nokogiri 1.10.7-x86-mingw32 → 1.10.8-x86-mingw32
Sign up to get free protection for your applications and to get access to all the features.
Potentially problematic release.
This version of nokogiri might be problematic. Click here for more details.
- checksums.yaml +4 -4
- data/lib/nokogiri/2.3/nokogiri.so +0 -0
- data/lib/nokogiri/2.4/nokogiri.so +0 -0
- data/lib/nokogiri/2.5/nokogiri.so +0 -0
- data/lib/nokogiri/2.6/nokogiri.so +0 -0
- data/lib/nokogiri/version.rb +1 -1
- metadata +6 -9
- data/patches/libxml2/0001-Revert-Do-not-URI-escape-in-server-side-includes.patch +0 -78
- data/patches/libxml2/0002-Remove-script-macro-support.patch +0 -40
- data/patches/libxml2/0003-Update-entities-to-remove-handling-of-ssi.patch +0 -44
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 927596a4479504c91f69f29ac2a7221f292b3392de54d6c5391c03c32b7dda2e
|
4
|
+
data.tar.gz: d14c2cb0bafe0256e3ce0ed2d7db08bdb547ee97abee801658c15009d7ba1993
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 0b1e8e9118937dd2d9c1f9f74cfe02cef50ee34d96079d0bc82c76db7568882203868e225dffa2ecd6bd262d7e6ccc2a76c08be58b04e25785fb3012da36bdcc
|
7
|
+
data.tar.gz: 0b32797df0bbcaa9b327c649d60f477a7595d93e77e24289349430ce91d6c1fe69f772a921b77bf82c426f46edfa40476117c93b6ce306f310a4bae8c180bfbd
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
data/lib/nokogiri/version.rb
CHANGED
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: nokogiri
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.10.
|
4
|
+
version: 1.10.8
|
5
5
|
platform: x86-mingw32
|
6
6
|
authors:
|
7
7
|
- Aaron Patterson
|
@@ -14,7 +14,7 @@ authors:
|
|
14
14
|
autorequire:
|
15
15
|
bindir: bin
|
16
16
|
cert_chain: []
|
17
|
-
date:
|
17
|
+
date: 2020-02-10 00:00:00.000000000 Z
|
18
18
|
dependencies:
|
19
19
|
- !ruby/object:Gem::Dependency
|
20
20
|
name: mini_portile2
|
@@ -148,14 +148,14 @@ dependencies:
|
|
148
148
|
requirements:
|
149
149
|
- - "~>"
|
150
150
|
- !ruby/object:Gem::Version
|
151
|
-
version: 1.0
|
151
|
+
version: 1.1.0
|
152
152
|
type: :development
|
153
153
|
prerelease: false
|
154
154
|
version_requirements: !ruby/object:Gem::Requirement
|
155
155
|
requirements:
|
156
156
|
- - "~>"
|
157
157
|
- !ruby/object:Gem::Version
|
158
|
-
version: 1.0
|
158
|
+
version: 1.1.0
|
159
159
|
- !ruby/object:Gem::Dependency
|
160
160
|
name: rake-compiler-dock
|
161
161
|
requirement: !ruby/object:Gem::Requirement
|
@@ -238,14 +238,14 @@ dependencies:
|
|
238
238
|
requirements:
|
239
239
|
- - "~>"
|
240
240
|
- !ruby/object:Gem::Version
|
241
|
-
version: '3.
|
241
|
+
version: '3.22'
|
242
242
|
type: :development
|
243
243
|
prerelease: false
|
244
244
|
version_requirements: !ruby/object:Gem::Requirement
|
245
245
|
requirements:
|
246
246
|
- - "~>"
|
247
247
|
- !ruby/object:Gem::Version
|
248
|
-
version: '3.
|
248
|
+
version: '3.22'
|
249
249
|
description: |-
|
250
250
|
Nokogiri (鋸) is an HTML, XML, SAX, and Reader parser. Among
|
251
251
|
Nokogiri's many features is the ability to search documents via XPath
|
@@ -442,9 +442,6 @@ files:
|
|
442
442
|
- lib/nokogiri/xslt.rb
|
443
443
|
- lib/nokogiri/xslt/stylesheet.rb
|
444
444
|
- lib/xsd/xmlparser/nokogiri.rb
|
445
|
-
- patches/libxml2/0001-Revert-Do-not-URI-escape-in-server-side-includes.patch
|
446
|
-
- patches/libxml2/0002-Remove-script-macro-support.patch
|
447
|
-
- patches/libxml2/0003-Update-entities-to-remove-handling-of-ssi.patch
|
448
445
|
homepage: https://nokogiri.org
|
449
446
|
licenses:
|
450
447
|
- MIT
|
@@ -1,78 +0,0 @@
|
|
1
|
-
From c5538465c08a8ea248a370bf55bc39cd3385e4af Mon Sep 17 00:00:00 2001
|
2
|
-
From: Mike Dalessio <mike.dalessio@gmail.com>
|
3
|
-
Date: Thu, 29 Mar 2018 14:09:00 -0400
|
4
|
-
Subject: [PATCH] Revert "Do not URI escape in server side includes"
|
5
|
-
|
6
|
-
This reverts commit 960f0e275616cadc29671a218d7fb9b69eb35588.
