summaryrefslogtreecommitdiffstats
path: root/nixos/modules/services
diff options
context:
space:
mode:
authorAnthony Roussel <anthony@roussel.dev>2023-10-30 21:41:44 +0100
committerAnthony Roussel <anthony@roussel.dev>2023-11-11 10:49:01 +0100
commite30f48be948272df2d57237ef955023f937f4421 (patch)
tree02c0471df3c25372ac34b24c4bd7ffc204def8f8 /nixos/modules/services
parent5744e4ba8f7ac7b662a67aeb2f5e3b847bcb1f93 (diff)
treewide: fix redirected and broken URLs
Using the script in maintainers/scripts/update-redirected-urls.sh
Diffstat (limited to 'nixos/modules/services')
-rw-r--r--nixos/modules/services/audio/jack.nix2
-rw-r--r--nixos/modules/services/computing/boinc/client.nix2
-rw-r--r--nixos/modules/services/computing/slurm/slurm.nix2
-rw-r--r--nixos/modules/services/databases/couchdb.nix2
-rw-r--r--nixos/modules/services/databases/firebird.nix2
-rw-r--r--nixos/modules/services/databases/pgmanage.nix2
-rw-r--r--nixos/modules/services/databases/postgresql.md2
-rw-r--r--nixos/modules/services/databases/postgresql.nix2
-rw-r--r--nixos/modules/services/databases/redis.nix2
-rw-r--r--nixos/modules/services/hardware/udev.nix2
-rw-r--r--nixos/modules/services/logging/logstash.nix2
-rw-r--r--nixos/modules/services/misc/mediatomb.nix2
-rw-r--r--nixos/modules/services/monitoring/bosun.nix2
-rw-r--r--nixos/modules/services/monitoring/grafana.nix4
-rw-r--r--nixos/modules/services/monitoring/graphite.nix2
-rw-r--r--nixos/modules/services/monitoring/munin.nix14
-rw-r--r--nixos/modules/services/monitoring/nagios.nix2
-rw-r--r--nixos/modules/services/network-filesystems/xtreemfs.nix10
-rw-r--r--nixos/modules/services/networking/asterisk.nix2
-rw-r--r--nixos/modules/services/networking/i2pd.nix2
-rw-r--r--nixos/modules/services/networking/ntp/ntpd.nix2
-rw-r--r--nixos/modules/services/networking/tox-bootstrapd.nix2
-rw-r--r--nixos/modules/services/torrent/transmission.nix2
-rw-r--r--nixos/modules/services/video/unifi-video.nix4
-rw-r--r--nixos/modules/services/web-apps/discourse.nix4
-rw-r--r--nixos/modules/services/web-apps/nextcloud.md2
-rw-r--r--nixos/modules/services/web-apps/tt-rss.nix2
-rw-r--r--nixos/modules/services/web-servers/lighttpd/default.nix6
-rw-r--r--nixos/modules/services/web-servers/mighttpd2.nix4
-rw-r--r--nixos/modules/services/web-servers/nginx/default.nix2
-rw-r--r--nixos/modules/services/x11/desktop-managers/enlightenment.nix2
-rw-r--r--nixos/modules/services/x11/desktop-managers/gnome.nix2
-rw-r--r--nixos/modules/services/x11/desktop-managers/pantheon.nix2
-rw-r--r--nixos/modules/services/x11/display-managers/default.nix2
-rw-r--r--nixos/modules/services/x11/display-managers/xpra.nix6
-rw-r--r--nixos/modules/services/x11/imwheel.nix2
36 files changed, 54 insertions, 54 deletions
diff --git a/nixos/modules/services/audio/jack.nix b/nixos/modules/services/audio/jack.nix
index 105e99cb2f5e..b51f2a78c983 100644
--- a/nixos/modules/services/audio/jack.nix
+++ b/nixos/modules/services/audio/jack.nix
@@ -225,7 +225,7 @@ in {
description = "JACK Audio system service user";
isSystemUser = true;
};
- # http://jackaudio.org/faq/linux_rt_config.html
+ # https://jackaudio.org/faq/linux_rt_config.html
security.pam.loginLimits = [
{ domain = "@jackaudio"; type = "-"; item = "rtprio"; value = "99"; }
{ domain = "@jackaudio"; type = "-"; item = "memlock"; value = "unlimited"; }
diff --git a/nixos/modules/services/computing/boinc/client.nix b/nixos/modules/services/computing/boinc/client.nix
index 51475171bf3f..ff16795c8208 100644
--- a/nixos/modules/services/computing/boinc/client.nix
+++ b/nixos/modules/services/computing/boinc/client.nix
@@ -54,7 +54,7 @@ in
only the hosts listed in {var}`dataDir`/remote_hosts.cfg will be allowed to
connect.
