Commit Graph

1762 Commits

Author SHA1 Message Date
networkException
05f7cd8e0d
ungoogled-chromium: 120.0.6099.216-1 -> 120.0.6099.224-1
https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_16.html

This update includes 4 security fixes. Google is aware of reports that
an exploit for CVE-2024-0519 exists in the wild.

CVEs:
CVE-2024-0517 CVE-2024-0518 CVE-2024-0519
2024-01-18 18:44:27 +01:00
David Leung
8a9a8c6104 chromium: 120.0.6099.216 -> 120.0.6099.224
https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_16.html

This update includes 4 security fix.

CVEs:
CVE-2024-0517 CVE-2024-0518 CVE-2024-0519
2024-01-18 02:57:17 +01:00
networkException
3dd9134308
ungoogled-chromium: 120.0.6099.199-1 -> 120.0.6099.216-1
https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_9.html

This update includes 1 security fix.

CVEs:
CVE-2024-0333
2024-01-11 03:12:53 +01:00
emilylange
5d239aacd9
chromium: 120.0.6099.199 -> 120.0.6099.216
https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_9.html

This update includes 1 security fix.

CVEs:
CVE-2024-0333
2024-01-10 02:27:38 +01:00
Emily
e03da1011f
Merge pull request #278603 from emilylange/chromium
{ungoogled-,}chromium: 120.0.6099.129 -> 120.0.6099.199, improve and move `recompressTarball`
2024-01-05 18:42:43 +01:00
networkException
d163ea4133
ungoogled-chromium: 120.0.6099.129-1 -> 120.0.6099.199-1
https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop.html

This update includes 6 security fixes.

CVEs:
CVE-2024-0222 CVE-2024-0223 CVE-2024-0224 CVE-2024-0225
2024-01-05 17:29:51 +01:00
Weijia Wang
34ecb3cdc6
Merge pull request #275459 from emilylange/chromium-drop-inactive-maintainers
chromium: drop inactive maintainers, CODEOWNERS: init chromium
2024-01-05 15:57:50 +01:00
emilylange
5c77fff609
chromium: 120.0.6099.129 -> 120.0.6099.199
https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop.html

This update includes 6 security fixes.

CVEs:
CVE-2024-0222 CVE-2024-0223 CVE-2024-0224 CVE-2024-0225
2024-01-04 01:48:08 +01:00
emilylange
e15783154f
chromium: improve and move recompressTarball
Recap: We need that (arguably stupid) helper function/drv because the
chromium tarball is big -- and is likely to increase even more in the
future. So big, that we eventually exceeded hydra.nixos.org's
max-output-limit (3G).  Instead of raising global hydra's limit, it was
decided that we recompress the tarball after deleting unused vendored
files from it.

I spent a lot of time on a version/prototype that does everything
(downloading, decompression, tar extraction, deleting unused files,
reproducible tar recreation and finally recompression) via stdin but
eventually had to scratch that.

GNU tar does not allow to create a tarball just from stdin, nixpkgs'
stdenv isn't built with stdin/stdout/pipes in mind, and things a lot of
other things I probably already forgot.

Nonetheless, this version improves multiple things:
- No more `mv` (used to be multiple, not just ours, since fetchzip had
  some as well)
- No more `rm` to get rid of the extracted files before recompressing.
  Instead, we simply don't extract them in the first place (thanks to
  tar's --exlude).
- No more "no space left" that happened due to `downloadToTemp = true;`.
- Multithreaded xz decompression, since that commit is still in
  staging-next.

We cannot use stdenv's unpackFile() because that does not allow us to
specify the needed --exclude (and --strip-components=1 if we don't want
to rely on glob matching).

The hash changed because we now have a static base directory ("source")
in the tarball, instead of whatever upstream provided us with (e.g.
"chromium-120.0.6099.129").
2024-01-04 01:34:15 +01:00
Emily
9c56ece502
Merge pull request #274863 from yu-re-ka/chromium-llvm17
chromium: use llvm 17
2024-01-02 18:42:10 +01:00
emilylange
cdf5db87d4
chromium: remove maintainer handles from README.md, mention electron
Specifically the maintainers section is quite outdated and prone to get
out of sync with whatever primary data we have (mostly meta.maintainers)
in each derivation.

In an attempt to lower the risk of ending up out of sync again, we
simply remove the maintainer handles.

Also adds a mention for the newly from source built electron variant, as
almost everything except `upstream-info.nix` bumps will trigger electron
rebuilds as well.

And lastly, removes mentions of `chromium{Beta,Dev}` and the
accompanying `google-chrome-{beta,dev}, that have been removed a few
months ago.

I might look into reworking bigger parts of the README.md in the future,
but this honestly isn't that high of a priority for me for now.
2023-12-30 03:40:11 +01:00
networkException
8d36d9384e
ungoogled-chromium: 120.0.6099.109-1 -> 120.0.6099.129-1
https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_20.html

This update includes 1 security fix. Google is aware that an exploit
for CVE-2023-7024 exists in the wild.

CVEs:
CVE-2023-7024
2023-12-22 02:51:19 +01:00
networkException
027ec17c01
chromium: 120.0.6099.109 -> 120.0.6099.129
https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_20.html

This update includes 1 security fix. Google is aware that an exploit
for CVE-2023-7024 exists in the wild.

CVEs:
CVE-2023-7024
2023-12-22 02:50:06 +01:00
networkException
f96d36a28d
chromedriver: 120.0.6099.71 -> 120.0.6099.109 2023-12-22 02:45:42 +01:00
emilylange
477e7d6b60
chromium: drop inactive maintainers
Our ./maintainers/README.md has a section titled "How to lose maintainer
status", which describes an "inactivity measure":

Maintainers how haven't reacted to "package-related notifications" for
more than 3 months can be removed.

All those 4 maintainers that are getting dropped as part of this commit
haven't responded to any such notifications (mostly review pings) for at
least 3 months.
2023-12-19 18:05:58 +01:00
Emily
a927ae417e
Merge pull request #274386 from reedrw/chromium-disable-libpng-patch
chromium: never use libpng-apng patch
2023-12-18 18:33:10 +01:00
Yureka
930e3e5be6 chromium: use llvm 17 2023-12-17 02:09:25 +01:00
Reed
fcdea38355 chromium: never use libpng-apng patch 2023-12-15 02:14:59 -05:00
networkException
3644340b6e
ungoogled-chromium: 120.0.6099.71-1 -> 120.0.6099.109-1
https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html

This update includes 9 security fixes.

CVEs:
CVE-2023-6702 CVE-2023-6703 CVE-2023-6704 CVE-2023-6705 CVE-2023-6706
CVE-2023-6707
2023-12-14 20:49:10 +01:00
networkException
c29d53ba0f
chromium: 120.0.6099.71 -> 120.0.6099.109
https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html

This update includes 9 security fixes.

CVEs:
CVE-2023-6702 CVE-2023-6703 CVE-2023-6704 CVE-2023-6705 CVE-2023-6706
CVE-2023-6707
2023-12-14 20:48:50 +01:00
emilylange
0ed60bbcd1 chromium: fix increased build time for non-cross-compilation builds
Having

```nix
host_toolchain = "//build/toolchain/linux/unbundle:host";
v8_snapshot_toolchain = "//build/toolchain/linux/unbundle:host";
```

on native, non-cross-compilation builds roughly doubles the build steps
and, by proxy, compute and time needed to build.

So to resolve this, we conditionally change those values depending on
whether we are cross-compiling or not.

Co-authored-by: Adam Joseph <adam@westernsemico.com>
2023-12-12 12:33:28 +01:00
emilylange
0eb389be6e chromium: move stray patches into ./patches directory 2023-12-12 12:33:28 +01:00
emilylange
b8927e2047 ungoogled-chromium: add ungoogled- prefix to chromium-unwrapped 2023-12-12 12:33:28 +01:00
networkException
4a34a5f2d4
chromedriver: 119.0.6045.105 -> 120.0.6099.71 2023-12-09 00:26:49 +01:00
networkException
db8b5f058e
ungoogled-chromium: 119.0.6045.199-1 -> 120.0.6099.71-1
https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop.html
https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_6.html

This update includes 10 security fixes.

CVEs:
CVE-2023-6508 CVE-2023-6509 CVE-2023-6510 CVE-2023-6511 CVE-2023-6512
2023-12-09 00:26:49 +01:00
networkException
ca726d0a8a
chromium: 119.0.6045.199 -> 120.0.6099.71
https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop.html
https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_6.html

This update includes 10 security fixes.

CVEs:
CVE-2023-6508 CVE-2023-6509 CVE-2023-6510 CVE-2023-6511 CVE-2023-6512

Co-authored-by: emilylange <git@emilylange.de>
2023-12-09 00:26:48 +01:00
Yureka
17ca7f6529 chromium: fix build for chromium >=120 2023-12-05 19:38:31 +01:00
networkException
1940f32366
chromium: add update script command to use unreleased ungoogled-chromium
this patch adds a new subcommand to the update script

```
update.py ungoogled-rev <rev>
```

to update to an unreleased version of ungoogled-chromium by referencing
a git ref from the ungoogled-chromium repository (like a commit hash in an
update pull request).
2023-11-29 22:23:46 +01:00
networkException
121c6e2dbe
ungoogled-chromium: 119.0.6045.159-1 -> 119.0.6045.199-1
https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html

This update includes 7 security fixes. Google is aware that an exploit
for CVE-2023-6345 exists in the wild.

CVEs:
CVE-2023-6348 CVE-2023-6347 CVE-2023-6346 CVE-2023-6350 CVE-2023-6351
CVE-2023-6345
2023-11-29 22:14:35 +01:00
networkException
47ce8a69bf
chromium: 119.0.6045.159 -> 119.0.6045.199
https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html

This update includes 7 security fixes. Google is aware that an exploit
for CVE-2023-6345 exists in the wild.

CVEs:
CVE-2023-6348 CVE-2023-6347 CVE-2023-6346 CVE-2023-6350 CVE-2023-6351
CVE-2023-6345
2023-11-29 22:14:08 +01:00
Lily Foster
fa094c6dd4
chromium: add rpath to libGLESv2.so from libANGLE (#269345)
Chromium libANGLE-based GL loading was working by accident before, because the cairo lib pulled in libEGL previously (so dlopen didn't need to search rpath when called in libGLESv2) but no longer does and the rpath needs to be added on both the chromium binary and the libGLESv2.so (and yes both even expect to have pciutils available it seems)

Fixes #268490 #269104
2023-11-23 10:59:03 +01:00
Yureka
4c8ece563e
Revert "chromium: add libglvnd to rpath" (#269308) 2023-11-23 10:49:55 +01:00
Jan Tojnar
d1993b45b1 chromium: Fix build with at-spi2-core 2.49 2023-11-21 09:21:54 +01:00
Emily
cdfc4c54b2
Merge pull request #268715 from 999eagle/fix/chromium-wayland
chromium: add libglvnd to rpath
2023-11-20 19:58:58 +01:00
Sophie Tauchert
c475ac3248
chromium: add libglvnd to rpath
This should fix issues like
- https://github.com/NixOS/nixpkgs/pull/249853
- https://github.com/NixOS/nixpkgs/issues/268490
for all chromium and all electron apps under Wayland.
2023-11-20 11:30:04 +01:00
networkException
b105acfc31
ungoogled-chromium: 119.0.6045.123-1 -> 119.0.6045.159-1
https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_14.html

This update includes 4 security fixes.

CVEs:
CVE-2023-5997 CVE-2023-6112
2023-11-17 03:29:59 +01:00
networkException
be18e0d37a
chromium: 119.0.6045.123 -> 119.0.6045.159
https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_14.html

This update includes 4 security fixes.

CVEs:
CVE-2023-5997 CVE-2023-6112
2023-11-17 03:29:32 +01:00
networkException
37f3260f55
ungoogled-chromium: 119.0.6045.105-1 -> 119.0.6045.123-1
https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop.html

This update includes 1 security fix.

CVEs:
CVE-2023-5996
2023-11-11 15:53:47 +01:00
networkException
15eb951a10
chromium: 119.0.6045.105 -> 119.0.6045.123
https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop.html

This update includes 1 security fix.

CVEs:
CVE-2023-5996
2023-11-11 15:53:15 +01:00
Adam Joseph
bc2d598878 treewide: change pythonForBuild to pythonOnBuildForHost 2023-11-05 17:42:12 -08:00
networkException
8f824c9d13
chromedriver: 118.0.5993.70 -> 119.0.6045.105 2023-11-03 17:25:21 +01:00
networkException
352d725f5a
ungoogled-chromium: 118.0.5993.117-1 -> 119.0.6045.105-1
https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html

This update includes 15 security fixes.

CVEs:
CVE-2023-5480 CVE-2023-5482 CVE-2023-5849 CVE-2023-5850 CVE-2023-5851
CVE-2023-5852 CVE-2023-5853 CVE-2023-5854 CVE-2023-5855 CVE-2023-5856
CVE-2023-5857 CVE-2023-5858 CVE-2023-5859
2023-11-03 17:24:54 +01:00
networkException
f43e8afa44
chromium: 118.0.5993.117 -> 119.0.6045.105
https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html

This update includes 15 security fixes.

CVEs:
CVE-2023-5480 CVE-2023-5482 CVE-2023-5849 CVE-2023-5850 CVE-2023-5851
CVE-2023-5852 CVE-2023-5853 CVE-2023-5854 CVE-2023-5855 CVE-2023-5856
CVE-2023-5857 CVE-2023-5858 CVE-2023-5859
2023-11-03 17:24:07 +01:00
emilylange
59719f787e
chromium{Beta,Dev},google-chrome-{beta,dev}: drop
This is mainly due to the lack of maintenance in nixpkgs.
`google-chrome-{beta,dev}` depend on `chromium{Beta,Dev}`'s version
info.

`chromium{Beta,Dev}` are rarely updated and explicitly blocklisted by
`hydra.nixos.org`, meaning they are almost always outdated and not
cached in `cache.nixos.org`.

`chromium{Beta,Dev}` were intended to fix the build derivation of each
new major release (if something broke) *before* stable reached that
new major release.
Allowing for fast bumps in nixpkgs, especially if the stable bump
contains very important critical security fixes.

Something that can easily be replicated by using an early-stable release
or by manually entering a dev/beta version string in stable's
`upstream-info.nix`.

This resolves exposing end-users to outdated and vulnerable
`google-chrome-{beta,dev}` and `chromium{Beta,Dev}` versions.
2023-10-28 22:55:18 +02:00
emilylange
b866db0ae4
ungoogled-chromium: 118.0.5993.88-1 -> 118.0.5993.117-1
https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_24.html

This update includes 2 security fixes.

CVEs:
CVE-2023-5472
2023-10-27 19:41:27 +02:00
emilylange
d552730f66
chromium: 118.0.5993.88 -> 118.0.5993.117
https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_24.html

This update includes 2 security fixes.

CVEs:
CVE-2023-5472
2023-10-27 19:37:47 +02:00
Weijia Wang
18618c9940
Merge pull request #262515 from networkException/chromium-sri-hashes
chromium,chromedriver,electron: use sri hashes instead of sha256 everywhere
2023-10-22 00:59:13 +02:00
networkException
e2523b4ca0
chromium,chromedriver,electron: use hash instead of sha256 everywhere
this patch updates the packaging of chromium and chromedriver to use
sri hashes in `upstream-info.nix` instead of sha256 as well as
the packaging of electron to use sri hashes in `info.json` instead
of sha256 (just gn).

this patch also updates the previous `sha256` values in
`upstream-info.nix` and `info.json` to sri hashes in `hash`.
2023-10-21 19:56:40 +02:00
networkException
6e4796d619
chromium,electron: always output sri hashes from update scripts
this patch changes the update script to always output sri hashes
for all hashes written to chromium's `upstream-info.nix` and
electron's `info.json`. the keys have also been renamed from `sha256`
to `hash`.
2023-10-21 15:16:58 +02:00
Emily
9ef114e19a
Merge pull request #262145 from nixdrin/chromium-libpci
chromium: fix libpci GPU detection
2023-10-21 14:00:31 +02:00