lol

nixos/*: normalize link format

make (almost) all links appear on only a single line, with no
unnecessary whitespace, using double quotes for attributes. this lets us
automatically convert them to markdown easily.

the few remaining links are extremely long link in a gnome module, we'll
come back to those at a later date.

pennae 3aebb4a2 9c8531c8

+140 -189
+1 -2
nixos/modules/config/i18n.nix
··· 75 75 List of locales that the system should support. The value 76 76 <literal>"all"</literal> means that all locales supported by 77 77 Glibc will be installed. A full list of supported locales 78 - can be found at <link 79 - xlink:href="https://sourceware.org/git/?p=glibc.git;a=blob;f=localedata/SUPPORTED"/>. 78 + can be found at <link xlink:href="https://sourceware.org/git/?p=glibc.git;a=blob;f=localedata/SUPPORTED"/>. 80 79 ''; 81 80 }; 82 81
+1 -2
nixos/modules/config/users-groups.nix
··· 156 156 <filename>pam_mount.conf.xml</filename>. 157 157 Useful attributes might include <literal>path</literal>, 158 158 <literal>options</literal>, <literal>fstype</literal>, and <literal>server</literal>. 159 - See <link 160 - xlink:href="http://pam-mount.sourceforge.net/pam_mount.conf.5.html" /> 159 + See <link xlink:href="http://pam-mount.sourceforge.net/pam_mount.conf.5.html"/> 161 160 for more information. 162 161 ''; 163 162 };
+1 -1
nixos/modules/config/xdg/portal.nix
··· 33 33 34 34 options.xdg.portal = { 35 35 enable = 36 - mkEnableOption "<link xlink:href='https://github.com/flatpak/xdg-desktop-portal'>xdg desktop integration</link>" // { 36 + mkEnableOption ''<link xlink:href="https://github.com/flatpak/xdg-desktop-portal">xdg desktop integration</link>'' // { 37 37 default = false; 38 38 }; 39 39
+1 -1
nixos/modules/hardware/tuxedo-keyboard.nix
··· 13 13 14 14 To configure the driver, pass the options to the <option>boot.kernelParams</option> configuration. 15 15 There are several parameters you can change. It's best to check at the source code description which options are supported. 16 - You can find all the supported parameters at: <link xlink:href="https://github.com/tuxedocomputers/tuxedo-keyboard#kernelparam" /> 16 + You can find all the supported parameters at: <link xlink:href="https://github.com/tuxedocomputers/tuxedo-keyboard#kernelparam"/> 17 17 18 18 In order to use the <literal>custom</literal> lighting with the maximumg brightness and a color of <literal>0xff0a0a</literal> one would put pass <option>boot.kernelParams</option> like this: 19 19
+1 -1
nixos/modules/programs/sway.nix
··· 39 39 Sway, the i3-compatible tiling Wayland compositor. You can manually launch 40 40 Sway by executing "exec sway" on a TTY. Copy /etc/sway/config to 41 41 ~/.config/sway/config to modify the default configuration. See 42 - <link xlink:href="https://github.com/swaywm/sway/wiki" /> and 42 + <link xlink:href="https://github.com/swaywm/sway/wiki"/> and 43 43 "man 5 sway" for more information''; 44 44 45 45 wrapperFeatures = mkOption {
+2 -2
nixos/modules/security/acme/default.nix
··· 581 581 Turns on the OCSP Must-Staple TLS extension. 582 582 Make sure you know what you're doing! See: 583 583 <itemizedlist> 584 - <listitem><para><link xlink:href="https://blog.apnic.net/2019/01/15/is-the-web-ready-for-ocsp-must-staple/" /></para></listitem> 585 - <listitem><para><link xlink:href="https://blog.hboeck.de/archives/886-The-Problem-with-OCSP-Stapling-and-Must-Staple-and-why-Certificate-Revocation-is-still-broken.html" /></para></listitem> 584 + <listitem><para><link xlink:href="https://blog.apnic.net/2019/01/15/is-the-web-ready-for-ocsp-must-staple/"/></para></listitem> 585 + <listitem><para><link xlink:href="https://blog.hboeck.de/archives/886-The-Problem-with-OCSP-Stapling-and-Must-Staple-and-why-Certificate-Revocation-is-still-broken.html"/></para></listitem> 586 586 </itemizedlist> 587 587 ''; 588 588 };
+9 -20
nixos/modules/security/pam.nix
··· 831 831 832 832 If set, users can log in with SSH keys and PKCS#11 tokens. 833 833 834 - More information can be found <link 835 - xlink:href="https://github.com/OpenSC/pam_p11">here</link>. 834 + More information can be found <link xlink:href="https://github.com/OpenSC/pam_p11">here</link>. 836 835 ''; 837 836 }; 838 837 ··· 872 871 <literal>username:first_keyHandle,first_public_key: second_keyHandle,second_public_key</literal> 873 872 This file can be generated using <command>pamu2fcfg</command> command. 874 873 875 - More information can be found <link 876 - xlink:href="https://developers.yubico.com/pam-u2f/">here</link>. 874 + More information can be found <link xlink:href="https://developers.yubico.com/pam-u2f/">here</link>. 877 875 ''; 878 876 }; 879 877 ··· 894 892 <literal>username:first_keyHandle,first_public_key: second_keyHandle,second_public_key</literal> 895 893 This file can be generated using <command>pamu2fcfg</command> command. 896 894 897 - More information can be found <link 898 - xlink:href="https://developers.yubico.com/pam-u2f/">here</link>. 895 + More information can be found <link xlink:href="https://developers.yubico.com/pam-u2f/">here</link>. 899 896 ''; 900 897 }; 901 898 ··· 909 906 When using <command>pamu2fcfg</command>, you can specify your 910 907 application ID with the <literal>-i</literal> flag. 911 908 912 - More information can be found <link 913 - xlink:href="https://developers.yubico.com/pam-u2f/Manuals/pam_u2f.8.html"> 914 - here</link> 909 + More information can be found <link xlink:href="https://developers.yubico.com/pam-u2f/Manuals/pam_u2f.8.html">here</link> 915 910 ''; 916 911 }; 917 912 ··· 927 922 When using <command>pamu2fcfg</command>, you can specify your 928 923 application ID with the <literal>-o</literal> flag. 929 924 930 - More information can be found <link 931 - xlink:href="https://developers.yubico.com/pam-u2f/Manuals/pam_u2f.8.html"> 932 - here</link> 925 + More information can be found <link xlink:href="https://developers.yubico.com/pam-u2f/Manuals/pam_u2f.8.html">here</link> 933 926 ''; 934 927 }; 935 928 ··· 995 988 Note that this module must both be enabled using this option and on a 996 989 per-PAM-service level as well (using <literal>usshAuth</literal>). 997 990 998 - More information can be found <link 999 - xlink:href="https://github.com/uber/pam-ussh">here</link>. 991 + More information can be found <link xlink:href="https://github.com/uber/pam-ussh">here</link>. 1000 992 ''; 1001 993 }; 1002 994 ··· 1084 1076 1085 1077 The file must have only one line: 1086 1078 <literal>username:yubikey_token_id1:yubikey_token_id2</literal> 1087 - More information can be found <link 1088 - xlink:href="https://developers.yubico.com/yubico-pam/">here</link>. 1079 + More information can be found <link xlink:href="https://developers.yubico.com/yubico-pam/">here</link>. 1089 1080 ''; 1090 1081 }; 1091 1082 control = mkOption { ··· 1130 1121 Challenge-Response configurations. See the man-page ykpamcfg(1) for further 1131 1122 details on how to configure offline Challenge-Response validation. 1132 1123 1133 - More information can be found <link 1134 - xlink:href="https://developers.yubico.com/yubico-pam/Authentication_Using_Challenge-Response.html">here</link>. 1124 + More information can be found <link xlink:href="https://developers.yubico.com/yubico-pam/Authentication_Using_Challenge-Response.html">here</link>. 1135 1125 ''; 1136 1126 }; 1137 1127 challengeResponsePath = mkOption { ··· 1140 1130 description = '' 1141 1131 If not null, set the path used by yubico pam module where the challenge expected response is stored. 1142 1132 1143 - More information can be found <link 1144 - xlink:href="https://developers.yubico.com/yubico-pam/Authentication_Using_Challenge-Response.html">here</link>. 1133 + More information can be found <link xlink:href="https://developers.yubico.com/yubico-pam/Authentication_Using_Challenge-Response.html">here</link>. 1145 1134 ''; 1146 1135 }; 1147 1136 };
+3 -6
nixos/modules/security/pam_mount.nix
··· 33 33 default = []; 34 34 description = '' 35 35 List of volume definitions for pam_mount. 36 - For more information, visit <link 37 - xlink:href="http://pam-mount.sourceforge.net/pam_mount.conf.5.html" />. 36 + For more information, visit <link xlink:href="http://pam-mount.sourceforge.net/pam_mount.conf.5.html"/>. 38 37 ''; 39 38 }; 40 39 ··· 67 66 description = '' 68 67 Sets the Debug-Level. 0 disables debugging, 1 enables pam_mount tracing, 69 68 and 2 additionally enables tracing in mount.crypt. The default is 0. 70 - For more information, visit <link 71 - xlink:href="http://pam-mount.sourceforge.net/pam_mount.conf.5.html" />. 69 + For more information, visit <link xlink:href="http://pam-mount.sourceforge.net/pam_mount.conf.5.html"/>. 72 70 ''; 73 71 }; 74 72 ··· 78 76 description = '' 79 77 Amount of microseconds to wait until killing remaining processes after 80 78 final logout. 81 - For more information, visit <link 82 - xlink:href="http://pam-mount.sourceforge.net/pam_mount.conf.5.html" />. 79 + For more information, visit <link xlink:href="http://pam-mount.sourceforge.net/pam_mount.conf.5.html"/>. 83 80 ''; 84 81 }; 85 82
+1 -2
nixos/modules/security/pam_usb.nix
··· 19 19 default = false; 20 20 description = '' 21 21 Enable USB login for all login systems that support it. For 22 - more information, visit <link 23 - xlink:href="https://github.com/aluzzardi/pam_usb/wiki/Getting-Started#setting-up-devices-and-users" />. 22 + more information, visit <link xlink:href="https://github.com/aluzzardi/pam_usb/wiki/Getting-Started#setting-up-devices-and-users"/>. 24 23 ''; 25 24 }; 26 25
+1 -2
nixos/modules/services/backup/zrepl.nix
··· 23 23 settings = mkOption { 24 24 default = { }; 25 25 description = '' 26 - Configuration for zrepl. See <link 27 - xlink:href="https://zrepl.github.io/configuration.html"/> 26 + Configuration for zrepl. See <link xlink:href="https://zrepl.github.io/configuration.html"/> 28 27 for more information. 29 28 ''; 30 29 type = types.submodule {
+1 -2
nixos/modules/services/continuous-integration/github-runner.nix
··· 22 22 Whether to enable GitHub Actions runner. 23 23 24 24 Note: GitHub recommends using self-hosted runners with private repositories only. Learn more here: 25 - <link xlink:href="https://docs.github.com/en/actions/hosting-your-own-runners/about-self-hosted-runners" 26 - >About self-hosted runners</link>. 25 + <link xlink:href="https://docs.github.com/en/actions/hosting-your-own-runners/about-self-hosted-runners">About self-hosted runners</link>. 27 26 ''; 28 27 type = lib.types.bool; 29 28 };
+1 -2
nixos/modules/services/databases/postgresql.nix
··· 81 81 default = ""; 82 82 description = '' 83 83 Defines how users authenticate themselves to the server. See the 84 - <link xlink:href="https://www.postgresql.org/docs/current/auth-pg-hba-conf.html"> 85 - PostgreSQL documentation for pg_hba.conf</link> 84 + <link xlink:href="https://www.postgresql.org/docs/current/auth-pg-hba-conf.html">PostgreSQL documentation for pg_hba.conf</link> 86 85 for details on the expected format of this option. By default, 87 86 peer based authentication will be used for users connecting 88 87 via the Unix socket, and md5 password authentication will be
+2 -2
nixos/modules/services/databases/victoriametrics.nix
··· 29 29 type = types.listOf types.str; 30 30 default = []; 31 31 description = '' 32 - Extra options to pass to VictoriaMetrics. See the README: <link 33 - xlink:href="https://github.com/VictoriaMetrics/VictoriaMetrics/blob/master/README.md" /> 32 + Extra options to pass to VictoriaMetrics. See the README: 33 + <link xlink:href="https://github.com/VictoriaMetrics/VictoriaMetrics/blob/master/README.md"/> 34 34 or <command>victoriametrics -help</command> for more 35 35 information. 36 36 '';
+1 -1
nixos/modules/services/development/zammad.nix
··· 139 139 ''; 140 140 description = '' 141 141 The <filename>database.yml</filename> configuration file as key value set. 142 - See <link xlink:href='TODO' /> 142 + See <link xlink:href="TODO"/> 143 143 for list of configuration parameters. 144 144 ''; 145 145 };
+3 -1
nixos/modules/services/games/asf.nix
··· 136 136 }; 137 137 settings = mkOption { 138 138 type = types.attrs; 139 - description = "Additional settings that are documented <link xlink:href=\"https://github.com/JustArchiNET/ArchiSteamFarm/wiki/Configuration#bot-config\">here</link>."; 139 + description = '' 140 + Additional settings that are documented <link xlink:href="https://github.com/JustArchiNET/ArchiSteamFarm/wiki/Configuration#bot-config">here</link>. 141 + ''; 140 142 default = { }; 141 143 }; 142 144 };
+2 -3
nixos/modules/services/hardware/udev.nix
