Changeset 244919 in webkit
- Timestamp:
- May 3, 2019 2:03:34 PM (5 years ago)
- Location:
- trunk
- Files:
-
- 2 added
- 15 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/ChangeLog
r244907 r244919 1 2019-05-03 Basuke Suzuki <Basuke.Suzuki@sony.com> 2 3 [WinCairo] Implement and enable RemoteInspector Server. 4 https://bugs.webkit.org/show_bug.cgi?id=197432 5 6 Reviewed by Ross Kirsling. 7 8 Add new build flag USE_INSPECTOR_SOCKET_SERVER to indicate using Socket implementation for RemoteInspector 9 protocol. Currently PlayStation is the only platform which uses this. WinCairo is the second one. 10 11 * Source/cmake/OptionsPlayStation.cmake: 12 * Source/cmake/OptionsWin.cmake: 13 * Source/cmake/OptionsWinCairo.cmake: 14 1 15 2019-05-03 Commit Queue <commit-queue@webkit.org> 2 16 -
trunk/Source/JavaScriptCore/ChangeLog
r244915 r244919 1 2019-05-03 Basuke Suzuki <Basuke.Suzuki@sony.com> 2 3 [WinCairo] Implement and enable RemoteInspector Server. 4 https://bugs.webkit.org/show_bug.cgi?id=197432 5 6 Reviewed by Ross Kirsling. 7 8 Implement Windows implementation for Socket Backend of RemoteInspector and enable it on WinCairo 9 for experimental feature. 10 11 Also add listener interface for connection between RemoteInspector and RemoteInspectorServer 12 for flexible configuration. 13 14 * PlatformWin.cmake: 15 * inspector/remote/RemoteInspector.h: 16 * inspector/remote/socket/RemoteInspectorConnectionClient.h: 17 (Inspector::RemoteInspectorConnectionClient::didAccept): 18 * inspector/remote/socket/RemoteInspectorServer.cpp: 19 (Inspector::RemoteInspectorServer::connect): 20 (Inspector::RemoteInspectorServer::listenForTargets): 21 (Inspector::RemoteInspectorServer::didAccept): 22 (Inspector::RemoteInspectorServer::dispatchMap): 23 (Inspector::RemoteInspectorServer::start): 24 (Inspector::RemoteInspectorServer::addServerConnection): Deleted. 25 * inspector/remote/socket/RemoteInspectorServer.h: 26 (Inspector::RemoteInspectorServer::RemoteInspectorServer): 27 * inspector/remote/socket/RemoteInspectorSocket.cpp: 28 (Inspector::RemoteInspector::RemoteInspector): 29 (Inspector::RemoteInspector::dispatchMap): 30 (Inspector::RemoteInspector::start): 31 (Inspector::RemoteInspector::stopInternal): 32 (Inspector::RemoteInspector::setServerPort): 33 * inspector/remote/socket/RemoteInspectorSocket.h: 34 * inspector/remote/socket/RemoteInspectorSocketEndpoint.cpp: 35 (Inspector::RemoteInspectorSocketEndpoint::listenInet): 36 (Inspector::RemoteInspectorSocketEndpoint::getPort const): 37 (Inspector::RemoteInspectorSocketEndpoint::acceptInetSocketIfEnabled): 38 * inspector/remote/socket/RemoteInspectorSocketEndpoint.h: 39 * inspector/remote/socket/posix/RemoteInspectorSocketPOSIX.cpp: 40 (Inspector::Socket::init): Added. 41 (Inspector::Socket::listen): Signature changed. 42 (Inspector::Socket::getPort): Added. 43 * inspector/remote/socket/win/RemoteInspectorSocketWin.cpp: Added. 44 (Inspector::Socket::init): 45 (Inspector::Socket::Socket::Socket): 46 (Inspector::Socket::Socket::~Socket): 47 (Inspector::Socket::Socket::close): 48 (Inspector::Socket::Socket::operator PlatformSocketType const): 49 (Inspector::Socket::Socket::operator bool const): 50 (Inspector::Socket::Socket::leak): 51 (Inspector::Socket::Socket::create): 52 (Inspector::Socket::setOpt): 53 (Inspector::Socket::setOptEnabled): 54 (Inspector::Socket::enableOpt): 55 (Inspector::Socket::connectTo): 56 (Inspector::Socket::bindAndListen): 57 (Inspector::Socket::connect): 58 (Inspector::Socket::listen): 59 (Inspector::Socket::accept): 60 (Inspector::Socket::createPair): 61 (Inspector::Socket::setup): 62 (Inspector::Socket::isValid): 63 (Inspector::Socket::isListening): 64 (Inspector::Socket::getPort): 65 (Inspector::Socket::read): 66 (Inspector::Socket::write): 67 (Inspector::Socket::close): 68 (Inspector::Socket::preparePolling): 69 (Inspector::Socket::poll): 70 (Inspector::Socket::isReadable): 71 (Inspector::Socket::isWritable): 72 (Inspector::Socket::markWaitingWritable): 73 (Inspector::Socket::clearWaitingWritable): 74 1 75 2019-05-03 Yusuke Suzuki <ysuzuki@apple.com> 2 76 -
trunk/Source/JavaScriptCore/PlatformWin.cmake
r228898 r244919 33 33 endif () 34 34 35 list(REMOVE_ITEM JavaScriptCore_SOURCES 36 inspector/JSGlobalObjectInspectorController.cpp 37 ) 35 if (ENABLE_REMOTE_INSPECTOR) 36 list(APPEND JavaScriptCore_PRIVATE_INCLUDE_DIRECTORIES 37 "${JAVASCRIPTCORE_DIR}/inspector/remote/socket" 38 ) 39 40 list(APPEND JavaScriptCore_PRIVATE_FRAMEWORK_HEADERS 41 inspector/remote/RemoteAutomationTarget.h 42 inspector/remote/RemoteConnectionToTarget.h 43 inspector/remote/RemoteControllableTarget.h 44 inspector/remote/RemoteInspectionTarget.h 45 inspector/remote/RemoteInspector.h 46 47 inspector/remote/socket/RemoteInspectorConnectionClient.h 48 inspector/remote/socket/RemoteInspectorMessageParser.h 49 inspector/remote/socket/RemoteInspectorServer.h 50 inspector/remote/socket/RemoteInspectorSocket.h 51 inspector/remote/socket/RemoteInspectorSocketEndpoint.h 52 ) 53 54 list(APPEND JavaScriptCore_SOURCES 55 API/JSRemoteInspector.cpp 56 57 inspector/remote/RemoteAutomationTarget.cpp 58 inspector/remote/RemoteConnectionToTarget.cpp 59 inspector/remote/RemoteControllableTarget.cpp 60 inspector/remote/RemoteInspectionTarget.cpp 61 inspector/remote/RemoteInspector.cpp 62 63 inspector/remote/socket/RemoteInspectorConnectionClient.cpp 64 inspector/remote/socket/RemoteInspectorMessageParser.cpp 65 inspector/remote/socket/RemoteInspectorServer.cpp 66 inspector/remote/socket/RemoteInspectorSocket.cpp 67 inspector/remote/socket/RemoteInspectorSocketEndpoint.cpp 68 69 inspector/remote/socket/win/RemoteInspectorSocketWin.cpp 70 ) 71 72 list(APPEND JavaScriptCore_LIBRARIES 73 wsock32 ws2_32 74 ) 75 else () 76 list(REMOVE_ITEM JavaScriptCore_SOURCES 77 inspector/JSGlobalObjectInspectorController.cpp 78 ) 79 endif () 38 80 39 81 file(COPY -
