach-to-user-namespace | Wrapper that provides access to the Mac OS X pasteboard service |
| packages/nixpkgs/rPackages.fuser | |
| packages/nixpkgs/usermount | Simple tool to automatically mount removable drives using UDisks2 and D-Bus |
| packages/nixpkgs/emacsPackages.desktop-mail-user-agent | |
| packages/nixpkgs/gnomeExtensions.user-id-in-top-panel | Add ( user name :: user id @ host ) in top panel |
| packages/nixpkgs/gnomeExtensions.user-themes | Load shell themes from user directory. |
| packages/nixpkgs/gnomeExtensions.user-themes-x | Switch day/night user theme&stylesheet when the enabled Night Light gets inactive/active |
| packages/nixpkgs/python312Packages.user-agents | Python library to identify devices by parsing user agent strings |
| packages/nixpkgs/haskellPackages.haskell-fake-user-agent | Simple library for retrieving current user agent strings |
| packages/nixpkgs/gnomeExtensions.accent-user-theme | Makes user themes to follow system accent color and color scheme Light or Dark, a fork from https://github.com/taiwbi/gnome-accent-directories |
| packages/nixpkgs/arkenfox-userjs | Comprehensive user.js template for configuration and hardening |
| packages/nixpkgs/python312Packages.random-user-agent | Module to get list of user agents based on filters |
| packages/nixpkgs/python313Packages.random-user-agent | Module to get list of user agents based on filters |
| packages/nixpkgs/sbclPackages.userial | |
| packages/nixpkgs/haskellPackages.users | A library simplifying user management for web applications |
| packages/nixpkgs/username-anarchy | Username generator tool for penetration testing |
| packages/nixpkgs/wordpressPackages.plugins.wp-user-avatars | |
| packages/nixpkgs/haskellPackages.userid | The UserId type and useful instances for web development |
| packages/nixpkgs/gnomeExtensions.user-avatar-in-quick-settings | Display the user avatar in the Quick Settings menu, part of the "System" settings |
| packages/nixpkgs/haskellPackages.users-test | Library to test backends for the users library |
| packages/nixpkgs/sbclPackages.userial-tests | |
| packages/nixpkgs/gnomeExtensions.user-stylesheet-font | Load custom style sheet from ~/.config/gnome-shell/gnome-shell.css. |
| packages/nixpkgs/gtklock-userinfo-module | Gtklock module adding user info to the lockscreen |
| packages/nixpkgs/rubyPackages.useragent | |
| packages/nixpkgs/haskellPackages.xdg-userdirs | Basic implementation of XDG user directories specification |
| packages/nixpkgs/rubyPackages_3_2.useragent | |
| packages/nixpkgs/rubyPackages_3_1.useragent | |
| packages/nixpkgs/rubyPackages_3_5.useragent | |
| packages/nixpkgs/rubyPackages_3_3.useragent | |
| packages/nixpkgs/rubyPackages_3_4.useragent | |
| packages/nixpkgs/rubyPackages_4_0.useragent | |
| packages/nixpkgs/python313Packages.userpath | Cross-platform tool for adding locations to the user PATH |
| packages/nixpkgs/python314Packages.userpath | Cross-platform tool for adding locations to the user PATH |
| packages/nixpkgs/gnomeExtensions.notifications-alert-on-user-menu | Changes the color of the time and date indicator in the top bar when there are unread notifications |
| packages/nixpkgs/haskellPackages.users-mysql-haskell | A mysql-haskell backend for the users library |
| packages/nixpkgs/libsForQt5.kuserfeedback | Framework for collecting user feedback for apps via telemetry and surveys |
| packages/nixpkgs/python312Packages.userpath | Cross-platform tool for adding locations to the user PATH |
| packages/nixpkgs/haskellPackages.useragents | A collection of user agents |
| packages/nixpkgs/perlPackages.Linuxusermod | This module adds, removes and modify user and group accounts according to the passwd and shadow files syntax |
| packages/nixpkgs/haskellPackages.prodapi-userauth | a base lib for performing user-authentication in prodapi services |
| packages/nixpkgs/perl5Packages.Linuxusermod | This module adds, removes and modify user and group accounts according to the passwd and shadow files syntax |
| packages/nixpkgs/python313Packages.diffusers | State-of-the-art diffusion models for image and audio generation in PyTorch |
| packages/nixpkgs/python314Packages.diffusers | State-of-the-art diffusion models for image and audio generation in PyTorch |
| packages/nixpkgs/soundfont-generaluser | General MIDI SoundFont with a low memory footprint |
| packages/nixpkgs/python313Packages.fake-useragent | Up to date simple useragent faker with real world database |
| packages/nixpkgs/python314Packages.fake-useragent | Up to date simple useragent faker with real world database |
| packages/nixpkgs/python312Packages.diffusers | State-of-the-art diffusion models for image and audio generation in PyTorch |
| packages/nixpkgs/gnomeExtensions.add-username-to-top-panel | Simply add your username to topbar panel quick settings menu. |
| packages/nixpkgs/haskellPackages.amazonka-license-manager-user-subscriptions | Amazon License Manager User Subscriptions SDK |
| packages/nixpkgs/python313Packages.mypy-boto3-license-manager-user-subscriptions | Type annotations for boto3 license-manager-user-subscriptions |
| packages/nixpkgs/python314Packages.mypy-boto3-license-manager-user-subscriptions | Type annotations for boto3 license-manager-user-subscriptions |
| packages/nixpkgs/python312Packages.fake-useragent | Up to date simple useragent faker with real world database |
| packages/nixpkgs/haskellPackages.users-persistent | A persistent backend for the users package |
| packages/nixpkgs/python312Packages.mypy-boto3-license-manager-user-subscriptions | Type annotations for boto3 license-manager-user-subscriptions |
| packages/nixpkgs/kdePackages.kuserfeedback | Framework for collecting user feedback for apps via telemetry and surveys |
| packages/nixpkgs/perl540Packages.Linuxusermod | This module adds, removes and modify user and group accounts according to the passwd and shadow files syntax |
| packages/nixpkgs/perl538Packages.Linuxusermod | This module adds, removes and modify user and group accounts according to the passwd and shadow files syntax |
| packages/nixpkgs/lomiri.libusermetrics | Enables apps to locally store interesting numerical data for later presentation |
| packages/nixpkgs/haskellPackages.gogol-serviceuser | Google Service User SDK |
| packages/nixpkgs/python312Packages.scrapy-fake-useragent | Random User-Agent middleware based on fake-useragent |
| packages/nixpkgs/python313Packages.scrapy-fake-useragent | Random User-Agent middleware based on fake-useragent |
| packages/nixpkgs/rPackages.cymruservices | |
| packages/nixpkgs/gnomeExtensions.username-in-top-panel-right-side | Displays the current username in the top panel, positioned at the far right after the power button. |
| packages/nixpkgs/haskellPackages.gogol-useraccounts | Google Cloud User Accounts SDK |
| packages/nixpkgs/rPackages.ergm_userterms | |
| packages/nixpkgs/plasma5Packages.kuserfeedback | Framework for collecting user feedback for apps via telemetry and surveys |
| packages/nixpkgs/haskellPackages.users-postgresql-simple | A PostgreSQL backend for the users package |
| packages/nixpkgs/python314Packages.pyuseragents | Giving you a random User-Agent Header |
| packages/nixpkgs/python313Packages.pyuseragents | Giving you a random User-Agent Header |
| packages/nixpkgs/python312Packages.pyuseragents | Giving you a random User-Agent Header |
| packages/nixpkgs/python313Packages.django-currentuser | Conveniently store reference to request user on thread/db level |
| packages/nixpkgs/python314Packages.django-currentuser | Conveniently store reference to request user on thread/db level |
| packages/nixpkgs/python313Packages.types-aiobotocore-license-manager-user-subscriptions | Type annotations for aiobotocore license-manager-user-subscriptions |
| packages/nixpkgs/python314Packages.types-aiobotocore-license-manager-user-subscriptions | Type annotations for aiobotocore license-manager-user-subscriptions |
| packages/nixpkgs/ocamlPackages.username_kernel | Identifier for a user |
| packages/nixpkgs/python312Packages.types-aiobotocore-license-manager-user-subscriptions | Type annotations for aiobotocore license-manager-user-subscriptions |
| packages/nixpkgs/python312Packages.django-currentuser | Conveniently store reference to request user on thread/db level |
| packages/nixpkgs/vscode-extensions.usernamehw.errorlens | Visual Studio Code extension that improves highlighting of errors, warnings and other language diagnostics |
| packages/nixpkgs/ocamlPackages_latest.username_kernel | Identifier for a user |
| packages/nixpkgs/ocamlPackages.janeStreet.username_kernel | Identifier for a user |
| packages/nixpkgs/rPackages.Randomuseragent | |
| packages/nixpkgs/ocamlPackages_latest.janeStreet.username_kernel | Identifier for a user |
| packages/nixpkgs/rPackages.paws_end_user_computing | |
| packages/nixpkgs/python313Packages.tableauserverclient | Module for working with the Tableau Server REST API |
| packages/nixpkgs/python314Packages.tableauserverclient | Module for working with the Tableau Server REST API |
| packages/nixpkgs/python312Packages.tableauserverclient | Module for working with the Tableau Server REST API |
| options/nixos/users.mysql.user | The username to use when connecting to the database
|
| options/nixos/power.ups.upsmon.user | User to run upsmon as. upsmon.conf will have its owner set to this
user
|
| options/darwin/homebrew.user | The user that owns the Homebrew installation
|
| options/nixos/users.users | Additional user accounts to be created automatically by the system
|
| options/darwin/users.users | Configuration for users.
|
| options/darwin/launchd.user.agents | Definition of per-user launchd agents
|
| options/nixos/services.qui.user | User to run qui as.
|
| options/nixos/services.znc.user | The name of an existing user account to use to own the ZNC server
process
|
| options/nixos/systemd.user.units | Definition of systemd per-user units.
|
| options/nixos/services.bee.user | User the bee binary should execute under.
|
| options/nixos/services.h2o.user | User running H2O service
|
| options/nixos/services.mpd.user | User account under which MPD runs.
|
| options/nixos/services.vdr.user | User under which the VDR service runs.
|
| options/nixos/systemd.user.paths | Definition of systemd per-user path units.
|
| options/nixos/services.cage.user | User to log-in as.
|
| options/nixos/services.node-red.user | User under which Node-RED runs
|
| options/nixos/security.agnos.user | User to run Agnos as
|
| options/nixos/services.u9fs.user | User to run u9fs under.
|
| options/nixos/services.ergo.user | The user as which to run the Ergo node.
|
| options/nixos/services.kubo.user | User under which the Kubo daemon runs
|
| options/nixos/services.ttyd.user | Which unix user ttyd should run as.
|
| options/nixos/services.mame.user | User from which you run MAME binary.
|
| options/nixos/services.unit.user | User account under which unit runs.
|
| options/nixos/services.loki.user | User under which the Loki service runs.
|
| options/nixos/services.ombi.user | User account under which Ombi runs.
|
| options/nixos/services.plex.user | User account under which Plex runs.
|
| options/nixos/services.nats.user | User account under which NATS runs.
|
| options/nixos/services.tcsd.user | User account under which tcsd runs.
|
| options/nixos/services.nscd.user | User account under which nscd runs.
|
| options/nixos/services.ocis.user | The user to run oCIS as
|
| options/nixos/services.bird-lg.user | User to run the service.
|
| options/nixos/services.ente.api.user | User under which museum runs
|
| options/nixos/services.nifi.user | User account where Apache NiFi runs.
|
| options/nixos/users.users.<name>.subUidRanges | Subordinate user ids that user is allowed to use
|
| options/nixos/services.caddy.user | User account under which caddy runs.
If left as the default value this user will automatically be created
on system activation, otherwise you are responsible for
ensuring the user exists before the Caddy service starts.
|
| options/nixos/services.mysql.user | User account under which MySQL runs.
If left as the default value this user will automatically be created
on system activation, otherwise you are responsible for
ensuring the user exists before the MySQL service starts.
|
| options/nixos/services.tt-rss.user | User account under which both the update daemon and the web-application run.
|
| options/home-manager/xdg.userDirs.extraConfig | Other user directories
|
| options/nixos/services.maddy.user | User account under which maddy runs.
If left as the default value this user will automatically be created
on system activation, otherwise the sysadmin is responsible for
ensuring the user exists before the maddy service starts.
|
| options/home-manager/xdg.userDirs.music | The Music directory.
|
| options/nixos/users.users.<name>.name | The name of the user account
|
| options/darwin/users.users.<name>.name | The name of the user account
|
| options/nixos/services.hitch.user | The user to run as
|
| options/nixos/services.db-rest.user | User account under which db-rest runs.
|
| options/nixos/services.ntfy-sh.user | User the ntfy-sh server runs under.
|
| options/home-manager/xdg.userDirs.enable | Whether to manage $XDG_CONFIG_HOME/user-dirs.dirs
|
| options/nixos/services.dspam.user | User for the dspam daemon.
|
| options/nixos/services.davis.user | User davis runs as.
|
| options/nixos/services.nexus.user | User which runs Nexus3.
|
| options/nixos/services.seatd.user | User to own the seatd socket
|
| options/nixos/services.mlmmj.user | mailinglist local user
|
| options/nixos/services.omnom.user | The Omnom service user.
|
| options/nixos/services.stash.user | User under which Stash runs.
|
| options/nixos/services.zeyple.user | User to run Zeyple as.
If left as the default value this user will automatically be created
on system activation, otherwise the sysadmin is responsible for
ensuring the user exists.
|
| options/nixos/systemd.user.slices | Definition of systemd per-user slice units.
|
| options/nixos/systemd.user.timers | Definition of systemd per-user timer units.
|
| options/home-manager/systemd.user.enable | Whether to enable the user systemd service manager.
|
| options/nixos/services.memos.user | The user to run Memos as.
If changing the default value, you are responsible of creating the corresponding user with users.users.
|
| options/nixos/services.ytdl-sub.user | User account under which ytdl-sub runs.
|
| options/nixos/users.users.<name>.enable | If set to false, the user account will not be created
|
| options/nixos/services.legit.user | User account under which legit runs.
|
| options/nixos/services.gitea.user | User account under which gitea runs.
|
| options/nixos/services.amule.user | The user the aMule daemon should run as
|
| options/nixos/services.komga.user | User account under which Komga runs.
|
| options/nixos/services.hound.user | User the hound daemon should execute under.
|
| options/nixos/services.bosun.user | User account under which bosun runs.
|
| options/nixos/services.jboss.user | User account under which jboss runs.
|
| options/nixos/services.slskd.user | User account under which slskd runs.
|
| options/nixos/services.nginx.user | User account under which nginx runs.
|
| options/nixos/services.rqbit.user | User account under which rqbit runs.
|
| options/nixos/services.movim.user | User running Movim service
|
| options/nixos/services.uwsgi.user | User account under which uWSGI runs.
|
| options/nixos/services.snipe-it.user | User snipe-it runs as.
|
| options/nixos/services.cyrus-imap.user | Cyrus IMAP user name
|
| options/darwin/users.users.<name>.uid | The user's UID.
|
| options/nixos/services.felix.user | User account under which Apache Felix runs.
|
| options/nixos/services.cgit.<name>.user | User to run the cgit service as.
|
| options/nixos/services.nipap.user | User to use for running NIPAP services.
|
| options/nixos/services.inadyn.user | User account under which inadyn runs.
If left as the default value this user will automatically be created
on system activation, otherwise you are responsible for
ensuring the user exists before the inadyn service starts.
|
| options/nixos/services.sonarr.user | User account under which Sonarr runs.";
If left as the default value this user will automatically be created
on system activation, otherwise you are responsible for
ensuring the user exists before the Sonarr service starts.
|
| options/nixos/services.murmur.user | The name of an existing user to use to run the service
|
| options/nixos/services.patroni.user | The user for the service
|
| options/nixos/services.slurm.user | Set this option when you want to run the slurmctld daemon
as something else than the default slurm user "slurm"
|
| options/darwin/users.users.<name>.gid | The user's primary group.
|
| options/nixos/services.coder.user | User under which the coder service runs.
If left as the default value this user will automatically be created
on system activation, otherwise it needs to be configured manually.
|
| options/home-manager/xdg.userDirs.package | The xdg-user-dirs package to use.
|
| options/nixos/users.mysql.pam.userColumn | The name of the column that contains a unix login name.
|
| options/nixos/services.nixops-dns.user | The user the nixops-dns daemon should run as
|
| options/nixos/services.quorum.user | The user as which to run quorum.
|
| options/nixos/services.gammu-smsd.user | User that has access to the device
|
| options/nixos/services.kismet.user | The user to run Kismet as.
|
| options/nixos/services.atticd.user | The user under which attic runs.
|
| options/nixos/services.artalk.user | Artalk user name.
|
| options/nixos/services.immich.user | The user immich should run as.
|
| options/nixos/services.monica.user | User monica runs as.
|
| options/nixos/services.pretix.user | User under which pretix should run.
|
| options/nixos/services.zammad.user | Name of the Zammad user.
|
| options/nixos/services.webhook.user | Webhook will be run under this user
|
| options/nixos/services.actual.user | User account under which Actual runs
|
| options/nixos/services.gocd-agent.user | User the Go
|
| options/nixos/services.lidarr.user | User account under which Lidarr runs.
|
| options/nixos/services.flarum.user | System user to run Flarum
|
| options/nixos/services.galene.user | User account under which galene runs.
|
| options/nixos/services.akkoma.user | User account under which Akkoma runs.
|
| options/nixos/services.bazarr.user | User account under which bazarr runs.
|
| options/nixos/services.deluge.user | User account under which deluge runs.
|
| options/nixos/services.kavita.user | User account under which Kavita runs.
|
| options/nixos/services.cross-seed.user | User to run cross-seed as.
|
| options/nixos/services.opkssh.user | System user for running opkssh
|
| options/nixos/services.nzbget.user | User account under which NZBGet runs
|
| options/nixos/services.radarr.user | User account under which Radarr runs.
|
| options/nixos/services.webdav.user | User account under which WebDAV runs.
|
| options/nixos/services.traefik.user | User under which Traefik runs.
If left as the default value this user will automatically be created
on system activation, otherwise you are responsible for
ensuring the user exists before the Traefik service starts.
|
| options/nixos/services.code-server.user | The user to run code-server as
|
| options/nixos/systemd.user.targets | Definition of systemd per-user target units.
|
| options/nixos/systemd.user.sockets | Definition of systemd per-user socket units.
|
| options/nixos/services.prosody.user | User account under which prosody runs.
If left as the default value this user will automatically be created
on system activation, otherwise you are responsible for
ensuring the user exists before the prosody service starts.
|
| options/nixos/services.gitlab.user | User to run gitlab and all related services.
|
| options/nixos/services.baikal.user | User account under which the web-application run.
|
| options/nixos/services.rspamd.user | User to use when no root privileges are required.
|
| options/nixos/services.tomcat.user | User account under which Apache Tomcat runs.
|
| options/nixos/services.sftpgo.user | User account name under which SFTPGo runs.
|
| options/nixos/users.users.<name>.home | The user's home directory.
|
| options/nixos/services.dawarich.user | User under which dawarich runs
|
| options/darwin/users.users.<name>.home | The user's home directory
|
| options/nixos/services.ebusd.mqtt.user | The MQTT user to use
|
| options/nixos/services.ollama.user | User account under which to run ollama
|
| options/nixos/users.users.<name>.subGidRanges | Subordinate group ids that user is allowed to use
|
| options/home-manager/xdg.userDirs.videos | The Videos directory.
|
| options/darwin/users.users.<name>.shell | The user's shell
|
| options/darwin/users.users.<name>.isHidden | Whether to make the user account hidden.
|
| options/nixos/services.pihole-ftl.user | User to run the service as.
|
| options/nixos/services.pyload.user | User under which pyLoad runs, and which owns the download directory.
|
| options/nixos/services.pocket-id.user | User account under which Pocket ID runs.
|
| options/home-manager/systemd.user.paths | Definition of systemd per-user path units
|
| options/nixos/services.klipper.user | User account under which Klipper runs
|
| options/nixos/services.quassel.user | The existing user the Quassel daemon should run as
|
| options/nixos/services.outline.user | User under which the service should run
|
| options/home-manager/systemd.user.packages | Packages providing systemd user units
|
| options/nixos/services.gitDaemon.user | User under which Git daemon would be running.
|
| options/nixos/users.users.<name>.autoSubUidGidRange | Automatically allocate subordinate user and group ids for this user
|
| options/nixos/systemd.user.tmpfiles.users | Per-user rules for creation, deletion and cleaning of volatile and
temporary files automatically.
|
| options/nixos/services.gancio.user | The user (and PostgreSQL database name) used to run the gancio server
|
| options/nixos/users.users.<name>.uid | The account UID
|
| options/nixos/services.rss-bridge.user | The user account under which both the service and the web application run.
|
| options/nixos/services.monero.rpc.user | User name for RPC connections.
|
| options/nixos/services.gocd-server.user | User the Go
|
| options/nixos/services.roon-server.user | User to run the Roon Server as.
|
| options/nixos/services.roon-bridge.user | User to run the Roon bridge as.
|
| options/nixos/services.opengfw.user | Username of the OpenGFW user.
|
| options/nixos/services.icecast.user | User privileges for the server.
|
| options/nixos/services.flexget.user | The user under which to run flexget.
|
| options/nixos/services.corteza.user | The user to run Corteza under.
|
| options/nixos/services.sabnzbd.user | User to run the service as
|
| options/nixos/services.pretalx.user | User under which pretalx should run.
|
| options/nixos/services.redmine.user | User under which Redmine is ran.
|
| options/nixos/services.stunnel.user | The user under which stunnel runs.
|
| options/nixos/services.zitadel.user | The user to run ZITADEL under.
|
| options/nixos/services.zerobin.user | The user 0bin should run as
|
| options/nixos/services.yandex-disk.user | The user the yandex-disk daemon should run as.
|
| options/darwin/users.users.<name>.createHome | Create the home directory when creating the user.
|
| options/nixos/services.dolibarr.user | User account under which dolibarr runs.
If left as the default value this user will automatically be created
on system activation, otherwise you are responsible for
ensuring the user exists before the dolibarr application starts.
|
| options/nixos/services.pixelfed.user | User account under which pixelfed runs.
If left as the default value this user will automatically be created
on system activation, otherwise you are responsible for
ensuring the user exists before the pixelfed application starts.
|
| options/nixos/services.seafile.user | User account under which seafile runs.
|
| options/nixos/services.haproxy.user | User account under which haproxy runs.
|
| options/nixos/services.jackett.user | User account under which Jackett runs.
|
| options/nixos/services.graylog.user | User account under which graylog runs
|
| options/nixos/services.couchdb.user | User account under which couchdb runs.
|
| options/nixos/services.jenkins.user | User the jenkins server should execute under.
|
| options/nixos/services.forgejo.user | User account under which Forgejo runs.
|
| options/nixos/services.homebox.user | User account under which Homebox runs.
|
| options/nixos/services.cgminer.user | User account under which cgminer runs
|
| options/nixos/services.netdata.user | User account under which netdata runs.
|
| options/nixos/services.owncast.user | User account under which owncast runs.
|
| options/nixos/services.pleroma.user | User account under which pleroma runs.
|
| options/nixos/services.readarr.user | User account under which Readarr runs.
|
| options/nixos/services.polaris.user | User account under which Polaris runs.
|
| options/nixos/services.unbound.user | User account under which unbound runs.
|
| options/nixos/services.mongodb.user | User account under which MongoDB runs
|
| options/nixos/services.monetdb.user | User account under which MonetDB runs.
|
| options/nixos/services.pdfding.user | User account under which PdfDing runs
|
| options/nixos/services.jigasi.userName | User part of the JID for XMPP user connection.
|
| options/nixos/services.jicofo.userName | User part of the JID for XMPP user connection.
|
| packages/nixpkgs/zfs_2_2 | ZFS Filesystem Linux Userspace Tools |
| options/nixos/services.httpd.user | User account under which httpd children processes run
|
| options/nixos/users.users.<name>.group | The user's primary group.
|
| options/nixos/services.usbmuxd.user | The user usbmuxd should use to run after startup.
|
| options/nixos/services.syncoid.user | The user for the service
|
| options/home-manager/systemd.user.slices | Definition of systemd per-user slice units
|
| options/home-manager/systemd.user.timers | Definition of systemd per-user timer units
|
| options/home-manager/systemd.user.mounts | Definition of systemd per-user mount units
|
| options/nixos/services.postfix.user | What to call the Postfix user (must be used only for postfix).
|
| options/nixos/services.podgrab.user | User under which Podgrab runs, and which owns the download directory.
|
| options/nixos/services.selfoss.user | User account under which both the service and the web-application run.
|
| options/nixos/systemd.user.services | Definition of systemd per-user service units.
|
| options/nixos/systemd.user.extraConfig | Extra config options for systemd user instances
|
| options/nixos/services.mysqlBackup.user | User to be used to perform backup.
|
| options/nixos/services.jupyter.user | Name of the user used to run the jupyter service
|
| options/nixos/users.users.<name>.subUidRanges.*.startUid | Start of the range of subordinate user ids that user is
allowed to use.
|
| options/nixos/users.mysql.pam.logging.userColumn | The name of the column in the log table to which the name of the
user being authenticated is stored.
|
| options/nixos/services.exim.user | User to use when no root privileges are required
|
| options/nixos/services.rsync.jobs.<name>.user | The name of an existing user account under which the rsync process should run.
|
| options/nixos/services.calibre-web.user | User account under which Calibre-Web runs.
|
| options/nixos/services.firefly-iii.user | User account under which firefly-iii runs.
|
| options/nixos/services.tt-rss.database.user | The database user
|
| options/nixos/users.users.<name>.createHome | Whether to create the home directory and ensure ownership as well as
permissions to match the user.
|
| options/nixos/hardware.cpu.amd.sev.user | Owner to assign to the SEV device.
|
| options/nixos/services.dovecot2.user | Dovecot user name.
|
| options/home-manager/xdg.userDirs.desktop | The Desktop directory.
|
| options/nixos/systemd.user.units.<name>.text | Text of this systemd unit.
|
| options/nixos/services.lavalink.user | The user of the service.
|
| options/nixos/services.opendkim.user | User for the daemon.
|
| options/nixos/services.postsrsd.user | User for the daemon
|
| options/nixos/services.mastodon.user | User under which mastodon runs
|
| options/nixos/services.logcheck.user | Username for the logcheck user.
|
| options/nixos/services.headscale.user | User account under which headscale runs.
If left as the default value this user will automatically be created
on system activation, otherwise you are responsible for
ensuring the user exists before the headscale service starts.
|
| options/nixos/users.users.<name>.linger | Whether to enable or disable lingering for this user
|
| options/nixos/services.kanboard.user | User under which Kanboard runs.
|
| options/nixos/services.ejabberd.user | User under which ejabberd is ran
|
| options/nixos/services.librenms.user | Name of the LibreNMS user.
|
| options/nixos/services.agorakit.user | User agorakit runs as.
|
| options/nixos/services.collectd.user | User under which to run collectd.
|
| options/nixos/services.freshrss.user | User under which FreshRSS runs.
|
| options/nixos/services.crowdsec.user | The user to run crowdsec as
|
| options/nixos/services.stalwart.user | User ownership of service
|
| options/nixos/security.tpm2.fapi.userDir | The directory where user objects are stored.
|
| options/nixos/services.matrix-tuwunel.user | The user tuwunel is run as
|
| options/nixos/services.guix.publish.user | Name of the user to change once the server is up.
|
| options/nixos/services.redis.servers.<name>.user | User account under which this instance of redis-server runs.
If left as the default value this user will automatically be
created on system activation, otherwise you are responsible for
ensuring the user exists before the redis service starts.
|
| options/nixos/services.firebird.user | User account under which firebird runs.
|
| options/nixos/services.jellyfin.user | User account under which Jellyfin runs.
|
| options/nixos/services.airsonic.user | User account under which airsonic runs.
|
| options/nixos/services.influxdb.user | User account under which influxdb runs
|
| options/nixos/services.cloudlog.user | User account under which Cloudlog runs.
|
| options/nixos/services.ersatztv.user | User account under which ErsatzTV runs.
|
| options/nixos/services.olivetin.user | The user account under which OliveTin runs.
|
| options/nixos/services.opentsdb.user | User account under which OpenTSDB runs.
|
| options/nixos/services.rtorrent.user | User account under which rtorrent runs.
|
| options/nixos/services.openldap.user | User account under which slapd runs.
|
| options/nixos/services.oxidized.user | User under which the oxidized service runs.
|
| options/nixos/services.peertube.user | User account under which Peertube runs.
|
| options/nixos/services.sniproxy.user | User account under which sniproxy runs.
|
| options/nixos/services.tautulli.user | User account under which Tautulli runs.
|
| options/nixos/services.whisparr.user | User account under which Whisparr runs.
|
| options/nixos/services.sympa.database.user | Database user
|
| options/nixos/services.gollum.user | Specifies the owner of the wiki directory
|
| options/home-manager/systemd.user.targets | Definition of systemd per-user target units
|
| options/home-manager/systemd.user.sockets | Definition of systemd per-user socket units
|
| options/nixos/services.github-runners.<name>.user | User under which to run the service
|
| options/nixos/users.users.<name>.isSystemUser | Indicates if the user is a system user or not
|
| options/home-manager/systemd.user.settings | Extra config options for user session service manager
|
| options/nixos/services.portunus.user | User account under which Portunus runs its webserver.
|
| options/nixos/services.webdav-server-rs.user | User to run under when setuid is not enabled.
|
| options/nixos/services.gitolite.user | Gitolite user account
|
| options/nixos/services.phpfpm.pools.<name>.user | User account under which this pool runs.
|
| options/nixos/services.snipe-it.mail.user | Mail username.
|
| options/nixos/services.pingvin-share.user | User account under which Pingvin Share runs.
|
| options/nixos/services.jenkinsSlave.user | User the jenkins slave agent should execute under.
|
| options/nixos/services.nginx.gitweb.user | Existing user that the CGI process will belong to. (Default almost surely will do.)
|
| options/home-manager/programs.ssh.matchBlocks.<name>.user | Specifies the user to log in as.
|
| options/nixos/users.users.<name>.subUidRanges.*.count | Count of subordinate user ids
|
| options/home-manager/xdg.userDirs.publicShare | The Public share directory.
|
| options/nixos/services.quickwit.user | The user Quickwit runs as
|
| options/nixos/services.temporal.user | The user Temporal runs as
|
| options/nixos/users.motd | Message of the day shown to users when they log in.
|
| options/nixos/services.opencloud.user | The user to run OpenCloud as
|
| options/nixos/services.gitwatch.<name>.user | The name of services's user
|
| options/nixos/services.bitcoind.<name>.user | The user as which to run bitcoind.
|
| options/nixos/services.syncthing.user | The user to run Syncthing as
|
| options/nixos/systemd.user.paths.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/systemd.user.paths.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/services.mjpg-streamer.user | mjpg-streamer user name.
|
| options/nixos/services.db-rest.redis.user | Optional username used for authentication with redis.
|
| options/nixos/systemd.user.tmpfiles.users.<name>.rules | Per-user rules for creation, deletion and cleaning of volatile and
temporary files automatically
|
| options/nixos/services.calibre-server.user | The user under which calibre-server runs.
|
| options/nixos/services.etebase-server.user | User under which Etebase server runs.
|
| options/darwin/services.github-runners.<name>.user | User under which to run the service
|
| options/nixos/systemd.user.units.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/systemd.user.paths.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/services.monica.mail.user | Mail username.
|
| options/nixos/services.octoprint.user | User for the daemon.
|
| options/nixos/services.athens.index.mysql.user | User for the MySQL database.
|
| options/nixos/services.anuko-time-tracker.user | User under which Anuko Time Tracker runs.
|
| options/nixos/users.extraUsers.<name>.subUidRanges | Subordinate user ids that user is allowed to use
|
| options/nixos/services.commafeed.user | User under which CommaFeed runs.
|
| options/nixos/services.bookstack.user | User bookstack runs as
|
| options/nixos/services.bitmagnet.user | User running bitmagnet
|
| options/nixos/services.blendfarm.user | User under which blendfarm runs.
|
| options/nixos/services.librechat.user | The user to run the service as.
|
| options/nixos/services.memcached.user | The user to run Memcached as
|
| options/nixos/services.pgbouncer.user | The user pgbouncer is run as.
|
| options/nixos/services.sickbeard.user | User to run the service as
|
| options/nixos/services.navidrome.user | User under which Navidrome runs.
|
| options/nixos/services.paperless.user | User under which Paperless runs.
|
| options/home-manager/systemd.user.services | Definition of systemd per-user service units
|
| options/nixos/systemd.user.paths.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/services.charybdis.user | Charybdis IRC daemon user.
|
| options/nixos/services.kapacitor.user | User account under which Kapacitor runs
|
| options/nixos/services.cassandra.user | Run Apache Cassandra under this user.
|
| options/nixos/services.glitchtip.user | The user account under which GlitchTip runs.
|
| options/nixos/services.mediatomb.user | User account under which the service runs.
|
| options/nixos/services.recyclarr.user | User account under which recyclarr runs.
|
| options/nixos/services.rutorrent.user | User which runs the ruTorrent service.
|
| options/nixos/services.pinchflat.user | User account under which Pinchflat runs.
|
| options/nixos/services.rethinkdb.user | User account under which RethinkDB runs.
|
| options/nixos/services.stargazer.user | User account under which stargazer runs.
|
| options/nixos/services.moonraker.user | User account under which Moonraker runs.
|
| options/nixos/users.users.<name>.packages | The set of packages that should be made available to the user
|
| options/darwin/users.users.<name>.packages | The set of packages that should be made availabe to the user
|
| options/nixos/services.portunus.ldap.user | User account under which Portunus runs its LDAP server.
|
| options/nixos/services.varnish.listen.*.user | User name who owns the socket file.
|
| options/nixos/services.gitea.database.user | Database user.
|
| options/nixos/users.users.<name>.homeMode | The user's home directory mode in numeric format
|
| options/nixos/hardware.cpu.amd.sevGuest.user | Owner to assign to the SEV guest device.
|
| options/nixos/services.infinoted.user | What to call the dedicated user under which infinoted is run
|
| options/nixos/services.sourcehut.hg.user | User for hg.sr.ht.
|
| options/nixos/services.i2pd.proto.http.user | Username for webconsole access
|
| options/nixos/users.users.<name>.shell | The path to the user's shell
|
| options/nixos/users.users.<name>.subGidRanges.*.startGid | Start of the range of subordinate group ids that user is
allowed to use.
|
| options/home-manager/xdg.userDirs.download | The Downloads directory.
|
| options/home-manager/xdg.userDirs.pictures | The Pictures directory.
|
| options/nixos/services.sitespeed-io.user | User account under which sitespeed-io runs.
|
| options/nixos/systemd.user.timers.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/systemd.user.slices.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/systemd.user.timers.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/systemd.user.slices.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/services.sourcehut.git.user | User for git.sr.ht.
|
| options/nixos/services.sourcehut.man.user | User for man.sr.ht.
|
| options/nixos/services.sourcehut.hub.user | User for hub.sr.ht.
|
| options/nixos/services.journald.gateway.user | Serve entries from services for the current user
|
| options/nixos/services.restic.backups.<name>.user | As which user the backup should run.
|
| options/nixos/users.users.<name>.pamMount | Attributes for user's entry in
pam_mount.conf.xml
|
| options/nixos/services.tandoor-recipes.user | User account under which Tandoor runs.
|
| options/nixos/services.gollum.user-icons | Enable specific user icons for history view
|
| options/nixos/services.selfoss.database.user | The database user
|
| options/nixos/systemd.user.slices.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/systemd.user.timers.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/systemd.user.paths.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/users.users.<name>.expires | Set the date on which the user's account will no longer be
accessible
|
| options/nixos/services.ente.api.settings.db.user | The database user
|
| options/nixos/services.namecoind.rpc.user | User name for RPC connections.
|
| options/home-manager/programs.sapling.userName | Default user name to use.
|
| options/nixos/services.handheld-daemon.user | The user to run Handheld Daemon with.
|
| options/nixos/services.buildbot-master.user | User the buildbot server should execute under.
|
| options/nixos/services.buildbot-worker.user | User the buildbot Worker should execute under.
|
| options/nixos/services.plantuml-server.user | User which runs PlantUML server.
|
| options/darwin/launchd.user.agents.<name>.path | Packages added to the service's PATH
environment variable
|
| options/nixos/services.gammu-smsd.backend.sql.user | User name used for connection to the database
|
| options/nixos/systemd.user.tmpfiles.rules | Global user rules for creation, deletion and cleaning of volatile and
temporary files automatically
|
| options/nixos/services.sourcehut.todo.user | User for todo.sr.ht.
|
| options/nixos/services.sourcehut.meta.user | User for meta.sr.ht.
|
| options/nixos/services.moodle.database.user | Database user.
|
| options/nixos/services.zammad.database.user | Database user.
|
| options/nixos/services.smokeping.user | User that runs smokeping and (optionally) thttpd
|
| options/nixos/systemd.user.paths.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.user.slices.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/systemd.user.timers.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/services.peertube-runner.user | User account under which peertube-runner runs.
|
| options/nixos/services.suwayomi-server.user | User account under which Suwayomi-Server runs.
|
| options/nixos/services.tailscaleAuth.user | User which runs tailscale-nginx-auth
|
| options/nixos/services.xinetd.services.*.user | User account for the service
|
| options/nixos/systemd.user.tmpfiles.enable | Whether to enable systemd user units systemd-tmpfiles-setup.service and systemd-tmpfiles-clean.timer.
|
| options/home-manager/services.podman.volumes.<name>.user | The user ID owning the volume inside the container.
|
| options/nixos/services.immich.database.user | The database user for immich.
|
| options/nixos/users.users.<name>.extraGroups | The user's auxiliary groups.
|
| options/nixos/services.code-server.userDataDir | Path to the user data directory.
|
| options/nixos/users.users.<name>.cryptHomeLuks | Path to encrypted luks device that contains
the user's home directory.
|
| options/nixos/users.users.<name>.isNormalUser | Indicates whether this is an account for a “real” user
|
| options/nixos/systemd.user.units.<name>.aliases | Aliases of that unit.
|
| options/nixos/systemd.user.paths.<name>.aliases | Aliases of that unit.
|
| options/nixos/services.weblate.smtp.user | SMTP login name.
|
| options/nixos/services.wakapi.database.user | The name of the user to use for Wakapi.
|
| options/nixos/services.gns3-server.auth.user | Username used to access the GNS3 Server.
|
| options/home-manager/vdirsyncer.userAgent | The user agent to report to the server
|
| options/nixos/services.zabbixWeb.database.user | Database user.
|
| options/nixos/services.duplicati.user | Duplicati runs as it's own user
|
| options/nixos/services.taskserver.user | User for Taskserver.
|
| options/nixos/services.vdirsyncer.jobs.<name>.user | User account to run vdirsyncer as, otherwise as a systemd
dynamic user
|
| options/nixos/services.filesender.user | User under which filesender runs.
|
| options/nixos/services.sourcehut.lists.user | User for lists.sr.ht.
|
| options/nixos/services.sourcehut.pages.user | User for pages.sr.ht.
|
| options/nixos/services.sourcehut.paste.user | User for paste.sr.ht.
|
| options/nixos/services.homebridge.user | User to run homebridge as.
|
| options/nixos/services.headphones.user | User to run the service as
|
| options/nixos/services.govee2mqtt.user | User under which Govee2MQTT should run.
|
| options/nixos/services.photoprism.user | User under which photoprism runs.
|
| options/nixos/services.microsocks.user | User microsocks runs as.
|
| options/nixos/services.reposilite.user | The user to run Reposilite under.
|
| options/nixos/services.linkwarden.user | The user Linkwarden should run as.
|
| options/nixos/services.vsftpd.userDbPath | Only applies if enableVirtualUsers is true
|
| options/nixos/users.extraUsers.<name>.enable | If set to false, the user account will not be created
|
| options/home-manager/programs.sapling.userEmail | Default user email to use.
|
| options/nixos/services.shairport-sync.user | User account name under which to run shairport-sync
|
| options/darwin/launchd.user.agents.<name>.script | Shell commands executed as the service's main process.
|
| options/home-manager/xdg.userDirs.setSessionVariables | Whether to set the XDG user dir environment variables, like
XDG_DESKTOP_DIR.
The recommended way to get these values is via the xdg-user-dir
command or by processing $XDG_CONFIG_HOME/user-dirs.dirs directly in
your application.
This defaults to true for state version < 26.05 and false otherwise.
|
| options/nixos/services.scollector.user | User account under which scollector runs.
|
| options/nixos/services.szurubooru.user | User account under which Szurubooru runs.
|
| options/nixos/services.mattermost.user | User which runs the Mattermost service.
|
| options/nixos/services.privatebin.user | User account under which privatebin runs.
|
| options/nixos/services.lubelogger.user | User account under which LubeLogger runs.
|
| options/nixos/power.ups.upsmon.monitor.<name>.user | Username from upsd.users for accessing this UPS
|
| options/nixos/services.jigasi.userDomain | Domain part of the JID for XMPP user connection.
|
| options/nixos/services.jicofo.userDomain | Domain part of the JID for XMPP user connection.
|
| options/nixos/systemd.user.sockets.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/systemd.user.targets.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/systemd.user.units.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.user.paths.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.user.timers.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/systemd.user.slices.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/systemd.user.targets.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/systemd.user.sockets.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/services.node-red.userDir | The directory to store all user data, such as flow and credential files and all library data
|
| options/nixos/services.nullmailer.user | User to use to run nullmailer-send.
|
| options/darwin/launchd.agents | Definition of per-user launchd agents
|
| options/nixos/services.forgejo.database.user | Database user.
|
| options/nixos/services.redmine.database.user | Database user.
|
| options/nixos/services.pdfding.database.user | PostgreSQL user
|
| options/nixos/services.vikunja.database.user | Database user.
|
| options/nixos/services.borgbackup.jobs.<name>.user | The user borg is run as
|
| options/nixos/systemd.user.sockets.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/systemd.user.targets.<name>.name | The name of this systemd unit, including its extension
|
| options/nixos/systemd.user.timers.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.user.slices.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/services.gnome.gnome-user-share.enable | Whether to enable GNOME User Share, a user-level file sharing service for GNOME.
|
| options/nixos/services.icecast.admin.user | Username used for all administration functions.
|
| options/nixos/services.openvscode-server.user | The user to run openvscode-server as
|
| options/darwin/users.knownUsers | List of users owned and managed by nix-darwin
|
| options/nixos/systemd.user.paths.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.user.units.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.user.slices.<name>.aliases | Aliases of that unit.
|
| options/nixos/systemd.user.timers.<name>.aliases | Aliases of that unit.
|
| options/nixos/users.mysql.pam | Settings for pam_mysql
|
| options/nixos/systemd.user.targets.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/systemd.user.sockets.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/systemd.user.paths.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/services.icecream.daemon.user | User to run the icecream daemon as
|
| options/nixos/services.opensearch.user | The user OpenSearch runs as
|
| options/nixos/users.ldap.base | The distinguished name of the search base.
|
| options/nixos/services.komodo-periphery.user | User under which the Periphery agent runs.
|
| options/nixos/users.users.<name>.password | Specifies the (clear text) password for the user
|
| options/nixos/services.autossh.sessions.*.user | Name of the user the AutoSSH session should run as
|
| options/darwin/services.autossh.sessions.*.user | Name of the user the AutoSSH session should run as
|
| options/nixos/services.sourcehut.builds.user | User for builds.sr.ht.
|
| options/nixos/services.zabbixProxy.database.user | Database user.
|
| options/nixos/services.healthchecks.user | User account under which healthchecks runs.
