+3
-3
nixos/modules/config/i18n.nix
+3
-3
nixos/modules/config/i18n.nix
···-can be found at <link xlink:href="https://sourceware.org/git/?p=glibc.git;a=blob;f=localedata/SUPPORTED"/>.
···
+3
-3
nixos/modules/config/resolvconf.nix
+3
-3
nixos/modules/config/resolvconf.nix
···
···
+2
-2
nixos/modules/config/shells-environment.nix
+2
-2
nixos/modules/config/shells-environment.nix
···
···
+4
-4
nixos/modules/config/system-environment.nix
+4
-4
nixos/modules/config/system-environment.nix
······
······
+19
-19
nixos/modules/config/users-groups.nix
+19
-19
nixos/modules/config/users-groups.nix
·········
·········
+1
-1
nixos/modules/hardware/logitech.nix
+1
-1
nixos/modules/hardware/logitech.nix
+6
-6
nixos/modules/hardware/video/uvcvideo/default.nix
+6
-6
nixos/modules/hardware/video/uvcvideo/default.nix
···
···
+2
-2
nixos/modules/programs/adb.nix
+2
-2
nixos/modules/programs/adb.nix
···
···
+2
-2
nixos/modules/programs/firejail.nix
+2
-2
nixos/modules/programs/firejail.nix
···
···
+2
-2
nixos/modules/programs/gphoto2.nix
+2
-2
nixos/modules/programs/gphoto2.nix
···
···
+2
-2
nixos/modules/programs/neovim.nix
+2
-2
nixos/modules/programs/neovim.nix
+9
-9
nixos/modules/programs/nncp.nix
+9
-9
nixos/modules/programs/nncp.nix
···
···
+3
-3
nixos/modules/programs/turbovnc.nix
+3
-3
nixos/modules/programs/turbovnc.nix
···
···
+2
-2
nixos/modules/security/acme/default.nix
+2
-2
nixos/modules/security/acme/default.nix
+30
-30
nixos/modules/security/doas.nix
+30
-30
nixos/modules/security/doas.nix
·····················
·····················
+2
-2
nixos/modules/security/misc.nix
+2
-2
nixos/modules/security/misc.nix
······
······
+50
-50
nixos/modules/security/pam.nix
+50
-50
nixos/modules/security/pam.nix
······-More information can be found <link xlink:href="https://github.com/OpenSC/pam_p11">here</link>.···-<literal>username:first_keyHandle,first_public_key: second_keyHandle,second_public_key</literal>-More information can be found <link xlink:href="https://developers.yubico.com/pam-u2f/">here</link>.-<literal>username:first_keyHandle,first_public_key: second_keyHandle,second_public_key</literal>-More information can be found <link xlink:href="https://developers.yubico.com/pam-u2f/">here</link>.-More information can be found <link xlink:href="https://developers.yubico.com/pam-u2f/Manuals/pam_u2f.8.html">here</link>-More information can be found <link xlink:href="https://developers.yubico.com/pam-u2f/Manuals/pam_u2f.8.html">here</link>···-More information can be found <link xlink:href="https://github.com/uber/pam-ussh">here</link>.···-More information can be found <link xlink:href="https://developers.yubico.com/yubico-pam/">here</link>.······-More information can be found <link xlink:href="https://developers.yubico.com/yubico-pam/Authentication_Using_Challenge-Response.html">here</link>.If not null, set the path used by yubico pam module where the challenge expected response is stored.-More information can be found <link xlink:href="https://developers.yubico.com/yubico-pam/Authentication_Using_Challenge-Response.html">here</link>.
·········+More information can be found [here](https://developers.yubico.com/pam-u2f/Manuals/pam_u2f.8.html)+More information can be found [here](https://developers.yubico.com/pam-u2f/Manuals/pam_u2f.8.html)············+More information can be found [here](https://developers.yubico.com/yubico-pam/Authentication_Using_Challenge-Response.html).If not null, set the path used by yubico pam module where the challenge expected response is stored.+More information can be found [here](https://developers.yubico.com/yubico-pam/Authentication_Using_Challenge-Response.html).
