+2
-2
lib/default.nix
+2
-2
lib/default.nix
···
···
+19
-5
lib/options.nix
+19
-5
lib/options.nix
······
······+literalExample = lib.warn "literalExample is deprecated, use literalExpression instead, or use literalDocBook for a non-Nix description." literalExpression;
+10
nixos/doc/manual/development/option-declarations.section.md
+10
nixos/doc/manual/development/option-declarations.section.md
···
+19
-1
nixos/doc/manual/from_md/development/option-declarations.section.xml
+19
-1
nixos/doc/manual/from_md/development/option-declarations.section.xml
···
+28
-18
nixos/lib/make-options-doc/options-to-docbook.xsl
+28
-18
nixos/lib/make-options-doc/options-to-docbook.xsl
······-<xsl:when test="attr[@name = 'example']/attrs[attr[@name = '_type' and string[@value = 'literalExample']]]">-<programlisting><xsl:value-of select="attr[@name = 'example']/attrs/attr[@name = 'text']/string/@value" /></programlisting>···-</xsl:text><xsl:value-of select='str:replace(string/@value, "${", "''${")' /><xsl:text>''</xsl:text></programlisting>···<xsl:when test="(contains(@value, '"') or contains(@value, '\')) and not(contains(@value, '
'))">-<xsl:text>''</xsl:text><xsl:value-of select='str:replace(@value, "${", "''${")' /><xsl:text>''</xsl:text>-<xsl:text>"</xsl:text><xsl:value-of select="str:replace(str:replace(str:replace(str:replace(@value, '\', '\\'), '"', '\"'), '
', '\n'), '$', '\$')" /><xsl:text>"</xsl:text>···
·········+<xsl:template match="attrs[attr[@name = '_type' and string[@value = 'literalExpression']]]" mode = "top">+<xsl:template match="attrs[attr[@name = '_type' and string[@value = 'literalDocBook']]]" mode = "top">+<xsl:value-of select='str:replace(str:replace(@value, "''", "'''"), "${", "''${")' />···<xsl:when test="(contains(@value, '"') or contains(@value, '\')) and not(contains(@value, '
'))">+<xsl:text>''</xsl:text><xsl:value-of select='str:replace(str:replace(@value, "''", "'''"), "${", "''${")' /><xsl:text>''</xsl:text>+<xsl:text>"</xsl:text><xsl:value-of select="str:replace(str:replace(str:replace(str:replace(@value, '\', '\\'), '"', '\"'), '
', '\n'), '${', '\${')" /><xsl:text>"</xsl:text>···
+1
-1
nixos/maintainers/scripts/ec2/amazon-image.nix
+1
-1
nixos/maintainers/scripts/ec2/amazon-image.nix
+1
-1
nixos/modules/config/fonts/fonts.nix
+1
-1
nixos/modules/config/fonts/fonts.nix
+1
-1
nixos/modules/config/i18n.nix
+1
-1
nixos/modules/config/i18n.nix
+8
-8
nixos/modules/config/krb5/default.nix
+8
-8
nixos/modules/config/krb5/default.nix
·····················
·····················
+3
-3
nixos/modules/config/networking.nix
+3
-3
nixos/modules/config/networking.nix
······-example = lib.literalExample ''[ "''${pkgs.my-blocklist-package}/share/my-blocklist/hosts" ]'';
······+defaultText = literalDocBook "Hosts from <option>networking.hosts</option> and <option>networking.extraHosts</option>";
+2
-2
nixos/modules/config/power-management.nix
+2
-2
nixos/modules/config/power-management.nix
······
······
+5
-5
nixos/modules/config/pulseaudio.nix
+5
-5
nixos/modules/config/pulseaudio.nix
············
············
+3
-5
nixos/modules/config/shells-environment.nix
+3
-5
nixos/modules/config/shells-environment.nix
······
······
+1
-1
nixos/modules/config/sysctl.nix
+1
-1
nixos/modules/config/sysctl.nix
+3
-3
nixos/modules/config/system-path.nix
+3
-3
nixos/modules/config/system-path.nix
······
······
+1
-1
nixos/modules/config/unix-odbc-drivers.nix
+1
-1
nixos/modules/config/unix-odbc-drivers.nix
···
···
+3
-3
nixos/modules/config/users-groups.nix
+3
-3
nixos/modules/config/users-groups.nix
······
······
+1
-1
nixos/modules/config/xdg/portals/wlr.nix
+1
-1
nixos/modules/config/xdg/portals/wlr.nix
+1
-1
nixos/modules/hardware/ckb-next.nix
+1
-1
nixos/modules/hardware/ckb-next.nix
+5
-5
nixos/modules/hardware/device-tree.nix
+5
-5
nixos/modules/hardware/device-tree.nix
············
············
+1
-1
nixos/modules/hardware/digitalbitbox.nix
+1
-1
nixos/modules/hardware/digitalbitbox.nix
+2
-2
nixos/modules/hardware/opengl.nix
+2
-2
nixos/modules/hardware/opengl.nix
······
······+example = literalExpression "with pkgs.pkgsi686Linux; [ vaapiIntel libvdpau-va-gl vaapiVdpau ]";
+1
-1
nixos/modules/hardware/opentabletdriver.nix
+1
-1
nixos/modules/hardware/opentabletdriver.nix
+4
-4
nixos/modules/hardware/printers.nix
+4
-4
nixos/modules/hardware/printers.nix
······-gutenprint.''${lib.versions.majorMinor (lib.getVersion pkgs.gutenprint)}://brother-hl-5140/expert
······+"gutenprint.''${lib.versions.majorMinor (lib.getVersion pkgs.gutenprint)}://brother-hl-5140/expert"
+1
-1
nixos/modules/hardware/sata.nix
+1
-1
nixos/modules/hardware/sata.nix
+2
-2
nixos/modules/hardware/video/nvidia.nix
+2
-2
nixos/modules/hardware/video/nvidia.nix
···
···
+1
-1
nixos/modules/hardware/video/uvcvideo/default.nix
+1
-1
nixos/modules/hardware/video/uvcvideo/default.nix
+1
-1
nixos/modules/i18n/input-method/fcitx.nix
+1
-1
nixos/modules/i18n/input-method/fcitx.nix
+1
-1
nixos/modules/i18n/input-method/fcitx5.nix
+1
-1
nixos/modules/i18n/input-method/fcitx5.nix
+2
-2
nixos/modules/i18n/input-method/ibus.nix
+2
-2
nixos/modules/i18n/input-method/ibus.nix
······-example = literalExample "''${pkgs.plasma5Packages.plasma-desktop}/lib/libexec/kimpanel-ibus-panel";
······+example = literalExpression ''"''${pkgs.plasma5Packages.plasma-desktop}/lib/libexec/kimpanel-ibus-panel"'';
+1
-1
nixos/modules/i18n/input-method/kime.nix
+1
-1
nixos/modules/i18n/input-method/kime.nix
+2
-2
nixos/modules/installer/cd-dvd/iso-image.nix
+2
-2
nixos/modules/installer/cd-dvd/iso-image.nix
······
······
+2
-2
nixos/modules/installer/cd-dvd/system-tarball.nix
+2
-2
nixos/modules/installer/cd-dvd/system-tarball.nix
······
······
+1
-1
nixos/modules/installer/netboot/netboot.nix
+1
-1
nixos/modules/installer/netboot/netboot.nix
+4
-4
nixos/modules/installer/sd-card/sd-image.nix
+4
-4
nixos/modules/installer/sd-card/sd-image.nix
·········-example = literalExample "''\${config.boot.loader.generic-extlinux-compatible.populateCmd} -c \${config.system.build.toplevel} -d ./files/boot''";···-example = literalExample "'' dd if=\${pkgs.myBootLoader}/SPL of=$img bs=1024 seek=1 conv=notrunc ''";
·········+example = literalExpression "''\${config.boot.loader.generic-extlinux-compatible.populateCmd} -c \${config.system.build.toplevel} -d ./files/boot''";···+example = literalExpression "'' dd if=\${pkgs.myBootLoader}/SPL of=$img bs=1024 seek=1 conv=notrunc ''";
+2
-2
nixos/modules/misc/documentation.nix
+2
-2
nixos/modules/misc/documentation.nix
······
···+defaultText = literalDocBook "all man pages in <option>config.environment.systemPackages</option>";···
+2
-2
nixos/modules/misc/locate.nix
+2
-2
nixos/modules/misc/locate.nix
+9
-9
nixos/modules/misc/nixpkgs.nix
+9
-9
nixos/modules/misc/nixpkgs.nix
············
············
+2
-2
nixos/modules/programs/atop.nix
+2
-2
nixos/modules/programs/atop.nix
······
······
+1
-1
nixos/modules/programs/captive-browser.nix
+1
-1
nixos/modules/programs/captive-browser.nix
+2
-2
nixos/modules/programs/chromium.nix
+2
-2
nixos/modules/programs/chromium.nix
······
······
+1
-1
nixos/modules/programs/digitalbitbox/default.nix
+1
-1
nixos/modules/programs/digitalbitbox/default.nix
+1
-1
nixos/modules/programs/dmrconfig.nix
+1
-1
nixos/modules/programs/dmrconfig.nix
+1
nixos/modules/programs/feedbackd.nix
+1
nixos/modules/programs/feedbackd.nix
+3
-3
nixos/modules/programs/firejail.nix
+3
-3
nixos/modules/programs/firejail.nix
······
······
+1
-1
nixos/modules/programs/flexoptix-app.nix
+1
-1
nixos/modules/programs/flexoptix-app.nix
+1
-1
nixos/modules/programs/freetds.nix
+1
-1
nixos/modules/programs/freetds.nix
+1
-1
nixos/modules/programs/gamemode.nix
+1
-1
nixos/modules/programs/gamemode.nix
+2
-2
nixos/modules/programs/git.nix
+2
-2
nixos/modules/programs/git.nix
+1
-1
nixos/modules/programs/gnupg.nix
+1
-1
nixos/modules/programs/gnupg.nix
+1
-1
nixos/modules/programs/java.nix
+1
-1
nixos/modules/programs/java.nix
+2
-2
nixos/modules/programs/kdeconnect.nix
+2
-2
nixos/modules/programs/kdeconnect.nix
+2
-1
nixos/modules/programs/less.nix
+2
-1
nixos/modules/programs/less.nix
······Before less opens a file, it first gives your input preprocessor a chance to modify the way the contents of the file are displayed.
······Before less opens a file, it first gives your input preprocessor a chance to modify the way the contents of the file are displayed.
