+5
lib/trivial.nix
+5
lib/trivial.nix
···
+1
-1
nixos/modules/config/fonts/fontconfig-penultimate.nix
+1
-1
nixos/modules/config/fonts/fontconfig-penultimate.nix
+1
-1
nixos/modules/config/fonts/fontconfig.nix
+1
-1
nixos/modules/config/fonts/fontconfig.nix
+7
-7
nixos/modules/services/cluster/kubernetes.nix
+7
-7
nixos/modules/services/cluster/kubernetes.nix
···············
+1
-1
nixos/modules/services/continuous-integration/hydra/default.nix
+1
-1
nixos/modules/services/continuous-integration/hydra/default.nix
···-{ ExecStart = "@${cfg.package}/bin/hydra-queue-runner hydra-queue-runner -v --option build-use-substitutes ${if cfg.useSubstitutes then "true" else "false"}";+{ ExecStart = "@${cfg.package}/bin/hydra-queue-runner hydra-queue-runner -v --option build-use-substitutes ${boolToString cfg.useSubstitutes}";
+4
-4
nixos/modules/services/databases/cassandra.nix
+4
-4
nixos/modules/services/databases/cassandra.nix
·········
-2
nixos/modules/services/databases/mongodb.nix
-2
nixos/modules/services/databases/mongodb.nix
+2
-3
nixos/modules/services/logging/graylog.nix
+2
-3
nixos/modules/services/logging/graylog.nix
···-elasticsearch_discovery_zen_ping_multicast_enabled = ${configBool cfg.elasticsearchDiscoveryZenPingMulticastEnabled}+elasticsearch_discovery_zen_ping_multicast_enabled = ${boolToString cfg.elasticsearchDiscoveryZenPingMulticastEnabled}elasticsearch_discovery_zen_ping_unicast_hosts = ${cfg.elasticsearchDiscoveryZenPingUnicastHosts}
+1
-1
nixos/modules/services/misc/cgminer.nix
+1
-1
nixos/modules/services/misc/cgminer.nix
···
+1
-1
nixos/modules/services/misc/confd.nix
+1
-1
nixos/modules/services/misc/confd.nix
+12
-13
nixos/modules/services/misc/matrix-synapse.nix
+12
-13
nixos/modules/services/misc/matrix-synapse.nix
···-mkListener = l: ''{port: ${toString l.port}, bind_address: "${l.bind_address}", type: ${l.type}, tls: ${fromBool l.tls}, x_forwarded: ${fromBool l.x_forwarded}, resources: [${concatStringsSep "," (map mkResource l.resources)}]}'';+mkListener = l: ''{port: ${toString l.port}, bind_address: "${l.bind_address}", type: ${l.type}, tls: ${boolToString l.tls}, x_forwarded: ${boolToString l.x_forwarded}, resources: [${concatStringsSep "," (map mkResource l.resources)}]}'';···············
+2
-2
nixos/modules/services/misc/nix-daemon.nix
+2
-2
nixos/modules/services/misc/nix-daemon.nix
···-build-use-sandbox = ${if (builtins.isBool cfg.useSandbox) then (if cfg.useSandbox then "true" else "false") else cfg.useSandbox}+build-use-sandbox = ${if (builtins.isBool cfg.useSandbox) then boolToString cfg.useSandbox else cfg.useSandbox}
+1
-1
nixos/modules/services/misc/taskserver/default.nix
+1
-1
nixos/modules/services/misc/taskserver/default.nix
···
+1
-1
nixos/modules/services/monitoring/collectd.nix
+1
-1
nixos/modules/services/monitoring/collectd.nix
···
+5
-7
nixos/modules/services/monitoring/grafana.nix
+5
-7
nixos/modules/services/monitoring/grafana.nix
······
+1
-1
nixos/modules/services/network-filesystems/netatalk.nix
+1
-1
nixos/modules/services/network-filesystems/netatalk.nix
+1
-1
nixos/modules/services/network-filesystems/samba.nix
+1
-1
nixos/modules/services/network-filesystems/samba.nix
+3
-3
nixos/modules/services/network-filesystems/tahoe.nix
+3
-3
nixos/modules/services/network-filesystems/tahoe.nix
···
+7
-8
nixos/modules/services/networking/aiccu.nix
+7
-8
nixos/modules/services/networking/aiccu.nix
······
+4
-5
nixos/modules/services/networking/btsync.nix
+4
-5
nixos/modules/services/networking/btsync.nix
·········
+1
-1
nixos/modules/services/networking/firefox/sync-server.nix
+1
-1
nixos/modules/services/networking/firefox/sync-server.nix
···
+9
-11
nixos/modules/services/networking/i2pd.nix
+9
-11
nixos/modules/services/networking/i2pd.nix
···extip = "EXTIP=\$(${pkgs.curl.bin}/bin/curl -sLf \"http://jsonip.com\" | ${pkgs.gawk}/bin/awk -F'\"' '{print $4}')";·········
+1
-1
