2015-02-23 21:32:13 +01:00
|
|
|
# HG changeset patch
|
2019-07-09 23:21:11 +02:00
|
|
|
# User msirringhaus@suse.de
|
|
|
|
# Date 1559294891 -7200
|
|
|
|
# Fri May 31 11:28:11 2019 +0200
|
|
|
|
# Node ID c2aa7198fb925e7fde96abf65b6f68b9b755f112
|
2020-06-02 16:55:49 +02:00
|
|
|
# Parent b517aa8dfa37d729db9590fe699caa38f899dfba
|
2012-03-01 10:09:12 +01:00
|
|
|
Description: Add KDE integration to Firefox (toolkit parts)
|
|
|
|
Author: Wolfgang Rosenauer <wolfgang@rosenauer.org>
|
|
|
|
Author: Lubos Lunak <lunak@suse.com>
|
|
|
|
Bug: https://bugzilla.mozilla.org/show_bug.cgi?id=140751
|
|
|
|
https://bugzilla.novell.com/show_bug.cgi?id=170055
|
|
|
|
|
2014-12-02 23:01:52 +01:00
|
|
|
diff --git a/modules/libpref/Preferences.cpp b/modules/libpref/Preferences.cpp
|
|
|
|
--- a/modules/libpref/Preferences.cpp
|
|
|
|
+++ b/modules/libpref/Preferences.cpp
|
2020-04-07 14:21:48 +02:00
|
|
|
@@ -83,16 +83,17 @@
|
2018-01-23 10:55:12 +01:00
|
|
|
#include "nsXPCOM.h"
|
|
|
|
#include "nsXULAppAPI.h"
|
|
|
|
#include "nsZipArchive.h"
|
|
|
|
#include "plbase64.h"
|
2015-12-17 01:06:36 +01:00
|
|
|
#include "PLDHashTable.h"
|
2018-01-23 10:55:12 +01:00
|
|
|
#include "plstr.h"
|
|
|
|
#include "prlink.h"
|
2019-09-09 08:28:12 +02:00
|
|
|
#include "xpcpublic.h"
|
2018-01-23 10:55:12 +01:00
|
|
|
+#include "nsKDEUtils.h"
|
2011-06-01 08:05:09 +02:00
|
|
|
|
2019-09-09 08:28:12 +02:00
|
|
|
#ifdef DEBUG
|
|
|
|
# include <map>
|
2018-10-29 16:21:53 +01:00
|
|
|
#endif
|
|
|
|
|
2019-09-09 08:28:12 +02:00
|
|
|
#ifdef MOZ_MEMORY
|
|
|
|
# include "mozmemory.h"
|
2018-01-23 10:55:12 +01:00
|
|
|
#endif
|
2020-06-02 16:55:49 +02:00
|
|
|
@@ -4566,25 +4567,37 @@ nsresult Preferences::InitInitialObjects
|
2018-01-23 10:55:12 +01:00
|
|
|
// application pref files for backwards compatibility.
|
2011-11-09 13:04:11 +01:00
|
|
|
static const char* specialFiles[] = {
|
2011-07-23 16:46:28 +02:00
|
|
|
#if defined(XP_MACOSX)
|
2011-11-09 13:04:11 +01:00
|
|
|
"macprefs.js"
|
2011-06-01 08:05:09 +02:00
|
|
|
#elif defined(XP_WIN)
|
2011-11-09 13:04:11 +01:00
|
|
|
"winpref.js"
|
2011-06-01 08:05:09 +02:00
|
|
|
#elif defined(XP_UNIX)
|
2011-11-09 13:04:11 +01:00
|
|
|
"unix.js"
|
|
|
|
+ , "" // placeholder for KDE (empty is otherwise harmless)
|
2019-03-19 23:01:55 +01:00
|
|
|
# if defined(_AIX)
|
2018-01-23 10:55:12 +01:00
|
|
|
,
|
|
|
|
"aix.js"
|
2019-03-19 23:01:55 +01:00
|
|
|
# endif
|
2011-07-23 16:46:28 +02:00
|
|
|
#elif defined(XP_BEOS)
|
2011-11-09 13:04:11 +01:00
|
|
|
"beos.js"
|
2011-06-01 08:05:09 +02:00
|
|
|
#endif
|
2011-11-09 13:04:11 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
+ if(nsKDEUtils::kdeSession()) { // TODO what if some setup actually requires the helper?
|
2012-02-01 14:37:15 +01:00
|
|
|
+ for(int i = 0;
|
2014-04-27 18:09:32 +02:00
|
|
|
+ i < MOZ_ARRAY_LENGTH(specialFiles);
|
2011-11-09 13:04:11 +01:00
|
|
|
+ ++i ) {
|
|
|
|
+ if( *specialFiles[ i ] == '\0' ) {
|
|
|
|
+ specialFiles[ i ] = "kde.js";
|
|
|
|
+ break;
|
2011-06-01 08:05:09 +02:00
|
|
|
+ }
|
|
|
|
+ }
|
2011-11-09 13:04:11 +01:00
|
|
|
+ }
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
2019-01-29 19:07:12 +01:00
|
|
|
rv = pref_LoadPrefsInDir(defaultPrefDir, specialFiles,
|
|
|
|
ArrayLength(specialFiles));
|
2018-01-23 10:55:12 +01:00
|
|
|
if (NS_FAILED(rv)) {
|
2011-11-09 13:04:11 +01:00
|
|
|
NS_WARNING("Error parsing application default preferences.");
|
2018-01-23 10:55:12 +01:00
|
|
|
}
|
2011-06-01 08:05:09 +02:00
|
|
|
|
2011-07-23 16:46:28 +02:00
|
|
|
// Load jar:$app/omni.jar!/defaults/preferences/*.js
|
2012-07-16 10:13:51 +02:00
|
|
|
// or jar:$gre/omni.jar!/defaults/preferences/*.js.
|
2020-06-02 16:55:49 +02:00
|
|
|
@@ -4630,17 +4643,17 @@ nsresult Preferences::InitInitialObjects
|
2018-03-13 20:46:06 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
nsCOMPtr<nsIFile> path = do_QueryInterface(elem);
|
|
|
|
if (!path) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Do we care if a file provided by this process fails to load?
|
|
|
|
- pref_LoadPrefsInDir(path, nullptr, 0);
|
|
|
|
+ pref_LoadPrefsInDir(path, specialFiles, ArrayLength(specialFiles));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-06-25 22:56:47 +02:00
|
|
|
if (XRE_IsParentProcess()) {
|
|
|
|
SetupTelemetryPref();
|
|
|
|
}
|
|
|
|
|
- Mozilla Firefox 76.0
* Lockwise improvements
* Improvements in Picture-in-Picture feature
* Support Audio Worklets
MFSA-2020-16 (bsc#1171186)
* CVE-2020-12387 (bmo#1545345)
Use-after-free during worker shutdown
* CVE-2020-12388 (bmo#1618911)
Sandbox escape with improperly guarded Access Tokens
* CVE-2020-12389 (bmo#1554110)
Sandbox escape with improperly separated process types
* CVE-2020-6831 (bmo#1632241)
Buffer overflow in SCTP chunk input validation
* CVE-2020-12390 (bmo#1141959)
Incorrect serialization of nsIPrincipal.origin for IPv6 addresses
* CVE-2020-12391 (bmo#1457100)
Content-Security-Policy bypass using object elements
* CVE-2020-12392 (bmo#1614468)
Arbitrary local file access with 'Copy as cURL'
* CVE-2020-12393 (bmo#1615471)
Devtools' 'Copy as cURL' feature did not fully escape
website-controlled data, potentially leading to command injection
* CVE-2020-12394 (bmo#1628288)
URL spoofing in location bar when unfocussed
* CVE-2020-12395 (bmo#1595886, bmo#1611482, bmo#1614704, bmo#1624098,
bmo#1625749, bmo#1626382, bmo#1628076, bmo#1631508)
Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8
* CVE-2020-12396 (bmo#1339601, bmo#1611938, bmo#1620488,
bmo#1622291, bmo#1627644)
Memory safety bugs fixed in Firefox 76
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=825
2020-05-05 21:25:39 +02:00
|
|
|
if (aIsStartup) {
|
2016-03-07 17:25:29 +01:00
|
|
|
diff --git a/modules/libpref/moz.build b/modules/libpref/moz.build
|
|
|
|
--- a/modules/libpref/moz.build
|
|
|
|
+++ b/modules/libpref/moz.build
|
2020-03-12 20:14:24 +01:00
|
|
|
@@ -114,16 +114,20 @@ EXPORTS.mozilla += [
|
2018-01-23 10:55:12 +01:00
|
|
|
]
|
2019-10-25 11:13:30 +02:00
|
|
|
EXPORTS.mozilla += sorted(['!' + g for g in gen_h])
|
2018-01-23 10:55:12 +01:00
|
|
|
|
2017-09-05 12:10:37 +02:00
|
|
|
UNIFIED_SOURCES += [
|
|
|
|
'Preferences.cpp',
|
2018-10-29 16:21:53 +01:00
|
|
|
'SharedPrefMap.cpp',
|
2016-03-07 17:25:29 +01:00
|
|
|
]
|
|
|
|
|
|
|
|
+LOCAL_INCLUDES += [
|
2019-05-22 22:38:29 +02:00
|
|
|
+ '/toolkit/xre'
|
2016-03-07 17:25:29 +01:00
|
|
|
+]
|
|
|
|
+
|
2019-10-25 11:13:30 +02:00
|
|
|
gen_all_tuple = tuple(gen_h + gen_cpp + gen_rs)
|
2019-05-22 22:38:29 +02:00
|
|
|
|
2019-10-25 11:13:30 +02:00
|
|
|
GENERATED_FILES += [gen_all_tuple]
|
2016-03-07 17:25:29 +01:00
|
|
|
|
2019-10-25 11:13:30 +02:00
|
|
|
static_pref_list = GENERATED_FILES[gen_all_tuple]
|
|
|
|
static_pref_list.script = 'init/generate_static_pref_list.py:emit_code'
|
|
|
|
static_pref_list.inputs = ['init/StaticPrefList.yaml']
|
2016-03-07 17:25:29 +01:00
|
|
|
|
2013-05-14 16:33:59 +02:00
|
|
|
diff --git a/python/mozbuild/mozpack/chrome/flags.py b/python/mozbuild/mozpack/chrome/flags.py
|
|
|
|
--- a/python/mozbuild/mozpack/chrome/flags.py
|
|
|
|
+++ b/python/mozbuild/mozpack/chrome/flags.py
|
2019-09-09 08:28:12 +02:00
|
|
|
@@ -227,16 +227,17 @@ class Flags(OrderedDict):
|
2013-05-14 16:33:59 +02:00
|
|
|
'contentaccessible': Flag,
|
|
|
|
'os': StringFlag,
|
|
|
|
'osversion': VersionFlag,
|
|
|
|
'abi': StringFlag,
|
|
|
|
'platform': Flag,
|
|
|
|
'xpcnativewrappers': Flag,
|
|
|
|
'tablet': Flag,
|
2015-01-14 19:32:16 +01:00
|
|
|
'process': StringFlag,
|
|
|
|
+ 'desktop': StringFlag,
|
2013-05-14 16:33:59 +02:00
|
|
|
}
|
|
|
|
RE = re.compile(r'([!<>=]+)')
|
|
|
|
|
|
|
|
def __init__(self, *flags):
|
|
|
|
'''
|
|
|
|
Initialize a set of flags given in string form.
|
|
|
|
flags = Flags('contentaccessible=yes', 'appversion>=3.5')
|
|
|
|
'''
|
|
|
|
diff --git a/python/mozbuild/mozpack/chrome/manifest.py b/python/mozbuild/mozpack/chrome/manifest.py
|
|
|
|
--- a/python/mozbuild/mozpack/chrome/manifest.py
|
|
|
|
+++ b/python/mozbuild/mozpack/chrome/manifest.py
|
- Mozilla Firefox 73.0
* Added support for setting a default zoom level applicable for all
web content
* High-contrast mode has been updated to allow background images
* Improved audio quality when playing back audio at a faster or
slower speed
* Added NextDNS as alternative option for DNS over HTTPS
MFSA 2020-05 (bsc#1163368)
* CVE-2020-6796 (bmo#1610426)
Missing bounds check on shared memory read in the parent process
* CVE-2020-6797 (bmo#1596668) (MacOS X only)
Extensions granted downloads.open permission could open arbitrary
applications on Mac OSX
* CVE-2020-6798 (bmo#1602944)
Incorrect parsing of template tag could result in JavaScript injection
* CVE-2020-6799 (bmo#1606596) (Windows only)
Arbitrary code execution when opening pdf links from other
applications, when Firefox is configured as default pdf reader
* CVE-2020-6800 (bmo#1595786,bmo#1596706,bmo#1598543,bmo#1604851,
bmo#1608580,bmo#1608785,bmo#1605777)
Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5
* CVE-2020-6801 (bmo#1601024,bmo#1601712,bmo#1604836,bmo#1606492)
Memory safety bugs fixed in Firefox 73
- updated requirements
* rust >= 1.39
* NSS >= 3.49.2
* rust-cbindgen >= 0.12.0
- rebased patches
- removed obsolete patch
* mozilla-bmo1601707.patch
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=802
2020-02-12 15:14:39 +01:00
|
|
|
@@ -37,16 +37,17 @@ class ManifestEntry(object):
|
2013-05-14 16:33:59 +02:00
|
|
|
'platformversion',
|
|
|
|
'os',
|
|
|
|
'osversion',
|
|
|
|
'abi',
|
|
|
|
'xpcnativewrappers',
|
|
|
|
'tablet',
|
2015-01-14 19:32:16 +01:00
|
|
|
'process',
|
2017-11-15 00:17:59 +01:00
|
|
|
'contentaccessible',
|
|
|
|
+ 'desktop',
|
2013-05-14 16:33:59 +02:00
|
|
|
]
|
|
|
|
|
|
|
|
def __init__(self, base, *flags):
|
|
|
|
'''
|
|
|
|
Initialize a manifest entry with the given base path and flags.
|
|
|
|
'''
|
|
|
|
self.base = base
|
|
|
|
self.flags = Flags(*flags)
|
2014-12-02 23:01:52 +01:00
|
|
|
diff --git a/toolkit/components/downloads/moz.build b/toolkit/components/downloads/moz.build
|
|
|
|
--- a/toolkit/components/downloads/moz.build
|
|
|
|
+++ b/toolkit/components/downloads/moz.build
|
2020-03-12 20:14:24 +01:00
|
|
|
@@ -46,10 +46,14 @@ XPCOM_MANIFESTS += [
|
2018-01-23 10:55:12 +01:00
|
|
|
|
2018-05-08 15:14:23 +02:00
|
|
|
if CONFIG['MOZ_PLACES']:
|
|
|
|
EXTRA_JS_MODULES += [
|
|
|
|
'DownloadHistory.jsm',
|
|
|
|
]
|
2014-12-02 23:01:52 +01:00
|
|
|
|
|
|
|
FINAL_LIBRARY = 'xul'
|
|
|
|
|
2018-01-23 10:55:12 +01:00
|
|
|
+LOCAL_INCLUDES += [
|
|
|
|
+ '/toolkit/xre'
|
|
|
|
+]
|
|
|
|
+
|
2018-05-08 15:14:23 +02:00
|
|
|
with Files('**'):
|
2018-10-29 16:21:53 +01:00
|
|
|
BUG_COMPONENT = ('Toolkit', 'Downloads API')
|
2019-05-22 22:38:29 +02:00
|
|
|
diff --git a/toolkit/mozapps/downloads/HelperAppDlg.jsm b/toolkit/mozapps/downloads/HelperAppDlg.jsm
|
|
|
|
--- a/toolkit/mozapps/downloads/HelperAppDlg.jsm
|
|
|
|
+++ b/toolkit/mozapps/downloads/HelperAppDlg.jsm
|
- Mozilla Firefox 76.0
* Lockwise improvements
* Improvements in Picture-in-Picture feature
* Support Audio Worklets
MFSA-2020-16 (bsc#1171186)
* CVE-2020-12387 (bmo#1545345)
Use-after-free during worker shutdown
* CVE-2020-12388 (bmo#1618911)
Sandbox escape with improperly guarded Access Tokens
* CVE-2020-12389 (bmo#1554110)
Sandbox escape with improperly separated process types
* CVE-2020-6831 (bmo#1632241)
Buffer overflow in SCTP chunk input validation
* CVE-2020-12390 (bmo#1141959)
Incorrect serialization of nsIPrincipal.origin for IPv6 addresses
* CVE-2020-12391 (bmo#1457100)
Content-Security-Policy bypass using object elements
* CVE-2020-12392 (bmo#1614468)
Arbitrary local file access with 'Copy as cURL'
* CVE-2020-12393 (bmo#1615471)
Devtools' 'Copy as cURL' feature did not fully escape
website-controlled data, potentially leading to command injection
* CVE-2020-12394 (bmo#1628288)
URL spoofing in location bar when unfocussed
* CVE-2020-12395 (bmo#1595886, bmo#1611482, bmo#1614704, bmo#1624098,
bmo#1625749, bmo#1626382, bmo#1628076, bmo#1631508)
Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8
* CVE-2020-12396 (bmo#1339601, bmo#1611938, bmo#1620488,
bmo#1622291, bmo#1627644)
Memory safety bugs fixed in Firefox 76
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=825
2020-05-05 21:25:39 +02:00
|
|
|
@@ -1205,36 +1205,66 @@ nsUnknownContentTypeDialog.prototype = {
|
2019-09-04 10:35:37 +02:00
|
|
|
params.handlerApp &&
|
|
|
|
params.handlerApp.executable &&
|
|
|
|
params.handlerApp.executable.isFile()
|
|
|
|
) {
|
2017-03-07 09:35:10 +01:00
|
|
|
// Remember the file they chose to run.
|
|
|
|
this.chosenApp = params.handlerApp;
|
|
|
|
}
|
2018-05-08 15:14:23 +02:00
|
|
|
} else if ("@mozilla.org/applicationchooser;1" in Cc) {
|
|
|
|
- var nsIApplicationChooser = Ci.nsIApplicationChooser;
|
2019-09-04 10:35:37 +02:00
|
|
|
- var appChooser = Cc["@mozilla.org/applicationchooser;1"].createInstance(
|
|
|
|
- nsIApplicationChooser
|
|
|
|
- );
|
|
|
|
- appChooser.init(
|
|
|
|
- this.mDialog,
|
|
|
|
- this.dialogElement("strings").getString("chooseAppFilePickerTitle")
|
|
|
|
- );
|
2017-03-07 09:35:10 +01:00
|
|
|
- var contentTypeDialogObj = this;
|
|
|
|
- let appChooserCallback = function appChooserCallback_done(aResult) {
|
|
|
|
- if (aResult) {
|
2019-09-04 10:35:37 +02:00
|
|
|
- contentTypeDialogObj.chosenApp = aResult.QueryInterface(
|
|
|
|
- Ci.nsILocalHandlerApp
|
|
|
|
- );
|
2018-05-26 18:05:54 +02:00
|
|
|
- }
|
|
|
|
- contentTypeDialogObj.finishChooseApp();
|
|
|
|
- };
|
|
|
|
- appChooser.open(this.mLauncher.MIMEInfo.MIMEType, appChooserCallback);
|
|
|
|
- // The finishChooseApp is called from appChooserCallback
|
|
|
|
- return;
|
2017-03-07 09:35:10 +01:00
|
|
|
+ // handle the KDE case which is implemented in the filepicker
|
|
|
|
+ // therefore falling back to Gtk2 like behaviour if KDE is running
|
2017-09-28 10:44:46 +02:00
|
|
|
+ // FIXME this should be better handled in the nsIApplicationChooser
|
|
|
|
+ // interface
|
2017-03-07 09:35:10 +01:00
|
|
|
+ var env = Components.classes["@mozilla.org/process/environment;1"]
|
|
|
|
+ .getService(Components.interfaces.nsIEnvironment);
|
|
|
|
+ if (env.get('KDE_FULL_SESSION') == "true")
|
|
|
|
+ {
|
2018-05-26 18:05:54 +02:00
|
|
|
+ var nsIFilePicker = Ci.nsIFilePicker;
|
|
|
|
+ var fp = Cc["@mozilla.org/filepicker;1"]
|
|
|
|
+ .createInstance(nsIFilePicker);
|
2017-03-07 09:35:10 +01:00
|
|
|
+ fp.init(this.mDialog,
|
|
|
|
+ this.dialogElement("strings").getString("chooseAppFilePickerTitle"),
|
|
|
|
+ nsIFilePicker.modeOpen);
|
|
|
|
+
|
|
|
|
+ fp.appendFilters(nsIFilePicker.filterApps);
|
|
|
|
+
|
2018-05-26 18:05:54 +02:00
|
|
|
+ fp.open(aResult => {
|
|
|
|
+ if (aResult == nsIFilePicker.returnOK && fp.file) {
|
|
|
|
+ // Remember the file they chose to run.
|
|
|
|
+ var localHandlerApp =
|
|
|
|
+ Cc["@mozilla.org/uriloader/local-handler-app;1"].
