Bearbeiten von „Benutzer Diskussion:PaulRiegel/NixOS

Zur Navigation springen Zur Suche springen
Warnung: Du bist nicht angemeldet. Deine IP-Adresse wird bei Bearbeitungen öffentlich sichtbar. Melde dich an oder erstelle ein Benutzerkonto, damit Bearbeitungen deinem Benutzernamen zugeordnet werden. Ein eigenes Benutzerkonto hat eine ganze Reihe von Vorteilen.

Die Bearbeitung kann rückgängig gemacht werden. Bitte prüfe den Vergleich unten, um sicherzustellen, dass du dies tun möchtest, und veröffentliche dann unten deine Änderungen, um die Bearbeitung rückgängig zu machen.

Aktuelle Version Dein Text
Zeile 609: Zeile 609:
== Installation Tuxedo ==
== Installation Tuxedo ==


==== [https://openzfs.github.io/openzfs-docs/Getting%20Started/NixOS/Root%20on%20ZFS/1-preparation.html Preparation] ====
https://openzfs.github.io/openzfs-docs/Getting%20Started/NixOS/Root%20on%20ZFS/1-preparation.html
 
: <code>find /dev/disk/by-id/</code>
:: <code>cd /dev/disk/by-id/ && ls -l && cd -</code>
 
: <code>DISK='/dev/disk/by-id/ata-Samsung_SSD_850_EVO_1TB_S3LENB0JB00287Z /dev/disk/by-id/ata-Samsung_SSD_860_EVO_M.2_1TB_S415NB0M120414E'</code>
: <code>DISK='/dev/disk/by-id/ata-Samsung_SSD_850_EVO_1TB_S3LENB0JB00287Z /dev/disk/by-id/ata-Samsung_SSD_860_EVO_M.2_1TB_S415NB0M120414E'</code>
: <code>INST_PARTSIZE_SWAP=128</code>
: <code>INST_PARTSIZE_SWAP=128</code>
: <s><code>INST_PARTSIZE_RPOOL=</code></s>
: <s><code>INST_PARTSIZE_RPOOL=</code></s>


==== [https://openzfs.github.io/openzfs-docs/Getting%20Started/NixOS/Root%20on%20ZFS/2-system-installation.html System Installation] ====
https://openzfs.github.io/openzfs-docs/Getting%20Started/NixOS/Root%20on%20ZFS/2-system-installation.html
 
: <code>nano /tmp/1_partitioning</code>
<!--
<!--
# wipe flash-based storage device to improve performance.
# wipe flash-based storage device to improve performance.
Zeile 627: Zeile 623:
for i in ${DISK}; do
for i in ${DISK}; do


  sudo blkdiscard -f $i
sudo blkdiscard -f $i


  sudo sgdisk --zap-all $i
sudo sgdisk --zap-all $i


  sudo sgdisk -n1:1M:+1G -t1:EF00 $i
sudo sgdisk -n1:1M:+1G -t1:EF00 $i


  sudo sgdisk -n2:0:+4G -t2:BE00 $i
sudo sgdisk -n2:0:+4G -t2:BE00 $i


  sudo sgdisk -n4:0:+${INST_PARTSIZE_SWAP}G -t4:8200 $i
sudo sgdisk -n4:0:+${INST_PARTSIZE_SWAP}G -t4:8200 $i


  if test -z $INST_PARTSIZE_RPOOL; then
if test -z $INST_PARTSIZE_RPOOL; then
     sudo sgdisk -n3:0:0  -t3:BF00 $i
     sudo sgdisk -n3:0:0  -t3:BF00 $i
  else
else
     sudo sgdisk -n3:0:+${INST_PARTSIZE_RPOOL}G -t3:BF00 $i
     sudo sgdisk -n3:0:+${INST_PARTSIZE_RPOOL}G -t3:BF00 $i
  fi
fi
 
