diff --git a/nixos/doc/manual/administration/imperative-containers.xml b/nixos/doc/manual/administration/imperative-containers.xml
index 435ed230f51..bc19acf9f69 100644
--- a/nixos/doc/manual/administration/imperative-containers.xml
+++ b/nixos/doc/manual/administration/imperative-containers.xml
@@ -14,18 +14,18 @@
You create a container with identifier foo as follows:
-# nixos-container create foo
+# nixos-container create foo
This creates the container’s root directory in
- /var/lib/containers/foo and a small configuration file
- in /etc/containers/foo.conf. It also builds the
+ /var/lib/containers/foo and a small configuration file
+ in /etc/containers/foo.conf. It also builds the
container’s initial system configuration and stores it in
- /nix/var/nix/profiles/per-container/foo/system. You can
+ /nix/var/nix/profiles/per-container/foo/system. You can
modify the initial configuration of the container on the command line. For
instance, to create a container that has sshd running,
with the given public key for root:
-# nixos-container create foo --config '
+# nixos-container create foo --config '
= true;
users.users.root.openssh.authorizedKeys.keys = ["ssh-dss AAAAB3N…"];
'
@@ -34,7 +34,7 @@
as container IP. This behavior can be altered by setting --host-address and
--local-address:
-# nixos-container create test --config-file test-container.nix \
+# nixos-container create test --config-file test-container.nix \
--local-address 10.235.1.2 --host-address 10.235.1.1
@@ -42,7 +42,7 @@
Creating a container does not start it. To start the container, run:
-# nixos-container start foo
+# nixos-container start foo
This command will return as soon as the container has booted and has reached
multi-user.target. On the host, the container runs within
@@ -51,7 +51,7 @@
Thus, if something went wrong, you can get status info using
systemctl:
-# systemctl status container@foo
+# systemctl status container@foo
@@ -59,22 +59,22 @@
If the container has started successfully, you can log in as root using the
root-login operation:
-# nixos-container root-login foo
-[root@foo:~]#
+# nixos-container root-login foo
+[root@foo:~]#
Note that only root on the host can do this (since there is no
authentication). You can also get a regular login prompt using the
login operation, which is available to all users on the
host:
-# nixos-container login foo
+# nixos-container login foo
foo login: alice
Password: ***
With nixos-container run, you can execute arbitrary
commands in the container:
-# nixos-container run foo -- uname -a
+# nixos-container run foo -- uname -a
Linux foo 3.4.82 #1-NixOS SMP Thu Mar 20 14:44:05 UTC 2014 x86_64 GNU/Linux
@@ -85,18 +85,18 @@ Linux foo 3.4.82 #1-NixOS SMP Thu Mar 20 14:44:05 UTC 2014 x86_64 GNU/Linux
/var/lib/container/name/etc/nixos/configuration.nix,
and run
-# nixos-container update foo
+# nixos-container update foo
This will build and activate the new configuration. You can also specify a
new configuration on the command line:
-# nixos-container update foo --config '
+# nixos-container update foo --config '
= true;
= "foo@example.org";
= [ 80 ];
'
-# curl http://$(nixos-container show-ip foo)/
+# curl http://$(nixos-container show-ip foo)/
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">…
However, note that this will overwrite the container’s
@@ -117,7 +117,7 @@ Linux foo 3.4.82 #1-NixOS SMP Thu Mar 20 14:44:05 UTC 2014 x86_64 GNU/Linux
by using systemctl on the container’s service unit. To
destroy a container, including its file system, do
-# nixos-container destroy foo
+# nixos-container destroy foo
diff --git a/nixos/doc/manual/administration/maintenance-mode.xml b/nixos/doc/manual/administration/maintenance-mode.xml
index 71e3f9ea665..74abfdd7c66 100644
--- a/nixos/doc/manual/administration/maintenance-mode.xml
+++ b/nixos/doc/manual/administration/maintenance-mode.xml
@@ -8,7 +8,7 @@
You can enter rescue mode by running:
-# systemctl rescue
+# systemctl rescue
This will eventually give you a single-user root shell. Systemd will stop
(almost) all system services. To get out of maintenance mode, just exit from
the rescue shell.
diff --git a/nixos/doc/manual/administration/network-problems.xml b/nixos/doc/manual/administration/network-problems.xml
index 570f5835884..1035e4e056a 100644
--- a/nixos/doc/manual/administration/network-problems.xml
+++ b/nixos/doc/manual/administration/network-problems.xml
@@ -16,12 +16,12 @@
disable the use of the binary cache by adding , e.g.
