summaryrefslogtreecommitdiffstats
path: root/nixos/modules/services
diff options
context:
space:
mode:
authorSandro <sandro.jaeckel@gmail.com>2024-06-25 22:42:16 +0200
committerGitHub <noreply@github.com>2024-06-25 22:42:16 +0200
commit33f83c62521656d3709e77629a8aae3175ef1dab (patch)
tree4d76374ef368a23122fa3bce6364f185f59f16cb /nixos/modules/services
parent3176d6fb53681394e18f57451240ee2eb05386b2 (diff)
parent7d8742da87c1b06cd6db5eba1fe5a2cf8a7b2568 (diff)
Merge pull request #316977 from eclairevoyant/fix-mkEnableOption
treewide: fix mkEnableOption usage
Diffstat (limited to 'nixos/modules/services')
-rw-r--r--nixos/modules/services/databases/memcached.nix2
-rw-r--r--nixos/modules/services/matrix/mautrix-signal.nix2
-rw-r--r--nixos/modules/services/matrix/mautrix-whatsapp.nix2
-rw-r--r--nixos/modules/services/misc/mqtt2influxdb.nix2
-rw-r--r--nixos/modules/services/misc/paperless.nix2
-rw-r--r--nixos/modules/services/misc/portunus.nix2
-rw-r--r--nixos/modules/services/misc/spice-autorandr.nix2
-rw-r--r--nixos/modules/services/monitoring/rustdesk-server.nix2
-rw-r--r--nixos/modules/services/monitoring/thanos.nix2
-rw-r--r--nixos/modules/services/monitoring/ups.nix4
-rw-r--r--nixos/modules/services/network-filesystems/openafs/server.nix2
-rw-r--r--nixos/modules/services/network-filesystems/samba-wsdd.nix2
-rw-r--r--nixos/modules/services/networking/gns3-server.nix6
-rw-r--r--nixos/modules/services/networking/haproxy.nix2
-rw-r--r--nixos/modules/services/networking/hylafax/options.nix4
-rw-r--r--nixos/modules/services/networking/netbird/dashboard.nix2
-rw-r--r--nixos/modules/services/networking/netbird/management.nix4
-rw-r--r--nixos/modules/services/networking/netbird/server.nix2
-rw-r--r--nixos/modules/services/networking/netbird/signal.nix2
-rw-r--r--nixos/modules/services/networking/networkd-dispatcher.nix2
-rw-r--r--nixos/modules/services/networking/nncp.nix4
-rw-r--r--nixos/modules/services/security/fail2ban.nix2
-rw-r--r--nixos/modules/services/security/haveged.nix2
-rw-r--r--nixos/modules/services/web-apps/audiobookshelf.nix2
-rw-r--r--nixos/modules/services/web-apps/jitsi-meet.nix2
-rw-r--r--nixos/modules/services/web-apps/nextcloud.nix4
-rw-r--r--nixos/modules/services/web-apps/pretix.nix2
-rw-r--r--nixos/modules/services/web-apps/silverbullet.nix2
-rw-r--r--nixos/modules/services/web-apps/suwayomi-server.nix4
-rw-r--r--nixos/modules/services/web-servers/nginx/default.nix6
30 files changed, 39 insertions, 41 deletions
diff --git a/nixos/modules/services/databases/memcached.nix b/nixos/modules/services/databases/memcached.nix
index e38931b6b7ea..7a3afc5efafc 100644
--- a/nixos/modules/services/databases/memcached.nix
+++ b/nixos/modules/services/databases/memcached.nix
@@ -37,7 +37,7 @@ in
description = "The port to bind to.";
};
- enableUnixSocket = mkEnableOption "Unix Domain Socket at /run/memcached/memcached.sock instead of listening on an IP address and port. The `listen` and `port` options are ignored.";
