+1
-1
nixos/modules/services/hardware/udev.nix
+1
-1
nixos/modules/services/hardware/udev.nix
···boot.kernelParams = mkIf (!config.networking.usePredictableInterfaceNames) [ "net.ifnames=0" ];-boot.initrd.extraUdevRulesCommands = optionalString (!config.boot.initrd.systemd.enable && config.boot.initrd.services.udev.rules != "")+boot.initrd.extraUdevRulesCommands = mkIf (!config.boot.initrd.systemd.enable && config.boot.initrd.services.udev.rules != "")
+2
-1
nixos/modules/services/networking/multipath.nix
+2
-1
nixos/modules/services/networking/multipath.nix
···
+4
-4
nixos/modules/system/boot/initrd-network.nix
+4
-4
nixos/modules/system/boot/initrd-network.nix
······+boot.initrd.postMountCommands = mkIf (cfg.flushBeforeStage2 && !config.boot.initrd.systemd.enable) ''
+21
nixos/modules/system/boot/systemd/initrd.nix
+21
nixos/modules/system/boot/systemd/initrd.nix
···+${lib.concatMapStringsSep "\n" ({ file, ... }: " - ${file}") (lib.attrByPath name (throw "impossible") options.boot.initrd).definitionsWithLocations}
+4
-3
nixos/modules/tasks/encrypted-devices.nix
+4
-3
nixos/modules/tasks/encrypted-devices.nix
···"cryptsetup luksOpen --key-file ${dev.encrypted.keyFile} ${dev.encrypted.blkDev} ${dev.encrypted.label};\n"
+2
-2
nixos/modules/tasks/filesystems/bcachefs.nix
+2
-2
nixos/modules/tasks/filesystems/bcachefs.nix
···-boot.initrd.postDeviceCommands = commonFunctions + concatStrings (mapAttrsToList openCommand bootFs);+boot.initrd.postDeviceCommands = lib.mkIf (!config.boot.initrd.systemd.enable) (commonFunctions + concatStrings (mapAttrsToList openCommand bootFs));
+6
-6
nixos/modules/tasks/filesystems/zfs.nix
+6
-6
nixos/modules/tasks/filesystems/zfs.nix
······
+2
-2
nixos/modules/tasks/swraid.nix
+2
-2
nixos/modules/tasks/swraid.nix
···
+3
-3
nixos/tests/common/auto-format-root-device.nix
+3
-3
nixos/tests/common/auto-format-root-device.nix
···