OLD | NEW |
1 | 1 |
2 <p>This test checks cross-frame access security of window attribute setters (rda
r://problem/5326791).</p> | 2 <p>This test checks cross-frame access security of window attribute setters (rda
r://problem/5326791).</p> |
3 <iframe src="http://localhost:8000/security/resources/cross-frame-iframe-for-put
-test.html" style=""></iframe> | 3 <iframe src="http://localhost:8000/security/resources/cross-frame-iframe-for-put
-test.html" style=""></iframe> |
4 <pre id="console"></pre> | 4 <pre id="console"></pre> |
5 <script> | 5 <script> |
6 function log(s) | 6 function log(s) |
7 { | 7 { |
8 document.getElementById("console").appendChild(document.createTextNode(s + "
\n")); | 8 document.getElementById("console").appendChild(document.createTextNode(s + "
\n")); |
9 } | 9 } |
10 | 10 |
(...skipping 83 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
94 setForbiddenProperty(targetWindow, "HTMLTableColElement"); | 94 setForbiddenProperty(targetWindow, "HTMLTableColElement"); |
95 setForbiddenProperty(targetWindow, "HTMLTableElement"); | 95 setForbiddenProperty(targetWindow, "HTMLTableElement"); |
96 setForbiddenProperty(targetWindow, "HTMLTableRowElement"); | 96 setForbiddenProperty(targetWindow, "HTMLTableRowElement"); |
97 setForbiddenProperty(targetWindow, "HTMLTableSectionElement"); | 97 setForbiddenProperty(targetWindow, "HTMLTableSectionElement"); |
98 setForbiddenProperty(targetWindow, "HTMLTextAreaElement"); | 98 setForbiddenProperty(targetWindow, "HTMLTextAreaElement"); |
99 setForbiddenProperty(targetWindow, "HTMLTitleElement"); | 99 setForbiddenProperty(targetWindow, "HTMLTitleElement"); |
100 setForbiddenProperty(targetWindow, "HTMLUListElement"); | 100 setForbiddenProperty(targetWindow, "HTMLUListElement"); |
101 setForbiddenProperty(targetWindow, "MutationEvent"); | 101 setForbiddenProperty(targetWindow, "MutationEvent"); |
102 setForbiddenProperty(targetWindow, "Node"); | 102 setForbiddenProperty(targetWindow, "Node"); |
103 setForbiddenProperty(targetWindow, "NodeFilter"); | 103 setForbiddenProperty(targetWindow, "NodeFilter"); |
104 setForbiddenProperty(targetWindow, "Notation"); | |
105 setForbiddenProperty(targetWindow, "ProcessingInstruction"); | 104 setForbiddenProperty(targetWindow, "ProcessingInstruction"); |
106 setForbiddenProperty(targetWindow, "Range"); | 105 setForbiddenProperty(targetWindow, "Range"); |
107 setForbiddenProperty(targetWindow, "RangeError"); | 106 setForbiddenProperty(targetWindow, "RangeError"); |
108 setForbiddenProperty(targetWindow, "ReferenceError"); | 107 setForbiddenProperty(targetWindow, "ReferenceError"); |
109 setForbiddenProperty(targetWindow, "SyntaxError"); | 108 setForbiddenProperty(targetWindow, "SyntaxError"); |
110 setForbiddenProperty(targetWindow, "Text"); | 109 setForbiddenProperty(targetWindow, "Text"); |
111 setForbiddenProperty(targetWindow, "TypeError"); | 110 setForbiddenProperty(targetWindow, "TypeError"); |
112 setForbiddenProperty(targetWindow, "URIError"); | 111 setForbiddenProperty(targetWindow, "URIError"); |
113 setForbiddenProperty(targetWindow, "XMLDocument"); | 112 setForbiddenProperty(targetWindow, "XMLDocument"); |
114 setForbiddenProperty(targetWindow, "XMLSerializer"); | 113 setForbiddenProperty(targetWindow, "XMLSerializer"); |
(...skipping 115 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
230 // log(targetWindow.focus.__proto__); | 229 // log(targetWindow.focus.__proto__); |
231 log("MAIN WINDOW: !!-- Test ended--!!"); | 230 log("MAIN WINDOW: !!-- Test ended--!!"); |
232 | 231 |
233 window.stop(); | 232 window.stop(); |
234 | 233 |
235 if (window.testRunner) | 234 if (window.testRunner) |
236 testRunner.notifyDone(); | 235 testRunner.notifyDone(); |
237 }, 1); | 236 }, 1); |
238 } | 237 } |
239 </script> | 238 </script> |
OLD | NEW |