|
7
|
-
---
|
8
|
-
HTMLtree.c | 49 +++++++++++--------------------------------------
|
9
|
-
1 file changed, 11 insertions(+), 38 deletions(-)
|
10
|
-
|
11
|
-
diff --git a/HTMLtree.c b/HTMLtree.c
|
12
|
-
index 2fd0c9c..67160c5 100644
|
13
|
-
--- a/HTMLtree.c
|
14
|
-
+++ b/HTMLtree.c
|
15
|
-
@@ -717,49 +717,22 @@ htmlAttrDumpOutput(xmlOutputBufferPtr buf, xmlDocPtr doc, xmlAttrPtr cur,
|
16
|
-
(!xmlStrcasecmp(cur->name, BAD_CAST "src")) ||
|
17
|
-
((!xmlStrcasecmp(cur->name, BAD_CAST "name")) &&
|
18
|
-
(!xmlStrcasecmp(cur->parent->name, BAD_CAST "a"))))) {
|
19
|
-
+ xmlChar *escaped;
|
20
|
-
xmlChar *tmp = value;
|
21
|
-
- /* xmlURIEscapeStr() escapes '"' so it can be safely used. */
|
22
|
-
- xmlBufCCat(buf->buffer, "\"");
|
23
|
-
|
24
|
-
while (IS_BLANK_CH(*tmp)) tmp++;
|
25
|
-
|
26
|
-
- /* URI Escape everything, except server side includes. */
|
27
|
-
- for ( ; ; ) {
|
28
|
-
- xmlChar *escaped;
|
29
|
-
- xmlChar endChar;
|
30
|
-
- xmlChar *end = NULL;
|
31
|
-
- xmlChar *start = (xmlChar *)xmlStrstr(tmp, BAD_CAST "<!--");
|
32
|
-
- if (start != NULL) {
|
33
|
-
- end = (xmlChar *)xmlStrstr(tmp, BAD_CAST "-->");
|
34
|
-
- if (end != NULL) {
|
35
|
-
- *start = '\0';
|
36
|
-
- }
|
37
|
-
- }
|
38
|
-
-
|
39
|
-
- /* Escape the whole string, or until start (set to '\0'). */
|
40
|
-
- escaped = xmlURIEscapeStr(tmp, BAD_CAST"@/:=?;#%&,+");
|
41
|
-
- if (escaped != NULL) {
|
42
|
-
- xmlBufCat(buf->buffer, escaped);
|
43
|
-
- xmlFree(escaped);
|
44
|
-
- } else {
|
45
|
-
- xmlBufCat(buf->buffer, tmp);
|
46
|
-
- }
|
47
|
-
-
|
48
|
-
- if (end == NULL) { /* Everything has been written. */
|
49
|
-
- break;
|
50
|
-
- }
|
51
|
-
-
|
52
|
-
- /* Do not escape anything within server side includes. */
|
53
|
-
- *start = '<'; /* Restore the first character of "<!--". */
|
54
|
-
- end += 3; /* strlen("-->") */
|
55
|
-
- endChar = *end;
|
56
|
-
- *end = '\0';
|
57
|
-
- xmlBufCat(buf->buffer, start);
|
58
|
-
- *end = endChar;
|
59
|
-
- tmp = end;
|
60
|
-
+ /*
|
61
|
-
+ * the < and > have already been escaped at the entity level
|
62
|
-
+ * And doing so here breaks server side includes
|
63
|
-
+ */
|
64
|
-
+ escaped = xmlURIEscapeStr(tmp, BAD_CAST"@/:=?;#%&,+<>");
|
65
|
-
+ if (escaped != NULL) {
|
66
|
-
+ xmlBufWriteQuotedString(buf->buffer, escaped);
|
67
|
-
+ xmlFree(escaped);
|
68
|
-
+ } else {
|
69
|
-
+ xmlBufWriteQuotedString(buf->buffer, value);
|
70
|
-
}
|
71
|
-
-
|
72
|
-
- xmlBufCCat(buf->buffer, "\"");
|
73
|
-
} else {
|
74
|
-
xmlBufWriteQuotedString(buf->buffer, value);
|
75
|
-
}
|
76
|
-
--
|
77
|
-
2.9.5
|
78
|
-
|
@@ -1,40 +0,0 @@
|
|
1
|
-
From 27e4aa8d885e47a296ea78d114dbbe8fc7aa3508 Mon Sep 17 00:00:00 2001
|
2
|
-
