]> Nutra Git (v1) - nutratech/vps-root.git/commitdiff
[dev filter] encrypt & re-add
authorShane Jaroch <chown_tee@proton.me>
Sat, 27 Dec 2025 19:15:22 +0000 (14:15 -0500)
committerShane Jaroch <chown_tee@proton.me>
Sat, 27 Dec 2025 20:49:40 +0000 (15:49 -0500)
20 files changed:
.git-crypt/.gitattributes [new file with mode: 0644]
.git-crypt/keys/default/0/A203106C7B035A2793076ADBC96CF8D69243BDFD.gpg [new file with mode: 0644]
.git-crypt/keys/default/0/C5235971BD1493F85AFA66E3CC4EBE9F2784B4AD.gpg [new file with mode: 0644]
.git-crypt/keys/default/0/C6662F132E169C4802627B1ECDBCCB44A608363E.gpg [new file with mode: 0644]
.gitattributes [new file with mode: 0644]
etc/letsencrypt/options-ssl-nginx.conf [new file with mode: 0644]
etc/matrix-synapse/homeserver.signing.key [new file with mode: 0644]
etc/matrix-synapse/homeserver.yaml [new file with mode: 0644]
etc/nginx/conf.d/default.conf
etc/nginx/conf.d/secrets.conf [new file with mode: 0644]
etc/nutra.env [new file with mode: 0644]
etc/postfix/main.cf
etc/postgresql/14/main/pg_hba.conf
etc/postgresql/14/main/postgresql.conf
etc/ssh/sshd_config [new file with mode: 0644]
etc/sudoers [new file with mode: 0644]
etc/sudoers.d/private-rules [new file with mode: 0644]
etc/systemd/system/ghrunner.service
etc/systemd/system/minio.service
etc/systemd/system/ntserv.service

diff --git a/.git-crypt/.gitattributes b/.git-crypt/.gitattributes
new file mode 100644 (file)
index 0000000..665b10e
--- /dev/null
@@ -0,0 +1,4 @@
+# Do not edit this file.  To specify the files to encrypt, create your own
+# .gitattributes file in the directory where your files are.
+* !filter !diff
+*.gpg binary
diff --git a/.git-crypt/keys/default/0/A203106C7B035A2793076ADBC96CF8D69243BDFD.gpg b/.git-crypt/keys/default/0/A203106C7B035A2793076ADBC96CF8D69243BDFD.gpg
new file mode 100644 (file)
index 0000000..8dc34b1
Binary files /dev/null and b/.git-crypt/keys/default/0/A203106C7B035A2793076ADBC96CF8D69243BDFD.gpg differ
diff --git a/.git-crypt/keys/default/0/C5235971BD1493F85AFA66E3CC4EBE9F2784B4AD.gpg b/.git-crypt/keys/default/0/C5235971BD1493F85AFA66E3CC4EBE9F2784B4AD.gpg
new file mode 100644 (file)
index 0000000..1c266d9
Binary files /dev/null and b/.git-crypt/keys/default/0/C5235971BD1493F85AFA66E3CC4EBE9F2784B4AD.gpg differ
diff --git a/.git-crypt/keys/default/0/C6662F132E169C4802627B1ECDBCCB44A608363E.gpg b/.git-crypt/keys/default/0/C6662F132E169C4802627B1ECDBCCB44A608363E.gpg
new file mode 100644 (file)
index 0000000..d56a8a9
Binary files /dev/null and b/.git-crypt/keys/default/0/C6662F132E169C4802627B1ECDBCCB44A608363E.gpg differ
diff --git a/.gitattributes b/.gitattributes
new file mode 100644 (file)
index 0000000..079d43c
--- /dev/null
@@ -0,0 +1,8 @@
+etc/matrix-synapse/homeserver.yaml filter=git-crypt diff=git-crypt
+etc/matrix-synapse/homeserver.signing.key filter=git-crypt diff=git-crypt
+etc/nutra.env filter=git-crypt diff=git-crypt
+etc/nginx/conf.d/secrets.conf filter=git-crypt diff=git-crypt
+etc/postgresql/**/*.conf filter=git-crypt diff=git-crypt
+etc/postgresql/**/pg_hba.conf filter=git-crypt diff=git-crypt
+etc/systemd/system/*.service filter=git-crypt diff=git-crypt
+etc/postfix/main.cf filter=git-crypt diff=git-crypt
diff --git a/etc/letsencrypt/options-ssl-nginx.conf b/etc/letsencrypt/options-ssl-nginx.conf
new file mode 100644 (file)
index 0000000..a4cea14
--- /dev/null
@@ -0,0 +1,14 @@
+# This file contains important security parameters. If you modify this file
+# manually, Certbot will be unable to automatically provide future security
+# updates. Instead, Certbot will print and log an error message with a path to
+# the up-to-date file that you will need to refer to when manually updating
+# this file. Contents are based on https://ssl-config.mozilla.org
+
+ssl_session_cache shared:le_nginx_SSL:10m;
+ssl_session_timeout 1440m;
+ssl_session_tickets off;
+
+ssl_protocols TLSv1.2 TLSv1.3;
+ssl_prefer_server_ciphers on;
+
+ssl_ciphers "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-SHA";
diff --git a/etc/matrix-synapse/homeserver.signing.key b/etc/matrix-synapse/homeserver.signing.key
new file mode 100644 (file)
index 0000000..dd76cf1
Binary files /dev/null and b/etc/matrix-synapse/homeserver.signing.key differ
diff --git a/etc/matrix-synapse/homeserver.yaml b/etc/matrix-synapse/homeserver.yaml
new file mode 100644 (file)
index 0000000..39052f5
Binary files /dev/null and b/etc/matrix-synapse/homeserver.yaml differ
