diff options
author | Allan Sandfeld Jensen <allan.jensen@digia.com> | 2013-09-13 12:51:20 +0200 |
---|---|---|
committer | The Qt Project <gerrit-noreply@qt-project.org> | 2013-09-19 20:50:05 +0200 |
commit | d441d6f39bb846989d95bcf5caf387b42414718d (patch) | |
tree | e367e64a75991c554930278175d403c072de6bb8 /Source/WebInspectorUI/UserInterface/Script.js | |
parent | 0060b2994c07842f4c59de64b5e3e430525c4b90 (diff) | |
download | qtwebkit-d441d6f39bb846989d95bcf5caf387b42414718d.tar.gz |
Import Qt5x2 branch of QtWebkit for Qt 5.2
Importing a new snapshot of webkit.
Change-Id: I2d01ad12cdc8af8cb015387641120a9d7ea5f10c
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@digia.com>
Diffstat (limited to 'Source/WebInspectorUI/UserInterface/Script.js')
-rw-r--r-- | Source/WebInspectorUI/UserInterface/Script.js | 170 |
1 files changed, 170 insertions, 0 deletions
diff --git a/Source/WebInspectorUI/UserInterface/Script.js b/Source/WebInspectorUI/UserInterface/Script.js new file mode 100644 index 000000000..63f401d4c --- /dev/null +++ b/Source/WebInspectorUI/UserInterface/Script.js @@ -0,0 +1,170 @@ +/* + * Copyright (C) 2013 Apple Inc. All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * + * THIS SOFTWARE IS PROVIDED BY APPLE INC. AND ITS CONTRIBUTORS ``AS IS'' + * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, + * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR + * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR ITS CONTRIBUTORS + * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR + * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF + * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS + * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN + * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF + * THE POSSIBILITY OF SUCH DAMAGE. + */ + +WebInspector.Script = function(id, range, url, injected, sourceMapURL) +{ + WebInspector.SourceCode.call(this); + + console.assert(id); + console.assert(range instanceof WebInspector.TextRange); + + this._id = id || null; + this._range = range || null; + this._url = url || null; + this._injected = injected || false; + + this._resource = this._resolveResource(); + if (this._resource) + this._resource.associateWithScript(this); + + if (sourceMapURL) + WebInspector.sourceMapManager.downloadSourceMap(sourceMapURL, this._url, this); +}; + +WebInspector.Script.resetUniqueDisplayNameNumbers = function() +{ + WebInspector.Script._nextUniqueDisplayNameNumber = 1; +} + +WebInspector.Script._nextUniqueDisplayNameNumber = 1; + +WebInspector.Script.prototype = { + constructor: WebInspector.Script, + + // Public + + get id() + { + return this._id; + }, + + get range() + { + return this._range; + }, + + get url() + { + return this._url; + }, + + get urlComponents() + { + if (!this._urlComponents) + this._urlComponents = parseURL(this._url); + return this._urlComponents; + }, + + get displayName() + { + if (this._url) + return WebInspector.displayNameForURL(this._url, this.urlComponents); + + // Assign a unique number to the script object so it will stay the same. + if (!this._uniqueDisplayNameNumber) + this._uniqueDisplayNameNumber = this.constructor._nextUniqueDisplayNameNumber++; + + return WebInspector.UIString("Anonymous Script %d").format(this._uniqueDisplayNameNumber); + }, + + get injected() + { + return this._injected; + }, + + get resource() + { + return this._resource; + }, + + canRequestContentFromBackend: function() + { + // We can request content if we have an id. + return !!this._id; + }, + + requestContentFromBackend: function(callback) + { + if (!this._id) { + // There is no identifier to request content with. Return false to cause the + // pending callbacks to get null content. + return false; + } + + DebuggerAgent.getScriptSource(this._id, callback); + return true; + }, + + // Private + + _resolveResource: function() + { + // FIXME: We should be able to associate a Script with a Resource through identifiers, + // we shouldn't need to lookup by URL, which is not safe with frames, where there might + // be multiple resources with the same URL. + // <rdar://problem/13373951> Scripts should be able to associate directly with a Resource + + // No URL, no resource. + if (!this._url) + return null; + + try { + // Try with the Script's full URL. + var resource = WebInspector.frameResourceManager.resourceForURL(this.url); + if (resource) + return resource; + + // Try with the Script's full decoded URL. + var decodedURL = decodeURI(this._url); + if (decodedURL !== this._url) { + resource = WebInspector.frameResourceManager.resourceForURL(decodedURL); + if (resource) + return resource; + } + + // Next try removing any fragment in the original URL. + var urlWithoutFragment = removeURLFragment(this._url); + if (urlWithoutFragment !== this._url) { + resource = WebInspector.frameResourceManager.resourceForURL(urlWithoutFragment); + if (resource) + return resource; + } + + // Finally try removing any fragment in the decoded URL. + var decodedURLWithoutFragment = removeURLFragment(decodedURL); + if (decodedURLWithoutFragment !== decodedURL) { + resource = WebInspector.frameResourceManager.resourceForURL(decodedURLWithoutFragment); + if (resource) + return resource; + } + } catch (e) { + // Ignore possible URIErrors. + } + + return null; + } +}; + +WebInspector.Script.prototype.__proto__ = WebInspector.SourceCode.prototype; |