Automatically build (netboot) images for NixOS [maintainer=@Mic92]
Find a file
github-actions[bot] 1420644027 flake.lock: Update
Flake lock file updates:

• Updated input 'nixos-stable':
    'github:NixOS/nixpkgs/086b448a5d54fd117f4dc2dee55c9f0ff461bdc1?narHash=sha256-2yV8nmYE1p9lfmLHhOCbYwQC/W8WYfGQABoGzJOb1JQ%3D' (2024-09-16)
  → 'github:NixOS/nixpkgs/944b2aea7f0a2d7c79f72468106bc5510cbf5101?narHash=sha256-NmcVhGElxDbmEWzgXsyAjlRhUus/nEqPC5So7BOJLUM%3D' (2024-09-20)
• Updated input 'nixos-unstable':
    'github:NixOS/nixpkgs/e88358265511d3a73b30dc6e4c15579844b35280?narHash=sha256-k/Ojv%2BMUDKUbj8JPd1MulJrf5BVz3jIUfrreMHbeTBE%3D' (2024-09-20)
  → 'github:NixOS/nixpkgs/179b6bce21525a3a9e725c08e6ed58d56da74825?narHash=sha256-bj9ch2QIF8jqBlPOVRnJygy1K7yWtvh8Lf7I/rsqG3A%3D' (2024-09-22)
2024-09-23 01:30:34 +00:00
.github build(deps): bump cachix/install-nix-action from V27 to 28 2024-09-16 10:22:15 +00:00
nix improve selecting latest zfs kernel 2024-09-22 17:57:34 +02:00
.mergify.yml ci(Mergify): configuration update 2024-09-20 13:04:54 +10:00
build-images.sh ci: fixup attribute names 2024-06-07 14:09:13 +02:00
flake.lock flake.lock: Update 2024-09-23 01:30:34 +00:00
flake.nix add boot tests for iso 2024-09-18 17:39:45 +02:00
LICENSE Initial commit 2021-06-10 05:52:46 +01:00
README.md Update README.md 2024-09-07 10:27:29 +05:00

nixos-images

Automatically weekly updated images for NixOS. This project is intended to extend the images created by hydra.nixos.org. We are currently creating the images listed below:

Kexec tarballs

These images are used for unattended remote installation in nixos-anywhere.

Kexec is a mechanism in Linux to load a new kernel from a running Linux to replace the current kernel. This is useful for booting the Nixos installer from existing Linux distributions, such as server provider that do not offer a NixOS option. After running kexec, the NixOS installer exists only in memory. At the time of writing, this requires secure boot off in BIOS settings and at least 1GB of physical RAM (swap does not count) in the system. If not enough RAM is available, the initrd cannot be loaded. Because the NixOS runs only in RAM, users can reformat all the system's discs to prepare for a new NixOS installation.

It can be booted as follows by running these commands as root:

curl -L https://github.com/nix-community/nixos-images/releases/download/nixos-unstable/nixos-kexec-installer-noninteractive-x86_64-linux.tar.gz | tar -xzf- -C /root
/root/kexec/run

The kexec installer comes with the following features:

  • Re-uses ssh host keys from the sshd to not break .ssh/known_hosts
  • Authorized ssh keys are read from /root/.ssh/authorized_keys, /root/.ssh/authorized_keys2 and /etc/ssh/authorized_keys.d/root
  • Static ip addresses and routes are restored after reboot. Interface that had dynamic addresses before are configured with DHCP and to accept prefixes from ipv6 router advertisement

The actual kexec happens with a slight delay (6s). This allows for easier integration into automated nixos installation scripts, since you can cleanly disconnect from the running machine before the kexec takes place. The tarball is also designed to be run from NixOS, which can be useful for new installations

Iso installer images

This image allows to boot a NixOS installer off a USB-Stick. This installer has been optimized for remote installation i.e. with nixos-anywhere and clan notably:

  • Enables openssh by default
  • Generates a random root password on each login
  • Enables a Tor hidden SSH service so that by using the torify ssh <hash>.onion, one can log in from remote machines.
  • Prints a QR-Code that contains local addresses, the root password
  • Includes the IWD deamon for easier wifi setups:
    • Run iwctl in the terminal for an interactive wifi setup interface.

Screenshot of the installer

Netboot images

You can boot the netboot image using this ipxe script. It consists of the kernel image and initrd.