summaryrefslogtreecommitdiff
path: root/dom/security
diff options
context:
space:
mode:
authorjanekptacijarabaci <janekptacijarabaci@seznam.cz>2018-04-30 23:53:22 +0200
committerjanekptacijarabaci <janekptacijarabaci@seznam.cz>2018-04-30 23:53:22 +0200
commit7c759805d0fe7e8f9a3b9f188ae9ed7b3b49eb30 (patch)
tree5f712b62066e4f009478256f5c18774485e67b64 /dom/security
parente0a24e6d4f43a5f240f4c389e57a23a7a32f84ab (diff)
downloaduxp-7c759805d0fe7e8f9a3b9f188ae9ed7b3b49eb30.tar.gz
Bug 1359204 - Do not query nested URI within CheckChannel in ContentSecurityManager
Diffstat (limited to 'dom/security')
-rw-r--r--dom/security/nsContentSecurityManager.cpp7
1 files changed, 0 insertions, 7 deletions
diff --git a/dom/security/nsContentSecurityManager.cpp b/dom/security/nsContentSecurityManager.cpp
index 70e574445a..c6558fc93a 100644
--- a/dom/security/nsContentSecurityManager.cpp
+++ b/dom/security/nsContentSecurityManager.cpp
@@ -12,7 +12,6 @@
#include "nsMixedContentBlocker.h"
#include "nsCDefaultURIFixup.h"
#include "nsIURIFixup.h"
-#include "nsINestedURI.h"
#include "mozilla/dom/Element.h"
#include "mozilla/dom/TabChild.h"
@@ -657,12 +656,6 @@ nsContentSecurityManager::CheckChannel(nsIChannel* aChannel)
if (contentPolicyType == nsIContentPolicy::TYPE_DOCUMENT ||
contentPolicyType == nsIContentPolicy::TYPE_SUBDOCUMENT) {
- // query the nested URI for security checks like in the case of view-source
- nsCOMPtr<nsINestedURI> nestedURI = do_QueryInterface(uri);
- if (nestedURI) {
- nestedURI->GetInnerURI(getter_AddRefs(uri));
- }
-
// TYPE_DOCUMENT and TYPE_SUBDOCUMENT loads might potentially
// be wyciwyg:// channels. Let's fix up the URI so we can
// perform proper security checks.