Skip to content

nixfred/fenix.v1

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

54 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ“š FeNix System 1.0 - Complete Runbook

Digital Life as Code (DLaC) - Rise from the ashes in under 10 minutes

FeNix System Version License Bootstrap

"If my machine dies, I'm back to 100% productivity in under 10 minutes"

πŸš€ TLDR - Quick Start

Just want to install FeNix? Run this ONE command:

curl -s https://raw.githubusercontent.com/nixfred/fenix.v1/main/bootstrap.sh | bash

That's it! The installer will guide you through everything else. ✨

After installation:

source ~/.bashrc    # Activate FeNix
j proj             # Jump to projects 
neo                # System info
edc                # Container management

For work machines (no system changes):

curl -s https://raw.githubusercontent.com/nixfred/fenix.v1/main/bootstrap.sh | bash -s -- --work-machine

For public repositories only (no SSH key setup):

curl -s https://raw.githubusercontent.com/nixfred/fenix.v1/main/bootstrap.sh | bash -s -- --public-only

THIS IS YOUR COMPLETE RUNBOOK - Everything you need to deploy, manage, and maintain the FeNix system. No external docs needed!

🎯 What is FeNix?

FeNix is your complete digital life as code. It's a Git-based Infrastructure-as-Code solution that can resurrect your entire development environment on any Linux machine in under 10 minutes. Unlike simple dotfile managers, FeNix manages your complete digital workspace including shell configurations, container environments, SSH keys, and multi-host synchronization.

Core Promise: "If my machine dies, I'm back to 100% productivity in under 10 minutes"

Key Features

  • 🏠 Dynamic Shell Environment - Portable configs that adapt to any system
  • 🐳 Container Orchestration - Full Docker development environments
  • πŸ”„ Multi-Host Synchronization - Seamless sync between multiple machines
  • πŸ›‘οΈ Security Monitoring - SSH intrusion detection, system health tracking
  • πŸ§ͺ Chaos-Tested - Validated across 6 Linux distributions, 2 architectures
  • ⚑ Lightning Fast - Complete environment restoration in <10 minutes

πŸš€ Quick Start

πŸ’₯ One Command to Rule Them All

curl -s https://raw.githubusercontent.com/nixfred/fenix.v1/main/bootstrap.sh | bash

🎭 Two FeNix Modes

🌐 Multi-Machine Mode (Default)

Add FeNix environment to multiple machines, each keeps its identity

# On your laptop:
curl -s https://nixfred.dev/fenix | bash

# On your server:  
curl -s https://nixfred.dev/fenix | bash

# Result: Same environment, different identities
laptop$ hostname  # β†’ laptop
server$ hostname  # β†’ server
both$ j proj      # β†’ jumps to projects (works everywhere!)

🚚 Migration Mode

Replace a machine completely - transfer your digital identity

# Migration from old-pi5 to new-pi5:
curl -s https://nixfred.dev/fenix | bash --migrate-from old-pi5

# Result: New machine becomes identical to old machine
new-pi5$ hostname    # β†’ pi5 (same as old machine)
new-pi5$ ssh ron     # β†’ works (same SSH keys)
new-pi5$ docker ps   # β†’ same containers restored

πŸ—οΈ Architecture

πŸŽͺ The FeNix Ecosystem

FeNix Repositories:
β”œβ”€β”€ fenix/              # 🌍 Master system (this repo)
β”œβ”€β”€ fenix-dotfiles/     # 🌍 Public shell configs  
└── fenix-private/      # πŸ” SSH keys & secrets

Local Structure:
~/.fenix/
β”œβ”€β”€ public/             # Public configurations
β”œβ”€β”€ private/            # Private configurations  
β”œβ”€β”€ backups/            # System backups
└── containers/         # Docker environments

πŸ”₯ Core Features

Dynamic Path Detection

No more hardcoded paths! FeNix automatically discovers:

  • Tool locations (edc, utilities) across /usr/local/bin, ~/bin, ~/.local/bin
  • Project directories (adapts to ~/projects, ~/Projects, ~/workspace, ~/docker)
  • Container configurations (handles moves and renames gracefully)

Multi-Host Orchestration

  • Auto-Discovery: Detects pi5 ↔ ron hosts and configures sync
  • Bidirectional Sync: Real-time file synchronization between machines
  • Container Deployment: Orchestrates Docker environments across hosts
  • SSH Tunneling: Smart SSH connections (pp command auto-routes)

