diff options
author | Ryan Schanzenbacher <ryan@rschanz.org> | 2025-04-01 11:26:04 -0400 |
---|---|---|
committer | Ryan Schanzenbacher <ryan@rschanz.org> | 2025-04-01 11:26:04 -0400 |
commit | d465e92647470759177cb63914fd3571cea7a8a4 (patch) | |
tree | c2a27471bd33c7e3e53688c89758544664b89ac0 | |
parent | 365a13de3e19c66f6bb2ffb806e8086a068ffc25 (diff) |
Using Zen, added nix update to be upstreamed
-rw-r--r-- | home-config/nix-home-manager/firefox-nightly/default.nix | 9 | ||||
-rw-r--r-- | home-config/nix-home-manager/flake.lock | 108 | ||||
-rw-r--r-- | home-config/nix-home-manager/flake.nix | 13 | ||||
-rw-r--r-- | home-config/nix-home-manager/home.nix | 26 | ||||
-rw-r--r-- | home-config/nix-home-manager/zenPolicies.nix | 126 | ||||
-rw-r--r-- | modules/ryan-packages/package-management.scm | 233 | ||||
-rw-r--r-- | modules/ryan-services/nix.scm | 182 |
7 files changed, 663 insertions, 34 deletions
diff --git a/home-config/nix-home-manager/firefox-nightly/default.nix b/home-config/nix-home-manager/firefox-nightly/default.nix index cffaa1d..b86da78 100644 --- a/home-config/nix-home-manager/firefox-nightly/default.nix +++ b/home-config/nix-home-manager/firefox-nightly/default.nix | |||
@@ -1,17 +1,16 @@ | |||
1 | { config, pkgs, mozff, ...}: | 1 | { config, pkgs, zen-browser, ...}: |
2 | 2 | ||
3 | let | 3 | let |
4 | 4 | ||
5 | wrapped-ff-nightly = mozff.packages.${pkgs.system}.firefox-nightly-bin.override { | 5 | #wrapped-ff-nightly = zen-browser.packages.${pkgs.system}.default |
6 | extraPolicies = import ./policies.nix; | ||
7 | }; | ||
8 | 6 | ||
9 | in | 7 | in |
10 | 8 | ||
11 | { | 9 | { |
12 | programs.firefox = { | 10 | programs.firefox = { |
13 | enable = true; | 11 | enable = true; |
14 | #package = wrapped-ff-nightly; | 12 | policies = import ./policies.nix; |
13 | #package = zen-browser.packages.${pkgs.system}.default.unwrapped; | ||
15 | 14 | ||
16 | profiles.${config.home.username} = { | 15 | profiles.${config.home.username} = { |
17 | name = "${config.home.username}"; | 16 | name = "${config.home.username}"; |
diff --git a/home-config/nix-home-manager/flake.lock b/home-config/nix-home-manager/flake.lock index a0c7e15..0eebe5d 100644 --- a/home-config/nix-home-manager/flake.lock +++ b/home-config/nix-home-manager/flake.lock | |||
@@ -297,26 +297,24 @@ | |||
297 | "hyprland-protocols": "hyprland-protocols", | 297 | "hyprland-protocols": "hyprland-protocols", |
298 | "hyprland-qtutils": "hyprland-qtutils", | 298 | "hyprland-qtutils": "hyprland-qtutils", |
299 | "hyprlang": "hyprlang", | 299 | "hyprlang": "hyprlang", |
300 | "hyprutils": "hyprutils", | 300 | "hyprutils": "hyprutils_2", |
301 | "hyprwayland-scanner": "hyprwayland-scanner", | 301 | "hyprwayland-scanner": "hyprwayland-scanner", |
302 | "nixpkgs": [ | 302 | "nixpkgs": "nixpkgs", |
303 | "nixpkgs" | ||
304 | ], | ||
305 | "pre-commit-hooks": "pre-commit-hooks", | 303 | "pre-commit-hooks": "pre-commit-hooks", |
306 | "systems": "systems", | 304 | "systems": "systems", |
307 | "xdph": "xdph" | 305 | "xdph": "xdph" |
308 | }, | 306 | }, |
309 | "locked": { | 307 | "locked": { |
310 | "lastModified": 1738457237, | 308 | "lastModified": 1742741773, |
311 | "narHash": "sha256-9mtM+lwnmXnv5TPmdij1rR5fLzzqSjkltcyEuRf8uIk=", | 309 | "narHash": "sha256-SLEd12Y9KzlQd4CfH2+gz3oQvkPKmwvwi74O+veNdbs=", |
312 | "owner": "hyprwm", | 310 | "owner": "hyprwm", |
313 | "repo": "hyprland", | 311 | "repo": "hyprland", |
314 | "rev": "882f7ad7d2bbfc7440d0ccaef93b1cdd78e8e3ff", | 312 | "rev": "5ee35f914f921e5696030698e74fb5566a804768", |
315 | "type": "github" | 313 | "type": "github" |
316 | }, | 314 | }, |
317 | "original": { | 315 | "original": { |
318 | "owner": "hyprwm", | 316 | "owner": "hyprwm", |
319 | "ref": "v0.47.2", | 317 | "ref": "v0.48.0", |
320 | "repo": "hyprland", | 318 | "repo": "hyprland", |
321 | "type": "github" | 319 | "type": "github" |
322 | } | 320 | } |
@@ -348,10 +346,7 @@ | |||
348 | }, | 346 | }, |
349 | "hyprland-qtutils": { | 347 | "hyprland-qtutils": { |
350 | "inputs": { | 348 | "inputs": { |
351 | "hyprutils": [ | 349 | "hyprutils": "hyprutils", |
352 | "hyprland", | ||
353 | "hyprutils" | ||
354 | ], | ||
355 | "nixpkgs": [ | 350 | "nixpkgs": [ |
356 | "hyprland", | 351 | "hyprland", |
357 | "nixpkgs" | 352 | "nixpkgs" |
@@ -437,7 +432,7 @@ | |||
437 | "inputs": { | 432 | "inputs": { |
438 | "hyprgraphics": "hyprgraphics_2", | 433 | "hyprgraphics": "hyprgraphics_2", |
439 | "hyprlang": "hyprlang_2", | 434 | "hyprlang": "hyprlang_2", |
