JSMutationCallback.cpp [plain text]
#include "config.h"
#include "JSMutationCallback.h"
#include "JSDOMGlobalObject.h"
#include "JSMainThreadExecState.h"
#include "JSMainThreadExecStateInstrumentation.h"
#include "JSMutationObserver.h"
#include "JSMutationRecord.h"
#include "ScriptExecutionContext.h"
#include <heap/WeakInlines.h>
#include <runtime/JSLock.h>
using namespace JSC;
namespace WebCore {
JSMutationCallback::JSMutationCallback(JSObject* callback, JSDOMGlobalObject* globalObject)
: ActiveDOMCallback(globalObject->scriptExecutionContext())
, m_callback(callback)
, m_isolatedWorld(&globalObject->world())
{
}
JSMutationCallback::~JSMutationCallback()
{
}
void JSMutationCallback::call(const Vector<RefPtr<MutationRecord>>& mutations, MutationObserver* observer)
{
if (!canInvokeCallback())
return;
Ref<JSMutationCallback> protect(*this);
JSLockHolder lock(m_isolatedWorld->vm());
if (!m_callback)
return;
JSValue callback = m_callback.get();
CallData callData;
CallType callType = getCallData(callback, callData);
if (callType == CallTypeNone) {
ASSERT_NOT_REACHED();
return;
}
ScriptExecutionContext* context = scriptExecutionContext();
if (!context)
return;
ASSERT(context->isDocument());
JSDOMGlobalObject* globalObject = toJSDOMGlobalObject(context, *m_isolatedWorld);
ExecState* exec = globalObject->globalExec();
JSValue jsObserver = toJS(exec, globalObject, observer);
MarkedArgumentBuffer args;
args.append(jsArray(exec, globalObject, mutations));
args.append(jsObserver);
InspectorInstrumentationCookie cookie = JSMainThreadExecState::instrumentFunctionCall(context, callType, callData);
JSValue exception;
JSMainThreadExecState::call(exec, callback, callType, callData, jsObserver, args, &exception);
InspectorInstrumentation::didCallFunction(cookie, context);
if (exception)
reportException(exec, exception);
}
}