Cannot be installed because of librewolf-136.0-2-linux-x86_64-package.tar.xz.sig unverified RSA key. Signature has been made 06 March 2025.
Search Criteria
Package Details: librewolf-bin 1:150.0.3_1-1
Package Actions
| Git Clone URL: | https://aur.archlinux.org/librewolf-bin.git (read-only, click to copy) |
|---|---|
| Package Base: | librewolf-bin |
| Description: | Community-maintained fork of Firefox, focused on privacy, security and freedom. |
| Upstream URL: | https://librewolf.net/ |
| Keywords: | browser web |
| Licenses: | MPL-2.0 |
| Conflicts: | librewolf |
| Provides: | librewolf |
| Submitter: | lsf |
| Maintainer: | lsf |
| Last Packager: | lsf |
| Votes: | 626 |
| Popularity: | 24.26 |
| First Submitted: | 2019-06-16 13:12 (UTC) |
| Last Updated: | 2026-05-13 07:44 (UTC) |
Dependencies (39)
- alsa-lib
- at-spi2-core (at-spi2-core-gitAUR)
- bash (bash-gitAUR, bash-devel-gitAUR)
- cairo (cairo-gitAUR)
- dbus (dbus-gitAUR, dbus-selinuxAUR, dbus-nosystemd-gitAUR)
- ffmpeg (ffmpeg-nvcodec-11-1-gitAUR, ffmpeg-ffplayoutAUR, ffmpeg-cudaAUR, ffmpeg-decklinkAUR, ffmpeg-amd-fullAUR, ffmpeg-amd-full-gitAUR, librempeg-gitAUR, ffmpeg-whisper-gitAUR, ffmpeg-gitAUR, ffmpeg-full-gitAUR, ffmpeg-cuda-fullAUR, ffmpeg-fullAUR, ffmpeg-full-llvmAUR, ffmpeg-libfdk_aacAUR, ffmpeg-obsAUR, ffmpeg-headlessAUR, ffmpeg-whisperAUR)
- fontconfig (fontconfig-gitAUR, fontconfig-ubuntuAUR)
- freetype2 (freetype2-qdoled-aw3225qfAUR, freetype2-qdoledAUR, freetype2-qdoled-gen3AUR, freetype2-woledAUR, freetype2-gitAUR, freetype2-macosAUR)
- gcc-libs (gcc-libs-gitAUR, gccrs-libs-gitAUR, gcc-libs-snapshotAUR)
- gdk-pixbuf2 (gdk-pixbuf2-gitAUR, gdk-pixbuf2-noglycinAUR)
- glib2 (glib2-gitAUR, glib2-patched-thumbnailerAUR)
- glibc (glibc-gitAUR, glibc-eacAUR, glibc-git-native-pgoAUR)
- gtk3 (gtk3-no_deadkeys_underlineAUR, gtk3-classicAUR, gtk3-patched-filechooser-icon-viewAUR, gtk3-classic-xfceAUR)
- hicolor-icon-theme (hicolor-icon-theme-gitAUR)
- libpulse (pulseaudio-dummyAUR, libpulse-gitAUR)
- libx11 (libx11-gitAUR)
- libxcb (libxcb-gitAUR)
- libxcomposite
- libxcursor
- libxdamage
- Show 19 more dependencies...
Required by (39)
- edge-frfox (requires librewolf) (optional)
- ff2mpv-go-git (requires librewolf) (optional)
- ff2mpv-rust (requires librewolf) (optional)
- firefox-gnome-theme (requires librewolf) (optional)
- librewolf-comment-out-cfg-hook (requires librewolf)
- librewolf-extension-bitwarden-bin (requires librewolf)
- librewolf-extension-bitwarden-git (requires librewolf) (optional)
- librewolf-extension-dark-background-light-text (requires librewolf)
- librewolf-extension-darkreader (requires librewolf)
- librewolf-extension-darkreader-bin (requires librewolf)
- librewolf-extension-duckduckgo-privacy-essentials (requires librewolf)
- librewolf-extension-foxyproxy (requires librewolf)
- librewolf-extension-gnome-shell-integration (requires librewolf)
- librewolf-extension-greasemonkey (requires librewolf)
- librewolf-extension-kagisearch-bin (requires librewolf)
- librewolf-extension-localcdn-bin (requires librewolf)
- librewolf-extension-plasma-integration (requires librewolf)
- librewolf-extension-plasma-integration-bin (requires librewolf)
- librewolf-extension-protonpass-bin (requires librewolf)
- librewolf-extension-proxy-toggle-bin (requires librewolf)
- Show 19 more...
