Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 [DEFAULT]
2 skip-if = e10s
3 support-files =
4 /.well-known/idp-proxy/idp.html
5 /.well-known/idp-proxy/idp-proxy.js
6 identityevent.js
8 # All tests are disabled on android due to lack of https support in mochitest
9 # (Bug 975149)
10 # All tests are disabled on b2g due to lack of e10s support in WebRTC identity
11 # (Bug 975144)
12 [test_idpproxy.html]
13 skip-if = os == "android" || appname == "b2g"
14 [test_getIdentityAssertion.html]
15 skip-if = os == "android" || appname == "b2g"
16 [test_setIdentityProvider.html]
17 skip-if = os == "android" || appname == "b2g"
18 [test_setIdentityProviderWithErrors.html]
19 skip-if = os == "android" || appname == "b2g"
20 [../mochitest/test_zmedia_cleanup.html]
21 skip-if = os == "android" || appname == "b2g"