diff --git a/qutebrowser/browser/pdfjs.py b/qutebrowser/browser/pdfjs.py index a52a205a6..1c721979f 100644 --- a/qutebrowser/browser/pdfjs.py +++ b/qutebrowser/browser/pdfjs.py @@ -91,6 +91,7 @@ def fix_urls(asset): SYSTEM_PDFJS_PATHS = [ '/usr/share/pdf.js/', # Debian pdf.js-common '/usr/share/javascript/pdf/', # Debian libjs-pdf + os.path.expanduser('~/.local/share/qutebrowser/pdfjs/'), # fallback ] diff --git a/qutebrowser/html/no_pdfjs.html b/qutebrowser/html/no_pdfjs.html index fcfc1d3f8..694affc4d 100644 --- a/qutebrowser/html/no_pdfjs.html +++ b/qutebrowser/html/no_pdfjs.html @@ -34,6 +34,11 @@ body { width: 100%; } +span.warning { + text-weigth: bold; + color: red; +} + td { margin-top: 20px; color: #555; @@ -99,6 +104,18 @@ li { You can use the scripts/dev/update_3rdparty.py script to download the latest version. + +
  • + You can manually download the pdf.js archive + here + and extract it to ~/.local/share/qutebrowser/pdfjs +
    + Warning: Using this method you are + responsible for yourself to keep the installation updated! If a + vulnerability is found in pdf.js, neither qutebrowser nor your + system's package manager will update your pdf.js installation. + Use it at your own risk! +