Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 <!DOCTYPE html>
2 <script>
3 window.onerror = function(msg, url, line) {
4 var myMsg = JSON.stringify({msg: msg, url: url, line: line, error: true});
5 opener.postMessage(myMsg, "*");
6 }
8 var report = false;
10 function g() {
11 if (report) {
12 opener.postMessage("callbackHappened", "*");
13 }
14 window.mozRequestAnimationFrame(g);
15 }
16 g();
18 window.onload = function() {
19 opener.postMessage("loaded", "*");
20 }
22 addEventListener("pagehide", function f(e) {
23 if (!e.persisted && !report) {
24 opener.postMessage("notcached", "*");
25 }
26 }, false);
28 addEventListener("pageshow", function f(e) {
29 if (e.persisted) {
30 opener.postMessage("revived", "*");
31 }
32 }, false);
34 window.onmessage = function (e) {
35 if (e.data == "report") {
36 report = true;
37 }
38 };
40 </script>