nixos/doc: fix typos

This commit is contained in:
Ben Siraphob
2025-09-02 21:47:38 -07:00
parent 78f10f55a2
commit 64fb0fc99b
8 changed files with 10 additions and 10 deletions

View File

@@ -7,11 +7,11 @@
the manual structure extends the nixpkgs commonmark further with include the manual structure extends the nixpkgs commonmark further with include
blocks to allow better organization of input text. there are six types of blocks to allow better organization of input text. there are six types of
include blocks: preface, parts, chapters, sections, appendix, and options. include blocks: preface, parts, chapters, sections, appendix, and options.
each type except `options`` corresponds to the docbook elements of (roughly) each type except `options` corresponds to the docbook elements of (roughly)
the same name, and can itself can further include blocks to denote its the same name, and can itself can further include blocks to denote its
substructure. substructure.
non-`options`` include blocks are fenced code blocks that list a number of non-`options` include blocks are fenced code blocks that list a number of
files to include, in the form files to include, in the form
```{=include=} <type> ```{=include=} <type>

View File

@@ -100,7 +100,7 @@ framework for Matrix.
url: https://matrix.example.org url: https://matrix.example.org
secret: your-very-secret-key secret: your-very-secret-key
``` ```
10. Restart Maubot after editing `/var/lib/maubot/config.yaml`,and 10. Restart Maubot after editing `/var/lib/maubot/config.yaml`, and
Maubot will be available at Maubot will be available at
`https://matrix.example.org/_matrix/maubot`. If you want to use the `https://matrix.example.org/_matrix/maubot`. If you want to use the
`mbc` CLI, it's available using the `maubot` package (`nix-shell -p `mbc` CLI, it's available using the `maubot` package (`nix-shell -p

View File

@@ -13,7 +13,7 @@
::: {.warning} ::: {.warning}
Mautrix-Whatsapp allows for some options like `encryption.pickle_key`, Mautrix-Whatsapp allows for some options like `encryption.pickle_key`,
`provisioning.shared_secret`, allow the value `generate` to be set. `provisioning.shared_secret`, to allow the value `generate` to be set.
Since the configuration file is regenerated on every start of the Since the configuration file is regenerated on every start of the
service, the generated values would be discarded and might break your service, the generated values would be discarded and might break your
installation. Instead, set those values via installation. Instead, set those values via

View File

@@ -7,7 +7,7 @@ more about it.
## Quickstart {#module-services-glance-quickstart} ## Quickstart {#module-services-glance-quickstart}
Checkout the [configuration docs](https://github.com/glanceapp/glance/blob/main/docs/configuration.md) to learn more. Check out the [configuration docs](https://github.com/glanceapp/glance/blob/main/docs/configuration.md) to learn more.
Use the following configuration to start a public instance of Glance locally: Use the following configuration to start a public instance of Glance locally:
```nix ```nix

View File

@@ -4,7 +4,7 @@
## Quickstart {#module-services-hatsu-quickstart} ## Quickstart {#module-services-hatsu-quickstart}
the minimum configuration to start hatsu server would look like this: The minimum configuration to start hatsu server would look like this:
```nix ```nix
{ {

View File

@@ -4,7 +4,7 @@ Lemmy is a federated alternative to reddit in rust.
## Quickstart {#module-services-lemmy-quickstart} ## Quickstart {#module-services-lemmy-quickstart}
the minimum to start lemmy is The minimum to start lemmy is
```nix ```nix
{ {
@@ -19,7 +19,7 @@ the minimum to start lemmy is
} }
``` ```
this will start the backend on port 8536 and the frontend on port 1234. This will start the backend on port 8536 and the frontend on port 1234.
It will expose your instance with a caddy reverse proxy to the hostname you've provided. It will expose your instance with a caddy reverse proxy to the hostname you've provided.
Postgres will be initialized on that same instance automatically. Postgres will be initialized on that same instance automatically.

View File

@@ -33,7 +33,7 @@ A very basic configuration may look like this:
This will start the oCIS server and make it available at `https://localhost:9200` This will start the oCIS server and make it available at `https://localhost:9200`
However to make this configuration work you will need generate a configuration. However, to make this configuration work, you will need to generate a configuration.
You can do this with: You can do this with:
```console ```console

View File

@@ -5,7 +5,7 @@ to serve ACME certificate requests.
## "Snake oil" certs ## "Snake oil" certs
The snake oil certs are hard coded into the repo for reasons explained [here](https://github.com/NixOS/nixpkgs/pull/91121#discussion_r505410235). The snake oil certs are hard-coded into the repo for reasons explained [here](https://github.com/NixOS/nixpkgs/pull/91121#discussion_r505410235).
The root of the issue is that Nix will hash the derivation based on the arguments The root of the issue is that Nix will hash the derivation based on the arguments
to mkDerivation, not the output. [Minica](https://github.com/jsha/minica) will to mkDerivation, not the output. [Minica](https://github.com/jsha/minica) will
always generate a random certificate even if the arguments are unchanged. As a always generate a random certificate even if the arguments are unchanged. As a