diff --git a/Docker-Compose.yml b/Docker-Compose.yml
new file mode 100644
index 0000000..3f4573e
--- /dev/null
+++ b/Docker-Compose.yml
@@ -0,0 +1,147 @@
+variant: fcos
+version: 1.4.0
+boot_device:
+passwd:
+ users:
+ - name: tomster
+ ssh_authorized_keys:
+ - ssh-rsa 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 tomster@PRL-01
+ groups:
+ - wheel
+ - sudo
+systemd:
+ units:
+ - name: postinst.service
+ enabled: true
+ contents: |
+ [Unit]
+ Description=Initial System Setup
+ # We run after `systemd-machine-id-commit.service` to ensure that
+ # `ConditionFirstBoot=true` services won't rerun on the next boot.
+ After=systemd-machine-id-commit.service
+ After=network-online.target
+ # We run before `zincati.service` to avoid conflicting rpm-ostree
+ # transactions.
+ Before=zincati.service
+ ConditionPathExists=!/var/lib/%N.stamp
+
+ [Service]
+ Type=oneshot
+ RemainAfterExit=yes
+ ExecStart=/usr/bin/rpm-ostree install docker-compose fail2ban firewalld prelockd tuned qemu-guest-agent
+ ExecStart=/bin/touch /var/lib/%N.stamp
+ ExecStart=/usr/sbin/setsebool -P container_use_cephfs off
+ ExecStart=/usr/sbin/setsebool -P virt_use_nfs off
+ ExecStart=/usr/sbin/setsebool -P virt_use_samba off
+ ExecStart=/usr/bin/sed 's/nullok//g' /etc/pam.d/system-auth
+ ExecStart=/usr/bin/curl https://raw.githubusercontent.com/Whonix/security-misc/master/etc/modprobe.d/30_security-misc.conf -o /etc/modprobe.d/30_security-misc.conf
+ ExecStart=/bin/systemctl --no-block reboot
+
+ [Install]
+ WantedBy=multi-user.target
+ - name: docker.service
+ enabled: true
+ - name: fstrim.timer
+ enabled: true
+ - name: systemd-oomd.service
+ enabled: true
+ - name: rpm-ostree-countme.timer
+ enabled: false
+ mask: true
+storage:
+ files:
+ - path: /etc/zincati/config.d/51-rollout-wariness.toml
+ contents:
+ inline: |
+ [identity]
+ rollout_wariness = 1
+ - path: /etc/zincati/config.d/55-updates-strategy.toml
+ contents:
+ inline: |
+ [updates]
+ strategy = "periodic"
+ [updates.periodic]
+ time_zone = "localtime"
+ [[updates.periodic.window]]
+ days = [ "Sun" ]
+ start_time = "0:00"
+ length_minutes = 60
+ - path: /etc/fail2ban/jail.local
+ contents:
+ inline: |
+ [DEFAULT]
+ # Maximum 3 failures:
+ maxentry = 3
+ # Ban hosts for ten hour:
+ bantime = 3600
+ # Override /etc/fail2ban/jail.d/00-firewalld.conf:
+ banaction = iptables-multiport
+ [sshd]
+ enabled = true
+ - path: /etc/tuned/active_profile
+ overwrite: true
+ contents:
+ inline: |
+ virtual-guest
+ - path: /etc/tuned/profile_mode
+ overwrite: true
+ contents:
+ inline: |
+ manual
+ - path: /etc/systemd/zram-generator.conf
+ overwrite: true
+ contents:
+ inline: |
+ # This config file enables a /dev/zram0 device with the default settings
+ [zram0]
+ zram-fraction = 1
+ max-zram-size = 8192
+ - path: /etc/security/limits.d/30-disable-coredump.conf
+ overwrite: true
+ contents:
+ inline: |
+ * hard core 0
+ - path: /etc/ssh/ssh_config.d/60-disable-GSSAPI.conf
+ overwrite: true
+ contents:
+ inline: |
+ GSSAPIAuthentication no
+ - path: /etc/sysctl.d/20-silence-audit.conf
+ contents:
+ inline: |
+ # Raise console message logging level from DEBUG (7) to WARNING (4)
+ # so that audit messages don't get interspersed on the console that
+ # may frustrate a user trying to interactively log in.
+ kernel.printk=4
+ links:
+ - path: /etc/localtime
+ target: ../usr/share/zoneinfo/America/New_York
+ - path: /etc/systemd/system/multi-user.target.wants/tuned.service
+ target: /usr/lib/systemd/system/tuned.service
+ - path: /etc/systemd/system/multi-user.target.wants/prelockd.service
+ target: /usr/lib/systemd/system/prelockd.service
+ - path: /etc/systemd/system/multi-user.target.wants/fail2ban.service
+ target: /usr/lib/systemd/system/fail2ban.service
+ - path: /etc/systemd/system/kdump.service.target
+ target: /dev/null
+kernel_arguments:
+ should_exist:
+ - kvm.nx_huge_pages=force
+ - random.trust_cpu=off
+ - kernel.dmesg_restrict=1
+ - fs.protected_fifos=2
+ - fs.protected_regular=2
+ - fs.protected_symlinks=1
+ - fs.protected_hardlinks=1
+ - net.core.bpf_jit_harden=2
+ - kernel.kexec_load_disabled=1
+ - kernel.kptr_restrict=2
+ - vm.mmap_rnd_bits=32
+ - vm.mmap_rnd_compat_bits=16
+ - kernel.yama.ptrace_scope=2
+ - fs.suid_dumpable=0
+ - net.ipv4.tcp_rfc1337=1
+ - kernel.perf_event_paranoid=3
+ - kernel.randomize_va_space=2
+ - net.ipv4.icmp_ignore_bogus_error_responses=1
+ - net.ipv4.conf.all.log_martians=1
diff --git a/Generic.ign b/Generic.ign
new file mode 100644
index 0000000..254b479
--- /dev/null
+++ b/Generic.ign
@@ -0,0 +1,160 @@
+{
+ "ignition": {
+ "version": "3.3.0"
+ },
+ "kernelArguments": {
+ "shouldExist": [
+ "kvm.nx_huge_pages=force",
+ "random.trust_cpu=off",
+ "kernel.dmesg_restrict=1",
+ "fs.protected_fifos=2",
+ "fs.protected_regular=2",
+ "fs.protected_symlinks=1",
+ "fs.protected_hardlinks=1",
+ "net.core.bpf_jit_harden=2",
+ "kernel.kexec_load_disabled=1",
+ "kernel.kptr_restrict=2",
+ "vm.mmap_rnd_bits=32",
+ "vm.mmap_rnd_compat_bits=16",
+ "kernel.yama.ptrace_scope=2",
+ "fs.suid_dumpable=0",
+ "net.ipv4.tcp_rfc1337=1",
+ "kernel.perf_event_paranoid=3",
+ "kernel.randomize_va_space=2",
+ "net.ipv4.icmp_ignore_bogus_error_responses=1",
+ "net.ipv4.conf.all.log_martians=1"
+ ]
+ },
+ "passwd": {
+ "users": [
+ {
+ "groups": [
+ "wheel",
+ "sudo"
+ ],
+ "name": "tomster",
+ "sshAuthorizedKeys": [
+ "ssh-rsa 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 tomster@PRL-01"
