Skip to content

Latest commit

 

History

History
65 lines (53 loc) · 1.76 KB

README.md

File metadata and controls

65 lines (53 loc) · 1.76 KB

strongHome

Deploy

Generate certs

First, we need all the certificates that will be used by the services. Generate them with this:

./utils/generate-crypto-stuff.sh

Generate config

For simple configuration of the project, I strongly recommend to use "StrongHome Configurator". Launch it with:

docker run -it --rm -v $PWD:/remote vk496/stronghome-utils config

For test pruposes, you can use directly the example config:

cp test/strongHome-config-test.yaml config/strongHome-config.yaml

Validate config

Check if your config is correct before continue. You can ommit this step if you have used "StrongHome Configurator" or the example config:

docker run --rm -v $PWD:/remote vk496/stronghome-utils pykwalify -s config/strongHome-schema.yaml -d config/strongHome-config.yaml

Start the project

docker-compose --compatibility up --build -d

Unit tests

docker-compose --compatibility -f docker-compose.yml -f test/docker-compose.test.yml up --build; docker-compose down

TODO list

  • PKI
  • LDAP
    • Define admin permissions with YAML
    • Auto-generate config
    • Unit tests
    • Define ACL policies for each application (Radius, VoIP, etc.) to have restricted access
  • 802.11X
    • Auto-generate config
    • Tests for all kind of radius auth methods
  • YAML config
    • Schema
  • NextCloud
    • LDAP
    • Unit tests
    • Server side encryption
  • Email server
  • VoIP?
  • Sync startup containers
  • Web for manager LDAP/restore passwords
  • Design optional services (torrents, plex, etc.)
  • Dynamic auto-configuration stuff should be in a aislated service
  • Beautiful way to generate strongHome YAML config
  • Scalable services