Compare commits

...

6 Commits

7 changed files with 102 additions and 13 deletions

View File

@ -10,7 +10,7 @@ ci:
default_language_version:
node: "lts"
# Remember .python-version !
python: "3.12"
python: "3.13"
ruby: ".ruby-version"
repos:

View File

@ -1 +1 @@
3.12.4
3.13.0rc2

View File

@ -1,13 +1,16 @@
# see `man dnf.conf` for defaults and possible options
[main]
gpgcheck=1
# The above is the Fedora 41 default config for dnf5. The below is notes on my
# additions to it.
# 3 is the default, increase this in case of kernel upgrade trouble (unrelated
# to space, see dracut.conf.d for that)
#installonly_limit=3
clean_requirements_on_remove=True
# The --best flag could be specified here, but default is False
#best=True
best=False
skip_if_unavailable=True
#skip_if_unavailable=True
# Find the mirror with the lowest ping. While this might be the closest
# mirror, this won't consider the available bandwidth which may result into
@ -32,6 +35,3 @@ max_parallel_downloads=6
# Zaldaryn has small root partition and cannot cache enough for family
# booting it with long intervals
#cachedir=/home/dnfcache/
# More verbose output
debuglevel=10

View File

@ -5,6 +5,7 @@ Wants=sysctl-p--system.service
[Service]
Type=oneshot
TimeoutStartSec=infinity
Environment=LINUXBREWUSER=root
Environment=LINUXBREWGROUP=wheel
ExecStartPre=-/usr/bin/echo 1 > /sys/devices/system/cpu/microcode/reload
# - means it can fail, without failing those after it.
@ -49,7 +50,7 @@ ExecStart=-/usr/bin/systemctl enable --now unbound.service
ExecStart=-/usr/bin/systemctl enable --now chrony.service
ExecStart=-/usr/bin/systemctl enable --now chronyd.service
ExecStart=-/usr/bin/systemctl enable --now systemd-oomd.service systemd-oomd.socket
ExecStart=-/bin/chown -R root:${LINUXBREWGROUP} /home/linuxbrew -R
ExecStart=-/bin/chown -R ${LINUXBREWUSER}:${LINUXBREWGROUP} /home/linuxbrew -R
ExecStart=-/bin/chmod -R u+rw,g+rw,o+r /home/linuxbrew
ExecStart=-/bin/setfacl -R -m g:${LINUXBREWGROUP}:rwX,o:rX /home/linuxbrew
User=root

View File

@ -1,5 +1,7 @@
# in case linuxbrew users have a group separate from wheel, this is the place
# to specify it.
[Service]
Environment=LINUXBREWUSER=
Environment=LINUXBREWUSER=root
Environment=LINUXBREWGROUP=
Environment=LINUXBREWGROUP=linuxbrew

View File

@ -0,0 +1,86 @@
# This file attempts to send zones belonging to DNS operators to their DNS servers.
# Inclusion criteria: I know and use the service.
server:
# Debian ca-certificates location
#tls-cert-bundle: /etc/ssl/certs/ca-certificates.crt
# Fedora
#tls-cert-bundle: /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem
# Use system certificates no matter where they are
tls-system-cert: yes
# Quad9 says pointless performance impact on forwarders.
# https://docs.quad9.net/Quad9_For_Organizations/DNS_Forwarder_Best_Practices/#disable-qname-minimization
qname-minimisation: no
forward-zone:
name: "google"
forward-tls-upstream: yes
# Must be explicit forward-addr for dns.google to be found
forward-addr: 2001:4860:4860::8844@853#dns.google
forward-addr: 2001:4860:4860::8888@853#dns.google
forward-addr: 8.8.4.4@853#dns.google
forward-addr: 8.8.8.8@853#dns.google
forward-zone:
name: "google.fi"
forward-tls-upstream: yes
forward-host: dns.google@853#dns.google
forward-zone:
name: "google.com"
forward-tls-upstream: yes
forward-host: dns.google@853#dns.google
forward-zone:
name: "youtube.com"
forward-tls-upstream: yes
forward-host: dns.google@853#dns.google
forward-zone:
name: "youtube-nocookie.com"
forward-tls-upstream: yes
forward-host: dns.google@853#dns.google
forward-zone:
name: "youtu.be"
forward-tls-upstream: yes
forward-host: dns.google@853#dns.google
forward-zone:
name: "googlevideo.com"
forward-tls-upstream: yes
forward-host: dns.google@853#dns.google
forward-zone:
name: "ytimg.com"
forward-tls-upstream: yes
forward-host: dns.google@853#dns.google
# forward-zone:
# name: "googleusercontent.com"
# forward-tls-upstream: yes
# forward-host: dns.google@853#dns.google
forward-zone:
name: "gstatic.com"
forward-tls-upstream: yes
forward-host: dns.google@853#dns.google
forward-zone:
name: "cloudflare-dns.com"
# Must be explicit for forward-addr
forward-addr: 2606:4700:4700::1112@853#security.cloudflare-dns.com
forward-addr: 2606:4700:4700::1002@853#security.cloudflare-dns.com
forward-addr: 1.1.1.2@853#security.cloudflare-dns.com
forward-addr: 1.0.0.2@853#security.cloudflare-dns.com
forward-zone:
name: "cloudflare.com"
forward-host: security.cloudflare-dns.com@853#security.cloudflare-dns.com
forward-zone:
name: "one.one"
forward-host: security.cloudflare-dns.com@853#security.cloudflare-dns.com
# vim: filetype=unbound.conf

View File

@ -9,26 +9,26 @@ server:
qname-minimisation: no
forward-zone:
name: "router.asus.com."
name: "router.asus.com"
forward-tls-upstream: no
forward-addr: 193.110.81.9
forward-addr: 185.253.5.9
forward-zone:
name: "tplinkrepeater.net."
name: "tplinkrepeater.net"
forward-tls-upstream: no
forward-addr: 193.110.81.9
forward-addr: 185.253.5.9
# Netgear
forward-zone:
name: "mywifiext.net."
name: "mywifiext.net"
forward-tls-upstream: no
forward-addr: 193.110.81.9
forward-addr: 185.253.5.9
forward-zone:
name: "norwegianwifi.com."
name: "norwegianwifi.com"
forward-tls-upstream: no
forward-addr: 193.110.81.9
forward-addr: 185.253.5.9