3
0
Fork 0
forked from mirrors/nixpkgs
Commit graph

3884 commits

Author SHA1 Message Date
Stig Palmquist 10712e7b5f
firefox-bin: 82.0.2 -> 82.0.3 2020-11-16 05:12:53 +01:00
Andreas Rammhold d93868a92b
firefox-esr: 78.4.0esr -> 78.4.1esr 2020-11-15 14:36:01 +01:00
Andreas Rammhold 046002f472
firefox: 82.0.2 -> 82.0.3 2020-11-15 14:36:01 +01:00
José Romildo Malaquias cba35cbc5d
Merge pull request #102245 from badmutex/patch-1
vivaldi: 3.3.2022.47-1 -> 3.4.2066.90-1
2020-11-14 22:48:58 -03:00
Vladimír Čunát b94e7b7d89
Merge #103474: firefox, thunderbird: revert meta.timeout 2020-11-14 21:12:02 +01:00
Dominik Xaver Hörl 9e8f4ff79a tor-browser-bundle-bin: 10.0.2 -> 10.0.4 2020-11-13 13:02:23 +01:00
Michael Weiss b11f43f6be
Merge pull request #103595 from primeos/chromium
chromium: 86.0.4240.193 -> 86.0.4240.198
2020-11-13 11:20:17 +01:00
Samuel Dionne-Riel 5f936dac38
Merge pull request #103268 from JeffLabonte/update/brave_1.15.76_to_1.16.72
brave: 1.15.76 -> 1.16.72
2020-11-12 23:28:29 -05:00
Joachim F b719eb3c9f
Merge pull request #103570 from chkno/tor-noscript
tor-browser-bundle-bin: Fix extension path.  Fixes NoScript.
2020-11-12 23:32:14 +00:00
Chuck 4117c0b7df tor-browser-bundle-bin: Fix extension path. Fixes NoScript. 2020-11-12 08:00:38 -08:00
Michael Weiss b91153fd7a
chromium: 86.0.4240.193 -> 86.0.4240.198
https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_11.html

This update includes 2 security fixes. Google is aware of reports that
exploits for CVE-2020-16013 and CVE-2020-16017 exist in the wild.

CVEs: CVE-2020-16013 CVE-2020-16017
2020-11-12 12:39:24 +01:00
Robert Hensing 739b762e56 Revert "firefox: set build timeout at eight hours"
The default timeout is 10h on Hydra currently, so this timeout
setting is pointless or counterproductive.
This commit seems to have been made in error
https://github.com/NixOS/nixpkgs/pull/96767#issuecomment-724104413

This reverts commit c57fedb14b.
2020-11-11 18:39:04 +01:00
Michael Weiss bfed64ea31
Merge pull request #103173 from squalus/ungoogled-20201108
ungoogled-chromium: 86.0.4240.111-1 -> 86.0.4240.183-1
2020-11-11 16:22:01 +01:00
Michael Weiss ae3fdeb52c
Merge pull request #103294 from primeos/chromium
chromium: 86.0.4240.183 -> 86.0.4240.193
2020-11-11 16:08:47 +01:00
Jeff Labonte 13e4f189a1
brave: 1.15.76 -> 1.16.72 2020-11-11 08:45:34 -05:00
R. RyanTM 62df30641d amfora: 1.5.0 -> 1.6.0 2020-11-10 21:18:15 +00:00
Michael Weiss 841664a172
chromium: 86.0.4240.183 -> 86.0.4240.193
https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_9.html

This update includes 1 security fix (no CVE).
2020-11-10 12:11:55 +01:00
Chris Double f4a3f2e6ce tor-browser-bundle-bin: remove myself as maintainer 2020-11-09 11:44:51 +00:00
Michael Weiss 197ddbced2
mesa: Replace all usages of old aliases 2020-11-08 22:56:55 +01:00
squalus a0ea60fde3 ungoogled-chromium: 86.0.4240.111-1 -> 86.0.4240.183-1
based on chromium master@b3939086
2020-11-08 13:44:53 -08:00
Vladimír Čunát eb3fd61bb6
firefox-esr: fix build by using older rust
It's probably the same issue as with thunderbird.
2020-11-07 14:54:38 +01:00
Michael Weiss 0e64b04afc
Merge pull request #102666 from squalus/ungoogled-20201103
ungoogled-chromium: 85.0.4183.102-1 -> 86.0.4240.111-1
2020-11-05 22:08:47 +01:00
squalus 744ea3d944 ungoogled-chromium: 85.0.4183.102-1 -> 86.0.4240.111-1
based on chromium master@26d3fbf2
2020-11-03 12:42:58 -08:00
Michael Weiss d7f5386474
chromium: Extend update.py to automatically update gn
The gn version depends on the channel and new gn versions aren't always
backward compatible. Therefore we should also include it in
upstream-info.json (I've scoped it under "deps" as we'll likely have to
add more like this in the future).
2020-11-03 20:00:25 +01:00
Michael Weiss 3531d0d0b7
Merge pull request #102608 from primeos/chromium
chromium: 86.0.4240.111 -> 86.0.4240.183
2020-11-03 19:23:41 +01:00
Michael Weiss 531decc11d
chromium: 86.0.4240.111 -> 86.0.4240.183
https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html

This update includes 10 security fixes. Google is aware of reports that
an exploit for CVE-2020-16009 exists in the wild.

CVEs:
CVE-2020-16004 CVE-2020-16005 CVE-2020-16006 CVE-2020-16007
CVE-2020-16008 CVE-2020-16009 CVE-2020-16011
2020-11-03 11:14:20 +01:00
Yury Bulka 968348bd18 tor-browser-bundle-bin: mark as broken
NoScript is missing / broken; Highest Security Level doesn't disable
JavaScript.

See issue #83096 for more info.
2020-11-03 00:30:50 +02:00
Andreas Rammhold df2d47cd39
Merge pull request #102266 from NixOS/firefox-82.02
firefox{,-bin}: 80.0 -> 80.0.2
2020-11-01 19:34:37 +01:00
Andreas Rammhold fdbdd72f5f
firefox-bin: 82.0 -> 82.0.2 2020-10-31 19:53:34 +01:00
Andreas Rammhold f4490bb28a
firefox: 82.0 -> 82.0.2 2020-10-31 19:34:23 +01:00
Badi' Abdul-Wahid 7dcbc0ebd5
vivaldi: 3.3.2022.47-1 -> 3.4.2066.90-1 2020-10-31 11:49:31 -05:00
Doron Behar c8a7e4da0a firefox/wrapper: Use plasma-browser-integration correctly
Don't rely on the attribute from the aliases.nix, as ofborg checks that
in PRs.
2020-10-30 20:37:58 +02:00
S. Nordin Abouzahra 57ea265674 firefox: place alsaLib in lib search patch
libcubeb has dlopened libraries for awhile now. In nixpkgs there was
support for the PulseAudio backend doing this, however the ALSA backend
support was missed and caused issue #79310 (no sound with ALSA). This
gives ALSA users the ability to hear sound once again.
2020-10-29 22:21:12 -04:00
Michael Weiss 7c700c9ff6
chromium: Drop useVaapi (was deprecated) 2020-10-29 13:48:38 +01:00
Michael Weiss a90362c888
google-chrome: Add myself as maintainer
Mainly to get pinged on PRs/issues as well.
2020-10-29 13:41:34 +01:00
Justin Humm 03d85e8aac
tor-browser-bundle-bin: 10.0.1 -> 10.0.2 2020-10-25 12:00:15 +01:00
bqv be17edc6f6 pkgs.nyxt: init at 2020-10-23 2020-10-25 08:56:12 +01:00
Jörg Thalheim 2f31499703
Merge pull request #101611 from stigtsp/package/firefox-bin-82.0
firefox-bin: 81.0.2 -> 82.0
2020-10-25 07:32:30 +01:00
Jörg Thalheim c8bccb080b
Merge pull request #101624 from taku0/fix_update_nix_for_82
firefox-bin: fix update.nix freezing
2020-10-25 07:31:49 +01:00
taku0 4eacc3784f firefox-bin: fix update.nix freezing
https://github.com/NixOS/nixpkgs/pull/98338#issuecomment-716070078
2020-10-25 13:48:42 +09:00
Stig Palmquist 728b984d57
firefox-bin: 81.0.2 -> 82.0 2020-10-25 01:22:03 +02:00
StigP 7ecdf141d2
Merge pull request #98338 from Atemu/firefox-bin-update-fix
firefox-bin/update: fix
2020-10-24 14:42:01 +00:00
Anderson Torres db2c904c3c
Merge pull request #100294 from pniedzwiedzinski/amfora-desktop
amfora: Add desktop file
2020-10-24 08:50:44 -03:00
TredwellGit 2bb011032c
chromium: use official build settings (#101467)
LLD: https://lld.llvm.org/
When you link a large program on a multicore machine, you can expect that LLD runs more than twice as fast as the GNU gold linker. Your mileage may vary, though.
Link-time optimization (LTO) is supported by default.
Some default settings have been tuned for the 21st century. For example, the stack is marked as non-executable by default to tighten security.

