mirror of
				https://github.com/TommyTran732/Fedora-CoreOS-Ignition.git
				synced 2025-11-03 18:48:35 +01:00 
			
		
		
		
	Add files via upload
This commit is contained in:
		
							
								
								
									
										147
									
								
								Docker-Compose.yml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										147
									
								
								Docker-Compose.yml
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,147 @@
 | 
			
		||||
variant: fcos
 | 
			
		||||
version: 1.4.0
 | 
			
		||||
boot_device:
 | 
			
		||||
passwd:
 | 
			
		||||
  users:
 | 
			
		||||
    - name: tomster
 | 
			
		||||
      ssh_authorized_keys: 
 | 
			
		||||
        - ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAIAQDPgQ5VZDocVP2R9L+PCOczgpcuKBeb+NnwuXo6JgeFnR+ebZ8OHnWAqDMQoUN+VveN5ja+Bklrra8EifsaX6yysvtHqY+DgaClo+f4N8/Tcg9oOATuOPz5ls4ZPILWs6AN0p5NYP4UNQEAdSQKehQd1X1Q3Z4Am1CNs7u4mcsaeoKY29qbj+YJ2R2EfI9jq5y558vi7Bm7a5mpkQ8+l/7/mt3OO6OEy6osjnAoa3yRIHGhkpLBQkIGOg99DIK/FKMD+XK346P7Go+peUdV7lmOtKSaOHAmpuMWUXTBnPMsznfyhmIh56vuWhDm/3M4iHdowa0TNHgOL30a8IOWKrSQhwD4k2pKLqkjSZ50Yp3AtNN0kE4w/h22dIxnEQsUyA6WDSP3GVhsxX0BC/luA8b5hHGa+ID1bFgFx/UNQvLlb9UHTzmKrTaxaku3bwaPvdM4DTVajmRIUMH8mXW34iKBXF2zHpl9nKEfbYeT9/L8PekAAMdSWeG2YpOxOgRm79me8K5umqyFUano6F3K0ag+nIgrPf6oJ2n9DysUiaGxGwdmb40VitHE6i5K+eJDaZxqQHi9g4ItQXsJBg5q8YdQ3WUAUyPzv4way/7Qgz1cubvyWJwn51BDcESburBjoyieLfAhSiB2cS80AWVEpYIAknj8JCdhPRi/SdgLXppDFdAUnMuKUqFoXk14X6v2olXXSYNi3T6dFRiOsQHxjBA/x8sr15MK5Y4fCt1aAvGL+JhkOz5rhA0/Ay7Y0diELdSAPnb8jgO/VH0xUPxRG5+0iEd2uo7uUknql8JLE6U7bzutLn8oexbTKOLzFzkWXKABBN5F0XwQEI05DDHjC4NgLuiV3Y1U40BqtW4ou26chTC3Vx8aA4+x4pZcPJEkGoOPtG3ybNtJgYRuuVdmkRcl2kKwC8v7dYuGe9nQFN6vTudpgahn1vD+zxsuvOwOQ+3mF8H6y5R1/SC0bHHYexhBQAD62hcrdK+qj5K+Y8jj5+o+zHgIK2POZAQWoWgJTTq2KrmDiDN3xvhBSYwU2bgkizJ0p3tqJOGit0S+LAgIZnNW5hdXbkDLROj4al3aAIw5oHi6HhHsf6ShsnkoLnlKD/4jLcuYa1GB6jnCR28AHDH1WQjdOOOK3evm9+PUZ61KLRtjT7BYCRpRTf2ofywuTTh4D6qn2pcz/KdVfHeYMv4syd3ZRFF2UXVZbNFeuk8RuwcFEdfYh5lgAJJMj0Zj7NF49CVJekhw2/BuWQs3SZU/afCAnAOh79tyFgFtSqHCjjzbQEBpa2TYiNlNTJsC03Sjml4ehQlMN0GziXwubdAdAyMQa30otNmBU4IqF3Ud7HcyHP9fw1xlSmlJjhZk5gHOnMTUYXmZl/jOPHAdrJw6snp0Afy2A3K15TB/58916OELezWp0SJDpG76odS41XITpjTjQ41j836tQienXJaAv9AvvAd13xNBYXgHvhVk//F6v11rcQM2AexS62S1JvCQmumNNYv+YLONnMDj0PR6MUljw3cWYTw7LB+cWndHHvw2kt/kjTnrwJtE9VcYYUZZOp8lHiuFSAOE8J5QKX5JzZRaDftAucESQtyq56+y4GvBfipo1AYQpr8jCyTszmmHi1JEeiVedKVR6AJ2K+zbfVj/uw0n55t+aUBsA0/C5jjZzRtaJvb1IaV/YeKThJROjQUGyhuwMnzZvrZDc/959KkZuk2ZLKFwOwuPKPZsajaGbWSTiDYfXfvmzM6P2M5ABFx13hOBPhm0n+EeDuoI811jvHb3zYLN05MnU8akbpdZWBbu8fmGM6HR1LZ7nKU+vw1s10tUhQtX9VyUuwPanMrhlAN6tA4xw99GtORp84XHDkICzneDDGv8e7eWBN1CZcVWozfG9+XLpWKlxI20gaxisyfIkl75VgdJYMXibfZmM5/fqAUj7/c1cyorGqlgQ33RCjwcPWjFGiBI+HHdw9c0KiQvgXVXddVyNkRUhD8mpM7WoDfzdcYSJQ8btVdFyIAM1ngIMLkZW4S7bcG6soSdOyR8zKCgIz2o3Ota8S7+DDnlkjCRKgdAz13YLkOBrcu126RW86eNGgrqtxwITmMqzU4IgzjsdkMYNv5NfKc//nKuWwHaOXByKEpJ8JUMNXaeUf+wJ/h1MdifzGsr91Dqp/qc3kKrebM4Oa8KHCzR2H5u6mXH3iOQPptyzVMBvq5GNs+JVZkCnF23CwzHH4+bHDZV6PC9xe9GY/rP/JcPb0prvQbXdZaehRejjGX136oHnn38Skc6XHmwuhuCsnHf3ryJT386G1Oz5iSu1UKgyqEr0eG1CvYuq87AGvOw3fp2CgXiZKq9om6P6TdiGEnVEj7d/jyb4Qe2qnDXZvi/Clv+RPX8yGWkYyPrpn+DMcqntJKXzo2g1FaZBUt9DnvVNt4tNzmQQbOudyaDTm+iDEonHXrk6+4kOM9t+B2w2Cc7WZGFyboZzUOo77gwXM/z3rYv8O6S5U1DPaHStBRRFUPhQu+24xJb2OWOLcFRHgu5IdXRp+hlhjPS+HzzoW++tCYeN23L2fDYQyAAvuGfQpJGPpheZKb2A52QRG7XBWIbWO4X1I/aQI12aQkzpcFWY1xnuTVjDzqF2eYx22HCQeCYhwMJ0vQNPbmOm57yCyU8q04+VYMQ1uO5x4zJ28BDCzQ4UFYVk7DgL5Fq4sjFUcAqCEc36dVJFw/aDEFnTeWlb6REzf2IqLNvWQ== tomster@PRL-01
 | 
			
		||||
      groups:
 | 
			
		||||
        - wheel
 | 
			
		||||
        - sudo
 | 
			
		||||
systemd:
 | 
			
		||||
  units:
 | 
			
		||||
    - name: postinst.service
 | 
			
		||||
      enabled: true
 | 
			
		||||
      contents: |
 | 
			
		||||
        [Unit]
 | 
			
		||||
        Description=Initial System Setup
 | 
			
		||||
        # We run after `systemd-machine-id-commit.service` to ensure that
 | 
			
		||||
        # `ConditionFirstBoot=true` services won't rerun on the next boot.
 | 
			
		||||
        After=systemd-machine-id-commit.service
 | 
			
		||||
        After=network-online.target
 | 
			
		||||
        # We run before `zincati.service` to avoid conflicting rpm-ostree
 | 
			
		||||
        # transactions.
 | 
			
		||||
        Before=zincati.service
 | 
			
		||||
        ConditionPathExists=!/var/lib/%N.stamp
 | 
			
		||||
 | 
			
		||||
        [Service]
 | 
			
		||||
        Type=oneshot
 | 
			
		||||
        RemainAfterExit=yes
 | 
			
		||||
        ExecStart=/usr/bin/rpm-ostree install docker-compose fail2ban firewalld prelockd tuned qemu-guest-agent
 | 
			
		||||
        ExecStart=/bin/touch /var/lib/%N.stamp
 | 
			
		||||
        ExecStart=/usr/sbin/setsebool -P container_use_cephfs off
 | 
			
		||||
        ExecStart=/usr/sbin/setsebool -P virt_use_nfs off
 | 
			
		||||
        ExecStart=/usr/sbin/setsebool -P virt_use_samba off
 | 
			
		||||
        ExecStart=/usr/bin/sed 's/nullok//g' /etc/pam.d/system-auth
 | 
			
		||||
        ExecStart=/usr/bin/curl https://raw.githubusercontent.com/Whonix/security-misc/master/etc/modprobe.d/30_security-misc.conf -o /etc/modprobe.d/30_security-misc.conf
 | 
			
