1
0
Fork 1
mirror of https://github.com/NixOS/nixpkgs.git synced 2025-06-11 02:15:21 +09:00

nixos/*: automatically convert option docs

This commit is contained in:
pennae 2022-08-15 07:16:25 +02:00 committed by pennae
parent 7e7d68a250
commit 6039648c50
89 changed files with 425 additions and 425 deletions

View file

@ -204,10 +204,10 @@ in {
admin_server = SYSLOG:NOTICE admin_server = SYSLOG:NOTICE
default = SYSLOG:NOTICE default = SYSLOG:NOTICE
''; '';
description = '' description = lib.mdDoc ''
These lines go to the end of <literal>krb5.conf</literal> verbatim. These lines go to the end of `krb5.conf` verbatim.
<literal>krb5.conf</literal> may include any of the relations that are `krb5.conf` may include any of the relations that are
valid for <literal>kdc.conf</literal> (see <literal>man kdc.conf</literal>), valid for `kdc.conf` (see `man kdc.conf`),
but it is not a recommended practice. but it is not a recommended practice.
''; '';
}; };

View file

@ -186,16 +186,16 @@ in
policy = mkOption { policy = mkOption {
default = "hard_open"; default = "hard_open";
type = types.enum [ "hard_open" "hard_init" "soft" ]; type = types.enum [ "hard_open" "hard_init" "soft" ];
description = '' description = lib.mdDoc ''
Specifies the policy to use for reconnecting to an unavailable Specifies the policy to use for reconnecting to an unavailable
LDAP server. The default is <literal>hard_open</literal>, which LDAP server. The default is `hard_open`, which
reconnects if opening the connection to the directory server reconnects if opening the connection to the directory server
failed. By contrast, <literal>hard_init</literal> reconnects if failed. By contrast, `hard_init` reconnects if
initializing the connection failed. Initializing may not initializing the connection failed. Initializing may not
actually contact the directory server, and it is possible that actually contact the directory server, and it is possible that
a malformed configuration file will trigger reconnection. If a malformed configuration file will trigger reconnection. If
<literal>soft</literal> is specified, then `soft` is specified, then
<literal>nss_ldap</literal> will return immediately on server `nss_ldap` will return immediately on server
failure. All hard reconnect policies block with exponential failure. All hard reconnect policies block with exponential
backoff before retrying. backoff before retrying.
''; '';

View file

@ -84,19 +84,19 @@ in
<programlisting>${defaultPackagesText}</programlisting> <programlisting>${defaultPackagesText}</programlisting>
''; '';
example = []; example = [];
description = '' description = lib.mdDoc ''
Set of default packages that aren't strictly necessary Set of default packages that aren't strictly necessary
for a running system, entries can be removed for a more for a running system, entries can be removed for a more
minimal NixOS installation. minimal NixOS installation.
Note: If <literal>pkgs.nano</literal> is removed from this list, Note: If `pkgs.nano` is removed from this list,
make sure another editor is installed and the make sure another editor is installed and the
<literal>EDITOR</literal> environment variable is set to it. `EDITOR` environment variable is set to it.
Environment variables can be set using Environment variables can be set using
<option>environment.variables</option>. {option}`environment.variables`.
Like with systemPackages, packages are installed to Like with systemPackages, packages are installed to
<filename>/run/current-system/sw</filename>. They are {file}`/run/current-system/sw`. They are
automatically available to all users, and are automatically available to all users, and are
automatically updated every time you rebuild the system automatically updated every time you rebuild the system
configuration. configuration.

View file

@ -40,12 +40,12 @@ in
extraPortals = mkOption { extraPortals = mkOption {
type = types.listOf types.package; type = types.listOf types.package;
default = [ ]; default = [ ];
description = '' description = lib.mdDoc ''
List of additional portals to add to path. Portals allow interaction List of additional portals to add to path. Portals allow interaction
with system, like choosing files or taking screenshots. At minimum, with system, like choosing files or taking screenshots. At minimum,
a desktop portal implementation should be listed. GNOME and KDE already a desktop portal implementation should be listed. GNOME and KDE already
adds <literal>xdg-desktop-portal-gtk</literal>; and adds `xdg-desktop-portal-gtk`; and
<literal>xdg-desktop-portal-kde</literal> respectively. On other desktop `xdg-desktop-portal-kde` respectively. On other desktop
environments you probably want to add them yourself. environments you probably want to add them yourself.
''; '';
}; };

View file

@ -29,9 +29,9 @@ in
pkgs.qtcurve pkgs.qtcurve
]; ];
''; '';
description = '' description = lib.mdDoc ''
Extra Qt styles that will be available to the Extra Qt styles that will be available to the
<literal>lxqt.xdg-desktop-portal-lxqt</literal>. `lxqt.xdg-desktop-portal-lxqt`.
''; '';
}; };
}; };

View file

@ -23,10 +23,10 @@ in
''; '';
settings = mkOption { settings = mkOption {
description = '' description = lib.mdDoc ''
Configuration for <literal>xdg-desktop-portal-wlr</literal>. Configuration for `xdg-desktop-portal-wlr`.
See <literal>xdg-desktop-portal-wlr(5)</literal> for supported See `xdg-desktop-portal-wlr(5)` for supported
values. values.
''; '';

View file

@ -103,12 +103,12 @@ in
default = "zstd"; default = "zstd";
example = "lz4"; example = "lz4";
type = with types; either (enum [ "lzo" "lz4" "zstd" ]) str; type = with types; either (enum [ "lzo" "lz4" "zstd" ]) str;
description = '' description = lib.mdDoc ''
Compression algorithm. <literal>lzo</literal> has good compression, Compression algorithm. `lzo` has good compression,
but is slow. <literal>lz4</literal> has bad compression, but is fast. but is slow. `lz4` has bad compression, but is fast.
<literal>zstd</literal> is both good compression and fast, but requires newer kernel. `zstd` is both good compression and fast, but requires newer kernel.
You can check what other algorithms are supported by your zram device with You can check what other algorithms are supported by your zram device with
<command>cat /sys/class/block/zram*/comp_algorithm</command> {command}`cat /sys/class/block/zram*/comp_algorithm`
''; '';
}; };
}; };

View file

@ -8,17 +8,17 @@ in
options.hardware.cpu.amd.sev = { options.hardware.cpu.amd.sev = {
enable = mkEnableOption "access to the AMD SEV device"; enable = mkEnableOption "access to the AMD SEV device";
user = mkOption { user = mkOption {
description = "Owner to assign to the SEV device."; description = lib.mdDoc "Owner to assign to the SEV device.";
type = types.str; type = types.str;
default = "root"; default = "root";
}; };
group = mkOption { group = mkOption {
description = "Group to assign to the SEV device."; description = lib.mdDoc "Group to assign to the SEV device.";
type = types.str; type = types.str;
default = defaultGroup; default = defaultGroup;
}; };
mode = mkOption { mode = mkOption {
description = "Mode to set for the SEV device."; description = lib.mdDoc "Mode to set for the SEV device.";
type = types.str; type = types.str;
default = "0660"; default = "0660";
}; };

View file

@ -35,14 +35,14 @@ in
options.sdImage = { options.sdImage = {
imageName = mkOption { imageName = mkOption {
default = "${config.sdImage.imageBaseName}-${config.system.nixos.label}-${pkgs.stdenv.hostPlatform.system}.img"; default = "${config.sdImage.imageBaseName}-${config.system.nixos.label}-${pkgs.stdenv.hostPlatform.system}.img";
description = '' description = lib.mdDoc ''
Name of the generated image file. Name of the generated image file.
''; '';
}; };
imageBaseName = mkOption { imageBaseName = mkOption {
default = "nixos-sd-image"; default = "nixos-sd-image";
description = '' description = lib.mdDoc ''
Prefix of the name of the generated image file. Prefix of the name of the generated image file.
''; '';
}; };
@ -50,7 +50,7 @@ in
storePaths = mkOption { storePaths = mkOption {
type = with types; listOf package; type = with types; listOf package;
example = literalExpression "[ pkgs.stdenv ]"; example = literalExpression "[ pkgs.stdenv ]";
description = '' description = lib.mdDoc ''
Derivations to be included in the Nix store in the generated SD image. Derivations to be included in the Nix store in the generated SD image.
''; '';
}; };
@ -74,7 +74,7 @@ in
firmwarePartitionID = mkOption { firmwarePartitionID = mkOption {
type = types.str; type = types.str;
default = "0x2178694e"; default = "0x2178694e";
description = '' description = lib.mdDoc ''
Volume ID for the /boot/firmware partition on the SD card. This value Volume ID for the /boot/firmware partition on the SD card. This value
must be a 32-bit hexadecimal number. must be a 32-bit hexadecimal number.
''; '';
@ -83,7 +83,7 @@ in
firmwarePartitionName = mkOption { firmwarePartitionName = mkOption {
type = types.str; type = types.str;
default = "FIRMWARE"; default = "FIRMWARE";
description = '' description = lib.mdDoc ''
Name of the filesystem which holds the boot firmware. Name of the filesystem which holds the boot firmware.
''; '';
}; };
@ -92,7 +92,7 @@ in
type = types.nullOr types.str; type = types.nullOr types.str;
default = null; default = null;
example = "14e19a7b-0ae0-484d-9d54-43bd6fdc20c7"; example = "14e19a7b-0ae0-484d-9d54-43bd6fdc20c7";
description = '' description = lib.mdDoc ''
UUID for the filesystem on the main NixOS partition on the SD card. UUID for the filesystem on the main NixOS partition on the SD card.
''; '';
}; };
@ -101,14 +101,14 @@ in
type = types.int; type = types.int;
# As of 2019-08-18 the Raspberry pi firmware + u-boot takes ~18MiB # As of 2019-08-18 the Raspberry pi firmware + u-boot takes ~18MiB
default = 30; default = 30;
description = '' description = lib.mdDoc ''
Size of the /boot/firmware partition, in megabytes. Size of the /boot/firmware partition, in megabytes.
''; '';
}; };
populateFirmwareCommands = mkOption { populateFirmwareCommands = mkOption {
example = literalExpression "'' cp \${pkgs.myBootLoader}/u-boot.bin firmware/ ''"; example = literalExpression "'' cp \${pkgs.myBootLoader}/u-boot.bin firmware/ ''";
description = '' description = lib.mdDoc ''
Shell commands to populate the ./firmware directory. Shell commands to populate the ./firmware directory.
All files in that directory are copied to the All files in that directory are copied to the
/boot/firmware partition on the SD image. /boot/firmware partition on the SD image.
@ -117,7 +117,7 @@ in
populateRootCommands = mkOption { populateRootCommands = mkOption {
example = literalExpression "''\${config.boot.loader.generic-extlinux-compatible.populateCmd} -c \${config.system.build.toplevel} -d ./files/boot''"; example = literalExpression "''\${config.boot.loader.generic-extlinux-compatible.populateCmd} -c \${config.system.build.toplevel} -d ./files/boot''";
description = '' description = lib.mdDoc ''
Shell commands to populate the ./files directory. Shell commands to populate the ./files directory.
All files in that directory are copied to the All files in that directory are copied to the
root (/) partition on the SD image. Use this to root (/) partition on the SD image. Use this to
@ -128,7 +128,7 @@ in
postBuildCommands = mkOption { postBuildCommands = mkOption {
example = literalExpression "'' dd if=\${pkgs.myBootLoader}/SPL of=$img bs=1024 seek=1 conv=notrunc ''"; example = literalExpression "'' dd if=\${pkgs.myBootLoader}/SPL of=$img bs=1024 seek=1 conv=notrunc ''";
default = ""; default = "";
description = '' description = lib.mdDoc ''
Shell commands to run after the image is built. Shell commands to run after the image is built.
Can be used for boards requiring to dd u-boot SPL before actual partitions. Can be used for boards requiring to dd u-boot SPL before actual partitions.
''; '';
@ -137,16 +137,16 @@ in
compressImage = mkOption { compressImage = mkOption {
type = types.bool; type = types.bool;
default = true; default = true;
description = '' description = lib.mdDoc ''
Whether the SD image should be compressed using Whether the SD image should be compressed using
<command>zstd</command>. {command}`zstd`.
''; '';
}; };
expandOnBoot = mkOption { expandOnBoot = mkOption {
type = types.bool; type = types.bool;
default = true; default = true;
description = '' description = lib.mdDoc ''
Whether to configure the sd image to expand it's partition on boot. Whether to configure the sd image to expand it's partition on boot.
''; '';
}; };

View file

@ -241,7 +241,7 @@ in
nixos.extraModules = mkOption { nixos.extraModules = mkOption {
type = types.listOf types.raw; type = types.listOf types.raw;
default = []; default = [];
description = '' description = lib.mdDoc ''
Modules for which to show options even when not imported. Modules for which to show options even when not imported.
''; '';
}; };

View file

@ -117,13 +117,13 @@ in
''; '';
type = pkgsType; type = pkgsType;
example = literalExpression "import <nixpkgs> {}"; example = literalExpression "import <nixpkgs> {}";
description = '' description = lib.mdDoc ''
If set, the pkgs argument to all NixOS modules is the value of If set, the pkgs argument to all NixOS modules is the value of
this option, extended with <literal>nixpkgs.overlays</literal>, if this option, extended with `nixpkgs.overlays`, if
that is also set. Either <literal>nixpkgs.crossSystem</literal> or that is also set. Either `nixpkgs.crossSystem` or
<literal>nixpkgs.localSystem</literal> will be used in an assertion `nixpkgs.localSystem` will be used in an assertion
to check that the NixOS and Nixpkgs architectures match. Any to check that the NixOS and Nixpkgs architectures match. Any
other options in <literal>nixpkgs.*</literal>, notably <literal>config</literal>, other options in `nixpkgs.*`, notably `config`,
will be ignored. will be ignored.
If unset, the pkgs argument to all NixOS modules is determined If unset, the pkgs argument to all NixOS modules is determined
@ -132,18 +132,18 @@ in
The default value imports the Nixpkgs source files The default value imports the Nixpkgs source files
relative to the location of this NixOS module, because relative to the location of this NixOS module, because
NixOS and Nixpkgs are distributed together for consistency, NixOS and Nixpkgs are distributed together for consistency,
so the <literal>nixos</literal> in the default value is in fact a so the `nixos` in the default value is in fact a
relative path. The <literal>config</literal>, <literal>overlays</literal>, relative path. The `config`, `overlays`,
<literal>localSystem</literal>, and <literal>crossSystem</literal> come `localSystem`, and `crossSystem` come
from this option's siblings. from this option's siblings.
This option can be used by applications like NixOps to increase This option can be used by applications like NixOps to increase
the performance of evaluation, or to create packages that depend the performance of evaluation, or to create packages that depend
on a container that should be built with the exact same evaluation on a container that should be built with the exact same evaluation
of Nixpkgs, for example. Applications like this should set of Nixpkgs, for example. Applications like this should set
their default value using <literal>lib.mkDefault</literal>, so their default value using `lib.mkDefault`, so
user-provided configuration can override it without using user-provided configuration can override it without using
<literal>lib</literal>. `lib`.
Note that using a distinct version of Nixpkgs with NixOS may Note that using a distinct version of Nixpkgs with NixOS may
be an unexpected source of problems. Use this option with care. be an unexpected source of problems. Use this option with care.

