Compare commits

...

8 Commits

21 changed files with 67 additions and 20 deletions

View File

@ -11,7 +11,10 @@
"chat.pikaviestin.fi",
"webchat.disroot.org",
"learn.microsoft.com",
"teams.microsoft.com"
"teams.microsoft.com",
"bittimittari.fi",
"pp-attester-turnstile.research.cloudflare.com",
"keyoxide.org"
],
"learnInIncognito": true,
"learnLocally": true,
@ -103,7 +106,7 @@
},
"{446900e4-71c2-419f-a6a7-df9c091e268b}": {
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/bitwarden-password-manager/latest.xpi",
"installation_mode": "normal_installed"
"installation_mode": "force_installed"
},
"{48748554-4c01-49e8-94af-79662bf34d50}": {
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/privacy-pass/latest.xpi",

View File

@ -30,6 +30,7 @@
- [UpdateSWH](#updateswh)
- [Privacy Badger](#privacy-badger)
- [TODO/Inconsistencies](#todoinconsistencies)
- [`black-theme-colour.json`](#black-theme-colourjson)
- [`brave-shields-disabled.json`](#brave-shields-disabledjson)
- [`disable-brave-rewards-wallet.json`](#disable-brave-rewards-walletjson)
- [`disable-brave-tor.json`](#disable-brave-torjson)
@ -223,6 +224,11 @@ See also:
integrated feature on some Chromiums.
- [Peertubeify doesn't support Chromium yet.](https://codeberg.org/Booteille/peertube-companion/issues/15)
## `black-theme-colour.json`
Sets the theme colour as black. This is managed instead of recommended,
because even the recommended policy seems to block theme changing.
## `brave-shields-disabled.json`
Allowlist for sites where I think Brave Shields may be breaking things. Similar is also in

View File

@ -11,7 +11,9 @@
"webchat.disroot.org",
"learn.microsoft.com",
"teams.microsoft.com",
"bittimittari.fi"
"bittimittari.fi",
"pp-attester-turnstile.research.cloudflare.com",
"keyoxide.org"
],
"learnInIncognito": true,
"learnLocally": true,
@ -130,7 +132,7 @@
"update_url": "https://clients2.google.com/service/update2/crx"
},
"nngceckbapebfimnlniiiahkandclblb": {
"installation_mode": "normal_installed",
"installation_mode": "force_installed",
"override_update_url": true,
"toolbar_pin": "force_pinned",
"update_url": "https://clients2.google.com/service/update2/crx"

View File

@ -0,0 +1,3 @@
{
"BrowserThemeColor": "#000000"
}

View File

@ -9,6 +9,8 @@
"https://teams.microsoft.com",
"https://glowing-bear.org",
"https://latest.glowing-bear.org",
"https://bittimittari.fi"
"https://bittimittari.fi",
"pp-attester-turnstile.research.cloudflare.com",
"keyoxide.org"
]
}

View File

@ -8,7 +8,9 @@
<!-- START doctoc generated TOC please keep comment here to allow auto update -->
<!-- DON'T EDIT THIS SECTION, INSTEAD RE-RUN doctoc TO UPDATE -->
- [`apps-as-homepage.json`](#apps-as-homepagejson)
- [`brave-search.json`](#brave-searchjson)
- [`disable-default-browser-check.json`](#disable-default-browser-checkjson)
- [`duckduckgo.json`](#duckduckgojson)
- [`enable-home.json`](#enable-homejson)
- [`README.md`](#readmemd)
@ -18,10 +20,21 @@
<!-- prettier-ignore-end -->
<!-- editorconfig-checker-enable -->
## `apps-as-homepage.json`
Sets the new tab page to `chrome://apps` and homepage as the new tab page.
However regardless of allowing the user to change homepage, the new tab page
won't change.
## `brave-search.json`
Sets and displays recommendation on the use of search.brave.com as a search engine by default.
## `disable-default-browser-check.json`
Disables checking whether the browser is set as default, but due to being a
suggested policy, allows the user to set as default in browser settings.
## `duckduckgo.json`
Sets and displays recommendation on the use of start.duckduckgo.com as a search engine by default.

View File

@ -0,0 +1,4 @@
{
"HomepageIsNewTabPage": true,
"NewTabPageLocation": "chrome://apps"
}

View File

@ -0,0 +1,3 @@
{
"DefaultBrowserSettingEnabled": false
}

View File

@ -15,4 +15,8 @@
# Clearing DNS caches once we are disconnected
%nordvpn ALL=NOPASSWD: /bin/systemctl restart unbound.service
%nordvpn ALL=NOPASSWD: /bin/systemctl restart systemd-resolved.service
# Tor complains about failures for a while and then notes IP change and
# regenerates keys, so it should probably be here too.
%nordvpn ALL=NOPASSWD: /bin/systemctl restart tor.service
%nordvpn ALL=NOPASSWD: /bin/systemctl restart tor-client.service
# vim: filetype=sudoers

View File

@ -0,0 +1,3 @@
firewalld-icmpv6.conf
never-fail.conf
restore-ipv6.conf

View File

@ -0,0 +1 @@
../service.d/firewalld-icmpv6.conf

View File

@ -0,0 +1 @@
../service.d/never-fail.conf

View File

@ -0,0 +1 @@
../service.d/restore-ipv6.conf

View File

@ -0,0 +1,4 @@
firewalld-icmpv6.conf
never-fail.conf
restore-ipv6.conf
systemd-debug-log.conf

View File

@ -0,0 +1 @@
../service.d/firewalld-icmpv6.conf

View File

@ -0,0 +1 @@
../service.d/restore-ipv6.conf

View File

@ -1,7 +1,8 @@
[Unit]
Description=IPFS daemon
After=network.target mullvad-connect.service
Wants=mullvad-connect.service
#Requires=mullvad-connect.service
#Requires=nordvpnd.service
# IMPORTANT! If you are running on a VPS/dedicated/similar
# `ipfs init --profile=server` or immediately after setting it up

View File

@ -1,7 +1,7 @@
[Unit]
Description=Connect Mullvad VPN on user login
After=mullvad-daemon.service network-online.target dbus.socket
Wants=mullvad-daemon.service network-online.target dbus.socket
Requires=mullvad-daemon.service network-online.target dbus.socket
[Service]
Type=forking

View File

@ -1,7 +1,7 @@
[Unit]
Description=Connect NordVPN on user login
After=nordvpnd.service network-online.target dbus.socket
Wants=nordvpnd.service network-online.target dbus.socket
Requires=nordvpnd.service network-online.target dbus.socket
[Service]
Type=forking

View File

@ -1,12 +0,0 @@
[Unit]
# This is just copied from the Debian package
Description=Transmission BitTorrent Daemon
[Service]
Type=notify
ExecStart=/usr/bin/transmission-daemon -f --log-error
ExecStop=/bin/kill -s STOP $MAINPID
ExecReload=/bin/kill -s HUP $MAINPID
[Install]
WantedBy=default.target

View File

@ -0,0 +1,6 @@
[Google-Chrome]
name=Google Chrome
baseurl=https://dl.google.com/linux/chrome/rpm/stable/$basearch/
enabled=1
gpgcheck=1
gpgkey=https://dl.google.com/linux/linux_signing_key.pub