Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 <?xml version="1.0"?>
2 <?xml-stylesheet href="chrome://global/skin" type="text/css"?>
3 <?xml-stylesheet href="chrome://mochikit/content/tests/SimpleTest/test.css"
4 type="text/css"?>
5 <!--
6 https://bugzilla.mozilla.org/show_bug.cgi?id=430050
7 -->
8 <window title="Mozilla Bug 430050"
9 xmlns="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul">
10 <script type="application/javascript"
11 src="chrome://mochikit/content/tests/SimpleTest/SimpleTest.js"></script>
13 <!-- test results are displayed in the html:body -->
14 <body xmlns="http://www.w3.org/1999/xhtml">
15 <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=430050"
16 target="_blank">Mozilla Bug 430050</a>
17 </body>
19 <!-- test code goes here -->
20 <script type="application/javascript"><![CDATA[
22 /** Test for Bug 430050 **/
24 function endTest() {
25 ok(document.getElementById('b').contentDocument.documentElement.textContent ==
26 "succeeded", "Wrong URL loaded!");
27 SimpleTest.finish();
28 }
30 function startTest() {
31 document.documentElement.addEventListener('DOMAttrModified',
32 function(evt) {
33 if (evt.target == evt.currentTarget) {
34 document.getElementById('b').setAttribute("src",
35 "data:text/plain,failed");
36 document.getElementById('b').loadURI('data:text/plain,succeeded',
37 null,
38 'UTF-8');
39 document.getElementById('b').addEventListener("load", endTest);
40 }
41 }, true);
42 document.documentElement.setAttribute("foo", "bar");
43 }
45 SimpleTest.waitForExplicitFinish();
46 addLoadEvent(startTest);
48 ]]></script>
49 <browser flex="1" id="b"/>
50 </window>