2024-01-06 01:19:35 +01:00
|
|
|
|
<!--
|
|
|
|
|
SPDX-FileCopyrightText: 2020-2024 Simon Bruder <simon@sbruder.de>
|
|
|
|
|
|
|
|
|
|
SPDX-License-Identifier: CC-BY-SA-4.0
|
|
|
|
|
-->
|
|
|
|
|
|
2020-08-22 17:44:39 +02:00
|
|
|
|
# NixOS configuration
|
|
|
|
|
|
2021-01-27 21:55:04 +01:00
|
|
|
|
## Structure
|
|
|
|
|
|
|
|
|
|
* `machines`: Machine-specific configuration
|
|
|
|
|
+ `README.md`: Short overview of the hardware and usage of the machine
|
|
|
|
|
+ `configuration.nix`: Main configuration
|
|
|
|
|
+ `hardware-configuration.nix`: Hardware-specific configuration. It should
|
|
|
|
|
not depend on any modules or files from this repository, since it is used
|
|
|
|
|
for initial setup.
|
2021-03-01 13:54:18 +01:00
|
|
|
|
+ `services`: Non-trivial machine-specific configuration related to a
|
|
|
|
|
specific service the machine provides.
|
2021-03-01 13:54:41 +01:00
|
|
|
|
+ `secrets`: Nix expressions that include information that is not meant to
|
|
|
|
|
be visible to everyone (e.g. accounts, password hashes, private
|
2021-04-02 17:46:07 +02:00
|
|
|
|
information etc.) or secrets for services that don’t provide any other
|
|
|
|
|
(easy) way of specifying them and whose secrets leaking does not pose a
|
|
|
|
|
huge threat
|
2021-01-27 21:55:04 +01:00
|
|
|
|
* `modules`: Custom modules. Many are activated by default, since I want them
|
|
|
|
|
on all systems.
|
|
|
|
|
* `pkgs`: My nixpkgs overlay
|
|
|
|
|
* `users/simon`: [home-manager](https://github.com/nix-community/home-manager)
|
|
|
|
|
configuration
|
|
|
|
|
|
2021-03-01 15:27:18 +01:00
|
|
|
|
Secrets are managed with [sops-nix](https://github.com/Mic92/sops-nix).
|
2021-01-27 21:55:04 +01:00
|
|
|
|
|
2021-05-04 21:37:52 +02:00
|
|
|
|
Machines can be deployed with `nix run .#deploy/hostname`, LUKS encrypted
|
|
|
|
|
systems can be unlocked over network with `nix run .#unlock/hostname`.
|
|
|
|
|
|
2020-08-22 17:44:39 +02:00
|
|
|
|
## How to install
|
|
|
|
|
|
2021-01-27 21:55:04 +01:00
|
|
|
|
This guide describes how to install this configuration with GPT and BIOS boot.
|
|
|
|
|
It is not a one-fits-all guide, but the base for what I use for interactive
|
|
|
|
|
systems. Servers and specialised systems may need a different setup (e. g. swap
|
|
|
|
|
with random luks passphrase and no LVM).
|
2020-08-22 17:44:39 +02:00
|
|
|
|
|
2021-01-27 21:55:04 +01:00
|
|
|
|
Set up wifi if no wired connection is available:
|
2020-08-24 11:11:23 +02:00
|
|
|
|
|
2022-06-09 17:38:24 +02:00
|
|
|
|
systemctl start wpa_supplicant
|
|
|
|
|
wpa-cli
|
|
|
|
|
add_network
|
|
|
|
|
set_network 0 ssid "SSID"
|
|
|
|
|
set_network 0 psk "PSK"
|
|
|
|
|
set_network 0 key_mgmt WPA-PSK
|
|
|
|
|
enable_network 0
|
2020-08-24 11:11:23 +02:00
|
|
|
|
|
2021-01-27 21:55:04 +01:00
|
|
|
|
Create the partition table (enter the indented lines in the repl):
|
2020-08-22 17:44:39 +02:00
|
|
|
|
|
2023-05-24 16:28:21 +02:00
|
|
|
|
parted /dev/nvmeXnY
|
|
|
|
|
mktable GPT
|
|
|
|
|
mkpart ESP 1MiB 512MiB
|
|
|
|
|
mkpart root 512MiB 100%
|
|
|
|
|
set 1 esp on
|
|
|
|
|
quit
|
|
|
|
|
|
|
|
|
|
On MBR:
|
|
|
|
|
|
2021-01-27 21:55:04 +01:00
|
|
|
|
parted /dev/sdX
|
2020-08-22 17:44:39 +02:00
|
|
|
|
mktable GPT
|
|
|
|
|
mkpart primary 1MiB 2MiB
|
2024-01-02 22:23:53 +01:00
|
|
|
|
mkpart primary 2MiB 512MiB
|
|
|
|
|
mkpart primary 512MiB 100%
|
2020-08-22 17:44:39 +02:00
|
|
|
|
set 1 bios_grub on
|
|
|
|
|
disk_toggle pmbr_boot
|
|
|
|
|
quit
|
|
|
|
|
|
2021-01-27 21:55:04 +01:00
|
|
|
|
Format encrypted partition and open it:
|
2020-08-22 17:44:39 +02:00
|
|
|
|
|
2023-05-24 16:28:21 +02:00
|
|
|
|
cryptsetup luksFormat --type luks2 /dev/nvmeXnYp2
|
2023-07-01 12:01:36 +02:00
|
|
|
|
cryptsetup open /dev/nvmeXnYp2 HOSTNAME-pv
|
2020-08-22 17:44:39 +02:00
|
|
|
|
|
2021-01-27 21:55:04 +01:00
|
|
|
|
Create LVM (replace `8G` with desired swap size):
|
2020-08-22 17:44:39 +02:00
|
|
|
|
|
2021-01-27 21:55:04 +01:00
|
|
|
|
pvcreate /dev/mapper/HOSTNAME-pv
|
|
|
|
|
vgcreate HOSTNAME-vg /dev/mapper/HOSTNAME-pv
|
|
|
|
|
lvcreate -L 8G -n swap HOSTNAME-vg
|
|
|
|
|
lvcreate -l '100%FREE' -n root HOSTNAME-vg
|
2020-08-22 17:44:39 +02:00
|
|
|
|
|
|
|
|
|
**Hint**: If you have to reboot to the installation system later because
|
|
|
|
|
something went wrong and you need access to the LVM (but don’t know LVM), do
|
2021-01-27 21:55:04 +01:00
|
|
|
|
the following after opening the luks partition: `vgchange -ay`.
|
2020-08-22 17:44:39 +02:00
|
|
|
|
|
2021-01-27 21:55:04 +01:00
|
|
|
|
Create filesystems:
|
2020-08-22 17:44:39 +02:00
|
|
|
|
|
2023-05-24 16:28:21 +02:00
|
|
|
|
mkfs.fat -F 32 -n boot /dev/nvmeXnYpZ
|
2021-05-04 21:37:52 +02:00
|
|
|
|
mkfs.btrfs -L root /dev/HOSTNAME-vg/root
|
2021-01-27 21:55:04 +01:00
|
|
|
|
mkswap -L swap /dev/HOSTNAME-vg/swap
|
2020-08-22 17:44:39 +02:00
|
|
|
|
|
2023-05-24 16:28:21 +02:00
|
|
|
|
On MBR:
|
2021-10-05 19:16:39 +02:00
|
|
|
|
|
2023-05-24 16:28:21 +02:00
|
|
|
|
mkfs.ext2 /dev/sdX2
|
2021-10-05 19:16:39 +02:00
|
|
|
|
mkfs.btrfs -L root /dev/HOSTNAME-vg/root
|
|
|
|
|
mkswap -L swap /dev/HOSTNAME-vg/swap
|
|
|
|
|
|
2021-01-27 21:55:04 +01:00
|
|
|
|
Mount the file systems and activate swap:
|
2020-08-22 17:44:39 +02:00
|
|
|
|
|
2023-07-01 12:01:36 +02:00
|
|
|
|
mount -o compress=zstd /dev/HOSTNAME-vg/root /mnt
|
2021-01-27 21:55:04 +01:00
|
|
|
|
mkdir /mnt/boot
|
2023-05-24 16:28:21 +02:00
|
|
|
|
mount /dev/nvmeXnYp1 /mnt/boot
|
2021-01-27 21:55:04 +01:00
|
|
|
|
swapon /dev/HOSTNAME-vg/swap
|
2020-08-22 17:44:39 +02:00
|
|
|
|
|
2020-08-30 10:03:48 +02:00
|
|
|
|
Generate hardware configuration and copy hardware configuration to machine
|
2021-01-27 21:55:04 +01:00
|
|
|
|
configuration (skip this step if you already have a hardware-configuration for
|
|
|
|
|
this machine):
|
|
|
|
|
|
|
|
|
|
nixos-generate-config --root /mnt/
|
2020-08-22 17:44:39 +02:00
|
|
|
|
|
2021-05-04 21:37:52 +02:00
|
|
|
|
Modify the hardware configuration as needed and add it to the machine
|
|
|
|
|
configuration in this repository. If necessary, create the machine
|
|
|
|
|
configuration first by basing it on an already existing configuration and
|
|
|
|
|
adding an entry to `machines/default.nix`. Then copy this repository to the
|
|
|
|
|
target machine and run (`--impure` is needed since `/mnt/nix/store` is not in
|
|
|
|
|
`/nix/store`):
|
2020-08-22 17:44:39 +02:00
|
|
|
|
|
2022-03-26 13:05:20 +01:00
|
|
|
|
nixos-install --no-channel-copy --impure --flake /path/to/repository#hostname
|
2020-08-22 17:44:39 +02:00
|
|
|
|
|
2021-01-27 21:55:04 +01:00
|
|
|
|
Add the krops sentinel file:
|
2020-08-22 17:44:39 +02:00
|
|
|
|
|
2021-01-27 21:55:04 +01:00
|
|
|
|
mkdir -p /mnt/var/src
|
|
|
|
|
touch /mnt/var/src/.populate
|
2020-08-22 17:44:39 +02:00
|
|
|
|
|
2021-05-04 21:37:52 +02:00
|
|
|
|
Reboot.
|
2020-08-22 17:44:39 +02:00
|
|
|
|
|
|
|
|
|
## License
|
|
|
|
|
|
2024-01-06 01:19:35 +01:00
|
|
|
|
This repository is [REUSE](https://reuse.software/) compliant.
|
|
|
|
|
To get the most correct licensing information,
|
|
|
|
|
please consult the link:https://reuse.software/spec/[REUSE specification]
|
|
|
|
|
or use a tool that parses it.
|
|
|
|
|
|
|
|
|
|
As a rule of thumb,
|
|
|
|
|
most code files are released under the `AGPL-3.0-or-later`,
|
|
|
|
|
most generated files are specified as `CC0-1.0` (as they are not copyrightable)
|
|
|
|
|
and small independent scripts are licensed under `Apache-2.0`.
|
|
|
|
|
However, there are deviations from this,
|
|
|
|
|
so always consult the file header and other resources as specified in the REUSE specification.
|
|
|
|
|
|
|
|
|
|
Please note that those licensing terms only apply to the source files in this repository,
|
|
|
|
|
not any build outputs, like system or package closures.
|
|
|
|
|
They might be licensed differently, depending on their source.
|