Compare commits
7 Commits
c5748d81da
...
57ae6b7e72
| Author | SHA1 | Date | |
|---|---|---|---|
|
57ae6b7e72
|
|||
|
e3ba1759c4
|
|||
|
af70d1d396
|
|||
|
5b474c7190
|
|||
|
d94cd01008
|
|||
|
afb27c512c
|
|||
|
a500c8a572
|
@@ -70,10 +70,15 @@ Follow most of the instructions here: <https://wiki.archlinux.org/title/Installa
|
||||
```bash
|
||||
gpg --auto-key-locate clear,wkd -v --locate-external-key pierre@archlinux.org
|
||||
gpg --keyserver-options auto-key-retrieve --verify archlinux-...
|
||||
gpg --verify signature_file.sig archlinux.iso
|
||||
```
|
||||
|
||||
3. Create a bootable ISO <https://wiki.archlinux.org/title/USB_flash_installation_medium>
|
||||
|
||||
```bash
|
||||
dd bs=4M if=path/to/archlinux-version-x86_64.iso of=/dev/disk/by-id/usb-My_flash_drive conv=fsync oflag=direct status=progress
|
||||
```
|
||||
|
||||
1. If you are booting into a VM, create an ISO with installation files so you don't have to
|
||||
copy-paste:
|
||||
|
||||
|
||||
@@ -12,6 +12,10 @@
|
||||
- [Using GPG keys](#using-gpg-keys)
|
||||
- [Signing Files](#signing-files)
|
||||
- [Encrypting Files](#encrypting-files)
|
||||
- [Yubikey](#yubikey)
|
||||
- [Saving GPG key to card](#saving-gpg-key-to-card)
|
||||
- [Using the GPG key on a Yubikey](#using-the-gpg-key-on-a-yubikey)
|
||||
- [Factory Reset](#factory-reset)
|
||||
- [Linux Apps](#linux-apps)
|
||||
- [Evolution Email](#evolution-email)
|
||||
- [Android Apps](#android-apps)
|
||||
@@ -187,6 +191,50 @@ gpg -o README.md.gpg --symmetric README.md
|
||||
gpg --decrypt README.md.gpg
|
||||
```
|
||||
|
||||
## Yubikey
|
||||
|
||||
### Saving GPG key to card
|
||||
|
||||
<https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP>
|
||||
|
||||
```bash
|
||||
gpg --edit-key 1234ABC
|
||||
|
||||
# Save both the signature and authentication keys
|
||||
> keytocard
|
||||
|
||||
# Do not save or your key will be deleted locally
|
||||
> quit
|
||||
```
|
||||
|
||||
Check the keys on the yubikey with
|
||||
|
||||
```bash
|
||||
gpg --card-status
|
||||
```
|
||||
|
||||
Once your keys have been loaded, change the pin.
|
||||
|
||||
```bash
|
||||
gpg --change-pin
|
||||
```
|
||||
|
||||
### Using the GPG key on a Yubikey
|
||||
|
||||
<https://github.com/drduh/YubiKey-Guide?tab=readme-ov-file#notes>
|
||||
|
||||
Importing the public key and trusting it with ultimate should cause `gpg
|
||||
--list-secret-keys` to show your yubikey.
|
||||
|
||||
### Factory Reset
|
||||
|
||||
```bash
|
||||
gpg --edit-card
|
||||
|
||||
> admin
|
||||
> factory-reset
|
||||
```
|
||||
|
||||
## Linux Apps
|
||||
|
||||
### Evolution Email
|
||||
|
||||
@@ -60,8 +60,11 @@ dnf install -y cockpit-composer
|
||||
4. Run the image
|
||||
|
||||
```bash
|
||||
# List your images
|
||||
composer-cli compose list
|
||||
|
||||
# Download the image
|
||||
composer-cli compose image --filename ~/Downloads/fedora-42-base.qcow2 image-uuid
|
||||
composer-cli compose image --filename /var/lib/libvirt/images/fedora-42-base.qcow2 image-uuid
|
||||
|
||||
# Test with qemu
|
||||
qemu-kvm --name test-fedora-42-base -m 4096 -hda ~/Downloads/fedora-42-base.qcow2
|
||||
|
||||
10
active/software_steam/steam.md
Normal file
10
active/software_steam/steam.md
Normal file
@@ -0,0 +1,10 @@
|
||||
# Steam
|
||||
|
||||
## Save Game Data
|
||||
|
||||
Steam flatpak games are saved at
|
||||
`~/.var/app/com.valvesoftware.Steam/.local/share/Steam/steamapps/compatdata`
|
||||
|
||||
Search for any game here to get save location details.