View file

@ -85,9 +85,9 @@ in
bindInterface = mkOption { bindInterface = mkOption {
default = true; default = true;
type = types.bool; type = types.bool;
description = '' description = lib.mdDoc ''
Binds <literal>captive-browser</literal> to the network interface declared in Binds `captive-browser` to the network interface declared in
<literal>cfg.interface</literal>. This can be used to avoid collisions `cfg.interface`. This can be used to avoid collisions
with private subnets. with private subnets.
''; '';
}; };

View file

@ -76,10 +76,10 @@ in
extraOpts = mkOption { extraOpts = mkOption {
type = types.attrs; type = types.attrs;
description = '' description = lib.mdDoc ''
Extra chromium policy options. A list of available policies Extra chromium policy options. A list of available policies
can be found in the Chrome Enterprise documentation: can be found in the Chrome Enterprise documentation:
<link xlink:href="https://cloud.google.com/docs/chrome-enterprise/policies/"/> <https://cloud.google.com/docs/chrome-enterprise/policies/>
Make sure the selected policy is supported on Linux and your browser version. Make sure the selected policy is supported on Linux and your browser version.
''; '';
default = {}; default = {};

View file

@ -8,15 +8,15 @@ with lib;
enable = mkOption { enable = mkOption {
type = types.bool; type = types.bool;
default = false; default = false;
description = '' description = lib.mdDoc ''
Whether to enable k3b, the KDE disk burning application. Whether to enable k3b, the KDE disk burning application.
Additionally to installing <literal>k3b</literal> enabling this will Additionally to installing `k3b` enabling this will
add <literal>setuid</literal> wrappers in <literal>/run/wrappers/bin</literal> add `setuid` wrappers in `/run/wrappers/bin`
for both <literal>cdrdao</literal> and <literal>cdrecord</literal>. On first for both `cdrdao` and `cdrecord`. On first
run you must manually configure the path of <literal>cdrdae</literal> and run you must manually configure the path of `cdrdae` and
<literal>cdrecord</literal> to correspond to the appropriate paths under `cdrecord` to correspond to the appropriate paths under
<literal>/run/wrappers/bin</literal> in the "Setup External Programs" menu. `/run/wrappers/bin` in the "Setup External Programs" menu.
''; '';
}; };
}; };

View file

@ -93,10 +93,10 @@ in
extraConfig = mkOption { extraConfig = mkOption {
type = types.lines; type = types.lines;
default = ""; default = "";
description = '' description = lib.mdDoc ''
Extra configuration text prepended to <filename>ssh_config</filename>. Other generated Extra configuration text prepended to {file}`ssh_config`. Other generated
options will be added after a <literal>Host *</literal> pattern. options will be added after a `Host *` pattern.
See <citerefentry><refentrytitle>ssh_config</refentrytitle><manvolnum>5</manvolnum></citerefentry> See {manpage}`ssh_config(5)`
for help. for help.
''; '';
}; };

View file

@ -95,13 +95,13 @@ let
exclude.dir /nix/store exclude.dir /nix/store
include.encrypt /home/.../* include.encrypt /home/.../*
''; '';
description = '' description = lib.mdDoc ''
<literal>include.*</literal> and `include.*` and
<literal>exclude.*</literal> directives to be `exclude.*` directives to be
used when sending files to the IBM TSM server. used when sending files to the IBM TSM server.
The lines will be written into a file that the The lines will be written into a file that the
<literal>inclexcl</literal> `inclexcl`
directive in <filename>dsm.sys</filename> points to. directive in {file}`dsm.sys` points to.
''; '';
}; };
options.extraConfig = mkOption { options.extraConfig = mkOption {

View file

@ -320,10 +320,10 @@ let
limits = mkOption { limits = mkOption {
default = []; default = [];
type = limitsType; type = limitsType;
description = '' description = lib.mdDoc ''
Attribute set describing resource limits. Defaults to the Attribute set describing resource limits. Defaults to the
value of <option>security.pam.loginLimits</option>. value of {option}`security.pam.loginLimits`.
The meaning of the values is explained in <citerefentry><refentrytitle>limits.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry>. The meaning of the values is explained in {manpage}`limits.conf(5)`.
''; '';
}; };

View file

@ -21,7 +21,7 @@ in
"hbase.cluster.distributed" = "true"; "hbase.cluster.distributed" = "true";
}; };
type = types.attrsOf types.anything; type = types.attrsOf types.anything;
description = '' description = lib.mdDoc ''
Default options for hbase-site.xml Default options for hbase-site.xml
''; '';
}; };
@ -30,9 +30,9 @@ in
type = with types; attrsOf anything; type = with types; attrsOf anything;
example = literalExpression '' example = literalExpression ''
''; '';
description = '' description = lib.mdDoc ''
Additional options and overrides for hbase-site.xml Additional options and overrides for hbase-site.xml
<link xlink:href="https://github.com/apache/hbase/blob/rel/2.4.11/hbase-common/src/main/resources/hbase-default.xml"/> <https://github.com/apache/hbase/blob/rel/2.4.11/hbase-common/src/main/resources/hbase-default.xml>
''; '';
}; };
hbaseSiteInternal = mkOption { hbaseSiteInternal = mkOption {
@ -50,11 +50,11 @@ in
type = types.package; type = types.package;
default = pkgs.hbase; default = pkgs.hbase;
defaultText = literalExpression "pkgs.hbase"; defaultText = literalExpression "pkgs.hbase";
description = "HBase package"; description = lib.mdDoc "HBase package";
}; };
rootdir = mkOption { rootdir = mkOption {
description = '' description = lib.mdDoc ''
This option will set "hbase.rootdir" in hbase-site.xml and determine This option will set "hbase.rootdir" in hbase-site.xml and determine
the directory shared by region servers and into which HBase persists. the directory shared by region servers and into which HBase persists.
The URL should be 'fully-qualified' to include the filesystem scheme. The URL should be 'fully-qualified' to include the filesystem scheme.
@ -68,7 +68,7 @@ in
default = "/hbase"; default = "/hbase";
}; };
zookeeperQuorum = mkOption { zookeeperQuorum = mkOption {
description = '' description = lib.mdDoc ''
This option will set "hbase.zookeeper.quorum" in hbase-site.xml. This option will set "hbase.zookeeper.quorum" in hbase-site.xml.
Comma separated list of servers in the ZooKeeper ensemble. Comma separated list of servers in the ZooKeeper ensemble.
''; '';
@ -83,7 +83,7 @@ in
openFirewall = mkOption { openFirewall = mkOption {
type = types.bool; type = types.bool;
default = false; default = false;
description = '' description = lib.mdDoc ''
Open firewall ports for HBase master. Open firewall ports for HBase master.
''; '';
}; };
@ -94,7 +94,7 @@ in
overrideHosts = mkOption { overrideHosts = mkOption {
type = types.bool; type = types.bool;
default = true; default = true;
description = '' description = lib.mdDoc ''
Remove /etc/hosts entries for "127.0.0.2" and "::1" defined in nixos/modules/config/networking.nix Remove /etc/hosts entries for "127.0.0.2" and "::1" defined in nixos/modules/config/networking.nix
Regionservers must be able to resolve their hostnames to their IP addresses, through PTR records Regionservers must be able to resolve their hostnames to their IP addresses, through PTR records
or /etc/hosts entries. or /etc/hosts entries.
@ -105,7 +105,7 @@ in
openFirewall = mkOption { openFirewall = mkOption {
type = types.bool; type = types.bool;
default = false; default = false;
description = '' description = lib.mdDoc ''
Open firewall ports for HBase master. Open firewall ports for HBase master.
''; '';
}; };

View file

@ -121,7 +121,7 @@ in {
keepalive = mkOption { keepalive = mkOption {
default = 600; default = 600;
type = types.int; type = types.int;
description = '' description = lib.mdDoc ''
This is a number that indicates how frequently keepalive messages should be sent This is a number that indicates how frequently keepalive messages should be sent
from the worker to the buildmaster, expressed in seconds. from the worker to the buildmaster, expressed in seconds.
''; '';

View file

@ -103,15 +103,15 @@ let
defaultText = literalExpression ''baseDirectory + "/secrets"''; defaultText = literalExpression ''baseDirectory + "/secrets"'';
}; };
clusterJoinTokenPath = mkOption { clusterJoinTokenPath = mkOption {
description = '' description = lib.mdDoc ''
Location of the cluster-join-token.key file. Location of the cluster-join-token.key file.
You can retrieve the contents of the file when creating a new agent via You can retrieve the contents of the file when creating a new agent via
<link xlink:href="https://hercules-ci.com/dashboard"/>. <https://hercules-ci.com/dashboard>.
As this value is confidential, it should not be in the store, but As this value is confidential, it should not be in the store, but
installed using other means, such as agenix, NixOps installed using other means, such as agenix, NixOps
<literal>deployment.keys</literal>, or manual installation. `deployment.keys`, or manual installation.
The contents of the file are used for authentication between the agent and the API. The contents of the file are used for authentication between the agent and the API.
''; '';
@ -120,28 +120,28 @@ let
defaultText = literalExpression ''staticSecretsDirectory + "/cluster-join-token.key"''; defaultText = literalExpression ''staticSecretsDirectory + "/cluster-join-token.key"'';
}; };
binaryCachesPath = mkOption { binaryCachesPath = mkOption {
description = '' description = lib.mdDoc ''
Path to a JSON file containing binary cache secret keys. Path to a JSON file containing binary cache secret keys.
As these values are confidential, they should not be in the store, but As these values are confidential, they should not be in the store, but
copied over using other means, such as agenix, NixOps copied over using other means, such as agenix, NixOps
<literal>deployment.keys</literal>, or manual installation. `deployment.keys`, or manual installation.
The format is described on <link xlink:href="https://docs.hercules-ci.com/hercules-ci-agent/binary-caches-json/"/>. The format is described on <https://docs.hercules-ci.com/hercules-ci-agent/binary-caches-json/>.
''; '';
type = types.path; type = types.path;
default = config.staticSecretsDirectory + "/binary-caches.json"; default = config.staticSecretsDirectory + "/binary-caches.json";
defaultText = literalExpression ''staticSecretsDirectory + "/binary-caches.json"''; defaultText = literalExpression ''staticSecretsDirectory + "/binary-caches.json"'';
}; };
secretsJsonPath = mkOption { secretsJsonPath = mkOption {
description = '' description = lib.mdDoc ''
Path to a JSON file containing secrets for effects. Path to a JSON file containing secrets for effects.
As these values are confidential, they should not be in the store, but As these values are confidential, they should not be in the store, but
copied over using other means, such as agenix, NixOps copied over using other means, such as agenix, NixOps
<literal>deployment.keys</literal>, or manual installation. `deployment.keys`, or manual installation.
The format is described on <link xlink:href="https://docs.hercules-ci.com/hercules-ci-agent/secrets-json/"/>. The format is described on <https://docs.hercules-ci.com/hercules-ci-agent/secrets-json/>.
''; '';
type = types.path; type = types.path;
default = config.staticSecretsDirectory + "/secrets.json"; default = config.staticSecretsDirectory + "/secrets.json";

View file

@ -115,8 +115,8 @@ in
type = types.str; type = types.str;
default = "*"; default = "*";
example = "localhost"; example = "localhost";
description = '' description = lib.mdDoc ''
The hostname or address to listen on or <literal>*</literal> to listen The hostname or address to listen on or `*` to listen
on all interfaces. on all interfaces.
''; '';
}; };

View file

@ -97,9 +97,9 @@ in
openFirewall = mkOption { openFirewall = mkOption {
type = types.bool; type = types.bool;
default = false; default = false;
description = '' description = lib.mdDoc ''
Open the firewall ports corresponding to FoundationDB processes and coordinators Open the firewall ports corresponding to FoundationDB processes and coordinators
using <option>config.networking.firewall.*</option>. using {option}`config.networking.firewall.*`.
''; '';
}; };

View file

@ -35,7 +35,7 @@ in
default = pkgs.mongodb; default = pkgs.mongodb;
defaultText = literalExpression "pkgs.mongodb"; defaultText = literalExpression "pkgs.mongodb";
type = types.package; type = types.package;
description = '' description = lib.mdDoc ''
Which MongoDB derivation to use. Which MongoDB derivation to use.
''; '';
}; };

View file

@ -36,7 +36,7 @@ in
package = mkOption { package = mkOption {
type = types.package; type = types.package;
example = literalExpression "pkgs.mariadb"; example = literalExpression "pkgs.mariadb";
description = '' description = lib.mdDoc ''
Which MySQL derivation to use. MariaDB packages are supported too. Which MySQL derivation to use. MariaDB packages are supported too.
''; '';
}; };