|
|
|
|
+ createInstance(Ci.nsILocalHandlerApp);
|
|
|
|
+ localHandlerApp.executable = fp.file;
|
|
|
|
+ this.chosenApp = localHandlerApp;
|
|
|
|
+ }
|
|
|
|
+ this.finishChooseApp();
|
|
|
|
+ });
|
2017-03-07 09:35:10 +01:00
|
|
|
+ } else {
|
2018-05-08 15:14:23 +02:00
|
|
|
+ var nsIApplicationChooser = Ci.nsIApplicationChooser;
|
2019-09-04 10:35:37 +02:00
|
|
|
+ var appChooser = Cc["@mozilla.org/applicationchooser;1"].createInstance(
|
|
|
|
+ nsIApplicationChooser
|
|
|
|
+ );
|
|
|
|
+ appChooser.init(
|
|
|
|
+ this.mDialog,
|
|
|
|
+ this.dialogElement("strings").getString("chooseAppFilePickerTitle")
|
|
|
|
+ );
|
2017-03-07 09:35:10 +01:00
|
|
|
+ var contentTypeDialogObj = this;
|
|
|
|
+ let appChooserCallback = function appChooserCallback_done(aResult) {
|
|
|
|
+ if (aResult) {
|
2019-09-04 10:35:37 +02:00
|
|
|
+ contentTypeDialogObj.chosenApp = aResult.QueryInterface(
|
|
|
|
+ Ci.nsILocalHandlerApp
|
|
|
|
+ );
|
2017-03-07 09:35:10 +01:00
|
|
|
+ }
|
|
|
|
+ contentTypeDialogObj.finishChooseApp();
|
|
|
|
+ };
|
|
|
|
+ appChooser.open(this.mLauncher.MIMEInfo.MIMEType, appChooserCallback);
|
|
|
|
+ // The finishChooseApp is called from appChooserCallback
|
|
|
|
+ return;
|
|
|
|
+ }
|
2017-09-28 10:44:46 +02:00
|
|
|
} else {
|
2018-05-08 15:14:23 +02:00
|
|
|
var nsIFilePicker = Ci.nsIFilePicker;
|
2019-09-04 10:35:37 +02:00
|
|
|
var fp = Cc["@mozilla.org/filepicker;1"].createInstance(nsIFilePicker);
|
|
|
|
fp.init(
|
|
|
|
this.mDialog,
|
|
|
|
this.dialogElement("strings").getString("chooseAppFilePickerTitle"),
|
|
|
|
nsIFilePicker.modeOpen
|
|
|
|
);
|
2011-06-01 08:05:09 +02:00
|
|
|
diff --git a/toolkit/system/unixproxy/nsUnixSystemProxySettings.cpp b/toolkit/system/unixproxy/nsUnixSystemProxySettings.cpp
|
|
|
|
--- a/toolkit/system/unixproxy/nsUnixSystemProxySettings.cpp
|
|
|
|
+++ b/toolkit/system/unixproxy/nsUnixSystemProxySettings.cpp
|
- Mozilla Firefox 73.0
* Added support for setting a default zoom level applicable for all
web content
* High-contrast mode has been updated to allow background images
* Improved audio quality when playing back audio at a faster or
slower speed
* Added NextDNS as alternative option for DNS over HTTPS
MFSA 2020-05 (bsc#1163368)
* CVE-2020-6796 (bmo#1610426)
Missing bounds check on shared memory read in the parent process
* CVE-2020-6797 (bmo#1596668) (MacOS X only)
Extensions granted downloads.open permission could open arbitrary
applications on Mac OSX
* CVE-2020-6798 (bmo#1602944)
Incorrect parsing of template tag could result in JavaScript injection
* CVE-2020-6799 (bmo#1606596) (Windows only)
Arbitrary code execution when opening pdf links from other
applications, when Firefox is configured as default pdf reader
* CVE-2020-6800 (bmo#1595786,bmo#1596706,bmo#1598543,bmo#1604851,
bmo#1608580,bmo#1608785,bmo#1605777)
Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5
* CVE-2020-6801 (bmo#1601024,bmo#1601712,bmo#1604836,bmo#1606492)
Memory safety bugs fixed in Firefox 73
- updated requirements
* rust >= 1.39
* NSS >= 3.49.2
* rust-cbindgen >= 0.12.0
- rebased patches
- removed obsolete patch
* mozilla-bmo1601707.patch
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=802
2020-02-12 15:14:39 +01:00
|
|
|
@@ -13,16 +13,17 @@
|
2011-06-01 08:05:09 +02:00
|
|
|
#include "nsPrintfCString.h"
|
2015-11-03 16:49:03 +01:00
|
|
|
#include "nsNetCID.h"
|
2011-06-01 08:05:09 +02:00
|
|
|
#include "nsNetUtil.h"
|
|
|
|
#include "nsISupportsPrimitives.h"
|
2012-03-01 10:09:12 +01:00
|
|
|
#include "nsIGSettingsService.h"
|
2012-06-05 20:01:53 +02:00
|
|
|
#include "nsInterfaceHashtable.h"
|
2012-11-20 21:34:15 +01:00
|
|
|
#include "mozilla/Attributes.h"
|
2013-01-07 21:49:28 +01:00
|
|
|
#include "nsIURI.h"
|
2011-06-01 08:05:09 +02:00
|
|
|
+#include "nsKDEUtils.h"
|
|
|
|
|
2019-05-22 22:38:29 +02:00
|
|
|
using namespace mozilla;
|
|
|
|
|
2015-05-10 22:12:38 +02:00
|
|
|
class nsUnixSystemProxySettings final : public nsISystemProxySettings {
|
2019-01-29 19:07:12 +01:00
|
|
|
public:
|
2011-06-01 08:05:09 +02:00
|
|
|
NS_DECL_ISUPPORTS
|
|
|
|
NS_DECL_NSISYSTEMPROXYSETTINGS
|
|
|
|
|
- Mozilla Firefox 73.0
* Added support for setting a default zoom level applicable for all
web content
* High-contrast mode has been updated to allow background images
* Improved audio quality when playing back audio at a faster or
slower speed
* Added NextDNS as alternative option for DNS over HTTPS
MFSA 2020-05 (bsc#1163368)
* CVE-2020-6796 (bmo#1610426)
Missing bounds check on shared memory read in the parent process
* CVE-2020-6797 (bmo#1596668) (MacOS X only)
Extensions granted downloads.open permission could open arbitrary
applications on Mac OSX
* CVE-2020-6798 (bmo#1602944)
Incorrect parsing of template tag could result in JavaScript injection
* CVE-2020-6799 (bmo#1606596) (Windows only)
Arbitrary code execution when opening pdf links from other
applications, when Firefox is configured as default pdf reader
* CVE-2020-6800 (bmo#1595786,bmo#1596706,bmo#1598543,bmo#1604851,
bmo#1608580,bmo#1608785,bmo#1605777)
Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5
* CVE-2020-6801 (bmo#1601024,bmo#1601712,bmo#1604836,bmo#1606492)
Memory safety bugs fixed in Firefox 73
- updated requirements
* rust >= 1.39
* NSS >= 3.49.2
* rust-cbindgen >= 0.12.0
- rebased patches
- removed obsolete patch
* mozilla-bmo1601707.patch
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=802
2020-02-12 15:14:39 +01:00
|
|
|
@@ -36,16 +37,18 @@ class nsUnixSystemProxySettings final :
|
2019-07-09 23:21:11 +02:00
|
|
|
nsCOMPtr<nsIGSettingsCollection> mProxySettings;
|
|
|
|
nsInterfaceHashtable<nsCStringHashKey, nsIGSettingsCollection>
|
|
|
|
mSchemeProxySettings;
|
2019-01-29 19:07:12 +01:00
|
|
|
nsresult GetProxyFromGSettings(const nsACString& aScheme,
|
|
|
|
const nsACString& aHost, int32_t aPort,
|
|
|
|
nsACString& aResult);
|
|
|
|
nsresult SetProxyResultFromGSettings(const char* aKeyBase, const char* aType,
|
|
|
|
nsACString& aResult);
|
|
|
|
+ nsresult GetProxyFromKDE(const nsACString& aScheme, const nsACString& aHost,
|
|
|
|
+ PRInt32 aPort, nsACString& aResult);
|
2011-06-01 08:05:09 +02:00
|
|
|
};
|
|
|
|
|
2014-07-21 11:32:46 +02:00
|
|
|
NS_IMPL_ISUPPORTS(nsUnixSystemProxySettings, nsISystemProxySettings)
|
2011-06-01 08:05:09 +02:00
|
|
|
|
2013-01-07 21:49:28 +01:00
|
|
|
NS_IMETHODIMP
|
2019-01-29 19:07:12 +01:00
|
|
|
nsUnixSystemProxySettings::GetMainThreadOnly(bool* aMainThreadOnly) {
|
|
|
|
// dbus prevents us from being threadsafe, but this routine should not block
|
|
|
|
// anyhow
|
2020-06-02 16:55:49 +02:00
|
|
|
@@ -384,21 +387,50 @@ nsresult nsUnixSystemProxySettings::GetP
|
2019-01-29 19:07:12 +01:00
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsresult nsUnixSystemProxySettings::GetProxyForURI(const nsACString& aSpec,
|
|
|
|
const nsACString& aScheme,
|
|
|
|
const nsACString& aHost,
|
|
|
|
const int32_t aPort,
|
|
|
|
nsACString& aResult) {
|
2013-01-07 21:49:28 +01:00
|
|
|
+ if (nsKDEUtils::kdeSupport())
|
|
|
|
+ return GetProxyFromKDE(aScheme, aHost, aPort, aResult);
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
2012-06-05 20:01:53 +02:00
|
|
|
if (mProxySettings) {
|
2013-01-07 21:49:28 +01:00
|
|
|
nsresult rv = GetProxyFromGSettings(aScheme, aHost, aPort, aResult);
|
2019-01-29 19:07:12 +01:00
|
|
|
if (NS_SUCCEEDED(rv)) return rv;
|
2012-03-01 10:09:12 +01:00
|
|
|
}
|
2011-06-01 08:05:09 +02:00
|
|
|
|
2019-01-29 19:07:12 +01:00
|
|
|
return GetProxyFromEnvironment(aScheme, aHost, aPort, aResult);
|
|
|
|
}
|
2011-07-01 11:12:30 +02:00
|
|
|
|
|
|
|
+nsresult
|
|
|
|
+nsUnixSystemProxySettings::GetProxyFromKDE(const nsACString& aScheme,
|
|
|
|
+ const nsACString& aHost,
|
|
|
|
+ PRInt32 aPort,
|
|
|
|
+ nsACString& aResult)
|
|
|
|
+{
|
2013-01-07 21:49:28 +01:00
|
|
|
+ nsAutoCString url;
|
2011-07-01 11:12:30 +02:00
|
|
|
+ url = aScheme;
|
|
|
|
+ url += "://";
|
|
|
|
+ url += aHost;
|
|
|
|
+ if( aPort >= 0 )
|
|
|
|
+ {
|
|
|
|
+ url += ":";
|
|
|
|
+ url += nsPrintfCString("%d", aPort);
|
|
|
|
+ }
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsTArray<nsCString> command;
|
|
|
|
+ command.AppendElement( NS_LITERAL_CSTRING( "GETPROXY" ));
|
|
|
|
+ command.AppendElement( url );
|
|
|
|
+ nsTArray<nsCString> result;
|
2012-03-01 10:09:12 +01:00
|
|
|
+ if( !nsKDEUtils::command( command, &result ) || result.Length() != 1 )
|
2011-07-01 11:12:30 +02:00
|
|
|
+ return NS_ERROR_FAILURE;
|
2012-03-01 10:09:12 +01:00
|
|
|
+ aResult = result[0];
|
2011-07-01 11:12:30 +02:00
|
|
|
+ return NS_OK;
|
|
|
|
+}
|
|
|
|
+
|
2019-05-22 22:38:29 +02:00
|
|
|
+
|
|
|
|
NS_IMPL_COMPONENT_FACTORY(nsUnixSystemProxySettings) {
|
|
|
|
auto result = MakeRefPtr<nsUnixSystemProxySettings>();
|
|
|
|
result->Init();
|
|
|
|
return result.forget().downcast<nsISupports>();
|
|
|
|
}
|
2013-09-16 09:57:05 +02:00
|
|
|
diff --git a/toolkit/xre/moz.build b/toolkit/xre/moz.build
|
|
|
|
--- a/toolkit/xre/moz.build
|
|
|
|
+++ b/toolkit/xre/moz.build
|
- Mozilla Firefox 73.0
* Added support for setting a default zoom level applicable for all
web content
* High-contrast mode has been updated to allow background images
* Improved audio quality when playing back audio at a faster or
slower speed
* Added NextDNS as alternative option for DNS over HTTPS
MFSA 2020-05 (bsc#1163368)
* CVE-2020-6796 (bmo#1610426)
Missing bounds check on shared memory read in the parent process
* CVE-2020-6797 (bmo#1596668) (MacOS X only)
Extensions granted downloads.open permission could open arbitrary
applications on Mac OSX
* CVE-2020-6798 (bmo#1602944)
Incorrect parsing of template tag could result in JavaScript injection
* CVE-2020-6799 (bmo#1606596) (Windows only)
Arbitrary code execution when opening pdf links from other
applications, when Firefox is configured as default pdf reader
* CVE-2020-6800 (bmo#1595786,bmo#1596706,bmo#1598543,bmo#1604851,
bmo#1608580,bmo#1608785,bmo#1605777)
Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5
* CVE-2020-6801 (bmo#1601024,bmo#1601712,bmo#1604836,bmo#1606492)
Memory safety bugs fixed in Firefox 73
- updated requirements
* rust >= 1.39
* NSS >= 3.49.2
* rust-cbindgen >= 0.12.0
- rebased patches
- removed obsolete patch
* mozilla-bmo1601707.patch
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=802
2020-02-12 15:14:39 +01:00
|
|
|
@@ -88,17 +88,19 @@ elif CONFIG['MOZ_WIDGET_TOOLKIT'] == 'co
|
2018-03-13 20:46:06 +01:00
|
|
|
'../components/printingui',
|
2016-11-15 19:06:29 +01:00
|
|
|
]
|
|
|
|
elif CONFIG['MOZ_WIDGET_TOOLKIT'] == 'uikit':
|
|
|
|
UNIFIED_SOURCES += [
|
|
|
|
'nsNativeAppSupportDefault.cpp',
|
|
|
|
'UIKitDirProvider.mm',
|
2013-09-16 09:57:05 +02:00
|
|
|
]
|
2019-10-25 11:13:30 +02:00
|
|
|
elif CONFIG['MOZ_WIDGET_TOOLKIT'] == 'gtk':
|
2013-09-16 09:57:05 +02:00
|
|
|
+ EXPORTS += ['nsKDEUtils.h']
|
2014-03-18 20:44:32 +01:00
|
|
|
UNIFIED_SOURCES += [
|
2014-02-03 16:34:42 +01:00
|
|
|
+ 'nsKDEUtils.cpp',
|
2014-03-18 20:44:32 +01:00
|
|
|
'nsNativeAppSupportUnix.cpp',
|
2013-09-16 09:57:05 +02:00
|
|
|
]
|
|
|
|
else:
|
2014-03-18 20:44:32 +01:00
|
|
|
UNIFIED_SOURCES += [
|
2013-09-16 09:57:05 +02:00
|
|
|
'nsNativeAppSupportDefault.cpp',
|
|
|
|
]
|
|
|
|
|
2019-05-22 22:38:29 +02:00
|
|
|
if CONFIG['MOZ_HAS_REMOTE']:
|
2011-06-01 08:05:09 +02:00
|
|
|
diff --git a/toolkit/xre/nsKDEUtils.cpp b/toolkit/xre/nsKDEUtils.cpp
|
|
|
|
new file mode 100644
|
|
|
|
--- /dev/null
|
|
|
|
+++ b/toolkit/xre/nsKDEUtils.cpp
|
- update to Firefox 51.0
* requires NSPR >= 4.13.1, NSS >= 3.28.1
* Added support for FLAC (Free Lossless Audio Codec) playback
* Added support for WebGL 2
* Added Georgian (ka) and Kabyle (kab) locales
* Support saving passwords for forms without 'submit' events
* Improved video performance for users without GPU acceleration
* Zoom indicator is shown in the URL bar if the zoom level is not
at default level
* View passwords from the prompt before saving them
* Remove Belarusian (be) locale
* Use Skia for content rendering (Linux)
* MFSA 2017-01
CVE-2017-5375: Excessive JIT code allocation allows bypass of
ASLR and DEP (bmo#1325200, boo#1021814)
CVE-2017-5376: Use-after-free in XSL (bmo#1311687, boo#1021817)
CVE-2017-5377: Memory corruption with transforms to create
gradients in Skia (bmo#1306883, boo#1021826)
CVE-2017-5378: Pointer and frame data leakage of Javascript objects
(bmo#1312001, bmo#1330769, boo#1021818)
CVE-2017-5379: Use-after-free in Web Animations
(bmo#1309198,boo#1021827)
CVE-2017-5380: Potential use-after-free during DOM manipulations
(bmo#1322107, boo#1021819)
CVE-2017-5390: Insecure communication methods in Developer Tools
JSON viewer (bmo#1297361, boo#1021820)
CVE-2017-5389: WebExtensions can install additional add-ons via
modified host requests (bmo#1308688, boo#1021828)
CVE-2017-5396: Use-after-free with Media Decoder
(bmo#1329403, boo#1021821)
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=567
2017-01-25 11:27:08 +01:00
|
|
|
@@ -0,0 +1,344 @@
|
2011-06-01 08:05:09 +02:00
|
|
|
+/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */
|
2012-11-20 21:34:15 +01:00
|
|
|
+/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
|
|
|
+#include "nsKDEUtils.h"
|
|
|
|
+#include "nsIWidget.h"
|
2012-03-01 10:09:12 +01:00
|
|
|
+#include "nsISupportsPrimitives.h"
|
|
|
|
+#include "nsIMutableArray.h"
|
|
|
|
+#include "nsComponentManagerUtils.h"
|
|
|
|
+#include "nsArrayUtils.h"
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
|
|
|
+#include <gtk/gtk.h>
|
|
|
|
+
|
|
|
|
+#include <limits.h>
|
|
|
|
+#include <stdio.h>
|
|
|
|
+#include <sys/wait.h>
|
2012-07-29 11:45:44 +02:00
|
|
|
+#include <sys/resource.h>
|
2011-06-01 08:05:09 +02:00
|
|
|
+#include <unistd.h>
|
|
|
|
+#include <X11/Xlib.h>
|
- update to Firefox 51.0
* requires NSPR >= 4.13.1, NSS >= 3.28.1
* Added support for FLAC (Free Lossless Audio Codec) playback
* Added support for WebGL 2
* Added Georgian (ka) and Kabyle (kab) locales
* Support saving passwords for forms without 'submit' events
* Improved video performance for users without GPU acceleration
* Zoom indicator is shown in the URL bar if the zoom level is not
at default level
* View passwords from the prompt before saving them
* Remove Belarusian (be) locale
* Use Skia for content rendering (Linux)
* MFSA 2017-01
CVE-2017-5375: Excessive JIT code allocation allows bypass of
ASLR and DEP (bmo#1325200, boo#1021814)
CVE-2017-5376: Use-after-free in XSL (bmo#1311687, boo#1021817)
CVE-2017-5377: Memory corruption with transforms to create
gradients in Skia (bmo#1306883, boo#1021826)
CVE-2017-5378: Pointer and frame data leakage of Javascript objects
(bmo#1312001, bmo#1330769, boo#1021818)
CVE-2017-5379: Use-after-free in Web Animations
(bmo#1309198,boo#1021827)
CVE-2017-5380: Potential use-after-free during DOM manipulations
(bmo#1322107, boo#1021819)
CVE-2017-5390: Insecure communication methods in Developer Tools
JSON viewer (bmo#1297361, boo#1021820)
CVE-2017-5389: WebExtensions can install additional add-ons via
modified host requests (bmo#1308688, boo#1021828)
CVE-2017-5396: Use-after-free with Media Decoder
(bmo#1329403, boo#1021821)
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=567
2017-01-25 11:27:08 +01:00
|
|
|
+// copied from X11/X.h as a hack since for an unknown
|
|
|
|
+// reason it's not picked up from X11/X.h
|
|
|
|
+#ifndef None
|
|
|
|
+#define None 0L /* universal null resource or null atom */
|
|
|
|
+#endif
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
|
|
|
+//#define DEBUG_KDE
|
|
|
|
+#ifdef DEBUG_KDE
|
|
|
|
+#define KMOZILLAHELPER "kmozillahelper"
|
|
|
|
+#else
|
|
|
|
+// not need for lib64, it's a binary
|
|
|
|
+#define KMOZILLAHELPER "/usr/lib/mozilla/kmozillahelper"
|
|
|
|
+#endif
|
|
|
|
+
|
|
|
|
+#define KMOZILLAHELPER_VERSION 6
|
|
|
|
+#define MAKE_STR2( n ) #n
|
|
|
|
+#define MAKE_STR( n ) MAKE_STR2( n )
|
|
|
|
+
|
|
|
|
+static bool getKdeSession()
|
|
|
|
+ {
|
|
|
|
+ Display* dpy = XOpenDisplay( NULL );
|
|
|
|
+ if( dpy == NULL )
|
|
|
|
+ return false;
|
2019-07-09 23:21:11 +02:00
|
|
|
+ Atom kde_full_session = XInternAtom( dpy, "KDE_FULL_SESSION", true );
|
2011-06-01 08:05:09 +02:00
|
|
|
+ bool kde = false;
|
|
|
|
+ if( kde_full_session != None )
|
|
|
|
+ {
|
|
|
|
+ int cnt;
|
|
|
|
+ if( Atom* props = XListProperties( dpy, DefaultRootWindow( dpy ), &cnt ))
|
|
|
|
+ {
|
|
|
|
+ for( int i = 0;
|
|
|
|
+ i < cnt;
|
|
|
|
+ ++i )
|
|
|
|
+ {
|
|
|
|
+ if( props[ i ] == kde_full_session )
|
|
|
|
+ {
|
|
|
|
+ kde = true;
|
|
|
|
+#ifdef DEBUG_KDE
|
|
|
|
+ fprintf( stderr, "KDE SESSION %d\n", kde );
|
|
|
|
+#endif
|
|
|
|
+ break;
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ XFree( props );
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ XCloseDisplay( dpy );
|
|
|
|
+ return kde;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+static bool getKdeSupport()
|
|
|
|
+ {
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsTArray<nsCString> command;
|
|
|
|
+ command.AppendElement( NS_LITERAL_CSTRING( "CHECK" ));
|
|
|
|
+ command.AppendElement( NS_LITERAL_CSTRING( MAKE_STR( KMOZILLAHELPER_VERSION )));
|
2012-03-01 10:09:12 +01:00
|
|
|
+ bool kde = nsKDEUtils::command( command );
|
2011-06-01 08:05:09 +02:00
|
|
|
+#ifdef DEBUG_KDE
|
|
|
|
+ fprintf( stderr, "KDE RUNNING %d\n", kde );
|
|
|
|
+#endif
|
|
|
|
+ return kde;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+nsKDEUtils::nsKDEUtils()
|
|
|
|
+ : commandFile( NULL )
|
|
|
|
+ , replyFile( NULL )
|
|
|
|
+ {
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+nsKDEUtils::~nsKDEUtils()
|
|
|
|
+ {
|
|
|
|
+// closeHelper(); not actually useful, exiting will close the fd too
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+nsKDEUtils* nsKDEUtils::self()
|
|
|
|
+ {
|
|
|
|
+ static nsKDEUtils s;
|
|
|
|
+ return &s;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+static bool helperRunning = false;
|
|
|
|
+static bool helperFailed = false;
|
|
|
|
+
|
|
|
|
+bool nsKDEUtils::kdeSession()
|
|
|
|
+ {
|
|
|
|
+ static bool session = getKdeSession();
|
|
|
|
+ return session;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+bool nsKDEUtils::kdeSupport()
|
|
|
|
+ {
|
|
|
|
+ static bool support = kdeSession() && getKdeSupport();
|
|
|
|
+ return support && helperRunning;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+struct nsKDECommandData
|
|
|
|
+ {
|
|
|
|
+ FILE* file;
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsTArray<nsCString>* output;
|
2011-06-01 08:05:09 +02:00
|
|
|
+ GMainLoop* loop;
|
|
|
|
+ bool success;
|
|
|
|
+ };
|
|
|
|
+
|
|
|
|
+static gboolean kdeReadFunc( GIOChannel*, GIOCondition, gpointer data )
|
|
|
|
+ {
|
|
|
|
+ nsKDECommandData* p = static_cast< nsKDECommandData* >( data );
|
|
|
|
+ char buf[ 8192 ]; // TODO big enough
|
|
|
|
+ bool command_done = false;
|
|
|
|
+ bool command_failed = false;
|
|
|
|
+ while( !command_done && !command_failed && fgets( buf, 8192, p->file ) != NULL )
|
|
|
|
+ { // TODO what if the kernel splits a line into two chunks?
