Initial commit
This commit is contained in:
parent
eb94a7478d
commit
3e3aa969e3
172
10_install.txt
Normal file
172
10_install.txt
Normal file
@ -0,0 +1,172 @@
|
||||
# Use `cat` to get file with lines numbered
|
||||
cat -n install.txt
|
||||
|
||||
# Use `eval` from `sed` on lines X-Y
|
||||
eval "$(sed -n X,Yp install.txt)"
|
||||
|
||||
# Ensure ethernet connection is up
|
||||
ip link
|
||||
|
||||
# Partition 512M for efi (code ef00) and rest for luks
|
||||
part /dev/nvme0n1
|
||||
|
||||
mkfs.vfat /dev/nvme0n1p1
|
||||
|
||||
# Create LUKS container
|
||||
cryptsetup luksFormat /dev/nvme0n1p2
|
||||
|
||||
cryptsetup luksOpen /dev/nvme0n1p2 cryptoroot
|
||||
|
||||
# Partition 4G for swap (code 8200) and the rest for solaris (code bf00)
|
||||
gpart /dev/mapper/cryptoroot
|
||||
|
||||
# Make swap and swap on
|
||||
mkswap /dev/mapper/cryptoroot1
|
||||
swapon /dev/mapper/cryptoroot1
|
||||
|
||||
# Double check everything is correct
|
||||
lsblk /dev/nvme0n1
|
||||
|
||||
# Load zfs modules and ensure it's loaded
|
||||
modprobe zfs
|
||||
lsmod | grep -i zfs
|
||||
|
||||
# Create root zpool
|
||||
zpool create -f \
|
||||
-O acltype=posixacl \
|
||||
-O relatime=on \
|
||||
-O dnodesize=auto \
|
||||
-O xattr=sa \
|
||||
-O normalization=formD \
|
||||
-O canmount=off \
|
||||
-O devices=off \
|
||||
-m none \
|
||||
-R /mnt \
|
||||
zroot /dev/mapper/cryptoroot2
|
||||
|
||||
# Create datasets
|
||||
zfs create -o mountpoint=none zroot/data
|
||||
zfs create -o mountpoint=none -o compression=lz4 zroot/ROOT
|
||||
zfs create -o mountpoint=/ -o canmount=noauto zroot/ROOT/default
|
||||
zfs create -o mountpoint=/opt zroot/opt
|
||||
zfs create -o mountpoint=/var zroot/var
|
||||
zfs create zroot/var/log
|
||||
zfs create -o mountpoint=/var/lib -o canmount=off zroot/var/lib
|
||||
zfs create -o mountpoint=/home zroot/home
|
||||
zfs create -o mountpoint=/root zroot/home/root
|
||||
zfs create -o setuid=off -o devices=off -o sync=disabled -o mountpoint=/tmp zroot/tmp
|
||||
|
||||
# Prepare zpool
|
||||
zpool export zroot
|
||||
zpool import -d /dev/mapper/cryptoroot2 -R /mnt zroot -N
|
||||
|
||||
# Mount and check
|
||||
zfs mount zroot/ROOT/default
|
||||
zfs mount -a
|
||||
df -k
|
||||
|
||||
# Prepare device for pool
|
||||
zpool set bootfs=zroot/ROOT/default zroot
|
||||
zpool set cachefile=/etc/zfs/zpool.cache zroot
|
||||
mkdir -p /mnt/{etc/zfs,boot/efi}
|
||||
cp /etc/zfs/zpool.cache /mnt/etc/zfs/zpool.cache
|
||||
|
||||
# Mount boot part
|
||||
mount /dev/nvme0n1p1 /mnt/boot/efi
|
||||
|
||||
# Install with pacstrap
|
||||
pacman -Syy
|
||||
pacstrap /mnt base dkms git intel-ucode linux linux-firmware linux-headers tmux vim zsh
|
||||
|
||||
# Create fs table and change root into mount
|
||||
genfstab -U -p /mnt/etc/fstab
|
||||
arch-chroot /mnt
|
||||
|
||||
# Remove zroot entries from fstab
|
||||
vim /etc/fstab
|
||||
|
||||
# Add archzfs repository
|
||||
vim /etc/pacman.conf
|
||||
-----
|
||||
[archzfs]
|
||||
SigLevel = Optional TrustAll
|
||||
Server = https://zxcvfdsa.com/archzfs/$repo/$arch
|
||||
|
||||
# Update repostories and install zfs-linux
|
||||
pacman -Syy
|
||||
pacman -S zfs-linux
|
||||
|
||||
#
|
||||
vim /etc/mkinitcpio.conf
|
||||
HOOKS=(base udev autodetect modconf block keyboard encrypt load_part resume zfs filesystems)
|
||||
# Create loader to probe cryptoroot partition
|
||||
cat > /etc/initcpio/install/load_part << EOFHOOK
|
||||
#!/bin/bash
|
||||
|
||||
build() {
|
||||
add_binary 'partprobe'
|
||||
add_runscript
|
||||
}
|
||||
|
||||
help() {
|
||||
cat << HELPEOF
|
||||
Probes mapped LUKS container for partitions.
|
||||
HELPEOF
|
||||
}
|
||||
EOFHOOK
|
||||
cat > /etc/initcpio/hooks/load_part << EOFHOOK
|
||||
run_hook() {
|
||||
partprobe /dev/mapper/cryptoroot
|
||||
}
|
||||
EOFHOOK
|
||||
|
||||
# Update initramfs
|
||||
mkinitcpio -p linux
|
||||
|
||||
# Install packages
|
||||
pacman -S base-devel dhcpcd efibootmgr grub openssh reflector rsync systemd-networkd terminus-font
|
||||
|
||||
# Use blkid /dev/nvme0n1p2 for the uuid of cryptoroot and blkid /dev/mapper/cryptoroot2 for the uuid of the swap space and update the grub file
|
||||
vim /etc/default/grub
|
||||
-----
|
||||
GRUB_CMDLINE_LINUX="cryptdevice=/dev/disk/by-uuid/<uuid>:cryptoroot rw resume=UUID=<swap UUID> root=ZFS=zroot/ROOT/default"
|
||||
GRUB_ENABLE_CRYPTODISK=y
|
||||
|
||||
# Create grub config
|
||||
grub-install --target=x86_64-efi --efi-directory=/boot/efi --bootloader-id=ArchLinux
|
||||
grub-mkconfig -o /boot/grub/grub.cfg
|
||||
|
||||
# Enable important systems
|
||||
systemctl enable systemd-networkd dhcpcd reflector.timer sshd
|
||||
systemctl enable zfs-import-cache zfs-import-scan zfs-mount zfs-share zfs-zed zfs.target
|
||||
|
||||
# Setup
|
||||
ln -sf /usr/share/zoneinfo/Canada/Vancouver /etc/localtime
|
||||
hwclock --systohc
|
||||
|
||||
# Make passwords
|
||||
passwd
|
||||
passwd iborrelli
|
||||
|
||||
# Make wheel sudoers
|
||||
visudo
|
||||
-----
|
||||
%wheel ALL=(ALL) ALL
|
||||
|
||||
# Backup reflector config and create new one
|
||||
cd /etc/xdg/reflector
|
||||
mv reflector.conf.orig
|
||||
vim reflector.conf
|
||||
-----
|
||||
--country CA
|
||||
--protocol https
|
||||
--latest 5
|
||||
--sort rate
|
||||
--save /etc/pacman.d/mirrorlist
|
||||
|
||||
# Exit chroot and clean up
|
||||
exit
|
||||
umount /mnt/boot/efi
|
||||
zfs umount -a
|
||||
zpool export zroot
|
||||
reboot
|
||||
9
11_load_from_install_medium.txt
Normal file
9
11_load_from_install_medium.txt
Normal file
@ -0,0 +1,9 @@
|
||||
# To load from install medium run the following commands
|
||||
cryptsetup luksOpen /dev/nvme0n1p2 cryptoroot
|
||||
partprobe /dev/mapper/cryptoroot
|
||||
zpool import -d /dev/mapper/cryptoroot2 -R /mnt zroot -N
|
||||
zfs mount zroot/ROOT/default
|
||||
zfs mount -a
|
||||
swapon /dev/mapper/cryptoroot1
|
||||
mount /dev/nvme0n1p1 /mnt/boot
|
||||
arch-chroot /mnt
|
||||
29
20_post_install.txt
Normal file
29
20_post_install.txt
Normal file
@ -0,0 +1,29 @@
|
||||
git clone https://aur.archlinux.org/paru.git
|
||||
cd paru
|
||||
makepkg -si
|
||||
# If using rustup then run the following when prompted: rustup install stable
|
||||
cd ..
