diff --git a/Docker-Compose.yml b/Docker-Compose.yml new file mode 100644 index 0000000..3f4573e --- /dev/null +++ b/Docker-Compose.yml @@ -0,0 +1,147 @@ +variant: fcos +version: 1.4.0 +boot_device: +passwd: + users: + - name: tomster + ssh_authorized_keys: + - ssh-rsa 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 tomster@PRL-01 + groups: + - wheel + - sudo +systemd: + units: + - name: postinst.service + enabled: true + contents: | + [Unit] + Description=Initial System Setup + # We run after `systemd-machine-id-commit.service` to ensure that + # `ConditionFirstBoot=true` services won't rerun on the next boot. + After=systemd-machine-id-commit.service + After=network-online.target + # We run before `zincati.service` to avoid conflicting rpm-ostree + # transactions. + Before=zincati.service + ConditionPathExists=!/var/lib/%N.stamp + + [Service] + Type=oneshot + RemainAfterExit=yes + ExecStart=/usr/bin/rpm-ostree install docker-compose fail2ban firewalld prelockd tuned qemu-guest-agent + ExecStart=/bin/touch /var/lib/%N.stamp + ExecStart=/usr/sbin/setsebool -P container_use_cephfs off + ExecStart=/usr/sbin/setsebool -P virt_use_nfs off + ExecStart=/usr/sbin/setsebool -P virt_use_samba off + ExecStart=/usr/bin/sed 's/nullok//g' /etc/pam.d/system-auth + ExecStart=/usr/bin/curl https://raw.githubusercontent.com/Whonix/security-misc/master/etc/modprobe.d/30_security-misc.conf -o /etc/modprobe.d/30_security-misc.conf + ExecStart=/bin/systemctl --no-block reboot + + [Install] + WantedBy=multi-user.target + - name: docker.service + enabled: true + - name: fstrim.timer + enabled: true + - name: systemd-oomd.service + enabled: true + - name: rpm-ostree-countme.timer + enabled: false + mask: true +storage: + files: + - path: /etc/zincati/config.d/51-rollout-wariness.toml + contents: + inline: | + [identity] + rollout_wariness = 1 + - path: /etc/zincati/config.d/55-updates-strategy.toml + contents: + inline: | + [updates] + strategy = "periodic" + [updates.periodic] + time_zone = "localtime" + [[updates.periodic.window]] + days = [ "Sun" ] + start_time = "0:00" + length_minutes = 60 + - path: /etc/fail2ban/jail.local + contents: + inline: | + [DEFAULT] + # Maximum 3 failures: + maxentry = 3 + # Ban hosts for ten hour: + bantime = 3600 + # Override /etc/fail2ban/jail.d/00-firewalld.conf: + banaction = iptables-multiport + [sshd] + enabled = true + - path: /etc/tuned/active_profile + overwrite: true + contents: + inline: | + virtual-guest + - path: /etc/tuned/profile_mode + overwrite: true + contents: + inline: | + manual + - path: /etc/systemd/zram-generator.conf + overwrite: true + contents: + inline: | + # This config file enables a /dev/zram0 device with the default settings + [zram0] + zram-fraction = 1 + max-zram-size = 8192 + - path: /etc/security/limits.d/30-disable-coredump.conf + overwrite: true + contents: + inline: | + * hard core 0 + - path: /etc/ssh/ssh_config.d/60-disable-GSSAPI.conf + overwrite: true + contents: + inline: | + GSSAPIAuthentication no + - path: /etc/sysctl.d/20-silence-audit.conf + contents: + inline: | + # Raise console message logging level from DEBUG (7) to WARNING (4) + # so that audit messages don't get interspersed on the console that + # may frustrate a user trying to interactively log in. + kernel.printk=4 + links: + - path: /etc/localtime + target: ../usr/share/zoneinfo/America/New_York + - path: /etc/systemd/system/multi-user.target.wants/tuned.service + target: /usr/lib/systemd/system/tuned.service + - path: /etc/systemd/system/multi-user.target.wants/prelockd.service + target: /usr/lib/systemd/system/prelockd.service + - path: /etc/systemd/system/multi-user.target.wants/fail2ban.service + target: /usr/lib/systemd/system/fail2ban.service + - path: /etc/systemd/system/kdump.service.target + target: /dev/null +kernel_arguments: + should_exist: + - kvm.nx_huge_pages=force + - random.trust_cpu=off + - kernel.dmesg_restrict=1 + - fs.protected_fifos=2 + - fs.protected_regular=2 + - fs.protected_symlinks=1 + - fs.protected_hardlinks=1 + - net.core.bpf_jit_harden=2 + - kernel.kexec_load_disabled=1 + - kernel.kptr_restrict=2 + - vm.mmap_rnd_bits=32 + - vm.mmap_rnd_compat_bits=16 + - kernel.yama.ptrace_scope=2 + - fs.suid_dumpable=0 + - net.ipv4.tcp_rfc1337=1 + - kernel.perf_event_paranoid=3 + - kernel.randomize_va_space=2 + - net.ipv4.icmp_ignore_bogus_error_responses=1 + - net.ipv4.conf.all.log_martians=1 diff --git a/Generic.ign b/Generic.ign new file mode 100644 index 0000000..254b479 --- /dev/null +++ b/Generic.ign @@ -0,0 +1,160 @@ +{ + "ignition": { + "version": "3.3.0" + }, + "kernelArguments": { + "shouldExist": [ + "kvm.nx_huge_pages=force", + "random.trust_cpu=off", + "kernel.dmesg_restrict=1", + "fs.protected_fifos=2", + "fs.protected_regular=2", + "fs.protected_symlinks=1", + "fs.protected_hardlinks=1", + "net.core.bpf_jit_harden=2", + "kernel.kexec_load_disabled=1", + "kernel.kptr_restrict=2", + "vm.mmap_rnd_bits=32", + "vm.mmap_rnd_compat_bits=16", + "kernel.yama.ptrace_scope=2", + "fs.suid_dumpable=0", + "net.ipv4.tcp_rfc1337=1", + "kernel.perf_event_paranoid=3", + "kernel.randomize_va_space=2", + "net.ipv4.icmp_ignore_bogus_error_responses=1", + "net.ipv4.conf.all.log_martians=1" + ] + }, + "passwd": { + "users": [ + { + "groups": [ + "wheel", + "sudo" + ], + "name": "tomster", + "sshAuthorizedKeys": [ + "ssh-rsa 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 tomster@PRL-01" + ] + } + ] + }, + "storage": { + "files": [ + { + "path": "/etc/zincati/config.d/51-rollout-wariness.toml", + "contents": { + "source": "data:,%5Bidentity%5D%0Arollout_wariness%20%3D%201%0A" + } + }, + { + "path": "/etc/zincati/config.d/55-updates-strategy.toml", + "contents": { + "compression": "gzip", + "source": "data:;base64,H4sIAAAAAAAC/2SNMarEMAxEe51C6ADB1S8+5BRbGmNMLLIGRw62TMieflGRats3b2b8PHNSHgGG9qS837gindxLy2UjePLlQQG0HBw/TdjM2rZUjRD4H3e5iuR2hQA53QNX9EivKYT2lrpGK9qK+3eOoLLs+o5Hkals+p+DbwAAAP//4Po2vKAAAAA=" + } + }, + { + "path": "/etc/fail2ban/jail.local", + "contents": { + "source": "data:;base64,W0RFRkFVTFRdCiMgTWF4aW11bSAzIGZhaWx1cmVzOgptYXhlbnRyeSA9IDMKIyBCYW4gaG9zdHMgZm9yIHRlbiBob3VyOgpiYW50aW1lID0gMzYwMAojIE92ZXJyaWRlIC9ldGMvZmFpbDJiYW4vamFpbC5kLzAwLWZpcmV3YWxsZC5jb25mOgpiYW5hY3Rpb24gPSBpcHRhYmxlcy1tdWx0aXBvcnQKW3NzaGRdCmVuYWJsZWQgPSB0cnVlCg==" + } + }, + { + "overwrite": true, + "path": "/etc/tuned/active_profile", + "contents": { + "source": "data:,virtual-guest%0A" + } + }, + { + "overwrite": true, + "path": "/etc/tuned/profile_mode", + "contents": { + "source": "data:,manual%0A" + } + }, + { + "overwrite": true, + "path": "/etc/systemd/zram-generator.conf", + "contents": { + "source": "data:;base64,IyBUaGlzIGNvbmZpZyBmaWxlIGVuYWJsZXMgYSAvZGV2L3pyYW0wIGRldmljZSB3aXRoIHRoZSBkZWZhdWx0IHNldHRpbmdzClt6cmFtMF0KenJhbS1mcmFjdGlvbiA9IDEKbWF4LXpyYW0tc2l6ZSA9IDgxOTIK" + } + }, + { + "overwrite": true, + "path": "/etc/security/limits.d/30-disable-coredump.conf", + "contents": { + "source": "data:,*%20hard%20core%200%0A" + } + }, + { + "overwrite": true, + "path": "/etc/ssh/ssh_config.d/60-disable-GSSAPI.conf", + "contents": { + "source": "data:,GSSAPIAuthentication%20no%0A" + } + }, + { + "path": "/etc/sysctl.d/20-silence-audit.conf", + "contents": { + "compression": "gzip", + "source": "data:;base64,H4sIAAAAAAAC/0TOsUrEUBCF4f4+xYEU7jZbLVhZKMpikyIg1kMyubnkZibMTAJ5ewkiPsD5z9ego+KMXsW1MhZ2p8yomnORjMo7V4ymC94/3r4euDxfEYrv1679bB+43K+pgStiogBtQ4m/hmNQeQpkDhQJNl/ZnAeoIKb/y3OZGix0YLTNwygYhM3ZEHacitDfAvVRdq7HyUORW5rZhOtttSIxv9zTTwAAAP//Cm0jUs8AAAA=" + } + } + ], + "links": [ + { + "path": "/etc/localtime", + "target": "../usr/share/zoneinfo/America/New_York" + }, + { + "path": "/etc/systemd/system/multi-user.target.wants/tuned.service", + "target": "/usr/lib/systemd/system/tuned.service" + }, + { + "path": "/etc/systemd/system/multi-user.target.wants/prelockd.service", + "target": "/usr/lib/systemd/system/prelockd.service" + }, + { + "path": "/etc/systemd/system/multi-user.target.wants/fail2ban.service", + "target": "/usr/lib/systemd/system/fail2ban.service" + }, + { + "path": "/etc/systemd/system/kdump.service.target", + "target": "/dev/null" + } + ] + }, + "systemd": { + "units": [ + { + "contents": "[Unit]\nDescription=Initial System Setup\n# We run after `systemd-machine-id-commit.service` to ensure that\n# `ConditionFirstBoot=true` services won't rerun on the next boot.\nAfter=systemd-machine-id-commit.service\nAfter=network-online.target\n# We run before `zincati.service` to avoid conflicting rpm-ostree\n# transactions.\nBefore=zincati.service\nConditionPathExists=!/var/lib/%N.stamp\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nExecStart=/usr/bin/rpm-ostree install fail2ban firewalld prelockd tuned qemu-guest-agent\nExecStart=/bin/touch /var/lib/%N.stamp\nExecStart=/usr/sbin/setsebool -P container_use_cephfs off\nExecStart=/usr/sbin/setsebool -P virt_use_nfs off\nExecStart=/usr/sbin/setsebool -P virt_use_samba off\nExecStart=/usr/bin/sed 's/nullok//g' /etc/pam.d/system-auth\nExecStart=/usr/bin/curl https://raw.githubusercontent.com/Whonix/security-misc/master/etc/modprobe.d/30_security-misc.conf -o /etc/modprobe.d/30_security-misc.conf\nExecStart=/bin/systemctl --no-block reboot\n\n[Install]\nWantedBy=multi-user.target\n", + "enabled": true, + "name": "postinst.service" + }, + { + "contents": "[Unit]\nDescription=Initial System Setup Part 2\n# We run this after the packages have been overlayed\nAfter=network-online.target\nConditionPathExists=!