···123123124124- [Fider](https://fider.io/), an open platform to collect and prioritize feedback. Available as [services.fider](#opt-services.fider.enable).125125126126+- [PDS](https://github.com/bluesky-social/pds), Personal Data Server for [bsky](https://bsky.social/). Available as [services.pds](option.html#opt-services.pds).127127+126128- [mqtt-exporter](https://github.com/kpetremann/mqtt-exporter/), a Prometheus exporter for exposing messages from MQTT. Available as [services.prometheus.exporters.mqtt](#opt-services.prometheus.exporters.mqtt.enable).127129128130- [nvidia-gpu](https://github.com/utkuozdemir/nvidia_gpu_exporter), a Prometheus exporter that scrapes `nvidia-smi` for GPU metrics. Available as [services.prometheus.exporters.nvidia-gpu](#opt-services.prometheus.exporters.nvidia-gpu.enable).
+2-2
nixos/modules/config/ldap.nix
···135135 type = types.lines;136136 description = ''137137 Extra configuration options that will be added verbatim at138138- the end of the nslcd configuration file (`nslcd.conf(5)`).138138+ the end of the nslcd configuration file ({manpage}`nslcd.conf(5)`).139139 '';140140 };141141···219219 type = types.lines;220220 description = ''221221 Extra configuration options that will be added verbatim at222222- the end of the ldap configuration file (`ldap.conf(5)`).222222+ the end of the ldap configuration file ({manpage}`ldap.conf(5)`).223223 If {option}`users.ldap.daemon` is enabled, this224224 configuration will not be used. In that case, use225225 {option}`users.ldap.daemon.extraConfig` instead.
+1-1
nixos/modules/config/mysql.nix
···111111 - `0` (or `"plain"`):112112 No encryption. Passwords are stored in plaintext. HIGHLY DISCOURAGED.113113 - `1` (or `"Y"`):114114- Use crypt(3) function.114114+ Use {manpage}`crypt(3)` function.115115 - `2` (or `"mysql"`):116116 Use the MySQL PASSWORD() function. It is possible that the encryption function used117117 by `pam_mysql` is different from that of the MySQL server, as
+3-3
nixos/modules/config/swap.nix
···4646 If not specified, the amount of data to read from `source` will be4747 determined by cryptsetup.48484949- See `cryptsetup-open(8)` for details.4949+ See `{manpage}`cryptsetup-open(8)`` for details.5050 '';5151 };5252···6060 If not specified, the default sector size is determined from the6161 underlying block device.62626363- See `cryptsetup-open(8)` for details.6363+ See `{manpage}`cryptsetup-open(8)`` for details.6464 '';6565 };6666···158158 whole swap space is discarded at swapon invocation. If "pages",159159 asynchronous discard on freed pages is performed, before returning to160160 the available pages pool. With "both", both policies are activated.161161- See swapon(8) for more information.161161+ See {manpage}`swapon(8)` for more information.162162 '';163163 };164164
+1-1
nixos/modules/config/users-groups.nix
···204204 homeMode = mkOption {205205 type = types.strMatching "[0-7]{1,5}";206206 default = "700";207207- description = "The user's home directory mode in numeric format. See chmod(1). The mode is only applied if {option}`users.users.<name>.createHome` is true.";207207+ description = "The user's home directory mode in numeric format. See {manpage}`chmod(1)`. The mode is only applied if {option}`users.users.<name>.createHome` is true.";208208 };209209210210 cryptHomeLuks = mkOption {
+1-1
nixos/modules/config/xdg/portals/wlr.nix
···2828 description = ''2929 Configuration for `xdg-desktop-portal-wlr`.30303131- See `xdg-desktop-portal-wlr(5)` for supported3131+ See {manpage}`xdg-desktop-portal-wlr(5)` for supported3232 values.3333 '';3434
···2626 default = { };2727 description = ''2828 System-wide configuration for GameMode (/etc/gamemode.ini).2929- See gamemoded(8) man page for available settings.2929+ See {manpage}`gamemoded(8)` man page for available settings.3030 '';3131 example = lib.literalExpression ''3232 {
+1-1
nixos/modules/programs/git.nix
···4747 `config` to `[ { foo.x = 42; } { bar.y = 42; }]` will put the `foo`4848 section before the `bar` section unlike the default alphabetical4949 order, which can be helpful for sections such as `include` and5050- `includeIf`. See the CONFIGURATION FILE section of git-config(1) for5050+ `includeIf`. See the CONFIGURATION FILE section of {manpage}`git-config(1)` for5151 more information.5252 '';5353 };
+3-3
nixos/modules/programs/msmtp.nix
···3434 };3535 description = ''3636 Default values applied to all accounts.3737- See msmtp(1) for the available options.3737+ See {manpage}`msmtp(1)` for the available options.3838 '';3939 };4040···5252 description = ''5353 Named accounts and their respective configurations.5454 The special name "default" allows a default account to be defined.5555- See msmtp(1) for the available options.5555+ See {manpage}`msmtp(1)` for the available options.56565757 Use `programs.msmtp.extraConfig` instead of this attribute set-based5858 option if ordered account inheritance is needed.···6868 default = "";6969 description = ''7070 Extra lines to add to the msmtp configuration verbatim.7171- See msmtp(1) for the syntax and available options.7171+ See {manpage}`msmtp(1)` for the syntax and available options.7272 '';7373 };7474 };
+1-1
nixos/modules/programs/shadow.nix
···3131 description = ''3232 Config options for the /etc/login.defs file, that defines3333 the site-specific configuration for the shadow password suite.3434- See login.defs(5) man page for available options.3434+ See {manpage}`login.defs(5)` man page for available options.3535 '';3636 type = lib.types.submodule {3737 freeformType = (pkgs.formats.keyValue { }).type;
+1-1
nixos/modules/security/pam.nix
···14831483 the YubiCloud.1484148414851485 Use "challenge-response" for offline validation using YubiKeys with HMAC-SHA-114861486- Challenge-Response configurations. See the man-page ykpamcfg(1) for further14861486+ Challenge-Response configurations. See the man-page {manpage}`ykpamcfg(1)` for further14871487 details on how to configure offline Challenge-Response validation.1488148814891489 More information can be found [here](https://developers.yubico.com/yubico-pam/Authentication_Using_Challenge-Response.html).