LTO & ThinLTO: https://clang.llvm.org/docs/ThinLTO.html
LTO (Link Time Optimization) achieves better runtime performance through whole-program analysis and cross-module optimization. However, monolithic LTO implements this by merging all input into a single module, which is not scalable in time or memory, and also prevents fast incremental compiles. ThinLTO is a new approach that is designed to scale like a non-LTO build, while retaining most of the performance achievement of full LTO.

PGO: https://llvm.org/docs/HowToBuildWithPGO.html https://blog.chromium.org/2020/08/chrome-just-got-faster-with-profile.html
Allows your compiler to better optimize code for how it actually runs. Users report that applying this to Clang and LLVM can decrease overall compile time by 20%.
Because PGO uses real usage scenarios that match the workflows of Chrome users around the world, the most common tasks get prioritized and made faster. Delivers up to 10% faster page loads.

CFI: https://clang.llvm.org/docs/ControlFlowIntegrity.html https://www.chromium.org/developers/testing/control-flow-integrity
Aborts the program upon detecting certain forms of undefined behavior that can potentially allow attackers to subvert the program’s control flow. These schemes have been optimized for performance, allowing developers to enable them in release builds.
By default, a program compiled with CFI will crash with SIGILL if it detects a CFI violation.

Additionally:
Use minizip instead of zlib. Chromium says zlib but actually uses minizip.
Remove old unused workarounds.
Make shell scripts POSIX compliant.
Update documentation URLs.
Prepare for using system libraries.
2020-10-24 12:27:40 +02:00
Michael Weiss 7c76eafdb7
chromiumDev: Mark as broken for now 2020-10-23 19:47:43 +02:00
Michael Weiss 50a2f50acb
chromiumDev: 88.0.4292.2 -> 88.0.4298.4
This should also fix VA-API for chromiumBeta (though that part needs
some cleanup). However, chromiumDev likely still fails due to the
absence of dirmd (not included in the tarball so far, we might have to
package and add it as a dependency).
2020-10-23 17:49:46 +02:00
Kevin Cox 6cbef452b0
Merge pull request #100685 from buckley310/brave
brave: 1.12.112 -> 1.15.76
2020-10-23 11:31:55 -04:00
Michael Weiss b36db49ae7
chromium: Add some brief documentation
Wanted to do this for a long time to collect important knowledge and
make it easier to pass maintainership.
Only time will tell if this'll be useful or become outdated instead.
2020-10-23 11:39:05 +02:00
Sean Buckley 61e2d90486 brave: 1.12.112 -> 1.15.76 2020-10-22 21:05:20 -04:00
Andreas Rammhold bca15c82d8 firefox: disable LTO by default due to segfaults with wayland
As discussed in #101429 firefox 82 started crashing when used with
wayland. A brief investigation showed that this appears to be rooted
within the LTO support that was recently added to the package. For the
time being, until someone figures out where the crashes are coming from,
we can just disable LTO.
2020-10-23 02:51:46 +02:00