Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 function run_test() {
2 var ios = Cc["@mozilla.org/network/io-service;1"].
3 getService(Ci.nsIIOService);
5 var newURI = ios.newURI("http://foo.com", null, null);
7 var success = false;
8 try {
9 newURI.spec = "http: //foo.com";
10 }
11 catch (e) {
12 success = e.result == Cr.NS_ERROR_MALFORMED_URI;
13 }
14 if (!success)
15 do_throw("We didn't throw NS_ERROR_MALFORMED_URI when a space was passed in the hostname!");
17 success = false;
18 try {
19 newURI.host = " foo.com";
20 }
21 catch (e) {
22 success = e.result == Cr.NS_ERROR_MALFORMED_URI;
23 }
24 if (!success)
25 do_throw("We didn't throw NS_ERROR_MALFORMED_URI when a space was passed in the hostname!");
26 }