The Dettonville Automation Framework is a systematic approach to infrastructure orchestration, designed specifically for enterprise environments operating under strict regulatory bounds, air-gapped isolation, or complex private network topologies.
Unlike public-cloud-centric tooling that relies heavily on ephemeral endpoints and continuous external package mirror availability, Dettonville treats local infrastructure state as a deterministic software compilation target, prioritizing complete custody over the execution environment.
The framework assumes absolute isolation. Every module, role, configuration matrix, and verification payload is packaged to execute locally.
pip, galaxy, rubygems, or npm) during execution pipelines.Instead of traditional configuration management that merely corrects drift on an active node, the Dettonville framework enforces structural enforcement:
The foundational premise of all code and layout design within the ecosystem is strict elimination of repetition to the extent of reason. Redundant tasks, duplicated variable blocks, and copied role plays are rejected as anti-patterns. Immutability requires that structural definitions exist in exactly one authoritative location, reducing maintenance overhead and preventing structural variance.
Critical domain fixtures—such as local PKI roots, core DNS routing hierarchies, and local package/container registries—are anchored strictly via versioned text files. Downstream application runtimes remain entirely deterministic because their foundational control planes are driven by code rather than manual adjustments or dynamic state engines.
The ecosystem is highly opinionated, rejecting vendor lock-in and proprietary binary databases. All vital configuration state, inventory topologies, and platform parameters are stored exclusively in widely accepted, human-readable schemas (YAML, JSON, CSV, Markdown), guaranteeing that the entire infrastructure blueprint can be audited or recovered using standard UNIX text utilities.
The framework handles system lifecycle automation across three distinct operational boundaries:
graph LR
A[Ingest & Attest<br/><code>Inventory / Vars</code>] --> B[Cryptographic Hardening<br/><code>CIS Benchmarks / PKI</code>]
B --> C[Deterministic State Execution<br/><code>Ansible / Local Run-Loops</code>]
style A fill:#f1f5f9,stroke:#cbd5e1,stroke-width:2px;
style B fill:#f1f5f9,stroke:#cbd5e1,stroke-width:2px;
style C fill:#f1f5f9,stroke:#cbd5e1,stroke-width:2px;
Navigate through the foundational engineering specifications that govern the platform: