+1
-1
nixos/lib/systemd-types.nix
+1
-1
nixos/lib/systemd-types.nix
+1
-1
nixos/modules/hardware/fw-fanctrl.nix
+1
-1
nixos/modules/hardware/fw-fanctrl.nix
···-Additional config entries for the fw-fanctrl service (documentation: https://github.com/TamtamHero/fw-fanctrl/blob/main/doc/configuration.md)+Additional config entries for the fw-fanctrl service (documentation: <https://github.com/TamtamHero/fw-fanctrl/blob/main/doc/configuration.md>)
+1
-1
nixos/modules/hardware/nfc-nci.nix
+1
-1
nixos/modules/hardware/nfc-nci.nix
···-To understand the configuration format, refer to https://github.com/NXPNFCLinux/linux_libnfc-nci/tree/master/conf.+To understand the configuration format, refer to <https://github.com/NXPNFCLinux/linux_libnfc-nci/tree/master/conf>.
+1
-1
nixos/modules/hardware/video/nvidia.nix
+1
-1
nixos/modules/hardware/video/nvidia.nix
···-See: https://forums.developer.nvidia.com/t/the-all-new-outputsink-feature-aka-reverse-prime/129828+See: <https://forums.developer.nvidia.com/t/the-all-new-outputsink-feature-aka-reverse-prime/129828>
+2
-2
nixos/modules/programs/firefox.nix
+2
-2
nixos/modules/programs/firefox.nix
···-preferences by locking them. More info can be found in https://support.mozilla.org/en-US/kb/customizing-firefox-using-autoconfig.+preferences by locking them. More info can be found in <https://support.mozilla.org/en-US/kb/customizing-firefox-using-autoconfig>.···-preferences by locking them. More info can be found in https://support.mozilla.org/en-US/kb/customizing-firefox-using-autoconfig.+preferences by locking them. More info can be found in <https://support.mozilla.org/en-US/kb/customizing-firefox-using-autoconfig>.
+1
-1
nixos/modules/programs/lazygit.nix
+1
-1
nixos/modules/programs/lazygit.nix
+1
-1
nixos/modules/programs/nautilus-open-any-terminal.nix
+1
-1
nixos/modules/programs/nautilus-open-any-terminal.nix
···-emulators are listed in https://github.com/Stunkymonkey/nautilus-open-any-terminal#supported-terminal-emulators.+emulators are listed in <https://github.com/Stunkymonkey/nautilus-open-any-terminal#supported-terminal-emulators>.
+1
-1
nixos/modules/programs/ryzen-monitor-ng.nix
+1
-1
nixos/modules/programs/ryzen-monitor-ng.nix
···WARNING: Damage cause by use of your AMD processor outside of official AMD specifications or outside of factory settings are not covered under any AMD product warranty and may not be covered by your board or system manufacturer's warranty
+1
-1
nixos/modules/programs/starship.nix
+1
-1
nixos/modules/programs/starship.nix
+3
-3
nixos/modules/programs/yazi.nix
+3
-3
nixos/modules/programs/yazi.nix
·········
+1
-1
nixos/modules/programs/zsh/oh-my-zsh.nix
+1
-1
nixos/modules/programs/zsh/oh-my-zsh.nix
···-For example, to disable async git prompt write `zstyle ':omz:alpha:lib:git' async-prompt no` (more information https://github.com/ohmyzsh/ohmyzsh?tab=readme-ov-file#async-git-prompt)+For example, to disable async git prompt write `zstyle ':omz:alpha:lib:git' async-prompt no` (more information <https://github.com/ohmyzsh/ohmyzsh?tab=readme-ov-file#async-git-prompt>)
+4
-4
nixos/modules/services/amqp/rabbitmq.nix
+4
-4
nixos/modules/services/amqp/rabbitmq.nix
······
+1
-1
nixos/modules/services/audio/alsa.nix
+1
-1
nixos/modules/services/audio/alsa.nix