  sudo sgdisk -a1 -n5:24K:+1000K -t5:EF02 $i
 
  sync && udevadm settle && sleep 3
 
  sudo cryptsetup open --type plain --key-file /dev/random $i-part4 ${i##*/}-part4
  sudo mkswap /dev/mapper/${i##*/}-part4
  sudo swapon /dev/mapper/${i##*/}-part4
done
</pre>
<pre>
blkdiscard: Operation forced, data will be lost!
Creating new GPT entries in memory.
GPT data structures destroyed! You may now partition the disk using fdisk or
other utilities.
Creating new GPT entries in memory.
The operation has completed successfully.
The operation has completed successfully.
The operation has completed successfully.
The operation has completed successfully.
The operation has completed successfully.
Setting up swapspace version 1, size = 128 GiB (137438949376 bytes)
no label, UUID=20cea8d9-b934-45d3-bf9d-9ab130df604a
blkdiscard: Operation forced, data will be lost!
Creating new GPT entries in memory.
GPT data structures destroyed! You may now partition the disk using fdisk or
other utilities.
Creating new GPT entries in memory.
The operation has completed successfully.
The operation has completed successfully.
The operation has completed successfully.
The operation has completed successfully.
The operation has completed successfully.
Setting up swapspace version 1, size = 128 GiB (137438949376 bytes)
no label, UUID=8084a830-66c5-44d9-b47d-1c8b4933116b
</pre>
 
<pre>
sudo \
  zpool create \
    -o compatibility=grub2 \
    -o ashift=12 \
    -o autotrim=on \
    -O acltype=posixacl \
    -O canmount=off \
    -O compression=lz4 \
    -O devices=off \
    -O normalization=formD \
    -O relatime=on \
    -O xattr=sa \
    -O mountpoint=/boot \
    -R /mnt \
    bpool \
    mirror \
    $(for i in ${DISK}; do
      printf "$i-part2 ";
      done)
</pre>
 
<pre>
sudo \
  zpool create \
    -o ashift=12 \
    -o autotrim=on \
    -R /mnt \
    -O acltype=posixacl \
    -O canmount=off \
    -O compression=zstd \
    -O dnodesize=auto \
    -O normalization=formD \
    -O relatime=on \
    -O xattr=sa \
    -O mountpoint=/ \
    rpool \
    mirror \
    $(for i in ${DISK}; do
      printf "$i-part3 ";
    done)
</pre>
 
: <code>PASSWORD='p4ssw0rd'</code>
 
<pre>
echo ${PASSWORD} | \
sudo \
  zfs create \
    -o canmount=off \
    -o mountpoint=none \
    -o encryption=on \
    -o keylocation=prompt \
    -o keyformat=passphrase \
    rpool/nixos
</pre>
 
: <code>sudo zfs create -o mountpoint=legacy rpool/nixos/root</code>
: <code>sudo zfs create -o mountpoint=legacy rpool/nixos/home</code>
: <code>sudo zfs create -o mountpoint=legacy rpool/nixos/var</code>
: <code>sudo zfs create -o mountpoint=legacy rpool/nixos/var/lib</code>
: <code>sudo zfs create -o mountpoint=legacy rpool/nixos/var/log</code>
 
: <code>sudo zfs create -o mountpoint=none  bpool/nixos</code>
: <code>sudo zfs create -o mountpoint=legacy bpool/nixos/root</code>
 
: <code>sudo zfs create -o mountpoint=legacy rpool/nixos/empty</code>
: <code>sudo zfs snapshot rpool/nixos/empty@start</code>
 
: <code>sudo mount -t zfs rpool/nixos/root /mnt/</code>
: <code>sudo mkdir /mnt/home</code>
: <code>sudo mount -t zfs rpool/nixos/home /mnt/home</code>
: <code>sudo mkdir /mnt/boot</code>
: <code>sudo mount -t zfs bpool/nixos/root /mnt/boot</code>
 
<pre>
for i in ${DISK}; do
  sudo mkfs.vfat -n EFI ${i}-part1
  sudo mkdir -p /mnt/boot/efis/${i##*/}-part1
  sudo mount -t vfat ${i}-part1 /mnt/boot/efis/${i##*/}-part1
done
</pre>
<pre>
mkfs.fat 4.2 (2021-01-31)
mkfs.fat 4.2 (2021-01-31)
</pre>


==== [https://openzfs.github.io/openzfs-docs/Getting%20Started/NixOS/Root%20on%20ZFS/3-system-configuration.html System Configuration] ====
sudo sgdisk -a1 -n5:24K:+1000K -t5:EF02 $i


