Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 load 41276-1.html
2 load 48856-1.html
3 load 110650-1.html
4 skip-if(browserIsRemote||!haveTestPlugin||cocoaWidget) script 539897-1.html # browserIsRemote is bug XXXXXX
5 skip-if(browserIsRemote||!haveTestPlugin) script 540114-1.html # browserIsRemote is bug XXXXXX
6 load 570884.html
7 # This test relies on the reading of screenX/Y forcing a round trip to
8 # the X server, which is a bad assumption for <browser remote>.
9 # Plugin arch is going to change anyway with OOP content so skipping
10 # this test for now is OK.
11 skip-if(browserIsRemote||!haveTestPlugin||http.platform!="X11"||!testPluginIsOOP()) load 598862.html
13 # SkiaGL is causing a compositor hang here, disable temporarily while that gets resolved in bug 908363
14 skip-if(Android) load 626602-1.html
15 load 752340.html