+1
nixos/modules/programs/mtr.nix
+1
nixos/modules/programs/mtr.nix
+13
-13
nixos/modules/programs/neovim.nix
+13
-13
nixos/modules/programs/neovim.nix
·········
·········
+1
nixos/modules/programs/noisetorch.nix
+1
nixos/modules/programs/noisetorch.nix
+3
-2
nixos/modules/programs/npm.nix
+3
-2
nixos/modules/programs/npm.nix
···
···
+1
-1
nixos/modules/programs/proxychains.nix
+1
-1
nixos/modules/programs/proxychains.nix
+1
-1
nixos/modules/programs/shadow.nix
+1
-1
nixos/modules/programs/shadow.nix
+7
-5
nixos/modules/programs/spacefm.nix
+7
-5
nixos/modules/programs/spacefm.nix
···
···
+4
-3
nixos/modules/programs/ssh.nix
+4
-3
nixos/modules/programs/ssh.nix
············
············
+1
-1
nixos/modules/programs/ssmtp.nix
+1
-1
nixos/modules/programs/ssmtp.nix
···<citerefentry><refentrytitle>ssmtp</refentrytitle><manvolnum>5</manvolnum></citerefentry> configuration. Refer
···<citerefentry><refentrytitle>ssmtp</refentrytitle><manvolnum>5</manvolnum></citerefentry> configuration. Refer
+2
-2
nixos/modules/programs/sway.nix
+2
-2
nixos/modules/programs/sway.nix
+4
-4
nixos/modules/programs/tsm-client.nix
+4
-4
nixos/modules/programs/tsm-client.nix
·········
·········
+2
-2
nixos/modules/programs/vim.nix
+2
-2
nixos/modules/programs/vim.nix
+1
-1
nixos/modules/programs/wireshark.nix
+1
-1
nixos/modules/programs/wireshark.nix
+2
-1
nixos/modules/programs/xonsh.nix
+2
-1
nixos/modules/programs/xonsh.nix
+2
-1
nixos/modules/programs/xss-lock.nix
+2
-1
nixos/modules/programs/xss-lock.nix
···
+4
-5
nixos/modules/programs/xwayland.nix
+4
-5
nixos/modules/programs/xwayland.nix
······
······
+2
-1
nixos/modules/programs/yabar.nix
+2
-1
nixos/modules/programs/yabar.nix
+1
-1
nixos/modules/programs/zsh/oh-my-zsh.nix
+1
-1
nixos/modules/programs/zsh/oh-my-zsh.nix
+1
-1
nixos/modules/programs/zsh/zsh-autoenv.nix
+1
-1
nixos/modules/programs/zsh/zsh-autoenv.nix
+1
-1
nixos/modules/programs/zsh/zsh-autosuggestions.nix
+1
-1
nixos/modules/programs/zsh/zsh-autosuggestions.nix
+2
-2
nixos/modules/programs/zsh/zsh-syntax-highlighting.nix
+2
-2
nixos/modules/programs/zsh/zsh-syntax-highlighting.nix
+2
-2
nixos/modules/security/acme.nix
+2
-2
nixos/modules/security/acme.nix
······
······
+2
-2
nixos/modules/security/ca.nix
+2
-2
nixos/modules/security/ca.nix
······
······
+1
-1
nixos/modules/security/dhparams.nix
+1
-1
nixos/modules/security/dhparams.nix
+1
-1
nixos/modules/security/doas.nix
+1
-1
nixos/modules/security/doas.nix
···
···
+1
-1
nixos/modules/security/pam.nix
+1
-1
nixos/modules/security/pam.nix
+2
-2
nixos/modules/security/pam_mount.nix
+2
-2
nixos/modules/security/pam_mount.nix
······[ "nodev" "nosuid" "force-user=%(USER)" "gid=%(USERGID)" "perms=0700" "chmod-deny" "chown-deny" "chgrp-deny" ]
······[ "nodev" "nosuid" "force-user=%(USER)" "gid=%(USERGID)" "perms=0700" "chmod-deny" "chown-deny" "chgrp-deny" ]
+2
-2
nixos/modules/security/sudo.nix
+2
-2
nixos/modules/security/sudo.nix
······
······
+2
-2
nixos/modules/security/systemd-confinement.nix
+2
-2
nixos/modules/security/systemd-confinement.nix
···
···
+3
-4
nixos/modules/security/tpm2.nix
+3
-4
nixos/modules/security/tpm2.nix
·········
···+defaultText = lib.literalExpression ''if config.security.tpm2.abrmd.enable then "tss" else "root"'';······
+1
-1
nixos/modules/security/wrappers/default.nix
+1
-1
nixos/modules/security/wrappers/default.nix
+1
-1
nixos/modules/services/admin/meshcentral.nix
+1
-1
nixos/modules/services/admin/meshcentral.nix
+2
-2
nixos/modules/services/admin/oxidized.nix
+2
-2
nixos/modules/services/admin/oxidized.nix
······
······
+2
-1
nixos/modules/services/amqp/activemq/default.nix
+2
-1
nixos/modules/services/amqp/activemq/default.nix
······
······
+2
-2
nixos/modules/services/amqp/rabbitmq.nix
+2
-2
nixos/modules/services/amqp/rabbitmq.nix
······
······
+1
nixos/modules/services/audio/botamusique.nix
+1
nixos/modules/services/audio/botamusique.nix
+3
-3
nixos/modules/services/audio/jack.nix
+3
-3
nixos/modules/services/audio/jack.nix
······
······
+3
-3
nixos/modules/services/audio/liquidsoap.nix
+3
-3
nixos/modules/services/audio/liquidsoap.nix
···
+1
-1
nixos/modules/services/audio/mopidy.nix
+1
-1
nixos/modules/services/audio/mopidy.nix
+3
-3
nixos/modules/services/audio/mpd.nix
+3
-3
nixos/modules/services/audio/mpd.nix
·········
·········
+1
-1
nixos/modules/services/audio/slimserver.nix
+1
-1
nixos/modules/services/audio/slimserver.nix
+3
-3
nixos/modules/services/audio/snapserver.nix
+3
-3
nixos/modules/services/audio/snapserver.nix
···For type <literal>meta</literal>, a list of stream names in the form <literal>/one/two/...</literal>. Don't forget the leading slash.······
···For type <literal>meta</literal>, a list of stream names in the form <literal>/one/two/...</literal>. Don't forget the leading slash.······
-1
nixos/modules/services/audio/ympd.nix
-1
nixos/modules/services/audio/ympd.nix
+2
-2
nixos/modules/services/backup/automysqlbackup.nix
+2
-2
nixos/modules/services/backup/automysqlbackup.nix
······
······
+5
-8
nixos/modules/services/backup/borgbackup.nix
+5
-8
nixos/modules/services/backup/borgbackup.nix
···············
···············
+1
-1
nixos/modules/services/backup/btrbk.nix
+1
-1
nixos/modules/services/backup/btrbk.nix
···description = "Extra packages for btrbk, like compression utilities for <literal>stream_compress</literal>";description = "Niceness for local instances of btrbk. Also applies to remote ones connecting via ssh when positive.";
···description = "Extra packages for btrbk, like compression utilities for <literal>stream_compress</literal>";description = "Niceness for local instances of btrbk. Also applies to remote ones connecting via ssh when positive.";
+1
-1
nixos/modules/services/backup/postgresql-backup.nix
+1
-1
nixos/modules/services/backup/postgresql-backup.nix
+5
-5
nixos/modules/services/backup/postgresql-wal-receiver.nix
+5
-5
nixos/modules/services/backup/postgresql-wal-receiver.nix
···············
···············
+1
-1
nixos/modules/services/backup/restic-rest-server.nix
+1
-1
nixos/modules/services/backup/restic-rest-server.nix
+1
-1
nixos/modules/services/backup/syncoid.nix
+1
-1
nixos/modules/services/backup/syncoid.nix
+3
-3
nixos/modules/services/backup/tarsnap.nix
+3
-3
nixos/modules/services/backup/tarsnap.nix
·········
·········
+6
-6
nixos/modules/services/backup/znapzend.nix
+6
-6
nixos/modules/services/backup/znapzend.nix
···-''${pkgs.mariadb}/bin/mysql -e "set autocommit=0;flush tables with read lock;\\! ''${pkgs.coreutils}/bin/sleep 600" & ''${pkgs.coreutils}/bin/echo $! > /tmp/mariadblock.pid ; sleep 10···-''${pkgs.coreutils}/bin/kill `''${pkgs.coreutils}/bin/cat /tmp/mariadblock.pid`;''${pkgs.coreutils}/bin/rm /tmp/mariadblock.pid······
···+'''''${pkgs.mariadb}/bin/mysql -e "set autocommit=0;flush tables with read lock;\\! ''${pkgs.coreutils}/bin/sleep 600" & ''${pkgs.coreutils}/bin/echo $! > /tmp/mariadblock.pid ; sleep 10'''···+"''${pkgs.coreutils}/bin/kill `''${pkgs.coreutils}/bin/cat /tmp/mariadblock.pid`;''${pkgs.coreutils}/bin/rm /tmp/mariadblock.pid"······
+1
nixos/modules/services/blockchain/ethereum/geth.nix
+1
nixos/modules/services/blockchain/ethereum/geth.nix
+5
-6
nixos/modules/services/cluster/hadoop/default.nix
+5
-6
nixos/modules/services/cluster/hadoop/default.nix
···············
···············
+1
-2
nixos/modules/services/cluster/k3s/default.nix
+1
-2
nixos/modules/services/cluster/k3s/default.nix
+2
-2
nixos/modules/services/cluster/kubernetes/addon-manager.nix
+2
-2
nixos/modules/services/cluster/kubernetes/addon-manager.nix
······
······
+17
-14
nixos/modules/services/cluster/kubernetes/addons/dns.nix
+17
-14
nixos/modules/services/cluster/kubernetes/addons/dns.nix
···
···
+1
-1
nixos/modules/services/cluster/kubernetes/default.nix
+1
-1
nixos/modules/services/cluster/kubernetes/default.nix
+1
-1
nixos/modules/services/cluster/kubernetes/kubelet.nix
+1
-1
nixos/modules/services/cluster/kubernetes/kubelet.nix
+3
-3
nixos/modules/services/cluster/spark/default.nix
+3
-3
nixos/modules/services/cluster/spark/default.nix
···description = "Spark configuration directory. Spark will use the configuration files (spark-defaults.conf, spark-env.sh, log4j.properties, etc) from this directory.";···
···description = "Spark configuration directory. Spark will use the configuration files (spark-defaults.conf, spark-env.sh, log4j.properties, etc) from this directory.";···
+2
-2
nixos/modules/services/computing/boinc/client.nix
+2
-2
nixos/modules/services/computing/boinc/client.nix
······
······
+1
-1
nixos/modules/services/computing/foldingathome/client.nix
+1
-1
nixos/modules/services/computing/foldingathome/client.nix
+4
-4
nixos/modules/services/computing/slurm/slurm.nix
+4
-4
nixos/modules/services/computing/slurm/slurm.nix
·········-example = literalExample ''[ "debug Nodes=linux[1-32] Default=YES MaxTime=INFINITE State=UP" ];'';
·········+example = literalExpression ''[ "debug Nodes=linux[1-32] Default=YES MaxTime=INFINITE State=UP" ];'';
+6
-5
nixos/modules/services/continuous-integration/buildbot/master.nix
+6
-5
nixos/modules/services/continuous-integration/buildbot/master.nix
···description = "Optionally pass master.cfg path. Other options in this configuration will be ignored.";······
···description = "Optionally pass master.cfg path. Other options in this configuration will be ignored.";······
+3
-3
nixos/modules/services/continuous-integration/buildbot/worker.nix
+3
-3
nixos/modules/services/continuous-integration/buildbot/worker.nix
···
···
+4
-3
nixos/modules/services/continuous-integration/buildkite-agents.nix
+4
-3
nixos/modules/services/continuous-integration/buildkite-agents.nix
············
·········+defaultText = literalDocBook "generated from <option>services.buildkite-agents.<name>.hooks</option>";···
+2
-1
nixos/modules/services/continuous-integration/github-runner.nix
+2
-1
nixos/modules/services/continuous-integration/github-runner.nix
······
+6
-6
nixos/modules/services/continuous-integration/gitlab-runner.nix
+6
-6
nixos/modules/services/continuous-integration/gitlab-runner.nix
···-example = literalExample "with lib; (length (attrNames config.services.gitlab-runner.services)) * 3";············
···+example = literalExpression "with lib; (length (attrNames config.services.gitlab-runner.services)) * 3";············
+1
-1
nixos/modules/services/continuous-integration/gocd-agent/default.nix
+1
-1
nixos/modules/services/continuous-integration/gocd-agent/default.nix
···
···+defaultText = literalExpression "[ pkgs.stdenv pkgs.jre pkgs.git config.programs.ssh.package pkgs.nix ]";
+1
-1
nixos/modules/services/continuous-integration/gocd-server/default.nix
+1
-1
nixos/modules/services/continuous-integration/gocd-server/default.nix
···
···+defaultText = literalExpression "[ pkgs.stdenv pkgs.jre pkgs.git config.programs.ssh.package pkgs.nix ]";
+1
-1
nixos/modules/services/continuous-integration/hail.nix
+1
-1
nixos/modules/services/continuous-integration/hail.nix
+8
-7
nixos/modules/services/continuous-integration/hercules-ci-agent/common.nix
+8
-7
nixos/modules/services/continuous-integration/hercules-ci-agent/common.nix
·····················
·····················
+2
-2
nixos/modules/services/continuous-integration/hydra/default.nix
+2
-2
nixos/modules/services/continuous-integration/hydra/default.nix
······
······
+3
-3
nixos/modules/services/continuous-integration/jenkins/default.nix
