c1768cae67
systemd: "rewrite" supybot -> limnoria, move znc, rmdir irc/
2021-05-16 18:00:31 +03:00
306270c441
etc/systemd: rm cjdns & miredo, I am unlikely to use them again
2021-05-16 11:15:34 +03:00
c8e89a5817
systemd: add coredump.conf.d/biggercores.conf
2021-02-18 14:47:23 +02:00
a0c61231f4
systemd/resolved.conf.d: add snopyta-strict.conf
...
While posting an example how I would do it I might as well put it here
2021-02-10 16:12:42 +02:00
b20f3367b1
systemd/yggdrasil: add mullvad-exclude (& fix chrony override typo)
2020-12-09 09:38:49 +02:00
40d535f2c0
systemd/chrony.service.d/mullvad-exclude: actually fix this
2020-12-08 18:36:34 +02:00
0c7038da14
systemd: systemd-resolved.service.d/unbound.conf: After unbound
2020-10-30 10:19:39 +02:00
fe83cbbb3a
systemd: add config for excluding Chrony from Mullvad
2020-10-30 08:04:58 +02:00
993759577e
Bind systemd-resolved to Unbound
2020-10-25 09:05:07 +02:00
1e70d7d4d7
etc/systemd-resolved&unbound: add Quad9 ECS configs
...
Untested. The last time I saw the documentation, they didn't mention
DoT.
2020-10-21 17:09:20 +03:00
31a15a9abc
systemd-resolved & unbound: update AdGuard IPs
...
Resolves : #81
2020-09-27 14:34:54 +03:00
cf8dc85ec0
systemd/timesyncd.conf.d: add cloudflare.conf
2020-08-09 10:51:36 +03:00
82cf5e7742
systemd/resolved.conf.d: add generic NextDNS confs
2020-08-09 00:07:06 +03:00
73fb88e11d
systemd-resolved.conf.d: everywhere -> 00-everywhere
2020-07-24 12:16:31 +03:00
69f55cd724
systemd/resolved: adguard-strict -> adguard-dot
2020-07-18 14:05:36 +03:00
550b68d149
etc/systemd/resolved: add [adguard,cloudflare}-strict.conf
...
I am not actually using either though and I am not sure if I will,
but maybe they are nice to have as a backup here just in case.
2020-07-18 02:20:56 +03:00
b3cb953b9c
systemd/resolved: add a comment to everywhere.conf too
...
as every other file explains who it is for, why not this
2020-07-04 19:09:26 +03:00
0ae22081a0
etc/systemd-resolved: rework all files more or less
...
* explain things in README.md, don't duplicate comments
* opportunistic-insecure.conf should be used everywhere by default, so
thus it's now everywhere.conf. However I am yet to test it does what
I expect, so this is bad case of testing in production or after
committing it in general.
2020-07-04 19:06:18 +03:00
7a73088beb
systemd/resolved.conf.d/quad9*.conf: enable SNI
2020-06-26 12:22:09 +03:00
bce9af0edd
resolved.conf: add quad9-compat.conf
2020-06-26 12:22:09 +03:00
d1fc83913b
systemd/user: add ipfs, transmission-daemon (from system)
2020-03-30 08:42:06 +03:00
b217baaec9
systemd/system: update syncplay-server.service
...
It never got the TLS flag apparently
2020-03-27 18:02:34 +02:00
64d5fef6f3
ipfs.service: point to the new meta issue
2020-02-29 18:03:32 +02:00
b125fc1804
etc/systemd/resolved.conf.d: general.conf -> opportunistic-insecure.conf
2020-02-21 19:03:56 +02:00
da2f090f56
logind.conf.d/lidclose.conf: mention systemd-rfkill, ref: #51
2020-02-03 22:41:47 +02:00
c0399054bb
etc/systemd/login.conf.d/lidclose.conf: ignore lid close
2020-02-03 19:36:05 +02:00
4e93c66d67
systemd/resolved.conf.d/quad9: expand on versions
2019-11-02 18:37:12 +02:00
b3dc6ced51
systemd: initial i2pd.service & .d/override.conf
...
Begins #38
2019-09-15 13:52:57 +03:00
c91b1b97a9
systemd/system: add unit file for etherpad-lite
...
Closes : #27
2019-08-29 13:10:55 +03:00
56b5b905e2
fix github link, closes #16
2019-08-18 02:05:52 +03:00
a915db9f8a
etc/systemd: tor-services: add ExecReload
...
I am running `systemctl restart tor-client` too often to be comfortable.
2019-06-30 14:11:34 +03:00
5128e8646a
ipfs.service: use dht routing instead of dhtclient routing
2019-06-11 01:17:22 +03:00
85bd70f382
etc/systemd/system/ipfs: important notice for VPS/dedi/etc.
2019-06-11 01:12:28 +03:00
d2bd2be652
systemd/zeronet.service: use Python 3 & always use Tor
2019-05-05 20:28:14 +03:00
8e01a42c62
etc: systemd & tor: add tor-onehoponion (and torrc-relay)
2019-05-04 17:26:57 +03:00
9c8cf613cd
etc/systemd: add tor-client.service & tor: add torrc-client
2019-05-03 12:31:33 +03:00
4c2b21bbfa
ipfs.service: add routing note
2019-05-01 23:30:12 +03:00
ce84c26bcd
ipfs.service: adapt lowpower profile & mention badgerds
...
If the lowpower option uses values 40 and 20 which are a lot higher than
mine were and considered suitable for laptops and smartphones, I guess
they are the best for me to use and I find content faster.
2019-04-23 13:51:18 +03:00
6981481c77
ipfs.service: add options I forgot before
2019-03-26 22:26:25 +02:00
3ecfc2473d
ipfs.service: document my IPFS config
...
Closes #111
2019-03-26 22:05:52 +02:00
466a7bc2c1
etc/systemd/resolved.conf.d: add some configs
...
These aren't seeing real world usage though as the only host not running
dnscrypt-proxy has too old systemd.
2019-03-25 13:41:23 +02:00
f336393db9
systemd preset: enable pcscd for FINEID
2019-02-28 13:00:42 +02:00
81fcfb539d
systemd preset: Zaldaryn additions
2019-02-28 12:17:07 +02:00
758d4302ac
systemd preset: remove cjdns, enable ssh.service
2019-02-28 12:10:14 +02:00
d406334560
systemd preset: enable TTY & cups
2019-02-17 21:07:10 +02:00
5fe9477c55
etc/systemd: add ipfs.service & zeronet.service
...
Closes #101
2019-02-12 20:32:40 +02:00
993d3f6994
systemd preset: enable yggdrasil-resume
2019-02-08 10:21:14 +02:00
d27cc15888
add systemd-preset
2019-01-21 18:41:36 +02:00
4f99f6ebed
syncplay-server.service: ccxcz's endpoints ExecStart just in case
2018-11-24 20:36:17 +02:00
c57d5443ab
add systemd unit for syncplay-server
2018-11-23 17:23:38 +02:00
534f34a5bc
add override.conf for tor.service for allowing binding to 80/443
...
It took me some time a few days ago to figure out this (and notice that
port 80 was already used by automatically installed Apache that was
doing nothing).
I have understood that ports 443 (Orport) and 80 (Dirport) are the best
for users behind strict firewalls especially if they aren't needed for
anything else on the system running Tor relay.
2018-10-12 23:10:48 +03:00
d1151aaf8c
etc/systemd: rm -r dnscrypt/
...
Dnscrypt-proxy appears to handle multiple servers by itself nowadays and
does it in the config file. The servers listed may also be down.
Ref: #92 where I remembered these files still being here.
2018-10-08 20:25:09 +03:00
06d5ff55d0
etc/systemd/system: add cjdns/
2018-10-05 13:27:35 +03:00
1ba8dd4137
systemd: snapd.refresh.service override
...
It fails on laptops thanks to not being able to do DNS resolution thanks
to network connection not existing during boot.
Now it fails to `Download snap "ubuntu-core" (423) from channel "stable"
(cannot authenticate to snap store: Provided email/password is not
correct.)` which is process and appears to not be my issue.
2016-12-13 19:30:32 +02:00
56de53ee30
systemd: only override issues with stock units
...
Only oidentd.socket and miredo.service were copied instead of being
units that exist in the system and they don't need to do anything
else than fix the issue I have with the stock units.
* oidentd.socket is IPv6-only on my systems unless is BindIPv6Only=both.
because of net.ipv6.bindv6only=1
* miredo.service is here because it starts before there is network
connection (network-online.target) and there is never network
connection with laptops before they are connected to WLAN even if
NetworkManager might be up seeking/connecting to network.
2016-12-13 19:22:26 +02:00
f91e9c6a2b
ydns-simple --> ydns6
2016-04-11 15:34:28 +03:00
c2b93abe27
relevant systemd services: after network-online
2015-09-05 09:07:41 +03:00
ae6651cd47
systemd: add reflector.service
2015-08-25 14:13:44 +03:00
bec7aced22
etc/systemd/system: README updates
2015-08-21 19:27:40 +03:00
18931c320a
add dnscrypt proxy services
...
Thanks @Fusl
Fixes #63
2015-08-21 19:09:39 +03:00
dc5531dfcd
cleaning etc/systemd/system
2015-08-21 19:06:11 +03:00
2ab0601c8d
systemd: remove dnscrypt-proxy & add miredo
2015-08-20 18:29:00 +03:00
b16ae44601
Revert "services: remove unneeded pidfiles"
...
This reverts commit 98093edc99
.
* * * * *
They aren't needed if systemd starts the service, but what if user
services are used together with cron and liching isn't allowed?
2015-07-07 10:10:10 +03:00
1f1d071e5e
systemd/network: rename enp… eth0 & timesyncd
2015-06-07 19:12:15 +03:00
47b05e1bd9
fix aliendalvik-stopper.service
2015-05-27 12:09:31 +03:00
4391fb5c19
systemd: aliendalvik-stopper
2015-05-27 12:00:35 +03:00
bf03a22823
systemd/system: update README
...
https://wiki.freedesktop.org/www/Software/systemd/NetworkTarget/#cutthecraphowdoimakenetwork.targetworkforme
2015-05-23 11:29:18 +03:00
3370327db0
ydns-simple service & timer
2015-05-22 20:15:23 +03:00
17b5596d80
etc: dnscrypt
2015-05-13 22:20:28 +03:00
e9ad27c7ff
etc/systemd/network: add enp0s18.network
...
from Rbtpzn
2015-04-29 10:41:42 +03:00
27d24a81b1
copy ipv6 services
2015-04-23 22:38:30 +03:00
9d5721899e
systemd units: add oidentd.socket
...
With my sysctl config oidentd is IPv6 only unless `BindIPv6Only=both`
is added.
2015-04-22 22:12:06 +03:00
98093edc99
services: remove unneeded pidfiles
2015-02-19 14:30:49 +02:00
ca71eef52e
fix supybot.service
...
ref: #63
2015-02-19 14:16:15 +02:00
766a756914
add untested supybot.service
2015-02-19 14:06:53 +02:00
f54bc8d573
add znc.service
...
Ref: #63 - based on the included unit file and znc/znc#647
2015-02-19 12:42:45 +02:00