From 701bcdbead7597cddd3fc92a3581da95a138ef45 Mon Sep 17 00:00:00 2001 From: figsoda Date: Fri, 19 May 2023 22:11:38 -0400 Subject: nixos: fix typos --- nixos/modules/config/xdg/portal.nix | 2 +- nixos/modules/hardware/sensor/hddtemp.nix | 2 +- nixos/modules/installer/tools/nixos-enter.sh | 2 +- nixos/modules/misc/version.nix | 4 ++-- nixos/modules/programs/fish.nix | 2 +- nixos/modules/programs/nix-ld.nix | 2 +- nixos/modules/programs/singularity.nix | 6 +++--- nixos/modules/programs/turbovnc.nix | 2 +- nixos/modules/rename.nix | 2 +- nixos/modules/services/cluster/kubernetes/flannel.nix | 2 +- nixos/modules/services/cluster/kubernetes/kubelet.nix | 2 +- .../services/continuous-integration/gitea-actions-runner.nix | 2 +- nixos/modules/services/continuous-integration/woodpecker/agents.nix | 2 +- nixos/modules/services/continuous-integration/woodpecker/server.nix | 2 +- nixos/modules/services/databases/cockroachdb.nix | 2 +- nixos/modules/services/databases/couchdb.nix | 2 +- nixos/modules/services/databases/firebird.nix | 2 +- nixos/modules/services/databases/mongodb.nix | 2 +- nixos/modules/services/desktops/deepin/dde-api.nix | 2 +- nixos/modules/services/mail/roundcube.nix | 2 +- nixos/modules/services/misc/siproxd.nix | 6 +++--- nixos/modules/services/monitoring/prometheus/default.nix | 2 +- nixos/modules/services/monitoring/unpoller.nix | 4 ++-- nixos/modules/services/networking/headscale.nix | 2 +- nixos/modules/services/networking/wgautomesh.nix | 2 +- nixos/modules/services/search/meilisearch.md | 2 +- nixos/modules/services/security/authelia.nix | 2 +- nixos/modules/services/security/kanidm.nix | 2 +- nixos/modules/services/web-apps/dokuwiki.nix | 2 +- nixos/modules/services/web-apps/kavita.nix | 2 +- nixos/modules/services/web-apps/mastodon.nix | 2 +- nixos/modules/services/web-apps/monica.nix | 2 +- nixos/modules/services/web-apps/nextcloud-notify_push.nix | 2 +- nixos/modules/services/web-apps/nextcloud.nix | 2 +- nixos/modules/services/web-apps/pixelfed.nix | 2 +- nixos/modules/services/web-servers/garage.md | 2 +- nixos/modules/services/web-servers/stargazer.nix | 2 +- nixos/modules/services/x11/window-managers/qtile.nix | 2 +- nixos/modules/system/boot/loader/grub/install-grub.pl | 4 ++-- nixos/modules/system/boot/luksroot.nix | 4 ++-- nixos/modules/system/boot/stage-1-init.sh | 2 +- nixos/modules/tasks/filesystems/bcachefs.nix | 2 +- nixos/modules/tasks/filesystems/btrfs.nix | 2 +- nixos/modules/tasks/network-interfaces-scripted.nix | 2 +- nixos/modules/tasks/network-interfaces-systemd.nix | 2 +- nixos/modules/testing/test-instrumentation.nix | 2 +- 46 files changed, 54 insertions(+), 54 deletions(-) (limited to 'nixos/modules') diff --git a/nixos/modules/config/xdg/portal.nix b/nixos/modules/config/xdg/portal.nix index ab6cffe499aa8..e19e5cf28b3bc 100644 --- a/nixos/modules/config/xdg/portal.nix +++ b/nixos/modules/config/xdg/portal.nix @@ -21,7 +21,7 @@ in in { warnings = lib.mkIf config.xdg.portal.gtkUsePortal [ - "The option `${lib.showOption from}' defined in ${lib.showFiles fromOpt.files} has been deprecated. Setting the variable globally with `environment.sessionVariables' NixOS option can have unforseen side-effects." + "The option `${lib.showOption from}' defined in ${lib.showFiles fromOpt.files} has been deprecated. Setting the variable globally with `environment.sessionVariables' NixOS option can have unforeseen side-effects." ]; } ) diff --git a/nixos/modules/hardware/sensor/hddtemp.nix b/nixos/modules/hardware/sensor/hddtemp.nix index b69d012b4d092..1a3d211b858b8 100644 --- a/nixos/modules/hardware/sensor/hddtemp.nix +++ b/nixos/modules/hardware/sensor/hddtemp.nix @@ -43,7 +43,7 @@ in }; unit = mkOption { - description = lib.mdDoc "Celcius or Fahrenheit"; + description = lib.mdDoc "Celsius or Fahrenheit"; type = types.enum [ "C" "F" ]; default = "C"; }; diff --git a/nixos/modules/installer/tools/nixos-enter.sh b/nixos/modules/installer/tools/nixos-enter.sh index 60a86d89abb4f..9141cc2857024 100755 --- a/nixos/modules/installer/tools/nixos-enter.sh +++ b/nixos/modules/installer/tools/nixos-enter.sh @@ -97,7 +97,7 @@ chroot_add_resolv_conf "$mountPoint" || echo "$0: failed to set up resolv.conf" exec 2>/dev/null fi - # Run the