+1
-1
CONTRIBUTING.md
+1
-1
CONTRIBUTING.md
···2. Check out the target _release branch_, e.g. `release-22.11`. Do not use a _channel branch_ like `nixos-22.11` or `nixpkgs-22.11-darwin`.4. When the reason to backport is not obvious from the original commit message, use `git cherry-pick -xe <original commit>` and add a reason. Otherwise use `git cherry-pick -x <original commit>`. That's fine for minor version updates that only include security and bug fixes, commits that fixes an otherwise broken package or similar. Please also ensure the commits exists on the master branch; in the case of squashed or rebased merges, the commit hash will change and the new commits can be found in the merge message at the bottom of the master pull request.-5. Push to GitHub and open a backport pull request. Make sure to select the release branch (e.g. `release-22.11`) as the target branch of the pull request, and link to the pull request in which the original change was comitted to `master`. The pull request title should be the commit title with the release version as prefix, e.g. `[22.11]`.+5. Push to GitHub and open a backport pull request. Make sure to select the release branch (e.g. `release-22.11`) as the target branch of the pull request, and link to the pull request in which the original change was committed to `master`. The pull request title should be the commit title with the release version as prefix, e.g. `[22.11]`.6. When the backport pull request is merged and you have the necessary privileges you can also replace the label `9.needs: port to stable` with `8.has: port to stable` on the original pull request. This way maintainers can keep track of missing backports easier.
+1
-1
doc/contributing/reviewing-contributions.chapter.md
+1
-1
doc/contributing/reviewing-contributions.chapter.md
···
+1
-1
doc/doc-support/lib-function-docs.nix
+1
-1
doc/doc-support/lib-function-docs.nix
+1
-1
doc/languages-frameworks/beam.section.md
+1
-1
doc/languages-frameworks/beam.section.md
···- pass `mixNixDeps = with pkgs; import ./mix_deps.nix { inherit lib beamPackages; };` as an argument to mixRelease.- You'll need to fix the version artificially in mix.exs and regenerate the mix.lock with fixed version (on upstream). This will enable you to run `mix2nix > mix_deps.nix`.
+1
-1
doc/languages-frameworks/coq.section.md
+1
-1
doc/languages-frameworks/coq.section.md
···* `customOCamlPackages` (optional, defaults to `null`, which lets Coq choose a version automatically), which can be set to any of the ocaml packages attribute of `ocaml-ng` (such as `ocaml-ng.ocamlPackages_4_10` which is the default for Coq 8.11 for example).* `coq-version` (optional, defaults to the short version e.g. "8.10"), is a version number of the form "x.y" that indicates which Coq's version build behavior to mimic when using a source which is not a release. E.g. `coq.override { version = "d370a9d1328a4e1cdb9d02ee032f605a9d94ec7a"; coq-version = "8.10"; }`.-The associated package set can be optained using `mkCoqPackages coq`, where `coq` is the derivation to use.+The associated package set can be obtained using `mkCoqPackages coq`, where `coq` is the derivation to use.
+1
-1
doc/languages-frameworks/cuda.section.md
+1
-1
doc/languages-frameworks/cuda.section.md
···
+2
-2
doc/languages-frameworks/cuelang.section.md
+2
-2
doc/languages-frameworks/cuelang.section.md
···-`document` : match your input data against this fragment of structure or definition, e.g. you may use the same schema file but differents documents based on the data you are validating.+`document` : match your input data against this fragment of structure or definition, e.g. you may use the same schema file but different documents based on the data you are validating.
+2
-2
doc/languages-frameworks/hy.section.md
+2
-2
doc/languages-frameworks/hy.section.md
···-You can install `hy` via nix-env or by adding it to `configuration.nix` by reffering to it as a `hy` attribute. This kind of installation adds `hy` to your environment and it succesfully works with `python3`.+You can install `hy` via nix-env or by adding it to `configuration.nix` by referring to it as a `hy` attribute. This kind of installation adds `hy` to your environment and it successfully works with `python3`.
+1
-1
doc/languages-frameworks/index.xml
+1
-1
doc/languages-frameworks/index.xml
···-The <link linkend="chap-stdenv">standard build environment</link> makes it easy to build typical Autotools-based packages with very little code. Any other kind of package can be accomodated by overriding the appropriate phases of <literal>stdenv</literal>. However, there are specialised functions in Nixpkgs to easily build packages for other programming languages, such as Perl or Haskell. These are described in this chapter.+The <link linkend="chap-stdenv">standard build environment</link> makes it easy to build typical Autotools-based packages with very little code. Any other kind of package can be accommodated by overriding the appropriate phases of <literal>stdenv</literal>. However, there are specialised functions in Nixpkgs to easily build packages for other programming languages, such as Perl or Haskell. These are described in this chapter.
+2
-2
doc/languages-frameworks/python.section.md
+2
-2
doc/languages-frameworks/python.section.md
······
+1
-1
doc/languages-frameworks/rust.section.md
+1
-1
doc/languages-frameworks/rust.section.md
···
+1
-1
doc/old/cross.txt
+1
-1
doc/old/cross.txt
···
+1
-1
doc/stdenv/multiple-output.chapter.md
+1
-1
doc/stdenv/multiple-output.chapter.md
···`nix-env` lacks an easy way to select the outputs to install. When installing a package, `nix-env` always installs the outputs listed in `meta.outputsToInstall`, even when the user explicitly selects an output.-`nix-env` silenty disregards the outputs selected by the user, and instead installs the outputs from `meta.outputsToInstall`. For example,+`nix-env` silently disregards the outputs selected by the user, and instead installs the outputs from `meta.outputsToInstall`. For example,
+2
-2
doc/stdenv/stdenv.chapter.md
+2
-2
doc/stdenv/stdenv.chapter.md
···-Like `dontStrip`, but only affects the `strip` command targetting the package’s host platform. Useful when supporting cross compilation, but otherwise feel free to ignore.+Like `dontStrip`, but only affects the `strip` command targeting the package’s host platform. Useful when supporting cross compilation, but otherwise feel free to ignore.-Like `dontStrip`, but only affects the `strip` command targetting the packages’ target platform. Useful when supporting cross compilation, but otherwise feel free to ignore.+Like `dontStrip`, but only affects the `strip` command targeting the packages’ target platform. Useful when supporting cross compilation, but otherwise feel free to ignore.
+1
-1
lib/attrsets.nix
+1
-1
lib/attrsets.nix
+1
-1
lib/derivations.nix
+1
-1
lib/derivations.nix
+1
-1
lib/modules.nix
+1
-1
lib/modules.nix
···
+2
-2
lib/strings.nix
+2
-2
lib/strings.nix
······
+1
-1
lib/systems/architectures.nix
+1
-1
lib/systems/architectures.nix
···
+2
-2
lib/systems/default.nix
+2
-2
lib/systems/default.nix
······
+1
-1
lib/systems/flake-systems.nix
+1
-1
lib/systems/flake-systems.nix
···
+1
-1
lib/tests/modules.sh
+1
-1
lib/tests/modules.sh
···
+1
-1
nixos/doc/manual/configuration/profiles/hardened.section.md
+1
-1
nixos/doc/manual/configuration/profiles/hardened.section.md
···[profile source](https://github.com/nixos/nixpkgs/tree/master/nixos/modules/profiles/hardened.nix)
+2
-2
nixos/doc/manual/development/activation-script.section.md
+2
-2
nixos/doc/manual/development/activation-script.section.md
······
+1
-1
nixos/doc/manual/development/option-types.section.md
+1
-1
nixos/doc/manual/development/option-types.section.md
···
+2
-2
nixos/doc/manual/development/writing-nixos-tests.section.md
+2
-2
nixos/doc/manual/development/writing-nixos-tests.section.md
······
+1
-1
nixos/doc/manual/from_md/configuration/profiles/hardened.section.xml
+1
-1
nixos/doc/manual/from_md/configuration/profiles/hardened.section.xml
···<link xlink:href="https://github.com/nixos/nixpkgs/tree/master/nixos/modules/profiles/hardened.nix">profile
+2
-2
nixos/doc/manual/from_md/development/activation-script.section.xml
+2
-2
nixos/doc/manual/from_md/development/activation-script.section.xml
······
+1
-1
nixos/doc/manual/from_md/development/option-types.section.xml
+1
-1
nixos/doc/manual/from_md/development/option-types.section.xml
···
+2
-2
nixos/doc/manual/from_md/development/writing-nixos-tests.section.xml
+2
-2
nixos/doc/manual/from_md/development/writing-nixos-tests.section.xml
······
+2
-2
nixos/doc/manual/from_md/installation/building-nixos.chapter.xml
+2
-2
nixos/doc/manual/from_md/installation/building-nixos.chapter.xml
······
+1
-1
nixos/doc/manual/from_md/installation/installing-from-other-distro.section.xml
+1
-1
nixos/doc/manual/from_md/installation/installing-from-other-distro.section.xml
···
+1
-1
nixos/doc/manual/from_md/installation/installing-virtualbox-guest.section.xml
