diff --git a/doc/languages-frameworks/java.xml b/doc/languages-frameworks/java.xml
index 667a795a8d3a..287f63e685c4 100644
--- a/doc/languages-frameworks/java.xml
+++ b/doc/languages-frameworks/java.xml
@@ -68,7 +68,7 @@ installPhase =
can be done in a generic fashion with the --set argument
of makeWrapper:
- --set JAVA_HOME ${jdk.home}
+--set JAVA_HOME ${jdk.home}
diff --git a/nixos/doc/manual/configuration/matrix.xml b/nixos/doc/manual/configuration/matrix.xml
index 66965460a15d..e43b70faf7ac 100644
--- a/nixos/doc/manual/configuration/matrix.xml
+++ b/nixos/doc/manual/configuration/matrix.xml
@@ -33,91 +33,91 @@
installation instructions of Synapse .
+let
+ fqdn =
let
- fqdn =
- let
- join = hostName: domain: hostName + optionalString (domain != null) ".${domain}";
- in join config.networking.hostName config.networking.domain;
- in {
- networking = {
- hostName = "myhostname";
- domain = "example.org";
- };
- networking.firewall.allowedTCPPorts = [ 80 443 ];
+ join = hostName: domain: hostName + optionalString (domain != null) ".${domain}";
+ in join config.networking.hostName config.networking.domain;
+in {
+ networking = {
+ hostName = "myhostname";
+ domain = "example.org";
+ };
+ networking.firewall.allowedTCPPorts = [ 80 443 ];
- services.nginx = {
- enable = true;
- # only recommendedProxySettings and recommendedGzipSettings are strictly required,
- # but the rest make sense as well
- recommendedTlsSettings = true;
- recommendedOptimisation = true;
- recommendedGzipSettings = true;
- recommendedProxySettings = true;
+ services.nginx = {
+ enable = true;
+ # only recommendedProxySettings and recommendedGzipSettings are strictly required,
+ # but the rest make sense as well
+ recommendedTlsSettings = true;
+ recommendedOptimisation = true;
+ recommendedGzipSettings = true;
+ recommendedProxySettings = true;
- virtualHosts = {
- # This host section can be placed on a different host than the rest,
- # i.e. to delegate from the host being accessible as ${config.networking.domain}
- # to another host actually running the Matrix homeserver.
- "${config.networking.domain}" = {
- locations."= /.well-known/matrix/server".extraConfig =
- let
- # use 443 instead of the default 8448 port to unite
- # the client-server and server-server port for simplicity
- server = { "m.server" = "${fqdn}:443"; };
- in ''
- add_header Content-Type application/json;
- return 200 '${builtins.toJSON server}';
- '';
- locations."= /.well-known/matrix/client".extraConfig =
- let
- client = {
- "m.homeserver" = { "base_url" = "https://${fqdn}"; };
- "m.identity_server" = { "base_url" = "https://vector.im"; };
- };
- # ACAO required to allow riot-web on any URL to request this json file
- in ''
- add_header Content-Type application/json;
- add_header Access-Control-Allow-Origin *;
- return 200 '${builtins.toJSON client}';
- '';
- };
-
- # Reverse proxy for Matrix client-server and server-server communication
- ${fqdn} = {
- enableACME = true;
- forceSSL = true;
-
- # Or do a redirect instead of the 404, or whatever is appropriate for you.
- # But do not put a Matrix Web client here! See the Riot Web section below.
- locations."/".extraConfig = ''
- return 404;
- '';
-
- # forward all Matrix API calls to the synapse Matrix homeserver
- locations."/_matrix" = {
- proxyPass = "http://[::1]:8008";
+ virtualHosts = {
+ # This host section can be placed on a different host than the rest,
+ # i.e. to delegate from the host being accessible as ${config.networking.domain}
+ # to another host actually running the Matrix homeserver.
