# Do not modify this file! It was generated by ‘nixos-generate-config’ # and may be overwritten by future invocations. Please make changes # to /etc/nixos/configuration.nix instead. { config, lib, pkgs, modulesPath, ... }: { imports = [ (modulesPath + "/installer/scan/not-detected.nix") ]; boot.initrd.availableKernelModules = [ "xhci_pci" ]; boot.initrd.kernelModules = [ ]; boot.kernelModules = [ ]; boot.extraModulePackages = [ ]; fileSystems."/" = { device = "/dev/disk/by-uuid/44444444-4444-4444-8888-888888888888"; fsType = "ext4"; }; fileSystems."/boot" = { device = "/dev/disk/by-uuid/2178-694E"; fsType = "vfat"; }; fileSystems."/var/lib/matrix-as-facebook" = { device = "vault/state_directories/matrix-as-facebook"; fsType = "zfs"; }; fileSystems."/var/lib/gitea" = { device = "vault/state_directories/gitea"; fsType = "zfs"; }; fileSystems."/var/lib/matrix-as-signal" = { device = "vault/state_directories/matrix-as-signal"; fsType = "zfs"; }; fileSystems."/var/lib/signald" = { device = "vault/state_directories/signald"; fsType = "zfs"; }; fileSystems."/var/lib/wallabag" = { device = "vault/state_directories/wallabag"; fsType = "zfs"; }; fileSystems."/var/lib/matrix-as-telegram" = { device = "vault/state_directories/matrix-as-telegram"; fsType = "zfs"; }; fileSystems."/vault" = { device = "vault"; fsType = "zfs"; }; fileSystems."/vault/backups" = { device = "vault/backups"; fsType = "zfs"; }; fileSystems."/vault/radicale" = { device = "vault/radicale"; fsType = "zfs"; }; fileSystems."/vault/syncthing" = { device = "vault/syncthing"; fsType = "zfs"; }; fileSystems."/vault/backups/zion" = { device = "vault/backups/zion"; fsType = "zfs"; }; fileSystems."/vault/backups/monolith" = { device = "vault/backups/monolith"; fsType = "zfs"; }; fileSystems."/vault/mosquitto" = { device = "vault/mosquitto"; fsType = "zfs"; }; fileSystems."/vault/git" = { device = "vault/git"; fsType = "zfs"; }; fileSystems."/var/lib/containers/storage/overlay" = { device = "/var/lib/containers/storage/overlay"; fsType = "none"; options = [ "bind" ]; }; fileSystems."/var/lib/containers/storage/overlay-containers/e6e1c8455598b60d9fb87943304626321e9c0b0adc4b56945ca9ac3eb43d67ae/userdata/shm" = { device = "shm"; fsType = "tmpfs"; }; fileSystems."/var/lib/containers/storage/overlay/1c02934ce2ad9fbc1d1818c807257afd7b4431991df42d21d792f926cc0627a1/merged" = { device = "overlay"; fsType = "overlay"; }; fileSystems."/var/lib/containers/storage/overlay-containers/0fb5718e1e62a804b10ba708f7e88ca9f216b5a255a871dca1ab6902dad3054d/userdata/shm" = { device = "shm"; fsType = "tmpfs"; }; fileSystems."/var/lib/containers/storage/overlay/659eac88c975f029dc3f854b39babbc90ae97cdf8b61f4faca6a4c7052d53019/merged" = { device = "overlay"; fsType = "overlay"; }; fileSystems."/var/lib/prometheus2" = { device = "vault/state_directories/prometheus"; fsType = "zfs"; }; swapDevices = [ ]; # Enables DHCP on each ethernet and wireless interface. In case of scripted networking # (the default) this is the recommended approach. When using systemd-networkd it's # still possible to use this option, but it's recommended to use it in conjunction # with explicit per-interface declarations with `networking.interfaces..useDHCP`. networking.useDHCP = lib.mkDefault true; # networking.interfaces.cni-podman0.useDHCP = lib.mkDefault true; # networking.interfaces.eth0.useDHCP = lib.mkDefault true; # networking.interfaces.veth25ee5d84.useDHCP = lib.mkDefault true; # networking.interfaces.veth6e46f8d7.useDHCP = lib.mkDefault true; # networking.interfaces.veth8506af14.useDHCP = lib.mkDefault true; # networking.interfaces.wg0.useDHCP = lib.mkDefault true; # networking.interfaces.wlan0.useDHCP = lib.mkDefault true; nixpkgs.hostPlatform = lib.mkDefault "aarch64-linux"; powerManagement.cpuFreqGovernor = lib.mkDefault "ondemand"; }