+3
-1
nixos/doc/manual/release-notes/rl-2511.section.md
+3
-1
nixos/doc/manual/release-notes/rl-2511.section.md
···- `services.dependency-track` removed its configuration of the JVM heap size. This lets the JVM choose its maximum heap size automatically, which should work much better in practice for most users. For deployments on systems with little RAM, it may now be necessary to manually configure a maximum heap size using {option}`services.dependency-track.javaArgs`.-- `services.dnscrypt-proxy2` gains a `package` option to specify dnscrypt-proxy package to use.- `services.nextcloud.configureRedis` now defaults to `true` in accordance with upstream recommendations to have caching for file locking. See the [upstream doc](https://docs.nextcloud.com/server/31/admin_manual/configuration_files/files_locking_transactional.html) for further details.
···- `services.dependency-track` removed its configuration of the JVM heap size. This lets the JVM choose its maximum heap size automatically, which should work much better in practice for most users. For deployments on systems with little RAM, it may now be necessary to manually configure a maximum heap size using {option}`services.dependency-track.javaArgs`.+- `services.dnscrypt-proxy2` was renamed to `services.dnscrypt-proxy` to match the package name. The systemd service is now also `dnscrypt-proxy`, but the old name is still provided as an alias for backwards compatibility.+- `services.dnscrypt-proxy` gains a `package` option to specify dnscrypt-proxy package to use.- `services.nextcloud.configureRedis` now defaults to `true` in accordance with upstream recommendations to have caching for file locking. See the [upstream doc](https://docs.nextcloud.com/server/31/admin_manual/configuration_files/files_locking_transactional.html) for further details.
+1
-1
nixos/modules/module-list.nix
+1
-1
nixos/modules/module-list.nix
-1
nixos/modules/rename.nix
-1
nixos/modules/rename.nix
···-(mkRemovedOptionModule [ "services" "dnscrypt-proxy" ] "Use services.dnscrypt-proxy2 instead")The dnscrypt-wrapper module was removed since the project has been effectively unmaintained since 2018;moreover the NixOS module had to rely on an abandoned version of dnscrypt-proxy v1 for the rotation of keys.
···The dnscrypt-wrapper module was removed since the project has been effectively unmaintained since 2018;moreover the NixOS module had to rely on an abandoned version of dnscrypt-proxy v1 for the rotation of keys.
+12
-7
nixos/modules/services/networking/dnscrypt-proxy2.nix
nixos/modules/services/networking/dnscrypt-proxy.nix
+12
-7
nixos/modules/services/networking/dnscrypt-proxy2.nix
nixos/modules/services/networking/dnscrypt-proxy.nix
······-Whether to base the config declared in {option}`services.dnscrypt-proxy2.settings` on the upstream example config (<https://github.com/DNSCrypt/dnscrypt-proxy/blob/master/dnscrypt-proxy/example-dnscrypt-proxy.toml>)···Path to TOML config file. See: <https://github.com/DNSCrypt/dnscrypt-proxy/blob/master/dnscrypt-proxy/example-dnscrypt-proxy.toml>-If this option is set, it will override any configuration done in options.services.dnscrypt-proxy2.settings.···-defaultText = lib.literalMD "TOML file generated from {option}`services.dnscrypt-proxy2.settings`";······
······+Whether to base the config declared in {option}`services.dnscrypt-proxy.settings` on the upstream example config (<https://github.com/DNSCrypt/dnscrypt-proxy/blob/master/dnscrypt-proxy/example-dnscrypt-proxy.toml>)···Path to TOML config file. See: <https://github.com/DNSCrypt/dnscrypt-proxy/blob/master/dnscrypt-proxy/example-dnscrypt-proxy.toml>+If this option is set, it will override any configuration done in options.services.dnscrypt-proxy.settings.···+defaultText = lib.literalMD "TOML file generated from {option}`services.dnscrypt-proxy.settings`";······
+1
-1
nixos/tests/all-tests.nix
+1
-1
nixos/tests/all-tests.nix
···
···
+4
-4
nixos/tests/dnscrypt-proxy2.nix
nixos/tests/dnscrypt-proxy.nix
+4
-4
nixos/tests/dnscrypt-proxy2.nix
nixos/tests/dnscrypt-proxy.nix
·········client.wait_until_succeeds("ss --numeric --udp --listening | grep -q ${toString localProxyPort}")
·········client.wait_until_succeeds("ss --numeric --udp --listening | grep -q ${toString localProxyPort}")
+4
-4
nixos/tests/dnsdist.nix
+4
-4
nixos/tests/dnsdist.nix
······
······
+1
-1
pkgs/by-name/dn/dnscrypt-proxy/package.nix
+1
-1
pkgs/by-name/dn/dnscrypt-proxy/package.nix
+1
-1
pkgs/by-name/dn/dnsmasq/package.nix
+1
-1
pkgs/by-name/dn/dnsmasq/package.nix
···