+6
-6
nixos/modules/security/pam_mount.nix
+6
-6
nixos/modules/security/pam_mount.nix
···-For more information, visit <link xlink:href="http://pam-mount.sourceforge.net/pam_mount.conf.5.html"/>.···-For more information, visit <link xlink:href="http://pam-mount.sourceforge.net/pam_mount.conf.5.html"/>.-For more information, visit <link xlink:href="http://pam-mount.sourceforge.net/pam_mount.conf.5.html"/>.
······
+2
-2
nixos/modules/security/pam_usb.nix
+2
-2
nixos/modules/security/pam_usb.nix
···-more information, visit <link xlink:href="https://github.com/aluzzardi/pam_usb/wiki/Getting-Started#setting-up-devices-and-users"/>.
+10
-10
nixos/modules/security/sudo.nix
+10
-10
nixos/modules/security/sudo.nix
······
······
+1
-1
nixos/modules/services/backup/restic.nix
+1
-1
nixos/modules/services/backup/restic.nix
+1
-1
nixos/modules/services/backup/syncoid.nix
+1
-1
nixos/modules/services/backup/syncoid.nix
+2
-2
nixos/modules/services/backup/zrepl.nix
+2
-2
nixos/modules/services/backup/zrepl.nix
+2
-2
nixos/modules/services/continuous-integration/github-runner.nix
+2
-2
nixos/modules/services/continuous-integration/github-runner.nix
···Note: GitHub recommends using self-hosted runners with private repositories only. Learn more here:-<link xlink:href="https://docs.github.com/en/actions/hosting-your-own-runners/about-self-hosted-runners">About self-hosted runners</link>.
···Note: GitHub recommends using self-hosted runners with private repositories only. Learn more here:+[About self-hosted runners](https://docs.github.com/en/actions/hosting-your-own-runners/about-self-hosted-runners).
+47
-47
nixos/modules/services/continuous-integration/gitlab-runner.nix
+47
-47
nixos/modules/services/continuous-integration/gitlab-runner.nix
······-<link xlink:href="https://docs.gitlab.com/runner/configuration/advanced-configuration.html#the-global-section"/>···············-See <link xlink:href="https://docs.gitlab.com/runner/executors/README.html">runner documentation</link> for more information.···Overwrite the URL for the GitLab instance. Used if the Runner can’t connect to GitLab on the URL GitLab exposes itself.······························
·····················+See [runner documentation](https://docs.gitlab.com/runner/executors/README.html) for more information.···Overwrite the URL for the GitLab instance. Used if the Runner can’t connect to GitLab on the URL GitLab exposes itself.······························
+3
-3
nixos/modules/services/databases/firebird.nix
+3
-3
nixos/modules/services/databases/firebird.nix
···-For SuperServer use override: <literal>pkgs.firebird_3.override { superServer = true; };</literal>
···
+3
-3
nixos/modules/services/databases/mysql.nix
+3
-3
nixos/modules/services/databases/mysql.nix
······
······
+43
-43
nixos/modules/services/databases/neo4j.nix
+43
-43
nixos/modules/services/databases/neo4j.nix
·······································
·······································
+5
-5
nixos/modules/services/databases/openldap.nix
+5
-5
nixos/modules/services/databases/openldap.nix
·········
·········
+2
-2
nixos/modules/services/databases/pgmanage.nix
+2
-2
nixos/modules/services/databases/pgmanage.nix
···
···
+3
-3
nixos/modules/services/databases/postgresql.nix
+3
-3
nixos/modules/services/databases/postgresql.nix
······-<link xlink:href="https://www.postgresql.org/docs/current/sql-grant.html">GRANT syntax</link>.
······
+3
-3
nixos/modules/services/databases/victoriametrics.nix
+3
-3
nixos/modules/services/databases/victoriametrics.nix
···
···
+2
-2
nixos/modules/services/games/asf.nix
+2
-2
nixos/modules/services/games/asf.nix
+7
-7
nixos/modules/services/hardware/kanata.nix
+7
-7
nixos/modules/services/hardware/kanata.nix
············
············
+8
-8
nixos/modules/services/hardware/udev.nix
+8
-8
nixos/modules/services/hardware/udev.nix
······-Whether to assign <link xlink:href="http://www.freedesktop.org/wiki/Software/systemd/PredictableNetworkInterfaceNames">predictable names to network interfaces</link>.
······+Whether to assign [predictable names to network interfaces](http://www.freedesktop.org/wiki/Software/systemd/PredictableNetworkInterfaceNames).
+10
-10
nixos/modules/services/logging/filebeat.nix
+10
-10
nixos/modules/services/logging/filebeat.nix
···-See <link xlink:href="https://www.elastic.co/guide/en/beats/filebeat/current/configuration-filebeat-options.html"/>.···-See <link xlink:href="https://www.elastic.co/guide/en/beats/filebeat/current/filebeat-modules.html"/>.
···+See <https://www.elastic.co/guide/en/beats/filebeat/current/configuration-filebeat-options.html>.···
+5
-5
nixos/modules/services/logging/logrotate.nix
+5
-5
nixos/modules/services/logging/logrotate.nix
······
······
+2
-2
nixos/modules/services/mail/mailman.nix
+2
-2
nixos/modules/services/mail/mailman.nix
···
···
+6
-6
nixos/modules/services/mail/nullmailer.nix
+6
-6
nixos/modules/services/mail/nullmailer.nix
······
······
+3
-3
nixos/modules/services/mail/postfixadmin.nix
+3
-3
nixos/modules/services/mail/postfixadmin.nix
···-Further nginx configuration can be done by adapting <literal>services.nginx.virtualHosts.<name></literal>.
···
+5
-5
nixos/modules/services/mail/public-inbox.nix
+5
-5
nixos/modules/services/mail/public-inbox.nix
······-<literal>locations."/inbox".proxyPass = "http://unix:''${config.services.public-inbox.http.port}:/inbox";</literal>
······+`locations."/inbox".proxyPass = "http://unix:''${config.services.public-inbox.http.port}:/inbox";`
+5
-5
nixos/modules/services/mail/roundcube.nix
+5
-5
nixos/modules/services/mail/roundcube.nix
···-Further nginx configuration can be done by adapting <literal>services.nginx.virtualHosts.<name></literal>.···
······
+8
-8
nixos/modules/services/mail/sympa.nix
+8
-8
nixos/modules/services/mail/sympa.nix
·········
·········
+5
-5
nixos/modules/services/matrix/appservice-discord.nix
+5
-5
nixos/modules/services/matrix/appservice-discord.nix
···-<link xlink:href="https://github.com/Half-Shot/matrix-appservice-discord/blob/master/config/config.sample.yaml">config.sample.yaml</link>.should be set to match the public host name of the Matrix homeserver for webhooks and avatars to work.
···+[config.sample.yaml](https://github.com/Half-Shot/matrix-appservice-discord/blob/master/config/config.sample.yaml).should be set to match the public host name of the Matrix homeserver for webhooks and avatars to work.
+4
-4
nixos/modules/services/matrix/mautrix-facebook.nix
+4
-4
nixos/modules/services/matrix/mautrix-facebook.nix
···-<link xlink:href="https://github.com/mautrix/facebook/blob/master/mautrix_facebook/example-config.yaml">example-config.yaml</link>.
···+[example-config.yaml](https://github.com/mautrix/facebook/blob/master/mautrix_facebook/example-config.yaml).
+4
-4
nixos/modules/services/matrix/mautrix-telegram.nix
+4
-4
nixos/modules/services/matrix/mautrix-telegram.nix
···-<link xlink:href="https://github.com/tulir/mautrix-telegram/blob/master/example-config.yaml">example-config.yaml</link>.
···+[example-config.yaml](https://github.com/tulir/mautrix-telegram/blob/master/example-config.yaml).
