tor-browser

The Tor Browser
git clone https://git.dasho.dev/tor-browser.git
Log | Files | Refs | README | LICENSE

security.pattern.cross.cross.html (1493B)


      1 <!DOCTYPE html>
      2 <!-- DO NOT EDIT! This test has been generated by /html/canvas/tools/gentest.py. -->
      3 <title>Canvas test: security.pattern.cross.cross</title>
      4 <script src="/resources/testharness.js"></script>
      5 <script src="/resources/testharnessreport.js"></script>
      6 <script src="/html/canvas/resources/canvas-tests.js"></script>
      7 <link rel="stylesheet" href="/html/canvas/resources/canvas-tests.css">
      8 <body class="show_output">
      9 
     10 <h1>security.pattern.cross.cross</h1>
     11 <p class="desc">Using an unclean pattern makes the target canvas origin-unclean, not the pattern canvas</p>
     12 
     13 
     14 <p class="output">Actual output:</p>
     15 <canvas id="c" class="output" width="100" height="50"><p class="fallback">FAIL (fallback content)</p></canvas>
     16 
     17 <ul id="d"></ul>
     18 <script>
     19 var t = async_test("Using an unclean pattern makes the target canvas origin-unclean, not the pattern canvas");
     20 _addTest(function(canvas, ctx) {
     21 
     22 var canvas2 = document.createElement('canvas');
     23 canvas2.width = 100;
     24 canvas2.height = 50;
     25 var ctx2 = canvas2.getContext('2d');
     26 var p = ctx2.createPattern(document.getElementById('yellow.png'), 'repeat');
     27 ctx.fillStyle = p;
     28 ctx.fillRect(0, 0, 100, 50);
     29 assert_throws_dom("SECURITY_ERR", function() { canvas.toDataURL(); });
     30 assert_throws_dom("SECURITY_ERR", function() { ctx.getImageData(0, 0, 1, 1); });
     31 canvas2.toDataURL();
     32 ctx2.getImageData(0, 0, 1, 1);
     33 
     34 
     35 });
     36 </script>
     37 <script src="/common/get-host-info.sub.js"></script>
     38 <script src="data:text/javascript,addCrossOriginYellowImage()"></script>