diff --git a/nixos/modules/100tb.nix b/nixos/modules/100tb.nix index a8db0e8be56798e4491033bfaeec3e4d48c01a8f..87554ef316b3c25076260d0f43aa8008941580e2 100644 --- a/nixos/modules/100tb.nix +++ b/nixos/modules/100tb.nix @@ -34,39 +34,39 @@ let options = { hostId = lib.mkOption { type = lib.types.str; - example = lib.literalExample "abcdefab"; + example = "abcdefab"; description = "The 32-bit host ID of the machine, formatted as 8 hexadecimal characters."; }; interface = lib.mkOption { type = lib.types.str; - example = lib.literalExample "eno0"; + example = "eno0"; description = "The name of the network interface on which to configure a static address."; }; publicIPv4 = lib.mkOption { type = lib.types.str; - example = lib.literalExample "192.0.2.0"; + example = "192.0.2.0"; description = "The IPv4 address to statically assign to `interface`."; }; prefixLength = lib.mkOption { type = lib.types.int; - example = lib.literalExample 24; + example = 24; description = "The statically configured network's prefix length."; }; gateway = lib.mkOption { type = lib.types.str; - example = lib.literalExample "192.0.2.1"; + example = "192.0.2.1"; description = "The statically configured address of the network gateway."; }; gatewayInterface = lib.mkOption { type = lib.types.str; - example = lib.literalExample "eno0"; + example = "eno0"; description = "The name of the network interface for the default route."; default = cfg.interface; }; grubDeviceID = lib.mkOption { type = lib.types.str; - example = lib.literalExample "wwn-0x5000c500936410b9"; + example = "wwn-0x5000c500936410b9"; description = "The ID of the disk on which to install grub."; }; }; diff --git a/nixos/modules/deployment.nix b/nixos/modules/deployment.nix index b0a5e3c4c761d188922a076643fcd3a25a4b81f0..41381ce5d33e62f4e569b87709d591f3586804df 100755 --- a/nixos/modules/deployment.nix +++ b/nixos/modules/deployment.nix @@ -16,7 +16,7 @@ in { options = { services.private-storage.deployment.authorizedKey = lib.mkOption { type = lib.types.str; - example = lib.literalExample '' + example = '' ssh-ed25519 AAAAC3N... ''; description = '' @@ -25,7 +25,7 @@ in { }; services.private-storage.deployment.gridName = lib.mkOption { type = lib.types.str; - example = lib.literalExample "staging"; + example = "staging"; description = '' The name of the grid configuration to use to update this deployment. ''; diff --git a/nixos/modules/issuer.nix b/nixos/modules/issuer.nix index da3eed73e59349b4faaf64ebb32c067e952917ae..d7d62c6569878338a093d2d66c3768f65b6e20fc 100644 --- a/nixos/modules/issuer.nix +++ b/nixos/modules/issuer.nix @@ -8,14 +8,14 @@ in { services.private-storage-issuer.package = lib.mkOption { default = ourpkgs.zkapissuer; type = lib.types.package; - example = lib.literalExample "pkgs.zkapissuer.components.exes.\"PaymentServer-exe\""; + example = "pkgs.zkapissuer.components.exes.\"PaymentServer-exe\""; description = '' The package to use for the ZKAP issuer. ''; }; services.private-storage-issuer.domains = lib.mkOption { type = lib.types.listOf lib.types.str; - example = lib.literalExample [ "payments.example.com" ]; + example = [ "payments.example.com" ]; description = '' The domain names at which the issuer is reachable. ''; @@ -32,7 +32,7 @@ in { services.private-storage-issuer.issuer = lib.mkOption { default = "Ristretto"; type = lib.types.enum [ "Trivial" "Ristretto" ]; - example = lib.literalExample "Trivial"; + example = "Trivial"; description = '' The issuer algorithm to use. Either Trivial for a fake no-crypto algorithm or Ristretto for Ristretto-flavored PrivacyPass. diff --git a/nixos/modules/monitoring/server/grafana.nix b/nixos/modules/monitoring/server/grafana.nix index 1b51abd4b795a7d6dd8c4c4319beecae4162bb53..af5f216cfe909b90043e50210d3b729e31fc3c35 100644 --- a/nixos/modules/monitoring/server/grafana.nix +++ b/nixos/modules/monitoring/server/grafana.nix @@ -22,18 +22,18 @@ in { options.services.private-storage.monitoring.grafana = { domain = lib.mkOption { type = lib.types.str; - example = lib.literalExample "grafana.grid.private.storage"; + example = "grafana.grid.private.storage"; description = "The FQDN of the Grafana host"; }; prometheusUrl = lib.mkOption { type = lib.types.str; - example = lib.literalExample "http://prometheus:9090/"; + example = "http://prometheus:9090/"; default = "http://localhost:9090/"; description = "The URL of the Prometheus host to access"; }; lokiUrl = lib.mkOption { type = lib.types.str; - example = lib.literalExample "http://loki:3100/"; + example = "http://loki:3100/"; default = "http://localhost:3100/"; description = "The URL of the Loki host to access"; }; @@ -46,19 +46,19 @@ in { }; googleOAuthClientID = lib.mkOption { type = lib.types.str; - example = lib.literalExample "grafana-staging-345678"; + example = "grafana-staging-345678"; default = "replace-by-your-client-id-or-set-empty-string-for-anonymous-access"; description = "The GSuite OAuth2 SSO Client ID. Empty string turns SSO auth off and anonymous (free for all) access on."; }; googleOAuthClientSecretFile = lib.mkOption { type = lib.types.path; - example = lib.literalExample "/var/secret/monitoring-gsuite-client-secret"; + example = "/var/secret/monitoring-gsuite-client-secret"; default = /run/keys/grafana-google-sso.secret; description = "The path to the GSuite SSO secret file."; }; adminPasswordFile = lib.mkOption { type = lib.types.path; - example = lib.literalExample "/var/secret/monitoring-admin-password"; + example = "/var/secret/monitoring-admin-password"; default = /run/keys/grafana-admin.password; description = "A file containing the password for the Grafana Admin account."; }; diff --git a/nixos/modules/monitoring/vpn/client.nix b/nixos/modules/monitoring/vpn/client.nix index ed1933e34d715fba0933f32d606e989b4d1ed4ec..afa4f77c76b8d109d807148b9d2258045e5cabc0 100644 --- a/nixos/modules/monitoring/vpn/client.nix +++ b/nixos/modules/monitoring/vpn/client.nix @@ -8,7 +8,7 @@ in { enable = lib.mkEnableOption "PrivateStorageio Monitoring VPN client service"; privateKeyFile = lib.mkOption { type = lib.types.path; - example = lib.literalExample /run/keys/monitoringvpn/host.key; + example = /run/keys/monitoringvpn/host.key; default = /run/keys/monitoringvpn/client.key; description = '' File with base64 private key generated by <command>wg genkey</command>. @@ -18,7 +18,7 @@ in { }; presharedKeyFile = lib.mkOption { type = lib.types.path; - example = lib.literalExample /run/keys/monitoringvpn/preshared.key; + example = /run/keys/monitoringvpn/preshared.key; default = /run/keys/monitoringvpn/preshared.key; description = '' File with base64 preshared key generated by <command>wg genpsk</command>. @@ -26,7 +26,7 @@ in { }; allowedIPs = lib.mkOption { type = lib.types.listOf lib.types.str; - example = lib.literalExample [ "172.23.23.1/32" ]; + example = [ "172.23.23.1/32" ]; default = [ "172.23.23.1/32" ]; description = '' Limits which IPs this client receives data from. @@ -34,21 +34,21 @@ in { }; ip = lib.mkOption { type = lib.types.str; - example = lib.literalExample "172.23.23.11"; + example = "172.23.23.11"; description = '' The IP addresses of the interface. ''; }; endpoint = lib.mkOption { type = lib.types.str; - example = lib.literalExample "vpn.monitoring.private.storage:54321"; + example = "vpn.monitoring.private.storage:54321"; description = '' The address and port number of the server to establish the VPN with. ''; }; endpointPublicKeyFile = lib.mkOption { type = lib.types.path; - example = lib.literalExample ./monitoringvpn/server.pub; + example = ./monitoringvpn/server.pub; description = '' File with base64 public key generated by <command>cat private.key | wg pubkey > pubkey.pub</command>. ''; diff --git a/nixos/modules/monitoring/vpn/server.nix b/nixos/modules/monitoring/vpn/server.nix index 3c41e0209bb7fe18f1a81a44ab509c8442372bbf..80881a2060638f7e0f6cce9853d50c98f3081d6c 100644 --- a/nixos/modules/monitoring/vpn/server.nix +++ b/nixos/modules/monitoring/vpn/server.nix @@ -13,7 +13,7 @@ in { enable = lib.mkEnableOption "PrivateStorageio Monitoring VPN server service"; privateKeyFile = lib.mkOption { type = lib.types.path; - example = lib.literalExample /run/keys/monitoringvpn/server.key; + example = /run/keys/monitoringvpn/server.key; default = /run/keys/monitoringvpn/server.key; description = '' File with base64 private key generated by <command>wg genkey</command>. @@ -21,7 +21,7 @@ in { }; presharedKeyFile = lib.mkOption { type = lib.types.path; - example = lib.literalExample /run/keys/monitoringvpn/preshared.key; + example = /run/keys/monitoringvpn/preshared.key; default = /run/keys/monitoringvpn/preshared.key; description = '' File with base64 preshared key generated by <command>wg genpsk</command>. @@ -29,14 +29,14 @@ in { }; ip = lib.mkOption { type = lib.types.str; - example = lib.literalExample [ "172.23.23.23" ]; + example = [ "172.23.23.23" ]; description = '' The IP address of the interface. ''; }; port = lib.mkOption { type = lib.types.port; - example = lib.literalExample 54321; + example = 54321; default = 51820; description = '' The UDP port to listen on. @@ -44,14 +44,14 @@ in { }; vpnClientIPs = lib.mkOption { type = lib.types.listOf lib.types.str; - example = lib.literalExample [ "172.23.23.23" "172.23.23.42" ]; + example = [ "172.23.23.23" "172.23.23.42" ]; description = '' The IP addresses to allow connections from. ''; }; pubKeysPath = lib.mkOption { type = lib.types.path; - example = lib.literalExample ./monitoringvpn; + example = ./monitoringvpn; description = '' The path to the directory that holds the public keys. ''; diff --git a/nixos/modules/private-storage.nix b/nixos/modules/private-storage.nix index c119a3d3417f7d4b7ec07c5652b65122dc5fce12..5c4dbca47a38fa113b213c7cde53834ee51c9d12 100644 --- a/nixos/modules/private-storage.nix +++ b/nixos/modules/private-storage.nix @@ -37,7 +37,7 @@ in services.private-storage.tahoe.package = lib.mkOption { default = ourpkgs.privatestorage; type = lib.types.package; - example = lib.literalExample "pkgs.tahoelafs"; + example = "pkgs.tahoelafs"; description = '' The package to use for the Tahoe-LAFS daemon. ''; @@ -45,7 +45,7 @@ in services.private-storage.publicAddress = lib.mkOption { default = "${fqdn}"; type = lib.types.str; - example = lib.literalExample "storage.example.invalid"; + example = "storage.example.invalid"; description = '' A publicly-visible address to use in Tahoe-LAFS advertisements for this storage service. @@ -54,7 +54,7 @@ in services.private-storage.introducerFURL = lib.mkOption { default = null; type = lib.types.nullOr lib.types.str; - example = lib.literalExample "pb://<tubid>@<location hint>/<swissnum>"; + example = "pb://<tubid>@<location hint>/<swissnum>"; description = '' A Tahoe-LAFS introducer node fURL at which this storage node should announce itself. ''; @@ -62,7 +62,7 @@ in services.private-storage.publicStoragePort = lib.mkOption { default = 8898; type = lib.types.int; - example = lib.literalExample 8098; + example = 8098; description = '' The port number on which to service storage clients. ''; @@ -70,14 +70,14 @@ in services.private-storage.issuerRootURL = lib.mkOption { default = "https://issuer.${config.networking.domain}/"; type = lib.types.str; - example = lib.literalExample "https://example.invalid/"; + example = "https://example.invalid/"; description = '' The URL of the Ristretto issuer service to announce. ''; }; services.private-storage.ristrettoSigningKeyPath = lib.mkOption { type = lib.types.path; - example = lib.literalExample "/var/run/secrets/signing-key.private"; + example = "/var/run/secrets/signing-key.private"; description = '' The path to the Ristretto signing key for the service. ''; diff --git a/nixos/modules/spending.nix b/nixos/modules/spending.nix index 325dd147012b7844a8cb0b4b7071c4cd2cd88f28..ccbce1d3b4fbec4cc4bdeb0efd67653f5160581a 100644 --- a/nixos/modules/spending.nix +++ b/nixos/modules/spending.nix @@ -10,7 +10,7 @@ in package = lib.mkOption { default = ourpkgs.zkap-spending-service; type = lib.types.package; - example = lib.literalExample "ourpkgs.zkap-spending-service"; + example = "ourpkgs.zkap-spending-service"; description = '' The package to use for the spending service. ''; @@ -26,7 +26,7 @@ in services.private-storage-spending.domain = lib.mkOption { default = config.networking.fqdn; type = lib.types.str; - example = lib.literalExample [ "spending.example.com" ]; + example = [ "spending.example.com" ]; description = '' The domain name at which the spending service is reachable. ''; diff --git a/nixos/modules/ssh.nix b/nixos/modules/ssh.nix index 3e90528322c153d6b96679af5d914c4e753b49bf..eb55fbf2ee4d3e6c04dd08039a8a9f9012f069b8 100644 --- a/nixos/modules/ssh.nix +++ b/nixos/modules/ssh.nix @@ -7,7 +7,7 @@ options = { services.private-storage.sshUsers = lib.mkOption { type = lib.types.attrsOf lib.types.str; - example = lib.literalExample { root = "ssh-ed25519 AAA..."; }; + example = { root = "ssh-ed25519 AAA..."; }; description = '' Users to configure on the issuer server and the storage servers and the SSH public keys to use to authenticate them. diff --git a/nixos/modules/tahoe.nix b/nixos/modules/tahoe.nix index 330474912a0eb9aecc98fbb71cef9e7f9da15b39..e0b6eb4d8be3c5359de1d391c42b2ba83f7a1ba4 100644 --- a/nixos/modules/tahoe.nix +++ b/nixos/modules/tahoe.nix @@ -48,7 +48,7 @@ in default = pkgs.tahoelafs; defaultText = "pkgs.tahoelafs"; type = types.package; - example = literalExample "pkgs.tahoelafs"; + example = "pkgs.tahoelafs"; description = '' The package to use for the Tahoe LAFS daemon. ''; @@ -78,7 +78,7 @@ in default = pkgs.tahoelafs; defaultText = "pkgs.tahoelafs"; type = types.package; - example = literalExample "pkgs.tahoelafs"; + example = "pkgs.tahoelafs"; description = '' The package to use for the Tahoe LAFS daemon. '';