+1
-1
nixos/doc/manual/from_md/installation/installing-virtualbox-guest.section.xml
···-<section xmlns="http://docbook.org/ns/docbook" xmlns:xlink="http://www.w3.org/1999/xlink" xml:id="sec-instaling-virtualbox-guest">+<section xmlns="http://docbook.org/ns/docbook" xmlns:xlink="http://www.w3.org/1999/xlink" xml:id="sec-installing-virtualbox-guest">
+1
-1
nixos/doc/manual/from_md/installation/installing.chapter.xml
+1
-1
nixos/doc/manual/from_md/installation/installing.chapter.xml
···
+1
-1
nixos/doc/manual/from_md/release-notes/rl-1603.section.xml
+1
-1
nixos/doc/manual/from_md/release-notes/rl-1603.section.xml
···
+1
-1
nixos/doc/manual/from_md/release-notes/rl-1709.section.xml
+1
-1
nixos/doc/manual/from_md/release-notes/rl-1709.section.xml
···
+1
-1
nixos/doc/manual/from_md/release-notes/rl-1903.section.xml
+1
-1
nixos/doc/manual/from_md/release-notes/rl-1903.section.xml
···
+2
-2
nixos/doc/manual/from_md/release-notes/rl-1909.section.xml
+2
-2
nixos/doc/manual/from_md/release-notes/rl-1909.section.xml
······
+1
-1
nixos/doc/manual/from_md/release-notes/rl-2105.section.xml
+1
-1
nixos/doc/manual/from_md/release-notes/rl-2105.section.xml
···
+2
-2
nixos/doc/manual/from_md/release-notes/rl-2205.section.xml
+2
-2
nixos/doc/manual/from_md/release-notes/rl-2205.section.xml
······
+3
-3
nixos/doc/manual/from_md/release-notes/rl-2211.section.xml
+3
-3
nixos/doc/manual/from_md/release-notes/rl-2211.section.xml
···
+14
-6
nixos/doc/manual/from_md/release-notes/rl-2305.section.xml
+14
-6
nixos/doc/manual/from_md/release-notes/rl-2305.section.xml
···<link linkend="opt-services.snapserver.openFirewall">services.snapserver.openFirewall</link>···<link linkend="opt-services.tmate-ssh-server.openFirewall">services.tmate-ssh-server.openFirewall</link>···<link linkend="opt-services.unifi-video.openFirewall">services.unifi-video.openFirewall</link>···
+2
-2
nixos/doc/manual/installation/building-nixos.chapter.md
+2
-2
nixos/doc/manual/installation/building-nixos.chapter.md
······
+1
-1
nixos/doc/manual/installation/installing-from-other-distro.section.md
+1
-1
nixos/doc/manual/installation/installing-from-other-distro.section.md
···
+1
-1
nixos/doc/manual/installation/installing-virtualbox-guest.section.md
+1
-1
nixos/doc/manual/installation/installing-virtualbox-guest.section.md
···
+1
-1
nixos/doc/manual/installation/installing.chapter.md
+1
-1
nixos/doc/manual/installation/installing.chapter.md
···
+1
-1
nixos/doc/manual/release-notes/rl-1603.section.md
+1
-1
nixos/doc/manual/release-notes/rl-1603.section.md
···-- `services.udev.extraRules` option now writes rules to `99-local.rules` instead of `10-local.rules`. This makes all the user rules apply after others, so their results wouldn\'t be overriden by anything else.+- `services.udev.extraRules` option now writes rules to `99-local.rules` instead of `10-local.rules`. This makes all the user rules apply after others, so their results wouldn\'t be overridden by anything else.- Large parts of the `services.gitlab` module has been been rewritten. There are new configuration options available. The `stateDir` option was renamned to `statePath` and the `satellitesDir` option was removed. Please review the currently available options.
+1
-1
nixos/doc/manual/release-notes/rl-1709.section.md
+1
-1
nixos/doc/manual/release-notes/rl-1709.section.md
···- `cc-wrapper`\'s setup-hook now exports a number of environment variables corresponding to binutils binaries, (e.g. `LD`, `STRIP`, `RANLIB`, etc). This is done to prevent packages\' build systems guessing, which is harder to predict, especially when cross-compiling. However, some packages have broken due to this---their build systems either not supporting, or claiming to support without adequate testing, taking such environment variables as parameters.-- `services.firefox.syncserver` now runs by default as a non-root user. To accomodate this change, the default sqlite database location has also been changed. Migration should work automatically. Refer to the description of the options for more details.+- `services.firefox.syncserver` now runs by default as a non-root user. To accommodate this change, the default sqlite database location has also been changed. Migration should work automatically. Refer to the description of the options for more details.- The `compiz` window manager and package was removed. The system support had been broken for several years.
+1
-1
nixos/doc/manual/release-notes/rl-1903.section.md
+1
-1
nixos/doc/manual/release-notes/rl-1903.section.md
···- OpenSMTPD has been upgraded to version 6.4.0p1. This release makes backwards-incompatible changes to the configuration file format. See `man smtpd.conf` for more information on the new file format.-- The versioned `postgresql` have been renamed to use underscore number seperators. For example, `postgresql96` has been renamed to `postgresql_9_6`.+- The versioned `postgresql` have been renamed to use underscore number separators. For example, `postgresql96` has been renamed to `postgresql_9_6`.- Package `consul-ui` and passthrough `consul.ui` have been removed. The package `consul` now uses upstream releases that vendor the UI into the binary. See [\#48714](https://github.com/NixOS/nixpkgs/pull/48714#issuecomment-433454834) for details.
+2
-2
nixos/doc/manual/release-notes/rl-1909.section.md
+2
-2
nixos/doc/manual/release-notes/rl-1909.section.md
···- The setopt declarations will be evaluated at the end of `/etc/zshrc`, so any code in [programs.zsh.interactiveShellInit](options.html#opt-programs.zsh.interactiveShellInit), [programs.zsh.loginShellInit](options.html#opt-programs.zsh.loginShellInit) and [programs.zsh.promptInit](options.html#opt-programs.zsh.promptInit) may break if it relies on those options being set.-- The `prometheus-nginx-exporter` package now uses the offical exporter provided by NGINX Inc. Its metrics are differently structured and are incompatible to the old ones. For information about the metrics, have a look at the [official repo](https://github.com/nginxinc/nginx-prometheus-exporter).+- The `prometheus-nginx-exporter` package now uses the official exporter provided by NGINX Inc. Its metrics are differently structured and are incompatible to the old ones. For information about the metrics, have a look at the [official repo](https://github.com/nginxinc/nginx-prometheus-exporter).- The `shibboleth-sp` package has been updated to version 3. It is largely backward compatible, for further information refer to the [release notes](https://wiki.shibboleth.net/confluence/display/SP3/ReleaseNotes) and [upgrade guide](https://wiki.shibboleth.net/confluence/display/SP3/UpgradingFromV2).-- By default, prometheus exporters are now run with `DynamicUser` enabled. Exporters that need a real user, now run under a seperate user and group which follow the pattern `<exporter-name>-exporter`, instead of the previous default `nobody` and `nogroup`. Only some exporters are affected by the latter, namely the exporters `dovecot`, `node`, `postfix` and `varnish`.+- By default, prometheus exporters are now run with `DynamicUser` enabled. Exporters that need a real user, now run under a separate user and group which follow the pattern `<exporter-name>-exporter`, instead of the previous default `nobody` and `nogroup`. Only some exporters are affected by the latter, namely the exporters `dovecot`, `node`, `postfix` and `varnish`.- The `ibus-qt` package is not installed by default anymore when [i18n.inputMethod.enabled](options.html#opt-i18n.inputMethod.enabled) is set to `ibus`. If IBus support in Qt 4.x applications is required, add the `ibus-qt` package to your [environment.systemPackages](options.html#opt-environment.systemPackages) manually.
+1
-1
nixos/doc/manual/release-notes/rl-2105.section.md
+1
-1
nixos/doc/manual/release-notes/rl-2105.section.md
···- The zookeeper package does not provide `zooInspector.sh` anymore, as that \"contrib\" has been dropped from upstream releases.-- In the ACME module, the data used to build the hash for the account directory has changed to accomodate new features to reduce account rate limit issues. This will trigger new account creation on the first rebuild following this update. No issues are expected to arise from this, thanks to the new account creation handling.+- In the ACME module, the data used to build the hash for the account directory has changed to accommodate new features to reduce account rate limit issues. This will trigger new account creation on the first rebuild following this update. No issues are expected to arise from this, thanks to the new account creation handling.- [users.users._name_.createHome](options.html#opt-users.users._name_.createHome) now always ensures home directory permissions to be `0700`. Permissions had previously been ignored for already existing home directories, possibly leaving them readable by others. The option\'s description was incorrect regarding ownership management and has been simplified greatly.
