summaryrefslogtreecommitdiffstats
path: root/dom/security/nsCSPContext.cpp
diff options
context:
space:
mode:
authorMoonchild <moonchild@palemoon.org>2020-09-23 13:55:00 +0000
committerMoonchild <moonchild@palemoon.org>2020-09-23 13:55:00 +0000
commita680bdc637e0393aaa08d575c66f7166b788b443 (patch)
treeb76060239e018ba6f069207b17ba6b5dd9fb83fa /dom/security/nsCSPContext.cpp
parentc14e7d70fccb6f945c828fe32dd6462c677d2024 (diff)
downloadUXP-a680bdc637e0393aaa08d575c66f7166b788b443.tar
UXP-a680bdc637e0393aaa08d575c66f7166b788b443.tar.gz
UXP-a680bdc637e0393aaa08d575c66f7166b788b443.tar.lz
UXP-a680bdc637e0393aaa08d575c66f7166b788b443.tar.xz
UXP-a680bdc637e0393aaa08d575c66f7166b788b443.zip
Issue #1656 - Part 1: Nuke most vim config lines in the tree.
Since these are just interpreted comments, there's 0 impact on actual code. This removes all lines that match /* vim: set(.*)tw=80: */ with S&R -- there are a few others scattered around which will be removed manually in a second part.
Diffstat (limited to 'dom/security/nsCSPContext.cpp')
-rw-r--r--dom/security/nsCSPContext.cpp5
1 files changed, 2 insertions, 3 deletions
diff --git a/dom/security/nsCSPContext.cpp b/dom/security/nsCSPContext.cpp
index 56a119e1a..9fd30eed8 100644
--- a/dom/security/nsCSPContext.cpp
+++ b/dom/security/nsCSPContext.cpp
@@ -1,5 +1,4 @@
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
-/* vim: set ts=8 sts=2 et sw=2 tw=80: */
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
@@ -773,7 +772,7 @@ StripURIForReporting(nsIURI* aURI,
{
// 1) If the origin of uri is a globally unique identifier (for example,
// aURI has a scheme of data, blob, or filesystem), then return the
- // ASCII serialization of uri’s scheme.
+ // ASCII serialization of uri???s scheme.
bool isHttpOrFtp =
(NS_SUCCEEDED(aURI->SchemeIs("http", &isHttpOrFtp)) && isHttpOrFtp) ||
(NS_SUCCEEDED(aURI->SchemeIs("https", &isHttpOrFtp)) && isHttpOrFtp) ||
@@ -788,7 +787,7 @@ StripURIForReporting(nsIURI* aURI,
}
// 2) If the origin of uri is not the same as the origin of the protected
- // resource, then return the ASCII serialization of uri’s origin.
+ // resource, then return the ASCII serialization of uri???s origin.
if (!NS_SecurityCompareURIs(aSelfURI, aURI, false)) {
// cross origin redirects also fall into this category, see:
// http://www.w3.org/TR/CSP/#violation-reports