/var/lib/%N.stamp\nConditionPathExists=/var/lib/postinst.stamp\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nExecStart=/usr/bin/firewall-cmd --reload\nExecStart=/usr/bin/docker run --detach --privileged --name watchtower --restart unless-stopped -v /var/run/docker.sock:/var/run/docker.sock -v /etc/localtime:/etc/localtime:ro containrrr/watchtower --schedule \"0 5 0 * * 1\"\nExecStart=/bin/touch /var/lib/%N.stamp\n\n[Install]\nWantedBy=multi-user.target\n", + "enabled": true, + "name": "postinst2.service" + }, + { + "enabled": true, + "name": "docker.service" + }, + { + "enabled": true, + "name": "fstrim.timer" + }, + { + "enabled": true, + "name": "systemd-oomd.service" + }, + { + "enabled": false, + "mask": true, + "name": "rpm-ostree-countme.timer" + } + ] + } +} diff --git a/Generic.yml b/Generic.yml new file mode 100644 index 0000000..875e13d --- /dev/null +++ b/Generic.yml @@ -0,0 +1,165 @@ +variant: fcos +version: 1.4.0 +boot_device: +passwd: + users: + - name: tomster + ssh_authorized_keys: + - ssh-rsa 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 tomster@PRL-01 + groups: + - wheel + - sudo +systemd: + units: + - name: postinst.service + enabled: true + contents: | + [Unit] + Description=Initial System Setup + # We run after `systemd-machine-id-commit.service` to ensure that + # `ConditionFirstBoot=true` services won't rerun on the next boot. + After=systemd-machine-id-commit.service + After=network-online.target + # We run before `zincati.service` to avoid conflicting rpm-ostree + # transactions. + Before=zincati.service + ConditionPathExists=!/var/lib/%N.stamp + + [Service] + Type=oneshot + RemainAfterExit=yes + ExecStart=/usr/bin/rpm-ostree install fail2ban firewalld prelockd tuned qemu-guest-agent + ExecStart=/bin/touch /var/lib/%N.stamp + ExecStart=/usr/sbin/setsebool -P container_use_cephfs off + ExecStart=/usr/sbin/setsebool -P virt_use_nfs off + ExecStart=/usr/sbin/setsebool -P virt_use_samba off + ExecStart=/usr/bin/sed 's/nullok//g' /etc/pam.d/system-auth + ExecStart=/usr/bin/curl https://raw.githubusercontent.com/Whonix/security-misc/master/etc/modprobe.d/30_security-misc.conf -o /etc/modprobe.d/30_security-misc.conf + ExecStart=/bin/systemctl --no-block reboot + + [Install] + WantedBy=multi-user.target + - name: postinst2.service + enabled: true + contents: | + [Unit] + Description=Initial System Setup Part 2 + # We run this after the packages have been overlayed + After=network-online.target + ConditionPathExists=!/var/lib/%N.stamp + ConditionPathExists=/var/lib/postinst.stamp + + [Service] + Type=oneshot + RemainAfterExit=yes + ExecStart=/usr/bin/docker run --detach --privileged --name watchtower --restart unless-stopped -v /var/run/docker.sock:/var/run/docker.sock -v /etc/localtime:/etc/localtime:ro containrrr/watchtower --schedule "0 5 0 * * 1" + ExecStart=/bin/touch /var/lib/%N.stamp + + [Install] + WantedBy=multi-user.target + - name: docker.service + enabled: true + - name: fstrim.timer + enabled: true + - name: systemd-oomd.service + enabled: true + - name: rpm-ostree-countme.timer + enabled: false + mask: true +storage: + files: + - path: /etc/zincati/config.d/51-rollout-wariness.toml + contents: + inline: | + [identity] + rollout_wariness = 1 + - path: /etc/zincati/config.d/55-updates-strategy.toml + contents: + inline: | + [updates] + strategy = "periodic" + [updates.periodic] + time_zone = "localtime" + [[updates.periodic.window]] + days = [ "Sun" ] + start_time = "0:00" + length_minutes = 60 + - path: /etc/fail2ban/jail.local + contents: + inline: | + [DEFAULT] + # Maximum 3 failures: + maxentry = 3 + # Ban hosts for ten hour: + bantime = 3600 + # Override /etc/fail2ban/jail.d/00-firewalld.conf: + banaction = iptables-multiport + [sshd] + enabled = true + - path: /etc/tuned/active_profile + overwrite: true + contents: + inline: | + virtual-guest + - path: /etc/tuned/profile_mode + overwrite: true + contents: + inline: | + manual + - path: /etc/systemd/zram-generator.conf + overwrite: true + contents: + inline: | + # This config file enables a /dev/zram0 device with the default settings + [zram0] + zram-fraction = 1 + max-zram-size = 8192 + - path: /etc/security/limits.d/30-disable-coredump.conf + overwrite: true + contents: + inline: | + * hard core 0 + - path: /etc/ssh/ssh_config.d/60-disable-GSSAPI.conf + overwrite: true + contents: + inline: | + GSSAPIAuthentication no + - path: /etc/sysctl.d/20-silence-audit.conf + contents: + inline: | + # Raise console message logging level from DEBUG (7) to WARNING (4) + # so that audit messages don't get interspersed on the console that + # may frustrate a user trying to interactively log in. + kernel.printk=4 + links: + - path: /etc/localtime + target: ../usr/share/zoneinfo/America/New_York + - path: /etc/systemd/system/multi-user.target.wants/tuned.service + target: /usr/lib/systemd/system/tuned.service + - path: /etc/systemd/system/multi-user.target.wants/prelockd.service + target: /usr/lib/systemd/system/prelockd.service + - path: /etc/systemd/system/multi-user.target.wants/fail2ban.service + target: /usr/lib/systemd/system/fail2ban.service + - path: /etc/systemd/system/kdump.service.target + target: /dev/null +kernel_arguments: + should_exist: + - kvm.nx_huge_pages=force + - random.trust_cpu=off + - kernel.dmesg_restrict=1 + - fs.protected_fifos=2 + - fs.protected_regular=2 + - fs.protected_symlinks=1 + - fs.protected_hardlinks=1 + - net.core.bpf_jit_harden=2 + - kernel.kexec_load_disabled=1 + - kernel.kptr_restrict=2 + - vm.mmap_rnd_bits=32 + - vm.mmap_rnd_compat_bits=16 + - kernel.yama.ptrace_scope=2 + - fs.suid_dumpable=0 + - net.ipv4.tcp_rfc1337=1 + - kernel.perf_event_paranoid=3 + - kernel.randomize_va_space=2 + - net.ipv4.icmp_ignore_bogus_error_responses=1 + - net.ipv4.conf.all.log_martians=1 diff --git a/GitLab.yml b/GitLab.yml new file mode 100644 index 0000000..3ac67f1 --- /dev/null +++ b/GitLab.yml @@ -0,0 +1,167 @@ +variant: fcos +version: 1.4.0 +boot_device: +passwd: + users: + - name: tomster + ssh_authorized_keys: + - ssh-rsa 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 tomster@PRL-01 + groups: + - wheel + - sudo +systemd: + units: + - name: postinst.service + enabled: true + contents: | + [Unit] + Description=Initial System Setup + # We run after `systemd-machine-id-commit.service` to ensure that + # `ConditionFirstBoot=true` services won't rerun on the next boot. + After=systemd-machine-id-commit.service + After=network-online.target + # We run before `zincati.service` to avoid conflicting rpm-ostree + # transactions. + Before=zincati.service + ConditionPathExists=!/var/lib/%N.stamp + + [Service] + Type=oneshot + RemainAfterExit=yes + ExecStart=/usr/bin/rpm-ostree install fail2ban firewalld prelockd tuned qemu-guest-agent + ExecStart=/bin/touch /var/lib/%N.stamp + ExecStart=/usr/sbin/setsebool -P container_use_cephfs off + ExecStart=/usr/sbin/setsebool -P virt_use_nfs off + ExecStart=/usr/sbin/setsebool -P virt_use_samba off + ExecStart=/usr/bin/sed 's/nullok//g' /etc/pam.d/system-auth + ExecStart=/usr/bin/curl https://raw.githubusercontent.com/Whonix/security-misc/master/etc/modprobe.d/30_security-misc.conf -o /etc/modprobe.d/30_security-misc.conf + ExecStart=/bin/systemctl --no-block reboot + + [Install] + WantedBy=multi-user.target + - name: postinst2.service + enabled: true + contents: | + [Unit] + Description=Initial System Setup Part 2 + # We run this after the packages have been overlayed + After=network-online.target + ConditionPathExists=!/var/lib/%N.stamp + ConditionPathExists=/var/lib/postinst.stamp + + [Service] + Type=oneshot + RemainAfterExit=yes + ExecStart=/usr/bin/echo "export GITLAB_HOME=/srv/gitlab" >> /etc/bashrc + ExecStart=/usr/bin/docker run --detach --privileged --name watchtower --restart unless-stopped -v /var/run/docker.sock:/var/run/docker.sock -v /etc/localtime:/etc/localtime:ro containrrr/watchtower --schedule "0 5 0 * * 1" + ExecStart=/usr/bin/docker run --detach --hostname your_domain --publish 443:443 --publish 80:80 --publish 7022:22 --name gitlab --restart unless-stopped --volume /srv/gitlab/config:/etc/gitlab:Z --volume /srv/gitlab/logs:/var/log/gitlab:Z --volume /srv/gitlab/data:/var/opt/gitlab:Z gitlab/gitlab-ee:latest + ExecStart=/bin/touch /var/lib/%N.stamp + + [Install] + WantedBy=multi-user.target + - name: docker.service + enabled: true + - name: fstrim.timer + enabled: true + - name: systemd-oomd.service + enabled: true + - name: rpm-ostree-countme.timer + enabled: false + mask: true +storage: + files: + - path: /etc/zincati/config.d/51-rollout-wariness.toml + contents: + inline: | + [identity] + rollout_wariness = 1 + - path: /etc/zincati/config.d/55-updates-strategy.toml + contents: + inline: | + [updates] + strategy = "periodic" + [updates.periodic] + time_zone = "localtime" + [[updates.periodic.window]] + days = [ "Sun" ] + start_time = "0:00" + length_minutes = 60 + - path: /etc/fail2ban/jail.local + contents: + inline: | + [DEFAULT] + # Maximum 3 failures: + maxentry = 3 + # Ban hosts for ten hour: + bantime = 3600 + # Override /etc/fail2ban/jail.d/00-firewalld.conf: + banaction = iptables-multiport + [sshd] + enabled = true + - path: /etc/tuned/active_profile + overwrite: true + contents: + inline: | + virtual-guest + - path: /etc/tuned/profile_mode + overwrite: true + contents: + inline: | + manual + - path: /etc/systemd/zram-generator.conf + overwrite: true + contents: + inline: | + # This config file enables a /dev/zram0 device with the default settings + [zram0] + zram-fraction = 1 + max-zram-size = 8192 + - path: /etc/security/limits.d/30-disable-coredump.conf + overwrite: true + contents: + inline: | + * hard core 0 + - path: /etc/ssh/ssh_config.d/60-disable-GSSAPI.conf + overwrite: true + contents: + inline: | + GSSAPIAuthentication no + - path: /etc/sysctl.d/20-silence-audit.conf + contents: + inline: | + # Raise console message logging level from DEBUG (7) to WARNING (4) + # so that audit messages don't get interspersed on the console that + # may frustrate a user trying to interactively log in. + kernel.printk=4 + links: + - path: /etc/localtime + target: ../usr/share/zoneinfo/America/New_York + - path: /etc/systemd/system/multi-user.target.wants/tuned.service + target: /usr/lib/systemd/system/tuned.service + - path: /etc/systemd/system/multi-user.target.wants/prelockd.service + target: /usr/lib/systemd/system/prelockd.service + - path: /etc/systemd/system/multi-user.target.wants/fail2ban.service + target: /usr/lib/systemd/system/fail2ban.service + - path: /etc/systemd/system/kdump.service.target + target: /dev/null +kernel_arguments: + should_exist: + - kvm.nx_huge_pages=force + - random.trust_cpu=off + - kernel.dmesg_restrict=1 + - fs.protected_fifos=2 + - fs.protected_regular=2 + - fs.protected_symlinks=1 + - fs.protected_hardlinks=1 + - net.core.bpf_jit_harden=2 + - kernel.kexec_load_disabled=1 + - kernel.kptr_restrict=2 + - vm.mmap_rnd_bits=32 + - vm.mmap_rnd_compat_bits=16 + - kernel.yama.ptrace_scope=2 + - fs.suid_dumpable=0 + - net.ipv4.tcp_rfc1337=1 + - kernel.perf_event_paranoid=3 + - kernel.randomize_va_space=2 + - net.ipv4.icmp_ignore_bogus_error_responses=1 + - net.ipv4.conf.all.log_martians=1 diff --git a/LICENSE b/LICENSE new file mode 100644 index 0000000..261eeb9 --- /dev/null +++ b/LICENSE @@ -0,0 +1,201 @@ + Apache License + Version 2.0, January 2004 + http://www.apache.org/licenses/ + + TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION + + 1. Definitions. + + "License" shall mean the terms and conditions for use, reproduction, + and distribution as defined by Sections 1 through 9 of this document. + + "Licensor" shall mean the copyright owner or entity authorized by + the copyright owner that is granting the License. + + "Legal Entity" shall mean the union of the acting entity and all + other entities that control, are controlled by, or are under common + control with that entity. For the purposes of this definition, + "control" means (i) the power, direct or indirect, to cause the + direction or management of such entity, whether by contract or + otherwise, or (ii) ownership of fifty percent (50%) or more of the + outstanding shares, or (iii) beneficial ownership of such entity. + + "You" (or "Your") shall mean an individual or Legal Entity + exercising permissions granted by this License. + + "Source" form shall mean the preferred form for making modifications, + including but not limited to software source code, documentation + source, and configuration files. + + "Object" form shall mean any form resulting from mechanical + transformation or translation of a Source form, including but + not limited to compiled object code, generated documentation, + and conversions to other media types. + + "Work" shall mean the work of authorship, whether in Source or + Object form, made available under the License, as indicated by a + copyright notice that is included in or attached to the work + (an example is provided in the Appendix below). + + "Derivative Works" shall mean any work, whether in Source or Object + form, that is based on (or derived from) the Work and for which the + editorial revisions, annotations, elaborations, or other modifications + represent, as a whole, an original work of authorship. For the purposes + of this License, Derivative Works shall not include works that remain + separable from, or merely link (or bind by name) to the interfaces of, + the Work and Derivative Works thereof. + + "Contribution" shall mean any work of authorship, including + the original version of the Work and any modifications or additions + to that Work or Derivative Works thereof, that is intentionally + submitted to Licensor for inclusion in the Work by the copyright owner + or by an individual or Legal Entity authorized to submit on behalf of + the copyright owner. For the purposes of this definition, "submitted" + means any form of electronic, verbal, or written communication sent + to the Licensor or its representatives, including but not limited to + communication on electronic mailing lists, source code control systems, + and issue tracking systems that are managed by, or on behalf of, the + Licensor for the purpose of discussing and improving the Work, but + excluding communication that is conspicuously marked or otherwise + designated in writing by the copyright owner as "Not a Contribution." + + "Contributor" shall mean Licensor and any individual or Legal Entity + on behalf of whom a Contribution has been received by Licensor and + subsequently incorporated within the Work. + + 2. Grant of Copyright License. Subject to the terms and conditions of + this License, each Contributor hereby grants to You a perpetual, + worldwide, non-exclusive, no-charge, royalty-free, irrevocable + copyright license to reproduce, prepare Derivative Works of, + publicly display, publicly perform, sublicense, and distribute the + Work and such Derivative Works in Source or Object form. + + 3. Grant of Patent License. Subject to the terms and conditions of + this License, each Contributor hereby grants to You a perpetual, + worldwide, non-exclusive, no-charge, royalty-free, irrevocable + (except as stated in this section) patent license to make, have made, + use, offer to sell, sell, import, and otherwise transfer the Work, + where such license applies only to those patent claims licensable + by such Contributor that are necessarily infringed by their + Contribution(s) alone or by combination of their Contribution(s) + with the Work to which such Contribution(s) was submitted. If You + institute patent litigation against any entity (including a + cross-claim or counterclaim in a lawsuit) alleging that the Work + or a Contribution incorporated within the Work constitutes direct + or contributory patent infringement, then any patent licenses + granted to You under this License for that Work shall terminate + as of the date such litigation is filed. + + 4. Redistribution. You may reproduce and distribute copies of the + Work or Derivative Works thereof in any medium, with or without + modifications, and in Source or Object form, provided that You + meet the following conditions: + + (a) You must give any other recipients of the Work or + Derivative Works a copy of this License; and + + (b) You must cause any modified files to carry prominent notices + stating that You changed the files; and + + (c) You must retain, in the Source form of any Derivative Works + that You distribute, all copyright, patent, trademark, and + attribution notices from the Source form of the Work, + excluding those notices that do not pertain to any part of + the Derivative Works; and + + (d) If the Work includes a "NOTICE" text file as part of its + distribution, then any Derivative Works that You distribute must + include a readable copy of the attribution notices contained + within such NOTICE file, excluding those notices that do not + pertain to any part of the Derivative Works, in at least one + of the following places: within a NOTICE text file distributed + as part of the Derivative Works; within the Source form or + documentation, if provided along with the Derivative Works; or, + within a display generated by the Derivative Works, if and + wherever such third-party notices normally appear. The contents + of the NOTICE file are for informational purposes only and + do not modify the License. You may add Your own attribution + notices within Derivative Works that You distribute, alongside + or as an addendum to the NOTICE text from the Work, provided + that such additional attribution notices cannot be construed + as modifying the License. + + You may add Your own copyright statement to Your modifications and + may provide additional or different license terms and conditions + for use, reproduction, or distribution of Your modifications, or + for any such Derivative Works as a whole, provided Your use, + reproduction, and distribution of the Work otherwise complies with + the conditions stated in this License. + + 5. Submission of Contributions. Unless You explicitly state otherwise, + any Contribution intentionally submitted for inclusion in the Work + by You to the Licensor shall be under the terms and conditions of + this License, without any additional terms or conditions. + Notwithstanding the above, nothing herein shall supersede or modify + the terms of any separate license agreement you may have executed + with Licensor regarding such Contributions. + + 6. Trademarks. This License does not grant permission to use the trade + names, trademarks, service marks, or product names of the Licensor, + except as required for reasonable and customary use in describing the + origin of the Work and reproducing the content of the NOTICE file. + + 7. Disclaimer of Warranty. Unless required by applicable law or + agreed to in writing, Licensor provides the Work (and each + Contributor provides its Contributions) on an "AS IS" BASIS, + WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or + implied, including, without limitation, any warranties or conditions + of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A + PARTICULAR PURPOSE. You are solely responsible for determining the + appropriateness of using or redistributing the Work and assume any + risks associated with Your exercise of permissions under this License. + + 8. Limitation of Liability. In no event and under no legal theory, + whether in tort (including negligence), contract, or otherwise, + unless required by applicable law (such as deliberate and grossly + negligent acts) or agreed to in writing, shall any Contributor be + liable to You for damages, including any direct, indirect, special, + incidental, or consequential damages of any character arising as a + result of this License or out of the use or inability to use the + Work (including but not limited to damages for loss of goodwill, + work stoppage, computer failure or malfunction, or any and all + other commercial damages or losses), even if such Contributor + has been advised of the possibility of such damages. + + 9. Accepting Warranty or Additional Liability. While redistributing + the Work or Derivative Works thereof, You may choose to offer, + and charge a fee for, acceptance of support, warranty, indemnity, + or other liability obligations and/or rights consistent with this + License. However, in accepting such obligations, You