mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-11-06 17:16:12 +00:00
94e67e3d45
The current tests never actually check that script is disabled for unsafe JAR channels, but only that they're unable to initiate loads. This fixes that. This blob runs dos2unix on the files inside the zip, and applies the following patch to iframes.html: <html><head> <title>iframes</title> + <script>parent.poke('regular script');</script> </head> -<body> +<body onload="parent.poke('onload-handler')"> subshells <p> <iframe id="data-iframe" src="data:text/html,dataurl iframe<script>window.parent.parent.poke('data-iframe')</script>">ifr</iframe> <p> <iframe id="js-iframe" src="javascript:window.parent.parent.poke('js-iframe')">jsifr</iframe> </body> -</html> \ No newline at end of file +</html>
1000 B
1000 B