+3
-3
nixos/modules/services/continuous-integration/jenkins/default.nix
······
···+defaultText = literalExpression "[ pkgs.stdenv pkgs.git pkgs.jdk11 config.programs.ssh.package pkgs.nix ]";···
+2
-2
nixos/modules/services/continuous-integration/jenkins/job-builder.nix
+2
-2
nixos/modules/services/continuous-integration/jenkins/job-builder.nix
······
······
+1
-1
nixos/modules/services/databases/aerospike.nix
+1
-1
nixos/modules/services/databases/aerospike.nix
+6
-4
nixos/modules/services/databases/cassandra.nix
+6
-4
nixos/modules/services/databases/cassandra.nix
············
············+defaultText = literalDocBook ''generated configuration file if version is at least 3.11, otherwise <literal>null</literal>'';
+1
-1
nixos/modules/services/databases/cockroachdb.nix
+1
-1
nixos/modules/services/databases/cockroachdb.nix
+1
-2
nixos/modules/services/databases/couchdb.nix
+1
-2
nixos/modules/services/databases/couchdb.nix
+3
-5
nixos/modules/services/databases/firebird.nix
+3
-5
nixos/modules/services/databases/firebird.nix
······
······
+1
-2
nixos/modules/services/databases/hbase.nix
+1
-2
nixos/modules/services/databases/hbase.nix
+1
-1
nixos/modules/services/databases/influxdb.nix
+1
-1
nixos/modules/services/databases/influxdb.nix
+1
-1
nixos/modules/services/databases/influxdb2.nix
+1
-1
nixos/modules/services/databases/influxdb2.nix
+1
-1
nixos/modules/services/databases/monetdb.nix
+1
-1
nixos/modules/services/databases/monetdb.nix
+1
-1
nixos/modules/services/databases/mongodb.nix
+1
-1
nixos/modules/services/databases/mongodb.nix
+8
-8
nixos/modules/services/databases/mysql.nix
+8
-8
nixos/modules/services/databases/mysql.nix
·····················option is changed. This means that users created and permissions assigned once through this option or
·····················option is changed. This means that users created and permissions assigned once through this option or
+1
-1
nixos/modules/services/databases/neo4j.nix
+1
-1
nixos/modules/services/databases/neo4j.nix
+7
-6
nixos/modules/services/databases/openldap.nix
+7
-6
nixos/modules/services/databases/openldap.nix
············
············
+1
-2
nixos/modules/services/databases/opentsdb.nix
+1
-2
nixos/modules/services/databases/opentsdb.nix
+1
-1
nixos/modules/services/databases/pgmanage.nix
+1
-1
nixos/modules/services/databases/pgmanage.nix
+6
-6
nixos/modules/services/databases/postgresql.nix
+6
-6
nixos/modules/services/databases/postgresql.nix
············option is changed. This means that users created and permissions assigned once through this option or······
······+defaultText = literalExpression ''"/var/lib/postgresql/''${config.services.postgresql.package.psqlSchema}"'';······option is changed. This means that users created and permissions assigned once through this option or······
+2
-3
nixos/modules/services/databases/redis.nix
+2
-3
nixos/modules/services/databases/redis.nix
······description = "The schedule in which data is persisted to disk, represented as a list of lists where the first element represent the amount of seconds and the second the number of changes.";···
······description = "The schedule in which data is persisted to disk, represented as a list of lists where the first element represent the amount of seconds and the second the number of changes.";···
+1
-2
nixos/modules/services/databases/riak.nix
+1
-2
nixos/modules/services/databases/riak.nix
+1
-1
nixos/modules/services/databases/victoriametrics.nix
+1
-1
nixos/modules/services/databases/victoriametrics.nix
+1
-3
nixos/modules/services/desktops/geoclue2.nix
+1
-3
nixos/modules/services/desktops/geoclue2.nix
·········
·········
+1
-1
nixos/modules/services/desktops/gnome/evolution-data-server.nix
+1
-1
nixos/modules/services/desktops/gnome/evolution-data-server.nix
+1
nixos/modules/services/desktops/gvfs.nix
+1
nixos/modules/services/desktops/gvfs.nix
+2
-2
nixos/modules/services/desktops/pipewire/pipewire-media-session.nix
+2
-2
nixos/modules/services/desktops/pipewire/pipewire-media-session.nix
···
···
+1
-2
nixos/modules/services/desktops/pipewire/pipewire.nix
+1
-2
nixos/modules/services/desktops/pipewire/pipewire.nix
+1
-1
nixos/modules/services/development/distccd.nix
+1
-1
nixos/modules/services/development/distccd.nix
+3
-3
nixos/modules/services/development/hoogle.nix
+3
-3
nixos/modules/services/development/hoogle.nix
······
······
+3
-5
nixos/modules/services/development/jupyter/default.nix
+3
-5
nixos/modules/services/development/jupyter/default.nix
·········
·········
+4
-4
nixos/modules/services/development/jupyter/kernel-options.nix
+4
-4
nixos/modules/services/development/jupyter/kernel-options.nix
·········
·········
+20
-8
nixos/modules/services/development/jupyterhub/default.nix
+20
-8
nixos/modules/services/development/jupyterhub/default.nix
·········
·········
+1
-2
nixos/modules/services/development/lorri.nix
+1
-2
nixos/modules/services/development/lorri.nix
+3
-3
nixos/modules/services/display-managers/greetd.nix
+3
-3
nixos/modules/services/display-managers/greetd.nix
······This is usually desirable so a user can always log in, but should be disabled when using 'settings.initial_session' (autologin),
······This is usually desirable so a user can always log in, but should be disabled when using 'settings.initial_session' (autologin),
+1
-1
nixos/modules/services/editors/emacs.nix
+1
-1
nixos/modules/services/editors/emacs.nix
+1
-1
nixos/modules/services/editors/infinoted.nix
+1
-1
nixos/modules/services/editors/infinoted.nix
+28
-26
nixos/modules/services/games/crossfire-server.nix
+28
-26
nixos/modules/services/games/crossfire-server.nix
·········
·········
+20
-18
nixos/modules/services/games/deliantra-server.nix
+20
-18
nixos/modules/services/games/deliantra-server.nix
·········
·········
+3
-3
nixos/modules/services/games/factorio.nix
+3
-3
nixos/modules/services/games/factorio.nix
······
······
+4
-4
nixos/modules/services/games/minecraft-server.nix
+4
-4
nixos/modules/services/games/minecraft-server.nix
·········
·········
+1
-1
nixos/modules/services/hardware/acpid.nix
+1
-1
nixos/modules/services/hardware/acpid.nix
+1
-1
nixos/modules/services/hardware/actkbd.nix
+1
-1
nixos/modules/services/hardware/actkbd.nix
+3
-3
nixos/modules/services/hardware/bluetooth.nix
+3
-3
nixos/modules/services/hardware/bluetooth.nix
······
······
+1
-1
nixos/modules/services/hardware/freefall.nix
+1
-1
nixos/modules/services/hardware/freefall.nix
+2
-1
nixos/modules/services/hardware/fwupd.nix
+2
-1
nixos/modules/services/hardware/fwupd.nix
···Installing a public key allows firmware signed with a matching private key to be recognized as trusted, which may require less authentication to install than for untrusted files. By default trusted firmware can be upgraded (but not downgraded) without the user or administrator password. Only very few keys are installed by default.···
···Installing a public key allows firmware signed with a matching private key to be recognized as trusted, which may require less authentication to install than for untrusted files. By default trusted firmware can be upgraded (but not downgraded) without the user or administrator password. Only very few keys are installed by default.···
+1
nixos/modules/services/hardware/interception-tools.nix
+1
nixos/modules/services/hardware/interception-tools.nix
···
+2
-2
nixos/modules/services/hardware/pcscd.nix
+2
-2
nixos/modules/services/hardware/pcscd.nix
+2
-1
nixos/modules/services/hardware/sane.nix
+2
-1
nixos/modules/services/hardware/sane.nix
······
······
+4
-4
nixos/modules/services/hardware/sane_extra_backends/brscan4.nix
+4
-4
nixos/modules/services/hardware/sane_extra_backends/brscan4.nix
············
············
+4
-4
nixos/modules/services/hardware/sane_extra_backends/brscan5.nix
+4
-4
nixos/modules/services/hardware/sane_extra_backends/brscan5.nix
············
············
+1
-1
nixos/modules/services/hardware/thermald.nix
+1
-1
nixos/modules/services/hardware/thermald.nix
+1
-1
nixos/modules/services/hardware/triggerhappy.nix
+1
-1
nixos/modules/services/hardware/triggerhappy.nix
+1
-1
nixos/modules/services/hardware/undervolt.nix
+1
-1
nixos/modules/services/hardware/undervolt.nix
+1
-2
nixos/modules/services/hardware/upower.nix
+1
-2
nixos/modules/services/hardware/upower.nix
+2
-2
nixos/modules/services/hardware/vdr.nix
+2
-2
nixos/modules/services/hardware/vdr.nix
+1
nixos/modules/services/logging/SystemdJournal2Gelf.nix
+1
nixos/modules/services/logging/SystemdJournal2Gelf.nix
+4
-4
nixos/modules/services/logging/awstats.nix
+4
-4
nixos/modules/services/logging/awstats.nix
·········
·········
+1
-1
nixos/modules/services/logging/fluentd.nix
+1
-1
nixos/modules/services/logging/fluentd.nix
+2
-3
nixos/modules/services/logging/graylog.nix
+2
-3
nixos/modules/services/logging/graylog.nix
······description = "List of valid URIs of the http ports of your elastic nodes. If one or more of your elasticsearch hosts require authentication, include the credentials in each node URI that requires authentication";
······description = "List of valid URIs of the http ports of your elastic nodes. If one or more of your elasticsearch hosts require authentication, include the credentials in each node URI that requires authentication";
+2
-2
nixos/modules/services/logging/journalbeat.nix
+2
-2
nixos/modules/services/logging/journalbeat.nix
+1
-1
nixos/modules/services/logging/logcheck.nix
+1
-1
nixos/modules/services/logging/logcheck.nix
+1
-1
nixos/modules/services/logging/logrotate.nix
+1
-1
nixos/modules/services/logging/logrotate.nix
···can be controlled by the <link linkend="opt-services.logrotate.paths._name_.priority">priority</link> option
···can be controlled by the <link linkend="opt-services.logrotate.paths._name_.priority">priority</link> option
+10
-9
nixos/modules/services/logging/logstash.nix
+10
-9
nixos/modules/services/logging/logstash.nix
······
······
+2
-2
nixos/modules/services/logging/syslog-ng.nix
+2
-2
nixos/modules/services/logging/syslog-ng.nix
······
······
+1
-1
nixos/modules/services/mail/davmail.nix
+1
-1
nixos/modules/services/mail/davmail.nix
+2
-2
nixos/modules/services/mail/dovecot.nix
+2
-2
nixos/modules/services/mail/dovecot.nix
······(list: listToAttrs (map (entry: { name = entry.name; value = removeAttrs entry ["name"]; }) list))
······(list: listToAttrs (map (entry: { name = entry.name; value = removeAttrs entry ["name"]; }) list))
+2
-2
nixos/modules/services/mail/exim.nix
+2
-2
nixos/modules/services/mail/exim.nix
······
······
+2
-2
nixos/modules/services/mail/mailman.nix
+2
-2
nixos/modules/services/mail/mailman.nix
+2
-2
nixos/modules/services/mail/offlineimap.nix
+2
-2
nixos/modules/services/mail/offlineimap.nix
···
···
+1
-1
nixos/modules/services/mail/opensmtpd.nix
+1
-1
nixos/modules/services/mail/opensmtpd.nix
+1
nixos/modules/services/mail/postfix.nix
+1
nixos/modules/services/mail/postfix.nix
···File containing trusted certification authorities (CA) to verify certificates of mailservers contacted for mail delivery. This basically sets smtp_tls_CAfile and enables opportunistic tls. Defaults to NixOS trusted certification authorities.
···File containing trusted certification authorities (CA) to verify certificates of mailservers contacted for mail delivery. This basically sets smtp_tls_CAfile and enables opportunistic tls. Defaults to NixOS trusted certification authorities.