If left as the default value this user will automatically be created
on system activation, otherwise you are responsible for
ensuring the user exists before the healthchecks service starts.
|
| options/nixos/services.agorakit.mail.user | Mail username.
|
| options/nixos/services.unpoller.loki.user | Username for Loki.
|
| options/nixos/services.cloudflare-ddns.user | User account under which the service runs.
|
| options/nixos/systemd.user.paths.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.user.paths.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/services.borgbackup.repos.<name>.user | The user borg serve is run as
|
| options/nixos/systemd.user.generators | Definition of systemd generators; see systemd.generator(5)
|
| options/nixos/environment.etc.<name>.user | User name of file owner
|
| options/nixos/services.kimai.sites.<name>.database.user | Database user.
|
| options/nixos/services.logcheck.ignoreCron.<name>.user | User that runs the cronjob.
|
| options/nixos/systemd.user.paths.<name>.pathConfig | Each attribute in this set specifies an option in the
[Path] section of the unit
|
| options/nixos/systemd.user.paths.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/users.motdFile | A file containing the message of the day shown to users when they log in.
|
| options/nixos/services.dawarich.smtp.user | SMTP login name.
|
| options/nixos/services.mastodon.smtp.user | SMTP login name.
|
| options/home-manager/xdg.userDirs.templates | The Templates directory.
|
| options/home-manager/xdg.userDirs.documents | The Documents directory.
|
| options/darwin/launchd.user.agents.<name>.command | Command executed as the service's main process.
|
| options/nixos/systemd.user.timers.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.user.slices.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/services.misskey.settings.db.user | The user used for database authentication.
|
| options/darwin/users.groups | Configuration for groups.
|
| options/nixos/services.athens.index.postgres.user | User for the Postgres database.
|
| options/nixos/systemd.user.timers.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.user.slices.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.user.services.<name>.preStop | Shell commands executed to stop the service.
|
| options/nixos/systemd.user.sockets.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/nixos/systemd.user.targets.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/home-manager/systemd.user.automounts | Definition of systemd per-user automount units
|
| options/nixos/services.netbird.clients.<name>.user.name | A system user name for this client instance.
|
| options/nixos/services.netbird.tunnels.<name>.user.name | A system user name for this client instance.
|
| options/nixos/services.hbase-standalone.user | User account under which HBase runs.
|
| options/nixos/services.castopod.database.user | Database user.
|
| options/nixos/services.mastodon.database.user | Database user.
|
| options/nixos/services.peertube.database.user | Database user.
|
| options/nixos/services.windmill.database.user | Database user.
|
| options/nixos/services.zabbixServer.database.user | Database user.
|
| options/nixos/users.extraUsers.<name>.subGidRanges | Subordinate group ids that user is allowed to use
|
| options/nixos/users.users.<name>.subGidRanges.*.count | Count of subordinate group ids
|
| options/nixos/users.extraUsers.<name>.name | The name of the user account
|
| options/nixos/services.movim.database.user | Database username.
|
| options/nixos/services.displayManager.autoLogin.user | User to be used for the automatic login.
|
| options/nixos/services.grafana.settings.smtp.user | User used for authentication.
|
| options/nixos/systemd.user.services.<name>.wants | Start the specified units when this unit is started.
|
| options/nixos/systemd.user.slices.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/systemd.user.targets.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.user.services.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| options/nixos/systemd.user.sockets.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/systemd.user.timers.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/services.cloudlog.database.user | MySQL user name.
|
| options/nixos/services.freshrss.database.user | Database user for FreshRSS.
|
| options/nixos/services.dawarich.database.user | The database user for dawarich.
|
| options/nixos/services.asusd.userLedModesConfig | The content of /etc/asusd/asusd-user-ledmodes.ron
|
| options/nixos/services.dragonflydb.user | The user to run DragonflyDB as
|
| options/nixos/services.meshtasticd.user | User meshtasticd runs as.
|
| options/nixos/services.writefreely.user | User under which Writefreely is ran.
|
| options/nixos/users.users.<name>.hashedPassword | Specifies the hashed password for the user
|
| options/home-manager/systemd.user.sessionVariables | Environment variables that will be set for the user session
|
| options/nixos/services.drupal.sites.<name>.database.user | Database user.
|
| options/nixos/systemd.user.sockets.<name>.aliases | Aliases of that unit.
|
| options/nixos/systemd.user.targets.<name>.aliases | Aliases of that unit.
|
| options/nixos/services.snipe-it.database.user | Database username.
|
| options/nixos/services.filebrowser.user | User account under which FileBrowser runs.
|
| options/nixos/services.cockroachdb.user | User account under which CockroachDB runs
|
| options/nixos/services.qbittorrent.user | User account under which qbittorrent runs.
|
| options/nixos/services.znc.confOptions.userName | The user name used to log in to the ZNC web admin interface.
|
| options/nixos/users.extraUsers.<name>.autoSubUidGidRange | Automatically allocate subordinate user and group ids for this user
|
| options/nixos/systemd.user.slices.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.user.timers.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/systemd.user.timers.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.user.slices.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/systemd.user.services.<name>.name | The name of this systemd unit, including its extension
|
| options/home-manager/systemd.user.tmpfiles.rules | Rules for creating and cleaning up temporary files
automatically
|
| options/nixos/services.firefly-iii-data-importer.user | User account under which firefly-iii-data-importer runs.
|
| options/nixos/users.mutableUsers | If set to true, you are free to add new users and groups to the system
with the ordinary useradd and
groupadd commands
|
| options/nixos/services.sillytavern.user | User account under which the web-application run.
|
| options/nixos/services.wyoming.satellite.user | User to run wyoming-satellite under.
|
| options/nixos/users.users.<name>.useDefaultShell | If true, the user's shell will be set to
users.defaultUserShell.
|
| options/home-manager/programs.sftpman.mounts.<name>.user | The username to authenticate with.
|
| options/nixos/systemd.user.timers.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/systemd.user.slices.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/systemd.user.services.<name>.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| options/nixos/systemd.user.services.<name>.postStop | Shell commands executed after the service's main process
has exited.
|
| options/nixos/services.vault-agent.instances.<name>.user | User under which this instance runs.
|
| options/nixos/systemd.user.targets.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.user.sockets.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/services.silverbullet.user | The user to run Silverbullet as
|
| options/nixos/systemd.user.services.<name>.path | Packages added to the service's PATH
environment variable
|
| options/nixos/users.groups | Additional groups to be created automatically by the system.
|
| options/nixos/systemd.user.sockets.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/systemd.user.targets.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/home-manager/programs.sbt.credentials.*.user | The user you're using to authenticate.
|
| options/nixos/systemd.user.services.<name>.preStart | Shell commands executed before the service's main process
is started.
|
| options/home-manager/programs.mercurial.userName | Default user name to use.
|
| options/nixos/systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.user | The user of the file
|
| options/nixos/users.mysql.host | The hostname of the MySQL/MariaDB server
|
| options/nixos/services.bookstack.mail.user | Mail username.
|
| options/nixos/services.monica.database.user | Database username.
|
| options/nixos/systemd.user.paths.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/systemd.user.paths.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.user.units.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/home-manager/programs.hexchat.channels.<name>.userName | User name
|
| options/nixos/systemd.user.services.<name>.script | Shell commands executed as the service's main process.
|
| options/nixos/virtualisation.appvm.user | AppVM user login
|
| options/nixos/systemd.user.slices.<name>.sliceConfig | Each attribute in this set specifies an option in the
[Slice] section of the unit
|
| options/nixos/systemd.user.targets.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/systemd.user.sockets.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/systemd.user.services.<name>.bindsTo | Like ‘requires’, but in addition, if the specified units
unexpectedly disappear, this unit will be stopped as well.
|
| options/home-manager/vdirsyncer.userNameCommand | A command that prints the user name to standard output.
|
| options/nixos/services.suricata.settings.run-as.user | Run Suricata with a specific user-id.
|
| options/nixos/services.mediawiki.database.user | Database user.
|
| options/nixos/users.users.<name>.initialPassword | Specifies the initial password for the user, i.e. the
password assigned if the user does not already exist
|
| options/nixos/systemd.user.services.<name>.postStart | Shell commands executed after the service's main process
is started.
|
| options/nixos/systemd.user.services.<name>.reload | Shell commands executed when the service's main process
is reloaded.
|
| options/home-manager/systemd.user.systemctlPath | Absolute path to the systemctl tool
|
| options/nixos/systemd.user.paths.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/services.mailman.ldap.userSearch.ou | Organizational unit to look up a user.
|
| options/nixos/users.extraUsers | Alias of users.users.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.UserName | This optional key specifies the user to run the job as
|
| options/nixos/systemd.user.sockets.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.user.sockets.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/systemd.user.targets.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.user.targets.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/systemd.user.services.<name>.before | If the specified units are started at the same time as
this unit, delay them until this unit has started.
|
| options/nixos/users.extraUsers.<name>.subUidRanges.*.startUid | Start of the range of subordinate user ids that user is
allowed to use.
|
| options/nixos/power.ups.users | Users that can access upsd
|
| options/home-manager/programs.mercurial.userEmail | Default user email to use.
|
| options/nixos/services.anubis.defaultOptions.user | The user under which Anubis is run
|
| options/nixos/systemd.user.timers.<name>.timerConfig | Each attribute in this set specifies an option in the
[Timer] section of the unit
|
| options/nixos/systemd.user.targets.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/systemd.user.sockets.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/darwin/users.users.<name>.description | A short description of the user account, typically the
user's full name
|
| options/nixos/systemd.user.services.<name>.aliases | Aliases of that unit.
|
| options/nixos/systemd.user.services.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/services.anubis.instances.<name>.user | The user under which Anubis is run
|
| options/home-manager/services.podman.containers.<name>.user | The user ID inside the container.
|
| options/nixos/users.extraUsers.<name>.linger | Whether to enable or disable lingering for this user
|
| options/nixos/services.oncall.settings.db.conn.kwargs.user | Database user.
|
| options/nixos/services.unpoller.unifi.defaults.user | Unifi service user name.
|
| options/nixos/users.users.<name>.initialHashedPassword | Specifies the initial hashed password for the user, i.e. the
hashed password assigned if the user does not already
exist
|
| options/darwin/launchd.user.envVariables | A set of environment variables to be set on all future
processes launched by launchd in the caller's context
|
| options/nixos/systemd.user.slices.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/systemd.user.timers.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/systemd.user.slices.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.user.timers.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.user.paths.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/systemd.user.units.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.user.paths.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/services.blockbook-frontend.<name>.user | The user as which to run blockbook-frontend-‹name›.
|
| options/nixos/services.amazon-cloudwatch-agent.user | The user that runs the Amazon CloudWatch Agent.
|
| options/nixos/services.foundationdb.user | User account under which FoundationDB runs.
|
| options/nixos/services.matterbridge.user | User which runs the matterbridge service.
|
| options/nixos/services.transmission.user | User account under which Transmission runs.
|
| options/nixos/systemd.user.services.<name>.upheldBy | Keep this unit running as long as the listed units are running
|
| options/nixos/users.allowNoPasswordLogin | Disable checking that at least the root user or a user in the wheel group can log in using
a password or an SSH key
|
| options/nixos/services.authelia.instances.<name>.user | The name of the user for this authelia instance.
|
| options/nixos/services.jigasi.userPasswordFile | Path to file containing password for XMPP user connection.
|
| options/nixos/services.jicofo.userPasswordFile | Path to file containing password for XMPP user connection.
|
| options/nixos/services.triggerhappy.user | User account under which triggerhappy runs.
|
| options/nixos/services.sftpgo.settings.smtp.user | SMTP username.
|
| options/nixos/systemd.user.timers.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/systemd.user.slices.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/services.hylafax.userAccessFile | The hosts.hfaxd
file entry in the spooling area
will be symlinked to the location given here
|
| options/nixos/services.kasmweb.postgres.user | Username to use for the postgres database.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig | Each attribute in this set specifies an option for a key in the plist.
https://developer.apple.com/legacy/library/documentation/Darwin/Reference/ManPages/man5/launchd.plist.5.html
|
| options/nixos/boot.loader.grub.users | User accounts for GRUB
|
| options/nixos/programs.weylus.users | To enable stylus and multi-touch support, the user you're going to use must be added to this list
|
| options/nixos/services.xserver.desktopManager.phosh.user | The user to run the Phosh service.
|
| options/nixos/systemd.user.services.<name>.upholds | Keeps the specified running while this unit is running
|
| options/nixos/systemd.user.paths.<name>.requisite | Similar to requires
|
| options/nixos/users.users.<name>.hashedPasswordFile | The full path to a file that contains the hash of the user's
password
|
| options/nixos/services.filesender.database.user | Database user.
|
| options/nixos/services.szurubooru.database.user | PostgreSQL user.
|
| options/nixos/services.limesurvey.database.user | Database user.
|
| options/nixos/services.reposilite.database.user | Database user.
|
| options/nixos/services.nginx.tailscaleAuth.user | Alias of services.tailscaleAuth.user.
|
| options/nixos/users.mysql.nss | Settings for libnss-mysql
|
| options/nixos/systemd.user.services.<name>.onFailure | A list of one or more units that are activated when
this unit enters the "failed" state.
|
| options/nixos/systemd.user.services.<name>.onSuccess | A list of one or more units that are activated when
this unit enters the "inactive" state.
|
| options/nixos/services.znc.confOptions.userModules | A list of user modules to include in the znc.conf file.
|
| options/nixos/services.linkwarden.database.user | The database user for Linkwarden.
|
| options/nixos/users.ldap.loginPam | Whether to include authentication against LDAP in login PAM.
|
| options/nixos/systemd.user.services.<name>.startAt | Automatically start this unit at the given date/time, which
must be in the format described in
systemd.time(7)
|
| options/nixos/users.users.<name>.description | A short description of the user account, typically the
user's full name
|
| options/nixos/systemd.user.timers.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/systemd.user.slices.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/services.plausible.mail.smtp.user | The username/email in case SMTP auth is enabled.
|
| options/nixos/services.mailman.ldap.userSearch.query | Query to find a user in the LDAP database.
|
| options/nixos/programs.fuse.userAllowOther | Allow non-root users to specify the allow_other or allow_root mount
options, see mount.fuse3(8).
|
| options/nixos/systemd.user.timers.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.user.slices.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/home-manager/accounts.email.accounts.<name>.userName | The server username of this account
|
| options/nixos/users.extraUsers.<name>.isSystemUser | Indicates if the user is a system user or not
|
| options/nixos/users.ldap.useTLS | If enabled, use TLS (encryption) over an LDAP (port 389)
connection
|
| options/nixos/users.groups.<name>.members | The user names of the group members, added to the
/etc/group file.
|
| options/nixos/services.anki-sync-server.users.*.username | User name accepted by anki-sync-server.
|
| options/nixos/users.ldap.server | The URL of the LDAP server.
|
| options/nixos/systemd.user.services.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| options/nixos/users.mysql.passwordFile | The path to the file containing the password for the user
|
| options/nixos/users.users.<name>.ignoreShellProgramCheck | By default, nixos will check that programs
|
| options/nixos/systemd.user.targets.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/systemd.user.sockets.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.user | The user of the file
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.GroupName | This optional key specifies the group to run the job as
|
| options/nixos/services.netbird.server.coturn.user | The username used by netbird to connect to the coturn server.
|
| options/nixos/systemd.user.targets.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/systemd.user.sockets.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/home-manager/xdg.userDirs.createDirectories | Whether to enable automatic creation of the XDG user directories.
|
| options/home-manager/programs.cudatext.userSettings | User configuration for Cudatext.
|
| options/nixos/services.fcgiwrap.instances.<name>.process.user | User as which this instance of fcgiwrap will be run
|
| options/darwin/users.users.<name>.ignoreShellProgramCheck | By default, nix-darwin will check that programs
|
| options/home-manager/home.username | The user's username.
|
| options/nixos/systemd.user.sockets.<name>.socketConfig | Each attribute in this set specifies an option in the
[Socket] section of the unit
|
| options/nixos/services.keepalived.vrrpScripts.<name>.user | Name of user to run the script under.
|
| options/nixos/services.nntp-proxy.users | NNTP-Proxy user configuration
|
| options/nixos/systemd.user.sockets.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/systemd.user.services.<name>.scriptArgs | Arguments passed to the main process script
|
| options/nixos/systemd.user.targets.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/services.agorakit.database.user | Database username.
|
| options/nixos/services.dolibarr.database.user | Database username.
|
| options/nixos/services.unpoller.influxdb.user | Username for the influxdb.
|
| options/home-manager/programs.zed-editor.userDebug | Configuration written to Zed's debug.json
|
| options/nixos/services.grafana.settings.database.user | The database user (not applicable for sqlite3).
|
| options/nixos/systemd.user.slices.<name>.requisite | Similar to requires
|
| options/nixos/systemd.user.timers.<name>.requisite | Similar to requires
|
| options/nixos/services.wordpress.sites.<name>.database.user | Database user.
|
| options/darwin/users.groups.<name>.gid | The group's GID.
|
| options/nixos/services.prosody.uploadHttp.userQuota | Maximum size of all uploaded files per user, in bytes
|
| options/home-manager/programs.zed-editor.userTasks | Configuration written to Zed's tasks.json.
List of tasks that can be run from the
command palette.
|
| options/nixos/users.ldap.enable | Whether to enable authentication against an LDAP server.
|
| options/nixos/users.extraGroups | Alias of users.groups.
|
| options/nixos/systemd.user.sockets.<name>.listenStreams | For each item in this list, a ListenStream
option in the [Socket] section will be created.
|
| options/nixos/power.ups.users.<name>.actions | Allow the user to do certain things with upsd
|
| options/home-manager/systemd.user.servicesStartTimeoutMs | How long to wait for started services to fail until their start is
considered successful
|
| options/nixos/services.nebula-lighthouse-service.user | The user and group to run nebula-lighthouse-service as.
|
| options/nixos/hardware.cpu.intel.sgx.provision.user | Owner to assign to the SGX provisioning device.
|
| options/nixos/services.gancio.userLocale | Override default locales within gancio
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Nice | This optional key specifies what nice(3) value should be applied to the daemon.
|
| packages/nixpkgs/linux-gpib | Support package for GPIB (IEEE 488) hardware |
| options/nixos/users.ldap.daemon.enable | Whether to let the nslcd daemon (nss-pam-ldapd) handle the
LDAP lookups for NSS and PAM
|
| options/nixos/systemd.user.sockets.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/systemd.user.targets.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/systemd.user.sockets.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/systemd.user.targets.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/services.consul-template.instances.<name>.user | User under which this instance runs.
|
| options/nixos/services.netbird.tunnels.<name>.user.group | A system group name for this client instance.
|
| options/nixos/services.netbird.clients.<name>.user.group | A system group name for this client instance.
|
| options/nixos/services.matrix-continuwuity.user | The user continuwuity is run as.
|
| options/nixos/services.wasabibackend.user | The user as which to run the wasabibackend node.
|
| options/nixos/users.extraUsers.<name>.createHome | Whether to create the home directory and ensure ownership as well as
permissions to match the user.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Label | This required key uniquely identifies the job to launchd.
|
| options/home-manager/programs.pianobar.settings.user | Username or emaill address for Pandora music service authentication
|
| options/home-manager/systemd.user.startServices | Whether new or changed services that are wanted by active targets
should be started
|
| options/nixos/systemd.user.services.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| options/nixos/services.writefreely.database.user | The database user to connect as.
|
| options/nixos/users.mysql.pam.where | Additional criteria for the query.
|
| options/nixos/systemd.user.services.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| options/nixos/services.avahi.publish.userServices | Whether to publish user services
|
| options/nixos/services.anuko-time-tracker.database.user | Database username.
|
| options/nixos/systemd.user.targets.<name>.requisite | Similar to requires
|
| options/nixos/systemd.user.paths.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.user.sockets.<name>.requisite | Similar to requires
|
| options/nixos/services.fcgiwrap.instances.<name>.socket.user | User to be set as owner of the UNIX socket.
|
| options/nixos/users.extraUsers.<name>.password | Specifies the (clear text) password for the user
|
| options/nixos/services.akkoma.initDb.username | Name of the database user to initialise the database with
|
| options/home-manager/programs.floorp.profiles.<name>.userChrome | Custom Floorp user chrome CSS.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.userKnownHostsFile | Specifies one or more files to use for the user host key
database, separated by whitespace
|
| options/nixos/services.nextcloud-spreed-signaling.user | User account under which to run the Spreed signaling server.
|
| options/nixos/services.foldingathome.user | The user associated with the reported computation results
|
| options/nixos/services.wasabibackend.rpc.user | RPC user for the bitcoin endpoint.
|
| options/nixos/systemd.user.services.<name>.startLimitBurst | Configure unit start rate limiting
|
| options/nixos/services.taskchampion-sync-server.user | Unix User to run the server under
|
| options/home-manager/systemd.user.services.<name>.Service.ExecStart | Command that is executed when this service is started.
|
| options/home-manager/programs.zed-editor.userKeymaps | Configuration written to Zed's keymap.json.
|
| options/nixos/services.bookstack.database.user | Database username.
|
| options/nixos/systemd.user.paths.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Debug | This optional key specifies that launchd should adjust its log mask temporarily to LOG_DEBUG while
dealing with this job.
|
| options/nixos/users.extraUsers.<name>.hashedPassword | Specifies the hashed password for the user
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.RunAtLoad | This optional key is used to control whether your job is launched once at the time the job is loaded
|
| options/nixos/services.prometheus.exporters.pve.user | User name under which the pve exporter shall be run.
|
| options/nixos/services.prometheus.exporters.nut.user | User name under which the nut exporter shall be run.
|
| options/nixos/services.prometheus.exporters.kea.user | User name under which the kea exporter shall be run.
|
| options/nixos/services.prometheus.exporters.sql.user | User name under which the sql exporter shall be run.
|
| options/nixos/services.prometheus.exporters.zfs.user | User name under which the zfs exporter shall be run.
|
| options/nixos/services.prometheus.exporters.lnd.user | User name under which the lnd exporter shall be run.
|
| options/nixos/systemd.user.paths.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/users.defaultUserShell | This option defines the default shell assigned to user
accounts
|
| options/nixos/users.extraGroups.<name>.members | The user names of the group members, added to the
/etc/group file.
|
| options/nixos/systemd.user.services.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| options/nixos/systemd.user.services.<name>.requiredBy | Units that require (i.e. depend on and need to go down with) this unit
|
| options/nixos/services.github-runners.<name>.group | Group under which to run the service
|
| options/home-manager/systemd.user.services.<name>.Unit.X-SwitchMethod | The preferred method to use when switching from an old to a new
version of this service.
|
| options/nixos/services.asusd.userLedModesConfig.text | Text of the file.
|
| options/nixos/users.extraUsers.<name>.subUidRanges.*.count | Count of subordinate user ids
|
| options/nixos/services.bitmagnet.settings.postgres.user | User to connect as
|
| options/nixos/services.prometheus.exporters.snmp.user | User name under which the snmp exporter shall be run.
|
| options/nixos/services.prometheus.exporters.bind.user | User name under which the bind exporter shall be run.
|
| options/nixos/services.prometheus.exporters.ipmi.user | User name under which the ipmi exporter shall be run.
|
| options/nixos/services.prometheus.exporters.flow.user | User name under which the flow exporter shall be run.
|
| options/nixos/services.prometheus.exporters.nats.user | User name under which the nats exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mail.user | User name under which the mail exporter shall be run.
|
| options/nixos/services.prometheus.exporters.ping.user | User name under which the ping exporter shall be run.
|
| options/nixos/services.prometheus.exporters.bird.user | User name under which the bird exporter shall be run.
|
| options/nixos/services.prometheus.exporters.ebpf.user | User name under which the ebpf exporter shall be run.
|
| options/nixos/services.prometheus.exporters.json.user | User name under which the json exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mqtt.user | User name under which the mqtt exporter shall be run.
|
| options/nixos/services.prometheus.exporters.node.user | User name under which the node exporter shall be run.
|
| options/nixos/services.prometheus.exporters.knot.user | User name under which the knot exporter shall be run.
|
| options/nixos/systemd.user.slices.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.user.timers.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/home-manager/services.podman.containers.<name>.userNS | Use a user namespace for the container.
|
| options/nixos/users.groups.<name>.gid | The group GID
|
| options/nixos/services.diod.squashuser | Change the squash user
|
| options/nixos/services.prometheus.exporters.php-fpm.user | User name under which the php-fpm exporter shall be run.
|
| options/nixos/services.prometheus.exporters.chrony.user | User name under which the chrony exporter shall be run
|
| options/nixos/systemd.user.services.<name>.serviceConfig | Each attribute in this set specifies an option in the
[Service] section of the unit
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.TimeOut | The recommended idle time out (in seconds) to pass to the job
|
| options/nixos/boot.initrd.systemd.users.<name>.uid | ID of the user in initrd.
|
| options/nixos/users.mysql.enable | Whether to enable authentication against a MySQL/MariaDB database.
|
| options/home-manager/programs.floorp.profiles.<name>.userContent | Custom Floorp user content CSS.
|
| options/home-manager/programs.firefox.profiles.<name>.userChrome | Custom Firefox user chrome CSS.
|
| options/nixos/systemd.user.paths.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/services.prometheus.exporters.node-cert.user | User owning the certs.
|
| options/nixos/users.mysql.pam.table | The name of table that maps unique login names to the passwords.
|
| options/nixos/systemd.user.slices.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.user.timers.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.user.services.<name>.requisite | Similar to requires
|
| options/nixos/services.prometheus.exporters.nginx.user | User name under which the nginx exporter shall be run.
|
| options/nixos/services.prometheus.exporters.kafka.user | User name under which the kafka exporter shall be run.
|
| options/nixos/services.prometheus.exporters.redis.user | User name under which the redis exporter shall be run.
|
| options/nixos/services.prometheus.exporters.fritz.user | User name under which the fritz exporter shall be run.
|
| options/nixos/services.prometheus.exporters.idrac.user | User name under which the idrac exporter shall be run.
|
| options/nixos/services.prometheus.exporters.jitsi.user | User name under which the jitsi exporter shall be run.
|
| options/nixos/services.prometheus.exporters.dmarc.user | User name under which the dmarc exporter shall be run.
|
| options/nixos/services.prometheus.exporters.v2ray.user | User name under which the v2ray exporter shall be run.
|
| options/nixos/services.unpoller.unifi.controllers.*.user | Unifi service user name.
|
| options/nixos/users.mysql.pam.statusColumn | The name of the column or an SQL expression that indicates the status of
the user
|
| options/nixos/systemd.user.slices.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/systemd.user.timers.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Umask | This optional key specifies what value should be passed to umask(2) before running the job
|
| options/nixos/services.prometheus.exporters.frr.user | User name under which the frr exporter shall be run
|
| options/nixos/services.audiobookshelf.user | User account under which Audiobookshelf runs.
|
| options/nixos/services.libretranslate.user | User account under which libretranslate runs.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.WatchPaths | This optional key causes the job to be started if any one of the listed paths are modified.
|
| options/nixos/services.pretix.settings.database.user | Database username.
|
| options/nixos/services.szurubooru.server.settings.smtp.user | User to connect to the SMTP server.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.ExitTimeOut | The amount of time launchd waits before sending a SIGKILL signal
|
| options/nixos/users.extraUsers.<name>.home | The user's home directory.
|
| options/darwin/launchd.user.agents.<name>.environment | Environment variables passed to the service's processes.
|
| options/nixos/systemd.user.services.<name>.restartIfChanged | Whether the service should be restarted during a NixOS
configuration switch if its definition has changed.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.ProcessType | This optional key describes, at a high level, the intended purpose of the job
|
| options/nixos/services.nntp-proxy.users.<name>.username | Username
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StartOnMount | This optional key causes the job to be started every time a filesystem is mounted.
|
| options/nixos/system.userActivationScripts | A set of shell script fragments that are executed by a systemd user
service when a NixOS system configuration is activated
|
| options/nixos/services.guacamole-server.userMappingXml | Configuration file that correspond to user-mapping.xml.
|
| options/nixos/services.guacamole-client.userMappingXml | Configuration file that correspond to user-mapping.xml.
|
| options/nixos/services.blockbook-frontend.<name>.rpc.user | Username for JSON-RPC connections.
|
| options/nixos/users.extraUsers.<name>.initialPassword | Specifies the initial password for the user, i.e. the
password assigned if the user does not already exist
|
| options/nixos/services.userdbd.enable | Whether to enable the systemd JSON user/group record lookup service
.
|
| options/nixos/systemd.user.sockets.<name>.listenDatagrams | For each item in this list, a ListenDatagram
option in the [Socket] section will be created.
|
| options/nixos/systemd.user.targets.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.user.sockets.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.homebridge.userStoragePath | Path to store homebridge user files (needs to be writeable).
|
| options/nixos/systemd.user.slices.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/systemd.user.timers.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/users.extraUsers.<name>.initialHashedPassword | Specifies the initial hashed password for the user, i.e. the
hashed password assigned if the user does not already
exist
|
| options/nixos/services.privoxy.userActions | Actions to be included in a user.action file
|
| options/nixos/systemd.user.services.<name>.enableDefaultPath | Whether to append a minimal default PATH environment variable to the service, containing common system utilities.
|
| options/home-manager/systemd.user.paths.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/home-manager/accounts.contact.accounts.<name>.remote.userName | User name for authentication.
|
| options/nixos/services.prometheus.exporters.statsd.user | User name under which the statsd exporter shall be run.
|
| options/nixos/services.prometheus.exporters.dnssec.user | User name under which the dnssec exporter shall be run.
|
| options/nixos/services.prometheus.exporters.script.user | User name under which the script exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mysqld.user | User name under which the mysqld exporter shall be run.
|
| options/nixos/services.prometheus.exporters.deluge.user | User name under which the deluge exporter shall be run.
|
| options/nixos/services.prometheus.exporters.domain.user | User name under which the domain exporter shall be run.
|
| options/nixos/services.prometheus.exporters.fastly.user | User name under which the fastly exporter shall be run.
|
| options/nixos/services.prometheus.exporters.restic.user | User name under which the restic exporter shall be run.
|
| options/nixos/services.prometheus.exporters.pihole.user | User name under which the pihole exporter shall be run.
|
| options/nixos/services.prometheus.exporters.shelly.user | User name under which the shelly exporter shall be run.
|
| options/nixos/services.prometheus.exporters.rspamd.user | User name under which the rspamd exporter shall be run.
|
| options/nixos/services.prometheus.exporters.tibber.user | User name under which the tibber exporter shall be run.
|
| options/nixos/services.openvscode-server.userDataDir | Specifies the directory that user data is kept in
|
| options/home-manager/programs.zed-editor.userSettings | Configuration written to Zed's settings.json.
|
| options/nixos/users.extraUsers.<name>.packages | The set of packages that should be made available to the user
|
| options/nixos/users.groups.<name>.name | The name of the group
|
| options/darwin/users.groups.<name>.name | The group's name
|
| options/home-manager/programs.firefox.profiles.<name>.userContent | Custom Firefox user content CSS.
|
| options/nixos/services.privoxy.userFilters | Filters to be included in a user.filter file
|
| options/nixos/users.ldap.timeLimit | Specifies the time limit (in seconds) to use when performing
searches
|
| options/nixos/services.anki-sync-server.users | List of user-password pairs to provide to the sync server.
|
| options/nixos/systemd.user.targets.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.user.sockets.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/services.mattermost.database.user | Local Mattermost database username.
|
| options/nixos/users.extraUsers.<name>.subGidRanges.*.startGid | Start of the range of subordinate group ids that user is
allowed to use.
|
| options/nixos/systemd.user.targets.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/systemd.user.sockets.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/services.prometheus.exporters.nvidia-gpu.user | User name under which the nvidia-gpu exporter shall be run.
|
| options/nixos/users.mysql.pam.logging.hostColumn | The name of the column in the log table to which the name of the user
being authenticated is stored.
|
| options/nixos/services.pretalx.settings.database.user | Database username.
|
| options/nixos/services.sourcehut.settings.mail.smtp-user | Outgoing SMTP user.
|
| options/nixos/systemd.user.services.<name>.stopIfChanged | If set, a changed unit is restarted by calling
systemctl stop in the old configuration,
then systemctl start in the new one
|
| options/nixos/users.extraUsers.<name>.uid | The account UID
|
| options/nixos/services.prometheus.exporters.rtl_433.user | User name under which the rtl_433 exporter shall be run.
|
| options/home-manager/systemd.user.slices.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/home-manager/systemd.user.mounts.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/home-manager/systemd.user.timers.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/nixos/services.prometheus.exporters.systemd.user | User name under which the systemd exporter shall be run.
|
| options/nixos/services.prometheus.exporters.bitcoin.user | User name under which the bitcoin exporter shall be run.
|
| options/nixos/services.prometheus.exporters.varnish.user | User name under which the varnish exporter shall be run.
|
| options/nixos/services.prometheus.exporters.apcupsd.user | User name under which the apcupsd exporter shall be run.
|
| options/nixos/services.prometheus.exporters.ecoflow.user | User name under which the ecoflow exporter shall be run.
|
| options/nixos/services.prometheus.exporters.dovecot.user | User name under which the dovecot exporter shall be run.
|
| options/nixos/services.prometheus.exporters.process.user | User name under which the process exporter shall be run.
|
| options/nixos/services.prometheus.exporters.dnsmasq.user | User name under which the dnsmasq exporter shall be run.
|
| options/nixos/services.prometheus.exporters.libvirt.user | User name under which the libvirt exporter shall be run.
|
| options/nixos/services.prometheus.exporters.sabnzbd.user | User name under which the sabnzbd exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mongodb.user | User name under which the mongodb exporter shall be run.
|
| options/nixos/services.prometheus.exporters.postfix.user | User name under which the postfix exporter shall be run.
|
| options/nixos/services.prometheus.exporters.klipper.user | User name under which the klipper exporter shall be run.
|
| options/nixos/services.prometheus.exporters.unbound.user | User name under which the unbound exporter shall be run.
|
| options/nixos/boot.initrd.systemd.users.<name>.group | Group the user belongs to in initrd.
|
| options/nixos/services.asusd.userLedModesConfig.source | Path of the source file.
|
| options/nixos/systemd.user.targets.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/systemd.user.sockets.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/services.bitwarden-directory-connector-cli.user | User to run the program.
|
| options/nixos/users.extraUsers.<name>.expires | Set the date on which the user's account will no longer be
accessible
|
| options/nixos/systemd.user.services.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| options/nixos/systemd.user.services.<name>.reloadIfChanged | Whether the service should be reloaded during a NixOS
configuration switch if its definition has changed
|
| options/nixos/users.extraUsers.<name>.group | The user's primary group.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.OnDemand | This key was used in Mac OS X 10.4 to control whether a job was kept alive or not
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.ServiceIPC | This optional key specifies whether the job participates in advanced
communication with launchd
|
| options/home-manager/accounts.calendar.accounts.<name>.remote.userName | User name for authentication.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.InitGroups | This optional key specifies whether initgroups(3) should be called before running the job
|
| options/nixos/services.parsedmarc.settings.smtp.user | The SMTP server username.
|
| options/nixos/services.parsedmarc.settings.imap.user | The IMAP server username.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LimitLoadToHosts | This configuration file only applies to the hosts listed with this key
|
| options/nixos/services.invoiceplane.sites.<name>.database.user | Database user.
|
| options/nixos/services.opkssh.authorizations.*.user | Linux user to authorize
|
| options/nixos/systemd.user.services.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| options/nixos/users.defaultUserHome | The default home directory for normal users.
|
| options/nixos/services.prometheus.exporters.py-air-control.user | User name under which the py-air-control exporter shall be run.
|
| options/nixos/services.userborn.static | Whether to generate the password files at build time and store them directly
in the system closure, without requiring any services at boot time
|
| options/home-manager/systemd.user.services.<name>.Unit.X-Reload-Triggers | List of free form strings that can be used to trigger a service
reload during Home Manager activation.
|
| options/nixos/services.cpuminer-cryptonight.user | Username for mining server
|
| options/nixos/services.prometheus.exporters.mailman3.user | User name under which the mailman3 exporter shall be run.
|
| options/nixos/systemd.user.services.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| options/nixos/users.extraUsers.<name>.isNormalUser | Indicates whether this is an account for a “real” user
|
| options/home-manager/programs.librewolf.profiles.<name>.userChrome | Custom LibreWolf user chrome CSS.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Program | This key maps to the first argument of execvp(3)
|
| options/nixos/services.vsftpd.userlistDeny | Specifies whether userlistFile is a list of user
names to allow or deny access
|
| options/nixos/services.prometheus.exporters.influxdb.user | User name under which the influxdb exporter shall be run.
|
| options/nixos/services.prometheus.exporters.opnsense.user | User name under which the opensense exporter shall be run.
|
| options/nixos/services.prometheus.exporters.smartctl.user | User name under which the smartctl exporter shall be run.
|
| options/nixos/services.prometheus.exporters.fritzbox.user | User name under which the fritzbox exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mikrotik.user | User name under which the mikrotik exporter shall be run.
|
| options/nixos/services.prometheus.exporters.nginxlog.user | User name under which the nginxlog exporter shall be run.
|
| options/nixos/services.prometheus.exporters.postgres.user | User name under which the postgres exporter shall be run.
|
| options/nixos/services.prometheus.exporters.unpoller.user | User name under which the unpoller exporter shall be run.
|
| options/nixos/services.prometheus.exporters.graphite.user | User name under which the graphite exporter shall be run.
|
| options/nixos/services.prometheus.exporters.blackbox.user | User name under which the blackbox exporter shall be run.
|
| options/nixos/services.prometheus.exporters.keylight.user | User name under which the keylight exporter shall be run.
|
| options/nixos/services.prometheus.exporters.collectd.user | User name under which the collectd exporter shall be run.
|
| options/nixos/power.ups.users.<name>.instcmds | Let the user initiate specific instant commands
|
| options/home-manager/systemd.user.sockets.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/home-manager/systemd.user.targets.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LaunchOnlyOnce | This optional key specifies whether the job can only be run once and only once
|
| options/nixos/systemd.user.services.<name>.environment | Environment variables passed to the service's processes.
|
| options/nixos/services.changedetection-io.user | User account under which changedetection-io runs.
|
| options/darwin/users.knownGroups | List of groups owned and managed by nix-darwin
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LimitLoadFromHosts | This configuration file only applies to hosts NOT listed with this key
|
| options/nixos/services.calibre-server.auth.userDb | Choose users database file to use for authentication
|
| options/nixos/systemd.user.services.<name>.description | Description of this unit used in systemd messages and progress indicators.
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.mini.user | The user to login as.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LowPriorityIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O.
|
| options/nixos/users.extraUsers.<name>.hashedPasswordFile | The full path to a file that contains the hash of the user's
password
|
| options/home-manager/home.file | Attribute set of files to link into the user home.
|
| options/nixos/services.actual.settings.userFiles | The server will put all the budget files in this directory as binary blobs.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StandardInPath | This optional key specifies what file should be used for data being supplied to stdin when using
stdio(3).
|
| options/nixos/services.prometheus.exporters.imap-mailstat.user | User name under which the imap-mailstat exporter shall be run.
|
| options/nixos/users.extraGroups.<name>.gid | The group GID
|
| options/home-manager/systemd.user.services.<name>.Unit.X-Restart-Triggers | List of free form strings that can be used to trigger a service
restart during Home Manager activation.
|
| options/nixos/services.marytts.userDictionaries | Paths to the user dictionary files for MaryTTS.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StandardOutPath | This optional key specifies what file should be used for data being sent to stdout when using stdio(3).
|
| options/nixos/services.headscale.settings.database.postgres.user | Database user.
|
| options/home-manager/programs.librewolf.profiles.<name>.userContent | Custom LibreWolf user content CSS.
|
| options/darwin/environment.userLaunchAgents | Set of files that have to be linked in ~/Library/LaunchAgents.
|
| options/nixos/users.ldap.nsswitch | Whether to include lookup against LDAP in NSS.
|
| options/nixos/services.prometheus.exporters.surfboard.user | User name under which the surfboard exporter shall be run.
|
| options/nixos/services.prometheus.exporters.tailscale.user | User name under which the tailscale exporter shall be run.
|
| options/nixos/services.prometheus.exporters.wireguard.user | User name under which the wireguard exporter shall be run.
|
| options/nixos/services.prometheus.exporters.rasdaemon.user | User name under which the rasdaemon exporter shall be run.
|
| options/nixos/services.prometheus.exporters.borgmatic.user | User name under which the borgmatic exporter shall be run.
|
| options/nixos/services.prometheus.exporters.smokeping.user | User name under which the smokeping exporter shall be run.
|
| options/nixos/services.prometheus.exporters.pgbouncer.user | User name under which the pgbouncer exporter shall be run.
|
| options/nixos/services.prometheus.exporters.nextcloud.user | User name under which the nextcloud exporter shall be run.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.WaitForDebugger | This optional key specifies that launchd should instruct the kernel to have the job wait for a debugger
to attach before any code in the job is executed.
|
| options/nixos/systemd.user.units.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/systemd.user.paths.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/home-manager/programs.vscode.profiles.<name>.userMcp | Configuration written to Visual Studio Code's
mcp.json
|
| options/home-manager/systemd.user.services.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/nixos/services.prometheus.exporters.junos-czerwonk.user | User name under which the junos-czerwonk exporter shall be run.
|
| options/nixos/users.ldap.bind.timeLimit | Specifies the time limit (in seconds) to use when connecting
to the directory server
|
| options/nixos/services.sourcehut.settings."pages.sr.ht".user-domain | Configures the user domain, if enabled
|
| options/nixos/systemd.user.paths.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SessionCreate | This key specifies that the job should be spawned into a new security
audit session rather than the default session for the context is belongs
to
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockNodeName | This optional key specifies the node to connect(2) or bind(2) to.
|
| options/nixos/services.firefox-syncserver.database.user | Username for database connections.
|
| options/nixos/services.bitcoind.<name>.rpc.users | RPC user information for JSON-RPC connections.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.RootDirectory | This optional key is used to specify a directory to chroot(2) to before running the job.
|
| options/nixos/systemd.user.services.<name>.notSocketActivated | If set, a changed unit is never assumed to be
socket-activated on configuration switch, even if
it might have associated socket units
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| options/nixos/users.extraGroups.<name>.name | The name of the group
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.EnableGlobbing | This flag causes launchd to use the glob(3) mechanism to update the program arguments before invocation.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StandardErrorPath | This optional key specifies what file should be used for data being sent to stderr when using stdio(3).
|
| options/nixos/systemd.oomd.enableUserSlices | Whether to enable oomd on all user slices (user@.slice) and all user owned slices.
|
| options/nixos/services.ddclient.username | User name.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LimitLoadToSessionType | This configuration file only applies to sessions of the type specified
|
| options/nixos/systemd.user.timers.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/systemd.user.slices.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockPathName | This optional key implies SockFamily is set to "Unix"
|
| options/nixos/systemd.user.slices.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/systemd.user.timers.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/users.mysql.database | The name of the database containing the users
|
| options/nixos/services.prometheus.exporters.buildkite-agent.user | User name under which the buildkite-agent exporter shall be run.
|
| options/nixos/services.prometheus.exporters.scaphandre.user | User name under which the scaphandre exporter shall be run.
|
| options/nixos/services.prometheus.exporters.storagebox.user | User name under which the storagebox exporter shall be run.
|
| options/home-manager/systemd.user.paths.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockPathMode | This optional key specifies the mode of the socket
|
| options/darwin/users.groups.<name>.members | The group's members.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockFamily | This optional key can be used to specifically request that "IPv4" or "IPv6" socket(s) be created.
|
| options/home-manager/programs.vscode.profiles.<name>.userTasks | Configuration written to Visual Studio Code's
tasks.json
|
| options/nixos/services.jitsi-videobridge.xmppConfigs.<name>.userName | User part of the JID.
|
| options/darwin/environment.userLaunchAgents.<name>.text | Text of the file.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits | Resource limits to be imposed on the job
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits | Resource limits to be imposed on the job
|
| options/nixos/services.matrix-synapse.settings.database.args.user | Username to connect with psycopg2, set to null
when using sqlite3.
|
| options/nixos/users.ldap.extraConfig | Extra configuration options that will be added verbatim at
the end of the ldap configuration file (ldap.conf(5))
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/darwin/services.github-runners | Multiple GitHub Runners
|
| options/nixos/services.prometheus.exporters.exportarr-lidarr.user | User name under which the exportarr-lidarr exporter shall be run.
|
| options/nixos/services.prometheus.exporters.exportarr-sonarr.user | User name under which the exportarr-sonarr exporter shall be run.
|
| options/nixos/services.prometheus.exporters.exportarr-radarr.user | User name under which the exportarr-radarr exporter shall be run.
|
| options/nixos/services.prometheus.exporters.exportarr-bazarr.user | User name under which the exportarr-bazarr exporter shall be run.
|
| options/nixos/systemd.user.sockets.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/systemd.user.targets.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/nixos/users.mysql.pam.verbose | If enabled, produces logs with detailed messages that describes what
pam_mysql is doing
|
| options/nixos/services.lighttpd.mod_userdir | If true, requests in the form /~user/page.html are rewritten to take
the file public_html/page.html from the home directory of the user.
|
| options/nixos/systemd.user.sockets.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/nixos/systemd.user.targets.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/home-manager/systemd.user.slices.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/home-manager/systemd.user.timers.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/home-manager/systemd.user.mounts.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.Bonjour | This optional key can be used to request that the service be registered with the
mDNSResponder(8)
|
| options/nixos/users.extraUsers.<name>.homeMode | The user's home directory mode in numeric format
|
| options/home-manager/programs.thunderbird.profiles.<name>.userChrome | Custom Thunderbird user chrome CSS.
|
| options/nixos/services.samba.usershares.enable | Whether to enable user-configurable Samba shares.
|
| options/nixos/services.bloop.install | Whether to install a user service for the Bloop server
|
| options/nixos/power.ups.users.<name>.upsmon | Add the necessary actions for a upsmon process to work
|
| options/home-manager/systemd.user.services.<name>.Service.Environment | Environment variables available to executed processes.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.AbandonProcessGroup | When a job dies, launchd kills any remaining processes with the same process group ID as the job
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StartInterval | This optional key causes the job to be started every N seconds
|
| options/nixos/services.prometheus.exporters.exportarr-readarr.user | User name under which the exportarr-readarr exporter shall be run.
|
| options/nixos/systemd.user.services.<name>.enableStrictShellChecks | Enable running shellcheck on the generated scripts for this unit
|
| options/nixos/services.prometheus.exporters.artifactory.user | User name under which the artifactory exporter shall be run.
|
| options/nixos/users.extraUsers.<name>.shell | The path to the user's shell
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.WorkingDirectory | This optional key is used to specify a directory to chdir(2) to before running the job.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockServiceName | This optional key specifies the service on the node to connect(2) or bind(2) to.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockPassive | This optional key specifies whether listen(2) or connect(2) should be called on the created file
descriptor
|
| options/darwin/homebrew.taps | List of Homebrew formula repositories to tap
|
| options/home-manager/systemd.user.sockets.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/home-manager/systemd.user.automounts.<name>.Unit.Description | A short human-readable label of the unit.
|
| options/home-manager/systemd.user.targets.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/nixos/systemd.user.services.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| options/home-manager/programs.thunderbird.profiles.<name>.userContent | Custom Thunderbird user content CSS.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.MachServices | This optional key is used to specify Mach services to be registered with the Mach bootstrap sub-system
|
| options/nixos/users.extraUsers.<name>.pamMount | Attributes for user's entry in
pam_mount.conf.xml
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.userAgent | The user agent to report to the server
|
| options/nixos/systemd.user.services.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/nixos/users.mysql.nss.getpwnam | SQL query for the getpwnam
syscall.
|
| options/nixos/users.mysql.nss.getgrgid | SQL query for the getgrgid
syscall.
|
| options/nixos/users.mysql.nss.getgrnam | SQL query for the getgrnam
syscall.
|
| options/nixos/users.mysql.nss.getspnam | SQL query for the getspnam
syscall.
|
| options/nixos/users.mysql.nss.getspent | SQL query for the getspent
syscall.
|
| options/nixos/users.mysql.nss.getgrent | SQL query for the getgrent
syscall.
|
| options/nixos/users.mysql.nss.getpwuid | SQL query for the getpwuid
syscall.
|
| options/nixos/users.mysql.nss.getpwent | SQL query for the getpwent
syscall.
|
| options/nixos/services.mastodon.elasticsearch.user | Used for optionally authenticating with Elasticsearch.
|
| options/nixos/users.mysql.pam.updateTable | The name of the table used for password alteration
|
| options/darwin/environment.userLaunchAgents.<name>.source | Path of the source file.
|
| options/nixos/services.prometheus.exporters.exportarr-prowlarr.user | User name under which the exportarr-prowlarr exporter shall be run.
|
| options/nixos/users.extraUsers.<name>.extraGroups | The user's auxiliary groups.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LaunchEvents | Specifies higher-level event types to be used as launch-on-demand event
sources
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SockProtocol | This optional key specifies the protocol to be passed to socket(2)
|
| options/nixos/users.extraUsers.<name>.cryptHomeLuks | Path to encrypted luks device that contains
the user's home directory.
|
| options/nixos/boot.initrd.systemd.users | Users to include in initrd.
|
| options/nixos/users.ldap.daemon.rootpwmoddn | The distinguished name to use to bind to the LDAP server
when the root user tries to modify a user's password.
|
| options/darwin/environment.userLaunchAgents.<name>.target | Name of symlink
|
| options/nixos/boot.loader.grub.users.<name>.passwordFile | Specifies the path to a file containing the
clear text password for the account
|
| options/nixos/power.ups.upsmon.group | Group for the default nutmon user
|
| options/nixos/users.mysql.pam.cryptDefault | The default encryption method to use for passwordCrypt = 1.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/home-manager/systemd.user.services.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/nixos/services.prometheus.exporters.modemmanager.user | User name under which the modemmanager exporter shall be run.
|
| options/nixos/services.prometheus.exporters.unpoller.loki.user | Username for Loki.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.KeepAlive | This optional key is used to control whether your job is to be kept continuously running or to let
demand and conditions control the invocation
|
| options/nixos/users.mysql.pam.logging.table | The name of the table to which logs are written.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.userAgent | The user agent to report to the server
|
| options/darwin/environment.userLaunchAgents.<name>.enable | Whether this file should be generated
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.ProgramArguments | This key maps to the second argument of execvp(3)
|
| options/nixos/services.murmur.users | Maximum number of concurrent clients allowed.
|
| options/nixos/services.nextcloud.config.dbuser | Database user.
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.userPath | User directory, relative to root.
|
| options/nixos/services.grafana.settings.users.user_invite_max_lifetime_duration | The duration in time a user invitation remains valid before expiring
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/nixos/users.extraUsers.<name>.description | A short description of the user account, typically the
user's full name
|
| options/home-manager/systemd.user.settings.Manager.DefaultEnvironment | Configures environment variables passed to all executed processes.
|
| options/home-manager/systemd.user.settings.Manager.ManagerEnvironment | Sets environment variables just for the manager process itself.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.SecureSocketWithKey | This optional key is a variant of SockPathName
|
| options/nixos/users.ldap.daemon.rootpwmodpwFile | The path to a file containing the credentials with which to bind to
the LDAP server if the root user tries to change a user's password.
|
| options/nixos/services.emacs.install | Whether to install a user service for the Emacs daemon
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/nixos/users.extraUsers.<name>.ignoreShellProgramCheck | By default, nixos will check that programs
|
| options/home-manager/programs.vscode.profiles.<name>.userSettings | Configuration written to Visual Studio Code's
settings.json
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.QueueDirectories | Much like the WatchPaths option, this key will watch the paths for modifications
|
| options/nixos/networking.openconnect.interfaces.<name>.user | Username to authenticate with.
|
| options/nixos/services.sourcehut.settings."meta.sr.ht::settings".user-invites | How many invites each user is issued upon registration
(only applicable if open registration is disabled).
|
| options/nixos/services.hound.home | The path to use as hound's $HOME
|
| options/nixos/services.discourse.admin.username | The admin user username.
|
| options/nixos/services.diod.userdb | This option disables password/group lookups
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.userNameCommand | A command that prints the user name to standard output.
|
| options/nixos/security.pam.oath.usersFile | Set the path to file where the user's credentials are
stored
|
| options/nixos/security.sudo.extraRules.*.runAs | Under which user/group the specified command is allowed to run
|
| options/nixos/services.dependency-track.oidc.userProvisioning | Specifies if mapped OpenID Connect accounts are automatically created upon successful
authentication
|
| options/nixos/services.pgbouncer.settings.pgbouncer.max_user_connections | Do not allow more than this many server connections per user (regardless of database)
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.tiny.label.user | The string to represent the user_text label.
|
| options/nixos/services.prometheus.exporters.unpoller.controllers.*.user | Unifi service user name.
|
| options/nixos/security.sudo-rs.extraRules.*.runAs | Under which user/group the specified command is allowed to run
|
| options/nixos/users.users.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| options/darwin/users.users.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| options/nixos/users.ldap.bind.passwordFile | The path to a file containing the credentials to use when binding
to the LDAP server (if not binding anonymously).
|
| options/nixos/services.honk.username | The admin account username.
|
| options/nixos/security.allowUserNamespaces | Whether to allow creation of user namespaces
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.ThrottleInterval | This key lets one override the default throttling policy imposed on jobs by launchd
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets | This optional key is used to specify launch on demand sockets that can be used to let launchd know when
to run the job
|
| options/nixos/users.users.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| options/darwin/users.users.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| options/nixos/services.iio-niri.niriUnit | The Niri user service unit to bind IIO-Niri's user service unit to.
|
| options/nixos/services.ttyd.username | Username for basic http authentication.
|
| options/nixos/services.vsftpd.userlist | See userlistFile.
|
| options/nixos/users.manageLingering | Whether to manage whether users linger or not.
|
| options/nixos/users.ldap.daemon.extraConfig | Extra configuration options that will be added verbatim at
the end of the nslcd configuration file (nslcd.conf(5)).
|
| options/nixos/services.prometheus.exporters.mailman3.mailman.user | Mailman3 Core REST API username.
|
| options/nixos/users.mysql.nss.memsbygid | SQL query for the memsbygid
syscall.
|
| options/nixos/users.mysql.nss.gidsbymem | SQL query for the gidsbymem
syscall.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.userNameCommand | A command that prints the user name to standard output.
|
| options/nixos/services.stargazer.allowCgiUser | When enabled, the stargazer process will be given CAP_SETGID
and CAP_SETUID so that it can run cgi processes as a different
user
|
| options/nixos/services.postsrsd.settings.unprivileged-user | Unprivileged user to drop privileges to.
Our systemd unit never runs postsrsd as a privileged process, so this option is read-only.
|
| options/nixos/users.mysql.pam.logging.enable | Enables logging of authentication attempts in the MySQL database.
|
| options/nixos/i18n.inputMethod.fcitx5.ignoreUserConfig | Ignore the user configures. Warning: When this is enabled, the
user config files are totally ignored and the user dict can't be saved
and loaded.
|
| options/home-manager/i18n.inputMethod.fcitx5.ignoreUserConfig | Ignore the user configures. Warning: When this is enabled, the
user config files are totally ignored and the user dict can't be saved
and loaded.
|
| options/nixos/users.extraUsers.<name>.subGidRanges.*.count | Count of subordinate group ids
|
| options/home-manager/systemd.user.automounts.<name>.Unit.Documentation | List of URIs referencing documentation for the unit.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.NumberOfFiles | The maximum number of open files for this process
|
| options/nixos/users.extraUsers.<name>.useDefaultShell | If true, the user's shell will be set to
users.defaultUserShell.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LowPriorityBackgroundIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O when the process is throttled with the Darwin-background classification.
|
| options/home-manager/xdg.dataHome | Absolute path to directory holding application data
|
| options/nixos/services.gocd-agent.group | If the default user "gocd-agent" is configured then this is the primary
group of that user.
|
| options/darwin/system.primaryUser | The user used for options that previously applied to the user
running darwin-rebuild
|
| options/nixos/services.vsftpd.userlistFile | Newline separated list of names to be allowed/denied if userlistEnable
is true
|
| options/nixos/virtualisation.oci-containers.containers.<name>.podman.user | The user under which the container should run.
|
| options/nixos/security.duosec.prompts | If a user fails to authenticate with a second factor, Duo
Unix will prompt the user to authenticate again
|
| options/nixos/services.pgbouncer.settings.users | Optional
|
| options/nixos/boot.loader.grub.users.<name>.hashedPasswordFile | Specifies the path to a file containing the password hash
for the account, generated with grub-mkpasswd-pbkdf2
|
| options/nixos/services.userborn.enable | Whether to enable userborn.
|
| options/nixos/security.doas.extraRules.*.users | The usernames / UIDs this rule should apply for.
|
| options/nixos/security.sudo.extraRules.*.users | The usernames / UIDs this rule should apply for.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.inetdCompatibility | The presence of this key specifies that the daemon expects to be run as if it were launched from inetd.
|
| options/nixos/users.ldap.bind.policy | Specifies the policy to use for reconnecting to an unavailable
LDAP server
|
| options/nixos/services.bcg.mqtt.username | MQTT server access username.
|
| options/nixos/users.users.<name>.openssh.authorizedPrincipals | A list of verbatim principal names that should be added to the user's
authorized principals.
|
| options/nixos/users.mysql.pam.logging.msgColumn | The name of the column in the log table to which the description
of the performed operation is stored.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.EnvironmentVariables | This optional key is used to specify additional environment variables to be set before running the
job.
|
| options/nixos/security.sudo-rs.extraRules.*.users | The usernames / UIDs this rule should apply for.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Sockets.<name>.MulticastGroup | This optional key can be used to request that the datagram socket join a multicast group
|
| options/nixos/services.bitlbee.authMode | The following authentication modes are available:
Open -- Accept connections from anyone, use NickServ for user authentication
|
| options/nixos/services.librenms.database.username | Name of the user on the MySQL/MariaDB server
|
| options/nixos/users.mysql.pam.passwordColumn | The name of the column that contains a (encrypted) password string.
|
| options/home-manager/programs.anki.sync.username | Sync account username.
|
| options/nixos/services.stash.username | Username for login.
|
| options/nixos/users.mysql.pam.logging.pidColumn | The name of the column in the log table to which the pid of the
process utilising the pam_mysql authentication
service is stored.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.EnableTransactions | This flag instructs launchd that the job promises to use vproc_transaction_begin(3) and
vproc_transaction_end(3) to track outstanding transactions that need to be reconciled before the
process can safely terminate
|
| options/nixos/users.mysql.pam.logging.timeColumn | The name of the column in the log table to which the timestamp of the
log entry is stored.
|
| options/nixos/networking.wireless.userControlled.group | Members of this group can control wpa_supplicant.
|
| options/nixos/services.influxdb2.provision.users.<name>.passwordFile | Password for the user
|
| options/nixos/services.jenkins.home | The path to use as JENKINS_HOME
|
| options/nixos/services.jenkins.group | If the default user "jenkins" is configured then this is the primary
group of that user.
|
| options/nixos/services.gocd-server.group | If the default user "gocd-server" is configured then this is the primary group of that user.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.SoftResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.HardResourceLimits.ResidentSetSize | The maximum size (in bytes) to which a process's resident set size may grow
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.Disabled | This optional key is used as a hint to launchctl(1) that it should not submit this job to launchd when
loading a job or jobs
|
| options/nixos/services.discourse.database.username | Discourse database user.
|
| options/nixos/nix.sshServe.write | Whether to enable writing to the Nix store as a remote store via SSH
|
| options/nixos/boot.initrd.systemd.users.<name>.shell | The path to the user's shell in initrd.
|
| options/nixos/services.userborn.package | The userborn package to use.
|
| options/nixos/services.cntlm.username | Proxy account name, without the possibility to include domain name ('at' sign is interpreted literally).
|
| options/nixos/services.vsftpd.userlistEnable | Whether users are included.
|
| options/home-manager/xdg.cacheHome | Absolute path to directory holding application caches
|
| options/home-manager/xdg.stateHome | Absolute path to directory holding application states
|
| options/nixos/services.etebase-server.enable | Whether to enable the Etebase server
|
| options/nixos/boot.initrd.network.ssh.shell | Login shell of the remote user
|
| options/nixos/power.ups.users.<name>.passwordFile | The full path to a file that contains the user's (clear text)
password
|
| options/home-manager/programs.anki.sync.usernameFile | Path to a file containing the sync account username.
|
| options/nixos/services.parsedmarc.settings.elasticsearch.user | Username to use when connecting to Elasticsearch, if
required.
|
| options/home-manager/programs.nh.clean.enable | Whether to enable periodic garbage collection for user profile and nix store with nh clean
user.
|
| options/nixos/services.nntp-proxy.users.<name>.maxConnections | Maximum number of concurrent connections to the proxy for this user
|
| options/nixos/services.cloudlog.update-lotw-users.interval | Specification (in the format described by systemd.time(7)) of the
time at which the LoTW user update will occur.
|
| packages/nixpkgs/udig | User-friendly Desktop Internet GIS |
| packages/nixpkgs/nfft | Nonequispaced fast Fourier transform |
| options/nixos/services.dependency-track.settings."alpine.oidc.user.provisioning" | Specifies if mapped OpenID Connect accounts are automatically created upon successful
authentication
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StartCalendarInterval | This optional key causes the job to be started every calendar interval as specified
|
| options/nixos/services.yandex-disk.username | Your yandex.com login name.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.inetdCompatibility.Wait | This flag corresponds to the "wait" or "nowait" option of inetd
|
| options/nixos/systemd.sysusers.enable | If enabled, users are created with systemd-sysusers instead of with
the custom update-users-groups.pl script
|
| options/nixos/services.roundcube.database.username | Username for the postgresql connection
|
| options/nixos/services.keycloak.database.username | Username to use when connecting to an external or manually
provisioned database; has no effect when a local database is
automatically provisioned
|
| options/nixos/programs.zsh.enable | Whether to configure zsh as an interactive shell
|
| options/nixos/networking.wireless.userControlled | Allow users of the wpa_supplicant group to control wpa_supplicant
through wpa_gui or wpa_cli
|
| options/nixos/services.gitlab.smtp.username | Username of the SMTP server for GitLab.
|
| options/nixos/services.nullidentdmod.userid | User ID to return
|
| options/nixos/virtualisation.oci-containers.containers.<name>.user | Override the username or UID (and optionally groupname or GID) used
in the container.
|
| options/nixos/users.mysql.pam.logging.rHostColumn | The name of the column in the log table to which the name of the remote
host that initiates the session is stored
|
| options/nixos/services.jenkinsSlave.home | The path to use as JENKINS_HOME
|
| options/nixos/services.saned.enable | Enable saned network daemon for remote connection to scanners.
saned would be run from scanner user; to allow
access to hardware that doesn't have scanner group
you should add needed groups to this user.
|
| options/home-manager/nix.registry | User level flake registry.
|
| options/nixos/services.grafana.settings.users.allow_sign_up | Set to false to prohibit users from being able to sign up / create user accounts
|
| options/nixos/virtualisation.lxc.usernetConfig | This is the config file for managing unprivileged user network
administration access in LXC
|
| options/nixos/services.jenkinsSlave.group | If the default slave agent user "jenkins" is configured then this is
the primary group of that user.
|
| options/nixos/networking.supplicant.<name>.userControlled.group | Members of this group can control wpa_supplicant.
|
| options/nixos/services.outline.smtp.username | Username to authenticate with.
|
| options/nixos/hardware.openrazer.users | Usernames to be added to the "openrazer" group, so that they
can start and interact with the OpenRazer userspace daemon.
|
| options/nixos/services.inadyn.group | Group account under which inadyn runs.
If left as the default value this user will automatically be created
on system activation, otherwise you are responsible for
ensuring the user exists before the inadyn service starts.
|
| options/home-manager/xdg.configHome | Absolute path to directory holding application configurations
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.userFilter | LDAP filter for users.
|
| options/nixos/users.enforceIdUniqueness | Whether to require that no two users/groups share the same uid/gid.
|
| options/nixos/networking.wireless.userControlled.enable | Allow normal users to control wpa_supplicant through wpa_gui or wpa_cli
|
| options/nixos/services.xserver.displayManager.lightdm.greeters.slick.draw-user-backgrounds | Whether to enable draw user backgrounds.
|
| options/nixos/services.samba.usershares.group | Name of the group members of which will be allowed to create usershares
|
| options/nixos/services.grafana.settings.users.hidden_users | This is a comma-separated list of usernames
|
| options/nixos/nix.settings.trusted-users | A list of names of users that have additional rights when
connecting to the Nix daemon, such as the ability to specify
additional binary caches, or to import unsigned NARs
|
| options/darwin/nix.settings.trusted-users | A list of names of users that have additional rights when
connecting to the Nix daemon, such as the ability to specify
additional binary caches, or to import unsigned NARs
|
| options/nixos/programs.dconf.profiles | Attrset of dconf profiles
|
| options/nixos/boot.loader.grub.users.<name>.password | Specifies the clear text password for the account
|
| options/nixos/nix.settings.allowed-users | A list of names of users (separated by whitespace) that are
allowed to connect to the Nix daemon
|
| options/darwin/nix.settings.allowed-users | A list of names of users (separated by whitespace) that are
allowed to connect to the Nix daemon
|
| options/nixos/services.ncps.cache.redis.username | Redis username for authentication (for Redis ACL).
|
| options/nixos/services.paretosecurity.users | Per-user Pareto Security configuration.
|
| options/nixos/services.nextcloud.notify_push.dbuser | Database user.
|
| options/nixos/networking.supplicant.<name>.userControlled.socketDir | Directory of sockets for controlling wpa_supplicant.
|
| options/home-manager/xdg.systemDirs.data | Directory names to add to XDG_DATA_DIRS
in the user session.
|
| options/nixos/programs.gphoto2.enable | Whether to configure system to use gphoto2
|
| options/nixos/services.influxdb2.provision.users.<name>.present | Whether to ensure that this user is present or absent.
|
| options/darwin/users.groups.<name>.description | The group's description.
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.userObjectClass | Class that users must have.
|
| options/home-manager/home.packages | The set of packages to appear in the user environment.
|
| options/home-manager/services.podman.images.<name>.username | Username used to connect to registry.
|
| options/nixos/services.factorio.username | Your factorio.com login credentials
|
| options/nixos/services.offlineimap.install | Whether to install a user service for Offlineimap
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.password | Specifies the (clear text) password for the MQTT User.
|
| options/nixos/networking.supplicant.<name>.userControlled.enable | Allow normal users to control wpa_supplicant through wpa_gui or wpa_cli
|
| options/nixos/services.bitcoind.<name>.rpc.users.<name>.name | Username for JSON-RPC connections.
|
| options/nixos/security.doas.extraRules.*.runAs | Which user or group the specified command is allowed to run as
|
| options/nixos/services._3proxy.usersFile | Load users and passwords from this file
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.login | Grants the user, created by the ensureUser attr, login permissions
|
| options/nixos/services.crossmacro.users | List of users granted permission to use CrossMacro.
|
| options/nixos/services.dependency-track.database.username | Username to use when connecting to an external or manually
provisioned database; has no effect when a local database is
automatically provisioned
|
| options/nixos/services.pdfding.consume.enable | Bulk PDF import from consume directory
|
| options/nixos/programs.benchexec.users | Users that intend to use BenchExec
|
| options/nixos/services.coder.database.username | Username for accessing the database.
|
| packages/nixpkgs/swt | A widget toolkit for Java to access the user-interface facilities of
the operating systems on which it is implemented.
|
| packages/nixpkgs/howl | General purpose, fast and lightweight editor with a keyboard-centric minimalistic user interface |
| packages/nixpkgs/kile | User-friendly TeX/LaTeX authoring tool for the KDE desktop environment |
| options/nixos/services.mailman.ldap.attrMap.username | LDAP-attribute that corresponds to the username-attribute in mailman.
|
| options/nixos/services.userdbd.enableSSHSupport | Whether to enable exposing OpenSSH public keys defined in userdb
|
| options/nixos/services.postfixadmin.database.username | Username for the postgresql connection
|
| options/nixos/services.multipath.devices.*.user_friendly_names | If set to "yes", using the bindings file /etc/multipath/bindings
to assign a persistent and unique alias to the multipath, in the
form of mpath
|
| options/nixos/services.jibri.xmppEnvironments.<name>.call.login.username | User part of the JID for the recorder.
|
| options/nixos/services.longview.mysqlUser | The user for connecting to the MySQL database
|
| options/nixos/services._3proxy.services.*.acl.*.users | List of users, use empty list for any.
|
| options/nixos/services.pulseaudio.systemWide | If false, a PulseAudio server is launched automatically for
each user that tries to use the sound system
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.userEmailAttribute | Attribute for a users email.
|
| options/nixos/services.archisteamfarm.bots.<name>.username | Name of the user to log in
|
| options/darwin/services.github-runners.<name>.group | Group under which to run the service
|
| options/nixos/nix.nrBuildUsers | Number of nixbld user accounts created to
perform secure concurrent builds
|
| options/darwin/nix.nrBuildUsers | Number of nixbld user accounts created to
perform secure concurrent builds
|
| options/nixos/services.geoclue2.appConfig.<name>.users | List of UIDs of all users for which this application is allowed location
info access, Defaults to an empty string to allow it for all users.
|
| options/nixos/boot.loader.grub.users.<name>.hashedPassword | Specifies the password hash for the account,
generated with grub-mkpasswd-pbkdf2
|
| options/nixos/services.bitwarden-directory-connector-cli.ldap.username | The user to authenticate as.
|
| options/nixos/services.pgadmin.emailServer.username | SMTP server username for email delivery
|
| options/nixos/programs.idescriptor.users | Users to be added to the idevice group.
|
| options/nixos/services.znc.mutable | Indicates whether to allow the contents of the
dataDir directory to be changed by the user at
run-time
|
| options/nixos/services.tailscale.permitCertUid | Username or user ID of the user allowed to to fetch Tailscale TLS certificates for the node.
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.passwordFile | Specifies the path to a file containing the
clear text password for the MQTT user
|
| options/nixos/services.nntp-proxy.users.<name>.passwordHash | SHA-512 password hash (can be generated by
mkpasswd -m sha-512 <password>)
|
| options/home-manager/xdg.systemDirs.config | Directory names to add to XDG_CONFIG_DIRS
in the user session.
|
| options/nixos/services.cassandra.jmxRoles.*.username | Username for JMX
|
| options/nixos/services.dokuwiki.sites.<name>.usersFile | Location of the dokuwiki users file
|
| options/nixos/services.clickhouse.usersConfig | Your users.yaml as a Nix attribute set
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses | An attrset of clauses to grant to the user
|
| options/nixos/services.jibri.xmppEnvironments.<name>.control.login.username | User part of the JID.
|
| options/nixos/services.printing.cups-pdf.instances.<name>.settings.Anonuser | User for anonymous PDF creation
|
| options/nixos/services.prometheus.exporters.dovecot.socketPath | Path under which the stats socket is placed
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.hashedPassword | Specifies the hashed password for the MQTT User
|
| options/nixos/services.firezone.server.smtp.username | Username to authenticate against the SMTP relay
|
| packages/nixpkgs/kdbg | A graphical user interface to gdb, the GNU debugger |
| options/home-manager/services.podman.machines.<name>.username | Username used in the machine image
|
| options/nixos/services.hqplayerd.auth.username | Username used for HQPlayer's WebUI
|
| options/nixos/services.taskserver.organisations.<name>.users | A list of user names that belong to the organization.
|
| options/nixos/services.nscd.group | User group under which nscd runs.
|
| options/home-manager/launchd.enable | Whether to enable Home Manager to define per-user daemons by making use
of launchd's LaunchAgents.
|
| options/home-manager/programs.anki.uiScale | User interface scale.
|
| options/nixos/programs.firefox.autoConfig | AutoConfig files can be used to set and lock preferences that are not covered
by the policies.json for Mac and Linux
|
| options/nixos/services.portunus.ldap.searchUserName | The login name of the search user
|
| options/nixos/services.physlock.allowAnyUser | Whether to allow any user to lock the screen
|
| options/nixos/services.anki-sync-server.users.*.passwordFile | File containing the password accepted by anki-sync-server for
the associated username
|
| options/nixos/services.guix.group | The group of the Guix build user pool.
|
| options/nixos/security.pam.services.<name>.forwardXAuth | Whether X authentication keys should be passed from the
calling user to the target user (e.g. for
su)
|
| options/nixos/services.outline.oidcAuthentication.usernameClaim | Specify which claims to derive user information from
|
| options/nixos/services.anki-sync-server.users.*.password | Password accepted by anki-sync-server for the associated username.
WARNING: This option is not secure
|
| options/nixos/services.coder.homeDir | Home directory for coder user.
|
| options/nixos/services.ntfy-sh.group | Primary group of ntfy-sh user.
|
| options/nixos/users.mysql.pam.passwordCrypt | The method to encrypt the user's password:
0 (or "plain"):
No encryption
|
| options/nixos/containers.<name>.privateUsers | Whether to give the container its own private UIDs/GIDs space (user namespacing)
|
| options/nixos/systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.group | The group of the file
|
| packages/nixpkgs/hashi-ui | Modern user interface for hashicorp Consul & Nomad |
| options/nixos/services.freeciv.settings.Newusers | Whether to enable new users to login if auth is enabled.
|
| options/nixos/security.tpm2.tssUser | Name of the tpm device-owner and service user, set if applyUdevRules is
set.
|
| options/nixos/services.movim.logDir | Log directory of the movim user which holds the application’s logs.
|
| options/nixos/services.influxdb2.provision.users | Users to provision.
|
| options/nixos/services.cloudlog.update-lotw-users.enable | Whether to periodically update the list of LoTW users
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.hashedPasswordFile | Specifies the path to a file containing the
hashed password for the MQTT user
|
| options/nixos/services.matomo.webServerUser | Name of the web server user that forwards requests to services.phpfpm.pools.<name>.socket the fastcgi socket for Matomo if the nginx
option is not used
|
| options/nixos/services.xrdp.defaultWindowManager | The script to run when user log in, usually a window manager, e.g. "icewm", "xfce4-session"
This is per-user overridable, if file ~/startwm.sh exists it will be used instead.
|
| options/nixos/users.ldap.bind.distinguishedName | The distinguished name to bind to the LDAP server with
|
| options/home-manager/programs.npm.enable | Whether to enable npm user config.
|
| options/nixos/services.spiped.config.<name>.keyfile | Name of a file containing the spiped key
|
| options/nixos/services.inadyn.settings.custom.<name>.username | Username for this DDNS provider.
|
| options/nixos/services.mosquitto.listeners.*.users | A set of users and their passwords and ACLs.
|
| options/nixos/services.mtprotoproxy.users | Allowed users and their secrets
|
| options/nixos/services.pipewire.systemWide | If true, a system-wide PipeWire service and socket is enabled
allowing all users in the "pipewire" group to use it simultaneously
|
| options/nixos/services.samba.settings.global."invalid users" | List of users who are denied to login via Samba.
|
| options/nixos/services.grafana-to-ntfy.settings.bauthUser | The user that you will authenticate with in the Grafana webhook settings
|
| options/nixos/services.openvpn.servers.<name>.authUserPass.username | The username to store inside the credentials file.
|
| options/nixos/services.grocy.dataDir | Home directory of the grocy user which contains
the application's state.
|
| options/nixos/programs.rush.enable | Whether to enable Restricted User Shell..
|
| options/nixos/programs.firefox.autoConfigFiles | AutoConfig files can be used to set and lock preferences that are not covered
by the policies.json for Mac and Linux
|
| options/nixos/services.umurmur.settings.max_users | Maximum number of concurrent clients allowed.
|
| options/nixos/services.openafsServer.roles.backup.buserverArgs | Arguments to the buserver process
|
| options/nixos/services.movim.dataDir | State directory of the movim user which holds the application’s state & data.
|
| options/nixos/services.unpoller.unifi.defaults.pass | Path of a file containing the password for the unifi service user
|
| options/nixos/services.zfs.autoReplication.username | Username used by SSH to login to remote host.
|
| options/nixos/services.nifi.initUser | Initial user account for Apache NiFi
|
| options/nixos/services.dependency-track.oidc.usernameClaim | Defines the name of the claim that contains the username in the provider's userinfo endpoint
|
| options/home-manager/programs.jjui.enable | Whether to enable jjui - A terminal user interface for jujutsu.
|
| options/home-manager/dconf.databases | Settings to write to specific dconf user databases
|
| options/home-manager/programs.fd.enable | Whether to enable fd, a simple, fast and user-friendly alternative to find.
|
| options/nixos/services.displayManager.sddm.autoLogin.minimumUid | Minimum user ID for auto-login user.
|
| options/nixos/systemd.mounts.*.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.paths.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.units.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/services.discourse.mail.outgoing.username | The username of the SMTP server.
|
| options/nixos/services.netbird.tunnels.<name>.hardened | Hardened service:
- runs as a dedicated user with minimal set of permissions (see caveats),
- restricts daemon configuration socket access to dedicated user group
(you can grant access to it with
users.users."<user>".extraGroups = [ netbird-‹name› ]),
Even though the local system resources access is restricted:
CAP_NET_RAW, CAP_NET_ADMIN and CAP_BPF still give unlimited network manipulation possibilites,
- older kernels don't have
CAP_BPF and use CAP_SYS_ADMIN instead,
Known security features that are not (yet) integrated into the module:
- 2024-02-14:
rosenpass is an experimental feature configurable solely
through --enable-rosenpass flag on the netbird up command,
see the docs
|
| options/nixos/services.netbird.clients.<name>.hardened | Hardened service:
- runs as a dedicated user with minimal set of permissions (see caveats),
- restricts daemon configuration socket access to dedicated user group
(you can grant access to it with
users.users."<user>".extraGroups = [ netbird-‹name› ]),
Even though the local system resources access is restricted:
CAP_NET_RAW, CAP_NET_ADMIN and CAP_BPF still give unlimited network manipulation possibilites,
- older kernels don't have
CAP_BPF and use CAP_SYS_ADMIN instead,
Known security features that are not (yet) integrated into the module:
- 2024-02-14:
rosenpass is an experimental feature configurable solely
through --enable-rosenpass flag on the netbird up command,
see the docs
|
| options/nixos/services.syncoid.localTargetAllow | Permissions granted for the services.syncoid.user user
for local target datasets
|
| options/nixos/security.pam.ussh.group | If set, then the authenticating user must be a member of this group
to use this module.
|
| options/nixos/services.newt.enable | Whether to enable Newt, user space tunnel client for Pangolin.
|
| options/nixos/services.prosody.muc | Multi User Chat (MUC) configuration
|
| options/nixos/services.userborn.passwordFilesLocation | The location of the original password files
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.acl | Control client access to topics on the broker.
|
| options/nixos/boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.group | The group of the file
|
| options/nixos/services.logind.settings.Login.KillUserProcesses | Specifies whether the processes of a user should be killed
when the user logs out
|
| options/nixos/services.zoneminder.database.username | Username for accessing the database.
|
| options/nixos/services.mobilizon.settings.":mobilizon"."Mobilizon.Storage.Repo".username | User used to connect to the database
|
| options/nixos/services.lldap.settings.ldap_user_dn | Admin username
|
| options/nixos/programs.nano.enable | Whether to enable nano, a small user-friendly console text editor.
|
| options/darwin/homebrew.taps.*.name | When clone_target is unspecified, this is the name of a formula
repository to tap from GitHub using HTTPS
|
| options/nixos/services.inadyn.settings.provider.<name>.username | Username for this DDNS provider.
|
| options/nixos/services.logind.killUserProcesses | Specifies whether the processes of a user should be killed
when the user logs out
|
| options/nixos/systemd.slices.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.timers.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/services.mjolnir.pantalaimon.username | The username to login with.
|
| options/nixos/users.mysql.pam.disconnectEveryOperation | By default, pam_mysql keeps the connection to the MySQL
database until the session is closed
|
| options/nixos/services.saunafs.sfsUser | Run daemons as user.
|
| options/nixos/services.bitcoind.<name>.rpc.users.<name>.passwordHMAC | Password HMAC-SHA-256 for JSON-RPC connections
|
| options/nixos/security.pam.services.<name>.startSession | If set, the service will register a new session with
systemd's login manager
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.superuser | Grants the user, created by the ensureUser attr, superuser permissions
|
| options/nixos/users.extraUsers.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| packages/nixpkgs/udocker | Basic user tool to execute simple docker containers in user space without root privileges |
| options/nixos/services.nextcloud.config.adminuser | Username for the admin account
|
| options/nixos/users.extraUsers.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| options/nixos/services.seafile.dataDir | Path in which to store user data
|
| options/nixos/services.homed.enable | Whether to enable systemd home area/user account manager.
|
| options/nixos/services.mailman.webUser | User to run mailman-web as
|
| options/nixos/services.rshim.enable | Whether to enable user-space rshim driver for the BlueField SoC.
|
| options/nixos/system.nixos.variantName | A string identifying a specific variant or edition of the operating system suitable for presentation to the user
|
| options/home-manager/launchd.agents.<name>.config.ProcessType | This optional key describes, at a high level, the intended purpose of the job
|
| options/nixos/systemd.targets.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.sockets.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/boot.crashDump.enable | If enabled, NixOS will set up a kernel that will
boot on crash, and leave the user in systemd rescue
to be able to save the crashed kernel dump at
/proc/vmcore
|
| options/nixos/services.monado.enable | Whether to enable Monado user service.
|
| options/nixos/services.grafana.settings.users.auto_assign_org | Set to true to automatically add new users to the main organization (id 1)
|
| options/nixos/services.postfix.recipientDelimiter | Delimiter for address extension: so mail to user+test can be handled by ~user/.forward+test
|
| options/nixos/services.rshim.package | The rshim-user-space package to use.
|
| options/home-manager/programs.man.extraConfig | Additional fields to be added to the end of the user manpath config file.
|
| options/nixos/services.saunafs.chunkserver.hdds | Mount points to be used by chunkserver for storage (see sfshdd.cfg(5))
|
| options/nixos/services.kapacitor.defaultDatabase.username | The username to connect to the remote InfluxDB server
|
| packages/nixpkgs/spdk | Set of libraries for fast user-mode storage |
| options/nixos/services.grafana.settings.users.home_page | Path to a custom home page
|
| options/nixos/security.pam.ussh.caFile | By default pam-ussh reads the trusted user CA keys
from /etc/ssh/trusted_user_ca
|
| options/nixos/services.davfs2.davUser | When invoked by root the mount.davfs daemon will run as this user
|
| options/nixos/services.librenms.database.passwordFile | A file containing the password for the user of the MySQL/MariaDB server
|
| options/nixos/services.umami.settings.APP_SECRET_FILE | A file containing a secure random string
|
| options/nixos/programs.rush.shell | The resolved shell path that users can inherit to set rush as their login shell
|
| options/nixos/services.botamusique.settings.bot.username | Name the bot should appear with.
|
| options/nixos/users.extraUsers.<name>.openssh.authorizedPrincipals | A list of verbatim principal names that should be added to the user's
authorized principals.
|
| options/nixos/systemd.services.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| packages/nixpkgs/lxd-ui | Web user interface for LXD |
| packages/nixpkgs/lbry | Browser and wallet for LBRY, the decentralized, user-controlled content marketplace |
| options/nixos/security.pam.mount.enable | Enable PAM mount system to mount filesystems on user login.
|
| options/nixos/security.doas.extraRules.*.noPass | If true, the user is not required to enter a
password.
|
| options/nixos/services.dwm-status.enable | Whether to enable dwm-status user service.
|
| options/home-manager/services.dwm-status.enable | Whether to enable dwm-status user service.
|
| options/home-manager/home.extraOutputsToInstall | List of additional package outputs of the packages
home.packages that should be installed into
the user environment.
|
| options/nixos/services.rabbitmq.listenAddress | IP address on which RabbitMQ will listen for AMQP
connections
|
| options/nixos/services.grafana.settings.users.login_hint | Text used as placeholder text on login page for login/username input.
|
| options/nixos/services.mqtt2influxdb.mqtt.username | Username used to connect to the MQTT server.
|
| options/nixos/services.glitchtip.settings.ENABLE_USER_REGISTRATION | When true, any user will be able to register
|
| options/nixos/networking.interfaces.<name>.virtualOwner | In case of a virtual device, the user who owns it.
null will not set owner, allowing access to any user.
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.username | Username for basic HTTP authentication
|
| options/nixos/services.lldap.settings.ldap_user_email | Admin email.
|
| options/nixos/services.rsync.jobs.<name>.group | The name of an existing user group under which the rsync process should run.
|
| options/nixos/services.moosefs.runAsUser | Run daemons as moosefs user instead of root for better security.
|
| options/home-manager/programs.numbat.initFile | User initialization file (init.nbt) contents
|
| options/nixos/services.openssh.authorizedKeysCommandUser | Specifies the user under whose account the AuthorizedKeysCommand
is run
|
| options/darwin/launchd.agents.<name>.serviceConfig.ProcessType | This optional key describes, at a high level, the intended purpose of the job
|
| packages/nixpkgs/ugm | Terminal based UNIX user and group browser |
| options/nixos/services.gitea.useWizard | Do not generate a configuration and use gitea' installation wizard instead
|
| options/nixos/security.pam.makeHomeDir.umask | The user file mode creation mask to use on home directories
newly created by pam_mkhomedir.
|
| options/nixos/services.lxd-image-server.group | Group assigned to the user and the webroot directory.
|
| options/home-manager/programs.anki.reduceMotion | Disable various animations and transitions of the user interface.
|
| options/home-manager/programs.npm.settings | The user-specific npm configuration
|
| options/nixos/services.lldap.settings.ldap_user_pass | Password for default admin password
|
| options/nixos/services.unpoller.unifi.controllers.*.pass | Path of a file containing the password for the unifi service user
|
| options/nixos/services.emacs.enable | Whether to enable a user service for the Emacs daemon
|
| options/nixos/services.guix.stateDir | The state directory where Guix service will store its data such as its
user-specific profiles, cache, and state files.
Changing it to something other than the default will rebuild the
package.
|
| options/nixos/services.openssh.banner | Message to display to the remote user before authentication is allowed.
|
| options/nixos/services.xtreemfs.homeDir | XtreemFS home dir for the xtreemfs user.
|
| options/nixos/services.zammad.enable | Whether to enable Zammad, a web-based, open source user support/ticketing solution.
|
| options/darwin/programs.gnupg.agent.enable | Enables GnuPG agent for every user session.
|
| options/home-manager/targets.darwin.linkApps.enable | Whether to enable linking macOS applications to the user environment.
|
| options/home-manager/uninstall | Whether to set up a minimal configuration that will remove all managed
files and packages
|
| options/nixos/services.mpdscribble.endpoints.<name>.username | Username for the scrobble service.
|
| options/home-manager/services.mpdscribble.endpoints.<name>.username | Username for the scrobble service.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.ProcessType | This optional key describes, at a high level, the intended purpose of the job
|
| options/nixos/hardware.i2c.enable | Whether to enable i2c devices support
|
| options/nixos/services.actual.group | Group account under which Actual runs
|
| options/nixos/services.btrbk.sshAccess.*.key | SSH public key allowed to login as user btrbk to run remote backups.
|
| options/nixos/services.gitolite.group | Primary group of the Gitolite user account.
|
| options/nixos/services.mysql.ensureUsers.*.name | Name of the user to ensure.
|
| options/nixos/services.movim.runtimeDir | Runtime directory of the movim user which holds the application’s caches & temporary files.
|
| options/home-manager/programs.alot.enable | Whether to enable the Alot mail user agent
|
| options/nixos/services.nvme-rs.settings.email.smtp_username | SMTP username
|
| options/nixos/services.influxdb2.provision.initialSetup.username | Primary username
|
| options/nixos/services.prometheus.exporters.dmarc.imap.username | Login username for the IMAP connection.
|
| options/nixos/services.dovecot2.mailUser | Default user to store mail for virtual users.
|
| options/nixos/security.please.enable | Whether to enable please, a Sudo clone which allows a users to execute a command or edit a
file as another user
.
|
| options/nixos/services.klipper.group | Group account under which Klipper runs
|
| options/nixos/programs.gnupg.agent.enable | Enables GnuPG agent with socket-activation for every user session.
|
| options/nixos/services.tomcat.extraGroups | Defines extra groups to which the tomcat user belongs.
|
| options/nixos/services.zitadel.enable | Whether to enable ZITADEL, a user and identity access management platform.
|
| options/home-manager/targets.darwin.copyApps.enable | Whether to enable copying macOS applications to the user environment (works with Spotlight).
|
| options/nixos/systemd.automounts.*.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/programs.tmux.secureSocket | Store tmux socket under /run, which is more secure than /tmp, but as a
downside it doesn't survive user logout.
|
| options/nixos/services.gocd-agent.extraGroups | List of extra groups that the "gocd-agent" user should be a part of.
|
| options/nixos/services.mysql.group | Group account under which MySQL runs.
If left as the default value this group will automatically be created
on system activation, otherwise you are responsible for
ensuring the user exists before the MySQL service starts.
|
| options/nixos/services.pixelfed.dataDir | State directory of the pixelfed user which holds
the application's state and data.
|
| options/nixos/services.vault.extraSettingsPaths | Configuration files to load besides the immutable one defined by the NixOS module
|
| options/nixos/services.grafana.settings.security.admin_user | Default admin username.
|
| options/nixos/services.outline.oidcAuthentication.userinfoUrl | OIDC userinfo URL endpoint.
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.users | Sync users.
|
| options/nixos/services.printing.cups-pdf.instances.<name>.settings.Out | output directory;
${HOME} will be expanded to the user's home directory,
${USER} will be expanded to the user name.
|
| options/nixos/nix.buildMachines.*.sshUser | The username to log in as on the remote host
|
| options/darwin/nix.buildMachines.*.sshUser | The username to log in as on the remote host
|
| options/home-manager/nix.buildMachines.*.sshUser | The username to log in as on the remote host
|
| options/nixos/services.syncoid.commands.<name>.localTargetAllow | Permissions granted for the services.syncoid.user user
for local target datasets
|
| options/nixos/security.rtkit.enable | Whether to enable the RealtimeKit system service, which hands
out realtime scheduling priority to user processes on
demand
|
| options/nixos/programs.tcpdump.enable | Whether to configure a setcap wrapper for tcpdump
|
| options/nixos/services.bitlbee.configDir | Specify an alternative directory to store all the per-user configuration
files.
|
| packages/nixpkgs/doas | Executes the given command as another user |
| options/nixos/services.mqtt2influxdb.influxdb.username | Username for InfluxDB login.
|
| options/nixos/services.homed.promptOnFirstBoot | Whether to enable interactively prompting for user creation on first boot
.
|
| options/nixos/security.acme.certs.<name>.postRun | Commands to run after new certificates go live
|
| options/nixos/services.omnom.passwordFile | File containing the password for the SMTP user.
|
| options/nixos/services.zeyple.group | Group to use to run Zeyple.
If left as the default value this group will automatically be created
on system activation, otherwise the sysadmin is responsible for
ensuring the user exists.
|
| options/home-manager/programs.fish.binds.<name>.operate | Operate on preset bindings or user bindings
|
| options/home-manager/programs.tmux.secureSocket | Store tmux socket under /run, which is more
secure than /tmp, but as a downside it doesn't
survive user logout.
|
| options/nixos/services.lldap.settings.ldap_user_pass_file | Path to a file containing the default admin password
|
| options/nixos/services.prometheus.remoteRead.*.basic_auth.username | HTTP username
|
| packages/nixpkgs/glom | Easy-to-use database designer and user interface |
| packages/nixpkgs/glui | User interface library using OpenGL |
| packages/nixpkgs/slop | Queries for a selection from the user and prints the region to stdout |
| packages/nixpkgs/zammad | Web-based, open source user support/ticketing solution |
| options/nixos/services.code-server.extraGroups | An array of additional groups for the code-server user.
|
| options/nixos/services.speechd.config | System wide configuration file for Speech Dispatcher
|
| options/nixos/services.nsd.keys.<name>.keyFile | Path to the file which contains the actual base64 encoded
key
|
| options/nixos/services.coturn.use-auth-secret | TURN REST API flag
|
| options/nixos/services.pgbouncer.settings.pgbouncer.max_client_conn | Maximum number of client connections allowed
|
| options/nixos/services.prometheus.remoteWrite.*.basic_auth.username | HTTP username
|
| options/nixos/services.prosody.uploadHttp | Configures the old Prosody builtin HTTP server to handle user uploads.
|
| options/nixos/security.acme.useRoot | Whether to use the root user when generating certs
|
| options/nixos/services.jenkins.extraGroups | List of extra groups that the "jenkins" user should be a part of.
|
| options/nixos/services.gocd-server.extraGroups | List of extra groups that the "gocd-server" user should be a part of.
|
| options/nixos/hardware.alsa.enable | Whether to set up the user space part of the Advanced Linux Sound Architecture (ALSA)
Enable this option only if you want to use ALSA as your main sound system,
not if you're using a sound server (e.g
|
| options/nixos/services.bitmagnet.group | Group of user running bitmagnet
|
| options/nixos/services.rethinkdb.group | Group which rethinkdb user belongs to.
|
| options/nixos/services.mainsail.enable | Whether to enable a modern and responsive user interface for Klipper.
|
| options/darwin/nix.channel.enable | Whether the nix-channel command and state files are made available on the machine
|
| options/nixos/services.dependency-track.settings."alpine.oidc.username.claim" | Defines the name of the claim that contains the username in the provider's userinfo endpoint
|
| options/nixos/services.incron.allow | Users allowed to use incrontab
|
| options/nixos/services.dovecot2.imapsieve.mailbox.*.after | When an IMAP event of interest occurs, this sieve script is executed after any user script respectively
|
| options/nixos/services.znapzend.zetup.<name>.destinations.<name>.host | Host to use for the destination dataset
|
| packages/nixpkgs/intel-cmt-cat | User space software for Intel(R) Resource Director Technology |
| packages/nixpkgs/mc | File Manager and User Shell for the GNU Project, known as Midnight Commander |
| options/nixos/services.slurm.procTrackType | Plugin to be used for process tracking on a job step basis
|
| options/home-manager/launchd.agents.<name>.config.UserName | This optional key specifies the user to run the job as
|
| options/nixos/services.anuko-time-tracker.settings.defaultLanguage | Defines Anuko Time Tracker default language
|
| options/nixos/services.diod.allsquash | Remap all users to "nobody"
|
| options/nixos/services.tt-rss.auth.autoLogin | Automatically login user on remote or other kind of externally supplied
authentication, otherwise redirect to login form as normal
|
| options/nixos/services.tt-rss.singleUserMode | Operate in single user mode, disables all functionality related to
multiple users and authentication
|
| options/nixos/services.asusd.enableUserService | Activate the asusd-user service.
|
| options/nixos/services.davis.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.slskd.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.movim.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.prosody.httpFileShare | Configures the http_file_share module to handle user uploads
|
| options/nixos/services.pdfding.enable | Whether to enable PdfDing service
|
| options/nixos/services.dovecot2.imapsieve.mailbox.*.before | When an IMAP event of interest occurs, this sieve script is executed before any user script respectively
|
| packages/nixpkgs/ding | Simple and fast dictionary lookup tool |
| packages/nixpkgs/bliss | Open source tool for computing automorphism groups and canonical forms of graphs |
| packages/nixpkgs/fuse2 | Library that allows filesystems to be implemented in user space |
| packages/nixpkgs/fuse | Library that allows filesystems to be implemented in user space |
| packages/nixpkgs/gdm | Program that manages graphical display servers and handles graphical user logins |
| packages/nixpkgs/su-exec | Switch user and group id and exec |
| packages/nixpkgs/termbox | Library for writing text-based user interfaces |
| packages/nixpkgs/vpp | Fast, scalable layer 2-4 multi-platform network stack running in user space |
| packages/nixpkgs/poop | Compare the performance of multiple commands with a colorful terminal user interface |
| options/nixos/services.disnix.enableMultiUser | Whether to support multi-user mode by enabling the Disnix D-Bus service
|
| options/nixos/nix.channel.enable | Whether the nix-channel command and state files are made available on the machine
|
| options/nixos/services.grav.systemSettings | Settings written to user/config/system.yaml.
|
| options/nixos/security.doas.extraRules.*.persist | If true, do not ask for a password again for some
time after the user successfully authenticates.
|
| options/nixos/services.couchdb.configFile | Configuration file for persisting runtime changes
|
| options/nixos/services.infinoted.group | What to call the primary group of the dedicated user under which infinoted is run
|
| options/nixos/services.unpoller.loki.pass | Path of a file containing the password for Loki
|
| options/nixos/services.snipe-it.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.paretosecurity.users.<name>.inviteId | A unique ID that links the agent to Pareto Cloud
|
| options/nixos/services.prometheus.scrapeConfigs.*.basic_auth.username | HTTP username
|
| options/nixos/services.dependency-track.settings."alpine.database.username" | Specifies the username to use when authenticating to the database.
|
| options/nixos/services.dovecot2.enablePAM | Whether to enable creating a own Dovecot PAM service and configure PAM user logins.
|
| options/nixos/security.doas.extraRules.*.cmd | The command the user is allowed to run
|
| options/nixos/services.couchdb.viewIndexDir | Specifies location of CouchDB view index files
|
| options/nixos/services.buildbot-master.group | Primary group of buildbot user.
|
| options/nixos/services.oidentd.enable | Whether to enable ‘oidentd’, an implementation of the Ident
protocol (RFC 1413)
|
| options/nixos/services.portunus.enable | Whether to enable Portunus, a self-contained user/group management and authentication service for LDAP.
|
| options/nixos/services.riemann-dash.dataDir | Location of the riemann-base dir
|
| options/home-manager/programs.waveterm.themes | User defined terminal themes
|
| options/nixos/services.firefox-syncserver.database.createLocally | Whether to create database and user on the local machine if they do not exist
|
| options/nixos/services.pgbackrest.stanzas.<name>.instances | An attribute set of database instances as described in:
https://pgbackrest.org/configuration.html#section-stanza
Each instance defaults to set pg-host to the attribute's name
|
| packages/nixpkgs/clashmi | mihomo (clash.meta) graphical user interface based on Flutter |
| packages/nixpkgs/tparted | Text-based user interface (TUI) frontend for parted |
| packages/nixpkgs/vlan | User mode programs to enable VLANs on Ethernet devices |
| options/nixos/services.prometheus.exporters.nextcloud.username | Username for connecting to Nextcloud
|
| options/nixos/services.grafana.settings.users.default_theme | Sets the default UI theme. system matches the user's system theme.
|
| options/nixos/services.buildbot-worker.group | Primary group of buildbot Worker user.
|
| options/nixos/services.prefect.databaseUser | database user for postgres only
|
| options/nixos/services.oauth2-proxy.passBasicAuth | Pass HTTP Basic Auth, X-Forwarded-User and X-Forwarded-Email information to upstream.
|
| options/nixos/services.mjolnir.accessTokenFile | File containing the matrix access token for the mjolnir user.
|
| options/nixos/services.grafana.settings.users.password_hint | Text used as placeholder text on login page for password input.
|
| options/nixos/services.syncthing.settings.options.urAccepted | Whether the user has accepted to submit anonymous usage data
|
| options/home-manager/services.syncthing.settings.options.urAccepted | Whether the user has accepted to submit anonymous usage data
|
| options/nixos/services.coturn.no-auth | This option is opposite to lt-cred-mech.
