initial config for juni

This commit is contained in:
RingOfStorms (Joshua Bell) 2025-12-29 23:27:59 -06:00
parent a27c00c6ff
commit 3194f3de91
13 changed files with 1552 additions and 418 deletions

File diff suppressed because it is too large Load diff

View file

@ -1,133 +0,0 @@
{
inputs = {
nixpkgs.url = "github:nixos/nixpkgs/nixos-25.11";
home-manager.url = "github:rycee/home-manager/release-25.11";
common.url = "git+https://git.joshuabell.xyz/ringofstorms/dotfiles?dir=flakes/common";
# de_plasma.url = "path:../../../../flakes/de_plasma";
de_plasma.url = "git+https://git.joshuabell.xyz/ringofstorms/dotfiles?dir=flakes/de_plasma";
ros_neovim.url = "git+https://git.joshuabell.xyz/ringofstorms/nvim";
impermanence.url = "github:nix-community/impermanence";
};
outputs =
{
...
}@inputs:
let
configurationName = "testbed";
system = "x86_64-linux";
primaryUser = "luser";
configLocation = "/home/${primaryUser}/.config/nixos-config/utilities/nixos-installers/examples/${configurationName}";
# configLocation = "/home/${primaryUser}/.config/nixos-config/hosts/${configurationName}";
lib = inputs.nixpkgs.lib;
in
{
nixosConfigurations = {
"${configurationName}" = (
lib.nixosSystem {
inherit system;
specialArgs = {
inherit inputs;
};
modules = [
inputs.impermanence.nixosModules.impermanence
inputs.home-manager.nixosModules.default
inputs.ros_neovim.nixosModules.default
(
{ ... }:
{
ringofstorms-nvim.includeAllRuntimeDependencies = true;
}
)
inputs.de_plasma.nixosModules.default
inputs.common.nixosModules.essentials
inputs.common.nixosModules.git
inputs.common.nixosModules.tmux
inputs.common.nixosModules.boot_systemd
inputs.common.nixosModules.hardening
inputs.common.nixosModules.jetbrains_font
inputs.common.nixosModules.nix_options
inputs.common.nixosModules.no_sleep
inputs.common.nixosModules.timezone_auto
inputs.common.nixosModules.tty_caps_esc
inputs.common.nixosModules.zsh
./hardware-configuration.nix
./impermanence.nix
./test.nix
(
{
config,
pkgs,
upkgs,
lib,
...
}:
rec {
system.stateVersion = "25.05";
services.openssh.settings.PasswordAuthentication = lib.mkForce true;
ringofstorms.dePlasma = {
enable = true;
gpu.intel.enable = true;
sddm.autologinUser = "luser";
};
# Home Manager
home-manager = {
useUserPackages = true;
useGlobalPkgs = true;
backupFileExtension = "bak";
# add all normal users to home manager so it applies to them
users = lib.mapAttrs (name: user: {
home.stateVersion = "25.05";
programs.home-manager.enable = true;
}) (lib.filterAttrs (name: user: user.isNormalUser or false) users.users);
sharedModules = [
inputs.common.homeManagerModules.tmux
inputs.common.homeManagerModules.atuin
inputs.common.homeManagerModules.direnv
inputs.common.homeManagerModules.git
inputs.common.homeManagerModules.postgres_cli_options
inputs.common.homeManagerModules.starship
inputs.common.homeManagerModules.zoxide
inputs.common.homeManagerModules.zsh
];
extraSpecialArgs = {
inherit inputs;
inherit upkgs;
};
};
# System configuration
networking.hostName = configurationName;
programs.nh.flake = configLocation;
nixpkgs.config.allowUnfree = true;
users.mutableUsers = false;
users.users = {
"${primaryUser}" = {
isNormalUser = true;
hashedPassword = "$y$j9T$v1QhXiZMRY1pFkPmkLkdp0$451GvQt.XFU2qCAi4EQNd1BEqjM/CH6awU8gjcULps6"; # "test" password
extraGroups = [
"wheel"
"networkmanager"
];
openssh.authorizedKeys.keys = [
];
};
};
}
)
];
}
);
};
};
}

View file

@ -1,120 +0,0 @@
# Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{ config, lib, pkgs, modulesPath, ... }:
let
NIXBOOT = "/dev/disk/by-uuid/641A-6BDB";
NIXROOT ="/dev/disk/by-uuid/ae94db42-ec46-4e2f-a98a-118359428a68";
cryptroot = "/dev/disk/by-uuid/49f11bf1-d4b7-4188-9203-4d7a42569afa";
USB_KEY = "/dev/disk/by-uuid/9985-EBD1";
in
{
imports =
[ (modulesPath + "/installer/scan/not-detected.nix")
];
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "usb_storage" "usbhid" "sd_mod" "sdhci_pci" "ehci_pci" "uas" ];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-intel" ];
boot.extraModulePackages = [ ];
fileSystems."/boot" =
{ device = NIXBOOT;
fsType = "vfat";
options = [ "fmask=0077" "dmask=0077" ];
};
boot.initrd.luks.devices."cryptroot" = {
device = NIXROOT;
# Auto decrypt
keyFile = USB_KEY;
keyFileSize = 5000;
keyFileOffset = 5443;
tryEmptyPassphrase = true;
fallbackToPassword = true;
crypttabExtraOpts = [ "tries=2" ];
};
fileSystems."/" =
{ device = cryptroot;
fsType = "btrfs";
options = [ "subvol=@root" "compress=zstd" ];
};
fileSystems."/nix" =
{ device = cryptroot;
fsType = "btrfs";
options = [ "subvol=@nix" "compress=zstd" "noatime" ];
};
fileSystems."/persist" =
{ device = cryptroot;
neededForBoot = true;
fsType = "btrfs";
options = [ "subvol=@persist" "compress=zstd" ];
};
fileSystems."/.swap" =
{ device = cryptroot;
fsType = "btrfs";
options = [ "subvol=@swap" "noatime" ];
};
fileSystems."/.snapshots" =
{ device = cryptroot;
fsType = "btrfs";
options = [ "subvol=@snapshots" "compress=zstd" "noatime"];
};
services.btrfs.autoScrub = {
enable = true;
# syntax as defined by https://www.freedesktop.org/software/systemd/man/systemd.time.html#Calendar%20Event s
interval = "monthly";
fileSystems = ["/"];
};
swapDevices = [{
device = "/.swap/swapfile";
size = 8*1024; # Creates an 8GB swap file
}];
boot.initrd.postResumeCommands = lib.mkAfter ''
mkdir /btrfs_tmp
mount ${cryptroot} /btrfs_tmp
if [[ -e /btrfs_tmp/@root ]]; then
mkdir -p /btrfs_tmp/old_roots
timestamp=$(date --date="@$(stat -c %Y /btrfs_tmp/@root)" "+%Y-%m-%-d_%H:%M:%S")
mv /btrfs_tmp/@root "/btrfs_tmp/old_roots/$timestamp"
fi
delete_subvolume_recursively() {
IFS=$'\n'
for i in $(btrfs subvolume list -o "$1" | cut -f 9- -d ' '); do
delete_subvolume_recursively "/btrfs_tmp/$i"
done
btrfs subvolume delete "$1"
}
for i in $(find /btrfs_tmp/old_roots/ -maxdepth 1 -mtime +30); do
delete_subvolume_recursively "$i"
done
btrfs subvolume create /btrfs_tmp/@root
umount /btrfs_tmp
'';
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's
# still possible to use this option, but it's recommended to use it in conjunction
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
networking.useDHCP = lib.mkDefault true;
# networking.interfaces.enp1s0.useDHCP = lib.mkDefault true;
# networking.interfaces.enp3s0.useDHCP = lib.mkDefault true;
# networking.interfaces.wlp2s0.useDHCP = lib.mkDefault true;
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
}

View file

@ -1,42 +0,0 @@
{ ... }:
{
environment.persistence."/persist" = {
enable = true;
hideMounts = true;
directories = [
"/var/log"
"/var/lib/nixos"
"/var/lib/systemd/coredump"
"/var/lib/systemd/timers"
"/etc/nixos"
"/etc/ssh"
"/etc/NetworkManager/system-connections"
"/var/lib/bluetooth"
"/var/lib/fail2ban"
];
files = [
"/etc/machine-id"
];
users.luser = {
directories = [
"projects"
".config/nixos-config"
".config/atuin"
".local/share/atuin"
".local/share/zoxide"
# KDE connect specific
".config/kdeconnect"
".local/state/nvim_ringofstorms_helium"
];
files = [
];
};
};
}

View file

@ -1,5 +0,0 @@
{
powerMangement.enable = true;
# powerManagement.powertop.enable = true;
powerMangement.cpuFreqGovernor = "performance";
}