		||||
        ExecStart=/bin/systemctl --no-block reboot
 | 
			
		||||
 | 
			
		||||
        [Install]
 | 
			
		||||
        WantedBy=multi-user.target
 | 
			
		||||
    - name: docker.service
 | 
			
		||||
      enabled: true
 | 
			
		||||
    - name: fstrim.timer
 | 
			
		||||
      enabled: true
 | 
			
		||||
    - name: systemd-oomd.service
 | 
			
		||||
      enabled: true
 | 
			
		||||
    - name: rpm-ostree-countme.timer
 | 
			
		||||
      enabled: false
 | 
			
		||||
      mask: true
 | 
			
		||||
storage:
 | 
			
		||||
  files:
 | 
			
		||||
    - path: /etc/zincati/config.d/51-rollout-wariness.toml
 | 
			
		||||
      contents:
 | 
			
		||||
        inline: |
 | 
			
		||||
          [identity]
 | 
			
		||||
          rollout_wariness = 1
 | 
			
		||||
    - path: /etc/zincati/config.d/55-updates-strategy.toml
 | 
			
		||||
      contents:
 | 
			
		||||
        inline: |
 | 
			
		||||
          [updates]
 | 
			
		||||
          strategy = "periodic"
 | 
			
		||||
          [updates.periodic]
 | 
			
		||||
          time_zone = "localtime"
 | 
			
		||||
          [[updates.periodic.window]]
 | 
			
		||||
          days = [ "Sun" ]
 | 
			
		||||
          start_time = "0:00"
 | 
			
		||||
          length_minutes = 60
 | 
			
		||||
    - path: /etc/fail2ban/jail.local
 | 
			
		||||
      contents:
 | 
			
		||||
        inline: |
 | 
			
		||||
          [DEFAULT]
 | 
			
		||||
          # Maximum 3 failures:
 | 
			
		||||
          maxentry = 3
 | 
			
		||||
          # Ban hosts for ten hour:
 | 
			
		||||
          bantime = 3600
 | 
			
		||||
          # Override /etc/fail2ban/jail.d/00-firewalld.conf:
 | 
			
		||||
          banaction = iptables-multiport
 | 
			
		||||
          [sshd]
 | 
			
		||||
          enabled = true
 | 
			
		||||
    - path: /etc/tuned/active_profile
 | 
			
		||||
      overwrite: true
 | 
			
		||||
      contents:
 | 
			
		||||
        inline: |
 | 
			
		||||
          virtual-guest
 | 
			
		||||
    - path: /etc/tuned/profile_mode
 | 
			
		||||
      overwrite: true
 | 
			
		||||
      contents:
 | 
			
		||||
        inline: |
 | 
			
		||||
          manual
 | 
			
		||||
    - path: /etc/systemd/zram-generator.conf
 | 
			
		||||
      overwrite: true
 | 
			
		||||
      contents:
 | 
			
		||||
        inline: |
 | 
			
		||||
          # This config file enables a /dev/zram0 device with the default settings
 | 
			
		||||
          [zram0]
 | 
			
		||||
          zram-fraction = 1
 | 
			
		||||
          max-zram-size = 8192
 | 
			
		||||
    - path: /etc/security/limits.d/30-disable-coredump.conf
 | 
			
		||||
      overwrite: true
 | 
			
		||||
      contents: 
 | 
			
		||||
        inline: | 
 | 
			
		||||
          * hard core 0
 | 
			
		||||
    - path: /etc/ssh/ssh_config.d/60-disable-GSSAPI.conf
 | 
			
		||||
      overwrite: true
 | 
			
		||||
      contents: 
 | 
			
		||||
        inline: | 
 | 
			
		||||
          GSSAPIAuthentication no
 | 
			
		||||
    - path: /etc/sysctl.d/20-silence-audit.conf
 | 
			
		||||
      contents:
 | 
			
		||||
        inline: |
 | 
			
		||||
          # Raise console message logging level from DEBUG (7) to WARNING (4)
 | 
			
		||||
          # so that audit messages don't get interspersed on the console that
 | 
			
		||||
          # may frustrate a user trying to interactively log in.
 | 
			
		||||
          kernel.printk=4
 | 
			
		||||
  links:
 | 
			
		||||
    - path: /etc/localtime
 | 
			
		||||
      target: ../usr/share/zoneinfo/America/New_York
 | 
			
		||||
    - path: /etc/systemd/system/multi-user.target.wants/tuned.service
 | 
			
		||||
      target: /usr/lib/systemd/system/tuned.service
 | 
			
		||||
    - path: /etc/systemd/system/multi-user.target.wants/prelockd.service
 | 
			
		||||
      target: /usr/lib/systemd/system/prelockd.service
 | 
			
		||||
    - path: /etc/systemd/system/multi-user.target.wants/fail2ban.service
 | 
			
		||||
      target: /usr/lib/systemd/system/fail2ban.service
 | 
			
		||||
    - path: /etc/systemd/system/kdump.service.target
 | 
			
		||||
      target: /dev/null
 | 
			
		||||
kernel_arguments:
 | 
			
		||||
  should_exist:
 | 
			
		||||
    - kvm.nx_huge_pages=force
 | 
			
		||||
    - random.trust_cpu=off
 | 
			
		||||
    - kernel.dmesg_restrict=1
 | 
			
		||||
    - fs.protected_fifos=2
 | 
			
		||||
    - fs.protected_regular=2
 | 
			
		||||
    - fs.protected_symlinks=1
 | 
			
		||||
    - fs.protected_hardlinks=1
 | 
			
		||||
    - net.core.bpf_jit_harden=2
 | 
			
		||||
    - kernel.kexec_load_disabled=1
 | 
			
		||||
    - kernel.kptr_restrict=2
 | 
			
		||||
    - vm.mmap_rnd_bits=32
 | 
			
		||||
    - vm.mmap_rnd_compat_bits=16
 | 
			
		||||
    - kernel.yama.ptrace_scope=2
 | 
			
		||||
    - fs.suid_dumpable=0
 | 
			
		||||
    - net.ipv4.tcp_rfc1337=1
 | 
			
		||||
    - kernel.perf_event_paranoid=3
 | 
			
		||||
    - kernel.randomize_va_space=2
 | 
			
		||||
    - net.ipv4.icmp_ignore_bogus_error_responses=1
 | 
			
		||||
    - net.ipv4.conf.all.log_martians=1
 | 
			
		||||
							
								
								
									
										160
									
								
								Generic.ign
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										160
									
								
								Generic.ign
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,160 @@
 | 
			
		||||
{
 | 
			
		||||
  "ignition": {
 | 
			
		||||
    "version": "3.3.0"
 | 
			
		||||
  },
 | 
			
		||||
  "kernelArguments": {
 | 
			
		||||
    "shouldExist": [
 | 
			
		||||
      "kvm.nx_huge_pages=force",
 | 
			
		||||
      "random.trust_cpu=off",
 | 
			
		||||
      "kernel.dmesg_restrict=1",
 | 
			
		||||
      "fs.protected_fifos=2",
 | 
			
		||||
      "fs.protected_regular=2",
 | 
			
		||||
      "fs.protected_symlinks=1",
 | 
			
		||||
      "fs.protected_hardlinks=1",
 | 
			
		||||
      "net.core.bpf_jit_harden=2",
 | 
			
		||||
      "kernel.kexec_load_disabled=1",
 | 
			
		||||
      "kernel.kptr_restrict=2",
 | 
			
		||||
      "vm.mmap_rnd_bits=32",
 | 
			
		||||
      "vm.mmap_rnd_compat_bits=16",
 | 
			
		||||
      "kernel.yama.ptrace_scope=2",
 | 
			
		||||
      "fs.suid_dumpable=0",
 | 
			
		||||
      "net.ipv4.tcp_rfc1337=1",
 | 
			
		||||
      "kernel.perf_event_paranoid=3",
 | 
			
		||||
      "kernel.randomize_va_space=2",
 | 
			
		||||
      "net.ipv4.icmp_ignore_bogus_error_responses=1",
 | 
			
		||||
      "net.ipv4.conf.all.log_martians=1"
 | 
			
		||||
    ]
 | 
			
		||||
  },
 | 
			
		||||
  "passwd": {
 | 
			
		||||
    "users": [
 | 
			
		||||
      {
 | 
			
		||||
        "groups": [
 | 
			
		||||
          "wheel",
 | 
			
		||||
          "sudo"
 | 
			
		||||
        ],
 | 
			
		||||
        "name": "tomster",
 | 
			
		||||
        "sshAuthorizedKeys": [
 | 
			
		||||
          "ssh-rsa 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 tomster@PRL-01"
 | 
			
		||||
        ]
 | 
			
		||||
      }
 | 
			
		||||
    ]
 | 
			
		||||
  },
 | 
			
		||||
  "storage": {
 | 
			
		||||
    "files": [
 | 
			
		||||
      {
 | 
			
		||||
        "path": "/etc/zincati/config.d/51-rollout-wariness.toml",
 | 
			
		||||
        "contents": {
 | 
			
		||||
          "source": "data:,%5Bidentity%5D%0Arollout_wariness%20%3D%201%0A"
 | 
			
		||||
        }
 | 
			
		||||
      },
 | 
			
		||||
      {
 | 
			
		||||
        "path": "/etc/zincati/config.d/55-updates-strategy.toml",
 | 
			
		||||
        "contents": {
 | 
			
		||||
          "compression": "gzip",
 | 
			
		||||
          "source": "data:;base64,H4sIAAAAAAAC/2SNMarEMAxEe51C6ADB1S8+5BRbGmNMLLIGRw62TMieflGRats3b2b8PHNSHgGG9qS837gindxLy2UjePLlQQG0HBw/TdjM2rZUjRD4H3e5iuR2hQA53QNX9EivKYT2lrpGK9qK+3eOoLLs+o5Hkals+p+DbwAAAP//4Po2vKAAAAA="
 | 
			
