Skip to content

Repository for personally-managed devices

License

Notifications You must be signed in to change notification settings

MTecknology/teckhost

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

  • Build: CI/CD
  • Issues: Github Issues

MTecknology Host

This repository is used to automate the building, testing, deployment, and maintenance of servers and endpoints that are managed by MTecknology (Mike L.).

Primary Goals:

  • Provide a bootstrap script <bootstrap> to get a system "enrolled" into teckhost management
  • Provide a bare metal installer, similar to debian-installer
  • Automatically run a full CI/CD (build+install+validate) pipeline on any change

Secondary Goals:

  • Provide the ability to test with local file system changes
  • Limit user interaction to env (wifi, hostname) and encryption questions
  • Implement CI/CD release process to automatically promote after tests pass
  • Provide automated "release" of all "static assets" (teckhost.iso, bootstrap)

Deployment

VPS:

  1. Implement Salt-Cloud (or manually create)
  2. Log in and run Salt Bootstrap <bootstrap>
  3. Provide keys

Bare Metal:

  1. Download or Build <build-iso> ISO
  2. Copy ISO to flash drive (with mbuffer or dd)
  3. Boot to installer and choose either LVM or Encrypted
  4. Provide network/hostname/keys

Salt Bootstrap

Salt is at the core of deployment and maintenance. Package selection, user creation, security policies, etc. is all done by salt during a state.highstate. The ultimate goal of this ./bootstrap script is to run the highstate as quickly and safely as possible.

In order for this ./bootstrap script to complete, it will need to prompt for a passphrase to decrypt salt's Pillar Data <pillar> keys.

To run the bootstrap:

wget https://raw.githubusercontent.com/mtecknology/teckhost/master/bootstrap
bash bootstrap

Pillar Data

In order to read encrypted "pillar" data, salt needs access to a gpg key; this is stored in this repository in an encrypted blob. The Salt Bootstrap <bootstrap> script will expect the user to have access to this private key in order to decrypt the blob.

Ideally, only pre-hashed values will be stored in pillar. For example, a password hash generated with crypt is encrypted for salt, rather than the password itself. This repository is highly exposed and nothing within, even encrypted, should be considered more secure than the test data.

To encrypt data for pillar:

# Import the public key
curl -s https://raw.githubusercontent.com/MTecknology/teckhost/master/pillar/teckhost.pub | gpg --import

# Pipe the secret data through gpg
echo -n 'S3cr!t' | gpg --trust-model always -ear salt@teckhost.lustfield.net