forked from pool/nodejs-electron
- New upstream release 30.2.0 * Node 20.15.0 * Enabled the Windows Control Overlay API on Linux. * Expose systemPreferences to utilityProcess. * Fixed a focus issue when calling BrowserWindow.setTopBrowserView. * Fixed an issue where fetch-dependent interfaces could be missing in Web Workers with nodeIntegrationInWorker enabled. * Fixed an issue where control could fail to return properly after saving a dialog using showOpenDialogSync on Linux. * Fixes an issue where the user-specified default path did not work in some circumstances when using Linux dialogs. * Fixes potentially incorrect exit code in UtilityProcess. * (Leap 15.5) Fix heap buffer overflow in libaom (CVE-2024-5493 bsc#1225690) * Security fixes for V8: CVE-2024-6100, CVE-2024-6101 (bsc#1226504) * Fix use after free in Swiftshader (CVE-2024-6291 bsc#1226933) - Update to 30.1.2 XXXFIXMEXXX * ABI break: NODE_MODULE_VERSION is now 123 * Chromium 124.0.6367.243 * Node 20.14.0 * V8 12.4 * Added WebContentsView and BaseWindow, replacing the now-deprecated BrowserView APIs. * cross-origin iframes now use Permission Policy to access features * Removed: The --disable-color-correct-rendering switch * The inputFieldType property in the context-menu params has been removed * Removed: process.getIOCounters() * see https://www.electronjs.org/blog/electron-30-0 and https://github.com/electron/electron/releases/tag/v30.0.0 for more - Fedora: use bundled simdutf as the system version is too old - Drop no longer needed patches * chromium-122-avoid-SFINAE-TypeConverter.patch * chromium-122-BookmarkNode-missing-operator.patch * chromium-98-EnumTable-crash.patch * chromium-gcc11.patch * CVE-2024-30260-undici-clear-proxy-authorization.patch * CVE-2024-30261-undici-fetch-integrity.patch * ElectronDesktopWindowTreeHostLinux-OnWindowTiledStateChanged-crash.patch * grid_sizing_tree-Wchanges-meaning.patch * hit_test_request-missing-optional.patch * InternalAllocator-too-many-initializers.patch * material_color_utilities-tones-missing-round.patch * nested-nested-nested-nested-nested-nested-regex-patterns.patch * perfetto-numeric_storage-double_t.patch * plus_address_types-missing-optional.patch * race_network_request_write_buffer_manager-missing-optional.patch * resolution_monitor-missing-bitset.patch * script_promise_resolver-explicit-specialization.patch * search_engine_choice_service-missing-optional.patch * text_break_iterator-icu74-breakAllLineBreakClassTable-should-be-consistent.patch * v8-instance-type-inl-constexpr-used-before-its-definition.patch - Drop no longer needed -Wno-error=narrowing from CXXFLAGS - Add patches to fix build * chromium-124-shims.patch * enable_stack_trace_line_numbers-symbol_level.patch * angle-FramebufferVk-powf.patch * licenses.py-FileNotFoundError.patch * span_reader-missing-optional.patch * bitset-missing-uint8_t-memcpy.patch * temporal_scalability_id_extractor-missing-bitset.patch * gpu_adapter_info-missing-optional.patch * first_party_sets_handler_database_helper-missing-optional.patch * async_iterable-forwarding.patch * preview_cancel_reason-missing-string.patch * script_streamer-atomic-include.patch - Add -Wno-packed-not-aligned -Wno-address to CXXFLAGS to suppress build logspam - Add libaom_av1_encoder-aom37-AV1E_SET_MAX_CONSEC_FRAME_DROP_CBR.patch to build with old libaom - Add backported DesktopNativeWidgetAura-HandleActivationChanged-crash.patch - Revert upstream changes which introduce a use-after-free bug causing crashes (bsc#1224178 deb#1067886) * bad-font-gc0000.patch * bad-font-gc000.patch * bad-font-gc00.patch * bad-font-gc0.patch * bad-font-gc11.patch * bad-font-gc1.patch * bad-font-gc2.patch * bad-font-gc3.patch OBS-URL: https://build.opensuse.org/request/show/1187058 OBS-URL: https://build.opensuse.org/package/show/devel:languages:nodejs/nodejs-electron?expand=0&rev=159
344 lines
13 KiB
Diff
344 lines
13 KiB
Diff
SUSE: Disable the following:
|
|
* Optimizer flags. Anything other than straight -O2 isn't well tested (either more or less optimization)
|
|
* -flto still needs to be handled by gn as it needs to be disabled for some targets,
|
|
and global CFLAGS go at the end of the commandline
|
|
* Submodel options (-march and friends). Upstream notoriously forces SSE3 despite the code not requiring it.
