diff --git a/nixos/modules/config/i18n.nix b/nixos/modules/config/i18n.nix index 80ef515fbfe2..dad06c1b44cd 100644 --- a/nixos/modules/config/i18n.nix +++ b/nixos/modules/config/i18n.nix @@ -75,8 +75,7 @@ with lib; List of locales that the system should support. The value "all" means that all locales supported by Glibc will be installed. A full list of supported locales - can be found at . + can be found at . ''; }; diff --git a/nixos/modules/config/users-groups.nix b/nixos/modules/config/users-groups.nix index 446cc3698bef..2e5984b55cc1 100644 --- a/nixos/modules/config/users-groups.nix +++ b/nixos/modules/config/users-groups.nix @@ -156,8 +156,7 @@ let pam_mount.conf.xml. Useful attributes might include path, options, fstype, and server. - See + See for more information. ''; }; diff --git a/nixos/modules/config/xdg/portal.nix b/nixos/modules/config/xdg/portal.nix index 1e6ddd7c4a26..689abf267f09 100644 --- a/nixos/modules/config/xdg/portal.nix +++ b/nixos/modules/config/xdg/portal.nix @@ -33,7 +33,7 @@ in options.xdg.portal = { enable = - mkEnableOption "xdg desktop integration" // { + mkEnableOption ''xdg desktop integration'' // { default = false; }; diff --git a/nixos/modules/hardware/tuxedo-keyboard.nix b/nixos/modules/hardware/tuxedo-keyboard.nix index 97af7c61f3c9..7bcabde48900 100644 --- a/nixos/modules/hardware/tuxedo-keyboard.nix +++ b/nixos/modules/hardware/tuxedo-keyboard.nix @@ -13,7 +13,7 @@ in To configure the driver, pass the options to the configuration. There are several parameters you can change. It's best to check at the source code description which options are supported. - You can find all the supported parameters at: + You can find all the supported parameters at: In order to use the custom lighting with the maximumg brightness and a color of 0xff0a0a one would put pass like this: diff --git a/nixos/modules/programs/sway.nix b/nixos/modules/programs/sway.nix index decae1b4d2da..af2b261d3c5f 100644 --- a/nixos/modules/programs/sway.nix +++ b/nixos/modules/programs/sway.nix @@ -39,7 +39,7 @@ in { Sway, the i3-compatible tiling Wayland compositor. You can manually launch Sway by executing "exec sway" on a TTY. Copy /etc/sway/config to ~/.config/sway/config to modify the default configuration. See - and + and "man 5 sway" for more information''; wrapperFeatures = mkOption { diff --git a/nixos/modules/security/acme/default.nix b/nixos/modules/security/acme/default.nix index 5f4344d451c8..4bc3d8e743d3 100644 --- a/nixos/modules/security/acme/default.nix +++ b/nixos/modules/security/acme/default.nix @@ -581,8 +581,8 @@ let Turns on the OCSP Must-Staple TLS extension. Make sure you know what you're doing! See: - - + + ''; }; diff --git a/nixos/modules/security/pam.nix b/nixos/modules/security/pam.nix index 7903d333411b..8a70e5f3adbd 100644 --- a/nixos/modules/security/pam.nix +++ b/nixos/modules/security/pam.nix @@ -831,8 +831,7 @@ in If set, users can log in with SSH keys and PKCS#11 tokens. - More information can be found here. + More information can be found here. ''; }; @@ -872,8 +871,7 @@ in username:first_keyHandle,first_public_key: second_keyHandle,second_public_key This file can be generated using pamu2fcfg command. - More information can be found here. + More information can be found here. ''; }; @@ -894,8 +892,7 @@ in username:first_keyHandle,first_public_key: second_keyHandle,second_public_key This file can be generated using pamu2fcfg command. - More information can be found here. + More information can be found here. ''; }; @@ -909,9 +906,7 @@ in When using pamu2fcfg, you can specify your application ID with the -i flag. - More information can be found - here + More information can be found here ''; }; @@ -927,9 +922,7 @@ in When using pamu2fcfg, you can specify your application ID with the -o flag. - More information can be found - here + More information can be found here ''; }; @@ -995,8 +988,7 @@ in Note that this module must both be enabled using this option and on a per-PAM-service level as well (using usshAuth). - More information can be found here. + More information can be found here. ''; }; @@ -1084,8 +1076,7 @@ in The file must have only one line: username:yubikey_token_id1:yubikey_token_id2 - More information can be found here. + More information can be found here. ''; }; control = mkOption { @@ -1130,8 +1121,7 @@ in Challenge-Response configurations. See the man-page ykpamcfg(1) for further details on how to configure offline Challenge-Response validation. - More information can be found here. + More information can be found here. ''; }; challengeResponsePath = mkOption { @@ -1140,8 +1130,7 @@ in description = '' If not null, set the path used by yubico pam module where the challenge expected response is stored. - More information can be found here. + More information can be found here. ''; }; }; diff --git a/nixos/modules/security/pam_mount.nix b/nixos/modules/security/pam_mount.nix index e159a73b66a4..ae314abd86c6 100644 --- a/nixos/modules/security/pam_mount.nix +++ b/nixos/modules/security/pam_mount.nix @@ -33,8 +33,7 @@ in default = []; description = '' List of volume definitions for pam_mount. - For more information, visit . + For more information, visit . ''; }; @@ -67,8 +66,7 @@ in description = '' Sets the Debug-Level. 0 disables debugging, 1 enables pam_mount tracing, and 2 additionally enables tracing in mount.crypt. The default is 0. - For more information, visit . + For more information, visit . ''; }; @@ -78,8 +76,7 @@ in description = '' Amount of microseconds to wait until killing remaining processes after final logout. - For more information, visit . + For more information, visit . ''; }; diff --git a/nixos/modules/security/pam_usb.nix b/nixos/modules/security/pam_usb.nix index 51d81e823f86..71e2af8f3a51 100644 --- a/nixos/modules/security/pam_usb.nix +++ b/nixos/modules/security/pam_usb.nix @@ -19,8 +19,7 @@ in default = false; description = '' Enable USB login for all login systems that support it. For - more information, visit . + more information, visit . ''; }; diff --git a/nixos/modules/services/backup/zrepl.nix b/nixos/modules/services/backup/zrepl.nix index e3a900912645..7b31b0da0369 100644 --- a/nixos/modules/services/backup/zrepl.nix +++ b/nixos/modules/services/backup/zrepl.nix @@ -23,8 +23,7 @@ in settings = mkOption { default = { }; description = '' - Configuration for zrepl. See + Configuration for zrepl. See for more information. ''; type = types.submodule { diff --git a/nixos/modules/services/continuous-integration/github-runner.nix b/nixos/modules/services/continuous-integration/github-runner.nix index 2da18bbdb396..2c753b514c5b 100644 --- a/nixos/modules/services/continuous-integration/github-runner.nix +++ b/nixos/modules/services/continuous-integration/github-runner.nix @@ -22,8 +22,7 @@ in Whether to enable GitHub Actions runner. Note: GitHub recommends using self-hosted runners with private repositories only. Learn more here: - About self-hosted runners. + About self-hosted runners. ''; type = lib.types.bool; }; diff --git a/nixos/modules/services/databases/postgresql.nix b/nixos/modules/services/databases/postgresql.nix index a054a6d7a12f..8225a9aaba61 100644 --- a/nixos/modules/services/databases/postgresql.nix +++ b/nixos/modules/services/databases/postgresql.nix @@ -81,8 +81,7 @@ in default = ""; description = '' Defines how users authenticate themselves to the server. See the - - PostgreSQL documentation for pg_hba.conf + PostgreSQL documentation for pg_hba.conf for details on the expected format of this option. By default, peer based authentication will be used for users connecting via the Unix socket, and md5 password authentication will be diff --git a/nixos/modules/services/databases/victoriametrics.nix b/nixos/modules/services/databases/victoriametrics.nix index 28a6ccfd5e20..4e002b3df7c7 100644 --- a/nixos/modules/services/databases/victoriametrics.nix +++ b/nixos/modules/services/databases/victoriametrics.nix @@ -29,8 +29,8 @@ let cfg = config.services.victoriametrics; in type = types.listOf types.str; default = []; description = '' - Extra options to pass to VictoriaMetrics. See the README: + Extra options to pass to VictoriaMetrics. See the README: + or victoriametrics -help for more information. ''; diff --git a/nixos/modules/services/development/zammad.nix b/nixos/modules/services/development/zammad.nix index 503f54aee2c7..e81eef3c0a51 100644 --- a/nixos/modules/services/development/zammad.nix +++ b/nixos/modules/services/development/zammad.nix @@ -139,7 +139,7 @@ in ''; description = '' The database.yml configuration file as key value set. - See + See for list of configuration parameters. ''; }; diff --git a/nixos/modules/services/games/asf.nix b/nixos/modules/services/games/asf.nix index 37247e195a78..6939e15c207d 100644 --- a/nixos/modules/services/games/asf.nix +++ b/nixos/modules/services/games/asf.nix @@ -136,7 +136,9 @@ in }; settings = mkOption { type = types.attrs; - description = "Additional settings that are documented here."; + description = '' + Additional settings that are documented here. + ''; default = { }; }; }; diff --git a/nixos/modules/services/hardware/udev.nix b/nixos/modules/services/hardware/udev.nix index f54979832cb3..f745e2f7f606 100644 --- a/nixos/modules/services/hardware/udev.nix +++ b/nixos/modules/services/hardware/udev.nix @@ -282,9 +282,8 @@ in default = true; type = types.bool; description = '' - Whether to assign predictable - names to network interfaces. If enabled, interfaces + Whether to assign predictable names to network interfaces. + If enabled, interfaces are assigned names that contain topology information (e.g. wlp3s0) and thus should be stable across reboots. If disabled, names depend on the order in diff --git a/nixos/modules/services/logging/filebeat.nix b/nixos/modules/services/logging/filebeat.nix index ec8df0a7b87d..045cd1147ead 