: <code>sudo mkdir -p /mnt/etc/nixos/</code>
sync && udevadm settle && sleep 3
: <code>sudo curl -o /mnt/etc/nixos/configuration.nix -L <nowiki>https://github.com/openzfs/openzfs-docs/raw/master/docs/Getting%20Started/NixOS/Root%20on%20ZFS/configuration.nix
</nowiki></code>
:: <s><code>curl -o /tmp/openzfs.default.configuration.nix -L <nowiki>https://github.com/openzfs/openzfs-docs/raw/master/docs/Getting%20Started/NixOS/Root%20on%20ZFS/configuration.nix && sudo mv /tmp/openzfs.default.configuration.nix /mnt/etc/nixos/configuration.nix</nowiki></code></s>


<pre>
sudo cryptsetup open --type plain --key-file /dev/random $i-part4 ${i##*/}-part4
for i in $DISK; do
sudo mkswap /dev/mapper/${i##*/}-part4
  sudo sed -i \
swapon /dev/mapper/${i##*/}-part4
    "s|PLACEHOLDER_FOR_DEV_NODE_PATH|\"${i%/*}/\"|" \
    /mnt/etc/nixos/configuration.nix
  break
done
done
diskNames=""
for i in $DISK; do
  diskNames="$diskNames \"${i##*/}\""
done
sudo tee -a /mnt/etc/nixos/machine.nix <<EOF
{
  bootDevices = [ $diskNames ];
}
EOF
</pre>
: <code>rootPwd=$(mkpasswd -m SHA-512 -s)</code>
<pre>
sudo sed -i \
"s|PLACEHOLDER_FOR_ROOT_PWD_HASH|\""${rootPwd}"\"|" \
/mnt/etc/nixos/configuration.nix
</pre>
</pre>


<!--
<!--
: <code>sed /mnt/etc/nixos/</code>
: <code></code>
<pre>
: <code></code>
configuration.nix  machine.nix
: <code></code>
</pre>
 
: <code>cat /mnt/etc/nixos/configuration.nix</code>
<pre>
# Edit this configuration file to define what should be installed on
# your system.  Help is available in the configuration.nix(5) man page
# and in the NixOS manual (accessible by running ‘nixos-help’).
{ config, lib, pkgs, modulesPath, ... }:
 
let
  zfsRoot.partitionScheme = {
    biosBoot = "-part5";
    efiBoot = "-part1";
    swap = "-part4";
    bootPool = "-part2";
    rootPool = "-part3";
  };
  zfsRoot.devNodes = "/dev/disk/by-id/"; # MUST have trailing slash! /dev/disk/by-id/
  zfsRoot.bootDevices = (import ./machine.nix).bootDevices;
  zfsRoot.mirroredEfi = "/boot/efis/";
 
in {
  # adjust according to your platform, such as
  imports = [
    # (modulesPath + "/profiles/qemu-guest.nix")
    # (modulesPath + "/profiles/all-hardware.nix")
    (modulesPath + "/installer/scan/not-detected.nix")
  ];
  systemd.services.zfs-mount.enable = false;
 
  # networking.hostName = "nixos"; # Define your hostname.
  # Pick only one of the below networking options.
  # networking.wireless.enable = true;  # Enables wireless support via wpa_supplicant.
  # networking.networkmanager.enable = true;  # Easiest to use and most distros use this by default.
 
  # Set your time zone.
  # time.timeZone = "Europe/Amsterdam";
 
  # Configure network proxy if necessary
  # networking.proxy.default = "http://user:password@proxy:port/";
  # networking.proxy.noProxy = "127.0.0.1,localhost,internal.domain";
 
  # Select internationalisation properties.
  # i18n.defaultLocale = "en_US.UTF-8";
  # console = {
  #  font = "Lat2-Terminus16";
  #  keyMap = "us";
  #  useXkbConfig = true; # use xkbOptions in tty.
  # };
 
  # Configure keymap in X11
  # services.xserver.layout = "us";
  # services.xserver.xkbOptions = {
  #  "eurosign:e";
  #  "caps:escape" # map caps to escape.
  # };
 
