bcachefs install scripty

This commit is contained in:
Christoph Cullmann 2024-01-10 18:58:31 +01:00
parent ab59cc9d4b
commit c37e8dd8be

View file

@ -19,7 +19,8 @@ gdisk -l $DISK
# create partitions # create partitions
parted $DISK -- mklabel gpt parted $DISK -- mklabel gpt
sgdisk -n 1:0:+1024M -c 1:"EFI System Partition" -t 1:EF00 $DISK sgdisk -n 1:0:+1024M -c 1:"EFI System Partition" -t 1:EF00 $DISK
sgdisk -n 2:0:0 -c 2:"Linux" -t 2:8e00 $DISK sgdisk -n 2:0:+256G -c 2:"nix" -t 2:8e00 $DISK
sgdisk -n 3:0:0 -c 3:"data" -t 3:8e00 $DISK
parted $DISK -- set 1 boot on parted $DISK -- set 1 boot on
sleep 5 sleep 5
@ -30,33 +31,9 @@ cat /proc/partitions
# boot partition # boot partition
mkfs.fat -F 32 -n EFIBOOT $DISK-part1 mkfs.fat -F 32 -n EFIBOOT $DISK-part1
# create the crypto containers # create encrypted bcachefs
cryptsetup luksFormat --sector-size 4096 --batch-mode --verify-passphrase $DISK-part2 bcachefs format --block_size=4096 --errors=ro --metadata_checksum=xxhash --data_checksum=xxhash --compression=lz4 --wide_macs --acl --encrypted --fs_label=nix --discard -f $DISK-part2
bcachefs format --block_size=4096 --errors=ro --metadata_checksum=xxhash --data_checksum=xxhash --compression=lz4 --wide_macs --acl --encrypted --fs_label=data --discard -f $DISK-part3
sleep 5
# open them, set right options persistently
cryptsetup luksOpen --allow-discards --perf-no_read_workqueue --perf-no_write_workqueue --persistent $DISK-part2 crypt-system
sleep 5
lsblk --fs
# create btrfs with fast & strong checksumming and fast mounting
mkfs.btrfs -f --csum xxhash --features block-group-tree /dev/mapper/crypt-system
sleep 5
btrfs filesystem show
# create all the volumes
mount /dev/mapper/crypt-system /mnt
btrfs subvolume create /mnt/data
btrfs subvolume create /mnt/nix
sleep 5
btrfs subvolume list /mnt
# umount again, we will only use explicit subvolumes
umount /mnt
# prepare install # prepare install
mount -t tmpfs none /mnt mount -t tmpfs none /mnt
@ -67,9 +44,9 @@ mkdir -p /mnt/{data,nix,home,boot,root,etc/nixos}
# mount the ESP # mount the ESP
mount $DISK-part1 /mnt/boot mount $DISK-part1 /mnt/boot
# mount volumes # mount bcachefs stuff
mount -o subvol=data,noatime,nodiratime /dev/mapper/crypt-system /mnt/data mount -o noatime,nodiratime $DISK-part2 /mnt/nix
mount -o subvol=nix,noatime,nodiratime /dev/mapper/crypt-system /mnt/nix mount -o noatime,nodiratime $DISK-part3 /mnt/data
# bind mount persistent stuff to data # bind mount persistent stuff to data
mkdir -p /mnt/{data/home,data/root,data/nixos/$HOST} mkdir -p /mnt/{data/home,data/root,data/nixos/$HOST}
@ -114,19 +91,5 @@ wipefs -a $DD
sleep 5 sleep 5
# create the crypto containers # create encrypted bcachefs
cryptsetup luksFormat --batch-mode --verify-passphrase $DD bcachefs format --block_size=4096 --errors=ro --metadata_checksum=xxhash --data_checksum=xxhash --compression=lz4 --wide_macs --acl --encrypted --fs_label=vms --discard -f $DD
sleep 5
# open them, set right options persistently
cryptsetup luksOpen --allow-discards --perf-no_read_workqueue --perf-no_write_workqueue --persistent $DD crypt-vms
sleep 5
lsblk --fs
# create btrfs with fast & strong checksumming and fast mounting
mkfs.btrfs -f --csum xxhash --features block-group-tree /dev/mapper/crypt-vms
sleep 5
btrfs filesystem show