+1
-1
nixos/lib/systemd-types.nix
+1
-1
nixos/lib/systemd-types.nix
+1
-1
nixos/modules/hardware/fw-fanctrl.nix
+1
-1
nixos/modules/hardware/fw-fanctrl.nix
+1
-1
nixos/modules/hardware/nfc-nci.nix
+1
-1
nixos/modules/hardware/nfc-nci.nix
+1
-1
nixos/modules/hardware/video/nvidia.nix
+1
-1
nixos/modules/hardware/video/nvidia.nix
···-See: https://forums.developer.nvidia.com/t/the-all-new-outputsink-feature-aka-reverse-prime/129828
···+See: <https://forums.developer.nvidia.com/t/the-all-new-outputsink-feature-aka-reverse-prime/129828>
+2
-2
nixos/modules/programs/firefox.nix
+2
-2
nixos/modules/programs/firefox.nix
···-preferences by locking them. More info can be found in https://support.mozilla.org/en-US/kb/customizing-firefox-using-autoconfig.···-preferences by locking them. More info can be found in https://support.mozilla.org/en-US/kb/customizing-firefox-using-autoconfig.
···+preferences by locking them. More info can be found in <https://support.mozilla.org/en-US/kb/customizing-firefox-using-autoconfig>.···+preferences by locking them. More info can be found in <https://support.mozilla.org/en-US/kb/customizing-firefox-using-autoconfig>.
+1
-1
nixos/modules/programs/lazygit.nix
+1
-1
nixos/modules/programs/lazygit.nix
+1
-1
nixos/modules/programs/nautilus-open-any-terminal.nix
+1
-1
nixos/modules/programs/nautilus-open-any-terminal.nix
+1
-1
nixos/modules/programs/ryzen-monitor-ng.nix
+1
-1
nixos/modules/programs/ryzen-monitor-ng.nix
···WARNING: Damage cause by use of your AMD processor outside of official AMD specifications or outside of factory settings are not covered under any AMD product warranty and may not be covered by your board or system manufacturer's warranty
···WARNING: Damage cause by use of your AMD processor outside of official AMD specifications or outside of factory settings are not covered under any AMD product warranty and may not be covered by your board or system manufacturer's warranty
+1
-1
nixos/modules/programs/starship.nix
+1
-1
nixos/modules/programs/starship.nix
+3
-3
nixos/modules/programs/yazi.nix
+3
-3
nixos/modules/programs/yazi.nix
·········
·········
+1
-1
nixos/modules/programs/zsh/oh-my-zsh.nix
+1
-1
nixos/modules/programs/zsh/oh-my-zsh.nix
···-For example, to disable async git prompt write `zstyle ':omz:alpha:lib:git' async-prompt no` (more information https://github.com/ohmyzsh/ohmyzsh?tab=readme-ov-file#async-git-prompt)
···+For example, to disable async git prompt write `zstyle ':omz:alpha:lib:git' async-prompt no` (more information <https://github.com/ohmyzsh/ohmyzsh?tab=readme-ov-file#async-git-prompt>)
+4
-4
nixos/modules/services/amqp/rabbitmq.nix
+4
-4
nixos/modules/services/amqp/rabbitmq.nix
······
······
+1
-1
nixos/modules/services/audio/alsa.nix
+1
-1
nixos/modules/services/audio/alsa.nix
+2
-2
nixos/modules/services/backup/borgmatic.nix
+2
-2
nixos/modules/services/backup/borgmatic.nix
······-Set of borgmatic configurations, see https://torsion.org/borgmatic/docs/reference/configuration/
······+Set of borgmatic configurations, see <https://torsion.org/borgmatic/docs/reference/configuration/>
+1
-1
nixos/modules/services/cluster/k3s/default.nix
+1
-1
nixos/modules/services/cluster/k3s/default.nix
···
···
+1
-1
nixos/modules/services/continuous-integration/buildbot/master.nix
+1
-1
nixos/modules/services/continuous-integration/buildbot/master.nix
···-description = "Configurator Steps, see https://docs.buildbot.net/latest/manual/configuration/configurators.html";
···+description = "Configurator Steps, see <https://docs.buildbot.net/latest/manual/configuration/configurators.html>";
+1
-1
nixos/modules/services/continuous-integration/gitea-actions-runner.nix
+1
-1
nixos/modules/services/continuous-integration/gitea-actions-runner.nix
+1
-1
nixos/modules/services/databases/dgraph.nix