View file

@ -79,15 +79,15 @@ in
authentication = mkOption { authentication = mkOption {
type = types.lines; type = types.lines;
default = ""; default = "";
description = '' description = lib.mdDoc ''
Defines how users authenticate themselves to the server. See the Defines how users authenticate themselves to the server. See the
<link xlink:href="https://www.postgresql.org/docs/current/auth-pg-hba-conf.html">PostgreSQL documentation for pg_hba.conf</link> [PostgreSQL documentation for pg_hba.conf](https://www.postgresql.org/docs/current/auth-pg-hba-conf.html)
for details on the expected format of this option. By default, for details on the expected format of this option. By default,
peer based authentication will be used for users connecting peer based authentication will be used for users connecting
via the Unix socket, and md5 password authentication will be via the Unix socket, and md5 password authentication will be
used for users connecting via TCP. Any added rules will be used for users connecting via TCP. Any added rules will be
inserted above the default rules. If you'd like to replace the inserted above the default rules. If you'd like to replace the
default rules entirely, you can use <literal>lib.mkForce</literal> in your default rules entirely, you can use `lib.mkForce` in your
module. module.
''; '';
}; };

View file

@ -149,7 +149,7 @@ in {
}; };
} }
''; '';
description = '' description = lib.mdDoc ''
Declarative kernel config. Declarative kernel config.
Kernels can be declared in any language that supports and has the required Kernels can be declared in any language that supports and has the required

View file

@ -81,11 +81,11 @@ in
settings = mkOption { settings = mkOption {
type = format.type; type = format.type;
description = '' description = lib.mdDoc ''
The ASF.json file, all the options are documented <link xlink:href="https://github.com/JustArchiNET/ArchiSteamFarm/wiki/Configuration#global-config">here</link>. The ASF.json file, all the options are documented [here](https://github.com/JustArchiNET/ArchiSteamFarm/wiki/Configuration#global-config).
Do note that <literal>AutoRestart</literal> and <literal>UpdateChannel</literal> is always to <literal>false</literal> respectively <literal>0</literal> because NixOS takes care of updating everything. Do note that `AutoRestart` and `UpdateChannel` is always to `false` respectively `0` because NixOS takes care of updating everything.
<literal>Headless</literal> is also always set to <literal>true</literal> because there is no way to provide inputs via a systemd service. `Headless` is also always set to `true` because there is no way to provide inputs via a systemd service.
You should try to keep ASF up to date since upstream does not provide support for anything but the latest version and you're exposing yourself to all kinds of issues - as is outlined <link xlink:href="https://github.com/JustArchiNET/ArchiSteamFarm/wiki/Configuration#updateperiod">here</link>. You should try to keep ASF up to date since upstream does not provide support for anything but the latest version and you're exposing yourself to all kinds of issues - as is outlined [here](https://github.com/JustArchiNET/ArchiSteamFarm/wiki/Configuration#updateperiod).
''; '';
example = { example = {
Statistics = false; Statistics = false;

View file

@ -126,10 +126,10 @@ in {
psycopg2 psycopg2
]; ];
''; '';
description = '' description = lib.mdDoc ''
List of packages to add to propagatedBuildInputs. List of packages to add to propagatedBuildInputs.
A popular example is <literal>python3Packages.psycopg2</literal> A popular example is `python3Packages.psycopg2`
for PostgreSQL support in the recorder component. for PostgreSQL support in the recorder component.
''; '';
}; };

View file

@ -355,7 +355,7 @@ in
setgidGroup = mkOption { setgidGroup = mkOption {
type = types.str; type = types.str;
default = "postdrop"; default = "postdrop";
description = '' description = lib.mdDoc ''
How to call postfix setgid group (for postdrop). Should How to call postfix setgid group (for postdrop). Should
be uniquely used group. be uniquely used group.
''; '';
@ -365,7 +365,7 @@ in
type = types.nullOr (types.listOf types.str); type = types.nullOr (types.listOf types.str);
default = null; default = null;
example = ["192.168.0.1/24"]; example = ["192.168.0.1/24"];
description = '' description = lib.mdDoc ''
Net masks for trusted - allowed to relay mail to third parties - Net masks for trusted - allowed to relay mail to third parties -
hosts. Leave empty to use mynetworks_style configuration or use hosts. Leave empty to use mynetworks_style configuration or use
default (localhost-only). default (localhost-only).
@ -375,7 +375,7 @@ in
networksStyle = mkOption { networksStyle = mkOption {
type = types.str; type = types.str;
default = ""; default = "";
description = '' description = lib.mdDoc ''
Name of standard way of trusted network specification to use, Name of standard way of trusted network specification to use,
leave blank if you specify it explicitly or if you want to use leave blank if you specify it explicitly or if you want to use
default (localhost-only). default (localhost-only).
@ -385,7 +385,7 @@ in
hostname = mkOption { hostname = mkOption {
type = types.str; type = types.str;
default = ""; default = "";
description = '' description = lib.mdDoc ''
Hostname to use. Leave blank to use just the hostname of machine. Hostname to use. Leave blank to use just the hostname of machine.
It should be FQDN. It should be FQDN.
''; '';
@ -394,7 +394,7 @@ in
domain = mkOption { domain = mkOption {
type = types.str; type = types.str;
default = ""; default = "";
description = '' description = lib.mdDoc ''
Domain to use. Leave blank to use hostname minus first component. Domain to use. Leave blank to use hostname minus first component.
''; '';
}; };
@ -402,7 +402,7 @@ in
origin = mkOption { origin = mkOption {
type = types.str; type = types.str;
default = ""; default = "";
description = '' description = lib.mdDoc ''
Origin to use in outgoing e-mail. Leave blank to use hostname. Origin to use in outgoing e-mail. Leave blank to use hostname.
''; '';
}; };
@ -411,7 +411,7 @@ in
type = types.nullOr (types.listOf types.str); type = types.nullOr (types.listOf types.str);
default = null; default = null;
example = ["localhost"]; example = ["localhost"];
description = '' description = lib.mdDoc ''
Full (!) list of domains we deliver locally. Leave blank for Full (!) list of domains we deliver locally. Leave blank for
acceptable Postfix default. acceptable Postfix default.
''; '';
@ -421,7 +421,7 @@ in
type = types.nullOr (types.listOf types.str); type = types.nullOr (types.listOf types.str);
default = null; default = null;
example = ["localdomain"]; example = ["localdomain"];
description = '' description = lib.mdDoc ''
List of domains we agree to relay to. Default is empty. List of domains we agree to relay to. Default is empty.
''; '';
}; };
@ -429,7 +429,7 @@ in
relayHost = mkOption { relayHost = mkOption {
type = types.str; type = types.str;
default = ""; default = "";
description = '' description = lib.mdDoc ''
Mail relay for outbound mail. Mail relay for outbound mail.
''; '';
}; };
@ -437,7 +437,7 @@ in
relayPort = mkOption { relayPort = mkOption {
type = types.int; type = types.int;
default = 25; default = 25;
description = '' description = lib.mdDoc ''
SMTP port for relay mail relay. SMTP port for relay mail relay.
''; '';
}; };
@ -445,7 +445,7 @@ in
lookupMX = mkOption { lookupMX = mkOption {
type = types.bool; type = types.bool;
default = false; default = false;
description = '' description = lib.mdDoc ''
Whether relay specified is just domain whose MX must be used. Whether relay specified is just domain whose MX must be used.
''; '';
}; };
@ -453,7 +453,7 @@ in
postmasterAlias = mkOption { postmasterAlias = mkOption {
type = types.str; type = types.str;
default = "root"; default = "root";
description = '' description = lib.mdDoc ''
Who should receive postmaster e-mail. Multiple values can be added by Who should receive postmaster e-mail. Multiple values can be added by
separating values with comma. separating values with comma.
''; '';
@ -462,7 +462,7 @@ in
rootAlias = mkOption { rootAlias = mkOption {
type = types.str; type = types.str;
default = ""; default = "";
description = '' description = lib.mdDoc ''
Who should receive root e-mail. Blank for no redirection. Who should receive root e-mail. Blank for no redirection.
Multiple values can be added by separating values with comma. Multiple values can be added by separating values with comma.
''; '';
@ -471,7 +471,7 @@ in
extraAliases = mkOption { extraAliases = mkOption {
type = types.lines; type = types.lines;
default = ""; default = "";
description = '' description = lib.mdDoc ''
Additional entries to put verbatim into aliases file, cf. man-page aliases(8). Additional entries to put verbatim into aliases file, cf. man-page aliases(8).
''; '';
}; };
@ -497,7 +497,7 @@ in
extraConfig = mkOption { extraConfig = mkOption {
type = types.lines; type = types.lines;
default = ""; default = "";
description = '' description = lib.mdDoc ''
Extra lines to be added verbatim to the main.cf configuration file. Extra lines to be added verbatim to the main.cf configuration file.
''; '';
}; };
@ -527,7 +527,7 @@ in
type = types.str; type = types.str;
default = ""; default = "";
example = "+"; example = "+";
description = '' description = lib.mdDoc ''
Delimiter for address extension: so mail to user+test can be handled by ~user/.forward+test Delimiter for address extension: so mail to user+test can be handled by ~user/.forward+test
''; '';
}; };
@ -543,7 +543,7 @@ in
virtual = mkOption { virtual = mkOption {
type = types.lines; type = types.lines;
default = ""; default = "";
description = '' description = lib.mdDoc ''
Entries for the virtual alias map, cf. man-page virtual(5). Entries for the virtual alias map, cf. man-page virtual(5).
''; '';
}; };
@ -572,7 +572,7 @@ in
transport = mkOption { transport = mkOption {
default = ""; default = "";
type = types.lines; type = types.lines;
description = '' description = lib.mdDoc ''
Entries for the transport map, cf. man-page transport(8). Entries for the transport map, cf. man-page transport(8).
''; '';
}; };

View file

@ -26,24 +26,24 @@ in
type = lib.types.nullOr lib.types.path; type = lib.types.nullOr lib.types.path;
example = "/var/lib/dendrite/server.cert"; example = "/var/lib/dendrite/server.cert";
default = null; default = null;
description = '' description = lib.mdDoc ''
The path to the TLS certificate. The path to the TLS certificate.
<programlisting> ```
nix-shell -p dendrite --command "generate-keys --tls-cert server.crt --tls-key server.key" nix-shell -p dendrite --command "generate-keys --tls-cert server.crt --tls-key server.key"
</programlisting> ```
''; '';
}; };
tlsKey = lib.mkOption { tlsKey = lib.mkOption {
type = lib.types.nullOr lib.types.path; type = lib.types.nullOr lib.types.path;
example = "/var/lib/dendrite/server.key"; example = "/var/lib/dendrite/server.key";
default = null; default = null;
description = '' description = lib.mdDoc ''
The path to the TLS key. The path to the TLS key.
<programlisting> ```
nix-shell -p dendrite --command "generate-keys --tls-cert server.crt --tls-key server.key" nix-shell -p dendrite --command "generate-keys --tls-cert server.crt --tls-key server.key"
</programlisting> ```
''; '';
}; };
environmentFile = lib.mkOption { environmentFile = lib.mkOption {
@ -102,13 +102,13 @@ in
lib.types.path lib.types.path
(lib.types.strMatching "^\\$CREDENTIALS_DIRECTORY/.+"); (lib.types.strMatching "^\\$CREDENTIALS_DIRECTORY/.+");
example = "$CREDENTIALS_DIRECTORY/private_key"; example = "$CREDENTIALS_DIRECTORY/private_key";
description = '' description = lib.mdDoc ''
The path to the signing private key file, used to sign The path to the signing private key file, used to sign
requests and events. requests and events.
<programlisting> ```
nix-shell -p dendrite --command "generate-keys --private-key matrix_key.pem" nix-shell -p dendrite --command "generate-keys --private-key matrix_key.pem"
</programlisting> ```
''; '';
}; };
trusted_third_party_id_servers = lib.mkOption { trusted_third_party_id_servers = lib.mkOption {

View file

@ -133,10 +133,10 @@ in
}; };
}; };
default = {}; default = {};
description = '' description = lib.mdDoc ''
Configuration for <literal>etebase-server</literal>. Refer to Configuration for `etebase-server`. Refer to
<link xlink:href="https://github.com/etesync/server/blob/master/etebase-server.ini.example"/> <https://github.com/etesync/server/blob/master/etebase-server.ini.example>
and <link xlink:href="https://github.com/etesync/server/wiki"/> and <https://github.com/etesync/server/wiki>
for details on supported values. for details on supported values.
''; '';
example = { example = {

View file

@ -71,7 +71,7 @@ in
enable = mkOption { enable = mkOption {
type = types.bool; type = types.bool;
default = false; default = false;
description = '' description = lib.mdDoc ''
Whether to enable the exhibitor server. Whether to enable the exhibitor server.
''; '';
}; };

View file

@ -22,11 +22,11 @@ in {
enableReload = mkOption { enableReload = mkOption {
default = false; default = false;
type = types.bool; type = types.bool;
description = '' description = lib.mdDoc ''
Issue the <literal>reloadxml</literal> command to FreeSWITCH when configuration directory changes (instead of restart). Issue the `reloadxml` command to FreeSWITCH when configuration directory changes (instead of restart).
See <link xlink:href="https://freeswitch.org/confluence/display/FREESWITCH/Reloading">FreeSWITCH documentation</link> for more info. See [FreeSWITCH documentation](https://freeswitch.org/confluence/display/FREESWITCH/Reloading) for more info.
The configuration directory is exposed at <filename>/etc/freeswitch</filename>. The configuration directory is exposed at {file}`/etc/freeswitch`.
See also <literal>systemd.services.*.restartIfChanged</literal>. See also `systemd.services.*.restartIfChanged`.
''; '';
}; };
configTemplate = mkOption { configTemplate = mkOption {