··· 282 282 default = true; 283 283 type = types.bool; 284 284 description = '' 285 - Whether to assign <link 286 - xlink:href='http://www.freedesktop.org/wiki/Software/systemd/PredictableNetworkInterfaceNames'>predictable 287 - names to network interfaces</link>. If enabled, interfaces 285 + Whether to assign <link xlink:href="http://www.freedesktop.org/wiki/Software/systemd/PredictableNetworkInterfaceNames">predictable names to network interfaces</link>. 286 + If enabled, interfaces 288 287 are assigned names that contain topology information 289 288 (e.g. <literal>wlp3s0</literal>) and thus should be stable 290 289 across reboots. If disabled, names depend on the order in
+1 -2
nixos/modules/services/logging/filebeat.nix
··· 161 161 internal = true; 162 162 description = '' 163 163 Inputs specify how Filebeat locates and processes 164 - input data. Use <xref 165 - linkend="opt-services.filebeat.inputs"/> instead. 164 + input data. Use <xref linkend="opt-services.filebeat.inputs"/> instead. 166 165 167 166 See <link xlink:href="https://www.elastic.co/guide/en/beats/filebeat/current/configuration-filebeat-options.html"/>. 168 167 '';
+1 -1
nixos/modules/services/mail/mailman.nix
··· 114 114 example = "/run/secrets/ldap-bind"; 115 115 description = '' 116 116 Path to the file containing the bind password of the servie account 117 - defined by <xref linkend="opt-services.mailman.ldap.bindDn" />. 117 + defined by <xref linkend="opt-services.mailman.ldap.bindDn"/>. 118 118 ''; 119 119 }; 120 120 superUserGroup = mkOption {
+3 -3
nixos/modules/services/mail/sympa.nix
··· 88 88 example = "cs"; 89 89 description = '' 90 90 Default Sympa language. 91 - See <link xlink:href='https://github.com/sympa-community/sympa/tree/sympa-6.2/po/sympa' /> 91 + See <link xlink:href="https://github.com/sympa-community/sympa/tree/sympa-6.2/po/sympa"/> 92 92 for available options. 93 93 ''; 94 94 }; ··· 138 138 }; 139 139 description = '' 140 140 The <filename>robot.conf</filename> configuration file as key value set. 141 - See <link xlink:href='https://sympa-community.github.io/gpldoc/man/sympa.conf.5.html' /> 141 + See <link xlink:href="https://sympa-community.github.io/gpldoc/man/sympa.conf.5.html"/> 142 142 for list of configuration parameters. 143 143 ''; 144 144 }; ··· 287 287 ''; 288 288 description = '' 289 289 The <filename>sympa.conf</filename> configuration file as key value set. 290 - See <link xlink:href='https://sympa-community.github.io/gpldoc/man/sympa.conf.5.html' /> 290 + See <link xlink:href="https://sympa-community.github.io/gpldoc/man/sympa.conf.5.html"/> 291 291 for list of configuration parameters. 292 292 ''; 293 293 };
+1 -2
nixos/modules/services/matrix/appservice-discord.nix
··· 44 44 <filename>config.yaml</filename> configuration as a Nix attribute set. 45 45 46 46 Configuration options should match those described in 47 - <link xlink:href="https://github.com/Half-Shot/matrix-appservice-discord/blob/master/config/config.sample.yaml"> 48 - config.sample.yaml</link>. 47 + <link xlink:href="https://github.com/Half-Shot/matrix-appservice-discord/blob/master/config/config.sample.yaml">config.sample.yaml</link>. 49 48 50 49 <option>config.bridge.domain</option> and <option>config.bridge.homeserverUrl</option> 51 50 should be set to match the public host name of the Matrix homeserver for webhooks and avatars to work.
+1 -2
nixos/modules/services/matrix/mautrix-facebook.nix
··· 78 78 description = '' 79 79 <filename>config.yaml</filename> configuration as a Nix attribute set. 80 80 Configuration options should match those described in 81 - <link xlink:href="https://github.com/mautrix/facebook/blob/master/mautrix_facebook/example-config.yaml"> 82 - example-config.yaml</link>. 81 + <link xlink:href="https://github.com/mautrix/facebook/blob/master/mautrix_facebook/example-config.yaml">example-config.yaml</link>. 83 82 84 83 Secret tokens should be specified using <option>environmentFile</option> 85 84 instead of this world-readable attribute set.
+1 -2
nixos/modules/services/matrix/mautrix-telegram.nix
··· 81 81 description = '' 82 82 <filename>config.yaml</filename> configuration as a Nix attribute set. 83 83 Configuration options should match those described in 84 - <link xlink:href="https://github.com/tulir/mautrix-telegram/blob/master/example-config.yaml"> 85 - example-config.yaml</link>. 84 + <link xlink:href="https://github.com/tulir/mautrix-telegram/blob/master/example-config.yaml">example-config.yaml</link>. 86 85 87 86 Secret tokens should be specified using <option>environmentFile</option> 88 87 instead of this world-readable attribute set.
+1 -1
nixos/modules/services/misc/etcd.nix
··· 127 127 extraConf = mkOption { 128 128 description = '' 129 129 Etcd extra configuration. See 130 - <link xlink:href='https://github.com/coreos/etcd/blob/master/Documentation/op-guide/configuration.md#configuration-flags' /> 130 + <link xlink:href="https://github.com/coreos/etcd/blob/master/Documentation/op-guide/configuration.md#configuration-flags"/> 131 131 ''; 132 132 type = types.attrsOf types.str; 133 133 default = {};
+2 -2
nixos/modules/services/misc/etebase-server.nix
··· 135 135 default = {}; 136 136 description = '' 137 137 Configuration for <package>etebase-server</package>. Refer to 138 - <link xlink:href="https://github.com/etesync/server/blob/master/etebase-server.ini.example" /> 139 - and <link xlink:href="https://github.com/etesync/server/wiki" /> 138 + <link xlink:href="https://github.com/etesync/server/blob/master/etebase-server.ini.example"/> 139 + and <link xlink:href="https://github.com/etesync/server/wiki"/> 140 140 for details on supported values. 141 141 ''; 142 142 example = {
+2 -3
nixos/modules/services/misc/geoipupdate.nix
··· 40 40 description = '' 41 41 <productname>geoipupdate</productname> configuration 42 42 options. See 43 - <link xlink:href="https://github.com/maxmind/geoipupdate/blob/main/doc/GeoIP.conf.md" /> 43 + <link xlink:href="https://github.com/maxmind/geoipupdate/blob/main/doc/GeoIP.conf.md"/> 44 44 for a full list of available options. 45 45 46 46 Settings containing secret data should be set to an ··· 92 92 93 93 Always handled as a secret whether the value is 94 94 wrapped in a <literal>{ _secret = ...; }</literal> 95 - attrset or not (refer to <xref 96 - linkend="opt-services.geoipupdate.settings" /> for 95 + attrset or not (refer to <xref linkend="opt-services.geoipupdate.settings"/> for 97 96 details). 98 97 ''; 99 98 apply = x: if isAttrs x then x else { _secret = x; };
