2005-11-29 Diffie <diffie@blazebox.homeip.net>

	Released version 1.5-i686-1

	* build: updated to final 1.5 release, yay!
	  http://www.mozilla.com/firefox/releases/1.5.html

	* firefox-1.5-gtk.patch: applied to fix bug #305970.

	* firefox-nopangoxft.patch: applied patch from Gentoo's CVS.

	* firefox-cairo-canvas.patch: applied SVG patch from Gentoo's CVS.

	* build: reworked script to accomodate 1.5 release

	* mozconfig-fx: removed negotiateauth from --enable-extensions
	  it causes compile error. Added enable-svg & enable-canvas switches
	  to $SRC_ROOT/$NAME/mozconfig-fx file.
	  
2005-10-19 Diffie <diffie@blazebox.homeip.net>

	Released revision 1.0.7-i686-3
	  
	* firefox-various-gtk.patch: 4 gtk patches http://live.gnome.org/Epiphany_2fMozillaPatches

2005-10-01 Scott Harmon

	Released version 1.0.7-i686-310

	* build: Rebuilt with proper C(XX)FLAGS
	* script: Modified script to blank out CFLAGS and CXXFLAGS that may be in the environment

2005-09-22 Diffie <diffie@blazebox.homeip.net>

	Released version 1.0.7-i686-2

	* firefox-disable-popups.patch: created a patch to add these two values by default:
	1) privacy.popups.disable_from_plugins=2
	2) browser.tabs.showSingleWindowModePrefs=true
	Big thanks goes to Len (ljacob) for suggestion and request to add these in.
	For more info see this bug: https://bugzilla.mozilla.org/show_bug.cgi?id=281472
	
2005-09-21 Scott Harmon

	Released version 1.0.7-i686-1101

	* build: built for Slackware 10.1 and GNOME 2.10.2

	* firefox-disable-popups.patch: Added to disable plugins from spawning popups.

2005-09-21 Diffie <diffie@blazebox.homeip.net>

	Released version 1.0.7-i686-1

	* firefox-idn-fix.patch: dropped, since this release includes the fix for more info and other 
	  changes visit http://www.mozilla.org/products/firefox/releases/1.0.7.html

	* build: updated the mozconfig-fx file with removal of the ac_add_options --with-user-appdir=.firefox
	  line which i think caused the recent plugins snafu. Also removed extra --enable-optimize option.

	* build: Added PKG_PATCH to few source files to get them included in the package.

2005-09-11 Dagmar d'Surreal <rivyqntzne@tznvy.pbz>

	(built on behalf of zborgered for Diffie)

	Released version 1.0.6-i686-3

	* desc: Fixed up the typographical errors in the description file,
	included an explanation mentioning that the package is necessary for
	GAIM and Evo.

	* README.Dropline: Renamed from just 'README' and a hook added to the
	functions script to allow this to get copied in from the build def
	directory without some weird patching from now on.  Other packages
	may need similar documentation shipped in with them.

	* build: Eliminated obsolete includescript() call.

2005-09-10 Diffie <diffie@blazebox.homeip.net

	Released version 1.0.6-i686-2
	
	* build: updated the mozconfig-fx file
	
	* firefox-idn-fix.patch: fix latest IDN hack
	  http://secunia.com/advisories/16764/

2005-07-19 Diffie <diffie@blazebox.homeip.net>

	Released version 1.0.6-i686-1dl

	* Updated Mozilla Firefox to 1.0.6 release which restores compatibility for extensions
	  and web applications that did not work in Mozilla Firefox 1.0.5.
	  http://www.mozilla.org/products/firefox/releases/1.0.6.html

2005-07-13 Diffie <diffie@blazebox.homeip.net>

	Released version 1.0.5-i686-1dl

	* Updated to 1.0.5 release with several security fixes,
	  http://www.mozilla.org/projects/security/known-vulnerabilities.html#Firefox

2005-05-11 Diffie <diffie@blazebox.homeip.net>
	
	Released version 1.0.4-i686-1

	* Updated to 1.0.4 release with several security fixes,
	  http://www.mozilla.org/projects/security/known-vulnerabilities.html

	* Fix to DHTML errors encountered at some web sites.
	  For web developers, learn more at
	  http://developer-test.mozilla.org/docs/Working_around_the_Firefox_1.0.3_DHTML_regression

	* firefox-dropline-pref.patch: added browser identify
	  string (Dropline GNOME), see online poll at
	  http://www.dropline.net/forums/viewtopic.php?t=4229


2005-04-16 Diffie <diffie@blazebox.homeip.net>

	Released version 1.0.3-i686-1
	
	* firefox-*.patch: updated patches to apply cleanly
	
	* reworked build script to simplify build flags,
	  default png icon is now copied under /usr/share/pixmaps.
	  
	* Dropped firefox-1.0.2-patch179347.diff provided by Dagmar, 
	  this release fixes the js vulnerability amongst others.
	  
	* mozilla-firefox.desktop: Fixed startup notification when loading
	  multiple firefox instances, updated other aspects of the file as well.
	  
	* donist.sh: Added new functions to detect Java plugin on users machine
	  and install it to appropriate dir. Thanks go to Dagmar again for
	  providing the function to doinst.sh file ;-).
	   
2005-04-08 Diffie <diffie@blazebox.homeip.net>

	Version mozilla-firefox-1.0.2-i686-3dl

	* firefox-dropline-homepage.patch: Created a patch to make 
	  /usr/share/dropline/home/index.html default startup homepage, 
	  pointing to all things DLG related.
	  
	* build: Added spewdo to few lines, just to make it nicer :-)
	
	* Thanks to Dagmar for script and Paul Best for
	  making the DLG startup page and theme ;-)

2005-04-07 Dagmar d'Surreal <rivyqntzne@tznvy.pbz>

	Released revision 1.0.2-i686-2.

	* build: Added -Wl,--as-needed to the LDFLAGS in order to make this
	binary less "link-happy".  Made some minor changes to accommodate the
	other little changes below.

	* firefox-1.0.2-unversioneddirectoryhack.diff: Created a patch to put
	Firefox into just plain /usr/lib/firefox instead of /usr/lib/firefox-
	$VERSION, which breaks stuff whenever we upgrade the thing.

	* doinst.sh: Modified to accommodate new paths.

	* mozconfig-fx: Added --enable-elf-dynstr-gc, --enable-cpp-rtti, and
	--enable-reorder to try and squeeze every last drop of fluff out that
	we possibly can.

	* firefox-1.0.2-patch179347.diff: Created a patch to function as the
	https://bugzilla.mozilla.org/attachment.cgi?id=179347 patch for bug
	288688 (https://bugzilla.mozilla.org/show_bug.cgi?id=288688) as
	reported by Secunia Labs this week.  It is recommended that users
	upgrade to this interim version until the Firefox devs release 1.0.3.
	See http://secunia.com/advisories/14820/ for more details about the
	vulnerability and proof that this build is apparently not vulnerable
	to that particular exploit now.
