summary refs log tree commit diff
path: root/nixos/modules/services/networking/wg-quick.nix
diff options
context:
space:
mode:
authorPhilipp Bartsch <phil@grmr.de>2020-07-19 14:41:36 +0200
committerPhilipp Bartsch <phil@grmr.de>2020-07-19 14:57:39 +0200
commitfe7053f75a912197f312d890740dd3bdde0ed994 (patch)
tree276d732d677a5a08e44e9e492d34066267ef327e /nixos/modules/services/networking/wg-quick.nix
parent5e1d1418095bc1faf910914eee81effad070b0bc (diff)
downloadnixpkgs-fe7053f75a912197f312d890740dd3bdde0ed994.tar
nixpkgs-fe7053f75a912197f312d890740dd3bdde0ed994.tar.gz
nixpkgs-fe7053f75a912197f312d890740dd3bdde0ed994.tar.bz2
nixpkgs-fe7053f75a912197f312d890740dd3bdde0ed994.tar.lz
nixpkgs-fe7053f75a912197f312d890740dd3bdde0ed994.tar.xz
nixpkgs-fe7053f75a912197f312d890740dd3bdde0ed994.tar.zst
nixpkgs-fe7053f75a912197f312d890740dd3bdde0ed994.zip
nixos/wireguard: fix typos and unify formatting
Diffstat (limited to 'nixos/modules/services/networking/wg-quick.nix')
-rw-r--r--nixos/modules/services/networking/wg-quick.nix20
1 files changed, 10 insertions, 10 deletions
diff --git a/nixos/modules/services/networking/wg-quick.nix b/nixos/modules/services/networking/wg-quick.nix
index ff1bdeed9f4..90c2d3cd35c 100644
--- a/nixos/modules/services/networking/wg-quick.nix
+++ b/nixos/modules/services/networking/wg-quick.nix
@@ -29,7 +29,7 @@ let
         type = with types; nullOr str;
         default = null;
         description = ''
-          Base64 private key generated by wg genkey.
+          Base64 private key generated by <command>wg genkey</command>.
 
           Warning: Consider using privateKeyFile instead if you do not
           want to store the key in the world-readable Nix store.
@@ -41,7 +41,7 @@ let
         type = with types; nullOr str;
         default = null;
         description = ''
-          Private key file as generated by wg genkey.
+          Private key file as generated by <command>wg genkey</command>.
         '';
       };
 
@@ -106,9 +106,9 @@ let
         description = ''
           The kernel routing table to add this interface's
           associated routes to. Setting this is useful for e.g. policy routing
-          ("ip rule") or virtual routing and forwarding ("ip vrf"). Both numeric
-          table IDs and table names (/etc/rt_tables) can be used. Defaults to
-          "main".
+          ("ip rule") or virtual routing and forwarding ("ip vrf"). Both
+          numeric table IDs and table names (/etc/rt_tables) can be used.
+          Defaults to "main".
         '';
       };
 
@@ -139,7 +139,7 @@ let
       publicKey = mkOption {
         example = "xTIBA5rboUvnH4htodjb6e697QjLERt1NAB4mZqp8Dg=";
         type = types.str;
-        description = "The base64 public key the peer.";
+        description = "The base64 public key to the peer.";
       };
 
       presharedKey = mkOption {
@@ -147,8 +147,8 @@ let
         example = "rVXs/Ni9tu3oDBLS4hOyAUAa1qTWVA3loR8eL20os3I=";
         type = with types; nullOr str;
         description = ''
-          Base64 preshared key generated by wg genpsk. Optional,
-          and may be omitted. This option adds an additional layer of
+          Base64 preshared key generated by <commmand>wg genpsk</command>.
+          Optional, and may be omitted. This option adds an additional layer of
           symmetric-key cryptography to be mixed into the already existing
           public-key cryptography, for post-quantum resistance.
 
@@ -162,8 +162,8 @@ let
         example = "/private/wireguard_psk";
         type = with types; nullOr str;
         description = ''
-          File pointing to preshared key as generated by wg pensk. Optional,
-          and may be omitted. This option adds an additional layer of
+          File pointing to preshared key as generated by <command>wg genpsk</command>.
+          Optional, and may be omitted. This option adds an additional layer of
           symmetric-key cryptography to be mixed into the already existing
           public-key cryptography, for post-quantum resistance.
         '';