Clone of https://github.com/NixOS/nixpkgs.git (to stress-test knotserver)

nixos/*: remove trailing period in mkEnableOptions

those are added by mkEnableOption, and .. is replaced to … by markdown
processing.

authored by pennae and committed by pennae bf4c0c19 2f9d71af

+39 -39
+1 -1
nixos/modules/config/stevenblack.nix
··· 15 in 16 { 17 options.networking.stevenblack = { 18 - enable = mkEnableOption (mdDoc "Enable the stevenblack hosts file blocklist."); 19 20 block = mkOption { 21 type = types.listOf (types.enum [ "fakenews" "gambling" "porn" "social" ]);
··· 15 in 16 { 17 options.networking.stevenblack = { 18 + enable = mkEnableOption (mdDoc "Enable the stevenblack hosts file blocklist"); 19 20 block = mkOption { 21 type = types.listOf (types.enum [ "fakenews" "gambling" "porn" "social" ]);
+1 -1
nixos/modules/programs/proxychains.nix
··· 86 description = lib.mdDoc "Proxy DNS requests - no leak for DNS data."; 87 }; 88 89 - quietMode = mkEnableOption (lib.mdDoc "Quiet mode (no output from the library)."); 90 91 remoteDNSSubnet = mkOption { 92 type = types.enum [ 10 127 224 ];
··· 86 description = lib.mdDoc "Proxy DNS requests - no leak for DNS data."; 87 }; 88 89 + quietMode = mkEnableOption (lib.mdDoc "Quiet mode (no output from the library)"); 90 91 remoteDNSSubnet = mkOption { 92 type = types.enum [ 10 127 224 ];
+1 -1
nixos/modules/security/polkit.nix
··· 14 15 security.polkit.enable = mkEnableOption (lib.mdDoc "polkit"); 16 17 - security.polkit.debug = mkEnableOption (lib.mdDoc "debug logs from polkit. This is required in order to see log messages from rule definitions."); 18 19 security.polkit.extraConfig = mkOption { 20 type = types.lines;
··· 14 15 security.polkit.enable = mkEnableOption (lib.mdDoc "polkit"); 16 17 + security.polkit.debug = mkEnableOption (lib.mdDoc "debug logs from polkit. This is required in order to see log messages from rule definitions"); 18 19 security.polkit.extraConfig = mkOption { 20 type = types.lines;
+1 -1
nixos/modules/services/backup/zfs-replication.nix
··· 9 in { 10 options = { 11 services.zfs.autoReplication = { 12 - enable = mkEnableOption (lib.mdDoc "ZFS snapshot replication."); 13 14 followDelete = mkOption { 15 description = lib.mdDoc "Remove remote snapshots that don't have a local correspondent.";
··· 9 in { 10 options = { 11 services.zfs.autoReplication = { 12 + enable = mkEnableOption (lib.mdDoc "ZFS snapshot replication"); 13 14 followDelete = mkOption { 15 description = lib.mdDoc "Remove remote snapshots that don't have a local correspondent.";
+1 -1
nixos/modules/services/cluster/kubernetes/addon-manager.nix
··· 62 ''; 63 }; 64 65 - enable = mkEnableOption (lib.mdDoc "Kubernetes addon manager."); 66 }; 67 68 ###### implementation
··· 62 ''; 63 }; 64 65 + enable = mkEnableOption (lib.mdDoc "Kubernetes addon manager"); 66 }; 67 68 ###### implementation
+1 -1
nixos/modules/services/cluster/kubernetes/kubelet.nix
··· 146 default = "unix:///run/containerd/containerd.sock"; 147 }; 148 149 - enable = mkEnableOption (lib.mdDoc "Kubernetes kubelet."); 150 151 extraOpts = mkOption { 152 description = lib.mdDoc "Kubernetes kubelet extra command line options.";
··· 146 default = "unix:///run/containerd/containerd.sock"; 147 }; 148 149 + enable = mkEnableOption (lib.mdDoc "Kubernetes kubelet"); 150 151 extraOpts = mkOption { 152 description = lib.mdDoc "Kubernetes kubelet extra command line options.";
+2 -2
nixos/modules/services/desktops/gnome/evolution-data-server.nix
··· 27 options = { 28 29 services.gnome.evolution-data-server = { 30 - enable = mkEnableOption (lib.mdDoc "Evolution Data Server, a collection of services for storing addressbooks and calendars."); 31 plugins = mkOption { 32 type = types.listOf types.package; 33 default = [ ]; ··· 35 }; 36 }; 37 programs.evolution = { 38 - enable = mkEnableOption (lib.mdDoc "Evolution, a Personal information management application that provides integrated mail, calendaring and address book functionality."); 39 plugins = mkOption { 40 type = types.listOf types.package; 41 default = [ ];
