about summary refs log tree commit diff
path: root/nixos/modules/system/boot/systemd
diff options
context:
space:
mode:
Diffstat (limited to 'nixos/modules/system/boot/systemd')
-rw-r--r--nixos/modules/system/boot/systemd/coredump.nix4
-rw-r--r--nixos/modules/system/boot/systemd/homed.nix4
-rw-r--r--nixos/modules/system/boot/systemd/initrd.nix48
-rw-r--r--nixos/modules/system/boot/systemd/journald-gateway.nix12
-rw-r--r--nixos/modules/system/boot/systemd/journald-remote.nix14
-rw-r--r--nixos/modules/system/boot/systemd/journald-upload.nix2
-rw-r--r--nixos/modules/system/boot/systemd/journald.nix12
-rw-r--r--nixos/modules/system/boot/systemd/logind.nix26
-rw-r--r--nixos/modules/system/boot/systemd/nspawn.nix8
-rw-r--r--nixos/modules/system/boot/systemd/oomd.nix10
-rw-r--r--nixos/modules/system/boot/systemd/repart.nix12
-rw-r--r--nixos/modules/system/boot/systemd/shutdown.nix6
-rw-r--r--nixos/modules/system/boot/systemd/sysupdate.nix14
-rw-r--r--nixos/modules/system/boot/systemd/sysusers.nix4
-rw-r--r--nixos/modules/system/boot/systemd/tmpfiles.nix18
-rw-r--r--nixos/modules/system/boot/systemd/user.nix24
-rw-r--r--nixos/modules/system/boot/systemd/userdbd.nix4
17 files changed, 111 insertions, 111 deletions
diff --git a/nixos/modules/system/boot/systemd/coredump.nix b/nixos/modules/system/boot/systemd/coredump.nix
index 271d8f86d0e61..1f29f6686d0d0 100644
--- a/nixos/modules/system/boot/systemd/coredump.nix
+++ b/nixos/modules/system/boot/systemd/coredump.nix
@@ -10,7 +10,7 @@ in {
     systemd.coredump.enable = mkOption {
       default = true;
       type = types.bool;
-      description = lib.mdDoc ''
+      description = ''
         Whether core dumps should be processed by
         {command}`systemd-coredump`. If disabled, core dumps
         appear in the current directory of the crashing process.
@@ -21,7 +21,7 @@ in {
       default = "";
       type = types.lines;
       example = "Storage=journal";
-      description = lib.mdDoc ''
+      description = ''
         Extra config options for systemd-coredump. See coredump.conf(5) man page
         for available options.
       '';
diff --git a/nixos/modules/system/boot/systemd/homed.nix b/nixos/modules/system/boot/systemd/homed.nix
index b216820c0c0cd..1fd8846616c9b 100644
--- a/nixos/modules/system/boot/systemd/homed.nix
+++ b/nixos/modules/system/boot/systemd/homed.nix
@@ -4,9 +4,9 @@ let
   cfg = config.services.homed;
 in
 {
-  options.services.homed.enable = lib.mkEnableOption (lib.mdDoc ''
+  options.services.homed.enable = lib.mkEnableOption ''
     systemd home area/user account manager
-  '');
+  '';
 
   config = lib.mkIf cfg.enable {
     assertions = [
diff --git a/nixos/modules/system/boot/systemd/initrd.nix b/nixos/modules/system/boot/systemd/initrd.nix
index 6546b500ed981..00441b693d670 100644
--- a/nixos/modules/system/boot/systemd/initrd.nix
+++ b/nixos/modules/system/boot/systemd/initrd.nix
@@ -117,8 +117,8 @@ let
 
 in {
   options.boot.initrd.systemd = {
-    enable = mkEnableOption (lib.mdDoc "systemd in initrd") // {
-      description = lib.mdDoc ''
+    enable = mkEnableOption "systemd in initrd" // {
+      description = ''
         Whether to enable systemd in initrd. The unit options such as
         {option}`boot.initrd.systemd.services` are the same as their
         stage 2 counterparts such as {option}`systemd.services`,
@@ -140,7 +140,7 @@ in {
       default = "";
       type = types.lines;
       example = "DefaultLimitCORE=infinity";
-      description = lib.mdDoc ''
+      description = ''
         Extra config options for systemd. See systemd-system.conf(5) man page
         for available options.
       '';
@@ -150,14 +150,14 @@ in {
       type = with types; attrsOf (nullOr (oneOf [ str path package ]));
       default = {};
       example = { SYSTEMD_LOG_LEVEL = "debug"; };
-      description = lib.mdDoc ''
+      description = ''
         Environment variables of PID 1. These variables are
         *not* passed to started units.
       '';
     };
 
     contents = mkOption {
-      description = lib.mdDoc "Set of files that have to be linked into the initrd";
+      description = "Set of files that have to be linked into the initrd";
       example = literalExpression ''
         {
           "/etc/hostname".text = "mymachine";
@@ -168,7 +168,7 @@ in {
     };
 
     storePaths = mkOption {
-      description = lib.mdDoc ''
+      description = ''
         Store paths to copy into the initrd as well.
       '';
       type = with types; listOf (oneOf [ singleLineStr package ]);
@@ -176,7 +176,7 @@ in {
     };
 
     strip = mkOption {
-      description = lib.mdDoc ''
+      description = ''
         Whether to completely strip executables and libraries copied to the initramfs.
 
         Setting this to false may save on the order of 30MiB on the
@@ -189,7 +189,7 @@ in {
     };
 
     extraBin = mkOption {
-      description = lib.mdDoc ''
+      description = ''
         Tools to add to /bin
       '';
       example = literalExpression ''
@@ -202,7 +202,7 @@ in {
     };
 
     suppressedStorePaths = mkOption {
-      description = lib.mdDoc ''
+      description = ''
         Store paths specified in the storePaths option that
         should not be copied.
       '';
@@ -225,7 +225,7 @@ in {
 
     emergencyAccess = mkOption {
       type = with types; oneOf [ bool (nullOr (passwdEntry str)) ];
-      description = lib.mdDoc ''
+      description = ''
         Set to true for unauthenticated emergency access, and false for
         no emergency access.
 
@@ -238,7 +238,7 @@ in {
     initrdBin = mkOption {
       type = types.listOf types.package;
       default = [];
-      description = lib.mdDoc ''
+      description = ''
         Packages to include in /bin for the stage 1 emergency shell.
       '';
     };
@@ -247,7 +247,7 @@ in {
       default = [ ];
       type = types.listOf types.str;
       example = [ "debug-shell.service" "systemd-quotacheck.service" ];
-      description = lib.mdDoc ''
+      description = ''
         Additional units shipped with systemd that shall be enabled.
       '';
     };
@@ -256,7 +256,7 @@ in {
       default = [ ];
       type = types.listOf types.str;
       example = [ "systemd-backlight@.service" ];
-      description = lib.mdDoc ''
+      description = ''
         A list of units to skip when generating system systemd configuration directory. This has
         priority over upstream units, {option}`boot.initrd.systemd.units`, and
         {option}`boot.initrd.systemd.additionalUpstreamUnits`. The main purpose of this is to
@@ -266,7 +266,7 @@ in {
     };
 
     units = mkOption {
-      description = lib.mdDoc "Definition of systemd units.";
+      description = "Definition of systemd units.";
       default = {};
       visible = "shallow";
       type = systemdUtils.types.units;
@@ -276,49 +276,49 @@ in {
       default = [];
       type = types.listOf types.package;
       example = literalExpression "[ pkgs.systemd-cryptsetup-generator ]";
-      description = lib.mdDoc "Packages providing systemd units and hooks.";
+      description = "Packages providing systemd units and hooks.";
     };
 
     targets = mkOption {
       default = {};
       visible = "shallow";
       type = systemdUtils.types.initrdTargets;
-      description = lib.mdDoc "Definition of systemd target units.";
+      description = "Definition of systemd target units.";
     };
 
     services = mkOption {
       default = {};
       type = systemdUtils.types.initrdServices;
       visible = "shallow";
-      description = lib.mdDoc "Definition of systemd service units.";
+      description = "Definition of systemd service units.";
     };
 
     sockets = mkOption {
       default = {};
       type = systemdUtils.types.initrdSockets;
       visible = "shallow";
-      description = lib.mdDoc "Definition of systemd socket units.";
+      description = "Definition of systemd socket units.";
     };
 
     timers = mkOption {
       default = {};
       type = systemdUtils.types.initrdTimers;
       visible = "shallow";
-      description = lib.mdDoc "Definition of systemd timer units.";
+      description = "Definition of systemd timer units.";
     };
 
     paths = mkOption {
       default = {};
       type = systemdUtils.types.initrdPaths;
       visible = "shallow";
-      description = lib.mdDoc "Definition of systemd path units.";
+      description = "Definition of systemd path units.";
     };
 