+1
-1
nixos/modules/services/databases/dgraph.nix
+2
-2
nixos/modules/services/databases/postgresql.md
+2
-2
nixos/modules/services/databases/postgresql.md
···
···
+3
-3
nixos/modules/services/development/blackfire.nix
+3
-3
nixos/modules/services/development/blackfire.nix
·········
·········
+1
-1
nixos/modules/services/development/jupyter/default.nix
+1
-1
nixos/modules/services/development/jupyter/default.nix
···-Can be generated following: https://jupyter-server.readthedocs.io/en/stable/operators/public-server.html#preparing-a-hashed-passwordexample = "argon2:$argon2id$v=19$m=10240,t=10,p=8$48hF+vTUuy1LB83/GzNhUg$J1nx4jPWD7PwOJHs5OtDW8pjYK2s0c1R3rYGbSIKB54";
···+Can be generated following: <https://jupyter-server.readthedocs.io/en/stable/operators/public-server.html#preparing-a-hashed-password>example = "argon2:$argon2id$v=19$m=10240,t=10,p=8$48hF+vTUuy1LB83/GzNhUg$J1nx4jPWD7PwOJHs5OtDW8pjYK2s0c1R3rYGbSIKB54";
+1
-1
nixos/modules/services/development/jupyterhub/default.nix
+1
-1
nixos/modules/services/development/jupyterhub/default.nix
···
···+Traitlets. <https://jupyterhub.readthedocs.io/en/stable/getting-started/config-basics.html>. The
+1
-1
nixos/modules/services/games/mchprs.nix
+1
-1
nixos/modules/services/games/mchprs.nix
+1
-1
nixos/modules/services/hardware/display.md
+1
-1
nixos/modules/services/hardware/display.md
···-from https://github.com/linuxhw/EDID based on simple string/regexp search identifying exact entries:
···+from <https://github.com/linuxhw/EDID> based on simple string/regexp search identifying exact entries:
+3
-3
nixos/modules/services/hardware/display.nix
+3
-3
nixos/modules/services/hardware/display.nix
······
······
+1
-1
nixos/modules/services/hardware/tlp.nix
+1
-1
nixos/modules/services/hardware/tlp.nix
+1
-1
nixos/modules/services/home-automation/matter-server.nix
+1
-1
nixos/modules/services/home-automation/matter-server.nix
+1
-1
nixos/modules/services/mail/mailman.md
+1
-1
nixos/modules/services/mail/mailman.md
···
···
+1
-1
nixos/modules/services/mail/roundcube.nix
+1
-1
nixos/modules/services/mail/roundcube.nix
···-Must be formatted according to PostgreSQL .pgpass standard (see https://www.postgresql.org/docs/current/libpq-pgpass.html)
···+Must be formatted according to PostgreSQL .pgpass standard (see <https://www.postgresql.org/docs/current/libpq-pgpass.html>)
+1
-1
nixos/modules/services/matrix/dendrite.nix
+1
-1
nixos/modules/services/matrix/dendrite.nix
+1
-1
nixos/modules/services/matrix/maubot.md
+1
-1
nixos/modules/services/matrix/maubot.md
···
···
+1
-1
nixos/modules/services/misc/dwm-status.nix
+1
-1
nixos/modules/services/misc/dwm-status.nix
+1
-1
nixos/modules/services/misc/radicle.nix
+1
-1
nixos/modules/services/misc/radicle.nix
+2
-2
nixos/modules/services/misc/renovate.nix
+2
-2
nixos/modules/services/misc/renovate.nix
······If you want to pass secrets to renovate, please use {option}`services.renovate.credentials` for that.
······If you want to pass secrets to renovate, please use {option}`services.renovate.credentials` for that.
+2
-2
nixos/modules/services/misc/tabby.nix
+2
-2
nixos/modules/services/misc/tabby.nix
······
······
+1
-1
nixos/modules/services/monitoring/glpi-agent.nix
+1
-1
nixos/modules/services/monitoring/glpi-agent.nix
+1
-1
nixos/modules/services/monitoring/prometheus/default.nix
+1
-1
nixos/modules/services/monitoring/prometheus/default.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/ecoflow.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/ecoflow.nix
···-Path to the file with your personal api access string from the Ecoflow development website https://developer-eu.ecoflow.com.···-Path to the file with your personal api secret string from the Ecoflow development website https://developer-eu.ecoflow.com.
