nokogiri 1.6.6.4-java → 1.6.7-java

Sign up to get free protection for your applications and to get access to all the features.

Potentially problematic release.


This version of nokogiri might be problematic. Click here for more details.

Files changed (54) hide show
  1. checksums.yaml +4 -4
  2. data/.cross_rubies +7 -5
  3. data/.travis.yml +33 -30
  4. data/CHANGELOG.ja.rdoc +38 -6
  5. data/CHANGELOG.rdoc +33 -1
  6. data/Gemfile +3 -2
  7. data/LICENSE.txt +31 -0
  8. data/Manifest.txt +4 -24
  9. data/README.md +170 -0
  10. data/Rakefile +25 -22
  11. data/appveyor.yml +22 -0
  12. data/build_all +6 -90
  13. data/ext/java/nokogiri/XmlDocument.java +5 -0
  14. data/ext/java/nokogiri/XmlNode.java +16 -1
  15. data/ext/java/nokogiri/XmlSaxPushParser.java +6 -2
  16. data/ext/java/nokogiri/XmlSchema.java +20 -20
  17. data/ext/java/nokogiri/internals/NokogiriHandler.java +21 -15
  18. data/ext/java/nokogiri/internals/ParserContext.java +15 -11
  19. data/ext/nokogiri/extconf.rb +37 -34
  20. data/ext/nokogiri/xml_node.c +21 -11
  21. data/ext/nokogiri/xml_sax_parser_context.c +2 -2
  22. data/lib/nokogiri/nokogiri.jar +0 -0
  23. data/lib/nokogiri/version.rb +1 -1
  24. data/lib/nokogiri/xml/node.rb +16 -0
  25. data/{ports/patches → patches}/sort-patches-by-date +0 -0
  26. data/test/html/test_document.rb +26 -3
  27. data/test/xml/sax/test_parser.rb +11 -0
  28. data/test/xml/test_document.rb +11 -0
  29. data/test/xml/test_schema.rb +15 -2
  30. data/test/xml/test_xpath.rb +15 -0
  31. metadata +28 -33
  32. data/README.ja.rdoc +0 -112
  33. data/README.rdoc +0 -177
  34. data/ports/patches/libxml2/0001-Revert-Missing-initialization-for-the-catalog-module.patch +0 -29
  35. data/ports/patches/libxml2/0002-Fix-missing-entities-after-CVE-2014-3660-fix.patch +0 -31
  36. data/ports/patches/libxml2/0003-Stop-parsing-on-entities-boundaries-errors.patch +0 -32
  37. data/ports/patches/libxml2/0004-Cleanup-conditional-section-error-handling.patch +0 -49
  38. data/ports/patches/libxml2/0005-CVE-2015-1819-Enforce-the-reader-to-run-in-constant-.patch +0 -177
  39. data/ports/patches/libxml2/0006-Another-variation-of-overflow-in-Conditional-section.patch +0 -32
  40. data/ports/patches/libxml2/0007-Fix-an-error-in-previous-Conditional-section-patch.patch +0 -28
  41. data/ports/patches/libxml2/0008-CVE-2015-8035-Fix-XZ-compression-support-loop.patch +0 -31
  42. data/ports/patches/libxslt/0001-Adding-doc-update-related-to-1.1.28.patch +0 -222
  43. data/ports/patches/libxslt/0002-Fix-a-couple-of-places-where-f-printf-parameters-wer.patch +0 -53
  44. data/ports/patches/libxslt/0003-Initialize-pseudo-random-number-generator-with-curre.patch +0 -60
  45. data/ports/patches/libxslt/0004-EXSLT-function-str-replace-is-broken-as-is.patch +0 -42
  46. data/ports/patches/libxslt/0006-Fix-str-padding-to-work-with-UTF-8-strings.patch +0 -164
  47. data/ports/patches/libxslt/0007-Separate-function-for-predicate-matching-in-patterns.patch +0 -587
  48. data/ports/patches/libxslt/0008-Fix-direct-pattern-matching.patch +0 -80
  49. data/ports/patches/libxslt/0009-Fix-certain-patterns-with-predicates.patch +0 -185
  50. data/ports/patches/libxslt/0010-Fix-handling-of-UTF-8-strings-in-EXSLT-crypto-module.patch +0 -126
  51. data/ports/patches/libxslt/0013-Memory-leak-in-xsltCompileIdKeyPattern-error-path.patch +0 -25
  52. data/ports/patches/libxslt/0014-Fix-for-bug-436589.patch +0 -43
  53. data/ports/patches/libxslt/0015-Fix-mkdir-for-mingw.patch +0 -41
  54. data/ports/patches/libxslt/0016-Fix-for-type-confusion-in-preprocessing-attributes.patch +0 -29
@@ -1,29 +0,0 @@
1
- From f65128f38289d77ff322d63aef2858cc0a819c34 Mon Sep 17 00:00:00 2001
2
- From: Daniel Veillard <veillard@redhat.com>
3
- Date: Fri, 17 Oct 2014 17:13:41 +0800
4
- Subject: [PATCH] Revert "Missing initialization for the catalog module"
5
-
6
- This reverts commit 054c716ea1bf001544127a4ab4f4346d1b9947e7.