+2
-2
nixos/doc/manual/release-notes/rl-2205.section.md
+2
-2
nixos/doc/manual/release-notes/rl-2205.section.md
···- [kanidm](https://kanidm.github.io/kanidm/stable/), an identity management server written in Rust. Available as [services.kanidm](#opt-services.kanidm.enableServer)-- [Maddy](https://maddy.email/), a free an open source mail server. Availabe as [services.maddy](#opt-services.maddy.enable).+- [Maddy](https://maddy.email/), a free an open source mail server. Available as [services.maddy](#opt-services.maddy.enable).- [matrix-conduit](https://conduit.rs/), a simple, fast and reliable chat server powered by matrix. Available as [services.matrix-conduit](option.html#opt-services.matrix-conduit.enable).···- `pkgs._7zz` is now correctly licensed as LGPL3+ and BSD3 with optional unfree unRAR licensed code- The `vim.customize` function produced by `vimUtils.makeCustomizable` now has a slightly different interface:-* The wrapper now includes everything in the given Vim derivation if `name` is `"vim"` (the default). This makes the `wrapManual` argument obsolete, but this behavior can be overriden by setting the `standalone` argument.+* The wrapper now includes everything in the given Vim derivation if `name` is `"vim"` (the default). This makes the `wrapManual` argument obsolete, but this behavior can be overridden by setting the `standalone` argument.* All the executables present in the given derivation (or, in `standalone` mode, only the `*vim` ones) are wrapped. This makes the `wrapGui` argument obsolete.* The `vimExecutableName` and `gvimExecutableName` arguments were replaced by a single `executableName` argument in which the shell variable `$exe` can be used to refer to the wrapped executable's name.
+1
-1
nixos/doc/manual/release-notes/rl-2211.section.md
+1
-1
nixos/doc/manual/release-notes/rl-2211.section.md
···- memtest86+ was updated from 5.00-coreboot-002 to 6.00-beta2. It is now the upstream version from https://www.memtest.org/, as coreboot's fork is no longer available.-- Option descriptions, examples, and defaults writting in DocBook are now deprecated. Using CommonMark is preferred and will become the default in a future release.+- Option descriptions, examples, and defaults writing in DocBook are now deprecated. Using CommonMark is preferred and will become the default in a future release.- The `documentation.nixos.options.allowDocBook` option was added to ease the transition to CommonMark option documentation. Setting this option to `false` causes an error for every option included in the manual that uses DocBook documentation; it defaults to `true` to preserve the previous behavior and will be removed once the transition to CommonMark is complete.
+5
-3
nixos/doc/manual/release-notes/rl-2305.section.md
+5
-3
nixos/doc/manual/release-notes/rl-2305.section.md
···- `services.sourcehut.dispatch` and the corresponding package (`sourcehut.dispatchsrht`) have been removed due to [upstream deprecation](https://sourcehut.org/blog/2022-08-01-dispatch-deprecation-plans/).-- The [services.snapserver.openFirewall](#opt-services.snapserver.openFirewall) module option default value has been changed from `true` to `false`. You will need to explicitely set this option to `true`, or configure your firewall.+- The [services.snapserver.openFirewall](#opt-services.snapserver.openFirewall) module option default value has been changed from `true` to `false`. You will need to explicitly set this option to `true`, or configure your firewall.-- The [services.tmate-ssh-server.openFirewall](#opt-services.tmate-ssh-server.openFirewall) module option default value has been changed from `true` to `false`. You will need to explicitely set this option to `true`, or configure your firewall.+- The [services.tmate-ssh-server.openFirewall](#opt-services.tmate-ssh-server.openFirewall) module option default value has been changed from `true` to `false`. You will need to explicitly set this option to `true`, or configure your firewall.-- The [services.unifi-video.openFirewall](#opt-services.unifi-video.openFirewall) module option default value has been changed from `true` to `false`. You will need to explicitely set this option to `true`, or configure your firewall.+- The [services.unifi-video.openFirewall](#opt-services.unifi-video.openFirewall) module option default value has been changed from `true` to `false`. You will need to explicitly set this option to `true`, or configure your firewall.- The EC2 image module previously detected and automatically mounted ext3-formatted instance store devices and partitions in stage-1 (initramfs), storing `/tmp` on the first discovered device. This behaviour, which only catered to very specific use cases and could not be disabled, has been removed. Users relying on this should provide their own implementation, and probably use ext4 and perform the mount in stage-2.···- A new `virtualisation.rosetta` module was added to allow running `x86_64` binaries through [Rosetta](https://developer.apple.com/documentation/apple-silicon/about-the-rosetta-translation-environment) inside virtualised NixOS guests on Apple silicon. This feature works by default with the [UTM](https://docs.getutm.app/) virtualisation [package](https://search.nixos.org/packages?channel=unstable&show=utm&from=0&size=1&sort=relevance&type=packages&query=utm).- The new option `users.motdFile` allows configuring a Message Of The Day that can be updated dynamically.+- Enabling global redirect in `services.nginx.virtualHosts` now allows one to add exceptions with the `locations` option.- Resilio sync secret keys can now be provided using a secrets file at runtime, preventing these secrets from ending up in the Nix store.
+1
-1
nixos/lib/make-options-doc/default.nix
+1
-1
nixos/lib/make-options-doc/default.nix
···
+1
-1
nixos/modules/hardware/gpgsmartcards.nix
+1
-1
nixos/modules/hardware/gpgsmartcards.nix
···
+1
-1
nixos/modules/hardware/openrazer.nix
+1
-1
nixos/modules/hardware/openrazer.nix
···
+1
-1
nixos/modules/hardware/printers.nix
+1
-1
nixos/modules/hardware/printers.nix
···
+1
-1
nixos/modules/installer/cd-dvd/iso-image.nix
+1
-1
nixos/modules/installer/cd-dvd/iso-image.nix
···
+1
-1
nixos/modules/misc/label.nix
+1
-1
nixos/modules/misc/label.nix
···
+2
-2
nixos/modules/security/acme/default.nix
+2
-2
nixos/modules/security/acme/default.nix
······-(mkRemovedOptionModule [ "security" "acme" "directory" ] "ACME Directory is now hardcoded to /var/lib/acme and its permisisons are managed by systemd. See https://github.com/NixOS/nixpkgs/issues/53852 for more info.")+(mkRemovedOptionModule [ "security" "acme" "directory" ] "ACME Directory is now hardcoded to /var/lib/acme and its permissions are managed by systemd. See https://github.com/NixOS/nixpkgs/issues/53852 for more info.")(mkRemovedOptionModule [ "security" "acme" "preDelay" ] "This option has been removed. If you want to make sure that something executes before certificates are provisioned, add a RequiredBy=acme-\${cert}.service to the service you want to execute before the cert renewal")(mkRemovedOptionModule [ "security" "acme" "activationDelay" ] "This option has been removed. If you want to make sure that something executes before certificates are provisioned, add a RequiredBy=acme-\${cert}.service to the service you want to execute before the cert renewal")
+1
-1
nixos/modules/security/apparmor.nix
+1
-1
nixos/modules/security/apparmor.nix
···
+2
-2
nixos/modules/security/pam.nix
+2
-2
nixos/modules/security/pam.nix
······
+1
-1
nixos/modules/security/pam_mount.nix
+1
-1
nixos/modules/security/pam_mount.nix
+1
-1
nixos/modules/security/wrappers/default.nix
+1
-1
nixos/modules/security/wrappers/default.nix
+1
-1
nixos/modules/services/audio/icecast.nix
+1
-1
nixos/modules/services/audio/icecast.nix
···-description = lib.mdDoc "DNS name or IP address that will be used for the stream directory lookups or possibily the playlist generation if a Host header is not provided.";+description = lib.mdDoc "DNS name or IP address that will be used for the stream directory lookups or possibly the playlist generation if a Host header is not provided.";
+2
-2
nixos/modules/services/backup/zfs-replication.nix
+2
-2
nixos/modules/services/backup/zfs-replication.nix
······-description = lib.mdDoc "Local ZFS fileystem from which snapshots should be sent. Defaults to the attribute name.";+description = lib.mdDoc "Local ZFS filesystem from which snapshots should be sent. Defaults to the attribute name.";
+3
-3
nixos/modules/services/backup/znapzend.nix
+3
-3
nixos/modules/services/backup/znapzend.nix
······-# mbuffer is not referenced by its full path to accomodate non-NixOS systems or differing mbuffer versions between source and target+# mbuffer is not referenced by its full path to accommodate non-NixOS systems or differing mbuffer versions between source and target···
+1
-1
nixos/modules/services/blockchain/ethereum/lighthouse.nix
+1
-1
