Commit Graph

303 Commits

Author SHA1 Message Date
19994e3286
run prettier 2023-02-21 17:54:39 +02:00
4a20f75d3c
etc/systemd/resolved.conf.d: add DNS0 DoT configs
Their website already had the correct syntax for the entries

Ref: #153
2023-02-20 11:49:31 +02:00
36c2688cec
etc/systemd/system/unbound.service.d/never-fail.conf: unbound isn't allowed to fail either 2023-02-03 10:59:31 +02:00
bb7f283891
Revert "systemd/matterbridge.service: import parts of upstream"
This reverts commit 35aea33043.

Ref: https://github.com/42wim/matterbridge/issues/1794
2022-04-04 09:50:46 +03:00
35aea33043
systemd/matterbridge.service: import parts of upstream
https://github.com/42wim/matterbridge/wiki/Service-files#systemd
2022-04-04 08:35:23 +03:00
82ef806e9f
systemd-resolved README: add quickstart, remove extra h-levels 2022-03-28 20:43:03 +03:00
17da76e484
systemd/resolved/README.md: add the ArchWiki DNSSEC issue links 2022-03-28 20:37:37 +03:00
f55c00dae6
systemd/resolved/README.md: add missing word, improve formatting 2022-03-28 20:36:11 +03:00
8c532e3ef8
etc…resolved…: add/clarify links in/to comments
Courtesy of https://wiki.archlinux.org/title/Systemd-resolved#DNSSEC
2022-03-28 20:34:37 +03:00
d47c374706
etc/ststemd/resolved…: aggressive cleanup/rewriting 2022-03-28 20:28:17 +03:00
64bba542b1
systemd/matterbridge.service: remove -debug, mention /groupId 2022-03-18 10:44:25 +02:00
76814f830f
etc/{i2pd,systemd}: modernise to less bad ideas
The issue has been fixed last year and considering I2Pd can connect
through Yggdrasil natively, tunneling Yggdrasil in is a bad idea and
could lead into Yggdrasil over Yggdrasil loop situation.
2022-03-08 18:18:40 +02:00
1356fccd20
systemd: add flatpak-update.{service,timer}
Resolves: #121
2021-12-18 13:45:53 +02:00
1b4ac2b6d7
etc/systemd/system.conf.d: add log4shell.conf 2021-12-13 13:09:35 +02:00
5704353d55
systemd: copy matterbridge restarter into gitea one
It used to stop working randomly without a good reason, but that is
likely fixed upstream a long time ago and while I removed it from cron,
these units exist so should the issue recur, I can throw these back in.

