+10
-21
nixos/lib/make-options-doc/default.nix
+10
-21
nixos/lib/make-options-doc/default.nix
···optionsNix = builtins.listToAttrs (map (o: { name = o.name; value = removeAttrs o ["name" "visible" "internal"]; }) optionsList);······
+120
-117
nixos/lib/make-options-doc/mergeJSON.py
+120
-117
nixos/lib/make-options-doc/mergeJSON.py
······ADMONITION_PATTERN = re.compile(r'^::: \{([^\n]*?)\}\n(.*?)^:::\n', flags=re.MULTILINE|re.DOTALL)
+3
-4
nixos/modules/config/i18n.nix
+3
-4
nixos/modules/config/i18n.nix
···
+3
-3
nixos/modules/config/resolvconf.nix
+3
-3
nixos/modules/config/resolvconf.nix
···
+2
-2
nixos/modules/config/shells-environment.nix
+2
-2
nixos/modules/config/shells-environment.nix
···
+5
-5
nixos/modules/config/system-environment.nix
+5
-5
nixos/modules/config/system-environment.nix
·········
+19
-20
nixos/modules/config/users-groups.nix
+19
-20
nixos/modules/config/users-groups.nix
·········
+1
-1
nixos/modules/config/xdg/portal.nix
+1
-1
nixos/modules/config/xdg/portal.nix
···-mkEnableOption "<link xlink:href='https://github.com/flatpak/xdg-desktop-portal'>xdg desktop integration</link>" // {+mkEnableOption ''<link xlink:href="https://github.com/flatpak/xdg-desktop-portal">xdg desktop integration</link>'' // {
+2
-3
nixos/modules/hardware/logitech.nix
+2
-3
nixos/modules/hardware/logitech.nix
···
+1
-1
nixos/modules/hardware/tuxedo-keyboard.nix
+1
-1
nixos/modules/hardware/tuxedo-keyboard.nix
···To configure the driver, pass the options to the <option>boot.kernelParams</option> configuration.There are several parameters you can change. It's best to check at the source code description which options are supported.-You can find all the supported parameters at: <link xlink:href="https://github.com/tuxedocomputers/tuxedo-keyboard#kernelparam" />+You can find all the supported parameters at: <link xlink:href="https://github.com/tuxedocomputers/tuxedo-keyboard#kernelparam"/>In order to use the <literal>custom</literal> lighting with the maximumg brightness and a color of <literal>0xff0a0a</literal> one would put pass <option>boot.kernelParams</option> like this:
+6
-6
nixos/modules/hardware/video/uvcvideo/default.nix
+6
-6
nixos/modules/hardware/video/uvcvideo/default.nix
···
+1
-1
nixos/modules/installer/cd-dvd/iso-image.nix
+1
-1
nixos/modules/installer/cd-dvd/iso-image.nix
···
+22
-22
nixos/modules/misc/nixpkgs.nix
+22
-22
nixos/modules/misc/nixpkgs.nix
·································-Ignored when <code>nixpkgs.pkgs</code>, <code>nixpkgs.localSystem</code> or <code>nixpkgs.hostPlatform</code> is set.+Ignored when <literal>nixpkgs.pkgs</literal>, <literal>nixpkgs.localSystem</literal> or <literal>nixpkgs.hostPlatform</literal> is set.
+2
-2
nixos/modules/programs/adb.nix
+2
-2
nixos/modules/programs/adb.nix
···
+3
-4
nixos/modules/programs/firejail.nix
+3
-4
nixos/modules/programs/firejail.nix
···
+2
-2
nixos/modules/programs/gphoto2.nix
+2
-2
nixos/modules/programs/gphoto2.nix
···
+1
-1
nixos/modules/programs/kdeconnect.nix
+1
-1
nixos/modules/programs/kdeconnect.nix
···
+2
-2
nixos/modules/programs/neovim.nix
+2
-2
nixos/modules/programs/neovim.nix
···-Neovim will then be wrapped to load <command>nvim -u /nix/store/<replaceable>hash</replaceable>-vimrc</command>
+9
-9
nixos/modules/programs/nncp.nix
+9
-9
nixos/modules/programs/nncp.nix
···
+1
-1
nixos/modules/programs/ssh.nix
+1
-1
nixos/modules/programs/ssh.nix
···See <citerefentry><refentrytitle>ssh_config</refentrytitle><manvolnum>5</manvolnum></citerefentry>
+1
-1
nixos/modules/programs/sway.nix
+1
-1
nixos/modules/programs/sway.nix
···
+3
-3
nixos/modules/programs/turbovnc.nix
+3
-3
nixos/modules/programs/turbovnc.nix
···
+4
-4
nixos/modules/security/acme/default.nix
+4
-4
nixos/modules/security/acme/default.nix
······-<listitem><para><link xlink:href="https://blog.apnic.net/2019/01/15/is-the-web-ready-for-ocsp-must-staple/" /></para></listitem>-<listitem><para><link xlink:href="https://blog.hboeck.de/archives/886-The-Problem-with-OCSP-Stapling-and-Must-Staple-and-why-Certificate-Revocation-is-still-broken.html" /></para></listitem>+<listitem><para><link xlink:href="https://blog.apnic.net/2019/01/15/is-the-web-ready-for-ocsp-must-staple/"/></para></listitem>+<listitem><para><link xlink:href="https://blog.hboeck.de/archives/886-The-Problem-with-OCSP-Stapling-and-Must-Staple-and-why-Certificate-Revocation-is-still-broken.html"/></para></listitem>
+1
-1
nixos/modules/security/dhparams.nix
+1
-1
nixos/modules/security/dhparams.nix
···
+30
-30
nixos/modules/security/doas.nix
+30
-30
nixos/modules/security/doas.nix
·····················
+2
-2
nixos/modules/security/misc.nix
+2
-2
nixos/modules/security/misc.nix
······
+50
-61
nixos/modules/security/pam.nix
+50
-61
nixos/modules/security/pam.nix
·········-<literal>username:first_keyHandle,first_public_key: second_keyHandle,second_public_key</literal>-<literal>username:first_keyHandle,first_public_key: second_keyHandle,second_public_key</literal>+More information can be found [here](https://developers.yubico.com/pam-u2f/Manuals/pam_u2f.8.html)+More information can be found [here](https://developers.yubico.com/pam-u2f/Manuals/pam_u2f.8.html)············-xlink:href="https://developers.yubico.com/yubico-pam/Authentication_Using_Challenge-Response.html">here</link>.+More information can be found [here](https://developers.yubico.com/yubico-pam/Authentication_Using_Challenge-Response.html).If not null, set the path used by yubico pam module where the challenge expected response is stored.-xlink:href="https://developers.yubico.com/yubico-pam/Authentication_Using_Challenge-Response.html">here</link>.+More information can be found [here](https://developers.yubico.com/yubico-pam/Authentication_Using_Challenge-Response.html).
+6
-9
nixos/modules/security/pam_mount.nix
+6
-9
nixos/modules/security/pam_mount.nix
······
+2
-3
nixos/modules/security/pam_usb.nix
+2
-3
nixos/modules/security/pam_usb.nix
···-xlink:href="https://github.com/aluzzardi/pam_usb/wiki/Getting-Started#setting-up-devices-and-users" />.+more information, visit <https://github.com/aluzzardi/pam_usb/wiki/Getting-Started#setting-up-devices-and-users>.
+11
-11
nixos/modules/security/sudo.nix
+11
-11
nixos/modules/security/sudo.nix
·········
+3
-3
nixos/modules/services/backup/duplicity.nix
+3
-3
nixos/modules/services/backup/duplicity.nix
···
+1
-1
nixos/modules/services/backup/restic.nix
+1
-1
nixos/modules/services/backup/restic.nix
+3
-3
nixos/modules/services/backup/syncoid.nix
+3
-3
nixos/modules/services/backup/syncoid.nix
···
+2
-3
nixos/modules/services/backup/zrepl.nix
+2
-3
nixos/modules/services/backup/zrepl.nix
···
+2
-3
nixos/modules/services/continuous-integration/github-runner.nix
+2
-3
nixos/modules/services/continuous-integration/github-runner.nix
···Note: GitHub recommends using self-hosted runners with private repositories only. Learn more here:-<link xlink:href="https://docs.github.com/en/actions/hosting-your-own-runners/about-self-hosted-runners"+[About self-hosted runners](https://docs.github.com/en/actions/hosting-your-own-runners/about-self-hosted-runners).
+47
-47
nixos/modules/services/continuous-integration/gitlab-runner.nix
+47
-47
nixos/modules/services/continuous-integration/gitlab-runner.nix
······-<link xlink:href="https://docs.gitlab.com/runner/configuration/advanced-configuration.html#the-global-section"/>···············-See <link xlink:href="https://docs.gitlab.com/runner/executors/README.html">runner documentation</link> for more information.+See [runner documentation](https://docs.gitlab.com/runner/executors/README.html) for more information.···Overwrite the URL for the GitLab instance. Used if the Runner can’t connect to GitLab on the URL GitLab exposes itself.······························
+3
-3
nixos/modules/services/databases/firebird.nix
+3
-3
nixos/modules/services/databases/firebird.nix
···
+3
-3
nixos/modules/services/databases/mysql.nix
+3
-3
nixos/modules/services/databases/mysql.nix
······
+58
-73
nixos/modules/services/databases/neo4j.nix
+58
-73
nixos/modules/services/databases/neo4j.nix
······························defaultText = literalExpression ''"''${config.${opt.directories.certificates}}/''${name}"'';······
+5
-5
nixos/modules/services/databases/openldap.nix
+5
-5
nixos/modules/services/databases/openldap.nix
·········
+4
-4
nixos/modules/services/databases/pgmanage.nix
+4
-4
nixos/modules/services/databases/pgmanage.nix
···
+4
-5
nixos/modules/services/databases/postgresql.nix
+4
-5
nixos/modules/services/databases/postgresql.nix
···+<link xlink:href="https://www.postgresql.org/docs/current/auth-pg-hba-conf.html">PostgreSQL documentation for pg_hba.conf</link>······-<link xlink:href="https://www.postgresql.org/docs/current/sql-grant.html">GRANT syntax</link>.
+4
-4
nixos/modules/services/databases/victoriametrics.nix
+4
-4
nixos/modules/services/databases/victoriametrics.nix
···
+1
-1
nixos/modules/services/development/zammad.nix
+1
-1
nixos/modules/services/development/zammad.nix
+3
-1
nixos/modules/services/games/asf.nix
+3
-1
nixos/modules/services/games/asf.nix
···-description = "Additional settings that are documented <link xlink:href=\"https://github.com/JustArchiNET/ArchiSteamFarm/wiki/Configuration#bot-config\">here</link>.";+Additional settings that are documented [here](https://github.com/JustArchiNET/ArchiSteamFarm/wiki/Configuration#bot-config).
+7
-7
nixos/modules/services/hardware/kanata.nix
+7
-7
nixos/modules/services/hardware/kanata.nix
············
+3
-6
nixos/modules/services/hardware/lcd.nix
+3
-6
nixos/modules/services/hardware/lcd.nix
······Bus 005 Device 002: ID 0403:c630 Future Technology Devices International, Ltd lcd2usb interface
+11
-12
nixos/modules/services/hardware/udev.nix
+11
-12
nixos/modules/services/hardware/udev.nix
······-xlink:href='http://www.freedesktop.org/wiki/Software/systemd/PredictableNetworkInterfaceNames'>predictable+Whether to assign [predictable names to network interfaces](http://www.freedesktop.org/wiki/Software/systemd/PredictableNetworkInterfaceNames).···
+11
-12
nixos/modules/services/logging/filebeat.nix
+11
-12
nixos/modules/services/logging/filebeat.nix
···-See <link xlink:href="https://www.elastic.co/guide/en/beats/filebeat/current/configuration-filebeat-options.html"/>.+See <https://www.elastic.co/guide/en/beats/filebeat/current/configuration-filebeat-options.html>.···-See <link xlink:href="https://www.elastic.co/guide/en/beats/filebeat/current/filebeat-modules.html"/>.···See <link xlink:href="https://www.elastic.co/guide/en/beats/filebeat/current/configuration-filebeat-options.html"/>.
+5
-5
nixos/modules/services/logging/logrotate.nix
+5
-5
nixos/modules/services/logging/logrotate.nix
······
+2
-2
nixos/modules/services/mail/mailman.nix
+2
-2
nixos/modules/services/mail/mailman.nix
···
+6
-6
nixos/modules/services/mail/nullmailer.nix
+6
-6
nixos/modules/services/mail/nullmailer.nix
······
+3
-3
nixos/modules/services/mail/postfixadmin.nix
+3
-3
nixos/modules/services/mail/postfixadmin.nix
···-Further nginx configuration can be done by adapting <literal>services.nginx.virtualHosts.<name></literal>.
+5
-5
nixos/modules/services/mail/public-inbox.nix
+5
-5
nixos/modules/services/mail/public-inbox.nix
······-<code>locations."/inbox".proxyPass = "http://unix:''${config.services.public-inbox.http.port}:/inbox";</code>+`locations."/inbox".proxyPass = "http://unix:''${config.services.public-inbox.http.port}:/inbox";`
+5
-5
nixos/modules/services/mail/roundcube.nix
+5
-5
nixos/modules/services/mail/roundcube.nix
···-Further nginx configuration can be done by adapting <literal>services.nginx.virtualHosts.<name></literal>.···
+9
-9
nixos/modules/services/mail/sympa.nix
+9
-9
nixos/modules/services/mail/sympa.nix
·········The webserver used for the Sympa web interface. Set it to `none` if you want to configure it yourself.···
+5
-12
nixos/modules/services/matrix/appservice-discord.nix
+5
-12
nixos/modules/services/matrix/appservice-discord.nix
···-<link xlink:href="https://github.com/Half-Shot/matrix-appservice-discord/blob/master/config/config.sample.yaml">+[config.sample.yaml](https://github.com/Half-Shot/matrix-appservice-discord/blob/master/config/config.sample.yaml).should be set to match the public host name of the Matrix homeserver for webhooks and avatars to work.
+4
-7
nixos/modules/services/matrix/mautrix-facebook.nix
+4
-7
nixos/modules/services/matrix/mautrix-facebook.nix
···-<link xlink:href="https://github.com/mautrix/facebook/blob/master/mautrix_facebook/example-config.yaml">+[example-config.yaml](https://github.com/mautrix/facebook/blob/master/mautrix_facebook/example-config.yaml).
+4
-7
nixos/modules/services/matrix/mautrix-telegram.nix
+4
-7
nixos/modules/services/matrix/mautrix-telegram.nix
···+[example-config.yaml](https://github.com/tulir/mautrix-telegram/blob/master/example-config.yaml).
+4
-4
nixos/modules/services/misc/autorandr.nix
+4
-4
nixos/modules/services/misc/autorandr.nix
·········
+5
-8
nixos/modules/services/misc/bees.nix
+5
-8
nixos/modules/services/misc/bees.nix
······
+2
-2
nixos/modules/services/misc/etcd.nix
+2
-2
nixos/modules/services/misc/etcd.nix
···-<link xlink:href='https://github.com/coreos/etcd/blob/master/Documentation/op-guide/configuration.md#configuration-flags' />+<https://github.com/coreos/etcd/blob/master/Documentation/op-guide/configuration.md#configuration-flags>
+2
-2
nixos/modules/services/misc/etebase-server.nix
+2
-2
nixos/modules/services/misc/etebase-server.nix
···-<link xlink:href="https://github.com/etesync/server/blob/master/etebase-server.ini.example" />
+2
-3
nixos/modules/services/misc/geoipupdate.nix
+2
-3
nixos/modules/services/misc/geoipupdate.nix
······
+1
-1
nixos/modules/services/misc/klipper.nix
+1
-1
nixos/modules/services/misc/klipper.nix
+2
-4
nixos/modules/services/misc/nix-daemon.nix
+2
-4
nixos/modules/services/misc/nix-daemon.nix
···You can use <command>nix-instantiate --eval --strict '<nixpkgs/nixos>' -A config.nix.settings</command>Nix configurations defined under <option>nix.*</option> will be translated and applied to thisoption. In addition, configuration specified in <option>nix.extraOptions</option> which will be appended
+2
-2
nixos/modules/services/misc/persistent-evdev.nix
+2
-2
nixos/modules/services/misc/persistent-evdev.nix
···Physical devices should already exist in <filename class="devicefile">/dev/input/by-id/</filename>.-See the <link xlink:href="https://github.com/aiberia/persistent-evdev#example-usage-with-libvirt">+See the <link xlink:href="https://github.com/aiberia/persistent-evdev#example-usage-with-libvirt">project page</link><literal>cgroup_device_acl</literal> list (see <xref linkend="opt-virtualisation.libvirtd.qemu.verbatimConfig"/>).
+5
-5
nixos/modules/services/misc/sourcehut/default.nix
+5
-5
nixos/modules/services/misc/sourcehut/default.nix
···+to a secret key to encrypt internal messages with. Use <literal>srht-keygen network</literal> to·········
+1
-1
nixos/modules/services/misc/sssd.nix
+1
-1
nixos/modules/services/misc/sssd.nix
+1
-3
nixos/modules/services/misc/zoneminder.nix
+1
-3
nixos/modules/services/misc/zoneminder.nix
······
+7
-7
nixos/modules/services/monitoring/cadvisor.nix
+7
-7
nixos/modules/services/monitoring/cadvisor.nix
···-<option>storageDriverPasswordFile</option> takes precedence over <option>storageDriverPassword</option>-Warning: when <option>storageDriverPassword</option> is non-empty this defaults to a file in the-Tip: use <link xlink:href='https://nixos.org/nixops/manual/#idm140737318306400'>nixops key management</link>···-See <link xlink:href='https://github.com/google/cadvisor/blob/master/docs/runtime_options.md'/> for available options.+See <https://github.com/google/cadvisor/blob/master/docs/runtime_options.md> for available options.
+1
-1
nixos/modules/services/monitoring/grafana-image-renderer.nix
+1
-1
nixos/modules/services/monitoring/grafana-image-renderer.nix
···-See <link xlink:href="https://github.com/grafana/grafana-image-renderer/blob/ce1f81438e5f69c7fd7c73ce08bab624c4c92e25/default.json" />+See <link xlink:href="https://github.com/grafana/grafana-image-renderer/blob/ce1f81438e5f69c7fd7c73ce08bab624c4c92e25/default.json"/>
+2
-2
nixos/modules/services/monitoring/graphite.nix
+2
-2
nixos/modules/services/monitoring/graphite.nix
···
+5
-5
nixos/modules/services/monitoring/metricbeat.nix
+5
-5
nixos/modules/services/monitoring/metricbeat.nix
···-for each, but setting <xref linkend="opt-services.metricbeat.modules._name_.module"/> to the same value.-See <link xlink:href="https://www.elastic.co/guide/en/beats/metricbeat/current/metricbeat-modules.html"/>.
+14
-14
nixos/modules/services/monitoring/munin.nix
+14
-14
nixos/modules/services/monitoring/munin.nix
···-See <link xlink:href='http://guide.munin-monitoring.org/en/latest/architecture/index.html' />.-<link xlink:href='http://guide.munin-monitoring.org/en/latest/reference/munin-node.conf.html' />···-See <link xlink:href='http://guide.munin-monitoring.org/en/latest/reference/munin.conf.html' />.···
+1
-1
nixos/modules/services/monitoring/nagios.nix
+1
-1
nixos/modules/services/monitoring/nagios.nix
···-enable = mkEnableOption "<link xlink:href='http://www.nagios.org/'>Nagios</link> to monitor your system or network.";+enable = mkEnableOption ''<link xlink:href="http://www.nagios.org/">Nagios</link> to monitor your system or network.'';
+4
-4
nixos/modules/services/monitoring/netdata.nix
+4
-4
nixos/modules/services/monitoring/netdata.nix
···
+17
-22
nixos/modules/services/monitoring/parsedmarc.nix
+17
-22
nixos/modules/services/monitoring/parsedmarc.nix
······+To finish the setup, you need to manually set the [](#opt-services.geoipupdate.settings.AccountID) and············
+6
-9
nixos/modules/services/monitoring/prometheus/default.nix
+6
-9
nixos/modules/services/monitoring/prometheus/default.nix
···-xlink:href="https://prometheus.io/docs/prometheus/latest/configuration/configuration/#gce_sd_config">the+See <link xlink:href="https://prometheus.io/docs/prometheus/latest/configuration/configuration/#gce_sd_config">the relevant Prometheus configuration docs</link>···+query parameter section: <link xlink:href="https://cloud.google.com/compute/docs/reference/latest/instances/list"/>.······-<link xlink:href="https://docs.mesosphere.com/1.11/security/ent/iam-api/#passing-an-authentication-token" />+<link xlink:href="https://docs.mesosphere.com/1.11/security/ent/iam-api/#passing-an-authentication-token"/>It is mutually exclusive with <literal>auth_token_file</literal> and other authentication mechanisms.-<link xlink:href="https://docs.mesosphere.com/1.11/security/ent/iam-api/#passing-an-authentication-token" />+<link xlink:href="https://docs.mesosphere.com/1.11/security/ent/iam-api/#passing-an-authentication-token"/>It is mutually exclusive with <literal>auth_token</literal> and other authentication mechanisms.
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/dovecot.nix
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/dovecot.nix
···-<xref linkend="opt-services.prometheus.exporters.dovecot.socketPath" /> = "/var/run/dovecot2/old-stats";+<xref linkend="opt-services.prometheus.exporters.dovecot.socketPath"/> = "/var/run/dovecot2/old-stats";
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/process.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/process.nix
···-settings that can all be used here: <link xlink:href="https://github.com/ncabatoff/process-exporter" />+settings that can all be used here: <link xlink:href="https://github.com/ncabatoff/process-exporter"/>
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/script.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/script.nix
···-settings that can all be used here: <link xlink:href="https://github.com/adhocteam/script_exporter#sample-configuration" />+settings that can all be used here: <link xlink:href="https://github.com/adhocteam/script_exporter#sample-configuration"/>
+5
-5
nixos/modules/services/networking/biboumi.nix
+5
-5
nixos/modules/services/networking/biboumi.nix
···-Set it to null and use <link linkend="opt-services.biboumi.credentialsFile">credentialsFile</link>···
+6
-6
nixos/modules/services/networking/bird-lg.nix
+6
-6
nixos/modules/services/networking/bird-lg.nix
···-Extra parameters documented <link xlink:href=\"https://github.com/xddxdd/bird-lg-go#frontend\">here</link>.···-Extra parameters documented <link xlink:href=\"https://github.com/xddxdd/bird-lg-go#proxy\">here</link>.
+6
-6
nixos/modules/services/networking/bird.nix
+6
-6
nixos/modules/services/networking/bird.nix
······
+4
-1
nixos/modules/services/networking/coredns.nix
+4
-1
nixos/modules/services/networking/coredns.nix
···-description = "Verbatim Corefile to use. See <link xlink:href=\"https://coredns.io/manual/toc/#configuration\"/> for details.";
+9
-9
nixos/modules/services/networking/ghostunnel.nix
+9
-9
nixos/modules/services/networking/ghostunnel.nix
···-NB: storepass is not supported because it would expose credentials via <code>/proc/*/cmdline</code>.+NB: storepass is not supported because it would expose credentials via <literal>/proc/*/cmdline</literal>.···
+3
-3
nixos/modules/services/networking/hans.nix
+3
-3
nixos/modules/services/networking/hans.nix
···
+3
-3
nixos/modules/services/networking/iodine.nix
+3
-3
nixos/modules/services/networking/iodine.nix
···
+16
-16
nixos/modules/services/networking/kea.nix
+16
-16
nixos/modules/services/networking/kea.nix
···-Kea Control Agent configuration as a path, see <link xlink:href="https://kea.readthedocs.io/en/kea-${package.version}/arm/agent.html"/>.+Kea Control Agent configuration as a path, see <https://kea.readthedocs.io/en/kea-${package.version}/arm/agent.html>.-Most users should prefer using <link linkend="opt-services.kea.ctrl-agent.settings">settings</link> instead.···-Kea DHCP4 configuration as a path, see <link xlink:href="https://kea.readthedocs.io/en/kea-${package.version}/arm/dhcp4-srv.html"/>.+Kea DHCP4 configuration as a path, see <https://kea.readthedocs.io/en/kea-${package.version}/arm/dhcp4-srv.html>.-Most users should prefer using <link linkend="opt-services.kea.dhcp4.settings">settings</link> instead.···-Kea DHCP6 configuration as a path, see <link xlink:href="https://kea.readthedocs.io/en/kea-${package.version}/arm/dhcp6-srv.html"/>.+Kea DHCP6 configuration as a path, see <https://kea.readthedocs.io/en/kea-${package.version}/arm/dhcp6-srv.html>.-Most users should prefer using <link linkend="opt-services.kea.dhcp6.settings">settings</link> instead.···-Kea DHCP-DDNS configuration as a path, see <link xlink:href="https://kea.readthedocs.io/en/kea-${package.version}/arm/ddns.html"/>.+Kea DHCP-DDNS configuration as a path, see <https://kea.readthedocs.io/en/kea-${package.version}/arm/ddns.html>.-Most users should prefer using <link linkend="opt-services.kea.dhcp-ddns.settings">settings</link> instead.
+2
-2
nixos/modules/services/networking/ncdns.nix
+2
-2
nixos/modules/services/networking/ncdns.nix
···-See the example ncdns.conf file at <link xlink:href="https://github.com/namecoin/ncdns/blob/master/_doc/ncdns.conf.example"/>+See the example ncdns.conf file at <https://github.com/namecoin/ncdns/blob/master/_doc/ncdns.conf.example>
+5
-6
nixos/modules/services/networking/networkmanager.nix
+5
-6
nixos/modules/services/networking/networkmanager.nix
···<link xlink:href="https://developer.gnome.org/NetworkManager/stable/NetworkManager.conf.html">···
+2
-2
nixos/modules/services/networking/nntp-proxy.nix
+2
-2
nixos/modules/services/networking/nntp-proxy.nix
···example = "$6$GtzE7FrpE$wwuVgFYU.TZH4Rz.Snjxk9XGua89IeVwPQ/fEUD8eujr40q5Y021yhn0aNcsQ2Ifw.BLclyzvzgegopgKcneL0";
+2
-2
nixos/modules/services/networking/nsd.nix
+2
-2
nixos/modules/services/networking/nsd.nix
···
+7
-10
nixos/modules/services/networking/ntp/ntpd.nix
+7
-10
nixos/modules/services/networking/ntp/ntpd.nix
······
+7
-7
nixos/modules/services/networking/openconnect.nix
+7
-7
nixos/modules/services/networking/openconnect.nix
······
+3
-3
nixos/modules/services/networking/openvpn.nix
+3
-3
nixos/modules/services/networking/openvpn.nix
···
+4
-4
nixos/modules/services/networking/pleroma.nix
+4
-4
nixos/modules/services/networking/pleroma.nix
······
+1
-1
nixos/modules/services/networking/seafile.nix
+1
-1
nixos/modules/services/networking/seafile.nix
···
+15
-18
nixos/modules/services/networking/ssh/sshd.nix
+15
-18
nixos/modules/services/networking/ssh/sshd.nix
···-keys, you can generally use <xref linkend="opt-users.users._name_.openssh.authorizedKeys.keys"/>·········
+2
-1
nixos/modules/services/networking/strongswan-swanctl/param-constructors.nix
+2
-1
nixos/modules/services/networking/strongswan-swanctl/param-constructors.nix
+45
-45
nixos/modules/services/networking/strongswan-swanctl/swanctl-params.nix
+45
-45
nixos/modules/services/networking/strongswan-swanctl/swanctl-params.nix
······························<listitem><para>Finally, setting the option to <literal>no</literal> will disable announcing···········································································
+8
-10
nixos/modules/services/networking/wireguard.nix
+8
-10
nixos/modules/services/networking/wireguard.nix
······
+1
-1
nixos/modules/services/networking/wpa_supplicant.nix
+1
-1
nixos/modules/services/networking/wpa_supplicant.nix
···
+8
-8
nixos/modules/services/networking/yggdrasil.nix
+8
-8
nixos/modules/services/networking/yggdrasil.nix
······-description = "Group to grant access to the Yggdrasil control socket. If <code>null</code>, only root can access the socket.";+description = lib.mdDoc "Group to grant access to the Yggdrasil control socket. If `null`, only root can access the socket.";
+7
-14
nixos/modules/services/networking/znc/default.nix
+7
-14
nixos/modules/services/networking/znc/default.nix
···You can use <command>nix-instantiate --eval --strict '<nixpkgs/nixos>' -A config.services.znc.config</command>······
+1
-2
nixos/modules/services/networking/znc/options.nix
+1
-2
nixos/modules/services/networking/znc/options.nix
···You can use <command>nix-instantiate --eval --strict '<nixpkgs/nixos>' -A config.services.znc.config</command>
+4
-4
nixos/modules/services/security/privacyidea.nix
+4
-4
nixos/modules/services/security/privacyidea.nix
·········
+2
-2
nixos/modules/services/security/step-ca.nix
+2
-2
nixos/modules/services/security/step-ca.nix
···
+8
-8
nixos/modules/services/security/tor.nix
+8
-8
nixos/modules/services/security/tor.nix
··················-Generated authorization data can be found in <filename>${stateDir}/onion/$name/hostname</filename>.
+2
-2
nixos/modules/services/security/vault.nix
+2
-2
nixos/modules/services/security/vault.nix
···
+1
-1
nixos/modules/services/security/vaultwarden/default.nix
+1
-1
nixos/modules/services/security/vaultwarden/default.nix
···<link xlink:href="https://github.com/dani-garcia/vaultwarden/blob/${vaultwarden.version}/.env.template">the environment template file</link>.
+7
-7
nixos/modules/services/system/dbus.nix
+7
-7
nixos/modules/services/system/dbus.nix
···
+8
-8
nixos/modules/services/system/earlyoom.nix
+8
-8
nixos/modules/services/system/earlyoom.nix
···
+29
-29
nixos/modules/services/torrent/transmission.nix
+29
-29
nixos/modules/services/torrent/transmission.nix
······-when <xref linkend="opt-services.transmission.settings.peer-port-random-on-start"/> is enabled.-when <xref linkend="opt-services.transmission.settings.peer-port-random-on-start"/> is enabled.···············
+2
-2
nixos/modules/services/web-apps/bookstack.nix
+2
-2
nixos/modules/services/web-apps/bookstack.nix
······The root URL that you want to host BookStack on. All URLs in BookStack will be generated using this value.-If you change this in the future you may need to run a command to update stored URLs in the database. Command example: <code>php artisan bookstack:update-url https://old.example.com https://new.example.com</code>+If you change this in the future you may need to run a command to update stored URLs in the database. Command example: <literal>php artisan bookstack:update-url https://old.example.com https://new.example.com</literal>
+5
-5
nixos/modules/services/web-apps/dokuwiki.nix
+5
-5
nixos/modules/services/web-apps/dokuwiki.nix
···-Further nginx configuration can be done by adapting <literal>services.nginx.virtualHosts.<name></literal>.-Further apache2 configuration can be done by adapting <literal>services.httpd.virtualHosts.<name></literal>.
+2
-3
nixos/modules/services/web-apps/hedgedoc.nix
+2
-3
nixos/modules/services/web-apps/hedgedoc.nix
···
+16
-23
nixos/modules/services/web-apps/keycloak.nix
+16
-23
nixos/modules/services/web-apps/keycloak.nix
···············
+18
-18
nixos/modules/services/web-apps/mastodon.nix
+18
-18
nixos/modules/services/web-apps/mastodon.nix
···+<literal>/ -> $(nix-instantiate --eval '<nixpkgs>' -A mastodon.outPath)/public</literal>+<literal>/ -> 127.0.0.1:{{ webPort }} </literal>(If there was no file in the directory above.)······-<code>nix build -f '<nixpkgs>' mastodon; cd result; bin/rake webpush:generate_keys</code>·········-<code>nix build -f '<nixpkgs>' mastodon; cd result; bin/rake webpush:generate_keys</code>
+1
-1
nixos/modules/services/web-apps/mediawiki.nix
+1
-1
nixos/modules/services/web-apps/mediawiki.nix
···
+13
-13
nixos/modules/services/web-apps/nextcloud.nix
+13
-13
nixos/modules/services/web-apps/nextcloud.nix
···-Data storage path of nextcloud. Will be <xref linkend="opt-services.nextcloud.home" /> by default.This folder will be populated with a config.php and data folder which contains the state of the instance (excl the database).";···Extra apps to install. Should be an attrSet of appid to packages generated by fetchNextcloudApp.-Using this will disable the appstore to prevent Nextcloud from updating these apps (see <xref linkend="opt-services.nextcloud.appstoreEnable" />).+Using this will disable the appstore to prevent Nextcloud from updating these apps (see [](#opt-services.nextcloud.appstoreEnable)).···-Automatically enable the apps in <xref linkend="opt-services.nextcloud.extraApps" /> every time nextcloud starts.+Automatically enable the apps in [](#opt-services.nextcloud.extraApps) every time nextcloud starts.If set to false, apps need to be enabled in the Nextcloud user interface or with nextcloud-occ app:enable.···-Enabled by default unless there are packages in <xref linkend="opt-services.nextcloud.extraApps" />.-Set to true to force enable the store even if <xref linkend="opt-services.nextcloud.extraApps" /> is used.Set to false to disable the installation of apps from the global appstore. App management is always enabled regardless of this setting.···This is used by the theming app and for generating previews of certain images (e.g. SVG and HEIF).You may want to disable it for increased security. In that case, previews will still be available···
+2
-3
nixos/modules/services/web-apps/node-red.nix
+2
-3
nixos/modules/services/web-apps/node-red.nix
···-xlink:href="https://github.com/node-red/node-red/blob/master/packages/node_modules/node-red/settings.js"/>+See <https://github.com/node-red/node-red/blob/master/packages/node_modules/node-red/settings.js>
+2
-2
nixos/modules/services/web-apps/snipe-it.nix
+2
-2
nixos/modules/services/web-apps/snipe-it.nix
······The root URL that you want to host Snipe-IT on. All URLs in Snipe-IT will be generated using this value.If you change this in the future you may need to run a command to update stored URLs in the database.-Command example: <code>snipe-it snipe-it:update-url https://old.example.com https://new.example.com</code>+Command example: <literal>snipe-it snipe-it:update-url https://old.example.com https://new.example.com</literal>
+1
-1
nixos/modules/services/web-apps/trilium.nix
+1
-1
nixos/modules/services/web-apps/trilium.nix
+2
-3
nixos/modules/services/web-apps/wiki-js.nix
+2
-3
nixos/modules/services/web-apps/wiki-js.nix
···+corresponds to <link xlink:href="https://docs.requarks.io/install/config">the upstream configuration options</link>.
