Manual: Explicitly mark commands that require to be run as root (#15589)

* manual: Mark commands that require root

Mark every command that requires to be run as root by prefixing them
with '#' instead of '$'.

* manual: Add note about commands that require root

authored by Wilhelm Schuster and committed by Domen Kožar 5f8d1454 f5471374

+101 -98
+2 -2
nixos/doc/manual/administration/cleaning-store.xml
··· 21 21 background: 22 22 23 23 <screen> 24 - $ systemctl start nix-gc.service 24 + # systemctl start nix-gc.service 25 25 </screen> 26 26 27 27 You can tell NixOS in <filename>configuration.nix</filename> to run ··· 59 59 Since this command needs to read the entire Nix store, it can take 60 60 quite a while to finish.</para> 61 61 62 - </chapter> 62 + </chapter>
+2 -2
nixos/doc/manual/administration/container-networking.xml
··· 13 13 address as follows: 14 14 15 15 <screen> 16 - $ nixos-container show-ip foo 16 + # nixos-container show-ip foo 17 17 10.233.4.2 18 18 19 19 $ ping -c1 10.233.4.2 ··· 47 47 external interface. Note that <literal>ve-+</literal> is a wildcard 48 48 that matches all container interfaces.</para> 49 49 50 - </section> 50 + </section>
+12 -12
nixos/doc/manual/administration/imperative-containers.xml
··· 11 11 identifier <literal>foo</literal> as follows: 12 12 13 13 <screen> 14 - $ nixos-container create foo 14 + # nixos-container create foo 15 15 </screen> 16 16 17 17 This creates the container’s root directory in ··· 25 25 <literal>root</literal>: 26 26 27 27 <screen> 28 - $ nixos-container create foo --config 'services.openssh.enable = true; \ 28 + # nixos-container create foo --config 'services.openssh.enable = true; \ 29 29 users.extraUsers.root.openssh.authorizedKeys.keys = ["ssh-dss AAAAB3N…"];' 30 30 </screen> 31 31 ··· 35 35 run: 36 36 37 37 <screen> 38 - $ nixos-container start foo 38 + # nixos-container start foo 39 39 </screen> 40 40 41 41 This command will return as soon as the container has booted and has ··· 46 46 <command>systemctl</command>: 47 47 48 48 <screen> 49 - $ systemctl status container@foo 49 + # systemctl status container@foo 50 50 </screen> 51 51 52 52 </para> ··· 55 55 root using the <command>root-login</command> operation: 56 56 57 57 <screen> 58 - $ nixos-container root-login foo 58 + # nixos-container root-login foo 59 59 [root@foo:~]# 60 60 </screen> 61 61 ··· 65 65 the host: 66 66 67 67 <screen> 68 - $ nixos-container login foo 68 + # nixos-container login foo 69 69 foo login: alice 70 70 Password: *** 71 71 </screen> ··· 74 74 commands in the container: 75 75 76 76 <screen> 77 - $ nixos-container run foo -- uname -a 77 + # nixos-container run foo -- uname -a 78 78 Linux foo 3.4.82 #1-NixOS SMP Thu Mar 20 14:44:05 UTC 2014 x86_64 GNU/Linux 79 79 </screen> 80 80 ··· 86 86 and run 87 87 88 88 <screen> 89 - $ nixos-container update foo 89 + # nixos-container update foo 90 90 </screen> 91 91 92 92 This will build and activate the new configuration. You can also 93 93 specify a new configuration on the command line: 94 94 95 95 <screen> 96 - $ nixos-container update foo --config 'services.httpd.enable = true; \ 96 + # nixos-container update foo --config 'services.httpd.enable = true; \ 97 97 services.httpd.adminAddr = "foo@example.org";' 98 98 99 - $ curl http://$(nixos-container show-ip foo)/ 99 + # curl http://$(nixos-container show-ip foo)/ 100 100 &lt;!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">… 101 101 </screen> 102 102 ··· 116 116 destroy a container, including its file system, do 117 117 118 118 <screen> 119 - $ nixos-container destroy foo 119 + # nixos-container destroy foo 120 120 </screen> 121 121 122 122 </para> 123 123 124 - </section> 124 + </section>
