## Install nix minimal with btrfs filesystem + luks encryption ```bash # Partition main drive with btrfs # tip: lsblk # use correct drive name export D=sda # Partitioning # make GPT partition table parted /dev/$D -- mklabel gpt # make root partition (2GB offset for boot) parted /dev/$D -- mkpart NIXROOT 2GB 100% # make boot partition, 1MB alignment offset parted /dev/$D -- mkpart ESP fat32 1MB 2GB # make boot partition bootable parted /dev/$D -- set 2 esp on # NOTE this is not bulletproof, check actual name and set these appropriately export ROOT=$D"1" export BOOT=$D"2" # Anything else to partition before moving on? # Encryption Luks (optional) export ENC=true cryptsetup luksFormat /dev/$ROOT cryptsetup luksOpen /dev/$ROOT cryptroot if [ $ENC = true ]; then ROOTP="/dev/mapper/cryptroot" else ROOTP="/dev/$ROOT" fi # Formatting mkfs.fat -F 32 -n NIXBOOT /dev/$BOOT mkfs.btrfs -fL NIXROOT $ROOTP # Subvolumes (so snapshots mount -o subvolid=5 "$ROOTP" /mnt btrfs subvolume create /mnt/@root btrfs subvolume create /mnt/@nix btrfs subvolume create /mnt/@snapshots btrfs subvolume create /mnt/@swap btrfs subvolume create /mnt/@persist umount /mnt # Mount for real system use mount -o subvol=@root,compress=zstd "$ROOTP" /mnt mkdir -p /mnt/{nix,boot,.snapshots,.swap,persist} mount -o umask=077 /dev/disk/by-label/NIXBOOT /mnt/boot mount -o subvol=@nix,compress=zstd,noatime "$ROOTP" /mnt/nix mount -o subvol=@swap,noatime "$ROOTP" /mnt/.swap mount -o subvol=@snapshots,compress=zstd,noatime "$ROOTP" /mnt/.snapshots mount -o subvol=@persist,compress=zstd,noatime "$ROOTP" /mnt/persist # Create config nixos-generate-config --root /mnt ``` ### Fix hardware-configuration ```hardware-configuration.nix # @root options + "compress=zstd" # @nix options + "compress=zstd" "noatime" # @swap options + "noatime" # @snapshots options + "compress=zstd" "noatime" # @persist options + "compress=zstd" # + neededForBoot = true; # add Swap device swapDevices = [{ device = "/.swap/swapfile"; size = 8*1024; # Creates an 8GB swap file }]; # https://wiki.nixos.org/wiki/Btrfs#Scrubbing services.btrfs.autoScrub = { enable = true; # syntax defined by https://www.freedesktop.org/software/systemd/man/systemd.time.html#Calendar%20Events interval = "monthly"; fileSystems = [ "/" ]; }; ``` ### Add initial system config changes ```sh curl -o /mnt/etc/nixos/flake.nix https://git.joshuabell.xyz/ringofstorms/dotfiles/raw/branch/master/utilities/nixos-installers/new-flake.nix ``` Open and edit config name/location as desired. ### Auto unlock luks (optional) - USB key ```sh # Format if needed (fat32 for compatibility) sudo parted /dev/DRIVEDEVICE mklabel gpt mkpart primary 1MiB 9MiB quit # Create key dd if=/dev/random of=/key_tmpfs/keyfile bs=1024 count=4 # writing some random data, choose a random offset sudo dd if=/dev/urandom of=/dev/sdX1 bs=4096 count=4 seek=5443 status=none sudo cryptsetup luksAddKey /dev/LUKSROOT --new-keyfile /dev/USBKEY --new-keyfile-size 5000 --new-keyfile-offset 5443 ``` In hardware-configuration ensure these are all added: ```hardware-configuration.nix boot.initrd.availableKernelModules = [ "xhci_pci" "ehci_pci" "usb_storage" "uas" ]; boot.initrd.luks.devices."cryptroot" = { device = "/dev/disk/by-uuid/LUKS_UUID (same as root above)"; # Auto decrypt keyFileTimeout = 2; keyFile = "/dev/disk/by-uuid/KEY UUID"; # Set if used in generation command above keyFileSize = 5000; keyFileOffset = 5443; tryEmptyPassphrase = true; fallbackToPassword = true; crypttabExtraOpts = [ "tries=2" ]; }; ``` ### Impermanence BTRFS setup (optional) ```hardware-configuration.nix boot.initrd.postResumeCommands = lib.mkAfter '' mkdir /btrfs_tmp mount /dev/ROOT_FILESYSTEM /btrfs_tmp if [[ -e /btrfs_tmp/@root ]]; then mkdir -p /btrfs_tmp/old_roots timestamp=$(date --date="@$(stat -c %Y /btrfs_tmp/root)" "+%Y-%m-%-d_%H:%M:%S") mv /btrfs_tmp/root "/btrfs_tmp/old_roots/$timestamp" fi delete_subvolume_recursively() { IFS=$'\n' for i in $(btrfs subvolume list -o "$1" | cut -f 9- -d ' '); do delete_subvolume_recursively "/btrfs_tmp/$i" done btrfs subvolume delete "$1" } for i in $(find /btrfs_tmp/old_roots/ -maxdepth 1 -mtime +30); do delete_subvolume_recursively "$i" done btrfs subvolume create /btrfs_tmp/@root umount /btrfs_tmp ''; ``` ### Install nixos `sudo nixos-install` `reboot` and remove start up media 2. Install and setup nixos - nixos config and hardware config - `export HOSTNAME=desired_hostname_for_this_machine` - `export USERNAME=desired_username_for_admin_on_this_machine` (josh) - `nixos-generate-config --root /mnt` - `cd /mnt/etc/nixos` - `curl -O --proto '=https' --tlsv1.2 -sSf https://git.joshuabell.xyz/ringofstorms/dotfiles/raw/branch/master/onboard.sh` - `chmod +x onboard.sh && ./onboard.sh` - verify hardware config, run `nixos-install` - `reboot` - log into USERNAME with `password1`, use `passwd` to change the password > Easiest to ssh into the machine for these steps so you can copy paste... - `cat /etc/ssh/ssh_host_ed25519_key.pub ~/.ssh/id_ed25519.pub` - On an already onboarded computer copy these and add them to secrets/secrets.nix file - `nix run github:yaxitech/ragenix -- --rules ~/.config/nixos-config/common/secrets/secrets/secrets.nix -r` - Maybe copy hardware/configs over and setup, otherwise do it on the client machine - git clone nixos-config `git clone https://git.joshuabell.xyz/ringofstorms/dotfiles ~/.config/nixos-config` - Setup config as needed - add hosts dir and files needed - `sudo nixos-rebuild switch --flake ~/.config/nixos-config/hosts/$HOSTNAME` - Update remote, ssh should work now: `cd ~/.config/nixos-config && git remote remove origin && git remote add origin "ssh://git.joshuabell.xyz:3032/ringofstorms/dotfiles" && git pull origin master` ## Local tooling - bitwarden setup/sign into self hosted vault - atuin setup - if atuin is on enable that mod in configuration.nix, make sure to `atuin login` get key from existing device - TODO move key into secrets and mount it to atuin local share - ssh key access, ssh iden in config in nix config ### Notes Dual booting windows? - If there is a new boot partition being used than the old windows one, copy over the /boot/EFI/Microsoft folder into the new boot partition, same place - If the above auto probing for windows does not work, you can also manually add in a windows.conf in the loader entries: /boot/loader/entries/windows.conf: ``` title Windows 11 efi /EFI/Microsoft/Boot/bootmgfw.efi ``` # Settings references - Flake docs: - nixos: - home manager: TODO make an offline version of this, does someone else have this already? # TODO # Nix Infrastructure & Automation Improvements - [ ] **Replace deployment scripts with [`deploy-rs`](https://github.com/serokell/deploy-rs)** for declarative, hands-off host updates. Remove manual `deploy_linode`/`deploy_oracle` scripts. Use `deploy-rs` to apply updates across one or all hosts, including remote builds. - [ ] **Add `isoImage` outputs for every host for instant USB/boot media creation.** Use: ``` packages.x86_64-linux.install-iso = nixosConfigurations..config.system.build.isoImage; ``` Then: ``` nix build .#packages.x86_64-linux.install-iso ``` - [ ] **Document or automate new host bootstrap:** - Script or steps: boot custom ISO, git clone config, secrets onboarding (agenix), nixos-install with flake config. - Provide an example shell script or README note for a single-command initial setup. - [ ] **(Optional) Add an ephemeral “vm-experiment” target for NixOS VM/dev testing.** - Use new host config with minimal stateful services, then `nixos-rebuild build-vm --flake .#vm-experiment` - [ ] **Remote build reliability:** - Parametrize/automate remote builder enable/disable. - Add quickstart SSH builder key setup instructions per-host in README. - (Optional) Use deploy-rs's agent forwarding and improve errors if builder can't be reached at deploy time. - [ ] **Add [disko](https://github.com/nix-community/disko) to declaratively manage disk/partition creation for new installs and reinstalls.** - work on secrets pre ragenix, stormd pre install for all the above bootstrapping steps would be ideal - reduce home manager, make per user modules support instead - Ensure my neovim undohistory/auto saves don't save `.age` files as they can be sensitive. # Server hosts simply run `deploy` in the host root and it will push changes to the server (or `deploy_[oracle|linode] ` from root)