Package Details: librewolf-bin 1:136.0.4_1-1

Git Clone URL: https://aur.archlinux.org/librewolf-bin.git (read-only, click to copy)
Package Base: librewolf-bin
Description: Community-maintained fork of Firefox, focused on privacy, security and freedom.
Upstream URL: https://librewolf-community.gitlab.io/
Keywords: browser web
Licenses: GPL, MPL, LGPL
Conflicts: librewolf
Provides: librewolf
Submitter: lsf
Maintainer: lsf
Last Packager: lsf
Votes: 466
Popularity: 38.35
First Submitted: 2019-06-16 13:12 (UTC)
Last Updated: 2025-03-27 22:43 (UTC)

Dependencies (16)

Required by (32)

Sources (7)

Pinned Comments

lsf commented on 2021-11-10 12:14 (UTC) (edited on 2023-04-17 07:18 (UTC) by lsf)

https://wiki.archlinux.org/title/Arch_User_Repository#Acquire_a_PGP_public_key_if_needed

gpg --keyserver hkp://keyserver.ubuntu.com --search-keys 031F7104E932F7BD7416E7F6D2845E1305D6E801

/edit: starting with 112.0-1, the binaries are signed with the maintainers shared key, so gpg --keyserver hkp://keyserver.ubuntu.com --search-keys 662E3CDD6FE329002D0CA5BB40339DD82B12EF16 should do the trick instead. I've also signed the key with the previously used key, so you have at least some guarantee that it's not a malicious attack :)

Latest Comments

1 2 3 4 5 6 .. 21 Next › Last »

marbens commented on 2025-03-21 01:36 (UTC)

@zlima12 librewolf/arch#18

zlima12 commented on 2025-03-21 00:25 (UTC)

The upstream URL should be updated to https://librewolf.net.

spsf64 commented on 2025-03-19 16:22 (UTC)

@marbens @karolyi, my bad, it is working fine, my shortcut was pointing to the old appimage I was testing. Will delete my comment...

karolyi commented on 2025-03-19 15:58 (UTC)

@spsf64, it works on my machine™

zlima12 commented on 2025-03-15 18:37 (UTC) (edited on 2025-03-15 18:38 (UTC) by zlima12)

@marbens yes, that would not have been that big of a deal considering the upstream release cadence. epoch bumps are only supposed to be used for major versioning breakage (e.g. 5.7.2 gets reset to 1.0.0). Really, I think that it should get reset to zero/undefined in the case of this package, but as mentioned before that would require manual intervention from users that have updated to epoch 1.

marbens commented on 2025-03-15 07:54 (UTC) (edited on 2025-03-15 07:58 (UTC) by marbens)

@zlima12 How else would we have solved the problem? Skip 136.0-2?

zlima12 commented on 2025-03-15 00:15 (UTC) (edited on 2025-03-15 00:17 (UTC) by zlima12)

I really don't think that an epoch bump was warranted here. There was no profound change in the upstream versioning system, and the versioning problem would have only lasted until 136.1 or 137 was released. Now, there is no way to undo the epoch change without manual intervention from the users that have already updated.

libresx commented on 2025-03-12 22:19 (UTC) (edited on 2025-03-12 22:20 (UTC) by libresx)

Cannot be installed because of librewolf-136.0-2-linux-x86_64-package.tar.xz.sig unverified RSA key. Signature has been made 06 March 2025.