diff options
author | Ryan Kavanagh <rak@rak.ac> | 2024-09-08 12:16:31 -0400 |
---|---|---|
committer | Ryan Kavanagh <rak@rak.ac> | 2024-09-08 12:16:31 -0400 |
commit | fd7a467d8430682ad665a3db0b6e60aeea4c721f (patch) | |
tree | 4373c8b19ea2761008937a3b6c6e8fcc8cf31ddf /dot_config/systemd | |
parent | install wc-mode (diff) |
swaybg randomize background hourly
Diffstat (limited to '')
-rw-r--r-- | dot_config/systemd/user/default.target.wants/symlink_swaybg-random.service | 1 | ||||
-rw-r--r-- | dot_config/systemd/user/hourly@.timer | 10 | ||||
-rw-r--r-- | dot_config/systemd/user/swaybg-random.service | 12 | ||||
-rw-r--r-- | dot_config/systemd/user/tmpreaper@.service | 38 | ||||
-rw-r--r-- | dot_config/systemd/user/tmpreaper@.timer | 11 |
5 files changed, 72 insertions, 0 deletions
diff --git a/dot_config/systemd/user/default.target.wants/symlink_swaybg-random.service b/dot_config/systemd/user/default.target.wants/symlink_swaybg-random.service new file mode 100644 index 0000000..2ebb1f9 --- /dev/null +++ b/dot_config/systemd/user/default.target.wants/symlink_swaybg-random.service @@ -0,0 +1 @@ +/home/rak/.config/systemd/user/swaybg-random.service diff --git a/dot_config/systemd/user/hourly@.timer b/dot_config/systemd/user/hourly@.timer new file mode 100644 index 0000000..0b3a0db --- /dev/null +++ b/dot_config/systemd/user/hourly@.timer @@ -0,0 +1,10 @@ +[Unit] +Description=Hourly Timer for %i service + +[Timer] +OnCalendar=*-*-* *:00:00 +Persistent=true +Unit=%i.service + +[Install] +WantedBy=default.target diff --git a/dot_config/systemd/user/swaybg-random.service b/dot_config/systemd/user/swaybg-random.service new file mode 100644 index 0000000..37cd49d --- /dev/null +++ b/dot_config/systemd/user/swaybg-random.service @@ -0,0 +1,12 @@ +[Unit] +Description=randomize background + +[Service] +Type=exec +Restart=always +RuntimeMaxSec=1h + +ExecStart=/home/rak/bin/swaybg-random + +[Install] +WantedBy=default.target diff --git a/dot_config/systemd/user/tmpreaper@.service b/dot_config/systemd/user/tmpreaper@.service new file mode 100644 index 0000000..200dd69 --- /dev/null +++ b/dot_config/systemd/user/tmpreaper@.service @@ -0,0 +1,38 @@ +[Unit] +Description=tmpreaper cleanup + +[Service] +Type=oneshot +LockPersonality=true +MemoryDenyWriteExecute=yes +NoNewPrivileges=yes +ProtectControlGroups=yes +ProtectHostname=yes +RestrictAddressFamilies= +RestrictNamespaces=yes +RestrictRealtime=yes +RestrictSUIDSGID=yes +SystemCallArchitectures=native +SystemCallFilter=@system-service +SystemCallErrorNumber=EPERM +# To restrict write access further, change "ProtectSystem" to "strict" and uncomment +# "ReadWritePaths", "ReadOnlyPaths", "ProtectHome", and "BindPaths". Then add any local repository +# paths to the list of "ReadWritePaths" and local backup source paths to "ReadOnlyPaths". This +# leaves most of the filesystem read-only to borgmatic. +ProtectSystem=strict +ReadWritePaths=%I + +# Lower CPU and I/O priority. +Nice=19 +CPUSchedulingPolicy=batch +IOSchedulingClass=best-effort +IOSchedulingPriority=7 +IOWeight=100 + +Restart=no +LogRateLimitIntervalSec=0 + +# Delay start to prevent backups running during boot. Note that systemd-inhibit requires dbus and +# dbus-user-session to be installed. +#ExecStartPre=sleep 1m +ExecStart=/usr/sbin/tmpreaper --test --mtime-dir 60d %I diff --git a/dot_config/systemd/user/tmpreaper@.timer b/dot_config/systemd/user/tmpreaper@.timer new file mode 100644 index 0000000..a1968c7 --- /dev/null +++ b/dot_config/systemd/user/tmpreaper@.timer @@ -0,0 +1,11 @@ +[Unit] +Description=Run tmpreaper daily + +[Timer] +OnCalendar=daily +RandomizedDelaySec=1h +AccuracySec=3h +Persistent=true + +[Install] +WantedBy=timers.target |