Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 <?xml version="1.0"?>
2 <?xml-stylesheet type="text/css" href="chrome://global/skin"?>
3 <?xml-stylesheet type="text/css" href="chrome://mochikit/content/tests/SimpleTest/test.css"?>
4 <!--
5 https://bugzilla.mozilla.org/show_bug.cgi?id=673468
6 -->
7 <window title="Mozilla Bug "
8 xmlns="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul">
9 <script type="application/javascript" src="chrome://mochikit/content/tests/SimpleTest/SimpleTest.js"/>
11 <!-- test results are displayed in the html:body -->
12 <body xmlns="http://www.w3.org/1999/xhtml">
13 <a href="https://bugzilla.mozilla.org/show_bug.cgi?id="
14 target="_blank">Mozilla Bug 673468</a>
15 </body>
17 <!-- test code goes here -->
18 <script type="application/javascript">
19 <![CDATA[
20 /** Test for Bug 673468 **/
22 let Cc = Components.classes;
23 let Cu = Components.utils;
24 let Ci = Components.interfaces;
26 let system = Cc["@mozilla.org/systemprincipal;1"].createInstance();
27 let sandbox = Cu.Sandbox(system);
28 let map = sandbox.WeakMap();
29 let obj = {};
30 map.set(obj, {});
32 Cu.forceGC();
34 ok(map.has(obj), "Weakmap still contains our wrapper!");
35 ]]>
36 </script>
37 </window>