-# nixos-rebuild switch --option use-binary-caches false
+# nixos-rebuild switch --option use-binary-caches false
If you have an alternative binary cache at your disposal, you can use it
instead:
-# nixos-rebuild switch --option binary-caches http://my-cache.example.org/
+# nixos-rebuild switch --option binary-caches http://my-cache.example.org/
diff --git a/nixos/doc/manual/administration/rebooting.xml b/nixos/doc/manual/administration/rebooting.xml
index a5abd6f0258..c57d885c5f3 100644
--- a/nixos/doc/manual/administration/rebooting.xml
+++ b/nixos/doc/manual/administration/rebooting.xml
@@ -7,20 +7,20 @@
The system can be shut down (and automatically powered off) by doing:
-# shutdown
+# shutdown
This is equivalent to running systemctl poweroff.
To reboot the system, run
-# reboot
+# reboot
which is equivalent to systemctl reboot. Alternatively,
you can quickly reboot the system using kexec, which
bypasses the BIOS by directly loading the new kernel into memory:
-# systemctl kexec
+# systemctl kexec
diff --git a/nixos/doc/manual/administration/rollback.xml b/nixos/doc/manual/administration/rollback.xml
index fb87810ba46..80d79e1a53f 100644
--- a/nixos/doc/manual/administration/rollback.xml
+++ b/nixos/doc/manual/administration/rollback.xml
@@ -20,16 +20,16 @@
has booted, you can make the selected configuration the default for
subsequent boots:
-# /run/current-system/bin/switch-to-configuration boot
+# /run/current-system/bin/switch-to-configuration boot
Second, you can switch to the previous configuration in a running system:
-# nixos-rebuild switch --rollback
+# nixos-rebuild switch --rollback
This is equivalent to running:
-# /nix/var/nix/profiles/system-N-link/bin/switch-to-configuration switch
+# /nix/var/nix/profiles/system-N-link/bin/switch-to-configuration switch
where N is the number of the NixOS system
configuration. To get a list of the available configurations, do:
diff --git a/nixos/doc/manual/administration/service-mgmt.xml b/nixos/doc/manual/administration/service-mgmt.xml
index 1b9c745eb59..1c5d48a5bcf 100644
--- a/nixos/doc/manual/administration/service-mgmt.xml
+++ b/nixos/doc/manual/administration/service-mgmt.xml
@@ -58,9 +58,9 @@ Jan 07 15:55:57 hagbard systemd[1]: Started PostgreSQL Server.
Units can be stopped, started or restarted:
-# systemctl stop postgresql.service
-# systemctl start postgresql.service
-# systemctl restart postgresql.service
+# systemctl stop postgresql.service
+# systemctl start postgresql.service
+# systemctl restart postgresql.service
These operations are synchronous: they wait until the service has finished
starting or stopping (or has failed). Starting a unit will cause the
diff --git a/nixos/doc/manual/administration/user-sessions.xml b/nixos/doc/manual/administration/user-sessions.xml
index 80daf6bdbff..9acb147ac1a 100644
--- a/nixos/doc/manual/administration/user-sessions.xml
+++ b/nixos/doc/manual/administration/user-sessions.xml
@@ -39,7 +39,7 @@ c3 - root (0)
can terminate a session in a way that ensures that all the session’s
processes are gone:
-# loginctl terminate-session c3
+# loginctl terminate-session c3
diff --git a/nixos/doc/manual/configuration/adding-custom-packages.xml b/nixos/doc/manual/configuration/adding-custom-packages.xml
index 02cb78f47e8..19eb2429d0a 100644
--- a/nixos/doc/manual/configuration/adding-custom-packages.xml
+++ b/nixos/doc/manual/configuration/adding-custom-packages.xml
@@ -25,7 +25,7 @@ xlink:href="https://nixos.org/nixpkgs/manual">Nixpkgs
and you run nixos-rebuild, specifying your own Nixpkgs
tree:
-# nixos-rebuild switch -I nixpkgs=/path/to/my/nixpkgs
+# nixos-rebuild switch -I nixpkgs=/path/to/my/nixpkgs
diff --git a/nixos/doc/manual/configuration/linux-kernel.xml b/nixos/doc/manual/configuration/linux-kernel.xml
index 644d3a33ffd..dbdcc941495 100644
--- a/nixos/doc/manual/configuration/linux-kernel.xml
+++ b/nixos/doc/manual/configuration/linux-kernel.xml
@@ -126,13 +126,13 @@ nixpkgs.config.packageOverrides = pkgs:
mellanox drivers.
-' -A linuxPackages.kernel.dev
-$ nix-shell '' -A linuxPackages.kernel
-$ unpackPhase
-$ cd linux-*
-$ make -C $dev/lib/modules/*/build M=$(pwd)/drivers/net/ethernet/mellanox modules
-# insmod ./drivers/net/ethernet/mellanox/mlx5/core/mlx5_core.ko
-]]>
+
+$ nix-build '<nixpkgs>' -A linuxPackages.kernel.dev
+$ nix-shell '<nixpkgs>' -A linuxPackages.kernel
+$ unpackPhase
+$ cd linux-*
+$ make -C $dev/lib/modules/*/build M=$(pwd)/drivers/net/ethernet/mellanox modules
+# insmod ./drivers/net/ethernet/mellanox/mlx5/core/mlx5_core.ko
+
diff --git a/nixos/doc/manual/configuration/luks-file-systems.xml b/nixos/doc/manual/configuration/luks-file-systems.xml
index 8a8168c095f..405a50a9e43 100644
--- a/nixos/doc/manual/configuration/luks-file-systems.xml
+++ b/nixos/doc/manual/configuration/luks-file-systems.xml
@@ -11,7 +11,7 @@
you create an encrypted Ext4 file system on the device
/dev/disk/by-uuid/3f6b0024-3a44-4fde-a43a-767b872abe5d:
-# cryptsetup luksFormat /dev/disk/by-uuid/3f6b0024-3a44-4fde-a43a-767b872abe5d
+# cryptsetup luksFormat /dev/disk/by-uuid/3f6b0024-3a44-4fde-a43a-767b872abe5d
WARNING!
========
@@ -21,17 +21,17 @@ Are you sure? (Type uppercase yes): YES
Enter LUKS passphrase: ***
Verify passphrase: ***
-# cryptsetup luksOpen /dev/disk/by-uuid/3f6b0024-3a44-4fde-a43a-767b872abe5d crypted
+# cryptsetup luksOpen /dev/disk/by-uuid/3f6b0024-3a44-4fde-a43a-767b872abe5dcrypted
Enter passphrase for /dev/disk/by-uuid/3f6b0024-3a44-4fde-a43a-767b872abe5d: ***
-# mkfs.ext4 /dev/mapper/crypted
+# mkfs.ext4 /dev/mapper/crypted
To ensure that this file system is automatically mounted at boot time as
/, add the following to
configuration.nix:
-boot.initrd.luks.devices.crypted.device = "/dev/disk/by-uuid/3f6b0024-3a44-4fde-a43a-767b872abe5d";
-."/".device = "/dev/mapper/crypted";
+boot.initrd.luks.devices.crypted.device = "/dev/disk/by-uuid/3f6b0024-3a44-4fde-a43a-767b872abe5d";
+."/".device = "/dev/mapper/crypted";
Should grub be used as bootloader, and /boot is located
on an encrypted partition, it is necessary to add the following grub option:
@@ -45,11 +45,11 @@ Enter passphrase for /dev/disk/by-uuid/3f6b0024-3a44-4fde-a43a-767b872abe5d: ***
and add it as a new key to our existing device /dev/sda2:
-# export FIDO2_LABEL="/dev/sda2 @ $HOSTNAME"
-# fido2luks credential "$FIDO2_LABEL"
+# export FIDO2_LABEL="/dev/sda2 @ $HOSTNAME"
+# fido2luks credential "$FIDO2_LABEL"
f1d00200108b9d6e849a8b388da457688e3dd653b4e53770012d8f28e5d3b269865038c346802f36f3da7278b13ad6a3bb6a1452e24ebeeaa24ba40eef559b1b287d2a2f80b7
-# fido2luks -i add-key /dev/sda2 f1d00200108b9d6e849a8b388da457688e3dd653b4e53770012d8f28e5d3b269865038c346802f36f3da7278b13ad6a3bb6a1452e24ebeeaa24ba40eef559b1b287d2a2f80b7
+# fido2luks -i add-key /dev/sda2f1d00200108b9d6e849a8b388da457688e3dd653b4e53770012d8f28e5d3b269865038c346802f36f3da7278b13ad6a3bb6a1452e24ebeeaa24ba40eef559b1b287d2a2f80b7
Password:
Password (again):
Old password:
@@ -60,13 +60,13 @@ Added to key to device /dev/sda2, slot: 2
To ensure that this file system is decrypted using the FIDO2 compatible key, add the following to configuration.nix:
boot.initrd.luks.fido2Support = true;