index caa0d3173688b88148ff8087184fe1b5e1d62f9f..68b154b628aa054a7cabb43917f23e40f37c542d 100644 (file)
@@ -23,7 +23,8 @@ server {
     proxy_request_buffering off;
     proxy_buffering off;
     # Proxy forwarding (password configured in app.config.FORWARDED_SECRET)
-    proxy_set_header forwarded "$proxy_forwarded;secret=\"REDACTED\"";
+    # and stored in: /etc/nginx/conf.d/secrets.conf
+    proxy_set_header forwarded "$proxy_forwarded;secret=\"$proxy_secret_key\"";
     # Allow websockets and keep-alive (avoid connection: close)
     proxy_set_header connection "upgrade";
     proxy_set_header upgrade $http_upgrade;
diff --git a/etc/nginx/conf.d/secrets.conf b/etc/nginx/conf.d/secrets.conf
new file mode 100644 (file)
index 0000000..b8928ab
Binary files /dev/null and b/etc/nginx/conf.d/secrets.conf differ
diff --git a/etc/nutra.env b/etc/nutra.env
new file mode 100644 (file)
index 0000000..8a237c5
Binary files /dev/null and b/etc/nutra.env differ
index f904ecdc6d7233f364ada8c5a8b591f37bef3b63..e2d7e9a9f3154a07295c15452eb233bb8625d069 100644 (file)
Binary files a/etc/postfix/main.cf and b/etc/postfix/main.cf differ
index ac32ace12c416de93d244aa7b2182fac6eaf19cd..07a0d76b8ebd034cb1de35be635b711014bc60de 100644 (file)
Binary files a/etc/postgresql/14/main/pg_hba.conf and b/etc/postgresql/14/main/pg_hba.conf differ
index 28fcb9c91199d5928fe42b98513152b942d770de..e5df3abd23294649a71fecc8a1aa2bf8a89fcaea 100644 (file)
Binary files a/etc/postgresql/14/main/postgresql.conf and b/etc/postgresql/14/main/postgresql.conf differ
diff --git a/etc/ssh/sshd_config b/etc/ssh/sshd_config
new file mode 100644 (file)
index 0000000..6c4d755
Binary files /dev/null and b/etc/ssh/sshd_config differ
diff --git a/etc/sudoers b/etc/sudoers
new file mode 100644 (file)
index 0000000..1384373
--- /dev/null
@@ -0,0 +1,54 @@
+#
+# This file MUST be edited with the 'visudo' command as root.
+#
+# Please consider adding local content in /etc/sudoers.d/ instead of
+# directly modifying this file.
+#
+# See the man page for details on how to write a sudoers file.
+#
+Defaults       env_reset
+Defaults       mail_badpass
+Defaults       secure_path="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin"
+Defaults       use_pty
+
+# This preserves proxy settings from user environments of root
+# equivalent users (group sudo)
+#Defaults:%sudo env_keep += "http_proxy https_proxy ftp_proxy all_proxy no_proxy"
+
+# This allows running arbitrary commands, but so does ALL, and it means
+# different sudoers have their choice of editor respected.
+#Defaults:%sudo env_keep += "EDITOR"
+
+# Completely harmless preservation of a user preference.
+#Defaults:%sudo env_keep += "GREP_COLOR"
+
+# While you shouldn't normally run git as root, you need to with etckeeper
+#Defaults:%sudo env_keep += "GIT_AUTHOR_* GIT_COMMITTER_*"
+
+# Per-user preferences; root won't have sensible values for them.
+#Defaults:%sudo env_keep += "EMAIL DEBEMAIL DEBFULLNAME"
+
+# "sudo scp" or "sudo rsync" should be able to use your SSH agent.
+#Defaults:%sudo env_keep += "SSH_AGENT_PID SSH_AUTH_SOCK"
+
+# Ditto for GPG agent
+#Defaults:%sudo env_keep += "GPG_AGENT_INFO"
+
+# Host alias specification
+
+# User alias specification
+
+# Cmnd alias specification
+
+# User privilege specification
+root   ALL=(ALL:ALL) ALL
+
+# Members of the admin group may gain root privileges
+%admin ALL=(ALL) ALL
+
+# Allow members of group sudo to execute any command
+%sudo  ALL=(ALL:ALL) ALL
+
+# See sudoers(5) for more information on "@include" directives:
+
+@includedir /etc/sudoers.d
diff --git a/etc/sudoers.d/private-rules b/etc/sudoers.d/private-rules
new file mode 100644 (file)
index 0000000..82580c6
--- /dev/null
@@ -0,0 +1,4 @@
+# Allow GitHub action to restart systemctl without entering password
+#shane ALL = NOPASSWD: /bin/systemctl
+github ALL = NOPASSWD: /bin/systemctl
+
index 07d5f66f6f9959481fd495a5e8f73408d67faef5..5dfdc0705987e743e0a6c1fa44ede830879c49b1 100644 (file)
Binary files a/etc/systemd/system/ghrunner.service and b/etc/systemd/system/ghrunner.service differ
index d63a30029a6565c4f50e4311ad44383e41846151..2fb4578c658563e051c2761e4751046dc7e24ac4 100644 (file)
Binary files a/etc/systemd/system/minio.service and b/etc/systemd/system/minio.service differ
index ad798eee14de50e213c477a10cc1249e04aa6888..1d3ef9d6a5d732fd025b1ec5a08c2d55fc8164ce 100644 (file)
Binary files a/etc/systemd/system/ntserv.service and b/etc/systemd/system/ntserv.service differ