Clone of https://github.com/NixOS/nixpkgs.git (to stress-test knotserver)

nixos/*: remove trailing period in mkEnableOptions

those are added by mkEnableOption, and .. is replaced to … by markdown
processing.

authored by pennae and committed by pennae bf4c0c19 2f9d71af

+39 -39
+1 -1
nixos/modules/config/stevenblack.nix
··· 15 15 in 16 16 { 17 17 options.networking.stevenblack = { 18 - enable = mkEnableOption (mdDoc "Enable the stevenblack hosts file blocklist."); 18 + enable = mkEnableOption (mdDoc "Enable the stevenblack hosts file blocklist"); 19 19 20 20 block = mkOption { 21 21 type = types.listOf (types.enum [ "fakenews" "gambling" "porn" "social" ]);
+1 -1
nixos/modules/programs/proxychains.nix
··· 86 86 description = lib.mdDoc "Proxy DNS requests - no leak for DNS data."; 87 87 }; 88 88 89 - quietMode = mkEnableOption (lib.mdDoc "Quiet mode (no output from the library)."); 89 + quietMode = mkEnableOption (lib.mdDoc "Quiet mode (no output from the library)"); 90 90 91 91 remoteDNSSubnet = mkOption { 92 92 type = types.enum [ 10 127 224 ];
+1 -1
nixos/modules/security/polkit.nix
··· 14 14 15 15 security.polkit.enable = mkEnableOption (lib.mdDoc "polkit"); 16 16 17 - security.polkit.debug = mkEnableOption (lib.mdDoc "debug logs from polkit. This is required in order to see log messages from rule definitions."); 17 + security.polkit.debug = mkEnableOption (lib.mdDoc "debug logs from polkit. This is required in order to see log messages from rule definitions"); 18 18 19 19 security.polkit.extraConfig = mkOption { 20 20 type = types.lines;
+1 -1
nixos/modules/services/backup/zfs-replication.nix
··· 9 9 in { 10 10 options = { 11 11 services.zfs.autoReplication = { 12 - enable = mkEnableOption (lib.mdDoc "ZFS snapshot replication."); 12 + enable = mkEnableOption (lib.mdDoc "ZFS snapshot replication"); 13 13 14 14 followDelete = mkOption { 15 15 description = lib.mdDoc "Remove remote snapshots that don't have a local correspondent.";
+1 -1
nixos/modules/services/cluster/kubernetes/addon-manager.nix
··· 62 62 ''; 63 63 }; 64 64 65 - enable = mkEnableOption (lib.mdDoc "Kubernetes addon manager."); 65 + enable = mkEnableOption (lib.mdDoc "Kubernetes addon manager"); 66 66 }; 67 67 68 68 ###### implementation
+1 -1
nixos/modules/services/cluster/kubernetes/kubelet.nix
··· 146 146 default = "unix:///run/containerd/containerd.sock"; 147 147 }; 148 148 149 - enable = mkEnableOption (lib.mdDoc "Kubernetes kubelet."); 149 + enable = mkEnableOption (lib.mdDoc "Kubernetes kubelet"); 150 150 151 151 extraOpts = mkOption { 152 152 description = lib.mdDoc "Kubernetes kubelet extra command line options.";
+2 -2
nixos/modules/services/desktops/gnome/evolution-data-server.nix
··· 27 27 options = { 28 28 29 29 services.gnome.evolution-data-server = { 30 - enable = mkEnableOption (lib.mdDoc "Evolution Data Server, a collection of services for storing addressbooks and calendars."); 30 + enable = mkEnableOption (lib.mdDoc "Evolution Data Server, a collection of services for storing addressbooks and calendars"); 31 31 plugins = mkOption { 32 32 type = types.listOf types.package; 33 33 default = [ ]; ··· 35 35 }; 36 36 }; 37 37 programs.evolution = { 38 - enable = mkEnableOption (lib.mdDoc "Evolution, a Personal information management application that provides integrated mail, calendaring and address book functionality."); 38 + enable = mkEnableOption (lib.mdDoc "Evolution, a Personal information management application that provides integrated mail, calendaring and address book functionality"); 39 39 plugins = mkOption { 40 40 type = types.listOf types.package; 41 41 default = [ ];
+1 -1
nixos/modules/services/development/zammad.nix