+2 -2
nixos/modules/services/misc/persistent-evdev.nix
··· 22 22 Physical devices should already exist in <filename class="devicefile">/dev/input/by-id/</filename>. 23 23 Proxy devices will be automatically given a <literal>uinput-</literal> prefix. 24 24 25 - See the <link xlink:href="https://github.com/aiberia/persistent-evdev#example-usage-with-libvirt"> 26 - project page</link> for example configuration of virtual devices with libvirt 25 + See the <link xlink:href="https://github.com/aiberia/persistent-evdev#example-usage-with-libvirt">project page</link> 26 + for example configuration of virtual devices with libvirt 27 27 and remember to add <literal>uinput-*</literal> devices to the qemu 28 28 <literal>cgroup_device_acl</literal> list (see <xref linkend="opt-virtualisation.libvirtd.qemu.verbatimConfig"/>). 29 29 '';
+2 -2
nixos/modules/services/monitoring/cadvisor.nix
··· 75 75 world-readable Nix store that contains the value of <option>storageDriverPassword</option>. 76 76 77 77 It's recommended to override this with a path not in the Nix store. 78 - Tip: use <link xlink:href='https://nixos.org/nixops/manual/#idm140737318306400'>nixops key management</link> 78 + Tip: use <link xlink:href="https://nixos.org/nixops/manual/#idm140737318306400">nixops key management</link> 79 79 ''; 80 80 }; 81 81 ··· 91 91 description = '' 92 92 Additional cadvisor options. 93 93 94 - See <link xlink:href='https://github.com/google/cadvisor/blob/master/docs/runtime_options.md'/> for available options. 94 + See <link xlink:href="https://github.com/google/cadvisor/blob/master/docs/runtime_options.md"/> for available options. 95 95 ''; 96 96 }; 97 97 };
+1 -1
nixos/modules/services/monitoring/grafana-image-renderer.nix
··· 92 92 description = '' 93 93 Configuration attributes for <package>grafana-image-renderer</package>. 94 94 95 - See <link xlink:href="https://github.com/grafana/grafana-image-renderer/blob/ce1f81438e5f69c7fd7c73ce08bab624c4c92e25/default.json" /> 95 + See <link xlink:href="https://github.com/grafana/grafana-image-renderer/blob/ce1f81438e5f69c7fd7c73ce08bab624c4c92e25/default.json"/> 96 96 for supported values. 97 97 ''; 98 98 };
+1 -1
nixos/modules/services/monitoring/graphite.nix
··· 253 253 default = {}; 254 254 description = '' 255 255 Extra seyren configuration. See 256 - <link xlink:href='https://github.com/scobal/seyren#config' /> 256 + <link xlink:href="https://github.com/scobal/seyren#config"/> 257 257 ''; 258 258 type = types.attrsOf types.str; 259 259 example = literalExpression ''
+6 -6
nixos/modules/services/monitoring/munin.nix
··· 142 142 Enable Munin Node agent. Munin node listens on 0.0.0.0 and 143 143 by default accepts connections only from 127.0.0.1 for security reasons. 144 144 145 - See <link xlink:href='http://guide.munin-monitoring.org/en/latest/architecture/index.html' />. 145 + See <link xlink:href="http://guide.munin-monitoring.org/en/latest/architecture/index.html"/>. 146 146 ''; 147 147 }; 148 148 ··· 151 151 type = types.lines; 152 152 description = '' 153 153 <filename>munin-node.conf</filename> extra configuration. See 154 - <link xlink:href='http://guide.munin-monitoring.org/en/latest/reference/munin-node.conf.html' /> 154 + <link xlink:href="http://guide.munin-monitoring.org/en/latest/reference/munin-node.conf.html"/> 155 155 ''; 156 156 }; 157 157 ··· 160 160 type = types.lines; 161 161 description = '' 162 162 <filename>plugin-conf.d</filename> extra plugin configuration. See 163 - <link xlink:href='http://guide.munin-monitoring.org/en/latest/plugin/use.html' /> 163 + <link xlink:href="http://guide.munin-monitoring.org/en/latest/plugin/use.html"/> 164 164 ''; 165 165 example = '' 166 166 [fail2ban_*] ··· 268 268 type = types.lines; 269 269 description = '' 270 270 <filename>munin.conf</filename> extra global configuration. 271 - See <link xlink:href='http://guide.munin-monitoring.org/en/latest/reference/munin.conf.html' />. 271 + See <link xlink:href="http://guide.munin-monitoring.org/en/latest/reference/munin.conf.html"/>. 272 272 Useful to setup notifications, see 273 - <link xlink:href='http://guide.munin-monitoring.org/en/latest/tutorial/alert.html' /> 273 + <link xlink:href="http://guide.munin-monitoring.org/en/latest/tutorial/alert.html"/> 274 274 ''; 275 275 example = '' 276 276 contact.email.command mail -s "Munin notification for ''${var:host}" someone@example.com ··· 283 283 description = '' 284 284 Definitions of hosts of nodes to collect data from. Needs at least one 285 285 host for cron to succeed. See 286 - <link xlink:href='http://guide.munin-monitoring.org/en/latest/reference/munin.conf.html' /> 286 + <link xlink:href="http://guide.munin-monitoring.org/en/latest/reference/munin.conf.html"/> 287 287 ''; 288 288 example = literalExpression '' 289 289 '''
+1 -1
nixos/modules/services/monitoring/nagios.nix
··· 88 88 89 89 options = { 90 90 services.nagios = { 91 - enable = mkEnableOption "<link xlink:href='http://www.nagios.org/'>Nagios</link> to monitor your system or network."; 91 + enable = mkEnableOption ''<link xlink:href="http://www.nagios.org/">Nagios</link> to monitor your system or network.''; 92 92 93 93 objectDefs = mkOption { 94 94 description = "
+7 -12
nixos/modules/services/monitoring/parsedmarc.nix
