···123123124124- [Fider](https://fider.io/), an open platform to collect and prioritize feedback. Available as [services.fider](#opt-services.fider.enable).
125125126126+- [PDS](https://github.com/bluesky-social/pds), Personal Data Server for [bsky](https://bsky.social/). Available as [services.pds](option.html#opt-services.pds).
127127+126128- [mqtt-exporter](https://github.com/kpetremann/mqtt-exporter/), a Prometheus exporter for exposing messages from MQTT. Available as [services.prometheus.exporters.mqtt](#opt-services.prometheus.exporters.mqtt.enable).
127129128130- [nvidia-gpu](https://github.com/utkuozdemir/nvidia_gpu_exporter), a Prometheus exporter that scrapes `nvidia-smi` for GPU metrics. Available as [services.prometheus.exporters.nvidia-gpu](#opt-services.prometheus.exporters.nvidia-gpu.enable).
+2-2
nixos/modules/config/ldap.nix
···135135 type = types.lines;
136136 description = ''
137137 Extra configuration options that will be added verbatim at
138138- the end of the nslcd configuration file (`nslcd.conf(5)`).
138138+ the end of the nslcd configuration file ({manpage}`nslcd.conf(5)`).
139139 '';
140140 };
141141···219219 type = types.lines;
220220 description = ''
221221 Extra configuration options that will be added verbatim at
222222- the end of the ldap configuration file (`ldap.conf(5)`).
222222+ the end of the ldap configuration file ({manpage}`ldap.conf(5)`).
223223 If {option}`users.ldap.daemon` is enabled, this
224224 configuration will not be used. In that case, use
225225 {option}`users.ldap.daemon.extraConfig` instead.
+1-1
nixos/modules/config/mysql.nix
···111111 - `0` (or `"plain"`):
112112 No encryption. Passwords are stored in plaintext. HIGHLY DISCOURAGED.
113113 - `1` (or `"Y"`):
114114- Use crypt(3) function.
114114+ Use {manpage}`crypt(3)` function.
115115 - `2` (or `"mysql"`):
116116 Use the MySQL PASSWORD() function. It is possible that the encryption function used
117117 by `pam_mysql` is different from that of the MySQL server, as
+3-3
nixos/modules/config/swap.nix
···4646 If not specified, the amount of data to read from `source` will be
4747 determined by cryptsetup.
48484949- See `cryptsetup-open(8)` for details.
4949+ See `{manpage}`cryptsetup-open(8)`` for details.
5050 '';
5151 };
5252···6060 If not specified, the default sector size is determined from the
6161 underlying block device.
62626363- See `cryptsetup-open(8)` for details.
6363+ See `{manpage}`cryptsetup-open(8)`` for details.
6464 '';
6565 };
6666···158158 whole swap space is discarded at swapon invocation. If "pages",
159159 asynchronous discard on freed pages is performed, before returning to
160160 the available pages pool. With "both", both policies are activated.
161161- See swapon(8) for more information.
161161+ See {manpage}`swapon(8)` for more information.
162162 '';
163163 };
164164
+1-1
nixos/modules/config/users-groups.nix
···204204 homeMode = mkOption {
205205 type = types.strMatching "[0-7]{1,5}";
206206 default = "700";
207207- description = "The user's home directory mode in numeric format. See chmod(1). The mode is only applied if {option}`users.users.<name>.createHome` is true.";
207207+ description = "The user's home directory mode in numeric format. See {manpage}`chmod(1)`. The mode is only applied if {option}`users.users.<name>.createHome` is true.";
208208 };
209209210210 cryptHomeLuks = mkOption {
+1-1
nixos/modules/config/xdg/portals/wlr.nix
···2828 description = ''
2929 Configuration for `xdg-desktop-portal-wlr`.
30303131- See `xdg-desktop-portal-wlr(5)` for supported
3131+ See {manpage}`xdg-desktop-portal-wlr(5)` for supported
3232 values.
3333 '';
3434
···2626 default = { };
2727 description = ''
2828 System-wide configuration for GameMode (/etc/gamemode.ini).
2929- See gamemoded(8) man page for available settings.
2929+ See {manpage}`gamemoded(8)` man page for available settings.
3030 '';
3131 example = lib.literalExpression ''
3232 {
+1-1
nixos/modules/programs/git.nix
···4747 `config` to `[ { foo.x = 42; } { bar.y = 42; }]` will put the `foo`
4848 section before the `bar` section unlike the default alphabetical
4949 order, which can be helpful for sections such as `include` and
5050- `includeIf`. See the CONFIGURATION FILE section of git-config(1) for
5050+ `includeIf`. See the CONFIGURATION FILE section of {manpage}`git-config(1)` for
5151 more information.
5252 '';
5353 };
+3-3
nixos/modules/programs/msmtp.nix
···3434 };
3535 description = ''
3636 Default values applied to all accounts.
3737- See msmtp(1) for the available options.
3737+ See {manpage}`msmtp(1)` for the available options.
3838 '';
3939 };
4040···5252 description = ''
5353 Named accounts and their respective configurations.
5454 The special name "default" allows a default account to be defined.
5555- See msmtp(1) for the available options.
5555+ See {manpage}`msmtp(1)` for the available options.
56565757 Use `programs.msmtp.extraConfig` instead of this attribute set-based
5858 option if ordered account inheritance is needed.
