Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 # Printing JSObjects.
3 assert_subprinter_registered('SpiderMonkey', 'ptr-to-JSObject')
4 assert_subprinter_registered('SpiderMonkey', 'ref-to-JSObject')
6 run_fragment('JSObject.simple')
8 # These patterns look a little strange because of prolog.py's 'set print
9 # address off', which avoids putting varying addresses in the output. After
10 # the '(JSObject *) ', there is a 'void *' value printing as the empty
11 # string.
13 assert_pretty('glob', '(JSObject *) [object global] delegate')
14 assert_pretty('plain', '(JSObject *) [object Object]')
15 assert_pretty('func', '(JSObject *) [object Function "dys"]')
16 assert_pretty('anon', '(JSObject *) [object Function <unnamed>]')
17 assert_pretty('funcPtr', '(JSFunction *) [object Function "formFollows"]')
19 assert_pretty('plainRef', '(JSObject &) @ [object Object]')
20 assert_pretty('funcRef', '(JSFunction &) @ [object Function "formFollows"]')