Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 /* Any copyright is dedicated to the Public Domain.
2 http://creativecommons.org/publicdomain/zero/1.0/ */
4 /*
5 * The list of phases mapped to their corresponding profiles. The object
6 * here must be in strict JSON format, as it will get parsed by the Python
7 * testrunner (no single quotes, extra comma's, etc).
8 */
9 EnableEngines(["prefs"]);
11 var phases = { "phase1": "profile1",
12 "phase2": "profile2",
13 "phase3": "profile1"};
15 var prefs1 = [
16 { name: "browser.startup.homepage",
17 value: "http://www.getfirefox.com"
18 },
19 { name: "browser.urlbar.maxRichResults",
20 value: 20
21 },
22 { name: "security.OCSP.require",
23 value: true
24 }
25 ];
27 var prefs2 = [
28 { name: "browser.startup.homepage",
29 value: "http://www.mozilla.com"
30 },
31 { name: "browser.urlbar.maxRichResults",
32 value: 18
33 },
34 { name: "security.OCSP.require",
35 value: false
36 }
37 ];
39 Phase('phase1', [
40 [Prefs.modify, prefs1],
41 [Prefs.verify, prefs1],
42 [Sync],
43 ]);
45 Phase('phase2', [
46 [Sync],
47 [Prefs.verify, prefs1],
48 [Prefs.modify, prefs2],
49 [Prefs.verify, prefs2],
50 [Sync]
51 ]);
53 Phase('phase3', [
54 [Sync],
55 [Prefs.verify, prefs2]
56 ]);