The cron wasn't randomized though, but I don't think there is harm in
this being a bit random.
2021-12-06 23:48:40 +02:00
8e69874534
matterbridge-restart.timer: fix language 2021-12-06 23:48:30 +02:00
bd91ef704d
systemd: matterbridge.timer -> matterbridge-restart.{service,timer}
Resolves: #98
2021-11-22 09:56:56 +02:00
9ba056cfd3
matterbridge-cleanup.service: fix typo, ignore exit state 2021-11-21 17:15:12 +02:00
62573195d9
systemd: add matterbridge-cleanup.{service,timer}
Resolves: #98
2021-11-21 17:11:44 +02:00
13278214d1
matterbridge.timer: OnBootSec=0 just in case
Ref: #98
2021-11-21 16:59:05 +02:00
29f7cf6b98
systemd: first attempt at matterbridge restarter timer
Ref: #98
2021-11-21 16:52:14 +02:00
4f50f4a367
systemd-resolved: don't DNSSEC with adblocking 2021-11-21 11:37:03 +02:00
12fe7a59a8
etc/systemd/resolved: add configuration for Mullvad DoT 2021-11-21 11:16:11 +02:00
12127744b5
systemd: also keep trying Chrony 2021-10-03 09:58:59 +03:00
84e714b55e
systemd: keep retrying yggdrasil, don't sleep 2021-10-03 09:58:03 +03:00
a5836327c4
etc: pipewire & bluetooth: enable codes, battery reporting
https://web.archive.org/web/20210614103423/https://www.redpill-linpro.com/techblog/2021/05/31/better-bluetooth-headset-audio-with-msbc.html
2021-06-14 13:36:34 +03:00
126918d98d
systemd/limnoria.service: add TZ env & RestartSec 2021-06-02 17:50:30 +03:00
c1768cae67
systemd: "rewrite" supybot -> limnoria, move znc, rmdir irc/ 2021-05-16 18:00:31 +03:00
306270c441
etc/systemd: rm cjdns & miredo, I am unlikely to use them again 2021-05-16 11:15:34 +03:00
c8e89a5817
systemd: add coredump.conf.d/biggercores.conf 2021-02-18 14:47:23 +02:00
a0c61231f4
systemd/resolved.conf.d: add snopyta-strict.conf
While posting an example how I would do it I might as well put it here
2021-02-10 16:12:42 +02:00
b20f3367b1
systemd/yggdrasil: add mullvad-exclude (& fix chrony override typo) 2020-12-09 09:38:49 +02:00
40d535f2c0
systemd/chrony.service.d/mullvad-exclude: actually fix this 2020-12-08 18:36:34 +02:00
0c7038da14
systemd: systemd-resolved.service.d/unbound.conf: After unbound 2020-10-30 10:19:39 +02:00
fe83cbbb3a
systemd: add config for excluding Chrony from Mullvad 2020-10-30 08:04:58 +02:00
993759577e
Bind systemd-resolved to Unbound 2020-10-25 09:05:07 +02:00
1e70d7d4d7
etc/systemd-resolved&unbound: add Quad9 ECS configs
Untested. The last time I saw the documentation, they didn't mention
DoT.
2020-10-21 17:09:20 +03:00
31a15a9abc
systemd-resolved & unbound: update AdGuard IPs
Resolves: #81
2020-09-27 14:34:54 +03:00
cf8dc85ec0
systemd/timesyncd.conf.d: add cloudflare.conf 2020-08-09 10:51:36 +03:00
82cf5e7742
systemd/resolved.conf.d: add generic NextDNS confs 2020-08-09 00:07:06 +03:00
73fb88e11d
systemd-resolved.conf.d: everywhere -> 00-everywhere 2020-07-24 12:16:31 +03:00
69f55cd724
systemd/resolved: adguard-strict -> adguard-dot 2020-07-18 14:05:36 +03:00
550b68d149
etc/systemd/resolved: add [adguard,cloudflare}-strict.conf
I am not actually using either though and I am not sure if I will,
but maybe they are nice to have as a backup here just in case.
2020-07-18 02:20:56 +03:00
b3cb953b9c
systemd/resolved: add a comment to everywhere.conf too
as every other file explains who it is for, why not this
2020-07-04 19:09:26 +03:00
0ae22081a0
etc/systemd-resolved: rework all files more or less
* explain things in README.md, don't duplicate comments
* opportunistic-insecure.conf should be used everywhere by default, so
  thus it's now everywhere.conf. However I am yet to test it does what
