diff --git a/nixos/modules/services/databases/foundationdb.nix b/nixos/modules/services/databases/foundationdb.nix
index 18727acc7c7..e22127403e9 100644
--- a/nixos/modules/services/databases/foundationdb.nix
+++ b/nixos/modules/services/databases/foundationdb.nix
@@ -233,7 +233,7 @@ in
type = types.str;
default = "Check.Valid=1,Check.Unexpired=1";
description = ''
- "Peer verification string". This may be used to adjust which TLS
+ "Peer verification string". This may be used to adjust which TLS
client certificates a server will accept, as a form of user
authorization; for example, it may only accept TLS clients who
offer a certificate abiding by some locality or organization name.
diff --git a/nixos/modules/services/mail/rspamd.nix b/nixos/modules/services/mail/rspamd.nix
index 86a3f52107d..a6c19a2af73 100644
--- a/nixos/modules/services/mail/rspamd.nix
+++ b/nixos/modules/services/mail/rspamd.nix
@@ -408,7 +408,7 @@ in
};
imports = [
(mkRemovedOptionModule [ "services" "rspamd" "socketActivation" ]
- "Socket activation never worked correctly and could at this time not be fixed and so was removed")
+ "Socket activation never worked correctly and could at this time not be fixed and so was removed")
(mkRenamedOptionModule [ "services" "rspamd" "bindSocket" ] [ "services" "rspamd" "workers" "normal" "bindSockets" ])
(mkRenamedOptionModule [ "services" "rspamd" "bindUISocket" ] [ "services" "rspamd" "workers" "controller" "bindSockets" ])
(mkRemovedOptionModule [ "services" "rmilter" ] "Use services.rspamd.* instead to set up milter service")
diff --git a/nixos/modules/services/misc/siproxd.nix b/nixos/modules/services/misc/siproxd.nix
index 0e87fc461d3..20fe0793b84 100644
--- a/nixos/modules/services/misc/siproxd.nix
+++ b/nixos/modules/services/misc/siproxd.nix
@@ -39,7 +39,7 @@ in
default = false;
description = ''
Whether to enable the Siproxd SIP
- proxy/masquerading daemon.
+ proxy/masquerading daemon.
'';
};
@@ -57,29 +57,29 @@ in
hostsAllowReg = mkOption {
type = types.listOf types.str;
- default = [ ];
+ default = [ ];
example = [ "192.168.1.0/24" "192.168.2.0/24" ];
- description = ''
+ description = ''
Acess control list for incoming SIP registrations.
'';
};
hostsAllowSip = mkOption {
type = types.listOf types.str;
- default = [ ];
+ default = [ ];
example = [ "123.45.0.0/16" "123.46.0.0/16" ];
- description = ''
+ description = ''
Acess control list for incoming SIP traffic.
'';
};
hostsDenySip = mkOption {
type = types.listOf types.str;
- default = [ ];
+ default = [ ];
example = [ "10.0.0.0/8" "11.0.0.0/8" ];
- description = ''
+ description = ''
Acess control list for denying incoming
- SIP registrations and traffic.
+ SIP registrations and traffic.
'';
};
@@ -87,7 +87,7 @@ in
type = types.int;
default = 5060;
description = ''
- Port to listen for incoming SIP messages.
+ Port to listen for incoming SIP messages.
'';
};
diff --git a/nixos/modules/services/misc/svnserve.nix b/nixos/modules/services/misc/svnserve.nix
index 3335ed09d40..f70e3ca7fef 100644
--- a/nixos/modules/services/misc/svnserve.nix
+++ b/nixos/modules/services/misc/svnserve.nix
@@ -25,7 +25,7 @@ in
svnBaseDir = mkOption {
default = "/repos";
- description = "Base directory from which Subversion repositories are accessed.";
+ description = "Base directory from which Subversion repositories are accessed.";
};
};
diff --git a/nixos/modules/services/network-filesystems/netatalk.nix b/nixos/modules/services/network-filesystems/netatalk.nix
index 7674c8f7fa8..ca9d32311f5 100644
--- a/nixos/modules/services/network-filesystems/netatalk.nix
+++ b/nixos/modules/services/network-filesystems/netatalk.nix
@@ -108,10 +108,10 @@ in
extmap = mkOption {
type = types.lines;
- default = "";
- description = ''
- File name extension mappings.
- See man extmap.conf for more information.
+ default = "";
+ description = ''
+ File name extension mappings.
+ See man extmap.conf for more information.
