+10
-21
nixos/lib/make-options-doc/default.nix
+10
-21
nixos/lib/make-options-doc/default.nix
···optionsNix = builtins.listToAttrs (map (o: { name = o.name; value = removeAttrs o ["name" "visible" "internal"]; }) optionsList);······
···optionsNix = builtins.listToAttrs (map (o: { name = o.name; value = removeAttrs o ["name" "visible" "internal"]; }) optionsList);······
+120
-117
nixos/lib/make-options-doc/mergeJSON.py
+120
-117
nixos/lib/make-options-doc/mergeJSON.py
······ADMONITION_PATTERN = re.compile(r'^::: \{([^\n]*?)\}\n(.*?)^:::\n', flags=re.MULTILINE|re.DOTALL)
······ADMONITION_PATTERN = re.compile(r'^::: \{([^\n]*?)\}\n(.*?)^:::\n', flags=re.MULTILINE|re.DOTALL)
+3
-4
nixos/modules/config/i18n.nix
+3
-4
nixos/modules/config/i18n.nix
···
···
+3
-3
nixos/modules/config/resolvconf.nix
+3
-3
nixos/modules/config/resolvconf.nix
···
···
+2
-2
nixos/modules/config/shells-environment.nix
+2
-2
nixos/modules/config/shells-environment.nix
···
···
+5
-5
nixos/modules/config/system-environment.nix
+5
-5
nixos/modules/config/system-environment.nix
·········
·········
+19
-20
nixos/modules/config/users-groups.nix
+19
-20
nixos/modules/config/users-groups.nix
·········
·········
+1
-1
nixos/modules/config/xdg/portal.nix
+1
-1
nixos/modules/config/xdg/portal.nix
+2
-3
nixos/modules/hardware/logitech.nix
+2
-3
nixos/modules/hardware/logitech.nix
+1
-1
nixos/modules/hardware/tuxedo-keyboard.nix
+1
-1
nixos/modules/hardware/tuxedo-keyboard.nix
···To configure the driver, pass the options to the <option>boot.kernelParams</option> configuration.There are several parameters you can change. It's best to check at the source code description which options are supported.-You can find all the supported parameters at: <link xlink:href="https://github.com/tuxedocomputers/tuxedo-keyboard#kernelparam" />In order to use the <literal>custom</literal> lighting with the maximumg brightness and a color of <literal>0xff0a0a</literal> one would put pass <option>boot.kernelParams</option> like this:
···To configure the driver, pass the options to the <option>boot.kernelParams</option> configuration.There are several parameters you can change. It's best to check at the source code description which options are supported.+You can find all the supported parameters at: <link xlink:href="https://github.com/tuxedocomputers/tuxedo-keyboard#kernelparam"/>In order to use the <literal>custom</literal> lighting with the maximumg brightness and a color of <literal>0xff0a0a</literal> one would put pass <option>boot.kernelParams</option> like this:
+6
-6
nixos/modules/hardware/video/uvcvideo/default.nix
+6
-6
nixos/modules/hardware/video/uvcvideo/default.nix
···
···
+1
-1
nixos/modules/installer/cd-dvd/iso-image.nix
+1
-1
nixos/modules/installer/cd-dvd/iso-image.nix
+22
-22
nixos/modules/misc/nixpkgs.nix
+22
-22
nixos/modules/misc/nixpkgs.nix
·································-Ignored when <code>nixpkgs.pkgs</code>, <code>nixpkgs.localSystem</code> or <code>nixpkgs.hostPlatform</code> is set.
·································+Ignored when <literal>nixpkgs.pkgs</literal>, <literal>nixpkgs.localSystem</literal> or <literal>nixpkgs.hostPlatform</literal> is set.
+2
-2
nixos/modules/programs/adb.nix
+2
-2
nixos/modules/programs/adb.nix
···
···
+3
-4
nixos/modules/programs/firejail.nix
+3
-4
nixos/modules/programs/firejail.nix
···
···
+2
-2
nixos/modules/programs/gphoto2.nix
+2
-2
nixos/modules/programs/gphoto2.nix
···
···
+1
-1
nixos/modules/programs/kdeconnect.nix
+1
-1
nixos/modules/programs/kdeconnect.nix
···
+2
-2
nixos/modules/programs/neovim.nix
+2
-2
nixos/modules/programs/neovim.nix
+9
-9
nixos/modules/programs/nncp.nix
+9
-9
nixos/modules/programs/nncp.nix
···
···
+1
-1
nixos/modules/programs/ssh.nix
+1
-1
nixos/modules/programs/ssh.nix
···See <citerefentry><refentrytitle>ssh_config</refentrytitle><manvolnum>5</manvolnum></citerefentry>
···See <citerefentry><refentrytitle>ssh_config</refentrytitle><manvolnum>5</manvolnum></citerefentry>
+1
-1
nixos/modules/programs/sway.nix
+1
-1
nixos/modules/programs/sway.nix
···
···
+3
-3
nixos/modules/programs/turbovnc.nix
+3
-3
nixos/modules/programs/turbovnc.nix
···
···
+4
-4
nixos/modules/security/acme/default.nix
+4
-4
nixos/modules/security/acme/default.nix
······-<listitem><para><link xlink:href="https://blog.apnic.net/2019/01/15/is-the-web-ready-for-ocsp-must-staple/" /></para></listitem>-<listitem><para><link xlink:href="https://blog.hboeck.de/archives/886-The-Problem-with-OCSP-Stapling-and-Must-Staple-and-why-Certificate-Revocation-is-still-broken.html" /></para></listitem>
