- update to 1.18.0
from wen heping (MAINTAINER)
This commit is contained in:
parent
4d53ef2e27
commit
f88804e9f5
@ -1,9 +1,8 @@
|
||||
# $OpenBSD: Makefile,v 1.31 2011/11/16 15:56:37 robert Exp $
|
||||
# $OpenBSD: Makefile,v 1.32 2011/12/21 14:00:34 jasper Exp $
|
||||
|
||||
COMMENT = web-based collaborative editing environment
|
||||
|
||||
DISTNAME = mediawiki-1.15.5
|
||||
REVISION = 7
|
||||
DISTNAME = mediawiki-1.18.0
|
||||
CATEGORIES = www
|
||||
|
||||
HOMEPAGE = http://www.mediawiki.org/
|
||||
@ -16,7 +15,7 @@ PERMIT_PACKAGE_FTP = Yes
|
||||
PERMIT_DISTFILES_CDROM =Yes
|
||||
PERMIT_DISTFILES_FTP = Yes
|
||||
|
||||
MASTER_SITES= http://download.wikimedia.org/mediawiki/1.15/
|
||||
MASTER_SITES= http://download.wikimedia.org/mediawiki/1.18/
|
||||
|
||||
NO_BUILD= Yes
|
||||
NO_REGRESS= Yes
|
||||
|
@ -1,5 +1,5 @@
|
||||
MD5 (mediawiki-1.15.5.tar.gz) = AcTIX7lpkdliyKyz2JLsLQ==
|
||||
RMD160 (mediawiki-1.15.5.tar.gz) = URO+sd9GxWJ1qQ1aHLhcKwHKVB8=
|
||||
SHA1 (mediawiki-1.15.5.tar.gz) = sVf+N7uJx45f+g8nsUvriG2zpfQ=
|
||||
SHA256 (mediawiki-1.15.5.tar.gz) = +DjJSvgeAY3PEfd2dNKjY+l7iDLQ1mQWKU/TAdtyCrU=
|
||||
SIZE (mediawiki-1.15.5.tar.gz) = 11595008
|
||||
MD5 (mediawiki-1.18.0.tar.gz) = IdJWD/GnGjCceGx1OTGr4A==
|
||||
RMD160 (mediawiki-1.18.0.tar.gz) = noPn8H7hHaQ0ivsBp6rWNQEXau8=
|
||||
SHA1 (mediawiki-1.18.0.tar.gz) = T0Hrz5hoc2Ja4iZB2o3KdlQpFKc=
|
||||
SHA256 (mediawiki-1.18.0.tar.gz) = 2lIq3GWSgMWpWBPFcddve8VVlC4K46X22S6ahS4lIHc=
|
||||
SIZE (mediawiki-1.18.0.tar.gz) = 17018978
|
||||
|
@ -1,18 +0,0 @@
|
||||
$OpenBSD: patch-config_index_php,v 1.1 2011/01/05 11:51:57 jasper Exp $
|
||||
|
||||
Security fix for SA42810
|
||||
MediaWiki "Clickjacking" Security Bypass Vulnerability
|
||||
|
||||
Patch from upstream svn:
|
||||
http://www.mediawiki.org/wiki/Special:Code/MediaWiki/79566
|
||||
|
||||
--- config/index.php.orig Wed Jan 5 11:03:02 2011
|
||||
+++ config/index.php Wed Jan 5 11:03:19 2011
|
||||
@@ -21,6 +21,7 @@
|
||||
|
||||
error_reporting( E_ALL );
|
||||
header( "Content-type: text/html; charset=utf-8" );
|
||||
+header( 'X-Frame-Options: DENY' );
|
||||
@ini_set( "display_errors", true );
|
||||
|
||||
# In case of errors, let output be clean.
|
@ -1,20 +0,0 @@
|
||||
$OpenBSD: patch-includes_OutputPage_php,v 1.1 2011/01/05 11:51:57 jasper Exp $
|
||||
|
||||
Security fix for SA42810
|
||||
MediaWiki "Clickjacking" Security Bypass Vulnerability
|
||||
|
||||
Patch from upstream svn:
|
||||
http://www.mediawiki.org/wiki/Special:Code/MediaWiki/79566
|
||||
|
||||
--- includes/OutputPage.php.orig Wed Jan 5 11:02:13 2011
|
||||
+++ includes/OutputPage.php Wed Jan 5 11:02:39 2011
|
||||
@@ -957,6 +957,9 @@ class OutputPage {
|
||||
$wgRequest->response()->header( "Content-type: $wgMimeType; charset={$wgOutputEncoding}" );
|
||||
$wgRequest->response()->header( 'Content-language: '.$wgContLanguageCode );
|
||||
|
||||
+ # To prevent clickjacking, do not allow this page to be inside a frame.
|
||||
+ $wgRequest->response()->header( 'X-Frame-Options: DENY' );
|
||||
+
|
||||
if ($this->mArticleBodyOnly) {
|
||||
$this->out($this->mBodytext);
|
||||
} else {
|
File diff suppressed because it is too large
Load Diff
Loading…
Reference in New Issue
Block a user