-boot.initrd.luks.devices."/dev/sda2".fido2.credential = "f1d00200108b9d6e849a8b388da457688e3dd653b4e53770012d8f28e5d3b269865038c346802f36f3da7278b13ad6a3bb6a1452e24ebeeaa24ba40eef559b1b287d2a2f80b7";
+boot.initrd.luks.devices."/dev/sda2".fido2.credential = "f1d00200108b9d6e849a8b388da457688e3dd653b4e53770012d8f28e5d3b269865038c346802f36f3da7278b13ad6a3bb6a1452e24ebeeaa24ba40eef559b1b287d2a2f80b7";
You can also use the FIDO2 passwordless setup, but for security reasons, you might want to enable it only when your device is PIN protected, such as Trezor.
-boot.initrd.luks.devices."/dev/sda2".fido2.passwordLess = true;
+boot.initrd.luks.devices."/dev/sda2".fido2.passwordLess = true;
diff --git a/nixos/doc/manual/configuration/user-mgmt.xml b/nixos/doc/manual/configuration/user-mgmt.xml
index 68324cc85b5..cbec83814c9 100644
--- a/nixos/doc/manual/configuration/user-mgmt.xml
+++ b/nixos/doc/manual/configuration/user-mgmt.xml
@@ -62,24 +62,24 @@ uid = 1000;
useradd, groupmod and so on. For
instance, to create a user account named alice:
-# useradd -m alice
+# useradd -m alice
To make all nix tools available to this new user use `su - USER` which opens
a login shell (==shell that loads the profile) for given user. This will
create the ~/.nix-defexpr symlink. So run:
-# su - alice -c "true"
+# su - alice -c "true"
The flag causes the creation of a home directory for the
new user, which is generally what you want. The user does not have an initial
password and therefore cannot log in. A password can be set using the
passwd utility:
-# passwd alice
+# passwd alice
Enter new UNIX password: ***
Retype new UNIX password: ***
A user can be deleted using userdel:
-# userdel -r alice
+# userdel -r alice
The flag deletes the user’s home directory. Accounts
can be modified using usermod. Unix groups can be managed
using groupadd, groupmod and
diff --git a/nixos/doc/manual/configuration/x-windows.xml b/nixos/doc/manual/configuration/x-windows.xml
index 18f0be5e7f3..b33f6cf82b5 100644
--- a/nixos/doc/manual/configuration/x-windows.xml
+++ b/nixos/doc/manual/configuration/x-windows.xml
@@ -58,7 +58,7 @@
The X server can then be started manually:
-# systemctl start display-manager.service
+# systemctl start display-manager.service
diff --git a/nixos/doc/manual/development/meta-attributes.xml b/nixos/doc/manual/development/meta-attributes.xml
index 3d019a4987e..c626ef30e9d 100644
--- a/nixos/doc/manual/development/meta-attributes.xml
+++ b/nixos/doc/manual/development/meta-attributes.xml
@@ -57,7 +57,7 @@
linkend="ch-configuration"/>. Changes to a module documentation
have to be checked to not break building the NixOS manual:
-$ nix-build nixos/release.nix -A manual
+$ nix-build nixos/release.nix -A manual
diff --git a/nixos/doc/manual/development/writing-documentation.xml b/nixos/doc/manual/development/writing-documentation.xml
index 2183937ad0d..32e00544cef 100644
--- a/nixos/doc/manual/development/writing-documentation.xml
+++ b/nixos/doc/manual/development/writing-documentation.xml
@@ -24,8 +24,8 @@
- $ cd /path/to/nixpkgs/nixos/doc/manual
- $ make
+$ cd /path/to/nixpkgs/nixos/doc/manual
+$ make
diff --git a/nixos/doc/manual/installation/installing-behind-a-proxy.xml b/nixos/doc/manual/installation/installing-behind-a-proxy.xml
index c1ef638e876..6788882aa8c 100644
