WebCore/inspector/InjectedScript.cpp
changeset 0 4f2f89ce4247
equal deleted inserted replaced
-1:000000000000 0:4f2f89ce4247
       
     1 /*
       
     2  * Copyright (C) 2010 Google Inc. All rights reserved.
       
     3  *
       
     4  * Redistribution and use in source and binary forms, with or without
       
     5  * modification, are permitted provided that the following conditions are
       
     6  * met:
       
     7  *
       
     8  *     * Redistributions of source code must retain the above copyright
       
     9  * notice, this list of conditions and the following disclaimer.
       
    10  *     * Redistributions in binary form must reproduce the above
       
    11  * copyright notice, this list of conditions and the following disclaimer
       
    12  * in the documentation and/or other materials provided with the
       
    13  * distribution.
       
    14  *     * Neither the name of Google Inc. nor the names of its
       
    15  * contributors may be used to endorse or promote products derived from
       
    16  * this software without specific prior written permission.
       
    17  *
       
    18  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
       
    19  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
       
    20  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
       
    21  * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
       
    22  * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
       
    23  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
       
    24  * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
       
    25  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
       
    26  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
       
    27  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
       
    28  * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
       
    29  */
       
    30 
       
    31 #include "config.h"
       
    32 #include "InjectedScript.h"
       
    33 
       
    34 #if ENABLE(INSPECTOR)
       
    35 
       
    36 #include "PlatformString.h"
       
    37 #include "SerializedScriptValue.h"
       
    38 #include "ScriptFunctionCall.h"
       
    39 
       
    40 namespace WebCore {
       
    41 
       
    42 InjectedScript::InjectedScript(ScriptObject injectedScriptObject)
       
    43     : m_injectedScriptObject(injectedScriptObject)
       
    44 {
       
    45 }
       
    46 
       
    47 void InjectedScript::dispatch(long callId, const String& methodName, const String& arguments, bool async, RefPtr<SerializedScriptValue>* result, bool* hadException) 
       
    48 {
       
    49     ASSERT(!hasNoValue());
       
    50     if (!canAccessInspectedWindow()) {
       
    51         *hadException = true;
       
    52         return;
       
    53     }
       
    54 
       
    55     ScriptFunctionCall function(m_injectedScriptObject, "dispatch");
       
    56     function.appendArgument(methodName);
       
    57     function.appendArgument(arguments);
       
    58     if (async)
       
    59         function.appendArgument(callId);
       
    60     *hadException = false;
       
    61     ScriptValue resultValue = function.call(*hadException);
       
    62     if (!*hadException)
       
    63         *result = resultValue.serialize(m_injectedScriptObject.scriptState());
       
    64 }
       
    65 
       
    66 #if ENABLE(JAVASCRIPT_DEBUGGER)
       
    67 PassRefPtr<SerializedScriptValue> InjectedScript::callFrames()
       
    68 {
       
    69     ASSERT(!hasNoValue());
       
    70     ScriptFunctionCall function(m_injectedScriptObject, "callFrames");
       
    71     ScriptValue callFramesValue = function.call();
       
    72     return callFramesValue.serialize(m_injectedScriptObject.scriptState());
       
    73 }
       
    74 #endif
       
    75 
       
    76 PassRefPtr<SerializedScriptValue> InjectedScript::wrapForConsole(ScriptValue value)
       
    77 {
       
    78     ASSERT(!hasNoValue());
       
    79     ScriptFunctionCall wrapFunction(m_injectedScriptObject, "wrapObjectForConsole");
       
    80     wrapFunction.appendArgument(value);
       
    81     wrapFunction.appendArgument(canAccessInspectedWindow());
       
    82     bool hadException = false;
       
    83     ScriptValue r = wrapFunction.call(hadException);
       
    84     if (hadException)
       
    85         return SerializedScriptValue::create("<exception>");
       
    86     return r.serialize(m_injectedScriptObject.scriptState());
       
    87 }
       
    88 
       
    89 void InjectedScript::releaseWrapperObjectGroup(const String& objectGroup)
       
    90 {
       
    91     ASSERT(!hasNoValue());
       
    92     ScriptFunctionCall releaseFunction(m_injectedScriptObject, "releaseWrapperObjectGroup");
       
    93     releaseFunction.appendArgument(objectGroup);
       
    94     releaseFunction.call();
       
    95 }
       
    96 bool InjectedScript::canAccessInspectedWindow()
       
    97 {
       
    98     return InjectedScriptHost::canAccessInspectedWindow(m_injectedScriptObject.scriptState());
       
    99 }
       
   100 
       
   101 } // namespace WebCore
       
   102 
       
   103 #endif // ENABLE(INSPECTOR)