···
+2
-2
nixos/modules/services/backup/borgmatic.nix
+2
-2
nixos/modules/services/backup/borgmatic.nix
······-Set of borgmatic configurations, see https://torsion.org/borgmatic/docs/reference/configuration/+Set of borgmatic configurations, see <https://torsion.org/borgmatic/docs/reference/configuration/>
+1
-1
nixos/modules/services/cluster/k3s/default.nix
+1
-1
nixos/modules/services/cluster/k3s/default.nix
···
+1
-1
nixos/modules/services/continuous-integration/buildbot/master.nix
+1
-1
nixos/modules/services/continuous-integration/buildbot/master.nix
···-description = "Configurator Steps, see https://docs.buildbot.net/latest/manual/configuration/configurators.html";+description = "Configurator Steps, see <https://docs.buildbot.net/latest/manual/configuration/configurators.html>";
+1
-1
nixos/modules/services/continuous-integration/gitea-actions-runner.nix
+1
-1
nixos/modules/services/continuous-integration/gitea-actions-runner.nix
···-See https://gitea.com/gitea/act_runner/src/branch/main/internal/pkg/config/config.example.yaml for an example configuration+See <https://gitea.com/gitea/act_runner/src/branch/main/internal/pkg/config/config.example.yaml> for an example configuration
+1
-1
nixos/modules/services/databases/dgraph.nix
+1
-1
nixos/modules/services/databases/dgraph.nix
+2
-2
nixos/modules/services/databases/postgresql.md
+2
-2
nixos/modules/services/databases/postgresql.md
···
+3
-3
nixos/modules/services/development/blackfire.nix
+3
-3
nixos/modules/services/development/blackfire.nix
·········
+1
-1
nixos/modules/services/development/jupyter/default.nix
+1
-1
nixos/modules/services/development/jupyter/default.nix
···-Can be generated following: https://jupyter-server.readthedocs.io/en/stable/operators/public-server.html#preparing-a-hashed-password+Can be generated following: <https://jupyter-server.readthedocs.io/en/stable/operators/public-server.html#preparing-a-hashed-password>example = "argon2:$argon2id$v=19$m=10240,t=10,p=8$48hF+vTUuy1LB83/GzNhUg$J1nx4jPWD7PwOJHs5OtDW8pjYK2s0c1R3rYGbSIKB54";
+1
-1
nixos/modules/services/development/jupyterhub/default.nix
+1
-1
nixos/modules/services/development/jupyterhub/default.nix
···+Traitlets. <https://jupyterhub.readthedocs.io/en/stable/getting-started/config-basics.html>. The
+1
-1
nixos/modules/services/games/mchprs.nix
+1
-1
nixos/modules/services/games/mchprs.nix
+1
-1
nixos/modules/services/hardware/display.md
+1
-1
nixos/modules/services/hardware/display.md
···-from https://github.com/linuxhw/EDID based on simple string/regexp search identifying exact entries:+from <https://github.com/linuxhw/EDID> based on simple string/regexp search identifying exact entries:
+3
-3
nixos/modules/services/hardware/display.nix
+3
-3
nixos/modules/services/hardware/display.nix
······
+1
-1
nixos/modules/services/hardware/tlp.nix
+1
-1
nixos/modules/services/hardware/tlp.nix
+1
-1
nixos/modules/services/home-automation/matter-server.nix
+1
-1
nixos/modules/services/home-automation/matter-server.nix
···-See https://github.com/home-assistant-libs/python-matter-server?tab=readme-ov-file#running-the-development-server for options.+See <https://github.com/home-assistant-libs/python-matter-server?tab=readme-ov-file#running-the-development-server> for options.
