Compare commits

...

7 Commits

Author SHA1 Message Date
57ae6b7e72 update dd command for bootable arch installer
All checks were successful
Podman DDNS Image / build-and-push-ddns (push) Successful in 56s
2025-10-23 10:41:11 -04:00
e3ba1759c4 init software_steam 2025-10-23 10:40:56 -04:00
af70d1d396 add secure boot note to systemd_qemu 2025-10-23 10:40:47 -04:00
5b474c7190 init software_k0s 2025-10-23 10:40:20 -04:00
d94cd01008 init software_virsh 2025-10-23 10:40:10 -04:00
afb27c512c add composer-cli list image command 2025-10-23 10:40:00 -04:00
a500c8a572 add yubikey gpg notes 2025-10-23 10:39:34 -04:00
7 changed files with 180 additions and 2 deletions

View File

@@ -70,10 +70,15 @@ Follow most of the instructions here: <https://wiki.archlinux.org/title/Installa
```bash
gpg --auto-key-locate clear,wkd -v --locate-external-key pierre@archlinux.org
gpg --keyserver-options auto-key-retrieve --verify archlinux-...
gpg --verify signature_file.sig archlinux.iso
```
3. Create a bootable ISO <https://wiki.archlinux.org/title/USB_flash_installation_medium>
```bash
dd bs=4M if=path/to/archlinux-version-x86_64.iso of=/dev/disk/by-id/usb-My_flash_drive conv=fsync oflag=direct status=progress
```
1. If you are booting into a VM, create an ISO with installation files so you don't have to
copy-paste:

View File

@@ -12,6 +12,10 @@
- [Using GPG keys](#using-gpg-keys)
- [Signing Files](#signing-files)
- [Encrypting Files](#encrypting-files)
- [Yubikey](#yubikey)
- [Saving GPG key to card](#saving-gpg-key-to-card)
- [Using the GPG key on a Yubikey](#using-the-gpg-key-on-a-yubikey)
- [Factory Reset](#factory-reset)
- [Linux Apps](#linux-apps)
- [Evolution Email](#evolution-email)
- [Android Apps](#android-apps)
@@ -187,6 +191,50 @@ gpg -o README.md.gpg --symmetric README.md
gpg --decrypt README.md.gpg
```
## Yubikey
### Saving GPG key to card
<https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP>
```bash
gpg --edit-key 1234ABC
# Save both the signature and authentication keys
> keytocard
# Do not save or your key will be deleted locally
> quit
```
Check the keys on the yubikey with
```bash
gpg --card-status
```
Once your keys have been loaded, change the pin.
```bash
gpg --change-pin
```
### Using the GPG key on a Yubikey
<https://github.com/drduh/YubiKey-Guide?tab=readme-ov-file#notes>
Importing the public key and trusting it with ultimate should cause `gpg
--list-secret-keys` to show your yubikey.
### Factory Reset
```bash
gpg --edit-card
> admin
> factory-reset
```
## Linux Apps
### Evolution Email

View File

@@ -60,8 +60,11 @@ dnf install -y cockpit-composer
4. Run the image
```bash
# List your images
composer-cli compose list
# Download the image
composer-cli compose image --filename ~/Downloads/fedora-42-base.qcow2 image-uuid
composer-cli compose image --filename /var/lib/libvirt/images/fedora-42-base.qcow2 image-uuid
# Test with qemu
qemu-kvm --name test-fedora-42-base -m 4096 -hda ~/Downloads/fedora-42-base.qcow2

View File

@@ -0,0 +1,10 @@
# Steam
## Save Game Data
Steam flatpak games are saved at
`~/.var/app/com.valvesoftware.Steam/.local/share/Steam/steamapps/compatdata`
Search for any game here to get save location details.
<https://www.pcgamingwiki.com/wiki/Home>

View File

@@ -0,0 +1,80 @@
# Virsh
Virtual Machine Management
## Before you Begin
1. Add yourself to the `qemu` and `libvirt` groups: `usermod -aG libvirt,qemu ducoterra`
2. Change the images ownership to qemu: `chown -R qemu:qemu /var/lib/libvirt/images`
3. Change the iso ownership to qemu: `chown -R qemu:qemu /var/lib/libvirt/iso`
4. Allow group write access to images: `chmod 770 /var/lib/libvirt/images`
5. Allow group write access to iso: `chmod 770 /var/lib/libvirt/iso`
6. Tell virsh to connect to your root system rather than your user: `export LIBVIRT_DEFAULT_URI='qemu:///system'`
## VM Details
```bash
# Show node info
virsh nodeinfo
# List OS variants
osinfo-query os
# List all current machines
virsh list --all
```
## Creating VMs
If you have [an osbuild
image](/active/software_osbuild/image_builder.md#installing) you can run
```bash
sudo systemctl start osbuild-composer.socket
composer-cli compose list
composer-cli compose image --filename /var/lib/libvirt/images/fedora-42-test.qcow2 image-uuid
```
now to have a qcow2 available during install.
```bash
# `--location /path/to/image.iso` supplies a disk installer. (Remove `--import`)
# `--import` skips the installation process.
# `--graphics spice --video qxl --channel spicevmc` installs graphics
# `--console pty,target.type=virtio` adds a console connection
# For any command, use `virt-install --arg=?` to see all available options
virt-install \
--name fedora42-test \
--description "Test VM with Fedora42" \
--cpu host-model --vcpus sockets=1,cores=8,threads=2 \
--ram=8192 \
--os-variant=fedora41 \
--import --disk path=/var/lib/libvirt/images/fedora-42-test.qcow2,bus=virtio \
--network bridge:virbr0 \
--graphics none \
--console pty,target.type=virtio
# Connect to console VM
virsh console fedora42-test
# Connect to graphical VM
virt-viewer --wait fedora42-test
# Get leased IP Addresses for the default network
virsh net-dhcp-leases default
# Reboot a VM
virsh reboot <domain>
# Shutdown a VM
virsh shutdown <domain>
# Force shutdown a VM
virsh destroy <domain>
# Remove a VM
virsh undefine <domain>
# Remove a VM including storage
virsh undefine <domain> --remove-all-storage
```

27
active/systemd_k0s/k0s.md Normal file
View File

@@ -0,0 +1,27 @@
# K0s
## Install
```bash
# Install k0s cli
curl -sSLf https://get.k0s.sh | sudo sh
# Setup the config
k0s config create > k0s.yaml
# Install controller/node
k0s install controller -c k0s.yaml --enable-worker
systemctl enable --now k0scontroller
# Make an admin user
mkdir ~/.kube
k0s kubeconfig create --groups "system:masters" admin > ~/.kube/config
```
## Uninstall
```bash
systemctl stop k0scontroller
k0s reset
reboot
```

View File

@@ -6,6 +6,7 @@
- [Convert qcow to bootable drive](#convert-qcow-to-bootable-drive)
- [Convert bootable drive to qcow](#convert-bootable-drive-to-qcow)
- [ISO](#iso)
- [ISO Access Denied on Boot](#iso-access-denied-on-boot)
## QCOW2
@@ -51,4 +52,8 @@ with gparted.
```bash
pacman -S cdrtools
mkisofs -r -iso-level 4 -l -o /tmp/arch-files.iso ./arch
```
```
## ISO Access Denied on Boot
Turn off Secure Boot in the VM. Bios -> Device Manager -> Secure Boot Configuration -> Uncheck Attempt Secure Boot