use luks with btrfs, bcachefs multi device mount is incompatible with the world

This commit is contained in:
Christoph Cullmann 2024-08-18 20:56:11 +02:00
parent e2a08a87ba
commit c9ecc529f0
No known key found for this signature in database
2 changed files with 21 additions and 11 deletions

View file

@ -14,13 +14,17 @@
fileSystems."/boot" = fileSystems."/boot" =
{ device = "/dev/disk/by-id/nvme-CT4000P3PSSD8_2325E6E63746-part1"; { device = "/dev/disk/by-id/nvme-CT4000P3PSSD8_2325E6E63746-part1";
fsType = "vfat"; fsType = "vfat";
options = [ "fmask=0022" "dmask=0022" ];
neededForBoot = true; neededForBoot = true;
}; };
# /nix encrypted bcachefs for the remaining space # /nix encrypted btrfs for the remaining space
boot.initrd.luks.devices."crypt0".device = "/dev/disk/by-id/nvme-CT4000P3PSSD8_2325E6E63746-part2";
boot.initrd.luks.devices."crypt1".device = "/dev/disk/by-id/ata-CT2000MX500SSD1_2138E5D5061F";
fileSystems."/nix" = fileSystems."/nix" =
{ device = "/dev/disk/by-id/nvme-CT4000P3PSSD8_2325E6E63746-part2:/dev/disk/by-id/ata-CT2000MX500SSD1_2138E5D5061F"; { device = "/dev/mapper/crypt0";
fsType = "bcachefs"; fsType = "btrfs";
options = [ "device=/dev/mapper/crypt1" ];
neededForBoot = true; neededForBoot = true;
}; };

View file

@ -10,10 +10,6 @@ passwd
# install script below # install script below
# #
# fix unlocking https://nixos.wiki/wiki/Bcachefs
nix-env -iA nixos.keyutils
keyctl link @u @s
# #
# kill old efi boot stuff # kill old efi boot stuff
# #
@ -68,8 +64,16 @@ mkfs.fat -F 32 -n EFIBOOT $DISK-part1
sleep 5 sleep 5
# create encrypted bcachefs over all disks, use only fast lz4 compression # create the crypto containers with proper 4k sectors
bcachefs format --block_size=4096 --errors=ro --compression=lz4 --wide_macs --acl --encrypted --fs_label=nix --discard -f $DISK-part2 $DISK2 cryptsetup luksFormat --sector-size 4096 --batch-mode --verify-passphrase $DISK-part2
cryptsetup luksFormat --sector-size 4096 --batch-mode --verify-passphrase $DISK2
# open the containers
cryptsetup luksOpen $DISK-part2 crypt0
cryptsetup luksOpen $DISK2 crypt1
# create one large btrfs on them, RAID0 with strong checksum
mkfs.btrfs -f -d raid0 -m raid0 --checksum blake2 --features block-group-tree --label nix /dev/mapper/crypt0 /dev/mapper/crypt1
sleep 5 sleep 5
@ -82,8 +86,8 @@ mkdir -p /mnt/{nix,home,boot,root,etc/nixos}
# mount the ESP # mount the ESP
mount $DISK-part1 /mnt/boot mount $DISK-part1 /mnt/boot
# mount large bcachefs # mount large btrfs
mount -t bcachefs $DISK-part2:$DISK2 /mnt/nix mount -t btrfs /dev/mapper/crypt0 -o device=/dev/mapper/crypt1 /mnt/nix
# ensure tmp fills not the RAM # ensure tmp fills not the RAM
mkdir -p /mnt/tmp /mnt/nix/tmp mkdir -p /mnt/tmp /mnt/nix/tmp
@ -118,6 +122,8 @@ nixos-install --option experimental-features 'nix-command flakes' --no-root-pass
# unmount all stuff and sync # unmount all stuff and sync
umount -Rl /nix/data /mnt umount -Rl /nix/data /mnt
cryptsetup luksClose crypt0
cryptsetup luksClose crypt1
sync sync
# sync all /data after the install # sync all /data after the install