+1
-1
nixos/modules/services/mail/mailman.md
+1
-1
nixos/modules/services/mail/mailman.md
···
+1
-1
nixos/modules/services/mail/roundcube.nix
+1
-1
nixos/modules/services/mail/roundcube.nix
···-Must be formatted according to PostgreSQL .pgpass standard (see https://www.postgresql.org/docs/current/libpq-pgpass.html)+Must be formatted according to PostgreSQL .pgpass standard (see <https://www.postgresql.org/docs/current/libpq-pgpass.html>)
+1
-1
nixos/modules/services/matrix/dendrite.nix
+1
-1
nixos/modules/services/matrix/dendrite.nix
···
+1
-1
nixos/modules/services/matrix/maubot.md
+1
-1
nixos/modules/services/matrix/maubot.md
···
+1
-1
nixos/modules/services/misc/dwm-status.nix
+1
-1
nixos/modules/services/misc/dwm-status.nix
+1
-1
nixos/modules/services/misc/radicle.nix
+1
-1
nixos/modules/services/misc/radicle.nix
···-See https://app.radicle.xyz/nodes/seed.radicle.garden/rad:z3gqcJUoA1n9HaHKufZs5FCSGazv5/tree/radicle/src/node/config.rs#L275+See <https://app.radicle.xyz/nodes/seed.radicle.garden/rad:z3gqcJUoA1n9HaHKufZs5FCSGazv5/tree/radicle/src/node/config.rs#L275>
+2
-2
nixos/modules/services/misc/renovate.nix
+2
-2
nixos/modules/services/misc/renovate.nix
······If you want to pass secrets to renovate, please use {option}`services.renovate.credentials` for that.
+2
-2
nixos/modules/services/misc/tabby.nix
+2
-2
nixos/modules/services/misc/tabby.nix
······
+1
-1
nixos/modules/services/monitoring/glpi-agent.nix
+1
-1
nixos/modules/services/monitoring/glpi-agent.nix
···+See <https://glpi-agent.readthedocs.io/en/latest/configuration.html> for all available options.
+1
-1
nixos/modules/services/monitoring/prometheus/default.nix
+1
-1
nixos/modules/services/monitoring/prometheus/default.nix
···
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/ecoflow.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/ecoflow.nix
···-Path to the file with your personal api access string from the Ecoflow development website https://developer-eu.ecoflow.com.+Path to the file with your personal api access string from the Ecoflow development website <https://developer-eu.ecoflow.com>.···-Path to the file with your personal api secret string from the Ecoflow development website https://developer-eu.ecoflow.com.+Path to the file with your personal api secret string from the Ecoflow development website <https://developer-eu.ecoflow.com>.
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/pgbouncer.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/pgbouncer.nix
···
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/pve.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/pve.nix
···The environment file should NOT be stored in /nix/store as it contains passwords and/or keys in plain text.-Environment reference: https://github.com/prometheus-pve/prometheus-pve-exporter#authentication+Environment reference: <https://github.com/prometheus-pve/prometheus-pve-exporter#authentication>···-Configuration reference: https://github.com/prometheus-pve/prometheus-pve-exporter/#authentication+Configuration reference: <https://github.com/prometheus-pve/prometheus-pve-exporter/#authentication>
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/tibber.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/tibber.nix
···Do not share your personal plaintext Tibber API Token via github. (see: ryantm/agenix, mic92/sops)
+2
-2
nixos/modules/services/network-filesystems/ipfs-cluster.nix
+2
-2
nixos/modules/services/network-filesystems/ipfs-cluster.nix
···-description = "Consensus protocol - 'raft' or 'crdt'. https://cluster.ipfs.io/documentation/guides/consensus/";+description = "Consensus protocol - 'raft' or 'crdt'. <https://cluster.ipfs.io/documentation/guides/consensus/>";···-description = "Open swarm port, secured by the cluster secret. This does not expose the API or proxy. https://cluster.ipfs.io/documentation/guides/security/";+description = "Open swarm port, secured by the cluster secret. This does not expose the API or proxy. <https://cluster.ipfs.io/documentation/guides/security/>";
+5
-5
