From 447dcfdf08526599da8f5ee728beb512b1ac649a Mon Sep 17 00:00:00 2001 From: Aminda Suomalainen Date: Wed, 3 Jul 2024 19:08:14 +0300 Subject: [PATCH] fix .prettierrc & run prettier again --- .github/CODEOWNERS | 2 +- .gitlab-ci.yml | 2 + .prettierrc | 4 +- README.md | 2 + Windows/DoH/README.md | 18 ++++--- Windows/Windows.reg.markdown | 13 +++-- conf/autoconfig.js | 2 + conf/autoconfig.js.online | 7 ++- conf/librewolf.overrides.cfg | 53 +++++++++++++++------ etc/dnscrypt-proxy/README.md | 16 ++++--- etc/firefox/policies/README.md | 6 ++- etc/opt/chromium/policies/managed/README.md | 41 +++++++++------- etc/systemd/resolved.conf.d/README.md | 51 +++++++++++--------- etc/systemd/system/README.md | 12 +++-- etc/xdg/autostart/README.md | 2 + local/share/applications/README.md | 12 +++-- var/lib/iwd/README.md | 10 ++-- 17 files changed, 162 insertions(+), 91 deletions(-) diff --git a/.github/CODEOWNERS b/.github/CODEOWNERS index 8c96a518..f9ff4c49 100644 --- a/.github/CODEOWNERS +++ b/.github/CODEOWNERS @@ -1 +1 @@ -* @Mikaela +* @Mikaela diff --git a/.gitlab-ci.yml b/.gitlab-ci.yml index baa88fdb..836339a0 100644 --- a/.gitlab-ci.yml +++ b/.gitlab-ci.yml @@ -1,3 +1,5 @@ +# @format + # Based on https://pre-commit.com image: python:alpine gitlab-ci-pre-commit: diff --git a/.prettierrc b/.prettierrc index 9e2891ea..d9881df7 100644 --- a/.prettierrc +++ b/.prettierrc @@ -13,11 +13,11 @@ { "files": ".prettierrc", "options": { "parser": "json" } }, { "files": "conf/librewolf.overrides.cfg", - "options": { "parser": ".js" } + "options": { "parser": "babel" } }, { "files": "conf/autoconfig.js.online", - "options": { "parser": ".js" } + "options": { "parser": "babel" } } ] } diff --git a/README.md b/README.md index c5ef707d..34d8085e 100644 --- a/README.md +++ b/README.md @@ -1,3 +1,5 @@ + + Config files that I wish to have everywhere. You could probably call this repository as dotfiles, but historical reasons... diff --git a/Windows/DoH/README.md b/Windows/DoH/README.md index 0b6aa65c..34398679 100644 --- a/Windows/DoH/README.md +++ b/Windows/DoH/README.md @@ -1,10 +1,12 @@ + + # DNS over HTTPS in Windows 11 Requires Windows 11. - `GPO-EnforceDoH.reg` enables the group policy to require DoH. However it - didn't seem to work for me or it allowed me to set the DNS server to not - use DoH. + didn't seem to work for me or it allowed me to set the DNS server to not use + DoH. - `DohWellKnownServers` adds DoH support for multiple IPv4 & IPv6 addresses that Windows 11 isn't shipping by default, currently: @@ -17,14 +19,18 @@ Requires Windows 11. - Mullvad - Mullvad Adblock - Quad9 ECS (Windows 11 defaults include Quad9 default) - - TREX (actually points to Quad9 as per [their documentation](https://www.trex.fi/service/resolvers.html)) + - TREX (actually points to Quad9 as per + [their documentation](https://www.trex.fi/service/resolvers.html)) ## Configuration Once Windows knows about the DoH servers (DohWellKnownServers.reg), DNS-over HTTPS can be enabled for: -- All networks: `Windows-I (Settings) -> Network & Internet -> Advanced network settings -> WLAN -> View additional properties -> DNS Server assignment -> Edit` +- All networks: + `Windows-I (Settings) -> Network & Internet -> Advanced network settings -> WLAN -> View additional properties -> DNS Server assignment -> Edit` - Same place for Ethernet etc. -- Specific network: `Windows-I (Settings) -> Network & Internet -> WiFi -> Connected SSID -> DNS server assignment -> Edit` - - Note: if the all networks one is configured, there is a warning about it not being used. +- Specific network: + `Windows-I (Settings) -> Network & Internet -> WiFi -> Connected SSID -> DNS server assignment -> Edit` + - Note: if the all networks one is configured, there is a warning about it + not being used. diff --git a/Windows/Windows.reg.markdown b/Windows/Windows.reg.markdown index 9a2d10b7..39f344f1 100644 --- a/Windows/Windows.reg.markdown +++ b/Windows/Windows.reg.markdown @@ -1,3 +1,5 @@ + + This file is supposed to explain [Windows.reg](Windows.reg). ``` @@ -10,9 +12,10 @@ Windows Registry Editor Version 5.00 - Make the file Windows Registry Editor script - Ask admins for password/PIN in UAC - 2 would ask for yes or no, 0 disable entirely (don't do that). -- prompt standard users for username and password. 2021-12-19: I don't understand this or the line below. - - The other option (1) doesn't even give them UAC prompt so you must - always login as admin to do anything. +- prompt standard users for username and password. 2021-12-19: I don't + understand this or the line below. + - The other option (1) doesn't even give them UAC prompt so you must always + login as admin to do anything. ``` "dontdisplaylastusername"=dword:00000000 @@ -39,8 +42,8 @@ Windows Registry Editor Version 5.00 ``` - Sets hardware clock to UTC time (doesn't affect system clock!) - - qword for 64-bit, dword for 32-bit systems. The actual reg file has - only qword as I haven't seen 32-bit Windowses lately. + - qword for 64-bit, dword for 32-bit systems. The actual reg file has only + qword as I haven't seen 32-bit Windowses lately. ``` [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Dnscache\Parameters] diff --git a/conf/autoconfig.js b/conf/autoconfig.js index d0aa9b53..7b414370 100644 --- a/conf/autoconfig.js +++ b/conf/autoconfig.js @@ -1,3 +1,5 @@ +/** @format */ + // This file belongs to Firefox `default/pref` directory. // E.g. /usr/lib64/firefox/defaults/pref/ or ~/.local/firefox/defaults/pref/ diff --git a/conf/autoconfig.js.online b/conf/autoconfig.js.online index 49d69cae..38c19d83 100644 --- a/conf/autoconfig.js.online +++ b/conf/autoconfig.js.online @@ -1,10 +1,15 @@ +/** @format */ + // This file belongs to Firefox `default/pref` directory as `autoconfig.js`. // E.g. /usr/lib64/firefox/defaults/pref/autoconfig.js // WARNING: lockPref() IS NOT ALLOWED HERE! //pref("autoadmin.global_config_url","https://gitea.blesmrt.net/mikaela/shell-things/raw/branch/master/conf/firefox-forbidden-policies.js"); -pref("autoadmin.global_config_url","file:///home/aminda/public_html/autoconfig.js"); +pref( + "autoadmin.global_config_url", + "file:///home/aminda/public_html/autoconfig.js", +); pref("general.config.obscure_value", 0); pref("autoadmin.refresh_interval", 120); pref("autoadmin.offline_failover", true); diff --git a/conf/librewolf.overrides.cfg b/conf/librewolf.overrides.cfg index 28923c38..e4c63974 100644 --- a/conf/librewolf.overrides.cfg +++ b/conf/librewolf.overrides.cfg @@ -1,3 +1,4 @@ +/** @format */ // ~/.{librewolf,var/app/io.gitlab.librewolf-community/.librewolf}/librewolf.overrides.cfg // The first line of this file is supposed to be empty. @@ -11,7 +12,10 @@ // NOTE! A lot is commented either for being a note, wrong, TODO, whatever, or most likely in my /etc/firefox/policies/policies.json // Firefox autoconfig -pref("autoadmin.global_config_url", "https://gitea.blesmrt.net/mikaela/shell-things/raw/branch/master/conf/librewolf.overrides.cfg"); +pref( + "autoadmin.global_config_url", + "https://gitea.blesmrt.net/mikaela/shell-things/raw/branch/master/conf/librewolf.overrides.cfg", +); //pref("general.config.obscure_value", 0); pref("autoadmin.refresh_interval", 120); pref("autoadmin.offline_failover", true); @@ -51,7 +55,10 @@ pref("privacy.fingerprintingProtection.pbmode", true); // usability and reveal the real platform (voting for Linux // existing in statistics). https://searchfox.org/mozilla-central/source/toolkit/components/resistfingerprinting/RFPTargets.inc // It's not like I have any uniqueness with `intl.accept_languages` below... -pref("privacy.fingerprintingProtection.overrides", "+AllTargets,-KeyboardEvents,-SpeechSynthesis,-CSSPrefersColorScheme,-CSSPrefersReducedMotion,-NavigatorPlatform,-NavigatorUserAgent,-JSDateTimeUTC,-HttpUserAgent,-FontVisibilityRestrictGenerics,-FontVisibilityBaseSystem,-FontVisibilityLangPack"); +pref( + "privacy.fingerprintingProtection.overrides", + "+AllTargets,-KeyboardEvents,-SpeechSynthesis,-CSSPrefersColorScheme,-CSSPrefersReducedMotion,-NavigatorPlatform,-NavigatorUserAgent,-JSDateTimeUTC,-HttpUserAgent,-FontVisibilityRestrictGenerics,-FontVisibilityBaseSystem,-FontVisibilityLangPack", +); // :( but