440 | "hyprutils": "hyprutils_2", | 435 | "hyprutils": "hyprutils_3", |
441 | "hyprwayland-scanner": "hyprwayland-scanner_2", | 436 | "hyprwayland-scanner": "hyprwayland-scanner_2", |
442 | "nixpkgs": [ | 437 | "nixpkgs": [ |
443 | "nixpkgs" | 438 | "nixpkgs" |
@@ -461,7 +456,7 @@ | |||
461 | }, | 456 | }, |
462 | "hyprpicker-git": { | 457 | "hyprpicker-git": { |
463 | "inputs": { | 458 | "inputs": { |
464 | "hyprutils": "hyprutils_3", | 459 | "hyprutils": "hyprutils_4", |
465 | "hyprwayland-scanner": "hyprwayland-scanner_3", | 460 | "hyprwayland-scanner": "hyprwayland-scanner_3", |
466 | "nixpkgs": [ | 461 | "nixpkgs": [ |
467 | "nixpkgs" | 462 | "nixpkgs" |
@@ -487,6 +482,33 @@ | |||
487 | "inputs": { | 482 | "inputs": { |
488 | "nixpkgs": [ | 483 | "nixpkgs": [ |
489 | "hyprland", | 484 | "hyprland", |
485 | "hyprland-qtutils", | ||
486 | "nixpkgs" | ||
487 | ], | ||
488 | "systems": [ | ||
489 | "hyprland", | ||
490 | "hyprland-qtutils", | ||
491 | "systems" | ||
492 | ] | ||
493 | }, | ||
494 | "locked": { | ||
495 | "lastModified": 1742984269, | ||
496 | "narHash": "sha256-uz9FaCIbga/gQ5ZG1Hb4HVVjTWT1qjjCAFlCXiaefxg=", | ||
497 | "owner": "hyprwm", | ||
498 | "repo": "hyprutils", | ||
499 | "rev": "7248194a2ce0106ae647b70d0526a96dc9d6ad60", | ||
500 | "type": "github" | ||
501 | }, | ||
502 | "original": { | ||
503 | "owner": "hyprwm", | ||
504 | "repo": "hyprutils", | ||
505 | "type": "github" | ||
506 | } | ||
507 | }, | ||
508 | "hyprutils_2": { | ||
509 | "inputs": { | ||
510 | "nixpkgs": [ | ||
511 | "hyprland", | ||
490 | "nixpkgs" | 512 | "nixpkgs" |
491 | ], | 513 | ], |
492 | "systems": [ | 514 | "systems": [ |
@@ -508,7 +530,7 @@ | |||
508 | "type": "github" | 530 | "type": "github" |
509 | } | 531 | } |
510 | }, | 532 | }, |
511 | "hyprutils_2": { | 533 | "hyprutils_3": { |
512 | "inputs": { | 534 | "inputs": { |
513 | "nixpkgs": [ | 535 | "nixpkgs": [ |
514 | "hyprlock", | 536 | "hyprlock", |
@@ -533,7 +555,7 @@ | |||
533 | "type": "github" | 555 | "type": "github" |
534 | } | 556 | } |
535 | }, | 557 | }, |
536 | "hyprutils_3": { | 558 | "hyprutils_4": { |
537 | "inputs": { | 559 | "inputs": { |
538 | "nixpkgs": [ | 560 | "nixpkgs": [ |
539 | "hyprpicker-git", | 561 | "hyprpicker-git", |
@@ -717,17 +739,17 @@ | |||
717 | }, | 739 | }, |
718 | "nixpkgs": { | 740 | "nixpkgs": { |
719 | "locked": { | 741 | "locked": { |
720 | "lastModified": 1739736696, | 742 | "lastModified": 1742889210, |
721 | "narHash": "sha256-zON2GNBkzsIyALlOCFiEBcIjI4w38GYOb+P+R4S8Jsw=", | 743 | "narHash": "sha256-hw63HnwnqU3ZQfsMclLhMvOezpM7RSB0dMAtD5/sOiw=", |
722 | "owner": "nixos", | 744 | "owner": "NixOS", |
723 | "repo": "nixpkgs", | 745 | "repo": "nixpkgs", |
724 | "rev": "d74a2335ac9c133d6bbec9fc98d91a77f1604c1f", | 746 | "rev": "698214a32beb4f4c8e3942372c694f40848b360d", |
725 | "type": "github" | 747 | "type": "github" |
726 | }, | 748 | }, |
727 | "original": { | 749 | "original": { |
728 | "owner": "nixos", | 750 | "owner": "NixOS", |
751 | "ref": "nixos-unstable", | ||
729 | "repo": "nixpkgs", | 752 | "repo": "nixpkgs", |
730 | "rev": "d74a2335ac9c133d6bbec9fc98d91a77f1604c1f", | ||
731 | "type": "github" | 753 | "type": "github" |
732 | } | 754 | } |
733 | }, | 755 | }, |
@@ -746,6 +768,22 @@ | |||
746 | "type": "github" | 768 | "type": "github" |
747 | } | 769 | } |
748 | }, | 770 | }, |
771 | "nixpkgs_2": { | ||
772 | "locked": { | ||
773 | "lastModified": 1739736696, | ||
774 | "narHash": "sha256-zON2GNBkzsIyALlOCFiEBcIjI4w38GYOb+P+R4S8Jsw=", | ||
775 | "owner": "nixos", | ||
776 | "repo": "nixpkgs", | ||
777 | "rev": "d74a2335ac9c133d6bbec9fc98d91a77f1604c1f", | ||
778 | "type": "github" | ||
779 | }, | ||
780 | "original": { | ||
781 | "owner": "nixos", | ||
782 | "repo": "nixpkgs", | ||
783 | "rev": "d74a2335ac9c133d6bbec9fc98d91a77f1604c1f", | ||
784 | "type": "github" | ||
785 | } | ||
786 | }, | ||
749 | "pre-commit-hooks": { | 787 | "pre-commit-hooks": { |
750 | "inputs": { | 788 | "inputs": { |
751 | "flake-compat": "flake-compat", | 789 | "flake-compat": "flake-compat", |
@@ -779,8 +817,9 @@ | |||
779 | "hyprpicker-git": "hyprpicker-git", | 817 | "hyprpicker-git": "hyprpicker-git", |
780 | "mozff": "mozff", | 818 | "mozff": "mozff", |
781 | "nixgl": "nixgl", | 819 | "nixgl": "nixgl", |
782 | "nixpkgs": "nixpkgs", | 820 | "nixpkgs": "nixpkgs_2", |
783 | "wpaperd": "wpaperd" | 821 | "wpaperd": "wpaperd", |
822 | "zen-browser": "zen-browser" | ||
784 | } | 823 | } |
785 | }, | 824 | }, |
786 | "rust-overlay": { | 825 | "rust-overlay": { |
@@ -942,6 +981,27 @@ | |||
942 | "repo": "xdg-desktop-portal-hyprland", | 981 | "repo": "xdg-desktop-portal-hyprland", |
943 | "type": "github" | 982 | "type": "github" |
944 | } | 983 | } |
984 | }, | ||
985 | "zen-browser": { | ||
986 | "inputs": { | ||
987 | "nixpkgs": [ | ||
988 | "nixpkgs" | ||
989 | ] | ||
990 | }, | ||
991 | "locked": { | ||
992 | "lastModified": 1742871532, | ||
993 | "narHash": "sha256-ciC3zul202dnIwpAplSaCJTeXOUce7Pl1d+SMFwPQls=", | ||
994 | "owner": "0xc000022070", | ||
995 | "repo": "zen-browser-flake", | ||
996 | "rev": "bef72020b20475847f24cd27134dca06724d4ba7", | ||
997 | "type": "github" | ||
998 | }, | ||
999 | "original": { | ||
1000 | "owner": "0xc000022070", | ||
1001 | "repo": "zen-browser-flake", | ||
1002 | "rev": "bef72020b20475847f24cd27134dca06724d4ba7", | ||
1003 | "type": "github" | ||
1004 | } | ||
945 | } | 1005 | } |
946 | }, | 1006 | }, |
947 | "root": "root", | 1007 | "root": "root", |
diff --git a/home-config/nix-home-manager/flake.nix b/home-config/nix-home-manager/flake.nix index ba3d01a..38b0708 100644 --- a/home-config/nix-home-manager/flake.nix +++ b/home-config/nix-home-manager/flake.nix | |||
@@ -3,9 +3,9 @@ | |||
3 | 3 | ||
4 | inputs = { | 4 | inputs = { |
5 | # Specify the source of Home Manager and Nixpkgs. | 5 | # Specify the source of Home Manager and Nixpkgs. |
6 | nixpkgs.url = "github:nixos/nixpkgs/d74a2335ac9c133d6bbec9fc98d91a77f1604c1f"; | 6 | nixpkgs.url = "github:nixos/nixpkgs/a84ebe20c6bc2ecbcfb000a50776219f48d134cc"; |
7 | home-manager = { | 7 | home-manager = { |
8 | url = "github:nix-community/home-manager/53c587d263f94aaf6a281745923c76bbec62bcf3"; | 8 | url = "github:nix-community/home-manager/693840c01b9bef9e54100239cef937e53d4661bf"; |
9 | inputs.nixpkgs.follows = "nixpkgs"; | 9 | inputs.nixpkgs.follows = "nixpkgs"; |
10 | }; | 10 | }; |
11 | hyprlock = { | 11 | hyprlock = { |
@@ -17,7 +17,7 @@ | |||
17 | inputs.nixpkgs.follows = "nixpkgs"; | 17 | inputs.nixpkgs.follows = "nixpkgs"; |
18 | }; | 18 | }; |
19 | hyprland = { | 19 | hyprland = { |
20 | url = "github:hyprwm/hyprland/v0.47.2"; | 20 | url = "github:hyprwm/hyprland/v0.48.0"; |
21 | inputs.nixpkgs.follows = "nixpkgs"; | 21 | inputs.nixpkgs.follows = "nixpkgs"; |
22 | #inputs.hyprutils.url = "github:/hyprwm/hyprutils/6a8bc9d2a4451df12f5179dc0b1d2d46518a90ab"; | 22 | #inputs.hyprutils.url = "github:/hyprwm/hyprutils/6a8bc9d2a4451df12f5179dc0b1d2d46518a90ab"; |
23 | }; | 23 | }; |
@@ -42,9 +42,13 @@ | |||
42 | inputs.hyprland.follows = "hyprland"; | 42 | inputs.hyprland.follows = "hyprland"; |
43 | inputs.nixpkgs.follows = "hyprland/nixpkgs"; | 43 | inputs.nixpkgs.follows = "hyprland/nixpkgs"; |
44 | }; | 44 | }; |
45 | zen-browser = { | ||
46 | url = "github:0xc000022070/zen-browser-flake/bef72020b20475847f24cd27134dca06724d4ba7"; | ||
47 | inputs.nixpkgs.follows = "nixpkgs"; | ||
48 | }; | ||
45 | }; | 49 | }; |
46 | 50 | ||
47 | outputs = { nixpkgs, home-manager, hyprland, nixgl, wpaperd, hyprpicker-git, hyprlock, mozff, clipboard-sync, hypr-dynamic-cursors, ... }@inputs: | 51 | outputs = { nixpkgs, home-manager, hyprland, nixgl, wpaperd, hyprpicker-git, hyprlock, mozff, clipboard-sync, hypr-dynamic-cursors, zen-browser, ... }@inputs: |
48 | let | 52 | let |
49 | system = "x86_64-linux"; | 53 | system = "x86_64-linux"; |
50 | pkgs = nixpkgs.legacyPackages.${system}; | 54 | pkgs = nixpkgs.legacyPackages.${system}; |
@@ -70,6 +74,7 @@ | |||
70 | inherit mozff; | 74 | inherit mozff; |
71 | inherit clipboard-sync; | 75 | inherit clipboard-sync; |
72 | inherit hypr-dynamic-cursors; | 76 | inherit hypr-dynamic-cursors; |
77 | inherit zen-browser; | ||
73 | }; | 78 | }; |
74 | } | 79 | } |
75 | ]; | 80 | ]; |
diff --git a/home-config/nix-home-manager/home.nix b/home-config/nix-home-manager/home.nix index d2e0034..f5d386c 100644 --- a/home-config/nix-home-manager/home.nix +++ b/home-config/nix-home-manager/home.nix | |||
@@ -1,4 +1,24 @@ | |||
1 | { config, pkgs, hyprland, nixgl, wpaperd, hyprpicker-git, hyprlock, mozff, clipboard-sync, hypr-dynamic-cursors, ... }: | 1 | { config, pkgs, hyprland, nixgl, wpaperd, hyprpicker-git, hyprlock, mozff, clipboard-sync, hypr-dynamic-cursors, zen-browser, ... }: |
2 | let | ||
3 | # THIS IS NOT PERFECT AT ALL YET!!! Gets the basics done (my important | ||
4 | # policies regarding accounts and extensions. Does not set up profile | ||
5 | # stuff, like search. Most importantly, it DOES NOT add system CAs. | ||
6 | # To do that, run: | ||
7 | # `certutil -A -n "name" -t "CT,c" -i ./path/to/cert -d ~/.zen/profile-folder` | ||
8 | # I do this for my root and intermediate. BEWARE WHEN INSTALLING NEW | ||
9 | # SYSTEMS!!!! | ||
10 | ffPolicies = import ./zenPolicies.nix; | ||
11 | customZen = zen-browser.packages.${pkgs.system}.default.overrideAttrs (old: { | ||
12 | installPhase = old.installPhase + '' | ||
13 | rm -f $out/lib/zen-${old.version}/distribution/policies.json | ||
14 | rm -rf $out/lib | ||
15 | mkdir $out/opt/zen/distribution | ||
16 | ln -s ${pkgs.writeText "firefox-policies.json" (builtins.toJSON ffPolicies)} \ | ||
17 | "$out/opt/zen/distribution/policies.json" | ||
18 | ''; | ||
19 | }); | ||
20 | |||
21 | in | ||
2 | 22 | ||
3 | { | 23 | { |
4 | imports = [ | 24 | imports = [ |
@@ -94,10 +114,14 @@ | |||
94 | starship | 114 | starship |
95 | taskwarrior3 | 115 | taskwarrior3 |
96 | delta | 116 | delta |
117 | (flameshot.override { enableWlrSupport = true; }) | ||
97 | 118 | ||
98 | # Here until i can fix firefox's stupid devtools issue | 119 | # Here until i can fix firefox's stupid devtools issue |
99 | chromium | 120 | chromium |
100 | 121 | ||
122 | # Maybe will work? | ||
123 | customZen | ||
124 | |||
101 | # Wrapped programs for some env variables | 125 | # Wrapped programs for some env variables |
102 | (pkgs.writeScriptBin "hyprlock" '' | 126 | (pkgs.writeScriptBin "hyprlock" '' |
103 | #! ${pkgs.bash}/bin/bash | 127 | #! ${pkgs.bash}/bin/bash |
diff --git a/home-config/nix-home-manager/zenPolicies.nix b/home-config/nix-home-manager/zenPolicies.nix new file mode 100644 index 0000000..55b1190 --- /dev/null +++ b/home-config/nix-home-manager/zenPolicies.nix | |||
@@ -0,0 +1,126 @@ | |||
1 | let | ||
2 | lock-false = { | ||
3 | Value = false; | ||
4 | Status = "locked"; | ||
5 | }; | ||
6 | lock-true = { | ||
7 | Value = true; | ||
8 | Status = "locked"; | ||
9 | }; | ||
10 | in | ||
11 | { | ||
12 | |||
13 | policies = { | ||
14 | EnableTrackingProtection = { | ||
15 | Value = true; | ||
16 | Locked = true; | ||
17 | Cryptomining = true; | ||
18 | Fingerprinting = true; | ||
19 | EmailTracking = true; | ||
20 | }; | ||
21 | UserMessaging = { | ||
22 | WhatsNew = false; | ||
23 | ExtensionRecommendations = false; | ||
24 | FeatureRecommendations = false; | ||
25 | UrlbarInterventions = false; | ||
26 | SkipOnboarding = true; | ||
27 | MoreFromMozilla = false; | ||
28 | Labs = false; | ||
29 | Locked = true; | ||
30 | }; | ||
31 | DisableAppUpdate = true; | ||
32 | DisableAccounts = true; | ||
33 | DisableFirefoxAccounts = true; | ||
34 | DisableFirefoxStudies = true; | ||
35 | DisablePocket = true; | ||
36 | DisableTelemetry = true; | ||
37 | AutofillAddressEnabled = false; | ||
38 | AutofillCreditCardEnabled = false; | ||
39 | DisableMasterPasswordCreation = true; | ||
40 | PasswordManagerEnabled = false; | ||
41 | PrimaryPassword = false; | ||
42 | OfferToSaveLogins = false; | ||
43 | NoDefaultBookmarks = true; | ||
44 | OverrideFirstRunPage = ""; | ||
45 | OverridePostUpdatePage = ""; | ||
46 | FirefoxHome = { | ||
47 | Search = true; | ||
48 | TopSites = true; | ||
49 | SponsoredTopSites = false; | ||
50 | Highlights = false; | ||
51 | Pocket = false; | ||
52 | SponsoredPocket = false; | ||
53 | Snippets = false; | ||
54 | Locked = true; | ||
55 | }; | ||
56 | SearchSuggestEnabled = true; | ||
57 | FirefoxSuggest = { | ||
58 | WebSuggestions = true; | ||
59 | SponsoredSuggestions = false; | ||
60 | ImproveSuggest = false; | ||
61 | Locked = true; | ||
62 | }; | ||
63 | PictureInPicture = lock-true; | ||
64 | HardwareAcceleration = true; | ||
65 | Certificates = { | ||
66 | ImportEnterpriseRoots = true; | ||
67 | }; | ||
68 | ExtensionSettings = { | ||
69 | #"*".installation_mode = "blocked"; | ||
70 | # uBlock Origin | ||
71 | "uBlock0@raymondhill.net" = { | ||
72 | install_url = "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"; | ||
73 | installation_mode = "force_installed"; | ||
74 | }; | ||
75 | # Bitwarden | ||
76 | "{446900e4-71c2-419f-a6a7-df9c091e268b}" = { | ||
77 | install_url = "https://addons.mozilla.org/firefox/downloads/latest/bitwarden-password-manager/latest.xpi"; | ||
78 | installation_mode = "normal_installed"; | ||
79 | }; | ||
80 | # SponsorBlock | ||
81 | "sponsorBlocker@ajay.app" = { | ||
82 | install_url = "https://addons.mozilla.org/firefox/downloads/latest/sponsorblock/latest.xpi"; | ||
83 | installation_mode = "force_installed"; | ||
84 | }; | ||
85 | # DeArrow | ||
86 | "deArrow@ajay.app" = { | ||
87 | install_url = "https://addons.mozilla.org/firefox/downloads/latest/dearrow/latest.xpi"; | ||
88 | installation_mode = "force_installed"; | ||
89 | }; | ||
90 | # Return Youtube Dislike | ||
91 | "{762f9885-5a13-4abd-9c77-433dcd38b8fd}" = { | ||
92 | install_url = "https://addons.mozilla.org/firefox/downloads/latest/return-youtube-dislikes/latest.xpi"; | ||
93 | installation_mode = "force_installed"; | ||
94 | }; | ||
95 | # Youtube Nonstop | ||
96 | "{0d7cafdd-501c-49ca-8ebb-e3341caaa55e}" = { | ||
97 | install_url = "https://addons.mozilla.org/firefox/downloads/latest/youtube-nonstop/latest.xpi"; | ||
98 | installation_mode = "force_installed"; | ||
99 | }; | ||
100 | # TamperMonkey | ||
101 | "firefox@tampermonkey.net" = { | ||
102 | install_url = "https://addons.mozilla.org/firefox/downloads/latest/tampermonkey/latest.xpi"; | ||
103 | installation_mode = "force_installed"; | ||
104 | }; | ||
105 | # Floccus | ||
106 | "floccus@handmadeideas.org" = { | ||
107 | install_url = "https://addons.mozilla.org/firefox/downloads/latest/floccus/latest.xpi"; | ||
108 | installation_mode = "force_installed"; | ||
109 | }; | ||
110 | # Mailvelope | ||
111 | "jid1-AQqSMBYb0a8ADg@jetpack" = { | ||
112 | install_url = "https://addons.mozilla.org/firefox/downloads/latest/mailvelope/latest.xpi"; | ||
113 | installation_mode = "force_installed"; | ||
114 | }; | ||
115 | }; | ||
116 | Preferences = { | ||
117 | "xpinstall.whitelist.required" = lock-true; | ||
118 | "dom.webgpu.enabled" = lock-true; | ||
119 | "media.eme.enabled" = lock-true; | ||
120 | "general.autoScroll" = lock-true; | ||
121 | "general.smoothScroll" = lock-true; | ||
122 | "browser.crashReports.unsubmittedCheck.autoSubmit2" = lock-false; | ||
123 | "browser.aboutConfig.showWarning" = lock-false; | ||
124 | }; | ||
125 | }; | ||
126 | } | ||
diff --git a/modules/ryan-packages/package-management.scm b/modules/ryan-packages/package-management.scm new file mode 100644 index 0000000..9629168 --- /dev/null +++ b/modules/ryan-packages/package-management.scm | |||
@@ -0,0 +1,233 @@ | |||
1 | (define-module (ryan-packages package-management) | ||
2 | #:use-module ((guix licenses) #:prefix license:) | ||
3 | #:use-module (guix build-system meson) | ||
4 | #:use-module (guix build-system cmake) | ||
5 | #:use-module (guix packages) | ||
6 | #:use-module (guix git-download) | ||
7 | #:use-module (guix gexp) | ||
8 | #:use-module (gnu packages) | ||
9 | #:use-module (gnu packages autotools) | ||
10 | #:use-module (gnu packages backup) | ||
11 | #:use-module (gnu packages bdw-gc) | ||
12 | #:use-module (gnu packages bison) | ||
13 | #:use-module (gnu packages boost) | ||
14 | #:use-module (gnu packages compression) | ||
15 | #:use-module (gnu packages check) | ||
16 | #:use-module (gnu packages cmake) | ||
17 | #:use-module (gnu packages cpp) | ||
18 | #:use-module (gnu packages crypto) | ||
19 | #:use-module (gnu packages curl) | ||
20 | #:use-module (gnu packages databases) | ||
21 | #:use-module (gnu packages flex) | ||
22 | #:use-module (gnu packages gcc) | ||
23 | #:use-module (gnu packages libedit) | ||
24 | #:use-module (gnu packages linux) | ||
25 | #:use-module (gnu packages llvm) | ||
26 | #:use-module (gnu packages markup) | ||
27 | #:use-module (gnu packages package-management) | ||
28 | #:use-module (gnu packages perl) | ||
29 | #:use-module (gnu packages pkg-config) | ||
30 | #:use-module (gnu packages sqlite) | ||
31 | #:use-module (gnu packages tls) | ||
32 | #:use-module (gnu packages version-control) | ||
33 | #:use-module (gnu packages web) | ||
34 | #:use-module (guix utils)) | ||
35 | |||
36 | (define-public nix-ryan | ||
37 | (package | ||
38 | (name "nix") | ||
39 | (version "2.26.3") | ||
40 | (source | ||
41 | (origin | ||
42 | (method git-fetch) | ||
43 | (uri (git-reference | ||
44 | (url "https://github.com/NixOS/nix") | ||
45 | (commit version))) | ||
46 | (file-name (git-file-name "nix" version)) | ||
47 | (sha256 | ||
48 | (base32 "1rh9k0cdixahqzziylgg7p8j9p58h55m08h3l1kg369wlmi7r5g5")))) | ||
49 | (build-system meson-build-system) | ||
50 | (arguments | ||
51 | (list | ||
52 | #:configure-flags #~(list "--sysconfdir=/etc") | ||
53 | #:tests? #f)) | ||
54 | (native-inputs | ||
55 | (list autoconf | ||
56 | autoconf-archive | ||
57 | automake | ||
58 | bison | ||
59 | gcc-14 | ||
60 | cmake | ||
61 | flex | ||
62 | perl | ||
63 | perl-dbi | ||
64 | perl-dbd-sqlite | ||
65 | googletest | ||
66 | jq | ||
67 | libtool | ||
68 | pkg-config | ||
69 | rapidcheck)) | ||
70 | (inputs | ||
71 | (list boost-ryan | ||
72 | brotli | ||
73 | bzip2 | ||
74 | curl | ||
75 | editline | ||
76 | libarchive | ||
77 | libgc-ryan | ||
78 | libseccomp-ryan | ||
79 | libsodium | ||
80 | libbl3 | ||
81 | libgit2-1.9 | ||
82 | lowdown | ||
83 | nlohmann-json | ||
84 | openssl | ||
85 | sqlite | ||
86 | toml11 | ||
87 | xz | ||
88 | zlib)) | ||
89 | (home-page "https://nixos.org/") | ||
90 | (synopsis "The Nix package manager") | ||
91 | (description "todo") | ||
92 | (license license:lgpl2.1+))) | ||
93 | |||
94 | (define libbl3 | ||
95 | (package | ||
96 | (name "blake3") | ||
97 | (version "1.7.0") | ||
98 | (source | ||
99 | (origin | ||
100 | (method git-fetch) | ||
101 | (uri (git-reference | ||
102 | (url "https://github.com/BLAKE3-team/BLAKE3") | ||
103 | (commit version))) | ||
104 | (file-name (git-file-name name version)) | ||
105 | (sha256 | ||
106 | (base32 "1dsx5jmr8csgzdvfxf4byc1086rg6vclqgqkz54la8rpfn3gkh6k")))) | ||
107 | (build-system cmake-build-system) | ||
108 | (arguments | ||
109 | (list | ||
110 | #:configure-flags #~(list "-DCMAKE_POSITION_INDEPENDENT_CODE=on") | ||
111 | #:phases | ||
112 | #~(modify-phases %standard-phases | ||
113 | (add-after 'unpack 'enter-build-directory | ||
114 | (lambda _ (chdir "c") #t)) | ||
115 | (add-before 'build 'set-env | ||
116 | (lambda _ | ||
117 | (setenv "CFLAGS" "-fPIC") | ||
118 | (setenv "CXXFLAGS" "-fPIC") | ||
119 | #t))))) | ||
120 | (home-page "https://github.com/BLAKE3-team/BLAKE3") | ||
121 | (synopsis "Official C implementation of BLAKE3") | ||
122 | (description "todo") | ||
123 | (license license:expat))) | ||
124 | |||
125 | (define toml11 | ||
126 | (package | ||
127 | (name "toml11") | ||
128 | (version "v4.4.0") | ||
129 | (source | ||
130 | (origin | ||
131 | (method git-fetch) | ||
132 | (uri (git-reference | ||
133 | (url "https://github.com/ToruNiina/toml11") | ||
134 | (commit version))) | ||
135 | (sha256 | ||
136 | (base32 "0d15b50cf9jgvh3w99xh6crh03bn2dmv9bdyvzq6knsk2diql1dj")))) | ||
137 | (build-system cmake-build-system) | ||
138 | (home-page "https://github.com/ToruNiina/toml11") | ||
139 | (synopsis "TODO") | ||
140 | (description "TODO") | ||
141 | (license license:expat))) | ||
142 | |||
143 | (define libgit2-1.9 | ||
144 | (package | ||
145 | (inherit libgit2-1.8) | ||
146 | (version "1.9.0") | ||
147 | (source (origin | ||
148 | (inherit (package-source libgit2-1.8)) | ||
149 | (uri (git-reference | ||
150 | (url "https://github.com/libgit2/libgit2") | ||
151 | (commit (string-append "v" version)))) | ||
152 | (file-name (git-file-name "libgit2" version)) | ||
153 | (sha256 | ||
154 | (base32 | ||
155 | "06ajn5i5l1209z7x7jxcpw68ph0a6g3q67bmx0jm381rr8cb4zdz")) | ||
156 | (snippet | ||
157 | #~(begin | ||
158 | (for-each delete-file-recursively | ||
159 | '("deps/llhttp" | ||
160 | "deps/ntlmclient" | ||
161 | "deps/pcre" | ||
162 | "deps/winhttp" | ||
163 | "deps/zlib")))))))) | ||
164 | |||
165 | (define libgc-ryan | ||
166 | (package | ||
167 | (inherit libgc) | ||
168 | (version "8.2.8") | ||
169 | (source (origin | ||
170 | (method git-fetch) | ||
171 | (uri (git-reference | ||
172 | (url "https://github.com/ivmai/bdwgc") | ||
173 | (commit (string-append "v" version)))) | ||
174 | (file-name (git-file-name "libgc" version)) | ||
175 | (sha256 | ||
176 | (base32 "1xzvr5wb36flkbjqjyk5ilhda1a3yk61rgprxfjzdf1rzlmqn12i")))) | ||
177 | (native-inputs (modify-inputs (package-native-inputs libgc) (prepend autoconf autoconf-archive automake libtool))))) | ||
178 | |||
179 | (define boost-ryan | ||
180 | (package | ||
181 | (inherit boost) | ||
182 | (version "1.87.0") | ||
183 | (source (origin | ||
184 | (method git-fetch) | ||
185 | (uri (git-reference | ||
186 | (url "https://github.com/boostorg/boost") | ||
187 | (commit (string-append "boost-" version)) | ||
188 | (recursive? #t))) | ||
189 | (file-name (git-file-name "boost" version)) | ||
190 | (sha256 | ||
191 | (base32 "1xirczrh2rgk2x70crw33w6566d2by9q675wlyv0zj69f49z8prn")))) | ||
192 | (native-inputs (modify-inputs (package-native-inputs boost) (prepend clang-18))) | ||
193 | (arguments | ||
194 | (append | ||
195 | (substitute-keyword-arguments (package-arguments boost)) | ||
196 | (list | ||
197 | #:tests? #f | ||
198 | #:configure-flags | ||
199 | #~(let ((icu (dirname (dirname (search-input-file | ||
200 | %build-inputs "bin/uconv"))))) | ||
201 | (list | ||
