Automatically build (netboot) images for NixOS [maintainer=@Mic92]
Find a file
2023-06-15 07:57:54 +02:00
.github update-flake-lock: fix label 2023-06-15 07:57:54 +02:00
nix nixos noninteractive: re-add missing filesystems 2023-06-11 07:31:34 +02:00
.mergify.yml replace bors with mergify 2023-06-15 07:46:46 +02:00
build-images.sh get rid of virtual variant again 2023-05-07 21:33:03 +02:00
flake.lock flake.lock: Update 2023-06-15 01:04:54 +00:00
flake.nix drop disko; add nixos 23.05 images 2023-06-11 07:44:29 +02:00
garnix.yaml garnix: enable aarch64-linux 2023-06-11 07:51:31 +02:00
LICENSE Initial commit 2021-06-10 05:52:46 +01:00
README.md link to unattended nixos installer 2023-06-11 18:18:04 +02:00

nixos-images

Automatically weekly updated images for NixOS. This project is intended to extend the images created by hydra.nixos.org. We are currently creating the images listed below:

Netboot images

You can boot the netboot image using this ipxe script. It consists of the kernel image and initrd.

Kexec tarballs

These images are used for unattended remote installation in nixos-anywhere.

Kexec is a mechanism in Linux to load a new kernel from a running Linux to replace the current kernel. This is useful for booting the Nixos installer from existing Linux distributions, such as server provider that do not offer a NixOS option. After running kexec, the NixOS installer exists only in memory. At the time of writing, this requires at least 1.5GB of physical RAM (swap does not count) in the system. If not enough RAM is available, the initrd cannot be loaded. Because the NixOS runs only in RAM, users can reformat all the system's discs to prepare for a new NixOS installation.

It can be booted as follows by running these commands as root:

curl -L https://github.com/nix-community/nixos-images/releases/download/nixos-unstable/nixos-kexec-installer-noninteractive-x86_64-linux.tar.gz | tar -xzf- -C /root
/root/kexec/run

The kexec installer comes with the following features:

  • Re-uses ssh host keys from the sshd to not break .ssh/known_hosts
  • Authorized ssh keys are read from /root/.ssh/authorized_keys, /root/.ssh/authorized_keys2 and /etc/ssh/authorized_keys.d/root
  • (experimental, only tested for nixos-unstable) Static ip addresses and routes are restored after reboot. Interface that had dynamic addresses before are configured with DHCP and to accept prefixes from ipv6 router advertisment

The actual kexec happens with a slight delay (6s). This allows for easier integration into automated nixos installation scripts, since you can cleanly disconnect from the running machine before the kexec takes place. The tarball is also designed to be run from NixOS, which can be useful for new installations