		||||
        }
 | 
			
		||||
      },
 | 
			
		||||
      {
 | 
			
		||||
        "path": "/etc/fail2ban/jail.local",
 | 
			
		||||
        "contents": {
 | 
			
		||||
          "source": "data:;base64,W0RFRkFVTFRdCiMgTWF4aW11bSAzIGZhaWx1cmVzOgptYXhlbnRyeSA9IDMKIyBCYW4gaG9zdHMgZm9yIHRlbiBob3VyOgpiYW50aW1lID0gMzYwMAojIE92ZXJyaWRlIC9ldGMvZmFpbDJiYW4vamFpbC5kLzAwLWZpcmV3YWxsZC5jb25mOgpiYW5hY3Rpb24gPSBpcHRhYmxlcy1tdWx0aXBvcnQKW3NzaGRdCmVuYWJsZWQgPSB0cnVlCg=="
 | 
			
		||||
        }
 | 
			
		||||
      },
 | 
			
		||||
      {
 | 
			
		||||
        "overwrite": true,
 | 
			
		||||
        "path": "/etc/tuned/active_profile",
 | 
			
		||||
        "contents": {
 | 
			
		||||
          "source": "data:,virtual-guest%0A"
 | 
			
		||||
        }
 | 
			
		||||
      },
 | 
			
		||||
      {
 | 
			
		||||
        "overwrite": true,
 | 
			
		||||
        "path": "/etc/tuned/profile_mode",
 | 
			
		||||
        "contents": {
 | 
			
		||||
          "source": "data:,manual%0A"
 | 
			
		||||
        }
 | 
			
		||||
      },
 | 
			
		||||
      {
 | 
			
		||||
        "overwrite": true,
 | 
			
		||||
        "path": "/etc/systemd/zram-generator.conf",
 | 
			
		||||
        "contents": {
 | 
			
		||||
          "source": "data:;base64,IyBUaGlzIGNvbmZpZyBmaWxlIGVuYWJsZXMgYSAvZGV2L3pyYW0wIGRldmljZSB3aXRoIHRoZSBkZWZhdWx0IHNldHRpbmdzClt6cmFtMF0KenJhbS1mcmFjdGlvbiA9IDEKbWF4LXpyYW0tc2l6ZSA9IDgxOTIK"
 | 
			
		||||
        }
 | 
			
		||||
      },
 | 
			
		||||
      {
 | 
			
		||||
        "overwrite": true,
 | 
			
		||||
        "path": "/etc/security/limits.d/30-disable-coredump.conf",
 | 
			
		||||
        "contents": {
 | 
			
		||||
          "source": "data:,*%20hard%20core%200%0A"
 | 
			
		||||
        }
 | 
			
		||||
      },
 | 
			
		||||
      {
 | 
			
		||||
        "overwrite": true,
 | 
			
		||||
        "path": "/etc/ssh/ssh_config.d/60-disable-GSSAPI.conf",
 | 
			
		||||
        "contents": {
 | 
			
		||||
          "source": "data:,GSSAPIAuthentication%20no%0A"
 | 
			
		||||
        }
 | 
			
		||||
      },
 | 
			
		||||
      {
 | 
			
		||||
        "path": "/etc/sysctl.d/20-silence-audit.conf",
 | 
			
		||||
        "contents": {
 | 
			
		||||
          "compression": "gzip",
 | 
			
		||||
          "source": "data:;base64,H4sIAAAAAAAC/0TOsUrEUBCF4f4+xYEU7jZbLVhZKMpikyIg1kMyubnkZibMTAJ5ewkiPsD5z9ego+KMXsW1MhZ2p8yomnORjMo7V4ymC94/3r4euDxfEYrv1679bB+43K+pgStiogBtQ4m/hmNQeQpkDhQJNl/ZnAeoIKb/y3OZGix0YLTNwygYhM3ZEHacitDfAvVRdq7HyUORW5rZhOtttSIxv9zTTwAAAP//Cm0jUs8AAAA="
 | 
			
		||||
        }
 | 
			
		||||
      }
 | 
			
		||||
    ],
 | 
			
		||||
    "links": [
 | 
			
		||||
      {
 | 
			
		||||
        "path": "/etc/localtime",
 | 
			
		||||
        "target": "../usr/share/zoneinfo/America/New_York"
 | 
			
		||||
      },
 | 
			
		||||
      {
 | 
			
		||||
        "path": "/etc/systemd/system/multi-user.target.wants/tuned.service",
 | 
			
		||||
        "target": "/usr/lib/systemd/system/tuned.service"
 | 
			
		||||
      },
 | 
			
		||||
      {
 | 
			
		||||
        "path": "/etc/systemd/system/multi-user.target.wants/prelockd.service",
 | 
			
		||||
        "target": "/usr/lib/systemd/system/prelockd.service"
 | 
			
		||||
      },
 | 
			
		||||
      {
 | 
			
		||||
        "path": "/etc/systemd/system/multi-user.target.wants/fail2ban.service",
 | 
			
		||||
        "target": "/usr/lib/systemd/system/fail2ban.service"
 | 
			
		||||
      },
 | 
			
		||||
      {
 | 
			
		||||
        "path": "/etc/systemd/system/kdump.service.target",
 | 
			
		||||
        "target": "/dev/null"
 | 
			
		||||
      }
 | 
			
		||||
    ]
 | 
			
		||||
  },
 | 
			
		||||
  "systemd": {
 | 
			
		||||
    "units": [
 | 
			
		||||
      {
 | 
			
		||||
        "contents": "[Unit]\nDescription=Initial System Setup\n# We run after `systemd-machine-id-commit.service` to ensure that\n# `ConditionFirstBoot=true` services won't rerun on the next boot.\nAfter=systemd-machine-id-commit.service\nAfter=network-online.target\n# We run before `zincati.service` to avoid conflicting rpm-ostree\n# transactions.\nBefore=zincati.service\nConditionPathExists=!/var/lib/%N.stamp\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nExecStart=/usr/bin/rpm-ostree install fail2ban firewalld prelockd tuned qemu-guest-agent\nExecStart=/bin/touch /var/lib/%N.stamp\nExecStart=/usr/sbin/setsebool -P container_use_cephfs off\nExecStart=/usr/sbin/setsebool -P virt_use_nfs off\nExecStart=/usr/sbin/setsebool -P virt_use_samba off\nExecStart=/usr/bin/sed 's/nullok//g' /etc/pam.d/system-auth\nExecStart=/usr/bin/curl https://raw.githubusercontent.com/Whonix/security-misc/master/etc/modprobe.d/30_security-misc.conf -o /etc/modprobe.d/30_security-misc.conf\nExecStart=/bin/systemctl --no-block reboot\n\n[Install]\nWantedBy=multi-user.target\n",
 | 
			
		||||
        "enabled": true,
 | 
			
		||||
        "name": "postinst.service"
 | 
			
		||||
      },
 | 
			
		||||
      {
 | 
			
		||||
        "contents": "[Unit]\nDescription=Initial System Setup Part 2\n# We run this after the packages have been overlayed\nAfter=network-online.target\nConditionPathExists=!/var/lib/%N.stamp\nConditionPathExists=/var/lib/postinst.stamp\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nExecStart=/usr/bin/firewall-cmd --reload\nExecStart=/usr/bin/docker run --detach --privileged --name watchtower --restart unless-stopped -v /var/run/docker.sock:/var/run/docker.sock -v /etc/localtime:/etc/localtime:ro containrrr/watchtower --schedule \"0 5 0 * * 1\"\nExecStart=/bin/touch /var/lib/%N.stamp\n\n[Install]\nWantedBy=multi-user.target\n",
 | 
			
		||||
        "enabled": true,
 | 
			
		||||
        "name": "postinst2.service"
 | 
			
		||||
      },
 | 
			
		||||
      {
 | 
			
		||||
        "enabled": true,
 | 
			
		||||
        "name": "docker.service"
 | 
			
		||||
      },
 | 
			
		||||
      {
 | 
			
		||||
        "enabled": true,
 | 
			
		||||
        "name": "fstrim.timer"
 | 
			
		||||
      },
 | 
			
		||||
      {
 | 
			
		||||
        "enabled": true,
 | 
			
		||||
        "name": "systemd-oomd.service"
 | 
			
		||||
      },
 | 
			
		||||
      {
 | 
			
		||||
        "enabled": false,
 | 
			
		||||
        "mask": true,
 | 
			
		||||
        "name": "rpm-ostree-countme.timer"
 | 
			
		||||
      }
 | 
			
		||||
    ]
 | 
			
		||||
  }
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										165
									
								
								Generic.yml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										165
									
								
								Generic.yml
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,165 @@
 | 
			
		||||
variant: fcos
 | 
			
		||||
version: 1.4.0
 | 
			
		||||
boot_device:
 | 
			
		||||
passwd:
 | 
			
		||||
  users:
 | 
			
		||||
    - name: tomster
 | 
			
		||||
      ssh_authorized_keys: 
 | 
			
		||||
        - ssh-rsa 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 tomster@PRL-01
 | 
			
		||||
      groups:
 | 
			
		||||
        - wheel
 | 
			
		||||
        - sudo
 | 
			
		||||
systemd:
 | 
			
		||||
  units:
 | 
			
		||||
    - name: postinst.service
 | 
			
		||||
      enabled: true
 | 
			
		||||
      contents: |
 | 
			
		||||
        [Unit]
 | 
			
		||||
        Description=Initial System Setup
 | 
			
		||||
        # We run after `systemd-machine-id-commit.service` to ensure that
 | 
			
		||||
        # `ConditionFirstBoot=true` services won't rerun on the next boot.
 | 
			
