Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 /* This Source Code Form is subject to the terms of the Mozilla Public
2 * License, v. 2.0. If a copy of the MPL was not distributed with this
3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
5 function run_test() {
6 var ps = Cc["@mozilla.org/preferences-service;1"].
7 getService(Ci.nsIPrefService);
9 var pb = Cc["@mozilla.org/preferences-service;1"].
10 getService(Ci.nsIPrefBranch);
12 var observer = {
13 QueryInterface: function QueryInterface(aIID) {
14 if (aIID.equals(Ci.nsIObserver) ||
15 aIID.equals(Ci.nsISupports))
16 return this;
17 throw Components.results.NS_NOINTERFACE;
18 },
20 observe: function observe(aSubject, aTopic, aState) {
21 // Don't do anything.
22 }
23 }
25 /* Set the same pref twice. This shouldn't leak. */
26 pb.addObserver("UserPref.nonexistent.setIntPref", observer, false);
27 pb.addObserver("UserPref.nonexistent.setIntPref", observer, false);
28 }