+3
-3
nixos/modules/config/i18n.nix
+3
-3
nixos/modules/config/i18n.nix
···-can be found at <link xlink:href="https://sourceware.org/git/?p=glibc.git;a=blob;f=localedata/SUPPORTED"/>.
+3
-3
nixos/modules/config/resolvconf.nix
+3
-3
nixos/modules/config/resolvconf.nix
···
+2
-2
nixos/modules/config/shells-environment.nix
+2
-2
nixos/modules/config/shells-environment.nix
···
+4
-4
nixos/modules/config/system-environment.nix
+4
-4
nixos/modules/config/system-environment.nix
······
+19
-19
nixos/modules/config/users-groups.nix
+19
-19
nixos/modules/config/users-groups.nix
·········
+1
-1
nixos/modules/hardware/logitech.nix
+1
-1
nixos/modules/hardware/logitech.nix
+6
-6
nixos/modules/hardware/video/uvcvideo/default.nix
+6
-6
nixos/modules/hardware/video/uvcvideo/default.nix
···
+2
-2
nixos/modules/programs/adb.nix
+2
-2
nixos/modules/programs/adb.nix
···
+2
-2
nixos/modules/programs/firejail.nix
+2
-2
nixos/modules/programs/firejail.nix
···
+2
-2
nixos/modules/programs/gphoto2.nix
+2
-2
nixos/modules/programs/gphoto2.nix
···
+2
-2
nixos/modules/programs/neovim.nix
+2
-2
nixos/modules/programs/neovim.nix
···
+9
-9
nixos/modules/programs/nncp.nix
+9
-9
nixos/modules/programs/nncp.nix
···
+3
-3
nixos/modules/programs/turbovnc.nix
+3
-3
nixos/modules/programs/turbovnc.nix
···
+2
-2
nixos/modules/security/acme/default.nix
+2
-2
nixos/modules/security/acme/default.nix
···
+30
-30
nixos/modules/security/doas.nix
+30
-30
nixos/modules/security/doas.nix
·····················
+2
-2
nixos/modules/security/misc.nix
+2
-2
nixos/modules/security/misc.nix
······
+50
-50
nixos/modules/security/pam.nix
+50
-50
nixos/modules/security/pam.nix
······-More information can be found <link xlink:href="https://github.com/OpenSC/pam_p11">here</link>.···-<literal>username:first_keyHandle,first_public_key: second_keyHandle,second_public_key</literal>-More information can be found <link xlink:href="https://developers.yubico.com/pam-u2f/">here</link>.-<literal>username:first_keyHandle,first_public_key: second_keyHandle,second_public_key</literal>-More information can be found <link xlink:href="https://developers.yubico.com/pam-u2f/">here</link>.-More information can be found <link xlink:href="https://developers.yubico.com/pam-u2f/Manuals/pam_u2f.8.html">here</link>+More information can be found [here](https://developers.yubico.com/pam-u2f/Manuals/pam_u2f.8.html)-More information can be found <link xlink:href="https://developers.yubico.com/pam-u2f/Manuals/pam_u2f.8.html">here</link>+More information can be found [here](https://developers.yubico.com/pam-u2f/Manuals/pam_u2f.8.html)···-More information can be found <link xlink:href="https://github.com/uber/pam-ussh">here</link>.···-More information can be found <link xlink:href="https://developers.yubico.com/yubico-pam/">here</link>.······-More information can be found <link xlink:href="https://developers.yubico.com/yubico-pam/Authentication_Using_Challenge-Response.html">here</link>.+More information can be found [here](https://developers.yubico.com/yubico-pam/Authentication_Using_Challenge-Response.html).If not null, set the path used by yubico pam module where the challenge expected response is stored.-More information can be found <link xlink:href="https://developers.yubico.com/yubico-pam/Authentication_Using_Challenge-Response.html">here</link>.+More information can be found [here](https://developers.yubico.com/yubico-pam/Authentication_Using_Challenge-Response.html).
