This commit is contained in:
mjallen18
2026-02-06 08:56:15 -06:00
parent ef8e52b93f
commit dc25f02010

View File

@@ -1,78 +1,68 @@
# Do not modify this file! It was generated by nixos-generate-config # Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes # and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead. # to /etc/nixos/configuration.nix instead.
{ { config, lib, pkgs, modulesPath, ... }:
lib,
modulesPath,
...
}:
{ {
imports = [ imports =
(modulesPath + "/installer/scan/not-detected.nix") [ (modulesPath + "/installer/scan/not-detected.nix")
]; ];
boot.initrd.availableKernelModules = [ boot.initrd.availableKernelModules = [ "usbhid" "usb_storage" "sdhci_pci" ];
"usb_storage"
"sdhci_pci"
];
boot.initrd.kernelModules = [ ]; boot.initrd.kernelModules = [ ];
boot.kernelModules = [ ]; boot.kernelModules = [ ];
boot.extraModulePackages = [ ]; boot.extraModulePackages = [ ];
fileSystems."/" = { fileSystems."/" =
device = "none"; { device = "none";
fsType = "tmpfs"; fsType = "tmpfs";
options = [ "mode=755" ]; };
};
fileSystems."/boot" = { fileSystems."/boot" =
device = "/dev/disk/by-uuid/E66E-1A03"; { device = "/dev/disk/by-uuid/80CC-18FC";
fsType = "vfat"; fsType = "vfat";
options = [ options = [ "fmask=0022" "dmask=0022" ];
"fmask=0022" };
"dmask=0022"
];
};
fileSystems."/root" = { fileSystems."/home" =
device = "/dev/disk/by-uuid/335f1bb3-6fdb-474e-972c-77b64e930d03"; { device = "/dev/mapper/cryptroot";
fsType = "btrfs"; fsType = "btrfs";
options = [ "subvol=root" ]; options = [ "subvol=home" ];
}; };
fileSystems."/etc" = { boot.initrd.luks.devices."cryptroot".device = "/dev/disk/by-uuid/6fc86225-2bd4-4d9f-ba51-c3bc6b1dc7f9";
device = "/dev/disk/by-uuid/335f1bb3-6fdb-474e-972c-77b64e930d03";
fsType = "btrfs";
options = [ "subvol=etc" ];
};
fileSystems."/nix" = { fileSystems."/persist" =
device = "/dev/disk/by-uuid/335f1bb3-6fdb-474e-972c-77b64e930d03"; { device = "/dev/mapper/cryptroot";
fsType = "btrfs"; fsType = "btrfs";
options = [ "subvol=nix" ]; options = [ "subvol=persist" ];
}; };
fileSystems."/var/log" = { fileSystems."/etc" =
device = "/dev/disk/by-uuid/335f1bb3-6fdb-474e-972c-77b64e930d03"; { device = "/dev/mapper/cryptroot";
fsType = "btrfs"; fsType = "btrfs";
options = [ "subvol=log" ]; options = [ "subvol=etc" ];
}; };
fileSystems."/home" = { fileSystems."/root" =
device = "/dev/disk/by-uuid/335f1bb3-6fdb-474e-972c-77b64e930d03"; { device = "/dev/mapper/cryptroot";
fsType = "btrfs"; fsType = "btrfs";
options = [ "subvol=home" ]; options = [ "subvol=root" ];
}; };
fileSystems."/nix" =
{ device = "/dev/mapper/cryptroot";
fsType = "btrfs";
options = [ "subvol=nix" ];
};
fileSystems."/var/log" =
{ device = "/dev/mapper/cryptroot";
fsType = "btrfs";
options = [ "subvol=log" ];
};
swapDevices = [ ]; swapDevices = [ ];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's
# still possible to use this option, but it's recommended to use it in conjunction
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
networking.useDHCP = lib.mkDefault true;
# networking.interfaces.wlan0.useDHCP = lib.mkDefault true;
nixpkgs.hostPlatform = lib.mkDefault "aarch64-linux"; nixpkgs.hostPlatform = lib.mkDefault "aarch64-linux";
} }