···+Path to the file with your personal api access string from the Ecoflow development website <https://developer-eu.ecoflow.com>.···+Path to the file with your personal api secret string from the Ecoflow development website <https://developer-eu.ecoflow.com>.
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/pgbouncer.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/pgbouncer.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/pve.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/pve.nix
···The environment file should NOT be stored in /nix/store as it contains passwords and/or keys in plain text.-Environment reference: https://github.com/prometheus-pve/prometheus-pve-exporter#authentication···-Configuration reference: https://github.com/prometheus-pve/prometheus-pve-exporter/#authentication
···The environment file should NOT be stored in /nix/store as it contains passwords and/or keys in plain text.+Environment reference: <https://github.com/prometheus-pve/prometheus-pve-exporter#authentication>···+Configuration reference: <https://github.com/prometheus-pve/prometheus-pve-exporter/#authentication>
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/tibber.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/tibber.nix
···Do not share your personal plaintext Tibber API Token via github. (see: ryantm/agenix, mic92/sops)
···Do not share your personal plaintext Tibber API Token via github. (see: ryantm/agenix, mic92/sops)
+2
-2
nixos/modules/services/network-filesystems/ipfs-cluster.nix
+2
-2
nixos/modules/services/network-filesystems/ipfs-cluster.nix
···-description = "Consensus protocol - 'raft' or 'crdt'. https://cluster.ipfs.io/documentation/guides/consensus/";···-description = "Open swarm port, secured by the cluster secret. This does not expose the API or proxy. https://cluster.ipfs.io/documentation/guides/security/";
···+description = "Consensus protocol - 'raft' or 'crdt'. <https://cluster.ipfs.io/documentation/guides/consensus/>";···+description = "Open swarm port, secured by the cluster secret. This does not expose the API or proxy. <https://cluster.ipfs.io/documentation/guides/security/>";
+5
-5
nixos/modules/services/network-filesystems/xtreemfs.nix
+5
-5
nixos/modules/services/network-filesystems/xtreemfs.nix
···············
···············
+1
-1
nixos/modules/services/network-filesystems/yandex-disk.nix
+1
-1
nixos/modules/services/network-filesystems/yandex-disk.nix
+2
-2
nixos/modules/services/networking/aria2.nix
+2
-2
nixos/modules/services/networking/aria2.nix
···-Read https://aria2.github.io/manual/en/html/aria2c.html#rpc-auth to know how this option value is used.···
···+Read <https://aria2.github.io/manual/en/html/aria2c.html#rpc-auth> to know how this option value is used.···
+1
-1
nixos/modules/services/networking/crab-hole.nix
+1
-1
nixos/modules/services/networking/crab-hole.nix
+1
-1
nixos/modules/services/networking/doh-server.md
+1
-1
nixos/modules/services/networking/doh-server.md
+1
-1
nixos/modules/services/networking/doh-server.nix
+1
-1
nixos/modules/services/networking/doh-server.nix
+5
-5
nixos/modules/services/networking/mihomo.nix
+5
-5
nixos/modules/services/networking/mihomo.nix
···
+2
-2
nixos/modules/services/networking/monero.nix
+2
-2
nixos/modules/services/networking/monero.nix
······
······
+1
-1
nixos/modules/services/networking/morty.nix
+1
-1
nixos/modules/services/networking/morty.nix
+1
-1
nixos/modules/services/networking/mycelium.nix
+1
-1
nixos/modules/services/networking/mycelium.nix
+1
-1
nixos/modules/services/networking/newt.nix
+1
-1
nixos/modules/services/networking/newt.nix
···-Path to a file containing sensitive environment variables for Newt. See https://docs.fossorial.io/Newt/overview#cli-args
···+Path to a file containing sensitive environment variables for Newt. See <https://docs.fossorial.io/Newt/overview#cli-args>
