| options/nixos/services.druid.middleManager.restartIfChanged | Automatically restart the service on config change
|
| options/nixos/services.druid.historical.segmentLocations | Locations where the historical will store its data.
|
| options/nixos/services.druid.historical.segmentLocations.*.path | the path to store the segments
|
| options/nixos/services.mpd.extraConfig | Extra directives added to to the end of MPD's configuration file,
mpd.conf
|
| options/nixos/users.enforceIdUniqueness | Whether to require that no two users/groups share the same uid/gid.
|
| options/nixos/services.fluidd.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| options/nixos/services.druid.historical.restartIfChanged | Automatically restart the service on config change
|
| options/home-manager/services.mpd.extraConfig | Extra directives added to the end of MPD's configuration
file, mpd.conf
|
| options/nixos/services.druid.historical.segmentLocations.*.maxSize | Max size the druid historical can occupy
|
| options/nixos/services.mail.sendmailSetuidWrapper.permissions | The permissions of the wrapper program
|
| options/nixos/services.druid.coordinator.restartIfChanged | Automatically restart the service on config change
|
| options/nixos/virtualisation.fileSystems.<name>.stratis.poolUuid | UUID of the stratis pool that the fs is located in
This is only relevant if you are using stratis.
|
| options/nixos/services.druid.historical.segmentLocations.*.freeSpacePercent | Druid Historical will fail to write if it exceeds this value
|
| options/nixos/services.fluidd.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| options/nixos/services.fluidd.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| options/nixos/services.mollysocket.settings.allowed_uuids | UUIDs of Signal accounts that may use this server
|
| packages/nixpkgs/pius | PGP Individual UID Signer (PIUS), quickly and easily sign UIDs on a set of PGP keys |
| options/nixos/services.mail.sendmailSetuidWrapper.capabilities | A comma-separated list of capability clauses to be given to the
wrapper program
|
| options/nixos/services.userborn.static | Whether to generate the password files at build time and store them directly
in the system closure, without requiring any services at boot time
|
| options/nixos/networking.networkmanager.ensureProfiles.secrets.entries.*.matchUuid | UUID of the connection profile
UUIDs are assigned once on connection creation and should never change as long as the connection still applies to the same network.
|
| options/nixos/services.firefox-syncserver.enable | Whether to enable the Firefox Sync storage service
|
| options/nixos/services.chhoto-url.settings.try_longer_slugs | Whether to try a longer UID upon collision.
|
| options/nixos/virtualisation.oci-containers.containers.<name>.user | Override the username or UID (and optionally groupname or GID) used
in the container.
|
| options/nixos/virtualisation.sharedDirectories.<name>.securityModel | The security model to use for this share:
passthrough: files are stored using the same credentials as they are created on the guest (this requires QEMU to run as root)
mapped-xattr: some of the file attributes like uid, gid, mode bits and link target are stored as file attributes
mapped-file: the attributes are stored in the hidden .virtfs_metadata directory
|
| packages/nixpkgs/resolv_wrapper | Wrapper for the user, group and hosts NSS API |
| packages/nixpkgs/haskellPackages.snowchecked | A checksummed variation on Twitter's Snowflake UID generation algorithm |
| options/nixos/services.filesender.settings.admin | UIDs (as per the configured saml_uid_attribute) of FileSender administrators
|
| options/nixos/security.isolate.firstUid | Start of block of UIDs reserved for sandboxes.
|
| options/nixos/security.doas.extraRules.*.users | The usernames / UIDs this rule should apply for.
|
| options/nixos/security.sudo.extraRules.*.users | The usernames / UIDs this rule should apply for.
|
| options/nixos/security.sudo-rs.extraRules.*.users | The usernames / UIDs this rule should apply for.
|
| options/nixos/security.isolate.numBoxes | Number of UIDs and GIDs to reserve, starting from
firstUid and firstGid.
|
| options/nixos/services.geoclue2.appConfig.<name>.users | List of UIDs of all users for which this application is allowed location
info access, Defaults to an empty string to allow it for all users.
|
| options/nixos/programs.benchexec.users | Users that intend to use BenchExec
|
| options/nixos/services.grafana.provision.alerting.rules.settings.deleteRules | List of alert rule UIDs that should be deleted.
|
| options/nixos/services.grafana.provision.alerting.templates.settings.deleteTemplates | List of alert rule UIDs that should be deleted.
|
| packages/nixpkgs/wayvr | Your way to enjoy VR on Linux! Access your Wayland/X11 desktop from SteamVR/Monado (OpenVR+OpenXR support) |
| packages/nur/nagy.ksuid | K-Sortable Globally Unique IDs |
| packages/nur/sikmir.chasquid | SMTP (email) server with a focus on simplicity, security, and ease of operation |
| packages/nur/ataraxiasjel.json-liquid-rs | Process structured JSON values for Liquid templates |
| packages/nur/jleightcap.cpuid2cpuflags | CPU_FLAGS_* generator |