+ ]
+ }
+ ]
+ },
+ "storage": {
+ "files": [
+ {
+ "path": "/etc/zincati/config.d/51-rollout-wariness.toml",
+ "contents": {
+ "source": "data:,%5Bidentity%5D%0Arollout_wariness%20%3D%201%0A"
+ }
+ },
+ {
+ "path": "/etc/zincati/config.d/55-updates-strategy.toml",
+ "contents": {
+ "compression": "gzip",
+ "source": "data:;base64,H4sIAAAAAAAC/2SNMarEMAxEe51C6ADB1S8+5BRbGmNMLLIGRw62TMieflGRats3b2b8PHNSHgGG9qS837gindxLy2UjePLlQQG0HBw/TdjM2rZUjRD4H3e5iuR2hQA53QNX9EivKYT2lrpGK9qK+3eOoLLs+o5Hkals+p+DbwAAAP//4Po2vKAAAAA="
+ }
+ },
+ {
+ "path": "/etc/fail2ban/jail.local",
+ "contents": {
+ "source": "data:;base64,W0RFRkFVTFRdCiMgTWF4aW11bSAzIGZhaWx1cmVzOgptYXhlbnRyeSA9IDMKIyBCYW4gaG9zdHMgZm9yIHRlbiBob3VyOgpiYW50aW1lID0gMzYwMAojIE92ZXJyaWRlIC9ldGMvZmFpbDJiYW4vamFpbC5kLzAwLWZpcmV3YWxsZC5jb25mOgpiYW5hY3Rpb24gPSBpcHRhYmxlcy1tdWx0aXBvcnQKW3NzaGRdCmVuYWJsZWQgPSB0cnVlCg=="
+ }
+ },
+ {
+ "overwrite": true,
+ "path": "/etc/tuned/active_profile",
+ "contents": {
+ "source": "data:,virtual-guest%0A"
+ }
+ },
+ {
+ "overwrite": true,
+ "path": "/etc/tuned/profile_mode",
+ "contents": {
+ "source": "data:,manual%0A"
+ }
+ },
+ {
+ "overwrite": true,
+ "path": "/etc/systemd/zram-generator.conf",
+ "contents": {
+ "source": "data:;base64,IyBUaGlzIGNvbmZpZyBmaWxlIGVuYWJsZXMgYSAvZGV2L3pyYW0wIGRldmljZSB3aXRoIHRoZSBkZWZhdWx0IHNldHRpbmdzClt6cmFtMF0KenJhbS1mcmFjdGlvbiA9IDEKbWF4LXpyYW0tc2l6ZSA9IDgxOTIK"
+ }
+ },
+ {
+ "overwrite": true,
+ "path": "/etc/security/limits.d/30-disable-coredump.conf",
+ "contents": {
+ "source": "data:,*%20hard%20core%200%0A"
+ }
+ },
+ {
+ "overwrite": true,
+ "path": "/etc/ssh/ssh_config.d/60-disable-GSSAPI.conf",
+ "contents": {
+ "source": "data:,GSSAPIAuthentication%20no%0A"
+ }
+ },
+ {
+ "path": "/etc/sysctl.d/20-silence-audit.conf",
+ "contents": {
+ "compression": "gzip",
+ "source": "data:;base64,H4sIAAAAAAAC/0TOsUrEUBCF4f4+xYEU7jZbLVhZKMpikyIg1kMyubnkZibMTAJ5ewkiPsD5z9ego+KMXsW1MhZ2p8yomnORjMo7V4ymC94/3r4euDxfEYrv1679bB+43K+pgStiogBtQ4m/hmNQeQpkDhQJNl/ZnAeoIKb/y3OZGix0YLTNwygYhM3ZEHacitDfAvVRdq7HyUORW5rZhOtttSIxv9zTTwAAAP//Cm0jUs8AAAA="
+ }
+ }
+ ],
+ "links": [
+ {
+ "path": "/etc/localtime",
+ "target": "../usr/share/zoneinfo/America/New_York"
+ },
+ {
+ "path": "/etc/systemd/system/multi-user.target.wants/tuned.service",
+ "target": "/usr/lib/systemd/system/tuned.service"
+ },
+ {
+ "path": "/etc/systemd/system/multi-user.target.wants/prelockd.service",
+ "target": "/usr/lib/systemd/system/prelockd.service"
+ },
+ {
+ "path": "/etc/systemd/system/multi-user.target.wants/fail2ban.service",
+ "target": "/usr/lib/systemd/system/fail2ban.service"
+ },
+ {
+ "path": "/etc/systemd/system/kdump.service.target",
+ "target": "/dev/null"
+ }
+ ]
+ },
+ "systemd": {
+ "units": [
+ {
+ "contents": "[Unit]\nDescription=Initial System Setup\n# We run after `systemd-machine-id-commit.service` to ensure that\n# `ConditionFirstBoot=true` services won't rerun on the next boot.\nAfter=systemd-machine-id-commit.service\nAfter=network-online.target\n# We run before `zincati.service` to avoid conflicting rpm-ostree\n# transactions.\nBefore=zincati.service\nConditionPathExists=!/var/lib/%N.stamp\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nExecStart=/usr/bin/rpm-ostree install fail2ban firewalld prelockd tuned qemu-guest-agent\nExecStart=/bin/touch /var/lib/%N.stamp\nExecStart=/usr/sbin/setsebool -P container_use_cephfs off\nExecStart=/usr/sbin/setsebool -P virt_use_nfs off\nExecStart=/usr/sbin/setsebool -P virt_use_samba off\nExecStart=/usr/bin/sed 's/nullok//g' /etc/pam.d/system-auth\nExecStart=/usr/bin/curl https://raw.githubusercontent.com/Whonix/security-misc/master/etc/modprobe.d/30_security-misc.conf -o /etc/modprobe.d/30_security-misc.conf\nExecStart=/bin/systemctl --no-block reboot\n\n[Install]\nWantedBy=multi-user.target\n",
+ "enabled": true,
+ "name": "postinst.service"
+ },
+ {
+ "contents": "[Unit]\nDescription=Initial System Setup Part 2\n# We run this after the packages have been overlayed\nAfter=network-online.target\nConditionPathExists=!/var/lib/%N.stamp\nConditionPathExists=/var/lib/postinst.stamp\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nExecStart=/usr/bin/firewall-cmd --reload\nExecStart=/usr/bin/docker run --detach --privileged --name watchtower --restart unless-stopped -v /var/run/docker.sock:/var/run/docker.sock -v /etc/localtime:/etc/localtime:ro containrrr/watchtower --schedule \"0 5 0 * * 1\"\nExecStart=/bin/touch /var/lib/%N.stamp\n\n[Install]\nWantedBy=multi-user.target\n",
+ "enabled": true,
+ "name": "postinst2.service"
+ },
+ {
+ "enabled": true,
+ "name": "docker.service"
+ },
+ {
+ "enabled": true,
+ "name": "fstrim.timer"
+ },
+ {
+ "enabled": true,
+ "name": "systemd-oomd.service"
+ },
+ {
+ "enabled": false,
+ "mask": true,
+ "name": "rpm-ostree-countme.timer"
+ }
+ ]
+ }
+}
diff --git a/Generic.yml b/Generic.yml
new file mode 100644
index 0000000..875e13d
--- /dev/null
+++ b/Generic.yml
@@ -0,0 +1,165 @@
+variant: fcos
+version: 1.4.0
+boot_device:
+passwd:
+ users:
+ - name: tomster
+ ssh_authorized_keys:
+ - ssh-rsa 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 tomster@PRL-01
+ groups:
+ - wheel
+ - sudo
+systemd:
+ units:
+ - name: postinst.service
+ enabled: true
+ contents: |
+ [Unit]
+ Description=Initial System Setup
+ # We run after `systemd-machine-id-commit.service` to ensure that
+ # `ConditionFirstBoot=true` services won't rerun on the next boot.
