OLD | NEW |
1 | 1 |
2 <p>This test checks cross-frame access security of window attribute setters (rda
r://problem/5326791).</p> | 2 <p>This test checks cross-frame access security of window attribute setters (rda
r://problem/5326791).</p> |
3 <iframe src="http://localhost:8000/security/resources/cross-frame-iframe-for-put
-test.html" style=""></iframe> | 3 <iframe src="http://localhost:8000/security/resources/cross-frame-iframe-for-put
-test.html" style=""></iframe> |
4 <pre id="console"></pre> | 4 <pre id="console"></pre> |
5 <script> | 5 <script> |
6 function log(s) | 6 function log(s) |
7 { | 7 { |
8 document.getElementById("console").appendChild(document.createTextNode(s + "
\n")); | 8 document.getElementById("console").appendChild(document.createTextNode(s + "
\n")); |
9 } | 9 } |
10 | 10 |
(...skipping 89 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
100 setForbiddenProperty(targetWindow, "HTMLTextAreaElement"); | 100 setForbiddenProperty(targetWindow, "HTMLTextAreaElement"); |
101 setForbiddenProperty(targetWindow, "HTMLTitleElement"); | 101 setForbiddenProperty(targetWindow, "HTMLTitleElement"); |
102 setForbiddenProperty(targetWindow, "HTMLUListElement"); | 102 setForbiddenProperty(targetWindow, "HTMLUListElement"); |
103 setForbiddenProperty(targetWindow, "MutationEvent"); | 103 setForbiddenProperty(targetWindow, "MutationEvent"); |
104 setForbiddenProperty(targetWindow, "Node"); | 104 setForbiddenProperty(targetWindow, "Node"); |
105 setForbiddenProperty(targetWindow, "NodeFilter"); | 105 setForbiddenProperty(targetWindow, "NodeFilter"); |
106 setForbiddenProperty(targetWindow, "Notation"); | 106 setForbiddenProperty(targetWindow, "Notation"); |
107 setForbiddenProperty(targetWindow, "ProcessingInstruction"); | 107 setForbiddenProperty(targetWindow, "ProcessingInstruction"); |
108 setForbiddenProperty(targetWindow, "Range"); | 108 setForbiddenProperty(targetWindow, "Range"); |
109 setForbiddenProperty(targetWindow, "RangeError"); | 109 setForbiddenProperty(targetWindow, "RangeError"); |
110 setForbiddenProperty(targetWindow, "RangeException"); | |
111 setForbiddenProperty(targetWindow, "ReferenceError"); | 110 setForbiddenProperty(targetWindow, "ReferenceError"); |
112 setForbiddenProperty(targetWindow, "SyntaxError"); | 111 setForbiddenProperty(targetWindow, "SyntaxError"); |
113 setForbiddenProperty(targetWindow, "Text"); | 112 setForbiddenProperty(targetWindow, "Text"); |
114 setForbiddenProperty(targetWindow, "TypeError"); | 113 setForbiddenProperty(targetWindow, "TypeError"); |
115 setForbiddenProperty(targetWindow, "URIError"); | 114 setForbiddenProperty(targetWindow, "URIError"); |
116 setForbiddenProperty(targetWindow, "XMLDocument"); | 115 setForbiddenProperty(targetWindow, "XMLDocument"); |
117 setForbiddenProperty(targetWindow, "XMLSerializer"); | 116 setForbiddenProperty(targetWindow, "XMLSerializer"); |
118 setForbiddenProperty(targetWindow, "XPathEvaluator"); | 117 setForbiddenProperty(targetWindow, "XPathEvaluator"); |
119 setForbiddenProperty(targetWindow, "XPathResult"); | 118 setForbiddenProperty(targetWindow, "XPathResult"); |
120 | 119 |
(...skipping 112 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
233 // log(targetWindow.focus.__proto__); | 232 // log(targetWindow.focus.__proto__); |
234 log("MAIN WINDOW: !!-- Test ended--!!"); | 233 log("MAIN WINDOW: !!-- Test ended--!!"); |
235 | 234 |
236 window.stop(); | 235 window.stop(); |
237 | 236 |
238 if (window.testRunner) | 237 if (window.testRunner) |
239 testRunner.notifyDone(); | 238 testRunner.notifyDone(); |
240 }, 1); | 239 }, 1); |
241 } | 240 } |
242 </script> | 241 </script> |
OLD | NEW |