Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 [DEFAULT]
2 skip-if = buildapp == 'b2g' || e10s
3 support-files =
4 audio.ogg
5 bug364677-data.xml
6 bug364677-data.xml^headers^
7 bug395533-data.txt
8 contextmenu_common.js
9 ctxmenu-image.png
10 feed_discovery.html
11 gZipOfflineChild.cacheManifest
12 gZipOfflineChild.cacheManifest^headers^
13 gZipOfflineChild.html
14 gZipOfflineChild.html^headers^
15 head_plain.js
16 offlineByDefault.js
17 offlineChild.cacheManifest
18 offlineChild.cacheManifest^headers^
19 offlineChild.html
20 offlineChild2.cacheManifest
21 offlineChild2.cacheManifest^headers^
22 offlineChild2.html
23 offlineEvent.cacheManifest
24 offlineEvent.cacheManifest^headers^
25 offlineEvent.html
26 privateBrowsingMode.js
27 subtst_contextmenu.html
28 video.ogg
30 [test_bug364677.html]
31 [test_bug395533.html]
32 [test_contextmenu.html]
33 skip-if = toolkit == "gtk2" || toolkit == "gtk3" # disabled on Linux due to bug 513558
34 [test_contextmenu_input.html]
35 skip-if = toolkit == "gtk2" || toolkit == "gtk3" # disabled on Linux due to bug 513558
36 [test_feed_discovery.html]
37 [test_offlineNotification.html]
38 [test_offline_gzip.html]