The -*- file variable lines -*- establish per-file settings that Emacs will pick up. This patch makes the following changes to those lines (and touches nothing else): - Never set the buffer's mode. Years ago, Emacs did not have a good JavaScript mode, so it made sense to use Java or C++ mode in .js files. However, Emacs has had js-mode for years now; it's perfectly serviceable, and is available and enabled by default in all major Emacs packagings. Selecting a mode in the -*- file variable line -*- is almost always the wrong thing to do anyway. It overrides Emacs's default choice, which is (now) reasonable; and even worse, it overrides settings the user might have made in their '.emacs' file for that file extension. It's only useful when there's something specific about that particular file that makes a particular mode appropriate. - Correctly propagate settings that establish the correct indentation level for this file: c-basic-offset and js2-basic-offset should be js-indent-level. Whatever value they're given should be preserved; different parts of our tree use different indentation styles. - We don't use tabs in Mozilla JS code. Always set indent-tabs-mode: nil. Remove tab-width: settings, at least in files that don't contain tab characters. - Remove js2-mode settings that belong in the user's .emacs file, like js2-skip-preprocessor-directives.
81 lines
2.5 KiB
JavaScript
81 lines
2.5 KiB
JavaScript
/* -*- indent-tabs-mode: nil; js-indent-level: 2 -*- */
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
const Ci = Components.interfaces;
|
|
const Cc = Components.classes;
|
|
const Cr = Components.results;
|
|
|
|
function loadUtilsScript() {
|
|
var loader = Cc["@mozilla.org/moz/jssubscript-loader;1"].
|
|
getService(Ci.mozIJSSubScriptLoader);
|
|
loader.loadSubScript("chrome://global/content/contentAreaUtils.js");
|
|
}
|
|
|
|
function test_urlSecurityCheck() {
|
|
var nullPrincipal = Cc["@mozilla.org/nullprincipal;1"].
|
|
createInstance(Ci.nsIPrincipal);
|
|
|
|
const HTTP_URI = "http://www.mozilla.org/";
|
|
const CHROME_URI = "chrome://browser/content/browser.xul";
|
|
const DISALLOW_INHERIT_PRINCIPAL =
|
|
Ci.nsIScriptSecurityManager.DISALLOW_INHERIT_PRINCIPAL;
|
|
|
|
try {
|
|
urlSecurityCheck(makeURI(HTTP_URI), nullPrincipal,
|
|
DISALLOW_INHERIT_PRINCIPAL);
|
|
}
|
|
catch(ex) {
|
|
do_throw("urlSecurityCheck should not throw when linking to a http uri with a null principal");
|
|
}
|
|
|
|
// urlSecurityCheck also supports passing the url as a string
|
|
try {
|
|
urlSecurityCheck(HTTP_URI, nullPrincipal,
|
|
DISALLOW_INHERIT_PRINCIPAL);
|
|
}
|
|
catch(ex) {
|
|
do_throw("urlSecurityCheck failed to handle the http URI as a string (uri spec)");
|
|
}
|
|
|
|
let shouldThrow = true;
|
|
try {
|
|
urlSecurityCheck(CHROME_URI, nullPrincipal,
|
|
DISALLOW_INHERIT_PRINCIPAL);
|
|
}
|
|
catch(ex) {
|
|
shouldThrow = false;
|
|
}
|
|
if (shouldThrow)
|
|
do_throw("urlSecurityCheck should throw when linking to a chrome uri with a null principal");
|
|
}
|
|
|
|
function test_stringBundle() {
|
|
// This test verifies that the elements that can be used as file picker title
|
|
// keys in the save* functions are actually present in the string bundle.
|
|
// These keys are part of the contentAreaUtils.js public API.
|
|
var validFilePickerTitleKeys = [
|
|
"SaveImageTitle",
|
|
"SaveVideoTitle",
|
|
"SaveAudioTitle",
|
|
"SaveLinkTitle",
|
|
];
|
|
|
|
for (let [, filePickerTitleKey] in Iterator(validFilePickerTitleKeys)) {
|
|
// Just check that the string exists
|
|
try {
|
|
ContentAreaUtils.stringBundle.GetStringFromName(filePickerTitleKey);
|
|
} catch (e) {
|
|
do_throw("Error accessing file picker title key: " + filePickerTitleKey);
|
|
}
|
|
}
|
|
}
|
|
|
|
function run_test()
|
|
{
|
|
loadUtilsScript();
|
|
test_urlSecurityCheck();
|
|
test_stringBundle();
|
|
}
|