Infrastructure Monitoring

Built-in system health dashboard:

****************************************************
*  Host:        pi5                                *
*  Docker:      3 running / 8 total               *
*  Timeshift:   12 snapshots, 45GB free          *
*  Git Branch:  fenix-dev                         *
*  SSH Fails:   None                              *
****************************************************

FeNix Testing Labs

Revolutionary validation approach:

  • Multi-Distro: Ubuntu, Debian, Fedora, Arch, Alpine, CentOS
  • Cross-Architecture: ARM64 (Raspberry Pi) + x86_64 (laptops/servers)
  • Chaos Engineering: Network failures, disk full, broken dependencies
  • Performance Benchmarks: Target <10 minutes full deployment

🎯 Use Cases

🏠 Home Lab Management

Perfect for Raspberry Pi clusters and multi-host development:

# Deploy same environment to entire cluster:
for host in pi5 ron pi-cluster-1 pi-cluster-2; do
    ssh $host "curl -s https://nixfred.dev/fenix | bash"
done

πŸ‘₯ Development Teams

Consistent environments across all developers:

# Team onboarding - one command:
curl -s https://company.com/fenix-team-config | bash

🚨 Disaster Recovery

Business continuity for development workflows:

# Machine dies at 2 AM:
curl -s https://nixfred.dev/fenix | bash --migrate-from backup-config

# Back to productivity in 8 minutes

πŸŽ“ Education & Research

Reproducible computational environments:

# Students get identical research environment:
curl -s https://university.edu/research-fenix | bash

πŸ“Š Comparison

Feature FeNix Thoughtbot Laptop Mathias Dotfiles Holman Dotfiles
Multi-Host Sync βœ… ❌ ❌ ❌
Container Orchestration βœ… ❌ ❌ ❌
Cross-Architecture βœ… ❌ ❌ ❌
Migration Mode βœ… ❌ ❌ ❌
Chaos Testing βœ… ❌ ❌ ❌
Dynamic Detection βœ… ❌ ❌ ❌
Health Monitoring βœ… ❌ ❌ ❌
Deployment Time <10 min ~30 min ~20 min ~15 min

πŸ› οΈ Advanced Usage

πŸ”§ Daily Commands

# Environment management
sb                      # Reload shell configuration
j proj                  # Jump to projects (auto-detected)
pp                      # Smart SSH (pi5 ↔ ron, others β†’ pi5)

# Container operations
edc                     # Interactive container menu (use 'c' to cancel)
edc 2                   # Direct access to container #2
edc --help              # Show edc help and usage

# System information
neo                     # System health check and info banner

πŸ§ͺ Testing New Configurations

# Test FeNix on pristine container:
docker run -it ubuntu:22.04 /bin/bash
curl -s https://raw.githubusercontent.com/nixfred/fenix/main/bootstrap.sh | bash

# Chaos engineering:
./testing/chaos-engineering.sh --scenario network_failure

πŸ” Security Features

  • SSH Key Management: Secure backup and restoration of SSH keys
  • Multi-Factor Backup: Git repos + Timeshift + encrypted archives
  • Intrusion Detection: SSH failure monitoring and alerting
  • Container Isolation: Development environments in isolated containers

πŸ—ΊοΈ Roadmap

🎯 Phase 1: Core System (Current)

  • βœ… Dynamic shell environment with path detection
  • βœ… Multi-host synchronization (pi5 ↔ ron)
  • βœ… Container orchestration and management
  • βœ… FeNix Testing Labs validation

πŸš€ Phase 2: Intelligence (Next)

  • πŸ”„ Machine learning for usage pattern optimization
  • πŸ”„ Auto-configuration based on detected hardware/OS
  • πŸ”„ Predictive resource management
  • πŸ”„ Smart conflict resolution for multi-host sync

πŸŽ‰ FeNix 1.0 Complete Feature Set

Multi-Host Infrastructure

  • βœ… Seamless pi5 ↔ ron synchronization
  • βœ… Smart SSH routing with pp command
  • βœ… Cross-architecture support (ARM64 + x86_64)

Container Management

  • βœ… Ubuntu container start/destroy commands
  • βœ… Interactive container access with edc
  • βœ… Container-safe bootstrap (works inside containers)

