Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 <html xmlns="http://www.w3.org/1999/xhtml">
2 <head>
3 <title>storage event propagation test</title>
5 <script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script>
6 <script type="text/javascript" src="interOriginTest2.js"></script>
7 <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" />
9 <!--
10 This test loads two frames from different
11 origins and checks that entries of localStorage
12 objects don't leak each between other.
14 The subsystem is based on postMessage and addEventListener
15 to send messages among different origins. The subsystem waits
16 for both frames be loaded and then alternately calls each frames'
17 doStep() function that on each call proceeds with a single step
18 of the test on its side. This way the subsystem alternate between
19 both frames until both sequences completely finish.
20 -->
22 <script type="text/javascript">
24 var slaveFrame = null;
26 function startTest()
27 {
28 masterFrameOrigin = "http://example.org:80";
29 slaveFrameOrigin = "http://example.com:80";
31 masterFrame.location = masterFrameOrigin + framePath + "frameSessionStorageMasterNotEqual.html";
32 }
34 SimpleTest.waitForExplicitFinish();
36 </script>
38 </head>
40 <body onload="startTest();">
41 <iframe src="" name="masterFrame"></iframe>
42 </body>
43 </html>