View file

@ -2,15 +2,16 @@
"nodes": {
"nixpkgs": {
"locked": {
"lastModified": 1764776358,
"narHash": "sha256-MxXSCRiV7DI5U3Ra1UxVJTTUyKsONAE8+8QdSXsGIhA=",
"lastModified": 1766309749,
"narHash": "sha256-3xY8CZ4rSnQ0NqGhMKAy5vgC+2IVK0NoVEzDoOh4DA4=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "0b8cec1eb2241336971009cdd4af641b930d0d97",
"rev": "a6531044f6d0bef691ea18d4d4ce44d0daa6e816",
"type": "github"
},
"original": {
"owner": "nixos",
"ref": "nixos-unstable",
"repo": "nixpkgs",
"type": "github"
}
@ -34,11 +35,11 @@
"nvim_plugin-CopilotC-Nvim/CopilotChat.nvim": {
"flake": false,
"locked": {
"lastModified": 1763599441,
"narHash": "sha256-RwCQQfgQIQITVSJSX+QOSIOChT7E2AXdIwfU07S9GaU=",
"lastModified": 1766398838,
"narHash": "sha256-pO+bnwywDmhEpmU3Zw2VCAT8uLEgRlpHcAfW9NwqWis=",
"owner": "CopilotC-Nvim",
"repo": "CopilotChat.nvim",
"rev": "df5376c132382dd47e3e552612940cbf25b3580c",
"rev": "ed94e56ee8292f5df351e17709ff4b178ca84200",
"type": "github"
},
"original": {
@ -82,11 +83,11 @@
"nvim_plugin-MeanderingProgrammer/render-markdown.nvim": {
"flake": false,
"locked": {
"lastModified": 1764732647,
"narHash": "sha256-jya61X22LbcT4hpeio3qE/oOI/lvqKpf09oGEHHvQdA=",
"lastModified": 1765914395,
"narHash": "sha256-A7pm8sBQWsZl3Kc7JBh3gBUyKb6GfJ5J0zfn3mSGjKs=",
"owner": "MeanderingProgrammer",
"repo": "render-markdown.nvim",
"rev": "b2b135347e299ffbf7f4123fb7811899b0c9f4b8",
"rev": "07d088bf8bdadd159eb807b90eaee86a4778383f",
"type": "github"
},
"original": {
@ -162,11 +163,11 @@
"nvim_plugin-b0o/schemastore.nvim": {
"flake": false,
"locked": {
"lastModified": 1764655248,
"narHash": "sha256-9nUBzwbMkzLySMW/Y0EkFpvFgHeW5YDQ3J3moVQarjQ=",
"lastModified": 1766167236,
"narHash": "sha256-+Z1foMyKMxyMmYqmyu1KWiyL4Fc0Zm2SYV7RoZ9Ut2I=",
"owner": "b0o",
"repo": "schemastore.nvim",
"rev": "e9c00ea7813006dfa29f35c174f83f0184d45a93",
"rev": "8b92ea89835b8e5dbc779a675ebb0e5fcb9a1993",
"type": "github"
},
"original": {
@ -178,11 +179,11 @@
"nvim_plugin-catppuccin/nvim": {
"flake": false,
"locked": {
"lastModified": 1764084803,
"narHash": "sha256-ds+Rm9H00s++RC1dH4OQpCg1FXSm4HuwDGzr4ah0YBU=",
"lastModified": 1765701669,
"narHash": "sha256-8GKpGGdeBwxuMrheojyl162CzUntRcq9AktQVmKbpuI=",
"owner": "catppuccin",
"repo": "nvim",
"rev": "ce4a8e0d5267e67056f9f4dcf6cb1d0933c8ca00",
"rev": "ce8d176faa4643e026e597ae3c31db59b63cef09",
"type": "github"
},
"original": {
@ -194,11 +195,11 @@
"nvim_plugin-chrisgrieser/nvim-early-retirement": {
"flake": false,
"locked": {
"lastModified": 1764104935,
"narHash": "sha256-mvs0uIoxidy3jfC6oymwhaZVRbJrW+/kuMcIpR8TI6M=",
"lastModified": 1766186911,
"narHash": "sha256-COYpFOZTMGpZVfSJFMix/6TM5Eeemngcx1iukMa2nDE=",
"owner": "chrisgrieser",
"repo": "nvim-early-retirement",
"rev": "cd29cf40af7473530a8598245ba1d348fd5e1fa0",
"rev": "86edd80026e4eea2cef7d1e5dadcf34432e6098d",
"type": "github"
},
"original": {
@ -226,11 +227,11 @@
"nvim_plugin-folke/lazy.nvim": {
"flake": false,
"locked": {
"lastModified": 1762421181,
"narHash": "sha256-h5404njTAfqMJFQ3MAr2PWSbV81eS4aIs0cxAXkT0EM=",
"lastModified": 1765971162,
"narHash": "sha256-5A4kducPwKb5fKX4oSUFvo898P0dqfsqqLxFaXBsbQY=",
"owner": "folke",
"repo": "lazy.nvim",
"rev": "85c7ff3711b730b4030d03144f6db6375044ae82",
"rev": "306a05526ada86a7b30af95c5cc81ffba93fef97",
"type": "github"
},
"original": {
@ -338,11 +339,11 @@
"nvim_plugin-j-hui/fidget.nvim": {
"flake": false,
"locked": {
"lastModified": 1761243883,
"narHash": "sha256-XXTeJweQRIsC/WFhFxFbepOETV8e5Wfmh513su2Wve0=",
"lastModified": 1766143069,
"narHash": "sha256-uy2Z6vn9UYDN7Dr7iuiTrualRQdmUT0dwHP/eZXA/uA=",
"owner": "j-hui",
"repo": "fidget.nvim",
"rev": "e32b672d8fd343f9d6a76944fedb8c61d7d8111a",
"rev": "64463022a1f2ff1318ab22a2ea4125ed9313a483",
"type": "github"
},
"original": {
@ -450,11 +451,11 @@
"nvim_plugin-mfussenegger/nvim-lint": {
"flake": false,
"locked": {
"lastModified": 1763729870,
"narHash": "sha256-9fIZPUZhnQEHJtvboCs+A2QXo4UMTFejuHNagDkfkRk=",
"lastModified": 1766127989,
"narHash": "sha256-ysIoJ8uMAHu/OCemQ3yUYMhKIVnSDLQCvJH0SaGIOK4=",
"owner": "mfussenegger",
"repo": "nvim-lint",
"rev": "d1118791070d090777398792a73032a0ca5c79ff",
"rev": "7a64f4067065c16a355d40d0d599b8ca6b25de6d",
"type": "github"
},
"original": {
@ -466,11 +467,11 @@
"nvim_plugin-mrcjkb/rustaceanvim": {
"flake": false,
"locked": {
"lastModified": 1764542305,
"narHash": "sha256-t7xAQ9sczLyA1zODmD+nEuWuLnhrfSOoPu/4G/YTGdU=",
"lastModified": 1766276825,
"narHash": "sha256-dcXnh5SYPh1VRctTuCnuVPKFQuAI4XEvQasolCOv+Xw=",
"owner": "mrcjkb",
"repo": "rustaceanvim",
"rev": "6c3785d6a230bec63f70c98bf8e2842bed924245",
"rev": "0fa0462a2d6c9629e0bd03d1902e6a1472ceac3e",
"type": "github"
},
"original": {
@ -482,11 +483,11 @@
"nvim_plugin-neovim/nvim-lspconfig": {
"flake": false,
"locked": {
"lastModified": 1764477618,
"narHash": "sha256-IpVDEOr//Jy+r3Z5Qo8nxDa3fNO+BTBKzAmbqvxtCQE=",
"lastModified": 1766443238,
"narHash": "sha256-P95gPOwJ+rRofLb8iV5UOnh26to1I3sFrWGlGxHyz1M=",
"owner": "neovim",
"repo": "nvim-lspconfig",
"rev": "effe4bf2e1afb881ea67291c648b68dd3dfc927a",
"rev": "b34c08e0ea22bac67798f00238318fd16bd99b7c",
"type": "github"
},
"original": {
@ -594,11 +595,11 @@
"nvim_plugin-nvim-telescope/telescope.nvim": {
"flake": false,
"locked": {
"lastModified": 1764418954,
"narHash": "sha256-e6XSJRv4KB0z+nzGWmlV/YZNwWsyrrpQTloePRKWmw4=",
"lastModified": 1766268405,
"narHash": "sha256-O1rUiVKpDSvKMkZMFaEd8/ACcSgO/lfa1+Hc8uHbFOI=",
"owner": "nvim-telescope",
"repo": "telescope.nvim",
"rev": "e69b434b968a33815e2f02a5c7bd7b8dd4c7d4b2",
"rev": "e709d31454ee6e6157f0537f861f797bd44c0bad",
"type": "github"
},
"original": {
@ -610,11 +611,11 @@
"nvim_plugin-nvim-tree/nvim-tree.lua": {
"flake": false,
"locked": {
"lastModified": 1764713359,
"narHash": "sha256-dSaO5esPKj1y4vNyLb3AK9egmFJsmWxkGOT+etJsbRA=",
"lastModified": 1766192360,
"narHash": "sha256-Br+r9f/2o0AkewnGm7kFNfl3uYm1Akkklof0Sm5AL2M=",
"owner": "nvim-tree",
"repo": "nvim-tree.lua",
"rev": "59088b96a32ea47caf4976e164dbd88b86447fb7",
"rev": "b8b44b6a2494d086a9177251a119f9daec6cace8",
"type": "github"
},
"original": {
@ -626,11 +627,11 @@
"nvim_plugin-nvim-tree/nvim-web-devicons": {
"flake": false,
"locked": {
"lastModified": 1761440007,
"narHash": "sha256-klBjUtj0AvarN5a6O8Hh2t5BuOTe/m3ps2cHnlxVJvE=",
"lastModified": 1766287594,
"narHash": "sha256-ZdFRd0//C0Lle4cYIoAHBdz/yvQqmeylLNwvSifaWm4=",
"owner": "nvim-tree",
"repo": "nvim-web-devicons",
"rev": "8dcb311b0c92d460fac00eac706abd43d94d68af",
