summaryrefslogtreecommitdiffstats
path: root/nixos
diff options
context:
space:
mode:
authorpennae <github@quasiparticle.net>2022-08-03 03:05:47 +0200
committerpennae <github@quasiparticle.net>2022-08-03 21:57:46 +0200
commit3aebb4a2be8821a6d8a695f0908d8567dc00de31 (patch)
tree6c6cf42e633fc9c02869f0affa9b41179bbba72d /nixos
parent9c8531c8a50936ec65bc0471748237e310ec0c9a (diff)
nixos/*: normalize link format
make (almost) all links appear on only a single line, with no unnecessary whitespace, using double quotes for attributes. this lets us automatically convert them to markdown easily. the few remaining links are extremely long link in a gnome module, we'll come back to those at a later date.
Diffstat (limited to 'nixos')
-rw-r--r--nixos/modules/config/i18n.nix3
-rw-r--r--nixos/modules/config/users-groups.nix3
-rw-r--r--nixos/modules/config/xdg/portal.nix2
-rw-r--r--nixos/modules/hardware/tuxedo-keyboard.nix2
-rw-r--r--nixos/modules/programs/sway.nix2
-rw-r--r--nixos/modules/security/acme/default.nix4
-rw-r--r--nixos/modules/security/pam.nix29
-rw-r--r--nixos/modules/security/pam_mount.nix9
-rw-r--r--nixos/modules/security/pam_usb.nix3
-rw-r--r--nixos/modules/services/backup/zrepl.nix3
-rw-r--r--nixos/modules/services/continuous-integration/github-runner.nix3
-rw-r--r--nixos/modules/services/databases/postgresql.nix3
-rw-r--r--nixos/modules/services/databases/victoriametrics.nix4
-rw-r--r--nixos/modules/services/development/zammad.nix2
-rw-r--r--nixos/modules/services/games/asf.nix4
-rw-r--r--nixos/modules/services/hardware/udev.nix5
-rw-r--r--nixos/modules/services/logging/filebeat.nix3
-rw-r--r--nixos/modules/services/mail/mailman.nix2
-rw-r--r--nixos/modules/services/mail/sympa.nix6
-rw-r--r--nixos/modules/services/matrix/appservice-discord.nix3
-rw-r--r--nixos/modules/services/matrix/mautrix-facebook.nix3
-rw-r--r--nixos/modules/services/matrix/mautrix-telegram.nix3
-rw-r--r--nixos/modules/services/misc/etcd.nix2
-rw-r--r--nixos/modules/services/misc/etebase-server.nix4
-rw-r--r--nixos/modules/services/misc/geoipupdate.nix5
-rw-r--r--nixos/modules/services/misc/persistent-evdev.nix4
-rw-r--r--nixos/modules/services/monitoring/cadvisor.nix4
-rw-r--r--nixos/modules/services/monitoring/grafana-image-renderer.nix2
-rw-r--r--nixos/modules/services/monitoring/graphite.nix2
-rw-r--r--nixos/modules/services/monitoring/munin.nix12
-rw-r--r--nixos/modules/services/monitoring/nagios.nix2
-rw-r--r--nixos/modules/services/monitoring/parsedmarc.nix19
-rw-r--r--nixos/modules/services/monitoring/prometheus/default.nix15
-rw-r--r--nixos/modules/services/monitoring/prometheus/exporters/dovecot.nix8
-rw-r--r--nixos/modules/services/monitoring/prometheus/exporters/process.nix2
-rw-r--r--nixos/modules/services/monitoring/prometheus/exporters/script.nix2
-rw-r--r--nixos/modules/services/networking/bird-lg.nix12
-rw-r--r--nixos/modules/services/networking/bird.nix2
-rw-r--r--nixos/modules/services/networking/coredns.nix5
-rw-r--r--nixos/modules/services/networking/seafile.nix2
-rw-r--r--nixos/modules/services/networking/ssh/sshd.nix12
-rw-r--r--nixos/modules/services/networking/wireguard.nix6
-rw-r--r--nixos/modules/services/networking/wpa_supplicant.nix2