··· 27 options = { 28 29 services.gnome.evolution-data-server = { 30 + enable = mkEnableOption (lib.mdDoc "Evolution Data Server, a collection of services for storing addressbooks and calendars"); 31 plugins = mkOption { 32 type = types.listOf types.package; 33 default = [ ]; ··· 35 }; 36 }; 37 programs.evolution = { 38 + enable = mkEnableOption (lib.mdDoc "Evolution, a Personal information management application that provides integrated mail, calendaring and address book functionality"); 39 plugins = mkOption { 40 type = types.listOf types.package; 41 default = [ ];
+1 -1
nixos/modules/services/development/zammad.nix
··· 28 29 options = { 30 services.zammad = { 31 - enable = mkEnableOption (lib.mdDoc "Zammad, a web-based, open source user support/ticketing solution."); 32 33 package = mkOption { 34 type = types.package;
··· 28 29 options = { 30 services.zammad = { 31 + enable = mkEnableOption (lib.mdDoc "Zammad, a web-based, open source user support/ticketing solution"); 32 33 package = mkOption { 34 type = types.package;
+1 -1
nixos/modules/services/games/freeciv.nix
··· 54 default = 0; 55 description = lib.mdDoc "Set debug log level."; 56 }; 57 - options.exit-on-end = mkEnableOption (lib.mdDoc "exit instead of restarting when a game ends."); 58 options.Guests = mkEnableOption (lib.mdDoc "guests to login if auth is enabled"); 59 options.Newusers = mkEnableOption (lib.mdDoc "new users to login if auth is enabled"); 60 options.port = mkOption {
··· 54 default = 0; 55 description = lib.mdDoc "Set debug log level."; 56 }; 57 + options.exit-on-end = mkEnableOption (lib.mdDoc "exit instead of restarting when a game ends"); 58 options.Guests = mkEnableOption (lib.mdDoc "guests to login if auth is enabled"); 59 options.Newusers = mkEnableOption (lib.mdDoc "new users to login if auth is enabled"); 60 options.port = mkOption {
+1 -1
nixos/modules/services/hardware/udisks2.nix
··· 19 20 services.udisks2 = { 21 22 - enable = mkEnableOption (lib.mdDoc "udisks2, a DBus service that allows applications to query and manipulate storage devices."); 23 24 settings = mkOption rec { 25 type = types.attrsOf settingsFormat.type;
··· 19 20 services.udisks2 = { 21 22 + enable = mkEnableOption (lib.mdDoc "udisks2, a DBus service that allows applications to query and manipulate storage devices"); 23 24 settings = mkOption rec { 25 type = types.attrsOf settingsFormat.type;
+7 -7
nixos/modules/services/mail/dovecot.nix
··· 171 options.services.dovecot2 = { 172 enable = mkEnableOption (lib.mdDoc "the dovecot 2.x POP3/IMAP server"); 173 174 - enablePop3 = mkEnableOption (lib.mdDoc "starting the POP3 listener (when Dovecot is enabled)."); 175 176 - enableImap = mkEnableOption (lib.mdDoc "starting the IMAP listener (when Dovecot is enabled).") // { default = true; }; 177 178 - enableLmtp = mkEnableOption (lib.mdDoc "starting the LMTP listener (when Dovecot is enabled)."); 179 180 protocols = mkOption { 181 type = types.listOf types.str; ··· 300 description = lib.mdDoc "Path to the server's private key."; 301 }; 302 303 - enablePAM = mkEnableOption (lib.mdDoc "creating a own Dovecot PAM service and configure PAM user logins.") // { default = true; }; 304 305 - enableDHE = mkEnableOption (lib.mdDoc "enable ssl_dh and generation of primes for the key exchange.") // { default = true; }; 306 307 sieveScripts = mkOption { 308 type = types.attrsOf types.path; ··· 310 description = lib.mdDoc "Sieve scripts to be executed. Key is a sequence, e.g. 'before2', 'after' etc."; 311 }; 312 313 - showPAMFailure = mkEnableOption (lib.mdDoc "showing the PAM failure message on authentication error (useful for OTPW)."); 314 315 mailboxes = mkOption { 316 type = with types; coercedTo ··· 326 description = lib.mdDoc "Configure mailboxes and auto create or subscribe them."; 327 }; 328 329 - enableQuota = mkEnableOption (lib.mdDoc "the dovecot quota service."); 330 331 quotaPort = mkOption { 332 type = types.str;