100644 --- a/nixos/modules/services/logging/filebeat.nix +++ b/nixos/modules/services/logging/filebeat.nix @@ -161,8 +161,7 @@ in internal = true; description = '' Inputs specify how Filebeat locates and processes - input data. Use instead. + input data. Use instead. See . ''; diff --git a/nixos/modules/services/mail/mailman.nix b/nixos/modules/services/mail/mailman.nix index eb24f73c1da8..c3eb61bd20d7 100644 --- a/nixos/modules/services/mail/mailman.nix +++ b/nixos/modules/services/mail/mailman.nix @@ -114,7 +114,7 @@ in { example = "/run/secrets/ldap-bind"; description = '' Path to the file containing the bind password of the servie account - defined by . + defined by . ''; }; superUserGroup = mkOption { diff --git a/nixos/modules/services/mail/sympa.nix b/nixos/modules/services/mail/sympa.nix index 0b72ce97512d..0a2a885a80f6 100644 --- a/nixos/modules/services/mail/sympa.nix +++ b/nixos/modules/services/mail/sympa.nix @@ -88,7 +88,7 @@ in example = "cs"; description = '' Default Sympa language. - See + See for available options. ''; }; @@ -138,7 +138,7 @@ in }; description = '' The robot.conf configuration file as key value set. - See + See for list of configuration parameters. ''; }; @@ -287,7 +287,7 @@ in ''; description = '' The sympa.conf configuration file as key value set. - See + See for list of configuration parameters. ''; }; diff --git a/nixos/modules/services/matrix/appservice-discord.nix b/nixos/modules/services/matrix/appservice-discord.nix index 65ad96a3af36..87a706ae95ef 100644 --- a/nixos/modules/services/matrix/appservice-discord.nix +++ b/nixos/modules/services/matrix/appservice-discord.nix @@ -44,8 +44,7 @@ in { config.yaml configuration as a Nix attribute set. Configuration options should match those described in - - config.sample.yaml. + config.sample.yaml. and should be set to match the public host name of the Matrix homeserver for webhooks and avatars to work. diff --git a/nixos/modules/services/matrix/mautrix-facebook.nix b/nixos/modules/services/matrix/mautrix-facebook.nix index 2f91e6e0e521..384a4f4a706f 100644 --- a/nixos/modules/services/matrix/mautrix-facebook.nix +++ b/nixos/modules/services/matrix/mautrix-facebook.nix @@ -78,8 +78,7 @@ in { description = '' config.yaml configuration as a Nix attribute set. Configuration options should match those described in - - example-config.yaml. + example-config.yaml. Secret tokens should be specified using instead of this world-readable attribute set. diff --git a/nixos/modules/services/matrix/mautrix-telegram.nix b/nixos/modules/services/matrix/mautrix-telegram.nix index 1d4061b8a818..492ed1b24bce 100644 --- a/nixos/modules/services/matrix/mautrix-telegram.nix +++ b/nixos/modules/services/matrix/mautrix-telegram.nix @@ -81,8 +81,7 @@ in { description = '' config.yaml configuration as a Nix attribute set. Configuration options should match those described in - - example-config.yaml. + example-config.yaml. Secret tokens should be specified using instead of this world-readable attribute set. diff --git a/nixos/modules/services/misc/etcd.nix b/nixos/modules/services/misc/etcd.nix index d589ad780c1b..d0c82d726023 100644 --- a/nixos/modules/services/misc/etcd.nix +++ b/nixos/modules/services/misc/etcd.nix @@ -127,7 +127,7 @@ in { extraConf = mkOption { description = '' Etcd extra configuration. See - + ''; type = types.attrsOf types.str; default = {}; diff --git a/nixos/modules/services/misc/etebase-server.nix b/nixos/modules/services/misc/etebase-server.nix index 24be9e8e2692..1359c265c8f1 100644 --- a/nixos/modules/services/misc/etebase-server.nix +++ b/nixos/modules/services/misc/etebase-server.nix @@ -135,8 +135,8 @@ in default = {}; description = '' Configuration for etebase-server. Refer to - - and + + and for details on supported values. ''; example = { diff --git a/nixos/modules/services/misc/geoipupdate.nix b/nixos/modules/services/misc/geoipupdate.nix index 20bbba0aad9a..98d470412142 100644 --- a/nixos/modules/services/misc/geoipupdate.nix +++ b/nixos/modules/services/misc/geoipupdate.nix @@ -40,7 +40,7 @@ in description = '' geoipupdate configuration options. See - + for a full list of available options. Settings containing secret data should be set to an @@ -92,8 +92,7 @@ in Always handled as a secret whether the value is wrapped in a { _secret = ...; } - attrset or not (refer to for + attrset or not (refer to for details). ''; apply = x: if isAttrs x then x else { _secret = x; }; diff --git a/nixos/modules/services/misc/persistent-evdev.nix b/nixos/modules/services/misc/persistent-evdev.nix index 401d20010b12..fd6e298ef651 100644 --- a/nixos/modules/services/misc/persistent-evdev.nix +++ b/nixos/modules/services/misc/persistent-evdev.nix @@ -22,8 +22,8 @@ in Physical devices should already exist in /dev/input/by-id/. Proxy devices will be automatically given a uinput- prefix. - See the - project page for example configuration of virtual devices with libvirt + See