From 49a4b13d1ca54bc7d87a852630e00e1d7ddd4716 Mon Sep 17 00:00:00 2001 From: "dbaron%fas.harvard.edu" Date: Sat, 2 Dec 2000 19:17:38 +0000 Subject: [PATCH] Bypass XBL as a hack to avoid a large leak. b=61821 r=disttsc@bart.nl sr=alecf@netscape.com --- xpfe/browser/resources/content/navigator.js | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/xpfe/browser/resources/content/navigator.js b/xpfe/browser/resources/content/navigator.js index 137e92c093cc..4a21c934dd2b 100644 --- a/xpfe/browser/resources/content/navigator.js +++ b/xpfe/browser/resources/content/navigator.js @@ -1555,7 +1555,10 @@ function checkForDirectoryListing() typeof _content.HTTPIndex == "object" && !_content.HTTPIndex.constructor) { // Give directory .xul/.js access to browser instance. - _content.defaultCharacterset = getBrowser().markupDocumentViewer.defaultCharacterSet; + // XXX The following line leaks (bug 61821), so the next line is a hack + // to avoid the leak. + // _content.defaultCharacterset = getBrowser().markupDocumentViewer.defaultCharacterSet; + _content.defaultCharacterset = getBrowser().docShell.contentViewer.QueryInterface(Components.interfaces.nsIMarkupDocumentViewer).defaultCharacterSet; _content.parentWindow = window; } }