+ enableUnixSocket = mkEnableOption "Unix Domain Socket at /run/memcached/memcached.sock instead of listening on an IP address and port. The `listen` and `port` options are ignored";
maxMemory = mkOption {
type = types.ints.unsigned;
diff --git a/nixos/modules/services/matrix/mautrix-signal.nix b/nixos/modules/services/matrix/mautrix-signal.nix
index faca10551abb..0da95b9c8a7b 100644
--- a/nixos/modules/services/matrix/mautrix-signal.nix
+++ b/nixos/modules/services/matrix/mautrix-signal.nix
@@ -52,7 +52,7 @@ let
in
{
options.services.mautrix-signal = {
- enable = lib.mkEnableOption "mautrix-signal, a Matrix-Signal puppeting bridge.";
+ enable = lib.mkEnableOption "mautrix-signal, a Matrix-Signal puppeting bridge";
settings = lib.mkOption {
apply = lib.recursiveUpdate defaultConfig;
diff --git a/nixos/modules/services/matrix/mautrix-whatsapp.nix b/nixos/modules/services/matrix/mautrix-whatsapp.nix
index 31f64c16d791..d124edc216dd 100644
--- a/nixos/modules/services/matrix/mautrix-whatsapp.nix
+++ b/nixos/modules/services/matrix/mautrix-whatsapp.nix
@@ -47,7 +47,7 @@
in {
options.services.mautrix-whatsapp = {
- enable = lib.mkEnableOption "mautrix-whatsapp, a puppeting/relaybot bridge between Matrix and WhatsApp.";
+ enable = lib.mkEnableOption "mautrix-whatsapp, a puppeting/relaybot bridge between Matrix and WhatsApp";
settings = lib.mkOption {
type = settingsFormat.type;
diff --git a/nixos/modules/services/misc/mqtt2influxdb.nix b/nixos/modules/services/misc/mqtt2influxdb.nix
index 925139b449b8..d07ce1e66ba3 100644
--- a/nixos/modules/services/misc/mqtt2influxdb.nix
+++ b/nixos/modules/services/misc/mqtt2influxdb.nix
@@ -124,7 +124,7 @@ let
in {
options = {
services.mqtt2influxdb = {
- enable = mkEnableOption "BigClown MQTT to InfluxDB bridge.";
+ enable = mkEnableOption "BigClown MQTT to InfluxDB bridge";
package = mkPackageOption pkgs ["python3Packages" "mqtt2influxdb"] {};
environmentFiles = mkOption {
type = types.listOf types.path;
diff --git a/nixos/modules/services/misc/paperless.nix b/nixos/modules/services/misc/paperless.nix
index e564fe3b8317..6d6a49c10bdd 100644
--- a/nixos/modules/services/misc/paperless.nix
+++ b/nixos/modules/services/misc/paperless.nix
@@ -225,7 +225,7 @@ in
effectively never complete due to running into timeouts.
This sets `OMP_NUM_THREADS` to `1` in order to mitigate the issue. See
- https://github.com/NixOS/nixpkgs/issues/240591 for more information.
+ https://github.com/NixOS/nixpkgs/issues/240591 for more information
'' // mkOption { default = true; };
};
diff --git a/nixos/modules/services/misc/portunus.nix b/nixos/modules/services/misc/portunus.nix
index c7abb2cfa2a3..a9a069b0c055 100644
--- a/nixos/modules/services/misc/portunus.nix
+++ b/nixos/modules/services/misc/portunus.nix
@@ -70,7 +70,7 @@ in
To activate dex, first a search user must be created in the Portunus web ui
and then the password must to be set as the `DEX_SEARCH_USER_PASSWORD` environment variable
- in the [](#opt-services.dex.environmentFile) setting.