+3
-2
nixos/modules/services/mail/roundcube.nix
+3
-2
nixos/modules/services/mail/roundcube.nix
······
······
+3
-7
nixos/modules/services/mail/rspamd.nix
+3
-7
nixos/modules/services/mail/rspamd.nix
······Overridden configuration files, written into <filename>/etc/rspamd/override.d/{name}</filename>.······
······Overridden configuration files, written into <filename>/etc/rspamd/override.d/{name}</filename>.······
+4
-4
nixos/modules/services/mail/sympa.nix
+4
-4
nixos/modules/services/mail/sympa.nix
············config.source = mkIf (config.text != null) (mkDefault (pkgs.writeText "sympa-${baseNameOf name}" config.text));
······+defaultText = literalExpression ''if database.type == "SQLite" then "${dataDir}/sympa.sqlite" else "sympa"'';······config.source = mkIf (config.text != null) (mkDefault (pkgs.writeText "sympa-${baseNameOf name}" config.text));
+3
-3
nixos/modules/services/misc/airsonic.nix
+3
-3
nixos/modules/services/misc/airsonic.nix
·········
·········
+1
-1
nixos/modules/services/misc/ankisyncd.nix
+1
-1
nixos/modules/services/misc/ankisyncd.nix
+2
-2
nixos/modules/services/misc/apache-kafka.nix
+2
-2
nixos/modules/services/misc/apache-kafka.nix
···
···
+1
-1
nixos/modules/services/misc/autofs.nix
+1
-1
nixos/modules/services/misc/autofs.nix
+2
-2
nixos/modules/services/misc/bees.nix
+2
-2
nixos/modules/services/misc/bees.nix
······
······
+1
-1
nixos/modules/services/misc/cgminer.nix
+1
-1
nixos/modules/services/misc/cgminer.nix
+1
-1
nixos/modules/services/misc/clipcat.nix
+1
-1
nixos/modules/services/misc/clipcat.nix
+1
-1
nixos/modules/services/misc/confd.nix
+1
-1
nixos/modules/services/misc/confd.nix
+2
-2
nixos/modules/services/misc/dictd.nix
+2
-2
nixos/modules/services/misc/dictd.nix
···
···
+1
-2
nixos/modules/services/misc/disnix.nix
+1
-2
nixos/modules/services/misc/disnix.nix
······
······
+2
-2
nixos/modules/services/misc/dwm-status.nix
+2
-2
nixos/modules/services/misc/dwm-status.nix
+1
-1
nixos/modules/services/misc/etcd.nix
+1
-1
nixos/modules/services/misc/etcd.nix
+3
-3
nixos/modules/services/misc/etebase-server.nix
+3
-3
nixos/modules/services/misc/etebase-server.nix
······
······
+1
-1
nixos/modules/services/misc/felix.nix
+1
-1
nixos/modules/services/misc/felix.nix
+4
-5
nixos/modules/services/misc/freeswitch.nix
+4
-5
nixos/modules/services/misc/freeswitch.nix
···-defaultText = literalExample "\${config.services.freeswitch.package}/share/freeswitch/conf/vanilla";-example = literalExample "\${config.services.freeswitch.package}/share/freeswitch/conf/minimal";See available templates in <link xlink:href="https://github.com/signalwire/freeswitch/tree/master/conf">FreeSWITCH repository</link>.······
···+defaultText = literalExpression ''"''${config.services.freeswitch.package}/share/freeswitch/conf/vanilla"'';+example = literalExpression ''"''${config.services.freeswitch.package}/share/freeswitch/conf/minimal"'';See available templates in <link xlink:href="https://github.com/signalwire/freeswitch/tree/master/conf">FreeSWITCH repository</link>.······
+6
-5
nixos/modules/services/misc/gitea.nix
+6
-5
nixos/modules/services/misc/gitea.nix
······default = if (cfg.database.createDatabase && usePostgresql) then "/run/postgresql" else if (cfg.database.createDatabase && useMysql) then "/run/mysqld/mysqld.sock" else null;······Gitea configuration. Refer to <link xlink:href="https://docs.gitea.io/en-us/config-cheat-sheet/"/>
······default = if (cfg.database.createDatabase && usePostgresql) then "/run/postgresql" else if (cfg.database.createDatabase && useMysql) then "/run/mysqld/mysqld.sock" else null;······Gitea configuration. Refer to <link xlink:href="https://docs.gitea.io/en-us/config-cheat-sheet/"/>
+26
-26
nixos/modules/services/misc/gitit.nix
+26
-26
nixos/modules/services/misc/gitit.nix
·········
·········
+8
-10
nixos/modules/services/misc/gitlab.nix
+8
-10
nixos/modules/services/misc/gitlab.nix
············
············
+7
-5
nixos/modules/services/misc/gitolite.nix
+7
-5
nixos/modules/services/misc/gitolite.nix
···
···
+1
-1
nixos/modules/services/misc/greenclip.nix
+1
-1
nixos/modules/services/misc/greenclip.nix
+4
-4
nixos/modules/services/misc/home-assistant.nix
+4
-4
nixos/modules/services/misc/home-assistant.nix
·········
·········
+4
-3
nixos/modules/services/misc/ihaskell.nix
+4
-3
nixos/modules/services/misc/ihaskell.nix
······
······
+1
-1
nixos/modules/services/misc/jackett.nix
+1
-1
nixos/modules/services/misc/jackett.nix
+1
-1
nixos/modules/services/misc/jellyfin.nix
+1
-1
nixos/modules/services/misc/jellyfin.nix
+1
nixos/modules/services/misc/klipper.nix
+1
nixos/modules/services/misc/klipper.nix
+1
-1
nixos/modules/services/misc/lidarr.nix
+1
-1
nixos/modules/services/misc/lidarr.nix
+1
-1
nixos/modules/services/misc/matrix-appservice-discord.nix
+1
-1
nixos/modules/services/misc/matrix-appservice-discord.nix
+2
-2
nixos/modules/services/misc/matrix-synapse.nix
+2
-2
nixos/modules/services/misc/matrix-synapse.nix
······
······
+1
-1
nixos/modules/services/misc/mautrix-telegram.nix
+1
-1
nixos/modules/services/misc/mautrix-telegram.nix
+1
-1
nixos/modules/services/misc/mbpfan.nix
+1
-1
nixos/modules/services/misc/mbpfan.nix
+4
-3
nixos/modules/services/misc/mediatomb.nix
+4
-3
nixos/modules/services/misc/mediatomb.nix
······
······
+1
-1
nixos/modules/services/misc/mx-puppet-discord.nix
+1
-1
nixos/modules/services/misc/mx-puppet-discord.nix
+1
-1
nixos/modules/services/misc/nitter.nix
+1
-1
nixos/modules/services/misc/nitter.nix
+2
-2
nixos/modules/services/misc/nix-daemon.nix
+2
-2
nixos/modules/services/misc/nix-daemon.nix
······
······
+1
-1
nixos/modules/services/misc/nzbhydra2.nix
+1
-1
nixos/modules/services/misc/nzbhydra2.nix
+2
-2
nixos/modules/services/misc/octoprint.nix
+2
-2
nixos/modules/services/misc/octoprint.nix
···description = "Additional plugins to be used. Available plugins are passed through the plugins input.";
···description = "Additional plugins to be used. Available plugins are passed through the plugins input.";
+4
-4
nixos/modules/services/misc/paperless-ng.nix
+4
-4
nixos/modules/services/misc/paperless-ng.nix
······See <link xlink:href="https://paperless-ng.readthedocs.io/en/latest/configuration.html">the documentation</link>···
······See <link xlink:href="https://paperless-ng.readthedocs.io/en/latest/configuration.html">the documentation</link>···
+1
-1
nixos/modules/services/misc/plex.nix
+1
-1
nixos/modules/services/misc/plex.nix
+9
-8
nixos/modules/services/misc/redmine.nix
+9
-8
nixos/modules/services/misc/redmine.nix
·········<link xlink:href="https://guides.rubyonrails.org/action_mailer_basics.html#action-mailer-configuration"/>···See <link xlink:href="https://svn.redmine.org/redmine/trunk/config/additional_environment.rb.example"/>············
·········<link xlink:href="https://guides.rubyonrails.org/action_mailer_basics.html#action-mailer-configuration"/>···See <link xlink:href="https://svn.redmine.org/redmine/trunk/config/additional_environment.rb.example"/>············
+1
-1
nixos/modules/services/misc/rippled.nix
+1
-1
nixos/modules/services/misc/rippled.nix
+2
-1
nixos/modules/services/misc/sickbeard.nix
+2
-1
nixos/modules/services/misc/sickbeard.nix
···
+12
-10
nixos/modules/services/misc/snapper.nix
+12
-10
nixos/modules/services/misc/snapper.nix
···
+1
-1
nixos/modules/services/misc/sourcehut/builds.nix
+1
-1
nixos/modules/services/misc/sourcehut/builds.nix
···
···
+2
-1
nixos/modules/services/misc/sourcehut/git.nix
+2
-1
nixos/modules/services/misc/sourcehut/git.nix
+1
-1
nixos/modules/services/misc/ssm-agent.nix
+1
-1
nixos/modules/services/misc/ssm-agent.nix
+1
nixos/modules/services/misc/subsonic.nix
+1
nixos/modules/services/misc/subsonic.nix
···
+1
-1
nixos/modules/services/misc/tautulli.nix
+1
-1
nixos/modules/services/misc/tautulli.nix
+1
-1
nixos/modules/services/misc/tp-auto-kbbl.nix
+1
-1
nixos/modules/services/misc/tp-auto-kbbl.nix
+1
-1
nixos/modules/services/misc/uhub.nix
+1
-1
nixos/modules/services/misc/uhub.nix
+3
-4
nixos/modules/services/misc/weechat.nix
+3
-4
nixos/modules/services/misc/weechat.nix
···
+1
-1
nixos/modules/services/misc/xmr-stak.nix
+1
-1
nixos/modules/services/misc/xmr-stak.nix
+2
-2
nixos/modules/services/misc/zigbee2mqtt.nix
+2
-2
nixos/modules/services/misc/zigbee2mqtt.nix
······
······
+1
-1
nixos/modules/services/misc/zookeeper.nix
+1
-1
nixos/modules/services/misc/zookeeper.nix
-4
nixos/modules/services/monitoring/alerta.nix
-4
nixos/modules/services/monitoring/alerta.nix
······
······
+1
-2
nixos/modules/services/monitoring/arbtt.nix
+1
-2
nixos/modules/services/monitoring/arbtt.nix
+1
-2
nixos/modules/services/monitoring/bosun.nix
+1
-2
nixos/modules/services/monitoring/bosun.nix
+1
-1
nixos/modules/services/monitoring/collectd.nix
+1
-1
nixos/modules/services/monitoring/collectd.nix
+6
-4
nixos/modules/services/monitoring/datadog-agent.nix
+6
-4
nixos/modules/services/monitoring/datadog-agent.nix
······
······
+3
-2
nixos/modules/services/monitoring/grafana-reporter.nix
+3
-2
nixos/modules/services/monitoring/grafana-reporter.nix
+3
-2
nixos/modules/services/monitoring/grafana.nix
+3
-2
nixos/modules/services/monitoring/grafana.nix
······description = "If non-null, then a list of packages containing Grafana plugins to install. If set, plugins cannot be manually installed.";
······description = "If non-null, then a list of packages containing Grafana plugins to install. If set, plugins cannot be manually installed.";
+3
-3
nixos/modules/services/monitoring/graphite.nix
+3
-3
nixos/modules/services/monitoring/graphite.nix
·········
·········
+1
-1
nixos/modules/services/monitoring/heapster.nix
+1
-1
nixos/modules/services/monitoring/heapster.nix
+1
-1
nixos/modules/services/monitoring/incron.nix
+1
-1
nixos/modules/services/monitoring/incron.nix
+1
-4
nixos/modules/services/monitoring/kapacitor.nix
+1
-4
nixos/modules/services/monitoring/kapacitor.nix
············
············
+2
-2
nixos/modules/services/monitoring/loki.nix
+2
-2
nixos/modules/services/monitoring/loki.nix
······
······
-1
nixos/modules/services/monitoring/mackerel-agent.nix
-1
nixos/modules/services/monitoring/mackerel-agent.nix
+3
-4
nixos/modules/services/monitoring/metricbeat.nix
+3
-4
nixos/modules/services/monitoring/metricbeat.nix
·········
·········
+7
-5
nixos/modules/services/monitoring/munin.nix
+7
-5
nixos/modules/services/monitoring/munin.nix
·········
·········
+4
-4
nixos/modules/services/monitoring/nagios.nix
+4
-4
nixos/modules/services/monitoring/nagios.nix
·········
·········
+5
-5
nixos/modules/services/monitoring/netdata.nix
+5
-5
nixos/modules/services/monitoring/netdata.nix
············description = "netdata.conf configuration as nix attributes. cannot be combined with configText.";
············description = "netdata.conf configuration as nix attributes. cannot be combined with configText.";
+1
-1
nixos/modules/services/monitoring/parsedmarc.nix
+1
-1
nixos/modules/services/monitoring/parsedmarc.nix
+1
-1
nixos/modules/services/monitoring/prometheus/alertmanager.nix
+1
-1
nixos/modules/services/monitoring/prometheus/alertmanager.nix
+2
-2
nixos/modules/services/monitoring/prometheus/default.nix
+2
-2
nixos/modules/services/monitoring/prometheus/default.nix
······
······
+3
-3
nixos/modules/services/monitoring/prometheus/exporters.nix
+3
-3
nixos/modules/services/monitoring/prometheus/exporters.nix
·········
·········
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/buildkite-agent.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/buildkite-agent.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/flow.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/flow.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/kea.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/kea.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/knot.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/knot.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/mail.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/mail.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/mikrotik.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/mikrotik.nix
······
······
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/node.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/node.nix
······
······
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/pihole.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/pihole.nix
+6
-8
nixos/modules/services/monitoring/prometheus/exporters/process.nix
+6
-8
nixos/modules/services/monitoring/prometheus/exporters/process.nix
···-{ name = "{{.Matches.Wrapped}} {{ .Matches.Args }}"; cmdline = [ "^/nix/store[^ ]*/(?P<Wrapped>[^ /]*) (?P<Args>.*)" ]; }
···+{ name = "{{.Matches.Wrapped}} {{ .Matches.Args }}"; cmdline = [ "^/nix/store[^ ]*/(?P<Wrapped>[^ /]*) (?P<Args>.*)" ]; }
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/rspamd.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/rspamd.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/script.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/script.nix
+7
-9
nixos/modules/services/monitoring/prometheus/exporters/snmp.nix
+7
-9
nixos/modules/services/monitoring/prometheus/exporters/snmp.nix
······Snmp exporter configuration as nix attribute set. Mutually exclusive with 'configurationPath' option.
······Snmp exporter configuration as nix attribute set. Mutually exclusive with 'configurationPath' option.
