## TODO working on changes to this now ### Old Config prior to per system flake approach ### Old modules from multi branch flake approach - [common](https://git.joshuabell.xyz/dotfiles/~files/a3df616bee120e8427728c6e6a642686d6efb96d) - [de_gnome](https://git.joshuabell.xyz/dotfiles/~files/2434f4858db4b5ddb095d5a7d8bdb05890c48bb4) - [de_cosmic](https://git.joshuabell.xyz/dotfiles/~files/f2ecd63921dd826b138dab2ba431085c31a151d1) - [de_hyperland](https://git.joshuabell.xyz/dotfiles/~files/ecb652f6e331312b401488140c583cabdcb0deba) - [secrets](https://git.joshuabell.xyz/dotfiles/~files/5f3633d5f7c729b8e8fc2805d2751e7c006a6f7a) - [nebula](https://git.joshuabell.xyz/dotfiles/~files/70cea59e9f1f750fd0aee8cde8cd54aee8601336) - [stormd](https://git.joshuabell.xyz/dotfiles/~files/765c7f4436db03936960373ff77dc2d41f0c4cd5) - [home_manager](https://git.joshuabell.xyz/dotfiles/~files/df0c4e95ac6b056202c4ec6fabfcfa5bd205a0b4) - [boot_grub](https://git.joshuabell.xyz/dotfiles/~files/f00b3d38ec2dd62741a84d706f88c0c3bdd60784) - [boot_systemd](https://git.joshuabell.xyz/dotfiles/~files/3155d8a57286aefb835476617ba6d4df92b83013) # First Install on new Machine ## NixOS install 1. Install nix minimal: (new with btrfs backing) - Partitions - `parted /dev/DEVICE -- mklabel gpt` - make GPT partition table - `parted /dev/DEVICE -- mkpart NIXROOT 2GB 100%` - make root partition (2GB offset for boot) - `parted /dev/DEVICE -- mkpart ESP fat32 1MB 2GB` - make boot partition (2GB) - `parted /dev/DEVICE -- set 2 esp on` - make boot bootable - LUKS Encryption - `cryptsetup luksFormat /dev/DEVICE_1` - Create passphrase and save to bitwarden - `cryptsetup luksOpen /dev/DEVUCE_1 cryptroot` - Create keyfile for auto-unlock (optional) - `dd if=/dev/random of=/tmp/keyfile bs=1024 count=4` - `chmod 400 /tmp/keyfile` - `cryptsetup luksAddKey /dev/DEVICE_1 /tmp/keyfile` - Formatting - `mkfs.btrfs -L NIXROOT /dev/mapper/cryptroot` - `mkfs.fat -F 32 -n NIXBOOT /dev/DEVICE_2` - Create btrfs subvolumes (for better snapshot performance) (this is optional and can technically be skipped and put everything in one but I like this setup for cleanliness) - `mount /dev/mapper/cryptroot /mnt` - `btrfs subvolume create /mnt/root` - `btrfs subvolume create /mnt/nix` - `btrfs subvolume create /mnt/snapshots` - `umount /mnt` - Mount - `mount -o subvol=root,compress=zstd,noatime /dev/mapper/cryptroot /mnt` - `mkdir -p /mnt/{nix,boot,.snapshots}` - `mount -o subvol=nix,compress=zstd,noatime /dev/mapper/cryptroot /mnt/nix` - `mount -o subvol=snapshots,compress=zstd,noatime /dev/mapper/cryptroot /mnt/.snapshots` - `mount -o umask=077 /dev/disk/by-label/NIXBOOT /mnt/boot` - Copy keyfile for auto-unlock (optional) - `cp /tmp/keyfile /mnt/boot/keyfile` - `chmod 400 /mnt/boot/keyfile` 2. same as below... 1. Install nix minimal: - Partitions - `parted /dev/DEVICE -- mklabel gpt` - make GPT partition table - `parted /dev/DEVICE -- mkpart NIXROOT ext4 2GB 100%` - make root partition (2GB offset for boot) - `parted /dev/DEVICE -- mkpart ESP fat32 1MB 2GB` - make boot partition (2GB) - `parted /dev/DEVICE -- set 2 esp on` - make boot bootable - Formatting - `mkfs.ext4 -L NIXROOT /dev/DEVICE_1` - root ext4 - `mkfs.fat -F 32 -n NIXBOOT /dev/DEVICE_2` - boot FAT - Mount - `mount /dev/disk/by-label/NIXROOT /mnt` - `mkdir -p /mnt/boot` - `mount -o umask=077 /dev/disk/by-label/NIXBOOT /mnt/boot` (Note that swap files is defined in nix config later not needed at this stage) - nixos config and hardware config - `export HOSTNAME=desired_hostname_for_this_machine` - `export USERNAME=desired_username_for_admin_on_this_machine` (josh) - `nixos-generate-config --root /mnt` - `cd /mnt/etc/nixos` - `curl --proto '=https' --tlsv1.2 -sSf https://share.joshuabell.link/nix/onboard.sh` - `chmod +x onboard.sh && ./onboard.sh` - verify hardware config, run `nixos-install` - `reboot` - log into USERNAME with `password1`, use `passwd` to change the password > Easiest to ssh into the machine for these steps so you can copy paste... - `cat /etc/ssh/ssh_host_ed25519_key.pub ~/.ssh/id_ed25519.pub` - On an already onboarded computer copy these and add them to secrets/secrets.nix file - Rekey secrets: `nix run github:yaxitech/ragenix -- --rules ~/.config/nixos-config/common/secrets/secrets/secrets.nix -r` - Maybe copy hardware/configs over and setup, otehrwise do it on the client machine - git clone nixos-config `git clone https://git.joshuabell.xyz/ringofstorms/dotfiles ~/.config/nixos-config` - Setup config as needed - top level flake.nix additions - add hosts dir and files needed - `sudo nixos-rebuild switch --flake ~/.config/nixos-config/hosts/$HOSTNAME` - Update remote, ssh should work now: `cd ~/.config/nixos-config && git remote remove origin && git remote add origin "ssh://git.joshuabell.xyz:3032/ringofstorms/dotfiles" && git pull origin master` ## Local tooling - bitwarden setup/sign into self hosted vault - atuin setup - if atuin is on enable that mod in configuration.nix, make sure to `atuin login` get key from existing device - TODO move key into secrets and mount it to atuin local share - ssh key access, ssh iden in config in nix config ### Notes Dual booting windows? - If there is a new boot partition being used than the old windows one, copy over the /boot/EFI/Microsoft folder into the new boot partition, same place - If the above auto probing for windows does not work, you can also manually add in a windows.conf in the loader entries: /boot/loader/entries/windows.conf: ``` title Windows 11 efi /EFI/Microsoft/Boot/bootmgfw.efi ``` # Settings references - Flake docs: - nixos: - home manager: TODO make an offline version of this, does someone else have this already? # TODO # Nix Infrastructure & Automation Improvements - [ ] **Replace deployment scripts with [`deploy-rs`](https://github.com/serokell/deploy-rs)** for declarative, hands-off host updates. Remove manual `deploy_linode`/`deploy_oracle` scripts. Use `deploy-rs` to apply updates across one or all hosts, including remote builds. - [ ] **Add `isoImage` outputs for every host for instant USB/boot media creation.** Use: ``` packages.x86_64-linux.install-iso = nixosConfigurations..config.system.build.isoImage; ``` Then: ``` nix build .#packages.x86_64-linux.install-iso ``` - [ ] **Document or automate new host bootstrap:** - Script or steps: boot custom ISO, git clone config, secrets onboarding (agenix), nixos-install with flake config. - Provide an example shell script or README note for a single-command initial setup. - [ ] **(Optional) Add an ephemeral “vm-experiment” target for NixOS VM/dev testing.** - Use new host config with minimal stateful services, then `nixos-rebuild build-vm --flake .#vm-experiment` - [ ] **Remote build reliability:** - Parametrize/automate remote builder enable/disable. - Add quickstart SSH builder key setup instructions per-host in README. - (Optional) Use deploy-rs's agent forwarding and improve errors if builder can't be reached at deploy time. - [ ] **Add [disko](https://github.com/nix-community/disko) to declaratively manage disk/partition creation for new installs and reinstalls.** - work on secrets pre ragenix, stormd pre install for all the above bootstrapping steps would be ideal - reduce home manager, make per user modules support instead - Ensure my neovim undohistory/auto saves don't save `.age` files as they can be sensitive. # Server hosts simply run `deploy` in the host root and it will push changes to the server (or `deploy_[oracle|linode] ` from root)