Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 /* Any copyright is dedicated to the Public Domain.
2 * http://creativecommons.org/publicdomain/zero/1.0/ */
4 MARIONETTE_TIMEOUT = 60000;
5 MARIONETTE_HEAD_JS = 'head.js';
7 const kPrefRilRadioDisabled = "ril.radio.disabled";
9 function testSendFailed(aCause, aServiceId) {
10 log("testSendFailed, aCause: " + aCause + ", aServiceId: " + aServiceId);
11 let sendParameters;
13 if (aServiceId) {
14 sendParameters = { serviceId: aServiceId };
15 }
17 let mmsParameters = { subject: "Test",
18 receivers: ["+0987654321"],
19 attachments: [] };
21 return sendMmsWithFailure(mmsParameters, sendParameters)
22 .then((result) => {
23 is(result.error.name, aCause, "Checking failure cause.");
24 });
25 }
27 startTestCommon(function testCaseMain() {
28 return Promise.resolve()
29 .then(() => {
30 SpecialPowers.setBoolPref(kPrefRilRadioDisabled, true);
31 })
32 .then(() => testSendFailed("RadioDisabledError"))
33 .then(() => {
34 SpecialPowers.setBoolPref(kPrefRilRadioDisabled, false);
35 })
36 .then(() => runIfMultiSIM(
37 () => testSendFailed("NonActiveSimCardError", 1)));
38 });