+1
-1
nixos/modules/services/monitoring/prometheus/pushgateway.nix
+1
-1
nixos/modules/services/monitoring/prometheus/pushgateway.nix
+2
-3
nixos/modules/services/monitoring/scollector.nix
+2
-3
nixos/modules/services/monitoring/scollector.nix
······
······
+2
-2
nixos/modules/services/monitoring/telegraf.nix
+2
-2
nixos/modules/services/monitoring/telegraf.nix
······
······
+4
-4
nixos/modules/services/monitoring/thanos.nix
+4
-4
nixos/modules/services/monitoring/thanos.nix
············
············
+2
-2
nixos/modules/services/monitoring/unifi-poller.nix
+2
-2
nixos/modules/services/monitoring/unifi-poller.nix
······
······
+5
-5
nixos/modules/services/monitoring/zabbix-agent.nix
+5
-5
nixos/modules/services/monitoring/zabbix-agent.nix
·········
·········
+5
-5
nixos/modules/services/monitoring/zabbix-proxy.nix
+5
-5
nixos/modules/services/monitoring/zabbix-proxy.nix
···-inherit (lib) attrValues concatMapStringsSep getName literalExample optional optionalAttrs optionalString types;·········
···+inherit (lib) attrValues concatMapStringsSep getName literalExpression optional optionalAttrs optionalString types;·········
+4
-4
nixos/modules/services/monitoring/zabbix-server.nix
+4
-4
nixos/modules/services/monitoring/zabbix-server.nix
···-inherit (lib) attrValues concatMapStringsSep getName literalExample optional optionalAttrs optionalString types;···default = if cfg.database.type == "mysql" then pkgs.zabbix.server-mysql else pkgs.zabbix.server-pgsql;···
···+inherit (lib) attrValues concatMapStringsSep getName literalExpression optional optionalAttrs optionalString types;···default = if cfg.database.type == "mysql" then pkgs.zabbix.server-mysql else pkgs.zabbix.server-pgsql;···
+11
-21
nixos/modules/services/network-filesystems/ceph.nix
+11
-21
nixos/modules/services/network-filesystems/ceph.nix
·········Extra configuration to add to the global section. Use for setting values that are common for all daemons in the cluster.··················
·········Extra configuration to add to the global section. Use for setting values that are common for all daemons in the cluster.··················
-3
nixos/modules/services/network-filesystems/glusterfs.nix
-3
nixos/modules/services/network-filesystems/glusterfs.nix
···
···
+1
-1
nixos/modules/services/network-filesystems/ipfs.nix
+1
-1
nixos/modules/services/network-filesystems/ipfs.nix
+1
-1
nixos/modules/services/network-filesystems/litestream/default.nix
+1
-1
nixos/modules/services/network-filesystems/litestream/default.nix
+7
-8
nixos/modules/services/network-filesystems/openafs/client.nix
+7
-8
nixos/modules/services/network-filesystems/openafs/client.nix
·········
·········
+2
-2
nixos/modules/services/network-filesystems/openafs/server.nix
+2
-2
nixos/modules/services/network-filesystems/openafs/server.nix
······
······
-1
nixos/modules/services/network-filesystems/orangefs/client.nix
-1
nixos/modules/services/network-filesystems/orangefs/client.nix
+5
-8
nixos/modules/services/network-filesystems/orangefs/server.nix
+5
-8
nixos/modules/services/network-filesystems/orangefs/server.nix
···description = "URLs for storage server including port. The attribute names define the server alias.";···
···description = "URLs for storage server including port. The attribute names define the server alias.";···
+3
-3
nixos/modules/services/network-filesystems/samba.nix
+3
-3
nixos/modules/services/network-filesystems/samba.nix
······
······
+2
-4
nixos/modules/services/network-filesystems/tahoe.nix
+2
-4
nixos/modules/services/network-filesystems/tahoe.nix
······
······
+2
-2
nixos/modules/services/network-filesystems/xtreemfs.nix
+2
-2
nixos/modules/services/network-filesystems/xtreemfs.nix
······
······
+3
-16
nixos/modules/services/networking/3proxy.nix
+3
-16
nixos/modules/services/networking/3proxy.nix
············
············
+2
-2
nixos/modules/services/networking/asterisk.nix
+2
-2
nixos/modules/services/networking/asterisk.nix
······
······
+1
-1
nixos/modules/services/networking/atftpd.nix
+1
-1
nixos/modules/services/networking/atftpd.nix
+3
-3
nixos/modules/services/networking/avahi-daemon.nix
+3
-3
nixos/modules/services/networking/avahi-daemon.nix
·········
·········
+2
-2
nixos/modules/services/networking/bee.nix
+2
-2
nixos/modules/services/networking/bee.nix
+1
nixos/modules/services/networking/biboumi.nix
+1
nixos/modules/services/networking/biboumi.nix
···
+2
-2
nixos/modules/services/networking/bind.nix
+2
-2
nixos/modules/services/networking/bind.nix
······
······
+2
-2
nixos/modules/services/networking/bitcoind.nix
+2
-2
nixos/modules/services/networking/bitcoind.nix
······alice.passwordHMAC = "f7efda5c189b999524f151318c0c86$d5b51b3beffbc02b724e5d095828e0bc8b2456e9ac8757ae3211a5d9b16a22ae";bob.passwordHMAC = "b2dd077cb54591a2f3139e69a897ac$4e71f08d48b4347cf8eff3815c0e25ae2e9a4340474079f55705f40574f4ec99";
······alice.passwordHMAC = "f7efda5c189b999524f151318c0c86$d5b51b3beffbc02b724e5d095828e0bc8b2456e9ac8757ae3211a5d9b16a22ae";bob.passwordHMAC = "b2dd077cb54591a2f3139e69a897ac$4e71f08d48b4347cf8eff3815c0e25ae2e9a4340474079f55705f40574f4ec99";
+2
-2
nixos/modules/services/networking/bitlbee.nix
+2
-2
nixos/modules/services/networking/bitlbee.nix
······
······
+6
-9
nixos/modules/services/networking/blockbook-frontend.nix
+6
-9
nixos/modules/services/networking/blockbook-frontend.nix
······See <link xlink:href="https://github.com/trezor/blockbook/blob/master/bchain/coins/blockchain.go#L61"/>············description = "Location of the HTML templates. By default, ones shipped with the package are used.";"alternative_estimate_fee_params" = "{\"url\": \"https://whatthefee.io/data.json\", \"periodSeconds\": 60}";
······See <link xlink:href="https://github.com/trezor/blockbook/blob/master/bchain/coins/blockchain.go#L61"/>············description = "Location of the HTML templates. By default, ones shipped with the package are used.";"alternative_estimate_fee_params" = "{\"url\": \"https://whatthefee.io/data.json\", \"periodSeconds\": 60}";
+2
-2
nixos/modules/services/networking/cjdns.nix
+2
-2
nixos/modules/services/networking/cjdns.nix
······
······
+3
-2
nixos/modules/services/networking/connman.nix
+3
-2
nixos/modules/services/networking/connman.nix
+2
-2
nixos/modules/services/networking/consul.nix
+2
-2
nixos/modules/services/networking/consul.nix
······
······
+1
-1
nixos/modules/services/networking/coredns.nix
+1
-1
nixos/modules/services/networking/coredns.nix
+3
-3
nixos/modules/services/networking/corerad.nix
+3
-3
nixos/modules/services/networking/corerad.nix
······
······
+2
-2
nixos/modules/services/networking/coturn.nix
+2
-2
nixos/modules/services/networking/coturn.nix
······
······
+1
-1
nixos/modules/services/networking/dnscache.nix
+1
-1
nixos/modules/services/networking/dnscache.nix
+3
-3
nixos/modules/services/networking/dnscrypt-proxy2.nix
+3
-3
nixos/modules/services/networking/dnscrypt-proxy2.nix
···For available params, see: <link xlink:href="https://github.com/DNSCrypt/dnscrypt-proxy/blob/${pkgs.dnscrypt-proxy2.version}/dnscrypt-proxy/example-dnscrypt-proxy.toml"/>···-Whether to base the config declared in <literal>services.dnscrypt-proxy2.settings</literal> on the upstream example config (<link xlink:href="https://github.com/DNSCrypt/dnscrypt-proxy/blob/master/dnscrypt-proxy/example-dnscrypt-proxy.toml"/>)···
···For available params, see: <link xlink:href="https://github.com/DNSCrypt/dnscrypt-proxy/blob/${pkgs.dnscrypt-proxy2.version}/dnscrypt-proxy/example-dnscrypt-proxy.toml"/>···+Whether to base the config declared in <option>services.dnscrypt-proxy2.settings</option> on the upstream example config (<link xlink:href="https://github.com/DNSCrypt/dnscrypt-proxy/blob/master/dnscrypt-proxy/example-dnscrypt-proxy.toml"/>)···+defaultText = literalDocBook "TOML file generated from <option>services.dnscrypt-proxy2.settings</option>";
+1
-1
nixos/modules/services/networking/doh-proxy-rust.nix
+1
-1
nixos/modules/services/networking/doh-proxy-rust.nix
···
···
+2
-2
nixos/modules/services/networking/ejabberd.nix
+2
-2
nixos/modules/services/networking/ejabberd.nix
······
······
+1
nixos/modules/services/networking/epmd.nix
+1
nixos/modules/services/networking/epmd.nix
+2
-2
nixos/modules/services/networking/ferm.nix
+2
-2
nixos/modules/services/networking/ferm.nix
···
···
+3
-3
nixos/modules/services/networking/firewall.nix
+3
-3
nixos/modules/services/networking/firewall.nix
······
······
+1
-1
nixos/modules/services/networking/flannel.nix
+1
-1
nixos/modules/services/networking/flannel.nix
+2
-2
nixos/modules/services/networking/ghostunnel.nix
+2
-2
nixos/modules/services/networking/ghostunnel.nix
······
······
+1
-1
nixos/modules/services/networking/globalprotect-vpn.nix
+1
-1
nixos/modules/services/networking/globalprotect-vpn.nix
+2
-2
nixos/modules/services/networking/gnunet.nix
+2
-2
nixos/modules/services/networking/gnunet.nix
···
+1
-1
nixos/modules/services/networking/gobgpd.nix
+1
-1
nixos/modules/services/networking/gobgpd.nix
+1
-1
nixos/modules/services/networking/hans.nix
+1
-1
nixos/modules/services/networking/hans.nix
+4
-4
nixos/modules/services/networking/hylafax/options.nix
+4
-4
nixos/modules/services/networking/hylafax/options.nix
············
············
+1
-1
nixos/modules/services/networking/i2pd.nix
+1
-1
nixos/modules/services/networking/i2pd.nix
+1
-1
nixos/modules/services/networking/icecream/daemon.nix
+1
-1
nixos/modules/services/networking/icecream/daemon.nix
+1
-1
nixos/modules/services/networking/icecream/scheduler.nix
+1
-1
nixos/modules/services/networking/icecream/scheduler.nix
+2
-2
nixos/modules/services/networking/inspircd.nix
+2
-2
nixos/modules/services/networking/inspircd.nix
···
···
+1
-1
nixos/modules/services/networking/iodine.nix
+1
-1
nixos/modules/services/networking/iodine.nix
+2
-2
nixos/modules/services/networking/ircd-hybrid/default.nix
+2
-2
nixos/modules/services/networking/ircd-hybrid/default.nix
······
······
+1
-1
nixos/modules/services/networking/iscsi/initiator.nix
+1
-1
nixos/modules/services/networking/iscsi/initiator.nix
+1
-1
nixos/modules/services/networking/jicofo.nix
+1
-1
nixos/modules/services/networking/jicofo.nix
+3
-3
nixos/modules/services/networking/jitsi-videobridge.nix
+3
-3
nixos/modules/services/networking/jitsi-videobridge.nix
······See <link xlink:href="https://github.com/jitsi/jitsi-videobridge/blob/master/doc/muc.md" /> for more information.···
······See <link xlink:href="https://github.com/jitsi/jitsi-videobridge/blob/master/doc/muc.md" /> for more information.···
+1
-3
nixos/modules/services/networking/keepalived/vrrp-instance-options.nix
+1
-3
nixos/modules/services/networking/keepalived/vrrp-instance-options.nix
+1
-1
nixos/modules/services/networking/keepalived/vrrp-script-options.nix
+1
-1
nixos/modules/services/networking/keepalived/vrrp-script-options.nix
+1
-1
nixos/modules/services/networking/knot.nix
+1
-1
nixos/modules/services/networking/knot.nix
+2
-2
nixos/modules/services/networking/kresd.nix
+2
-2
nixos/modules/services/networking/kresd.nix
+1
-1
nixos/modules/services/networking/lambdabot.nix
+1
-1
nixos/modules/services/networking/lambdabot.nix
+2
-2
nixos/modules/services/networking/libreswan.nix
+2
-2
nixos/modules/services/networking/libreswan.nix
······
······
+1
-1
nixos/modules/services/networking/minidlna.nix
+1
-1
nixos/modules/services/networking/minidlna.nix
+1
-1
nixos/modules/services/networking/miredo.nix
+1
-1
nixos/modules/services/networking/miredo.nix
+2
-5
nixos/modules/services/networking/morty.nix
+2
-5
nixos/modules/services/networking/morty.nix
······-defaultText = "No HMAC url validation. Generate with echo -n somevalue | openssl dgst -sha1 -hmac somekey";···
·········
-2
nixos/modules/services/networking/mosquitto.nix
-2
nixos/modules/services/networking/mosquitto.nix
+1
-1
nixos/modules/services/networking/murmur.nix
+1
-1
nixos/modules/services/networking/murmur.nix
+1
-1
nixos/modules/services/networking/mxisd.nix
+1
-1
nixos/modules/services/networking/mxisd.nix
+1
-1
nixos/modules/services/networking/nat.nix
+1
-1
nixos/modules/services/networking/nat.nix
