+4
-4
nixos/modules/config/sysctl.nix
+4
-4
nixos/modules/config/sysctl.nix
···-<citerefentry><refentrytitle>sysctl</refentrytitle><manvolnum>8</manvolnum></citerefentry>. Note that sysctl
···
+5
-5
nixos/modules/config/system-environment.nix
+5
-5
nixos/modules/config/system-environment.nix
···-<citerefentry><refentrytitle>pam_env.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry>.
···
+19
-19
nixos/modules/installer/cd-dvd/iso-image.nix
+19
-19
nixos/modules/installer/cd-dvd/iso-image.nix
············default = "nixos${optionalString (config.isoImage.edition != "") "-${config.isoImage.edition}"}-${config.system.nixos.release}-${pkgs.stdenv.hostPlatform.uname.processor}";···············url = "https://raw.githubusercontent.com/NixOS/nixos-artwork/a9e05d7deb38a8e005a2b52575a3f59a63a4dba0/bootloader/efi-background.png";···url = "https://raw.githubusercontent.com/NixOS/nixos-artwork/a9e05d7deb38a8e005a2b52575a3f59a63a4dba0/bootloader/isolinux/bios-boot.png";·········
············default = "nixos${optionalString (config.isoImage.edition != "") "-${config.isoImage.edition}"}-${config.system.nixos.release}-${pkgs.stdenv.hostPlatform.uname.processor}";···············url = "https://raw.githubusercontent.com/NixOS/nixos-artwork/a9e05d7deb38a8e005a2b52575a3f59a63a4dba0/bootloader/efi-background.png";···url = "https://raw.githubusercontent.com/NixOS/nixos-artwork/a9e05d7deb38a8e005a2b52575a3f59a63a4dba0/bootloader/isolinux/bios-boot.png";·········
+1
-1
nixos/modules/installer/netboot/netboot.nix
+1
-1
nixos/modules/installer/netboot/netboot.nix
+14
-14
nixos/modules/misc/documentation.nix
+14
-14
nixos/modules/misc/documentation.nix
·····················
·····················
+4
-4
nixos/modules/misc/locate.nix
+4
-4
nixos/modules/misc/locate.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.
···
+25
-25
nixos/modules/misc/nixpkgs.nix
+25
-25
nixos/modules/misc/nixpkgs.nix
·····················-or fall back to removing the <option>nixpkgs.hostPlatform</option> line from the generated config.
·····················
+3
-3
nixos/modules/profiles/clone-config.nix
+3
-3
nixos/modules/profiles/clone-config.nix
······
······
+2
-2
nixos/modules/security/acme/default.nix
+2
-2
nixos/modules/security/acme/default.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.
+5
-5
nixos/modules/security/apparmor.nix
+5
-5
nixos/modules/security/apparmor.nix
·········
·········
+8
-8
nixos/modules/security/pam.nix
+8
-8
nixos/modules/security/pam.nix
············
············
+8
-8
nixos/modules/security/systemd-confinement.nix
+8
-8
nixos/modules/security/systemd-confinement.nix
······-<citerefentry><refentrytitle>system</refentrytitle><manvolnum>3</manvolnum></citerefentry> library function to execute commands.
······
+6
-6
nixos/modules/services/backup/borgbackup.nix
+6
-6
nixos/modules/services/backup/borgbackup.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.···-<citerefentry><refentrytitle>systemd.timer</refentrytitle><manvolnum>5</manvolnum></citerefentry>
······
+10
-10
nixos/modules/services/backup/duplicity.nix
+10
-10
nixos/modules/services/backup/duplicity.nix
···-section in <citerefentry><refentrytitle>duplicity</refentrytitle><manvolnum>1</manvolnum></citerefentry> for details on the syntax.-<citerefentry><refentrytitle>duplicity</refentrytitle><manvolnum>1</manvolnum></citerefentry> for details on the syntax.-<citerefentry><refentrytitle>duplicity</refentrytitle><manvolnum>1</manvolnum></citerefentry> for supported urls.···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry> for the format).···
·········
+2
-2
nixos/modules/services/backup/sanoid.nix
+2
-2
nixos/modules/services/backup/sanoid.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.
+2
-2
nixos/modules/services/backup/syncoid.nix
+2
-2
nixos/modules/services/backup/syncoid.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.
+2
-2
nixos/modules/services/backup/tarsnap.nix
+2
-2
nixos/modules/services/backup/tarsnap.nix
+17
-17
nixos/modules/services/cluster/hadoop/default.nix
+17
-17
nixos/modules/services/cluster/hadoop/default.nix
···-<link xlink:href="https://hadoop.apache.org/docs/current/hadoop-project-dist/hadoop-common/core-default.xml"/>······-<link xlink:href="https://hadoop.apache.org/docs/current/hadoop-project-dist/hadoop-hdfs/hdfs-default.xml"/>······-<link xlink:href="https://hadoop.apache.org/docs/current/hadoop-mapreduce-client/hadoop-mapreduce-client-core/mapred-default.xml"/>···"yarn.resourcemanager.scheduler.class" = "org.apache.hadoop.yarn.server.resourcemanager.scheduler.fair.FairScheduler";···-<link xlink:href="https://hadoop.apache.org/docs/current/hadoop-yarn/hadoop-yarn-common/yarn-default.xml"/>···-<link xlink:href="https://hadoop.apache.org/docs/current/hadoop-hdfs-httpfs/httpfs-default.html"/>······-<link xlink:href="https://hadoop.apache.org/docs/r2.7.2/hadoop-yarn/hadoop-yarn-site/SecureContainer.html"/>···-description = "Directories containing additional config files to be added to HADOOP_CONF_DIR";
···············+<https://hadoop.apache.org/docs/current/hadoop-mapreduce-client/hadoop-mapreduce-client-core/mapred-default.xml>···"yarn.resourcemanager.scheduler.class" = "org.apache.hadoop.yarn.server.resourcemanager.scheduler.fair.FairScheduler";···············+description = lib.mdDoc "Directories containing additional config files to be added to HADOOP_CONF_DIR";
+3
-3
nixos/modules/services/computing/slurm/slurm.nix
+3
-3
nixos/modules/services/computing/slurm/slurm.nix
+4
-4
nixos/modules/services/databases/rethinkdb.nix
+4
-4
nixos/modules/services/databases/rethinkdb.nix
···
···+description = lib.mdDoc "Location where RethinkDB stores its data, 1 data directory per instance.";
