head 1.11; access; symbols pkgsrc-2017Q1:1.10.0.2 pkgsrc-2017Q1-base:1.10 pkgsrc-2016Q4:1.9.0.2 pkgsrc-2016Q4-base:1.9 pkgsrc-2016Q1:1.7.0.4 pkgsrc-2016Q1-base:1.7 pkgsrc-2015Q4:1.7.0.2 pkgsrc-2015Q4-base:1.7 pkgsrc-2015Q3:1.6.0.6 pkgsrc-2015Q3-base:1.6 pkgsrc-2015Q2:1.6.0.4 pkgsrc-2015Q2-base:1.6 pkgsrc-2015Q1:1.6.0.2 pkgsrc-2015Q1-base:1.6 pkgsrc-2014Q4:1.5.0.6 pkgsrc-2014Q4-base:1.5 pkgsrc-2014Q3:1.5.0.4 pkgsrc-2014Q3-base:1.5 pkgsrc-2014Q2:1.5.0.2 pkgsrc-2014Q2-base:1.5 pkgsrc-2014Q1:1.1.0.2 pkgsrc-2014Q1-base:1.1; locks; strict; comment @// @; 1.11 date 2017.06.14.11.28.44; author ryoon; state dead; branches; next 1.10; commitid TvqH8xBKhv2gJkVz; 1.10 date 2017.03.07.20.45.43; author ryoon; state Exp; branches; next 1.9; commitid cj2gfa0XmazzZEIz; 1.9 date 2016.12.03.09.58.26; author ryoon; state Exp; branches; next 1.8; commitid uIUIk0K6tuQSqwwz; 1.8 date 2016.06.16.12.08.21; author ryoon; state dead; branches; next 1.7; commitid LAwegbTYgLLjCGaz; 1.7 date 2015.11.03.15.52.57; author ryoon; state Exp; branches; next 1.6; commitid omt1OZedtJyJ7FHy; 1.6 date 2015.02.16.16.10.22; author bad; state Exp; branches; next 1.5; commitid kmrl0wXg9UQWyfay; 1.5 date 2014.06.11.00.40.59; author ryoon; state Exp; branches; next 1.4; commitid QTw894DEf2Let2Ex; 1.4 date 2014.05.30.10.22.05; author pho; state Exp; branches; next 1.3; commitid pujOAy5YvcBW3yCx; 1.3 date 2014.05.29.15.38.19; author pho; state Exp; branches; next 1.2; commitid xGrR6Q92PtaXQrCx; 1.2 date 2014.04.30.15.07.18; author ryoon; state Exp; branches; next 1.1; commitid BxErbE5mH8g3CIyx; 1.1 date 2014.03.30.01.03.22; author ryoon; state Exp; branches; next ; commitid KyyDxvyupmSjWEux; desc @@ 1.11 log @Update to 54.0 * If your 54.0 is unstable, please disable e10s with browser.tabs.remote.autostart.2=false (this works at least for me) Changelog: New Simplified the download button and download status panel Added support for multiple content processes (e10s-multi) Added Burmese (my) locale Fixed Various security fixes Changed Moved the mobile bookmarks folder to the main bookmarks menu for easier access Security fixes: #CVE-2017-5472: Use-after-free using destroyed node when regenerating trees #CVE-2017-7749: Use-after-free during docshell reloading #CVE-2017-7750: Use-after-free with track elements #CVE-2017-7751: Use-after-free with content viewer listeners #CVE-2017-7752: Use-after-free with IME input #CVE-2017-7754: Out-of-bounds read in WebGL with ImageInfo object #CVE-2017-7755: Privilege escalation through Firefox Installer with same directory DLL files #CVE-2017-7756: Use-after-free and use-after-scope logging XHR header errors #CVE-2017-7757: Use-after-free in IndexedDB #CVE-2017-7778: Vulnerabilities in the Graphite 2 library #CVE-2017-7758: Out-of-bounds read in Opus encoder #CVE-2017-7759: Android intent URLs can cause navigation to local file system #CVE-2017-7760: File manipulation and privilege escalation via callback parameter in Mozilla Windows Updater and Maintenance Service #CVE-2017-7761: File deletion and privilege escalation through Mozilla Maintenance Service helper.exe application #CVE-2017-7762: Addressbar spoofing in Reader mode #CVE-2017-7763: Mac fonts render some unicode characters as spaces #CVE-2017-7764: Domain spoofing with combination of Canadian Syllabics and other unicode blocks #CVE-2017-7765: Mark of the Web bypass when saving executable files #CVE-2017-7766: File execution and privilege escalation through updater.ini, Mozilla Windows Updater, and Mozilla Maintenance Service #CVE-2017-7767: Privilege escalation and arbitrary file overwrites through Mozilla Windows Updater and Mozilla Maintenance Service #CVE-2017-7768: 32 byte arbitrary file read through Mozilla Maintenance Service #CVE-2017-7770: Addressbar spoofing with JavaScript events and fullscreen mode #CVE-2017-5471: Memory safety bugs fixed in Firefox 54 #CVE-2017-5470: Memory safety bugs fixed in Firefox 54 and Firefox ESR 52.2 @ text @$NetBSD: patch-dom_system_OSFileConstants.cpp,v 1.10 2017/03/07 20:45:43 ryoon Exp $ --- dom/system/OSFileConstants.cpp.orig 2017-01-23 16:13:57.000000000 +0000 +++ dom/system/OSFileConstants.cpp @@@@ -16,14 +16,17 @@@@ #include "dirent.h" #include "poll.h" #include "sys/stat.h" -#if defined(ANDROID) +#if defined(XP_LINUX) #include #define statvfs statfs +#define f_frsize f_bsize #else #include "sys/statvfs.h" +#endif // defined(XP_LINUX) +#if !defined(ANDROID) #include "sys/wait.h" #include -#endif // defined(ANDROID) +#endif // !defined(ANDROID) #endif // defined(XP_UNIX) #if defined(XP_LINUX) @@@@ -699,7 +702,7 @@@@ static const dom::ConstantSpec gLibcProp { "OSFILE_SIZEOF_STATVFS", JS::Int32Value(sizeof (struct statvfs)) }, - { "OSFILE_OFFSETOF_STATVFS_F_BSIZE", JS::Int32Value(offsetof (struct statvfs, f_bsize)) }, + { "OSFILE_OFFSETOF_STATVFS_F_FRSIZE", JS::Int32Value(offsetof (struct statvfs, f_frsize)) }, { "OSFILE_OFFSETOF_STATVFS_F_BAVAIL", JS::Int32Value(offsetof (struct statvfs, f_bavail)) }, #endif // defined(XP_UNIX) @ 1.10 log @Update to 52.0 * Switch to GTK3 build * Remove py-sqlite2 dependency, fix PR pkg/52032 Changelog: New Added support for WebAssembly, an emerging standard that brings near-native performance to Web-based games, apps, and software libraries without the use of plugins. Added automatic captive portal detection, for easier access to Wi-Fi hotspots. When accessing the Internet via a captive portal, Firefox will alert users and open the portal login page in a new tab. Added user warnings for non-secure HTTP pages with logins. Firefox now displays a "This connection is not secure" message when users click into the username and password fields on pages that don't use HTTPS. Implemented the Strict Secure Cookies specification which forbids insecure HTTP sites from setting cookies with the "secure" attribute. In some cases, this will prevent an insecure site from setting a cookie with the same name as an existing "secure" cookie from the same base domain. Enhanced Sync to allow users to send and open tabs from one device to another. Fixed Various security fixes Improved text input for third-party keyboard layouts on Windows. This will address some keyboard layouts that * have chained dead keys * input two or more characters with a non-printable key or a dead key sequence * input a character even when a dead key sequence failed to compose a character Changed Removed support for Netscape Plugin API (NPAPI) plugins other than Flash. Silverlight, Java, Acrobat and the like are no longer supported. Removed Battery Status API to reduce fingerprinting of users by trackers Improved experience for downloads: * Notification in the toolbar when a download fails * Quick access to five most recent downloads rather than three * Larger buttons for canceling and restarting downloads Display (but allow users to override) an "Untrusted Connection" error when encountering SHA-1 certificates that chain up to a root certificate included in Mozilla's CA Certificate Program. (Note: Firefox continues to permit SHA-1 certificates that chain to manually imported root certificates.) Read more about the Mozilla Security Team's plans to deprecate SHA-1 Migrated Firefox users on Windows XP and Windows Vista operating systems to the extended support release (ESR) version of Firefox. When not using Direct2D on Windows, Skia is used for content rendering Developer Enabled CSS Grid