···description = "Public IPs for NAT reflection; for connections to `loopbackip:sourcePort' from the host itself and from other hosts behind NAT";
+1
-2
nixos/modules/services/networking/nats.nix
+1
-2
nixos/modules/services/networking/nats.nix
+1
-1
nixos/modules/services/networking/ncdns.nix
+1
-1
nixos/modules/services/networking/ncdns.nix
+1
-1
nixos/modules/services/networking/ndppd.nix
+1
-1
nixos/modules/services/networking/ndppd.nix
+6
-8
nixos/modules/services/networking/nebula.nix
+6
-8
nixos/modules/services/networking/nebula.nix
······The static host map defines a set of hosts with fixed IP addresses on the internet (or any network).A host can have multiple fixed IP addresses defined here, and nebula will try each when establishing a tunnel.···List of IPs of lighthouse hosts this node should report to and query from. This should be empty on lighthouse······
······The static host map defines a set of hosts with fixed IP addresses on the internet (or any network).A host can have multiple fixed IP addresses defined here, and nebula will try each when establishing a tunnel.···List of IPs of lighthouse hosts this node should report to and query from. This should be empty on lighthouse······
+1
-1
nixos/modules/services/networking/networkmanager.nix
+1
-1
nixos/modules/services/networking/networkmanager.nix
+2
nixos/modules/services/networking/nftables.nix
+2
nixos/modules/services/networking/nftables.nix
······
······+defaultText = literalDocBook ''a file with the contents of <option>networking.nftables.ruleset</option>'';
+1
-1
nixos/modules/services/networking/ngircd.nix
+1
-1
nixos/modules/services/networking/ngircd.nix
-1
nixos/modules/services/networking/nixops-dns.nix
-1
nixos/modules/services/networking/nixops-dns.nix
+11
-11
nixos/modules/services/networking/nntp-proxy.nix
+11
-11
nixos/modules/services/networking/nntp-proxy.nix
······example = "$6$GtzE7FrpE$wwuVgFYU.TZH4Rz.Snjxk9XGua89IeVwPQ/fEUD8eujr40q5Y021yhn0aNcsQ2Ifw.BLclyzvzgegopgKcneL0";···-passwordHash = "$6$1l0t5Kn2Dk$appzivc./9l/kjq57eg5UCsBKlcfyCr0zNWYNerKoPsI1d7eAwiT0SVsOVx/CTgaBNT/u4fi2vN.iGlPfv1ek0";-passwordHash = "$6$6lwEsWB.TmsS$W7m1riUx4QrA8pKJz8hvff0dnF1NwtZXgdjmGqA1Dx2MDPj07tI9GNcb0SWlMglE.2/hBgynDdAd/XqqtRqVQ0";
······example = "$6$GtzE7FrpE$wwuVgFYU.TZH4Rz.Snjxk9XGua89IeVwPQ/fEUD8eujr40q5Y021yhn0aNcsQ2Ifw.BLclyzvzgegopgKcneL0";···+passwordHash = "$6$1l0t5Kn2Dk$appzivc./9l/kjq57eg5UCsBKlcfyCr0zNWYNerKoPsI1d7eAwiT0SVsOVx/CTgaBNT/u4fi2vN.iGlPfv1ek0";+passwordHash = "$6$6lwEsWB.TmsS$W7m1riUx4QrA8pKJz8hvff0dnF1NwtZXgdjmGqA1Dx2MDPj07tI9GNcb0SWlMglE.2/hBgynDdAd/XqqtRqVQ0";
+4
-4
nixos/modules/services/networking/nomad.nix
+4
-4
nixos/modules/services/networking/nomad.nix
············
············
+2
-4
nixos/modules/services/networking/nsd.nix
+2
-4
nixos/modules/services/networking/nsd.nix
············
············
+1
-1
nixos/modules/services/networking/ntp/chrony.nix
+1
-1
nixos/modules/services/networking/ntp/chrony.nix
+1
-1
nixos/modules/services/networking/ntp/ntpd.nix
+1
-1
nixos/modules/services/networking/ntp/ntpd.nix
+1
-1
nixos/modules/services/networking/ofono.nix
+1
-1
nixos/modules/services/networking/ofono.nix
+1
-2
nixos/modules/services/networking/onedrive.nix
+1
-2
nixos/modules/services/networking/onedrive.nix
+1
-1
nixos/modules/services/networking/openvpn.nix
+1
-1
nixos/modules/services/networking/openvpn.nix
+2
-2
nixos/modules/services/networking/ostinato.nix
+2
-2
nixos/modules/services/networking/ostinato.nix
······
······
+1
-1
nixos/modules/services/networking/pdns-recursor.nix
+1
-1
nixos/modules/services/networking/pdns-recursor.nix
+1
nixos/modules/services/networking/pleroma.nix
+1
nixos/modules/services/networking/pleroma.nix
+1
-1
nixos/modules/services/networking/pppd.nix
+1
-1
nixos/modules/services/networking/pppd.nix
+1
-1
nixos/modules/services/networking/privoxy.nix
+1
-1
nixos/modules/services/networking/privoxy.nix
+2
-2
nixos/modules/services/networking/prosody.nix
+2
-2
nixos/modules/services/networking/prosody.nix
···
+1
-2
nixos/modules/services/networking/quassel.nix
+1
-2
nixos/modules/services/networking/quassel.nix
+2
-2
nixos/modules/services/networking/quorum.nix
+2
-2
nixos/modules/services/networking/quorum.nix
······
······
+3
-3
nixos/modules/services/networking/radicale.nix
+3
-3
nixos/modules/services/networking/radicale.nix
·········
·········
+3
-3
nixos/modules/services/networking/searx.nix
+3
-3
nixos/modules/services/networking/searx.nix
·········
·········
+4
-6
nixos/modules/services/networking/shadowsocks.nix
+4
-6
nixos/modules/services/networking/shadowsocks.nix
······
······
+1
-1
nixos/modules/services/networking/shellhub-agent.nix
+1
-1
nixos/modules/services/networking/shellhub-agent.nix
+1
-1
nixos/modules/services/networking/shorewall.nix
+1
-1
nixos/modules/services/networking/shorewall.nix
+1
-1
nixos/modules/services/networking/shorewall6.nix
+1
-1
nixos/modules/services/networking/shorewall6.nix
+1
-1
nixos/modules/services/networking/skydns.nix
+1
-1
nixos/modules/services/networking/skydns.nix
+1
-1
nixos/modules/services/networking/smartdns.nix
+1
-1
nixos/modules/services/networking/smartdns.nix
+9
-8
nixos/modules/services/networking/smokeping.nix
+9
-8
nixos/modules/services/networking/smokeping.nix
·····················
·····················
+2
-2
nixos/modules/services/networking/sniproxy.nix
+2
-2
nixos/modules/services/networking/sniproxy.nix
······
······
+1
-1
nixos/modules/services/networking/softether.nix
+1
-1
nixos/modules/services/networking/softether.nix
+1
-1
nixos/modules/services/networking/spiped.nix
+1
-1
nixos/modules/services/networking/spiped.nix
+1
-1
nixos/modules/services/networking/strongswan-swanctl/module.nix
+1
-1
nixos/modules/services/networking/strongswan-swanctl/module.nix
+2
-2
nixos/modules/services/networking/strongswan.nix
+2
-2
nixos/modules/services/networking/strongswan.nix
······
······
+1
nixos/modules/services/networking/stunnel.nix
+1
nixos/modules/services/networking/stunnel.nix
+2
-2
nixos/modules/services/networking/supplicant.nix
+2
-2
nixos/modules/services/networking/supplicant.nix
···The configuration options defined declaratively within <literal>networking.supplicant</literal> have···
···The configuration options defined declaratively within <literal>networking.supplicant</literal> have···
+4
-3
nixos/modules/services/networking/supybot.nix
+4
-3
nixos/modules/services/networking/supybot.nix
·········
·········
+5
-5
nixos/modules/services/networking/syncthing.nix
+5
-5
nixos/modules/services/networking/syncthing.nix
···will be reverted on restart if <link linkend="opt-services.syncthing.overrideDevices">overrideDevices</link>·········
···will be reverted on restart if <link linkend="opt-services.syncthing.overrideDevices">overrideDevices</link>·········
+1
-1
nixos/modules/services/networking/tailscale.nix
+1
-1
nixos/modules/services/networking/tailscale.nix
+1
-1
nixos/modules/services/networking/tedicross.nix
+1
-1
nixos/modules/services/networking/tedicross.nix
+1
-1
nixos/modules/services/networking/thelounge.nix
+1
-1
nixos/modules/services/networking/thelounge.nix
+3
-3
nixos/modules/services/networking/tinc.nix
+3
-3
nixos/modules/services/networking/tinc.nix
·········
·········
+1
-1
nixos/modules/services/networking/toxvpn.nix
+1
-1
nixos/modules/services/networking/toxvpn.nix
+1
-1
nixos/modules/services/networking/trickster.nix
+1
-1
nixos/modules/services/networking/trickster.nix
+5
-5
nixos/modules/services/networking/ucarp.nix
+5
-5
nixos/modules/services/networking/ucarp.nix
·········
·········
+2
-2
nixos/modules/services/networking/unbound.nix
+2
-2
nixos/modules/services/networking/unbound.nix
······
······
+3
-3
nixos/modules/services/networking/unifi.nix
+3
-3
nixos/modules/services/networking/unifi.nix
·········
·········
+1
-1
nixos/modules/services/networking/vsftpd.nix
+1
-1
nixos/modules/services/networking/vsftpd.nix
···
···+defaultText = literalExpression ''pkgs.writeText "userlist" (concatMapStrings (x: "''${x}\n") cfg.userlist)'';
+1
-1
nixos/modules/services/networking/websockify.nix
+1
-1
nixos/modules/services/networking/websockify.nix
+4
-12
nixos/modules/services/networking/wg-quick.nix
+4
-12
nixos/modules/services/networking/wg-quick.nix
············
············
+4
-6
nixos/modules/services/networking/wireguard.nix
+4
-6
nixos/modules/services/networking/wireguard.nix
·········
·········
+2
-2
nixos/modules/services/networking/wpa_supplicant.nix
+2
-2
nixos/modules/services/networking/wpa_supplicant.nix
······
······
+8
-7
nixos/modules/services/networking/x2goserver.nix
+8
-7
nixos/modules/services/networking/x2goserver.nix
······
······
+2
-2
nixos/modules/services/networking/xandikos.nix
+2
-2
nixos/modules/services/networking/xandikos.nix
······
······
+1
-1
nixos/modules/services/networking/xrdp.nix
+1
-1
nixos/modules/services/networking/xrdp.nix
+1
-1
nixos/modules/services/networking/yggdrasil.nix
+1
-1
nixos/modules/services/networking/yggdrasil.nix
+2
-4
nixos/modules/services/networking/zeronet.nix
+2
-4
nixos/modules/services/networking/zeronet.nix
···configFile = pkgs.writeText "zeronet.conf" (generators.toINI {} (recursiveUpdate defaultSettings cfg.settings));·········
···configFile = pkgs.writeText "zeronet.conf" (generators.toINI {} (recursiveUpdate defaultSettings cfg.settings));·········
+1
-2
nixos/modules/services/networking/zerotierone.nix
+1
-2
nixos/modules/services/networking/zerotierone.nix
······
······
+3
-3
nixos/modules/services/networking/znc/default.nix
+3
-3
nixos/modules/services/networking/znc/default.nix
·········
·········
+3
-3
nixos/modules/services/networking/znc/options.nix
+3
-3
nixos/modules/services/networking/znc/options.nix
·········
·········
+1
-1
nixos/modules/services/printing/cupsd.nix
+1
-1
nixos/modules/services/printing/cupsd.nix
···
···
+1
-1
nixos/modules/services/scheduling/cron.nix
+1
-1
nixos/modules/services/scheduling/cron.nix
+2
-2
nixos/modules/services/search/elasticsearch.nix
+2
-2
nixos/modules/services/search/elasticsearch.nix
······
······
+13
-11
nixos/modules/services/search/hound.nix
+13
-11
nixos/modules/services/search/hound.nix
······
······
+1
-2
nixos/modules/services/search/kibana.nix
+1
-2
nixos/modules/services/search/kibana.nix
+1
-1
nixos/modules/services/search/solr.nix
+1
-1
nixos/modules/services/search/solr.nix
+2
-2
nixos/modules/services/security/certmgr.nix
+2
-2
nixos/modules/services/security/certmgr.nix
······
+2
-2
nixos/modules/services/security/cfssl.nix
+2
-2
nixos/modules/services/security/cfssl.nix
···
···
+6
-4
nixos/modules/services/security/fail2ban.nix
+6
-4
nixos/modules/services/security/fail2ban.nix
······
······
+2
-2
nixos/modules/services/security/fprintd.nix
+2
-2
nixos/modules/services/security/fprintd.nix
······
···+defaultText = literalExpression "if config.services.fprintd.tod.enable then pkgs.fprintd-tod else pkgs.fprintd";···
+1
-1
nixos/modules/services/security/haka.nix
+1
-1
nixos/modules/services/security/haka.nix
+1
-1
nixos/modules/services/security/hockeypuck.nix
+1
-1
nixos/modules/services/security/hockeypuck.nix
+2
-2
nixos/modules/services/security/nginx-sso.nix
+2
-2
nixos/modules/services/security/nginx-sso.nix
······
······
+1
-1
nixos/modules/services/security/oauth2_proxy.nix
+1
-1
nixos/modules/services/security/oauth2_proxy.nix
-1
nixos/modules/services/security/privacyidea.nix
-1
nixos/modules/services/security/privacyidea.nix
+1
-1
nixos/modules/services/security/shibboleth-sp.nix
+1
-1
nixos/modules/services/security/shibboleth-sp.nix
+2
-2
nixos/modules/services/security/sks.nix
+2
-2
nixos/modules/services/security/sks.nix
······
······
+1
nixos/modules/services/security/step-ca.nix
+1
nixos/modules/services/security/step-ca.nix
+1
-2
nixos/modules/services/security/tor.nix
+1
-2
nixos/modules/services/security/tor.nix
+1
-1
nixos/modules/services/security/usbguard.nix
+1
-1
nixos/modules/services/security/usbguard.nix
+1
-1
nixos/modules/services/security/vault.nix
+1
-1
nixos/modules/services/security/vault.nix
+3
-3
