Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 <html xmlns="http://www.w3.org/1999/xhtml">
2 <head>
3 <title>slave for storage event propagation</title>
5 <script type="text/javascript" src="interOriginFrame.js"></script>
6 <script type="text/javascript">
8 var currentStep = 2;
9 var gotEvent = false;
11 window.addEventListener("storage", function(event)
12 {
13 gotEvent = true;
14 }, false);
16 function doStep()
17 {
18 switch (currentStep)
19 {
20 case 10:
21 is(gotEvent, false, "Expected no events");
22 break;
23 }
25 // Increase by two to distinguish each test step order
26 // in both master doStep and slave doStep functions.
27 ++currentStep;
28 ++currentStep;
30 return true;
31 }
33 </script>
35 </head>
37 <body onload="postMsg('frame loaded');">
38 </body>
39 </html>