trunk/Source/JavaScriptCore/inspector/remote/RemoteInspector.h
r244861 r244919 54 54 #endif 55 55 56 #if PLATFORM(PLAYSTATION)56 #if USE(INSPECTOR_SOCKET_SERVER) 57 57 #include "RemoteConnectionToTarget.h" 58 58 #include "RemoteInspectorConnectionClient.h" … … 78 78 #if PLATFORM(COCOA) 79 79 : public RemoteInspectorXPCConnection::Client 80 #elif PLATFORM(PLAYSTATION)80 #elif USE(INSPECTOR_SOCKET_SERVER) 81 81 : public RemoteInspectorConnectionClient 82 82 #endif … … 147 147 void requestAutomationSession(const char* sessionID, const Client::SessionCapabilities&); 148 148 #endif 149 #if USE(GLIB) || PLATFORM(PLAYSTATION)149 #if USE(GLIB) || USE(INSPECTOR_SOCKET_SERVER) 150 150 void setup(TargetID); 151 151 void sendMessageToTarget(TargetID, const char* message); 152 152 #endif 153 #if PLATFORM(PLAYSTATION)153 #if USE(INSPECTOR_SOCKET_SERVER) 154 154 static void setConnectionIdentifier(PlatformSocketType); 155 static void setServerPort(uint16_t); 155 156 #endif 156 157 … … 209 210 void receivedAutomationSessionRequestMessage(NSDictionary *userInfo); 210 211 #endif 211 #if PLATFORM(PLAYSTATION)212 #if USE(INSPECTOR_SOCKET_SERVER) 212 213 HashMap<String, CallHandler>& dispatchMap() override; 213 214 void didClose(ConnectionID) override; … … 240 241 #endif 241 242 242 #if PLATFORM(PLAYSTATION)243 #if USE(INSPECTOR_SOCKET_SERVER) 243 244 std::unique_ptr<RemoteInspectorSocketEndpoint> m_socketConnection; 244 245 static PlatformSocketType s_connectionIdentifier; 246 static uint16_t s_serverPort; 245 247 Optional<ConnectionID> m_clientID; 246 248 #endif -
trunk/Source/JavaScriptCore/inspector/remote/socket/RemoteInspectorConnectionClient.h
r244657 r244919 28 28 #if ENABLE(REMOTE_INSPECTOR) 29 29 30 #include "RemoteControllableTarget.h" 30 31 #include "RemoteInspectorSocketEndpoint.h" 31 32 #include <wtf/WeakPtr.h> … … 37 38 public: 38 39 void didReceiveWebInspectorEvent(ConnectionID, Vector<uint8_t>&&); 39 virtual void didAccept(ConnectionID , Socket::Domain) { };40 virtual void didAccept(ConnectionID acceptedID, ConnectionID listenerID, Socket::Domain) { }; 40 41 virtual void didClose(ConnectionID) = 0; 41 42 -
trunk/Source/JavaScriptCore/inspector/remote/socket/RemoteInspectorServer.cpp
r244657 r244919 34 34 namespace Inspector { 35 35 36 void RemoteInspectorServer::addServerConnection(PlatformSocketType identifier) 37 { 38 if (!m_server) 39 return; 40 41 if (auto id = m_server->createClient(identifier)) { 36 Optional<PlatformSocketType> RemoteInspectorServer::connect() 37 { 38 if (!m_server) { 39 LOG_ERROR("Inspector server is not running"); 40 return WTF::nullopt; 41 } 42 43 if (auto sockets = Socket::createPair()) { 44 if (auto id = m_server->createClient(sockets->at(0))) { 45 LockHolder lock(m_connectionsLock); 46 m_inspectorConnections.append(id.value()); 47 48 return sockets->at(1); 49 } 50 } 51 52 return WTF::nullopt; 53 } 54 55 Optional<uint16_t> RemoteInspectorServer::listenForTargets() 56 { 57 if (!m_server) { 58 LOG_ERROR("Inspector server is not running"); 59 return WTF::nullopt; 60 } 61 62 if (m_inspectorListener) { 63 LOG_ERROR("Inspector server is already listening for targets."); 64 return WTF::nullopt; 65 } 66 67 if (auto connection = m_server->listenInet("127.0.0.1", 0)) { 68 m_inspectorListener = connection; 69 return m_server->getPort(*connection); 70 } 71 72 return WTF::nullopt; 73 } 74 75 void RemoteInspectorServer::didAccept(ConnectionID acceptedID, ConnectionID listenerID, Socket::Domain type) 76 { 77 ASSERT(!isMainThread()); 78 79 if (type == Socket::Domain::Local || (m_inspectorListener && listenerID == *m_inspectorListener)) { 42 80 LockHolder lock(m_connectionsLock); 43 m_inspectorConnections.append(id.value()); 44 } 45 } 46 47 void RemoteInspectorServer::didAccept(ConnectionID id, Socket::Domain type) 48 { 49 ASSERT(!isMainThread()); 50 51 if (type == Socket::Domain::Network) { 81 m_inspectorConnections.append(acceptedID); 82 } else if (type == Socket::Domain::Network) { 52 83 if (m_clientConnection) { 53 84 LOG_ERROR("Inspector server can accept only 1 client"); 54 85 return; 55 86 } 56 m_clientConnection = id; 57 } else if (type == Socket::Domain::Local) { 58 LockHolder lock(m_connectionsLock); 59 m_inspectorConnections.append(id); 87 m_clientConnection = acceptedID; 60 88 } 61 89 } … … 82 110 { 83 111 static NeverDestroyed<HashMap<String, CallHandler>> dispatchMap = HashMap<String, CallHandler>({ 84 { "SetTargetList"_s, &RemoteInspectorServer::setTargetList},85 { "SetupInspectorClient"_s, &RemoteInspectorServer::setupInspectorClient},86 { "Setup"_s, &RemoteInspectorServer::setup},87 { "FrontendDidClose"_s, &RemoteInspectorServer::close},88 { "SendMessageToFrontend"_s, &RemoteInspectorServer::sendMessageToFrontend},89 { "SendMessageToBackend"_s, &RemoteInspectorServer::sendMessageToBackend},112 { "SetTargetList"_s, reinterpret_cast<CallHandler>(&RemoteInspectorServer::setTargetList) }, 113 { "SetupInspectorClient"_s, reinterpret_cast<CallHandler>(&RemoteInspectorServer::setupInspectorClient) }, 114 { "Setup"_s, reinterpret_cast<CallHandler>(&RemoteInspectorServer::setup) }, 115 { "FrontendDidClose"_s, reinterpret_cast<CallHandler>(&RemoteInspectorServer::close) }, 116 { "SendMessageToFrontend"_s, reinterpret_cast<CallHandler>(&RemoteInspectorServer::sendMessageToFrontend) }, 117 { "SendMessageToBackend"_s, reinterpret_cast<CallHandler>(&RemoteInspectorServer::sendMessageToBackend) }, 90 118 }); 91 119 … … 109 137 m_server = RemoteInspectorSocketEndpoint::create(this, "RemoteInspectorServer"); 110 138 111 if (!m_server->listenInet( port)) {139 if (!m_server->listenInet(nullptr, port)) { 112 140 m_server = nullptr; 113 141 return false; -
trunk/Source/JavaScriptCore/inspector/remote/socket/RemoteInspectorServer.h
r244657 r244919 44 44 bool isRunning() const { return !!m_server; } 45 45 46 JS_EXPORT_PRIVATE void addServerConnection(PlatformSocketType); 46 JS_EXPORT_PRIVATE Optional<uint16_t> listenForTargets(); 47 JS_EXPORT_PRIVATE Optional<PlatformSocketType> connect(); 47 48 48 49 private: 50 friend class NeverDestroyed<RemoteInspectorServer>; 51 RemoteInspectorServer() { Socket::init(); } 52 49 53 void connectionClosed(ConnectionID); 50 54 … … 59 63 void clientConnectionClosed(); 60 64 61 void didAccept(ConnectionID , Socket::Domain) override;65 void didAccept(ConnectionID acceptedID, ConnectionID listenerID, Socket::Domain) override; 62 66 void didClose(ConnectionID) override; 63 67 … … 73 77 Lock m_connectionsLock; 74 78 79 // Listener for targets. 80 Optional<ConnectionID> m_inspectorListener; 81 75 82 // Connections from RemoteInspectorClient. 76 83 Optional<ConnectionID> m_clientConnection; -
trunk/Source/JavaScriptCore/inspector/remote/socket/RemoteInspectorSocket.cpp
r244861 r244919 40 40 41 41 PlatformSocketType RemoteInspector::s_connectionIdentifier = INVALID_SOCKET_VALUE; 42 uint16_t RemoteInspector::s_serverPort = 0; 42 43 43 44 RemoteInspector& RemoteInspector::singleton() … … 49 50 RemoteInspector::RemoteInspector() 50 51 { 51 start();52 Socket::init(); 52 53 } 53 54 … … 66 67 { 67 68 static NeverDestroyed<HashMap<String, CallHandler>> methods = HashMap<String, CallHandler>({ 68 { "GetTargetList"_s, static_cast<CallHandler>(&RemoteInspector::receivedGetTargetListMessage)},69 { "Setup"_s, static_cast<CallHandler>(&RemoteInspector::receivedSetupMessage)},70 { "SendMessageToTarget"_s, static_cast<CallHandler>(&RemoteInspector::receivedDataMessage)},71 { "FrontendDidClose"_s, static_cast<CallHandler>(&RemoteInspector::receivedCloseMessage)},69 { "GetTargetList"_s, static_cast<CallHandler>(&RemoteInspector::receivedGetTargetListMessage) }, 70 { "Setup"_s, static_cast<CallHandler>(&RemoteInspector::receivedSetupMessage) }, 71 { "SendMessageToTarget"_s, static_cast<CallHandler>(&RemoteInspector::receivedDataMessage) }, 72 { "FrontendDidClose"_s, static_cast<CallHandler>(&RemoteInspector::receivedCloseMessage) }, 72 73 }); 73 74 … … 88 89 LockHolder lock(m_mutex); 89 90 90 if (m_enabled || s_connectionIdentifier == INVALID_SOCKET_VALUE)91 if (m_enabled || (s_connectionIdentifier == INVALID_SOCKET_VALUE && !s_serverPort)) 91 92 return; 92 93 … … 95 96 m_socketConnection = RemoteInspectorSocketEndpoint::create(this, "RemoteInspector"); 96 97 97 m_clientID = m_socketConnection->createClient(s_connectionIdentifier); 98 if (s_connectionIdentifier) { 99 m_clientID = m_socketConnection->createClient(s_connectionIdentifier); 100 s_connectionIdentifier = INVALID_SOCKET_VALUE; 101 } else 102 m_clientID = m_socketConnection->connectInet("127.0.0.1", s_serverPort); 98 103 99 104 if (!m_targetMap.isEmpty()) … … 118 123 m_socketConnection = nullptr; 119 124 m_clientID = WTF::nullopt; 120 s_connectionIdentifier = INVALID_SOCKET_VALUE;121 125 } 122 126 … … 292 296 } 293 297 298 void RemoteInspector::setServerPort(uint16_t port) 299 { 300 RemoteInspector::s_serverPort = port; 301 } 302 294 303 } // namespace Inspector 295 304 -