nixos/modules/services/security/vaultwarden/default.nix
+3
-3
nixos/modules/services/security/vaultwarden/default.nix
······
······
+1
-1
nixos/modules/services/security/yubikey-agent.nix
+1
-1
nixos/modules/services/security/yubikey-agent.nix
+1
-1
nixos/modules/services/system/saslauthd.nix
+1
-1
nixos/modules/services/system/saslauthd.nix
+2
-2
nixos/modules/services/torrent/deluge.nix
+2
-2
nixos/modules/services/torrent/deluge.nix
······
······
+1
-1
nixos/modules/services/torrent/flexget.nix
+1
-1
nixos/modules/services/torrent/flexget.nix
+1
-1
nixos/modules/services/torrent/magnetico.nix
+1
-1
nixos/modules/services/torrent/magnetico.nix
+1
-1
nixos/modules/services/torrent/opentracker.nix
+1
-1
nixos/modules/services/torrent/opentracker.nix
+1
-1
nixos/modules/services/torrent/rtorrent.nix
+1
-1
nixos/modules/services/torrent/rtorrent.nix
+1
nixos/modules/services/ttys/getty.nix
+1
nixos/modules/services/ttys/getty.nix
+25
-4
nixos/modules/services/video/epgstation/default.nix
+25
-4
nixos/modules/services/video/epgstation/default.nix
·········
·········
+3
-3
nixos/modules/services/video/mirakurun.nix
+3
-3
nixos/modules/services/video/mirakurun.nix
·········
·········
+1
-1
nixos/modules/services/video/replay-sorcery.nix
+1
-1
nixos/modules/services/video/replay-sorcery.nix
···
···
+3
-3
nixos/modules/services/video/unifi-video.nix
+3
-3
nixos/modules/services/video/unifi-video.nix
·········
·········
+2
-1
nixos/modules/services/wayland/cage.nix
+2
-1
nixos/modules/services/wayland/cage.nix
······
······
+2
-2
nixos/modules/services/web-apps/atlassian/confluence.nix
+2
-2
nixos/modules/services/web-apps/atlassian/confluence.nix
···
···
+2
-2
nixos/modules/services/web-apps/atlassian/crowd.nix
+2
-2
nixos/modules/services/web-apps/atlassian/crowd.nix
···
···
+2
-2
nixos/modules/services/web-apps/atlassian/jira.nix
+2
-2
nixos/modules/services/web-apps/atlassian/jira.nix
···
···
+11
-9
nixos/modules/services/web-apps/bookstack.nix
+11
-9
nixos/modules/services/web-apps/bookstack.nix
······
······
+2
-2
nixos/modules/services/web-apps/cryptpad.nix
+2
-2
nixos/modules/services/web-apps/cryptpad.nix
······
······+defaultText = literalExpression ''"''${package}/lib/node_modules/cryptpad/config/config.example.js"'';
+1
-1
nixos/modules/services/web-apps/dex.nix
+1
-1
nixos/modules/services/web-apps/dex.nix
+13
-12
nixos/modules/services/web-apps/discourse.nix
+13
-12
nixos/modules/services/web-apps/discourse.nix
·········-defaultText = "true, unless services.discourse.sslCertificate and services.discourse.sslCertificateKey are set.";··················
··················+"''${if config.services.discourse.mail.incoming.enable then "notifications" else "noreply"}@''${config.services.discourse.hostname}"···+defaultText = lib.literalExpression ''"%{reply_key}@''${config.services.discourse.hostname}"'';······
+1
nixos/modules/services/web-apps/documize.nix
+1
nixos/modules/services/web-apps/documize.nix
+33
-32
nixos/modules/services/web-apps/dokuwiki.nix
+33
-32
nixos/modules/services/web-apps/dokuwiki.nix
···inherit (lib) mkDefault mkEnableOption mkForce mkIf mkMerge mkOption types maintainers recursiveUpdate;inherit (lib) filterAttrs mapAttrs mapAttrs' mapAttrsToList nameValuePair optional optionalAttrs optionalString;······-url = "https://github.com/real-or-random/dokuwiki-plugin-icalevents/releases/download/2017-06-16/dokuwiki-plugin-icalevents-2017-06-16.zip";···
···inherit (lib) mkDefault mkEnableOption mkForce mkIf mkMerge mkOption types maintainers recursiveUpdate;inherit (lib) filterAttrs mapAttrs mapAttrs' mapAttrsToList nameValuePair optional optionalAttrs optionalString;······+url = "https://github.com/real-or-random/dokuwiki-plugin-icalevents/releases/download/2017-06-16/dokuwiki-plugin-icalevents-2017-06-16.zip";···
+2
-2
nixos/modules/services/web-apps/engelsystem.nix
+2
-2
nixos/modules/services/web-apps/engelsystem.nix
······
······
+6
-4
nixos/modules/services/web-apps/fluidd.nix
+6
-4
nixos/modules/services/web-apps/fluidd.nix
······
······
+2
-1
nixos/modules/services/web-apps/galene.nix
+2
-1
nixos/modules/services/web-apps/galene.nix
······
······
+2
-1
nixos/modules/services/web-apps/gerrit.nix
+2
-1
nixos/modules/services/web-apps/gerrit.nix
···
···
+8
-7
nixos/modules/services/web-apps/hedgedoc.nix
+8
-7
nixos/modules/services/web-apps/hedgedoc.nix
························
························
+1
-1
nixos/modules/services/web-apps/hledger-web.nix
+1
-1
nixos/modules/services/web-apps/hledger-web.nix
+1
-1
nixos/modules/services/web-apps/icingaweb2/icingaweb2.nix
+1
-1
nixos/modules/services/web-apps/icingaweb2/icingaweb2.nix
+2
-2
nixos/modules/services/web-apps/isso.nix
+2
-2
nixos/modules/services/web-apps/isso.nix
+6
-5
nixos/modules/services/web-apps/jirafeau.nix
+6
-5
nixos/modules/services/web-apps/jirafeau.nix
···
···
+2
-2
nixos/modules/services/web-apps/jitsi-meet.nix
+2
-2
nixos/modules/services/web-apps/jitsi-meet.nix
······
······
+2
-1
nixos/modules/services/web-apps/keycloak.nix
+2
-1
nixos/modules/services/web-apps/keycloak.nix
······
······
+5
-5
nixos/modules/services/web-apps/limesurvey.nix
+5
-5
nixos/modules/services/web-apps/limesurvey.nix
············
············
+1
-1
nixos/modules/services/web-apps/mastodon.nix
+1
-1
nixos/modules/services/web-apps/mastodon.nix
+10
-8
nixos/modules/services/web-apps/matomo.nix
+10
-8
nixos/modules/services/web-apps/matomo.nix
······With this option, you can customize an nginx virtualHost which already has sensible defaults for Matomo.
······With this option, you can customize an nginx virtualHost which already has sensible defaults for Matomo.
+6
-5
nixos/modules/services/web-apps/mediawiki.nix
+6
-5
nixos/modules/services/web-apps/mediawiki.nix
···-inherit (lib) concatStringsSep literalExample mapAttrsToList optional optionals optionalString types;············
···+inherit (lib) concatStringsSep literalExpression mapAttrsToList optional optionals optionalString types;············
+1
-1
nixos/modules/services/web-apps/miniflux.nix
+1
-1
nixos/modules/services/web-apps/miniflux.nix
+1
-1
nixos/modules/services/web-apps/moinmoin.nix
+1
-1
nixos/modules/services/web-apps/moinmoin.nix
+5
-5
nixos/modules/services/web-apps/moodle.nix
+5
-5
nixos/modules/services/web-apps/moodle.nix
···············
···············
+2
-2
nixos/modules/services/web-apps/nextcloud.nix
+2
-2
nixos/modules/services/web-apps/nextcloud.nix
···This is sometimes necessary to be able to install a certain nextcloud app that has additional requirements.
···This is sometimes necessary to be able to install a certain nextcloud app that has additional requirements.
+22
nixos/modules/services/web-apps/nexus.nix
+22
nixos/modules/services/web-apps/nexus.nix
······
+3
-3
nixos/modules/services/web-apps/node-red.nix
+3
-3
nixos/modules/services/web-apps/node-red.nix
·········
·········
+1
-1
nixos/modules/services/web-apps/pgpkeyserver-lite.nix
+1
-1
nixos/modules/services/web-apps/pgpkeyserver-lite.nix
+2
nixos/modules/services/web-apps/plantuml-server.nix
+2
nixos/modules/services/web-apps/plantuml-server.nix
······
······
-3
nixos/modules/services/web-apps/restya-board.nix
-3
nixos/modules/services/web-apps/restya-board.nix
·········
·········
+1
-3
nixos/modules/services/web-apps/rss-bridge.nix
+1
-3
nixos/modules/services/web-apps/rss-bridge.nix
·········
·········
-1
nixos/modules/services/web-apps/selfoss.nix
-1
nixos/modules/services/web-apps/selfoss.nix
+1
-1
nixos/modules/services/web-apps/shiori.nix
+1
-1
nixos/modules/services/web-apps/shiori.nix
-2
nixos/modules/services/web-apps/tt-rss.nix
-2
nixos/modules/services/web-apps/tt-rss.nix
······
······
+3
-3
nixos/modules/services/web-apps/vikunja.nix
+3
-3
nixos/modules/services/web-apps/vikunja.nix
······
······
+1
-1
nixos/modules/services/web-apps/whitebophir.nix
+1
-1
nixos/modules/services/web-apps/whitebophir.nix
+36
-35
nixos/modules/services/web-apps/wordpress.nix
+36
-35
nixos/modules/services/web-apps/wordpress.nix
···inherit (lib) filterAttrs mapAttrs mapAttrs' mapAttrsToList nameValuePair optional optionalAttrs optionalString;···············
···inherit (lib) filterAttrs mapAttrs mapAttrs' mapAttrsToList nameValuePair optional optionalAttrs optionalString;···············
+2
-2
nixos/modules/services/web-apps/youtrack.nix
+2
-2
nixos/modules/services/web-apps/youtrack.nix
······
······
+3
-3
nixos/modules/services/web-apps/zabbix.nix
+3
-3
nixos/modules/services/web-apps/zabbix.nix
·········
·········
+13
-6
nixos/modules/services/web-servers/apache-httpd/default.nix
+13
-6
nixos/modules/services/web-servers/apache-httpd/default.nix
···············
···············
+2
-2
nixos/modules/services/web-servers/apache-httpd/vhost-options.nix
+2
-2
nixos/modules/services/web-servers/apache-httpd/vhost-options.nix
······
······
+2
-3
nixos/modules/services/web-servers/caddy/default.nix
+2
-3
nixos/modules/services/web-servers/caddy/default.nix
······
······
+7
-5
nixos/modules/services/web-servers/lighttpd/cgit.nix
+7
-5
nixos/modules/services/web-servers/lighttpd/cgit.nix
···
···
+1
-1
nixos/modules/services/web-servers/minio.nix
+1
-1
nixos/modules/services/web-servers/minio.nix
+1
-1
nixos/modules/services/web-servers/molly-brown.nix
+1
-1
nixos/modules/services/web-servers/molly-brown.nix
···
···
+5
-5
nixos/modules/services/web-servers/nginx/default.nix
+5
-5
nixos/modules/services/web-servers/nginx/default.nix
······Additional <link xlink:href="https://www.nginx.com/resources/wiki/modules/">third-party nginx modules</link>·········
······Additional <link xlink:href="https://www.nginx.com/resources/wiki/modules/">third-party nginx modules</link>·········
+1
-1
nixos/modules/services/web-servers/nginx/location-options.nix
+1
-1
nixos/modules/services/web-servers/nginx/location-options.nix
+3
-3
nixos/modules/services/web-servers/nginx/vhost-options.nix
+3
-3
nixos/modules/services/web-servers/nginx/vhost-options.nix
·········
·········
+5
-5
nixos/modules/services/web-servers/phpfpm/default.nix
+5
-5
nixos/modules/services/web-servers/phpfpm/default.nix
···············
···············
+4
-4
nixos/modules/services/web-servers/tomcat.nix
+4
-4
nixos/modules/services/web-servers/tomcat.nix
······description = "List containing WAR files or directories with WAR files which are web applications to be deployed on Tomcat";···
······description = "List containing WAR files or directories with WAR files which are web applications to be deployed on Tomcat";···
+3
-3
nixos/modules/services/web-servers/traefik.nix
+3
-3
nixos/modules/services/web-servers/traefik.nix
·········
·········
+22
-18
nixos/modules/services/web-servers/trafficserver/default.nix
+22
-18
nixos/modules/services/web-servers/trafficserver/default.nix
············
············
+1
-1
nixos/modules/services/web-servers/ttyd.nix
+1
-1
nixos/modules/services/web-servers/ttyd.nix
+2
-2
nixos/modules/services/web-servers/unit/default.nix
+2
-2
nixos/modules/services/web-servers/unit/default.nix
+2
-2
nixos/modules/services/web-servers/uwsgi.nix
+2
-2
nixos/modules/services/web-servers/uwsgi.nix
······
······
+2
-2
nixos/modules/services/web-servers/varnish/default.nix
+2
-2
nixos/modules/services/web-servers/varnish/default.nix
······
······
+1
-1
nixos/modules/services/web-servers/zope2.nix
+1
-1
nixos/modules/services/web-servers/zope2.nix
+1
-1
nixos/modules/services/x11/desktop-managers/cde.nix
+1
-1
nixos/modules/services/x11/desktop-managers/cde.nix
+2
-2
nixos/modules/services/x11/desktop-managers/cinnamon.nix
+2
-2
nixos/modules/services/x11/desktop-managers/cinnamon.nix
······
······
+10
-8
nixos/modules/services/x11/desktop-managers/gnome.nix
+10
-8
nixos/modules/services/x11/desktop-managers/gnome.nix
······description = "List of desktop files to put as favorite apps into gnome-shell. These need to be installed somehow globally.";······Packages containing modules that should be made available to <literal>gnome-panel</literal> (usually for applets).If you're packaging something to use here, please install the modules in <literal>$out/lib/gnome-panel/modules</literal>.