+6
-6
nixos/modules/security/pam_mount.nix
+6
-6
nixos/modules/security/pam_mount.nix
···-For more information, visit <link xlink:href="http://pam-mount.sourceforge.net/pam_mount.conf.5.html"/>.···-For more information, visit <link xlink:href="http://pam-mount.sourceforge.net/pam_mount.conf.5.html"/>.-For more information, visit <link xlink:href="http://pam-mount.sourceforge.net/pam_mount.conf.5.html"/>.
+2
-2
nixos/modules/security/pam_usb.nix
+2
-2
nixos/modules/security/pam_usb.nix
···-more information, visit <link xlink:href="https://github.com/aluzzardi/pam_usb/wiki/Getting-Started#setting-up-devices-and-users"/>.+more information, visit <https://github.com/aluzzardi/pam_usb/wiki/Getting-Started#setting-up-devices-and-users>.
+10
-10
nixos/modules/security/sudo.nix
+10
-10
nixos/modules/security/sudo.nix
······
+1
-1
nixos/modules/services/backup/restic.nix
+1
-1
nixos/modules/services/backup/restic.nix
+1
-1
nixos/modules/services/backup/syncoid.nix
+1
-1
nixos/modules/services/backup/syncoid.nix
+2
-2
nixos/modules/services/backup/zrepl.nix
+2
-2
nixos/modules/services/backup/zrepl.nix
···
+2
-2
nixos/modules/services/continuous-integration/github-runner.nix
+2
-2
nixos/modules/services/continuous-integration/github-runner.nix
···Note: GitHub recommends using self-hosted runners with private repositories only. Learn more here:-<link xlink:href="https://docs.github.com/en/actions/hosting-your-own-runners/about-self-hosted-runners">About self-hosted runners</link>.+[About self-hosted runners](https://docs.github.com/en/actions/hosting-your-own-runners/about-self-hosted-runners).
+47
-47
nixos/modules/services/continuous-integration/gitlab-runner.nix
+47
-47
nixos/modules/services/continuous-integration/gitlab-runner.nix
······-<link xlink:href="https://docs.gitlab.com/runner/configuration/advanced-configuration.html#the-global-section"/>···············-See <link xlink:href="https://docs.gitlab.com/runner/executors/README.html">runner documentation</link> for more information.+See [runner documentation](https://docs.gitlab.com/runner/executors/README.html) for more information.···Overwrite the URL for the GitLab instance. Used if the Runner can’t connect to GitLab on the URL GitLab exposes itself.······························
+3
-3
nixos/modules/services/databases/firebird.nix
+3
-3
nixos/modules/services/databases/firebird.nix
···-For SuperServer use override: <literal>pkgs.firebird_3.override { superServer = true; };</literal>
+3
-3
nixos/modules/services/databases/mysql.nix
+3
-3
nixos/modules/services/databases/mysql.nix
······
+43
-43
nixos/modules/services/databases/neo4j.nix
+43
-43
nixos/modules/services/databases/neo4j.nix
·································defaultText = literalExpression ''"''${config.${opt.directories.certificates}}/''${name}"'';······
+5
-5
nixos/modules/services/databases/openldap.nix
+5
-5
nixos/modules/services/databases/openldap.nix
·········
+2
-2
nixos/modules/services/databases/pgmanage.nix
+2
-2
nixos/modules/services/databases/pgmanage.nix
···
+3
-3
nixos/modules/services/databases/postgresql.nix
+3
-3
nixos/modules/services/databases/postgresql.nix
······-<link xlink:href="https://www.postgresql.org/docs/current/sql-grant.html">GRANT syntax</link>.
+3
-3
nixos/modules/services/databases/victoriametrics.nix
+3
-3
nixos/modules/services/databases/victoriametrics.nix
···
+2
-2
nixos/modules/services/games/asf.nix
+2
-2
nixos/modules/services/games/asf.nix
···-Additional settings that are documented <link xlink:href="https://github.com/JustArchiNET/ArchiSteamFarm/wiki/Configuration#bot-config">here</link>.+Additional settings that are documented [here](https://github.com/JustArchiNET/ArchiSteamFarm/wiki/Configuration#bot-config).