|
||||
sudo rm -r paru
|
||||
|
||||
paru -Syy
|
||||
|
||||
# GUI
|
||||
paru -S --noconfirm greetd greetd-regreet hyprland zsh-theme-powerlevel10k-git nerd-fonts kitty oh-my-zsh-git neovim wl-clipboard wofi yazi
|
||||
|
||||
# Copy the files in greetd/ to /etc/greetd
|
||||
sudo cp ./greetd/* /etc/greetd
|
||||
|
||||
# Zinit
|
||||
bash -c "$(curl --fail --show-error --silent --location https://raw.githubusercontent.com/zdharma-continuum/zinit/HEAD/scripts/install.sh)"
|
||||
source ~/.zshrc
|
||||
zinit self-update
|
||||
|
||||
# ZIM
|
||||
curl -fsSL https://raw.githubusercontent.com/zimfw/install/master/install.zsh | zsh
|
||||
|
||||
# Apps
|
||||
paru -S filezilla firefox flatpak haveged libreoffice-fresh mpv neofetch qbittorrent vlc yt-dlp
|
||||
|
||||
# Development
|
||||
paru -S nodejs-n
|
||||
|
||||
3
21_nvim.txt
Normal file
3
21_nvim.txt
Normal file
@ -0,0 +1,3 @@
|
||||
paru -S nvim
|
||||
|
||||
|
||||
28
30_hosting.txt
Normal file
28
30_hosting.txt
Normal file
@ -0,0 +1,28 @@
|
||||
paru -S nginx
|
||||
|
||||
sudo systemctl enable nginx
|
||||
|
||||
sudo mkdir /etc/nginx/sites-enabled
|
||||
sudo mkdir /etc/nginx/sites-available
|
||||
|
||||
# Add to /etc/nginx/nginx.conf within the `http {}` block
|
||||
include /etc/nginx/sites-enabled/*
|
||||
|
||||
# Create configurations in /etc/nginx/sites-available and link with
|
||||
sudo ln -s /etc/nginx/sites-availabe/example.conf /etc/nginx/sites-enabled/
|
||||
|
||||
# Create a dataset and group srvadmin for /srv
|
||||
sudo zfs create zroot/srv
|
||||
sudo groupadd srvadmin
|
||||
sudo chown -R root:srvadmin /srv
|
||||
sudo chmod -R 770 /srv
|
||||
sudo usermod -aG srvadmin $USER
|
||||
|
||||
# Serve a site with index.html
|
||||
sudo cp ./index.html /srv/http
|
||||
sudo chown -R http:http /srv/http
|
||||
sudo chmod -R 755 /srv/http
|
||||
sudo chmod 644 /srv/http/index.html
|
||||
sudo cp turboteam.run /etc/nginx/sites-available/turboteam.run
|
||||
sudo ln -s /etc/nginx/sites-available/turboteam.run /etc/nginx/sites-enabled/
|
||||
sudo systemctl reload nginx
|
||||
58
31_mail.txt
Normal file
58
31_mail.txt
Normal file
@ -0,0 +1,58 @@
|
||||
paru -S postfix dovecot certbot certbot-nginx postfix-mysql roundcubemail postfixadmin
|
||||
|
||||
sudo certbot --nginx -d mail.turboteam.run
|
||||
# Postfix
|
||||
|
||||
sudo vim /etc/postfix/main.cf
|
||||
----
|
||||
myhostname = mail.turboteam.run
|
||||
mydomain = turboteam.run
|
||||
|
||||
# Secure SMTP
|
||||
|
||||
smtp_tls_security_level = may
|
||||
smtpd_use_tls = yes
|
||||
smtpd_tls_cert_file = /etc/letsencrypt/live/mail.turboteam.runpath/fullchain.pem
|
||||
smtpd_tls_key_file = /etc/letsencrypt/live/mail.turboteam.run/privkey.pem
|
||||
----
|
||||
|
||||
sudo vim /etc/postfix/master.cf
|
||||
----
|
||||
submission inet n - n - - smtpd
|
||||
# Uncommented for Dovecot auth
|
||||
-o smtpd_tls_security_level=encrypt
|
||||
-o smtpd_sasl_auth_enable=yes
|
||||
|
||||
# Added for Dovecot auth
|
||||
-o smtpd_sasl_type=dovecot
|
||||
-o smtpd_sasl_path=private/auth
|
||||
-o smtpd_sasl_security_options=noanonymous
|
||||
-o smtpd_sasl_local_domain=$myhostname
|
||||
-o smtpd_client_restrictions=permit_sasl_authenticated,reject
|
||||
-o smtpd_recipient_restrictions=reject_non_fqdn_recipient,reject_unknown_recipient_domain,permit_sasl_authenticated,reject
|
||||
----
|
||||
|
||||
# Dovecot SSL
|
||||
sudo cp /usr/share/doc/dovecot/dovecot-openssl.cnf /etc/ssl/dovecot-openssl.cnf
|
||||
sudo vim /etc/ssl/dovecot-openssl.cnf
|
||||
----
|
||||
# Common Name (*.example.com is also possible)
|
||||
CN=imap.turboteam.run
|
||||
|
||||
# E-mail contact
|
||||
emailAddress=postmaster@turboteam.run
|
||||
----
|
||||
sudo /usr/lib/dovecot/mkcert.sh
