Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 [DEFAULT]
2 skip-if = e10s
3 support-files =
4 manifest.json
5 dist/jquery.js
6 test/index.html
7 test/offset.html
8 test/test.js
9 test/fix.html
10 test/data/cow.jpg
11 test/data/dashboard.xml
12 test/data/iframe.html
13 test/data/json_assigned_obj.js
14 test/data/json_obj.js
15 test/data/name.html
16 test/data/test.html
17 test/data/test.js
18 test/data/test2.html
19 test/data/test3.html
20 test/data/testrunner.js
21 test/data/testsuite.css
22 test/data/with_fries.xml
23 test/data/offset/absolute.html
24 test/data/offset/fixed.html
25 test/data/offset/relative.html
26 test/data/offset/scroll.html
27 test/data/offset/static.html
28 test/data/offset/table.html
29 test/unit/ajax.js
30 test/unit/core.js
31 test/unit/dimensions.js
32 test/unit/event.js
33 test/unit/fx.js
34 test/unit/offset.js
35 test/unit/selector.js
37 [test_jQuery.html]
38 skip-if = (toolkit == 'gonk' && debug) || toolkit == 'android' #bug 775227 #debug-only timeout