the project page + for example configuration of virtual devices with libvirt and remember to add uinput-* devices to the qemu cgroup_device_acl list (see ). ''; diff --git a/nixos/modules/services/monitoring/cadvisor.nix b/nixos/modules/services/monitoring/cadvisor.nix index c844b1599dd4..7374b1ece495 100644 --- a/nixos/modules/services/monitoring/cadvisor.nix +++ b/nixos/modules/services/monitoring/cadvisor.nix @@ -75,7 +75,7 @@ in { world-readable Nix store that contains the value of . It's recommended to override this with a path not in the Nix store. - Tip: use nixops key management + Tip: use nixops key management ''; }; @@ -91,7 +91,7 @@ in { description = '' Additional cadvisor options. - See for available options. + See for available options. ''; }; }; diff --git a/nixos/modules/services/monitoring/grafana-image-renderer.nix b/nixos/modules/services/monitoring/grafana-image-renderer.nix index 97488f2653a5..4820b1946987 100644 --- a/nixos/modules/services/monitoring/grafana-image-renderer.nix +++ b/nixos/modules/services/monitoring/grafana-image-renderer.nix @@ -92,7 +92,7 @@ in { description = '' Configuration attributes for grafana-image-renderer. - See + See for supported values. ''; }; diff --git a/nixos/modules/services/monitoring/graphite.nix b/nixos/modules/services/monitoring/graphite.nix index 73b509202df6..0905b4b57fb9 100644 --- a/nixos/modules/services/monitoring/graphite.nix +++ b/nixos/modules/services/monitoring/graphite.nix @@ -253,7 +253,7 @@ in { default = {}; description = '' Extra seyren configuration. See - + ''; type = types.attrsOf types.str; example = literalExpression '' diff --git a/nixos/modules/services/monitoring/munin.nix b/nixos/modules/services/monitoring/munin.nix index c77ae7b3b6eb..3455d0d3d4a6 100644 --- a/nixos/modules/services/monitoring/munin.nix +++ b/nixos/modules/services/monitoring/munin.nix @@ -142,7 +142,7 @@ in Enable Munin Node agent. Munin node listens on 0.0.0.0 and by default accepts connections only from 127.0.0.1 for security reasons. - See . + See . ''; }; @@ -151,7 +151,7 @@ in type = types.lines; description = '' munin-node.conf extra configuration. See - + ''; }; @@ -160,7 +160,7 @@ in type = types.lines; description = '' plugin-conf.d extra plugin configuration. See - + ''; example = '' [fail2ban_*] @@ -268,9 +268,9 @@ in type = types.lines; description = '' munin.conf extra global configuration. - See . + See . Useful to setup notifications, see - + ''; example = '' contact.email.command mail -s "Munin notification for ''${var:host}" someone@example.com @@ -283,7 +283,7 @@ in description = '' Definitions of hosts of nodes to collect data from. Needs at least one host for cron to succeed. See - + ''; example = literalExpression '' ''' diff --git a/nixos/modules/services/monitoring/nagios.nix b/nixos/modules/services/monitoring/nagios.nix index 69173ce4e44e..a17797f682f8 100644 --- a/nixos/modules/services/monitoring/nagios.nix +++ b/nixos/modules/services/monitoring/nagios.nix @@ -88,7 +88,7 @@ in options = { services.nagios = { - enable = mkEnableOption "Nagios to monitor your system or network."; + enable = mkEnableOption ''Nagios to monitor your system or network.''; objectDefs = mkOption { description = " diff --git a/nixos/modules/services/monitoring/parsedmarc.nix b/nixos/modules/services/monitoring/parsedmarc.nix index 736718c25359..60ebbd6f7525 100644 --- a/nixos/modules/services/monitoring/parsedmarc.nix +++ b/nixos/modules/services/monitoring/parsedmarc.nix @@ -69,14 +69,12 @@ in type = lib.types.bool; default = true; description = '' - Whether to enable and configure the geoipupdate + Whether to enable and configure the geoipupdate service to automatically fetch GeoIP databases. Not crucial, but recommended for full functionality. - To finish the setup, you need to manually set the and - + To finish the setup, you need to manually set the and + options. ''; }; @@ -101,7 +99,7 @@ in Whether the automatically provisioned Elasticsearch instance should be added as a grafana datasource. Has no effect unless - + is also enabled. ''; }; @@ -213,8 +211,7 @@ in Always handled as a secret whether the value is wrapped in a { _secret = ...; } - attrset or not (refer to for + attrset or not (refer to for details). ''; apply = x: if isAttrs x || x == null then x else { _secret = x; }; @@ -278,8 +275,7 @@ in Always handled as a secret whether the value is wrapped in a { _secret = ...; } - attrset or not (refer to for + attrset or not (refer to for details). ''; apply = x: if isAttrs x || x == null then x else { _secret = x; }; @@ -332,8 +328,7 @@ in Always handled as a secret whether the value is wrapped in a { _secret = ...; } - attrset or not (refer to for + attrset or not (refer to for details). ''; apply = x: if isAttrs x || x == null then x else { _secret = x; }; diff --git a/nixos/modules/services/monitoring/prometheus/default.nix b/nixos/modules/services/monitoring/prometheus/default.nix