Drop 01-Fix-potential-access-violation.patch, it's in the sources now.
authorAndriy Grytsenko <andrej@rep.kiev.ua>
Sat, 21 Apr 2018 19:41:24 +0000 (22:41 +0300)
committerAndriy Grytsenko <andrej@rep.kiev.ua>
Sat, 21 Apr 2018 19:41:24 +0000 (22:41 +0300)
debian/patches/01-Fix-potential-access-violation.patch [deleted file]
debian/patches/series [deleted file]

diff --git a/debian/patches/01-Fix-potential-access-violation.patch b/debian/patches/01-Fix-potential-access-violation.patch
deleted file mode 100644 (file)
index 21e434d..0000000
+++ /dev/null
@@ -1,23 +0,0 @@
-Author: Andriy Grytsenko <andrej@rep.kiev.ua>
-Description: Fix potential access violation, use runtime user dir instead of tmp dir. (Closes: #862571)
-Applied-Upstream: bc8c3d871e9ecc67c47ff002b68cf049793faf08
-
---- a/src/single-inst.c
-+++ b/src/single-inst.c
-@@ -404,11 +404,16 @@ static void get_socket_name(SingleInstData* data, char* buf, int len)
-     }
-     else
-         dpynum = 0;
-+#if GLIB_CHECK_VERSION(2, 28, 0)
-+    g_snprintf(buf, len, "%s/%s-socket-%s-%d", g_get_user_runtime_dir(),
-+               data->prog_name, host ? host : "", dpynum);
-+#else
-     g_snprintf(buf, len, "%s/.%s-socket-%s-%d-%s",
-                 g_get_tmp_dir(),
-                 data->prog_name,
-                 host ? host : "",
-                 dpynum,
-                 g_get_user_name());
-+#endif
- }
diff --git a/debian/patches/series b/debian/patches/series
deleted file mode 100644 (file)
index 82e7a5a..0000000
+++ /dev/null
@@ -1 +0,0 @@
-01-Fix-potential-access-violation.patch