		||||
        After=systemd-machine-id-commit.service
 | 
			
		||||
        After=network-online.target
 | 
			
		||||
        # We run before `zincati.service` to avoid conflicting rpm-ostree
 | 
			
		||||
        # transactions.
 | 
			
		||||
        Before=zincati.service
 | 
			
		||||
        ConditionPathExists=!/var/lib/%N.stamp
 | 
			
		||||
 | 
			
		||||
        [Service]
 | 
			
		||||
        Type=oneshot
 | 
			
		||||
        RemainAfterExit=yes
 | 
			
		||||
        ExecStart=/usr/bin/rpm-ostree install fail2ban firewalld prelockd tuned qemu-guest-agent
 | 
			
		||||
        ExecStart=/bin/touch /var/lib/%N.stamp
 | 
			
		||||
        ExecStart=/usr/sbin/setsebool -P container_use_cephfs off
 | 
			
		||||
        ExecStart=/usr/sbin/setsebool -P virt_use_nfs off
 | 
			
		||||
        ExecStart=/usr/sbin/setsebool -P virt_use_samba off
 | 
			
		||||
        ExecStart=/usr/bin/sed 's/nullok//g' /etc/pam.d/system-auth
 | 
			
		||||
        ExecStart=/usr/bin/curl https://raw.githubusercontent.com/Whonix/security-misc/master/etc/modprobe.d/30_security-misc.conf -o /etc/modprobe.d/30_security-misc.conf
 | 
			
		||||
        ExecStart=/bin/systemctl --no-block reboot
 | 
			
		||||
 | 
			
		||||
        [Install]
 | 
			
		||||
        WantedBy=multi-user.target
 | 
			
		||||
    - name: postinst2.service
 | 
			
		||||
      enabled: true
 | 
			
		||||
      contents: |
 | 
			
		||||
        [Unit]
 | 
			
		||||
        Description=Initial System Setup Part 2
 | 
			
		||||
        # We run this after the packages have been overlayed
 | 
			
		||||
        After=network-online.target
 | 
			
		||||
        ConditionPathExists=!/var/lib/%N.stamp
 | 
			
		||||
        ConditionPathExists=/var/lib/postinst.stamp
 | 
			
		||||
 | 
			
		||||
        [Service]
 | 
			
		||||
        Type=oneshot
 | 
			
		||||
        RemainAfterExit=yes
 | 
			
		||||
        ExecStart=/usr/bin/docker run --detach --privileged --name watchtower --restart unless-stopped -v /var/run/docker.sock:/var/run/docker.sock -v /etc/localtime:/etc/localtime:ro containrrr/watchtower --schedule "0 5 0 * * 1"
 | 
			
		||||
        ExecStart=/bin/touch /var/lib/%N.stamp
 | 
			
		||||
 | 
			
		||||
        [Install]
 | 
			
		||||
        WantedBy=multi-user.target
 | 
			
		||||
    - name: docker.service
 | 
			
		||||
      enabled: true
 | 
			
		||||
    - name: fstrim.timer
 | 
			
		||||
      enabled: true
 | 
			
		||||
    - name: systemd-oomd.service
 | 
			
		||||
      enabled: true
 | 
			
		||||
    - name: rpm-ostree-countme.timer
 | 
			
		||||
      enabled: false
 | 
			
		||||
      mask: true
 | 
			
		||||
storage:
 | 
			
		||||
  files:
 | 
			
		||||
    - path: /etc/zincati/config.d/51-rollout-wariness.toml
 | 
			
		||||
      contents:
 | 
			
		||||
        inline: |
 | 
			
		||||
          [identity]
 | 
			
		||||
          rollout_wariness = 1
 | 
			
		||||
    - path: /etc/zincati/config.d/55-updates-strategy.toml
 | 
			
		||||
      contents:
 | 
			
		||||
        inline: |
 | 
			
		||||
          [updates]
 | 
			
		||||
          strategy = "periodic"
 | 
			
		||||
          [updates.periodic]
 | 
			
		||||
          time_zone = "localtime"
 | 
			
		||||
          [[updates.periodic.window]]
 | 
			
		||||
          days = [ "Sun" ]
 | 
			
		||||
          start_time = "0:00"
 | 
			
		||||
          length_minutes = 60
 | 
			
		||||
    - path: /etc/fail2ban/jail.local
 | 
			
		||||
      contents:
 | 
			
		||||
        inline: |
 | 
			
		||||
          [DEFAULT]
 | 
			
		||||
          # Maximum 3 failures:
 | 
			
		||||
          maxentry = 3
 | 
			
		||||
          # Ban hosts for ten hour:
 | 
			
		||||
          bantime = 3600
 | 
			
		||||
          # Override /etc/fail2ban/jail.d/00-firewalld.conf:
 | 
			
		||||
          banaction = iptables-multiport
 | 
			
		||||
          [sshd]
 | 
			
		||||
          enabled = true
 | 
			
		||||
    - path: /etc/tuned/active_profile
 | 
			
		||||
      overwrite: true
 | 
			
		||||
      contents:
 | 
			
		||||
        inline: |
 | 
			
		||||
          virtual-guest
 | 
			
		||||
    - path: /etc/tuned/profile_mode
 | 
			
		||||
      overwrite: true
 | 
			
		||||
      contents:
 | 
			
		||||
        inline: |
 | 
			
		||||
          manual
 | 
			
		||||
    - path: /etc/systemd/zram-generator.conf
 | 
			
		||||
      overwrite: true
 | 
			
		||||
      contents:
 | 
			
		||||
        inline: |
 | 
			
		||||
          # This config file enables a /dev/zram0 device with the default settings
 | 
			
		||||
          [zram0]
 | 
			
		||||
          zram-fraction = 1
 | 
			
		||||
          max-zram-size = 8192
 | 
			
		||||
    - path: /etc/security/limits.d/30-disable-coredump.conf
 | 
			
		||||
      overwrite: true
 | 
			
		||||
      contents: 
 | 
			
		||||
        inline: | 
 | 
			
		||||
          * hard core 0
 | 
			
		||||
    - path: /etc/ssh/ssh_config.d/60-disable-GSSAPI.conf
 | 
			
		||||
      overwrite: true
 | 
			
		||||
      contents: 
 | 
			
		||||
        inline: | 
 | 
			
		||||
          GSSAPIAuthentication no
 | 
			
		||||
    - path: /etc/sysctl.d/20-silence-audit.conf
 | 
			
		||||
      contents:
 | 
			
		||||
        inline: |
 | 
			
		||||
          # Raise console message logging level from DEBUG (7) to WARNING (4)
 | 
			
		||||
          # so that audit messages don't get interspersed on the console that
 | 
			
		||||
          # may frustrate a user trying to interactively log in.
 | 
			
		||||
          kernel.printk=4
 | 
			
		||||
  links:
 | 
			
		||||
    - path: /etc/localtime
 | 
			
		||||
      target: ../usr/share/zoneinfo/America/New_York
 | 
			
		||||
    - path: /etc/systemd/system/multi-user.target.wants/tuned.service
 | 
			
		||||
      target: /usr/lib/systemd/system/tuned.service
 | 
			
		||||
    - path: /etc/systemd/system/multi-user.target.wants/prelockd.service
 | 
			
		||||
      target: /usr/lib/systemd/system/prelockd.service
 | 
			
		||||
    - path: /etc/systemd/system/multi-user.target.wants/fail2ban.service
 | 
			
		||||
      target: /usr/lib/systemd/system/fail2ban.service
 | 
			
		||||
    - path: /etc/systemd/system/kdump.service.target
 | 
			
		||||
      target: /dev/null
 | 
			
		||||
kernel_arguments:
 | 
			
		||||
  should_exist:
 | 
			
		||||
    - kvm.nx_huge_pages=force
 | 
			
		||||
    - random.trust_cpu=off
 | 
			
		||||
    - kernel.dmesg_restrict=1
 | 
			
		||||
    - fs.protected_fifos=2
 | 
			
		||||
    - fs.protected_regular=2
 | 
			
		||||
    - fs.protected_symlinks=1
 | 
			
		||||
    - fs.protected_hardlinks=1
 | 
			
		||||
    - net.core.bpf_jit_harden=2
 | 
			
		||||
    - kernel.kexec_load_disabled=1
 | 
			
		||||
    - kernel.kptr_restrict=2
 | 
			
		||||
    - vm.mmap_rnd_bits=32
 | 
			
		||||
    - vm.mmap_rnd_compat_bits=16
 | 
			
		||||
    - kernel.yama.ptrace_scope=2
 | 
			
		||||
    - fs.suid_dumpable=0
 | 
			
		||||
    - net.ipv4.tcp_rfc1337=1
 | 
			
		||||
    - kernel.perf_event_paranoid=3
 | 
			
		||||
    - kernel.randomize_va_space=2
 | 
			
		||||
    - net.ipv4.icmp_ignore_bogus_error_responses=1
 | 
			
		||||
    - net.ipv4.conf.all.log_martians=1
 | 
			
		||||
							
								
								
