| options/home-manager/xsession.windowManager.bspwm.rules.<name>.layer | The layer where a new window should spawn.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.focus | Whether the node should gain focus on creation.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.splitDir | The direction where the container is going to be split.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.border | Whether the node should have border.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.hidden | Whether the node should occupy any space.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.follow | Whether focus should follow the node when it is moved.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.sticky | Whether the node should stay on the focused desktop.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.marked | Whether the node will be marked for deferred actions.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.locked | Whether the node should ignore node --close
messages.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.center | Whether the node will be put in the center, in floating mode.
|
| options/home-manager/services.xsuspender.rules.<name>.resumeFor | Resume duration in seconds.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.monitor | The monitor where the rule should be applied.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.desktop | The desktop where the rule should be applied.
|
| packages/nixpkgs/perlPackages.XMLRules | Parse XML and specify what and how to keep/process for individual tags |
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.splitRatio | The ratio between the new window and the previous existing window in
the desktop.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.private | Whether the node should stay in the same tiling position and size.
|
| packages/nixpkgs/perl5Packages.XMLRules | Parse XML and specify what and how to keep/process for individual tags |
| options/home-manager/xsession.windowManager.herbstluftwm.rules | Herbstluftwm rules.
|
| options/home-manager/services.xsuspender.rules.<name>.resumeEvery | Resume interval in seconds.
|
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.manage | Whether the window should be managed by bspwm
|
| options/home-manager/services.xsuspender.rules.<name>.execResume | Before resuming, execute this shell script
|
| options/nixos/services.grafana.provision.alerting.rules.path | Path to YAML rules configuration
|
| options/home-manager/services.xsuspender.rules.<name>.autoSuspendOnBattery | Whether to auto-apply rules when switching to battery
power even if the window(s) didn't just lose focus.
|
| options/nixos/services.ndppd.proxies.<name>.rules.<name>.interface | Interface to use when method is iface.
|
| options/home-manager/services.xsuspender.rules.<name>.onlyOnBattery | Whether to enable process suspend only on battery.
|
| options/home-manager/services.xsuspender.rules.<name>.execSuspend | Before suspending, execute this shell script
|
| options/nixos/services.ndppd.proxies.<name>.rules.<name>.method | static: Immediately answer any Neighbor Solicitation Messages
(if they match the IP rule).
iface: Forward the Neighbor Solicitation Message through the specified
interface and only respond if a matching Neighbor Advertisement
Message is received.
auto: Same as iface, but instead of manually specifying the outgoing
interface, check for a matching route in /proc/net/ipv6_route.
|
| options/home-manager/services.xsuspender.rules.<name>.suspendDelay | Initial suspend delay in seconds.
|
| options/home-manager/services.xsuspender.rules.<name>.sendSignals | Whether to send SIGSTOP / SIGCONT signals or not
|
| packages/nixpkgs/haskellPackages.Nomyx-Rules | Language to express rules for Nomic |
| options/home-manager/xsession.windowManager.bspwm.rules.<name>.rectangle | The node's geometry, in the format WxH+X+Y.
|
| options/nixos/services.grafana.provision.alerting.rules.settings | Grafana rules configuration in Nix
|
| options/nixos/services.networkd-dispatcher.rules.<name>.script | Shell commands executed on specified operational states.
|
| options/home-manager/services.xsuspender.rules.<name>.matchWmNameContains | Match windows where wm name contains string.
|
| options/nixos/services.opengfw.settings.ruleset | The path to load specific local geoip/geosite db files
|
| options/nixos/services.networkd-dispatcher.rules.<name>.onState | List of names of the systemd-networkd operational states which
should trigger the script
|
| options/home-manager/services.xsuspender.rules.<name>.matchWmClassContains | Match windows that wm class contains string.
|
| options/home-manager/services.xsuspender.rules.<name>.matchWmClassGroupContains | Match windows where wm class group contains string.
|
| options/home-manager/services.xsuspender.rules.<name>.suspendSubtreePattern | Also suspend descendant processes that match this regex.
|
| options/home-manager/services.xsuspender.rules.<name>.downclockOnBattery | Limit CPU consumption for this factor when on battery power
|
| options/nixos/networking.nftables.rulesetFile | The ruleset file to be used with nftables
|
| options/nixos/services.grafana.provision.alerting.rules.settings.groups | List of rule groups to import or update.
|
| options/nixos/services.grafana.provision.alerting.rules.settings.groups.*.name | Name of the rule group
|
| options/nixos/services.grafana.provision.alerting.rules.settings.apiVersion | Config file version.
|
| packages/nixpkgs/perl538Packages.XMLRules | Parse XML and specify what and how to keep/process for individual tags |
| packages/nixpkgs/perl540Packages.XMLRules | Parse XML and specify what and how to keep/process for individual tags |
| options/nixos/services.grafana.provision.alerting.rules.settings.deleteRules | List of alert rule UIDs that should be deleted.
|
| options/nixos/services.grafana.provision.alerting.rules.settings.deleteRules.*.uid | Unique identifier for the rule
|
| options/nixos/services.anubis.defaultOptions.policy.extraBots | Additional bot rules appended to the policy
|
| options/nixos/services.grafana.provision.alerting.rules.settings.deleteRules.*.orgId | Organization ID, default = 1
|
| options/nixos/services.anubis.instances.<name>.policy.extraBots | Additional bot rules appended to the policy
|
| options/nixos/services.grafana.provision.alerting.rules.settings.groups.*.folder | Name of the folder the rule group will be stored in
|
| options/nixos/services.firewalld.settings.LogDenied | Add logging rules right before reject and drop rules in the INPUT, FORWARD and OUTPUT chains for the default rules and also final reject and drop rules in zones for the configured link-layer packet type.
|
| options/nixos/services.udev.extraRules | Additional udev rules
|
| options/nixos/services.grafana.provision.alerting.rules.settings.groups.*.interval | Interval that the rule group should be evaluated at
|
| options/nixos/services.opengfw.settings.ruleset.geoip | Path to geoip.dat.
|
| options/nixos/networking.nftables.ruleset | The ruleset to be used with nftables
|
| options/nixos/programs.pay-respects.runtimeRules | List of rules to be added to /etc/xdg/pay-respects/rules.
pay-respects will read the contents of these generated rules to recommend command corrections
|
| options/nixos/security.sudo.extraRules | Define specific rules to be in the sudoers file
|
| options/nixos/services.opengfw.settings.ruleset.geosite | Path to geosite.dat.
|
| options/nixos/security.sudo-rs.extraRules | Define specific rules to be in the sudoers file
|
| options/nixos/services.mediatomb.openFirewall | If false (the default), this is up to the user to declare the firewall rules
|
| options/nixos/security.doas.extraRules | Define specific rules to be set in the
/etc/doas.conf file
|
| options/nixos/services.vmalert.instances.<name>.settings.rule | Path to the files with alerting and/or recording rules.
|
| options/nixos/services.vmalert.settings.rule | Path to the files with alerting and/or recording rules.
Consider using the services.vmalert.rules option as a convenient alternative for declaring rules
directly in the nix language.
|
| packages/nixpkgs/udevCheckHook | Check validity of udev rules in outputs |
| packages/nixpkgs/karing | Simple & Powerful proxy utility, Support routing rules for clash/sing-box |
| options/nixos/services.thanos.query.query.replica-labels | Labels to treat as a replica indicator along which data is
deduplicated
|
| packages/nixpkgs/cuyo | Stacking blocks game, with different rules for each level |
| options/nixos/systemd.tmpfiles.packages | List of packages containing systemd-tmpfiles rules
|
| options/nixos/hardware.uni-sync.enable | Whether to enable udev rules and software for Lian Li Uni Controllers.
|
| options/nixos/services.udev.path | Packages added to the PATH environment variable when
executing programs from Udev rules.
coreutils, gnu{sed,grep}, util-linux and config.systemd.package are
automatically included.
|
| packages/nixpkgs/forge-mtg | Magic: the Gathering card game with rules enforcement |
| options/nixos/hardware.ledger.enable | Whether to enable udev rules for Ledger devices.
|
| options/nixos/power.ups.schedulerRules | File which contains the rules to handle UPS events.
|
| packages/nixpkgs/fishPlugins.fifc | Fzf powers on top of fish completion engine and allows customizable completion rules |
| options/nixos/services.crowdsec.hub | Hub collections, parsers, AppSec rules, etc.
|
| options/nixos/services.lvm.enable | Whether to enable lvm2.
The lvm2 package contains device-mapper udev rules and without those tools like cryptsetup do not fully function!
|
| options/nixos/services.cloudflared.tunnels.<name>.ingress | Ingress rules
|
| options/nixos/programs.light.enable | Whether to install Light backlight control command
and udev rules granting access to members of the "video" group.
|
| options/nixos/hardware.nfc-nci.enable | Whether to enable PN5xx kernel module with udev rules, libnfc-nci userland, and optional ifdnfc-nci PC/SC driver.
|
| options/nixos/services.picom.wintypes | Rules for specific window types.
|
| options/nixos/services.ndppd.network | Network that we proxy.
(Legacy option, use services.ndppd.proxies.<interface>.rules.<network> instead)
|
| options/home-manager/services.picom.wintypes | Rules for specific window types.
|
| options/nixos/hardware.libftdi.enable | Whether to enable udev rules for devices supported by libftdi.
|
| options/nixos/services.ferm.enable | Whether to enable Ferm Firewall.
Warning: Enabling this service WILL disable the existing NixOS
firewall! Default firewall rules provided by packages are not
considered at the moment.
|
| options/nixos/services.ndppd.proxies | This sets up a listener, that will listen for any Neighbor Solicitation
messages, and respond to them according to a set of rules.
|
| options/nixos/services.miredo.bindPort | Depending on the local firewall/NAT rules, you might need to force
Miredo to use a fixed UDP port and or IPv4 address.
|
| packages/nixpkgs/yarGen | Generator for YARA rules |
| options/nixos/services.udev.packages | List of packages containing udev rules
|
| options/nixos/services.postgresql.authentication | Defines how users authenticate themselves to the server
|
| options/darwin/services.postgresql.authentication | Defines how users authenticate themselves to the server
|
| options/nixos/hardware.bladeRF.enable | Enables udev rules for BladeRF devices
|
| options/nixos/hardware.saleae-logic.enable | Whether to enable udev rules for Saleae Logic devices.
|
| options/nixos/services.ananicy.extraRules | Rules to write in 'nixRules.rules'
|
| options/nixos/hardware.cpu.x86.msr.enable | Whether to enable the msr (Model-Specific Registers) kernel module and configure udev rules for its devices (usually /dev/cpu/*/msr).
|
| options/nixos/security.polkit.extraConfig | Any polkit rules to be added to config (in JavaScript ;-)
|
| options/nixos/services.picom.opacityRules | Rules that control the opacity of windows, in format PERCENT:PATTERN.
|
| options/home-manager/services.picom.opacityRules | Rules that control the opacity of windows, in format PERCENT:PATTERN.
|
| options/nixos/services.openssh.authorizedKeysFiles | Specify the rules for which files to read on the host
|