Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 # mozilla/autoload.py: Autoload SpiderMonkey pretty-printers.
3 print "Loading JavaScript value pretty-printers; see js/src/gdb/README."
4 print "If they cause trouble, type: disable pretty-printer .* SpiderMonkey"
6 import gdb.printing
7 import mozilla.prettyprinters
9 # Import the pretty-printer modules. As a side effect, loading these
10 # modules registers their printers with mozilla.prettyprinters.
11 import mozilla.jsid
12 import mozilla.JSObject
13 import mozilla.JSString
14 import mozilla.jsval
15 import mozilla.Root
17 # The user may have personal pretty-printers. Get those, too, if they exist.
18 try:
19 import my_mozilla_printers
20 except ImportError:
21 pass
23 # Register our pretty-printers with |objfile|.
24 def register(objfile):
25 lookup = mozilla.prettyprinters.lookup_for_objfile(objfile)
26 if lookup:
27 gdb.printing.register_pretty_printer(objfile, lookup, replace=True)