Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
michael@0 | 1 | <!doctype html> |
michael@0 | 2 | <!-- |
michael@0 | 3 | https://bugzilla.mozilla.org/show_bug.cgi?id=599983 |
michael@0 | 4 | --> |
michael@0 | 5 | <title>Test for Bug 599983</title> |
michael@0 | 6 | <script src="/tests/SimpleTest/SimpleTest.js"></script> |
michael@0 | 7 | <link rel="stylesheet" href="/tests/SimpleTest/test.css"> |
michael@0 | 8 | <script src="/tests/SimpleTest/EventUtils.js"></script> |
michael@0 | 9 | <a target="_blank" href="https://bugzilla.mozilla.org/show_bug.cgi?id=599983">Mozilla Bug 599983</a> |
michael@0 | 10 | <div contenteditable>foo</div> |
michael@0 | 11 | <script> |
michael@0 | 12 | getSelection().selectAllChildren(document.querySelector("div")); |
michael@0 | 13 | document.execCommand("bold"); |
michael@0 | 14 | is(document.querySelector("[_moz_dirty]"), null, |
michael@0 | 15 | "No _moz_dirty allowed in webpages"); |
michael@0 | 16 | </script> |