diff options
author | Maxim Cournoyer <maxim.cournoyer@gmail.com> | 2025-04-12 00:38:56 +0900 |
---|---|---|
committer | Maxim Cournoyer <maxim.cournoyer@gmail.com> | 2025-04-14 10:34:51 +0900 |
commit | f1d1f3c9455eff86bb1fe50ba7da083e167766a1 (patch) | |
tree | 454156582b626c28d25de39f0a0353b087b9f737 | |
parent | d46bad2cd9f1b663c1c3838470392375b8d4ccf0 (diff) | |
download | guix-f1d1f3c9455eff86bb1fe50ba7da083e167766a1.tar.gz guix-f1d1f3c9455eff86bb1fe50ba7da083e167766a1.zip |
services: ngircd: Fix typo in doc.
* gnu/services/messaging.scm (ngircd-options) <pam?>: Fix typo.
* doc/guix.texi (Messaging Services): Update.
Change-Id: If14e406089b2c945cac37e25d8e08a3812e4b28e
-rw-r--r-- | doc/guix.texi | 2 | ||||
-rw-r--r-- | gnu/services/messaging.scm | 2 |
2 files changed, 2 insertions, 2 deletions
diff --git a/doc/guix.texi b/doc/guix.texi index 12792ad2f2..94e57b3d8a 100644 --- a/doc/guix.texi +++ b/doc/guix.texi @@ -30616,7 +30616,7 @@ Set to @code{#t} to enable calls to the PAM library at runtime; all users connecting without password are allowed to connect, all passwords given will fail. Users identified without PAM are registered with a tilde (@samp{~}) prepended to their user name. This defaults to -@code{#f} in Guix because the service runs as a unpriveleged user and +@code{#f} in Guix because the service runs as an unprivileged user and thus cannot authenticate other users via the @code{pam_unix} PAM module. @item @code{pam-is-optional?} (default: @code{#f}) (type: maybe-boolean) diff --git a/gnu/services/messaging.scm b/gnu/services/messaging.scm index a8f85fa9ad..0efda9f052 100644 --- a/gnu/services/messaging.scm +++ b/gnu/services/messaging.scm @@ -1239,7 +1239,7 @@ this if you have ircd-irc2 servers in your IRC network.") connecting without password are allowed to connect, all passwords given will fail. Users identified without PAM are registered with a tilde (@samp{~}) prepended to their user name. This defaults to @code{#f} in Guix because the -service runs as a unpriveleged user and thus cannot authenticate other users +service runs as an unprivileged user and thus cannot authenticate other users via the @code{pam_unix} PAM module.") (pam-is-optional? (maybe-boolean #f) |