Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 import WebIDL
3 def WebIDLTest(parser, harness):
4 # Check that error messages put the '^' in the right place.
6 threw = False
7 input = 'interface ?'
8 try:
9 parser.parse(input)
10 results = parser.finish()
11 except WebIDL.WebIDLError, e:
12 threw = True
13 lines = str(e).split('\n')
15 harness.check(len(lines), 3, 'Expected number of lines in error message')
16 harness.check(lines[1], input, 'Second line shows error')
17 harness.check(lines[2], ' ' * (len(input) - 1) + '^',
18 'Correct column pointer in error message')
20 harness.ok(threw, "Should have thrown.")