Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 <html xmlns="http://www.w3.org/1999/xhtml" manifest="http://mochi.test:8888/tests/dom/tests/mochitest/ajax/offline/overlap.cacheManifest">
2 <head>
3 <title>overlapping namespaces test</title>
5 <script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script>
6 <script type="text/javascript" src="/tests/dom/tests/mochitest/ajax/offline/offlineTests.js"></script>
7 <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" />
9 <script type="text/javascript">
11 function manifestUpdated()
12 {
13 var xhr = new XMLHttpRequest();
14 xhr.open("GET", "bogus/specific/test.html", false);
15 xhr.send();
17 OfflineTest.is(xhr.status, 200, "Should have fallen back.");
18 OfflineTest.teardownAndFinish();
19 }
21 if (OfflineTest.setup()) {
22 applicationCache.onerror = OfflineTest.failEvent;
23 applicationCache.oncached = OfflineTest.priv(manifestUpdated);
24 }
26 SimpleTest.waitForExplicitFinish();
28 </script>
30 </head>
32 <body>
34 </body>
35 </html>