7
- As this break xmlcatalog command
8
- https://bugzilla.redhat.com/show_bug.cgi?id=1153753
9
- ---
10
- parser.c | 3 ---
11
- 1 file changed, 3 deletions(-)
12
-
13
- diff --git a/parser.c b/parser.c
14
- index 1d93967..67c9dfd 100644
15
- --- a/parser.c
16
- +++ b/parser.c
17
- @@ -14830,9 +14830,6 @@ xmlInitParser(void) {
18
- #ifdef LIBXML_XPATH_ENABLED
19
- xmlXPathInit();
20
- #endif
21
- -#ifdef LIBXML_CATALOG_ENABLED
22
- - xmlInitializeCatalog();
23
- -#endif
24
- xmlParserInitialized = 1;
25
- #ifdef LIBXML_THREAD_ENABLED
26
- }
27
- --
28
- 2.1.2
29
-
@@ -1,31 +0,0 @@
1
- From 72a46a519ce7326d9a00f0b6a7f2a8e958cd1675 Mon Sep 17 00:00:00 2001
2
- From: Daniel Veillard <veillard@redhat.com>
3
- Date: Thu, 23 Oct 2014 11:35:36 +0800
4
- Subject: [PATCH] Fix missing entities after CVE-2014-3660 fix
5
-
6
- For https://bugzilla.gnome.org/show_bug.cgi?id=738805
7
-
8
- The fix for CVE-2014-3660 introduced a regression in some case
9
- where entity substitution is required and the entity is used
10
- first in anotther entity referenced from an attribute value
11
- ---
12
- parser.c | 3 ++-
13
- 1 file changed, 2 insertions(+), 1 deletion(-)
14
-
15
- diff --git a/parser.c b/parser.c
16
- index 67c9dfd..a8d1b67 100644
17
- --- a/parser.c
18
- +++ b/parser.c
19
- @@ -7235,7 +7235,8 @@ xmlParseReference(xmlParserCtxtPtr ctxt) {
20
- * far more secure as the parser will only process data coming from
21
- * the document entity by default.
22
- */
23
- - if ((ent->checked == 0) &&
24
- + if (((ent->checked == 0) ||
25
- + ((ent->children == NULL) && (ctxt->options & XML_PARSE_NOENT))) &&
26
- ((ent->etype != XML_EXTERNAL_GENERAL_PARSED_ENTITY) ||
27
- (ctxt->options & (XML_PARSE_NOENT | XML_PARSE_DTDVALID)))) {
28
- unsigned long oldnbent = ctxt->nbentities;
29
- --
30
- 2.1.2
31
-
@@ -1,32 +0,0 @@
1
- From 99d99063ae5c4b6bd2b58324273401f3ce42a550 Mon Sep 17 00:00:00 2001
2
- From: Daniel Veillard <veillard@redhat.com>
3
- Date: Mon, 23 Feb 2015 11:17:35 +0800
4
- Subject: [PATCH 3/8] Stop parsing on entities boundaries errors
5
-
6
- For https://bugzilla.gnome.org/show_bug.cgi?id=744980
7
-
8
- There are times, like on unterminated entities that it's preferable to
9
- stop parsing, even if that means less error reporting. Entities are
10
- feeding the parser on further processing, and if they are ill defined
11
- then it's possible to get the parser to bug. Also do the same on
12
- Conditional Sections if the input is broken, as the structure of
13
- the document can't be guessed.
14
- ---
15
- parser.c | 1 +
16
- 1 file changed, 1 insertion(+)
17
-
18
- diff --git a/parser.c b/parser.c
19
- index 1d93967..7b0380c 100644
20
- --- a/parser.c
21
- +++ b/parser.c
22
- @@ -5658,6 +5658,7 @@ xmlParseEntityDecl(xmlParserCtxtPtr ctxt) {
23
- if (RAW != '>') {
24
- xmlFatalErrMsgStr(ctxt, XML_ERR_ENTITY_NOT_FINISHED,
25
- "xmlParseEntityDecl: entity %s not terminated\n", name);
26
- + xmlStopParser(ctxt);
27
- } else {
28
- if (input != ctxt->input) {
29
- xmlFatalErrMsg(ctxt, XML_ERR_ENTITY_BOUNDARY,
30
- --
31
- 2.5.0
32
-
@@ -1,49 +0,0 @@
1
- From c8d3950c5532c2e3d954bacdb8c479bb9fdacf89 Mon Sep 17 00:00:00 2001
2
- From: Daniel Veillard <veillard@redhat.com>
3
- Date: Mon, 23 Feb 2015 11:29:20 +0800
4
- Subject: [PATCH 4/8] Cleanup conditional section error handling
5
-
6
- For https://bugzilla.gnome.org/show_bug.cgi?id=744980
7
-
8
- The error handling of Conditional Section also need to be
9
- straightened as the structure of the document can't be
10
- guessed on a failure there and it's better to stop parsing
11
- as further errors are likely to be irrelevant.
12
- ---
13
- parser.c | 6 ++++++
14
- 1 file changed, 6 insertions(+)
15
-
16
- diff --git a/parser.c b/parser.c
17
- index 7b0380c..1e714e7 100644
18
- --- a/parser.c
19
- +++ b/parser.c
20
- @@ -6770,6 +6770,8 @@ xmlParseConditionalSections(xmlParserCtxtPtr ctxt) {
21
- SKIP_BLANKS;
22
- if (RAW != '[') {
23
- xmlFatalErr(ctxt, XML_ERR_CONDSEC_INVALID, NULL);
24
- + xmlStopParser(ctxt);
25
- + return;
26
- } else {
27
- if (ctxt->input->id != id) {
28
- xmlValidityError(ctxt, XML_ERR_ENTITY_BOUNDARY,
29
- @@ -6830,6 +6832,8 @@ xmlParseConditionalSections(xmlParserCtxtPtr ctxt) {
30
- SKIP_BLANKS;
31
- if (RAW != '[') {
32
- xmlFatalErr(ctxt, XML_ERR_CONDSEC_INVALID, NULL);
33
- + xmlStopParser(ctxt);
34
- + return;
35
- } else {
36
- if (ctxt->input->id != id) {
37
- xmlValidityError(ctxt, XML_ERR_ENTITY_BOUNDARY,
38
- @@ -6885,6 +6889,8 @@ xmlParseConditionalSections(xmlParserCtxtPtr ctxt) {
39
-
40
- } else {
41
- xmlFatalErr(ctxt, XML_ERR_CONDSEC_INVALID_KEYWORD, NULL);
42
- + xmlStopParser(ctxt);
43
- + return;
44
- }
45
-
46
- if (RAW == 0)
47
- --
48
- 2.5.0
49
-
@@ -1,177 +0,0 @@
1
- From 12f31177b0d9be57ed8fb3467b501606fb145286 Mon Sep 17 00:00:00 2001
2
- From: Daniel Veillard <veillard@redhat.com>
3
- Date: Tue, 14 Apr 2015 17:41:48 +0800
4
- Subject: [PATCH 5/8] CVE-2015-1819 Enforce the reader to run in constant
5
- memory
6
-
7
- One of the operation on the reader could resolve entities
8
- leading to the classic expansion issue. Make sure the
9
- buffer used for xmlreader operation is bounded.