index db4286b66a5d..3bc61fba158f 100644 --- a/nixos/modules/services/monitoring/prometheus/default.nix +++ b/nixos/modules/services/monitoring/prometheus/default.nix @@ -379,9 +379,8 @@ let gce_sd_configs = mkOpt (types.listOf promTypes.gce_sd_config) '' List of Google Compute Engine service discovery configurations. - See the - relevant Prometheus configuration docs for more detail. + See the relevant Prometheus configuration docs + for more detail. ''; hetzner_sd_configs = mkOpt (types.listOf promTypes.hetzner_sd_config) '' @@ -807,9 +806,7 @@ let filter = mkOpt types.str '' Filter can be used optionally to filter the instance list by other criteria Syntax of this filter string is described here in the filter - query parameter section: . + query parameter section: . ''; refresh_interval = mkDefOpt types.str "60s" '' @@ -825,7 +822,7 @@ let The tag separator used to separate concatenated GCE instance network tags. See the GCP documentation on network tags for more information: - + ''; }; }; @@ -1033,13 +1030,13 @@ let auth_token = mkOpt types.str '' Optional authentication information for token-based authentication: - + It is mutually exclusive with auth_token_file and other authentication mechanisms. ''; auth_token_file = mkOpt types.str '' Optional authentication information for token-based authentication: - + It is mutually exclusive with auth_token and other authentication mechanisms. ''; }; diff --git a/nixos/modules/services/monitoring/prometheus/exporters/dovecot.nix b/nixos/modules/services/monitoring/prometheus/exporters/dovecot.nix index 092ac6fea7d7..4e7aae0b34b5 100644 --- a/nixos/modules/services/monitoring/prometheus/exporters/dovecot.nix +++ b/nixos/modules/services/monitoring/prometheus/exporters/dovecot.nix @@ -33,10 +33,10 @@ in work with this exporter: { - = true; - = "/var/run/dovecot2/old-stats"; - = [ "old_stats" ]; - = ''' + = true; + = "/var/run/dovecot2/old-stats"; + = [ "old_stats" ]; + = ''' service old-stats { unix_listener old-stats { user = dovecot-exporter diff --git a/nixos/modules/services/monitoring/prometheus/exporters/process.nix b/nixos/modules/services/monitoring/prometheus/exporters/process.nix index 1e9c402fb55b..666116991b5a 100644 --- a/nixos/modules/services/monitoring/prometheus/exporters/process.nix +++ b/nixos/modules/services/monitoring/prometheus/exporters/process.nix @@ -22,7 +22,7 @@ in All settings expressed as an Nix attrset. Check the official documentation for the corresponding YAML - settings that can all be used here: + settings that can all be used here: ''; }; }; diff --git a/nixos/modules/services/monitoring/prometheus/exporters/script.nix b/nixos/modules/services/monitoring/prometheus/exporters/script.nix index a805a0ad335d..2a43fbcab3a1 100644 --- a/nixos/modules/services/monitoring/prometheus/exporters/script.nix +++ b/nixos/modules/services/monitoring/prometheus/exporters/script.nix @@ -41,7 +41,7 @@ in All settings expressed as an Nix attrset. Check the official documentation for the corresponding YAML - settings that can all be used here: + settings that can all be used here: ''; }; }; diff --git a/nixos/modules/services/networking/bird-lg.nix b/nixos/modules/services/networking/bird-lg.nix index db4a4140dd40..9f06bfcdc51e 100644 --- a/nixos/modules/services/networking/bird-lg.nix +++ b/nixos/modules/services/networking/bird-lg.nix @@ -136,9 +136,9 @@ in extraArgs = mkOption { type = types.lines; default = ""; - description = " - Extra parameters documented here. - "; + description = '' + Extra parameters documented here. + ''; }; }; @@ -183,9 +183,9 @@ in extraArgs = mkOption { type = types.lines; default = ""; - description = " - Extra parameters documented here. - "; + description = '' + Extra parameters documented here. + ''; }; }; }; diff --git a/nixos/modules/services/networking/bird.nix b/nixos/modules/services/networking/bird.nix index b166209fa969..4a738daf9586 100644 --- a/nixos/modules/services/networking/bird.nix +++ b/nixos/modules/services/networking/bird.nix @@ -15,7 +15,7 @@ in type = types.lines; description = '' BIRD Internet Routing Daemon configuration file. - + ''; }; checkConfig = mkOption { diff --git a/nixos/modules/services/networking/coredns.nix b/nixos/modules/services/networking/coredns.nix index 9a4140e9d58a..966957f1a0f7 100644 --- a/nixos/modules/services/networking/coredns.nix +++ b/nixos/modules/services/networking/coredns.nix @@ -17,7 +17,10 @@ in { } ''; type = types.lines; - description = "Verbatim Corefile to use. See for details."; + description = '' + Verbatim Corefile to use. + See for details. + ''; }; package = mkOption { diff --git a/nixos/modules/services/networking/seafile.nix b/nixos/modules/services/networking/seafile.nix index 7cda71458dd1..d9617952ea59 100644 --- a/nixos/modules/services/networking/seafile.nix +++ b/nixos/modules/services/networking/seafile.nix @@ -133,7 +133,7 @@ in { type = types.lines; description = '' Extra config to append to `seahub_settings.py` file. - Refer to + Refer to for all available options. ''; }; diff --git a/nixos/modules/services/networking/ssh/sshd.nix b/nixos/modules/services/networking/ssh/sshd.nix index e95fe19dede3..cbc4e303b641 100644 --- a/nixos/modules/services/networking/ssh/sshd.nix +++ b/nixos/modules/services/networking/ssh/sshd.nix @@ -302,9 +302,9 @@ in Allowed key exchange algorithms Uses the lower bound recommended in both - + and - + ''; }; @@ -322,9 +322,9 @@ in Allowed ciphers Defaults to recommended settings from both - + and - + ''; }; @@ -342,9 +342,9 @@ in Allowed MACs Defaults to recommended settings from both - + and - + ''; }; diff --git a/nixos/modules/services/networking/wireguard.nix b/nixos/modules/services/networking/wireguard.nix index 412e9c921f52..994a0cf9ec1e 100644 --- a/nixos/modules/services/networking/wireguard.nix +++ b/nixos/modules/services/networking/wireguard.nix @@ -122,8 +122,7 @@ let WireGuard interface is created, and which retains the socket even if the interface is moved via . When null, the interface is created in the init namespace. - See documentation. + See documentation. ''; }; @@ -135,8 +134,7 @@ let interface is moved to. The special value init means the init namespace. When null, the interface is not moved. - See documentation. + See documentation. ''; }; }; diff --git a/nixos/modules/services/networking/wpa_supplicant.nix b/nixos/modules/services/networking/wpa_supplicant.nix index e21c25e2f78f..ac5f597b4752 100644 --- a/nixos/modules/services/networking/wpa_supplicant.nix +++ b/nixos/modules/services/networking/wpa_supplicant.nix @@ -190,7 +190,7 @@ in { description = '' Whether to allow configuring networks "imperatively" (e.g. via wpa_supplicant_gui) and declaratively via - . + . Please note that this adds a custom patch to wpa_supplicant. ''; diff --git a/nixos/modules/services/security/privacyidea.nix b/nixos/modules/services/security/privacyidea.nix index 599ade003c03..4be3a90b649f 100644 --- a/nixos/modules/services/security/privacyidea.nix +++ b/nixos/modules/services/security/privacyidea.nix @@ -78,7 +78,7 @@ in using envsubst which is helpful for specifying secrets: - { = "$SECRET"; } + { = "$SECRET"; } The environment-file can now specify the actual secret key: @@ -207,7 +207,7 @@ in description = '' Attribute-set containing the settings for privacyidea-ldap-proxy. It's possible to pass secrets using env-vars as substitutes and - use the option + use the option to inject them via envsubst. ''; }; @@ -217,7 +217,7 @@ in type = types.nullOr types.str; description = '' Environment file containing secrets to be substituted into - . + . ''; }; }; diff --git a/nixos/modules/services/security/step-ca.nix b/nixos/modules/services/security/step-ca.nix index 9b9b53f13516..1afcf659632e 100644 --- a/nixos/modules/services/security/step-ca.nix +++ b/nixos/modules/services/security/step-ca.nix @@ -36,8 +36,8 @@ in type = with lib.types; attrsOf anything; description = '' Settings that go into ca.json. See - - the step-ca manual for more information. The easiest way to + the step-ca manual + for more information. The easiest way to configure this module would be to run step ca init to generate ca.json and then import it using builtins.fromJSON. diff --git a/nixos/modules/services/security/tor.nix b/nixos/modules/services/security/tor.nix index f611fee69089..0516d207707a 100644 --- a/nixos/modules/services/security/tor.nix +++ b/nixos/modules/services/security/tor.nix @@ -287,7 +287,7 @@ in relay = { enable = mkEnableOption ''relaying of Tor traffic for others. - See + See for details. Setting this to true requires setting @@ -348,7 +348,7 @@ in See - + for more info. @@ -366,7 +366,7 @@ in Using this option will make Tor advertise your bridge to users through various mechanisms like - , though. + , though. @@ -384,7 +384,7 @@ in - See + See for more info. @@ -419,7 +419,7 @@ in - See + See for more info. diff --git a/nixos/modules/services/security/vaultwarden/default.nix b/nixos/modules/services/security/vaultwarden/default.nix index 7e5389d78f4b..1433438ba009 100644 --- a/nixos/modules/services/security/vaultwarden/default.nix +++ b/nixos/modules/services/security/vaultwarden/default.nix @@ -116,7 +116,7 @@ in { The available configuration options can be found in the environment template file. - See for how + See for how to set up access to the Admin UI to invite initial users. ''; }; diff --git a/nixos/modules/services/web-apps/hedgedoc.nix b/nixos/modules/services/web-apps/hedgedoc.nix index b8d83984ca7d..4e1a21259847 100644 --- a/nixos/modules/services/web-apps/hedgedoc.nix +++ b/nixos/modules/services/web-apps/hedgedoc.nix @@ -152,8 +152,7 @@ in ''; description = '' Specify the Content Security Policy which is passed to Helmet. - For configuration details see https://helmetjs.github.io/docs/csp/. + For configuration details see . ''; }; protocolUseSSL = mkOption { diff --git a/nixos/modules/services/web-apps/keycloak.nix b/nixos/modules/services/web-apps/keycloak.nix index de76babbaedd..110df53effda 100644 --- a/nixos/modules/services/web-apps/keycloak.nix +++ b/nixos/modules/services/web-apps/keycloak.nix @@ -215,8 +215,7 @@ in manually provisioned database; has no effect when a local database is automatically provisioned. - To use this with a local database, set to + To use this with a local database, set to false and create the database and user manually. ''; @@ -230,8 +229,7 @@ in provisioned database; has no effect when a local database is automatically provisioned. - To use this with a local database, set to + To use this with a local database, set to false and create the database and user manually. ''; @@ -329,10 +327,8 @@ in want to set this to /auth to keep compatibility with your clients. - See for more information on migrating from Wildfly - to Quarkus. + See + for more information on migrating from Wildfly to Quarkus. ''; @@ -404,9 +400,7 @@ in - See for more information. + See for more information. ''; }; }; @@ -425,8 +419,7 @@ in Configuration options corresponding to parameters set in conf/keycloak.conf. - Most available options are documented at . + Most available options are documented at . Options containing secret data should be set to an attribute set containing the attribute _secret - a diff --git a/nixos/modules/services/web-apps/mediawiki.nix b/nixos/modules/services/web-apps/mediawiki.nix index 977b6f60b230..71154555942e 100644 --- a/nixos/modules/services/web-apps/mediawiki.nix +++ b/nixos/modules/services/web-apps/mediawiki.nix @@ -280,7 +280,7 @@ in one version of MediaWiki, or have other applications that also use the database, you can give the table names a unique prefix to stop any naming conflicts or confusion. - See . + See . ''; }; diff --git a/nixos/modules/services/web-apps/nextcloud.nix b/nixos/modules/services/web-apps/nextcloud.nix index 08083b7a443f..a121401f7584 100644 --- a/nixos/modules/services/web-apps/nextcloud.nix +++ b/nixos/modules/services/web-apps/nextcloud.nix @@ -94,7 +94,7 @@ in { default = config.services.nextcloud.home; defaultText = literalExpression "config.services.nextcloud.home"; description = '' - Data storage path of nextcloud. Will be by default. + Data storage path of nextcloud. Will be by default. This folder will be populated with a config.php and data folder which contains the state of the instance (excl the database)."; ''; example = "/mnt/nextcloud-file"; @@ -105,7 +105,7 @@ in { description = '' Extra apps to install. Should be an attrSet of appid to packages generated by fetchNextcloudApp. The appid must be identical to the "id" value in the apps appinfo/info.xml. - Using this will disable the appstore to prevent Nextcloud from updating these apps (see ). + Using this will disable the appstore to prevent Nextcloud from updating these apps (see ). ''; example = literalExpression '' { @@ -128,7 +128,7 @@ in { type = types.bool; default = true; description = '' - Automatically enable the apps in every time nextcloud starts. + Automatically enable the apps in every time nextcloud starts. If set to false, apps need to be enabled in the Nextcloud user interface or with nextcloud-occ app:enable. ''; }; @@ -138,8 +138,8 @@ in { example = true; description = '' Allow the installation of apps and app updates from the store. - Enabled by default unless there are packages in . - Set to true to force enable the store even if is used. + Enabled by default unless there are packages in . + Set to true to force enable the store even if is used. Set to false to disable the installation of apps from the global appstore. App management is always enabled regardless of this setting. ''; }; @@ -467,7 +467,7 @@ in { This is used by the theming app and for generating previews of certain images (e.g. SVG and HEIF). You may want to disable it for increased security. In that case, previews will still be available for some images (e.g. JPEG and PNG). - See . + See . '' // { default = true; }; diff --git a/nixos/modules/services/web-apps/node-red.nix b/nixos/modules/services/web-apps/node-red.nix index 1b9d14ecf4ff..3e6e38c50db5 100644 --- a/nixos/modules/services/web-apps/node-red.nix +++ b/nixos/modules/services/web-apps/node-red.nix @@ -49,8 +49,7 @@ in defaultText = literalExpression ''"''${package}/lib/node_modules/node-red/settings.js"''; description = '' Path to the JavaScript configuration file. - See + See for a configuration example. ''; }; diff --git a/nixos/modules/services/web-apps/wiki-js.nix b/nixos/modules/services/web-apps/wiki-js.nix index 474fbb8f13c3..5dc0bb73259b 100644 --- a/nixos/modules/services/web-apps/wiki-js.nix +++ b/nixos/modules/services/web-apps/wiki-js.nix @@ -95,12 +95,11 @@ in { }; description = '' Settings to configure wiki-js. This directly - corresponds to the upstream - configuration options. + corresponds to the