137 lines
3.8 KiB
Nix
137 lines
3.8 KiB
Nix
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
||
# and may be overwritten by future invocations. Please make changes
|
||
# to /etc/nixos/configuration.nix instead.
|
||
{ config, lib, pkgs, modulesPath, ... }:
|
||
|
||
{
|
||
imports =
|
||
[ (modulesPath + "/installer/scan/not-detected.nix")
|
||
];
|
||
|
||
boot.initrd.availableKernelModules = [ "xhci_pci" ];
|
||
boot.initrd.kernelModules = [ ];
|
||
boot.kernelModules = [ ];
|
||
boot.extraModulePackages = [ ];
|
||
|
||
fileSystems."/" =
|
||
{ device = "/dev/disk/by-uuid/44444444-4444-4444-8888-888888888888";
|
||
fsType = "ext4";
|
||
};
|
||
|
||
fileSystems."/boot" =
|
||
{ device = "/dev/disk/by-uuid/2178-694E";
|
||
fsType = "vfat";
|
||
};
|
||
|
||
fileSystems."/vault" =
|
||
{ device = "vault";
|
||
fsType = "zfs";
|
||
};
|
||
|
||
fileSystems."/var/lib/matrix-as-facebook" =
|
||
{ device = "vault/state_directories/matrix-as-facebook";
|
||
fsType = "zfs";
|
||
};
|
||
|
||
fileSystems."/var/lib/gitea" =
|
||
{ device = "vault/state_directories/gitea";
|
||
fsType = "zfs";
|
||
};
|
||
|
||
fileSystems."/var/lib/signald" =
|
||
{ device = "vault/state_directories/signald";
|
||
fsType = "zfs";
|
||
};
|
||
|
||
fileSystems."/var/lib/containers" =
|
||
{ device = "vault/containers";
|
||
fsType = "zfs";
|
||
};
|
||
|
||
fileSystems."/var/lib/matrix-as-telegram" =
|
||
{ device = "vault/state_directories/matrix-as-telegram";
|
||
fsType = "zfs";
|
||
};
|
||
|
||
fileSystems."/var/lib/wallabag" =
|
||
{ device = "vault/state_directories/wallabag";
|
||
fsType = "zfs";
|
||
};
|
||
|
||
fileSystems."/var/lib/matrix-as-signal" =
|
||
{ device = "vault/state_directories/matrix-as-signal";
|
||
fsType = "zfs";
|
||
};
|
||
|
||
fileSystems."/vault/git" =
|
||
{ device = "vault/git";
|
||
fsType = "zfs";
|
||
};
|
||
|
||
fileSystems."/vault/radicale" =
|
||
{ device = "vault/radicale";
|
||
fsType = "zfs";
|
||
};
|
||
|
||
fileSystems."/vault/nextcloud" =
|
||
{ device = "vault/nextcloud";
|
||
fsType = "zfs";
|
||
};
|
||
|
||
fileSystems."/vault/backups" =
|
||
{ device = "vault/backups";
|
||
fsType = "zfs";
|
||
};
|
||
|
||
fileSystems."/vault/syncthing" =
|
||
{ device = "vault/syncthing";
|
||
fsType = "zfs";
|
||
};
|
||
|
||
fileSystems."/var/lib/containers/storage/zfs-containers/1996d0540bceeb3dea027b3e5ef9e6cd94ea527ce657bf6461286d7b4afa637f/userdata/shm" =
|
||
{ device = "shm";
|
||
fsType = "tmpfs";
|
||
};
|
||
|
||
fileSystems."/vault/backups/zion" =
|
||
{ device = "vault/backups/zion";
|
||
fsType = "zfs";
|
||
};
|
||
|
||
fileSystems."/vault/backups/monolith" =
|
||
{ device = "vault/backups/monolith";
|
||
fsType = "zfs";
|
||
};
|
||
|
||
fileSystems."/vault/backups/zion/databases" =
|
||
{ device = "vault/backups/zion/databases";
|
||
fsType = "zfs";
|
||
};
|
||
|
||
fileSystems."/var/lib/containers/storage/zfs-containers/737d2ce2ce884a2dffe6640ad1e0ea8fe2cf0a200f13a9490bb7f89bb19940cb/userdata/shm" =
|
||
{ device = "shm";
|
||
fsType = "tmpfs";
|
||
};
|
||
|
||
fileSystems."/var/lib/containers/storage/zfs/graph/2b2e937f15fc061c5d36b703db6b6c3aa38a39390462cb486f5a6eaa8a8ab2c0" =
|
||
{ device = "vault/containers/2b2e937f15fc061c5d36b703db6b6c3aa38a39390462cb486f5a6eaa8a8ab2c0";
|
||
fsType = "zfs";
|
||
};
|
||
|
||
swapDevices = [ ];
|
||
|
||
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
||
# (the default) this is the recommended approach. When using systemd-networkd it's
|
||
# still possible to use this option, but it's recommended to use it in conjunction
|
||
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
|
||
networking.useDHCP = lib.mkDefault true;
|
||
# networking.interfaces.cni-podman0.useDHCP = lib.mkDefault true;
|
||
# networking.interfaces.eth0.useDHCP = lib.mkDefault true;
|
||
# networking.interfaces.vethae13c274.useDHCP = lib.mkDefault true;
|
||
# networking.interfaces.wg0.useDHCP = lib.mkDefault true;
|
||
# networking.interfaces.wlan0.useDHCP = lib.mkDefault true;
|
||
|
||
nixpkgs.hostPlatform = lib.mkDefault "aarch64-linux";
|
||
powerManagement.cpuFreqGovernor = lib.mkDefault "ondemand";
|
||
}
|