Closed
Bug 1215167
Opened 9 years ago
Closed 9 years ago
unsafe CPOW usage from non-addon code should throw
Categories
(Core :: DOM: Content Processes, defect)
Core
DOM: Content Processes
Tracking
()
RESOLVED
FIXED
mozilla45
People
(Reporter: blassey, Assigned: billm)
References
Details
Attachments
(1 file)
14.60 KB,
patch
|
mrbkap
:
review+
|
Details | Diff | Splinter Review |
No description provided.
Reporter | ||
Updated•9 years ago
|
Assignee: nobody → wmccloskey
Updated•9 years ago
|
Component: IPC → DOM: Content Processes
Assignee | ||
Comment 1•9 years ago
|
||
One thing I'm not sure of here is why the test_cpows.xul code isn't considered part of an add-on. Test code usually is. Maybe I'll look at that part a bit closer.
Attachment #8678395 -
Flags: review?(mrbkap)
Comment 2•9 years ago
|
||
Comment on attachment 8678395 [details] [diff] [review] patch Review of attachment 8678395 [details] [diff] [review]: ----------------------------------------------------------------- ::: dom/base/test/chrome/cpows_parent.xul @@ +399,5 @@ > + msg.objects.f(); > + } catch (e if /unsafe CPOW usage forbidden/.test(String(e))) { > + failed = true; > + } > + opener.wrappedJSObject.SpecialPowers.setBoolPref(PREF_UNSAFE_FORBIDDEN, false); Maybe clearUserPref?
Attachment #8678395 -
Flags: review?(mrbkap) → review+
This apparently introduced a new hazard to the build: https://treeherder.mozilla.org/logviewer.html#?job_id=16811735&repo=mozilla-inbound Backed out in https://hg.mozilla.org/integration/mozilla-inbound/rev/7c43617a7215
Flags: needinfo?(wmccloskey)
Comment 6•9 years ago
|
||
bugherder |
https://hg.mozilla.org/mozilla-central/rev/2215dc556dbc
Status: NEW → RESOLVED
Closed: 9 years ago
status-firefox45:
--- → fixed
Resolution: --- → FIXED
Target Milestone: --- → mozilla45
Assignee | ||
Updated•9 years ago
|
Flags: needinfo?(wmccloskey)
You need to log in
before you can comment on or make changes to this bug.
Description
•