+1-1
nixos/modules/security/wrappers/default.nix
···214214 example = "10G";215215 type = lib.types.str;216216 description = ''217217- Size limit for the /run/wrappers tmpfs. Look at mount(8), tmpfs size option,217217+ Size limit for the /run/wrappers tmpfs. Look at {manpage}`mount(8)`, tmpfs size option,218218 for the accepted syntax. WARNING: don't set to less than 64MB.219219 '';220220 };
+2-2
nixos/modules/services/backup/btrbk.nix
···163163 default = 10;164164 };165165 ioSchedulingClass = mkOption {166166- description = "IO scheduling class for btrbk (see ionice(1) for a quick description). Applies to local instances, and remote ones connecting by ssh if set to idle.";166166+ description = "IO scheduling class for btrbk (see {manpage}`ionice(1)` for a quick description). Applies to local instances, and remote ones connecting by ssh if set to idle.";167167 type = types.enum [168168 "idle"169169 "best-effort"···181181 type = types.nullOr types.str;182182 default = "daily";183183 description = ''184184- How often this btrbk instance is started. See systemd.time(7) for more information about the format.184184+ How often this btrbk instance is started. See {manpage}`systemd.time(7)` for more information about the format.185185 Setting it to null disables the timer, thus this instance can only be started manually.186186 '';187187 };
+1-1
nixos/modules/services/backup/restic.nix
···2323 default = null;2424 description = ''2525 file containing the credentials to access the repository, in the2626- format of an EnvironmentFile as described by systemd.exec(5)2626+ format of an EnvironmentFile as described by {manpage}`systemd.exec(5)`2727 '';2828 };2929
+4-4
nixos/modules/services/backup/tarsnap.nix
···6060 `"/root/tarsnap.key"`.61616262 It's recommended for backups that you generate a key for every archive6363- using `tarsnap-keygen(1)`, and then generate a6464- write-only tarsnap key using `tarsnap-keymgmt(1)`,6363+ using {manpage}`tarsnap-keygen(1)`, and then generate a6464+ write-only tarsnap key using {manpage}`tarsnap-keymgmt(1)`,6565 and keep your master key(s) for a particular machine off-site.66666767 The keyfile name should be given as a string and not a path, to···8686 Use this option if you want to run multiple backups8787 concurrently - each archive must have a unique key. You can8888 generate a write-only key derived from your master key (which8989- is recommended) using `tarsnap-keymgmt(1)`.8989+ is recommended) using {manpage}`tarsnap-keymgmt(1)`.90909191 Note: every archive must have an individual master key. You9292 must generate multiple keys with9393- `tarsnap-keygen(1)`, and then generate write9393+ {manpage}`tarsnap-keygen(1)`, and then generate write9494 only keys from those.95959696 The keyfile name should be given as a string and not a path, to
+1-1
nixos/modules/services/cluster/k3s/default.nix
···227227 environmentFile = lib.mkOption {228228 type = lib.types.nullOr lib.types.path;229229 description = ''230230- File path containing environment variables for configuring the k3s service in the format of an EnvironmentFile. See systemd.exec(5).230230+ File path containing environment variables for configuring the k3s service in the format of an EnvironmentFile. See {manpage}`systemd.exec(5)`.231231 '';232232 default = null;233233 };
+1-1
nixos/modules/services/hardware/libinput.nix
···136136 default = null;137137 example = "1 6 3 4 5 0 7";138138 description = ''139139- Sets the logical button mapping for this device, see XSetPointerMapping(3). The string must139139+ Sets the logical button mapping for this device, see {manpage}`XSetPointerMapping(3)`. The string must140140 be a space-separated list of button mappings in the order of the logical buttons on the141141 device, starting with button 1. The default mapping is "1 2 3 ... 32". A mapping of 0 deac‐142142 tivates the button. Multiple buttons can have the same mapping. Invalid mapping strings are
+2-2
nixos/modules/services/hardware/thinkfan.nix
···249249 ];250250 description = ''251251 A list of extra command line arguments to pass to thinkfan.252252- Check the thinkfan(1) manpage for available arguments.252252+ Check the {manpage}`thinkfan(1)` manpage for available arguments.253253 '';254254 };255255···259259 description = ''260260 Thinkfan settings. Use this option to configure thinkfan261261 settings not exposed in a NixOS option or to bypass one.262262- Before changing this, read the `thinkfan.conf(5)`262262+ Before changing this, read the `{manpage}`thinkfan.conf(5)``263263 manpage and take a look at the example config file at264264 <https://github.com/vmatare/thinkfan/blob/master/examples/thinkfan.yaml>265265 '';
+1-1
nixos/modules/services/hardware/upower.nix
···6565 on or off. We can't do much to fix these problems, but this is a way6666 for users to make the laptop panel vanish, a state that might be used6767 by a couple of user-space daemons. On Linux systems, see also6868- logind.conf(5).6868+ {manpage}`logind.conf(5)`.6969 '';7070 };7171
···6767 ];6868 description = ''6969 A list of device nodes to which {command}`esphome` has access to.7070- Refer to DeviceAllow in systemd.resource-control(5) for more information.7070+ Refer to DeviceAllow in {manpage}`systemd.resource-control(5)` for more information.7171 Beware that if a device is referred to by an absolute path instead of a device category,7272 it will only allow devices that already are plugged in when the service is started.7373 '';
+3-3
nixos/modules/services/logging/journalwatch.nix
···135135 this patternBlock's {option}`filters` are applied.136136 If `value` starts and ends with a slash, it is interpreted as137137 an extended python regular expression, if not, it's an exact match.138138- The journal fields are explained in systemd.journal-fields(7).138138+ The journal fields are explained in {manpage}`systemd.journal-fields(7)`.139139 '';140140 };141141···210210 description = ''211211 How often to run journalwatch.212212213213- The format is described in systemd.time(7).213213+ The format is described in {manpage}`systemd.time(7)`.214214 '';215215 };216216 accuracy = lib.mkOption {···219219 description = ''220220 The time window around the interval in which the journalwatch run will be scheduled.221221222222- The format is described in systemd.time(7).222222+ The format is described in {manpage}`systemd.time(7)`.223223 '';224224 };225225 };
+1-1
nixos/modules/services/logging/syslogd.nix
