diff options
author | janekptacijarabaci <janekptacijarabaci@seznam.cz> | 2018-04-30 23:53:22 +0200 |
---|---|---|
committer | janekptacijarabaci <janekptacijarabaci@seznam.cz> | 2018-04-30 23:53:22 +0200 |
commit | 7c759805d0fe7e8f9a3b9f188ae9ed7b3b49eb30 (patch) | |
tree | 5f712b62066e4f009478256f5c18774485e67b64 | |
parent | e0a24e6d4f43a5f240f4c389e57a23a7a32f84ab (diff) | |
download | uxp-7c759805d0fe7e8f9a3b9f188ae9ed7b3b49eb30.tar.gz |
Bug 1359204 - Do not query nested URI within CheckChannel in ContentSecurityManager
-rw-r--r-- | dom/security/nsContentSecurityManager.cpp | 7 |
1 files changed, 0 insertions, 7 deletions
diff --git a/dom/security/nsContentSecurityManager.cpp b/dom/security/nsContentSecurityManager.cpp index 70e574445a..c6558fc93a 100644 --- a/dom/security/nsContentSecurityManager.cpp +++ b/dom/security/nsContentSecurityManager.cpp @@ -12,7 +12,6 @@ #include "nsMixedContentBlocker.h" #include "nsCDefaultURIFixup.h" #include "nsIURIFixup.h" -#include "nsINestedURI.h" #include "mozilla/dom/Element.h" #include "mozilla/dom/TabChild.h" @@ -657,12 +656,6 @@ nsContentSecurityManager::CheckChannel(nsIChannel* aChannel) if (contentPolicyType == nsIContentPolicy::TYPE_DOCUMENT || contentPolicyType == nsIContentPolicy::TYPE_SUBDOCUMENT) { - // query the nested URI for security checks like in the case of view-source - nsCOMPtr<nsINestedURI> nestedURI = do_QueryInterface(uri); - if (nestedURI) { - nestedURI->GetInnerURI(getter_AddRefs(uri)); - } - // TYPE_DOCUMENT and TYPE_SUBDOCUMENT loads might potentially // be wyciwyg:// channels. Let's fix up the URI so we can // perform proper security checks. |