Files
homelab/scripts/README.md
Jordan Ramos eec4c4b298 feat(security): implement template-based credential management for sensitive configurations
Introduce template-based approach to prevent credential exposure in version control.
This security enhancement establishes a standard pattern for managing sensitive data
across the homelab repository.

Changes:
- Create services/homepage/services.yaml.template with env var placeholders
  * Replace 7 hardcoded credentials with ${VARIABLE_NAME} format
  * Add OPNSense, Proxmox, Plex, Radarr, Sonarr, Deluge placeholders
- Create scripts/fix_n8n_db_c_locale.sh.template with env var validation
  * Remove hardcoded PostgreSQL password
  * Add N8N_DB_PASSWORD environment variable requirement
  * Include security reminder to shred script after use
- Update .gitignore with explicit exclusions for sensitive files
  * Add services/homepage/services.yaml exclusion
  * Add scripts/fix_n8n_db_c_locale.sh exclusion
- Create services/homepage/README.md with comprehensive setup guide
  * Document environment variable usage (recommended method)
  * Provide API key acquisition instructions for all services
  * Include troubleshooting and security best practices
- Update scripts/README.md with template pattern documentation
  * Add fix_n8n_db_c_locale.sh template usage instructions
  * Create "Template-Based Script Pattern" section
  * Enhance security guidelines with shred usage

Template Pattern Benefits:
- Repository remains credential-free
- Templates serve as documentation
- Easy to recreate configs on new systems
- Supports CI/CD pipelines with secret injection

Security Validation:
- No API keys in staged files (verified)
- No passwords in staged files (verified)
- .gitignore properly excludes sensitive files
- Templates contain clear usage instructions

Related: n8n troubleshooting (CLAUDE_STATUS.md), Docker Compose migration

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-12-02 19:49:28 -07:00

8.2 KiB

Homelab Infrastructure Scripts

This directory contains operational scripts for maintaining and troubleshooting homelab infrastructure services.

Directory Structure

scripts/
├── README.md                          # This file
├── fix_n8n_db_c_locale.sh.template    # Template for PostgreSQL fix (C.utf8 locale)
├── fix_n8n_db_c_locale.sh             # Active script (excluded from git)
├── fix_n8n_db_permissions.sh          # Legacy PostgreSQL permission fix for n8n
└── crawlers-exporters/                # Data export and migration tools
    ├── export_cf_dns.py               # Cloudflare DNS configuration export
    ├── cloudflare_dns_export.json     # Example DNS records export
    └── cloudflare_full_config.json    # Example full config export

Scripts

fix_n8n_db_permissions.sh

Purpose: Fix PostgreSQL 15+ permission issues for n8n database

Background: PostgreSQL 15+ removed default CREATE permission from the PUBLIC role on the 'public' schema. This breaking change causes n8n database migrations to fail with "permission denied for schema public" errors.

What it does:

  1. Creates timestamped backup of existing n8n database
  2. Drops and recreates database with proper ownership (OWNER n8n_user)
  3. Grants explicit schema permissions for PostgreSQL 15+ compatibility
  4. Tests permissions by creating and dropping a test table
  5. Restarts n8n service and verifies successful startup

Usage:

# Method 1: Set password via environment variable (recommended)
export N8N_DB_PASSWORD='your_password_here'
bash fix_n8n_db_permissions.sh

# Method 2: Edit DB_PASSWORD in script directly
# Edit line 28 to replace YOUR_DB_PASSWORD_HERE with actual password
bash fix_n8n_db_permissions.sh

Requirements:

  • Must run as root
  • PostgreSQL service must be running
  • n8n service must be installed

Output:

  • Database backup: /var/backups/n8n/n8n_db_backup_YYYYMMDD_HHMMSS.sql
  • Log file: /var/log/n8n_db_fix_YYYYMMDD_HHMMSS.log

Expected Runtime: 15-30 seconds

See Also:

  • Complete troubleshooting documentation: /home/jramos/homelab/CLAUDE_STATUS.md (section: "Post-Deployment Troubleshooting")
  • n8n setup documentation: /home/jramos/homelab/n8n/N8N-SETUP-PLAN.md

fix_n8n_db_c_locale.sh (Template-Based)

Purpose: Fix PostgreSQL 15+ permission issues for n8n database with correct Debian 12 locale support

Background:

  • PostgreSQL 15+ removed default CREATE permission from the PUBLIC role
  • Debian 12 minimal LXC containers only have C.utf8 locale available (lowercase)
  • Previous scripts used incorrect locale names (en_US.UTF-8 or C.UTF-8) causing database creation failures

Template-Based Security: This script uses a template approach to avoid committing credentials to git:

  • fix_n8n_db_c_locale.sh.template - Tracked in git (no credentials)
  • fix_n8n_db_c_locale.sh - Active script (excluded from git via .gitignore)

Setup Instructions:

# 1. Copy the template to create your working script
cp fix_n8n_db_c_locale.sh.template fix_n8n_db_c_locale.sh

# 2. Set the database password via environment variable (recommended)
export N8N_DB_PASSWORD='your_secure_password_here'

# 3. Run the script
bash fix_n8n_db_c_locale.sh

# 4. Securely delete the script after use (contains credentials in SQL)
shred -u fix_n8n_db_c_locale.sh

What it does:

  1. Validates that N8N_DB_PASSWORD environment variable is set
  2. Creates timestamped backup of existing n8n database (if exists)
  3. Drops and recreates database with:
    • Locale: C.utf8 (matches Debian 12 minimal system)
    • Owner: n8n_user
    • Encoding: UTF8
  4. Grants PostgreSQL 15+ required permissions:
    • GRANT ALL ON SCHEMA public TO n8n_user
    • GRANT CREATE ON SCHEMA public TO n8n_user
  5. Tests permissions by creating/dropping a test table
  6. Restarts n8n service and verifies successful startup

Requirements:

  • Must run as root (or with sudo)
  • PostgreSQL service must be running
  • n8n service must be installed
  • N8N_DB_PASSWORD environment variable must be set

Output:

  • Log file: /var/log/n8n_db_fix_YYYYMMDD_HHMMSS.log
  • Database settings verification in log output

Expected Runtime: 20-40 seconds

Security Notes:

  • Always use environment variables for credentials (never hardcode)
  • The script contains the password in embedded SQL - delete after use
  • Use shred -u instead of rm to securely delete the file
  • The template file is safe to commit (contains no credentials)

Differences from fix_n8n_db_permissions.sh:

  • Uses C.utf8 locale instead of en_US.UTF-8
  • Validates environment variable is set before running
  • Designed for Debian 12 minimal LXC containers
  • Includes reminder to delete script after use

See Also:

  • Complete troubleshooting documentation: /home/jramos/homelab/CLAUDE_STATUS.md
  • n8n setup documentation: /home/jramos/homelab/n8n/N8N-SETUP-PLAN.md
  • PostgreSQL 15 breaking changes: Release Notes

export_cf_dns.py

Purpose: Export Cloudflare DNS configuration and zone settings for backup or migration

What it does:

  1. Fetches all DNS records from specified Cloudflare zone (with pagination support)
  2. Retrieves key zone settings (SSL mode, TLS version, websockets, etc.)
  3. Exports combined configuration to JSON file
  4. Provides clean, structured output for infrastructure-as-code workflows

Usage:

# Method 1: Set credentials via environment variables (recommended)
export CF_ZONE_ID='your_zone_id_here'
export CF_API_TOKEN='your_api_token_here'
python3 export_cf_dns.py

# Method 2: Edit credentials in script directly
# Edit lines 7-8 to replace placeholders with actual credentials
python3 export_cf_dns.py

Requirements:

  • Python 3.6+
  • requests library: pip install requests
  • Cloudflare API token with Zone:Read permissions
  • Cloudflare Zone ID for the target domain

Output:

  • cloudflare_full_config.json - Combined DNS records and zone settings

Example Output Structure:

{
  "metadata": {
    "zone_id": "abc123...",
    "export_date": "Now"
  },
  "zone_settings": {
    "ssl": "strict",
    "always_use_https": "on",
    "min_tls_version": "1.2",
    "websockets": "on"
  },
  "dns_records": [
    {
      "name": "example.com",
      "type": "A",
      "content": "192.168.1.1",
      "proxied": true,
      "ttl": 1
    }
  ]
}

Use Cases:

  • Backup DNS configuration before major changes
  • Document current DNS state for disaster recovery
  • Export for migration to another Cloudflare account
  • Generate infrastructure-as-code templates

Security Notes

Template-Based Script Pattern

This repository uses a template-based approach for scripts containing sensitive data:

  1. Template files (.template extension): Tracked in git, contain placeholder variables
  2. Active scripts: Excluded from git via .gitignore, contain actual credentials

Workflow:

# Copy template to create working script
cp script_name.sh.template script_name.sh

# Set credentials via environment variables
export VARIABLE_NAME='actual_value'

# Run the script
bash script_name.sh

# Securely delete after use
shred -u script_name.sh  # Overwrites and deletes

Benefits:

  • Repository stays credential-free
  • Templates serve as documentation
  • Easy to recreate scripts when needed
  • Supports version control of script logic without exposing secrets

General Security Guidelines

  • Scripts in this directory may require credentials to be set via environment variables
  • Never commit scripts containing plaintext passwords to version control
  • Use .gitignore to exclude credential-containing variants
  • Delete or shred scripts with embedded credentials after use
  • Always use shred -u instead of rm for files containing credentials
  • Prefer environment variables over hardcoded credentials
  • Use dedicated service accounts with minimal permissions

Contributing

When adding new scripts:

  1. Include comprehensive header comments explaining purpose and usage
  2. Parameterize credentials (use environment variables or prompts)
  3. Add error handling and logging
  4. Document in this README
  5. Follow bash best practices (set -euo pipefail, quote variables, etc.)