+6
-6
nixos/modules/services/desktops/pipewire/pipewire-media-session.nix
+6
-6
nixos/modules/services/desktops/pipewire/pipewire-media-session.nix
······https://gitlab.freedesktop.org/pipewire/media-session/-/blob/${cfg.package.version}/src/daemon/media-session.d/media-session.conf···https://gitlab.freedesktop.org/pipewire/media-session/-/blob/${cfg.package.version}/src/daemon/media-session.d/alsa-monitor.conf···https://gitlab.freedesktop.org/pipewire/media-session/-/blob/${cfg.package.version}/src/daemon/media-session.d/bluez-monitor.conf···https://gitlab.freedesktop.org/pipewire/media-session/-/blob/${cfg.package.version}/src/daemon/media-session.d/v4l2-monitor.conf
······https://gitlab.freedesktop.org/pipewire/media-session/-/blob/${cfg.package.version}/src/daemon/media-session.d/media-session.conf···https://gitlab.freedesktop.org/pipewire/media-session/-/blob/${cfg.package.version}/src/daemon/media-session.d/alsa-monitor.conf···https://gitlab.freedesktop.org/pipewire/media-session/-/blob/${cfg.package.version}/src/daemon/media-session.d/bluez-monitor.conf···https://gitlab.freedesktop.org/pipewire/media-session/-/blob/${cfg.package.version}/src/daemon/media-session.d/v4l2-monitor.conf
+9
-9
nixos/modules/services/development/jupyter/default.nix
+9
-9
nixos/modules/services/development/jupyter/default.nix
·····················Use this if you want to create a group of users that are able to view the notebook directory's content.······
·····················Use this if you want to create a group of users that are able to view the notebook directory's content.······
+6
-6
nixos/modules/services/development/jupyter/kernel-options.nix
+6
-6
nixos/modules/services/development/jupyter/kernel-options.nix
··················example = literalExpression ''"{ examples = ''${env.sitePack}/IRkernel/kernelspec/kernel.js"; }'';
··················example = literalExpression ''"{ examples = ''${env.sitePack}/IRkernel/kernelspec/kernel.js"; }'';
+9
-9
nixos/modules/services/development/jupyterhub/default.nix
+9
-9
nixos/modules/services/development/jupyterhub/default.nix
···························
···························
+2
-2
nixos/modules/services/hardware/pcscd.nix
+2
-2
nixos/modules/services/hardware/pcscd.nix
+2
-2
nixos/modules/services/logging/awstats.nix
+2
-2
nixos/modules/services/logging/awstats.nix
···-(in the format described by <citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>)
+2
-2
nixos/modules/services/mail/mlmmj.nix
+2
-2
nixos/modules/services/mail/mlmmj.nix
+2
-2
nixos/modules/services/mail/postfix.nix
+2
-2
nixos/modules/services/mail/postfix.nix
+19
-19
nixos/modules/services/matrix/mjolnir.nix
+19
-19
nixos/modules/services/matrix/mjolnir.nix
···-If <literal>pantalaimon.enable</literal> is <literal>true</literal>, this option will become the homeserver to which <literal>pantalaimon</literal> connects.-The listen address of <literal>pantalaimon</literal> will then become the <literal>homeserverUrl</literal> of <literal>mjolnir</literal>.···············-Additional settings (see <link xlink:href="https://github.com/matrix-org/mjolnir/blob/main/config/default.yaml">mjolnir default config</link> for available settings). These settings will override settings made by the module config.
···+If `pantalaimon.enable` is `true`, this option will become the homeserver to which `pantalaimon` connects.···············+Additional settings (see [mjolnir default config](https://github.com/matrix-org/mjolnir/blob/main/config/default.yaml) for available settings). These settings will override settings made by the module config.
+10
-10
nixos/modules/services/matrix/pantalaimon-options.nix
+10
-10
nixos/modules/services/matrix/pantalaimon-options.nix
···-The directory where <literal>pantalaimon</literal> should store its state such as the database file.···············-<link xlink:href="https://github.com/matrix-org/pantalaimon/blob/master/docs/man/pantalaimon.5.md">pantalaimon(5)</link>
··················+[pantalaimon(5)](https://github.com/matrix-org/pantalaimon/blob/master/docs/man/pantalaimon.5.md)
+2
-2
nixos/modules/services/matrix/pantalaimon.nix
+2
-2
nixos/modules/services/matrix/pantalaimon.nix
···-support End-to-end encryption (like <literal>fractal</literal>), refer to the home-manager module.
···
+41
-41
nixos/modules/services/matrix/synapse.nix
+41
-41
nixos/modules/services/matrix/synapse.nix
·······································defaultText = "${cfg.dataDir}/media_store for when system.stateVersion is at least 22.05, ${cfg.dataDir}/media when lower than 22.05";····················································································
·······································defaultText = "${cfg.dataDir}/media_store for when system.stateVersion is at least 22.05, ${cfg.dataDir}/media when lower than 22.05";····················································································
+2
-2
nixos/modules/services/misc/autorandr.nix
+2
-2
nixos/modules/services/misc/autorandr.nix
+2
-2
nixos/modules/services/misc/docker-registry.nix
+2
-2
nixos/modules/services/misc/docker-registry.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>) of the time at
+2
-2
nixos/modules/services/misc/fstrim.nix
+2
-2
nixos/modules/services/misc/fstrim.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.
···
+2
-2
nixos/modules/services/misc/geoipupdate.nix
+2
-2
nixos/modules/services/misc/geoipupdate.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.
+2
-2
nixos/modules/services/misc/gitea.nix
+2
-2
nixos/modules/services/misc/gitea.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.
