Commit Graph

430 Commits

Author SHA1 Message Date
taku0
f8559ace71 firefox-esr: 52.2.0esr -> 52.2.1esr 2017-06-30 21:09:00 +09:00
taku0
2330b54470 firefox: 54.0 -> 54.0.1 2017-06-30 03:23:58 +09:00
Joachim F
bccd3feed2 Merge pull request #26450 from oxij/pkg/fix/tor-browser
firefoxPackages: tor-browser: use gtk2 by default (like tor-browser-bin does)
2017-06-27 20:41:27 +01:00
taku0
930a00bc92 firefox-esr: 52.1.2esr -> 52.2.0esr 2017-06-14 22:46:23 +09:00
taku0
04e95882c0 firefox: 53.0.3 -> 54.0 2017-06-14 21:50:02 +09:00
Anders Papitto
1e0866e064 rust: 1.15.0 -> 1.17.0
Also updates beta, nightly, nightlyBin, and bootstrap compilers.
Also updates the registry.
Also consolidates logic between bootstrap and nightlyBin compilers.
Also contains some miscellaneous cleanups.
Also patches firefox to build with the newer cargo
2017-06-10 15:15:50 -07:00
SLNOS
e7ca6cd176 firefoxPackages: tor-browser: use gtk2 by default (like tor-browser-bin does) 2017-06-07 11:56:27 +00:00
taku0
1b3f3f0f1f firefox-esr: 52.1.1esr -> 52.1.2esr 2017-05-19 21:22:05 +09:00
taku0
0460c77eb2 firefox: 53.0.2 -> 53.0.3 2017-05-19 21:20:36 +09:00
Vladimír Čunát
2a6edacc4e
firefox: disable content sandboxing - not ready yet
Details: https://github.com/NixOS/nixpkgs/issues/24295#issuecomment-300588575
2017-05-14 17:10:06 +02:00
taku0
6b7175435d firefox-esr: 52.1.0esr -> 52.1.1esr 2017-05-07 15:06:55 +09:00
taku0
4689fdac1b firefox: 53.0 -> 53.0.2 2017-05-07 15:06:33 +09:00
Vladimír Čunát
700d6186a3
wrapFirefox: fix #25505 gtk3 file dialogs
Crash + icons.
2017-05-04 22:10:24 +02:00
SLNOS
00a0b8a574 firefoxPackages: tor-browser: init at 6.5.2 2017-04-30 00:08:19 +02:00
Jan Malakhovski
2f35ab5960 firefoxPackages: implement privacySupport option 2017-04-30 00:08:18 +02:00
Jan Malakhovski
f0f572ff46 firefox: refactor into firefoxPackages, add more options 2017-04-30 00:08:16 +02:00
Jan Malakhovski
1d407173b0 firefox: rename default.nix -> common.nix 2017-04-30 00:08:16 +02:00
Michael Raskin
070985177f Merge pull request #25137 from taku0/firefox-53.0
firefox: 52.0.2 -> 53.0 [Critical security fixes]
2017-04-23 11:05:33 +02:00
taku0
a68f95da17 firefox: 52.0.2 -> 53.0 2017-04-23 11:50:33 +09:00
taku0
acf12543a5 firefox-esr: 52.0.2esr -> 52.1.0esr 2017-04-20 08:05:15 +09:00
Nikolay Amiantov
56ca347872 firefox: misc cleanups
Move more dependencies to nativeBuildInputs.
Use wrapGAppsHook.
Add checkInstallPhase.
2017-04-10 02:20:38 +03:00
taku0
7a768e73fb firefox-esr: 52.0.1esr -> 52.0.2esr 2017-03-28 21:15:47 +09:00
taku0
014d11ea96 firefox: 52.0.1 -> 52.0.2 2017-03-28 21:15:16 +09:00
Eelco Dolstra
8150455f6a Merge pull request #23989 from rnhmjoj/firefox-alsa
firefox: reenable ALSA backend
2017-03-20 14:59:32 +01:00
taku0
a038f91871 firefox-esr: 52.0esr -> 52.0.1esr 2017-03-18 09:36:27 +09:00
taku0
3f175876e8 firefox, firefox-bin: 52.0 -> 52.0.1 2017-03-18 09:36:12 +09:00
rnhmjoj
918f331104
firefox: reenable ALSA backend 2017-03-17 14:43:27 +01:00
David McFarland
c037f54ffb firefox: fix debugBuild = true 2017-03-15 08:49:56 -03:00
taku0
a24aaae602 firefox, firefox-bin: 51.0.1 -> 52.0, firefox-esr: 45.7esr -> 52.0esr 2017-03-07 20:14:01 +09:00
Guillaume Maudoux
816beccf50 wrapFirefox: fix default-browser update
Set MOZ_APP_LAUNCHER for firefox as per [1] (see [2] for detailed discussion).
Firefox will recognise itself across verions, skipping the 'not-the-default-browser' prompt.
Firefox will also write sane paths to the generated desktop file, should someone ever set it as default through the 'not-the-default-browser' prompt.
Also removed the unnecessary libtrick cruft.