  I expect, so this is bad case of testing in production or after
  committing it in general.
2020-07-04 19:06:18 +03:00
7a73088beb
systemd/resolved.conf.d/quad9*.conf: enable SNI 2020-06-26 12:22:09 +03:00
bce9af0edd
resolved.conf: add quad9-compat.conf 2020-06-26 12:22:09 +03:00
d1fc83913b
systemd/user: add ipfs, transmission-daemon (from system) 2020-03-30 08:42:06 +03:00
b217baaec9
systemd/system: update syncplay-server.service
It never got the TLS flag apparently
2020-03-27 18:02:34 +02:00
64d5fef6f3
ipfs.service: point to the new meta issue 2020-02-29 18:03:32 +02:00
b125fc1804
etc/systemd/resolved.conf.d: general.conf -> opportunistic-insecure.conf 2020-02-21 19:03:56 +02:00
da2f090f56
logind.conf.d/lidclose.conf: mention systemd-rfkill, ref: #51 2020-02-03 22:41:47 +02:00
c0399054bb
etc/systemd/login.conf.d/lidclose.conf: ignore lid close 2020-02-03 19:36:05 +02:00
4e93c66d67
systemd/resolved.conf.d/quad9: expand on versions 2019-11-02 18:37:12 +02:00
b3dc6ced51
systemd: initial i2pd.service & .d/override.conf
Begins #38
2019-09-15 13:52:57 +03:00
c91b1b97a9
systemd/system: add unit file for etherpad-lite
Closes: #27
2019-08-29 13:10:55 +03:00
56b5b905e2
fix github link, closes #16 2019-08-18 02:05:52 +03:00
a915db9f8a
etc/systemd: tor-services: add ExecReload
I am running `systemctl restart tor-client` too often to be comfortable.
2019-06-30 14:11:34 +03:00
5128e8646a
ipfs.service: use dht routing instead of dhtclient routing 2019-06-11 01:17:22 +03:00
85bd70f382
etc/systemd/system/ipfs: important notice for VPS/dedi/etc. 2019-06-11 01:12:28 +03:00
d2bd2be652
systemd/zeronet.service: use Python 3 & always use Tor 2019-05-05 20:28:14 +03:00
8e01a42c62
etc: systemd & tor: add tor-onehoponion (and torrc-relay) 2019-05-04 17:26:57 +03:00
9c8cf613cd
etc/systemd: add tor-client.service & tor: add torrc-client 2019-05-03 12:31:33 +03:00
4c2b21bbfa
ipfs.service: add routing note 2019-05-01 23:30:12 +03:00
ce84c26bcd
ipfs.service: adapt lowpower profile & mention badgerds
If the lowpower option uses values 40 and 20 which are a lot higher than
mine were and considered suitable for laptops and smartphones, I guess
they are the best for me to use and I find content faster.
2019-04-23 13:51:18 +03:00
6981481c77
ipfs.service: add options I forgot before 2019-03-26 22:26:25 +02:00
3ecfc2473d
ipfs.service: document my IPFS config
Closes #111
2019-03-26 22:05:52 +02:00
466a7bc2c1
etc/systemd/resolved.conf.d: add some configs
These aren't seeing real world usage though as the only host not running
dnscrypt-proxy has too old systemd.
2019-03-25 13:41:23 +02:00
f336393db9
systemd preset: enable pcscd for FINEID 2019-02-28 13:00:42 +02:00
81fcfb539d
systemd preset: Zaldaryn additions 2019-02-28 12:17:07 +02:00
758d4302ac
systemd preset: remove cjdns, enable ssh.service 2019-02-28 12:10:14 +02:00
d406334560
systemd preset: enable TTY & cups 2019-02-17 21:07:10 +02:00
5fe9477c55
etc/systemd: add ipfs.service & zeronet.service
Closes #101
2019-02-12 20:32:40 +02:00
993d3f6994
systemd preset: enable yggdrasil-resume 2019-02-08 10:21:14 +02:00
d27cc15888
add systemd-preset 2019-01-21 18:41:36 +02:00
4f99f6ebed
syncplay-server.service: ccxcz's endpoints ExecStart just in case 2018-11-24 20:36:17 +02:00
c57d5443ab
add systemd unit for syncplay-server 2018-11-23 17:23:38 +02:00
534f34a5bc
add override.conf for tor.service for allowing binding to 80/443
It took me some time a few days ago to figure out this (and notice that
port 80 was already used by automatically installed Apache that was
doing nothing).

