Compare commits

...

5 Commits

7 changed files with 16 additions and 14 deletions

View File

@ -264,14 +264,14 @@
"blocked_install_message": "Adaptive Tab Bar Colour",
"default_area": "menupanel",
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/adaptive-tab-bar-colour/latest.xpi",
"installation_mode": "force_installed",
"installation_mode": "normal_installed",
"private_browsing": true
},
"CanvasBlocker@kkapsner.de": {
"blocked_install_message": "CanbasBlocker. Requested by LibreAwoo for those who don't have RFP/FPP, neither of which I can specify through this policy, while the description says it's compatible with the default one. However incompatible with JShelter (I think).",
"default_area": "menupanel",
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/canvasblocker/latest.xpi",
"installation_mode": "blocked",
"installation_mode": "allowed",
"private_browsing": true,
"restricted_domains": []
},
@ -294,7 +294,7 @@
"blocked_install_message": "Chrome Mask",
"default_area": "navbar",
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/chrome-mask/latest.xpi",
"installation_mode": "force_installed",
"installation_mode": "normal_installed",
"private_browsing": false
},
"goeuropean@example.com": {
@ -331,7 +331,7 @@
"default_area": "navbar",
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/terms-of-service-didnt-read/latest.xpi",
"installation_mode": "force_installed",
"private_browsing": false
"private_browsing": true
},
"jid1-MnnxcxisBPnSXQ-eff@jetpack": {
"blocked_install_message": "PrivacyBadger (eff.org). Already installed from AMO",
@ -507,7 +507,7 @@
"blocked_install_message": "IG Plus. Options to disable algorhitms and other annoyances while begrudgingly using instagram.com",
"default_area": "menupanel",
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/igplus-extension/latest.xpi",
"installation_mode": "normal_installed",
"installation_mode": "allowed",
"private_browsing": false
},
"{90b8ecca-860a-4f1c-8476-e181df2cf635}": {
@ -521,7 +521,7 @@
"blocked_install_message": "Tor Snowflake proxy (for prividing the proxy for others)",
"default_area": "navbar",
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/torproject-snowflake/latest.xpi",
"installation_mode": "allowed",
"installation_mode": "normal_installed",
"private_browsing": false
},
"{b5501fd1-7084-45c5-9aa6-567c2fcf5dc6}": {
@ -535,7 +535,7 @@
"blocked_install_message": "LocalCDN",
"default_area": "navbar",
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/localcdn-fork-of-decentraleyes/latest.xpi",
"installation_mode": "normal_installed",
"installation_mode": "allowed",
"private_browsing": true,
"restricted_domains": []
},

View File

@ -60,6 +60,7 @@ ln -nsfv /etc/firefox /etc/firefox-esr
# Chromium
mkdir -vp /etc/opt/chromium/policies/{managed,recommended}
cp opt/chromium/policies/managed/aminda-extensions.json /etc/opt/chromium/policies/managed/
setfacl --recursive --modify=u:root:rwX,g:root:rwX,o:rX /etc/opt/chromium/policies
chmod -v a+rx /etc/opt/chromium/policies/
chmod -v a+rx /etc/opt/chromium/policies/{managed,recommended}/

View File

@ -392,7 +392,7 @@
},
"hojggiaghnldpcknpbciehjcaoafceil": {
"blocked_install_message": "Fedora User Agent",
"installation_mode": "allowed",
"installation_mode": "normal_installed",
"override_update_url": true,
"toolbar_pin": "default_unpinned",
"update_url": "https://clients2.google.com/service/update2/crx"
@ -413,7 +413,7 @@
},
"ldpochfccmkkmhdbclfhpagapcfdljkj": {
"blocked_install_message": "DecentralEyes (ManifestV3?)",
"installation_mode": "normal_installed",
"installation_mode": "allowed",
"override_update_url": true,
"toolbar_pin": "force_pinned",
"update_url": "https://clients2.google.com/service/update2/crx"
@ -427,7 +427,7 @@
},
"mafpmfcccpbjnhfhjnllmmalhifmlcie": {
"blocked_install_message": "Tor Snowflake",
"installation_mode": "allowed",
"installation_mode": "normal_installed",
"override_update_url": true,
"toolbar_pin": "default_unpinned",
"update_url": "https://clients2.google.com/service/update2/crx"
@ -448,7 +448,7 @@
},
"njdfdhgcmkocbgbhcioffdbicglldapd": {
"blocked_install_message": "LocalCDN (ManifestV2?)",
"installation_mode": "normal_installed",
"installation_mode": "allowed",
"override_update_url": true,
"toolbar_pin": "force_pinned",
"update_url": "https://clients2.google.com/service/update2/crx"

View File

@ -191,6 +191,7 @@ if [ "$(id -u)" == "0" ]; then
if hash systemctl 2> /dev/null; then
systemctl daemon-reload
(systemctl --global enable darkman.service &)
# SECURITY WARNING! Practically a backdoor unless you are me and expect this!
# WARNING! Likely breaks SSHd outside of port 22 unless override exists!
(systemctl --global enable foot-server.socket &)

2
package.json vendored
View File

@ -9,6 +9,6 @@
"prettier-plugin-sh": "0.18.0",
"prettier-plugin-toml": "2.0.6"
},
"packageManager": "pnpm@10.15.1+sha512.34e538c329b5553014ca8e8f4535997f96180a1d0f614339357449935350d924e22f8614682191264ec33d1462ac21561aff97f6bb18065351c162c7e8f6de67",
"packageManager": "pnpm@10.17.0+sha512.fce8a3dd29a4ed2ec566fb53efbb04d8c44a0f05bc6f24a73046910fb9c3ce7afa35a0980500668fa3573345bd644644fa98338fa168235c80f4aa17aa17fbef",
"prettier": "@aminda/global-prettier-config"
}

View File

@ -704,7 +704,7 @@ if ! hash btraceback 2> /dev/null; then
fi
if hash rg 2> /dev/null; then
if hash batgrep 2> /dev/null; then
alias grep=batgrep
alias bgrep=batgrep
fi
fi
if hash batman 2> /dev/null; then

View File

@ -692,7 +692,7 @@ if ! hash btraceback 2> /dev/null; then
fi
if hash rg 2> /dev/null; then
if hash batgrep 2> /dev/null; then
alias grep=batgrep
alias bgrep=batgrep
fi
fi
if hash batman 2> /dev/null; then