10
- Introduce a new allocation type for the buffers for this effect.
11
- ---
12
- buf.c | 43 ++++++++++++++++++++++++++++++++++++++++++-
13
- include/libxml/tree.h | 3 ++-
14
- xmlreader.c | 20 +++++++++++++++++++-
15
- 3 files changed, 63 insertions(+), 3 deletions(-)
16
-
17
- diff --git a/buf.c b/buf.c
18
- index 6efc7b6..07922ff 100644
19
- --- a/buf.c
20
- +++ b/buf.c
21
- @@ -27,6 +27,7 @@
22
- #include <libxml/tree.h>
23
- #include <libxml/globals.h>
24
- #include <libxml/tree.h>
25
- +#include <libxml/parserInternals.h> /* for XML_MAX_TEXT_LENGTH */
26
- #include "buf.h"
27
-
28
- #define WITH_BUFFER_COMPAT
29
- @@ -299,7 +300,8 @@ xmlBufSetAllocationScheme(xmlBufPtr buf,
30
- if ((scheme == XML_BUFFER_ALLOC_DOUBLEIT) ||
31
- (scheme == XML_BUFFER_ALLOC_EXACT) ||
32
- (scheme == XML_BUFFER_ALLOC_HYBRID) ||
33
- - (scheme == XML_BUFFER_ALLOC_IMMUTABLE)) {
34
- + (scheme == XML_BUFFER_ALLOC_IMMUTABLE) ||
35
- + (scheme == XML_BUFFER_ALLOC_BOUNDED)) {
36
- buf->alloc = scheme;
37
- if (buf->buffer)
38
- buf->buffer->alloc = scheme;
39
- @@ -458,6 +460,18 @@ xmlBufGrowInternal(xmlBufPtr buf, size_t len) {
40
- size = buf->use + len + 100;
41
- #endif
42
-
43
- + if (buf->alloc == XML_BUFFER_ALLOC_BOUNDED) {
44
- + /*
45
- + * Used to provide parsing limits
46
- + */
47
- + if ((buf->use + len >= XML_MAX_TEXT_LENGTH) ||
48
- + (buf->size >= XML_MAX_TEXT_LENGTH)) {
49
- + xmlBufMemoryError(buf, "buffer error: text too long\n");
50
- + return(0);
51
- + }
52
- + if (size >= XML_MAX_TEXT_LENGTH)
53
- + size = XML_MAX_TEXT_LENGTH;
54
- + }
55
- if ((buf->alloc == XML_BUFFER_ALLOC_IO) && (buf->contentIO != NULL)) {
56
- size_t start_buf = buf->content - buf->contentIO;
57
-
58
- @@ -739,6 +753,15 @@ xmlBufResize(xmlBufPtr buf, size_t size)
59
- CHECK_COMPAT(buf)
60
-
61
- if (buf->alloc == XML_BUFFER_ALLOC_IMMUTABLE) return(0);
62
- + if (buf->alloc == XML_BUFFER_ALLOC_BOUNDED) {
63
- + /*
64
- + * Used to provide parsing limits
65
- + */
66
- + if (size >= XML_MAX_TEXT_LENGTH) {
67
- + xmlBufMemoryError(buf, "buffer error: text too long\n");
68
- + return(0);
69
- + }
70
- + }
71
-
72
- /* Don't resize if we don't have to */
73
- if (size < buf->size)
74
- @@ -867,6 +890,15 @@ xmlBufAdd(xmlBufPtr buf, const xmlChar *str, int len) {
75
-
76
- needSize = buf->use + len + 2;
77
- if (needSize > buf->size){
78
- + if (buf->alloc == XML_BUFFER_ALLOC_BOUNDED) {
79
- + /*
80
- + * Used to provide parsing limits
81
- + */
82
- + if (needSize >= XML_MAX_TEXT_LENGTH) {
83
- + xmlBufMemoryError(buf, "buffer error: text too long\n");
84
- + return(-1);
85
- + }
86
- + }
87
- if (!xmlBufResize(buf, needSize)){
88
- xmlBufMemoryError(buf, "growing buffer");
89
- return XML_ERR_NO_MEMORY;
90
- @@ -938,6 +970,15 @@ xmlBufAddHead(xmlBufPtr buf, const xmlChar *str, int len) {
91
- }
92
- needSize = buf->use + len + 2;
93
- if (needSize > buf->size){
94
- + if (buf->alloc == XML_BUFFER_ALLOC_BOUNDED) {
95
- + /*
96
- + * Used to provide parsing limits
97
- + */
98
- + if (needSize >= XML_MAX_TEXT_LENGTH) {
99
- + xmlBufMemoryError(buf, "buffer error: text too long\n");
100
- + return(-1);
101
- + }
102
- + }
103
- if (!xmlBufResize(buf, needSize)){
104
- xmlBufMemoryError(buf, "growing buffer");
105
- return XML_ERR_NO_MEMORY;
106
- diff --git a/include/libxml/tree.h b/include/libxml/tree.h
107
- index 2f90717..4a9b3bc 100644
108
- --- a/include/libxml/tree.h
109
- +++ b/include/libxml/tree.h
110
- @@ -76,7 +76,8 @@ typedef enum {
111
- XML_BUFFER_ALLOC_EXACT, /* grow only to the minimal size */
112
- XML_BUFFER_ALLOC_IMMUTABLE, /* immutable buffer */
113
- XML_BUFFER_ALLOC_IO, /* special allocation scheme used for I/O */
114
- - XML_BUFFER_ALLOC_HYBRID /* exact up to a threshold, and doubleit thereafter */
115
- + XML_BUFFER_ALLOC_HYBRID, /* exact up to a threshold, and doubleit thereafter */
116
- + XML_BUFFER_ALLOC_BOUNDED /* limit the upper size of the buffer */
117
- } xmlBufferAllocationScheme;
118
-
119
- /**
120
- diff --git a/xmlreader.c b/xmlreader.c
121
- index f19e123..471e7e2 100644
122
- --- a/xmlreader.c
123
- +++ b/xmlreader.c
124
- @@ -2091,6 +2091,9 @@ xmlNewTextReader(xmlParserInputBufferPtr input, const char *URI) {
125
- "xmlNewTextReader : malloc failed\n");
126
- return(NULL);
127
- }
128
- + /* no operation on a reader should require a huge buffer */
129
- + xmlBufSetAllocationScheme(ret->buffer,
130
- + XML_BUFFER_ALLOC_BOUNDED);
131
- ret->sax = (xmlSAXHandler *) xmlMalloc(sizeof(xmlSAXHandler));
132
- if (ret->sax == NULL) {
133
- xmlBufFree(ret->buffer);
134
- @@ -3616,6 +3619,7 @@ xmlTextReaderConstValue(xmlTextReaderPtr reader) {
135
- return(((xmlNsPtr) node)->href);
136
- case XML_ATTRIBUTE_NODE:{
137
- xmlAttrPtr attr = (xmlAttrPtr) node;
138
- + const xmlChar *ret;
139
-
140
- if ((attr->children != NULL) &&
141
- (attr->children->type == XML_TEXT_NODE) &&
142
- @@ -3629,10 +3633,21 @@ xmlTextReaderConstValue(xmlTextReaderPtr reader) {
143
- "xmlTextReaderSetup : malloc failed\n");
144
- return (NULL);
145
- }
146
- + xmlBufSetAllocationScheme(reader->buffer,
147
- + XML_BUFFER_ALLOC_BOUNDED);
148
- } else
149
- xmlBufEmpty(reader->buffer);
150
- xmlBufGetNodeContent(reader->buffer, node);
151
- - return(xmlBufContent(reader->buffer));
152
- + ret = xmlBufContent(reader->buffer);
153
- + if (ret == NULL) {
154
- + /* error on the buffer best to reallocate */
155
- + xmlBufFree(reader->buffer);
156
- + reader->buffer = xmlBufCreateSize(100);
157
- + xmlBufSetAllocationScheme(reader->buffer,
158
- + XML_BUFFER_ALLOC_BOUNDED);
159
- + ret = BAD_CAST "";
160
- + }
161
- + return(ret);
162
- }
163
- break;
164
- }
165
- @@ -5131,6 +5146,9 @@ xmlTextReaderSetup(xmlTextReaderPtr reader,
166
- "xmlTextReaderSetup : malloc failed\n");
167
- return (-1);
168
- }
169
- + /* no operation on a reader should require a huge buffer */
170
- + xmlBufSetAllocationScheme(reader->buffer,
171
- + XML_BUFFER_ALLOC_BOUNDED);
172
- if (reader->sax == NULL)
173
- reader->sax = (xmlSAXHandler *) xmlMalloc(sizeof(xmlSAXHandler));
174
- if (reader->sax == NULL) {
175
- --
176
- 2.5.0
177
-
@@ -1,32 +0,0 @@
1
- From 9ee30e69f63379b3caf451aa7ae4058a1fa2fa73 Mon Sep 17 00:00:00 2001
2
- From: Daniel Veillard <veillard@redhat.com>
3
- Date: Fri, 23 Oct 2015 19:02:28 +0800
4
- Subject: [PATCH 6/8] Another variation of overflow in Conditional sections
5
-
6
- Which happen after the previous fix to
7
- https://bugzilla.gnome.org/show_bug.cgi?id=756456
8
-
9
- But stopping the parser and exiting we didn't pop the intermediary entities
10
- and doing the SKIP there applies on an input which may be too small
11
- ---
12
- parser.c | 4 +++-
13
- 1 file changed, 3 insertions(+), 1 deletion(-)
14
-
15
- diff --git a/parser.c b/parser.c
16
- index 1e714e7..0b8d633 100644
17
- --- a/parser.c
18
- +++ b/parser.c
19
- @@ -6904,7 +6904,9 @@ xmlParseConditionalSections(xmlParserCtxtPtr ctxt) {
20
- "All markup of the conditional section is not in the same entity\n",
21
- NULL, NULL);
22
- }
23
- - SKIP(3);
24
- + if ((ctxt-> instate != XML_PARSER_EOF) &&
25
- + ((ctxt->input->cur + 3) < ctxt->input->end))
26
- + SKIP(3);
27
- }
28
- }
29
-
30
- --
31
- 2.5.0
32
-
@@ -1,28 +0,0 @@
1
- From 587f0e0133f51f3e09d1166cc0f6b24b50ddb357 Mon Sep 17 00:00:00 2001
2
- From: Daniel Veillard <veillard@redhat.com>
3
- Date: Tue, 27 Oct 2015 10:53:44 +0800
4
- Subject: [PATCH 7/8] Fix an error in previous Conditional section patch
5
-
6
- an off by one mistake in the change, led to error on correct
7
- document where the end of the included entity was exactly
8
- the end of the conditional section, leading to regtest failure
9
- ---
10
- parser.c | 2 +-
11
- 1 file changed, 1 insertion(+), 1 deletion(-)
12
-
13
- diff --git a/parser.c b/parser.c
14
- index 0b8d633..0650d2a 100644
15
- --- a/parser.c
16
- +++ b/parser.c
17
- @@ -6905,7 +6905,7 @@ xmlParseConditionalSections(xmlParserCtxtPtr ctxt) {
18
- NULL, NULL);
19
- }
20
- if ((ctxt-> instate != XML_PARSER_EOF) &&
21
- - ((ctxt->input->cur + 3) < ctxt->input->end))
22
- + ((ctxt->input->cur + 3) <= ctxt->input->end))
23
- SKIP(3);
24
- }
25
- }
26
- --
27
- 2.5.0
28
-
@@ -1,31 +0,0 @@
1
- From 8f905eeb2aa553ee50194ed38db7186653ec6e1c Mon Sep 17 00:00:00 2001
2
- From: Daniel Veillard <veillard@redhat.com>
3
- Date: Tue, 3 Nov 2015 15:31:25 +0800
4
- Subject: [PATCH 8/8] CVE-2015-8035 Fix XZ compression support loop
5
-
6
- For https://bugzilla.gnome.org/show_bug.cgi?id=757466
7
- DoS when parsing specially crafted XML document if XZ support
8
- is compiled in (which wasn't the case for 2.9.2 and master since