+ in the [](#opt-services.dex.environmentFile) setting
'';
oidcClients = mkOption {
diff --git a/nixos/modules/services/misc/spice-autorandr.nix b/nixos/modules/services/misc/spice-autorandr.nix
index 0d58d2865717..92b8a15e93c5 100644
--- a/nixos/modules/services/misc/spice-autorandr.nix
+++ b/nixos/modules/services/misc/spice-autorandr.nix
@@ -6,7 +6,7 @@ in
{
options = {
services.spice-autorandr = {
- enable = lib.mkEnableOption "spice-autorandr service that will automatically resize display to match SPICE client window size.";
+ enable = lib.mkEnableOption "spice-autorandr service that will automatically resize display to match SPICE client window size";
package = lib.mkPackageOption pkgs "spice-autorandr" { };
};
};
diff --git a/nixos/modules/services/monitoring/rustdesk-server.nix b/nixos/modules/services/monitoring/rustdesk-server.nix
index 21e6128c7226..ea4dd43cbb35 100644
--- a/nixos/modules/services/monitoring/rustdesk-server.nix
+++ b/nixos/modules/services/monitoring/rustdesk-server.nix
@@ -4,7 +4,7 @@ let
UDPPorts = [21116];
in {
options.services.rustdesk-server = with lib; with types; {
- enable = mkEnableOption "RustDesk, a remote access and remote control software, allowing maintenance of computers and other devices.";
+ enable = mkEnableOption "RustDesk, a remote access and remote control software, allowing maintenance of computers and other devices";
package = mkPackageOption pkgs "rustdesk-server" {};
diff --git a/nixos/modules/services/monitoring/thanos.nix b/nixos/modules/services/monitoring/thanos.nix
index f4cec0a545cb..10f4d08f8874 100644
--- a/nixos/modules/services/monitoring/thanos.nix
+++ b/nixos/modules/services/monitoring/thanos.nix
@@ -696,7 +696,7 @@ in {
};
store = paramsToOptions params.store // {
- enable = mkEnableOption "the Thanos store node giving access to blocks in a bucket provider.";
+ enable = mkEnableOption "the Thanos store node giving access to blocks in a bucket provider";
arguments = mkArgumentsOption "store";
};
diff --git a/nixos/modules/services/monitoring/ups.nix b/nixos/modules/services/monitoring/ups.nix
index 0a0d5eadccd3..35a2d61da1de 100644
--- a/nixos/modules/services/monitoring/ups.nix
+++ b/nixos/modules/services/monitoring/ups.nix
@@ -385,8 +385,8 @@ in
power.ups = {
enable = mkEnableOption ''
- Enables support for Power Devices, such as Uninterruptible Power
- Supplies, Power Distribution Units and Solar Controllers.
+ support for Power Devices, such as Uninterruptible Power
+ Supplies, Power Distribution Units and Solar Controllers
'';
mode = mkOption {
diff --git a/nixos/modules/services/network-filesystems/openafs/server.nix b/nixos/modules/services/network-filesystems/openafs/server.nix
index a399aa6c23bc..8186277b4777 100644
--- a/nixos/modules/services/network-filesystems/openafs/server.nix
+++ b/nixos/modules/services/network-filesystems/openafs/server.nix
@@ -183,7 +183,7 @@ in {
enableFabs = mkEnableOption ''
FABS, the flexible AFS backup system. It stores volumes as dump files, relying on other
- pre-existing backup solutions for handling them.
+ pre-existing backup solutions for handling them
'';
buserverArgs = mkOption {
diff --git a/nixos/modules/services/network-filesystems/samba-wsdd.nix b/nixos/modules/services/network-filesystems/samba-wsdd.nix
index 608b48cf0305..f46bf802511a 100644
--- a/nixos/modules/services/network-filesystems/samba-wsdd.nix
+++ b/nixos/modules/services/network-filesystems/samba-wsdd.nix
@@ -10,7 +10,7 @@ in {
services.samba-wsdd = {
enable = mkEnableOption ''
Web Services Dynamic Discovery host daemon. This enables (Samba) hosts, like your local NAS device,
- to be found by Web Service Discovery Clients like Windows.
