widget/tests/test_system_status_bar.xul
author Nicholas Nethercote <nnethercote@mozilla.com>
Wed, 25 Oct 2017 10:22:38 +1100
changeset 387909 3d0093f961eec929caa370444cd0f7fcbfbc82bc
parent 198296 cf6966a86753254270df552d9c5bc7b0a26d8f06
child 402660 b38d59f71915f78922b46a7c7bc65a48488c45f1
permissions -rw-r--r--
Bug 1410794 - Change some |string| occurrences in nsIPrefBranch.idl to |ACString|. r=erahm. This makes the code nicer. In particular, it removes many getter_Copies() calls. The patch also converts a lot of nsCStrings to nsAutoCString, which will avoid heap allocation in the common case. The patch also renames PREF_CopyCharPref() as PREF_GetCStringPref(), because it's actually getting a string, not a char, and that matches the existing GetCString() and GetDefaultCString() methods. Correspondingly, it also renames PREF_SetCharPref() as PREF_SetCStringPref(). The |aPrefName| arguments in nsIPrefBranch.idl remain as |string| because they almost always involve passing in C string literals, and passing "foo" is much nicer than passing NS_LITERAL_CSTRING("foo"). It's worth noting that early versions of this patch used |AUTF8String| instead of |ACString|. But it turns out that libpref stores prefs internally as Latin1. And |ACString| is compatible with Latin1 but |AUTF8String| isn't, because non-ASCII Latin1 strings are not valid UTF-8!

<?xml version="1.0"?>
<?xml-stylesheet href="chrome://global/skin" type="text/css"?>
<?xml-stylesheet href="chrome://mochikit/content/tests/SimpleTest/test.css"
                 type="text/css"?>
<window title="Testing composition, text and query content events"
  xmlns="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul">

  <script type="application/javascript"
          src="chrome://mochikit/content/tests/SimpleTest/SimpleTest.js" />

<body  xmlns="http://www.w3.org/1999/xhtml">

<div id="content" style="display: none">
  
</div>
<pre id="test">
</pre>
</body>

<menupopup id="menuContainer">
  <menu id="menu1" image="data:image/svg+xml,&lt;svg%20xmlns=&quot;http://www.w3.org/2000/svg&quot;%20width=&quot;32&quot;%20height=&quot;32&quot;>&lt;circle%20cx=&quot;16&quot;%20cy=&quot;16&quot;%20r=&quot;16&quot;/>&lt;/svg>">
    <menupopup>
      <menuitem label="Item 1 in menu 1"/>
      <menuitem label="Item 2 in menu 1"/>
    </menupopup>
  </menu>
  <menu id="menu2" image="data:image/svg+xml,&lt;svg%20xmlns=&quot;http://www.w3.org/2000/svg&quot;%20width=&quot;32&quot;%20height=&quot;32&quot;>&lt;path%20d=&quot;M0 16 L 16 0 L 32 16 L 16 32 Z&quot;/>&lt;/svg>">
    <menupopup>
      <menuitem label="Item 1 in menu 2"/>
      <menuitem label="Item 2 in menu 2"/>
    </menupopup>
  </menu>
</menupopup>

<script class="testbody" type="application/javascript">
<![CDATA[
  let Cc = Components.classes;
  let Ci = Components.interfaces;

  let systemStatusBar = Cc["@mozilla.org/widget/macsystemstatusbar;1"].getService(Ci.nsISystemStatusBar);
  ok(systemStatusBar, "should have got an nsISystemStatusBar instance");

  let menu1 = document.getElementById("menu1");
  let menu2 = document.getElementById("menu2");

  // Add and remove the item, just to get basic leak testing coverage.
  systemStatusBar.addItem(menu1);
  systemStatusBar.removeItem(menu1);

  // Make sure that calling addItem twice with the same element doesn't leak.
  systemStatusBar.addItem(menu2);
  systemStatusBar.addItem(menu2);
  systemStatusBar.removeItem(menu2);

]]>
</script>
</window>