| Commit message (Collapse) | Author | Age | Lines |
| ... | |
| | |
|
| |
|
|
|
|
|
|
|
| |
The new limits allow each user to run a maximum of 100 processes by
default, allowing to manually raise this number to 200.
When a custom "pydis" group or similar is introduced, I plan to expand
this to also specify other limits to prevent user error from causing
problems on the system.
|
| | |
|
| | |
|
| | |
|
| |
|
|
|
| |
These groups are no longer present in our proper inventory as we no
longer plan on selfhosting Kubernetes on the netcup nodes.
|
| |
|
|
|
|
|
|
|
|
|
| |
Disable agent forwarding and X11 forwarding in the default
configuration. Users can still forward this if they really want to by
installing a custom forwarder and utilizing their shell access to spawn
it, but with this, we're making it impossible for people to accidentally
forward their agent or their X socket to the remote server.
Additionally, change the SSH configuration such that only the Python
Discord users are allowed to log in.
|
| |
|
|
| |
Allow for faster local installation by only installing what we need.
|
| | |
|
| | |
|
| |
|
|
| |
This also explicitly specifies the sync type to rsync
|
| |
|
|
|
|
|
|
| |
This allows us to connect to PostgreSQL on lovelace from any possible
LKE node location, whilst not opening up our PostgreSQL instances to the
world.
This has already been rolled out.
|
| | |
|
| |
|
|
|
| |
The new commit includes automatic validation of the `nft` configuration
to ensure that any deployed config is valid.
|
| | |
|
| |
|
|
|
|
|
|
|
| |
nftables is the modern replacement for iptables, which ufw uses under
the hood. It allows us to specify firewall rules in a simple text file
(with as much or as little abstraction as we want) and is quick to
update and read. The text-file format allows more liberty with
commenting compared to UFW. The existing `ufw` role has been converted
to simply remove UFW. This has already been deployed on lovelace.
|
| |
|
|
| |
Closes #240.
|
| | |
|
| | |
|
| | |
|
| |
|
|
| |
Closes #211.
|
| | |
|
| | |
|
| |
|
|
|
|
|
|
| |
The new `pydis-users` role allows us to manage user accounts and move
away from the root user setup script, eventually locking down SSH access
to the root user.
Joe, Chris and me have been added as users.
|
| | |
|
| |
|
|
|
|
| |
Disable password authentication and root logins and use a configuration
file that is independent of the `sshd_config` that `apt` itself will
modify on upgrades.
|
| | |
|
| | |
|
| | |
|
| |
|