  # Enable CUPS to print documents.
  # services.printing.enable = true;
 
  # Enable sound.
  # sound.enable = true;
  # hardware.pulseaudio.enable = true;
 
  # Enable touchpad support (enabled default in most desktopManager).
 
  # Define a user account. Don't forget to set a password with ‘passwd’.
  # users.users.alice = {
  #  isNormalUser = true;
  #  extraGroups = [ "wheel" ]; # Enable ‘sudo’ for the user.
  #  packages = with pkgs; [
  #    firefox
  #    thunderbird
  #  ];
  # };
 
  # List packages installed in system profile. To search, run:
  # $ nix search wget
  environment.systemPackages = with pkgs;
    [
      #  vim
      ## Do not forget to add an editor to edit configuration.nix!
      ## The Nano editor is also installed by default.
      #  wget
      mg
    ];
 
  # Some programs need SUID wrappers, can be configured further or are
  # started in user sessions.
  # programs.mtr.enable = true;
  # programs.gnupg.agent = {
  #  enable = true;
  #  enableSSHSupport = true;
  # };
 
  # List services that you want to enable:
 
  # Enable the OpenSSH daemon.
  services.openssh.enable = false;
  users.users.root = {
    ##hash: mkpasswd -m SHA-512 -s
    initialHashedPassword = "$6$OYQ1J8P/eJcD.D/nAeF.Gq8IPRrZfu.EGZkYJ3kYpmzhTq1QNVwraZboxoGaQxVmMpEq.Zrz0bgV$Vm/oMUobWh7VpNYtt4baExd960";
    openssh.authorizedKeys.keys = [
    ];
  };
  programs.git.enable = true;
  # Open ports in the firewall.
  # networking.firewall.allowedTCPPorts = [ ... ];
  # networking.firewall.allowedUDPPorts = [ ... ];
  # Or disable the firewall altogether.
  # networking.firewall.enable = false;
 
  # Copy the NixOS configuration file and link it from the resulting system
  # (/run/current-system/configuration.nix). This is useful in case you
  # accidentally delete configuration.nix.
  system.copySystemConfiguration = true;
 
  # This value determines the NixOS release from which the default
  # settings for stateful data, like file locations and database versions
  # on your system were taken. It‘s perfectly fine and recommended to leave
  # this value at the release version of the first install of this system.
  # Before changing this value read the documentation for this option
  # (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
  system.stateVersion = "22.11"; # Did you read the comment?
 
  boot.initrd.availableKernelModules = [
    "ahci"
    "xhci_pci"
    "virtio_pci"
    "virtio_blk"
    "ehci_pci"
    "nvme"
    "uas"
    "sd_mod"
    "sr_mod"
    "sdhci_pci"
  ];
  boot.initrd.kernelModules = [ ];
  boot.kernelModules = [ "kvm-intel" "kvm-amd" ];
  boot.extraModulePackages = [ ];
 
  fileSystems = {
    "/" = {
      device = "rpool/nixos/root";
      fsType = "zfs";
      options = [ "X-mount.mkdir" ];
    };
 
    "/home" = {
      device = "rpool/nixos/home";
      fsType = "zfs";
      options = [ "X-mount.mkdir" ];
    };
 
    "/var/lib" = {
      device = "rpool/nixos/var/lib";
      fsType = "zfs";
      options = [ "X-mount.mkdir" ];
    };
 
    "/var/log" = {
      device = "rpool/nixos/var/log";
      fsType = "zfs";
      options = [ "X-mount.mkdir" ];
    };
 
    "/boot" = {
      device = "bpool/nixos/root";
      fsType = "zfs";
      options = [ "X-mount.mkdir" ];
    };
  } // (builtins.listToAttrs (map (diskName: {
    name = zfsRoot.mirroredEfi + diskName + zfsRoot.partitionScheme.efiBoot;
    value = {
      device = zfsRoot.devNodes + diskName + zfsRoot.partitionScheme.efiBoot;
      fsType = "vfat";
      options = [
        "x-systemd.idle-timeout=1min"
        "x-systemd.automount"
        "noauto"
        "nofail"
      ];
    };
  }) zfsRoot.bootDevices));
 
  swapDevices = (map (diskName: {
    device = zfsRoot.devNodes + diskName + zfsRoot.partitionScheme.swap;
    discardPolicy = "both";
    randomEncryption = {
      enable = true;
      allowDiscards = true;
    };
  }) zfsRoot.bootDevices);
 
