Web   ·   Wiki   ·   Activities   ·   Blog   ·   Lists   ·   Chat   ·   Meeting   ·   Bugs   ·   Git   ·   Translate   ·   Archive   ·   People   ·   Donate
summaryrefslogtreecommitdiffstats
path: root/config/modulesets/patches/xulrunner-perms.patch
diff options
context:
space:
mode:
authorMarco Pesenti Gritti <mpg@redhat.com>2008-04-20 00:57:50 (GMT)
committer Marco Pesenti Gritti <mpg@redhat.com>2008-04-20 00:57:50 (GMT)
commit41710698a04c20e566fcb2c152802c1e38cb6316 (patch)
tree2ac4007972081640419fceb63116664fb6642236 /config/modulesets/patches/xulrunner-perms.patch
parent9f2bbbbebfa7b6f2de89520c6f591549d1ae2667 (diff)
Patches needs to be under modulesets so that jhbuild can find them.
Diffstat (limited to 'config/modulesets/patches/xulrunner-perms.patch')
-rw-r--r--config/modulesets/patches/xulrunner-perms.patch220
1 files changed, 220 insertions, 0 deletions
diff --git a/config/modulesets/patches/xulrunner-perms.patch b/config/modulesets/patches/xulrunner-perms.patch
new file mode 100644
index 0000000..524d5aa
--- /dev/null
+++ b/config/modulesets/patches/xulrunner-perms.patch
@@ -0,0 +1,220 @@
+--- modules/plugin/base/src/nsPluginHostImpl.cpp.old 2007-12-22 14:00:39.000000000 +0100
++++ modules/plugin/base/src/nsPluginHostImpl.cpp 2007-12-22 14:01:41.000000000 +0100
+@@ -5573,7 +5573,7 @@
+ if (NS_FAILED(rv))
+ return rv;
+
+- rv = localFile->OpenNSPRFileDesc(PR_WRONLY | PR_CREATE_FILE | PR_TRUNCATE, 0600, &fd);
++ rv = localFile->OpenNSPRFileDesc(PR_WRONLY | PR_CREATE_FILE | PR_TRUNCATE, 0660, &fd);
+ if (NS_FAILED(rv))
+ return rv;
+
+--- modules/libpref/src/nsPrefService.cpp.old 2007-12-22 14:02:25.000000000 +0100
++++ modules/libpref/src/nsPrefService.cpp 2007-12-22 14:02:42.000000000 +0100
+@@ -501,7 +501,7 @@
+ rv = NS_NewSafeLocalFileOutputStream(getter_AddRefs(outStreamSink),
+ aFile,
+ -1,
+- 0600);
++ 0660);
+ if (NS_FAILED(rv))
+ return rv;
+ rv = NS_NewBufferedOutputStream(getter_AddRefs(outStream), outStreamSink, 4096);
+--- security/nss/lib/softoken/legacydb/keydb.c.old 2007-12-22 14:03:34.000000000 +0100
++++ security/nss/lib/softoken/legacydb/keydb.c 2007-12-22 14:04:12.000000000 +0100
+@@ -832,7 +832,7 @@
+ if (appName) {
+ handle->db = rdbopen( appName, prefix, "key", NO_CREATE, &status);
+ } else {
+- handle->db = dbopen( dbname, NO_CREATE, 0600, DB_HASH, 0 );
++ handle->db = dbopen( dbname, NO_CREATE, 0660, DB_HASH, 0 );
+ }
+ /* if create fails then we lose */
+ if ( handle->db == NULL ) {
+@@ -853,7 +853,7 @@
+ */
+ if (appName) {
+ NSSLOWKEYDBHandle *updateHandle;
+- updatedb = dbopen( dbname, NO_RDONLY, 0600, DB_HASH, 0 );
++ updatedb = dbopen( dbname, NO_RDONLY, 0660, DB_HASH, 0 );
+ if (!updatedb) {
+ goto noupdate;
+ }
+@@ -892,7 +892,7 @@
+ */
+ updname = (*namecb)(cbarg, 2);
+ if ( updname != NULL ) {
+- handle->updatedb = dbopen( updname, NO_RDONLY, 0600, DB_HASH, 0 );
++ handle->updatedb = dbopen( updname, NO_RDONLY, 0660, DB_HASH, 0 );
+ PORT_Free( updname );
+
+ if ( handle->updatedb ) {
+@@ -940,7 +940,7 @@
+ if (appName) {
+ db = rdbopen( appName, prefix, "key", openflags, NULL);
+ } else {
+- db = dbopen( dbname, openflags, 0600, DB_HASH, 0 );
