| packages/nixpkgs/i3-swallow | Swallow a terminal window in i3wm |
| packages/nixpkgs/rPackages.RMallow | |
| packages/nixpkgs/rPackages.PerMallows | |
| packages/nixpkgs/rPackages.ExtMallows | |
| packages/nixpkgs/gnomeExtensions.allow-locked-remote-desktop | Allow remote desktop connections when the screen is locked |
| packages/nixpkgs/rPackages.BayesMallows | |
| packages/nixpkgs/haskellPackages.forsyde-shallow | ForSyDe's Haskell-embedded Domain Specific Language |
| packages/nixpkgs/python314Packages.flask-allowed-hosts | Flask extension that helps you limit access to your API endpoints |
| packages/nixpkgs/python313Packages.flask-allowed-hosts | Flask extension that helps you limit access to your API endpoints |
| packages/nixpkgs/emacsPackages.halloweenie-theme | |
| packages/nixpkgs/python312Packages.flask-allowed-hosts | Flask extension that helps you limit access to your API endpoints |
| packages/nixpkgs/python313Packages.bleach-allowlist | Curated lists of tags and attributes for sanitizing html |
| packages/nixpkgs/python314Packages.bleach-allowlist | Curated lists of tags and attributes for sanitizing html |
| packages/nixpkgs/python312Packages.bleach-allowlist | Curated lists of tags and attributes for sanitizing html |
| packages/nixpkgs/texlivePackages.halloweenmath | Scary and creepy math symbols with AMS-LaTeX integration |
| packages/nixpkgs/python313Packages.marshmallow | Library for converting complex objects to and from simple Python datatypes |
| packages/nixpkgs/python314Packages.marshmallow | Library for converting complex objects to and from simple Python datatypes |
| packages/nixpkgs/python312Packages.marshmallow | Library for converting complex objects to and from simple Python datatypes |
| packages/nixpkgs/python313Packages.flask-marshmallow | Flask + marshmallow for beautiful APIs |
| packages/nixpkgs/python314Packages.flask-marshmallow | Flask + marshmallow for beautiful APIs |
| packages/nixpkgs/python312Packages.flask-marshmallow | Flask + marshmallow for beautiful APIs |
| packages/nixpkgs/python313Packages.marshmallow-polyfield | Extension to Marshmallow to allow for polymorphic fields |
| packages/nixpkgs/python314Packages.marshmallow-polyfield | Extension to Marshmallow to allow for polymorphic fields |
| packages/nixpkgs/python312Packages.marshmallow-polyfield | Extension to Marshmallow to allow for polymorphic fields |
| packages/nixpkgs/python313Packages.marshmallow-dataclass | Automatic generation of marshmallow schemas from dataclasses |
| packages/nixpkgs/python314Packages.marshmallow-dataclass | Automatic generation of marshmallow schemas from dataclasses |
| packages/nixpkgs/python312Packages.marshmallow-dataclass | Automatic generation of marshmallow schemas from dataclasses |
| packages/nixpkgs/python313Packages.marshmallow-sqlalchemy | SQLAlchemy integration with marshmallow |
| packages/nixpkgs/python314Packages.marshmallow-sqlalchemy | SQLAlchemy integration with marshmallow |
| packages/nixpkgs/python312Packages.marshmallow-sqlalchemy | SQLAlchemy integration with marshmallow |
| packages/nixpkgs/python313Packages.marshmallow-oneofschema | Marshmallow library extension that allows schema (de)multiplexing |
| packages/nixpkgs/python314Packages.marshmallow-oneofschema | Marshmallow library extension that allows schema (de)multiplexing |
| packages/nixpkgs/python312Packages.marshmallow-oneofschema | Marshmallow library extension that allows schema (de)multiplexing |
| options/nixos/services.fcron.allow | Users allowed to use fcrontab and fcrondyn (one name per
line, all for everyone).
|
| options/nixos/services.incron.allow | Users allowed to use incrontab
|
| options/nixos/nix.firewall.allowNonTCPUDP | Whether to allow traffic that is neither TCP nor UDP
|
| options/nixos/services.murmur.allowHtml | Allow HTML in client messages, comments, and channel
descriptions.
|
| options/home-manager/programs.termite.allowBold | Allow the output of bold characters when the bold escape sequence appears.
|
| options/nixos/services.artalk.allowModify | allow Artalk store the settings to config file persistently
|
| options/nixos/services.ncps.cache.allowPutVerb | Whether to enable Whether to allow the PUT verb to push narinfo and nar files directly
to the cache.
.
|
| options/nixos/services.printing.allowFrom | From which hosts to allow unconditional access.
|
| options/nixos/services.physlock.allowAnyUser | Whether to allow any user to lock the screen
|
| options/nixos/nix.firewall.allowLoopback | Whether to allow traffic on the loopback interface
|
| options/nixos/fonts.fontconfig.allowType1 | Allow Type-1 fonts
|
| options/nixos/services.hledger-web.allow | User's access level for changing data.
- view: view only permission.
- add: view and add permissions.
- edit: view, add, and edit permissions.
- sandstorm: permissions from the
X-Sandstorm-Permissions request header.
|
| options/nixos/services.ncps.cache.allowDeleteVerb | Whether to enable Whether to allow the DELETE verb to delete narinfo and nar files from
the cache.
.
|
| options/nixos/boot.zfs.allowHibernation | Allow hibernation support, this may be a unsafe option depending on your
setup
|
| options/darwin/power.sleep.allowSleepByPowerButton | Whether the power button can sleep the computer.
|
| options/nixos/fonts.fontconfig.allowBitmaps | Allow bitmap fonts
|
| options/nixos/networking.dhcpcd.allowSetuid | Whether to relax the security sandbox to allow running setuid
binaries (e.g. sudo) in the dhcpcd hooks.
|
| options/nixos/hardware.cpu.x86.msr.settings.allow-writes | Whether to allow writes to MSRs ("on") or not ("off").
|
| options/nixos/services.nsd.zones.<name>.allowAXFRFallback | If NSD as secondary server should be allowed to AXFR if the primary
server does not allow IXFR.
|
| options/nixos/users.allowNoPasswordLogin | Disable checking that at least the root user or a user in the wheel group can log in using
a password or an SSH key
|
| options/home-manager/services.clipse.allowDuplicates | Allow duplicates
|
| options/nixos/services.openssh.allowSFTP | Whether to enable the SFTP subsystem in the SSH daemon
|
| options/nixos/services.gollum.allowUploads | Enable uploads of external files
|
| options/nixos/services.ncps.cache.lock.allowDegradedMode | Allow falling back to local locks if Redis is unavailable (WARNING:
breaks HA guarantees).
|
| options/nixos/hardware.nvidia.prime.allowExternalGpu | Whether to enable configuring X to allow external NVIDIA GPUs when using Prime [Reverse] sync optimus
.
|
| options/nixos/services.deconz.allowSetSystemTime | Whether to enable setting the system time.
|
| options/nixos/nix.firewall.allowPrivateNetworks | Whether to allow traffic to local networks
|
| options/nixos/services.bind.zones.<name>.allowQuery | List of address ranges allowed to query this zone
|
| options/nixos/services.vsftpd.allowWriteableChroot | Allow the use of writeable root inside chroot().
|
| options/nixos/services.easytier.allowSystemForward | Whether to enable Allow the system to forward packets from easytier
|
| options/nixos/system.autoUpgrade.allowReboot | Reboot the system into the new generation instead of a switch
if the new generation uses a different kernel, kernel modules
or initrd than the booted system
|
| options/nixos/boot.initrd.luks.devices.<name>.allowDiscards | Whether to allow TRIM requests to the underlying device
|
| options/nixos/services.languagetool.allowOrigin | Set the Access-Control-Allow-Origin header in the HTTP response,
used for direct (non-proxy) JavaScript-based access from browsers.