··· 28 28 29 29 options = { 30 30 services.zammad = { 31 - enable = mkEnableOption (lib.mdDoc "Zammad, a web-based, open source user support/ticketing solution."); 31 + enable = mkEnableOption (lib.mdDoc "Zammad, a web-based, open source user support/ticketing solution"); 32 32 33 33 package = mkOption { 34 34 type = types.package;
+1 -1
nixos/modules/services/games/freeciv.nix
··· 54 54 default = 0; 55 55 description = lib.mdDoc "Set debug log level."; 56 56 }; 57 - options.exit-on-end = mkEnableOption (lib.mdDoc "exit instead of restarting when a game ends."); 57 + options.exit-on-end = mkEnableOption (lib.mdDoc "exit instead of restarting when a game ends"); 58 58 options.Guests = mkEnableOption (lib.mdDoc "guests to login if auth is enabled"); 59 59 options.Newusers = mkEnableOption (lib.mdDoc "new users to login if auth is enabled"); 60 60 options.port = mkOption {
+1 -1
nixos/modules/services/hardware/udisks2.nix
··· 19 19 20 20 services.udisks2 = { 21 21 22 - enable = mkEnableOption (lib.mdDoc "udisks2, a DBus service that allows applications to query and manipulate storage devices."); 22 + enable = mkEnableOption (lib.mdDoc "udisks2, a DBus service that allows applications to query and manipulate storage devices"); 23 23 24 24 settings = mkOption rec { 25 25 type = types.attrsOf settingsFormat.type;
+7 -7
nixos/modules/services/mail/dovecot.nix
··· 171 171 options.services.dovecot2 = { 172 172 enable = mkEnableOption (lib.mdDoc "the dovecot 2.x POP3/IMAP server"); 173 173 174 - enablePop3 = mkEnableOption (lib.mdDoc "starting the POP3 listener (when Dovecot is enabled)."); 174 + enablePop3 = mkEnableOption (lib.mdDoc "starting the POP3 listener (when Dovecot is enabled)"); 175 175 176 - enableImap = mkEnableOption (lib.mdDoc "starting the IMAP listener (when Dovecot is enabled).") // { default = true; }; 176 + enableImap = mkEnableOption (lib.mdDoc "starting the IMAP listener (when Dovecot is enabled)") // { default = true; }; 177 177 178 - enableLmtp = mkEnableOption (lib.mdDoc "starting the LMTP listener (when Dovecot is enabled)."); 178 + enableLmtp = mkEnableOption (lib.mdDoc "starting the LMTP listener (when Dovecot is enabled)"); 179 179 180 180 protocols = mkOption { 181 181 type = types.listOf types.str; ··· 300 300 description = lib.mdDoc "Path to the server's private key."; 301 301 }; 302 302 303 - enablePAM = mkEnableOption (lib.mdDoc "creating a own Dovecot PAM service and configure PAM user logins.") // { default = true; }; 303 + enablePAM = mkEnableOption (lib.mdDoc "creating a own Dovecot PAM service and configure PAM user logins") // { default = true; }; 304 304 305 - enableDHE = mkEnableOption (lib.mdDoc "enable ssl_dh and generation of primes for the key exchange.") // { default = true; }; 305 + enableDHE = mkEnableOption (lib.mdDoc "enable ssl_dh and generation of primes for the key exchange") // { default = true; }; 306 306 307 307 sieveScripts = mkOption { 308 308 type = types.attrsOf types.path; ··· 310 310 description = lib.mdDoc "Sieve scripts to be executed. Key is a sequence, e.g. 'before2', 'after' etc."; 311 311 }; 312 312 313 - showPAMFailure = mkEnableOption (lib.mdDoc "showing the PAM failure message on authentication error (useful for OTPW)."); 313 + showPAMFailure = mkEnableOption (lib.mdDoc "showing the PAM failure message on authentication error (useful for OTPW)"); 314 314 315 315 mailboxes = mkOption { 316 316 type = with types; coercedTo ··· 326 326 description = lib.mdDoc "Configure mailboxes and auto create or subscribe them."; 327 327 }; 328 328 329 - enableQuota = mkEnableOption (lib.mdDoc "the dovecot quota service."); 329 + enableQuota = mkEnableOption (lib.mdDoc "the dovecot quota service"); 330 330 331 331 quotaPort = mkOption { 332 332 type = types.str;
+1 -1