+ After=systemd-machine-id-commit.service
+ After=network-online.target
+ # We run before `zincati.service` to avoid conflicting rpm-ostree
+ # transactions.
+ Before=zincati.service
+ ConditionPathExists=!/var/lib/%N.stamp
+
+ [Service]
+ Type=oneshot
+ RemainAfterExit=yes
+ ExecStart=/usr/bin/rpm-ostree install fail2ban firewalld prelockd tuned qemu-guest-agent
+ ExecStart=/bin/touch /var/lib/%N.stamp
+ ExecStart=/usr/sbin/setsebool -P container_use_cephfs off
+ ExecStart=/usr/sbin/setsebool -P virt_use_nfs off
+ ExecStart=/usr/sbin/setsebool -P virt_use_samba off
+ ExecStart=/usr/bin/sed 's/nullok//g' /etc/pam.d/system-auth
+ ExecStart=/usr/bin/curl https://raw.githubusercontent.com/Whonix/security-misc/master/etc/modprobe.d/30_security-misc.conf -o /etc/modprobe.d/30_security-misc.conf
+ ExecStart=/bin/systemctl --no-block reboot
+
+ [Install]
+ WantedBy=multi-user.target
+ - name: postinst2.service
+ enabled: true
+ contents: |
+ [Unit]
+ Description=Initial System Setup Part 2
+ # We run this after the packages have been overlayed
+ After=network-online.target
+ ConditionPathExists=!/var/lib/%N.stamp
+ ConditionPathExists=/var/lib/postinst.stamp
+
+ [Service]
+ Type=oneshot
+ RemainAfterExit=yes
+ ExecStart=/usr/bin/docker run --detach --privileged --name watchtower --restart unless-stopped -v /var/run/docker.sock:/var/run/docker.sock -v /etc/localtime:/etc/localtime:ro containrrr/watchtower --schedule "0 5 0 * * 1"
+ ExecStart=/bin/touch /var/lib/%N.stamp
+
+ [Install]
+ WantedBy=multi-user.target
+ - name: docker.service
+ enabled: true
+ - name: fstrim.timer
+ enabled: true
+ - name: systemd-oomd.service
+ enabled: true
+ - name: rpm-ostree-countme.timer
+ enabled: false
+ mask: true
+storage:
+ files:
+ - path: /etc/zincati/config.d/51-rollout-wariness.toml
+ contents:
+ inline: |
+ [identity]
+ rollout_wariness = 1
+ - path: /etc/zincati/config.d/55-updates-strategy.toml
+ contents:
+ inline: |
+ [updates]
+ strategy = "periodic"
+ [updates.periodic]
+ time_zone = "localtime"
+ [[updates.periodic.window]]
+ days = [ "Sun" ]
+ start_time = "0:00"
+ length_minutes = 60
+ - path: /etc/fail2ban/jail.local
+ contents:
+ inline: |
+ [DEFAULT]
+ # Maximum 3 failures:
+ maxentry = 3
+ # Ban hosts for ten hour:
+ bantime = 3600
+ # Override /etc/fail2ban/jail.d/00-firewalld.conf:
+ banaction = iptables-multiport
+ [sshd]
+ enabled = true
+ - path: /etc/tuned/active_profile
+ overwrite: true
+ contents:
+ inline: |
+ virtual-guest
+ - path: /etc/tuned/profile_mode
+ overwrite: true
+ contents:
+ inline: |
+ manual
+ - path: /etc/systemd/zram-generator.conf
+ overwrite: true
+ contents:
+ inline: |
+ # This config file enables a /dev/zram0 device with the default settings
+ [zram0]
+ zram-fraction = 1
+ max-zram-size = 8192
+ - path: /etc/security/limits.d/30-disable-coredump.conf
+ overwrite: true
+ contents:
+ inline: |
+ * hard core 0
+ - path: /etc/ssh/ssh_config.d/60-disable-GSSAPI.conf
+ overwrite: true
+ contents:
+ inline: |
+ GSSAPIAuthentication no
+ - path: /etc/sysctl.d/20-silence-audit.conf
+ contents:
+ inline: |
+ # Raise console message logging level from DEBUG (7) to WARNING (4)
+ # so that audit messages don't get interspersed on the console that
+ # may frustrate a user trying to interactively log in.
