nokogiri 1.6.6.4-java → 1.6.7-java

Sign up to get free protection for your applications and to get access to all the features.

Potentially problematic release.


This version of nokogiri might be problematic. Click here for more details.

Files changed (54) hide show
  1. checksums.yaml +4 -4
  2. data/.cross_rubies +7 -5
  3. data/.travis.yml +33 -30
  4. data/CHANGELOG.ja.rdoc +38 -6
  5. data/CHANGELOG.rdoc +33 -1
  6. data/Gemfile +3 -2
  7. data/LICENSE.txt +31 -0
  8. data/Manifest.txt +4 -24
  9. data/README.md +170 -0
  10. data/Rakefile +25 -22
  11. data/appveyor.yml +22 -0
  12. data/build_all +6 -90
  13. data/ext/java/nokogiri/XmlDocument.java +5 -0
  14. data/ext/java/nokogiri/XmlNode.java +16 -1
  15. data/ext/java/nokogiri/XmlSaxPushParser.java +6 -2
  16. data/ext/java/nokogiri/XmlSchema.java +20 -20
  17. data/ext/java/nokogiri/internals/NokogiriHandler.java +21 -15
  18. data/ext/java/nokogiri/internals/ParserContext.java +15 -11
  19. data/ext/nokogiri/extconf.rb +37 -34
  20. data/ext/nokogiri/xml_node.c +21 -11
  21. data/ext/nokogiri/xml_sax_parser_context.c +2 -2
  22. data/lib/nokogiri/nokogiri.jar +0 -0
  23. data/lib/nokogiri/version.rb +1 -1
  24. data/lib/nokogiri/xml/node.rb +16 -0
  25. data/{ports/patches → patches}/sort-patches-by-date +0 -0
  26. data/test/html/test_document.rb +26 -3
  27. data/test/xml/sax/test_parser.rb +11 -0
  28. data/test/xml/test_document.rb +11 -0
  29. data/test/xml/test_schema.rb +15 -2
  30. data/test/xml/test_xpath.rb +15 -0
  31. metadata +28 -33
  32. data/README.ja.rdoc +0 -112
  33. data/README.rdoc +0 -177
  34. data/ports/patches/libxml2/0001-Revert-Missing-initialization-for-the-catalog-module.patch +0 -29
  35. data/ports/patches/libxml2/0002-Fix-missing-entities-after-CVE-2014-3660-fix.patch +0 -31
  36. data/ports/patches/libxml2/0003-Stop-parsing-on-entities-boundaries-errors.patch +0 -32
  37. data/ports/patches/libxml2/0004-Cleanup-conditional-section-error-handling.patch +0 -49
  38. data/ports/patches/libxml2/0005-CVE-2015-1819-Enforce-the-reader-to-run-in-constant-.patch +0 -177
  39. data/ports/patches/libxml2/0006-Another-variation-of-overflow-in-Conditional-section.patch +0 -32
  40. data/ports/patches/libxml2/0007-Fix-an-error-in-previous-Conditional-section-patch.patch +0 -28
  41. data/ports/patches/libxml2/0008-CVE-2015-8035-Fix-XZ-compression-support-loop.patch +0 -31
  42. data/ports/patches/libxslt/0001-Adding-doc-update-related-to-1.1.28.patch +0 -222
  43. data/ports/patches/libxslt/0002-Fix-a-couple-of-places-where-f-printf-parameters-wer.patch +0 -53
  44. data/ports/patches/libxslt/0003-Initialize-pseudo-random-number-generator-with-curre.patch +0 -60
  45. data/ports/patches/libxslt/0004-EXSLT-function-str-replace-is-broken-as-is.patch +0 -42
  46. data/ports/patches/libxslt/0006-Fix-str-padding-to-work-with-UTF-8-strings.patch +0 -164
  47. data/ports/patches/libxslt/0007-Separate-function-for-predicate-matching-in-patterns.patch +0 -587
  48. data/ports/patches/libxslt/0008-Fix-direct-pattern-matching.patch +0 -80
  49. data/ports/patches/libxslt/0009-Fix-certain-patterns-with-predicates.patch +0 -185
  50. data/ports/patches/libxslt/0010-Fix-handling-of-UTF-8-strings-in-EXSLT-crypto-module.patch +0 -126
  51. data/ports/patches/libxslt/0013-Memory-leak-in-xsltCompileIdKeyPattern-error-path.patch +0 -25
  52. data/ports/patches/libxslt/0014-Fix-for-bug-436589.patch +0 -43
  53. data/ports/patches/libxslt/0015-Fix-mkdir-for-mingw.patch +0 -41
  54. data/ports/patches/libxslt/0016-Fix-for-type-confusion-in-preprocessing-attributes.patch +0 -29
@@ -1,41 +0,0 @@
1
- From a7ff3f0043f02d4ade966b6ac05b8be39166daa7 Mon Sep 17 00:00:00 2001
2
- From: Lars Kanis <lars@greiz-reinsdorf.de>
3
- Date: Sun, 6 Oct 2013 22:04:46 +0200
4
- Subject: [PATCH] Use mkdir macro also in case if mingw32.
5
-
6
- This fixes bug 676511.
7
- ---
8
- libxslt/libxslt.h | 6 ++++++
9
- libxslt/win32config.h | 1 -
10
- 2 files changed, 6 insertions(+), 1 deletion(-)
11
-
12
- diff --git a/libxslt/libxslt.h b/libxslt/libxslt.h
13
- index 2f6f20d..e6d4c83 100644
14
- --- a/libxslt/libxslt.h
15
- +++ b/libxslt/libxslt.h
16
- @@ -27,4 +27,10 @@
17
- #endif
18
- #endif
19
-
20
- +#if defined(_MSC_VER) || defined(__MINGW32__)
21
- +#include <io.h>
22
- +#include <direct.h>
23
- +#define mkdir(p,m) _mkdir(p)
24
- +#endif
25
- +
26
- #endif /* ! __XSLT_LIBXSLT_H__ */
27
- diff --git a/libxslt/win32config.h b/libxslt/win32config.h
28
- index 9f60e55..e1ceae1 100644
29
- --- a/libxslt/win32config.h
30
- +++ b/libxslt/win32config.h
31
- @@ -78,7 +78,6 @@ static int isnan (double d) {
32
-
33
- #include <direct.h>
34
- #if defined(_MSC_VER) || defined(__MINGW32__)
35
- -#define mkdir(p,m) _mkdir(p)
36
- #define snprintf _snprintf
37
- #if _MSC_VER < 1500
38
- #define vsnprintf(b,c,f,a) _vsnprintf(b,c,f,a)
39
- --
40
- 1.8.3.2
41
-
@@ -1,29 +0,0 @@
1
- From 5865b9545891a38608374ff6458663e483a0dfb5 Mon Sep 17 00:00:00 2001
2
- From: Daniel Veillard <veillard@redhat.com>
3
- Date: Thu, 29 Oct 2015 19:33:23 +0800
4
- Subject: [PATCH] Fix for type confusion in preprocessing attributes
5
-
6
- CVE-2015-7995 http://www.openwall.com/lists/oss-security/2015/10/27/10
7
- We need to check that the parent node is an element before dereferencing
8
- its namespace
9
- ---
10
- libxslt/preproc.c | 3 ++-
11
- 1 file changed, 2 insertions(+), 1 deletion(-)
12
-
13
- diff --git a/libxslt/preproc.c b/libxslt/preproc.c
14
- index 4ef3f63..dac6acb 100644
15
- --- a/libxslt/preproc.c
16
- +++ b/libxslt/preproc.c
17
- @@ -2245,7 +2245,8 @@ xsltStylePreCompute(xsltStylesheetPtr style, xmlNodePtr inst) {
18
- } else if (IS_XSLT_NAME(inst, "attribute")) {
19
- xmlNodePtr parent = inst->parent;
20
-
21
- - if ((parent == NULL) || (parent->ns == NULL) ||
22
- + if ((parent == NULL) ||
23
- + (parent->type != XML_ELEMENT_NODE) || (parent->ns == NULL) ||
24
- ((parent->ns != inst->ns) &&
25
- (!xmlStrEqual(parent->ns->href, inst->ns->href))) ||
26
- (!xmlStrEqual(parent->name, BAD_CAST "attribute-set"))) {
27
- --
28
- 2.5.0
29
-