nixos/modules/services/blockchain/ethereum/lighthouse.nix
···
+1
-1
nixos/modules/services/cluster/kubernetes/addon-manager.nix
+1
-1
nixos/modules/services/cluster/kubernetes/addon-manager.nix
···
+1
-1
nixos/modules/services/cluster/kubernetes/pki.nix
+1
-1
nixos/modules/services/cluster/kubernetes/pki.nix
+1
-1
nixos/modules/services/continuous-integration/buildbot/master.nix
+1
-1
nixos/modules/services/continuous-integration/buildbot/master.nix
+1
-1
nixos/modules/services/continuous-integration/github-runner/options.nix
+1
-1
nixos/modules/services/continuous-integration/github-runner/options.nix
···
+1
-1
nixos/modules/services/continuous-integration/gitlab-runner.nix
+1
-1
nixos/modules/services/continuous-integration/gitlab-runner.nix
···
+2
-2
nixos/modules/services/continuous-integration/hail.nix
+2
-2
nixos/modules/services/continuous-integration/hail.nix
···
+1
-1
nixos/modules/services/databases/firebird.nix
+1
-1
nixos/modules/services/databases/firebird.nix
···
+1
-1
nixos/modules/services/display-managers/greetd.nix
+1
-1
nixos/modules/services/display-managers/greetd.nix
···This is usually desirable so a user can always log in, but should be disabled when using 'settings.initial_session' (autologin),
+3
-3
nixos/modules/services/games/asf.nix
+3
-3
nixos/modules/services/games/asf.nix
···For configuring the SteamGuard token you will need to use the web-ui, which is enabled by default over on 127.0.0.1:1242.-You cannot configure ASF in any way outside of nix, since all the config files get wiped on restart and replaced with the programatically set ones by nix.+You cannot configure ASF in any way outside of nix, since all the config files get wiped on restart and replaced with the programnatically set ones by nix.···-description = lib.mdDoc "Path to a file containig the password. The file must be readable by the `asf` user/group.";+description = lib.mdDoc "Path to a file containing the password. The file must be readable by the `asf` user/group.";···-description = lib.mdDoc "Path to a file containig the password. The file must be readable by the `asf` user/group.";+description = lib.mdDoc "Path to a file containing the password. The file must be readable by the `asf` user/group.";
+1
-1
nixos/modules/services/games/minetest-server.nix
+1
-1
nixos/modules/services/games/minetest-server.nix
+1
-1
nixos/modules/services/hardware/lirc.nix
+1
-1
nixos/modules/services/hardware/lirc.nix
···-description = lib.mdDoc "LIRC default options descriped in man:lircd(8) ({file}`lirc_options.conf`)";+description = lib.mdDoc "LIRC default options described in man:lircd(8) ({file}`lirc_options.conf`)";
+1
-1
nixos/modules/services/hardware/sane.nix
+1
-1
nixos/modules/services/hardware/sane.nix
···
+1
-1
nixos/modules/services/logging/logrotate.nix
+1
-1
nixos/modules/services/logging/logrotate.nix
+1
-1
nixos/modules/services/mail/mailman.nix
+1
-1
nixos/modules/services/mail/mailman.nix
···
+3
-3
nixos/modules/services/mail/postfix.nix
+3
-3
nixos/modules/services/mail/postfix.nix
···headerChecks = concatStringsSep "\n" (map (x: "${x.pattern} ${x.action}") cfg.headerChecks) + cfg.extraHeaderChecks;
+2
-2
nixos/modules/services/mail/roundcube.nix
+2
-2
nixos/modules/services/mail/roundcube.nix
······
+2
-2
nixos/modules/services/matrix/mautrix-telegram.nix
+2
-2
nixos/modules/services/matrix/mautrix-telegram.nix
······
+1
-1
nixos/modules/services/matrix/synapse.nix
+1
-1
nixos/modules/services/matrix/synapse.nix
···(mkRemovedOptionModule [ "services" "matrix-synapse" "user_creation_max_duration" ] "It is no longer supported by synapse." )(mkRemovedOptionModule [ "services" "matrix-synapse" "verbose" ] "Use a log config instead." )(mkRemovedOptionModule [ "services" "matrix-synapse" "app_service_config_files" ] "Use settings.app_service_config_files instead" )(mkRemovedOptionModule [ "services" "matrix-synapse" "database_args" ] "Use settings.database.args instead" )
+1
-1
nixos/modules/services/misc/dysnomia.nix
+1
-1
nixos/modules/services/misc/dysnomia.nix
···-description = lib.mdDoc "An atttribute set in which each key represents a container and each value an attribute set in which each key represents a component and each value a derivation constructing its initial state";+description = lib.mdDoc "An attribute set in which each key represents a container and each value an attribute set in which each key represents a component and each value a derivation constructing its initial state";
+1
-1
nixos/modules/services/misc/gammu-smsd.nix
+1
-1
nixos/modules/services/misc/gammu-smsd.nix
+2
-2
nixos/modules/services/misc/gitea.nix
+2
-2
nixos/modules/services/misc/gitea.nix
···-description = lib.mdDoc "Filename to be used for the dump. If `null` a default name is choosen by gitea.";+description = lib.mdDoc "Filename to be used for the dump. If `null` a default name is chosen by gitea.";···
+1
-1
nixos/modules/services/misc/gitlab.xml
+1
-1
nixos/modules/services/misc/gitlab.xml
+1
-1
nixos/modules/services/misc/jellyfin.nix
+1
-1
nixos/modules/services/misc/jellyfin.nix
+2
-2
nixos/modules/services/misc/nix-daemon.nix
+2
-2
nixos/modules/services/misc/nix-daemon.nix
······
+1
-1
nixos/modules/services/misc/podgrab.nix
+1
-1
nixos/modules/services/misc/podgrab.nix
+1
-1
nixos/modules/services/misc/portunus.nix
+1
-1
nixos/modules/services/misc/portunus.nix
···This also adds two entries to the `/etc/hosts` file to point [](#opt-services.portunus.domain) to localhost,so that CLIs and programs can use ldaps protocol and verify the certificate without opening the firewall port for the protocol.
+1
-1
nixos/modules/services/misc/serviio.nix
+1
-1
nixos/modules/services/misc/serviio.nix
+1
-1
nixos/modules/services/misc/sourcehut/service.nix
+1
-1
nixos/modules/services/misc/sourcehut/service.nix
···gawk '{ if (match($0,/^([^=]+=)<(.+)/,m)) { getline f < m[2]; print m[1] f } else print $0 }' ${configIni} |
+2
-2
nixos/modules/services/misc/taskserver/default.nix
+2
-2
nixos/modules/services/misc/taskserver/default.nix
······
+2
-2
nixos/modules/services/monitoring/graphite.nix
+2
-2
nixos/modules/services/monitoring/graphite.nix
···-description = lib.mdDoc "Any metrics received which match one of the experssions will be dropped.";+description = lib.mdDoc "Any metrics received which match one of the expressions will be dropped.";-description = lib.mdDoc "Only metrics received which match one of the experssions will be persisted.";+description = lib.mdDoc "Only metrics received which match one of the expressions will be persisted.";
+2
-2
nixos/modules/services/monitoring/prometheus/exporters.xml
+2
-2
nixos/modules/services/monitoring/prometheus/exporters.xml
······
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/nginxlog.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/nginxlog.nix
···settings that can all be used here: https://github.com/martin-helmich/prometheus-nginxlog-exporter
+1
-1
nixos/modules/services/monitoring/thanos.nix
+1
-1
nixos/modules/services/monitoring/thanos.nix
···
+2
-2
nixos/modules/services/monitoring/ups.nix
+2
-2
nixos/modules/services/monitoring/ups.nix
······
+1
-1
nixos/modules/services/network-filesystems/kubo.nix
+1
-1
nixos/modules/services/network-filesystems/kubo.nix
···-enable = mkEnableOption (lib.mdDoc "Interplanetary File System (WARNING: may cause severe network degredation)");+enable = mkEnableOption (lib.mdDoc "Interplanetary File System (WARNING: may cause severe network degradation)");
+2
-2
nixos/modules/services/network-filesystems/moosefs.nix
+2
-2
nixos/modules/services/network-filesystems/moosefs.nix
······
+1
-1
nixos/modules/services/network-filesystems/orangefs/client.nix
+1
-1
nixos/modules/services/network-filesystems/orangefs/client.nix
···
+1
-1
nixos/modules/services/network-filesystems/orangefs/server.nix
+1
-1
nixos/modules/services/network-filesystems/orangefs/server.nix
+1
-1
nixos/modules/services/networking/3proxy.nix
+1
-1
nixos/modules/services/networking/3proxy.nix
···-It's possible to use wildmask in the begginning and in the the end of hostname, e.g. `*badsite.com` or `*badcontent*`.+It's possible to use wildmask in the beginning and in the the end of hostname, e.g. `*badsite.com` or `*badcontent*`.
+2
-2
nixos/modules/services/networking/biboumi.nix
+2
-2
nixos/modules/services/networking/biboumi.nix
······
+1
-1
nixos/modules/services/networking/bitcoind.nix
+1
-1
nixos/modules/services/networking/bitcoind.nix
+1
-1
nixos/modules/services/networking/bitlbee.nix
+1
-1
nixos/modules/services/networking/bitlbee.nix
···
+1
-1
nixos/modules/services/networking/consul.nix
+1
-1
nixos/modules/services/networking/consul.nix
+1
-1
nixos/modules/services/networking/epmd.nix
+1
-1
nixos/modules/services/networking/epmd.nix
···-see https://www.freedesktop.org/software/systemd/man/systemd.socket.html#ListenStream= for more informations.+see https://www.freedesktop.org/software/systemd/man/systemd.socket.html#ListenStream= for more information.
+2
-2
nixos/modules/services/networking/hans.nix
+2
-2
nixos/modules/services/networking/hans.nix
······
+2
-2
nixos/modules/services/networking/headscale.nix
+2
-2
nixos/modules/services/networking/headscale.nix
······
+1
-1
nixos/modules/services/networking/hylafax/systemd.nix
+1
-1
nixos/modules/services/networking/hylafax/systemd.nix
···
+1
-1
nixos/modules/services/networking/i2pd.nix
+1
-1
nixos/modules/services/networking/i2pd.nix
+1
-1
nixos/modules/services/networking/iperf3.nix
+1
-1
nixos/modules/services/networking/iperf3.nix
···
+4
-4
nixos/modules/services/networking/kea.nix
+4
-4
nixos/modules/services/networking/kea.nix
············
+1
-1
nixos/modules/services/networking/knot.nix
+1
-1
nixos/modules/services/networking/knot.nix
+1
-1
nixos/modules/services/networking/libreswan.nix
+1
-1
nixos/modules/services/networking/libreswan.nix
···FAQ](https://libreswan.org/wiki/FAQ#Why_is_it_recommended_to_disable_send_redirects_in_.2Fproc.2Fsys.2Fnet_.3F) page for why this is recommended.
+1
-1
nixos/modules/services/networking/lxd-image-server.nix
+1
-1
nixos/modules/services/networking/lxd-image-server.nix
···# https://github.com/Avature/lxd-image-server/blob/master/resources/nginx/includes/lxd-image-server.pkg.conf
+1
-1
nixos/modules/services/networking/mosquitto.nix
+1
-1
nixos/modules/services/networking/mosquitto.nix
···
+1
-1
nixos/modules/services/networking/ncdns.nix
+1
-1
nixos/modules/services/networking/ncdns.nix
···
+2
-2
nixos/modules/services/networking/ndppd.nix
+2
-2
nixos/modules/services/networking/ndppd.nix
······
+1
-1
nixos/modules/services/networking/nftables.nix
+1
-1
nixos/modules/services/networking/nftables.nix
···
+1
-1
nixos/modules/services/networking/nsd.nix
+1
-1
nixos/modules/services/networking/nsd.nix
···
+1
-1
nixos/modules/services/networking/ostinato.nix
+1
-1
nixos/modules/services/networking/ostinato.nix
···
+1
-1
nixos/modules/services/networking/pleroma.nix
+1
-1
nixos/modules/services/networking/pleroma.nix
+4
-4
nixos/modules/services/networking/prosody.nix
+4
-4
nixos/modules/services/networking/prosody.nix
············
+1
-1
nixos/modules/services/networking/radicale.nix
+1
-1
nixos/modules/services/networking/radicale.nix
···
+2
-2
nixos/modules/services/networking/searx.nix
+2
-2
nixos/modules/services/networking/searx.nix
······
+1
-1
nixos/modules/services/networking/stunnel.nix
+1
-1
nixos/modules/services/networking/stunnel.nix
+1
-1
nixos/modules/services/networking/unbound.nix
+1
-1
nixos/modules/services/networking/unbound.nix
···
+1
-1
nixos/modules/services/networking/unifi.nix
+1
-1
nixos/modules/services/networking/unifi.nix
···
+1
-1
nixos/modules/services/networking/vsftpd.nix
+1
-1
nixos/modules/services/networking/vsftpd.nix
···
+1
-1
nixos/modules/services/networking/wireguard.nix
+1
-1
nixos/modules/services/networking/wireguard.nix
···
+2
-2
nixos/modules/services/networking/yggdrasil.xml
+2
-2
nixos/modules/services/networking/yggdrasil.xml
······
+1
-1
nixos/modules/services/printing/ipp-usb.nix
+1
-1
nixos/modules/services/printing/ipp-usb.nix
···
+2
-2
nixos/modules/services/security/fail2ban.nix
+2
-2
nixos/modules/services/security/fail2ban.nix
···-"bantime-increment.multipliers" used to calculate next value of ban time instead of formula, coresponding+"bantime-increment.multipliers" used to calculate next value of ban time instead of formula, correspondingfollowing example grows ban time by 1, 2, 4, 8, 16 ... and if last ban count greater as multipliers count,always used last multiplier (64 in example), for factor '1' and original ban time 600 - 10.6 hours···"bantime-increment.overalljails" (if true) specifies the search of IP in the database will be executed
+2
-2
nixos/modules/services/security/shibboleth-sp.nix
+2
-2
nixos/modules/services/security/shibboleth-sp.nix
···
+10
-10
nixos/modules/services/security/tor.nix
+10
-10
nixos/modules/services/security/tor.nix
······(mkRemovedOptionModule [ "services" "tor" "client" "transparentProxy" "isolationOptions" ] "Use services.tor.settings.TransPort instead.")(mkRemovedOptionModule [ "services" "tor" "client" "transparentProxy" "listenAddress" ] "Use services.tor.settings.TransPort instead.")(mkRenamedOptionModule [ "services" "tor" "controlPort" ] [ "services" "tor" "settings" "ControlPort" ])-(mkRemovedOptionModule [ "services" "tor" "extraConfig" ] "Plese use services.tor.settings instead.")+(mkRemovedOptionModule [ "services" "tor" "extraConfig" ] "Please use services.tor.settings instead.")(mkRenamedOptionModule [ "services" "tor" "hiddenServices" ] [ "services" "tor" "relay" "onionServices" ])(mkRenamedOptionModule [ "services" "tor" "relay" "accountingMax" ] [ "services" "tor" "settings" "AccountingMax" ])(mkRenamedOptionModule [ "services" "tor" "relay" "accountingStart" ] [ "services" "tor" "settings" "AccountingStart" ])···············options.RefuseUnknownExits = optionBool "RefuseUnknownExits"; # default is null and like "auto"
+2
-2
nixos/modules/services/security/usbguard.nix
+2
-2
nixos/modules/services/security/usbguard.nix
···
+1
-1
nixos/modules/services/system/cloud-init.nix
+1
-1
nixos/modules/services/system/cloud-init.nix
···
+1
-1
nixos/modules/services/system/kerberos/default.nix
+1
-1
nixos/modules/services/system/kerberos/default.nix
···
+2
-2
nixos/modules/services/torrent/deluge.nix
+2
-2
nixos/modules/services/torrent/deluge.nix
······
+1
-1
nixos/modules/services/torrent/magnetico.nix
+1
-1
nixos/modules/services/torrent/magnetico.nix
···
+1
-1
nixos/modules/services/torrent/rtorrent.nix
+1
-1
nixos/modules/services/torrent/rtorrent.nix
···-The content of {file}`rtorrent.rc`. The [modernized configuration template](https://rtorrent-docs.readthedocs.io/en/latest/cookbook.html#modernized-configuration-template) with the values specified in this module will be prepended using mkBefore. You can use mkForce to overwrite the config completly.+The content of {file}`rtorrent.rc`. The [modernized configuration template](https://rtorrent-docs.readthedocs.io/en/latest/cookbook.html#modernized-configuration-template) with the values specified in this module will be prepended using mkBefore. You can use mkForce to overwrite the config completely.
+2
-2
nixos/modules/services/torrent/transmission.nix
+2
-2
nixos/modules/services/torrent/transmission.nix
···See [Transmission's Wiki](https://github.com/transmission/transmission/wiki/Editing-Configuration-Files)···
+1
-1
nixos/modules/services/video/unifi-video.nix
+1
-1
nixos/modules/services/video/unifi-video.nix
+1
-1
nixos/modules/services/web-apps/bookstack.nix
+1
-1
nixos/modules/services/web-apps/bookstack.nix
···
+1
-1
nixos/modules/services/web-apps/healthchecks.nix
+1
-1
nixos/modules/services/web-apps/healthchecks.nix
···
+1
-1
nixos/modules/services/web-apps/ihatemoney/default.nix
+1
-1
nixos/modules/services/web-apps/ihatemoney/default.nix
···-description = lib.mdDoc "Additionnal configuration of the UWSGI vassal running ihatemoney. It should notably specify on which interfaces and ports the vassal should listen.";+description = lib.mdDoc "Additional configuration of the UWSGI vassal running ihatemoney. It should notably specify on which interfaces and ports the vassal should listen.";
+1
-1
nixos/modules/services/web-apps/invidious.nix
+1
-1
nixos/modules/services/web-apps/invidious.nix
···
+1
-1
nixos/modules/services/web-apps/invoiceplane.nix
+1
-1
nixos/modules/services/web-apps/invoiceplane.nix
···
+1
-1
nixos/modules/services/web-apps/jitsi-meet.nix
+1
-1
nixos/modules/services/web-apps/jitsi-meet.nix
···
+1
-1
nixos/modules/services/web-apps/matomo.nix
+1
-1
nixos/modules/services/web-apps/matomo.nix
···
+1
-1
nixos/modules/services/web-apps/mattermost.nix
+1
-1
nixos/modules/services/web-apps/mattermost.nix
+1
-1
nixos/modules/services/web-apps/mediawiki.nix
+1
-1
nixos/modules/services/web-apps/mediawiki.nix
···
+1
-1
nixos/modules/services/web-apps/netbox.nix
+1
-1
nixos/modules/services/web-apps/netbox.nix
···See the [documentation](https://netbox.readthedocs.io/en/stable/installation/6-ldap/#configuration) for possible options.
