···35353636 networking.hostFiles = lib.mkOption {
3737 type = types.listOf types.path;
3838- defaultText = literalDocBook "Hosts from <option>networking.hosts</option> and <option>networking.extraHosts</option>";
3838+ defaultText = literalMD "Hosts from {option}`networking.hosts` and {option}`networking.extraHosts`";
3939 example = literalExpression ''[ "''${pkgs.my-blocklist-package}/share/my-blocklist/hosts" ]'';
4040 description = lib.mdDoc ''
4141 Files that should be concatenated together to form {file}`/etc/hosts`.
+4-3
nixos/modules/config/system-path.nix
···7878 defaultPackages = mkOption {
7979 type = types.listOf types.package;
8080 default = defaultPackages;
8181- defaultText = literalDocBook ''
8282- these packages, with their <literal>meta.priority</literal> numerically increased
8181+ defaultText = literalMD ''
8282+ these packages, with their `meta.priority` numerically increased
8383 (thus lowering their installation priority):
8484- <programlisting>${defaultPackagesText}</programlisting>
8484+8585+ ${defaultPackagesText}
8586 '';
8687 example = [];
8788 description = lib.mdDoc ''
···7171 type = types.nullOr (types.enum pkgs.pinentry.flavors);
7272 example = "gnome3";
7373 default = defaultPinentryFlavor;
7474- defaultText = literalDocBook ''matching the configured desktop environment'';
7474+ defaultText = literalMD ''matching the configured desktop environment'';
7575 description = lib.mdDoc ''
7676 Which pinentry interface to use. If not null, the path to the
7777 pinentry binary will be passed to gpg-agent via commandline and
+2-2
nixos/modules/services/audio/mpdscribble.nix
···128128 mpdCfg.credentials).passwordFile
129129 else
130130 null;
131131- defaultText = literalDocBook ''
131131+ defaultText = literalMD ''
132132 The first password file with read access configured for MPD when using a local instance,
133133- otherwise <literal>null</literal>.
133133+ otherwise `null`.
134134 '';
135135 type = types.nullOr types.str;
136136 description = lib.mdDoc ''
···4040 key = mkOption {
4141 description = lib.mdDoc "Key of taint.";
4242 default = name;
4343- defaultText = literalDocBook "Name of this submodule.";
4343+ defaultText = literalMD "Name of this submodule.";
4444 type = str;
4545 };
4646 value = mkOption {
+2-2
nixos/modules/services/computing/slurm/slurm.nix
···281281 type = types.path;
282282 internal = true;
283283 default = etcSlurm;
284284- defaultText = literalDocBook ''
284284+ defaultText = literalMD ''
285285 Directory created from generated config files and
286286- <literal>config.${opt.extraConfigPaths}</literal>.
286286+ `config.${opt.extraConfigPaths}`.
287287 '';
288288 description = ''
289289 Path to directory with slurm config files. This option is set by default from the
···417417 checkReversePath = mkOption {
418418 type = types.either types.bool (types.enum ["strict" "loose"]);
419419 default = kernelHasRPFilter;
420420- defaultText = literalDocBook "<literal>true</literal> if supported by the chosen kernel";
420420+ defaultText = literalMD "`true` if supported by the chosen kernel";
421421 example = "loose";
422422 description =
423423 lib.mdDoc ''
+1-1
nixos/modules/services/networking/nftables.nix
···8888 name = "nftables-rules";
8989 text = cfg.ruleset;
9090 };
9191- defaultText = literalDocBook ''a file with the contents of <option>networking.nftables.ruleset</option>'';
9191+ defaultText = literalMD ''a file with the contents of {option}`networking.nftables.ruleset`'';
9292 description =
9393 lib.mdDoc ''
9494 The ruleset file to be used with nftables. Should be in a format that
+1-1
nixos/modules/services/networking/xrdp.nix
···100100 confDir = mkOption {
101101 type = types.path;
102102 default = confDir;
103103- defaultText = literalDocBook "generated from configuration";
103103+ defaultText = literalMD "generated from configuration";
104104 description = lib.mdDoc "The location of the config files for xrdp.";
105105 };
106106 };
+3-3
nixos/modules/services/web-apps/discourse.nix
···100100 enableACME = lib.mkOption {
101101 type = lib.types.bool;
102102 default = cfg.sslCertificate == null && cfg.sslCertificateKey == null;
103103- defaultText = lib.literalDocBook ''
104104- <literal>true</literal>, unless <option>services.discourse.sslCertificate</option>
105105- and <option>services.discourse.sslCertificateKey</option> are set.
103103+ defaultText = lib.literalMD ''
104104+ `true`, unless {option}`services.discourse.sslCertificate`
105105+ and {option}`services.discourse.sslCertificateKey` are set.
106106 '';
107107 description = lib.mdDoc ''
108108 Whether an ACME certificate should be used to secure
+2-2
nixos/modules/services/web-apps/keycloak.nix
···2020 mkDefault
2121 literalExpression
2222 isAttrs
2323- literalDocBook
2323+ literalMD
2424 maintainers
2525 catAttrs
2626 collect
···165165 mkOption {
166166 type = port;
167167 default = dbPorts.${cfg.database.type};
168168- defaultText = literalDocBook "default port of selected database";
168168+ defaultText = literalMD "default port of selected database";
169169 description = lib.mdDoc ''
170170 Port of the database to connect to.
171171 '';
+1-1
nixos/modules/services/web-apps/nextcloud.nix
···527527 occ = mkOption {
528528 type = types.package;
529529 default = occ;
530530- defaultText = literalDocBook "generated script";
530530+ defaultText = literalMD "generated script";
531531 internal = true;
532532 description = ''
533533 The nextcloud-occ program preconfigured to target this Nextcloud instance.
···611611 then "zstd"
612612 else "gzip"
613613 );
614614- defaultText = literalDocBook "<literal>zstd</literal> if the kernel supports it (5.9+), <literal>gzip</literal> if not";
614614+ defaultText = literalMD "`zstd` if the kernel supports it (5.9+), `gzip` if not";
615615 type = types.either types.str (types.functionTo types.str);
616616 description = ''
617617 The compressor to use on the initrd image. May be any of:
+1-1
nixos/modules/tasks/filesystems/zfs.nix
···209209 readOnly = true;
210210 type = types.bool;
211211 default = inInitrd || inSystem;
212212- defaultText = literalDocBook "<literal>true</literal> if ZFS filesystem support is enabled";
212212+ defaultText = literalMD "`true` if ZFS filesystem support is enabled";
213213 description = lib.mdDoc "True if ZFS filesystem support is enabled";
214214 };
215215