+7
-7
nixos/modules/services/hardware/kanata.nix
+7
-7
nixos/modules/services/hardware/kanata.nix
············
+8
-8
nixos/modules/services/hardware/udev.nix
+8
-8
nixos/modules/services/hardware/udev.nix
······-Whether to assign <link xlink:href="http://www.freedesktop.org/wiki/Software/systemd/PredictableNetworkInterfaceNames">predictable names to network interfaces</link>.+Whether to assign [predictable names to network interfaces](http://www.freedesktop.org/wiki/Software/systemd/PredictableNetworkInterfaceNames).
+10
-10
nixos/modules/services/logging/filebeat.nix
+10
-10
nixos/modules/services/logging/filebeat.nix
···-See <link xlink:href="https://www.elastic.co/guide/en/beats/filebeat/current/configuration-filebeat-options.html"/>.+See <https://www.elastic.co/guide/en/beats/filebeat/current/configuration-filebeat-options.html>.···-See <link xlink:href="https://www.elastic.co/guide/en/beats/filebeat/current/filebeat-modules.html"/>.
+5
-5
nixos/modules/services/logging/logrotate.nix
+5
-5
nixos/modules/services/logging/logrotate.nix
······
+2
-2
nixos/modules/services/mail/mailman.nix
+2
-2
nixos/modules/services/mail/mailman.nix
···
+6
-6
nixos/modules/services/mail/nullmailer.nix
+6
-6
nixos/modules/services/mail/nullmailer.nix
······
+3
-3
nixos/modules/services/mail/postfixadmin.nix
+3
-3
nixos/modules/services/mail/postfixadmin.nix
···-Further nginx configuration can be done by adapting <literal>services.nginx.virtualHosts.<name></literal>.
+5
-5
nixos/modules/services/mail/public-inbox.nix
+5
-5
nixos/modules/services/mail/public-inbox.nix
······-<literal>locations."/inbox".proxyPass = "http://unix:''${config.services.public-inbox.http.port}:/inbox";</literal>+`locations."/inbox".proxyPass = "http://unix:''${config.services.public-inbox.http.port}:/inbox";`
+5
-5
nixos/modules/services/mail/roundcube.nix
+5
-5
nixos/modules/services/mail/roundcube.nix
···-Further nginx configuration can be done by adapting <literal>services.nginx.virtualHosts.<name></literal>.···
+8
-8
nixos/modules/services/mail/sympa.nix
+8
-8
nixos/modules/services/mail/sympa.nix
·········
+5
-5
nixos/modules/services/matrix/appservice-discord.nix
+5
-5
nixos/modules/services/matrix/appservice-discord.nix
···-<link xlink:href="https://github.com/Half-Shot/matrix-appservice-discord/blob/master/config/config.sample.yaml">config.sample.yaml</link>.+[config.sample.yaml](https://github.com/Half-Shot/matrix-appservice-discord/blob/master/config/config.sample.yaml).should be set to match the public host name of the Matrix homeserver for webhooks and avatars to work.
+4
-4
nixos/modules/services/matrix/mautrix-facebook.nix
+4
-4
nixos/modules/services/matrix/mautrix-facebook.nix
···-<link xlink:href="https://github.com/mautrix/facebook/blob/master/mautrix_facebook/example-config.yaml">example-config.yaml</link>.+[example-config.yaml](https://github.com/mautrix/facebook/blob/master/mautrix_facebook/example-config.yaml).
+4
-4
nixos/modules/services/matrix/mautrix-telegram.nix
+4
-4
nixos/modules/services/matrix/mautrix-telegram.nix
···-<link xlink:href="https://github.com/tulir/mautrix-telegram/blob/master/example-config.yaml">example-config.yaml</link>.+[example-config.yaml](https://github.com/tulir/mautrix-telegram/blob/master/example-config.yaml).
+2
-2
nixos/modules/services/misc/autorandr.nix
+2
-2
nixos/modules/services/misc/autorandr.nix
···
+2
-2
nixos/modules/services/misc/bees.nix
+2
-2
nixos/modules/services/misc/bees.nix
······
+2
-2
nixos/modules/services/misc/etcd.nix
+2
-2
nixos/modules/services/misc/etcd.nix
···-<link xlink:href="https://github.com/coreos/etcd/blob/master/Documentation/op-guide/configuration.md#configuration-flags"/>+<https://github.com/coreos/etcd/blob/master/Documentation/op-guide/configuration.md#configuration-flags>
+1
-1
nixos/modules/services/misc/klipper.nix
+1
-1
nixos/modules/services/misc/klipper.nix
+1
-1
nixos/modules/services/misc/sssd.nix
+1
-1
nixos/modules/services/misc/sssd.nix
+7
-7
nixos/modules/services/monitoring/cadvisor.nix
+7
-7
nixos/modules/services/monitoring/cadvisor.nix
···-<option>storageDriverPasswordFile</option> takes precedence over <option>storageDriverPassword</option>-Warning: when <option>storageDriverPassword</option> is non-empty this defaults to a file in the-Tip: use <link xlink:href="https://nixos.org/nixops/manual/#idm140737318306400">nixops key management</link>···-See <link xlink:href="https://github.com/google/cadvisor/blob/master/docs/runtime_options.md"/> for available options.+See <https://github.com/google/cadvisor/blob/master/docs/runtime_options.md> for available options.
+2
-2
nixos/modules/services/monitoring/graphite.nix
+2
-2
nixos/modules/services/monitoring/graphite.nix
···
+5
-5
nixos/modules/services/monitoring/metricbeat.nix
+5
-5
nixos/modules/services/monitoring/metricbeat.nix
···-for each, but setting <xref linkend="opt-services.metricbeat.modules._name_.module"/> to the same value.-See <link xlink:href="https://www.elastic.co/guide/en/beats/metricbeat/current/metricbeat-modules.html"/>.
+14
-14
nixos/modules/services/monitoring/munin.nix
+14
-14
nixos/modules/services/monitoring/munin.nix
···-<link xlink:href="http://guide.munin-monitoring.org/en/latest/reference/munin-node.conf.html"/>···-See <link xlink:href="http://guide.munin-monitoring.org/en/latest/reference/munin.conf.html"/>.···
+2
-2
nixos/modules/services/monitoring/netdata.nix
+2
-2
nixos/modules/services/monitoring/netdata.nix
···
+17
-17
nixos/modules/services/monitoring/parsedmarc.nix
+17
-17
nixos/modules/services/monitoring/parsedmarc.nix
······-Whether to enable and configure the <link linkend="opt-services.geoipupdate.enable">geoipupdate</link>-To finish the setup, you need to manually set the <xref linkend="opt-services.geoipupdate.settings.AccountID"/> and+To finish the setup, you need to manually set the [](#opt-services.geoipupdate.settings.AccountID) and············
+5
-5
nixos/modules/services/networking/biboumi.nix
+5
-5
nixos/modules/services/networking/biboumi.nix
···-Set it to null and use <link linkend="opt-services.biboumi.credentialsFile">credentialsFile</link>···
+4
-4
nixos/modules/services/networking/bird-lg.nix
+4
-4
nixos/modules/services/networking/bird-lg.nix
···-Extra parameters documented <link xlink:href="https://github.com/xddxdd/bird-lg-go#frontend">here</link>.···-Extra parameters documented <link xlink:href="https://github.com/xddxdd/bird-lg-go#proxy">here</link>.
+6
-6
nixos/modules/services/networking/bird.nix
+6
-6
nixos/modules/services/networking/bird.nix
······
+2
-2
nixos/modules/services/networking/coredns.nix
+2
-2
nixos/modules/services/networking/coredns.nix
···
+7
-7
nixos/modules/services/networking/ghostunnel.nix
+7
-7
nixos/modules/services/networking/ghostunnel.nix
······
+2
-2
nixos/modules/services/networking/hans.nix
+2
-2
nixos/modules/services/networking/hans.nix
···
+2
-2
nixos/modules/services/networking/iodine.nix
+2
-2
nixos/modules/services/networking/iodine.nix
···
+16
-16
nixos/modules/services/networking/kea.nix
+16
-16
nixos/modules/services/networking/kea.nix
···-Kea Control Agent configuration as a path, see <link xlink:href="https://kea.readthedocs.io/en/kea-${package.version}/arm/agent.html"/>.+Kea Control Agent configuration as a path, see <https://kea.readthedocs.io/en/kea-${package.version}/arm/agent.html>.-Most users should prefer using <link linkend="opt-services.kea.ctrl-agent.settings">settings</link> instead.···-Kea DHCP4 configuration as a path, see <link xlink:href="https://kea.readthedocs.io/en/kea-${package.version}/arm/dhcp4-srv.html"/>.+Kea DHCP4 configuration as a path, see <https://kea.readthedocs.io/en/kea-${package.version}/arm/dhcp4-srv.html>.-Most users should prefer using <link linkend="opt-services.kea.dhcp4.settings">settings</link> instead.···-Kea DHCP6 configuration as a path, see <link xlink:href="https://kea.readthedocs.io/en/kea-${package.version}/arm/dhcp6-srv.html"/>.+Kea DHCP6 configuration as a path, see <https://kea.readthedocs.io/en/kea-${package.version}/arm/dhcp6-srv.html>.-Most users should prefer using <link linkend="opt-services.kea.dhcp6.settings">settings</link> instead.···-Kea DHCP-DDNS configuration as a path, see <link xlink:href="https://kea.readthedocs.io/en/kea-${package.version}/arm/ddns.html"/>.+Kea DHCP-DDNS configuration as a path, see <https://kea.readthedocs.io/en/kea-${package.version}/arm/ddns.html>.-Most users should prefer using <link linkend="opt-services.kea.dhcp-ddns.settings">settings</link> instead.
+2
-2
nixos/modules/services/networking/ncdns.nix
+2
-2
nixos/modules/services/networking/ncdns.nix
···-See the example ncdns.conf file at <link xlink:href="https://github.com/namecoin/ncdns/blob/master/_doc/ncdns.conf.example"/>+See the example ncdns.conf file at <https://github.com/namecoin/ncdns/blob/master/_doc/ncdns.conf.example>
+3
-3
nixos/modules/services/networking/networkmanager.nix
+3
-3
nixos/modules/services/networking/networkmanager.nix
···
+2
-2
nixos/modules/services/networking/nntp-proxy.nix
+2
-2
nixos/modules/services/networking/nntp-proxy.nix
···example = "$6$GtzE7FrpE$wwuVgFYU.TZH4Rz.Snjxk9XGua89IeVwPQ/fEUD8eujr40q5Y021yhn0aNcsQ2Ifw.BLclyzvzgegopgKcneL0";
+2
-2
nixos/modules/services/networking/nsd.nix
+2
-2
nixos/modules/services/networking/nsd.nix
···
+4
-4
nixos/modules/services/networking/ntp/ntpd.nix
+4
-4
nixos/modules/services/networking/ntp/ntpd.nix
······
+7
-7
nixos/modules/services/networking/openconnect.nix
+7
-7
nixos/modules/services/networking/openconnect.nix
······
+2
-2
nixos/modules/services/networking/openvpn.nix
+2
-2
nixos/modules/services/networking/openvpn.nix
···
+4
-4
nixos/modules/services/networking/pleroma.nix
+4
-4
nixos/modules/services/networking/pleroma.nix
······
+12
-12
nixos/modules/services/networking/ssh/sshd.nix
+12
-12
nixos/modules/services/networking/ssh/sshd.nix
···-keys, you can generally use <xref linkend="opt-users.users._name_.openssh.authorizedKeys.keys"/>·········
+8
-8
nixos/modules/services/networking/wireguard.nix
+8
-8
nixos/modules/services/networking/wireguard.nix
······
+6
-6
nixos/modules/services/networking/yggdrasil.nix
+6
-6
nixos/modules/services/networking/yggdrasil.nix
···-description = "Group to grant access to the Yggdrasil control socket. If <literal>null</literal>, only root can access the socket.";+description = lib.mdDoc "Group to grant access to the Yggdrasil control socket. If `null`, only root can access the socket.";
+2
-2
nixos/modules/services/security/privacyidea.nix
+2
-2
nixos/modules/services/security/privacyidea.nix
···
+3
-3
nixos/modules/services/security/tor.nix
+3
-3
nixos/modules/services/security/tor.nix
···-Generated authorization data can be found in <filename>${stateDir}/onion/$name/hostname</filename>.