Layout, opening up a world of new possibilities for graphic design Redesigned Responsive Design Mode to include device selection, network throttling, and more Improved security for screen sharing, which now shows a preview and no longer requires a whitelisted domain unresolved Google Hangouts temporarily won't work Security fixes: #CVE-2017-5400: asm.js JIT-spray bypass of ASLR and DEP #CVE-2017-5401: Memory Corruption when handling ErrorResult #CVE-2017-5402: Use-after-free working with events in FontFace objects #CVE-2017-5403: Use-after-free using addRange to add range to an incorrect root object #CVE-2017-5404: Use-after-free working with ranges in selections #CVE-2017-5406: Segmentation fault in Skia with canvas operations #CVE-2017-5407: Pixel and history stealing via floating-point timing side channel with SVG filters #CVE-2017-5410: Memory corruption during JavaScript garbage collection incremental sweeping #CVE-2017-5411: Use-after-free in Buffer Storage in libGLES #CVE-2017-5409: File deletion via callback parameter in Mozilla Windows Updater and Maintenance Service #CVE-2017-5408: Cross-origin reading of video captions in violation of CORS #CVE-2017-5412: Buffer overflow read in SVG filters #CVE-2017-5413: Segmentation fault during bidirectional operations #CVE-2017-5414: File picker can choose incorrect default directory #CVE-2017-5415: Addressbar spoofing through blob URL #CVE-2017-5416: Null dereference crash in HttpChannel #CVE-2017-5417: Addressbar spoofing by draging and dropping URLs #CVE-2017-5425: Overly permissive Gecko Media Plugin sandbox regular expression access #CVE-2017-5426: Gecko Media Plugin sandbox is not started if seccomp-bpf filter is running #CVE-2017-5427: Non-existent chrome.manifest file loaded during startup #CVE-2017-5418: Out of bounds read when parsing HTTP digest authorization responses #CVE-2017-5419: Repeated authentication prompts lead to DOS attack #CVE-2017-5420: Javascript: URLs can obfuscate addressbar location #CVE-2017-5405: FTP response codes can cause use of uninitialized values for ports #CVE-2017-5421: Print preview spoofing #CVE-2017-5422: DOS attack by using view-source: protocol repeatedly in one hyperlink #CVE-2017-5399: Memory safety bugs fixed in Firefox 52 #CVE-2017-5398: Memory safety bugs fixed in Firefox 52 and Firefox ESR 45.8 @ text @d1 1 a1 1 $NetBSD: patch-dom_system_OSFileConstants.cpp,v 1.9 2016/12/03 09:58:26 ryoon Exp $ @ 1.9 log @Update to 50.0.2 * Change default audio support to ALSA. You can use OSS or pulseaudio via ALSA plugin package. Changelog: 50.0.2: Fixed in Firefox 50.0.2 #CVE-2016-9079: Use-after-free in SVG Animation 50.0.1: Fixed *Firefox crashes with 3rd party Chinese IME when using IME text Security vulnerabilities fixed in Firefox 50.0.1: #CVE-2016-9078: data: URL can inherit wrong origin after an HTTP redirect 50.0: New *Playback video on more sites without plugins with WebM EME Support for Widevine on Windows and Mac *Improved performance for SDK extensions or extensions using the SDK module loader *Added download protection for a large number of executable file types on Windows, Mac and Linux *Increased availability of WebGL to more than 98 percent of users on Windows 7 and newer *Added Guarani (gn) locale *Added option to Find in page that allows users to limit search to whole words only *Updates to keyboard shortcuts *Set a preference to have Ctrl+Tab cycle through tabs in recently used order *View a page in Reader Mode by using Ctrl+Alt+R (command+alt+r on Mac) Fixed *Login cookies are now saved for sites with a high number of cookies (Bug 1264192) *Various security fixes *Fixed rendering of dashed and dotted borders with rounded corners (border-radius) Changed *The link to check for plugin security updates has been removed from the addon manager as Firefox automatically checks for plugin updates *Blocked versions of libavcodec older than 54.35.1 *Added a built-in Emoji set for operating systems without native Emoji fonts (Windows 8.0 and lower and Linux) Developer *Changes for web developers Security vulnerabilities fixed in Firefox 50: #CVE-2016-5296: Heap-buffer-overflow WRITE in rasterize_edges_1 #CVE-2016-5292: URL parsing causes crash #CVE-2016-5293: Write to arbitrary file with Mozilla Updater and Maintenance Service using updater.log hardlink #CVE-2016-5294: Arbitrary target directory for result files of update process #CVE-2016-5297: Incorrect argument length checking in JavaScript #CVE-2016-9064: Add-ons update must verify IDs match between current and new versions #CVE-2016-9065: Firefox for Android location bar spoofing using fullscreen #CVE-2016-9066: Integer overflow leading to a buffer overflow in nsScriptLoadHandler #CVE-2016-9067: heap-use-after-free in nsINode::ReplaceOrInsertBefore #CVE-2016-9068: heap-use-after-free in nsRefreshDriver #CVE-2016-9072: 64-bit NPAPI sandbox isn't enabled on fresh profile #CVE-2016-9075: WebExtensions can access the mozAddonManager API and use it to gain elevated privileges #CVE-2016-9077: Canvas filters allow feDisplacementMaps to be applied to cross-origin images, allowing timing attacks on them #CVE-2016-5291: Same-origin policy violation using local HTML file and saved shortcut file #CVE-2016-5295: Mozilla Maintenance Service: Ability to read arbitrary files as SYSTEM #CVE-2016-5298: SSL indicator can mislead the user about the real URL visited #CVE-2016-5299: Firefox AuthToken in broadcast protected with signature-level permission can be accessed by an application installed beforehand that defines the same permissionsPI key (glocation) in broadcast protected with signature-level permission can be accessed by an application installed beforehand that defines the same permissions #CVE-2016-9062: Private browsing browser traces (Android) in browser.db and wal file #CVE-2016-9070: Sidebar bookmark can have reference to chrome window #CVE-2016-9073: windows.create schema doesn't specify "format": "relativeUrl" #CVE-2016-9074: Insufficient timing side-channel resistance in divSpoiler #CVE-2016-9076: select dropdown menu can be used for URL bar spoofing on e10s #CVE-2016-9063: Possible integer overflow to fix inside XML_Parse in Expat #CVE-2016-9071: Probe browser history via HSTS/301 redirect + CSP #CVE-2016-5289: Memory safety bugs fixed in Firefox 50 #CVE-2016-5290: Memory safety bugs fixed in Firefox 50 and Firefox ESR 45.5 @ text @d1 1 a1 1 $NetBSD$ d3 1 a3 1 --- dom/system/OSFileConstants.cpp.orig 2016-09-05 20:12:56.000000000 +0000 d5 21 a25 1 @@@@ -699,7 +699,7 @@@@ static const dom::ConstantSpec gLibcProp @ 1.8 log @Update to 47.0 * Remove macOS patches, because I cannot confirm them sadly Changelog: New Support for Google’s Widevine CDM on Windows and Mac OS X so streaming services like Amazon Video can switch from Silverlight to encrypted HTML5 video. Enable VP9 video codec for users with fast machines Embedded YouTube videos now play with HTML5 video if Flash is not installed. View and search open tabs from your smartphone or another computer in a sidebar Allow no-cache on back/forward navigations for https resources Latgalu [ltg] locale added. Wikipedia tells us there are 164,500 daily speakers. Fixed Various security fixes Changed FUEL (Firefox User Extension Library) has been removed. Add-ons relying on it will stop working. The browser.sessionstore.restore_on_demand preference has been reset to its default value (true) to avoid e10s performance problems. Because faster is better! The Firefox click-to-activate plugin whitelist has been removed. XRender is no longer used for rendering web content on Linux as this may cause a regression in remote X performance Developer Web platform changes View, start,and debug registered Service Workers in the Service Workers developer tool Simulate Push messages in the Service Workers developer tool 'Start' button for service workers in about:debugging to start registered Service Workers Changes that can affect add-on compatibility Added support for ChaCha20/Poly1305 cipher suites Custom user agents supported in Responsive Design Mode Smart multi-line input in the Web Console Developer Information HTML5 cuechange events are now available on TextTrack objects WebCrypto: PBKDF2 supports SHA-2 hash algorithms WebCrypto: RSA-PSS signature support Fixed in Firefox 47 2016-61 Network Security Services (NSS) vulnerabilities 2016-60 Java applets bypass CSP protections 2016-59 Information disclosure of disabled plugins through CSS pseudo-classes 2016-58 Entering fullscreen and persistent pointerlock without user permission 2016-57 Incorrect icon displayed on permissions notifications 2016-56 Use-after-free when textures are used in WebGL operations after recycle pool destruction 2016-55 File overwrite and privilege escalation through Mozilla Windows updater 2016-54 Partial same-origin-policy through setting location.host through data URI 2016-53 Out-of-bounds write with WebGL shader 2016-52 Addressbar spoofing though the SELECT element 2016-51 Use-after-free deleting tables from a contenteditable document 2016-50 Buffer overflow parsing HTML5 fragments 2016-49 Miscellaneous memory safety hazards (rv:47.0 / rv:45.2) @ text @d1 1 a1 1 $NetBSD: patch-dom_system_OSFileConstants.cpp,v 1.7 2015/11/03 15:52:57 ryoon Exp $ d3 1 a3 6 * NetBSD 5 does not support posix_spawn(3) * Replace XP_MACOSX with XP_DARWIN as the former is not defined when the toolkit is not cocoa. --- dom/system/OSFileConstants.cpp.orig 2015-10-22 22:30:38.000000000 +0000 d5 1 a5 1 @@@@ -11,6 +11,10 @@@@ d7 5 a11 1 #include "prsystem.h" a12 15 +#if defined(__NetBSD__) +#include +#endif + #if defined(XP_UNIX) #include "unistd.h" #include "dirent.h" @@@@ -20,7 +24,9 @@@@ #define statvfs statfs #else #include "sys/statvfs.h" +#if !(defined(__NetBSD__) && (__NetBSD_Version__ < 600000000)) #include +#endif // !NetBSD 5.* #endif // defined(ANDROID) a13 22 @@@@ -28,9 +34,9 @@@@ #include #endif // defined(XP_LINUX) -#if defined(XP_MACOSX) +#if defined(XP_DARWIN) #include "copyfile.h" -#endif // defined(XP_MACOSX) +#endif // defined(XP_DARWIN) #if defined(XP_WIN) #include @@@@ -590,7 +596,7 @@@@ static const dom::ConstantSpec gLibcProp // The size of |fsblkcnt_t|. { "OSFILE_SIZEOF_FSBLKCNT_T", JS::Int32Value(sizeof (fsblkcnt_t)) }, -#if !defined(ANDROID) +#if !defined(ANDROID) && !(defined(__NetBSD__) && (__NetBSD_Version__ < 600000000)) // The size of |posix_spawn_file_actions_t|. { "OSFILE_SIZEOF_POSIX_SPAWN_FILE_ACTIONS_T", JS::Int32Value(sizeof (posix_spawn_file_actions_t)) }, #endif // !defined(ANDROID) @ 1.7 log @Update to 42.0 Changelog: New Private Browsing with Tracking Protection blocks certain Web elements that could be used to record your behavior across sites New Control Center that contains site security and privacy controls New Indicator added to tabs that play audio with one-click muting New WebRTC improvements: IPV6 support Preferences for controlling ICE candidate generation and IP exposure Hooks for extensions to allow/deny createOffer/Answer Improved ability for applications to monitor and control which devices are used in getUserMedia New Login Manager improvements: Improved heuristics to save usernames and passwords Edit and show all logins in line, Copy/Paste usernames/passwords from the Context menu Migration imports your passwords to Firefox from Google Chrome for Windows and Internet Explorer; import anytime from the Login Manager Changed Improved performance on interactive websites that trigger a lot of restyles HTML5 Media Source Extension for HTML5 video available for all sites HTML5 Support ImageBitmap and createImageBitmap() HTML5 Implemented ES6 Reflect Developer Ability to save filter presets inside CSS Filter Tooltip Developer CSS filter presets in the Inspector Developer Configurable Firefox OS Simulator in WebIDE, to simulate reference devices like phones, tablets, even TVs Developer Asynchronous call stacks now allow web developers to follow the code flow through setTimeout, DOM event handlers, and Promise handlers. Developer Remote website debugging over WiFi (no USB cable or ADB needed) Developer View HTML source in a tab @ text @d1 1 a1 1 $NetBSD: patch-dom_system_OSFileConstants.cpp,v 1.6 2015/02/16 16:10:22 bad Exp $ @ 1.6 log @Really fix pkg/48682. It is __NetBSD__ not __NetBSD_ and it is not possible to #include on NetBSD 5.x release. So I don't know how the submitter came to claim that this compiled on NetBSD 5.x. @ text @d1 1 a1 1 $NetBSD: patch-dom_system_OSFileConstants.cpp,v 1.5 2014/06/11 00:40:59 ryoon Exp $ d8 3 a10 3 --- dom/system/OSFileConstants.cpp.orig 2014-07-17 01:45:12.000000000 +0000 +++ dom/system/OSFileConstants.cpp 2014-08-19 17:41:25.000000000 +0000 @@@@ -9,6 +9,10 @@@@ d21 1 a21 1 @@@@ -18,7 +22,9 @@@@ d31 1 a31 1 @@@@ -26,9 +32,9 @@@@ d43 1 a43 1 @@@@ -564,10 +570,10 @@@@ d45 1 a45 1 { "OSFILE_SIZEOF_FSBLKCNT_T", INT_TO_JSVAL(sizeof (fsblkcnt_t)) }, d50 2 a51 15 { "OSFILE_SIZEOF_POSIX_SPAWN_FILE_ACTIONS_T", INT_TO_JSVAL(sizeof (posix_spawn_file_actions_t)) }, -#endif // !defined(ANDROID) +#endif // !defined(ANDROID) && NetBSD 5.* // Defining |dirent|. // Size @@@@ -627,7 +633,7 @@@@ { "OSFILE_SIZEOF_STATVFS", INT_TO_JSVAL(sizeof (struct statvfs)) }, - { "OSFILE_OFFSETOF_STATVFS_F_BSIZE", INT_TO_JSVAL(offsetof (struct statvfs, f_bsize)) }, + { "OSFILE_OFFSETOF_STATVFS_F_FRSIZE", INT_TO_JSVAL(offsetof (struct statvfs, f_frsize)) }, { "OSFILE_OFFSETOF_STATVFS_F_BAVAIL", INT_TO_JSVAL(offsetof (struct statvfs, f_bavail)) }, #endif // defined(XP_UNIX) @ 1.5 log @Update to 30.0 * debug build is broken Changelog: New Sidebars button in browser chrome enables faster access to social, bookmark, & history sidebars New Mac OS X command-E sets find term to selected text New Support for GStreamer 1.0 Changed Disallow calling WebIDL constructors as functions on the web Developer With the exception of those bundled inside an extension or ones that are whitelisted, plugins will no longer be activated by default (see blog post) Developer Fixes to box-shadow and other visual overflow (see bug 480888) Developer Mute and volume available per window when using WebAudio Developer background-blend-mode enabled by default Developer Use of line-height allowed for Developer ES6 array and generator comprehensions implemented (read docs for more details) Developer Error stack now contains column number Developer Support for alpha option in canvas context options (feature description) Fixed Ignore autocomplete="off" when offering to save passwords via the password manager (see 956906) Fixed TypedArrays don't support new named properties (see 695438) Fixed Various security fixes Fixed in Firefox 30 MFSA 2014-54 Buffer overflow in Gamepad API MFSA 2014-53 Buffer overflow in Web Audio Speex resampler MFSA 2014-52 Use-after-free with SMIL Animation Controller MFSA 2014-51 Use-after-free in Event Listener Manager MFSA 2014-50 Clickjacking through cursor invisability after Flash interaction MFSA 2014-49 Use-after-free and out of bounds issues found using Address Sanitizer MFSA 2014-48 Miscellaneous memory safety hazards (rv:30.0 / rv:24.6) @ text @d1 1 a1 1 $NetBSD: patch-dom_system_OSFileConstants.cpp,v 1.4 2014/05/30 10:22:05 pho Exp $ d8 2 a9 2 --- dom/system/OSFileConstants.cpp.orig 2014-05-29 23:30:40.000000000 +0000 +++ dom/system/OSFileConstants.cpp d21 11 a31 1 @@@@ -26,9 +30,9 @@@@ d43 1 a43 1 @@@@ -533,10 +537,10 @@@@ static const dom::ConstantSpec gLibcProp d48 1 a48 1 +#if !defined(ANDROID) && (defined(__NetBSD_) && (__NetBSD_Version__ < 600000000)) d56 1 a56 1 @@@@ -596,7 +600,7 @@@@ static const dom::ConstantSpec gLibcProp @ 1.4 log @PR pkg/48840: Remove most patches that I have recently added The preprocessor macro XP_MACOSX is misused everywhere. They tend to say "#if defined(XP_MACOSX)" to actually mean "#if defined(MOZ_WIDGET_COCOA)". It's okay to equate XP_MACOSX with XP_DARWIN but equating it with MOZ_WIDGET_COCOA is just wrong. As a result, cairo-gtk2 build on Darwin is completely broken and needs heavy patching. Ideally they should be fixed individually but that will be an extremely hard work, so don't define XP_MACOSX for now. @ text @d1 1 a1 1 $NetBSD: patch-dom_system_OSFileConstants.cpp,v 1.2 2014/04/30 15:07:18 ryoon Exp $ d8 1 a8 1 --- dom/system/OSFileConstants.cpp.orig 2014-05-06 22:55:26.000000000 +0000 d10 1 a10 1 @@@@ -9,22 +9,26 @@@@ d21 1 a21 9 #include "sys/stat.h" -#if !defined(ANDROID) +#if !defined(ANDROID) && (defined(__NetBSD_) && (__NetBSD_Version__ < 600000000)) #include -#endif // !defined(ANDROID) +#endif // !defined(ANDROID) && NetBSD 5.* #endif // defined(XP_UNIX) #if defined(XP_LINUX) d33 3 a35 3 @@@@ -526,10 +530,10 @@@@ static const dom::ConstantSpec gLibcProp // The size of |time_t|. { "OSFILE_SIZEOF_TIME_T", INT_TO_JSVAL(sizeof (time_t)) }, d46 9 @ 1.3 log @PR pkg/48840: Don't assume cocoa toolkit just because OS_ARCH is Darwin @ text @d5 2 a6 1 * Don't assume cocoa toolkit just because OS_ARCH is Darwin. d10 1 a10 1 @@@@ -9,13 +9,17 @@@@ d30 2 a31 3 @@@@ -120,7 +124,7 @@@@ struct Paths { nsString winStartMenuProgsDir; #endif // defined(XP_WIN) d34 2 a35 8 +#if defined(MOZ_WIDGET_COCOA) /** * The user's Library directory. */ @@@@ -130,7 +134,7 @@@@ struct Paths { * system. */ nsString macLocalApplicationsDir; d37 1 a37 1 +#endif // defined(MOZ_WIDGET_COCOA) d39 2 a40 28 Paths() { @@@@ -147,10 +151,10 @@@@ struct Paths { winStartMenuProgsDir.SetIsVoid(true); #endif // defined(XP_WIN) -#if defined(XP_MACOSX) +#if defined(MOZ_WIDGET_COCOA) macUserLibDir.SetIsVoid(true); macLocalApplicationsDir.SetIsVoid(true); -#endif // defined(XP_MACOSX) +#endif // defined(MOZ_WIDGET_COCOA) } }; @@@@ -287,10 +291,10 @@@@ nsresult InitOSFileConstants() GetPathToSpecialDir(NS_WIN_PROGRAMS_DIR, paths->winStartMenuProgsDir); #endif // defined(XP_WIN) -#if defined(XP_MACOSX) +#if defined(MOZ_WIDGET_COCOA) GetPathToSpecialDir(NS_MAC_USER_LIB_DIR, paths->macUserLibDir); GetPathToSpecialDir(NS_OSX_LOCAL_APPLICATIONS_DIR, paths->macLocalApplicationsDir); -#endif // defined(XP_MACOSX) +#endif // defined(MOZ_WIDGET_COCOA) gPaths = paths.forget(); return NS_OK; a53 36 @@@@ -836,7 +840,7 @@@@ bool DefineOSFileConstants(JSContext *cx // Note that we don't actually provide the full path, only the name of the // library, which is sufficient to link to the library using js-ctypes. -#if defined(XP_MACOSX) +#if defined(MOZ_WIDGET_COCOA) // Under MacOS X, for some reason, libxul is called simply "XUL", // and we need to provide the full path. nsAutoString libxul; @@@@ -849,7 +853,7 @@@@ bool DefineOSFileConstants(JSContext *cx libxul.Append(NS_LITERAL_STRING(DLL_PREFIX)); libxul.Append(NS_LITERAL_STRING("xul")); libxul.Append(NS_LITERAL_STRING(DLL_SUFFIX)); -#endif // defined(XP_MACOSX) +#endif // defined(MOZ_WIDGET_COCOA) if (!SetStringProperty(cx, objPath, "libxul", libxul)) { return false; @@@@ -897,7 +901,7 @@@@ bool DefineOSFileConstants(JSContext *cx } #endif // defined(XP_WIN) -#if defined(XP_MACOSX) +#if defined(MOZ_WIDGET_COCOA) if (!SetStringProperty(cx, objPath, "macUserLibDir", gPaths->macUserLibDir)) { return false; } @@@@ -905,7 +909,7 @@@@ bool DefineOSFileConstants(JSContext *cx if (!SetStringProperty(cx, objPath, "macLocalApplicationsDir", gPaths->macLocalApplicationsDir)) { return false; } -#endif // defined(XP_MACOSX) +#endif // defined(MOZ_WIDGET_COCOA) // sqlite3 is linked from different places depending on the platform nsAutoString libsqlite3; @ 1.2 log @Update to 29.0 * Restore html5 audio playback under NetBSD Changelog: New Significant new customization mode makes it easy to personalize your Web experience to access the features you use the most (learn more) New A new, easy to access menu sits in the right hand corner of Firefox and includes popular browser controls New Sleek new tabs provide an overall smoother look and fade into the background when not active New An interactive onboarding tour to guide users through the new Firefox changes New The ability to set up Firefox Sync by creating a Firefox account (learn more) New Gamepad API finalized and enabled (learn more) New HTTPS used for Yahoo Searches performed in en-US locale New Malay [ma] locale added Changed Clicking on a W3C Web Notification will switch to the originating tab Developer 'box-sizing' (dropping the -moz- prefix) implemented (learn more) Developer Console object available in Web Workers (learn more) Developer Promises enabled by default (learn more) Developer SharedWorker enabled by default Developer implemented and enabled Developer implemented and enabled Developer Enabled ECMAScript Internationalization API Developer Add-on bar has been removed, content moved to navigation bar Developer Implemented URLSearchParams from the URL specification (see MDN for details ) Fixed Various security fixes Fixed in Firefox 29 MFSA 2014-47 Debugger can bypass XrayWrappers with JavaScript MFSA 2014-46 Use-after-free in nsHostResolve MFSA 2014-45 Incorrect IDNA domain name matching for wildcard certificates MFSA 2014-44 Use-after-free in imgLoader while resizing images MFSA 2014-43 Cross-site scripting (XSS) using history navigations MFSA 2014-42 Privilege escalation through Web Notification API MFSA 2014-41 Out-of-bounds write in Cairo MFSA 2014-40 Firefox for Android addressbar suppression MFSA 2014-39 Use-after-free in the Text Track Manager for HTML video MFSA 2014-38 Buffer overflow when using non-XBL object as XBL MFSA 2014-37 Out of bounds read while decoding JPG images MFSA 2014-36 Web Audio memory corruption issues MFSA 2014-35 Privilege escalation through Mozilla Maintenance Service Installer MFSA 2014-34 Miscellaneous memory safety hazards (rv:29.0 / rv:24.5) @ text @d1 1 a1 1 $NetBSD: patch-dom_system_OSFileConstants.cpp,v 1.1 2014/03/30 01:03:22 ryoon Exp $ d5 3 a7 1 --- dom/system/OSFileConstants.cpp.orig 2014-04-18 02:02:50.000000000 +0000 d29 44 d86 36 @ 1.1 log @Fix PR pkg/48682, fix build under NetBSD/i386 5.2. @ text @d1 1 a1 1 $NetBSD$ d5 1 a5 1 --- dom/system/OSFileConstants.cpp.orig 2014-03-15 05:19:14.000000000 +0000 d7 1 a7 1 @@@@ -9,11 +9,15 @@@@ d22 2 a23 1 #endif // !defined(ANDROID) d25 3 a27 1 @@@@ -508,7 +512,7 @@@@ static const dom::ConstantSpec gLibcProp d35 5 a39 1 #endif // !defined(ANDROID) @