System Installation

Additional configuration

As NixOS configuration is declarative, post-installation tasks, such as user accounts and package selection, can all be done by specifing them in configuration. See NixOS manual for details.

For timezone, hostname, networking, keyboard layout, etc, see /mnt/etc/nixos/configuration.nix.

Set root password

This optional step is an example of declaratively configuring the system.

  1. Generate password hash:

    INST_ROOT_PASSWD=$(mkpasswd -m SHA-512 -s)
    
  2. Declare initialHashedPassword for root user:

    tee -a /mnt/etc/nixos/${INST_CONFIG_FILE} <<EOF
      users.users.root.initialHashedPassword = "${INST_ROOT_PASSWD}";
    EOF
    

System installation

  1. Finalize the config file:

    tee -a /mnt/etc/nixos/${INST_CONFIG_FILE} <<EOF
    }
    EOF
    
  2. Take a snapshot of the clean installation, without state for future use:

    zfs snapshot -r rpool_$INST_UUID/$INST_ID@install_start
    zfs snapshot -r bpool_$INST_UUID/$INST_ID@install_start
    
  3. Back up bash inputs:

    history -w /mnt/home/sys-install-pre-chroot.txt
    
  4. Apply configuration

    If root password hash is not set:

    nixos-install -v --show-trace --root /mnt
    

    You will be prompted for a new root password.

    If password hash has been set:

    nixos-install -v --show-trace --no-root-passwd --root /mnt
    
  5. If boot pool encryption is used and installation fails with:

    #mktemp: failed to create directory via template
    #‘/mnt/tmp.coRUoqzl1P/initrd-secrets.XXXXXXXXXX’: No such file or directory
    #failed to create initrd secrets: No such file or directory
    

    This is a bug. Complete the installation by executing:

    nixos-enter --root /mnt -- nixos-rebuild boot
    

Finish installation

  1. Take a snapshot of the clean installation for future use:

    zfs snapshot -r rpool_$INST_UUID/$INST_ID@install
    zfs snapshot -r bpool_$INST_UUID/$INST_ID@install
    
  2. Unmount EFI system partition:

    umount /mnt/boot/efis/*
    
  3. Export pools:

    zpool export bpool_$INST_UUID
    zpool export rpool_$INST_UUID
    
  4. Reboot:

    reboot
    

Routine updates within the same major version

Updates within the same major version, such as from [21.11].001 to [21.11].100, can be done with one of the following commands:

# take immediate effect
nixos-rebuild --upgrade switch

# update upon reboot
nixos-rebuild --upgrade boot

Upgrade to a newer major version

Upgrading to a newer major version involves switching software distribution channel.

  1. View existing channels, run as root:

    nix-channel --list
    #nixos https://nixos.org/channels/nixos-21.11
    
    #this is the major version released around November 2021
    
  2. View available channels:

    w3m https://hydra.nixos.org/project/nixos
    
  3. Switch to a newer channel (22.05):

    nix-channel --add https://nixos.org/channels/nixos-22.05 nixos
    
  4. In /etc/nixos/configuration.nix:

    system.stateVersion = "22.05";
    

    If using Home Manager, in ~/.config/nixpkgs/home.nix:

    home.stateVersion = "22.05";
    
  5. Then follow the procedures for updating witin minor versions.

Immutable root file system

This section is optional.

Often, programs generate mutable files in paths such as /etc and /var/lib. The generated files can be considered a part of the system state.

This generated state is not declaratively managed by NixOS and can not be reproduced from NixOS configuration.

To ensure that the system state is fully managed by NixOS and reproducible, we need to periodically purge the system state and let NixOS regenerate root file system from scratch.

Also see: Erase your darlings: immutable infrastructure for mutable systems.

Save mutable data to alternative path

Before enabling purging on root dataset, we need to back up essential mutable data first, such as host SSH key and network connections. Below are some tips.

  • Some programs support specifying another location for mutable data, such as Wireguard:

    networking.wireguard.interfaces.wg0.privateKeyFile = "/state/etc/wireguard/wg0";
    
  • For programs without a configurable data path, environment.etc may be used:

    environment.etc = {
      "ssh/ssh_host_rsa_key".source = "/state/etc/ssh/ssh_host_rsa_key";
    }
    
  • systemd’s tmpfiles.d rules are also an option:

    systemd.tmpfiles.rules = [
      "L /var/lib/bluetooth - - - - /state/var/lib/bluetooth"
    ];
    
  • Bind mount:

    for i in {/etc/nixos,/etc/cryptkey.d}; do
      mkdir -p /state/$i /$i
      mount -o bind /state/$i /$i
    done
    nixos-generate-config --show-hardware-config
    

Boot from empty root file system

After backing up mutable data, you can try switching to an empty dataset as root file system.

  1. Check current root file system:

    ROOT_FS=$(df --output=source /|tail -n1)
    # rpool/ROOT/default
    
  2. Set empty file system as root:

    sed -i "s,${ROOT_FS},${ROOT_FS%/*}/empty,g" /etc/nixos/hardware-configuration-zfs.nix
    
  3. Apply changes and reboot:

    nixos-rebuild boot
    reboot
    
  4. If everything went fine, add the output of the following command to configuration:

    ROOT_FS=$(df --output=source /|tail -n1)
    cat <<EOF
      boot.initrd.postDeviceCommands = ''
        zpool import -Nf ${ROOT_FS%%/*}
        zfs rollback -r ${ROOT_FS%/*}/empty@start
      '';
    EOF
    
  5. Apply and reboot:

    nixos-rebuild boot
    reboot