diff --git a/systems/common/optional/boot/initrd_luks.nix b/systems/common/optional/boot/initrd_luks.nix deleted file mode 100644 index 9a6bca7..0000000 --- a/systems/common/optional/boot/initrd_luks.nix +++ /dev/null @@ -1,32 +0,0 @@ -{ pkgs, ... }: -{ - boot = { - kernelPackages = pkgs.linuxPackages_latest; - supportedFilesystems = [ "btrfs" ]; - initrd = { - kernelModules = [ "uas" "usbcore" "usb_storage" "vfat" "nls_cp437" "nls_iso8859_1" ]; - luks.devices."crypted" = { - bypassWorkqueues = true; - # ~~~> Define this in system configuration <~~~ search by uuid, partuuid, id, or other stable identification ~> lsblk, blkid or ls -l - # device = lib.mkDefault "/dev/disk/by-partuuid/5e65cc4c-eb35-4d62-8fcd-387d6a87c067"; - - # crypttabExtraOpts = [ "tpm2-device=auto" ]; # tpm2 unlock - preLVM = true; - allowDiscards = true; - - # If using a USB or SD Card : - keyFileSize = 4096; - keyFile = "/key/hdd.key"; - - # Use this if you want to fallback to the encryption password when the drive can't be found. HIGHLY RECCOMENDED!!!! - fallbackToPassword = true; - - }; - }; - resumeDevice = "/dev/nvme0n1"; # should be pointing to disk/dev where swap resides, for some reason my disk does not have uuid - kernelParams = [ - # hibernation - "resume_offset=533760" - ]; - }; -} diff --git a/systems/common/optional/boot/systemd_boot.nix b/systems/common/optional/boot/systemd_boot.nix deleted file mode 100644 index 42e8fbe..0000000 --- a/systems/common/optional/boot/systemd_boot.nix +++ /dev/null @@ -1,10 +0,0 @@ -{ - boot.loader = { - systemd-boot = { - enable = true; - consoleMode = "max"; - }; - efi.canTouchEfiVariables = true; - }; -} -