--- a/nixos/doc/manual/installation/installing-behind-a-proxy.xml
+++ b/nixos/doc/manual/installation/installing-behind-a-proxy.xml
@@ -27,13 +27,13 @@ networking.proxy.noProxy = "127.0.0.1,localhost,internal.domain";
Setup the proxy environment variables in the shell where you are running
nixos-install.
-
-# proxy_url="http://user:password@proxy:port/"
-# export http_proxy="$proxy_url"
-# export HTTP_PROXY="$proxy_url"
-# export https_proxy="$proxy_url"
-# export HTTPS_PROXY="$proxy_url"
-
+
+# proxy_url="http://user:password@proxy:port/"
+# export http_proxy="$proxy_url"
+# export HTTP_PROXY="$proxy_url"
+# export https_proxy="$proxy_url"
+# export HTTPS_PROXY="$proxy_url"
+
diff --git a/nixos/doc/manual/installation/installing-from-other-distro.xml b/nixos/doc/manual/installation/installing-from-other-distro.xml
index d2d1245c57a..8aac3226473 100644
--- a/nixos/doc/manual/installation/installing-from-other-distro.xml
+++ b/nixos/doc/manual/installation/installing-from-other-distro.xml
@@ -325,14 +325,14 @@ sudo /nix/var/nix/profiles/system/bin/switch-to-configuration boot
to boot on a USB rescue disk and do something along these lines:
-# mkdir root
-# mount /dev/sdaX root
-# mkdir root/nixos-root
-# mv -v root/* root/nixos-root/
-# mv -v root/nixos-root/old-root/* root/
-# mv -v root/boot.bak root/boot # We had renamed this by hand earlier
-# umount root
-# reboot
+# mkdir root
+# mount /dev/sdaX root
+# mkdir root/nixos-root
+# mv -v root/* root/nixos-root/
+# mv -v root/nixos-root/old-root/* root/
+# mv -v root/boot.bak root/boot # We had renamed this by hand earlier
+# umount root
+# reboot
This may work as is or you might also need to reinstall the boot loader
diff --git a/nixos/doc/manual/installation/upgrading.xml b/nixos/doc/manual/installation/upgrading.xml
index e5e02aa0752..08780051d5f 100644
--- a/nixos/doc/manual/installation/upgrading.xml
+++ b/nixos/doc/manual/installation/upgrading.xml
@@ -67,32 +67,32 @@
nixos-20.03 channel. To see which NixOS channel you’re
subscribed to, run the following as root:
-# nix-channel --list | grep nixos
+# nix-channel --list | grep nixos
nixos https://nixos.org/channels/nixos-unstable
To switch to a different NixOS channel, do
-# nix-channel --add https://nixos.org/channels/channel-name nixos
+# nix-channel --add https://nixos.org/channels/channel-name nixos
(Be sure to include the nixos parameter at the end.) For
instance, to use the NixOS 20.03 stable channel:
-# nix-channel --add https://nixos.org/channels/nixos-20.03 nixos
+# nix-channel --add https://nixos.org/channels/nixos-20.03 nixos
If you have a server, you may want to use the “small” channel instead:
-# nix-channel --add https://nixos.org/channels/nixos-20.03-small nixos
+# nix-channel --add https://nixos.org/channels/nixos-20.03-small nixos
And if you want to live on the bleeding edge:
-# nix-channel --add https://nixos.org/channels/nixos-unstable nixos
+# nix-channel --add https://nixos.org/channels/nixos-unstable nixos
You can then upgrade NixOS to the latest version in your chosen channel by
running
-# nixos-rebuild switch --upgrade
+# nixos-rebuild switch --upgrade
which is equivalent to the more verbose nix-channel --update nixos;
nixos-rebuild switch.
