Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 <!DOCTYPE HTML>
2 <html>
3 <head>
4 <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css"/>
5 <script type="application/javascript" src="/tests/SimpleTest/SimpleTest.js"></script>
6 <script type="application/javascript" src="head.js"></script>
7 <script type="application/javascript" src="mediaStreamPlayback.js"></script>
8 <script type="application/javascript" src="pc.js"></script>
9 <script type="application/javascript" src="templates.js"></script>
10 </head>
11 <body>
12 <pre id="test">
13 <script type="application/javascript">
14 createHTML({
15 bug: "784519",
16 title: "setLocalDescription (answer) in 'stable'"
17 });
19 var test;
20 runTest(function () {
21 test = new PeerConnectionTest();
22 test.setMediaConstraints([{audio: true}], [{audio: true}]);
23 test.chain.removeAfter("PC_LOCAL_CREATE_OFFER");
25 test.chain.append([[
26 "PC_LOCAL_SET_LOCAL_ANSWER",
27 function (test) {
28 test.pcLocal._last_offer.type="answer";
29 test.pcLocal.setLocalDescriptionAndFail(test.pcLocal._last_offer,
30 function(err) {
31 is(err.name, "INVALID_STATE", "Error is INVALID_STATE");
32 test.next();
33 } );
34 }
35 ]]);
37 test.run();
38 });
39 </script>
40 </pre>
41 </body>
42 </html>