+2
-2
.editorconfig
+2
-2
.editorconfig
···
+2
-2
nixos/doc/manual/administration/cleaning-store.xml
+2
-2
nixos/doc/manual/administration/cleaning-store.xml
+3
-3
nixos/doc/manual/administration/container-networking.xml
+3
-3
nixos/doc/manual/administration/container-networking.xml
···
+2
-2
nixos/doc/manual/administration/control-groups.xml
+2
-2
nixos/doc/manual/administration/control-groups.xml
···+<link linkend="opt-systemd.services._name_.serviceConfig">systemd.services.httpd.serviceConfig</link>.CPUShares = 512;···+<link linkend="opt-systemd.services._name_.serviceConfig">systemd.services.httpd.serviceConfig</link>.MemoryLimit = "512M";
+7
-7
nixos/doc/manual/administration/declarative-containers.xml
+7
-7
nixos/doc/manual/administration/declarative-containers.xml
······
+5
-5
nixos/doc/manual/administration/imperative-containers.xml
+5
-5
nixos/doc/manual/administration/imperative-containers.xml
···+<link linkend="opt-users.users._name__.openssh.authorizedKeys.keys">users.extraUsers.root.openssh.authorizedKeys.keys</link> = ["ssh-dss AAAAB3N…"];···
+6
-6
nixos/doc/manual/configuration/abstractions.xml
+6
-6
nixos/doc/manual/configuration/abstractions.xml
··················
+2
-2
nixos/doc/manual/configuration/ad-hoc-network-config.xml
+2
-2
nixos/doc/manual/configuration/ad-hoc-network-config.xml
···
+3
-3
nixos/doc/manual/configuration/adding-custom-packages.xml
+3
-3
nixos/doc/manual/configuration/adding-custom-packages.xml
·········
+13
-13
nixos/doc/manual/configuration/config-file.xml
+13
-13
nixos/doc/manual/configuration/config-file.xml
···························
+3
-3
nixos/doc/manual/configuration/customizing-packages.xml
+3
-3
nixos/doc/manual/configuration/customizing-packages.xml
···+<xref linkend="opt-environment.systemPackages"/> = [ (pkgs.emacs.override { gtk = pkgs.gtk3; }) ];······
+3
-3
nixos/doc/manual/configuration/declarative-packages.xml
+3
-3
nixos/doc/manual/configuration/declarative-packages.xml
······
+4
-4
nixos/doc/manual/configuration/file-systems.xml
+4
-4
nixos/doc/manual/configuration/file-systems.xml
···+For <option><link linkend="opt-fileSystems._name__.device">device</link></option>, it’s best to use the topology-independent+(<option><link linkend="opt-fileSystems._name__.fsType">fsType</link></option>), since <command>mount</command> can usually···+<literal><link linkend="opt-fileSystems._name__.options">options</link> = [ "nofail" ];</literal>.
+7
-7
nixos/doc/manual/configuration/firewall.xml
+7
-7
nixos/doc/manual/configuration/firewall.xml
···
+8
-5
nixos/doc/manual/configuration/ipv4-config.xml
+8
-5
nixos/doc/manual/configuration/ipv4-config.xml
···-networking.interfaces.eth0.ipv4.addresses = [ { address = "192.168.1.2"; prefixLength = 24; } ];+<link linkend="opt-networking.interfaces._name__.ipv4.addresses">networking.interfaces.eth0.ipv4.addresses</link> = [ {···
+7
-4
nixos/doc/manual/configuration/ipv6-config.xml
+7
-4
nixos/doc/manual/configuration/ipv6-config.xml
······-networking.interfaces.eth0.ipv6.addresses = [ { address = "fe00:aa:bb:cc::2"; prefixLength = 64; } ];+<link linkend="opt-networking.interfaces._name__.ipv6.addresses">networking.interfaces.eth0.ipv6.addresses</link> = [ {
+7
-7
nixos/doc/manual/configuration/linux-kernel.xml
+7
-7
nixos/doc/manual/configuration/linux-kernel.xml
······
+3
-3
nixos/doc/manual/configuration/luks-file-systems.xml
+3
-3
nixos/doc/manual/configuration/luks-file-systems.xml
···-boot.initrd.luks.devices.crypted.device = "/dev/disk/by-uuid/3f6b0024-3a44-4fde-a43a-767b872abe5d";+<link linkend="opt-boot.initrd.luks.devices._name__.device">boot.initrd.luks.devices.crypted.device</link> = "/dev/disk/by-uuid/3f6b0024-3a44-4fde-a43a-767b872abe5d";+<programlisting><xref linkend="opt-boot.loader.grub.enableCryptodisk"/> = true;</programlisting>
+18
-18
nixos/doc/manual/configuration/modularity.xml
+18
-18
nixos/doc/manual/configuration/modularity.xml
·····················
+2
-2
nixos/doc/manual/configuration/network-manager.xml
+2
-2
nixos/doc/manual/configuration/network-manager.xml
······+<link linkend="opt-users.users._name__.extraGroups">users.extraUsers.youruser.extraGroups</link> = [ "networkmanager" ];
+3
-3
nixos/doc/manual/configuration/ssh.xml
+3
-3
nixos/doc/manual/configuration/ssh.xml
······+<link linkend="opt-users.users._name__.openssh.authorizedKeys.keys">users.extraUsers.alice.openssh.authorizedKeys.keys</link> =
+14
-14
nixos/doc/manual/configuration/user-mgmt.xml
+14
-14
nixos/doc/manual/configuration/user-mgmt.xml
···+<link linkend="opt-users.users._name__.extraGroups">extraGroups</link> = [ "wheel" "networkmanager" ];+<link linkend="opt-users.users._name__.openssh.authorizedKeys.keys">openssh.authorizedKeys.keys</link> = [ "ssh-dss AAAAB3Nza... alice@foobar" ];···+your NixOS configuration. For instance, if you remove a user from <xref linkend="opt-users.users"/>+and run nixos-rebuild, the user account will cease to exist. Also, imperative commands for managing users+assigned by setting the user's <link linkend="opt-users.users._name__.hashedPassword">hashedPassword</link>···
+2
-2
nixos/doc/manual/configuration/wireless.xml
+2
-2
nixos/doc/manual/configuration/wireless.xml
···
+23
-23
nixos/doc/manual/configuration/x-windows.xml
+23
-23
nixos/doc/manual/configuration/x-windows.xml
························Note: the use of <literal>services.xserver.synaptics</literal> is deprecated since NixOS 17.09.
+12
-12
nixos/doc/manual/configuration/xfce.xml
+12
-12
nixos/doc/manual/configuration/xfce.xml
···+<link linkend="opt-services.xserver.desktopManager.default">services.xserver.desktopManager</link> = {·········
+1
-1
nixos/doc/manual/installation/changing-config.xml
+1
-1
nixos/doc/manual/installation/changing-config.xml
···+<link linkend="opt-users.users._name__.initialHashedPassword">users.extraUsers.your-user.initialHashedPassword</link> = "test";
+8
-4
nixos/doc/manual/installation/installing-from-other-distro.xml
+8
-4
nixos/doc/manual/installation/installing-from-other-distro.xml
······+<link linkend="opt-users.users._name__.initialHashedPassword">users.extraUsers.root.initialHashedPassword</link> = "";···
+2
-2
nixos/doc/manual/installation/installing-virtualbox-guest.xml
+2
-2
nixos/doc/manual/installation/installing-virtualbox-guest.xml
······
+38
-36
nixos/doc/manual/installation/installing.xml
+38
-36
nixos/doc/manual/installation/installing.xml
···+<option><link linkend="opt-boot.loader.efi.canTouchEfiVariables">boot.loader.efi</link></option> and+<option><link linkend="opt-boot.loader.systemd-boot.enable">boot.loader.systemd</link></option> as well.···+To prevent the password prompt, set <code><xref linkend="opt-users.mutableUsers"/> = false;</code> in······-boot.loader.grub.device = "/dev/sda"; # <lineannotation>(for BIOS systems only)</lineannotation>-boot.loader.systemd-boot.enable = true; # <lineannotation>(for UEFI systems only)</lineannotation>+<xref linkend="opt-boot.loader.grub.device"/> = "/dev/sda"; # <lineannotation>(for BIOS systems only)</lineannotation>+<xref linkend="opt-boot.loader.systemd-boot.enable"/> = true; # <lineannotation>(for UEFI systems only)</lineannotation>+#<link linkend="opt-fileSystems._name__.device">fileSystems."/".device</link> = "/dev/disk/by-label/nixos";
+2
-2
nixos/doc/manual/installation/upgrading.xml
+2
-2
nixos/doc/manual/installation/upgrading.xml
······
+39
-39
nixos/modules/i18n/input-method/default.xml
+39
-39
nixos/modules/i18n/input-method/default.xml
···+<link linkend="opt-i18n.inputMethod.ibus.engines">ibus.engines</link> = with pkgs.ibus-engines; [ anthy hangul mozc ];···+<link linkend="opt-i18n.inputMethod.fcitx.engines">fcitx.engines</link> = with pkgs.fcitx-engines; [ mozc hangul m17n ];
+19
-19
nixos/modules/programs/digitalbitbox/doc.xml
+19
-19
nixos/modules/programs/digitalbitbox/doc.xml
············+<link linkend="opt-programs.digitalbitbox.package">package</link> = pkgs.digitalbitbox.override {
+1
-1
nixos/modules/programs/plotinus.xml
+1
-1
nixos/modules/programs/plotinus.xml
+11
-11
nixos/modules/security/acme.xml
+11
-11
nixos/modules/security/acme.xml
······+<literal><link linkend="opt-services.nginx.virtualHosts._name_.enableACME">enableACME</link> = true;</literal> in a virtualHost config. We···+<link linkend="opt-services.nginx.virtualHosts._name_.locations._name_.root">root</link> = "/var/www";
+6
-6
nixos/modules/security/hidepid.xml
+6
-6
nixos/modules/security/hidepid.xml
······To allow a service <replaceable>foo</replaceable> to run without process information hiding, set-systemd.services.<replaceable>foo</replaceable>.serviceConfig.SupplementaryGroups = [ "proc" ];+<link linkend="opt-systemd.services._name_.serviceConfig">systemd.services.<replaceable>foo</replaceable>.serviceConfig</link>.SupplementaryGroups = [ "proc" ];
+6
-6
nixos/modules/services/databases/postgresql.xml
+6
-6
nixos/modules/services/databases/postgresql.xml
·········+<para>A complete list of options for the PostgreSQL module may be found <link linkend="opt-services.postgresql.enable">here</link>.</para>
+10
-10
nixos/modules/services/editors/emacs.xml
+10
-10
nixos/modules/services/editors/emacs.xml
············
+29
-30
nixos/modules/services/misc/gitlab.xml
+29
-30
nixos/modules/services/misc/gitlab.xml
···+<link linkend="opt-services.nginx.recommendedGzipSettings">recommendedGzipSettings</link> = true;+<link linkend="opt-services.nginx.recommendedOptimisation">recommendedOptimisation</link> = true;+<link linkend="opt-services.nginx.recommendedProxySettings">recommendedProxySettings</link> = true;+<link linkend="opt-services.nginx.recommendedTlsSettings">recommendedTlsSettings</link> = true;+<link linkend="opt-services.nginx.virtualHosts._name_.locations._name_.proxyPass">locations."/".proxyPass</link> = "http://unix:/run/gitlab/gitlab-workhorse.socket";···+<link linkend="opt-services.gitlab.initialRootPassword">initialRootPassword</link> = "UseNixOS!";-db = "uPgq1gtwwHiatiuE0YHqbGa5lEIXH7fMsvuTNgdzJi8P0Dg12gibTzBQbq5LT7PNzcc3BP9P1snHVnduqtGF43PgrQtU7XL93ts6gqe9CBNhjtaqUwutQUDkygP5NrV6";-secret = "devzJ0Tz0POiDBlrpWmcsjjrLaltyiAdS8TtgT9YNBOoUcDsfppiY3IXZjMVtKgXrFImIennFGOpPN8IkP8ATXpRgDD5rxVnKuTTwYQaci2NtaV1XxOQGjdIE50VGsR3";-otp = "e1GATJVuS2sUh7jxiPzZPre4qtzGGaS22FR50Xs1TerRVdgI3CBVUi5XYtQ38W4xFeS4mDqi5cQjExE838iViSzCdcG19XSL6qNsfokQP9JugwiftmhmCadtsnHErBMI";+<link linkend="opt-services.gitlab.secrets.db">db</link> = "uPgq1gtwwHiatiuE0YHqbGa5lEIXH7fMsvuTNgdzJi8P0Dg12gibTzBQbq5LT7PNzcc3BP9P1snHVnduqtGF43PgrQtU7XL93ts6gqe9CBNhjtaqUwutQUDkygP5NrV6";+<link linkend="opt-services.gitlab.secrets.secret">secret</link> = "devzJ0Tz0POiDBlrpWmcsjjrLaltyiAdS8TtgT9YNBOoUcDsfppiY3IXZjMVtKgXrFImIennFGOpPN8IkP8ATXpRgDD5rxVnKuTTwYQaci2NtaV1XxOQGjdIE50VGsR3";+<link linkend="opt-services.gitlab.secrets.otp">otp</link> = "e1GATJVuS2sUh7jxiPzZPre4qtzGGaS22FR50Xs1TerRVdgI3CBVUi5XYtQ38W4xFeS4mDqi5cQjExE838iViSzCdcG19XSL6qNsfokQP9JugwiftmhmCadtsnHErBMI";······+options for the <link linkend="opt-services.gitlab.enable">services.gitlab</link> module.</para>
+6
-6
nixos/modules/services/misc/taskserver/doc.xml
+6
-6
nixos/modules/services/misc/taskserver/doc.xml
······+<link linkend="opt-services.taskserver.organisations._name_.users">services.taskserver.organisations.my-company.users</link> = [ "alice" ];···+<link linkend="opt-services.taskserver.pki.manual.ca.cert">service.taskserver.pki.manual</link>.*,
+10
-10
nixos/modules/services/networking/dnscrypt-proxy.xml
+10
-10
nixos/modules/services/networking/dnscrypt-proxy.xml
·········