···6868 default = "";
6969 description = ''
7070 Extra lines to add to the msmtp configuration verbatim.
7171- See msmtp(1) for the syntax and available options.
7171+ See {manpage}`msmtp(1)` for the syntax and available options.
7272 '';
7373 };
7474 };
+1-1
nixos/modules/programs/shadow.nix
···3131 description = ''
3232 Config options for the /etc/login.defs file, that defines
3333 the site-specific configuration for the shadow password suite.
3434- See login.defs(5) man page for available options.
3434+ See {manpage}`login.defs(5)` man page for available options.
3535 '';
3636 type = lib.types.submodule {
3737 freeformType = (pkgs.formats.keyValue { }).type;
+1-1
nixos/modules/security/pam.nix
···14831483 the YubiCloud.
1484148414851485 Use "challenge-response" for offline validation using YubiKeys with HMAC-SHA-1
14861486- Challenge-Response configurations. See the man-page ykpamcfg(1) for further
14861486+ Challenge-Response configurations. See the man-page {manpage}`ykpamcfg(1)` for further
14871487 details on how to configure offline Challenge-Response validation.
1488148814891489 More information can be found [here](https://developers.yubico.com/yubico-pam/Authentication_Using_Challenge-Response.html).
+1-1
nixos/modules/security/wrappers/default.nix
···214214 example = "10G";
215215 type = lib.types.str;
216216 description = ''
217217- Size limit for the /run/wrappers tmpfs. Look at mount(8), tmpfs size option,
217217+ Size limit for the /run/wrappers tmpfs. Look at {manpage}`mount(8)`, tmpfs size option,
218218 for the accepted syntax. WARNING: don't set to less than 64MB.
219219 '';
220220 };
+2-2
nixos/modules/services/backup/btrbk.nix
···163163 default = 10;
164164 };
165165 ioSchedulingClass = mkOption {
166166- description = "IO scheduling class for btrbk (see ionice(1) for a quick description). Applies to local instances, and remote ones connecting by ssh if set to idle.";
166166+ description = "IO scheduling class for btrbk (see {manpage}`ionice(1)` for a quick description). Applies to local instances, and remote ones connecting by ssh if set to idle.";
167167 type = types.enum [
168168 "idle"
169169 "best-effort"
···181181 type = types.nullOr types.str;
182182 default = "daily";
183183 description = ''
184184- How often this btrbk instance is started. See systemd.time(7) for more information about the format.
184184+ How often this btrbk instance is started. See {manpage}`systemd.time(7)` for more information about the format.
185185 Setting it to null disables the timer, thus this instance can only be started manually.
186186 '';
187187 };
+1-1
nixos/modules/services/backup/restic.nix
···2323 default = null;
2424 description = ''
2525 file containing the credentials to access the repository, in the
2626- format of an EnvironmentFile as described by systemd.exec(5)
2626+ format of an EnvironmentFile as described by {manpage}`systemd.exec(5)`
2727 '';
2828 };
2929
+4-4
nixos/modules/services/backup/tarsnap.nix
···6060 `"/root/tarsnap.key"`.
61616262 It's recommended for backups that you generate a key for every archive
6363- using `tarsnap-keygen(1)`, and then generate a
6464- write-only tarsnap key using `tarsnap-keymgmt(1)`,
6363+ using {manpage}`tarsnap-keygen(1)`, and then generate a
6464+ write-only tarsnap key using {manpage}`tarsnap-keymgmt(1)`,
6565 and keep your master key(s) for a particular machine off-site.
66666767 The keyfile name should be given as a string and not a path, to
···8686 Use this option if you want to run multiple backups
8787 concurrently - each archive must have a unique key. You can
8888 generate a write-only key derived from your master key (which
8989- is recommended) using `tarsnap-keymgmt(1)`.
8989+ is recommended) using {manpage}`tarsnap-keymgmt(1)`.
90909191 Note: every archive must have an individual master key. You
9292 must generate multiple keys with
9393- `tarsnap-keygen(1)`, and then generate write
9393+ {manpage}`tarsnap-keygen(1)`, and then generate write
9494 only keys from those.
95959696 The keyfile name should be given as a string and not a path, to
+1-1
nixos/modules/services/cluster/k3s/default.nix
···227227 environmentFile = lib.mkOption {
228228 type = lib.types.nullOr lib.types.path;
229229 description = ''
230230- File path containing environment variables for configuring the k3s service in the format of an EnvironmentFile. See systemd.exec(5).
230230+ File path containing environment variables for configuring the k3s service in the format of an EnvironmentFile. See {manpage}`systemd.exec(5)`.
231231 '';
232232 default = null;
233233 };
+1-1
nixos/modules/services/hardware/libinput.nix
···136136 default = null;
137137 example = "1 6 3 4 5 0 7";
138138 description = ''
139139- Sets the logical button mapping for this device, see XSetPointerMapping(3). The string must
139139+ Sets the logical button mapping for this device, see {manpage}`XSetPointerMapping(3)`. The string must
140140 be a space-separated list of button mappings in the order of the logical buttons on the
141141 device, starting with button 1. The default mapping is "1 2 3 ... 32". A mapping of 0 deac‐
142142 tivates the button. Multiple buttons can have the same mapping. Invalid mapping strings are
+2-2
nixos/modules/services/hardware/thinkfan.nix
···249249 ];
250250 description = ''
251251 A list of extra command line arguments to pass to thinkfan.
252252- Check the thinkfan(1) manpage for available arguments.