diff --git a/nixos/doc/manual/man-nixos-enter.xml b/nixos/doc/manual/man-nixos-enter.xml
index f533d66099d..41f0e6b9751 100644
--- a/nixos/doc/manual/man-nixos-enter.xml
+++ b/nixos/doc/manual/man-nixos-enter.xml
@@ -136,13 +136,13 @@
/mnt:
-# nixos-enter --root /mnt
+# nixos-enter --root /mnt
Run a shell command:
-# nixos-enter -c 'ls -l /; cat /proc/mounts'
+# nixos-enter -c 'ls -l /; cat /proc/mounts'
Run a non-shell command:
diff --git a/nixos/doc/manual/man-nixos-version.xml b/nixos/doc/manual/man-nixos-version.xml
index aada08c5b4a..fae25721e39 100644
--- a/nixos/doc/manual/man-nixos-version.xml
+++ b/nixos/doc/manual/man-nixos-version.xml
@@ -33,7 +33,7 @@
This command shows the version of the currently active NixOS configuration.
For example:
-$ nixos-version
+$ nixos-version
16.03.1011.6317da4 (Emu)
The version consists of the following elements:
@@ -111,7 +111,7 @@
Show the full SHA1 hash of the Git commit from which this configuration
was built, e.g.
-$ nixos-version --hash
+$ nixos-version --hash
6317da40006f6bc2480c6781999c52d88dde2acf
diff --git a/nixos/modules/services/backup/borgbackup.xml b/nixos/modules/services/backup/borgbackup.xml
index a197f38ffb9..8f623c93656 100644
--- a/nixos/modules/services/backup/borgbackup.xml
+++ b/nixos/modules/services/backup/borgbackup.xml
@@ -69,10 +69,10 @@
access this single repository. You need the output of the generate pub file.
-
-# sudo ssh-keygen -N '' -t ed25519 -f /run/keys/id_ed25519_my_borg_repo
-# cat /run/keys/id_ed25519_my_borg_repo
-ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID78zmOyA+5uPG4Ot0hfAy+sLDPU1L4AiIoRYEIVbbQ/ root@nixos
+
+# sudo ssh-keygen -N '' -t ed25519 -f /run/keys/id_ed25519_my_borg_repo
+# cat /run/keys/id_ed25519_my_borg_repo
+ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID78zmOyA+5uPG4Ot0hfAy+sLDPU1L4AiIoRYEIVbbQ/ root@nixos
Add the following snippet to your NixOS configuration:
diff --git a/nixos/modules/system/activation/top-level.nix b/nixos/modules/system/activation/top-level.nix
index fb8644dd13a..2724d9f9cb6 100644
--- a/nixos/modules/system/activation/top-level.nix
+++ b/nixos/modules/system/activation/top-level.nix
@@ -159,9 +159,9 @@ in
To switch to a specialised configuration
(e.g. fewJobsManyCores) at runtime, run:
-
- # sudo /run/current-system/specialisation/fewJobsManyCores/bin/switch-to-configuration test
-
+
+ # sudo /run/current-system/specialisation/fewJobsManyCores/bin/switch-to-configuration test
+
'';
type = types.attrsOf (types.submodule (
{ ... }: {