Browse Source

Ajour des drafts

master
Quentin 1 month ago
parent
commit
ffd1358f1f
  1. 22
      _drafts/2021-09-25-impression-3d-notes.md
  2. 151
      _drafts/nix.md

22
_drafts/2021-09-25-impression-3d-notes.md

@ -0,0 +1,22 @@
Marque de la laque: 3DLAC.
```gcode
G21 ;metric values
M82 ;set extruder to absolute mode
M107 ;start with the fan off
M280 P0 S160; BL-Touch Alarm realease
G4 P100; Delay for BL-Touch
G28; home
M280 P0 S160 ; BLTouch alarm release
G4 P100 ; delay for BLTouch
G29; Auto leveling
M420 Z5 ; LEVELING_FADE_HEIGHT Real activation and set parameters (if not set here, Z-Compensation failed)
M500; Write data carto G29
G92 E0 ;zero the extruded length
G1 F200 E3 ;extrude 3mm of feed stock
G92 E0 ;zero the extruded length again
G1 F4200
M117 Printing...
```

151
_drafts/nix.md

@ -0,0 +1,151 @@
## Boot a VM
Check launch.sh
## Create basic partitioning
```bash
sudo parted /dev/sda -- mklabel gpt
# uefi part
sudo parted /dev/sda -- mkpart ESP fat32 1MiB 512MiB
sudo parted /dev/sda -- set 1 esp on
sudo mkfs.fat -F 32 -n boot /dev/sda1
# encrypted part
sudo parted /dev/sda -- mkpart cryptroot 512MiB 100%
```
Setup the crypted boot:
```bash
sudo cryptsetup luksFormat /dev/sda2 # need to set the password
sudo cryptsetup open /dev/sda2 cryptlvm
sudo pvcreate /dev/mapper/cryptlvm
sudo vgcreate EncryptedOS /dev/mapper/cryptlvm
sudo lvcreate -L 8G EncryptedOS -n swap
sudo lvcreate -l 100%FREE EncryptedOS -n root
mkfs.ext4 -L nixos /dev/MyVolGroup/root
mkswap -L cryptswap /dev/MyVolGroup/swap
```
## Mount our stuff!
```
sudo swapon -L cryptswap
sudo mount /dev/disk/by-label/nixos /mnt
sudo mkdir /mnt/boot
sudo mount /dev/disk/by-label/boot /mnt/boot
```
## Generate the configuration
```bash
nixos-generate-config --root /mnt
```
And then we need to update `/mnt/etc/nix/configuration.nix` to add luks to the initrd:
```
{
# snip...
boot.initrd.luks.devices."cryptlvm".device = "/dev/disk/by-partlabel/cryptroot";
# snip...
}
```
*Another tutorial updates the hardware-configuration.nix but it seems to be a bad practise as the file may be overwritten in the future by some Nix tools*
*Do not forget to put "s" at the end when required, do not forget the semi colon at the end of the expression*.
When ready, run:
```bash
sudo nixos-install
```
The tool assumes that you mounted your future system on `/mnt`.
Type the password you want for your root user, wait that the program returns and poweroff:
```bash
sudo poweroff
```
## Booting on a fresh NixOS
*Show how we changed the command line*
Start your VM, first type your cryptsetup password.
Then login with the root account (you just created the password with `nixos-install`).
If you made a change to your configuration.nix, you can apply it with:
```
nixos-rebuild switch
```
You can update your system by running:
```bash
nix-channel --update nixos
nixos-rebuild switch
```
## Setting up my users
I chose to go for the declarative way.
I first set:
```
users.mutableUsers = false;
```
Then I create my user:
```
users.users.quentin = {
isNormalUser = true;
home = "/home/quentin";
description = "Quentin Dufour";
extraGroups = [ "wheel" "networkmanager" ];
hashedPassword = ""; # compute with mkpasswd -m sha-512
}
```
## Setting up my DE
I chose Sway which is an i3 clone for Wayland.
```
programs.sway.enable = true;
```
It is covered here: https://nixos.org/manual/nixos/stable/index.html#sec-wayland
I also added some programs:
```
wget
vim
nyxt
alacritty
```
## Sources
Comment configurer une machine UEFI :
- https://papy-tux.legtux.org/doc1310/index.html
Comment installer simplement :
- https://nixos.org/manual/nixos/stable/#sec-installation
Comment chiffrer :
- https://ramblings.henryjenkins.name/posts/going-from-zero-to-nixos/
Loading…
Cancel
Save