Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
michael@0 | 1 | /* |
michael@0 | 2 | * Any copyright is dedicated to the Public Domain. |
michael@0 | 3 | * http://creativecommons.org/licenses/publicdomain/ |
michael@0 | 4 | */ |
michael@0 | 5 | |
michael@0 | 6 | //----------------------------------------------------------------------------- |
michael@0 | 7 | var BUGNUMBER = 630770; |
michael@0 | 8 | var summary = |
michael@0 | 9 | 'Correctly warn about duplicate parameters when the strict option is enabled'; |
michael@0 | 10 | |
michael@0 | 11 | print(BUGNUMBER + ": " + summary); |
michael@0 | 12 | |
michael@0 | 13 | /************** |
michael@0 | 14 | * BEGIN TEST * |
michael@0 | 15 | **************/ |
michael@0 | 16 | |
michael@0 | 17 | // Verify that duplicate parameters, with the strict option set, don't provoke |
michael@0 | 18 | // an assertion. Ideally we'd also verify that we warn exactly once per |
michael@0 | 19 | // duplicated parameter name, but at present there's no way to test that |
michael@0 | 20 | // without more effort (further customizing the shell JSErrorReporter) than we |
michael@0 | 21 | // want to make now. |
michael@0 | 22 | options("strict"); |
michael@0 | 23 | eval("function a(x, x, x, x) { }"); |
michael@0 | 24 | |
michael@0 | 25 | /******************************************************************************/ |
michael@0 | 26 | |
michael@0 | 27 | if (typeof reportCompare === "function") |
michael@0 | 28 | reportCompare(true, true); |
michael@0 | 29 | |
michael@0 | 30 | print("All tests passed!"); |