···7070 type = lib.types.bool;7171 default = false;7272 description = ''7373- Accept logging through UDP. Option -r of syslogd(8).7373+ Accept logging through UDP. Option -r of {manpage}`syslogd(8)`.7474 '';7575 };7676
+3-3
nixos/modules/services/mail/clamsmtp.nix
···4343 default = "";4444 example = "X-Virus-Scanned: ClamAV using ClamSMTP";4545 description = ''4646- A header to add to scanned messages. See clamsmtpd.conf(5) for4646+ A header to add to scanned messages. See {manpage}`clamsmtpd.conf(5)` for4747 more details. Empty means no header.4848 '';4949 };···6565 example = "127.0.0.1:10025";6666 description = ''6767 Address to wait for incoming SMTP connections on. See6868- clamsmtpd.conf(5) for more details.6868+ {manpage}`clamsmtpd.conf(5)` for more details.6969 '';7070 };7171···118118 default = null;119119 description = ''120120 Command to run when a virus is found. Please see VIRUS ACTION in121121- clamsmtpd(8) for a discussion of this option and its safe use.121121+ {manpage}`clamsmtpd(8)` for a discussion of this option and its safe use.122122 '';123123 };124124
+3-3
nixos/modules/services/mail/cyrus-imap.nix
···8080 type = int;8181 default = 32;8282 description = ''8383- Socket listen queue backlog size. See listen(2) for more information about a backlog.8383+ Socket listen queue backlog size. See {manpage}`listen(2)` for more information about a backlog.8484 Default is 32, which may be increased if you have a very high connection rate.8585 '';8686 };···194194 DAEMON = mkOption {195195 default = { };196196 description = ''197197- This section lists long running daemons to start before any SERVICES are spawned. master(8) will ensure that these processes are running, restarting any process which dies or forks. All listed processes will be shutdown when master(8) is exiting.197197+ This section lists long running daemons to start before any SERVICES are spawned. {manpage}`master(8)` will ensure that these processes are running, restarting any process which dies or forks. All listed processes will be shutdown when {manpage}`master(8)` is exiting.198198 '';199199 };200200 };···221221 type = path;222222 default = "/run/cyrus/lmtp";223223 description = ''224224- Unix socket that lmtpd listens on, used by deliver(8). This should match the path specified in cyrus.conf(5).224224+ Unix socket that lmtpd listens on, used by {manpage}`deliver(8)`. This should match the path specified in {manpage}`cyrus.conf(5)`.225225 '';226226 };227227 idlesocket = mkOption {
+2-2
nixos/modules/services/mail/offlineimap.nix
···3737 onCalendar = lib.mkOption {3838 type = lib.types.str;3939 default = "*:0/3"; # every 3 minutes4040- description = "How often is offlineimap started. Default is '*:0/3' meaning every 3 minutes. See systemd.time(7) for more information about the format.";4040+ description = "How often is offlineimap started. Default is '*:0/3' meaning every 3 minutes. See {manpage}`systemd.time(7)` for more information about the format.";4141 };42424343 timeoutStartSec = lib.mkOption {4444 type = lib.types.str;4545 default = "120sec"; # Kill if still alive after 2 minutes4646- description = "How long waiting for offlineimap before killing it. Default is '120sec' meaning every 2 minutes. See systemd.time(7) for more information about the format.";4646+ description = "How long waiting for offlineimap before killing it. Default is '120sec' meaning every 2 minutes. See {manpage}`systemd.time(7)` for more information about the format.";4747 };4848 };4949 config = lib.mkIf (cfg.enable || cfg.install) {
+1-1
nixos/modules/services/mail/opendkim.nix
···6565 defaultText = lib.literalExpression ''"csl:''${config.networking.hostName}"'';6666 example = "csl:example.com,mydomain.net";6767 description = ''6868- Local domains set (see `opendkim(8)` for more information on datasets).6868+ Local domains set (see {manpage}`opendkim(8)` for more information on datasets).6969 Messages from them are signed, not verified.7070 '';7171 };
+4-4
nixos/modules/services/mail/postfix.nix
···546546 type = lib.types.lines;547547 default = "";548548 description = ''549549- Additional entries to put verbatim into aliases file, cf. man-page aliases(8).549549+ Additional entries to put verbatim into aliases file, cf. man-page {manpage}`aliases(8)`.550550 '';551551 };552552···631631 type = lib.types.lines;632632 default = "";633633 description = ''634634- Entries for the virtual alias map, cf. man-page virtual(5).634634+ Entries for the virtual alias map, cf. man-page {manpage}`virtual(5)`.635635 '';636636 };637637···654654 List of accepted local users. Specify a bare username, an655655 `"@domain.tld"` wild-card, or a complete656656 `"user@domain.tld"` address. If set, these names end657657- up in the local recipient map -- see the local(8) man-page -- and657657+ up in the local recipient map -- see the {manpage}`local(8)` man-page -- and658658 effectively replace the system user database lookup that's otherwise659659 used by default.660660 '';···664664 default = "";665665 type = lib.types.lines;666666 description = ''667667- Entries for the transport map, cf. man-page transport(8).667667+ Entries for the transport map, cf. man-page {manpage}`transport(8)`.668668 '';669669 };670670
+3-3
nixos/modules/services/mail/postgrey.nix
···119119 greylistAction = mkOption {120120 type = str;121121 default = "DEFER_IF_PERMIT";122122- description = "Response status for greylisted messages (see access(5))";122122+ description = "Response status for greylisted messages (see {manpage}`access(5)`)";123123 };124124 greylistHeader = mkOption {125125 type = str;···170170 whitelistClients = mkOption {171171 type = listOf path;172172 default = [ ];173173- description = "Client address whitelist files (see postgrey(8))";173173+ description = "Client address whitelist files (see {manpage}`postgrey(8)`)";174174 };175175 whitelistRecipients = mkOption {176176 type = listOf path;177177 default = [ ];178178- description = "Recipient address whitelist files (see postgrey(8))";178178+ description = "Recipient address whitelist files (see {manpage}`postgrey(8)`)";179179 };180180 };181181 };
+1-1
nixos/modules/services/misc/autofs.nix
···4949 '''5050 '';5151 description = ''5252- Contents of `/etc/auto.master` file. See {command}`auto.master(5)` and {command}`autofs(5)`.5252+ Contents of `/etc/auto.master` file. See {manpage}`auto.master(5)` and {manpage}`autofs(5)`.5353 '';5454 };5555
+1-1
nixos/modules/services/misc/gpsd.nix
