neko bcachefs
This commit is contained in:
parent
c79bf35232
commit
fd2e2d216b
|
@ -13,74 +13,69 @@
|
||||||
fileSystems."/" =
|
fileSystems."/" =
|
||||||
{ device = "none";
|
{ device = "none";
|
||||||
fsType = "tmpfs";
|
fsType = "tmpfs";
|
||||||
|
neededForBoot = true;
|
||||||
options = [ "defaults" "size=8G" "mode=755" ];
|
options = [ "defaults" "size=8G" "mode=755" ];
|
||||||
};
|
};
|
||||||
|
|
||||||
fileSystems."/boot" =
|
fileSystems."/boot" =
|
||||||
{ device = "/dev/disk/by-uuid/909C-CE7E";
|
{ device = "/dev/disk/by-id/nvme-Seagate_FireCuda_530_ZP4000GM30013_7VS01VBM-part1";
|
||||||
fsType = "vfat";
|
fsType = "vfat";
|
||||||
|
neededForBoot = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
# system
|
|
||||||
boot.initrd.luks.devices."crypt-system".device = "/dev/disk/by-uuid/27c4619d-4e60-458e-95ad-e348a7894a14";
|
|
||||||
|
|
||||||
# projects
|
|
||||||
boot.initrd.luks.devices."crypt-projects".device = "/dev/disk/by-id/nvme-Samsung_SSD_980_PRO_2TB_S69ENF0R846614L";
|
|
||||||
|
|
||||||
# vms
|
|
||||||
boot.initrd.luks.devices."crypt-vms".device = "/dev/disk/by-id/nvme-CT2000P5PSSD8_213330E4ED05";
|
|
||||||
|
|
||||||
fileSystems."/nix" =
|
fileSystems."/nix" =
|
||||||
{ device = "/dev/mapper/crypt-system";
|
{ device = "/dev/disk/by-id/nvme-Seagate_FireCuda_530_ZP4000GM30013_7VS01VBM-part2";
|
||||||
fsType = "btrfs";
|
fsType = "bcachefs";
|
||||||
options = [ "subvol=nix" "noatime" "nodiratime" ];
|
neededForBoot = true;
|
||||||
|
options = [ "noatime" "nodiratime" ];
|
||||||
};
|
};
|
||||||
|
|
||||||
fileSystems."/data" =
|
fileSystems."/data" =
|
||||||
{ device = "/dev/mapper/crypt-system";
|
{ device = "/dev/disk/by-id/nvme-Seagate_FireCuda_530_ZP4000GM30013_7VS01VBM-part3";
|
||||||
fsType = "btrfs";
|
fsType = "bcachefs";
|
||||||
options = [ "subvol=data" "noatime" "nodiratime" ];
|
neededForBoot = true;
|
||||||
|
options = [ "noatime" "nodiratime" ];
|
||||||
};
|
};
|
||||||
|
|
||||||
fileSystems."/home" =
|
fileSystems."/home" =
|
||||||
{
|
{ device = "/data/home";
|
||||||
depends = [ "/data" ];
|
|
||||||
device = "/data/home";
|
|
||||||
fsType = "none";
|
fsType = "none";
|
||||||
|
neededForBoot = true;
|
||||||
options = [ "bind" ];
|
options = [ "bind" ];
|
||||||
|
depends = [ "/data" ];
|
||||||
};
|
};
|
||||||
|
|
||||||
fileSystems."/root" =
|
fileSystems."/root" =
|
||||||
{
|
{ device = "/data/root";
|
||||||
depends = [ "/data" ];
|
|
||||||
device = "/data/root";
|
|
||||||
fsType = "none";
|
fsType = "none";
|
||||||
|
neededForBoot = true;
|
||||||
options = [ "bind" ];
|
options = [ "bind" ];
|
||||||
|
depends = [ "/data" ];
|
||||||
};
|
};
|
||||||
|
|
||||||
fileSystems."/etc/nixos" =
|
fileSystems."/etc/nixos" =
|
||||||
{
|
{ device = "/data/nixos/neko";
|
||||||
depends = [ "/data" ];
|
|
||||||
device = "/data/nixos/neko";
|
|
||||||
fsType = "none";
|
fsType = "none";
|
||||||
|
neededForBoot = true;
|
||||||
options = [ "bind" ];
|
options = [ "bind" ];
|
||||||
|
depends = [ "/data" ];
|
||||||
};
|
};
|
||||||
|
|
||||||
fileSystems."/home/cullmann/projects" =
|
# fileSystems."/home/cullmann/vms" =
|
||||||
{
|
# { device = "/dev/disk/by-id/nvme-CT2000P5PSSD8_213330E4ED05";
|
||||||
depends = [ "/home" ];
|
# fsType = "bcachefs";
|
||||||
device = "/dev/mapper/crypt-projects";
|
# neededForBoot = true;
|
||||||
fsType = "btrfs";
|
# options = [ "noatime" "nodiratime" ];
|
||||||
options = [ "noatime" "nodiratime" ];
|
# depends = [ "/home" ];
|
||||||
};
|
# };
|
||||||
|
#
|
||||||
fileSystems."/home/cullmann/vms" =
|
# fileSystems."/home/cullmann/projects" =
|
||||||
{
|
# { device = "/dev/disk/by-id/nvme-Samsung_SSD_980_PRO_2TB_S69ENF0R846614L";
|
||||||
depends = [ "/home" ];
|
# fsType = "bcachefs";
|
||||||
device = "/dev/mapper/crypt-vms";
|
# neededForBoot = true;
|
||||||
fsType = "btrfs";
|
# options = [ "noatime" "nodiratime" ];
|
||||||
options = [ "noatime" "nodiratime" ];
|
# depends = [ "/home" ];
|
||||||
};
|
# };
|
||||||
|
|
||||||
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
||||||
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
||||||
|
|
120
neko/install.txt
120
neko/install.txt
|
@ -1,3 +1,23 @@
|
||||||
|
#
|
||||||
|
# kill old efi boot stuff
|
||||||
|
#
|
||||||
|
|
||||||
|
efibootmgr
|
||||||
|
efibootmgr -b 0 -B
|
||||||
|
efibootmgr -b 1 -B
|
||||||
|
efibootmgr -b 2 -B
|
||||||
|
efibootmgr -b 3 -B
|
||||||
|
efibootmgr -b 4 -B
|
||||||
|
efibootmgr
|
||||||
|
|
||||||
|
#
|
||||||
|
# install script below
|
||||||
|
#
|
||||||
|
|
||||||
|
# fix unlocking https://nixos.wiki/wiki/Bcachefs
|
||||||
|
nix-env -iA nixos.keyutils
|
||||||
|
keyctl link @u @s
|
||||||
|
|
||||||
# Defining some helper variables (these will be used in later code
|
# Defining some helper variables (these will be used in later code
|
||||||
# blocks as well, so make sure to use the same terminal session or
|
# blocks as well, so make sure to use the same terminal session or
|
||||||
# redefine them later)
|
# redefine them later)
|
||||||
|
@ -19,7 +39,8 @@ gdisk -l $DISK
|
||||||
# create partitions
|
# create partitions
|
||||||
parted $DISK -- mklabel gpt
|
parted $DISK -- mklabel gpt
|
||||||
sgdisk -n 1:0:+1024M -c 1:"EFI System Partition" -t 1:EF00 $DISK
|
sgdisk -n 1:0:+1024M -c 1:"EFI System Partition" -t 1:EF00 $DISK
|
||||||
sgdisk -n 2:0:0 -c 2:"Linux" -t 2:8e00 $DISK
|
sgdisk -n 2:0:+256G -c 2:"nix" -t 2:8e00 $DISK
|
||||||
|
sgdisk -n 3:0:0 -c 3:"data" -t 3:8e00 $DISK
|
||||||
parted $DISK -- set 1 boot on
|
parted $DISK -- set 1 boot on
|
||||||
|
|
||||||
sleep 5
|
sleep 5
|
||||||
|
@ -30,33 +51,9 @@ cat /proc/partitions
|
||||||
# boot partition
|
# boot partition
|
||||||
mkfs.fat -F 32 -n EFIBOOT $DISK-part1
|
mkfs.fat -F 32 -n EFIBOOT $DISK-part1
|
||||||
|
|
||||||
# create the crypto containers
|
# create encrypted bcachefs
|
||||||
cryptsetup luksFormat --sector-size 4096 --batch-mode --verify-passphrase $DISK-part2
|
bcachefs format --block_size=4096 --errors=ro --metadata_checksum=xxhash --data_checksum=xxhash --compression=lz4 --wide_macs --acl --encrypted --fs_label=nix --discard -f $DISK-part2
|
||||||
|
bcachefs format --block_size=4096 --errors=ro --metadata_checksum=xxhash --data_checksum=xxhash --compression=lz4 --wide_macs --acl --encrypted --fs_label=data --discard -f $DISK-part3
|
||||||
sleep 5
|
|
||||||
|
|
||||||
# open them, set right options persistently
|
|
||||||
cryptsetup luksOpen --allow-discards --perf-no_read_workqueue --perf-no_write_workqueue --persistent $DISK-part2 crypt-system
|
|
||||||
|
|
||||||
sleep 5
|
|
||||||
lsblk --fs
|
|
||||||
|
|
||||||
# create btrfs with fast & strong checksumming and fast mounting
|
|
||||||
mkfs.btrfs -f --csum xxhash --features block-group-tree /dev/mapper/crypt-system
|
|
||||||
|
|
||||||
sleep 5
|
|
||||||
btrfs filesystem show
|
|
||||||
|
|
||||||
# create all the volumes
|
|
||||||
mount /dev/mapper/crypt-system /mnt
|
|
||||||
btrfs subvolume create /mnt/data
|
|
||||||
btrfs subvolume create /mnt/nix
|
|
||||||
|
|
||||||
sleep 5
|
|
||||||
btrfs subvolume list /mnt
|
|
||||||
|
|
||||||
# umount again, we will only use explicit subvolumes
|
|
||||||
umount /mnt
|
|
||||||
|
|
||||||
# prepare install
|
# prepare install
|
||||||
mount -t tmpfs none /mnt
|
mount -t tmpfs none /mnt
|
||||||
|
@ -67,9 +64,9 @@ mkdir -p /mnt/{data,nix,home,boot,root,etc/nixos}
|
||||||
# mount the ESP
|
# mount the ESP
|
||||||
mount $DISK-part1 /mnt/boot
|
mount $DISK-part1 /mnt/boot
|
||||||
|
|
||||||
# mount volumes
|
# mount bcachefs stuff
|
||||||
mount -o subvol=data,noatime,nodiratime /dev/mapper/crypt-system /mnt/data
|
mount -o noatime,nodiratime $DISK-part2 /mnt/nix
|
||||||
mount -o subvol=nix,noatime,nodiratime /dev/mapper/crypt-system /mnt/nix
|
mount -o noatime,nodiratime $DISK-part3 /mnt/data
|
||||||
|
|
||||||
# bind mount persistent stuff to data
|
# bind mount persistent stuff to data
|
||||||
mkdir -p /mnt/{data/home,data/root,data/nixos/$HOST}
|
mkdir -p /mnt/{data/home,data/root,data/nixos/$HOST}
|
||||||
|
@ -88,9 +85,11 @@ nixos-generate-config --root /mnt
|
||||||
cp /mnt/etc/nixos/hardware-configuration.nix /tmp
|
cp /mnt/etc/nixos/hardware-configuration.nix /tmp
|
||||||
cp /mnt/etc/nixos/configuration.nix /tmp
|
cp /mnt/etc/nixos/configuration.nix /tmp
|
||||||
|
|
||||||
# copy data
|
# copy config data
|
||||||
|
|
||||||
rsync --checksum -vaR --delete /data /mnt
|
# patch some paths there
|
||||||
|
|
||||||
|
sudo scp -r /data/nixos root@192.168.13.100:/mnt/data
|
||||||
|
|
||||||
# install
|
# install
|
||||||
|
|
||||||
|
@ -99,38 +98,15 @@ nixos-install --no-root-passwd --root /mnt
|
||||||
# unmount all stuff
|
# unmount all stuff
|
||||||
|
|
||||||
umount -Rl /mnt
|
umount -Rl /mnt
|
||||||
cryptsetup luksClose crypt-system
|
|
||||||
|
# sync all /data after the install
|
||||||
|
|
||||||
|
sudo -E rsync -va --delete --one-file-system /data root@192.168.13.100:/
|
||||||
|
|
||||||
#
|
#
|
||||||
# after install tasks for extra file systems
|
# after install tasks for extra file systems
|
||||||
#
|
#
|
||||||
|
|
||||||
# create projects disk
|
|
||||||
|
|
||||||
DD=/dev/disk/by-id/nvme-Samsung_SSD_980_PRO_2TB_S69ENF0R846614L
|
|
||||||
sgdisk --zap-all $DD
|
|
||||||
blkdiscard -v $DD
|
|
||||||
wipefs -a $DD
|
|
||||||
|
|
||||||
sleep 5
|
|
||||||
|
|
||||||
# create the crypto containers
|
|
||||||
cryptsetup luksFormat --batch-mode --verify-passphrase $DD
|
|
||||||
|
|
||||||
sleep 5
|
|
||||||
|
|
||||||
# open them, set right options persistently
|
|
||||||
cryptsetup luksOpen --allow-discards --perf-no_read_workqueue --perf-no_write_workqueue --persistent $DD crypt-projects
|
|
||||||
|
|
||||||
sleep 5
|
|
||||||
lsblk --fs
|
|
||||||
|
|
||||||
# create btrfs with fast & strong checksumming and fast mounting
|
|
||||||
mkfs.btrfs -f --csum xxhash --features block-group-tree /dev/mapper/crypt-projects
|
|
||||||
|
|
||||||
sleep 5
|
|
||||||
btrfs filesystem show
|
|
||||||
|
|
||||||
# create vms disk
|
# create vms disk
|
||||||
|
|
||||||
DD=/dev/disk/by-id/nvme-CT2000P5PSSD8_213330E4ED05
|
DD=/dev/disk/by-id/nvme-CT2000P5PSSD8_213330E4ED05
|
||||||
|
@ -140,19 +116,17 @@ wipefs -a $DD
|
||||||
|
|
||||||
sleep 5
|
sleep 5
|
||||||
|
|
||||||
# create the crypto containers
|
# create encrypted bcachefs
|
||||||
cryptsetup luksFormat --batch-mode --verify-passphrase $DD
|
bcachefs format --block_size=4096 --errors=ro --metadata_checksum=xxhash --data_checksum=xxhash --compression=lz4 --wide_macs --acl --encrypted --fs_label=vms --discard -f $DD
|
||||||
|
|
||||||
|
# create projects disk
|
||||||
|
|
||||||
|
DD=/dev/disk/by-id/nvme-Samsung_SSD_980_PRO_2TB_S69ENF0R846614L
|
||||||
|
sgdisk --zap-all $DD
|
||||||
|
blkdiscard -v $DD
|
||||||
|
wipefs -a $DD
|
||||||
|
|
||||||
sleep 5
|
sleep 5
|
||||||
|
|
||||||
# open them, set right options persistently
|
# create encrypted bcachefs
|
||||||
cryptsetup luksOpen --allow-discards --perf-no_read_workqueue --perf-no_write_workqueue --persistent $DD crypt-vms
|
bcachefs format --block_size=4096 --errors=ro --metadata_checksum=xxhash --data_checksum=xxhash --compression=lz4 --wide_macs --acl --encrypted --fs_label=projects --discard -f $DD
|
||||||
|
|
||||||
sleep 5
|
|
||||||
lsblk --fs
|
|
||||||
|
|
||||||
# create btrfs with fast & strong checksumming and fast mounting
|
|
||||||
mkfs.btrfs -f --csum xxhash --features block-group-tree /dev/mapper/crypt-vms
|
|
||||||
|
|
||||||
sleep 5
|
|
||||||
btrfs filesystem show
|
|
||||||
|
|
Loading…
Reference in a new issue