··· 171 options.services.dovecot2 = { 172 enable = mkEnableOption (lib.mdDoc "the dovecot 2.x POP3/IMAP server"); 173 174 + enablePop3 = mkEnableOption (lib.mdDoc "starting the POP3 listener (when Dovecot is enabled)"); 175 176 + enableImap = mkEnableOption (lib.mdDoc "starting the IMAP listener (when Dovecot is enabled)") // { default = true; }; 177 178 + enableLmtp = mkEnableOption (lib.mdDoc "starting the LMTP listener (when Dovecot is enabled)"); 179 180 protocols = mkOption { 181 type = types.listOf types.str; ··· 300 description = lib.mdDoc "Path to the server's private key."; 301 }; 302 303 + enablePAM = mkEnableOption (lib.mdDoc "creating a own Dovecot PAM service and configure PAM user logins") // { default = true; }; 304 305 + enableDHE = mkEnableOption (lib.mdDoc "enable ssl_dh and generation of primes for the key exchange") // { default = true; }; 306 307 sieveScripts = mkOption { 308 type = types.attrsOf types.path; ··· 310 description = lib.mdDoc "Sieve scripts to be executed. Key is a sequence, e.g. 'before2', 'after' etc."; 311 }; 312 313 + showPAMFailure = mkEnableOption (lib.mdDoc "showing the PAM failure message on authentication error (useful for OTPW)"); 314 315 mailboxes = mkOption { 316 type = with types; coercedTo ··· 326 description = lib.mdDoc "Configure mailboxes and auto create or subscribe them."; 327 }; 328 329 + enableQuota = mkEnableOption (lib.mdDoc "the dovecot quota service"); 330 331 quotaPort = mkOption { 332 type = types.str;
+1 -1
nixos/modules/services/misc/atuin.nix
··· 8 { 9 options = { 10 services.atuin = { 11 - enable = mkEnableOption (mdDoc "Enable server for shell history sync with atuin."); 12 13 openRegistration = mkOption { 14 type = types.bool;
··· 8 { 9 options = { 10 services.atuin = { 11 + enable = mkEnableOption (mdDoc "Enable server for shell history sync with atuin"); 12 13 openRegistration = mkOption { 14 type = types.bool;
+1 -1
nixos/modules/services/misc/input-remapper.nix
··· 6 { 7 options = { 8 services.input-remapper = { 9 - enable = mkEnableOption (lib.mdDoc "input-remapper, an easy to use tool to change the mapping of your input device buttons."); 10 package = mkPackageOptionMD pkgs "input-remapper" { }; 11 enableUdevRules = mkEnableOption (lib.mdDoc "udev rules added by input-remapper to handle hotplugged devices. Currently disabled by default due to https://github.com/sezanzeb/input-remapper/issues/140"); 12 serviceWantedBy = mkOption {
··· 6 { 7 options = { 8 services.input-remapper = { 9 + enable = mkEnableOption (lib.mdDoc "input-remapper, an easy to use tool to change the mapping of your input device buttons"); 10 package = mkPackageOptionMD pkgs "input-remapper" { }; 11 enableUdevRules = mkEnableOption (lib.mdDoc "udev rules added by input-remapper to handle hotplugged devices. Currently disabled by default due to https://github.com/sezanzeb/input-remapper/issues/140"); 12 serviceWantedBy = mkOption {
+1 -1
nixos/modules/services/misc/sourcehut/default.nix
··· 438 }; 439 440 options."lists.sr.ht" = commonServiceSettings "lists" // { 441 - allow-new-lists = mkEnableOption (lib.mdDoc "Allow creation of new lists."); 442 notify-from = mkOption { 443 description = lib.mdDoc "Outgoing email for notifications generated by users."; 444 type = types.str;
··· 438 }; 439 440 options."lists.sr.ht" = commonServiceSettings "lists" // { 441 + allow-new-lists = mkEnableOption (lib.mdDoc "Allow creation of new lists"); 442 notify-from = mkOption { 443 description = lib.mdDoc "Outgoing email for notifications generated by users."; 444 type = types.str;
+1 -1
nixos/modules/services/monitoring/mackerel-agent.nix
··· 11 12 # the upstream package runs as root, but doesn't seem to be strictly 13 # necessary for basic functionality 14 - runAsRoot = mkEnableOption (lib.mdDoc "Whether to run as root."); 15 16 autoRetirement = mkEnableOption (lib.mdDoc '' 17 Whether to automatically retire the host upon OS shutdown.