upstream configuration options. Secrets can be injected via the environment by - specifying + specifying to contain secrets and setting sensitive values to $(ENVIRONMENT_VAR) with this value defined in the environment-file. diff --git a/nixos/modules/services/web-apps/wordpress.nix b/nixos/modules/services/web-apps/wordpress.nix index 59471a739cbb..b1ae4deb2761 100644 --- a/nixos/modules/services/web-apps/wordpress.nix +++ b/nixos/modules/services/web-apps/wordpress.nix @@ -192,7 +192,7 @@ let prefix. Typically this is changed if you are installing multiple WordPress blogs in the same database. - See . + See . ''; }; @@ -246,7 +246,7 @@ let description = '' Any additional text to be appended to the wp-config.php configuration file. This is a PHP script. For configuration - settings, see . + settings, see . ''; example = '' define( 'AUTOSAVE_INTERVAL', 60 ); // Seconds diff --git a/nixos/modules/services/web-servers/apache-httpd/vhost-options.nix b/nixos/modules/services/web-servers/apache-httpd/vhost-options.nix index e743eaa6215b..559210a1418c 100644 --- a/nixos/modules/services/web-servers/apache-httpd/vhost-options.nix +++ b/nixos/modules/services/web-servers/apache-httpd/vhost-options.nix @@ -261,8 +261,7 @@ in default = ""; example = "Disallow: /foo/"; description = '' - Specification of pages to be ignored by web crawlers. See for details. + Specification of pages to be ignored by web crawlers. See for details. ''; }; @@ -280,8 +279,7 @@ in }; ''; description = '' - Declarative location config. See for details. + Declarative location config. See for details. ''; }; diff --git a/nixos/modules/services/web-servers/nginx/default.nix b/nixos/modules/services/web-servers/nginx/default.nix index 5ccbaf77481b..166f38f9ea28 100644 --- a/nixos/modules/services/web-servers/nginx/default.nix +++ b/nixos/modules/services/web-servers/nginx/default.nix @@ -504,16 +504,16 @@ in This is mutually exclusive to any other config option for nginx.conf except for - + - + - + If additional verbatim config in addition to other options is needed, - should be used instead. + should be used instead. ''; }; diff --git a/nixos/modules/services/web-servers/uwsgi.nix b/nixos/modules/services/web-servers/uwsgi.nix index c76eb795a9ed..af6c6c066124 100644 --- a/nixos/modules/services/web-servers/uwsgi.nix +++ b/nixos/modules/services/web-servers/uwsgi.nix @@ -179,8 +179,7 @@ in { When in Emperor mode, any capability to be inherited by a vassal must be specified again in the vassal configuration using cap. - See the uWSGI docs + See the uWSGI docs for more information. diff --git a/nixos/modules/system/boot/initrd-network.nix b/nixos/modules/system/boot/initrd-network.nix index 43327fdd9da4..eff125971d08 100644 --- a/nixos/modules/system/boot/initrd-network.nix +++ b/nixos/modules/system/boot/initrd-network.nix @@ -53,9 +53,8 @@ in description = '' Add network connectivity support to initrd. The network may be configured using the ip kernel parameter, - as described in the - kernel documentation. Otherwise, if + as described in the kernel documentation. + Otherwise, if is enabled, an IP address is acquired using DHCP. diff --git a/nixos/modules/system/boot/networkd.nix b/nixos/modules/system/boot/networkd.nix index b006ce77454f..1849dcfe1e1e 100644 --- a/nixos/modules/system/boot/networkd.nix +++ b/nixos/modules/system/boot/networkd.nix @@ -1170,8 +1170,7 @@ let systemd.netdev 5 for details. A detailed explanation about how VRFs work can be found in the - kernel - docs. + kernel docs. ''; }; @@ -1909,9 +1908,7 @@ in Extra command-line arguments to pass to systemd-networkd-wait-online. These also affect per-interface systemd-network-wait-online@ services. - See - systemd-networkd-wait-online.service8 - for all available options. + See systemd-networkd-wait-online.service8 for all available options. ''; type = with types; listOf str; default = []; diff --git a/nixos/modules/system/boot/systemd/logind.nix b/nixos/modules/system/boot/systemd/logind.nix index 0df03e976947..bd05c07e26f2 100644 --- a/nixos/modules/system/boot/systemd/logind.nix +++ b/nixos/modules/system/boot/systemd/logind.nix @@ -31,8 +31,7 @@ in when the user logs out. If true, the scope unit corresponding to the session and all processes inside that scope will be terminated. If false, the scope is "abandoned" (see - - systemd.scope(5)), and processes are not killed. + systemd.scope(5)), and processes are not killed. See logind.conf(5) for more details. diff --git a/nixos/modules/tasks/network-interfaces.nix b/nixos/modules/tasks/network-interfaces.nix index e6cb2daaffca..a46203532948 100644 --- a/nixos/modules/tasks/network-interfaces.nix +++ b/nixos/modules/tasks/network-interfaces.nix @@ -1292,7 +1292,7 @@ in description = '' Whether to enable IPv6 Privacy Extensions for interfaces not configured explicitly in - . + . This sets the ipv6.conf.*.use_tempaddr sysctl for all interfaces. Possible values are: