Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 function handleRequest(request, response)
2 {
3 var file = Components.classes["@mozilla.org/file/directory_service;1"]
4 .getService(Components.interfaces.nsIProperties)
5 .get("CurWorkD", Components.interfaces.nsIFile);
7 file.append("tests");
8 file.append("image");
9 file.append("test");
10 file.append("mochitest");
12 var redirectstate = "/image/test/mochitest/bug497665.sjs";
13 if (getState(redirectstate) == "") {
14 file.append('blue.png');
15 setState(redirectstate, "red");
16 } else {
17 file.append('red.png');
18 setState(redirectstate, "");
19 }
21 response.setHeader("Cache-Control", "max-age=3600", false);
23 var fileStream = Components.classes['@mozilla.org/network/file-input-stream;1']
24 .createInstance(Components.interfaces.nsIFileInputStream);
25 fileStream.init(file, 1, 0, false);
26 var binaryStream = Components.classes['@mozilla.org/binaryinputstream;1']
27 .createInstance(Components.interfaces.nsIBinaryInputStream);
28 binaryStream.setInputStream(fileStream);
30 response.bodyOutputStream.writeFrom(binaryStream, binaryStream.available());
32 binaryStream.close();
33 fileStream.close();
34 }