······+<listitem><para><link xlink:href="https://blog.apnic.net/2019/01/15/is-the-web-ready-for-ocsp-must-staple/"/></para></listitem>+<listitem><para><link xlink:href="https://blog.hboeck.de/archives/886-The-Problem-with-OCSP-Stapling-and-Must-Staple-and-why-Certificate-Revocation-is-still-broken.html"/></para></listitem>
+1
-1
nixos/modules/security/dhparams.nix
+1
-1
nixos/modules/security/dhparams.nix
···
···
+30
-30
nixos/modules/security/doas.nix
+30
-30
nixos/modules/security/doas.nix
·····················
·····················
+2
-2
nixos/modules/security/misc.nix
+2
-2
nixos/modules/security/misc.nix
······
······
+50
-61
nixos/modules/security/pam.nix
+50
-61
nixos/modules/security/pam.nix
·········-<literal>username:first_keyHandle,first_public_key: second_keyHandle,second_public_key</literal>-<literal>username:first_keyHandle,first_public_key: second_keyHandle,second_public_key</literal>············-xlink:href="https://developers.yubico.com/yubico-pam/Authentication_Using_Challenge-Response.html">here</link>.If not null, set the path used by yubico pam module where the challenge expected response is stored.-xlink:href="https://developers.yubico.com/yubico-pam/Authentication_Using_Challenge-Response.html">here</link>.
·········+More information can be found [here](https://developers.yubico.com/pam-u2f/Manuals/pam_u2f.8.html)+More information can be found [here](https://developers.yubico.com/pam-u2f/Manuals/pam_u2f.8.html)············+More information can be found [here](https://developers.yubico.com/yubico-pam/Authentication_Using_Challenge-Response.html).If not null, set the path used by yubico pam module where the challenge expected response is stored.+More information can be found [here](https://developers.yubico.com/yubico-pam/Authentication_Using_Challenge-Response.html).
+6
-9
nixos/modules/security/pam_mount.nix
+6
-9
nixos/modules/security/pam_mount.nix
······
······
+2
-3
nixos/modules/security/pam_usb.nix
+2
-3
nixos/modules/security/pam_usb.nix
···-xlink:href="https://github.com/aluzzardi/pam_usb/wiki/Getting-Started#setting-up-devices-and-users" />.
+11
-11
nixos/modules/security/sudo.nix
+11
-11
nixos/modules/security/sudo.nix
·········
·········
+3
-3
nixos/modules/services/backup/duplicity.nix
+3
-3
nixos/modules/services/backup/duplicity.nix
···
+1
-1
nixos/modules/services/backup/restic.nix
+1
-1
nixos/modules/services/backup/restic.nix
+3
-3
nixos/modules/services/backup/syncoid.nix
+3
-3
nixos/modules/services/backup/syncoid.nix
+2
-3
nixos/modules/services/backup/zrepl.nix
+2
-3
nixos/modules/services/backup/zrepl.nix
+2
-3
nixos/modules/services/continuous-integration/github-runner.nix
+2
-3
nixos/modules/services/continuous-integration/github-runner.nix
···Note: GitHub recommends using self-hosted runners with private repositories only. Learn more here:-<link xlink:href="https://docs.github.com/en/actions/hosting-your-own-runners/about-self-hosted-runners"
···Note: GitHub recommends using self-hosted runners with private repositories only. Learn more here:+[About self-hosted runners](https://docs.github.com/en/actions/hosting-your-own-runners/about-self-hosted-runners).
+47
-47
nixos/modules/services/continuous-integration/gitlab-runner.nix
+47
-47
nixos/modules/services/continuous-integration/gitlab-runner.nix
······-<link xlink:href="https://docs.gitlab.com/runner/configuration/advanced-configuration.html#the-global-section"/>···············-See <link xlink:href="https://docs.gitlab.com/runner/executors/README.html">runner documentation</link> for more information.···Overwrite the URL for the GitLab instance. Used if the Runner can’t connect to GitLab on the URL GitLab exposes itself.······························
·····················+See [runner documentation](https://docs.gitlab.com/runner/executors/README.html) for more information.···Overwrite the URL for the GitLab instance. Used if the Runner can’t connect to GitLab on the URL GitLab exposes itself.······························
+3
-3
nixos/modules/services/databases/firebird.nix
+3
-3
nixos/modules/services/databases/firebird.nix
···
···
+3
-3
nixos/modules/services/databases/mysql.nix
+3
-3
nixos/modules/services/databases/mysql.nix
······
······
+58
-73
nixos/modules/services/databases/neo4j.nix
+58
-73
nixos/modules/services/databases/neo4j.nix
····································
····································
+5
-5
nixos/modules/services/databases/openldap.nix
+5
-5
nixos/modules/services/databases/openldap.nix
·········
·········
+4
-4
nixos/modules/services/databases/pgmanage.nix
+4
-4
nixos/modules/services/databases/pgmanage.nix
···
···
+4
-5
nixos/modules/services/databases/postgresql.nix
+4
-5
nixos/modules/services/databases/postgresql.nix
·········-<link xlink:href="https://www.postgresql.org/docs/current/sql-grant.html">GRANT syntax</link>.
