linux-browser-installer
nixpkgs
linux-browser-installer | nixpkgs | |
---|---|---|
23 | 977 | |
158 | 16,007 | |
- | 4.3% | |
3.6 | 10.0 | |
21 days ago | 4 days ago | |
Shell | Nix | |
- | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
linux-browser-installer
- How can I run GUI apps in the Ubuntu Linux Emulator?
-
An AppJail Makejail to run Caldera in a Jail
I see one can install a custom LibreWolf. May I submit a request for Brave? At the moment many are using a script that depends on /compat/ubuntu, so, it would not be possible to install AppJail (which uses /compat/linux) at the same time, as one can't run both Ubuntu and CentOS environments at the same time?
- FreeBSD as a daily driver
- No Chromium for freebsd?
-
How to install the nvidia driver 525.78.01 + CUDA 12 to run the Automatic 1111 WebUI for Stable Diffusion using Ubuntu instead of CentOS
sudo touch /usr/local/etc/rc.d/ubuntu && chmod +x /usr/local/etc/rc.d/ubuntu # Make it have this content: #!/bin/sh # # PROVIDE: ubuntu # REQUIRE: archdep mountlate # KEYWORD: nojail # # This is a modified version of /etc/rc.d/linux # Based on the script by mrclksr: # https://github.com/mrclksr/linux-browser-installer/blob/main/rc.d/ubuntu.in # . /etc/rc.subr name="ubuntu" desc="Enable Ubuntu chroot, and Linux ABI" rcvar="ubuntu_enable" start_cmd="${name}_start" stop_cmd=":" unmounted() { [ `stat -f "%d" "$1"` == `stat -f "%d" "$1/.."` -a \ `stat -f "%i" "$1"` != `stat -f "%i" "$1/.."` ] } ubuntu_start() { local _emul_path _tmpdir load_kld -e 'linux(aout|elf)' linux case `sysctl -n hw.machine_arch` in amd64) load_kld -e 'linux64elf' linux64 ;; esac if [ -x /compat/ubuntu/sbin/ldconfigDisabled ]; then _tmpdir=`mktemp -d -t linux-ldconfig` /compat/ubuntu/sbin/ldconfig -C ${_tmpdir}/ld.so.cache if ! cmp -s ${_tmpdir}/ld.so.cache /compat/ubuntu/etc/ld.so.cache; then cat ${_tmpdir}/ld.so.cache > /compat/ubuntu/etc/ld.so.cache fi rm -rf ${_tmpdir} fi # Linux uses the pre-pts(4) tty naming scheme. load_kld pty # Handle unbranded ELF executables by defaulting to ELFOSABI_LINUX. if [ `sysctl -ni kern.elf64.fallback_brand` -eq "-1" ]; then sysctl kern.elf64.fallback_brand=3 > /dev/null fi if [ `sysctl -ni kern.elf32.fallback_brand` -eq "-1" ]; then sysctl kern.elf32.fallback_brand=3 > /dev/null fi sysctl compat.linux.emul_path=/compat/ubuntu _emul_path="/compat/ubuntu" unmounted "${_emul_path}/dev" && (mount -o nocover -t devfs devfs "${_emul_path}/dev" || exit 1) unmounted "${_emul_path}/dev/fd" && (mount -o nocover,linrdlnk -t fdescfs fdescfs "${_emul_path}/dev/fd" || exit 1) unmounted "${_emul_path}/dev/shm" && (mount -o nocover,mode=1777 -t tmpfs tmpfs "${_emul_path}/dev/shm" || exit 1) unmounted "${_emul_path}/home" && (mount -t nullfs /home "${_emul_path}/home" || exit 1) unmounted "${_emul_path}/proc" && (mount -o nocover -t linprocfs linprocfs "${_emul_path}/proc" || exit 1) unmounted "${_emul_path}/sys" && (mount -o nocover -t linsysfs linsysfs "${_emul_path}/sys" || exit 1) unmounted "${_emul_path}/tmp" && (mount -t nullfs /tmp "${_emul_path}/tmp" || exit 1) unmounted /dev/fd && (mount -o nocover -t fdescfs fdescfs /dev/fd || exit 1) unmounted /proc && (mount -o nocover -t procfs procfs /proc || exit 1) true } load_rc_config $name run_rc_command "$1" sysrc ubuntu_enable=YES # Create necessary mount points for a working Linuxulator: mkdir -p {/compat/ubuntu/dev/fd,/compat/ubuntu/dev/shm,/compat/ubuntu/home,/compat/ubuntu/tmp,/compat/ubuntu/proc,/compat/ubuntu/sys} # Start Ubuntu service: service ubuntu start # Install needed packages: pkg install debootstrap pulseaudio build-essential # Install Ubuntu 20.04 into /compat/ubuntu: debootstrap --arch=amd64 --no-check-gpg focal /compat/ubuntu # Restart Ubuntu service to make sure everything is properly mounted: service ubuntu restart # Fix broken symlink: cd /compat/ubuntu/lib64/ && rm ./ld-linux-x86-64.so.2 ; ln -s ../lib/x86_64-linux-gnu/ld-2.31.so ld-linux-x86-64.so.2 # Chroot into your Linux environment: chroot /compat/ubuntu /bin/bash # Set correct timezone inside your chroot: printf "%b\n" "0.0 0 0.0\n0\nUTC" > /etc/adjtime sudo dpkg-reconfigure tzdata # For some reason sudo is necessary here, otherwise it fails. # Fix APT package manager: printf "APT::Cache-Start 251658240;" > /etc/apt/apt.conf.d/00aptitude # Enable more repositories: printf "deb http://archive.ubuntu.com/ubuntu/ focal main restricted universe multiverse" > /etc/apt/sources.list # Install required programs: apt update ; apt install -y apt-transport-https curl fonts-symbola gnupg pulseaudio
-
How to watch Netflix and more on FreeBSD
Clone this repo and install the browser of your choice from options https://github.com/mrclksr/linux-browser-installer. It uses compat Ubuntu to install browser with drm support
-
Linux user here. BSD caught my attention and I’m looking to try it out. Got any advice?
Where's the difficulty? https://github.com/mrclksr/linux-browser-installer
-
Migrate from Linux to FreeBSD
You can also install and use Google Chrome on FreeBSD pretty easy with this:
- https://github.com/mrclksr/linux-browser-installer
It will just use FreeBSD Linux Binary Compatibility layer (not emulation). FreeBSD supports most Linux syscalls with it so it can run unmodified Linux binaries 'just like that'.
More here:
- https://docs.freebsd.org/en/books/handbook/linuxemu/
Regards.
-
Im a longtime linux user and BSD noob, I have few questions in order to fill some basic gaps
Widevine won't work natively, so no Netflix. However, I've had good results with linux-browser-installer . It installs the browser in a Linux chroot I believe.
-
Why Do I Keep Coming Back to BSD?
On FreeBSD you can give this a try. It gives you a Linux browser with Widevine support. I have used Brave for some udemy courses in the past that required it and it worked well.
nixpkgs
-
Tracexec: TUI for tracing execve and pre-exec behavior
This will drop you into a shell where `tracexec` is installed.
[1]: https://github.com/NixOS/nixpkgs/pull/310158
-
Nix: The Breaking Point
I don't think so. The article is probably intended for the Nix community, so the author doesn't need to convince HN that something is going on. If as an outsider you are interested then you need to look into it yourself, the community has no obligation to make their internal conflicts legible to the outside world.
As an outsider myself, it certainly looks like something is going on as more than 20 Nixpkg maintainers left in a week: https://github.com/NixOS/nixpkgs/issues?q=label%3A%228.has%3...
- Maintainers Leaving
-
Air Force picks Anduril, General Atomics to develop unmanned fighter jets
https://github.com/NixOS/nixpkgs/commits?author=neon-sunset
-
Eelco Dolstra's leadership is corrosive to the Nix project
I see two signers in the top 6 displayed on https://github.com/NixOS/nixpkgs/graphs/contributors
-
3rd Edition of Programming: Principles and Practice Using C++ by Stroustrup
For a single file script, nix can make the package management quite easy: https://github.com/NixOS/nixpkgs/blob/master/doc/languages-f...
For example,
```
- NixOS/nixpkgs: There isn't a clear canonical way to refer to a specific package
-
NixOS Is Not Reproducible
Yes, Nix doesn't actually ensure that the builds are deterministic. In fact it works just fine if they aren't. There are packages in nixpkgs that aren't reproducible: https://github.com/NixOS/nixpkgs/issues?q=is%3Aopen+is%3Aiss...
-
The xz attack shell script
I'm not familiar with Bazel, but Nix in it's current form wouldn't have solved this attack. First of all, the standard mkDerivation function calls the same configure; make; make install process that made this attack possible. Nixpkgs regularly pulls in external resources (fetchUrl and friends) that are equally vulnerable to a poisoned release tarball. Checkout the comment on the current xz entry in nixpkgs https://github.com/NixOS/nixpkgs/blob/master/pkgs/tools/comp...
-
Debian Git Monorepo
NixOS uses a monorepo and I think everyone's love it.
I love being able to easily grep through all the packages source code and there's regularly PRs that harmonizes conventions across many packages.
Nixpkgs doesn't include the packaged software source code, so it's a lot more practical than what Debian is doing.
https://github.com/NixOS/nixpkgs
What are some alternatives?
NomadBSD - Livesystem based on FreeBSD
asdf - Extendable version manager with support for Ruby, Node.js, Elixir, Erlang & more
AppImageKit - Package desktop applications as AppImages that run on common Linux-based operating systems, such as RHEL, CentOS, openSUSE, SLED, Ubuntu, Fedora, debian and derivatives. Join #AppImage on irc.libera.chat
Home Manager using Nix - Manage a user environment using Nix [maintainer=@rycee]
freebsd-wifibox - wifibox: Use Linux to drive your wireless card on FreeBSD
git-lfs - Git extension for versioning large files
freebsd-ports
easyeffects - Limiter, compressor, convolver, equalizer and auto volume and many other plugins for PipeWire applications
freebsd-ports - FreeBSD ports tree (read-only mirror)
spack - A flexible package manager that supports multiple versions, configurations, platforms, and compilers.
C++ Middleware Writer - The repo contains library code to support messaging and serialization. There are also two programs in the repo that are needed to use the CMW.
waydroid - Waydroid uses a container-based approach to boot a full Android system on a regular GNU/Linux system like Ubuntu.