trunk/Source/JavaScriptCore/inspector/remote/socket/RemoteInspectorSocket.h
r244657 r244919 67 67 }; 68 68 69 void init(); 70 69 71 Optional<PlatformSocketType> connect(const char* serverAddress, uint16_t serverPort); 70 Optional<PlatformSocketType> listen( uint16_t port);72 Optional<PlatformSocketType> listen(const char* address, uint16_t port); 71 73 Optional<PlatformSocketType> accept(PlatformSocketType); 72 74 Optional<std::array<PlatformSocketType, 2>> createPair(); … … 75 77 bool isValid(PlatformSocketType); 76 78 bool isListening(PlatformSocketType); 79 uint16_t getPort(PlatformSocketType); 77 80 78 81 Optional<size_t> read(PlatformSocketType, void* buffer, int bufferSize); -
trunk/Source/JavaScriptCore/inspector/remote/socket/RemoteInspectorSocketEndpoint.cpp
r244657 r244919 77 77 } 78 78 79 bool RemoteInspectorSocketEndpoint::listenInet(uint16_t port) 80 { 81 if (auto socket = Socket::listen(port)) { 82 if (createClient(*socket)) 83 return true; 84 } 85 86 return false; 79 Optional<ConnectionID> RemoteInspectorSocketEndpoint::listenInet(const char* address, uint16_t port) 80 { 81 if (auto socket = Socket::listen(address, port)) 82 return createClient(*socket); 83 84 return WTF::nullopt; 87 85 } 88 86 … … 162 160 } 163 161 162 Optional<uint16_t> RemoteInspectorSocketEndpoint::getPort(ConnectionID id) const 163 { 164 LockHolder lock(m_connectionsLock); 165 if (const auto& connection = m_connections.get(id)) 166 return Socket::getPort(connection->socket); 167 168 return WTF::nullopt; 169 } 170 164 171 void RemoteInspectorSocketEndpoint::recvIfEnabled(ConnectionID id) 165 172 { … … 247 254 if (auto newID = createClient(*socket)) { 248 255 if (m_inspectorClient) { 249 m_inspectorClient->didAccept(newID.value(), Socket::Domain::Network);256 m_inspectorClient->didAccept(newID.value(), id, Socket::Domain::Network); 250 257 return; 251 258 } -
trunk/Source/JavaScriptCore/inspector/remote/socket/RemoteInspectorSocketEndpoint.h
r244657 r244919 54 54 55 55 Optional<ConnectionID> connectInet(const char* serverAddr, uint16_t serverPort); 56 bool listenInet(uint16_t port);56 Optional<ConnectionID> listenInet(const char* address, uint16_t port); 57 57 58 58 void send(ConnectionID, const uint8_t* data, size_t); 59 59 60 60 Optional<ConnectionID> createClient(PlatformSocketType fd); 61 62 Optional<uint16_t> getPort(ConnectionID) const; 61 63 62 64 protected: … … 68 70 bool isListening(ConnectionID); 69 71 70 Lock m_connectionsLock;72 mutable Lock m_connectionsLock; 71 73 HashMap<ConnectionID, std::unique_ptr<Socket::Connection>> m_connections; 72 74 -