··· 69 69 type = lib.types.bool; 70 70 default = true; 71 71 description = '' 72 - Whether to enable and configure the <link 73 - linkend="opt-services.geoipupdate.enable">geoipupdate</link> 72 + Whether to enable and configure the <link linkend="opt-services.geoipupdate.enable">geoipupdate</link> 74 73 service to automatically fetch GeoIP databases. Not crucial, 75 74 but recommended for full functionality. 76 75 77 - To finish the setup, you need to manually set the <xref 78 - linkend="opt-services.geoipupdate.settings.AccountID" /> and 79 - <xref linkend="opt-services.geoipupdate.settings.LicenseKey" /> 76 + To finish the setup, you need to manually set the <xref linkend="opt-services.geoipupdate.settings.AccountID"/> and 77 + <xref linkend="opt-services.geoipupdate.settings.LicenseKey"/> 80 78 options. 81 79 ''; 82 80 }; ··· 101 99 Whether the automatically provisioned Elasticsearch 102 100 instance should be added as a grafana datasource. Has no 103 101 effect unless 104 - <xref linkend="opt-services.parsedmarc.provision.elasticsearch" /> 102 + <xref linkend="opt-services.parsedmarc.provision.elasticsearch"/> 105 103 is also enabled. 106 104 ''; 107 105 }; ··· 213 211 214 212 Always handled as a secret whether the value is 215 213 wrapped in a <literal>{ _secret = ...; }</literal> 216 - attrset or not (refer to <xref 217 - linkend="opt-services.parsedmarc.settings" /> for 214 + attrset or not (refer to <xref linkend="opt-services.parsedmarc.settings"/> for 218 215 details). 219 216 ''; 220 217 apply = x: if isAttrs x || x == null then x else { _secret = x; }; ··· 278 275 279 276 Always handled as a secret whether the value is 280 277 wrapped in a <literal>{ _secret = ...; }</literal> 281 - attrset or not (refer to <xref 282 - linkend="opt-services.parsedmarc.settings" /> for 278 + attrset or not (refer to <xref linkend="opt-services.parsedmarc.settings"/> for 283 279 details). 284 280 ''; 285 281 apply = x: if isAttrs x || x == null then x else { _secret = x; }; ··· 332 328 333 329 Always handled as a secret whether the value is 334 330 wrapped in a <literal>{ _secret = ...; }</literal> 335 - attrset or not (refer to <xref 336 - linkend="opt-services.parsedmarc.settings" /> for 331 + attrset or not (refer to <xref linkend="opt-services.parsedmarc.settings"/> for 337 332 details). 338 333 ''; 339 334 apply = x: if isAttrs x || x == null then x else { _secret = x; };
+6 -9
nixos/modules/services/monitoring/prometheus/default.nix
··· 379 379 gce_sd_configs = mkOpt (types.listOf promTypes.gce_sd_config) '' 380 380 List of Google Compute Engine service discovery configurations. 381 381 382 - See <link 383 - xlink:href="https://prometheus.io/docs/prometheus/latest/configuration/configuration/#gce_sd_config">the 384 - relevant Prometheus configuration docs</link> for more detail. 382 + See <link xlink:href="https://prometheus.io/docs/prometheus/latest/configuration/configuration/#gce_sd_config">the relevant Prometheus configuration docs</link> 383 + for more detail. 385 384 ''; 386 385 387 386 hetzner_sd_configs = mkOpt (types.listOf promTypes.hetzner_sd_config) '' ··· 807 806 filter = mkOpt types.str '' 808 807 Filter can be used optionally to filter the instance list by other 809 808 criteria Syntax of this filter string is described here in the filter 810 - query parameter section: <link 811 - xlink:href="https://cloud.google.com/compute/docs/reference/latest/instances/list" 812 - />. 809 + query parameter section: <link xlink:href="https://cloud.google.com/compute/docs/reference/latest/instances/list"/>. 813 810 ''; 814 811 815 812 refresh_interval = mkDefOpt types.str "60s" '' ··· 825 822 The tag separator used to separate concatenated GCE instance network tags. 826 823 827 824 See the GCP documentation on network tags for more information: 828 - <link xlink:href="https://cloud.google.com/vpc/docs/add-remove-network-tags" /> 825 + <link xlink:href="https://cloud.google.com/vpc/docs/add-remove-network-tags"/> 829 826 ''; 830 827 }; 831 828 }; ··· 1033 1030 1034 1031 auth_token = mkOpt types.str '' 1035 1032 Optional authentication information for token-based authentication: 1036 - <link xlink:href="https://docs.mesosphere.com/1.11/security/ent/iam-api/#passing-an-authentication-token" /> 1033 + <link xlink:href="https://docs.mesosphere.com/1.11/security/ent/iam-api/#passing-an-authentication-token"/> 1037 1034 It is mutually exclusive with <literal>auth_token_file</literal> and other authentication mechanisms. 1038 1035 ''; 1039 1036 1040 1037 auth_token_file = mkOpt types.str '' 1041 1038 Optional authentication information for token-based authentication: 1042 - <link xlink:href="https://docs.mesosphere.com/1.11/security/ent/iam-api/#passing-an-authentication-token" /> 1039 + <link xlink:href="https://docs.mesosphere.com/1.11/security/ent/iam-api/#passing-an-authentication-token"/> 1043 1040 It is mutually exclusive with <literal>auth_token</literal> and other authentication mechanisms. 1044 1041 ''; 1045 1042 };
+4 -4
nixos/modules/services/monitoring/prometheus/exporters/dovecot.nix
··· 33 33 work with this exporter: 34 34 <programlisting> 35 35 { 36 - <xref linkend="opt-services.prometheus.exporters.dovecot.enable" /> = true; 37 - <xref linkend="opt-services.prometheus.exporters.dovecot.socketPath" /> = "/var/run/dovecot2/old-stats"; 38 - <xref linkend="opt-services.dovecot2.mailPlugins.globally.enable" /> = [ "old_stats" ]; 39 - <xref linkend="opt-services.dovecot2.extraConfig" /> = ''' 36 + <xref linkend="opt-services.prometheus.exporters.dovecot.enable"/> = true; 37 + <xref linkend="opt-services.prometheus.exporters.dovecot.socketPath"/> = "/var/run/dovecot2/old-stats"; 38 + <xref linkend="opt-services.dovecot2.mailPlugins.globally.enable"/> = [ "old_stats" ]; 39 + <xref linkend="opt-services.dovecot2.extraConfig"/> = ''' 40 40 service old-stats { 41 41 unix_listener old-stats { 42 42 user = dovecot-exporter
+1 -1
nixos/modules/services/monitoring/prometheus/exporters/process.nix
··· 22 22 All settings expressed as an Nix attrset. 23 23 24 24 Check the official documentation for the corresponding YAML 25 - settings that can all be used here: <link xlink:href="https://github.com/ncabatoff/process-exporter" /> 25 + settings that can all be used here: <link xlink:href="https://github.com/ncabatoff/process-exporter"/> 26 26 ''; 27 27 }; 28 28 };
+1 -1
nixos/modules/services/monitoring/prometheus/exporters/script.nix
··· 41 41 All settings expressed as an Nix attrset. 42 42 43 43 Check the official documentation for the corresponding YAML 44 - settings that can all be used here: <link xlink:href="https://github.com/adhocteam/script_exporter#sample-configuration" /> 44 + settings that can all be used here: <link xlink:href="https://github.com/adhocteam/script_exporter#sample-configuration"/> 45 45 ''; 46 46 }; 47 47 };
+6 -6
nixos/modules/services/networking/bird-lg.nix
