# # enable ssh for root # sudo bash passwd # # kill old efi boot stuff # efibootmgr efibootmgr -b 0 -B efibootmgr -b 1 -B efibootmgr -b 2 -B efibootmgr -b 3 -B efibootmgr -b 4 -B efibootmgr # # install script below # # Defining some helper variables (these will be used in later code # blocks as well, so make sure to use the same terminal session or # redefine them later) DISK=/dev/disk/by-id/nvme-CT4000P3PSSD8_2325E6E63746 HOST=mini # ensure 4k sector size nvme format --lbaf=1 --force $DISK nvme id-ns -H $DISK sleep 5 # kill old data sgdisk --zap-all $DISK blkdiscard -v $DISK wipefs -a $DISK gdisk -l $DISK # create partitions parted $DISK -- mklabel gpt sgdisk -n 1:0:+1024M -c 1:"EFI System Partition" -t 1:EF00 $DISK sgdisk -n 2:0:0 -c 2:"Linux" -t 2:8e00 $DISK parted $DISK -- set 1 boot on sleep 5 # take a look cat /proc/partitions # boot partition mkfs.fat -F 32 -n EFIBOOT $DISK-part1 # create the crypto containers cryptsetup luksFormat --sector-size 4096 --batch-mode --verify-passphrase $DISK-part2 sleep 5 # open them, set right options persistently cryptsetup luksOpen --allow-discards --perf-no_read_workqueue --perf-no_write_workqueue --persistent $DISK-part2 crypt-system sleep 5 lsblk --fs # create btrfs with fast & strong checksumming and fast mounting mkfs.btrfs -f --csum xxhash --features block-group-tree /dev/mapper/crypt-system sleep 5 btrfs filesystem show # create all the volumes mount /dev/mapper/crypt-system /mnt btrfs subvolume create /mnt/data btrfs subvolume create /mnt/nix btrfs subvolume create /mnt/root sleep 5 btrfs subvolume list /mnt # umount again, we will only use explicit subvolumes umount /mnt # prepare install mount -o subvol=root,noatime,nodiratime /dev/mapper/crypt-system /mnt # Create directories to mount file systems on mkdir -p /mnt/{data,nix,home,boot,root,etc/nixos} # mount the ESP mount $DISK-part1 /mnt/boot # mount volumes mount -o subvol=data,noatime,nodiratime /dev/mapper/crypt-system /mnt/data mount -o subvol=nix,noatime,nodiratime /dev/mapper/crypt-system /mnt/nix # bind mount persistent stuff to data mkdir -p /mnt/{data/home,data/root,data/nixos/$HOST} mount --bind /mnt/data/home /mnt/home mount --bind /mnt/data/root /mnt/root mount --bind /mnt/data/nixos/$HOST /mnt/etc/nixos # create fake /data to have the right paths mkdir -p /data mount --bind /mnt/data /data # take a look mount # configure nixos-generate-config --root /mnt # save /mnt/etc/nixos/hardware-configuration.nix /mnt/etc/nixos/configuration.nix cp /mnt/etc/nixos/hardware-configuration.nix /tmp cp /mnt/etc/nixos/configuration.nix /tmp # copy config data sudo scp -r /data/nixos root@192.168.13.100:/mnt/data # install nixos-install --option experimental-features 'nix-command flakes' --no-root-passwd --root /mnt # unmount all stuff umount -Rl /data /mnt cryptsetup luksClose crypt-system # sync all /data after the install sudo -E rsync -va --delete --one-file-system /data root@192.168.13.100:/ # # after install tasks for extra file systems # # create vms disk DD=/dev/disk/by-id/ata-CT2000MX500SSD1_2138E5D5061F sgdisk --zap-all $DD blkdiscard -v $DD wipefs -a $DD sleep 5 # create the crypto containers cryptsetup luksFormat --batch-mode --verify-passphrase $DD sleep 5 # open them, set right options persistently cryptsetup luksOpen --allow-discards --perf-no_read_workqueue --perf-no_write_workqueue --persistent $DD crypt-vms sleep 5 lsblk --fs # create btrfs with fast & strong checksumming and fast mounting mkfs.btrfs -f --csum xxhash --features block-group-tree /dev/mapper/crypt-vms sleep 5 btrfs filesystem show