Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 <!DOCTYPE HTML>
2 <html>
3 <!--
4 https://bugzilla.mozilla.org/show_bug.cgi?id=351633
5 -->
6 <head>
7 <title>Test for Bug 351633</title>
8 <script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script>
9 <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" />
10 </head>
11 <body>
12 <a target="_blank" href="https://bugzilla.mozilla.org/show_bug.cgi?id=351633">Mozilla Bug 351633</a>
13 <pre id="test">
14 <script class="testbody" type="text/javascript">
16 /** Test for Bug 351633 **/
17 var passJSUrl1 = false;
18 var passJSUrl2 = false;
19 var passJSUrl3 = false;
20 var passJSUrl4 = false;
22 SimpleTest.waitForExplicitFinish();
24 addLoadEvent(function() {
25 is(passJSUrl1, true, "Should have stopped load before getting here");
26 is(passJSUrl2, true, "Should not have stopped load where we didn't set " +
27 "location");
28 is(passJSUrl3, true, "Should not have stopped load where javascript: URI " +
29 "didn't return text");
30 is(passJSUrl4, true, "Should not have stopped load where javascript: URI " +
31 "wasn't set on the document itself");
32 SimpleTest.finish();
33 });
34 </script>
35 </pre>
36 <p id="display">
37 <iframe src="load-stopping-1a.html"></iframe>
38 <iframe src="load-stopping-1b.html"></iframe>
39 <iframe src="load-stopping-1c.html"></iframe>
40 <iframe src="load-stopping-1d.html"></iframe>
41 </p>
42 <div id="content" style="display: none">
44 </div>
45 </body>
46 </html>