docshell/test/unit/test_bug414201_jfif.js

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 /* This Source Code Form is subject to the terms of the Mozilla Public
     2  * License, v. 2.0. If a copy of the MPL was not distributed with this
     3  * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
     5 /*
     6  * Test for bug 414201
     7  */
     9 function run_test()
    10 {
    11     var ms = Components.classes["@mozilla.org/mime;1"].getService(Components.interfaces.nsIMIMEService);
    13     /* Test a few common image types to make sure that they get the right extension */
    14     var types = {
    15         "image/jpeg": ["jpg", "jpeg"], /* accept either */
    16         "image/gif": ["gif"],
    17         "image/png": ["png"]
    18     };
    20     /* Check whether the primary extension is what we'd expect */
    21     for (var mimetype in types) {
    22         var exts = types[mimetype];
    23         var primary = ms.getFromTypeAndExtension(mimetype, null).primaryExtension.toLowerCase();
    25         do_check_true (exts.indexOf(primary) != -1);
    26     }
    27 }

mercurial