+2
-2
nixos/modules/config/resolvconf.nix
+2
-2
nixos/modules/config/resolvconf.nix
···
+1
-1
nixos/modules/config/shells-environment.nix
+1
-1
nixos/modules/config/shells-environment.nix
···
+2
-2
nixos/modules/config/system-environment.nix
+2
-2
nixos/modules/config/system-environment.nix
······
+3
-3
nixos/modules/config/users-groups.nix
+3
-3
nixos/modules/config/users-groups.nix
······
+22
-22
nixos/modules/misc/nixpkgs.nix
+22
-22
nixos/modules/misc/nixpkgs.nix
·································-Ignored when <code>nixpkgs.pkgs</code>, <code>nixpkgs.localSystem</code> or <code>nixpkgs.hostPlatform</code> is set.+Ignored when <literal>nixpkgs.pkgs</literal>, <literal>nixpkgs.localSystem</literal> or <literal>nixpkgs.hostPlatform</literal> is set.
+1
-1
nixos/modules/programs/adb.nix
+1
-1
nixos/modules/programs/adb.nix
···
+1
-1
nixos/modules/programs/firejail.nix
+1
-1
nixos/modules/programs/firejail.nix
···
+1
-1
nixos/modules/programs/gphoto2.nix
+1
-1
nixos/modules/programs/gphoto2.nix
···
+1
-1
nixos/modules/programs/kdeconnect.nix
+1
-1
nixos/modules/programs/kdeconnect.nix
···
+1
-1
nixos/modules/programs/ssh.nix
+1
-1
nixos/modules/programs/ssh.nix
···See <citerefentry><refentrytitle>ssh_config</refentrytitle><manvolnum>5</manvolnum></citerefentry>
+1
-1
nixos/modules/programs/turbovnc.nix
+1
-1
nixos/modules/programs/turbovnc.nix
···
+1
-1
nixos/modules/security/acme/default.nix
+1
-1
nixos/modules/security/acme/default.nix
···
+16
-16
nixos/modules/security/doas.nix
+16
-16
nixos/modules/security/doas.nix
············<citerefentry><refentrytitle>syslogd</refentrytitle><manvolnum>8</manvolnum></citerefentry>.··················
+7
-7
nixos/modules/security/sudo.nix
+7
-7
nixos/modules/security/sudo.nix
············
+2
-2
nixos/modules/services/databases/firebird.nix
+2
-2
nixos/modules/services/databases/firebird.nix
···+For SuperServer use override: <literal>pkgs.firebird_3.override { superServer = true; };</literal>
+1
-1
nixos/modules/services/databases/mysql.nix
+1
-1
nixos/modules/services/databases/mysql.nix
···
+1
-1
nixos/modules/services/databases/postgresql.nix
+1
-1
nixos/modules/services/databases/postgresql.nix
···<link xlink:href="https://www.postgresql.org/docs/current/sql-grant.html">GRANT syntax</link>.
