# Do not modify this file! It was generated by ‘nixos-generate-config’ # and may be overwritten by future invocations. Please make changes # to /etc/nixos/configuration.nix instead. { config, lib, pkgs, modulesPath, ... }: let device = "/dev/disk/by-uuid/c2e8b249-240e-4eef-bf4e-81e7dbbf4887"; in { imports = [ (modulesPath + "/installer/scan/not-detected.nix") ./apple-silicon.nix ]; # Use the systemd-boot EFI boot loader. boot.loader.systemd-boot.enable = true; boot.loader.efi.canTouchEfiVariables = false; # depending on how you configured your disk mounts, change this to /boot or /boot/efi. boot.loader.efi.efiSysMountPoint = "/boot"; # Enable binfmt emulation of aarch64-linux, this is required for cross compilation. boot.binfmt.emulatedSystems = [ "x86_64-linux" "riscv64-linux" ]; # supported file systems, so we can mount any removable disks with these filesystems boot.supportedFilesystems = lib.mkForce [ "ext4" "btrfs" "xfs" "ntfs" "fat" "vfat" "exfat" ]; # clear /tmp on boot to get a stateless /tmp directory. boot.tmp.cleanOnBoot = true; boot.initrd = { # unlocked luks devices via a keyfile or prompt a passphrase. luks.devices."crypted-nixos" = { device = "/dev/disk/by-uuid/1c37820e-2501-46e4-bec4-27c28691a5b4"; # the keyfile(or device partition) that should be used as the decryption key for the encrypted device. # if not specified, you will be prompted for a passphrase instead. #keyFile = "/root-part.key"; # whether to allow TRIM requests to the underlying device. # it's less secure, but faster. allowDiscards = true; # Whether to bypass dm-crypt’s internal read and write workqueues. # Enabling this should improve performance on SSDs; # https://wiki.archlinux.org/index.php/Dm-crypt/Specialties#Disable_workqueue_for_increased_solid_state_drive_(SSD)_performance bypassWorkqueues = true; }; }; fileSystems."/boot" = { device = "/dev/disk/by-uuid/01CE-1DFD"; fsType = "vfat"; options = [ "fmask=0022" "dmask=0022" ]; }; # equal to `mount -t tmpfs tmpfs /` fileSystems."/" = { device = "tmpfs"; fsType = "tmpfs"; # set mode to 755, otherwise systemd will set it to 777, which cause problems. # relatime: Update inode access times relative to modify or change time. options = [ "relatime" "mode=755" ]; }; fileSystems."/nix" = { inherit device; fsType = "btrfs"; options = [ "subvol=@nix" "noatime" "compress-force=zstd:1" ]; }; fileSystems."/tmp" = { inherit device; fsType = "btrfs"; options = [ "subvol=@tmp" "noatime" "compress-force=zstd:1" ]; }; fileSystems."/persistent" = { inherit device; fsType = "btrfs"; options = [ "subvol=@persistent" "noatime" "compress-force=zstd:1" ]; # preservation's data is required for booting. neededForBoot = true; }; fileSystems."/snapshots" = { inherit device; fsType = "btrfs"; options = [ "subvol=@snapshots" "noatime" "compress-force=zstd:1" ]; }; # mount swap subvolume in readonly mode. fileSystems."/swap" = { inherit device; fsType = "btrfs"; options = [ "subvol=@swap" "ro" ]; }; # remount swapfile in read-write mode fileSystems."/swap/swapfile" = { # the swapfile is located in /swap subvolume, so we need to mount /swap first. depends = [ "/swap" ]; device = "/swap/swapfile"; fsType = "none"; options = [ "bind" "rw" ]; }; swapDevices = [ { device = "/swap/swapfile"; } ]; # Enables DHCP on each ethernet and wireless interface. In case of scripted networking # (the default) this is the recommended approach. When using systemd-networkd it's # still possible to use this option, but it's recommended to use it in conjunction # with explicit per-interface declarations with `networking.interfaces..useDHCP`. networking.useDHCP = lib.mkDefault true; # networking.interfaces.wlan0.useDHCP = lib.mkDefault true; nixpkgs.hostPlatform = lib.mkDefault "aarch64-linux"; }