nixos/modules/services/misc/atuin.nix
··· 8 8 { 9 9 options = { 10 10 services.atuin = { 11 - enable = mkEnableOption (mdDoc "Enable server for shell history sync with atuin."); 11 + enable = mkEnableOption (mdDoc "Enable server for shell history sync with atuin"); 12 12 13 13 openRegistration = mkOption { 14 14 type = types.bool;
+1 -1
nixos/modules/services/misc/input-remapper.nix
··· 6 6 { 7 7 options = { 8 8 services.input-remapper = { 9 - enable = mkEnableOption (lib.mdDoc "input-remapper, an easy to use tool to change the mapping of your input device buttons."); 9 + enable = mkEnableOption (lib.mdDoc "input-remapper, an easy to use tool to change the mapping of your input device buttons"); 10 10 package = mkPackageOptionMD pkgs "input-remapper" { }; 11 11 enableUdevRules = mkEnableOption (lib.mdDoc "udev rules added by input-remapper to handle hotplugged devices. Currently disabled by default due to https://github.com/sezanzeb/input-remapper/issues/140"); 12 12 serviceWantedBy = mkOption {
+1 -1
nixos/modules/services/misc/sourcehut/default.nix
··· 438 438 }; 439 439 440 440 options."lists.sr.ht" = commonServiceSettings "lists" // { 441 - allow-new-lists = mkEnableOption (lib.mdDoc "Allow creation of new lists."); 441 + allow-new-lists = mkEnableOption (lib.mdDoc "Allow creation of new lists"); 442 442 notify-from = mkOption { 443 443 description = lib.mdDoc "Outgoing email for notifications generated by users."; 444 444 type = types.str;
+1 -1
nixos/modules/services/monitoring/mackerel-agent.nix
··· 11 11 12 12 # the upstream package runs as root, but doesn't seem to be strictly 13 13 # necessary for basic functionality 14 - runAsRoot = mkEnableOption (lib.mdDoc "Whether to run as root."); 14 + runAsRoot = mkEnableOption (lib.mdDoc "Whether to run as root"); 15 15 16 16 autoRetirement = mkEnableOption (lib.mdDoc '' 17 17 Whether to automatically retire the host upon OS shutdown.
+3 -3
nixos/modules/services/monitoring/prometheus/exporters/unpoller.nix
··· 24 24 inherit (options.services.unpoller.unifi) controllers; 25 25 inherit (options.services.unpoller) loki; 26 26 log = { 27 - debug = mkEnableOption (lib.mdDoc "debug logging including line numbers, high resolution timestamps, per-device logs."); 28 - quiet = mkEnableOption (lib.mdDoc "startup and error logs only."); 29 - prometheusErrors = mkEnableOption (lib.mdDoc "emitting errors to prometheus."); 27 + debug = mkEnableOption (lib.mdDoc "debug logging including line numbers, high resolution timestamps, per-device logs"); 28 + quiet = mkEnableOption (lib.mdDoc "startup and error logs only"); 29 + prometheusErrors = mkEnableOption (lib.mdDoc "emitting errors to prometheus"); 30 30 }; 31 31 }; 32 32
+2 -2
nixos/modules/services/monitoring/uptime-kuma.nix
··· 11 11 12 12 options = { 13 13 services.uptime-kuma = { 14 - enable = mkEnableOption (mdDoc "Uptime Kuma, this assumes a reverse proxy to be set."); 14 + enable = mkEnableOption (mdDoc "Uptime Kuma, this assumes a reverse proxy to be set"); 15 15 16 16 package = mkOption { 17 17 type = types.package; ··· 20 20 description = lib.mdDoc "Uptime Kuma package to use."; 21 21 }; 22 22 23 - appriseSupport = mkEnableOption (mdDoc "apprise support for notifications."); 23 + appriseSupport = mkEnableOption (mdDoc "apprise support for notifications"); 24 24 25 25 settings = lib.mkOption { 26 26 type = lib.types.submodule { freeformType = with lib.types; attrsOf str; };
+3 -3
nixos/modules/services/network-filesystems/moosefs.nix
