···52 did:key:zDnaeUBxtG6Xuv3ATJE4GaWeyXM3jyamJsZw3bSPpxx4bNXDR
5354# the secret key from above
55-export TANGLED_OAUTH_CLIENT_SECRET="z42tuP..."
5657# run redis in at a new shell to store oauth sessions
58redis-server
···168169If for any reason you wish to disable either one of the
170services in the VM, modify [nix/vm.nix](/nix/vm.nix) and set
171-`services.tangled-spindle.enable` (or
172-`services.tangled-knot.enable`) to `false`.
···52 did:key:zDnaeUBxtG6Xuv3ATJE4GaWeyXM3jyamJsZw3bSPpxx4bNXDR
5354# the secret key from above
55+export TANGLED_OAUTH_CLIENT_SECRET="z42tuP..."
5657# run redis in at a new shell to store oauth sessions
58redis-server
···168169If for any reason you wish to disable either one of the
170services in the VM, modify [nix/vm.nix](/nix/vm.nix) and set
171+`services.tangled.spindle.enable` (or
172+`services.tangled.knot.enable`) to `false`.
+1-1
docs/migrations.md
···49latest revision, and change your config block like so:
5051```diff
52- services.tangled-knot = {
53 enable = true;
54 server = {
55- secretFile = /path/to/secret;
···49latest revision, and change your config block like so:
5051```diff
52+ services.tangled.knot = {
53 enable = true;
54 server = {
55- secretFile = /path/to/secret;