/hg/icedtea-web: 4 new changesets
jvanek at icedtea.classpath.org
jvanek at icedtea.classpath.org
Thu Jan 7 16:00:44 UTC 2016
changeset 971644c257ae in /hg/icedtea-web
details: http://icedtea.classpath.org/hg/icedtea-web?cmd=changeset;node=971644c257ae
author: Jiri Vanek <jvanek at redhat.com>
date: Thu Jan 07 16:25:24 2016 +0100
fixed R2690 - Can't run BOM into JNLP file
changeset 22b7becd48a7 in /hg/icedtea-web
details: http://icedtea.classpath.org/hg/icedtea-web?cmd=changeset;node=22b7becd48a7
author: Jiri Vanek <jvanek at redhat.com>
date: Thu Jan 07 16:34:53 2016 +0100
Codebase resolution of jnlp-href is now aligned with oracle plugin
changeset ec057d601e50 in /hg/icedtea-web
details: http://icedtea.classpath.org/hg/icedtea-web?cmd=changeset;node=ec057d601e50
author: Jiri Vanek <jvanek at redhat.com>
date: Thu Jan 07 16:54:21 2016 +0100
Fixed 2714 - IcedTea-Web plugin sends uninitialized memory garbage across a pipe when NPN_GetValueForURL call
Resolves an issue where, if IcedTea-Web's call to NPN_GetValueForURL fails, IcedTea-Web attempts to send uninitialized memory garbage across a pipe, which (usually) results in an error. At this point, IcedTea gives up, but does not inform Firefox that it has done so, and unless dom.ipc.plugins.asyncInit is true, this causes Firefox's UI to lock up in addition to the Java component failing to
changeset ea6a2a888131 in /hg/icedtea-web
details: http://icedtea.classpath.org/hg/icedtea-web?cmd=changeset;node=ea6a2a888131
author: Jiri Vanek <jvanek at redhat.com>
date: Thu Jan 07 16:59:45 2016 +0100
Remove bash-specifics from top level Makefile.am
The == in the test comparison is not necessary, the = test works fine.
Invoke html-gen.sh with 'sh' as opposed to 'bash' since it does not require
bash. No reason to require bash when it is not needed. Tested with dash
and zsh installed as /bin/sh.
diffstat:
ChangeLog | 58 +++++++
Makefile.am | 4 +-
NEWS | 4 +
netx/net/sourceforge/jnlp/PluginBridge.java | 8 +-
netx/net/sourceforge/jnlp/SecurityDesc.java | 6 +-
netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmation.java | 47 +-----
netx/net/sourceforge/jnlp/util/UrlUtils.java | 58 +++++++
netx/net/sourceforge/nanoxml/XMLElement.java | 81 +++++++--
plugin/icedteanp/IcedTeaNPPlugin.cc | 14 +-
tests/netx/unit/net/sourceforge/jnlp/ParserMalformedXml.java | 19 ++
tests/netx/unit/net/sourceforge/jnlp/PluginBridgeTest.java | 2 -
tests/netx/unit/net/sourceforge/jnlp/runtime/CodeBaseClassLoaderTest.java | 8 +-
tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmationTest.java | 17 +-
tests/netx/unit/net/sourceforge/jnlp/templates/EFBBBF.jnlp | 59 +++++++
tests/netx/unit/net/sourceforge/jnlp/util/UrlUtilsTest.java | 56 ++++++-
15 files changed, 350 insertions(+), 91 deletions(-)
diffs (truncated from 737 to 500 lines):
diff -r 78a490b19df5 -r ea6a2a888131 ChangeLog
--- a/ChangeLog Wed Jan 06 17:38:47 2016 +0100
+++ b/ChangeLog Thu Jan 07 16:59:45 2016 +0100
@@ -1,3 +1,61 @@
+2016-01-07 David Cantrell <david.l.cantrell at gmail.com>
+ Jiri Vanek <jvanek at redhat.com>
+ Andrew John Hughes <ahughes at redhat.com>
+
+ Remove bash-specifics from top level Makefile.a
+ * Makefile.am: (generate-docs.stamp) double == in test function replaced by single =
+ (stamps/netx-html-gen.stamp) call to plain bash replaced by ${SHELL}
+ * NEWS: mentioned PR2669
+
+2016-01-07 Tiago Stürmer Daitx <tdaitx at gmail.com>
+ Jiri Vanek <jvanek at redhat.com>
+
+ Resolves an issue where, if IcedTea's call to NPN_GetValueForURL fails,
+ IcedTea-Web attempts to send uninitialized memory garbage across a pipe, which
+ (usually) results in an error. At this point, IcedTea gives up, but does not
+ inform Firefox that it has done so, and unless dom.ipc.plugins.asyncInit is
+ true, this causes Firefox's UI to lock up in addition to the Java component failing to load.
