Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 <!doctype html>
2 <!--
3 https://bugzilla.mozilla.org/show_bug.cgi?id=719544
4 -->
5 <title>Test for Bug 719544</title>
6 <script src="/tests/SimpleTest/SimpleTest.js"></script>
7 <link rel="stylesheet" href="/tests/SimpleTest/test.css"/>
8 <a target="_blank" href="https://bugzilla.mozilla.org/show_bug.cgi?id=719544">Mozilla Bug 719544</a>
9 <script>
11 /** Test for Bug 719544 **/
12 var threw = false;
13 var origLength = document.childNodes.length;
14 try {
15 var range = document.createRange();
16 range.selectNodeContents(document);
17 range.extractContents();
18 } catch(e) {
19 threw = true;
20 is(Object.getPrototypeOf(e), DOMException.prototype,
21 "Must throw DOMException");
22 is(e.name, "HierarchyRequestError", "Must throw HierarchyRequestError");
23 }
24 ok(threw, "Must throw");
25 is(document.childNodes.length, origLength, "Must preserve original children");
27 </script>