+ to be found by Web Service Discovery Clients like Windows
'';
interface = mkOption {
type = types.nullOr types.str;
diff --git a/nixos/modules/services/networking/gns3-server.nix b/nixos/modules/services/networking/gns3-server.nix
index ba0d6be30f49..b2f25b158bbb 100644
--- a/nixos/modules/services/networking/gns3-server.nix
+++ b/nixos/modules/services/networking/gns3-server.nix
@@ -87,17 +87,17 @@ in {
};
dynamips = {
- enable = lib.mkEnableOption ''Whether to enable Dynamips support.'';
+ enable = lib.mkEnableOption ''Dynamips support'';
package = lib.mkPackageOptionMD pkgs "dynamips" { };
};
ubridge = {
- enable = lib.mkEnableOption ''Whether to enable uBridge support.'';
+ enable = lib.mkEnableOption ''uBridge support'';
package = lib.mkPackageOptionMD pkgs "ubridge" { };
};
vpcs = {
- enable = lib.mkEnableOption ''Whether to enable VPCS support.'';
+ enable = lib.mkEnableOption ''VPCS support'';
package = lib.mkPackageOptionMD pkgs "vpcs" { };
};
};
diff --git a/nixos/modules/services/networking/haproxy.nix b/nixos/modules/services/networking/haproxy.nix
index c764b447b0cb..19b096bf4906 100644
--- a/nixos/modules/services/networking/haproxy.nix
+++ b/nixos/modules/services/networking/haproxy.nix
@@ -17,7 +17,7 @@ with lib;
options = {
services.haproxy = {
- enable = mkEnableOption "HAProxy, the reliable, high performance TCP/HTTP load balancer.";
+ enable = mkEnableOption "HAProxy, the reliable, high performance TCP/HTTP load balancer";
package = mkPackageOption pkgs "haproxy" { };
diff --git a/nixos/modules/services/networking/hylafax/options.nix b/nixos/modules/services/networking/hylafax/options.nix
index 1880aebe7a6b..973dfa054afc 100644
--- a/nixos/modules/services/networking/hylafax/options.nix
+++ b/nixos/modules/services/networking/hylafax/options.nix
@@ -312,9 +312,9 @@ in
};
faxqclean.enable.spoolInit = mkEnableOption ''
- Purge old files from the spooling area with
+ purging old files from the spooling area with
{file}`faxqclean`
- each time the spooling area is initialized.
+ each time the spooling area is initialized
'';
faxqclean.enable.frequency = mkOption {
type = nullOr nonEmptyStr;
diff --git a/nixos/modules/services/networking/netbird/dashboard.nix b/nixos/modules/services/networking/netbird/dashboard.nix
index 6fc308615590..788b724231be 100644
--- a/nixos/modules/services/networking/netbird/dashboard.nix
+++ b/nixos/modules/services/networking/netbird/dashboard.nix
@@ -39,7 +39,7 @@ in
package = mkPackageOption pkgs "netbird-dashboard" { };
- enableNginx = mkEnableOption "Nginx reverse-proxy to serve the dashboard.";
+ enableNginx = mkEnableOption "Nginx reverse-proxy to serve the dashboard";
domain = mkOption {
type = str;
diff --git a/nixos/modules/services/networking/netbird/management.nix b/nixos/modules/services/networking/netbird/management.nix
index 52f033959143..f4b5bbf64323 100644
--- a/nixos/modules/services/networking/netbird/management.nix
+++ b/nixos/modules/services/networking/netbird/management.nix
@@ -137,7 +137,7 @@ in
{
options.services.netbird.server.management = {
- enable = mkEnableOption "Netbird Management Service.";
+ enable = mkEnableOption "Netbird Management Service";
package = mkPackageOption pkgs "netbird" { };
@@ -335,7 +335,7 @@ in
description = "Log level of the netbird services.";
};
- enableNginx = mkEnableOption "Nginx reverse-proxy for the netbird management service.";
+ enableNginx = mkEnableOption "Nginx reverse-proxy for the netbird management service";
};
config = mkIf cfg.enable {
diff --git a/nixos/modules/services/networking/netbird/server.nix b/nixos/modules/services/networking/netbird/server.nix
index e3de286a04fa..1725374d03c6 100644
--- a/nixos/modules/services/networking/netbird/server.nix
+++ b/nixos/modules/services/networking/netbird/server.nix
@@ -31,7 +31,7 @@ in
options.services.netbird.server = {
enable = mkEnableOption "Netbird Server stack, comprising the dashboard, management API and signal service";
- enableNginx = mkEnableOption "Nginx reverse-proxy for the netbird server services.";
+ enableNginx = mkEnableOption "Nginx reverse-proxy for the netbird server services";
domain = mkOption {
type = str;
diff --git a/nixos/modules/services/networking/netbird/signal.nix b/nixos/modules/services/networking/netbird/signal.nix
index 8408d20e874b..b53e9d40c2ee 100644
--- a/nixos/modules/services/networking/netbird/signal.nix
+++ b/nixos/modules/services/networking/netbird/signal.nix
@@ -28,7 +28,7 @@ in
package = mkPackageOption pkgs "netbird" { };
- enableNginx = mkEnableOption "Nginx reverse-proxy for the netbird signal service.";
+ enableNginx = mkEnableOption "Nginx reverse-proxy for the netbird signal service";
domain = mkOption {
type = str;
diff --git a/nixos/modules/services/networking/networkd-dispatcher.nix b/nixos/modules/services/networking/networkd-dispatcher.nix
index 039888e3c064..427835870e59 100644
--- a/nixos/modules/services/networking/networkd-dispatcher.nix
+++ b/nixos/modules/services/networking/networkd-dispatcher.nix
@@ -14,7 +14,7 @@ in {
enable = mkEnableOption ''
Networkd-dispatcher service for systemd-networkd connection status
change. See [https://gitlab.com/craftyguy/networkd-dispatcher](upstream instructions)
- for usage.
