diff --git a/nixos/modules/hardware/sensor/hddtemp.nix b/nixos/modules/hardware/sensor/hddtemp.nix index 8a8a3ad838c3..4c89eac56ddf 100644 --- a/nixos/modules/hardware/sensor/hddtemp.nix +++ b/nixos/modules/hardware/sensor/hddtemp.nix @@ -75,6 +75,7 @@ in config = mkIf cfg.enable { systemd.services.hddtemp = { description = "HDD/SSD temperature"; + documentation = [ "man:hddtemp(8)" ]; wantedBy = [ "multi-user.target" ]; serviceConfig = { Type = "forking"; diff --git a/nixos/modules/security/auditd.nix b/nixos/modules/security/auditd.nix index e9ffecdfbea5..a281c96165fc 100644 --- a/nixos/modules/security/auditd.nix +++ b/nixos/modules/security/auditd.nix @@ -15,6 +15,7 @@ systemd.services.auditd = { description = "Linux Audit daemon"; + documentation = [ "man:auditd(8)" ]; wantedBy = [ "sysinit.target" ]; after = [ "local-fs.target" diff --git a/nixos/modules/security/isolate.nix b/nixos/modules/security/isolate.nix index 74274d04c6b8..c2df90e426a6 100644 --- a/nixos/modules/security/isolate.nix +++ b/nixos/modules/security/isolate.nix @@ -128,6 +128,7 @@ in systemd.services.isolate = { description = "Isolate control group hierarchy daemon"; wantedBy = [ "multi-user.target" ]; + documentation = [ "man:isolate(1)" ]; serviceConfig = { Type = "notify"; ExecStart = "${isolate}/bin/isolate-cg-keeper"; diff --git a/nixos/modules/services/computing/torque/server.nix b/nixos/modules/services/computing/torque/server.nix index 81d09a055a43..42fd824376af 100644 --- a/nixos/modules/services/computing/torque/server.nix +++ b/nixos/modules/services/computing/torque/server.nix @@ -70,6 +70,7 @@ in }; systemd.services.torque-server = { + documentation = [ "man:pbs_server(8)" ]; path = [ torque ]; wantedBy = [ "multi-user.target" ]; @@ -93,6 +94,7 @@ in }; systemd.services.torque-scheduler = { + documentation = [ "man:pbs_sched(8)" ]; path = [ torque ]; requires = [ "torque-server-init.service" ]; diff --git a/nixos/modules/services/finance/libeufin/nexus.nix b/nixos/modules/services/finance/libeufin/nexus.nix index 19f877ba6b1b..badb0b3f617e 100644 --- a/nixos/modules/services/finance/libeufin/nexus.nix +++ b/nixos/modules/services/finance/libeufin/nexus.nix @@ -127,5 +127,7 @@ services.libeufin.nexus.settings.libeufin-nexusdb-postgres.CONFIG = lib.mkIf ( cfgMain.bank.enable && cfgMain.bank.createLocalDatabase ) "postgresql:///libeufin-bank"; + + systemd.services.libeufin-nexus.documentation = [ "man:libeufin-nexus(1)" ]; }; } diff --git a/nixos/modules/services/finance/taler/common.nix b/nixos/modules/services/finance/taler/common.nix index 426647f8f476..c6ade43084fd 100644 --- a/nixos/modules/services/finance/taler/common.nix +++ b/nixos/modules/services/finance/taler/common.nix @@ -68,11 +68,19 @@ in requires = [ "taler-${talerComponent}-dbinit.service" ]; after = [ "taler-${talerComponent}-dbinit.service" ]; wantedBy = [ "multi-user.target" ]; # TODO slice? + documentation = [ + "man:taler-${talerComponent}-${name}(1)" + "info:taler-${talerComponent}" + ]; })) # Database Initialisation { "taler-${talerComponent}-dbinit" = { path = [ config.services.postgresql.package ]; + documentation = [ + "man:taler-${talerComponent}-dbinit(1)" + "info:taler-${talerComponent}" + ]; serviceConfig = { Type = "oneshot"; DynamicUser = true; diff --git a/nixos/modules/services/hardware/thermald.nix b/nixos/modules/services/hardware/thermald.nix index 9df57e8650e1..018340c322f2 100644 --- a/nixos/modules/services/hardware/thermald.nix +++ b/nixos/modules/services/hardware/thermald.nix @@ -49,6 +49,7 @@ in systemd.services.thermald = { description = "Thermal Daemon Service"; + documentation = [ "man:thermald(8)" ]; wantedBy = [ "multi-user.target" ]; serviceConfig = { PrivateNetwork = true; diff --git a/nixos/modules/services/hardware/triggerhappy.nix b/nixos/modules/services/hardware/triggerhappy.nix