9
- Nov 2013, fixed in next commit !)
10
- ---
11
- xzlib.c | 4 ++++
12
- 1 file changed, 4 insertions(+)
13
-
14
- diff --git a/xzlib.c b/xzlib.c
15
- index 0dcb9f4..1fab546 100644
16
- --- a/xzlib.c
17
- +++ b/xzlib.c
18
- @@ -581,6 +581,10 @@ xz_decomp(xz_statep state)
19
- xz_error(state, LZMA_DATA_ERROR, "compressed data error");
20
- return -1;
21
- }
22
- + if (ret == LZMA_PROG_ERROR) {
23
- + xz_error(state, LZMA_PROG_ERROR, "compression error");
24
- + return -1;
25
- + }
26
- } while (strm->avail_out && ret != LZMA_STREAM_END);
27
-
28
- /* update available output and crc check value */
29
- --
30
- 2.5.0
31
-
@@ -1,222 +0,0 @@
1
- From eb193589a1ff12b4ef23027d5cfed5609f8c0d11 Mon Sep 17 00:00:00 2001
2
- From: Daniel Veillard <veillard@redhat.com>
3
- Date: Wed, 21 Nov 2012 15:36:11 +0800
4
- Subject: [PATCH 01/14] Adding doc update related to 1.1.28
5
-
6
- ---
7
- NEWS | 23 +++++++++++++++
8
- doc/libxslt.xsa | 87 ++++++++++++++++++++++++++++++++++++++++++++++++++++-----
9
- doc/news.html | 25 ++++++++++++++++-
10
- doc/xslt.html | 25 +++++++++++++++++
11
- 4 files changed, 152 insertions(+), 8 deletions(-)
12
-
13
- diff --git a/NEWS b/NEWS
14
- index cbc1c5e..ff65b6a 100644
15
- --- a/NEWS
16
- +++ b/NEWS
17
- @@ -8,6 +8,29 @@ See the git page at
18
- http://git.gnome.org/browse/libxslt/
19
-
20
- to get a description of the recent commits.Those are the public releases made:
21
- +1.1.28: Nov 21 2012:
22
- + - Portability:
23
- + Fix python build by using libxsltmod_la_CPPFLAGS instead of AM_CPPFLAGS (Alexandre Rostovtsev),
24
- + configure should be more careful with linker script (Igor Pashev),
25
- + add gcrypt library in LIBADD, not LDFLAGS, as recommended (Roumen Petrov)
26
- +
27
- + - Bug fixes:
28
- + Fix generate-id() to avoid generating the same ID (Stewart Brodie),
29
- + Fix crash with empty xsl:key/@match attribute (Nick Wellnhofer),
30
- + Crash when passing an uninitialized variable to document() (Nick Wellnhofer),
31
- + Add missing test docs to EXTRA_DIST (Nick Wellnhofer),
32
- + Fix regression: Default namespace not correctly used (Nick Wellnhofer)
33
- +
34
- + - Cleanups:
35
- + Remove xsltTransStorageAdd and xsltTransStorageRemove from symbols.xml (Daniel Veillard),
36
- + autogen.sh cleanup (Daniel Richard),
37
- + consistent use of xslt processor (Roumen Petrov),
38
- + Add object files in tests/plugins to .gitignore (Nick Wellnhofer),
39
- + Fix error on bug-165 regression test (Daniel Veillard),
40
- + Remove xsltTransStorageAdd and xsltTransStorageRemove (Daniel Veillard),
41
- +
42
- +
43
- +
44
- 1.1.27: Sep 12 2012:
45
- - Portability:
46
- xincludestyle wasn't protected with LIBXML_XINCLUDE_ENABLED (Michael Bonfils),
47
- diff --git a/doc/libxslt.xsa b/doc/libxslt.xsa
48
- index ad3aaf2..04d8c0d 100644
49
- --- a/doc/libxslt.xsa
50
- +++ b/doc/libxslt.xsa
51
- @@ -8,16 +8,89 @@
52
- </vendor>
53
- <product id="libxslt">
54
- <name>libxslt</name>
55
- - <version>1.1.26</version>
56
- - <last-release> Sep 24 2009</last-release>
57
- + <version>1.1.27</version>
58
- + <last-release> Sep 12 2012</last-release>
59
- <info-url>http://xmlsoft.org/XSLT/</info-url>
60
- - <changes> - Improvement:
61
- - Add xsltProcessOneNode to exported symbols for lxml (Daniel Veillard)
62
- + <changes> - Portability:
63
- + xincludestyle wasn't protected with LIBXML_XINCLUDE_ENABLED (Michael Bonfils),
64
- + Portability fix for testThreads.c (IlyaS),
65
- + FreeBSD portability fixes (Pedro F. Giffuni),
66
- + check for gmtime - on mingw* hosts will enable date-time function (Roumen Petrov),
67
- + use only native crypto-API for mingw* hosts (Roumen Petrov),
68
- + autogen: Only check for libtoolize (Colin Walters),
69
- + minimal mingw support (Roumen Petrov),
70
- + configure: acconfig.h is deprecated since autoconf-2.50 (Stefan Kost),
71
- + Fix a small out of tree compilation issue (Hao Hu),
72
- + Fix python generator to not use deprecated xmllib (Daniel Veillard),
73
- + link python module with python library (Frederic Crozat)
74
- +
75
- + - Documentation:
76
- + Tiny doc improvement (Daniel Veillard),
77
- + Various documentation fixes for docs on internals (C. M. Sperberg-McQueen)
78
-
79
- - Bug fixes:
80
- - Fix an idness generation problem (Daniel Veillard),
81
- - 595612 Try to fix some locking problems (Daniel Veillard),
82
- - Fix a crash on misformed imported stylesheets (Daniel Veillard)
83
- + Report errors on variable use in key (Daniel Veillard),
84
- + The XSLT namespace string is a constant one (Daniel Veillard),
85
- + Fix handling of names in xsl:attribute (Nick Wellnhofer),
86
- + Reserved namespaces in xsl:element and xsl:attribute (Nick Wellnhofer),
87
- + Null-terminate result string of cry:rc4_decrypt (Nick Wellnhofer),
88
- + EXSLT date normalization fix (James Muscat),
89
- + Exit after compilation of invalid func:result (Nick Wellnhofer),
90
- + Fix for EXSLT func:function (Nick Wellnhofer),
91
- + Rewrite EXSLT string:replace to be conformant (Nick Wellnhofer),
92
- + Avoid a heap use after free error (Chris Evans),
93
- + Fix a dictionary string usage (Chris Evans),
94
- + Output should not include extraneous newlines when indent is off (Laurence Rowe),
95
- + document('') fails to return stylesheets parsed from memory (Jason Viers),
96
- + xsltproc should return an error code if xinclude fails (Malcolm Purvis),
97
- + Forwards-compatible processing of unknown top level elements (Nick Wellnhofer),
98
- + Fix system-property with unknown namespace (Nick Wellnhofer),
99
- + Hardening of code checking node types in EXSLT (Daniel Veillard),
100
- + Hardening of code checking node types in various entry point (Daniel Veillard),
101
- + Cleanup of the pattern compilation code (Daniel Veillard),
102
- + Fix default template processing on namespace nodes (Daniel Veillard),
103
- + Fix a bug in selecting XSLT elements (Daniel Veillard),
104
- + Fixed bug #616839 (Daniel Mustieles),
105
- + Fix some case of pattern parsing errors (Abhishek Arya),
106
- + preproc: fix the build (Stefan Kost),
107
- + Fix a memory leak with xsl:number (Daniel Veillard),
108
- + Fix a problem with ESXLT date:add() with January (money_seshu Dronamraju),
109
- + Fix a memory leak if compiled with Windows locale support (Daniel Veillard),
110
- + Fix generate-id() to not expose object addresses (Daniel Veillard),
111
- + Fix curlies support in literals for non-compiled AVTs (Nick Wellnhofer),
112
- + Allow whitespace in xsl:variable with select (Nick Wellnhofer),
113
- + Small fixes to locale code (Nick Wellnhofer),
114
- + Fix bug 602515 (Nick Wellnhofer),
115
- + Fix popping of vars in xsltCompilerNodePop (Nick Wellnhofer),
116
- + Fix direct pattern matching bug (Nick Wellnhofer)
117
- +
118
- + - Improvements:
119
- + Add the saxon:systemId extension (Mike Hommey),
120
- + Add an append mode to document output (Daniel Veillard),
121
- + Add new tests to EXTRA_DIST (Nick Wellnhofer),
122
- + Test for bug #680920 (Nick Wellnhofer),
123
- + fix regresson in Various "make distcheck" and other fixes (Roumen Petrov),
124
- + Various "make distcheck" and other fixes (Daniel Richard G),
125
- + Fix portability to upcoming libxml2-2.9.0 (Daniel Veillard),
126
- + Adding --system flag support to autogen.sh (Daniel Veillard),
127
- + Allow per-context override of xsltMaxDepth, introduce xsltMaxVars (Jérôme Carretero),
128
- + autogen.sh: Honor NOCONFIGURE environment variable (Colin Walters),
129
- + configure: support silent automake rules if possible (Stefan Kost),
130
- + Precompile patterns in xsl:number (Nick Wellnhofer),
131
- + Fix some warnings in the refactored code (Nick Wellnhofer),
132
- + Adding new generated files (Daniel Veillard),
133
- + profiling: add callgraph report (Stefan Kost)
134
- +
135
- + - Cleanups:
136
- + Big space and tabs cleanup (Daniel Veillard),
137
- + Fix authors list (Daniel Veillard),
138
- + Cleanups some of the test makefiles (Daniel Richard),
139
- + Remove .cvsignore files which are not needed anymore (Daniel Veillard),
140
- + Cleanup some misplaced spaces and tabs (Daniel Veillard),
141
- + Augment list of ignored files (Daniel Veillard),
142
- + configure: remove checks for isinf and isnan as those are not used anyway (Stefan Kost),
143
- + Point to GIT for source code and a bit of cleanup (Daniel Veillard),
144
- + Get rid of specific build setup and STATIC_BINARIES (Daniel Veillard)
145
-
146
-
147
- </changes>
148
- diff --git a/doc/news.html b/doc/news.html
149
- index 15ae10d..60d242e 100644
150
- --- a/doc/news.html
151
- +++ b/doc/news.html
152
- @@ -9,7 +9,30 @@ H3 {font-family: Verdana,Arial,Helvetica}
153
- A:link, A:visited, A:active { text-decoration: underline }
154
- </style><title>News</title></head><body bgcolor="#8b7765" text="#000000" link="#a06060" vlink="#000000"><table border="0" width="100%" cellpadding="5" cellspacing="0" align="center"><tr><td width="120"><a href="http://swpat.ffii.org/"><img src="epatents.png" alt="Action against software patents" /></a></td><td width="180"><a href="http://www.gnome.org/"><img src="gnome2.png" alt="GNOME2 Logo" /></a><a href="http://www.w3.org/Status"><img src="w3c.png" alt="W3C logo" /></a><a href="http://www.redhat.com"><img src="redhat.gif" alt="Red Hat Logo" /></a><div align="left"><a href="http://xmlsoft.org/XSLT/"><img src="Libxslt-Logo-180x168.gif" alt="Made with Libxslt Logo" /></a></div></td><td><table border="0" width="90%" cellpadding="2" cellspacing="0" align="center" bgcolor="#000000"><tr><td><table width="100%" border="0" cellspacing="1" cellpadding="3" bgcolor="#fffacd"><tr><td align="center"><h1>The XSLT C library for GNOME</h1><h2>News</h2></td></tr></table></td></tr></table></td></tr></table><table border="0" cellpadding="4" cellspacing="0" width="100%" align="center"><tr><td bgcolor="#8b7765"><table border="0" cellspacing="0" cellpadding="2" width="100%"><tr><td valign="top" width="200" bgcolor="#8b7765"><table border="0" cellspacing="0" cellpadding="1" width="100%" bgcolor="#000000"><tr><td><table width="100%" border="0" cellspacing="1" cellpadding="3"><tr><td colspan="1" bgcolor="#eecfa1" align="center"><center><b>Main Menu</b></center></td></tr><tr><td bgcolor="#fffacd"><form action="search.php" enctype="application/x-www-form-urlencoded" method="get"><input name="query" type="text" size="20" value="" /><input name="submit" type="submit" value="Search ..." /></form><ul><li><a href="index.html">Home</a></li><li><a href="intro.html">Introduction</a></li><li><a href="docs.html">Documentation</a></li><li><a href="bugs.html">Reporting bugs and getting help</a></li><li><a href="help.html">How to help</a></li><li><a href="downloads.html">Downloads</a></li><li><a href="FAQ.html">FAQ</a></li><li><a href="news.html">News</a></li><li><a href="xsltproc2.html">The xsltproc tool</a></li><li><a href="docbook.html">DocBook</a></li><li><a href="API.html">The programming API</a></li><li><a href="python.html">Python and bindings</a></li><li><a href="internals.html">Library internals</a></li><li><a href="extensions.html">Writing extensions</a></li><li><a href="contribs.html">Contributions</a></li><li><a href="EXSLT/index.html" style="font-weight:bold">libexslt</a></li><li><a href="xslt.html">flat page</a>, <a href="site.xsl">stylesheet</a></li><li><a href="html/index.html" style="font-weight:bold">API Menu</a></li><li><a href="ChangeLog.html">ChangeLog</a></li></ul></td></tr></table><table width="100%" border="0" cellspacing="1" cellpadding="3"><tr><td colspan="1" bgcolor="#eecfa1" align="center"><center><b>Related links</b></center></td></tr><tr><td bgcolor="#fffacd"><ul><li><a href="tutorial/libxslttutorial.html">Tutorial</a>,
155
- <a href="tutorial2/libxslt_pipes.html">Tutorial2</a></li><li><a href="xsltproc.html">Man page for xsltproc</a></li><li><a href="http://mail.gnome.org/archives/xslt/">Mail archive</a></li><li><a href="http://xmlsoft.org/">XML libxml2</a></li><li><a href="ftp://xmlsoft.org/">FTP</a></li><li><a href="http://www.zlatkovic.com/projects/libxml/">Windows binaries</a></li><li><a href="http://garypennington.net/libxml2/">Solaris binaries</a></li><li><a href="http://www.explain.com.au/oss/libxml2xslt.html">MacOsX binaries</a></li><li><a href="http://bugzilla.gnome.org/buglist.cgi?product=libxslt">Bug Tracker</a></li><li><a href="http://codespeak.net/lxml/">lxml Python bindings</a></li><li><a href="http://cpan.uwinnipeg.ca/dist/XML-LibXSLT">Perl XSLT bindings</a></li><li><a href="http://www.zend.com/php5/articles/php5-xmlphp.php#Heading17">XSLT with PHP</a></li><li><a href="http://www.mod-xslt2.com/">Apache module</a></li><li><a href="http://sourceforge.net/projects/libxml2-pas/">Pascal bindings</a></li><li><a href="http://xsldbg.sourceforge.net/">Xsldbg Debugger</a></li></ul></td></tr></table><table width="100%" border="0" cellspacing="1" cellpadding="3"><tr><td colspan="1" bgcolor="#eecfa1" align="center"><center><b>API Indexes</b></center></td></tr><tr><td bgcolor="#fffacd"><ul><li><a href="APIchunk0.html">Alphabetic</a></li><li><a href="APIconstructors.html">Constructors</a></li><li><a href="APIfunctions.html">Functions/Types</a></li><li><a href="APIfiles.html">Modules</a></li><li><a href="APIsymbols.html">Symbols</a></li></ul></td></tr></table></td></tr></table></td><td valign="top" bgcolor="#8b7765"><table border="0" cellspacing="0" cellpadding="1" width="100%"><tr><td><table border="0" cellspacing="0" cellpadding="1" width="100%" bgcolor="#000000"><tr><td><table border="0" cellpadding="3" cellspacing="1" width="100%"><tr><td bgcolor="#fffacd"><p>See the <a href="http://git.gnome.org/browse/libxslt/">git page</a>
156
- -to get a description of the recent commits.</p><p>Those are the public releases made:</p><h3>1.1.27: Sep 12 2012</h3><ul>
157
- +to get a description of the recent commits.</p><p>Those are the public releases made:</p><h3>1.1.28: Nov 21 2012</h3><ul>
158
- + <li> Portability:<br />
159
- + Fix python build by using libxsltmod_la_CPPFLAGS instead of AM_CPPFLAGS (Alexandre Rostovtsev),<br />
160
- + configure should be more careful with linker script (Igor Pashev),<br />
161
- + add gcrypt library in LIBADD, not LDFLAGS, as recommended (Roumen Petrov)<br />
162
- + </li>
163
- +
164
- + <li> Bug fixes:<br />
165
- + Fix generate-id() to avoid generating the same ID (Stewart Brodie),<br />
166
- + Fix crash with empty xsl:key/@match attribute (Nick Wellnhofer),<br />
167
- + Crash when passing an uninitialized variable to document() (Nick Wellnhofer),<br />
168
- + Add missing test docs to EXTRA_DIST (Nick Wellnhofer),<br />
169
- + Fix regression: Default namespace not correctly used (Nick Wellnhofer)<br />
170
- + </li>
171
- +
172
- + <li> Cleanups:<br />
173
- + Remove xsltTransStorageAdd and xsltTransStorageRemove from symbols.xml (Daniel Veillard),<br />
174
- + autogen.sh cleanup (Daniel Richard),<br />
175
- + consistent use of xslt processor (Roumen Petrov),<br />
176
- + Add object files in tests/plugins to .gitignore (Nick Wellnhofer),<br />
177
- + Fix error on bug-165 regression test (Daniel Veillard),<br />
178
- + Remove xsltTransStorageAdd and xsltTransStorageRemove (Daniel Veillard),<br />
179
- + </li>
180
- +</ul><h3>1.1.27: Sep 12 2012</h3><ul>
181
- <li> Portability:<br />
182
- xincludestyle wasn't protected with LIBXML_XINCLUDE_ENABLED (Michael Bonfils),<br />
183
- Portability fix for testThreads.c (IlyaS),<br />
184
- diff --git a/doc/xslt.html b/doc/xslt.html
185
- index f7fb595..71e208f 100644
186
- --- a/doc/xslt.html
187
- +++ b/doc/xslt.html
188
- @@ -305,6 +305,31 @@ to get a description of the recent commits.</p>
189
-
190
- <p>Those are the public releases made:</p>
191
-
192
- +<h3>1.1.28: Nov 21 2012</h3>
193
- +<ul>
194
- + <li> Portability:<br/>
195
- + Fix python build by using libxsltmod_la_CPPFLAGS instead of AM_CPPFLAGS (Alexandre Rostovtsev),<br/>
196
- + configure should be more careful with linker script (Igor Pashev),<br/>
197
- + add gcrypt library in LIBADD, not LDFLAGS, as recommended (Roumen Petrov)<br/>
198
- + </li>
199
- +
200
- + <li> Bug fixes:<br/>
201
- + Fix generate-id() to avoid generating the same ID (Stewart Brodie),<br/>
202
- + Fix crash with empty xsl:key/@match attribute (Nick Wellnhofer),<br/>
203
- + Crash when passing an uninitialized variable to document() (Nick Wellnhofer),<br/>
204
- + Add missing test docs to EXTRA_DIST (Nick Wellnhofer),<br/>
205
- + Fix regression: Default namespace not correctly used (Nick Wellnhofer)<br/>
206
- + </li>
207
- +
208
- + <li> Cleanups:<br/>
209
- + Remove xsltTransStorageAdd and xsltTransStorageRemove from symbols.xml (Daniel Veillard),<br/>
210
- + autogen.sh cleanup (Daniel Richard),<br/>
211
- + consistent use of xslt processor (Roumen Petrov),<br/>
212
- + Add object files in tests/plugins to .gitignore (Nick Wellnhofer),<br/>
213
- + Fix error on bug-165 regression test (Daniel Veillard),<br/>
214
- + Remove xsltTransStorageAdd and xsltTransStorageRemove (Daniel Veillard),<br/>
215
- + </li>
216
- +</ul>
217
- <h3>1.1.27: Sep 12 2012</h3>
218
- <ul>
219
- <li> Portability:<br/>
220
- --
221
- 1.8.4.1
222
-