tor-browser

The Tor Browser
git clone https://git.dasho.dev/tor-browser.git
Log | Files | Refs | README | LICENSE

test_bug343596.html (1203B)


      1 <!DOCTYPE HTML>
      2 <html>
      3 <!--
      4 https://bugzilla.mozilla.org/show_bug.cgi?id=343596
      5 -->
      6 <head>
      7  <title>Test for Bug 343596</title>
      8  <script src="/tests/SimpleTest/SimpleTest.js"></script>        
      9  <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" />
     10 </head>
     11 <body>
     12 <a target="_blank" href="https://bugzilla.mozilla.org/show_bug.cgi?id=343596">Mozilla Bug 343596</a>
     13 <p id="display"></p>
     14 <script id="foo"></script>
     15 <div id="content" style="display: none">
     16  
     17 </div>
     18 <pre id="test">
     19 <script class="testbody" type="text/javascript">
     20 
     21 /** Test for Bug 343596 */
     22 
     23 SimpleTest.waitForExplicitFinish();
     24 
     25 /** Cut error handling, because we're going to throw on purpose*/
     26 var errorHandler = window.onerror;
     27 window.onerror = null;
     28 
     29 
     30 try{
     31  // Insert text into an empty script node that will cause a syntax error.
     32  document.getElementById("foo").appendChild(document.createTextNode("("));
     33 }
     34 catch(ex){
     35  // Note that this catch block does not execute.
     36  ok(false, "this catch block should not execute");
     37 }
     38 
     39 setTimeout(function(){
     40 ok(true,"setTimeout still executes after bogus script insertion"); 
     41 window.error = errorHandler;
     42 SimpleTest.finish();}, 0);
     43 
     44 
     45 
     46 
     47 </script>
     48 </pre>
     49 </body>
     50 </html>