252252+ Check the {manpage}`thinkfan(1)` manpage for available arguments.
253253 '';
254254 };
255255···259259 description = ''
260260 Thinkfan settings. Use this option to configure thinkfan
261261 settings not exposed in a NixOS option or to bypass one.
262262- Before changing this, read the `thinkfan.conf(5)`
262262+ Before changing this, read the `{manpage}`thinkfan.conf(5)``
263263 manpage and take a look at the example config file at
264264 <https://github.com/vmatare/thinkfan/blob/master/examples/thinkfan.yaml>
265265 '';
+1-1
nixos/modules/services/hardware/upower.nix
···6565 on or off. We can't do much to fix these problems, but this is a way
6666 for users to make the laptop panel vanish, a state that might be used
6767 by a couple of user-space daemons. On Linux systems, see also
6868- logind.conf(5).
6868+ {manpage}`logind.conf(5)`.
6969 '';
7070 };
7171
···6767 ];
6868 description = ''
6969 A list of device nodes to which {command}`esphome` has access to.
7070- Refer to DeviceAllow in systemd.resource-control(5) for more information.
7070+ Refer to DeviceAllow in {manpage}`systemd.resource-control(5)` for more information.
7171 Beware that if a device is referred to by an absolute path instead of a device category,
7272 it will only allow devices that already are plugged in when the service is started.
7373 '';
+3-3
nixos/modules/services/logging/journalwatch.nix
···135135 this patternBlock's {option}`filters` are applied.
136136 If `value` starts and ends with a slash, it is interpreted as
137137 an extended python regular expression, if not, it's an exact match.
138138- The journal fields are explained in systemd.journal-fields(7).
138138+ The journal fields are explained in {manpage}`systemd.journal-fields(7)`.
139139 '';
140140 };
141141···210210 description = ''
211211 How often to run journalwatch.
212212213213- The format is described in systemd.time(7).
213213+ The format is described in {manpage}`systemd.time(7)`.
214214 '';
215215 };
216216 accuracy = lib.mkOption {
···219219 description = ''
220220 The time window around the interval in which the journalwatch run will be scheduled.
221221222222- The format is described in systemd.time(7).
222222+ The format is described in {manpage}`systemd.time(7)`.
223223 '';
224224 };
225225 };
+1-1
nixos/modules/services/logging/syslogd.nix
···7070 type = lib.types.bool;
7171 default = false;
7272 description = ''
7373- Accept logging through UDP. Option -r of syslogd(8).
7373+ Accept logging through UDP. Option -r of {manpage}`syslogd(8)`.
7474 '';
7575 };
7676
+3-3
nixos/modules/services/mail/clamsmtp.nix
···4343 default = "";
4444 example = "X-Virus-Scanned: ClamAV using ClamSMTP";
4545 description = ''
4646- A header to add to scanned messages. See clamsmtpd.conf(5) for
4646+ A header to add to scanned messages. See {manpage}`clamsmtpd.conf(5)` for
4747 more details. Empty means no header.
4848 '';
4949 };
···6565 example = "127.0.0.1:10025";
6666 description = ''
6767 Address to wait for incoming SMTP connections on. See
6868- clamsmtpd.conf(5) for more details.
6868+ {manpage}`clamsmtpd.conf(5)` for more details.
6969 '';
7070 };
7171···118118 default = null;
119119 description = ''
120120 Command to run when a virus is found. Please see VIRUS ACTION in
121121- clamsmtpd(8) for a discussion of this option and its safe use.
121121+ {manpage}`clamsmtpd(8)` for a discussion of this option and its safe use.
122122 '';
123123 };
124124
+3-3
nixos/modules/services/mail/cyrus-imap.nix
···8080 type = int;
8181 default = 32;
8282 description = ''
8383- Socket listen queue backlog size. See listen(2) for more information about a backlog.
8383+ Socket listen queue backlog size. See {manpage}`listen(2)` for more information about a backlog.
8484 Default is 32, which may be increased if you have a very high connection rate.
8585 '';
8686 };
···194194 DAEMON = mkOption {
195195 default = { };
196196 description = ''
197197- This section lists long running daemons to start before any SERVICES are spawned. master(8) will ensure that these processes are running, restarting any process which dies or forks. All listed processes will be shutdown when master(8) is exiting.
197197+ This section lists long running daemons to start before any SERVICES are spawned. {manpage}`master(8)` will ensure that these processes are running, restarting any process which dies or forks. All listed processes will be shutdown when {manpage}`master(8)` is exiting.
198198 '';
199199 };
200200 };
···221221 type = path;
222222 default = "/run/cyrus/lmtp";
223223 description = ''
224224- Unix socket that lmtpd listens on, used by deliver(8). This should match the path specified in cyrus.conf(5).
224224+ Unix socket that lmtpd listens on, used by {manpage}`deliver(8)`. This should match the path specified in {manpage}`cyrus.conf(5)`.
225225 '';
226226 };
227227 idlesocket = mkOption {
+2-2
nixos/modules/services/mail/offlineimap.nix
···3737 onCalendar = lib.mkOption {
3838 type = lib.types.str;
3939 default = "*:0/3"; # every 3 minutes
4040- description = "How often is offlineimap started. Default is '*:0/3' meaning every 3 minutes. See systemd.time(7) for more information about the format.";
4040+ description = "How often is offlineimap started. Default is '*:0/3' meaning every 3 minutes. See {manpage}`systemd.time(7)` for more information about the format.";
4141 };
42424343 timeoutStartSec = lib.mkOption {
4444 type = lib.types.str;
4545 default = "120sec"; # Kill if still alive after 2 minutes
4646- description = "How long waiting for offlineimap before killing it. Default is '120sec' meaning every 2 minutes. See systemd.time(7) for more information about the format.";
4646+ description = "How long waiting for offlineimap before killing it. Default is '120sec' meaning every 2 minutes. See {manpage}`systemd.time(7)` for more information about the format.";
4747 };
4848 };
4949 config = lib.mkIf (cfg.enable || cfg.install) {
+1-1
nixos/modules/services/mail/opendkim.nix
···6565 defaultText = lib.literalExpression ''"csl:''${config.networking.hostName}"'';
6666 example = "csl:example.com,mydomain.net";
6767 description = ''
6868- Local domains set (see `opendkim(8)` for more information on datasets).
6868+ Local domains set (see {manpage}`opendkim(8)` for more information on datasets).
6969 Messages from them are signed, not verified.
7070 '';
7171 };
+4-4
nixos/modules/services/mail/postfix.nix
···546546 type = lib.types.lines;
547547 default = "";
548548 description = ''
549549- Additional entries to put verbatim into aliases file, cf. man-page aliases(8).
549549+ Additional entries to put verbatim into aliases file, cf. man-page {manpage}`aliases(8)`.
550550 '';
551551 };
552552···631631 type = lib.types.lines;
632632 default = "";
633633 description = ''
634634- Entries for the virtual alias map, cf. man-page virtual(5).
634634+ Entries for the virtual alias map, cf. man-page {manpage}`virtual(5)`.
635635 '';
636636 };
637637···654654 List of accepted local users. Specify a bare username, an
655655 `"@domain.tld"` wild-card, or a complete
656656 `"user@domain.tld"` address. If set, these names end
657657- up in the local recipient map -- see the local(8) man-page -- and
657657+ up in the local recipient map -- see the {manpage}`local(8)` man-page -- and
658658 effectively replace the system user database lookup that's otherwise
659659 used by default.
660660 '';
···664664 default = "";
665665 type = lib.types.lines;
666666 description = ''
667667- Entries for the transport map, cf. man-page transport(8).
667667+ Entries for the transport map, cf. man-page {manpage}`transport(8)`.
668668 '';
669669 };
670670
+3-3
nixos/modules/services/mail/postgrey.nix
···119119 greylistAction = mkOption {
120120 type = str;
121121 default = "DEFER_IF_PERMIT";
122122- description = "Response status for greylisted messages (see access(5))";
122122+ description = "Response status for greylisted messages (see {manpage}`access(5)`)";
123123 };
124124 greylistHeader = mkOption {
125125 type = str;
···170170 whitelistClients = mkOption {
171171 type = listOf path;
172172 default = [ ];
173173- description = "Client address whitelist files (see postgrey(8))";
173173+ description = "Client address whitelist files (see {manpage}`postgrey(8)`)";
174174 };
175175 whitelistRecipients = mkOption {
176176 type = listOf path;
177177 default = [ ];
178178- description = "Recipient address whitelist files (see postgrey(8))";
178178+ description = "Recipient address whitelist files (see {manpage}`postgrey(8)`)";
179179 };
180180 };
181181 };
+1-1
nixos/modules/services/misc/autofs.nix
···4949 '''
5050 '';
5151 description = ''
5252- Contents of `/etc/auto.master` file. See {command}`auto.master(5)` and {command}`autofs(5)`.
5252+ Contents of `/etc/auto.master` file. See {manpage}`auto.master(5)` and {manpage}`autofs(5)`.
5353 '';
5454 };
5555
+1-1
nixos/modules/services/misc/gpsd.nix
···105105 ];
106106 description = ''
107107 A list of extra command line arguments to pass to gpsd.
108108- Check gpsd(8) mangpage for possible arguments.
108108+ Check {manpage}`gpsd(8)` mangpage for possible arguments.
109109 '';
110110 };
111111
···5454 default = null;
5555 description = ''
5656 File containing the credentials to access the repository, in the
5757- format of an EnvironmentFile as described by systemd.exec(5)
5757+ format of an EnvironmentFile as described by {manpage}`systemd.exec(5)`
5858 '';
5959 };
6060
···7373 });
7474 description = ''
7575 This cell's database server records, added to the global
7676- CellServDB. See CellServDB(5) man page for syntax. Ignored when
7676+ CellServDB. See {manpage}`CellServDB(5)` man page for syntax. Ignored when
7777 `afsdb` is set to `true`.
7878 '';
7979 example = [
···117117 advertisedAddresses = mkOption {
118118 type = types.listOf types.str;
119119 default = [ ];
120120- description = "List of IP addresses this server is advertised under. See NetInfo(5)";
120120+ description = "List of IP addresses this server is advertised under. See {manpage}`NetInfo(5)`";
121121 };
122122123123 cellName = mkOption {
+2-2
nixos/modules/services/networking/cgit.nix
···146146 };
147147148148 repos = lib.mkOption {
149149- description = "cgit repository settings, see cgitrc(5)";
149149+ description = "cgit repository settings, see {manpage}`cgitrc(5)`";
150150 type = with lib.types; attrsOf (attrsOf settingType);
151151 default = { };
152152 example = {
···165165 };
166166167167 settings = lib.mkOption {
168168- description = "cgit configuration, see cgitrc(5)";
168168+ description = "cgit configuration, see {manpage}`cgitrc(5)`";
169169 type = lib.types.attrsOf repeatedSettingType;
170170 default = { };
171171 example = lib.literalExpression ''
···194194 will be symlinked to the location given here.
195195 This file must exist and be
196196 readable only by the `uucp` user.
197197- See hosts.hfaxd(5) for details.
197197+ See {manpage}`hosts.hfaxd(5)` for details.
198198 This configuration permits access for all users:
199199 ```
200200 environment.etc."hosts.hfaxd" = {
···299299 description = ''
300300 purging old files from the spooling area with
301301 {file}`faxcron` with the given frequency
302302- (see systemd.time(7))
302302+ (see {manpage}`systemd.time(7)`)
303303 '';
304304 };
305305 faxcron.infoDays = mkOption {
···339339 description = ''
340340 Purge old files from the spooling area with
341341 {file}`faxcron` with the given frequency
342342- (see systemd.time(7)).
342342+ (see {manpage}`systemd.time(7)`).
343343 '';
344344 };
345345 faxqclean.archiving = mkOption {
···356356 `as-flagged` archives jobs that
357357 have been flagged for archiving by sendfax,
358358 `always` forces archiving of all jobs.
359359- See also sendfax(1) and faxqclean(8).
359359+ See also {manpage}`sendfax(1)` and {manpage}`faxqclean(8)`.
360360 '';
361361 };
362362 faxqclean.doneqMinutes = mkOption {
···2929 enable = mkEnableOption "the ngircd IRC server";
30303131 config = mkOption {
3232- description = "The ngircd configuration (see ngircd.conf(5)).";
3232+ description = "The ngircd configuration (see {manpage}`ngircd.conf(5)`).";
33333434 type = types.lines;
3535 };
+1-1
nixos/modules/services/networking/ntopng.nix
···5858 interfaces and displays its findings at http://localhost:''${toString
5959 config.${opt.http-port}}. Default username and password is admin/admin.
60606161- See the ntopng(8) manual page and http://www.ntop.org/products/ntop/
6161+ See the {manpage}`ntopng(8)` manual page and http://www.ntop.org/products/ntop/
6262 for more info.
63636464 Note that enabling ntopng will also enable redis (key-value
+1-1
nixos/modules/services/networking/pppd.nix
···5353 config = mkOption {
5454 type = types.lines;
5555 default = "";
5656- description = "pppd configuration for this peer, see the pppd(8) man page.";
5656+ description = "pppd configuration for this peer, see the {manpage}`pppd(8)` man page.";
5757 };
5858 };
5959 }
+1-1
nixos/modules/services/networking/privoxy.nix
···114114 the disk usage, since Privoxy itself never deletes the certificates.
115115116116 ::: {.note}
117117- The format is that of the `tmpfiles.d(5)`
117117+ The format is that of the {manpage}`tmpfiles.d(5)`
118118 Age parameter.
119119 :::
120120 '';
+1-1
nixos/modules/services/networking/r53-ddns.nix
···4545 type = types.str;
4646 description = ''
4747 File containing the AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY
4848- in the format of an EnvironmentFile as described by systemd.exec(5)
4848+ in the format of an EnvironmentFile as described by {manpage}`systemd.exec(5)`
4949 '';
5050 };
5151
···1313 extraFlags = mkOption {
1414 type = types.listOf types.str;
1515 default = [];
1616- description = ''Extra flags passed to the {command}`robustirc-bridge` command. See [RobustIRC Documentation](https://robustirc.net/docs/adminguide.html#_bridge) or robustirc-bridge(1) for details.'';
1616+ description = ''Extra flags passed to the {command}`robustirc-bridge` command. See [RobustIRC Documentation](https://robustirc.net/docs/adminguide.html#_bridge) or {manpage}`robustirc-bridge(1)` for details.'';
1717 example = [
1818 "-network robustirc.net"
1919 ];
+1-1
nixos/modules/services/networking/rpcbind.nix
···1616 description = ''
1717 Whether to enable `rpcbind`, an ONC RPC directory service
1818 notably used by NFS and NIS, and which can be queried
1919- using the rpcinfo(1) command. `rpcbind` is a replacement for
1919+ using the {manpage}`rpcinfo(1)` command. `rpcbind` is a replacement for
2020 `portmap`.
2121 '';
2222 };
+1-1
nixos/modules/services/networking/searx.nix
···5656 type = types.nullOr types.path;
5757 default = null;
5858 description = ''
5959- Environment file (see `systemd.exec(5)`
5959+ Environment file (see {manpage}`systemd.exec(5)`
6060 "EnvironmentFile=" section for the syntax) to define variables for
6161 Searx. This option can be used to safely include secret keys into the
6262 Searx configuration.
+1-1
nixos/modules/services/networking/spacecookie.nix
···5353 description = ''
5454 Address to listen on. Must be in the
5555 `ListenStream=` syntax of
5656- [systemd.socket(5)](https://www.freedesktop.org/software/systemd/man/systemd.socket.html).
5656+ {manpage}`systemd.socket(5)`.
5757 '';
5858 };
5959
+2-2
nixos/modules/services/networking/ssh/sshd.nix
···357357 type = lib.types.nullOr (lib.types.enum [ "QUIET" "FATAL" "ERROR" "INFO" "VERBOSE" "DEBUG" "DEBUG1" "DEBUG2" "DEBUG3" ]);
358358 default = "INFO"; # upstream default
359359 description = ''
360360- Gives the verbosity level that is used when logging messages from sshd(8). Logging with a DEBUG level
360360+ Gives the verbosity level that is used when logging messages from {manpage}`sshd(8)`. Logging with a DEBUG level
361361 violates the privacy of users and is not recommended.
362362 '';
363363 };
···369369 # apply if cfg.useDns then "yes" else "no"
370370 default = false;
371371 description = ''
372372- Specifies whether sshd(8) should look up the remote host name, and to check that the resolved host name for
372372+ Specifies whether {manpage}`sshd(8)` should look up the remote host name, and to check that the resolved host name for
373373 the remote IP address maps back to the very same IP address.
374374 If this option is set to no (the default) then only addresses and not host names may be used in
375375 ~/.ssh/authorized_keys from and sshd_config Match Host directives.
+1-1
nixos/modules/services/networking/tinydns.nix
···1616 data = mkOption {
1717 type = types.lines;
1818 default = "";
1919- description = "The DNS data to serve, in the format described by tinydns-data(8)";
1919+ description = "The DNS data to serve, in the format described by {manpage}`tinydns-data(8)`";
2020 };
21212222 ip = mkOption {
+3-3
nixos/modules/services/security/clamav.nix
···5353 type = lib.types.str;
5454 default = "hourly";
5555 description = ''
5656- How often freshclam is invoked. See systemd.time(7) for more
5656+ How often freshclam is invoked. See {manpage}`systemd.time(7)` for more
5757 information about the format.
5858 '';
5959 };
···7474 type = lib.types.str;
7575 default = "hourly";
7676 description = ''
7777- How often freshclam is invoked. See systemd.time(7) for more
7777+ How often freshclam is invoked. See {manpage}`systemd.time(7)` for more
7878 information about the format.
7979 '';
8080 };
···105105 type = lib.types.str;
106106 default = "*-*-* 04:00:00";
107107 description = ''
108108- How often clamdscan is invoked. See systemd.time(7) for more
108108+ How often clamdscan is invoked. See {manpage}`systemd.time(7)` for more
109109 information about the format.
110110 By default this runs using 10 cores at most, be sure to run it at a time of low traffic.
111111 '';
+1-1
nixos/modules/services/torrent/transmission.nix
···181181 defaultText = literalExpression "if cfg.package == pkgs.transmission_3 then 18 else \"022\"";
182182 description = ''
183183 Sets transmission's file mode creation mask.
184184- See the umask(2) manpage for more information.
184184+ See the {manpage}`umask(2)` manpage for more information.
185185 Users who want their saved torrents to be world-writable
186186 may want to set this value to 0/`"000"`.
187187
+8-8
nixos/modules/services/web-apps/cloudlog.nix
···173173 type = str;
174174 default = "daily";
175175 description = ''
176176- Specification (in the format described by systemd.time(7)) of the
176176+ Specification (in the format described by {manpage}`systemd.time(7)`) of the
177177 time at which the LoTW upload will occur.
178178 '';
179179 };
···191191 type = str;
192192 default = "daily";
193193 description = ''
194194- Specification (in the format described by systemd.time(7)) of the time
194194+ Specification (in the format described by {manpage}`systemd.time(7)`) of the time
195195 at which the Clublog upload will occur.
196196 '';
197197 };
···210210 type = str;
211211 default = "weekly";
212212 description = ''
213213- Specification (in the format described by systemd.time(7)) of the
213213+ Specification (in the format described by {manpage}`systemd.time(7)`) of the
214214 time at which the LoTW user update will occur.
215215 '';
216216 };
···228228 type = str;
229229 default = "monthly";
230230 description = ''
231231- Specification (in the format described by systemd.time(7)) of the
231231+ Specification (in the format described by {manpage}`systemd.time(7)`) of the
232232 time at which the DOK update will occur.
233233 '';
234234 };
···247247 type = str;
248248 default = "monthly";
249249 description = ''
250250- Specification (in the format described by systemd.time(7)) of the time
250250+ Specification (in the format described by {manpage}`systemd.time(7)`) of the time
251251 at which the Clublog SCP update will occur.
252252 '';
253253 };
···266266 type = str;
267267 default = "monthly";
268268 description = ''
269269- Specification (in the format described by systemd.time(7)) of the time
269269+ Specification (in the format described by {manpage}`systemd.time(7)`) of the time
270270 at which the WWFF update will occur.
271271 '';
272272 };
···284284 type = str;
285285 default = "daily";
286286 description = ''
287287- Specification (in the format described by systemd.time(7)) of the
287287+ Specification (in the format described by {manpage}`systemd.time(7)`) of the
288288 time at which the QRZ upload will occur.
289289 '';
290290 };
···302302 type = str;
303303 default = "monthly";
304304 description = ''
305305- Specification (in the format described by systemd.time(7)) of the time
305305+ Specification (in the format described by {manpage}`systemd.time(7)`) of the time
306306 at which the SOTA update will occur.
307307 '';
308308 };
+1-1
nixos/modules/services/web-apps/dex.nix
···5151 type = types.nullOr types.path;
5252 default = null;
5353 description = ''
5454- Environment file (see `systemd.exec(5)`
5454+ Environment file (see {manpage}`systemd.exec(5)`
5555 "EnvironmentFile=" section for the syntax) to define variables for dex.