  # Enables DHCP on each ethernet and wireless interface. In case of scripted networking
  # (the default) this is the recommended approach. When using systemd-networkd it's
  # still possible to use this option, but it's recommended to use it in conjunction
  # with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
  networking.useDHCP = lib.mkDefault true;
  # networking.networkmanager.enable = true;
  # networking.interfaces.enp1s0.useDHCP = lib.mkDefault true;
 
  nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
  hardware.cpu.intel.updateMicrocode =
    lib.mkDefault config.hardware.enableRedistributableFirmware;
  hardware.cpu.amd.updateMicrocode =
    lib.mkDefault config.hardware.enableRedistributableFirmware;
 
  boot.supportedFilesystems = [ "zfs" ];
  networking.hostId = "abcd1234";
  boot.kernelPackages = config.boot.zfs.package.latestCompatibleLinuxPackages;
  boot.loader.efi.efiSysMountPoint = with builtins;
    (zfsRoot.mirroredEfi + (head zfsRoot.bootDevices) + zfsRoot.partitionScheme.efiBoot);
  boot.zfs.devNodes = zfsRoot.devNodes;
  boot.loader.efi.canTouchEfiVariables = false;
  boot.loader.generationsDir.copyKernels = true;
  boot.loader.grub.efiInstallAsRemovable = true;
  boot.loader.grub.enable = true;
  boot.loader.grub.version = 2;
  boot.loader.grub.copyKernels = true;
  boot.loader.grub.efiSupport = true;
  boot.loader.grub.zfsSupport = true;
  boot.loader.grub.extraInstallCommands = with builtins;
    (toString (map (diskName:
      "cp -r " + config.boot.loader.efi.efiSysMountPoint + "/EFI" + " "
      + zfsRoot.mirroredEfi + diskName + zfsRoot.partitionScheme.efiBoot + "\n")
      (tail zfsRoot.bootDevices)));
  boot.loader.grub.devices =
    (map (diskName: zfsRoot.devNodes + diskName) zfsRoot.bootDevices);
}
 
</pre>
 
: <code>cat /mnt/etc/nixos/machine.nix</code>
<pre>
{
  bootDevices = [  "ata-Samsung_SSD_850_EVO_1TB_S3LENB0JB00287Z" "ata-Samsung_SSD_860_EVO_M.2_1TB_S415NB0M120414E" ];
}
</pre>
 
