nixos-config/nixos/machines/orbi/hardware-configuration/disko-config.nix

145 lines
4.3 KiB
Nix
Raw Normal View History

2024-03-02 21:19:12 +01:00
# nix run github:nix-community/nixos-anywhere -- --copy-host-keys --disk-encryption-keys /run/secret.key /home/palo/orbi/run/secret.key --flake .#orbi root@95.216.66.212
2023-12-09 17:15:50 +01:00
{ config, lib, ... }:
let
disks = [ "sda" "sdb" ];
2023-12-09 17:15:50 +01:00
in
{
disko.devices = {
disk =
lib.genAttrs disks (disk: {
type = "disk";
device = "/dev/${disk}";
content = {
2024-02-26 09:44:59 +01:00
type = "gpt";
partitions = {
boot = {
priority = 0;
2024-02-26 09:44:59 +01:00
size = "1M";
type = "EF02"; # for grub MBR
};
ESP = {
priority = 1;
2024-02-26 09:44:59 +01:00
size = "500M";
type = "EF00";
2023-12-09 17:15:50 +01:00
content = {
type = "filesystem";
format = "vfat";
mountpoint = if disk == "sda" then "/boot" else "/boot_${disk}";
2023-12-09 17:15:50 +01:00
mountOptions = [ "defaults" ];
};
2024-02-26 09:44:59 +01:00
};
root = {
2024-02-26 21:17:02 +01:00
priority = 10;
2024-02-26 09:44:59 +01:00
size = "500G";
2023-12-09 17:15:50 +01:00
content = {
type = "luks";
name = "root_${disk}";
2024-03-02 21:19:12 +01:00
# if you want to use the key for interactive login be sure there is no trailing newline
# for example use `echo -n "password" > /run/secret.key`
# for example use `pass show hetzner/orbi/master_password | head -c -1 > /run/secret.key`
# or use nixos-anywhere --disk-encryption-keys /run/secret.key <local-path>
passwordFile = "/run/secret.key";
settings = {
allowDiscards = true;
};
content = {
type = "zfs";
pool = "zroot";
};
2023-12-09 17:15:50 +01:00
};
2024-02-26 09:44:59 +01:00
};
media = {
priority = 50;
size = "100%";
content = {
type = "luks";
2024-03-02 21:19:12 +01:00
# if you want to use the key for interactive login be sure there is no trailing newline
# for example use `echo -n "password" > /run/secret.key`
# for example use `pass show hetzner/orbi/master_password | head -c -1 > /run/secret.key`
# or use nixos-anywhere --disk-encryption-keys /run/secret.key <local-path>
passwordFile = "/run/secret.key";
settings = {
allowDiscards = true;
};
name = "media_${disk}";
content = {
type = "zfs";
pool = "zmedia";
};
};
};
2024-02-26 09:44:59 +01:00
};
2023-12-09 17:15:50 +01:00
};
2024-02-24 03:20:01 +01:00
});
2023-12-09 17:15:50 +01:00
zpool = {
zroot = {
type = "zpool";
mode = "mirror";
2023-12-09 17:15:50 +01:00
rootFsOptions = {
mountpoint = "none";
canmount = "off";
compression = "lz4";
};
datasets = {
"root" = {
type = "zfs_fs";
mountpoint = "/";
options = {
mountpoint = "legacy";
compression = "lz4";
};
};
"store" = {
type = "zfs_fs";
mountpoint = "/nix/store";
options = {
mountpoint = "legacy";
compression = "lz4";
};
};
2024-04-11 19:51:10 +02:00
"nextcloud" = {
type = "zfs_fs";
mountpoint = "/var/lib/nixos-containers/nextcloud";
options = {
mountpoint = "legacy";
compression = "lz4";
"com.sun:auto-snapshot:hourly" = toString true;
"com.sun:auto-snapshot:daily" = toString true;
#"com.sun:auto-snapshot:weekly" = false;
#"com.sun:auto-snapshot:monthly" = false;
};
};
2023-12-09 17:15:50 +01:00
};
};
# `zpool import -f zraid` once on the first boot and reboot
zmedia = {
type = "zpool";
rootFsOptions = {
mountpoint = "none";
canmount = "off";
};
datasets = {
"media" = {
type = "zfs_fs";
mountpoint = "/media";
options = {
mountpoint = "legacy";
compression = "lz4";
#"com.sun:auto-snapshot:daily" = false;
#"com.sun:auto-snapshot:weekly" = false;
#"com.sun:auto-snapshot:monthly" = false;
};
};
};
};
2023-12-09 17:15:50 +01:00
};
};
}