"*" to allow access from all sites.
|
| options/home-manager/programs.gnome-terminal.profile.<name>.allowBold | If true, allow applications in the
terminal to make text boldface.
|
| options/nixos/services.avahi.allowPointToPoint | Whether to use POINTTOPOINT interfaces
|
| options/nixos/services.stargazer.allowCgiUser | When enabled, the stargazer process will be given CAP_SETGID
and CAP_SETUID so that it can run cgi processes as a different
user
|
| options/nixos/services.atd.allowEveryone | Whether to make /var/spool/at{jobs,spool}
writeable by everyone (and sticky)
|
| options/nixos/services.deconz.allowRebootSystem | Whether to enable rebooting the system.
|
| options/home-manager/services.cliphist.allowImages | Store images in clipboard history.
|
| options/nixos/services.mirakurun.allowSmartCardAccess | Install polkit rules to allow Mirakurun to access smart card readers
which is commonly used along with tuner devices.
|
| options/nixos/services.boinc.allowRemoteGuiRpc | If set to true, any remote host can connect to and control this BOINC
client (subject to password authentication)
|
| options/nixos/nix.firewall.allowedTCPPorts | TCP ports to which traffic is allowed
|
| options/nixos/nix.firewall.allowedUDPPorts | UDP ports to which traffic is allowed
|
| options/nixos/services.ghostunnel.servers.<name>.allowCN | Allow client if common name appears in the list.
|
| options/nixos/services.pdns-recursor.api.allowFrom | IP address ranges of clients allowed to make API requests.
|
| options/nixos/services.pdns-recursor.dns.allowFrom | IP address ranges of clients allowed to make DNS queries.
|
| options/nixos/services.ghostunnel.servers.<name>.allowOU | Allow client if organizational unit name appears in the list.
|
| options/nixos/boot.initrd.unl0kr.allowVendorDrivers | Whether to load additional drivers for certain vendors (I
|
| options/nixos/services.ghostunnel.servers.<name>.allowAll | If true, allow all clients, do not check client cert subject.
|
| options/nixos/services.bird-lg.proxy.allowedIPs | List of IPs or networks to allow (default all allowed).
|
| options/nixos/services.ghostunnel.servers.<name>.allowURI | Allow client if URI subject alternative name appears in the list.
|
| options/nixos/services.ghostunnel.servers.<name>.allowDNS | Allow client if DNS subject alternative name appears in the list.
|
| options/nixos/services.gotenberg.downloadFrom.allowList | Allow these URLs to be used in the downloadFrom API field
|
| options/darwin/security.sandbox.profiles.<name>.allowSystemPaths | Whether to allow read access to FHS paths like /etc and /var.
|
| options/nixos/services.inadyn.settings.allow-ipv6 | Whether to get IPv6 addresses from interfaces.
|
| options/nixos/services.namecoind.rpc.allowFrom | List of IP address ranges allowed to use the RPC API
|
| options/nixos/services.nbd.server.exports.<name>.allowAddresses | IPs and subnets that are authorized to connect for this device
|
| options/nixos/services.mediamtx.allowVideoAccess | Whether to enable access to video devices like cameras on the system
.
|
| options/nixos/services.moonraker.allowSystemControl | Whether to allow Moonraker to perform system-level operations
|
| options/nixos/services.prosody.allowRegistration | Allow account creation
|
| options/nixos/services.deconz.allowRestartService | Whether to enable killing/restarting processes.
|
| options/nixos/security.allowUserNamespaces | Whether to allow creation of user namespaces
|
| options/nixos/swapDevices.*.randomEncryption.allowDiscards | Whether to allow TRIM requests to the underlying device
|
| options/nixos/nix.settings.allowed-users | A list of names of users (separated by whitespace) that are
allowed to connect to the Nix daemon
|
| options/darwin/nix.settings.allowed-users | A list of names of users (separated by whitespace) that are
allowed to connect to the Nix daemon
|
| options/nixos/security.pam.services.<name>.allowNullPassword | Whether to allow logging into accounts that have no password
set (i.e., have an empty password field in
/etc/passwd or
/etc/group)
|
| options/nixos/boot.initrd.allowMissingModules | Whether the initrd can be built even though modules listed in
boot.initrd.kernelModules or
boot.initrd.availableKernelModules are missing from
the kernel
|