: <code></code>
: <code></code>
: <code></code>
: <code></code>
Zeile 1.051: Zeile 661:
: <code></code>
: <code></code>
-->
-->
: <code>sudo nano /mnt/etc/nixos/configuration.nix </code>
: <code>sudo nixos-install --no-root-passwd --root /mnt</code>
===== Coda =====
: <code>sudo umount -Rl /mnt</code>
: <code>sudo zpool export -a</code>
: <code>reboot</code>
== Anleitungen ZFS ==
https://mazzo.li/posts/hetzner-zfs.html
== 2024-05 2024-05-04 ==
==== 2024-05 download ====
[https://channels.nixos.org/nixos-unstable/latest-nixos-plasma5-x86_64-linux.iso latest-nixos-plasma5-x86_64-linux.iso]
[https://releases.nixos.org/nixos/unstable/nixos-24.05pre619660.63c3a29ca824/nixos-plasma5-24.05pre619660.63c3a29ca824-x86_64-linux.iso nixos-plasma5-24.05pre619660.63c3a29ca824-x86_64-linux.iso]
==== 2024-05 partitioning ====
<pre>
#!/usr/bin/env bash
#MNT=$(mktemp -d)
MNT=/mnt
DISK='/dev/disk/by-id/ata-Samsung_SSD_750_EVO_500GB_S363NWAH718728R /dev/disk/by-id/ata-Samsung_SSD_850_EVO_M.2_500>
SWAPSIZE=64
UNUSEDSIZE=64
partition_disk () {
  local disk="${1}"
  blkdiscard -f "${disk}" || true
  sudo parted --script --align=optimal "${disk}" -- mklabel gpt
  sudo parted --script --align=optimal "${disk}" -- mkpart EFI 1MiB 4GiB
  sudo parted --script --align=optimal "${disk}" -- mkpart rpool 4GiB -$((SWAPSIZE + UNUSEDSIZE))GiB
  sudo parted --script --align=optimal "${disk}" -- mkpart swap  -$((SWAPSIZE + UNUSEDSIZE))GiB -"${UNUSEDSIZE}"GiB
  sudo parted --script --align=optimal "${disk}" set 1 esp on
  sudo  partprobe "${disk}"
}
for i in ${DISK}; do
  partition_disk "${i}"
done
</pre>
https://aldoborrero.com/posts/2023/01/15/setting-up-my-machines-nix-style/
https://github.com/nix-community/disko/blob/master/docs/HowTo.md
https://oblivious.observer/posts/nixos-zfs-install-script/
==== 2024-05 Installation <code>/etc/nixos/configuration.nix</code> ====
: <code>nano /etc/nixos/configuration.nix</code>
<pre>
# Edit this configuration file to define what should be installed on
# your system.  Help is available in the configuration.nix(5) man page
# and in the NixOS manual (accessible by running ‘nixos-help’).
{ config, pkgs, ... }:
{
  imports =
    [ # Include the results of the hardware scan.
      ./hardware-configuration.nix
    ];
####    Hardware
  console.keyMap = "de";
####    System
  boot.loader.systemd-boot.enable = true;
  boot.loader.efi.canTouchEfiVariables = true;
  networking.hostName = "nixos";
  # networking.wireless.enable = true;
  networking.networkmanager.enable = true;
  time.timeZone = "Europe/London";
  i18n.defaultLocale = "en_US.UTF-8";
  i18n.extraLocaleSettings = {
    LC_ADDRESS = "en_DK.UTF-8";
    LC_IDENTIFICATION = "en_DK.UTF-8";
    LC_MEASUREMENT = "en_DK.UTF-8";
    LC_MONETARY = "en_DK.UTF-8";
    LC_NAME = "en_DK.UTF-8";
    LC_NUMERIC = "en_DK.UTF-8";
    LC_PAPER = "en_DK.UTF-8";
    LC_TELEPHONE = "en_DK.UTF-8";
    LC_TIME = "en_DK.UTF-8";
  };
####    GUI
  services.xserver.enable = true;
  services.xserver.xkb.layout = "${config.console.keyMap}";
  services.xserver.xkb.variant = "";
  services.desktopManager.plasma6.enable = true;
  services.displayManager.sddm.enable = true;
  services.displayManager.sddm.wayland.enable = true;
  # Enable CUPS to print documents.
#  services.printing.enable = true;
  # Enable sound with pipewire.
  sound.enable = true;
  hardware.pulseaudio.enable = false;
  security.rtkit.enable = true;
  services.pipewire = {
    enable = true;
    alsa.enable = true;
    alsa.support32Bit = true;
    pulse.enable = true;
    #jack.enable = true;#
    #media-session.enable = true;
  };
  # Enable touchpad support (enabled default in most desktopManager).
  # services.xserver.libinput.enable = true;
  # Define a user account. Don't forget to set a password with ‘passwd’.
  users.users.k-ot = {
    isNormalUser = true;
    description = "K-oT";
    extraGroups = [ "networkmanager" "wheel" ];
    packages = with pkgs; [
      kate
    #  thunderbird
    ];
  };
  # Enable automatic login for the user.
#  services.xserver.displayManager.autoLogin.enable = true;
#  services.xserver.displayManager.autoLogin.user = "k-ot";
  services.displayManager.autoLogin.enable = true;
  services.displayManager.autoLogin.user = "k-ot";
  # Install firefox.
  programs.firefox.enable = true;
  # Allow unfree packages
  nixpkgs.config.allowUnfree = true;
  # List packages installed in system profile. To search, run:
  # $ nix search wget
  environment.systemPackages = with pkgs; [
  #  vim # Do not forget to add an editor to edit configuration.nix! The Nano editor is also installed by default.
  #  wget
    gparted
  ];
  # Some programs need SUID wrappers, can be configured further or are
  # started in user sessions.
  # programs.mtr.enable = true;
  # programs.gnupg.agent = {
  #  enable = true;
  #  enableSSHSupport = true;
  # };
  # List services that you want to enable:
  # Enable the OpenSSH daemon.
  # services.openssh.enable = true;
  # Open ports in the firewall.
  # networking.firewall.allowedTCPPorts = [ ... ];
  # networking.firewall.allowedUDPPorts = [ ... ];
  # Or disable the firewall altogether.
  # networking.firewall.enable = false;
  # This value determines the NixOS release from which the default
  # settings for stateful data, like file locations and database versions
  # on your system were taken. It‘s perfectly fine and recommended to leave
  # this value at the release version of the first install of this system.
  # Before changing this value read the documentation for this option
  # (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
  system.stateVersion = "24.05"; # Did you read the comment?
}
</pre>
: <code>lsblk</code>
<pre>
NAME                                          MAJ:MIN RM  SIZE RO TYPE  MOUNTPOINTS
sda                                            8:0    0 465,8G  0 disk 
├─sda1                                          8:1    0  512M  0 part  /boot
├─sda2                                          8:2    0 456,5G  0 part 
│ └─luks-8543211f-4aaf-41bf-8c39-456683aa0181 254:0    0 456,4G  0 crypt /nix/store
│                                                                        /
└─sda3                                          8:3    0  8,8G  0 part  [SWAP]
sdb                                            8:16  0 465,8G  0 disk 
├─sdb1                                          8:17  0  512M  0 part 
├─sdb2                                          8:18  0 456,5G  0 part 
└─sdb3                                          8:19  0  8,8G  0 part  [SWAP]
</pre>
:<code>ls -al /dev/disk/by-uuid/</code>
<pre>
total 0
drwxr-xr-x 2 root root 180 May 28 14:04 .
drwxr-xr-x 9 root root 180 May 28 14:03 ..
lrwxrwxrwx 1 root root  10 May 28 14:03 0D65-373B -> ../../sda1
lrwxrwxrwx 1 root root  10 May 28 14:04 243465e3-da8a-41eb-9b02-54ee9df2b35b -> ../../dm-0
lrwxrwxrwx 1 root root  10 May 28 14:03 27AE-D209 -> ../../sdb1
lrwxrwxrwx 1 root root  10 May 28 14:03 8543211f-4aaf-41bf-8c39-456683aa0181 -> ../../sda2
lrwxrwxrwx 1 root root  10 May 28 14:03 b4cbc87e-57f4-4f13-8a2c-7f27e3bd9620 -> ../../sdb2
lrwxrwxrwx 1 root root  10 May 28 14:03 c61979cf-4943-423f-9041-ec2b3274a6b6 -> ../../sdb3
lrwxrwxrwx 1 root root  10 May 28 14:03 e3163631-7da7-47c3-9534-1bfd8022fac2 -> ../../sda3
</pre>
: <code>ls -al /dev/disk/by-id/</code>
<pre>
total 0
drwxr-xr-x 2 root root 400 May 28 14:04 .
drwxr-xr-x 9 root root 180 May 28 14:03 ..
lrwxrwxrwx 1 root root  9 May 28 14:03 ata-Samsung_SSD_750_EVO_500GB_S363NWAH718728R -> ../../sda
lrwxrwxrwx 1 root root  10 May 28 14:03 ata-Samsung_SSD_750_EVO_500GB_S363NWAH718728R-part1 -> ../../sda1
lrwxrwxrwx 1 root root  10 May 28 14:03 ata-Samsung_SSD_750_EVO_500GB_S363NWAH718728R-part2 -> ../../sda2