+ kernel.printk=4
+ links:
+ - path: /etc/localtime
+ target: ../usr/share/zoneinfo/America/New_York
+ - path: /etc/systemd/system/multi-user.target.wants/tuned.service
+ target: /usr/lib/systemd/system/tuned.service
+ - path: /etc/systemd/system/multi-user.target.wants/prelockd.service
+ target: /usr/lib/systemd/system/prelockd.service
+ - path: /etc/systemd/system/multi-user.target.wants/fail2ban.service
+ target: /usr/lib/systemd/system/fail2ban.service
+ - path: /etc/systemd/system/kdump.service.target
+ target: /dev/null
+kernel_arguments:
+ should_exist:
+ - kvm.nx_huge_pages=force
+ - random.trust_cpu=off
+ - kernel.dmesg_restrict=1
+ - fs.protected_fifos=2
+ - fs.protected_regular=2
+ - fs.protected_symlinks=1
+ - fs.protected_hardlinks=1
+ - net.core.bpf_jit_harden=2
+ - kernel.kexec_load_disabled=1
+ - kernel.kptr_restrict=2
+ - vm.mmap_rnd_bits=32
+ - vm.mmap_rnd_compat_bits=16
+ - kernel.yama.ptrace_scope=2
+ - fs.suid_dumpable=0
+ - net.ipv4.tcp_rfc1337=1
+ - kernel.perf_event_paranoid=3
+ - kernel.randomize_va_space=2
+ - net.ipv4.icmp_ignore_bogus_error_responses=1
+ - net.ipv4.conf.all.log_martians=1
diff --git a/GitLab.yml b/GitLab.yml
new file mode 100644
index 0000000..3ac67f1
--- /dev/null
+++ b/GitLab.yml
@@ -0,0 +1,167 @@
+variant: fcos
+version: 1.4.0
+boot_device:
+passwd:
+ users:
+ - name: tomster
+ ssh_authorized_keys:
+ - ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAIAQDPgQ5VZDocVP2R9L+PCOczgpcuKBeb+NnwuXo6JgeFnR+ebZ8OHnWAqDMQoUN+VveN5ja+Bklrra8EifsaX6yysvtHqY+DgaClo+f4N8/Tcg9oOATuOPz5ls4ZPILWs6AN0p5NYP4UNQEAdSQKehQd1X1Q3Z4Am1CNs7u4mcsaeoKY29qbj+YJ2R2EfI9jq5y558vi7Bm7a5mpkQ8+l/7/mt3OO6OEy6osjnAoa3yRIHGhkpLBQkIGOg99DIK/FKMD+XK346P7Go+peUdV7lmOtKSaOHAmpuMWUXTBnPMsznfyhmIh56vuWhDm/3M4iHdowa0TNHgOL30a8IOWKrSQhwD4k2pKLqkjSZ50Yp3AtNN0kE4w/h22dIxnEQsUyA6WDSP3GVhsxX0BC/luA8b5hHGa+ID1bFgFx/UNQvLlb9UHTzmKrTaxaku3bwaPvdM4DTVajmRIUMH8mXW34iKBXF2zHpl9nKEfbYeT9/L8PekAAMdSWeG2YpOxOgRm79me8K5umqyFUano6F3K0ag+nIgrPf6oJ2n9DysUiaGxGwdmb40VitHE6i5K+eJDaZxqQHi9g4ItQXsJBg5q8YdQ3WUAUyPzv4way/7Qgz1cubvyWJwn51BDcESburBjoyieLfAhSiB2cS80AWVEpYIAknj8JCdhPRi/SdgLXppDFdAUnMuKUqFoXk14X6v2olXXSYNi3T6dFRiOsQHxjBA/x8sr15MK5Y4fCt1aAvGL+JhkOz5rhA0/Ay7Y0diELdSAPnb8jgO/VH0xUPxRG5+0iEd2uo7uUknql8JLE6U7bzutLn8oexbTKOLzFzkWXKABBN5F0XwQEI05DDHjC4NgLuiV3Y1U40BqtW4ou26chTC3Vx8aA4+x4pZcPJEkGoOPtG3ybNtJgYRuuVdmkRcl2kKwC8v7dYuGe9nQFN6vTudpgahn1vD+zxsuvOwOQ+3mF8H6y5R1/SC0bHHYexhBQAD62hcrdK+qj5K+Y8jj5+o+zHgIK2POZAQWoWgJTTq2KrmDiDN3xvhBSYwU2bgkizJ0p3tqJOGit0S+LAgIZnNW5hdXbkDLROj4al3aAIw5oHi6HhHsf6ShsnkoLnlKD/4jLcuYa1GB6jnCR28AHDH1WQjdOOOK3evm9+PUZ61KLRtjT7BYCRpRTf2ofywuTTh4D6qn2pcz/KdVfHeYMv4syd3ZRFF2UXVZbNFeuk8RuwcFEdfYh5lgAJJMj0Zj7NF49CVJekhw2/BuWQs3SZU/afCAnAOh79tyFgFtSqHCjjzbQEBpa2TYiNlNTJsC03Sjml4ehQlMN0GziXwubdAdAyMQa30otNmBU4IqF3Ud7HcyHP9fw1xlSmlJjhZk5gHOnMTUYXmZl/jOPHAdrJw6snp0Afy2A3K15TB/58916OELezWp0SJDpG76odS41XITpjTjQ41j836tQienXJaAv9AvvAd13xNBYXgHvhVk//F6v11rcQM2AexS62S1JvCQmumNNYv+YLONnMDj0PR6MUljw3cWYTw7LB+cWndHHvw2kt/kjTnrwJtE9VcYYUZZOp8lHiuFSAOE8J5QKX5JzZRaDftAucESQtyq56+y4GvBfipo1AYQpr8jCyTszmmHi1JEeiVedKVR6AJ2K+zbfVj/uw0n55t+aUBsA0/C5jjZzRtaJvb1IaV/YeKThJROjQUGyhuwMnzZvrZDc/959KkZuk2ZLKFwOwuPKPZsajaGbWSTiDYfXfvmzM6P2M5ABFx13hOBPhm0n+EeDuoI811jvHb3zYLN05MnU8akbpdZWBbu8fmGM6HR1LZ7nKU+vw1s10tUhQtX9VyUuwPanMrhlAN6tA4xw99GtORp84XHDkICzneDDGv8e7eWBN1CZcVWozfG9+XLpWKlxI20gaxisyfIkl75VgdJYMXibfZmM5/fqAUj7/c1cyorGqlgQ33RCjwcPWjFGiBI+HHdw9c0KiQvgXVXddVyNkRUhD8mpM7WoDfzdcYSJQ8btVdFyIAM1ngIMLkZW4S7bcG6soSdOyR8zKCgIz2o3Ota8S7+DDnlkjCRKgdAz13YLkOBrcu126RW86eNGgrqtxwITmMqzU4IgzjsdkMYNv5NfKc//nKuWwHaOXByKEpJ8JUMNXaeUf+wJ/h1MdifzGsr91Dqp/qc3kKrebM4Oa8KHCzR2H5u6mXH3iOQPptyzVMBvq5GNs+JVZkCnF23CwzHH4+bHDZV6PC9xe9GY/rP/JcPb0prvQbXdZaehRejjGX136oHnn38Skc6XHmwuhuCsnHf3ryJT386G1Oz5iSu1UKgyqEr0eG1CvYuq87AGvOw3fp2CgXiZKq9om6P6TdiGEnVEj7d/jyb4Qe2qnDXZvi/Clv+RPX8yGWkYyPrpn+DMcqntJKXzo2g1FaZBUt9DnvVNt4tNzmQQbOudyaDTm+iDEonHXrk6+4kOM9t+B2w2Cc7WZGFyboZzUOo77gwXM/z3rYv8O6S5U1DPaHStBRRFUPhQu+24xJb2OWOLcFRHgu5IdXRp+hlhjPS+HzzoW++tCYeN23L2fDYQyAAvuGfQpJGPpheZKb2A52QRG7XBWIbWO4X1I/aQI12aQkzpcFWY1xnuTVjDzqF2eYx22HCQeCYhwMJ0vQNPbmOm57yCyU8q04+VYMQ1uO5x4zJ28BDCzQ4UFYVk7DgL5Fq4sjFUcAqCEc36dVJFw/aDEFnTeWlb6REzf2IqLNvWQ== tomster@PRL-01
+ groups:
+ - wheel
+ - sudo
+systemd:
+ units:
+ - name: postinst.service
+ enabled: true
+ contents: |
+ [Unit]
+ Description=Initial System Setup
+ # We run after `systemd-machine-id-commit.service` to ensure that
+ # `ConditionFirstBoot=true` services won't rerun on the next boot.
