Closed Bug 918090 Opened 11 years ago Closed 11 years ago

Let NeckoParent get the app:// uri when remoting file opening.

Categories

(Core :: Networking, defect)

defect
Not set
normal

Tracking

()

RESOLVED FIXED
mozilla27
Tracking Status
firefox27 --- fixed

People

(Reporter: fabrice, Assigned: fabrice)

References

Details

(Whiteboard: [qa-])

Attachments

(1 file, 1 obsolete file)

We need that for bug 882186 where we'll need to whitelist a single trusted uri.
Attached patch patch (obsolete) — Splinter Review
Attachment #806908 - Flags: review?(jduell.mcbugs)
Comment on attachment 806908 [details] [diff] [review]
patch

Review of attachment 806908 [details] [diff] [review]:
-----------------------------------------------------------------

::: netwerk/ipc/NeckoParent.cpp
@@ +448,5 @@
>          printf_stderr("NeckoParent::AllocPRemoteOpenFile: "
>                        "FATAL error: app without webapps-manage permission is "
>                        "requesting file '%s' but is only allowed to open its "
> +                      "own application.zip at %s: KILLING CHILD PROCESS\n",
> +                      requestedPath.get(), mustMatch.get());

thanks for adding that :)
Attachment #806908 - Flags: review?(jduell.mcbugs) → review+
Fixed locally, waiting for green try:
https://tbpl.mozilla.org/?tree=Try&rev=83961272a1ba
Attached patch patch v2Splinter Review
Jason, this is basically the same patch, but using OptionalURIParams to fail gracefully when we have no app uri.
Attachment #806908 - Attachment is obsolete: true
Attachment #807542 - Flags: review?(jduell.mcbugs)
Attachment #807542 - Flags: review?(jduell.mcbugs) → review+
https://hg.mozilla.org/mozilla-central/rev/400260c0b569
Status: NEW → RESOLVED
Closed: 11 years ago
Resolution: --- → FIXED
Target Milestone: --- → mozilla27
Whiteboard: [qa-]
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: