1420644027
Flake lock file updates: • Updated input 'nixos-stable': 'github:NixOS/nixpkgs/086b448a5d54fd117f4dc2dee55c9f0ff461bdc1?narHash=sha256-2yV8nmYE1p9lfmLHhOCbYwQC/W8WYfGQABoGzJOb1JQ%3D' (2024-09-16) → 'github:NixOS/nixpkgs/944b2aea7f0a2d7c79f72468106bc5510cbf5101?narHash=sha256-NmcVhGElxDbmEWzgXsyAjlRhUus/nEqPC5So7BOJLUM%3D' (2024-09-20) • Updated input 'nixos-unstable': 'github:NixOS/nixpkgs/e88358265511d3a73b30dc6e4c15579844b35280?narHash=sha256-k/Ojv%2BMUDKUbj8JPd1MulJrf5BVz3jIUfrreMHbeTBE%3D' (2024-09-20) → 'github:NixOS/nixpkgs/179b6bce21525a3a9e725c08e6ed58d56da74825?narHash=sha256-bj9ch2QIF8jqBlPOVRnJygy1K7yWtvh8Lf7I/rsqG3A%3D' (2024-09-22) |
||
---|---|---|
.github | ||
nix | ||
.mergify.yml | ||
build-images.sh | ||
flake.lock | ||
flake.nix | ||
LICENSE | ||
README.md |
nixos-images
Automatically weekly updated images for NixOS. This project is intended to extend the images created by hydra.nixos.org. We are currently creating the images listed below:
Kexec tarballs
These images are used for unattended remote installation in nixos-anywhere.
Kexec is a mechanism in Linux to load a new kernel from a running Linux to replace the current kernel. This is useful for booting the Nixos installer from existing Linux distributions, such as server provider that do not offer a NixOS option. After running kexec, the NixOS installer exists only in memory. At the time of writing, this requires secure boot off in BIOS settings and at least 1GB of physical RAM (swap does not count) in the system. If not enough RAM is available, the initrd cannot be loaded. Because the NixOS runs only in RAM, users can reformat all the system's discs to prepare for a new NixOS installation.
It can be booted as follows by running these commands as root:
curl -L https://github.com/nix-community/nixos-images/releases/download/nixos-unstable/nixos-kexec-installer-noninteractive-x86_64-linux.tar.gz | tar -xzf- -C /root
/root/kexec/run
The kexec installer comes with the following features:
- Re-uses ssh host keys from the sshd to not break
.ssh/known_hosts
- Authorized ssh keys are read from
/root/.ssh/authorized_keys
,/root/.ssh/authorized_keys2
and/etc/ssh/authorized_keys.d/root
- Static ip addresses and routes are restored after reboot. Interface that had dynamic addresses before are configured with DHCP and to accept prefixes from ipv6 router advertisement
The actual kexec happens with a slight delay (6s). This allows for easier integration into automated nixos installation scripts, since you can cleanly disconnect from the running machine before the kexec takes place. The tarball is also designed to be run from NixOS, which can be useful for new installations
Iso installer images
This image allows to boot a NixOS installer off a USB-Stick. This installer has been optimized for remote installation i.e. with nixos-anywhere and clan notably:
- Enables openssh by default
- Generates a random root password on each login
- Enables a Tor hidden SSH service so that by using the
torify ssh <hash>.onion
, one can log in from remote machines. - Prints a QR-Code that contains local addresses, the root password
- Includes the IWD deamon for easier wifi setups:
- Run
iwctl
in the terminal for an interactive wifi setup interface.
- Run
Netboot images
You can boot the netboot image using this ipxe script. It consists of the kernel image and initrd.