lrwxrwxrwx 1 root root  10 May 28 14:03 ata-Samsung_SSD_750_EVO_500GB_S363NWAH718728R-part3 -> ../../sda3
lrwxrwxrwx 1 root root  9 May 28 14:03 ata-Samsung_SSD_850_EVO_M.2_500GB_S33DNX0H809148M -> ../../sdb
lrwxrwxrwx 1 root root  10 May 28 14:03 ata-Samsung_SSD_850_EVO_M.2_500GB_S33DNX0H809148M-part1 -> ../../sdb1
lrwxrwxrwx 1 root root  10 May 28 14:03 ata-Samsung_SSD_850_EVO_M.2_500GB_S33DNX0H809148M-part2 -> ../../sdb2
lrwxrwxrwx 1 root root  10 May 28 14:03 ata-Samsung_SSD_850_EVO_M.2_500GB_S33DNX0H809148M-part3 -> ../../sdb3
lrwxrwxrwx 1 root root  10 May 28 14:04 dm-name-luks-8543211f-4aaf-41bf-8c39-456683aa0181 -> ../../dm-0
lrwxrwxrwx 1 root root  10 May 28 14:04 dm-uuid-CRYPT-LUKS2-8543211f4aaf41bf8c39456683aa0181-luks-8543211f-4aaf-41bf-8c39-456683aa0181 -> ../../dm-0
lrwxrwxrwx 1 root root  9 May 28 14:03 wwn-0x5002538d41306eb7 -> ../../sdb
lrwxrwxrwx 1 root root  10 May 28 14:03 wwn-0x5002538d41306eb7-part1 -> ../../sdb1
lrwxrwxrwx 1 root root  10 May 28 14:03 wwn-0x5002538d41306eb7-part2 -> ../../sdb2
lrwxrwxrwx 1 root root  10 May 28 14:03 wwn-0x5002538d41306eb7-part3 -> ../../sdb3
lrwxrwxrwx 1 root root  9 May 28 14:03 wwn-0x5002538d702e43f9 -> ../../sda
lrwxrwxrwx 1 root root  10 May 28 14:03 wwn-0x5002538d702e43f9-part1 -> ../../sda1
lrwxrwxrwx 1 root root  10 May 28 14:03 wwn-0x5002538d702e43f9-part2 -> ../../sda2
lrwxrwxrwx 1 root root  10 May 28 14:03 wwn-0x5002538d702e43f9-part3 -> ../../sda3
</pre>
==== 2024-05 Installation <code>/etc/nixos/hardware-configuration.nix</code> ====
: <code>nano /etc/nixos/hardware-configuration.nix</code>
<pre>
# Do not modify this file!  It was generated by ‘nixos-generate-config’
# and may be overwritten by future invocations.  Please make changes
# to /etc/nixos/configuration.nix instead.
{ config, lib, pkgs, modulesPath, ... }:
{
  imports =
    [ (modulesPath + "/installer/scan/not-detected.nix")
    ];
  boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "usb_storage" "sd_mod" ];
  boot.initrd.kernelModules = [ ];
  boot.kernelModules = [ "kvm-intel" ];
  boot.extraModulePackages = [ ];
  fileSystems."/" =
    { device = "/dev/disk/by-uuid/243465e3-da8a-41eb-9b02-54ee9df2b35b";
      fsType = "ext4";
    };
  boot.initrd.luks.devices."luks-8543211f-4aaf-41bf-8c39-456683aa0181".device = "/dev/disk/by-uuid/8543211f-4aaf-41bf-8c39-456683aa0181";
  fileSystems."/boot" =
    { device = "/dev/disk/by-uuid/0D65-373B";
      fsType = "vfat";
      options = [ "fmask=0022" "dmask=0022" ];
    };
  swapDevices =
    [ { device = "/dev/disk/by-uuid/e3163631-7da7-47c3-9534-1bfd8022fac2"; }
      { device = "/dev/disk/by-uuid/c61979cf-4943-423f-9041-ec2b3274a6b6"; }
    ];
  # Enables DHCP on each ethernet and wireless interface. In case of scripted networking
  # (the default) this is the recommended approach. When using systemd-networkd it's
  # still possible to use this option, but it's recommended to use it in conjunction
  # with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
  networking.useDHCP = lib.mkDefault true;
  # networking.interfaces.wlp1s0.useDHCP = lib.mkDefault true;
  nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
  hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
}
</pre>

Bitte beachte, dass alle Beiträge zu Wiki StuRa HTW Dresden von anderen Mitwirkenden bearbeitet, geändert oder gelöscht werden können. Reiche hier keine Texte ein, falls du nicht willst, dass diese ohne Einschränkung geändert werden können.

Du bestätigst hiermit auch, dass du diese Texte selbst geschrieben hast oder diese von einer gemeinfreien Quelle kopiert hast (weitere Einzelheiten unter StuRa HTW Dresden:Urheberrechte). ÜBERTRAGE OHNE GENEHMIGUNG KEINE URHEBERRECHTLICH GESCHÜTZTEN INHALTE!

Bitte beantworte die folgende Frage, um diese Seite speichern zu können (weitere Informationen):

Abbrechen Bearbeitungshilfe (wird in einem neuen Fenster geöffnet)