Dynamic Configuration

  • βœ… Self-adapting .bashrc with intelligent path detection
  • βœ… 40+ development tools in container environments
  • βœ… Enhanced shell with productivity aliases and functions

System Integration

  • βœ… System health monitoring and dashboard
  • βœ… Timeshift snapshot management
  • βœ… SSH security monitoring
  • βœ… Git-based configuration management

🀝 Contributing

🎯 Architecture Principles

  • Simplicity: One command should do everything
  • Reliability: Must work 99.9% of the time
  • Portability: Any Linux, any architecture
  • Speed: <10 minutes for complete restoration
  • Security: Defense in depth, no secret leakage

πŸ§ͺ Development Workflow

  1. Test First: Use FeNix Testing Labs before deploying
  2. Document Changes: Update CLAUDE.md files for AI assistants
  3. Maintain Portability: No hardcoded paths, dynamic detection only
  4. Security Review: Ensure no secrets in public repos
  5. Multi-Host Validation: Test on both ARM64 and x86_64

πŸ“ Contribution Guidelines

  • Fork the repository and create feature branches
  • All changes must pass the FeNix Testing Lab validation
  • Update documentation for any new features
  • Follow the existing code style and conventions
  • Add tests for new functionality

πŸ† Why FeNix?

FeNix represents the evolution from configuration management to complete Digital Life as Code (DLaC). Every component is designed for:

  • 🎯 Ultimate Reliability - Battle-tested across distributions and architectures
  • πŸš€ Maximum Portability - Works anywhere Linux runs
  • ⚑ Rapid Recovery - Minutes, not hours, to full productivity
  • πŸ”’ Security First - Multi-layered backup and intrusion detection
  • 🧠 Intelligence - Learns and adapts to your usage patterns

Rise from the ashes, stronger than before. πŸ”₯


πŸ“„ License

MIT License - see LICENSE for details.

πŸ™ Acknowledgments

Inspired by the mythological Phoenix and the principle that great systems should be able to resurrect themselves from nothing but their own descriptions.

Special thanks to the open-source community for the tools that make FeNix possible.



πŸ—οΈ Machine Architecture

Machine Roles

🏠 Main Workstation (ron)

  • Your primary machine where you do most work
  • Always has hostname "ron"
  • Other machines connect TO this one
  • Stores master copies of projects and data
  • Runs primary containers and services

πŸ–₯️ Remote Environment (pi5, laptop, work-desktop)

  • Satellite machines for remote work
  • Keep their original hostnames
  • Synchronized environment that connects back to ron
  • Lightweight setup, syncs data from main workstation

Repository Structure

GitHub Repositories:
β”œβ”€β”€ nixfred/fenix              # 🌍 PUBLIC - Master system, bootstrap scripts
β”œβ”€β”€ nixfred/fenix-dotfiles     # 🌍 PUBLIC - Shell configs, aliases, functions  
└── nixfred/fenix-private      # πŸ” PRIVATE - SSH keys, secrets, host configs

Local Structure:
~/.fenix/
β”œβ”€β”€ public/                    # Public configurations
β”œβ”€β”€ private/                   # Private configurations (SSH keys, secrets)
β”œβ”€β”€ dotfiles/                  # Shell environment files
└── backups/                   # System backups

πŸ”‘ SSH Key Strategy - SAME KEYS EVERYWHERE

IMPORTANT: FeNix uses the SAME SSH keys on ALL machines for seamless operation.

Why Same Keys Everywhere?

  • Seamless Connection: Any machine can SSH to any other machine
  • Git Access: Same GitHub/GitLab access from all machines
  • Container Deployment: Deploy containers across hosts without re-authentication
  • Simplified Management: One key pair to manage instead of multiple

SSH Key Distribution

~/.ssh/
β”œβ”€β”€ id_rsa          # SAME private key on all machines
β”œβ”€β”€ id_rsa.pub      # SAME public key on all machines
β”œβ”€β”€ config          # SSH client configuration
└── known_hosts     # Trusted hosts (grows as you connect)

Security Considerations

  • Private repo only: SSH keys never stored in public repositories
  • Proper permissions: 600 for private keys, 644 for public keys
  • Backup strategy: Keys stored in encrypted private Git repository
  • Key rotation: Change keys periodically, update all machines via FeNix

πŸš€ Quick Start Commands

Fresh Machine Setup

# On any fresh Linux machine:
curl -s https://raw.githubusercontent.com/nixfred/fenix/main/bootstrap.sh | bash

# Follow the prompts:
# 1) Choose machine type (main workstation or remote environment)  
# 2) Configure SSH keys
# 3) Let FeNix install everything

Daily Commands

# Reload shell configuration
sb                              

# Jump to projects (auto-detected directory)
j proj                          

# SSH to other host (smart routing)
pp                              

# Container access
edc                             # Interactive menu
edc 2                           # Direct access to container #2

# Sync operations  
# fenix sync                    # Sync changes across hosts  
# fenix backup                  # Create system backup
neo                             # System health check

πŸ“‹ Scenario 1: Adding a New Computer

Step 1: Determine Machine Role

Before running anything, decide:

  • Main Workstation Replacement? β†’ Will this become the new "ron"?
  • Remote Environment? β†’ Will this be a satellite machine?

Step 2: Run FeNix Bootstrap

# On the new machine:
curl -s https://raw.githubusercontent.com/nixfred/fenix/main/bootstrap.sh | bash

Step 3: Choose Configuration During Bootstrap

For Remote Environment (pi5-style):

# Bootstrap will ask:
"What type of machine is this? [1-3]: "
# Choose: 2) Remote Environment (pi5-style) - Synchronized work environment

# Results:
βœ… Keeps current hostname (laptop, pi-work, etc.)
βœ… Installs same SSH keys for seamless connection
βœ… Gets "gohome" alias to connect back to ron
βœ… Syncs environment but maintains separate identity
βœ… Lightweight configuration focused on connecting back to main

For Main Workstation Replacement:

# Bootstrap will ask:
"What type of machine is this? [1-3]: "  
# Choose: 1) Main Workstation (ron replacement) - Full digital life transfer

# Results:
βœ… Changes hostname to "ron" (after reboot)
βœ… Installs complete SSH key set with full permissions
βœ… Gets management aliases (checkremotes, deployeverywhere)
βœ… Becomes the center that other machines connect to
βœ… Restores complete container environments and data

Step 4: Post-Installation

# Reload shell to activate new configuration
source ~/.bashrc

# Test the installation
j proj                          # Should jump to projects directory
edc                             # Should show container menu (if Docker available)
pp                              # Should connect to appropriate host

# For remote environments, test connection to main:
gohome                          # Should SSH to ron

Step 5: Verify SSH Connections

# Test SSH connections between machines
ssh ron                         # From remote to main
ssh pi5                         # From main to remote (if pi5 exists)
ssh laptop                      # To any other configured machine

# If SSH fails, check:
ssh-keygen -l -f ~/.ssh/id_rsa  # Verify key is installed
cat ~/.ssh/id_rsa.pub           # Check public key content

🚚 Scenario 2: Moving Ron to a New Machine

When You Need This

  • Main workstation (ron) hardware fails
  • Upgrading to new primary machine
  • Consolidating workstations

Step 1: Prepare New Machine

# On the NEW machine that will become ron:
curl -s https://raw.githubusercontent.com/nixfred/fenix/main/bootstrap.sh | bash

Step 2: Choose Main Workstation Mode

# During bootstrap, choose:
"What type of machine is this? [1-3]: "
# Answer: 1) Main Workstation (ron replacement) - Full digital life transfer

Step 3: Bootstrap Process

The bootstrap will automatically:

βœ… Change hostname to "ron" (requires reboot to take effect)
βœ… Install complete SSH keys with full permissions
βœ… Restore all dotfiles and configurations  
βœ… Set up container environments
βœ… Configure as primary machine for remote connections
βœ… Install management aliases and functions

Step 4: Reboot and Verify

# Reboot to activate hostname change
sudo reboot

# After reboot, verify:
hostname                        # Should show "ron"
ssh pi5                         # Should connect to remote machines
docker ps                       # Should show restored containers
j proj                          # Should jump to projects directory

Step 5: Update Remote Machines

# On each remote machine (pi5, laptop, etc.), update known_hosts:
ssh-keygen -R ron               # Remove old ron key
ssh ron                         # Connect and accept new host key

# Or simply:
ssh-keyscan ron >> ~/.ssh/known_hosts

Step 6: Decommission Old Machine

# On old ron machine (if accessible):
# 1. Final data sync to new ron
rsync -av ~/projects/ new-ron:~/projects/

# 2. Final backup
fenix backup

# 3. Secure wipe (optional)
sudo shred -vfz -n 3 ~/.ssh/id_rsa

πŸ”§ SSH Key Management Details

Initial Key Setup

# Keys are managed through FeNix private repository
# During bootstrap, you'll choose:

# Option 1: Generate new keys
# - FeNix creates new SSH key pair
# - You add public key to GitHub/GitLab
# - Private key stored in fenix-private repo

# Option 2: Import existing keys  
# - Paste your existing private key
# - Paste your existing public key
# - FeNix installs them everywhere

# Option 3: GitHub import
# - Import public key from GitHub profile
# - You provide private key manually

Key Distribution Process

# FeNix automatically:
1. Stores keys in ~/.ssh/ with correct permissions
   chmod 700 ~/.ssh
   chmod 600 ~/.ssh/id_rsa
   chmod 644 ~/.ssh/id_rsa.pub

2. Updates SSH config for multi-host access
3. Adds known hosts for trusted connections
4. Tests GitHub/GitLab connectivity
5. Enables seamless machine-to-machine SSH

Key Security Best Practices

# Backup verification
ls -la ~/.ssh/                  # Check permissions
ssh-keygen -l -f ~/.ssh/id_rsa  # Verify key fingerprint
ssh -T git@github.com           # Test GitHub access

# Key rotation (annually recommended)
ssh-keygen -t rsa -b 4096 -C "your-email@domain.com"
# Then update fenix-private repo and redeploy to all machines

🐳 Container Management

Container Operations

# Interactive container menu
edc                             

# Direct container access
edc 1                           # Connect to first container
edc 2                           # Connect to second container

# Container status across hosts
fenix container-status          # Check containers on all hosts

# Deploy containers everywhere
fenix deploy-containers         # Deploy to main + all remotes

Multi-Host Container Deployment

# From main workstation (ron):
docker-compose up -d            # Start containers locally
ssh pi5 "cd ~/projects && docker-compose up -d"  # Start on remote

# Or use FeNix automation:
deployeverywhere                # Alias that deploys to all configured hosts

πŸ”„ Sync and Backup Operations

Project Synchronization

# From main workstation:
synctoremotes                   # Push projects to all remote machines

# From remote environment:
syncfromhome                    # Pull latest projects from ron

System Backups

# Create system backup
fenix backup                    # Creates timestamped backup

# System health check
fenix status                    # Shows system health across all hosts
neo                             # Detailed system information banner

Git-Based Configuration Sync

# Your configurations are in Git - sync anytime:
cd ~/.fenix/dotfiles
git pull origin main            # Get latest configs

cd ~/.fenix/private  
git pull origin main            # Get latest private configs

# Push your changes:
bashup                          # Pushes dotfiles to GitHub automatically

πŸ§ͺ Testing and Validation

Test New Configurations Safely

# Test FeNix on pristine container before deploying:
docker run -it ubuntu:22.04 /bin/bash

# Inside container:
curl -s https://raw.githubusercontent.com/nixfred/fenix/main/bootstrap.sh | bash

Validate Installation

# Check all components after installation:
which edc                       # Should find edc command
j proj && pwd                   # Should jump to projects directory  
ssh -T git@github.com           # Should authenticate with GitHub
docker ps                       # Should show containers (if Docker installed)

Performance Benchmarks

# Target metrics for FeNix installation:
# - Fresh machine to full productivity: <10 minutes
# - Bootstrap Phase 1 (public setup): <3 minutes  
# - SSH key configuration: <2 minutes
# - Private configuration install: <3 minutes
# - Container environment setup: <2 minutes

🚨 Troubleshooting

Common Issues and Solutions

SSH Connection Fails

# Check SSH key installation
ls -la ~/.ssh/id_rsa            # Should exist with 600 permissions
ssh-keygen -l -f ~/.ssh/id_rsa  # Check key fingerprint