+2 -2
nixos/doc/manual/administration/maintenance-mode.xml
··· 9 9 <para>You can enter rescue mode by running: 10 10 11 11 <screen> 12 - $ systemctl rescue</screen> 12 + # systemctl rescue</screen> 13 13 14 14 This will eventually give you a single-user root shell. Systemd will 15 15 stop (almost) all system services. To get out of maintenance mode, 16 16 just exit from the rescue shell.</para> 17 17 18 - </section> 18 + </section>
+2 -2
nixos/doc/manual/administration/network-problems.xml
··· 18 18 use-binary-caches false</option>, e.g. 19 19 20 20 <screen> 21 - $ nixos-rebuild switch --option use-binary-caches false 21 + # nixos-rebuild switch --option use-binary-caches false 22 22 </screen> 23 23 24 24 If you have an alternative binary cache at your disposal, you can use 25 25 it instead: 26 26 27 27 <screen> 28 - $ nixos-rebuild switch --option binary-caches http://my-cache.example.org/ 28 + # nixos-rebuild switch --option binary-caches http://my-cache.example.org/ 29 29 </screen> 30 30 31 31 </para>
+4 -4
nixos/doc/manual/administration/rebooting.xml
··· 10 10 doing: 11 11 12 12 <screen> 13 - $ shutdown 13 + # shutdown 14 14 </screen> 15 15 16 16 This is equivalent to running <command>systemctl ··· 19 19 <para>To reboot the system, run 20 20 21 21 <screen> 22 - $ reboot 22 + # reboot 23 23 </screen> 24 24 25 25 which is equivalent to <command>systemctl reboot</command>. ··· 28 28 the new kernel into memory: 29 29 30 30 <screen> 31 - $ systemctl kexec 31 + # systemctl kexec 32 32 </screen> 33 33 34 34 </para> ··· 41 41 i.e. on a virtual console or in X11; otherwise, the user is asked for 42 42 authentication.</para> 43 43 44 - </chapter> 44 + </chapter>
+4 -4
nixos/doc/manual/administration/rollback.xml
··· 19 19 configuration the default for subsequent boots: 20 20 21 21 <screen> 22 - $ /run/current-system/bin/switch-to-configuration boot</screen> 22 + # /run/current-system/bin/switch-to-configuration boot</screen> 23 23 24 24 </para> 25 25 ··· 27 27 system: 28 28 29 29 <screen> 30 - $ nixos-rebuild switch --rollback</screen> 30 + # nixos-rebuild switch --rollback</screen> 31 31 32 32 This is equivalent to running: 33 33 34 34 <screen> 35 - $ /nix/var/nix/profiles/system-<replaceable>N</replaceable>-link/bin/switch-to-configuration switch</screen> 35 + # /nix/var/nix/profiles/system-<replaceable>N</replaceable>-link/bin/switch-to-configuration switch</screen> 36 36 37 37 where <replaceable>N</replaceable> is the number of the NixOS system 38 38 configuration. To get a list of the available configurations, do: ··· 45 45 46 46 </para> 47 47 48 - </section> 48 + </section>
+3 -3
nixos/doc/manual/administration/service-mgmt.xml
··· 66 66 <para>Units can be stopped, started or restarted: 67 67 68 68 <screen> 69 - $ systemctl stop postgresql.service 70 - $ systemctl start postgresql.service 71 - $ systemctl restart postgresql.service 69 + # systemctl stop postgresql.service 70 + # systemctl start postgresql.service 71 + # systemctl restart postgresql.service 72 72 </screen> 73 73 74 74 These operations are synchronous: they wait until the service has
+3 -3
nixos/doc/manual/administration/store-corruption.xml
··· 18 18 system configuration, you can fix it by doing 19 19 20 20 <screen> 21 - $ nixos-rebuild switch --repair 21 + # nixos-rebuild switch --repair 22 22 </screen> 23 23 24 24 This will cause Nix to check every path in the closure, and if its ··· 28 28 <para>You can also scan the entire Nix store for corrupt paths: 29 29 30 30 <screen> 31 - $ nix-store --verify --check-contents --repair 31 + # nix-store --verify --check-contents --repair 32 32 </screen> 33 33 34 34 Any corrupt paths will be redownloaded if they’re available in a 35 35 binary cache; otherwise, they cannot be repaired.</para> 36 36 37 - </section> 37 + </section>