- See also: <http://boinc.berkeley.edu/wiki/Controlling_BOINC_remotely#Remote_access>
+ See also: <https://boinc.berkeley.edu/wiki/Controlling_BOINC_remotely#Remote_access>
'';
};
diff --git a/nixos/modules/services/computing/slurm/slurm.nix b/nixos/modules/services/computing/slurm/slurm.nix
index 344c43a429b3..1cbe7b893f83 100644
--- a/nixos/modules/services/computing/slurm/slurm.nix
+++ b/nixos/modules/services/computing/slurm/slurm.nix
@@ -6,7 +6,7 @@ let
cfg = config.services.slurm;
opt = options.services.slurm;
- # configuration file can be generated by http://slurm.schedmd.com/configurator.html
+ # configuration file can be generated by https://slurm.schedmd.com/configurator.html
defaultUser = "slurm";
diff --git a/nixos/modules/services/databases/couchdb.nix b/nixos/modules/services/databases/couchdb.nix
index 0a81a8dceeee..bfecfbb3664f 100644
--- a/nixos/modules/services/databases/couchdb.nix
+++ b/nixos/modules/services/databases/couchdb.nix
@@ -79,7 +79,7 @@ in {
'';
};
- # couchdb options: http://docs.couchdb.org/en/latest/config/index.html
+ # couchdb options: https://docs.couchdb.org/en/latest/config/index.html
databaseDir = mkOption {
type = types.path;
diff --git a/nixos/modules/services/databases/firebird.nix b/nixos/modules/services/databases/firebird.nix
index 26ed46f0e60c..3927c81d953d 100644
--- a/nixos/modules/services/databases/firebird.nix
+++ b/nixos/modules/services/databases/firebird.nix
@@ -17,7 +17,7 @@
# There are at least two ways to run firebird. superserver has been chosen
# however there are no strong reasons to prefer this or the other one AFAIK
# Eg superserver is said to be most efficiently using resources according to
-# http://www.firebirdsql.org/manual/qsg25-classic-or-super.html
+# https://www.firebirdsql.org/manual/qsg25-classic-or-super.html
with lib;
diff --git a/nixos/modules/services/databases/pgmanage.nix b/nixos/modules/services/databases/pgmanage.nix
index 12c8253ab49c..a0933a5ffc45 100644
--- a/nixos/modules/services/databases/pgmanage.nix
+++ b/nixos/modules/services/databases/pgmanage.nix
@@ -66,7 +66,7 @@ in {
pgmanage requires at least one PostgreSQL server be defined.
Detailed information about PostgreSQL connection strings is available at:
- <http://www.postgresql.org/docs/current/static/libpq-connect.html>
+ <https://www.postgresql.org/docs/current/libpq-connect.html>
Note that you should not specify your user name or password. That
information will be entered on the login screen. If you specify a
diff --git a/nixos/modules/services/databases/postgresql.md b/nixos/modules/services/databases/postgresql.md
index e4b679a3eee0..d65d9616e2f2 100644
--- a/nixos/modules/services/databases/postgresql.md
+++ b/nixos/modules/services/databases/postgresql.md
@@ -5,7 +5,7 @@
*Source:* {file}`modules/services/databases/postgresql.nix`
-*Upstream documentation:* <http://www.postgresql.org/docs/>
+*Upstream documentation:* <https://www.postgresql.org/docs/>
<!-- FIXME: more stuff, like maintainer? -->
diff --git a/nixos/modules/services/databases/postgresql.nix b/nixos/modules/services/databases/postgresql.nix
index 21e6a60e32a3..af4db5c9611f 100644
--- a/nixos/modules/services/databases/postgresql.nix
+++ b/nixos/modules/services/databases/postgresql.nix
@@ -588,7 +588,7 @@ in
else "simple";
# Shut down Postgres using SIGINT ("Fast Shutdown mode"). See
- # http://www.postgresql.org/docs/current/static/server-shutdown.html
+ # https://www.postgresql.org/docs/current/server-shutdown.html
KillSignal = "SIGINT";
KillMode = "mixed";
diff --git a/nixos/modules/services/databases/redis.nix b/nixos/modules/services/databases/redis.nix
index 86b295dadf49..315a0282cd73 100644
--- a/nixos/modules/services/databases/redis.nix
+++ b/nixos/modules/services/databases/redis.nix
@@ -63,7 +63,7 @@ in {
vmOverCommit = mkEnableOption (lib.mdDoc ''
setting of vm.overcommit_memory to 1
- (Suggested for Background Saving: http://redis.io/topics/faq)
+ (Suggested for Background Saving: <https://redis.io/docs/get-started/faq/>)
'');
servers = mkOption {
diff --git a/nixos/modules/services/hardware/udev.nix b/nixos/modules/services/hardware/udev.nix
index 24987374ab0d..08ca7a0d247d 100644
--- a/nixos/modules/services/hardware/udev.nix
+++ b/nixos/modules/services/hardware/udev.nix
@@ -279,7 +279,7 @@ in
default = true;
type = types.bool;
description = lib.mdDoc ''
- Whether to assign [predictable names to network interfaces](http://www.freedesktop.org/wiki/Software/systemd/PredictableNetworkInterfaceNames).
+ Whether to assign [predictable names to network interfaces](https://www.freedesktop.org/wiki/Software/systemd/PredictableNetworkInterfaceNames/).
If enabled, interfaces
are assigned names that contain topology information
(e.g. `wlp3s0`) and thus should be stable
diff --git a/nixos/modules/services/logging/logstash.nix b/nixos/modules/services/logging/logstash.nix
index e9e3ae1f14ce..42d52a61639e 100644
--- a/nixos/modules/services/logging/logstash.nix
+++ b/nixos/modules/services/logging/logstash.nix
@@ -123,7 +123,7 @@ in
example = ''
if [type] == "syslog" {
# Keep only relevant systemd fields
- # http://www.freedesktop.org/software/systemd/man/systemd.journal-fields.html
+ # https://www.freedesktop.org/software/systemd/man/systemd.journal-fields.html
prune {
whitelist_names => [
"type", "@timestamp", "@version",
diff --git a/nixos/modules/services/misc/mediatomb.nix b/nixos/modules/services/misc/mediatomb.nix
index 632b7caaac40..335b1b684b1a 100644
--- a/nixos/modules/services/misc/mediatomb.nix
+++ b/nixos/modules/services/misc/mediatomb.nix
@@ -186,7 +186,7 @@ let
defaultFirewallRules = {
# udp 1900 port needs to be opened for SSDP (not configurable within
# mediatomb/gerbera) cf.
- # http://docs.gerbera.io/en/latest/run.html?highlight=udp%20port#network-setup
+ # https://docs.gerbera.io/en/latest/run.html?highlight=udp%20port#network-setup
allowedUDPPorts = [ 1900 cfg.port ];
allowedTCPPorts = [ cfg.port ];
};
diff --git a/nixos/modules/services/monitoring/bosun.nix b/nixos/modules/services/monitoring/bosun.nix
index dc75fda6ed8a..1dc19743461b 100644
--- a/nixos/modules/services/monitoring/bosun.nix
+++ b/nixos/modules/services/monitoring/bosun.nix
@@ -108,7 +108,7 @@ in {
option.
