Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 <?xml version="1.0"?>
2 <?xml-stylesheet href="chrome://global/skin" type="text/css"?>
3 <?xml-stylesheet href="chrome://mochikit/content/tests/SimpleTest/test.css"
4 type="text/css"?>
5 <window title="Basic Plugin Tests"
6 xmlns="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul">
7 <script type="application/javascript"
8 src="chrome://mochikit/content/tests/SimpleTest/SimpleTest.js" />
9 <script type="application/javascript" src="utils.js"></script>
10 <script type="application/javascript">
11 setTestPluginEnabledState(SpecialPowers.Ci.nsIPluginTag.STATE_ENABLED);
12 </script>
13 <body xmlns="http://www.w3.org/1999/xhtml" onload="runTests()">
14 <embed id="plugin1" type="application/x-test" width="400" height="400"></embed>
15 </body>
16 <script class="testbody" type="application/javascript">
17 <![CDATA[
18 SimpleTest.waitForExplicitFinish();
20 function runTests() {
21 var pluginElement = document.getElementById("plugin1");
23 ok(pluginElement.identifierToStringTest('foo') == "foo", "identifierToStringTest failed");
25 SimpleTest.finish();
26 }
27 ]]>
28 </script>
29 </window>