+2
-2
nixos/modules/services/security/vault.nix
+2
-2
nixos/modules/services/security/vault.nix
···
+7
-7
nixos/modules/services/system/dbus.nix
+7
-7
nixos/modules/services/system/dbus.nix
···
+8
-8
nixos/modules/services/system/earlyoom.nix
+8
-8
nixos/modules/services/system/earlyoom.nix
···
+28
-28
nixos/modules/services/torrent/transmission.nix
+28
-28
nixos/modules/services/torrent/transmission.nix
······-when <xref linkend="opt-services.transmission.settings.peer-port-random-on-start"/> is enabled.-when <xref linkend="opt-services.transmission.settings.peer-port-random-on-start"/> is enabled.············
+5
-5
nixos/modules/services/web-apps/dokuwiki.nix
+5
-5
nixos/modules/services/web-apps/dokuwiki.nix
···-Further nginx configuration can be done by adapting <literal>services.nginx.virtualHosts.<name></literal>.-Further apache2 configuration can be done by adapting <literal>services.httpd.virtualHosts.<name></literal>.
+2
-2
nixos/modules/services/web-apps/hedgedoc.nix
+2
-2
nixos/modules/services/web-apps/hedgedoc.nix
···
+13
-13
nixos/modules/services/web-apps/keycloak.nix
+13
-13
nixos/modules/services/web-apps/keycloak.nix
···-To use this with a local database, set <xref linkend="opt-services.keycloak.database.createLocally"/> to···-To use this with a local database, set <xref linkend="opt-services.keycloak.database.createLocally"/> to···-Most available options are documented at <link xlink:href="https://www.keycloak.org/server/all-config"/>.
+9
-9
nixos/modules/services/web-apps/mastodon.nix
+9
-9
nixos/modules/services/web-apps/mastodon.nix
···-<literal>nix build -f '<nixpkgs>' mastodon; cd result; bin/rake webpush:generate_keys</literal>·········-<literal>nix build -f '<nixpkgs>' mastodon; cd result; bin/rake webpush:generate_keys</literal>
+12
-12
nixos/modules/services/web-apps/nextcloud.nix
+12
-12
nixos/modules/services/web-apps/nextcloud.nix
···-Data storage path of nextcloud. Will be <xref linkend="opt-services.nextcloud.home"/> by default.This folder will be populated with a config.php and data folder which contains the state of the instance (excl the database).";···Extra apps to install. Should be an attrSet of appid to packages generated by fetchNextcloudApp.-Using this will disable the appstore to prevent Nextcloud from updating these apps (see <xref linkend="opt-services.nextcloud.appstoreEnable"/>).+Using this will disable the appstore to prevent Nextcloud from updating these apps (see [](#opt-services.nextcloud.appstoreEnable)).···-Automatically enable the apps in <xref linkend="opt-services.nextcloud.extraApps"/> every time nextcloud starts.+Automatically enable the apps in [](#opt-services.nextcloud.extraApps) every time nextcloud starts.If set to false, apps need to be enabled in the Nextcloud user interface or with nextcloud-occ app:enable.···-Enabled by default unless there are packages in <xref linkend="opt-services.nextcloud.extraApps"/>.-Set to true to force enable the store even if <xref linkend="opt-services.nextcloud.extraApps"/> is used.Set to false to disable the installation of apps from the global appstore. App management is always enabled regardless of this setting.···
