tigervnc/u_tigervnc-Add-autoaccept-parameter.patch
Joan Torres 543e26d9be - Update to tigervnc 1.14.1
* Default installation of native viewer can once again handle VncAuth
  * Graphic acceleration now can now be disabled through the vncserver config file the same way as other features
  * Command vncpasswd can again correctly update passwords
  * Native viewer once again consider passwd file that contain more than one password valid
  * Native viewer can once again connect to RealVNC servers
  * Users of x0vncserver should no longer experience the mouse cursor moving to the upper left corner
  * H264 encoding no longer causes crashing
- Removed patches (no longer needed):
  * u_tigervnc-Change-button-layout-in-ServerDialog.patch
- Refreshed patches:
  * n_tigervnc-Date-time.patch
  * n_tigervnc-Dont-sign-java-client.patch
  * n_tigervnc-reproducible-jar-mtime.patch
  * u_tigervnc-Add-autoaccept-parameter.patch
  * u_tigervnc-Build-libXvnc-as-separate-library.patch
  * u_tigervnc-Ignore-epipe-on-write.patch
- Fix path on vncviewer desktop file. Use %use_update_alternative

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/tigervnc?expand=0&rev=268
2024-11-04 12:29:12 +00:00

50 lines
2.0 KiB
Diff

Index: tigervnc-1.12.0/java/com/tigervnc/rfb/CSecurityTLS.java
===================================================================
--- tigervnc-1.12.0.orig/java/com/tigervnc/rfb/CSecurityTLS.java
+++ tigervnc-1.12.0/java/com/tigervnc/rfb/CSecurityTLS.java
@@ -66,6 +66,9 @@ public class CSecurityTLS extends CSecurity {
public static StringParameter X509CRL
= new StringParameter("X509CRL",
"X509 CRL file", "", Configuration.ConfigurationObject.ConfViewer);
+ public static StringParameter x509autoaccept
+ = new StringParameter("x509autoaccept",
+ "X509 Certificate SHA-1 fingerprint", "", Configuration.ConfigurationObject.ConfViewer);
private void initGlobal()
{
@@ -84,6 +87,7 @@ public class CSecurityTLS extends CSecurity {
setDefaults();
cafile = X509CA.getData();
crlfile = X509CRL.getData();
+ certautoaccept = x509autoaccept.getData();
}
public static String getDefaultCA() {
@@ -277,6 +281,7 @@ public class CSecurityTLS extends CSecurity {
"do you want to continue?"))
throw new AuthFailureException("server certificate has expired");
}
+ String thumbprint = getThumbprint(cert);
File vncDir = new File(FileUtils.getVncStateDir());
if (!vncDir.exists()) {
try {
@@ -336,6 +341,9 @@ public class CSecurityTLS extends CSecurity {
store_pubkey(dbPath, client.getServerName().toLowerCase(), pk);
} catch (java.lang.Exception e) {
if (e.getCause() instanceof CertPathBuilderException) {
+ if (certautoaccept != null && thumbprint.equalsIgnoreCase(certautoaccept)) {
+ return;
+ }
vlog.debug("Server host not previously known");
vlog.debug(info);
String text =
@@ -522,7 +530,7 @@ public class CSecurityTLS extends CSecurity {
private SSLEngineManager manager;
private boolean anon;
- private String cafile, crlfile;
+ private String cafile, crlfile, certautoaccept;
private FdInStream is;
private FdOutStream os;