									
										167
									
								
								GitLab.yml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										167
									
								
								GitLab.yml
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,167 @@
 | 
			
		||||
variant: fcos
 | 
			
		||||
version: 1.4.0
 | 
			
		||||
boot_device:
 | 
			
		||||
passwd:
 | 
			
		||||
  users:
 | 
			
		||||
    - name: tomster
 | 
			
		||||
      ssh_authorized_keys: 
 | 
			
		||||
        - ssh-rsa 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 tomster@PRL-01
 | 
			
		||||
      groups:
 | 
			
		||||
        - wheel
 | 
			
		||||
        - sudo
 | 
			
		||||
systemd:
 | 
			
		||||
  units:
 | 
			
		||||
    - name: postinst.service
 | 
			
		||||
      enabled: true
 | 
			
		||||
      contents: |
 | 
			
		||||
        [Unit]
 | 
			
		||||
        Description=Initial System Setup
 | 
			
		||||
        # We run after `systemd-machine-id-commit.service` to ensure that
 | 
			
		||||
        # `ConditionFirstBoot=true` services won't rerun on the next boot.
 | 
			
		||||
        After=systemd-machine-id-commit.service
 | 
			
		||||
        After=network-online.target
 | 
			
		||||
        # We run before `zincati.service` to avoid conflicting rpm-ostree
 | 
			
		||||
        # transactions.
 | 
			
		||||
        Before=zincati.service
 | 
			
		||||
        ConditionPathExists=!/var/lib/%N.stamp
 | 
			
		||||
 | 
			
		||||
        [Service]
 | 
			
		||||
        Type=oneshot
 | 
			
		||||
        RemainAfterExit=yes
 | 
			
		||||
        ExecStart=/usr/bin/rpm-ostree install fail2ban firewalld prelockd tuned qemu-guest-agent
 | 
			
		||||
        ExecStart=/bin/touch /var/lib/%N.stamp
 | 
			
		||||
        ExecStart=/usr/sbin/setsebool -P container_use_cephfs off
 | 
			
		||||
        ExecStart=/usr/sbin/setsebool -P virt_use_nfs off
 | 
			
		||||
        ExecStart=/usr/sbin/setsebool -P virt_use_samba off
 | 
			
		||||
        ExecStart=/usr/bin/sed 's/nullok//g' /etc/pam.d/system-auth
 | 
			
		||||
        ExecStart=/usr/bin/curl https://raw.githubusercontent.com/Whonix/security-misc/master/etc/modprobe.d/30_security-misc.conf -o /etc/modprobe.d/30_security-misc.conf
 | 
			
		||||
        ExecStart=/bin/systemctl --no-block reboot
 | 
			
		||||
 | 
			
		||||
        [Install]
 | 
			
		||||
        WantedBy=multi-user.target
 | 
			
		||||
    - name: postinst2.service
 | 
			
		||||
      enabled: true
 | 
			
		||||
      contents: |
 | 
			
		||||
        [Unit]
 | 
			
		||||
        Description=Initial System Setup Part 2
 | 
			
		||||
        # We run this after the packages have been overlayed
 | 
			
		||||
        After=network-online.target
 | 
			
		||||
        ConditionPathExists=!/var/lib/%N.stamp
 | 
			
		||||
        ConditionPathExists=/var/lib/postinst.stamp
 | 
			
		||||
 | 
			
		||||
        [Service]
 | 
			
		||||
        Type=oneshot
 | 
			
		||||
        RemainAfterExit=yes
 | 
			
		||||
        ExecStart=/usr/bin/echo "export GITLAB_HOME=/srv/gitlab" >> /etc/bashrc
 | 
			
		||||
        ExecStart=/usr/bin/docker run --detach --privileged --name watchtower --restart unless-stopped -v /var/run/docker.sock:/var/run/docker.sock -v /etc/localtime:/etc/localtime:ro containrrr/watchtower --schedule "0 5 0 * * 1"
 | 
			
		||||
        ExecStart=/usr/bin/docker run --detach --hostname your_domain --publish 443:443 --publish 80:80 --publish 7022:22 --name gitlab --restart unless-stopped --volume /srv/gitlab/config:/etc/gitlab:Z --volume /srv/gitlab/logs:/var/log/gitlab:Z --volume /srv/gitlab/data:/var/opt/gitlab:Z gitlab/gitlab-ee:latest
 | 
			
		||||
        ExecStart=/bin/touch /var/lib/%N.stamp
 | 
			
		||||
 | 
			
		||||
        [Install]
 | 
			
		||||
        WantedBy=multi-user.target
 | 
			
		||||
    - name: docker.service
 | 
			
		||||
      enabled: true
 | 
			
		||||
    - name: fstrim.timer
 | 
			
		||||
      enabled: true
 | 
			
		||||
    - name: systemd-oomd.service
 | 
			
		||||
      enabled: true
 | 
			
		||||
    - name: rpm-ostree-countme.timer
 | 
			
		||||
      enabled: false
 | 
			
		||||
      mask: true
 | 
			
		||||
storage:
 | 
			
		||||
  files:
 | 
			
		||||
    - path: /etc/zincati/config.d/51-rollout-wariness.toml
 | 
			
		||||
      contents:
 | 
			
		||||
        inline: |
 | 
			
		||||
          [identity]
 | 
			
		||||
          rollout_wariness = 1
 | 
			
		||||
    - path: /etc/zincati/config.d/55-updates-strategy.toml
 | 
			
		||||
      contents:
 | 
			
		||||
        inline: |
 | 
			
		||||
          [updates]
 | 
			
		||||
          strategy = "periodic"
 | 
			
		||||
          [updates.periodic]
 | 
			
		||||
          time_zone = "localtime"
 | 
			
		||||
          [[updates.periodic.window]]
 | 
			
		||||
          days = [ "Sun" ]
 | 
			
		||||
          start_time = "0:00"
 | 
			
		||||
          length_minutes = 60
 | 
			
		||||
    - path: /etc/fail2ban/jail.local
 | 
			
		||||
      contents:
 | 
			
		||||
        inline: |
 | 
			
		||||
          [DEFAULT]
 | 
			
		||||
          # Maximum 3 failures:
 | 
			
		||||
          maxentry = 3
 | 
			
		||||
          # Ban hosts for ten hour:
 | 
			
		||||
          bantime = 3600
 | 
			
		||||
          # Override /etc/fail2ban/jail.d/00-firewalld.conf:
 | 
			
		||||
          banaction = iptables-multiport
 | 
			
		||||
          [sshd]
 | 
			
		||||
          enabled = true
 | 
			
		||||
    - path: /etc/tuned/active_profile
 | 
			
		||||
      overwrite: true
 | 
			
		||||
      contents:
 | 
			
		||||
        inline: |
 | 
			
		||||
          virtual-guest
 | 
			
		||||
    - path: /etc/tuned/profile_mode
 | 
			
		||||
      overwrite: true
 | 
			
		||||
      contents:
 | 
			
		||||
        inline: |
 | 
			
		||||
          manual
 | 
			
		||||
    - path: /etc/systemd/zram-generator.conf
 | 
			
		||||
      overwrite: true
 | 
			
		||||
      contents:
 | 
			
		||||
        inline: |
 | 
			
		||||
          # This config file enables a /dev/zram0 device with the default settings
 | 
			
		||||
          [zram0]
 | 
			
		||||
          zram-fraction = 1
 | 
			
		||||
          max-zram-size = 8192
 | 
			
		||||
    - path: /etc/security/limits.d/30-disable-coredump.conf
 | 
			
		||||
      overwrite: true
 | 
			
		||||
      contents: 
 | 
			
		||||
        inline: | 
 | 
			
		||||
          * hard core 0
 | 
			
		||||
    - path: /etc/ssh/ssh_config.d/60-disable-GSSAPI.conf
 | 
			
		||||
      overwrite: true
 | 
			
		||||
      contents: 
 | 
			
		||||
        inline: | 
 | 
			
		||||
          GSSAPIAuthentication no
 | 
			
		||||
    - path: /etc/sysctl.d/20-silence-audit.conf
 | 
			
		||||
      contents:
 | 
			
		||||
        inline: |
 | 
			
		||||
          # Raise console message logging level from DEBUG (7) to WARNING (4)
 | 
			
		||||
          # so that audit messages don't get interspersed on the console that
 | 
			
		||||
          # may frustrate a user trying to interactively log in.
 | 
			
		||||
          kernel.printk=4
 | 
			
		||||
  links:
 | 
			
		||||
    - path: /etc/localtime
 | 
			
		||||
      target: ../usr/share/zoneinfo/America/New_York
 | 
			
		||||
    - path: /etc/systemd/system/multi-user.target.wants/tuned.service
 | 
			
		||||
      target: /usr/lib/systemd/system/tuned.service
 | 
			
		||||
    - path: /etc/systemd/system/multi-user.target.wants/prelockd.service
 | 
			
		||||
      target: /usr/lib/systemd/system/prelockd.service
 | 
			
		||||
    - path: /etc/systemd/system/multi-user.target.wants/fail2ban.service
 | 
			
		||||
      target: /usr/lib/systemd/system/fail2ban.service
 | 
			
		||||
    - path: /etc/systemd/system/kdump.service.target
 | 
			
		||||
      target: /dev/null
 | 
			
		||||
kernel_arguments:
 | 
			
		||||
  should_exist:
 | 
			
		||||
    - kvm.nx_huge_pages=force
 | 
			
		||||
    - random.trust_cpu=off
 | 
			
		||||
    - kernel.dmesg_restrict=1
 | 
			
		||||
    - fs.protected_fifos=2
 | 
			
		||||
    - fs.protected_regular=2
 | 
			
		||||
    - fs.protected_symlinks=1
 | 
			
		||||
    - fs.protected_hardlinks=1
 | 
			
		||||
    - net.core.bpf_jit_harden=2
 | 
			
		||||
    - kernel.kexec_load_disabled=1
 | 
			
		||||
    - kernel.kptr_restrict=2
 | 
			
		||||
    - vm.mmap_rnd_bits=32
 | 
			
		||||
    - vm.mmap_rnd_compat_bits=16
 | 
			
		||||
    - kernel.yama.ptrace_scope=2
 | 
			
		||||
    - fs.suid_dumpable=0
 | 
			
		||||
    - net.ipv4.tcp_rfc1337=1
 | 
			
		||||
    - kernel.perf_event_paranoid=3
 | 
			
		||||
    - kernel.randomize_va_space=2
 | 
			
		||||
    - net.ipv4.icmp_ignore_bogus_error_responses=1
 | 
			
		||||
    - net.ipv4.conf.all.log_martians=1
 | 
			
		||||
							
								
								
