diff options
Diffstat (limited to 'nixpkgs/nixos/modules/services/networking/microsocks.nix')
-rw-r--r-- | nixpkgs/nixos/modules/services/networking/microsocks.nix | 22 |
1 files changed, 11 insertions, 11 deletions
diff --git a/nixpkgs/nixos/modules/services/networking/microsocks.nix b/nixpkgs/nixos/modules/services/networking/microsocks.nix index be79a8495636..09afaf6edf03 100644 --- a/nixpkgs/nixos/modules/services/networking/microsocks.nix +++ b/nixpkgs/nixos/modules/services/networking/microsocks.nix @@ -19,22 +19,22 @@ let ++ lib.optionals (cfg.authUsername != null) [ "-u" cfg.authUsername ]; in { options.services.microsocks = { - enable = lib.mkEnableOption (lib.mdDoc "Tiny, portable SOCKS5 server with very moderate resource usage"); + enable = lib.mkEnableOption "Tiny, portable SOCKS5 server with very moderate resource usage"; user = lib.mkOption { default = "microsocks"; - description = lib.mdDoc "User microsocks runs as."; + description = "User microsocks runs as."; type = lib.types.str; }; group = lib.mkOption { default = "microsocks"; - description = lib.mdDoc "Group microsocks runs as."; + description = "Group microsocks runs as."; type = lib.types.str; }; package = lib.mkPackageOption pkgs "microsocks" {}; ip = lib.mkOption { type = lib.types.str; default = "127.0.0.1"; - description = lib.mdDoc '' + description = '' IP on which microsocks should listen. Defaults to 127.0.0.1 for security reasons. ''; @@ -42,17 +42,17 @@ in { port = lib.mkOption { type = lib.types.port; default = 1080; - description = lib.mdDoc "Port on which microsocks should listen."; + description = "Port on which microsocks should listen."; }; disableLogging = lib.mkOption { type = lib.types.bool; default = false; - description = lib.mdDoc "If true, microsocks will not log any messages to stdout/stderr."; + description = "If true, microsocks will not log any messages to stdout/stderr."; }; authOnce = lib.mkOption { type = lib.types.bool; default = false; - description = lib.mdDoc '' + description = '' If true, once a specific ip address authed successfully with user/pass, it is added to a whitelist and may use the proxy without auth. ''; @@ -60,19 +60,19 @@ in { outgoingBindIp = lib.mkOption { type = lib.types.nullOr lib.types.str; default = null; - description = lib.mdDoc "Specifies which ip outgoing connections are bound to"; + description = "Specifies which ip outgoing connections are bound to"; }; authUsername = lib.mkOption { type = lib.types.nullOr lib.types.str; default = null; example = "alice"; - description = lib.mdDoc "Optional username to use for authentication."; + description = "Optional username to use for authentication."; }; authPasswordFile = lib.mkOption { type = lib.types.nullOr lib.types.path; default = null; example = "/run/secrets/microsocks-password"; - description = lib.mdDoc "Path to a file containing the password for authentication."; + description = "Path to a file containing the password for authentication."; }; execWrapper = lib.mkOption { type = lib.types.nullOr lib.types.str; @@ -80,7 +80,7 @@ in { example = '' ''${pkgs.mullvad-vpn}/bin/mullvad-exclude ''; - description = lib.mdDoc '' + description = '' An optional command to prepend to the microsocks command (such as proxychains, or a VPN exclude command). ''; }; |