Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 Cu.import("resource://testing-common/httpd.js");
3 var server;
4 const BUGID = "331825";
6 function TestListener() {
7 }
8 TestListener.prototype.onStartRequest = function(request, context) {
9 }
10 TestListener.prototype.onStopRequest = function(request, context, status) {
11 var channel = request.QueryInterface(Components.interfaces.nsIHttpChannel);
12 do_check_eq(channel.responseStatus, 304);
14 server.stop(do_test_finished);
15 }
17 function run_test() {
18 // start server
19 server = new HttpServer();
21 server.registerPathHandler("/bug" + BUGID, bug331825);
23 server.start(-1);
25 // make request
26 var channel =
27 Components.classes["@mozilla.org/network/io-service;1"].
28 getService(Components.interfaces.nsIIOService).
29 newChannel("http://localhost:" + server.identity.primaryPort + "/bug" +
30 BUGID, null, null);
32 channel.QueryInterface(Components.interfaces.nsIHttpChannel);
33 channel.setRequestHeader("If-None-Match", "foobar", false);
34 channel.asyncOpen(new TestListener(), null);
36 do_test_pending();
37 }
39 // PATH HANDLER FOR /bug331825
40 function bug331825(metadata, response) {
41 response.setStatusLine(metadata.httpVersion, 304, "Not Modified");
42 }