-rw-r--r--nixos/modules/services/security/privacyidea.nix6
-rw-r--r--nixos/modules/services/security/step-ca.nix4
-rw-r--r--nixos/modules/services/security/tor.nix10
-rw-r--r--nixos/modules/services/security/vaultwarden/default.nix2
-rw-r--r--nixos/modules/services/web-apps/hedgedoc.nix3
-rw-r--r--nixos/modules/services/web-apps/keycloak.nix19
-rw-r--r--nixos/modules/services/web-apps/mediawiki.nix2
-rw-r--r--nixos/modules/services/web-apps/nextcloud.nix12
-rw-r--r--nixos/modules/services/web-apps/node-red.nix3
-rw-r--r--nixos/modules/services/web-apps/wiki-js.nix5
-rw-r--r--nixos/modules/services/web-apps/wordpress.nix4
-rw-r--r--nixos/modules/services/web-servers/apache-httpd/vhost-options.nix6
-rw-r--r--nixos/modules/services/web-servers/nginx/default.nix8
-rw-r--r--nixos/modules/services/web-servers/uwsgi.nix3
-rw-r--r--nixos/modules/system/boot/initrd-network.nix5
-rw-r--r--nixos/modules/system/boot/networkd.nix7
-rw-r--r--nixos/modules/system/boot/systemd/logind.nix3
-rw-r--r--nixos/modules/tasks/network-interfaces.nix2
61 files changed, 140 insertions, 189 deletions
diff --git a/nixos/modules/config/i18n.nix b/nixos/modules/config/i18n.nix
index 80ef515fbfe2..dad06c1b44cd 100644
--- a/nixos/modules/config/i18n.nix
+++ b/nixos/modules/config/i18n.nix
@@ -75,8 +75,7 @@ with lib;
List of locales that the system should support. The value
<literal>"all"</literal> means that all locales supported by
Glibc will be installed. A full list of supported locales
- can be found at <link
- xlink:href="https://sourceware.org/git/?p=glibc.git;a=blob;f=localedata/SUPPORTED"/>.
+ can be found at <link xlink:href="https://sourceware.org/git/?p=glibc.git;a=blob;f=localedata/SUPPORTED"/>.
'';
};
diff --git a/nixos/modules/config/users-groups.nix b/nixos/modules/config/users-groups.nix
index 446cc3698bef..2e5984b55cc1 100644
--- a/nixos/modules/config/users-groups.nix
+++ b/nixos/modules/config/users-groups.nix
@@ -156,8 +156,7 @@ let
<filename>pam_mount.conf.xml</filename>.
Useful attributes might include <literal>path</literal>,
<literal>options</literal>, <literal>fstype</literal>, and <literal>server</literal>.
- See <link
- xlink:href="http://pam-mount.sourceforge.net/pam_mount.conf.5.html" />
+ See <link xlink:href="http://pam-mount.sourceforge.net/pam_mount.conf.5.html"/>
for more information.
'';
};
diff --git a/nixos/modules/config/xdg/portal.nix b/nixos/modules/config/xdg/portal.nix
index 1e6ddd7c4a26..689abf267f09 100644
--- a/nixos/modules/config/xdg/portal.nix
+++ b/nixos/modules/config/xdg/portal.nix
@@ -33,7 +33,7 @@ in
options.xdg.portal = {
enable =
- mkEnableOption "<link xlink:href='https://github.com/flatpak/xdg-desktop-portal'>xdg desktop integration</link>" // {
+ mkEnableOption ''<link xlink:href="https://github.com/flatpak/xdg-desktop-portal">xdg desktop integration</link>'' // {
default = false;
};
diff --git a/nixos/modules/hardware/tuxedo-keyboard.nix b/nixos/modules/hardware/tuxedo-keyboard.nix
index 97af7c61f3c9..7bcabde48900 100644
--- a/nixos/modules/hardware/tuxedo-keyboard.nix
+++ b/nixos/modules/hardware/tuxedo-keyboard.nix
@@ -13,7 +13,7 @@ in
To configure the driver, pass the options to the <option>boot.kernelParams</option> configuration.