I have understood that ports 443 (Orport) and 80 (Dirport) are the best
for users behind strict firewalls especially if they aren't needed for
anything else on the system running Tor relay.
2018-10-12 23:10:48 +03:00
d1151aaf8c
etc/systemd: rm -r dnscrypt/
Dnscrypt-proxy appears to handle multiple servers by itself nowadays and
does it in the config file. The servers listed may also be down.

Ref: #92 where I remembered these files still being here.
2018-10-08 20:25:09 +03:00
06d5ff55d0
etc/systemd/system: add cjdns/ 2018-10-05 13:27:35 +03:00
1ba8dd4137
systemd: snapd.refresh.service override
It fails on laptops thanks to not being able to do DNS resolution thanks
to network connection not existing during boot.

Now it fails to `Download snap "ubuntu-core" (423) from channel "stable"
(cannot authenticate to snap store: Provided email/password is not
correct.)` which is process and appears to not be my issue.
2016-12-13 19:30:32 +02:00
56de53ee30
systemd: only override issues with stock units
Only oidentd.socket and miredo.service were copied instead of being
units that exist in the system and they don't need to do anything
else than fix the issue I have with the stock units.

* oidentd.socket is IPv6-only on my systems unless is BindIPv6Only=both.
  because of net.ipv6.bindv6only=1
* miredo.service is here because it starts before there is network
  connection (network-online.target) and there is never network
  connection with laptops before they are connected to WLAN even if
  NetworkManager might be up seeking/connecting to network.
2016-12-13 19:22:26 +02:00
f91e9c6a2b
ydns-simple --> ydns6 2016-04-11 15:34:28 +03:00
c2b93abe27 relevant systemd services: after network-online 2015-09-05 09:07:41 +03:00
ae6651cd47 systemd: add reflector.service 2015-08-25 14:13:44 +03:00
bec7aced22 etc/systemd/system: README updates 2015-08-21 19:27:40 +03:00
18931c320a add dnscrypt proxy services
Thanks @Fusl

Fixes #63
2015-08-21 19:09:39 +03:00
dc5531dfcd cleaning etc/systemd/system 2015-08-21 19:06:11 +03:00
2ab0601c8d systemd: remove dnscrypt-proxy & add miredo 2015-08-20 18:29:00 +03:00
b16ae44601 Revert "services: remove unneeded pidfiles"
This reverts commit 98093edc99.

* * * * *

They aren't needed if systemd starts the service, but what if user
services are used together with cron and liching isn't allowed?
2015-07-07 10:10:10 +03:00
1f1d071e5e systemd/network: rename enp… eth0 & timesyncd 2015-06-07 19:12:15 +03:00
47b05e1bd9 fix aliendalvik-stopper.service 2015-05-27 12:09:31 +03:00
4391fb5c19 systemd: aliendalvik-stopper 2015-05-27 12:00:35 +03:00
bf03a22823 systemd/system: update README
https://wiki.freedesktop.org/www/Software/systemd/NetworkTarget/#cutthecraphowdoimakenetwork.targetworkforme
2015-05-23 11:29:18 +03:00
3370327db0 ydns-simple service & timer 2015-05-22 20:15:23 +03:00
17b5596d80 etc: dnscrypt 2015-05-13 22:20:28 +03:00
e9ad27c7ff etc/systemd/network: add enp0s18.network
from Rbtpzn
2015-04-29 10:41:42 +03:00
27d24a81b1 copy ipv6 services 2015-04-23 22:38:30 +03:00
9d5721899e systemd units: add oidentd.socket
With my sysctl config oidentd is IPv6 only unless `BindIPv6Only=both`
is added.
2015-04-22 22:12:06 +03:00
98093edc99 services: remove unneeded pidfiles 2015-02-19 14:30:49 +02:00
ca71eef52e fix supybot.service
ref: #63
2015-02-19 14:16:15 +02:00
766a756914 add untested supybot.service 2015-02-19 14:06:53 +02:00
f54bc8d573 add znc.service
Ref: #63 - based on the included unit file and znc/znc#647
2015-02-19 12:42:45 +02:00