js/xpconnect/tests/mochitest/file_expandosharing.html

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 <!DOCTYPE html>
     2 <html>
     3 <head>
     4 <script type="application/javascript">
     5   function setup() {
     6     // Set up different target objects for expandos, one for each binding type.
     7     window.targetWN = window;
     8     window.targetDOM = new XMLHttpRequest();
     9     window.targetJS = new Date();
    10   }
    12   function placeExpando(name, val, target) {
    13     target[name] = val;
    14   }
    16   // If val === null, then we shouldn't have access.
    17   function checkExpando(name, val, target, msg) {
    18     if (val !== null) {
    19       ok(name in target, msg);
    20       try {
    21         is(target[name], val, "Got the right expando value");
    22       } catch(e) { ok(false, "Threw when accessing same-origin expando"); }
    23     }
    24     else {
    25       ok(!(name in target), msg);
    26     }
    27   }
    29 </script>
    30 </head>
    31 <body onload="setup();">
    32     <span>Salut, Ma Cherise. ;-)</span>
    33 </body>
    34 </html>

mercurial