+2 -2
nixos/doc/manual/administration/user-sessions.xml
··· 45 45 all the session’s processes are gone: 46 46 47 47 <screen> 48 - $ loginctl terminate-session c3 48 + # loginctl terminate-session c3 49 49 </screen> 50 50 51 51 </para> 52 52 53 - </chapter> 53 + </chapter>
+1 -1
nixos/doc/manual/configuration/adding-custom-packages.xml
··· 31 31 Nixpkgs tree: 32 32 33 33 <screen> 34 - $ nixos-rebuild switch -I nixpkgs=/path/to/my/nixpkgs</screen> 34 + # nixos-rebuild switch -I nixpkgs=/path/to/my/nixpkgs</screen> 35 35 36 36 </para> 37 37
+1 -1
nixos/doc/manual/configuration/linux-kernel.xml
··· 82 82 $ unpackPhase 83 83 $ cd linux-* 84 84 $ make -C $dev/lib/modules/*/build M=$(pwd)/drivers/net/ethernet/mellanox modules 85 - $ sudo insmod ./drivers/net/ethernet/mellanox/mlx5/core/mlx5_core.ko 85 + # insmod ./drivers/net/ethernet/mellanox/mlx5/core/mlx5_core.ko 86 86 ]]></screen> 87 87 88 88 </section>
+3 -3
nixos/doc/manual/configuration/luks-file-systems.xml
··· 12 12 <filename>/dev/disk/by-uuid/3f6b0024-3a44-4fde-a43a-767b872abe5d</filename>: 13 13 14 14 <screen> 15 - $ cryptsetup luksFormat /dev/disk/by-uuid/3f6b0024-3a44-4fde-a43a-767b872abe5d 15 + # cryptsetup luksFormat /dev/disk/by-uuid/3f6b0024-3a44-4fde-a43a-767b872abe5d 16 16 17 17 WARNING! 18 18 ======== ··· 22 22 Enter LUKS passphrase: *** 23 23 Verify passphrase: *** 24 24 25 - $ cryptsetup luksOpen /dev/disk/by-uuid/3f6b0024-3a44-4fde-a43a-767b872abe5d crypted 25 + # cryptsetup luksOpen /dev/disk/by-uuid/3f6b0024-3a44-4fde-a43a-767b872abe5d crypted 26 26 Enter passphrase for /dev/disk/by-uuid/3f6b0024-3a44-4fde-a43a-767b872abe5d: *** 27 27 28 - $ mkfs.ext4 /dev/mapper/crypted 28 + # mkfs.ext4 /dev/mapper/crypted 29 29 </screen> 30 30 31 31 To ensure that this file system is automatically mounted at boot time
+4 -4
nixos/doc/manual/configuration/user-mgmt.xml
··· 63 63 account named <literal>alice</literal>: 64 64 65 65 <screen> 66 - $ useradd -m alice</screen> 66 + # useradd -m alice</screen> 67 67 68 68 To make all nix tools available to this new user use `su - USER` which 69 69 opens a login shell (==shell that loads the profile) for given user. 70 70 This will create the ~/.nix-defexpr symlink. So run: 71 71 72 72 <screen> 73 - $ su - alice -c "true"</screen> 73 + # su - alice -c "true"</screen> 74 74 75 75 76 76 The flag <option>-m</option> causes the creation of a home directory ··· 79 79 be set using the <command>passwd</command> utility: 80 80 81 81 <screen> 82 - $ passwd alice 82 + # passwd alice 83 83 Enter new UNIX password: *** 84 84 Retype new UNIX password: *** 85 85 </screen> ··· 87 87 A user can be deleted using <command>userdel</command>: 88 88 89 89 <screen> 90 - $ userdel -r alice</screen> 90 + # userdel -r alice</screen> 91 91 92 92 The flag <option>-r</option> deletes the user’s home directory. 93 93 Accounts can be modified using <command>usermod</command>. Unix
+2 -2
nixos/doc/manual/configuration/wireless.xml
··· 41 41 to generate the <literal>wpa_supplicant.conf</literal>. 42 42 43 43 <screen> 44 - $ wpa_passphrase ESSID PSK > /etc/wpa_supplicant.conf</screen> 44 + # wpa_passphrase ESSID PSK > /etc/wpa_supplicant.conf</screen> 45 45 46 46 After you have edited the <literal>wpa_supplicant.conf</literal>, 47 47 you need to restart the wpa_supplicant service. 48 48 49 49 <screen> 50 - $ systemctl restart wpa_supplicant.service</screen> 50 + # systemctl restart wpa_supplicant.service</screen> 51 51 </para> 52 52 53 53 </section>
