Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
michael@0 | 1 | // This test must be run with debugging already enabled |
michael@0 | 2 | |
michael@0 | 3 | function run_test() { |
michael@0 | 4 | const Cc = Components.classes; |
michael@0 | 5 | const Ci = Components.interfaces; |
michael@0 | 6 | const DebuggerService = Cc["@mozilla.org/js/jsd/debugger-service;1"]; |
michael@0 | 7 | const jsdIDebuggerService = Ci.jsdIDebuggerService; |
michael@0 | 8 | var jsd = DebuggerService.getService(jsdIDebuggerService); |
michael@0 | 9 | |
michael@0 | 10 | do_check_true(jsd.isOn); |
michael@0 | 11 | |
michael@0 | 12 | jsd.scriptHook = { |
michael@0 | 13 | onScriptCreated: function(script) { |
michael@0 | 14 | // Just the presence of this will trigger the script to be handed |
michael@0 | 15 | // to JSD and trigger the crash |
michael@0 | 16 | }, |
michael@0 | 17 | onScriptDestroyed: function(script) { |
michael@0 | 18 | } |
michael@0 | 19 | } |
michael@0 | 20 | |
michael@0 | 21 | eval("4+4"); |
michael@0 | 22 | eval("4+4"); // Will be found in the eval cache |
michael@0 | 23 | } |