nixos/modules/services/networking/ircd-hybrid/default.nix
+1
-1
nixos/modules/services/networking/ircd-hybrid/default.nix
···
+1
-1
nixos/modules/services/networking/mosquitto.nix
+1
-1
nixos/modules/services/networking/mosquitto.nix
+5
-5
nixos/modules/services/networking/murmur.nix
+5
-5
nixos/modules/services/networking/murmur.nix
···
+2
-2
nixos/modules/services/networking/prosody.nix
+2
-2
nixos/modules/services/networking/prosody.nix
······
+1
-1
nixos/modules/services/networking/sslh.nix
+1
-1
nixos/modules/services/networking/sslh.nix
+1
-1
nixos/modules/services/networking/znc.nix
+1
-1
nixos/modules/services/networking/znc.nix
+7
-10
nixos/modules/services/security/oauth2_proxy.nix
+7
-10
nixos/modules/services/security/oauth2_proxy.nix
······${optionalString (!isNull cfg.customTemplatesDir) "--custom-templates-dir='${cfg.customTemplatesDir}'"} \-${optionalString (!isNull cfg.htpasswd.file) "--htpasswd-file='${cfg.htpasswd.file}' --display-htpasswd-form=${fromBool cfg.htpasswd.displayForm}"} \+${optionalString (!isNull cfg.htpasswd.file) "--htpasswd-file='${cfg.htpasswd.file}' --display-htpasswd-form=${boolToString cfg.htpasswd.displayForm}"} \
+1
-2
nixos/modules/services/torrent/transmission.nix
+1
-2
nixos/modules/services/torrent/transmission.nix
+1
-1
nixos/modules/services/web-apps/atlassian/crowd.nix
+1
-1
nixos/modules/services/web-apps/atlassian/crowd.nix
···--e 's,compression="on",compression="off" protocol="HTTP/1.1" proxyName="${cfg.proxy.name}" proxyPort="${toString cfg.proxy.port}" scheme="${cfg.proxy.scheme}" secure="${if cfg.proxy.secure then "true" else "false"}",' \+-e 's,compression="on",compression="off" protocol="HTTP/1.1" proxyName="${cfg.proxy.name}" proxyPort="${toString cfg.proxy.port}" scheme="${cfg.proxy.scheme}" secure="${boolToString cfg.proxy.secure}",' \
+2
-2
nixos/modules/services/web-apps/quassel-webserver.nix
+2
-2
nixos/modules/services/web-apps/quassel-webserver.nix
···initialBacklogLimit: ${toString cfg.initialBacklogLimit}, // Amount of backlogs to fetch per buffer on connectionbacklogLimit: ${toString cfg.backlogLimit}, // Amount of backlogs to fetch per buffer after first retrieval-forcedefault: ${if cfg.forceHostAndPort then "true" else "false"}, // Will force default host and port to be used, and will hide the corresponding fields in the UI+forcedefault: ${boolToString cfg.forceHostAndPort}, // Will force default host and port to be used, and will hide the corresponding fields in the UI
-2
nixos/modules/services/web-apps/tt-rss.nix
-2
nixos/modules/services/web-apps/tt-rss.nix
+1
-1
nixos/modules/services/x11/display-managers/sddm.nix
+1
-1
nixos/modules/services/x11/display-managers/sddm.nix
+1
-1
nixos/modules/services/x11/hardware/multitouch.nix
+1
-1
nixos/modules/services/x11/hardware/multitouch.nix
···
+1
-1
pkgs/development/java-modules/build-maven-package.nix
+1
-1
pkgs/development/java-modules/build-maven-package.nix
···-${maven}/bin/mvn ${optionalString (quiet) "-q"} clean package -Dmaven.test.skip=${if skipTests then "true" else "false"} -Danimal.sniffer.skip=true -gs $out/m2/settings.xml+${maven}/bin/mvn ${optionalString (quiet) "-q"} clean package -Dmaven.test.skip=${boolToString skipTests} -Danimal.sniffer.skip=true -gs $out/m2/settings.xml
+6
-4
pkgs/development/ocaml-modules/mtime/default.nix
+6
-4
pkgs/development/ocaml-modules/mtime/default.nix
······-buildPhase = "ocaml pkg/build.ml native=true native-dynlink=true jsoo=${if jsooSupport then "true" else "false"}";+buildPhase = "ocaml pkg/build.ml native=true native-dynlink=true jsoo=${boolToString jsooSupport}";···
+1
-1
pkgs/development/ocaml-modules/nocrypto/default.nix
+1
-1
pkgs/development/ocaml-modules/nocrypto/default.nix
+1
-1
pkgs/development/ocaml-modules/notty/default.nix
+1
-1
pkgs/development/ocaml-modules/notty/default.nix
+8
-6
pkgs/development/ocaml-modules/vg/default.nix
+8
-6
pkgs/development/ocaml-modules/vg/default.nix
·········