diff options
author | Chris. H | 2019-07-20 14:21:00 +0200 |
---|---|---|
committer | Chris. H | 2019-07-20 14:21:00 +0200 |
commit | 4d5697659110963e21c1d1fe4b8df3937b85c687 (patch) | |
tree | d78dc65f82caf4ac6f21f592ea1a9e3f6fa64786 | |
parent | ed317932146bc5d1e26705453ee8816161aa53cf (diff) | |
download | aur-4d5697659110963e21c1d1fe4b8df3937b85c687.tar.gz |
v68.0.1
-rw-r--r-- | .SRCINFO | 11 | ||||
-rw-r--r-- | PKGBUILD | 10 | ||||
-rw-r--r-- | librewolf.cfg.patch | 79 |
3 files changed, 45 insertions, 55 deletions
@@ -1,6 +1,6 @@ pkgbase = librewolf pkgdesc = Community-maintained fork of Librefox: a privacy and security-focused browser - pkgver = 68.0 + pkgver = 68.0.1 pkgrel = 1 url = https://LibreWolf.gitlab.io arch = x86_64 @@ -46,13 +46,14 @@ pkgbase = librewolf optdepends = hunspell-en_US: Spell checking, American English options = !emptydirs options = !makeflags - source = https://archive.mozilla.org/pub/firefox/releases/68.0/source/firefox-68.0.source.tar.xz + options = !strip + source = https://archive.mozilla.org/pub/firefox/releases/68.0.1/source/firefox-68.0.1.source.tar.xz source = librewolf.desktop source = librewolf.cfg.patch - source = git+https://gitlab.com/librewolf-community/librewolf.git#commit=a9a64b7f - sha256sums = f7d61a08820088f1280d27f0808e355152c1dd0c94625fd077ced7319e522565 + source = git+https://gitlab.com/librewolf-community/librewolf.git#commit=e458edc5 + sha256sums = 6037f77bdab29d79ca5e3fbd1d32f6c209e09d2066189a13dc7f7491227f5568 sha256sums = 0471d32366c6f415f7608b438ddeb10e2f998498c389217cdd6cc52e8249996b - sha256sums = 5b748388c83fae3d09978f845b0211692ebb9191e28709c7e04daf0f49a5ea48 + sha256sums = 3a4499cdfd71f7ec590a78055ba9363d282b447c87c29a4b250ff7730c18a8ed sha256sums = SKIP pkgname = librewolf @@ -5,7 +5,7 @@ pkgname=librewolf _pkgname=LibreWolf -pkgver=68.0 +pkgver=68.0.1 pkgrel=1 pkgdesc="Community-maintained fork of Librefox: a privacy and security-focused browser" arch=(x86_64) @@ -21,14 +21,14 @@ optdepends=('networkmanager: Location detection via available WiFi networks' 'pulseaudio: Audio support' 'speech-dispatcher: Text-to-Speech' 'hunspell-en_US: Spell checking, American English') -options=(!emptydirs !makeflags) +options=(!emptydirs !makeflags !strip) source=(https://archive.mozilla.org/pub/firefox/releases/$pkgver/source/firefox-$pkgver.source.tar.xz $pkgname.desktop $pkgname.cfg.patch - "git+https://gitlab.com/${pkgname}-community/${pkgname}.git#commit=a9a64b7f") -sha256sums=('f7d61a08820088f1280d27f0808e355152c1dd0c94625fd077ced7319e522565' + "git+https://gitlab.com/${pkgname}-community/${pkgname}.git#commit=e458edc5") +sha256sums=('6037f77bdab29d79ca5e3fbd1d32f6c209e09d2066189a13dc7f7491227f5568' '0471d32366c6f415f7608b438ddeb10e2f998498c389217cdd6cc52e8249996b' - '5b748388c83fae3d09978f845b0211692ebb9191e28709c7e04daf0f49a5ea48' + '3a4499cdfd71f7ec590a78055ba9363d282b447c87c29a4b250ff7730c18a8ed' 'SKIP') # # For telemetry and crash dump analysis to work correctly, we need to tell the diff --git a/librewolf.cfg.patch b/librewolf.cfg.patch index a09070bae2f2..d658e8ba6325 100644 --- a/librewolf.cfg.patch +++ b/librewolf.cfg.patch @@ -1,46 +1,35 @@ diff --git a/settings/librewolf.cfg b/settings/librewolf.cfg -index 9b60c51..de990d5 100644 +index bbe4450..351670e 100644 --- a/settings/librewolf.cfg +++ b/settings/librewolf.cfg -@@ -91,14 +91,14 @@ lockPref("general.config.filename", "librewolf.cfg"); - // http://kb.mozillazine.org/Network.cookie.cookieBehavior#1 - // Blocking 3rd-party cookies breaks a number of payment gateways - // CIS 2.5.1 --lockPref("network.cookie.cookieBehavior", 1); -+defaultPref("network.cookie.cookieBehavior", 1); +@@ -94,11 +94,11 @@ user_pref("extensions.enabledAddons", "librefox.http.watcher.tor%40intika.be:2.8 + // User Settings : Cookies settings + // -------------------------------- - // Pref : Cookies expire at the end of the session (when the browser closes) - // http://kb.mozillazine.org/Network.cookie.lifetimePolicy#2 - // 0=until they expire (default) - // 2=until you close Firefox - // 3=for n days +-lockPref("network.cookie.cookieBehavior", 