'';
};
@@ -132,10 +132,10 @@ in
Type = "forking";
GuessMainPID = "no";
PIDFile = "/run/lock/netatalk";
- ExecStartPre = "${pkgs.coreutils}/bin/mkdir -m 0755 -p /var/lib/netatalk/CNID";
+ ExecStartPre = "${pkgs.coreutils}/bin/mkdir -m 0755 -p /var/lib/netatalk/CNID";
ExecStart = "${pkgs.netatalk}/sbin/netatalk -F ${afpConfFile}";
ExecReload = "${pkgs.coreutils}/bin/kill -HUP $MAINPID";
- ExecStop = "${pkgs.coreutils}/bin/kill -TERM $MAINPID";
+ ExecStop = "${pkgs.coreutils}/bin/kill -TERM $MAINPID";
Restart = "always";
RestartSec = 1;
};
diff --git a/nixos/modules/services/networking/morty.nix b/nixos/modules/services/networking/morty.nix
index e3a6444c116..e110a5c8610 100644
--- a/nixos/modules/services/networking/morty.nix
+++ b/nixos/modules/services/networking/morty.nix
@@ -29,9 +29,11 @@ in
key = mkOption {
type = types.str;
default = "";
- description = "HMAC url validation key (hexadecimal encoded).
- Leave blank to disable. Without validation key, anyone can
- submit proxy requests. Leave blank to disable.";
+ description = ''
+ HMAC url validation key (hexadecimal encoded).
+ Leave blank to disable. Without validation key, anyone can
+ submit proxy requests. Leave blank to disable.
+ '';
defaultText = "No HMAC url validation. Generate with echo -n somevalue | openssl dgst -sha1 -hmac somekey";
};
@@ -85,10 +87,10 @@ in
serviceConfig = {
User = "morty";
ExecStart = ''${cfg.package}/bin/morty \
- -listen ${cfg.listenAddress}:${toString cfg.port} \
- ${optionalString cfg.ipv6 "-ipv6"} \
- ${optionalString (cfg.key != "") "-key " + cfg.key} \
- '';
+ -listen ${cfg.listenAddress}:${toString cfg.port} \
+ ${optionalString cfg.ipv6 "-ipv6"} \
+ ${optionalString (cfg.key != "") "-key " + cfg.key} \
+ '';
};
};
environment.systemPackages = [ cfg.package ];
diff --git a/nixos/modules/services/networking/strongswan-swanctl/swanctl-params.nix b/nixos/modules/services/networking/strongswan-swanctl/swanctl-params.nix
index 808cb863a9c..1d1e0bd1ca1 100644
--- a/nixos/modules/services/networking/strongswan-swanctl/swanctl-params.nix
+++ b/nixos/modules/services/networking/strongswan-swanctl/swanctl-params.nix
@@ -1173,20 +1173,20 @@ in {
ppk = mkPrefixedAttrsOfParams {
secret = mkOptionalStrParam ''
- Value of the PPK. It may either be an ASCII string, a hex encoded string
- if it has a 0x prefix or a Base64 encoded string if
- it has a 0s prefix in its value. Should have at least
- 256 bits of entropy for 128-bit security.
+ Value of the PPK. It may either be an ASCII string, a hex encoded string
+ if it has a 0x prefix or a Base64 encoded string if
+ it has a 0s prefix in its value. Should have at least
+ 256 bits of entropy for 128-bit security.
'';
id = mkPrefixedAttrsOfParam (mkOptionalStrParam "") ''
- PPK identity the PPK belongs to. Multiple unique identities may be
- specified, each having an id prefix, if a secret is
- shared between multiple peers.
+ PPK identity the PPK belongs to. Multiple unique identities may be
+ specified, each having an id prefix, if a secret is
+ shared between multiple peers.
'';
} ''
- Postquantum Preshared Key (PPK) section for a specific secret. Each PPK is
- defined in a unique section having the ppk prefix.
+ Postquantum Preshared Key (PPK) section for a specific secret. Each PPK is
+ defined in a unique section having the ppk prefix.
'';
private = mkPrefixedAttrsOfParams {
diff --git a/nixos/modules/services/networking/wasabibackend.nix b/nixos/modules/services/networking/wasabibackend.nix
index 6eacffe709b..8482823e197 100644
--- a/nixos/modules/services/networking/wasabibackend.nix
+++ b/nixos/modules/services/networking/wasabibackend.nix
@@ -21,7 +21,7 @@ let
RegTestBitcoinCoreRpcEndPoint = "${cfg.rpc.ip}:${toString cfg.rpc.port}";
};
- configFile = pkgs.writeText "wasabibackend.conf" (builtins.toJSON confOptions);
+ configFile = pkgs.writeText "wasabibackend.conf" (builtins.toJSON confOptions);
in {
diff --git a/nixos/modules/services/security/oauth2_proxy.nix b/nixos/modules/services/security/oauth2_proxy.nix
index 2f9e94bd77b..486f3ab0538 100644
--- a/nixos/modules/services/security/oauth2_proxy.nix
+++ b/nixos/modules/services/security/oauth2_proxy.nix
@@ -448,7 +448,7 @@ in
default = false;
description = ''
In case when running behind a reverse proxy, controls whether headers
- like X-Real-Ip are accepted. Usage behind a reverse
+ like X-Real-Ip are accepted. Usage behind a reverse
proxy will require this flag to be set to avoid logging the reverse
proxy IP address.
'';
@@ -524,7 +524,7 @@ in
type = types.nullOr types.str;
default = null;
description = ''
- Profile access endpoint.
+ Profile access endpoint.
'';
};
diff --git a/nixos/modules/services/x11/window-managers/evilwm.nix b/nixos/modules/services/x11/window-managers/evilwm.nix
index 6e19e3572c7..6f1db2110f8 100644
--- a/nixos/modules/services/x11/window-managers/evilwm.nix
+++ b/nixos/modules/services/x11/window-managers/evilwm.nix
@@ -16,8 +16,8 @@ in
services.xserver.windowManager.session = singleton {
name = "evilwm";
start = ''
- ${pkgs.evilwm}/bin/evilwm &
- waitPID=$!
+ ${pkgs.evilwm}/bin/evilwm &
+ waitPID=$!
'';
};
environment.systemPackages = [ pkgs.evilwm ];
diff --git a/nixos/modules/virtualisation/nixos-containers.nix b/nixos/modules/virtualisation/nixos-containers.nix
index 8fbb4efd201..26398afb3cf 100644
--- a/nixos/modules/virtualisation/nixos-containers.nix
+++ b/nixos/modules/virtualisation/nixos-containers.nix
@@ -614,17 +614,17 @@ in
'';
};
- timeoutStartSec = mkOption {
- type = types.str;
- default = "1min";
- description = ''
- Time for the container to start. In case of a timeout,
- the container processes get killed.
- See systemd.time
- 7
- for more information about the format.
- '';
- };
+ timeoutStartSec = mkOption {
+ type = types.str;
+ default = "1min";
+ description = ''
+ Time for the container to start. In case of a timeout,
+ the container processes get killed.
+ See systemd.time
+ 7
+ for more information about the format.
+ '';
+ };
bindMounts = mkOption {
type = with types; attrsOf (submodule bindMountOpts);
diff --git a/nixos/tests/morty.nix b/nixos/tests/morty.nix
index ff30b7c072b..924dce2717e 100644
--- a/nixos/tests/morty.nix
+++ b/nixos/tests/morty.nix
@@ -12,9 +12,9 @@ import ./make-test-python.nix ({ pkgs, ... }:
{ ... }:
{ services.morty = {
enable = true;
- key = "78a9cd0cfee20c672f78427efb2a2a96036027f0";
- port = 3001;
- };
+ key = "78a9cd0cfee20c672f78427efb2a2a96036027f0";
+ port = 3001;
+ };
};
};
diff --git a/nixos/tests/quorum.nix b/nixos/tests/quorum.nix
index 846d2a93018..d5906806a0a 100644
--- a/nixos/tests/quorum.nix
+++ b/nixos/tests/quorum.nix
@@ -55,7 +55,7 @@ import ./make-test-python.nix ({ pkgs, ... }: {
parentHash =
"0x0000000000000000000000000000000000000000000000000000000000000000";
timestamp = "0x5cffc201";
- };
+ };
};
};
};
diff --git a/nixos/tests/rspamd.nix b/nixos/tests/rspamd.nix
index bf3f0de6204..6eaa02ef429 100644
--- a/nixos/tests/rspamd.nix
+++ b/nixos/tests/rspamd.nix
@@ -209,7 +209,7 @@ in
return false
end,
score = 5.0,
- description = 'Allow no cows',
+ description = 'Allow no cows',
group = "cows",
}
rspamd_logger.infox(rspamd_config, 'Work dammit!!!')