132 lines
3.7 KiB
Nix
132 lines
3.7 KiB
Nix
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
||
# and may be overwritten by future invocations. Please make changes
|
||
# to /etc/nixos/configuration.nix instead.
|
||
{ config, lib, pkgs, modulesPath, ... }:
|
||
|
||
{
|
||
imports =
|
||
[ (modulesPath + "/installer/scan/not-detected.nix")
|
||
];
|
||
|
||
boot.initrd.availableKernelModules = [ "xhci_pci" ];
|
||
boot.initrd.kernelModules = [ ];
|
||
boot.kernelModules = [ ];
|
||
boot.extraModulePackages = [ ];
|
||
|
||
fileSystems."/" =
|
||
{ device = "/dev/disk/by-uuid/44444444-4444-4444-8888-888888888888";
|
||
fsType = "ext4";
|
||
};
|
||
|
||
fileSystems."/boot" =
|
||
{ device = "/dev/disk/by-uuid/2178-694E";
|
||
fsType = "vfat";
|
||
};
|
||
|
||
fileSystems."/vault" =
|
||
{ device = "vault";
|
||
fsType = "zfs";
|
||
};
|
||
|
||
fileSystems."/var/lib/signald" =
|
||
{ device = "vault/state_directories/signald";
|
||
fsType = "zfs";
|
||
};
|
||
|
||
fileSystems."/var/lib/gitea" =
|
||
{ device = "vault/state_directories/gitea";
|
||
fsType = "zfs";
|
||
};
|
||
|
||
fileSystems."/var/lib/wallabag" =
|
||
{ device = "vault/state_directories/wallabag";
|
||
fsType = "zfs";
|
||
};
|
||
|
||
fileSystems."/var/lib/matrix-as-telegram" =
|
||
{ device = "vault/state_directories/matrix-as-telegram";
|
||
fsType = "zfs";
|
||
};
|
||
|
||
fileSystems."/var/lib/matrix-as-signal" =
|
||
{ device = "vault/state_directories/matrix-as-signal";
|
||
fsType = "zfs";
|
||
};
|
||
|
||
fileSystems."/var/lib/matrix-as-facebook" =
|
||
{ device = "vault/state_directories/matrix-as-facebook";
|
||
fsType = "zfs";
|
||
};
|
||
|
||
fileSystems."/vault/git" =
|
||
{ device = "vault/git";
|
||
fsType = "zfs";
|
||
};
|
||
|
||
fileSystems."/vault/nextcloud" =
|
||
{ device = "vault/nextcloud";
|
||
fsType = "zfs";
|
||
};
|
||
|
||
fileSystems."/vault/backups" =
|
||
{ device = "vault/backups";
|
||
fsType = "zfs";
|
||
};
|
||
|
||
fileSystems."/vault/radicale" =
|
||
{ device = "vault/radicale";
|
||
fsType = "zfs";
|
||
};
|
||
|
||
fileSystems."/vault/syncthing" =
|
||
{ device = "vault/syncthing";
|
||
fsType = "zfs";
|
||
};
|
||
|
||
fileSystems."/vault/backups/monolith" =
|
||
{ device = "vault/backups/monolith";
|
||
fsType = "zfs";
|
||
};
|
||
|
||
fileSystems."/vault/backups/zion" =
|
||
{ device = "vault/backups/zion";
|
||
fsType = "zfs";
|
||
};
|
||
|
||
fileSystems."/vault/backups/zion/databases" =
|
||
{ device = "vault/backups/zion/databases";
|
||
fsType = "zfs";
|
||
};
|
||
|
||
fileSystems."/var/lib/containers" =
|
||
{ device = "vault/containers";
|
||
fsType = "zfs";
|
||
};
|
||
|
||
fileSystems."/var/lib/containers/storage/zfs-containers/7521f1406d193340f67dfea6538f5ba05b19c61f757917f13e12b70287841045/userdata/shm" =
|
||
{ device = "shm";
|
||
fsType = "tmpfs";
|
||
};
|
||
|
||
fileSystems."/var/lib/containers/storage/zfs/graph/6bf2a36ab4d55af9e693f55018f5b2fd38b6aae285183b8680969f5820bd0be9" =
|
||
{ device = "vault/containers/6bf2a36ab4d55af9e693f55018f5b2fd38b6aae285183b8680969f5820bd0be9";
|
||
fsType = "zfs";
|
||
};
|
||
|
||
swapDevices = [ ];
|
||
|
||
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
||
# (the default) this is the recommended approach. When using systemd-networkd it's
|
||
# still possible to use this option, but it's recommended to use it in conjunction
|
||
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
|
||
networking.useDHCP = lib.mkDefault true;
|
||
# networking.interfaces.cni-podman0.useDHCP = lib.mkDefault true;
|
||
# networking.interfaces.eth0.useDHCP = lib.mkDefault true;
|
||
# networking.interfaces.veth8009136e.useDHCP = lib.mkDefault true;
|
||
# networking.interfaces.wg0.useDHCP = lib.mkDefault true;
|
||
# networking.interfaces.wlan0.useDHCP = lib.mkDefault true;
|
||
|
||
nixpkgs.hostPlatform = lib.mkDefault "aarch64-linux";
|
||
powerManagement.cpuFreqGovernor = lib.mkDefault "ondemand";
|
||
}
|