··· 136 136 extraArgs = mkOption { 137 137 type = types.lines; 138 138 default = ""; 139 - description = " 140 - Extra parameters documented <link xlink:href=\"https://github.com/xddxdd/bird-lg-go#frontend\">here</link>. 141 - "; 139 + description = '' 140 + Extra parameters documented <link xlink:href="https://github.com/xddxdd/bird-lg-go#frontend">here</link>. 141 + ''; 142 142 }; 143 143 }; 144 144 ··· 183 183 extraArgs = mkOption { 184 184 type = types.lines; 185 185 default = ""; 186 - description = " 187 - Extra parameters documented <link xlink:href=\"https://github.com/xddxdd/bird-lg-go#proxy\">here</link>. 188 - "; 186 + description = '' 187 + Extra parameters documented <link xlink:href="https://github.com/xddxdd/bird-lg-go#proxy">here</link>. 188 + ''; 189 189 }; 190 190 }; 191 191 };
+1 -1
nixos/modules/services/networking/bird.nix
··· 15 15 type = types.lines; 16 16 description = '' 17 17 BIRD Internet Routing Daemon configuration file. 18 - <link xlink:href='http://bird.network.cz/'/> 18 + <link xlink:href="http://bird.network.cz/"/> 19 19 ''; 20 20 }; 21 21 checkConfig = mkOption {
+4 -1
nixos/modules/services/networking/coredns.nix
··· 17 17 } 18 18 ''; 19 19 type = types.lines; 20 - description = "Verbatim Corefile to use. See <link xlink:href=\"https://coredns.io/manual/toc/#configuration\"/> for details."; 20 + description = '' 21 + Verbatim Corefile to use. 22 + See <link xlink:href="https://coredns.io/manual/toc/#configuration"/> for details. 23 + ''; 21 24 }; 22 25 23 26 package = mkOption {
+1 -1
nixos/modules/services/networking/seafile.nix
··· 133 133 type = types.lines; 134 134 description = '' 135 135 Extra config to append to `seahub_settings.py` file. 136 - Refer to <link xlink:href="https://manual.seafile.com/config/seahub_settings_py/" /> 136 + Refer to <link xlink:href="https://manual.seafile.com/config/seahub_settings_py/"/> 137 137 for all available options. 138 138 ''; 139 139 };
+6 -6
nixos/modules/services/networking/ssh/sshd.nix
··· 302 302 Allowed key exchange algorithms 303 303 304 304 Uses the lower bound recommended in both 305 - <link xlink:href="https://stribika.github.io/2015/01/04/secure-secure-shell.html" /> 305 + <link xlink:href="https://stribika.github.io/2015/01/04/secure-secure-shell.html"/> 306 306 and 307 - <link xlink:href="https://infosec.mozilla.org/guidelines/openssh#modern-openssh-67" /> 307 + <link xlink:href="https://infosec.mozilla.org/guidelines/openssh#modern-openssh-67"/> 308 308 ''; 309 309 }; 310 310 ··· 322 322 Allowed ciphers 323 323 324 324 Defaults to recommended settings from both 325 - <link xlink:href="https://stribika.github.io/2015/01/04/secure-secure-shell.html" /> 325 + <link xlink:href="https://stribika.github.io/2015/01/04/secure-secure-shell.html"/> 326 326 and 327 - <link xlink:href="https://infosec.mozilla.org/guidelines/openssh#modern-openssh-67" /> 327 + <link xlink:href="https://infosec.mozilla.org/guidelines/openssh#modern-openssh-67"/> 328 328 ''; 329 329 }; 330 330 ··· 342 342 Allowed MACs 343 343 344 344 Defaults to recommended settings from both 345 - <link xlink:href="https://stribika.github.io/2015/01/04/secure-secure-shell.html" /> 345 + <link xlink:href="https://stribika.github.io/2015/01/04/secure-secure-shell.html"/> 346 346 and 347 - <link xlink:href="https://infosec.mozilla.org/guidelines/openssh#modern-openssh-67" /> 347 + <link xlink:href="https://infosec.mozilla.org/guidelines/openssh#modern-openssh-67"/> 348 348 ''; 349 349 }; 350 350
+2 -4
nixos/modules/services/networking/wireguard.nix
··· 122 122 WireGuard interface is created, and which retains the socket even if the 123 123 interface is moved via <option>interfaceNamespace</option>. When 124 124 <literal>null</literal>, the interface is created in the init namespace. 125 - See <link 126 - xlink:href="https://www.wireguard.com/netns/">documentation</link>. 125 + See <link xlink:href="https://www.wireguard.com/netns/">documentation</link>. 127 126 ''; 128 127 }; 129 128 ··· 135 134 interface is moved to. The special value <literal>init</literal> means 136 135 the init namespace. When <literal>null</literal>, the interface is not 137 136 moved. 138 - See <link 139 - xlink:href="https://www.wireguard.com/netns/">documentation</link>. 137 + See <link xlink:href="https://www.wireguard.com/netns/">documentation</link>. 140 138 ''; 141 139 }; 142 140 };
+1 -1
nixos/modules/services/networking/wpa_supplicant.nix
··· 190 190 description = '' 191 191 Whether to allow configuring networks "imperatively" (e.g. via 192 192 <package>wpa_supplicant_gui</package>) and declaratively via 193 - <xref linkend="opt-networking.wireless.networks" />. 193 + <xref linkend="opt-networking.wireless.networks"/>. 194 194 195 195 Please note that this adds a custom patch to <package>wpa_supplicant</package>. 196 196 '';
+3 -3
nixos/modules/services/security/privacyidea.nix
··· 78 78 using <package>envsubst</package> which is helpful for specifying 79 79 secrets: 80 80 <programlisting> 81 - { <xref linkend="opt-services.privacyidea.secretKey" /> = "$SECRET"; } 81 + { <xref linkend="opt-services.privacyidea.secretKey"/> = "$SECRET"; } 82 82 </programlisting> 83 83 84 84 The environment-file can now specify the actual secret key: ··· 207 207 description = '' 208 208 Attribute-set containing the settings for <package>privacyidea-ldap-proxy</package>. 209 209 It's possible to pass secrets using env-vars as substitutes and 210 - use the option <xref linkend="opt-services.privacyidea.ldap-proxy.environmentFile" /> 210 + use the option <xref linkend="opt-services.privacyidea.ldap-proxy.environmentFile"/> 211 211 to inject them via <package>envsubst</package>. 212 212 ''; 213 213 }; ··· 217 217 type = types.nullOr types.str; 218 218 description = '' 219 219 Environment file containing secrets to be substituted into 220 - <xref linkend="opt-services.privacyidea.ldap-proxy.settings" />. 220 + <xref linkend="opt-services.privacyidea.ldap-proxy.settings"/>. 221 221 ''; 222 222 }; 223 223 };
+2 -2
nixos/modules/services/security/step-ca.nix
··· 36 36 type = with lib.types; attrsOf anything; 37 37 description = '' 38 38 Settings that go into <filename>ca.json</filename>. See 39 - <link xlink:href="https://smallstep.com/docs/step-ca/configuration"> 40 - the step-ca manual</link> for more information. The easiest way to 39 + <link xlink:href="https://smallstep.com/docs/step-ca/configuration">the step-ca manual</link> 40 + for more information. The easiest way to 41 41 configure this module would be to run <literal>step ca init</literal> 42 42 to generate <filename>ca.json</filename> and then import it using 43 43 <literal>builtins.fromJSON</literal>.