1); -lockPref("network.cookie.lifetimePolicy", 2); ++defaultPref("network.cookie.cookieBehavior", 1); +defaultPref("network.cookie.lifetimePolicy", 0); - - // Pref : Disable Cookie Exception Button - // WARNING Bug !!! This locks the button regardless of its value -@@ -120,7 +120,7 @@ lockPref("network.cookie.leave-secure-alone", true); // default: true - // nonsecureSessionOnly=true. This allows you to keep HTTPS cookies, but session-only HTTP ones - // [1] https://feeding.cloud.geek.nz/posts/tweaking-cookies-for-privacy-in-firefox/ - // [2] http://kb.mozillazine.org/Network.cookie.thirdparty.sessionOnly --lockPref("network.cookie.thirdparty.sessionOnly", true); // default : false -+defaultPref("network.cookie.thirdparty.sessionOnly", true); // default : false - lockPref("network.cookie.thirdparty.nonsecureSessionOnly", true); // (FF58+) // default false - - // Also check "User Settings : Track Protection" for other cookies settings -@@ -289,6 +289,8 @@ defaultPref("privacy.sanitize.sanitizeOnShutdown", true); - - // Pref : Defaulting Settings : Does not remember history + lockPref("network.cookie.same-site.enabled", true); + lockPref("network.cookie.leave-secure-alone", true); +-lockPref("network.cookie.thirdparty.sessionOnly", true); ++defaultPref("network.cookie.thirdparty.sessionOnly", true); + lockPref("network.cookie.thirdparty.nonsecureSessionOnly", true); + + // ----------------------------------- +@@ -162,6 +162,8 @@ defaultPref("privacy.sanitize.timeSpan", 0); + defaultPref("browser.formfill.enable", false); + defaultPref("privacy.sanitize.sanitizeOnShutdown", true); defaultPref("places.history.enabled", false); +// w.r. to issue #54 +defaultPref("places.history.expiration.max_pages", 2147483647) - - // Pref : Settings history settings to custom by default defaultPref("privacy.history.custom", true); -@@ -360,10 +362,10 @@ lockPref("browser.sessionstore.interval", 60000); - // ---------------------------------------------------------------------------------------------------- + //defaultPref("privacy.cpd.openWindows", true); // Clear session data + //defaultPref("privacy.clearOnShutdown.openWindows", true); +@@ -180,10 +182,10 @@ lockPref("browser.sessionstore.interval", 60000); + // User Settings : Autofill settings + // --------------------------------- - // Pref : Forms auto fill -lockPref("extensions.formautofill.addresses.enabled", false); -lockPref("extensions.formautofill.available", "off"); -lockPref("extensions.formautofill.creditCards.enabled", false); @@ -50,9 +39,9 @@ index 9b60c51..de990d5 100644 +defaultPref("extensions.formautofill.creditCards.enabled", false); +defaultPref("extensions.formautofill.heuristics.enabled", false); - // Pref : Require manual intervention to autofill known username/passwords in sign-in forms - // http://kb.mozillazine.org/Signon.autofillForms -@@ -761,13 +763,13 @@ lockPref("dom.w3c_pointer_events.enabled", false); + lockPref("signon.autofillForms", false); + lockPref("signon.autofillForms.http", false); +@@ -533,13 +535,13 @@ lockPref("dom.w3c_pointer_events.enabled", false); // Pref : Enable hardening against various fingerprinting vectors (Tor Uplift project) // https://wiki.mozilla.org/Security/Tor_Uplift/Tracking // https://bugzilla.mozilla.org/show_bug.cgi?id=1333933 @@ -68,7 +57,7 @@ index 9b60c51..de990d5 100644 // >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> // Section : Locale/Time/UserAgent -@@ -793,11 +795,11 @@ lockPref("intl.regional_prefs.use_os_locales", false); +@@ -565,11 +567,11 @@ lockPref("intl.regional_prefs.use_os_locales", false); // Pref : Locale and useragent. // Already applied by resistFingerprinting ? @@ -82,17 +71,17 @@ index 9b60c51..de990d5 100644 // Pref : This does not work with resistFingerprinting. Still needed for ESR. lockPref("general.appname.override", "Netscape"); -@@ -1077,7 +1079,8 @@ lockPref("extensions.webextensions.identity.redirectDomain", ""); +@@ -849,7 +851,8 @@ lockPref("extensions.webextensions.identity.redirectDomain", ""); // Pref : CSP Settings For Extensions I/II : Extension Firewall Feature // Uncomment to disable network