layout/base/tests/file_bug607529.html

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 <!DOCTYPE html>
     2 <script>
     3   window.onerror = function(msg, url, line) {
     4     var myMsg = JSON.stringify({msg: msg, url: url, line: line, error: true});
     5     opener.postMessage(myMsg, "*");
     6   }
     8   var report = false;
    10   function g() {
    11     if (report) {
    12       opener.postMessage("callbackHappened", "*");
    13     }
    14     window.mozRequestAnimationFrame(g);
    15   }
    16   g();
    18   window.onload = function() {
    19     opener.postMessage("loaded", "*");
    20   }
    22   addEventListener("pagehide", function f(e) {
    23     if (!e.persisted && !report) {
    24       opener.postMessage("notcached", "*");
    25     }
    26   }, false);
    28   addEventListener("pageshow", function f(e) {
    29     if (e.persisted) {
    30       opener.postMessage("revived", "*");
    31     }
    32   }, false);
    34   window.onmessage = function (e) {
    35     if (e.data == "report") {
    36       report = true;
    37     }
    38   };
    40 </script>

mercurial