Skip to content

Latest commit

 

History

History
executable file
·
87 lines (58 loc) · 2.49 KB

README.md

File metadata and controls

executable file
·
87 lines (58 loc) · 2.49 KB
tags
Readme

Arcanum

built with nix nixos-unstable GitHub Actions LICENSE

Quick Start

SSH keys in /etc/ssh will be copied over to the new installation.

bin/localinstall

Usage : localinstall -h <hostname> [options]

Options:

* -h, --host <hostname>
Set the config hostname to install from this flake

* --secureboot
Generate secure boot keys.

* --initrdssh
Generate initrd SSH host keys.

* --homesecrets
Install home secrets key

* --username
Set the username to install secrets (optional)

bin/remoteinstall

Usage : remoteinstall -h <hostname> -p <port> -i <ip> [options]

Options:


* -h, --host <hostname>
Set the config hostname to install from this flake.

* -p, --port <ssh_port>
Set the SSH port to connect with.

* -i, --ip <ssh_ip>
Set the destination IP to install.

* --identity-key <file_path>
Set the private key to use

* --secureboot
Generate secure boot keys.

* --initrdssh
Generate initrd SSH host keys.

* --homesecrets
Install home secrets key

* --username
Set the username to install secrets (optional)

--initrdssh requires sudo.

Deploy

nix run or nix run -- -t host1,host2

TODOs

  • At least in private git instance try to use proper commit prefix. [see here][https://github.com/angular/angular.js/blob/master/DEVELOPERS.md#type]
  • Deploy hashicorp vault or something capable of rotating credentials
  • Figure out how to achieve fully automated remote luks unlock
  • Organize secrets structure, with per-machine credentials and preferably credentials rotation
  • After implementing all library features eventually stabilize the structure to a point where i feel comfortable mirroring all commits from private git instance to GitHub without rebasing
  • Handle acme.sh failure and send a fail signal to healthchecks
  • Copying ssh age key at installation is tedious. find a way to manage this remotely, kms solution?