3
0
Fork 0
forked from mirrors/nixpkgs
Commit graph

2609 commits

Author SHA1 Message Date
Domen Kožar 89ede978a0
chromium: use jumbo builds to speedup compilation
On Hetzner machine with 1 core: 4h40m
On Hetzner machine with 8 cores: 1h20m
2018-11-01 17:51:51 +00:00
adisbladis 1756b0fb75
firefox-beta-bin: 64.0b3 -> 64.0b5 2018-10-30 18:33:04 +00:00
adisbladis 22c7bc1e0f
firefox-devedition-bin: 64.0b3 -> 64.0b5 2018-10-30 18:32:58 +00:00
Robert Schütz cc161d738b qutebrowser: 1.5.1 -> 1.5.2 2018-10-30 14:10:44 +01:00
Joachim F 3272b9a2e9
Merge pull request #49173 from oxij/pkgs/update-tor-browser-again
firefoxPackages.tor-browser: 8.0.2 -> 8.0.3
2018-10-29 09:54:17 +00:00
Herwig Hochleitner ed91407784 Revert "chromium: make gcc8 build available via buildWithGcc flag"
This partially reverts commit
b70ab5c405 (except for depending gnome2)

see #48922
2018-10-28 17:10:53 +01:00
Herwig Hochleitner 17585ff6d8 chromium: 70.0.3538.67 -> 70.0.3538.77 2018-10-28 16:00:46 +01:00
Herwig Hochleitner b70ab5c405 chromium: make gcc8 build available via buildWithGcc flag 2018-10-28 16:00:46 +01:00
Herwig Hochleitner 7eea24db5d chromium/plugins: specify gcc instead of stdenv.cc 2018-10-28 16:00:46 +01:00
volth d2daf0dd6f chromium: build with clang 2018-10-28 16:00:45 +01:00
SLNOS 87d0fe0049 firefoxPackages.tor-browser: 8.0.2 -> 8.0.3 2018-10-26 18:02:05 +00:00
José Romildo Malaquias 34964d6f3b vivaldi-ffmpeg-codecs: 69.0.3497.73 -> 70.0.3538.77 2018-10-25 18:28:59 -03:00
José Romildo Malaquias 3cd8c2240b vivaldi: 2.0.1309.29-2 -> 2.1.1337.36-1 2018-10-25 18:27:49 -03:00
Andreas Rammhold d17ab805fd
Merge pull request #48862 from andir/firefox
firefox{,bin}: 62.0.3 -> 63.0 & nss: 3.38-> 3.39
2018-10-25 07:29:07 +02:00
Herwig Hochleitner bb03fbc2c8 chromium: 69.0.3497.100 -> 70.0.3538.67 2018-10-24 19:38:51 +02:00
Will Dietz 8324a938e7 tor-browser-bundle-bin: 8.0.2 -> 8.0.3
https://gitweb.torproject.org/builders/tor-browser-build.git/tree/projects/tor-browser/Bundle-Data/Docs/ChangeLog.txt?h=tbb-8.0.3-build1
2018-10-24 10:45:55 -05:00
adisbladis 515f89bc3a
firefox-beta-bin: 63.0b14 -> 64.0b3 2018-10-24 13:57:07 +01:00
adisbladis 19b7cf3abd
firefox-devedition-bin: 63.0b14 -> 64.0b3 2018-10-24 13:57:06 +01:00
Andreas Rammhold 5137c04770
firefox-bin: 62.0.3 -> 63.0 2018-10-23 10:15:48 +02:00
Andreas Rammhold 277da59e47
firefox: 62.0.3 -> 63.0 2018-10-23 10:15:46 +02:00
Joachim F c54c00465f
Merge pull request #48715 from oxij/pkgs/update-tor-browser
firefoxPackages.tor-browser: 7.5.6 -> 8.0.2
2018-10-22 18:28:14 +00:00
Jörg Thalheim 119d539d72
Merge pull request #47864 from uskudnik/add-brave-browser
brave: init at 0.24.0
2018-10-22 11:01:22 +01:00
SLNOS 0e3df42d64 firefoxPackages.tor-browser-8-0: apply a fix from bugzilla 2018-10-21 19:18:28 +00:00
worldofpeace 9d49b19ea5 eolie: 0.9.41 -> 0.9.45 (#48719) 2018-10-20 00:12:54 +02:00
SLNOS bd7c0c8a6c firefoxPackages.tor-browser: 7.5.6 -> 8.0.2
Mostly usable now.
2018-10-19 16:46:55 +00:00
SLNOS b21b9bbd6c firefoxPackages: indent 2018-10-19 16:46:41 +00:00
SLNOS 5ec27f3033 firefoxPackages: cleanup
Misc cleanups, but mainly this:

Before:
- `version` could mean either Firefox or TorBrowser version,
- `configureFlags` was hacky.

Now:
- `ffversion` is Firefox version, `tbversion` is TorBrowser version,
- `configureFlags` is much less hacky.
2018-10-19 16:46:28 +00:00
volth 337d140953 chromium: propagate stdenv for "chromium.override{ stdenv=gcc8Stdenv; }" (#48615) 2018-10-18 23:09:12 +02:00
volth d767ba9996 chromium 71+: there is no more option 'use_gtk3' (#48595) 2018-10-17 23:04:15 +02:00
volth d039722d0e chromium 71+: add at-spi2-core dependency (#48594) 2018-10-17 23:03:43 +02:00
volth 0c8cdb53f6 chromium: fix aarch64 build (#48586)
* chromium: fix aarch64 build

* chromium: use more stable urls
2018-10-17 01:21:29 +02:00
Urban Skudnik c90ad779a0
brave: init at 0.25.2 2018-10-16 20:19:37 +02:00
volth 2ad99a662d chromium plugins: add meta.platforms (#48495)
to prevent their installation on aarch64
2018-10-16 18:11:41 +02:00
R. RyanTM caa6ab0048 qutebrowser: 1.4.2 -> 1.5.1
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/qutebrowser/versions
2018-10-14 08:58:45 +02:00
adisbladis 00d7ce7ef1
firefox-beta-bin: 63.0b13 -> 63.0b14 2018-10-14 11:24:12 +08:00
adisbladis 726dd79151
firefox-devedition-bin: 63.0b13 -> 63.0b14 2018-10-14 11:24:03 +08:00
Will Dietz ce6db5e36e chromium: update to 69.0.3497.100 (and others), ran update.sh 2018-10-12 12:20:35 +02:00
Will Dietz 4b7de150a8 chromium/update.sh: don't use remote builders, lots of copying for work 2018-10-12 12:20:35 +02:00
xeji bde4483d13
flashplayer: 31.0.0.108 -> 31.0.0.122 (#48126)
previous version was removed upstream (404)
2018-10-10 23:49:40 +02:00
adisbladis ffc899dab1
firefox-beta-bin: 63.0b9 -> 63.0b13 2018-10-09 17:36:43 +08:00
adisbladis c19fc34926
firefox-devedition-bin: 63.0b9 -> 63.0b13 2018-10-09 17:36:42 +08:00
worldofpeace e5bea728ce eolie: 0.9.37 -> 0.9.41 (#47942) 2018-10-06 15:32:03 +02:00
Andreas Rammhold 248ed3575c tor-browser-bundle-bin: 8.0.1 -> 8.0.2
Update to latest version due to security updates and 8.0.1 not being
available on the mirrors anymore.

Release notes: https://blog.torproject.org/new-release-tor-browser-802
2018-10-06 14:49:19 +02:00
Corey O'Connor ba2fe3c9a6 firefox: disable auto updates using distribution policies.
Resolves #33884
2018-10-03 07:22:49 -07:00
Andreas Rammhold 246d2848ff
firefox-esr-60: 60.2.1 -> 60.2.2 [critical security fixes]
This update bumps the package to the latest stable version containing a
few security fixes:

- CVE-2018-12386: Type confusion in JavaScript
  A vulnerability in register allocation in JavaScript can lead to type
  confusion, allowing for an arbitrary read and write. This leads to
  remote code execution inside the sandboxed content process when
  triggered.

- CVE-2018-12387
  A vulnerability where the JavaScript JIT compiler inlines
  Array.prototype.push with multiple arguments that results in the stack
  pointer being off by 8 bytes after a bailout. This leaks a memory
  address to the calling function which can be used as part of an
  exploit inside the sandboxed content process.

Source: https://www.mozilla.org/en-US/security/advisories/mfsa2018-24/
2018-10-03 09:51:13 +02:00
Andreas Rammhold e7785f1148
firefox: 62.0.2 -> 62.0.3 [critical security fixes]
This update bumps the package to the latest stable version containing a
few security fixes:

- CVE-2018-12386: Type confusion in JavaScript
  A vulnerability in register allocation in JavaScript can lead to type
  confusion, allowing for an arbitrary read and write. This leads to
  remote code execution inside the sandboxed content process when
  triggered.

- CVE-2018-12387
  A vulnerability where the JavaScript JIT compiler inlines
  Array.prototype.push with multiple arguments that results in the stack
  pointer being off by 8 bytes after a bailout. This leaks a memory
  address to the calling function which can be used as part of an
  exploit inside the sandboxed content process.

Source: https://www.mozilla.org/en-US/security/advisories/mfsa2018-24/
2018-10-03 09:51:13 +02:00
Andreas Rammhold 64d02660cb
firefox-bin: 62.0.2 -> 62.0.3 [critical security fixes]
This update bumps the package to the latest stable version containing a
few security fixes:

- CVE-2018-12386: Type confusion in JavaScript
  A vulnerability in register allocation in JavaScript can lead to type
  confusion, allowing for an arbitrary read and write. This leads to
  remote code execution inside the sandboxed content process when
  triggered.

- CVE-2018-12387
  A vulnerability where the JavaScript JIT compiler inlines
  Array.prototype.push with multiple arguments that results in the stack
  pointer being off by 8 bytes after a bailout. This leaks a memory
  address to the calling function which can be used as part of an
  exploit inside the sandboxed content process.

Source: https://www.mozilla.org/en-US/security/advisories/mfsa2018-24/
2018-10-03 09:35:54 +02:00
Jörg Thalheim c527619db6
Merge pull request #47485 from prusnak/remove-mozilla-plugins-trezor
mozilla-plugins/trezor: remove applications/networking/browsers/mozilla-plugins/trezor
2018-09-29 11:52:32 +01:00
Pavol Rusnak 62b15996a7
mozilla-plugins/trezor: remove applications/networking/browsers/mozilla-plugins/trezor
trezor-mozilla-plugin is no longer maintained software

package pkgs/servers/trezord should be used instead
2018-09-29 12:24:43 +02:00
Wael M. Nasreddine fa46ce3828
browsh: 1.4.10 -> 1.4.13 2018-09-28 15:32:02 -07:00