may act only + on Your own behalf and on Your sole responsibility, not on behalf + of any other Contributor, and only if You agree to indemnify, + defend, and hold each Contributor harmless for any liability + incurred by, or claims asserted against, such Contributor by reason + of your accepting any such warranty or additional liability. + + END OF TERMS AND CONDITIONS + + APPENDIX: How to apply the Apache License to your work. + + To apply the Apache License to your work, attach the following + boilerplate notice, with the fields enclosed by brackets "[]" + replaced with your own identifying information. (Don't include + the brackets!) The text should be enclosed in the appropriate + comment syntax for the file format. We also recommend that a + file or class name and description of purpose be included on the + same "printed page" as the copyright notice for easier + identification within third-party archives. + + Copyright [yyyy] [name of copyright owner] + + Licensed under the Apache License, Version 2.0 (the "License"); + you may not use this file except in compliance with the License. + You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + + Unless required by applicable law or agreed to in writing, software + distributed under the License is distributed on an "AS IS" BASIS, + WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + See the License for the specific language governing permissions and + limitations under the License. diff --git a/Mailcow/README.md b/Mailcow/README.md new file mode 100644 index 0000000..e3774be --- /dev/null +++ b/Mailcow/README.md @@ -0,0 +1,3 @@ +# Notes +1. mailcow-updater can be used instead of auto-updater to take advantage of mailcow's update.sh script +2. You will need to compile and install the my-pdatesh module for SELinux to avoid the 203/EXEC error. diff --git a/Mailcow/mailcow-updater.service b/Mailcow/mailcow-updater.service new file mode 100644 index 0000000..289a51a --- /dev/null +++ b/Mailcow/mailcow-updater.service @@ -0,0 +1,14 @@ +[Unit] +Description=Mailcow Automatic Updater +After=docker.service +Wants=network-online.target +Requires=docker.service + +[Service] +User=root +Group=root +WorkingDirectory=/opt/mailcow-dockerized/ +ExecStart=/opt/mailcow-dockerized/update.sh --force + +[Install] +WantedBy=multi-user.target diff --git a/Mailcow/my-pdatesh.te b/Mailcow/my-pdatesh.te new file mode 100644 index 0000000..b9a590d --- /dev/null +++ b/Mailcow/my-pdatesh.te @@ -0,0 +1,7 @@ +module my-pdatesh 1.0; + +require { + type init_t; + type var_t; + class file { execute execute_no_trans open read }; +} diff --git a/OnlyOffice.yml b/OnlyOffice.yml new file mode 100644 index 0000000..b9fba79 --- /dev/null +++ b/OnlyOffice.yml @@ -0,0 +1,166 @@ +variant: fcos +version: 1.4.0 +boot_device: +passwd: + users: + - name: tomster + ssh_authorized_keys: + - ssh-rsa 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 tomster@PRL-01 + groups: + - wheel + - sudo +systemd: + units: + - name: postinst.service + enabled: true + contents: | + [Unit] + Description=Initial System Setup + # We run after `systemd-machine-id-commit.service` to ensure that + # `ConditionFirstBoot=true` services won't rerun on the next boot. + After=systemd-machine-id-commit.service + After=network-online.target + # We run before `zincati.service` to avoid conflicting rpm-ostree + # transactions. + Before=zincati.service + ConditionPathExists=!/var/lib/%N.stamp + + [Service] + Type=oneshot + RemainAfterExit=yes + ExecStart=/usr/bin/rpm-ostree install fail2ban firewalld prelockd tuned qemu-guest-agent + ExecStart=/bin/touch /var/lib/%N.stamp + ExecStart=/usr/sbin/setsebool -P container_use_cephfs off + ExecStart=/usr/sbin/setsebool -P virt_use_nfs off + ExecStart=/usr/sbin/setsebool -P virt_use_samba off + ExecStart=/usr/bin/sed 's/nullok//g' /etc/pam.d/system-auth + ExecStart=/usr/bin/curl https://raw.githubusercontent.com/Whonix/security-misc/master/etc/modprobe.d/30_security-misc.conf -o /etc/modprobe.d/30_security-misc.conf + ExecStart=/bin/systemctl --no-block reboot + + [Install] + WantedBy=multi-user.target + - name: postinst2.service + enabled: true + contents: | + [Unit] + Description=Initial System Setup Part 2 + # We run this after the packages have been overlayed + After=network-online.target + ConditionPathExists=!/var/lib/%N.stamp + ConditionPathExists=/var/lib/postinst.stamp + + [Service] + Type=oneshot + RemainAfterExit=yes + ExecStart=/usr/bin/docker run --detach --privileged --name watchtower --restart unless-stopped -v /var/run/docker.sock:/var/run/docker.sock -v /etc/localtime:/etc/localtime:ro containrrr/watchtower --schedule "0 5 0 * * 1" + ExecStart=/usr/bin/docker run --name onlyoffice --restart unless-stopped -i -t -d -p 80:80 -p 443:443 -e LETS_ENCRYPT_DOMAIN=your_domain -e LETS_ENCRYPT_MAIL=your_mail -e JWT_ENABLED=true -e JWT_SECRET=your_secret_here -v /srv/onlyoffice/DocumentServer/logs:/var/log/onlyoffice:Z -v /srv/onlyoffice/DocumentServer/data:/var/www/onlyoffice/Data:Z -v /srv/onlyoffice/DocumentServer/lib:/var/lib/onlyoffice:Z -v /srv/onlyoffice/DocumentServer/rabbitmq:/var/lib/rabbitmq:Z -v /srv/onlyoffice/DocumentServer/redis:/var/lib/redis:Z -v /srv/onlyoffice/DocumentServer/db:/var/lib/postgresql:Z onlyoffice/documentserver + ExecStart=/bin/touch /var/lib/%N.stamp + + [Install] + WantedBy=multi-user.target + - name: docker.service + enabled: true + - name: fstrim.timer + enabled: true + - name: systemd-oomd.service + enabled: true + - name: rpm-ostree-countme.timer + enabled: false + mask: true +storage: + files: + - path: /etc/zincati/config.d/51-rollout-wariness.toml + contents: + inline: | + [identity] + rollout_wariness = 1 + - path: /etc/zincati/config.d/55-updates-strategy.toml + contents: + inline: | + [updates] + strategy = "periodic" + [updates.periodic] + time_zone = "localtime" + [[updates.periodic.window]] + days = [ "Sun" ] + start_time = "0:00" + length_minutes = 60 + - path: /etc/fail2ban/jail.local + contents: + inline: | + [DEFAULT] + # Maximum 3 failures: + maxentry = 3 + # Ban hosts for ten hour: + bantime = 3600 + # Override /etc/fail2ban/jail.d/00-firewalld.conf: + banaction = iptables-multiport + [sshd] + enabled = true + - path: /etc/tuned/active_profile + overwrite: true + contents: + inline: | + virtual-guest + - path: /etc/tuned/profile_mode + overwrite: true + contents: + inline: | + manual + - path: /etc/systemd/zram-generator.conf + overwrite: true + contents: + inline: | + # This config file enables a /dev/zram0 device with the default settings + [zram0] + zram-fraction = 1 + max-zram-size = 8192 + - path: /etc/security/limits.d/30-disable-coredump.conf + overwrite: true + contents: + inline: | + * hard core 0 + - path: /etc/ssh/ssh_config.d/60-disable-GSSAPI.conf + overwrite: true + contents: + inline: | + GSSAPIAuthentication no + - path: /etc/sysctl.d/20-silence-audit.conf + contents: + inline: | + # Raise console message logging level from DEBUG (7) to WARNING (4) + # so that audit messages don't get interspersed on the console that + # may frustrate a user trying to interactively log in. + kernel.printk=4 + links: + - path: /etc/localtime + target: ../usr/share/zoneinfo/America/New_York + - path: /etc/systemd/system/multi-user.target.wants/tuned.service + target: /usr/lib/systemd/system/tuned.service + - path: /etc/systemd/system/multi-user.target.wants/prelockd.service + target: /usr/lib/systemd/system/prelockd.service + - path: /etc/systemd/system/multi-user.target.wants/fail2ban.service + target: /usr/lib/systemd/system/fail2ban.service + - path: /etc/systemd/system/kdump.service.target + target: /dev/null +kernel_arguments: + should_exist: + - kvm.nx_huge_pages=force + - random.trust_cpu=off + - kernel.dmesg_restrict=1 + - fs.protected_fifos=2 + - fs.protected_regular=2 + - fs.protected_symlinks=1 + - fs.protected_hardlinks=1 + - net.core.bpf_jit_harden=2 + - kernel.kexec_load_disabled=1 + - kernel.kptr_restrict=2 + - vm.mmap_rnd_bits=32 + - vm.mmap_rnd_compat_bits=16 + - kernel.yama.ptrace_scope=2 + - fs.suid_dumpable=0 + - net.ipv4.tcp_rfc1337=1 + - kernel.perf_event_paranoid=3 + - kernel.randomize_va_space=2 + - net.ipv4.icmp_ignore_bogus_error_responses=1 + - net.ipv4.conf.all.log_martians=1 diff --git a/README.md b/README.md index 958f3f9..a26f361 100644 --- a/README.md +++ b/README.md @@ -1,2 +1,8 @@ # Fedora-CoreOS-Ignition -Ignition configurations for Fedora CoreOS +Ignition configurations for Fedora CoreOS
+ +# Notes +1. These are the configs I personally use on my systems. You **MUST** edit the files before you use them. At the very least, you should add your SSH keys or password hash.
+2. These configurations are made with a VPS in mind. You should adapt it for a bare metal deployment if that is what you are using (adding additional kernel parameters, configuring drive encryption, configuring storage, etc). You should also change the tuned profile from `virtual-guest` appropriately. +3. In most of these configs, the timezone is set to `America/New_York` and the automatic reboot time is set at 12 AM on Sunday. Watchtower will kick in 5-10 minutes after the reboot to update and redeploy the containers. You should change it according to your needs. The Docker-Compose.yml file does not include Watchtower. +4. The auto-updater.service could be put in /etc/systemd/system and enable to have automatic updates for your docker-compose and its containers. Please make sure that the WorkingDir is appropriate. diff --git a/auto-updater.service b/auto-updater.service new file mode 100644 index 0000000..e7dead9 --- /dev/null +++ b/auto-updater.service @@ -0,0 +1,15 @@ +[Unit] +Description=Automatic Updater +After=docker.service +Wants=network-online.target +Requires=docker.service + +[Service] +User=root +Group=root +WorkingDirectory=/path/to/docker-compose/directory +ExecStart=/usr/bin/git pull +ExecStart=/usr/bin/docker-compose up -d + +[Install] +WantedBy=multi-user.target