+7
-7
nixos/modules/services/backup/znapzend.nix
+7
-7
nixos/modules/services/backup/znapzend.nix
···-See <citerefentry><refentrytitle>znapzendzetup</refentrytitle><manvolnum>1</manvolnum></citerefentry> for more info.······
+3
-3
nixos/modules/services/development/zammad.nix
+3
-3
nixos/modules/services/development/zammad.nix
···
+2
-2
nixos/modules/services/games/teeworlds.nix
+2
-2
nixos/modules/services/games/teeworlds.nix
···-Extra configuration lines for the <filename>teeworlds.cfg</filename>. See <link xlink:href="https://www.teeworlds.com/?page=docs&wiki=server_settings">Teeworlds Documentation</link>.+Extra configuration lines for the {file}`teeworlds.cfg`. See [Teeworlds Documentation](https://www.teeworlds.com/?page=docs&wiki=server_settings).
+2
-2
nixos/modules/services/mail/pfix-srsd.nix
+2
-2
nixos/modules/services/mail/pfix-srsd.nix
···-<literal>for n in $(seq 5); do dd if=/dev/urandom count=1 bs=1024 status=none | sha256sum | sed 's/ -$//' | sed 's/^/ /'; done</literal>+`for n in $(seq 5); do dd if=/dev/urandom count=1 bs=1024 status=none | sha256sum | sed 's/ -$//' | sed 's/^/ /'; done`
+12
-9
nixos/modules/services/mail/spamassassin.nix
+12
-9
nixos/modules/services/mail/spamassassin.nix
···-add_header all Status _YESNO_, score=_SCORE_ required=_REQD_ tests=_TESTS_ autolearn=_AUTOLEARN_ version=_VERSION_+add_header all Status _YESNO_, score=_SCORE_ required=_REQD_ tests=_TESTS_ autolearn=_AUTOLEARN_ version=_VERSION_
+4
-4
nixos/modules/services/misc/autorandr.nix
+4
-4
nixos/modules/services/misc/autorandr.nix
···
+6
-6
nixos/modules/services/misc/gitea.nix
+6
-6
nixos/modules/services/misc/gitea.nix
···
+3
-3
nixos/modules/services/misc/gitit.nix
+3
-3
nixos/modules/services/misc/gitit.nix
······
+6
-6
nixos/modules/services/misc/nix-daemon.nix
+6
-6
nixos/modules/services/misc/nix-daemon.nix
···-<citerefentry><refentrytitle>nix.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry> for avalaible options.-You can use <command>nix-instantiate --eval --strict '<nixpkgs/nixos>' -A config.nix.settings</command>+You can use {command}`nix-instantiate --eval --strict '<nixpkgs/nixos>' -A config.nix.settings`-Nix configurations defined under <option>nix.*</option> will be translated and applied to this-option. In addition, configuration specified in <option>nix.extraOptions</option> which will be appended+option. In addition, configuration specified in {option}`nix.extraOptions` which will be appended
+6
-6
nixos/modules/services/misc/persistent-evdev.nix
+6
-6
nixos/modules/services/misc/persistent-evdev.nix
···-Physical devices should already exist in <filename class="devicefile">/dev/input/by-id/</filename>.-See the <link xlink:href="https://github.com/aiberia/persistent-evdev#example-usage-with-libvirt">project page</link>-<literal>cgroup_device_acl</literal> list (see <xref linkend="opt-virtualisation.libvirtd.qemu.verbatimConfig"/>).
+3
-3
nixos/modules/services/monitoring/prometheus/exporters.nix
+3
-3
nixos/modules/services/monitoring/prometheus/exporters.nix
···-is true. It is used as `ip46tables -I nixos-fw <option>firewallFilter</option> -j nixos-fw-accept`.
+2
-2
nixos/modules/services/monitoring/smartd.nix
+2
-2
nixos/modules/services/monitoring/smartd.nix
···-Acts as the value of <literal>email</literal> in the emails' <literal>From: ... </literal> field.
+2
-2
nixos/modules/services/networking/3proxy.nix
+2
-2
nixos/modules/services/networking/3proxy.nix
···-It's possible to use wildmask in the begginning and in the the end of hostname, e.g. *badsite.com or *badcontent*.+It's possible to use wildmask in the begginning and in the the end of hostname, e.g. `*badsite.com` or `*badcontent*`.