··· 11 12 # the upstream package runs as root, but doesn't seem to be strictly 13 # necessary for basic functionality 14 + runAsRoot = mkEnableOption (lib.mdDoc "Whether to run as root"); 15 16 autoRetirement = mkEnableOption (lib.mdDoc '' 17 Whether to automatically retire the host upon OS shutdown.
+3 -3
nixos/modules/services/monitoring/prometheus/exporters/unpoller.nix
··· 24 inherit (options.services.unpoller.unifi) controllers; 25 inherit (options.services.unpoller) loki; 26 log = { 27 - debug = mkEnableOption (lib.mdDoc "debug logging including line numbers, high resolution timestamps, per-device logs."); 28 - quiet = mkEnableOption (lib.mdDoc "startup and error logs only."); 29 - prometheusErrors = mkEnableOption (lib.mdDoc "emitting errors to prometheus."); 30 }; 31 }; 32
··· 24 inherit (options.services.unpoller.unifi) controllers; 25 inherit (options.services.unpoller) loki; 26 log = { 27 + debug = mkEnableOption (lib.mdDoc "debug logging including line numbers, high resolution timestamps, per-device logs"); 28 + quiet = mkEnableOption (lib.mdDoc "startup and error logs only"); 29 + prometheusErrors = mkEnableOption (lib.mdDoc "emitting errors to prometheus"); 30 }; 31 }; 32
+2 -2
nixos/modules/services/monitoring/uptime-kuma.nix
··· 11 12 options = { 13 services.uptime-kuma = { 14 - enable = mkEnableOption (mdDoc "Uptime Kuma, this assumes a reverse proxy to be set."); 15 16 package = mkOption { 17 type = types.package; ··· 20 description = lib.mdDoc "Uptime Kuma package to use."; 21 }; 22 23 - appriseSupport = mkEnableOption (mdDoc "apprise support for notifications."); 24 25 settings = lib.mkOption { 26 type = lib.types.submodule { freeformType = with lib.types; attrsOf str; };
··· 11 12 options = { 13 services.uptime-kuma = { 14 + enable = mkEnableOption (mdDoc "Uptime Kuma, this assumes a reverse proxy to be set"); 15 16 package = mkOption { 17 type = types.package; ··· 20 description = lib.mdDoc "Uptime Kuma package to use."; 21 }; 22 23 + appriseSupport = mkEnableOption (mdDoc "apprise support for notifications"); 24 25 settings = lib.mkOption { 26 type = lib.types.submodule { freeformType = with lib.types; attrsOf str; };
+3 -3
nixos/modules/services/network-filesystems/moosefs.nix
··· 85 description = lib.mdDoc "Run daemons as user moosefs instead of root."; 86 }; 87 88 - client.enable = mkEnableOption (lib.mdDoc "Moosefs client."); 89 90 master = { 91 enable = mkOption { ··· 131 }; 132 133 metalogger = { 134 - enable = mkEnableOption (lib.mdDoc "Moosefs metalogger daemon."); 135 136 settings = mkOption { 137 type = types.submodule { ··· 149 }; 150 151 chunkserver = { 152 - enable = mkEnableOption (lib.mdDoc "Moosefs chunkserver daemon."); 153 154 openFirewall = mkOption { 155 type = types.bool;
··· 85 description = lib.mdDoc "Run daemons as user moosefs instead of root."; 86 }; 87 88 + client.enable = mkEnableOption (lib.mdDoc "Moosefs client"); 89 90 master = { 91 enable = mkOption { ··· 131 }; 132 133 metalogger = { 134 + enable = mkEnableOption (lib.mdDoc "Moosefs metalogger daemon"); 135 136 settings = mkOption { 137 type = types.submodule { ··· 149 }; 150 151 chunkserver = { 152 + enable = mkEnableOption (lib.mdDoc "Moosefs chunkserver daemon"); 153 154 openFirewall = mkOption { 155 type = types.bool;
+1 -1
nixos/modules/services/networking/blockbook-frontend.nix
··· 10 11 options = { 12 13 - enable = mkEnableOption (lib.mdDoc "blockbook-frontend application."); 14 15 package = mkOption { 16 type = types.package;
··· 10 11 options = { 12 13 + enable = mkEnableOption (lib.mdDoc "blockbook-frontend application"); 14 15 package = mkOption { 16 type = types.package;
+1 -1
nixos/modules/services/security/kanidm.nix