index a9bcf250cf69..5e66afea9ea6 100644 --- a/nixos/modules/services/hardware/triggerhappy.nix +++ b/nixos/modules/services/hardware/triggerhappy.nix @@ -122,6 +122,7 @@ in systemd.services.triggerhappy = { wantedBy = [ "multi-user.target" ]; description = "Global hotkey daemon"; + documentation = [ "man:thd(1)" ]; serviceConfig = { ExecStart = "${pkgs.triggerhappy}/bin/thd ${ lib.optionalString (cfg.user != "root") "--user ${cfg.user}" diff --git a/nixos/modules/services/mail/postfix.nix b/nixos/modules/services/mail/postfix.nix index 826c1e0a463f..34c236dcd2a6 100644 --- a/nixos/modules/services/mail/postfix.nix +++ b/nixos/modules/services/mail/postfix.nix @@ -871,6 +871,7 @@ in systemd.services.postfix = { description = "Postfix mail server"; + documentation = [ "man:postfix(1)" ]; wantedBy = [ "multi-user.target" ]; after = [ "network.target" diff --git a/nixos/modules/services/monitoring/glances.nix b/nixos/modules/services/monitoring/glances.nix index 76f3a8f34e78..1b6b727fec21 100644 --- a/nixos/modules/services/monitoring/glances.nix +++ b/nixos/modules/services/monitoring/glances.nix @@ -68,6 +68,7 @@ in systemd.services."glances" = { description = "Glances"; + documentation = [ "man:glances(1)" ]; after = [ "network.target" ]; wantedBy = [ "multi-user.target" ]; diff --git a/nixos/modules/services/network-filesystems/tahoe.nix b/nixos/modules/services/network-filesystems/tahoe.nix index 9b99f4ce5a44..1176fb3131fc 100644 --- a/nixos/modules/services/network-filesystems/tahoe.nix +++ b/nixos/modules/services/network-filesystems/tahoe.nix @@ -218,6 +218,7 @@ in in lib.nameValuePair "tahoe.introducer-${node}" { description = "Tahoe LAFS node ${node}"; + documentation = [ "info:tahoe-lafs" ]; wantedBy = [ "multi-user.target" ]; path = [ settings.package ]; restartTriggers = [ @@ -329,6 +330,7 @@ in in lib.nameValuePair "tahoe.${node}" { description = "Tahoe LAFS node ${node}"; + documentation = [ "info:tahoe-lafs" ]; wantedBy = [ "multi-user.target" ]; path = [ settings.package ]; restartTriggers = [ diff --git a/nixos/modules/services/networking/avahi-daemon.nix b/nixos/modules/services/networking/avahi-daemon.nix index f266e623dc84..0ca315fecf13 100644 --- a/nixos/modules/services/networking/avahi-daemon.nix +++ b/nixos/modules/services/networking/avahi-daemon.nix @@ -305,6 +305,12 @@ in description = "Avahi mDNS/DNS-SD Stack"; wantedBy = [ "multi-user.target" ]; requires = [ "avahi-daemon.socket" ]; + documentation = [ + "man:avahi-daemon(8)" + "man:avahi-daemon.conf(5)" + "man:avahi.hosts(5)" + "man:avahi.service(5)" + ]; # Make NSS modules visible so that `avahi_nss_support ()' can # return a sensible value. diff --git a/nixos/modules/services/networking/dhcpcd.nix b/nixos/modules/services/networking/dhcpcd.nix index ed4a0951f704..b34b33ab3a5e 100644 --- a/nixos/modules/services/networking/dhcpcd.nix +++ b/nixos/modules/services/networking/dhcpcd.nix @@ -209,6 +209,8 @@ in in { description = "DHCP Client"; + documentation = [ "man:dhcpcd(8)" ]; + wantedBy = [ "multi-user.target" ] ++ lib.optional (!hasDefaultGatewaySet) "network-online.target"; wants = [ "network.target" "resolvconf.service" ]; after = [ "resolvconf.service" ]; diff --git a/nixos/modules/services/networking/gnunet.nix b/nixos/modules/services/networking/gnunet.nix index a00c0e8e923d..9a4e17bd09e7 100644 --- a/nixos/modules/services/networking/gnunet.nix +++ b/nixos/modules/services/networking/gnunet.nix @@ -149,6 +149,7 @@ in systemd.services.gnunet = { description = "GNUnet"; + documentation = [ "info:gnunet" ]; after = [ "network.target" ]; wantedBy = [ "multi-user.target" ]; restartTriggers = [ config.environment.etc."gnunet.conf".source ]; diff --git a/nixos/modules/services/networking/gvpe.nix b/nixos/modules/services/networking/gvpe.nix index dc948d50788d..44a6039d17f1 