|
||||
|
||||
<https://www.pcgamingwiki.com/wiki/Home>
|
||||
80
active/software_virsh/virsh.md
Normal file
80
active/software_virsh/virsh.md
Normal file
@@ -0,0 +1,80 @@
|
||||
# Virsh
|
||||
|
||||
Virtual Machine Management
|
||||
|
||||
## Before you Begin
|
||||
|
||||
1. Add yourself to the `qemu` and `libvirt` groups: `usermod -aG libvirt,qemu ducoterra`
|
||||
2. Change the images ownership to qemu: `chown -R qemu:qemu /var/lib/libvirt/images`
|
||||
3. Change the iso ownership to qemu: `chown -R qemu:qemu /var/lib/libvirt/iso`
|
||||
4. Allow group write access to images: `chmod 770 /var/lib/libvirt/images`
|
||||
5. Allow group write access to iso: `chmod 770 /var/lib/libvirt/iso`
|
||||
6. Tell virsh to connect to your root system rather than your user: `export LIBVIRT_DEFAULT_URI='qemu:///system'`
|
||||
|
||||
## VM Details
|
||||
|
||||
```bash
|
||||
# Show node info
|
||||
virsh nodeinfo
|
||||
|
||||
# List OS variants
|
||||
osinfo-query os
|
||||
|
||||
# List all current machines
|
||||
virsh list --all
|
||||
```
|
||||
|
||||
## Creating VMs
|
||||
|
||||
If you have [an osbuild
|
||||
image](/active/software_osbuild/image_builder.md#installing) you can run
|
||||
|
||||
```bash
|
||||
sudo systemctl start osbuild-composer.socket
|
||||
composer-cli compose list
|
||||
composer-cli compose image --filename /var/lib/libvirt/images/fedora-42-test.qcow2 image-uuid
|
||||
```
|
||||
|
||||
now to have a qcow2 available during install.
|
||||
|
||||
```bash
|
||||
# `--location /path/to/image.iso` supplies a disk installer. (Remove `--import`)
|
||||
# `--import` skips the installation process.
|
||||
# `--graphics spice --video qxl --channel spicevmc` installs graphics
|
||||
# `--console pty,target.type=virtio` adds a console connection
|
||||
# For any command, use `virt-install --arg=?` to see all available options
|
||||
virt-install \
|
||||
--name fedora42-test \
|
||||
--description "Test VM with Fedora42" \
|
||||
--cpu host-model --vcpus sockets=1,cores=8,threads=2 \
|
||||
--ram=8192 \
|
||||
--os-variant=fedora41 \
|
||||
--import --disk path=/var/lib/libvirt/images/fedora-42-test.qcow2,bus=virtio \
|
||||
--network bridge:virbr0 \
|
||||
--graphics none \
|
||||
--console pty,target.type=virtio
|
||||
|
||||
# Connect to console VM
|
||||
virsh console fedora42-test
|
||||
|
||||
# Connect to graphical VM
|
||||
virt-viewer --wait fedora42-test
|
||||
|
||||
# Get leased IP Addresses for the default network
|
||||
virsh net-dhcp-leases default
|
||||
|
||||
# Reboot a VM
|
||||
virsh reboot <domain>
|
||||
|
||||
# Shutdown a VM
|
||||
virsh shutdown <domain>
|
||||
|
||||
# Force shutdown a VM
|
||||
virsh destroy <domain>
|
||||
|
||||
# Remove a VM
|
||||
virsh undefine <domain>
|
||||
|
||||
# Remove a VM including storage
|
||||
virsh undefine <domain> --remove-all-storage
|
||||
```
|
||||
27
active/systemd_k0s/k0s.md
Normal file
27
active/systemd_k0s/k0s.md
Normal file
@@ -0,0 +1,27 @@
|
||||
# K0s
|
||||
|
||||
## Install
|
||||
|
||||
```bash
|
||||
# Install k0s cli
|
||||
curl -sSLf https://get.k0s.sh | sudo sh
|
||||
|
||||
# Setup the config
|
||||
k0s config create > k0s.yaml
|
||||
|
||||
# Install controller/node
|
||||
k0s install controller -c k0s.yaml --enable-worker
|
||||
systemctl enable --now k0scontroller
|
||||
|
||||
# Make an admin user
|
||||
mkdir ~/.kube
|
||||
k0s kubeconfig create --groups "system:masters" admin > ~/.kube/config
|
||||
```
|
||||
|
||||
## Uninstall
|
||||
|
||||
```bash
|
||||
systemctl stop k0scontroller
|
||||
k0s reset
|
||||
reboot
|
||||
```
|
||||
@@ -6,6 +6,7 @@
|
||||
- [Convert qcow to bootable drive](#convert-qcow-to-bootable-drive)
|
||||
- [Convert bootable drive to qcow](#convert-bootable-drive-to-qcow)
|
||||
- [ISO](#iso)
|
||||
- [ISO Access Denied on Boot](#iso-access-denied-on-boot)
|
||||
|
||||
## QCOW2
|
||||
|
||||
@@ -51,4 +52,8 @@ with gparted.
|
||||
```bash
|
||||
pacman -S cdrtools
|
||||
mkisofs -r -iso-level 4 -l -o /tmp/arch-files.iso ./arch
|
||||
```
|
||||
```
|
||||
|
||||
## ISO Access Denied on Boot
|
||||
|
||||
Turn off Secure Boot in the VM. Bios -> Device Manager -> Secure Boot Configuration -> Uncheck Attempt Secure Boot
|
||||
|
||||
Reference in New Issue
Block a user