+2
-2
nixos/modules/services/web-apps/node-red.nix
+2
-2
nixos/modules/services/web-apps/node-red.nix
···-See <link xlink:href="https://github.com/node-red/node-red/blob/master/packages/node_modules/node-red/settings.js"/>+See <https://github.com/node-red/node-red/blob/master/packages/node_modules/node-red/settings.js>
+1
-1
nixos/modules/services/web-apps/trilium.nix
+1
-1
nixos/modules/services/web-apps/trilium.nix
+1
-1
nixos/modules/services/x11/desktop-managers/plasma5.nix
+1
-1
nixos/modules/services/x11/desktop-managers/plasma5.nix
+2
-2
nixos/modules/services/x11/display-managers/lightdm-greeters/mini.nix
+2
-2
nixos/modules/services/x11/display-managers/lightdm-greeters/mini.nix
···
+2
-2
nixos/modules/services/x11/display-managers/lightdm-greeters/tiny.nix
+2
-2
nixos/modules/services/x11/display-managers/lightdm-greeters/tiny.nix
···
+1
-1
nixos/modules/services/x11/window-managers/fvwm2.nix
+1
-1
nixos/modules/services/x11/window-managers/fvwm2.nix
+5
-5
nixos/modules/system/boot/initrd-network.nix
+5
-5
nixos/modules/system/boot/initrd-network.nix
···-as described in <link xlink:href="https://www.kernel.org/doc/Documentation/filesystems/nfs/nfsroot.txt">the kernel documentation</link>.+as described in [the kernel documentation](https://www.kernel.org/doc/Documentation/filesystems/nfs/nfsroot.txt).
+2
-2
nixos/modules/system/boot/luksroot.nix
+2
-2
nixos/modules/system/boot/luksroot.nix
···
+3
-3
nixos/modules/system/boot/networkd.nix
+3
-3
nixos/modules/system/boot/networkd.nix
···-See <link xlink:href="https://www.freedesktop.org/software/systemd/man/systemd-networkd-wait-online.service.html"><citerefentry><refentrytitle>systemd-networkd-wait-online.service</refentrytitle><manvolnum>8</manvolnum></citerefentry></link> for all available options.+See [{manpage}`systemd-networkd-wait-online.service(8)`](https://www.freedesktop.org/software/systemd/man/systemd-networkd-wait-online.service.html) for all available options.
+3
-3
nixos/modules/system/boot/systemd/logind.nix
+3
-3
nixos/modules/system/boot/systemd/logind.nix
···-<link xlink:href="https://www.freedesktop.org/software/systemd/man/systemd.scope.html#">systemd.scope(5)</link>), and processes are not killed.+[systemd.scope(5)](https://www.freedesktop.org/software/systemd/man/systemd.scope.html#)), and processes are not killed.-See <link xlink:href="https://www.freedesktop.org/software/systemd/man/logind.conf.html#KillUserProcesses=">logind.conf(5)</link>+See [logind.conf(5)](https://www.freedesktop.org/software/systemd/man/logind.conf.html#KillUserProcesses=)
+5
-5
nixos/modules/system/boot/systemd/tmpfiles.nix
+5
-5
nixos/modules/system/boot/systemd/tmpfiles.nix
···If this folder does not exist or does not contain any files an error will be returned instead.
+3
-3
nixos/modules/tasks/auto-upgrade.nix
+3
-3
nixos/modules/tasks/auto-upgrade.nix
···
+1
-1
nixos/modules/tasks/scsi-link-power-management.nix
+1
-1
nixos/modules/tasks/scsi-link-power-management.nix
+6
-6
nixos/modules/virtualisation/nixos-containers.nix
+6
-6
nixos/modules/virtualisation/nixos-containers.nix
······