··· 55 options.services.kanidm = { 56 enableClient = lib.mkEnableOption (lib.mdDoc "the Kanidm client"); 57 enableServer = lib.mkEnableOption (lib.mdDoc "the Kanidm server"); 58 - enablePam = lib.mkEnableOption (lib.mdDoc "the Kanidm PAM and NSS integration."); 59 60 serverSettings = lib.mkOption { 61 type = lib.types.submodule {
··· 55 options.services.kanidm = { 56 enableClient = lib.mkEnableOption (lib.mdDoc "the Kanidm client"); 57 enableServer = lib.mkEnableOption (lib.mdDoc "the Kanidm server"); 58 + enablePam = lib.mkEnableOption (lib.mdDoc "the Kanidm PAM and NSS integration"); 59 60 serverSettings = lib.mkOption { 61 type = lib.types.submodule {
+1 -1
nixos/modules/services/web-apps/cloudlog.nix
··· 68 in 69 { 70 options.services.cloudlog = with types; { 71 - enable = mkEnableOption (mdDoc "Whether to enable Cloudlog."); 72 dataDir = mkOption { 73 type = str; 74 default = "/var/lib/cloudlog";
··· 68 in 69 { 70 options.services.cloudlog = with types; { 71 + enable = mkEnableOption (mdDoc "Whether to enable Cloudlog"); 72 dataDir = mkOption { 73 type = str; 74 default = "/var/lib/cloudlog";
+1 -1
nixos/modules/services/web-apps/dokuwiki.nix
··· 148 ]; 149 150 options = { 151 - enable = mkEnableOption (lib.mdDoc "DokuWiki web application."); 152 153 package = mkOption { 154 type = types.package;
··· 148 ]; 149 150 options = { 151 + enable = mkEnableOption (lib.mdDoc "DokuWiki web application"); 152 153 package = mkOption { 154 type = types.package;
+1 -1
nixos/modules/services/web-apps/galene.nix
··· 12 { 13 options = { 14 services.galene = { 15 - enable = mkEnableOption (lib.mdDoc "Galene Service."); 16 17 stateDir = mkOption { 18 default = defaultstateDir;
··· 12 { 13 options = { 14 services.galene = { 15 + enable = mkEnableOption (lib.mdDoc "Galene Service"); 16 17 stateDir = mkOption { 18 default = defaultstateDir;
+1 -1
nixos/modules/services/web-apps/hledger-web.nix
··· 7 8 enable = mkEnableOption (lib.mdDoc "hledger-web service"); 9 10 - serveApi = mkEnableOption (lib.mdDoc "Serve only the JSON web API, without the web UI."); 11 12 host = mkOption { 13 type = types.str;
··· 7 8 enable = mkEnableOption (lib.mdDoc "hledger-web service"); 9 10 + serveApi = mkEnableOption (lib.mdDoc "Serve only the JSON web API, without the web UI"); 11 12 host = mkOption { 13 type = types.str;
+1 -1
nixos/modules/services/web-apps/jirafeau.nix
··· 36 description = lib.mdDoc "Location of Jirafeau storage directory."; 37 }; 38 39 - enable = mkEnableOption (lib.mdDoc "Jirafeau file upload application."); 40 41 extraConfig = mkOption { 42 type = types.lines;
··· 36 description = lib.mdDoc "Location of Jirafeau storage directory."; 37 }; 38 39 + enable = mkEnableOption (lib.mdDoc "Jirafeau file upload application"); 40 41 extraConfig = mkOption { 42 type = types.lines;
+1 -1
nixos/modules/services/web-apps/limesurvey.nix
··· 32 # interface 33 34 options.services.limesurvey = { 35 - enable = mkEnableOption (lib.mdDoc "Limesurvey web application."); 36 37 database = { 38 type = mkOption {
··· 32 # interface 33 34 options.services.limesurvey = { 35 + enable = mkEnableOption (lib.mdDoc "Limesurvey web application"); 36 37 database = { 38 type = mkOption {
+1 -1
nixos/modules/system/boot/kernel.nix
··· 20 ###### interface 21 22 options = { 23 - boot.kernel.enable = mkEnableOption (lib.mdDoc "the Linux kernel. This is useful for systemd-like containers which do not require a kernel.") // { 24 default = true; 25 }; 26
··· 20 ###### interface 21 22 options = { 23 + boot.kernel.enable = mkEnableOption (lib.mdDoc "the Linux kernel. This is useful for systemd-like containers which do not require a kernel") // { 24 default = true; 25 }; 26