+2
-2
nixos/modules/programs/singularity.nix
+2
-2
nixos/modules/programs/singularity.nix
···
···
+1
-1
nixos/modules/services/continuous-integration/gitlab-runner.nix
+1
-1
nixos/modules/services/continuous-integration/gitlab-runner.nix
···
+1
-1
nixos/modules/services/misc/confd.nix
+1
-1
nixos/modules/services/misc/confd.nix
+1
-1
nixos/modules/services/misc/etcd.nix
+1
-1
nixos/modules/services/misc/etcd.nix
+8
-8
nixos/modules/services/misc/gitea.nix
+8
-8
nixos/modules/services/misc/gitea.nix
···after = [ "network.target" ] ++ lib.optional usePostgresql "postgresql.service" ++ lib.optional useMysql "mysql.service";·········-sed -ri 's,/nix/store/[a-z0-9.-]+/bin/gitea,${gitea.bin}/bin/gitea,g' ${cfg.stateDir}/.ssh/authorized_keys·········
···after = [ "network.target" ] ++ lib.optional usePostgresql "postgresql.service" ++ lib.optional useMysql "mysql.service";·········+sed -ri 's,/nix/store/[a-z0-9.-]+/bin/gitea,${gitea}/bin/gitea,g' ${cfg.stateDir}/.ssh/authorized_keys·········
+3
-3
nixos/modules/services/misc/gogs.nix
+3
-3
nixos/modules/services/misc/gogs.nix
·········
·········
+1
-1
nixos/modules/services/misc/leaps.nix
+1
-1
nixos/modules/services/misc/leaps.nix
+1
-2
nixos/modules/services/misc/ssm-agent.nix
+1
-2
nixos/modules/services/misc/ssm-agent.nix
+1
-1
nixos/modules/services/monitoring/bosun.nix
+1
-1
nixos/modules/services/monitoring/bosun.nix
+1
-1
nixos/modules/services/monitoring/grafana-reporter.nix
+1
-1
nixos/modules/services/monitoring/grafana-reporter.nix
+1
-1
nixos/modules/services/monitoring/grafana.nix
+1
-1
nixos/modules/services/monitoring/grafana.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/snmp.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/snmp.nix
+1
-1
nixos/modules/services/monitoring/scollector.nix
+1
-1
nixos/modules/services/monitoring/scollector.nix
+4
-4
nixos/modules/services/networking/consul.nix
+4
-4
nixos/modules/services/networking/consul.nix
······
······
+3
-3
nixos/modules/services/networking/flannel.nix
+3
-3
nixos/modules/services/networking/flannel.nix
······-until ${pkgs.etcdctl.bin}/bin/etcdctl set /coreos.com/network/config '${builtins.toJSON networkConfig}'
······+until ${pkgs.etcdctl}/bin/etcdctl set /coreos.com/network/config '${builtins.toJSON networkConfig}'
+1
-1
nixos/modules/services/networking/skydns.nix
+1
-1
nixos/modules/services/networking/skydns.nix
+2
-2
nixos/modules/services/security/hologram-agent.nix
+2
-2
nixos/modules/services/security/hologram-agent.nix
···-ExecStart = "${pkgs.hologram.bin}/bin/hologram-agent -debug -conf ${cfgFile} -port ${cfg.httpPort}";
···+ExecStart = "${pkgs.hologram}/bin/hologram-agent -debug -conf ${cfgFile} -port ${cfg.httpPort}";
+1
-1
nixos/modules/services/security/hologram-server.nix
+1
-1
nixos/modules/services/security/hologram-server.nix
+1
-1
nixos/modules/services/security/oauth2_proxy.nix
+1
-1
nixos/modules/services/security/oauth2_proxy.nix
+1
-1
nixos/modules/services/web-apps/mattermost.nix
+1
-1
nixos/modules/services/web-apps/mattermost.nix
+1
-2
nixos/modules/virtualisation/ecs-agent.nix
+1
-2
nixos/modules/virtualisation/ecs-agent.nix
+1
-1
nixos/modules/virtualisation/lxd.nix
+1
-1
nixos/modules/virtualisation/lxd.nix
+3
-5
nixos/modules/virtualisation/podman.nix
+3
-5
nixos/modules/virtualisation/podman.nix
···
···