@spsf64, it works on my machine™
Search Criteria
Package Details: librewolf-bin 1:140.0.2_1-1
Package Actions
Git Clone URL: | https://aur.archlinux.org/librewolf-bin.git (read-only, click to copy) |
---|---|
Package Base: | librewolf-bin |
Description: | Community-maintained fork of Firefox, focused on privacy, security and freedom. |
Upstream URL: | https://librewolf.net/ |
Keywords: | browser web |
Licenses: | MPL-2.0 |
Conflicts: | librewolf |
Provides: | librewolf |
Submitter: | lsf |
Maintainer: | lsf |
Last Packager: | lsf |
Votes: | 507 |
Popularity: | 28.73 |
First Submitted: | 2019-06-16 13:12 (UTC) |
Last Updated: | 2025-06-28 22:34 (UTC) |
Dependencies (39)
- alsa-lib
- at-spi2-core (at-spi2-core-gitAUR)
- bash (bash-devel-gitAUR, bash-gitAUR)
- cairo (cairo-gitAUR)
- dbus (dbus-gitAUR, dbus-selinuxAUR)
- ffmpeg (ffmpeg-nvcodec-11-1-gitAUR, ffmpeg-cudaAUR, ffmpeg-ffplayoutAUR, ffmpeg-decklinkAUR, ffmpeg-amd-fullAUR, ffmpeg-fullAUR, ffmpeg-headlessAUR, ffmpeg-amd-full-gitAUR, ffmpeg-full-gitAUR, ffmpeg-gitAUR, ffmpeg-obsAUR, ffmpeg-libfdk_aacAUR)
- fontconfig (fontconfig-gitAUR, fontconfig-ubuntuAUR)
- freetype2 (freetype2-qdoledAUR, freetype2-gitAUR, freetype2-qdoled-aw3225qfAUR, freetype2-macosAUR)
- gcc-libs (gcc-libs-gitAUR, gccrs-libs-gitAUR, gcc-libs-snapshotAUR)
- gdk-pixbuf2 (gdk-pixbuf2-gitAUR)
- glib2 (glib2-gitAUR, glib2-selinuxAUR, glib2-patched-thumbnailerAUR)
- glibc (glibc-gitAUR, glibc-linux4AUR, glibc-eacAUR)
- gtk3 (gtk3-no_deadkeys_underlineAUR, gtk3-classicAUR, gtk3-classic-xfceAUR, gtk3-patched-filechooser-icon-viewAUR)
- hicolor-icon-theme (hicolor-icon-theme-gitAUR)
- libpulse (pulseaudio-dummyAUR, libpulse-gitAUR)
- libx11 (libx11-gitAUR)
- libxcb (libxcb-gitAUR)
- libxcomposite
- libxcursor
- libxdamage
- Show 19 more dependencies...
Required by (37)
- edge-frfox (requires librewolf) (optional)
- ff2mpv-go-git (requires librewolf) (optional)
- ff2mpv-rust (requires librewolf) (optional)
- firefox-gnome-theme (requires librewolf) (optional)
- librewolf-comment-out-cfg-hook (requires librewolf)
- librewolf-extension-bitwarden-bin (requires librewolf)
- librewolf-extension-bitwarden-git (requires librewolf) (optional)
- librewolf-extension-dark-background-light-text (requires librewolf)
- librewolf-extension-darkreader (requires librewolf)
- librewolf-extension-darkreader-bin (requires librewolf)
- librewolf-extension-duckduckgo-privacy-essentials (requires librewolf)
- librewolf-extension-foxyproxy (requires librewolf)
- librewolf-extension-gnome-shell-integration (requires librewolf)
- librewolf-extension-greasemonkey (requires librewolf)
- librewolf-extension-kagisearch-bin (requires librewolf)
- librewolf-extension-localcdn-bin (requires librewolf)
- librewolf-extension-plasma-integration (requires librewolf)
- librewolf-extension-proxy-toggle-bin (requires librewolf)
- librewolf-extension-return-youtube-dislike-bin (requires librewolf)
- librewolf-extension-reverse-image-search (requires librewolf)
- Show 17 more...