··· 85 85 description = lib.mdDoc "Run daemons as user moosefs instead of root."; 86 86 }; 87 87 88 - client.enable = mkEnableOption (lib.mdDoc "Moosefs client."); 88 + client.enable = mkEnableOption (lib.mdDoc "Moosefs client"); 89 89 90 90 master = { 91 91 enable = mkOption { ··· 131 131 }; 132 132 133 133 metalogger = { 134 - enable = mkEnableOption (lib.mdDoc "Moosefs metalogger daemon."); 134 + enable = mkEnableOption (lib.mdDoc "Moosefs metalogger daemon"); 135 135 136 136 settings = mkOption { 137 137 type = types.submodule { ··· 149 149 }; 150 150 151 151 chunkserver = { 152 - enable = mkEnableOption (lib.mdDoc "Moosefs chunkserver daemon."); 152 + enable = mkEnableOption (lib.mdDoc "Moosefs chunkserver daemon"); 153 153 154 154 openFirewall = mkOption { 155 155 type = types.bool;
+1 -1
nixos/modules/services/networking/blockbook-frontend.nix
··· 10 10 11 11 options = { 12 12 13 - enable = mkEnableOption (lib.mdDoc "blockbook-frontend application."); 13 + enable = mkEnableOption (lib.mdDoc "blockbook-frontend application"); 14 14 15 15 package = mkOption { 16 16 type = types.package;
+1 -1
nixos/modules/services/security/kanidm.nix
··· 55 55 options.services.kanidm = { 56 56 enableClient = lib.mkEnableOption (lib.mdDoc "the Kanidm client"); 57 57 enableServer = lib.mkEnableOption (lib.mdDoc "the Kanidm server"); 58 - enablePam = lib.mkEnableOption (lib.mdDoc "the Kanidm PAM and NSS integration."); 58 + enablePam = lib.mkEnableOption (lib.mdDoc "the Kanidm PAM and NSS integration"); 59 59 60 60 serverSettings = lib.mkOption { 61 61 type = lib.types.submodule {
+1 -1
nixos/modules/services/web-apps/cloudlog.nix
··· 68 68 in 69 69 { 70 70 options.services.cloudlog = with types; { 71 - enable = mkEnableOption (mdDoc "Whether to enable Cloudlog."); 71 + enable = mkEnableOption (mdDoc "Whether to enable Cloudlog"); 72 72 dataDir = mkOption { 73 73 type = str; 74 74 default = "/var/lib/cloudlog";
+1 -1
nixos/modules/services/web-apps/dokuwiki.nix
··· 148 148 ]; 149 149 150 150 options = { 151 - enable = mkEnableOption (lib.mdDoc "DokuWiki web application."); 151 + enable = mkEnableOption (lib.mdDoc "DokuWiki web application"); 152 152 153 153 package = mkOption { 154 154 type = types.package;
+1 -1
nixos/modules/services/web-apps/galene.nix
··· 12 12 { 13 13 options = { 14 14 services.galene = { 15 - enable = mkEnableOption (lib.mdDoc "Galene Service."); 15 + enable = mkEnableOption (lib.mdDoc "Galene Service"); 16 16 17 17 stateDir = mkOption { 18 18 default = defaultstateDir;
+1 -1
nixos/modules/services/web-apps/hledger-web.nix
··· 7 7 8 8 enable = mkEnableOption (lib.mdDoc "hledger-web service"); 9 9 10 - serveApi = mkEnableOption (lib.mdDoc "Serve only the JSON web API, without the web UI."); 10 + serveApi = mkEnableOption (lib.mdDoc "Serve only the JSON web API, without the web UI"); 11 11 12 12 host = mkOption { 13 13 type = types.str;
+1 -1
nixos/modules/services/web-apps/jirafeau.nix
··· 36 36 description = lib.mdDoc "Location of Jirafeau storage directory."; 37 37 }; 38 38 39 - enable = mkEnableOption (lib.mdDoc "Jirafeau file upload application."); 39 + enable = mkEnableOption (lib.mdDoc "Jirafeau file upload application"); 40 40 41 41 extraConfig = mkOption { 42 42 type = types.lines;
+1 -1
nixos/modules/services/web-apps/limesurvey.nix
··· 32 32 # interface 33 33 34 34 options.services.limesurvey = { 35 - enable = mkEnableOption (lib.mdDoc "Limesurvey web application."); 35 + enable = mkEnableOption (lib.mdDoc "Limesurvey web application"); 36 36 37 37 database = { 38 38 type = mkOption {
+1 -1
nixos/modules/system/boot/kernel.nix
··· 20 20 ###### interface 21 21 22 22 options = { 23 - boot.kernel.enable = mkEnableOption (lib.mdDoc "the Linux kernel. This is useful for systemd-like containers which do not require a kernel.") // { 23 + boot.kernel.enable = mkEnableOption (lib.mdDoc "the Linux kernel. This is useful for systemd-like containers which do not require a kernel") // { 24 24 default = true; 25 25 }; 26 26