Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 // Make sure we behave appropriately when asking for content-disposition
3 const Cc = Components.classes;
4 const Ci = Components.interfaces;
5 const path = "data/test_bug589292.zip";
7 function run_test() {
8 var ios = Cc["@mozilla.org/network/io-service;1"].
9 getService(Ci.nsIIOService);
10 var spec = "jar:" + ios.newFileURI(do_get_file(path)).spec + "!/foo.txt";
11 var channel = ios.newChannel(spec, null, null);
12 instr = channel.open();
13 var val;
14 try {
15 val = channel.contentDisposition;
16 do_check_true(false, "The channel has content disposition?!");
17 } catch (e) {
18 // This is what we want to happen - there's no underlying channel, so no
19 // content-disposition header is available
20 do_check_true(true, "How are you reading this?!");
21 }
22 }