A detailed description of the supported syntax can be found at-spi2-atk
- http://bosun.org/configuration.html
+ https://bosun.org/configuration.html
'';
};
diff --git a/nixos/modules/services/monitoring/grafana.nix b/nixos/modules/services/monitoring/grafana.nix
index e90a0e9d16db..5e21407042b6 100644
--- a/nixos/modules/services/monitoring/grafana.nix
+++ b/nixos/modules/services/monitoring/grafana.nix
@@ -88,7 +88,7 @@ let
# Get a submodule without any embedded metadata:
_filter = x: filterAttrs (k: v: k != "_module") x;
- # http://docs.grafana.org/administration/provisioning/#datasources
+ # https://grafana.com/docs/grafana/latest/administration/provisioning/#datasources
grafanaTypes.datasourceConfig = types.submodule {
freeformType = provisioningSettingsFormat.type;
@@ -140,7 +140,7 @@ let
};
};
- # http://docs.grafana.org/administration/provisioning/#dashboards
+ # https://grafana.com/docs/grafana/latest/administration/provisioning/#dashboards
grafanaTypes.dashboardConfig = types.submodule {
freeformType = provisioningSettingsFormat.type;
diff --git a/nixos/modules/services/monitoring/graphite.nix b/nixos/modules/services/monitoring/graphite.nix
index 65c91b8f79bb..cc3d70976204 100644
--- a/nixos/modules/services/monitoring/graphite.nix
+++ b/nixos/modules/services/monitoring/graphite.nix
@@ -102,7 +102,7 @@ in {
default = "";
description = lib.mdDoc ''
Graphite webapp settings. See:
- <http://graphite.readthedocs.io/en/latest/config-local-settings.html>
+ <https://graphite.readthedocs.io/en/latest/config-local-settings.html>
'';
};
};
diff --git a/nixos/modules/services/monitoring/munin.nix b/nixos/modules/services/monitoring/munin.nix
index 90a51181ac30..5ed7cac48ae7 100644
--- a/nixos/modules/services/monitoring/munin.nix
+++ b/nixos/modules/services/monitoring/munin.nix
@@ -4,7 +4,7 @@
# TODO: LWP/Pg perl libs aren't recognized
# TODO: support fastcgi
-# http://guide.munin-monitoring.org/en/latest/example/webserver/apache-cgi.html
+# https://guide.munin-monitoring.org/en/latest/example/webserver/apache-cgi.html
# spawn-fcgi -s /run/munin/fastcgi-graph.sock -U www-data -u munin -g munin /usr/lib/munin/cgi/munin-cgi-graph
# spawn-fcgi -s /run/munin/fastcgi-html.sock -U www-data -u munin -g munin /usr/lib/munin/cgi/munin-cgi-html
# https://paste.sh/vofcctHP#-KbDSXVeWoifYncZmLfZzgum
@@ -147,7 +147,7 @@ in
Enable Munin Node agent. Munin node listens on 0.0.0.0 and
by default accepts connections only from 127.0.0.1 for security reasons.
- See <http://guide.munin-monitoring.org/en/latest/architecture/index.html>.
+ See <https://guide.munin-monitoring.org/en/latest/architecture/index.html>.
'';
};
@@ -156,7 +156,7 @@ in
type = types.lines;
description = lib.mdDoc ''
{file}`munin-node.conf` extra configuration. See
- <http://guide.munin-monitoring.org/en/latest/reference/munin-node.conf.html>
+ <https://guide.munin-monitoring.org/en/latest/reference/munin-node.conf.html>
'';
};
@@ -165,7 +165,7 @@ in
type = types.lines;
description = lib.mdDoc ''
{file}`plugin-conf.d` extra plugin configuration. See
- <http://guide.munin-monitoring.org/en/latest/plugin/use.html>
+ <https://guide.munin-monitoring.org/en/latest/plugin/use.html>
'';
example = ''
[fail2ban_*]
@@ -273,9 +273,9 @@ in
type = types.lines;
description = lib.mdDoc ''
{file}`munin.conf` extra global configuration.
- See <http://guide.munin-monitoring.org/en/latest/reference/munin.conf.html>.
+ See <https://guide.munin-monitoring.org/en/latest/reference/munin.conf.html>.
Useful to setup notifications, see
- <http://guide.munin-monitoring.org/en/latest/tutorial/alert.html>
+ <https://guide.munin-monitoring.org/en/latest/tutorial/alert.html>
'';
example = ''
contact.email.command mail -s "Munin notification for ''${var:host}" someone@example.com
@@ -288,7 +288,7 @@ in
description = lib.mdDoc ''
Definitions of hosts of nodes to collect data from. Needs at least one
host for cron to succeed. See
- <http://guide.munin-monitoring.org/en/latest/reference/munin.conf.html>
+ <https://guide.munin-monitoring.org/en/latest/reference/munin.conf.html>
'';
example = literalExpression ''
'''
diff --git a/nixos/modules/services/monitoring/nagios.nix b/nixos/modules/services/monitoring/nagios.nix
index 8feff22c1182..dc5fa1be2922 100644
--- a/nixos/modules/services/monitoring/nagios.nix
+++ b/nixos/modules/services/monitoring/nagios.nix
@@ -88,7 +88,7 @@ in
options = {
services.nagios = {
- enable = mkEnableOption (lib.mdDoc ''[Nagios](http://www.nagios.org/) to monitor your system or network.'');
+ enable = mkEnableOption (lib.mdDoc ''[Nagios](https://www.nagios.org/) to monitor your system or network.'');
objectDefs = mkOption {
description = lib.mdDoc ''
diff --git a/nixos/modules/services/network-filesystems/xtreemfs.nix b/nixos/modules/services/network-filesystems/xtreemfs.nix
index 926c3c3bd523..866661cf4e6f 100644
--- a/nixos/modules/services/network-filesystems/xtreemfs.nix
+++ b/nixos/modules/services/network-filesystems/xtreemfs.nix
@@ -176,7 +176,7 @@ in
description = lib.mdDoc ''
Configuration of XtreemFS DIR service.
WARNING: configuration is saved as plaintext inside nix store.
- For more options: http://www.xtreemfs.org/xtfs-guide-1.5.1/index.html
+ For more options: https://www.xtreemfs.org/xtfs-guide-1.5.1/index.html
'';
};
replication = {
@@ -218,7 +218,7 @@ in
description = lib.mdDoc ''
Configuration of XtreemFS DIR replication plugin.
WARNING: configuration is saved as plaintext inside nix store.
- For more options: http://www.xtreemfs.org/xtfs-guide-1.5.1/index.html
+ For more options: https://www.xtreemfs.org/xtfs-guide-1.5.1/index.html
'';
};
};
@@ -319,7 +319,7 @@ in
description = lib.mdDoc ''
Configuration of XtreemFS MRC service.
WARNING: configuration is saved as plaintext inside nix store.
- For more options: http://www.xtreemfs.org/xtfs-guide-1.5.1/index.html
+ For more options: https://www.xtreemfs.org/xtfs-guide-1.5.1/index.html
'';
};
replication = {
@@ -361,7 +361,7 @@ in
description = lib.mdDoc ''
Configuration of XtreemFS MRC replication plugin.
WARNING: configuration is saved as plaintext inside nix store.
- For more options: http://www.xtreemfs.org/xtfs-guide-1.5.1/index.html
+ For more options: https://www.xtreemfs.org/xtfs-guide-1.5.1/index.html
'';
};
};
@@ -438,7 +438,7 @@ in
description = lib.mdDoc ''
Configuration of XtreemFS OSD service.
WARNING: configuration is saved as plaintext inside nix store.
- For more options: http://www.xtreemfs.org/xtfs-guide-1.5.1/index.html
+ For more options: https://www.xtreemfs.org/xtfs-guide-1.5.1/index.html
'';
};
};
diff --git a/nixos/modules/services/networking/asterisk.nix b/nixos/modules/services/networking/asterisk.nix
index 5a1d03f07211..279927781edc 100644
--- a/nixos/modules/services/networking/asterisk.nix
+++ b/nixos/modules/services/networking/asterisk.nix
@@ -139,7 +139,7 @@ in
path.
See
- <http://www.asterisk.org/community/documentation>
+ <https://www.asterisk.org/community/documentation/>
for more examples of what is possible here.