+ * plugin/icedteanp/IcedTeaNPPlugin.cc: (onsume_plugin_message) initialize len
+ and proxy_info. (get_proxy_info) returns correct message if
+ browser_functions.getvalueforurl returns error
+ * NEWS: mentioned PR2714
+
+2016-01-07 Jiri Vanek <jvanek at redhat.com>
+
+ Codebase resolution of jnlp-href is now aligned with oracle plugin
+ * netx/net/sourceforge/jnlp/PluginBridge.java: When jnlp href is used, codebase
+ is forced to become codebase of jnlp
+ * netx/net/sourceforge/jnlp/SecurityDesc.java: When file.getCodeBase() is null
+ then instead of NPE, codebase of file.fileLocation is used
+ * netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmation.java:
+ stripFile and ensureSlashTail moved to UrlUtils
+ * netx/net/sourceforge/jnlp/util/UrlUtils.java: stripFile and ensureSlashTail
+ moved from UnsignedAppletTrustConfirmation
+ * tests/netx/unit/net/sourceforge/jnlp/PluginBridgeTest.java: removed empty lines
+ * tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmationTest.java:
+ adapted to moved methods
+ * tests/netx/unit/net/sourceforge/jnlp/util/UrlUtilsTest.java: added more tests
+ to removeFileName and enabled accidentlay disabled getHostAndPortTest and
+ getPortTest
+ * tests/netx/unit/net/sourceforge/jnlp/runtime/CodeBaseClassLoaderTest.java:
+ ensured manifest attributes are off for this test
+ * tests/netx/unit/net/sourceforge/jnlp/ParserMalformedXml.java: fixed bom tests
+ to use proper classloader
+
+2016-01-07 Jiri Vanek <jvanek at redhat.com>
+
+ BOM character now dont cause error
+ * netx/net/sourceforge/nanoxml/XMLElement.java: duplicated whitespace recognition
+ code moved to isRegularWhiteSpace. First call to scanWhitespace repalced by
+ call to scanLeadingWhitespace. New field BOM introduced. (scanWhitespace)
+ made private, and uses isRegularWhiteSpace. (scanLeadingWhitespace) new method,
+ same as scanWhitespacebut also skipps BOM and marks it.
+ * tests/netx/unit/net/sourceforge/jnlp/ParserMalformedXml.java: Added tests to
+ issue
+ * tests/netx/unit/net/sourceforge/jnlp/templates/EFBBBF.jnlp: new file. jnlp
+ file starting with bom.
