summaryrefslogtreecommitdiff
path: root/flash-src/src/net/gimite
diff options
context:
space:
mode:
authorHiroshi Ichikawa <gimite@gmail.com>2011-09-10 19:02:18 +0900
committerHiroshi Ichikawa <gimite@gmail.com>2011-09-10 19:02:18 +0900
commit5c7df9d52083c5320a305a6f3b89ef4b08c89c16 (patch)
tree009ced487bc8a55ddc4b696e85253f156bd9caec /flash-src/src/net/gimite
parent66f79da193582bbd21507d80a2e5297de56668a3 (diff)
downloadweb-socket-js-5c7df9d52083c5320a305a6f3b89ef4b08c89c16.tar.gz
Allowing HTTP -> HTTPS access on WebSocketMainInsecure.swf.hixie-76
Diffstat (limited to 'flash-src/src/net/gimite')
-rw-r--r--flash-src/src/net/gimite/websocket/WebSocketMainInsecure.as3
1 files changed, 3 insertions, 0 deletions
diff --git a/flash-src/src/net/gimite/websocket/WebSocketMainInsecure.as b/flash-src/src/net/gimite/websocket/WebSocketMainInsecure.as
index e845839..de75c9b 100644
--- a/flash-src/src/net/gimite/websocket/WebSocketMainInsecure.as
+++ b/flash-src/src/net/gimite/websocket/WebSocketMainInsecure.as
@@ -11,6 +11,9 @@ public class WebSocketMainInsecure extends WebSocketMain {
public function WebSocketMainInsecure() {
Security.allowDomain("*");
+ // Also allows HTTP -> HTTPS call. Since we have already allowed arbitrary domains, allowing
+ // HTTP -> HTTPS would not be more dangerous.
+ Security.allowInsecureDomain("*");
super();
}