+3
-5
maintainers/scripts/gnome.sh
···
-1
nixos/maintainers/option-usages.nix
+3
-6
nixos/modules/services/desktops/gnome3/evolution-data-server.nix
······
······
+2
-5
nixos/modules/services/desktops/gnome3/gnome-disks.nix
······
+2
-5
nixos/modules/services/desktops/gnome3/gnome-documents.nix
······
······
+2
-5
nixos/modules/services/desktops/gnome3/gnome-keyring.nix
······
+2
-5
nixos/modules/services/desktops/gnome3/gnome-online-accounts.nix
······
+2
-5
nixos/modules/services/desktops/gnome3/gnome-online-miners.nix
······
+3
-6
nixos/modules/services/desktops/gnome3/gnome-terminal-server.nix
······
······
+5
-8
nixos/modules/services/desktops/gnome3/gpaste.nix
······
······
+3
-6
nixos/modules/services/desktops/gnome3/gvfs.nix
······
······
+2
-5
nixos/modules/services/desktops/gnome3/seahorse.nix
······
+2
-5
nixos/modules/services/desktops/gnome3/sushi.nix
+3
-6
nixos/modules/services/desktops/gnome3/tracker.nix
······
+12
-20
nixos/modules/services/x11/desktop-managers/gnome3.nix
······-cp -rf ${gnome3.gsettings_desktop_schemas}/share/gsettings-schemas/gsettings-desktop-schemas*/glib-2.0/schemas/*.xml $out/share/gsettings-schemas/nixos-gsettings-overrides/glib-2.0/schemas${concatMapStrings (pkg: "cp -rf ${pkg}/share/gsettings-schemas/*/glib-2.0/schemas/*.xml $out/share/gsettings-schemas/nixos-gsettings-overrides/glib-2.0/schemas\n") cfg.extraGSettingsOverridePackages}·········
······+cp -rf ${pkgs.gnome3.gsettings_desktop_schemas}/share/gsettings-schemas/gsettings-desktop-schemas*/glib-2.0/schemas/*.xml $out/share/gsettings-schemas/nixos-gsettings-overrides/glib-2.0/schemas${concatMapStrings (pkg: "cp -rf ${pkg}/share/gsettings-schemas/*/glib-2.0/schemas/*.xml $out/share/gsettings-schemas/nixos-gsettings-overrides/glib-2.0/schemas\n") cfg.extraGSettingsOverridePackages}·········+++ (removePackagesByName pkgs.gnome3.optionalPackages config.environment.gnome3.excludePackages);
+7
-8
nixos/modules/services/x11/display-managers/gdm.nix
············auth ${if config.security.pam.enableEcryptfs then "required" else "sufficient"} pam_unix.so nullok likeauth······auth ${if config.security.pam.enableEcryptfs then "required" else "sufficient"} pam_unix.so nullok likeauth···
············auth ${if config.security.pam.enableEcryptfs then "required" else "sufficient"} pam_unix.so nullok likeauth······auth ${if config.security.pam.enableEcryptfs then "required" else "sufficient"} pam_unix.so nullok likeauth···