There are several parameters you can change. It's best to check at the source code description which options are supported.
- You can find all the supported parameters at: <link xlink:href="https://github.com/tuxedocomputers/tuxedo-keyboard#kernelparam" />
+ You can find all the supported parameters at: <link xlink:href="https://github.com/tuxedocomputers/tuxedo-keyboard#kernelparam"/>
In order to use the <literal>custom</literal> lighting with the maximumg brightness and a color of <literal>0xff0a0a</literal> one would put pass <option>boot.kernelParams</option> like this:
diff --git a/nixos/modules/programs/sway.nix b/nixos/modules/programs/sway.nix
index decae1b4d2da..af2b261d3c5f 100644
--- a/nixos/modules/programs/sway.nix
+++ b/nixos/modules/programs/sway.nix
@@ -39,7 +39,7 @@ in {
Sway, the i3-compatible tiling Wayland compositor. You can manually launch
Sway by executing "exec sway" on a TTY. Copy /etc/sway/config to
~/.config/sway/config to modify the default configuration. See
- <link xlink:href="https://github.com/swaywm/sway/wiki" /> and
+ <link xlink:href="https://github.com/swaywm/sway/wiki"/> and
"man 5 sway" for more information'';
wrapperFeatures = mkOption {
diff --git a/nixos/modules/security/acme/default.nix b/nixos/modules/security/acme/default.nix
index 5f4344d451c8..4bc3d8e743d3 100644
--- a/nixos/modules/security/acme/default.nix
+++ b/nixos/modules/security/acme/default.nix
@@ -581,8 +581,8 @@ let
Turns on the OCSP Must-Staple TLS extension.
Make sure you know what you're doing! See:
<itemizedlist>
- <listitem><para><link xlink:href="https://blog.apnic.net/2019/01/15/is-the-web-ready-for-ocsp-must-staple/" /></para></listitem>
- <listitem><para><link xlink:href="https://blog.hboeck.de/archives/886-The-Problem-with-OCSP-Stapling-and-Must-Staple-and-why-Certificate-Revocation-is-still-broken.html" /></para></listitem>
+ <listitem><para><link xlink:href="https://blog.apnic.net/2019/01/15/is-the-web-ready-for-ocsp-must-staple/"/></para></listitem>
+ <listitem><para><link xlink:href="https://blog.hboeck.de/archives/886-The-Problem-with-OCSP-Stapling-and-Must-Staple-and-why-Certificate-Revocation-is-still-broken.html"/></para></listitem>
</itemizedlist>
'';
};
diff --git a/nixos/modules/security/pam.nix b/nixos/modules/security/pam.nix
index 7903d333411b..8a70e5f3adbd 100644
--- a/nixos/modules/security/pam.nix
+++ b/nixos/modules/security/pam.nix
@@ -831,8 +831,7 @@ in
If set, users can log in with SSH keys and PKCS#11 tokens.
- More information can be found <link
- xlink:href="https://github.com/OpenSC/pam_p11">here</link>.
+ More information can be found <link xlink:href="https://github.com/OpenSC/pam_p11">here</link>.
'';
};
@@ -872,8 +871,7 @@ in
<literal>username:first_keyHandle,first_public_key: second_keyHandle,second_public_key</literal>
This file can be generated using <command>pamu2fcfg</command> command.
- More information can be found <link
- xlink:href="https://developers.yubico.com/pam-u2f/">here</link>.
+ More information can be found <link xlink:href="https://developers.yubico.com/pam-u2f/">here</link>.
'';
};
@@ -894,8 +892,7 @@ in
<literal>username:first_keyHandle,first_public_key: second_keyHandle,second_public_key</literal>
This file can be generated using <command>pamu2fcfg</command> command.
- More information can be found <link
- xlink:href="https://developers.yubico.com/pam-u2f/">here</link>.
+ More information can be found <link xlink:href="https://developers.yubico.com/pam-u2f/">here</link>.
'';
};
@@ -909,9 +906,7 @@ in
When using <command>pamu2fcfg</command>, you can specify your
application ID with the <literal>-i</literal> flag.
- More information can be found <link
- xlink:href="https://developers.yubico.com/pam-u2f/Manuals/pam_u2f.8.html">
- here</link>
+ More information can be found <link xlink:href="https://developers.yubico.com/pam-u2f/Manuals/pam_u2f.8.html">here</link>
'';
};
@@ -927,9 +922,7 @@ in
When using <command>pamu2fcfg</command>, you can specify your
application ID with the <literal>-o</literal> flag.
- More information can be found <link
- xlink:href="https://developers.yubico.com/pam-u2f/Manuals/pam_u2f.8.html">
- here</link>
+ More information can be found <link xlink:href="https://developers.yubico.com/pam-u2f/Manuals/pam_u2f.8.html">here</link>
'';
};
@@ -995,8 +988,7 @@ in
Note that this module must both be enabled using this option and on a
per-PAM-service level as well (using <literal>usshAuth</literal>).
- More information can be found <link
- xlink:href="https://github.com/uber/pam-ussh">here</link>.
+ More information can be found <link xlink:href="https://github.com/uber/pam-ussh">here</link>.
'';
};
@@ -1084,8 +1076,7 @@ in
The file must have only one line:
<literal>username:yubikey_token_id1:yubikey_token_id2</literal>
- More information can be found <link
- xlink:href="https://developers.yubico.com/yubico-pam/">here</link>.
+ More information can be found <link xlink:href="https://developers.yubico.com/yubico-pam/">here</link>.
'';
};
control = mkOption {
@@ -1130,8 +1121,7 @@ in
Challenge-Response configurations. See the man-page ykpamcfg(1) for further
details on how to configure offline Challenge-Response validation.
- More information can be found <link
- xlink:href="https://developers.yubico.com/yubico-pam/Authentication_Using_Challenge-Response.html">here</link>.
+ More information can be found <link xlink:href="https://developers.yubico.com/yubico-pam/Authentication_Using_Challenge-Response.html">here</link>.
'';
};
challengeResponsePath = mkOption {
@@ -1140,8 +1130,7 @@ in
description = ''
If not null, set the path used by yubico pam module where the challenge expected response is stored.
- More information can be found <link
- xlink:href="https://developers.yubico.com/yubico-pam/Authentication_Using_Challenge-Response.html">here</link>.
+ More information can be found <link xlink:href="https://developers.yubico.com/yubico-pam/Authentication_Using_Challenge-Response.html">here</link>.
'';
};
};
diff --git a/nixos/modules/security/pam_mount.nix b/nixos/modules/security/pam_mount.nix
index e159a73b66a4..ae314abd86c6 100644
--- a/nixos/modules/security/pam_mount.nix
+++ b/nixos/modules/security/pam_mount.nix
@@ -33,8 +33,7 @@ in
default = [];
description = ''
List of volume definitions for pam_mount.
- For more information, visit <link
- xlink:href="http://pam-mount.sourceforge.net/pam_mount.conf.5.html" />.
+ For more information, visit <link xlink:href="http://pam-mount.sourceforge.net/pam_mount.conf.5.html"/>.
'';
};
@@ -67,8 +66,7 @@ in
description = ''
Sets the Debug-Level. 0 disables debugging, 1 enables pam_mount tracing,
and 2 additionally enables tracing in mount.crypt. The default is 0.
- For more information, visit <link
- xlink:href="http://pam-mount.sourceforge.net/pam_mount.conf.5.html" />.
+ For more information, visit <link xlink:href="http://pam-mount.sourceforge.net/pam_mount.conf.5.html"/>.
'';
};
@@ -78,8 +76,7 @@ in
description = ''
Amount of microseconds to wait until killing remaining processes after
final logout.
- For more information, visit <link
- xlink:href="http://pam-mount.sourceforge.net/pam_mount.conf.5.html" />.
+ For more information, visit <link xlink:href="http://pam-mount.sourceforge.net/pam_mount.conf.5.html"/>.
'';
};
diff --git a/nixos/modules/security/pam_usb.nix b/nixos/modules/security/pam_usb.nix
index 51d81e823f86..71e2af8f3a51 100644
--- a/nixos/modules/security/pam_usb.nix
+++ b/nixos/modules/security/pam_usb.nix
@@ -19,8 +19,7 @@ in
default = false;
description = ''
Enable USB login for all login systems that support it. For
- more information, visit <link
- xlink:href="https://github.com/aluzzardi/pam_usb/wiki/Getting-Started#setting-up-devices-and-users" />.
+ more information, visit <link xlink:href="https://github.com/aluzzardi/pam_usb/wiki/Getting-Started#setting-up-devices-and-users"/>.
'';
};
diff --git a/nixos/modules/services/backup/zrepl.nix b/nixos/modules/services/backup/zrepl.nix
index e3a900912645..7b31b0da0369 100644
--- a/nixos/modules/services/backup/zrepl.nix
+++ b/nixos/modules/services/backup/zrepl.nix
@@ -23,8 +23,7 @@ in
settings = mkOption {
default = { };
description = ''
- Configuration for zrepl. See <link
- xlink:href="https://zrepl.github.io/configuration.html"/>
+ Configuration for zrepl. See <link xlink:href="https://zrepl.github.io/configuration.html"/>
for more information.
'';
type = types.submodule {
diff --git a/nixos/modules/services/continuous-integration/github-runner.nix b/nixos/modules/services/continuous-integration/github-runner.nix
index 2da18bbdb396..2c753b514c5b 100644
--- a/nixos/modules/services/continuous-integration/github-runner.nix
+++ b/nixos/modules/services/continuous-integration/github-runner.nix
@@ -22,8 +22,7 @@ in
Whether to enable GitHub Actions runner.
Note: GitHub recommends using self-hosted runners with private repositories only. Learn more here:
- <link xlink:href="https://docs.github.com/en/actions/hosting-your-own-runners/about-self-hosted-runners"
- >About self-hosted runners</link>.
+ <link xlink:href="https://docs.github.com/en/actions/hosting-your-own-runners/about-self-hosted-runners">About self-hosted runners</link>.
'';
type = lib.types.bool;
};
diff --git a/nixos/modules/services/databases/postgresql.nix b/nixos/modules/services/databases/postgresql.nix
index a054a6d7a12f..8225a9aaba61 100644
--- a/nixos/modules/services/databases/postgresql.nix
+++ b/nixos/modules/services/databases/postgresql.nix
@@ -81,8 +81,7 @@ in
default = "";
description = ''
Defines how users authenticate themselves to the server. See the
- <link xlink:href="https://www.postgresql.org/docs/current/auth-pg-hba-conf.html">
- PostgreSQL documentation for pg_hba.conf</link>
+ <link xlink:href="https://www.postgresql.org/docs/current/auth-pg-hba-conf.html">PostgreSQL documentation for pg_hba.conf</link>
for details on the expected format of this option. By default,
peer based authentication will be used for users connecting
via the Unix socket, and md5 password authentication will be
diff --git a/nixos/modules/services/databases/victoriametrics.nix b/nixos/modules/services/databases/victoriametrics.nix
index 28a6ccfd5e20..4e002b3df7c7 100644
--- a/nixos/modules/services/databases/victoriametrics.nix
+++ b/nixos/modules/services/databases/victoriametrics.nix
@@ -29,8 +29,8 @@ let cfg = config.services.victoriametrics; in
type = types.listOf types.str;
default = [];
description = ''
- Extra options to pass to VictoriaMetrics. See the README: <link
- xlink:href="https://github.com/VictoriaMetrics/VictoriaMetrics/blob/master/README.md" />
+ Extra options to pass to VictoriaMetrics. See the README:
+ <link xlink:href="https://github.com/VictoriaMetrics/VictoriaMetrics/blob/master/README.md"/>
or <command>victoriametrics -help</command> for more
information.
