dom/src/json/test/unit/test_decodeFromStream.js

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 var Ci = Components.interfaces;
     2 var Cc = Components.classes;
     4 var nativeJSON = Cc["@mozilla.org/dom/json;1"].createInstance(Ci.nsIJSON);
     6 function run_test()
     7 {
     8   function read_file(path)
     9   {
    10     try
    11     {
    12       var f = do_get_file(path);
    13       var istream = Cc["@mozilla.org/network/file-input-stream;1"].createInstance(Ci.nsIFileInputStream);
    14       istream.init(f, -1, -1, false);
    15       return nativeJSON.decodeFromStream(istream, istream.available());
    16     }
    17     finally
    18     {
    19       istream.close();
    20     }
    21   }
    23   var x = read_file("decodeFromStream-01.json");
    24   do_check_eq(x["JSON Test Pattern pass3"]["The outermost value"], "must be an object or array.");
    25   do_check_eq(x["JSON Test Pattern pass3"]["In this test"], "It is an object.");
    27   x = read_file("decodeFromStream-small.json");
    28   do_check_eq(x.toSource(), "({})", "empty object parsed");
    29 }

mercurial