Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 function run_test() {
2 var ioServ = Components.classes["@mozilla.org/network/io-service;1"]
3 .getService(Components.interfaces.nsIIOService);
5 var base = ioServ.newURI("http://www.example.com", null, null);
7 var about1 = ioServ.newURI("about:blank", null, null);
8 var about2 = ioServ.newURI("about:blank", null, base);
10 var chan1 = ioServ.newChannelFromURI(about1)
11 .QueryInterface(Components.interfaces.nsIPropertyBag2);
12 var chan2 = ioServ.newChannelFromURI(about2)
13 .QueryInterface(Components.interfaces.nsIPropertyBag2);
15 var haveProp = false;
16 var propVal = null;
17 try {
18 propVal = chan1.getPropertyAsInterface("baseURI",
19 Components.interfaces.nsIURI);
20 haveProp = true;
21 } catch (e if e.result == Components.results.NS_ERROR_NOT_AVAILABLE) {
22 // Property shouldn't be there.
23 }
24 do_check_eq(propVal, null);
25 do_check_eq(haveProp, false);
26 do_check_eq(chan2.getPropertyAsInterface("baseURI",
27 Components.interfaces.nsIURI),
28 base);
29 }