'';
};
diff --git a/nixos/modules/services/networking/i2pd.nix b/nixos/modules/services/networking/i2pd.nix
index f872daf05b8f..808e7b66d36e 100644
--- a/nixos/modules/services/networking/i2pd.nix
+++ b/nixos/modules/services/networking/i2pd.nix
@@ -239,7 +239,7 @@ in
enable = mkEnableOption (lib.mdDoc "I2Pd daemon") // {
description = lib.mdDoc ''
Enables I2Pd as a running service upon activation.
- Please read http://i2pd.readthedocs.io/en/latest/ for further
+ Please read <https://i2pd.readthedocs.io/en/latest/> for further
configuration help.
'';
};
diff --git a/nixos/modules/services/networking/ntp/ntpd.nix b/nixos/modules/services/networking/ntp/ntpd.nix
index 036a8df635db..2bc690cacf09 100644
--- a/nixos/modules/services/networking/ntp/ntpd.nix
+++ b/nixos/modules/services/networking/ntp/ntpd.nix
@@ -56,7 +56,7 @@ in
The default flags prevent external hosts from using ntpd as a DDoS
reflector, setting system time, and querying OS/ntpd version. As
recommended in section 6.5.1.1.3, answer "No" of
- http://support.ntp.org/bin/view/Support/AccessRestrictions
+ https://support.ntp.org/Support/AccessRestrictions
'';
default = [ "limited" "kod" "nomodify" "notrap" "noquery" "nopeer" ];
};
diff --git a/nixos/modules/services/networking/tox-bootstrapd.nix b/nixos/modules/services/networking/tox-bootstrapd.nix
index 5c7e7a4c2208..0f310a28d266 100644
--- a/nixos/modules/services/networking/tox-bootstrapd.nix
+++ b/nixos/modules/services/networking/tox-bootstrapd.nix
@@ -47,7 +47,7 @@ in
lib.mdDoc ''
Configuration for bootstrap daemon.
See <https://github.com/irungentoo/toxcore/blob/master/other/bootstrap_daemon/tox-bootstrapd.conf>
- and <http://wiki.tox.im/Nodes>.
+ and <https://wiki.tox.chat/users/nodes>.
'';
};
};
diff --git a/nixos/modules/services/torrent/transmission.nix b/nixos/modules/services/torrent/transmission.nix
index b98cb5283a1a..5efb9334ea03 100644
--- a/nixos/modules/services/torrent/transmission.nix
+++ b/nixos/modules/services/torrent/transmission.nix
@@ -148,7 +148,7 @@ in
type = types.bool;
default = true;
description = lib.mdDoc ''
- Whether to enable [Micro Transport Protocol (µTP)](http://en.wikipedia.org/wiki/Micro_Transport_Protocol).
+ Whether to enable [Micro Transport Protocol (µTP)](https://en.wikipedia.org/wiki/Micro_Transport_Protocol).
'';
};
options.watch-dir = mkOption {
diff --git a/nixos/modules/services/video/unifi-video.nix b/nixos/modules/services/video/unifi-video.nix
index cb438a08150f..5c93f60cbd79 100644
--- a/nixos/modules/services/video/unifi-video.nix
+++ b/nixos/modules/services/video/unifi-video.nix
@@ -32,7 +32,7 @@ let
name = "mongo.conf";
executable = false;
text = ''
- # for documentation of all options, see http://docs.mongodb.org/manual/reference/configuration-options/
+ # for documentation of all options, see https://www.mongodb.com/docs/manual/reference/configuration-options/
storage:
dbPath: ${cfg.dataDir}/db
@@ -63,7 +63,7 @@ let
executable = false;
text = ''
# for documentation of all options, see:
- # http://docs.mongodb.org/manual/reference/configuration-options/
+ # https://www.mongodb.com/docs/manual/reference/configuration-options/
storage:
dbPath: ${cfg.dataDir}/db-wt
diff --git a/nixos/modules/services/web-apps/discourse.nix b/nixos/modules/services/web-apps/discourse.nix
index f80eb6b4c7f0..da1dba7d940b 100644
--- a/nixos/modules/services/web-apps/discourse.nix
+++ b/nixos/modules/services/web-apps/discourse.nix
@@ -407,7 +407,7 @@ in
type = with lib.types; nullOr (enum ["plain" "login" "cram_md5"]);
default = null;
description = lib.mdDoc ''
- Authentication type to use, see http://api.rubyonrails.org/classes/ActionMailer/Base.html
+ Authentication type to use, see https://api.rubyonrails.org/classes/ActionMailer/Base.html
'';
};
@@ -423,7 +423,7 @@ in
type = lib.types.str;
default = "peer";
description = lib.mdDoc ''
- How OpenSSL checks the certificate, see http://api.rubyonrails.org/classes/ActionMailer/Base.html
+ How OpenSSL checks the certificate, see https://api.rubyonrails.org/classes/ActionMailer/Base.html
'';
};
diff --git a/nixos/modules/services/web-apps/nextcloud.md b/nixos/modules/services/web-apps/nextcloud.md
index a25bed30e47f..ecc7f380592a 100644
--- a/nixos/modules/services/web-apps/nextcloud.md
+++ b/nixos/modules/services/web-apps/nextcloud.md
@@ -49,7 +49,7 @@ used by the imperative installer and all values are written to an additional fil
to ensure that changes can be applied by changing the module's options.
