File tree Expand file tree Collapse file tree 4 files changed +6
-6
lines changed
auth/src/platform_browser Expand file tree Collapse file tree 4 files changed +6
-6
lines changed Original file line number Diff line number Diff line change @@ -124,7 +124,7 @@ _setExternalJSProvider({
124
124
// TODO: consider adding timeout support & cancellation
125
125
return new Promise ( ( resolve , reject ) => {
126
126
const el = document . createElement ( 'script' ) ;
127
- // FIXME : Do not use setAttribute, since it can lead to XSS. Instead, use the safevalues library to
127
+ // TODO : Do not use setAttribute, since it can lead to XSS. Instead, use the safevalues library to
128
128
// safely set an attribute for a sanitized trustedResourceUrl. Since the trustedResourceUrl
129
129
// must be initialized from a template string literal, this could involve some heavy
130
130
// refactoring.
Original file line number Diff line number Diff line change @@ -44,7 +44,7 @@ describe('platform-browser/load_js', () => {
44
44
loadJS ( url : string ) : Promise < Event > {
45
45
return new Promise ( ( resolve , reject ) => {
46
46
const el = document . createElement ( 'script' ) ;
47
- // FIXME : Do not use setAttribute, as this can lead to XSS. Instead, use the safevalues
47
+ // TODO : Do not use setAttribute, as this can lead to XSS. Instead, use the safevalues
48
48
// library, or get an exception for tests.
49
49
el . setAttribute ( 'src' , url ) ;
50
50
el . onload = resolve ;
@@ -67,7 +67,7 @@ describe('platform-browser/load_js', () => {
67
67
68
68
// eslint-disable-next-line @typescript-eslint/no-floating-promises
69
69
_loadJS ( 'http://localhost/url' ) ;
70
- // FIXME : Do not use setAttribute, as this can lead to XSS. Instead, use the safevalues
70
+ // TODO : Do not use setAttribute, as this can lead to XSS. Instead, use the safevalues
71
71
// library, or get an exception for tests.
72
72
expect ( el . setAttribute ) . to . have . been . calledWith (
73
73
'src' ,
Original file line number Diff line number Diff line change @@ -475,7 +475,7 @@ export class FirebaseIFrameScriptHolder {
475
475
const iframeContents = '<html><body>' + script + '</body></html>' ;
476
476
try {
477
477
this . myIFrame . doc . open ( ) ;
478
- // FIXME : Do not use document.write, since it can lead to XSS. Instead, use the safevalues
478
+ // TODO : Do not use document.write, since it can lead to XSS. Instead, use the safevalues
479
479
// library to sanitize the HTML in the iframeContents.
480
480
this . myIFrame . doc . write ( iframeContents ) ;
481
481
this . myIFrame . doc . close ( ) ;
@@ -719,7 +719,7 @@ export class FirebaseIFrameScriptHolder {
719
719
const newScript = this . myIFrame . doc . createElement ( 'script' ) ;
720
720
newScript . type = 'text/javascript' ;
721
721
newScript . async = true ;
722
- // FIXME : We cannot assign an arbitrary URL to a script attached to the DOM, since it is
722
+ // TODO : We cannot assign an arbitrary URL to a script attached to the DOM, since it is
723
723
// at risk of XSS. We should use the safevalues library to create a safeScriptEl, and
724
724
// assign a sanitized trustedResourceURL to it. Since the URL must be a template string
725
725
// literal, this could require some heavy refactoring.
Original file line number Diff line number Diff line change @@ -24,7 +24,7 @@ export async function registerDefaultSw(
24
24
messaging : MessagingService
25
25
) : Promise < void > {
26
26
try {
27
- // FIXME : Use safevalues to register the service worker with a sanitized trustedResourceUrl.
27
+ // TODO : Use safevalues to register the service worker with a sanitized trustedResourceUrl.
28
28
messaging . swRegistration = await navigator . serviceWorker . register (
29
29
DEFAULT_SW_PATH ,
30
30
{
You can’t perform that action at this time.
0 commit comments