+1
-1
nixos/modules/services/networking/nghttpx/backend-submodule.nix
+1
-1
nixos/modules/services/networking/nghttpx/backend-submodule.nix
+5
-5
nixos/modules/services/networking/nghttpx/frontend-params-submodule.nix
+5
-5
nixos/modules/services/networking/nghttpx/frontend-params-submodule.nix
···············
···············
+6
-6
nixos/modules/services/networking/nghttpx/nghttpx-options.nix
+6
-6
nixos/modules/services/networking/nghttpx/nghttpx-options.nix
·········-Please see https://nghttp2.org/documentation/nghttpx.1.html#cmdoption-nghttpx--backend-address-family·········
···+Please see <https://nghttp2.org/documentation/nghttpx.1.html#cmdoption-nghttpx--single-process>······+Please see <https://nghttp2.org/documentation/nghttpx.1.html#cmdoption-nghttpx--backend-address-family>······+Please see <https://nghttp2.org/documentation/nghttpx.1.html#cmdoption-nghttpx--single-thread>···+Please see <https://nghttp2.org/documentation/nghttpx.1.html#cmdoption-nghttpx--rlimit-nofile>
+1
-1
nixos/modules/services/networking/nm-file-secret-agent.nix
+1
-1
nixos/modules/services/networking/nm-file-secret-agent.nix
···
···
+1
-1
nixos/modules/services/networking/nomad.nix
+1
-1
nixos/modules/services/networking/nomad.nix
+1
-1
nixos/modules/services/networking/openconnect.nix
+1
-1
nixos/modules/services/networking/openconnect.nix
···
···
+1
-1
nixos/modules/services/networking/pdns-recursor.nix
+1
-1
nixos/modules/services/networking/pdns-recursor.nix
+1
-1
nixos/modules/services/networking/prosody.nix
+1
-1
nixos/modules/services/networking/prosody.nix
···
···
+1
-1
nixos/modules/services/networking/sing-box.nix
+1
-1
nixos/modules/services/networking/sing-box.nix
+2
-2
nixos/modules/services/networking/sunshine.nix
+2
-2
nixos/modules/services/networking/sunshine.nix
···Settings to be rendered into the configuration file. If this is set, no configuration is possible from the web UI.-See https://docs.lizardbyte.dev/projects/sunshine/en/latest/about/advanced_usage.html#configuration for syntax.···-Base port -- others used are offset from this one, see https://docs.lizardbyte.dev/projects/sunshine/en/latest/about/advanced_usage.html#port for details.
···Settings to be rendered into the configuration file. If this is set, no configuration is possible from the web UI.+See <https://docs.lizardbyte.dev/projects/sunshine/en/latest/about/advanced_usage.html#configuration for syntax>.···+Base port -- others used are offset from this one, see <https://docs.lizardbyte.dev/projects/sunshine/en/latest/about/advanced_usage.html#port> for details.
+1
-1
nixos/modules/services/networking/tailscale.nix
+1
-1
nixos/modules/services/networking/tailscale.nix
+1
-1
nixos/modules/services/networking/umurmur.nix
+1
-1
nixos/modules/services/networking/umurmur.nix
+1
-1
nixos/modules/services/networking/zerobin.nix
+1
-1
nixos/modules/services/networking/zerobin.nix
+1
-1
nixos/modules/services/scheduling/prefect.nix
+1
-1
nixos/modules/services/scheduling/prefect.nix
+4
-4
nixos/modules/services/security/authelia.nix
+4
-4
nixos/modules/services/security/authelia.nix
······If you are providing secrets please consider the options under {option}`services.authelia.<instance>.secrets`If you provide the raw secret rather than the location of a secret file that secret will be preserved in the nix store.······
······If you are providing secrets please consider the options under {option}`services.authelia.<instance>.secrets`If you provide the raw secret rather than the location of a secret file that secret will be preserved in the nix store.······
+1
-1
nixos/modules/services/security/bitwarden-directory-connector-cli.nix
+1
-1
nixos/modules/services/security/bitwarden-directory-connector-cli.nix
+1
-1
nixos/modules/services/system/cachix-agent/default.nix
+1
-1
nixos/modules/services/system/cachix-agent/default.nix
+1
-1
nixos/modules/services/system/cachix-watch-store.nix
+1
-1
nixos/modules/services/system/cachix-watch-store.nix
+5
-5
nixos/modules/services/system/kerberos/kerberos-server.md
+5
-5
nixos/modules/services/system/kerberos/kerberos-server.md
···-- Heimdal kerberos doc manpages (Debian unstable): https://manpages.debian.org/unstable/heimdal-docs/index.html-- Heimdal Kerberos kdc manpages (Debian unstable): https://manpages.debian.org/unstable/heimdal-kdc/index.html
···+- Heimdal kerberos doc manpages (Debian unstable): <https://manpages.debian.org/unstable/heimdal-docs/index.html>+- Heimdal Kerberos kdc manpages (Debian unstable): <https://manpages.debian.org/unstable/heimdal-kdc/index.html>
+1
-1
nixos/modules/services/system/zram-generator.nix
+1
-1
nixos/modules/services/system/zram-generator.nix
+1
-1
nixos/modules/services/torrent/opentracker.nix
+1
-1
nixos/modules/services/torrent/opentracker.nix
+3
-3
nixos/modules/services/video/frigate.nix
+3
-3
nixos/modules/services/video/frigate.nix
······
······
+1
-1
nixos/modules/services/video/wivrn.nix
+1
-1
nixos/modules/services/video/wivrn.nix
···Like upstream, the application option is a list including the application and it's flags. In the case of the NixOS module however, the first element of the list must be a package. The module will assert otherwise.The application can be set to a single package because it gets passed to lib.toList, though this will not allow for flags to be passed.
···Like upstream, the application option is a list including the application and it's flags. In the case of the NixOS module however, the first element of the list must be a package. The module will assert otherwise.The application can be set to a single package because it gets passed to lib.toList, though this will not allow for flags to be passed.
+1
-1
nixos/modules/services/web-apps/castopod.md
+1
-1
nixos/modules/services/web-apps/castopod.md
+3
-3
nixos/modules/services/web-apps/haven.nix
+3
-3
nixos/modules/services/web-apps/haven.nix
······-Path to a file containing sensitive environment variables. See https://github.com/bitvora/haven for documentation.
······+Path to a file containing sensitive environment variables. See <https://github.com/bitvora/haven> for documentation.
+1
-1
nixos/modules/services/web-apps/karakeep.nix
+1
-1
nixos/modules/services/web-apps/karakeep.nix
+2
-2
nixos/modules/services/web-apps/lasuite-docs.nix
+2
-2
nixos/modules/services/web-apps/lasuite-docs.nix
···-See https://github.com/suitenumerique/docs/blob/v${cfg.collaborationServer.package.version}/docs/env.md···`REDIS_URL` and `CELERY_BROKER_URL` are set if `services.lasuite-docs.redis.createLocally` is true.
···+See <https://github.com/suitenumerique/docs/blob/v${cfg.collaborationServer.package.version}/docs/env.md>···`REDIS_URL` and `CELERY_BROKER_URL` are set if `services.lasuite-docs.redis.createLocally` is true.
+1
-1
nixos/modules/services/web-apps/nextjs-ollama-llm-ui.nix
+1
-1
nixos/modules/services/web-apps/nextjs-ollama-llm-ui.nix
+1
-1
nixos/modules/services/web-apps/nostr-rs-relay.nix
+1
-1
nixos/modules/services/web-apps/nostr-rs-relay.nix
+2
-2
nixos/modules/services/web-apps/outline.nix
+2
-2
nixos/modules/services/web-apps/outline.nix
···
···
+2
-2
nixos/modules/services/web-apps/peertube-runner.nix
+2
-2
nixos/modules/services/web-apps/peertube-runner.nix
···-See available configuration options at https://docs.joinpeertube.org/maintain/tools#configuration.···-See how to generate registration tokens at https://docs.joinpeertube.org/admin/remote-runners#manage-remote-runners.
···+See available configuration options at <https://docs.joinpeertube.org/maintain/tools#configuration>.···+See how to generate registration tokens at <https://docs.joinpeertube.org/admin/remote-runners#manage-remote-runners>.
