mirror of
https://codeberg.org/privacy1st/nixos-anywhere-example
synced 2024-11-22 22:09:34 +01:00
update helper script
This commit is contained in:
parent
c5d85e4b4a
commit
a4bcb6cc77
@ -39,11 +39,11 @@ nix --extra-experimental-features nix-command --extra-experimental-features flak
|
|||||||
run github:numtide/nixos-anywhere -- --flake '.#mysystem' -p 22 root@192.168.178.106
|
run github:numtide/nixos-anywhere -- --flake '.#mysystem' -p 22 root@192.168.178.106
|
||||||
```
|
```
|
||||||
|
|
||||||
To install on remote target machine **and** print the SSH fingerprint of the new system:
|
To install on remote target machine **and** print the SSH fingerprint of the new system. If no encrypted disks are set up, the disk password can be left empty:
|
||||||
|
|
||||||
```shell
|
```shell
|
||||||
# yodaHP
|
# yodaHP
|
||||||
./install-with-ssh-fingerprint.sh 22 root@192.168.178.106
|
./install-helper.sh 22 root@192.168.178.106
|
||||||
```
|
```
|
||||||
|
|
||||||
## Updating dependencies
|
## Updating dependencies
|
||||||
|
@ -25,8 +25,8 @@
|
|||||||
./hardware-configs/yodaHP.nix
|
./hardware-configs/yodaHP.nix
|
||||||
|
|
||||||
# Select disko disk layout configuration.
|
# Select disko disk layout configuration.
|
||||||
./disk-configs/simple-efi.nix
|
#./disk-configs/simple-efi.nix
|
||||||
#./disk-configs/zfs.nix
|
./disk-configs/luks-btrfs.nix
|
||||||
#./disk-configs/luks-lvm.nix
|
#./disk-configs/luks-lvm.nix
|
||||||
|
|
||||||
# Change device name match your block device.
|
# Change device name match your block device.
|
||||||
|
@ -6,21 +6,59 @@ set -e
|
|||||||
#
|
#
|
||||||
|
|
||||||
cleanup() {
|
cleanup() {
|
||||||
printf '%s\n' 'Deleting local copy of SSH ed25519 key ...'
|
printf '%s\n' 'Cleanup on exit.'
|
||||||
rm -rf "${temp}"
|
if [ -d "${temp}" ]; then
|
||||||
|
printf '%s\n' 'Deleting local copy of SSH ed25519 key ...'
|
||||||
|
rm -rf "${temp}"
|
||||||
|
fi
|
||||||
|
if [ -d "${pwd_temp}" ]; then
|
||||||
|
printf '%s\n' 'Deleting local copy of disk encryption password ...'
|
||||||
|
rm -rf "${pwd_temp}"
|
||||||
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
gen_ssh_key() {
|
gen_ssh_key() {
|
||||||
# Create a temporary directory.
|
# Create a temporary directory.
|
||||||
temp="$(mktemp -d)"
|
temp="$(mktemp -d)"
|
||||||
# Cleanup temporary directory on exit.
|
|
||||||
trap cleanup EXIT
|
|
||||||
|
|
||||||
# Create the directory where sshd expects to find the host keys.
|
# Create the directory where sshd expects to find the host keys.
|
||||||
install -d -m755 "${temp}/etc/ssh"
|
install -d -m755 "${temp}/etc/ssh"
|
||||||
# Generate host key.
|
# Generate host key.
|
||||||
ssh-keygen -t ed25519 -f "${temp}/etc/ssh/ssh_host_ed25519_key" -q -N ""
|
ssh-keygen -t ed25519 -f "${temp}/etc/ssh/ssh_host_ed25519_key" -q -N ""
|
||||||
}
|
}
|
||||||
|
ssh_fingerprint() {
|
||||||
|
printf '%s\n' 'SSH ed25519 fingerprint:'
|
||||||
|
ssh-keygen -lf "${temp}/etc/ssh/ssh_host_ed25519_key"
|
||||||
|
}
|
||||||
|
|
||||||
|
save_pwd() {
|
||||||
|
# Create a temporary directory.
|
||||||
|
pwd_temp="$(mktemp -d)"
|
||||||
|
|
||||||
|
# Get password from user without echoing.
|
||||||
|
# https://stackoverflow.com/a/3980713
|
||||||
|
stty -echo
|
||||||
|
printf "Disk encryption password: "
|
||||||
|
read -r password
|
||||||
|
stty echo
|
||||||
|
printf "\n"
|
||||||
|
|
||||||
|
stty -echo
|
||||||
|
printf "Retype disk encryption password: "
|
||||||
|
read -r password2
|
||||||
|
stty echo
|
||||||
|
printf "\n"
|
||||||
|
|
||||||
|
if [ "${password}" != "${password2}" ]; then
|
||||||
|
printf '%s\n' 'Passwords don'\''t match!'
|
||||||
|
return 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Create password-file.
|
||||||
|
install -m600 /dev/stdin "${pwd_temp}/pwd.key" << EOF
|
||||||
|
${password}
|
||||||
|
EOF
|
||||||
|
}
|
||||||
|
|
||||||
main(){
|
main(){
|
||||||
num_args=2
|
num_args=2
|
||||||
@ -37,13 +75,23 @@ main(){
|
|||||||
ssh_port="${1}"
|
ssh_port="${1}"
|
||||||
ssh_target="${2}"
|
ssh_target="${2}"
|
||||||
|
|
||||||
printf '%s\n' 'Generating SSH ed25519 key ...'
|
# Cleanup temporary directories on exit.
|
||||||
|
trap cleanup EXIT
|
||||||
|
|
||||||
gen_ssh_key
|
gen_ssh_key
|
||||||
printf '%s\n' 'SSH ed25519 fingerprint:'
|
save_pwd
|
||||||
ssh-keygen -lf "${temp}/etc/ssh/ssh_host_ed25519_key"
|
|
||||||
|
# echo "$temp"
|
||||||
|
# echo "$pwd_temp"
|
||||||
|
# echo "Press enter start the installation:"
|
||||||
|
# read -r _foo
|
||||||
|
|
||||||
# Install NixOS to the target machine with our secrets.
|
# Install NixOS to the target machine with our secrets.
|
||||||
nix --extra-experimental-features nix-command --extra-experimental-features flakes \
|
nix --extra-experimental-features nix-command --extra-experimental-features flakes \
|
||||||
run github:numtide/nixos-anywhere -- --extra-files "${temp}" --flake '.#mysystem' -p "${ssh_port}" "${ssh_target}"
|
run github:numtide/nixos-anywhere -- --extra-files "${temp}" \
|
||||||
|
--disk-encryption-keys /tmp/secret.key "${pwd_temp}/pwd.key" --flake '.#mysystem' \
|
||||||
|
-p "${ssh_port}" "${ssh_target}"
|
||||||
|
|
||||||
|
ssh_fingerprint
|
||||||
}
|
}
|
||||||
main "$@"
|
main "$@"
|
Loading…
Reference in New Issue
Block a user