+4
-4
nixos/modules/config/sysctl.nix
+4
-4
nixos/modules/config/sysctl.nix
···-<citerefentry><refentrytitle>sysctl</refentrytitle><manvolnum>8</manvolnum></citerefentry>. Note that sysctl
+5
-5
nixos/modules/config/system-environment.nix
+5
-5
nixos/modules/config/system-environment.nix
···-<citerefentry><refentrytitle>pam_env.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry>.
+19
-19
nixos/modules/installer/cd-dvd/iso-image.nix
+19
-19
nixos/modules/installer/cd-dvd/iso-image.nix
············default = "nixos${optionalString (config.isoImage.edition != "") "-${config.isoImage.edition}"}-${config.system.nixos.release}-${pkgs.stdenv.hostPlatform.uname.processor}";···············url = "https://raw.githubusercontent.com/NixOS/nixos-artwork/a9e05d7deb38a8e005a2b52575a3f59a63a4dba0/bootloader/efi-background.png";···url = "https://raw.githubusercontent.com/NixOS/nixos-artwork/a9e05d7deb38a8e005a2b52575a3f59a63a4dba0/bootloader/isolinux/bios-boot.png";·········
+1
-1
nixos/modules/installer/netboot/netboot.nix
+1
-1
nixos/modules/installer/netboot/netboot.nix
+14
-14
nixos/modules/misc/documentation.nix
+14
-14
nixos/modules/misc/documentation.nix
·····················
+4
-4
nixos/modules/misc/locate.nix
+4
-4
nixos/modules/misc/locate.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.
+25
-25
nixos/modules/misc/nixpkgs.nix
+25
-25
nixos/modules/misc/nixpkgs.nix
·····················-or fall back to removing the <option>nixpkgs.hostPlatform</option> line from the generated config.
+3
-3
nixos/modules/profiles/clone-config.nix
+3
-3
nixos/modules/profiles/clone-config.nix
······
+2
-2
nixos/modules/security/acme/default.nix
+2
-2
nixos/modules/security/acme/default.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.
+5
-5
nixos/modules/security/apparmor.nix
+5
-5
nixos/modules/security/apparmor.nix
·········
+8
-8
nixos/modules/security/pam.nix
+8
-8
nixos/modules/security/pam.nix
············
+8
-8
nixos/modules/security/systemd-confinement.nix
+8
-8
nixos/modules/security/systemd-confinement.nix
······-<citerefentry><refentrytitle>system</refentrytitle><manvolnum>3</manvolnum></citerefentry> library function to execute commands.
+6
-6
nixos/modules/services/backup/borgbackup.nix
+6
-6
nixos/modules/services/backup/borgbackup.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.···-<citerefentry><refentrytitle>systemd.timer</refentrytitle><manvolnum>5</manvolnum></citerefentry>
+10
-10
nixos/modules/services/backup/duplicity.nix
+10
-10
nixos/modules/services/backup/duplicity.nix
···-section in <citerefentry><refentrytitle>duplicity</refentrytitle><manvolnum>1</manvolnum></citerefentry> for details on the syntax.-<citerefentry><refentrytitle>duplicity</refentrytitle><manvolnum>1</manvolnum></citerefentry> for details on the syntax.-<citerefentry><refentrytitle>duplicity</refentrytitle><manvolnum>1</manvolnum></citerefentry> for supported urls.···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry> for the format).···
+2
-2
nixos/modules/services/backup/sanoid.nix
+2
-2
nixos/modules/services/backup/sanoid.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.
+2
-2
nixos/modules/services/backup/syncoid.nix
+2
-2
nixos/modules/services/backup/syncoid.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.
+2
-2
nixos/modules/services/backup/tarsnap.nix
+2
-2
nixos/modules/services/backup/tarsnap.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.
+17
-17
nixos/modules/services/cluster/hadoop/default.nix
+17
-17
nixos/modules/services/cluster/hadoop/default.nix
···-<link xlink:href="https://hadoop.apache.org/docs/current/hadoop-project-dist/hadoop-common/core-default.xml"/>······-<link xlink:href="https://hadoop.apache.org/docs/current/hadoop-project-dist/hadoop-hdfs/hdfs-default.xml"/>······-<link xlink:href="https://hadoop.apache.org/docs/current/hadoop-mapreduce-client/hadoop-mapreduce-client-core/mapred-default.xml"/>+<https://hadoop.apache.org/docs/current/hadoop-mapreduce-client/hadoop-mapreduce-client-core/mapred-default.xml>···"yarn.resourcemanager.scheduler.class" = "org.apache.hadoop.yarn.server.resourcemanager.scheduler.fair.FairScheduler";···-<link xlink:href="https://hadoop.apache.org/docs/current/hadoop-yarn/hadoop-yarn-common/yarn-default.xml"/>···-<link xlink:href="https://hadoop.apache.org/docs/current/hadoop-hdfs-httpfs/httpfs-default.html"/>······-<link xlink:href="https://hadoop.apache.org/docs/r2.7.2/hadoop-yarn/hadoop-yarn-site/SecureContainer.html"/>···-description = "Directories containing additional config files to be added to HADOOP_CONF_DIR";+description = lib.mdDoc "Directories containing additional config files to be added to HADOOP_CONF_DIR";
+3
-3
nixos/modules/services/computing/slurm/slurm.nix
+3
-3
nixos/modules/services/computing/slurm/slurm.nix
···-<citerefentry><refentrytitle>slurmdbd.conf</refentrytitle><manvolnum>8</manvolnum></citerefentry>.
