Bug 1087442 - Attach LoadInfo inside each individual ProtocolHandler - securitymanager changes (r=sicking)
☠☠ backed out by bb7e85f193b8 ☠ ☠
authorChristoph Kerschbaumer <mozilla@christophkerschbaumer.com>
Thu, 11 Dec 2014 20:47:55 -0800
changeset 245202 3f4166fb5e37b70c593bd94c15cb04c156147695
parent 245201 0c9c9123a0a97a7ed78b72e669c0b02569d0efca
child 245203 1eb0c25d9113da3fe10c599b5d6d0ea01fd477b0
push id4489
push userraliiev@mozilla.com
push dateMon, 23 Feb 2015 15:17:55 +0000
treeherdermozilla-beta@fd7c3dc24146 [default view] [failures only]
perfherder[talos] [build metrics] [platform microbench] (compared to previous push)
reviewerssicking
bugs1087442
milestone37.0a1
first release with
nightly linux32
nightly linux64
nightly mac
nightly win32
nightly win64
last release without
nightly linux32
nightly linux64
nightly mac
nightly win32
nightly win64
Bug 1087442 - Attach LoadInfo inside each individual ProtocolHandler - securitymanager changes (r=sicking)
caps/nsScriptSecurityManager.cpp
--- a/caps/nsScriptSecurityManager.cpp
+++ b/caps/nsScriptSecurityManager.cpp
@@ -971,17 +971,17 @@ nsScriptSecurityManager::CreateCodebaseP
     // I _think_ it's safe to not create null principals here based on aURI.
     // At least all the callers would do the right thing in those cases, as far
     // as I can tell.  --bz
 
     nsCOMPtr<nsIURIWithPrincipal> uriPrinc = do_QueryInterface(aURI);
     if (uriPrinc) {
         nsCOMPtr<nsIPrincipal> principal;
         uriPrinc->GetPrincipal(getter_AddRefs(principal));
-        if (!principal || principal == mSystemPrincipal) {
+        if (!principal) {
             return CallCreateInstance(NS_NULLPRINCIPAL_CONTRACTID, result);
         }
 
         principal.forget(result);
 
         return NS_OK;
     }