layout/svg/crashtests/767056-1.svg

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 <svg xmlns="http://www.w3.org/2000/svg"
     2      xmlns:xlink="http://www.w3.org/1999/xlink"
     3      width="100%"
     4      class="reftest-wait">
     5   <script>
     7 function resize() {
     8   // Set the viewBox to the same width as the content area, but slightly
     9   // higher. This checks that we don't enter an infinite reflow loop. See
    10   // https://bugzilla.mozilla.org/show_bug.cgi?id=767056#c10
    11   var viewBox = "0 0 " + window.innerWidth + " " + (window.innerHeight + 1);
    12   document.documentElement.setAttribute("viewBox", viewBox);
    13   document.documentElement.removeAttribute("class");
    14 }
    16 document.addEventListener("MozReftestInvalidate", resize, false);
    17 setTimeout(resize, 3000); // For non-gecko
    19   </script>
    20   <rect width="100%" height="100%"/>
    21 </svg>

mercurial