# Do not modify this file! It was generated by ‘nixos-generate-config’ # and may be overwritten by future invocations. Please make changes # to /etc/nixos/configuration.nix instead. { config, lib, pkgs, modulesPath, ... }: { imports = [ (modulesPath + "/installer/scan/not-detected.nix") ]; boot.initrd.availableKernelModules = [ "xhci_pci" ]; boot.initrd.kernelModules = [ ]; boot.kernelModules = [ ]; boot.extraModulePackages = [ ]; fileSystems."/" = { device = "/dev/disk/by-uuid/44444444-4444-4444-8888-888888888888"; fsType = "ext4"; }; fileSystems."/boot" = { device = "/dev/disk/by-uuid/2178-694E"; fsType = "vfat"; }; fileSystems."/vault" = { device = "vault"; fsType = "zfs"; }; fileSystems."/var/lib/matrix-as-facebook" = { device = "vault/state_directories/matrix-as-facebook"; fsType = "zfs"; }; fileSystems."/var/lib/gitea" = { device = "vault/state_directories/gitea"; fsType = "zfs"; }; fileSystems."/var/lib/signald" = { device = "vault/state_directories/signald"; fsType = "zfs"; }; fileSystems."/var/lib/containers" = { device = "vault/containers"; fsType = "zfs"; }; fileSystems."/var/lib/matrix-as-telegram" = { device = "vault/state_directories/matrix-as-telegram"; fsType = "zfs"; }; fileSystems."/var/lib/wallabag" = { device = "vault/state_directories/wallabag"; fsType = "zfs"; }; fileSystems."/var/lib/matrix-as-signal" = { device = "vault/state_directories/matrix-as-signal"; fsType = "zfs"; }; fileSystems."/vault/git" = { device = "vault/git"; fsType = "zfs"; }; fileSystems."/vault/radicale" = { device = "vault/radicale"; fsType = "zfs"; }; fileSystems."/vault/nextcloud" = { device = "vault/nextcloud"; fsType = "zfs"; }; fileSystems."/vault/backups" = { device = "vault/backups"; fsType = "zfs"; }; fileSystems."/vault/syncthing" = { device = "vault/syncthing"; fsType = "zfs"; }; fileSystems."/var/lib/containers/storage/zfs-containers/1996d0540bceeb3dea027b3e5ef9e6cd94ea527ce657bf6461286d7b4afa637f/userdata/shm" = { device = "shm"; fsType = "tmpfs"; }; fileSystems."/vault/backups/zion" = { device = "vault/backups/zion"; fsType = "zfs"; }; fileSystems."/vault/backups/monolith" = { device = "vault/backups/monolith"; fsType = "zfs"; }; fileSystems."/vault/backups/zion/databases" = { device = "vault/backups/zion/databases"; fsType = "zfs"; }; fileSystems."/var/lib/containers/storage/zfs-containers/737d2ce2ce884a2dffe6640ad1e0ea8fe2cf0a200f13a9490bb7f89bb19940cb/userdata/shm" = { device = "shm"; fsType = "tmpfs"; }; fileSystems."/var/lib/containers/storage/zfs/graph/2b2e937f15fc061c5d36b703db6b6c3aa38a39390462cb486f5a6eaa8a8ab2c0" = { device = "vault/containers/2b2e937f15fc061c5d36b703db6b6c3aa38a39390462cb486f5a6eaa8a8ab2c0"; fsType = "zfs"; }; swapDevices = [ ]; # Enables DHCP on each ethernet and wireless interface. In case of scripted networking # (the default) this is the recommended approach. When using systemd-networkd it's # still possible to use this option, but it's recommended to use it in conjunction # with explicit per-interface declarations with `networking.interfaces..useDHCP`. networking.useDHCP = lib.mkDefault true; # networking.interfaces.cni-podman0.useDHCP = lib.mkDefault true; # networking.interfaces.eth0.useDHCP = lib.mkDefault true; # networking.interfaces.vethae13c274.useDHCP = lib.mkDefault true; # networking.interfaces.wg0.useDHCP = lib.mkDefault true; # networking.interfaces.wlan0.useDHCP = lib.mkDefault true; nixpkgs.hostPlatform = lib.mkDefault "aarch64-linux"; powerManagement.cpuFreqGovernor = lib.mkDefault "ondemand"; }