+52
-52
nixos/modules/services/misc/gitit.nix
+52
-52
nixos/modules/services/misc/gitit.nix
······························default = "https://d3eoax9i5htok0.cloudfront.net/mathjax/latest/MathJax.js?config=TeX-AMS-MML_HTMLorMML";··············································································
······························default = "https://d3eoax9i5htok0.cloudfront.net/mathjax/latest/MathJax.js?config=TeX-AMS-MML_HTMLorMML";··············································································
+2
-2
nixos/modules/services/misc/gitlab.nix
+2
-2
nixos/modules/services/misc/gitlab.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.
+11
-11
nixos/modules/services/misc/nix-daemon.nix
+11
-11
nixos/modules/services/misc/nix-daemon.nix
···-<citerefentry><refentrytitle>systemd.resource-control</refentrytitle><manvolnum>5</manvolnum></citerefentry> and adjust
···
+4
-4
nixos/modules/services/misc/nix-gc.nix
+4
-4
nixos/modules/services/misc/nix-gc.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>
······
+2
-2
nixos/modules/services/misc/nix-optimise.nix
+2
-2
nixos/modules/services/misc/nix-optimise.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>) of the time at
+4
-4
nixos/modules/services/misc/snapper.nix
+4
-4
nixos/modules/services/misc/snapper.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.
···
+89
-89
nixos/modules/services/misc/sourcehut/default.nix
+89
-89
nixos/modules/services/misc/sourcehut/default.nix
···migrate-on-upgrade = mkEnableOption "automatic migrations on package upgrade" // { default = true; };············-to a secret key to encrypt internal messages with. Use <literal>srht-keygen network</literal> to······················································defaultText = ''http://<xref linkend="opt-services.sourcehut.listenAddress"/>:''${toString (<xref linkend="opt-services.sourcehut.meta.port"/> + 100)}'';···························Images for builds.sr.ht. Each package should be distro.release.arch and point to a /nix/store/package/root.img.qcow2.······Generate clonebundles (which require more disk space but dramatically speed up cloning large repositories).···-description = "Content of the <literal>celeryconfig.py</literal> used by the Celery of <literal>listssrht-process</literal>.";
···migrate-on-upgrade = mkEnableOption "automatic migrations on package upgrade" // { default = true; };·········+description = lib.mdDoc "Virtual-host configuration merged with all Sourcehut's virtual-hosts.";·············································+description = lib.mdDoc ".hg/store size (in MB) past which the nightly job generates clone bundles.";············defaultText = ''http://<xref linkend="opt-services.sourcehut.listenAddress"/>:''${toString (<xref linkend="opt-services.sourcehut.meta.port"/> + 100)}'';···························Images for builds.sr.ht. Each package should be distro.release.arch and point to a /nix/store/package/root.img.qcow2.······Generate clonebundles (which require more disk space but dramatically speed up cloning large repositories).···+description = lib.mdDoc "Extra arguments passed to the Celery responsible for processing mails.";+description = lib.mdDoc "Content of the `celeryconfig.py` used by the Celery of `listssrht-process`.";
+9
-9
nixos/modules/services/misc/sourcehut/service.nix
+9
-9
nixos/modules/services/misc/sourcehut/service.nix
···············-used if <xref linkend="opt-services.sourcehut.postgresql.enable"/> is <literal>true</literal>.······-description = "Content of the <literal>celeryconfig.py</literal> used by the Celery responsible for webhooks.";
·····················+description = lib.mdDoc "Content of the `celeryconfig.py` used by the Celery responsible for webhooks.";
+8
-8
nixos/modules/services/misc/taskserver/default.nix
+8
-8
nixos/modules/services/misc/taskserver/default.nix
···-Size of the connection backlog, see <citerefentry><refentrytitle>listen</refentrytitle><manvolnum>2</manvolnum></citerefentry>.···-<citerefentry><refentrytitle>taskdrc</refentrytitle><manvolnum>5</manvolnum></citerefentry>, but with one difference:
······
+5
-5
nixos/modules/services/monitoring/nagios.nix
+5
-5
nixos/modules/services/monitoring/nagios.nix
···-description = "if true, the syntax of the nagios configuration file is checked at build time";···
···+description = lib.mdDoc "if true, the syntax of the nagios configuration file is checked at build time";···
+7
-7
nixos/modules/services/monitoring/prometheus/exporters.nix
+7
-7
nixos/modules/services/monitoring/prometheus/exporters.nix
·········
·········
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/apcupsd.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/apcupsd.nix
······
······
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/artifactory.nix
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/artifactory.nix
·········
·········
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/bind.nix
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/bind.nix
···
···
+3
-3
nixos/modules/services/monitoring/prometheus/exporters/bird.nix
+3
-3
nixos/modules/services/monitoring/prometheus/exporters/bird.nix
···
···
+7
-7
nixos/modules/services/monitoring/prometheus/exporters/bitcoin.nix
+7
-7
nixos/modules/services/monitoring/prometheus/exporters/bitcoin.nix
··················
··················
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/blackbox.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/blackbox.nix
···
···
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/buildkite-agent.nix
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/buildkite-agent.nix
·········
·········
+6
-6
nixos/modules/services/monitoring/prometheus/exporters/collectd.nix
+6
-6
nixos/modules/services/monitoring/prometheus/exporters/collectd.nix
············
············
+11
-11
nixos/modules/services/monitoring/prometheus/exporters/dmarc.nix
+11
-11
nixos/modules/services/monitoring/prometheus/exporters/dmarc.nix
···············
···············
+3
-3
nixos/modules/services/monitoring/prometheus/exporters/dnsmasq.nix
+3
-3
nixos/modules/services/monitoring/prometheus/exporters/dnsmasq.nix
······
······
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/dovecot.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/dovecot.nix
······
······
+3
-3
nixos/modules/services/monitoring/prometheus/exporters/fastly.nix
+3
-3
nixos/modules/services/monitoring/prometheus/exporters/fastly.nix
······
······
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/flow.nix
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/flow.nix
······
······
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/fritzbox.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/fritzbox.nix
······
······
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/influxdb.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/influxdb.nix
···
···
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/jitsi.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/jitsi.nix
······
······
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/json.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/json.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/kea.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/kea.nix
+3
-3
nixos/modules/services/monitoring/prometheus/exporters/knot.nix
+3
-3
nixos/modules/services/monitoring/prometheus/exporters/knot.nix
···-Socket path of <citerefentry><refentrytitle>knotd</refentrytitle><manvolnum>8</manvolnum></citerefentry>.
