Closed
Bug 66342
Opened 25 years ago
Closed 25 years ago
Bad links have a very lengthy context-sensitive menu!
Categories
(Core :: XUL, defect)
Tracking
()
People
(Reporter: xalkina, Assigned: law)
References
()
Details
Attachments
(1 file)
|
6.26 KB,
image/gif
|
Details |
The page I used to get the described result is password protected, but I guess
it works with any page that contains code like this:
<a href="htt://users.tninet.se/~odc669k/video
">htt://users.tninet.se/~odc669k/video
</a>
Right-clicking with the mouse on the link produces a very lengthy menu. The menu
contains all the normal options, plus any option relevant ro frames, altough the
page is not contained inside frames.
While I was switching windows writing this bug report, and clicking & selecting
on the page, the menu became suddenly correct!
Testing with 2001011808 on linux
I'm sure I will be able to reproduce it now. I will give more precise steps next
time.
Is there any way to capture a menu?
Updated•25 years ago
|
Assignee: pinkerton → law
Comment 1•25 years ago
|
||
content not toolkit.
| Reporter | ||
Comment 2•25 years ago
|
||
When menu is opening, mozilla says on its console:
line 0: uncaught exception, [Exception <no message>, code = -2142568430 nsresult
= 0x804b0012 location = chrome://communicator/content/nsContextMenu.js Line 358]
| Reporter | ||
Comment 3•25 years ago
|
||
| Reporter | ||
Comment 4•25 years ago
|
||
On the console as well:
JavaScript:
line 0: contextMenu has no properties
Comment 5•25 years ago
|
||
In the end, this is the same "!link.protocol" exception as bug 62744, which
just needs a try/catch, I suppose.
*** This bug has been marked as a duplicate of 62744 ***
Status: UNCONFIRMED → RESOLVED
Closed: 25 years ago
Resolution: --- → DUPLICATE
| Reporter | ||
Comment 7•25 years ago
|
||
Don't think this is a duplicate of 62744
...
I think there's a bug in the DOM.
<a href="foo:bar">
may not be really good HTML, but I don't think the resulting DOM should have a
Link object whose protocol property throws a JS exception when you access it.
Of course, we could catch that bogus exception and cover up the mistake, but my
suspicion is we'll get burned by the same bogus JS/DOM behavior again at some
point. Better to fix the problem at its source.\
I've tweaked the URL in this bug so that it will exhibit this behavior (not sure
it will work, though).
I think this is the same bug as 62744 (although I'm not sure what makes that
bug's Link objects go bad).
Component: XP Toolkit/Widgets: Menus → XUL
QA Contact: jrgmorrison → xptoolkit.widgets
You need to log in
before you can comment on or make changes to this bug.
Description
•