Unreviewed. Build fix after r107806
* inspector/InjectedScript.cpp:
(WebCore::InjectedScript::callFunctionWithEvalEnabled):
* inspector/InjectedScript.h:
(InjectedScript):
git-svn-id: http://svn.webkit.org/repository/webkit/trunk@107808
268f45cc-cd09-0410-ab3c-
d52691b4dbfc
2012-02-15 Yury Semikhatsky <yurys@chromium.org>
+ Unreviewed. Build fix after r107806
+
+ * inspector/InjectedScript.cpp:
+ (WebCore::InjectedScript::callFunctionWithEvalEnabled):
+ * inspector/InjectedScript.h:
+ (InjectedScript):
+
+2012-02-15 Yury Semikhatsky <yurys@chromium.org>
+
Web Inspector: crash when inspecting an element on a page with eval disabled by CSP
https://bugs.webkit.org/show_bug.cgi?id=78705
return m_inspectedStateAccessCheck(m_injectedScriptObject.scriptState());
}
-ScriptValue InjectedScript::callFunctionWithEvalEnabled(ScriptFunctionCall& function, bool& hadException)
+ScriptValue InjectedScript::callFunctionWithEvalEnabled(ScriptFunctionCall& function, bool& hadException) const
{
DOMWindow* domWindow = domWindowFromScriptState(m_injectedScriptObject.scriptState());
InspectorInstrumentationCookie cookie = domWindow && domWindow->frame() ? InspectorInstrumentation::willCallFunction(domWindow->frame()->page(), "InjectedScript", 1) : InspectorInstrumentationCookie();
InjectedScript(ScriptObject, InspectedStateAccessCheck);
bool canAccessInspectedWindow() const;
- ScriptValue callFunctionWithEvalEnabled(ScriptFunctionCall&, bool& hadException);
+ ScriptValue callFunctionWithEvalEnabled(ScriptFunctionCall&, bool& hadException) const;
void makeCall(ScriptFunctionCall&, RefPtr<InspectorValue>* result);
void makeEvalCall(ErrorString*, ScriptFunctionCall&, RefPtr<InspectorObject>* result, bool* wasThrown);
ScriptValue nodeAsScriptValue(Node*);