|
|
|
|
+//#ifdef DEBUG_KDE
|
|
|
|
+// fprintf( stderr, "READ: %s %d\n", buf, feof( p->file ));
|
|
|
|
+//#endif
|
|
|
|
+ if( char* eol = strchr( buf, '\n' ))
|
|
|
|
+ *eol = '\0';
|
|
|
|
+ command_done = ( strcmp( buf, "\\1" ) == 0 );
|
|
|
|
+ command_failed = ( strcmp( buf, "\\0" ) == 0 );
|
2013-01-07 21:49:28 +01:00
|
|
|
+ nsAutoCString line( buf );
|
2011-06-01 08:05:09 +02:00
|
|
|
+ line.ReplaceSubstring( "\\n", "\n" );
|
|
|
|
+ line.ReplaceSubstring( "\\" "\\", "\\" ); // \\ -> \ , i.e. unescape
|
|
|
|
+ if( p->output && !( command_done || command_failed ))
|
2012-02-01 14:37:15 +01:00
|
|
|
+ p->output->AppendElement( nsCString( buf )); // TODO utf8?
|
2011-06-01 08:05:09 +02:00
|
|
|
+ }
|
|
|
|
+ bool quit = false;
|
|
|
|
+ if( feof( p->file ) || command_failed )
|
|
|
|
+ {
|
|
|
|
+ quit = true;
|
|
|
|
+ p->success = false;
|
|
|
|
+ }
|
|
|
|
+ if( command_done )
|
|
|
|
+ { // reading one reply finished
|
|
|
|
+ quit = true;
|
|
|
|
+ p->success = true;
|
|
|
|
+ }
|
|
|
|
+ if( quit )
|
|
|
|
+ {
|
|
|
|
+ if( p->loop )
|
|
|
|
+ g_main_loop_quit( p->loop );
|
|
|
|
+ return FALSE;
|
|
|
|
+ }
|
|
|
|
+ return TRUE;
|
|
|
|
+ }
|
|
|
|
+
|
2012-02-01 14:37:15 +01:00
|
|
|
+bool nsKDEUtils::command( const nsTArray<nsCString>& command, nsTArray<nsCString>* output )
|
2011-06-01 08:05:09 +02:00
|
|
|
+ {
|
|
|
|
+ return self()->internalCommand( command, NULL, false, output );
|
|
|
|
+ }
|
|
|
|
+
|
2012-03-01 10:09:12 +01:00
|
|
|
+bool nsKDEUtils::command( nsIArray* command, nsIArray** output)
|
|
|
|
+ {
|
|
|
|
+ nsTArray<nsCString> in;
|
|
|
|
+ PRUint32 length;
|
|
|
|
+ command->GetLength( &length );
|
|
|
|
+ for ( PRUint32 i = 0; i < length; i++ )
|
|
|
|
+ {
|
|
|
|
+ nsCOMPtr<nsISupportsCString> str = do_QueryElementAt( command, i );
|
|
|
|
+ if( str )
|
|
|
|
+ {
|
2013-01-07 21:49:28 +01:00
|
|
|
+ nsAutoCString s;
|
2012-03-01 10:09:12 +01:00
|
|
|
+ str->GetData( s );
|
|
|
|
+ in.AppendElement( s );
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ nsTArray<nsCString> out;
|
|
|
|
+ bool ret = self()->internalCommand( in, NULL, false, &out );
|
|
|
|
+
|
|
|
|
+ if ( !output ) return ret;
|
|
|
|
+
|
|
|
|
+ nsCOMPtr<nsIMutableArray> result = do_CreateInstance( NS_ARRAY_CONTRACTID );
|
|
|
|
+ if ( !result ) return false;
|
|
|
|
+
|
|
|
|
+ for ( PRUint32 i = 0; i < out.Length(); i++ )
|
|
|
|
+ {
|
|
|
|
+ nsCOMPtr<nsISupportsCString> rstr = do_CreateInstance( NS_SUPPORTS_CSTRING_CONTRACTID );
|
|
|
|
+ if ( !rstr ) return false;
|
|
|
|
+
|
|
|
|
+ rstr->SetData( out[i] );
|
2018-01-23 10:55:12 +01:00
|
|
|
+ result->AppendElement( rstr );
|
2012-03-01 10:09:12 +01:00
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ NS_ADDREF( *output = result);
|
|
|
|
+ return ret;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+
|
2016-01-26 23:39:03 +01:00
|
|
|
+bool nsKDEUtils::commandBlockUi( const nsTArray<nsCString>& command, GtkWindow* parent, nsTArray<nsCString>* output )
|
2011-06-01 08:05:09 +02:00
|
|
|
+ {
|
|
|
|
+ return self()->internalCommand( command, parent, true, output );
|
|
|
|
+ }
|
|
|
|
+
|
2016-01-26 23:39:03 +01:00
|
|
|
+bool nsKDEUtils::internalCommand( const nsTArray<nsCString>& command, GtkWindow* parent, bool blockUi,
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsTArray<nsCString>* output )
|
2011-06-01 08:05:09 +02:00
|
|
|
+ {
|
|
|
|
+ if( !startHelper())
|
|
|
|
+ return false;
|
2012-03-01 10:09:12 +01:00
|
|
|
+ feedCommand( command );
|
2011-06-01 08:05:09 +02:00
|
|
|
+ // do not store the data in 'this' but in extra structure, just in case there
|
|
|
|
+ // is reentrancy (can there be? the event loop is re-entered)
|
|
|
|
+ nsKDECommandData data;
|
|
|
|
+ data.file = replyFile;
|
|
|
|
+ data.output = output;
|
|
|
|
+ data.success = false;
|
|
|
|
+ if( blockUi )
|
|
|
|
+ {
|
|
|
|
+ data.loop = g_main_loop_new( NULL, FALSE );
|
|
|
|
+ GtkWidget* window = gtk_window_new( GTK_WINDOW_TOPLEVEL );
|
2016-01-26 23:39:03 +01:00
|
|
|
+ if( parent && gtk_window_get_group(parent) )
|
|
|
|
+ gtk_window_group_add_window( gtk_window_get_group(parent), GTK_WINDOW( window ));
|
2011-06-01 08:05:09 +02:00
|
|
|
+ gtk_widget_realize( window );
|
|
|
|
+ gtk_widget_set_sensitive( window, TRUE );
|
|
|
|
+ gtk_grab_add( window );
|
|
|
|
+ GIOChannel* channel = g_io_channel_unix_new( fileno( data.file ));
|
|
|
|
+ g_io_add_watch( channel, static_cast< GIOCondition >( G_IO_IN | G_IO_ERR | G_IO_HUP ), kdeReadFunc, &data );
|
|
|
|
+ g_io_channel_unref( channel );
|
|
|
|
+ g_main_loop_run( data.loop );
|
|
|
|
+ g_main_loop_unref( data.loop );
|
|
|
|
+ gtk_grab_remove( window );
|
|
|
|
+ gtk_widget_destroy( window );
|
|
|
|
+ }
|
|
|
|
+ else
|
|
|
|
+ {
|
|
|
|
+ data.loop = NULL;
|
|
|
|
+ while( kdeReadFunc( NULL, static_cast< GIOCondition >( 0 ), &data ))
|
|
|
|
+ ;
|
|
|
|
+ }
|
|
|
|
+ return data.success;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+bool nsKDEUtils::startHelper()
|
|
|
|
+ {
|
|
|
|
+ if( helperRunning )
|
|
|
|
+ return true;
|
|
|
|
+ if( helperFailed )
|
|
|
|
+ return false;
|
|
|
|
+ helperFailed = true;
|
|
|
|
+ int fdcommand[ 2 ];
|
|
|
|
+ int fdreply[ 2 ];
|
|
|
|
+ if( pipe( fdcommand ) < 0 )
|
|
|
|
+ return false;
|
|
|
|
+ if( pipe( fdreply ) < 0 )
|
|
|
|
+ {
|
|
|
|
+ close( fdcommand[ 0 ] );
|
|
|
|
+ close( fdcommand[ 1 ] );
|
|
|
|
+ return false;
|
|
|
|
+ }
|
|
|
|
+ char* args[ 2 ] = { const_cast< char* >( KMOZILLAHELPER ), NULL };
|
|
|
|
+ switch( fork())
|
|
|
|
+ {
|
|
|
|
+ case -1:
|
|
|
|
+ {
|
|
|
|
+ close( fdcommand[ 0 ] );
|
|
|
|
+ close( fdcommand[ 1 ] );
|
|
|
|
+ close( fdreply[ 0 ] );
|
|
|
|
+ close( fdreply[ 1 ] );
|
|
|
|
+ return false;
|
|
|
|
+ }
|
|
|
|
+ case 0: // child
|
|
|
|
+ {
|
|
|
|
+ if( dup2( fdcommand[ 0 ], STDIN_FILENO ) < 0 )
|
|
|
|
+ _exit( 1 );
|
|
|
|
+ if( dup2( fdreply[ 1 ], STDOUT_FILENO ) < 0 )
|
|
|
|
+ _exit( 1 );
|
|
|
|
+ int maxfd = 1024; // close all other fds
|
|
|
|
+ struct rlimit rl;
|
|
|
|
+ if( getrlimit( RLIMIT_NOFILE, &rl ) == 0 )
|
|
|
|
+ maxfd = rl.rlim_max;
|
|
|
|
+ for( int i = 3;
|
|
|
|
+ i < maxfd;
|
|
|
|
+ ++i )
|
|
|
|
+ close( i );
|
|
|
|
+#ifdef DEBUG_KDE
|
|
|
|
+ execvp( KMOZILLAHELPER, args );
|
|
|
|
+#else
|
|
|
|
+ execv( KMOZILLAHELPER, args );
|
|
|
|
+#endif
|
|
|
|
+ _exit( 1 ); // failed
|
|
|
|
+ }
|
|
|
|
+ default: // parent
|
|
|
|
+ {
|
|
|
|
+ commandFile = fdopen( fdcommand[ 1 ], "w" );
|
|
|
|
+ replyFile = fdopen( fdreply[ 0 ], "r" );
|
|
|
|
+ close( fdcommand[ 0 ] );
|
|
|
|
+ close( fdreply[ 1 ] );
|
|
|
|
+ if( commandFile == NULL || replyFile == NULL )
|
|
|
|
+ {
|
|
|
|
+ closeHelper();
|
|
|
|
+ return false;
|
|
|
|
+ }
|
|
|
|
+ // ok, helper ready, getKdeRunning() will check if it works
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ helperFailed = false;
|
|
|
|
+ helperRunning = true;
|
|
|
|
+ return true;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+void nsKDEUtils::closeHelper()
|
|
|
|
+ {
|
|
|
|
+ if( commandFile != NULL )
|
|
|
|
+ fclose( commandFile ); // this will also make the helper quit
|
|
|
|
+ if( replyFile != NULL )
|
|
|
|
+ fclose( replyFile );
|
|
|
|
+ helperRunning = false;
|
|
|
|
+ }
|
|
|
|
+
|
2012-02-01 14:37:15 +01:00
|
|
|
+void nsKDEUtils::feedCommand( const nsTArray<nsCString>& command )
|
2011-06-01 08:05:09 +02:00
|
|
|
+ {
|
|
|
|
+ for( int i = 0;
|
2012-02-01 14:37:15 +01:00
|
|
|
+ i < command.Length();
|
2011-06-01 08:05:09 +02:00
|
|
|
+ ++i )
|
|
|
|
+ {
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsCString line = command[ i ];
|
2011-06-01 08:05:09 +02:00
|
|
|
+ line.ReplaceSubstring( "\\", "\\" "\\" ); // \ -> \\ , i.e. escape
|
|
|
|
+ line.ReplaceSubstring( "\n", "\\n" );
|
|
|
|
+#ifdef DEBUG_KDE
|
|
|
|
+ fprintf( stderr, "COMM: %s\n", line.get());
|
|
|
|
+#endif
|
|
|
|
+ fputs( line.get(), commandFile );
|
|
|
|
+ fputs( "\n", commandFile );
|
|
|
|
+ }
|
|
|
|
+ fputs( "\\E\n", commandFile ); // done as \E, so it cannot happen in normal data
|
|
|
|
+ fflush( commandFile );
|
|
|
|
+ }
|
|
|
|
diff --git a/toolkit/xre/nsKDEUtils.h b/toolkit/xre/nsKDEUtils.h
|
|
|
|
new file mode 100644
|
|
|
|
--- /dev/null
|
|
|
|
+++ b/toolkit/xre/nsKDEUtils.h
|
2012-11-20 21:34:15 +01:00
|
|
|
@@ -0,0 +1,48 @@
|
|
|
|
+/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
|
|
+/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
|
|
|
+#ifndef nsKDEUtils_h__
|
|
|
|
+#define nsKDEUtils_h__
|
|
|
|
+
|
2018-03-13 20:46:06 +01:00
|
|
|
+#include "nsString.h"
|
2012-02-01 14:37:15 +01:00
|
|
|
+#include "nsTArray.h"
|
2011-06-01 08:05:09 +02:00
|
|
|
+#include <stdio.h>
|
|
|
|
+
|
|
|
|
+typedef struct _GtkWindow GtkWindow;
|
|
|
|
+
|
2012-03-01 10:09:12 +01:00
|
|
|
+class nsIArray;
|
|
|
|
+
|
2011-06-01 08:05:09 +02:00
|
|
|
+class NS_EXPORT nsKDEUtils
|
|
|
|
+ {
|
|
|
|
+ public:
|
|
|
|
+ /* Returns true if running inside a KDE session (regardless of whether there is KDE
|
|
|
|
+ support available for Firefox). This should be used e.g. when determining
|
|
|
|
+ dialog button order but not for code that requires the KDE support. */
|
|
|
|
+ static bool kdeSession();
|
|
|
|
+ /* Returns true if running inside a KDE session and KDE support is available
|
|
|
|
+ for Firefox. This should be used everywhere where the external helper is needed. */
|
|
|
|
+ static bool kdeSupport();
|
|
|
|
+ /* Executes the given helper command, returns true if helper returned success. */
|
2012-02-01 14:37:15 +01:00
|
|
|
+ static bool command( const nsTArray<nsCString>& command, nsTArray<nsCString>* output = NULL );
|
2012-03-01 10:09:12 +01:00
|
|
|
+ static bool command( nsIArray* command, nsIArray** output = NULL );
|
2011-06-01 08:05:09 +02:00
|
|
|
+ /* Like command(), but additionally blocks the parent widget like if there was
|
|
|
|
+ a modal dialog shown and enters the event loop (i.e. there are still paint updates,
|
|
|
|
+ this is for commands that take long). */
|
2016-01-26 23:39:03 +01:00
|
|
|
+ static bool commandBlockUi( const nsTArray<nsCString>& command, GtkWindow* parent, nsTArray<nsCString>* output = NULL );
|
2012-02-01 14:37:15 +01:00
|
|
|
+
|
2011-06-01 08:05:09 +02:00
|
|
|
+ private:
|
|
|
|
+ nsKDEUtils();
|
|
|
|
+ ~nsKDEUtils();
|
|
|
|
+ static nsKDEUtils* self();
|
|
|
|
+ bool startHelper();
|
|
|
|
+ void closeHelper();
|
2012-02-01 14:37:15 +01:00
|
|
|
+ void feedCommand( const nsTArray<nsCString>& command );
|
2016-01-26 23:39:03 +01:00
|
|
|
+ bool internalCommand( const nsTArray<nsCString>& command, GtkWindow* parent, bool isParent,
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsTArray<nsCString>* output );
|
2011-06-01 08:05:09 +02:00
|
|
|
+ FILE* commandFile;
|
|
|
|
+ FILE* replyFile;
|
|
|
|
+ };
|
|
|
|
+
|
|
|
|
+#endif // nsKDEUtils
|
2018-05-26 18:05:54 +02:00
|
|
|
diff --git a/uriloader/exthandler/HandlerServiceParent.cpp b/uriloader/exthandler/HandlerServiceParent.cpp
|
|
|
|
--- a/uriloader/exthandler/HandlerServiceParent.cpp
|
|
|
|
+++ b/uriloader/exthandler/HandlerServiceParent.cpp
|
2019-10-25 11:13:30 +02:00
|
|
|
@@ -7,17 +7,17 @@
|
2019-07-09 23:21:11 +02:00
|
|
|
#include "mozilla/ipc/ProtocolUtils.h"
|
2018-05-26 18:05:54 +02:00
|
|
|
#include "mozilla/Logging.h"
|
|
|
|
#include "HandlerServiceParent.h"
|
|
|
|
#include "nsIHandlerService.h"
|
|
|
|
#include "nsIMIMEInfo.h"
|
|
|
|
#include "ContentHandlerService.h"
|
|
|
|
#include "nsStringEnumerator.h"
|
|
|
|
#ifdef MOZ_WIDGET_GTK
|
2019-03-19 23:01:55 +01:00
|
|
|
-# include "unix/nsGNOMERegistry.h"
|
|
|
|
+# include "unix/nsCommonRegistry.h"
|
2018-05-26 18:05:54 +02:00
|
|
|
#endif
|
|
|
|
|
|
|
|
using mozilla::dom::ContentHandlerService;
|
2019-01-29 19:07:12 +01:00
|
|
|
using mozilla::dom::HandlerApp;
|
|
|
|
using mozilla::dom::HandlerInfo;
|
2018-05-26 18:05:54 +02:00
|
|
|
using mozilla::dom::RemoteHandlerApp;
|
|
|
|
|
|
|
|
namespace {
|
2020-04-07 14:21:48 +02:00
|
|
|
@@ -294,17 +294,17 @@ mozilla::ipc::IPCResult HandlerServicePa
|
2019-07-09 23:21:11 +02:00
|
|
|
mozilla::ipc::IPCResult HandlerServiceParent::RecvExistsForProtocolOS(
|
2019-01-29 19:07:12 +01:00
|
|
|
const nsCString& aProtocolScheme, bool* aHandlerExists) {
|
2019-07-09 23:21:11 +02:00
|
|
|
if (aProtocolScheme.Length() > MAX_SCHEME_LENGTH) {
|
|
|
|
*aHandlerExists = false;
|
|
|
|
return IPC_OK();
|
|
|
|
}
|
2018-05-26 18:05:54 +02:00
|
|
|
#ifdef MOZ_WIDGET_GTK
|
|
|
|
// Check the GNOME registry for a protocol handler
|
|
|
|
- *aHandlerExists = nsGNOMERegistry::HandlerExists(aProtocolScheme.get());
|
|
|
|
+ *aHandlerExists = nsCommonRegistry::HandlerExists(aProtocolScheme.get());
|
|
|
|
#else
|
|
|
|
*aHandlerExists = false;
|
|
|
|
#endif
|
|
|
|
return IPC_OK();
|
|
|
|
}
|
|
|
|
|
2019-07-09 23:21:11 +02:00
|
|
|
/*
|
|
|
|
* Check if a handler exists for the provided protocol. Check the datastore
|
2020-04-07 14:21:48 +02:00
|
|
|
@@ -323,17 +323,17 @@ mozilla::ipc::IPCResult HandlerServicePa
|
2019-07-09 23:21:11 +02:00
|
|
|
nsCOMPtr<nsIExternalProtocolService> protoSvc =
|
|
|
|
do_GetService(NS_EXTERNALPROTOCOLSERVICE_CONTRACTID, &rv);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
*aHandlerExists = false;
|
|
|
|
return IPC_OK();
|
|
|
|
}
|
|
|
|
rv = protoSvc->ExternalProtocolHandlerExists(aProtocolScheme.get(),
|
|
|
|
aHandlerExists);
|
|
|
|
-
|
|
|
|
+##
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
*aHandlerExists = false;
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
MOZ_RELEASE_ASSERT(false, "No implementation on this platform.");
|
|
|
|
*aHandlerExists = false;
|
|
|
|
#endif
|
|
|
|
return IPC_OK();
|
2013-09-16 09:57:05 +02:00
|
|
|
diff --git a/uriloader/exthandler/moz.build b/uriloader/exthandler/moz.build
|
|
|
|
--- a/uriloader/exthandler/moz.build
|
|
|
|
+++ b/uriloader/exthandler/moz.build
|
2020-01-08 12:59:18 +01:00
|
|
|
@@ -85,17 +85,19 @@ else:
|
2014-02-03 16:34:42 +01:00
|
|
|
SOURCES += [
|
|
|
|
osdir + '/nsOSHelperAppService.cpp',
|
2013-09-16 09:57:05 +02:00
|
|
|
]
|
2018-03-13 20:46:06 +01:00
|
|
|
if CONFIG['CC_TYPE'] in ('clang', 'gcc'):
|
2016-09-20 18:19:47 +02:00
|
|
|
CXXFLAGS += ['-Wno-error=shadow']
|
2011-06-01 08:05:09 +02:00
|
|
|
|
2019-10-25 11:13:30 +02:00
|
|
|
if CONFIG['MOZ_WIDGET_TOOLKIT'] == 'gtk':
|
2014-03-18 20:44:32 +01:00
|
|
|
UNIFIED_SOURCES += [
|
2014-02-03 16:34:42 +01:00
|
|
|
+ 'unix/nsCommonRegistry.cpp',
|
|
|
|
'unix/nsGNOMERegistry.cpp',
|
2018-03-13 20:46:06 +01:00
|
|
|
+ 'unix/nsKDERegistry.cpp',
|
2014-02-03 16:34:42 +01:00
|
|
|
'unix/nsMIMEInfoUnix.cpp',
|
2013-09-16 09:57:05 +02:00
|
|
|
]
|
|
|
|
elif CONFIG['MOZ_WIDGET_TOOLKIT'] == 'android':
|
2014-03-18 20:44:32 +01:00
|
|
|
UNIFIED_SOURCES += [
|
2014-02-03 16:34:42 +01:00
|
|
|
'android/nsAndroidHandlerApp.cpp',
|
|
|
|
'android/nsExternalURLHandlerService.cpp',
|
|
|
|
'android/nsMIMEInfoAndroid.cpp',
|
2018-10-29 16:21:53 +01:00
|
|
|
]
|
2020-01-08 12:59:18 +01:00
|
|
|
@@ -135,16 +137,17 @@ include('/ipc/chromium/chromium-config.m
|
2014-12-02 23:01:52 +01:00
|
|
|
FINAL_LIBRARY = 'xul'
|
|
|
|
|
|
|
|
LOCAL_INCLUDES += [
|
2018-01-23 10:55:12 +01:00
|
|
|
'/docshell/base',
|
2014-12-02 23:01:52 +01:00
|
|
|
'/dom/base',
|
|
|
|
'/dom/ipc',
|
2015-05-10 22:12:38 +02:00
|
|
|
'/netwerk/base',
|
2014-12-02 23:01:52 +01:00
|
|
|
'/netwerk/protocol/http',
|
2015-05-10 22:12:38 +02:00
|
|
|
+ '/toolkit/xre',
|
2014-12-02 23:01:52 +01:00
|
|
|
]
|
|
|
|
|
|
|
|
if CONFIG['MOZ_ENABLE_DBUS']:
|
|
|
|
CXXFLAGS += CONFIG['TK_CFLAGS']
|
|
|
|
CXXFLAGS += CONFIG['MOZ_DBUS_CFLAGS']
|
|
|
|
|
2019-10-25 11:13:30 +02:00
|
|
|
if CONFIG['MOZ_WIDGET_TOOLKIT'] == 'gtk':
|
2014-12-02 23:01:52 +01:00
|
|
|
CXXFLAGS += CONFIG['TK_CFLAGS']
|
2011-06-01 08:05:09 +02:00
|
|
|
diff --git a/uriloader/exthandler/unix/nsCommonRegistry.cpp b/uriloader/exthandler/unix/nsCommonRegistry.cpp
|
|
|
|
new file mode 100644
|
|
|
|
--- /dev/null
|
|
|
|
+++ b/uriloader/exthandler/unix/nsCommonRegistry.cpp
|
2015-08-12 09:11:49 +02:00
|
|
|
@@ -0,0 +1,53 @@
|
2011-06-01 08:05:09 +02:00
|
|
|
+/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
2012-11-20 21:34:15 +01:00
|
|
|
+/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
|
|
|
+#include "nsCommonRegistry.h"
|
|
|
|
+
|
|
|
|
+#include "nsGNOMERegistry.h"
|
|
|
|
+#include "nsKDERegistry.h"
|
|
|
|
+#include "nsString.h"
|
|
|
|
+#include "nsKDEUtils.h"
|
|
|
|
+
|
2013-01-07 21:49:28 +01:00
|
|
|
+/* static */ bool
|
2011-06-01 08:05:09 +02:00
|
|
|
+nsCommonRegistry::HandlerExists(const char *aProtocolScheme)
|
|
|
|
+{
|
|
|
|
+ if( nsKDEUtils::kdeSupport())
|
|
|
|
+ return nsKDERegistry::HandlerExists( aProtocolScheme );
|
|
|
|
+ return nsGNOMERegistry::HandlerExists( aProtocolScheme );
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+/* static */ nsresult
|
|
|
|
+nsCommonRegistry::LoadURL(nsIURI *aURL)
|
|
|
|
+{
|
|
|
|
+ if( nsKDEUtils::kdeSupport())
|
|
|
|
+ return nsKDERegistry::LoadURL( aURL );
|
|
|
|
+ return nsGNOMERegistry::LoadURL( aURL );
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+/* static */ void
|
|
|
|
+nsCommonRegistry::GetAppDescForScheme(const nsACString& aScheme,
|
|
|
|
+ nsAString& aDesc)
|
|
|
|
+{
|
|
|
|
+ if( nsKDEUtils::kdeSupport())
|
|
|
|
+ return nsKDERegistry::GetAppDescForScheme( aScheme, aDesc );
|
|
|
|
+ return nsGNOMERegistry::GetAppDescForScheme( aScheme, aDesc );
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+
|
|
|
|
+/* static */ already_AddRefed<nsMIMEInfoBase>
|
|
|
|
+nsCommonRegistry::GetFromExtension(const nsACString& aFileExt)
|
|
|
|
+{
|
|
|
|
+ if( nsKDEUtils::kdeSupport())
|
|
|
|
+ return nsKDERegistry::GetFromExtension( aFileExt );
|
|
|
|
+ return nsGNOMERegistry::GetFromExtension( aFileExt );
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+/* static */ already_AddRefed<nsMIMEInfoBase>
|
|
|
|
+nsCommonRegistry::GetFromType(const nsACString& aMIMEType)
|
|
|
|
+{
|
|
|
|
+ if( nsKDEUtils::kdeSupport())
|
|
|
|
+ return nsKDERegistry::GetFromType( aMIMEType );
|
|
|
|
+ return nsGNOMERegistry::GetFromType( aMIMEType );
|
|
|
|
+}
|
|
|
|
diff --git a/uriloader/exthandler/unix/nsCommonRegistry.h b/uriloader/exthandler/unix/nsCommonRegistry.h
|
|
|
|
new file mode 100644
|
|
|
|
--- /dev/null
|
|
|
|
+++ b/uriloader/exthandler/unix/nsCommonRegistry.h
|
2014-09-22 18:35:40 +02:00
|
|
|
@@ -0,0 +1,28 @@
|
2012-11-20 21:34:15 +01:00
|
|
|
+/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
2014-09-22 18:35:40 +02:00
|
|
|
+#ifndef nsCommonRegistry_h__
|
|
|
|
+#define nsCommonRegistry_h__
|
|
|
|
+
|
2011-06-01 08:05:09 +02:00
|
|
|
+#include "nsIURI.h"
|
|
|
|
+#include "nsCOMPtr.h"
|
|
|
|
+
|
|
|
|
+class nsMIMEInfoBase;
|
|
|
|
+
|
|
|
|
+class nsCommonRegistry
|
|
|
|
+{
|
|
|
|
+ public:
|
2013-01-07 21:49:28 +01:00
|
|
|
+ static bool HandlerExists(const char *aProtocolScheme);
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
|
|
|
+ static nsresult LoadURL(nsIURI *aURL);
|
|
|
|
+
|
|
|
|
+ static void GetAppDescForScheme(const nsACString& aScheme,
|
|
|
|
+ nsAString& aDesc);
|
|
|
|
+
|
|
|
|
+ static already_AddRefed<nsMIMEInfoBase> GetFromExtension(const nsACString& aFileExt);
|
|
|
|
+
|
|
|
|
+ static already_AddRefed<nsMIMEInfoBase> GetFromType(const nsACString& aMIMEType);
|
|
|
|
+};
|
2014-09-22 18:35:40 +02:00
|
|
|
+
|
|
|
|
+#endif
|
2011-06-01 08:05:09 +02:00
|
|
|
diff --git a/uriloader/exthandler/unix/nsKDERegistry.cpp b/uriloader/exthandler/unix/nsKDERegistry.cpp
|
|
|
|
new file mode 100644
|
|
|
|
--- /dev/null
|
|
|
|
+++ b/uriloader/exthandler/unix/nsKDERegistry.cpp
|
2020-06-02 16:55:49 +02:00
|
|
|
@@ -0,0 +1,86 @@
|
2011-06-01 08:05:09 +02:00
|
|
|
+/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
2012-11-20 21:34:15 +01:00
|
|
|
+/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
|
|
|
+#include "nsKDERegistry.h"
|
|
|
|
+#include "prlink.h"
|
|
|
|
+#include "prmem.h"
|
|
|
|
+#include "nsString.h"
|
|
|
|
+#include "nsMIMEInfoUnix.h"
|
|
|
|
+#include "nsKDEUtils.h"
|
|
|
|
+
|
2013-01-07 21:49:28 +01:00
|
|
|
+/* static */ bool
|
2011-06-01 08:05:09 +02:00
|
|
|
+nsKDERegistry::HandlerExists(const char *aProtocolScheme)
|
|
|
|
+{
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsTArray<nsCString> command;
|
|
|
|
+ command.AppendElement( NS_LITERAL_CSTRING( "HANDLEREXISTS" ));
|
2013-01-07 21:49:28 +01:00
|
|
|
+ command.AppendElement( nsAutoCString( aProtocolScheme ));
|
2011-06-01 08:05:09 +02:00
|
|
|
+ return nsKDEUtils::command( command );
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+/* static */ nsresult
|
|
|
|
+nsKDERegistry::LoadURL(nsIURI *aURL)
|
|
|
|
+{
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsTArray<nsCString> command;
|
|
|
|
+ command.AppendElement( NS_LITERAL_CSTRING( "OPEN" ));
|
2011-06-01 08:05:09 +02:00
|
|
|
+ nsCString url;
|
|
|
|
+ aURL->GetSpec( url );
|
2012-02-01 14:37:15 +01:00
|
|
|
+ command.AppendElement( url );
|
2013-01-07 21:49:28 +01:00
|
|
|
+ bool rv = nsKDEUtils::command( command );
|
|
|
|
+ if (!rv)
|
|
|
|
+ return NS_ERROR_FAILURE;
|
|
|
|
+
|
|
|
|
+ return NS_OK;
|
2011-06-01 08:05:09 +02:00
|
|
|
+}
|
|
|
|
+
|
|
|
|
+/* static */ void
|
|
|
|
+nsKDERegistry::GetAppDescForScheme(const nsACString& aScheme,
|
|
|
|
+ nsAString& aDesc)
|
|
|
|
+{
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsTArray<nsCString> command;
|
|
|
|
+ command.AppendElement( NS_LITERAL_CSTRING( "GETAPPDESCFORSCHEME" ));
|
|
|
|
+ command.AppendElement( aScheme );
|
|
|
|
+ nsTArray<nsCString> output;
|
|
|
|
+ if( nsKDEUtils::command( command, &output ) && output.Length() == 1 )
|
|
|
|
+ CopyUTF8toUTF16( output[ 0 ], aDesc );
|
2011-06-01 08:05:09 +02:00
|
|
|
+}
|
|
|
|
+
|
|
|
|
+
|
|
|
|
+/* static */ already_AddRefed<nsMIMEInfoBase>
|
|
|
|
+nsKDERegistry::GetFromExtension(const nsACString& aFileExt)
|
|
|
|
+{
|
|
|
|
+ NS_ASSERTION(aFileExt[0] != '.', "aFileExt shouldn't start with a dot");
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsTArray<nsCString> command;
|
|
|
|
+ command.AppendElement( NS_LITERAL_CSTRING( "GETFROMEXTENSION" ));
|
|
|
|
+ command.AppendElement( aFileExt );
|
2011-06-01 08:05:09 +02:00
|
|
|
+ return GetFromHelper( command );
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+/* static */ already_AddRefed<nsMIMEInfoBase>
|
|
|
|
+nsKDERegistry::GetFromType(const nsACString& aMIMEType)
|
|
|
|
+{
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsTArray<nsCString> command;
|
|
|
|
+ command.AppendElement( NS_LITERAL_CSTRING( "GETFROMTYPE" ));
|
|
|
|
+ command.AppendElement( aMIMEType );
|
2011-06-01 08:05:09 +02:00
|
|
|
+ return GetFromHelper( command );
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+/* static */ already_AddRefed<nsMIMEInfoBase>
|
2012-02-01 14:37:15 +01:00
|
|
|
+nsKDERegistry::GetFromHelper(const nsTArray<nsCString>& command)
|
2011-06-01 08:05:09 +02:00
|
|
|
+{
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsTArray<nsCString> output;
|
|
|
|
+ if( nsKDEUtils::command( command, &output ) && output.Length() == 3 )
|
2011-06-01 08:05:09 +02:00
|
|
|
+ {
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsCString mimetype = output[ 0 ];
|
2016-01-26 23:39:03 +01:00
|
|
|
+ RefPtr<nsMIMEInfoUnix> mimeInfo = new nsMIMEInfoUnix( mimetype );
|
2012-11-20 21:34:15 +01:00
|
|
|
+ NS_ENSURE_TRUE(mimeInfo, nullptr);
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsCString description = output[ 1 ];
|
2011-06-01 08:05:09 +02:00
|
|
|
+ mimeInfo->SetDescription(NS_ConvertUTF8toUTF16(description));
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsCString handlerAppName = output[ 2 ];
|
2011-06-01 08:05:09 +02:00
|
|
|
+ mimeInfo->SetDefaultDescription(NS_ConvertUTF8toUTF16(handlerAppName));
|
|
|
|
+ mimeInfo->SetPreferredAction(nsIMIMEInfo::useSystemDefault);
|
2013-09-16 09:57:05 +02:00
|
|
|
+ return mimeInfo.forget();
|
2011-06-01 08:05:09 +02:00
|
|
|
+ }
|
2012-11-20 21:34:15 +01:00
|
|
|
+ return nullptr;
|
2011-06-01 08:05:09 +02:00
|
|
|
+}
|
|
|
|
diff --git a/uriloader/exthandler/unix/nsKDERegistry.h b/uriloader/exthandler/unix/nsKDERegistry.h
|
|
|
|
new file mode 100644
|
|
|
|
--- /dev/null
|
|
|
|
+++ b/uriloader/exthandler/unix/nsKDERegistry.h
|
2014-09-22 18:35:40 +02:00
|
|
|
@@ -0,0 +1,34 @@
|
2012-11-20 21:34:15 +01:00
|
|
|
+/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
2014-09-22 18:35:40 +02:00
|
|
|
+#ifndef nsKDERegistry_h__
|
|
|
|
+#define nsKDERegistry_h__
|
|
|
|
+
|
2011-06-01 08:05:09 +02:00
|
|
|
+#include "nsIURI.h"
|
|
|
|
+#include "nsCOMPtr.h"
|
2012-02-01 14:37:15 +01:00
|
|
|
+#include "nsTArray.h"
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
|
|
|
+class nsMIMEInfoBase;
|
2017-11-15 00:17:59 +01:00
|
|
|
+//class nsAutoCString;
|
|
|
|
+//class nsCString;
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
|
|
|
+class nsKDERegistry
|
|
|
|
+{
|
|
|
|
+ public:
|
2013-01-07 21:49:28 +01:00
|
|
|
+ static bool HandlerExists(const char *aProtocolScheme);
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
|
|
|
+ static nsresult LoadURL(nsIURI *aURL);
|
|
|
|
+
|
|
|
|
+ static void GetAppDescForScheme(const nsACString& aScheme,
|
|
|
|
+ nsAString& aDesc);
|
|
|
|
+
|
|
|
|
+ static already_AddRefed<nsMIMEInfoBase> GetFromExtension(const nsACString& aFileExt);
|
|
|
|
+
|
|
|
|
+ static already_AddRefed<nsMIMEInfoBase> GetFromType(const nsACString& aMIMEType);
|
|
|
|
+ private:
|
2012-02-01 14:37:15 +01:00
|
|
|
+ static already_AddRefed<nsMIMEInfoBase> GetFromHelper(const nsTArray<nsCString>& command);
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
|
|
|
+};
|
2014-09-22 18:35:40 +02:00
|
|
|
+
|
|
|
|
+#endif //nsKDERegistry_h__
|
2011-06-01 08:05:09 +02:00
|
|
|
diff --git a/uriloader/exthandler/unix/nsMIMEInfoUnix.cpp b/uriloader/exthandler/unix/nsMIMEInfoUnix.cpp
|
|
|
|
--- a/uriloader/exthandler/unix/nsMIMEInfoUnix.cpp
|
|
|
|
+++ b/uriloader/exthandler/unix/nsMIMEInfoUnix.cpp
|
- Mozilla Firefox 76.0
* Lockwise improvements
* Improvements in Picture-in-Picture feature
* Support Audio Worklets
MFSA-2020-16 (bsc#1171186)
* CVE-2020-12387 (bmo#1545345)
Use-after-free during worker shutdown
* CVE-2020-12388 (bmo#1618911)
Sandbox escape with improperly guarded Access Tokens
* CVE-2020-12389 (bmo#1554110)
Sandbox escape with improperly separated process types
* CVE-2020-6831 (bmo#1632241)
Buffer overflow in SCTP chunk input validation
* CVE-2020-12390 (bmo#1141959)
Incorrect serialization of nsIPrincipal.origin for IPv6 addresses
* CVE-2020-12391 (bmo#1457100)
Content-Security-Policy bypass using object elements
* CVE-2020-12392 (bmo#1614468)
Arbitrary local file access with 'Copy as cURL'
* CVE-2020-12393 (bmo#1615471)
Devtools' 'Copy as cURL' feature did not fully escape
website-controlled data, potentially leading to command injection
* CVE-2020-12394 (bmo#1628288)
URL spoofing in location bar when unfocussed
* CVE-2020-12395 (bmo#1595886, bmo#1611482, bmo#1614704, bmo#1624098,
bmo#1625749, bmo#1626382, bmo#1628076, bmo#1631508)
Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8
* CVE-2020-12396 (bmo#1339601, bmo#1611938, bmo#1620488,
bmo#1622291, bmo#1627644)
Memory safety bugs fixed in Firefox 76
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=825
2020-05-05 21:25:39 +02:00
|
|
|
@@ -1,46 +1,49 @@
|
2016-11-15 19:06:29 +01:00
|
|
|
/* -*- Mode: C++; tab-width: 3; indent-tabs-mode: nil; c-basic-offset: 2 -*-
|
|
|
|
*
|
|
|
|
* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
2011-06-01 08:05:09 +02:00
|
|
|
|
|
|
|
#include "nsMIMEInfoUnix.h"
|
|
|
|
-#include "nsGNOMERegistry.h"
|
|
|
|
+#include "nsCommonRegistry.h"
|
|
|
|
#include "nsIGIOService.h"
|
|
|
|
#include "nsNetCID.h"
|
|
|
|
#include "nsIIOService.h"
|
|
|
|
#ifdef MOZ_ENABLE_DBUS
|
2019-03-19 23:01:55 +01:00
|
|
|
# include "nsDBusHandlerApp.h"
|
2011-06-01 08:05:09 +02:00
|
|
|
#endif
|
|
|
|
+#if defined(XP_UNIX) && !defined(XP_MACOSX)
|
|
|
|
+#include "nsKDEUtils.h"
|
|
|
|
+#endif
|
|
|
|
|
2019-07-09 23:21:11 +02:00
|
|
|
nsresult nsMIMEInfoUnix::LoadUriInternal(nsIURI* aURI) {
|
2016-11-15 19:06:29 +01:00
|
|
|
- return nsGNOMERegistry::LoadURL(aURI);
|
|
|
|
+ return nsCommonRegistry::LoadURL(aURI);
|
|
|
|
}
|
2015-02-23 21:32:13 +01:00
|
|
|
|
2016-11-15 19:06:29 +01:00
|
|
|
NS_IMETHODIMP
|
2019-07-09 23:21:11 +02:00
|
|
|
nsMIMEInfoUnix::GetHasDefaultHandler(bool* _retval) {
|
2016-11-15 19:06:29 +01:00
|
|
|
// if mDefaultApplication is set, it means the application has been set from
|
2013-06-24 09:57:33 +02:00
|
|
|
// either /etc/mailcap or ${HOME}/.mailcap, in which case we don't want to
|
|
|
|
// give the GNOME answer.
|
2019-01-29 19:07:12 +01:00
|
|
|
if (mDefaultApplication) return nsMIMEInfoImpl::GetHasDefaultHandler(_retval);
|
2013-06-24 09:57:33 +02:00
|
|
|
|
2012-02-01 14:37:15 +01:00
|
|
|
*_retval = false;
|
2014-07-21 11:32:46 +02:00
|
|
|
|
2015-05-10 22:12:38 +02:00
|
|
|
if (mClass == eProtocolInfo) {
|
2014-07-21 11:32:46 +02:00
|
|
|
- *_retval = nsGNOMERegistry::HandlerExists(mSchemeOrType.get());
|
|
|
|
+ *_retval = nsCommonRegistry::HandlerExists(mSchemeOrType.get());
|
|
|
|
} else {
|
2019-01-29 19:07:12 +01:00
|
|
|
RefPtr<nsMIMEInfoBase> mimeInfo =
|
|
|
|
- nsGNOMERegistry::GetFromType(mSchemeOrType);
|
|
|
|
+ nsCommonRegistry::GetFromType(mSchemeOrType);
|
2014-07-21 11:32:46 +02:00
|
|
|
if (!mimeInfo) {
|
|
|
|
nsAutoCString ext;
|
|
|
|
nsresult rv = GetPrimaryExtension(ext);
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
|
|
- mimeInfo = nsGNOMERegistry::GetFromExtension(ext);
|
|
|
|
+ mimeInfo = nsCommonRegistry::GetFromExtension(ext);
|
|
|
|
}
|
2011-06-01 08:05:09 +02:00
|
|
|
}
|
2019-01-29 19:07:12 +01:00
|
|
|
if (mimeInfo) *_retval = true;
|
2011-06-01 08:05:09 +02:00
|
|
|
}
|
|
|
|
|
2019-01-29 19:07:12 +01:00
|
|
|
if (*_retval) return NS_OK;
|
|
|
|
|
|
|
|
return NS_OK;
|
- Mozilla Firefox 76.0
* Lockwise improvements
* Improvements in Picture-in-Picture feature
* Support Audio Worklets
MFSA-2020-16 (bsc#1171186)
* CVE-2020-12387 (bmo#1545345)
Use-after-free during worker shutdown
* CVE-2020-12388 (bmo#1618911)
Sandbox escape with improperly guarded Access Tokens
* CVE-2020-12389 (bmo#1554110)
Sandbox escape with improperly separated process types
* CVE-2020-6831 (bmo#1632241)
Buffer overflow in SCTP chunk input validation
* CVE-2020-12390 (bmo#1141959)
Incorrect serialization of nsIPrincipal.origin for IPv6 addresses
* CVE-2020-12391 (bmo#1457100)
Content-Security-Policy bypass using object elements
* CVE-2020-12392 (bmo#1614468)
Arbitrary local file access with 'Copy as cURL'
* CVE-2020-12393 (bmo#1615471)
Devtools' 'Copy as cURL' feature did not fully escape
website-controlled data, potentially leading to command injection
* CVE-2020-12394 (bmo#1628288)
URL spoofing in location bar when unfocussed
* CVE-2020-12395 (bmo#1595886, bmo#1611482, bmo#1614704, bmo#1624098,
bmo#1625749, bmo#1626382, bmo#1628076, bmo#1631508)
Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8
* CVE-2020-12396 (bmo#1339601, bmo#1611938, bmo#1620488,
bmo#1622291, bmo#1627644)
Memory safety bugs fixed in Firefox 76
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=825
2020-05-05 21:25:39 +02:00
|
|
|
@@ -50,16 +53,33 @@ nsresult nsMIMEInfoUnix::LaunchDefaultWi
|
2019-01-29 19:07:12 +01:00
|
|
|
// if mDefaultApplication is set, it means the application has been set from
|
2018-03-13 20:46:06 +01:00
|
|
|
// either /etc/mailcap or ${HOME}/.mailcap, in which case we don't want to
|
|
|
|
// give the GNOME answer.
|
2019-01-29 19:07:12 +01:00
|
|
|
if (mDefaultApplication) return nsMIMEInfoImpl::LaunchDefaultWithFile(aFile);
|
2018-03-13 20:46:06 +01:00
|
|
|
|
|
|
|
nsAutoCString nativePath;
|
|
|
|
aFile->GetNativePath(nativePath);
|
2011-06-01 08:05:09 +02:00
|
|
|
|
|
|
|
+ if( nsKDEUtils::kdeSupport()) {
|
2012-02-01 14:37:15 +01:00
|
|
|
+ bool supports;
|
2011-06-01 08:05:09 +02:00
|
|
|
+ if( NS_SUCCEEDED( GetHasDefaultHandler( &supports )) && supports ) {
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsTArray<nsCString> command;
|
|
|
|
+ command.AppendElement( NS_LITERAL_CSTRING( "OPEN" ));
|
|
|
|
+ command.AppendElement( nativePath );
|
|
|
|
+ command.AppendElement( NS_LITERAL_CSTRING( "MIMETYPE" ));
|
|
|
|
+ command.AppendElement( mSchemeOrType );
|
2011-06-01 08:05:09 +02:00
|
|
|
+ if( nsKDEUtils::command( command ))
|
|
|
|
+ return NS_OK;
|
|
|
|
+ }
|
|
|
|
+ if (!mDefaultApplication)
|
|
|
|
+ return NS_ERROR_FILE_NOT_FOUND;
|
|
|
|
+
|
|
|
|
+ return LaunchWithIProcess(mDefaultApplication, nativePath);
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
nsCOMPtr<nsIGIOService> giovfs = do_GetService(NS_GIOSERVICE_CONTRACTID);
|
2015-05-10 22:12:38 +02:00
|
|
|
if (!giovfs) {
|
|
|
|
return NS_ERROR_FAILURE;
|
2011-06-01 08:05:09 +02:00
|
|
|
}
|
|
|
|
|
2015-05-10 22:12:38 +02:00
|
|
|
// nsGIOMimeApp->Launch wants a URI string instead of local file
|
|
|
|
nsresult rv;
|
2019-01-29 19:07:12 +01:00
|
|
|
nsCOMPtr<nsIIOService> ioservice =
|
2011-06-01 08:05:09 +02:00
|
|
|
diff --git a/uriloader/exthandler/unix/nsOSHelperAppService.cpp b/uriloader/exthandler/unix/nsOSHelperAppService.cpp
|
|
|
|
--- a/uriloader/exthandler/unix/nsOSHelperAppService.cpp
|
|
|
|
+++ b/uriloader/exthandler/unix/nsOSHelperAppService.cpp
|
2018-01-23 10:55:12 +01:00
|
|
|
@@ -5,17 +5,17 @@
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/stat.h>
|
2011-06-01 08:05:09 +02:00
|
|
|
|
|
|
|
#include "nsOSHelperAppService.h"
|
|
|
|
#include "nsMIMEInfoUnix.h"
|
2013-09-16 09:57:05 +02:00
|
|
|
#ifdef MOZ_WIDGET_GTK
|
2019-03-19 23:01:55 +01:00
|
|
|
-# include "nsGNOMERegistry.h"
|
|
|
|
+# include "nsCommonRegistry.h"
|
2011-06-01 08:05:09 +02:00
|
|
|
#endif
|
|
|
|
#include "nsISupports.h"
|
|
|
|
#include "nsString.h"
|
|
|
|
#include "nsReadableUtils.h"
|
|
|
|
#include "nsUnicharUtils.h"
|
|
|
|
#include "nsIFileStreams.h"
|
2017-11-15 00:17:59 +01:00
|
|
|
#include "nsILineInputStream.h"
|
- Mozilla Firefox 73.0
* Added support for setting a default zoom level applicable for all
web content
* High-contrast mode has been updated to allow background images
* Improved audio quality when playing back audio at a faster or
slower speed
* Added NextDNS as alternative option for DNS over HTTPS
MFSA 2020-05 (bsc#1163368)
* CVE-2020-6796 (bmo#1610426)
Missing bounds check on shared memory read in the parent process
* CVE-2020-6797 (bmo#1596668) (MacOS X only)
Extensions granted downloads.open permission could open arbitrary
applications on Mac OSX
* CVE-2020-6798 (bmo#1602944)
Incorrect parsing of template tag could result in JavaScript injection
* CVE-2020-6799 (bmo#1606596) (Windows only)
Arbitrary code execution when opening pdf links from other
applications, when Firefox is configured as default pdf reader
* CVE-2020-6800 (bmo#1595786,bmo#1596706,bmo#1598543,bmo#1604851,
bmo#1608580,bmo#1608785,bmo#1605777)
Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5
* CVE-2020-6801 (bmo#1601024,bmo#1601712,bmo#1604836,bmo#1606492)
Memory safety bugs fixed in Firefox 73
- updated requirements
* rust >= 1.39
* NSS >= 3.49.2
* rust-cbindgen >= 0.12.0
- rebased patches
- removed obsolete patch
* mozilla-bmo1601707.patch
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=802
2020-02-12 15:14:39 +01:00
|
|
|
#include "nsIFile.h"
|
- Mozilla Firefox 76.0
* Lockwise improvements
* Improvements in Picture-in-Picture feature
* Support Audio Worklets
MFSA-2020-16 (bsc#1171186)
* CVE-2020-12387 (bmo#1545345)
Use-after-free during worker shutdown
* CVE-2020-12388 (bmo#1618911)
Sandbox escape with improperly guarded Access Tokens
* CVE-2020-12389 (bmo#1554110)
Sandbox escape with improperly separated process types
* CVE-2020-6831 (bmo#1632241)
Buffer overflow in SCTP chunk input validation
* CVE-2020-12390 (bmo#1141959)
Incorrect serialization of nsIPrincipal.origin for IPv6 addresses
* CVE-2020-12391 (bmo#1457100)
Content-Security-Policy bypass using object elements
* CVE-2020-12392 (bmo#1614468)
Arbitrary local file access with 'Copy as cURL'
* CVE-2020-12393 (bmo#1615471)
Devtools' 'Copy as cURL' feature did not fully escape
website-controlled data, potentially leading to command injection
* CVE-2020-12394 (bmo#1628288)
URL spoofing in location bar when unfocussed
* CVE-2020-12395 (bmo#1595886, bmo#1611482, bmo#1614704, bmo#1624098,
bmo#1625749, bmo#1626382, bmo#1628076, bmo#1631508)
Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8
* CVE-2020-12396 (bmo#1339601, bmo#1611938, bmo#1620488,
bmo#1622291, bmo#1627644)
Memory safety bugs fixed in Firefox 76
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=825
2020-05-05 21:25:39 +02:00
|
|
|
@@ -1023,17 +1023,17 @@ nsresult nsOSHelperAppService::GetHandle
|
2011-06-01 08:05:09 +02:00
|
|
|
|
2019-01-29 19:07:12 +01:00
|
|
|
nsresult nsOSHelperAppService::OSProtocolHandlerExists(
|
|
|
|
const char* aProtocolScheme, bool* aHandlerExists) {
|
2018-01-23 10:55:12 +01:00
|
|
|
nsresult rv = NS_OK;
|
2011-06-01 08:05:09 +02:00
|
|
|
|
2018-01-23 10:55:12 +01:00
|
|
|
if (!XRE_IsContentProcess()) {
|
2013-09-16 09:57:05 +02:00
|
|
|
#ifdef MOZ_WIDGET_GTK
|
2018-01-23 10:55:12 +01:00
|
|
|
// Check the GNOME registry for a protocol handler
|
|
|
|
- *aHandlerExists = nsGNOMERegistry::HandlerExists(aProtocolScheme);
|
|
|
|
+ *aHandlerExists = nsCommonRegistry::HandlerExists(aProtocolScheme);
|
|
|
|
#else
|
|
|
|
*aHandlerExists = false;
|
2011-06-01 08:05:09 +02:00
|
|
|
#endif
|
2018-01-23 10:55:12 +01:00
|
|
|
} else {
|
|
|
|
*aHandlerExists = false;
|
2019-01-29 19:07:12 +01:00
|
|
|
nsCOMPtr<nsIHandlerService> handlerSvc =
|
|
|
|
do_GetService(NS_HANDLERSERVICE_CONTRACTID, &rv);
|
2018-01-23 10:55:12 +01:00
|
|
|
if (NS_SUCCEEDED(rv) && handlerSvc) {
|
- Mozilla Firefox 76.0
* Lockwise improvements
* Improvements in Picture-in-Picture feature
* Support Audio Worklets
MFSA-2020-16 (bsc#1171186)
* CVE-2020-12387 (bmo#1545345)
Use-after-free during worker shutdown
* CVE-2020-12388 (bmo#1618911)
Sandbox escape with improperly guarded Access Tokens
* CVE-2020-12389 (bmo#1554110)
Sandbox escape with improperly separated process types
* CVE-2020-6831 (bmo#1632241)
Buffer overflow in SCTP chunk input validation
* CVE-2020-12390 (bmo#1141959)
Incorrect serialization of nsIPrincipal.origin for IPv6 addresses
* CVE-2020-12391 (bmo#1457100)
Content-Security-Policy bypass using object elements
* CVE-2020-12392 (bmo#1614468)
Arbitrary local file access with 'Copy as cURL'
* CVE-2020-12393 (bmo#1615471)
Devtools' 'Copy as cURL' feature did not fully escape
website-controlled data, potentially leading to command injection
* CVE-2020-12394 (bmo#1628288)
URL spoofing in location bar when unfocussed
* CVE-2020-12395 (bmo#1595886, bmo#1611482, bmo#1614704, bmo#1624098,
bmo#1625749, bmo#1626382, bmo#1628076, bmo#1631508)
Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8
* CVE-2020-12396 (bmo#1339601, bmo#1611938, bmo#1620488,
bmo#1622291, bmo#1627644)
Memory safety bugs fixed in Firefox 76
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=825
2020-05-05 21:25:39 +02:00
|
|
|
@@ -1043,17 +1043,17 @@ nsresult nsOSHelperAppService::OSProtoco
|
2018-01-23 10:55:12 +01:00
|
|
|
}
|
2011-06-01 08:05:09 +02:00
|
|
|
|
2018-01-23 10:55:12 +01:00
|
|
|
return rv;
|
2011-06-01 08:05:09 +02:00
|
|
|
}
|
|
|
|
|
2019-01-29 19:07:12 +01:00
|
|
|
NS_IMETHODIMP nsOSHelperAppService::GetApplicationDescription(
|
|
|
|
const nsACString& aScheme, nsAString& _retval) {
|
2013-09-16 09:57:05 +02:00
|
|
|
#ifdef MOZ_WIDGET_GTK
|
2011-06-01 08:05:09 +02:00
|
|
|
- nsGNOMERegistry::GetAppDescForScheme(aScheme, _retval);
|
|
|
|
+ nsCommonRegistry::GetAppDescForScheme(aScheme, _retval);
|
|
|
|
return _retval.IsEmpty() ? NS_ERROR_NOT_AVAILABLE : NS_OK;
|
|
|
|
#else
|
|
|
|
return NS_ERROR_NOT_AVAILABLE;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2020-01-08 12:59:18 +01:00
|
|
|
NS_IMETHODIMP nsOSHelperAppService::IsCurrentAppOSDefaultForProtocol(
|
|
|
|
const nsACString& aScheme, bool* _retval) {
|
- Mozilla Firefox 76.0
* Lockwise improvements
* Improvements in Picture-in-Picture feature
* Support Audio Worklets
MFSA-2020-16 (bsc#1171186)
* CVE-2020-12387 (bmo#1545345)
Use-after-free during worker shutdown
* CVE-2020-12388 (bmo#1618911)
Sandbox escape with improperly guarded Access Tokens
* CVE-2020-12389 (bmo#1554110)
Sandbox escape with improperly separated process types
* CVE-2020-6831 (bmo#1632241)
Buffer overflow in SCTP chunk input validation
* CVE-2020-12390 (bmo#1141959)
Incorrect serialization of nsIPrincipal.origin for IPv6 addresses
* CVE-2020-12391 (bmo#1457100)
Content-Security-Policy bypass using object elements
* CVE-2020-12392 (bmo#1614468)
Arbitrary local file access with 'Copy as cURL'
* CVE-2020-12393 (bmo#1615471)
Devtools' 'Copy as cURL' feature did not fully escape
website-controlled data, potentially leading to command injection
* CVE-2020-12394 (bmo#1628288)
URL spoofing in location bar when unfocussed
* CVE-2020-12395 (bmo#1595886, bmo#1611482, bmo#1614704, bmo#1624098,
bmo#1625749, bmo#1626382, bmo#1628076, bmo#1631508)
Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8
* CVE-2020-12396 (bmo#1339601, bmo#1611938, bmo#1620488,
bmo#1622291, bmo#1627644)
Memory safety bugs fixed in Firefox 76
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=825
2020-05-05 21:25:39 +02:00
|
|
|
@@ -1140,17 +1140,17 @@ already_AddRefed<nsMIMEInfoBase> nsOSHel
|
2019-01-29 19:07:12 +01:00
|
|
|
nsresult rv =
|
|
|
|
LookUpTypeAndDescription(NS_ConvertUTF8toUTF16(aFileExt), majorType,
|
|
|
|
minorType, mime_types_description, true);
|
2011-06-01 08:05:09 +02:00
|
|
|
|
|
|
|
if (NS_FAILED(rv) || majorType.IsEmpty()) {
|
2013-09-16 09:57:05 +02:00
|
|
|
#ifdef MOZ_WIDGET_GTK
|
2011-06-01 08:05:09 +02:00
|
|
|
LOG(("Looking in GNOME registry\n"));
|
2016-01-26 23:39:03 +01:00
|
|
|
RefPtr<nsMIMEInfoBase> gnomeInfo =
|
2019-01-29 19:07:12 +01:00
|
|
|
- nsGNOMERegistry::GetFromExtension(aFileExt);
|
|
|
|
+ nsCommonRegistry::GetFromExtension(aFileExt);
|
2011-06-01 08:05:09 +02:00
|
|
|
if (gnomeInfo) {
|
|
|
|
LOG(("Got MIMEInfo from GNOME registry\n"));
|
2013-08-07 14:18:59 +02:00
|
|
|
return gnomeInfo.forget();
|
2011-06-01 08:05:09 +02:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2019-01-29 19:07:12 +01:00
|
|
|
rv = LookUpTypeAndDescription(NS_ConvertUTF8toUTF16(aFileExt), majorType,
|
|
|
|
minorType, mime_types_description, false);
|
- Mozilla Firefox 76.0
* Lockwise improvements
* Improvements in Picture-in-Picture feature
* Support Audio Worklets
MFSA-2020-16 (bsc#1171186)
* CVE-2020-12387 (bmo#1545345)
Use-after-free during worker shutdown
* CVE-2020-12388 (bmo#1618911)
Sandbox escape with improperly guarded Access Tokens
* CVE-2020-12389 (bmo#1554110)
Sandbox escape with improperly separated process types
* CVE-2020-6831 (bmo#1632241)
Buffer overflow in SCTP chunk input validation
* CVE-2020-12390 (bmo#1141959)
Incorrect serialization of nsIPrincipal.origin for IPv6 addresses
* CVE-2020-12391 (bmo#1457100)
Content-Security-Policy bypass using object elements
* CVE-2020-12392 (bmo#1614468)
Arbitrary local file access with 'Copy as cURL'
* CVE-2020-12393 (bmo#1615471)
Devtools' 'Copy as cURL' feature did not fully escape
website-controlled data, potentially leading to command injection
* CVE-2020-12394 (bmo#1628288)
URL spoofing in location bar when unfocussed
* CVE-2020-12395 (bmo#1595886, bmo#1611482, bmo#1614704, bmo#1624098,
bmo#1625749, bmo#1626382, bmo#1628076, bmo#1631508)
Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8
* CVE-2020-12396 (bmo#1339601, bmo#1611938, bmo#1620488,
bmo#1622291, bmo#1627644)
