Commit Graph

1132 Commits

Author SHA1 Message Date
github-actions[bot]
8f206d92d9
Merge master into staging-next 2022-08-23 18:01:18 +00:00
Martin Weinelt
1c98a4b64b
firefox-esr-102-unwrapped: 102.1.0esr -> 102.2.0esr
https://www.mozilla.org/en-US/firefox/102.2.0/releasenotes/

Fixes: CVE-2022-38472, CVE-2022-38473, CVE-2022-38476, CVE-2022-38477,
       CVE-2022-38478
2022-08-23 17:50:55 +02:00
Martin Weinelt
d50d54a0fe
firefox-esr-91-unwrapped: 91.12.0esr -> 91.13.0esr
https://www.mozilla.org/en-US/firefox/91.13.0/releasenotes/

Fixes: CVE-2022-38472, CVE-2022-38473, CVE-2022-38478
2022-08-23 17:50:26 +02:00
Martin Weinelt
097a473056
firefox-unwrapped: 103.0.2 -> 104.0
https://www.mozilla.org/en-US/firefox/104.0/releasenotes/

Fixes: CVE-2022-38472, CVE-2022-38473, CVE-2022-38474, CVE-2022-38475,
       CVE-2022-38477, CVE-2022-38478
2022-08-23 17:49:27 +02:00
github-actions[bot]
318717f2e3
Merge master into staging-next 2022-08-20 00:02:22 +00:00
Emery Hemingway
b5526585c2 treewide: inject xdg-open into wrappers as $PATH suffix
The xdg-open utility is only ever a runtime dependency and its
dependents only expect that it accept a URI as a command line
argument and do something with it that the user would expect.
For such as a trivial relationship it should be possible for
users to override xdg-open with something else in their PATH.
2022-08-19 13:11:27 -05:00
github-actions[bot]
79661ba7e2
Merge staging-next into staging 2022-08-15 18:02:00 +00:00
Ryan Hendrickson
3b1f5eab31 firefox: add application actions to .desktop file 2022-08-15 12:47:27 -04:00
Sergei Trofimovich
3ceb8a59a6
Merge pull request #185537 from trofi/decouple-strip-and-separate-debug
setup-hooks/separate-debug-info.sh: don't inhibit strip hook
2022-08-11 08:53:24 +01:00
Martin Weinelt
52aef90bc6
firefox-unwrapped: 103.0.1 -> 103.0.2
https://www.mozilla.org/en-US/firefox/103.0.2/releasenotes/
2022-08-08 22:36:45 +02:00
Sergei Trofimovich
b3b672d5a1 setup-hooks/separate-debug-info.sh: don't inhibit strip hook
Before the change separate-debug-info.sh did the stripping itself.
This scheme has a few problems:
1. Stripping happens only on ELF files. *.a and *.o files are skipped.
   Derivations have to do it manually. Usually incorrectly
   as they don't run $RANLIB (true for `glibc` and `musl`).
2. Stripping happens on all paths. Ideally only `stripDebugList` paths
   should be considered.
3. Host strip is called on Target files.

This change offloads stripping logic to strip hook. This strips more
files for `glibc` and `musl`. Now we can remove most $STRIP calls
from individual derivations.

Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2022-08-07 12:49:37 +01:00
Martin Weinelt
46d5c7389f
firefox-esr-{91,102}-unwrapped: set proper pname 2022-08-06 11:36:37 +02:00
Martin Weinelt
f53dff8a0f
Merge pull request #184811 from SuperSandro2000/SuperSandro2000-patch-4 2022-08-04 12:00:29 +02:00
Sandro
7b270bf098
firefox-unwrapped: use pname+version 2022-08-02 14:22:42 +02:00
Martin Weinelt
a03cc9a933
firefox-unwrapped: 103.0 -> 103.0.1
https://www.mozilla.org/en-US/firefox/103.0.1/releasenotes/
2022-08-01 12:59:41 +02:00
Martin Weinelt
aafd5020fa
firefox-esr-91-unwrapped: 91.11.0esr -> 91.12.0esr
https://www.mozilla.org/en-US/firefox/91.12.0/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2022-29/

Fixes: CVE-2022-36319, CVE-2022-36318
2022-07-26 15:05:13 +02:00
Martin Weinelt
a2c4eb714d
firefox-esr-102-unwrapped: 102.0.1esr -> 102.1.0esr
https://www.mozilla.org/en-US/firefox/102.1.0/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2022-30/

Fixes: CVE-2022-36319, CVE-2022-36318, CVE-2022-36314, CVE-2022-2505
2022-07-26 15:05:13 +02:00
Martin Weinelt
a168249ddc
firefox-unwrapped: 102.0.1 -> 103.0
https://www.mozilla.org/en-US/firefox/103.0/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2022-28/

Fixes: CVE-2022-36319, CVE-2022-36317, CVE-2022-36318, CVE-2022-36314,
       CVE-2022-36315, CVE-2022-36316, CVE-2022-36320, CVE-2022-2505
2022-07-26 15:05:04 +02:00
Martin Weinelt
1bfb66edf8
Merge pull request #181312 from r-ryantm/auto-update/firefox-esr-102-unwrapped 2022-07-14 13:33:05 +02:00
Martin Weinelt
1f5af608e7
Merge pull request #179433 from mweinelt/firefox-updatescript
firefox: Extend upgrade script with version prefix
2022-07-14 10:54:01 +02:00
R. Ryantm
0b91cc0961 firefox-esr-102-unwrapped: 102.0esr -> 102.0.1esr 2022-07-13 03:57:47 +00:00
Martin Weinelt
e3e78bb409
firefox-unwrapped: 102.0 -> 102.0.1
https://www.mozilla.org/en-US/firefox/102.0.1/releasenotes/
2022-07-05 20:45:26 +02:00
Martin Weinelt
76ff019153
firefox: Extend upgrade script with version prefix
Prevents upgrades of versioned ESR packages between major versions.
2022-06-28 11:53:18 +02:00
Martin Weinelt
ddc17118f0
firefox-esr-91-unwrapped: 91.10.0esr -> 91.11.0esr
https://www.mozilla.org/en-US/firefox/91.11.0/releasenotes/
2022-06-27 14:20:47 +02:00
Martin Weinelt
1832364599
firefox-esr-102-unwrapped: init at 102.0esr
https://www.mozilla.org/en-US/firefox/102.0/releasenotes/
2022-06-27 14:20:47 +02:00
Martin Weinelt
736555d08f
firefox-unwrapped: 101.0.1 -> 102.0
https://www.mozilla.org/en-US/firefox/102.0/releasenotes/
2022-06-27 14:20:42 +02:00
aszlig
9744ff74ad
firefox: Improve detecting signing requirements
Firefox 61 started to enforce signatures for add-ons and since
commit d031843a1e, we get an evaluation
error that recommends the user to switch to Firefox ESR.

This isn't an option for everyone and as I also pointed out in the pull
request[1] introducing the above commit, I've been building Firefox like
this:

  let
    firefoxNoSigning = firefox-unwrapped.overrideAttrs (lib.const {
      MOZ_REQUIRE_SIGNING = false;
    });
  in wrapFirefox firefoxNoSigning {
    nixExtensions = ...;
  }

However, this only works after manually modifying nixpkgs (or copy &
paste wrapper.nix elsewhere) every time I want to have a new Firefox
version. Of course, this gets annoying and tedious after a while, so
this motivated me to properly fix this to not only check for an ESR
version but also check the value of MOZ_REQUIRE_SIGNING.

Note that I'm using toString here to check for the value because there
are several ways (false, null, "", ...) to set the environment variable
to an empty string and toString makes sure that it really is the desired
behaviour. I specifically checked the Firefox source and also tested
this with multiple values and only building with MOZ_REQUIRE_SIGNING
set to an empty string seems to work (no "0", "false" or other
variants).

Additionally, there is another method to allow unsigned add-ons, which
is by using the --with-unsigned-addon-scopes configure option[2].
Unfortunately, this does not work with nixExtensions because we don't
have (or want) a central directory where those add-ons reside.

Given that nixExtensions disallows manually installing add-ons, setting
MOZ_REQUIRE_SIGNING to false should be safe in this case.

[1]: https://github.com/NixOS/nixpkgs/pull/133504
[2]: https://bugs.archlinux.org/task/63075

Signed-off-by: aszlig <aszlig@nix.build>
2022-06-21 11:54:08 +02:00
github-actions[bot]
6eeef3eaa8
Merge master into staging-next 2022-06-13 00:02:20 +00:00
Martin Weinelt
d5a87edeab
buildMozillaMach: allow PGO on all Linux platforms
Tested on the aarch64 community builder and it didn't get stuck like
back when we first tried to enable PGO.
2022-06-12 12:42:14 +02:00
github-actions[bot]
0fff57e90d
Merge master into staging-next 2022-06-11 00:01:54 +00:00
R. Ryantm
4b582932fb firefox-unwrapped: 101.0 -> 101.0.1
https://www.mozilla.org/en-US/firefox/101.0.1/releasenotes/
2022-06-10 22:35:36 +02:00
Martin Weinelt
299b9a1b59
buildMozillaMach: add patch for rust-cbindgen 0.24 compat
Fixes a regression caused by an update to rust-cbindgen 0.24.x, where
the definition for ROOT_CLIP_CHAIN is now autogenerated and causes the
build to abort with a redefinition error.

https://bugzilla.mozilla.org/show_bug.cgi?id=1773259

Patch by Ollivier Tilloy from Canonical

5622734942
2022-06-08 22:03:31 +02:00
Sergei Trofimovich
4b88d42f51 firefox: disable 'MOZILLA_OFFICIAL=1' on i686
Without the change firefox build on i686 fails at configure time:

    $ NIXPKGS_ALLOW_BROKEN=1 nix build -f. --argstr system "i686-linux" firefox
    ...
    mozbuild.configure.options.InvalidOptionError:
      '--enable-release' implied by 'MOZILLA_OFFICIAL' conflicts with '--disable-release' from the command-line

The change uses the same 32-bit guard for both. It still does not allow
i686 build to succeed for other toolchain misconfiguration, but it's a
step forward.
2022-06-05 08:44:41 -05:00
Klemens Nanni
5d27c8d53f firefox: merge identical optionalAttrs block, fix indent
Two consecutive sets are pulled in under the same `usesNixExtensions`
condition.