     mounts = mkOption {
       default = [];
       type = systemdUtils.types.initrdMounts;
       visible = "shallow";
-      description = lib.mdDoc ''
+      description = ''
         Definition of systemd mount units.
         This is a list instead of an attrSet, because systemd mandates the names to be derived from
         the 'where' attribute.
@@ -329,7 +329,7 @@ in {
       default = [];
       type = systemdUtils.types.automounts;
       visible = "shallow";
-      description = lib.mdDoc ''
+      description = ''
         Definition of systemd automount units.
         This is a list instead of an attrSet, because systemd mandates the names to be derived from
         the 'where' attribute.
@@ -340,13 +340,13 @@ in {
       default = {};
       type = systemdUtils.types.slices;
       visible = "shallow";
-      description = lib.mdDoc "Definition of slice configurations.";
+      description = "Definition of slice configurations.";
     };
 
     enableTpm2 = mkOption {
       default = true;
       type = types.bool;
-      description = lib.mdDoc ''
+      description = ''
         Whether to enable TPM2 support in the initrd.
       '';
     };
diff --git a/nixos/modules/system/boot/systemd/journald-gateway.nix b/nixos/modules/system/boot/systemd/journald-gateway.nix
index 854965282344d..1bcb3f400c619 100644
--- a/nixos/modules/system/boot/systemd/journald-gateway.nix
+++ b/nixos/modules/system/boot/systemd/journald-gateway.nix
@@ -24,7 +24,7 @@ in
     cert = lib.mkOption {
       default = null;
       type = with lib.types; nullOr str;
-      description = lib.mdDoc ''
+      description = ''
         The path to a file or `AF_UNIX` stream socket to read the server
         certificate from.
 
@@ -37,7 +37,7 @@ in
     key = lib.mkOption {
       default = null;
       type = with lib.types; nullOr str;
-      description = lib.mdDoc ''
+      description = ''
         Specify the path to a file or `AF_UNIX` stream socket to read the
         secret server key corresponding to the certificate specified with
         {option}`services.journald.gateway.cert` from.
@@ -52,7 +52,7 @@ in
     trust = lib.mkOption {
       default = null;
       type = with lib.types; nullOr str;
-      description = lib.mdDoc ''
+      description = ''
         Specify the path to a file or `AF_UNIX` stream socket to read a CA
         certificate from.
 
@@ -65,7 +65,7 @@ in
     system = lib.mkOption {
       default = true;
       type = lib.types.bool;
-      description = lib.mdDoc ''
+      description = ''
         Serve entries from system services and the kernel.
 
         This has the same meaning as `--system` for {manpage}`journalctl(1)`.
@@ -75,7 +75,7 @@ in
     user = lib.mkOption {
       default = true;
       type = lib.types.bool;
-      description = lib.mdDoc ''
+      description = ''
         Serve entries from services for the current user.
 
         This has the same meaning as `--user` for {manpage}`journalctl(1)`.
@@ -85,7 +85,7 @@ in
     merge = lib.mkOption {
       default = false;
       type = lib.types.bool;
-      description = lib.mdDoc ''
+      description = ''
         Serve entries interleaved from all available journals, including other
         machines.
 
diff --git a/nixos/modules/system/boot/systemd/journald-remote.nix b/nixos/modules/system/boot/systemd/journald-remote.nix
index 57a0a133e1c6d..13674694c144e 100644
--- a/nixos/modules/system/boot/systemd/journald-remote.nix
+++ b/nixos/modules/system/boot/systemd/journald-remote.nix
@@ -18,7 +18,7 @@ in
     listen = lib.mkOption {
       default = "https";
       type = lib.types.enum [ "https" "http" ];
-      description = lib.mdDoc ''
+      description = ''
         Which protocol to listen to.
       '';
     };
@@ -26,7 +26,7 @@ in
     output = lib.mkOption {
       default = "/var/log/journal/remote/";
       type = lib.types.str;
-      description = lib.mdDoc ''
+      description = ''
         The location of the output journal.
 
         In case the output file is not specified, journal files will be created
@@ -52,7 +52,7 @@ in
     settings = lib.mkOption {
       default = { };
 
-      description = lib.mdDoc ''
+      description = ''
         Configuration in the journal-remote configuration file. See
         {manpage}`journal-remote.conf(5)` for available options.
       '';
@@ -75,7 +75,7 @@ in
             default = "host";
             example = "none";
             type = lib.types.enum [ "host" "none" ];
-            description = lib.mdDoc ''
+            description = ''
               With "host", a separate output file is used, based on the
               hostname of the other endpoint of a connection. With "none", only
               one output journal file is used.
@@ -85,7 +85,7 @@ in
           ServerKeyFile = lib.mkOption {
             default = "/etc/ssl/private/journal-remote.pem";
             type = lib.types.str;
-            description = lib.mdDoc ''
+            description = ''
               A path to a SSL secret key file in PEM format.
 
               Note that due to security reasons, `systemd-journal-remote` will
@@ -101,7 +101,7 @@ in
           ServerCertificateFile = lib.mkOption {
             default = "/etc/ssl/certs/journal-remote.pem";
             type = lib.types.str;
-            description = lib.mdDoc ''
+            description = ''
               A path to a SSL certificate file in PEM format.
 
