Compare commits

...

5 Commits

5 changed files with 38 additions and 31 deletions

48
chmod
View File

@ -7,36 +7,44 @@ set -x
# You don't want to make this verbose.
chmod g-rwx,o-rwx "$HOME" -R
touch ~/.oidentd.conf
touch $HOME/.oidentd.conf
chmod -v u+rw,g-wx+r,o-wx+r ~/.oidentd.conf
chmod -v u+rw,g-wx+r,o-wx+r $HOME/.oidentd.conf
touch ~/.ICEauthority
chmod -v o-rw+x,g-rw+x ~
touch $HOME/.ICEauthority
chmod -v o-rw+x,g-rw+x $HOME
mkdir -p ~/public_html/
chmod -v -R 755 ~/public_html/
mkdir -p $HOME/public_html/
chmod -v -R 755 $HOME/public_html/
touch ~/.face
touch ~/.forward
touch ~/.netrc
chmod -v a+r-wx,u+rw ~/.face
chmod -v a+r-wx,u+rw ~/.forward
chmod -v 600 ~/.netrc
touch $HOME/.face
touch $HOME/.forward
touch $HOME/.netrc
chmod -v a+r-wx,u+rw $HOME/.face
chmod -v a+r-wx,u+rw $HOME/.forward
chmod -v 600 $HOME/.netrc
mkdir -p ~/.ssh
chmod -v 700 ~/.ssh
touch ~/.ssh/authorized_keys
chmod -v 600 ~/.ssh/authorized_keys
mkdir -p $HOME/.ssh
chmod -v 700 $HOME/.ssh
touch $HOME/.ssh/authorized_keys
chmod -v 600 $HOME/.ssh/authorized_keys
mkdir -p "$HOME/AppImages"
chmod a+rx "$HOME/AppImages/" "$HOME/AppImages/*.appimage"
# if we have support for setting ACL, some of this becomes easier (although maybe redundant)
if hash setfacl 2> /dev/null; then
setfacl --modify u:$(id -un):rw,g:$(id -gn):r,o:r ~/.oidentd.conf
setfacl --recursive --modify u:$(id -un):rwX,g:$(id -gn):rX,o:rX ~/public_html/
setfacl --modify u:$(id -un):rw,g:$(id -gn):r,o:r $HOME/.oidentd.conf
setfacl --modify=u:$(id -un):rwX,g:$(id -gn):rX,o:rX "$HOME/AppImages/"
setfacl --recursive --modify u:$(id -un):rwX,g:$(id -gn):rX,o:rX $HOME/public_html/
for appimage in $(find $HOME/AppImages/*.appimage); do
setfacl --modify=u:$(id -un):rwX,g:$(id -gn):rX,o:rX $appimage
done
# Enabling laziness pt. …
if [[ -d ~/.shell-things ]]; then
setfacl --recursive --modify u:$(id -un):rwX,g:$(id -gn):rX,o:rX ~/.shell-things/
if [[ -d $HOME/.shell-things ]]; then
setfacl --recursive --modify u:$(id -un):rwX,g:$(id -gn):rX,o:rX $HOME/.shell-things/
fi
fi

View File

@ -21,14 +21,23 @@ ExecStartPre=-/usr/bin/systemctl start firewalld.service
ExecStart=-/usr/bin/systemctl enable --now systemd-zram-setup@zram0.service
# Ensure we really allow ICMPv6 on FEDORA (or firewalld). Also other essential services.
ExecStart=-/usr/bin/firewall-cmd --add-protocol=ipv6-icmp
ExecStart=-/usr/bin/firewall-cmd --add-protocol=ipv6-icmp --zone=home
ExecStart=-/usr/bin/firewall-cmd --add-service=ssh --permanent
ExecStart=-/usr/bin/firewall-cmd --add-service=ssh --permanent --zone=home
ExecStart=-/usr/bin/firewall-cmd --add-service=mosh --permanent
ExecStart=-/usr/bin/firewall-cmd --add-service=mosh --permanent --zone=home
ExecStart=-/usr/bin/firewall-cmd --add-service=ntp --permanent
ExecStart=-/usr/bin/firewall-cmd --add-service=ntp --permanent --zone=home
ExecStart=-/usr/bin/firewall-cmd --add-service=syncthing --permanent
ExecStart=-/usr/bin/firewall-cmd --add-service=syncthing --permanent --zone=home
ExecStart=-/usr/bin/firewall-cmd --add-service=mdns --permanent
ExecStart=-/usr/bin/firewall-cmd --add-service=mdns --permanent --zone=home
ExecStart=-/usr/bin/firewall-cmd --add-service=kdeconnect --permanent
ExecStart=-/usr/bin/firewall-cmd --add-service=kdeconnect --permanent --zone=home
ExecStart=-/usr/bin/firewall-cmd --permanent --add-port=9001/udp
ExecStart=-/usr/bin/firewall-cmd --permanent --add-port=9001/udp --zone=home
ExecStart=-/usr/bin/firewall-cmd --permanent --add-port=6771/udp
ExecStart=-/usr/bin/firewall-cmd --permanent --add-port=6771/udp --zone=home
# 3rd party Xbox controller initialization. See Mikaela/gist/gayming/
#ExecStart=-/root/fixcontroller.py
# This is actually in the delayed variant of this service, but anyway

2
package.json vendored
View File

@ -2,6 +2,6 @@
"devDependencies": {
"@aminda/global-prettier-config": "2024.28.4"
},
"packageManager": "pnpm@9.7.0+sha512.dc09430156b427f5ecfc79888899e1c39d2d690f004be70e05230b72cb173d96839587545d09429b55ac3c429c801b4dc3c0e002f653830a420fa2dd4e3cf9cf",
"packageManager": "pnpm@9.7.1+sha512.faf344af2d6ca65c4c5c8c2224ea77a81a5e8859cbc4e06b1511ddce2f0151512431dd19e6aff31f2c6a8f5f2aced9bd2273e1fed7dd4de1868984059d2c4247",
"prettier": "@aminda/global-prettier-config"
}

View File

@ -561,11 +561,6 @@ alias connman-wlans='grep -E "Name|Passphrase" /var/lib/connman/wifi*/settings -
# Meant for SSL certificates (IRC))
alias lowernocolon="tr -d ':' | tr 'A-Z' 'a-z'"
# I don't want to reinstall exact same versions that I have
if hash pacman 2> /dev/null; then
alias pacman="LC_ALL=en_DK.UTF-8 pacman --needed"
fi
# Sailfish Network status, via IRC
alias sailfish-nstatus='dbus-send --system --type=method_call --print-reply --dest=net.connman / net.connman.Manager.GetServices|less'

View File

@ -547,11 +547,6 @@ alias connman-wlans='grep -E "Name|Passphrase" /var/lib/connman/wifi*/settings -
# Meant for SSL certificates (IRC))
alias lowernocolon="tr -d ':' | tr 'A-Z' 'a-z'"
# I don't want to reinstall exact same versions that I have
if hash pacman 2> /dev/null; then
alias pacman="LC_ALL=en_DK.UTF-8 pacman --needed"
fi
# Sailfish Network status, via IRC
alias sailfish-nstatus='dbus-send --system --type=method_call --print-reply --dest=net.connman / net.connman.Manager.GetServices|less'