+ After=systemd-machine-id-commit.service
+ After=network-online.target
+ # We run before `zincati.service` to avoid conflicting rpm-ostree
+ # transactions.
+ Before=zincati.service
+ ConditionPathExists=!/var/lib/%N.stamp
+
+ [Service]
+ Type=oneshot
+ RemainAfterExit=yes
+ ExecStart=/usr/bin/rpm-ostree install fail2ban firewalld prelockd tuned qemu-guest-agent
+ ExecStart=/bin/touch /var/lib/%N.stamp
+ ExecStart=/usr/sbin/setsebool -P container_use_cephfs off
+ ExecStart=/usr/sbin/setsebool -P virt_use_nfs off
+ ExecStart=/usr/sbin/setsebool -P virt_use_samba off
+ ExecStart=/usr/bin/sed 's/nullok//g' /etc/pam.d/system-auth
+ ExecStart=/usr/bin/curl https://raw.githubusercontent.com/Whonix/security-misc/master/etc/modprobe.d/30_security-misc.conf -o /etc/modprobe.d/30_security-misc.conf
+ ExecStart=/bin/systemctl --no-block reboot
+
+ [Install]
+ WantedBy=multi-user.target
+ - name: postinst2.service
+ enabled: true
+ contents: |
+ [Unit]
+ Description=Initial System Setup Part 2
+ # We run this after the packages have been overlayed
+ After=network-online.target
+ ConditionPathExists=!/var/lib/%N.stamp
+ ConditionPathExists=/var/lib/postinst.stamp
+
+ [Service]
+ Type=oneshot
+ RemainAfterExit=yes
+ ExecStart=/usr/bin/echo "export GITLAB_HOME=/srv/gitlab" >> /etc/bashrc
+ ExecStart=/usr/bin/docker run --detach --privileged --name watchtower --restart unless-stopped -v /var/run/docker.sock:/var/run/docker.sock -v /etc/localtime:/etc/localtime:ro containrrr/watchtower --schedule "0 5 0 * * 1"
+ ExecStart=/usr/bin/docker run --detach --hostname your_domain --publish 443:443 --publish 80:80 --publish 7022:22 --name gitlab --restart unless-stopped --volume /srv/gitlab/config:/etc/gitlab:Z --volume /srv/gitlab/logs:/var/log/gitlab:Z --volume /srv/gitlab/data:/var/opt/gitlab:Z gitlab/gitlab-ee:latest
+ ExecStart=/bin/touch /var/lib/%N.stamp
+
+ [Install]
+ WantedBy=multi-user.target
+ - name: docker.service
+ enabled: true
+ - name: fstrim.timer
+ enabled: true
+ - name: systemd-oomd.service
+ enabled: true
+ - name: rpm-ostree-countme.timer
+ enabled: false
+ mask: true
+storage:
+ files:
+ - path: /etc/zincati/config.d/51-rollout-wariness.toml
+ contents:
+ inline: |
+ [identity]
+ rollout_wariness = 1
+ - path: /etc/zincati/config.d/55-updates-strategy.toml
+ contents:
+ inline: |
+ [updates]
+ strategy = "periodic"
+ [updates.periodic]
+ time_zone = "localtime"
+ [[updates.periodic.window]]
+ days = [ "Sun" ]
+ start_time = "0:00"
+ length_minutes = 60
+ - path: /etc/fail2ban/jail.local
+ contents:
+ inline: |
+ [DEFAULT]
+ # Maximum 3 failures:
+ maxentry = 3
+ # Ban hosts for ten hour:
+ bantime = 3600
+ # Override /etc/fail2ban/jail.d/00-firewalld.conf:
+ banaction = iptables-multiport
+ [sshd]
+ enabled = true
+ - path: /etc/tuned/active_profile
+ overwrite: true
+ contents:
+ inline: |
+ virtual-guest
+ - path: /etc/tuned/profile_mode
+ overwrite: true
+ contents:
+ inline: |
+ manual
+ - path: /etc/systemd/zram-generator.conf
+ overwrite: true
+ contents:
+ inline: |
+ # This config file enables a /dev/zram0 device with the default settings
+ [zram0]
+ zram-fraction = 1
+ max-zram-size = 8192
+ - path: /etc/security/limits.d/30-disable-coredump.conf
+ overwrite: true
+ contents:
+ inline: |
+ * hard core 0
+ - path: /etc/ssh/ssh_config.d/60-disable-GSSAPI.conf
+ overwrite: true
+ contents:
+ inline: |
+ GSSAPIAuthentication no
+ - path: /etc/sysctl.d/20-silence-audit.conf
+ contents:
+ inline: |
+ # Raise console message logging level from DEBUG (7) to WARNING (4)
+ # so that audit messages don't get interspersed on the console that
+ # may frustrate a user trying to interactively log in.
+ kernel.printk=4
+ links:
+ - path: /etc/localtime
+ target: ../usr/share/zoneinfo/America/New_York
+ - path: /etc/systemd/system/multi-user.target.wants/tuned.service
+ target: /usr/lib/systemd/system/tuned.service
+ - path: /etc/systemd/system/multi-user.target.wants/prelockd.service
+ target: /usr/lib/systemd/system/prelockd.service
+ - path: /etc/systemd/system/multi-user.target.wants/fail2ban.service
+ target: /usr/lib/systemd/system/fail2ban.service
+ - path: /etc/systemd/system/kdump.service.target
+ target: /dev/null
+kernel_arguments:
+ should_exist:
+ - kvm.nx_huge_pages=force
+ - random.trust_cpu=off
+ - kernel.dmesg_restrict=1
+ - fs.protected_fifos=2
+ - fs.protected_regular=2
+ - fs.protected_symlinks=1
+ - fs.protected_hardlinks=1
+ - net.core.bpf_jit_harden=2
+ - kernel.kexec_load_disabled=1
+ - kernel.kptr_restrict=2
+ - vm.mmap_rnd_bits=32
+ - vm.mmap_rnd_compat_bits=16
+ - kernel.yama.ptrace_scope=2
+ - fs.suid_dumpable=0
+ - net.ipv4.tcp_rfc1337=1
+ - kernel.perf_event_paranoid=3
+ - kernel.randomize_va_space=2
+ - net.ipv4.icmp_ignore_bogus_error_responses=1
+ - net.ipv4.conf.all.log_martians=1
diff --git a/LICENSE b/LICENSE
new file mode 100644
index 0000000..261eeb9
--- /dev/null
+++ b/LICENSE
@@ -0,0 +1,201 @@
+ Apache License
+ Version 2.0, January 2004
+ http://www.apache.org/licenses/
+
+ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
+
+ 1. Definitions.
+
+ "License" shall mean the terms and conditions for use, reproduction,
+ and distribution as defined by Sections 1 through 9 of this document.
+
+ "Licensor" shall mean the copyright owner or entity authorized by
+ the copyright owner that is granting the License.
+
+ "Legal Entity" shall mean the union of the acting entity and all
+ other entities that control, are controlled by, or are under common
+ control with that entity. For the purposes of this definition,
+ "control" means (i) the power, direct or indirect, to cause the
+ direction or management of such entity, whether by contract or
+ otherwise, or (ii) ownership of fifty percent (50%) or more of the
+ outstanding shares, or (iii) beneficial ownership of such entity.
+
+ "You" (or "Your") shall mean an individual or Legal Entity
+ exercising permissions granted by this License.
+
+ "Source" form shall mean the preferred form for making modifications,
+ including but not limited to software source code, documentation
+ source, and configuration files.
+
+ "Object" form shall mean any form resulting from mechanical
+ transformation or translation of a Source form, including but
+ not limited to compiled object code, generated documentation,
+ and conversions to other media types.
+
+ "Work" shall mean the work of authorship, whether in Source or
+ Object form, made available under the License, as indicated by a
+ copyright notice that is included in or attached to the work
+ (an example is provided in the Appendix below).
+
+ "Derivative Works" shall mean any work, whether in Source or Object
+ form, that is based on (or derived from) the Work and for which the
+ editorial revisions, annotations, elaborations, or other modifications
+ represent, as a whole, an original work of authorship. For the purposes
+ of this License, Derivative Works shall not include works that remain
+ separable from, or merely link (or bind by name) to the interfaces of,
+ the Work and Derivative Works thereof.
+
+ "Contribution" shall mean any work of authorship, including
+ the original version of the Work and any modifications or additions
+ to that Work or Derivative Works thereof, that is intentionally
+ submitted to Licensor for inclusion in the Work by the copyright owner
+ or by an individual or Legal Entity authorized to submit on behalf of
+ the copyright owner. For the purposes of this definition, "submitted"
+ means any form of electronic, verbal, or written communication sent
+ to the Licensor or its representatives, including but not limited to
+ communication on electronic mailing lists, source code control systems,
+ and issue tracking systems that are managed by, or on behalf of, the
+ Licensor for the purpose of discussing and improving the Work, but
+ excluding communication that is conspicuously marked or otherwise
+ designated in writing by the copyright owner as "Not a Contribution."
+
+ "Contributor" shall mean Licensor and any individual or Legal Entity
+ on behalf of whom a Contribution has been received by Licensor and
+ subsequently incorporated within the Work.
+
+ 2. Grant of Copyright License. Subject to the terms and conditions of
+ this License, each Contributor hereby grants to You a perpetual,
+ worldwide, non-exclusive, no-charge, royalty-free, irrevocable
+ copyright license to reproduce, prepare Derivative Works of,
+ publicly display, publicly perform, sublicense, and distribute the
+ Work and such Derivative Works in Source or Object form.
+
+ 3. Grant of Patent License. Subject to the terms and conditions of
+ this License, each Contributor hereby grants to You a perpetual,
+ worldwide, non-exclusive, no-charge, royalty-free, irrevocable
+ (except as stated in this section) patent license to make, have made,
+ use, offer to sell, sell, import, and otherwise transfer the Work,
+ where such license applies only to those patent claims licensable
+ by such Contributor that are necessarily infringed by their
+ Contribution(s) alone or by combination of their Contribution(s)
+ with the Work to which such Contribution(s) was submitted. If You
+ institute patent litigation against any entity (including a
+ cross-claim or counterclaim in a lawsuit) alleging that the Work
+ or a Contribution incorporated within the Work constitutes direct
+ or contributory patent infringement, then any patent licenses
+ granted to You under this License for that Work shall terminate
+ as of the date such litigation is filed.
+
+ 4. Redistribution. You may reproduce and distribute copies of the
+ Work or Derivative Works thereof in any medium, with or without
+ modifications, and in Source or Object form, provided that You
+ meet the following conditions:
+
+ (a) You must give any other recipients of the Work or
+ Derivative Works a copy of this License; and
+
+ (b) You must cause any modified files to carry prominent notices
+ stating that You changed the files; and
+
+ (c) You must retain, in the Source form of any Derivative Works
+ that You distribute, all copyright, patent, trademark, and
+ attribution notices from the Source form of the Work,
+ excluding those notices that do not pertain to any part of
+ the Derivative Works; and
+
+ (d) If the Work includes a "NOTICE" text file as part of its
+ distribution, then any Derivative Works that You distribute must
+ include a readable copy of the attribution notices contained
+ within such NOTICE file, excluding those notices that do not
+ pertain to any part of the Derivative Works, in at least one
+ of the following places: within a NOTICE text file distributed
+ as part of the Derivative Works; within the Source form or
+ documentation, if provided along with the Derivative Works; or,
+ within a display generated by the Derivative Works, if and
+ wherever such third-party notices normally appear. The contents
+ of the NOTICE file are for informational purposes only and
+ do not modify the License. You may add Your own attribution
+ notices within Derivative Works that You distribute, alongside
+ or as an addendum to the NOTICE text from the Work, provided
+ that such additional attribution notices cannot be construed
+ as modifying the License.
+
+ You may add Your own copyright statement to Your modifications and
+ may provide additional or different license terms and conditions
+ for use, reproduction, or distribution of Your modifications, or
+ for any such Derivative Works as a whole, provided Your use,
+ reproduction, and distribution of the Work otherwise complies with
+ the conditions stated in this License.
+
+ 5. Submission of Contributions. Unless You explicitly state otherwise,
+ any Contribution intentionally submitted for inclusion in the Work
+ by You to the Licensor shall be under the terms and conditions of
+ this License, without any additional terms or conditions.