+ "${config.networking.domain}" = {
+ locations."= /.well-known/matrix/server".extraConfig =
+ let
+ # use 443 instead of the default 8448 port to unite
+ # the client-server and server-server port for simplicity
+ server = { "m.server" = "${fqdn}:443"; };
+ in ''
+ add_header Content-Type application/json;
+ return 200 '${builtins.toJSON server}';
+ '';
+ locations."= /.well-known/matrix/client".extraConfig =
+ let
+ client = {
+ "m.homeserver" = { "base_url" = "https://${fqdn}"; };
+ "m.identity_server" = { "base_url" = "https://vector.im"; };
};
- };
+ # ACAO required to allow riot-web on any URL to request this json file
+ in ''
+ add_header Content-Type application/json;
+ add_header Access-Control-Allow-Origin *;
+ return 200 '${builtins.toJSON client}';
+ '';
+ };
+
+ # Reverse proxy for Matrix client-server and server-server communication
+ ${fqdn} = {
+ enableACME = true;
+ forceSSL = true;
+
+ # Or do a redirect instead of the 404, or whatever is appropriate for you.
+ # But do not put a Matrix Web client here! See the Riot Web section below.
+ locations."/".extraConfig = ''
+ return 404;
+ '';
+
+ # forward all Matrix API calls to the synapse Matrix homeserver
+ locations."/_matrix" = {
+ proxyPass = "http://[::1]:8008";
};
};
- services.matrix-synapse = {
- enable = true;
- server_name = config.networking.domain;
- listeners = [
- {
- port = 8008;
- bind_address = "::1";
- type = "http";
- tls = false;
- x_forwarded = true;
- resources = [
- { names = [ "client" "federation" ]; compress = false; }
- ];
- }
- ];
- };
};
-
+ };
+ services.matrix-synapse = {
+ enable = true;
+ server_name = config.networking.domain;
+ listeners = [
+ {
+ port = 8008;
+ bind_address = "::1";
+ type = "http";
+ tls = false;
+ x_forwarded = true;
+ resources = [
+ { names = [ "client" "federation" ]; compress = false; }
+ ];
+ }
+ ];
+ };
+};
+
@@ -142,14 +142,14 @@
create a new user or admin, run the following after you have set the secret
and have rebuilt NixOS:
- $ nix run nixpkgs.matrix-synapse
- $ register_new_matrix_user -k <your-registration-shared-secret> http://localhost:8008
- New user localpart: <your-username>
- Password:
- Confirm password:
- Make admin [no]:
- Success!
-
+$ nix run nixpkgs.matrix-synapse
+$ register_new_matrix_user -k <your-registration-shared-secret> http://localhost:8008
+New user localpart: <your-username>
+Password:
+Confirm password:
+Make admin [no]:
+Success!
+
In the example, this would create a user with the Matrix Identifier
@your-username:example.org. Note that the registration
secret ends up in the nix store and therefore is world-readable by any user
@@ -177,16 +177,16 @@
Matrix Now! for a list of existing clients and their supported
featureset.
- services.nginx.virtualHosts."riot.${fqdn}" = {
- enableACME = true;
- forceSSL = true;
- serverAliases = [
- "riot.${config.networking.domain}"
- ];
+services.nginx.virtualHosts."riot.${fqdn}" = {
+ enableACME = true;
+ forceSSL = true;
+ serverAliases = [
+ "riot.${config.networking.domain}"
+ ];
- root = pkgs.riot-web;
- };
-
+ root = pkgs.riot-web;
+};
+
diff --git a/nixos/doc/manual/configuration/modularity.xml b/nixos/doc/manual/configuration/modularity.xml
index 724abd31ca4e..67bb5a47d729 100644
--- a/nixos/doc/manual/configuration/modularity.xml
+++ b/nixos/doc/manual/configuration/modularity.xml
@@ -129,17 +129,17 @@ nix-repl> map (x: x.hostName) config.
