Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 <?xml version="1.0"?>
2 <?xml-stylesheet href="chrome://global/skin" type="text/css"?>
3 <?xml-stylesheet href="chrome://mochikit/content/tests/SimpleTest/test.css"
4 type="text/css"?>
5 <window title="Test CPOWs"
6 xmlns="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul">
7 <script type="application/javascript"
8 src="chrome://mochikit/content/tests/SimpleTest/SimpleTest.js"></script>
10 <!-- test results are displayed in the html:body -->
11 <body xmlns="http://www.w3.org/1999/xhtml">
12 </body>
14 <!-- test code goes here -->
15 <script type="application/javascript"><![CDATA[
17 SimpleTest.waitForExplicitFinish();
19 function done() {
20 SimpleTest.finish();
21 }
23 addLoadEvent(function() {
24 // We don't want to set browser.tabs.remote to true, but still have CPOWs enabled.
25 SpecialPowers.pushPrefEnv({"set": [["dom.ipc.cpows.force-enabled", true]]}, function() {
26 window.open("cpows_parent.xul", "", "chrome");
27 });
28 });
29 ]]></script>
30 </window>