+7
-7
nixos/modules/services/web-apps/nextcloud.nix
+7
-7
nixos/modules/services/web-apps/nextcloud.nix
···++ (if cfg.enableBrokenCiphersForSSE then [ cfg.phpPackage.extensions.openssl-legacy ] else [ cfg.phpPackage.extensions.openssl ])·········See <https://docs.nextcloud.com/server/latest/admin_manual/configuration_files/encryption_configuration.html#disabling-encryption> on how to achieve this.······${optionalString (c.defaultPhoneRegion != null) "'default_phone_region' => '${c.defaultPhoneRegion}',"}${optionalString (nextcloudGreaterOrEqualThan "23") "'profile.enabled' => ${boolToString cfg.globalProfiles},"}
+1
-1
nixos/modules/services/web-apps/nextcloud.xml
+1
-1
nixos/modules/services/web-apps/nextcloud.xml
···
+1
-1
nixos/modules/services/web-apps/onlyoffice.nix
+1
-1
nixos/modules/services/web-apps/onlyoffice.nix
+1
-1
nixos/modules/services/web-apps/outline.nix
+1
-1
nixos/modules/services/web-apps/outline.nix
···
+1
-1
nixos/modules/services/web-apps/peering-manager.nix
+1
-1
nixos/modules/services/web-apps/peering-manager.nix
···See the [documentation](https://peering-manager.readthedocs.io/en/stable/setup/6-ldap/#configuration) for possible options.
+1
-1
nixos/modules/services/web-apps/pgpkeyserver-lite.nix
+1
-1
nixos/modules/services/web-apps/pgpkeyserver-lite.nix
+1
-1
nixos/modules/services/web-apps/snipe-it.nix
+1
-1
nixos/modules/services/web-apps/snipe-it.nix
···
+1
-1
nixos/modules/services/web-apps/sogo.nix
+1
-1
nixos/modules/services/web-apps/sogo.nix
···
+1
-1
nixos/modules/services/web-apps/wiki-js.nix
+1
-1
nixos/modules/services/web-apps/wiki-js.nix
+1
-1
nixos/modules/services/web-servers/agate.nix
+1
-1
nixos/modules/services/web-servers/agate.nix
+1
-1
nixos/modules/services/web-servers/apache-httpd/vhost-options.nix
+1
-1
nixos/modules/services/web-servers/apache-httpd/vhost-options.nix
+1
-1
nixos/modules/services/web-servers/keter/default.nix
+1
-1
nixos/modules/services/web-servers/keter/default.nix
···
+3
-1
nixos/modules/services/web-servers/nginx/default.nix
+3
-1
nixos/modules/services/web-servers/nginx/default.nix
···
+2
-2
nixos/modules/services/web-servers/nginx/vhost-options.nix
+2
-2
nixos/modules/services/web-servers/nginx/vhost-options.nix
···
+1
-1
nixos/modules/services/web-servers/ttyd.nix
+1
-1
nixos/modules/services/web-servers/ttyd.nix
···-message = "SSL is enabled for ttyd, but no certFile, keyFile or caFile has been specefied."; }+message = "SSL is enabled for ttyd, but no certFile, keyFile or caFile has been specified."; }
+1
-1
nixos/modules/services/web-servers/zope2.nix
+1
-1
nixos/modules/services/web-servers/zope2.nix
+1
-1
nixos/modules/services/x11/display-managers/sddm.nix
+1
-1
nixos/modules/services/x11/display-managers/sddm.nix
+1
-1
nixos/modules/services/x11/hardware/libinput.nix
+1
-1
nixos/modules/services/x11/hardware/libinput.nix
···Enables or disables drag lock during tapping behavior. When enabled, a finger up during tap-and-drag will not immediately release the button. If the finger is set down again within the
+2
-2
nixos/modules/services/x11/imwheel.nix
+2
-2
nixos/modules/services/x11/imwheel.nix
···
+1
-1
nixos/modules/services/x11/xautolock.nix
+1
-1
nixos/modules/services/x11/xautolock.nix
+1
-1
nixos/modules/virtualisation/appvm.nix
+1
-1
nixos/modules/virtualisation/appvm.nix
+1
-1
nixos/modules/virtualisation/proxmox-image.nix
+1
-1
nixos/modules/virtualisation/proxmox-image.nix
···-Configuration for the default virtio disk. It can be used as a cue for PVE to autodetect the target sotrage.+Configuration for the default virtio disk. It can be used as a cue for PVE to autodetect the target storage.
+1
-1
nixos/modules/virtualisation/vmware-host.nix
+1
-1
nixos/modules/virtualisation/vmware-host.nix
···
+1
-1
nixos/tests/acme.nix
+1
-1
nixos/tests/acme.nix
+1
nixos/tests/all-tests.nix
+1
nixos/tests/all-tests.nix
···
+1
-1
nixos/tests/cockroachdb.nix
+1
-1
nixos/tests/cockroachdb.nix
···
+1
-1
nixos/tests/common/ec2.nix
+1
-1
nixos/tests/common/ec2.nix
···
+1
-1
nixos/tests/graphite.nix
+1
-1
nixos/tests/graphite.nix
+1
-1
nixos/tests/home-assistant.nix
+1
-1
nixos/tests/home-assistant.nix
···
+1
-1
nixos/tests/networking-proxy.nix
+1
-1
nixos/tests/networking-proxy.nix
···
+24
nixos/tests/nginx-globalredirect.nix
+24
nixos/tests/nginx-globalredirect.nix
···
+1
-1
nixos/tests/pgadmin4-standalone.nix
+1
-1
nixos/tests/pgadmin4-standalone.nix
+1
-1
nixos/tests/pgadmin4.nix
+1
-1
nixos/tests/pgadmin4.nix
···
+1
-1
nixos/tests/vaultwarden.nix
+1
-1
nixos/tests/vaultwarden.nix
···
-1
pkgs/applications/audio/mopidy/local.nix
-1
pkgs/applications/audio/mopidy/local.nix
-1
pkgs/applications/audio/mopidy/musicbox-webclient.nix
-1
pkgs/applications/audio/mopidy/musicbox-webclient.nix
+1
-1
pkgs/applications/audio/mp3val/default.nix
+1
-1
pkgs/applications/audio/mp3val/default.nix
···
+3
-3
pkgs/applications/editors/kakoune/plugins/aliases.nix
+3
-3
pkgs/applications/editors/kakoune/plugins/aliases.nix
······
+2
-2
pkgs/applications/emulators/citra/update.sh
+2
-2
pkgs/applications/emulators/citra/update.sh
···NEW_NIGHTLY_HASH="$(nix-prefetch-git --quiet --fetch-submodules --rev "nightly-${NEW_NIGHTLY_VERSION}" "https://github.com/citra-emu/citra-nightly" | jq -r '.sha256')"···NEW_CANARY_HASH="$(nix-prefetch-git --quiet --fetch-submodules --rev "canary-${NEW_CANARY_VERSION}" "https://github.com/citra-emu/citra-canary" | jq -r '.sha256')"
+2
-2
pkgs/applications/emulators/yuzu/update.sh
+2
-2
pkgs/applications/emulators/yuzu/update.sh
······
+3
-3
pkgs/applications/misc/ipmiview/default.nix
+3
-3
pkgs/applications/misc/ipmiview/default.nix
···url = "https://www.supermicro.com/wftp/utility/IPMIView/Linux/IPMIView_${version}_build.${buildVersion}_bundleJRE_Linux_x64.tar.gz";
+1
-1
pkgs/applications/misc/with-shell/default.nix
+1
-1
pkgs/applications/misc/with-shell/default.nix
+1
-2
pkgs/applications/networking/browsers/vivaldi/default.nix
+1
-2
pkgs/applications/networking/browsers/vivaldi/default.nix
······
+1
-1
pkgs/applications/networking/cluster/hadoop/default.nix
+1
-1
pkgs/applications/networking/cluster/hadoop/default.nix
+1
-1
pkgs/applications/networking/mailreaders/mailnag/default.nix
+1
-1
pkgs/applications/networking/mailreaders/mailnag/default.nix
···
+1
-1
pkgs/applications/radio/gnuradio/3.8.nix
+1
-1
pkgs/applications/radio/gnuradio/3.8.nix
···
+1
-1
pkgs/applications/radio/gnuradio/3.9.nix
+1
-1
pkgs/applications/radio/gnuradio/3.9.nix
···
+1
-1
pkgs/applications/radio/gnuradio/default.nix
+1
-1
pkgs/applications/radio/gnuradio/default.nix
···
+2
-2
pkgs/applications/science/logic/cvc5/default.nix
+2
-2
pkgs/applications/science/logic/cvc5/default.nix
···
+1
-1
pkgs/applications/science/logic/monosat/default.nix
+1
-1
pkgs/applications/science/logic/monosat/default.nix
···
+1
-1
pkgs/applications/science/math/LiE/default.nix
+1
-1
pkgs/applications/science/math/LiE/default.nix
···
+1
-1
pkgs/applications/science/molecular-dynamics/lammps/default.nix
+1
-1
pkgs/applications/science/molecular-dynamics/lammps/default.nix
···
+1
-1
pkgs/applications/video/epgstation/update.nix
+1
-1
pkgs/applications/video/epgstation/update.nix
···
+1
-1
pkgs/applications/video/kodi/unwrapped.nix
+1
-1
pkgs/applications/video/kodi/unwrapped.nix
···
+1
-1
pkgs/applications/window-managers/herbstluftwm/default.nix
+1
-1
pkgs/applications/window-managers/herbstluftwm/default.nix
+1
-1
pkgs/build-support/docker/default.nix
+1
-1
pkgs/build-support/docker/default.nix
···
+1
-1
pkgs/build-support/dotnet/build-dotnet-module/default.nix
+1
-1
pkgs/build-support/dotnet/build-dotnet-module/default.nix
···
+1
-1
pkgs/build-support/fetchfirefoxaddon/tests.nix
+1
-1
pkgs/build-support/fetchfirefoxaddon/tests.nix
···url = "https://addons.mozilla.org/firefox/downloads/file/3059971/image_search_options-3.0.12-fx.xpi";
+1
-1
pkgs/build-support/release/source-tarball.nix
+1
-1
pkgs/build-support/release/source-tarball.nix
···
+1
-1
pkgs/build-support/rust/build-rust-crate/test/default.nix
+1
-1
pkgs/build-support/rust/build-rust-crate/test/default.nix
···
+1
-1
pkgs/build-support/rust/build-rust-crate/test/rcgen-crates.nix
+1
-1
pkgs/build-support/rust/build-rust-crate/test/rcgen-crates.nix
···
+1
-1
pkgs/build-support/vm/default.nix
+1
-1
pkgs/build-support/vm/default.nix
···
+1
-1
pkgs/data/fonts/google-fonts/default.nix
+1
-1
pkgs/data/fonts/google-fonts/default.nix
···
+1
-1
pkgs/data/fonts/profont/default.nix
+1
-1
pkgs/data/fonts/profont/default.nix
···
+1
-1
pkgs/data/fonts/tamzen/default.nix
+1
-1
pkgs/data/fonts/tamzen/default.nix
···
+1
-1
pkgs/data/misc/cacert/update.sh
+1
-1
pkgs/data/misc/cacert/update.sh
···-# Build both the cacert package and an overriden version where we use the source attribute of NSS.+# Build both the cacert package and an overridden version where we use the source attribute of NSS.
