dom/workers/test/subdir/relativeLoad_sub_worker.js

Sat, 03 Jan 2015 20:18:00 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Sat, 03 Jan 2015 20:18:00 +0100
branch
TOR_BUG_3246
changeset 7
129ffea94266
permissions
-rw-r--r--

Conditionally enable double key logic according to:
private browsing mode or privacy.thirdparty.isolate preference and
implement in GetCookieStringCommon and FindCookie where it counts...
With some reservations of how to convince FindCookie users to test
condition and pass a nullptr when disabling double key logic.

michael@0 1 /**
michael@0 2 * Any copyright is dedicated to the Public Domain.
michael@0 3 * http://creativecommons.org/publicdomain/zero/1.0/
michael@0 4 */
michael@0 5 const importSubURL = "relativeLoad_sub_import.js";
michael@0 6
michael@0 7 onmessage = function(event) {
michael@0 8 var xhr = new XMLHttpRequest();
michael@0 9 xhr.open("GET", "testXHR.txt", false);
michael@0 10 xhr.send(null);
michael@0 11 if (xhr.status != 404) {
michael@0 12 throw "Loaded an xhr from the wrong location!";
michael@0 13 }
michael@0 14
michael@0 15 importScripts(importSubURL);
michael@0 16 var worker = new Worker("relativeLoad_sub_worker2.js");
michael@0 17 worker.onerror = function(event) {
michael@0 18 throw event.data;
michael@0 19 };
michael@0 20 worker.onmessage = function(event) {
michael@0 21 if (event.data != workerSubURL) {
michael@0 22 throw "Bad data!";
michael@0 23 }
michael@0 24 postMessage(workerSubURL);
michael@0 25 };
michael@0 26 };

mercurial