100644 --- a/nixos/modules/services/networking/gvpe.nix +++ b/nixos/modules/services/networking/gvpe.nix @@ -114,6 +114,10 @@ in config = mkIf cfg.enable { systemd.services.gvpe = { description = "GNU Virtual Private Ethernet node"; + documentation = [ + "info:gvpe" + "man:gvpe(8)" + ]; after = [ "network.target" ]; wantedBy = [ "multi-user.target" ]; diff --git a/nixos/modules/services/networking/privoxy.nix b/nixos/modules/services/networking/privoxy.nix index c57c8377bdac..c664ac341fc1 100644 --- a/nixos/modules/services/networking/privoxy.nix +++ b/nixos/modules/services/networking/privoxy.nix @@ -229,6 +229,7 @@ in systemd.services.privoxy = { description = "Filtering web proxy"; + documentation = [ "man:privoxy(8)" ]; after = [ "network.target" "nss-lookup.target" diff --git a/nixos/modules/services/networking/soju.nix b/nixos/modules/services/networking/soju.nix index c5711c06d68b..b3975e387dd8 100644 --- a/nixos/modules/services/networking/soju.nix +++ b/nixos/modules/services/networking/soju.nix @@ -142,6 +142,7 @@ in wantedBy = [ "multi-user.target" ]; wants = [ "network-online.target" ]; after = [ "network-online.target" ]; + documentation = [ "man:soju(1)" ]; serviceConfig = { DynamicUser = true; Restart = "always"; diff --git a/nixos/modules/services/networking/tinc.nix b/nixos/modules/services/networking/tinc.nix index 5f625c10840b..2a53d99f7c59 100644 --- a/nixos/modules/services/networking/tinc.nix +++ b/nixos/modules/services/networking/tinc.nix @@ -366,6 +366,10 @@ in ("tinc.${network}") (let version = getVersion data.package; in { description = "Tinc Daemon - ${network}"; + documentation = [ + "info:tinc" + "man:tincd(8)" + ]; wantedBy = [ "multi-user.target" ]; path = [ data.package ]; reloadTriggers = mkIf (versionAtLeast version "1.1pre") [ (builtins.toJSON etcConfig) ]; diff --git a/nixos/modules/services/scheduling/atd.nix b/nixos/modules/services/scheduling/atd.nix index a135edf0c022..31f76dce620f 100644 --- a/nixos/modules/services/scheduling/atd.nix +++ b/nixos/modules/services/scheduling/atd.nix @@ -82,6 +82,7 @@ in systemd.services.atd = { description = "Job Execution Daemon (atd)"; + documentation = [ "man:atd(8)" ]; wantedBy = [ "multi-user.target" ]; path = [ at ]; diff --git a/nixos/modules/services/security/clamav.nix b/nixos/modules/services/security/clamav.nix index d6df560c9974..0c736c1e2275 100644 --- a/nixos/modules/services/security/clamav.nix +++ b/nixos/modules/services/security/clamav.nix @@ -169,6 +169,7 @@ in systemd.services.clamav-daemon = lib.mkIf cfg.daemon.enable { description = "ClamAV daemon (clamd)"; + documentation = [ "man:clamd(8)" ]; after = lib.optionals cfg.updater.enable [ "clamav-freshclam.service" ]; wants = lib.optionals cfg.updater.enable [ "clamav-freshclam.service" ]; wantedBy = [ "multi-user.target" ]; @@ -199,6 +200,7 @@ in systemd.services.clamav-freshclam = lib.mkIf cfg.updater.enable { description = "ClamAV virus database updater (freshclam)"; + documentation = [ "man:freshclam(1)" ]; restartTriggers = [ freshclamConfigFile ]; requires = [ "network-online.target" ]; after = [ "network-online.target" ]; @@ -276,6 +278,7 @@ in systemd.services.clamdscan = lib.mkIf cfg.scanner.enable { description = "ClamAV virus scanner"; + documentation = [ "man:clamdscan(1)" ]; after = lib.optionals cfg.updater.enable [ "clamav-freshclam.service" ]; wants = lib.optionals cfg.updater.enable [ "clamav-freshclam.service" ]; diff --git a/nixos/modules/services/security/endlessh.nix b/nixos/modules/services/security/endlessh.nix index cd5b9c5c8254..344e357e9341 100644 --- a/nixos/modules/services/security/endlessh.nix +++ b/nixos/modules/services/security/endlessh.nix @@ -48,6 +48,7 @@ in config = lib.mkIf cfg.enable { systemd.services.endlessh = { description = "SSH tarpit"; + documentation = [ "man:endlessh(1)" ]; requires = [ "network.target" ]; wantedBy = [ "multi-user.target" ]; serviceConfig = diff --git a/nixos/modules/services/security/munge.nix b/nixos/modules/services/security/munge.nix index 00fb0a1e1ac3..34ac25b479db 100644 --- a/nixos/modules/services/security/munge.nix +++ b/nixos/modules/services/security/munge.nix @@ -46,6 +46,10 @@ in users.groups.munge = { }; systemd.services.munged = { + documentation = [ + "man:munged(8)" + "man:mungekey(8)" + ]; wantedBy = [ "multi-user.target" ]; wants = [ "network-online.target" diff --git a/nixos/modules/services/security/physlock.nix b/nixos/modules/services/security/physlock.nix index 32167b624f7f..a5674f75f1bf 100644 --- a/nixos/modules/services/security/physlock.nix +++ b/nixos/modules/services/security/physlock.nix @@ -116,6 +116,7 @@ in systemd.services.physlock = { enable = true; + documentation = [ "man:physlock(1)" ]; description = "Physlock"; wantedBy = lib.optional cfg.lockOn.suspend "suspend.target" diff --git a/nixos/modules/services/security/sks.nix b/nixos/modules/services/security/sks.nix index db38ca425210..fbe1a7b86f91 100644 --- a/nixos/modules/services/security/sks.nix +++ b/nixos/modules/services/security/sks.nix @@ -119,6 +119,7 @@ in { sks-db = { description = "SKS database server"; + documentation = [ "man:sks(8)" ]; after = [ "network.target" ]; wantedBy = [ "multi-user.target" ]; preStart = '' diff --git a/nixos/modules/services/security/tor.nix b/nixos/modules/services/security/tor.nix index 7002aa9dabb6..960d4b647b8b 100644 --- a/nixos/modules/services/security/tor.nix +++ b/nixos/modules/services/security/tor.nix @@ -1324,6 +1324,7 @@ in systemd.services.tor = { description = "Tor Daemon"; + documentation = [ "man:tor(8)" ]; path = [ pkgs.tor ]; wantedBy = [ "multi-user.target" ]; diff --git a/nixos/modules/services/web-apps/hledger-web.nix b/nixos/modules/services/web-apps/hledger-web.nix index bf7c525ba799..a7a2cf9192ba 100644 --- a/nixos/modules/services/web-apps/hledger-web.nix +++ b/nixos/modules/services/web-apps/hledger-web.nix @@ -128,7 +128,11 @@ in in { description = "hledger-web - web-app for the hledger accounting tool."; - documentation = [ "https://hledger.org/hledger-web.html" ]; + documentation = [ + "info:hledger-web" + "man:hledger-web(1)" + "https://hledger.org/hledger-web.html" + ]; wantedBy = [ "multi-user.target" ]; after = [ "networking.target" ]; serviceConfig = mkMerge [ diff --git a/nixos/modules/services/web-servers/phpfpm/default.nix b/nixos/modules/services/web-servers/phpfpm/default.nix index 2312fab2702b..83489e54adb2 100644 --- a/nixos/modules/services/web-servers/phpfpm/default.nix +++ b/nixos/modules/services/web-servers/phpfpm/default.nix @@ -254,6 +254,7 @@ in { after = [ "network.target" ]; wantedBy = [ "phpfpm.target" ]; partOf = [ "phpfpm.target" ]; + documentation = [ "man:php-fpm(8)" ]; serviceConfig = let cfgFile = fpmCfgFile pool poolOpts; iniFile = phpIni poolOpts; diff --git a/nixos/modules/tasks/filesystems/btrfs.nix b/nixos/modules/tasks/filesystems/btrfs.nix index f4b7455822f0..738fa0851006 100644 --- a/nixos/modules/tasks/filesystems/btrfs.nix +++ b/nixos/modules/tasks/filesystems/btrfs.nix @@ -166,6 +166,7 @@ in in nameValuePair "btrfs-scrub-${fs'}" { description = "btrfs scrub on ${fs}"; + documentation = [ "man:btrfs-scrub(8)" ]; # scrub prevents suspend2ram or proper shutdown conflicts = [ "shutdown.target" diff --git a/nixos/modules/tasks/powertop.nix b/nixos/modules/tasks/powertop.nix index a5d306e8e0bb..c8a41471217d 100644 --- a/nixos/modules/tasks/powertop.nix +++ b/nixos/modules/tasks/powertop.nix @@ -51,6 +51,7 @@ in config = mkIf (cfg.enable) { systemd.services = { powertop = { + documentation = [ "man:powertop(8)" ]; wantedBy = [ "multi-user.target" ]; after = [ "multi-user.target" ]; description = "Powertop tunings";