IanTwenty

joined 1 year ago
[–] IanTwenty@lemmy.world 1 points 2 days ago

You can do the same with GitLab as another option, it supports custom domains too.

[–] IanTwenty@lemmy.world 3 points 4 days ago

I seem to get pop-up notifications for free in GNOME/Fedora by setting these levels in /etc/UPower/UPower.conf:

UsePercentageForPolicy=true
PercentageLow=50
PercentageCritical=20
PercentageAction=10

I think you can also configure the system to take action when it reaches the lowest level with e.g.

# The action to take when "TimeAction" or "PercentageAction" above has been
# reached for the batteries (UPS or laptop batteries) supplying the computer
CriticalPowerAction=PowerOff

However I don't know how to get these GNOME "Power" notifications to play an audible sound (without turning on notification sounds for ALL notifications). The best I could find is this: David Bazile / gaudible · GitLab

There's talk of better control of sound notifications in GNOME 47+, but looks like nothing much has landed yet: Notifications in 46 and beyond – GNOME Shell & Mutter

[–] IanTwenty@lemmy.world 1 points 5 months ago (1 children)

Home Assistant can do shared lists and (I've not used them) but has some recipe add-ons. There are apps for android and iOS. It can also take care of managing the dynamic IP. Then if you want to explore home automation in future you're ready to go.

[–] IanTwenty@lemmy.world 2 points 1 year ago

In that case I'll also mention that Powershell has a secure-string that allows you to load secrets from encrypted file/user input. I believe it's secured by the user's login/session like secret-tool. They are even remain encrypted in memory so they can't be snooped on.

[–] IanTwenty@lemmy.world 2 points 1 year ago (2 children)

Two more options you might consider:

  • secret-tool - like a vault that unlocks when a user logs in to their session. This shifts the problem to keeping the user's login credentials secure but depending on your setup that might be preferable. Just be aware the once unlocked any process could access the vault in theory (I wish they'd add access controls...)
  • podman secrets - so you can securely provide secrets to containers. You can set these once securely then nothing except processes in the container can get them.