browser/devtools/webconsole/test/browser_jsterm_inspect.js

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 /*
     2  * Any copyright is dedicated to the Public Domain.
     3  * http://creativecommons.org/publicdomain/zero/1.0/
     4  */
     6 // Check that the inspect() jsterm helper function works.
     8 function test()
     9 {
    10   const TEST_URI = "data:text/html;charset=utf8,<p>hello bug 869981";
    12   addTab(TEST_URI);
    13   browser.addEventListener("load", function onLoad() {
    14     browser.removeEventListener("load", onLoad, true);
    15     openConsole(null, consoleOpened);
    16   }, true);
    18   function consoleOpened(hud)
    19   {
    20     content.wrappedJSObject.testProp = "testValue";
    22     hud.jsterm.once("variablesview-fetched", onObjFetch);
    23     hud.jsterm.execute("inspect(window)");
    24   }
    26   function onObjFetch(aEvent, aVar)
    27   {
    28     ok(aVar._variablesView, "variables view object");
    30     findVariableViewProperties(aVar, [
    31       { name: "testProp", value: "testValue" },
    32       { name: "document", value: /HTMLDocument \u2192 data:/ },
    33     ], { webconsole: hud }).then(finishTest);
    34   }
    35 }

mercurial