+ * NEWS: mentioned PR2690
+
2016-01-06 James Le Cuirot <chewi at gentoo.org>
Fixed typo in javadoc generation
diff -r 78a490b19df5 -r ea6a2a888131 Makefile.am
--- a/Makefile.am Wed Jan 06 17:38:47 2016 +0100
+++ b/Makefile.am Thu Jan 07 16:59:45 2016 +0100
@@ -546,7 +546,7 @@
$$TP_COMMAND html "$$HTML_DOCS_TARGET_DIR/$$ID" $$TP_TAIL ; \
mkdir "$$PLAIN_DOCS_TARGET_DIR/$$ID" ; \
$$TP_COMMAND plain "$$PLAIN_DOCS_TARGET_DIR/$$ID" 160 $$TP_TAIL; \
- if [ $$ID == "en" ] ; then \
+ if [ $$ID = "en" ] ; then \
MAN_DESC="$$MAN_DOCS_TARGET_DIR/man1" ; \
else \
MAN_DESC="$$MAN_DOCS_TARGET_DIR/$$ID/man1" ; \
@@ -564,7 +564,7 @@
mkdir -p html-gen; \
cp AUTHORS NEWS COPYING ChangeLog html-gen/; \
export HTML_GEN_DEBUG=true; \
- bash html-gen.sh; \
+ ${SHELL} html-gen.sh; \
unset HTML_GEN_DEBUG)
${INSTALL_DATA} $(NETX_SRCDIR)/../html-gen/*.html $(NETX_RESOURCE_DIR)
rm -r $(NETX_SRCDIR)/../html-gen/
diff -r 78a490b19df5 -r ea6a2a888131 NEWS
--- a/NEWS Wed Jan 06 17:38:47 2016 +0100
+++ b/NEWS Thu Jan 07 16:59:45 2016 +0100
@@ -15,6 +15,8 @@
* fixed DownloadService
* PR2779: html-gen.sh: Don't try to call hg if .hg directory isn't present
* PR2591 - IcedTea-Web request resources twice for meta informations and causes ClientAbortException on tomcat in conjunction with JnlpDownloadServlet
+* PR2690 - Can't run BOM into JNLP file
+* PR2669 - remove bash-specific syntax from top level Makefile.am
* comments in deployment.properties now should persists load/save
* fixed bug in caching of files with query
* fixed issues with recreating of existing shortcut
@@ -45,6 +47,8 @@
- support for SignedBy and Principals along with existing Codebase
* Plugin
- RH1273691 - Escaped equals signs in deployment.properties not un-escaped when used
+ - PR2746 - IcedTea-Web Plugin 1.6.1: net.sourceforge.jnlp.LaunchException
+ - PR2714 - IcedTea-Web plugin sends uninitialized memory garbage across a pipe when NPN_GetValueForURL call fails
New in release 1.6 (2015-XX-XX):
* Massively improved offline abilities. Added Xoffline switch to force work without inet connection.
diff -r 78a490b19df5 -r ea6a2a888131 netx/net/sourceforge/jnlp/PluginBridge.java
--- a/netx/net/sourceforge/jnlp/PluginBridge.java Wed Jan 06 17:38:47 2016 +0100
+++ b/netx/net/sourceforge/jnlp/PluginBridge.java Thu Jan 07 16:59:45 2016 +0100
@@ -40,6 +40,7 @@
import net.sourceforge.jnlp.cache.UpdatePolicy;
import net.sourceforge.jnlp.runtime.JNLPRuntime;
import net.sourceforge.jnlp.util.StreamUtils;
+import net.sourceforge.jnlp.util.UrlUtils;
import net.sourceforge.jnlp.util.logging.OutputController;
import net.sourceforge.jnlp.util.replacements.BASE64Decoder;
@@ -130,7 +131,10 @@
}.readStream();
} else {
- jnlpFile = jnlpCreator.create(jnlp, null, defaultSettings, JNLPRuntime.getDefaultUpdatePolicy(), codeBase);
+ // see http://icedtea.classpath.org/bugzilla/show_bug.cgi?id=2746#c3
+ URL codebaseRewriter=UrlUtils.ensureSlashTail(UrlUtils.removeFileName(jnlp));
+ this.codeBase = codebaseRewriter;
+ jnlpFile = jnlpCreator.create(jnlp, null, defaultSettings, JNLPRuntime.getDefaultUpdatePolicy(), codebaseRewriter);
debugJnlp = new StreamProvider() {
@Override
@@ -594,7 +598,7 @@
private static String getAllPermissionsElement() {
return " <all-permissions/>\n";
}
-
+
private abstract class StreamProvider {
diff -r 78a490b19df5 -r ea6a2a888131 netx/net/sourceforge/jnlp/SecurityDesc.java
--- a/netx/net/sourceforge/jnlp/SecurityDesc.java Wed Jan 06 17:38:47 2016 +0100
+++ b/netx/net/sourceforge/jnlp/SecurityDesc.java Thu Jan 07 16:59:45 2016 +0100
@@ -415,7 +415,11 @@
}
}
try {
- final URI codebase = file.getCodeBase().toURI().normalize();
+ URL codebaseOriginal = file.getCodeBase();
+ if (codebaseOriginal == null){
+ codebaseOriginal =file.fileLocation;
+ }
+ final URI codebase = codebaseOriginal.toURI().normalize();
final URI host = getHost(codebase);
final String codebaseHostUriString = host.toString();
final String urlPermissionUrlString = appendRecursiveSubdirToCodebaseHostString(codebaseHostUriString);
diff -r 78a490b19df5 -r ea6a2a888131 netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmation.java
--- a/netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmation.java Wed Jan 06 17:38:47 2016 +0100
+++ b/netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmation.java Thu Jan 07 16:59:45 2016 +0100
@@ -36,7 +36,6 @@
package net.sourceforge.jnlp.security.appletextendedsecurity;
-import java.net.MalformedURLException;
import static net.sourceforge.jnlp.runtime.Translator.R;
import java.net.URL;
@@ -156,7 +155,7 @@
documentbaseRegex = UrlRegEx.quote(documentbase.toExternalForm()); // Match only this applet
archiveMatches = toRelativePaths(getJars(file), file.getCodeBase().toString()); // Match only this applet
} else {
- documentbaseRegex = UrlRegEx.quoteAndStar(stripFile(documentbase)); // Match any from codebase and sourceFile "base"
+ documentbaseRegex = UrlRegEx.quoteAndStar(UrlUtils.stripFile(documentbase)); // Match any from codebase and sourceFile "base"
}
}
@@ -247,48 +246,4 @@
}
- static String stripFile(URL documentbase) {
- //whenused in generation of regec, the trailing slash is very important
- //see the result between http:/some.url/path.* and http:/some.url/path/.*
- return ensureSlashTail(stripFileImp(documentbase));
- }
-
- private static String stripFileImp(URL documentbase) {
- try {
- String normalized = UrlUtils.normalizeUrlAndStripParams(documentbase).toExternalForm().trim();
- if (normalized.endsWith("/") || normalized.endsWith("\\")) {
- return normalized;
- }
- URL middleway = new URL(normalized);
- String file = middleway.getFile();
- int i = Math.max(file.lastIndexOf('/'), file.lastIndexOf('\\'));
- if (i<0){
- return normalized;
- }
- String parent = file.substring(0, i+1);
- String stripped = normalized.replace(file, parent);
- return stripped;
- } catch (Exception ex) {
- OutputController.getLogger().log(ex);
- return documentbase.toExternalForm();
- }
-
- }
-
- private static String ensureSlashTail(String s) {
- if (s.endsWith("/")) {
- return s;
- }
- if (s.endsWith("\\")) {
- return s;
- }
- if (s.contains("/")) {
- return s + "/";
- }
- if (s.contains("\\")) {
- return s + "\\";
- }
- return s + "/";
- }
-
}
diff -r 78a490b19df5 -r ea6a2a888131 netx/net/sourceforge/jnlp/util/UrlUtils.java
--- a/netx/net/sourceforge/jnlp/util/UrlUtils.java Wed Jan 06 17:38:47 2016 +0100
+++ b/netx/net/sourceforge/jnlp/util/UrlUtils.java Thu Jan 07 16:59:45 2016 +0100
@@ -346,5 +346,63 @@
public static String getHostAndPort(final URL url) {
return url.getHost() + ":" + getSanitizedPort(url);
}
+
+ public static URL ensureSlashTail(URL u) {
+ if (u == null) {
+ return null;
+ }
+ String s = ensureSlashTail(u.toExternalForm());
+ try {
+ return new URL(s);
+ } catch (MalformedURLException ex) {
+ OutputController.getLogger().log(ex);
+ return u;
+ }
+
+ }
+
+ public static String ensureSlashTail(String s) {
+ if (s.endsWith("/")) {
+ return s;
+ }
+ if (s.endsWith("\\")) {
+ return s;
+ }
+ if (s.contains("/")) {
+ return s + "/";
+ }
+ if (s.contains("\\")) {
+ return s + "\\";
+ }
+ return s + "/";
+ }
+
+ public static String stripFile(URL documentbase) {
+ //whenused in generation of regec, the trailing slash is very important
+ //see the result between http:/some.url/path.* and http:/some.url/path/.*
+ return UrlUtils.ensureSlashTail(stripFileImp(documentbase));
+ }
+
+ private static String stripFileImp(URL documentbase) {
+ try {
+ String normalized = UrlUtils.normalizeUrlAndStripParams(documentbase).toExternalForm().trim();
+ if (normalized.endsWith("/") || normalized.endsWith("\\")) {
+ return normalized;
+ }
+ URL middleway = new URL(normalized);
+ String file = middleway.getFile();
+ int i = Math.max(file.lastIndexOf('/'), file.lastIndexOf('\\'));
+ if (i < 0) {
+ return normalized;
+ }
+ String parent = file.substring(0, i + 1);
+ String stripped = normalized.replace(file, parent);
+ return stripped;
+ } catch (Exception ex) {
+ OutputController.getLogger().log(ex);
+ return documentbase.toExternalForm();
+ }
+
+ }
}
diff -r 78a490b19df5 -r ea6a2a888131 netx/net/sourceforge/nanoxml/XMLElement.java
--- a/netx/net/sourceforge/nanoxml/XMLElement.java Wed Jan 06 17:38:47 2016 +0100
+++ b/netx/net/sourceforge/nanoxml/XMLElement.java Thu Jan 07 16:59:45 2016 +0100
@@ -195,6 +195,11 @@
* Character read too much for the comment remover.
*/
private char sanitizeCharReadTooMuch;
+
+ /**
+ * Whether the BOM header appeared
+ */
+ private boolean BOM = false;
/**
* The reader provided by the caller of the parse method.
@@ -494,7 +499,7 @@
this.parserLineNr = startingLineNr;
for (;;) {
- char ch = this.scanWhitespace();
+ char ch = this.scanLeadingWhitespace();
if (ch != '<') {
throw this.expectedInput("<", ch);
@@ -584,24 +589,50 @@
}
}
+ private boolean isRegularWhiteSpace(char ch) {
+ switch (ch) {
+ case ' ':
+ case '\t':
+ case '\n':
+ case '\r':
+ return true;
+ default:
+ return false;
+ }
+ }
+
/**
* This method scans an identifier from the current reader.
*
* @return the next character following the whitespace.
* @throws java.io.IOException if something goes wrong
*/
- protected char scanWhitespace()
+ private char scanWhitespace()
throws IOException {
- for (;;) {
+ while(true) {
char ch = this.readChar();
- switch (ch) {
- case ' ':
- case '\t':
- case '\n':
- case '\r':
- break;
- default:
- return ch;
+ if (!isRegularWhiteSpace(ch)) {
+ return ch;
+ }
+ }
+ }
+ /**
+ * This method scans an leading identifier from the current reader.
+ *
+ * UNlike scanWhitespace, it skipps also BOM
+ *
+ * @return the next character following the whitespace.
+ * @throws java.io.IOException if something goes wrong
+ */
+ private char scanLeadingWhitespace()
+ throws IOException {
+ while(true) {
+ char ch = this.readChar();
+ //this is BOM , not space
+ if (ch == '') {
+ BOM = true;
+ } else if (!isRegularWhiteSpace(ch)) {
+ return ch;
}
}
}
@@ -621,18 +652,17 @@
*/
protected char scanWhitespace(StringBuffer result)
throws IOException {
- for (;;) {
+ while (true) {
char ch = this.readChar();
- switch (ch) {
- case ' ':
- case '\t':
- case '\n':
- result.append(ch);
- break;
- case '\r':
- break;
- default:
- return ch;
+ if (!isRegularWhiteSpace(ch)) {
+ return ch;
+ } else {
+ switch (ch) {
+ case ' ':
+ case '\t':
+ case '\n':
+ result.append(ch);
+ }
}
}
}
@@ -1297,4 +1327,11 @@
}
}
+
+ public boolean isBOM() {
+ return BOM;
+ }
+
+
+
}
diff -r 78a490b19df5 -r ea6a2a888131 plugin/icedteanp/IcedTeaNPPlugin.cc
--- a/plugin/icedteanp/IcedTeaNPPlugin.cc Wed Jan 06 17:38:47 2016 +0100
+++ b/plugin/icedteanp/IcedTeaNPPlugin.cc Thu Jan 07 16:59:45 2016 +0100
@@ -1154,13 +1154,13 @@
if (g_str_has_prefix(parts[1], "PluginProxyInfo"))
{
gchar* proxy = NULL;
- uint32_t len;
+ uint32_t len = 0;
gchar* decoded_url = (gchar*) calloc(strlen(parts[4]) + 1, sizeof(gchar));
IcedTeaPluginUtilities::decodeURL(parts[4], &decoded_url);
PLUGIN_DEBUG("parts[0]=%s, parts[1]=%s, reference, parts[3]=%s, parts[4]=%s -- decoded_url=%s\n", parts[0], parts[1], parts[3], parts[4], decoded_url);
- gchar* proxy_info;
+ gchar* proxy_info = NULL;
proxy_info = g_strconcat ("plugin PluginProxyInfo reference ", parts[3], " ", NULL);
if (get_proxy_info(decoded_url, &proxy, &len) == NPERR_NO_ERROR)
@@ -1331,10 +1331,16 @@
}
if (browser_functions.getvalueforurl)
{
-
+ NPError err;
// As in get_cookie_info, we use the first active instance
gpointer instance=getFirstInTableInstance(instance_to_id_map);
- browser_functions.getvalueforurl((NPP) instance, NPNURLVProxy, siteAddr, proxy, len);
+ err = browser_functions.getvalueforurl((NPP) instance, NPNURLVProxy, siteAddr, proxy, len);
+
+ if (err != NPERR_NO_ERROR)
+ {
+ *proxy = (char *) malloc(sizeof **proxy * 7);
+ *len = g_strlcpy(*proxy, "DIRECT", 7);
+ }
} else
{
return NPERR_GENERIC_ERROR;
diff -r 78a490b19df5 -r ea6a2a888131 tests/netx/unit/net/sourceforge/jnlp/ParserMalformedXml.java
--- a/tests/netx/unit/net/sourceforge/jnlp/ParserMalformedXml.java Wed Jan 06 17:38:47 2016 +0100
+++ b/tests/netx/unit/net/sourceforge/jnlp/ParserMalformedXml.java Thu Jan 07 16:59:45 2016 +0100
@@ -42,7 +42,10 @@
import java.io.InputStream;
import java.io.InputStreamReader;
import java.io.IOException;
+import net.sourceforge.jnlp.annotations.Bug;
import net.sourceforge.jnlp.annotations.KnownToFail;
+import net.sourceforge.jnlp.util.FileUtils;
+import org.junit.Assert;
import org.junit.BeforeClass;
import org.junit.Test;
@@ -105,5 +108,21 @@
String malformedJnlp = originalJnlp.replace("'jnlp.jnlp'", "jnlp.jnlp");
Parser.getRootNode(new ByteArrayInputStream(malformedJnlp.getBytes()), new ParserSettings(false, true, false));
}
+
+
+ @Bug(id = "PR2690")
+ @Test
+ public void testXmlBomTagSoupOff() throws ParseException {
+ InputStream is = ClassLoader.getSystemClassLoader().getResourceAsStream("net/sourceforge/jnlp/templates/EFBBBF.jnlp");
+ Assert.assertNotNull(is);
+ Parser.getRootNode(is, new ParserSettings(false, true, false));
+ }
+
+ @Test
+ public void testXmlBomTagSoupOn() throws ParseException {
+ InputStream is = ClassLoader.getSystemClassLoader().getResourceAsStream("net/sourceforge/jnlp/templates/EFBBBF.jnlp");
+ Assert.assertNotNull(is);
+ Parser.getRootNode(is, new ParserSettings(false, true, true));
+ }
}
diff -r 78a490b19df5 -r ea6a2a888131 tests/netx/unit/net/sourceforge/jnlp/PluginBridgeTest.java
--- a/tests/netx/unit/net/sourceforge/jnlp/PluginBridgeTest.java Wed Jan 06 17:38:47 2016 +0100
+++ b/tests/netx/unit/net/sourceforge/jnlp/PluginBridgeTest.java Thu Jan 07 16:59:45 2016 +0100
@@ -520,7 +520,5 @@
String fixed = fixCommonIssues(source, true);
checkIssuesFixed(fixed, true, false);
}
-
-
More information about the distro-pkg-dev
mailing list