nixos/modules/services/network-filesystems/xtreemfs.nix
+5
-5
nixos/modules/services/network-filesystems/xtreemfs.nix
···············
+1
-1
nixos/modules/services/network-filesystems/yandex-disk.nix
+1
-1
nixos/modules/services/network-filesystems/yandex-disk.nix
+2
-2
nixos/modules/services/networking/aria2.nix
+2
-2
nixos/modules/services/networking/aria2.nix
···-Read https://aria2.github.io/manual/en/html/aria2c.html#rpc-auth to know how this option value is used.+Read <https://aria2.github.io/manual/en/html/aria2c.html#rpc-auth> to know how this option value is used.···
+1
-1
nixos/modules/services/networking/crab-hole.nix
+1
-1
nixos/modules/services/networking/crab-hole.nix
···-description = "Crab-holes config. See big example https://github.com/LuckyTurtleDev/crab-hole/blob/main/example-config.toml";+description = "Crab-holes config. See big example <https://github.com/LuckyTurtleDev/crab-hole/blob/main/example-config.toml>";
+1
-1
nixos/modules/services/networking/doh-server.md
+1
-1
nixos/modules/services/networking/doh-server.md
+1
-1
nixos/modules/services/networking/doh-server.nix
+1
-1
nixos/modules/services/networking/doh-server.nix
···-description = "Configuration of doh-server in toml. See example in https://github.com/m13253/dns-over-https/blob/master/doh-server/doh-server.conf";+description = "Configuration of doh-server in toml. See example in <https://github.com/m13253/dns-over-https/blob/master/doh-server/doh-server.conf>";
+5
-5
nixos/modules/services/networking/mihomo.nix
+5
-5
nixos/modules/services/networking/mihomo.nix
···
+2
-2
nixos/modules/services/networking/monero.nix
+2
-2
nixos/modules/services/networking/monero.nix
······
+1
-1
nixos/modules/services/networking/morty.nix
+1
-1
nixos/modules/services/networking/morty.nix
+1
-1
nixos/modules/services/networking/mycelium.nix
+1
-1
nixos/modules/services/networking/mycelium.nix
···
+1
-1
nixos/modules/services/networking/newt.nix
+1
-1
nixos/modules/services/networking/newt.nix
···-Path to a file containing sensitive environment variables for Newt. See https://docs.fossorial.io/Newt/overview#cli-args+Path to a file containing sensitive environment variables for Newt. See <https://docs.fossorial.io/Newt/overview#cli-args>
+1
-1
nixos/modules/services/networking/nghttpx/backend-submodule.nix
+1
-1
nixos/modules/services/networking/nghttpx/backend-submodule.nix
···
+5
-5
nixos/modules/services/networking/nghttpx/frontend-params-submodule.nix
+5
-5
nixos/modules/services/networking/nghttpx/frontend-params-submodule.nix
···············
+6
-6
nixos/modules/services/networking/nghttpx/nghttpx-options.nix
+6
-6
nixos/modules/services/networking/nghttpx/nghttpx-options.nix
···+Please see <https://nghttp2.org/documentation/nghttpx.1.html#cmdoption-nghttpx--single-process>······-Please see https://nghttp2.org/documentation/nghttpx.1.html#cmdoption-nghttpx--backend-address-family+Please see <https://nghttp2.org/documentation/nghttpx.1.html#cmdoption-nghttpx--backend-address-family>······+Please see <https://nghttp2.org/documentation/nghttpx.1.html#cmdoption-nghttpx--single-thread>···+Please see <https://nghttp2.org/documentation/nghttpx.1.html#cmdoption-nghttpx--rlimit-nofile>
+1
-1
nixos/modules/services/networking/nm-file-secret-agent.nix
+1
-1
nixos/modules/services/networking/nm-file-secret-agent.nix
···
+1
-1
nixos/modules/services/networking/nomad.nix
+1
-1
nixos/modules/services/networking/nomad.nix
···
+1
-1
nixos/modules/services/networking/openconnect.nix
+1
-1
nixos/modules/services/networking/openconnect.nix
···
+1
-1
nixos/modules/services/networking/pdns-recursor.nix
+1
-1
nixos/modules/services/networking/pdns-recursor.nix
···
+1
-1
nixos/modules/services/networking/prosody.nix
+1
-1
nixos/modules/services/networking/prosody.nix
···
+1
-1
nixos/modules/services/networking/sing-box.nix
+1
-1
nixos/modules/services/networking/sing-box.nix
···-The sing-box configuration, see https://sing-box.sagernet.org/configuration/ for documentation.+The sing-box configuration, see <https://sing-box.sagernet.org/configuration/> for documentation.
