Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 <?xml version="1.0"?>
2 <?xml-stylesheet type="text/css" href="chrome://global/skin"?>
3 <?xml-stylesheet type="text/css" href="chrome://mochikit/content/tests/SimpleTest/test.css"?>
4 <!--
5 https://bugzilla.mozilla.org/show_bug.cgi?id=853571
6 -->
7 <window title="Mozilla Bug 853571"
8 xmlns="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul">
9 <script type="application/javascript" src="chrome://mochikit/content/tests/SimpleTest/SimpleTest.js"/>
11 <!-- test results are displayed in the html:body -->
12 <body xmlns="http://www.w3.org/1999/xhtml">
13 <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=853571"
14 target="_blank">Mozilla Bug 853571</a>
15 </body>
17 <!-- test code goes here -->
18 <script type="application/javascript">
19 <![CDATA[
20 /** Test for Bug 853571 **/
21 SimpleTest.waitForExplicitFinish();
22 const Cu = Components.utils;
24 function mainTest() {
25 var iwin = $('ifr').contentWindow;
27 // Test with a simple sandbox with no prototype.
28 checkSource(iwin, new Cu.Sandbox(iwin), null, "should get null source with no sandboxPrototype");
29 yield;
31 // Test with a sandboxPrototype.
32 checkSource(iwin, new Cu.Sandbox(iwin, { sandboxPrototype: iwin }), iwin, "should be able to impersonate the prototype");
33 yield;
35 SimpleTest.finish();
36 }
38 let gen = mainTest();
40 function checkSource(target, sb, expectedSource, message) {
41 target.addEventListener("message", function listener(event) {
42 target.removeEventListener("message", listener);
43 is(event.source, expectedSource, message);
44 gen.next();
45 });
47 sb.target = target;
48 Cu.evalInSandbox("target.postMessage('foo', '*');", sb);
49 }
52 ]]>
53 </script>
54 <iframe id="ifr" type="content" onload="gen.next();" src="http://example.org/tests/js/xpconnect/tests/mochitest/file_empty.html" />
55 </window>