Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
michael@0 | 1 | /* Any copyright is dedicated to the Public Domain. |
michael@0 | 2 | http://creativecommons.org/publicdomain/zero/1.0/ */ |
michael@0 | 3 | |
michael@0 | 4 | Components.utils.import("resource://gre/modules/NetUtil.jsm"); |
michael@0 | 5 | |
michael@0 | 6 | function run_test() { |
michael@0 | 7 | var cs = Cc["@mozilla.org/cookieService;1"].getService(Ci.nsICookieService); |
michael@0 | 8 | var cm = Cc["@mozilla.org/cookiemanager;1"].getService(Ci.nsICookieManager2); |
michael@0 | 9 | var expiry = (Date.now() + 1000) * 1000; |
michael@0 | 10 | |
michael@0 | 11 | // Test our handling of host names with a single character at the beginning |
michael@0 | 12 | // followed by a dot. |
michael@0 | 13 | cm.add("e.mail.com", "/", "foo", "bar", false, false, true, expiry); |
michael@0 | 14 | do_check_eq(cm.countCookiesFromHost("e.mail.com"), 1); |
michael@0 | 15 | do_check_eq(cs.getCookieString(NetUtil.newURI("http://e.mail.com"), null), "foo=bar"); |
michael@0 | 16 | } |