+1
-1
pkgs/desktops/enlightenment/efl/default.nix
+1
-1
pkgs/desktops/enlightenment/efl/default.nix
···-"-D ecore-imf-loaders-disabler=ibus,scim" # ibus is disabled by default, scim is not availabe in nixpkgs+"-D ecore-imf-loaders-disabler=ibus,scim" # ibus is disabled by default, scim is not available in nixpkgs
+1
-1
pkgs/desktops/pantheon/desktop/elementary-session-settings/default.nix
+1
-1
pkgs/desktops/pantheon/desktop/elementary-session-settings/default.nix
···# That is not possible within nixos, but we can achieve this easily with a simple script that copies-# them. We then use a xdg autostart and initalize it during the "EarlyInitialization" phase of a gnome session+# them. We then use a xdg autostart and initialize it during the "EarlyInitialization" phase of a gnome session
+2
-2
pkgs/development/compilers/dotnet/update.sh
+2
-2
pkgs/development/compilers/dotnet/update.sh
······
+1
-1
pkgs/development/compilers/elm/default.nix
+1
-1
pkgs/development/compilers/elm/default.nix
+1
-1
pkgs/development/compilers/gcc/4.9/default.nix
+1
-1
pkgs/development/compilers/gcc/4.9/default.nix
···
+1
-1
pkgs/development/compilers/graalvm/community-edition/mkGraal.nix
+1
-1
pkgs/development/compilers/graalvm/community-edition/mkGraal.nix
+1
-1
pkgs/development/haskell-modules/lib/compose.nix
+1
-1
pkgs/development/haskell-modules/lib/compose.nix
···triggerRebuild = i: overrideCabal (drv: { postUnpack = ": trigger rebuild ${toString i}"; });
+1
-1
pkgs/development/haskell-modules/lib/default.nix
+1
-1
pkgs/development/haskell-modules/lib/default.nix
···
+2
-2
pkgs/development/haskell-modules/make-package-set.nix
+2
-2
pkgs/development/haskell-modules/make-package-set.nix
······
+2
-2
pkgs/development/interpreters/lua-5/default.nix
+2
-2
pkgs/development/interpreters/lua-5/default.nix
···(final: prev: callPackage ../../lua-modules/generated-packages.nix { inherit (final) callPackage; } final prev)···
+2
-2
pkgs/development/interpreters/octave/default.nix
+2
-2
pkgs/development/interpreters/octave/default.nix
······
+1
-1
pkgs/development/interpreters/python/python-packages-base.nix
+1
-1
pkgs/development/interpreters/python/python-packages-base.nix
···-# Derivations built with `buildPythonPackage` can already be overriden with `override`, `overrideAttrs`, and `overrideDerivation`.+# Derivations built with `buildPythonPackage` can already be overridden with `override`, `overrideAttrs`, and `overrideDerivation`.# This function introduces `overridePythonAttrs` and it overrides the call to `buildPythonPackage`.
+1
-1
pkgs/development/interpreters/python/update-python-libraries/update-python-libraries.py
+1
-1
pkgs/development/interpreters/python/update-python-libraries/update-python-libraries.py
+1
-1
pkgs/development/libraries/glib/default.nix
+1
-1
pkgs/development/libraries/glib/default.nix
···
+10
-10
pkgs/development/libraries/gobject-introspection/wrapper.nix
+10
-10
pkgs/development/libraries/gobject-introspection/wrapper.nix
···# passing this stdenv to `targetPackages...` breaks due to splicing not working in `.override``# wrap both pkgsCrossX.buildPackages.gobject-introspection and {pkgs,pkgsSomethingExecutableOnBuildSystem).buildPackages.gobject-introspectionif (!stdenv.hostPlatform.canExecute stdenv.targetPlatform) && stdenv.targetPlatform.emulatorAvailable buildPackages···+${lib.getExe buildPackages.xorg.lndir} ${overriddenUnwrappedGir.${output}} ${"$" + "${output}"}······-${lib.getExe buildPackages.xorg.lndir} ${overridenUnwrappedGir.${output}} ${"$" + "${output}"}+${lib.getExe buildPackages.xorg.lndir} ${overriddenUnwrappedGir.${output}} ${"$" + "${output}"}
+1
-1
pkgs/development/libraries/gstreamer/good/default.nix
+1
-1
pkgs/development/libraries/gstreamer/good/default.nix
···# fails 1 tests with "Unexpected critical/warning: g_object_set_is_valid_property: object class 'GstRtpStorage' has no property named ''"
+1
-1
pkgs/development/libraries/khronos-ocl-icd-loader/default.nix
+1
-1
pkgs/development/libraries/khronos-ocl-icd-loader/default.nix
···
+1
-1
pkgs/development/libraries/libcommuni/default.nix
+1
-1
pkgs/development/libraries/libcommuni/default.nix
···
+1
-1
pkgs/development/libraries/ndn-cxx/default.nix
+1
-1
pkgs/development/libraries/ndn-cxx/default.nix
···
+1
-1
pkgs/development/libraries/science/math/blas/default.nix
+1
-1
pkgs/development/libraries/science/math/blas/default.nix
+1
-1
pkgs/development/libraries/science/math/zn_poly/default.nix
+1
-1
pkgs/development/libraries/science/math/zn_poly/default.nix
···
+1
-1
pkgs/development/libraries/stargate-libcds/default.nix
+1
-1
pkgs/development/libraries/stargate-libcds/default.nix
+1
-1
pkgs/development/libraries/vulkan-headers/default.nix
+1
-1
pkgs/development/libraries/vulkan-headers/default.nix
···
+1
-1
pkgs/development/octave-modules/vibes/default.nix
+1
-1
pkgs/development/octave-modules/vibes/default.nix
···
+8
-7
pkgs/development/python-modules/awacs/default.nix
+8
-7
pkgs/development/python-modules/awacs/default.nix
······
+2
-2
pkgs/development/python-modules/azure-mgmt-containerservice/default.nix
+2
-2
pkgs/development/python-modules/azure-mgmt-containerservice/default.nix
······
+1
-1
pkgs/development/python-modules/backports_shutil_get_terminal_size/default.nix
+1
-1
pkgs/development/python-modules/backports_shutil_get_terminal_size/default.nix
···
+1
-1
pkgs/development/python-modules/beancount_docverif/default.nix
+1
-1
pkgs/development/python-modules/beancount_docverif/default.nix
···Docverif is the "Document Verification" plugin for beancount, fulfilling the following functions:
+1
-1
pkgs/development/python-modules/buildbot/plugins.nix
+1
-1
pkgs/development/python-modules/buildbot/plugins.nix
-5
pkgs/development/python-modules/cleo/default.nix
-5
pkgs/development/python-modules/cleo/default.nix
+2
-2
pkgs/development/python-modules/dj-database-url/default.nix
+2
-2
pkgs/development/python-modules/dj-database-url/default.nix
···
+3
-2
pkgs/development/python-modules/duckdb-engine/default.nix
+3
-2
pkgs/development/python-modules/duckdb-engine/default.nix
·········
+1
-1
pkgs/development/python-modules/ignite/default.nix
+1
-1
pkgs/development/python-modules/ignite/default.nix
···-# runs succesfully in 3.9, however, async isn't correctly closed so it will fail after test suite.+# runs successfully in 3.9, however, async isn't correctly closed so it will fail after test suite.