+2
-2
nixos/modules/services/networking/sunshine.nix
+2
-2
nixos/modules/services/networking/sunshine.nix
···Settings to be rendered into the configuration file. If this is set, no configuration is possible from the web UI.-See https://docs.lizardbyte.dev/projects/sunshine/en/latest/about/advanced_usage.html#configuration for syntax.+See <https://docs.lizardbyte.dev/projects/sunshine/en/latest/about/advanced_usage.html#configuration for syntax>.···-Base port -- others used are offset from this one, see https://docs.lizardbyte.dev/projects/sunshine/en/latest/about/advanced_usage.html#port for details.+Base port -- others used are offset from this one, see <https://docs.lizardbyte.dev/projects/sunshine/en/latest/about/advanced_usage.html#port> for details.
+1
-1
nixos/modules/services/networking/tailscale.nix
+1
-1
nixos/modules/services/networking/tailscale.nix
···+See <https://tailscale.com/kb/1215/oauth-clients#registering-new-nodes-using-oauth-credentials>
+1
-1
nixos/modules/services/networking/umurmur.nix
+1
-1
nixos/modules/services/networking/umurmur.nix
···-description = "Settings of uMurmur. For reference see https://github.com/umurmur/umurmur/blob/master/umurmur.conf.example";+description = "Settings of uMurmur. For reference see <https://github.com/umurmur/umurmur/blob/master/umurmur.conf.example>";
+1
-1
nixos/modules/services/networking/zerobin.nix
+1
-1
nixos/modules/services/networking/zerobin.nix
+1
-1
nixos/modules/services/scheduling/prefect.nix
+1
-1
nixos/modules/services/scheduling/prefect.nix
···-description = "external url when served by a reverse proxy, e.g. https://example.com/prefect";+description = "external url when served by a reverse proxy, e.g. `https://example.com/prefect`";
+4
-4
nixos/modules/services/security/authelia.nix
+4
-4
nixos/modules/services/security/authelia.nix
······If you are providing secrets please consider the options under {option}`services.authelia.<instance>.secrets`If you provide the raw secret rather than the location of a secret file that secret will be preserved in the nix store.···There are several values that are defined and documented in nix such as `default_2fa_method`,···
+1
-1
nixos/modules/services/security/bitwarden-directory-connector-cli.nix
+1
-1
nixos/modules/services/security/bitwarden-directory-connector-cli.nix
···-description = "Remove and re-add users/groups, See https://bitwarden.com/help/user-group-filters/#overwriting-syncs for more details.";+description = "Remove and re-add users/groups, See <https://bitwarden.com/help/user-group-filters/#overwriting-syncs> for more details.";
+1
-1
nixos/modules/services/system/cachix-agent/default.nix
+1
-1
nixos/modules/services/system/cachix-agent/default.nix
···
+1
-1
nixos/modules/services/system/cachix-watch-store.nix
+1
-1
nixos/modules/services/system/cachix-watch-store.nix
+5
-5
nixos/modules/services/system/kerberos/kerberos-server.md
+5
-5
nixos/modules/services/system/kerberos/kerberos-server.md