+2
-2
nixos/modules/services/misc/autorandr.nix
+2
-2
nixos/modules/services/misc/autorandr.nix
+2
-2
nixos/modules/services/misc/bees.nix
+2
-2
nixos/modules/services/misc/bees.nix
······
······
+2
-2
nixos/modules/services/misc/etcd.nix
+2
-2
nixos/modules/services/misc/etcd.nix
+1
-1
nixos/modules/services/misc/klipper.nix
+1
-1
nixos/modules/services/misc/klipper.nix
+1
-1
nixos/modules/services/misc/sssd.nix
+1
-1
nixos/modules/services/misc/sssd.nix
+7
-7
nixos/modules/services/monitoring/cadvisor.nix
+7
-7
nixos/modules/services/monitoring/cadvisor.nix
···-<option>storageDriverPasswordFile</option> takes precedence over <option>storageDriverPassword</option>-Warning: when <option>storageDriverPassword</option> is non-empty this defaults to a file in the-Tip: use <link xlink:href="https://nixos.org/nixops/manual/#idm140737318306400">nixops key management</link>···-See <link xlink:href="https://github.com/google/cadvisor/blob/master/docs/runtime_options.md"/> for available options.
······+See <https://github.com/google/cadvisor/blob/master/docs/runtime_options.md> for available options.
+2
-2
nixos/modules/services/monitoring/graphite.nix
+2
-2
nixos/modules/services/monitoring/graphite.nix
+5
-5
nixos/modules/services/monitoring/metricbeat.nix
+5
-5
nixos/modules/services/monitoring/metricbeat.nix
···-for each, but setting <xref linkend="opt-services.metricbeat.modules._name_.module"/> to the same value.-See <link xlink:href="https://www.elastic.co/guide/en/beats/metricbeat/current/metricbeat-modules.html"/>.
···
+14
-14
nixos/modules/services/monitoring/munin.nix
+14
-14
nixos/modules/services/monitoring/munin.nix
···-<link xlink:href="http://guide.munin-monitoring.org/en/latest/reference/munin-node.conf.html"/>···-See <link xlink:href="http://guide.munin-monitoring.org/en/latest/reference/munin.conf.html"/>.···
·········
+2
-2
nixos/modules/services/monitoring/netdata.nix
+2
-2
nixos/modules/services/monitoring/netdata.nix
···
···
+17
-17
nixos/modules/services/monitoring/parsedmarc.nix
+17
-17
nixos/modules/services/monitoring/parsedmarc.nix
······-Whether to enable and configure the <link linkend="opt-services.geoipupdate.enable">geoipupdate</link>-To finish the setup, you need to manually set the <xref linkend="opt-services.geoipupdate.settings.AccountID"/> and············
······+To finish the setup, you need to manually set the [](#opt-services.geoipupdate.settings.AccountID) and············
+5
-5
nixos/modules/services/networking/biboumi.nix
+5
-5
nixos/modules/services/networking/biboumi.nix
···-Set it to null and use <link linkend="opt-services.biboumi.credentialsFile">credentialsFile</link>···
······
+4
-4
nixos/modules/services/networking/bird-lg.nix
+4
-4
nixos/modules/services/networking/bird-lg.nix
···-Extra parameters documented <link xlink:href="https://github.com/xddxdd/bird-lg-go#frontend">here</link>.···-Extra parameters documented <link xlink:href="https://github.com/xddxdd/bird-lg-go#proxy">here</link>.
······
+6
-6
nixos/modules/services/networking/bird.nix
+6
-6
nixos/modules/services/networking/bird.nix
······
······
+2
-2
nixos/modules/services/networking/coredns.nix
+2
-2
nixos/modules/services/networking/coredns.nix
+7
-7
nixos/modules/services/networking/ghostunnel.nix
+7
-7
nixos/modules/services/networking/ghostunnel.nix
······
······
+2
-2
nixos/modules/services/networking/hans.nix
+2
-2
nixos/modules/services/networking/hans.nix
···
···
+2
-2
nixos/modules/services/networking/iodine.nix
+2
-2
nixos/modules/services/networking/iodine.nix
···
···
+16
-16
nixos/modules/services/networking/kea.nix
+16
-16
nixos/modules/services/networking/kea.nix
···-Kea Control Agent configuration as a path, see <link xlink:href="https://kea.readthedocs.io/en/kea-${package.version}/arm/agent.html"/>.-Most users should prefer using <link linkend="opt-services.kea.ctrl-agent.settings">settings</link> instead.···-Kea DHCP4 configuration as a path, see <link xlink:href="https://kea.readthedocs.io/en/kea-${package.version}/arm/dhcp4-srv.html"/>.-Most users should prefer using <link linkend="opt-services.kea.dhcp4.settings">settings</link> instead.···-Kea DHCP6 configuration as a path, see <link xlink:href="https://kea.readthedocs.io/en/kea-${package.version}/arm/dhcp6-srv.html"/>.-Most users should prefer using <link linkend="opt-services.kea.dhcp6.settings">settings</link> instead.···-Kea DHCP-DDNS configuration as a path, see <link xlink:href="https://kea.readthedocs.io/en/kea-${package.version}/arm/ddns.html"/>.-Most users should prefer using <link linkend="opt-services.kea.dhcp-ddns.settings">settings</link> instead.
···+Kea Control Agent configuration as a path, see <https://kea.readthedocs.io/en/kea-${package.version}/arm/agent.html>.···+Kea DHCP4 configuration as a path, see <https://kea.readthedocs.io/en/kea-${package.version}/arm/dhcp4-srv.html>.···+Kea DHCP6 configuration as a path, see <https://kea.readthedocs.io/en/kea-${package.version}/arm/dhcp6-srv.html>.···+Kea DHCP-DDNS configuration as a path, see <https://kea.readthedocs.io/en/kea-${package.version}/arm/ddns.html>.
+2
-2
nixos/modules/services/networking/ncdns.nix
+2
-2
nixos/modules/services/networking/ncdns.nix
···-See the example ncdns.conf file at <link xlink:href="https://github.com/namecoin/ncdns/blob/master/_doc/ncdns.conf.example"/>
···+See the example ncdns.conf file at <https://github.com/namecoin/ncdns/blob/master/_doc/ncdns.conf.example>
+3
-3
nixos/modules/services/networking/networkmanager.nix
+3
-3
nixos/modules/services/networking/networkmanager.nix
···
···
+2
-2
nixos/modules/services/networking/nntp-proxy.nix
+2
-2
nixos/modules/services/networking/nntp-proxy.nix
···example = "$6$GtzE7FrpE$wwuVgFYU.TZH4Rz.Snjxk9XGua89IeVwPQ/fEUD8eujr40q5Y021yhn0aNcsQ2Ifw.BLclyzvzgegopgKcneL0";
···example = "$6$GtzE7FrpE$wwuVgFYU.TZH4Rz.Snjxk9XGua89IeVwPQ/fEUD8eujr40q5Y021yhn0aNcsQ2Ifw.BLclyzvzgegopgKcneL0";
+2
-2
nixos/modules/services/networking/nsd.nix
+2
-2
nixos/modules/services/networking/nsd.nix
+4
-4
nixos/modules/services/networking/ntp/ntpd.nix
+4
-4
nixos/modules/services/networking/ntp/ntpd.nix
······
······
+7
-7
nixos/modules/services/networking/openconnect.nix
+7
-7
nixos/modules/services/networking/openconnect.nix
······
······
+2
-2
nixos/modules/services/networking/openvpn.nix
+2
-2
nixos/modules/services/networking/openvpn.nix
···
···
+4
-4
nixos/modules/services/networking/pleroma.nix
+4
-4
nixos/modules/services/networking/pleroma.nix
······
······
+12
-12
nixos/modules/services/networking/ssh/sshd.nix
+12
-12
nixos/modules/services/networking/ssh/sshd.nix
···-keys, you can generally use <xref linkend="opt-users.users._name_.openssh.authorizedKeys.keys"/>·········
············
+8
-8
nixos/modules/services/networking/wireguard.nix
+8
-8
nixos/modules/services/networking/wireguard.nix
······
······
+6
-6
nixos/modules/services/networking/yggdrasil.nix
+6
-6
nixos/modules/services/networking/yggdrasil.nix
···-description = "Group to grant access to the Yggdrasil control socket. If <literal>null</literal>, only root can access the socket.";
···+description = lib.mdDoc "Group to grant access to the Yggdrasil control socket. If `null`, only root can access the socket.";
+2
-2
nixos/modules/services/security/privacyidea.nix
+2
-2
nixos/modules/services/security/privacyidea.nix
+3
-3
nixos/modules/services/security/tor.nix
+3
-3
nixos/modules/services/security/tor.nix
···-Generated authorization data can be found in <filename>${stateDir}/onion/$name/hostname</filename>.
···
+2
-2
nixos/modules/services/security/vault.nix
+2
-2
nixos/modules/services/security/vault.nix
···
···
+7
-7
nixos/modules/services/system/dbus.nix
+7
-7
nixos/modules/services/system/dbus.nix
···
···
+8
-8
nixos/modules/services/system/earlyoom.nix
+8
-8
nixos/modules/services/system/earlyoom.nix
···
···
+28
-28
nixos/modules/services/torrent/transmission.nix
+28
-28
nixos/modules/services/torrent/transmission.nix
······-when <xref linkend="opt-services.transmission.settings.peer-port-random-on-start"/> is enabled.-when <xref linkend="opt-services.transmission.settings.peer-port-random-on-start"/> is enabled.············
··················
+5
-5
nixos/modules/services/web-apps/dokuwiki.nix
+5
-5
nixos/modules/services/web-apps/dokuwiki.nix
···-Further nginx configuration can be done by adapting <literal>services.nginx.virtualHosts.<name></literal>.-Further apache2 configuration can be done by adapting <literal>services.httpd.virtualHosts.<name></literal>.
···
+2
-2
nixos/modules/services/web-apps/hedgedoc.nix
+2
-2
nixos/modules/services/web-apps/hedgedoc.nix
+13
-13
nixos/modules/services/web-apps/keycloak.nix
+13
-13
nixos/modules/services/web-apps/keycloak.nix
···-To use this with a local database, set <xref linkend="opt-services.keycloak.database.createLocally"/> to···-To use this with a local database, set <xref linkend="opt-services.keycloak.database.createLocally"/> to···-Most available options are documented at <link xlink:href="https://www.keycloak.org/server/all-config"/>.
·········
+9
-9
nixos/modules/services/web-apps/mastodon.nix
+9
-9
nixos/modules/services/web-apps/mastodon.nix
···-<literal>nix build -f '<nixpkgs>' mastodon; cd result; bin/rake webpush:generate_keys</literal>·········-<literal>nix build -f '<nixpkgs>' mastodon; cd result; bin/rake webpush:generate_keys</literal>
············
+12
-12
nixos/modules/services/web-apps/nextcloud.nix
+12
-12
nixos/modules/services/web-apps/nextcloud.nix
···-Data storage path of nextcloud. Will be <xref linkend="opt-services.nextcloud.home"/> by default.This folder will be populated with a config.php and data folder which contains the state of the instance (excl the database).";···Extra apps to install. Should be an attrSet of appid to packages generated by fetchNextcloudApp.-Using this will disable the appstore to prevent Nextcloud from updating these apps (see <xref linkend="opt-services.nextcloud.appstoreEnable"/>).···-Automatically enable the apps in <xref linkend="opt-services.nextcloud.extraApps"/> every time nextcloud starts.If set to false, apps need to be enabled in the Nextcloud user interface or with nextcloud-occ app:enable.···-Enabled by default unless there are packages in <xref linkend="opt-services.nextcloud.extraApps"/>.-Set to true to force enable the store even if <xref linkend="opt-services.nextcloud.extraApps"/> is used.Set to false to disable the installation of apps from the global appstore. App management is always enabled regardless of this setting.···
···This folder will be populated with a config.php and data folder which contains the state of the instance (excl the database).";···Extra apps to install. Should be an attrSet of appid to packages generated by fetchNextcloudApp.+Using this will disable the appstore to prevent Nextcloud from updating these apps (see [](#opt-services.nextcloud.appstoreEnable)).···+Automatically enable the apps in [](#opt-services.nextcloud.extraApps) every time nextcloud starts.If set to false, apps need to be enabled in the Nextcloud user interface or with nextcloud-occ app:enable.···Set to false to disable the installation of apps from the global appstore. App management is always enabled regardless of this setting.···
+2
-2
nixos/modules/services/web-apps/node-red.nix
+2
-2
nixos/modules/services/web-apps/node-red.nix
···-See <link xlink:href="https://github.com/node-red/node-red/blob/master/packages/node_modules/node-red/settings.js"/>
···+See <https://github.com/node-red/node-red/blob/master/packages/node_modules/node-red/settings.js>
+1
-1
nixos/modules/services/web-apps/trilium.nix
+1
-1
nixos/modules/services/web-apps/trilium.nix
+1
-1
nixos/modules/services/x11/desktop-managers/plasma5.nix
+1
-1
nixos/modules/services/x11/desktop-managers/plasma5.nix
+2
-2
nixos/modules/services/x11/display-managers/lightdm-greeters/mini.nix
+2
-2
nixos/modules/services/x11/display-managers/lightdm-greeters/mini.nix
···
···
+2
-2
nixos/modules/services/x11/display-managers/lightdm-greeters/tiny.nix
+2
-2
nixos/modules/services/x11/display-managers/lightdm-greeters/tiny.nix
···
···
+1
-1
nixos/modules/services/x11/window-managers/fvwm2.nix
+1
-1
nixos/modules/services/x11/window-managers/fvwm2.nix
+5
-5
nixos/modules/system/boot/initrd-network.nix
+5
-5
nixos/modules/system/boot/initrd-network.nix
···-as described in <link xlink:href="https://www.kernel.org/doc/Documentation/filesystems/nfs/nfsroot.txt">the kernel documentation</link>.
···+as described in [the kernel documentation](https://www.kernel.org/doc/Documentation/filesystems/nfs/nfsroot.txt).
+2
-2
nixos/modules/system/boot/luksroot.nix
+2
-2
nixos/modules/system/boot/luksroot.nix
···
···
+3
-3
nixos/modules/system/boot/networkd.nix
+3
-3
nixos/modules/system/boot/networkd.nix
···-See <link xlink:href="https://www.freedesktop.org/software/systemd/man/systemd-networkd-wait-online.service.html"><citerefentry><refentrytitle>systemd-networkd-wait-online.service</refentrytitle><manvolnum>8</manvolnum></citerefentry></link> for all available options.
···+See [{manpage}`systemd-networkd-wait-online.service(8)`](https://www.freedesktop.org/software/systemd/man/systemd-networkd-wait-online.service.html) for all available options.
+3
-3
nixos/modules/system/boot/systemd/logind.nix
+3
-3
nixos/modules/system/boot/systemd/logind.nix
···-<link xlink:href="https://www.freedesktop.org/software/systemd/man/systemd.scope.html#">systemd.scope(5)</link>), and processes are not killed.-See <link xlink:href="https://www.freedesktop.org/software/systemd/man/logind.conf.html#KillUserProcesses=">logind.conf(5)</link>
···+[systemd.scope(5)](https://www.freedesktop.org/software/systemd/man/systemd.scope.html#)), and processes are not killed.+See [logind.conf(5)](https://www.freedesktop.org/software/systemd/man/logind.conf.html#KillUserProcesses=)
+5
-5
nixos/modules/system/boot/systemd/tmpfiles.nix
+5
-5
nixos/modules/system/boot/systemd/tmpfiles.nix
···
···
+3
-3
nixos/modules/tasks/auto-upgrade.nix
+3
-3
nixos/modules/tasks/auto-upgrade.nix
+1
-1
nixos/modules/tasks/scsi-link-power-management.nix
+1
-1
nixos/modules/tasks/scsi-link-power-management.nix
+6
-6
nixos/modules/virtualisation/nixos-containers.nix
+6
-6
nixos/modules/virtualisation/nixos-containers.nix
······
······