+1
-1
pkgs/development/python-modules/mezzanine/default.nix
+1
-1
pkgs/development/python-modules/mezzanine/default.nix
+1
-1
pkgs/development/python-modules/mouseinfo/default.nix
+1
-1
pkgs/development/python-modules/mouseinfo/default.nix
+2
-2
pkgs/development/python-modules/pyoverkiz/default.nix
+2
-2
pkgs/development/python-modules/pyoverkiz/default.nix
······
+3
-2
pkgs/development/python-modules/sphinxcontrib-katex/default.nix
+3
-2
pkgs/development/python-modules/sphinxcontrib-katex/default.nix
······
+1
-1
pkgs/development/python-modules/stone/default.nix
+1
-1
pkgs/development/python-modules/stone/default.nix
···
+1
-1
pkgs/development/ruby-modules/gem-config/default.nix
+1
-1
pkgs/development/ruby-modules/gem-config/default.nix
···
+1
-1
pkgs/development/tools/continuous-integration/github-runner/default.nix
+1
-1
pkgs/development/tools/continuous-integration/github-runner/default.nix
···
+1
-1
pkgs/development/tools/misc/binutils/2.38/default.nix
+1
-1
pkgs/development/tools/misc/binutils/2.38/default.nix
···
+1
-1
pkgs/development/tools/misc/binutils/default.nix
+1
-1
pkgs/development/tools/misc/binutils/default.nix
···
+1
-1
pkgs/development/tools/misc/dura/default.nix
+1
-1
pkgs/development/tools/misc/dura/default.nix
···
+2
-2
pkgs/development/tools/misc/strace/default.nix
+2
-2
pkgs/development/tools/misc/strace/default.nix
···
+1
-1
pkgs/development/tools/poetry2nix/poetry2nix/default.nix
+1
-1
pkgs/development/tools/poetry2nix/poetry2nix/default.nix
···-Can be overriden by calling defaultPoetryOverrides.overrideOverlay which takes an overlay function+Can be overridden by calling defaultPoetryOverrides.overrideOverlay which takes an overlay functiondefaultPoetryOverrides = self.mkDefaultPoetryOverrides (import ./overrides { inherit pkgs lib poetryLib; });
+1
-1
pkgs/development/tools/tapview/default.nix
+1
-1
pkgs/development/tools/tapview/default.nix
···
+1
-1
pkgs/games/gl-gsync-demo/default.nix
+1
-1
pkgs/games/gl-gsync-demo/default.nix
···-The demo simply draws a vertical bar moving accross the screen at constant speed, but deliberately rendered at a variable frame rate.+The demo simply draws a vertical bar moving across the screen at constant speed, but deliberately rendered at a variable frame rate.The min and max frame rates can be manually changed at runtime, by step of 10 fps and with a min of 10 fps.
+1
-1
pkgs/games/openra/default.nix
+1
-1
pkgs/games/openra/default.nix
···
+1
-1
pkgs/games/openra/packages.nix
+1
-1
pkgs/games/openra/packages.nix
···
+9
-3
pkgs/misc/dxvk/default.nix
+9
-3
pkgs/misc/dxvk/default.nix
······
+14
-1
pkgs/misc/dxvk/dxvk.nix
+14
-1
pkgs/misc/dxvk/dxvk.nix
···+# DXVK 2.0+ no longer vendors certain dependencies. This derivation also needs to build on Darwin,
+1
-1
pkgs/misc/screensavers/alock/default.nix
+1
-1
pkgs/misc/screensavers/alock/default.nix
···
+1
-1
pkgs/misc/tmux-plugins/default.nix
+1
-1
pkgs/misc/tmux-plugins/default.nix
+1
-1
pkgs/os-specific/darwin/yabai/default.nix
+1
-1
pkgs/os-specific/darwin/yabai/default.nix
···# Defining this here exposes it as a passthru attribute, which is useful because it allows us to run `builtins.hashFile` on it in pure-eval mode.-# With that we can programatically generate an `/etc/sudoers.d` entry which disables the password requirement, so that a user-agent can run it at login.+# With that we can programmatically generate an `/etc/sudoers.d` entry which disables the password requirement, so that a user-agent can run it at login.# For whatever reason the regular commands to load the scripting addition do not work, yabai will throw an error.
+2
-2
pkgs/os-specific/linux/brillo/default.nix
+2
-2
pkgs/os-specific/linux/brillo/default.nix
···
+2
-2
pkgs/os-specific/linux/systemd/default.nix
+2
-2
pkgs/os-specific/linux/systemd/default.nix
···-# A list of all the runtime binaries that the systemd exectuables, tests and libraries are referencing in their source code, scripts and unit files.+# A list of all the runtime binaries that the systemd executables, tests and libraries are referencing in their source code, scripts and unit files.# As soon as a dependency isn't required anymore we should remove it from the list. The `where` attribute for each of the replacement patterns must be exhaustive. If another (unhandled) case is found in the source code the build fails with an error message.{ search = "/usr/bin/getent"; replacement = "${getent}/bin/getent"; where = [ "src/nspawn/nspawn-setuid.c" ]; }···
+2
-2
pkgs/servers/dns/pdns/default.nix
+2
-2
pkgs/servers/dns/pdns/default.nix
···
+3
-3
pkgs/servers/geospatial/martin/default.nix
+3
-3
pkgs/servers/geospatial/martin/default.nix
···
+1
-1
pkgs/servers/http/nginx/generic.nix
+1
-1
pkgs/servers/http/nginx/generic.nix
···-inherit (nixosTests) nginx nginx-auth nginx-etag nginx-http3 nginx-pubhtml nginx-sandbox nginx-sso;+inherit (nixosTests) nginx nginx-auth nginx-etag nginx-globalredirect nginx-http3 nginx-pubhtml nginx-sandbox nginx-sso;
+3
-5
pkgs/servers/monitoring/prometheus/modemmanager-exporter.nix
+3
-5
pkgs/servers/monitoring/prometheus/modemmanager-exporter.nix
···
+1
-1
pkgs/servers/nextcloud/default.nix
+1
-1
pkgs/servers/nextcloud/default.nix
···
+1
-1
pkgs/servers/nfd/default.nix
+1
-1
pkgs/servers/nfd/default.nix
···
+1
-1
pkgs/servers/sql/postgresql/default.nix
+1
-1
pkgs/servers/sql/postgresql/default.nix
···
+1
-1
pkgs/servers/web-apps/netbox/default.nix
+1
-1
pkgs/servers/web-apps/netbox/default.nix
···url = "https://github.com/netbox-community/netbox/pull/10341/commits/ce6bf9e5c1bc08edc80f6ea1e55cf1318ae6e14b.patch";
+1
-1
pkgs/stdenv/generic/check-meta.nix
+1
-1
pkgs/stdenv/generic/check-meta.nix
···
+1
-1
pkgs/tools/admin/azure-cli/default.nix
+1
-1
pkgs/tools/admin/azure-cli/default.nix
···
+3
-3
pkgs/tools/admin/infra/default.nix
+3
-3
pkgs/tools/admin/infra/default.nix
···
+1
-1
pkgs/tools/admin/pgadmin/default.nix
+1
-1
pkgs/tools/admin/pgadmin/default.nix
···
+1
-1
pkgs/tools/misc/fpart/default.nix
+1
-1
pkgs/tools/misc/fpart/default.nix
···
+1
-1
pkgs/tools/misc/librespeed-cli/default.nix
+1
-1
pkgs/tools/misc/librespeed-cli/default.nix
+1
-1
pkgs/tools/misc/sqlite3-to-mysql/default.nix
+1
-1
pkgs/tools/misc/sqlite3-to-mysql/default.nix
+1
-1
pkgs/tools/networking/ipfetch/default.nix
+1
-1
pkgs/tools/networking/ipfetch/default.nix
+1
-1
pkgs/tools/networking/ndn-tools/default.nix
+1
-1
pkgs/tools/networking/ndn-tools/default.nix
···
+2
-2
pkgs/tools/security/faraday-cli/default.nix
+2
-2
pkgs/tools/security/faraday-cli/default.nix
···
+1
-1
pkgs/tools/typesetting/docbook2odf/default.nix
+1
-1
pkgs/tools/typesetting/docbook2odf/default.nix
···
+3
-3
pkgs/tools/typesetting/tectonic/default.nix
+3
-3
pkgs/tools/typesetting/tectonic/default.nix
···
+1
-1
pkgs/tools/wayland/wev/default.nix
+1
-1
pkgs/tools/wayland/wev/default.nix
···
+2
-2
pkgs/top-level/all-packages.nix
+2
-2
pkgs/top-level/all-packages.nix
······
+1
-1
pkgs/top-level/emacs-packages.nix
+1
-1
pkgs/top-level/emacs-packages.nix
+1
-1
pkgs/top-level/gnuradio-packages.nix
+1
-1
pkgs/top-level/gnuradio-packages.nix
+1
-1
pkgs/top-level/php-packages.nix
+1
-1
pkgs/top-level/php-packages.nix
···