Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
michael@0 | 1 | // dbg.getNewestFrame in an onPop handler returns the frame being popped. |
michael@0 | 2 | var g = newGlobal(); |
michael@0 | 3 | g.eval("function f() { debugger; }"); |
michael@0 | 4 | g.eval("function g() { f(); }"); |
michael@0 | 5 | g.eval("function h() { g(); }"); |
michael@0 | 6 | g.eval("function i() { h(); }"); |
michael@0 | 7 | |
michael@0 | 8 | var dbg = new Debugger(g); |
michael@0 | 9 | var log; |
michael@0 | 10 | dbg.onEnterFrame = function handleEnter(f) { |
michael@0 | 11 | log += "(" + f.callee.name; |
michael@0 | 12 | f.onPop = function handlePop(c) { |
michael@0 | 13 | log += ")" + f.callee.name; |
michael@0 | 14 | assertEq(dbg.getNewestFrame(), this); |
michael@0 | 15 | }; |
michael@0 | 16 | }; |
michael@0 | 17 | log = ''; |
michael@0 | 18 | g.i(); |
michael@0 | 19 | assertEq(log, "(i(h(g(f)f)g)h)i"); |