[1] https://bugzilla.mozilla.org/show_bug.cgi?id=611953
[2] https://bugzilla.mozilla.org/show_bug.cgi?id=593948
2017-03-05 14:21:40 +01:00
Bjørn Forsman
3d104ab2b3 gst-plugins-base: align attrname with pkgname 2017-02-27 12:16:26 +01:00
Tuomas Tynkkynen
e5e1bdca53 firefox, thunderbird: Use common-updater/update-source-version script
Replace the custom patching code with the common script.

Also use callPackage and makeBinPath
2017-02-19 16:51:17 +02:00
Graham Christensen
4c5b08e4e2
firefox-wrapper: remove gnash support, see #22342 2017-02-06 21:40:19 -05:00
Graham Christensen
267813f4f7
Revert "firefox-wrapper: remove gnash support, see #22342"
Accidentally committed other changes

This reverts commit f77bc59af6.
2017-02-06 21:39:09 -05:00
Graham Christensen
f77bc59af6
firefox-wrapper: remove gnash support, see #22342 2017-02-06 21:29:58 -05:00
Graham Christensen
625680c9fc Merge pull request #22203 from taku0/firefox-bin-51.0.1
firefox, firefox-bin: 50.1.0 -> 51.0.1
2017-01-27 08:58:59 -05:00
taku0
0dbe492ca9 firefox, firefox-bin: 50.1.0 -> 51.0.1 2017-01-27 22:26:27 +09:00
Vladimír Čunát
a1af9cc1cf
gecko-mediaplayer: remove the dead project
It was breaking evaluation since 78fe72265.
2017-01-26 12:28:40 +01:00
taku0
9c9424d316 firefox: 50.1.0 -> 51.0, firefox-esr: 45.6.0esr -> 45.7.0esr 2017-01-24 22:10:58 +09:00
Vladimír Čunát
29e93555ec
firefox*: fixup build after updating sed
I failed to simply patch the bad [:space:] usage; I don't know why.
2017-01-06 11:22:28 +01:00
taku0
93d917fa22 firefox, thunderbird: add updateScript 2016-12-29 11:19:50 +01:00
taku0
86cf682cda firefox: 50.0.2 -> 50.1.0, firefox-esr: 45.5.1esr -> 45.6.0esr 2016-12-14 09:03:56 +09:00
taku0
36f980b7ff firefox-esr: security 45.5.0 -> 45.5.1 (#20841) 2016-12-01 21:50:50 +01:00
Eelco Dolstra
1e17f21b3e
firefox: 50.0.1 -> 50.0.2 2016-12-01 12:55:24 +01:00
Graham Christensen
b04e23bbb8
firefox: 50.0 -> 5.0.1 for CVE-2016-9078 2016-11-29 08:34:13 -05:00
Guillaume Koenig
d662063a11
firefox: fix geolocation feature (#20425)
Firefox uses a google API to perform geolocation. This API requires a
key which must be given at build time. This commit adds the key from
Chromium's derivation to Firefox.
2016-11-21 17:41:39 +01:00
Vladimír Čunát
207b8d1c46 firefox-esr: security-only update 45.4.0 -> 45.5.0 2016-11-15 19:22:39 +01:00
Eelco Dolstra
c2b9404c02
firefox: 49.0.2 -> 50.0 2016-11-15 16:58:45 +01:00
Frederik Rietdijk
e56832d730 Merge remote-tracking branch 'upstream/master' into HEAD 2016-10-22 17:23:24 +02:00
Eelco Dolstra
12212a0b13 firefox: 49.0.1 -> 49.0.2
CVE-2016-5287, CVE-2016-5288
2016-10-21 15:34:56 +02:00