From 115cf1e322bdabaee001781e1d5a8ee4928992af Mon Sep 17 00:00:00 2001 From: janekptacijarabaci Date: Sun, 22 Apr 2018 22:17:09 +0200 Subject: Revert "Bug 1182569: Update ContentSecurityManager to handle docshell loads" This reverts commit 2e33335820b2816bee111e78588ac82e401c86ae. --- netwerk/base/nsNetUtil.cpp | 14 ++++++++++---- 1 file changed, 10 insertions(+), 4 deletions(-) (limited to 'netwerk/base') diff --git a/netwerk/base/nsNetUtil.cpp b/netwerk/base/nsNetUtil.cpp index bc9bcf88a5..8ff3e788f3 100644 --- a/netwerk/base/nsNetUtil.cpp +++ b/netwerk/base/nsNetUtil.cpp @@ -1285,10 +1285,16 @@ NS_HasBeenCrossOrigin(nsIChannel* aChannel, bool aReport) nsCOMPtr loadInfo = aChannel->GetLoadInfo(); MOZ_RELEASE_ASSERT(loadInfo, "Origin tracking only works for channels created with a loadinfo"); - // TYPE_DOCUMENT loads have a null LoadingPrincipal and can not be cross origin. - if (!loadInfo->LoadingPrincipal()) { - return false; - } +#ifdef DEBUG + // Don't enforce TYPE_DOCUMENT assertions for loads + // initiated by javascript tests. + bool skipContentTypeCheck = false; + skipContentTypeCheck = Preferences::GetBool("network.loadinfo.skip_type_assertion"); +#endif + + MOZ_ASSERT(skipContentTypeCheck || + loadInfo->GetExternalContentPolicyType() != nsIContentPolicy::TYPE_DOCUMENT, + "calling NS_HasBeenCrossOrigin on a top level load"); // Always treat tainted channels as cross-origin. if (loadInfo->GetTainting() != LoadTainting::Basic) { -- cgit v1.2.3