landry
cb07437f4f
Remove patches - let's stick to the sane defaults upstream provides.
2011-06-19 21:41:41 +00:00
landry
3bfa776601
Remove useless patch, crashreporter is disabled anyways through
...
CONFIGURE_ARGS as breakpad doesn't have a bsd backend..
2011-06-19 21:36:44 +00:00
landry
4d9386d95c
A patch reordering sonames to pass to PR_LoadLibrary() makes no sense
...
when we know one will match in our case anyway. Remove.
2011-06-19 21:26:22 +00:00
landry
dadd746efd
Remove duplicate/unused patches - they are in security/nss, which
...
mozilla ports uses.
2011-06-19 21:21:30 +00:00
landry
863249e5bd
Useless patch patching a comment iz useless
2011-06-19 21:19:32 +00:00
landry
2ab07676fc
libplayback-1.so is for the binary flash support, we will never support
...
that so no need to fix the PR_LoadLibrary() call.
2011-06-19 21:18:29 +00:00
landry
e0ac769023
Remove patch, we don't build on arm atm, and when someone comes back to
...
that more work will be needed anyway.
2011-06-19 21:16:09 +00:00
landry
0dd702188c
Add comments to the local modifications for https:// cert warning
...
handling for dummies.
2011-06-19 21:14:02 +00:00
landry
1e7d825ba1
Load the correct libGL. WebGL doesn't work (yet), but at least it can go
...
further.
2011-06-17 08:24:52 +00:00
jasper
5c75eb2873
regen patches
2011-05-02 15:08:28 +00:00
landry
a30bd0967e
Update to mozilla-firefox 4.0.1.
...
Fixes MFSA 2011-12, 2011-17, 2011-18.
2011-04-29 07:58:10 +00:00
landry
f7d875578b
Moar links to reported bugz:
...
https://bugzilla.mozilla.org/show_bug.cgi?id=650772
https://bugzilla.mozilla.org/show_bug.cgi?id=651444
https://bugzilla.mozilla.org/show_bug.cgi?id=651461
2011-04-20 11:49:02 +00:00
landry
d135da184a
Add comments/links to bugzilla for a bunch of patches pushed upstream:
...
https://bugzilla.mozilla.org/show_bug.cgi?id=546162
https://bugzilla.mozilla.org/show_bug.cgi?id=589754
https://bugzilla.mozilla.org/show_bug.cgi?id=648721
https://bugzilla.mozilla.org/show_bug.cgi?id=650742
https://bugzilla.mozilla.org/show_bug.cgi?id=650749
Add patch for https://bugzilla.mozilla.org/show_bug.cgi?id=633193
2011-04-19 09:16:33 +00:00
landry
a2b4f8d19a
Remove, unneeded since the better rpath-link fix went to configure.in patch.
2011-04-15 11:44:53 +00:00
landry
6340f3a17a
Better patches for rpath-link as submitted upstream, cf
...
https://bugzilla.mozilla.org/show_bug.cgi?id=648721
While here grab js/src/Makefile.in patch from
https://bug638056.bugzilla.mozilla.org/attachment.cgi?id=520157
and add the hg rev of the commited sparc64 fix for opentype
2011-04-15 11:43:46 +00:00
jasper
009659f749
- allow internal libffi to compile on mips64* by syncing patches with our libffi port.
...
ffx is not enabled on mips64* yet, though.
ok landry@
2011-04-15 08:31:48 +00:00
landry
e0a6f526c5
Better patches for sndio integration and kerberos/gssapi authentication
...
as pushed upstream, see
https://bugzilla.mozilla.org/show_bug.cgi?id=648726 and
https://bugzilla.mozilla.org/show_bug.cgi?id=648730
No binary change..
2011-04-09 11:05:06 +00:00
landry
20acf0c075
Add patches to let mozilla-firefox 4.0 at least build on sparc64.
...
- disable tracejit/methodjit
- add fix for https://bugzilla.mozilla.org/show_bug.cgi?id=618485
- add fix for https://bugzilla.mozilla.org/show_bug.cgi?id=589754
- don't force-enable assembler/jit on sparc64
It still doesn't run (endless loop at startup) due to 64-bits
jsval_layout (see https://bugzilla.mozilla.org/show_bug.cgi?id=577056 )
but at least patches are in cvs, and the js shell can run simple things.
No change for other archs.
2011-04-05 09:00:42 +00:00
landry
ddd3e93eae
Lo and behold, update to mozilla-firefox 4.0 !
...
Too much changes to list them, just enjoy it. Thanks to the ones who
tested the betas/rc.
ok jasper@
2011-03-30 21:39:14 +00:00
landry
d2264d1d39
Assorted fixes for:
...
https://bugzilla.mozilla.org/show_bug.cgi?id=643137 (crash on sparc64
when displaying opentypes fonts, fix from tobias ulmer)
https://bugzilla.mozilla.org/show_bug.cgi?id=644012 (crash on ssl certs
with empty issuer name, pointed our by roberth at openbsd dot pap dot st
and mikolaj kucharski)
2011-03-24 11:41:11 +00:00
dcoppa
9f2ad3cb2a
Adopt a patch that fixes a bug causing animated gifs to flicker
...
when using cairo 1.10.x and make mozilla-firefox and mozilla-thunderbird
build against systemwide cairo as it was with cairo 1.8.x.
Patch backported from FF4 branch by Rafal Muzylo <galtgendo@o2.pl>
https://bugzilla.mozilla.org/show_bug.cgi?id=597174
http://sources.gentoo.org/cgi-bin/viewvc.cgi/gentoo-x86/net-libs/xulrunner/files/fix-animated-gifs.patch
OK landry@
2011-03-10 14:34:17 +00:00
landry
ab7613e577
Update to firefox 3.6.14. (Fixes MFSA-2011-01->11)
...
Patches for https://bugzilla.mozilla.org/show_bug.cgi?id=573039 merged
upstream.
2011-03-02 14:39:48 +00:00
landry
1c74338058
Fix an unaligned access on sparc64 leading to random crashes when
...
mozilla tries to read a malformed ICC profile on random image content
found on the web.
backport of http://hg.mozilla.org/mozilla-central/rev/e8207773d54d
ref: https://bugzilla.mozilla.org/show_bug.cgi?id=629057
issue reported and fix found by naddy@
ok naddy@ ajacoutot@
2011-01-28 21:38:12 +00:00
landry
b07f44ae2e
Add a patch doing PRAGMA secure_delete ON when opening connection to
...
sqlite database. Allows us to build against system sqlite3 again, and
get rid of the infamous symbol size mismatch warning reported several
times on ports@.
See https://bugzilla.mozilla.org/show_bug.cgi?id=445164 for why mozilla
now hard-requires secure_delete, and
https://bugzilla.mozilla.org/show_bug.cgi?id=546162 for the reasons they
don't want to make that an option and forces us to do such hacks.
ok jasper@
2011-01-14 22:49:47 +00:00
stsp
fabc72b73a
Apply patch from upstream to fix the "Print" and "Print Preview" crashes.
...
https://bugzilla.mozilla.org/show_bug.cgi?id=573039
https://bug573039.bugzilla.mozilla.org/attachment.cgi?id=499233
suggested by and ok landry@
2010-12-26 13:16:29 +00:00
dcoppa
927ee14bcd
Fix Kerberos/GSSAPI authentication within mozilla ports.
...
OpenBSD does not have gssapi_krb5. So, to avoid undefined symbol
errors, link libxul with "-lkrb5 -lcrypto".
OK phessler@, landry@ (MAINTAINER)
2010-12-01 15:00:12 +00:00
landry
2f7dcf406c
Add a patch so that run-mozilla.sh finds our gdb by default. Amend
...
README.OpenBSD to teach users how to properly report bugs.
2010-10-27 12:56:28 +00:00
landry
9b8dad4d1e
Add patches to allow building a debug-flavoured working package (at
...
least on amd64). Codepaths only used in that case.
2010-10-27 08:10:59 +00:00
landry
5f8a1719d1
Update firefox35 port to 3.5.12, fixing a whole bunch of MFSA (2010-49->63)
2010-09-12 17:55:30 +00:00
landry
6ac6c16143
Security/Reliability update to firefox 3.6.7, fixes MFSA-2010-34 -> 47
...
http://www.mozilla.org/security/known-vulnerabilities/firefox36.html
ok naddy@
2010-07-22 21:42:13 +00:00
landry
f4a0328f42
Add -Wl,-rpath,'$(installdir)' to LDFLAGS when linking mozilla libs, so
...
that when they are dlopen()'ed they can tell ld.so where to go hunt for
the other mozilla libs they depend on.
Similar fix as done in xulrunner 1.8 patch-config_rules_mk 2 years ago
by martynas@, needed to convert py-gnome-extras to xulrunner 1.9.
No fallout on firefox.
2010-07-19 13:46:27 +00:00
landry
fd01387962
Switch www/mozilla-firefox to www/mozilla MODULE. Makefile is now much
...
more sane : 31 insertions(+), 141 deletions(-)
Switch pkg/PLIST to MOZILLA_PROJECT, and correctly patch
config/autoconf.mk.in.
2010-07-09 15:43:54 +00:00
landry
4d98df5567
Update to mozilla-firefox 3.6.6. Fixes a bunch of MFSA, see
...
http://www.mozilla.org/security/known-vulnerabilities/firefox36.html
The new plugin sandboxing code is disabled because :
- it only supports binary blobs plugins we don't have
- it is an horrible maze of #ifdef linux-apple-win32 coming straight
from an old version of chromium. Future versions should have better BSD
support..
tested by several on ports@, thanks!
2010-06-28 21:24:22 +00:00
landry
a0e9c9baf1
Remove all patches applying to local copy of nss/nspr, as we now use the
...
systemwide on (which have all those patches). Don't call autoconf in
nsprpub/ while here, and bump PKGNAME to be on the safe side.
2010-06-16 19:05:40 +00:00
landry
9115e98919
Switch mozilla-firefox to use systemwide nss/nspr, and remove the
...
corresponding libs from SHARED_LIBS/PLIST. Bump minor and PKGNAME.
Bring in a pair of patches from xulrunner, and add a DIRECTORY variable
as done in xulrunner that is subst'ed in config/autoconf.mk.in.
sthen@ likes.
2010-06-12 15:00:12 +00:00
espie
8666776b2e
gcc3 and gcc4 disagree, so put a common cast to make them compile.
...
(also compile some file with -O1 in moz)
2010-05-10 12:36:09 +00:00
landry
bcce369765
Various cleanups, as done in www/firefox35 :
...
- use SUBST_CMD instead of perl -pi -e
- use ${LOCALBASE}/${TRUEPREFIX}/${X11BASE} instead of the handpatched
_XXX_ ones
- harmonize default systemwide plugins/extensions search path to
lib/mozilla/{plugins,extensions} as done in other mozilla ports
2010-04-28 06:56:38 +00:00
landry
de100a1ff9
Firefox uses its own libpng (for animated png support), and apparently
...
it breaks loading png icons through gdk_pixbuf_new_from_file as gtk is
linked with systemwide png. This went unnoticed so far as firefox always
shipped a fallback xpm icon, but this is not the case anymore, so now
gtk_window_set_icon_list() is not called anymore, and the window manager
shows the default icon for firefox windows in taskbar/tasklists..
So add graphics/netpbm as a build dependency, do the necessary netpbm
magic in do-install to create the default.xpm from mozicon128.png, and
patch widget/src/gtk2/nsWindow.cpp to not try to load png icons.
While here fix icon path in desktop file, and add a comment about why we
don't use systemwide png.
2010-04-26 22:14:37 +00:00
landry
ad076fd40f
Update www/mozilla-firefox from 3.0.19 to 3.6.3, merging the wip done in
...
www/firefox36 mostly by martynas@ and naddy@.
Note that the java plugin from devel/jdk currently doesn't work with this
version of firefox, in the meantime users really needed it will have to
use www/firefox35.
ok naddy@
2010-04-26 19:55:58 +00:00
naddy
846bed1120
SECURITY update to 3.0.19:
...
MFSA 2010-20 Chrome privilege escalation via forced URL drag and drop
MFSA 2010-19 Dangling pointer vulnerability in nsPluginArray
MFSA 2010-18 Dangling pointer vulnerability in nsTreeContentView
MFSA 2010-17 Remote code execution with use-after-free in nsTreeSelection
MFSA 2010-16 Crashes with evidence of memory corruption
2010-03-31 15:46:12 +00:00
martynas
84856b7c61
- create downloads dir with mode 0700 instead
...
- pass --disable-crashreporter
2009-09-18 20:35:27 +00:00
martynas
a21dd6625c
- create downloads dir with mode 0700 instead
...
- pass --disable-crashreporter
2009-09-10 21:34:55 +00:00
martynas
67f1ca01e0
security update to mozilla-firefox-3.0.14. MFSA 2009-51, MFSA
...
2009-50, MFSA 2009-49, MFSA 2009-48, MFSA 2009-47
http://www.mozilla.org/security/known-vulnerabilities/firefox30.html#firefox3.0.14
2009-09-10 21:28:25 +00:00
martynas
f6879d3eef
mozilla-firefox-3.0.11
2009-06-11 14:10:37 +00:00
martynas
927ded3beb
implement sndio backend and get rid of esound. ok jakemsr@
2009-05-01 22:53:25 +00:00
martynas
c256bdc4a7
turn off Ignore Scaling and Shrink to fit page width. fixes printing
...
for beck@. ok kurt@, "no objections" naddy@
2009-04-22 21:00:23 +00:00
martynas
6dfe2634be
security update to mozilla-firefox-3.0.5. MFSA 2008-69; MFSA
...
2008-68; MFSA 2008-67; MFSA 2008-66; MFSA 2008-65; MFSA 2008-64;
MFSA 2008-63; MFSA 2008-60.
tested by sthen@ and naddy@. ok naddy@
2008-12-18 19:27:13 +00:00
martynas
9944b0d1c5
it is the right time to update to mozilla-firefox-3.0.4, which has
...
been tested good enough, and i've fixed all the issues i'm aware
of. furthermore 2.0 branch has basically reached eol, since there
will be only one minor update (2.0.0.19)
discussed with kurt@, naddy@ and porters
pkgname change handling help naddy@
ok naddy@
2008-11-20 23:41:32 +00:00
martynas
c5067e1a5b
security update to mozilla-firefox-2.0.0.18. MFSA 2008-58; MFSA
...
2008-57; MFSA 2008-56; MFSA 2008-55; MFSA 2008-54; MFSA 2008-53;
MFSA 2008-52; MFSA 2008-50; MFSA 2008-49; MFSA 2008-48; MFSA 2008-47.
http://www.mozilla.org/security/known-vulnerabilities/firefox20.html#firefox2.0.0.18
ok naddy@
2008-11-13 16:57:14 +00:00
martynas
96836d3bb7
use system libm. was ok naddy@, kurt@
2008-08-19 23:53:45 +00:00