summaryrefslogtreecommitdiffstats
path: root/nixos/modules/services
diff options
context:
space:
mode:
authorpennae <github@quasiparticle.net>2022-08-29 19:33:50 +0200
committerpennae <github@quasiparticle.net>2022-08-31 16:32:54 +0200
commitbd5636884879a6ef672703dd51f3e398a58c3b8e (patch)
tree3a0cd1e3fef09aeff2b1935865677ec0cd6cbbbd /nixos/modules/services
parent515c4727faaa86ad9ef9c270d34c0de30cf8d2bc (diff)
nixos/*: md-convert hidden plaintext options
most of these are hidden because they're either part of a submodule that doesn't have its type rendered (eg because the submodule type is used in an either type) or because they are explicitly hidden. some of them are merely hidden from nix-doc-munge by how their option is put together.
Diffstat (limited to 'nixos/modules/services')
-rw-r--r--nixos/modules/services/hardware/sane_extra_backends/brscan4.nix4
-rw-r--r--nixos/modules/services/hardware/sane_extra_backends/dsseries.nix4
-rw-r--r--nixos/modules/services/mail/postgrey.nix8
-rw-r--r--nixos/modules/services/mail/rspamd.nix8
-rw-r--r--nixos/modules/services/networking/flannel.nix2
-rw-r--r--nixos/modules/services/networking/i2pd.nix12
-rw-r--r--nixos/modules/services/networking/smokeping.nix6
-rw-r--r--nixos/modules/services/networking/x2goserver.nix6
-rw-r--r--nixos/modules/services/security/certmgr.nix12
-rw-r--r--nixos/modules/services/security/tor.nix4
-rw-r--r--nixos/modules/services/web-apps/bookstack.nix2
-rw-r--r--nixos/modules/services/web-apps/healthchecks.nix4
-rw-r--r--nixos/modules/services/web-apps/snipe-it.nix2
-rw-r--r--nixos/modules/services/x11/desktop-managers/phosh.nix12
-rw-r--r--nixos/modules/services/x11/display-managers/sx.nix4
-rw-r--r--nixos/modules/services/x11/xautolock.nix4
16 files changed, 48 insertions, 46 deletions
diff --git a/nixos/modules/services/hardware/sane_extra_backends/brscan4.nix b/nixos/modules/services/hardware/sane_extra_backends/brscan4.nix
index f01446c411ee..e737a4ce20de 100644
--- a/nixos/modules/services/hardware/sane_extra_backends/brscan4.nix
+++ b/nixos/modules/services/hardware/sane_extra_backends/brscan4.nix
@@ -68,8 +68,8 @@ in
options = {
hardware.sane.brscan4.enable =
- mkEnableOption "Brother's brscan4 scan backend" // {
- description = ''
+ mkEnableOption (lib.mdDoc "Brother's brscan4 scan backend") // {
+ description = lib.mdDoc ''
When enabled, will automatically register the "brscan4" sane
backend and bring configuration files to their expected location.
'';
diff --git a/nixos/modules/services/hardware/sane_extra_backends/dsseries.nix b/nixos/modules/services/hardware/sane_extra_backends/dsseries.nix
index d71a17f5ea6b..5b05694abc01 100644
--- a/nixos/modules/services/hardware/sane_extra_backends/dsseries.nix
+++ b/nixos/modules/services/hardware/sane_extra_backends/dsseries.nix
@@ -6,8 +6,8 @@ with lib;
options = {
hardware.sane.dsseries.enable =
- mkEnableOption "Brother DSSeries scan backend" // {
- description = ''
+ mkEnableOption (lib.mdDoc "Brother DSSeries scan backend") // {
+ description = lib.mdDoc ''
When enabled, will automatically register the "dsseries" SANE backend.
This supports the Brother DSmobile scanner series, including the
diff --git a/nixos/modules/services/mail/postgrey.nix b/nixos/modules/services/mail/postgrey.nix
index 301bc69e1cac..fdfa08946ddf 100644
--- a/nixos/modules/services/mail/postgrey.nix
+++ b/nixos/modules/services/mail/postgrey.nix
@@ -15,12 +15,12 @@ with lib; let
type = nullOr str;
default = null;
example = "127.0.0.1";
- description = "The address to bind to. Localhost if null";
+ description = lib.mdDoc "The address to bind to. Localhost if null";
};
port = mkOption {
type = natural';
default = 10030;
- description = "Tcp port to bind to";
+ description = lib.mdDoc "Tcp port to bind to";
};
};
};
@@ -30,13 +30,13 @@ with lib; let
path = mkOption {
type = path;
default = "/run/postgrey.sock";
- description = "Path of the unix socket";
+ description = lib.mdDoc "Path of the unix socket";
};
mode = mkOption {
type = str;
default = "0777";
- description = "Mode of the unix socket";
+ description = lib.mdDoc "Mode of the unix socket";
};
};
};
diff --git a/nixos/modules/services/mail/rspamd.nix b/nixos/modules/services/mail/rspamd.nix
index 8771b11901c7..f9be9024dd4f 100644
--- a/nixos/modules/services/mail/rspamd.nix
+++ b/nixos/modules/services/mail/rspamd.nix
@@ -13,24 +13,24 @@ let
socket = mkOption {
type = types.str;
example = "localhost:11333";
- description = ''
+ description = lib.mdDoc ''
Socket for this worker to listen on in a format acceptable by rspamd.
'';
};
mode = mkOption {
type = types.str;
default = "0644";
- description = "Mode to set on unix socket";
+ description = lib.mdDoc "Mode to set on unix socket";
};
owner = mkOption {
type = types.str;
default = "${cfg.user}";
- description = "Owner to set on unix socket";
+ description = lib.mdDoc "Owner to set on unix socket";
};
group = mkOption {
type = types.str;
default = "${cfg.group}";
- description = "Group to set on unix socket";
+ description = lib.mdDoc "Group to set on unix socket";
};
rawEntry = mkOption {
type = types.str;
diff --git a/nixos/modules/services/networking/flannel.nix b/nixos/modules/services/networking/flannel.nix
index e50b862371c4..c19e51e5aa6c 100644
--- a/nixos/modules/services/networking/flannel.nix
+++ b/nixos/modules/services/networking/flannel.nix
@@ -83,7 +83,7 @@ in {
};
network = mkOption {
- description = " IPv4 network in CIDR format to use for the entire flannel network.";
+ description = lib.mdDoc " IPv4 network in CIDR format to use for the entire flannel network.";
type = types.str;
};
diff --git a/nixos/modules/services/networking/i2pd.nix b/nixos/modules/services/networking/i2pd.nix
index 70fd4cb5fe5a..47f4a42aa5dd 100644
--- a/nixos/modules/services/networking/i2pd.nix
+++ b/nixos/modules/services/networking/i2pd.nix
@@ -247,8 +247,8 @@ in
services.i2pd = {
- enable = mkEnableOption "I2Pd daemon" // {
- description = ''
+ enable = mkEnableOption (lib.mdDoc "I2Pd daemon") // {
+ description = lib.mdDoc ''
Enables I2Pd as a running service upon activation.
Please read http://i2pd.readthedocs.io/en/latest/ for further
configuration help.
@@ -345,14 +345,14 @@ in
ntcp = mkEnableTrueOption "ntcp";
ssu = mkEnableTrueOption "ssu";
- notransit = mkEnableOption "notransit" // {
- description = ''
+ notransit = mkEnableOption (lib.mdDoc "notransit") // {
+ description = lib.mdDoc ''
Tells the router to not accept transit tunnels during startup.
'';
};
- floodfill = mkEnableOption "floodfill" // {
- description = ''
+ floodfill = mkEnableOption (lib.mdDoc "floodfill") // {
+ description = lib.mdDoc ''
If the router is declared to be unreachable and needs introduction nodes.
'';
};
diff --git a/nixos/modules/services/networking/smokeping.nix b/nixos/modules/services/networking/smokeping.nix
index 7f1abcc6824f..df4f8905ec6f 100644
--- a/nixos/modules/services/networking/smokeping.nix
+++ b/nixos/modules/services/networking/smokeping.nix
@@ -82,8 +82,10 @@ in
config = mkOption {
type = types.nullOr types.lines;
default = null;
- description = "Full smokeping config supplied by the user. Overrides " +
- "and replaces any other configuration supplied.";
+ description = lib.mdDoc ''
+ Full smokeping config supplied by the user. Overrides
+ and replaces any other configuration supplied.
