js/xpconnect/tests/unit/test_bug845862.js

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 const Cu = Components.utils;
     3 function run_test() {
     4   // We rely on the crazy "wantXrays:false also causes values return from the
     5   // sandbox to be waived" behavior, because it's the simplest way to get
     6   // waivers out of the sandbox (which has no native objects). :-(
     7   var sb = new Cu.Sandbox('http://www.example.com', {wantXrays: false});
     8   Cu.evalInSandbox("this.foo = {}; Object.defineProperty(foo, 'bar', {get: function() {return {};}});", sb);
     9   do_check_true(sb.foo != XPCNativeWrapper(sb.foo), "sb.foo is waived");
    10   var desc = Object.getOwnPropertyDescriptor(sb.foo, 'bar');
    11   var b = desc.get();
    12   do_check_true(b != XPCNativeWrapper(b), "results from accessor descriptors are waived");
    13 }

mercurial