| 2 Nov 2024 |
no-mood | I can see it only in tty, if I run the gnome terminal it crashes after a while | 20:14:35 |
no-mood | It's this one: https://www.reddit.com/r/NixOS/comments/1cmb8up/no_space_left_on_device_during_install/ | 20:16:05 |
| 3 Nov 2024 |
no-mood | Okay, there's still one thing I'm not clear about with NixOS Anywhere.
Is there a way to install the files on the target machine's disk as if I were using nixos-install? | 01:20:43 |
Sait | anyone here managed to set up raspberry pi 3/4 with disko? | 12:36:42 |
phaer | In reply to @no-mood:matrix.org Okay, there's still one thing I'm not clear about with NixOS Anywhere. Is there a way to install the files on the target machine's disk as if I were using nixos-install? Which files, your systems closure?
nixos-anywhere does call nixos-install on the remote machine, see https://github.com/nix-community/nixos-anywhere/blob/51d347d35caec995d36d1450cb5bb183318c7fb7/src/nixos-anywhere.sh#L598
| 15:50:03 |
eyJhb | In reply to @phaer:matrix.org
Yes, it's just for initial setup by default.
If you feel adventurous and have a tested backup of your data you can try rerunning the system.build.formatScript which should be idempotent but please review the script and don't blame us if it eats your data 😇
Surely I should try that... AND blame you /s :D | 16:36:01 |
no-mood | In reply to @phaer:matrix.org
Which files, your systems closure?
nixos-anywhere does call nixos-install on the remote machine, see https://github.com/nix-community/nixos-anywhere/blob/51d347d35caec995d36d1450cb5bb183318c7fb7/src/nixos-anywhere.sh#L598 The same drive I'm installing to | 16:46:15 |
no-mood | Oh right I was referring to Disko-install | 16:46:40 |
phaer | Arbitrary files? Maybe --extra-files helps? That one copies files from your current system into the installed target system | 16:47:19 |
no-mood | I'm not sure what was causing that problem, now it works with the --build-on-remote | 16:48:45 |
no-mood | While with Disko-install it was crashing | 16:49:03 |
| 4 Nov 2024 |
| dave joined the room. | 00:42:51 |
no-mood | In reply to @no-mood:matrix.org While with Disko-install it was crashing UPDATE: this was related to cosmic cache not working properly, this caused the installer to crash. Thank you :) | 13:09:16 |
no-mood | Quick question: I couldn't find if Disko can generate a mount script to mount the drive elsewhere. Is that possible? | 13:10:16 |
pinpox | Hello! I'm trying to generate an image that i can dd to my notebook and boot. I'm using LUKS and used the --pre-format-files /tmp/secret.key /tmp.secret.key option to set the password for encryption. But now after dd'ing it I get this error when trying to boot: | 19:32:39 |
pinpox | (Sorry for the shitty screenshot, no idea how to take a proper one from the boot menu | 19:33:03 |
pinpox |  Download image.png | 19:33:05 |
pinpox | * (Sorry for the shitty screenshot, no idea how to take a proper one from the boot menu) | 19:33:06 |
pinpox | It is trying to find the encryption key file on the real machine. | 19:33:23 |
pinpox | How do I generate a LUKS encrypted disko system that asks for the password and then boots? | 19:33:44 |
lassulus | I think the impure image script should be able to ask you for the password interactively | 19:38:23 |
pinpox | How do I use that/make it ask? | 19:39:21 |
pinpox | currently using this config: https://termbin.com/v5pk then running:
nix build .\#nixosConfigurations.limette.config.system.build.diskoImagesScript
sudo ./result --build-memory 4096 --pre-format-files /tmp/secret.key /tmp/secret.ke
dd if=main.raw ...
| 19:40:34 |
pinpox | * currently using this config: https://termbin.com/v5pk then running:
nix build .\#nixosConfigurations.limette.config.system.build.diskoImagesScript
sudo ./result --build-memory 4096 --pre-format-files /tmp/secret.key /tmp/secret.key
sudo dd if=main.raw ...
| 19:42:26 |
@brian:bmcgee.ie | I'm having trouble mixing in a passwordFile for vmVariantWithDisko. It doesn't seem to like merging this config:
virtualisation.vmVariantWithDisko = {
disko.devices.mdadm = let
passwordFile = pkgs.writeText "secret.key" "!Pa55w0rd";
in {
raid0.content.passwordFile = passwordFile;
raid5.content.passwordFile = passwordFile;
};
};
Gives me: at «string»:1:1: 1| nixosConfigurations.saturn.config.virtualisation.vmVariantWithDisko.disko.devices.mdadm.raid0.content | ^
… while evaluating the attribute 'value'
at /nix/store/vpzg5qjqwl76ichhjwwgmwc8v3j369q5-source/lib/modules.nix:809:9:
808| in warnDeprecation opt //
809| { value = builtins.addErrorContext "while evaluating the option `${showOption loc}':" value;
| ^
810| inherit (res.defsFinal') highestPrio;
(stack trace truncated; use '--show-trace' to show the full trace)
error: No type option set in:
{
passwordFile = <derivation secret.key>;
}
| 20:16:49 |
@brian:bmcgee.ie | * I'm having trouble mixing in a passwordFile for vmVariantWithDisko. It doesn't seem to like merging this config:
virtualisation.vmVariantWithDisko = {
disko.devices.mdadm = let
passwordFile = pkgs.writeText "secret.key" "!Pa55w0rd";
in {
raid0.content.passwordFile = passwordFile;
raid5.content.passwordFile = passwordFile;
};
};
Gives me: at «string»:1:1: 1| nixosConfigurations.saturn.config.virtualisation.vmVariantWithDisko.disko.devices.mdadm.raid0.content | ^
… while evaluating the attribute 'value'
at /nix/store/vpzg5qjqwl76ichhjwwgmwc8v3j369q5-source/lib/modules.nix:809:9:
808| in warnDeprecation opt //
809| { value = builtins.addErrorContext "while evaluating the option `${showOption loc}':" value;
| ^
810| inherit (res.defsFinal') highestPrio;
(stack trace truncated; use '--show-trace' to show the full trace)
error: No type option set in:
{
passwordFile = <derivation secret.key>;
}
| 20:16:59 |
lassulus | In reply to @pinpox:matrix.org
currently using this config: https://termbin.com/v5pk then running:
nix build .\#nixosConfigurations.limette.config.system.build.diskoImagesScript
sudo ./result --build-memory 4096 --pre-format-files /tmp/secret.key /tmp/secret.key
sudo dd if=main.raw ...
ah that is already the impure script, but you can skip configuring a keyFile in that case | 20:18:21 |
@brian:bmcgee.ie | Here's the luks setup in my main disko config:
mdadm = {
raid0 = {
type = "mdadm";
level = 0;
content = {
type = "luks";
name = "crypted-root";
settings = {
allowDiscards = true;
};
content = {
type = "btrfs";
extraArgs = [ "-f" ];
subvolumes = {
"/root" = {
mountpoint = "/";
mountOptions = [
"compress=zstd"
"noatime"
];
};
"/home" = {
mountpoint = "/home";
mountOptions = [
"compress=zstd"
"noatime"
];
};
"/nix" = {
mountpoint = "/nix";
mountOptions = [
"compress=zstd"
"noatime"
];
};
};
};
};
};
raid5 = {
type = "mdadm";
level = 5;
content = {
type = "luks";
name = "crypted-archive";
content = {
type = "btrfs";
extraArgs = [ "-f" ];
subvolumes = {
"/archive" = {
mountpoint = "/archive";
mountOptions = [
"compress=zstd"
"noatime"
];
};
"/archive/media" = {
mountpoint = "/archive/media";
mountOptions = [
"compress=zstd"
"noatime"
];
};
"/archive/backups" = {
mountpoint = "/archive/backups";
mountOptions = [
"compress=zstd"
"noatime"
];
};
};
};
};
};
};
| 20:18:48 |
@brian:bmcgee.ie | * Here's the luks setup in my main disko config:
disko.devices.mdadm = {
raid0 = {
type = "mdadm";
level = 0;
content = {
type = "luks";
name = "crypted-root";
settings = {
allowDiscards = true;
};
content = {
type = "btrfs";
extraArgs = [ "-f" ];
subvolumes = {
"/root" = {
mountpoint = "/";
mountOptions = [
"compress=zstd"
"noatime"
];
};
"/home" = {
mountpoint = "/home";
mountOptions = [
"compress=zstd"
"noatime"
];
};
"/nix" = {
mountpoint = "/nix";
mountOptions = [
"compress=zstd"
"noatime"
];
};
};
};
};
};
raid5 = {
type = "mdadm";
level = 5;
content = {
type = "luks";
name = "crypted-archive";
content = {
type = "btrfs";
extraArgs = [ "-f" ];
subvolumes = {
"/archive" = {
mountpoint = "/archive";
mountOptions = [
"compress=zstd"
"noatime"
];
};
"/archive/media" = {
mountpoint = "/archive/media";
mountOptions = [
"compress=zstd"
"noatime"
];
};
"/archive/backups" = {
mountpoint = "/archive/backups";
mountOptions = [
"compress=zstd"
"noatime"
];
};
};
};
};
};
};
| 20:19:12 |
lassulus | that sounds like https://github.com/NixOS/nixpkgs/pull/254790#discussion_r1358073458 | 20:19:34 |