+{ imports = [ (netConfig "nixos.localdomain") ]; }
+
diff --git a/nixos/doc/manual/configuration/profiles.xml b/nixos/doc/manual/configuration/profiles.xml
index c0a8f55785fc..9d08f7f7bed2 100644
--- a/nixos/doc/manual/configuration/profiles.xml
+++ b/nixos/doc/manual/configuration/profiles.xml
@@ -16,7 +16,7 @@
imports = [
<nixpkgs/nixos/modules/profiles/profile-name.nix>
];
-
+
Even if some of these profiles seem only useful in the context of install
media, many are actually intended to be used in real installs.
diff --git a/nixos/doc/manual/configuration/user-mgmt.xml b/nixos/doc/manual/configuration/user-mgmt.xml
index 66c1c6eb3a11..4b1710f3a2b1 100644
--- a/nixos/doc/manual/configuration/user-mgmt.xml
+++ b/nixos/doc/manual/configuration/user-mgmt.xml
@@ -44,7 +44,7 @@
A user ID (uid) is assigned automatically. You can also specify a uid
manually by adding
- uid = 1000;
+uid = 1000;
to the user specification.
diff --git a/nixos/doc/manual/configuration/xfce.xml b/nixos/doc/manual/configuration/xfce.xml
index 77d5d9632792..f2967fa3b10a 100644
--- a/nixos/doc/manual/configuration/xfce.xml
+++ b/nixos/doc/manual/configuration/xfce.xml
@@ -11,7 +11,7 @@
xfce.enable = true;
default = "xfce";
};
-
+
Optionally, compton can be enabled for nice graphical
@@ -24,7 +24,7 @@
shadow = true;
fadeDelta = 4;
};
-
+
Some Xfce programs are not installed automatically. To install them manually
@@ -37,7 +37,7 @@
To enable Thunar volume support, put
= true;
-
+
into your configuration.nix.
@@ -58,14 +58,14 @@
on start (look at journalctl --user -b).
Thunar:2410): GVFS-RemoteVolumeMonitor-WARNING **: remote volume monitor with dbus name org.gtk.Private.UDisks2VolumeMonitor is not supported
-
+
This is caused by some needed GNOME services not running. This is all fixed
by enabling "Launch GNOME services on startup" in the Advanced tab of the
Session and Startup settings panel. Alternatively, you can run this command
to do the same thing.
$ xfconf-query -c xfce4-session -p /compat/LaunchGNOME -s true
-
+
A log-out and re-log will be needed for this to take effect.
diff --git a/nixos/doc/manual/development/writing-nixos-tests.xml b/nixos/doc/manual/development/writing-nixos-tests.xml
index 4a2615c9407b..6be2d0a4d231 100644
--- a/nixos/doc/manual/development/writing-nixos-tests.xml
+++ b/nixos/doc/manual/development/writing-nixos-tests.xml
@@ -397,9 +397,9 @@ startAll;
- $machine->systemctl("list-jobs --no-pager"); // runs `systemctl list-jobs --no-pager`
- $machine->systemctl("list-jobs --no-pager", "any-user"); // spawns a shell for `any-user` and runs `systemctl --user list-jobs --no-pager`
-
+$machine->systemctl("list-jobs --no-pager"); // runs `systemctl list-jobs --no-pager`
+$machine->systemctl("list-jobs --no-pager", "any-user"); // spawns a shell for `any-user` and runs `systemctl --user list-jobs --no-pager`
+
@@ -410,10 +410,10 @@ startAll;
To test user units declared by systemd.user.services the
optional $user argument can be used:
- $machine->start;
- $machine->waitForX;
- $machine->waitForUnit("xautolock.service", "x-session-user");
-
+$machine->start;
+$machine->waitForX;
+$machine->waitForUnit("xautolock.service", "x-session-user");
+
This applies to systemctl, getUnitInfo,
waitForUnit, startJob and
stopJob.
diff --git a/nixos/doc/manual/installation/changing-config.xml b/nixos/doc/manual/installation/changing-config.xml
index 1a116ec0b655..b77d71389a9d 100644
--- a/nixos/doc/manual/installation/changing-config.xml
+++ b/nixos/doc/manual/installation/changing-config.xml
@@ -9,7 +9,8 @@
changed something in that file, you
should do
-# nixos-rebuild switch
+# nixos-rebuild switch
+
to build the new configuration, make it the default configuration for
booting, and try to realise the configuration in the running system (e.g., by
restarting system services).
