Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 [DEFAULT]
2 head = head_identity.js
3 tail = tail_identity.js
4 support-files =
5 data/idp_1/.well-known/browserid
6 data/idp_invalid_1/.well-known/browserid
8 # Test load modules first so syntax failures are caught early.
9 [test_load_modules.js]
10 [test_minimalidentity.js]
11 [test_firefox_accounts.js]
13 [test_identity_utils.js]
14 [test_log_utils.js]
15 [test_authentication.js]
16 # Identity modules aren't packaged on Android.
17 skip-if = os == "android"
18 [test_crypto_service.js]
19 skip-if = os == "android"
20 [test_identity.js]
21 skip-if = os == "android"
22 [test_jwcrypto.js]
23 skip-if = os == "android"
24 [test_observer_topics.js]
25 skip-if = os == "android"
26 [test_provisioning.js]
27 skip-if = os == "android"
28 [test_relying_party.js]
29 skip-if = os == "android"
30 [test_store.js]
31 [test_well-known.js]
32 # Bug 905340 - http port dependency causes failure on Android 4.0
33 skip-if = os == "android"