dom/base/test/iframe_messageChannel_cloning.html

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 <!DOCTYPE HTML>
     2 <html>
     3 <body>
     4   <script type="application/javascript">
     6   function ok(a, msg) {
     7     window.parent.postMessage({ status: a ? "OK" : "KO", message: msg }, "*");
     8   }
    10   window.addEventListener('message', receiveMessage, false);
    11   function receiveMessage(evt) {
    12     ok (evt.data, "Data received");
    13     ok (evt.data.port instanceof MessagePort, "Data contains a MessagePort");
    15     var a = new MessageChannel();
    16     window.parent.postMessage({ status: "FINISH", port: a.port2 }, '*', [a.port2]);
    17   }
    19   </script>
    20 </body>
    21 </html>

mercurial