+ '';
};
databaseConfig = mkOption {
type = types.lines;
diff --git a/nixos/modules/services/networking/x2goserver.nix b/nixos/modules/services/networking/x2goserver.nix
index e534a2a3dcac..1242229a0b60 100644
--- a/nixos/modules/services/networking/x2goserver.nix
+++ b/nixos/modules/services/networking/x2goserver.nix
@@ -23,15 +23,15 @@ in {
options.services.x2goserver = {
enable = mkEnableOption (lib.mdDoc "x2goserver") // {
- description = ''
+ description = lib.mdDoc ''
Enables the x2goserver module.
NOTE: This will create a good amount of symlinks in `/usr/local/bin`
'';
};
superenicer = {
- enable = mkEnableOption "superenicer" // {
- description = ''
+ enable = mkEnableOption (lib.mdDoc "superenicer") // {
+ description = lib.mdDoc ''
Enables the SupeReNicer code in x2gocleansessions, this will renice
suspended sessions to nice level 19 and renice them to level 0 if the
session becomes marked as running again
diff --git a/nixos/modules/services/security/certmgr.nix b/nixos/modules/services/security/certmgr.nix
index e2883856b6d4..ca4cf5084722 100644
--- a/nixos/modules/services/security/certmgr.nix
+++ b/nixos/modules/services/security/certmgr.nix
@@ -118,34 +118,34 @@ in
service = mkOption {
type = nullOr str;
default = null;
- description = "The service on which to perform &lt;action&gt; after fetching.";
+ description = lib.mdDoc "The service on which to perform \<action\> after fetching.";
};
action = mkOption {
type = addCheck str (x: cfg.svcManager == "command" || elem x ["restart" "reload" "nop"]);
default = "nop";
- description = "The action to take after fetching.";
+ description = lib.mdDoc "The action to take after fetching.";
};
# These ought all to be specified according to certmgr spec def.
authority = mkOption {
type = attrs;
- description = "certmgr spec authority object.";
+ description = lib.mdDoc "certmgr spec authority object.";
};
certificate = mkOption {
type = nullOr attrs;
- description = "certmgr spec certificate object.";
+ description = lib.mdDoc "certmgr spec certificate object.";
};
private_key = mkOption {
type = nullOr attrs;
- description = "certmgr spec private_key object.";
+ description = lib.mdDoc "certmgr spec private_key object.";
};
request = mkOption {
type = nullOr attrs;
- description = "certmgr spec request object.";
+ description = lib.mdDoc "certmgr spec request object.";
};
};
}));
diff --git a/nixos/modules/services/security/tor.nix b/nixos/modules/services/security/tor.nix
index c5978f461a5a..de82e32f496f 100644
--- a/nixos/modules/services/security/tor.nix
+++ b/nixos/modules/services/security/tor.nix
@@ -51,14 +51,14 @@ let
type = with types; nullOr str;
default = null;
example = "0.0.0.0";
- description = ''
+ description = lib.mdDoc ''
IPv4 or IPv6 (if between brackets) address.
'';
};
optionUnix = mkOption {
type = with types; nullOr path;
default = null;
- description = ''
+ description = lib.mdDoc ''
Unix domain socket path to use.
'';
};
diff --git a/nixos/modules/services/web-apps/bookstack.nix b/nixos/modules/services/web-apps/bookstack.nix
index a20904d6af07..3fbccf540087 100644
--- a/nixos/modules/services/web-apps/bookstack.nix
+++ b/nixos/modules/services/web-apps/bookstack.nix
@@ -234,7 +234,7 @@ in {
options = {
_secret = mkOption {
type = nullOr str;
- description = ''
+ description = lib.mdDoc ''
The path to a file containing the value the
option should be set to in the final
configuration file.
diff --git a/nixos/modules/services/web-apps/healthchecks.nix b/nixos/modules/services/web-apps/healthchecks.nix
index e58cc6f202be..b3380b88f613 100644
--- a/nixos/modules/services/web-apps/healthchecks.nix
+++ b/nixos/modules/services/web-apps/healthchecks.nix
@@ -26,8 +26,8 @@ let
in
{
options.services.healthchecks = {
- enable = mkEnableOption "healthchecks" // {
- description = ''
+ enable = mkEnableOption (lib.mdDoc "healthchecks") // {
+ description = lib.mdDoc ''
Enable healthchecks.
