Proxy for debugging transformed code
First Claim
Patent Images
1. A non-transitory computer-readable medium embodying a proxy executable in at least one computing device, wherein when executed the proxy causes the at least one computing device to at least:
- receive a request from a debugging application executed in a client device to obtain transformed code from a first server;
obtain the transformed code from the first server;
determine a version of the transformed code;
automatically obtain a source map corresponding to the version of the transformed code from a second server;
automatically modify the transformed code to include the source map or a reference to the source map;
sign the transformed code using a certificate trusted by the debugging application; and
return the transformed code and the source map to the debugging application.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are various embodiments for a proxy that enables debugging of transformed code. A proxy receives a request from a client application to obtain transformed code from a first server. The proxy obtains the transformed code from the first server, and the proxy obtains a source map corresponding to the transformed code from a second server. The proxy then returns the transformed code and the source map to the client application.
-
Citations
20 Claims
-
1. A non-transitory computer-readable medium embodying a proxy executable in at least one computing device, wherein when executed the proxy causes the at least one computing device to at least:
-
receive a request from a debugging application executed in a client device to obtain transformed code from a first server; obtain the transformed code from the first server; determine a version of the transformed code; automatically obtain a source map corresponding to the version of the transformed code from a second server; automatically modify the transformed code to include the source map or a reference to the source map; sign the transformed code using a certificate trusted by the debugging application; and return the transformed code and the source map to the debugging application. - View Dependent Claims (2, 3)
-
-
4. A system, comprising:
-
at least one computing device; and a proxy executable in a hardware processor of the at least one computing device, wherein when executed the proxy causes the at least one computing device to at least; receive a request from a client application to obtain transformed code from a first server; obtain the transformed code from the first server; obtain a source map corresponding to the transformed code from a second server; modify the transformed code to include a uniform resource locator (URL) of the source map; sign the transformed code using a certificate trusted by the client application; and return the transformed code and the source map to the client application. - View Dependent Claims (5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method, comprising:
-
receiving, via at least one of one or more computing devices, a request from a client application to obtain transformed code from a first server; obtaining, via at least one of the one or more computing devices, the transformed code from the first server; determining, via at least one of the one or more computing devices, a unique identifier of a source map corresponding to the transformed code by applying a hashing function to the transformed code; automatically requesting, via at least one of the one or more computing devices, the source map from a second server based at least in part on the unique identifier of the transformed code; and returning, via at least one of the one or more computing devices, the transformed code and the source map to the client application. - View Dependent Claims (17, 18, 19, 20)
-
Specification