# # enable ssh for root # sudo bash systemctl start sshd passwd # # install script below # # # kill old efi boot stuff # efibootmgr efibootmgr -b 0 -B efibootmgr -b 1 -B efibootmgr -b 2 -B efibootmgr -b 3 -B efibootmgr -b 4 -B efibootmgr # host name to use HOST=neko # disks to use DISK=/dev/disk/by-id/nvme-Seagate_FireCuda_530_ZP4000GM30013_7VS01VBM DISK2=/dev/disk/by-id/nvme-CT2000P5PSSD8_213330E4ED05 DISK3=/dev/disk/by-id/nvme-Samsung_SSD_980_PRO_2TB_S69ENF0R846614L # ensure 4k sector size nvme format --lbaf=1 --force $DISK nvme id-ns -H $DISK sleep 5 # create partition table on all disks and EFI partition for D in $DISK $DISK2 $DISK3; do # kill old data sgdisk --zap-all $D blkdiscard -v $D wipefs -a $D sleep 5 # create partitions parted $D -- mklabel gpt sgdisk -n 1:0:+1024M -c 1:"EFI System Partition" -t 1:EF00 $D sgdisk -n 2:0:0 -c 2:"Linux" -t 2:8e00 $D parted $D -- set 1 boot on sleep 5 # boot partition mkfs.fat -F 32 -n EFIBOOT $D-part1 sleep 5 done # take a look at the partitions lsblk # create the RAID-0, second partitions on all disks mdadm --create --verbose --level=0 --raid-devices=3 /dev/md/system $DISK-part2 $DISK2-part2 $DISK3-part2 sleep 5 # take a look at the partitions lsblk # create the LUKS container and open it cryptsetup luksFormat --sector-size 4096 --batch-mode --verify-passphrase /dev/md/system cryptsetup luksOpen /dev/md/system crypt-system sleep 5 # take a look at the partitions lsblk # create btrfs with volumes mkfs.btrfs -f --features block-group-tree --label system /dev/mapper/crypt-system mount -t btrfs /dev/mapper/crypt-system /mnt btrfs subvolume create /mnt/data btrfs subvolume create /mnt/nix btrfs subvolume create /mnt/tmp umount /mnt sleep 5 # take a look at the partitions lsblk # prepare install, tmpfs root mount -t tmpfs none /mnt # Create directories to mount file systems on mkdir -p /mnt/{data,nix,boot,root,etc/nixos,tmp} # mount the ESP mount $DISK-part1 /mnt/boot # mount volumes mount -o subvol=data,noatime /dev/mapper/crypt-system /mnt/data mount -o subvol=nix,noatime /dev/mapper/crypt-system /mnt/nix mount -o subvol=tmp,noatime /dev/mapper/crypt-system /mnt/tmp # bind mount persistent stuff to data mkdir -p /mnt/data/{root,nixos/$HOST} mount --bind /mnt/data/root /mnt/root mount --bind /mnt/data/nixos/$HOST /mnt/etc/nixos # create fake /data to have the right paths mkdir -p /data mount --bind /mnt/data /data # take a look mount # configure nixos-generate-config --root /mnt # check /mnt/etc/nixos/hardware-configuration.nix /mnt/etc/nixos/configuration.nix # copy config data from another machine including secrets sudo scp -r /data/nixos root@192.168.13.171:/mnt/data # install nixos-install --option experimental-features 'nix-command flakes' --no-root-passwd --root /mnt # unmount all stuff and sync umount -Rl /data /mnt cryptsetup luksClose crypt-system sync # shutdown once shutdown -h now # sync all /data after the install sudo -E rsync -va --delete --one-file-system /data/ root@192.168.13.171:/data/