               This option can be used with `listen = "https"`. If the path
@@ -113,7 +113,7 @@ in
           TrustedCertificateFile = lib.mkOption {
             default = "/etc/ssl/ca/trusted.pem";
             type = lib.types.str;
-            description = lib.mdDoc ''
+            description = ''
               A path to a SSL CA certificate file in PEM format, or `all`.
 
               If `all` is set, then client certificate checking will be
diff --git a/nixos/modules/system/boot/systemd/journald-upload.nix b/nixos/modules/system/boot/systemd/journald-upload.nix
index 6421e5fa486f9..053f886ff5c6b 100644
--- a/nixos/modules/system/boot/systemd/journald-upload.nix
+++ b/nixos/modules/system/boot/systemd/journald-upload.nix
@@ -12,7 +12,7 @@ in
     settings = lib.mkOption {
       default = { };
 
-      description = lib.mdDoc ''
+      description = ''
         Configuration for journal-upload. See {manpage}`journal-upload.conf(5)`
         for available options.
       '';
diff --git a/nixos/modules/system/boot/systemd/journald.nix b/nixos/modules/system/boot/systemd/journald.nix
index 62e24a305ddeb..f9f05d2b08f41 100644
--- a/nixos/modules/system/boot/systemd/journald.nix
+++ b/nixos/modules/system/boot/systemd/journald.nix
@@ -13,13 +13,13 @@ in {
     services.journald.console = mkOption {
       default = "";
       type = types.str;
-      description = lib.mdDoc "If non-empty, write log messages to the specified TTY device.";
+      description = "If non-empty, write log messages to the specified TTY device.";
     };
 
     services.journald.rateLimitInterval = mkOption {
       default = "30s";
       type = types.str;
-      description = lib.mdDoc ''
+      description = ''
         Configures the rate limiting interval that is applied to all
         messages generated on the system. This rate limiting is applied
         per-service, so that two services which log do not interfere with
@@ -35,7 +35,7 @@ in {
     services.journald.storage = mkOption {
       default = "persistent";
       type = types.enum [ "persistent" "volatile" "auto" "none" ];
-      description = mdDoc ''
+      description = ''
         Controls where to store journal data. See
         {manpage}`journald.conf(5)` for further information.
       '';
@@ -44,7 +44,7 @@ in {
     services.journald.rateLimitBurst = mkOption {
       default = 10000;
       type = types.int;
-      description = lib.mdDoc ''
+      description = ''
         Configures the rate limiting burst limit (number of messages per
         interval) that is applied to all messages generated on the system.
         This rate limiting is applied per-service, so that two services
@@ -71,7 +71,7 @@ in {
       default = "";
       type = types.lines;
       example = "Storage=volatile";
-      description = lib.mdDoc ''
+      description = ''
         Extra config options for systemd-journald. See man journald.conf
         for available options.
       '';
@@ -81,7 +81,7 @@ in {
       default = config.services.rsyslogd.enable || config.services.syslog-ng.enable;
       defaultText = literalExpression "services.rsyslogd.enable || services.syslog-ng.enable";
       type = types.bool;
-      description = lib.mdDoc ''
+      description = ''
         Whether to forward log messages to syslog.
       '';
     };
diff --git a/nixos/modules/system/boot/systemd/logind.nix b/nixos/modules/system/boot/systemd/logind.nix
index cf01c18828573..ed5369c09ccb2 100644
--- a/nixos/modules/system/boot/systemd/logind.nix
+++ b/nixos/modules/system/boot/systemd/logind.nix
@@ -16,7 +16,7 @@ in
       default = "";
       type = types.lines;
       example = "IdleAction=lock";
-      description = lib.mdDoc ''
+      description = ''
         Extra config options for systemd-logind.
         See [logind.conf(5)](https://www.freedesktop.org/software/systemd/man/logind.conf.html)
         for available options.
@@ -26,7 +26,7 @@ in
     killUserProcesses = mkOption {
       default = false;
       type = types.bool;
-      description = lib.mdDoc ''
+      description = ''
         Specifies whether the processes of a user should be killed
         when the user logs out.  If true, the scope unit corresponding
         to the session and all processes inside that scope will be
@@ -44,7 +44,7 @@ in
       example = "ignore";
       type = logindHandlerType;
 
-      description = lib.mdDoc ''
+      description = ''
         Specifies what to do when the power key is pressed.
       '';
     };
@@ -54,7 +54,7 @@ in
       example = "reboot";
       type = logindHandlerType;
 
-      description = lib.mdDoc ''
+      description = ''
         Specifies what to do when the power key is long-pressed.
       '';
     };
@@ -64,7 +64,7 @@ in
       example = "ignore";
       type = logindHandlerType;
 
-      description = lib.mdDoc ''
+      description = ''
         Specifies what to do when the reboot key is pressed.
       '';
     };
@@ -74,7 +74,7 @@ in
       example = "ignore";
       type = logindHandlerType;
 
-      description = lib.mdDoc ''
+      description = ''
         Specifies what to do when the reboot key is long-pressed.
       '';
     };
@@ -84,7 +84,7 @@ in
       example = "ignore";
       type = logindHandlerType;
 
-      description = lib.mdDoc ''
+      description = ''
         Specifies what to do when the suspend key is pressed.
       '';
     };
@@ -94,7 +94,7 @@ in
       example = "ignore";
       type = logindHandlerType;
 
-      description = lib.mdDoc ''
+      description = ''
         Specifies what to do when the suspend key is long-pressed.
       '';
     };
@@ -104,7 +104,7 @@ in
       example = "ignore";
       type = logindHandlerType;
 
-      description = lib.mdDoc ''
+      description = ''
         Specifies what to do when the hibernate key is pressed.
       '';
     };
@@ -114,7 +114,7 @@ in
       example = "suspend";
       type = logindHandlerType;
 
-      description = lib.mdDoc ''
+      description = ''
         Specifies what to do when the hibernate key is long-pressed.
       '';
     };
@@ -124,7 +124,7 @@ in
       example = "ignore";
       type = logindHandlerType;
 
-      description = lib.mdDoc ''
+      description = ''
         Specifies what to do when the laptop lid is closed.
       '';
     };
@@ -135,7 +135,7 @@ in
       example = "ignore";
       type = logindHandlerType;
 
-      description = lib.mdDoc ''
+      description = ''
         Specifies what to do when the laptop lid is closed
         and the system is on external power. By default use
         the same action as specified in services.logind.lidSwitch.
@@ -147,7 +147,7 @@ in
       example = "suspend";
       type = logindHandlerType;
 
-      description = lib.mdDoc ''
+      description = ''
         Specifies what to do when the laptop lid is closed
         and another screen is added.
       '';
diff --git a/nixos/modules/system/boot/systemd/nspawn.nix b/nixos/modules/system/boot/systemd/nspawn.nix
index b513aa051f283..11fbb88838e10 100644
--- a/nixos/modules/system/boot/systemd/nspawn.nix
+++ b/nixos/modules/system/boot/systemd/nspawn.nix
@@ -52,7 +52,7 @@ let
         default = {};
         example = { Parameters = "/bin/sh"; };
         type = types.addCheck (types.attrsOf unitOption) checkExec;
-        description = lib.mdDoc ''
+        description = ''
           Each attribute in this set specifies an option in the
           `[Exec]` section of this unit. See
           {manpage}`systemd.nspawn(5)` for details.
@@ -63,7 +63,7 @@ let
         default = {};
         example = { Bind = [ "/home/alice" ]; };
         type = types.addCheck (types.attrsOf unitOption) checkFiles;
-        description = lib.mdDoc ''
+        description = ''
           Each attribute in this set specifies an option in the
           `[Files]` section of this unit. See
           {manpage}`systemd.nspawn(5)` for details.
@@ -74,7 +74,7 @@ let
         default = {};
         example = { Private = false; };
         type = types.addCheck (types.attrsOf unitOption) checkNetwork;
-        description = lib.mdDoc ''
+        description = ''
           Each attribute in this set specifies an option in the
           `[Network]` section of this unit. See
           {manpage}`systemd.nspawn(5)` for details.
@@ -106,7 +106,7 @@ in {
     systemd.nspawn = mkOption {
       default = {};
       type = with types; attrsOf (submodule instanceOptions);
-      description = lib.mdDoc "Definition of systemd-nspawn configurations.";
+      description = "Definition of systemd-nspawn configurations.";
     };
 
   };
diff --git a/nixos/modules/system/boot/systemd/oomd.nix b/nixos/modules/system/boot/systemd/oomd.nix
index edc25784367a4..a2a90e0ceb873 100644
--- a/nixos/modules/system/boot/systemd/oomd.nix
+++ b/nixos/modules/system/boot/systemd/oomd.nix
@@ -8,19 +8,19 @@ in {
   ];
 
   options.systemd.oomd = {
-    enable = lib.mkEnableOption (lib.mdDoc "the `systemd-oomd` OOM killer") // { default = true; };
+    enable = lib.mkEnableOption "the `systemd-oomd` OOM killer" // { default = true; };
 
     # Fedora enables the first and third option by default. See the 10-oomd-* files here:
     # https://src.fedoraproject.org/rpms/systemd/tree/806c95e1c70af18f81d499b24cd7acfa4c36ffd6
-    enableRootSlice = lib.mkEnableOption (lib.mdDoc "oomd on the root slice (`-.slice`)");
-    enableSystemSlice = lib.mkEnableOption (lib.mdDoc "oomd on the system slice (`system.slice`)");
-    enableUserSlices = lib.mkEnableOption (lib.mdDoc "oomd on all user slices (`user@.slice`) and all user owned slices");
+    enableRootSlice = lib.mkEnableOption "oomd on the root slice (`-.slice`)";
+    enableSystemSlice = lib.mkEnableOption "oomd on the system slice (`system.slice`)";
+    enableUserSlices = lib.mkEnableOption "oomd on all user slices (`user@.slice`) and all user owned slices";
 
     extraConfig = lib.mkOption {
       type = with lib.types; attrsOf (oneOf [ str int bool ]);
       default = {};
       example = lib.literalExpression ''{ DefaultMemoryPressureDurationSec = "20s"; }'';
-      description = lib.mdDoc ''
+      description = ''
         Extra config options for `systemd-oomd`. See {command}`man oomd.conf`
         for available options.
       '';
diff --git a/nixos/modules/system/boot/systemd/repart.nix b/nixos/modules/system/boot/systemd/repart.nix
index 7771f5fe06789..49db1305bb2b6 100644
--- a/nixos/modules/system/boot/systemd/repart.nix
+++ b/nixos/modules/system/boot/systemd/repart.nix
@@ -28,8 +28,8 @@ in
 {
   options = {
     boot.initrd.systemd.repart = {
-      enable = lib.mkEnableOption (lib.mdDoc "systemd-repart") // {
-        description = lib.mdDoc ''
+      enable = lib.mkEnableOption "systemd-repart" // {
+        description = ''
           Grow and add partitions to a partition table at boot time in the initrd.
           systemd-repart only works with GPT partition tables.
 
@@ -40,7 +40,7 @@ in
 
       device = lib.mkOption {
         type = with lib.types; nullOr str;
-        description = lib.mdDoc ''
+        description = ''
           The device to operate on.
 
           If `device == null`, systemd-repart will operate on the device
@@ -53,8 +53,8 @@ in
     };
 
     systemd.repart = {
-      enable = lib.mkEnableOption (lib.mdDoc "systemd-repart") // {
-        description = lib.mdDoc ''
+      enable = lib.mkEnableOption "systemd-repart" // {
+        description = ''
           Grow and add partitions to a partition table.
           systemd-repart only works with GPT partition tables.
 
@@ -76,7 +76,7 @@ in
             SizeMaxBytes = "2G";
           };
         };
-        description = lib.mdDoc ''
+        description = ''
           Specify partitions as a set of the names of the definition files as the
           key and the partition configuration as its value. The partition
           configuration can use all upstream options. See <link
diff --git a/nixos/modules/system/boot/systemd/shutdown.nix b/nixos/modules/system/boot/systemd/shutdown.nix
index d7300e940af20..5c2525a57b4be 100644
--- a/nixos/modules/system/boot/systemd/shutdown.nix
+++ b/nixos/modules/system/boot/systemd/shutdown.nix
@@ -9,9 +9,9 @@
 
 in {
   options.systemd.shutdownRamfs = {
-    enable = lib.mkEnableOption (lib.mdDoc "pivoting back to an initramfs for shutdown") // { default = true; };
+    enable = lib.mkEnableOption "pivoting back to an initramfs for shutdown" // { default = true; };
     contents = lib.mkOption {
-      description = lib.mdDoc "Set of files that have to be linked into the shutdown ramfs";
+      description = "Set of files that have to be linked into the shutdown ramfs";
       example = lib.literalExpression ''
         {
           "/lib/systemd/system-shutdown/zpool-sync-shutdown".source = writeShellScript "zpool" "exec ''${zfs}/bin/zpool sync"
@@ -21,7 +21,7 @@ in {
     };
 
     storePaths = lib.mkOption {
-      description = lib.mdDoc ''
+      description = ''
         Store paths to copy into the shutdown ramfs as well.
       '';
       type = lib.types.listOf lib.types.singleLineStr;
diff --git a/nixos/modules/system/boot/systemd/sysupdate.nix b/nixos/modules/system/boot/systemd/sysupdate.nix
index 1f4088ddf8251..67f0b3b1caadc 100644
--- a/nixos/modules/system/boot/systemd/sysupdate.nix
+++ b/nixos/modules/system/boot/systemd/sysupdate.nix
@@ -13,8 +13,8 @@ in
 {
   options.systemd.sysupdate = {
 
-    enable = lib.mkEnableOption (lib.mdDoc "systemd-sysupdate") // {
-      description = lib.mdDoc ''
+    enable = lib.mkEnableOption "systemd-sysupdate" // {
+      description = ''
         Atomically update the host OS, container images, portable service
         images or other sources.
 
@@ -29,7 +29,7 @@ in
 
     timerConfig = utils.systemdUtils.unitOptions.timerOptions.options.timerConfig // {
       default = { };
-      description = lib.mdDoc ''
+      description = ''
         The timer configuration for performing the update.
 
         By default, the upstream configuration is used:
@@ -38,8 +38,8 @@ in
     };
 
     reboot = {
-      enable = lib.mkEnableOption (lib.mdDoc "automatically rebooting after an update") // {
-        description = lib.mdDoc ''
+      enable = lib.mkEnableOption "automatically rebooting after an update" // {
+        description = ''
           Whether to automatically reboot after an update.
 
           If set to `true`, the system will automatically reboot via a
@@ -58,7 +58,7 @@ in
 
       timerConfig = utils.systemdUtils.unitOptions.timerOptions.options.timerConfig // {
         default = { };
-        description = lib.mdDoc ''
+        description = ''
           The timer configuration for rebooting after an update.
 
           By default, the upstream configuration is used:
@@ -98,7 +98,7 @@ in
           };
         };
       };
-      description = lib.mdDoc ''
+      description = ''
         Specify transfers as a set of the names of the transfer files as the
         key and the configuration as its value. The configuration can use all
         upstream options. See
diff --git a/nixos/modules/system/boot/systemd/sysusers.nix b/nixos/modules/system/boot/systemd/sysusers.nix
index c619c2d91eb09..de70009705973 100644
--- a/nixos/modules/system/boot/systemd/sysusers.nix
+++ b/nixos/modules/system/boot/systemd/sysusers.nix
@@ -67,8 +67,8 @@ in
     # users-groups.nix
 
     systemd.sysusers = {
-      enable = lib.mkEnableOption (lib.mdDoc "systemd-sysusers") // {
-        description = lib.mdDoc ''
+      enable = lib.mkEnableOption "systemd-sysusers" // {
+        description = ''
           If enabled, users are created with systemd-sysusers instead of with
           the custom `update-users-groups.pl` script.
 
diff --git a/nixos/modules/system/boot/systemd/tmpfiles.nix b/nixos/modules/system/boot/systemd/tmpfiles.nix
index dae23eddd1e2b..ded13728017d1 100644
--- a/nixos/modules/system/boot/systemd/tmpfiles.nix
+++ b/nixos/modules/system/boot/systemd/tmpfiles.nix
@@ -12,7 +12,7 @@ in
       type = types.listOf types.str;
       default = [];
       example = [ "d /tmp 1777 root root 10d" ];
-      description = lib.mdDoc ''
+      description = ''
         Rules for creation, deletion and cleaning of volatile and temporary files
         automatically. See
         {manpage}`tmpfiles.d(5)`
@@ -21,7 +21,7 @@ in
     };
 
     systemd.tmpfiles.settings = mkOption {
-      description = lib.mdDoc ''
+      description = ''
         Declare systemd-tmpfiles rules to create, delete, and clean up volatile
         and temporary files and directories.
 
@@ -43,7 +43,7 @@ in
           type = types.str;
           default = name;
           example = "d";
-          description = lib.mdDoc ''
+          description = ''
             The type of operation to perform on the file.
 
             The type consists of a single letter and optionally one or more
@@ -58,7 +58,7 @@ in
           type = types.str;
           default = "-";
           example = "0755";
-          description = lib.mdDoc ''
+          description = ''
             The file access mode to use when creating this file or directory.
           '';
         };
@@ -66,7 +66,7 @@ in
           type = types.str;
           default = "-";
           example = "root";
-          description = lib.mdDoc ''
+          description = ''
             The user of the file.
 
             This may either be a numeric ID or a user/group name.
@@ -79,7 +79,7 @@ in
           type = types.str;
           default = "-";
           example = "root";
-          description = lib.mdDoc ''
+          description = ''
             The group of the file.
 
             This may either be a numeric ID or a user/group name.
@@ -92,7 +92,7 @@ in
           type = types.str;
           default = "-";
           example = "10d";
-          description = lib.mdDoc ''
+          description = ''
             Delete a file when it reaches a certain age.
 
             If a file or directory is older than the current time minus the age
@@ -105,7 +105,7 @@ in
           type = types.str;
           default = "";
           example = "";
-          description = lib.mdDoc ''
+          description = ''
             An argument whose meaning depends on the type of operation.
 
             Please see the upstream documentation for the meaning of this
@@ -121,7 +121,7 @@ in
       default = [];
       example = literalExpression "[ pkgs.lvm2 ]";
       apply = map getLib;
-      description = lib.mdDoc ''
+      description = ''
         List of packages containing {command}`systemd-tmpfiles` rules.
 
         All files ending in .conf found in
diff --git a/nixos/modules/system/boot/systemd/user.nix b/nixos/modules/system/boot/systemd/user.nix
index 64dc19633eca9..4c7b51ee22b74 100644
--- a/nixos/modules/system/boot/systemd/user.nix
+++ b/nixos/modules/system/boot/systemd/user.nix
@@ -59,14 +59,14 @@ in {
       default = "";
       type = types.lines;
       example = "DefaultCPUAccounting=yes";
-      description = lib.mdDoc ''
+      description = ''
         Extra config options for systemd user instances. See {manpage}`systemd-user.conf(5)` for
         available options.
       '';
     };
 
     systemd.user.units = mkOption {
-      description = lib.mdDoc "Definition of systemd per-user units.";
+      description = "Definition of systemd per-user units.";
       default = {};
       type = systemdUtils.types.units;
     };
@@ -74,37 +74,37 @@ in {
     systemd.user.paths = mkOption {
       default = {};
       type = systemdUtils.types.paths;
-      description = lib.mdDoc "Definition of systemd per-user path units.";
+      description = "Definition of systemd per-user path units.";
     };
 
     systemd.user.services = mkOption {
       default = {};
       type = systemdUtils.types.services;
-      description = lib.mdDoc "Definition of systemd per-user service units.";
+      description = "Definition of systemd per-user service units.";
     };
 
     systemd.user.slices = mkOption {
       default = {};
       type = systemdUtils.types.slices;
-      description = lib.mdDoc "Definition of systemd per-user slice units.";
+      description = "Definition of systemd per-user slice units.";
     };
 
     systemd.user.sockets = mkOption {
       default = {};
       type = systemdUtils.types.sockets;
-      description = lib.mdDoc "Definition of systemd per-user socket units.";
+      description = "Definition of systemd per-user socket units.";
     };
 
     systemd.user.targets = mkOption {
       default = {};
       type = systemdUtils.types.targets;
-      description = lib.mdDoc "Definition of systemd per-user target units.";
+      description = "Definition of systemd per-user target units.";
     };
 
     systemd.user.timers = mkOption {
       default = {};
       type = systemdUtils.types.timers;
-      description = lib.mdDoc "Definition of systemd per-user timer units.";
+      description = "Definition of systemd per-user timer units.";
     };
 
     systemd.user.tmpfiles = {
@@ -112,7 +112,7 @@ in {
         type = types.listOf types.str;
         default = [];
         example = [ "D %C - - - 7d" ];
-        description = lib.mdDoc ''
+        description = ''
           Global user rules for creation, deletion and cleaning of volatile and
           temporary files automatically. See
           {manpage}`tmpfiles.d(5)`
@@ -121,7 +121,7 @@ in {
       };
 
       users = mkOption {
-        description = mdDoc ''
+        description = ''
           Per-user rules for creation, deletion and cleaning of volatile and
           temporary files automatically.
         '';
@@ -132,7 +132,7 @@ in {
               type = types.listOf types.str;
               default = [];
               example = [ "D %C - - - 7d" ];
-              description = mdDoc ''
+              description = ''
                 Per-user rules for creation, deletion and cleaning of volatile and
                 temporary files automatically. See
                 {manpage}`tmpfiles.d(5)`
@@ -148,7 +148,7 @@ in {
       default = [];
       type = types.listOf types.str;
       example = [];
-      description = lib.mdDoc ''
+      description = ''
         Additional units shipped with systemd that should be enabled for per-user systemd instances.
       '';
       internal = true;
diff --git a/nixos/modules/system/boot/systemd/userdbd.nix b/nixos/modules/system/boot/systemd/userdbd.nix
index e7f6d42341c4e..0161a7c2c6815 100644
--- a/nixos/modules/system/boot/systemd/userdbd.nix
+++ b/nixos/modules/system/boot/systemd/userdbd.nix
@@ -4,9 +4,9 @@ let
   cfg = config.services.userdbd;
 in
 {
-  options.services.userdbd.enable = lib.mkEnableOption (lib.mdDoc ''
+  options.services.userdbd.enable = lib.mkEnableOption ''
     the systemd JSON user/group record lookup service
-  '');
+  '';
   config = lib.mkIf cfg.enable {
     systemd.additionalUpstreamSystemUnits = [
       "systemd-userdbd.socket"