"rev": "6788013bb9cb784e606ada44206b0e755e4323d7",
"type": "github"
},
"original": {
@ -642,11 +643,11 @@
"nvim_plugin-nvim-treesitter/nvim-treesitter-context": {
"flake": false,
"locked": {
"lastModified": 1762769683,
"narHash": "sha256-ICwAUXKngSPsJ6VV+84KUPqtAwlGPrm4FIf9ioisiz8=",
"lastModified": 1765030629,
"narHash": "sha256-3NtwOA9d2ezLoo7qnzKAr6gwEdcpUqLc7ou4QI+9rDY=",
"owner": "nvim-treesitter",
"repo": "nvim-treesitter-context",
"rev": "660861b1849256398f70450afdf93908d28dc945",
"rev": "64dd4cf3f6fd0ab17622c5ce15c91fc539c3f24a",
"type": "github"
},
"original": {
@ -754,11 +755,11 @@
"nvim_plugin-stevearc/conform.nvim": {
"flake": false,
"locked": {
"lastModified": 1764743081,
"narHash": "sha256-qCjrMt3fsRbLr/iM7nFHG7oKtyTTGcse4/cJbm3odJE=",
"lastModified": 1766346125,
"narHash": "sha256-Pp4bGTlZEqxHoHqVCEekDdg2jvNayxAuBReK4HJ6yGg=",
"owner": "stevearc",
"repo": "conform.nvim",
"rev": "ffe26e8df8115c9665d24231f8a49fadb2d611ce",
"rev": "5420c4b5ea0aeb99c09cfbd4fd0b70d257b44f25",
"type": "github"
},
"original": {
@ -866,11 +867,11 @@
"nvim_plugin-zbirenbaum/copilot.lua": {
"flake": false,
"locked": {
"lastModified": 1764638966,
"narHash": "sha256-wQ6SfAunVMd5tNeM7RMvrfPC2ELRibyEQboVQlU/fBs=",
"lastModified": 1766207702,
"narHash": "sha256-879050VUJpWBrHxUA3hRpcYbn3KgBGpVpKLdSVOwbIA=",
"owner": "zbirenbaum",
"repo": "copilot.lua",
"rev": "881f99b827d65b41f522eecc21b112cf518028ac",
"rev": "e78d1ffebdf6ccb6fd8be4e6898030c1cf5f9b64",
"type": "github"
},
"original": {
@ -946,11 +947,11 @@
"rust-overlay": "rust-overlay"
},
"locked": {
"lastModified": 1764777428,
"narHash": "sha256-wFfPnXo1P+NwSK+Y7xYVwt0mbYhe9uBrf80T5KpBV5Q=",
"lastModified": 1766468664,
"narHash": "sha256-QfAZCWfwIDiOvikyMb9Tsg2X0n659zd6DxDT88ILE4I=",
"ref": "refs/heads/master",
"rev": "ee642c429fced7d51c5f9c9694034f6222a1186f",
"revCount": 324,
"rev": "99a57f25b959d7226d68f1b53ff60f0c4cc5b210",
"revCount": 326,
"type": "git",
"url": "https://git.joshuabell.xyz/ringofstorms/nvim"
},
@ -967,11 +968,11 @@
]
},
"locked": {
"lastModified": 1764729618,
"narHash": "sha256-z4RA80HCWv2los1KD346c+PwNPzMl79qgl7bCVgz8X0=",
"lastModified": 1766457837,
"narHash": "sha256-aeBbkQ0HPFNOIsUeEsXmZHXbYq4bG8ipT9JRlCcKHgU=",
"owner": "oxalica",
"repo": "rust-overlay",
"rev": "52764074a85145d5001bf0aa30cb71936e9ad5b8",
"rev": "2c7510a559416d07242621d036847152d970612b",
"type": "github"
},
"original": {
@ -982,11 +983,11 @@
},
"stable": {
"locked": {
"lastModified": 1765838191,
"narHash": "sha256-m5KWt1nOm76ILk/JSCxBM4MfK3rYY7Wq9/TZIIeGnT8=",
"lastModified": 1766885793,
"narHash": "sha256-P6RVkrM9JLCW6xBjSwHfgTOQ1JwBUma5xe5LI8xAPC0=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "c6f52ebd45e5925c188d1a20119978aa4ffd5ef6",
"rev": "9ef261221d1e72399f2036786498d78c38185c46",
"type": "github"
},
"original": {
@ -998,11 +999,11 @@
},
"unstable": {
"locked": {
"lastModified": 1765186076,
"narHash": "sha256-hM20uyap1a0M9d344I692r+ik4gTMyj60cQWO+hAYP8=",
"lastModified": 1766902085,
"narHash": "sha256-coBu0ONtFzlwwVBzmjacUQwj3G+lybcZ1oeNSQkgC0M=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "addf7cf5f383a3101ecfba091b98d0a1263dc9b8",
"rev": "c0b0e0fddf73fd517c3471e546c0df87a42d53f4",
"type": "github"
},
"original": {