@@ -23,7 +24,8 @@
You can also do
-# nixos-rebuild test
+# nixos-rebuild test
+
to build the configuration and switch the running system to it, but without
making it the boot default. So if (say) the configuration locks up your
machine, you can just reboot to get back to a working configuration.
@@ -31,7 +33,8 @@
There is also
-# nixos-rebuild boot
+# nixos-rebuild boot
+
to build the configuration and make it the boot default, but not switch to it
now (so it will only take effect after the next reboot).
@@ -39,7 +42,8 @@
You can make your configuration show up in a different submenu of the GRUB 2
boot screen by giving it a different profile name, e.g.
-# nixos-rebuild switch -p test
+# nixos-rebuild switch -p test
+
which causes the new configuration (and previous ones created using
-p test) to show up in the GRUB submenu “NixOS - Profile
'test'”. This can be useful to separate test configurations from
@@ -48,7 +52,8 @@
Finally, you can do
-$ nixos-rebuild build
+$ nixos-rebuild build
+
to build the configuration but nothing more. This is useful to see whether
everything compiles cleanly.
@@ -58,8 +63,8 @@ $ nixos-rebuild build
virtual machine that contains the desired configuration.
Just do
-$ nixos-rebuild build-vm
-$ ./result/bin/run-*-vm
+$ nixos-rebuild build-vm
+$ ./result/bin/run-*-vm
The VM does not have any data from your host system, so your existing user
accounts and home directories will not be available unless you have set
@@ -74,12 +79,12 @@ $ ./result/bin/run-*-vm
guest. For instance, the following will forward host port 2222 to guest port
22 (SSH):
-$ QEMU_NET_OPTS="hostfwd=tcp::2222-:22" ./result/bin/run-*-vm
+$ QEMU_NET_OPTS="hostfwd=tcp::2222-:22" ./result/bin/run-*-vm
allowing you to log in via SSH (assuming you have set the appropriate
passwords or SSH authorized keys):
-$ ssh -p 2222 localhost
+$ ssh -p 2222 localhost
diff --git a/nixos/doc/manual/installation/installing-from-other-distro.xml b/nixos/doc/manual/installation/installing-from-other-distro.xml
index d1e49a2a1597..8ed45899fd7f 100644
--- a/nixos/doc/manual/installation/installing-from-other-distro.xml
+++ b/nixos/doc/manual/installation/installing-from-other-distro.xml
@@ -47,8 +47,8 @@
Short version:
-$ curl https://nixos.org/nix/install | sh
-$ . $HOME/.nix-profile/etc/profile.d/nix.sh # …or open a fresh shell
+$ curl https://nixos.org/nix/install | sh
+$ . $HOME/.nix-profile/etc/profile.d/nix.sh # …or open a fresh shell
More details in the
the nixpkgs channel by default.
-$ nix-channel --list
+$ nix-channel --list
nixpkgs https://nixos.org/channels/nixpkgs-unstable
As that channel gets released without running the NixOS tests, it will be
safer to use the nixos-* channels instead:
-$ nix-channel --add https://nixos.org/channels/nixos-version nixpkgs
+$ nix-channel --add https://nixos.org/channels/nixos-version nixpkgs
You may want to throw in a nix-channel --update for good
measure.
@@ -89,7 +89,7 @@ $ nix-channel --add https://nixos.org/channels/nixos-version
-$ nix-env -iE "_: with import <nixpkgs/nixos> { configuration = {}; }; with config.system.build; [ nixos-generate-config nixos-install nixos-enter manual.manpages ]"
+$ nix-env -iE "_: with import <nixpkgs/nixos> { configuration = {}; }; with config.system.build; [ nixos-generate-config nixos-install nixos-enter manual.manpages ]"
@@ -116,7 +116,7 @@ $ nix-channel --add https://nixos.org/channels/nixos-version
Generate your NixOS configuration:
-$ sudo `which nixos-generate-config` --root /mnt
+$ sudo `which nixos-generate-config` --root /mnt
You'll probably want to edit the configuration files. Refer to the
nixos-generate-config step in
@@ -148,8 +148,8 @@ $ nix-channel --add https://nixos.org/channels/nixos-version
-$ sudo groupadd -g 30000 nixbld
-$ sudo useradd -u 30000 -g nixbld -G nixbld nixbld
+$ sudo groupadd -g 30000 nixbld
+$ sudo useradd -u 30000 -g nixbld -G nixbld nixbld
@@ -161,7 +161,7 @@ $ sudo useradd -u 30000 -g nixbld -G nixbld nixbld
existing systems without the help of a rescue USB drive or similar.
-$ sudo PATH="$PATH" NIX_PATH="$NIX_PATH" `which nixos-install` --root /mnt
+$ sudo PATH="$PATH" NIX_PATH="$NIX_PATH" `which nixos-install` --root /mnt
Again, please refer to the nixos-install step in
for more information.
@@ -175,8 +175,8 @@ $ sudo useradd -u 30000 -g nixbld -G nixbld nixbld
Optionally, you may want to clean up your non-NixOS distribution:
-$ sudo userdel nixbld
-$ sudo groupdel nixbld
+$ sudo userdel nixbld
+$ sudo groupdel nixbld
If you do not wish to keep the Nix package manager installed either, run
something like sudo rm -rv ~/.nix-* /nix and remove the
@@ -193,7 +193,7 @@ $ sudo groupdel nixbld
Generate your NixOS configuration:
-$ sudo `which nixos-generate-config` --root /
+$ sudo `which nixos-generate-config` --root /
Note that this will place the generated configuration files in
/etc/nixos. You'll probably want to edit the
@@ -212,21 +212,21 @@ $ sudo groupdel nixbld
users.users.root.initialHashedPassword = "";
-
+
Build the NixOS closure and install it in the system
profile:
-$ nix-env -p /nix/var/nix/profiles/system -f '<nixpkgs/nixos>' -I nixos-config=/etc/nixos/configuration.nix -iA system
+$ nix-env -p /nix/var/nix/profiles/system -f '<nixpkgs/nixos>' -I nixos-config=/etc/nixos/configuration.nix -iA system
Change ownership of the /nix tree to root (since your
Nix install was probably single user):
-$ sudo chown -R 0.0 /nix
+$ sudo chown -R 0.0 /nix
@@ -284,16 +284,16 @@ $ sudo groupdel nixbld
Let's create the files:
-$ sudo touch /etc/NIXOS
-$ sudo touch /etc/NIXOS_LUSTRATE
-
+$ sudo touch /etc/NIXOS
+$ sudo touch /etc/NIXOS_LUSTRATE
+
Let's also make sure the NixOS configuration files are kept once we reboot
on NixOS:
-$ echo etc/nixos | sudo tee -a /etc/NIXOS_LUSTRATE
-
+$ echo etc/nixos | sudo tee -a /etc/NIXOS_LUSTRATE
+
@@ -312,8 +312,9 @@ $ echo etc/nixos | sudo tee -a /etc/NIXOS_LUSTRATE
-$ sudo mv -v /boot /boot.bak &&
- sudo /nix/var/nix/profiles/system/bin/switch-to-configuration boot
+$ sudo mv -v /boot /boot.bak &&
+sudo /nix/var/nix/profiles/system/bin/switch-to-configuration boot
+
Cross your fingers, reboot, hopefully you should get a NixOS prompt!
