2024-01-09 23:50:24 +01:00
|
|
|
|
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
|
|
|
|
# and may be overwritten by future invocations. Please make changes
|
|
|
|
|
# to /etc/nixos/configuration.nix instead.
|
2024-02-11 11:25:04 +01:00
|
|
|
|
{ config, lib, pkgs, modulesPath, username, ... }:
|
2024-01-09 23:50:24 +01:00
|
|
|
|
|
|
|
|
|
{
|
|
|
|
|
imports =
|
2024-02-11 10:51:40 +01:00
|
|
|
|
[
|
|
|
|
|
(modulesPath + "/installer/scan/not-detected.nix")
|
2024-01-09 23:50:24 +01:00
|
|
|
|
];
|
|
|
|
|
|
2024-02-11 10:51:40 +01:00
|
|
|
|
boot.initrd.availableKernelModules = [ "xhci_pci" "ehci_pci" "nvme" "usbhid" "uas" "usb_storage" "sd_mod" ];
|
2024-01-09 23:50:24 +01:00
|
|
|
|
boot.initrd.kernelModules = [ ];
|
2024-02-05 05:12:56 +01:00
|
|
|
|
boot.kernelModules = [ "kvm-intel" ];
|
2024-01-09 23:50:24 +01:00
|
|
|
|
boot.extraModulePackages = [ ];
|
|
|
|
|
|
|
|
|
|
fileSystems."/" =
|
2024-02-11 10:51:40 +01:00
|
|
|
|
{
|
|
|
|
|
device = "none";
|
|
|
|
|
fsType = "tmpfs";
|
2024-02-11 11:25:04 +01:00
|
|
|
|
options = [ "defaults" "size=35%" "mode=755" ];
|
2024-01-09 23:50:24 +01:00
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
fileSystems."/boot" =
|
2024-02-11 10:51:40 +01:00
|
|
|
|
{
|
|
|
|
|
device = "/dev/disk/by-uuid/CF00-A288";
|
2024-01-09 23:50:24 +01:00
|
|
|
|
fsType = "vfat";
|
2024-02-11 10:51:40 +01:00
|
|
|
|
options = [ "umask=0077" ];
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
fileSystems."/nix" =
|
|
|
|
|
{
|
|
|
|
|
device = "/dev/disk/by-uuid/86765b18-75f6-4900-809a-2931a8dac75e";
|
|
|
|
|
fsType = "ext4";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
boot.initrd.luks.devices."crypted".device = "/dev/disk/by-uuid/1a35e8d0-f13c-43f3-8c12-3aaa5059c8a3";
|
|
|
|
|
|
|
|
|
|
fileSystems."/etc/nixos" =
|
|
|
|
|
{
|
|
|
|
|
device = "/nix/persist/etc/nixos";
|
|
|
|
|
fsType = "none";
|
|
|
|
|
options = [ "bind" ];
|
|
|
|
|
};
|
|
|
|
|
|
2024-02-11 11:25:04 +01:00
|
|
|
|
fileSystems."/home/${username}/zaneyos" =
|
|
|
|
|
{
|
|
|
|
|
device = "/nix/persist/etc/nixos/zaneyos";
|
|
|
|
|
fsType = "none";
|
|
|
|
|
options = [ "bind" ];
|
|
|
|
|
};
|
|
|
|
|
|
2024-02-11 10:51:40 +01:00
|
|
|
|
fileSystems."/var/log" =
|
|
|
|
|
{
|
|
|
|
|
device = "/nix/persist/var/log";
|
|
|
|
|
fsType = "none";
|
|
|
|
|
options = [ "bind" ];
|
2024-01-09 23:50:24 +01:00
|
|
|
|
};
|
|
|
|
|
|
2024-02-11 10:51:40 +01:00
|
|
|
|
swapDevices =
|
|
|
|
|
[{
|
|
|
|
|
device = "/dev/disk/by-partuuid/b77747cb-7eb5-4d78-bb6a-34ded8eb7c23";
|
|
|
|
|
randomEncryption.enable = true;
|
|
|
|
|
}];
|
2024-01-09 23:50:24 +01:00
|
|
|
|
|
|
|
|
|
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
|
|
|
|
# (the default) this is the recommended approach. When using systemd-networkd it's
|
|
|
|
|
# still possible to use this option, but it's recommended to use it in conjunction
|
|
|
|
|
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
|
|
|
|
|
networking.useDHCP = lib.mkDefault true;
|
|
|
|
|
# networking.interfaces.enp7s0.useDHCP = lib.mkDefault true;
|
|
|
|
|
|
|
|
|
|
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
2024-02-05 05:12:56 +01:00
|
|
|
|
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
2024-01-09 23:50:24 +01:00
|
|
|
|
}
|