+5 -5
nixos/modules/services/security/tor.nix
··· 287 287 relay = { 288 288 enable = mkEnableOption ''relaying of Tor traffic for others. 289 289 290 - See <link xlink:href="https://www.torproject.org/docs/tor-doc-relay" /> 290 + See <link xlink:href="https://www.torproject.org/docs/tor-doc-relay"/> 291 291 for details. 292 292 293 293 Setting this to true requires setting ··· 348 348 349 349 <para> 350 350 See 351 - <link xlink:href="https://www.torproject.org/docs/tor-doc-relay.html.en" /> 351 + <link xlink:href="https://www.torproject.org/docs/tor-doc-relay.html.en"/> 352 352 for more info. 353 353 </para> 354 354 </listitem> ··· 366 366 <para> 367 367 Using this option will make Tor advertise your bridge 368 368 to users through various mechanisms like 369 - <link xlink:href="https://bridges.torproject.org/" />, though. 369 + <link xlink:href="https://bridges.torproject.org/"/>, though. 370 370 </para> 371 371 372 372 <important> ··· 384 384 </important> 385 385 386 386 <para> 387 - See <link xlink:href="https://www.torproject.org/docs/bridges.html.en" /> 387 + See <link xlink:href="https://www.torproject.org/docs/bridges.html.en"/> 388 388 for more info. 389 389 </para> 390 390 </listitem> ··· 419 419 </para> 420 420 421 421 <para> 422 - See <link xlink:href="https://www.torproject.org/docs/bridges.html.en" /> 422 + See <link xlink:href="https://www.torproject.org/docs/bridges.html.en"/> 423 423 for more info. 424 424 </para> 425 425 </listitem>
+1 -1
nixos/modules/services/security/vaultwarden/default.nix
··· 116 116 The available configuration options can be found in 117 117 <link xlink:href="https://github.com/dani-garcia/vaultwarden/blob/${vaultwarden.version}/.env.template">the environment template file</link>. 118 118 119 - See <xref linkend="opt-services.vaultwarden.environmentFile" /> for how 119 + See <xref linkend="opt-services.vaultwarden.environmentFile"/> for how 120 120 to set up access to the Admin UI to invite initial users. 121 121 ''; 122 122 };
+1 -2
nixos/modules/services/web-apps/hedgedoc.nix
··· 152 152 ''; 153 153 description = '' 154 154 Specify the Content Security Policy which is passed to Helmet. 155 - For configuration details see <link xlink:href="https://helmetjs.github.io/docs/csp/" 156 - >https://helmetjs.github.io/docs/csp/</link>. 155 + For configuration details see <link xlink:href="https://helmetjs.github.io/docs/csp/"/>. 157 156 ''; 158 157 }; 159 158 protocolUseSSL = mkOption {
+6 -13
nixos/modules/services/web-apps/keycloak.nix
··· 215 215 manually provisioned database; has no effect when a local 216 216 database is automatically provisioned. 217 217 218 - To use this with a local database, set <xref 219 - linkend="opt-services.keycloak.database.createLocally" /> to 218 + To use this with a local database, set <xref linkend="opt-services.keycloak.database.createLocally"/> to 220 219 <literal>false</literal> and create the database and user 221 220 manually. 222 221 ''; ··· 230 229 provisioned database; has no effect when a local database is 231 230 automatically provisioned. 232 231 233 - To use this with a local database, set <xref 234 - linkend="opt-services.keycloak.database.createLocally" /> to 232 + To use this with a local database, set <xref linkend="opt-services.keycloak.database.createLocally"/> to 235 233 <literal>false</literal> and create the database and user 236 234 manually. 237 235 ''; ··· 329 327 want to set this to <literal>/auth</literal> to 330 328 keep compatibility with your clients. 331 329 332 - See <link 333 - xlink:href="https://www.keycloak.org/migration/migrating-to-quarkus" 334 - /> for more information on migrating from Wildfly 335 - to Quarkus. 330 + See <link xlink:href="https://www.keycloak.org/migration/migrating-to-quarkus"/> 331 + for more information on migrating from Wildfly to Quarkus. 336 332 </para> 337 333 </note> 338 334 ''; ··· 404 400 </varlistentry> 405 401 </variablelist> 406 402 407 - See <link 408 - xlink:href="https://www.keycloak.org/server/reverseproxy" 409 - /> for more information. 403 + See <link xlink:href="https://www.keycloak.org/server/reverseproxy"/> for more information. 410 404 ''; 411 405 }; 412 406 }; ··· 425 419 Configuration options corresponding to parameters set in 426 420 <filename>conf/keycloak.conf</filename>. 427 421 428 - Most available options are documented at <link 429 - xlink:href="https://www.keycloak.org/server/all-config" />. 422 + Most available options are documented at <link xlink:href="https://www.keycloak.org/server/all-config"/>. 430 423 431 424 Options containing secret data should be set to an attribute 432 425 set containing the attribute <literal>_secret</literal> - a
+1 -1
nixos/modules/services/web-apps/mediawiki.nix
··· 280 280 one version of MediaWiki, or have other applications that also use the 281 281 database, you can give the table names a unique prefix to stop any naming 282 282 conflicts or confusion. 283 - See <link xlink:href='https://www.mediawiki.org/wiki/Manual:$wgDBprefix'/>. 283 + See <link xlink:href="https://www.mediawiki.org/wiki/Manual:$wgDBprefix"/>. 284 284 ''; 285 285 }; 286 286
+6 -6
nixos/modules/services/web-apps/nextcloud.nix
··· 94 94 default = config.services.nextcloud.home; 95 95 defaultText = literalExpression "config.services.nextcloud.home"; 96 96 description = '' 97 - Data storage path of nextcloud. Will be <xref linkend="opt-services.nextcloud.home" /> by default. 97 + Data storage path of nextcloud. Will be <xref linkend="opt-services.nextcloud.home"/> by default. 98 98 This folder will be populated with a config.php and data folder which contains the state of the instance (excl the database)."; 99 99 ''; 100 100 example = "/mnt/nextcloud-file"; ··· 105 105 description = '' 106 106 Extra apps to install. Should be an attrSet of appid to packages generated by fetchNextcloudApp. 107 107 The appid must be identical to the "id" value in the apps appinfo/info.xml. 108 - Using this will disable the appstore to prevent Nextcloud from updating these apps (see <xref linkend="opt-services.nextcloud.appstoreEnable" />). 108 + Using this will disable the appstore to prevent Nextcloud from updating these apps (see <xref linkend="opt-services.nextcloud.appstoreEnable"/>). 109 109 ''; 110 110 example = literalExpression '' 111 111 { ··· 128 128 type = types.bool; 129 129 default = true; 130 130 description = '' 131 - Automatically enable the apps in <xref linkend="opt-services.nextcloud.extraApps" /> every time nextcloud starts. 131 + Automatically enable the apps in <xref linkend="opt-services.nextcloud.extraApps"/> every time nextcloud starts. 132 132 If set to false, apps need to be enabled in the Nextcloud user interface or with nextcloud-occ app:enable. 133 133 ''; 134 134 }; ··· 138 138 example = true; 139 139 description = '' 140 140 Allow the installation of apps and app updates from the store. 141 - Enabled by default unless there are packages in <xref linkend="opt-services.nextcloud.extraApps" />. 142 - Set to true to force enable the store even if <xref linkend="opt-services.nextcloud.extraApps" /> is used. 141 + Enabled by default unless there are packages in <xref linkend="opt-services.nextcloud.extraApps"/>. 142 + Set to true to force enable the store even if <xref linkend="opt-services.nextcloud.extraApps"/> is used. 143 143 Set to false to disable the installation of apps from the global appstore. App management is always enabled regardless of this setting. 144 144 ''; 145 145 }; ··· 467 467 This is used by the theming app and for generating previews of certain images (e.g. SVG and HEIF). 468 468 You may want to disable it for increased security. In that case, previews will still be available 469 469 for some images (e.g. JPEG and PNG). 470 - See <link xlink:href="https://github.com/nextcloud/server/issues/13099" />. 470 + See <link xlink:href="https://github.com/nextcloud/server/issues/13099"/>. 471 471 '' // { 472 472 default = true; 473 473 };
