about summary refs log tree commit diff
path: root/nixos
diff options
context:
space:
mode:
authorFlorian Klink <flokli@flokli.de>2019-12-20 02:15:45 +0100
committerGitHub <noreply@github.com>2019-12-20 02:15:45 +0100
commite46abc6b8dd0779d566e6d80f9421c0df6a9f331 (patch)
tree7c84d35207c2229f306d4308923a78cec5002ceb /nixos
parenta85c8d87c2f4e5ec5455a38a66a1f6230b452c87 (diff)
parentb6f87c688b224c1d79bd7e8b8d2bdbeda3e20c76 (diff)
downloadnixlib-e46abc6b8dd0779d566e6d80f9421c0df6a9f331.tar
nixlib-e46abc6b8dd0779d566e6d80f9421c0df6a9f331.tar.gz
nixlib-e46abc6b8dd0779d566e6d80f9421c0df6a9f331.tar.bz2
nixlib-e46abc6b8dd0779d566e6d80f9421c0df6a9f331.tar.lz
nixlib-e46abc6b8dd0779d566e6d80f9421c0df6a9f331.tar.xz
nixlib-e46abc6b8dd0779d566e6d80f9421c0df6a9f331.tar.zst
nixlib-e46abc6b8dd0779d566e6d80f9421c0df6a9f331.zip
Merge pull request #76069 from misuzu/package-3proxy
nixos/3proxy: manual validation fix
Diffstat (limited to 'nixos')
-rw-r--r--nixos/modules/services/networking/3proxy.nix13
1 files changed, 7 insertions, 6 deletions
diff --git a/nixos/modules/services/networking/3proxy.nix b/nixos/modules/services/networking/3proxy.nix
index d922e2f41c6a..26aa16679467 100644
--- a/nixos/modules/services/networking/3proxy.nix
+++ b/nixos/modules/services/networking/3proxy.nix
@@ -23,17 +23,17 @@ in {
 
         Example users file with plain-text passwords:
 
-        <para>
+        <literal>
           test1:CL:password1
           test2:CL:password2
-        </para>
+        </literal>
 
         Example users file with md5-crypted passwords:
 
-        <para>
+        <literal>
           test1:CR:$1$tFkisVd2$1GA8JXkRmTXdLDytM/i3a1
           test2:CR:$1$rkpibm5J$Aq1.9VtYAn0JrqZ8M.1ME.
-        </para>
+        </literal>
 
         You can generate md5-crypted passwords via https://unix4lyfe.org/crypt/
         Note that htpasswd tool generates incompatible md5-crypted passwords.
@@ -129,7 +129,8 @@ in {
               </itemizedlist>
 
               Double authentication is possible, e.g.
-              <para>
+
+              <literal>
                 {
                   auth = [ "iponly" "strong" ];
                   acl = [
@@ -143,7 +144,7 @@ in {
                     }
                   ];
                 }
-              </para>
+              </literal>
               In this example strong username authentication is not required to access 192.168.0.0/16.
             '';
           };