feat: Major directory reorganization and cleanup

Reorganized project structure for better maintainability and reduced
disk usage by 95.9% (11 GB -> 451 MB).

Directory Reorganization (85% reduction in root files):
- Created docs/ with subdirectories (deployment, testing, database, etc.)
- Created infrastructure/vpn-configs/ for VPN scripts
- Moved 90+ files from root to organized locations
- Archived obsolete documentation (context system, offline mode, zombie debugging)
- Moved all test files to tests/ directory
- Root directory: 119 files -> 18 files

Disk Cleanup (10.55 GB recovered):
- Deleted Rust build artifacts: 9.6 GB (target/ directories)
- Deleted Python virtual environments: 161 MB (venv/ directories)
- Deleted Python cache: 50 KB (__pycache__/)

New Structure:
- docs/ - All documentation organized by category
- docs/archives/ - Obsolete but preserved documentation
- infrastructure/ - VPN configs and SSH setup
- tests/ - All test files consolidated
- logs/ - Ready for future logs

Benefits:
- Cleaner root directory (18 vs 119 files)
- Logical organization of documentation
- 95.9% disk space reduction
- Faster navigation and discovery
- Better portability (build artifacts excluded)

Build artifacts can be regenerated:
- Rust: cargo build --release (5-15 min per project)
- Python: pip install -r requirements.txt (2-3 min)

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
This commit is contained in:
2026-01-18 20:42:28 -07:00
parent 89e5118306
commit 06f7617718
96 changed files with 54 additions and 2639 deletions

View File

@@ -0,0 +1,55 @@
# Manual route configuration for PST VPN
# Run this if auto-route setup fails or after manual rasdial connection
$remoteNetwork = "192.168.0.0"
$subnetMask = "255.255.255.0"
Write-Host "Finding VPN interface..." -ForegroundColor Cyan
# Find the L2TP VPN interface (appears as PPP adapter)
$vpnInterface = Get-NetAdapter | Where-Object {
($_.InterfaceAlias -eq "PST-NW-VPN" -or
$_.InterfaceDescription -eq "PST-NW-VPN" -or
$_.InterfaceDescription -like "*PPP*") -and
$_.Status -eq "Up"
} | Select-Object -First 1
if (-not $vpnInterface) {
Write-Host "[ERROR] VPN interface not found!" -ForegroundColor Red
Write-Host "Make sure you're connected to the VPN first:" -ForegroundColor Yellow
Write-Host ' rasdial "PST-NW-VPN"' -ForegroundColor Gray
exit 1
}
Write-Host "[OK] Found VPN interface: $($vpnInterface.InterfaceAlias) (Index: $($vpnInterface.InterfaceIndex))" -ForegroundColor Green
# Remove existing route (if any)
Write-Host "Removing old route (if exists)..." -ForegroundColor Cyan
route delete $remoteNetwork 2>$null | Out-Null
# Add new route
Write-Host "Adding route: $remoteNetwork mask $subnetMask" -ForegroundColor Cyan
$routeCmd = "route add $remoteNetwork mask $subnetMask 0.0.0.0 if $($vpnInterface.InterfaceIndex) metric 1"
cmd /c $routeCmd
if ($LASTEXITCODE -eq 0) {
Write-Host "[OK] Route added successfully!" -ForegroundColor Green
# Show the route
Write-Host "`nRoute details:" -ForegroundColor Cyan
route print | Select-String $remoteNetwork
# Test connectivity
Write-Host "`nTesting connectivity to remote network..." -ForegroundColor Cyan
Write-Host "Pinging 192.168.0.2..." -ForegroundColor Gray
ping 192.168.0.2 -n 2
}
else {
Write-Host "[ERROR] Failed to add route!" -ForegroundColor Red
Write-Host "Try running as Administrator" -ForegroundColor Yellow
}
Write-Host "`nTo make this route persistent across reboots:" -ForegroundColor Yellow
Write-Host " route add $remoteNetwork mask $subnetMask 0.0.0.0 if $($vpnInterface.InterfaceIndex) metric 1 -p" -ForegroundColor Gray
Write-Host "`nNote: For VPN connections, auto-route on connect is better than persistent routes." -ForegroundColor Gray

View File

@@ -0,0 +1,134 @@
# Troubleshoot and fix PST VPN authentication
# Run as Administrator
Write-Host "PST VPN Authentication Troubleshooter" -ForegroundColor Cyan
Write-Host "======================================`n" -ForegroundColor Cyan
$vpnName = "PST-NW-VPN"
# Check if running as admin
$isAdmin = ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)
if (-not $isAdmin) {
Write-Host "[ERROR] Must run as Administrator!" -ForegroundColor Red
pause
exit 1
}
# Get current VPN settings
Write-Host "Current VPN Configuration:" -ForegroundColor Yellow
$vpn = Get-VpnConnection -Name $vpnName -AllUserConnection -ErrorAction SilentlyContinue
if (-not $vpn) {
Write-Host "[ERROR] VPN connection '$vpnName' not found!" -ForegroundColor Red
Write-Host "Run Setup-PST-L2TP-VPN.ps1 first" -ForegroundColor Yellow
pause
exit 1
}
Write-Host " Server: $($vpn.ServerAddress)" -ForegroundColor Gray
Write-Host " Tunnel Type: $($vpn.TunnelType)" -ForegroundColor Gray
Write-Host " Auth Method: $($vpn.AuthenticationMethod -join ', ')" -ForegroundColor Gray
Write-Host " Encryption: $($vpn.EncryptionLevel)" -ForegroundColor Gray
Write-Host " Split Tunnel: $($vpn.SplitTunneling)" -ForegroundColor Gray
# Check authentication settings
Write-Host "`nChecking authentication settings..." -ForegroundColor Yellow
# For UniFi, we need to ensure proper authentication
Write-Host "Configuring authentication for UniFi L2TP..." -ForegroundColor Cyan
try {
# Remove and recreate with correct settings
Write-Host "Reconfiguring VPN with UniFi-compatible settings..." -ForegroundColor Gray
Remove-VpnConnection -Name $vpnName -AllUserConnection -Force -ErrorAction SilentlyContinue
# Create with PAP or CHAP (UniFi may require these instead of MSChapv2)
Add-VpnConnection `
-Name $vpnName `
-ServerAddress "64.139.88.249" `
-TunnelType L2tp `
-EncryptionLevel Optional `
-AuthenticationMethod Chap,MSChapv2 `
-L2tpPsk "rrClvnmUeXEFo90Ol+z7tfsAZHeSK6w7" `
-AllUserConnection `
-RememberCredential `
-SplitTunneling $true `
-Force
Write-Host "[OK] VPN recreated with CHAP + MSChapv2 authentication" -ForegroundColor Green
# Configure IPsec
Set-VpnConnectionIPsecConfiguration `
-ConnectionName $vpnName `
-AuthenticationTransformConstants SHA256128 `
-CipherTransformConstants AES128 `
-EncryptionMethod AES128 `
-IntegrityCheckMethod SHA256 `
-DHGroup Group14 `
-PfsGroup None `
-Force `
-ErrorAction SilentlyContinue
Write-Host "[OK] IPsec configuration updated" -ForegroundColor Green
}
catch {
Write-Host "[WARNING] Configuration update had issues: $_" -ForegroundColor Yellow
}
# Test connection
Write-Host "`nTesting connection..." -ForegroundColor Yellow
Write-Host "Username: pst-admin" -ForegroundColor Gray
Write-Host "Attempting to connect..." -ForegroundColor Gray
$result = cmd /c 'rasdial "PST-NW-VPN" pst-admin "24Hearts$"' 2>&1
if ($LASTEXITCODE -eq 0) {
Write-Host "`n[SUCCESS] Connection successful!" -ForegroundColor Green
Start-Sleep -Seconds 2
# Show connection status
rasdial
# Disconnect
Write-Host "`nDisconnecting..." -ForegroundColor Gray
rasdial "PST-NW-VPN" /disconnect | Out-Null
}
else {
Write-Host "`n[FAILED] Connection still failing" -ForegroundColor Red
Write-Host "Error: $result" -ForegroundColor Gray
Write-Host "`n=== TROUBLESHOOTING STEPS ===" -ForegroundColor Yellow
Write-Host ""
Write-Host "1. Verify credentials on UniFi server:" -ForegroundColor White
Write-Host " - Login to UniFi controller" -ForegroundColor Gray
Write-Host " - Settings > VPN > L2TP Remote Access VPN" -ForegroundColor Gray
Write-Host " - Check that user 'pst-admin' exists with correct password" -ForegroundColor Gray
Write-Host ""
Write-Host "2. Check UniFi VPN server settings:" -ForegroundColor White
Write-Host " - Ensure L2TP VPN is enabled" -ForegroundColor Gray
Write-Host " - Verify pre-shared key matches: rrClvnmUeXEFo90Ol+z7tfsAZHeSK6w7" -ForegroundColor Gray
Write-Host " - Check authentication methods allowed (CHAP/MSChapv2)" -ForegroundColor Gray
Write-Host ""
Write-Host "3. Verify network connectivity:" -ForegroundColor White
Write-Host " - Can you reach the server? Run: ping 64.139.88.249" -ForegroundColor Gray
Write-Host " - Check if ports are open: UDP 500, 1701, 4500" -ForegroundColor Gray
Write-Host ""
Write-Host "4. Try alternative authentication:" -ForegroundColor White
Write-Host " - The server may require PAP authentication" -ForegroundColor Gray
Write-Host " - Try enabling PAP in Windows (see below)" -ForegroundColor Gray
Write-Host ""
Write-Host "5. Registry fix for PAP (if needed):" -ForegroundColor White
Write-Host " Run: rasphone -d `"PST-NW-VPN`"" -ForegroundColor Gray
Write-Host " Security tab > Advanced > Check 'Allow these protocols:'" -ForegroundColor Gray
Write-Host " Enable: 'Unencrypted password (PAP)' and 'Challenge Handshake (CHAP)'" -ForegroundColor Gray
Write-Host ""
Write-Host "6. Common UniFi L2TP issues:" -ForegroundColor White
Write-Host " - Username might need @domain suffix (e.g., pst-admin@peacefulspirit)" -ForegroundColor Gray
Write-Host " - Check if user account is enabled on UniFi" -ForegroundColor Gray
Write-Host " - Verify RADIUS server is not required" -ForegroundColor Gray
}
Write-Host ""
pause