Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 // eval correctly handles optional custom url option
2 var g = newGlobal();
3 var dbg = new Debugger(g);
4 var count = 0;
6 function testUrl (options, expected) {
7 count++;
8 dbg.onDebuggerStatement = function (frame) {
9 dbg.onNewScript = function (script) {
10 dbg.onNewScript = undefined;
11 assertEq(script.url, expected);
12 count--;
13 };
14 frame.eval("", options);
15 };
16 g.eval("debugger;");
17 }
20 testUrl(undefined, "debugger eval code");
21 testUrl(null, "debugger eval code");
22 testUrl({ url: undefined }, "debugger eval code");
23 testUrl({ url: null }, "null");
24 testUrl({ url: 5 }, "5");
25 testUrl({ url: "test" }, "test");
26 assertEq(count, 0);