fingerprintability pref("javascript.use_us_english_locale", true); @@ -147,8 +154,14 @@ pref("browser.cache.memory.enable", true); //pref("privacy.userContext.ui.enabled", true); //pref("browser.contentblocking.category", "strict"); -pref("privacy.partition.always_partition_third_party_non_cookie_storage", true); -pref("privacy.partition.always_partition_third_party_non_cookie_storage.exempt_sessionstorage", false); +pref( + "privacy.partition.always_partition_third_party_non_cookie_storage", + true, +); +pref( + "privacy.partition.always_partition_third_party_non_cookie_storage.exempt_sessionstorage", + false, +); /** prevent media cache from being written to disk in pb, but increase max cache size to avoid playback issues */ pref("browser.privatebrowsing.forceMediaMemoryCache", true); @@ -189,7 +202,7 @@ pref("media.peerconnection.ice.proxy_only_if_behind_proxy", true); // force webr /** [SECTION] DNS */ //pref("network.dns.disablePrefetch", true); // disable dns prefetching -pref("network.dns.skipTRR-when-parental-control-enabled", false); // Arkenfox user.js v117 +pref("network.dns.skipTRR-when-parental-control-enabled", false); // Arkenfox user.js v117 /** [SECTION] PREFETCHING AND SPECULATIVE CONNECTIONS * disable prefecthing for different things such as links, bookmarks and predictions. @@ -271,7 +284,6 @@ pref("browser.urlbar.weather.featureGate", false); // these are from Arkenfox, I decided to put them here. pref("browser.download.start_downloads_in_tmp_dir", true); // Arkenfox user.js v118 - /** * the pref disables the whole feature and hide it from the ui * (as noted in https://bugzilla.mozilla.org/show_bug.cgi?id=1755057). @@ -307,8 +319,6 @@ pref("browser.link.open_newwindow.restriction", 0); /** [SECTION] MOUSE */ pref("browser.tabs.searchclipboardfor.middleclick", false); // prevent mouse middle click on new tab button to trigger searches or page loads - - /** [CATEGORY] EXTENSIONS */ /** [SECTION] USER INSTALLED @@ -363,14 +373,20 @@ pref("browser.shopping.experience2023.active", false); /** [SECTION] OTHERS */ pref("webchannel.allowObject.urlWhitelist", ""); // remove web channel whitelist -pref("services.settings.server", "https://%.invalid") // set the remote settings URL (REMOTE_SETTINGS_SERVER_URL in the code) +pref("services.settings.server", "https://%.invalid"); // set the remote settings URL (REMOTE_SETTINGS_SERVER_URL in the code) /** [SECTION] NEW TAB PAGE * we want NTP to display nothing but the search bar without anything distracting. * the three prefs below are just for minimalism and they should be easy to revert for users. */ -pref("browser.newtabpage.activity-stream.section.highlights.includeDownloads", false); -pref("browser.newtabpage.activity-stream.section.highlights.includeVisited", false); +pref( + "browser.newtabpage.activity-stream.section.highlights.includeDownloads", + false, +); +pref( + "browser.newtabpage.activity-stream.section.highlights.includeVisited", + false, +); pref("browser.newtabpage.activity-stream.feeds.topsites", false); // hide stories and sponsored content from Firefox Home pref("browser.newtabpage.activity-stream.feeds.section.topstories", false); @@ -380,7 +396,10 @@ pref("browser.newtabpage.activity-stream.showSponsoredTopSites", false); pref("browser.newtabpage.activity-stream.feeds.telemetry", false); pref("browser.newtabpage.activity-stream.telemetry", false); // hide stories UI in about:preferences#home, empty highlights list -pref("browser.newtabpage.activity-stream.feeds.section.topstories.options", "{\"hidden\":true}"); +pref( + "browser.newtabpage.activity-stream.feeds.section.topstories.options", + '{"hidden":true}', +); pref("browser.newtabpage.activity-stream.default.sites", ""); /** [SECTION] ABOUT @@ -406,8 +425,14 @@ pref("browser.preferences.moreFromMozilla", false); /** [SECTION] RECOMMENDED * disable all "recommend as you browse" activity. */ -pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features", false); -pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons", false); +pref( + "browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features", + false, +); +pref( + "browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons", + false, +); // Maybe Windows specific, but looks useful. pref("network.protocol-handler.external.ms-windows-store", false); // prevent links from launching windows store diff --git a/etc/dnscrypt-proxy/README.md b/etc/dnscrypt-proxy/README.md index 30a2b40c..904cec16 100644 --- a/etc/dnscrypt-proxy/README.md +++ b/etc/dnscrypt-proxy/README.md @@ -1,16 +1,18 @@ + + My configs for [dnscrypt-proxy] At the time of writing, hosts-mikaela.txt is intended for not having to -remember or trust the DNS for all of the domains or the hypothetical -scenario where I have no access to DNS, but for some reason having access -to [Yggdrasil] and/or [Hyperboria] or just to answer the question, why to -rely on centralized technology on decentralized web. +remember or trust the DNS for all of the domains or the hypothetical scenario +where I have no access to DNS, but for some reason having access to +[Yggdrasil] and/or [Hyperboria] or just to answer the question, why to rely on +centralized technology on decentralized web. Mosts of the domains in hosts-mikaela.txt should also work without the file when mikaela.internal is replaced with mikaela.info, however relying on DNS, -but that way you must trust DNSSEC, CloudFlare and wherever the CNAME -points to who may not have DNSSEC. If you are using this file -(you shouldn't), you are already trusting me. +but that way you must trust DNSSEC, CloudFlare and wherever the CNAME points +to who may not have DNSSEC. If you are using this file (you shouldn't), you +are already trusting me. [dnscrypt-proxy]: https://github.com/jedisct1/dnscrypt-proxy [hyperboria]: https://hyperboria.net/ diff --git a/etc/firefox/policies/README.md b/etc/firefox/policies/README.md index 6820bd40..4f6745df 100644 --- a/etc/firefox/policies/README.md +++ b/etc/firefox/policies/README.md @@ -1,3 +1,5 @@ + + # Firefox `policies.json` - https://mozilla.github.io/policy-templates/ @@ -32,8 +34,8 @@ per whatever I am doing. ## WARNING TO LIBREWOLF USERS This file takes priority over -`/usr/share/librewolf/distribution/policies.json` so don't apply this or -a lot of LibreWolf specific customizations stops being in force. +`/usr/share/librewolf/distribution/policies.json` so don't apply this or a lot +of LibreWolf specific customizations stops being in force. ## General warning diff --git a/etc/opt/chromium/policies/managed/README.md b/etc/opt/chromium/policies/managed/README.md index f11043ce..8faa360b 100644 --- a/etc/opt/chromium/policies/managed/README.md +++ b/etc/opt/chromium/policies/managed/README.md @@ -1,3 +1,5 @@ + + # Chromium policies - https://chromeenterprise.google/policies/ @@ -200,8 +202,8 @@ disabling GTK/Qt themes. ## `brave-shields-disabled.json` -Allowlist for sites where I think Brave Shields may be breaking things. Similar is also in -`aminda-extensions.json` for Privacy Badger. +Allowlist for sites where I think Brave Shields may be breaking things. +Similar is also in `aminda-extensions.json` for Privacy Badger. ## `disable-brave-ipfs.json` @@ -254,14 +256,15 @@ Simply forces DNS-over-HTTPS with DNS0.eu. ## `doh-mullvad-base.json` -Forces DNS-over-HTTPS with Mullvad Base, which features ad, malware & tracker blocking. +Forces DNS-over-HTTPS with Mullvad Base, which features ad, malware & tracker +blocking. - https://mullvad.net/en/help/dns-over-https-and-dns-over-tls#specifications ## `doh-quad9-ecs.json` -Forces DNS over HTTPS with Quad9 ECS enabled