summarylogtreecommitdiffstats
diff options
context:
space:
mode:
authorChris. H2019-07-20 14:21:00 +0200
committerChris. H2019-07-20 14:21:00 +0200
commit4d5697659110963e21c1d1fe4b8df3937b85c687 (patch)
treed78dc65f82caf4ac6f21f592ea1a9e3f6fa64786
parented317932146bc5d1e26705453ee8816161aa53cf (diff)
downloadaur-4d5697659110963e21c1d1fe4b8df3937b85c687.tar.gz
v68.0.1
-rw-r--r--.SRCINFO11
-rw-r--r--PKGBUILD10
-rw-r--r--librewolf.cfg.patch79
3 files changed, 45 insertions, 55 deletions
diff --git a/.SRCINFO b/.SRCINFO
index 4fc8ff7f9f2f..f12f8c54d511 100644
--- a/.SRCINFO
+++ b/.SRCINFO
@@ -1,6 +1,6 @@
pkgbase = librewolf
pkgdesc = Community-maintained fork of Librefox: a privacy and security-focused browser
- pkgver = 68.0
+ pkgver = 68.0.1
pkgrel = 1
url = https://LibreWolf.gitlab.io
arch = x86_64
@@ -46,13 +46,14 @@ pkgbase = librewolf
optdepends = hunspell-en_US: Spell checking, American English
options = !emptydirs
options = !makeflags
- source = https://archive.mozilla.org/pub/firefox/releases/68.0/source/firefox-68.0.source.tar.xz
+ options = !strip
+ source = https://archive.mozilla.org/pub/firefox/releases/68.0.1/source/firefox-68.0.1.source.tar.xz
source = librewolf.desktop
source = librewolf.cfg.patch
- source = git+https://gitlab.com/librewolf-community/librewolf.git#commit=a9a64b7f
- sha256sums = f7d61a08820088f1280d27f0808e355152c1dd0c94625fd077ced7319e522565
+ source = git+https://gitlab.com/librewolf-community/librewolf.git#commit=e458edc5
+ sha256sums = 6037f77bdab29d79ca5e3fbd1d32f6c209e09d2066189a13dc7f7491227f5568
sha256sums = 0471d32366c6f415f7608b438ddeb10e2f998498c389217cdd6cc52e8249996b
- sha256sums = 5b748388c83fae3d09978f845b0211692ebb9191e28709c7e04daf0f49a5ea48
+ sha256sums = 3a4499cdfd71f7ec590a78055ba9363d282b447c87c29a4b250ff7730c18a8ed
sha256sums = SKIP
pkgname = librewolf
diff --git a/PKGBUILD b/PKGBUILD
index 9d3a28eb3909..c9e90d6df2c2 100644
--- a/PKGBUILD
+++ b/PKGBUILD
@@ -5,7 +5,7 @@
pkgname=librewolf
_pkgname=LibreWolf
-pkgver=68.0
+pkgver=68.0.1
pkgrel=1
pkgdesc="Community-maintained fork of Librefox: a privacy and security-focused browser"
arch=(x86_64)
@@ -21,14 +21,14 @@ optdepends=('networkmanager: Location detection via available WiFi networks'
'pulseaudio: Audio support'
'speech-dispatcher: Text-to-Speech'
'hunspell-en_US: Spell checking, American English')
-options=(!emptydirs !makeflags)
+options=(!emptydirs !makeflags !strip)
source=(https://archive.mozilla.org/pub/firefox/releases/$pkgver/source/firefox-$pkgver.source.tar.xz
$pkgname.desktop
$pkgname.cfg.patch
- "git+https://gitlab.com/${pkgname}-community/${pkgname}.git#commit=a9a64b7f")
-sha256sums=('f7d61a08820088f1280d27f0808e355152c1dd0c94625fd077ced7319e522565'
+ "git+https://gitlab.com/${pkgname}-community/${pkgname}.git#commit=e458edc5")
+sha256sums=('6037f77bdab29d79ca5e3fbd1d32f6c209e09d2066189a13dc7f7491227f5568'
'0471d32366c6f415f7608b438ddeb10e2f998498c389217cdd6cc52e8249996b'
- '5b748388c83fae3d09978f845b0211692ebb9191e28709c7e04daf0f49a5ea48'
+ '3a4499cdfd71f7ec590a78055ba9363d282b447c87c29a4b250ff7730c18a8ed'
'SKIP')
