- Add SECURITY.md policy with credential management, Docker security, SSL/TLS guidance - Add security audit report (2025-12-20) with 31 findings across 4 severity levels - Add pre-deployment security checklist template - Update CLAUDE_STATUS.md with security audit initiative - Expand services/README.md with comprehensive security sections - Add script validation report and container name fix guide Audit identified 6 CRITICAL, 3 HIGH, 2 MEDIUM findings 4-phase remediation roadmap created (estimated 6-13 min downtime) All security scripts validated and ready for execution Related: Security Audit Q4 2025, CRITICAL-001 through CRITICAL-006 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
Homelab Infrastructure Scripts
This directory contains operational scripts for maintaining and troubleshooting homelab infrastructure services.
Directory Structure
scripts/
├── README.md # This file
├── fix_n8n_db_c_locale.sh.template # Template for PostgreSQL fix (C.utf8 locale)
├── fix_n8n_db_c_locale.sh # Active script (excluded from git)
├── fix_n8n_db_permissions.sh # Legacy PostgreSQL permission fix for n8n
└── crawlers-exporters/ # Data export and migration tools
├── export_cf_dns.py # Cloudflare DNS configuration export
├── cloudflare_dns_export.json # Example DNS records export
└── cloudflare_full_config.json # Example full config export
Scripts
fix_n8n_db_permissions.sh
Purpose: Fix PostgreSQL 15+ permission issues for n8n database
Background: PostgreSQL 15+ removed default CREATE permission from the PUBLIC role on the 'public' schema. This breaking change causes n8n database migrations to fail with "permission denied for schema public" errors.
What it does:
- Creates timestamped backup of existing n8n database
- Drops and recreates database with proper ownership (
OWNER n8n_user) - Grants explicit schema permissions for PostgreSQL 15+ compatibility
- Tests permissions by creating and dropping a test table
- Restarts n8n service and verifies successful startup
Usage:
# Method 1: Set password via environment variable (recommended)
export N8N_DB_PASSWORD='your_password_here'
bash fix_n8n_db_permissions.sh
# Method 2: Edit DB_PASSWORD in script directly
# Edit line 28 to replace YOUR_DB_PASSWORD_HERE with actual password
bash fix_n8n_db_permissions.sh
Requirements:
- Must run as root
- PostgreSQL service must be running
- n8n service must be installed
Output:
- Database backup:
/var/backups/n8n/n8n_db_backup_YYYYMMDD_HHMMSS.sql - Log file:
/var/log/n8n_db_fix_YYYYMMDD_HHMMSS.log
Expected Runtime: 15-30 seconds
See Also:
- Complete troubleshooting documentation:
/home/jramos/homelab/CLAUDE_STATUS.md(section: "Post-Deployment Troubleshooting") - n8n setup documentation:
/home/jramos/homelab/n8n/N8N-SETUP-PLAN.md
fix_n8n_db_c_locale.sh (Template-Based)
Purpose: Fix PostgreSQL 15+ permission issues for n8n database with correct Debian 12 locale support
Background:
- PostgreSQL 15+ removed default CREATE permission from the PUBLIC role
- Debian 12 minimal LXC containers only have
C.utf8locale available (lowercase) - Previous scripts used incorrect locale names (
en_US.UTF-8orC.UTF-8) causing database creation failures
Template-Based Security: This script uses a template approach to avoid committing credentials to git:
fix_n8n_db_c_locale.sh.template- Tracked in git (no credentials)fix_n8n_db_c_locale.sh- Active script (excluded from git via .gitignore)
Setup Instructions:
# 1. Copy the template to create your working script
cp fix_n8n_db_c_locale.sh.template fix_n8n_db_c_locale.sh
# 2. Set the database password via environment variable (recommended)
export N8N_DB_PASSWORD='your_secure_password_here'
# 3. Run the script
bash fix_n8n_db_c_locale.sh
# 4. Securely delete the script after use (contains credentials in SQL)
shred -u fix_n8n_db_c_locale.sh
What it does:
- Validates that N8N_DB_PASSWORD environment variable is set
- Creates timestamped backup of existing n8n database (if exists)
- Drops and recreates database with:
- Locale:
C.utf8(matches Debian 12 minimal system) - Owner:
n8n_user - Encoding:
UTF8
- Locale:
- Grants PostgreSQL 15+ required permissions:
GRANT ALL ON SCHEMA public TO n8n_userGRANT CREATE ON SCHEMA public TO n8n_user
- Tests permissions by creating/dropping a test table
- Restarts n8n service and verifies successful startup
Requirements:
- Must run as root (or with sudo)
- PostgreSQL service must be running
- n8n service must be installed
- N8N_DB_PASSWORD environment variable must be set
Output:
- Log file:
/var/log/n8n_db_fix_YYYYMMDD_HHMMSS.log - Database settings verification in log output
Expected Runtime: 20-40 seconds
Security Notes:
- Always use environment variables for credentials (never hardcode)
- The script contains the password in embedded SQL - delete after use
- Use
shred -uinstead ofrmto securely delete the file - The template file is safe to commit (contains no credentials)
Differences from fix_n8n_db_permissions.sh:
- Uses
C.utf8locale instead ofen_US.UTF-8 - Validates environment variable is set before running
- Designed for Debian 12 minimal LXC containers
- Includes reminder to delete script after use
See Also:
- Complete troubleshooting documentation:
/home/jramos/homelab/CLAUDE_STATUS.md - n8n setup documentation:
/home/jramos/homelab/n8n/N8N-SETUP-PLAN.md - PostgreSQL 15 breaking changes: Release Notes
export_cf_dns.py
Purpose: Export Cloudflare DNS configuration and zone settings for backup or migration
What it does:
- Fetches all DNS records from specified Cloudflare zone (with pagination support)
- Retrieves key zone settings (SSL mode, TLS version, websockets, etc.)
- Exports combined configuration to JSON file
- Provides clean, structured output for infrastructure-as-code workflows
Usage:
# Method 1: Set credentials via environment variables (recommended)
export CF_ZONE_ID='your_zone_id_here'
export CF_API_TOKEN='your_api_token_here'
python3 export_cf_dns.py
# Method 2: Edit credentials in script directly
# Edit lines 7-8 to replace placeholders with actual credentials
python3 export_cf_dns.py
Requirements:
- Python 3.6+
requestslibrary:pip install requests- Cloudflare API token with Zone:Read permissions
- Cloudflare Zone ID for the target domain
Output:
cloudflare_full_config.json- Combined DNS records and zone settings
Example Output Structure:
{
"metadata": {
"zone_id": "abc123...",
"export_date": "Now"
},
"zone_settings": {
"ssl": "strict",
"always_use_https": "on",
"min_tls_version": "1.2",
"websockets": "on"
},
"dns_records": [
{
"name": "example.com",
"type": "A",
"content": "192.168.1.1",
"proxied": true,
"ttl": 1
}
]
}
Use Cases:
- Backup DNS configuration before major changes
- Document current DNS state for disaster recovery
- Export for migration to another Cloudflare account
- Generate infrastructure-as-code templates
Security Notes
Template-Based Script Pattern
This repository uses a template-based approach for scripts containing sensitive data:
- Template files (
.templateextension): Tracked in git, contain placeholder variables - Active scripts: Excluded from git via
.gitignore, contain actual credentials
Workflow:
# Copy template to create working script
cp script_name.sh.template script_name.sh
# Set credentials via environment variables
export VARIABLE_NAME='actual_value'
# Run the script
bash script_name.sh
# Securely delete after use
shred -u script_name.sh # Overwrites and deletes
Benefits:
- Repository stays credential-free
- Templates serve as documentation
- Easy to recreate scripts when needed
- Supports version control of script logic without exposing secrets
General Security Guidelines
- Scripts in this directory may require credentials to be set via environment variables
- Never commit scripts containing plaintext passwords to version control
- Use
.gitignoreto exclude credential-containing variants - Delete or shred scripts with embedded credentials after use
- Always use
shred -uinstead ofrmfor files containing credentials - Prefer environment variables over hardcoded credentials
- Use dedicated service accounts with minimal permissions
Contributing
When adding new scripts:
- Include comprehensive header comments explaining purpose and usage
- Parameterize credentials (use environment variables or prompts)
- Add error handling and logging
- Document in this README
- Follow bash best practices (set -euo pipefail, quote variables, etc.)