summaryrefslogtreecommitdiff
path: root/Source/WebInspectorUI/UserInterface/Script.js
diff options
context:
space:
mode:
authorAllan Sandfeld Jensen <allan.jensen@digia.com>2013-09-13 12:51:20 +0200
committerThe Qt Project <gerrit-noreply@qt-project.org>2013-09-19 20:50:05 +0200
commitd441d6f39bb846989d95bcf5caf387b42414718d (patch)
treee367e64a75991c554930278175d403c072de6bb8 /Source/WebInspectorUI/UserInterface/Script.js
parent0060b2994c07842f4c59de64b5e3e430525c4b90 (diff)
downloadqtwebkit-d441d6f39bb846989d95bcf5caf387b42414718d.tar.gz
Import Qt5x2 branch of QtWebkit for Qt 5.2
Importing a new snapshot of webkit. Change-Id: I2d01ad12cdc8af8cb015387641120a9d7ea5f10c Reviewed-by: Allan Sandfeld Jensen <allan.jensen@digia.com>
Diffstat (limited to 'Source/WebInspectorUI/UserInterface/Script.js')
-rw-r--r--Source/WebInspectorUI/UserInterface/Script.js170
1 files changed, 170 insertions, 0 deletions
diff --git a/Source/WebInspectorUI/UserInterface/Script.js b/Source/WebInspectorUI/UserInterface/Script.js
new file mode 100644
index 000000000..63f401d4c
--- /dev/null
+++ b/Source/WebInspectorUI/UserInterface/Script.js
@@ -0,0 +1,170 @@
+/*
+ * Copyright (C) 2013 Apple Inc. All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ * notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in the
+ * documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY APPLE INC. AND ITS CONTRIBUTORS ``AS IS''
+ * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
+ * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
+ * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR ITS CONTRIBUTORS
+ * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+ * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+ * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+ * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
+ * THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+WebInspector.Script = function(id, range, url, injected, sourceMapURL)
+{
+ WebInspector.SourceCode.call(this);
+
+ console.assert(id);
+ console.assert(range instanceof WebInspector.TextRange);
+
+ this._id = id || null;
+ this._range = range || null;
+ this._url = url || null;
+ this._injected = injected || false;
+
+ this._resource = this._resolveResource();
+ if (this._resource)
+ this._resource.associateWithScript(this);
+
+ if (sourceMapURL)
+ WebInspector.sourceMapManager.downloadSourceMap(sourceMapURL, this._url, this);
+};
+
+WebInspector.Script.resetUniqueDisplayNameNumbers = function()
+{
+ WebInspector.Script._nextUniqueDisplayNameNumber = 1;
+}
+
+WebInspector.Script._nextUniqueDisplayNameNumber = 1;
+
+WebInspector.Script.prototype = {
+ constructor: WebInspector.Script,
+
+ // Public
+
+ get id()
+ {
+ return this._id;
+ },
+
+ get range()
+ {
+ return this._range;
+ },
+
+ get url()
+ {
+ return this._url;
+ },
+
+ get urlComponents()
+ {
+ if (!this._urlComponents)
+ this._urlComponents = parseURL(this._url);
+ return this._urlComponents;
+ },
+
+ get displayName()
+ {
+ if (this._url)
+ return WebInspector.displayNameForURL(this._url, this.urlComponents);
+
+ // Assign a unique number to the script object so it will stay the same.
+ if (!this._uniqueDisplayNameNumber)
+ this._uniqueDisplayNameNumber = this.constructor._nextUniqueDisplayNameNumber++;
+
+ return WebInspector.UIString("Anonymous Script %d").format(this._uniqueDisplayNameNumber);
+ },
+
+ get injected()
+ {
+ return this._injected;
+ },
+
+ get resource()
+ {
+ return this._resource;
+ },
+
+ canRequestContentFromBackend: function()
+ {
+ // We can request content if we have an id.
+ return !!this._id;
+ },
+
+ requestContentFromBackend: function(callback)
+ {
+ if (!this._id) {
+ // There is no identifier to request content with. Return false to cause the
+ // pending callbacks to get null content.
+ return false;
+ }
+
+ DebuggerAgent.getScriptSource(this._id, callback);
+ return true;
+ },
+
+ // Private
+
+ _resolveResource: function()
+ {
+ // FIXME: We should be able to associate a Script with a Resource through identifiers,
+ // we shouldn't need to lookup by URL, which is not safe with frames, where there might
+ // be multiple resources with the same URL.
+ // <rdar://problem/13373951> Scripts should be able to associate directly with a Resource
+
+ // No URL, no resource.
+ if (!this._url)
+ return null;
+
+ try {
+ // Try with the Script's full URL.
+ var resource = WebInspector.frameResourceManager.resourceForURL(this.url);
+ if (resource)
+ return resource;
+
+ // Try with the Script's full decoded URL.
+ var decodedURL = decodeURI(this._url);
+ if (decodedURL !== this._url) {
+ resource = WebInspector.frameResourceManager.resourceForURL(decodedURL);
+ if (resource)
+ return resource;
+ }
+
+ // Next try removing any fragment in the original URL.
+ var urlWithoutFragment = removeURLFragment(this._url);
+ if (urlWithoutFragment !== this._url) {
+ resource = WebInspector.frameResourceManager.resourceForURL(urlWithoutFragment);
+ if (resource)
+ return resource;
+ }
+
+ // Finally try removing any fragment in the decoded URL.
+ var decodedURLWithoutFragment = removeURLFragment(decodedURL);
+ if (decodedURLWithoutFragment !== decodedURL) {
+ resource = WebInspector.frameResourceManager.resourceForURL(decodedURLWithoutFragment);
+ if (resource)
+ return resource;
+ }
+ } catch (e) {
+ // Ignore possible URIErrors.
+ }
+
+ return null;
+ }
+};
+
+WebInspector.Script.prototype.__proto__ = WebInspector.SourceCode.prototype;