Memory safety bugs fixed in Firefox 76
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=825
2020-05-05 21:25:39 +02:00
|
|
|
@@ -1252,17 +1252,17 @@ already_AddRefed<nsMIMEInfoBase> nsOSHel
|
2019-01-29 19:07:12 +01:00
|
|
|
|
|
|
|
// Now look up our extensions
|
2015-05-10 22:12:38 +02:00
|
|
|
nsAutoString extensions, mime_types_description;
|
2019-01-29 19:07:12 +01:00
|
|
|
LookUpExtensionsAndDescription(majorType, minorType, extensions,
|
2015-05-10 22:12:38 +02:00
|
|
|
mime_types_description);
|
|
|
|
|
2013-09-16 09:57:05 +02:00
|
|
|
#ifdef MOZ_WIDGET_GTK
|
2011-06-01 08:05:09 +02:00
|
|
|
if (handler.IsEmpty()) {
|
2016-01-26 23:39:03 +01:00
|
|
|
- RefPtr<nsMIMEInfoBase> gnomeInfo = nsGNOMERegistry::GetFromType(aMIMEType);
|
|
|
|
+ RefPtr<nsMIMEInfoBase> gnomeInfo = nsCommonRegistry::GetFromType(aMIMEType);
|
2015-05-10 22:12:38 +02:00
|
|
|
if (gnomeInfo) {
|
2019-01-29 19:07:12 +01:00
|
|
|
LOG(
|
|
|
|
("Got MIMEInfo from GNOME registry without extensions; setting them "
|
|
|
|
"to %s\n",
|
|
|
|
NS_LossyConvertUTF16toASCII(extensions).get()));
|
2015-05-10 22:12:38 +02:00
|
|
|
|
|
|
|
NS_ASSERTION(!gnomeInfo->HasExtensions(), "How'd that happen?");
|
|
|
|
gnomeInfo->SetFileExtensions(NS_ConvertUTF16toUTF8(extensions));
|
2014-12-02 23:01:52 +01:00
|
|
|
diff --git a/widget/gtk/moz.build b/widget/gtk/moz.build
|
|
|
|
--- a/widget/gtk/moz.build
|
|
|
|
+++ b/widget/gtk/moz.build
|
2020-04-07 14:21:48 +02:00
|
|
|
@@ -129,16 +129,17 @@ include('/ipc/chromium/chromium-config.m
|
2015-02-23 21:32:13 +01:00
|
|
|
|
2014-12-02 23:01:52 +01:00
|
|
|
FINAL_LIBRARY = 'xul'
|
|
|
|
|
|
|
|
LOCAL_INCLUDES += [
|
2018-10-29 16:21:53 +01:00
|
|
|
'/layout/base',
|
2014-12-02 23:01:52 +01:00
|
|
|
'/layout/generic',
|
|
|
|
'/layout/xul',
|
|
|
|
'/other-licenses/atk-1.0',
|
2015-02-23 21:32:13 +01:00
|
|
|
+ '/toolkit/xre',
|
|
|
|
'/widget',
|
2017-09-05 12:10:37 +02:00
|
|
|
'/widget/headless',
|
2014-12-02 23:01:52 +01:00
|
|
|
]
|
|
|
|
|
|
|
|
if CONFIG['MOZ_X11']:
|
|
|
|
LOCAL_INCLUDES += [
|
2015-02-23 21:32:13 +01:00
|
|
|
'/widget/x11',
|
2014-12-02 23:01:52 +01:00
|
|
|
]
|
2014-02-03 16:34:42 +01:00
|
|
|
diff --git a/widget/gtk/nsFilePicker.cpp b/widget/gtk/nsFilePicker.cpp
|
|
|
|
--- a/widget/gtk/nsFilePicker.cpp
|
|
|
|
+++ b/widget/gtk/nsFilePicker.cpp
|
- Mozilla Firefox 73.0
* Added support for setting a default zoom level applicable for all
web content
* High-contrast mode has been updated to allow background images
* Improved audio quality when playing back audio at a faster or
slower speed
* Added NextDNS as alternative option for DNS over HTTPS
MFSA 2020-05 (bsc#1163368)
* CVE-2020-6796 (bmo#1610426)
Missing bounds check on shared memory read in the parent process
* CVE-2020-6797 (bmo#1596668) (MacOS X only)
Extensions granted downloads.open permission could open arbitrary
applications on Mac OSX
* CVE-2020-6798 (bmo#1602944)
Incorrect parsing of template tag could result in JavaScript injection
* CVE-2020-6799 (bmo#1606596) (Windows only)
Arbitrary code execution when opening pdf links from other
applications, when Firefox is configured as default pdf reader
* CVE-2020-6800 (bmo#1595786,bmo#1596706,bmo#1598543,bmo#1604851,
bmo#1608580,bmo#1608785,bmo#1605777)
Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5
* CVE-2020-6801 (bmo#1601024,bmo#1601712,bmo#1604836,bmo#1606492)
Memory safety bugs fixed in Firefox 73
- updated requirements
* rust >= 1.39
* NSS >= 3.49.2
* rust-cbindgen >= 0.12.0
- rebased patches
- removed obsolete patch
* mozilla-bmo1601707.patch
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=802
2020-02-12 15:14:39 +01:00
|
|
|
@@ -1,15 +1,16 @@
|
|
|
|
/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
2012-08-28 20:40:50 +02:00
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
2011-06-01 08:05:09 +02:00
|
|
|
|
- Mozilla Firefox 73.0
* Added support for setting a default zoom level applicable for all
web content
* High-contrast mode has been updated to allow background images
* Improved audio quality when playing back audio at a faster or
slower speed
* Added NextDNS as alternative option for DNS over HTTPS
MFSA 2020-05 (bsc#1163368)
* CVE-2020-6796 (bmo#1610426)
Missing bounds check on shared memory read in the parent process
* CVE-2020-6797 (bmo#1596668) (MacOS X only)
Extensions granted downloads.open permission could open arbitrary
applications on Mac OSX
* CVE-2020-6798 (bmo#1602944)
Incorrect parsing of template tag could result in JavaScript injection
* CVE-2020-6799 (bmo#1606596) (Windows only)
Arbitrary code execution when opening pdf links from other
applications, when Firefox is configured as default pdf reader
* CVE-2020-6800 (bmo#1595786,bmo#1596706,bmo#1598543,bmo#1604851,
bmo#1608580,bmo#1608785,bmo#1605777)
Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5
* CVE-2020-6801 (bmo#1601024,bmo#1601712,bmo#1604836,bmo#1606492)
Memory safety bugs fixed in Firefox 73
- updated requirements
* rust >= 1.39
* NSS >= 3.49.2
* rust-cbindgen >= 0.12.0
- rebased patches
- removed obsolete patch
* mozilla-bmo1601707.patch
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=802
2020-02-12 15:14:39 +01:00
|
|
|
#include <dlfcn.h>
|
|
|
|
#include <gtk/gtk.h>
|
|
|
|
+#include <gdk/gdkx.h>
|
2015-04-01 07:22:19 +02:00
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <unistd.h>
|
2012-02-01 14:37:15 +01:00
|
|
|
|
- Mozilla Firefox 73.0
* Added support for setting a default zoom level applicable for all
web content
* High-contrast mode has been updated to allow background images
* Improved audio quality when playing back audio at a faster or
slower speed
* Added NextDNS as alternative option for DNS over HTTPS
MFSA 2020-05 (bsc#1163368)
* CVE-2020-6796 (bmo#1610426)
Missing bounds check on shared memory read in the parent process
* CVE-2020-6797 (bmo#1596668) (MacOS X only)
Extensions granted downloads.open permission could open arbitrary
applications on Mac OSX
* CVE-2020-6798 (bmo#1602944)
Incorrect parsing of template tag could result in JavaScript injection
* CVE-2020-6799 (bmo#1606596) (Windows only)
Arbitrary code execution when opening pdf links from other
applications, when Firefox is configured as default pdf reader
* CVE-2020-6800 (bmo#1595786,bmo#1596706,bmo#1598543,bmo#1604851,
bmo#1608580,bmo#1608785,bmo#1605777)
Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5
* CVE-2020-6801 (bmo#1601024,bmo#1601712,bmo#1604836,bmo#1606492)
Memory safety bugs fixed in Firefox 73
- updated requirements
* rust >= 1.39
* NSS >= 3.49.2
* rust-cbindgen >= 0.12.0
- rebased patches
- removed obsolete patch
* mozilla-bmo1601707.patch
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=802
2020-02-12 15:14:39 +01:00
|
|
|
#include "mozilla/Types.h"
|
2013-10-30 15:45:02 +01:00
|
|
|
#include "nsGtkUtils.h"
|
2011-06-01 08:05:09 +02:00
|
|
|
#include "nsIFileURL.h"
|
2019-09-09 08:28:12 +02:00
|
|
|
#include "nsIGIOService.h"
|
- Mozilla Firefox 76.0
* Lockwise improvements
* Improvements in Picture-in-Picture feature
* Support Audio Worklets
MFSA-2020-16 (bsc#1171186)
* CVE-2020-12387 (bmo#1545345)
Use-after-free during worker shutdown
* CVE-2020-12388 (bmo#1618911)
Sandbox escape with improperly guarded Access Tokens
* CVE-2020-12389 (bmo#1554110)
Sandbox escape with improperly separated process types
* CVE-2020-6831 (bmo#1632241)
Buffer overflow in SCTP chunk input validation
* CVE-2020-12390 (bmo#1141959)
Incorrect serialization of nsIPrincipal.origin for IPv6 addresses
* CVE-2020-12391 (bmo#1457100)
Content-Security-Policy bypass using object elements
* CVE-2020-12392 (bmo#1614468)
Arbitrary local file access with 'Copy as cURL'
* CVE-2020-12393 (bmo#1615471)
Devtools' 'Copy as cURL' feature did not fully escape
website-controlled data, potentially leading to command injection
* CVE-2020-12394 (bmo#1628288)
URL spoofing in location bar when unfocussed
* CVE-2020-12395 (bmo#1595886, bmo#1611482, bmo#1614704, bmo#1624098,
bmo#1625749, bmo#1626382, bmo#1628076, bmo#1631508)
Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8
* CVE-2020-12396 (bmo#1339601, bmo#1611938, bmo#1620488,
bmo#1622291, bmo#1627644)
Memory safety bugs fixed in Firefox 76
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=825
2020-05-05 21:25:39 +02:00
|
|
|
@@ -20,16 +21,18 @@
|
2011-06-01 08:05:09 +02:00
|
|
|
#include "nsArrayEnumerator.h"
|
2013-02-19 20:24:59 +01:00
|
|
|
#include "nsMemory.h"
|
|
|
|
#include "nsEnumeratorUtils.h"
|
2011-11-09 13:04:11 +01:00
|
|
|
#include "nsNetUtil.h"
|
2011-06-01 08:05:09 +02:00
|
|
|
#include "nsReadableUtils.h"
|
|
|
|
#include "mozcontainer.h"
|
|
|
|
|
|
|
|
#include "nsFilePicker.h"
|
|
|
|
+#include "nsKDEUtils.h"
|
- Mozilla Firefox 76.0
* Lockwise improvements
* Improvements in Picture-in-Picture feature
* Support Audio Worklets
MFSA-2020-16 (bsc#1171186)
* CVE-2020-12387 (bmo#1545345)
Use-after-free during worker shutdown
* CVE-2020-12388 (bmo#1618911)
Sandbox escape with improperly guarded Access Tokens
* CVE-2020-12389 (bmo#1554110)
Sandbox escape with improperly separated process types
* CVE-2020-6831 (bmo#1632241)
Buffer overflow in SCTP chunk input validation
* CVE-2020-12390 (bmo#1141959)
Incorrect serialization of nsIPrincipal.origin for IPv6 addresses
* CVE-2020-12391 (bmo#1457100)
Content-Security-Policy bypass using object elements
* CVE-2020-12392 (bmo#1614468)
Arbitrary local file access with 'Copy as cURL'
* CVE-2020-12393 (bmo#1615471)
Devtools' 'Copy as cURL' feature did not fully escape
website-controlled data, potentially leading to command injection
* CVE-2020-12394 (bmo#1628288)
URL spoofing in location bar when unfocussed
* CVE-2020-12395 (bmo#1595886, bmo#1611482, bmo#1614704, bmo#1624098,
bmo#1625749, bmo#1626382, bmo#1628076, bmo#1631508)
Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8
* CVE-2020-12396 (bmo#1339601, bmo#1611938, bmo#1620488,
bmo#1622291, bmo#1627644)
Memory safety bugs fixed in Firefox 76
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=825
2020-05-05 21:25:39 +02:00
|
|
|
+#include "nsURLHelper.h"
|
2011-06-01 08:05:09 +02:00
|
|
|
|
2012-02-01 14:37:15 +01:00
|
|
|
using namespace mozilla;
|
2011-06-01 08:05:09 +02:00
|
|
|
|
2012-02-01 14:37:15 +01:00
|
|
|
#define MAX_PREVIEW_SIZE 180
|
2015-09-22 08:10:40 +02:00
|
|
|
// bug 1184009
|
|
|
|
#define MAX_PREVIEW_SOURCE_SIZE 4096
|
2013-12-11 09:31:54 +01:00
|
|
|
|
2019-07-09 23:21:11 +02:00
|
|
|
nsIFile* nsFilePicker::mPrevDisplayDirectory = nullptr;
|
2020-06-02 16:55:49 +02:00
|
|
|
@@ -223,17 +226,19 @@ nsFilePicker::AppendFilters(int32_t aFil
|
2019-01-29 19:07:12 +01:00
|
|
|
mAllowURLs = !!(aFilterMask & filterAllowURLs);
|
2011-06-01 08:05:09 +02:00
|
|
|
return nsBaseFilePicker::AppendFilters(aFilterMask);
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
2019-07-09 23:21:11 +02:00
|
|
|
nsFilePicker::AppendFilter(const nsAString& aTitle, const nsAString& aFilter) {
|
2011-06-01 08:05:09 +02:00
|
|
|
if (aFilter.EqualsLiteral("..apps")) {
|
|
|
|
// No platform specific thing we can do here, really....
|
|
|
|
- return NS_OK;
|
|
|
|
+ // Unless it's KDE.
|
|
|
|
+ if( mMode != modeOpen || !nsKDEUtils::kdeSupport())
|
2013-01-07 21:49:28 +01:00
|
|
|
+ return NS_OK;
|
2011-06-01 08:05:09 +02:00
|
|
|
}
|
|
|
|
|
2013-01-07 21:49:28 +01:00
|
|
|
nsAutoCString filter, name;
|
2011-06-01 08:05:09 +02:00
|
|
|
CopyUTF16toUTF8(aFilter, filter);
|
|
|
|
CopyUTF16toUTF8(aTitle, name);
|
|
|
|
|
|
|
|
mFilters.AppendElement(filter);
|
|
|
|
mFilterNames.AppendElement(name);
|
2020-06-02 16:55:49 +02:00
|
|
|
@@ -333,16 +338,39 @@ nsresult nsFilePicker::Show(int16_t* aRe
|
2019-01-29 19:07:12 +01:00
|
|
|
return NS_OK;
|
|
|
|
}
|
2011-06-01 08:05:09 +02:00
|
|
|
|
|
|
|
NS_IMETHODIMP
|
2019-07-09 23:21:11 +02:00
|
|
|
nsFilePicker::Open(nsIFilePickerShownCallback* aCallback) {
|
2012-11-26 12:27:34 +01:00
|
|
|
// Can't show two dialogs concurrently with the same filepicker
|
2019-01-29 19:07:12 +01:00
|
|
|
if (mRunning) return NS_ERROR_NOT_AVAILABLE;
|
2011-06-01 08:05:09 +02:00
|
|
|
|
2012-11-26 12:27:34 +01:00
|
|
|
+ // KDE file picker is not handled via callback
|
|
|
|
+ if( nsKDEUtils::kdeSupport()) {
|
|
|
|
+ mCallback = aCallback;
|
|
|
|
+ mRunning = true;
|
2018-01-03 14:39:46 +01:00
|
|
|
+ NS_ADDREF_THIS();
|
2017-10-30 07:56:57 +01:00
|
|
|
+ g_idle_add([](gpointer data) -> gboolean {
|
|
|
|
+ nsFilePicker* queuedPicker = (nsFilePicker*) data;
|
|
|
|
+ int16_t result;
|
|
|
|
+ queuedPicker->kdeFileDialog(&result);
|
|
|
|
+ if (queuedPicker->mCallback) {
|
|
|
|
+ queuedPicker->mCallback->Done(result);
|
|
|
|
+ queuedPicker->mCallback = nullptr;
|
|
|
|
+ } else {
|
|
|
|
+ queuedPicker->mResult = result;
|
|
|
|
+ }
|
|
|
|
+ queuedPicker->mRunning = false;
|
2018-01-03 14:39:46 +01:00
|
|
|
+ NS_RELEASE(queuedPicker);
|
2017-10-30 07:56:57 +01:00
|
|
|
+ return G_SOURCE_REMOVE;
|
|
|
|
+ }, this);
|
|
|
|
+
|
2012-11-26 12:27:34 +01:00
|
|
|
+ return NS_OK;
|
|
|
|
+ }
|
2012-03-01 10:09:12 +01:00
|
|
|
+
|
2020-04-07 14:21:48 +02:00
|
|
|
NS_ConvertUTF16toUTF8 title(mTitle);
|
2011-06-01 08:05:09 +02:00
|
|
|
|
2019-07-09 23:21:11 +02:00
|
|
|
GtkWindow* parent_widget =
|
2019-01-29 19:07:12 +01:00
|
|
|
GTK_WINDOW(mParentWidget->GetNativeData(NS_NATIVE_SHELLWIDGET));
|
2011-06-01 08:05:09 +02:00
|
|
|
|
2012-11-26 12:27:34 +01:00
|
|
|
GtkFileChooserAction action = GetGtkFileChooserAction(mMode);
|
2016-11-15 19:06:29 +01:00
|
|
|
|
2020-04-07 14:21:48 +02:00
|
|
|
const gchar* accept_button;
|
2020-06-02 16:55:49 +02:00
|
|
|
@@ -562,16 +590,244 @@ void nsFilePicker::Done(void* file_choos
|
2012-11-20 21:34:15 +01:00
|
|
|
mCallback->Done(result);
|
|
|
|
mCallback = nullptr;
|
|
|
|
} else {
|
|
|
|
mResult = result;
|
|
|
|
}
|
|
|
|
NS_RELEASE_THIS();
|
2011-06-01 08:05:09 +02:00
|
|
|
}
|
2018-12-12 12:35:28 +01:00
|
|
|
|
2011-06-01 08:05:09 +02:00
|
|
|
+nsCString nsFilePicker::kdeMakeFilter( int index )
|
|
|
|
+ {
|
|
|
|
+ nsCString buf = mFilters[ index ];
|
|
|
|
+ for( PRUint32 i = 0;
|
|
|
|
+ i < buf.Length();
|
|
|
|
+ ++i )
|
|
|
|
+ if( buf[ i ] == ';' ) // KDE separates just using spaces
|
|
|
|
+ buf.SetCharAt( ' ', i );
|
|
|
|
+ if (!mFilterNames[index].IsEmpty())
|
|
|
|
+ {
|
|
|
|
+ buf += "|";
|
|
|
|
+ buf += mFilterNames[index].get();
|
|
|
|
+ }
|
|
|
|
+ return buf;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+static PRInt32 windowToXid( nsIWidget* widget )
|
|
|
|
+ {
|
2013-02-19 20:24:59 +01:00
|
|
|
+ GtkWindow *parent_widget = GTK_WINDOW(widget->GetNativeData(NS_NATIVE_SHELLWIDGET));
|
2011-06-01 08:05:09 +02:00
|
|
|
+ GdkWindow* gdk_window = gtk_widget_get_window( gtk_widget_get_toplevel( GTK_WIDGET( parent_widget )));
|
|
|
|
+ return GDK_WINDOW_XID( gdk_window );
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+NS_IMETHODIMP nsFilePicker::kdeFileDialog(PRInt16 *aReturn)
|
|
|
|
+ {
|
|
|
|
+ NS_ENSURE_ARG_POINTER(aReturn);
|
|
|
|
+
|
|
|
|
+ if( mMode == modeOpen && mFilters.Length() == 1 && mFilters[ 0 ].EqualsLiteral( "..apps" ))
|
|
|
|
+ return kdeAppsDialog( aReturn );
|
|
|
|
+
|
2017-11-15 00:17:59 +01:00
|
|
|
+ nsCString title;
|
2011-06-01 08:05:09 +02:00
|
|
|
+ title.Adopt(ToNewUTF8String(mTitle));
|
|
|
|
+
|
|
|
|
+ const char* arg = NULL;
|
|
|
|
+ if( mAllowURLs )
|
|
|
|
+ {
|
|
|
|
+ switch( mMode )
|
|
|
|
+ {
|
|
|
|
+ case nsIFilePicker::modeOpen:
|
|
|
|
+ case nsIFilePicker::modeOpenMultiple:
|
|
|
|
+ arg = "GETOPENURL";
|
|
|
|
+ break;
|
|
|
|
+ case nsIFilePicker::modeSave:
|
|
|
|
+ arg = "GETSAVEURL";
|
|
|
|
+ break;
|
|
|
|
+ case nsIFilePicker::modeGetFolder:
|
|
|
|
+ arg = "GETDIRECTORYURL";
|
|
|
|
+ break;
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ else
|
|
|
|
+ {
|
|
|
|
+ switch( mMode )
|
|
|
|
+ {
|
|
|
|
+ case nsIFilePicker::modeOpen:
|
|
|
|
+ case nsIFilePicker::modeOpenMultiple:
|
|
|
|
+ arg = "GETOPENFILENAME";
|
|
|
|
+ break;
|
|
|
|
+ case nsIFilePicker::modeSave:
|
|
|
|
+ arg = "GETSAVEFILENAME";
|
|
|
|
+ break;
|
|
|
|
+ case nsIFilePicker::modeGetFolder:
|
|
|
|
+ arg = "GETDIRECTORYFILENAME";
|
|
|
|
+ break;
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+
|
2013-01-07 21:49:28 +01:00
|
|
|
+ nsAutoCString directory;
|
2011-06-01 08:05:09 +02:00
|
|
|
+ if (mDisplayDirectory) {
|
|
|
|
+ mDisplayDirectory->GetNativePath(directory);
|
|
|
|
+ } else if (mPrevDisplayDirectory) {
|
|
|
|
+ mPrevDisplayDirectory->GetNativePath(directory);
|
|
|
|
+ }
|
|
|
|
+
|
2013-01-07 21:49:28 +01:00
|
|
|
+ nsAutoCString startdir;
|
2011-06-01 08:05:09 +02:00
|
|
|
+ if (!directory.IsEmpty()) {
|
|
|
|
+ startdir = directory;
|
|
|
|
+ }
|
|
|
|
+ if (mMode == nsIFilePicker::modeSave) {
|
|
|
|
+ if( !startdir.IsEmpty())
|
|
|
|
+ {
|
|
|
|
+ startdir += "/";
|
|
|
|
+ startdir += ToNewUTF8String(mDefault);
|
|
|
|
+ }
|
|
|
|
+ else
|
|
|
|
+ startdir = ToNewUTF8String(mDefault);
|
|
|
|
+ }
|
|
|
|
+
|
2013-01-07 21:49:28 +01:00
|
|
|
+ nsAutoCString filters;
|
2011-06-01 08:05:09 +02:00
|
|
|
+ PRInt32 count = mFilters.Length();
|
|
|
|
+ if( count == 0 ) //just in case
|
|
|
|
+ filters = "*";
|
|
|
|
+ else
|
|
|
|
+ {
|
|
|
|
+ filters = kdeMakeFilter( 0 );
|
|
|
|
+ for (PRInt32 i = 1; i < count; ++i)
|
|
|
|
+ {
|
|
|
|
+ filters += "\n";
|
|
|
|
+ filters += kdeMakeFilter( i );
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsTArray<nsCString> command;
|
2013-01-07 21:49:28 +01:00
|
|
|
+ command.AppendElement( nsAutoCString( arg ));
|
2012-02-01 14:37:15 +01:00
|
|
|
+ command.AppendElement( startdir );
|
2011-06-01 08:05:09 +02:00
|
|
|
+ if( mMode != nsIFilePicker::modeGetFolder )
|
|
|
|
+ {
|
2012-02-01 14:37:15 +01:00
|
|
|
+ command.AppendElement( filters );
|
2013-01-07 21:49:28 +01:00
|
|
|
+ nsAutoCString selected;
|
2011-06-01 08:05:09 +02:00
|
|
|
+ selected.AppendInt( mSelectedType );
|
2012-02-01 14:37:15 +01:00
|
|
|
+ command.AppendElement( selected );
|
2011-06-01 08:05:09 +02:00
|
|
|
+ }
|
2012-02-01 14:37:15 +01:00
|
|
|
+ command.AppendElement( title );
|
2011-06-01 08:05:09 +02:00
|
|
|
+ if( mMode == nsIFilePicker::modeOpenMultiple )
|
2012-02-01 14:37:15 +01:00
|
|
|
+ command.AppendElement( NS_LITERAL_CSTRING( "MULTIPLE" ));
|
2011-06-01 08:05:09 +02:00
|
|
|
+ if( PRInt32 xid = windowToXid( mParentWidget ))
|
|
|
|
+ {
|
2012-02-01 14:37:15 +01:00
|
|
|
+ command.AppendElement( NS_LITERAL_CSTRING( "PARENT" ));
|
2013-01-07 21:49:28 +01:00
|
|
|
+ nsAutoCString parent;
|
2011-06-01 08:05:09 +02:00
|
|
|
+ parent.AppendInt( xid );
|
2012-02-01 14:37:15 +01:00
|
|
|
+ command.AppendElement( parent );
|
2011-06-01 08:05:09 +02:00
|
|
|
+ }
|
|
|
|
+
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsTArray<nsCString> output;
|
2013-02-19 20:24:59 +01:00
|
|
|
+ if( nsKDEUtils::commandBlockUi( command, GTK_WINDOW(mParentWidget->GetNativeData(NS_NATIVE_SHELLWIDGET)), &output ))
|
2011-06-01 08:05:09 +02:00
|
|
|
+ {
|
|
|
|
+ *aReturn = nsIFilePicker::returnOK;
|
|
|
|
+ mFiles.Clear();
|
|
|
|
+ if( mMode != nsIFilePicker::modeGetFolder )
|
|
|
|
+ {
|
2012-02-01 14:37:15 +01:00
|
|
|
+ mSelectedType = atoi( output[ 0 ].get());
|
|
|
|
+ output.RemoveElementAt( 0 );
|
2011-06-01 08:05:09 +02:00
|
|
|
+ }
|
|
|
|
+ if (mMode == nsIFilePicker::modeOpenMultiple)
|
|
|
|
+ {
|
|
|
|
+ mFileURL.Truncate();
|
2012-02-01 14:37:15 +01:00
|
|
|
+ PRUint32 count = output.Length();
|
2011-06-01 08:05:09 +02:00
|
|
|
+ for( PRUint32 i = 0;
|
|
|
|
+ i < count;
|
|
|
|
+ ++i )
|
|
|
|
+ {
|
2012-10-09 13:14:08 +02:00
|
|
|
+ nsCOMPtr<nsIFile> localfile;
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsresult rv = NS_NewNativeLocalFile( output[ i ],
|
2011-06-01 08:05:09 +02:00
|
|
|
+ PR_FALSE,
|
|
|
|
+ getter_AddRefs(localfile));
|
|
|
|
+ if (NS_SUCCEEDED(rv))
|
|
|
|
+ mFiles.AppendObject(localfile);
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ else
|
|
|
|
+ {
|
2012-02-01 14:37:15 +01:00
|
|
|
+ if( output.Length() == 0 )
|
2011-06-01 08:05:09 +02:00
|
|
|
+ mFileURL = nsCString();
|
|
|
|
+ else if( mAllowURLs )
|
2012-02-01 14:37:15 +01:00
|
|
|
+ mFileURL = output[ 0 ];
|
2011-06-01 08:05:09 +02:00
|
|
|
+ else // GetFile() actually requires it to be url even for local files :-/
|
|
|
|
+ {
|
- Mozilla Firefox 76.0
* Lockwise improvements
* Improvements in Picture-in-Picture feature
* Support Audio Worklets
MFSA-2020-16 (bsc#1171186)
* CVE-2020-12387 (bmo#1545345)
Use-after-free during worker shutdown
* CVE-2020-12388 (bmo#1618911)
Sandbox escape with improperly guarded Access Tokens
* CVE-2020-12389 (bmo#1554110)
Sandbox escape with improperly separated process types
* CVE-2020-6831 (bmo#1632241)
Buffer overflow in SCTP chunk input validation
* CVE-2020-12390 (bmo#1141959)
Incorrect serialization of nsIPrincipal.origin for IPv6 addresses
* CVE-2020-12391 (bmo#1457100)
Content-Security-Policy bypass using object elements
* CVE-2020-12392 (bmo#1614468)
Arbitrary local file access with 'Copy as cURL'
* CVE-2020-12393 (bmo#1615471)
Devtools' 'Copy as cURL' feature did not fully escape
website-controlled data, potentially leading to command injection
* CVE-2020-12394 (bmo#1628288)
URL spoofing in location bar when unfocussed
* CVE-2020-12395 (bmo#1595886, bmo#1611482, bmo#1614704, bmo#1624098,
bmo#1625749, bmo#1626382, bmo#1628076, bmo#1631508)
Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8
* CVE-2020-12396 (bmo#1339601, bmo#1611938, bmo#1620488,
bmo#1622291, bmo#1627644)
Memory safety bugs fixed in Firefox 76
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=825
2020-05-05 21:25:39 +02:00
|
|
|
+ nsCOMPtr<nsIFile> localfile;
|
|
|
|
+ nsresult rv = NS_NewNativeLocalFile( output[ 0 ],
|
|
|
|
+ PR_FALSE,
|
|
|
|
+ getter_AddRefs(localfile));
|
|
|
|
+ if (NS_SUCCEEDED(rv))
|
|
|
|
+ rv = net_GetURLSpecFromActualFile(localfile, mFileURL);
|
2011-06-01 08:05:09 +02:00
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ // Remember last used directory.
|
2012-10-09 13:14:08 +02:00
|
|
|
+ nsCOMPtr<nsIFile> file;
|
2011-06-01 08:05:09 +02:00
|
|
|
+ GetFile(getter_AddRefs(file));
|
|
|
|
+ if (file) {
|
|
|
|
+ nsCOMPtr<nsIFile> dir;
|
|
|
|
+ file->GetParent(getter_AddRefs(dir));
|
2012-10-09 13:14:08 +02:00
|
|
|
+ nsCOMPtr<nsIFile> localDir(do_QueryInterface(dir));
|
2011-06-01 08:05:09 +02:00
|
|
|
+ if (localDir) {
|
|
|
|
+ localDir.swap(mPrevDisplayDirectory);
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ if (mMode == nsIFilePicker::modeSave)
|
|
|
|
+ {
|
2012-10-09 13:14:08 +02:00
|
|
|
+ nsCOMPtr<nsIFile> file;
|
2011-06-01 08:05:09 +02:00
|
|
|
+ GetFile(getter_AddRefs(file));
|
|
|
|
+ if (file)
|
|
|
|
+ {
|
2012-02-01 14:37:15 +01:00
|
|
|
+ bool exists = false;
|
2011-06-01 08:05:09 +02:00
|
|
|
+ file->Exists(&exists);
|
|
|
|
+ if (exists) // TODO do overwrite check in the helper app
|
|
|
|
+ *aReturn = nsIFilePicker::returnReplace;
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ else
|
|
|
|
+ {
|
|
|
|
+ *aReturn = nsIFilePicker::returnCancel;
|
|
|
|
+ }
|
|
|
|
+ return NS_OK;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+
|
|
|
|
+NS_IMETHODIMP nsFilePicker::kdeAppsDialog(PRInt16 *aReturn)
|
|
|
|
+ {
|
|
|
|
+ NS_ENSURE_ARG_POINTER(aReturn);
|
|
|
|
+
|
2017-11-15 00:17:59 +01:00
|
|
|
+ nsCString title;
|
2011-06-01 08:05:09 +02:00
|
|
|
+ title.Adopt(ToNewUTF8String(mTitle));
|
|
|
|
+
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsTArray<nsCString> command;
|
|
|
|
+ command.AppendElement( NS_LITERAL_CSTRING( "APPSDIALOG" ));
|
|
|
|
+ command.AppendElement( title );
|
2011-06-01 08:05:09 +02:00
|
|
|
+ if( PRInt32 xid = windowToXid( mParentWidget ))
|
|
|
|
+ {
|
2012-02-01 14:37:15 +01:00
|
|
|
+ command.AppendElement( NS_LITERAL_CSTRING( "PARENT" ));
|
2013-01-07 21:49:28 +01:00
|
|
|
+ nsAutoCString parent;
|
2011-06-01 08:05:09 +02:00
|
|
|
+ parent.AppendInt( xid );
|
2012-02-01 14:37:15 +01:00
|
|
|
+ command.AppendElement( parent );
|
2011-06-01 08:05:09 +02:00
|
|
|
+ }
|
|
|
|
+
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsTArray<nsCString> output;
|
2013-02-19 20:24:59 +01:00
|
|
|
+ if( nsKDEUtils::commandBlockUi( command, GTK_WINDOW(mParentWidget->GetNativeData(NS_NATIVE_SHELLWIDGET)), &output ))
|
2011-06-01 08:05:09 +02:00
|
|
|
+ {
|
|
|
|
+ *aReturn = nsIFilePicker::returnOK;
|
2012-02-01 14:37:15 +01:00
|
|
|
+ mFileURL = output.Length() > 0 ? output[ 0 ] : nsCString();
|
2011-06-01 08:05:09 +02:00
|
|
|
+ }
|
|
|
|
+ else
|
|
|
|
+ {
|
|
|
|
+ *aReturn = nsIFilePicker::returnCancel;
|
|
|
|
+ }
|
|
|
|
+ return NS_OK;
|
|
|
|
+ }
|
2018-12-12 12:35:28 +01:00
|
|
|
+
|
|
|
|
// All below functions available as of GTK 3.20+
|
2019-07-09 23:21:11 +02:00
|
|
|
void* nsFilePicker::GtkFileChooserNew(const gchar* title, GtkWindow* parent,
|
2019-01-29 19:07:12 +01:00
|
|
|
GtkFileChooserAction action,
|
2019-07-09 23:21:11 +02:00
|
|
|
const gchar* accept_label) {
|
2019-01-29 19:07:12 +01:00
|
|
|
static auto sGtkFileChooserNativeNewPtr =
|
2019-07-09 23:21:11 +02:00
|
|
|
(void* (*)(const gchar*, GtkWindow*, GtkFileChooserAction, const gchar*,
|
|
|
|
const gchar*))dlsym(RTLD_DEFAULT,
|
|
|
|
"gtk_file_chooser_native_new");
|
2014-02-03 16:34:42 +01:00
|
|
|
diff --git a/widget/gtk/nsFilePicker.h b/widget/gtk/nsFilePicker.h
|
|
|
|
--- a/widget/gtk/nsFilePicker.h
|
|
|
|
+++ b/widget/gtk/nsFilePicker.h
|
2019-01-29 19:07:12 +01:00
|
|
|
@@ -67,16 +67,22 @@ class nsFilePicker : public nsBaseFilePi
|
|
|
|
nsString mDefaultExtension;
|
2011-06-01 08:05:09 +02:00
|
|
|
|
|
|
|
nsTArray<nsCString> mFilters;
|
|
|
|
nsTArray<nsCString> mFilterNames;
|
|
|
|
|
2019-01-29 19:07:12 +01:00
|
|
|
private:
|
2019-07-09 23:21:11 +02:00
|
|
|
static nsIFile* mPrevDisplayDirectory;
|
2015-09-22 08:10:40 +02:00
|
|
|
|
2011-06-01 08:05:09 +02:00
|
|
|
+ bool kdeRunning();
|
|
|
|
+ bool getKdeRunning();
|
|
|
|
+ NS_IMETHODIMP kdeFileDialog(PRInt16 *aReturn);
|
|
|
|
+ NS_IMETHODIMP kdeAppsDialog(PRInt16 *aReturn);
|
|
|
|
+ nsCString kdeMakeFilter( int index );
|
2015-09-22 08:10:40 +02:00
|
|
|
+
|
2019-07-09 23:21:11 +02:00
|
|
|
void* GtkFileChooserNew(const gchar* title, GtkWindow* parent,
|
2019-01-29 19:07:12 +01:00
|
|
|
GtkFileChooserAction action,
|
2019-07-09 23:21:11 +02:00
|
|
|
const gchar* accept_label);
|
|
|
|
void GtkFileChooserShow(void* file_chooser);
|
|
|
|
void GtkFileChooserDestroy(void* file_chooser);
|
|
|
|
void GtkFileChooserSetModal(void* file_chooser, GtkWindow* parent_widget,
|
2019-01-29 19:07:12 +01:00
|
|
|
gboolean modal);
|
|
|
|
|
2011-06-01 08:05:09 +02:00
|
|
|
diff --git a/xpcom/components/ManifestParser.cpp b/xpcom/components/ManifestParser.cpp
|
|
|
|
--- a/xpcom/components/ManifestParser.cpp
|
|
|
|
+++ b/xpcom/components/ManifestParser.cpp
|
2017-09-05 12:10:37 +02:00
|
|
|
@@ -33,16 +33,17 @@
|
- update to Firefox 51.0
* requires NSPR >= 4.13.1, NSS >= 3.28.1
* Added support for FLAC (Free Lossless Audio Codec) playback
* Added support for WebGL 2
* Added Georgian (ka) and Kabyle (kab) locales
* Support saving passwords for forms without 'submit' events
* Improved video performance for users without GPU acceleration
* Zoom indicator is shown in the URL bar if the zoom level is not
at default level
* View passwords from the prompt before saving them
* Remove Belarusian (be) locale
* Use Skia for content rendering (Linux)
* MFSA 2017-01
CVE-2017-5375: Excessive JIT code allocation allows bypass of
ASLR and DEP (bmo#1325200, boo#1021814)
CVE-2017-5376: Use-after-free in XSL (bmo#1311687, boo#1021817)
CVE-2017-5377: Memory corruption with transforms to create
gradients in Skia (bmo#1306883, boo#1021826)
CVE-2017-5378: Pointer and frame data leakage of Javascript objects
(bmo#1312001, bmo#1330769, boo#1021818)
CVE-2017-5379: Use-after-free in Web Animations
(bmo#1309198,boo#1021827)
CVE-2017-5380: Potential use-after-free during DOM manipulations
(bmo#1322107, boo#1021819)
CVE-2017-5390: Insecure communication methods in Developer Tools
JSON viewer (bmo#1297361, boo#1021820)
CVE-2017-5389: WebExtensions can install additional add-ons via
modified host requests (bmo#1308688, boo#1021828)
CVE-2017-5396: Use-after-free with Media Decoder
(bmo#1329403, boo#1021821)
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=567
2017-01-25 11:27:08 +01:00
|
|
|
#include "nsTextFormatter.h"
|
|
|
|
#include "nsVersionComparator.h"
|
|
|
|
#include "nsXPCOMCIDInternal.h"
|
2012-06-05 20:01:53 +02:00
|
|
|
|
|
|
|
#include "nsIConsoleService.h"
|
|
|
|
#include "nsIScriptError.h"
|
|
|
|
#include "nsIXULAppInfo.h"
|
|
|
|
#include "nsIXULRuntime.h"
|
|
|
|
+#include "nsKDEUtils.h"
|
|
|
|
|
- update to Firefox 51.0
* requires NSPR >= 4.13.1, NSS >= 3.28.1
* Added support for FLAC (Free Lossless Audio Codec) playback
* Added support for WebGL 2
* Added Georgian (ka) and Kabyle (kab) locales
* Support saving passwords for forms without 'submit' events
* Improved video performance for users without GPU acceleration
* Zoom indicator is shown in the URL bar if the zoom level is not
at default level
* View passwords from the prompt before saving them
* Remove Belarusian (be) locale
* Use Skia for content rendering (Linux)
* MFSA 2017-01
CVE-2017-5375: Excessive JIT code allocation allows bypass of
ASLR and DEP (bmo#1325200, boo#1021814)
CVE-2017-5376: Use-after-free in XSL (bmo#1311687, boo#1021817)
CVE-2017-5377: Memory corruption with transforms to create
gradients in Skia (bmo#1306883, boo#1021826)
CVE-2017-5378: Pointer and frame data leakage of Javascript objects
(bmo#1312001, bmo#1330769, boo#1021818)
CVE-2017-5379: Use-after-free in Web Animations
(bmo#1309198,boo#1021827)
CVE-2017-5380: Potential use-after-free during DOM manipulations
(bmo#1322107, boo#1021819)
CVE-2017-5390: Insecure communication methods in Developer Tools
JSON viewer (bmo#1297361, boo#1021820)
CVE-2017-5389: WebExtensions can install additional add-ons via
modified host requests (bmo#1308688, boo#1021828)
CVE-2017-5396: Use-after-free with Media Decoder
(bmo#1329403, boo#1021821)
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=567
2017-01-25 11:27:08 +01:00
|
|
|
using namespace mozilla;
|
|
|
|
|
2019-01-29 19:07:12 +01:00
|
|
|
struct ManifestDirective {
|
- update to Firefox 51.0
* requires NSPR >= 4.13.1, NSS >= 3.28.1
* Added support for FLAC (Free Lossless Audio Codec) playback
* Added support for WebGL 2
* Added Georgian (ka) and Kabyle (kab) locales
* Support saving passwords for forms without 'submit' events
* Improved video performance for users without GPU acceleration
* Zoom indicator is shown in the URL bar if the zoom level is not
at default level
* View passwords from the prompt before saving them
* Remove Belarusian (be) locale
* Use Skia for content rendering (Linux)
* MFSA 2017-01
CVE-2017-5375: Excessive JIT code allocation allows bypass of
ASLR and DEP (bmo#1325200, boo#1021814)
CVE-2017-5376: Use-after-free in XSL (bmo#1311687, boo#1021817)
CVE-2017-5377: Memory corruption with transforms to create
gradients in Skia (bmo#1306883, boo#1021826)
CVE-2017-5378: Pointer and frame data leakage of Javascript objects
(bmo#1312001, bmo#1330769, boo#1021818)
CVE-2017-5379: Use-after-free in Web Animations
(bmo#1309198,boo#1021827)
CVE-2017-5380: Potential use-after-free during DOM manipulations
(bmo#1322107, boo#1021819)
CVE-2017-5390: Insecure communication methods in Developer Tools
JSON viewer (bmo#1297361, boo#1021820)
CVE-2017-5389: WebExtensions can install additional add-ons via
modified host requests (bmo#1308688, boo#1021828)
CVE-2017-5396: Use-after-free with Media Decoder
(bmo#1329403, boo#1021821)
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=567
2017-01-25 11:27:08 +01:00
|
|
|
const char* directive;
|
|
|
|
int argc;
|
|
|
|
|
2019-01-29 19:07:12 +01:00
|
|
|
bool ischrome;
|
2019-07-09 23:21:11 +02:00
|
|
|
@@ -393,16 +394,17 @@ void ParseManifest(NSLocationType aType,
|
2015-05-10 22:12:38 +02:00
|
|
|
NS_NAMED_LITERAL_STRING(kRemoteEnabled, "remoteenabled");
|
|
|
|
NS_NAMED_LITERAL_STRING(kRemoteRequired, "remoterequired");
|
2012-06-05 20:01:53 +02:00
|
|
|
NS_NAMED_LITERAL_STRING(kApplication, "application");
|
|
|
|
NS_NAMED_LITERAL_STRING(kAppVersion, "appversion");
|
|
|
|
NS_NAMED_LITERAL_STRING(kGeckoVersion, "platformversion");
|
|
|
|
NS_NAMED_LITERAL_STRING(kOs, "os");
|
|
|
|
NS_NAMED_LITERAL_STRING(kOsVersion, "osversion");
|
|
|
|
NS_NAMED_LITERAL_STRING(kABI, "abi");
|
|
|
|
+ NS_NAMED_LITERAL_STRING(kDesktop, "desktop");
|
2015-01-14 19:32:16 +01:00
|
|
|
NS_NAMED_LITERAL_STRING(kProcess, "process");
|
2012-06-05 20:01:53 +02:00
|
|
|
#if defined(MOZ_WIDGET_ANDROID)
|
|
|
|
NS_NAMED_LITERAL_STRING(kTablet, "tablet");
|
|
|
|
#endif
|
|
|
|
|
2015-01-14 19:32:16 +01:00
|
|
|
NS_NAMED_LITERAL_STRING(kMain, "main");
|
|
|
|
NS_NAMED_LITERAL_STRING(kContent, "content");
|
2012-06-05 20:01:53 +02:00
|
|
|
|
2019-07-09 23:21:11 +02:00
|
|
|
@@ -448,39 +450,44 @@ void ParseManifest(NSLocationType aType,
|
2012-06-05 20:01:53 +02:00
|
|
|
CopyUTF8toUTF16(s, abi);
|
2014-04-27 18:09:32 +02:00
|
|
|
abi.Insert(char16_t('_'), 0);
|
2012-06-05 20:01:53 +02:00
|
|
|
abi.Insert(osTarget, 0);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
nsAutoString osVersion;
|
|
|
|
+ nsAutoString desktop;
|
|
|
|
#if defined(XP_WIN)
|
2019-03-19 23:01:55 +01:00
|
|
|
# pragma warning(push)
|
|
|
|
# pragma warning(disable : 4996) // VC12+ deprecates GetVersionEx
|
2019-01-29 19:07:12 +01:00
|
|
|
OSVERSIONINFO info = {sizeof(OSVERSIONINFO)};
|
2012-06-05 20:01:53 +02:00
|
|
|
if (GetVersionEx(&info)) {
|
2019-01-29 19:07:12 +01:00
|
|
|
nsTextFormatter::ssprintf(osVersion, u"%ld.%ld", info.dwMajorVersion,
|
2014-12-02 23:01:52 +01:00
|
|
|
info.dwMinorVersion);
|
2012-06-05 20:01:53 +02:00
|
|
|
}
|
|
|
|
+ desktop = NS_LITERAL_STRING("win");
|
2019-03-19 23:01:55 +01:00
|
|
|
# pragma warning(pop)
|
2012-06-05 20:01:53 +02:00
|
|
|
#elif defined(MOZ_WIDGET_COCOA)
|
2014-04-27 18:09:32 +02:00
|
|
|
SInt32 majorVersion = nsCocoaFeatures::OSXVersionMajor();
|
|
|
|
SInt32 minorVersion = nsCocoaFeatures::OSXVersionMinor();
|
2019-01-29 19:07:12 +01:00
|
|
|
nsTextFormatter::ssprintf(osVersion, u"%ld.%ld", majorVersion, minorVersion);
|
2012-06-05 20:01:53 +02:00
|
|
|
+ desktop = NS_LITERAL_STRING("macosx");
|
2013-09-16 09:57:05 +02:00
|
|
|
#elif defined(MOZ_WIDGET_GTK)
|
2019-01-29 19:07:12 +01:00
|
|
|
nsTextFormatter::ssprintf(osVersion, u"%ld.%ld", gtk_major_version,
|
2014-12-02 23:01:52 +01:00
|
|
|
gtk_minor_version);
|
2012-06-05 20:01:53 +02:00
|
|
|
+ desktop = nsKDEUtils::kdeSession() ? NS_LITERAL_STRING("kde") : NS_LITERAL_STRING("gnome");
|
|
|
|
#elif defined(MOZ_WIDGET_ANDROID)
|
|
|
|
bool isTablet = false;
|
|
|
|
if (mozilla::AndroidBridge::Bridge()) {
|
2019-01-29 19:07:12 +01:00
|
|
|
mozilla::AndroidBridge::Bridge()->GetStaticStringField(
|
|
|
|
"android/os/Build$VERSION", "RELEASE", osVersion);
|
2016-11-15 19:06:29 +01:00
|
|
|
isTablet = java::GeckoAppShell::IsTablet();
|
2012-06-05 20:01:53 +02:00
|
|
|
}
|
|
|
|
+ desktop = NS_LITERAL_STRING("android");
|
|
|
|
#endif
|
|
|
|
|
2015-11-03 16:49:03 +01:00
|
|
|
if (XRE_IsContentProcess()) {
|
2015-01-14 19:32:16 +01:00
|
|
|
process = kContent;
|
|
|
|
} else {
|
|
|
|
process = kMain;
|
|
|
|
}
|
2012-06-05 20:01:53 +02:00
|
|
|
|
2019-07-09 23:21:11 +02:00
|
|
|
@@ -567,25 +574,27 @@ void ParseManifest(NSLocationType aType,
|
2015-05-10 22:12:38 +02:00
|
|
|
TriState stOsVersion = eUnspecified;
|
2012-06-05 20:01:53 +02:00
|
|
|
TriState stOs = eUnspecified;
|
|
|
|
TriState stABI = eUnspecified;
|
2015-01-14 19:32:16 +01:00
|
|
|
TriState stProcess = eUnspecified;
|
2012-06-05 20:01:53 +02:00
|
|
|
#if defined(MOZ_WIDGET_ANDROID)
|
|
|
|
TriState stTablet = eUnspecified;
|
|
|
|
#endif
|
2015-05-10 22:12:38 +02:00
|
|
|
int flags = 0;
|
2012-06-05 20:01:53 +02:00
|
|
|
+ TriState stDesktop = eUnspecified;
|
|
|
|
|
2014-12-02 23:01:52 +01:00
|
|
|
while ((token = nsCRT::strtok(whitespace, kWhitespace, &whitespace)) &&
|
|
|
|
ok) {
|
2012-06-05 20:01:53 +02:00
|
|
|
ToLowerCase(token);
|
|
|
|
NS_ConvertASCIItoUTF16 wtoken(token);
|
|
|
|
|
|
|
|
if (CheckStringFlag(kApplication, wtoken, appID, stApp) ||
|
2017-09-05 12:10:37 +02:00
|
|
|
CheckOsFlag(kOs, wtoken, osTarget, stOs) ||
|
2012-06-05 20:01:53 +02:00
|
|
|
CheckStringFlag(kABI, wtoken, abi, stABI) ||
|
|
|
|
+ CheckStringFlag(kDesktop, wtoken, desktop, stDesktop) ||
|
2015-01-14 19:32:16 +01:00
|
|
|
CheckStringFlag(kProcess, wtoken, process, stProcess) ||
|
2012-06-05 20:01:53 +02:00
|
|
|
CheckVersionFlag(kOsVersion, wtoken, osVersion, stOsVersion) ||
|
|
|
|
CheckVersionFlag(kAppVersion, wtoken, appVersion, stAppVersion) ||
|
2019-01-29 19:07:12 +01:00
|
|
|
CheckVersionFlag(kGeckoVersion, wtoken, geckoVersion,
|
|
|
|
stGeckoVersion)) {
|
2012-06-05 20:01:53 +02:00
|
|
|
continue;
|
2014-12-02 23:01:52 +01:00
|
|
|
}
|
2012-06-05 20:01:53 +02:00
|
|
|
|
2019-07-09 23:21:11 +02:00
|
|
|
@@ -622,17 +631,17 @@ void ParseManifest(NSLocationType aType,
|
2019-01-29 19:07:12 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
LogMessageWithContext(
|
|
|
|
aFile, line, "Unrecognized chrome manifest modifier '%s'.", token);
|
|
|
|
ok = false;
|
2012-06-05 20:01:53 +02:00
|
|
|
}
|
|
|
|
|
2019-01-29 19:07:12 +01:00
|
|
|
if (!ok || stApp == eBad || stAppVersion == eBad ||
|
|
|
|
- stGeckoVersion == eBad || stOs == eBad || stOsVersion == eBad ||
|
|
|
|
+ stGeckoVersion == eBad || stOs == eBad || stOsVersion == eBad || stDesktop == eBad ||
|
2012-06-05 20:01:53 +02:00
|
|
|
#ifdef MOZ_WIDGET_ANDROID
|
|
|
|
stTablet == eBad ||
|
|
|
|
#endif
|
2019-01-29 19:07:12 +01:00
|
|
|
stABI == eBad || stProcess == eBad) {
|
2012-06-05 20:01:53 +02:00
|
|
|
continue;
|
2014-12-02 23:01:52 +01:00
|
|
|
}
|
2012-06-05 20:01:53 +02:00
|
|
|
|
2019-01-29 19:07:12 +01:00
|
|
|
if (directive->regfunc) {
|
2014-12-02 23:01:52 +01:00
|
|
|
diff --git a/xpcom/components/moz.build b/xpcom/components/moz.build
|
|
|
|
--- a/xpcom/components/moz.build
|
|
|
|
+++ b/xpcom/components/moz.build
|
2020-01-08 12:59:18 +01:00
|
|
|
@@ -62,16 +62,17 @@ LOCAL_INCLUDES += [
|
2016-03-07 17:25:29 +01:00
|
|
|
'!..',
|
2014-12-02 23:01:52 +01:00
|
|
|
'../base',
|
|
|
|
'../build',
|
|
|
|
'../ds',
|
|
|
|
'/chrome',
|
2019-01-29 19:07:12 +01:00
|
|
|
'/js/xpconnect/loader',
|
|
|
|
'/layout/build',
|
2014-12-02 23:01:52 +01:00
|
|
|
'/modules/libjar',
|
2018-06-25 22:56:47 +02:00
|
|
|
+ '/toolkit/xre',
|
2014-12-02 23:01:52 +01:00
|
|
|
]
|
|
|
|
|
2019-10-25 11:13:30 +02:00
|
|
|
if CONFIG['MOZ_WIDGET_TOOLKIT'] == 'gtk':
|
2014-12-02 23:01:52 +01:00
|
|
|
CXXFLAGS += CONFIG['TK_CFLAGS']
|
2020-06-02 16:55:49 +02:00
|
|
|
if CONFIG['MOZ_ENABLE_DBUS']:
|
|
|
|
CXXFLAGS += CONFIG['MOZ_DBUS_GLIB_CFLAGS']
|
2019-05-22 22:38:29 +02:00
|
|
|
|
2019-07-09 23:21:11 +02:00
|
|
|
if CONFIG['MOZ_LAYOUT_DEBUGGER']:
|
2011-06-01 08:05:09 +02:00
|
|
|
diff --git a/xpcom/io/nsLocalFileUnix.cpp b/xpcom/io/nsLocalFileUnix.cpp
|
|
|
|
--- a/xpcom/io/nsLocalFileUnix.cpp
|
|
|
|
+++ b/xpcom/io/nsLocalFileUnix.cpp
|
- Mozilla Firefox 73.0
* Added support for setting a default zoom level applicable for all
web content
* High-contrast mode has been updated to allow background images
* Improved audio quality when playing back audio at a faster or
slower speed
* Added NextDNS as alternative option for DNS over HTTPS
MFSA 2020-05 (bsc#1163368)
* CVE-2020-6796 (bmo#1610426)
Missing bounds check on shared memory read in the parent process
* CVE-2020-6797 (bmo#1596668) (MacOS X only)
Extensions granted downloads.open permission could open arbitrary
applications on Mac OSX
* CVE-2020-6798 (bmo#1602944)
Incorrect parsing of template tag could result in JavaScript injection
* CVE-2020-6799 (bmo#1606596) (Windows only)
Arbitrary code execution when opening pdf links from other
applications, when Firefox is configured as default pdf reader
* CVE-2020-6800 (bmo#1595786,bmo#1596706,bmo#1598543,bmo#1604851,
bmo#1608580,bmo#1608785,bmo#1605777)
Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5
* CVE-2020-6801 (bmo#1601024,bmo#1601712,bmo#1604836,bmo#1606492)
Memory safety bugs fixed in Firefox 73
- updated requirements
* rust >= 1.39
* NSS >= 3.49.2
* rust-cbindgen >= 0.12.0
- rebased patches
- removed obsolete patch
* mozilla-bmo1601707.patch
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=802
2020-02-12 15:14:39 +01:00
|
|
|
@@ -46,16 +46,17 @@
|
2015-05-10 22:12:38 +02:00
|
|
|
#include "prproces.h"
|
2011-06-01 08:05:09 +02:00
|
|
|
#include "nsIDirectoryEnumerator.h"
|
2018-10-29 16:21:53 +01:00
|
|
|
#include "nsSimpleEnumerator.h"
|
2012-02-01 14:37:15 +01:00
|
|
|
#include "private/pprio.h"
|
2014-02-03 16:34:42 +01:00
|
|
|
#include "prlink.h"
|
2011-06-01 08:05:09 +02:00
|
|
|
|
2012-10-09 13:14:08 +02:00
|
|
|
#ifdef MOZ_WIDGET_GTK
|
2019-03-19 23:01:55 +01:00
|
|
|
# include "nsIGIOService.h"
|
|
|
|
+# include "nsKDEUtils.h"
|
2011-06-01 08:05:09 +02:00
|
|
|
#endif
|
|
|
|
|
2012-02-01 14:37:15 +01:00
|
|
|
#ifdef MOZ_WIDGET_COCOA
|
2019-03-19 23:01:55 +01:00
|
|
|
# include <Carbon/Carbon.h>
|
|
|
|
# include "CocoaFileUtils.h"
|
|
|
|
# include "prmem.h"
|
|
|
|
# include "plbase64.h"
|
2011-06-01 08:05:09 +02:00
|
|
|
|
2020-04-07 14:21:48 +02:00
|
|
|
@@ -1907,62 +1908,77 @@ nsLocalFile::SetPersistentDescriptor(con
|
2019-01-29 19:07:12 +01:00
|
|
|
|
2011-06-01 08:05:09 +02:00
|
|
|
NS_IMETHODIMP
|
2019-01-29 19:07:12 +01:00
|
|
|
nsLocalFile::Reveal() {
|
2018-09-05 09:16:27 +02:00
|
|
|
if (!FilePreferences::IsAllowedPath(mPath)) {
|
|
|
|
return NS_ERROR_FILE_ACCESS_DENIED;
|
|
|
|
}
|
|
|
|
|
2012-10-09 13:14:08 +02:00
|
|
|
#ifdef MOZ_WIDGET_GTK
|
2014-09-22 18:35:40 +02:00
|
|
|
- nsCOMPtr<nsIGIOService> giovfs = do_GetService(NS_GIOSERVICE_CONTRACTID);
|
2015-05-10 22:12:38 +02:00
|
|
|
- if (!giovfs) {
|
2014-09-22 18:35:40 +02:00
|
|
|
- return NS_ERROR_FAILURE;
|
|
|
|
- }
|
|
|
|
+ nsAutoCString url;
|
2015-05-10 22:12:38 +02:00
|
|
|
|
2014-09-22 18:35:40 +02:00
|
|
|
bool isDirectory;
|
|
|
|
if (NS_FAILED(IsDirectory(&isDirectory))) {
|
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
}
|
|
|
|
|
|
|
|
+ nsCOMPtr<nsIGIOService> giovfs = do_GetService(NS_GIOSERVICE_CONTRACTID);
|
|
|
|
if (isDirectory) {
|
2015-05-10 22:12:38 +02:00
|
|
|
- return giovfs->ShowURIForInput(mPath);
|
2014-09-22 18:35:40 +02:00
|
|
|
+ url = mPath;
|
2017-09-05 12:10:37 +02:00
|
|
|
}
|
|
|
|
if (NS_SUCCEEDED(giovfs->OrgFreedesktopFileManager1ShowItems(mPath))) {
|
2014-09-22 18:35:40 +02:00
|
|
|
return NS_OK;
|
2017-09-05 12:10:37 +02:00
|
|
|
}
|
|
|
|
nsCOMPtr<nsIFile> parentDir;
|
|
|
|
nsAutoCString dirPath;
|
|
|
|
if (NS_FAILED(GetParent(getter_AddRefs(parentDir)))) {
|
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
}
|
|
|
|
if (NS_FAILED(parentDir->GetNativePath(dirPath))) {
|
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
}
|
2014-09-22 18:35:40 +02:00
|
|
|
|
2017-09-05 12:10:37 +02:00
|
|
|
- return giovfs->ShowURIForInput(dirPath);
|
|
|
|
+ url = dirPath;
|
|
|
|
#elif defined(MOZ_WIDGET_COCOA)
|
|
|
|
CFURLRef url;
|
|
|
|
if (NS_SUCCEEDED(GetCFURL(&url))) {
|
|
|
|
nsresult rv = CocoaFileUtils::RevealFileInFinder(url);
|
|
|
|
::CFRelease(url);
|
|
|
|
return rv;
|
2014-09-22 18:35:40 +02:00
|
|
|
}
|
2017-09-05 12:10:37 +02:00
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
#else
|
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
#endif
|
2014-09-22 18:35:40 +02:00
|
|
|
+ if(nsKDEUtils::kdeSupport()) {
|
|
|
|
+ nsTArray<nsCString> command;
|
|
|
|
+ command.AppendElement( NS_LITERAL_CSTRING("REVEAL") );
|
|
|
|
+ command.AppendElement( mPath );
|
|
|
|
+ return nsKDEUtils::command( command ) ? NS_OK : NS_ERROR_FAILURE;
|
|
|
|
+ }
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
2015-05-10 22:12:38 +02:00
|
|
|
+ if (!giovfs)
|
2014-09-22 18:35:40 +02:00
|
|
|
+ return NS_ERROR_FAILURE;
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
2015-05-10 22:12:38 +02:00
|
|
|
+ return giovfs->ShowURIForInput(url);
|
2013-12-11 09:31:54 +01:00
|
|
|
}
|
2011-06-01 08:05:09 +02:00
|
|
|
|
2013-12-11 09:31:54 +01:00
|
|
|
NS_IMETHODIMP
|
2019-01-29 19:07:12 +01:00
|
|
|
nsLocalFile::Launch() {
|
2018-09-05 09:16:27 +02:00
|
|
|
if (!FilePreferences::IsAllowedPath(mPath)) {
|
|
|
|
return NS_ERROR_FILE_ACCESS_DENIED;
|
|
|
|
}
|
|
|
|
|
2013-12-11 09:31:54 +01:00
|
|
|
#ifdef MOZ_WIDGET_GTK
|
2014-09-22 18:35:40 +02:00
|
|
|
+ if( nsKDEUtils::kdeSupport()) {
|
|
|
|
+ nsTArray<nsCString> command;
|
|
|
|
+ command.AppendElement( NS_LITERAL_CSTRING("OPEN") );
|
|
|
|
+ command.AppendElement( mPath );
|
|
|
|
+ return nsKDEUtils::command( command ) ? NS_OK : NS_ERROR_FAILURE;
|
|
|
|
+ }
|
|
|
|
nsCOMPtr<nsIGIOService> giovfs = do_GetService(NS_GIOSERVICE_CONTRACTID);
|
2015-05-10 22:12:38 +02:00
|
|
|
if (!giovfs) {
|
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
}
|
|
|
|
|
|
|
|
return giovfs->ShowURIForInput(mPath);
|
2018-03-13 20:46:06 +01:00
|
|
|
#elif defined(MOZ_WIDGET_ANDROID)
|
|
|
|
// Try to get a mimetype, if this fails just use the file uri alone
|