browser/base/content/test/general/offlineChild2.html

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 <html manifest="offlineChild2.cacheManifest">
     2 <head>
     3 <title></title>
     4 <script type="text/javascript">
     6 function finish(success) {
     7   window.parent.postMessage(success ? "success" : "failure", "*");
     8 }
    10 applicationCache.oncached = function() { finish(true); }
    11 applicationCache.onnoupdate = function() { finish(true); }
    12 applicationCache.onerror = function() { finish(false); }
    14 </script>
    15 </head>
    17 <body>
    18 <h1>Child</h1>
    19 </body>
    20 </html>

mercurial