+5
-6
nixos/modules/security/lock-kernel-modules.nix
+5
-6
nixos/modules/security/lock-kernel-modules.nix
···
+2
-2
nixos/modules/security/sudo.nix
+2
-2
nixos/modules/security/sudo.nix
···(map (user: "${toUserString user} ${rule.host}=(${rule.runAs}) ${toCommandsString rule.commands}") rule.users)(map (group: "${toGroupString group} ${rule.host}=(${rule.runAs}) ${toCommandsString rule.commands}") rule.groups)
+1
-1
nixos/modules/services/backup/restic.nix
+1
-1
nixos/modules/services/backup/restic.nix
···-excludeFlags = if (backup.exclude != []) then ["--exclude-file=${pkgs.writeText "exclude-patterns" (concatStringsSep "\n" backup.exclude)}"] else [];+excludeFlags = optional (backup.exclude != []) "--exclude-file=${pkgs.writeText "exclude-patterns" (concatStringsSep "\n" backup.exclude)}";
+1
-1
nixos/modules/services/games/factorio.nix
+1
-1
nixos/modules/services/games/factorio.nix
+1
-1
nixos/modules/services/games/freeciv.nix
+1
-1
nixos/modules/services/games/freeciv.nix
···
+2
-2
nixos/modules/services/network-filesystems/glusterfs.nix
+2
-2
nixos/modules/services/network-filesystems/glusterfs.nix
···
+1
-1
nixos/modules/services/networking/ddclient.nix
+1
-1
nixos/modules/services/networking/ddclient.nix
···(mkRemovedOptionModule [ "services" "ddclient" "password" ] "Use services.ddclient.passwordFile instead.")
+21
-32
nixos/modules/services/networking/i2pd.nix
+21
-32
nixos/modules/services/networking/i2pd.nix
···-++ (if proto ? strictHeaders then optionalNullBool "strictheaders" proto.strictHeaders else [])-++ (if proto ? outproxyEnable then optionalNullBool "outproxy.enabled" proto.outproxyEnable else []);+++ (optionals (proto ? outproxyEnable) (optionalNullBool "outproxy.enabled" proto.outproxyEnable));···-] ++ (if tun ? destinationPort then optionalNullInt "destinationport" tun.destinationPort else [])+] ++ (optionals (tun ? destinationPort) (optionalNullInt "destinationport" tun.destinationPort))+++ (optionals (tun ? inbound.quantity) (optionalNullInt "inbound.quantity" tun.inbound.quantity))+++ (optionals (tun ? outbound.length) (optionalNullInt "outbound.length" tun.outbound.length))+++ (optionals (tun ? outbound.quantity) (optionalNullInt "outbound.quantity" tun.outbound.quantity))+++ (optionals (tun ? crypto.tagsToSend) (optionalNullInt "crypto.tagstosend" tun.crypto.tagsToSend));···
+2
-3
nixos/modules/services/networking/prosody.nix
+2
-3
nixos/modules/services/networking/prosody.nix
···
+1
-1
nixos/modules/services/networking/ssh/sshd.nix
+1
-1
nixos/modules/services/networking/ssh/sshd.nix
+1
-1
nixos/modules/services/networking/vsftpd.nix
+1
-1
nixos/modules/services/networking/vsftpd.nix
···
+2
-3
nixos/modules/services/security/tor.nix
+2
-3
nixos/modules/services/security/tor.nix
······
+1
-1
nixos/modules/services/web-apps/dex.nix
+1
-1
nixos/modules/services/web-apps/dex.nix
···fixClient = client: if client ? secretFile then ((builtins.removeAttrs client [ "secretFile" ]) // { secret = client.secretFile; }) else client;filteredSettings = mapAttrs (n: v: if n == "staticClients" then (builtins.map fixClient v) else v) cfg.settings;-secretFiles = flatten (builtins.map (c: if c ? secretFile then [ c.secretFile ] else []) (cfg.settings.staticClients or []));+secretFiles = flatten (builtins.map (c: optional (c ? secretFile) c.secretFile) (cfg.settings.staticClients or []));
+1
-3
nixos/modules/services/web-apps/mastodon.nix
+1
-3
nixos/modules/services/web-apps/mastodon.nix
···
+1
-3
nixos/modules/services/web-apps/nifi.nix
+1
-3
nixos/modules/services/web-apps/nifi.nix
···
+1
-3
nixos/modules/services/web-apps/peertube.nix
+1
-3
nixos/modules/services/web-apps/peertube.nix
···
+1
-1
nixos/modules/system/boot/luksroot.nix
+1
-1
nixos/modules/system/boot/luksroot.nix
···