(TURN Server with no-auth option allows anonymous access)
|
| options/nixos/environment.shells | A list of permissible login shells for user accounts
|
| options/nixos/services.fluidd.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.akkoma.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.graylog.rootUsername | Name of the default administrator user
|
| options/nixos/services.gancio.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.monica.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.matomo.nginx.kTLS | Whether to enable kTLS support
|
| options/home-manager/services.podman.builds.<name>.autoStart | Whether to start the build on boot
|
| options/home-manager/services.podman.images.<name>.autoStart | Whether to pull the image on boot
|
| options/nixos/services.documize.db | Database specific connection string for example:
- MySQL/Percona/MariaDB:
user:password@tcp(host:3306)/documize
- MySQLv8+:
user:password@tcp(host:3306)/documize?allowNativePasswords=true
- PostgreSQL:
host=localhost port=5432 dbname=documize user=admin password=secret sslmode=disable
- MSSQL:
sqlserver://username:password@localhost:1433?database=Documize or
sqlserver://sa@localhost/SQLExpress?database=Documize
|
| packages/nixpkgs/fuse3 | Library that allows filesystems to be implemented in user space |
| packages/nixpkgs/jftui | Jellyfin Terminal User Interface |
| options/nixos/security.loginDefs.settings.UID_MAX | Range of user IDs used for the creation of regular users by useradd or newusers.
|
| options/nixos/security.loginDefs.settings.UID_MIN | Range of user IDs used for the creation of regular users by useradd or newusers.
|
| options/nixos/services.siproxd.passwordFile | Path to per-user password file.
|
| options/nixos/services._3proxy.services.*.acl | Use this option to limit user access to resources.
|
| options/nixos/services.gitlab.statePath | GitLab state directory
|
| options/nixos/programs.gnupg.dirmngr.enable | Enables GnuPG network certificate management daemon with socket-activation for every user session.
|
| options/nixos/programs.mouse-actions.autorun | Whether to start a user service to run mouse-actions on startup.
|
| options/nixos/services.mailman.ldap.superUserGroup | Group where a user must be a member of to gain superuser rights.
|
| options/home-manager/programs.zed-editor.mutableUserTasks | Whether user tasks (tasks.json) can be updated by zed.
|
| options/nixos/security.pam.services.<name>.pamMount | Enable PAM mount (pam_mount) system to mount filesystems on user login.
|
| options/nixos/nix.buildMachines.*.sshKey | The path to the SSH private key with which to authenticate on
the build machine
|
| options/nixos/security.sudo.defaultOptions | Options used for the default rules, granting root and the
wheel group permission to run any command as any user.
|
| options/nixos/services.resilio.checkForUpdates | Determines whether to check for updates and alert the user
about them in the UI.
|
| options/darwin/nix.buildMachines.*.sshKey | The path to the SSH private key with which to authenticate on
the build machine
|
| options/home-manager/targets.darwin.defaults | Set macOS user defaults
|
| options/home-manager/nix.buildMachines.*.sshKey | The path to the SSH private key with which to authenticate on
the build machine
|
| options/home-manager/programs.zed-editor.mutableUserDebug | Whether user debug configurations (debug.json) can be updated by zed.
|
| packages/nixpkgs/nsc | Tool for creating NATS account and user access configurations |
| packages/nixpkgs/pam | Pluggable Authentication Modules, a flexible mechanism for authenticating user |
| options/nixos/services.dependency-track.oidc.teamSynchronization | This option will ensure that team memberships for OpenID Connect users are dynamic and
synchronized with membership of OpenID Connect groups or assigned roles
|
| options/nixos/security.sudo-rs.defaultOptions | Options used for the default rules, granting root and the
wheel group permission to run any command as any user.
|
| options/nixos/services.librechat.dataDir | Absolute path for where the LibreChat server will use as its data directory to store logs, user uploads, and generated images.
|
| options/nixos/services.greetd.restart | Whether to restart greetd when it terminates (e.g. on failure)
|
| options/nixos/services.kresd.enable | Whether to enable knot-resolver (version 5) domain name server
|
| options/nixos/services.dokuwiki.sites.<name>.acl.*.actor | User or group to restrict
|
| options/nixos/security.acme.defaults.postRun | Commands to run after new certificates go live
|
| options/nixos/services.discourse.admin.email | The admin user email address.
|
| options/nixos/services.davis.adminPasswordFile | The full path to a file that contains the admin's password
|
| options/nixos/services.smokeping.config | Full smokeping config supplied by the user
|
| options/nixos/services.pixelfed.runtimeDir | Ruutime directory of the pixelfed user which holds
the application's caches and temporary files.
|
| options/nixos/services.vsftpd.anonymousUser | Whether to enable the anonymous FTP user.
|
| options/home-manager/programs.anki.minimalistMode | Minimalist user interface mode.
|
| options/nixos/services.headscale.settings.oidc.allowed_users | Users allowed to authenticate even if not in allowedDomains.
|
| options/nixos/security.loginDefs.settings.SYS_UID_MAX | Range of user IDs used for the creation of system users by useradd or newusers.
|
| options/nixos/security.loginDefs.settings.SYS_UID_MIN | Range of user IDs used for the creation of system users by useradd or newusers.
|
| options/nixos/hardware.hackrf.enable | Enables hackrf udev rules and ensures 'plugdev' group exists
|
| options/nixos/services.znc.confOptions.networks | IRC networks to connect the user to.
|
| options/home-manager/programs.fresh-editor.settings | Configuration settings for fresh-editor
|
| packages/nixpkgs/nvme-cli | NVM-Express user space tooling for Linux |
| options/nixos/services.prometheus.exporters.fritz.settings.devices.*.username | Username to authenticate with the target device.
|
| options/nixos/services.gitolite.enable | Enable gitolite management under the
gitolite user
|
| options/nixos/programs.dsearch.systemd.enable | Whether to enable systemd user service for dsearch.
|
| options/nixos/services.pgmanage.loginTimeout | Number of seconds of inactivity before user is automatically logged
out.
|
| options/nixos/services.quickwit.dataDir | Data directory for Quickwit
|
| options/nixos/services.temporal.dataDir | Data directory for Temporal
|
| options/home-manager/accounts.email.maildirBasePath | The base directory for account maildir directories
|
| options/nixos/services.dovecot2.createMailUser | Whether to enable automatically creating the user
given in services.dovecot.user and the group
given in services.dovecot.group.
|
| options/nixos/programs.zsh.enableGlobalCompInit | Enable execution of compinit call for all interactive zsh shells
|
| options/nixos/programs.corectrl.enable | Whether to enable CoreCtrl, a tool to overclock amd graphics cards and processors
|
| options/nixos/services.buildbot-worker.workerUser | Specifies the Buildbot Worker user.
|
| options/nixos/services.logcheck.extraGroups | Extra groups for the logcheck user, for example to be able to use sendmail,
or to access certain log files.
|
| options/nixos/services.vsftpd.enableVirtualUsers | Whether to enable the pam_userdb-based
virtual user system
|
| options/nixos/services.lasuite-docs.settings.DB_USER | User of the database
|
| options/nixos/services.lasuite-meet.settings.DB_USER | User of the database
|
| options/darwin/programs.zsh.enableGlobalCompInit | Enable execution of compinit call for all interactive zsh shells
|
| packages/nixpkgs/scli | Simple terminal user interface for Signal |
| packages/nixpkgs/proot | User-space implementation of chroot, mount --bind and binfmt_misc |
| options/home-manager/launchd.agents.<name>.config.GroupName | This optional key specifies the group to run the job as
|
| options/nixos/security.run0.wheelNeedsPassword | Whether users of the wheel group must
provide a password to run commands as super user via run0.
|
| options/nixos/services.couchdb.uriFile | This file contains the full URI that can be used to access this
instance of CouchDB
|
| options/nixos/services.syncoid.localSourceAllow | Permissions granted for the services.syncoid.user user
for local source datasets
|
| options/nixos/services.vsftpd.anonymousUserHome | Directory to consider the HOME of the anonymous user.
|
| options/nixos/security.sudo.wheelNeedsPassword | Whether users of the wheel group must
provide a password to run commands as super user via sudo.
|
| options/nixos/security.doas.wheelNeedsPassword | Whether users of the wheel group must provide a password to
run commands as super user via doas.
|
| options/nixos/services.prometheus.alertmanagerGotify.metrics.username | The username used to access your metrics.
|
| options/nixos/services.prometheus.exporters.imap-mailstat.accounts.<name>.username | If empty string mailaddress value is used
|
| options/nixos/services.jenkinsSlave.enable | If true the system will be configured to work as a jenkins slave
|
| options/nixos/services.immich.mediaLocation | Directory used to store media files
|
| options/nixos/programs.feedbackd.enable | Whether to enable the feedbackd D-BUS service and udev rules
|
| packages/nixpkgs/ddcui | Graphical user interface for ddcutil - control monitor settings |
| packages/nixpkgs/soju | User-friendly IRC bouncer |
| options/nixos/security.sudo-rs.wheelNeedsPassword | Whether users of the wheel group must
provide a password to run commands as super user via sudo.
|
| options/nixos/services.greetd.useTextGreeter | Whether the greeter uses text-based user interfaces (For example, tuigreet)
|
| options/nixos/programs.mosh.withUtempter | Whether to enable libutempter for mosh
|
| options/nixos/programs.tmux.withUtempter | Whether to enable libutempter for tmux
|
| options/home-manager/services.restic.backups | Backup configurations for Restic
|
| options/home-manager/programs.ghostty.systemd.enable | Whether to enable the Ghostty systemd user service.
|
| options/nixos/services.tt-rss.plugins | List of plugins to load automatically for all users
|
| options/nixos/services.pgmanage.loginGroup | This tells pgmanage to only allow users in a certain PostgreSQL group to
login to pgmanage
|
| options/nixos/services.accounts-daemon.enable | Whether to enable AccountsService, a DBus service for accessing
the list of user accounts and information attached to those accounts.
|
| options/nixos/services.gitea.captcha.requireForLogin | Displays a CAPTCHA challenge whenever a user logs in.
|
| options/nixos/services.couchdb.extraConfigFiles | Extra configuration files
|
| options/nixos/services.akkoma.initDb.password | Password of the database user to initialise the database with
|
| options/nixos/services.dovecot2.quotaGlobalPerUser | Quota limit for the user in bytes
|
| options/nixos/services.couchdb.databaseDir | Specifies location of CouchDB database files (*.couch named)
|
| options/nixos/services.hostapd.enable | Whether to enable hostapd, a user space daemon for access point and
authentication servers
|
| options/nixos/environment.stub-ld.enable | Install a stub ELF loader to print an informative error message
in the event that a user attempts to run an ELF binary not
compiled for NixOS.
|
| options/nixos/services.nomad.dropPrivileges | Whether the nomad agent should be run as a non-root nomad user.
|
| options/nixos/services.lighttpd.document-root | Document-root of the web server
|
| options/nixos/services.mailman.ldap.groupSearch.query | Query to find a group associated to a user in the LDAP database.
|
| options/home-manager/programs.gpg.mutableKeys | If set to true, you may manage your keyring as a user
using the gpg command
|
| options/home-manager/programs.cudatext.lexerSettings | User configuration settings specific to each lexer.
|
| options/home-manager/services.emacs.startWithUserSession | Whether to launch Emacs service with the systemd user session
|
| options/home-manager/programs.zed-editor.mutableUserKeymaps | Whether user keymaps (keymap.json) can be updated by zed.
|
| packages/nixpkgs/esdm | Entropy Source and DRNG Manager in user space |
| packages/nixpkgs/zap-chip | Generic generation engine and user interface for applications and libraries based on Zigbee Cluster Library (ZCL) |
| options/nixos/services.earlyoom.enableNotifications | Send notifications about killed processes via the system d-bus
|
| options/nixos/services.dendrite.settings.user_api.device_database.connection_string | Database for the User API, devices.
|
| options/nixos/services.upower.ignoreLid | Do we ignore the lid state
Some laptops are broken
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.unique | Connection uniqueness policy to enforce
|
| options/nixos/services.prosody.muc.*.vcard_muc | Adds the ability to set vCard for Multi User Chat rooms
|
| options/nixos/services.librenms.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.cockroachdb.group | User account under which CockroachDB runs
|
| options/nixos/services.fediwall.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.dolibarr.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.jenkins.jobBuilder.accessUser | User id in Jenkins used to reload config.
|
| options/nixos/services.buildbot-master.extraGroups | List of extra groups that the buildbot user should be a part of.
|
| options/nixos/services.headscale.group | Group under which headscale runs.
If left as the default value this group will automatically be created
on system activation, otherwise you are responsible for
ensuring the user exists before the headscale service starts.
|
| options/nixos/services.agorakit.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.kanboard.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/fonts.fontconfig.includeUserConf | Include the user configuration from
~/.config/fontconfig/fonts.conf or
~/.config/fontconfig/conf.d.
|
| options/nixos/services.mainsail.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.namecoind.rpc.allowFrom | List of IP address ranges allowed to use the RPC API
|
| options/nixos/services.pixelfed.nginx.kTLS | Whether to enable kTLS support
|
| options/darwin/launchd.agents.<name>.serviceConfig.UserName | This optional key specifies the user to run the job as
|
| options/home-manager/services.podman.networks.<name>.autoStart | Whether to start the network on boot (requires user lingering).
|
| options/nixos/services.gnome.gnome-keyring.enable | Whether to enable GNOME Keyring daemon, a service designed to
take care of the user's security credentials,
such as user names and passwords
.
|
| options/nixos/services.gitea.settings.service.DISABLE_REGISTRATION | By default any user can create an account on this gitea instance
|
| options/nixos/services.apcupsd.enable | Whether to enable the APC UPS daemon. apcupsd monitors your UPS and
permits orderly shutdown of your computer in the event of a power
failure
|
| options/nixos/services.buildbot-worker.extraGroups | List of extra groups that the Buildbot Worker user should be a part of.
|
| options/nixos/services.gitlab.databaseUsername | GitLab database user.
|
| options/nixos/services.matomo.nginx | With this option, you can customize an nginx virtualHost which already has sensible defaults for Matomo
|
| options/nixos/services.restic.server.privateRepos | Enable private repos
|
| options/nixos/services.livebook.enableUserService | Whether to enable a user service for Livebook.
|
| packages/nixpkgs/dcv | TUI (Terminal User Interface) tool for monitoring Docker containers and Docker Compose applications |
| packages/nixpkgs/fteqcc | User friendly QuakeC compiler |
| packages/nixpkgs/fd | Simple, fast and user-friendly alternative to find |
| packages/nixpkgs/ytt | YAML templating tool that allows configuration of complex software via reusable templates with user-provided values |
| packages/nixpkgs/pps-tools | User-space tools for LinuxPPS |
| packages/nixpkgs/rexi | User-friendly terminal UI to interactively work with regular expressions |
| options/nixos/services.openafsClient.daemons | Number of daemons to serve user requests
|
| options/nixos/security.pam.u2f.settings.cue | By default pam-u2f module does not inform user
that he needs to use the u2f device, it just waits without a prompt
|
| options/nixos/boot.loader.initScript.enable | Some systems require a /sbin/init script which is started
|
| options/nixos/boot.bootspec.extensions | User-defined data that extends the bootspec document
|
| options/nixos/programs.system-config-printer.enable | Whether to enable system-config-printer, a Graphical user interface for CUPS administration.
|
| options/nixos/services.miniflux.config.CREATE_ADMIN | Create an admin user from environment variables.
|
| options/nixos/services.maubot.extraConfigFile | A file for storing secrets
|
| options/nixos/services.tt-rss.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.privoxy.settings | This option is mapped to the main Privoxy configuration file
|
| options/nixos/services.openssh.settings.PrintMotd | Whether to enable printing /etc/motd when a user logs in interactively.
|
| options/darwin/environment.shells | A list of permissible login shells for user accounts
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.username | Username for the api or remote transport
|
| options/nixos/security.pam.enableFscrypt | Whether to enable fscrypt, to automatically unlock directories with the user's login password
|
| options/nixos/services.gammu-smsd.backend.sql.password | User password used for connection to the database
|
| options/nixos/services.consul.dropPrivileges | Whether the consul agent should be run as a non-root consul user.
|
| options/nixos/services.anki-sync-server.baseDirectory | Base directory where user(s) synchronized data will be stored.
|
| options/nixos/services.microsocks.authOnce | If true, once a specific ip address authed successfully with user/pass,
it is added to a whitelist and may use the proxy without auth.
|
| options/nixos/services.radicle.httpd.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.netbird.tunnels.<name>.name | Primary name for use (as a suffix) in:
- systemd service name,
- hardened user name and group,
- systemd
*Directory= names,
- desktop application identification,
|
| options/nixos/services.netbird.clients.<name>.name | Primary name for use (as a suffix) in:
- systemd service name,
- hardened user name and group,
- systemd
*Directory= names,
- desktop application identification,
|
| options/nixos/services.misskey.settings.url | The final user-facing URL
|
| options/nixos/services.minetest-server.configPath | Path to the config to use
|
| options/home-manager/programs.kakoune.config.keyMappings | User-defined key mappings
|
| options/home-manager/services.devilspie2.enable | Whether to enable Devilspie2, a window matching utility, allowing the user to
perform scripted actions on windows as they are created.
|
| packages/nixpkgs/bsd-finger | User information lookup program |
| packages/nixpkgs/trace-cmd | User-space tools for the Linux kernel ftrace subsystem |
| packages/nixpkgs/zap-chip-gui | Generic generation engine and user interface for applications and libraries based on Zigbee Cluster Library (ZCL) |
| options/nixos/services.pgmanage.superOnly | This tells pgmanage whether or not to only allow super users to
login
|
| options/nixos/services.dendrite.settings.user_api.account_database.connection_string | Database for the User API, accounts.
|
| options/nixos/services.dependency-track.settings."alpine.oidc.team.synchronization" | This option will ensure that team memberships for OpenID Connect users are dynamic and
synchronized with membership of OpenID Connect groups or assigned roles
|
| options/nixos/programs.steam.fontPackages | Font packages to use in Steam
|
| options/nixos/services.wstunnel.clients.<name>.upgradeCredentials | Use these credentials to authenticate during the HTTP upgrade request
(Basic authorization type, USER:[PASS]).
Passwords specified here will be world-readable in the Nix store!
To pass a password to the service, point the environmentFile option
to a file containing HTTP_PASSWORD=<your-password-here> and set this
option to <user>:$HTTP_PASSWORD
|
| options/nixos/services.gitolite.adminPubkey | Initial administrative public key for Gitolite
|
| options/nixos/services.unpoller.influxdb.pass | Path of a file containing the password for influxdb
|
| options/nixos/services.slurm.dbdserver.storageUser | Database user name.
|
| options/nixos/services.portunus.dex.enable | Whether to enable Dex ldap connector
|
| packages/nixpkgs/perlPackages.UserIdentity | Collect information about a user |
| options/nixos/services.anuko-time-tracker.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.jupyter.kernels.<name>.displayName | Name that will be shown to the user.
|
| options/nixos/services.kasmweb.defaultUserPassword | default user password to use.
|
| options/nixos/services.httpd.logFormat | Selects the access log format written to log files
|
| options/nixos/services.nginx.virtualHosts.<name>.kTLS | Whether to enable kTLS support
|
| options/nixos/services.udisks2.mountOnMedia | When enabled, instructs udisks2 to mount removable drives under /media/ directory, instead of the
default, ACL-controlled /run/media/$USER/
|
| options/nixos/services.hylafax.autostart | Autostart the HylaFAX queue manager at system start
|
| options/darwin/launchd.daemons.<name>.serviceConfig.UserName | This optional key specifies the user to run the job as
|
| options/darwin/networking.computerName | The user-friendly name for the system, set in System Preferences > Sharing > Computer Name
|
| options/home-manager/programs.zed-editor.mutableUserSettings | Whether user settings (settings.json) can be updated by zed.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.identityFile | Specifies files from which the user identity is read
|
| packages/nixpkgs/MMA | Creates MIDI tracks for a soloist to perform over from a user supplied file containing chords |
| packages/nixpkgs/girara | User interface library |
| packages/nixpkgs/hjson | User interface for JSON |
| packages/nixpkgs/mma | Creates MIDI tracks for a soloist to perform over from a user supplied file containing chords |
| options/nixos/security.duosec.autopush | If true, Duo Unix will automatically send
a push login request to the user’s phone, falling back on a
phone call if push is unavailable
|
| options/nixos/services.atuin.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.coder.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.davis.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.maddy.ensureAccounts | List of IMAP accounts which get automatically created
|
| options/nixos/services.lldap.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.writefreely.admin.name | The name of the first admin user.
|
| options/nixos/services.rke2.cisHardening | Enable CIS Hardening for RKE2
|
| options/darwin/services.gitlab-runner.sessionServer | The session server allows the user to interact with jobs
that the Runner is responsible for
|
| options/darwin/nixpkgs.pkgs | If set, the pkgs argument to all nix-darwin modules is the value of
this option, extended with nixpkgs.overlays, if
that is also set
|
| packages/nixpkgs/perl5Packages.UserIdentity | Collect information about a user |
| options/nixos/services.hologram-server.enableLdapRoles | Whether to assign user roles based on the user's LDAP group memberships
|
| options/nixos/services.prometheus.exporters.unpoller.controllers.*.pass | Path of a file containing the password for the unifi service user
|
| options/nixos/services.xserver.desktopManager.surf-display.inactivityInterval | Setting for internal inactivity timer to restart surf-display if the
user goes inactive/idle to get a fresh session for the next user of
the kiosk
|
| options/nixos/services.hbase-standalone.dataDir | Specifies location of HBase database files
|
| options/nixos/services.bookstack.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.snipe-it.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.oncall.secretFile | A YAML file containing secrets such as database or user passwords
|
| options/nixos/services.tcsd.platformCred | Path to the platform credential for your TPM
|
| options/nixos/services.postgresql.ensureUsers.*.name | Name of the user to ensure.
|
| options/nixos/services.weblate.djangoSecretKeyFile | Location of the Django secret key
|
| options/darwin/services.postgresql.ensureUsers.*.name | Name of the user to ensure.
|
| packages/nixpkgs/arp-scan | ARP scanning and fingerprinting tool |
| packages/nixpkgs/ego | Run Linux desktop applications under a different local user |
| packages/nixpkgs/superd | Unprivileged user service supervisor |
| packages/nixpkgs/qtspim | New user interface for spim, a MIPS simulator |
| options/nixos/virtualisation.oci-containers.containers.<name>.login.username | Username for login.
|
| options/nixos/services.grafana.settings.users.allow_org_create | Set to false to prohibit users from creating new organizations.
|
| options/nixos/security.duosec.acceptEnvFactor | Look for factor selection or passcode in the
$DUO_PASSCODE environment variable before
prompting the user for input
|
| options/nixos/security.pam.services.<name>.enableAppArmor | Enable support for attaching AppArmor profiles at the
user/group level, e.g., as part of a role based access
control scheme.
|
| options/nixos/services.borgbackup.jobs.<name>.group | The group borg is run as
|
| options/nixos/services.firezone.relay.tokenFile | A file containing the firezone relay token
|
| options/nixos/services.jenkins.jobBuilder.accessTokenFile | File containing the API token for the accessUser
user.
|
| options/nixos/services.fwupd.extraTrustedKeys | Installing a public key allows firmware signed with a matching private key to be recognized as trusted, which may require less authentication to install than for untrusted files
|
| options/nixos/boot.initrd.network.ssh.authorizedKeys | Authorized keys for the root user on initrd
|
| options/nixos/programs.dsearch.systemd.target | The systemd target that will automatically start the dsearch service
|
| options/nixos/services.librenms.database.socket | A unix socket to mysql, accessible by the librenms user
|
| options/nixos/services.opensearch.dataDir | Data directory for OpenSearch
|
| options/nixos/services.lldap.settings.http_port | The port on which to have the HTTP server, for user login and administration.
|
| options/nixos/services.monado.forceDefaultRuntime | Whether to ensure that Monado is the active runtime set for the current
user
|
| options/nixos/services.part-db.enablePostgresql | Whether to configure the postgresql database for part-db
|
| options/nixos/services.windmill.database.urlPath | Path to the file containing the database url windmill should connect to
|
| packages/nixpkgs/claws-mail | User-friendly, lightweight, and fast email client |
| packages/nixpkgs/sshs | Terminal user interface for SSH |
| packages/nixpkgs/templ | Language for writing HTML user interfaces in Go |
| packages/nixpkgs/vgrep | User-friendly pager for grep/git-grep/ripgrep |
| packages/nixpkgs/ianny | Desktop utility that helps preventing repetitive strain injuries by keeping track of usage patterns and periodically informing the user to take breaks |
| packages/nixpkgs/kaidan | User-friendly and modern chat app, using XMPP |
| packages/nixpkgs/reason | User-friendly programming language built on OCaml |
| options/nixos/services.maubot.settings.admins | List of administrator users
|
| options/nixos/services.grafana.settings.users.default_language | This setting configures the default UI language, which must be a supported IETF language tag, such as en-US.
|
| options/nixos/services.grafana.settings.users.viewers_can_edit | Viewers can access and use Explore and perform temporary edits on panels in dashboards they have access to
|
| options/nixos/programs.atop.setuidWrapper.enable | Whether to install a setuid wrapper for Atop
|
| options/nixos/services.buildkite-agents.<name>.extraGroups | Groups the user for this buildkite agent should belong to
|
| options/nixos/power.ups.upsmon.monitor.<name>.passwordFile | The full path to a file containing the password from
upsd.users for accessing this UPS
|
| options/nixos/programs.miriway.enable | Whether to enable Miriway, a Mir based Wayland compositor
|
| options/nixos/services.moodle.initialPassword | Specifies the initial password for the admin, i.e. the password assigned if the user does not already exist
|
| options/nixos/services.monica.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.physlock.enable | Whether to enable the physlock screen locking mechanism
|
| options/nixos/services.moodle.database.createLocally | Create the database and database user locally.
|
| options/home-manager/programs.hyprshot.saveLocation | Set the $HYPRSHOT_DIR environment variable to the given location
|
| options/home-manager/programs.gpg.mutableTrust | If set to true, you may manage trust as a user using
the gpg command
|
| options/nixos/services.mysql.ensureUsers | Ensures that the specified users exist and have at least the ensured permissions
|
| options/nixos/services.angrr.settings.owned-only | Only monitors owned symbolic link target of GC roots.
- "auto": behaves like true for normal users, false for root.
- "true": only monitor GC roots owned by the current user.
- "false": monitor all GC roots.
|
| options/nixos/services.bitmagnet.useLocalPostgresDB | Use a local postgresql database, create user and database
|
| options/nixos/services.coturn.static-auth-secret | 'Static' authentication secret value (a string) for TURN REST API only
|
| options/nixos/services.power-profiles-daemon.enable | Whether to enable power-profiles-daemon, a DBus daemon that allows
changing system behavior based upon user-selected power profiles.
|
| options/nixos/services.syncoid.commands.<name>.target | Target ZFS dataset
|
| options/nixos/services.roundcube.database.host | Host of the postgresql server
|
| options/nixos/services.jirafeau.nginxConfig.kTLS | Whether to enable kTLS support
|
| options/home-manager/home.enableNixpkgsReleaseCheck | Determines whether to check for release version mismatch between Home
Manager and Nixpkgs
|
| packages/nixpkgs/cicero-tui | Unicode tool with a terminal user interface |
| packages/nixpkgs/stevia | User friendly on screen keyboard for Phosh |
| packages/nixpkgs/kilocode-cli | Terminal User Interface for Kilo Code |
| packages/nixpkgs/numad | User-level daemon that monitors NUMA topology and processes resource consumption to facilitate good NUMA resource access |
| options/darwin/launchd.agents.<name>.serviceConfig.GroupName | This optional key specifies the group to run the job as
|
| options/nixos/programs.gnupg.agent.enableSSHSupport | Enable SSH agent support in GnuPG agent
|
| options/nixos/services.oncall.database.createLocally | Whether to enable Create the database and database user locally..
|
| options/nixos/services.openssh.settings.PermitRootLogin | Whether the root user can login using ssh.
|
| options/nixos/services.nominatim.database.apiUser | Postgresql database user with read-only permissions used for Nominatim
web API service.
|
| options/home-manager/fonts.fontconfig.defaultFonts.serif | Per-user default serif font(s)
|
| options/nixos/services.smartd.notifications.systembus-notify.enable | Whenever to send systembus-notify notifications
|
| options/nixos/services.thelounge.public | Make your The Lounge instance public
|
| options/nixos/services.borgbackup.repos.<name>.group | The group borg serve is run as
|
| options/nixos/services.journald.gateway.key | Specify the path to a file or AF_UNIX stream socket to read the
secret server key corresponding to the certificate specified with
services.journald.gateway.cert from
|
| options/nixos/services.distccd.allowedClients | Client IPs which are allowed to connect to distccd in CIDR notation
|
| options/nixos/services.graylog.passwordSecret | You MUST set a secret to secure/pepper the stored user passwords here
|
| options/nixos/services.pretix.settings.pretix.datadir | Directory for storing user uploads and similar data.
|
| options/nixos/services.mongodb.initialRootPasswordFile | Path to the file containing the password for the root user if auth is enabled.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.kTLS | Whether to enable kTLS support
|
| packages/nixpkgs/gpg-tui | Terminal user interface for GnuPG |
| packages/nixpkgs/libmnl | Minimalistic user-space library oriented to Netlink developers |
| packages/nixpkgs/pfft | Parallel fast Fourier transforms |
| options/nixos/security.polkit.adminIdentities | Specifies which users are considered “administrators”, for those
actions that require the user to authenticate as an
administrator (i.e. have an auth_admin
value)
|
| options/nixos/services.kbfs.enableRedirector | Whether to enable the Keybase root redirector service, allowing
any user to access KBFS files via /keybase,
which will show different contents depending on the requester.
|
| options/nixos/services.displayManager.lemurs.enable | Whether to enable lemurs, a customizable TUI display/login manager.
For Wayland compositors, your user must be in the "seat" group.
|
| options/nixos/services.systembus-notify.enable | Whether to enable System bus notification support
WARNING: enabling this option (while convenient) should not be done on a
machine where you do not trust the other users as it allows any other
local user to DoS your session by spamming notifications
.
|
| options/nixos/services.multipath.devices.*.deferred_remove | If set to "yes", multipathd will do a deferred remove instead of a
regular remove when the last path device has been deleted
|
| options/nixos/networking.dhcpcd.runHook | Shell code that will be run after all other hooks
|
| options/nixos/services.gokapi.mutableSettings | Allow changes to the program config made by the program to persist between restarts
|
| options/nixos/services.gitolite.description | Gitolite user account's description.
|
| options/nixos/services.dovecot2.sieve.extensions | Sieve extensions for use in user scripts
|
| options/nixos/services.redmine.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.nextcloud.extraAppsEnable | Automatically enable the apps in services.nextcloud.extraApps every time Nextcloud starts
|
| options/nixos/services.openvscode-server.extraGroups | An array of additional groups for the openvscode-server user.
|
| options/nixos/services.xscreensaver.enable | Whether to enable xscreensaver user service.
|
| options/home-manager/services.podman.containers.<name>.autoStart | Whether to start the container on boot (requires user lingering).
|
| packages/nixpkgs/gir-rs | Tool to generate rust bindings and user API for glib-based libraries |
| packages/nixpkgs/libbpf | Library for loading eBPF programs and reading and manipulating eBPF objects from user-space |
| packages/nixpkgs/pmount | Mount removable devices as normal user |
| options/nixos/services.avahi.nssmdns6 | Whether to enable the mDNS NSS (Name Service Switch) plug-in for IPv6
|
| options/nixos/services.atuin.openRegistration | Allow new user registrations with the atuin server.
|
| options/nixos/boot.initrd.network.ssh.authorizedKeyFiles | Authorized keys taken from files for the root user on initrd
|
| options/nixos/services.vsftpd.anonymousUserNoPassword | Whether to disable the password for the anonymous FTP user.
|
| options/nixos/services.mysql.replication.masterUser | Username of the MySQL replication user.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.GroupName | This optional key specifies the group to run the job as
|
| options/nixos/services.keycloak.database.name | Database name to use when connecting to an external or
manually provisioned database; has no effect when a local
database is automatically provisioned
|
| options/nixos/services.heisenbridge.owner | Set owner MXID otherwise first talking local user will claim the bridge
|
| options/nixos/services.grafana-to-ntfy.settings.ntfyBAuthPass | The path to the password for the specified ntfy-sh user
|
| options/nixos/services.jenkins.jobBuilder.accessToken | User token in Jenkins used to reload config
|
| options/nixos/services.firezone.gateway.tokenFile | A file containing the firezone gateway token
|
| options/home-manager/fonts.fontconfig.defaultFonts.sansSerif | Per-user default sans serif font(s)
|
| packages/nixpkgs/gpa | Graphical user interface for the GnuPG |
| packages/nixpkgs/linux-pam | Pluggable Authentication Modules, a flexible mechanism for authenticating user |
| options/nixos/services.lldap.settings.force_ldap_user_pass_reset | Force reset of the admin password
|
| options/nixos/services.borgbackup.repos | Serve BorgBackup repositories to given public SSH keys,
restricting their access to the repository only
|
| options/nixos/services.ocis.configDir | Path to directory containing oCIS config file
|
| options/home-manager/programs.gemini-cli.commands.<name>.prompt | The prompt that will be sent to the Gemini model when the command is executed
|
| options/home-manager/targets.darwin.defaults.NSGlobalDomain.AppleLocale | Configures the user locale.
|
| options/nixos/services.authelia.instances.<name>.name | Name is used as a suffix for the service name, user, and group
|
| options/nixos/services.kimai.sites.<name>.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.cloudlog.database.passwordFile | MySQL user password file.
|
| options/nixos/services.crossfire-server.stateDir | Where to store runtime data (save files, persistent items, etc)
|
| options/nixos/services.grafana-to-ntfy.settings.ntfyBAuthUser | The ntfy-sh user to use for authenticating with the ntfy-sh instance
|
| options/nixos/services.calibre-server.libraries | Make sure each library path is initialized before service startup
|
| options/nixos/services.gitlab.databasePasswordFile | File containing the GitLab database user password
|
| options/darwin/system.defaults.CustomUserPreferences | Sets custom user preferences
|
| options/home-manager/targets.darwin.currentHostDefaults | Set macOS user defaults
|
| options/home-manager/programs.rclone.requiresUnit | The name of a systemd user service that must complete before the rclone
configuration file is written
|
| options/home-manager/programs.vscode.profiles.<name>.globalSnippets | Defines global user snippets.
|
| options/nixos/services.pufferpanel.environment | Environment variables to set for the service
|
| options/nixos/services.reaction.runAsRoot | Whether to run reaction as root
|
| options/nixos/services.postgresql.identMap | Defines the mapping from system users to database users
|
| packages/nixpkgs/bufisk | User-friendly launcher for Buf |
| options/nixos/services.keepalived.vrrpScripts.<name>.group | Name of group to run the script under
|
| options/nixos/services.netbird.server.coturn.password | The password of the user used by netbird to connect to the coturn server
|
| options/nixos/services.upower.enableWattsUpPro | Enable the Watts Up Pro device
|
| options/nixos/services.victorialogs.enable | Whether to enable VictoriaLogs is an open source user-friendly database for logs from VictoriaMetrics.
|
| options/nixos/security.pam.rssh.settings.auth_key_file | Path to file with trusted public keys in OpenSSH's authorized_keys format
|
| options/nixos/services.sourcehut.settings."hg.sr.ht".repos | Path to mercurial repositories on disk
|
| options/nixos/services.agorakit.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.castopod.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.dolibarr.database.createLocally | Create the database and database user locally.
|
| options/nixos/security.pam.services.<name>.ttyAudit.enablePattern | For each user matching one of comma-separated
glob patterns, enable TTY auditing
|
| options/nixos/services.cloudlog.database.createLocally | Create the database and database user locally.
|
| options/nixos/boot.initrd.systemd.emergencyAccess | Set to true for unauthenticated emergency access, and false or
null for no emergency access
|
| options/nixos/services.netbird.server.coturn.passwordFile | The path to a file containing the password of the user used by netbird to connect to the coturn server.
|
| options/nixos/services.linkwarden.cacheLocation | Directory used as cache
|
| options/nixos/services.mediatomb.customCfg | Allow the service to create and use its own config file inside the dataDir as
configured by services.mediatomb.dataDir
|
| options/nixos/services.samba.settings.global."passwd program" | Path to a program that can be used to set UNIX user passwords.
|
| options/nixos/services.misskey.database.createLocally | Create the PostgreSQL database locally
|
| options/nixos/services.zammad.secretKeyBaseFile | The path to a file containing the
secret_key_base secret
|
| options/nixos/services.zoneminder.enable | Whether to enable ZoneMinder
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.username | Credentials are used to authenticate the requests to Uyuni API.
|
| packages/nixpkgs/betula | Single-user self-hosted bookmarking software |
| packages/nixpkgs/grex | Command-line tool for generating regular expressions from user-provided test cases |
| packages/nixpkgs/mac-fdisk | 68K and PowerPC Mac disk partitioning utility, Adélie Linux version |
| packages/nixpkgs/mptcpd | Daemon for Linux that performs Multipath TCP path management related operations in the user space |
| options/nixos/services.sourcehut.settings."git.sr.ht".repos | Path to git repositories on disk
|
| options/nixos/services.listmonk.database.createLocally | Create the PostgreSQL database and database user locally.
|
| options/nixos/services.znc.useLegacyConfig | Whether to propagate the legacy options under
services.znc.confOptions.* to the znc config
|
| options/nixos/services.wastebin.secretFile | Path to file containing sensitive environment variables
|
| options/nixos/services.drupal.sites.<name>.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.neo4j.directories.home | Path of the Neo4j home directory
|
| packages/nixpkgs/httpy-cli | Modern, user-friendly, programmable command-line HTTP client for the API |
| packages/nixpkgs/lttng-tools | Tracing tools (kernel + user space) for Linux |
| options/nixos/services.dashy.settings | Settings serialized into user-data/conf.yml before build
|
| options/nixos/services.anuko-time-tracker.database.passwordFile | Database user password file.
|
| options/nixos/services.fedimintd.<name>.nginx.config.kTLS | Whether to enable kTLS support
|
| options/nixos/security.duosec.fallbackLocalIP | Duo Unix reports the IP address of the authorizing user, for
the purposes of authorization and whitelisting
|
| options/home-manager/programs.ssh.matchBlocks.<name>.certificateFile | Specifies files from which the user certificate is read.
|
| options/nixos/services.reposilite.useACMEHost | Host of an existing Let's Encrypt certificate to use for SSL
|
| options/home-manager/wayland.windowManager.sway.systemd.variables | Environment variables imported into the systemd and D-Bus user environment.
|
| packages/nixpkgs/bsd-fingerd | Remote user information server |
| packages/nixpkgs/ad-ldap-enum | LDAP based Active Directory user and group enumeration tool |
| packages/nixpkgs/fish | Smart and user-friendly command line shell |
| packages/nixpkgs/wiki-tui | Simple and easy to use Wikipedia Text User Interface |
| packages/nixpkgs/intel-vaapi-driver | VA-API user mode driver for Intel GEN Graphics family |
| packages/nixpkgs/homebox | Inventory and organization system built for the Home User |
| packages/nixpkgs/lice | Print license based on selection and user options |
| packages/nixpkgs/nip2 | Graphical user interface for VIPS image processing system |
| options/nixos/security.pam.services.<name>.ttyAudit.disablePattern | For each user matching one of comma-separated
glob patterns, disable TTY auditing
|
| options/nixos/services.anuko-time-tracker.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.jupyterhub.kernels.<name>.displayName | Name that will be shown to the user.
|
| options/nixos/security.pam.services.<name>.gnupg.noAutostart | Don't start gpg-agent if it is not running
|
| options/nixos/services.nominatim.database.superUser | Postgresql database superuser used to create Nominatim database and
import data
|
| options/nixos/security.googleOsLogin.enable | Whether to enable Google OS Login
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.username | Consul username
|
| options/nixos/services.mediatomb.openFirewall | If false (the default), this is up to the user to declare the firewall rules
|
| options/home-manager/services.gpg-agent.noAllowExternalCache | Tell Pinentry not to enable features which use an external cache for
passphrases
|
| options/nixos/security.pam.services.<name>.kwallet.enable | If enabled, pam_wallet will attempt to automatically unlock the
user's default KDE wallet upon login
|
| options/nixos/services.grafana.settings.users.auto_assign_org_id | Set this value to automatically add new users to the provided org
|
| options/nixos/services._3proxy.services.*.auth | Authentication type
|
| packages/nixpkgs/xset | User preference utility for X servers |
| packages/nixpkgs/uftrace | Function (graph) tracer for user-space |
| packages/nixpkgs/kdocker | Dock any application into the system tray |
| packages/nixpkgs/lxqt.qtxdg-tools | libqtxdg user tools |
| packages/nixpkgs/newt | Library for color text mode, widget based user interfaces |
| packages/nixpkgs/open-webui | Comprehensive suite for LLMs with a user-friendly WebUI |
| packages/nixpkgs/pnfft | Parallel nonequispaced fast Fourier transforms |
| options/nixos/services.bookstack.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.graylog.rootPasswordSha2 | You MUST specify a hash password for the root user (which you only need to initially set up the
system and in case you lose connectivity to your authentication backend)
This password cannot be changed using the API or via the web interface
|
| options/nixos/services.foundationdb.package | The FoundationDB package to use for this server
|
| options/nixos/services.matrix-alertmanager.tokenFile | File that contains a valid Matrix token for the Matrix user.
|
| options/nixos/services.syncoid.commands.<name>.localSourceAllow | Permissions granted for the services.syncoid.user user
for local source datasets
|
| options/nixos/services.umami.settings.DATABASE_URL_FILE | A file containing a connection string for the database
|
| options/nixos/services.neo4j.directories.data | Path of the data directory
|
| options/home-manager/wayland.windowManager.labwc.systemd.variables | Environment variables to be imported in the systemd & D-Bus user
environment.
|
| options/home-manager/wayland.windowManager.river.systemd.variables | Environment variables to be imported in the systemd & D-Bus user
environment.
|
| options/nixos/services.openvpn.servers.<name>.authUserPass | This option can be used to store the username / password credentials
with the "auth-user-pass" authentication method
|
| options/nixos/programs.firefox.policies | Group policies to install
|
| options/nixos/services.keycloak.initialAdminPassword | Initial password set for the temporary admin user
|
| options/nixos/services.nextcloud.database.createLocally | Whether to create the database and database user locally.
|
| options/nixos/services.matrix-alertmanager.matrixUser | Matrix user to use for the bot.
|
| options/nixos/services.n8n.environment.N8N_USER_FOLDER | Provide the path where n8n will create the .n8n folder
|
| options/home-manager/services.xidlehook.timers.*.canceller | Command executed when the user becomes active again
|
| options/home-manager/wayland.windowManager.labwc.systemd.enable | Whether to enable labwc-session.target on
labwc startup
|
| packages/nixpkgs/protonup-qt | Install and manage Proton-GE and Luxtorpeda for Steam and Wine-GE for Lutris with this graphical user interface |
| options/nixos/services.dnsdist.dnscrypt.providerKey | The filepath to the provider secret key
|
| options/nixos/services.prosody.httpFileShare.daily_quota | Maximum size of daily uploaded files per user, in bytes.
|
| options/nixos/virtualisation.qemu.options | Options passed to QEMU
|
| options/nixos/security.pam.services.<name>.enableGnomeKeyring | If enabled, pam_gnome_keyring will attempt to automatically unlock the
user's default Gnome keyring upon login
|
| options/darwin/system.defaults.loginwindow.autoLoginUser | Apple menu > System Preferences > Users and Groups > Login Options
Auto login the supplied user on boot
|
| options/nixos/services.maddy.ensureCredentials | List of user accounts which get automatically created if they don't
exist yet
|
| options/home-manager/programs.vscode.profiles.<name>.languageSnippets | Defines user snippets for different languages.
|
| options/nixos/services.prometheus.scrapeConfigs.*.http_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/security.unprivilegedUsernsClone | When disabled, unprivileged users will not be able to create new namespaces
|
| options/nixos/services.postfix.localRecipients | List of accepted local users
|
| options/nixos/services.cron.systemCronJobs | A list of Cron jobs to be appended to the system-wide
crontab
|
| options/nixos/services.flarum.createDatabaseLocally | Create the database and database user locally, and run installation
|
| options/nixos/services.libeufin.nexus.settings.nexus-ebics.USER_ID | User ID of the EBICS subscriber
|
| options/nixos/services.linkwarden.storageLocation | Directory used to store media files
|
| options/nixos/services.wastebin.settings.WASTEBIN_BASE_URL | Base URL for the QR code display
|
| options/home-manager/wayland.windowManager.river.systemd.enable | Whether to enable river-session.target on
river startup
|
| packages/nixpkgs/hostapd | User space daemon for access point and authentication servers |
| packages/nixpkgs/recapp | User friendly Open Source screencaster for Linux written in GTK |
| options/nixos/services.unbound.localControlSocketPath | When not set to null this option defines the path
at which the unbound remote control socket should be created at
|
| options/nixos/services.journaldriver.logName | Configures the name of the target log in Stackdriver Logging
|
| options/nixos/services.public-inbox.inboxes.<name>.description | User-visible description for the repository.
|
| options/nixos/services.firezone.headless-client.tokenFile | A file containing the firezone client token
|
| options/home-manager/fonts.fontconfig.defaultFonts.monospace | Per-user default monospace font(s)
|
| packages/nixpkgs/epick | Simple color picker that lets the user create harmonic palettes with ease |
| packages/nixpkgs/gnome-shell | Core user interface for the GNOME 3 desktop |
| packages/nixpkgs/wdfs | User-space filesystem that allows to mount a webdav share |
| packages/nixpkgs/magento-cloud | Adobe Commerce Cloud CLI |
| packages/nixpkgs/oauth2c | User-friendly OAuth2 CLI |
| options/nixos/services.postgresql.ensureUsers | Ensures that the specified users exist
|
| options/nixos/services.keepalived.enableScriptSecurity | Don't run scripts configured to be run as root if any part of the path is writable by a non-root user.
|
| options/nixos/networking.resolvconf.package | The package that provides the system-wide resolvconf command
|
| options/nixos/services.mysql.replication.masterPassword | Password of the MySQL replication user.
|
| options/nixos/services.szurubooru.database.passwordFile | A file containing the password for the PostgreSQL user.
|
| options/nixos/services.minidlna.settings.wide_links | Set this to yes to allow symlinks that point outside user-defined media_dir.
|
| options/nixos/services.mediawiki.database.createLocally | Create the database and database user locally
|
| options/nixos/services.kubo.settings.Addresses.API | Multiaddr or array of multiaddrs describing the address to serve the local HTTP API on
|
| options/nixos/services.hostapd.radios.<name>.wifi6.multiUserBeamformer | HE multi user beamformee support
|
| options/nixos/programs.tsmClient.defaultServername | If multiple server stanzas are declared with
programs.tsmClient.servers,
this option may be used to name a default
server stanza that IBM TSM uses in the absence of
a user-defined dsm.opt file
|
| options/nixos/services.dawarich.secretKeyBaseFile | Path to file containing the secret key base
|
| options/nixos/services.opkssh.authorizations | User authorization mappings
|
| options/nixos/services.zoneminder.database.createLocally | Create the database and database user locally.
|
| packages/nixpkgs/xorg.xset | User preference utility for X servers |
| packages/nixpkgs/uftraceFull | Function (graph) tracer for user-space |
| packages/nixpkgs/unfs3 | User-space NFSv3 file system server |
| packages/nixpkgs/imtui | Immediate mode text-based user interface library |
| packages/nixpkgs/kratos | API-first Identity and User Management system that is built according to cloud architecture best practices |
| options/nixos/services.filesender.database.createLocally | Create the PostgreSQL database and database user locally.
|
| options/nixos/services.hostapd.radios.<name>.wifi7.multiUserBeamformer | EHT multi user beamformee support
|
| options/nixos/services.limesurvey.nginx.virtualHost.kTLS | Whether to enable kTLS support
|
| options/nixos/services.tt-rss.registration.notifyAddress | Email address to send new user notifications to.
|
| options/nixos/services.minidlna.settings.media_dir | Directories to be scanned for media files
|
| options/home-manager/wayland.windowManager.wayfire.systemd.variables | Environment variables to be imported in the systemd & D-Bus user
environment.
|
| options/home-manager/programs.desktoppr.settings.setOnlyOnce | If false (the default), the desktop picture/wallpaper will be reset
to the configured parameters on every system configuration change
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.postfixadmin.database.host | Host of the postgresql server
|
| options/nixos/services.blockbook-frontend.<name>.rpc.passwordFile | File containing password of the RPC user
|
| options/nixos/services.kmonad.keyboards.<name>.extraGroups | Extra permission groups to attach to the KMonad instance for
this keyboard
|
| options/nixos/services.syncthing.settings.folders.<name>.path | The path to the folder which should be shared
|
| options/nixos/services.prometheus.exporters.bitcoin.rpcUser | RPC user name.
|
| options/nixos/services.prometheus.exporters.nut.nutUser | The user to log in into NUT server
|
| options/nixos/services.varnish.listen.*.address | If given an IP address, it can be a host name ("localhost"), an IPv4 dotted-quad
("127.0.0.1") or an IPv6 address enclosed in square brackets ("[::1]").