+4
-4
nixos/modules/services/databases/rethinkdb.nix
+4
-4
nixos/modules/services/databases/rethinkdb.nix
···+description = lib.mdDoc "Location where RethinkDB stores its data, 1 data directory per instance.";
+6
-6
nixos/modules/services/desktops/pipewire/pipewire-media-session.nix
+6
-6
nixos/modules/services/desktops/pipewire/pipewire-media-session.nix
······https://gitlab.freedesktop.org/pipewire/media-session/-/blob/${cfg.package.version}/src/daemon/media-session.d/media-session.conf···https://gitlab.freedesktop.org/pipewire/media-session/-/blob/${cfg.package.version}/src/daemon/media-session.d/alsa-monitor.conf···https://gitlab.freedesktop.org/pipewire/media-session/-/blob/${cfg.package.version}/src/daemon/media-session.d/bluez-monitor.conf···https://gitlab.freedesktop.org/pipewire/media-session/-/blob/${cfg.package.version}/src/daemon/media-session.d/v4l2-monitor.conf
+9
-9
nixos/modules/services/development/jupyter/default.nix
+9
-9
nixos/modules/services/development/jupyter/default.nix
·····················Use this if you want to create a group of users that are able to view the notebook directory's content.······
+6
-6
nixos/modules/services/development/jupyter/kernel-options.nix
+6
-6
nixos/modules/services/development/jupyter/kernel-options.nix
··················example = literalExpression ''"{ examples = ''${env.sitePack}/IRkernel/kernelspec/kernel.js"; }'';
+9
-9
nixos/modules/services/development/jupyterhub/default.nix
+9
-9
nixos/modules/services/development/jupyterhub/default.nix
···························
+2
-2
nixos/modules/services/hardware/pcscd.nix
+2
-2
nixos/modules/services/hardware/pcscd.nix
···-See <citerefentry><refentrytitle>reader.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry> for valid options.
+2
-2
nixos/modules/services/logging/awstats.nix
+2
-2
nixos/modules/services/logging/awstats.nix
···-(in the format described by <citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>)
+2
-2
nixos/modules/services/mail/mlmmj.nix
+2
-2
nixos/modules/services/mail/mlmmj.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry> for format information.
+2
-2
nixos/modules/services/mail/postfix.nix
+2
-2
nixos/modules/services/mail/postfix.nix
···-Entries for the <citerefentry><refentrytitle>canonical</refentrytitle><manvolnum>5</manvolnum></citerefentry> table.
+19
-19
nixos/modules/services/matrix/mjolnir.nix
+19
-19
nixos/modules/services/matrix/mjolnir.nix
···-If <literal>pantalaimon.enable</literal> is <literal>true</literal>, this option will become the homeserver to which <literal>pantalaimon</literal> connects.-The listen address of <literal>pantalaimon</literal> will then become the <literal>homeserverUrl</literal> of <literal>mjolnir</literal>.+If `pantalaimon.enable` is `true`, this option will become the homeserver to which `pantalaimon` connects.···············-Additional settings (see <link xlink:href="https://github.com/matrix-org/mjolnir/blob/main/config/default.yaml">mjolnir default config</link> for available settings). These settings will override settings made by the module config.+Additional settings (see [mjolnir default config](https://github.com/matrix-org/mjolnir/blob/main/config/default.yaml) for available settings). These settings will override settings made by the module config.
+10
-10
nixos/modules/services/matrix/pantalaimon-options.nix
+10
-10
nixos/modules/services/matrix/pantalaimon-options.nix
···-The directory where <literal>pantalaimon</literal> should store its state such as the database file.···············-<link xlink:href="https://github.com/matrix-org/pantalaimon/blob/master/docs/man/pantalaimon.5.md">pantalaimon(5)</link>+[pantalaimon(5)](https://github.com/matrix-org/pantalaimon/blob/master/docs/man/pantalaimon.5.md)
+2
-2
nixos/modules/services/matrix/pantalaimon.nix
+2
-2
nixos/modules/services/matrix/pantalaimon.nix
···-support End-to-end encryption (like <literal>fractal</literal>), refer to the home-manager module.
+41
-41
nixos/modules/services/matrix/synapse.nix
+41
-41
nixos/modules/services/matrix/synapse.nix
·······································defaultText = "${cfg.dataDir}/media_store for when system.stateVersion is at least 22.05, ${cfg.dataDir}/media when lower than 22.05";····················································································
+2
-2
nixos/modules/services/misc/autorandr.nix
+2
-2
nixos/modules/services/misc/autorandr.nix
···
+2
-2
nixos/modules/services/misc/docker-registry.nix
+2
-2
nixos/modules/services/misc/docker-registry.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>) of the time at
+2
-2
nixos/modules/services/misc/fstrim.nix
+2
-2
nixos/modules/services/misc/fstrim.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.
+2
-2
nixos/modules/services/misc/geoipupdate.nix
+2
-2
nixos/modules/services/misc/geoipupdate.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.
+2
-2
nixos/modules/services/misc/gitea.nix
+2
-2
nixos/modules/services/misc/gitea.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.
+52
-52
nixos/modules/services/misc/gitit.nix
+52
-52
nixos/modules/services/misc/gitit.nix
······························default = "https://d3eoax9i5htok0.cloudfront.net/mathjax/latest/MathJax.js?config=TeX-AMS-MML_HTMLorMML";·········type = types.enum [ "DEBUG" "INFO" "NOTICE" "WARNING" "ERROR" "CRITICAL" "ALERT" "EMERGENCY" ];·····································································
+2
-2
nixos/modules/services/misc/gitlab.nix
+2
-2
nixos/modules/services/misc/gitlab.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.