······description = "List of desktop files to put as favorite apps into gnome-shell. These need to be installed somehow globally.";······Packages containing modules that should be made available to <literal>gnome-panel</literal> (usually for applets).If you're packaging something to use here, please install the modules in <literal>$out/lib/gnome-panel/modules</literal>.
+2
-2
nixos/modules/services/x11/desktop-managers/kodi.nix
+2
-2
nixos/modules/services/x11/desktop-managers/kodi.nix
···+example = literalExpression "pkgs.kodi.withPackages (p: with p; [ jellyfin pvr-iptvsimple vfs-sftp ])";
+1
-1
nixos/modules/services/x11/desktop-managers/lxqt.nix
+1
-1
nixos/modules/services/x11/desktop-managers/lxqt.nix
+1
-1
nixos/modules/services/x11/desktop-managers/mate.nix
+1
-1
nixos/modules/services/x11/desktop-managers/mate.nix
+2
-2
nixos/modules/services/x11/desktop-managers/pantheon.nix
+2
-2
nixos/modules/services/x11/desktop-managers/pantheon.nix
······
······
+2
-1
nixos/modules/services/x11/desktop-managers/surf-display.nix
+2
-1
nixos/modules/services/x11/desktop-managers/surf-display.nix
······
···+defaultText = literalExpression ''"''${pkgs.surf-display}/share/surf-display/empty-page.html"'';···
+1
-1
nixos/modules/services/x11/desktop-managers/xfce.nix
+1
-1
nixos/modules/services/x11/desktop-managers/xfce.nix
+2
-2
nixos/modules/services/x11/desktop-managers/xterm.nix
+2
-2
nixos/modules/services/x11/desktop-managers/xterm.nix
···-defaultText = if versionOlder config.system.stateVersion "19.09" then "config.services.xserver.enable" else "false";
···+defaultText = literalExpression ''versionOlder config.system.stateVersion "19.09" && config.services.xserver.enable;'';
+2
-4
nixos/modules/services/x11/display-managers/default.nix
+2
-4
nixos/modules/services/x11/display-managers/default.nix
······
······
+3
-3
nixos/modules/services/x11/display-managers/lightdm-greeters/enso-os.nix
+3
-3
nixos/modules/services/x11/display-managers/lightdm-greeters/enso-os.nix
·········
·········
+3
-3
nixos/modules/services/x11/display-managers/lightdm-greeters/gtk.nix
+3
-3
nixos/modules/services/x11/display-managers/lightdm-greeters/gtk.nix
·········
·········
+1
-1
nixos/modules/services/x11/display-managers/lightdm.nix
+1
-1
nixos/modules/services/x11/display-managers/lightdm.nix
···
···+defaultText = literalExpression "pkgs.nixos-artwork.wallpapers.simple-dark-gray-bottom.gnomeFilePath";
+6
-8
nixos/modules/services/x11/display-managers/sddm.nix
+6
-8
nixos/modules/services/x11/display-managers/sddm.nix
+1
-1
nixos/modules/services/x11/extra-layouts.nix
+1
-1
nixos/modules/services/x11/extra-layouts.nix
+11
-9
nixos/modules/services/x11/imwheel.nix
+11
-9
nixos/modules/services/x11/imwheel.nix
···
···
+1
-1
nixos/modules/services/x11/picom.nix
+1
-1
nixos/modules/services/x11/picom.nix
+1
-1
nixos/modules/services/x11/redshift.nix
+1
-1
nixos/modules/services/x11/redshift.nix
+1
-1
nixos/modules/services/x11/touchegg.nix
+1
-1
nixos/modules/services/x11/touchegg.nix
+1
-1
nixos/modules/services/x11/unclutter-xfixes.nix
+1
-1
nixos/modules/services/x11/unclutter-xfixes.nix
+1
-1
nixos/modules/services/x11/unclutter.nix
+1
-1
nixos/modules/services/x11/unclutter.nix
+1
-1
nixos/modules/services/x11/urxvtd.nix
+1
-1
nixos/modules/services/x11/urxvtd.nix
+1
-1
nixos/modules/services/x11/window-managers/awesome.nix
+1
-1
nixos/modules/services/x11/window-managers/awesome.nix
+6
-6
nixos/modules/services/x11/window-managers/bspwm.nix
+6
-6
nixos/modules/services/x11/window-managers/bspwm.nix
······
······
+1
-1
nixos/modules/services/x11/window-managers/clfswm.nix
+1
-1
nixos/modules/services/x11/window-managers/clfswm.nix
+4
-3
nixos/modules/services/x11/window-managers/exwm.nix
+4
-3
nixos/modules/services/x11/window-managers/exwm.nix
······
······
+1
-1
nixos/modules/services/x11/window-managers/herbstluftwm.nix
+1
-1
nixos/modules/services/x11/window-managers/herbstluftwm.nix
+3
-3
nixos/modules/services/x11/window-managers/i3.nix
+3
-3
nixos/modules/services/x11/window-managers/i3.nix
······
······
+1
-1
nixos/modules/services/x11/window-managers/wmderland.nix
+1
-1
nixos/modules/services/x11/window-managers/wmderland.nix
+5
-5
nixos/modules/services/x11/window-managers/xmonad.nix
+5
-5
nixos/modules/services/x11/window-managers/xmonad.nix
·········
·········
+4
-3
nixos/modules/services/x11/xautolock.nix
+4
-3
nixos/modules/services/x11/xautolock.nix
·········
·········
+3
-2
nixos/modules/services/x11/xserver.nix
+3
-2
nixos/modules/services/x11/xserver.nix
·········
·········
+4
-5
nixos/modules/system/activation/activation-script.nix
+4
-5
nixos/modules/system/activation/activation-script.nix
·········
·········
+7
-3
nixos/modules/system/activation/top-level.nix
+7
-3
nixos/modules/system/activation/top-level.nix
···-example = lib.literalExample "{ fewJobsManyCores.configuration = { nix.buildCores = 0; nix.maxJobs = 1; }; }";···-example = lib.literalExample "[ ({ original = pkgs.openssl; replacement = pkgs.callPackage /path/to/openssl { }; }) ]";···
···+example = lib.literalExpression "{ fewJobsManyCores.configuration = { nix.buildCores = 0; nix.maxJobs = 1; }; }";···+example = lib.literalExpression "[ ({ original = pkgs.openssl; replacement = pkgs.callPackage /path/to/openssl { }; }) ]";···
+1
-1
nixos/modules/system/boot/initrd-openvpn.nix
+1
-1
nixos/modules/system/boot/initrd-openvpn.nix
+1
-1
nixos/modules/system/boot/initrd-ssh.nix
+1
-1
nixos/modules/system/boot/initrd-ssh.nix
···
+6
-6
nixos/modules/system/boot/kernel.nix
+6
-6
nixos/modules/system/boot/kernel.nix
···············
···············
+1
-1
nixos/modules/system/boot/kernel_config.nix
+1
-1
nixos/modules/system/boot/kernel_config.nix
+6
-6
nixos/modules/system/boot/loader/grub/grub.nix
+6
-6
nixos/modules/system/boot/loader/grub/grub.nix
··················
··················
+1
-1
nixos/modules/system/boot/loader/grub/ipxe.nix
+1
-1
nixos/modules/system/boot/loader/grub/ipxe.nix
-2
nixos/modules/system/boot/luksroot.nix
-2
nixos/modules/system/boot/luksroot.nix
+4
-8
nixos/modules/system/boot/networkd.nix
+4
-8
nixos/modules/system/boot/networkd.nix
··················-example = { routingPolicyRuleConfig = { Table = 10; IncomingInterface = "eth1"; Family = "both"; } ;};······
························
+2
-1
nixos/modules/system/boot/plymouth.nix
+2
-1
nixos/modules/system/boot/plymouth.nix
······
···+defaultText = literalExpression ''"''${pkgs.dejavu_fonts.minimal}/share/fonts/truetype/DejaVuSans.ttf"'';···
+3
-3
nixos/modules/system/boot/stage-1.nix
+3
-3
nixos/modules/system/boot/stage-1.nix
·········
······+defaultText = literalDocBook "<literal>zstd</literal> if the kernel supports it (5.9+), <literal>gzip</literal> if not";···
+5
-5
nixos/modules/system/boot/systemd.nix
+5
-5
nixos/modules/system/boot/systemd.nix
···············
···············
+1
-1
nixos/modules/system/etc/etc.nix
+1
-1
nixos/modules/system/etc/etc.nix
+1
-1
nixos/modules/tasks/filesystems.nix
+1
-1
nixos/modules/tasks/filesystems.nix
+1
-1
nixos/modules/tasks/filesystems/nfs.nix
+1
-1
nixos/modules/tasks/filesystems/nfs.nix
+2
-3
nixos/modules/tasks/filesystems/zfs.nix
+2
-3
nixos/modules/tasks/filesystems/zfs.nix
·········
···+defaultText = literalExpression "if config.boot.zfs.enableUnstable then pkgs.zfsUnstable else pkgs.zfs";······
+1
-1
nixos/modules/tasks/lvm.nix
+1
-1
nixos/modules/tasks/lvm.nix
···
···
+9
-10
nixos/modules/tasks/network-interfaces.nix
+9
-10
nixos/modules/tasks/network-interfaces.nix
······························
······························
+1
-1
nixos/modules/virtualisation/anbox.nix
+1
-1
nixos/modules/virtualisation/anbox.nix
+4
-4
nixos/modules/virtualisation/containers.nix
+4
-4
nixos/modules/virtualisation/containers.nix
·········
·········
+4
-4
nixos/modules/virtualisation/cri-o.nix
+4
-4
nixos/modules/virtualisation/cri-o.nix
···
···
+1
-1
nixos/modules/virtualisation/digital-ocean-init.nix
+1
-1
nixos/modules/virtualisation/digital-ocean-init.nix
···
···
+2
-1
nixos/modules/virtualisation/docker.nix
+2
-1
nixos/modules/virtualisation/docker.nix
+1
-1
nixos/modules/virtualisation/ecs-agent.nix
+1
-1
nixos/modules/virtualisation/ecs-agent.nix
+2
-1
nixos/modules/virtualisation/libvirtd.nix
+2
-1
nixos/modules/virtualisation/libvirtd.nix
······
······
+3
-3
nixos/modules/virtualisation/lxd.nix
+3
-3
nixos/modules/virtualisation/lxd.nix
·········
·········
+3
-3
nixos/modules/virtualisation/nixos-containers.nix
+3
-3
nixos/modules/virtualisation/nixos-containers.nix
·········
·········
+8
-8
nixos/modules/virtualisation/oci-containers.nix
+8
-8
nixos/modules/virtualisation/oci-containers.nix
·····················Use the same name as the attribute under <literal>virtualisation.oci-containers.containers</literal>.···
·····················Use the same name as the attribute under <literal>virtualisation.oci-containers.containers</literal>.···
+1
-1
nixos/modules/virtualisation/openvswitch.nix
+1
-1
nixos/modules/virtualisation/openvswitch.nix
+1
-2
nixos/modules/virtualisation/parallels-guest.nix
+1
-2
nixos/modules/virtualisation/parallels-guest.nix
···
+1
-1
nixos/modules/virtualisation/podman.nix
+1
-1
nixos/modules/virtualisation/podman.nix
+1
nixos/modules/virtualisation/qemu-guest-agent.nix
+1
nixos/modules/virtualisation/qemu-guest-agent.nix
+1
-1
nixos/modules/virtualisation/qemu-vm.nix
+1
-1
nixos/modules/virtualisation/qemu-vm.nix
+3
-4
nixos/modules/virtualisation/railcar.nix
+3
-4
nixos/modules/virtualisation/railcar.nix
·········
·········
+1
-1
nixos/modules/virtualisation/virtualbox-host.nix
+1
-1
nixos/modules/virtualisation/virtualbox-host.nix
+4
-4
nixos/modules/virtualisation/xen-dom0.nix
+4
-4
nixos/modules/virtualisation/xen-dom0.nix
······
······