+2
nixos/doc/manual/release-notes/rl-2405.section.md
+2
nixos/doc/manual/release-notes/rl-2405.section.md
···- `services.avahi.nssmdns` got split into `services.avahi.nssmdns4` and `services.avahi.nssmdns6` which enable the mDNS NSS switch for IPv4 and IPv6 respectively.Since most mDNS responders only register IPv4 addresses, most users want to keep the IPv6 support disabled to avoid long timeouts.
···+- `services.oauth2_proxy` was renamed to `services.oauth2-proxy`. Also the corresponding service, user and group were renamed.- `services.avahi.nssmdns` got split into `services.avahi.nssmdns4` and `services.avahi.nssmdns6` which enable the mDNS NSS switch for IPv4 and IPv6 respectively.Since most mDNS responders only register IPv4 addresses, most users want to keep the IPv6 support disabled to avoid long timeouts.
+2
-2
nixos/modules/module-list.nix
+2
-2
nixos/modules/module-list.nix
···
···
+124
-125
nixos/modules/services/security/oauth2_proxy.nix
nixos/modules/services/security/oauth2-proxy.nix
+124
-125
nixos/modules/services/security/oauth2_proxy.nix
nixos/modules/services/security/oauth2-proxy.nix
·················································································# XXX: Is this mandatory? Is it part of another group? Is it part of the provider specification?Set X-Auth-Request-User and X-Auth-Request-Email response headers (useful in Nginx auth_request mode). Setting this to 'null' means using the upstream default (false).······
·················································································# XXX: Is this mandatory? Is it part of another group? Is it part of the provider specification?Set X-Auth-Request-User and X-Auth-Request-Email response headers (useful in Nginx auth_request mode). Setting this to 'null' means using the upstream default (false).······
+27
-28
nixos/modules/services/security/oauth2_proxy_nginx.nix
nixos/modules/services/security/oauth2-proxy-nginx.nix
+27
-28
nixos/modules/services/security/oauth2_proxy_nginx.nix
nixos/modules/services/security/oauth2-proxy-nginx.nix
···-or multiple {option}`services.oauth2_proxy.nginx.virtualHosts` that are not on the same domain.-lib.warn "services.oauth2_proxy.nginx.virtualHosts should be an attrset, found ${lib.generators.toPretty {} x}"···-config.services.oauth2_proxy = mkIf (cfg.virtualHosts != [] && (hasPrefix "127.0.0.1:" cfg.proxy)) {-config.services.nginx = mkIf (cfg.virtualHosts != [] && config.services.oauth2_proxy.enable) (mkMerge ([···
···+or multiple {option}`services.oauth2-proxy.nginx.virtualHosts` that are not on the same domain.+lib.warn "services.oauth2-proxy.nginx.virtualHosts should be an attrset, found ${lib.generators.toPretty {} x}"···+config.services.oauth2-proxy = lib.mkIf (cfg.virtualHosts != [] && (lib.hasPrefix "127.0.0.1:" cfg.proxy)) {+config.services.nginx = lib.mkIf (cfg.virtualHosts != [] && config.services.oauth2-proxy.enable) (lib.mkMerge ([···