#
# For telemetry and crash dump analysis to work correctly, we need to tell the
diff --git a/librewolf.cfg.patch b/librewolf.cfg.patch
index a09070bae2f2..d658e8ba6325 100644
--- a/librewolf.cfg.patch
+++ b/librewolf.cfg.patch
@@ -1,46 +1,35 @@
diff --git a/settings/librewolf.cfg b/settings/librewolf.cfg
-index 9b60c51..de990d5 100644
+index bbe4450..351670e 100644
--- a/settings/librewolf.cfg
+++ b/settings/librewolf.cfg
-@@ -91,14 +91,14 @@ lockPref("general.config.filename", "librewolf.cfg");
- // http://kb.mozillazine.org/Network.cookie.cookieBehavior#1
- // Blocking 3rd-party cookies breaks a number of payment gateways
- // CIS 2.5.1
--lockPref("network.cookie.cookieBehavior", 1);
-+defaultPref("network.cookie.cookieBehavior", 1);
+@@ -94,11 +94,11 @@ user_pref("extensions.enabledAddons", "librefox.http.watcher.tor%40intika.be:2.8
+ // User Settings : Cookies settings
+ // --------------------------------
- // Pref : Cookies expire at the end of the session (when the browser closes)
- // http://kb.mozillazine.org/Network.cookie.lifetimePolicy#2
- // 0=until they expire (default)
- // 2=until you close Firefox
- // 3=for n days
+-lockPref("network.cookie.cookieBehavior", 1);
-lockPref("network.cookie.lifetimePolicy", 2);
++defaultPref("network.cookie.cookieBehavior", 1);
+defaultPref("network.cookie.lifetimePolicy", 0);
-
- // Pref : Disable Cookie Exception Button
- // WARNING Bug !!! This locks the button regardless of its value
-@@ -120,7 +120,7 @@ lockPref("network.cookie.leave-secure-alone", true); // default: true
- // nonsecureSessionOnly=true. This allows you to keep HTTPS cookies, but session-only HTTP ones
- // [1] https://feeding.cloud.geek.nz/posts/tweaking-cookies-for-privacy-in-firefox/
- // [2] http://kb.mozillazine.org/Network.cookie.thirdparty.sessionOnly
--lockPref("network.cookie.thirdparty.sessionOnly", true); // default : false
-+defaultPref("network.cookie.thirdparty.sessionOnly", true); // default : false
- lockPref("network.cookie.thirdparty.nonsecureSessionOnly", true); // (FF58+) // default false
-
- // Also check "User Settings : Track Protection" for other cookies settings
-@@ -289,6 +289,8 @@ defaultPref("privacy.sanitize.sanitizeOnShutdown", true);
-
- // Pref : Defaulting Settings : Does not remember history
+ lockPref("network.cookie.same-site.enabled", true);
+ lockPref("network.cookie.leave-secure-alone", true);
+-lockPref("network.cookie.thirdparty.sessionOnly", true);
++defaultPref("network.cookie.thirdparty.sessionOnly", true);
+ lockPref("network.cookie.thirdparty.nonsecureSessionOnly", true);
+
+ // -----------------------------------
+@@ -162,6 +162,8 @@ defaultPref("privacy.sanitize.timeSpan", 0);
+ defaultPref("browser.formfill.enable", false);
+ defaultPref("privacy.sanitize.sanitizeOnShutdown", true);
defaultPref("places.history.enabled", false);
+// w.r. to issue #54
+defaultPref("places.history.expiration.max_pages", 2147483647)
-
- // Pref : Settings history settings to custom by default
defaultPref("privacy.history.custom", true);
-@@ -360,10 +362,10 @@ lockPref("browser.sessionstore.interval", 60000);
- // ----------------------------------------------------------------------------------------------------