+11
-11
nixos/modules/services/misc/nix-daemon.nix
+11
-11
nixos/modules/services/misc/nix-daemon.nix
···-<citerefentry><refentrytitle>systemd.resource-control</refentrytitle><manvolnum>5</manvolnum></citerefentry> and adjust
+4
-4
nixos/modules/services/misc/nix-gc.nix
+4
-4
nixos/modules/services/misc/nix-gc.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>
+2
-2
nixos/modules/services/misc/nix-optimise.nix
+2
-2
nixos/modules/services/misc/nix-optimise.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>) of the time at
+4
-4
nixos/modules/services/misc/snapper.nix
+4
-4
nixos/modules/services/misc/snapper.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.
+89
-89
nixos/modules/services/misc/sourcehut/default.nix
+89
-89
nixos/modules/services/misc/sourcehut/default.nix
···migrate-on-upgrade = mkEnableOption "automatic migrations on package upgrade" // { default = true; };·········+description = lib.mdDoc "Virtual-host configuration merged with all Sourcehut's virtual-hosts.";···-to a secret key to encrypt internal messages with. Use <literal>srht-keygen network</literal> to··········································+description = lib.mdDoc ".hg/store size (in MB) past which the nightly job generates clone bundles.";············defaultText = ''http://<xref linkend="opt-services.sourcehut.listenAddress"/>:''${toString (<xref linkend="opt-services.sourcehut.meta.port"/> + 100)}'';···························Images for builds.sr.ht. Each package should be distro.release.arch and point to a /nix/store/package/root.img.qcow2.······Generate clonebundles (which require more disk space but dramatically speed up cloning large repositories).···+description = lib.mdDoc "Extra arguments passed to the Celery responsible for processing mails.";-description = "Content of the <literal>celeryconfig.py</literal> used by the Celery of <literal>listssrht-process</literal>.";+description = lib.mdDoc "Content of the `celeryconfig.py` used by the Celery of `listssrht-process`.";
+9
-9
nixos/modules/services/misc/sourcehut/service.nix
+9
-9
nixos/modules/services/misc/sourcehut/service.nix
···············-used if <xref linkend="opt-services.sourcehut.postgresql.enable"/> is <literal>true</literal>.······-description = "Content of the <literal>celeryconfig.py</literal> used by the Celery responsible for webhooks.";+description = lib.mdDoc "Content of the `celeryconfig.py` used by the Celery responsible for webhooks.";
+8
-8
nixos/modules/services/misc/taskserver/default.nix
+8
-8
nixos/modules/services/misc/taskserver/default.nix
···-Size of the connection backlog, see <citerefentry><refentrytitle>listen</refentrytitle><manvolnum>2</manvolnum></citerefentry>.···-<citerefentry><refentrytitle>taskdrc</refentrytitle><manvolnum>5</manvolnum></citerefentry>, but with one difference:
+5
-5
nixos/modules/services/monitoring/nagios.nix
+5
-5
nixos/modules/services/monitoring/nagios.nix
···-description = "if true, the syntax of the nagios configuration file is checked at build time";+description = lib.mdDoc "if true, the syntax of the nagios configuration file is checked at build time";···
+7
-7
nixos/modules/services/monitoring/prometheus/exporters.nix
+7
-7
nixos/modules/services/monitoring/prometheus/exporters.nix
·········
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/apcupsd.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/apcupsd.nix
······
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/artifactory.nix
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/artifactory.nix
·········
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/bind.nix
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/bind.nix
···
+3
-3
nixos/modules/services/monitoring/prometheus/exporters/bird.nix
+3
-3
nixos/modules/services/monitoring/prometheus/exporters/bird.nix
···
+7
-7
nixos/modules/services/monitoring/prometheus/exporters/bitcoin.nix
+7
-7
nixos/modules/services/monitoring/prometheus/exporters/bitcoin.nix
··················
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/blackbox.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/blackbox.nix
···
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/buildkite-agent.nix
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/buildkite-agent.nix
·········
+6
-6
nixos/modules/services/monitoring/prometheus/exporters/collectd.nix
+6
-6
nixos/modules/services/monitoring/prometheus/exporters/collectd.nix
············
+11
-11
nixos/modules/services/monitoring/prometheus/exporters/dmarc.nix
+11
-11
nixos/modules/services/monitoring/prometheus/exporters/dmarc.nix
···············
+3
-3
nixos/modules/services/monitoring/prometheus/exporters/dnsmasq.nix
+3
-3
nixos/modules/services/monitoring/prometheus/exporters/dnsmasq.nix
······
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/dovecot.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/dovecot.nix
······
+3
-3
nixos/modules/services/monitoring/prometheus/exporters/fastly.nix
+3
-3
nixos/modules/services/monitoring/prometheus/exporters/fastly.nix
······
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/flow.nix
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/flow.nix
······
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/fritzbox.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/fritzbox.nix
······
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/influxdb.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/influxdb.nix
···
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/jitsi.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/jitsi.nix
······
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/json.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/json.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/kea.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/kea.nix
+3
-3
nixos/modules/services/monitoring/prometheus/exporters/knot.nix
+3
-3
nixos/modules/services/monitoring/prometheus/exporters/knot.nix
···-Socket path of <citerefentry><refentrytitle>knotd</refentrytitle><manvolnum>8</manvolnum></citerefentry>.
+3
-3
nixos/modules/services/monitoring/prometheus/exporters/lnd.nix
+3
-3
nixos/modules/services/monitoring/prometheus/exporters/lnd.nix
···
+15
-15
nixos/modules/services/monitoring/prometheus/exporters/mail.nix
+15
-15
nixos/modules/services/monitoring/prometheus/exporters/mail.nix
············
+5
-5
nixos/modules/services/monitoring/prometheus/exporters/mikrotik.nix
+5
-5
nixos/modules/services/monitoring/prometheus/exporters/mikrotik.nix
······
+6
-6
nixos/modules/services/monitoring/prometheus/exporters/minio.nix
+6
-6
nixos/modules/services/monitoring/prometheus/exporters/minio.nix
······
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/modemmanager.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/modemmanager.nix
···
+5
-5
nixos/modules/services/monitoring/prometheus/exporters/nextcloud.nix
+5
-5
nixos/modules/services/monitoring/prometheus/exporters/nextcloud.nix
·········
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/nginx.nix
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/nginx.nix
·········
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/nginxlog.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/nginxlog.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/node.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/node.nix
······
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/openldap.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/openldap.nix
······
+3
-3
nixos/modules/services/monitoring/prometheus/exporters/openvpn.nix
+3
-3
nixos/modules/services/monitoring/prometheus/exporters/openvpn.nix
···
+6
-6
nixos/modules/services/monitoring/prometheus/exporters/pihole.nix
+6
-6
nixos/modules/services/monitoring/prometheus/exporters/pihole.nix
··················
+11
-11
nixos/modules/services/monitoring/prometheus/exporters/postfix.nix
+11
-11
nixos/modules/services/monitoring/prometheus/exporters/postfix.nix
············
+3
-3
nixos/modules/services/monitoring/prometheus/exporters/postgres.nix
+3
-3
nixos/modules/services/monitoring/prometheus/exporters/postgres.nix
······
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/process.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/process.nix
···{ name = "{{.Matches.Wrapped}} {{ .Matches.Args }}"; cmdline = [ "^/nix/store[^ ]*/(?P<Wrapped>[^ /]*) (?P<Args>.*)" ]; }-settings that can all be used here: <link xlink:href="https://github.com/ncabatoff/process-exporter"/>
+9
-9
nixos/modules/services/monitoring/prometheus/exporters/pve.nix
+9
-9
nixos/modules/services/monitoring/prometheus/exporters/pve.nix
······Path to the service's environment file. This path can either be a computed path in /nix/store or a path in the local filesystem.The environment file should NOT be stored in /nix/store as it contains passwords and/or keys in plain text.···Path to the service's config file. This path can either be a computed path in /nix/store or a path in the local filesystem.The config file should NOT be stored in /nix/store as it will contain passwords and/or keys in plain text.···
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/py-air-control.nix
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/py-air-control.nix
······
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/rspamd.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/rspamd.nix
+6
-6
nixos/modules/services/monitoring/prometheus/exporters/rtl_433.nix
+6
-6
nixos/modules/services/monitoring/prometheus/exporters/rtl_433.nix
·········-Having <literal>-C si</literal> (the default) is recommended since only Celsius temperatures are parsed.······
+5
-5
nixos/modules/services/monitoring/prometheus/exporters/script.nix
+5
-5
nixos/modules/services/monitoring/prometheus/exporters/script.nix
······-settings that can all be used here: <link xlink:href="https://github.com/adhocteam/script_exporter#sample-configuration"/>+settings that can all be used here: <https://github.com/adhocteam/script_exporter#sample-configuration>
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/smartctl.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/smartctl.nix
······
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/smokeping.nix
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/smokeping.nix
···default = "5e-05,0.0001,0.0002,0.0004,0.0008,0.0016,0.0032,0.0064,0.0128,0.0256,0.0512,0.1024,0.2048,0.4096,0.8192,1.6384,3.2768,6.5536,13.1072,26.2144";
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/snmp.nix
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/snmp.nix
······Snmp exporter configuration as nix attribute set. Mutually exclusive with 'configurationPath' option.······
+12
-12
nixos/modules/services/monitoring/prometheus/exporters/sql.nix
+12
-12
nixos/modules/services/monitoring/prometheus/exporters/sql.nix
······+description = lib.mdDoc "A list of connection strings of the SQL servers to scrape metrics from";······
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/surfboard.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/surfboard.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/tor.nix
+2
-2
nixos/modules/services/monitoring/prometheus/exporters/tor.nix
······
+3
-3
nixos/modules/services/monitoring/prometheus/exporters/unbound.nix
+3
-3
nixos/modules/services/monitoring/prometheus/exporters/unbound.nix
·········
+5
-5
nixos/modules/services/monitoring/prometheus/exporters/unifi.nix
+5
-5
nixos/modules/services/monitoring/prometheus/exporters/unifi.nix
············
+8
-8
nixos/modules/services/monitoring/prometheus/exporters/varnish.nix
+8
-8
nixos/modules/services/monitoring/prometheus/exporters/varnish.nix
······
+10
-10
nixos/modules/services/monitoring/prometheus/exporters/wireguard.nix
+10
-10
nixos/modules/services/monitoring/prometheus/exporters/wireguard.nix
···-<link xlink:href="https://github.com/MindFlavor/prometheus_wireguard_exporter/tree/2.0.0#usage">add the peer's name to the stats of a peer</link>.+[add the peer's name to the stats of a peer](https://github.com/MindFlavor/prometheus_wireguard_exporter/tree/2.0.0#usage).···
+4
-4
nixos/modules/services/network-filesystems/netatalk.nix
+4
-4
nixos/modules/services/network-filesystems/netatalk.nix
···-See <citerefentry><refentrytitle>extmap.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry>. for more information.
+5
-5
nixos/modules/services/network-filesystems/nfsd.nix
+5
-5
nixos/modules/services/network-filesystems/nfsd.nix
···-<citerefentry><refentrytitle>exports</refentrytitle><manvolnum>5</manvolnum></citerefentry> for the format.
+25
-25
nixos/modules/services/network-filesystems/openafs/client.nix
+25
-25
nixos/modules/services/network-filesystems/openafs/client.nix
························
+2
-2
nixos/modules/services/network-filesystems/openafs/lib.nix
+2
-2
nixos/modules/services/network-filesystems/openafs/lib.nix
···
+22
-22
nixos/modules/services/network-filesystems/openafs/server.nix
+22
-22
nixos/modules/services/network-filesystems/openafs/server.nix
······+description = lib.mdDoc "List of IP addresses this server is advertised under. See NetInfo(5)";·····················
+2
-2
nixos/modules/services/network-filesystems/rsyncd.nix
+2
-2
nixos/modules/services/network-filesystems/rsyncd.nix
···-<citerefentry><refentrytitle>rsyncd.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry>.
+2
-2
nixos/modules/services/network-filesystems/webdav.nix
+2
-2
nixos/modules/services/network-filesystems/webdav.nix
···-Environment file as defined in <citerefentry><refentrytitle>systemd.exec</refentrytitle><manvolnum>5</manvolnum></citerefentry>.
+2
-2
nixos/modules/services/networking/avahi-daemon.nix
+2
-2
nixos/modules/services/networking/avahi-daemon.nix
···-See the <citerefentry><refentrytitle>avahi.service</refentrytitle><manvolnum>5</manvolnum></citerefentry> manpage for detailed information.
+14
-14
nixos/modules/services/networking/keepalived/default.nix
+14
-14
nixos/modules/services/networking/keepalived/default.nix
······Don't run scripts configured to be run as root if any part of the path is writable by a non-root user.·································
+5
-5
nixos/modules/services/networking/keepalived/virtual-ip-options.nix
+5
-5
nixos/modules/services/networking/keepalived/virtual-ip-options.nix
···············
+14
-14
nixos/modules/services/networking/keepalived/vrrp-instance-options.nix
+14
-14
nixos/modules/services/networking/keepalived/vrrp-instance-options.nix
·································
+9
-9
nixos/modules/services/networking/keepalived/vrrp-script-options.nix
+9
-9
nixos/modules/services/networking/keepalived/vrrp-script-options.nix
···+description = lib.mdDoc "(Path of) Script command to execute followed by args, i.e. cmd [args]...";
+4
-4
nixos/modules/services/networking/nbd.nix
+4
-4
nixos/modules/services/networking/nbd.nix
···-<citerefentry><refentrytitle>nbd-server</refentrytitle><manvolnum>5</manvolnum></citerefentry>.···-<citerefentry><refentrytitle>nbd-server</refentrytitle><manvolnum>5</manvolnum></citerefentry>.
+17
-17
nixos/modules/services/networking/networkmanager.nix
+17
-17
nixos/modules/services/networking/networkmanager.nix
···-<link xlink:href="https://developer.gnome.org/NetworkManager/stable/NetworkManager.conf.html">-<citerefentry><refentrytitle>NetworkManager.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry>···-<link xlink:href="https://developer.gnome.org/NetworkManager/stable/NetworkManager.conf.html">-<citerefentry><refentrytitle>NetworkManager.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry>···-<link xlink:href="https://developer.gnome.org/NetworkManager/stable/NetworkManager.conf.html#device-spec">-<citerefentry><refentrytitle>NetworkManager.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry>.···-<link xlink:href="https://developer.gnome.org/NetworkManager/stable/NetworkManager.conf.html">-<citerefentry><refentrytitle>NetworkManager.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry>.
+3
-3
nixos/modules/services/networking/nghttpx/backend-submodule.nix
+3
-3
nixos/modules/services/networking/nghttpx/backend-submodule.nix
·········
+2
-2
nixos/modules/services/networking/nghttpx/frontend-submodule.nix
+2
-2
nixos/modules/services/networking/nghttpx/frontend-submodule.nix
······
+10
-10
nixos/modules/services/networking/nghttpx/nghttpx-options.nix
+10
-10
nixos/modules/services/networking/nghttpx/nghttpx-options.nix
···························
+5
-5
nixos/modules/services/networking/soju.nix
+5
-5
nixos/modules/services/networking/soju.nix
······
+4
-4
nixos/modules/services/networking/ssh/sshd.nix
+4
-4
nixos/modules/services/networking/ssh/sshd.nix
···-<citerefentry><refentrytitle>sshd_config</refentrytitle><manvolnum>5</manvolnum></citerefentry>.···[ { type = "rsa"; bits = 4096; path = "/etc/ssh/ssh_host_rsa_key"; rounds = 100; openSSHFormat = true; }{ type = "ed25519"; path = "/etc/ssh/ssh_host_ed25519_key"; rounds = 100; comment = "key comment"; }-<citerefentry><refentrytitle>ssh-keygen</refentrytitle><manvolnum>1</manvolnum></citerefentry> for supported types
+3
-3
nixos/modules/services/networking/strongswan-swanctl/module.nix
+3
-3
nixos/modules/services/networking/strongswan-swanctl/module.nix
······
+4
-4
nixos/modules/services/networking/stunnel.nix
+4
-4
nixos/modules/services/networking/stunnel.nix
···-See "SERVICE-LEVEL OPTIONS" in <citerefentry><refentrytitle>stunnel</refentrytitle><manvolnum>8</manvolnum></citerefentry>.···-See "SERVICE-LEVEL OPTIONS" in <citerefentry><refentrytitle>stunnel</refentrytitle><manvolnum>8</manvolnum></citerefentry>.