View file

@ -37,6 +37,9 @@ mkswap /dev/$SWAP
swapon /dev/$SWAP
```
> TIP: Save encryption password in password manager +
> Copy the External/Internal/Magic number output UUIDS
### Setup subvolumes
```sh
@ -64,6 +67,7 @@ umount /mnt
```sh
DEV_B="/dev/disk/by-uuid/"$(lsblk -o name,uuid | grep $BOOT | awk '{print $2}')
DEV_P="/dev/disk/by-uuid/"$(lsblk -o name,uuid | grep $PRIMARY | awk '{print $2}')
echo $DEV_B && echo $DEV_P
mount -t bcachefs -o X-mount.subdir=@root $DEV_P /mnt
mount -t vfat $DEV_B /mnt/boot --mkdir
mount -t bcachefs -o X-mount.mkdir,X-mount.subdir=@nix,relatime $DEV_P /mnt/nix
@ -78,14 +82,24 @@ nixos-generate-config --root /mnt
```
- Copy useful bits out into real config in repo (primarily swap/kernel modules)
- Decide on SWAP, USB key unlock, impermanence
- Use i001 as an example install with this setup
- Run nixos-install
```sh
# If setup remotely we can install remotely as well like this
nixos-install --flake "git+https://git.joshuabell.xyz/ringofstorms/dotfiles?dir=hosts/i001#i001"
nixos-install --flake "git+https://git.joshuabell.xyz/ringofstorms/dotfiles?dir=hosts/h002#h002"
# or push from more powerful machine
# TODO how do I do this for initial install? nixos-anywhere?
# If setup remotely we can install from pushed up flake like so from the target host
HOST=i001
nixos-install --flake "git+https://git.joshuabell.xyz/ringofstorms/dotfiles?dir=hosts/$HOST#$HOST"
# NOTE not sure if this works very well, seems to be partially
# or push from more powerful machine that can build faster, on host
HOST=juni
cd hosts/$HOST && nixos-rebuild build --flake ".#$HOST"
NIX_SSHOPTS="-i /run/agenix/nix2nix" nix-copy-closure --to $HOST --use-substitutes --gzip result
CLOSURE=$(readlink -f result)
echo $CLOSURE
# on target
nixos-install --system $CLOSURE
```
- After boot