0c736c7295
Enforce HTTPS for all downloads to eliminate security vulnerabilities
...
- Convert 16 HTTP URLs to HTTPS across 3 critical scripts
- Dell OMSA script: Ubuntu archive and Dell repository URLs now use HTTPS
- Proxmox legacy script: Download URLs converted to secure connections
- SSL stack script: Apache source URLs updated to official archive
- Update documentation to reflect resolved security issues
- Mark HTTPS enforcement as completed in todo lists
This addresses the second critical security concern from the security review,
eliminating man-in-the-middle attack vectors during package downloads.
🤖 Generated with [Claude Code](https://claude.ai/code )
Co-Authored-By: Claude <noreply@anthropic.com >
2025-07-14 09:22:32 -05:00
6609d7d9e3
sigh.
2025-07-11 11:52:28 -05:00
0588b2dd60
ifdev for dev boxes, they have less hardened ssh config because vscode remote etc
2025-07-11 11:48:53 -05:00
ba8efdfa0b
more ntp fixes
2025-07-02 21:08:39 -05:00
f2dc2ce29e
automation. no prompts!
2025-07-02 18:52:43 -05:00
d1ef7118d5
debian fails... let's see if this fixes it.
2025-07-02 18:47:21 -05:00
160d1b26cc
fixed in ubuntu. will test on debian next.
2025-07-02 18:44:46 -05:00
ce5bb0be6f
.
2025-07-02 18:43:18 -05:00
ce1bf7d220
i think this is right...
2025-07-02 18:41:58 -05:00
0175a00458
got to handle the other condition...
2025-07-02 18:25:31 -05:00
0f52d19229
remove debugging
2025-07-02 18:21:56 -05:00
0937036155
had inverse logic. fixed. still shouldn't have caused script to error though... hmm...
2025-07-02 18:15:03 -05:00
02a874f713
.
2025-07-02 18:10:47 -05:00
259a4f07b7
got further . hmm...
2025-07-02 18:09:06 -05:00
f06d8b1fe5
ok. i think this is the last of the regressions.
2025-07-02 18:06:26 -05:00
d76613c0dc
.
2025-07-02 18:00:01 -05:00
5deaecd79f
.
2025-07-02 17:57:44 -05:00
c58c3f116e
.
2025-07-02 17:55:56 -05:00
e4e1c66111
.
2025-07-02 17:52:14 -05:00
d60c03b116
some more resillience
2025-07-02 17:45:56 -05:00
6cdc7bbba7
this code is going to be quite resillient when done..
2025-07-02 17:43:17 -05:00
8669b64adc
i think this should fix ntp/smtp based on my testing. now to e2e test.
2025-07-02 17:40:01 -05:00
1e3c7a97af
.
2025-07-02 17:11:06 -05:00
3207f1a870
.
2025-07-02 17:03:46 -05:00
0041e95d59
.
2025-07-02 17:02:29 -05:00
c476f84943
.
2025-07-02 16:59:50 -05:00
38b779f054
OAM final push. graph all the things!
2025-07-02 16:50:45 -05:00
197d8e2d27
ubuntu bug workaround
2025-07-02 12:23:31 -05:00
7457db098f
.
2025-07-02 08:15:55 -05:00
109acf07be
.
2025-07-02 08:14:06 -05:00
86cded93c5
.
2025-07-02 08:11:26 -05:00
ce45ec1684
.
2025-07-02 08:08:16 -05:00
15074a99f4
.
2025-07-02 08:07:45 -05:00
982389fb63
.
2025-07-02 07:56:53 -05:00
ede6aa0562
no more curl
2025-07-02 07:54:13 -05:00
89ac84c4e1
final bits of security hardening as i pivot back to finishing monitoring/alerting OAM bits. next week will be all the security.
2025-07-02 07:46:55 -05:00
5eb2f6b3d5
path issues again.
2025-07-02 07:43:59 -05:00
a38eac2e77
more path fixes
2025-07-01 20:09:49 -05:00
80dd021217
found a bug
2025-07-01 20:00:53 -05:00
4e3368156c
so close now
2025-06-30 14:45:10 -05:00
46020fecf5
weird one...
2025-06-30 14:41:58 -05:00
c77d932dd2
moving along nicely...
2025-06-30 14:37:37 -05:00
363c845ead
almost...
2025-06-30 14:33:24 -05:00
df7f369f8c
I think this is it...
2025-06-30 14:30:49 -05:00
1887920f52
.
2025-06-30 14:27:56 -05:00
c1791eaa43
paths....
2025-06-30 14:25:13 -05:00
94eed1ab9d
lets see what breaks...
2025-06-30 14:22:43 -05:00
55178257ef
OAM. librenms agent stuff.
2025-06-30 13:53:41 -05:00
0773dcb372
.
2025-06-30 13:30:35 -05:00
6e6a57f61b
D.R.Y.
2025-06-30 13:28:13 -05:00