2019-11-08 14:13:50 +01:00
|
|
|
|
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
|
|
|
|
# and may be overwritten by future invocations. Please make changes
|
|
|
|
|
# to /etc/nixos/configuration.nix instead.
|
2020-12-28 18:42:46 +01:00
|
|
|
|
{ config, lib, pkgs, modulesPath, ... }:
|
2019-11-08 14:13:50 +01:00
|
|
|
|
|
|
|
|
|
{
|
2023-04-18 21:32:08 +02:00
|
|
|
|
imports =
|
|
|
|
|
[ (modulesPath + "/installer/scan/not-detected.nix")
|
|
|
|
|
];
|
2019-11-08 14:13:50 +01:00
|
|
|
|
|
2022-12-20 11:54:17 +01:00
|
|
|
|
boot.initrd.availableKernelModules = [ "xhci_pci" ];
|
2019-11-08 14:13:50 +01:00
|
|
|
|
boot.initrd.kernelModules = [ ];
|
|
|
|
|
boot.kernelModules = [ ];
|
|
|
|
|
boot.extraModulePackages = [ ];
|
|
|
|
|
|
2023-04-18 21:32:08 +02:00
|
|
|
|
fileSystems."/" =
|
|
|
|
|
{ device = "/dev/disk/by-uuid/44444444-4444-4444-8888-888888888888";
|
|
|
|
|
fsType = "ext4";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
fileSystems."/boot" =
|
|
|
|
|
{ device = "/dev/disk/by-uuid/2178-694E";
|
|
|
|
|
fsType = "vfat";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
fileSystems."/var/lib/matrix-as-facebook" =
|
|
|
|
|
{ device = "vault/state_directories/matrix-as-facebook";
|
|
|
|
|
fsType = "zfs";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
fileSystems."/var/lib/gitea" =
|
|
|
|
|
{ device = "vault/state_directories/gitea";
|
|
|
|
|
fsType = "zfs";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
fileSystems."/var/lib/matrix-as-signal" =
|
|
|
|
|
{ device = "vault/state_directories/matrix-as-signal";
|
|
|
|
|
fsType = "zfs";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
fileSystems."/var/lib/signald" =
|
|
|
|
|
{ device = "vault/state_directories/signald";
|
|
|
|
|
fsType = "zfs";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
fileSystems."/var/lib/wallabag" =
|
|
|
|
|
{ device = "vault/state_directories/wallabag";
|
|
|
|
|
fsType = "zfs";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
fileSystems."/var/lib/matrix-as-telegram" =
|
|
|
|
|
{ device = "vault/state_directories/matrix-as-telegram";
|
|
|
|
|
fsType = "zfs";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
fileSystems."/vault" =
|
|
|
|
|
{ device = "vault";
|
|
|
|
|
fsType = "zfs";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
fileSystems."/vault/backups" =
|
|
|
|
|
{ device = "vault/backups";
|
|
|
|
|
fsType = "zfs";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
fileSystems."/vault/radicale" =
|
|
|
|
|
{ device = "vault/radicale";
|
|
|
|
|
fsType = "zfs";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
fileSystems."/vault/syncthing" =
|
|
|
|
|
{ device = "vault/syncthing";
|
|
|
|
|
fsType = "zfs";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
fileSystems."/vault/backups/zion" =
|
|
|
|
|
{ device = "vault/backups/zion";
|
|
|
|
|
fsType = "zfs";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
fileSystems."/vault/backups/monolith" =
|
|
|
|
|
{ device = "vault/backups/monolith";
|
|
|
|
|
fsType = "zfs";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
fileSystems."/vault/mosquitto" =
|
|
|
|
|
{ device = "vault/mosquitto";
|
|
|
|
|
fsType = "zfs";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
fileSystems."/vault/git" =
|
|
|
|
|
{ device = "vault/git";
|
|
|
|
|
fsType = "zfs";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
fileSystems."/var/lib/containers/storage/overlay" =
|
|
|
|
|
{ device = "/var/lib/containers/storage/overlay";
|
|
|
|
|
fsType = "none";
|
|
|
|
|
options = [ "bind" ];
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
fileSystems."/var/lib/containers/storage/overlay-containers/e6e1c8455598b60d9fb87943304626321e9c0b0adc4b56945ca9ac3eb43d67ae/userdata/shm" =
|
|
|
|
|
{ device = "shm";
|
|
|
|
|
fsType = "tmpfs";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
fileSystems."/var/lib/containers/storage/overlay/1c02934ce2ad9fbc1d1818c807257afd7b4431991df42d21d792f926cc0627a1/merged" =
|
|
|
|
|
{ device = "overlay";
|
|
|
|
|
fsType = "overlay";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
fileSystems."/var/lib/containers/storage/overlay-containers/0fb5718e1e62a804b10ba708f7e88ca9f216b5a255a871dca1ab6902dad3054d/userdata/shm" =
|
|
|
|
|
{ device = "shm";
|
|
|
|
|
fsType = "tmpfs";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
fileSystems."/var/lib/containers/storage/overlay/659eac88c975f029dc3f854b39babbc90ae97cdf8b61f4faca6a4c7052d53019/merged" =
|
|
|
|
|
{ device = "overlay";
|
|
|
|
|
fsType = "overlay";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
fileSystems."/var/lib/prometheus2" =
|
|
|
|
|
{ device = "vault/state_directories/prometheus";
|
|
|
|
|
fsType = "zfs";
|
|
|
|
|
};
|
2023-01-02 13:54:40 +01:00
|
|
|
|
|
2019-11-08 14:13:50 +01:00
|
|
|
|
swapDevices = [ ];
|
|
|
|
|
|
2022-12-20 11:54:17 +01:00
|
|
|
|
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
|
|
|
|
# (the default) this is the recommended approach. When using systemd-networkd it's
|
|
|
|
|
# still possible to use this option, but it's recommended to use it in conjunction
|
|
|
|
|
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
|
|
|
|
|
networking.useDHCP = lib.mkDefault true;
|
2023-04-03 00:50:47 +02:00
|
|
|
|
# networking.interfaces.cni-podman0.useDHCP = lib.mkDefault true;
|
2022-12-20 11:54:17 +01:00
|
|
|
|
# networking.interfaces.eth0.useDHCP = lib.mkDefault true;
|
2023-04-18 21:32:08 +02:00
|
|
|
|
# networking.interfaces.veth25ee5d84.useDHCP = lib.mkDefault true;
|
|
|
|
|
# networking.interfaces.veth6e46f8d7.useDHCP = lib.mkDefault true;
|
|
|
|
|
# networking.interfaces.veth8506af14.useDHCP = lib.mkDefault true;
|
2022-12-20 11:54:17 +01:00
|
|
|
|
# networking.interfaces.wg0.useDHCP = lib.mkDefault true;
|
|
|
|
|
# networking.interfaces.wlan0.useDHCP = lib.mkDefault true;
|
|
|
|
|
|
|
|
|
|
nixpkgs.hostPlatform = lib.mkDefault "aarch64-linux";
|
2020-05-10 03:15:42 +02:00
|
|
|
|
powerManagement.cpuFreqGovernor = lib.mkDefault "ondemand";
|
2019-11-08 14:13:50 +01:00
|
|
|
|
}
|