+ for usage
'';
rules = mkOption {
diff --git a/nixos/modules/services/networking/nncp.nix b/nixos/modules/services/networking/nncp.nix
index f4ed7ecc7d4a..8c5b5a61a181 100644
--- a/nixos/modules/services/networking/nncp.nix
+++ b/nixos/modules/services/networking/nncp.nix
@@ -34,9 +34,7 @@ in {
[](#opt-programs.nncp.settings)
'';
socketActivation = {
- enable = mkEnableOption ''
- Whether to run nncp-daemon persistently or socket-activated.
- '';
+ enable = mkEnableOption "socket activation for nncp-daemon";
listenStreams = mkOption {
type = with types; listOf str;
description = ''
diff --git a/nixos/modules/services/security/fail2ban.nix b/nixos/modules/services/security/fail2ban.nix
index c4031b64ba6a..b6ce42d7318c 100644
--- a/nixos/modules/services/security/fail2ban.nix
+++ b/nixos/modules/services/security/fail2ban.nix
@@ -263,7 +263,7 @@ in
'';
type = with types; attrsOf (either lines (submodule ({ name, ... }: {
options = {
- enabled = mkEnableOption "this jail." // {
+ enabled = mkEnableOption "this jail" // {
default = true;
readOnly = name == "DEFAULT";
};
diff --git a/nixos/modules/services/security/haveged.nix b/nixos/modules/services/security/haveged.nix
index 57cef7e44d50..4c686d74268a 100644
--- a/nixos/modules/services/security/haveged.nix
+++ b/nixos/modules/services/security/haveged.nix
@@ -17,7 +17,7 @@ in
enable = mkEnableOption ''
haveged entropy daemon, which refills /dev/random when low.
- NOTE: does nothing on kernels newer than 5.6.
+ NOTE: does nothing on kernels newer than 5.6
'';
# source for the note https://github.com/jirka-h/haveged/issues/57
diff --git a/nixos/modules/services/web-apps/audiobookshelf.nix b/nixos/modules/services/web-apps/audiobookshelf.nix
index 84dffc5f9d3c..2f00c852ac8f 100644
--- a/nixos/modules/services/web-apps/audiobookshelf.nix
+++ b/nixos/modules/services/web-apps/audiobookshelf.nix
@@ -8,7 +8,7 @@ in
{
options = {
services.audiobookshelf = {
- enable = mkEnableOption "Audiobookshelf, self-hosted audiobook and podcast server.";
+ enable = mkEnableOption "Audiobookshelf, self-hosted audiobook and podcast server";
package = mkPackageOption pkgs "audiobookshelf" { };
diff --git a/nixos/modules/services/web-apps/jitsi-meet.nix b/nixos/modules/services/web-apps/jitsi-meet.nix
index 76753b89ec9e..247b65c78663 100644
--- a/nixos/modules/services/web-apps/jitsi-meet.nix
+++ b/nixos/modules/services/web-apps/jitsi-meet.nix
@@ -170,7 +170,7 @@ in
'';
};
- caddy.enable = mkEnableOption "Whether to enable caddy reverse proxy to expose jitsi-meet";
+ caddy.enable = mkEnableOption "caddy reverse proxy to expose jitsi-meet";
prosody.enable = mkOption {
type = bool;
diff --git a/nixos/modules/services/web-apps/nextcloud.nix b/nixos/modules/services/web-apps/nextcloud.nix
index f4560ed64bb4..a4a1f399f4e2 100644
--- a/nixos/modules/services/web-apps/nextcloud.nix
+++ b/nixos/modules/services/web-apps/nextcloud.nix
@@ -489,7 +489,7 @@ in {
implementation into the virtual filesystem.