++ db = dbopen( dbname, openflags, 0660, DB_HASH, 0 );
+ }
+
+ return db;
+@@ -2080,7 +2080,7 @@
+ handle->db=
+ rdbopen(handle->appname, handle->dbname, "key", NO_CREATE, NULL);
+ } else {
+- handle->db = dbopen( handle->dbname, NO_CREATE, 0600, DB_HASH, 0 );
++ handle->db = dbopen( handle->dbname, NO_CREATE, 0660, DB_HASH, 0 );
+ }
+ if (handle->db == NULL) {
+ /* set an error code */
+--- security/nss/lib/softoken/legacydb/pcertdb.c.old 2007-12-22 14:04:53.000000000 +0100
++++ security/nss/lib/softoken/legacydb/pcertdb.c 2007-12-22 14:05:33.000000000 +0100
+@@ -3998,7 +3998,7 @@
+
+ tmpname = (* namecb)(cbarg, version); /* get v6 db name */
+ if ( tmpname ) {
+- updatedb = dbopen( tmpname, NO_RDONLY, 0600, DB_HASH, 0 );
++ updatedb = dbopen( tmpname, NO_RDONLY, 0660, DB_HASH, 0 );
+ PORT_Free(tmpname);
+ }
+ return updatedb;
+@@ -4016,7 +4016,7 @@
+ if (appName) {
+ handle->permCertDB=rdbopen( appName, prefix, "cert", NO_CREATE, &status);
+ } else {
+- handle->permCertDB=dbsopen(certdbname, NO_CREATE, 0600, DB_HASH, 0);
++ handle->permCertDB=dbsopen(certdbname, NO_CREATE, 0660, DB_HASH, 0);
+ }
+
+ /* if create fails then we lose */
+@@ -4042,7 +4042,7 @@
+ /* rv must already be Success here because of previous if statement */
+ /* try to upgrade old db here */
+ if (appName &&
+- (updatedb = dbsopen(certdbname, NO_RDONLY, 0600, DB_HASH, 0)) != NULL) {
++ (updatedb = dbsopen(certdbname, NO_RDONLY, 0660, DB_HASH, 0)) != NULL) {
+ rv = UpdateV8DB(handle, updatedb);
+ } else if ((updatedb = nsslowcert_openolddb(namecb,cbarg,7)) != NULL) {
+ rv = UpdateV7DB(handle, updatedb);
+@@ -4107,7 +4107,7 @@
+ if (appName) {
+ handle->permCertDB = rdbopen( appName, prefix, "cert", openflags, NULL);
+ } else {
+- handle->permCertDB = dbsopen( certdbname, openflags, 0600, DB_HASH, 0 );
++ handle->permCertDB = dbsopen( certdbname, openflags, 0660, DB_HASH, 0 );
+ }
+
+ /* check for correct version number */
+--- security/nss/lib/softoken/legacydb/pk11db.c 2007-06-13 02:24:57.000000000 +0200
++++ security/nss/lib/softoken/legacydb/pk11db.c.old 2007-12-22 14:06:55.000000000 +0100
+@@ -543,7 +543,7 @@
+ PORT_Free(secname);
+ return pkcs11db;
+ }
+- updatedb = dbopen(dbName, NO_RDONLY, 0600, DB_HASH, 0);
++ updatedb = dbopen(dbName, NO_RDONLY, 0660, DB_HASH, 0);
+ if (updatedb) {
+ db_Copy(pkcs11db,updatedb);
+ (*updatedb->close)(updatedb);
+@@ -558,14 +558,14 @@
+ }
+
+ /* I'm sure we should do more checks here sometime... */
+- pkcs11db = dbopen(dbName, readOnly ? NO_RDONLY : NO_RDWR, 0600, DB_HASH, 0);
++ pkcs11db = dbopen(dbName, readOnly ? NO_RDONLY : NO_RDWR, 0660, DB_HASH, 0);
+
+ /* didn't exist? create it */
+ if (pkcs11db == NULL) {
+ if (readOnly)
+ return NULL;
+
+- pkcs11db = dbopen( dbName, NO_CREATE, 0600, DB_HASH, 0 );
++ pkcs11db = dbopen( dbName, NO_CREATE, 0660, DB_HASH, 0 );
+ if (pkcs11db)
+ (* pkcs11db->sync)(pkcs11db, 0);
+ }
+--- netwerk/cache/src/nsDiskCacheBlockFile.cpp.old 2007-12-22 14:11:31.000000000 +0100
++++ netwerk/cache/src/nsDiskCacheBlockFile.cpp 2007-12-22 14:11:45.000000000 +0100
+@@ -59,7 +59,7 @@
+ mBlockSize = blockSize;
+
+ // open the file - restricted to user, the data could be confidential
+- nsresult rv = blockFile->OpenNSPRFileDesc(PR_RDWR | PR_CREATE_FILE, 00600, &mFD);
++ nsresult rv = blockFile->OpenNSPRFileDesc(PR_RDWR | PR_CREATE_FILE, 00660, &mFD);
+ if (NS_FAILED(rv)) return rv; // unable to open or create file
+
+ // allocate bit map buffer
+--- netwerk/cache/src/nsDiskCacheDeviceSQL.cpp.old 2007-12-22 14:37:48.000000000 +0100
++++ netwerk/cache/src/nsDiskCacheDeviceSQL.cpp 2007-12-22 14:38:21.000000000 +0100
+@@ -374,7 +374,7 @@
+ rv = file->SetNativeLeafName(nsDependentCString(leaf));
+ if (NS_FAILED(rv))
+ return nsnull;
+- rv = file->Create(nsIFile::NORMAL_FILE_TYPE, 00600);
++ rv = file->Create(nsIFile::NORMAL_FILE_TYPE, 00660);
+ if (NS_FAILED(rv) && rv != NS_ERROR_FILE_ALREADY_EXISTS)
+ return nsnull;
+ if (NS_SUCCEEDED(rv))
+@@ -1105,7 +1105,7 @@
+ nsCOMPtr<nsIOutputStream> out;
+ NS_NewLocalFileOutputStream(getter_AddRefs(out), binding->mDataFile,
+ PR_WRONLY | PR_CREATE_FILE | PR_TRUNCATE,
+- 00600);
++ 00660);
+ if (!out)
+ return NS_ERROR_UNEXPECTED;
+
+--- netwerk/cache/src/nsDiskCacheStreams.cpp.old 2007-12-22 14:37:28.000000000 +0100
++++ netwerk/cache/src/nsDiskCacheStreams.cpp 2007-12-22 14:38:06.000000000 +0100
+@@ -666,8 +666,8 @@
+ getter_AddRefs(mLocalFile));
+ if (NS_FAILED(rv)) return rv;
+
+- // create PRFileDesc for input stream - the 00600 is just for consistency
+- rv = mLocalFile->OpenNSPRFileDesc(flags, 00600, fd);
++ // create PRFileDesc for input stream - the 00660 is just for consistency
++ rv = mLocalFile->OpenNSPRFileDesc(flags, 00660, fd);
+ if (NS_FAILED(rv)) return rv; // unable to open file
+
+ return NS_OK;
+--- /tmp/sqlite3.c 2008-04-07 14:31:32.000000000 +0200
++++ db/sqlite3/src/sqlite3.c 2008-04-07 14:32:49.000000000 +0200
+@@ -15768,7 +15768,7 @@
+ ** Default permissions when creating a new file
+ */
+ #ifndef SQLITE_DEFAULT_FILE_PERMISSIONS
+-# define SQLITE_DEFAULT_FILE_PERMISSIONS 0644
++# define SQLITE_DEFAULT_FILE_PERMISSIONS 0664
+ #endif
+
+ /*
+--- /tmp/nsDiskCacheMap.cpp 2008-04-07 14:27:11.000000000 +0200
++++ netwerk/cache/src/nsDiskCacheMap.cpp 2008-04-07 14:28:43.000000000 +0200
+@@ -78,7 +78,7 @@
+ NS_ENSURE_SUCCESS(rv, rv);
+
+ // open the file - restricted to user, the data could be confidential
+- rv = localFile->OpenNSPRFileDesc(PR_RDWR | PR_CREATE_FILE, 00600, &mMapFD);
++ rv = localFile->OpenNSPRFileDesc(PR_RDWR | PR_CREATE_FILE, 00660, &mMapFD);
+ NS_ENSURE_SUCCESS(rv, NS_ERROR_FILE_CORRUPTED);
+
+ PRBool cacheFilesExist = CacheFilesExist();
+@@ -676,7 +676,7 @@
+
+ PRFileDesc * fd = nsnull;
+ // open the file - restricted to user, the data could be confidential
+- rv = file->OpenNSPRFileDesc(PR_RDONLY, 00600, &fd);
++ rv = file->OpenNSPRFileDesc(PR_RDONLY, 00660, &fd);
+ NS_ENSURE_SUCCESS(rv, nsnull);
+
+ PRInt32 fileSize = PR_Available(fd);
+@@ -826,8 +826,8 @@
+ // open the file
+ PRFileDesc * fd;
+ // open the file - restricted to user, the data could be confidential
+- rv = localFile->OpenNSPRFileDesc(PR_RDWR | PR_TRUNCATE | PR_CREATE_FILE, 00600, &fd);
++ rv = localFile->OpenNSPRFileDesc(PR_RDWR | PR_TRUNCATE | PR_CREATE_FILE, 00660, &fd);
+ NS_ENSURE_SUCCESS(rv, rv);
+
+ // write the file
+