Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 <html xmlns="http://www.w3.org/1999/xhtml">
2 <head>
3 <title>Pseudo Web Handler App</title>
4 <script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script>
5 <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" />
6 </head>
7 <body onload="onLoad()">
8 Pseudo Web Handler App
10 <script class="testbody" type="text/javascript">
11 <![CDATA[
12 function onLoad() {
14 // if we have a window.opener, this must be the windowContext
15 // instance of this test. check that we got the URI right and clean up.
16 if (window.opener) {
17 window.opener.is(location.search,
18 "?uri=" + encodeURIComponent(window.opener.testURI),
19 "uri passed to web-handler app");
20 window.opener.SimpleTest.finish();
21 }
23 window.close();
24 }
25 ]]>
26 </script>
28 </body>
29 </html>