···+<link xlink:href="https://www.postgresql.org/docs/current/auth-pg-hba-conf.html">PostgreSQL documentation for pg_hba.conf</link>······
+4
-4
nixos/modules/services/databases/victoriametrics.nix
+4
-4
nixos/modules/services/databases/victoriametrics.nix
···
···
+1
-1
nixos/modules/services/development/zammad.nix
+1
-1
nixos/modules/services/development/zammad.nix
+3
-1
nixos/modules/services/games/asf.nix
+3
-1
nixos/modules/services/games/asf.nix
+7
-7
nixos/modules/services/hardware/kanata.nix
+7
-7
nixos/modules/services/hardware/kanata.nix
············
············
+3
-6
nixos/modules/services/hardware/lcd.nix
+3
-6
nixos/modules/services/hardware/lcd.nix
······
······
+11
-12
nixos/modules/services/hardware/udev.nix
+11
-12
nixos/modules/services/hardware/udev.nix
······-xlink:href='http://www.freedesktop.org/wiki/Software/systemd/PredictableNetworkInterfaceNames'>predictable···
······+Whether to assign [predictable names to network interfaces](http://www.freedesktop.org/wiki/Software/systemd/PredictableNetworkInterfaceNames).···
+11
-12
nixos/modules/services/logging/filebeat.nix
+11
-12
nixos/modules/services/logging/filebeat.nix
···-See <link xlink:href="https://www.elastic.co/guide/en/beats/filebeat/current/configuration-filebeat-options.html"/>.···-See <link xlink:href="https://www.elastic.co/guide/en/beats/filebeat/current/filebeat-modules.html"/>.···See <link xlink:href="https://www.elastic.co/guide/en/beats/filebeat/current/configuration-filebeat-options.html"/>.
···+See <https://www.elastic.co/guide/en/beats/filebeat/current/configuration-filebeat-options.html>.······See <link xlink:href="https://www.elastic.co/guide/en/beats/filebeat/current/configuration-filebeat-options.html"/>.
+5
-5
nixos/modules/services/logging/logrotate.nix
+5
-5
nixos/modules/services/logging/logrotate.nix
······
······
+2
-2
nixos/modules/services/mail/mailman.nix
+2
-2
nixos/modules/services/mail/mailman.nix
···
···
+6
-6
nixos/modules/services/mail/nullmailer.nix
+6
-6
nixos/modules/services/mail/nullmailer.nix
······
······
+3
-3
nixos/modules/services/mail/postfixadmin.nix
+3
-3
nixos/modules/services/mail/postfixadmin.nix
···-Further nginx configuration can be done by adapting <literal>services.nginx.virtualHosts.<name></literal>.
···
+5
-5
nixos/modules/services/mail/public-inbox.nix
+5
-5
nixos/modules/services/mail/public-inbox.nix
······-<code>locations."/inbox".proxyPass = "http://unix:''${config.services.public-inbox.http.port}:/inbox";</code>
······+`locations."/inbox".proxyPass = "http://unix:''${config.services.public-inbox.http.port}:/inbox";`
+5
-5
nixos/modules/services/mail/roundcube.nix
+5
-5
nixos/modules/services/mail/roundcube.nix
···-Further nginx configuration can be done by adapting <literal>services.nginx.virtualHosts.<name></literal>.···
······
+9
-9
nixos/modules/services/mail/sympa.nix
+9
-9
nixos/modules/services/mail/sympa.nix
·········The webserver used for the Sympa web interface. Set it to `none` if you want to configure it yourself.···
·········The webserver used for the Sympa web interface. Set it to `none` if you want to configure it yourself.···
+5
-12
nixos/modules/services/matrix/appservice-discord.nix
+5
-12
nixos/modules/services/matrix/appservice-discord.nix
···-<link xlink:href="https://github.com/Half-Shot/matrix-appservice-discord/blob/master/config/config.sample.yaml">should be set to match the public host name of the Matrix homeserver for webhooks and avatars to work.
···+[config.sample.yaml](https://github.com/Half-Shot/matrix-appservice-discord/blob/master/config/config.sample.yaml).should be set to match the public host name of the Matrix homeserver for webhooks and avatars to work.
+4
-7
nixos/modules/services/matrix/mautrix-facebook.nix
+4
-7
nixos/modules/services/matrix/mautrix-facebook.nix
···-<link xlink:href="https://github.com/mautrix/facebook/blob/master/mautrix_facebook/example-config.yaml">
···+[example-config.yaml](https://github.com/mautrix/facebook/blob/master/mautrix_facebook/example-config.yaml).
+4
-7
nixos/modules/services/matrix/mautrix-telegram.nix
+4
-7
nixos/modules/services/matrix/mautrix-telegram.nix
···
···+[example-config.yaml](https://github.com/tulir/mautrix-telegram/blob/master/example-config.yaml).
+4
-4
nixos/modules/services/misc/autorandr.nix
+4
-4
nixos/modules/services/misc/autorandr.nix
·········
·········
+5
-8
nixos/modules/services/misc/bees.nix
+5
-8
nixos/modules/services/misc/bees.nix
······
······
+2
-2
nixos/modules/services/misc/etcd.nix
+2
-2
nixos/modules/services/misc/etcd.nix
+2
-2
nixos/modules/services/misc/etebase-server.nix
+2
-2
nixos/modules/services/misc/etebase-server.nix
···-<link xlink:href="https://github.com/etesync/server/blob/master/etebase-server.ini.example" />
···
+2
-3
nixos/modules/services/misc/geoipupdate.nix
+2
-3
nixos/modules/services/misc/geoipupdate.nix
······
······
+1
-1
nixos/modules/services/misc/klipper.nix
+1
-1
nixos/modules/services/misc/klipper.nix
+2
-4
nixos/modules/services/misc/nix-daemon.nix
+2
-4
nixos/modules/services/misc/nix-daemon.nix
···You can use <command>nix-instantiate --eval --strict '<nixpkgs/nixos>' -A config.nix.settings</command>option. In addition, configuration specified in <option>nix.extraOptions</option> which will be appended
···You can use <command>nix-instantiate --eval --strict '<nixpkgs/nixos>' -A config.nix.settings</command>option. In addition, configuration specified in <option>nix.extraOptions</option> which will be appended
+2
-2
nixos/modules/services/misc/persistent-evdev.nix
+2
-2
nixos/modules/services/misc/persistent-evdev.nix
···Physical devices should already exist in <filename class="devicefile">/dev/input/by-id/</filename>.-See the <link xlink:href="https://github.com/aiberia/persistent-evdev#example-usage-with-libvirt"><literal>cgroup_device_acl</literal> list (see <xref linkend="opt-virtualisation.libvirtd.qemu.verbatimConfig"/>).
···Physical devices should already exist in <filename class="devicefile">/dev/input/by-id/</filename>.+See the <link xlink:href="https://github.com/aiberia/persistent-evdev#example-usage-with-libvirt">project page</link><literal>cgroup_device_acl</literal> list (see <xref linkend="opt-virtualisation.libvirtd.qemu.verbatimConfig"/>).
+5
-5
nixos/modules/services/misc/sourcehut/default.nix
+5
-5
nixos/modules/services/misc/sourcehut/default.nix
············
···+to a secret key to encrypt internal messages with. Use <literal>srht-keygen network</literal> to·········
+1
-1
nixos/modules/services/misc/sssd.nix
+1
-1
nixos/modules/services/misc/sssd.nix
+1
-3
nixos/modules/services/misc/zoneminder.nix
+1
-3
nixos/modules/services/misc/zoneminder.nix
······
······
+7
-7
nixos/modules/services/monitoring/cadvisor.nix
+7
-7
nixos/modules/services/monitoring/cadvisor.nix
···-<option>storageDriverPasswordFile</option> takes precedence over <option>storageDriverPassword</option>-Warning: when <option>storageDriverPassword</option> is non-empty this defaults to a file in the-Tip: use <link xlink:href='https://nixos.org/nixops/manual/#idm140737318306400'>nixops key management</link>···-See <link xlink:href='https://github.com/google/cadvisor/blob/master/docs/runtime_options.md'/> for available options.
······+See <https://github.com/google/cadvisor/blob/master/docs/runtime_options.md> for available options.
+1
-1
nixos/modules/services/monitoring/grafana-image-renderer.nix
+1
-1
nixos/modules/services/monitoring/grafana-image-renderer.nix
+2
-2
nixos/modules/services/monitoring/graphite.nix
+2
-2
nixos/modules/services/monitoring/graphite.nix
+5
-5
nixos/modules/services/monitoring/metricbeat.nix
+5
-5
nixos/modules/services/monitoring/metricbeat.nix
···-for each, but setting <xref linkend="opt-services.metricbeat.modules._name_.module"/> to the same value.-See <link xlink:href="https://www.elastic.co/guide/en/beats/metricbeat/current/metricbeat-modules.html"/>.
···
+14
-14
nixos/modules/services/monitoring/munin.nix
+14
-14
nixos/modules/services/monitoring/munin.nix
···-See <link xlink:href='http://guide.munin-monitoring.org/en/latest/architecture/index.html' />.-<link xlink:href='http://guide.munin-monitoring.org/en/latest/reference/munin-node.conf.html' />···-See <link xlink:href='http://guide.munin-monitoring.org/en/latest/reference/munin.conf.html' />.···
·········
+1
-1
nixos/modules/services/monitoring/nagios.nix
+1
-1
nixos/modules/services/monitoring/nagios.nix
+4
-4
nixos/modules/services/monitoring/netdata.nix
+4
-4
nixos/modules/services/monitoring/netdata.nix
···
···
+17
-22
nixos/modules/services/monitoring/parsedmarc.nix
+17
-22
nixos/modules/services/monitoring/parsedmarc.nix
··················
······+To finish the setup, you need to manually set the [](#opt-services.geoipupdate.settings.AccountID) and············
+6
-9
nixos/modules/services/monitoring/prometheus/default.nix
+6
-9
nixos/modules/services/monitoring/prometheus/default.nix
···-xlink:href="https://prometheus.io/docs/prometheus/latest/configuration/configuration/#gce_sd_config">the·········-<link xlink:href="https://docs.mesosphere.com/1.11/security/ent/iam-api/#passing-an-authentication-token" />It is mutually exclusive with <literal>auth_token_file</literal> and other authentication mechanisms.-<link xlink:href="https://docs.mesosphere.com/1.11/security/ent/iam-api/#passing-an-authentication-token" />It is mutually exclusive with <literal>auth_token</literal> and other authentication mechanisms.