···105105 ];106106 description = ''107107 A list of extra command line arguments to pass to gpsd.108108- Check gpsd(8) mangpage for possible arguments.108108+ Check {manpage}`gpsd(8)` mangpage for possible arguments.109109 '';110110 };111111
···5454 default = null;5555 description = ''5656 File containing the credentials to access the repository, in the5757- format of an EnvironmentFile as described by systemd.exec(5)5757+ format of an EnvironmentFile as described by {manpage}`systemd.exec(5)`5858 '';5959 };6060
···3535 type = lib.types.lines;3636 default = "";3737 example = "brun 10%";3838- description = "Additional configuration file entries. See cachefilesd.conf(5) for more information.";3838+ description = "Additional configuration file entries. See {manpage}`cachefilesd.conf(5)` for more information.";3939 };40404141 };
···7373 });7474 description = ''7575 This cell's database server records, added to the global7676- CellServDB. See CellServDB(5) man page for syntax. Ignored when7676+ CellServDB. See {manpage}`CellServDB(5)` man page for syntax. Ignored when7777 `afsdb` is set to `true`.7878 '';7979 example = [
···117117 advertisedAddresses = mkOption {118118 type = types.listOf types.str;119119 default = [ ];120120- description = "List of IP addresses this server is advertised under. See NetInfo(5)";120120+ description = "List of IP addresses this server is advertised under. See {manpage}`NetInfo(5)`";121121 };122122123123 cellName = mkOption {
+2-2
nixos/modules/services/networking/cgit.nix
···146146 };147147148148 repos = lib.mkOption {149149- description = "cgit repository settings, see cgitrc(5)";149149+ description = "cgit repository settings, see {manpage}`cgitrc(5)`";150150 type = with lib.types; attrsOf (attrsOf settingType);151151 default = { };152152 example = {···165165 };166166167167 settings = lib.mkOption {168168- description = "cgit configuration, see cgitrc(5)";168168+ description = "cgit configuration, see {manpage}`cgitrc(5)`";169169 type = lib.types.attrsOf repeatedSettingType;170170 default = { };171171 example = lib.literalExpression ''
···194194 will be symlinked to the location given here.195195 This file must exist and be196196 readable only by the `uucp` user.197197- See hosts.hfaxd(5) for details.197197+ See {manpage}`hosts.hfaxd(5)` for details.198198 This configuration permits access for all users:199199 ```200200 environment.etc."hosts.hfaxd" = {···299299 description = ''300300 purging old files from the spooling area with301301 {file}`faxcron` with the given frequency302302- (see systemd.time(7))302302+ (see {manpage}`systemd.time(7)`)303303 '';304304 };305305 faxcron.infoDays = mkOption {···339339 description = ''340340 Purge old files from the spooling area with341341 {file}`faxcron` with the given frequency342342- (see systemd.time(7)).342342+ (see {manpage}`systemd.time(7)`).343343 '';344344 };345345 faxqclean.archiving = mkOption {···356356 `as-flagged` archives jobs that357357 have been flagged for archiving by sendfax,358358 `always` forces archiving of all jobs.359359- See also sendfax(1) and faxqclean(8).359359+ See also {manpage}`sendfax(1)` and {manpage}`faxqclean(8)`.360360 '';361361 };362362 faxqclean.doneqMinutes = mkOption {
+1-1
nixos/modules/services/networking/minidlna.nix
···12121313 options.services.minidlna.settings = lib.mkOption {1414 default = {};1515- description = "Configuration for `minidlna.conf(5)`.";1515+ description = "Configuration for {manpage}`minidlna.conf(5)`.";1616 type = lib.types.submodule {1717 freeformType = format.type;1818
+1-1
nixos/modules/services/networking/ngircd.nix
···2929 enable = mkEnableOption "the ngircd IRC server";30303131 config = mkOption {3232- description = "The ngircd configuration (see ngircd.conf(5)).";3232+ description = "The ngircd configuration (see {manpage}`ngircd.conf(5)`).";33333434 type = types.lines;3535 };
+1-1
nixos/modules/services/networking/ntopng.nix
···5858 interfaces and displays its findings at http://localhost:''${toString5959 config.${opt.http-port}}. Default username and password is admin/admin.60606161- See the ntopng(8) manual page and http://www.ntop.org/products/ntop/6161+ See the {manpage}`ntopng(8)` manual page and http://www.ntop.org/products/ntop/6262 for more info.63636464 Note that enabling ntopng will also enable redis (key-value
+1-1
nixos/modules/services/networking/pppd.nix
···5353 config = mkOption {5454 type = types.lines;5555 default = "";5656- description = "pppd configuration for this peer, see the pppd(8) man page.";5656+ description = "pppd configuration for this peer, see the {manpage}`pppd(8)` man page.";5757 };5858 };5959 }
+1-1
nixos/modules/services/networking/privoxy.nix
···114114 the disk usage, since Privoxy itself never deletes the certificates.115115116116 ::: {.note}117117- The format is that of the `tmpfiles.d(5)`117117+ The format is that of the {manpage}`tmpfiles.d(5)`118118 Age parameter.119119 :::120120 '';
+1-1
nixos/modules/services/networking/r53-ddns.nix
···4545 type = types.str;4646 description = ''4747 File containing the AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY4848- in the format of an EnvironmentFile as described by systemd.exec(5)4848+ in the format of an EnvironmentFile as described by {manpage}`systemd.exec(5)`4949 '';5050 };5151
···1313 extraFlags = mkOption {1414 type = types.listOf types.str;1515 default = [];1616- description = ''Extra flags passed to the {command}`robustirc-bridge` command. See [RobustIRC Documentation](https://robustirc.net/docs/adminguide.html#_bridge) or robustirc-bridge(1) for details.'';1616+ description = ''Extra flags passed to the {command}`robustirc-bridge` command. See [RobustIRC Documentation](https://robustirc.net/docs/adminguide.html#_bridge) or {manpage}`robustirc-bridge(1)` for details.'';1717 example = [1818 "-network robustirc.net"1919 ];
+1-1
nixos/modules/services/networking/rpcbind.nix
···1616 description = ''1717 Whether to enable `rpcbind`, an ONC RPC directory service1818 notably used by NFS and NIS, and which can be queried1919- using the rpcinfo(1) command. `rpcbind` is a replacement for1919+ using the {manpage}`rpcinfo(1)` command. `rpcbind` is a replacement for2020 `portmap`.2121 '';2222 };
+1-1
nixos/modules/services/networking/searx.nix
···5656 type = types.nullOr types.path;5757 default = null;5858 description = ''5959- Environment file (see `systemd.exec(5)`5959+ Environment file (see {manpage}`systemd.exec(5)`6060 "EnvironmentFile=" section for the syntax) to define variables for6161 Searx. This option can be used to safely include secret keys into the6262 Searx configuration.
