| OLD | NEW |
| 1 | 1 |
| 2 <p>This test checks cross-frame access security of window attribute setters (rda
r://problem/5326791).</p> | 2 <p>This test checks cross-frame access security of window attribute setters (rda
r://problem/5326791).</p> |
| 3 <iframe src="http://localhost:8000/security/resources/cross-frame-iframe-for-put
-test.html" style=""></iframe> | 3 <iframe src="http://localhost:8000/security/resources/cross-frame-iframe-for-put
-test.html" style=""></iframe> |
| 4 <pre id="console"></pre> | 4 <pre id="console"></pre> |
| 5 <script> | 5 <script> |
| 6 function log(s) | 6 function log(s) |
| 7 { | 7 { |
| 8 document.getElementById("console").appendChild(document.createTextNode(s + "
\n")); | 8 document.getElementById("console").appendChild(document.createTextNode(s + "
\n")); |
| 9 } | 9 } |
| 10 | 10 |
| (...skipping 83 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 94 setForbiddenProperty(targetWindow, "HTMLTableColElement"); | 94 setForbiddenProperty(targetWindow, "HTMLTableColElement"); |
| 95 setForbiddenProperty(targetWindow, "HTMLTableElement"); | 95 setForbiddenProperty(targetWindow, "HTMLTableElement"); |
| 96 setForbiddenProperty(targetWindow, "HTMLTableRowElement"); | 96 setForbiddenProperty(targetWindow, "HTMLTableRowElement"); |
| 97 setForbiddenProperty(targetWindow, "HTMLTableSectionElement"); | 97 setForbiddenProperty(targetWindow, "HTMLTableSectionElement"); |
| 98 setForbiddenProperty(targetWindow, "HTMLTextAreaElement"); | 98 setForbiddenProperty(targetWindow, "HTMLTextAreaElement"); |
| 99 setForbiddenProperty(targetWindow, "HTMLTitleElement"); | 99 setForbiddenProperty(targetWindow, "HTMLTitleElement"); |
| 100 setForbiddenProperty(targetWindow, "HTMLUListElement"); | 100 setForbiddenProperty(targetWindow, "HTMLUListElement"); |
| 101 setForbiddenProperty(targetWindow, "MutationEvent"); | 101 setForbiddenProperty(targetWindow, "MutationEvent"); |
| 102 setForbiddenProperty(targetWindow, "Node"); | 102 setForbiddenProperty(targetWindow, "Node"); |
| 103 setForbiddenProperty(targetWindow, "NodeFilter"); | 103 setForbiddenProperty(targetWindow, "NodeFilter"); |
| 104 setForbiddenProperty(targetWindow, "Notation"); | |
| 105 setForbiddenProperty(targetWindow, "ProcessingInstruction"); | 104 setForbiddenProperty(targetWindow, "ProcessingInstruction"); |
| 106 setForbiddenProperty(targetWindow, "Range"); | 105 setForbiddenProperty(targetWindow, "Range"); |
| 107 setForbiddenProperty(targetWindow, "RangeError"); | 106 setForbiddenProperty(targetWindow, "RangeError"); |
| 108 setForbiddenProperty(targetWindow, "ReferenceError"); | 107 setForbiddenProperty(targetWindow, "ReferenceError"); |
| 109 setForbiddenProperty(targetWindow, "SyntaxError"); | 108 setForbiddenProperty(targetWindow, "SyntaxError"); |
| 110 setForbiddenProperty(targetWindow, "Text"); | 109 setForbiddenProperty(targetWindow, "Text"); |
| 111 setForbiddenProperty(targetWindow, "TypeError"); | 110 setForbiddenProperty(targetWindow, "TypeError"); |
| 112 setForbiddenProperty(targetWindow, "URIError"); | 111 setForbiddenProperty(targetWindow, "URIError"); |
| 113 setForbiddenProperty(targetWindow, "XMLDocument"); | 112 setForbiddenProperty(targetWindow, "XMLDocument"); |
| 114 setForbiddenProperty(targetWindow, "XMLSerializer"); | 113 setForbiddenProperty(targetWindow, "XMLSerializer"); |
| (...skipping 115 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 230 // log(targetWindow.focus.__proto__); | 229 // log(targetWindow.focus.__proto__); |
| 231 log("MAIN WINDOW: !!-- Test ended--!!"); | 230 log("MAIN WINDOW: !!-- Test ended--!!"); |
| 232 | 231 |
| 233 window.stop(); | 232 window.stop(); |
| 234 | 233 |
| 235 if (window.testRunner) | 234 if (window.testRunner) |
| 236 testRunner.notifyDone(); | 235 testRunner.notifyDone(); |
| 237 }, 1); | 236 }, 1); |
| 238 } | 237 } |
| 239 </script> | 238 </script> |
| OLD | NEW |