os/hosts/cox/hardware-configuration.nix

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

71 lines
2.1 KiB
Nix
Raw Normal View History

2022-08-21 22:53:04 +00:00
# Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{
2023-02-25 13:45:21 +00:00
config,
lib,
pkgs,
modulesPath,
...
}: {
imports = [
(modulesPath + "/installer/scan/not-detected.nix")
];
2022-08-21 22:53:04 +00:00
2023-02-25 13:45:21 +00:00
boot.initrd.availableKernelModules = ["xhci_pci" "usbhid" "usb_storage" "uas"];
boot.initrd.kernelModules = [];
boot.kernelModules = [];
boot.extraModulePackages = [];
2022-08-21 22:53:04 +00:00
2023-01-28 21:30:37 +00:00
boot.kernelPackages = pkgs.linuxPackages_6_1;
2023-02-25 13:45:21 +00:00
boot.supportedFilesystems = [];
boot.kernelParams = ["usb-storage.quirks=2109:0716:ouw,174c:55aa:u,2109:2813:ouw,2109:0813:ouw"];
2022-08-21 22:53:04 +00:00
2023-01-28 21:30:37 +00:00
boot.loader.grub = {
enable = true;
efiSupport = true;
efiInstallAsRemovable = true;
device = "nodev";
};
boot.loader.efi.canTouchEfiVariables = false;
boot.loader.systemd-boot.enable = false;
boot.loader.generic-extlinux-compatible.enable = false;
2023-02-25 13:45:21 +00:00
2023-01-28 21:30:37 +00:00
boot.loader.timeout = 0;
boot.initrd.luks.devices."cryptroot" = {
device = "/dev/disk/by-uuid/d86a20a6-686c-4bf8-bd3b-911901272742";
keyFile = "/dev/disk/by-id/usb-SanDisk_Cruzer_Blade_03024516121421043657-0:0-part1";
fallbackToPassword = true;
bypassWorkqueues = true;
2022-08-21 22:53:04 +00:00
};
2023-02-25 13:45:21 +00:00
fileSystems."/" = {
device = "/dev/disk/by-label/root";
fsType = "ext4";
};
2022-08-21 22:53:04 +00:00
2023-02-25 13:45:21 +00:00
fileSystems."/boot" = {
device = "/dev/disk/by-label/boot";
fsType = "vfat";
};
2022-08-21 22:53:04 +00:00
2023-02-25 13:45:21 +00:00
swapDevices = [
{device = "/dev/disk/by-label/swap";}
];
2022-08-21 22:53:04 +00:00
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's
# still possible to use this option, but it's recommended to use it in conjunction
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
2023-01-28 21:30:37 +00:00
#networking.useDHCP = lib.mkDefault true;
2022-08-21 22:53:04 +00:00
networking.interfaces.eth0.useDHCP = lib.mkDefault true;
# networking.interfaces.wlan0.useDHCP = lib.mkDefault true;
2023-01-28 21:30:37 +00:00
nixpkgs.hostPlatform = lib.mkDefault "aarch64-linux";
2022-08-21 22:53:04 +00:00
powerManagement.cpuFreqGovernor = lib.mkDefault "ondemand";
}