'';
diff --git a/nixos/modules/services/development/zammad.nix b/nixos/modules/services/development/zammad.nix
index 503f54aee2c7..e81eef3c0a51 100644
--- a/nixos/modules/services/development/zammad.nix
+++ b/nixos/modules/services/development/zammad.nix
@@ -139,7 +139,7 @@ in
'';
description = ''
The <filename>database.yml</filename> configuration file as key value set.
- See <link xlink:href='TODO' />
+ See <link xlink:href="TODO"/>
for list of configuration parameters.
'';
};
diff --git a/nixos/modules/services/games/asf.nix b/nixos/modules/services/games/asf.nix
index 37247e195a78..6939e15c207d 100644
--- a/nixos/modules/services/games/asf.nix
+++ b/nixos/modules/services/games/asf.nix
@@ -136,7 +136,9 @@ in
};
settings = mkOption {
type = types.attrs;
- description = "Additional settings that are documented <link xlink:href=\"https://github.com/JustArchiNET/ArchiSteamFarm/wiki/Configuration#bot-config\">here</link>.";
+ description = ''
+ Additional settings that are documented <link xlink:href="https://github.com/JustArchiNET/ArchiSteamFarm/wiki/Configuration#bot-config">here</link>.
+ '';
default = { };
};
};
diff --git a/nixos/modules/services/hardware/udev.nix b/nixos/modules/services/hardware/udev.nix
index f54979832cb3..f745e2f7f606 100644
--- a/nixos/modules/services/hardware/udev.nix
+++ b/nixos/modules/services/hardware/udev.nix
@@ -282,9 +282,8 @@ in
default = true;
type = types.bool;
description = ''
- Whether to assign <link
- xlink:href='http://www.freedesktop.org/wiki/Software/systemd/PredictableNetworkInterfaceNames'>predictable
- names to network interfaces</link>. If enabled, interfaces
+ Whether to assign <link xlink:href="http://www.freedesktop.org/wiki/Software/systemd/PredictableNetworkInterfaceNames">predictable names to network interfaces</link>.
+ If enabled, interfaces
are assigned names that contain topology information
(e.g. <literal>wlp3s0</literal>) and thus should be stable
across reboots. If disabled, names depend on the order in
diff --git a/nixos/modules/services/logging/filebeat.nix b/nixos/modules/services/logging/filebeat.nix
index ec8df0a7b87d..045cd1147ead 100644
--- a/nixos/modules/services/logging/filebeat.nix
+++ b/nixos/modules/services/logging/filebeat.nix
@@ -161,8 +161,7 @@ in
internal = true;
description = ''
Inputs specify how Filebeat locates and processes
- input data. Use <xref
- linkend="opt-services.filebeat.inputs"/> instead.
+ input data. Use <xref linkend="opt-services.filebeat.inputs"/> instead.
See <link xlink:href="https://www.elastic.co/guide/en/beats/filebeat/current/configuration-filebeat-options.html"/>.
'';
diff --git a/nixos/modules/services/mail/mailman.nix b/nixos/modules/services/mail/mailman.nix
index eb24f73c1da8..c3eb61bd20d7 100644
--- a/nixos/modules/services/mail/mailman.nix
+++ b/