+ //defaultPref("privacy.cpd.openWindows", true); // Clear session data
+ //defaultPref("privacy.clearOnShutdown.openWindows", true);
+@@ -180,10 +182,10 @@ lockPref("browser.sessionstore.interval", 60000);
+ // User Settings : Autofill settings
+ // ---------------------------------
- // Pref : Forms auto fill
-lockPref("extensions.formautofill.addresses.enabled", false);
-lockPref("extensions.formautofill.available", "off");
-lockPref("extensions.formautofill.creditCards.enabled", false);
@@ -50,9 +39,9 @@ index 9b60c51..de990d5 100644
+defaultPref("extensions.formautofill.creditCards.enabled", false);
+defaultPref("extensions.formautofill.heuristics.enabled", false);
- // Pref : Require manual intervention to autofill known username/passwords in sign-in forms
- // http://kb.mozillazine.org/Signon.autofillForms
-@@ -761,13 +763,13 @@ lockPref("dom.w3c_pointer_events.enabled", false);
+ lockPref("signon.autofillForms", false);
+ lockPref("signon.autofillForms.http", false);
+@@ -533,13 +535,13 @@ lockPref("dom.w3c_pointer_events.enabled", false);
// Pref : Enable hardening against various fingerprinting vectors (Tor Uplift project)
// https://wiki.mozilla.org/Security/Tor_Uplift/Tracking
// https://bugzilla.mozilla.org/show_bug.cgi?id=1333933
@@ -68,7 +57,7 @@ index 9b60c51..de990d5 100644
// >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
// Section : Locale/Time/UserAgent
-@@ -793,11 +795,11 @@ lockPref("intl.regional_prefs.use_os_locales", false);
+@@ -565,11 +567,11 @@ lockPref("intl.regional_prefs.use_os_locales", false);
// Pref : Locale and useragent.
// Already applied by resistFingerprinting ?
@@ -82,17 +71,17 @@ index 9b60c51..de990d5 100644
// Pref : This does not work with resistFingerprinting. Still needed for ESR.
lockPref("general.appname.override", "Netscape");
-@@ -1077,7 +1079,8 @@ lockPref("extensions.webextensions.identity.redirectDomain", "");
+@@ -849,7 +851,8 @@ lockPref("extensions.webextensions.identity.redirectDomain", "");
// Pref : CSP Settings For Extensions I/II : Extension Firewall Feature
// Uncomment to disable network for the extensions
// Enable-Firewall-Feature-In-The-Next-Line extensions-firewall >>>>>>
-lockPref("extensions.webextensions.base-content-security-policy", "default-src 'self' moz-extension: blob: filesystem: 'unsafe-eval' 'unsafe-inline'; script-src 'self' moz-extension: blob: filesystem: 'unsafe-eval' 'unsafe-inline'; object-src 'self' moz-extension: blob: filesystem:;");
-+// defaultPref("extensions.webextensions.base-content-security-policy", "default-src 'self' moz-extension: blob: filesystem: 'unsafe-eval' 'unsafe-inline'; script-src 'self' moz-extension: blob: filesystem: 'unsafe-eval' 'unsafe-inline'; object-src 'self' moz-extension: blob: filesystem:;");
++// lockPref("extensions.webextensions.base-content-security-policy", "default-src 'self' moz-extension: blob: filesystem: 'unsafe-eval' 'unsafe-inline'; script-src 'self' moz-extension: blob: filesystem: 'unsafe-eval' 'unsafe-inline'; object-src 'self' moz-extension: blob: filesystem:;");
+defaultPref("extensions.webextensions.base-content-security-policy", "script-src 'self' https://* moz-extension: blob: filesystem: 'unsafe-eval' 'unsafe-inline'; object-src 'self' https://* moz-extension: blob: filesystem:;");
// Pref : CSP Settings For Extensions II/II : Extension Firewall Feature
// This value is applied after the first one (just ignore this)
-@@ -1419,22 +1422,22 @@ lockPref("extensions.getAddons.compatOverides.url", "");
+@@ -1191,22 +1194,22 @@ lockPref("extensions.getAddons.compatOverides.url", "");
// https://services.addons.mozilla.org/api/v3/addons/compat-override/?guid=%IDS%&lang=%LOCALE%
// Pref :
@@ -119,7 +108,7 @@ index 9b60c51..de990d5 100644
// Default Value
// https://addons.mozilla.org/%LOCALE%/firefox/search?q=%TERMS%&platform=%OS%&appver=%VERSION%
-@@ -1469,7 +1472,7 @@ lockPref("browser.newtabpage.activity-stream.fxaccounts.endpoint", "");
+@@ -1241,7 +1244,7 @@ lockPref("browser.newtabpage.activity-stream.fxaccounts.endpoint", "");
// https://accounts.firefox.com/
// Pref :
@@ -128,7 +117,7 @@ index 9b60c51..de990d5 100644
// Default Value
// https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=
// %REQ_VERSION%&id=%ITEM_ID%&version=%ITEM_VERSION%&maxAppVersion=
-@@ -2065,7 +2068,7 @@ lockPref("app.releaseNotesURL", "");
+@@ -1837,7 +1840,7 @@ lockPref("app.releaseNotesURL", "");
// Pref :
lockPref("app.update.auto", false);
@@ -137,7 +126,7 @@ index 9b60c51..de990d5 100644
lockPref("app.update.staging.enabled", false);
lockPref("app.update.silent", false);
lockPref("app.update.lastUpdateTime.telemetry_modules_ping", 0);
-@@ -2178,10 +2181,10 @@ lockPref("extensions.blocklist.itemURL", "");
+@@ -1950,10 +1953,10 @@ lockPref("extensions.blocklist.itemURL", "");
lockPref("extensions.blocklist.url", "");
// Pref :
@@ -150,7 +139,7 @@ index 9b60c51..de990d5 100644
// Pref :
lockPref("extensions.webservice.discoverURL", "");
-@@ -2473,7 +2476,7 @@ lockPref("security.dialog_enable_delay", 700);
+@@ -2245,7 +2248,7 @@ lockPref("security.dialog_enable_delay", 700);
// Pref : Opt-out of add-on metadata updates
// https://blog.mozilla.org/addons/how-to-opt-out-of-add-on-metadata-updates/
@@ -159,7 +148,7 @@ index 9b60c51..de990d5 100644
// Pref : Opt-out of theme (Persona) updates
// https://support.mozilla.org/t5/Firefox/how-do-I-prevent-autoamtic-updates-in-a-50-user-environment/td-p/144287
-@@ -2506,7 +2509,7 @@ lockPref("plugin.sessionPermissionNow.intervalInMinutes", 0);
+@@ -2278,7 +2281,7 @@ lockPref("plugin.sessionPermissionNow.intervalInMinutes", 0);
// Pref : Update addons automatically
// https://blog.mozilla.org/addons/how-to-turn-off-add-on-updates/
@@ -168,7 +157,7 @@ index 9b60c51..de990d5 100644
// Pref : Enable add-on and certificate blocklists (OneCRL) from Mozilla
// Updated at interval defined in extensions.blocklist.interval (default: 86400)
-@@ -3230,4 +3233,4 @@ lockPref("security.tls.unrestricted_rc4_fallback", false);
+@@ -3002,4 +3005,4 @@ lockPref("security.tls.unrestricted_rc4_fallback", false);
//lockPref("toolkit.telemetry.unifiedIsOptIn", true);
//lockPref("ui.key.menuAccessKey", 0);
//lockPref("view_source.tab", false);