summaryrefslogtreecommitdiffstats
path: root/testing/source/mozilla-firefox/gkrust.a.no.networking.check.diff
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2022-12-16 04:46:51 +0000
committer Eric Hameleers <alien@slackware.com>2022-12-16 06:38:01 +0100
commit7852409378db9d911b949481c914726d20a97408 (patch)
tree8ae38346ec10f5a9a082dc13140dda93d05cdcc4 /testing/source/mozilla-firefox/gkrust.a.no.networking.check.diff
parentfc0ff5a5d7c45f929eb214b3147aa538e736e2aa (diff)
downloadcurrent-7852409378db9d911b949481c914726d20a97408.tar.gz
current-7852409378db9d911b949481c914726d20a97408.tar.xz
Fri Dec 16 04:46:51 UTC 202220221216044651
d/help2man-1.49.3-x86_64-1.txz: Upgraded. l/pipewire-0.3.63-x86_64-1.txz: Upgraded. x/libX11-1.8.3-x86_64-1.txz: Upgraded. x/mesa-22.3.1-x86_64-1.txz: Upgraded. xap/mozilla-firefox-108.0-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. Thanks to marav for the build help. For more information, see: https://www.mozilla.org/en-US/firefox/108.0/releasenotes/ https://www.mozilla.org/en-US/security/advisories/mfsa2022-51/ https://www.cve.org/CVERecord?id=CVE-2022-46871 https://www.cve.org/CVERecord?id=CVE-2022-46872 https://www.cve.org/CVERecord?id=CVE-2022-46873 https://www.cve.org/CVERecord?id=CVE-2022-46874 https://www.cve.org/CVERecord?id=CVE-2022-46875 https://www.cve.org/CVERecord?id=CVE-2022-46877 https://www.cve.org/CVERecord?id=CVE-2022-46878 https://www.cve.org/CVERecord?id=CVE-2022-46879 (* Security fix *)
Diffstat (limited to 'testing/source/mozilla-firefox/gkrust.a.no.networking.check.diff')
-rw-r--r--testing/source/mozilla-firefox/gkrust.a.no.networking.check.diff31
1 files changed, 0 insertions, 31 deletions
diff --git a/testing/source/mozilla-firefox/gkrust.a.no.networking.check.diff b/testing/source/mozilla-firefox/gkrust.a.no.networking.check.diff
deleted file mode 100644
index 115ba0e7a..000000000
--- a/testing/source/mozilla-firefox/gkrust.a.no.networking.check.diff
+++ /dev/null
@@ -1,31 +0,0 @@
---- ./config/makefiles/rust.mk.orig 2021-03-15 12:42:08.219987929 -0500
-+++ ./config/makefiles/rust.mk 2021-03-15 12:43:15.996984180 -0500
-@@ -332,17 +332,17 @@
- # the chance of proxy bypasses originating from rust code.
- # The check only works when rust code is built with -Clto but without MOZ_LTO_RUST_CROSS.
- # Sanitizers and sancov also fail because compiler-rt hooks network functions.
--ifndef MOZ_PROFILE_GENERATE
--ifeq ($(OS_ARCH), Linux)
--ifeq (,$(rustflags_sancov)$(MOZ_ASAN)$(MOZ_TSAN)$(MOZ_UBSAN))
--ifndef MOZ_LTO_RUST_CROSS
--ifneq (,$(filter -Clto,$(cargo_rustc_flags)))
-- $(call py_action,check_binary,--target --networking $@)
--endif
--endif
--endif
--endif
--endif
-+#ifndef MOZ_PROFILE_GENERATE
-+#ifeq ($(OS_ARCH), Linux)
-+#ifeq (,$(rustflags_sancov)$(MOZ_ASAN)$(MOZ_TSAN)$(MOZ_UBSAN))
-+#ifndef MOZ_LTO_RUST_CROSS
-+#ifneq (,$(filter -Clto,$(cargo_rustc_flags)))
-+# $(call py_action,check_binary,--target --networking $@)
-+#endif
-+#endif
-+#endif
-+#endif
-+#endif
-
- force-cargo-library-check:
- $(call CARGO_CHECK) --lib $(cargo_target_flag) $(rust_features_flag)