+7
-7
nixos/modules/hardware/tuxedo-keyboard.nix
+7
-7
nixos/modules/hardware/tuxedo-keyboard.nix
···-To configure the driver, pass the options to the <option>boot.kernelParams</option> configuration.There are several parameters you can change. It's best to check at the source code description which options are supported.-You can find all the supported parameters at: <link xlink:href="https://github.com/tuxedocomputers/tuxedo-keyboard#kernelparam"/>+You can find all the supported parameters at: <https://github.com/tuxedocomputers/tuxedo-keyboard#kernelparam>-In order to use the <literal>custom</literal> lighting with the maximumg brightness and a color of <literal>0xff0a0a</literal> one would put pass <option>boot.kernelParams</option> like this:+In order to use the `custom` lighting with the maximumg brightness and a color of `0xff0a0a` one would put pass {option}`boot.kernelParams` like this:
+12
-12
nixos/modules/misc/label.nix
+12
-12
nixos/modules/misc/label.nix
·········
+9
-9
nixos/modules/misc/nixpkgs.nix
+9
-9
nixos/modules/misc/nixpkgs.nix
···Traditionally `builtins.currentSystem`, but unset when invoking NixOS through `lib.nixosSystem`.-Ignored when <literal>nixpkgs.pkgs</literal>, <literal>nixpkgs.localSystem</literal> or <literal>nixpkgs.hostPlatform</literal> is set.
+4
-4
nixos/modules/services/backup/duplicity.nix
+4
-4
nixos/modules/services/backup/duplicity.nix
···-<citerefentry><refentrytitle>systemd.exec</refentrytitle><manvolnum>5</manvolnum></citerefentry>. For example:
+3
-3
nixos/modules/services/databases/cockroachdb.nix
+3
-3
nixos/modules/services/databases/cockroachdb.nix
······
+5
-5
nixos/modules/services/development/zammad.nix
+5
-5
nixos/modules/services/development/zammad.nix
···
+6
-6
nixos/modules/services/hardware/lcd.nix
+6
-6
nixos/modules/services/hardware/lcd.nix
···Bus 005 Device 002: ID 0403:c630 Future Technology Devices International, Ltd lcd2usb interface
+6
-6
nixos/modules/services/logging/awstats.nix
+6
-6
nixos/modules/services/logging/awstats.nix
···journalctl $OLD_CURSOR -u postfix.service | ''${pkgs.perl}/bin/perl ''${pkgs.awstats.out}/share/awstats/tools/maillogconvert.pl standard |
+7
-7
nixos/modules/services/matrix/dendrite.nix
+7
-7
nixos/modules/services/matrix/dendrite.nix
···-Environment file as defined in <citerefentry><refentrytitle>systemd.exec</refentrytitle><manvolnum>5</manvolnum></citerefentry>.services.dendrite.settings.client_api.registration_shared_secret = "$REGISTRATION_SHARED_SECRET";
+4
-4
nixos/modules/services/misc/gitit.nix
+4
-4
nixos/modules/services/misc/gitit.nix
···
+6
-8
nixos/modules/services/misc/sssd.nix
+6
-8
nixos/modules/services/misc/sssd.nix
···
+5
-5
nixos/modules/services/monitoring/prometheus/exporters/dovecot.nix
+5
-5
nixos/modules/services/monitoring/prometheus/exporters/dovecot.nix
···-is not <link xlink:href="https://github.com/kumina/dovecot_exporter/issues/8">compatible with this exporter</link>.···
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/mail.nix
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/mail.nix
···-<emphasis>Note:</emphasis> if your mailserver has <citerefentry><refentrytitle>rspamd</refentrytitle><manvolnum>8</manvolnum></citerefentry> configured,···
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/openldap.nix
+4
-4
nixos/modules/services/monitoring/prometheus/exporters/openldap.nix
···
+5
-5
nixos/modules/services/monitoring/prometheus/exporters/postgres.nix
+5
-5
nixos/modules/services/monitoring/prometheus/exporters/postgres.nix
···-Environment file as defined in <citerefentry><refentrytitle>systemd.exec</refentrytitle><manvolnum>5</manvolnum></citerefentry>.······
+4
-4
nixos/modules/services/network-filesystems/litestream/default.nix
+4
-4
nixos/modules/services/network-filesystems/litestream/default.nix
···-Environment file as defined in <citerefentry><refentrytitle>systemd.exec</refentrytitle><manvolnum>5</manvolnum></citerefentry>.···
+6
-6
nixos/modules/services/networking/3proxy.nix
+6
-6
nixos/modules/services/networking/3proxy.nix
···-Consult <link xlink:href="https://github.com/z3APA3A/3proxy/wiki/How-To-(incomplete)#USERS">documentation</link> for more information.+Consult [documentation](https://github.com/z3APA3A/3proxy/wiki/How-To-%28incomplete%29#USERS) for more information.
+5
-5
nixos/modules/services/networking/firefox-syncserver.nix
+5
-5
nixos/modules/services/networking/firefox-syncserver.nix
···INSERT INTO `services` (`id`, `service`, `pattern`) VALUES ('1', 'sync-1.5', '{node}/1.5/{uid}');
+6
-6
nixos/modules/services/networking/hylafax/options.nix
+6
-6
nixos/modules/services/networking/hylafax/options.nix
···
+7
-7
nixos/modules/services/networking/murmur.nix
+7
-7
nixos/modules/services/networking/murmur.nix
···-Environment file as defined in <citerefentry><refentrytitle>systemd.exec</refentrytitle><manvolnum>5</manvolnum></citerefentry>.
+14
-14
nixos/modules/services/networking/ncdns.nix
+14
-14
nixos/modules/services/networking/ncdns.nix
·········
+4
-4
nixos/modules/services/networking/nix-serve.nix
+4
-4
nixos/modules/services/networking/nix-serve.nix
···-For more details see <citerefentry><refentrytitle>nix-store</refentrytitle><manvolnum>1</manvolnum></citerefentry>.
+5
-5
nixos/modules/services/security/hockeypuck.nix
+5
-5
nixos/modules/services/security/hockeypuck.nix
·········
+7
-7
nixos/modules/services/security/privacyidea.nix
+7
-7
nixos/modules/services/security/privacyidea.nix
···
+5
-5
nixos/modules/services/security/vault.nix
+5
-5
nixos/modules/services/security/vault.nix
···This can be used to avoid putting credentials in the Nix store, which can be read by any user.···
+15
-15
nixos/modules/services/security/vaultwarden/default.nix
+15
-15
nixos/modules/services/security/vaultwarden/default.nix
···-Additional environment file as defined in <citerefentry><refentrytitle>systemd.exec</refentrytitle><manvolnum>5</manvolnum></citerefentry>.-<link xlink:href="https://github.com/dani-garcia/vaultwarden/wiki/Enabling-admin-page">here</link>.
+5
-5
nixos/modules/services/web-apps/discourse.nix
+5
-5
nixos/modules/services/web-apps/discourse.nix
···
+7
-7
nixos/modules/services/web-apps/hedgedoc.nix
+7
-7
nixos/modules/services/web-apps/hedgedoc.nix
···-Environment file as defined in <citerefentry><refentrytitle>systemd.exec</refentrytitle><manvolnum>5</manvolnum></citerefentry>.services.hedgedoc.configuration.dbURL = "postgres://hedgedoc:\''${DB_PASSWORD}@db-host:5432/hedgedocdb";
+3
-3
nixos/modules/services/web-servers/molly-brown.nix
+3
-3
nixos/modules/services/web-servers/molly-brown.nix
···
+5
-5
nixos/modules/system/activation/top-level.nix
+5
-5
nixos/modules/system/activation/top-level.nix
···example = lib.literalExpression "{ fewJobsManyCores.configuration = { nix.settings = { core = 0; max-jobs = 1; }; }; }";
+3
-3
nixos/modules/virtualisation/lxcfs.nix
+3
-3
nixos/modules/virtualisation/lxcfs.nix
···virtualisation.lxc.defaultConfig = "lxc.include = ''${pkgs.lxcfs}/share/lxc/config/common.conf.d/00-lxcfs.conf";
+4
-4
nixos/modules/virtualisation/lxd.nix
+4
-4
nixos/modules/virtualisation/lxd.nix
···