activation script. Set $LOCALE_ARCHIVE to supress some Perl locale warnings. + # Run the activation script. Set $LOCALE_ARCHIVE to suppress some Perl locale warnings. LOCALE_ARCHIVE="$system/sw/lib/locale/locale-archive" IN_NIXOS_ENTER=1 chroot "$mountPoint" "$system/activate" 1>&2 || true # Create /tmp. This is needed for nix-build and the NixOS activation script to work. diff --git a/nixos/modules/misc/version.nix b/nixos/modules/misc/version.nix index 447f8193855f1..780a6b2a83a61 100644 --- a/nixos/modules/misc/version.nix +++ b/nixos/modules/misc/version.nix @@ -9,10 +9,10 @@ let literalExpression mkRenamedOptionModule mkDefault mkOption trivial types; needsEscaping = s: null != builtins.match "[a-zA-Z0-9]+" s; - escapeIfNeccessary = s: if needsEscaping s then s else ''"${lib.escape [ "\$" "\"" "\\" "\`" ] s}"''; + escapeIfNecessary = s: if needsEscaping s then s else ''"${lib.escape [ "\$" "\"" "\\" "\`" ] s}"''; attrsToText = attrs: concatStringsSep "\n" ( - mapAttrsToList (n: v: ''${n}=${escapeIfNeccessary (toString v)}'') attrs + mapAttrsToList (n: v: ''${n}=${escapeIfNecessary (toString v)}'') attrs ) + "\n"; osReleaseContents = { diff --git a/nixos/modules/programs/fish.nix b/nixos/modules/programs/fish.nix index 160adc0cad6d3..478f07d013107 100644 --- a/nixos/modules/programs/fish.nix +++ b/nixos/modules/programs/fish.nix @@ -303,7 +303,7 @@ in programs.fish.interactiveShellInit = '' # add completions generated by NixOS to $fish_complete_path begin - # joins with null byte to acommodate all characters in paths, then respectively gets all paths before (exclusive) / after (inclusive) the first one including "generated_completions", + # joins with null byte to accommodate all characters in paths, then respectively gets all paths before (exclusive) / after (inclusive) the first one including "generated_completions", # splits by null byte, and then removes all empty lines produced by using 'string' set -l prev (string join0 $fish_complete_path | string match --regex "^.*?(?=\x00[^\x00]*generated_completions.*)" | string split0 | string match -er ".") set -l post (string join0 $fish_complete_path | string match --regex "[^\x00]*generated_completions.*" | string split0 | string match -er ".") diff --git a/nixos/modules/programs/nix-ld.nix b/nixos/modules/programs/nix-ld.nix index 9a12b4ca5c74f..f0c265f0e5a31 100644 --- a/nixos/modules/programs/nix-ld.nix +++ b/nixos/modules/programs/nix-ld.nix @@ -2,7 +2,7 @@ let cfg = config.programs.nix-ld; - # TODO make glibc here configureable? + # TODO make glibc here configurable? nix-ld-so = pkgs.runCommand "ld.so" {} '' ln -s "$(cat '${pkgs.stdenv.cc}/nix-support/dynamic-linker')" $out ''; diff --git a/nixos/modules/programs/singularity.nix b/nixos/modules/programs/singularity.nix index 4884e5bdf2ddd..05fdb4842c543 100644 --- a/nixos/modules/programs/singularity.nix +++ b/nixos/modules/programs/singularity.nix @@ -25,9 +25,9 @@ in type = types.nullOr types.package; default = null; description = mdDoc '' - This option provides access to the overriden result of `programs.singularity.package`. + This option provides access to the overridden result of `programs.singularity.package`. - For example, the following configuration makes all the Nixpkgs packages use the overriden `singularity`: + For example, the following configuration makes all the Nixpkgs packages use the overridden `singularity`: ```Nix { config, lib, pkgs, ... }: { @@ -42,7 +42,7 @@ in } ``` - Use `lib.mkForce` to forcefully specify the overriden package. + Use `lib.mkForce` to forcefully specify the overridden package. ''; }; enableFakeroot = mkOption { diff --git a/nixos/modules/programs/turbovnc.nix b/nixos/modules/programs/turbovnc.nix index a0e4a36cfd995..511b6badc0417 100644 --- a/nixos/modules/programs/turbovnc.nix +++ b/nixos/modules/programs/turbovnc.nix @@ -39,7 +39,7 @@ in config = mkIf cfg.ensureHeadlessSoftwareOpenGL { # TurboVNC has builtin support for Mesa llvmpipe's `swrast` - # software rendering to implemnt GLX (OpenGL on Xorg). + # software rendering to implement GLX (OpenGL on Xorg). # However, just building TurboVNC with support for that is not enough # (it only takes care of the X server side part of OpenGL); # the indiviudual applications (e.g. `glxgears`) also need to directly load diff --git a/nixos/modules/rename.nix b/nixos/modules/rename.nix index a4a2c316fd6c1..c8e540932efa8 100644 --- a/nixos/modules/rename.nix +++ b/nixos/modules/rename.nix @@ -112,7 +112,7 @@ in (mkRemovedOptionModule [ "services" "cryptpad" ] "The corresponding package was removed from nixpkgs.") (mkRemovedOptionModule [ "services" "rtsp-simple-server" ] "Package has been completely rebranded by upstream as mediamtx, and thus the service and the package were renamed in NixOS as well.") - (mkRemovedOptionModule [ "i18n" "inputMethod" "fcitx" ] "The fcitx module has been removed. Plesae use fcitx5 instead") + (mkRemovedOptionModule [ "i18n" "inputMethod" "fcitx" ] "The fcitx module has been removed. Please use fcitx5 instead") # Do NOT add any option renames here, see top of the file ]; diff --git a/nixos/modules/services/cluster/kubernetes/flannel.nix b/nixos/modules/services/cluster/kubernetes/flannel.nix index 53003287fc9c9..11c5adc6a8859 100644 --- a/nixos/modules/services/cluster/kubernetes/flannel.nix +++ b/nixos/modules/services/cluster/kubernetes/flannel.nix @@ -53,7 +53,7 @@ in }; }; - # give flannel som kubernetes rbac permissions if applicable + # give flannel some kubernetes rbac permissions if applicable services.kubernetes.addonManager.bootstrapAddons = mkIf ((storageBackend == "kubernetes") && (elem "RBAC" top.apiserver.authorizationMode)) { flannel-cr = { diff --git a/nixos/modules/services/cluster/kubernetes/kubelet.nix b/nixos/modules/services/cluster/kubernetes/kubelet.nix index eebacb3f3ef39..fd2dce7ee6a25 100644 --- a/nixos/modules/services/cluster/kubernetes/kubelet.nix +++ b/nixos/modules/services/cluster/kubernetes/kubelet.nix @@ -337,7 +337,7 @@ in }; }; - # Allways include cni plugins + # Always include cni plugins services.kubernetes.kubelet.cni.packages = [pkgs.cni-plugins pkgs.cni-plugin-flannel]; boot.kernelModules = ["br_netfilter" "overlay"]; diff --git a/nixos/modules/services/continuous-integration/gitea-actions-runner.nix b/nixos/modules/services/continuous-integration/gitea-actions-runner.nix index 4b9046c98e8b6..fb70c48991260 100644 --- a/nixos/modules/services/continuous-integration/gitea-actions-runner.nix +++ b/nixos/modules/services/continuous-integration/gitea-actions-runner.nix @@ -207,7 +207,7 @@ in export LABELS_CURRENT="$(cat $LABELS_FILE 2>/dev/null || echo 0)" if [ ! -e "$INSTANCE_DIR/.runner" ] || [ "$LABELS_WANTED" != "$LABELS_CURRENT" ]; then - # remove existing registration file, so that changing the labels forces a re-registation + # remove existing registration file, so that changing the labels forces a re-registration rm -v "$INSTANCE_DIR/.runner" || true # perform the registration diff --git a/nixos/modules/services/continuous-integration/woodpecker/agents.nix b/nixos/modules/services/continuous-integration/woodpecker/agents.nix index caf6c85093424..cc5b903afd595 100644 --- a/nixos/modules/services/continuous-integration/woodpecker/agents.nix +++ b/nixos/modules/services/continuous-integration/woodpecker/agents.nix @@ -23,7 +23,7 @@ let DOCKER_HOST = "unix:///run/podman/podman.sock"; } ''; - description = lib.mdDoc "woodpecker-agent config envrionment variables, for other options read the [documentation](https://woodpecker-ci.org/docs/administration/agent-config)"; + description = lib.mdDoc "woodpecker-agent config environment variables, for other options read the [documentation](https://woodpecker-ci.org/docs/administration/agent-config)"; }; extraGroups = lib.mkOption { diff --git a/nixos/modules/services/continuous-integration/woodpecker/server.nix b/nixos/modules/services/continuous-integration/woodpecker/server.nix index be7786da8505f..cae5ed7cf1161 100644 --- a/nixos/modules/services/continuous-integration/woodpecker/server.nix +++ b/nixos/modules/services/continuous-integration/woodpecker/server.nix @@ -28,7 +28,7 @@ in WOODPECKER_GITEA_URL = "https://git.example.com"; } ''; - description = lib.mdDoc "woodpecker-server config envrionment variables, for other options read the [documentation](https://woodpecker-ci.org/docs/administration/server-config)"; + description = lib.mdDoc "woodpecker-server config environment variables, for other options read the [documentation](https://woodpecker-ci.org/docs/administration/server-config)"; }; environmentFile = lib.mkOption { type = lib.types.nullOr lib.types.path; diff --git a/nixos/modules/services/databases/cockroachdb.nix b/nixos/modules/services/databases/cockroachdb.nix index 26ccb030b3df2..ff77d30588fef 100644 --- a/nixos/modules/services/databases/cockroachdb.nix +++ b/nixos/modules/services/databases/cockroachdb.nix @@ -164,7 +164,7 @@ in example = [ "--advertise-addr" "[fe80::f6f2:::]" ]; description = lib.mdDoc '' Extra CLI arguments passed to {command}`cockroach start`. - For the full list of supported argumemnts, check + For the full list of supported arguments, check ''; }; }; diff --git a/nixos/modules/services/databases/couchdb.nix b/nixos/modules/services/databases/couchdb.nix index cdf32654e6638..0a81a8dceeeed 100644 --- a/nixos/modules/services/databases/couchdb.nix +++ b/nixos/modules/services/databases/couchdb.nix @@ -141,7 +141,7 @@ in { type = types.lines; default = ""; description = lib.mdDoc '' - Extra configuration. Overrides any other cofiguration. + Extra configuration. Overrides any other configuration. ''; }; diff --git a/nixos/modules/services/databases/firebird.nix b/nixos/modules/services/databases/firebird.nix index 4c2855345368b..26ed46f0e60c0 100644 --- a/nixos/modules/services/databases/firebird.nix +++ b/nixos/modules/services/databases/firebird.nix @@ -1,6 +1,6 @@ { config, lib, pkgs, ... }: -# TODO: This may file may need additional review, eg which configuartions to +# TODO: This may file may need additional review, eg which configurations to # expose to the user. # # I only used it to access some simple databases. diff --git a/nixos/modules/services/databases/mongodb.nix b/nixos/modules/services/databases/mongodb.nix index 211133de63fe9..8f3be1492e9e1 100644 --- a/nixos/modules/services/databases/mongodb.nix +++ b/nixos/modules/services/databases/mongodb.nix @@ -142,7 +142,7 @@ in User = cfg.user; PIDFile = cfg.pidFile; Type = "forking"; - TimeoutStartSec=120; # intial creating of journal can take some time + TimeoutStartSec=120; # initial creating of journal can take some time PermissionsStartOnly = true; }; diff --git a/nixos/modules/services/desktops/deepin/dde-api.nix b/nixos/modules/services/desktops/deepin/dde-api.nix index 57b2290dfbc10..472d9860c1089 100644 --- a/nixos/modules/services/desktops/deepin/dde-api.nix +++ b/nixos/modules/services/desktops/deepin/dde-api.nix @@ -16,7 +16,7 @@ with lib; enable = mkEnableOption (lib.mdDoc '' Provides some dbus interfaces that is used for screen zone detecting, - thumbnail generating, and sound playing in Deepin Desktop Enviroment. + thumbnail generating, and sound playing in Deepin Desktop Environment. ''); }; diff --git a/nixos/modules/services/mail/roundcube.nix b/nixos/modules/services/mail/roundcube.nix index b9cf526b0bbe2..22a4e3c451ab1 100644 --- a/nixos/modules/services/mail/roundcube.nix +++ b/nixos/modules/services/mail/roundcube.nix @@ -72,7 +72,7 @@ in type = types.str; description = lib.mdDoc '' Password file for the postgresql connection. - Must be formated according to PostgreSQL .pgpass standard (see https://www.postgresql.org/docs/current/libpq-pgpass.html) + Must be formatted according to PostgreSQL .pgpass standard (see https://www.postgresql.org/docs/current/libpq-pgpass.html) but only one line, no comments and readable by user `nginx`. Ignored if `database.host` is set to `localhost`, as peer authentication will be used. ''; diff --git a/nixos/modules/services/misc/siproxd.nix b/nixos/modules/services/misc/siproxd.nix index 99b25bdb8e9ed..3890962b7cfb6 100644 --- a/nixos/modules/services/misc/siproxd.nix +++ b/nixos/modules/services/misc/siproxd.nix @@ -60,7 +60,7 @@ in default = [ ]; example = [ "192.168.1.0/24" "192.168.2.0/24" ]; description = lib.mdDoc '' - Acess control list for incoming SIP registrations. + Access control list for incoming SIP registrations. ''; }; @@ -69,7 +69,7 @@ in default = [ ]; example = [ "123.45.0.0/16" "123.46.0.0/16" ]; description = lib.mdDoc '' - Acess control list for incoming SIP traffic. + Access control list for incoming SIP traffic. ''; }; @@ -78,7 +78,7 @@ in default = [ ]; example = [ "10.0.0.0/8" "11.0.0.0/8" ]; description = lib.mdDoc '' - Acess control list for denying incoming + Access control list for denying incoming SIP registrations and traffic. ''; }; diff --git a/nixos/modules/services/monitoring/prometheus/default.nix b/nixos/modules/services/monitoring/prometheus/default.nix index fb3bab7963ea8..19ee3ae6f7da8 100644 --- a/nixos/modules/services/monitoring/prometheus/default.nix +++ b/nixos/modules/services/monitoring/prometheus/default.nix @@ -1614,7 +1614,7 @@ in The following property holds: switching to a configuration (`switch-to-configuration`) that changes the prometheus - configuration only finishes successully when prometheus has finished + configuration only finishes successfully when prometheus has finished loading the new configuration. ''; }; diff --git a/nixos/modules/services/monitoring/unpoller.nix b/nixos/modules/services/monitoring/unpoller.nix index f0ced5513d64b..557e2bff4c26b 100644 --- a/nixos/modules/services/monitoring/unpoller.nix +++ b/nixos/modules/services/monitoring/unpoller.nix @@ -47,7 +47,7 @@ in { type = types.bool; default = false; description = lib.mdDoc '' - Whether to disable the prometheus ouput plugin. + Whether to disable the prometheus output plugin. ''; }; http_listen = mkOption { @@ -71,7 +71,7 @@ in { type = types.bool; default = false; description = lib.mdDoc '' - Whether to disable the influxdb ouput plugin. + Whether to disable the influxdb output plugin. ''; }; url = mkOption { diff --git a/nixos/modules/services/networking/headscale.nix b/nixos/modules/services/networking/headscale.nix index d2851e72a0dd6..78253dd9d112e 100644 --- a/nixos/modules/services/networking/headscale.nix +++ b/nixos/modules/services/networking/headscale.nix @@ -393,7 +393,7 @@ in { type = types.nullOr types.path; default = null; description = lib.mdDoc '' - Path to a file containg ACL policies. + Path to a file containing ACL policies. ''; }; }; diff --git a/nixos/modules/services/networking/wgautomesh.nix b/nixos/modules/services/networking/wgautomesh.nix index 93227a9b625d0..7549d82eae0bb 100644 --- a/nixos/modules/services/networking/wgautomesh.nix +++ b/nixos/modules/services/networking/wgautomesh.nix @@ -94,7 +94,7 @@ in address = mkOption { type = types.str; description = mdDoc '' - Wireguard address of this peer (a single IP address, multliple + Wireguard address of this peer (a single IP address, multiple addresses or address ranges are not supported). ''; example = "10.0.0.42"; diff --git a/nixos/modules/services/search/meilisearch.md b/nixos/modules/services/search/meilisearch.md index 98af396117c83..299f56bf82932 100644 --- a/nixos/modules/services/search/meilisearch.md +++ b/nixos/modules/services/search/meilisearch.md @@ -30,7 +30,7 @@ you first need to add documents to an index before you can search for documents. - The default nixos package doesn't come with the [dashboard](https://docs.meilisearch.com/learn/getting_started/quick_start.html#search), since the dashboard features makes some assets downloads at compile time. -- Anonimized Analytics sent to meilisearch are disabled by default. +- Anonymized Analytics sent to meilisearch are disabled by default. - Default deployment is development mode. It doesn't require a secret master key. All routes are not protected and accessible. diff --git a/nixos/modules/services/security/authelia.nix b/nixos/modules/services/security/authelia.nix index 28c5fd0a1df59..cc55260e20f83 100644 --- a/nixos/modules/services/security/authelia.nix +++ b/nixos/modules/services/security/authelia.nix @@ -72,7 +72,7 @@ let type = types.nullOr types.path; default = null; description = mdDoc '' - Path to your JWT secret used during identity verificaiton. + Path to your JWT secret used during identity verificaton. ''; }; diff --git a/nixos/modules/services/security/kanidm.nix b/nixos/modules/services/security/kanidm.nix index 2f19decb5cb17..7ec7a15987353 100644 --- a/nixos/modules/services/security/kanidm.nix +++ b/nixos/modules/services/security/kanidm.nix @@ -10,7 +10,7 @@ let certPaths = builtins.map builtins.dirOf [ cfg.serverSettings.tls_chain cfg.serverSettings.tls_key ]; # Merge bind mount paths and remove paths where a prefix is already mounted. - # This makes sure that if e.g. the tls_chain is in the nix store and /nix/store is alread in the mount + # This makes sure that if e.g. the tls_chain is in the nix store and /nix/store is already in the mount # paths, no new bind mount is added. Adding subpaths caused problems on ofborg. hasPrefixInList = list: newPath: lib.any (path: lib.hasPrefix (builtins.toString path) (builtins.toString newPath)) list; mergePaths = lib.foldl' (merged: newPath: let diff --git a/nixos/modules/services/web-apps/dokuwiki.nix b/nixos/modules/services/web-apps/dokuwiki.nix index 3a66763b583ee..9e685c127da74 100644 --- a/nixos/modules/services/web-apps/dokuwiki.nix +++ b/nixos/modules/services/web-apps/dokuwiki.nix @@ -173,7 +173,7 @@ let } { assertion = config.usersFile != null -> config.mergedConfig.useacl != false; - message = "${showPath [ "settings" "useacl" ]} is required when ${showPath [ "usersFile" ]} is set (Currently defiend as `${config.usersFile}' in ${showFiles options.usersFile.files})."; + message = "${showPath [ "settings" "useacl" ]} is required when ${showPath [ "usersFile" ]} is set (Currently defined as `${config.usersFile}' in ${showFiles options.usersFile.files})."; } ]; }) diff --git a/nixos/modules/services/web-apps/kavita.nix b/nixos/modules/services/web-apps/kavita.nix index e28b204f1bbe7..ca9cd01d403d3 100644 --- a/nixos/modules/services/web-apps/kavita.nix +++ b/nixos/modules/services/web-apps/kavita.nix @@ -35,7 +35,7 @@ in { ipAdresses = lib.mkOption { default = ["0.0.0.0" "::"]; type = lib.types.listOf lib.types.str; - description = lib.mdDoc "IP Adresses to bind to. The default is to bind + description = lib.mdDoc "IP Addresses to bind to. The default is to bind to all IPv4 and IPv6 addresses."; }; }; diff --git a/nixos/modules/services/web-apps/mastodon.nix b/nixos/modules/services/web-apps/mastodon.nix index 247eb707b15c6..2ad6cd6aae194 100644 --- a/nixos/modules/services/web-apps/mastodon.nix +++ b/nixos/modules/services/web-apps/mastodon.nix @@ -508,7 +508,7 @@ in { type = with lib.types; listOf path; default = []; description = lib.mdDoc '' - Extra environment files to pass to all mastodon services. Useful for passing down environemntal secrets. + Extra environment files to pass to all mastodon services. Useful for passing down environmental secrets. ''; example = [ "/etc/mastodon/s3config.env" ]; }; diff --git a/nixos/modules/services/web-apps/monica.nix b/nixos/modules/services/web-apps/monica.nix index 442044fedb14e..2bff42f7ffa4b 100644 --- a/nixos/modules/services/web-apps/monica.nix +++ b/nixos/modules/services/web-apps/monica.nix @@ -367,7 +367,7 @@ in { }; systemd.services.monica-setup = { - description = "Preperation tasks for monica"; + description = "Preparation tasks for monica"; before = ["phpfpm-monica.service"]; after = optional db.createLocally "mysql.service"; wantedBy = ["multi-user.target"]; diff --git a/nixos/modules/services/web-apps/nextcloud-notify_push.nix b/nixos/modules/services/web-apps/nextcloud-notify_push.nix index d6aeee081fc96..759daa0c50dce 100644 --- a/nixos/modules/services/web-apps/nextcloud-notify_push.nix +++ b/nixos/modules/services/web-apps/nextcloud-notify_push.nix @@ -31,7 +31,7 @@ in type = lib.types.bool; default = false; description = lib.mdDoc '' - Wether to add an entry to `/etc/hosts` for the configured nextcloud domain to point to `localhost` and add `localhost `to nextcloud's `trusted_proxies` config option. + Whether to add an entry to `/etc/hosts` for the configured nextcloud domain to point to `localhost` and add `localhost `to nextcloud's `trusted_proxies` config option. This is useful when nextcloud's domain is not a static IP address and when the reverse proxy cannot be bypassed because the backend connection is done via unix socket. ''; diff --git a/nixos/modules/services/web-apps/nextcloud.nix b/nixos/modules/services/web-apps/nextcloud.nix index 01dca43776892..a8142cf42d759 100644 --- a/nixos/modules/services/web-apps/nextcloud.nix +++ b/nixos/modules/services/web-apps/nextcloud.nix @@ -556,7 +556,7 @@ in { default = config.services.nextcloud.notify_push.enable; defaultText = literalExpression "config.services.nextcloud.notify_push.enable"; description = lib.mdDoc '' - Wether to configure nextcloud to use the recommended redis settings for small instances. + Whether to configure nextcloud to use the recommended redis settings for small instances. ::: {.note} The `notify_push` app requires redis to be configured. If this option is turned off, this must be configured manually. diff --git a/nixos/modules/services/web-apps/pixelfed.nix b/nixos/modules/services/web-apps/pixelfed.nix index 817d0f9b60f50..58ac307fd1ed1 100644 --- a/nixos/modules/services/web-apps/pixelfed.nix +++ b/nixos/modules/services/web-apps/pixelfed.nix @@ -237,7 +237,7 @@ in { QUEUE_DRIVER = mkDefault "redis"; SESSION_DRIVER = mkDefault "redis"; WEBSOCKET_REPLICATION_MODE = mkDefault "redis"; - # Suppport phpredis and predis configuration-style. + # Support phpredis and predis configuration-style. REDIS_SCHEME = "unix"; REDIS_HOST = config.services.redis.servers.pixelfed.unixSocket; REDIS_PATH = config.services.redis.servers.pixelfed.unixSocket; diff --git a/nixos/modules/services/web-servers/garage.md b/nixos/modules/services/web-servers/garage.md index b1003e5dae1e1..3a9b85ce06036 100644 --- a/nixos/modules/services/web-servers/garage.md +++ b/nixos/modules/services/web-servers/garage.md @@ -77,7 +77,7 @@ updated to make sure that the on fresh setups. If major-releases will be abandoned by upstream, we should check first if those are needed -in NixOS for a safe upgrade-path before removing those. In that case we shold keep those +in NixOS for a safe upgrade-path before removing those. In that case we should keep those packages, but mark them as insecure in an expression like this (in ``): ``` diff --git a/nixos/modules/services/web-servers/stargazer.nix b/nixos/modules/services/web-servers/stargazer.nix index ddb9e7d8ba1f8..f0c3cf8787ebb 100644 --- a/nixos/modules/services/web-servers/stargazer.nix +++ b/nixos/modules/services/web-servers/stargazer.nix @@ -152,7 +152,7 @@ in Expressed as a list of attribute sets. Each set must have a key `route` that becomes the section name for that route in the stargazer ini cofig. - The remaining keys and vaules become the parameters for that route. + The remaining keys and values become the parameters for that route. [Refer to upstream docs for other params](https://git.sr.ht/~zethra/stargazer/tree/main/item/doc/stargazer.ini.5.txt) ''; diff --git a/nixos/modules/services/x11/window-managers/qtile.nix b/nixos/modules/services/x11/window-managers/qtile.nix index b07fd8a904282..a362d5cdbeee9 100644 --- a/nixos/modules/services/x11/window-managers/qtile.nix +++ b/nixos/modules/services/x11/window-managers/qtile.nix @@ -40,7 +40,7 @@ in description = lib.mdDoc '' Extra Python packages available to Qtile. An example would be to include `python3Packages.qtile-extras` - for additional unoffical widgets. + for additional unofficial widgets. ''; example = literalExpression '' python3Packages: with python3Packages; [ diff --git a/nixos/modules/system/boot/loader/grub/install-grub.pl b/nixos/modules/system/boot/loader/grub/install-grub.pl index cfccb93264bfd..27f03f2fb58c8 100644 --- a/nixos/modules/system/boot/loader/grub/install-grub.pl +++ b/nixos/modules/system/boot/loader/grub/install-grub.pl @@ -213,7 +213,7 @@ sub GrubFs { $search .= $matches[0]; } - # BTRFS is a special case in that we need to fix the referrenced path based on subvolumes + # BTRFS is a special case in that we need to fix the referenced path based on subvolumes if ($fs->type eq 'btrfs') { my ($status, @id_info) = runCommand("@btrfsprogs@/bin/btrfs", "subvol", "show", @{[$fs->mount]}); if ($status != 0) { @@ -586,7 +586,7 @@ sub getEfiTarget { if (($grubTarget eq "") || ($grubTargetEfi eq "")) { die } else { return "both" } } elsif (($grub ne "") && ($grubEfi eq "")) { - # TODO: It would be safer to disallow non-EFI grub installation if no taget is given. + # TODO: It would be safer to disallow non-EFI grub installation if no target is given. # If no target is given, then grub auto-detects the target which can lead to errors. # E.g. it seems as if grub would auto-detect a EFI target based on the availability # of a EFI partition. diff --git a/nixos/modules/system/boot/luksroot.nix b/nixos/modules/system/boot/luksroot.nix index b8f36538e70fe..71036044a2dce 100644 --- a/nixos/modules/system/boot/luksroot.nix +++ b/nixos/modules/system/boot/luksroot.nix @@ -130,7 +130,7 @@ let ''} # Disable all input echo for the whole stage. We could use read -s - # instead but that would ocasionally leak characters between read + # instead but that would occasionally leak characters between read # invocations. stty -echo ''; @@ -861,7 +861,7 @@ in ''; description = lib.mdDoc '' Commands that should be run right before we try to mount our LUKS device. - This can be useful, if the keys needed to open the drive is on another partion. + This can be useful, if the keys needed to open the drive is on another partition. ''; }; diff --git a/nixos/modules/system/boot/stage-1-init.sh b/nixos/modules/system/boot/stage-1-init.sh index 387c27d86ebbe..f72342429a6d9 100644 --- a/nixos/modules/system/boot/stage-1-init.sh +++ b/nixos/modules/system/boot/stage-1-init.sh @@ -445,7 +445,7 @@ lustrateRoot () { mv -v "$d" "$root/old-root.tmp" done - # Use .tmp to make sure subsequent invokations don't clash + # Use .tmp to make sure subsequent invocations don't clash mv -v "$root/old-root.tmp" "$root/old-root" mkdir -m 0755 -p "$root/etc" diff --git a/nixos/modules/tasks/filesystems/bcachefs.nix b/nixos/modules/tasks/filesystems/bcachefs.nix index e3ad52a7b056f..851c09781339e 100644 --- a/nixos/modules/tasks/filesystems/bcachefs.nix +++ b/nixos/modules/tasks/filesystems/bcachefs.nix @@ -16,7 +16,7 @@ let local path="$2" if bcachefs unlock -c $path > /dev/null 2> /dev/null; then # test for encryption prompt $name - until bcachefs unlock $path 2> /dev/null; do # repeat until sucessfully unlocked + until bcachefs unlock $path 2> /dev/null; do # repeat until successfully unlocked printf "unlocking failed!\n" prompt $name done diff --git a/nixos/modules/tasks/filesystems/btrfs.nix b/nixos/modules/tasks/filesystems/btrfs.nix index bd85a1f8d1f3c..82fdd60587106 100644 --- a/nixos/modules/tasks/filesystems/btrfs.nix +++ b/nixos/modules/tasks/filesystems/btrfs.nix @@ -25,7 +25,7 @@ in type = types.listOf types.path; example = [ "/" ]; description = lib.mdDoc '' - List of paths to btrfs filesystems to regularily call {command}`btrfs scrub` on. + List of paths to btrfs filesystems to regularly call {command}`btrfs scrub` on. Defaults to all mount points with btrfs filesystems. If you mount a filesystem multiple times or additionally mount subvolumes, you need to manually specify this list to avoid scrubbing multiple times. diff --git a/nixos/modules/tasks/network-interfaces-scripted.nix b/nixos/modules/tasks/network-interfaces-scripted.nix index f44dafc9706a0..843082ab858e1 100644 --- a/nixos/modules/tasks/network-interfaces-scripted.nix +++ b/nixos/modules/tasks/network-interfaces-scripted.nix @@ -396,7 +396,7 @@ let ''; postStop = '' echo "Cleaning Open vSwitch ${n}" - echo "Shuting down internal ${n} interface" + echo "Shutting down internal ${n} interface" ip link set ${n} down || true echo "Deleting flows for ${n}" ovs-ofctl --protocols=${v.openFlowVersion} del-flows ${n} || true diff --git a/nixos/modules/tasks/network-interfaces-systemd.nix b/nixos/modules/tasks/network-interfaces-systemd.nix index 0fcd3c10219c1..dfa883a2c3360 100644 --- a/nixos/modules/tasks/network-interfaces-systemd.nix +++ b/nixos/modules/tasks/network-interfaces-systemd.nix @@ -437,7 +437,7 @@ in ''; postStop = '' echo "Cleaning Open vSwitch ${n}" - echo "Shuting down internal ${n} interface" + echo "Shutting down internal ${n} interface" ip link set ${n} down || true echo "Deleting flows for ${n}" ovs-ofctl --protocols=${v.openFlowVersion} del-flows ${n} || true diff --git a/nixos/modules/testing/test-instrumentation.nix b/nixos/modules/testing/test-instrumentation.nix index 9c4bbecf48090..67fdc0ea43357 100644 --- a/nixos/modules/testing/test-instrumentation.nix +++ b/nixos/modules/testing/test-instrumentation.nix @@ -43,7 +43,7 @@ in # Passing the terminal device makes bash run non-interactively. # Otherwise we get errors on the terminal because bash tries to # setup things like job control. - # Note: calling bash explicitely here instead of sh makes sure that + # Note: calling bash explicitly here instead of sh makes sure that # we can also run non-NixOS guests during tests. PS1= exec /usr/bin/env bash --norc /dev/hvc0 ''; -- cgit 1.4.1