nixos/neko/install.txt

225 lines
5.3 KiB
Plaintext
Raw Normal View History

2024-03-26 19:13:52 +01:00
# build unstable installer
{
description = "installation media";
inputs.nixos.url = "nixpkgs/nixos-unstable";
outputs = { self, nixos }: {
nixosConfigurations = {
exampleIso = nixos.lib.nixosSystem {
system = "x86_64-linux";
modules = [
"${nixos}/nixos/modules/installer/cd-dvd/installation-cd-minimal-new-kernel-no-zfs.nix"
];
};
};
};
}
git init
git add flake.nix
nix --extra-experimental-features flakes --extra-experimental-features nix-command build .#nixosConfigurations.exampleIso.config.system.build.isoImage
sudo dd if=result/iso/nixos-24.05.20240108.317484b-x86_64-linux.iso of=/dev/sda bs=4M conv=fsync
2024-05-29 21:07:09 +02:00
# good ZFS links
https://openzfs.github.io/openzfs-docs/Getting%20Started/NixOS/Root%20on%20ZFS.html
https://carjorvaz.com/posts/installing-nixos-with-root-on-tmpfs-and-encrypted-zfs-on-a-netcup-vps/
https://astrid.tech/2021/12/17/0/two-disk-encrypted-zfs/
https://mzhang.io/posts/2022-05-09-installing-nixos-on-encrypted-zfs/
2024-03-26 19:13:52 +01:00
#
# enable ssh for root
#
sudo bash
passwd
2024-01-11 18:33:21 +01:00
#
# kill old efi boot stuff
#
efibootmgr
efibootmgr -b 0 -B
efibootmgr -b 1 -B
efibootmgr -b 2 -B
efibootmgr -b 3 -B
efibootmgr -b 4 -B
efibootmgr
#
# install script below
#
2023-07-28 17:29:07 +02:00
# Defining some helper variables (these will be used in later code
# blocks as well, so make sure to use the same terminal session or
# redefine them later)
DISK=/dev/disk/by-id/nvme-Seagate_FireCuda_530_ZP4000GM30013_7VS01VBM
HOST=neko
2023-09-16 17:32:38 +02:00
# ensure 4k sector size
nvme format --lbaf=1 --force $DISK
nvme id-ns -H $DISK
sleep 5
2023-07-28 17:29:07 +02:00
# kill old data
sgdisk --zap-all $DISK
blkdiscard -v $DISK
wipefs -a $DISK
gdisk -l $DISK
# create partitions
parted $DISK -- mklabel gpt
sgdisk -n 1:0:+1024M -c 1:"EFI System Partition" -t 1:EF00 $DISK
2024-03-26 19:13:52 +01:00
sgdisk -n 2:0:0 -c 2:"Linux" -t 2:8e00 $DISK
2023-07-28 17:29:07 +02:00
parted $DISK -- set 1 boot on
sleep 5
# take a look
cat /proc/partitions
# boot partition
mkfs.fat -F 32 -n EFIBOOT $DISK-part1
2024-03-26 19:13:52 +01:00
# create the crypto containers
cryptsetup luksFormat --sector-size 4096 --batch-mode --verify-passphrase $DISK-part2
sleep 5
# open them, set right options persistently
cryptsetup luksOpen --allow-discards --perf-no_read_workqueue --perf-no_write_workqueue --persistent $DISK-part2 crypt-system
sleep 5
lsblk --fs
# create btrfs with fast & strong checksumming and fast mounting
mkfs.btrfs -f --csum xxhash --features block-group-tree /dev/mapper/crypt-system
sleep 5
btrfs filesystem show
# create all the volumes
mount /dev/mapper/crypt-system /mnt
btrfs subvolume create /mnt/data
btrfs subvolume create /mnt/nix
btrfs subvolume create /mnt/root
sleep 5
btrfs subvolume list /mnt
# umount again, we will only use explicit subvolumes
umount /mnt
2023-07-28 17:29:07 +02:00
# prepare install
2024-03-26 19:13:52 +01:00
mount -o subvol=root,noatime,nodiratime /dev/mapper/crypt-system /mnt
2023-07-28 17:29:07 +02:00
# Create directories to mount file systems on
mkdir -p /mnt/{data,nix,home,boot,root,etc/nixos}
2023-09-16 17:32:38 +02:00
# mount the ESP
2023-07-28 17:29:07 +02:00
mount $DISK-part1 /mnt/boot
2024-03-26 19:13:52 +01:00
# mount volumes
mount -o subvol=data,noatime,nodiratime /dev/mapper/crypt-system /mnt/data
mount -o subvol=nix,noatime,nodiratime /dev/mapper/crypt-system /mnt/nix
2023-07-28 17:29:07 +02:00
# bind mount persistent stuff to data
mkdir -p /mnt/{data/home,data/root,data/nixos/$HOST}
mount --bind /mnt/data/home /mnt/home
mount --bind /mnt/data/root /mnt/root
mount --bind /mnt/data/nixos/$HOST /mnt/etc/nixos
2024-03-26 19:13:52 +01:00
# create fake /data to have the right paths
mkdir -p /data
mount --bind /mnt/data /data
2023-07-28 17:29:07 +02:00
# take a look
mount
# configure
nixos-generate-config --root /mnt
# save /mnt/etc/nixos/hardware-configuration.nix /mnt/etc/nixos/configuration.nix
2023-07-28 17:36:50 +02:00
cp /mnt/etc/nixos/hardware-configuration.nix /tmp
cp /mnt/etc/nixos/configuration.nix /tmp
2024-01-11 18:33:21 +01:00
# copy config data
2024-01-11 18:34:13 +01:00
sudo scp -r /data/nixos root@192.168.13.171:/mnt/data
2023-07-28 17:29:07 +02:00
# install
2024-03-26 19:13:52 +01:00
nixos-install --option experimental-features 'nix-command flakes' --no-root-passwd --root /mnt
2023-07-28 17:29:07 +02:00
2023-07-28 20:14:41 +02:00
# unmount all stuff
2024-03-26 19:13:52 +01:00
umount -Rl /data /mnt
cryptsetup luksClose crypt-system
2024-01-11 18:33:21 +01:00
# sync all /data after the install
2024-01-11 18:34:13 +01:00
sudo -E rsync -va --delete --one-file-system /data root@192.168.13.171:/
2023-07-28 20:14:41 +02:00
2024-01-12 00:04:29 +01:00
# get back the vms
sudo -E rsync -va --delete --one-file-system /home/cullmann/vms/ root@192.168.13.171:/home/cullmann/vms/
2023-09-16 16:54:02 +02:00
#
# after install tasks for extra file systems
#
2024-01-11 18:33:21 +01:00
# create vms disk
2023-07-28 20:14:41 +02:00
2024-01-11 18:33:21 +01:00
DD=/dev/disk/by-id/nvme-CT2000P5PSSD8_213330E4ED05
2023-07-28 20:14:41 +02:00
sgdisk --zap-all $DD
blkdiscard -v $DD
wipefs -a $DD
sleep 5
2024-03-26 19:13:52 +01:00
# create the crypto containers
cryptsetup luksFormat --batch-mode --verify-passphrase $DD
sleep 5
# open them, set right options persistently
cryptsetup luksOpen --allow-discards --perf-no_read_workqueue --perf-no_write_workqueue --persistent $DD crypt-vms
sleep 5
lsblk --fs
# create btrfs with fast & strong checksumming and fast mounting
mkfs.btrfs -f --csum xxhash --features block-group-tree /dev/mapper/crypt-vms
sleep 5
btrfs filesystem show
2023-07-28 20:14:41 +02:00
2024-01-11 18:33:21 +01:00
# create projects disk
2023-07-28 20:14:41 +02:00
2024-01-11 18:33:21 +01:00
DD=/dev/disk/by-id/nvme-Samsung_SSD_980_PRO_2TB_S69ENF0R846614L
2023-07-28 20:14:41 +02:00
sgdisk --zap-all $DD
blkdiscard -v $DD
wipefs -a $DD
sleep 5
2024-03-26 19:13:52 +01:00
# create the crypto containers
cryptsetup luksFormat --batch-mode --verify-passphrase $DD
sleep 5
# open them, set right options persistently
cryptsetup luksOpen --allow-discards --perf-no_read_workqueue --perf-no_write_workqueue --persistent $DD crypt-projects
sleep 5
lsblk --fs
# create btrfs with fast & strong checksumming and fast mounting
mkfs.btrfs -f --csum xxhash --features block-group-tree /dev/mapper/crypt-projects
sleep 5
btrfs filesystem show