Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
michael@0 | 1 | /* Any copyright is dedicated to the Public Domain. |
michael@0 | 2 | http://creativecommons.org/publicdomain/zero/1.0/ */ |
michael@0 | 3 | |
michael@0 | 4 | |
michael@0 | 5 | // Test nsISessionStartup.sessionType in the following scenario: |
michael@0 | 6 | // - no sessionstore.js; |
michael@0 | 7 | // - the session store has been loaded, so no need to go |
michael@0 | 8 | // through the synchronous fallback |
michael@0 | 9 | |
michael@0 | 10 | function run_test() { |
michael@0 | 11 | do_get_profile(); |
michael@0 | 12 | // Initialize the profile (the session startup uses it) |
michael@0 | 13 | |
michael@0 | 14 | do_test_pending(); |
michael@0 | 15 | let startup = Cc["@mozilla.org/browser/sessionstartup;1"]. |
michael@0 | 16 | getService(Ci.nsISessionStartup); |
michael@0 | 17 | |
michael@0 | 18 | afterSessionStartupInitialization(function cb() { |
michael@0 | 19 | do_check_eq(startup.sessionType, Ci.nsISessionStartup.NO_SESSION); |
michael@0 | 20 | do_test_finished(); |
michael@0 | 21 | }); |
michael@0 | 22 | } |