summary refs log tree commit diff
path: root/nixos/modules/system/boot/luksroot.nix
diff options
context:
space:
mode:
authorPeter Simons <simons@cryp.to>2014-12-15 16:30:21 +0100
committerPeter Simons <simons@cryp.to>2014-12-15 16:31:18 +0100
commit0f2b026bfe137b40b192ad4361f0ba4b8ff4017e (patch)
treeafd4ca5e2eb3495cfab62920ef03cb895542339c /nixos/modules/system/boot/luksroot.nix
parent137ffc99292cd7dad0d192f1e088685beea1662c (diff)
downloadnixpkgs-0f2b026bfe137b40b192ad4361f0ba4b8ff4017e.tar
nixpkgs-0f2b026bfe137b40b192ad4361f0ba4b8ff4017e.tar.gz
nixpkgs-0f2b026bfe137b40b192ad4361f0ba4b8ff4017e.tar.bz2
nixpkgs-0f2b026bfe137b40b192ad4361f0ba4b8ff4017e.tar.lz
nixpkgs-0f2b026bfe137b40b192ad4361f0ba4b8ff4017e.tar.xz
nixpkgs-0f2b026bfe137b40b192ad4361f0ba4b8ff4017e.tar.zst
nixpkgs-0f2b026bfe137b40b192ad4361f0ba4b8ff4017e.zip
nixos/modules/system/boot/luksroot.nix: hyperlinkify an URL in the documentation
Diffstat (limited to 'nixos/modules/system/boot/luksroot.nix')
-rw-r--r--nixos/modules/system/boot/luksroot.nix2
1 files changed, 1 insertions, 1 deletions
diff --git a/nixos/modules/system/boot/luksroot.nix b/nixos/modules/system/boot/luksroot.nix
index 70ff1d588a3..e1e472186e3 100644
--- a/nixos/modules/system/boot/luksroot.nix
+++ b/nixos/modules/system/boot/luksroot.nix
@@ -203,7 +203,7 @@ in
       description = ''
         Unless enabled, encryption keys can be easily recovered by an attacker with physical
         access to any machine with PCMCIA, ExpressCard, ThunderBolt or FireWire port.
-        More information: http://en.wikipedia.org/wiki/DMA_attack
+        More information is available at <link xlink:href="http://en.wikipedia.org/wiki/DMA_attack"/>.
 
         This option blacklists FireWire drivers, but doesn't remove them. You can manually
         load the drivers if you need to use a FireWire device, but don't forget to unload them!