View file

@ -35,20 +35,20 @@ in
ProxyUserPassword = { _secret = "/run/keys/proxy_pass"; }; ProxyUserPassword = { _secret = "/run/keys/proxy_pass"; };
} }
''; '';
description = '' description = lib.mdDoc ''
geoipupdate configuration options. See geoipupdate configuration options. See
<link xlink:href="https://github.com/maxmind/geoipupdate/blob/main/doc/GeoIP.conf.md"/> <https://github.com/maxmind/geoipupdate/blob/main/doc/GeoIP.conf.md>
for a full list of available options. for a full list of available options.
Settings containing secret data should be set to an Settings containing secret data should be set to an
attribute set containing the attribute attribute set containing the attribute
<literal>_secret</literal> - a string pointing to a file `_secret` - a string pointing to a file
containing the value the option should be set to. See the containing the value the option should be set to. See the
example to get a better picture of this: in the resulting example to get a better picture of this: in the resulting
<filename>GeoIP.conf</filename> file, the {file}`GeoIP.conf` file, the
<literal>ProxyUserPassword</literal> key will be set to the `ProxyUserPassword` key will be set to the
contents of the contents of the
<filename>/run/keys/proxy_pass</filename> file. {file}`/run/keys/proxy_pass` file.
''; '';
type = lib.types.submodule { type = lib.types.submodule {
freeformType = freeformType =
@ -83,12 +83,12 @@ in
LicenseKey = lib.mkOption { LicenseKey = lib.mkOption {
type = with lib.types; either path (attrsOf path); type = with lib.types; either path (attrsOf path);
description = '' description = lib.mdDoc ''
A file containing the MaxMind license key. A file containing the MaxMind license key.
Always handled as a secret whether the value is Always handled as a secret whether the value is
wrapped in a <literal>{ _secret = ...; }</literal> wrapped in a `{ _secret = ...; }`
attrset or not (refer to <xref linkend="opt-services.geoipupdate.settings"/> for attrset or not (refer to [](#opt-services.geoipupdate.settings) for
details). details).
''; '';
apply = x: if isAttrs x then x else { _secret = x; }; apply = x: if isAttrs x then x else { _secret = x; };

View file

@ -293,12 +293,12 @@ in
default = "${cfg.stateDir}/log"; default = "${cfg.stateDir}/log";
defaultText = literalExpression ''"''${config.${opt.stateDir}}/log"''; defaultText = literalExpression ''"''${config.${opt.stateDir}}/log"'';
type = types.str; type = types.str;
description = "Root path for log files."; description = lib.mdDoc "Root path for log files.";
}; };
LEVEL = mkOption { LEVEL = mkOption {
default = "Info"; default = "Info";
type = types.enum [ "Trace" "Debug" "Info" "Warn" "Error" "Critical" ]; type = types.enum [ "Trace" "Debug" "Info" "Warn" "Error" "Critical" ];
description = "General log level."; description = lib.mdDoc "General log level.";
}; };
}; };
@ -306,14 +306,14 @@ in
DISABLE_SSH = mkOption { DISABLE_SSH = mkOption {
type = types.bool; type = types.bool;
default = false; default = false;
description = "Disable external SSH feature."; description = lib.mdDoc "Disable external SSH feature.";
}; };
SSH_PORT = mkOption { SSH_PORT = mkOption {
type = types.int; type = types.int;
default = 22; default = 22;
example = 2222; example = 2222;
description = '' description = lib.mdDoc ''
SSH port displayed in clone URL. SSH port displayed in clone URL.
The option is required to configure a service when the external visible port The option is required to configure a service when the external visible port
differs from the local listening port i.e. if port forwarding is used. differs from the local listening port i.e. if port forwarding is used.
@ -339,7 +339,7 @@ in
COOKIE_SECURE = mkOption { COOKIE_SECURE = mkOption {
type = types.bool; type = types.bool;
default = false; default = false;
description = '' description = lib.mdDoc ''
Marks session cookies as "secure" as a hint for browsers to only send Marks session cookies as "secure" as a hint for browsers to only send
them via HTTPS. This option is recommend, if gitea is being served over HTTPS. them via HTTPS. This option is recommend, if gitea is being served over HTTPS.
''; '';

View file

@ -338,9 +338,9 @@ in {
default = 0; default = 0;
example = 48; example = 48;
apply = x: x * 60 * 60; apply = x: x * 60 * 60;
description = '' description = lib.mdDoc ''
How long to keep the backups around, in How long to keep the backups around, in
hours. <literal>0</literal> means keep forever. hours. `0` means keep forever.
''; '';
}; };
@ -414,7 +414,7 @@ in {
databaseHost = mkOption { databaseHost = mkOption {
type = types.str; type = types.str;
default = ""; default = "";
description = '' description = lib.mdDoc ''
GitLab database hostname. An empty string means GitLab database hostname. An empty string means
use local unix socket connection. use local unix socket connection.
''; '';

View file

@ -14,11 +14,11 @@ in
enable = mkOption { enable = mkOption {
type = types.bool; type = types.bool;
default = false; default = false;
description = '' description = lib.mdDoc ''
Enable gitolite management under the Enable gitolite management under the
<literal>gitolite</literal> user. After `gitolite` user. After
switching to a configuration with Gitolite enabled, you can switching to a configuration with Gitolite enabled, you can
then run <literal>git clone gitolite@host:gitolite-admin.git</literal> to manage it further. then run `git clone gitolite@host:gitolite-admin.git` to manage it further.
''; '';
}; };
@ -71,25 +71,25 @@ in
@{$RC{ENABLE}} = grep { $_ ne 'desc' } @{$RC{ENABLE}}; # disable the command/feature @{$RC{ENABLE}} = grep { $_ ne 'desc' } @{$RC{ENABLE}}; # disable the command/feature
''' '''
''; '';
description = '' description = lib.mdDoc ''
Extra configuration to append to the default <literal>~/.gitolite.rc</literal>. Extra configuration to append to the default `~/.gitolite.rc`.
This should be Perl code that modifies the <literal>%RC</literal> This should be Perl code that modifies the `%RC`
configuration variable. The default <literal>~/.gitolite.rc</literal> configuration variable. The default `~/.gitolite.rc`
content is generated by invoking <literal>gitolite print-default-rc</literal>, content is generated by invoking `gitolite print-default-rc`,
and extra configuration from this option is appended to it. The result and extra configuration from this option is appended to it. The result
is placed to Nix store, and the <literal>~/.gitolite.rc</literal> file is placed to Nix store, and the `~/.gitolite.rc` file
becomes a symlink to it. becomes a symlink to it.
If you already have a customized (or otherwise changed) If you already have a customized (or otherwise changed)
<literal>~/.gitolite.rc</literal> file, NixOS will refuse to replace `~/.gitolite.rc` file, NixOS will refuse to replace
it with a symlink, and the <literal>gitolite-init</literal> initialization service it with a symlink, and the `gitolite-init` initialization service
will fail. In this situation, in order to use this option, you will fail. In this situation, in order to use this option, you
will need to take any customizations you may have in will need to take any customizations you may have in
<literal>~/.gitolite.rc</literal>, convert them to appropriate Perl `~/.gitolite.rc`, convert them to appropriate Perl
statements, add them to this option, and remove the file. statements, add them to this option, and remove the file.
See also the <literal>enableGitAnnex</literal> option. See also the `enableGitAnnex` option.
''; '';
}; };

View file

@ -562,13 +562,13 @@ in
trusted-public-keys = mkOption { trusted-public-keys = mkOption {
type = types.listOf types.str; type = types.listOf types.str;
example = [ "hydra.nixos.org-1:CNHJZBh9K4tP3EKF6FkkgeVYsS3ohTl+oS0Qa8bezVs=" ]; example = [ "hydra.nixos.org-1:CNHJZBh9K4tP3EKF6FkkgeVYsS3ohTl+oS0Qa8bezVs=" ];
description = '' description = lib.mdDoc ''
List of public keys used to sign binary caches. If List of public keys used to sign binary caches. If
<option>nix.settings.trusted-public-keys</option> is enabled, {option}`nix.settings.trusted-public-keys` is enabled,
then Nix will use a binary from a binary cache if and only then Nix will use a binary from a binary cache if and only
if it is signed by <emphasis>any</emphasis> of the keys if it is signed by *any* of the keys
listed here. By default, only the key for listed here. By default, only the key for
<literal>cache.nixos.org</literal> is included. `cache.nixos.org` is included.
''; '';
}; };
@ -605,13 +605,13 @@ in
type = types.listOf types.str; type = types.listOf types.str;
default = [ "*" ]; default = [ "*" ];
example = [ "@wheel" "@builders" "alice" "bob" ]; example = [ "@wheel" "@builders" "alice" "bob" ];
description = '' description = lib.mdDoc ''
A list of names of users (separated by whitespace) that are A list of names of users (separated by whitespace) that are
allowed to connect to the Nix daemon. As with allowed to connect to the Nix daemon. As with
<option>nix.settings.trusted-users</option>, you can specify groups by {option}`nix.settings.trusted-users`, you can specify groups by
prefixing them with <literal>@</literal>. Also, you can prefixing them with `@`. Also, you can
allow all users by specifying <literal>*</literal>. The allow all users by specifying `*`. The
default is <literal>*</literal>. Note that trusted users are default is `*`. Note that trusted users are
always allowed to connect. always allowed to connect.
''; '';
}; };

View file

@ -38,8 +38,8 @@ in
}; };
settings = mkOption { settings = mkOption {
description = '' description = lib.mdDoc ''
Configuration for <literal>grafana-agent</literal>. Configuration for `grafana-agent`.
See https://grafana.com/docs/agent/latest/configuration/ See https://grafana.com/docs/agent/latest/configuration/
''; '';

View file

@ -79,8 +79,8 @@ in {
args = mkOption { args = mkOption {
type = types.listOf types.str; type = types.listOf types.str;
default = [ "--no-sandbox" ]; default = [ "--no-sandbox" ];
description = '' description = lib.mdDoc ''
List of CLI flags passed to <literal>chromium</literal>. List of CLI flags passed to `chromium`.
''; '';
}; };
}; };
@ -89,10 +89,10 @@ in {
default = {}; default = {};
description = '' description = lib.mdDoc ''
Configuration attributes for <literal>grafana-image-renderer</literal>. Configuration attributes for `grafana-image-renderer`.
See <link xlink:href="https://github.com/grafana/grafana-image-renderer/blob/ce1f81438e5f69c7fd7c73ce08bab624c4c92e25/default.json"/> See <https://github.com/grafana/grafana-image-renderer/blob/ce1f81438e5f69c7fd7c73ce08bab624c4c92e25/default.json>
for supported values. for supported values.
''; '';
}; };

View file

@ -20,11 +20,11 @@ in {
apiKeyFile = mkOption { apiKeyFile = mkOption {
type = types.path; type = types.path;
example = "/run/keys/mackerel-api-key"; example = "/run/keys/mackerel-api-key";
description = '' description = lib.mdDoc ''
Path to file containing the Mackerel API key. The file should contain a Path to file containing the Mackerel API key. The file should contain a
single line of the following form: single line of the following form:
<literal>apikey = "EXAMPLE_API_KEY"</literal> `apikey = "EXAMPLE_API_KEY"`
''; '';
}; };

View file

@ -91,7 +91,7 @@ in
enable = mkEnableOption ''<link xlink:href="http://www.nagios.org/">Nagios</link> to monitor your system or network.''; enable = mkEnableOption ''<link xlink:href="http://www.nagios.org/">Nagios</link> to monitor your system or network.'';
objectDefs = mkOption { objectDefs = mkOption {
description = '' description = lib.mdDoc ''
A list of Nagios object configuration files that must define A list of Nagios object configuration files that must define
the hosts, host groups, services and contacts for the the hosts, host groups, services and contacts for the
network that you want Nagios to monitor. network that you want Nagios to monitor.
@ -113,7 +113,7 @@ in
mainConfigFile = mkOption { mainConfigFile = mkOption {
type = types.nullOr types.package; type = types.nullOr types.package;
default = null; default = null;
description = '' description = lib.mdDoc ''
If non-null, overrides the main configuration file of Nagios. If non-null, overrides the main configuration file of Nagios.
''; '';
}; };
@ -139,7 +139,7 @@ in
type = types.package; type = types.package;
default = nagiosCGICfgFile; default = nagiosCGICfgFile;
defaultText = literalExpression "nagiosCGICfgFile"; defaultText = literalExpression "nagiosCGICfgFile";
description = '' description = lib.mdDoc ''
Derivation for the configuration file of Nagios CGI scripts Derivation for the configuration file of Nagios CGI scripts
that can be used in web servers for running the Nagios web interface. that can be used in web servers for running the Nagios web interface.
''; '';
@ -148,9 +148,9 @@ in
enableWebInterface = mkOption { enableWebInterface = mkOption {
type = types.bool; type = types.bool;
default = false; default = false;
description = '' description = lib.mdDoc ''
Whether to enable the Nagios web interface. You should also Whether to enable the Nagios web interface. You should also
enable Apache (<option>services.httpd.enable</option>). enable Apache ({option}`services.httpd.enable`).
''; '';
}; };

View file

@ -1729,15 +1729,15 @@ in
type = with types; either bool (enum [ "syntax-only" ]); type = with types; either bool (enum [ "syntax-only" ]);
default = true; default = true;
example = "syntax-only"; example = "syntax-only";
description = '' description = lib.mdDoc ''
Check configuration with <literal>promtool check</literal>. The call to <literal>promtool</literal> is Check configuration with `promtool check`. The call to `promtool` is
subject to sandboxing by Nix. subject to sandboxing by Nix.
If you use credentials stored in external files If you use credentials stored in external files
(<literal>password_file</literal>, <literal>bearer_token_file</literal>, etc), (`password_file`, `bearer_token_file`, etc),
they will not be visible to <literal>promtool</literal> they will not be visible to `promtool`
and it will report errors, despite a correct configuration. and it will report errors, despite a correct configuration.
To resolve this, you may set this option to <literal>"syntax-only"</literal> To resolve this, you may set this option to `"syntax-only"`
in order to only syntax check the Prometheus configuration. in order to only syntax check the Prometheus configuration.
''; '';
}; };

View file

@ -11,8 +11,8 @@ in {
type = types.str; type = types.str;
default = "${pkgs.knot-dns.out}/lib/libknot.so"; default = "${pkgs.knot-dns.out}/lib/libknot.so";
defaultText = literalExpression ''"''${pkgs.knot-dns.out}/lib/libknot.so"''; defaultText = literalExpression ''"''${pkgs.knot-dns.out}/lib/libknot.so"'';
description = '' description = lib.mdDoc ''
Path to the library of <literal>knot-dns</literal>. Path to the library of `knot-dns`.
''; '';
}; };

View file

@ -26,15 +26,15 @@ in {
default = "tcp"; default = "tcp";
example = "udp"; example = "udp";
type = types.str; type = types.str;
description = '' description = lib.mdDoc ''
Which protocol to use to connect against <literal>openldap</literal>. Which protocol to use to connect against `openldap`.
''; '';
}; };
ldapAddr = mkOption { ldapAddr = mkOption {
default = "localhost:389"; default = "localhost:389";
type = types.str; type = types.str;
description = '' description = lib.mdDoc ''
Address of the <literal>openldap</literal>-instance. Address of the `openldap`-instance.
''; '';
}; };
metricsPath = mkOption { metricsPath = mkOption {

View file

@ -23,7 +23,7 @@ in
enable = mkOption { enable = mkOption {
type = types.bool; type = types.bool;
default = false; default = false;
description = '' description = lib.mdDoc ''
Whether to enable Yandex-disk client. See https://disk.yandex.ru/ Whether to enable Yandex-disk client. See https://disk.yandex.ru/
''; '';
}; };

View file

@ -129,7 +129,7 @@ in
blockedNetworks = mkOption { blockedNetworks = mkOption {
default = [ ]; default = [ ];
type = types.listOf types.str; type = types.listOf types.str;
description = '' description = lib.mdDoc ''
What networks are just blocked. What networks are just blocked.
''; '';
}; };
@ -137,7 +137,7 @@ in
ipv4Only = mkOption { ipv4Only = mkOption {
default = false; default = false;
type = types.bool; type = types.bool;
description = '' description = lib.mdDoc ''
Only use ipv4, even if the host supports ipv6. Only use ipv4, even if the host supports ipv6.
''; '';
}; };
@ -146,7 +146,7 @@ in
default = config.networking.nameservers; default = config.networking.nameservers;
defaultText = literalExpression "config.networking.nameservers"; defaultText = literalExpression "config.networking.nameservers";
type = types.listOf types.str; type = types.listOf types.str;
description = '' description = lib.mdDoc ''
List of servers we should forward requests to. List of servers we should forward requests to.
''; '';
}; };
@ -154,7 +154,7 @@ in
forward = mkOption { forward = mkOption {
default = "first"; default = "first";
type = types.enum ["first" "only"]; type = types.enum ["first" "only"];
description = '' description = lib.mdDoc ''
Whether to forward 'first' (try forwarding but lookup directly if forwarding fails) or 'only'. Whether to forward 'first' (try forwarding but lookup directly if forwarding fails) or 'only'.
''; '';
}; };
@ -162,7 +162,7 @@ in
listenOn = mkOption { listenOn = mkOption {
default = [ "any" ]; default = [ "any" ];
type = types.listOf types.str; type = types.listOf types.str;
description = '' description = lib.mdDoc ''
Interfaces to listen on. Interfaces to listen on.
''; '';
}; };
@ -170,7 +170,7 @@ in
listenOnIpv6 = mkOption { listenOnIpv6 = mkOption {
default = [ "any" ]; default = [ "any" ];
type = types.listOf types.str; type = types.listOf types.str;
description = '' description = lib.mdDoc ''
Ipv6 interfaces to listen on. Ipv6 interfaces to listen on.
''; '';
}; };
@ -184,7 +184,7 @@ in
zones = mkOption { zones = mkOption {
default = [ ]; default = [ ];
type = with types; coercedTo (listOf attrs) bindZoneCoerce (attrsOf (types.submodule bindZoneOptions)); type = with types; coercedTo (listOf attrs) bindZoneCoerce (attrsOf (types.submodule bindZoneOptions));
description = '' description = lib.mdDoc ''
List of zones we claim authority over. List of zones we claim authority over.
''; '';
example = { example = {
@ -201,7 +201,7 @@ in
extraConfig = mkOption { extraConfig = mkOption {
type = types.lines; type = types.lines;
default = ""; default = "";
description = '' description = lib.mdDoc ''
Extra lines to be added verbatim to the generated named configuration file. Extra lines to be added verbatim to the generated named configuration file.
''; '';
}; };
@ -219,7 +219,7 @@ in
type = types.path; type = types.path;
default = confFile; default = confFile;
defaultText = literalExpression "confFile"; defaultText = literalExpression "confFile";
description = '' description = lib.mdDoc ''
Overridable config file to use for named. By default, that Overridable config file to use for named. By default, that
generated by nixos. generated by nixos.
''; '';

View file

@ -12,9 +12,9 @@ in {
settings = mkOption { settings = mkOption {
type = with types; attrsOf (oneOf [ int bool str ]); type = with types; attrsOf (oneOf [ int bool str ]);
default = {}; default = {};
description = '' description = lib.mdDoc ''
Configuration for <literal>create_ap</literal>. Configuration for `create_ap`.
See <link xlink:href="https://raw.githubusercontent.com/lakinduakash/linux-wifi-hotspot/master/src/scripts/create_ap.conf">upstream example configuration</link> See [upstream example configuration](https://raw.githubusercontent.com/lakinduakash/linux-wifi-hotspot/master/src/scripts/create_ap.conf)
for supported values. for supported values.
''; '';
example = { example = {

View file

@ -55,7 +55,7 @@ in
type = lib.types.package; type = lib.types.package;
default = pkgs.syncstorage-rs; default = pkgs.syncstorage-rs;
defaultText = lib.literalExpression "pkgs.syncstorage-rs"; defaultText = lib.literalExpression "pkgs.syncstorage-rs";
description = '' description = lib.mdDoc ''
Package to use. Package to use.
''; '';
}; };
@ -66,16 +66,16 @@ in
# behavior ever change. # behavior ever change.
type = lib.types.strMatching "[a-z_][a-z0-9_]*"; type = lib.types.strMatching "[a-z_][a-z0-9_]*";
default = defaultDatabase; default = defaultDatabase;
description = '' description = lib.mdDoc ''
Database to use for storage. Will be created automatically if it does not exist Database to use for storage. Will be created automatically if it does not exist
and <literal>config.${opt.database.createLocally}</literal> is set. and `config.${opt.database.createLocally}` is set.
''; '';
}; };
database.user = lib.mkOption { database.user = lib.mkOption {
type = lib.types.str; type = lib.types.str;
default = defaultUser; default = defaultUser;
description = '' description = lib.mdDoc ''
Username for database connections. Username for database connections.
''; '';
}; };
@ -83,8 +83,8 @@ in
database.host = lib.mkOption { database.host = lib.mkOption {
type = lib.types.str; type = lib.types.str;
default = "localhost"; default = "localhost";
description = '' description = lib.mdDoc ''
Database host name. <literal>localhost</literal> is treated specially and inserts Database host name. `localhost` is treated specially and inserts
systemd dependencies, other hostnames or IP addresses of the local machine do not. systemd dependencies, other hostnames or IP addresses of the local machine do not.
''; '';
}; };
@ -92,7 +92,7 @@ in
database.createLocally = lib.mkOption { database.createLocally = lib.mkOption {
type = lib.types.bool; type = lib.types.bool;
default = true; default = true;
description = '' description = lib.mdDoc ''
Whether to create database and user on the local machine if they do not exist. Whether to create database and user on the local machine if they do not exist.
This includes enabling unix domain socket authentication for the configured user. This includes enabling unix domain socket authentication for the configured user.
''; '';
@ -101,19 +101,19 @@ in
logLevel = lib.mkOption { logLevel = lib.mkOption {
type = lib.types.str; type = lib.types.str;
default = "error"; default = "error";
description = '' description = lib.mdDoc ''
Log level to run with. This can be a simple log level like <literal>error</literal> Log level to run with. This can be a simple log level like `error`
or <literal>trace</literal>, or a more complicated logging expression. or `trace`, or a more complicated logging expression.
''; '';
}; };
secrets = lib.mkOption { secrets = lib.mkOption {
type = lib.types.path; type = lib.types.path;
description = '' description = lib.mdDoc ''
A file containing the various secrets. Should be in the format expected by systemd's A file containing the various secrets. Should be in the format expected by systemd's
<literal>EnvironmentFile</literal> directory. Two secrets are currently available: `EnvironmentFile` directory. Two secrets are currently available:
<literal>SYNC_MASTER_SECRET</literal> and `SYNC_MASTER_SECRET` and
<literal>SYNC_TOKENSERVER__FXA_METRICS_HASH_SECRET</literal>. `SYNC_TOKENSERVER__FXA_METRICS_HASH_SECRET`.
''; '';
}; };
@ -126,7 +126,7 @@ in
hostname = lib.mkOption { hostname = lib.mkOption {
type = lib.types.str; type = lib.types.str;
description = '' description = lib.mdDoc ''
Host name to use for this service. Host name to use for this service.
''; '';
}; };
@ -134,7 +134,7 @@ in
capacity = lib.mkOption { capacity = lib.mkOption {
type = lib.types.ints.unsigned; type = lib.types.ints.unsigned;
default = 10; default = 10;
description = '' description = lib.mdDoc ''
How many sync accounts are allowed on this server. Setting this value How many sync accounts are allowed on this server. Setting this value
equal to or less than the number of currently active accounts will equal to or less than the number of currently active accounts will
effectively deny service to accounts not yet registered here. effectively deny service to accounts not yet registered here.
@ -147,7 +147,7 @@ in
defaultText = lib.literalExpression '' defaultText = lib.literalExpression ''
''${if cfg.singleNode.enableTLS then "https" else "http"}://''${config.${opt.singleNode.hostname}} ''${if cfg.singleNode.enableTLS then "https" else "http"}://''${config.${opt.singleNode.hostname}}
''; '';
description = '' description = lib.mdDoc ''
URL of the host. If you are not using the automatic webserver proxy setup you will have URL of the host. If you are not using the automatic webserver proxy setup you will have
to change this setting or your sync server may not be functional. to change this setting or your sync server may not be functional.
''; '';
@ -162,7 +162,7 @@ in
port = lib.mkOption { port = lib.mkOption {
type = lib.types.port; type = lib.types.port;
default = 5000; default = 5000;
description = '' description = lib.mdDoc ''
Port to bind to. Port to bind to.
''; '';
}; };
@ -170,21 +170,21 @@ in
tokenserver.enabled = lib.mkOption { tokenserver.enabled = lib.mkOption {
type = lib.types.bool; type = lib.types.bool;
default = true; default = true;
description = '' description = lib.mdDoc ''
Whether to enable the token service as well. Whether to enable the token service as well.
''; '';
}; };
}; };
}; };
default = { }; default = { };
description = '' description = lib.mdDoc ''
Settings for the sync server. These take priority over values computed Settings for the sync server. These take priority over values computed
from NixOS options. from NixOS options.
See the doc comments on the <literal>Settings</literal> structs in See the doc comments on the `Settings` structs in
<link xlink:href="https://github.com/mozilla-services/syncstorage-rs/blob/master/syncstorage/src/settings.rs" /> <https://github.com/mozilla-services/syncstorage-rs/blob/master/syncstorage/src/settings.rs>
and and
<link xlink:href="https://github.com/mozilla-services/syncstorage-rs/blob/master/syncstorage/src/tokenserver/settings.rs" /> <https://github.com/mozilla-services/syncstorage-rs/blob/master/syncstorage/src/tokenserver/settings.rs>
for available options. for available options.
''; '';
}; };

View file

@ -37,12 +37,12 @@ let
}; };
keystore = mkOption { keystore = mkOption {
description = '' description = lib.mdDoc ''
Path to keystore (combined PEM with cert/key, or PKCS12 keystore). Path to keystore (combined PEM with cert/key, or PKCS12 keystore).
NB: storepass is not supported because it would expose credentials via <literal>/proc/*/cmdline</literal>. NB: storepass is not supported because it would expose credentials via `/proc/*/cmdline`.
Specify this or <literal>cert</literal> and <literal>key</literal>. Specify this or `cert` and `key`.
''; '';
type = types.nullOr types.str; type = types.nullOr types.str;
default = null; default = null;

View file

@ -235,9 +235,9 @@ in
InternationalPrefix = "00"; InternationalPrefix = "00";
LongDistancePrefix = "0"; LongDistancePrefix = "0";
}; };
description = '' description = lib.mdDoc ''
Attribute set of default values for Attribute set of default values for
modem config files <filename>etc/config.*</filename>. modem config files {file}`etc/config.*`.
${commonDescr} ${commonDescr}
Think twice before changing Think twice before changing
paths of fax-processing scripts. paths of fax-processing scripts.

View file

@ -41,7 +41,7 @@ in
serverName = mkOption { serverName = mkOption {
default = "hades.arpa"; default = "hades.arpa";
type = types.str; type = types.str;
description = '' description = lib.mdDoc ''
IRCD server name. IRCD server name.
''; '';
}; };
@ -49,7 +49,7 @@ in
sid = mkOption { sid = mkOption {
default = "0NL"; default = "0NL";
type = types.str; type = types.str;
description = '' description = lib.mdDoc ''
IRCD server unique ID in a net of servers. IRCD server unique ID in a net of servers.
''; '';
}; };
@ -57,7 +57,7 @@ in
description = mkOption { description = mkOption {
default = "Hybrid-7 IRC server."; default = "Hybrid-7 IRC server.";
type = types.str; type = types.str;
description = '' description = lib.mdDoc ''
IRCD server description. IRCD server description.
''; '';
}; };
@ -66,7 +66,7 @@ in
default = null; default = null;
example = literalExpression "/root/certificates/irc.key"; example = literalExpression "/root/certificates/irc.key";
type = types.nullOr types.path; type = types.nullOr types.path;
description = '' description = lib.mdDoc ''
IRCD server RSA key. IRCD server RSA key.
''; '';
}; };
@ -75,7 +75,7 @@ in
default = null; default = null;
example = literalExpression "/root/certificates/irc.pem"; example = literalExpression "/root/certificates/irc.pem";
type = types.nullOr types.path; type = types.nullOr types.path;
description = '' description = lib.mdDoc ''
IRCD server SSL certificate. There are some limitations - read manual. IRCD server SSL certificate. There are some limitations - read manual.
''; '';
}; };
@ -84,7 +84,7 @@ in
default = "<bit-bucket@example.com>"; default = "<bit-bucket@example.com>";
type = types.str; type = types.str;
example = "<name@domain.tld>"; example = "<name@domain.tld>";
description = '' description = lib.mdDoc ''
IRCD server administrator e-mail. IRCD server administrator e-mail.
''; '';
}; };
@ -93,7 +93,7 @@ in
default = []; default = [];
example = ["127.0.0.1"]; example = ["127.0.0.1"];
type = types.listOf types.str; type = types.listOf types.str;
description = '' description = lib.mdDoc ''
Extra IP's to bind. Extra IP's to bind.
''; '';
}; };
@ -101,7 +101,7 @@ in
extraPort = mkOption { extraPort = mkOption {
default = "7117"; default = "7117";
type = types.str; type = types.str;
description = '' description = lib.mdDoc ''
Extra port to avoid filtering. Extra port to avoid filtering.
''; '';
}; };

View file

@ -59,7 +59,7 @@ in {
}; };
package = mkOption { package = mkOption {
type = types.package; type = types.package;
description = '' description = lib.mdDoc ''
knot-resolver package to use. knot-resolver package to use.
''; '';
default = pkgs.knot-resolver; default = pkgs.knot-resolver;

View file

@ -49,9 +49,9 @@ in {
environmentFile = mkOption { environmentFile = mkOption {
type = types.nullOr types.str; type = types.nullOr types.str;
default = null; default = null;
description = '' description = lib.mdDoc ''
Path to an environment-file which may contain secrets to be Path to an environment-file which may contain secrets to be
substituted via <literal>envsubst</literal>. substituted via `envsubst`.
''; '';
}; };

View file

@ -199,25 +199,25 @@ in
]; ];
} }
]; ];
description = '' description = lib.mdDoc ''
Shared folder list. If enabled, web UI must be Shared folder list. If enabled, web UI must be
disabled. Secrets can be generated using <literal>rslsync --generate-secret</literal>. disabled. Secrets can be generated using `rslsync --generate-secret`.
Note that this secret will be Note that this secret will be
put inside the Nix store, so it is realistically not very put inside the Nix store, so it is realistically not very
secret. secret.
If you would like to be able to modify the contents of this If you would like to be able to modify the contents of this
directories, it is recommended that you make your user a directories, it is recommended that you make your user a
member of the <literal>rslsync</literal> group. member of the `rslsync` group.
Directories in this list should be in the Directories in this list should be in the
<literal>rslsync</literal> group, and that group must have `rslsync` group, and that group must have
write access to the directory. It is also recommended that write access to the directory. It is also recommended that
<literal>chmod g+s</literal> is applied to the directory `chmod g+s` is applied to the directory
so that any sub directories created will also belong to so that any sub directories created will also belong to
the <literal>rslsync</literal> group. Also, the `rslsync` group. Also,
<literal>setfacl -d -m group:rslsync:rwx</literal> and `setfacl -d -m group:rslsync:rwx` and
<literal>setfacl -m group:rslsync:rwx</literal> should also `setfacl -m group:rslsync:rwx` should also
be applied so that the sub directories are writable by be applied so that the sub directories are writable by
the group. the group.
''; '';

View file

@ -51,12 +51,12 @@ with lib;
protocol = "freedom"; protocol = "freedom";
}]; }];
}; };
description = '' description = lib.mdDoc ''
The configuration object. The configuration object.
Either <literal>configFile</literal> or <literal>config</literal> must be specified. Either `configFile` or `config` must be specified.
See <link xlink:href="https://www.v2fly.org/en_US/config/overview.html"/>. See <https://www.v2fly.org/en_US/config/overview.html>.
''; '';
}; };
}; };

View file

@ -31,27 +31,27 @@ in {
"tcp://0.0.0.0:xxxxx" "tcp://0.0.0.0:xxxxx"
]; ];
}; };
description = '' description = lib.mdDoc ''
Configuration for yggdrasil, as a Nix attribute set. Configuration for yggdrasil, as a Nix attribute set.
Warning: this is stored in the WORLD-READABLE Nix store! Warning: this is stored in the WORLD-READABLE Nix store!
Therefore, it is not appropriate for private keys. If you Therefore, it is not appropriate for private keys. If you
wish to specify the keys, use <option>configFile</option>. wish to specify the keys, use {option}`configFile`.
If the <option>persistentKeys</option> is enabled then the If the {option}`persistentKeys` is enabled then the
keys that are generated during activation will override keys that are generated during activation will override
those in <option>config</option> or those in {option}`config` or
<option>configFile</option>. {option}`configFile`.
If no keys are specified then ephemeral keys are generated If no keys are specified then ephemeral keys are generated
and the Yggdrasil interface will have a random IPv6 address and the Yggdrasil interface will have a random IPv6 address
each time the service is started, this is the default. each time the service is started, this is the default.
If both <option>configFile</option> and <option>config</option> If both {option}`configFile` and {option}`config`
are supplied, they will be combined, with values from are supplied, they will be combined, with values from
<option>configFile</option> taking precedence. {option}`configFile` taking precedence.
You can use the command <literal>nix-shell -p yggdrasil --run "yggdrasil -genconf"</literal> You can use the command `nix-shell -p yggdrasil --run "yggdrasil -genconf"`
to generate default configuration values with documentation. to generate default configuration values with documentation.
''; '';
}; };

View file

@ -61,7 +61,7 @@ in
default = pkgs.haka; default = pkgs.haka;
defaultText = literalExpression "pkgs.haka"; defaultText = literalExpression "pkgs.haka";
type = types.package; type = types.package;
description = '' description = lib.mdDoc ''
Which Haka derivation to use. Which Haka derivation to use.
''; '';
}; };

View file

@ -160,9 +160,9 @@ in
domains = mkOption { domains = mkOption {
type = types.listOf types.str; type = types.listOf types.str;
default = []; default = [];
description = '' description = lib.mdDoc ''
Authenticate emails with the specified domains. Use Authenticate emails with the specified domains. Use
<literal>*</literal> to authenticate any email. `*` to authenticate any email.
''; '';
}; };

View file

@ -204,11 +204,11 @@ in
settings = mkOption { settings = mkOption {
type = with types; attrsOf (attrsOf (oneOf [ str bool int (listOf str) ])); type = with types; attrsOf (attrsOf (oneOf [ str bool int (listOf str) ]));
default = {}; default = {};
description = '' description = lib.mdDoc ''
Attribute-set containing the settings for <literal>privacyidea-ldap-proxy</literal>. Attribute-set containing the settings for `privacyidea-ldap-proxy`.
It's possible to pass secrets using env-vars as substitutes and It's possible to pass secrets using env-vars as substitutes and
use the option <xref linkend="opt-services.privacyidea.ldap-proxy.environmentFile"/> use the option [](#opt-services.privacyidea.ldap-proxy.environmentFile)
to inject them via <literal>envsubst</literal>. to inject them via `envsubst`.
''; '';
}; };

View file

@ -121,15 +121,15 @@ in
max_reqs_per_ip_mode = "warn+block"; max_reqs_per_ip_mode = "warn+block";
}; };
''; '';
description = '' description = lib.mdDoc ''
Additional settings to put in the Additional settings to put in the
<filename>discourse.conf</filename> file. {file}`discourse.conf` file.
Look in the Look in the
<link xlink:href="https://github.com/discourse/discourse/blob/master/config/discourse_defaults.conf">discourse_defaults.conf</link> [discourse_defaults.conf](https://github.com/discourse/discourse/blob/master/config/discourse_defaults.conf)
file in the upstream distribution to find available options. file in the upstream distribution to find available options.
Setting an option to <literal>null</literal> means Setting an option to `null` means
define variable, but leave right-hand side empty. define variable, but leave right-hand side empty.
''; '';
}; };
@ -240,8 +240,8 @@ in
host = lib.mkOption { host = lib.mkOption {
type = with lib.types; nullOr str; type = with lib.types; nullOr str;
default = null; default = null;
description = '' description = lib.mdDoc ''
Discourse database hostname. <literal>null</literal> means Discourse database hostname. `null` means
prefer local unix socket connection. prefer local unix socket connection.
''; '';
}; };
@ -493,7 +493,7 @@ in
discourse-github discourse-github
]; ];
''; '';
description = '' description = lib.mdDoc ''
Plugins to install as part of Discourse, expressed as a list of derivations. Plugins to install as part of Discourse, expressed as a list of derivations.
''; '';
}; };

View file

@ -189,9 +189,9 @@ in
allowAnonymousEdits = mkOption { allowAnonymousEdits = mkOption {
type = types.bool; type = types.bool;
default = false; default = false;
description = '' description = lib.mdDoc ''
Whether to allow guests to edit existing notes with the <literal>freely</literal> permission, Whether to allow guests to edit existing notes with the `freely` permission,
when <option>allowAnonymous</option> is enabled. when {option}`allowAnonymous` is enabled.
''; '';
}; };
allowFreeURL = mkOption { allowFreeURL = mkOption {
@ -953,10 +953,10 @@ in
email = mkOption { email = mkOption {
type = types.str; type = types.str;
default = ""; default = "";
description = '' description = lib.mdDoc ''
Attribute map for <literal>email</literal>. Attribute map for `email`.
Defaults to <literal>NameID</literal> of SAML response if Defaults to `NameID` of SAML response if
<option>identifierFormat</option> has {option}`identifierFormat` has
the default value. the default value.
''; '';
}; };

View file

@ -246,11 +246,11 @@ in
nginx.enable = lib.mkOption { nginx.enable = lib.mkOption {
type = types.bool; type = types.bool;
default = false; default = false;
description = '' description = lib.mdDoc ''
Whether to configure nginx as a reverse proxy for Invidious. Whether to configure nginx as a reverse proxy for Invidious.
It serves it under the domain specified in <option>services.invidious.settings.domain</option> with enabled TLS and ACME. It serves it under the domain specified in {option}`services.invidious.settings.domain` with enabled TLS and ACME.
Further configuration can be done through <option>services.nginx.virtualHosts.''${config.services.invidious.settings.domain}.*</option>, Further configuration can be done through {option}`services.nginx.virtualHosts.''${config.services.invidious.settings.domain}.*`,
which can also be used to disable AMCE and TLS. which can also be used to disable AMCE and TLS.
''; '';
}; };

View file

@ -20,10 +20,10 @@ in {
''; '';
settings = mkOption { settings = mkOption {
description = '' description = lib.mdDoc ''
Configuration for <literal>isso</literal>. Configuration for `isso`.
See <link xlink:href="https://posativ.org/isso/docs/configuration/server/">Isso Server Configuration</link> See [Isso Server Configuration](https://posativ.org/isso/docs/configuration/server/)
for supported values. for supported values.
''; '';

View file

@ -130,18 +130,18 @@ in {
}; };
user = lib.mkOption { user = lib.mkOption {
description = '' description = lib.mdDoc ''
User under which mastodon runs. If it is set to "mastodon", User under which mastodon runs. If it is set to "mastodon",
that user will be created, otherwise it should be set to the that user will be created, otherwise it should be set to the
name of a user created elsewhere. In both cases, name of a user created elsewhere. In both cases,
<literal>mastodon</literal> and a package containing only `mastodon` and a package containing only
the shell script <literal>mastodon-env</literal> will be added to the shell script `mastodon-env` will be added to
the user's package set. To run a command from the user's package set. To run a command from
<literal>mastodon</literal> such as <literal>tootctl</literal> `mastodon` such as `tootctl`
with the environment configured by this module use with the environment configured by this module use
<literal>mastodon-env</literal>, as in: `mastodon-env`, as in:
<literal>mastodon-env tootctl accounts create newuser --email newuser@example.com</literal> `mastodon-env tootctl accounts create newuser --email newuser@example.com`
''; '';
type = lib.types.str; type = lib.types.str;
default = "mastodon"; default = "mastodon";

View file

@ -138,7 +138,7 @@ in
createLocally = mkOption { createLocally = mkOption {
type = types.bool; type = types.bool;
default = true; default = true;
description = "Create the database and database user locally."; description = lib.mdDoc "Create the database and database user locally.";
}; };
}; };

View file

@ -569,10 +569,10 @@ in {
secretFile = mkOption { secretFile = mkOption {
type = types.nullOr types.str; type = types.nullOr types.str;
default = null; default = null;
description = '' description = lib.mdDoc ''
Secret options which will be appended to nextcloud's config.php file (written as JSON, in the same Secret options which will be appended to nextcloud's config.php file (written as JSON, in the same
form as the <xref linkend="opt-services.nextcloud.extraOptions"/> option), for example form as the [](#opt-services.nextcloud.extraOptions) option), for example
<literal>{"redis":{"password":"secret"}}</literal>. `{"redis":{"password":"secret"}}`.
''; '';
}; };

View file

@ -24,14 +24,14 @@ in
default = pkgs.pgpkeyserver-lite; default = pkgs.pgpkeyserver-lite;
defaultText = literalExpression "pkgs.pgpkeyserver-lite"; defaultText = literalExpression "pkgs.pgpkeyserver-lite";
type = types.package; type = types.package;
description = '' description = lib.mdDoc ''
Which webgui derivation to use. Which webgui derivation to use.
''; '';
}; };
hostname = mkOption { hostname = mkOption {
type = types.str; type = types.str;
description = '' description = lib.mdDoc ''
Which hostname to set the vHost to that is proxying to sks. Which hostname to set the vHost to that is proxying to sks.
''; '';
}; };
@ -40,7 +40,7 @@ in
default = builtins.head sksCfg.hkpAddress; default = builtins.head sksCfg.hkpAddress;
defaultText = literalExpression "head config.${sksOpt.hkpAddress}"; defaultText = literalExpression "head config.${sksOpt.hkpAddress}";
type = types.str; type = types.str;
description = '' description = lib.mdDoc ''
Wich ip address the sks-keyserver is listening on. Wich ip address the sks-keyserver is listening on.
''; '';
}; };
@ -49,7 +49,7 @@ in
default = sksCfg.hkpPort; default = sksCfg.hkpPort;
defaultText = literalExpression "config.${sksOpt.hkpPort}"; defaultText = literalExpression "config.${sksOpt.hkpPort}";
type = types.int; type = types.int;
description = '' description = lib.mdDoc ''
Which port the sks-keyserver is listening on. Which port the sks-keyserver is listening on.
''; '';
}; };