(VCL4.1 and higher) If given an absolute Path ("/path/to/listen.sock") or "@"
followed by the name of an abstract socket ("@myvarnishd") accept connections
on a Unix domain socket
|
| options/darwin/system.defaults.screensaver.askForPassword | If true, the user is prompted for a password when the screen saver is unlocked or stopped
|
| options/home-manager/services.home-manager.autoExpire.store.cleanup | Whether to enable to cleanup Nix store when the Home Manager expire service runs
|
| options/darwin/services.postgresql.ensureUsers | Ensures that the specified users exist and have at least the ensured permissions
|
| options/nixos/services.wstunnel.clients.<name>.httpProxy | Proxy to use to connect to the wstunnel server (USER:PASS@HOST:PORT).
Passwords specified here will be world-readable in the Nix store!
To pass a password to the service, point the environmentFile option
to a file containing PROXY_PASSWORD=<your-password-here> and set
this option to <user>:$PROXY_PASSWORD@<host>:<port>
|
| options/nixos/services.discourse.secretKeyBaseFile | The path to a file containing the
secret_key_base secret
|
| options/nixos/services.commafeed.environment | Extra environment variables passed to CommaFeed, refer to
https://github.com/Athou/commafeed/blob/master/commafeed-server/config.yml.example
for supported values
|
| options/nixos/services.discourse.database.passwordFile | File containing the Discourse database user password
|
| options/nixos/services.mjolnir.pantalaimon.passwordFile | File containing the matrix password for the mjolnir user.
|
| options/nixos/services.szurubooru.server.settings.smtp.passFile | File containing the password associated to the given user for the SMTP server.
|
| options/nixos/services.hostapd.radios.<name>.wifi6.singleUserBeamformee | HE single user beamformee support
|
| options/nixos/services.jitsi-videobridge.xmppConfigs.<name>.domain | Domain part of JID of the XMPP user, if it is different from hostName.
|
| options/nixos/services.hostapd.radios.<name>.wifi6.singleUserBeamformer | HE single user beamformer support
|
| options/nixos/services.neo4j.ssl.policies.<name>.revokedDir | Path to directory of CRLs (Certificate Revocation Lists) in
PEM format
|
| options/nixos/services.grafana.settings.users.verify_email_enabled | Require email validation before sign up completes.
|
| packages/nixpkgs/glade | User interface designer for GTK applications |
| packages/nixpkgs/timekpr | Manages and restricts user screen time by enforcing time limits |
| packages/nixpkgs/moonlight | Discord client modification, focused on enhancing user and developer experience |
| options/nixos/services.borgbackup.repos.<name>.allowSubRepos | Allow clients to create repositories in subdirectories of the
specified path
|
| options/nixos/programs.gnupg.agent.pinentryPackage | Which pinentry package to use
|
| options/nixos/services.hostapd.radios.<name>.wifi7.singleUserBeamformer | EHT single user beamformer support
|
| options/nixos/services.hostapd.radios.<name>.wifi7.singleUserBeamformee | EHT single user beamformee support
|
| options/nixos/services.oauth2-proxy.setXauthrequest | Set X-Auth-Request-User and X-Auth-Request-Email response headers (useful in Nginx auth_request mode)
|
| options/nixos/services.wordpress.sites.<name>.database.createLocally | Create the database and database user locally.
|
| options/home-manager/wayland.windowManager.wayfire.systemd.enable | Whether to enable wayfire-session.target on
wayfire startup
|
| options/nixos/services.xserver.displayManager.startx.enable | Whether to enable the dummy "startx" pseudo-display manager, which
allows users to start X manually via the startx command from a
virtual terminal.
The X server will run under the current user, not as root.
|
| options/nixos/services.neo4j.directories.imports | The root directory for file URLs used with the Cypher
LOAD CSV clause
|
| options/nixos/services.prosody.muc.*.allowners_muc | Add module allowners, any user in chat is able to
kick other
|
| options/nixos/services.limesurvey.database.createLocally | Create the database and database user locally
|
| options/nixos/services.grafana.settings.users.auto_assign_org_role | The role new users will be assigned for the main organization (if the auto_assign_org setting is set to true).
|
| options/nixos/programs.firefox.preferencesStatus | The status of firefox.preferences.
status can assume the following values:
"default": Preferences appear as default.
"locked": Preferences appear as default and can't be changed.
"user": Preferences appear as changed.
"clear": Value has no effect
|
| options/nixos/services.prometheus.exporters.deluge.delugeUser | User to connect to deluge server.
|
| options/nixos/services.neo4j.directories.plugins | Path of the database plugin directory
|
| options/nixos/services.vdirsyncer.jobs.<name>.additionalGroups | additional groups to add the dynamic user to
|
| options/home-manager/fonts.fontconfig.defaultFonts.emoji | Per-user default emoji font(s)
|
| options/home-manager/wayland.windowManager.hyprland.systemd.variables | Environment variables to be imported in the systemd & D-Bus user
environment.
|
| options/nixos/services.pgmanage.connections | pgmanage requires at least one PostgreSQL server be defined
|
| packages/nixpkgs/encfs | Encrypted filesystem in user-space via FUSE |
| packages/nixpkgs/fission | Cli used by end user to interact Fission |
| packages/nixpkgs/gtkmm2 | C++ interface to the GTK graphical user interface library |
| packages/nixpkgs/gtkmm4 | C++ interface to the GTK graphical user interface library |
| packages/nixpkgs/pcsc-scm-scl011 | SCM Microsystems SCL011 chipcard reader user space driver |
| packages/nixpkgs/nominatim-ui | Debugging user interface for Nominatim geocoder |
| packages/nixpkgs/perl540Packages.UserIdentity | Collect information about a user |
| packages/nixpkgs/perl538Packages.UserIdentity | Collect information about a user |
| options/home-manager/programs.zsh.syntaxHighlighting.patterns | Custom syntax highlighting for user-defined patterns
|
| options/home-manager/wayland.windowManager.sway.systemd.enable | Whether to enable sway-session.target on
sway startup
|
| options/nixos/services.openssh.authorizedKeysFiles | Specify the rules for which files to read on the host
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.bitmagnet.settings.postgres.password | Password for database user
|
| options/nixos/services.displayManager.dms-greeter.configFiles | List of DankMaterialShell configuration files to copy into the greeter
data directory at /var/lib/dms-greeter
|
| options/nixos/services.wasabibackend.rpc.passwordFile | File that contains the password of the RPC user.
|
| options/nixos/services.hercules-ci-agent.settings.labels | A key-value map of user data
|
| options/darwin/services.hercules-ci-agent.settings.labels | A key-value map of user data
|
| options/home-manager/programs.broot.settings.verbs | Define new verbs
|
| options/home-manager/wayland.windowManager.hyprland.systemd.enable | Whether to enable hyprland-session.target on
hyprland startup
|
| packages/nixpkgs/gtkmm3 | C++ interface to the GTK graphical user interface library |
| packages/nixpkgs/x42-gmsynth | Chris Colins' General User soundfont player LV2 plugin |
| packages/nixpkgs/hfsprogs | HFS/HFS+ user space utils |
| packages/nixpkgs/linien-gui | Graphical user interface of the Linien spectroscopy lock application |
| packages/nixpkgs/nfs-ganesha | NFS server that runs in user space |
| options/nixos/programs.firefox.preferences | Preferences to set from about:config
|
| options/nixos/services.dovecot2.imapsieve.mailbox.*.causes | Only execute the administrator Sieve scripts for the mailbox configured with services.dovecot2.imapsieve.mailbox..name when one of the listed IMAPSIEVE causes apply
|
| options/nixos/services.mattermost.database.password | Password for local Mattermost database user
|
| options/nixos/services.nominatim.database.passwordFile | Password file used for Nominatim database connection
|
| options/nixos/services.weblate.configurePostgresql | Whether to enable and configure a local PostgreSQL server by creating a user and database for weblate
|
| options/nixos/services.influxdb2.provision.initialSetup.tokenFile | API Token to set for the admin user
|
| options/nixos/services.maddy.ensureCredentials.<name>.passwordFile | Specifies the path to a file containing the
clear text password for the user.
|
| options/darwin/system.defaults.ActivityMonitor.ShowCategory | Change which processes to show.
- 100: All Processes
- 101: All Processes, Hierarchally
- 102: My Processes
- 103: System Processes
- 104: Other User Processes
- 105: Active Processes
- 106: Inactive Processes
- 107: Windowed Processes
Default is 100.
|
| packages/nixpkgs/libsForQt5.mauikit | Free and modular front-end framework for developing fast and compelling user experiences |
| options/nixos/services.slskd.settings.soulseek.description | The user description for the Soulseek network.
|
| options/nixos/services.roundcube.database.passwordFile | Password file for the postgresql connection
|
| options/nixos/services.ayatana-indicators.packages | List of packages containing Ayatana Indicator services
that should be brought up by a SystemD "ayatana-indicators" user target
|
| options/nixos/services.neo4j.ssl.policies.<name>.trustedDir | Path to directory of X.509 certificates in PEM format for
trusted parties
|
| packages/nixpkgs/cargo-seek | Terminal user interface for searching, adding and installing cargo crates |
| packages/nixpkgs/basilk | Terminal User Interface (TUI) to manage your tasks with minimal kanban logic |
| packages/nixpkgs/jiratui | A Textual User Interface for interacting with Atlassian Jira from your shell |
| options/nixos/documentation.nixos.options.splitBuild | Whether to split the option docs build into a cacheable and an uncacheable part
|
| options/nixos/services.mosquitto.listeners.*.omitPasswordAuth | Omits password checking, allowing anyone to log in with any user name unless
other mandatory authentication methods (eg TLS client certificates) are configured.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.resilio.sharedFolders | Shared folder list
|
| options/nixos/services.jitsi-meet.prosody.allowners_muc | Add module allowners, any user in chat is able to
kick other
|
| options/nixos/nixpkgs.pkgs | If set, the pkgs argument to all NixOS modules is the value of
this option, extended with nixpkgs.overlays, if
that is also set
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.username | username is required if using Identity V2 API
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.userid | username is required if using Identity V2 API
|
| options/nixos/services.jitsi-videobridge.xmppConfigs.<name>.passwordFile | File containing the password for the user.
|
| options/nixos/services.postgresql.ensureUsers.*.ensureDBOwnership | Grants the user ownership to a database with the same name
|
| options/nixos/virtualisation.forwardPorts | When using the SLiRP user networking (default), this option allows to
forward ports to/from the host/guest.
If the NixOS firewall on the virtual machine is enabled, you also
have to open the guest ports to enable the traffic between host and
guest.
Currently QEMU supports only IPv4 forwarding.
|
| packages/nixpkgs/ghfetch | CLI tool to fetch GitHub user information and show like neofetch |
| packages/nixpkgs/openipmi | User-level library that provides a higher-level abstraction of IPMI and generic services |
| packages/nixpkgs/nfs-utils | Linux user-space NFS utilities |
| packages/nixpkgs/ossutil | User friendly command line tool to access Alibaba Cloud OSS |
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/security.pam.ussh.authorizedPrincipals | Comma-separated list of authorized principals to permit; if the user
presents a certificate with one of these principals, then they will be
authorized
|
| options/nixos/services.neo4j.ssl.policies.<name>.baseDirectory | The mandatory base directory for cryptographic objects of this
policy
|
| options/nixos/services.writefreely.admin.initialPasswordFile | Path to a file containing the initial password for the admin user
|
| options/nixos/services.uwsgi.capabilities | Grant capabilities to the uWSGI instance
|
| options/nixos/security.pam.ussh.authorizedPrincipalsFile | Path to a list of principals; if the user presents a certificate with
one of these principals, then they will be authorized
|
| options/nixos/services.dependency-track.settings."alpine.ldap.enabled" | Defines if LDAP will be used for user authentication
|
| options/nixos/services.parsedmarc.provision.localMail.enable | Whether Postfix and Dovecot should be set up to receive
mail locally. parsedmarc will be configured to watch the
local inbox as the automatically created user specified in
services.parsedmarc.provision.localMail.recipientName
|
| packages/nixpkgs/powwow | Multi-user Dungeon Client |
| packages/nixpkgs/stoat-desktop | Open source user-first chat platform |
| options/nixos/services.dependency-track.settings."alpine.oidc.enabled" | Defines if OpenID Connect will be used for user authentication
|
| options/nixos/services.alloy.configPath | Alloy configuration file/directory path
|
| options/nixos/services.authelia.instances.<name>.secrets.manual | Configuring authelia's secret files via the secrets attribute set
is intended to be convenient and help catch cases where values are required
to run at all
|
| options/home-manager/programs.prismlauncher.extraPackages | Additional theme packages to install to the user environment
|
| options/nixos/services.prometheus.exporters.unpoller.loki.pass | Path of a file containing the password for Loki
|
| options/darwin/system.defaults.loginwindow.DisableConsoleAccess | Disables the ability for a user to access the console by typing “>console”
for a username at the login window
|
| packages/nixpkgs/caligula | User-friendly, lightweight TUI for disk imaging |
| options/nixos/services.postfixadmin.database.passwordFile | Password file for the postgresql connection
|
| options/nixos/services.foundationdb.tls.allowedPeers | "Peer verification string"
|
| options/nixos/services.libinput.mouse.accelProfile | Sets the pointer acceleration profile to the given profile
|
| options/nixos/services.xserver.displayManager.sx.enable | Whether to enable the "sx" pseudo-display manager, which allows users
to start manually via the "sx" command from a vt shell
|
| options/home-manager/programs.gnome-terminal.profile.<name>.deleteBinding | Which string the terminal should send to an application when the user
presses the Delete key.
auto
: Send the @7 control sequence.
ascii-backspace
: Send an ASCII backspace character (0x08).
ascii-delete
: Send an ASCII delete character (0x7F).
delete-sequence
: Send the @7 control sequence.
tty
: Send terminal's "erase" setting.
|
| packages/nixpkgs/sylpheed | Lightweight and user-friendly e-mail client |
| packages/nixpkgs/onetun | Cross-platform, user-space WireGuard port-forwarder that requires no root-access or system network configurations |
| packages/nixpkgs/neovide | Simple, no-nonsense, cross-platform graphical user interface for Neovim |
| packages/nixpkgs/ragnarwm | Minimal, flexible & user-friendly X tiling window manager |
| options/nixos/services.biboumi.settings.persistent_by_default | Whether all rooms will be persistent by default:
the value of the “persistent” option in the global configuration of each
user will be “true”, but the value of each individual room will still
default to false
|
| options/nixos/services.influxdb2.provision.initialSetup.passwordFile | Password for primary user
|
| options/nixos/services.archisteamfarm.ipcPasswordFile | Path to a file containing the password
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.basic_auth.username | HTTP username
|
| options/darwin/security.pam.services.sudo_local.reattach | Whether to enable reattaching a program to the user's bootstrap session
|
| options/nixos/security.pam.sshAgentAuth.authorizedKeysFiles | A list of paths to files in OpenSSH's authorized_keys format, containing
the keys that will be trusted by the pam_ssh_agent_auth module
|
| options/nixos/services.grafana.settings.server.socket_gid | GID where the socket should be set when protocol=socket
|
| options/nixos/services.dependency-track.database.databaseName | Database name to use when connecting to an external or
manually provisioned database; has no effect when a local
database is automatically provisioned
|
| options/nixos/services.jibri.xmppEnvironments.<name>.call.login.passwordFile | File containing the password for the user.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.token.<name>.pin | Optional PIN required to access the key on the token
|
| options/nixos/services.matrix-tuwunel.settings.global.server_name | The server_name is the name of this server
|
| options/nixos/services.matrix-conduit.settings.global.server_name | The server_name is the name of this server
|
| packages/nixpkgs/fishMinimal | Smart and user-friendly command line shell |
| packages/nixpkgs/git-cache | Program to add and manage a system-wide or user-wide cache for remote git repositories |
| packages/nixpkgs/libgnt | Ncurses toolkit for creating text-mode graphical user interfaces |
| packages/nixpkgs/ocamlPackages.tsort | Easy to use and user-friendly topological sort |
| packages/nixpkgs/pablodraw | Ansi/Ascii text and RIPscrip vector graphic art editor/viewer with multi-user capabilities |
| packages/nixpkgs/portunus | Self-contained user/group management and authentication service |
| options/nixos/services.bitwarden-directory-connector-cli.secrets.ldap | Path to file that contains LDAP password for user in {option}`ldap.username
|
| options/nixos/services.omnom.settings.app.disable_signup | Whether to enable restricting user creation.
|
| options/nixos/services.prometheus.exporters.postgres.runAsLocalSuperUser | Whether to run the exporter as the local 'postgres' super user.
|
| options/nixos/services.xserver.displayManager.session | List of sessions supported with the command used to start each
session
|
| options/nixos/programs.opengamepadui.fontPackages | Font packages to use in OpenGamepadUI
|
| packages/nixpkgs/bcache-tools | User-space tools required for bcache (Linux block layer cache) |
| packages/nixpkgs/gnunet-gtk | GNUnet GTK User Interface |
| packages/nixpkgs/gtk-sharp-2_0 | Graphical User Interface Toolkit for mono and |
| packages/nixpkgs/fox_1_6 | C++ based class library for building Graphical User Interfaces |
| packages/nixpkgs/gcsfuse | User-space file system for interacting with Google Cloud Storage |
| packages/nixpkgs/vlagent | User friendly log database from VictoriaMetrics |
| options/nixos/services.prometheus.exporters.nextcloud.tokenFile | File containing the token for connecting to Nextcloud
|
| options/nixos/services.cloudflare-ddns.credentialsFile | Path to a file containing the Cloudflare API authentication token
|
| options/nixos/services.rutorrent.nginx.exposeInsecureRPC2mount | If you do not enable one of the rpc or httprpc plugins you need to expose an RPC mount through scgi using this option
|
| packages/nixpkgs/keyguard | Alternative client for the Bitwarden platform, created to provide the best user experience possible |
| options/nixos/virtualisation.libvirtd.qemu.vhostUserPackages | Packages containing out-of-tree vhost-user drivers.
|
| options/nixos/services.angrr.settings.profile-policies.<name>.profile-paths | Paths to the Nix profile
|
| options/nixos/services.invoiceplane.sites.<name>.database.createLocally | Create the database and database user locally.
|
| options/nixos/services.engelsystem.settings | Options to be added to config.php, as a nix attribute set
|
| options/nixos/virtualisation.virtualbox.host.enable | Whether to enable VirtualBox.
In order to pass USB devices from the host to the guests, the user
needs to be in the vboxusers group.
|
| packages/nixpkgs/bazelisk | User-friendly launcher for Bazel |
| options/nixos/services.nextcloud.settings.loglevel | Log level value between 0 (DEBUG) and 4 (FATAL).
-
0 (debug): Log all activity.
-
1 (info): Log activity such as user logins and file activities, plus warnings, errors, and fatal errors.
-
2 (warn): Log successful operations, as well as warnings of potential problems, errors and fatal errors.
-
3 (error): Log failed operations and fatal errors.
-
4 (fatal): Log only fatal errors that cause the server to stop.
|
| options/home-manager/launchd.agents.<name>.config.SoftResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/home-manager/launchd.agents.<name>.config.HardResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/nixos/virtualisation.libvirtd.qemu.runAsRoot | If true, libvirtd runs qemu as root
|
| options/darwin/system.defaults.loginwindow.PowerOffDisabledWhileLoggedIn | Apple menu > System Preferences > Users and Groups > Login Options
If set to true, the Power Off menu item will be disabled when the user is logged in
|
| packages/nixpkgs/prototypejs | Foundation for ambitious web user interfaces |
| options/nixos/services.nextcloud.settings."profile.enabled" | Makes user-profiles globally available under nextcloud.tld/u/user.name
|
| options/nixos/services.journald.remote.settings.Remote.ServerKeyFile | A path to a SSL secret key file in PEM format
|
| options/nixos/hardware.opentabletdriver.enable | Enable OpenTabletDriver udev rules, user service and blacklist kernel
modules known to conflict with OpenTabletDriver.
|
| options/nixos/services.libinput.touchpad.accelProfile | Sets the pointer acceleration profile to the given profile
|
| options/nixos/services.mysql.ensureUsers.*.ensurePermissions | Permissions to ensure for the user, specified as attribute set
|
| options/home-manager/programs.hexchat.channels.<name>.options.useGlobalUserInformation | Use global user information.
|
| options/nixos/programs.thunderbird.preferencesStatus | The status of thunderbird.preferences.
status can assume the following values:
"default": Preferences appear as default.
"locked": Preferences appear as default and can't be changed.
"user": Preferences appear as changed.
"clear": Value has no effect
|
| options/nixos/services.jibri.xmppEnvironments.<name>.control.login.passwordFile | File containing the password for the user.
|
| packages/nixpkgs/chntpw | Utility to reset the password of any user that has a valid local account on a Windows system |
| options/nixos/services.xserver.displayManager.startx.generateScript | Whether to generate the system-wide xinitrc script (/etc/X11/xinit/xinitrc)
|
| options/home-manager/services.activitywatch.watchers | Watchers to be included with the service alongside with their
configuration
|
| options/home-manager/xsession.windowManager.i3.config.startup.*.notification | Whether to enable startup-notification support for the command
|
| options/nixos/services.magnetico.web.credentialsFile | The path to the file holding the credentials to access the web
interface
|
| options/nixos/services.netbird.server.management.disableSingleAccountMode | If set to true, disables single account mode
|
| packages/nixpkgs/github-backup | Backup a github user or organization |
| packages/nixpkgs/sapling | Scalable, User-Friendly Source Control System |
| options/nixos/services.archisteamfarm.bots.<name>.passwordFile | Path to a file containing the password
|
| options/nixos/services.waagent.settings.Provisioning.Enable | Whether to enable provisioning functionality in the agent
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.useEmailPrefixSuffix | If a user has no email address, combine a username prefix with a suffix value to form an email.
|
| options/nixos/networking.resolvconf.dnsExtensionMechanism | Enable the edns0 option in resolv.conf
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.basic_auth.username | HTTP username
|
| packages/nixpkgs/libsForQt5.klettres | Application specially designed to help the user to learn an alphabet |
| packages/nixpkgs/app2unit | Launches Desktop Entries as Systemd user units |
| packages/nixpkgs/typstPackages.patatrac | A powerful and user-friendly Typst package for drawing physics diagrams |
| options/nixos/services.prometheus.exporters.nextcloud.passwordFile | File containing the password for connecting to Nextcloud
|
| options/nixos/services.parsedmarc.provision.localMail.recipientName | The DMARC mail recipient name, i.e. the name part of the
email address which receives DMARC reports
|
| options/nixos/hardware.opentabletdriver.daemon.enable | Whether to start OpenTabletDriver daemon as a systemd user service.
|
| options/nixos/services.matrix-appservice-irc.settings.homeserver.domain | The 'domain' part for user IDs on this home server
|
| options/home-manager/programs.gnome-terminal.profile.<name>.backspaceBinding | Which string the terminal should send to an application when the user
presses the Backspace key.
auto
: Attempt to determine the right value from the terminal's IO settings.
ascii-backspace
: Send an ASCII backspace character (0x08).
ascii-delete
: Send an ASCII delete character (0x7F).
delete-sequence
: Send the @7 control sequence.
tty
: Send terminal's "erase" setting.
|
| packages/nixpkgs/clutter | Library for creating fast, dynamic graphical user interfaces |
| packages/nixpkgs/ocamlPackages.reason | User-friendly programming language built on OCaml |
| packages/nixpkgs/revolt-desktop | Open source user-first chat platform |
| options/nixos/services.kerberos_server.settings.realms.<name>.acl | The privileges granted to a user.
|
| packages/nixpkgs/baresip | Modular SIP User-Agent with audio and video support |
| packages/nixpkgs/datalad-gooey | Graphical user interface (GUI) for DataLad |
| packages/nixpkgs/spandsp | Portable and modular SIP User-Agent with audio and video support |
| packages/nixpkgs/littlefs-fuse | FUSE wrapper that puts the littlefs in user-space |
| options/darwin/launchd.agents.<name>.serviceConfig.SoftResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/darwin/launchd.agents.<name>.serviceConfig.HardResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| packages/nixpkgs/gogui | Graphical user interface to programs that play the board game Go and support the Go Text Protocol such as GNU Go |
| options/nixos/services.prometheus.exporters.collectd.collectdBinary.authFile | File mapping user names to pre-shared keys (passwords).
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths | API tokens to provision for the user in this organization.
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.inherit | Grants the user created inherit permissions
|
| options/nixos/security.pam.services.<name>.googleOsLoginAuthentication | If set, will use the pam_oslogin_login's user
authentication methods to authenticate users using 2FA
|
| packages/nixpkgs/eaglemode | Zoomable User Interface |
| options/nixos/services.suricata.settings.dpdk | Data Plane Development Kit is a framework for fast packet processing in data plane applications running on a wide variety of CPU architectures
|
| options/nixos/services.syncthing.settings.folders.<name>.copyOwnershipFromParent | On Unix systems, tries to copy file/folder ownership from the parent directory (the directory it’s located in)
|
| options/home-manager/services.syncthing.settings.folders.<name>.copyOwnershipFromParent | On Unix systems, tries to copy file/folder ownership from
the parent directory (the directory it’s located in)
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.NumberOfProcesses | The maximum number of simultaneous processes for this user id
|
| packages/nixpkgs/cat9 | User shell for LASH |
| packages/nixpkgs/tuistash | Terminal User Interface for Logstash |
| packages/nixpkgs/virtiofsd | vhost-user virtio-fs device backend written in Rust |
| packages/nixpkgs/ocamlPackages.reason-native.dir | Library that provides a consistent API for common system, user and application directories consistently on all platforms |
| packages/nixpkgs/pdfding | Selfhosted PDF manager, viewer and editor offering a seamless user experience on multiple devices |
| packages/nixpkgs/radicle-tui | Radicle terminal user interface |
| packages/nixpkgs/autologin | Run a command inside of a new PAM user session |
| packages/nixpkgs/mozphab | Phabricator CLI from Mozilla to support submission of a series of commits |
| options/nixos/systemd.services.<name>.confinement.mode | The value full-apivfs (the default) sets up
private /dev, /proc,
/sys, /tmp and /var/tmp file systems
in a separate user name space
|
| packages/nixpkgs/binsider | Analyzer of executables using a terminal user interface |
| packages/nixpkgs/embellish | User-friendly application designed for managing Nerd Fonts on your system |
| packages/nixpkgs/kdiskmark | HDD and SSD benchmark tool with a friendly graphical user interface |
| options/home-manager/programs.floorp.profiles.<name>.extensions.packages | List of ‹name› add-on packages to install for this profile
|
| options/darwin/services.postgresql.ensureUsers.*.ensurePermissions | Permissions to ensure for the user, specified as an attribute set
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.createdb | Grants the user, created by the ensureUser attr, createdb permissions
|
| packages/nixpkgs/gtk2-x11 | Multi-platform toolkit for creating graphical user interfaces |
| packages/nixpkgs/gtk3-x11 | Multi-platform toolkit for creating graphical user interfaces |
| packages/nixpkgs/spandsp3 | Portable and modular SIP User-Agent with audio and video support |
| packages/nixpkgs/jankyborders | Lightweight tool designed to add colored borders to user windows on macOS 14.0+ |
| packages/nixpkgs/ocamlPackages_latest.tsort | Easy to use and user-friendly topological sort |
| packages/nixpkgs/mya | Minimalistic command line interface for fetching user anime data from MyAnimeList |
| options/nixos/services.glitchtip.settings.ENABLE_ORGANIZATION_CREATION | When false, only superusers will be able to create new organizations after the first
|
| options/nixos/services.matrix-continuwuity.settings.global.server_name | The server_name is the name of this server
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.packages | List of ‹name› add-on packages to install for this profile
|
| options/nixos/virtualisation.directBoot.enable | If enabled, the virtual machine will boot directly into the kernel instead of through a bootloader
|
| packages/nixpkgs/python312Packages.lttng | Tracing tools (kernel + user space) for Linux |
| packages/nixpkgs/gtk2 | Multi-platform toolkit for creating graphical user interfaces |
| packages/nixpkgs/hexpatch | Binary patcher and editor written in Rust with a terminal user interface |
| packages/nixpkgs/home-manager | Nix-based user environment configurator |
| packages/nixpkgs/kdePackages.sweeper | Application that helps to clean unwanted traces the user leaves on the system |
| packages/nixpkgs/nano | Small, user-friendly console text editor |
| packages/nixpkgs/rush | Restricted User Shell |
| packages/nixpkgs/gomapenum | Tools for user enumeration and password bruteforce |
| packages/nixpkgs/star-history | Command line program to generate a graph showing number of GitHub stars of a user, org or repo over time |
| packages/nixpkgs/virt-manager | Desktop user interface for managing virtual machines |
| packages/nixpkgs/python313Packages.lttng | Tracing tools (kernel + user space) for Linux |
| packages/nixpkgs/python314Packages.lttng | Tracing tools (kernel + user space) for Linux |
| packages/nixpkgs/budgie-desktop | Feature-rich, modern desktop designed to keep out the way of the user |
| packages/nixpkgs/bilibili-tui | Terminal user interface (TUI) client for Bilibili |
| packages/nixpkgs/vors | Very simple and usable multi-user VoIP solution |
| packages/nixpkgs/inter | Typeface specially designed for user interfaces |
| packages/nixpkgs/libkcapi | Linux Kernel Crypto API User Space Interface Library |
| packages/nixpkgs/pdfchain | Graphical user interface for the PDF Toolkit (PDFtk) |
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.present | Whether to ensure that this user is present or absent.
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.bypassrls | Grants the user, created by the ensureUser attr, replication permissions
|
| packages/nixpkgs/game-devices-udev-rules | Udev rules to make supported controllers available with user-grade permissions |
| packages/nixpkgs/fox | C++ based class library for building Graphical User Interfaces |
| packages/nixpkgs/python313Packages.angr | Powerful and user-friendly binary analysis platform |
| packages/nixpkgs/python314Packages.angr | Powerful and user-friendly binary analysis platform |
| options/home-manager/wayland.windowManager.sway.systemd.dbusImplementation | The D-Bus implementation used on the system
|
| packages/nixpkgs/deepin.dtkwidget | Deepin graphical user interface library |
| packages/nixpkgs/apparmor-bin-utils | Mandatory access control system - binary user-land utilities |
| packages/nixpkgs/ftxui | Functional Terminal User Interface library for C++ |
| packages/nixpkgs/wemux | Multi-user tmux made easy |
| packages/nixpkgs/libusb-compat-0_1 | Cross-platform user-mode USB device library |
| packages/nixpkgs/pam_mount | PAM module to mount volumes for a user session |
| packages/nixpkgs/python313Packages.cli-ui | Build Nice User Interfaces In The Terminal |
| packages/nixpkgs/python314Packages.cli-ui | Build Nice User Interfaces In The Terminal |
| options/home-manager/programs.librewolf.profiles.<name>.extensions.packages | List of ‹name› add-on packages to install for this profile
|
| packages/nixpkgs/virt-manager-qt | Desktop user interface for managing virtual machines (QT) |
| packages/nixpkgs/kimai | Web-based multi-user time-tracking application |
| options/nixos/services.neo4j.directories.certificates | Directory for storing certificates to be used by Neo4j for
TLS connections
|
| options/nixos/services.healthchecks.settings.REGISTRATION_OPEN | A boolean that controls whether site visitors can create new accounts
|
| options/nixos/services.biboumi.settings.realname_from_jid | Whether the realname and username of each biboumi
user will be extracted from their JID
|
| packages/nixpkgs/libsForQt5.kde-inotify-survey | Tooling for monitoring inotify limits and informing the user when they have been or about to be reached |
| packages/nixpkgs/airspyhf | User mode driver for Airspy HF+ |
| packages/nixpkgs/umlet | Free, open-source UML tool with a simple user interface |
| packages/nixpkgs/imgui | Bloat-free Graphical User interface for C++ with minimal dependencies |
| packages/nixpkgs/pcsc-cyberjack | REINER SCT cyberJack USB chipcard reader user space driver |
| options/nixos/services.grafana.settings.security.disable_gravatar | Set to true to disable the use of Gravatar for user profile images.
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.exhaustivePermissions | When enabled, the user must authorize requested
permissions for all extensions from
programs.floorp.profiles.<profile>.extensions.packages
in
programs.floorp.profiles.<profile>.extensions.settings.<extensionID>.permissions
|
| packages/nixpkgs/gnome-console | Simple user-friendly terminal emulator for the GNOME desktop |
| packages/nixpkgs/gtk3 | Multi-platform toolkit for creating graphical user interfaces |
| packages/nixpkgs/sofia_sip | Open-source SIP User-Agent library, compliant with the IETF RFC3261 specification |
| packages/nixpkgs/ocamlPackages_latest.reason | User-friendly programming language built on OCaml |
| packages/nixpkgs/apparmor-utils | Mandatory access control system - script user-land utilities |
| packages/nixpkgs/vhost-device-sound | virtio-sound device using the vhost-user protocol |
| packages/nixpkgs/python313Packages.hjson | User interface for JSON |
| options/home-manager/programs.firefox.profiles.<name>.extensions.exhaustivePermissions | When enabled, the user must authorize requested
permissions for all extensions from
programs.firefox.profiles.<profile>.extensions.packages
in
programs.firefox.profiles.<profile>.extensions.settings.<extensionID>.permissions
|
| packages/nixpkgs/python314Packages.hjson | User interface for JSON |
| options/nixos/services.movim.podConfig.restrictsuggestions | Only suggest chatrooms, Communities and other contents that are available on the user XMPP server and related services
|
| packages/nixpkgs/gobby | GTK-based collaborative editor supporting multiple documents in one session and a multi-user chat |
| packages/nixpkgs/waydroid-helper | User-friendly way to configure Waydroid and install extensions, including Magisk and ARM translation |
| packages/nixpkgs/incus-ui-canonical | Web user interface for Incus |
| packages/nixpkgs/octofetch | Github user information on terminal |
| packages/nixpkgs/python313Packages.enaml | Declarative User Interfaces for Python |
| packages/nixpkgs/python313Packages.faker | Python library for generating fake user data |
| packages/nixpkgs/python314Packages.enaml | Declarative User Interfaces for Python |
| packages/nixpkgs/python314Packages.faker | Python library for generating fake user data |
| options/nixos/services.transmission.downloadDirPermissions | If not null, is used as the permissions
set by system.activationScripts.transmission-daemon
on the directories services.transmission.settings.download-dir,
services.transmission.settings.incomplete-dir.
and services.transmission.settings.watch-dir
|
| options/nixos/services.amazon-cloudwatch-agent.configurationFile | Amazon CloudWatch Agent configuration file
|
| options/nixos/services.prometheus.exporters.pgbouncer.connectionString | Connection string for accessing pgBouncer
|
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.replication | Grants the user, created by the ensureUser attr, replication permissions
|
| packages/nixpkgs/systeroid | More powerful alternative to sysctl(8) with a terminal user interface |
| packages/nixpkgs/lightdm-tiny-greeter | Tiny multi user lightdm greeter |
| packages/nixpkgs/linuxPackages.systemtap | Provides a scripting language for instrumentation on a live kernel plus user-space |
| packages/nixpkgs/ocamlPackages_latest.reason-native.dir | Library that provides a consistent API for common system, user and application directories consistently on all platforms |
| packages/nixpkgs/ocamlPackages.ocamline | Command line interface for user input |
| packages/nixpkgs/python313Packages.urwid | Full-featured console (xterm et al.) user interface library |
| packages/nixpkgs/python314Packages.urwid | Full-featured console (xterm et al.) user interface library |
| packages/nixpkgs/gtk4 | Multi-platform toolkit for creating graphical user interfaces |
| packages/nixpkgs/lightdm-mini-greeter | Minimal, configurable, single-user GTK3 LightDM greeter |
| packages/nixpkgs/ocamlPackages.reason-native.reason | User-friendly programming language built on OCaml |
| options/nixos/services.postgresql.ensureUsers.*.ensureClauses.createrole | Grants the user, created by the ensureUser attr, createrole permissions
|
| options/nixos/services.warpgate.settings.ssh.inactivity_timeout | How long can user be inactive until Warpgate terminates the connection.
|
| packages/nixpkgs/pam_mktemp | PAM for login service to provide per-user private directories |
| packages/nixpkgs/photoflare | Cross-platform image editor with a powerful features and a very friendly graphical user interface |
| options/home-manager/programs.librewolf.profiles.<name>.extensions.exhaustivePermissions | When enabled, the user must authorize requested
permissions for all extensions from
programs.librewolf.profiles.<profile>.extensions.packages
in
programs.librewolf.profiles.<profile>.extensions.settings.<extensionID>.permissions
|
| options/nixos/services.prometheus.exporters.fritz.settings.devices.*.password_file | Path to a file which contains the password to authenticate with the target device
|
| packages/nixpkgs/vokoscreen-ng | User friendly Open Source screencaster for Linux and Windows |
| packages/nixpkgs/kdePackages.kpackage | This framework lets applications to manage user installable packages of non-binary assets |
| packages/nixpkgs/pipewire | Server and user space API to deal with multimedia pipelines |
| packages/nixpkgs/systemd-lock-handler | Translates systemd-system lock/sleep signals into systemd-user target activations |
| packages/nixpkgs/linuxPackages_zen.systemtap | Provides a scripting language for instrumentation on a live kernel plus user-space |
| packages/nixpkgs/linuxPackages_lqx.systemtap | Provides a scripting language for instrumentation on a live kernel plus user-space |
| packages/nixpkgs/ocamlPackages.safepass | OCaml library offering facilities for the safe storage of user passwords |
| options/nixos/services.prometheus.exporters.mail.configuration.servers.*.detectionDir | Directory in which new mails for the exporter user are placed
|
| packages/nixpkgs/superiotool | User-space utility to detect Super I/O of a mainboard and provide detailed information about the register contents of the Super I/O |
| packages/nixpkgs/libusb1 | Cross-platform user-mode USB device library |
| packages/nixpkgs/pam_tmpdir | PAM module for creating safe per-user temporary directories |
| packages/nixpkgs/python313Packages.rio-tiler | User friendly Rasterio plugin to read raster datasets |
| packages/nixpkgs/python314Packages.rio-tiler | User friendly Rasterio plugin to read raster datasets |
| packages/nixpkgs/plan9port | Plan 9 from User Space |
| packages/nixpkgs/python312Packages.angr | Powerful and user-friendly binary analysis platform |
| packages/nixpkgs/efibootmgr | Linux user-space application to modify the Intel Extensible Firmware Interface (EFI) Boot Manager |
| packages/nixpkgs/srht-gen-oauth-tok | Script to register a new Sourcehut OAuth token for a given user |
| packages/nixpkgs/spearspray | Tool for doing Password Spraying with User Intelligence |
| packages/nixpkgs/perlPackages.Tk | Tk - a Graphical User Interface Toolkit |
| packages/nixpkgs/python313Packages.swh-auth | Set of utility libraries related to user authentication in applications and services based on the use of Keycloak and OpenID Connect |
| packages/nixpkgs/python314Packages.swh-auth | Set of utility libraries related to user authentication in applications and services based on the use of Keycloak and OpenID Connect |
| options/nixos/services.doh-server.settings.ecs_use_precise_ip | If ECS is added to the request, let the full IP address or cap it to 24 or 128 mask
|
| packages/nixpkgs/wireguard-ui | Web user interface to manage your WireGuard setup |
| packages/nixpkgs/ultrablue-server | User-friendly Lightweight TPM Remote Attestation over Bluetooth |
| packages/nixpkgs/libsForQt5.mauikit-accounts | MauiKit utilities to handle User Accounts |
| packages/nixpkgs/python312Packages.cli-ui | Build Nice User Interfaces In The Terminal |
| packages/nixpkgs/adidnsdump | Active Directory Integrated DNS dumping by any authenticated user |
| packages/nixpkgs/mobilecoin-wallet | User-friendly desktop wallet with support for transaction history, encrypted contact book, gift codes, and payments |
| options/nixos/services.pgbouncer.settings.pgbouncer.default_pool_size | How many server connections to allow per user/database pair
|
| packages/nixpkgs/driversi686Linux.intel-vaapi-driver | VA-API user mode driver for Intel GEN Graphics family |
| packages/nixpkgs/wtwitch | Terminal user interface for Twitch |
| packages/nixpkgs/qsreplace | Accept URLs on stdin, replace all query string values with a user-supplied value |
| options/nixos/services.movim.h2o.tls.recommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|
| packages/nixpkgs/deepin.dtk6widget | Deepin graphical user interface library |
| packages/nixpkgs/python312Packages.snack | Library for color text mode, widget based user interfaces |
| packages/nixpkgs/gophertube | Terminal user interface for search and watching YouTube videos using mpv and chafa |
| packages/nixpkgs/systemtap-unwrapped | Provides a scripting language for instrumentation on a live kernel plus user-space |
| packages/nixpkgs/openrazer-daemon | Entirely open source user-space daemon that allows you to manage your Razer peripherals on GNU/Linux |
| packages/nixpkgs/python313Packages.jianpu-ly | Assists with printing jianpu |
| packages/nixpkgs/python313Packages.pyftdi | User-space driver for modern FTDI devices |
| packages/nixpkgs/python314Packages.pyftdi | User-space driver for modern FTDI devices |
| packages/nixpkgs/python314Packages.jianpu-ly | Assists with printing jianpu |
| packages/nixpkgs/python313Packages.snack | Library for color text mode, widget based user interfaces |
| packages/nixpkgs/tclPackages.dbus | DBus bindings for Tcl |
| packages/nixpkgs/source-sans | Sans serif font family for user interface environments |
| packages/nixpkgs/power-profiles-daemon | Makes user-selected power profiles handling available over D-Bus |
| packages/nixpkgs/python313Packages.flask-login | User session management for Flask |
| packages/nixpkgs/python314Packages.flask-login | User session management for Flask |
| packages/nixpkgs/python314Packages.snack | Library for color text mode, widget based user interfaces |
| options/nixos/services.h2o.hosts.<name>.tls.recommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|
| options/nixos/services.h2o.defaultTLSRecommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|
| packages/nixpkgs/python312Packages.enaml | Declarative User Interfaces for Python |
| packages/nixpkgs/python312Packages.hjson | User interface for JSON |
| packages/nixpkgs/typstPackages.letterloom | The letterloom package is a user-friendly and customizable template designed to streamline the creation of professional-looking letters |
| options/nixos/environment.memoryAllocator.provider | The system-wide memory allocator
|
| packages/nixpkgs/python312Packages.faker | Python library for generating fake user data |
| packages/nixpkgs/bytecode-viewer | Lightweight user-friendly Java/Android Bytecode Viewer, Decompiler & More |
| packages/nixpkgs/libraw1394 | Library providing direct access to the IEEE 1394 bus through the Linux 1394 subsystem's raw1394 user space interface |
| packages/nixpkgs/deepin.deepin-system-monitor | More user-friendly system monitor |
| packages/nixpkgs/sc-controller | User-mode driver and GUI for Steam Controller and other controllers |
| packages/nixpkgs/victorialogs | User friendly log database from VictoriaMetrics |
| packages/nixpkgs/perl5Packages.Tk | Tk - a Graphical User Interface Toolkit |
| packages/nixpkgs/python312Packages.urwid | Full-featured console (xterm et al.) user interface library |
| packages/nixpkgs/kdePackages.kde-inotify-survey | Tooling for monitoring inotify limits and informing the user when they have been or about to be reached. |
| packages/nixpkgs/linuxPackages_latest.systemtap | Provides a scripting language for instrumentation on a live kernel plus user-space |
| packages/nixpkgs/linuxPackages_xanmod.systemtap | Provides a scripting language for instrumentation on a live kernel plus user-space |
| packages/nixpkgs/ocamlPackages_latest.ocamline | Command line interface for user input |
| options/nixos/services.dolibarr.h2o.tls.recommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|
| packages/nixpkgs/source-code-pro | Monospaced font family for user interface and coding environments |
| packages/nixpkgs/wxmacmolplt | Graphical user interface for GAMESS-US |
| packages/nixpkgs/ocamlPackages_latest.reason-native.reason | User-friendly programming language built on OCaml |
| packages/nixpkgs/python313Packages.urllib3 | Powerful, user-friendly HTTP client for Python |
| packages/nixpkgs/python314Packages.urllib3 | Powerful, user-friendly HTTP client for Python |
| packages/nixpkgs/thunderbolt | Thunderbolt user-space components |
| packages/nixpkgs/intermodal | User-friendly and featureful command-line BitTorrent metainfo utility |
| packages/nixpkgs/hledger-web | Web user interface for the hledger accounting system |
| packages/nixpkgs/perlPackages.TermUI | User interfaces via Term::ReadLine made easy |
| packages/nixpkgs/python313Packages.nicegui | Module to create web-based user interfaces |
| packages/nixpkgs/python314Packages.nicegui | Module to create web-based user interfaces |
| packages/nixpkgs/python313Packages.elevate | Python module for re-launching the current process as super-user |
| packages/nixpkgs/plan9port-wayland | Plan 9 from User Space (fork with wayland support) |
| packages/nixpkgs/python314Packages.elevate | Python module for re-launching the current process as super-user |
| packages/nixpkgs/python314Packages.wagtail | Django content management system focused on flexibility and user experience |
| packages/nixpkgs/source-sans-pro | Sans serif font family for user interface environments (version of Source Sans before being renamed) |
| packages/nixpkgs/haskellPackages.sel | Cryptography for the casual user |
| packages/nixpkgs/ocamlPackages_latest.safepass | OCaml library offering facilities for the safe storage of user passwords |
| packages/nixpkgs/ocamlPackages.ocsigen-toolkit | User interface widgets for Ocsigen applications |
| packages/nixpkgs/python313Packages.wagtail | Django content management system focused on flexibility and user experience |
| packages/nixpkgs/python312Packages.rio-tiler | User friendly Rasterio plugin to read raster datasets |
| packages/nixpkgs/cherrybomb | CLI tool that helps you avoid undefined user behavior by validating your API specifications |
| packages/nixpkgs/slirp4netns | User-mode networking for unprivileged network namespaces |
| packages/nixpkgs/haskellPackages.lui | Purely FunctionaL User Interface |
| packages/nixpkgs/perl5Packages.TermUI | User interfaces via Term::ReadLine made easy |
| packages/nixpkgs/libutempter | Interface for terminal emulators such as screen and xterm to record user sessions to utmp and wtmp files |
| packages/nixpkgs/libsigsegv | Library to handle page faults in user mode |
| packages/nixpkgs/pam_rundir | Provide user runtime directory on Linux systems |
| options/nixos/services.matrix-continuwuity.settings.global.unix_socket_path | Listen on a UNIX socket at the specified path
|
| packages/nixpkgs/python312Packages.pyftdi | User-space driver for modern FTDI devices |
| packages/nixpkgs/python312Packages.swh-auth | Set of utility libraries related to user authentication in applications and services based on the use of Keycloak and OpenID Connect |
| packages/nixpkgs/gdlauncher-carbon | Simple, yet powerful Minecraft custom launcher with a strong focus on the user experience |
| packages/nixpkgs/tinysparql | Desktop-neutral user information store, search tool and indexer |
| packages/nixpkgs/tclPackages.lexec | Implementation of Tcl TIP 424 "Improving [exec]" as a separate package |
| packages/nixpkgs/haskellPackages.gtk | Binding to the Gtk+ graphical user interface library |
| packages/nixpkgs/haskellPackages.aur | Access metadata from the Arch Linux User Repository |
| packages/nixpkgs/python313Packages.bot-safe-agents | Library for fetching a list of bot-safe user agents |
| packages/nixpkgs/python314Packages.bot-safe-agents | Library for fetching a list of bot-safe user agents |
| packages/nixpkgs/ansible-navigator | Text-based user interface (TUI) for Ansible |
| packages/nixpkgs/python313Packages.guidata | Python library generating graphical user interfaces for easy dataset editing and display |
| packages/nixpkgs/python314Packages.guidata | Python library generating graphical user interfaces for easy dataset editing and display |
| packages/nixpkgs/perl538Packages.Tk | Tk - a Graphical User Interface Toolkit |
| packages/nixpkgs/perl540Packages.Tk | Tk - a Graphical User Interface Toolkit |
| packages/nixpkgs/python312Packages.jianpu-ly | Assists with printing jianpu |
| packages/nixpkgs/haskellPackages.UISF | Library for Arrowized Graphical User Interfaces |
| packages/nixpkgs/haskellPackages.vty-ui | An interactive terminal user interface library for Vty |
| packages/nixpkgs/haskellPackages.slim | Functional reactive user interface programming |
| options/nixos/services.mediagoblin.settings.mediagoblin.allow_registration | Whether to enable user self registration
|
| packages/nixpkgs/gnomeExtensions.arcmenu | Application menu for GNOME Shell, designed to provide a more traditional user experience and workflow |
| packages/nixpkgs/scenebuilder | Visual, drag'n'drop, layout tool for designing JavaFX application user interfaces |
| packages/nixpkgs/spatialite-gui | Graphical user interface for SpatiaLite |
| packages/nixpkgs/haskellPackages.uni-htk | Graphical User Interface for Haskell Programs |
| packages/nixpkgs/lklug-sinhala | Unicode Sinhala font by Lanka Linux User Group |
| packages/nixpkgs/python312Packages.flask-login | User session management for Flask |
| packages/nixpkgs/chickenPackages_5.chickenEggs.udp | An interface to User Datagram Protocol sockets |
| packages/nixpkgs/haskellPackages.gtk3 | Binding to the Gtk+ 3 graphical user interface library |
| packages/nixpkgs/haskellPackages.pcap | A system-independent interface for user-level packet capture |
| packages/nixpkgs/rootlesskit | Kind of Linux-native "fake root" utility, made for mainly running Docker and Kubernetes as an unprivileged user |
| packages/nixpkgs/perlPackages.IOPrompt | Interactively prompt for user input |
| packages/nixpkgs/nerd-fonts.sauce-code-pro | Nerd Fonts: Monospaced font family for user interface and coding environments |
| packages/nixpkgs/python313Packages.humblewx | Library that simplifies creating user interfaces with wxPython |
| packages/nixpkgs/python314Packages.humblewx | Library that simplifies creating user interfaces with wxPython |
| packages/nixpkgs/taler-challenger | OAuth 2.0-based authentication service that validates user can receive messages at a certain address |
| packages/nixpkgs/haskellPackages.geni-gui | GenI graphical user interface |
| packages/nixpkgs/budgie-desktop-with-plugins | Feature-rich, modern desktop designed to keep out the way of the user |
| packages/nixpkgs/perlPackages.CursesUI | Curses based OO user interface framework |
| packages/nixpkgs/python313Packages.datalad-gooey | Graphical user interface (GUI) for DataLad |
| options/nixos/services.pgbouncer.settings.pgbouncer.max_db_connections | Do not allow more than this many server connections per database (regardless of user)
|
| options/nixos/services.dendrite.settings.client_api.registration_disabled | Whether to disable user registration to the server
without the shared secret.
|
| packages/nixpkgs/haskellPackages.brick | A declarative terminal user interface library |
| packages/nixpkgs/mailmanPackages.postorius | Web-based user interface for managing GNU Mailman |
| packages/nixpkgs/perl5Packages.IOPrompt | Interactively prompt for user input |
| packages/nixpkgs/python312Packages.nicegui | Module to create web-based user interfaces |
| packages/nixpkgs/python312Packages.urllib3 | Powerful, user-friendly HTTP client for Python |
| packages/nixpkgs/haskellPackages.TCache | A Transactional cache with user-defined persistence |
| packages/nixpkgs/haskellPackages.mmzk-env | Read environment variables into a user-defined data type |
| packages/nixpkgs/python313Packages.inquirer | Collection of common interactive command line user interfaces, based on Inquirer.js |
| packages/nixpkgs/python313Packages.django-hijack | Allows superusers to hijack (=login as) and work on behalf of another user |
| packages/nixpkgs/python314Packages.django-hijack | Allows superusers to hijack (=login as) and work on behalf of another user |
| packages/nixpkgs/python314Packages.inquirer | Collection of common interactive command line user interfaces, based on Inquirer.js |
| packages/nixpkgs/python314Packages.datalad-gooey | Graphical user interface (GUI) for DataLad |
| packages/nixpkgs/perl5Packages.CursesUI | Curses based OO user interface framework |
| packages/nixpkgs/python313Packages.datalad-next | DataLad extension with a staging area for additional functionality, or for improved performance and user experience |
| packages/nixpkgs/python314Packages.datalad-next | DataLad extension with a staging area for additional functionality, or for improved performance and user experience |
| packages/nixpkgs/python312Packages.elevate | Python module for re-launching the current process as super-user |
| packages/nixpkgs/python312Packages.wagtail | Django content management system focused on flexibility and user experience |
| packages/nixpkgs/chewing-editor | Cross platform chewing user phrase editor |
| packages/nixpkgs/enlightenment.econnman | User interface for the connman network connection manager |
| packages/nixpkgs/python313Packages.freertos-gdb | User-friendly view of FreeRTOS kernel objects in GDB |
| packages/nixpkgs/python314Packages.freertos-gdb | User-friendly view of FreeRTOS kernel objects in GDB |
| packages/nixpkgs/typstPackages.patatrac_0_5_0 | A powerful and user-friendly Typst package for drawing physics diagrams |
| packages/nixpkgs/haskellPackages.gooey | Graphical user interfaces that are renderable, change over time and eventually produce a value |
| packages/nixpkgs/mpvScripts.simple-mpv-webui | Web based user interface with controls for the mpv mediaplayer |
| packages/nixpkgs/ocamlPackages_latest.ocsigen-toolkit | User interface widgets for Ocsigen applications |
| packages/nixpkgs/perl540Packages.TermUI | User interfaces via Term::ReadLine made easy |
| packages/nixpkgs/perl538Packages.TermUI | User interfaces via Term::ReadLine made easy |
| packages/nixpkgs/python312Packages.guidata | Python library generating graphical user interfaces for easy dataset editing and display |
| packages/nixpkgs/taskwarrior-tui | Terminal user interface for taskwarrior |
| packages/nixpkgs/haskellPackages.clone-all | Clone all github repositories from a given user |
| packages/nixpkgs/haskellPackages.warp-tls-uid | set group and user id before running server |
| packages/nixpkgs/gnomeExtensions.todo | Lightweight and user-friendly extension designed to help you manage your tasks efficiently |
| packages/nixpkgs/scriptaculous | Set of JavaScript libraries to enhance the user interface of web sites |
| packages/nixpkgs/haskellPackages.phooey | Functional user interfaces |
| options/nixos/services.grafana.settings.security.csrf_additional_headers | List of allowed headers to be set by the user
|
| packages/nixpkgs/python312Packages.bot-safe-agents | Library for fetching a list of bot-safe user agents |
| packages/nixpkgs/haskellPackages.dialog | Simple dialog-based user interfaces |
| packages/nixpkgs/opentabletdriver | Open source, cross-platform, user-mode tablet driver |
| packages/nixpkgs/perlPackages.HTTPCookieJar | Minimalist HTTP user agent cookie jar |
| packages/nixpkgs/haskellPackages.radius | Remote Authentication Dial In User Service (RADIUS) |
| packages/nixpkgs/openobserve | Cloud-native observability platform built specifically for logs, metrics, traces, analytics & realtime user-monitoring |
| packages/nixpkgs/python313Packages.orange-canvas-core | Orange framework for building graphical user interfaces for editing workflows |
| packages/nixpkgs/python314Packages.orange-canvas-core | Orange framework for building graphical user interfaces for editing workflows |
| options/nixos/services.grafana.settings.security.content_security_policy | Set to true to add the Content-Security-Policy header to your requests
|
| packages/nixpkgs/haskellPackages.dyna-brick | FRP for brick Terminal user interface library |
| packages/nixpkgs/python313Packages.flask-paranoid | Simple user session protection |
| packages/nixpkgs/python314Packages.flask-paranoid | Simple user session protection |
| packages/nixpkgs/haskellPackages.relude | Safe, performant, user-friendly and lightweight Haskell Standard Library |
| packages/nixpkgs/haskellPackages.tasty-tmux | Terminal user acceptance testing (UAT) via tmux |
| packages/nixpkgs/localsearch | Desktop-neutral user information store, search tool and indexer |
| packages/nixpkgs/perl5Packages.HTTPCookieJar | Minimalist HTTP user agent cookie jar |
| packages/nixpkgs/texlivePackages.letgut | Class for the newsletter "La Lettre GUTenberg" of the French TeX User Group GUTenberg |
| packages/nixpkgs/texlivePackages.amscls-doc | User documentation for AMS document classes |
| packages/nixpkgs/python312Packages.humblewx | Library that simplifies creating user interfaces with wxPython |
| packages/nixpkgs/haskellPackages.prompt-hs | A user-friendly, dependently-typed library for asking your users questions |
| packages/nixpkgs/python312Packages.datalad-next | DataLad extension with a staging area for additional functionality, or for improved performance and user experience |
| packages/nixpkgs/home-assistant-custom-lovelace-modules.custom-sidebar | Custom plugin that allows you to personalise the Home Assistant's sidebar per user or device basis |
| packages/nixpkgs/haskellPackages.web-output | Library to present content to an user via their browser |
| packages/nixpkgs/perlPackages.PerlCriticPulp | Some add-on policies for Perl::Critic |
| packages/nixpkgs/nss_wrapper | Wrapper for the user, group and hosts NSS API |
| packages/nixpkgs/python313Packages.hydrogram | Asynchronous Telegram MTProto API framework for fluid user and bot interactions |
| packages/nixpkgs/python314Packages.hydrogram | Asynchronous Telegram MTProto API framework for fluid user and bot interactions |
| packages/nixpkgs/python313Packages.inquirer3 | Collection of common interactive command line user interfaces, based on Inquirer.js |
| packages/nixpkgs/python314Packages.inquirer3 | Collection of common interactive command line user interfaces, based on Inquirer.js |
| packages/nixpkgs/perl538Packages.IOPrompt | Interactively prompt for user input |
| packages/nixpkgs/perl540Packages.IOPrompt | Interactively prompt for user input |
| packages/nixpkgs/charliecloud | User-defined software stacks (UDSS) for high-performance computing (HPC) centers |
| packages/nixpkgs/haskellPackages.cabal-setup | The user interface for building and installing Cabal packages |
| packages/nixpkgs/haskellPackages.ua-parser | A library for parsing User-Agent strings, official Haskell port of ua-parser |
| packages/nixpkgs/lazyworktree | BubbleTea-based Terminal User Interface for efficient Git worktree management |
| packages/nixpkgs/python312Packages.django-hijack | Allows superusers to hijack (=login as) and work on behalf of another user |
| packages/nixpkgs/python312Packages.inquirer | Collection of common interactive command line user interfaces, based on Inquirer.js |
| packages/nixpkgs/cantarell-fonts | Default typeface used in the user interface of GNOME since version 3.0 |
| packages/nixpkgs/perl5Packages.PerlCriticPulp | Some add-on policies for Perl::Critic |
| packages/nixpkgs/perl538Packages.CursesUI | Curses based OO user interface framework |
| packages/nixpkgs/perl540Packages.CursesUI | Curses based OO user interface framework |
| packages/nixpkgs/gnomeExtensions.signal-shell | Load shell themes from user directory. |
| packages/nixpkgs/texlivePackages.newfile | User level management of LaTeX input and output |
| packages/nixpkgs/haskellPackages.himerge | Haskell Graphical User Interface for Emerge |
| packages/nixpkgs/python312Packages.freertos-gdb | User-friendly view of FreeRTOS kernel objects in GDB |
| packages/nixpkgs/ayatana-indicator-session | Ayatana Indicator showing session management, status and user switching |
| packages/nixpkgs/gnomeExtensions.voluble | Pleasant-sounding, talkative announcer of system or user notifications |
| packages/nixpkgs/haskellPackages.ghcitui | A Terminal User Interface (TUI) for GHCi |
| packages/nixpkgs/hyprland-workspaces-tui | Terminal-based user interface (TUI) wrapper for the hyprland-workspaces CLI utility |
| packages/nixpkgs/gnomeExtensions.mypubip | A simple extension that let the user to view and copy the public IPv4 and IPv6 address, by using ipify.org services. |
| packages/nixpkgs/blueprint-compiler | Markup language for GTK user interface files |
| packages/nixpkgs/texlivePackages.sugconf | SAS(R) user group conference proceedings document class |
| packages/nixpkgs/haskellPackages.wizards | High level, generic library for interrogative user interfaces |
| packages/nixpkgs/linuxKernel.packages.linux_5_4.systemtap | Provides a scripting language for instrumentation on a live kernel plus user-space |
| packages/nixpkgs/haskellPackages.ConsoleAsk | Simple CLI user input library |
| packages/nixpkgs/gnomeExtensions.whoami-in-top-bar | Show the effective user ID in the top bar samely as returned by whoami command. |
| packages/nixpkgs/haskellPackages.capped-list | A list-like type for lazy sequences, with a user-defined termination value |
| packages/nixpkgs/linuxKernel.packages.linux_6_6.systemtap | Provides a scripting language for instrumentation on a live kernel plus user-space |
| packages/nixpkgs/linuxKernel.packages.linux_6_1.systemtap | Provides a scripting language for instrumentation on a live kernel plus user-space |
| packages/nixpkgs/linuxKernel.packages.linux_lqx.systemtap | Provides a scripting language for instrumentation on a live kernel plus user-space |
| packages/nixpkgs/linuxKernel.packages.linux_zen.systemtap | Provides a scripting language for instrumentation on a live kernel plus user-space |
| packages/nixpkgs/python313Packages.azure-storage-nspkg | Client library for Microsoft Azure Storage services owning the azure.storage namespace, user should not use this directly |
| packages/nixpkgs/python314Packages.azure-storage-nspkg | Client library for Microsoft Azure Storage services owning the azure.storage namespace, user should not use this directly |
| options/nixos/services.buffyboard.settings.quirks.ignore_unused_terminals | If true, buffyboard won't automatically update the layout of a new terminal and
draw the keyboard, if the terminal is not opened by any process
|
| packages/nixpkgs/python312Packages.orange-canvas-core | Orange framework for building graphical user interfaces for editing workflows |
| packages/nixpkgs/chickenPackages_5.chickenEggs.webview | Multi-platform HTML user interface shell |
| packages/nixpkgs/haskellPackages.hledger-web | Web user interface for the hledger accounting system |
| packages/nixpkgs/haskellPackages.dmenu-pmount | Mounting and unmounting linux devices as user with dmenu and pmount |
| packages/nixpkgs/python312Packages.flask-paranoid | Simple user session protection |
| packages/nixpkgs/haskellPackages.markov-chain | Markov Chains for generating random sequences with a user definable behaviour |
| packages/nixpkgs/haskellPackages.natural-sort | User-friendly text collation |
| packages/nixpkgs/haskellPackages.text-display | A typeclass for user-facing output |
| packages/nixpkgs/perl538Packages.HTTPCookieJar | Minimalist HTTP user agent cookie jar |
| packages/nixpkgs/perl540Packages.HTTPCookieJar | Minimalist HTTP user agent cookie jar |
| packages/nixpkgs/chickenPackages_5.chickenEggs.termbox | Minimal text based user interfaces |
| packages/nixpkgs/haskellPackages.PUH-Project | This is a package which includes Assignments, Email, User and Reviews modules for Programming in Haskell course |
| packages/nixpkgs/perlPackages.FileUtilTempdir | Cross-platform way to get system-wide & user private temporary directory |
| packages/nixpkgs/python313Packages.robot-detection | Library for detecting if a HTTP User Agent header is likely to be a bot |
| packages/nixpkgs/python314Packages.robot-detection | Library for detecting if a HTTP User Agent header is likely to be a bot |
| packages/nixpkgs/python312Packages.protonvpn-nm-lib | ProtonVPN NetworkManager Library intended for every ProtonVPN service user |
| packages/nixpkgs/python313Packages.protonvpn-nm-lib | ProtonVPN NetworkManager Library intended for every ProtonVPN service user |
| packages/nixpkgs/linuxKernel.packages.linux_6_17.systemtap | Provides a scripting language for instrumentation on a live kernel plus user-space |
| packages/nixpkgs/texlivePackages.addlines | A user-friendly wrapper around \enlargethispage |
| packages/nixpkgs/haskellPackages.find-conduit | A file-finding conduit that allows user control over traversals |
| packages/nixpkgs/haskellPackages.conduit-find | A file-finding conduit that allows user control over traversals |
| packages/nixpkgs/linuxKernel.packages.linux_5_10.systemtap | Provides a scripting language for instrumentation on a live kernel plus user-space |
| packages/nixpkgs/linuxKernel.packages.linux_6_12.systemtap | Provides a scripting language for instrumentation on a live kernel plus user-space |
| packages/nixpkgs/linuxKernel.packages.linux_6_19.systemtap | Provides a scripting language for instrumentation on a live kernel plus user-space |
| packages/nixpkgs/linuxKernel.packages.linux_6_18.systemtap | Provides a scripting language for instrumentation on a live kernel plus user-space |
| packages/nixpkgs/linuxKernel.packages.linux_5_15.systemtap | Provides a scripting language for instrumentation on a live kernel plus user-space |
| packages/nixpkgs/perlPackages.ConfigGrammar | Grammar-based, user-friendly config parser |
| packages/nixpkgs/python312Packages.hydrogram | Asynchronous Telegram MTProto API framework for fluid user and bot interactions |
| packages/nixpkgs/gnomeExtensions.gravatar | Synchronize GNOME Shell user icon with an avatar service, one of Gravatar or Libravatar. |
| packages/nixpkgs/haskellPackages.brick_2_10 | A declarative terminal user interface library |
| packages/nixpkgs/python313Packages.openrazer-daemon | Entirely open source user-space daemon that allows you to manage your Razer peripherals on GNU/Linux |
| packages/nixpkgs/python312Packages.inquirer3 | Collection of common interactive command line user interfaces, based on Inquirer.js |
| packages/nixpkgs/perl5Packages.FileUtilTempdir | Cross-platform way to get system-wide & user private temporary directory |
| packages/nixpkgs/python314Packages.openrazer-daemon | Entirely open source user-space daemon that allows you to manage your Razer peripherals on GNU/Linux |
| packages/nixpkgs/perl5Packages.ConfigGrammar | Grammar-based, user-friendly config parser |
| packages/nixpkgs/perl538Packages.PerlCriticPulp | Some add-on policies for Perl::Critic |
| packages/nixpkgs/perl540Packages.PerlCriticPulp | Some add-on policies for Perl::Critic |
| packages/nixpkgs/cudaPackages.fabricmanager | |
| packages/nixpkgs/gnomeExtensions.vitals | A glimpse into your computer's temperature, voltage, fan speed, memory usage, processor load, system resources, network speed and storage stats |
| packages/nixpkgs/perlPackages.AuthenSASLSASLprep | Stringprep Profile for User Names and Passwords (RFC 4013) |
| packages/nixpkgs/perlPackages.VariableMagic | Associate user-defined magic to variables from Perl |
| packages/nixpkgs/kdePackages.konversation | User-friendly and fully-featured IRC client |
| packages/nixpkgs/gnomeExtensions.ibus-font-setting | use ibus font setting of ibus setup dialog to enhance the user experience |
| packages/nixpkgs/haskellPackages.polysemy-zoo | Experimental, user-contributed effects and interpreters for polysemy |
| packages/nixpkgs/python312Packages.datalad-gooey | Graphical user interface (GUI) for DataLad |
| packages/nixpkgs/gnomeExtensions.razer-puppy | Razer Mice battery watcher (accurate power percentage and charging status), DPI and RGB configuration extension |
| packages/nixpkgs/perl5Packages.AuthenSASLSASLprep | Stringprep Profile for User Names and Passwords (RFC 4013) |
| packages/nixpkgs/perl5Packages.VariableMagic | Associate user-defined magic to variables from Perl |
| packages/nixpkgs/haskellPackages.brick_2_8_3 | A declarative terminal user interface library |
| packages/nixpkgs/python312Packages.azure-storage-nspkg | Client library for Microsoft Azure Storage services owning the azure.storage namespace, user should not use this directly |
| packages/nixpkgs/gnomeExtensions.gnome-window-rules | Makes windows matching user-defined titles sticky (on all workspaces), always-on-top, or both. |
| packages/nixpkgs/gnomeExtensions.time-from-start-uptime | Shows the start time and duration of the system and user operation. |
| packages/nixpkgs/perlPackages.X11ProtocolOther | Miscellaneous helpers for X11::Protocol connections |
| packages/nixpkgs/perlPackages.TermReadPassword | This module lets you ask the user for a password in the traditional way, from the keyboard, without echoing |
| packages/nixpkgs/linuxKernel.packages.linux_libre.systemtap | Provides a scripting language for instrumentation on a live kernel plus user-space |
| packages/nixpkgs/haskellPackages.console-prompt | console user prompts |
| packages/nixpkgs/pantheon.elementary-capnet-assist | Small WebKit app that assists a user with login when a captive portal is detected |
| packages/nixpkgs/python313Packages.qcodes-contrib-drivers | User contributed drivers for QCoDeS |
| packages/nixpkgs/python314Packages.qcodes-contrib-drivers | User contributed drivers for QCoDeS |
| packages/nixpkgs/gnomeExtensions.mouse-follows-focus | Are you a power-user? |
| packages/nixpkgs/tt-rss-plugin-ff-instagram | Plugin for Tiny Tiny RSS that allows to fetch posts from Instagram user sites |
| packages/nixpkgs/perl5Packages.X11ProtocolOther | Miscellaneous helpers for X11::Protocol connections |
| packages/nixpkgs/perl5Packages.TermReadPassword | This module lets you ask the user for a password in the traditional way, from the keyboard, without echoing |
| packages/nixpkgs/python313Packages.nvidia-dlprof-pytorch-nvtx | NVIDIA DLProf Pytorch NVTX markers |
| packages/nixpkgs/python314Packages.nvidia-dlprof-pytorch-nvtx | NVIDIA DLProf Pytorch NVTX markers |
| packages/nixpkgs/qjournalctl | Qt-based graphical user interface for systemd's journalctl command |
| packages/nixpkgs/python312Packages.robot-detection | Library for detecting if a HTTP User Agent header is likely to be a bot |
| packages/nixpkgs/cudaPackages.cuda_cuxxfilt | Decode low-level identifiers that have been mangled by CUDA C++ into user readable names |
| packages/nixpkgs/texlivePackages.styledcmd | Handling multiple versions of user-defined macros |
| packages/nixpkgs/perlPackages.ConfigIdentity | Load (and optionally decrypt via GnuPG) user/pass identity information |
| packages/nixpkgs/perlPackages.PodMinimumVersion | Determine minimum Perl version of POD directives |
| packages/nixpkgs/uid_wrapper | Wrapper for the user, group and hosts NSS API |
| packages/nixpkgs/haskellPackages.extralife | API Client for ExtraLife team and user data |
| packages/nixpkgs/python312Packages.openrazer-daemon | Entirely open source user-space daemon that allows you to manage your Razer peripherals on GNU/Linux |
| packages/nixpkgs/haskellPackages.cabalvchk | Verify installed package version against user-specified constraints |
| packages/nixpkgs/haskellPackages.hsautogui | Haskell bindings for PyAutoGUI, a library for automating user interaction |
| packages/nixpkgs/python313Packages.questionary | Python library to build command line user prompts |
| packages/nixpkgs/python314Packages.questionary | Python library to build command line user prompts |
| packages/nixpkgs/perl540Packages.FileUtilTempdir | Cross-platform way to get system-wide & user private temporary directory |
| packages/nixpkgs/perl538Packages.FileUtilTempdir | Cross-platform way to get system-wide & user private temporary directory |
| packages/nixpkgs/linuxPackages_xanmod_latest.systemtap | Provides a scripting language for instrumentation on a live kernel plus user-space |
| packages/nixpkgs/linuxPackages_xanmod_stable.systemtap | Provides a scripting language for instrumentation on a live kernel plus user-space |
| packages/nixpkgs/perl5Packages.ConfigIdentity | Load (and optionally decrypt via GnuPG) user/pass identity information |
| packages/nixpkgs/perl540Packages.ConfigGrammar | Grammar-based, user-friendly config parser |
| packages/nixpkgs/perl538Packages.ConfigGrammar | Grammar-based, user-friendly config parser |
| packages/nixpkgs/perl5Packages.PodMinimumVersion | Determine minimum Perl version of POD directives |
| options/nixos/services.grafana.settings.security.disable_initial_admin_creation | Disable creation of admin user on first start of Grafana.
|
| packages/nixpkgs/haskellPackages.prompt-hs_1_1_0_1 | A user-friendly, dependently-typed library for asking your users questions |
| packages/nixpkgs/haskellPackages.prompt-hs_1_1_0_2 | A user-friendly, dependently-typed library for asking your users questions |
| packages/nixpkgs/typstPackages.letterloom_0_1_0 | The letterloom package is a user-friendly, highly customizable template for creating professional letters with ease |
| packages/nixpkgs/haskellPackages.happstack-dlg | Cross-request user interactions for Happstack |
| packages/nixpkgs/haskellPackages.rasa-example-config | Example user config for Rasa |
| packages/nixpkgs/linuxKernel.packages.linux_xanmod.systemtap | Provides a scripting language for instrumentation on a live kernel plus user-space |
| packages/nixpkgs/typstPackages.letterloom_1_0_0 | The letterloom package is a user-friendly and customizable template designed to streamline the creation of professional-looking letters |
| packages/nixpkgs/haskellPackages.ddc-interface | Disciplined Disciple Compiler user interface support |
| packages/nixpkgs/perlPackages.HTMLFormatExternal | HTML to text formatting using external programs |
| packages/nixpkgs/surrealdb-migrations | Awesome SurrealDB migration tool, with a user-friendly CLI and a versatile Rust library that enables seamless integration into any project |
| packages/nixpkgs/haskellPackages.bluefin-contrib | The Bluefin effect system, user contributions |
| packages/nixpkgs/perlPackages.DataFormValidator | Validates user input (usually from an HTML form) based on input profile |
| packages/nixpkgs/gnomeExtensions.custom-command-list | Run user defined terminal/shell commands by selecting them from a customizable drop-down menu at the top bar. |
| packages/nixpkgs/perl538Packages.AuthenSASLSASLprep | Stringprep Profile for User Names and Passwords (RFC 4013) |
| packages/nixpkgs/perl540Packages.VariableMagic | Associate user-defined magic to variables from Perl |
| packages/nixpkgs/perl538Packages.VariableMagic | Associate user-defined magic to variables from Perl |
| packages/nixpkgs/perl540Packages.AuthenSASLSASLprep | Stringprep Profile for User Names and Passwords (RFC 4013) |
| packages/nixpkgs/haskellPackages.manatee-welcome | Welcome module to help user play Manatee quickly |
| packages/nixpkgs/perl5Packages.HTMLFormatExternal | HTML to text formatting using external programs |
| options/nixos/services.stash.settings.show_one_time_moved_notification | Whether a small notification to inform the user that Stash will no longer show a terminal window, and instead will be available in the tray
|
| packages/nixpkgs/perl5Packages.DataFormValidator | Validates user input (usually from an HTML form) based on input profile |
| packages/nixpkgs/python312Packages.qcodes-contrib-drivers | User contributed drivers for QCoDeS |
| packages/nixpkgs/tt-rss-plugin-data-migration | Plugin for TT-RSS to exports and imports *all* articles of a specific user via neutral format (JSON files in a ZIP archive) |
| packages/nixpkgs/perl540Packages.X11ProtocolOther | Miscellaneous helpers for X11::Protocol connections |
| packages/nixpkgs/perl538Packages.X11ProtocolOther | Miscellaneous helpers for X11::Protocol connections |
| packages/nixpkgs/perl538Packages.TermReadPassword | This module lets you ask the user for a password in the traditional way, from the keyboard, without echoing |
| packages/nixpkgs/perl540Packages.TermReadPassword | This module lets you ask the user for a password in the traditional way, from the keyboard, without echoing |
| packages/nixpkgs/resolv_wrapper | Wrapper for the user, group and hosts NSS API |
| packages/nixpkgs/haskellPackages.hledger-web_1_42_1 | Web user interface for the hledger accounting system |
| packages/nixpkgs/python312Packages.nvidia-dlprof-pytorch-nvtx | NVIDIA DLProf Pytorch NVTX markers |
| packages/nixpkgs/texlivePackages.pdfcomment | A user-friendly interface to pdf annotations |
| packages/nixpkgs/haskellPackages.crawlchain | Simulation user crawl paths |
| packages/nixpkgs/postfixadmin | Web based virtual user administration interface for Postfix mail servers |
| packages/nixpkgs/python312Packages.questionary | Python library to build command line user prompts |
| packages/nixpkgs/haskellPackages.grapefruit-ui | Declarative user interface programming |
| packages/nixpkgs/haskellPackages.easyrender | User-friendly creation of EPS, PostScript, and PDF files |
| packages/nixpkgs/perl540Packages.ConfigIdentity | Load (and optionally decrypt via GnuPG) user/pass identity information |
| packages/nixpkgs/perl538Packages.PodMinimumVersion | Determine minimum Perl version of POD directives |
| packages/nixpkgs/perl540Packages.PodMinimumVersion | Determine minimum Perl version of POD directives |
| packages/nixpkgs/perl538Packages.ConfigIdentity | Load (and optionally decrypt via GnuPG) user/pass identity information |
| packages/nixpkgs/haskellPackages.diagrams-contrib | Collection of user contributions to diagrams EDSL |
| packages/nixpkgs/gnomeExtensions.background-logo | Overlay a tasteful logo on the background to enhance the user experience |
| packages/nixpkgs/gnomeExtensions.custom-command-toggle | Create fully customizable quick toggle buttons to run user defined commands and launch custom scripts. |
| packages/nixpkgs/python313Packages.serializable | Base class with serialization methods for user-defined Python objects |
| packages/nixpkgs/python314Packages.serializable | Base class with serialization methods for user-defined Python objects |
| packages/nixpkgs/perl538Packages.HTMLFormatExternal | HTML to text formatting using external programs |
| packages/nixpkgs/perl540Packages.HTMLFormatExternal | HTML to text formatting using external programs |
| packages/nixpkgs/perl538Packages.DataFormValidator | Validates user input (usually from an HTML form) based on input profile |
| packages/nixpkgs/perl540Packages.DataFormValidator | Validates user input (usually from an HTML form) based on input profile |
| packages/nixpkgs/gnomeExtensions.gnoming-profiles | Sync gsettings and user config files to GitHub with binary-safe wallpaper syncing and ETag-based polling for ultra-efficient bandwidth usage |
| packages/nixpkgs/tkey-verification | Vendor signing and user verification of TKey genuineness |
| packages/nixpkgs/haskellPackages.grapefruit-ui-gtk | GTK+-based backend for declarative user interface programming |
| packages/nixpkgs/linuxKernel.packages.linux_hardened.systemtap | Provides a scripting language for instrumentation on a live kernel plus user-space |
| packages/nixpkgs/texlivePackages.asypictureb | User-friendly integration of Asymptote into LaTeX |
| packages/nixpkgs/haskellPackages.amazonka-finspace | Amazon FinSpace User Environment Management service SDK |
| packages/nixpkgs/accountsservice | D-Bus interface for user account query and manipulation |
| packages/nixpkgs/haskellPackages.Shpadoinkle | A programming model for declarative, high performance user interface |
| packages/nixpkgs/texlivePackages.listofitems | Grab items in lists using user-specified sep char |
| packages/nixpkgs/python313Packages.django-registration | User registration app for Django |
| packages/nixpkgs/python314Packages.django-registration | User registration app for Django |
| packages/nixpkgs/perlPackages.podlinkcheck | Check POD L<> link references |
| packages/nixpkgs/chickenPackages_5.chickenEggs.simple-exceptions | Some user-friendly exception routines |
| packages/nixpkgs/gnomeExtensions.daily-bing-wallpaper | Simple, unobtrusive GNOME extension that automatically sets the desktop wallpaper to Bing's image of the day and optionally uses the dominant color to set the system accent color |
| packages/nixpkgs/haskellPackages.gtk2hs-buildtools | Tools to build the Gtk2Hs suite of User Interface libraries |
| packages/nixpkgs/perl5Packages.podlinkcheck | Check POD L<> link references |
| packages/nixpkgs/haskellPackages.requirements | Abstraction to manage user defined Type Errors |
| packages/nixpkgs/python313Packages.django-rest-registration | User-related REST API based on the awesome Django REST Framework |
| packages/nixpkgs/python314Packages.django-rest-registration | User-related REST API based on the awesome Django REST Framework |
| packages/nixpkgs/python312Packages.django-registration | User registration app for Django |
| packages/nixpkgs/gnomeExtensions.wallpaper-slideshow | Automatically cycles through wallpapers from a user-defined directory |
| packages/nixpkgs/python312Packages.serializable | Base class with serialization methods for user-defined Python objects |
| packages/nixpkgs/perl538Packages.podlinkcheck | Check POD L<> link references |
| packages/nixpkgs/perl540Packages.podlinkcheck | Check POD L<> link references |
| packages/nixpkgs/rxvt-unicode-plugins.autocomplete-all-the-things | urxvt plugin allowing user to easily complete arbitrary text |
| packages/nixpkgs/python313Packages.django-organizations | Multi-user accounts for Django projects |
| packages/nixpkgs/python314Packages.django-organizations | Multi-user accounts for Django projects |
| packages/nixpkgs/haskellPackages.diagrams-contrib_1_4_6 | Collection of user contributions to diagrams EDSL |
| packages/nixpkgs/gnomeExtensions.vertical-workspaces | V-Shell is designed to enhance and customize the user experience by providing flexible workspace orientations and a variety of interface adjustments, including application grid customization and productivity improvements. |
| packages/nixpkgs/python312Packages.django-rest-registration | User-related REST API based on the awesome Django REST Framework |
| packages/nixpkgs/linuxKernel.packages.linux_5_4_hardened.systemtap | Provides a scripting language for instrumentation on a live kernel plus user-space |
| packages/nixpkgs/linuxKernel.packages.linux_latest_libre.systemtap | Provides a scripting language for instrumentation on a live kernel plus user-space |
| packages/nixpkgs/gnomeExtensions.switch-x11-wayland-default-session | A GNOME Shell extension that adds a X11 or Wayland session indicator to the top panel and allows the user to switch default session between X11 and Wayland. |
| packages/nixpkgs/python312Packages.django-organizations | Multi-user accounts for Django projects |
| packages/nixpkgs/texlivePackages.translation-biblatex-de | German translation of the User Guide for BibLaTeX |
| packages/nixpkgs/linuxKernel.packages.linux_6_6_hardened.systemtap | Provides a scripting language for instrumentation on a live kernel plus user-space |
| packages/nixpkgs/linuxKernel.packages.linux_6_1_hardened.systemtap | Provides a scripting language for instrumentation on a live kernel plus user-space |
| packages/nixpkgs/python313Packages.jupyter-collaboration-ui | JupyterLab/Jupyter Notebook 7+ extension providing user interface integration for real time collaboration |
| packages/nixpkgs/python314Packages.jupyter-collaboration-ui | JupyterLab/Jupyter Notebook 7+ extension providing user interface integration for real time collaboration |
| packages/nixpkgs/linuxKernel.packages.linux_5_10_hardened.systemtap | Provides a scripting language for instrumentation on a live kernel plus user-space |
| packages/nixpkgs/linuxKernel.packages.linux_5_15_hardened.systemtap | Provides a scripting language for instrumentation on a live kernel plus user-space |
| packages/nixpkgs/linuxKernel.packages.linux_xanmod_stable.systemtap | Provides a scripting language for instrumentation on a live kernel plus user-space |
| packages/nixpkgs/linuxKernel.packages.linux_6_12_hardened.systemtap | Provides a scripting language for instrumentation on a live kernel plus user-space |
| packages/nixpkgs/haskellPackages.haskeline_0_8_3_0 | A command-line interface for user input, written in Haskell |
| packages/nixpkgs/gnomeExtensions.shortcuts-to-activate-input-methods | Quick switching of input method and touchpad with user configurable shortcut binding |
| packages/nixpkgs/vscode-extensions.yzhang.dictionary-completion | Visual Studio Code extension to help user easyly finish long words |
| packages/nixpkgs/haskellPackages.haskeline_0_8_4_1 | A command-line interface for user input, written in Haskell |
| packages/nixpkgs/python313Packages.httpagentparser | Module to extract OS, Browser, etc. information from http user agent string |
| packages/nixpkgs/python314Packages.httpagentparser | Module to extract OS, Browser, etc. information from http user agent string |
| packages/nixpkgs/linuxKernel.packages.linux_xanmod_latest.systemtap | Provides a scripting language for instrumentation on a live kernel plus user-space |
| packages/nixpkgs/python312Packages.jupyter-collaboration-ui | JupyterLab/Jupyter Notebook 7+ extension providing user interface integration for real time collaboration |
| packages/nixpkgs/python312Packages.httpagentparser | Module to extract OS, Browser, etc. information from http user agent string |
| packages/nixpkgs/ocamlPackages.async_interactive | Utilities for building simple command-line based user interfaces |
| packages/nixpkgs/perlPackages.MojoliciousPluginTextExceptions | Render exceptions as text in command line user agents |
| packages/nixpkgs/ocamlPackages.ppx_custom_printf | Printf-style format-strings for user-defined string conversion |
| packages/nixpkgs/perl5Packages.MojoliciousPluginTextExceptions | Render exceptions as text in command line user agents |
| packages/nixpkgs/home-assistant-custom-components.smartthinq-sensors | Home Assistant custom integration for SmartThinQ LG devices configurable with Lovelace User Interface |
| packages/nixpkgs/ocamlPackages.janeStreet.async_interactive | Utilities for building simple command-line based user interfaces |
| packages/nixpkgs/ocamlPackages_latest.async_interactive | Utilities for building simple command-line based user interfaces |
| packages/nixpkgs/ocamlPackages.janeStreet.ppx_custom_printf | Printf-style format-strings for user-defined string conversion |
| packages/nixpkgs/ocamlPackages_latest.ppx_custom_printf | Printf-style format-strings for user-defined string conversion |
| packages/nixpkgs/perl540Packages.MojoliciousPluginTextExceptions | Render exceptions as text in command line user agents |
| packages/nixpkgs/perl538Packages.MojoliciousPluginTextExceptions | Render exceptions as text in command line user agents |
| packages/nixpkgs/gnomeExtensions.control-monitor-brightness-and-volume-with-ddcutil | Brightness and volume control for monitors |
| packages/nixpkgs/python313Packages.permissionedforms | Django extension for creating forms that vary according to user permissions |
| packages/nixpkgs/python314Packages.permissionedforms | Django extension for creating forms that vary according to user permissions |
| packages/nixpkgs/ocamlPackages_latest.janeStreet.async_interactive | Utilities for building simple command-line based user interfaces |
| packages/nixpkgs/home-assistant-custom-components.ntfy | Send notifications with ntfy.sh and selfhosted ntfy-servers |
| packages/nixpkgs/ocamlPackages_latest.janeStreet.ppx_custom_printf | Printf-style format-strings for user-defined string conversion |
| packages/nixpkgs/python312Packages.permissionedforms | Django extension for creating forms that vary according to user permissions |
| packages/nixpkgs/kdePackages.kidentitymanagement | Library to assist in handling user identities |
| packages/nixpkgs/perlPackages.CatalystAuthenticationStoreHtpasswd | Authen::Htpasswd based user storage/authentication |
| packages/nixpkgs/perl5Packages.CatalystAuthenticationStoreHtpasswd | Authen::Htpasswd based user storage/authentication |
| packages/nixpkgs/perl538Packages.CatalystAuthenticationStoreHtpasswd | Authen::Htpasswd based user storage/authentication |
| packages/nixpkgs/perl540Packages.CatalystAuthenticationStoreHtpasswd | Authen::Htpasswd based user storage/authentication |
| packages/nixpkgs/perlPackages.MojoUserAgentCached | Caching, Non-blocking I/O HTTP, Local file and WebSocket user agent |
| packages/nixpkgs/libnetfilter_cthelper | Userspace library that provides the programming interface to the user-space connection tracking helper infrastructure |
| packages/nixpkgs/perl5Packages.MojoUserAgentCached | Caching, Non-blocking I/O HTTP, Local file and WebSocket user agent |
| packages/nixpkgs/perl538Packages.MojoUserAgentCached | Caching, Non-blocking I/O HTTP, Local file and WebSocket user agent |
| packages/nixpkgs/perl540Packages.MojoUserAgentCached | Caching, Non-blocking I/O HTTP, Local file and WebSocket user agent |
| options/nixos/security.pam.u2f.enable | Enables U2F PAM (pam-u2f) module
|
| options/nixos/services.dante.config | Contents of Dante's configuration file
|
| options/nixos/services.magnetico.web.credentials | The credentials to access the web interface, in case authentication is
enabled, in the format username:hash
|
| options/nixos/security.pam.yubico.enable | Enables Yubico PAM (yubico-pam) module
|
| options/nixos/services.coturn.realm | The default realm to be used for the users when no explicit
origin/realm relationship was found in the database, or if the TURN
server is not using any database (just the commands-line settings
and the userdb file)
|
| options/nixos/virtualisation.kvmgt.enable | Whether to enable KVMGT (iGVT-g) VGPU support
|
| options/nixos/services.mchprs.whitelist.list | Whitelisted players, only has an effect when
services.mchprs.declarativeWhitelist is
true and the whitelist is enabled
via services.mchprs.whitelist.enable
|
| options/darwin/services.postgresql.identMap | Defines the mapping from system users to database users
|
| options/nixos/services.minecraft-server.whitelist | Whitelisted players, only has an effect when
services.minecraft-server.declarative is
true and the whitelist is enabled
via services.minecraft-server.serverProperties by
setting white-list to true
|
| options/nixos/hardware.brillo.enable | Whether to enable brillo in userspace
|
| options/nixos/services.memos.group | The group to run Memos as.
If changing the default value, you are responsible of creating the corresponding group with users.groups.
|
| options/nixos/services.yarr.authFilePath | Path to a file containing username:password. null means no authentication required to use the service.
|
| options/home-manager/wayland.windowManager.hyprland.enable | Whether to enable configuration for Hyprland, a tiling Wayland
compositor that doesn't sacrifice on its looks.
This module configures Hyprland and adds it to your user's PATH,
but does not make certain system-level changes
|
| options/home-manager/home.uid | The user's uid.
|
| options/nixos/services.deluge.authFile | The file managing the authentication for deluge, the format of this
file is straightforward, each line contains a
username:password:level tuple in plaintext
|
| options/nixos/services.gpsd.devices | List of devices that gpsd should subscribe to
|
| options/nixos/boot.zfs.package | Configured ZFS userland tools package.
|
| options/home-manager/programs.vscode.profiles.<name>.enableMcpIntegration | Whether to integrate the MCP servers config from
programs.mcp.servers into
programs.vscode.profiles.<name>.userMcp
|
| options/nixos/programs.bash.enable | Whenever to configure Bash as an interactive shell
|
| options/nixos/programs.rust-motd.enableMotdInSSHD | Whether to let openssh print the
result when entering a new ssh-session
|
| options/home-manager/programs.kodi.settings | Configuration to write to the advancedsettings.xml
file in kodis userdata directory
|
| options/home-manager/programs.kodi.sources | Contents to populate the file sources.xml in kodis
userdata directory
|
| options/nixos/services.dependency-track.oidc.teams.claim | Defines the name of the claim that contains group memberships or role assignments in the provider's userinfo endpoint
|
| options/nixos/services.silverbullet.envFile | File containing extra environment variables
|
| options/nixos/programs.wayland.miracle-wm.enable | Whether to enable miracle-wm, a tiling Mir based Wayland compositor
|
| options/home-manager/programs.ssh.enableDefaultConfig | Whether to enable or not the old default config values
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.emailPrefixAttribute | The attribute that contains the users username.
|
| options/home-manager/xdg.dataFile | Attribute set of files to link into the user's XDG
data home.
|
| options/nixos/services.dependency-track.settings."alpine.oidc.teams.claim" | Defines the name of the claim that contains group memberships or role assignments in the provider's userinfo endpoint
|
| options/home-manager/xdg.cacheFile | Attribute set of files to link into the user's XDG
cache home.
|
| options/home-manager/xdg.stateFile | Attribute set of files to link into the user's XDG
state home.
|
| options/nixos/hardware.nfc-nci.enable | Whether to enable PN5xx kernel module with udev rules, libnfc-nci userland, and optional ifdnfc-nci PC/SC driver.
|
| options/nixos/security.pam.u2f.settings.authfile | By default pam-u2f module reads the keys from
$XDG_CONFIG_HOME/Yubico/u2f_keys (or
$HOME/.config/Yubico/u2f_keys if XDG variable is
not set)
|
| options/nixos/security.pam.services.<name>.rootOK | If set, root doesn't need to authenticate (e.g. for the
useradd service).
|
| options/nixos/services.matrix-appservice-irc.localpart | The user_id localpart to assign to the appservice
|
| options/home-manager/xdg.configFile | Attribute set of files to link into the user's XDG
configuration home.
|
| options/nixos/security.loginDefs.settings.GID_MAX | Range of group IDs used for the creation of regular groups by useradd, groupadd, or newusers.
|
| options/nixos/security.loginDefs.settings.GID_MIN | Range of group IDs used for the creation of regular groups by useradd, groupadd, or newusers.
|
| options/nixos/security.loginDefs.settings.SYS_GID_MAX | Range of group IDs used for the creation of system groups by useradd, groupadd, or newusers
|
| options/nixos/security.loginDefs.settings.SYS_GID_MIN | Range of group IDs used for the creation of system groups by useradd, groupadd, or newusers
|
| options/nixos/services.matrix-appservice-discord.localpart | The user_id localpart to assign to the AS.
|
| options/nixos/services.multipath.devices.*.alias_prefix | The user_friendly_names prefix to use for this device type, instead of the default mpath
|
| options/home-manager/programs.floorp.profiles.<name>.extraConfig | Extra preferences to add to user.js.
|
| options/home-manager/programs.firefox.profiles.<name>.extraConfig | Extra preferences to add to user.js.
|
| options/home-manager/programs.qutebrowser.greasemonkey | Greasemonkey userscripts to add to qutebrowser's greasemonkey
directory.
|
| options/nixos/services.hologram-server.ldapUserAttr | The LDAP attribute for usernames
|
| options/nixos/services.biboumi.settings.realname_customization | Whether the users will be able to use
the ad-hoc commands that lets them configure
their realname and username.
|
| options/home-manager/programs.floorp.profiles.<name>.preConfig | Extra preferences to add to user.js, before
programs.firefox.profiles._name_.settings
|
| options/nixos/services.usbguard.IPCAllowedUsers | A list of usernames that the daemon will accept IPC connections from.
|
| options/home-manager/programs.firefox.profiles.<name>.preConfig | Extra preferences to add to user.js, before
programs.firefox.profiles._name_.settings
|
| options/home-manager/programs.librewolf.profiles.<name>.extraConfig | Extra preferences to add to user.js.
|
| options/nixos/services.openafsClient.packages.module | OpenAFS kernel module package
|
| options/nixos/security.pam.services.<name>.sshAgentAuth | If set, the calling user's SSH agent is used to authenticate
against the keys in the calling user's
~/.ssh/authorized_keys
|
| options/home-manager/programs.librewolf.profiles.<name>.preConfig | Extra preferences to add to user.js, before
programs.firefox.profiles._name_.settings
|
| options/home-manager/services.pbgopy.httpAuth | Basic HTTP authentication's username and password
|
| options/home-manager/programs.thunderbird.profiles.<name>.extraConfig | Extra preferences to add to user.js.
|
| options/home-manager/home.homeDirectory | The user's home directory
|
| options/home-manager/programs.thunderbird.profiles.<name>.settings | Preferences to add to this profile's
user.js.
|
| options/nixos/services.dendrite.settings.global.server_name | The domain name of the server, with optional explicit port
|
| options/nixos/services.matrix-synapse.settings.server_name | The domain name of the server, with optional explicit port
|
| options/home-manager/nix.gc.automatic | Automatically run the garbage collector at a specific time
|
| options/nixos/services.openssh.authorizedKeysInHomedir | Enables the use of the ~/.ssh/authorized_keys file
|
| options/nixos/services.icingaweb2.modules.monitoring.generalConfig.protectedVars | List of string patterns for custom variables which should be excluded from user’s view.
|
| options/home-manager/targets.darwin.defaults."com.apple.Safari".AutoFillPasswords | Whether to enable autofill of usernames and passwords.
|
| options/home-manager/dbus.packages | Packages whose D-Bus configuration files should be included in
the configuration of the D-Bus session-wide message bus
|
| options/nixos/services.gvfs.enable | Whether to enable GVfs, a userspace virtual filesystem.
|
| options/home-manager/programs.docker-cli.configDir | Folder relative to the user's home directory where the Docker CLI settings should be stored.
|
| options/nixos/services.vsftpd.virtualUseLocalPrivs | If enabled, virtual users will use the same privileges as local
users
|
| options/nixos/services.iptsd.enable | Whether to enable the userspace daemon for Intel Precise Touch & Stylus.
|
| options/nixos/services.ulogd.enable | Whether to enable ulogd, a userspace logging daemon for netfilter/iptables related logging.
|
| options/nixos/programs.neovim.enable | Whether to enable Neovim
|
| options/home-manager/programs.starship.configPath | Relative path to the user's home directory where the Starship config should be stored.
|
| options/nixos/security.tpm2.abrmd.enable | Whether to enable Trusted Platform 2 userspace resource manager daemon
.
|
| options/nixos/services.jitsi-meet.extraConfig | Text to append to config.js web application config file
|
| options/nixos/services.hledger-web.allow | User's access level for changing data.
