Code Monkey home page Code Monkey logo

depenguin-installer's Introduction

mfsBSD

Copyright (c) 2019 Martin Matuska

Version 2.4

Description

This is a set of scripts that generates a bootable image, ISO file or boot files only, that create a working minimal installation of FreeBSD. This minimal installation gets completely loaded into memory.

The image may be written directly using dd(1) onto any bootable block device, e.g. a hard disk or a USB stick e.g. /dev/da0, or a bootable slice only, e.g. /dev/ada0s1

Build-time requirements

  • FreeBSD 11 or higher installed, tested on i386 or amd64
  • base.txz and kernel.txz from a FreeBSD 11 or higher distribution

Runtime requirements

  • a minimum of 512MB system memory

Other information

See BUILD and INSTALL for building and installation instructions.

Project homepage: http://mfsbsd.vx.sk

This project is based on the ideas of the depenguinator project: http://www.daemonology.net/depenguinator/

depenguin-installer's People

Contributors

andatche avatar bretton avatar daelf avatar dch avatar endyman avatar gronke avatar jaseface avatar keltia avatar laszlo-kiss avatar ltning avatar mgeb avatar mmatuska avatar mmoll avatar ndwns avatar royger avatar rubenk avatar tdb avatar tomhukins avatar vrwmiller avatar

Stargazers

 avatar

Forkers

grembo ludoplex

depenguin-installer's Issues

Retrieve authorized_keys as part of boot process

Currently an image can be built by adding conf/authorized_keys with a public key for access.

However, a new image needs to be built for different users. Or updated keys.

How can this be fixed in customfiles or customscripts to append the pubkey from the rescue system, or a web link, as the install ISO is booting?

i.e. we don't want to add keys then build, rather we want to build and retrieve keys as part of boot process.

For hetzner it may be possible to retrieve keys with

curl --netrc-file /path/to/credentials https://robot-ws.your-server.de/key

and incorporate this somehow, but then the credentials file has to be included in the build step.

It would be better to do a combination of

  • add vagrant key to authorized_keys
  • append user(s) keys to authorized_keys with fetch http://my.host/keys.txt -o /tmp/authorized_keys && cat /tmp/authorized_keys >> /root/.ssh/authorized_keys

Idea: Turn this from a fork to a consumer

It might make sense to maintain this more as a consumer of mfsbsd instead of a fork. This would mean that we store custom configs and the scriptwork required to build the mfsbsd images here (probably locked to a specific upstream commit we can then adjust as we evolve with mfsbsd). This would allow to keep this very small and avoid constant merging/rebasing. It would also force us to get required changes in mfsbsd into upstream over time (while we can also patch locally to bridge gaps).

List of mfsBSD forks with updated code

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.