+1
-1
nixos/modules/services/web-apps/pixelfed.nix
+1
-1
nixos/modules/services/web-apps/pixelfed.nix
+1
-1
nixos/modules/services/web-apps/porn-vault/default.nix
+1
-1
nixos/modules/services/web-apps/porn-vault/default.nix
+3
-3
nixos/modules/services/web-apps/reposilite.nix
+3
-3
nixos/modules/services/web-apps/reposilite.nix
······Path to the .jsk KeyStore or paths to the PKCS#8 certificate and private key, separated by a space (see example).You can use `''${WORKING_DIRECTORY}` to refer to paths relative to Reposilite's working directory.If you are using a Java KeyStore, don't forget to specify the password via the {var}`REPOSILITE_LOCAL_KEYPASSWORD` environment variable.···Reposilite was configured to enable SSL, but no valid paths to certificate files were provided via `settings.keyPath`.
······Path to the .jsk KeyStore or paths to the PKCS#8 certificate and private key, separated by a space (see example).You can use `''${WORKING_DIRECTORY}` to refer to paths relative to Reposilite's working directory.If you are using a Java KeyStore, don't forget to specify the password via the {var}`REPOSILITE_LOCAL_KEYPASSWORD` environment variable.···Reposilite was configured to enable SSL, but no valid paths to certificate files were provided via `settings.keyPath`.
+4
-4
nixos/modules/services/web-apps/sharkey.nix
+4
-4
nixos/modules/services/web-apps/sharkey.nix
···-https://docs.joinsharkey.org/docs/install/configuration/ for how to configure Sharkey using environment···Meilisearch setup. You also need to configure Sharkey to use an API key obtained from Meilisearch with the`MK_CONFIG_MEILISEARCH_APIKEY` environment variable, and set `services.sharkey.settings.meilisearch.index` to-the created index. See https://docs.joinsharkey.org/docs/customisation/search/meilisearch/ for how to create···-https://activitypub.software/TransFem-org/Sharkey/-/blob/develop/.config/example.yml for details.If `sqlPgroonga` is set, and `services.sharkey.setupPostgres` is `true`, the pgroonga extension will···-See https://activitypub.software/TransFem-org/Sharkey/-/blob/develop/.config/example.yml for a list of all
···+<https://docs.joinsharkey.org/docs/install/configuration/> for how to configure Sharkey using environment···Meilisearch setup. You also need to configure Sharkey to use an API key obtained from Meilisearch with the`MK_CONFIG_MEILISEARCH_APIKEY` environment variable, and set `services.sharkey.settings.meilisearch.index` to+the created index. See <https://docs.joinsharkey.org/docs/customisation/search/meilisearch/> for how to create···+<https://activitypub.software/TransFem-org/Sharkey/-/blob/develop/.config/example.yml> for details.If `sqlPgroonga` is set, and `services.sharkey.setupPostgres` is `true`, the pgroonga extension will···+See <https://activitypub.software/TransFem-org/Sharkey/-/blob/develop/.config/example.yml> for a list of all
+2
-2
nixos/modules/services/web-apps/stash.nix
+2
-2
nixos/modules/services/web-apps/stash.nix
···-description = "Learn more at https://docs.stashapp.cc/networking/authentication-required-when-accessing-stash-from-the-internet/";···-description = "Learn more at https://docs.stashapp.cc/networking/authentication-required-when-accessing-stash-from-the-internet/";
···+description = "Learn more at <https://docs.stashapp.cc/networking/authentication-required-when-accessing-stash-from-the-internet/>";···+description = "Learn more at <https://docs.stashapp.cc/networking/authentication-required-when-accessing-stash-from-the-internet/>";
+1
-1
nixos/modules/services/web-apps/strfry.nix
+1
-1
nixos/modules/services/web-apps/strfry.nix
···-description = "Configuration options to set for the Strfry service. See https://github.com/hoytech/strfry for documentation.";
···+description = "Configuration options to set for the Strfry service. See <https://github.com/hoytech/strfry> for documentation.";
+1
-1
nixos/modules/services/web-apps/youtrack.md
+1
-1
nixos/modules/services/web-apps/youtrack.md
···The new distribution with the JetBrains Launcher as a ZIP changed the basic data structure and also some configuration parameters.-Check out https://www.jetbrains.com/help/youtrack/server/YouTrack-Java-Start-Parameters.html for more information on the new configuration options.When upgrading to YouTrack 2023.1 or higher, a migration script will move the old state directory to `/var/lib/youtrack/2022_3` as a backup.
