Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 <html xmlns="http://www.w3.org/1999/xhtml">
2 <head>
3 <title>localStorage equal origins</title>
5 <script src="/resources/testharness.js"></script>
6 <script src="/resources/testharnessreport.js"></script>
7 <script src="interOriginTest2.js"></script>
9 <!--
10 This test loads two frames from equal
11 origins and checks that entries of localStorage
12 objects are kept up-to-date and synchronized
13 between both frames.
15 The subsystem is based on postMessage and addEventListener
16 to send messages among different origins. The subsystem waits
17 for both frames be loaded and then alternately calls each frames'
18 doStep() function that on each call proceeds with a single step
19 of the test on its side. This way the subsystem alternate between
20 both frames until both sequences completely finish.
21 -->
23 <script type="text/javascript">
25 function startTest()
26 {
27 masterFrameOrigin = "http://example.org:80";
28 slaveFrameOrigin = "http://example.org:80";
30 masterFrame.location = masterFrameOrigin + framePath + "frameMasterEqual.html";
31 slaveFrame.location = slaveFrameOrigin + framePath + "frameSlaveEqual.html";
32 }
34 </script>
36 </head>
38 <body onload="startTest();">
39 <iframe src="" name="masterFrame"></iframe>
40 <iframe src="" name="slaveFrame"></iframe>
41 </body>
42 </html>