+2
-2
nixos/modules/services/networking/unbound.nix
+2
-2
nixos/modules/services/networking/unbound.nix
···-See the <citerefentry><refentrytitle>unbound.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry> manpage for a list of
+4
-4
nixos/modules/services/networking/wpa_supplicant.nix
+4
-4
nixos/modules/services/networking/wpa_supplicant.nix
···-<citerefentry><refentrytitle>wpa_supplicant.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry>···-<citerefentry><refentrytitle>wpa_supplicant.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry>
+12
-12
nixos/modules/services/networking/znc/default.nix
+12
-12
nixos/modules/services/networking/znc/default.nix
·····················default = true; # TODO: Default to true when config is set, make sure to not delete the old config if present···
+4
-4
nixos/modules/services/security/usbguard.nix
+4
-4
nixos/modules/services/security/usbguard.nix
···-For more details see <citerefentry><refentrytitle>usbguard-rules.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry>.
+5
-5
nixos/modules/services/system/kerberos/default.nix
+5
-5
nixos/modules/services/system/kerberos/default.nix
·········
+3
-3
nixos/modules/services/system/nscd.nix
+3
-3
nixos/modules/services/system/nscd.nix
·········
+4
-4
nixos/modules/services/ttys/getty.nix
+4
-4
nixos/modules/services/ttys/getty.nix
···-See <citerefentry><refentrytitle>agetty</refentrytitle><manvolnum>1</manvolnum></citerefentry> for details,
+35
-35
nixos/modules/services/web-apps/bookstack.nix
+35
-35
nixos/modules/services/web-apps/bookstack.nix
······The root URL that you want to host BookStack on. All URLs in BookStack will be generated using this value.-If you change this in the future you may need to run a command to update stored URLs in the database. Command example: <literal>php artisan bookstack:update-url https://old.example.com https://new.example.com</literal>+If you change this in the future you may need to run a command to update stored URLs in the database. Command example: `php artisan bookstack:update-url https://old.example.com https://new.example.com`·····················
+3
-3
nixos/modules/services/web-apps/fluidd.nix
+3
-3
nixos/modules/services/web-apps/fluidd.nix
·········
+8
-8
nixos/modules/services/web-apps/jirafeau.nix
+8
-8
nixos/modules/services/web-apps/jirafeau.nix
···············
+16
-16
nixos/modules/services/web-apps/limesurvey.nix
+16
-16
nixos/modules/services/web-apps/limesurvey.nix
·········-Apache configuration can be done by adapting <literal>services.httpd.virtualHosts.<name></literal>.······
+8
-8
nixos/modules/services/web-apps/matomo.nix
+8
-8
nixos/modules/services/web-apps/matomo.nix
·········-make sure though that you run <literal>systemctl start matomo-archive-processing.service</literal>······With this option, you can customize an nginx virtualHost which already has sensible defaults for Matomo.
+27
-27
nixos/modules/services/web-apps/mediawiki.nix
+27
-27
nixos/modules/services/web-apps/mediawiki.nix
············-description = "Database engine to use. MySQL/MariaDB is the database of choice by MediaWiki developers.";+description = lib.mdDoc "Database engine to use. MySQL/MariaDB is the database of choice by MediaWiki developers.";·········-settings, see <link xlink:href="https://www.mediawiki.org/wiki/Manual:Configuration_settings"/>.
+17
-17
nixos/modules/services/web-apps/moodle.nix
+17
-17
nixos/modules/services/web-apps/moodle.nix
···Specifies the initial password for the admin, i.e. the password assigned if the user does not already exist.The password specified here is world-readable in the Nix store, so it should be changed promptly.··················
+38
-38
nixos/modules/services/web-apps/snipe-it.nix
+38
-38
nixos/modules/services/web-apps/snipe-it.nix
······The root URL that you want to host Snipe-IT on. All URLs in Snipe-IT will be generated using this value.If you change this in the future you may need to run a command to update stored URLs in the database.-Command example: <literal>snipe-it snipe-it:update-url https://old.example.com https://new.example.com</literal>+Command example: `snipe-it snipe-it:update-url https://old.example.com https://new.example.com`·····················
+24
-24
nixos/modules/services/web-apps/wordpress.nix
+24
-24
nixos/modules/services/web-apps/wordpress.nix
·····················-Further nginx configuration can be done by adapting <literal>services.nginx.virtualHosts.<name></literal>.-Further apache2 configuration can be done by adapting <literal>services.httpd.virtualHosts.<name></literal>.
+18
-18
nixos/modules/services/web-apps/zabbix.nix
+18
-18
nixos/modules/services/web-apps/zabbix.nix
·········else if config.${opt.database.type} == "pgsql" then config.${options.services.postgresql.port}······-Apache configuration can be done by adapting <literal>services.httpd.virtualHosts.<name></literal>.···-Options for the Zabbix PHP pool. See the documentation on <literal>php-fpm.conf</literal> for details on configuration directives.+Options for the Zabbix PHP pool. See the documentation on `php-fpm.conf` for details on configuration directives.
+29
-29
nixos/modules/services/web-servers/apache-httpd/default.nix
+29
-29
nixos/modules/services/web-servers/apache-httpd/default.nix
·······································
+35
-35
nixos/modules/services/web-servers/apache-httpd/vhost-options.nix
+35
-35
nixos/modules/services/web-servers/apache-httpd/vhost-options.nix
························-Whether to enable HTTP 2. HTTP/2 is supported in all multi-processing modules that come with httpd. <emphasis>However, if you use the prefork mpm, there will-be severe restrictions.</emphasis> Refer to <link xlink:href="https://httpd.apache.org/docs/2.4/howto/http2.html#mpm-config"/> for details.+Whether to enable HTTP 2. HTTP/2 is supported in all multi-processing modules that come with httpd. *However, if you use the prefork mpm, there will+be severe restrictions.* Refer to <https://httpd.apache.org/docs/2.4/howto/http2.html#mpm-config> for details.·····················-Specification of pages to be ignored by web crawlers. See <link xlink:href="http://www.robotstxt.org/"/> for details.+Specification of pages to be ignored by web crawlers. See <http://www.robotstxt.org/> for details.···-Declarative location config. See <link xlink:href="https://httpd.apache.org/docs/2.4/mod/core.html#location"/> for details.+Declarative location config. See <https://httpd.apache.org/docs/2.4/mod/core.html#location> for details.
+15
-15
nixos/modules/services/web-servers/caddy/default.nix
+15
-15
nixos/modules/services/web-servers/caddy/default.nix
············-Use saved config, if any (and prefer over any specified configuration passed with <literal>--config</literal>).+Use saved config, if any (and prefer over any specified configuration passed with `--config`).···············
+7
-7
nixos/modules/services/web-servers/caddy/vhost-options.nix
+7
-7
nixos/modules/services/web-servers/caddy/vhost-options.nix
·········
+2
-2
nixos/modules/services/web-servers/hydron.nix
+2
-2
nixos/modules/services/web-servers/hydron.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.
+29
-29
nixos/modules/services/web-servers/nginx/default.nix
+29
-29
nixos/modules/services/web-servers/nginx/default.nix
···-Additional <link xlink:href="https://www.nginx.com/resources/wiki/modules/">third-party nginx modules</link>············default = "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384";······························
+13
-13
nixos/modules/services/web-servers/nginx/location-options.nix
+13
-13
nixos/modules/services/web-servers/nginx/location-options.nix
····································
+40
-40
nixos/modules/services/web-servers/nginx/vhost-options.nix
+40
-40
nixos/modules/services/web-servers/nginx/vhost-options.nix
······-extraParameters = mkOption { type = listOf str; description = "Extra parameters of this listen directive."; default = []; example = [ "backlog=1024" "deferred" ]; };+extraParameters = mkOption { type = listOf str; description = lib.mdDoc "Extra parameters of this listen directive."; default = []; example = [ "backlog=1024" "deferred" ]; };···················································
+10
-10
nixos/modules/services/x11/desktop-managers/default.nix
+10
-10
nixos/modules/services/x11/desktop-managers/default.nix
···-<literal>center</literal>: Center the image on the background. If it is too small, it will be surrounded by a black border.-<literal>fill</literal>: Like <literal>scale</literal>, but preserves aspect ratio by zooming the image until it fits. Either a horizontal or a vertical part of the image will be cut off.-<literal>max</literal>: Like <literal>fill</literal>, but scale the image to the maximum size that fits the screen with black borders on one side.-<literal>scale</literal>: Fit the file into the background without repeating it, cutting off stuff or using borders. But the aspect ratio is not preserved either.+`center`: Center the image on the background. If it is too small, it will be surrounded by a black border.+`fill`: Like `scale`, but preserves aspect ratio by zooming the image until it fits. Either a horizontal or a vertical part of the image will be cut off.+`max`: Like `fill`, but scale the image to the maximum size that fits the screen with black borders on one side.+`scale`: Fit the file into the background without repeating it, cutting off stuff or using borders. But the aspect ratio is not preserved either.
+8
-8
nixos/modules/services/x11/display-managers/lightdm.nix
+8
-8
nixos/modules/services/x11/display-managers/lightdm.nix
············defaultText = literalExpression "pkgs.nixos-artwork.wallpapers.simple-dark-gray-bottom.gnomeFilePath";···
+52
-52
nixos/modules/services/x11/xserver.nix
+52
-52
nixos/modules/services/x11/xserver.nix
···-<citerefentry><refentrytitle>xrandr</refentrytitle><manvolnum>1</manvolnum></citerefentry> invoked without arguments.···············Sets the autorepeat delay (length of time in milliseconds that a key must be depressed before autorepeat starts).···Sets the autorepeat interval (length of time in milliseconds that should elapse between autorepeat-generated keystrokes).···-description = "Content of additional InputClass sections of the X server configuration file.";+description = lib.mdDoc "Content of additional InputClass sections of the X server configuration file.";···························-description = "Contents of the first <literal>Files</literal> section of the X server configuration file.";+description = lib.mdDoc "Contents of the first `Files` section of the X server configuration file.";+description = lib.mdDoc "Contents of the first Device section of the X server configuration file.";···+description = lib.mdDoc "Contents of the first Screen section of the X server configuration file.";+description = lib.mdDoc "Contents of the first Monitor section of the X server configuration file.";+description = lib.mdDoc "Additional contents (sections) included in the X server configuration file";···+description = lib.mdDoc "Contents of the ServerFlags section of the X server configuration file.";······+description = lib.mdDoc "Contents of the ServerLayout section of the X server configuration file.";+description = lib.mdDoc "Lines to be added to every Display subsection of the Screen section.";······-The default of <literal>/dev/null</literal> is set so that systemd services (like <literal>displayManagers</literal>) only log to the journal and don't create their own log files.+The default of `/dev/null` is set so that systemd services (like `displayManagers`) only log to the journal and don't create their own log files.-Setting this to <literal>null</literal> will not pass the <literal>-logfile</literal> argument to Xorg which allows it to log to its default logfile locations instead (see <literal>man Xorg</literal>). You probably only want this behaviour when running Xorg manually (e.g. via <literal>startx</literal>).+Setting this to `null` will not pass the `-logfile` argument to Xorg which allows it to log to its default logfile locations instead (see `man Xorg`). You probably only want this behaviour when running Xorg manually (e.g. via `startx`).············
+13
-13
nixos/modules/system/activation/top-level.nix
+13
-13
nixos/modules/system/activation/top-level.nix
···-description = "Include the entire system's configuration. Set to false to make a completely differently configured system.";+description = lib.mdDoc "Include the entire system's configuration. Set to false to make a completely differently configured system.";··················
+7
-7
nixos/modules/system/boot/loader/generic-extlinux-compatible/default.nix
+7
-7
nixos/modules/system/boot/loader/generic-extlinux-compatible/default.nix
···-See <link xlink:href="http://git.denx.de/?p=u-boot.git;a=blob;f=doc/README.distro;hb=refs/heads/master">U-boot's documentation</link>+See [U-boot's documentation](http://git.denx.de/?p=u-boot.git;a=blob;f=doc/README.distro;hb=refs/heads/master)·········
+3
-3
nixos/modules/system/boot/modprobe.nix
+3
-3
nixos/modules/system/boot/modprobe.nix
···-<citerefentry><refentrytitle>modprobe.d</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.
+141
-141
nixos/modules/system/boot/networkd.nix
+141
-141
nixos/modules/system/boot/networkd.nix
···-See <citerefentry><refentrytitle>networkd.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-See <citerefentry><refentrytitle>networkd.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-See <citerefentry><refentrytitle>networkd.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.link</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.netdev</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.netdev</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.netdev</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.-<citerefentry><refentrytitle>systemd.netdev</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.netdev</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.netdev</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.netdev</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.netdev</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.netdev</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.netdev</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.netdev</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.netdev</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.netdev</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.netdev</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.-<link xlink:href="https://www.kernel.org/doc/Documentation/networking/vrf.txt">kernel docs</link>.···-<citerefentry><refentrytitle>systemd.netdev</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···type = types.addCheck (types.attrsOf unitOption) check.network.sectionDHCPServerStaticLease;-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···type = types.addCheck (types.attrsOf unitOption) check.network.sectionDHCPv6PrefixDelegation;-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···example = [ { dhcpServerStaticLeaseConfig = { MACAddress = "65:43:4a:5b:d8:5f"; Address = "192.168.1.42"; }; } ];-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···example = [ { ipv6PrefixConfig = { AddressAutoconfiguration = true; OnLink = true; }; } ];-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-unit. See <citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.-unit. See <citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.-unit. See <citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.-unit. See <citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.-unit. See <citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.-unit. See <citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.-unit. See <citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.-unit. See <citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.-unit. See <citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.-unit. See <citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.-unit. See <citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.-unit. See <citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.-<citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-See <citerefentry><refentrytitle>networkd.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.
+9
-9
nixos/modules/system/boot/systemd/nspawn.nix
+9
-9
nixos/modules/system/boot/systemd/nspawn.nix
···-<citerefentry><refentrytitle>systemd.nspawn</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.nspawn</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>systemd.nspawn</refentrytitle><manvolnum>5</manvolnum></citerefentry> for details.
+4
-4
nixos/modules/tasks/auto-upgrade.nix
+4
-4
nixos/modules/tasks/auto-upgrade.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>
+3
-3
nixos/modules/tasks/filesystems/btrfs.nix
+3
-3
nixos/modules/tasks/filesystems/btrfs.nix
···-(<citerefentry><refentrytitle>btrfs-scrub</refentrytitle><manvolnum>8</manvolnum></citerefentry>).-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>
+4
-4
nixos/modules/tasks/filesystems/zfs.nix
+4
-4
nixos/modules/tasks/filesystems/zfs.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.
+4
-4
nixos/modules/tasks/network-interfaces.nix
+4
-4
nixos/modules/tasks/network-interfaces.nix
···-endpoints. See <citerefentry><refentrytitle>ip-fou</refentrytitle><manvolnum>8</manvolnum></citerefentry> for details.···-<citerefentry><refentrytitle>ip-link</refentrytitle><manvolnum>8</manvolnum></citerefentry> for details.
+3
-3
nixos/modules/virtualisation/azure-agent.nix
+3
-3
nixos/modules/virtualisation/azure-agent.nix
···-description = "Whether the agent should format (ext4) and mount the resource disk to /mnt/resource.";+description = lib.mdDoc "Whether the agent should format (ext4) and mount the resource disk to /mnt/resource.";
+2
-2
nixos/modules/virtualisation/docker.nix
+2
-2
nixos/modules/virtualisation/docker.nix
···-<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>) of the time at
+4
-4
nixos/modules/virtualisation/lxc.nix
+4
-4
nixos/modules/virtualisation/lxc.nix
···-<citerefentry><refentrytitle>lxc.system.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry>.···-network config. See <citerefentry><refentrytitle>lxc.container.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry>.
+2
-2
nixos/modules/virtualisation/nixos-containers.nix
+2
-2
nixos/modules/virtualisation/nixos-containers.nix
···-See <citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>
+9
-9
nixos/modules/virtualisation/podman/default.nix
+9
-9
nixos/modules/virtualisation/podman/default.nix
············
+7
-7
nixos/modules/virtualisation/podman/network-socket.nix
+7
-7
nixos/modules/virtualisation/podman/network-socket.nix
·········
+43
-43
nixos/modules/virtualisation/qemu-vm.nix
+43
-43
nixos/modules/virtualisation/qemu-vm.nix
··························································································