2024-04-26 09:30:39 +02:00
|
|
|
[Unit]
|
|
|
|
Description=Aminda's cronless boot tasks
|
2024-05-01 09:22:57 +02:00
|
|
|
Wants=sysctl-p--system.service
|
2024-04-26 09:30:39 +02:00
|
|
|
|
|
|
|
[Service]
|
|
|
|
Type=oneshot
|
|
|
|
TimeoutStartSec=infinity
|
2024-09-22 09:46:37 +02:00
|
|
|
Environment=LINUXBREWUSER=root
|
2024-07-28 12:04:57 +02:00
|
|
|
Environment=LINUXBREWGROUP=wheel
|
2024-10-04 12:21:21 +02:00
|
|
|
# Remember `systemd-path search-binaries-default`
|
|
|
|
ExecStartPre=-echo 1 > /sys/devices/system/cpu/microcode/reload
|
2024-07-23 16:29:53 +02:00
|
|
|
# - means it can fail, without failing those after it.
|
|
|
|
# These aren't given --now as THEY WOULD INFINITE LOOP.
|
2024-10-04 12:21:21 +02:00
|
|
|
ExecStartPre=-systemctl enable aminda-nocron-rebootish.service
|
|
|
|
ExecStartPre=-systemctl enable aminda-nocron-rebootish.timer
|
|
|
|
ExecStartPre=-systemctl enable --now unbound.service
|
|
|
|
ExecStartPre=-systemctl enable --now systemd-resolved.service
|
|
|
|
ExecStartPre=-sysctl net.ipv6.conf.all.disable_ipv6=0
|
2024-04-26 09:30:39 +02:00
|
|
|
# These services are called here, so
|
2024-10-04 12:21:21 +02:00
|
|
|
ExecStartPre=-systemctl start firewalld.service
|
2024-04-30 17:59:45 +02:00
|
|
|
# https://github.com/systemd/zram-generator
|
2024-10-04 12:21:21 +02:00
|
|
|
#ExecStart=-systemctl start /dev/zram0
|
|
|
|
ExecStart=-systemctl enable --now systemd-zram-setup@zram0.service
|
2024-07-22 13:11:24 +02:00
|
|
|
# Ensure we really allow ICMPv6 on FEDORA (or firewalld). Also other essential services.
|
2024-10-04 12:21:21 +02:00
|
|
|
ExecStart=-firewall-cmd --add-protocol=ipv6-icmp
|
|
|
|
ExecStart=-firewall-cmd --add-protocol=ipv6-icmp --zone=home
|
|
|
|
ExecStart=-firewall-cmd --add-service=ssh --permanent
|
|
|
|
ExecStart=-firewall-cmd --add-service=ssh --permanent --zone=home
|
|
|
|
ExecStart=-firewall-cmd --add-service=mosh --permanent
|
|
|
|
ExecStart=-firewall-cmd --add-service=mosh --permanent --zone=home
|
|
|
|
ExecStart=-firewall-cmd --add-service=ntp --permanent
|
|
|
|
ExecStart=-firewall-cmd --add-service=ntp --permanent --zone=home
|
|
|
|
ExecStart=-firewall-cmd --add-service=syncthing --permanent
|
|
|
|
ExecStart=-firewall-cmd --add-service=syncthing --permanent --zone=home
|
|
|
|
ExecStart=-firewall-cmd --add-service=mdns --permanent
|
|
|
|
ExecStart=-firewall-cmd --add-service=mdns --permanent --zone=home
|
|
|
|
ExecStart=-firewall-cmd --add-service=kdeconnect --permanent
|
|
|
|
ExecStart=-firewall-cmd --add-service=kdeconnect --permanent --zone=home
|
|
|
|
ExecStart=-firewall-cmd --permanent --add-port=9001/udp
|
|
|
|
ExecStart=-firewall-cmd --permanent --add-port=9001/udp --zone=home
|
|
|
|
ExecStart=-firewall-cmd --permanent --add-port=6771/udp
|
|
|
|
ExecStart=-firewall-cmd --permanent --add-port=6771/udp --zone=home
|
2024-04-26 09:30:39 +02:00
|
|
|
# 3rd party Xbox controller initialization. See Mikaela/gist/gayming/
|
|
|
|
#ExecStart=-/root/fixcontroller.py
|
2024-04-26 12:16:33 +02:00
|
|
|
# This is actually in the delayed variant of this service, but anyway
|
2024-10-04 12:21:21 +02:00
|
|
|
ExecStart=-systemctl enable --now yggdrasil.service
|
|
|
|
ExecStart=-systemctl enable --now ssh.service
|
|
|
|
ExecStart=-systemctl enable --now sshd.service
|
|
|
|
ExecStart=-systemctl enable --now sshguard.service
|
|
|
|
ExecStart=-systemctl enable --now unbound.service
|
|
|
|
ExecStart=-systemctl enable --now chrony.service
|
|
|
|
ExecStart=-systemctl enable --now chronyd.service
|
|
|
|
ExecStart=-systemctl enable --now systemd-oomd.service systemd-oomd.socket
|
|
|
|
ExecStart=-chown -R ${LINUXBREWUSER}:${LINUXBREWGROUP} /home/linuxbrew -R
|
|
|
|
ExecStart=-chmod -R u+rw,g+rw,o+r /home/linuxbrew
|
|
|
|
ExecStart=-setfacl -R -m g:${LINUXBREWGROUP}:rwX,o:rX /home/linuxbrew
|
2024-04-26 09:30:39 +02:00
|
|
|
User=root
|
|
|
|
StandardOutput=journal
|
|
|
|
StandardError=journal
|
|
|
|
|
|
|
|
[Install]
|
|
|
|
WantedBy=multi-user.target
|