View file

@ -49,8 +49,8 @@ in {
url = mkOption { url = mkOption {
default = "http://localhost:8123/default"; default = "http://localhost:8123/default";
type = types.str; type = types.str;
description = '' description = lib.mdDoc ''
The URL to be used to connect to <literal>clickhouse</literal>. The URL to be used to connect to `clickhouse`.
''; '';
}; };
}; };
@ -66,8 +66,8 @@ in {
socket = mkOption { socket = mkOption {
default = "/run/postgresql"; default = "/run/postgresql";
type = types.str; type = types.str;
description = '' description = lib.mdDoc ''
Path to the UNIX domain-socket to communicate with <literal>postgres</literal>. Path to the UNIX domain-socket to communicate with `postgres`.
''; '';
}; };
}; };

View file

@ -66,10 +66,10 @@ in
"Twitter" "Twitter"
] ]
''; '';
description = '' description = lib.mdDoc ''
List of bridges to be whitelisted. List of bridges to be whitelisted.
If the list is empty, rss-bridge will use whitelist.default.txt. If the list is empty, rss-bridge will use whitelist.default.txt.
Use <literal>[ "*" ]</literal> to whitelist all. Use `[ "*" ]` to whitelist all.
''; '';
}; };
}; };

View file

@ -54,10 +54,10 @@ in {
type = mkOption { type = mkOption {
default = "postgres"; default = "postgres";
type = types.enum [ "postgres" "mysql" "mariadb" "mssql" ]; type = types.enum [ "postgres" "mysql" "mariadb" "mssql" ];
description = '' description = lib.mdDoc ''
Database driver to use for persistence. Please note that <literal>sqlite</literal> Database driver to use for persistence. Please note that `sqlite`
is currently not supported as the build process for it is currently not implemented is currently not supported as the build process for it is currently not implemented
in <literal>pkgs.wiki-js</literal> and it's not recommended by upstream for in `pkgs.wiki-js` and it's not recommended by upstream for
production use. production use.
''; '';
}; };

View file

@ -390,7 +390,7 @@ in
statusPage = mkOption { statusPage = mkOption {
default = false; default = false;
type = types.bool; type = types.bool;
description = '' description = lib.mdDoc ''
Enable status page reachable from localhost on http://127.0.0.1/nginx_status. Enable status page reachable from localhost on http://127.0.0.1/nginx_status.
''; '';
}; };
@ -398,7 +398,7 @@ in
recommendedTlsSettings = mkOption { recommendedTlsSettings = mkOption {
default = false; default = false;
type = types.bool; type = types.bool;
description = '' description = lib.mdDoc ''
Enable recommended TLS settings. Enable recommended TLS settings.
''; '';
}; };
@ -406,7 +406,7 @@ in
recommendedOptimisation = mkOption { recommendedOptimisation = mkOption {
default = false; default = false;
type = types.bool; type = types.bool;
description = '' description = lib.mdDoc ''
Enable recommended optimisation settings. Enable recommended optimisation settings.
''; '';
}; };
@ -414,7 +414,7 @@ in
recommendedGzipSettings = mkOption { recommendedGzipSettings = mkOption {
default = false; default = false;
type = types.bool; type = types.bool;
description = '' description = lib.mdDoc ''
Enable recommended gzip settings. Enable recommended gzip settings.
''; '';
}; };
@ -422,7 +422,7 @@ in
recommendedProxySettings = mkOption { recommendedProxySettings = mkOption {
default = false; default = false;
type = types.bool; type = types.bool;
description = '' description = lib.mdDoc ''
Whether to enable recommended proxy settings if a vhost does not specify the option manually. Whether to enable recommended proxy settings if a vhost does not specify the option manually.
''; '';
}; };
@ -431,7 +431,7 @@ in
type = types.str; type = types.str;
default = "60s"; default = "60s";
example = "20s"; example = "20s";
description = '' description = lib.mdDoc ''
Change the proxy related timeouts in recommendedProxySettings. Change the proxy related timeouts in recommendedProxySettings.
''; '';
}; };
@ -441,7 +441,7 @@ in
default = [ "0.0.0.0" ] ++ optional enableIPv6 "[::0]"; default = [ "0.0.0.0" ] ++ optional enableIPv6 "[::0]";
defaultText = literalExpression ''[ "0.0.0.0" ] ++ lib.optional config.networking.enableIPv6 "[::0]"''; defaultText = literalExpression ''[ "0.0.0.0" ] ++ lib.optional config.networking.enableIPv6 "[::0]"'';
example = literalExpression ''[ "10.0.0.12" "[2002:a00:1::]" ]''; example = literalExpression ''[ "10.0.0.12" "[2002:a00:1::]" ]'';
description = '' description = lib.mdDoc ''
If vhosts do not specify listenAddresses, use these addresses by default. If vhosts do not specify listenAddresses, use these addresses by default.
''; '';
}; };
@ -453,10 +453,10 @@ in
apply = p: p.override { apply = p: p.override {
modules = p.modules ++ cfg.additionalModules; modules = p.modules ++ cfg.additionalModules;
}; };
description = '' description = lib.mdDoc ''
Nginx package to use. This defaults to the stable version. Note Nginx package to use. This defaults to the stable version. Note
that the nginx team recommends to use the mainline version which that the nginx team recommends to use the mainline version which
available in nixpkgs as <literal>nginxMainline</literal>. available in nixpkgs as `nginxMainline`.
''; '';
}; };
@ -474,7 +474,7 @@ in
logError = mkOption { logError = mkOption {
default = "stderr"; default = "stderr";
type = types.str; type = types.str;
description = '' description = lib.mdDoc ''
Configures logging. Configures logging.
The first parameter defines a file that will store the log. The The first parameter defines a file that will store the log. The
special value stderr selects the standard error file. Logging to special value stderr selects the standard error file. Logging to
@ -491,7 +491,7 @@ in
preStart = mkOption { preStart = mkOption {
type = types.lines; type = types.lines;
default = ""; default = "";
description = '' description = lib.mdDoc ''
Shell commands executed before the service's nginx is started. Shell commands executed before the service's nginx is started.
''; '';
}; };
@ -551,7 +551,7 @@ in
httpConfig = mkOption { httpConfig = mkOption {
type = types.lines; type = types.lines;
default = ""; default = "";
description = '' description = lib.mdDoc ''
Configuration lines to be set inside the http block. Configuration lines to be set inside the http block.
This is mutually exclusive with the structured configuration This is mutually exclusive with the structured configuration
via virtualHosts and the recommendedXyzSettings configuration via virtualHosts and the recommendedXyzSettings configuration
@ -569,7 +569,7 @@ in
proxy_pass 192.168.0.1:53535; proxy_pass 192.168.0.1:53535;
} }
''; '';
description = '' description = lib.mdDoc ''
Configuration lines to be set inside the stream block. Configuration lines to be set inside the stream block.
''; '';
}; };
@ -585,7 +585,7 @@ in
appendHttpConfig = mkOption { appendHttpConfig = mkOption {
type = types.lines; type = types.lines;
default = ""; default = "";
description = '' description = lib.mdDoc ''
Configuration lines to be appended to the generated http block. Configuration lines to be appended to the generated http block.
This is mutually exclusive with using config and httpConfig for This is mutually exclusive with using config and httpConfig for
specifying the whole http block verbatim. specifying the whole http block verbatim.
@ -595,10 +595,10 @@ in
enableReload = mkOption { enableReload = mkOption {
default = false; default = false;
type = types.bool; type = types.bool;
description = '' description = lib.mdDoc ''
Reload nginx when configuration file changes (instead of restart). Reload nginx when configuration file changes (instead of restart).
The configuration file is exposed at <filename>/etc/nginx/nginx.conf</filename>. The configuration file is exposed at {file}`/etc/nginx/nginx.conf`.
See also <literal>systemd.services.*.restartIfChanged</literal>. See also `systemd.services.*.restartIfChanged`.
''; '';
}; };

View file

@ -197,12 +197,12 @@ with lib;
http3 = mkOption { http3 = mkOption {
type = types.bool; type = types.bool;
default = false; default = false;
description = '' description = lib.mdDoc ''
Whether to enable HTTP 3. Whether to enable HTTP 3.
This requires using <literal>pkgs.nginxQuic</literal> package This requires using `pkgs.nginxQuic` package
which can be achieved by setting <literal>services.nginx.package = pkgs.nginxQuic;</literal>. which can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`.
Note that HTTP 3 support is experimental and Note that HTTP 3 support is experimental and
<emphasis>not</emphasis> yet recommended for production. *not* yet recommended for production.
Read more at https://quic.nginx.org/ Read more at https://quic.nginx.org/
''; '';
}; };

View file

@ -112,7 +112,7 @@ in
serverXml = mkOption { serverXml = mkOption {
type = types.lines; type = types.lines;
default = ""; default = "";
description = '' description = lib.mdDoc ''
Verbatim server.xml configuration. Verbatim server.xml configuration.
This is mutually exclusive with the virtualHosts options. This is mutually exclusive with the virtualHosts options.
''; '';

View file

@ -27,14 +27,14 @@ in
http_address = mkOption { http_address = mkOption {
type = types.str; type = types.str;
default = "*:6081"; default = "*:6081";
description = '' description = lib.mdDoc ''
HTTP listen address and port. HTTP listen address and port.
''; '';
}; };
config = mkOption { config = mkOption {
type = types.lines; type = types.lines;
description = '' description = lib.mdDoc ''
Verbatim default.vcl configuration. Verbatim default.vcl configuration.
''; '';
}; };
@ -43,7 +43,7 @@ in
type = types.path; type = types.path;
default = "/var/spool/varnish/${config.networking.hostName}"; default = "/var/spool/varnish/${config.networking.hostName}";
defaultText = literalExpression ''"/var/spool/varnish/''${config.networking.hostName}"''; defaultText = literalExpression ''"/var/spool/varnish/''${config.networking.hostName}"'';
description = '' description = lib.mdDoc ''
Directory holding all state for Varnish to run. Directory holding all state for Varnish to run.
''; '';
}; };
@ -52,7 +52,7 @@ in
type = types.listOf types.package; type = types.listOf types.package;
default = []; default = [];
example = literalExpression "[ pkgs.varnishPackages.geoip ]"; example = literalExpression "[ pkgs.varnishPackages.geoip ]";
description = '' description = lib.mdDoc ''
Varnish modules (except 'std'). Varnish modules (except 'std').
''; '';
}; };
@ -61,7 +61,7 @@ in
type = types.str; type = types.str;
default = ""; default = "";
example = "-s malloc,256M"; example = "-s malloc,256M";
description = '' description = lib.mdDoc ''
Command line switches for varnishd (run 'varnishd -?' to get list of options) Command line switches for varnishd (run 'varnishd -?' to get list of options)
''; '';
}; };

View file

@ -8,16 +8,16 @@ in
services.xserver.desktopManager.runXdgAutostartIfNone = mkOption { services.xserver.desktopManager.runXdgAutostartIfNone = mkOption {
type = types.bool; type = types.bool;
default = false; default = false;
description = '' description = lib.mdDoc ''
Whether to run XDG autostart files for sessions without a desktop manager Whether to run XDG autostart files for sessions without a desktop manager
(with only a window manager), these sessions usually don't handle XDG (with only a window manager), these sessions usually don't handle XDG
autostart files by default. autostart files by default.
Some services like <option>i18n.inputMethod</option> and Some services like {option}`i18n.inputMethod` and
<option>service.earlyoom</option> use XDG autostart files to start. {option}`service.earlyoom` use XDG autostart files to start.
If this option is not set to <literal>true</literal> and you are using If this option is not set to `true` and you are using
a window manager without a desktop manager, you need to manually start a window manager without a desktop manager, you need to manually start
them or running <literal>dex</literal> somewhere. them or running `dex` somewhere.
''; '';
}; };
}; };

View file

@ -532,14 +532,14 @@ in
boot.initrd.luks.reusePassphrases = mkOption { boot.initrd.luks.reusePassphrases = mkOption {
type = types.bool; type = types.bool;
default = true; default = true;
description = '' description = lib.mdDoc ''
When opening a new LUKS device try reusing last successful When opening a new LUKS device try reusing last successful
passphrase. passphrase.
Useful for mounting a number of devices that use the same Useful for mounting a number of devices that use the same
passphrase without retyping it several times. passphrase without retyping it several times.
Such setup can be useful if you use <command>cryptsetup luksSuspend</command>. Such setup can be useful if you use {command}`cryptsetup luksSuspend`.
Different LUKS devices will still have Different LUKS devices will still have
different master keys even when using the same passphrase. different master keys even when using the same passphrase.
''; '';

View file

@ -46,10 +46,10 @@ in {
type = types.nullOr types.str; type = types.nullOr types.str;
default = null; default = null;
example = "https://nixos.org/channels/nixos-14.12-small"; example = "https://nixos.org/channels/nixos-14.12-small";
description = '' description = lib.mdDoc ''
The URI of the NixOS channel to use for automatic The URI of the NixOS channel to use for automatic
upgrades. By default, this is the channel set using upgrades. By default, this is the channel set using
<command>nix-channel</command> (run <literal>nix-channel --list</literal> {command}`nix-channel` (run `nix-channel --list`
to see the current value). to see the current value).
''; '';
}; };

View file

@ -175,20 +175,20 @@ in
} }
''; '';
type = types.attrsOf (types.submodule [coreFileSystemOpts fileSystemOpts]); type = types.attrsOf (types.submodule [coreFileSystemOpts fileSystemOpts]);
description = '' description = lib.mdDoc ''
The file systems to be mounted. It must include an entry for The file systems to be mounted. It must include an entry for
the root directory (<literal>mountPoint = "/"</literal>). Each the root directory (`mountPoint = "/"`). Each
entry in the list is an attribute set with the following fields: entry in the list is an attribute set with the following fields:
<literal>mountPoint</literal>, <literal>device</literal>, `mountPoint`, `device`,
<literal>fsType</literal> (a file system type recognised by `fsType` (a file system type recognised by
<command>mount</command>; defaults to {command}`mount`; defaults to
<literal>"auto"</literal>), and <literal>options</literal> `"auto"`), and `options`
(the mount options passed to <command>mount</command> using the (the mount options passed to {command}`mount` using the
<option>-o</option> flag; defaults to <literal>[ "defaults" ]</literal>). {option}`-o` flag; defaults to `[ "defaults" ]`).
Instead of specifying <literal>device</literal>, you can also Instead of specifying `device`, you can also
specify a volume label (<literal>label</literal>) for file specify a volume label (`label`) for file
systems that support it, such as ext2/ext3 (see <command>mke2fs -L</command>). systems that support it, such as ext2/ext3 (see {command}`mke2fs -L`).
''; '';
}; };