+4
-4
nixos/modules/services/mail/nullmailer.nix
+4
-4
nixos/modules/services/mail/nullmailer.nix
······
+3
-3
nixos/modules/services/mail/public-inbox.nix
+3
-3
nixos/modules/services/mail/public-inbox.nix
······-<code>locations."/inbox".proxyPass = "http://unix:''${config.services.public-inbox.http.port}:/inbox";</code>+<literal>locations."/inbox".proxyPass = "http://unix:''${config.services.public-inbox.http.port}:/inbox";</literal>
+1
-1
nixos/modules/services/misc/autorandr.nix
+1
-1
nixos/modules/services/misc/autorandr.nix
+5
-5
nixos/modules/services/misc/sourcehut/default.nix
+5
-5
nixos/modules/services/misc/sourcehut/default.nix
···+to a secret key to encrypt internal messages with. Use <literal>srht-keygen network</literal> to·········
+2
-2
nixos/modules/services/networking/bird.nix
+2
-2
nixos/modules/services/networking/bird.nix
······
+6
-6
nixos/modules/services/networking/ghostunnel.nix
+6
-6
nixos/modules/services/networking/ghostunnel.nix
···-NB: storepass is not supported because it would expose credentials via <code>/proc/*/cmdline</code>.+NB: storepass is not supported because it would expose credentials via <literal>/proc/*/cmdline</literal>.············
+1
-1
nixos/modules/services/networking/nntp-proxy.nix
+1
-1
nixos/modules/services/networking/nntp-proxy.nix
···example = "$6$GtzE7FrpE$wwuVgFYU.TZH4Rz.Snjxk9XGua89IeVwPQ/fEUD8eujr40q5Y021yhn0aNcsQ2Ifw.BLclyzvzgegopgKcneL0";
+1
-1
nixos/modules/services/networking/nsd.nix
+1
-1
nixos/modules/services/networking/nsd.nix
+5
-5
nixos/modules/services/networking/openconnect.nix
+5
-5
nixos/modules/services/networking/openconnect.nix
······
+4
-4
nixos/modules/services/networking/yggdrasil.nix
+4
-4
nixos/modules/services/networking/yggdrasil.nix
······-description = "Group to grant access to the Yggdrasil control socket. If <code>null</code>, only root can access the socket.";+description = "Group to grant access to the Yggdrasil control socket. If <literal>null</literal>, only root can access the socket.";···
+3
-3
nixos/modules/services/torrent/transmission.nix
+3
-3
nixos/modules/services/torrent/transmission.nix
·········
+2
-2
nixos/modules/services/web-apps/bookstack.nix
+2
-2
nixos/modules/services/web-apps/bookstack.nix
······The root URL that you want to host BookStack on. All URLs in BookStack will be generated using this value.-If you change this in the future you may need to run a command to update stored URLs in the database. Command example: <code>php artisan bookstack:update-url https://old.example.com https://new.example.com</code>+If you change this in the future you may need to run a command to update stored URLs in the database. Command example: <literal>php artisan bookstack:update-url https://old.example.com https://new.example.com</literal>
+13
-13
nixos/modules/services/web-apps/mastodon.nix
+13
-13
nixos/modules/services/web-apps/mastodon.nix
···+<literal>/ -> $(nix-instantiate --eval '<nixpkgs>' -A mastodon.outPath)/public</literal>+<literal>/ -> 127.0.0.1:{{ webPort }} </literal>(If there was no file in the directory above.)······-<code>nix build -f '<nixpkgs>' mastodon; cd result; bin/rake webpush:generate_keys</code>+<literal>nix build -f '<nixpkgs>' mastodon; cd result; bin/rake webpush:generate_keys</literal>·········-<code>nix build -f '<nixpkgs>' mastodon; cd result; bin/rake webpush:generate_keys</code>+<literal>nix build -f '<nixpkgs>' mastodon; cd result; bin/rake webpush:generate_keys</literal>
+2
-2
nixos/modules/services/web-apps/nextcloud.nix
+2
-2
nixos/modules/services/web-apps/nextcloud.nix
···
+2
-2
nixos/modules/services/web-apps/snipe-it.nix
+2
-2
nixos/modules/services/web-apps/snipe-it.nix
······The root URL that you want to host Snipe-IT on. All URLs in Snipe-IT will be generated using this value.If you change this in the future you may need to run a command to update stored URLs in the database.-Command example: <code>snipe-it snipe-it:update-url https://old.example.com https://new.example.com</code>+Command example: <literal>snipe-it snipe-it:update-url https://old.example.com https://new.example.com</literal>
+1
-1
nixos/modules/virtualisation/podman/default.nix
+1
-1
nixos/modules/virtualisation/podman/default.nix
+1
-1
nixos/modules/virtualisation/podman/network-socket.nix
+1
-1
nixos/modules/virtualisation/podman/network-socket.nix
···