js/src/tests/js1_8_5/extensions/selfhosted-detecting-strict.js

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 // Any copyright is dedicated to the Public Domain.
     2 // http://creativecommons.org/licenses/publicdomain/
     4 //-----------------------------------------------------------------------------
     5 var BUGNUMBER = 843004;
     6 var summary =
     7   "Don't emit a strict warning for the undefined-property detection pattern in self-hosted code";
     9 print(BUGNUMBER + ": " + summary);
    11 /**************
    12  * BEGIN TEST *
    13  **************/
    15 options("strict", "werror");
    17 // Don't strict-warn (and throw, because of strict) when self-hosted code uses
    18 // detecting-safe undefined-property accesses (|options.weekday !== undefined|
    19 // and similar in ToDateTimeOptions, to be precise).
    20 new Date().toLocaleString("en-US", {});
    22 // If we get here, the test passed.
    24 if (typeof reportCompare === "function")
    25   reportCompare(true, true);
    27 print("Tests complete");

mercurial