xpcom/tests/unit/head_xpcom.js

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 var isWindows = ("@mozilla.org/windows-registry-key;1" in Components.classes);
     3 function get_test_program(prog)
     4 {
     5   var progPath = do_get_cwd();
     6   progPath.append(prog);
     7   if (isWindows)
     8     progPath.leafName = progPath.leafName + ".exe";
     9   return progPath;
    10 }
    12 function set_process_running_environment()
    13 {
    14   var envSvc = Components.classes["@mozilla.org/process/environment;1"].
    15     getService(Components.interfaces.nsIEnvironment);
    16   var dirSvc = Components.classes["@mozilla.org/file/directory_service;1"].
    17     getService(Components.interfaces.nsIProperties);
    18   var greDir = dirSvc.get("GreD", Components.interfaces.nsIFile);
    20   envSvc.set("DYLD_LIBRARY_PATH", greDir.path);
    21   // For Linux
    22   envSvc.set("LD_LIBRARY_PATH", greDir.path);
    23   //XXX: handle windows
    24 }

mercurial