js/src/gdb/tests/test-JSString.py

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 # Printing JSStrings.
     3 assert_subprinter_registered('SpiderMonkey', 'ptr-to-JSString')
     4 run_fragment('JSString.simple')
     6 assert_pretty('empty', '""')
     7 assert_pretty('x', '"x"')
     8 assert_pretty('z', '"z"')
     9 assert_pretty('xz', '"xz"')
    11 stars = gdb.parse_and_eval('stars')
    12 assert_eq(str(stars), "'*' <repeats 100 times>")
    14 doubleStars = gdb.parse_and_eval('doubleStars')
    15 assert_eq(str(doubleStars), "'*' <repeats 200 times>")
    17 assert_pretty('xRaw', '"x"')
    19 # JSAtom *
    21 run_fragment('JSString.atom')
    23 assert_pretty('molybdenum', '"molybdenum"')

mercurial