									
										201
									
								
								LICENSE
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										201
									
								
								LICENSE
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,201 @@
 | 
			
		||||
                                 Apache License
 | 
			
		||||
                           Version 2.0, January 2004
 | 
			
		||||
                        http://www.apache.org/licenses/
 | 
			
		||||
 | 
			
		||||
   TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
 | 
			
		||||
 | 
			
		||||
   1. Definitions.
 | 
			
		||||
 | 
			
		||||
      "License" shall mean the terms and conditions for use, reproduction,
 | 
			
		||||
      and distribution as defined by Sections 1 through 9 of this document.
 | 
			
		||||
 | 
			
		||||
      "Licensor" shall mean the copyright owner or entity authorized by
 | 
			
		||||
      the copyright owner that is granting the License.
 | 
			
		||||
 | 
			
		||||
      "Legal Entity" shall mean the union of the acting entity and all
 | 
			
		||||
      other entities that control, are controlled by, or are under common
 | 
			
		||||
      control with that entity. For the purposes of this definition,
 | 
			
		||||
      "control" means (i) the power, direct or indirect, to cause the
 | 
			
		||||
      direction or management of such entity, whether by contract or
 | 
			
		||||
      otherwise, or (ii) ownership of fifty percent (50%) or more of the
 | 
			
		||||
      outstanding shares, or (iii) beneficial ownership of such entity.
 | 
			
		||||
 | 
			
		||||
      "You" (or "Your") shall mean an individual or Legal Entity
 | 
			
		||||
      exercising permissions granted by this License.
 | 
			
		||||
 | 
			
		||||
      "Source" form shall mean the preferred form for making modifications,
 | 
			
		||||
      including but not limited to software source code, documentation
 | 
			
		||||
      source, and configuration files.
 | 
			
		||||
 | 
			
		||||
      "Object" form shall mean any form resulting from mechanical
 | 
			
		||||
      transformation or translation of a Source form, including but
 | 
			
		||||
      not limited to compiled object code, generated documentation,
 | 
			
		||||
      and conversions to other media types.
 | 
			
		||||
 | 
			
		||||
      "Work" shall mean the work of authorship, whether in Source or
 | 
			
		||||
      Object form, made available under the License, as indicated by a
 | 
			
		||||
      copyright notice that is included in or attached to the work
 | 
			
		||||
      (an example is provided in the Appendix below).
 | 
			
		||||
 | 
			
		||||
      "Derivative Works" shall mean any work, whether in Source or Object
 | 
			
		||||
      form, that is based on (or derived from) the Work and for which the
 | 
			
		||||
      editorial revisions, annotations, elaborations, or other modifications
 | 
			
		||||
      represent, as a whole, an original work of authorship. For the purposes
 | 
			
		||||
      of this License, Derivative Works shall not include works that remain
 | 
			
		||||
      separable from, or merely link (or bind by name) to the interfaces of,
 | 
			
		||||
      the Work and Derivative Works thereof.
 | 
			
		||||
 | 
			
		||||
      "Contribution" shall mean any work of authorship, including
 | 
			
		||||
      the original version of the Work and any modifications or additions
 | 
			
		||||
      to that Work or Derivative Works thereof, that is intentionally
 | 
			
		||||
      submitted to Licensor for inclusion in the Work by the copyright owner
 | 
			
		||||
      or by an individual or Legal Entity authorized to submit on behalf of
 | 
			
		||||
      the copyright owner. For the purposes of this definition, "submitted"
 | 
			
		||||
      means any form of electronic, verbal, or written communication sent
 | 
			
		||||
      to the Licensor or its representatives, including but not limited to
 | 
			
		||||
      communication on electronic mailing lists, source code control systems,
 | 
			
		||||
      and issue tracking systems that are managed by, or on behalf of, the
 | 
			
		||||
      Licensor for the purpose of discussing and improving the Work, but
 | 
			
		||||
      excluding communication that is conspicuously marked or otherwise
 | 
			
		||||
      designated in writing by the copyright owner as "Not a Contribution."
 | 
			
		||||
 | 
			
		||||
      "Contributor" shall mean Licensor and any individual or Legal Entity
 | 
			
		||||
      on behalf of whom a Contribution has been received by Licensor and
 | 
			
		||||
      subsequently incorporated within the Work.
 | 
			
		||||
 | 
			
		||||
   2. Grant of Copyright License. Subject to the terms and conditions of
 | 
			
		||||
      this License, each Contributor hereby grants to You a perpetual,
 | 
			
		||||
      worldwide, non-exclusive, no-charge, royalty-free, irrevocable
 | 
			
		||||
      copyright license to reproduce, prepare Derivative Works of,
 | 
			
		||||
      publicly display, publicly perform, sublicense, and distribute the
 | 
			
		||||
      Work and such Derivative Works in Source or Object form.
 | 
			
		||||
 | 
			
		||||
   3. Grant of Patent License. Subject to the terms and conditions of
 | 
			
		||||
      this License, each Contributor hereby grants to You a perpetual,
 | 
			
		||||
      worldwide, non-exclusive, no-charge, royalty-free, irrevocable
 | 
			
		||||
      (except as stated in this section) patent license to make, have made,
 | 
			
		||||
      use, offer to sell, sell, import, and otherwise transfer the Work,
 | 
			
		||||
      where such license applies only to those patent claims licensable
 | 
			
		||||
      by such Contributor that are necessarily infringed by their
 | 
			
		||||
      Contribution(s) alone or by combination of their Contribution(s)
 | 
			
		||||
      with the Work to which such Contribution(s) was submitted. If You
 | 
			
		||||
      institute patent litigation against any entity (including a
 | 
			
		||||
      cross-claim or counterclaim in a lawsuit) alleging that the Work
 | 
			
		||||
      or a Contribution incorporated within the Work constitutes direct
 | 
			
		||||
      or contributory patent infringement, then any patent licenses
 | 
			
		||||
      granted to You under this License for that Work shall terminate
 | 
			
		||||
      as of the date such litigation is filed.
 | 
			
		||||
 | 
			
		||||
   4. Redistribution. You may reproduce and distribute copies of the
 | 
			
		||||
      Work or Derivative Works thereof in any medium, with or without
 | 
			
		||||
      modifications, and in Source or Object form, provided that You
 | 
			
		||||
      meet the following conditions:
 | 
			
		||||
 | 
			
		||||
      (a) You must give any other recipients of the Work or
 | 
			
		||||
          Derivative Works a copy of this License; and
 | 
			
		||||
 | 
			
		||||
      (b) You must cause any modified files to carry prominent notices
 | 
			
		||||
          stating that You changed the files; and
 | 
			
		||||
 | 
			
		||||
      (c) You must retain, in the Source form of any Derivative Works
 | 
			
		||||
          that You distribute, all copyright, patent, trademark, and
 | 
			
		||||
          attribution notices from the Source form of the Work,
 | 
			
		||||
          excluding those notices that do not pertain to any part of
 | 
			
		||||
          the Derivative Works; and
 | 
			
		||||
 | 
			
		||||
      (d) If the Work includes a "NOTICE" text file as part of its
 | 
			
		||||
          distribution, then any Derivative Works that You distribute must
 | 
			
		||||
          include a readable copy of the attribution notices contained
 | 
			
		||||
          within such NOTICE file, excluding those notices that do not
 | 
			
		||||
          pertain to any part of the Derivative Works, in at least one
 | 
			
		||||
          of the following places: within a NOTICE text file distributed
 | 
			
		||||
          as part of the Derivative Works; within the Source form or
 | 
			
		||||
          documentation, if provided along with the Derivative Works; or,
 | 
			
		||||
          within a display generated by the Derivative Works, if and
 | 
			
		||||
          wherever such third-party notices normally appear. The contents
 | 
			
		||||
          of the NOTICE file are for informational purposes only and
 | 
			
		||||
          do not modify the License. You may add Your own attribution
 | 
			
		||||
          notices within Derivative Works that You distribute, alongside
 | 
			
		||||
          or as an addendum to the NOTICE text from the Work, provided
 | 
			
		||||
          that such additional attribution notices cannot be construed
 | 
			
		||||
          as modifying the License.
 | 
			
		||||
 | 
			
		||||
      You may add Your own copyright statement to Your modifications and
 | 
			
		||||
      may provide additional or different license terms and conditions
 | 
			
		||||
      for use, reproduction, or distribution of Your modifications, or
 | 
			
		||||
      for any such Derivative Works as a whole, provided Your use,
 | 
			
		||||
      reproduction, and distribution of the Work otherwise complies with
 | 
			
		||||
      the conditions stated in this License.
 | 
			
		||||
 | 
			
		||||
   5. Submission of Contributions. Unless You explicitly state otherwise,
 | 
			
		||||
      any Contribution intentionally submitted for inclusion in the Work
 | 
			
		||||
      by You to the Licensor shall be under the terms and conditions of
 | 
			
		||||
      this License, without any additional terms or conditions.
 | 
			
		||||
      Notwithstanding the above, nothing herein shall supersede or modify
 | 
			
