diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2018-09-07 23:00:06 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2018-09-08 09:00:34 +0200 |
commit | 8dc8bcc640cefafbb4966f0d73d9836082a246d1 (patch) | |
tree | 4700cfa805b7a8473f0a47c8d48e46285e471a2b /source/ap/ghostscript/ghostscript.13418541a5ae19b15f51cbb87faf344902f5af98.patch | |
parent | 67ddb93bd166d5f98252a533d1a4538e5649af50 (diff) | |
download | current-8dc8bcc640cefafbb4966f0d73d9836082a246d1.tar.gz current-8dc8bcc640cefafbb4966f0d73d9836082a246d1.tar.xz |
Fri Sep 7 23:00:06 UTC 201820180907230006
x/mesa-18.2.0-x86_64-1.txz: Upgraded.
Diffstat (limited to 'source/ap/ghostscript/ghostscript.13418541a5ae19b15f51cbb87faf344902f5af98.patch')
-rw-r--r-- | source/ap/ghostscript/ghostscript.13418541a5ae19b15f51cbb87faf344902f5af98.patch | 55 |
1 files changed, 55 insertions, 0 deletions
diff --git a/source/ap/ghostscript/ghostscript.13418541a5ae19b15f51cbb87faf344902f5af98.patch b/source/ap/ghostscript/ghostscript.13418541a5ae19b15f51cbb87faf344902f5af98.patch new file mode 100644 index 000000000..13fd25039 --- /dev/null +++ b/source/ap/ghostscript/ghostscript.13418541a5ae19b15f51cbb87faf344902f5af98.patch @@ -0,0 +1,55 @@ +From 13418541a5ae19b15f51cbb87faf344902f5af98 Mon Sep 17 00:00:00 2001 +From: Chris Liddell <chris.liddell@artifex.com> +Date: Thu, 6 Sep 2018 18:40:05 +0100 +Subject: [PATCH] Bug 699722 (2): add wildcards to the permissions paths. + +The temp and ICC profile paths need to finish with wildcards to work correctly. +--- + Resource/Init/gs_init.ps | 10 +++++----- + 1 file changed, 5 insertions(+), 5 deletions(-) + +diff --git a/Resource/Init/gs_init.ps b/Resource/Init/gs_init.ps +index 83918a9..5ff9f63 100644 +--- a/Resource/Init/gs_init.ps ++++ b/Resource/Init/gs_init.ps +@@ -2034,7 +2034,7 @@ readonly def + << + /PermitFileReading [ + currentuserparams /PermitFileReading get aload pop +- //tempfilepaths aload pop ++ [//tempfilepaths aload pop] (*) .generate_dir_list_templates + /FONTPATH .systemvar (*) .generate_dir_list_templates + % Library files : + /LIBPATH .systemvar (*) .generate_dir_list_templates +@@ -2049,15 +2049,15 @@ readonly def + [ currentsystemparams /GenericResourceDir get] (*) .file_name_separator (*) + concatstrings concatstrings .generate_dir_list_templates + } if +- currentuserparams /ICCProfilesDir known {currentuserparams /ICCProfilesDir get} if ++ currentuserparams /ICCProfilesDir known {[currentuserparams /ICCProfilesDir get] (*) .generate_dir_list_templates} if + ] + /PermitFileWriting [ + currentuserparams /PermitFileWriting get aload pop +- //tempfilepaths aload pop ++ [//tempfilepaths aload pop] (*) .generate_dir_list_templates + ] + /PermitFileControl [ + currentuserparams /PermitFileControl get aload pop +- //tempfilepaths aload pop ++ [//tempfilepaths aload pop] (*) .generate_dir_list_templates + ] + /LockFilePermissions //true + >> setuserparams +@@ -2140,7 +2140,7 @@ SAFER { .setsafeglobal } if + /.setshapealpha % transparency-example.ps + /.endtransparencygroup % transparency-example.ps + /.setdotlength % Bug687720.ps +- /.sort /.setdebug /.mementolistnewblocks /getenv ++ /.sort /.mementolistnewblocks /getenv + + /.makeoperator /.setCPSImode % gs_cet.ps, this won't work on cluster with -dSAFER + +-- +2.9.1 + + |