···-- Heimdal kerberos doc manpages (Debian unstable): https://manpages.debian.org/unstable/heimdal-docs/index.html-- Heimdal Kerberos kdc manpages (Debian unstable): https://manpages.debian.org/unstable/heimdal-kdc/index.html+- Heimdal kerberos doc manpages (Debian unstable): <https://manpages.debian.org/unstable/heimdal-docs/index.html>+- Heimdal Kerberos kdc manpages (Debian unstable): <https://manpages.debian.org/unstable/heimdal-kdc/index.html>
+1
-1
nixos/modules/services/system/zram-generator.nix
+1
-1
nixos/modules/services/system/zram-generator.nix
+1
-1
nixos/modules/services/torrent/opentracker.nix
+1
-1
nixos/modules/services/torrent/opentracker.nix
···
+3
-3
nixos/modules/services/video/frigate.nix
+3
-3
nixos/modules/services/video/frigate.nix
······
+1
-1
nixos/modules/services/video/wivrn.nix
+1
-1
nixos/modules/services/video/wivrn.nix
···Like upstream, the application option is a list including the application and it's flags. In the case of the NixOS module however, the first element of the list must be a package. The module will assert otherwise.The application can be set to a single package because it gets passed to lib.toList, though this will not allow for flags to be passed.
+1
-1
nixos/modules/services/web-apps/castopod.md
+1
-1
nixos/modules/services/web-apps/castopod.md
···Use the following configuration to start a public instance of Castopod on `castopod.example.com` domain:
+3
-3
nixos/modules/services/web-apps/haven.nix
+3
-3
nixos/modules/services/web-apps/haven.nix
······-Path to a file containing sensitive environment variables. See https://github.com/bitvora/haven for documentation.+Path to a file containing sensitive environment variables. See <https://github.com/bitvora/haven> for documentation.
+1
-1
nixos/modules/services/web-apps/karakeep.nix
+1
-1
nixos/modules/services/web-apps/karakeep.nix
···
+2
-2
nixos/modules/services/web-apps/lasuite-docs.nix
+2
-2
nixos/modules/services/web-apps/lasuite-docs.nix
···-See https://github.com/suitenumerique/docs/blob/v${cfg.collaborationServer.package.version}/docs/env.md+See <https://github.com/suitenumerique/docs/blob/v${cfg.collaborationServer.package.version}/docs/env.md>···`REDIS_URL` and `CELERY_BROKER_URL` are set if `services.lasuite-docs.redis.createLocally` is true.
+1
-1
nixos/modules/services/web-apps/nextjs-ollama-llm-ui.nix
+1
-1
nixos/modules/services/web-apps/nextjs-ollama-llm-ui.nix
···
+1
-1
nixos/modules/services/web-apps/nostr-rs-relay.nix
+1
-1
nixos/modules/services/web-apps/nostr-rs-relay.nix
···-description = "See https://git.sr.ht/~gheartsfield/nostr-rs-relay/#configuration for documentation.";+description = "See <https://git.sr.ht/~gheartsfield/nostr-rs-relay/#configuration> for documentation.";
+2
-2
nixos/modules/services/web-apps/outline.nix
+2
-2
nixos/modules/services/web-apps/outline.nix
···
+2
-2
nixos/modules/services/web-apps/peertube-runner.nix
+2
-2
nixos/modules/services/web-apps/peertube-runner.nix
···-See available configuration options at https://docs.joinpeertube.org/maintain/tools#configuration.+See available configuration options at <https://docs.joinpeertube.org/maintain/tools#configuration>.···-See how to generate registration tokens at https://docs.joinpeertube.org/admin/remote-runners#manage-remote-runners.+See how to generate registration tokens at <https://docs.joinpeertube.org/admin/remote-runners#manage-remote-runners>.