# Test GitHub connection
ssh -T git@github.com           # Should show authentication success

# Regenerate known_hosts
rm ~/.ssh/known_hosts
ssh ron                         # Reconnect and accept host key

Bootstrap Fails

# Check internet connectivity
ping google.com

# Check GitHub access
curl -I https://github.com

# Check repository access
git clone https://github.com/nixfred/fenix.git /tmp/test-clone

Hostname Change Doesn't Work

# Manually change hostname (requires sudo)
sudo hostnamectl set-hostname ron
sudo sed -i 's/old-hostname/ron/g' /etc/hosts
sudo reboot

Dynamic Path Detection Fails

# Check if paths exist
ls -la /usr/local/bin/edc       # Check edc location
ls -la ~/projects               # Check projects directory

# Manually set paths
export PATH="$PATH:$HOME/bin"
source ~/.bashrc

πŸ“ˆ Advanced Usage

Custom Machine Configurations

# Edit machine-specific configs in private repo:
cd ~/.fenix/private

# For main workstation additions:
vim configs/main/.bashrc_main

# For remote environment additions:  
vim configs/remote/.bashrc_remote

# Push changes:
git add . && git commit -m "Update machine configs" && git push

Multi-Host Management

# Check status of all machines from ron:
checkremotes                    # Shows uptime and containers on all remotes

# Deploy same container to all hosts:
deployeverywhere                # Runs docker-compose on all configured machines

# Sync data to all remotes:
synctoremotes                   # Pushes ~/projects to all remote machines

Environment Customization

# Add custom aliases (survives FeNix updates):
echo 'alias myalias="command"' >> ~/.bash_aliases_local

# Add custom functions:
vim ~/.functions_local

# These files are preserved during FeNix updates

πŸ”’ Security Considerations

SSH Key Security

  • Single key pair: Same keys on all machines for seamless operation
  • Private storage: Keys only in encrypted private Git repository
  • Proper permissions: Automatic permission setting (600/644)
  • Regular rotation: Change keys annually, update via FeNix

Repository Security

  • Public repos: Only sanitized configurations, no secrets
  • Private repos: SSH keys, API keys, passwords - proper access control
  • Git encryption: All data encrypted in transit via HTTPS/SSH

Network Security

  • VPN recommended: Use Tailscale or similar for secure remote access
  • SSH hardening: Disable password auth, use key-based only
  • Firewall: Configure appropriate firewall rules on main workstation

πŸ› οΈ Maintenance

Regular Maintenance Tasks

# Weekly:
fenix status                    # Check system health
bashup                          # Sync any configuration changes

# Monthly:  
fenix backup                    # Create full system backup
sudo apt update && sudo apt upgrade  # Update system packages

# Annually:
# Rotate SSH keys via FeNix bootstrap
# Review and clean up old containers
# Update container base images

Updating FeNix System

# Update FeNix master system:
cd ~/.fenix/public
git pull origin main

# Update your configurations:
cd ~/.fenix/dotfiles  
git pull origin main

# Update private configurations:
cd ~/.fenix/private
git pull origin main

# Reinstall if major updates:
curl -s https://raw.githubusercontent.com/nixfred/fenix/main/bootstrap.sh | bash

πŸ“ž Getting Help

Documentation Locations

Self-Diagnosis Commands

# System health check
fenix status

# Configuration verification  
source ~/.bashrc && echo "Shell config OK"

# SSH connectivity test
ssh -T git@github.com

# Container status
docker ps --format "table {{.Names}}\t{{.Status}}"

Recovery Commands

# Emergency: Restore from backup
fenix restore

# Emergency: Fresh FeNix installation
curl -s https://raw.githubusercontent.com/nixfred/fenix/main/bootstrap.sh | bash

# Emergency: Manual SSH key restoration
# (Keep a copy of your private key in secure location outside of FeNix)

🎯 Key Takeaways

  1. Same SSH keys everywhere - This is what makes FeNix seamless
  2. Ron is always the center - Main workstation, others connect to it
  3. Git is your backup - Everything important is in Git repositories
  4. Test before deploying - Use containers to validate changes
  5. One command resurrection - Complete environment in <10 minutes

FeNix Philosophy: Your entire digital life should be reproducible from a single command. No exceptions, no manual steps, no "I forgot how to set that up."


πŸ”₯ Rise from the ashes, stronger than before. πŸ”₯

⬆ Back to top

About

πŸ”₯ FeNix System - Digital Life as Code (DLaC) | Complete Infrastructure-as-Code solution for portable development environments | Rise from the ashes in <10 minutes

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages