Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 <!-- This Source Code Form is subject to the terms of the Mozilla Public
2 - License, v. 2.0. If a copy of the MPL was not distributed with this
3 - file, You can obtain one at http://mozilla.org/MPL/2.0/. -->
5 <!DOCTYPE HTML>
6 <html>
7 <head>
8 <title>STS test iframe</title>
9 <script>
10 var self = window;
11 window.addEventListener("load", function() {
12 self.parent.postMessage("BOOTSTRAP plain", "http://mochi.test:8888");
13 }, false);
14 </script>
15 </head>
16 <body>
17 <!-- This frame should be loaded over HTTPS to set the STS header. -->
18 This frame was loaded using
19 <script>
20 document.write(document.location.protocol);
21 </script>
22 and set the STS header to force this site and allow subdomain upgrading.
23 </body>
24 </html>