Sources (7)
- default192x192.png
- git+https://codeberg.org/librewolf/source.git#tag=150.0.3-1
- https://codeberg.org/api/packages/librewolf/generic/librewolf/150.0.3-1/librewolf-150.0.3-1-linux-arm64-package.tar.xz
- https://codeberg.org/api/packages/librewolf/generic/librewolf/150.0.3-1/librewolf-150.0.3-1-linux-arm64-package.tar.xz.sig
- https://codeberg.org/api/packages/librewolf/generic/librewolf/150.0.3-1/librewolf-150.0.3-1-linux-x86_64-package.tar.xz
- https://codeberg.org/api/packages/librewolf/generic/librewolf/150.0.3-1/librewolf-150.0.3-1-linux-x86_64-package.tar.xz.sig
- librewolf.desktop
Latest Comments
« First ‹ Previous 1 .. 4 5 6 7 8 9 10 11 12 13 14 .. 29 Next › Last »
libresx commented on 2025-03-12 22:19 (UTC) (edited on 2025-03-12 22:20 (UTC) by libresx)
BarkleyIII commented on 2025-03-11 08:54 (UTC)
@Powerless That should be fine, as long as the fingerprint of librewolf.asc matches the fingerprint from the librewolf FAQ: https://librewolf.net/docs/faq/#is-importing-gpg-key-0x2b12ef16-ok
Powerless commented on 2025-03-11 00:16 (UTC)
What the hack is going on with this GPG thing? Is this safe to do what @daniel-kuehn said?
Then import it with:
gpg --import librewolf.asc "
marbens commented on 2025-03-07 05:40 (UTC) (edited on 2025-03-07 05:41 (UTC) by marbens)
It shows Linux as my user agent (Mozilla/5.0 (X11; Linux x86_64; rv:136.0) Gecko/20100101 Firefox/136.0), even with ResistFingerprinting enabled. Is this intentional, or a regression? It used to not.
marbens commented on 2025-03-06 02:51 (UTC)
I've opened another PR attempting to fix the versioning problems, that are caused by variable-place versioning.
marbens commented on 2025-03-05 14:31 (UTC) (edited on 2025-03-05 14:42 (UTC) by marbens)
If 136.0-2 releases right after 136.0-1, the 4-point solution will require an epoch bump (to 1 at the moment).
But if 136.0.1-1 or 137.0-1 releases right after 136.0-1, we can do the 4-point transition at the same time as the upstream firefox update and avoid using epoch.
BTW you can use an underscore instead of a period for the final version number point (librewolf patch number?), in the 4-point versioning, if you prefer how it looks.
I wasn't thinking about the versioning having a variable amount of points when I made that patch.
lsf commented on 2025-03-05 14:02 (UTC)
Hm. Crap.
…maybe I should've just left it as is (it's always still a possibility to use the pkgrel and go with something like 136.0-1.1, for example, if AUR/PKGBUILD only changes/rebuilds were required).
Going with 4 places always doesn't seem to "sit right" with me as well on the first glance, but I'll need to think about this for a bit.
Thanks a lot for noticing (and for making me aware of this, including a potential solution even)! :)
petris commented on 2025-03-05 13:53 (UTC)
I noticed the version number change to use an underscore, I assume in an effort to decouple the pkgrel from the librewolf version number. Unfortunately it appears this is going to cause some problems.
Lets assume that 136.0-2 is released, and then 136.0.1-1 after that, as librewolf regularly uses the third position as well. A quick test with vercmp shows that 136.0_2 is considered "newer" than 136.0.1_1. My assumption is that it just sees the _ as a separator just like ., and therefore what it's really seeing is 136.0.2 vs 136.0.1.1, which would be correct.
You could probably fix this by making the pkgver always use 4 places (3 for the version and 1 for the pkgrel), using the following as an example:
pkgver="136.0.0.1"
_releaserel="${pkgver##*.}" # Effectively gives you the last segment, resulting in "1".
_releaseverfull="${pkgver%.*}" # Effectively removes the last segment, resulting in "136.0.0"
_releasever="${_releaseverfull/.0}" # Removes ".0" from the end. For "136.0.0" this will result in "136.0" but for "136.0.1" won't do anything.
Then use the _releasever and _releaserel parameters for constructing the actual librewolf version.
daniel-kuehn commented on 2025-03-01 12:09 (UTC)
@AstroBarker Builds/installs fine with yay for me, it's an issue on your end and this package shouldn't be flagged out of date because of that.
Pinned Comments
lsf commented on 2021-11-10 12:14 (UTC) (edited on 2026-05-07 09:38 (UTC) by lsf)
https://wiki.archlinux.org/title/Arch_User_Repository#Acquire_a_PGP_public_key_if_needed
gpg --keyserver hkp://keyserver.ubuntu.com --search-keys 031F7104E932F7BD7416E7F6D2845E1305D6E801/edit: starting with 112.0-1, the binaries are signed with the maintainers shared key, so
gpg --keyserver hkp://keyserver.ubuntu.com --search-keys 662E3CDD6FE329002D0CA5BB40339DD82B12EF16should do the trick instead. I've also signed the key with the previously used key, so you have at least some guarantee that it's not a malicious attack :)/edit: (2026-05-07): The upstream signing sub-key was rotated, and the
.tar.xztarballs will now be signed with a new subkey. The main key id (0x662E3CDD6FE329002D0CA5BB40339DD82B12EF16) remains unchanged though, so should you get an error during signature verification about a missing (sub)key, all that's required would be to refresh the key(s) viagpg --refresh-keys 662E3CDD6FE329002D0CA5BB40339DD82B12EF16.