Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 const Cc = Components.classes;
2 const Ci = Components.interfaces;
3 const Cu = Components.utils;
5 Cu.import("resource://testing-common/httpd.js");
7 var httpserver = null;
9 function run_test() {
10 var prefs = Cc["@mozilla.org/preferences-service;1"].getService(Ci.nsIPrefBranch);
11 prefs.setBoolPref("geo.wifi.scan", false);
13 httpserver = new HttpServer();
14 httpserver.start(-1);
15 prefs.setCharPref("geo.wifi.uri", "http://localhost:" +
16 httpserver.identity.primaryPort + "/geo");
17 prefs.setBoolPref("dom.testing.ignore_ipc_principal", true);
18 run_test_in_child("./test_geolocation_timeout.js");
19 }