zion/modules/hardware-configuration.nix

105 lines
2.8 KiB
Nix
Raw Normal View History

2019-11-08 14:13:50 +01:00
# Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
2020-12-28 18:42:46 +01:00
{ config, lib, pkgs, modulesPath, ... }:
2019-11-08 14:13:50 +01:00
{
2022-12-20 11:54:17 +01:00
imports =
[ (modulesPath + "/installer/scan/not-detected.nix")
];
2019-11-08 14:13:50 +01:00
2022-12-20 11:54:17 +01:00
boot.initrd.availableKernelModules = [ "xhci_pci" ];
2019-11-08 14:13:50 +01:00
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ ];
boot.extraModulePackages = [ ];
2022-12-20 11:54:17 +01:00
fileSystems."/" =
{ device = "/dev/disk/by-uuid/44444444-4444-4444-8888-888888888888";
fsType = "ext4";
};
fileSystems."/boot" =
{ device = "/dev/disk/by-uuid/2178-694E";
fsType = "vfat";
};
fileSystems."/var/lib/matrix-as-facebook" =
{ device = "vault/state_directories/matrix-as-facebook";
2023-01-14 20:00:15 +01:00
fsType = "zfs";
};
fileSystems."/var/lib/matrix-as-signal" =
{ device = "vault/state_directories/matrix-as-signal";
2022-12-20 14:03:09 +01:00
fsType = "zfs";
2022-12-20 11:54:17 +01:00
};
2023-02-20 17:12:58 +01:00
fileSystems."/var/lib/signald" =
{ device = "vault/state_directories/signald";
2022-12-20 11:54:17 +01:00
fsType = "zfs";
};
fileSystems."/var/lib/gitea" =
{ device = "vault/state_directories/gitea";
2023-01-02 14:40:18 +01:00
fsType = "zfs";
};
fileSystems."/var/lib/matrix-as-telegram" =
{ device = "vault/state_directories/matrix-as-telegram";
2022-12-20 11:54:17 +01:00
fsType = "zfs";
};
2023-02-14 19:05:09 +01:00
fileSystems."/vault" =
{ device = "vault";
2023-02-04 21:04:45 +01:00
fsType = "zfs";
2023-01-23 23:47:16 +01:00
};
fileSystems."/var/lib/wallabag" =
{ device = "vault/state_directories/wallabag";
2022-12-20 11:54:17 +01:00
fsType = "zfs";
};
fileSystems."/vault/git" =
{ device = "vault/git";
fsType = "zfs";
2023-02-20 17:12:58 +01:00
};
fileSystems."/vault/backups" =
{ device = "vault/backups";
2023-02-14 19:05:09 +01:00
fsType = "zfs";
};
fileSystems."/vault/radicale" =
{ device = "vault/radicale";
2022-12-20 11:54:17 +01:00
fsType = "zfs";
};
fileSystems."/vault/backups/zion" =
{ device = "vault/backups/zion";
2023-01-23 23:47:16 +01:00
fsType = "zfs";
2023-01-02 14:40:18 +01:00
};
2023-02-20 17:12:58 +01:00
fileSystems."/vault/syncthing" =
{ device = "vault/syncthing";
2022-12-20 11:54:17 +01:00
fsType = "zfs";
};
2023-01-02 13:54:40 +01:00
fileSystems."/vault/backups/monolith" =
{ device = "vault/backups/monolith";
fsType = "zfs";
};
2019-11-08 14:13:50 +01:00
swapDevices = [ ];
2022-12-20 11:54:17 +01:00
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's
# still possible to use this option, but it's recommended to use it in conjunction
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
networking.useDHCP = lib.mkDefault true;
# networking.interfaces.eth0.useDHCP = lib.mkDefault true;
# networking.interfaces.wg0.useDHCP = lib.mkDefault true;
# networking.interfaces.wlan0.useDHCP = lib.mkDefault true;
nixpkgs.hostPlatform = lib.mkDefault "aarch64-linux";
2020-05-10 03:15:42 +02:00
powerManagement.cpuFreqGovernor = lib.mkDefault "ondemand";
2019-11-08 14:13:50 +01:00
}