It is expected to be run behind a HTTP reverse proxy.
'';
diff --git a/nixos/modules/services/web-apps/snipe-it.nix b/nixos/modules/services/web-apps/snipe-it.nix
index a97d6be69d96..264b72fe837b 100644
--- a/nixos/modules/services/web-apps/snipe-it.nix
+++ b/nixos/modules/services/web-apps/snipe-it.nix
@@ -250,7 +250,7 @@ in {
options = {
_secret = mkOption {
type = nullOr (oneOf [ str path ]);
- description = ''
+ description = lib.mdDoc ''
The path to a file containing the value the
option should be set to in the final
configuration file.
diff --git a/nixos/modules/services/x11/desktop-managers/phosh.nix b/nixos/modules/services/x11/desktop-managers/phosh.nix
index 2f670d3492e9..e889c0e34e7d 100644
--- a/nixos/modules/services/x11/desktop-managers/phosh.nix
+++ b/nixos/modules/services/x11/desktop-managers/phosh.nix
@@ -33,14 +33,14 @@ let
default = "false";
};
cursorTheme = mkOption {
- description = ''
+ description = lib.mdDoc ''
Cursor theme to use in Phosh.
'';
type = types.str;
default = "default";
};
outputs = mkOption {
- description = ''
+ description = lib.mdDoc ''
Output configurations.
'';
type = types.attrsOf phocOutputType;
@@ -56,7 +56,7 @@ let
phocOutputType = types.submodule {
options = {
modeline = mkOption {
- description = ''
+ description = lib.mdDoc ''
One or more modelines.
'';
type = types.either types.str (types.listOf types.str);
@@ -67,7 +67,7 @@ let
];
};
mode = mkOption {
- description = ''
+ description = lib.mdDoc ''
Default video mode.
'';
type = types.nullOr types.str;
@@ -75,7 +75,7 @@ let
example = "768x1024";
};
scale = mkOption {
- description = ''
+ description = lib.mdDoc ''
Display scaling factor.
'';
type = types.nullOr (
@@ -89,7 +89,7 @@ let
example = 2;
};
rotate = mkOption {
- description = ''
+ description = lib.mdDoc ''
Screen transformation.
'';
type = types.enum [
diff --git a/nixos/modules/services/x11/display-managers/sx.nix b/nixos/modules/services/x11/display-managers/sx.nix
index e30977364300..6a7fc1a040e7 100644
--- a/nixos/modules/services/x11/display-managers/sx.nix
+++ b/nixos/modules/services/x11/display-managers/sx.nix
@@ -7,8 +7,8 @@ let cfg = config.services.xserver.displayManager.sx;
in {
options = {
services.xserver.displayManager.sx = {
- enable = mkEnableOption "sx pseudo-display manager" // {
- description = ''
+ enable = mkEnableOption (lib.mdDoc "sx pseudo-display manager") // {
+ description = lib.mdDoc ''
Whether to enable the "sx" pseudo-display manager, which allows users
to start manually via the "sx" command from a vt shell. The X server
runs under the user's id, not as root. The user must provide a
diff --git a/nixos/modules/services/x11/xautolock.nix b/nixos/modules/services/x11/xautolock.nix
index b8ebd1a000e2..8200057660e5 100644
--- a/nixos/modules/services/x11/xautolock.nix
+++ b/nixos/modules/services/x11/xautolock.nix
@@ -9,8 +9,8 @@ in
options = {
services.xserver.xautolock = {
enable = mkEnableOption (lib.mdDoc "xautolock");
- enableNotifier = mkEnableOption "xautolock.notify" // {
- description = ''
+ enableNotifier = mkEnableOption (lib.mdDoc "xautolock.notify") // {
+ description = lib.mdDoc ''
Whether to enable the notifier feature of xautolock.
This publishes a notification before the autolock.
'';