126 lines
2.5 KiB
Plaintext
126 lines
2.5 KiB
Plaintext
#
|
|
# enable ssh for root
|
|
#
|
|
|
|
sudo bash
|
|
systemctl start sshd
|
|
passwd
|
|
|
|
# get wlan
|
|
nmtui
|
|
|
|
#
|
|
# install script below
|
|
#
|
|
|
|
#
|
|
# kill old efi boot stuff
|
|
#
|
|
|
|
efibootmgr
|
|
efibootmgr -b 0 -B
|
|
efibootmgr -b 1 -B
|
|
efibootmgr -b 2 -B
|
|
efibootmgr -b 3 -B
|
|
efibootmgr -b 4 -B
|
|
efibootmgr
|
|
|
|
# host name to use
|
|
HOST=beta
|
|
|
|
# disks to use
|
|
DISK=/dev/disk/by-id/nvme-SAMSUNG_MZVLB1T0HBLR-000L2_S4DZNX0R362286
|
|
|
|
# create partition table on all disks and EFI partition
|
|
for D in $DISK; do
|
|
# kill old data
|
|
sgdisk --zap-all $D
|
|
blkdiscard -v $D
|
|
wipefs -a $D
|
|
sleep 5
|
|
|
|
# create partitions
|
|
parted $D -- mklabel gpt
|
|
sgdisk -n 1:0:+1024M -c 1:"EFI System Partition" -t 1:EF00 $D
|
|
sgdisk -n 2:0:0 -c 2:"Linux" -t 2:8e00 $D
|
|
parted $D -- set 1 boot on
|
|
sleep 5
|
|
|
|
# boot partition
|
|
mkfs.fat -F 32 -n EFIBOOT $D-part1
|
|
sleep 5
|
|
done
|
|
|
|
# take a look at the partitions
|
|
lsblk
|
|
|
|
# create the LUKS container and open it
|
|
cryptsetup luksFormat --sector-size 4096 --batch-mode --verify-passphrase $DISK-part2
|
|
cryptsetup luksOpen $DISK-part2 crypt-system
|
|
sleep 5
|
|
|
|
# take a look at the partitions
|
|
lsblk
|
|
|
|
# create btrfs with volumes
|
|
mkfs.btrfs -f --features block-group-tree --label system /dev/mapper/crypt-system
|
|
mount -t btrfs /dev/mapper/crypt-system /mnt
|
|
btrfs subvolume create /mnt/data
|
|
btrfs subvolume create /mnt/nix
|
|
btrfs subvolume create /mnt/tmp
|
|
umount /mnt
|
|
sleep 5
|
|
|
|
# take a look at the partitions
|
|
lsblk
|
|
|
|
# prepare install, tmpfs root
|
|
mount -t tmpfs none /mnt
|
|
|
|
# Create directories to mount file systems on
|
|
mkdir -p /mnt/{data,nix,boot,root,etc/nixos,tmp}
|
|
|
|
# mount the ESP
|
|
mount $DISK-part1 /mnt/boot
|
|
|
|
# mount volumes
|
|
mount -o subvol=data,noatime /dev/mapper/crypt-system /mnt/data
|
|
mount -o subvol=nix,noatime /dev/mapper/crypt-system /mnt/nix
|
|
mount -o subvol=tmp,noatime /dev/mapper/crypt-system /mnt/tmp
|
|
|
|
# bind mount persistent stuff to data
|
|
mkdir -p /mnt/data/{root,nixos/$HOST}
|
|
mount --bind /mnt/data/root /mnt/root
|
|
mount --bind /mnt/data/nixos/$HOST /mnt/etc/nixos
|
|
|
|
# create fake /data to have the right paths
|
|
mkdir -p /data
|
|
mount --bind /mnt/data /data
|
|
|
|
# take a look
|
|
mount
|
|
|
|
# configure
|
|
nixos-generate-config --root /mnt
|
|
|
|
# check /mnt/etc/nixos/hardware-configuration.nix /mnt/etc/nixos/configuration.nix
|
|
|
|
# copy config data from another machine including secrets
|
|
|
|
doas scp -r /data/nixos root@192.168.13.102:/mnt/data
|
|
|
|
# install
|
|
|
|
nixos-install --option experimental-features 'nix-command flakes' --no-root-passwd --root /mnt
|
|
|
|
# unmount all stuff and sync
|
|
|
|
umount -Rl /data /mnt
|
|
cryptsetup luksClose crypt-system
|
|
mdadm --stop /dev/md/system
|
|
sync
|
|
|
|
# shutdown once
|
|
|
|
shutdown now
|