+2
-2
nixos/modules/services/networking/networkmanager.nix
+2
-2
nixos/modules/services/networking/networkmanager.nix
···-<link xlink:href="https://developer.gnome.org/NetworkManager/stable/NetworkManager.html">https://developer.gnome.org/NetworkManager/stable/NetworkManager.html</link>+[https://developer.gnome.org/NetworkManager/stable/NetworkManager.html](https://developer.gnome.org/NetworkManager/stable/NetworkManager.html)
+13
-12
nixos/modules/services/networking/wireguard.nix
+13
-12
nixos/modules/services/networking/wireguard.nix
···
+8
-8
nixos/modules/services/networking/znc/default.nix
+8
-8
nixos/modules/services/networking/znc/default.nix
···-You can use <command>nix-instantiate --eval --strict '<nixpkgs/nixos>' -A config.services.znc.config</command>+You can use {command}`nix-instantiate --eval --strict '<nixpkgs/nixos>' -A config.services.znc.config`
+8
-8
nixos/modules/services/networking/znc/options.nix
+8
-8
nixos/modules/services/networking/znc/options.nix
···-You can use <command>nix-instantiate --eval --strict '<nixpkgs/nixos>' -A config.services.znc.config</command>+You can use {command}`nix-instantiate --eval --strict '<nixpkgs/nixos>' -A config.services.znc.config`···
+5
-5
nixos/modules/services/security/tor.nix
+5
-5
nixos/modules/services/security/tor.nix
···
+9
-9
nixos/modules/services/security/vaultwarden/default.nix
+9
-9
nixos/modules/services/security/vaultwarden/default.nix
···-therefore it is recommended to use upper snake case (e.g. <envar>DISABLE_2FA_REMEMBER</envar>).-Names already in this format remain unchanged, so <literal>FOO2</literal> remains <literal>FOO2</literal> if passed as such,-<link xlink:href="https://github.com/dani-garcia/vaultwarden/blob/${vaultwarden.version}/.env.template">the environment template file</link>.+[the environment template file](https://github.com/dani-garcia/vaultwarden/blob/${vaultwarden.version}/.env.template).
+6
-6
nixos/modules/services/torrent/transmission.nix
+6
-6
nixos/modules/services/torrent/transmission.nix
···-Torrents are downloaded to <xref linkend="opt-services.transmission.home"/>/${downloadsDir} by default and are+Torrents are downloaded to [](#opt-services.transmission.home)/${downloadsDir} by default and are···
+9
-4
nixos/modules/services/web-apps/dokuwiki.nix
+9
-4
nixos/modules/services/web-apps/dokuwiki.nix
···-Example: <link xlink:href="https://github.com/splitbrain/dokuwiki/blob/master/conf/users.auth.php.dist"/>
+6
-6
nixos/modules/services/web-apps/jirafeau.nix
+6
-6
nixos/modules/services/web-apps/jirafeau.nix
······
+6
-6
nixos/modules/services/web-apps/mastodon.nix
+6
-6
nixos/modules/services/web-apps/mastodon.nix
···-<literal>/ -> $(nix-instantiate --eval '<nixpkgs>' -A mastodon.outPath)/public</literal>-<literal>/ -> 127.0.0.1:{{ webPort }} </literal>(If there was no file in the directory above.)
+3
-3
nixos/modules/services/web-apps/matomo.nix
+3
-3
nixos/modules/services/web-apps/matomo.nix
···-Name of the web server user that forwards requests to <option>services.phpfpm.pools.<name>.socket</option> the fastcgi socket for Matomo if the nginx+Name of the web server user that forwards requests to {option}`services.phpfpm.pools.<name>.socket` the fastcgi socket for Matomo if the nginx-and pass fastcgi requests to <literal>index.php</literal>, <literal>matomo.php</literal> and <literal>piwik.php</literal> (legacy name) to this socket.+and pass fastcgi requests to `index.php`, `matomo.php` and `piwik.php` (legacy name) to this socket.
+3
-3
nixos/modules/services/web-apps/wiki-js.nix
+3
-3
nixos/modules/services/web-apps/wiki-js.nix
···
+4
-4
nixos/modules/services/web-servers/apache-httpd/vhost-options.nix
+4
-4
nixos/modules/services/web-servers/apache-httpd/vhost-options.nix
···-<emphasis>Note that this option does not create any certificates, nor it does add subdomains to existing ones – you will need to create them manually using <xref linkend="opt-security.acme.certs"/>.</emphasis>+*Note that this option does not create any certificates, nor it does add subdomains to existing ones – you will need to create them manually using [](#opt-security.acme.certs).*
+2
-2
nixos/modules/services/web-servers/hitch/default.nix
+2
-2
nixos/modules/services/web-servers/hitch/default.nix
···
+4
-4
nixos/modules/services/web-servers/nginx/vhost-options.nix
+4
-4
nixos/modules/services/web-servers/nginx/vhost-options.nix
···-<emphasis>Note that this option does not create any certificates, nor it does add subdomains to existing ones – you will need to create them manually using <xref linkend="opt-security.acme.certs"/>.</emphasis>+*Note that this option does not create any certificates, nor it does add subdomains to existing ones – you will need to create them manually using [](#opt-security.acme.certs).*
+2
-2
nixos/modules/system/activation/activation-script.nix
+2
-2
nixos/modules/system/activation/activation-script.nix
···
+2
-2
nixos/modules/system/boot/systemd/initrd.nix
+2
-2
nixos/modules/system/boot/systemd/initrd.nix
···
+3
-3
nixos/modules/virtualisation/kvmgt.nix
+3
-3
nixos/modules/virtualisation/kvmgt.nix
···KVMGT (iGVT-g) VGPU support. Allows Qemu/KVM guests to share host's Intel integrated graphics card.Currently only one graphical device can be shared. To allow users to access the device without root add them-to the kvm group: <literal>users.extraUsers.<yourusername>.extraGroups = [ "kvm" ];</literal>