summary refs log tree commit diff
path: root/nixos/modules/services/networking/wireguard.nix
diff options
context:
space:
mode:
authorPhilipp Bartsch <phil@grmr.de>2020-07-19 14:41:36 +0200
committerPhilipp Bartsch <phil@grmr.de>2020-07-19 14:57:39 +0200
commitfe7053f75a912197f312d890740dd3bdde0ed994 (patch)
tree276d732d677a5a08e44e9e492d34066267ef327e /nixos/modules/services/networking/wireguard.nix
parent5e1d1418095bc1faf910914eee81effad070b0bc (diff)
downloadnixpkgs-fe7053f75a912197f312d890740dd3bdde0ed994.tar
nixpkgs-fe7053f75a912197f312d890740dd3bdde0ed994.tar.gz
nixpkgs-fe7053f75a912197f312d890740dd3bdde0ed994.tar.bz2
nixpkgs-fe7053f75a912197f312d890740dd3bdde0ed994.tar.lz
nixpkgs-fe7053f75a912197f312d890740dd3bdde0ed994.tar.xz
nixpkgs-fe7053f75a912197f312d890740dd3bdde0ed994.tar.zst
nixpkgs-fe7053f75a912197f312d890740dd3bdde0ed994.zip
nixos/wireguard: fix typos and unify formatting
Diffstat (limited to 'nixos/modules/services/networking/wireguard.nix')
-rw-r--r--nixos/modules/services/networking/wireguard.nix15
1 files changed, 8 insertions, 7 deletions
diff --git a/nixos/modules/services/networking/wireguard.nix b/nixos/modules/services/networking/wireguard.nix
index e8f83f6dd8b..e07020349cf 100644
--- a/nixos/modules/services/networking/wireguard.nix
+++ b/nixos/modules/services/networking/wireguard.nix
@@ -91,11 +91,13 @@ let
       table = mkOption {
         default = "main";
         type = types.str;
-        description = ''The kernel routing table to add this interface's
-        associated routes to. Setting this is useful for e.g. policy routing
-        ("ip rule") or virtual routing and forwarding ("ip vrf"). Both numeric
-        table IDs and table names (/etc/rt_tables) can be used. Defaults to
-        "main".'';
+        description = ''
+          The kernel routing table to add this interface's
+          associated routes to. Setting this is useful for e.g. policy routing
+          ("ip rule") or virtual routing and forwarding ("ip vrf"). Both
+          numeric table IDs and table names (/etc/rt_tables) can be used.
+          Defaults to "main".
+        '';
       };
 
       peers = mkOption {
@@ -174,7 +176,7 @@ let
         example = "/private/wireguard_psk";
         type = with types; nullOr str;
         description = ''
-          File pointing to preshared key as generated by <command>wg pensk</command>.
+          File pointing to preshared key as generated by <command>wg genpsk</command>.
           Optional, and may be omitted. This option adds an additional layer of
           symmetric-key cryptography to be mixed into the already existing
           public-key cryptography, for post-quantum resistance.
@@ -217,7 +219,6 @@ let
 
   };
 
-
   generatePathUnit = name: values:
     assert (values.privateKey == null);
     assert (values.privateKeyFile != null);