|
|
* note that cpu options for ARM are currently left in, as they do not seem to do harm and V8 needs to know the exact target anyway
|
|
* libstdc++ assertions. Enabling them or not should in general be the distro's decision. Electron does not run untrusted code (unlike browsers) and as such does not really benefit from security paranoia.
|
|
* Debuginfo format. Upstream seems to force something that is not recognized by rpmbuild.
|
|
* per-target debuginfo level is left in as it is still useful (-g2 everywhere does not work)
|
|
* Emitting code for the PIC model. It is needed in case of shared libraries, but results in a larger executable (and Electron is already enormous)
|
|
It should be enabled individually on code that gets into separate libraries (and we know when to do it — otherwise we're getting linker error)
|
|
* -rdynamic. The rationale given is bogus (the allocator gets exported regardless). The main executable needs to be linked with -rdynamic anyway, but eg. chrome_crashpad_handler doesn't.
|
|
|
|
|
|
From 307a0f63dd9b118f4b8470ed3d7567e81fdb7a6d Mon Sep 17 00:00:00 2001
|
|
From: Mike Gilbert <floppym@gentoo.org>
|
|
Date: Fri, 22 Apr 2022 09:05:24 +0000
|
|
Subject: [PATCH] Disable various compiler configs
|
|
|
|
---
|
|
build/config/compiler/BUILD.gn | 114 +++++----------------------------
|
|
1 file changed, 17 insertions(+), 97 deletions(-)
|
|
|
|
diff --git a/build/config/compiler/BUILD.gn b/build/config/compiler/BUILD.gn
|
|
index d40843b..b92f03b 100644
|
|
--- a/build/config/compiler/BUILD.gn
|
|
+++ b/build/config/compiler/BUILD.gn
|
|
@@ -322,9 +322,7 @@ config("compiler") {
|
|
|
|
configs += [
|
|
# See the definitions below.
|
|
- ":clang_revision",
|
|
":rustc_revision",
|
|
- ":compiler_cpu_abi",
|
|
":compiler_codegen",
|
|
":compiler_deterministic",
|
|
]
|
|
@@ -353,7 +351,12 @@ config("compiler") {
|
|
if (!is_win) {
|
|
# Common POSIX compiler flags setup.
|
|
# --------------------------------
|
|
- cflags += [ "-fno-strict-aliasing" ] # See http://crbug.com/32204
|
|
+ # To future SUSE maintainers: Do not re-enable this, you will save yourself hours of debugging!
|
|
+ # This is an optimizer flag, not a C dialect flag to make GCC behave like clang.
|
|
+ # Despite what the -Wlto-type-mismatch warning text tells you, enabling this will NOT fix miscompiles,
|
|
+ # and seems to cause other problems in GCC12. See https://bugs.chromium.org/p/chromium/issues/detail?id=1373615#c6
|
|
+ # ANY BUGS DUE TO ALIASING SHOULD BE FIXED IN CODE, AND THE PATCHES SENT UPSTREAM!
|
|
+ # cflags += [ "-fno-strict-aliasing" ] # See http://crbug.com/32204
|
|
|
|
# Stack protection. ShadowCallStack and Stack protector address the same
|
|
# problems. Therefore, we only enable one or the other. Clang advertises SCS as
|
|
@@ -494,10 +497,6 @@ config("compiler") {
|
|
# Linux/Android/Fuchsia common flags setup.
|
|
# ---------------------------------
|
|
if (is_linux || is_chromeos || is_android || is_fuchsia) {
|
|
- asmflags += [ "-fPIC" ]
|
|
- cflags += [ "-fPIC" ]
|
|
- ldflags += [ "-fPIC" ]
|
|
- rustflags += [ "-Crelocation-model=pic" ]