+1
-1
nixos/modules/services/web-apps/pixelfed.nix
+1
-1
nixos/modules/services/web-apps/pixelfed.nix
···
+1
-1
nixos/modules/services/web-apps/porn-vault/default.nix
+1
-1
nixos/modules/services/web-apps/porn-vault/default.nix
···
+3
-3
nixos/modules/services/web-apps/reposilite.nix
+3
-3
nixos/modules/services/web-apps/reposilite.nix
······Path to the .jsk KeyStore or paths to the PKCS#8 certificate and private key, separated by a space (see example).You can use `''${WORKING_DIRECTORY}` to refer to paths relative to Reposilite's working directory.If you are using a Java KeyStore, don't forget to specify the password via the {var}`REPOSILITE_LOCAL_KEYPASSWORD` environment variable.···Reposilite was configured to enable SSL, but no valid paths to certificate files were provided via `settings.keyPath`.
+4
-4
nixos/modules/services/web-apps/sharkey.nix
+4
-4
nixos/modules/services/web-apps/sharkey.nix
···-https://docs.joinsharkey.org/docs/install/configuration/ for how to configure Sharkey using environment+<https://docs.joinsharkey.org/docs/install/configuration/> for how to configure Sharkey using environment···Meilisearch setup. You also need to configure Sharkey to use an API key obtained from Meilisearch with the`MK_CONFIG_MEILISEARCH_APIKEY` environment variable, and set `services.sharkey.settings.meilisearch.index` to-the created index. See https://docs.joinsharkey.org/docs/customisation/search/meilisearch/ for how to create+the created index. See <https://docs.joinsharkey.org/docs/customisation/search/meilisearch/> for how to create···-https://activitypub.software/TransFem-org/Sharkey/-/blob/develop/.config/example.yml for details.+<https://activitypub.software/TransFem-org/Sharkey/-/blob/develop/.config/example.yml> for details.If `sqlPgroonga` is set, and `services.sharkey.setupPostgres` is `true`, the pgroonga extension will···-See https://activitypub.software/TransFem-org/Sharkey/-/blob/develop/.config/example.yml for a list of all+See <https://activitypub.software/TransFem-org/Sharkey/-/blob/develop/.config/example.yml> for a list of all
+2
-2
nixos/modules/services/web-apps/stash.nix
+2
-2
nixos/modules/services/web-apps/stash.nix
···-description = "Learn more at https://docs.stashapp.cc/networking/authentication-required-when-accessing-stash-from-the-internet/";+description = "Learn more at <https://docs.stashapp.cc/networking/authentication-required-when-accessing-stash-from-the-internet/>";···-description = "Learn more at https://docs.stashapp.cc/networking/authentication-required-when-accessing-stash-from-the-internet/";+description = "Learn more at <https://docs.stashapp.cc/networking/authentication-required-when-accessing-stash-from-the-internet/>";
+1
-1
nixos/modules/services/web-apps/strfry.nix
+1
-1
nixos/modules/services/web-apps/strfry.nix
···-description = "Configuration options to set for the Strfry service. See https://github.com/hoytech/strfry for documentation.";+description = "Configuration options to set for the Strfry service. See <https://github.com/hoytech/strfry> for documentation.";
+1
-1
nixos/modules/services/web-apps/youtrack.md
+1
-1
nixos/modules/services/web-apps/youtrack.md
···The new distribution with the JetBrains Launcher as a ZIP changed the basic data structure and also some configuration parameters.-Check out https://www.jetbrains.com/help/youtrack/server/YouTrack-Java-Start-Parameters.html for more information on the new configuration options.+Check out <https://www.jetbrains.com/help/youtrack/server/YouTrack-Java-Start-Parameters.html> for more information on the new configuration options.When upgrading to YouTrack 2023.1 or higher, a migration script will move the old state directory to `/var/lib/youtrack/2022_3` as a backup.