···
+3
-3
nixos/modules/services/monitoring/prometheus/exporters/lnd.nix
+3
-3
nixos/modules/services/monitoring/prometheus/exporters/lnd.nix
···
···
+15
-15
nixos/modules/services/monitoring/prometheus/exporters/mail.nix
+15
-15
nixos/modules/services/monitoring/prometheus/exporters/mail.nix
············
············
+5
-5
nixos/modules/services/monitoring/prometheus/exporters/mikrotik.nix
+5
-5
nixos/modules/services/monitoring/prometheus/exporters/mikrotik.nix
······
······
+6
-6
nixos/modules/services/monitoring/prometheus/exporters/minio.nix
+6
-6
nixos/modules/services/monitoring/prometheus/exporters/minio.nix
······
······
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/modemmanager.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/modemmanager.nix
+5
-5
nixos/modules/services/monitoring/prometheus/exporters/nextcloud.nix
+5
-5
nixos/modules/services/monitoring/prometheus/exporters/nextcloud.nix
·········
·········
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/nginx.nix
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/nginx.nix
·········
·········
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/nginxlog.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/nginxlog.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/node.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/node.nix
······
······
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/openldap.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/openldap.nix
······
+3
-3
nixos/modules/services/monitoring/prometheus/exporters/openvpn.nix
+3
-3
nixos/modules/services/monitoring/prometheus/exporters/openvpn.nix
···
···
+6
-6
nixos/modules/services/monitoring/prometheus/exporters/pihole.nix
+6
-6
nixos/modules/services/monitoring/prometheus/exporters/pihole.nix
··················
··················
+11
-11
nixos/modules/services/monitoring/prometheus/exporters/postfix.nix
+11
-11
nixos/modules/services/monitoring/prometheus/exporters/postfix.nix
············
············
+3
-3
nixos/modules/services/monitoring/prometheus/exporters/postgres.nix
+3
-3
nixos/modules/services/monitoring/prometheus/exporters/postgres.nix
······
······
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/process.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/process.nix
···{ name = "{{.Matches.Wrapped}} {{ .Matches.Args }}"; cmdline = [ "^/nix/store[^ ]*/(?P<Wrapped>[^ /]*) (?P<Args>.*)" ]; }-settings that can all be used here: <link xlink:href="https://github.com/ncabatoff/process-exporter"/>
···{ name = "{{.Matches.Wrapped}} {{ .Matches.Args }}"; cmdline = [ "^/nix/store[^ ]*/(?P<Wrapped>[^ /]*) (?P<Args>.*)" ]; }
+9
-9
nixos/modules/services/monitoring/prometheus/exporters/pve.nix
+9
-9
nixos/modules/services/monitoring/prometheus/exporters/pve.nix
······Path to the service's environment file. This path can either be a computed path in /nix/store or a path in the local filesystem.The environment file should NOT be stored in /nix/store as it contains passwords and/or keys in plain text.···Path to the service's config file. This path can either be a computed path in /nix/store or a path in the local filesystem.The config file should NOT be stored in /nix/store as it will contain passwords and/or keys in plain text.···
······Path to the service's environment file. This path can either be a computed path in /nix/store or a path in the local filesystem.The environment file should NOT be stored in /nix/store as it contains passwords and/or keys in plain text.···Path to the service's config file. This path can either be a computed path in /nix/store or a path in the local filesystem.The config file should NOT be stored in /nix/store as it will contain passwords and/or keys in plain text.···
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/py-air-control.nix
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/py-air-control.nix
······
······
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/rspamd.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/rspamd.nix
+6
-6
nixos/modules/services/monitoring/prometheus/exporters/rtl_433.nix
+6
-6
nixos/modules/services/monitoring/prometheus/exporters/rtl_433.nix
·········-Having <literal>-C si</literal> (the default) is recommended since only Celsius temperatures are parsed.······
···············
+5
-5
nixos/modules/services/monitoring/prometheus/exporters/script.nix
+5
-5
nixos/modules/services/monitoring/prometheus/exporters/script.nix
······-settings that can all be used here: <link xlink:href="https://github.com/adhocteam/script_exporter#sample-configuration"/>
······+settings that can all be used here: <https://github.com/adhocteam/script_exporter#sample-configuration>
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/smartctl.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/smartctl.nix
······
······
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/smokeping.nix
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/smokeping.nix
···default = "5e-05,0.0001,0.0002,0.0004,0.0008,0.0016,0.0032,0.0064,0.0128,0.0256,0.0512,0.1024,0.2048,0.4096,0.8192,1.6384,3.2768,6.5536,13.1072,26.2144";
···default = "5e-05,0.0001,0.0002,0.0004,0.0008,0.0016,0.0032,0.0064,0.0128,0.0256,0.0512,0.1024,0.2048,0.4096,0.8192,1.6384,3.2768,6.5536,13.1072,26.2144";
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/snmp.nix
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/snmp.nix
······Snmp exporter configuration as nix attribute set. Mutually exclusive with 'configurationPath' option.······
······Snmp exporter configuration as nix attribute set. Mutually exclusive with 'configurationPath' option.······
+12
-12
nixos/modules/services/monitoring/prometheus/exporters/sql.nix
+12
-12
nixos/modules/services/monitoring/prometheus/exporters/sql.nix
············
······+description = lib.mdDoc "A list of connection strings of the SQL servers to scrape metrics from";······
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/surfboard.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/surfboard.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/tor.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/tor.nix
······
+3
-3
nixos/modules/services/monitoring/prometheus/exporters/unbound.nix
+3
-3
nixos/modules/services/monitoring/prometheus/exporters/unbound.nix
·········
·········
+5
-5
nixos/modules/services/monitoring/prometheus/exporters/unifi.nix
+5
-5
nixos/modules/services/monitoring/prometheus/exporters/unifi.nix
············
············
+8
-8
nixos/modules/services/monitoring/prometheus/exporters/varnish.nix
+8
-8
nixos/modules/services/monitoring/prometheus/exporters/varnish.nix
······
······
+10
-10
nixos/modules/services/monitoring/prometheus/exporters/wireguard.nix
+10
-10
nixos/modules/services/monitoring/prometheus/exporters/wireguard.nix
···-<link xlink:href="https://github.com/MindFlavor/prometheus_wireguard_exporter/tree/2.0.0#usage">add the peer's name to the stats of a peer</link>.···
···+[add the peer's name to the stats of a peer](https://github.com/MindFlavor/prometheus_wireguard_exporter/tree/2.0.0#usage).···
+4
-4
nixos/modules/services/network-filesystems/netatalk.nix
+4
-4
nixos/modules/services/network-filesystems/netatalk.nix
···-See <citerefentry><refentrytitle>extmap.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry>. for more information.
···
+5
-5
nixos/modules/services/network-filesystems/nfsd.nix
+5
-5
nixos/modules/services/network-filesystems/nfsd.nix
···-<citerefentry><refentrytitle>exports</refentrytitle><manvolnum>5</manvolnum></citerefentry> for the format.
···
+25
-25
nixos/modules/services/network-filesystems/openafs/client.nix
+25
-25
nixos/modules/services/network-filesystems/openafs/client.nix
························
························
+2
-2
nixos/modules/services/network-filesystems/openafs/lib.nix
+2
-2
nixos/modules/services/network-filesystems/openafs/lib.nix
···
···
+22
-22
nixos/modules/services/network-filesystems/openafs/server.nix
+22
-22
nixos/modules/services/network-filesystems/openafs/server.nix
···························
······+description = lib.mdDoc "List of IP addresses this server is advertised under. See NetInfo(5)";·····················
+2
-2
nixos/modules/services/network-filesystems/rsyncd.nix
+2
-2
nixos/modules/services/network-filesystems/rsyncd.nix
+2
-2
nixos/modules/services/network-filesystems/webdav.nix
+2
-2
nixos/modules/services/network-filesystems/webdav.nix
+2
-2
nixos/modules/services/networking/avahi-daemon.nix
+2
-2
nixos/modules/services/networking/avahi-daemon.nix
···-See the <citerefentry><refentrytitle>avahi.service</refentrytitle><manvolnum>5</manvolnum></citerefentry> manpage for detailed information.
+14
-14
nixos/modules/services/networking/keepalived/default.nix
+14
-14
nixos/modules/services/networking/keepalived/default.nix
······Don't run scripts configured to be run as root if any part of the path is writable by a non-root user.·································
······Don't run scripts configured to be run as root if any part of the path is writable by a non-root user.·································
+5
-5
nixos/modules/services/networking/keepalived/virtual-ip-options.nix
+5
-5
nixos/modules/services/networking/keepalived/virtual-ip-options.nix
···············
···············
+14
-14
nixos/modules/services/networking/keepalived/vrrp-instance-options.nix
+14
-14
nixos/modules/services/networking/keepalived/vrrp-instance-options.nix
·································
·································
+9
-9
nixos/modules/services/networking/keepalived/vrrp-script-options.nix
+9
-9
nixos/modules/services/networking/keepalived/vrrp-script-options.nix
···
···+description = lib.mdDoc "(Path of) Script command to execute followed by args, i.e. cmd [args]...";
+4
-4
nixos/modules/services/networking/nbd.nix
+4
-4
nixos/modules/services/networking/nbd.nix
···-<citerefentry><refentrytitle>nbd-server</refentrytitle><manvolnum>5</manvolnum></citerefentry>.···-<citerefentry><refentrytitle>nbd-server</refentrytitle><manvolnum>5</manvolnum></citerefentry>.
······
+17
-17
nixos/modules/services/networking/networkmanager.nix
+17
-17
nixos/modules/services/networking/networkmanager.nix
···-<link xlink:href="https://developer.gnome.org/NetworkManager/stable/NetworkManager.conf.html">-<citerefentry><refentrytitle>NetworkManager.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry>···-<link xlink:href="https://developer.gnome.org/NetworkManager/stable/NetworkManager.conf.html">-<citerefentry><refentrytitle>NetworkManager.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry>···-<link xlink:href="https://developer.gnome.org/NetworkManager/stable/NetworkManager.conf.html#device-spec">-<citerefentry><refentrytitle>NetworkManager.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry>.···-<link xlink:href="https://developer.gnome.org/NetworkManager/stable/NetworkManager.conf.html">-<citerefentry><refentrytitle>NetworkManager.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry>.
············
+3
-3
nixos/modules/services/networking/nghttpx/backend-submodule.nix
+3
-3
nixos/modules/services/networking/nghttpx/backend-submodule.nix
·········
·········
+2
-2
nixos/modules/services/networking/nghttpx/frontend-submodule.nix
+2
-2
nixos/modules/services/networking/nghttpx/frontend-submodule.nix
······
+10
-10
nixos/modules/services/networking/nghttpx/nghttpx-options.nix
+10
-10
nixos/modules/services/networking/nghttpx/nghttpx-options.nix
···························
···························
+5
-5
nixos/modules/services/networking/soju.nix
+5
-5
nixos/modules/services/networking/soju.nix
······
······
+4
-4
nixos/modules/services/networking/ssh/sshd.nix
+4
-4
nixos/modules/services/networking/ssh/sshd.nix
···-<citerefentry><refentrytitle>sshd_config</refentrytitle><manvolnum>5</manvolnum></citerefentry>.···[ { type = "rsa"; bits = 4096; path = "/etc/ssh/ssh_host_rsa_key"; rounds = 100; openSSHFormat = true; }{ type = "ed25519"; path = "/etc/ssh/ssh_host_ed25519_key"; rounds = 100; comment = "key comment"; }-<citerefentry><refentrytitle>ssh-keygen</refentrytitle><manvolnum>1</manvolnum></citerefentry> for supported types
······[ { type = "rsa"; bits = 4096; path = "/etc/ssh/ssh_host_rsa_key"; rounds = 100; openSSHFormat = true; }{ type = "ed25519"; path = "/etc/ssh/ssh_host_ed25519_key"; rounds = 100; comment = "key comment"; }
+3
-3
nixos/modules/services/networking/strongswan-swanctl/module.nix
+3
-3
nixos/modules/services/networking/strongswan-swanctl/module.nix
······
······
+4
-4
nixos/modules/services/networking/stunnel.nix
+4
-4
nixos/modules/services/networking/stunnel.nix
···-See "SERVICE-LEVEL OPTIONS" in <citerefentry><refentrytitle>stunnel</refentrytitle><manvolnum>8</manvolnum></citerefentry>.···-See "SERVICE-LEVEL OPTIONS" in <citerefentry><refentrytitle>stunnel</refentrytitle><manvolnum>8</manvolnum></citerefentry>.
······
+2
-2
nixos/modules/services/networking/unbound.nix
+2
-2
nixos/modules/services/networking/unbound.nix
+4
-4
nixos/modules/services/networking/wpa_supplicant.nix
+4
-4
nixos/modules/services/networking/wpa_supplicant.nix
···-<citerefentry><refentrytitle>wpa_supplicant.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry>···-<citerefentry><refentrytitle>wpa_supplicant.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry>
······
+12
-12
nixos/modules/services/networking/znc/default.nix
+12
-12
nixos/modules/services/networking/znc/default.nix
·····················default = true; # TODO: Default to true when config is set, make sure to not delete the old config if present···
·····················default = true; # TODO: Default to true when config is set, make sure to not delete the old config if present···
+4
-4
nixos/modules/services/security/usbguard.nix
+4
-4
nixos/modules/services/security/usbguard.nix
···-For more details see <citerefentry><refentrytitle>usbguard-rules.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry>.
···
+5
-5
nixos/modules/services/system/kerberos/default.nix
+5
-5
nixos/modules/services/system/kerberos/default.nix
·········
·········
+3
-3
nixos/modules/services/system/nscd.nix
+3
-3
nixos/modules/services/system/nscd.nix
·········
·········
+4
-4
nixos/modules/services/ttys/getty.nix
+4
-4
nixos/modules/services/ttys/getty.nix
···-See <citerefentry><refentrytitle>agetty</refentrytitle><manvolnum>1</manvolnum></citerefentry> for details,
···
+35
-35
nixos/modules/services/web-apps/bookstack.nix
+35
-35
nixos/modules/services/web-apps/bookstack.nix
······The root URL that you want to host BookStack on. All URLs in BookStack will be generated using this value.-If you change this in the future you may need to run a command to update stored URLs in the database. Command example: <literal>php artisan bookstack:update-url https://old.example.com https://new.example.com</literal>·····················
······The root URL that you want to host BookStack on. All URLs in BookStack will be generated using this value.+If you change this in the future you may need to run a command to update stored URLs in the database. Command example: `php artisan bookstack:update-url https://old.example.com https://new.example.com`·····················
+3
-3
nixos/modules/services/web-apps/fluidd.nix
+3
-3
nixos/modules/services/web-apps/fluidd.nix
·········
·········
+8
-8
nixos/modules/services/web-apps/jirafeau.nix
+8
-8
nixos/modules/services/web-apps/jirafeau.nix
···············
···············
+16
-16
nixos/modules/services/web-apps/limesurvey.nix
+16
-16
nixos/modules/services/web-apps/limesurvey.nix
·········-Apache configuration can be done by adapting <literal>services.httpd.virtualHosts.<name></literal>.······
···············
+8
-8
nixos/modules/services/web-apps/matomo.nix
+8
-8
nixos/modules/services/web-apps/matomo.nix
·········-make sure though that you run <literal>systemctl start matomo-archive-processing.service</literal>······With this option, you can customize an nginx virtualHost which already has sensible defaults for Matomo.
···············With this option, you can customize an nginx virtualHost which already has sensible defaults for Matomo.
+27
-27
nixos/modules/services/web-apps/mediawiki.nix
+27
-27
nixos/modules/services/web-apps/mediawiki.nix
············-description = "Database engine to use. MySQL/MariaDB is the database of choice by MediaWiki developers.";·········-settings, see <link xlink:href="https://www.mediawiki.org/wiki/Manual:Configuration_settings"/>.
············+description = lib.mdDoc "Database engine to use. MySQL/MariaDB is the database of choice by MediaWiki developers.";·········
+17
-17
nixos/modules/services/web-apps/moodle.nix
+17
-17
nixos/modules/services/web-apps/moodle.nix
···Specifies the initial password for the admin, i.e. the password assigned if the user does not already exist.The password specified here is world-readable in the Nix store, so it should be changed promptly.··················
···Specifies the initial password for the admin, i.e. the password assigned if the user does not already exist.The password specified here is world-readable in the Nix store, so it should be changed promptly.··················
+38
-38
nixos/modules/services/web-apps/snipe-it.nix
+38
-38
nixos/modules/services/web-apps/snipe-it.nix
······The root URL that you want to host Snipe-IT on. All URLs in Snipe-IT will be generated using this value.If you change this in the future you may need to run a command to update stored URLs in the database.-Command example: <literal>snipe-it snipe-it:update-url https://old.example.com https://new.example.com</literal>·····················
······The root URL that you want to host Snipe-IT on. All URLs in Snipe-IT will be generated using this value.If you change this in the future you may need to run a command to update stored URLs in the database.+Command example: `snipe-it snipe-it:update-url https://old.example.com https://new.example.com`·····················
+24
-24
nixos/modules/services/web-apps/wordpress.nix
+24
-24
nixos/modules/services/web-apps/wordpress.nix
·····················-Further nginx configuration can be done by adapting <literal>services.nginx.virtualHosts.<name></literal>.-Further apache2 configuration can be done by adapting <literal>services.httpd.virtualHosts.<name></literal>.
·····················
+18
-18
nixos/modules/services/web-apps/zabbix.nix
+18
-18
nixos/modules/services/web-apps/zabbix.nix
···············-Apache configuration can be done by adapting <literal>services.httpd.virtualHosts.<name></literal>.···-Options for the Zabbix PHP pool. See the documentation on <literal>php-fpm.conf</literal> for details on configuration directives.
··················+Options for the Zabbix PHP pool. See the documentation on `php-fpm.conf` for details on configuration directives.
+29
-29
nixos/modules/services/web-servers/apache-httpd/default.nix
+29
-29
nixos/modules/services/web-servers/apache-httpd/default.nix
·······································
·······································
+35
-35
nixos/modules/services/web-servers/apache-httpd/vhost-options.nix
+35
-35
nixos/modules/services/web-servers/apache-httpd/vhost-options.nix
························-Whether to enable HTTP 2. HTTP/2 is supported in all multi-processing modules that come with httpd. <emphasis>However, if you use the prefork mpm, there will-be severe restrictions.</emphasis> Refer to <link xlink:href="https://httpd.apache.org/docs/2.4/howto/http2.html#mpm-config"/> for details.·····················-Specification of pages to be ignored by web crawlers. See <link xlink:href="http://www.robotstxt.org/"/> for details.···-Declarative location config. See <link xlink:href="https://httpd.apache.org/docs/2.4/mod/core.html#location"/> for details.
························+Whether to enable HTTP 2. HTTP/2 is supported in all multi-processing modules that come with httpd. *However, if you use the prefork mpm, there will+be severe restrictions.* Refer to <https://httpd.apache.org/docs/2.4/howto/http2.html#mpm-config> for details.·····················+Specification of pages to be ignored by web crawlers. See <http://www.robotstxt.org/> for details.···+Declarative location config. See <https://httpd.apache.org/docs/2.4/mod/core.html#location> for details.
+15
-15
nixos/modules/services/web-servers/caddy/default.nix
+15
-15
nixos/modules/services/web-servers/caddy/default.nix
············-Use saved config, if any (and prefer over any specified configuration passed with <literal>--config</literal>).···············
············+Use saved config, if any (and prefer over any specified configuration passed with `--config`).···············
+7
-7
nixos/modules/services/web-servers/caddy/vhost-options.nix
+7
-7
nixos/modules/services/web-servers/caddy/vhost-options.nix
·········
·········
+2
-2
nixos/modules/services/web-servers/hydron.nix
+2
-2
nixos/modules/services/web-servers/hydron.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.
+29
-29
nixos/modules/services/web-servers/nginx/default.nix
+29
-29
nixos/modules/services/web-servers/nginx/default.nix
···-Additional <link xlink:href="https://www.nginx.com/resources/wiki/modules/">third-party nginx modules</link>············default = "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384";······························
···············default = "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384";······························
+13
-13
nixos/modules/services/web-servers/nginx/location-options.nix
+13
-13
nixos/modules/services/web-servers/nginx/location-options.nix
····································
····································
+40
-40
nixos/modules/services/web-servers/nginx/vhost-options.nix
+40
-40
nixos/modules/services/web-servers/nginx/vhost-options.nix
······-extraParameters = mkOption { type = listOf str; description = "Extra parameters of this listen directive."; default = []; example = [ "backlog=1024" "deferred" ]; };···················································
······+extraParameters = mkOption { type = listOf str; description = lib.mdDoc "Extra parameters of this listen directive."; default = []; example = [ "backlog=1024" "deferred" ]; };···················································
+10
-10
nixos/modules/services/x11/desktop-managers/default.nix
+10
-10
nixos/modules/services/x11/desktop-managers/default.nix
···-<literal>center</literal>: Center the image on the background. If it is too small, it will be surrounded by a black border.-<literal>fill</literal>: Like <literal>scale</literal>, but preserves aspect ratio by zooming the image until it fits. Either a horizontal or a vertical part of the image will be cut off.-<literal>max</literal>: Like <literal>fill</literal>, but scale the image to the maximum size that fits the screen with black borders on one side.-<literal>scale</literal>: Fit the file into the background without repeating it, cutting off stuff or using borders. But the aspect ratio is not preserved either.
···+`center`: Center the image on the background. If it is too small, it will be surrounded by a black border.+`fill`: Like `scale`, but preserves aspect ratio by zooming the image until it fits. Either a horizontal or a vertical part of the image will be cut off.+`max`: Like `fill`, but scale the image to the maximum size that fits the screen with black borders on one side.+`scale`: Fit the file into the background without repeating it, cutting off stuff or using borders. But the aspect ratio is not preserved either.
+8
-8
nixos/modules/services/x11/display-managers/lightdm.nix
+8
-8
nixos/modules/services/x11/display-managers/lightdm.nix
············defaultText = literalExpression "pkgs.nixos-artwork.wallpapers.simple-dark-gray-bottom.gnomeFilePath";···
············defaultText = literalExpression "pkgs.nixos-artwork.wallpapers.simple-dark-gray-bottom.gnomeFilePath";···
+52
-52
nixos/modules/services/x11/xserver.nix
+52
-52
nixos/modules/services/x11/xserver.nix
···-<citerefentry><refentrytitle>xrandr</refentrytitle><manvolnum>1</manvolnum></citerefentry> invoked without arguments.···············Sets the autorepeat delay (length of time in milliseconds that a key must be depressed before autorepeat starts).···Sets the autorepeat interval (length of time in milliseconds that should elapse between autorepeat-generated keystrokes).···-description = "Content of additional InputClass sections of the X server configuration file.";···························-description = "Contents of the first <literal>Files</literal> section of the X server configuration file.";··················-The default of <literal>/dev/null</literal> is set so that systemd services (like <literal>displayManagers</literal>) only log to the journal and don't create their own log files.-Setting this to <literal>null</literal> will not pass the <literal>-logfile</literal> argument to Xorg which allows it to log to its default logfile locations instead (see <literal>man Xorg</literal>). You probably only want this behaviour when running Xorg manually (e.g. via <literal>startx</literal>).············
··················Sets the autorepeat delay (length of time in milliseconds that a key must be depressed before autorepeat starts).···Sets the autorepeat interval (length of time in milliseconds that should elapse between autorepeat-generated keystrokes).···+description = lib.mdDoc "Content of additional InputClass sections of the X server configuration file.";···························+description = lib.mdDoc "Contents of the first `Files` section of the X server configuration file.";+description = lib.mdDoc "Contents of the first Device section of the X server configuration file.";···+description = lib.mdDoc "Contents of the first Screen section of the X server configuration file.";+description = lib.mdDoc "Contents of the first Monitor section of the X server configuration file.";+description = lib.mdDoc "Additional contents (sections) included in the X server configuration file";···+description = lib.mdDoc "Contents of the ServerFlags section of the X server configuration file.";······+description = lib.mdDoc "Contents of the ServerLayout section of the X server configuration file.";+description = lib.mdDoc "Lines to be added to every Display subsection of the Screen section.";······+The default of `/dev/null` is set so that systemd services (like `displayManagers`) only log to the journal and don't create their own log files.+Setting this to `null` will not pass the `-logfile` argument to Xorg which allows it to log to its default logfile locations instead (see `man Xorg`). You probably only want this behaviour when running Xorg manually (e.g. via `startx`).············
+13
-13
nixos/modules/system/activation/top-level.nix
+13
-13
nixos/modules/system/activation/top-level.nix
···-description = "Include the entire system's configuration. Set to false to make a completely differently configured system.";··················
···+description = lib.mdDoc "Include the entire system's configuration. Set to false to make a completely differently configured system.";··················
+7
-7
nixos/modules/system/boot/loader/generic-extlinux-compatible/default.nix
+7
-7
nixos/modules/system/boot/loader/generic-extlinux-compatible/default.nix
···-See <link xlink:href="http://git.denx.de/?p=u-boot.git;a=blob;f=doc/README.distro;hb=refs/heads/master">U-boot's documentation</link>·········
···+See [U-boot's documentation](http://git.denx.de/?p=u-boot.git;a=blob;f=doc/README.distro;hb=refs/heads/master)·········
+3
-3
nixos/modules/system/boot/modprobe.nix
+3
-3
nixos/modules/system/boot/modprobe.nix
···-<citerefentry><refentrytitle>modprobe.d</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.
···
+141
-141
nixos/modules/system/boot/networkd.nix
+141
-141
nixos/modules/system/boot/networkd.nix
···-See <citerefentry><refentrytitle>networkd.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-See <citerefentry><refentrytitle>networkd.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-See <citerefentry><refentrytitle>networkd.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.link</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.netdev</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.netdev</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.netdev</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.-<citerefentry><refentrytitle>systemd.netdev</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.netdev</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.netdev</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.netdev</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.netdev</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.netdev</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.netdev</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.netdev</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.netdev</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.netdev</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.netdev</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.-<link xlink:href="https://www.kernel.org/doc/Documentation/networking/vrf.txt">kernel docs</link>.···-<citerefentry><refentrytitle>systemd.netdev</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···example = [ { dhcpServerStaticLeaseConfig = { MACAddress = "65:43:4a:5b:d8:5f"; Address = "192.168.1.42"; }; } ];-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-unit. See <citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.-unit. See <citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.-unit. See <citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.-unit. See <citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.-unit. See <citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.-unit. See <citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.-unit. See <citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.-unit. See <citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.-unit. See <citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.-unit. See <citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.-unit. See <citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.-unit. See <citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-See <citerefentry><refentrytitle>networkd.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.
···································································································example = [ { dhcpServerStaticLeaseConfig = { MACAddress = "65:43:4a:5b:d8:5f"; Address = "192.168.1.42"; }; } ];·········
+9
-9
nixos/modules/system/boot/systemd/nspawn.nix
+9
-9
nixos/modules/system/boot/systemd/nspawn.nix
···-<citerefentry><refentrytitle>systemd.nspawn</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.nspawn</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.nspawn</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.
·········
+4
-4
nixos/modules/tasks/auto-upgrade.nix
+4
-4
nixos/modules/tasks/auto-upgrade.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>
······
+3
-3
nixos/modules/tasks/filesystems/btrfs.nix
+3
-3
nixos/modules/tasks/filesystems/btrfs.nix
···-(<citerefentry><refentrytitle>btrfs-scrub</refentrytitle><manvolnum>8</manvolnum></citerefentry>).-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>
···
+4
-4
nixos/modules/tasks/filesystems/zfs.nix
+4
-4
nixos/modules/tasks/filesystems/zfs.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.
······
+4
-4
nixos/modules/tasks/network-interfaces.nix
+4
-4
nixos/modules/tasks/network-interfaces.nix
···-endpoints. See <citerefentry><refentrytitle>ip-fou</refentrytitle><manvolnum>8</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>ip-link</refentrytitle><manvolnum>8</manvolnum></citerefentry> for details.
······
+3
-3
nixos/modules/virtualisation/azure-agent.nix
+3
-3
nixos/modules/virtualisation/azure-agent.nix
···-description = "Whether the agent should format (ext4) and mount the resource disk to /mnt/resource.";
···+description = lib.mdDoc "Whether the agent should format (ext4) and mount the resource disk to /mnt/resource.";
+2
-2
nixos/modules/virtualisation/docker.nix
+2
-2
nixos/modules/virtualisation/docker.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>) of the time at
+4
-4
nixos/modules/virtualisation/lxc.nix
+4
-4
nixos/modules/virtualisation/lxc.nix
···-<citerefentry><refentrytitle>lxc.system.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry>.···-network config. See <citerefentry><refentrytitle>lxc.container.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry>.
······
+2
-2
nixos/modules/virtualisation/nixos-containers.nix
+2
-2
nixos/modules/virtualisation/nixos-containers.nix
···-See <citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>
···
+9
-9
nixos/modules/virtualisation/podman/default.nix
+9
-9
nixos/modules/virtualisation/podman/default.nix
············
············
+7
-7
nixos/modules/virtualisation/podman/network-socket.nix
+7
-7
nixos/modules/virtualisation/podman/network-socket.nix
·········
·········
+43
-43
nixos/modules/virtualisation/qemu-vm.nix
+43
-43
nixos/modules/virtualisation/qemu-vm.nix
··························································································
··························································································