Accepting request 616645 from GNOME:Factory
OBS-URL: https://build.opensuse.org/request/show/616645 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/epiphany?expand=0&rev=153
This commit is contained in:
commit
527f1a8764
254
epip-revert-gsb-storage-dont-hardcode-Linux-threat-lists.patch
Normal file
254
epip-revert-gsb-storage-dont-hardcode-Linux-threat-lists.patch
Normal file
@ -0,0 +1,254 @@
|
|||||||
|
From c0eea4014270cac6d32d24de2bd8338e2da39ffd Mon Sep 17 00:00:00 2001
|
||||||
|
From: Gabriel Ivașcu <ivascu.gabriel59@gmail.com>
|
||||||
|
Date: Tue, 12 Jun 2018 12:39:50 +0300
|
||||||
|
Subject: [PATCH] Revert "gsb-storage: Don't hardcode Linux threat lists"
|
||||||
|
|
||||||
|
This reverts commit 3c8cd6387f85106051c9e674ee8b1e59fb40858c.
|
||||||
|
|
||||||
|
Also, increment SCHEMA_VERSION in ephy-gsb-storage.c.
|
||||||
|
---
|
||||||
|
lib/safe-browsing/ephy-gsb-service.c | 74 --------------------------------------------------------------------------
|
||||||
|
lib/safe-browsing/ephy-gsb-storage.c | 99 +++++++++++++++++++++++++++++++++++++++++++++++++++------------------------------------------------
|
||||||
|
lib/safe-browsing/ephy-gsb-storage.h | 2 --
|
||||||
|
3 files changed, 51 insertions(+), 124 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/lib/safe-browsing/ephy-gsb-service.c b/lib/safe-browsing/ephy-gsb-service.c
|
||||||
|
index b36592a..a99a6d2 100644
|
||||||
|
--- a/lib/safe-browsing/ephy-gsb-service.c
|
||||||
|
+++ b/lib/safe-browsing/ephy-gsb-service.c
|
||||||
|
@@ -163,74 +163,6 @@ ephy_gsb_service_schedule_update (EphyGSBService *self)
|
||||||
|
LOG ("Next update scheduled in %ld seconds", interval);
|
||||||
|
}
|
||||||
|
|
||||||
|
-static GList *
|
||||||
|
-ephy_gsb_service_fetch_threat_lists_sync (EphyGSBService *self)
|
||||||
|
-{
|
||||||
|
- GList *retval = NULL;
|
||||||
|
- JsonNode *body_node = NULL;
|
||||||
|
- JsonObject *body_obj;
|
||||||
|
- JsonArray *threat_lists;
|
||||||
|
- JsonObject *descriptor;
|
||||||
|
- const char *threat_type;
|
||||||
|
- const char *platform_type;
|
||||||
|
- const char *threat_entry_type;
|
||||||
|
- SoupMessage *msg;
|
||||||
|
- char *url;
|
||||||
|
-
|
||||||
|
- g_assert (EPHY_IS_GSB_SERVICE (self));
|
||||||
|
-
|
||||||
|
- url = g_strdup_printf ("%sthreatLists?key=%s", API_PREFIX, self->api_key);
|
||||||
|
- msg = soup_message_new (SOUP_METHOD_GET, url);
|
||||||
|
- soup_session_send_message (self->session, msg);
|
||||||
|
-
|
||||||
|
- if (msg->status_code != 200) {
|
||||||
|
- LOG ("Failed to fetch the threat lists from the server, got: %u, %s",
|
||||||
|
- msg->status_code, msg->response_body->data);
|
||||||
|
- goto out;
|
||||||
|
- }
|
||||||
|
-
|
||||||
|
- body_node = json_from_string (msg->response_body->data, NULL);
|
||||||
|
- if (!body_node || !JSON_NODE_HOLDS_OBJECT (body_node)) {
|
||||||
|
- g_warning ("Response is not a valid JSON object");
|
||||||
|
- goto out;
|
||||||
|
- }
|
||||||
|
-
|
||||||
|
- body_obj = json_node_get_object (body_node);
|
||||||
|
-
|
||||||
|
- if (json_object_has_non_null_array_member (body_obj, "threatLists")) {
|
||||||
|
- threat_lists = json_object_get_array_member (body_obj, "threatLists");
|
||||||
|
- for (guint i = 0; i < json_array_get_length (threat_lists); i++) {
|
||||||
|
- descriptor = json_array_get_object_element (threat_lists, i);
|
||||||
|
- threat_type = json_object_get_string_member (descriptor, "threatType");
|
||||||
|
- platform_type = json_object_get_string_member (descriptor, "platformType");
|
||||||
|
-
|
||||||
|
- /* Keep SOCIAL_ENGINEERING threats that are for any platform.
|
||||||
|
- * Keep MALWARE/UNWANTED_SOFTWARE threats that are for Linux only.
|
||||||
|
- */
|
||||||
|
- if (g_strcmp0 (threat_type, "SOCIAL_ENGINEERING") == 0) {
|
||||||
|
- if (g_strcmp0 (platform_type, "ANY_PLATFORM") != 0)
|
||||||
|
- continue;
|
||||||
|
- } else if (g_strcmp0 (platform_type, "LINUX") != 0) {
|
||||||
|
- continue;
|
||||||
|
- }
|
||||||
|
-
|
||||||
|
- threat_entry_type = json_object_get_string_member (descriptor, "threatEntryType");
|
||||||
|
- retval = g_list_prepend (retval, ephy_gsb_threat_list_new (threat_type,
|
||||||
|
- platform_type,
|
||||||
|
- threat_entry_type,
|
||||||
|
- NULL));
|
||||||
|
- }
|
||||||
|
- }
|
||||||
|
-
|
||||||
|
-out:
|
||||||
|
- g_free (url);
|
||||||
|
- g_object_unref (msg);
|
||||||
|
- if (body_node)
|
||||||
|
- json_node_unref (body_node);
|
||||||
|
-
|
||||||
|
- return g_list_reverse (retval);
|
||||||
|
-}
|
||||||
|
-
|
||||||
|
static void
|
||||||
|
ephy_gsb_service_update_thread (GTask *task,
|
||||||
|
EphyGSBService *self,
|
||||||
|
@@ -255,12 +187,6 @@ ephy_gsb_service_update_thread (GTask *task,
|
||||||
|
|
||||||
|
ephy_gsb_storage_delete_old_full_hashes (self->storage);
|
||||||
|
|
||||||
|
- /* Fetch and store new threat lists, if any. */
|
||||||
|
- threat_lists = ephy_gsb_service_fetch_threat_lists_sync (self);
|
||||||
|
- for (GList *l = threat_lists; l && l->data; l = l->next)
|
||||||
|
- ephy_gsb_storage_insert_threat_list (self->storage, l->data);
|
||||||
|
- g_list_free_full (threat_lists, (GDestroyNotify)ephy_gsb_threat_list_free);
|
||||||
|
-
|
||||||
|
threat_lists = ephy_gsb_storage_get_threat_lists (self->storage);
|
||||||
|
if (!threat_lists) {
|
||||||
|
LOG ("No threat lists to update");
|
||||||
|
diff --git a/lib/safe-browsing/ephy-gsb-storage.c b/lib/safe-browsing/ephy-gsb-storage.c
|
||||||
|
index 374d98d..05d8f27 100644
|
||||||
|
--- a/lib/safe-browsing/ephy-gsb-storage.c
|
||||||
|
+++ b/lib/safe-browsing/ephy-gsb-storage.c
|
||||||
|
@@ -34,8 +34,21 @@
|
||||||
|
*/
|
||||||
|
#define BATCH_SIZE 199
|
||||||
|
|
||||||
|
-/* Increment schema version if you modify the database table structure. */
|
||||||
|
-#define SCHEMA_VERSION 2
|
||||||
|
+/* Increment schema version if you:
|
||||||
|
+ * 1) Modify the database table structure.
|
||||||
|
+ * 2) Modify the threat lists below.
|
||||||
|
+ */
|
||||||
|
+#define SCHEMA_VERSION 3
|
||||||
|
+
|
||||||
|
+/* The available Linux threat lists of Google Safe Browsing API v4.
|
||||||
|
+ * The format is {THREAT_TYPE, PLATFORM_TYPE, THREAT_ENTRY_TYPE}.
|
||||||
|
+ */
|
||||||
|
+static const char * const gsb_linux_threat_lists[][3] = {
|
||||||
|
+ {GSB_THREAT_TYPE_MALWARE, "LINUX", "URL"},
|
||||||
|
+ {GSB_THREAT_TYPE_SOCIAL_ENGINEERING, "ANY_PLATFORM", "URL"},
|
||||||
|
+ {GSB_THREAT_TYPE_UNWANTED_SOFTWARE, "LINUX", "URL"},
|
||||||
|
+ {GSB_THREAT_TYPE_MALWARE, "LINUX", "IP_RANGE"},
|
||||||
|
+};
|
||||||
|
|
||||||
|
struct _EphyGSBStorage {
|
||||||
|
GObject parent_instance;
|
||||||
|
@@ -195,7 +208,9 @@ ephy_gsb_storage_init_metadata_table (EphyGSBStorage *self)
|
||||||
|
static gboolean
|
||||||
|
ephy_gsb_storage_init_threats_table (EphyGSBStorage *self)
|
||||||
|
{
|
||||||
|
+ EphySQLiteStatement *statement;
|
||||||
|
GError *error = NULL;
|
||||||
|
+ GString *string;
|
||||||
|
const char *sql;
|
||||||
|
|
||||||
|
g_assert (EPHY_IS_GSB_STORAGE (self));
|
||||||
|
@@ -218,6 +233,40 @@ ephy_gsb_storage_init_threats_table (EphyGSBStorage *self)
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
|
||||||
|
+ sql = "INSERT INTO threats (threat_type, platform_type, threat_entry_type) VALUES ";
|
||||||
|
+ string = g_string_new (sql);
|
||||||
|
+ for (guint i = 0; i < G_N_ELEMENTS (gsb_linux_threat_lists); i++)
|
||||||
|
+ g_string_append (string, "(?, ?, ?),");
|
||||||
|
+ /* Remove trailing comma character. */
|
||||||
|
+ g_string_erase (string, string->len - 1, -1);
|
||||||
|
+
|
||||||
|
+ statement = ephy_sqlite_connection_create_statement (self->db, string->str, &error);
|
||||||
|
+ g_string_free (string, TRUE);
|
||||||
|
+
|
||||||
|
+ if (error) {
|
||||||
|
+ g_warning ("Failed to create threats table insert statement: %s", error->message);
|
||||||
|
+ g_error_free (error);
|
||||||
|
+ return FALSE;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ for (guint i = 0; i < G_N_ELEMENTS (gsb_linux_threat_lists); i++) {
|
||||||
|
+ EphyGSBThreatList *list = ephy_gsb_threat_list_new (gsb_linux_threat_lists[i][0],
|
||||||
|
+ gsb_linux_threat_lists[i][1],
|
||||||
|
+ gsb_linux_threat_lists[i][2],
|
||||||
|
+ NULL);
|
||||||
|
+ bind_threat_list_params (statement, list, i * 3, i * 3 + 1, i * 3 + 2, -1);
|
||||||
|
+ ephy_gsb_threat_list_free (list);
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ ephy_sqlite_statement_step (statement, &error);
|
||||||
|
+ g_object_unref (statement);
|
||||||
|
+
|
||||||
|
+ if (error) {
|
||||||
|
+ g_warning ("Failed to insert initial data into threats table: %s", error->message);
|
||||||
|
+ g_error_free (error);
|
||||||
|
+ return FALSE;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
return TRUE;
|
||||||
|
}
|
||||||
|
|
||||||
|
@@ -600,52 +649,6 @@ ephy_gsb_storage_set_metadata (EphyGSBStorage *self,
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
- * ephy_gsb_storage_insert_threat_list:
|
||||||
|
- * @self: an #EphyGSBStorage
|
||||||
|
- * @list: an #EphyGSBThreatList
|
||||||
|
- *
|
||||||
|
- * Insert a threat lists into the local database. If the combination
|
||||||
|
- * THREAT_TYPE/PLATFORM_TYPE/THREAT_ENTRY_TYPE already exists in the
|
||||||
|
- * database, then this function does nothing. The client state is ignored.
|
||||||
|
- * Use ephy_gsb_storage_update_client_state() if you need to update the
|
||||||
|
- * client state.
|
||||||
|
- **/
|
||||||
|
-void
|
||||||
|
-ephy_gsb_storage_insert_threat_list (EphyGSBStorage *self,
|
||||||
|
- EphyGSBThreatList *list)
|
||||||
|
-{
|
||||||
|
- EphySQLiteStatement *statement;
|
||||||
|
- GError *error = NULL;
|
||||||
|
- const char *sql;
|
||||||
|
-
|
||||||
|
- g_assert (EPHY_IS_GSB_STORAGE (self));
|
||||||
|
- g_assert (list);
|
||||||
|
-
|
||||||
|
- sql = "INSERT OR IGNORE INTO threats "
|
||||||
|
- "(threat_type, platform_type, threat_entry_type, client_state) "
|
||||||
|
- "VALUES (?, ?, ?, ?)";
|
||||||
|
- statement = ephy_sqlite_connection_create_statement (self->db, sql, &error);
|
||||||
|
- if (error) {
|
||||||
|
- g_warning ("Failed to create insert threat list statement: %s", error->message);
|
||||||
|
- g_error_free (error);
|
||||||
|
- return;
|
||||||
|
- }
|
||||||
|
-
|
||||||
|
- if (!bind_threat_list_params (statement, list, 0, 1, 2, -1)) {
|
||||||
|
- g_object_unref (statement);
|
||||||
|
- return;
|
||||||
|
- }
|
||||||
|
-
|
||||||
|
- ephy_sqlite_statement_step (statement, &error);
|
||||||
|
- if (error) {
|
||||||
|
- g_warning ("Failed to execute insert threat list statement: %s", error->message);
|
||||||
|
- g_error_free (error);
|
||||||
|
- }
|
||||||
|
-
|
||||||
|
- g_object_unref (statement);
|
||||||
|
-}
|
||||||
|
-
|
||||||
|
-/**
|
||||||
|
* ephy_gsb_storage_get_threat_lists:
|
||||||
|
* @self: an #EphyGSBStorage
|
||||||
|
*
|
||||||
|
diff --git a/lib/safe-browsing/ephy-gsb-storage.h b/lib/safe-browsing/ephy-gsb-storage.h
|
||||||
|
index 056b4e7..ed41a7e 100644
|
||||||
|
--- a/lib/safe-browsing/ephy-gsb-storage.h
|
||||||
|
+++ b/lib/safe-browsing/ephy-gsb-storage.h
|
||||||
|
@@ -38,8 +38,6 @@ gint64 ephy_gsb_storage_get_metadata (EphyGSBStorage
|
||||||
|
void ephy_gsb_storage_set_metadata (EphyGSBStorage *self,
|
||||||
|
const char *key,
|
||||||
|
gint64 value);
|
||||||
|
-void ephy_gsb_storage_insert_threat_list (EphyGSBStorage *self,
|
||||||
|
- EphyGSBThreatList *list);
|
||||||
|
GList *ephy_gsb_storage_get_threat_lists (EphyGSBStorage *self);
|
||||||
|
char *ephy_gsb_storage_compute_checksum (EphyGSBStorage *self,
|
||||||
|
EphyGSBThreatList *list);
|
||||||
|
--
|
||||||
|
libgit2 0.27.1
|
||||||
|
|
@ -1,3 +0,0 @@
|
|||||||
version https://git-lfs.github.com/spec/v1
|
|
||||||
oid sha256:baa4e9f0ac0b1e95fa2027af796859114f448f0f274976c30c9b8db734c6402d
|
|
||||||
size 4470360
|
|
3
epiphany-3.28.3.1.tar.xz
Normal file
3
epiphany-3.28.3.1.tar.xz
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
version https://git-lfs.github.com/spec/v1
|
||||||
|
oid sha256:690546a701f046c5c2b3a092659589ea6e17cb0f9a81ec3fdb3046b00cede6f7
|
||||||
|
size 4475124
|
@ -1,56 +0,0 @@
|
|||||||
From c56294dd46db69c94f8238dd47f568ca57bc51c0 Mon Sep 17 00:00:00 2001
|
|
||||||
From: Michael Catanzaro <mcatanzaro@igalia.com>
|
|
||||||
Date: Thu, 5 Apr 2018 11:52:24 -0500
|
|
||||||
Subject: Again disallow new tab action in app mode
|
|
||||||
|
|
||||||
Tabs still work, but only when opening a link
|
|
||||||
|
|
||||||
https://bugzilla.gnome.org/show_bug.cgi?id=795007
|
|
||||||
---
|
|
||||||
src/ephy-notebook.c | 7 +++++--
|
|
||||||
src/ephy-window.c | 1 +
|
|
||||||
2 files changed, 6 insertions(+), 2 deletions(-)
|
|
||||||
|
|
||||||
diff --git a/src/ephy-notebook.c b/src/ephy-notebook.c
|
|
||||||
index 3833862..4a05b93 100644
|
|
||||||
--- a/src/ephy-notebook.c
|
|
||||||
+++ b/src/ephy-notebook.c
|
|
||||||
@@ -344,10 +344,12 @@ static void
|
|
||||||
update_tabs_visibility (EphyNotebook *nb,
|
|
||||||
gboolean before_inserting)
|
|
||||||
{
|
|
||||||
+ EphyEmbedShellMode mode;
|
|
||||||
gboolean show_tabs = FALSE;
|
|
||||||
guint num;
|
|
||||||
EphyPrefsUITabsBarVisibilityPolicy policy;
|
|
||||||
|
|
||||||
+ mode = ephy_embed_shell_get_mode (EPHY_EMBED_SHELL (ephy_shell_get_default ()));
|
|
||||||
num = gtk_notebook_get_n_pages (GTK_NOTEBOOK (nb));
|
|
||||||
|
|
||||||
if (before_inserting)
|
|
||||||
@@ -356,8 +358,9 @@ update_tabs_visibility (EphyNotebook *nb,
|
|
||||||
policy = g_settings_get_enum (EPHY_SETTINGS_UI,
|
|
||||||
EPHY_PREFS_UI_TABS_BAR_VISIBILITY_POLICY);
|
|
||||||
|
|
||||||
- if (((policy == EPHY_PREFS_UI_TABS_BAR_VISIBILITY_POLICY_MORE_THAN_ONE && num > 1) ||
|
|
||||||
- policy == EPHY_PREFS_UI_TABS_BAR_VISIBILITY_POLICY_ALWAYS))
|
|
||||||
+ if (mode != EPHY_EMBED_SHELL_MODE_APPLICATION &&
|
|
||||||
+ ((policy == EPHY_PREFS_UI_TABS_BAR_VISIBILITY_POLICY_MORE_THAN_ONE && num > 1) ||
|
|
||||||
+ policy == EPHY_PREFS_UI_TABS_BAR_VISIBILITY_POLICY_ALWAYS))
|
|
||||||
show_tabs = TRUE;
|
|
||||||
|
|
||||||
/* Only show the tabs when the "tabs-allowed" property is TRUE. */
|
|
||||||
diff --git a/src/ephy-window.c b/src/ephy-window.c
|
|
||||||
index e7aa10f..2bdf442 100644
|
|
||||||
--- a/src/ephy-window.c
|
|
||||||
+++ b/src/ephy-window.c
|
|
||||||
@@ -2997,6 +2997,7 @@ static const char *disabled_actions_for_app_mode[] = { "open",
|
|
||||||
"save-as-application",
|
|
||||||
"encoding",
|
|
||||||
"bookmark-page",
|
|
||||||
+ "new-tab",
|
|
||||||
"home" };
|
|
||||||
|
|
||||||
static void
|
|
||||||
--
|
|
||||||
cgit v0.12
|
|
@ -1,34 +0,0 @@
|
|||||||
From 8c434004c0c5937c948cec6cccd95f547a0c14df Mon Sep 17 00:00:00 2001
|
|
||||||
From: Michael Catanzaro <mcatanzaro@igalia.com>
|
|
||||||
Date: Tue, 22 May 2018 21:06:32 -0500
|
|
||||||
Subject: [PATCH] session: Fix crash when JS opens an invalid URI
|
|
||||||
|
|
||||||
https://bugzilla.gnome.org/show_bug.cgi?id=795740
|
|
||||||
---
|
|
||||||
src/ephy-session.c | 9 ++++++++-
|
|
||||||
1 file changed, 8 insertions(+), 1 deletion(-)
|
|
||||||
|
|
||||||
diff --git a/src/ephy-session.c b/src/ephy-session.c
|
|
||||||
index 8a86cea..532930e 100644
|
|
||||||
--- a/src/ephy-session.c
|
|
||||||
+++ b/src/ephy-session.c
|
|
||||||
@@ -828,8 +828,15 @@ session_seems_sane (GList *windows)
|
|
||||||
SoupURI *uri;
|
|
||||||
gboolean sane = FALSE;
|
|
||||||
|
|
||||||
+ /* NULL URLs are possible when an invalid URL is opened by JS.
|
|
||||||
+ * E.g. <script>win = window.open("blah", "WIN");</script>
|
|
||||||
+ */
|
|
||||||
+ if (url == NULL)
|
|
||||||
+ continue;
|
|
||||||
+
|
|
||||||
/* Blank URLs can occur in some situations. Just ignore these, as they
|
|
||||||
- * are harmless and not an indicator of a corrupted session. */
|
|
||||||
+ * are harmless and not an indicator of a corrupted session.
|
|
||||||
+ */
|
|
||||||
if (strcmp (url, "") == 0)
|
|
||||||
continue;
|
|
||||||
|
|
||||||
--
|
|
||||||
libgit2 0.27.0
|
|
||||||
|
|
88
epiphany-uri-tester-fixes.patch
Normal file
88
epiphany-uri-tester-fixes.patch
Normal file
@ -0,0 +1,88 @@
|
|||||||
|
From facfa80c2b36ca7479de4323b77019965363dc6e Mon Sep 17 00:00:00 2001
|
||||||
|
From: Michael Catanzaro <mcatanzaro@igalia.com>
|
||||||
|
Date: Wed, 13 Jun 2018 11:10:23 -0500
|
||||||
|
Subject: [PATCH] uri-tester: Fix urlcache memory leak
|
||||||
|
|
||||||
|
Something went wrong with the git history related to e17dc362, and we
|
||||||
|
wound up allocating a string here that will never be freed. Whoops.
|
||||||
|
|
||||||
|
Then we pass it through GPOINTER_TO_INT() even though it is really a
|
||||||
|
random pointer and not going to be a meaningful integer value, and
|
||||||
|
return it as a gboolean. So we have a gboolean that is neither TRUE nor
|
||||||
|
FALSE, which is bad. But fortunately, it looks like it's never
|
||||||
|
explicitly compared to TRUE, so there should have been no behavioral
|
||||||
|
issue besides the leak.
|
||||||
|
|
||||||
|
This is related to #37.
|
||||||
|
---
|
||||||
|
embed/web-extension/ephy-uri-tester.c | 2 +-
|
||||||
|
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||||
|
|
||||||
|
diff --git a/embed/web-extension/ephy-uri-tester.c b/embed/web-extension/ephy-uri-tester.c
|
||||||
|
index 70f7cfd..a871f66 100644
|
||||||
|
--- a/embed/web-extension/ephy-uri-tester.c
|
||||||
|
+++ b/embed/web-extension/ephy-uri-tester.c
|
||||||
|
@@ -189,7 +189,7 @@ ephy_uri_tester_is_matched (EphyUriTester *tester,
|
||||||
|
|
||||||
|
/* Look for a match either by key or by pattern. */
|
||||||
|
if (ephy_uri_tester_is_matched_by_key (tester, opts, req_uri, page_uri, whitelist)) {
|
||||||
|
- g_hash_table_insert (urlcache, g_strdup (req_uri), g_strdup ("1"));
|
||||||
|
+ g_hash_table_insert (urlcache, g_strdup (req_uri), GINT_TO_POINTER (TRUE));
|
||||||
|
return TRUE;
|
||||||
|
}
|
||||||
|
|
||||||
|
--
|
||||||
|
libgit2 0.27.1
|
||||||
|
|
||||||
|
From d76a401971da4cecf746fa98cb94db6fa45fd88e Mon Sep 17 00:00:00 2001
|
||||||
|
From: Michael Catanzaro <mcatanzaro@igalia.com>
|
||||||
|
Date: Wed, 13 Jun 2018 11:32:53 -0500
|
||||||
|
Subject: [PATCH] uri-tester: Fix cache lookups when URI is not matched
|
||||||
|
|
||||||
|
This regressed in e17dc3627218aed60e2fa61486757b55dc804b6e.
|
||||||
|
g_hash_table_lookup() cannot distinguish between a missing value and a
|
||||||
|
NULL value. We are storing a NULL pointer (GINT_TO_POINTER (FALSE)) to
|
||||||
|
indicate that the URL is not a match, so the end result is that instead
|
||||||
|
of a cache hit indicating we should return FALSE, we instead get a cache
|
||||||
|
miss and then have to manually determine that we need to return FALSE.
|
||||||
|
|
||||||
|
This should be a performance fix only, it should not affect correctness.
|
||||||
|
|
||||||
|
Fixes #37
|
||||||
|
---
|
||||||
|
embed/web-extension/ephy-uri-tester.c | 7 ++++---
|
||||||
|
1 file changed, 4 insertions(+), 3 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/embed/web-extension/ephy-uri-tester.c b/embed/web-extension/ephy-uri-tester.c
|
||||||
|
index a871f66..5158dcb 100644
|
||||||
|
--- a/embed/web-extension/ephy-uri-tester.c
|
||||||
|
+++ b/embed/web-extension/ephy-uri-tester.c
|
||||||
|
@@ -178,14 +178,14 @@ ephy_uri_tester_is_matched (EphyUriTester *tester,
|
||||||
|
const char *page_uri,
|
||||||
|
gboolean whitelist)
|
||||||
|
{
|
||||||
|
- char *value;
|
||||||
|
+ gpointer is_matched;
|
||||||
|
GHashTable *urlcache = tester->urlcache;
|
||||||
|
if (whitelist)
|
||||||
|
urlcache = tester->whitelisted_urlcache;
|
||||||
|
|
||||||
|
/* Check cached URLs first. */
|
||||||
|
- if ((value = g_hash_table_lookup (urlcache, req_uri)))
|
||||||
|
- return GPOINTER_TO_INT (value);
|
||||||
|
+ if (g_hash_table_lookup_extended (urlcache, req_uri, NULL, &is_matched))
|
||||||
|
+ return GPOINTER_TO_INT (is_matched);
|
||||||
|
|
||||||
|
/* Look for a match either by key or by pattern. */
|
||||||
|
if (ephy_uri_tester_is_matched_by_key (tester, opts, req_uri, page_uri, whitelist)) {
|
||||||
|
@@ -199,6 +199,7 @@ ephy_uri_tester_is_matched (EphyUriTester *tester,
|
||||||
|
return TRUE;
|
||||||
|
}
|
||||||
|
|
||||||
|
+ /* No match. */
|
||||||
|
g_hash_table_insert (urlcache, g_strdup (req_uri), GINT_TO_POINTER (FALSE));
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
--
|
||||||
|
libgit2 0.27.1
|
||||||
|
|
@ -1,3 +1,30 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Wed Jun 13 23:25:20 UTC 2018 - bjorn.lie@gmail.com
|
||||||
|
|
||||||
|
- Add epiphany-uri-tester-fixes.patch: Fix urlcache memory leak and
|
||||||
|
fix cache lookups when URI is not matched
|
||||||
|
(glgo#GNOME/epiphany#37).
|
||||||
|
- Add
|
||||||
|
epip-revert-gsb-storage-dont-hardcode-Linux-threat-lists.patch:
|
||||||
|
Revert gsb-storage: Don't hardcode Linux threat lists.
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Fri Jun 8 16:55:05 UTC 2018 - bjorn.lie@gmail.com
|
||||||
|
|
||||||
|
- Update to version 3.28.3.1:
|
||||||
|
+ Fix missing symbol in 3.28.3 (glgo#GNOME/epiphany#33).
|
||||||
|
- Changes from version 3.28.3:
|
||||||
|
+ Fix CVE-2018-11396/CVE-2018-12016 (bgo#795740).
|
||||||
|
+ Allow Ctrl+T in app mode again due to unintended consequences
|
||||||
|
(bgo#796204).
|
||||||
|
+ Don't remember passwords when the setting is disabled
|
||||||
|
(bgo#796219).
|
||||||
|
+ Fix password manager crash on chase.com
|
||||||
|
(glgo#GNOME/epiphany#11).
|
||||||
|
- Drop epiphany-fix-crash-CVE-2018-11396.patch: Fixed upstream.
|
||||||
|
- Drop epiphany-bring-back-tabs-webapp.patch: Upstream reverted the
|
||||||
|
change too, so patch no longer needed.
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Tue May 22 16:22:16 UTC 2018 - bjorn.lie@gmail.com
|
Tue May 22 16:22:16 UTC 2018 - bjorn.lie@gmail.com
|
||||||
|
|
||||||
|
@ -17,7 +17,7 @@
|
|||||||
|
|
||||||
|
|
||||||
Name: epiphany
|
Name: epiphany
|
||||||
Version: 3.28.2.1
|
Version: 3.28.3.1
|
||||||
Release: 0
|
Release: 0
|
||||||
Summary: GNOME Web Browser
|
Summary: GNOME Web Browser
|
||||||
License: GPL-3.0-or-later
|
License: GPL-3.0-or-later
|
||||||
@ -25,11 +25,10 @@ Group: Productivity/Networking/Web/Browsers
|
|||||||
URL: https://wiki.gnome.org/Apps/Web
|
URL: https://wiki.gnome.org/Apps/Web
|
||||||
Source0: http://download.gnome.org/sources/epiphany/3.28/%{name}-%{version}.tar.xz
|
Source0: http://download.gnome.org/sources/epiphany/3.28/%{name}-%{version}.tar.xz
|
||||||
Source99: %{name}-rpmlintrc
|
Source99: %{name}-rpmlintrc
|
||||||
# PATCH-FIX-UPSTREAM epiphany-bring-back-tabs-webapp.patch -- Revert the revert for tabs in webapps.
|
# PATCH-FIX-UPSTREAM epiphany-uri-tester-fixes.patch -- Fix urlcache memory leak and Fix cache lookups when URI is not matched
|
||||||
# FIXME Drop epiphany-bring-back-tabs-webapp.patch on versionbump to 3.29, fixed differently on master.
|
Patch0: epiphany-uri-tester-fixes.patch
|
||||||
Patch0: epiphany-bring-back-tabs-webapp.patch
|
# PATCH-FIX-UPSTREAM epip-revert-gsb-storage-dont-hardcode-Linux-threat-lists.patch -- Revert "gsb-storage: Don't hardcode Linux threat lists"
|
||||||
# PATCH-FIX-UPSTREAM epiphany-fix-crash-CVE-2018-11396.patch CVE-2018-11396 bgo#795740 boo#1094464 -- session: Fix crash when JS opens an invalid URI
|
Patch1: epip-revert-gsb-storage-dont-hardcode-Linux-threat-lists.patch
|
||||||
Patch1: epiphany-fix-crash-CVE-2018-11396.patch
|
|
||||||
|
|
||||||
BuildRequires: fdupes
|
BuildRequires: fdupes
|
||||||
BuildRequires: meson
|
BuildRequires: meson
|
||||||
@ -99,9 +98,7 @@ search results from Web (epiphany)
|
|||||||
%lang_package
|
%lang_package
|
||||||
|
|
||||||
%prep
|
%prep
|
||||||
%autosetup -N
|
%autosetup -p1
|
||||||
%patch0 -p1 -R
|
|
||||||
%patch1 -p1
|
|
||||||
translation-update-upstream
|
translation-update-upstream
|
||||||
|
|
||||||
%build
|
%build
|
||||||
|
Loading…
Reference in New Issue
Block a user