Sources (7)
- default192x192.png
- git+https://gitlab.com/librewolf-community/browser/source.git#tag=140.0.2-1
- https://gitlab.com/api/v4/projects/44042130/packages/generic/librewolf/140.0.2-1/librewolf-140.0.2-1-linux-arm64-package.tar.xz
- https://gitlab.com/api/v4/projects/44042130/packages/generic/librewolf/140.0.2-1/librewolf-140.0.2-1-linux-arm64-package.tar.xz.sig
- https://gitlab.com/api/v4/projects/44042130/packages/generic/librewolf/140.0.2-1/librewolf-140.0.2-1-linux-x86_64-package.tar.xz
- https://gitlab.com/api/v4/projects/44042130/packages/generic/librewolf/140.0.2-1/librewolf-140.0.2-1-linux-x86_64-package.tar.xz.sig
- librewolf.desktop
Latest Comments
« First ‹ Previous 1 2 3 4 5 6 7 .. 22 Next › Last »
karolyi commented on 2025-03-19 15:58 (UTC)
zlima12 commented on 2025-03-15 18:37 (UTC) (edited on 2025-03-15 18:38 (UTC) by zlima12)
@marbens yes, that would not have been that big of a deal considering the upstream release cadence. epoch bumps are only supposed to be used for major versioning breakage (e.g. 5.7.2 gets reset to 1.0.0). Really, I think that it should get reset to zero/undefined in the case of this package, but as mentioned before that would require manual intervention from users that have updated to epoch 1.
marbens commented on 2025-03-15 07:54 (UTC) (edited on 2025-03-15 07:58 (UTC) by marbens)
@zlima12 How else would we have solved the problem? Skip 136.0-2?
zlima12 commented on 2025-03-15 00:15 (UTC) (edited on 2025-03-15 00:17 (UTC) by zlima12)
I really don't think that an epoch bump was warranted here. There was no profound change in the upstream versioning system, and the versioning problem would have only lasted until 136.1 or 137 was released. Now, there is no way to undo the epoch change without manual intervention from the users that have already updated.
libresx commented on 2025-03-12 22:19 (UTC) (edited on 2025-03-12 22:20 (UTC) by libresx)
Cannot be installed because of librewolf-136.0-2-linux-x86_64-package.tar.xz.sig unverified RSA key. Signature has been made 06 March 2025.
BarkleyIII commented on 2025-03-11 08:54 (UTC)
@Powerless That should be fine, as long as the fingerprint of librewolf.asc matches the fingerprint from the librewolf FAQ: https://librewolf.net/docs/faq/#is-importing-gpg-key-0x2b12ef16-ok
Powerless commented on 2025-03-11 00:16 (UTC)
What the hack is going on with this GPG thing? Is this safe to do what @daniel-kuehn said?
Then import it with:
gpg --import librewolf.asc "
marbens commented on 2025-03-07 05:40 (UTC) (edited on 2025-03-07 05:41 (UTC) by marbens)
It shows Linux as my user agent (Mozilla/5.0 (X11; Linux x86_64; rv:136.0) Gecko/20100101 Firefox/136.0
), even with ResistFingerprinting enabled. Is this intentional, or a regression? It used to not.
Pinned Comments
lsf commented on 2021-11-10 12:14 (UTC) (edited on 2023-04-17 07:18 (UTC) by lsf)
https://wiki.archlinux.org/title/Arch_User_Repository#Acquire_a_PGP_public_key_if_needed
gpg --keyserver hkp://keyserver.ubuntu.com --search-keys 031F7104E932F7BD7416E7F6D2845E1305D6E801
/edit: starting with 112.0-1, the binaries are signed with the maintainers shared key, so
gpg --keyserver hkp://keyserver.ubuntu.com --search-keys 662E3CDD6FE329002D0CA5BB40339DD82B12EF16
should do the trick instead. I've also signed the key with the previously used key, so you have at least some guarantee that it's not a malicious attack :)