202 | ;; Auto-detection looks for ICU only in traditional | ||
203 | ;; install locations. | ||
204 | (string-append "--with-icu=" icu) | ||
205 | ;; Ditto for Python. | ||
206 | #$@(if (%current-target-system) | ||
207 | #~() | ||
208 | #~((let ((python (dirname (dirname (search-input-file | ||
209 | %build-inputs | ||
210 | "bin/python"))))) | ||
211 | (string-append "--with-python-root=" python) | ||
212 | (string-append "--with-python=" python | ||
213 | "/bin/python") | ||
214 | (string-append "--with-python-version=" | ||
215 | (python-version python))))) | ||
216 | "--with-toolset=clang"))))))) | ||
217 | |||
218 | (define libseccomp-ryan | ||
219 | (package | ||
220 | (inherit libseccomp) | ||
221 | (version "2.6.0") | ||
222 | (source (origin | ||
223 | (method git-fetch) | ||
224 | (uri (git-reference | ||
225 | (url "https://github.com/seccomp/libseccomp") | ||
226 | (commit (string-append "v" version)))) | ||
227 | (file-name (git-file-name "libseccomp" version)) | ||
228 | (sha256 | ||
229 | (base32 "189yh66aj3z3jvns739qbj504f3mcl3w44pxxizw877pbj3kal11")))) | ||
230 | (native-inputs (modify-inputs (package-native-inputs libseccomp) (prepend autoconf autoconf-archive automake libtool))))) | ||
231 | |||
232 | |||
233 | nix-ryan | ||
diff --git a/modules/ryan-services/nix.scm b/modules/ryan-services/nix.scm new file mode 100644 index 0000000..75c9082 --- /dev/null +++ b/modules/ryan-services/nix.scm | |||
@@ -0,0 +1,182 @@ | |||
1 | ;;; GNU Guix --- Functional package management for GNU | ||
2 | ;;; Copyright © 2019, 2020, 2021, 2024 Oleg Pykhalov <go.wigust@gmail.com> | ||
3 | ;;; Copyright © 2020 Peng Mei Yu <i@pengmeiyu.com> | ||
4 | ;;; | ||
5 | ;;; This file is part of GNU Guix. | ||
6 | ;;; | ||
7 | ;;; GNU Guix is free software; you can redistribute it and/or modify it | ||
8 | ;;; under the terms of the GNU General Public License as published by | ||
9 | ;;; the Free Software Foundation; either version 3 of the License, or (at | ||
10 | ;;; your option) any later version. | ||
11 | ;;; | ||
12 | ;;; GNU Guix is distributed in the hope that it will be useful, but | ||
13 | ;;; WITHOUT ANY WARRANTY; without even the implied warranty of | ||
14 | ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||
15 | ;;; GNU General Public License for more details. | ||
16 | ;;; | ||
17 | ;;; You should have received a copy of the GNU General Public License | ||
18 | ;;; along with GNU Guix. If not, see <http://www.gnu.org/licenses/>. | ||
19 | |||
20 | (define-module (ryan-services nix) | ||
21 | #:use-module (gnu packages admin) | ||
22 | #:use-module (gnu packages bash) | ||
23 | #:use-module (gnu packages package-management) | ||
24 | #:use-module (gnu services base) | ||
25 | #:use-module (gnu services configuration) | ||
26 | #:use-module (gnu services shepherd) | ||
27 | #:use-module (gnu services web) | ||
28 | #:use-module (gnu services) | ||
29 | #:use-module (gnu system file-systems) | ||
30 | #:use-module (gnu system shadow) | ||
31 | #:use-module (guix gexp) | ||
32 | #:use-module (guix packages) | ||
33 | #:use-module (guix records) | ||
34 | #:use-module (guix store) | ||
35 | #:use-module (srfi srfi-1) | ||
36 | #:use-module (srfi srfi-26) | ||
37 | #:use-module (ice-9 match) | ||
38 | #:use-module (ice-9 format) | ||
39 | #:use-module (guix modules) | ||
40 | #:export (nix-service-type | ||
41 | |||
42 | nix-configuration | ||
43 | nix-configuration?)) | ||
44 | |||
45 | ;;; Commentary: | ||
46 | ;;; | ||
47 | ;;; This module provides a service definition for the Nix daemon. | ||
48 | ;;; | ||
49 | ;;; Code: | ||
50 | |||
51 | (define-record-type* <nix-configuration> | ||
52 | nix-configuration make-nix-configuration | ||
53 | nix-configuration? | ||
54 | (package nix-configuration-package ;file-like | ||
55 | (default nix)) | ||
56 | (sandbox nix-configuration-sandbox ;boolean | ||
57 | (default #t)) | ||
58 | (build-directory nix-configuration-build-directory ;string | ||
59 | (default "/tmp")) | ||
60 | (build-sandbox-items nix-configuration-build-sandbox-items ;list of strings | ||
61 | (default '())) | ||
62 | (extra-config nix-configuration-extra-config ;list of strings | ||
63 | (default '())) | ||
64 | (extra-options nix-configuration-extra-options ;list of strings | ||
65 | (default '()))) | ||
66 | |||
67 | ;; Copied from gnu/services/base.scm | ||
68 | (define* (nix-build-accounts count #:key | ||
69 | (group "nixbld") | ||
70 | (shadow shadow)) | ||
71 | "Return a list of COUNT user accounts for Nix build users with the given | ||
72 | GID." | ||
73 | (unfold (cut > <> count) | ||
74 | (lambda (n) | ||
75 | (user-account | ||
76 | (name (format #f "nixbld~2,'0d" n)) | ||
77 | (system? #t) | ||
78 | (group group) | ||
79 | (supplementary-groups (list group "kvm")) | ||
80 | (comment (format #f "Nix Build User ~2d" n)) | ||
81 | (home-directory "/var/empty") | ||
82 | (shell (file-append shadow "/sbin/nologin")))) | ||
83 | 1+ | ||
84 | 1)) | ||
85 | (define (nix-accounts _) | ||
86 | "Return the user accounts and user groups." | ||
87 | (cons (user-group | ||
88 | (name "nixbld") | ||
89 | (system? #t) | ||
90 | |||
91 | ;; Use a fixed GID so that we can create the store with the right | ||
92 | ;; owner. | ||
93 | (id 40000)) | ||
94 | (nix-build-accounts 10 #:group "nixbld"))) | ||
95 | |||
96 | (define (nix-activation _) | ||
97 | ;; Return the activation gexp. | ||
98 | #~(begin | ||
99 | (use-modules (guix build utils) | ||
100 | (srfi srfi-26)) | ||
101 | (for-each (cut mkdir-p <>) '("/nix/var/log" | ||
102 | "/nix/var/nix/gcroots/per-user" | ||
103 | "/nix/var/nix/profiles/per-user")) | ||
104 | (unless (file-exists? #$%nix-store-directory) | ||
105 | (mkdir-p #$%nix-store-directory) | ||
106 | (chown #$%nix-store-directory | ||
107 | (passwd:uid (getpw "root")) (group:gid (getpw "nixbld01"))) | ||
108 | (chmod #$%nix-store-directory #o775)) | ||
109 | (for-each (cut chmod <> #o777) '("/nix/var/nix/profiles" | ||
110 | "/nix/var/nix/profiles/per-user")))) | ||
111 | |||
112 | (define nix-service-etc | ||
113 | (match-lambda | ||
114 | (($ <nix-configuration> package sandbox build-directory build-sandbox-items extra-config) | ||
115 | (let ((ref-file (references-file package))) | ||
116 | `(("nix/nix.conf" | ||
117 | ,(computed-file | ||
118 | "nix.conf" | ||
119 | #~(begin | ||
120 | (use-modules (srfi srfi-26) | ||
121 | (ice-9 format)) | ||
122 | (with-output-to-file #$output | ||
123 | (lambda _ | ||
124 | (define internal-sandbox-paths | ||
125 | (call-with-input-file #$ref-file read)) | ||
126 | |||
127 | (format #t "sandbox = ~a~%" (if #$sandbox "true" "false")) | ||
128 | ;; config.nix captures store file names. | ||
129 | (format #t "sandbox-paths = ~{~a ~}~%" | ||
130 | (append (list (string-append "/bin/sh=" #$bash-minimal "/bin/bash")) | ||
131 | internal-sandbox-paths | ||
132 | '#$build-sandbox-items)) | ||
133 | (for-each (cut display <>) '#$extra-config))))))))))) | ||
134 | |||
135 | (define %nix-store-directory | ||
136 | "/nix/store") | ||
137 | |||
138 | (define %immutable-nix-store | ||
139 | ;; Read-only store to avoid users or daemons accidentally modifying it. | ||
140 | ;; 'nix-daemon' has provisions to remount it read-write in its own name | ||
141 | ;; space. | ||
142 | (list (file-system | ||
143 | (device %nix-store-directory) | ||
144 | (mount-point %nix-store-directory) | ||
145 | (type "none") | ||
146 | (check? #f) | ||
147 | (flags '(read-only bind-mount))))) | ||
148 | |||
149 | (define nix-shepherd-service | ||
150 | ;; Return a <shepherd-service> for Nix. | ||
151 | (match-lambda | ||
152 | (($ <nix-configuration> package _ build-directory _ _ extra-options) | ||
153 | (list | ||
154 | (shepherd-service | ||
155 | (provision '(nix-daemon)) | ||
156 | (documentation "Run nix-daemon.") | ||
157 | (requirement '(user-processes file-system-/nix/store)) | ||
158 | (start #~(make-forkexec-constructor | ||
159 | (list (string-append #$package "/bin/nix-daemon") | ||
160 | #$@extra-options) | ||
161 | #:environment-variables | ||
162 | (list (string-append "TMPDIR=" #$build-directory) | ||
163 | "PATH=/run/current-system/profile/bin"))) | ||
164 | (respawn? #f) | ||
165 | (stop #~(make-kill-destructor))))))) | ||
166 | |||
167 | (define nix-service-type | ||
168 | (service-type | ||
169 | (name 'nix) | ||
170 | (extensions | ||
171 | (list (service-extension shepherd-root-service-type nix-shepherd-service) | ||
172 | (service-extension account-service-type nix-accounts) | ||
173 | (service-extension activation-service-type nix-activation) | ||
174 | (service-extension etc-service-type nix-service-etc) | ||
175 | (service-extension profile-service-type | ||
176 | (compose list nix-configuration-package)) | ||
177 | (service-extension file-system-service-type | ||
178 | (const %immutable-nix-store)))) | ||
179 | (description "Run the Nix daemon.") | ||
180 | (default-value (nix-configuration)))) | ||
181 | |||
182 | ;;; nix.scm ends here | ||