		||||
      the terms of any separate license agreement you may have executed
 | 
			
		||||
      with Licensor regarding such Contributions.
 | 
			
		||||
 | 
			
		||||
   6. Trademarks. This License does not grant permission to use the trade
 | 
			
		||||
      names, trademarks, service marks, or product names of the Licensor,
 | 
			
		||||
      except as required for reasonable and customary use in describing the
 | 
			
		||||
      origin of the Work and reproducing the content of the NOTICE file.
 | 
			
		||||
 | 
			
		||||
   7. Disclaimer of Warranty. Unless required by applicable law or
 | 
			
		||||
      agreed to in writing, Licensor provides the Work (and each
 | 
			
		||||
      Contributor provides its Contributions) on an "AS IS" BASIS,
 | 
			
		||||
      WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
 | 
			
		||||
      implied, including, without limitation, any warranties or conditions
 | 
			
		||||
      of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
 | 
			
		||||
      PARTICULAR PURPOSE. You are solely responsible for determining the
 | 
			
		||||
      appropriateness of using or redistributing the Work and assume any
 | 
			
		||||
      risks associated with Your exercise of permissions under this License.
 | 
			
		||||
 | 
			
		||||
   8. Limitation of Liability. In no event and under no legal theory,
 | 
			
		||||
      whether in tort (including negligence), contract, or otherwise,
 | 
			
		||||
      unless required by applicable law (such as deliberate and grossly
 | 
			
		||||
      negligent acts) or agreed to in writing, shall any Contributor be
 | 
			
		||||
      liable to You for damages, including any direct, indirect, special,
 | 
			
		||||
      incidental, or consequential damages of any character arising as a
 | 
			
		||||
      result of this License or out of the use or inability to use the
 | 
			
		||||
      Work (including but not limited to damages for loss of goodwill,
 | 
			
		||||
      work stoppage, computer failure or malfunction, or any and all
 | 
			
		||||
      other commercial damages or losses), even if such Contributor
 | 
			
		||||
      has been advised of the possibility of such damages.
 | 
			
		||||
 | 
			
		||||
   9. Accepting Warranty or Additional Liability. While redistributing
 | 
			
		||||
      the Work or Derivative Works thereof, You may choose to offer,
 | 
			
		||||
      and charge a fee for, acceptance of support, warranty, indemnity,
 | 
			
		||||
      or other liability obligations and/or rights consistent with this
 | 
			
		||||
      License. However, in accepting such obligations, You may act only
 | 
			
		||||
      on Your own behalf and on Your sole responsibility, not on behalf
 | 
			
		||||
      of any other Contributor, and only if You agree to indemnify,
 | 
			
		||||
      defend, and hold each Contributor harmless for any liability
 | 
			
		||||
      incurred by, or claims asserted against, such Contributor by reason
 | 
			
		||||
      of your accepting any such warranty or additional liability.
 | 
			
		||||
 | 
			
		||||
   END OF TERMS AND CONDITIONS
 | 
			
		||||
 | 
			
		||||
   APPENDIX: How to apply the Apache License to your work.
 | 
			
		||||
 | 
			
		||||
      To apply the Apache License to your work, attach the following
 | 
			
		||||
      boilerplate notice, with the fields enclosed by brackets "[]"
 | 
			
		||||
      replaced with your own identifying information. (Don't include
 | 
			
		||||
      the brackets!)  The text should be enclosed in the appropriate
 | 
			
		||||
      comment syntax for the file format. We also recommend that a
 | 
			
		||||
      file or class name and description of purpose be included on the
 | 
			
		||||
      same "printed page" as the copyright notice for easier
 | 
			
		||||
      identification within third-party archives.
 | 
			
		||||
 | 
			
		||||
   Copyright [yyyy] [name of copyright owner]
 | 
			
		||||
 | 
			
		||||
   Licensed under the Apache License, Version 2.0 (the "License");
 | 
			
		||||
   you may not use this file except in compliance with the License.
 | 
			
		||||
   You may obtain a copy of the License at
 | 
			
		||||
 | 
			
		||||
       http://www.apache.org/licenses/LICENSE-2.0
 | 
			
		||||
 | 
			
		||||
   Unless required by applicable law or agreed to in writing, software
 | 
			
		||||
   distributed under the License is distributed on an "AS IS" BASIS,
 | 
			
		||||
   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
			
		||||
   See the License for the specific language governing permissions and
 | 
			
		||||
   limitations under the License.
 | 
			
		||||
							
								
								
									
										3
									
								
								Mailcow/README.md
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										3
									
								
								Mailcow/README.md
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,3 @@
 | 
			
		||||
# Notes
 | 
			
		||||
1. mailcow-updater can be used instead of auto-updater to take advantage of mailcow's update.sh script
 | 
			
		||||
2. You will need to compile and install the my-pdatesh module for SELinux to avoid the 203/EXEC error.
 | 
			
		||||
							
								
								
									
										14
									
								
								Mailcow/mailcow-updater.service
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										14
									
								
								Mailcow/mailcow-updater.service
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,14 @@
 | 
			
		||||
[Unit]
 | 
			
		||||
Description=Mailcow Automatic Updater
 | 
			
		||||
After=docker.service
 | 
			
		||||
Wants=network-online.target
 | 
			
		||||
Requires=docker.service
 | 
			
		||||
 | 
			
		||||
[Service]
 | 
			
		||||
User=root
 | 
			
		||||
Group=root
 | 
			
		||||
WorkingDirectory=/opt/mailcow-dockerized/
 | 
			
		||||
ExecStart=/opt/mailcow-dockerized/update.sh --force
 | 
			
		||||
 | 
			
		||||
[Install]
 | 
			
		||||
WantedBy=multi-user.target
 | 
			
		||||
							
								
								
									
										7
									
								
								Mailcow/my-pdatesh.te
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										7
									
								
								Mailcow/my-pdatesh.te
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,7 @@
 | 
			
		||||
module my-pdatesh 1.0;
 | 
			
		||||
 | 
			
		||||
require {
 | 
			
		||||
	type init_t;
 | 
			
		||||
	type var_t;
 | 
			
		||||
	class file { execute execute_no_trans open read };
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										166
									
								
								OnlyOffice.yml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										166
									
								
								OnlyOffice.yml
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,166 @@
 | 
			
		||||
variant: fcos
 | 
			
		||||
version: 1.4.0
 | 
			
		||||
boot_device:
 | 
			
		||||
passwd:
 | 
			
		||||
  users:
 | 
			
		||||
    - name: tomster
 | 
			
		||||
      ssh_authorized_keys: 
 | 
			
		||||
        - ssh-rsa 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 tomster@PRL-01
 | 
			
		||||
      groups:
 | 
			
		||||
        - wheel
 | 
			
		||||
        - sudo
 | 
			
		||||
systemd:
 | 
			
		||||
  units:
 | 
			
		||||
    - name: postinst.service
 | 
			
		||||
      enabled: true
 | 
			
		||||
      contents: |
 | 
			
		||||
        [Unit]
 | 
			
		||||
        Description=Initial System Setup
 | 
			
		||||
        # We run after `systemd-machine-id-commit.service` to ensure that
 | 
			
		||||
        # `ConditionFirstBoot=true` services won't rerun on the next boot.
 | 
			
		||||
        After=systemd-machine-id-commit.service
 | 
			
		||||
        After=network-online.target
 | 
			
		||||
        # We run before `zincati.service` to avoid conflicting rpm-ostree
 | 
			
		||||
        # transactions.
 | 
			
		||||
        Before=zincati.service
 | 
			
		||||
        ConditionPathExists=!/var/lib/%N.stamp
 | 
			
		||||
 | 
			
		||||
        [Service]
 | 
			
		||||
        Type=oneshot
 | 
			
		||||
        RemainAfterExit=yes
 | 
			
		||||
        ExecStart=/usr/bin/rpm-ostree install fail2ban firewalld prelockd tuned qemu-guest-agent
 | 
			
		||||
        ExecStart=/bin/touch /var/lib/%N.stamp
 | 
			
		||||
        ExecStart=/usr/sbin/setsebool -P container_use_cephfs off
 | 
			
		||||
        ExecStart=/usr/sbin/setsebool -P virt_use_nfs off
 | 
			
		||||
        ExecStart=/usr/sbin/setsebool -P virt_use_samba off
 | 
			
		||||
        ExecStart=/usr/bin/sed 's/nullok//g' /etc/pam.d/system-auth
 | 
			
		||||
        ExecStart=/usr/bin/curl https://raw.githubusercontent.com/Whonix/security-misc/master/etc/modprobe.d/30_security-misc.conf -o /etc/modprobe.d/30_security-misc.conf
 | 
			
		||||
        ExecStart=/bin/systemctl --no-block reboot
 | 
			
		||||
 | 
			
		||||
        [Install]
 | 
			
		||||
        WantedBy=multi-user.target
 | 
			
		||||
    - name: postinst2.service
 | 
			
		||||
      enabled: true
 | 
			
		||||
      contents: |
 | 
			
		||||
        [Unit]
 | 
			
		||||
        Description=Initial System Setup Part 2
 | 
			
		||||
        # We run this after the packages have been overlayed
 | 
			
		||||
        After=network-online.target
 | 
			
		||||
        ConditionPathExists=!/var/lib/%N.stamp
 | 
			
		||||
        ConditionPathExists=/var/lib/postinst.stamp
 | 
			
		||||
 | 
			
		||||
        [Service]
 | 
			
		||||
        Type=oneshot
 | 
			
		||||
        RemainAfterExit=yes
 | 
			
		||||
        ExecStart=/usr/bin/docker run --detach --privileged --name watchtower --restart unless-stopped -v /var/run/docker.sock:/var/run/docker.sock -v /etc/localtime:/etc/localtime:ro containrrr/watchtower --schedule "0 5 0 * * 1"
 | 
			