···+See <link xlink:href="https://prometheus.io/docs/prometheus/latest/configuration/configuration/#gce_sd_config">the relevant Prometheus configuration docs</link>···+query parameter section: <link xlink:href="https://cloud.google.com/compute/docs/reference/latest/instances/list"/>.······+<link xlink:href="https://docs.mesosphere.com/1.11/security/ent/iam-api/#passing-an-authentication-token"/>It is mutually exclusive with <literal>auth_token_file</literal> and other authentication mechanisms.+<link xlink:href="https://docs.mesosphere.com/1.11/security/ent/iam-api/#passing-an-authentication-token"/>It is mutually exclusive with <literal>auth_token</literal> and other authentication mechanisms.
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/dovecot.nix
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/dovecot.nix
···-<xref linkend="opt-services.prometheus.exporters.dovecot.socketPath" /> = "/var/run/dovecot2/old-stats";
···+<xref linkend="opt-services.prometheus.exporters.dovecot.socketPath"/> = "/var/run/dovecot2/old-stats";
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/process.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/process.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/script.nix
+1
-1
nixos/modules/services/monitoring/prometheus/exporters/script.nix
+5
-5
nixos/modules/services/networking/biboumi.nix
+5
-5
nixos/modules/services/networking/biboumi.nix
···-Set it to null and use <link linkend="opt-services.biboumi.credentialsFile">credentialsFile</link>···
······
+6
-6
nixos/modules/services/networking/bird-lg.nix
+6
-6
nixos/modules/services/networking/bird-lg.nix
···-Extra parameters documented <link xlink:href=\"https://github.com/xddxdd/bird-lg-go#frontend\">here</link>.···-Extra parameters documented <link xlink:href=\"https://github.com/xddxdd/bird-lg-go#proxy\">here</link>.
······
+6
-6
nixos/modules/services/networking/bird.nix
+6
-6
nixos/modules/services/networking/bird.nix
······
······
+4
-1
nixos/modules/services/networking/coredns.nix
+4
-1
nixos/modules/services/networking/coredns.nix
+9
-9
nixos/modules/services/networking/ghostunnel.nix
+9
-9
nixos/modules/services/networking/ghostunnel.nix
···-NB: storepass is not supported because it would expose credentials via <code>/proc/*/cmdline</code>.···
···+NB: storepass is not supported because it would expose credentials via <literal>/proc/*/cmdline</literal>.···
+3
-3
nixos/modules/services/networking/hans.nix
+3
-3
nixos/modules/services/networking/hans.nix
···
···
+3
-3
nixos/modules/services/networking/iodine.nix
+3
-3
nixos/modules/services/networking/iodine.nix
···
···
+16
-16
nixos/modules/services/networking/kea.nix
+16
-16
nixos/modules/services/networking/kea.nix
···-Kea Control Agent configuration as a path, see <link xlink:href="https://kea.readthedocs.io/en/kea-${package.version}/arm/agent.html"/>.-Most users should prefer using <link linkend="opt-services.kea.ctrl-agent.settings">settings</link> instead.···-Kea DHCP4 configuration as a path, see <link xlink:href="https://kea.readthedocs.io/en/kea-${package.version}/arm/dhcp4-srv.html"/>.-Most users should prefer using <link linkend="opt-services.kea.dhcp4.settings">settings</link> instead.···-Kea DHCP6 configuration as a path, see <link xlink:href="https://kea.readthedocs.io/en/kea-${package.version}/arm/dhcp6-srv.html"/>.-Most users should prefer using <link linkend="opt-services.kea.dhcp6.settings">settings</link> instead.···-Kea DHCP-DDNS configuration as a path, see <link xlink:href="https://kea.readthedocs.io/en/kea-${package.version}/arm/ddns.html"/>.-Most users should prefer using <link linkend="opt-services.kea.dhcp-ddns.settings">settings</link> instead.
···+Kea Control Agent configuration as a path, see <https://kea.readthedocs.io/en/kea-${package.version}/arm/agent.html>.···+Kea DHCP4 configuration as a path, see <https://kea.readthedocs.io/en/kea-${package.version}/arm/dhcp4-srv.html>.···+Kea DHCP6 configuration as a path, see <https://kea.readthedocs.io/en/kea-${package.version}/arm/dhcp6-srv.html>.···+Kea DHCP-DDNS configuration as a path, see <https://kea.readthedocs.io/en/kea-${package.version}/arm/ddns.html>.