View file

@ -12,7 +12,7 @@ in
type = with types; either (enum [ "auto" ]) int; type = with types; either (enum [ "auto" ]) int;
default = "auto"; default = "auto";
example = 2048; example = 2048;
description = '' description = lib.mdDoc ''
Size of disk image. Unit is MB. Size of disk image. Unit is MB.
''; '';
}; };

View file

@ -21,7 +21,7 @@ in
type = with types; either (enum [ "auto" ]) int; type = with types; either (enum [ "auto" ]) int;
default = "auto"; default = "auto";
example = 1536; example = 1536;
description = '' description = lib.mdDoc ''
Size of disk image. Unit is MB. Size of disk image. Unit is MB.
''; '';
}; };
@ -40,7 +40,7 @@ in
virtualisation.googleComputeImage.compressionLevel = mkOption { virtualisation.googleComputeImage.compressionLevel = mkOption {
type = types.int; type = types.int;
default = 6; default = 6;
description = '' description = lib.mdDoc ''
GZIP compression level of the resulting disk image (1-9). GZIP compression level of the resulting disk image (1-9).
''; '';
}; };

View file

@ -12,21 +12,21 @@ in {
type = with types; either (enum [ "auto" ]) int; type = with types; either (enum [ "auto" ]) int;
default = "auto"; default = "auto";
example = 2048; example = 2048;
description = '' description = lib.mdDoc ''
The size of the hyper-v base image in MiB. The size of the hyper-v base image in MiB.
''; '';
}; };
vmDerivationName = mkOption { vmDerivationName = mkOption {
type = types.str; type = types.str;
default = "nixos-hyperv-${config.system.nixos.label}-${pkgs.stdenv.hostPlatform.system}"; default = "nixos-hyperv-${config.system.nixos.label}-${pkgs.stdenv.hostPlatform.system}";
description = '' description = lib.mdDoc ''
The name of the derivation for the hyper-v appliance. The name of the derivation for the hyper-v appliance.
''; '';
}; };
vmFileName = mkOption { vmFileName = mkOption {
type = types.str; type = types.str;
default = "nixos-${config.system.nixos.label}-${pkgs.stdenv.hostPlatform.system}.vhdx"; default = "nixos-${config.system.nixos.label}-${pkgs.stdenv.hostPlatform.system}.vhdx";
description = '' description = lib.mdDoc ''
The file name of the hyper-v appliance. The file name of the hyper-v appliance.
''; '';
}; };

View file

@ -10,7 +10,7 @@ let
vgpuOptions = { vgpuOptions = {
uuid = mkOption { uuid = mkOption {
type = with types; listOf str; type = with types; listOf str;
description = "UUID(s) of VGPU device. You can generate one with <literal>libossp_uuid</literal>."; description = lib.mdDoc "UUID(s) of VGPU device. You can generate one with `libossp_uuid`.";
}; };
}; };
@ -31,9 +31,9 @@ in {
vgpus = mkOption { vgpus = mkOption {
default = {}; default = {};
type = with types; attrsOf (submodule [ { options = vgpuOptions; } ]); type = with types; attrsOf (submodule [ { options = vgpuOptions; } ]);
description = '' description = lib.mdDoc ''
Virtual GPUs to be used in Qemu. You can find devices via <command>ls /sys/bus/pci/devices/*/mdev_supported_types</command> Virtual GPUs to be used in Qemu. You can find devices via {command}`ls /sys/bus/pci/devices/*/mdev_supported_types`
and find info about device via <command>cat /sys/bus/pci/devices/*/mdev_supported_types/i915-GVTg_V5_4/description</command> and find info about device via {command}`cat /sys/bus/pci/devices/*/mdev_supported_types/i915-GVTg_V5_4/description`
''; '';
example = { example = {
i915-GVTg_V5_8.uuid = [ "a297db4a-f4c2-11e6-90f6-d3b88d6c9525" ]; i915-GVTg_V5_8.uuid = [ "a297db4a-f4c2-11e6-90f6-d3b88d6c9525" ];

View file

@ -53,9 +53,9 @@ in
type = types.lines; type = types.lines;
default = ""; default = "";
description = description =
'' lib.mdDoc ''
This is the config file for managing unprivileged user network This is the config file for managing unprivileged user network
administration access in LXC. See <citerefentry><refentrytitle>lxc-usernet</refentrytitle><manvolnum>5</manvolnum></citerefentry>. administration access in LXC. See {manpage}`lxc-usernet(5)`.
''; '';
}; };
}; };

View file

@ -536,13 +536,13 @@ in
type = types.path; type = types.path;
default = pkgs.path; default = pkgs.path;
defaultText = literalExpression "pkgs.path"; defaultText = literalExpression "pkgs.path";
description = '' description = lib.mdDoc ''
A path to the nixpkgs that provide the modules, pkgs and lib for evaluating the container. A path to the nixpkgs that provide the modules, pkgs and lib for evaluating the container.
To only change the <literal>pkgs</literal> argument used inside the container modules, To only change the `pkgs` argument used inside the container modules,
set the <literal>nixpkgs.*</literal> options in the container <option>config</option>. set the `nixpkgs.*` options in the container {option}`config`.
Setting <literal>config.nixpkgs.pkgs = pkgs</literal> speeds up the container evaluation Setting `config.nixpkgs.pkgs = pkgs` speeds up the container evaluation
by reusing the system pkgs, but the <literal>nixpkgs.config</literal> option in the by reusing the system pkgs, but the `nixpkgs.config` option in the
container config is ignored in this case. container config is ignored in this case.
''; '';
}; };

View file

@ -17,16 +17,16 @@ in
enable = mkOption { enable = mkOption {
type = types.bool; type = types.bool;
default = false; default = false;
description = '' description = lib.mdDoc ''
Make the Podman and Docker compatibility API available over the network Make the Podman and Docker compatibility API available over the network
with TLS client certificate authentication. with TLS client certificate authentication.
This allows Docker clients to connect with the equivalents of the Docker This allows Docker clients to connect with the equivalents of the Docker
CLI <literal>-H</literal> and <literal>--tls*</literal> family of options. CLI `-H` and `--tls*` family of options.
For certificate setup, see https://docs.docker.com/engine/security/protect-access/ For certificate setup, see https://docs.docker.com/engine/security/protect-access/
This option is independent of <xref linkend="opt-virtualisation.podman.dockerSocket.enable"/>. This option is independent of [](#opt-virtualisation.podman.dockerSocket.enable).
''; '';
}; };

View file

@ -10,7 +10,7 @@ with lib;
type = types.str; type = types.str;
default = ""; default = "";
example = "order=scsi0;net0"; example = "order=scsi0;net0";
description = '' description = lib.mdDoc ''
Default boot device. PVE will try all devices in its default order if this value is empty. Default boot device. PVE will try all devices in its default order if this value is empty.
''; '';
}; };
@ -18,16 +18,16 @@ with lib;
type = types.str; type = types.str;
default = "virtio-scsi-pci"; default = "virtio-scsi-pci";
example = "lsi"; example = "lsi";
description = '' description = lib.mdDoc ''
SCSI controller type. Must be one of the supported values given in SCSI controller type. Must be one of the supported values given in
<link xlink:href="https://pve.proxmox.com/wiki/Qemu/KVM_Virtual_Machines"/> <https://pve.proxmox.com/wiki/Qemu/KVM_Virtual_Machines>
''; '';
}; };
virtio0 = mkOption { virtio0 = mkOption {
type = types.str; type = types.str;
default = "local-lvm:vm-9999-disk-0"; default = "local-lvm:vm-9999-disk-0";
example = "ceph:vm-123-disk-0"; example = "ceph:vm-123-disk-0";
description = '' description = lib.mdDoc ''
Configuration for the default virtio disk. It can be used as a cue for PVE to autodetect the target sotrage. Configuration for the default virtio disk. It can be used as a cue for PVE to autodetect the target sotrage.
This parameter is required by PVE even if it isn't used. This parameter is required by PVE even if it isn't used.
''; '';
@ -35,21 +35,21 @@ with lib;
ostype = mkOption { ostype = mkOption {
type = types.str; type = types.str;
default = "l26"; default = "l26";
description = '' description = lib.mdDoc ''
Guest OS type Guest OS type
''; '';
}; };
cores = mkOption { cores = mkOption {
type = types.ints.positive; type = types.ints.positive;
default = 1; default = 1;
description = '' description = lib.mdDoc ''
Guest core count Guest core count
''; '';
}; };
memory = mkOption { memory = mkOption {
type = types.ints.positive; type = types.ints.positive;
default = 1024; default = 1024;
description = '' description = lib.mdDoc ''
Guest memory in MB Guest memory in MB
''; '';
}; };
@ -58,14 +58,14 @@ with lib;
name = mkOption { name = mkOption {
type = types.str; type = types.str;
default = "nixos-${config.system.nixos.label}"; default = "nixos-${config.system.nixos.label}";
description = '' description = lib.mdDoc ''
VM name VM name
''; '';
}; };
net0 = mkOption { net0 = mkOption {
type = types.commas; type = types.commas;
default = "virtio=00:00:00:00:00:00,bridge=vmbr0,firewall=1"; default = "virtio=00:00:00:00:00:00,bridge=vmbr0,firewall=1";
description = '' description = lib.mdDoc ''
Configuration for the default interface. When restoring from VMA, check the Configuration for the default interface. When restoring from VMA, check the
"unique" box to ensure device mac is randomized. "unique" box to ensure device mac is randomized.
''; '';
@ -74,7 +74,7 @@ with lib;
type = types.str; type = types.str;
default = "socket"; default = "socket";
example = "/dev/ttyS0"; example = "/dev/ttyS0";
description = '' description = lib.mdDoc ''
Create a serial device inside the VM (n is 0 to 3), and pass through a host serial device (i.e. /dev/ttyS0), Create a serial device inside the VM (n is 0 to 3), and pass through a host serial device (i.e. /dev/ttyS0),
or create a unix socket on the host side (use qm terminal to open a terminal connection). or create a unix socket on the host side (use qm terminal to open a terminal connection).
''; '';
@ -83,7 +83,7 @@ with lib;
type = types.bool; type = types.bool;
apply = x: if x then "1" else "0"; apply = x: if x then "1" else "0";
default = true; default = true;
description = '' description = lib.mdDoc ''
Expect guest to have qemu agent running Expect guest to have qemu agent running
''; '';
}; };
@ -95,7 +95,7 @@ with lib;
cpu = "host"; cpu = "host";
onboot = 1; onboot = 1;
}''; }'';
description = '' description = lib.mdDoc ''
Additional options appended to qemu-server.conf Additional options appended to qemu-server.conf
''; '';
}; };
@ -103,7 +103,7 @@ with lib;
type = types.str; type = types.str;
default = config.proxmox.qemuConf.name; default = config.proxmox.qemuConf.name;
example = "999-nixos_template"; example = "999-nixos_template";
description = '' description = lib.mdDoc ''
Filename of the image will be vzdump-qemu-''${filenameSuffix}.vma.zstd. Filename of the image will be vzdump-qemu-''${filenameSuffix}.vma.zstd.
This will also determine the default name of the VM on restoring the VMA. This will also determine the default name of the VM on restoring the VMA.
Start this value with a number if you want the VMA to be detected as a backup of Start this value with a number if you want the VMA to be detected as a backup of

View file

@ -739,10 +739,10 @@ in
type = types.nullOr types.package; type = types.nullOr types.package;
default = null; default = null;
description = description =
'' lib.mdDoc ''
An alternate BIOS (such as <literal>qboot</literal>) with which to start the VM. An alternate BIOS (such as `qboot`) with which to start the VM.
Should contain a file named <literal>bios.bin</literal>. Should contain a file named `bios.bin`.
If <literal>null</literal>, QEMU's builtin SeaBIOS will be used. If `null`, QEMU's builtin SeaBIOS will be used.
''; '';
}; };

View file

@ -21,34 +21,34 @@ in {
type = with types; either (enum [ "auto" ]) int; type = with types; either (enum [ "auto" ]) int;
default = "auto"; default = "auto";
example = 2048; example = 2048;
description = '' description = lib.mdDoc ''
The size of the VMWare base image in MiB. The size of the VMWare base image in MiB.
''; '';
}; };
vmDerivationName = mkOption { vmDerivationName = mkOption {
type = types.str; type = types.str;
default = "nixos-vmware-${config.system.nixos.label}-${pkgs.stdenv.hostPlatform.system}"; default = "nixos-vmware-${config.system.nixos.label}-${pkgs.stdenv.hostPlatform.system}";
description = '' description = lib.mdDoc ''
The name of the derivation for the VMWare appliance. The name of the derivation for the VMWare appliance.
''; '';
}; };
vmFileName = mkOption { vmFileName = mkOption {
type = types.str; type = types.str;
default = "nixos-${config.system.nixos.label}-${pkgs.stdenv.hostPlatform.system}.vmdk"; default = "nixos-${config.system.nixos.label}-${pkgs.stdenv.hostPlatform.system}.vmdk";
description = '' description = lib.mdDoc ''
The file name of the VMWare appliance. The file name of the VMWare appliance.
''; '';
}; };
vmSubformat = mkOption { vmSubformat = mkOption {
type = types.enum subformats; type = types.enum subformats;
default = "monolithicSparse"; default = "monolithicSparse";
description = "Specifies which VMDK subformat to use."; description = lib.mdDoc "Specifies which VMDK subformat to use.";
}; };
vmCompat6 = mkOption { vmCompat6 = mkOption {
type = types.bool; type = types.bool;
default = false; default = false;
example = true; example = true;
description = "Create a VMDK version 6 image (instead of version 4)."; description = lib.mdDoc "Create a VMDK version 6 image (instead of version 4).";
}; };
}; };
}; };