|
||||
sudo cp /etc/ssl/certs/dovecot.pem /etc/ca-certificates/trust-source/anchors/dovecot.crt
|
||||
sudo trust extract-compat
|
||||
|
||||
sudo systemctl restart postfix
|
||||
sudo systemctl enable postfix --now
|
||||
|
||||
# Dovecot config
|
||||
sudo mkdir /etc/dovecot
|
||||
sudo cp /usr/share/doc/dovecot/example-config/dovecot.conf /etc/dovecot/
|
||||
sudo cp -r /usr/share/doc/dovecot/example-config/conf.d/ /etc/dovecot/
|
||||
|
||||
sudo vim /etc/dovecot/conf.d/10-mail.conf
|
||||
mail_location = maildir:/var/mail/%u/Maildir
|
||||
10
32_letsencrypt.txt
Normal file
10
32_letsencrypt.txt
Normal file
@ -0,0 +1,10 @@
|
||||
paru -S certbot certbot-nginx bind
|
||||
|
||||
sudo certbot --nginx
|
||||
|
||||
sudo vim /usr/lib/systemd/system/certbot-renew.service
|
||||
# Add to the ExecStart command the following flag
|
||||
----
|
||||
--post-hook "systemctl reload nginx.service"
|
||||
|
||||
sudo systemctl enable certbot-renew.timer --now
|
||||
19
40_docker.txt
Normal file
19
40_docker.txt
Normal file
@ -0,0 +1,19 @@
|
||||
paru -S docker docker-compose
|
||||
|
||||
sudo groupadd docker
|
||||
sudo usermod -aG docker $USER
|
||||
newgrp docker
|
||||
|
||||
sudo zfs create zroot/var/lib/docker
|
||||
sudo chown -R root:docker /var/lib/docker
|
||||
sudo chmod -R 750 /var/lib/docker
|
||||
|
||||
sudo mkdir /etc/docker/
|
||||
sudo vim /etc/docker/daemon.json
|
||||
----
|
||||
{
|
||||
"group": "srvadmin",
|
||||
"storage-driver": "zfs"
|
||||
}
|
||||
|
||||
sudo systemctl enable docker.socket --now
|
||||
5
42_gitea.txt
Normal file
5
42_gitea.txt
Normal file
@ -0,0 +1,5 @@
|
||||
cp -r ./gitea/ /srv/
|
||||
sudo chown -R root:srvadmin /srv/gitea/
|
||||
sudo chmod -R 770 /srv/gitea/
|
||||
cd /srv/gitea/
|
||||
docker compose up -d
|
||||
35
gitea/compose.yaml
Normal file
35
gitea/compose.yaml
Normal file
@ -0,0 +1,35 @@
|
||||
volumes:
|
||||
gitea-data:
|
||||
driver: local
|
||||
gitea-config:
|
||||
driver: local
|
||||
services:
|
||||
server:
|
||||
image: docker.gitea.com/gitea:1.23.6-rootless
|
||||
environment:
|
||||
- GITEA__database__DB_TYPE=mysql
|
||||
- GITEA__database__HOST=db:3306
|
||||
- GITEA__database__NAME=gitea
|
||||
- GITEA__database__USER=gitea
|
||||
- GITEA__database__PASSWD=gitea
|
||||
- TZ=Canada/Vancouver
|
||||
restart: always
|
||||
volumes:
|
||||
- gitea-data:/var/lib/gitea
|
||||
- gitea-config:/etc/gitea
|
||||
ports:
|
||||
- "3001:3000"
|
||||
- "2222:2222"
|
||||
depends_on:
|
||||
- db
|
||||
|
||||
db:
|
||||
image: docker.io/library/mysql:8
|
||||
restart: always
|
||||
environment:
|
||||
- MYSQL_ROOT_PASSWORD=gitea
|
||||
- MYSQL_USER=gitea
|
||||
- MYSQL_PASSWORD=gitea
|
||||
- MYSQL_DATABASE=gitea
|
||||
volumes:
|
||||
- ./mysql:/var/lib/mysql
|
||||
16
greetd/config.toml
Normal file
16
greetd/config.toml
Normal file
@ -0,0 +1,16 @@
|
||||
[terminal]
|
||||
# The VT to run the greeter on. Can be "next", "current" or a number
|
||||
# designating the VT.
|
||||
vt = 1
|
||||
|
||||
# The default session, also known as the greeter.
|
||||
[default_session]
|
||||
|
||||
# `agreety` is the bundled agetty/login-lookalike. You can replace `/bin/sh`
|
||||
# with whatever you want started, such as `sway`.
|
||||
command = "Hyprland --config /etc/greetd/hyprland.conf"
|
||||
|
||||
# The user to run the command as. The privileges this user must have depends
|
||||
# on the greeter. A graphical greeter may for example require the user to be
|
||||
# in the `video` group.
|
||||
user = "iborrelli"
|
||||
1
greetd/hyprland.conf
Normal file
1
greetd/hyprland.conf
Normal file
@ -0,0 +1 @@
|
||||
exec-once = regreet; hyprctl dispatch exit
|
||||
Loading…
x
Reference in New Issue
Block a user