for the extensions // Enable-Firewall-Feature-In-The-Next-Line extensions-firewall >>>>>> -lockPref("extensions.webextensions.base-content-security-policy", "default-src 'self' moz-extension: blob: filesystem: 'unsafe-eval' 'unsafe-inline'; script-src 'self' moz-extension: blob: filesystem: 'unsafe-eval' 'unsafe-inline'; object-src 'self' moz-extension: blob: filesystem:;"); -+// defaultPref("extensions.webextensions.base-content-security-policy", "default-src 'self' moz-extension: blob: filesystem: 'unsafe-eval' 'unsafe-inline'; script-src 'self' moz-extension: blob: filesystem: 'unsafe-eval' 'unsafe-inline'; object-src 'self' moz-extension: blob: filesystem:;"); ++// lockPref("extensions.webextensions.base-content-security-policy", "default-src 'self' moz-extension: blob: filesystem: 'unsafe-eval' 'unsafe-inline'; script-src 'self' moz-extension: blob: filesystem: 'unsafe-eval' 'unsafe-inline'; object-src 'self' moz-extension: blob: filesystem:;"); +defaultPref("extensions.webextensions.base-content-security-policy", "script-src 'self' https://* moz-extension: blob: filesystem: 'unsafe-eval' 'unsafe-inline'; object-src 'self' https://* moz-extension: blob: filesystem:;"); // Pref : CSP Settings For Extensions II/II : Extension Firewall Feature // This value is applied after the first one (just ignore this) -@@ -1419,22 +1422,22 @@ lockPref("extensions.getAddons.compatOverides.url", ""); +@@ -1191,22 +1194,22 @@ lockPref("extensions.getAddons.compatOverides.url", ""); // https://services.addons.mozilla.org/api/v3/addons/compat-override/?guid=%IDS%&lang=%LOCALE% // Pref : @@ -119,7 +108,7 @@ index 9b60c51..de990d5 100644 // Default Value // https://addons.mozilla.org/%LOCALE%/firefox/search?q=%TERMS%&platform=%OS%&appver=%VERSION% -@@ -1469,7 +1472,7 @@ lockPref("browser.newtabpage.activity-stream.fxaccounts.endpoint", ""); +@@ -1241,7 +1244,7 @@ lockPref("browser.newtabpage.activity-stream.fxaccounts.endpoint", ""); // https://accounts.firefox.com/ // Pref : @@ -128,7 +117,7 @@ index 9b60c51..de990d5 100644 // Default Value // https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion= // %REQ_VERSION%&id=%ITEM_ID%&version=%ITEM_VERSION%&maxAppVersion= -@@ -2065,7 +2068,7 @@ lockPref("app.releaseNotesURL", ""); +@@ -1837,7 +1840,7 @@ lockPref("app.releaseNotesURL", ""); // Pref : lockPref("app.update.auto", false); @@ -137,7 +126,7 @@ index 9b60c51..de990d5 100644 lockPref("app.update.staging.enabled", false); lockPref("app.update.silent", false); lockPref("app.update.lastUpdateTime.telemetry_modules_ping", 0); -@@ -2178,10 +2181,10 @@ lockPref("extensions.blocklist.itemURL", ""); +@@ -1950,10 +1953,10 @@ lockPref("extensions.blocklist.itemURL", ""); lockPref("extensions.blocklist.url", ""); // Pref : @@ -150,7 +139,7 @@ index 9b60c51..de990d5 100644 // Pref : lockPref("extensions.webservice.discoverURL", ""); -@@ -2473,7 +2476,7 @@ lockPref("security.dialog_enable_delay", 700); +@@ -2245,7 +2248,7 @@ lockPref("security.dialog_enable_delay", 700); // Pref : Opt-out of add-on metadata updates // https://blog.mozilla.org/addons/how-to-opt-out-of-add-on-metadata-updates/ @@ -159,7 +148,7 @@ index 9b60c51..de990d5 100644 // Pref : Opt-out of theme (Persona) updates // https://support.mozilla.org/t5/Firefox/how-do-I-prevent-autoamtic-updates-in-a-50-user-environment/td-p/144287 -@@ -2506,7 +2509,7 @@ lockPref("plugin.sessionPermissionNow.intervalInMinutes", 0); +@@ -2278,7 +2281,7 @@ lockPref("plugin.sessionPermissionNow.intervalInMinutes", 0); // Pref : Update addons automatically // https://blog.mozilla.org/addons/how-to-turn-off-add-on-updates/ @@ -168,7 +157,7 @@ index 9b60c51..de990d5 100644 // Pref : Enable add-on and certificate blocklists (OneCRL) from Mozilla // Updated at interval defined in extensions.blocklist.interval (default: 86400) -@@ -3230,4 +3233,4 @@ lockPref("security.tls.unrestricted_rc4_fallback", false); +@@ -3002,4 +3005,4 @@ lockPref("security.tls.unrestricted_rc4_fallback", false); //lockPref("toolkit.telemetry.unifiedIsOptIn", true); //lockPref("ui.key.menuAccessKey", 0); //lockPref("view_source.tab", false); |