diff options
author | Philipp Bartsch <phil@grmr.de> | 2020-07-19 14:41:36 +0200 |
---|---|---|
committer | Philipp Bartsch <phil@grmr.de> | 2020-07-19 14:57:39 +0200 |
commit | fe7053f75a912197f312d890740dd3bdde0ed994 (patch) | |
tree | 276d732d677a5a08e44e9e492d34066267ef327e /nixos/modules/services/networking/wg-quick.nix | |
parent | 5e1d1418095bc1faf910914eee81effad070b0bc (diff) | |
download | nixpkgs-fe7053f75a912197f312d890740dd3bdde0ed994.tar nixpkgs-fe7053f75a912197f312d890740dd3bdde0ed994.tar.gz nixpkgs-fe7053f75a912197f312d890740dd3bdde0ed994.tar.bz2 nixpkgs-fe7053f75a912197f312d890740dd3bdde0ed994.tar.lz nixpkgs-fe7053f75a912197f312d890740dd3bdde0ed994.tar.xz nixpkgs-fe7053f75a912197f312d890740dd3bdde0ed994.tar.zst nixpkgs-fe7053f75a912197f312d890740dd3bdde0ed994.zip |
nixos/wireguard: fix typos and unify formatting
Diffstat (limited to 'nixos/modules/services/networking/wg-quick.nix')
-rw-r--r-- | nixos/modules/services/networking/wg-quick.nix | 20 |
1 files changed, 10 insertions, 10 deletions
diff --git a/nixos/modules/services/networking/wg-quick.nix b/nixos/modules/services/networking/wg-quick.nix index ff1bdeed9f4..90c2d3cd35c 100644 --- a/nixos/modules/services/networking/wg-quick.nix +++ b/nixos/modules/services/networking/wg-quick.nix @@ -29,7 +29,7 @@ let type = with types; nullOr str; default = null; description = '' - Base64 private key generated by wg genkey. + Base64 private key generated by <command>wg genkey</command>. Warning: Consider using privateKeyFile instead if you do not want to store the key in the world-readable Nix store. @@ -41,7 +41,7 @@ let type = with types; nullOr str; default = null; description = '' - Private key file as generated by wg genkey. + Private key file as generated by <command>wg genkey</command>. ''; }; @@ -106,9 +106,9 @@ let description = '' The kernel routing table to add this interface's associated routes to. Setting this is useful for e.g. policy routing - ("ip rule") or virtual routing and forwarding ("ip vrf"). Both numeric - table IDs and table names (/etc/rt_tables) can be used. Defaults to - "main". + ("ip rule") or virtual routing and forwarding ("ip vrf"). Both + numeric table IDs and table names (/etc/rt_tables) can be used. + Defaults to "main". ''; }; @@ -139,7 +139,7 @@ let publicKey = mkOption { example = "xTIBA5rboUvnH4htodjb6e697QjLERt1NAB4mZqp8Dg="; type = types.str; - description = "The base64 public key the peer."; + description = "The base64 public key to the peer."; }; presharedKey = mkOption { @@ -147,8 +147,8 @@ let example = "rVXs/Ni9tu3oDBLS4hOyAUAa1qTWVA3loR8eL20os3I="; type = with types; nullOr str; description = '' - Base64 preshared key generated by wg genpsk. Optional, - and may be omitted. This option adds an additional layer of + Base64 preshared key generated by <commmand>wg genpsk</command>. + Optional, and may be omitted. This option adds an additional layer of symmetric-key cryptography to be mixed into the already existing public-key cryptography, for post-quantum resistance. @@ -162,8 +162,8 @@ let example = "/private/wireguard_psk"; type = with types; nullOr str; description = '' - File pointing to preshared key as generated by wg pensk. Optional, - and may be omitted. This option adds an additional layer of + File pointing to preshared key as generated by <command>wg genpsk</command>. + Optional, and may be omitted. This option adds an additional layer of symmetric-key cryptography to be mixed into the already existing public-key cryptography, for post-quantum resistance. ''; |