Due to wrong indentation, it does however they are nested.

Fix both.
2022-06-01 02:14:37 +02:00
Klemens Nanni
34364c9f5f firefox: smartcardSupport: Use multi-slot module
`onepin-opensc-pkcs11.so` only enables PIN1, but PIN2 is also required.
`opensc-pkcs11.so` enables all slots.

I can successfully use PIN1 and PIN2 in Smart-ID cards with this.
2022-06-01 01:22:45 +02:00
Martin Weinelt
f89d5a7f2c
firefox-esr-91-unwrapped: 91.9.1esr -> 91.10.0esr
https://www.mozilla.org/en-US/firefox/91.10.0/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2022-21/

Fixes: CVE-2022-31736, CVE-2022-31737, CVE-2022-31738, CVE-2022-31739,
       CVE-2022-31740, CVE-2022-31741, CVE-2022-31742, CVE-2022-31747
2022-05-31 16:34:39 +02:00
Martin Weinelt
332711833d
firefox-unwrapped: 100.0.2- -> 101.0
https://www.mozilla.org/en-US/firefox/101.0/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2022-20/

Fixes: CVE-2022-31736, CVE-2022-31737, CVE-2022-31738, CVE-2022-31739,
       CVE-2022-31740, CVE-2022-31741, CVE-2022-31742, CVE-2022-31743,
       CVE-2022-31744, CVE-2022-31745, CVE-2022-1919, CVE-2022-31747,
       CVE-2022-31748
2022-05-31 16:33:22 +02:00
Martin Weinelt
c5e0d57cdd
Merge pull request #173738 from mweinelt/firefox-mls 2022-05-24 20:08:46 +02:00
Martin Weinelt
2d97db7873
buildMozillaMach: set geo.provider.network.url for new profiles.
Use Mozilla Location Service as geolocation provider for new profiles,
since our Google API key does not seem to work for geolocation at this
time.

Related: https://github.com/NixOS/nixpkgs/issues/173758
2022-05-22 14:49:17 +02:00
Martin Weinelt
0750e47a4d
buildMozillaMach: Clean up Google API key configuration
Use a proper filename that and add the URL where information about
requesting API keys can be found.
2022-05-22 01:51:07 +02:00
Martin Weinelt
1ba9dfbd97
buildMozillaMach: add support for MLS
We have received our very own API key for Mozilla Location Services and
have been recognized as a Public Interest Project, implying a rate limit
of 100k daily requests¹, which should be sufficient for our population.

N.B: This key belongs to the NixOS project, please don't use ours, but
instead request your own.

[1] https://location.services.mozilla.com/terms
2022-05-22 01:50:56 +02:00
Jan Tojnar
b8b9f52393 Merge branch 'master' into staging-next
Conflicts:
- pkgs/applications/networking/browsers/firefox/common.nix between 318fae87c0 and f6c5761935.
2022-05-21 17:52:39 +02:00
Martin Weinelt
a6685a5a78
firefox-esr: 91.9.0esr -> 91.9.1esr
https://www.mozilla.org/en-US/firefox/91.9.1/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2022-19/

Fixes: CVE-2022-1802, CVE-2022-1529
2022-05-20 23:45:31 +02:00
Martin Weinelt
b7172d4238
firefox: 100.0.1 -> 100.0.2
https://www.mozilla.org/en-US/firefox/100.0.2/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2022-19/

Fixes: CVE-2022-1802, CVE-2022-1529
2022-05-20 23:23:47 +02:00
Martin Weinelt
318fae87c0
buildMozillaMach: Add distribution identifier and distribution.ini
Adds a distribution id useful for aggregation of crash statistics.

Also creates a NixOS flavor, visible through the About window, that is
also exposed through telemetry data, if enabled.
2022-05-19 23:12:47 +02:00
Shea Levy
7456be85db
Merge branch 'staging-next' into staging 2022-05-18 06:40:21 -04:00
squalus
4a1f7f8472 buildMozillaMach: fix builds with crash reporting disabled
- only try to build and copy crash reporting symbols when crash
  reporting is enabled
- fixes the librewolf build
2022-05-16 13:52:15 -07:00
github-actions[bot]
e2602ad62e
Merge staging-next into staging 2022-05-16 00:04:11 +00:00
Jan Tojnar
d1b77f990f Merge branch 'staging-next' into staging
Conflicts:
	pkgs/applications/networking/browsers/firefox/common.nix between f6c5761935 and a373324120.
2022-05-15 07:08:29 +02:00
Martin Weinelt
142cf31abb
firefox: 100.0 -> 100.0.1
https://www.mozilla.org/en-US/firefox/100.0.1/releasenotes/
2022-05-15 01:37:15 +02:00