Skip to content

Commit a073d36

Browse files
committed
Replace FIXMEs with TODOs
1 parent b134676 commit a073d36

File tree

4 files changed

+6
-6
lines changed

4 files changed

+6
-6
lines changed

packages/auth/src/platform_browser/index.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,7 @@ _setExternalJSProvider({
124124
// TODO: consider adding timeout support & cancellation
125125
return new Promise((resolve, reject) => {
126126
const el = document.createElement('script');
127-
// FIXME: Do not use setAttribute, since it can lead to XSS. Instead, use the safevalues library to
127+
// TODO: Do not use setAttribute, since it can lead to XSS. Instead, use the safevalues library to
128128
// safely set an attribute for a sanitized trustedResourceUrl. Since the trustedResourceUrl
129129
// must be initialized from a template string literal, this could involve some heavy
130130
// refactoring.

packages/auth/src/platform_browser/load_js.test.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ describe('platform-browser/load_js', () => {
4444
loadJS(url: string): Promise<Event> {
4545
return new Promise((resolve, reject) => {
4646
const el = document.createElement('script');
47-
// FIXME: Do not use setAttribute, as this can lead to XSS. Instead, use the safevalues
47+
// TODO: Do not use setAttribute, as this can lead to XSS. Instead, use the safevalues
4848
// library, or get an exception for tests.
4949
el.setAttribute('src', url);
5050
el.onload = resolve;
@@ -67,7 +67,7 @@ describe('platform-browser/load_js', () => {
6767

6868
// eslint-disable-next-line @typescript-eslint/no-floating-promises
6969
_loadJS('http://localhost/url');
70-
// FIXME: Do not use setAttribute, as this can lead to XSS. Instead, use the safevalues
70+
// TODO: Do not use setAttribute, as this can lead to XSS. Instead, use the safevalues
7171
// library, or get an exception for tests.
7272
expect(el.setAttribute).to.have.been.calledWith(
7373
'src',

packages/database/src/realtime/BrowserPollConnection.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -475,7 +475,7 @@ export class FirebaseIFrameScriptHolder {
475475
const iframeContents = '<html><body>' + script + '</body></html>';
476476
try {
477477
this.myIFrame.doc.open();
478-
// FIXME: Do not use document.write, since it can lead to XSS. Instead, use the safevalues
478+
// TODO: Do not use document.write, since it can lead to XSS. Instead, use the safevalues
479479
// library to sanitize the HTML in the iframeContents.
480480
this.myIFrame.doc.write(iframeContents);
481481
this.myIFrame.doc.close();
@@ -719,7 +719,7 @@ export class FirebaseIFrameScriptHolder {
719719
const newScript = this.myIFrame.doc.createElement('script');
720720
newScript.type = 'text/javascript';
721721
newScript.async = true;
722-
// FIXME: We cannot assign an arbitrary URL to a script attached to the DOM, since it is
722+
// TODO: We cannot assign an arbitrary URL to a script attached to the DOM, since it is
723723
// at risk of XSS. We should use the safevalues library to create a safeScriptEl, and
724724
// assign a sanitized trustedResourceURL to it. Since the URL must be a template string
725725
// literal, this could require some heavy refactoring.

packages/messaging/src/helpers/registerDefaultSw.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ export async function registerDefaultSw(
2424
messaging: MessagingService
2525
): Promise<void> {
2626
try {
27-
// FIXME: Use safevalues to register the service worker with a sanitized trustedResourceUrl.
27+
// TODO: Use safevalues to register the service worker with a sanitized trustedResourceUrl.
2828
messaging.swRegistration = await navigator.serviceWorker.register(
2929
DEFAULT_SW_PATH,
3030
{

0 commit comments

Comments
 (0)