nokogiri 1.6.6.4-java → 1.6.7-java
Sign up to get free protection for your applications and to get access to all the features.
Potentially problematic release.
This version of nokogiri might be problematic. Click here for more details.
- checksums.yaml +4 -4
- data/.cross_rubies +7 -5
- data/.travis.yml +33 -30
- data/CHANGELOG.ja.rdoc +38 -6
- data/CHANGELOG.rdoc +33 -1
- data/Gemfile +3 -2
- data/LICENSE.txt +31 -0
- data/Manifest.txt +4 -24
- data/README.md +170 -0
- data/Rakefile +25 -22
- data/appveyor.yml +22 -0
- data/build_all +6 -90
- data/ext/java/nokogiri/XmlDocument.java +5 -0
- data/ext/java/nokogiri/XmlNode.java +16 -1
- data/ext/java/nokogiri/XmlSaxPushParser.java +6 -2
- data/ext/java/nokogiri/XmlSchema.java +20 -20
- data/ext/java/nokogiri/internals/NokogiriHandler.java +21 -15
- data/ext/java/nokogiri/internals/ParserContext.java +15 -11
- data/ext/nokogiri/extconf.rb +37 -34
- data/ext/nokogiri/xml_node.c +21 -11
- data/ext/nokogiri/xml_sax_parser_context.c +2 -2
- data/lib/nokogiri/nokogiri.jar +0 -0
- data/lib/nokogiri/version.rb +1 -1
- data/lib/nokogiri/xml/node.rb +16 -0
- data/{ports/patches → patches}/sort-patches-by-date +0 -0
- data/test/html/test_document.rb +26 -3
- data/test/xml/sax/test_parser.rb +11 -0
- data/test/xml/test_document.rb +11 -0
- data/test/xml/test_schema.rb +15 -2
- data/test/xml/test_xpath.rb +15 -0
- metadata +28 -33
- data/README.ja.rdoc +0 -112
- data/README.rdoc +0 -177
- data/ports/patches/libxml2/0001-Revert-Missing-initialization-for-the-catalog-module.patch +0 -29
- data/ports/patches/libxml2/0002-Fix-missing-entities-after-CVE-2014-3660-fix.patch +0 -31
- data/ports/patches/libxml2/0003-Stop-parsing-on-entities-boundaries-errors.patch +0 -32
- data/ports/patches/libxml2/0004-Cleanup-conditional-section-error-handling.patch +0 -49
- data/ports/patches/libxml2/0005-CVE-2015-1819-Enforce-the-reader-to-run-in-constant-.patch +0 -177
- data/ports/patches/libxml2/0006-Another-variation-of-overflow-in-Conditional-section.patch +0 -32
- data/ports/patches/libxml2/0007-Fix-an-error-in-previous-Conditional-section-patch.patch +0 -28
- data/ports/patches/libxml2/0008-CVE-2015-8035-Fix-XZ-compression-support-loop.patch +0 -31
- data/ports/patches/libxslt/0001-Adding-doc-update-related-to-1.1.28.patch +0 -222
- data/ports/patches/libxslt/0002-Fix-a-couple-of-places-where-f-printf-parameters-wer.patch +0 -53
- data/ports/patches/libxslt/0003-Initialize-pseudo-random-number-generator-with-curre.patch +0 -60
- data/ports/patches/libxslt/0004-EXSLT-function-str-replace-is-broken-as-is.patch +0 -42
- data/ports/patches/libxslt/0006-Fix-str-padding-to-work-with-UTF-8-strings.patch +0 -164
- data/ports/patches/libxslt/0007-Separate-function-for-predicate-matching-in-patterns.patch +0 -587
- data/ports/patches/libxslt/0008-Fix-direct-pattern-matching.patch +0 -80
- data/ports/patches/libxslt/0009-Fix-certain-patterns-with-predicates.patch +0 -185
- data/ports/patches/libxslt/0010-Fix-handling-of-UTF-8-strings-in-EXSLT-crypto-module.patch +0 -126
- data/ports/patches/libxslt/0013-Memory-leak-in-xsltCompileIdKeyPattern-error-path.patch +0 -25
- data/ports/patches/libxslt/0014-Fix-for-bug-436589.patch +0 -43
- data/ports/patches/libxslt/0015-Fix-mkdir-for-mingw.patch +0 -41
- data/ports/patches/libxslt/0016-Fix-for-type-confusion-in-preprocessing-attributes.patch +0 -29
@@ -1,41 +0,0 @@
|
|
1
|
-
From a7ff3f0043f02d4ade966b6ac05b8be39166daa7 Mon Sep 17 00:00:00 2001
|
2
|
-
From: Lars Kanis <lars@greiz-reinsdorf.de>
|
3
|
-
Date: Sun, 6 Oct 2013 22:04:46 +0200
|
4
|
-
Subject: [PATCH] Use mkdir macro also in case if mingw32.
|
5
|
-
|
6
|
-
This fixes bug 676511.
|
7
|
-
---
|
8
|
-
libxslt/libxslt.h | 6 ++++++
|
9
|
-
libxslt/win32config.h | 1 -
|
10
|
-
2 files changed, 6 insertions(+), 1 deletion(-)
|
11
|
-
|
12
|
-
diff --git a/libxslt/libxslt.h b/libxslt/libxslt.h
|
13
|
-
index 2f6f20d..e6d4c83 100644
|
14
|
-
--- a/libxslt/libxslt.h
|
15
|
-
+++ b/libxslt/libxslt.h
|
16
|
-
@@ -27,4 +27,10 @@
|
17
|
-
#endif
|
18
|
-
#endif
|
19
|
-
|
20
|
-
+#if defined(_MSC_VER) || defined(__MINGW32__)
|
21
|
-
+#include <io.h>
|
22
|
-
+#include <direct.h>
|
23
|
-
+#define mkdir(p,m) _mkdir(p)
|
24
|
-
+#endif
|
25
|
-
+
|
26
|
-
#endif /* ! __XSLT_LIBXSLT_H__ */
|
27
|
-
diff --git a/libxslt/win32config.h b/libxslt/win32config.h
|
28
|
-
index 9f60e55..e1ceae1 100644
|
29
|
-
--- a/libxslt/win32config.h
|
30
|
-
+++ b/libxslt/win32config.h
|
31
|
-
@@ -78,7 +78,6 @@ static int isnan (double d) {
|
32
|
-
|
33
|
-
#include <direct.h>
|
34
|
-
#if defined(_MSC_VER) || defined(__MINGW32__)
|
35
|
-
-#define mkdir(p,m) _mkdir(p)
|
36
|
-
#define snprintf _snprintf
|
37
|
-
#if _MSC_VER < 1500
|
38
|
-
#define vsnprintf(b,c,f,a) _vsnprintf(b,c,f,a)
|
39
|
-
--
|
40
|
-
1.8.3.2
|
41
|
-
|
@@ -1,29 +0,0 @@
|
|
1
|
-
From 5865b9545891a38608374ff6458663e483a0dfb5 Mon Sep 17 00:00:00 2001
|
2
|
-
From: Daniel Veillard <veillard@redhat.com>
|
3
|
-
Date: Thu, 29 Oct 2015 19:33:23 +0800
|
4
|
-
Subject: [PATCH] Fix for type confusion in preprocessing attributes
|
5
|
-
|
6
|
-
CVE-2015-7995 http://www.openwall.com/lists/oss-security/2015/10/27/10
|
7
|
-
We need to check that the parent node is an element before dereferencing
|
8
|
-
its namespace
|
9
|
-
---
|
10
|
-
libxslt/preproc.c | 3 ++-
|
11
|
-
1 file changed, 2 insertions(+), 1 deletion(-)
|
12
|
-
|
13
|
-
diff --git a/libxslt/preproc.c b/libxslt/preproc.c
|
14
|
-
index 4ef3f63..dac6acb 100644
|
15
|
-
--- a/libxslt/preproc.c
|
16
|
-
+++ b/libxslt/preproc.c
|
17
|
-
@@ -2245,7 +2245,8 @@ xsltStylePreCompute(xsltStylesheetPtr style, xmlNodePtr inst) {
|
18
|
-
} else if (IS_XSLT_NAME(inst, "attribute")) {
|
19
|
-
xmlNodePtr parent = inst->parent;
|
20
|
-
|
21
|
-
- if ((parent == NULL) || (parent->ns == NULL) ||
|
22
|
-
+ if ((parent == NULL) ||
|
23
|
-
+ (parent->type != XML_ELEMENT_NODE) || (parent->ns == NULL) ||
|
24
|
-
((parent->ns != inst->ns) &&
|
25
|
-
(!xmlStrEqual(parent->ns->href, inst->ns->href))) ||
|
26
|
-
(!xmlStrEqual(parent->name, BAD_CAST "attribute-set"))) {
|
27
|
-
--
|
28
|
-
2.5.0
|
29
|
-
|