+1-1
nixos/modules/services/networking/spacecookie.nix
···5353 description = ''5454 Address to listen on. Must be in the5555 `ListenStream=` syntax of5656- [systemd.socket(5)](https://www.freedesktop.org/software/systemd/man/systemd.socket.html).5656+ {manpage}`systemd.socket(5)`.5757 '';5858 };5959
+2-2
nixos/modules/services/networking/ssh/sshd.nix
···357357 type = lib.types.nullOr (lib.types.enum [ "QUIET" "FATAL" "ERROR" "INFO" "VERBOSE" "DEBUG" "DEBUG1" "DEBUG2" "DEBUG3" ]);358358 default = "INFO"; # upstream default359359 description = ''360360- Gives the verbosity level that is used when logging messages from sshd(8). Logging with a DEBUG level360360+ Gives the verbosity level that is used when logging messages from {manpage}`sshd(8)`. Logging with a DEBUG level361361 violates the privacy of users and is not recommended.362362 '';363363 };···369369 # apply if cfg.useDns then "yes" else "no"370370 default = false;371371 description = ''372372- Specifies whether sshd(8) should look up the remote host name, and to check that the resolved host name for372372+ Specifies whether {manpage}`sshd(8)` should look up the remote host name, and to check that the resolved host name for373373 the remote IP address maps back to the very same IP address.374374 If this option is set to no (the default) then only addresses and not host names may be used in375375 ~/.ssh/authorized_keys from and sshd_config Match Host directives.
+1-1
nixos/modules/services/networking/tinydns.nix
···1616 data = mkOption {1717 type = types.lines;1818 default = "";1919- description = "The DNS data to serve, in the format described by tinydns-data(8)";1919+ description = "The DNS data to serve, in the format described by {manpage}`tinydns-data(8)`";2020 };21212222 ip = mkOption {
+3-3
nixos/modules/services/security/clamav.nix
···5353 type = lib.types.str;5454 default = "hourly";5555 description = ''5656- How often freshclam is invoked. See systemd.time(7) for more5656+ How often freshclam is invoked. See {manpage}`systemd.time(7)` for more5757 information about the format.5858 '';5959 };···7474 type = lib.types.str;7575 default = "hourly";7676 description = ''7777- How often freshclam is invoked. See systemd.time(7) for more7777+ How often freshclam is invoked. See {manpage}`systemd.time(7)` for more7878 information about the format.7979 '';8080 };···105105 type = lib.types.str;106106 default = "*-*-* 04:00:00";107107 description = ''108108- How often clamdscan is invoked. See systemd.time(7) for more108108+ How often clamdscan is invoked. See {manpage}`systemd.time(7)` for more109109 information about the format.110110 By default this runs using 10 cores at most, be sure to run it at a time of low traffic.111111 '';
+1-1
nixos/modules/services/torrent/transmission.nix
···181181 defaultText = literalExpression "if cfg.package == pkgs.transmission_3 then 18 else \"022\"";182182 description = ''183183 Sets transmission's file mode creation mask.184184- See the umask(2) manpage for more information.184184+ See the {manpage}`umask(2)` manpage for more information.185185 Users who want their saved torrents to be world-writable186186 may want to set this value to 0/`"000"`.187187
+8-8
nixos/modules/services/web-apps/cloudlog.nix
···173173 type = str;174174 default = "daily";175175 description = ''176176- Specification (in the format described by systemd.time(7)) of the176176+ Specification (in the format described by {manpage}`systemd.time(7)`) of the177177 time at which the LoTW upload will occur.178178 '';179179 };···191191 type = str;192192 default = "daily";193193 description = ''194194- Specification (in the format described by systemd.time(7)) of the time194194+ Specification (in the format described by {manpage}`systemd.time(7)`) of the time195195 at which the Clublog upload will occur.196196 '';197197 };···210210 type = str;211211 default = "weekly";212212 description = ''213213- Specification (in the format described by systemd.time(7)) of the213213+ Specification (in the format described by {manpage}`systemd.time(7)`) of the214214 time at which the LoTW user update will occur.215215 '';216216 };···228228 type = str;229229 default = "monthly";230230 description = ''231231- Specification (in the format described by systemd.time(7)) of the231231+ Specification (in the format described by {manpage}`systemd.time(7)`) of the232232 time at which the DOK update will occur.233233 '';234234 };···247247 type = str;248248 default = "monthly";249249 description = ''250250- Specification (in the format described by systemd.time(7)) of the time250250+ Specification (in the format described by {manpage}`systemd.time(7)`) of the time251251 at which the Clublog SCP update will occur.252252 '';253253 };···266266 type = str;267267 default = "monthly";268268 description = ''269269- Specification (in the format described by systemd.time(7)) of the time269269+ Specification (in the format described by {manpage}`systemd.time(7)`) of the time270270 at which the WWFF update will occur.271271 '';272272 };···284284 type = str;285285 default = "daily";286286 description = ''287287- Specification (in the format described by systemd.time(7)) of the287287+ Specification (in the format described by {manpage}`systemd.time(7)`) of the288288 time at which the QRZ upload will occur.289289 '';290290 };···302302 type = str;303303 default = "monthly";304304 description = ''305305- Specification (in the format described by systemd.time(7)) of the time305305+ Specification (in the format described by {manpage}`systemd.time(7)`) of the time306306 at which the SOTA update will occur.307307 '';308308 };
+1-1
nixos/modules/services/web-apps/dex.nix
···5151 type = types.nullOr types.path;5252 default = null;5353 description = ''5454- Environment file (see `systemd.exec(5)`5454+ Environment file (see {manpage}`systemd.exec(5)`5555 "EnvironmentFile=" section for the syntax) to define variables for dex.5656 This option can be used to safely include secret keys into the dex configuration.5757 '';
+1-1
nixos/modules/services/web-apps/gotosocial.nix
···8080 type = lib.types.nullOr lib.types.path;8181 description = ''8282 File path containing environment variables for configuring the GoToSocial service8383- in the format of an EnvironmentFile as described by systemd.exec(5).8383+ in the format of an EnvironmentFile as described by {manpage}`systemd.exec(5)`.84848585 This option could be used to pass sensitive configuration to the GoToSocial daemon.8686
+1-1
nixos/modules/services/web-apps/miniflux.nix
···7272 description = ''7373 File containing the ADMIN_USERNAME and7474 ADMIN_PASSWORD (length >= 6) in the format of7575- an EnvironmentFile=, as described by systemd.exec(5).7575+ an EnvironmentFile=, as described by {manpage}`systemd.exec(5)`.7676 '';7777 example = "/etc/nixos/miniflux-admin-credentials";7878 };
+233
nixos/modules/services/web-apps/pds.nix
···11+{22+ lib,33+ pkgs,44+ config,55+ ...66+}:77+let88+ cfg = config.services.pds;99+1010+ inherit (lib)1111+ getExe1212+ mkEnableOption1313+ mkIf1414+ mkOption1515+ mkPackageOption1616+ escapeShellArgs1717+ concatMapStringsSep1818+ types1919+ literalExpression2020+ ;2121+2222+ pdsadminWrapper =2323+ let2424+ cfgSystemd = config.systemd.services.pds.serviceConfig;2525+ in2626+ pkgs.writeShellScriptBin "pdsadmin" ''2727+ DUMMY_PDS_ENV_FILE="$(mktemp)"2828+ trap 'rm -f "$DUMMY_PDS_ENV_FILE"' EXIT2929+ env "PDS_ENV_FILE=$DUMMY_PDS_ENV_FILE" \3030+ ${escapeShellArgs cfgSystemd.Environment} \3131+ ${concatMapStringsSep " " (envFile: "$(cat ${envFile})") cfgSystemd.EnvironmentFile} \3232+ ${getExe pkgs.pdsadmin} "$@"3333+ '';3434+in3535+# All defaults are from https://github.com/bluesky-social/pds/blob/8b9fc24cec5f30066b0d0b86d2b0ba3d66c2b532/installer.sh3636+{3737+ options.services.pds = {3838+ enable = mkEnableOption "pds";3939+4040+ package = mkPackageOption pkgs "pds" { };4141+4242+ settings = mkOption {4343+ type = types.submodule {4444+ freeformType = types.attrsOf (4545+ types.oneOf [4646+ (types.nullOr types.str)4747+ types.port4848+ ]4949+ );5050+ options = {5151+ PDS_PORT = mkOption {5252+ type = types.port;5353+ default = 3000;5454+ description = "Port to listen on";5555+ };5656+5757+ PDS_HOSTNAME = mkOption {5858+ type = types.str;5959+ example = "pds.example.com";6060+ description = "Instance hostname (base domain name)";6161+ };6262+6363+ PDS_BLOB_UPLOAD_LIMIT = mkOption {6464+ type = types.str;6565+ default = "52428800";6666+ description = "Size limit of uploaded blobs in bytes";6767+ };6868+6969+ PDS_DID_PLC_URL = mkOption {7070+ type = types.str;7171+ default = "https://plc.directory";7272+ description = "URL of DID PLC directory";7373+ };7474+7575+ PDS_BSKY_APP_VIEW_URL = mkOption {7676+ type = types.str;7777+ default = "https://api.bsky.app";7878+ description = "URL of bsky frontend";7979+ };8080+8181+ PDS_BSKY_APP_VIEW_DID = mkOption {8282+ type = types.str;8383+ default = "did:web:api.bsky.app";8484+ description = "DID of bsky frontend";8585+ };8686+8787+ PDS_REPORT_SERVICE_URL = mkOption {8888+ type = types.str;8989+ default = "https://mod.bsky.app";9090+ description = "URL of mod service";9191+ };9292+9393+ PDS_REPORT_SERVICE_DID = mkOption {9494+ type = types.str;9595+ default = "did:plc:ar7c4by46qjdydhdevvrndac";9696+ description = "DID of mod service";9797+ };9898+9999+ PDS_CRAWLERS = mkOption {100100+ type = types.str;101101+ default = "https://bsky.network";102102+ description = "URL of crawlers";103103+ };104104+105105+ PDS_DATA_DIRECTORY = mkOption {106106+ type = types.str;107107+ default = "/var/lib/pds";108108+ description = "Directory to store state";109109+ };110110+111111+ PDS_BLOBSTORE_DISK_LOCATION = mkOption {112112+ type = types.nullOr types.str;113113+ default = "/var/lib/pds/blocks";114114+ description = "Store blobs at this location, set to null to use e.g. S3";115115+ };116116+117117+ LOG_ENABLED = mkOption {118118+ type = types.nullOr types.str;119119+ default = "true";120120+ description = "Enable logging";121121+ };122122+ };123123+ };124124+125125+ description = ''126126+ Environment variables to set for the service. Secrets should be127127+ specified using {option}`environmentFile`.128128+129129+ Refer to <https://github.com/bluesky-social/atproto/blob/main/packages/pds/src/config/env.ts> for available environment variables.130130+ '';131131+ };132132+133133+ environmentFiles = mkOption {134134+ type = types.listOf types.path;135135+ default = [ ];136136+ description = ''137137+ File to load environment variables from. Loaded variables override138138+ values set in {option}`environment`.139139+140140+ Use it to set values of `PDS_JWT_SECRET`, `PDS_ADMIN_PASSWORD`,141141+ and `PDS_PLC_ROTATION_KEY_K256_PRIVATE_KEY_HEX` secrets.142142+ `PDS_JWT_SECRET` and `PDS_ADMIN_PASSWORD` can be generated with143143+ ```144144+ openssl rand --hex 16145145+ ```146146+ `PDS_PLC_ROTATION_KEY_K256_PRIVATE_KEY_HEX` can be generated with147147+ ```148148+ openssl ecparam --name secp256k1 --genkey --noout --outform DER | tail --bytes=+8 | head --bytes=32 | xxd --plain --cols 32149149+ ```150150+ '';151151+ };152152+153153+ pdsadmin = {154154+ enable = mkOption {155155+ type = types.bool;156156+ default = cfg.enable;157157+ defaultText = literalExpression "config.services.pds.enable";158158+ description = "Add pdsadmin script to PATH";159159+ };160160+ };161161+ };162162+163163+ config = mkIf cfg.enable {164164+ environment = mkIf cfg.pdsadmin.enable {165165+ systemPackages = [ pdsadminWrapper ];166166+ };167167+168168+ systemd.services.pds = {169169+ description = "pds";170170+171171+ after = [ "network-online.target" ];172172+ wants = [ "network-online.target" ];173173+ wantedBy = [ "multi-user.target" ];174174+175175+ serviceConfig = {176176+ ExecStart = getExe cfg.package;177177+ Environment = lib.mapAttrsToList (k: v: "${k}=${if builtins.isInt v then toString v else v}") (178178+ lib.filterAttrs (_: v: v != null) cfg.settings179179+ );180180+181181+ EnvironmentFile = cfg.environmentFiles;182182+ User = "pds";183183+ Group = "pds";184184+ StateDirectory = "pds";185185+ StateDirectoryMode = "0755";186186+ Restart = "always";187187+188188+ # Hardening189189+ RemoveIPC = true;190190+ CapabilityBoundingSet = [ "CAP_NET_BIND_SERVICE" ];191191+ NoNewPrivileges = true;192192+ PrivateDevices = true;193193+ ProtectClock = true;194194+ ProtectKernelLogs = true;195195+ ProtectControlGroups = true;196196+ ProtectKernelModules = true;197197+ PrivateMounts = true;198198+ SystemCallArchitectures = [ "native" ];199199+ MemoryDenyWriteExecute = false; # required by V8 JIT200200+ RestrictNamespaces = true;201201+ RestrictSUIDSGID = true;202202+ ProtectHostname = true;203203+ LockPersonality = true;204204+ ProtectKernelTunables = true;205205+ RestrictAddressFamilies = [206206+ "AF_UNIX"207207+ "AF_INET"208208+ "AF_INET6"209209+ ];210210+ RestrictRealtime = true;211211+ DeviceAllow = [ "" ];212212+ ProtectSystem = "strict";213213+ ProtectProc = "invisible";214214+ ProcSubset = "pid";215215+ ProtectHome = true;216216+ PrivateUsers = true;217217+ PrivateTmp = true;218218+ UMask = "0077";219219+ };220220+ };221221+222222+ users = {223223+ users.pds = {224224+ group = "pds";225225+ isSystemUser = true;226226+ };227227+ groups.pds = { };228228+ };229229+230230+ };231231+232232+ meta.maintainers = with lib.maintainers; [ t4ccer ];233233+}
+1-1
nixos/modules/services/web-servers/merecat.nix
···3030 inherit (format) type;3131 default = { };3232 description = ''3333- Merecat configuration. Refer to merecat(8) for details on supported values.3333+ Merecat configuration. Refer to {manpage}`merecat(8)` for details on supported values.3434 '';3535 example = {3636 hostname = "localhost";
+1-1
nixos/modules/services/web-servers/minio.nix
···7272 description = ''7373 File containing the MINIO_ROOT_USER, default is "minioadmin", and7474 MINIO_ROOT_PASSWORD (length >= 8), default is "minioadmin"; in the format of7575- an EnvironmentFile=, as described by systemd.exec(5).7575+ an EnvironmentFile=, as described by {manpage}`systemd.exec(5)`.7676 '';7777 example = "/etc/nixos/minio-root-credentials";7878 };
+1-1
nixos/modules/services/web-servers/pomerium.nix
···5050 default = null;5151 description = ''5252 Path to file containing secrets for Pomerium, in systemd5353- EnvironmentFile format. See the systemd.exec(5) man page.5353+ EnvironmentFile format. See the {manpage}`systemd.exec(5)` man page.5454 '';5555 };5656 };
+1-1
nixos/modules/services/web-servers/uwsgi.nix
···200200 '';201201 description = ''202202 Grant capabilities to the uWSGI instance. See the203203- `capabilities(7)` for available values.203203+ {manpage}`capabilities(7)` for available values.204204205205 ::: {.note}206206 uWSGI runs as an unprivileged user (even as Emperor) with the minimal
···2727 which allows users to start X manually via the "startx" command2828 from a vt shell. The X server runs under the user's id, not as root.2929 The user must provide a ~/.xinitrc file containing session startup3030- commands, see startx(1). This is not automatically generated3030+ commands, see {manpage}`startx(1)`. This is not automatically generated3131 from the desktopManager and windowManager settings.3232 '';3333 };
···1818 to start manually via the "sx" command from a vt shell. The X server1919 runs under the user's id, not as root. The user must provide a2020 ~/.config/sx/sxrc file containing session startup commands, see2121- sx(1). This is not automatically generated from the desktopManager2121+ {manpage}`sx(1)`. This is not automatically generated from the desktopManager2222 and windowManager settings. sx doesn't have a way to directly set2323 X server flags, but it can be done by overriding its xorgserver2424 dependency.
+3-3
nixos/modules/services/x11/picom.nix
···126126 ];127127 description = ''128128 List of conditions of windows that should not be faded.129129- See `picom(1)` man page for more examples.129129+ See {manpage}`picom(1)` man page for more examples.130130 '';131131 };132132···172172 ];173173 description = ''174174 List of conditions of windows that should have no shadow.175175- See `picom(1)` man page for more examples.175175+ See {manpage}`picom(1)` man page for more examples.176176 '';177177 };178178···326326 description = ''327327 Picom settings. Use this option to configure Picom settings not exposed328328 in a NixOS option or to bypass one. For the available options see the329329- CONFIGURATION FILES section at `picom(1)`.329329+ CONFIGURATION FILES section at {manpage}`picom(1)`.330330 '';331331 };332332 };
···203203 type = types.nullOr types.path;204204 visible = false;205205 description = ''206206- The env(1) executable that is linked system-wide to206206+ The {manpage}`env(1)` executable that is linked system-wide to207207 `/usr/bin/env`.208208 '';209209 };
+1-1
nixos/modules/system/boot/systemd/coredump.nix
···2929 type = types.lines;3030 example = "Storage=journal";3131 description = ''3232- Extra config options for systemd-coredump. See coredump.conf(5) man page3232+ Extra config options for systemd-coredump. See {manpage}`coredump.conf(5)` man page3333 for available options.3434 '';3535 };
+1-1
nixos/modules/system/boot/systemd/initrd.nix
···163163 type = types.lines;164164 example = "DefaultLimitCORE=infinity";165165 description = ''166166- Extra config options for systemd. See systemd-system.conf(5) man page166166+ Extra config options for systemd. See {manpage}`systemd-system.conf(5)` man page167167 for available options.168168 '';169169 };
+1-1
nixos/modules/system/boot/systemd/logind.nix
···2929 example = "IdleAction=lock";3030 description = ''3131 Extra config options for systemd-logind.3232- See [logind.conf(5)](https://www.freedesktop.org/software/systemd/man/logind.conf.html)3232+ See {manpage}`logind.conf(5)`3333 for available options.3434 '';3535 };
+2-2
nixos/modules/system/boot/timesyncd.nix
···2828 `timesyncd.conf` file as opposed to setting this option to null which2929 will remove `NTP=` entirely.30303131- See man:timesyncd.conf(5) for details.3131+ See {manpage}`timesyncd.conf(5)` for details.3232 '';3333 };3434 fallbackServers = mkOption {···4242 `timesyncd.conf` file as opposed to setting this option to null which4343 will remove `FallbackNTP=` entirely.44444545- See man:timesyncd.conf(5) for details.4545+ See {manpage}`timesyncd.conf(5)` for details.4646 '';4747 };4848 extraConfig = mkOption {
+1-1
nixos/modules/tasks/filesystems/nfs.nix
···9999 default = { };100100 description = ''101101 General configuration for NFS daemons and tools.102102- See nfs.conf(5) and related man pages for details.102102+ See {manpage}`nfs.conf(5)` and related man pages for details.103103 '';104104 example = lib.literalExpression ''105105 {
+2-2
nixos/modules/tasks/network-interfaces.nix
···9797 default = null;9898 description = ''9999 Type of the route. See the `Route types` section100100- in the `ip-route(8)` manual page for the details.100100+ in the {manpage}`ip-route(8)` manual page for the details.101101102102 Note that `prohibit`, `blackhole`,103103 `unreachable`, and `throw` cannot···118118 example = { mtu = "1492"; window = "524288"; };119119 description = ''120120 Other route options. See the symbol `OPTIONS`121121- in the `ip-route(8)` manual page for the details.121121+ in the {manpage}`ip-route(8)` manual page for the details.122122 You may also specify `metric`,123123 `src`, `protocol`,124124 `scope`, `from`
+1-1
nixos/modules/virtualisation/docker.nix
···3434 default = ["/run/docker.sock"];3535 description = ''3636 A list of unix and tcp docker should listen to. The format follows3737- ListenStream as described in systemd.socket(5).3737+ ListenStream as described in {manpage}`systemd.socket(5)`.3838 '';3939 };4040
+5-5
nixos/modules/virtualisation/nixos-containers.nix
···349349 Device node access modifier. Takes a combination350350 `r` (read), `w` (write), and351351 `m` (mknod). See the352352- `systemd.resource-control(5)` man page for more352352+ {manpage}`systemd.resource-control(5)` man page for more353353 information.'';354354 };355355 };···563563 example = [ "CAP_NET_ADMIN" "CAP_MKNOD" ];564564 description = ''565565 Grant additional capabilities to the container. See the566566- capabilities(7) and systemd-nspawn(1) man pages for more566566+ {manpage}`capabilities(7)` and {manpage}`systemd-nspawn(1)` man pages for more567567 information.568568 '';569569 };···644644 shall run in. The specified path should refer to a (possibly bind-mounted) network645645 namespace file, as exposed by the kernel below /proc/<PID>/ns/net. This makes the646646 container enter the given network namespace. One of the typical use cases is to give647647- a network namespace under /run/netns created by ip-netns(8).647647+ a network namespace under /run/netns created by {manpage}`ip-netns(8)`.648648 Note that this option cannot be used together with other network-related options,649649 such as --private-network or --network-interface=.650650 '';···737737 Mounts a set of tmpfs file systems into the container.738738 Multiple paths can be specified.739739 Valid items must conform to the --tmpfs argument740740- of systemd-nspawn. See systemd-nspawn(1) for details.740740+ of systemd-nspawn. See {manpage}`systemd-nspawn(1)` for details.741741 '';742742 };743743···747747 example = [ "--drop-capability=CAP_SYS_CHROOT" ];748748 description = ''749749 Extra flags passed to the systemd-nspawn command.750750- See systemd-nspawn(1) for details.750750+ See {manpage}`systemd-nspawn(1)` for details.751751 '';752752 };753753
+1-1
nixos/modules/virtualisation/oci-containers.nix
···155155 [Docker engine documentation](https://docs.docker.com/engine/logging/configure/)156156157157 For Podman:158158- Refer to the docker-run(1) man page.158158+ Refer to the {manpage}`docker-run(1)` man page.159159 '';160160 };161161
+1-1
nixos/modules/virtualisation/waagent.nix
···151151 ];152152 description = ''153153 This option specifies disk mount options to be passed to the `mount -o` command.154154- For more information, see the `mount(8)` manual page.154154+ For more information, see the {manpage}`mount(8)` manual page.155155 '';156156 };157157
···7788buildNpmPackage rec {99 pname = "asf-ui";1010- version = "c316254ddaf7837e7d43145268b53f91f23027dc";1010+ version = "6be24065cd4904389d94140f4ed1f6738b1f7fbb";11111212 src = fetchFromGitHub {1313 owner = "JustArchiNET";···1515 # updated by the update script1616 # this is always the commit that should be used with asf-ui from the latest asf version1717 rev = version;1818- hash = "sha256-teM8x1/O5QFO7bMGc474Dp9ssOLfdmYkDt7PIuvJ4Ss=";1818+ hash = "sha256-DFl+DCNj4JFKZG1awX5rlsHzj+67OFyBj9d16zDiKRA=";1919 };20202121- npmDepsHash = "sha256-8KqIUSWaeu5Tk8lw8F1O6KkXUfNqvjgxRNCePEMeLDo=";2121+ npmDepsHash = "sha256-jZSiWZDckfGfgrBMHTX/sm7Pcl5ap3lfmwGi8SHXqu8=";22222323 installPhase = ''2424 runHook preInstall
···1515 version = "1.3.2";16161717 configureFlags = [1818+ # This is to add "#include" directives for stdlib.h, stdio.h and string.h.1919+ "ac_cv_header_stdc=yes"2020+1821 "--with-checksum=${checksumType}"1922 ];2023
···34343535 # Kernel dependencies3636 kernel ? null,3737+ kernelModuleMakeFlags ? [ ],3738 enablePython ? true,3839 ...3940 }@outerArgs:···192191 "--with-linux=${kernel.dev}/lib/modules/${kernel.modDirVersion}/source"193192 "--with-linux-obj=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build"194193 ]195195- ++ kernel.moduleMakeFlags194194+ ++ kernelModuleMakeFlags196195 );197196198198- makeFlags = optionals buildKernel kernel.moduleMakeFlags;197197+ makeFlags = optionals buildKernel kernelModuleMakeFlags;199198200199 enableParallelBuilding = true;201200···265264 outputs = [ "out" ] ++ optionals buildUser [ "dev" ];266265267266 passthru = {267267+ inherit kernel;268268 inherit enableMail kernelModuleAttribute;269269 latestCompatibleLinuxPackages = lib.warn "zfs.latestCompatibleLinuxPackages is deprecated and is now pointing at the default kernel. If using the stable LTS kernel (default `linuxPackages` is not possible then you must explicitly pin a specific kernel release. For example, `boot.kernelPackages = pkgs.linuxPackages_6_6`. Please be aware that non-LTS kernels are likely to go EOL before ZFS supports the latest supported non-LTS release, requiring manual intervention." linuxPackages;270270