threat-blocking server and also contains -their alternative port. +Forces DNS over HTTPS with Quad9 ECS enabled threat-blocking server and also +contains their alternative port. ## `doh-quad9.json` @@ -270,15 +273,18 @@ their alternative port. ## `doh-unlocked-unset.json` -Allows configuring DoH even with managed policies present (unless another DoH rule is in force) since enabling any managed policy will otherwise gray out the option. +Allows configuring DoH even with managed policies present (unless another DoH +rule is in force) since enabling any managed policy will otherwise gray out +the option. -If no DNS over HTTPS policy is used, this unlocks the setting. Enabling managed policies disable it by default. +If no DNS over HTTPS policy is used, this unlocks the setting. Enabling +managed policies disable it by default. My other `doh-*.json` set this as well, because `secure` doesn't allow -downgrade to system resolver and Chromium seems somewhat unreliable with it often reporting -`DNS_PROBE_POSSIBLE` and while this occassionally disables ECH, it works and -my system resolvers are encrypted. I hope they will implement ECH with system -resolver soon to fix this. +downgrade to system resolver and Chromium seems somewhat unreliable with it +often reporting `DNS_PROBE_POSSIBLE` and while this occassionally disables +ECH, it works and my system resolvers are encrypted. I hope they will +implement ECH with system resolver soon to fix this. ## `edge-appsfavorites.json` @@ -298,7 +304,8 @@ Explicitly enables Chromecast support. ## `enable-labs.json` -Enables the beaker button "Experiments" for easier management than `about:flags`. +Enables the beaker button "Experiments" for easier management than +`about:flags`. ## `enable-passwordleakdetection.json` @@ -332,14 +339,14 @@ This file evolved to merge another one, so now it: ## `prefetch.json` -Enables prefetching. Will make sites very speedy, but decreases privacy and may -conflict with uBlock Origin. However AdNauseam is already clicking those ads, so -maybe it's not that big of an issue. +Enables prefetching. Will make sites very speedy, but decreases privacy and +may conflict with uBlock Origin. However AdNauseam is already clicking those +ads, so maybe it's not that big of an issue. ## `profilemanager.json` -Forces the profile screen even with only one profile. I love the feature in Firefox -and want to see it here too, now that I accidentally noticed it. +Forces the profile screen even with only one profile. I love the feature in +Firefox and want to see it here too, now that I accidentally noticed it. ## `README.md` diff --git a/etc/systemd/resolved.conf.d/README.md b/etc/systemd/resolved.conf.d/README.md index 3f2fa6c4..370cf141 100644 --- a/etc/systemd/resolved.conf.d/README.md +++ b/etc/systemd/resolved.conf.d/README.md @@ -1,3 +1,5 @@ + + # systemd-resolved additional config files @@ -17,8 +19,8 @@ ## Quickstart -This is also done by `../../systemd-resolv.conf-restore.bash` which takes -into account more circumstances... +This is also done by `../../systemd-resolv.conf-restore.bash` which takes into +account more circumstances... ```bash sudo systemctl enable --now systemd-resolved.service @@ -33,13 +35,13 @@ offer. ## Files explained -- `00-defaults.conf` - configuration that should be used everywhere. - Enables DNSSEC (regardless of systemd-resolved not handling it properly), - enables opportunistic DoT, caching and local DNS servers (because they - should exist anyway as I don't trust systemd-resolved entirely. Anyway if - there truly is no local resolver, systemd-resolved will detect that and act accordingly.) - - To rephrase, this is to be used together with other files, especially - some of those beginning with `10-dot-`. +- `00-defaults.conf` - configuration that should be used everywhere. Enables + DNSSEC (regardless of systemd-resolved not handling it properly), enables + opportunistic DoT, caching and local DNS servers (because they should exist + anyway as I don't trust systemd-resolved entirely. Anyway if there truly is + no local resolver, systemd-resolved will detect that and act accordingly.) + - To rephrase, this is to be used together with other files, especially some + of those beginning with `10-dot-`. - `05-do53-dna-moi.conf` - DNS servers used by DNA and Moi (who is on DNA's network and owned by them) - `05-do53-elisa.conf` - DNS servers used by Elisa and apparently their @@ -48,12 +50,12 @@ offer. At least one of these should be used in addition to `00-defaults.conf` - `98-local-resolver.conf` attempts to configure localhost resolver and disables unnecessary features for that scenario. The number 10 takes - priority over 00 and 05 so if a DNSOverTLS=true is uncommented, it will - also apply to the former ones that are unlikely to support it. When - numbering the files, I didn't think I would be adding the plaintext DNS - servers that I am unlikely to use whenever Unbound is available (and I - currently have only one system that has systemd-resolved while not having - Unbound and it seems to prefer DoT over my router anyway). + priority over 00 and 05 so if a DNSOverTLS=true is uncommented, it will also + apply to the former ones that are unlikely to support it. When numbering the + files, I didn't think I would be adding the plaintext DNS servers that I am + unlikely to use whenever Unbound is available (and I currently have only one + system that has systemd-resolved while not having Unbound and it seems to + prefer DoT over my router anyway). - `99-lan-resolver.conf.sample` when renamed would allow enabling resolvers on LAN assuming they are trusted. Note that if used together with `98-local-resolver.conf`, DNSSEC would be disabled. @@ -61,30 +63,33 @@ offer. ## General commentary -- DNSOverTLS became supported in systemd v239, strict mode (true) in - v243 (big improvements in v244). +- DNSOverTLS became supported in systemd v239, strict mode (true) in v243 (big + improvements in v244). - TODO: find out when SNI became supported, I have just spotted it in the fine manual in 2020-06-??. -- Domains has to be `.~` for them to override DHCP. See https://www.internetsociety.org/blog/2018/12/dns-privacy-in-linux-systemd +- Domains has to be `.~` for them to override DHCP. See + https://www.internetsociety.org/blog/2018/12/dns-privacy-in-linux-systemd without which I wouldn't have got this right. - DNSSEC may not work if the system is down for a long time and not updated. Thus `allow-downgrade` may be better for non-tech people, even with the potential downgrade attack. There are also captive portals, affecting - `DNSOverTLS`. Both take `true` or `false` or their own special option, - for DNSSEC the `allow-downgrade`, for DNSOverTLS `opportunistic`. + `DNSOverTLS`. Both take `true` or `false` or their own special option, for + DNSSEC the `allow-downgrade`, for DNSOverTLS `opportunistic`. - Then again when was any system that outdated to not have working DNSSEC? - TODO: return to this configuration should that actually happen? - I am actually running Unbound simultaneously with `resolv.conf` pointing to both with `options rotate edns0 trust-ad` which might workaround that potential issue. - DNS server priority is the one they are specified in. The first working one - will be used when it won't work anymore and then the next is used as long - as it works and then it's back to the beginning. + will be used when it won't work anymore and then the next is used as long as + it works and then it's back to the beginning. - https://github.com/systemd/systemd/issues/16322#issuecomment-724143641 Other links I have found important and my files are based on: - https://wiki.archlinux.org/index.php/Systemd-resolved - - Also provides the serious issues systemd-resolved+DNSSEC issues, https://github.com/systemd/systemd/issues/10579 & https://github.com/systemd/systemd/issues/9867 + - Also provides the serious issues