trunk/Source/JavaScriptCore/inspector/remote/socket/posix/RemoteInspectorSocketPOSIX.cpp
r244501 r244919 40 40 namespace Socket { 41 41 42 void init() 43 { 44 } 45 42 46 Optional<PlatformSocketType> connect(const char* serverAddress, uint16_t serverPort) 43 47 { … … 64 68 } 65 69 66 Optional<PlatformSocketType> listen( uint16_t port)70 Optional<PlatformSocketType> listen(const char* addressStr, uint16_t port) 67 71 { 68 72 struct sockaddr_in address = { }; … … 88 92 // FIXME: Support AF_INET6 connections. 89 93 address.sin_family = AF_INET; 90 address.sin_addr.s_addr = htonl(INADDR_ANY); 94 if (addressStr) 95 inet_aton(addressStr, &address.sin_addr); 96 else 97 address.sin_addr.s_addr = htonl(INADDR_ANY); 91 98 address.sin_port = htons(port); 92 99 error = ::bind(fdListen, (struct sockaddr*)&address, sizeof(address)); … … 156 163 } 157 164 165 uint16_t getPort(PlatformSocketType socket) 166 { 167 ASSERT(isValid(socket)); 168 169 struct sockaddr_in address = { }; 170 int len = sizeof(address); 171 getsockname(socket, reinterpret_cast<struct sockaddr*>(&address), &len); 172 return address.sin_port; 173 } 174 158 175 Optional<size_t> read(PlatformSocketType socket, void* buffer, int bufferSize) 159 176 { -
trunk/Source/cmake/OptionsPlayStation.cmake
r244859 r244919 109 109 SET_AND_EXPOSE_TO_BUILD(USE_HARFBUZZ ON) 110 110 SET_AND_EXPOSE_TO_BUILD(USE_LIBWPE ON) 111 SET_AND_EXPOSE_TO_BUILD(USE_INSPECTOR_SOCKET_SERVER ENABLE_REMOTE_INSPECTOR) 111 112 112 113 # Rendering options -
trunk/Source/cmake/OptionsWin.cmake
r244741 r244919 68 68 WEBKIT_OPTION_DEFAULT_PORT_VALUE(ENABLE_XSLT PUBLIC ON) 69 69 70 WEBKIT_OPTION_DEFAULT_PORT_VALUE(ENABLE_REMOTE_INSPECTOR PRIVATE OFF)71 70 WEBKIT_OPTION_DEFAULT_PORT_VALUE(ENABLE_SMOOTH_SCROLLING PRIVATE OFF) 72 71 WEBKIT_OPTION_DEFAULT_PORT_VALUE(ENABLE_USER_MESSAGE_HANDLERS PRIVATE OFF) … … 93 92 WEBKIT_OPTION_DEFAULT_PORT_VALUE(ENABLE_SERVICE_WORKER PRIVATE ${ENABLE_EXPERIMENTAL_FEATURES}) 94 93 WEBKIT_OPTION_DEFAULT_PORT_VALUE(ENABLE_VARIATION_FONTS PRIVATE ${ENABLE_EXPERIMENTAL_FEATURES}) 94 WEBKIT_OPTION_DEFAULT_PORT_VALUE(ENABLE_REMOTE_INSPECTOR PRIVATE ${ENABLE_EXPERIMENTAL_FEATURES}) 95 95 96 96 # FIXME: Implement plugin process on Modern WebKit. https://bugs.webkit.org/show_bug.cgi?id=185313 … … 101 101 WEBKIT_OPTION_DEFAULT_PORT_VALUE(ENABLE_PUBLIC_SUFFIX_LIST PRIVATE OFF) 102 102 WEBKIT_OPTION_DEFAULT_PORT_VALUE(ENABLE_WEBGL PUBLIC OFF) 103 WEBKIT_OPTION_DEFAULT_PORT_VALUE(ENABLE_REMOTE_INSPECTOR PRIVATE OFF) 103 104 WEBKIT_OPTION_DEFAULT_PORT_VALUE(USE_VERSION_STAMPER PRIVATE ON) 104 105 endif () -
trunk/Source/cmake/OptionsWinCairo.cmake
r244541 r244919 29 29 SET_AND_EXPOSE_TO_BUILD(USE_TEXTURE_MAPPER_GL ON) 30 30 SET_AND_EXPOSE_TO_BUILD(USE_MEDIA_FOUNDATION ON) 31 SET_AND_EXPOSE_TO_BUILD(USE_INSPECTOR_SOCKET_SERVER ENABLE_REMOTE_INSPECTOR) 31 32 32 33 set(ENABLE_GRAPHICS_CONTEXT_3D ON)
Note: See TracChangeset
for help on using the changeset viewer.