Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
michael@0 | 1 | def WebIDLTest(parser, harness): |
michael@0 | 2 | threw = False |
michael@0 | 3 | try: |
michael@0 | 4 | parser.parse(""" |
michael@0 | 5 | interface OptionalConstraints1 { |
michael@0 | 6 | void foo(optional byte arg1, byte arg2); |
michael@0 | 7 | }; |
michael@0 | 8 | """) |
michael@0 | 9 | |
michael@0 | 10 | results = parser.finish() |
michael@0 | 11 | except: |
michael@0 | 12 | threw = True |
michael@0 | 13 | |
michael@0 | 14 | harness.ok(not threw, |
michael@0 | 15 | "Should not have thrown on non-optional argument following " |
michael@0 | 16 | "optional argument.") |
michael@0 | 17 | |
michael@0 | 18 | parser = parser.reset() |
michael@0 | 19 | parser.parse(""" |
michael@0 | 20 | interface OptionalConstraints2 { |
michael@0 | 21 | void foo(optional byte arg1 = 1, optional byte arg2 = 2, |
michael@0 | 22 | optional byte arg3, optional byte arg4 = 4, |
michael@0 | 23 | optional byte arg5, optional byte arg6 = 9); |
michael@0 | 24 | }; |
michael@0 | 25 | """) |
michael@0 | 26 | results = parser.finish() |
michael@0 | 27 | args = results[0].members[0].signatures()[0][1] |
michael@0 | 28 | harness.check(len(args), 6, "Should have 6 arguments") |
michael@0 | 29 | harness.check(args[5].defaultValue.value, 9, |
michael@0 | 30 | "Should have correct default value") |