+ Notwithstanding the above, nothing herein shall supersede or modify
+ the terms of any separate license agreement you may have executed
+ with Licensor regarding such Contributions.
+
+ 6. Trademarks. This License does not grant permission to use the trade
+ names, trademarks, service marks, or product names of the Licensor,
+ except as required for reasonable and customary use in describing the
+ origin of the Work and reproducing the content of the NOTICE file.
+
+ 7. Disclaimer of Warranty. Unless required by applicable law or
+ agreed to in writing, Licensor provides the Work (and each
+ Contributor provides its Contributions) on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
+ implied, including, without limitation, any warranties or conditions
+ of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
+ PARTICULAR PURPOSE. You are solely responsible for determining the
+ appropriateness of using or redistributing the Work and assume any
+ risks associated with Your exercise of permissions under this License.
+
+ 8. Limitation of Liability. In no event and under no legal theory,
+ whether in tort (including negligence), contract, or otherwise,
+ unless required by applicable law (such as deliberate and grossly
+ negligent acts) or agreed to in writing, shall any Contributor be
+ liable to You for damages, including any direct, indirect, special,
+ incidental, or consequential damages of any character arising as a
+ result of this License or out of the use or inability to use the
+ Work (including but not limited to damages for loss of goodwill,
+ work stoppage, computer failure or malfunction, or any and all
+ other commercial damages or losses), even if such Contributor
+ has been advised of the possibility of such damages.
+
+ 9. Accepting Warranty or Additional Liability. While redistributing
+ the Work or Derivative Works thereof, You may choose to offer,
+ and charge a fee for, acceptance of support, warranty, indemnity,
+ or other liability obligations and/or rights consistent with this
+ License. However, in accepting such obligations, You may act only
+ on Your own behalf and on Your sole responsibility, not on behalf
+ of any other Contributor, and only if You agree to indemnify,
+ defend, and hold each Contributor harmless for any liability
+ incurred by, or claims asserted against, such Contributor by reason
+ of your accepting any such warranty or additional liability.
+
+ END OF TERMS AND CONDITIONS
+
+ APPENDIX: How to apply the Apache License to your work.
+
+ To apply the Apache License to your work, attach the following
+ boilerplate notice, with the fields enclosed by brackets "[]"
+ replaced with your own identifying information. (Don't include
+ the brackets!) The text should be enclosed in the appropriate
+ comment syntax for the file format. We also recommend that a
+ file or class name and description of purpose be included on the
+ same "printed page" as the copyright notice for easier
+ identification within third-party archives.
+
+ Copyright [yyyy] [name of copyright owner]
+
+ Licensed under the Apache License, Version 2.0 (the "License");
+ you may not use this file except in compliance with the License.
+ You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+ Unless required by applicable law or agreed to in writing, software
+ distributed under the License is distributed on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ See the License for the specific language governing permissions and
+ limitations under the License.
diff --git a/Mailcow/README.md b/Mailcow/README.md
new file mode 100644
index 0000000..e3774be
--- /dev/null
+++ b/Mailcow/README.md
@@ -0,0 +1,3 @@
+# Notes
+1. mailcow-updater can be used instead of auto-updater to take advantage of mailcow's update.sh script
+2. You will need to compile and install the my-pdatesh module for SELinux to avoid the 203/EXEC error.
diff --git a/Mailcow/mailcow-updater.service b/Mailcow/mailcow-updater.service
new file mode 100644
index 0000000..289a51a
--- /dev/null
+++ b/Mailcow/mailcow-updater.service
@@ -0,0 +1,14 @@
+[Unit]
+Description=Mailcow Automatic Updater
+After=docker.service
+Wants=network-online.target
+Requires=docker.service
+
+[Service]
+User=root
+Group=root
+WorkingDirectory=/opt/mailcow-dockerized/
+ExecStart=/opt/mailcow-dockerized/update.sh --force
+
+[Install]
+WantedBy=multi-user.target
diff --git a/Mailcow/my-pdatesh.te b/Mailcow/my-pdatesh.te
new file mode 100644
index 0000000..b9a590d
--- /dev/null
+++ b/Mailcow/my-pdatesh.te
@@ -0,0 +1,7 @@
+module my-pdatesh 1.0;
+
+require {
+ type init_t;
+ type var_t;
+ class file { execute execute_no_trans open read };
+}
diff --git a/OnlyOffice.yml b/OnlyOffice.yml
new file mode 100644
index 0000000..b9fba79
--- /dev/null
+++ b/OnlyOffice.yml
@@ -0,0 +1,166 @@
+variant: fcos
+version: 1.4.0
+boot_device:
+passwd:
+ users:
+ - name: tomster
+ ssh_authorized_keys:
+ - ssh-rsa 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 tomster@PRL-01
+ groups:
+ - wheel
+ - sudo
+systemd:
+ units:
+ - name: postinst.service
+ enabled: true
+ contents: |
+ [Unit]
+ Description=Initial System Setup
+ # We run after `systemd-machine-id-commit.service` to ensure that
+ # `ConditionFirstBoot=true` services won't rerun on the next boot.
+ After=systemd-machine-id-commit.service
+ After=network-online.target
+ # We run before `zincati.service` to avoid conflicting rpm-ostree
+ # transactions.