+1 -2
nixos/modules/services/web-apps/node-red.nix
··· 49 49 defaultText = literalExpression ''"''${package}/lib/node_modules/node-red/settings.js"''; 50 50 description = '' 51 51 Path to the JavaScript configuration file. 52 - See <link 53 - xlink:href="https://github.com/node-red/node-red/blob/master/packages/node_modules/node-red/settings.js"/> 52 + See <link xlink:href="https://github.com/node-red/node-red/blob/master/packages/node_modules/node-red/settings.js"/> 54 53 for a configuration example. 55 54 ''; 56 55 };
+2 -3
nixos/modules/services/web-apps/wiki-js.nix
··· 95 95 }; 96 96 description = '' 97 97 Settings to configure <package>wiki-js</package>. This directly 98 - corresponds to <link xlink:href="https://docs.requarks.io/install/config">the upstream 99 - configuration options</link>. 98 + corresponds to <link xlink:href="https://docs.requarks.io/install/config">the upstream configuration options</link>. 100 99 101 100 Secrets can be injected via the environment by 102 101 <itemizedlist> 103 - <listitem><para>specifying <xref linkend="opt-services.wiki-js.environmentFile" /> 102 + <listitem><para>specifying <xref linkend="opt-services.wiki-js.environmentFile"/> 104 103 to contain secrets</para></listitem> 105 104 <listitem><para>and setting sensitive values to <literal>$(ENVIRONMENT_VAR)</literal> 106 105 with this value defined in the environment-file.</para></listitem>
+2 -2
nixos/modules/services/web-apps/wordpress.nix
··· 192 192 prefix. Typically this is changed if you are installing multiple WordPress blogs 193 193 in the same database. 194 194 195 - See <link xlink:href='https://codex.wordpress.org/Editing_wp-config.php#table_prefix'/>. 195 + See <link xlink:href="https://codex.wordpress.org/Editing_wp-config.php#table_prefix"/>. 196 196 ''; 197 197 }; 198 198 ··· 246 246 description = '' 247 247 Any additional text to be appended to the wp-config.php 248 248 configuration file. This is a PHP script. For configuration 249 - settings, see <link xlink:href='https://codex.wordpress.org/Editing_wp-config.php'/>. 249 + settings, see <link xlink:href="https://codex.wordpress.org/Editing_wp-config.php"/>. 250 250 ''; 251 251 example = '' 252 252 define( 'AUTOSAVE_INTERVAL', 60 ); // Seconds
+2 -4
nixos/modules/services/web-servers/apache-httpd/vhost-options.nix
··· 261 261 default = ""; 262 262 example = "Disallow: /foo/"; 263 263 description = '' 264 - Specification of pages to be ignored by web crawlers. See <link 265 - xlink:href='http://www.robotstxt.org/'/> for details. 264 + Specification of pages to be ignored by web crawlers. See <link xlink:href="http://www.robotstxt.org/"/> for details. 266 265 ''; 267 266 }; 268 267 ··· 280 279 }; 281 280 ''; 282 281 description = '' 283 - Declarative location config. See <link 284 - xlink:href="https://httpd.apache.org/docs/2.4/mod/core.html#location"/> for details. 282 + Declarative location config. See <link xlink:href="https://httpd.apache.org/docs/2.4/mod/core.html#location"/> for details. 285 283 ''; 286 284 }; 287 285
+4 -4
nixos/modules/services/web-servers/nginx/default.nix
··· 504 504 This is mutually exclusive to any other config option for 505 505 <filename>nginx.conf</filename> except for 506 506 <itemizedlist> 507 - <listitem><para><xref linkend="opt-services.nginx.appendConfig" /> 507 + <listitem><para><xref linkend="opt-services.nginx.appendConfig"/> 508 508 </para></listitem> 509 - <listitem><para><xref linkend="opt-services.nginx.httpConfig" /> 509 + <listitem><para><xref linkend="opt-services.nginx.httpConfig"/> 510 510 </para></listitem> 511 - <listitem><para><xref linkend="opt-services.nginx.logError" /> 511 + <listitem><para><xref linkend="opt-services.nginx.logError"/> 512 512 </para></listitem> 513 513 </itemizedlist> 514 514 515 515 If additional verbatim config in addition to other options is needed, 516 - <xref linkend="opt-services.nginx.appendConfig" /> should be used instead. 516 + <xref linkend="opt-services.nginx.appendConfig"/> should be used instead. 517 517 ''; 518 518 }; 519 519
+1 -2
nixos/modules/services/web-servers/uwsgi.nix
··· 179 179 <para> 180 180 When in Emperor mode, any capability to be inherited by a vassal must 181 181 be specified again in the vassal configuration using <literal>cap</literal>. 182 - See the uWSGI <link 183 - xlink:href="https://uwsgi-docs.readthedocs.io/en/latest/Capabilities.html">docs</link> 182 + See the uWSGI <link xlink:href="https://uwsgi-docs.readthedocs.io/en/latest/Capabilities.html">docs</link> 184 183 for more information. 185 184 </para> 186 185 </note>
+2 -3
nixos/modules/system/boot/initrd-network.nix
··· 53 53 description = '' 54 54 Add network connectivity support to initrd. The network may be 55 55 configured using the <literal>ip</literal> kernel parameter, 56 - as described in <link 57 - xlink:href="https://www.kernel.org/doc/Documentation/filesystems/nfs/nfsroot.txt">the 58 - kernel documentation</link>. Otherwise, if 56 + as described in <link xlink:href="https://www.kernel.org/doc/Documentation/filesystems/nfs/nfsroot.txt">the kernel documentation</link>. 57 + Otherwise, if 59 58 <option>networking.useDHCP</option> is enabled, an IP address 60 59 is acquired using DHCP. 61 60
+2 -5
nixos/modules/system/boot/networkd.nix
··· 1170 1170 <citerefentry><refentrytitle>systemd.netdev</refentrytitle> 1171 1171 <manvolnum>5</manvolnum></citerefentry> for details. 1172 1172 A detailed explanation about how VRFs work can be found in the 1173 - <link xlink:href="https://www.kernel.org/doc/Documentation/networking/vrf.txt">kernel 1174 - docs</link>. 1173 + <link xlink:href="https://www.kernel.org/doc/Documentation/networking/vrf.txt">kernel docs</link>. 1175 1174 ''; 1176 1175 }; 1177 1176 ··· 1909 1908 Extra command-line arguments to pass to systemd-networkd-wait-online. 1910 1909 These also affect per-interface <literal>systemd-network-wait-online@</literal> services. 1911 1910 1912 - See <link xlink:href="https://www.freedesktop.org/software/systemd/man/systemd-networkd-wait-online.service.html"> 1913 - <citerefentry><refentrytitle>systemd-networkd-wait-online.service</refentrytitle><manvolnum>8</manvolnum> 1914 - </citerefentry></link> for all available options. 1911 + See <link xlink:href="https://www.freedesktop.org/software/systemd/man/systemd-networkd-wait-online.service.html"><citerefentry><refentrytitle>systemd-networkd-wait-online.service</refentrytitle><manvolnum>8</manvolnum></citerefentry></link> for all available options. 1915 1912 ''; 1916 1913 type = with types; listOf str; 1917 1914 default = [];
+1 -2
nixos/modules/system/boot/systemd/logind.nix
··· 31 31 when the user logs out. If true, the scope unit corresponding 32 32 to the session and all processes inside that scope will be 33 33 terminated. If false, the scope is "abandoned" (see 34 - <link xlink:href="https://www.freedesktop.org/software/systemd/man/systemd.scope.html#"> 35 - systemd.scope(5)</link>), and processes are not killed. 34 + <link xlink:href="https://www.freedesktop.org/software/systemd/man/systemd.scope.html#">systemd.scope(5)</link>), and processes are not killed. 36 35 37 36 See <link xlink:href="https://www.freedesktop.org/software/systemd/man/logind.conf.html#KillUserProcesses=">logind.conf(5)</link> 38 37 for more details.
+1 -1
nixos/modules/tasks/network-interfaces.nix
··· 1292 1292 description = '' 1293 1293 Whether to enable IPv6 Privacy Extensions for interfaces not 1294 1294 configured explicitly in 1295 - <xref linkend="opt-networking.interfaces._name_.tempAddress" />. 1295 + <xref linkend="opt-networking.interfaces._name_.tempAddress"/>. 1296 1296 1297 1297 This sets the ipv6.conf.*.use_tempaddr sysctl for all 1298 1298 interfaces. Possible values are: