dom/tests/mochitest/sessionstorage/file_http.html

Tue, 06 Jan 2015 21:39:09 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Tue, 06 Jan 2015 21:39:09 +0100
branch
TOR_BUG_9701
changeset 8
97036ab72558
permissions
-rw-r--r--

Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.

michael@0 1 <html>
michael@0 2 <head>
michael@0 3 <script>
michael@0 4
michael@0 5 window.addEventListener("message", onMessageReceived, false);
michael@0 6
michael@0 7 function postMsg(msg)
michael@0 8 {
michael@0 9 parent.postMessage(msg, "http://mochi.test:8888");
michael@0 10 }
michael@0 11
michael@0 12 function onMessageReceived(event)
michael@0 13 {
michael@0 14 if (event.data == "check") {
michael@0 15 postMsg(sessionStorage.getItem("foo"));
michael@0 16
michael@0 17 var gotValue = "threw";
michael@0 18 try {
michael@0 19 gotValue = sessionStorage.getItem("foo-https");
michael@0 20 } catch (e) {
michael@0 21 }
michael@0 22
michael@0 23 postMsg(gotValue);
michael@0 24
michael@0 25 postMsg("the end");
michael@0 26 }
michael@0 27 }
michael@0 28
michael@0 29 function start()
michael@0 30 {
michael@0 31 sessionStorage.setItem("foo", "insecure");
michael@0 32 postMsg(sessionStorage.getItem("foo"));
michael@0 33 }
michael@0 34
michael@0 35 </script>
michael@0 36 </head>
michael@0 37 <body onload="start();">
michael@0 38 insecure
michael@0 39 </body>
michael@0 40 </html>

mercurial