+2 -2
nixos/doc/manual/configuration/x-windows.xml
··· 5 5 xml:id="sec-x11"> 6 6 7 7 <title>X Window System</title> 8 - 8 + 9 9 <para>The X Window System (X11) provides the basis of NixOS’ graphical 10 10 user interface. It can be enabled as follows: 11 11 <programlisting> ··· 48 48 </programlisting> 49 49 The X server can then be started manually: 50 50 <screen> 51 - $ systemctl start display-manager.service 51 + # systemctl start display-manager.service 52 52 </screen> 53 53 </para> 54 54
+2 -2
nixos/doc/manual/development/building-nixos.xml
··· 25 25 suggested by the following command: 26 26 27 27 <screen> 28 - $ mount -o loop -t iso9660 ./result/iso/cd.iso /mnt/iso</screen> 28 + # mount -o loop -t iso9660 ./result/iso/cd.iso /mnt/iso</screen> 29 29 30 30 </para> 31 31 32 - </chapter> 32 + </chapter>
+3 -3
nixos/doc/manual/development/building-parts.xml
··· 94 94 <screen> 95 95 $ cp $(nix-build -A 'config.systemd.units."httpd.service".unit')/httpd.service \ 96 96 /run/systemd/system/tmp-httpd.service 97 - $ systemctl daemon-reload 98 - $ systemctl start tmp-httpd.service 97 + # systemctl daemon-reload 98 + # systemctl start tmp-httpd.service 99 99 </screen> 100 100 101 101 Note that the unit must not have the same name as any unit in ··· 110 110 111 111 </para> 112 112 113 - </chapter> 113 + </chapter>
+1 -1
nixos/doc/manual/development/sources.xml
··· 70 70 using the <option>-I</option> flag: 71 71 72 72 <screen> 73 - $ nixos-rebuild switch -I nixpkgs=<replaceable>/my/sources</replaceable>/nixpkgs 73 + # nixos-rebuild switch -I nixpkgs=<replaceable>/my/sources</replaceable>/nixpkgs 74 74 </screen> 75 75 76 76 </para>
+4 -4
nixos/doc/manual/development/testing-installer.xml
··· 12 12 13 13 <screen> 14 14 $ nix-build -A config.system.build.nixos-install 15 - $ mount -t tmpfs none /mnt 16 - $ ./result/bin/nixos-install</screen> 15 + # mount -t tmpfs none /mnt 16 + # ./result/bin/nixos-install</screen> 17 17 18 18 To start a login shell in the new NixOS installation in 19 19 <filename>/mnt</filename>: 20 20 21 21 <screen> 22 - $ ./result/bin/nixos-install --chroot 22 + # ./result/bin/nixos-install --chroot 23 23 </screen> 24 24 25 25 </para> 26 26 27 - </chapter> 27 + </chapter>
+4 -4
nixos/doc/manual/installation/changing-config.xml
··· 10 10 changed something to that file, you should do 11 11 12 12 <screen> 13 - $ nixos-rebuild switch</screen> 13 + # nixos-rebuild switch</screen> 14 14 15 15 to build the new configuration, make it the default configuration for 16 16 booting, and try to realise the configuration in the running system ··· 23 23 <para>You can also do 24 24 25 25 <screen> 26 - $ nixos-rebuild test</screen> 26 + # nixos-rebuild test</screen> 27 27 28 28 to build the configuration and switch the running system to it, but 29 29 without making it the boot default. So if (say) the configuration ··· 33 33 <para>There is also 34 34 35 35 <screen> 36 - $ nixos-rebuild boot</screen> 36 + # nixos-rebuild boot</screen> 37 37 38 38 to build the configuration and make it the boot default, but not 39 39 switch to it now (so it will only take effect after the next ··· 44 44 name</emphasis>, e.g. 45 45 46 46 <screen> 47 - $ nixos-rebuild switch -p test </screen> 47 + # nixos-rebuild switch -p test </screen> 48 48 49 49 which causes the new configuration (and previous ones created using 50 50 <literal>-p test</literal>) to show up in the GRUB submenu “NixOS -
+1 -1
nixos/doc/manual/installation/installing-uefi.xml
··· 5 5 xml:id="sec-uefi-installation"> 6 6 7 7 <title>UEFI Installation</title> 8 - 8 + 9 9 <para>NixOS can also be installed on UEFI systems. The procedure 10 10 is by and large the same as a BIOS installation, with the following 11 11 changes:
+19 -19
nixos/doc/manual/installation/installing.xml
··· 54 54 changes. For example: 55 55 56 56 <screen> 57 - $ mkfs.ext4 -L nixos /dev/sda1</screen> 57 + # mkfs.ext4 -L nixos /dev/sda1</screen> 58 58 59 59 </para></listitem> 60 60 ··· 66 66 <listitem><para>For creating LVM volumes, the LVM commands, e.g., 67 67 68 68 <screen> 69 - $ pvcreate /dev/sda1 /dev/sdb1 70 - $ vgcreate MyVolGroup /dev/sda1 /dev/sdb1 71 - $ lvcreate --size 2G --name bigdisk MyVolGroup 72 - $ lvcreate --size 1G --name smalldisk MyVolGroup</screen> 69 + # pvcreate /dev/sda1 /dev/sdb1 70 + # vgcreate MyVolGroup /dev/sda1 /dev/sdb1 71 + # lvcreate --size 2G --name bigdisk MyVolGroup 72 + # lvcreate --size 1G --name smalldisk MyVolGroup</screen> 73 73 74 74 </para></listitem> 75 75 ··· 84 84 be installed on <filename>/mnt</filename>, e.g. 85 85 86 86 <screen> 87 - $ mount /dev/disk/by-label/nixos /mnt 87 + # mount /dev/disk/by-label/nixos /mnt 88 88 </screen> 89 89 90 90 </para></listitem> ··· 113 113 generate an initial configuration file for you: 114 114 115 115 <screen> 116 - $ nixos-generate-config --root /mnt</screen> 116 + # nixos-generate-config --root /mnt</screen> 117 117 118 118 You should then edit 119 119 <filename>/mnt/etc/nixos/configuration.nix</filename> to suit your 120 120 needs: 121 121 122 122 <screen> 123 - $ nano /mnt/etc/nixos/configuration.nix 123 + # nano /mnt/etc/nixos/configuration.nix 124 124 </screen> 125 125 126 126 If you’re using the graphical ISO image, other editors may be ··· 162 162 <listitem><para>Do the installation: 163 163 164 164 <screen> 165 - $ nixos-install</screen> 165 + # nixos-install</screen> 166 166 167 167 Cross fingers. If this fails due to a temporary problem (such as 168 168 a network issue while downloading binaries from the NixOS binary ··· 186 186 <listitem><para>If everything went well: 187 187 188 188 <screen> 189 - $ reboot</screen> 189 + # reboot</screen> 190 190 191 191 </para></listitem> 192 192 ··· 235 235 236 236 <example xml:id='ex-install-sequence'><title>Commands for Installing NixOS on <filename>/dev/sda</filename></title> 237 237 <screen> 238 - $ fdisk /dev/sda # <lineannotation>(or whatever device you want to install on)</lineannotation> 239 - $ mkfs.ext4 -L nixos /dev/sda1 240 - $ mkswap -L swap /dev/sda2 241 - $ swapon /dev/sda2 242 - $ mount /dev/disk/by-label/nixos /mnt 243 - $ nixos-generate-config --root /mnt 244 - $ nano /mnt/etc/nixos/configuration.nix 245 - $ nixos-install 246 - $ reboot</screen> 238 + # fdisk /dev/sda # <lineannotation>(or whatever device you want to install on)</lineannotation> 239 + # mkfs.ext4 -L nixos /dev/sda1 240 + # mkswap -L swap /dev/sda2 241 + # swapon /dev/sda2 242 + # mount /dev/disk/by-label/nixos /mnt 243 + # nixos-generate-config --root /mnt 244 + # nano /mnt/etc/nixos/configuration.nix 245 + # nixos-install 246 + # reboot</screen> 247 247 </example> 248 248 249 249 <example xml:id='ex-config'><title>NixOS Configuration</title>
+6 -6
nixos/doc/manual/installation/upgrading.xml
··· 60 60 channel you’re subscribed to, run the following as root: 61 61 62 62 <screen> 63 - $ nix-channel --list | grep nixos 63 + # nix-channel --list | grep nixos 64 64 nixos https://nixos.org/channels/nixos-unstable 65 65 </screen> 66 66 67 67 To switch to a different NixOS channel, do 68 68 69 69 <screen> 70 - $ nix-channel --add https://nixos.org/channels/<replaceable>channel-name</replaceable> nixos 70 + # nix-channel --add https://nixos.org/channels/<replaceable>channel-name</replaceable> nixos 71 71 </screen> 72 72 73 73 (Be sure to include the <literal>nixos</literal> parameter at the 74 74 end.) For instance, to use the NixOS 14.12 stable channel: 75 75 76 76 <screen> 77 - $ nix-channel --add https://nixos.org/channels/nixos-14.12 nixos 77 + # nix-channel --add https://nixos.org/channels/nixos-14.12 nixos 78 78 </screen> 79 79 80 80 If you have a server, you may want to use the “small” channel instead: 81 81 82 82 <screen> 83 - $ nix-channel --add https://nixos.org/channels/nixos-14.12-small nixos 83 + # nix-channel --add https://nixos.org/channels/nixos-14.12-small nixos 84 84 </screen> 85 85 86 86 And if you want to live on the bleeding edge: 87 87 88 88 <screen> 89 - $ nix-channel --add https://nixos.org/channels/nixos-unstable nixos 89 + # nix-channel --add https://nixos.org/channels/nixos-unstable nixos 90 90 </screen> 91 91 92 92 </para> ··· 95 95 channel by running 96 96 97 97 <screen> 98 - $ nixos-rebuild switch --upgrade 98 + # nixos-rebuild switch --upgrade 99 99 </screen> 100 100 101 101 which is equivalent to the more verbose <literal>nix-channel --update
+2 -2
nixos/doc/manual/man-configuration.xml
··· 1 1 <refentry xmlns="http://docbook.org/ns/docbook" 2 2 xmlns:xlink="http://www.w3.org/1999/xlink" 3 3 xmlns:xi="http://www.w3.org/2001/XInclude"> 4 - 4 + 5 5 <refmeta> 6 6 <refentrytitle><filename>configuration.nix</filename></refentrytitle> 7 7 <manvolnum>5</manvolnum> ··· 34 34 <xi:include href="options-db.xml" /> 35 35 36 36 </refsection> 37 - 37 + 38 38 </refentry>
+4 -4
nixos/doc/manual/man-nixos-build-vms.xml
··· 1 1 <refentry xmlns="http://docbook.org/ns/docbook" 2 2 xmlns:xlink="http://www.w3.org/1999/xlink" 3 3 xmlns:xi="http://www.w3.org/2001/XInclude"> 4 - 4 + 5 5 <refmeta> 6 6 <refentrytitle><command>nixos-build-vms</command></refentrytitle> 7 7 <manvolnum>8</manvolnum> ··· 42 42 services.openssh.enable = true; 43 43 nixpkgs.system = "i686-linux"; 44 44 deployment.targetHost = "test1.example.net"; 45 - 45 + 46 46 # Other NixOS options 47 47 }; 48 - 48 + 49 49 test2 = {pkgs, config, ...}: 50 50 { 51 51 services.openssh.enable = true; ··· 53 53 environment.systemPackages = [ pkgs.lynx ]; 54 54 nixpkgs.system = "x86_64-linux"; 55 55 deployment.targetHost = "test2.example.net"; 56 - 56 + 57 57 # Other NixOS options 58 58 }; 59 59 }
+2 -2
nixos/doc/manual/man-nixos-option.xml
··· 1 1 <refentry xmlns="http://docbook.org/ns/docbook" 2 2 xmlns:xlink="http://www.w3.org/1999/xlink" 3 3 xmlns:xi="http://www.w3.org/2001/XInclude"> 4 - 4 + 5 5 <refmeta> 6 6 <refentrytitle><command>nixos-option</command></refentrytitle> 7 7 <manvolnum>8</manvolnum> ··· 64 64 Value: 65 65 true 66 66 67 - Default: 67 + Default: 68 68 true 69 69 70 70 Description:
+4 -1
nixos/doc/manual/manual.xml
··· 3 3 xmlns:xi="http://www.w3.org/2001/XInclude" 4 4 version="5.0" 5 5 xml:id="book-nixos-manual"> 6 - 6 + 7 7 <info> 8 8 <title>NixOS Manual</title> 9 9 <subtitle>Version <xi:include href="version" parse="text" /></subtitle> ··· 26 26 xlink:href="https://github.com/NixOS/nixpkgs/issues">NixOS’ GitHub 27 27 issue tracker</link>.</para> 28 28 29 + <note>Commands prefixed with <literal>#</literal> have to be run as 30 + root, either requiring to login as root user or temporarily switching 31 + to it using <literal>sudo</literal> for example.</note> 29 32 </preface> 30 33 31 34 <xi:include href="installation/installation.xml" />