Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 <!doctype html>
2 <!--
3 https://bugzilla.mozilla.org/show_bug.cgi?id=725426
4 -->
5 <title>Test for bug 725426</title>
6 <script src=/tests/SimpleTest/SimpleTest.js></script>
7 <link rel=stylesheet href=/tests/SimpleTest/test.css>
8 <body style=margin:0>
9 <div style="-moz-transform: perspective(200px)">
10 <div style="-moz-transform: translatez(-100px);
11 width:100px;height:100px;background:blue">
12 </div></div>
13 <a target="_blank" href="https://bugzilla.mozilla.org/show_bug.cgi?id=725426">
14 Mozilla Bug 725426</a>
15 <pre id=test>
16 <script class=testbody>
17 var rect = document.querySelector("div>div").getBoundingClientRect();
18 is(rect.top, 0, "Incorrect bounding rect top");
19 is(rect.right, 100, "Incorrect bounding rect top");
20 is(rect.bottom, 100, "Incorrect bounding rect top");
21 is(rect.left, 0, "Incorrect bounding rect top");
22 </script>
23 </pre>