+1
-1
nixos/modules/services/web-servers/garage.nix
+1
-1
nixos/modules/services/web-servers/garage.nix
···The directory in which Garage will store the data blocks of objects. This folder can be placed on an HDD.-Since v0.9.0, Garage supports multiple data directories, refer to https://garagehq.deuxfleurs.fr/documentation/reference-manual/configuration/#data_dir for the exact format.+Since v0.9.0, Garage supports multiple data directories, refer to <https://garagehq.deuxfleurs.fr/documentation/reference-manual/configuration/#data_dir> for the exact format.
+2
-2
nixos/modules/services/web-servers/mighttpd2.nix
+2
-2
nixos/modules/services/web-servers/mighttpd2.nix
······
+4
-4
nixos/modules/services/web-servers/nginx/vhost-options.nix
+4
-4
nixos/modules/services/web-servers/nginx/vhost-options.nix
·········Note that special application protocol support is experimental and *not* yet recommended for production.···
+2
-2
nixos/modules/services/web-servers/send.nix
+2
-2
nixos/modules/services/web-servers/send.nix
···-All the available config options and their defaults can be found here: https://github.com/timvisee/send/blob/master/server/config.js,-some descriptions can found here: https://github.com/timvisee/send/blob/master/docs/docker.md#environment-variables+All the available config options and their defaults can be found here: <https://github.com/timvisee/send/blob/master/server/config.js>,+some descriptions can found here: <https://github.com/timvisee/send/blob/master/docs/docker.md#environment-variables>Values under {option}`services.send.environment` will override the predefined values in the Send service.
+1
-1
nixos/modules/services/web-servers/unit/default.nix
+1
-1
nixos/modules/services/web-servers/unit/default.nix
+1
-1
nixos/modules/system/boot/binfmt.nix
+1
-1
nixos/modules/system/boot/binfmt.nix
···
+3
-3
nixos/modules/system/boot/loader/systemd-boot/systemd-boot.nix
+3
-3
nixos/modules/system/boot/loader/systemd-boot/systemd-boot.nix
·········
+4
-4
nixos/modules/system/boot/zram-as-tmp.nix
+4
-4
nixos/modules/system/boot/zram-as-tmp.nix
············
+1
-1
nixos/modules/virtualisation/docker-rootless.nix
+1
-1
nixos/modules/virtualisation/docker-rootless.nix
···
+1
-1
nixos/modules/virtualisation/docker.nix
+1
-1
nixos/modules/virtualisation/docker.nix
···
+7
-7
nixos/modules/virtualisation/libvirtd.nix
+7
-7
nixos/modules/virtualisation/libvirtd.nix
·····················
+1
-1
nixos/modules/virtualisation/lxd.nix
+1
-1
nixos/modules/virtualisation/lxd.nix
···
+1
-1
nixos/modules/virtualisation/nixos-containers.nix
+1
-1
nixos/modules/virtualisation/nixos-containers.nix
···This is the recommanded option as it enhances container security massively and operates fully automatically in most cases.-See https://www.freedesktop.org/software/systemd/man/latest/systemd-nspawn.html#--private-users= for details.+See <https://www.freedesktop.org/software/systemd/man/latest/systemd-nspawn.html#--private-users=> for details.
+1
-1
nixos/modules/virtualisation/podman/network-socket.nix
+1
-1
nixos/modules/virtualisation/podman/network-socket.nix
···
+1
-1
nixos/modules/virtualisation/virtualbox-host.nix
+1
-1
nixos/modules/virtualisation/virtualbox-host.nix
···-Note: This is experimental. Please check https://github.com/cyberus-technology/virtualbox-kvm/issues.+Note: This is experimental. Please check <https://github.com/cyberus-technology/virtualbox-kvm/issues>.
+1
-1
nixos/modules/virtualisation/waagent.nix
+1
-1
nixos/modules/virtualisation/waagent.nix
···-The waagent.conf configuration, see https://learn.microsoft.com/en-us/azure/virtual-machines/extensions/agent-linux for documentation.+The waagent.conf configuration, see <https://learn.microsoft.com/en-us/azure/virtual-machines/extensions/agent-linux> for documentation.