lol

nixos/*: replace <replaceable>s with «thing»

we can't embed syntactic annotations of this kind in markdown code
blocks without yet another extension. replaceable is rare enough to make
this not much worth it, so we'll go with «thing» instead. the module
system already uses this format for its placeholder names in attrsOf
paths.

pennae 9c8531c8 16102dce

+35 -35
+1 -1
nixos/modules/config/users-groups.nix
··· 105 105 automatically sets <option>group</option> to 106 106 <literal>users</literal>, <option>createHome</option> to 107 107 <literal>true</literal>, <option>home</option> to 108 - <filename>/home/<replaceable>username</replaceable></filename>, 108 + <filename>/home/«username»</filename>, 109 109 <option>useDefaultShell</option> to <literal>true</literal>, 110 110 and <option>isSystemUser</option> to 111 111 <literal>false</literal>.
+1 -1
nixos/modules/hardware/video/uvcvideo/default.nix
··· 37 37 description = '' 38 38 List of packages containing <command>uvcvideo</command> dynamic controls 39 39 rules. All files found in 40 - <filename><replaceable>pkg</replaceable>/share/uvcdynctrl/data</filename> 40 + <filename>«pkg»/share/uvcdynctrl/data</filename> 41 41 will be included. 42 42 43 43 Note that these will serve as input to the <command>libwebcam</command>
+1 -1
nixos/modules/programs/neovim.nix
··· 74 74 ''; 75 75 description = '' 76 76 Generate your init file from your list of plugins and custom commands. 77 - Neovim will then be wrapped to load <command>nvim -u /nix/store/<replaceable>hash</replaceable>-vimrc</command> 77 + Neovim will then be wrapped to load <command>nvim -u /nix/store/«hash»-vimrc</command> 78 78 ''; 79 79 }; 80 80
+1 -1
nixos/modules/security/dhparams.nix
··· 61 61 62 62 The value is the size (in bits) of the DH params to generate. The 63 63 generated DH params path can be found in 64 - <literal>config.security.dhparams.params.<replaceable>name</replaceable>.path</literal>. 64 + <literal>config.security.dhparams.params.«name».path</literal>. 65 65 66 66 <note><para>The name of the DH params is taken as being the name of 67 67 the service it serves and the params will be generated before the
+3 -3
nixos/modules/services/backup/duplicity.nix
··· 63 63 <citerefentry><refentrytitle>systemd.exec</refentrytitle> 64 64 <manvolnum>5</manvolnum></citerefentry>. For example: 65 65 <programlisting> 66 - PASSPHRASE=<replaceable>...</replaceable> 67 - AWS_ACCESS_KEY_ID=<replaceable>...</replaceable> 68 - AWS_SECRET_ACCESS_KEY=<replaceable>...</replaceable> 66 + PASSPHRASE=«...» 67 + AWS_ACCESS_KEY_ID=«...» 68 + AWS_SECRET_ACCESS_KEY=«...» 69 69 </programlisting> 70 70 ''; 71 71 };
+2 -2
nixos/modules/services/backup/syncoid.nix
··· 194 194 example = "user@server:pool/dataset"; 195 195 description = '' 196 196 Target ZFS dataset. Can be either local 197 - (<replaceable>pool/dataset</replaceable>) or remote 198 - (<replaceable>user@server:pool/dataset</replaceable>). 197 + («pool/dataset») or remote 198 + («user@server:pool/dataset»). 199 199 ''; 200 200 }; 201 201
+4 -4
nixos/modules/services/hardware/udev.nix
··· 212 212 description = '' 213 213 List of packages containing <command>udev</command> rules. 214 214 All files found in 215 - <filename><replaceable>pkg</replaceable>/etc/udev/rules.d</filename> and 216 - <filename><replaceable>pkg</replaceable>/lib/udev/rules.d</filename> 215 + <filename>«pkg»/etc/udev/rules.d</filename> and 216 + <filename>«pkg»/lib/udev/rules.d</filename> 217 217 will be included. 218 218 ''; 219 219 apply = map getBin; ··· 306 306 307 307 List of packages containing <command>udev</command> rules that will be copied to stage 1. 308 308 All files found in 309 - <filename><replaceable>pkg</replaceable>/etc/udev/rules.d</filename> and 310 - <filename><replaceable>pkg</replaceable>/lib/udev/rules.d</filename> 309 + <filename>«pkg»/etc/udev/rules.d</filename> and 310 + <filename>«pkg»/lib/udev/rules.d</filename> 311 311 will be included. 312 312 ''; 313 313 };
+1 -1
nixos/modules/services/mail/sympa.nix
··· 242 242 description = '' 243 243 The webserver used for the Sympa web interface. Set it to `none` if you want to configure it yourself. 244 244 Further nginx configuration can be done by adapting 245 - <option>services.nginx.virtualHosts.<replaceable>name</replaceable></option>. 245 + <option>services.nginx.virtualHosts.«name»</option>. 246 246 ''; 247 247 }; 248 248
+2 -2
nixos/modules/services/networking/hans.nix
··· 23 23 Each attribute of this option defines a systemd service that 24 24 runs hans. Many or none may be defined. 25 25 The name of each service is 26 - <literal>hans-<replaceable>name</replaceable></literal> 27 - where <replaceable>name</replaceable> is the name of the 26 + <literal>hans-«name»</literal> 27 + where «name» is the name of the 28 28 corresponding attribute name. 29 29 ''; 30 30 example = literalExpression ''
+2 -2
nixos/modules/services/networking/iodine.nix
··· 32 32 Each attribute of this option defines a systemd service that 33 33 runs iodine. Many or none may be defined. 34 34 The name of each service is 35 - <literal>iodine-<replaceable>name</replaceable></literal> 36 - where <replaceable>name</replaceable> is the name of the 35 + <literal>iodine-«name»</literal> 36 + where «name» is the name of the 37 37 corresponding attribute name. 38 38 ''; 39 39 example = literalExpression ''
+2 -2
nixos/modules/services/networking/openvpn.nix
··· 119 119 Each attribute of this option defines a systemd service that 120 120 runs an OpenVPN instance. These can be OpenVPN servers or 121 121 clients. The name of each systemd service is 122 - <literal>openvpn-<replaceable>name</replaceable>.service</literal>, 123 - where <replaceable>name</replaceable> is the corresponding 122 + <literal>openvpn-«name».service</literal>, 123 + where «name» is the corresponding 124 124 attribute name. 125 125 ''; 126 126
+6 -6
nixos/modules/services/system/dbus.nix
··· 43 43 the configuration of the D-Bus system-wide or session-wide 44 44 message bus. Specifically, files in the following directories 45 45 will be included into their respective DBus configuration paths: 46 - <filename><replaceable>pkg</replaceable>/etc/dbus-1/system.d</filename> 47 - <filename><replaceable>pkg</replaceable>/share/dbus-1/system.d</filename> 48 - <filename><replaceable>pkg</replaceable>/share/dbus-1/system-services</filename> 49 - <filename><replaceable>pkg</replaceable>/etc/dbus-1/session.d</filename> 50 - <filename><replaceable>pkg</replaceable>/share/dbus-1/session.d</filename> 51 - <filename><replaceable>pkg</replaceable>/share/dbus-1/services</filename> 46 + <filename>«pkg»/etc/dbus-1/system.d</filename> 47 + <filename>«pkg»/share/dbus-1/system.d</filename> 48 + <filename>«pkg»/share/dbus-1/system-services</filename> 49 + <filename>«pkg»/etc/dbus-1/session.d</filename> 50 + <filename>«pkg»/share/dbus-1/session.d</filename> 51 + <filename>«pkg»/share/dbus-1/services</filename> 52 52 ''; 53 53 }; 54 54
+1 -1
nixos/modules/services/web-servers/apache-httpd/vhost-options.nix
··· 233 233 default = false; 234 234 description = '' 235 235 Whether to enable serving <filename>~/public_html</filename> as 236 - <literal>/~<replaceable>username</replaceable></literal>. 236 + <literal>/~«username»</literal>. 237 237 ''; 238 238 }; 239 239
+1 -1
nixos/modules/system/boot/luksroot.nix
··· 552 552 The encrypted disk that should be opened before the root 553 553 filesystem is mounted. Both LVM-over-LUKS and LUKS-over-LVM 554 554 setups are supported. The unencrypted devices can be accessed as 555 - <filename>/dev/mapper/<replaceable>name</replaceable></filename>. 555 + <filename>/dev/mapper/«name»</filename>. 556 556 ''; 557 557 558 558 type = with types; attrsOf (submodule (
+1 -1
nixos/modules/system/boot/stage-1.nix
··· 480 480 if you want to resume from file. If left empty, the swap partitions are used. 481 481 Specify here the device where the file resides. 482 482 You should also use <varname>boot.kernelParams</varname> to specify 483 - <literal><replaceable>resume_offset</replaceable></literal>. 483 + <literal>«resume_offset»</literal>. 484 484 ''; 485 485 }; 486 486
+1 -1
nixos/modules/system/boot/systemd/tmpfiles.nix
··· 29 29 List of packages containing <command>systemd-tmpfiles</command> rules. 30 30 31 31 All files ending in .conf found in 32 - <filename><replaceable>pkg</replaceable>/lib/tmpfiles.d</filename> 32 + <filename>«pkg»/lib/tmpfiles.d</filename> 33 33 will be included. 34 34 If this folder does not exist or does not contain any files an error will be returned instead. 35 35
+2 -2
nixos/modules/virtualisation/nixos-containers.nix
··· 583 583 Whether to give the container its own private virtual 584 584 Ethernet interface. The interface is called 585 585 <literal>eth0</literal>, and is hooked up to the interface 586 - <literal>ve-<replaceable>container-name</replaceable></literal> 586 + <literal>ve-«container-name»</literal> 587 587 on the host. If this option is not set, then the 588 588 container shares the network interfaces of the host, 589 589 and can bind to any port on any interface. ··· 731 731 description = '' 732 732 A set of NixOS system configurations to be run as lightweight 733 733 containers. Each container appears as a service 734 - <literal>container-<replaceable>name</replaceable></literal> 734 + <literal>container-«name»</literal> 735 735 on the host system, allowing it to be started and stopped via 736 736 <command>systemctl</command>. 737 737 '';
+3 -3
nixos/modules/virtualisation/qemu-vm.nix
··· 516 516 description = 517 517 '' 518 518 Virtual networks to which the VM is connected. Each 519 - number <replaceable>N</replaceable> in this list causes 519 + number «N» in this list causes 520 520 the VM to have a virtual Ethernet interface attached to a 521 521 separate virtual network on which it will be assigned IP 522 522 address 523 - <literal>192.168.<replaceable>N</replaceable>.<replaceable>M</replaceable></literal>, 524 - where <replaceable>M</replaceable> is the index of this VM 523 + <literal>192.168.«N».«M»</literal>, 524 + where «M» is the index of this VM 525 525 in the list of VMs. 526 526 ''; 527 527 };