Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 // |jit-test| error: ExitCleanly
3 assertEq((new (Proxy.createFunction({},
4 function(){ this.x = 1 },
5 function(){ this.x = 2 }))).x, 2);
6 try {
7 x = Proxy.createFunction((function () {}), Uint16Array, wrap)
8 new(wrap(x))
9 throw "Should not be reached"
10 }
11 catch (e) {
12 assertEq(String(e.message).indexOf('is not a constructor') === -1, false);
13 }
14 // proxies can return the callee
15 var x = Proxy.createFunction({}, function (q) { return q; });
16 assertEq(new x(x), x);
17 try {
18 var x = (Proxy.createFunction({}, "".indexOf));
19 new x;
20 throw "Should not be reached"
21 }
22 catch (e) {
23 assertEq(String(e.message).indexOf('is not a constructor') === -1, false);
24 }
25 throw "ExitCleanly"