Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 <html>
2 <!--
3 https://bugzilla.mozilla.org/show_bug.cgi?id=357509
4 -->
5 <head>
6 <script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script>
7 <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" />
8 <script>
9 function foo(elem) {
10 rng = document.createRange();
11 rng.setStartBefore(elem);
12 }
13 </script>
14 </head>
15 <body>
16 <a target="_blank" href="https://bugzilla.mozilla.org/show_bug.cgi?id=357509">Mozilla Bug 357509</a>
17 <div style="display: none" id="rangetest">
18 </div>
19 <pre id="test">
20 <script type="text/javascript">
21 var passed = false;
22 try {
23 foo(document.getElementById("rangetest"))
24 passed = true;
25 }
26 catch (e) {
27 passed = false;
28 }
30 <!-- The ok() function tests the first arg -->
31 ok(passed, "nsIDOMRange.setStartBefore");
33 </script>
34 </pre>
35 </body>
36 </html>