-
-
Notifications
You must be signed in to change notification settings - Fork 15.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
firefox 70 #71580
firefox 70 #71580
Conversation
The expand tests require unstable rust features.
Also bumps sqlite3_analyze as those have to be kept in sync
I am absolutely in favor of that. I'd like to see an approach where we supply an enterprise policy that disables it. |
Seems the other solutions documented here (probing for a canary domain, According to their docs, this could be accomplished by adding a The appropriate policy would be This also allows pointing to another DoH server, if sb. wanted to do that. If we do this, we probably want to point firefox to look for that in the wrapper, so policies can be redefined without having to recompile |
Changing to staging because its not uncommon to get regressions due to sqlite. |
For now, Firefox should only default to Cloudflare in "North America", besides displaying some opt-out dialogue, and the default resolver can prevent this anytime by blocking a canary domain. At least that's what I remember from discussions in relevant IETF places; I haven't investigated details of the defaults. I'm certainly not a fan of Mozilla choosing this weird combination of defaults, and we could disable that in nixpkgs somehow (perhaps later). But in any case, the "war" is primarily about the masses who have no idea about DNS, and I don't think in our case the default applies to that many people. |
Motivation for this change
Firefox 70 is about to be released / has been released.
This bump depends on a bump of nss, sqlite & rust-cbindgen.
I made a separate PR to drop the abuse of
RUSTC_BOOSTRAP=1
that has been merged into master already. Since this work depends on it I've included it here as well.cc @vcunat @FRidh because they usually handle the staging workflow.
I targeted
staging-next
on purpose since this is likely to have a few Firefox security fixes (again). The reasoning for staging should be obvious. We have a pretty large rebuild due tosqlite
andnss
being touched.I did build firefox on this branch and it looked fine for a while. I've not yet done intensive tests of the other things that will be rebuild in this branch. Usually the impact isn't that bad.
Things done
sandbox
innix.conf
on non-NixOS)nix-shell -p nix-review --run "nix-review wip"
./result/bin/
)nix path-info -S
before and after)