Commit Graph

5693 Commits

Author SHA1 Message Date
Martin Weinelt
78f9f91a7d
Merge pull request #181015 from squalus/librewolf
librewolf: 102.0-2 -> 102.0.1-1
2022-07-11 17:46:35 +02:00
Sandro
006ffd8252
Merge pull request #140658 from alyssais/firefox-bin-https
firefox-bin: HTTPS for homepage and updateScript
2022-07-11 13:47:27 +02:00
squalus
6e87ec8162 librewolf: 102.0-2 -> 102.0.1-1 2022-07-10 13:33:14 -07:00
Martin Weinelt
09b76341b3
Merge pull request #180796 from squalus/librewolf-tests 2022-07-10 14:16:24 +02:00
Michael Weiss
70896ec871
ungoogled-chromium: 103.0.5060.53 -> 103.0.5060.114 2022-07-10 00:41:00 +02:00
Michael Weiss
5039fc4ec0
chromium: 103.0.5060.53 -> 103.0.5060.114
https://chromereleases.googleblog.com/2022/07/stable-channel-update-for-desktop.html

This update includes 4 security fixes. Google is aware that an exploit
for CVE-2022-2294 exists in the wild.

CVEs:
CVE-2022-2294 CVE-2022-2295 CVE-2022-2296

Note: This update was delayed due to crbug.com/1341418.
2022-07-10 00:00:18 +02:00
Fabián Heredia Montiel
a88f7d2f4f offpunk: remove unused argument testVersion 2022-07-09 11:30:46 -05:00
squalus
478940e2c7 librewolf: add nixos test
- support librewolf in the firefox nixos test
- use the correct binary name
- ensure autoplay is always on for the audio test, since
  librewolf disables it by default
2022-07-08 17:40:24 -07:00
Michael Weiss
924540c6c7
chromiumDev: 104.0.5112.20 -> 105.0.5148.2 2022-07-09 01:21:18 +02:00
Michael Weiss
0c80be9581
Merge pull request #180449 from primeos/chromiumBeta
chromiumBeta: 104.0.5112.20 -> 104.0.5112.29
2022-07-07 15:16:53 +02:00
Joachim F
442b030590
Merge pull request #179600 from sikmir/surf
surf: enable audio & video support
2022-07-07 14:23:56 +02:00
Michael Weiss
b19cb885f3
chromiumBeta: 104.0.5112.20 -> 104.0.5112.29 2022-07-07 09:56:57 +02:00
Steven Kou
7e5afad992
vivaldi-ffmepg-codecs: 102.0.5005.49 -> 103.0.5060.53 2022-07-06 23:31:14 +08:00
Steven Kou
f25ae9227e
vivaldi: 5.3.2679.61-1 -> 5.3.2679.68-1 2022-07-06 23:30:54 +08:00
Martin Weinelt
838e78a8a6
firefox-bin-unwrapped: 102.0 -> 102.0.1
https://www.mozilla.org/en-US/firefox/102.0.1/releasenotes/
2022-07-05 20:45:53 +02:00
Martin Weinelt
e3e78bb409
firefox-unwrapped: 102.0 -> 102.0.1
https://www.mozilla.org/en-US/firefox/102.0.1/releasenotes/
2022-07-05 20:45:26 +02:00
Anderson Torres
0c873dc3a2
Merge pull request #179888 from DamienCassou/offpunk
offpunk: init at 1.4
2022-07-04 22:17:56 -03:00
Martin Weinelt
391fab8cb5
Merge pull request #179659 from squalus/librewolf
librewolf: 101.0.1-1 -> 102.0-2
2022-07-05 00:47:53 +02:00
Nicolas Benes
b6805190a2 tor-browser-bundle-bin: 11.0.14 -> 11.0.15 2022-07-03 21:13:34 +02:00
Damien Cassou
31c1463343
offpunk: init at 1.4 2022-07-03 20:59:27 +02:00
squalus
55c5a83c4c librewolf: 101.0.1-1 -> 102.0-2 2022-07-02 10:45:33 -07:00
Michele Guerini Rocco
0323e1f8ba
Merge pull request #179148 from dotlambda/qutebrowser-2.5.2
qutebrowser: 2.5.1 -> 2.5.2
2022-07-01 10:35:07 +02:00
R. Ryantm
2c7fcab1ce lagrange: 1.13.6 -> 1.13.7 2022-06-30 06:16:37 +00:00
Nikolay Korotkiy
70daeea1c0
surf: enable audio & video support 2022-06-29 21:08:03 +03:00
ajs124
a0718341e6 maintainers: remove volth
github account deleted
2022-06-29 00:52:12 +02:00
Martin Weinelt
9525331e5a
Merge pull request #179322 from mweinelt/mozilla 2022-06-27 20:52:02 +02:00
Michael Weiss
9cbcd62ada
Merge pull request #179256 from primeos/chromiumDev
chromiumDev: 104.0.5112.12 -> 104.0.5112.20
2022-06-27 20:05:27 +02:00
Martin Weinelt
71c17fd17f
firefox-beta-bin-unwrapped: 102.0b5 -> 102.0b9 2022-06-27 14:20:48 +02:00
Martin Weinelt
46f9c89390
firefox-devedition-unwrapped: 102.0b6 -> 102.0b9 2022-06-27 14:20:47 +02:00
Martin Weinelt
ddc17118f0
firefox-esr-91-unwrapped: 91.10.0esr -> 91.11.0esr
https://www.mozilla.org/en-US/firefox/91.11.0/releasenotes/
2022-06-27 14:20:47 +02:00
Martin Weinelt
1832364599
firefox-esr-102-unwrapped: init at 102.0esr
https://www.mozilla.org/en-US/firefox/102.0/releasenotes/
2022-06-27 14:20:47 +02:00
Martin Weinelt
32b18b77bd
firefox-bin-unwrapped: 101.0.1 -> 102.0
https://www.mozilla.org/en-US/firefox/102.0/releasenotes/
2022-06-27 14:20:42 +02:00
Martin Weinelt
736555d08f
firefox-unwrapped: 101.0.1 -> 102.0
https://www.mozilla.org/en-US/firefox/102.0/releasenotes/
2022-06-27 14:20:42 +02:00
Michael Weiss
4a4f0cc411
chromiumDev: 104.0.5112.12 -> 104.0.5112.20 2022-06-26 23:39:28 +02:00
Michael Weiss
57a56ee3d5
chromiumBeta: 103.0.5060.53 -> 104.0.5112.20 2022-06-26 23:38:37 +02:00
Steven Kou
09de927889
vivaldi: 5.3.2679.58-1 -> 5.3.2679.61-1 2022-06-26 12:45:53 +08:00
Robert Schütz
479d8f4fd8 qutebrowser: 2.5.1 -> 2.5.2
https://github.com/qutebrowser/qutebrowser/releases/tag/v2.5.2
2022-06-26 04:31:11 +00:00
Martin Weinelt
b45a1a2e82
Merge pull request #178390 from aszlig/firefox-fix-signing-required-detection 2022-06-25 11:42:47 +02:00
Michael Weiss
fb3cb6c12f
Merge pull request #178645 from primeos/ungoogled-chromium
ungoogled-chromium: 102.0.5005.115 -> 103.0.5060.53
2022-06-23 21:45:38 +02:00
Robert Scott
466c2e342a treewide/applications: add sourceType binaryNativeCode for many packages 2022-06-23 18:38:19 +01:00
Michael Weiss
dd9c01a9af
ungoogled-chromium: 102.0.5005.115 -> 103.0.5060.53 2022-06-23 00:08:09 +02:00
Michael Weiss
de0f40f35b
chromium: 102.0.5005.115 -> 103.0.5060.53
https://chromereleases.googleblog.com/2022/06/stable-channel-update-for-desktop_21.html

This update includes 14 security fixes.

CVEs:
CVE-2022-2156 CVE-2022-2157 CVE-2022-2158 CVE-2022-2160 CVE-2022-2161
CVE-2022-2162 CVE-2022-2163 CVE-2022-2164 CVE-2022-2165
2022-06-21 23:13:51 +02:00
aszlig
9744ff74ad
firefox: Improve detecting signing requirements
Firefox 61 started to enforce signatures for add-ons and since
commit d031843a1e, we get an evaluation
error that recommends the user to switch to Firefox ESR.

This isn't an option for everyone and as I also pointed out in the pull
request[1] introducing the above commit, I've been building Firefox like
this:

  let
    firefoxNoSigning = firefox-unwrapped.overrideAttrs (lib.const {
      MOZ_REQUIRE_SIGNING = false;
    });
  in wrapFirefox firefoxNoSigning {
    nixExtensions = ...;
  }

However, this only works after manually modifying nixpkgs (or copy &
paste wrapper.nix elsewhere) every time I want to have a new Firefox
version. Of course, this gets annoying and tedious after a while, so
this motivated me to properly fix this to not only check for an ESR
version but also check the value of MOZ_REQUIRE_SIGNING.

Note that I'm using toString here to check for the value because there
are several ways (false, null, "", ...) to set the environment variable
to an empty string and toString makes sure that it really is the desired
behaviour. I specifically checked the Firefox source and also tested
this with multiple values and only building with MOZ_REQUIRE_SIGNING
set to an empty string seems to work (no "0", "false" or other
variants).

Additionally, there is another method to allow unsigned add-ons, which
is by using the --with-unsigned-addon-scopes configure option[2].
Unfortunately, this does not work with nixExtensions because we don't
have (or want) a central directory where those add-ons reside.

Given that nixExtensions disallows manually installing add-ons, setting
MOZ_REQUIRE_SIGNING to false should be safe in this case.

[1]: https://github.com/NixOS/nixpkgs/pull/133504
[2]: https://bugs.archlinux.org/task/63075

Signed-off-by: aszlig <aszlig@nix.build>
2022-06-21 11:54:08 +02:00
Anderson Torres
ffaa3ee784
Merge pull request #178303 from Icy-Thought/master
brave: 1.38.115 -> 1.39.122
2022-06-20 23:05:46 -03:00
Michael Weiss
1938f36f03
Merge pull request #178279 from primeos/chromiumDev
chromiumDev: 104.0.5110.0 -> 104.0.5112.12
2022-06-20 22:57:02 +02:00
Icy-Thought
c70cbc077e
brave: 1.38.115 -> 1.39.122 2022-06-20 08:18:18 +02:00
Michael Weiss
b14fe90066
chromiumDev: 104.0.5110.0 -> 104.0.5112.12 2022-06-19 23:10:54 +02:00
José Romildo
419fcbb058 vivaldi: 5.3.2679.55-1 -> 5.3.2679.58-1 2022-06-19 09:31:08 -03:00
github-actions[bot]
b7aba4fb0f
Merge master into staging-next 2022-06-19 00:02:36 +00:00
Sandro
8dc07f821b
Merge pull request #175158 from kuwii/dev/microsoft-edge
microsoft-edge: 100.0.1185.44 -> 102.0.1245.44
2022-06-19 01:34:05 +02:00