|
|
|
|
if (!is_clang) {
|
|
# Use pipes for communicating between sub-processes. Faster.
|
|
@@ -590,55 +589,6 @@ config("compiler") {
|
|
ldflags += [ "-Wl,-z,keep-text-section-prefix" ]
|
|
}
|
|
|
|
- if (is_clang && !is_nacl && current_os != "zos") {
|
|
- cflags += [ "-fcrash-diagnostics-dir=" + clang_diagnostic_dir ]
|
|
- if (save_reproducers_on_lld_crash && use_lld) {
|
|
- ldflags += [
|
|
- "-fcrash-diagnostics=all",
|
|
- "-fcrash-diagnostics-dir=" + clang_diagnostic_dir,
|
|
- ]
|
|
- }
|
|
-
|
|
- # TODO(hans): Remove this once Clang generates better optimized debug info
|
|
- # by default. https://crbug.com/765793
|
|
- cflags += [
|
|
- "-mllvm",
|
|
- "-instcombine-lower-dbg-declare=0",
|
|
- ]
|
|
- if (!is_debug && use_thin_lto && is_a_target_toolchain) {
|
|
- if (is_win) {
|
|
- ldflags += [ "-mllvm:-instcombine-lower-dbg-declare=0" ]
|
|
- } else {
|
|
- ldflags += [ "-Wl,-mllvm,-instcombine-lower-dbg-declare=0" ]
|
|
- }
|
|
- }
|
|
-
|
|
- # TODO(crbug.com/1488374): This causes binary size growth and potentially
|
|
- # other problems.
|
|
- # TODO(crbug.com/1491036): This isn't supported by Cronet's mainline llvm version.
|
|
- if (default_toolchain != "//build/toolchain/cros:target" &&
|
|
- !llvm_android_mainline) {
|
|
- cflags += [
|
|
- "-mllvm",
|
|
- "-split-threshold-for-reg-with-hint=0",
|
|
- ]
|
|
- if (use_thin_lto && is_a_target_toolchain) {
|
|
- if (is_win) {
|
|
- ldflags += [ "-mllvm:-split-threshold-for-reg-with-hint=0" ]
|
|
- } else {
|
|
- ldflags += [ "-Wl,-mllvm,-split-threshold-for-reg-with-hint=0" ]
|
|
- }
|
|
- }
|
|
- }
|
|
-
|
|
- # TODO(crbug.com/1235145): Investigate why/if this should be needed.
|
|
- if (is_win) {
|
|
- cflags += [ "/clang:-ffp-contract=off" ]
|
|
- } else {
|
|
- cflags += [ "-ffp-contract=off" ]
|
|
- }
|
|
- }
|
|
-
|
|
# C11/C++11 compiler flags setup.
|
|
# ---------------------------
|
|
if (is_linux || is_chromeos || is_android || (is_nacl && is_clang) ||
|
|
@@ -1070,11 +1020,6 @@ config("compiler") {
|
|
defines += [ "_LIBCPP_HARDENING_MODE=_LIBCPP_HARDENING_MODE_NONE" ]
|
|
}
|
|
|
|
- # Enable libstdc++ hardening lightweight assertions. Those have a low
|
|
- # performance penalty but are considered a bare minimum for security.
|
|
- if (use_safe_libstdcxx) {
|
|
- defines += [ "_GLIBCXX_ASSERTIONS=1" ]
|
|
- }
|
|
}
|
|
|
|
# The BUILDCONFIG file sets this config on targets by default, which means when
|
|
@@ -1140,7 +1085,8 @@ config("thinlto_optimize_max") {
|
|
# without using everything that "compiler" brings in. Options that
|
|
# tweak code generation for a particular CPU do not belong here!
|
|
# See "compiler_codegen", below.
|
|
-config("compiler_cpu_abi") {
|
|
+config("compiler_cpu_abi") { }
|
|
+config("xcompiler_cpu_abi") {
|
|
cflags = []
|
|
ldflags = []
|
|
defines = []
|
|
@@ -1523,46 +1469,6 @@ config("compiler_deterministic") {
|
|
}
|
|
}
|
|
|
|
- # Makes builds independent of absolute file path.
|
|
- if (is_clang && strip_absolute_paths_from_debug_symbols) {
|
|
- # If debug option is given, clang includes $cwd in debug info by default.
|
|
- # For such build, this flag generates reproducible obj files even we use
|
|
- # different build directory like "out/feature_a" and "out/feature_b" if
|
|
- # we build same files with same compile flag.
|
|
- # Other paths are already given in relative, no need to normalize them.
|
|
- if (is_nacl) {
|
|
- # TODO(https://crbug.com/1231236): Use -ffile-compilation-dir= here.
|
|
- cflags += [
|
|
- "-Xclang",
|
|
- "-fdebug-compilation-dir",
|
|
- "-Xclang",
|
|
- ".",
|
|
- ]
|
|
- } else {
|
|
- # -ffile-compilation-dir is an alias for both -fdebug-compilation-dir=
|
|
- # and -fcoverage-compilation-dir=.
|
|
- cflags += [ "-ffile-compilation-dir=." ]
|
|
- swiftflags += [ "-file-compilation-dir=." ]
|
|
- }
|
|
- if (!is_win) {
|
|
- # We don't use clang -cc1as on Windows (yet? https://crbug.com/762167)
|
|
- asmflags = [ "-Wa,-fdebug-compilation-dir,." ]
|
|
- }
|
|
-
|
|
- if (is_win && use_lld) {
|
|
- if (symbol_level == 2 || (is_clang && using_sanitizer)) {
|
|
- # Absolutize source file paths for PDB. Pass the real build directory
|
|
- # if the pdb contains source-level debug information and if linker
|
|
- # reproducibility is not critical.
|
|
- ldflags += [ "/PDBSourcePath:" + rebase_path(root_build_dir) ]
|
|
- } else {
|
|
- # Use a fake fixed base directory for paths in the pdb to make the pdb
|
|
- # output fully deterministic and independent of the build directory.
|
|
- ldflags += [ "/PDBSourcePath:o:\fake\prefix" ]
|
|
- }
|
|
- }
|
|
- }
|
|
-
|
|
# Tells the compiler not to use absolute paths when passing the default
|
|
# paths to the tools it invokes. We don't want this because we don't
|
|
# really need it and it can mess up the goma cache entries.
|
|
@@ -1739,7 +1645,8 @@ config("treat_warnings_as_errors") {
|
|
# Collects all warning flags that are used by default. This is used as a
|
|
# subconfig of both chromium_code and no_chromium_code. This way these
|
|
# flags are guaranteed to appear on the compile command line after -Wall.
|
|
-config("default_warnings") {
|
|
+config("default_warnings") { }
|
|
+config("xdefault_warnings") {
|
|
cflags = []
|
|
cflags_c = []
|
|
cflags_cc = []
|
|
@@ -1983,11 +1890,7 @@ config("chromium_code") {
|
|
defines = [ "_HAS_NODISCARD" ]
|
|
}
|
|
} else {
|
|
- cflags = [ "-Wall" ]
|
|
- if (is_clang) {
|
|
- # Enable extra warnings for chromium_code when we control the compiler.
|
|
- cflags += [ "-Wextra" ]
|
|
- }
|
|
+ cflags = []
|
|
|
|
# In Chromium code, we define __STDC_foo_MACROS in order to get the
|
|
# C99 macros on Mac and Linux.
|
|
@@ -1996,24 +1899,6 @@ config("chromium_code") {
|
|
"__STDC_FORMAT_MACROS",
|
|
]
|
|
|
|
- if (!is_debug && !using_sanitizer && current_cpu != "s390x" &&
|
|
- current_cpu != "s390" && current_cpu != "ppc64" &&
|
|
- current_cpu != "mips" && current_cpu != "mips64" &&
|
|
- current_cpu != "riscv64" && current_cpu != "loong64") {
|
|
- # Non-chromium code is not guaranteed to compile cleanly with
|
|
- # _FORTIFY_SOURCE. Also, fortified build may fail when optimizations are
|
|
- # disabled, so only do that for Release build.
|
|
- fortify_level = "2"
|
|
-
|
|
- # ChromeOS's toolchain supports a high-quality _FORTIFY_SOURCE=3
|
|
- # implementation with a few custom glibc patches. Use that if it's
|
|
- # available.
|
|
- if (is_chromeos_device && !lacros_use_chromium_toolchain) {
|
|
- fortify_level = "3"
|
|
- }
|
|
- defines += [ "_FORTIFY_SOURCE=" + fortify_level ]
|
|
- }
|
|
-
|
|
if (is_apple) {
|
|
cflags_objc = [ "-Wimplicit-retain-self" ]
|
|
cflags_objcc = [ "-Wimplicit-retain-self" ]
|
|
@@ -2159,7 +2044,6 @@ config("no_rtti") {
|
|
config("export_dynamic") {
|
|
# TODO(crbug.com/1052397): Revisit after target_os flip is completed.
|
|
if (is_linux || is_chromeos_lacros || export_libcxxabi_from_executables) {
|
|
- ldflags = [ "-rdynamic" ]
|
|
}
|
|
}
|
|
|
|
@@ -2247,7 +2131,8 @@ config("wexit_time_destructors") {
|
|
# gcc 4.9 and earlier had no way of suppressing this warning without
|
|
# suppressing the rest of them. Here we centralize the identification of
|
|
# the gcc 4.9 toolchains.
|
|
-config("no_incompatible_pointer_warnings") {
|
|
+config("no_incompatible_pointer_warnings") { }
|
|
+config("xno_incompatible_pointer_warnings") {
|
|
cflags = []
|
|
if (is_clang) {
|
|
cflags += [ "-Wno-incompatible-pointer-types" ]
|
|
@@ -2362,7 +2247,8 @@ if (is_win) {
|
|
common_optimize_on_cflags += [ "-fno-math-errno" ]
|
|
}
|
|
|
|
-config("default_stack_frames") {
|
|
+config("default_stack_frames") { }
|
|
+config("xdefault_stack_frames") {
|
|
if (!is_win) {
|
|
if (enable_frame_pointers) {
|
|
cflags = [ "-fno-omit-frame-pointer" ]
|
|
@@ -2389,7 +2275,8 @@ config("default_stack_frames") {
|
|
}
|
|
|
|
# Default "optimization on" config.
|
|
-config("optimize") {
|
|
+config("optimize") { }
|
|
+config("xoptimize") {
|
|
if (is_win) {
|
|
cflags = [ "/O2" ] + common_optimize_on_cflags
|
|
|
|
@@ -2430,7 +2317,8 @@ config("optimize") {
|
|
}
|
|
|
|
# Turn off optimizations.
|
|
-config("no_optimize") {
|
|
+config("no_optimize") { }
|
|
+config("xno_optimize") {
|
|
if (is_win) {
|
|
cflags = [
|
|
"/Od", # Disable optimization.
|
|
@@ -2470,7 +2358,8 @@ config("no_optimize") {
|
|
# Turns up the optimization level. On Windows, this implies whole program
|
|
# optimization and link-time code generation which is very expensive and should
|
|
# be used sparingly.
|
|
-config("optimize_max") {
|
|
+config("optimize_max") { }
|
|
+config("xoptimize_max") {
|
|
if (is_nacl && is_nacl_irt) {
|
|
# The NaCl IRT is a special case and always wants its own config.
|
|
# Various components do:
|
|
@@ -2503,7 +2392,8 @@ config("optimize_max") {
|
|
#
|
|
# TODO(crbug.com/621335) - rework how all of these configs are related
|
|
# so that we don't need this disclaimer.
|
|
-config("optimize_speed") {
|
|
+config("optimize_speed") { }
|
|
+config("xoptimize_speed") {
|
|
if (is_nacl && is_nacl_irt) {
|
|
# The NaCl IRT is a special case and always wants its own config.
|
|
# Various components do:
|
|
@@ -2529,7 +2419,8 @@ config("optimize_speed") {
|
|
}
|
|
}
|
|
|
|
-config("optimize_fuzzing") {
|
|
+config("optimize_fuzzing") { }
|
|
+config("xoptimize_fuzzing") {
|
|
cflags = [ "-O1" ] + common_optimize_on_cflags
|
|
rustflags = [ "-Copt-level=1" ]
|
|
ldflags = common_optimize_on_ldflags
|
|
@@ -2662,7 +2553,8 @@ config("win_pdbaltpath") {
|
|
}
|
|
|
|
# Full symbols.
|
|
-config("symbols") {
|
|
+config("symbols") { cflags = ["-g2"] }
|
|
+config("xsymbols") {
|
|
rustflags = []
|
|
if (is_win) {
|
|
if (is_clang) {
|
|
@@ -2811,7 +2703,8 @@ config("symbols") {
|
|
# Minimal symbols.
|
|
# This config guarantees to hold symbol for stack trace which are shown to user
|
|
# when crash happens in unittests running on buildbot.
|
|
-config("minimal_symbols") {
|
|
+config("minimal_symbols") { cflags = ["-g1"] }
|
|
+config("xminimal_symbols") {
|
|
rustflags = []
|
|
if (is_win) {
|
|
# Functions, files, and line tables only.
|
|
@@ -2896,7 +2789,8 @@ config("minimal_symbols") {
|
|
# This configuration contains function names only. That is, the compiler is
|
|
# told to not generate debug information and the linker then just puts function
|
|
# names in the final debug information.
|
|
-config("no_symbols") {
|
|
+config("no_symbols") { cflags = ["-g0"]}
|
|
+config("xno_symbols") {
|
|
if (is_win) {
|
|
ldflags = [ "/DEBUG" ]
|
|
|