+2
-2
nixos/modules/services/networking/ncdns.nix
+2
-2
nixos/modules/services/networking/ncdns.nix
···-See the example ncdns.conf file at <link xlink:href="https://github.com/namecoin/ncdns/blob/master/_doc/ncdns.conf.example"/>
···+See the example ncdns.conf file at <https://github.com/namecoin/ncdns/blob/master/_doc/ncdns.conf.example>
+5
-6
nixos/modules/services/networking/networkmanager.nix
+5
-6
nixos/modules/services/networking/networkmanager.nix
······
······
+2
-2
nixos/modules/services/networking/nntp-proxy.nix
+2
-2
nixos/modules/services/networking/nntp-proxy.nix
···example = "$6$GtzE7FrpE$wwuVgFYU.TZH4Rz.Snjxk9XGua89IeVwPQ/fEUD8eujr40q5Y021yhn0aNcsQ2Ifw.BLclyzvzgegopgKcneL0";
···example = "$6$GtzE7FrpE$wwuVgFYU.TZH4Rz.Snjxk9XGua89IeVwPQ/fEUD8eujr40q5Y021yhn0aNcsQ2Ifw.BLclyzvzgegopgKcneL0";
+2
-2
nixos/modules/services/networking/nsd.nix
+2
-2
nixos/modules/services/networking/nsd.nix
+7
-10
nixos/modules/services/networking/ntp/ntpd.nix
+7
-10
nixos/modules/services/networking/ntp/ntpd.nix
······
······
+7
-7
nixos/modules/services/networking/openconnect.nix
+7
-7
nixos/modules/services/networking/openconnect.nix
······
······
+3
-3
nixos/modules/services/networking/openvpn.nix
+3
-3
nixos/modules/services/networking/openvpn.nix
···
···
+4
-4
nixos/modules/services/networking/pleroma.nix
+4
-4
nixos/modules/services/networking/pleroma.nix
······
······
+1
-1
nixos/modules/services/networking/seafile.nix
+1
-1
nixos/modules/services/networking/seafile.nix
+15
-18
nixos/modules/services/networking/ssh/sshd.nix
+15
-18
nixos/modules/services/networking/ssh/sshd.nix
···-keys, you can generally use <xref linkend="opt-users.users._name_.openssh.authorizedKeys.keys"/>·········
············
+2
-1
nixos/modules/services/networking/strongswan-swanctl/param-constructors.nix
+2
-1
nixos/modules/services/networking/strongswan-swanctl/param-constructors.nix
+45
-45
nixos/modules/services/networking/strongswan-swanctl/swanctl-params.nix
+45
-45
nixos/modules/services/networking/strongswan-swanctl/swanctl-params.nix
·········································································································
·········································································································
+8
-10
nixos/modules/services/networking/wireguard.nix
+8
-10
nixos/modules/services/networking/wireguard.nix
······
······
+1
-1
nixos/modules/services/networking/wpa_supplicant.nix
+1
-1
nixos/modules/services/networking/wpa_supplicant.nix
···
···
+8
-8
nixos/modules/services/networking/yggdrasil.nix
+8
-8
nixos/modules/services/networking/yggdrasil.nix
······-description = "Group to grant access to the Yggdrasil control socket. If <code>null</code>, only root can access the socket.";
······+description = lib.mdDoc "Group to grant access to the Yggdrasil control socket. If `null`, only root can access the socket.";
+7
-14
nixos/modules/services/networking/znc/default.nix
+7
-14
nixos/modules/services/networking/znc/default.nix
···You can use <command>nix-instantiate --eval --strict '<nixpkgs/nixos>' -A config.services.znc.config</command>······
···You can use <command>nix-instantiate --eval --strict '<nixpkgs/nixos>' -A config.services.znc.config</command>······
+1
-2
nixos/modules/services/networking/znc/options.nix
+1
-2
nixos/modules/services/networking/znc/options.nix
···You can use <command>nix-instantiate --eval --strict '<nixpkgs/nixos>' -A config.services.znc.config</command>
···You can use <command>nix-instantiate --eval --strict '<nixpkgs/nixos>' -A config.services.znc.config</command>
+4
-4
nixos/modules/services/security/privacyidea.nix
+4
-4
nixos/modules/services/security/privacyidea.nix
·········
·········
+2
-2
nixos/modules/services/security/step-ca.nix
+2
-2
nixos/modules/services/security/step-ca.nix
···
···
+8
-8
nixos/modules/services/security/tor.nix
+8
-8
nixos/modules/services/security/tor.nix
··················-Generated authorization data can be found in <filename>${stateDir}/onion/$name/hostname</filename>.
··················
+2
-2
nixos/modules/services/security/vault.nix
+2
-2
nixos/modules/services/security/vault.nix
···
···
+1
-1
nixos/modules/services/security/vaultwarden/default.nix
+1
-1
nixos/modules/services/security/vaultwarden/default.nix
···<link xlink:href="https://github.com/dani-garcia/vaultwarden/blob/${vaultwarden.version}/.env.template">the environment template file</link>.
···<link xlink:href="https://github.com/dani-garcia/vaultwarden/blob/${vaultwarden.version}/.env.template">the environment template file</link>.
