# Do not modify this file! It was generated by ‘nixos-generate-config’ # and may be overwritten by future invocations. Please make changes # to /etc/nixos/configuration.nix instead. { config, lib, pkgs, modulesPath, ... }: { imports = [ (modulesPath + "/installer/scan/not-detected.nix") ]; boot.initrd.availableKernelModules = [ "xhci_pci" ]; boot.initrd.kernelModules = [ ]; boot.kernelModules = [ ]; boot.extraModulePackages = [ ]; fileSystems."/" = { device = "/dev/disk/by-uuid/44444444-4444-4444-8888-888888888888"; fsType = "ext4"; }; fileSystems."/boot" = { device = "/dev/disk/by-uuid/2178-694E"; fsType = "vfat"; }; fileSystems."/var/lib/containers" = { device = "vault/containers"; fsType = "zfs"; }; fileSystems."/var/lib/gitea" = { device = "vault/state_directories/gitea"; fsType = "zfs"; }; fileSystems."/var/lib/matrix-as-signal" = { device = "vault/state_directories/matrix-as-signal"; fsType = "zfs"; }; fileSystems."/vault" = { device = "vault"; fsType = "zfs"; }; fileSystems."/var/lib/matrix-as-facebook" = { device = "vault/state_directories/matrix-as-facebook"; fsType = "zfs"; }; fileSystems."/var/lib/matrix-as-telegram" = { device = "vault/state_directories/matrix-as-telegram"; fsType = "zfs"; }; fileSystems."/var/lib/wallabag" = { device = "vault/state_directories/wallabag"; fsType = "zfs"; }; fileSystems."/var/lib/signald" = { device = "vault/state_directories/signald"; fsType = "zfs"; }; fileSystems."/var/lib/containers/storage/zfs-containers/1996d0540bceeb3dea027b3e5ef9e6cd94ea527ce657bf6461286d7b4afa637f/userdata/shm" = { device = "shm"; fsType = "tmpfs"; }; fileSystems."/var/lib/containers/storage/zfs-containers/737d2ce2ce884a2dffe6640ad1e0ea8fe2cf0a200f13a9490bb7f89bb19940cb/userdata/shm" = { device = "shm"; fsType = "tmpfs"; }; fileSystems."/var/lib/containers/storage/zfs-containers/151ec7c12d73e7e161d8df82605f911820f25e6186d655a18c54b481c4be723f/userdata/shm" = { device = "shm"; fsType = "tmpfs"; }; fileSystems."/vault/git" = { device = "vault/git"; fsType = "zfs"; }; fileSystems."/vault/syncthing" = { device = "vault/syncthing"; fsType = "zfs"; }; fileSystems."/vault/nextcloud" = { device = "vault/nextcloud"; fsType = "zfs"; }; fileSystems."/vault/backups" = { device = "vault/backups"; fsType = "zfs"; }; fileSystems."/vault/radicale" = { device = "vault/radicale"; fsType = "zfs"; }; fileSystems."/vault/backups/zion" = { device = "vault/backups/zion"; fsType = "zfs"; }; fileSystems."/vault/backups/monolith" = { device = "vault/backups/monolith"; fsType = "zfs"; }; fileSystems."/vault/backups/zion/databases" = { device = "vault/backups/zion/databases"; fsType = "zfs"; }; fileSystems."/var/lib/containers/storage/zfs-containers/522343abee32edddd051c93a47bc7d2208e0bbcef724e4c4319cbbc49f5d361d/userdata/shm" = { device = "shm"; fsType = "tmpfs"; }; fileSystems."/var/lib/containers/storage/zfs/graph/a2d664f5b5b3cbda9c55f28fafdbb02486330f981826ee1a2cf842fa1679c2d8" = { device = "vault/containers/a2d664f5b5b3cbda9c55f28fafdbb02486330f981826ee1a2cf842fa1679c2d8"; fsType = "zfs"; }; swapDevices = [ ]; # Enables DHCP on each ethernet and wireless interface. In case of scripted networking # (the default) this is the recommended approach. When using systemd-networkd it's # still possible to use this option, but it's recommended to use it in conjunction # with explicit per-interface declarations with `networking.interfaces..useDHCP`. networking.useDHCP = lib.mkDefault true; # networking.interfaces.cni-podman0.useDHCP = lib.mkDefault true; # networking.interfaces.eth0.useDHCP = lib.mkDefault true; # networking.interfaces.vethfa1b4afe.useDHCP = lib.mkDefault true; # networking.interfaces.wg0.useDHCP = lib.mkDefault true; # networking.interfaces.wlan0.useDHCP = lib.mkDefault true; nixpkgs.hostPlatform = lib.mkDefault "aarch64-linux"; powerManagement.cpuFreqGovernor = lib.mkDefault "ondemand"; }