5656 This option can be used to safely include secret keys into the dex configuration.
5757 '';
+1-1
nixos/modules/services/web-apps/gotosocial.nix
···8080 type = lib.types.nullOr lib.types.path;
8181 description = ''
8282 File path containing environment variables for configuring the GoToSocial service
8383- in the format of an EnvironmentFile as described by systemd.exec(5).
8383+ in the format of an EnvironmentFile as described by {manpage}`systemd.exec(5)`.
84848585 This option could be used to pass sensitive configuration to the GoToSocial daemon.
8686
+1-1
nixos/modules/services/web-apps/miniflux.nix
···7272 description = ''
7373 File containing the ADMIN_USERNAME and
7474 ADMIN_PASSWORD (length >= 6) in the format of
7575- an EnvironmentFile=, as described by systemd.exec(5).
7575+ an EnvironmentFile=, as described by {manpage}`systemd.exec(5)`.
7676 '';
7777 example = "/etc/nixos/miniflux-admin-credentials";
7878 };
···3030 inherit (format) type;
3131 default = { };
3232 description = ''
3333- Merecat configuration. Refer to merecat(8) for details on supported values.
3333+ Merecat configuration. Refer to {manpage}`merecat(8)` for details on supported values.
3434 '';
3535 example = {
3636 hostname = "localhost";
+1-1
nixos/modules/services/web-servers/minio.nix
···7272 description = ''
7373 File containing the MINIO_ROOT_USER, default is "minioadmin", and
7474 MINIO_ROOT_PASSWORD (length >= 8), default is "minioadmin"; in the format of
7575- an EnvironmentFile=, as described by systemd.exec(5).
7575+ an EnvironmentFile=, as described by {manpage}`systemd.exec(5)`.
7676 '';
7777 example = "/etc/nixos/minio-root-credentials";
7878 };
+1-1
nixos/modules/services/web-servers/pomerium.nix
···5050 default = null;
5151 description = ''
5252 Path to file containing secrets for Pomerium, in systemd
5353- EnvironmentFile format. See the systemd.exec(5) man page.
5353+ EnvironmentFile format. See the {manpage}`systemd.exec(5)` man page.
5454 '';
5555 };
5656 };
+1-1
nixos/modules/services/web-servers/uwsgi.nix
···200200 '';
201201 description = ''
202202 Grant capabilities to the uWSGI instance. See the
203203- `capabilities(7)` for available values.
203203+ {manpage}`capabilities(7)` for available values.
204204205205 ::: {.note}
206206 uWSGI runs as an unprivileged user (even as Emperor) with the minimal
···2727 which allows users to start X manually via the "startx" command
2828 from a vt shell. The X server runs under the user's id, not as root.
2929 The user must provide a ~/.xinitrc file containing session startup
3030- commands, see startx(1). This is not automatically generated
3030+ commands, see {manpage}`startx(1)`. This is not automatically generated
3131 from the desktopManager and windowManager settings.
3232 '';
3333 };
···1818 to start manually via the "sx" command from a vt shell. The X server
1919 runs under the user's id, not as root. The user must provide a
2020 ~/.config/sx/sxrc file containing session startup commands, see
2121- sx(1). This is not automatically generated from the desktopManager
2121+ {manpage}`sx(1)`. This is not automatically generated from the desktopManager
2222 and windowManager settings. sx doesn't have a way to directly set
2323 X server flags, but it can be done by overriding its xorgserver
2424 dependency.
+3-3
nixos/modules/services/x11/picom.nix
···126126 ];
127127 description = ''
128128 List of conditions of windows that should not be faded.
129129- See `picom(1)` man page for more examples.
129129+ See {manpage}`picom(1)` man page for more examples.
130130 '';
131131 };
132132···172172 ];
173173 description = ''
174174 List of conditions of windows that should have no shadow.
175175- See `picom(1)` man page for more examples.
175175+ See {manpage}`picom(1)` man page for more examples.
176176 '';
177177 };
178178···326326 description = ''
327327 Picom settings. Use this option to configure Picom settings not exposed
328328 in a NixOS option or to bypass one. For the available options see the
329329- CONFIGURATION FILES section at `picom(1)`.
329329+ CONFIGURATION FILES section at {manpage}`picom(1)`.
330330 '';
331331 };
332332 };
···203203 type = types.nullOr types.path;
204204 visible = false;
205205 description = ''
206206- The env(1) executable that is linked system-wide to
206206+ The {manpage}`env(1)` executable that is linked system-wide to
207207 `/usr/bin/env`.
208208 '';
209209 };
+1-1
nixos/modules/system/boot/systemd/coredump.nix
···2929 type = types.lines;
3030 example = "Storage=journal";
3131 description = ''
3232- Extra config options for systemd-coredump. See coredump.conf(5) man page
3232+ Extra config options for systemd-coredump. See {manpage}`coredump.conf(5)` man page
3333 for available options.
3434 '';
3535 };
+1-1
nixos/modules/system/boot/systemd/initrd.nix
···163163 type = types.lines;
164164 example = "DefaultLimitCORE=infinity";
165165 description = ''
166166- Extra config options for systemd. See systemd-system.conf(5) man page
166166+ Extra config options for systemd. See {manpage}`systemd-system.conf(5)` man page
167167 for available options.
168168 '';
169169 };
+1-1
nixos/modules/system/boot/systemd/logind.nix
···2929 example = "IdleAction=lock";
3030 description = ''
3131 Extra config options for systemd-logind.
3232- See [logind.conf(5)](https://www.freedesktop.org/software/systemd/man/logind.conf.html)
3232+ See {manpage}`logind.conf(5)`
3333 for available options.
3434 '';
3535 };
+2-2
nixos/modules/system/boot/timesyncd.nix
···2828 `timesyncd.conf` file as opposed to setting this option to null which
2929 will remove `NTP=` entirely.
30303131- See man:timesyncd.conf(5) for details.
3131+ See {manpage}`timesyncd.conf(5)` for details.
3232 '';
3333 };
3434 fallbackServers = mkOption {
···4242 `timesyncd.conf` file as opposed to setting this option to null which
4343 will remove `FallbackNTP=` entirely.
44444545- See man:timesyncd.conf(5) for details.
4545+ See {manpage}`timesyncd.conf(5)` for details.
4646 '';
4747 };
4848 extraConfig = mkOption {
+1-1
nixos/modules/tasks/filesystems/nfs.nix
···9999 default = { };
100100 description = ''
101101 General configuration for NFS daemons and tools.
102102- See nfs.conf(5) and related man pages for details.
102102+ See {manpage}`nfs.conf(5)` and related man pages for details.
103103 '';
104104 example = lib.literalExpression ''
105105 {
+2-2
nixos/modules/tasks/network-interfaces.nix
···9797 default = null;
9898 description = ''
9999 Type of the route. See the `Route types` section
100100- in the `ip-route(8)` manual page for the details.
100100+ in the {manpage}`ip-route(8)` manual page for the details.
101101102102 Note that `prohibit`, `blackhole`,
103103 `unreachable`, and `throw` cannot
···118118 example = { mtu = "1492"; window = "524288"; };
119119 description = ''
120120 Other route options. See the symbol `OPTIONS`
121121- in the `ip-route(8)` manual page for the details.
121121+ in the {manpage}`ip-route(8)` manual page for the details.
122122 You may also specify `metric`,
123123 `src`, `protocol`,
124124 `scope`, `from`
+1-1
nixos/modules/virtualisation/docker.nix
···3434 default = ["/run/docker.sock"];
3535 description = ''
3636 A list of unix and tcp docker should listen to. The format follows
3737- ListenStream as described in systemd.socket(5).
3737+ ListenStream as described in {manpage}`systemd.socket(5)`.
3838 '';
3939 };
4040
+5-5
nixos/modules/virtualisation/nixos-containers.nix
···349349 Device node access modifier. Takes a combination
350350 `r` (read), `w` (write), and
351351 `m` (mknod). See the
352352- `systemd.resource-control(5)` man page for more
352352+ {manpage}`systemd.resource-control(5)` man page for more
353353 information.'';
354354 };
355355 };
···563563 example = [ "CAP_NET_ADMIN" "CAP_MKNOD" ];
564564 description = ''
565565 Grant additional capabilities to the container. See the
566566- capabilities(7) and systemd-nspawn(1) man pages for more
566566+ {manpage}`capabilities(7)` and {manpage}`systemd-nspawn(1)` man pages for more
567567 information.
568568 '';
569569 };
···644644 shall run in. The specified path should refer to a (possibly bind-mounted) network
645645 namespace file, as exposed by the kernel below /proc/<PID>/ns/net. This makes the
646646 container enter the given network namespace. One of the typical use cases is to give
647647- a network namespace under /run/netns created by ip-netns(8).
647647+ a network namespace under /run/netns created by {manpage}`ip-netns(8)`.
648648 Note that this option cannot be used together with other network-related options,
649649 such as --private-network or --network-interface=.
650650 '';
···737737 Mounts a set of tmpfs file systems into the container.
738738 Multiple paths can be specified.
739739 Valid items must conform to the --tmpfs argument
740740- of systemd-nspawn. See systemd-nspawn(1) for details.
740740+ of systemd-nspawn. See {manpage}`systemd-nspawn(1)` for details.
741741 '';
742742 };
743743···747747 example = [ "--drop-capability=CAP_SYS_CHROOT" ];
748748 description = ''
749749 Extra flags passed to the systemd-nspawn command.
750750- See systemd-nspawn(1) for details.
750750+ See {manpage}`systemd-nspawn(1)` for details.
751751 '';
752752 };
753753
+1-1
nixos/modules/virtualisation/oci-containers.nix
···155155 [Docker engine documentation](https://docs.docker.com/engine/logging/configure/)
156156157157 For Podman:
158158- Refer to the docker-run(1) man page.
158158+ Refer to the {manpage}`docker-run(1)` man page.
159159 '';
160160 };
161161
+1-1
nixos/modules/virtualisation/waagent.nix
···151151 ];
152152 description = ''
153153 This option specifies disk mount options to be passed to the `mount -o` command.
154154- For more information, see the `mount(8)` manual page.
154154+ For more information, see the {manpage}`mount(8)` manual page.
155155 '';
156156 };
157157
···1515 version = "1.3.2";
16161717 configureFlags = [
1818+ # This is to add "#include" directives for stdlib.h, stdio.h and string.h.
1919+ "ac_cv_header_stdc=yes"
2020+1821 "--with-checksum=${checksumType}"
1922 ];
2023