summaryrefslogtreecommitdiff
path: root/neko/install.txt
blob: 128c2757056f7b3d7e926f24b01377874f5be410 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
# Defining some helper variables (these will be used in later code
# blocks as well, so make sure to use the same terminal session or
# redefine them later)
DISK=/dev/disk/by-id/nvme-Seagate_FireCuda_530_ZP4000GM30013_7VS01VBM
HOST=neko

# kill old data
sgdisk --zap-all $DISK
blkdiscard -v $DISK
wipefs -a $DISK
gdisk -l $DISK

# create partitions
parted $DISK -- mklabel gpt
sgdisk -n 1:0:+1024M -c 1:"EFI System Partition" -t 1:EF00 $DISK
sgdisk -n 2:0:0 -c 2:"Linux" -t 2:8e00 $DISK
parted $DISK -- set 1 boot on

sleep 5

# take a look
cat /proc/partitions

# boot partition
mkfs.fat -F 32 -n EFIBOOT $DISK-part1

# create the crypto containers
cryptsetup luksFormat --batch-mode --verify-passphrase $DISK-part2

sleep 5

# open them
cryptsetup luksOpen $DISK-part2 crypt-system

sleep 5
lsblk --fs

# create btrfs with strong checksumming and fast mounting
mkfs.btrfs -f --csum blake2 --features block-group-tree /dev/mapper/crypt-system

sleep 5
btrfs filesystem show

# create all the volumes
mount /dev/mapper/crypt-system /mnt
btrfs subvolume create /mnt/data
btrfs subvolume create /mnt/nix

sleep 5
btrfs subvolume list /mnt

# umount again, we will only use explicit subvolumes
umount /mnt

# prepare install
mount -t tmpfs none /mnt

# Create directories to mount file systems on
mkdir -p /mnt/{data,nix,home,boot,root,etc/nixos}

# Mount both of the ESP's
mount $DISK-part1 /mnt/boot

# mount volumes
mount -o subvol=data,compress=zstd,noatime /dev/mapper/crypt-system /mnt/data
mount -o subvol=nix,compress=zstd,noatime /dev/mapper/crypt-system /mnt/nix

# bind mount persistent stuff to data
mkdir -p /mnt/{data/home,data/root,data/nixos/$HOST}
mount --bind /mnt/data/home /mnt/home
mount --bind /mnt/data/root /mnt/root
mount --bind /mnt/data/nixos/$HOST /mnt/etc/nixos

# take a look
mount

# configure
nixos-generate-config --root /mnt


# save /mnt/etc/nixos/hardware-configuration.nix /mnt/etc/nixos/configuration.nix

cp /mnt/etc/nixos/hardware-configuration.nix /tmp
cp /mnt/etc/nixos/configuration.nix /tmp


# copy data


# install

nixos-install --no-root-passwd --root /mnt

umount -Rl /mnt
cryptsetup luksClose crypt-system