ajax: script: Threat sameDomain file:// requests as crossDomain getscript-fix
authorAsbjørn Sloth Tønnesen <ast@mugami.com>
Thu, 3 Feb 2011 18:44:05 +0000 (18:44 +0000)
committerAsbjørn Sloth Tønnesen <ast@mugami.com>
Thu, 3 Feb 2011 18:44:05 +0000 (18:44 +0000)
commit0e85cee72762cd9eb466a365a63053808934c189
tree71a448cce19cfc1c3e8c3c8ec702de231d4ba033
parent7eba4b76dfb4dde3b514281d614d7ac4fedc0289
ajax: script: Threat sameDomain file:// requests as crossDomain

Due to file:// XHR security measures in Chromium[1], dynamic loading
of scripts need to use the script tag injection hack.

FYI: Chromium are considering possible ways to loosen these restrictions[2].

Tested in Chromium 6.0.472.63, Firefox 3.6.7 and Konqueror 4.4.5

[1] http://code.google.com/p/chromium/issues/detail?id=4197
[2] http://code.google.com/p/chromium/issues/detail?id=47416

Signed-off-by: Asbjørn Sloth Tønnesen <ast@mugami.com>
src/ajax/script.js