+7
-7
nixos/modules/services/system/dbus.nix
+7
-7
nixos/modules/services/system/dbus.nix
···
···
+8
-8
nixos/modules/services/system/earlyoom.nix
+8
-8
nixos/modules/services/system/earlyoom.nix
···
···
+29
-29
nixos/modules/services/torrent/transmission.nix
+29
-29
nixos/modules/services/torrent/transmission.nix
······-when <xref linkend="opt-services.transmission.settings.peer-port-random-on-start"/> is enabled.-when <xref linkend="opt-services.transmission.settings.peer-port-random-on-start"/> is enabled.···············
·····················
+2
-2
nixos/modules/services/web-apps/bookstack.nix
+2
-2
nixos/modules/services/web-apps/bookstack.nix
······The root URL that you want to host BookStack on. All URLs in BookStack will be generated using this value.-If you change this in the future you may need to run a command to update stored URLs in the database. Command example: <code>php artisan bookstack:update-url https://old.example.com https://new.example.com</code>
······The root URL that you want to host BookStack on. All URLs in BookStack will be generated using this value.+If you change this in the future you may need to run a command to update stored URLs in the database. Command example: <literal>php artisan bookstack:update-url https://old.example.com https://new.example.com</literal>
+5
-5
nixos/modules/services/web-apps/dokuwiki.nix
+5
-5
nixos/modules/services/web-apps/dokuwiki.nix
···-Further nginx configuration can be done by adapting <literal>services.nginx.virtualHosts.<name></literal>.-Further apache2 configuration can be done by adapting <literal>services.httpd.virtualHosts.<name></literal>.
···
+2
-3
nixos/modules/services/web-apps/hedgedoc.nix
+2
-3
nixos/modules/services/web-apps/hedgedoc.nix
···
+16
-23
nixos/modules/services/web-apps/keycloak.nix
+16
-23
nixos/modules/services/web-apps/keycloak.nix
···············
···············
+18
-18
nixos/modules/services/web-apps/mastodon.nix
+18
-18
nixos/modules/services/web-apps/mastodon.nix
·········-<code>nix build -f '<nixpkgs>' mastodon; cd result; bin/rake webpush:generate_keys</code>·········-<code>nix build -f '<nixpkgs>' mastodon; cd result; bin/rake webpush:generate_keys</code>
···+<literal>/ -> $(nix-instantiate --eval '<nixpkgs>' -A mastodon.outPath)/public</literal>+<literal>/ -> 127.0.0.1:{{ webPort }} </literal>(If there was no file in the directory above.)···············
+1
-1
nixos/modules/services/web-apps/mediawiki.nix
+1
-1
nixos/modules/services/web-apps/mediawiki.nix
+13
-13
nixos/modules/services/web-apps/nextcloud.nix
+13
-13
nixos/modules/services/web-apps/nextcloud.nix
···-Data storage path of nextcloud. Will be <xref linkend="opt-services.nextcloud.home" /> by default.This folder will be populated with a config.php and data folder which contains the state of the instance (excl the database).";···Extra apps to install. Should be an attrSet of appid to packages generated by fetchNextcloudApp.-Using this will disable the appstore to prevent Nextcloud from updating these apps (see <xref linkend="opt-services.nextcloud.appstoreEnable" />).···-Automatically enable the apps in <xref linkend="opt-services.nextcloud.extraApps" /> every time nextcloud starts.If set to false, apps need to be enabled in the Nextcloud user interface or with nextcloud-occ app:enable.···-Enabled by default unless there are packages in <xref linkend="opt-services.nextcloud.extraApps" />.-Set to true to force enable the store even if <xref linkend="opt-services.nextcloud.extraApps" /> is used.Set to false to disable the installation of apps from the global appstore. App management is always enabled regardless of this setting.···This is used by the theming app and for generating previews of certain images (e.g. SVG and HEIF).You may want to disable it for increased security. In that case, previews will still be available···
···This folder will be populated with a config.php and data folder which contains the state of the instance (excl the database).";···Extra apps to install. Should be an attrSet of appid to packages generated by fetchNextcloudApp.+Using this will disable the appstore to prevent Nextcloud from updating these apps (see [](#opt-services.nextcloud.appstoreEnable)).···+Automatically enable the apps in [](#opt-services.nextcloud.extraApps) every time nextcloud starts.If set to false, apps need to be enabled in the Nextcloud user interface or with nextcloud-occ app:enable.···Set to false to disable the installation of apps from the global appstore. App management is always enabled regardless of this setting.···This is used by the theming app and for generating previews of certain images (e.g. SVG and HEIF).You may want to disable it for increased security. In that case, previews will still be available···
+2
-3
nixos/modules/services/web-apps/node-red.nix
+2
-3
nixos/modules/services/web-apps/node-red.nix
···-xlink:href="https://github.com/node-red/node-red/blob/master/packages/node_modules/node-red/settings.js"/>
···+See <https://github.com/node-red/node-red/blob/master/packages/node_modules/node-red/settings.js>
+2
-2
nixos/modules/services/web-apps/snipe-it.nix
+2
-2
nixos/modules/services/web-apps/snipe-it.nix
······The root URL that you want to host Snipe-IT on. All URLs in Snipe-IT will be generated using this value.If you change this in the future you may need to run a command to update stored URLs in the database.-Command example: <code>snipe-it snipe-it:update-url https://old.example.com https://new.example.com</code>
······The root URL that you want to host Snipe-IT on. All URLs in Snipe-IT will be generated using this value.If you change this in the future you may need to run a command to update stored URLs in the database.+Command example: <literal>snipe-it snipe-it:update-url https://old.example.com https://new.example.com</literal>
+1
-1
nixos/modules/services/web-apps/trilium.nix
+1
-1
nixos/modules/services/web-apps/trilium.nix
+2
-3
nixos/modules/services/web-apps/wiki-js.nix
+2
-3
nixos/modules/services/web-apps/wiki-js.nix
···
···+corresponds to <link xlink:href="https://docs.requarks.io/install/config">the upstream configuration options</link>.
+2
-2
nixos/modules/services/web-apps/wordpress.nix
+2
-2
nixos/modules/services/web-apps/wordpress.nix
······
······
+3
-5
nixos/modules/services/web-servers/apache-httpd/vhost-options.nix
+3
-5
nixos/modules/services/web-servers/apache-httpd/vhost-options.nix
·········
······+Specification of pages to be ignored by web crawlers. See <link xlink:href="http://www.robotstxt.org/"/> for details.···+Declarative location config. See <link xlink:href="https://httpd.apache.org/docs/2.4/mod/core.html#location"/> for details.
+4
-4
nixos/modules/services/web-servers/nginx/default.nix
+4
-4
nixos/modules/services/web-servers/nginx/default.nix
···
···
+1
-2
nixos/modules/services/web-servers/uwsgi.nix
+1
-2
nixos/modules/services/web-servers/uwsgi.nix
···
···+See the uWSGI <link xlink:href="https://uwsgi-docs.readthedocs.io/en/latest/Capabilities.html">docs</link>
+2
-3
nixos/modules/services/x11/desktop-managers/plasma5.nix
+2
-3
nixos/modules/services/x11/desktop-managers/plasma5.nix
···
···
+2
-2
nixos/modules/services/x11/display-managers/lightdm-greeters/mini.nix
+2
-2
nixos/modules/services/x11/display-managers/lightdm-greeters/mini.nix
···
···
+2
-2
nixos/modules/services/x11/display-managers/lightdm-greeters/tiny.nix
+2
-2
nixos/modules/services/x11/display-managers/lightdm-greeters/tiny.nix
···
···
+1
-1
nixos/modules/services/x11/window-managers/fvwm2.nix
+1
-1
nixos/modules/services/x11/window-managers/fvwm2.nix
+1
-1
nixos/modules/system/activation/top-level.nix
+1
-1
nixos/modules/system/activation/top-level.nix
+6
-7
nixos/modules/system/boot/initrd-network.nix
+6
-7
nixos/modules/system/boot/initrd-network.nix
···
···+as described in [the kernel documentation](https://www.kernel.org/doc/Documentation/filesystems/nfs/nfsroot.txt).
+6
-6
nixos/modules/system/boot/loader/grub/grub.nix
+6
-6
nixos/modules/system/boot/loader/grub/grub.nix
······
······
+2
-2
nixos/modules/system/boot/luksroot.nix
+2
-2
nixos/modules/system/boot/luksroot.nix
···
···
+4
-7
nixos/modules/system/boot/networkd.nix
+4
-7
nixos/modules/system/boot/networkd.nix
······-See <link xlink:href="https://www.freedesktop.org/software/systemd/man/systemd-networkd-wait-online.service.html">-<citerefentry><refentrytitle>systemd-networkd-wait-online.service</refentrytitle><manvolnum>8</manvolnum>
···+<link xlink:href="https://www.kernel.org/doc/Documentation/networking/vrf.txt">kernel docs</link>.···+See [{manpage}`systemd-networkd-wait-online.service(8)`](https://www.freedesktop.org/software/systemd/man/systemd-networkd-wait-online.service.html) for all available options.
+1
-1
nixos/modules/system/boot/stage-1.nix
+1
-1
nixos/modules/system/boot/stage-1.nix
+3
-6
nixos/modules/system/boot/systemd/logind.nix
+3
-6
nixos/modules/system/boot/systemd/logind.nix
···-See <link xlink:href="https://www.freedesktop.org/software/systemd/man/logind.conf.html#KillUserProcesses=">logind.conf(5)</link>
···+[systemd.scope(5)](https://www.freedesktop.org/software/systemd/man/systemd.scope.html#)), and processes are not killed.+See [logind.conf(5)](https://www.freedesktop.org/software/systemd/man/logind.conf.html#KillUserProcesses=)
+5
-5
nixos/modules/system/boot/systemd/tmpfiles.nix
+5
-5
nixos/modules/system/boot/systemd/tmpfiles.nix
···
···
+3
-3
nixos/modules/tasks/auto-upgrade.nix
+3
-3
nixos/modules/tasks/auto-upgrade.nix
+1
-1
nixos/modules/tasks/network-interfaces.nix
+1
-1
nixos/modules/tasks/network-interfaces.nix
+2
-2
nixos/modules/tasks/scsi-link-power-management.nix
+2
-2
nixos/modules/tasks/scsi-link-power-management.nix
···
···
+6
-6
nixos/modules/virtualisation/nixos-containers.nix
+6
-6
nixos/modules/virtualisation/nixos-containers.nix
······
······
+1
-1
nixos/modules/virtualisation/podman/default.nix
+1
-1
nixos/modules/virtualisation/podman/default.nix
+1
-1
nixos/modules/virtualisation/podman/network-socket.nix
+1
-1
nixos/modules/virtualisation/podman/network-socket.nix
···
+3
-3
nixos/modules/virtualisation/qemu-vm.nix
+3
-3
nixos/modules/virtualisation/qemu-vm.nix
···
···