···The new distribution with the JetBrains Launcher as a ZIP changed the basic data structure and also some configuration parameters.+Check out <https://www.jetbrains.com/help/youtrack/server/YouTrack-Java-Start-Parameters.html> for more information on the new configuration options.When upgrading to YouTrack 2023.1 or higher, a migration script will move the old state directory to `/var/lib/youtrack/2022_3` as a backup.
+1
-1
nixos/modules/services/web-servers/garage.nix
+1
-1
nixos/modules/services/web-servers/garage.nix
···The directory in which Garage will store the data blocks of objects. This folder can be placed on an HDD.-Since v0.9.0, Garage supports multiple data directories, refer to https://garagehq.deuxfleurs.fr/documentation/reference-manual/configuration/#data_dir for the exact format.
···The directory in which Garage will store the data blocks of objects. This folder can be placed on an HDD.+Since v0.9.0, Garage supports multiple data directories, refer to <https://garagehq.deuxfleurs.fr/documentation/reference-manual/configuration/#data_dir> for the exact format.
+2
-2
nixos/modules/services/web-servers/mighttpd2.nix
+2
-2
nixos/modules/services/web-servers/mighttpd2.nix
······
······
+4
-4
nixos/modules/services/web-servers/nginx/vhost-options.nix
+4
-4
nixos/modules/services/web-servers/nginx/vhost-options.nix
·········Note that special application protocol support is experimental and *not* yet recommended for production.···
·········Note that special application protocol support is experimental and *not* yet recommended for production.···
+2
-2
nixos/modules/services/web-servers/send.nix
+2
-2
nixos/modules/services/web-servers/send.nix
···-All the available config options and their defaults can be found here: https://github.com/timvisee/send/blob/master/server/config.js,-some descriptions can found here: https://github.com/timvisee/send/blob/master/docs/docker.md#environment-variablesValues under {option}`services.send.environment` will override the predefined values in the Send service.
···+All the available config options and their defaults can be found here: <https://github.com/timvisee/send/blob/master/server/config.js>,+some descriptions can found here: <https://github.com/timvisee/send/blob/master/docs/docker.md#environment-variables>Values under {option}`services.send.environment` will override the predefined values in the Send service.
+1
-1
nixos/modules/services/web-servers/unit/default.nix
+1
-1
nixos/modules/services/web-servers/unit/default.nix
+1
-1
nixos/modules/system/boot/binfmt.nix
+1
-1
nixos/modules/system/boot/binfmt.nix
+3
-3
nixos/modules/system/boot/loader/systemd-boot/systemd-boot.nix
+3
-3
nixos/modules/system/boot/loader/systemd-boot/systemd-boot.nix
·········
·········
+4
-4
nixos/modules/system/boot/zram-as-tmp.nix
+4
-4
nixos/modules/system/boot/zram-as-tmp.nix
············
············
+1
-1
nixos/modules/virtualisation/docker-rootless.nix
+1
-1
nixos/modules/virtualisation/docker-rootless.nix
+1
-1
nixos/modules/virtualisation/docker.nix
+1
-1
nixos/modules/virtualisation/docker.nix
+7
-7
nixos/modules/virtualisation/libvirtd.nix
+7
-7
nixos/modules/virtualisation/libvirtd.nix
·····················
·····················
+1
-1
nixos/modules/virtualisation/lxd.nix
+1
-1
nixos/modules/virtualisation/lxd.nix
+1
-1
nixos/modules/virtualisation/nixos-containers.nix
+1
-1
nixos/modules/virtualisation/nixos-containers.nix
···This is the recommanded option as it enhances container security massively and operates fully automatically in most cases.-See https://www.freedesktop.org/software/systemd/man/latest/systemd-nspawn.html#--private-users= for details.
···This is the recommanded option as it enhances container security massively and operates fully automatically in most cases.+See <https://www.freedesktop.org/software/systemd/man/latest/systemd-nspawn.html#--private-users=> for details.
+1
-1
nixos/modules/virtualisation/podman/network-socket.nix
+1
-1
nixos/modules/virtualisation/podman/network-socket.nix
···
···
+1
-1
nixos/modules/virtualisation/virtualbox-host.nix
+1
-1
nixos/modules/virtualisation/virtualbox-host.nix
+1
-1
nixos/modules/virtualisation/waagent.nix
+1
-1
nixos/modules/virtualisation/waagent.nix