systemd-resolved+DNSSEC issues, + https://github.com/systemd/systemd/issues/10579 & + https://github.com/systemd/systemd/issues/9867 - request for strict DoT: https://github.com/systemd/systemd/issues/10755 - vulnerable to MITM: https://github.com/systemd/systemd/issues/9397 diff --git a/etc/systemd/system/README.md b/etc/systemd/system/README.md index d09d23a4..52e5fc8b 100644 --- a/etc/systemd/system/README.md +++ b/etc/systemd/system/README.md @@ -1,15 +1,19 @@ + + Systemd services. These are sorted by some kind of category into subdirectories. The sudirectories won't exist in the real `/etc/systemd/system` unless they end `.wants` or `.d` or something similar and I forget to update this README file if that happens. -- reflector.service is copied from https://wiki.archlinux.org/index.php/Reflector - but uses https instead of http, because there is no reason I would want - someone to see what I download. +- reflector.service is copied from + https://wiki.archlinux.org/index.php/Reflector but uses https instead of + http, because there is no reason I would want someone to see what I + download. ## Worth reading - Waiting for network devices to have IP address (**I only use this for - cables**) https://wiki.freedesktop.org/www/Software/systemd/NetworkTarget/#cutthecraphowdoimakenetwork.targetworkforme + cables**) + https://wiki.freedesktop.org/www/Software/systemd/NetworkTarget/#cutthecraphowdoimakenetwork.targetworkforme - `systemctl enable NetworkManager-wait-online.service` - `systemctl enable systemd-networkd-wait-online.service` diff --git a/etc/xdg/autostart/README.md b/etc/xdg/autostart/README.md index 863f684f..10ff20ca 100644 --- a/etc/xdg/autostart/README.md +++ b/etc/xdg/autostart/README.md @@ -1,3 +1,5 @@ + + # Autostart files for graphical desktop environments This mostly caters for my family. diff --git a/local/share/applications/README.md b/local/share/applications/README.md index 6c3b5900..21922316 100644 --- a/local/share/applications/README.md +++ b/local/share/applications/README.md @@ -1,3 +1,5 @@ + + # Custom app menu entries These can be used for either `~/.local/share/applications` or @@ -25,12 +27,12 @@ so graphical desktop environments started the apps on login. ## `a-*.desktop` These files are companions to my script repos `bash/usr-local-bin/*` belonging -to `/usr/local/share/applications` and are named so to -avoid masking package manager. They have clearly different names such as using -all caps. +to `/usr/local/share/applications` and are named so to avoid masking package +manager. They have clearly different names such as using all caps. -Apparently one can also have subdirectories in `/usr/local/share/applications/` -and `~/.local/share/applications/` making life easier. +Apparently one can also have subdirectories in +`/usr/local/share/applications/` and `~/.local/share/applications/` making +life easier. ## Refreshing the menus diff --git a/var/lib/iwd/README.md b/var/lib/iwd/README.md index 5bf2c5f3..d69b9511 100644 --- a/var/lib/iwd/README.md +++ b/var/lib/iwd/README.md @@ -1,3 +1,5 @@ + + iwd network configuration lives in this directory See also `../../../etc/iwd/main.conf` especially in standalone iwd without @@ -5,11 +7,11 @@ NetworkManager. Notes: -- `git commit`ing the same SSID with different capitalisations breaks - Windows and more common macOS setups due to their filesystems being +- `git commit`ing the same SSID with different capitalisations breaks Windows + and more common macOS setups due to their filesystems being case-insensitive. -- `Settings.AutoConnect=true` is unnecessary as it defaults to true - according to `man iwd.network`. +- `Settings.AutoConnect=true` is unnecessary as it defaults to true according + to `man iwd.network`. - `IPv6.Enabled=true` defauls to true being also unnecessary. - `private-home-sample.psk` has a comment on MAC address override and sends hostname with IPv4 DHCP. `private-cafe-sample.psk` always randomizes MAC