author | Francois Marier <francois@mozilla.com> |
Sun, 06 Dec 2015 01:20:56 -0800 | |
changeset 309946 | deda2ab537340b98f7cdceac54124f63821276d8 |
parent 309945 | 7467d21a2d53a7f4e5fb8747442e7fee905e4314 |
child 309947 | 5c255680866961999617036aa5b6658908d111f2 |
push id | 5513 |
push user | raliiev@mozilla.com |
push date | Mon, 25 Jan 2016 13:55:34 +0000 |
treeherder | mozilla-beta@5ee97dd05b5c [default view] [failures only] |
perfherder | [talos] [build metrics] [platform microbench] (compared to previous push) |
reviewers | gcp |
bugs | 1217236 |
milestone | 45.0a1 |
first release with | nightly linux32
nightly linux64
nightly mac
nightly win32
nightly win64
|
last release without | nightly linux32
nightly linux64
nightly mac
nightly win32
nightly win64
|
--- a/dom/plugins/base/nsPluginHost.cpp +++ b/dom/plugins/base/nsPluginHost.cpp @@ -3379,17 +3379,18 @@ nsresult nsPluginHost::NewPluginURLStrea // form |nsDocShell::OnLinkClickSync| bug 166613 rv = NS_NewChannel(getter_AddRefs(channel), url, requestingNode, nsILoadInfo::SEC_ALLOW_CROSS_ORIGIN_DATA_INHERITS | nsILoadInfo::SEC_FORCE_INHERIT_PRINCIPAL, nsIContentPolicy::TYPE_OBJECT_SUBREQUEST, nullptr, // aLoadGroup - listenerPeer); + listenerPeer, + nsIRequest::LOAD_NORMAL | nsIChannel::LOAD_CLASSIFY_URI); NS_ENSURE_SUCCESS(rv, rv); if (doc) { // And if it's a script allow it to execute against the // document's script context. nsCOMPtr<nsIScriptChannel> scriptChannel(do_QueryInterface(channel)); if (scriptChannel) { scriptChannel->SetExecutionPolicy(nsIScriptChannel::EXECUTE_NORMAL);