In case the application serves multiple domains (those are checked with
-[`$_SERVER['HTTP_HOST']`](http://php.net/manual/en/reserved.variables.server.php))
+[`$_SERVER['HTTP_HOST']`](https://www.php.net/manual/en/reserved.variables.server.php))
it's needed to add them to
[`services.nextcloud.config.extraTrustedDomains`](#opt-services.nextcloud.config.extraTrustedDomains).
diff --git a/nixos/modules/services/web-apps/tt-rss.nix b/nixos/modules/services/web-apps/tt-rss.nix
index 592ab253f7da..7b2e3be4295e 100644
--- a/nixos/modules/services/web-apps/tt-rss.nix
+++ b/nixos/modules/services/web-apps/tt-rss.nix
@@ -430,7 +430,7 @@ let
background processes while not running tt-rss, this method is generally
viable to keep your feeds up to date.
Still, there are more robust (and recommended) updating methods
- available, you can read about them here: http://tt-rss.org/wiki/UpdatingFeeds
+ available, you can read about them here: <https://tt-rss.org/wiki/UpdatingFeeds>
'';
};
diff --git a/nixos/modules/services/web-servers/lighttpd/default.nix b/nixos/modules/services/web-servers/lighttpd/default.nix
index 729a633a36cc..eaa113c0d52c 100644
--- a/nixos/modules/services/web-servers/lighttpd/default.nix
+++ b/nixos/modules/services/web-servers/lighttpd/default.nix
@@ -10,7 +10,7 @@ let
# List of known lighttpd modules, ordered by how the lighttpd documentation
# recommends them being imported:
- # http://redmine.lighttpd.net/projects/1/wiki/Server_modulesDetails
+ # https://redmine.lighttpd.net/projects/1/wiki/Server_modulesDetails
#
# Some modules are always imported and should not appear in the config:
# disallowedModules = [ "mod_indexfile" "mod_dirlisting" "mod_staticfile" ];
@@ -84,8 +84,8 @@ let
# server.modules += () entries in each sub-service extraConfig snippet,
# read this:
#
- # http://redmine.lighttpd.net/projects/1/wiki/Server_modulesDetails
- # http://redmine.lighttpd.net/issues/2337
+ # https://redmine.lighttpd.net/projects/1/wiki/Server_modulesDetails
+ # https://redmine.lighttpd.net/issues/2337
#
# Basically, lighttpd doesn't want to load (or even silently ignore) a
# module for a second time, and there is no way to check if a module has
diff --git a/nixos/modules/services/web-servers/mighttpd2.nix b/nixos/modules/services/web-servers/mighttpd2.nix
index 2d887af87c79..bdd6d8b62aa3 100644
--- a/nixos/modules/services/web-servers/mighttpd2.nix
+++ b/nixos/modules/services/web-servers/mighttpd2.nix
@@ -44,7 +44,7 @@ in {
type = types.lines;
description = lib.mdDoc ''
Verbatim config file to use
- (see http://www.mew.org/~kazu/proj/mighttpd/en/config.html)
+ (see https://kazu-yamamoto.github.io/mighttpd2/config.html)
'';
};</