Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 <!DOCTYPE HTML>
2 <html class="reftest-wait">
3 <body>
4 <iframe src="data:text/html,<body style='font-size:100px; overflow:hidden; background:white;'><p>Hello<p>Kitty<p>Hello<p>Kitty<p>Hello<p>Kitty<p>Hello<p>Kitty<p>Hello<p>Kitty<p>Hello<p>Kitty"
5 id="f" style="width:500px; height:500px; border-radius:100px; border:none;"></iframe>
6 <script>
7 var f = document.getElementById("f");
8 var count = 0;
9 function doTest() {
10 ++count;
11 f.contentWindow.scrollTo(0, count*20);
12 if (count == 4) {
13 document.documentElement.removeAttribute("class");
14 } else {
15 setTimeout(doTest, 20);
16 }
17 }
18 document.addEventListener("MozReftestInvalidate", doTest, false);
19 </script>
20 </body>
21 </html>