tor-browser

The Tor Browser
git clone https://git.dasho.dev/tor-browser.git
Log | Files | Refs | README | LICENSE

security.pattern.image.fillStyle.cross.html (1333B)


      1 <!DOCTYPE html>
      2 <!-- DO NOT EDIT! This test has been generated by /html/canvas/tools/gentest.py. -->
      3 <title>Canvas test: security.pattern.image.fillStyle.cross</title>
      4 <script src="/resources/testharness.js"></script>
      5 <script src="/resources/testharnessreport.js"></script>
      6 <script src="/html/canvas/resources/canvas-tests.js"></script>
      7 <link rel="stylesheet" href="/html/canvas/resources/canvas-tests.css">
      8 <body class="show_output">
      9 
     10 <h1>security.pattern.image.fillStyle.cross</h1>
     11 <p class="desc">Setting fillStyle to a pattern of a different-origin image makes the canvas origin-unclean</p>
     12 
     13 
     14 <p class="output">Actual output:</p>
     15 <canvas id="c" class="output" width="100" height="50"><p class="fallback">FAIL (fallback content)</p></canvas>
     16 
     17 <ul id="d"></ul>
     18 <script>
     19 var t = async_test("Setting fillStyle to a pattern of a different-origin image makes the canvas origin-unclean");
     20 _addTest(function(canvas, ctx) {
     21 
     22 var p = ctx.createPattern(document.getElementById('yellow.png'), 'repeat');
     23 ctx.fillStyle = p;
     24 ctx.fillStyle = 'red';
     25 assert_throws_dom("SECURITY_ERR", function() { canvas.toDataURL(); });
     26 assert_throws_dom("SECURITY_ERR", function() { ctx.getImageData(0, 0, 1, 1); });
     27 
     28 
     29 });
     30 </script>
     31 <script src="/common/get-host-info.sub.js"></script>
     32 <script src="data:text/javascript,addCrossOriginYellowImage()"></script>