X-Git-Url: https://iankelling.org/git/?a=blobdiff_plain;f=README;h=f20bd12273f8d996919829a96eaa6106fe6fa3e4;hb=ee37d990c89bb3bab1b54e3b3fb43e9f79ed039b;hp=3c9b6d2d8850316cf8c5d8e445debecd286476a7;hpb=da61a304a10de72288782a9d872769fe44576f50;p=automated-distro-installer diff --git a/README b/README index 3c9b6d2..f20bd12 100644 --- a/README +++ b/README @@ -1,25 +1,44 @@ PXE install w multi-boot, btrfs & Libreboot support Some things are specific to my home network, and uses files with secrets -that are not in this repo. Uses pxe or pxe-kexec (on libreboot, I have -not added a pxe rom, I use a minimal debian stable subvolume which acts -like a pxe rom). I use this for bare metal and vms, and two scripts -which can run post boot so I use them on vps distributed image as well. - -Features people may find useful: installs encrypted trisquel belenos, , -debian jessie, debian stretch, ubuntu 16.04, and arch (havne't done -recently, probably a bit broken), in a multi-boot setup using multiple +that are not in this repo. I use this for bare metal and vms, and two +scripts which can run post boot so I use them on vps distributed image +as well. + +Features people may find useful: installs encrypted trisquel, debian, +ubuntu, arch, and parabola (archlike install is likely broken, I've only +done pxe boots recently), in a multi-boot setup using multiple subvolumes of a single btrfs filesystem. Utilizes multiple disks, with scripts to automatically decrypt on intentional reboots, but not after shutdown or power loss. +Normal install mode for fai is using pxe, but on a libreboot system, +there is no pxe. The pxe in a normal computer is nonfree +firmware. Alternatives to normal pxe that I've tried: + +* libreboot + seabios + ipxe + +* Use a live cd to call pxe-kexec, this is described later in this file. + +* Use the fai autodiscover iso. This is more automated, so nicer. + +* Use an install method above to setup a gnu/linux disk partition that + coordinates with libreboot grub to acts like a pxe boot using + kexec. The boot process takes a bit longer than normal pxe. This is + the bootstrap partition in my scripts. + +Things I haven't tried: + +* The bios chip has enough room for an initrd. This could be setup to + work like the partition I use to kexec, but it would be faster, and + not require installing to disk. + The partititioning and filesystem script is at -fai/config/hooks/partition.DEFAULT. Other debian based distros at least -as new as ubuntu 14.04 should work fine, and I'm planning to add Fedora -support. Disks are grouped as ssd or hdd and raided in raid 1 or raid 0 -per configuration. The base partitions are divided into boot, swap, and -root, (only boot is unencrypted). There are scripts to resize those -partitions post-provision and while the system is running. +fai/config/hooks/partition.DEFAULT. Disks are grouped as ssd or hdd and +raided in raid 1 or raid 0 per configuration. The base partitions are +divided into boot, swap, and root, (only boot is unencrypted). There are +scripts to resize those partitions post-provision and while the system +is running. People who use fai may find these things as useful examples: it uses dnsmasq (on a openwrt machine) for dhcp instead of the isc @@ -45,27 +64,46 @@ Some of the scripts have dependencies for some simple obvious utility scripts from https://iankelling.org/git, and of course there are some hostnames that are specific to my network. +Before doing a fai install, you will need to populate a class file. I +use one called 5-multi-boot, which you can see example of in +fai/config/class/50-host-classes. + +Before doing a fai install, you will need to populate /q/root/luks and +/q/root/shadow, see their references. You might also want to copy +existing /etc/ssh/*host* to +/p/c/machine_specific/HOST/filesystem/etc/ssh. + + + All scripts meant to be used directly are listed here: # Scripts to setup the environment for the install -arch-pxe # Setup arch pxe boot server from an arch base image + +# create tiny autodiscover cd +fai-redep && sudo fai-cd -g $PWD/grub.cfg.autodiscover -f -A $BASEFILE_DIR/autodiscover.iso +# create normal fai cd (replace TARGET_HOST) +fai-redep -t TARGET_HOST && sudo fai-cd -M -g $PWD/grub.cfg.netinst -f $BASEFILE_DIR/netinst.iso +note, may need to set hostname in something like LAST.var +also, may need to unset proxy. +mymk-basefile # Create basefiles for various distros +archlike-pxe # Setup pxe boot server from an archlike base image fai-redep # Deploy fai configuration to host "faiserver" -faiserver-revm # using pxe & preseed, create a vm which is a fai server faiserver-uninstall # uninstall fai-server faiserver-setup # install fai-server on the current machine myfai-chboot # setup fai tftp and nfs. useful for doing pxe-kexec pxe-server # disable/enable pxe dhcp, tfp, and nfs. calls myfai-chboot -wrt-setup-remote # setup my router in general: dhcp, dns, etc. +wrt-setup # setup my router in general: dhcp, dns, etc. # Script to do a distro install +faiserver-revm # using pxe & preseed, create a vm which is a fai server dsfull # install & post-install a new fai distro arch-init-remote # install arch after it's been booted into it's setup env -fai-kexec # Kexec this or a remote machine using host faiserver -live-kexec # fai kexec from upstream live cds, e.g. curl live-kexec|bash +live-kexec # Kexec this or a remote machine using host faiserver. also + useful to run as curl live-kexec|bash # Test scripts @@ -84,8 +122,62 @@ faiserver-disable # Disable the fai nfs server exports fresize # resize swap or boot partitions in a host -License stuff: +# Replacing a raid 10 disk + +# i expect better results with newer kernel and btrfs progs than the default stretch +fai-server buster + +pxe-server -S HOST fai + +# btrfs replace or delete. prefer replace. to setup partitions on replacement drive: +scp fai-wrapper HOST: +ssh root@HOST +. fai-wrapper +export SPECIAL_DISK=/dev/REPLACEMENT_DEV +/var/lib/fai/config/hooks/partition.DEFAULT + + +ssh root@HOST +for x in /target/* /target; do umount $x; done +cat >p +PASSWORD HERE(ctrl-d ctrl-d) +cd /dev/disk/by-id/ +for d in ata*part1; do cryptsetup luksOpen -d /root/p $d crypt_dev_$d; done +x=(/dev/mapper/*part1); mount -o subvol=root_trisquelflidas $x /mnt +# btrfs fi show /mnt +# btrfs replace start -f /dev/mapper/OLD_DEV /dev/mapper/NEW_DEV /mnt +# btrfs replace status /mnt +# nohup btrfs dev delete /dev/sde1 /mnt +mount -o subvol=boot_trisquelflidas /dev/sda3 /mnt/boot +# also replace or delete disk for boot +for x in dev proc sys; do mount -o bind /$x /mnt/$x; done +chroot /mnt /bin/bash +# replace disk in fstab +# replace disk in /etc/crypttab +update-grub +update-initramfs -u +mount /a +/a/exe/keyscript-on +exit +reboot + + +# Expected output in fai logs + +For flidas, when installing systemd, this error happens, and it's +a superflous upstream bug based on reading the post install script: + +addgroup: The group `systemd-journal' already exists as a system group. Exiting. +Operation failed: No such file or directory + + +# TODO +Change arch to archlike and to support arch and parabola + + +# License + The license for the project is GPLv2 or later, mostly because fai is and -I periodically rebase off their example config, which contains small +I periodically merge the upstream example config, which contains small scripts. Also, there is a modified encrypt.upstream, which is from the cryptsetup package in arch, which is under the same license.