Compare commits

..

No commits in common. "429e73f4fc05378926ffd7d1752b45ebbcff1158" and "d017de37407dc26a0e5f8d8c7435024d6967aa4f" have entirely different histories.

5 changed files with 21 additions and 26 deletions

View File

@ -71,7 +71,7 @@ repos:
# GitHub Actions etc. configuration validity checking
- repo: https://github.com/python-jsonschema/check-jsonschema
rev: 0.31.1
rev: 0.31.0
hooks:
#- id: check-jsonschema
- id: check-dependabot
@ -96,7 +96,7 @@ repos:
# .editorconfig validity checking
- repo: https://github.com/editorconfig-checker/editorconfig-checker.python
rev: "3.2.0"
rev: "3.0.3"
hooks:
- id: editorconfig-checker
alias: ec

View File

@ -29,9 +29,7 @@
"disableFirstRunPage": true,
"noFiltering": [
"ecosia.org",
"cloudflare.com",
"google.com",
"mail.google.com"
"cloudflare.com"
]
},
"uBlock0@raymondhill.net": {
@ -41,8 +39,6 @@
"challenges.cloudflare.com",
"ecosia.org",
"firefox.com",
"google.com",
"mail.google.com",
"mozilla.net",
"mozilla.org",
"moz-extension-scheme",
@ -59,6 +55,9 @@
"https://www.eff.org/files/effdntlist.txt",
"https://gitea.blesmrt.net/mikaela/gist/raw/branch/master/DNS/blocklist.txt",
"https://raw.githubusercontent.com/DandelionSprout/adfilt/master/LegitimateURLShortener.txt",
"https://raw.githubusercontent.com/jjjxu/NSO_Pegasus_Blocklist/master/Pegasus-Hosts-Formatted.txt",
"https://dl.red.flag.domains/adguard/red.flag.domains.txt",
"https://raw.githubusercontent.com/olbat/ut1-blacklists/master/blacklists/malware/domains",
"https://big.oisd.nl",
"curben-phishing",
"ublock-filters",
@ -223,7 +222,7 @@
},
"uBlock0@raymondhill.net": {
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi",
"installation_mode": "normal_installed"
"installation_mode": "force_installed"
},
"{2f182d41-fd03-4a6d-938d-081419586c37}": {
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/google-analytics-opt-out/latest.xpi",
@ -446,11 +445,6 @@
"Type": "boolean",
"Value": false
},
"browser.tabs.closeTabByDblclick": {
"Status": "default",
"Type": "boolean",
"Value": true
},
"browser.tabs.closeWindowWithLastTab": {
"Status": "default",
"Type": "boolean",
@ -968,7 +962,7 @@
},
"sidebar.verticalTabs": {
"Comment": "Preference not allowed for stability reasons.",
"Status": "default",
"Status": "locked",
"Type": "boolean",
"Value": true
},

View File

@ -14,8 +14,6 @@
"challenges.cloudflare.com",
"ecosia.org",
"firefox.com",
"google.com",
"mail.google.com",
"mozilla.net",
"mozilla.org",
"moz-extension-scheme",
@ -32,6 +30,9 @@
"https://www.eff.org/files/effdntlist.txt",
"https://gitea.blesmrt.net/mikaela/gist/raw/branch/master/DNS/blocklist.txt",
"https://raw.githubusercontent.com/DandelionSprout/adfilt/master/LegitimateURLShortener.txt",
"https://raw.githubusercontent.com/jjjxu/NSO_Pegasus_Blocklist/master/Pegasus-Hosts-Formatted.txt",
"https://dl.red.flag.domains/adguard/red.flag.domains.txt",
"https://raw.githubusercontent.com/olbat/ut1-blacklists/master/blacklists/malware/domains",
"https://big.oisd.nl",
"curben-phishing",
"ublock-filters",
@ -54,9 +55,7 @@
"disableFirstRunPage": true,
"noFiltering": [
"ecosia.org",
"cloudflare.com",
"google.com",
"mail.google.com"
"cloudflare.com"
]
},
"mlojlfildnehdpnlmpkeiiglhhkofhpb": {
@ -101,7 +100,7 @@
}
}
},
"ExtensionManifestV2Availability": 3,
"ExtensionManifestV2Availability": 2,
"ExtensionManifestV2Availability_comment": "0 for default, 1 for disable, 2 for enable, 3 for those extensions specified here.",
"ExtensionSettings": {
"ajhmfdgkijocedmfjonnpjfojldioehi": {
@ -129,7 +128,7 @@
"update_url": "https://clients2.google.com/service/update2/crx"
},
"cjpalhdlnbpafiamejdnhcphjbkeiagm": {
"installation_mode": "normal_installed",
"installation_mode": "force_installed",
"override_update_url": true,
"toolbar_pin": "force_pinned",
"update_url": "https://clients2.google.com/service/update2/crx"

View File

@ -1,12 +1,12 @@
[Unit]
Description=Monthly BTRFS full balancing
After=aminda-duperemove.service
Conflicts=aminda-duperemove.service
[Service]
Type=oneshot
TimeoutStartSec=infinity
# Contained in `systemd-path search-binaries-default`
ExecStartPre=-btrfs balance cancel /
ExecStart=btrfs balance start --full-balance /
User=root
StandardOutput=journal

View File

@ -1,20 +1,20 @@
[Unit]
Description=IPFS daemon
After=network.target
#After=mullvad-connect.service
After=network.target mullvad-connect.service
#Requires=mullvad-connect.service
#Requires=nordvpnd.service
# IMPORTANT! If you are running on a VPS/dedicated/similar
# `ipfs init --profile=server` or immediately after setting it up
# `ipfs config profile apply server`.
# `ipfs profile apply server`.
# I would probably recommend `ipfs init --profile=badgerds && ipfs profile apply server`
# REF: https://github.com/ipfs/go-ipfs/issues/4343 "Running IPFS on VPS
# (closed in favour of https://github.com/ipfs/go-ipfs/issues/6932
# "[META] Private Addresses In Public")
# providers triggers netscan detection, risking account termination"
[Service]
ExecStart=/home/linuxbrew/.linuxbrew/bin/ipfs daemon --routing=dht --enable-gc --enable-namesys-pubsub
ExecStart=/home/mikaela/go/bin/ipfs daemon --routing=dht --enable-gc --enable-namesys-pubsub
# My attempts at explaining flags above + --mount for fuse
# --mount - fuse for /ipfs and /ipns, see
@ -53,6 +53,8 @@ ExecStart=/home/linuxbrew/.linuxbrew/bin/ipfs daemon --routing=dht --enable-gc -
# dht everywhere if that isn't a problem. dht also breaks
# LowWater/HighWater limits.
#
# I am using badger datastore.
#
# Extra: to disable IPv4 connections:
# ipfs swarm filters add /ip4/0.0.0.0/ipcidr/0
# However I think this may do more harm than good, especially if the