- view: view only permission.
- add: view and add permissions.
- edit: view, add, and edit permissions.
- sandstorm: permissions from the
X-Sandstorm-Permissions request header.
|
| options/nixos/services.scx.enable | Whether to enable SCX service, a daemon to run schedulers from userspace.
This service requires a kernel with the Sched-ext feature
|
| options/nixos/services.discourse.admin.fullName | The admin user's full name.
|
| options/nixos/services.webdav.settings | Attrset that is converted and passed as config file
|
| options/nixos/services.tt-rss.database.password | The database user's password.
|
| options/nixos/services.tt-rss.database.passwordFile | The database user's password.
|
| options/nixos/networking.ucarp.enable | Whether to enable ucarp, userspace implementation of CARP.
|
| options/home-manager/programs.obsidian.vaults.<name>.target | Path to target vault relative to the user's HOME.
|
| options/nixos/security.pam.services.<name>.rssh | If set, the calling user's SSH agent is used to authenticate
against the configured keys
|
| options/home-manager/programs.trippy.forceUserConfig | Whatever to force trippy to use user's config through the -c flag
|
| options/nixos/services.davis.adminLogin | Username for the admin account.
|
| options/nixos/security.pam.zfs.homes | Prefix of home datasets
|
| options/nixos/hardware.openrazer.enable | Whether to enable OpenRazer drivers and userspace daemon
.
|
| options/nixos/services.flarum.adminUser | Username for first web application administrator
|
| options/nixos/services.selfoss.database.password | The database user's password (has no effect if type is "sqlite").
|
| options/nixos/services.athens.basicAuthUser | Username for basic auth.
|
| options/nixos/services.resilio.httpLogin | HTTP web login username.
|
| options/nixos/services.xserver.windowManager.exwm.loadScript | Emacs lisp code to be run after loading the user's init
file.
|
| options/home-manager/programs.hexchat.channels.<name>.password | Password to use
|
| options/nixos/services.kmscon.enable | Whether to enable kmscon as the virtual console instead of gettys.
kmscon is a kms/dri-based userspace virtual terminal implementation
|
| options/nixos/services.tee-supplicant.enable | Whether to enable OP-TEE userspace supplicant.
|
| options/nixos/services.hardware.bolt.enable | Whether to enable Bolt, a userspace daemon to enable
security levels for Thunderbolt 3 on GNU/Linux
|
| options/nixos/services.ncdns.enable | Whether to enable ncdns, a Go daemon to bridge Namecoin to DNS
|
| options/nixos/services.discourse.admin.passwordFile | A path to a file containing the admin user's password
|
| options/nixos/security.pam.loginLimits.*.domain | Username, groupname, or wildcard this limit applies to
|
| options/home-manager/programs.hexchat.channels.<name>.loginMethod | The login method
|
| options/nixos/services.mongodb.enableAuth | Enable client authentication
|
| options/nixos/services.nntp-proxy.upstreamUser | Upstream server username
|
| options/nixos/services.sniproxy.config | sniproxy.conf configuration excluding the daemon username and pid file.
|
| options/nixos/nix.sshServe.trusted | Whether to add nix-ssh to the nix.settings.trusted-users
|
| options/nixos/services.esdm.enableLinuxCompatServices | Enable /dev/random, /dev/urandom and /proc/sys/kernel/random/* userspace wrapper.
|
| options/nixos/security.pam.services.<name>.gnupg.enable | If enabled, pam_gnupg will attempt to automatically unlock the
user's GPG keys with the login password via
gpg-agent
|
| options/nixos/services.openssh.authorizedKeysCommand | Specifies a program to be used to look up the user's public
keys
|
| options/home-manager/services.syncthing.settings.folders.<name>.path | The path to the folder which should be shared
|
| options/nixos/services.freshrss.defaultUser | Default username for FreshRSS.
|
| options/nixos/services.tailscale.interfaceName | The interface name for tunnel traffic
|
| options/nixos/services.fcron.deny | Users forbidden from using fcron.
|
| options/nixos/services.displayManager.dms-greeter.configHome | Path to a user's home directory from which to copy DankMaterialShell
configuration files
|
| options/nixos/services.wasabibackend.customConfigFile | Defines the path to a custom configuration file that is copied to the user's directory
|
| options/nixos/services.davis.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.movim.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.slskd.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/hardware.i2c.group | Grant access to i2c devices (/dev/i2c-*) to users in this group.
|
| options/home-manager/programs.zsh.dotDir | Directory where the zsh configuration and more should be located,
relative to the users home directory
|
| options/nixos/services.getty.autologinUser | Username of the account that will be automatically logged in at the console
|
| options/nixos/services.snipe-it.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.resilio.storagePath | Where BitTorrent Sync will store it's database files (containing
things like username info and licenses)
|
| options/nixos/programs.wireshark.enable | Whether to add Wireshark to the global environment and create a 'wireshark'
group
|
| options/nixos/services.logrotate.checkConfig | Whether the config should be checked at build time
|
| options/nixos/services.fluidd.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.akkoma.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.gancio.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.matomo.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.monica.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.incron.deny | Users forbidden from using incrontab.
|
| options/nixos/services.prosody.modules.blocklist | Allow users to block communications with other users
|
| options/nixos/services.kmscon.autologinUser | Username of the account that will be automatically logged in at the console
|
| options/nixos/programs.cdemu.group | Group that users must be in to use cdemu.
|
| options/nixos/services.moodle.virtualHost.enableUserDir | Whether to enable serving ~/public_html as
/~«username».
|
| options/nixos/services.nagios.virtualHost.enableUserDir | Whether to enable serving ~/public_html as
/~«username».
|
| options/nixos/services.grafana.settings.database.password | The database user's password (not applicable for sqlite3)
|
| options/nixos/services.libinput.mouse.buttonMapping | Sets the logical button mapping for this device, see XSetPointerMapping(3)
|
| options/nixos/services.cadvisor.storageDriverUser | Cadvisor storage driver username.
|
| options/home-manager/launchd.agents.<name>.config.InitGroups | This optional key specifies whether initgroups(3) should be called before running the job
|
| options/nixos/programs.wireshark.usbmon.enable | Whether to allow users in the 'wireshark' group to capture USB traffic
|
| options/nixos/programs.wireshark.dumpcap.enable | Whether to allow users in the 'wireshark' group to capture network traffic
|
| options/nixos/services.tor.relay.role | Your role in Tor network
|
| options/nixos/security.pam.services.<name>.limits.*.domain | Username, groupname, or wildcard this limit applies to
|
| options/nixos/services.httpd.virtualHosts.<name>.enableUserDir | Whether to enable serving ~/public_html as
/~«username».
|
| options/nixos/services.znc.confOptions.passBlock | Generate with nix-shell -p znc --command "znc --makepass"
|
| options/nixos/programs.fuse.mountMax | Set the maximum number of FUSE mounts allowed to non-root users.
|
| options/nixos/services.oauth2-proxy.google.adminEmail | The Google Admin to impersonate for API calls
|
| options/nixos/programs.ryzen-monitor-ng.enable | Whether to enable ryzen_monitor_ng, a userspace application for setting and getting Ryzen SMU (System Management Unit) parameters via the ryzen_smu kernel driver
|
| options/nixos/services.syncplay.maxUsernameLength | Maximum number of characters in a username.
|
| options/nixos/services.fcron.allow | Users allowed to use fcrontab and fcrondyn (one name per
line, all for everyone).
|
| options/nixos/services.kanboard.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.librenms.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.dolibarr.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.agorakit.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.fediwall.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.mainsail.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.pixelfed.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.libinput.touchpad.buttonMapping | Sets the logical button mapping for this device, see XSetPointerMapping(3)
|
| options/nixos/services.guix.nrBuildUsers | Number of Guix build users to be used in the build pool.
|
| options/nixos/services.mautrix-meta.instances | Configuration of multiple mautrix-meta instances.
services.mautrix-meta.instances.facebook and services.mautrix-meta.instances.instagram
come preconfigured with network.mode, appservice.id, bot username, display name and avatar.
|
| options/nixos/services.tor.torsocks.socks5Username | SOCKS5 username
|
| options/nixos/services.microsocks.authUsername | Optional username to use for authentication.
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.enableUserDir | Whether to enable serving ~/public_html as
/~«username».
|
| options/nixos/services.radicle.httpd.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/security.sudo.enable | Whether to enable the sudo command, which
allows non-root users to execute commands as root.
|
| options/nixos/security.doas.enable | Whether to enable the doas command, which allows
non-root users to execute commands as root.
|
| options/nixos/services.deye-dummycloud.mqttUsername | MQTT username
|
| options/nixos/services.drupal.sites.<name>.virtualHost.enableUserDir | Whether to enable serving ~/public_html as
/~«username».
|
| options/nixos/services.anuko-time-tracker.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.oauth2-proxy.htpasswd.displayForm | Display username / password login form if an htpasswd file is provided.
|
| options/nixos/services.nginx.virtualHosts.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.warpgate.databaseUrlFile | Path to file containing database connection string with credentials
|
| options/nixos/services.anuko-time-tracker.settings.email.smtpUser | MTA authentication username.
|
| options/nixos/services.ntopng.enable | Enable ntopng, a high-speed web-based traffic analysis and flow
collection tool
|
| options/nixos/security.ipa.shells | List of shells which binaries should be installed to /bin/
|
| options/nixos/programs.ydotool.group | Group which users must be in to use ydotool.
|
| options/nixos/services.syncplay.chat | Chat with users in the same room.
|
| options/nixos/security.pam.services.<name>.googleAuthenticator.forwardPass | The authentication provides a single field requiring
the user's password followed by the one-time password (OTP).
|
| options/nixos/services.bookstack.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.onlyoffice.postgresUser | The username OnlyOffice should use to connect to Postgresql
|
| options/darwin/launchd.agents.<name>.serviceConfig.InitGroups | This optional key specifies whether initgroups(3) should be called before running the job
|
| options/nixos/services.vsftpd.localUsers | Whether to enable FTP for local users.
|
| options/nixos/security.ipa.ifpAllowedUids | A list of users allowed to access the ifp dbus interface.
|
| options/nixos/security.sudo-rs.enable | Whether to enable a memory-safe implementation of the sudo command,
which allows non-root users to execute commands as root
.
|
| options/nixos/hardware.sane.enable | Enable support for SANE scanners.
Users in the "scanner" group will gain access to the scanner, or the "lp" group if it's also a printer.
|
| options/nixos/services.vmagent.remoteWrite.basicAuthUsername | Basic Auth username used to connect to remote_write endpoint
|
| options/nixos/services.vlagent.remoteWrite.basicAuthUsername | Basic Auth username used to connect to remote_write endpoint
|
| options/nixos/services.jirafeau.nginxConfig.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/programs.nix-required-mounts.presets.nvidia-gpu.enable | Whether to enable Declare the support for derivations that require an Nvidia GPU to be
available, e.g. derivations with requiredSystemFeatures = [ "cuda" ]
|
| options/nixos/services.syncplay.ready | Check readiness of users.
|
| options/nixos/services.weblate.smtp.port | SMTP port used when sending emails to users.
|
| options/nixos/services.weblate.smtp.host | SMTP host used when sending emails to users.
|
| options/darwin/system.checks.verifyBuildUsers | Whether to run the Nix build users validation checks.
|
| options/nixos/services.mattermost.database.host | Host to use for the database
|
| options/nixos/services.mediagoblin.enable | Whether to enable MediaGoblin
|
| options/nixos/services.sabnzbd.secretFiles | Path to a list of ini file containing confidential settings such as credentials
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.basicAuthFile | Basic Auth password file for a vhost
|
| options/darwin/launchd.daemons.<name>.serviceConfig.InitGroups | This optional key specifies whether initgroups(3) should be called before running the job
|
| options/nixos/services.firezone.server.smtp.passwordFile | File containing the password for the given username
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.creationDateAttribute | Attribute that lists a user's creation date.
|
| options/nixos/services.pyload.credentialsFile | File containing PYLOAD_DEFAULT_USERNAME and
PYLOAD_DEFAULT_PASSWORD in the format of an EnvironmentFile=,
as described by systemd.exec(5)
|
| options/nixos/security.pam.p11.enable | Enables P11 PAM (pam_p11) module
|
| options/nixos/services.vsftpd.writeEnable | Whether any write activity is permitted to users.
|
| options/nixos/services.postgresql.authentication | Defines how users authenticate themselves to the server
|
| options/darwin/services.postgresql.authentication | Defines how users authenticate themselves to the server
|
| options/nixos/hardware.bladeRF.enable | Enables udev rules for BladeRF devices
|
| options/nixos/services.ombi.enable | Whether to enable Ombi, a web application that automatically gives your shared Plex or
Emby users the ability to request content by themselves!
Optionally see https://docs.ombi.app/info/reverse-proxy
on how to set up a reverse proxy
.
|
| options/darwin/system.defaults.loginwindow.GuestEnabled | Apple menu > System Preferences > Users and Groups > Login Options
Allow users to login to the machine as guests using the Guest account
|
| options/nixos/services.limesurvey.virtualHost.enableUserDir | Whether to enable serving ~/public_html as
/~«username».
|
| options/nixos/services.mediawiki.httpd.virtualHost.enableUserDir | Whether to enable serving ~/public_html as
/~«username».
|
| options/nixos/services.headscale.settings.oidc.allowed_domains | Allowed principal domains. if an authenticated user's domain
is not in this list authentication request will be rejected.
|
| options/nixos/programs.pmount.enable | Whether to enable pmount, a tool that allows normal users to mount removable devices
without requiring root privileges
.
|
| options/nixos/services.tt-rss.auth.autoCreate | Allow authentication modules to auto-create users in tt-rss internal
database when authenticated successfully.
|
| options/nixos/services.davis.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.movim.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.slskd.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.sympa.listMasters | The list of the email addresses of the listmasters
(users authorized to perform global server commands).
|
| options/nixos/services.snipe-it.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.dovecot2.mailGroup | Default group to store mail for virtual users.
|
| options/nixos/services.dawarich.smtp.host | SMTP host used when sending emails to users.
|
| options/nixos/services.dawarich.smtp.port | SMTP port used when sending emails to users.
|
| options/nixos/services.mastodon.smtp.host | SMTP host used when sending emails to users.
|
| options/nixos/services.mastodon.smtp.port | SMTP port used when sending emails to users.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.enableUserDir | Whether to enable serving ~/public_html as
/~«username».
|
| options/nixos/services.matrix-synapse.settings.presence.enabled | Whether to enable presence tracking
|
| options/nixos/security.pam.dp9ik.enable | Whether to enable the dp9ik pam module provided by tlsclient
|
| options/nixos/services.jupyter.group | Name of the group used to run the jupyter service
|
| options/nixos/security.sudo.execWheelOnly | Only allow members of the wheel group to execute sudo by
setting the executable's permissions accordingly
|
| options/nixos/security.pam.howdy.enable | Whether to enable the Howdy PAM module
|
| options/nixos/services.davfs2.davGroup | The group of the running mount.davfs daemon
|
| options/nixos/services.syncplay.motdFile | Path to text to display when users join
|
| options/nixos/services.akkoma.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.fluidd.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.fedimintd.<name>.nginx.config.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.gancio.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.monica.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.matomo.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.zoneminder.database.password | Username for accessing the database
|
| options/nixos/services.mastodon.smtp.authenticate | Authenticate with the SMTP server using username and password.
|
| options/nixos/security.sudo-rs.execWheelOnly | Only allow members of the wheel group to execute sudo by
setting the executable's permissions accordingly
|
| options/nixos/services.sftpgo.loadDataFile | Path to a json file containing users and folders to load (or update) on startup
|
| options/nixos/services.doh-server.settings.log_guessed_client_ip | Enable log IP from HTTPS-reverse proxy header: X-Forwarded-For or X-Real-IP
Note: http uri/useragent log cannot be controlled by this config
|
| options/nixos/services.limesurvey.httpd.virtualHost.enableUserDir | Whether to enable serving ~/public_html as
/~«username».
|
| options/nixos/programs.minipro.enable | Whether to enable minipro and its udev rules
|
| options/nixos/services.mjolnir.pantalaimon.enable | Whether to enable ignoring the accessToken
|
| options/nixos/services.mchprs.settings.chat_format | How to format chat message interpolating username
and message with curly braces
|
| options/nixos/security.duosec.groups | If specified, Duo authentication is required only for users
whose primary group or supplementary group list matches one
of the space-separated pattern lists
|
| options/nixos/services.drupal.sites.<name>.themesDir | The location for users to install Drupal themes.
|
| options/nixos/services.prosody.modules.mam | Store messages in an archive and allow users to access it
|
| options/nixos/services.prosody.modules.motd | Send a message to users when they log in
|
| options/nixos/virtualisation.incus.enable | Whether to enable incusd, a daemon that manages containers and virtual machines
|
| options/nixos/services.prosody.modules.pep | Enables users to publish their mood, activity, playing music and more
|
| options/nixos/services.umami.createPostgresqlDatabase | Whether to automatically create the database for Umami using PostgreSQL
|
| options/nixos/services.victorialogs.basicAuthUsername | Basic Auth username used to protect VictoriaLogs instance by authorization
|
| options/nixos/services.timekpr.adminUsers | All listed users will become part of the timekpr group so they can manage timekpr settings without requiring sudo.
|
| options/nixos/services.syncplay.motd | Text to display when users join
|
| options/nixos/virtualisation.qemu.networkingOptions | Networking-related command-line options that should be passed to qemu
|
| options/nixos/services.prosody.modules.vcard | Allow users to set vCards
|
| options/nixos/services.kea.dhcp6.configFile | Kea DHCP6 configuration as a path, see https://kea.readthedocs.io/en/kea-3.0.2/arm/dhcp6-srv.html
|
| options/nixos/services.kea.dhcp4.configFile | Kea DHCP4 configuration as a path, see https://kea.readthedocs.io/en/kea-3.0.2/arm/dhcp4-srv.html
|
| options/nixos/services.dolibarr.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.kanboard.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.librenms.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.agorakit.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.fediwall.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.mainsail.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.pixelfed.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.hologram-server.ldapBaseDN | The base DN for your Hologram users
|
| options/nixos/services.bitlbee.authBackend | How users are authenticated
storage -- save passwords internally
pam -- Linux PAM authentication
|
| options/nixos/services.alerta.signupEnabled | Whether to prevent sign-up of new users via the web UI
|
| options/nixos/programs.flashrom.enable | Installs flashrom and configures udev rules for programmers
used by flashrom
|
| options/darwin/system.defaults.loginwindow.ShutDownDisabledWhileLoggedIn | Apple menu > System Preferences > Users and Groups > Login Options
Disables the "Shutdown" option when users are logged in
|
| options/nixos/services.limesurvey.nginx.virtualHost.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.drupal.sites.<name>.modulesDir | The location for users to install Drupal modules.
|
| options/nixos/security.pam.services.<name>.unixAuth | Whether users can log in with passwords defined in
/etc/shadow.
|
| options/nixos/services.aria2.enable | Whether or not to enable the headless Aria2 daemon service
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/security.loginDefs.chfnRestrict | Use chfn SUID to allow non-root users to change their account GECOS information.
|
| options/nixos/services.prosody.modules.roster | Allow users to have a roster
|
| options/nixos/services.tt-rss.forceArticlePurge | When this option is not 0, users ability to control feed purging
intervals is disabled and all articles (which are not starred)
older than this amount of days are purged.
|
| options/nixos/services.zeitgeist.enable | Whether to enable zeitgeist, a service which logs the users' activities and events.
|
| options/nixos/services.kea.dhcp-ddns.configFile | Kea DHCP-DDNS configuration as a path, see https://kea.readthedocs.io/en/kea-3.0.2/arm/ddns.html
|
| options/nixos/services.easytier.instances.<name>.configServer | Configure the instance from config server
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.prometheus.remoteRead.*.basic_auth | Sets the Authorization header on every remote read request with the
configured username and password.
password and password_file are mutually exclusive.
|
| options/nixos/services.prometheus.exporters.mqtt.mqttUsername | Username which should be used to authenticate against the MQTT broker.
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/programs.mouse-actions.enable | Whether to install and set up mouse-actions and it's udev rules
|
| options/nixos/services.vsftpd.forceLocalDataSSL | Only applies if sslEnable is true
|
| options/nixos/services.bookstack.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.suwayomi-server.settings.server.basicAuthUsername | The username value that you have to provide when authenticating.
|
| options/nixos/security.pam.krb5.enable | Enables Kerberos PAM modules (pam-krb5,
pam-ccreds)
|
| options/nixos/services.prometheus.remoteWrite.*.basic_auth | Sets the Authorization header on every remote write request with the
configured username and password.
password and password_file are mutually exclusive.
|
| options/darwin/system.defaults.loginwindow.RestartDisabledWhileLoggedIn | Apple menu > System Preferences > Users and Groups > Login Options
Disables the “Restart” option when users are logged in
|
| options/nixos/hardware.acpilight.enable | Enable acpilight
|
| options/nixos/security.pam.services.<name>.mysqlAuth | If set, the pam_mysql module will be used to
authenticate users against a MySQL/MariaDB database.
|
| options/nixos/services.kea.ctrl-agent.configFile | Kea Control Agent configuration as a path, see https://kea.readthedocs.io/en/kea-3.0.2/arm/agent.html
|
| options/nixos/services.pinchflat.secretsFile | Secrets like SECRET_KEY_BASE and BASIC_AUTH_PASSWORD
should be passed to the service without adding them to the world-readable Nix store
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.tailscaleAuth.enable | Whether to enable tailscale.nginx-auth, to authenticate users via tailscale.
|
| options/darwin/system.defaults.loginwindow.SHOWFULLNAME | Apple menu > System Preferences > Users and Groups > Login Options
Displays login window as a name and password field instead of a list of users
|
| options/nixos/services.dawarich.smtp.fromAddress | "From" address used when sending emails to users.
|
| options/nixos/security.pam.services.<name>.makeHomeDir | Whether to try to create home directories for users
with $HOMEs pointing to nonexistent
locations on session login.
|
| options/nixos/services.mastodon.smtp.fromAddress | "From" address used when sending Emails to users.
|
| options/nixos/services.vsftpd.forceLocalLoginsSSL | Only applies if sslEnable is true
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.bepasty.servers.<name>.workDir | Path to the working directory (used for config and pidfile)
|
| options/nixos/services.prosody.modules.welcome | Welcome users who register accounts
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.prometheus.scrapeConfigs.*.basic_auth | Sets the Authorization header on every scrape request with the
configured username and password.
password and password_file are mutually exclusive.
|
| options/nixos/services.displayManager.hiddenUsers | A list of users which will not be shown in the display manager.
|
| options/nixos/security.pam.dp9ik.authserver | This controls the hostname for the 9front authentication server
that users will be authenticated against.
|
| options/nixos/security.pam.services.<name>.yubicoAuth | If set, users listed in
~/.yubico/authorized_yubikeys
are able to log in with the associated Yubikey tokens.
|
| options/nixos/services.portunus.seedSettings | Seed settings for users and groups
|
| options/nixos/services.terraria.enable | If enabled, starts a Terraria server
|
| options/nixos/services.victoriatraces.basicAuthUsername | Basic Auth username used to protect VictoriaTraces instance by authorization
|
| options/nixos/security.pam.services.<name>.ttyAudit.enable | Enable or disable TTY auditing for specified users
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.endpoint | Endpoint IP or hostname of the peer, followed by a colon,
and then a port number of the peer
|
| options/nixos/services.freshrss.api.enable | Whether to enable API access for mobile apps and third-party clients (Google Reader API and Fever API)
|
| options/nixos/programs.soundmodem.enable | Whether to add Soundmodem to the global environment and configure a
wrapper for 'soundmodemconfig' for users in the 'soundmodem' group.
|
| options/nixos/virtualisation.spiceUSBRedirection.enable | Install the SPICE USB redirection helper with setuid
privileges
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/security.pam.loginLimits | Define resource limits that should apply to users or groups
|
| options/nixos/services.prosody.modules.announce | Send announcement to all online users
|
| options/nixos/services.kanidm.provision.enable | Whether to enable provisioning of groups, users and oauth2 resource servers.
|
| options/nixos/services.xserver.imwheel.rules | Window class translation rules.
/etc/X11/imwheelrc is generated based on this config
which means this config is global for all users
|
| options/nixos/services.nextcloud.settings.mail_smtpname | This depends on mail_smtpauth
|
| options/nixos/hardware.libjaylink.enable | Whether to enable udev rules for devices supported by libjaylink
|
| options/nixos/services.nginx.tailscaleAuth.enable | Whether to enable tailscale.nginx-auth, to authenticate nginx users via tailscale.
|
| options/nixos/security.pam.services.<name>.u2fAuth | If set, users listed in
$XDG_CONFIG_HOME/Yubico/u2f_keys (or
$HOME/.config/Yubico/u2f_keys if XDG variable is
not set) are able to log in with the associated U2F key
|
| options/nixos/security.please.wheelNeedsPassword | Whether users of the wheel group must provide a password to run
commands or edit files with please and
pleaseedit respectively.
|
| options/nixos/hardware.keyboard.uhk.enable | Whether to enable non-root access to the firmware of UHK keyboards
|
| options/nixos/services.vsftpd.anonymousMkdirEnable | Whether any uploads are permitted to anonymous users.
|
| options/darwin/environment.shellAliases | An attribute set that maps aliases (the top level attribute names in
this option) to command strings or directly to build outputs
|
| options/nixos/services.biboumi.settings.admin | The bare JID of the gateway administrator
|
| options/nixos/services.tuliprox.apiProxySettings | Users and proxy configuration
Refer to the Tuliprox documentation for available attributes
|
| options/nixos/services.openssh.settings.AllowUsers | If specified, login is allowed only for the listed users
|
| options/nixos/services.prosody.modules.register | Allow users to register on this server using a client and change passwords
|
| options/nixos/services.victoriametrics.basicAuthUsername | Basic Auth username used to protect VictoriaMetrics instance by authorization
|
| options/nixos/security.pam.services.<name>.usshAuth | If set, users with an SSH certificate containing an authorized principal
in their SSH agent are able to log in
|
| options/nixos/services.kubo.settings.Mounts.FuseAllowOther | Allow all users to access the FUSE mount points
|
| options/nixos/services.openssh.settings.LogLevel | Gives the verbosity level that is used when logging messages from sshd(8)
|
| options/nixos/services.openssh.settings.DenyUsers | If specified, login is denied for all listed users
|
| options/nixos/services.cryptpad.settings.adminKeys | List of public signing keys of users that can access the admin panel
|
| options/nixos/environment.shellAliases | An attribute set that maps aliases (the top level attribute names in
this option) to command strings or directly to build outputs
|
| options/nixos/fonts.fontconfig.antialias | Enable font antialiasing
|
| options/nixos/programs.chromium.initialPrefs | Initial preferences are used to configure the browser for the first run
|
| options/nixos/security.pam.services.<name>.howdy.enable | Whether to enable the Howdy PAM module
|
| options/nixos/services.snapper.configs.<name>.ALLOW_USERS | List of users allowed to operate with the config. "root" is always
implicitly included
|
| options/nixos/services.vsftpd.anonymousUploadEnable | Whether any uploads are permitted to anonymous users.
|
| options/nixos/services.vsftpd.chrootlocalUser | Whether local users are confined to their home directory.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/programs.hyprland.withUWSM | Launch Hyprland with the UWSM (Universal Wayland Session Manager) session manager
|
| options/nixos/services.iperf3.authorizedUsersFile | Path to the configuration file containing authorized users credentials to run iperf tests.
|
| options/nixos/services.openssh.settings.AllowGroups | If specified, login is allowed only for users part of the
listed groups
|
| options/nixos/services.buildbot-master.reporters | List of reporter objects used to present build status to various users.
|
| options/nixos/services.openssh.settings.DenyGroups | If specified, login is denied for all users part of the listed
groups
|
| options/nixos/virtualisation.virtualbox.host.enableHardening | Enable hardened VirtualBox, which ensures that only the binaries in the
system path get access to the devices exposed by the kernel modules
instead of all users in the vboxusers group.
Disabling this can put your system's security at risk, as local users
in the vboxusers group can tamper with the VirtualBox device files.
|
| options/nixos/services.movim.minifyStaticFiles | Do minification on public static files which reduces the size of
assets — saving data for the server & users as well as offering a
performance improvement
|
| options/home-manager/accounts.email.accounts.<name>.getmail.readAll | Enable if you want to fetch all, even the read messages from the
server
|
| options/nixos/services.prometheus.exporters.artifactory.artiUsername | Username for authentication against JFrog Artifactory API.
|
| options/nixos/services.gitlab.secrets.jwsFile | A file containing the secret used to encrypt session
keys
|
| options/nixos/services.firezone.gui-client.allowedUsers | All listed users will become part of the firezone-client group so
they can control the tunnel service
|
| options/nixos/system.extraDependencies | A list of paths that should be included in the system
closure but generally not visible to users
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.gitlab.secrets.otpFile | A file containing the secret used to encrypt secrets for OTP
tokens
|
| options/home-manager/accounts.email.accounts.<name>.getmail.delete | Enable if you want to delete read messages from the server
|
| options/nixos/services.cryptpad.settings.httpUnsafeOrigin | This is the URL that users will enter to load your instance
|
| options/nixos/fonts.fontconfig.hinting.enable | Enable font hinting
|
| options/nixos/services.tt-rss.registration.maxUsers | Maximum amount of users which will be allowed to register on this
system. 0 - no limit.
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.persistentKeepalive | This is optional and is by default off, because most
users will not need it
|
| options/nixos/programs._1password-gui.polkitPolicyOwners | A list of users who should be able to integrate 1Password with polkit-based authentication mechanisms.
|
| options/nixos/services.mtprotoproxy.secureOnly | Don't allow users to connect in non-secure mode (without random padding).
|
| options/nixos/services.sourcehut.settings."todo.sr.ht".notify-from | Outgoing email for notifications generated by users.
|
| options/nixos/services.akkoma.config.":pleroma".":frontends" | Frontend configuration
|
| options/nixos/services.ntfy-sh.environmentFile | Path to a file containing extra ntfy environment variables in the systemd EnvironmentFile
format
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.xauth_id | Client XAuth username used in the XAuth exchange.
|
| options/nixos/services.prometheus.remoteRead.*.name | Name of the remote read config, which if specified must be unique among remote read configs
|
| options/nixos/services.sourcehut.settings."lists.sr.ht".notify-from | Outgoing email for notifications generated by users.
|
| options/nixos/services.sourcehut.settings."builds.sr.ht".allow-free | Whether to enable nonpaying users to submit builds.
|
| options/nixos/environment.systemPackages | The set of packages that appear in
/run/current-system/sw
|
| options/darwin/environment.systemPackages | The set of packages that appear in
/run/current-system/sw
|
| options/nixos/services.pgbackrest.repos.<name>.sftp-private-key-file | SFTP private key file
|
| options/nixos/services.prometheus.remoteWrite.*.name | Name of the remote write config, which if specified must be unique among remote write configs
|
| options/nixos/services.sourcehut.settings."todo.sr.ht::mail".sock-group | The lmtp daemon will make the unix socket group-read/write
for users in this group.
|
| options/nixos/services.prometheus.exporters.mail.configuration.servers.*.login | Username to use for SMTP authentication.
|
| options/nixos/services.aria2.downloadDirPermission | The permission for settings.dir
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.persistentKeepalive | This is optional and is by default off, because most
users will not need it
|
| options/nixos/services.syncthing.openDefaultPorts | Whether to open the default ports in the firewall: TCP/UDP 22000 for transfers
and UDP 21027 for discovery
|
| options/nixos/services.zwave-js.secretsConfigFile | JSON file containing secret keys
|
| options/nixos/services.meilisearch.noAnalytics | Deactivates analytics
|
| options/nixos/fonts.fontconfig.subpixel.lcdfilter | FreeType LCD filter
|
| options/nixos/services.spacecookie.settings.log.hide-ips | If enabled, spacecookie will hide personal
information of users like IP addresses from
log output.
|
| options/nixos/services.anuko-time-tracker.settings.multiorgMode | Defines whether users see the Register option in the menu of Time Tracker that allows them
to self-register and create new organizations (top groups).
|
| options/nixos/nix.settings.trusted-substituters | List of binary cache URLs that non-root users can use (in
addition to those specified using
nix.settings.substituters) by passing
--option binary-caches to Nix commands.
|
| options/nixos/services.nginx.tailscaleAuth.expectedTailnet | If you want to prevent node sharing from allowing users to access services
across tailnets, declare your expected tailnets domain here.
|
| options/darwin/nix.settings.trusted-substituters | List of binary cache URLs that non-root users can use (in
addition to those specified using
nix.settings.substituters) by passing
--option binary-caches to Nix commands.
|
| options/nixos/services.paperless.consumptionDirIsPublic | Whether all users can write to the consumption dir.
|
| options/nixos/services.tt-rss.registration.enable | Allow users to register themselves
|
| options/nixos/services.sourcehut.settings."lists.sr.ht::worker".sock-group | The lmtp daemon will make the unix socket group-read/write
for users in this group.
|
| options/nixos/services.hydra.useSubstitutes | Whether to use binary caches for downloading store paths
|
| options/nixos/services.prosody.modules.vcard_legacy | Converts users profiles and Avatars between old and new formats
|
| options/nixos/services.matrix-tuwunel.settings.global.allow_registration | Whether new users can register on this server
|
| options/nixos/boot.initrd.network.ssh.hostKeys | Specify SSH host keys to import into the initrd
|
| options/nixos/documentation.man.man-db.manualPages | The manual pages to generate caches for if documentation.man.generateCaches
is enabled
|
| options/nixos/services.transmission.enable | Whether to enable the headless Transmission BitTorrent daemon
|
| options/darwin/environment.defaultPackages | Set of default packages that aren't strictly necessary
for a running system, entries can be removed for a more
minimal NixOS installation
|
| options/nixos/services.szurubooru.server.settings.secretFile | File containing a secret used to salt the users' password hashes and generate filenames for static content.
|
| options/nixos/services.dependency-track.oidc.teams.default | Defines one or more team names that auto-provisioned OIDC users shall be added to
|
| options/nixos/services.smartd.notifications.wall.enable | Whenever to send wall notifications to all users.
|
| options/nixos/services.prosody.modules.cloud_notify | Push notifications to inform users of new messages or other pertinent information even when they have no XMPP clients online
|
| options/nixos/virtualisation.docker.enable | This option enables docker, a daemon that manages
linux containers
|
| options/nixos/environment.defaultPackages | Set of default packages that aren't strictly necessary
for a running system, entries can be removed for a more
minimal NixOS installation
|
| options/darwin/system.defaults.loginwindow.SleepDisabled | Apple menu > System Preferences > Users and Groups > Login Options
Hides the Sleep button on the login screen
|
| options/nixos/services.dependency-track.frontend.baseUrl | The base URL of the API server
|
| options/darwin/system.defaults.loginwindow.ShutDownDisabled | Apple menu > System Preferences > Users and Groups > Login Options
Hides the Shut Down button on the login screen
|
| options/nixos/virtualisation.lxd.enable | This option enables lxd, a daemon that manages
containers
|
| options/nixos/security.dhparams.params | Diffie-Hellman parameters to generate
|
| options/nixos/services.linkwarden.enableRegistration | Whether to enable registration for new users.
|
| options/nixos/services.pretix.settings.pretix.registration | Whether to allow registration of new admin users.
|
| options/nixos/services.transmission.settings.umask | Sets transmission's file mode creation mask
|
| options/darwin/system.defaults.loginwindow.RestartDisabled | Apple menu > System Preferences > Users and Groups > Login Options
Hides the Restart button on the login screen
|
| options/nixos/environment.corePackages | Set of core packages for a normal interactive system
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.eap.<name>.id | Identity the EAP/XAuth secret belongs to
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ntlm.<name>.id | Identity the NTLM secret belongs to
|
| options/nixos/virtualisation.libvirtd.enable | This option enables libvirtd, a daemon that manages
virtual machines
|
| options/nixos/services.firezone.server.provision.accounts.<name>.actors | All actors (users) to provision
|
| options/nixos/services.taskserver.organisations | An attribute set where the keys name the organisation and the values
are a set of lists of users and
groups.
|
| options/nixos/hardware.display.edid.linuxhw | Exposes EDID files from users-sourced database at https://github.com/linuxhw/EDID
Attribute names will be mapped to EDID filenames <NAME>.bin
|
| options/nixos/services.nullmailer.config.adminaddr | If set, all recipients to users at either "localhost" (the literal string)
or the canonical host name (from the me control attribute) are remapped to this address
|
| options/nixos/services.matrix-continuwuity.settings.global.allow_registration | Whether new users can register on this server
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.largeImport | Enable if you are syncing more than 2000 users/groups.
|
| options/nixos/services.prosody.xmppComplianceSuite | The XEP-0423 defines a set of recommended XEPs to implement
for a server
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.xauth.<name>.id | Identity the EAP/XAuth secret belongs to
|
| options/nixos/services.grafana.settings.server.enable_gzip | Set this option to true to enable HTTP compression, this can improve transfer speed and bandwidth utilization
|
| options/nixos/services.i2pd.precomputation.elgamal | Whenever to use precomputated tables for ElGamal.
i2pd defaults to false
to save 64M of memory (and looses some performance)
|
| options/nixos/services.wstunnel.clients.<name>.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.wstunnel.servers.<name>.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.alerta.authenticationRequired | Whether users must authenticate when using the web UI or command-line tool
|
| options/nixos/services.anubis.defaultOptions.settings.WEBMASTER_EMAIL | If set, shows a contact email address when rendering error pages
|
| options/nixos/services.anubis.instances.<name>.settings.WEBMASTER_EMAIL | If set, shows a contact email address when rendering error pages
|
| options/nixos/services.netbird.server.management.singleAccountModeDomain | Enables single account mode
|
| options/nixos/services.gitea.captcha.requireForExternalRegistration | Displays a CAPTCHA challenge for users that register externally.
|
| options/nixos/networking.networkmanager.enable | Whether to use NetworkManager to obtain an IP address and other
configuration for all network interfaces that are not manually
configured
|
| options/nixos/virtualisation.podman.dockerSocket.enable | Make the Podman socket available in place of the Docker socket, so
Docker tools can find the Podman socket
|
| options/nixos/services.dependency-track.settings."alpine.oidc.teams.default" | Defines one or more team names that auto-provisioned OIDC users shall be added to
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.removeDisabled | Remove users from bitwarden groups if no longer in the ldap group.
|
| options/nixos/security.pam.services.<name>.googleAuthenticator.enable | If set, users with enabled Google Authenticator (created
~/.google_authenticator) will be required
to provide Google Authenticator token to log in.
|
| options/nixos/virtualisation.docker.rootless.setSocketVariable | Point DOCKER_HOST to rootless Docker instance for
normal users by default.
|
| options/nixos/services.umurmur.settings.default_channel | The channel in which users will appear in when connecting.
|
| options/nixos/system.stateVersion | This option defines the first version of NixOS you have installed on this particular machine,
and is used to maintain compatibility with application data (e.g. databases) created on older NixOS versions
|
| options/nixos/services.firezone.server.smtp.configureManually | Outbound email configuration is mandatory for Firezone and supports
many different delivery adapters
|
| options/nixos/security.pam.services.<name>.googleOsLoginAccountVerification | If set, will use the Google OS Login PAM modules
(pam_oslogin_login,
pam_oslogin_admin) to verify possible OS Login
users and set sudoers configuration accordingly
|
| options/nixos/services.warpgate.settings.config_provider | Source of truth of users
|
| options/nixos/services.sourcehut.settings."meta.sr.ht::settings".onboarding-redirect | Where to redirect new users upon registration.
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.domain_id | At most one of domain_id and domain_name must be provided if using username
with Identity V3
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.overwriteExisting | Remove and re-add users/groups, See https://bitwarden.com/help/user-group-filters/#overwriting-syncs for more details.
|
| options/nixos/services.vaultwarden.environmentFile | Additional environment file or files as defined in systemd.exec(5)
|
| options/nixos/virtualisation.lxc.unprivilegedContainers | Whether to enable support for unprivileged users to launch containers.
|
| options/nixos/services.vaultwarden.config | The configuration of vaultwarden is done through environment variables,
therefore it is recommended to use upper snake case (e.g. DISABLE_2FA_REMEMBER)
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.domain_name | At most one of domain_id and domain_name must be provided if using username
with Identity V3
|
| options/nixos/services.bacula-sd.autochanger.<name>.changerCommand | The name-string specifies an external program to be called that will
automatically change volumes as required by Bacula
|
| options/nixos/services.nextcloud.settings.skeletondirectory | The directory where the skeleton files are located
|
| options/nixos/services.grafana.provision.datasources.settings.datasources.*.editable | Allow users to edit datasources from the UI.
|
| options/nixos/services.matrix-conduit.settings.global.allow_registration | Whether new users can register on this server.
|
| options/nixos/services.matrix-synapse.settings.enable_registration | Enable registration for new users.
|
| options/nixos/services.authelia.instances.<name>.settings.default_2fa_method | Default 2FA method for new users and fallback for preferred but disabled methods.
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.readPermissions | The read permissions to include for this token
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.writePermissions | The read permissions to include for this token
|
| packages/nixpkgs/su | Suite containing authentication-related tools such as passwd and su |
| packages/nixpkgs/fex | Fast usermode x86 and x86-64 emulator for Arm64 Linux |
| packages/nixpkgs/fex-headless | Fast usermode x86 and x86-64 emulator for Arm64 Linux |
| packages/nixpkgs/kbibtex | Bibliography editor for KDE |
| packages/nixpkgs/u-root | Fully Go userland with Linux bootloaders |
| packages/nixpkgs/tree-sitter-grammars.tree-sitter-dart | Tree-sitter grammar for dart |
| packages/nixpkgs/tayga | Userland stateless NAT64 daemon |
| packages/nixpkgs/geteltorito | Extract the initial/default boot image from a CD image if existent |
| packages/nixpkgs/zeitgeist | Service which logs the users’s activities and events |
| packages/nixpkgs/ucarp | Userspace implementation of CARP |
| packages/nixpkgs/phpExtensions.apcu | Userland cache for PHP |
| packages/nixpkgs/offensive-azure | Collection of offensive tools targeting Microsoft Azure |
| packages/nixpkgs/php85Extensions.apcu | Userland cache for PHP |
| packages/nixpkgs/php82Extensions.apcu | Userland cache for PHP |
| packages/nixpkgs/php83Extensions.apcu | Userland cache for PHP |
| packages/nixpkgs/php84Extensions.apcu | Userland cache for PHP |
| packages/nixpkgs/php81Extensions.apcu | Userland cache for PHP |
| packages/nixpkgs/ktimetracker | Todo management and time tracking application |
| packages/nixpkgs/systemd | System and service manager for Linux |
| packages/nixpkgs/python313Packages.discum | Discord API Wrapper for Userbots/Selfbots written in Python |
| packages/nixpkgs/python314Packages.discum | Discord API Wrapper for Userbots/Selfbots written in Python |
| packages/nixpkgs/criu | Userspace checkpoint/restore for Linux |
| packages/nixpkgs/systemdUkify | System and service manager for Linux |
| packages/nixpkgs/f2fs-tools | Userland tools for the f2fs filesystem |
| packages/nixpkgs/ssm-session-manager-plugin | Amazon SSM Session Manager Plugin |
| packages/nixpkgs/python312Packages.discum | Discord API Wrapper for Userbots/Selfbots written in Python |
| packages/nixpkgs/majima | Generate random usernames quickly and in various formats |
| packages/nixpkgs/usrsctp | Portable SCTP userland stack |
| packages/nixpkgs/python312Packages.zeitgeist | Service which logs the users’s activities and events |
| packages/nixpkgs/python313Packages.zeitgeist | Service which logs the users’s activities and events |
| packages/nixpkgs/libraspberrypi | Userland tools & libraries for interfacing with Raspberry Pi hardware |
| packages/nixpkgs/python314Packages.zeitgeist | Service which logs the users’s activities and events |
| packages/nixpkgs/mpvScripts.quality-menu | Userscript for MPV that allows you to change youtube video quality (ytdl-format) on the fly |
| packages/nixpkgs/mnc | Opens the user's crontab and echos the time when the next cronjob will be ran |
| packages/nixpkgs/mpvScripts.youtube-upnext | Userscript that allows you to play 'up next'/recommended youtube videos |
| packages/nixpkgs/vdo | Set of userspace tools for managing pools of deduplicated and/or compressed block storage |
| packages/nixpkgs/zfs_2_4 | ZFS Filesystem Linux Userspace Tools |
| packages/nixpkgs/enumerepo | Tool to list all public repositories for (valid) GitHub usernames |
| packages/nixpkgs/umr | Userspace debugging and diagnostic tool for AMD GPUs |
| packages/nixpkgs/python312Packages.moretools | Many more basic tools for python 2/3 extending itertools, functools, operator and collections
|
| packages/nixpkgs/python313Packages.moretools | Many more basic tools for python 2/3 extending itertools, functools, operator and collections
|
| packages/nixpkgs/zfs | ZFS Filesystem Linux Userspace Tools |
| packages/nixpkgs/vimPlugins.nvim-treesitter-parsers.dart | Tree-sitter grammar for dart |
| packages/nixpkgs/asahi-audio | Linux userspace audio configuration for Apple Silicon Macs |
| packages/nixpkgs/ldapnomnom | Tool to anonymously bruteforce usernames from Domain controllers |
| packages/nixpkgs/nullidentdmod | Simple identd that just replies with a random string or customized userid |
| packages/nixpkgs/gnomeExtensions.password-calculator | This extension calculates strong passwords for each alias from your single secret |
| packages/nixpkgs/python313Packages.precis-i18n | Internationalized usernames and passwords |
| packages/nixpkgs/python314Packages.precis-i18n | Internationalized usernames and passwords |
| packages/nixpkgs/ipu6-camera-hal | HAL for processing of images in userspace |
| packages/nixpkgs/lttng-ust | LTTng Userspace Tracer libraries |
| packages/nixpkgs/fsverity-utils | Set of userspace utilities for fs-verity |
| packages/nixpkgs/drbd | Distributed Replicated Block Device, a distributed storage system for Linux (userspace utilities) |
| packages/nixpkgs/acpid | Daemon for delivering ACPI events to userspace programs |
| packages/nixpkgs/ulogd | Userspace logging daemon for netfilter/iptables |
| packages/nixpkgs/python312Packages.precis-i18n | Internationalized usernames and passwords |
| packages/nixpkgs/zfs_2_3 | ZFS Filesystem Linux Userspace Tools |
| packages/nixpkgs/libuiohook | C library to provide global keyboard and mouse hooks from userland |
| packages/nixpkgs/mmc-utils | Configure MMC storage devices from userspace |
| packages/nixpkgs/iptsd | Userspace daemon for Intel Precise Touch & Stylus |
| packages/nixpkgs/libnbd | Network Block Device client library in userspace |
| packages/nixpkgs/ipu6ep-camera-hal | HAL for processing of images in userspace |
| packages/nixpkgs/python312Packages.robotframework-tools | Python Tools for Robot Framework and Test Libraries |
| packages/nixpkgs/python313Packages.robotframework-tools | Python Tools for Robot Framework and Test Libraries |
| packages/nixpkgs/lxc | Userspace tools for Linux Containers, a lightweight virtualization system |
| packages/nixpkgs/lockdep | Userspace locking validation tool built on the Linux kernel |
| packages/nixpkgs/librseq | Userspace library for the Linux Restartable Sequence API |
| packages/nixpkgs/logiops | Unofficial userspace driver for HID++ Logitech devices |
| packages/nixpkgs/lttng-ust_2_12 | LTTng Userspace Tracer libraries |
| packages/nixpkgs/afuse | Automounter in userspace |
| packages/nixpkgs/aefs | Cryptographic filesystem implemented in userspace using FUSE |
| packages/nixpkgs/trickle | Lightweight userspace bandwidth shaper |
| packages/nixpkgs/joycond | Userspace daemon to combine joy-cons from the hid-nintendo kernel driver |
| packages/nixpkgs/ombi | Self-hosted web application that automatically gives your shared Plex or Emby users the ability to request content by themselves |
| packages/nixpkgs/ksmbd-tools | Userspace utilities for the ksmbd kernel SMB server |
| packages/nixpkgs/bridge-utils | Userspace tool to configure linux bridges (deprecated in favour or iproute2) |
| packages/nixpkgs/zfs_unstable | ZFS Filesystem Linux Userspace Tools |
| packages/nixpkgs/u-root-cmds | Fully Go userland with Linux bootloaders |
| packages/nixpkgs/pam-reattach | Reattach to the user's GUI session on macOS during authentication (for Touch ID support in tmux) |
| packages/nixpkgs/xwiimote | Userspace utilities to control connected Nintendo Wii Remotes |
| packages/nixpkgs/linuxPackages.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/ocamlPackages.nbd | Network Block Device client library in userspace |
| packages/nixpkgs/libnftnl | Userspace library providing a low-level netlink API to the in-kernel nf_tables subsystem |
| packages/nixpkgs/libsepol | SELinux binary policy manipulation library |
| packages/nixpkgs/linuxPackages_zen.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxPackages_lqx.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/liburcu | Userspace RCU (read-copy-update) library |
| packages/nixpkgs/sonarr | Smart PVR for newsgroup and bittorrent users |
| packages/nixpkgs/boringtun | Userspace WireGuard® implementation in Rust |
| packages/nixpkgs/can-utils | CAN userspace utilities and tools (for use with Linux SocketCAN) |
| packages/nixpkgs/scx.full | Sched-ext C and Rust userspace schedulers |
| packages/nixpkgs/xprintidle | Utility that queries the X server for the user's idle time and prints it to stdout |
| packages/nixpkgs/libusbgx | C library encapsulating the kernel USB gadget-configfs userspace API functionality |
| packages/nixpkgs/onboard | Onscreen keyboard useful for tablet PC users and for mobility impaired users |
| packages/nixpkgs/liburing | Userspace library for the Linux io_uring API |
| packages/nixpkgs/iw | Tool to use nl80211 |
| packages/nixpkgs/semodule-utils | SELinux policy core utilities (packaging additions) |
| packages/nixpkgs/linuxPackages_latest.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxPackages_xanmod.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/erofs-utils | Userspace utilities for linux-erofs file system |
| packages/nixpkgs/ocamlPackages_latest.nbd | Network Block Device client library in userspace |
| packages/nixpkgs/ipu6epmtl-camera-hal | HAL for processing of images in userspace |
| packages/nixpkgs/maigret | Tool to collect details about an username |
| packages/nixpkgs/perlPackages.LWPxParanoidAgent | Subclass of LWP::UserAgent that protects you from harm |
| packages/nixpkgs/amneziawg-go | Userspace Go implementation of AmneziaWG |
| packages/nixpkgs/wireguard-go | Userspace Go implementation of WireGuard |
| packages/nixpkgs/perl5Packages.LWPxParanoidAgent | Subclass of LWP::UserAgent that protects you from harm |
| packages/nixpkgs/ion3 | Tiling tabbed window manager designed with keyboard users in mind |
| packages/nixpkgs/jami | Free and universal communication platform that respects the privacy and freedoms of its users |
| packages/nixpkgs/kasmweb | Streaming containerized apps and desktops to end-users |
| packages/nixpkgs/perlPackages.LWPProtocolHttps | Provide https support for LWP::UserAgent |
| packages/nixpkgs/perl5Packages.LWPProtocolHttps | Provide https support for LWP::UserAgent |
| packages/nixpkgs/conntrack-tools | Connection tracking userspace tools |
| packages/nixpkgs/python312Packages.libnbd | Network Block Device client library in userspace |
| packages/nixpkgs/libedgetpu | Userspace level runtime driver for Coral devices |
| packages/nixpkgs/gummi | Simple LaTex editor for GTK users |
| packages/nixpkgs/scx.cscheds | Sched-ext C userspace schedulers |
| packages/nixpkgs/rdma-core | RDMA Core Userspace Libraries and Daemons |
| packages/nixpkgs/python313Packages.django-ipware | Django application to retrieve user's IP address |
| packages/nixpkgs/python314Packages.django-ipware | Django application to retrieve user's IP address |
| packages/nixpkgs/exfatprogs | exFAT filesystem userspace utilities |
| packages/nixpkgs/python313Packages.libnbd | Network Block Device client library in userspace |
| packages/nixpkgs/python314Packages.libnbd | Network Block Device client library in userspace |
| packages/nixpkgs/perl540Packages.LWPxParanoidAgent | Subclass of LWP::UserAgent that protects you from harm |
| packages/nixpkgs/perl538Packages.LWPxParanoidAgent | Subclass of LWP::UserAgent that protects you from harm |
| packages/nixpkgs/memtester | Userspace utility for testing the memory subsystem for faults |
| packages/nixpkgs/perl540Packages.LWPProtocolHttps | Provide https support for LWP::UserAgent |
| packages/nixpkgs/perl538Packages.LWPProtocolHttps | Provide https support for LWP::UserAgent |
| packages/nixpkgs/perlPackages.LWPProtocolConnect | Provides HTTP/CONNECT proxy support for LWP::UserAgent |
| packages/nixpkgs/qmk | Program to help users work with QMK Firmware |
| packages/nixpkgs/perl5Packages.LWPProtocolConnect | Provides HTTP/CONNECT proxy support for LWP::UserAgent |
| packages/nixpkgs/logiops_0_2_3 | Unofficial userspace driver for HID++ Logitech devices |
| packages/nixpkgs/python313Packages.ds4drv | Userspace driver for the DualShock 4 controller |
| packages/nixpkgs/python314Packages.ds4drv | Userspace driver for the DualShock 4 controller |
| packages/nixpkgs/dcgm | Data Center GPU Manager (DCGM) is a daemon that allows users to monitor NVIDIA data-center GPUs |
| packages/nixpkgs/sherlock | Hunt down social media accounts by username across social networks |
| packages/nixpkgs/selinux-refpolicy | SELinux Reference Policy v2 |
| packages/nixpkgs/haskellPackages.hatex-guide | HaTeX User's Guide |
| packages/nixpkgs/linuxKernel.packages.linux_5_4.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/libsemanage | Policy management tools for SELinux |
| packages/nixpkgs/fbset | Framebuffer device maintenance program |
| packages/nixpkgs/checkpolicy | SELinux policy compiler |
| packages/nixpkgs/linuxKernel.packages.linux_6_1.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxKernel.packages.linux_6_6.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/python312Packages.django-ipware | Django application to retrieve user's IP address |
| packages/nixpkgs/linuxKernel.packages.linux_zen.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxKernel.packages.linux_lqx.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/perl540Packages.LWPProtocolConnect | Provides HTTP/CONNECT proxy support for LWP::UserAgent |
| packages/nixpkgs/perl538Packages.LWPProtocolConnect | Provides HTTP/CONNECT proxy support for LWP::UserAgent |
| packages/nixpkgs/haskellPackages.editor-open | Open the user's $VISUAL or $EDITOR for text input |
| packages/nixpkgs/kapp | CLI tool that encourages Kubernetes users to manage bulk resources with an application abstraction for grouping |
| packages/nixpkgs/linuxKernel.packages.linux_6_17.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxKernel.packages.linux_5_15.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxKernel.packages.linux_5_10.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxKernel.packages.linux_6_18.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxKernel.packages.linux_6_19.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxKernel.packages.linux_6_12.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/python312Packages.ds4drv | Userspace driver for the DualShock 4 controller |
| packages/nixpkgs/ntfsprogs-plus | NTFS filesystem userspace utilities |
| packages/nixpkgs/cli-tips | CLI tool that provides useful tips and commands for Linux users |
| packages/nixpkgs/libselinux | SELinux core library |
| packages/nixpkgs/chickenPackages_5.chickenEggs.fuse | Filesystems in Userspace |
| packages/nixpkgs/actkbd | Keyboard shortcut daemon |
| packages/nixpkgs/ghorg | Quickly clone an entire org/users repositories into one directory |
| packages/nixpkgs/unix-privesc-check | Find misconfigurations that could allow local unprivilged users to escalate privileges to other users or to access local apps |
| packages/nixpkgs/linuxKernel.packages.linux_libre.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/haskellPackages.ghc-clippy-plugin | Override GHC error messages to the user's liking |
| packages/nixpkgs/gnomeExtensions.auto-accent-colour | Automatically set the GNOME accent colour based on the user's background. |
| packages/nixpkgs/afsctool | Utility that allows end-users to leverage HFS+/APFS compression |
| packages/nixpkgs/scmutils | Scheme library for mathematical physics |
| packages/nixpkgs/tinycompress | Userspace library for anyone who wants to use the ALSA compressed APIs |
| packages/nixpkgs/haskellPackages.uacpid | Userspace Advanced Configuration and Power Interface event daemon |
| packages/nixpkgs/libnfnetlink | Low-level library for netfilter related kernel/userspace communication |
| packages/nixpkgs/tntnet | Web server which allows users to develop web applications using C++ |
| packages/nixpkgs/whisparr | Adult movie collection manager for Usenet and BitTorrent users |
| packages/nixpkgs/linuxKernel.packages.linux_xanmod.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/python312Packages.libselinux | SELinux core library |
| packages/nixpkgs/gotrue | SWT based API for managing users and issuing SWT tokens |
| packages/nixpkgs/linuxPackages_xanmod_stable.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxPackages_xanmod_latest.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxPackages.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxPackages_lqx.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxPackages_zen.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/caribou | Input assistive technology intended for switch and pointer users |
| packages/nixpkgs/socialscan | Python library and CLI for accurately querying username and email usage on online platforms |
| packages/nixpkgs/pam_krb5 | PAM module allowing PAM-aware applications to authenticate users by performing an AS exchange with a Kerberos KDC |
| packages/nixpkgs/perlPackages.CryptRandomTESHA2 | Random numbers using timer/schedule entropy, aka userspace voodoo entropy |
| packages/nixpkgs/scx.rustscheds | Sched-ext Rust userspace schedulers |
| packages/nixpkgs/linuxKernel.packages.linux_hardened.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/perl5Packages.CryptRandomTESHA2 | Random numbers using timer/schedule entropy, aka userspace voodoo entropy |
| packages/nixpkgs/kompose | Tool to help users who are familiar with docker-compose move to Kubernetes |
| packages/nixpkgs/linuxPackages_xanmod.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxPackages_latest.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/sourcegit | Free & OpenSource GUI client for GIT users |
| packages/nixpkgs/mozwire | MozillaVPN configuration manager giving Linux, macOS users (among others), access to MozillaVPN |
| packages/nixpkgs/perlPackages.NetIdent | Lookup the username on the remote end of a TCP/IP connection |
| packages/nixpkgs/python313Packages.libselinux | SELinux core library |
| packages/nixpkgs/python314Packages.libselinux | SELinux core library |
| packages/nixpkgs/perl5Packages.NetIdent | Lookup the username on the remote end of a TCP/IP connection |
| packages/nixpkgs/deepin.deepin-draw | Lightweight drawing tool for users to freely draw and simply edit images |
| packages/nixpkgs/linuxPackages.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/kdePackages.elisa | Simple music player aiming to provide a nice experience for its users |
| packages/nixpkgs/perl540Packages.CryptRandomTESHA2 | Random numbers using timer/schedule entropy, aka userspace voodoo entropy |
| packages/nixpkgs/perl538Packages.CryptRandomTESHA2 | Random numbers using timer/schedule entropy, aka userspace voodoo entropy |
| packages/nixpkgs/stressapptest | Userspace memory and IO stress test tool |
| packages/nixpkgs/speakersafetyd | Userspace daemon that implements the Smart Amp protection model |
| packages/nixpkgs/beanhub-cli | Command line tools for BeanHub or Beancount users |
| packages/nixpkgs/gitlab-pages | Daemon used to serve static websites for GitLab users |
| packages/nixpkgs/gotrue-supabase | JWT based API for managing users and issuing JWT tokens |
| packages/nixpkgs/zeronsd | DNS server for ZeroTier users |
| packages/nixpkgs/filesender | Web application for sending large files to other users |
| packages/nixpkgs/linuxPackages_lqx.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxPackages_zen.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_5_4.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_6_1.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_6_6.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_zen.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_lqx.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/b43Firmware_5_1_138 | Firmware for cards supported by the b43 kernel module |
| packages/nixpkgs/cliquer | Routines for clique searching |
| packages/nixpkgs/elmPackages.elm-review | Analyzes Elm projects, to help find mistakes before your users find them |
| packages/nixpkgs/linuxKernel.packages.linux_6_17.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_5_10.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_6_19.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_6_12.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_5_15.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_6_18.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/perl538Packages.NetIdent | Lookup the username on the remote end of a TCP/IP connection |
| packages/nixpkgs/perl540Packages.NetIdent | Lookup the username on the remote end of a TCP/IP connection |
| packages/nixpkgs/linuxKernel.packages.linux_libre.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/capslock | Capability analysis CLI for Go packages that informs users of which privileged operations a given package can access |
| packages/nixpkgs/luarenamer | Plugin for Shoko that allows users to rename their collection using Lua |
| packages/nixpkgs/ibus-engines.cangjie | IBus engine for users of the Cangjie and Quick input methods |
| packages/nixpkgs/linuxPackages_latest.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxPackages_xanmod.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_6_1_hardened.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxKernel.packages.linux_latest_libre.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/policycoreutils | SELinux policy core utilities |
| packages/nixpkgs/linuxKernel.packages.linux_xanmod.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/acl2 | Interpreter and prover for a Lisp dialect |
| packages/nixpkgs/linuxKernel.packages.linux_5_4_hardened.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxKernel.packages.linux_6_6_hardened.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/b43FirmwareCutter | Firmware extractor for cards supported by the b43 kernel module |
| packages/nixpkgs/python313Packages.socialscan | Python library and CLI for accurately querying username and email usage on online platforms |
| packages/nixpkgs/python314Packages.socialscan | Python library and CLI for accurately querying username and email usage on online platforms |
| packages/nixpkgs/modprobed-db | Useful utility for users wishing to build a minimal kernel via a make localmodconfig |
| packages/nixpkgs/rfkill_udev | Rules+hook for udev to catch rfkill state changes |
| packages/nixpkgs/linuxPackages_xanmod_stable.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxPackages_xanmod_latest.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/python313Packages.pyct | ClI for Python common tasks for users |
| packages/nixpkgs/python314Packages.pyct | ClI for Python common tasks for users |
| packages/nixpkgs/commonsBcel | Gives users a convenient way to analyze, create, and manipulate (binary) Java class files |
| packages/nixpkgs/commons-bcel | Gives users a convenient way to analyze, create, and manipulate (binary) Java class files |
| packages/nixpkgs/drawpile | Collaborative drawing program that allows multiple users to sketch on the same canvas simultaneously |
| packages/nixpkgs/flow-state | Terminal-based habit tracker designed for neurodivergent users |
| packages/nixpkgs/linuxKernel.packages.linux_5_10_hardened.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxKernel.packages.linux_5_15_hardened.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/kdePackages.kactivitymanagerd | System service to manage user's activities, track the usage patterns etc. |
| packages/nixpkgs/sudo-font | Font for programmers and command line users |
| packages/nixpkgs/python313Packages.pesq | PESQ (Perceptual Evaluation of Speech Quality) Wrapper for Python Users |
| packages/nixpkgs/python314Packages.pesq | PESQ (Perceptual Evaluation of Speech Quality) Wrapper for Python Users |
| packages/nixpkgs/linuxKernel.packages.linux_6_12_hardened.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxKernel.packages.linux_xanmod_stable.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxKernel.packages.linux_xanmod_latest.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/libnetfilter_log | Userspace library providing interface to packets that have been logged by the kernel packet filter |
| packages/nixpkgs/linuxKernel.packages.linux_hardened.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/python312Packages.socialscan | Python library and CLI for accurately querying username and email usage on online platforms |
| packages/nixpkgs/antora | Modular documentation site generator |
| packages/nixpkgs/python313Packages.django-crossdomainmedia | Django application to retrieve user's IP address |
| packages/nixpkgs/python314Packages.django-crossdomainmedia | Django application to retrieve user's IP address |
| packages/nixpkgs/python313Packages.i3-py | Tools for i3 users and developers |
| packages/nixpkgs/python314Packages.i3-py | Tools for i3 users and developers |
| packages/nixpkgs/acl2-minimal | Interpreter and prover for a Lisp dialect |
| packages/nixpkgs/libdazzle | Library to delight your users with fancy features |
| packages/nixpkgs/python312Packages.django-crossdomainmedia | Django application to retrieve user's IP address |
| packages/nixpkgs/python312Packages.pyct | ClI for Python common tasks for users |
| packages/nixpkgs/baikal | Lightweight CalDAV+CardDAV server that offers an extensive web interface with easy management of users, address books and calendars |
| packages/nixpkgs/conserver | Application that allows multiple users to watch a serial console at the same time |
| packages/nixpkgs/libnetfilter_acct | Userspace library providing interface to extended accounting infrastructure |
| packages/nixpkgs/python312Packages.pesq | PESQ (Perceptual Evaluation of Speech Quality) Wrapper for Python Users |
| packages/nixpkgs/b43Firmware_6_30_163_46 | Firmware for cards supported by the b43 kernel module |
| packages/nixpkgs/typstPackages.datify_0_1_3 | Datify is a simple date package that allows users to format dates in new ways and addresses the issue of lacking date formats in different languages |
| packages/nixpkgs/typstPackages.datify_0_1_4 | Datify is a simple date package that allows users to format dates in new ways and addresses the issue of lacking date formats in different languages |
| packages/nixpkgs/typstPackages.datify_0_1_1 | Datify is a simple date package that allows users to format dates in new ways and addresses the issue of lacking date formats in different languages |
| packages/nixpkgs/typstPackages.datify_0_1_2 | Datify is a simple date package that allows users to format dates in new ways and addresses the issue of lacking date formats in different languages |
| packages/nixpkgs/linuxKernel.packages.linux_5_4.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_6_6.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_6_1.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/gridcoin-research | POS-based cryptocurrency that rewards users for participating on the BOINC network |
| packages/nixpkgs/sillytavern | LLM Frontend for Power Users |
| packages/nixpkgs/typstPackages.postercise | Postercise allows users to easily create academic research posters with different themes using Typst |
| packages/nixpkgs/linuxKernel.packages.linux_zen.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_lqx.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/python313Packages.msal | Library to access the Microsoft Cloud by supporting authentication of users with Microsoft Azure Active Directory accounts (AAD) and Microsoft Accounts (MSA) using industry standard OAuth2 and OpenID Connect |
| packages/nixpkgs/python314Packages.msal | Library to access the Microsoft Cloud by supporting authentication of users with Microsoft Azure Active Directory accounts (AAD) and Microsoft Accounts (MSA) using industry standard OAuth2 and OpenID Connect |
| packages/nixpkgs/python313Packages.bangla | Bangla is a package for Bangla language users with various functionalities including Bangla date and Bangla numeric conversation |
| packages/nixpkgs/python314Packages.bangla | Bangla is a package for Bangla language users with various functionalities including Bangla date and Bangla numeric conversation |
| packages/nixpkgs/bash-git-prompt | Informative, fancy bash prompt for Git users |
| packages/nixpkgs/tailscale-nginx-auth | Tool that allows users to use Tailscale Whois authentication with NGINX as a reverse proxy |
| packages/nixpkgs/python312Packages.i3-py | Tools for i3 users and developers |
| packages/nixpkgs/linuxKernel.packages.linux_6_17.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_6_19.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_6_18.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_5_15.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_5_10.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_6_12.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/grafanaPlugins.grafana-discourse-datasource | Allows users to search and view topics, posts, users, tags, categories, and reports on a given Discourse forum through Grafana |
| packages/nixpkgs/bashSnippets | Collection of small bash scripts for heavy terminal users |
| packages/nixpkgs/python313Packages.beanhub-cli | Command line tools for BeanHub or Beancount users |
| packages/nixpkgs/linuxKernel.packages.linux_6_6_hardened.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_6_1_hardened.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_latest_libre.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_5_4_hardened.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/libnetfilter_queue | Userspace API to packets queued by the kernel packet filter |
| packages/nixpkgs/python314Packages.beanhub-cli | Command line tools for BeanHub or Beancount users |
| packages/nixpkgs/drawpile-server-headless | Collaborative drawing program that allows multiple users to sketch on the same canvas simultaneously |
| packages/nixpkgs/tt-rss-plugin-auth-ldap | Plugin for TT-RSS to authenticate users via ldap |
| packages/nixpkgs/haskellPackages.alto | Implement a menu experience fit for web users |
| packages/nixpkgs/cudaPackages.cuda_nvprof | Collect and view profiling data from the command-line |
| packages/nixpkgs/python312Packages.msal | Library to access the Microsoft Cloud by supporting authentication of users with Microsoft Azure Active Directory accounts (AAD) and Microsoft Accounts (MSA) using industry standard OAuth2 and OpenID Connect |
| packages/nixpkgs/haskellPackages.path-io | Interface to ‘directory’ package for users of ‘path’ |
| packages/nixpkgs/linuxKernel.packages.linux_5_10_hardened.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_5_15_hardened.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_6_12_hardened.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_xanmod_stable.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_xanmod_latest.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_libre.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/python312Packages.bangla | Bangla is a package for Bangla language users with various functionalities including Bangla date and Bangla numeric conversation |
| packages/nixpkgs/texlivePackages.biber | A BibTeX replacement for users of BibLaTeX |
| packages/nixpkgs/deepin.deepin-calculator | Easy to use calculator for ordinary users |
| packages/nixpkgs/python313Packages.django-filter | Reusable Django application for allowing users to filter querysets dynamically |
| packages/nixpkgs/python314Packages.django-filter | Reusable Django application for allowing users to filter querysets dynamically |
| packages/nixpkgs/docker-credential-gcr | Docker credential helper for GCR (https://gcr.io) users |
| packages/nixpkgs/tailscale-gitops-pusher | Allows users to use a GitOps flow for managing Tailscale ACLs |
| packages/nixpkgs/texlivePackages.biber-ms | A BibTeX replacement for users of BibLaTeX (multiscript version) |
| packages/nixpkgs/tmuxPlugins.tmux-which-key | Tmux plugin that allows users to select actions from a customizable popup menu |
| packages/nixpkgs/python312Packages.beanhub-cli | Command line tools for BeanHub or Beancount users |
| packages/nixpkgs/texlivePackages.engtlc | Support for users in Telecommunications Engineering |
| packages/nixpkgs/texlivePackages.luacas | A computer algebra system for users of LuaLaTeX |
| packages/nixpkgs/haskellPackages.betris | A horizontal version of tetris for braille users |
| packages/nixpkgs/linuxKernel.packages.linux_xanmod.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/haskellPackages.sproxy | HTTP proxy for authenticating users via OAuth2 |
| packages/nixpkgs/gnome-bluetooth_1_0 | Application that let you manage Bluetooth in the GNOME destkop |
| packages/nixpkgs/zsh-completions | Additional completion definitions for zsh |
| packages/nixpkgs/python313Packages.cmdstanpy | Lightweight interface to Stan for Python users |
| packages/nixpkgs/python314Packages.cmdstanpy | Lightweight interface to Stan for Python users |
| packages/nixpkgs/python312Packages.django-filter | Reusable Django application for allowing users to filter querysets dynamically |
| packages/nixpkgs/texlivePackages.xltxtra | "Extras" for LaTeX users of XeTeX |
| packages/nixpkgs/python313Packages.pycognito | Python class to integrate Boto3's Cognito client so it is easy to login users |
| packages/nixpkgs/powerline-fonts | Patched fonts for Powerline users |
| packages/nixpkgs/python314Packages.pycognito | Python class to integrate Boto3's Cognito client so it is easy to login users |
| packages/nixpkgs/linuxPackages_xanmod_latest.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxPackages_xanmod_stable.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/python313Packages.monkeyhex | Small library to assist users of the python shell who work in contexts where printed numbers are more usefully viewed in hexadecimal |
| packages/nixpkgs/python314Packages.monkeyhex | Small library to assist users of the python shell who work in contexts where printed numbers are more usefully viewed in hexadecimal |
| packages/nixpkgs/haskellPackages.sproxy2 | Secure HTTP proxy for authenticating users via OAuth2 |
| packages/nixpkgs/texlivePackages.pm-isomath | Poor man ISO math for pdfLaTeX users |
| packages/nixpkgs/texlivePackages.gustprog | utility programs for Polish users of TeX |
| packages/nixpkgs/haskellPackages.haskell-say | Let the Haskell logo talk to your users! |
| packages/nixpkgs/python313Packages.netbox-reorder-rack | NetBox plugin to allow users to reorder devices within a rack using a drag and drop UI |
| packages/nixpkgs/python314Packages.netbox-reorder-rack | NetBox plugin to allow users to reorder devices within a rack using a drag and drop UI |
| packages/nixpkgs/python312Packages.cmdstanpy | Lightweight interface to Stan for Python users |
| packages/nixpkgs/texlivePackages.penlight | Penlight Lua libraries made available to LuaLaTeX users |
| packages/nixpkgs/linuxKernel.packages.linux_hardened.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/python312Packages.pycognito | Python class to integrate Boto3's Cognito client so it is easy to login users |
| packages/nixpkgs/texlivePackages.latex4wp | A LaTeX guide specifically designed for word processor users |
| packages/nixpkgs/python312Packages.monkeyhex | Small library to assist users of the python shell who work in contexts where printed numbers are more usefully viewed in hexadecimal |
| packages/nixpkgs/texlivePackages.latex4wp-it | LaTeX guide for word processor users, in Italian |
| packages/nixpkgs/texlivePackages.graphics-pln | LaTeX-style graphics for Plain TeX users |
| packages/nixpkgs/zsh-history-substring-search | Fish shell history-substring-search for Zsh |
| packages/nixpkgs/python313Packages.defusedcsv | Python library to protect your users from Excel injections in CSV-format exports, drop-in replacement for standard library's csv module |
| packages/nixpkgs/python314Packages.defusedcsv | Python library to protect your users from Excel injections in CSV-format exports, drop-in replacement for standard library's csv module |
| packages/nixpkgs/koodousfinder | Tool to allows users to search for and analyze Android apps |
| packages/nixpkgs/python312Packages.netbox-reorder-rack | NetBox plugin to allow users to reorder devices within a rack using a drag and drop UI |
| packages/nixpkgs/deadd-notification-center | Haskell-written notification center for users that like a desktop with style |
| packages/nixpkgs/graylogPlugins.aggregates | Plugin that enables users to execute term searches and get notified when the given criteria are met |
| packages/nixpkgs/texlivePackages.etextools | e-TeX tools for LaTeX users and package writers |
| packages/nixpkgs/python313Packages.orbax-checkpoint | Orbax provides common utility libraries for JAX users |
| packages/nixpkgs/python314Packages.orbax-checkpoint | Orbax provides common utility libraries for JAX users |
| packages/nixpkgs/typstPackages.postercise_0_1_0 | Postercise allows users to easily create academic research posters with different themes using Typst |
| packages/nixpkgs/typstPackages.postercise_0_2_0 | Postercise allows users to easily create academic research posters with different themes using Typst |
| packages/nixpkgs/python312Packages.defusedcsv | Python library to protect your users from Excel injections in CSV-format exports, drop-in replacement for standard library's csv module |
| packages/nixpkgs/libnetfilter_cttimeout | Userspace library that provides the programming interface to the connection tracking timeout infrastructure |
| packages/nixpkgs/libnetfilter_conntrack | Userspace library providing an API to the in-kernel connection tracking state table |
| packages/nixpkgs/zsh-syntax-highlighting | Fish shell like syntax highlighting for Zsh |
| packages/nixpkgs/lgogdownloader-gui | Unofficial downloader to GOG.com for Linux users |
| packages/nixpkgs/gnomeExtensions.mumbleping | Displays how many users are currently online on a mumble server |
| packages/nixpkgs/lgogdownloader | Unofficial downloader to GOG.com for Linux users |
| packages/nixpkgs/texlivePackages.ctanupload | Support for users uploading to CTAN |
| packages/nixpkgs/python312Packages.orbax-checkpoint | Orbax provides common utility libraries for JAX users |
| packages/nixpkgs/texlivePackages.expex-glossonly | Help gb4e, linguex, and covington users use the ExPex glossing macros |
| packages/nixpkgs/texlivePackages.biblatex-gb7714-2015 | A BibLaTeX implementation of the GBT7714-2015 bibliography style for Chinese users |
| packages/nixpkgs/gnomeExtensions.browser-switcher | Quick default browser switching from the system panel |
| packages/nixpkgs/pantheon.elementary-onboarding | Onboarding app for new users designed for elementary OS |
| packages/nixpkgs/coreutils | GNU Core Utilities |
| packages/nixpkgs/gnomeExtensions.classic-app-switcher | Classic App Switcher is a Mac OS 9-style application switcher extension for GNOME Shell |
| packages/nixpkgs/coreutils-full | GNU Core Utilities |
| packages/nixpkgs/gnomeExtensions.yaru-automatic-dark-mode | Automatically switches between light and dark versions of the Yaru shell, icon, and GTK themes based on your system's dark mode setting |
| packages/nixpkgs/linuxKernel.packages.linux_5_4_hardened.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_6_6_hardened.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_latest_libre.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_6_1_hardened.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/gnomeExtensions.sevosio-session-switcher | Allows session switching between users |
| packages/nixpkgs/haskellPackages.juandelacosa | Manage users in MariaDB >= 10.1.1 |
| packages/nixpkgs/zsh-autosuggestions | Fish shell autosuggestions for Zsh |
| packages/nixpkgs/linuxKernel.packages.linux_5_10_hardened.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_5_15_hardened.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_xanmod_stable.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_6_12_hardened.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_xanmod_latest.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/vscode-extensions.RoweWilsonFrederiskHolme.wikitext | Extension that helps users view and write MediaWiki's Wikitext files |
| packages/nixpkgs/python313Packages.oauthenticator | Authenticate JupyterHub users with common OAuth providers |
| packages/nixpkgs/python314Packages.oauthenticator | Authenticate JupyterHub users with common OAuth providers |
| packages/nixpkgs/gnomeExtensions.pipewire-airplay-toggle | Quick Setting menu toggle to enable/disable the RAOP Discover Module in PipeWire, allowing users to quickly and easily show or hide their AirPlay enabled speakers |
| packages/nixpkgs/gnomeExtensions.colorblind-filters | Color filters are designed to assist both color-blind users and developers |
| packages/nixpkgs/uutils-coreutils-noprefix | Cross-platform Rust rewrite of the GNU coreutils |
| packages/nixpkgs/python312Packages.oauthenticator | Authenticate JupyterHub users with common OAuth providers |
| packages/nixpkgs/texlivePackages.biblatex-caspervector | A simple citation style for Chinese users |
| packages/nixpkgs/perlPackages.CatalystAuthenticationStoreLDAP | Authenticate Users against LDAP Directories |
| packages/nixpkgs/perl5Packages.CatalystAuthenticationStoreLDAP | Authenticate Users against LDAP Directories |
| packages/nixpkgs/perl540Packages.CatalystAuthenticationStoreLDAP | Authenticate Users against LDAP Directories |
| packages/nixpkgs/perl538Packages.CatalystAuthenticationStoreLDAP | Authenticate Users against LDAP Directories |
| packages/nixpkgs/busybox | Tiny versions of common UNIX utilities in a single small executable |
| packages/nixpkgs/gnomeExtensions.set-monitor-ddc-brightnesscontrast-extra-dimming | Control brightness and contrast with ddc and extra screen dimming with black overlay, It requires ddcutil to be installed, i2c permissions for non-root users configured. |
| packages/nixpkgs/perlPackages.TestLWPUserAgent | LWP::UserAgent suitable for simulating and testing network calls |
| packages/nixpkgs/perl5Packages.TestLWPUserAgent | LWP::UserAgent suitable for simulating and testing network calls |
| packages/nixpkgs/perlPackages.LWPUserAgentCached | LWP::UserAgent with simple caching mechanism |
| packages/nixpkgs/perl5Packages.LWPUserAgentCached | LWP::UserAgent with simple caching mechanism |
| packages/nixpkgs/perl540Packages.TestLWPUserAgent | LWP::UserAgent suitable for simulating and testing network calls |
| packages/nixpkgs/perl538Packages.TestLWPUserAgent | LWP::UserAgent suitable for simulating and testing network calls |
| packages/nixpkgs/perl538Packages.LWPUserAgentCached | LWP::UserAgent with simple caching mechanism |
| packages/nixpkgs/perl540Packages.LWPUserAgentCached | LWP::UserAgent with simple caching mechanism |
| packages/nixpkgs/perlPackages.LWPUserAgentDNSHosts | Override LWP HTTP/HTTPS request's host like /etc/hosts |
| packages/nixpkgs/perl5Packages.LWPUserAgentDNSHosts | Override LWP HTTP/HTTPS request's host like /etc/hosts |
| packages/nixpkgs/perl538Packages.LWPUserAgentDNSHosts | Override LWP HTTP/HTTPS request's host like /etc/hosts |
| packages/nixpkgs/perl540Packages.LWPUserAgentDNSHosts | Override LWP HTTP/HTTPS request's host like /etc/hosts |
| packages/nixpkgs/perlPackages.LWPUserAgentMockable | Permits recording, and later playing back of LWP requests |
| packages/nixpkgs/perl5Packages.LWPUserAgentMockable | Permits recording, and later playing back of LWP requests |
| packages/nixpkgs/perl540Packages.LWPUserAgentMockable | Permits recording, and later playing back of LWP requests |
| packages/nixpkgs/perl538Packages.LWPUserAgentMockable | Permits recording, and later playing back of LWP requests |
| packages/nixpkgs/perlPackages.LWPUserAgentDetermined | Virtual browser that retries errors |
| packages/nixpkgs/perl5Packages.LWPUserAgentDetermined | Virtual browser that retries errors |
| packages/nixpkgs/perl538Packages.LWPUserAgentDetermined | Virtual browser that retries errors |
| packages/nixpkgs/perl540Packages.LWPUserAgentDetermined | Virtual browser that retries errors |
| packages/nur/Emin017.lceda-pro | A browser-based, user-friendly, powerful Electronics Design Automation tool |
| packages/nur/xddxdd.netns-exec | Run command in Linux network namespace as normal user |
| packages/nur/xddxdd.bnxtnvm | Broadcom BNXTNVM utility |
| packages/nur/blemouzy.trigger | Run a user-defined command on file changes |
| packages/nur/shelvacu.swt_4_33 | A widget toolkit for Java to access the user-interface facilities of
the operating systems on which it is implemented.
|
| packages/nur/xyenon.oli | Unified and user-friendly way to manipulate data stored in various storage service |
| packages/nur/lonerOrz.fish | Smart and user-friendly command line shell |
| packages/nur/colinsane.pkgs.rk2aw | rk2aw loader program can be used on various modern Rockchip SoCs to change apparent boot ROM bootloader load order from original and inflexible "SPI NOR flash -> eMMC -> SD card" to "SD card -> eMMC -> SPI NOR flash" and to implement robust, seamless A/B bootloader updates in SPI NOR flash with user selectable fallback (via a pre-boot menu) |
| packages/nur/fym998.bt-dualboot | User-friendly tool making your bluetooth devices working both in Windows and Linux without re-pairing chore |
| packages/nur/renesat.voyage | Voyage is a stateful subdomain enumeration tool that combines passive and active techniques with resumable scans, user-specific databases, and fine-grained control built for efficient, reliable reconnaissance. |
| packages/nur/sikmir.tvision | A modern port of Turbo Vision 2.0, the classical framework for text-based user interfaces |
| packages/nur/sigprof.virt-manager | Desktop user interface for managing virtual machines |
| packages/nur/bandithedoge.blocks | User friendly cross platform modular synth |
| packages/nur/Freed-Wu.undollar | strip the dollar sign from the beginning of the terminal command and an 'unpercentage' is provided for zsh user |
| packages/nur/shados.chromium-launcher | Chromium launcher with support for custom user flags |
| packages/nur/xddxdd.uncategorized.netns-exec | Run command in Linux network namespace as normal user |
| packages/nur/dtomvan.tsodingPackages.fourat | Simple Multi-User Chat |
| packages/nur/colinsane.pkgs.sofia-sip-bc | Open-source SIP User-Agent library, compliant with the IETF RFC3261 specification |
| packages/nur/bandithedoge.winegui | A user-friendly WINE manager |
| packages/nur/shados.systemd-lock-handler | Translates systemd-system lock/sleep signals into systemd-user target activations |
| packages/nur/xddxdd.uncategorized.bnxtnvm | Broadcom BNXTNVM utility |
| packages/nur/rycee.firefox-addons.nopow | Removes annoying Proof-of-Work/PoW captchas by changing the user-agent. |
| packages/nur/shados.urxvtconfig | A graphical user interface tool for configuration of the rxvt-unicode terminal emulator. |
| packages/nur/grafcube.doasedit | Shellscript to edit files that are not in a user-writable location |
| packages/nur/rycee.firefox-addons.edit-with-emacs | Allow user to edit web-page textareas with Emacs (and other editors). |
| packages/nur/rycee.firefox-addons.foxy-gestures | Mouse gestures for Firefox |
| packages/nur/rycee.firefox-addons.pakkujs | 瞬间过滤B站(bilibili.com)刷屏的相似弹幕,还你清爽的弹幕视频体验。
*a tweak for a Chinese website |
| packages/nur/rycee.firefox-addons.spoof-timezone | This extension alters browser timezone to a random or user-defined value. |
| packages/nur/dtomvan.enhancer-for-youtube-bin | Take control of YouTube and boost your user experience! |
| packages/nur/rycee.firefox-addons.snowflake | Help people in censored countries access the Internet without restrictions |
| packages/nur/rycee.firefox-addons.firemonkey | Super Lightweight User Script and Style Manager |
| packages/nur/rycee.firefox-addons.redirector | Automatically redirects to user-defined urls on certain pages |
| packages/nur/rycee.firefox-addons.container-proxy | Allows Firefox user assign different proxies to be used in different containers |
| packages/nur/rycee.firefox-addons.enhancer-for-youtube | Take control of YouTube and boost your user experience! |
| packages/nur/hexadecimalDinosaur.python313Packages.dearpygui | A fast and powerful Graphical User Interface Toolkit for Python with minimal dependencies |
| packages/nur/hexadecimalDinosaur.python312Packages.dearpygui | A fast and powerful Graphical User Interface Toolkit for Python with minimal dependencies |
| packages/nur/rycee.firefox-addons.reddit-moderator-toolbox | This is bundled extension of the /r/toolbox moderator tools for reddit.com
Containing:
Mod Tools Enhanced
Mod Button
Mod Mail Pro
Mod Domain Tagger
Toolbox Notifier
Mod User Notes
Toolbox Config |
| packages/nur/rycee.firefox-addons.facebook-tracking-removal | Removes Ads and the user interaction tracking on Facebook™ |
| packages/nur/rycee.firefox-addons.bulkurlopener | Allows user to open a list of url in one click. |
| packages/nur/rycee.firefox-addons.remove-youtube-s-suggestions | Stop the YouTube rabbit hole |
| packages/nur/rycee.firefox-addons.javascript-restrictor | JShelter controls the APIs provided by the browser |
| packages/nur/ethancedwards8.firefox-addons.enhancer-for-youtube | Take control of YouTube and boost your user experience! |
| packages/nur/rycee.firefox-addons.wikiwand-wikipedia-modernized | AI-driven wiki aggregator created to enhance user experience on Wikipedia by streamlining knowledge consumption |
| packages/nur/lennis-dev.hackit | This is a simple web application that allows users to try and solve a series of challenges |
| packages/nur/sikmir.qute-gemini | A qutebrowser userscripts that allows viewing Gemini pages |
| packages/nur/linyinfeng.canokey-udev-rules | udev rules for CanoKey |
| packages/nur/rycee.firefox-addons.stylus | Redesign your favorite websites with Stylus, an actively developed and community driven userstyles manager |
| packages/nur/xddxdd.uksmd | Userspace KSM helper daemon |
| packages/nur/dtomvan.violentmonkey | Violentmonkey provides userscripts support for browsers |
| packages/nur/rycee.firefox-addons.tampermonkey | Tampermonkey is the world's most popular userscript manager. |
| packages/nur/colinsane.bunpen | userspace sandbox helper |
| packages/nur/rycee.firefox-addons.violentmonkey | Userscript support for browsers, open source. |
| packages/nur/rycee.firefox-addons.protoots | puts pronouns next to usernames on mastodon |
| packages/nur/HeyImKyu.fabric-gray | system trays for everyone ⚡ |
| packages/nur/lonerOrz.fabric-gray | system trays for everyone |
| packages/nur/colinsane.libfuse-sane | provides `mount.fuse3.sane`, which behaves identically to `mount.fuse3` except
it supports an additional mount flag, `-o pass_fuse_fd`.
when mounting with `-o pass_fuse_fd`, `mount.fuse3.sane` opens the `/dev/fuse` device (which requires CAP_SYS_ADMIN),
and then `exec`s the userspace implementation, which inherits this file descriptor.
`mount.fuse3.sane` invokes the userspace implementation with the device argument set to something like `/dev/fd/3`, indicating which fd holds the fuse device.
the aim of this flag is to provide a clear handoff point at which the filesystem may drop CAP_SYS_ADMIN.
in this regard, it's much like `-o drop_privileges`, only it leaves the responsibility for that to the fs impl,
in case the fs needs to preserve _other_ privileges besides CAP_SYS_ADMIN.
|
| packages/nur/lonerOrz.fabric-glace | system glace for everyone |
| packages/nur/xddxdd.uncategorized.uksmd | Userspace KSM helper daemon |
| packages/nur/xddxdd.libnftnl-fullcone | Userspace library providing a low-level netlink API to the in-kernel nf_tables subsystem |
| packages/nur/xddxdd.libcrystalhd | Broadcom Crystal HD Hardware Decoder (BCM70012/70015) userspace library |
| packages/nur/xddxdd.uncategorized.libnftnl-fullcone | Userspace library providing a low-level netlink API to the in-kernel nf_tables subsystem |
| packages/nur/vladexa.SteamTokenDumper | 🔢 Submit users' PICS access tokens to SteamDB |
| packages/nur/xddxdd.uncategorized.libcrystalhd | Broadcom Crystal HD Hardware Decoder (BCM70012/70015) userspace library |
| packages/nur/renesat.tukai | The app provides an interactive typing experience with switchable templates, designed to help users improve their typing speed and accuracy |
| packages/nur/linyinfeng.zeronsd | A DNS server for ZeroTier users |
| packages/nur/codgician.samsung-dc-toolkit-3 | Samsung DC Toolkit is designed to help users with easy-to-use disk management and diagnostic features for server
and data center usage. |
| packages/nur/codgician.samsung-dc-toolkit-2 | Samsung DC Toolkit is designed to help users with easy-to-use disk management and diagnostic features for server
and data center usage. |
| packages/nur/ohheyrj.openaudible | OpenAudible is a cross-platform desktop app that lets Audible users download, convert, and manage their audiobooks in MP3 or M4B formats for offline listening. |
| packages/nur/c2vi.mac-telnet | Open source MAC Telnet client and server for connecting to Mikrotik RouterOS routers and Posix devices using MAC addresses |
| packages/nur/rycee.firefox-addons.maya-light | Soft pastel pink light theme with a few darker Evil maya accents |
| packages/nur/rycee.firefox-addons.passff | Add-on that allows users of the unix password manager 'pass' to access their password store from Firefox |
| packages/nur/rycee.firefox-addons.jabref | Browser extension for users of the bibliographic reference manager JabRef |
| packages/nur/rycee.firefox-addons.about-sync | Show information about Firefox Sync |
| packages/nur/rycee.firefox-addons.binnen-i-be-gone | This add-on likely is only useful for users who speak German or visit German language websites - it will remove so called "Binnen-Is" on webpages. |
| packages/nur/rycee.firefox-addons.metamask | The most secure wallet for crypto, NFTs, and DeFi, trusted by millions of users |
| packages/nur/sikmir.capture2text | Capture2Text enables users to quickly OCR a portion of the screen using a keyboard shortcut |
| packages/nur/kira-bruneau.powertools | Steam Deck power tweaks for power users |
| packages/nur/xeals.koillection | Self-hosted service allowing users to manage any kind of collections |
| packages/nur/rycee.firefox-addons.clearcache | Advanced cache clearing with time periods, current tab filter, and smart notifications |
| packages/nur/meain.firefox-addons.mastodon4-redirect | Redirects users from Mastodon4 supported instances to their home instance |
| packages/nur/rycee.firefox-addons.startpage-private-search | This extension protects users from being tracked while allowing them to search the web in complete private mode. |
| packages/nur/rycee.firefox-addons.flexheaders-alter-http-headers | A lightweight yet powerful extension to modify HTTP headers on the fly |
| packages/nur/dsuetin.firefox.userjs.betterfox | Firefox speed, privacy, and security: a user.js template for configuration |
| packages/nur/xddxdd.qemu-user-static | Generic and open source machine emulator and virtualizer |
| packages/nur/lxl66566.user-startup-rs | Simple cross-platform tool to make your command auto run on startup |
| packages/nur/jonhermansen.user-mode-linux | UML Linux kernel 6.15.6 with hostfs support |
| packages/nur/rycee.firefox-addons.user-agent-string-switcher | Spoof websites trying to gather information about your web navigation—like your browser type and operating system—to deliver distinct content you may not want. |
| packages/nur/xddxdd.uncategorized.qemu-user-static | Generic and open source machine emulator and virtualizer |
| packages/nur/rycee.firefox-addons.userchrome-toggle | This extension allows you to toggle userchrome.css styles on-the-fly with buttons and hotkeys. |
| packages/nur/ataraxiasjel.arkenfox-userjs | Firefox privacy, security and anti-tracking |
| packages/nur/rycee.firefox-addons.userchrome-toggle-extended | This extension allows you to toggle userchrome.css styles on-the-fly with buttons and hotkeys |