Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
michael@0 | 1 | /* |
michael@0 | 2 | * Test to ensure that load/decode notifications are delivered completely and |
michael@0 | 3 | * asynchronously when dealing with a file that's a 404. |
michael@0 | 4 | */ |
michael@0 | 5 | Components.utils.import("resource://gre/modules/XPCOMUtils.jsm"); |
michael@0 | 6 | |
michael@0 | 7 | var ioService = Components.classes["@mozilla.org/network/io-service;1"] |
michael@0 | 8 | .getService(Components.interfaces.nsIIOService); |
michael@0 | 9 | |
michael@0 | 10 | XPCOMUtils.defineLazyGetter(this, "uri", function() { |
michael@0 | 11 | return ioService.newURI("http://localhost:" + |
michael@0 | 12 | server.identity.primaryPort + |
michael@0 | 13 | "/async-notification-never-here.jpg", null, null); |
michael@0 | 14 | }); |
michael@0 | 15 | |
michael@0 | 16 | load('async_load_tests.js'); |