Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 <body>
2 <iframe src="about:blank" id="ifr"></iframe>
3 <script>
4 /** Test for Bug 629331 **/
5 function finish() {
6 parent.postMessage(JSON.stringify({fun: "finish"}), "*");
7 }
9 function is(a, b, description) {
10 parent.postMessage(JSON.stringify({ fun: "is", a: a, b: b, description: description }), "*");
11 }
13 document.domain = "example.org";
14 var i = 0;
15 is(i, 0, 'i meets starting conditions');
16 document.getElementById('ifr').src = 'http://test2.example.org/tests/js/xpconnect/tests/mochitest/test2_bug629331.html';
17 </script>