Further details about this feature can be found in the
- [upstream documentation](https://docs.nextcloud.com/server/22/admin_manual/configuration_files/primary_storage.html).
+ [upstream documentation](https://docs.nextcloud.com/server/22/admin_manual/configuration_files/primary_storage.html)
'';
bucket = mkOption {
type = types.str;
@@ -591,7 +591,7 @@ in {
This is used by the theming app and for generating previews of certain images (e.g. SVG and HEIF).
You may want to disable it for increased security. In that case, previews will still be available
for some images (e.g. JPEG and PNG).
- See <https://github.com/nextcloud/server/issues/13099>.
+ See <https://github.com/nextcloud/server/issues/13099>
'' // {
default = true;
};
diff --git a/nixos/modules/services/web-apps/pretix.nix b/nixos/modules/services/web-apps/pretix.nix
index 9786b6116026..0fb635964fe6 100644
--- a/nixos/modules/services/web-apps/pretix.nix
+++ b/nixos/modules/services/web-apps/pretix.nix
@@ -63,7 +63,7 @@ in
};
options.services.pretix = {
- enable = mkEnableOption "Pretix, a ticket shop application for conferences, festivals, concerts, etc.";
+ enable = mkEnableOption "Pretix, a ticket shop application for conferences, festivals, concerts, etc";
package = mkPackageOption pkgs "pretix" { };
diff --git a/nixos/modules/services/web-apps/silverbullet.nix b/nixos/modules/services/web-apps/silverbullet.nix
index c316d074cbaa..5d5f950a9a66 100644
--- a/nixos/modules/services/web-apps/silverbullet.nix
+++ b/nixos/modules/services/web-apps/silverbullet.nix
@@ -12,7 +12,7 @@ in
{
options = {
services.silverbullet = {
- enable = lib.mkEnableOption "Silverbullet, an open-source, self-hosted, offline-capable Personal Knowledge Management (PKM) web application.";
+ enable = lib.mkEnableOption "Silverbullet, an open-source, self-hosted, offline-capable Personal Knowledge Management (PKM) web application";
package = lib.mkPackageOptionMD pkgs "silverbullet" { };
diff --git a/nixos/modules/services/web-apps/suwayomi-server.nix b/nixos/modules/services/web-apps/suwayomi-server.nix
index 5b61852a534d..ba2352d0e693 100644
--- a/nixos/modules/services/web-apps/suwayomi-server.nix
+++ b/nixos/modules/services/web-apps/suwayomi-server.nix
@@ -9,7 +9,7 @@ in
{
options = {
services.suwayomi-server = {
- enable = mkEnableOption "Suwayomi, a free and open source manga reader server that runs extensions built for Tachiyomi.";
+ enable = mkEnableOption "Suwayomi, a free and open source manga reader server that runs extensions built for Tachiyomi";
package = lib.mkPackageOptionMD pkgs "suwayomi-server" { };
@@ -72,7 +72,7 @@ in
};
basicAuthEnabled = mkEnableOption ''
- Add basic access authentication to Suwayomi-Server.
+ basic access authentication for Suwayomi-Server.
Enabling this option is useful when hosting on a public network/the Internet
'';
diff --git a/nixos/modules/services/web-servers/nginx/default.nix b/nixos/modules/services/web-servers/nginx/default.nix
index f9720c362935..b5ff630a4d48 100644
--- a/nixos/modules/services/web-servers/nginx/default.nix
+++ b/nixos/modules/services/web-servers/nginx/default.nix
@@ -1086,9 +1086,9 @@ in
'';
description = "Declarative vhost config";
};
- validateConfigFile = lib.mkEnableOption ''
- Validate configuration with pkgs.writeNginxConfig.
- '' // { default = true; };
+ validateConfigFile = lib.mkEnableOption "validating configuration with pkgs.writeNginxConfig" // {
+ default = true;
+ };
};
};