+2
-2
nixos/modules/services/web-apps/wordpress.nix
+2
-2
nixos/modules/services/web-apps/wordpress.nix
······
+3
-5
nixos/modules/services/web-servers/apache-httpd/vhost-options.nix
+3
-5
nixos/modules/services/web-servers/apache-httpd/vhost-options.nix
······+Specification of pages to be ignored by web crawlers. See <link xlink:href="http://www.robotstxt.org/"/> for details.···+Declarative location config. See <link xlink:href="https://httpd.apache.org/docs/2.4/mod/core.html#location"/> for details.
+4
-4
nixos/modules/services/web-servers/nginx/default.nix
+4
-4
nixos/modules/services/web-servers/nginx/default.nix
···
+1
-2
nixos/modules/services/web-servers/uwsgi.nix
+1
-2
nixos/modules/services/web-servers/uwsgi.nix
···+See the uWSGI <link xlink:href="https://uwsgi-docs.readthedocs.io/en/latest/Capabilities.html">docs</link>
+2
-3
nixos/modules/services/x11/desktop-managers/plasma5.nix
+2
-3
nixos/modules/services/x11/desktop-managers/plasma5.nix
···
+2
-2
nixos/modules/services/x11/display-managers/lightdm-greeters/mini.nix
+2
-2
nixos/modules/services/x11/display-managers/lightdm-greeters/mini.nix
···
+2
-2
nixos/modules/services/x11/display-managers/lightdm-greeters/tiny.nix
+2
-2
nixos/modules/services/x11/display-managers/lightdm-greeters/tiny.nix
···
+1
-1
nixos/modules/services/x11/window-managers/fvwm2.nix
+1
-1
nixos/modules/services/x11/window-managers/fvwm2.nix
+1
-1
nixos/modules/system/activation/top-level.nix
+1
-1
nixos/modules/system/activation/top-level.nix
···
+6
-7
nixos/modules/system/boot/initrd-network.nix
+6
-7
nixos/modules/system/boot/initrd-network.nix
···+as described in [the kernel documentation](https://www.kernel.org/doc/Documentation/filesystems/nfs/nfsroot.txt).
+6
-6
nixos/modules/system/boot/loader/grub/grub.nix
+6
-6
nixos/modules/system/boot/loader/grub/grub.nix
······
+2
-2
nixos/modules/system/boot/luksroot.nix
+2
-2
nixos/modules/system/boot/luksroot.nix
···
+4
-7
nixos/modules/system/boot/networkd.nix
+4
-7
nixos/modules/system/boot/networkd.nix
···+<link xlink:href="https://www.kernel.org/doc/Documentation/networking/vrf.txt">kernel docs</link>.···-See <link xlink:href="https://www.freedesktop.org/software/systemd/man/systemd-networkd-wait-online.service.html">-<citerefentry><refentrytitle>systemd-networkd-wait-online.service</refentrytitle><manvolnum>8</manvolnum>+See [{manpage}`systemd-networkd-wait-online.service(8)`](https://www.freedesktop.org/software/systemd/man/systemd-networkd-wait-online.service.html) for all available options.
+1
-1
nixos/modules/system/boot/stage-1.nix
+1
-1
nixos/modules/system/boot/stage-1.nix
···
+3
-6
nixos/modules/system/boot/systemd/logind.nix
+3
-6
nixos/modules/system/boot/systemd/logind.nix
···+[systemd.scope(5)](https://www.freedesktop.org/software/systemd/man/systemd.scope.html#)), and processes are not killed.-See <link xlink:href="https://www.freedesktop.org/software/systemd/man/logind.conf.html#KillUserProcesses=">logind.conf(5)</link>+See [logind.conf(5)](https://www.freedesktop.org/software/systemd/man/logind.conf.html#KillUserProcesses=)
+5
-5
nixos/modules/system/boot/systemd/tmpfiles.nix
+5
-5
nixos/modules/system/boot/systemd/tmpfiles.nix
···If this folder does not exist or does not contain any files an error will be returned instead.
+3
-3
nixos/modules/tasks/auto-upgrade.nix
+3
-3
nixos/modules/tasks/auto-upgrade.nix
···
+1
-1
nixos/modules/tasks/network-interfaces.nix
+1
-1
nixos/modules/tasks/network-interfaces.nix
···
+2
-2
nixos/modules/tasks/scsi-link-power-management.nix
+2
-2
nixos/modules/tasks/scsi-link-power-management.nix
···
+6
-6
nixos/modules/virtualisation/nixos-containers.nix
+6
-6
nixos/modules/virtualisation/nixos-containers.nix
······
+1
-1
nixos/modules/virtualisation/podman/default.nix
+1
-1
nixos/modules/virtualisation/podman/default.nix
+1
-1
nixos/modules/virtualisation/podman/network-socket.nix
+1
-1
nixos/modules/virtualisation/podman/network-socket.nix
···
+3
-3
nixos/modules/virtualisation/qemu-vm.nix
+3
-3
nixos/modules/virtualisation/qemu-vm.nix
···