From: Kevin Solorio <soloriok@gmail.com>
|
3
|
-
Date: Fri, 1 Feb 2019 14:32:42 -0800
|
4
|
-
Subject: [PATCH] Revert-support-html-h-b-7-1
|
5
|
-
|
6
|
-
---
|
7
|
-
entities.c | 17 -----------------
|
8
|
-
1 file changed, 17 deletions(-)
|
9
|
-
|
10
|
-
diff --git a/entities.c b/entities.c
|
11
|
-
index 43549bc5..82652f6d 100644
|
12
|
-
--- a/entities.c
|
13
|
-
+++ b/entities.c
|
14
|
-
@@ -623,23 +623,6 @@ xmlEncodeEntitiesInternal(xmlDocPtr doc, const xmlChar *input, int attr) {
|
15
|
-
*out++ = 't';
|
16
|
-
*out++ = ';';
|
17
|
-
} else if (*cur == '&') {
|
18
|
-
- /*
|
19
|
-
- * Special handling of &{...} construct from HTML 4, see
|
20
|
-
- * http://www.w3.org/TR/html401/appendix/notes.html#h-B.7.1
|
21
|
-
- */
|
22
|
-
- if (html && attr && (cur[1] == '{') &&
|
23
|
-
- (strchr((const char *) cur, '}'))) {
|
24
|
-
- while (*cur != '}') {
|
25
|
-
- *out++ = *cur++;
|
26
|
-
- indx = out - buffer;
|
27
|
-
- if (indx + 100 > buffer_size) {
|
28
|
-
- growBufferReentrant();
|
29
|
-
- out = &buffer[indx];
|
30
|
-
- }
|
31
|
-
- }
|
32
|
-
- *out++ = *cur++;
|
33
|
-
- continue;
|
34
|
-
- }
|
35
|
-
*out++ = '&';
|
36
|
-
*out++ = 'a';
|
37
|
-
*out++ = 'm';
|
38
|
-
--
|
39
|
-
2.16.2
|
40
|
-
|
@@ -1,44 +0,0 @@
|
|
1
|
-
From ffc08467744bd2305d41ca882c37fa30adf3a067 Mon Sep 17 00:00:00 2001
|
2
|
-
From: Kevin Solorio <soloriok@gmail.com>
|
3
|
-
Date: Wed, 27 Feb 2019 14:34:17 -0800
|
4
|
-
Subject: [PATCH 2/2] update entities.c to remove handling of ssi
|
5
|
-
|
6
|
-
---
|
7
|
-
entities.c | 21 ---------------------
|
8
|
-
1 file changed, 21 deletions(-)
|
9
|
-
|
10
|
-
diff --git a/entities.c b/entities.c
|
11
|
-
index 43549bc5..5c4a2a60 100644
|
12
|
-
--- a/entities.c
|
13
|
-
+++ b/entities.c
|
14
|
-
@@ -592,27 +592,6 @@ xmlEncodeEntitiesInternal(xmlDocPtr doc, const xmlChar *input, int attr) {
|
15
|
-
* By default one have to encode at least '<', '>', '"' and '&' !
|
16
|
-
*/
|
17
|
-
if (*cur == '<') {
|
18
|
-
- const xmlChar *end;
|
19
|
-
-
|
20
|
-
- /*
|
21
|
-
- * Special handling of server side include in HTML attributes
|
22
|
-
- */
|
23
|
-
- if (html && attr &&
|
24
|
-
- (cur[1] == '!') && (cur[2] == '-') && (cur[3] == '-') &&
|
25
|
-
- ((end = xmlStrstr(cur, BAD_CAST "-->")) != NULL)) {
|
26
|
-
- while (cur != end) {
|
27
|
-
- *out++ = *cur++;
|
28
|
-
- indx = out - buffer;
|
29
|
-
- if (indx + 100 > buffer_size) {
|
30
|
-
- growBufferReentrant();
|
31
|
-
- out = &buffer[indx];
|
32
|
-
- }
|
33
|
-
- }
|
34
|
-
- *out++ = *cur++;
|
35
|
-
- *out++ = *cur++;
|
36
|
-
- *out++ = *cur++;
|
37
|
-
- continue;
|
38
|
-
- }
|
39
|
-
*out++ = '&';
|
40
|
-
*out++ = 'l';
|
41
|
-
*out++ = 't';
|
42
|
-
--
|
43
|
-
2.16.2
|
44
|
-
|