Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 /*
2 * Any copyright is dedicated to the Public Domain.
3 * http://creativecommons.org/licenses/publicdomain/
4 */
6 //-----------------------------------------------------------------------------
7 var BUGNUMBER = 630770;
8 var summary =
9 'Correctly warn about duplicate parameters when the strict option is enabled';
11 print(BUGNUMBER + ": " + summary);
13 /**************
14 * BEGIN TEST *
15 **************/
17 // Verify that duplicate parameters, with the strict option set, don't provoke
18 // an assertion. Ideally we'd also verify that we warn exactly once per
19 // duplicated parameter name, but at present there's no way to test that
20 // without more effort (further customizing the shell JSErrorReporter) than we
21 // want to make now.
22 options("strict");
23 eval("function a(x, x, x, x) { }");
25 /******************************************************************************/
27 if (typeof reportCompare === "function")
28 reportCompare(true, true);
30 print("All tests passed!");