From 8539cbe6eff8ea72c88fdb63453e0ee444ec822f Mon Sep 17 00:00:00 2001 From: "cbiesinger%web.de" Date: Fri, 4 Apr 2003 13:20:37 +0000 Subject: [PATCH] 176950 patch by dwitte@stanford.edu r=darin sr=jag cookie permissions site blocking does not appy to fully qualified node names from within the site. --- extensions/cookie/nsPermissionManager.cpp | 11 +++++------ 1 file changed, 5 insertions(+), 6 deletions(-) diff --git a/extensions/cookie/nsPermissionManager.cpp b/extensions/cookie/nsPermissionManager.cpp index 5fc07ebc4a9..09c0e2513b6 100644 --- a/extensions/cookie/nsPermissionManager.cpp +++ b/extensions/cookie/nsPermissionManager.cpp @@ -335,9 +335,6 @@ nsPermissionManager::TestPermission(nsIURI *aURI, permission_HostStruct *hostStruct; permission_TypeStruct *typeStruct; - //TODO: Look for the specific host, if not found check its domains - // Do we want that? Currenty, it is not actually done - // find host name within list PRInt32 hostCount = mPermissionList.Count(); PRUint32 offset = 0; @@ -365,9 +362,11 @@ nsPermissionManager::TestPermission(nsIURI *aURI, } offset = hostPort.FindChar('.', offset) + 1; - // XXX Only walk up the domaintree for popups for now - // XXX clean this up. bug 199216. - } while ((offset > 0) && (aType == nsIPermissionManager::POPUP_TYPE)); + // walk up the domaintree (we stop as soon as we find a match, + // which will be the most specific domain we have an entry for). + // this is new behavior; we only used to do this for popups. + // see bug 176950. + } while (offset > 0); return NS_OK; }