content/base/test/responseIdentical.sjs

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

michael@0 1 const CC = Components.Constructor;
michael@0 2 const BinaryInputStream = CC("@mozilla.org/binaryinputstream;1",
michael@0 3 "nsIBinaryInputStream",
michael@0 4 "setInputStream");
michael@0 5
michael@0 6 // Simply sending back the same data that is received
michael@0 7 function handleRequest(request, response)
michael@0 8 {
michael@0 9 var body = "";
michael@0 10 var bodyStream = new BinaryInputStream(request.bodyInputStream);
michael@0 11 var bytes = [], avail = 0;
michael@0 12 while ((avail = bodyStream.available()) > 0)
michael@0 13 body += String.fromCharCode.apply(String, bodyStream.readByteArray(avail));
michael@0 14
michael@0 15 response.setHeader("Content-Type", "application/octet-stream", false);
michael@0 16 response.write(body);
michael@0 17 }

mercurial