+ Before=zincati.service
+ ConditionPathExists=!/var/lib/%N.stamp
+
+ [Service]
+ Type=oneshot
+ RemainAfterExit=yes
+ ExecStart=/usr/bin/rpm-ostree install fail2ban firewalld prelockd tuned qemu-guest-agent
+ ExecStart=/bin/touch /var/lib/%N.stamp
+ ExecStart=/usr/sbin/setsebool -P container_use_cephfs off
+ ExecStart=/usr/sbin/setsebool -P virt_use_nfs off
+ ExecStart=/usr/sbin/setsebool -P virt_use_samba off
+ ExecStart=/usr/bin/sed 's/nullok//g' /etc/pam.d/system-auth
+ ExecStart=/usr/bin/curl https://raw.githubusercontent.com/Whonix/security-misc/master/etc/modprobe.d/30_security-misc.conf -o /etc/modprobe.d/30_security-misc.conf
+ ExecStart=/bin/systemctl --no-block reboot
+
+ [Install]
+ WantedBy=multi-user.target
+ - name: postinst2.service
+ enabled: true
+ contents: |
+ [Unit]
+ Description=Initial System Setup Part 2
+ # We run this after the packages have been overlayed
+ After=network-online.target
+ ConditionPathExists=!/var/lib/%N.stamp
+ ConditionPathExists=/var/lib/postinst.stamp
+
+ [Service]
+ Type=oneshot
+ RemainAfterExit=yes
+ ExecStart=/usr/bin/docker run --detach --privileged --name watchtower --restart unless-stopped -v /var/run/docker.sock:/var/run/docker.sock -v /etc/localtime:/etc/localtime:ro containrrr/watchtower --schedule "0 5 0 * * 1"
+ ExecStart=/usr/bin/docker run --name onlyoffice --restart unless-stopped -i -t -d -p 80:80 -p 443:443 -e LETS_ENCRYPT_DOMAIN=your_domain -e LETS_ENCRYPT_MAIL=your_mail -e JWT_ENABLED=true -e JWT_SECRET=your_secret_here -v /srv/onlyoffice/DocumentServer/logs:/var/log/onlyoffice:Z -v /srv/onlyoffice/DocumentServer/data:/var/www/onlyoffice/Data:Z -v /srv/onlyoffice/DocumentServer/lib:/var/lib/onlyoffice:Z -v /srv/onlyoffice/DocumentServer/rabbitmq:/var/lib/rabbitmq:Z -v /srv/onlyoffice/DocumentServer/redis:/var/lib/redis:Z -v /srv/onlyoffice/DocumentServer/db:/var/lib/postgresql:Z onlyoffice/documentserver
+ ExecStart=/bin/touch /var/lib/%N.stamp
+
+ [Install]
+ WantedBy=multi-user.target
+ - name: docker.service
+ enabled: true
+ - name: fstrim.timer
+ enabled: true
+ - name: systemd-oomd.service
+ enabled: true
+ - name: rpm-ostree-countme.timer
+ enabled: false
+ mask: true
+storage:
+ files:
+ - path: /etc/zincati/config.d/51-rollout-wariness.toml
+ contents:
+ inline: |
+ [identity]
+ rollout_wariness = 1
+ - path: /etc/zincati/config.d/55-updates-strategy.toml
+ contents:
+ inline: |
+ [updates]
+ strategy = "periodic"
+ [updates.periodic]
+ time_zone = "localtime"
+ [[updates.periodic.window]]
+ days = [ "Sun" ]
+ start_time = "0:00"
+ length_minutes = 60
+ - path: /etc/fail2ban/jail.local
+ contents:
+ inline: |
+ [DEFAULT]
+ # Maximum 3 failures:
+ maxentry = 3
+ # Ban hosts for ten hour:
+ bantime = 3600
+ # Override /etc/fail2ban/jail.d/00-firewalld.conf:
+ banaction = iptables-multiport
+ [sshd]
+ enabled = true
+ - path: /etc/tuned/active_profile
+ overwrite: true
+ contents:
+ inline: |
+ virtual-guest
+ - path: /etc/tuned/profile_mode
+ overwrite: true
+ contents:
+ inline: |
+ manual
+ - path: /etc/systemd/zram-generator.conf
+ overwrite: true
+ contents:
+ inline: |
+ # This config file enables a /dev/zram0 device with the default settings
+ [zram0]
+ zram-fraction = 1
+ max-zram-size = 8192
+ - path: /etc/security/limits.d/30-disable-coredump.conf
+ overwrite: true
+ contents:
+ inline: |
+ * hard core 0
+ - path: /etc/ssh/ssh_config.d/60-disable-GSSAPI.conf
+ overwrite: true
+ contents:
+ inline: |
+ GSSAPIAuthentication no
+ - path: /etc/sysctl.d/20-silence-audit.conf
+ contents:
+ inline: |
+ # Raise console message logging level from DEBUG (7) to WARNING (4)
+ # so that audit messages don't get interspersed on the console that
+ # may frustrate a user trying to interactively log in.
+ kernel.printk=4
+ links:
+ - path: /etc/localtime
+ target: ../usr/share/zoneinfo/America/New_York
+ - path: /etc/systemd/system/multi-user.target.wants/tuned.service
+ target: /usr/lib/systemd/system/tuned.service
+ - path: /etc/systemd/system/multi-user.target.wants/prelockd.service
+ target: /usr/lib/systemd/system/prelockd.service
+ - path: /etc/systemd/system/multi-user.target.wants/fail2ban.service
+ target: /usr/lib/systemd/system/fail2ban.service
+ - path: /etc/systemd/system/kdump.service.target
+ target: /dev/null
+kernel_arguments:
+ should_exist:
+ - kvm.nx_huge_pages=force
+ - random.trust_cpu=off
+ - kernel.dmesg_restrict=1
+ - fs.protected_fifos=2
+ - fs.protected_regular=2
+ - fs.protected_symlinks=1
+ - fs.protected_hardlinks=1
+ - net.core.bpf_jit_harden=2
+ - kernel.kexec_load_disabled=1
+ - kernel.kptr_restrict=2
+ - vm.mmap_rnd_bits=32
+ - vm.mmap_rnd_compat_bits=16
+ - kernel.yama.ptrace_scope=2
+ - fs.suid_dumpable=0
+ - net.ipv4.tcp_rfc1337=1
+ - kernel.perf_event_paranoid=3
+ - kernel.randomize_va_space=2
+ - net.ipv4.icmp_ignore_bogus_error_responses=1
+ - net.ipv4.conf.all.log_martians=1
diff --git a/README.md b/README.md
index 958f3f9..a26f361 100644
--- a/README.md
+++ b/README.md
@@ -1,2 +1,8 @@
# Fedora-CoreOS-Ignition
-Ignition configurations for Fedora CoreOS
+Ignition configurations for Fedora CoreOS
+
+# Notes
+1. These are the configs I personally use on my systems. You **MUST** edit the files before you use them. At the very least, you should add your SSH keys or password hash.
+2. These configurations are made with a VPS in mind. You should adapt it for a bare metal deployment if that is what you are using (adding additional kernel parameters, configuring drive encryption, configuring storage, etc). You should also change the tuned profile from `virtual-guest` appropriately.
+3. In most of these configs, the timezone is set to `America/New_York` and the automatic reboot time is set at 12 AM on Sunday. Watchtower will kick in 5-10 minutes after the reboot to update and redeploy the containers. You should change it according to your needs. The Docker-Compose.yml file does not include Watchtower.
+4. The auto-updater.service could be put in /etc/systemd/system and enable to have automatic updates for your docker-compose and its containers. Please make sure that the WorkingDir is appropriate.
diff --git a/auto-updater.service b/auto-updater.service
new file mode 100644
index 0000000..e7dead9
--- /dev/null
+++ b/auto-updater.service
@@ -0,0 +1,15 @@
+[Unit]
+Description=Automatic Updater
+After=docker.service
+Wants=network-online.target
+Requires=docker.service
+
+[Service]
+User=root
+Group=root
+WorkingDirectory=/path/to/docker-compose/directory
+ExecStart=/usr/bin/git pull
+ExecStart=/usr/bin/docker-compose up -d
+
+[Install]
+WantedBy=multi-user.target