Commit Graph

1486 Commits

Author SHA1 Message Date
Michael Weiss
a6a9ace068
Merge pull request #213156 from primeos/chromiumBeta
chromiumBeta: 110.0.5481.38 -> 110.0.5481.52
2023-01-29 21:09:31 +01:00
Michael Weiss
044c928be8
chromiumBeta: 110.0.5481.38 -> 110.0.5481.52 2023-01-28 14:19:34 +01:00
Michael Weiss
ba5a5ec3ef
chromium: 109.0.5414.74 -> 109.0.5414.119
https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop_24.html

This update includes 6 security fixes.

CVEs:
CVE-2023-0471 CVE-2023-0472 CVE-2023-0473 CVE-2023-0474
2023-01-28 14:19:12 +01:00
Michael Adler
064a662f08 ungoogled-chromium: 109.0.5414.87 -> 109.0.5414.120 2023-01-27 08:02:42 +01:00
Shawn8901
0a1dd3ced1 treewide: remove global with lib; in pkgs/{misc,networking} 2023-01-24 17:29:20 +01:00
Michael Weiss
82094bac71
Merge pull request #211925 from primeos/chromiumDev
chromiumDev: 111.0.5532.2 -> 111.0.5545.6
2023-01-22 15:21:45 +01:00
Michael Weiss
92b0446345
Merge pull request #211924 from primeos/chromiumBeta
chromiumBeta: 110.0.5481.30 -> 110.0.5481.38
2023-01-22 15:21:31 +01:00
Adam Joseph
42815b4a0c treewide: systemdSupport: use lib.meta.availableOn
Many packages have some kind of flag indicating whether or not to build with
systemd support.  Most of these default to `stdenv.isLinux`, but systemd does
not build on (and is marked `broken` for) `isStatic`.  Only a few packages have
the needed `&& !isStatic` in the default value for their parameter.

This commit moves the logic for the default value of these flags into
`systemd.meta.{platforms,badPlatforms}` and evaluates those conditions using
`lib.meta.availableOn`.

This provides three benefits:

1. The default values are set correctly (i.e. including `&& isStatic`)

2. The default values are set consistently

3. The way is paved for any future non-Linux systemd platforms (FreeBSD is
   reported to have experimental systemd support)
2023-01-22 00:27:19 -08:00
Michael Weiss
5d7923fe1d
chromiumDev: 111.0.5532.2 -> 111.0.5545.6 2023-01-21 13:33:14 +01:00
Michael Weiss
31210707b6
chromiumBeta: 110.0.5481.30 -> 110.0.5481.38 2023-01-21 13:32:52 +01:00
Sandro
3d14bd27f4
Merge pull request #206401 from imsofi/chromium-wrapper
chromium: fix web app linking
2023-01-19 03:15:07 +01:00
Michael Weiss
40dab725ae
Merge pull request #210899 from primeos/chromiumDev
chromiumDev: 110.0.5481.30 -> 111.0.5532.2
2023-01-15 22:10:55 +01:00
Michael Weiss
6b6e05d0cd
chromiumBeta: 109.0.5414.74 -> 110.0.5481.30 2023-01-15 13:26:36 +01:00
Michael Weiss
6d5a8a8e9f
chromiumDev: 110.0.5481.30 -> 111.0.5532.2 2023-01-15 13:25:29 +01:00
Michael Weiss
d06d765eea
Merge pull request #210250 from primeos/chromiumDev
chromiumDev: 110.0.5481.24 -> 110.0.5481.30
2023-01-15 13:25:07 +01:00
Michael Adler
79a26e0c70 ungoogled-chromium: 108.0.5359.125 -> 109.0.5414.87 2023-01-12 20:11:07 +01:00
Michael Weiss
8d54655c51
chromiumDev: 110.0.5481.24 -> 110.0.5481.30 2023-01-11 21:13:47 +01:00
Michael Weiss
5bba17c9aa
chromium: 108.0.5359.124 -> 109.0.5414.74
https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html

This update includes 17 security fixes.

CVEs:
CVE-2023-0128 CVE-2023-0129 CVE-2023-0130 CVE-2023-0131 CVE-2023-0132
CVE-2023-0133 CVE-2023-0134 CVE-2023-0135 CVE-2023-0136 CVE-2023-0137
CVE-2023-0138 CVE-2023-0139 CVE-2023-0140 CVE-2023-0141
2023-01-10 23:05:44 +01:00
Michael Weiss
88561ca46a
chromiumDev: 110.0.5478.4 -> 110.0.5481.24 2023-01-05 23:40:12 +01:00
Michael Weiss
9e2070e1e5
chromiumBeta: 109.0.5414.61 -> 109.0.5414.74 2023-01-04 21:44:08 +01:00
Michael Weiss
6e1f2baf4a
chromiumBeta: 109.0.5414.46 -> 109.0.5414.61 2023-01-03 22:56:07 +01:00
Michael Weiss
62936a094c
Merge pull request #208649 from primeos/chromiumDev
chromiumDev: 110.0.5464.2 -> 110.0.5478.4
2023-01-01 18:45:17 +01:00
Michael Weiss
c9ca13ce9a
chromium: Drop passthru.updateScript
The update script for Chromium does not behave like other update
scripts, e.g., it updates all channels and ungoogled-chromium (not just
a single package). This causes issues when r-ryantm (the bot that runs
nixpkgs-update) tries to update chromium and ungoogled-chromium (which
it started to do recently):
- https://github.com/NixOS/nixpkgs/pull/207185
- https://github.com/NixOS/nixpkgs/pull/207482
- https://github.com/NixOS/nixpkgs/pull/207596
- https://github.com/NixOS/nixpkgs/pull/208048
- https://github.com/NixOS/nixpkgs/pull/208287

We could make the update script work as expected by other tooling but
Chromium requires special attention anyway so it might also be for the
best to do it manually for now (at least someone needs to ensure that
the correct labels are set and that security fixes (~ all updates) are
backported).
2023-01-01 18:07:17 +01:00
Michael Weiss
b7431c54ac
chromiumDev: 110.0.5464.2 -> 110.0.5478.4 2023-01-01 17:56:04 +01:00
Michael Weiss
b43f29bdc2
Merge pull request #206306 from primeos/chromium
chromium: 108.0.5359.98 -> 108.0.5359.124
2022-12-17 14:10:10 +01:00
Sofi
1ddba4aadb
chromium: fix web app linking
Currently Chromium will generate its Web App shortcuts by pointing to
the current unwrapped executable of itself. This leads to all Web App
shortcuts failing to launch as it is not launched trough nixpkgs's
wrapper.

This fix will set the `CHROME_WRAPPER` environment variable to point
to a valid wrapper script, allowing chromium based browsers to generate
valid `.desktop` files.

NOTE: As these files are only set once by the browser inside of
`~/.local/share/applications` and not updated, this fix will only work
for generating new shortcuts, and only work as long as the relevant
binary is available in `$PATH` for that user.

INFO: While generic sounding, `CHROME_WRAPPER` is only invoked inside of
`web_app_shortcut_linux.cc`[^1], so it should only affect the generation
of web app shortcut files.

INFO: There is a similar patch for google-chrome itself in nixpkgs.[^2]

[^1]: https://source.chromium.org/chromium/chromium/src/+/main:chrome/browser/shell_integration_linux.cc;l=405;drc=b8f43a4e55639b03f76eccc6f6b951f2d06b8833
[^2]: https://github.com/NixOS/nixpkgs/pull/155430/
2022-12-16 14:37:45 +01:00
Michael Weiss
95ea5bb254
Merge pull request #206305 from primeos/chromiumDev
chromiumDev: 110.0.5449.0 -> 110.0.5464.2
2022-12-15 23:39:32 +01:00
Michael Weiss
4d78fa3a59
chromium: 108.0.5359.98 -> 108.0.5359.124
https://chromereleases.googleblog.com/2022/12/stable-channel-update-for-desktop_13.html

This update includes 8 security fixes.

CVEs:
CVE-2022-4436 CVE-2022-4437 CVE-2022-4438 CVE-2022-4439 CVE-2022-4440
2022-12-15 22:51:27 +01:00
Michael Weiss
497daee731
chromiumDev: 110.0.5449.0 -> 110.0.5464.2 2022-12-15 22:46:56 +01:00
Michael Weiss
ecf38ccd11
chromiumBeta: 109.0.5414.36 -> 109.0.5414.46 2022-12-15 22:46:34 +01:00
Michael Adler
9adfad5eaa ungoogled-chromium: 108.0.5359.99 -> 108.0.5359.125 2022-12-15 10:06:07 +01:00
Michael Weiss
d8f6360c16
chromiumBeta: 109.0.5414.25 -> 109.0.5414.36 2022-12-08 23:33:30 +01:00
Michael Adler
3f7c8b2b96 ungoogled-chromium: 108.0.5359.95 -> 108.0.5359.99 2022-12-08 09:20:21 +01:00
Michael Weiss
efb623debc
chromium: 108.0.5359.94 -> 108.0.5359.98
https://chromereleases.googleblog.com/2022/12/stable-channel-update-for-desktop_7.html
2022-12-07 22:05:46 +01:00
Michael Weiss
31327b34c6
Merge pull request #204365 from primeos/ungoogled-chromium
ungoogled-chromium: 108.0.5359.72 -> 108.0.5359.95
2022-12-04 11:25:11 +01:00
Michael Weiss
66bdeac7cb
chromium: 108.0.5359.71 -> 108.0.5359.94
https://chromereleases.googleblog.com/2022/12/stable-channel-update-for-desktop.html

This update includes 1 security fix. Google is aware that an exploit for
CVE-2022-4262 exists in the wild.

CVEs:
CVE-2022-4262
2022-12-04 00:02:59 +01:00
Michael Weiss
d23b4148e7
ungoogled-chromium: 108.0.5359.72 -> 108.0.5359.95 2022-12-04 00:02:38 +01:00
Michael Weiss
74949d9c40
ungoogled-chromium: 107.0.5304.122 -> 108.0.5359.72 2022-12-02 15:48:34 +01:00
Michael Weiss
c40e6aac68
Merge pull request #203996 from primeos/chromiumDev
chromiumDev: 109.0.5414.10 -> 110.0.5449.0
2022-12-02 12:33:00 +01:00
Michael Weiss
e4864d2966
chromiumDev: 109.0.5414.10 -> 110.0.5449.0 2022-12-01 21:57:19 +01:00
Michael Weiss
33daeebd6b
chromiumBeta: 108.0.5359.71 -> 109.0.5414.25 2022-12-01 21:56:35 +01:00
Michael Weiss
3609aedb1e
chromium: 107.0.5304.121 -> 108.0.5359.71
https://chromereleases.googleblog.com/2022/11/stable-channel-update-for-desktop_29.html

This update includes 28 security fixes.

CVEs:
CVE-2022-4174 CVE-2022-4175 CVE-2022-4176 CVE-2022-4177 CVE-2022-4178
CVE-2022-4179 CVE-2022-4180 CVE-2022-4181 CVE-2022-4182 CVE-2022-4183
CVE-2022-4184 CVE-2022-4185 CVE-2022-4186 CVE-2022-4187 CVE-2022-4188
CVE-2022-4189 CVE-2022-4190 CVE-2022-4191 CVE-2022-4192 CVE-2022-4193
CVE-2022-4194 CVE-2022-4195
2022-11-30 10:27:59 +01:00
Michael Weiss
ed4a7faf43
chromiumBeta: 108.0.5359.48 -> 108.0.5359.71 (#203681)
* chromiumBeta: 108.0.5359.48 -> 108.0.5359.62

* chromiumBeta: 108.0.5359.62 -> 108.0.5359.71
2022-11-30 10:27:28 +01:00
Michael Weiss
4024dedc4d
chromiumBeta: Fix the build
We do already set `system_wayland_scanner_path` to
`"${wayland}/bin/wayland-scanner"` but apparently wayland-scanner wasn't
required (anymore?) as wayland-scanner is only in the `bin` output (I have a
few ideas what could've changed but didn't bother to check as it isn't worth
the time as long as it works now).

This fixes the following build error:
```
ninja: error: '../../../../../../../../nix/store/l3y9k2x7cqzcjj9s18z7la9xqsjq6r52-wayland-1.21.0/bin/wayland-scanner', needed by 'gen/components/exo/wayland/protocol/aura-shell-protocol.c', missing and no known rule to make it
```
2022-11-28 21:55:56 +01:00
Michael Weiss
9d05d42f4d
chromiumBeta: Fix the configuration phase
Upstream switched use_system_libwayland to false [0] and
system_wayland_scanner_path will now only be declared if
use_system_wayland_scanner is set to true (it defaults to
use_system_libwayland) [1].

In Nixpkgs, we usually try to set use_system_* to true (i.e., we favor
system libraries over bundled/vendored ones) but in the case of Chromium
this can become difficult to maintain so we might eventually drop
`use_system_libwayland = true` again (IIRC this only caused one
incompatibility in the past though: b6b51374fc7; and f9d9864cb6 will
become relevant again when we build with the bundled libwayland).

[0]: b33bdfe265
[1]: 272220cefa
2022-11-27 19:10:44 +01:00
Michael Weiss
66df6c7b46
Merge pull request #202869 from michaeladler/ungoogled
ungoogled-chromium: 107.0.5304.110 -> 107.0.5304.122
2022-11-26 00:27:06 +01:00
Michael Adler
9fa2f1bf3e ungoogled-chromium: 107.0.5304.110 -> 107.0.5304.122 2022-11-25 16:30:26 +01:00
Michael Weiss
dbea32f981
chromium: 107.0.5304.110 -> 107.0.5304.121
https://chromereleases.googleblog.com/2022/11/stable-channel-update-for-desktop_24.html

This update includes 1 security fix. Google is aware that an exploit for
CVE-2022-4135 exists in the wild.

CVEs:
CVE-2022-4135
2022-11-24 23:07:41 +01:00
Michael Weiss
6492d64628
chromiumDev: 109.0.5410.0 -> 109.0.5414.10 2022-11-21 23:55:19 +01:00
Michael Weiss
f2b994a384
chromiumBeta: 108.0.5359.40 -> 108.0.5359.48 2022-11-17 00:04:52 +01:00