diff --git a/nixos/doc/manual/installation/installing.xml b/nixos/doc/manual/installation/installing.xml
index 9687c21a01e6..cc5420794aff 100644
--- a/nixos/doc/manual/installation/installing.xml
+++ b/nixos/doc/manual/installation/installing.xml
@@ -525,7 +525,7 @@ $ nix-env -i w3m
NixOS Configuration
-
+
{ config, pkgs, ... }: {
imports = [
# Include the results of the hardware scan.
@@ -543,7 +543,7 @@ $ nix-env -i w3m
# Enable the OpenSSH server.
services.sshd.enable = true;
}
-
+
diff --git a/nixos/doc/manual/release-notes/rl-1703.xml b/nixos/doc/manual/release-notes/rl-1703.xml
index 6ca79e2bc00d..86f4a1ccfb78 100644
--- a/nixos/doc/manual/release-notes/rl-1703.xml
+++ b/nixos/doc/manual/release-notes/rl-1703.xml
@@ -626,17 +626,17 @@
xlink:href="https://nixos.org/nixpkgs/manual/#sec-overlays-install">
overlays. For example, the following code:
- let
- pkgs = import <nixpkgs> {};
- in
- pkgs.overridePackages (self: super: ...)
+let
+ pkgs = import <nixpkgs> {};
+in
+ pkgs.overridePackages (self: super: ...)
should be replaced by:
- let
- pkgs = import <nixpkgs> {};
- in
- import pkgs.path { overlays = [(self: super: ...)]; }
+let
+ pkgs = import <nixpkgs> {};
+in
+ import pkgs.path { overlays = [(self: super: ...)]; }
diff --git a/nixos/modules/services/desktops/flatpak.xml b/nixos/modules/services/desktops/flatpak.xml
index 8045d5fa14f8..fb27bd1f62b2 100644
--- a/nixos/modules/services/desktops/flatpak.xml
+++ b/nixos/modules/services/desktops/flatpak.xml
@@ -21,7 +21,7 @@
configuration.nix:
= true;
-
+
For the sandboxed apps to work correctly, desktop integration portals need to
@@ -30,27 +30,27 @@
configuration.nix:
= [ pkgs.xdg-desktop-portal-gtk ];
-
+
Then, you will need to add a repository, for example,
Flathub,
either using the following commands:
-
- flatpak remote-add --if-not-exists flathub https://flathub.org/repo/flathub.flatpakrepo
- flatpak update
-
+
+$ flatpak remote-add --if-not-exists flathub https://flathub.org/repo/flathub.flatpakrepo
+$ flatpak update
+
or by opening the
repository
file in GNOME Software.
Finally, you can search and install programs:
-
- flatpak search bustle
- flatpak install flathub org.freedesktop.Bustle
- flatpak run org.freedesktop.Bustle
-
+
+$ flatpak search bustle
+$ flatpak install flathub org.freedesktop.Bustle
+$ flatpak run org.freedesktop.Bustle
+
Again, GNOME Software offers graphical interface for these tasks.
diff --git a/nixos/modules/services/monitoring/prometheus/exporters.xml b/nixos/modules/services/monitoring/prometheus/exporters.xml
index 7a0a1bdf2c14..81ac998729be 100644
--- a/nixos/modules/services/monitoring/prometheus/exporters.xml
+++ b/nixos/modules/services/monitoring/prometheus/exporters.xml
@@ -112,65 +112,65 @@
directory, which will be called postfix.nix and contains all exporter
specific options and configuration:
- # nixpgs/nixos/modules/services/prometheus/exporters/postfix.nix
- { config, lib, pkgs }:
+# nixpgs/nixos/modules/services/prometheus/exporters/postfix.nix
+{ config, lib, pkgs }:
- with lib;
+with lib;
- let
- # for convenience we define cfg here
- cfg = config.services.prometheus.exporters.postfix;
- in
- {
- port = 9154; # The postfix exporter listens on this port by default
+let
+ # for convenience we define cfg here
+ cfg = config.services.prometheus.exporters.postfix;
+in
+{
+ port = 9154; # The postfix exporter listens on this port by default
- # `extraOpts` is an attribute set which contains additional options
- # (and optional overrides for default options).
- # Note that this attribute is optional.
- extraOpts = {
- telemetryPath = mkOption {
- type = types.str;
- default = "/metrics";
- description = ''
- Path under which to expose metrics.
- '';
- };
- logfilePath = mkOption {
- type = types.path;
- default = /var/log/postfix_exporter_input.log;
- example = /var/log/mail.log;
- description = ''
- Path where Postfix writes log entries.
- This file will be truncated by this exporter!
- '';
- };
- showqPath = mkOption {
- type = types.path;
- default = /var/spool/postfix/public/showq;
- example = /var/lib/postfix/queue/public/showq;
- description = ''
- Path at which Postfix places its showq socket.
- '';
- };
- };
+ # `extraOpts` is an attribute set which contains additional options
+ # (and optional overrides for default options).
+ # Note that this attribute is optional.
+ extraOpts = {
+ telemetryPath = mkOption {
+ type = types.str;
+ default = "/metrics";
+ description = ''
+ Path under which to expose metrics.
+ '';
+ };
+ logfilePath = mkOption {
+ type = types.path;
+ default = /var/log/postfix_exporter_input.log;
+ example = /var/log/mail.log;
+ description = ''
+ Path where Postfix writes log entries.
+ This file will be truncated by this exporter!
+ '';
+ };
+ showqPath = mkOption {
+ type = types.path;
+ default = /var/spool/postfix/public/showq;
+ example = /var/lib/postfix/queue/public/showq;
+ description = ''
+ Path at which Postfix places its showq socket.
+ '';
+ };
+ };
- # `serviceOpts` is an attribute set which contains configuration
- # for the exporter's systemd service. One of
- # `serviceOpts.script` and `serviceOpts.serviceConfig.ExecStart`
- # has to be specified here. This will be merged with the default
- # service confiuration.
- serviceOpts = {
- serviceConfig = {
- ExecStart = ''
- ${pkgs.prometheus-postfix-exporter}/bin/postfix_exporter \
- --web.listen-address ${cfg.listenAddress}:${toString cfg.port} \
- --web.telemetry-path ${cfg.telemetryPath} \
- ${concatStringsSep " \\\n " cfg.extraFlags}
- '';
- };
- };
- }
-
+ # `serviceOpts` is an attribute set which contains configuration
+ # for the exporter's systemd service. One of
+ # `serviceOpts.script` and `serviceOpts.serviceConfig.ExecStart`
+ # has to be specified here. This will be merged with the default
+ # service confiuration.
+ serviceOpts = {
+ serviceConfig = {
+ ExecStart = ''
+ ${pkgs.prometheus-postfix-exporter}/bin/postfix_exporter \
+ --web.listen-address ${cfg.listenAddress}:${toString cfg.port} \
+ --web.telemetry-path ${cfg.telemetryPath} \
+ ${concatStringsSep " \\\n " cfg.extraFlags}
+ '';
+ };
+ };
+}
+
diff --git a/nixos/modules/services/network-filesystems/samba.nix b/nixos/modules/services/network-filesystems/samba.nix
index 10dc58311212..69368441c62c 100644
--- a/nixos/modules/services/network-filesystems/samba.nix
+++ b/nixos/modules/services/network-filesystems/samba.nix
@@ -86,10 +86,10 @@ in
If you use the firewall consider adding the following:
-
- networking.firewall.allowedTCPPorts = [ 139 445 ];
- networking.firewall.allowedUDPPorts = [ 137 138 ];
-
+
+ networking.firewall.allowedTCPPorts = [ 139 445 ];
+ networking.firewall.allowedUDPPorts = [ 137 138 ];
+
'';
};
diff --git a/nixos/modules/services/networking/dnscrypt-proxy.xml b/nixos/modules/services/networking/dnscrypt-proxy.xml
index f90eef69848c..afc7880392a1 100644
--- a/nixos/modules/services/networking/dnscrypt-proxy.xml
+++ b/nixos/modules/services/networking/dnscrypt-proxy.xml
@@ -18,7 +18,7 @@
To enable the client proxy, set
= true;
-
+
@@ -36,7 +36,7 @@
the other client to it:
= 43;
-
+
@@ -47,7 +47,7 @@
= true;
= [ "127.0.0.1#43" ];
}
-
+
@@ -59,7 +59,7 @@
= true;
= [ "127.0.0.1@43" ];
}
-
+
diff --git a/nixos/modules/services/networking/smokeping.nix b/nixos/modules/services/networking/smokeping.nix
index fab3ed5bb39d..c41d0edaf17f 100644
--- a/nixos/modules/services/networking/smokeping.nix
+++ b/nixos/modules/services/networking/smokeping.nix
@@ -101,17 +101,17 @@ in
'';
example = literalExample ''
# near constant pings.
- step = 30
- pings = 20
- # consfn mrhb steps total
- AVERAGE 0.5 1 10080
- AVERAGE 0.5 12 43200
- MIN 0.5 12 43200
- MAX 0.5 12 43200
- AVERAGE 0.5 144 7200
- MAX 0.5 144 7200
- MIN 0.5 144 7200
- '';
+ step = 30
+ pings = 20
+ # consfn mrhb steps total
+ AVERAGE 0.5 1 10080
+ AVERAGE 0.5 12 43200
+ MIN 0.5 12 43200
+ MAX 0.5 12 43200
+ AVERAGE 0.5 144 7200
+ MAX 0.5 144 7200
+ MIN 0.5 144 7200
+ '';
description = ''Configure the ping frequency and retention of the rrd files.
Once set, changing the interval will require deletion or migration of all
the collected data.'';
diff --git a/nixos/modules/services/web-apps/matomo-doc.xml b/nixos/modules/services/web-apps/matomo-doc.xml
index 021a89be3f63..8485492c51c7 100644
--- a/nixos/modules/services/web-apps/matomo-doc.xml
+++ b/nixos/modules/services/web-apps/matomo-doc.xml
@@ -21,18 +21,18 @@
passwordless database authentication via the UNIX_SOCKET authentication
plugin with the following SQL commands:
- # For MariaDB
- INSTALL PLUGIN unix_socket SONAME 'auth_socket';
- CREATE DATABASE matomo;
- CREATE USER 'matomo'@'localhost' IDENTIFIED WITH unix_socket;
- GRANT ALL PRIVILEGES ON matomo.* TO 'matomo'@'localhost';
+# For MariaDB
+INSTALL PLUGIN unix_socket SONAME 'auth_socket';
+CREATE DATABASE matomo;
+CREATE USER 'matomo'@'localhost' IDENTIFIED WITH unix_socket;
+GRANT ALL PRIVILEGES ON matomo.* TO 'matomo'@'localhost';
- # For MySQL
- INSTALL PLUGIN auth_socket SONAME 'auth_socket.so';
- CREATE DATABASE matomo;
- CREATE USER 'matomo'@'localhost' IDENTIFIED WITH auth_socket;
- GRANT ALL PRIVILEGES ON matomo.* TO 'matomo'@'localhost';
-
+# For MySQL
+INSTALL PLUGIN auth_socket SONAME 'auth_socket.so';
+CREATE DATABASE matomo;
+CREATE USER 'matomo'@'localhost' IDENTIFIED WITH auth_socket;
+GRANT ALL PRIVILEGES ON matomo.* TO 'matomo'@'localhost';
+
Then fill in matomo as database user and database name,
and leave the password field blank. This authentication works by allowing
only the matomo unix user to authenticate as the