js/src/tests/js1_8_5/extensions/reflect-parse-proxy.js

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 // |reftest| skip-if(!xulRuntime.shell)
     2 // bug 905774
     4 // Proxy options
     5 var opts = new Proxy({loc: false}, {});
     6 assertEq(Reflect.parse("0;", opts).loc === null, true);
     7 opts.loc = true;
     8 assertEq(Reflect.parse("0;", opts).loc !== null, true);
     9 delete opts.loc;
    10 assertEq(Reflect.parse("0;", opts).loc !== null, true);  // default is true
    12 // Proxy builder
    13 var builder = {
    14     program: function (body) { return body.join(); },
    15     expressionStatement: function (expr) { return expr + ";" },
    16     literal: function (val) { return "" + val; }
    17 };
    18 opts = {builder: new Proxy(builder, {})};
    19 assertEq(Reflect.parse("0xff;", opts), "255;");
    21 reportCompare(0, 0, 'ok');

mercurial