		||||
        ExecStart=/usr/bin/docker run --name onlyoffice --restart unless-stopped -i -t -d -p 80:80 -p 443:443 -e LETS_ENCRYPT_DOMAIN=your_domain -e LETS_ENCRYPT_MAIL=your_mail -e JWT_ENABLED=true -e JWT_SECRET=your_secret_here -v /srv/onlyoffice/DocumentServer/logs:/var/log/onlyoffice:Z -v /srv/onlyoffice/DocumentServer/data:/var/www/onlyoffice/Data:Z -v /srv/onlyoffice/DocumentServer/lib:/var/lib/onlyoffice:Z -v /srv/onlyoffice/DocumentServer/rabbitmq:/var/lib/rabbitmq:Z -v /srv/onlyoffice/DocumentServer/redis:/var/lib/redis:Z -v /srv/onlyoffice/DocumentServer/db:/var/lib/postgresql:Z onlyoffice/documentserver
 | 
			
		||||
        ExecStart=/bin/touch /var/lib/%N.stamp
 | 
			
		||||
 | 
			
		||||
        [Install]
 | 
			
		||||
        WantedBy=multi-user.target
 | 
			
		||||
    - name: docker.service
 | 
			
		||||
      enabled: true
 | 
			
		||||
    - name: fstrim.timer
 | 
			
		||||
      enabled: true
 | 
			
		||||
    - name: systemd-oomd.service
 | 
			
		||||
      enabled: true
 | 
			
		||||
    - name: rpm-ostree-countme.timer
 | 
			
		||||
      enabled: false
 | 
			
		||||
      mask: true
 | 
			
		||||
storage:
 | 
			
		||||
  files:
 | 
			
		||||
    - path: /etc/zincati/config.d/51-rollout-wariness.toml
 | 
			
		||||
      contents:
 | 
			
		||||
        inline: |
 | 
			
		||||
          [identity]
 | 
			
		||||
          rollout_wariness = 1
 | 
			
		||||
    - path: /etc/zincati/config.d/55-updates-strategy.toml
 | 
			
		||||
      contents:
 | 
			
		||||
        inline: |
 | 
			
		||||
          [updates]
 | 
			
		||||
          strategy = "periodic"
 | 
			
		||||
          [updates.periodic]
 | 
			
		||||
          time_zone = "localtime"
 | 
			
		||||
          [[updates.periodic.window]]
 | 
			
		||||
          days = [ "Sun" ]
 | 
			
		||||
          start_time = "0:00"
 | 
			
		||||
          length_minutes = 60
 | 
			
		||||
    - path: /etc/fail2ban/jail.local
 | 
			
		||||
      contents:
 | 
			
		||||
        inline: |
 | 
			
		||||
          [DEFAULT]
 | 
			
		||||
          # Maximum 3 failures:
 | 
			
		||||
          maxentry = 3
 | 
			
		||||
          # Ban hosts for ten hour:
 | 
			
		||||
          bantime = 3600
 | 
			
		||||
          # Override /etc/fail2ban/jail.d/00-firewalld.conf:
 | 
			
		||||
          banaction = iptables-multiport
 | 
			
		||||
          [sshd]
 | 
			
		||||
          enabled = true
 | 
			
		||||
    - path: /etc/tuned/active_profile
 | 
			
		||||
      overwrite: true
 | 
			
		||||
      contents:
 | 
			
		||||
        inline: |
 | 
			
		||||
          virtual-guest
 | 
			
		||||
    - path: /etc/tuned/profile_mode
 | 
			
		||||
      overwrite: true
 | 
			
		||||
      contents:
 | 
			
		||||
        inline: |
 | 
			
		||||
          manual
 | 
			
		||||
    - path: /etc/systemd/zram-generator.conf
 | 
			
		||||
      overwrite: true
 | 
			
		||||
      contents:
 | 
			
		||||
        inline: |
 | 
			
		||||
          # This config file enables a /dev/zram0 device with the default settings
 | 
			
		||||
          [zram0]
 | 
			
		||||
          zram-fraction = 1
 | 
			
		||||
          max-zram-size = 8192
 | 
			
		||||
    - path: /etc/security/limits.d/30-disable-coredump.conf
 | 
			
		||||
      overwrite: true
 | 
			
		||||
      contents: 
 | 
			
		||||
        inline: | 
 | 
			
		||||
          * hard core 0
 | 
			
		||||
    - path: /etc/ssh/ssh_config.d/60-disable-GSSAPI.conf
 | 
			
		||||
      overwrite: true
 | 
			
		||||
      contents: 
 | 
			
		||||
        inline: | 
 | 
			
		||||
          GSSAPIAuthentication no
 | 
			
		||||
    - path: /etc/sysctl.d/20-silence-audit.conf
 | 
			
		||||
      contents:
 | 
			
		||||
        inline: |
 | 
			
		||||
          # Raise console message logging level from DEBUG (7) to WARNING (4)
 | 
			
		||||
          # so that audit messages don't get interspersed on the console that
 | 
			
		||||
          # may frustrate a user trying to interactively log in.
 | 
			
		||||
          kernel.printk=4
 | 
			
		||||
  links:
 | 
			
		||||
    - path: /etc/localtime
 | 
			
		||||
      target: ../usr/share/zoneinfo/America/New_York
 | 
			
		||||
    - path: /etc/systemd/system/multi-user.target.wants/tuned.service
 | 
			
		||||
      target: /usr/lib/systemd/system/tuned.service
 | 
			
		||||
    - path: /etc/systemd/system/multi-user.target.wants/prelockd.service
 | 
			
		||||
      target: /usr/lib/systemd/system/prelockd.service
 | 
			
		||||
    - path: /etc/systemd/system/multi-user.target.wants/fail2ban.service
 | 
			
		||||
      target: /usr/lib/systemd/system/fail2ban.service
 | 
			
		||||
    - path: /etc/systemd/system/kdump.service.target
 | 
			
		||||
      target: /dev/null
 | 
			
		||||
kernel_arguments:
 | 
			
		||||
  should_exist:
 | 
			
		||||
    - kvm.nx_huge_pages=force
 | 
			
		||||
    - random.trust_cpu=off
 | 
			
		||||
    - kernel.dmesg_restrict=1
 | 
			
		||||
    - fs.protected_fifos=2
 | 
			
		||||
    - fs.protected_regular=2
 | 
			
		||||
    - fs.protected_symlinks=1
 | 
			
		||||
    - fs.protected_hardlinks=1
 | 
			
		||||
    - net.core.bpf_jit_harden=2
 | 
			
		||||
    - kernel.kexec_load_disabled=1
 | 
			
		||||
    - kernel.kptr_restrict=2
 | 
			
		||||
    - vm.mmap_rnd_bits=32
 | 
			
		||||
    - vm.mmap_rnd_compat_bits=16
 | 
			
		||||
    - kernel.yama.ptrace_scope=2
 | 
			
		||||
    - fs.suid_dumpable=0
 | 
			
		||||
    - net.ipv4.tcp_rfc1337=1
 | 
			
		||||
    - kernel.perf_event_paranoid=3
 | 
			
		||||
    - kernel.randomize_va_space=2
 | 
			
		||||
    - net.ipv4.icmp_ignore_bogus_error_responses=1
 | 
			
		||||
    - net.ipv4.conf.all.log_martians=1
 | 
			
		||||
@@ -1,2 +1,8 @@
 | 
			
		||||
# Fedora-CoreOS-Ignition
 | 
			
		||||
Ignition configurations for Fedora CoreOS
 | 
			
		||||
Ignition configurations for Fedora CoreOS<br />
 | 
			
		||||
 | 
			
		||||
# Notes
 | 
			
		||||
1. These are the configs I personally use on my systems. You **MUST** edit the files before you use them. At the very least, you should add your SSH keys or password hash. <br />
 | 
			
		||||
2. These configurations are made with a VPS in mind. You should adapt it for a bare metal deployment if that is what you are using (adding additional kernel parameters, configuring drive encryption, configuring storage, etc). You should also change the tuned profile from `virtual-guest` appropriately.
 | 
			
		||||
3. In most of these configs, the timezone is set to `America/New_York` and the automatic reboot time is set at 12 AM on Sunday. Watchtower will kick in 5-10 minutes after the reboot to update and redeploy the containers. You should change it according to your needs. The Docker-Compose.yml file does not include Watchtower.
 | 
			
		||||
4. The auto-updater.service could be put in /etc/systemd/system and enable to have automatic updates for your docker-compose and its containers. Please make sure that the WorkingDir is appropriate.
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										15
									
								
								auto-updater.service
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										15
									
								
								auto-updater.service
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,15 @@
 | 
			
		||||
[Unit]
 | 
			
		||||
Description=Automatic Updater
 | 
			
		||||
After=docker.service
 | 
			
		||||
Wants=network-online.target
 | 
			
		||||
Requires=docker.service
 | 
			
		||||
 | 
			
		||||
[Service]
 | 
			
		||||
User=root
 | 
			
		||||
Group=root
 | 
			
		||||
WorkingDirectory=/path/to/docker-compose/directory
 | 
			
		||||
ExecStart=/usr/bin/git pull
 | 
			
		||||
ExecStart=/usr/bin/docker-compose up -d
 | 
			
		||||
 | 
			
		||||
[Install]
 | 
			
		||||
WantedBy=multi-user.target
 | 
			
		||||
		Reference in New Issue
	
	Block a user