diff options
5 files changed, 60 insertions, 42 deletions
diff --git a/chrome/browser/extensions/all_urls_apitest.cc b/chrome/browser/extensions/all_urls_apitest.cc index 87f2101..2a26d15 100644 --- a/chrome/browser/extensions/all_urls_apitest.cc +++ b/chrome/browser/extensions/all_urls_apitest.cc @@ -15,8 +15,11 @@ const std::string kAllUrlsTarget = typedef ExtensionApiTest AllUrlsApiTest; -// Sometimes hangs: http://crbug.com/57694 -IN_PROC_BROWSER_TEST_F(AllUrlsApiTest, FLAKY_WhitelistedExtension) { +// Note: This test is flaky, but is actively being worked on. +// Finnur is adding traces to figure out where the problem lies and +// needs to check in these traces because the problem doesn't repro +// locally (or on the try bots). +IN_PROC_BROWSER_TEST_F(AllUrlsApiTest, WhitelistedExtension) { Extension::emit_traces_for_whitelist_extension_test_ = true; // First load the two extension. @@ -27,11 +30,11 @@ IN_PROC_BROWSER_TEST_F(AllUrlsApiTest, FLAKY_WhitelistedExtension) { ExtensionsService* service = browser()->profile()->GetExtensionsService(); const size_t size_before = service->extensions()->size(); - std::cout << "***** LoadExtension1 called \n" << std::flush; + printf("***** LoadExtension1 called \n"); ASSERT_TRUE(LoadExtension(extension_dir1)); - std::cout << "***** LoadExtension2 called \n" << std::flush; + printf("***** LoadExtension2 called \n"); ASSERT_TRUE(LoadExtension(extension_dir2)); - std::cout << "***** LoadExtensions done \n" << std::flush; + printf("***** LoadExtensions done \n"); EXPECT_EQ(size_before + 2, service->extensions()->size()); Extension* extensionA = service->extensions()->at(size_before); Extension* extensionB = service->extensions()->at(size_before + 1); @@ -45,72 +48,72 @@ IN_PROC_BROWSER_TEST_F(AllUrlsApiTest, FLAKY_WhitelistedExtension) { // Ideally, we'd set the whitelist first and then load the extensions. // However, we can't reliably know the ids of the extensions until we load // them so we reload them so that the whitelist is in effect from the start. - std::cout << "***** ReloadExtension1 called \n" << std::flush; + printf("***** ReloadExtension1 called \n"); ReloadExtension(extensionA->id()); - std::cout << "***** ReloadExtension2 called \n" << std::flush; + printf("***** ReloadExtension2 called \n"); ReloadExtension(extensionB->id()); - std::cout << "***** ReloadExtensions done \n" << std::flush; + printf("***** ReloadExtensions done \n"); std::string url; // Now verify we run content scripts on chrome://newtab/. url = "chrome://newtab/"; - std::cout << "***** " << url.c_str() << "\n" << std::flush; + printf("***** %s\n", url.c_str()); ExtensionTestMessageListener listener1a("content script: " + url, false); ExtensionTestMessageListener listener1b("execute: " + url, false); ui_test_utils::NavigateToURL(browser(), GURL(url)); - std::cout << "***** Wait 1a\n" << std::flush; + printf("***** Wait 1a\n"); ASSERT_TRUE(listener1a.WaitUntilSatisfied()); - std::cout << "***** Wait 1b\n" << std::flush; + printf("***** Wait 1b\n"); ASSERT_TRUE(listener1b.WaitUntilSatisfied()); // Now verify data: urls. url = "data:text/html;charset=utf-8,<html>asdf</html>"; - std::cout << "***** " << url.c_str() << "\n" << std::flush; + printf("***** %s\n", url.c_str()); ExtensionTestMessageListener listener2a("content script: " + url, false); ExtensionTestMessageListener listener2b("execute: " + url, false); ui_test_utils::NavigateToURL(browser(), GURL(url)); - std::cout << "***** Wait 2a\n" << std::flush; + printf("***** Wait 2a\n"); ASSERT_TRUE(listener2a.WaitUntilSatisfied()); - std::cout << "***** Wait 2b\n" << std::flush; + printf("***** Wait 2b\n"); ASSERT_TRUE(listener2b.WaitUntilSatisfied()); // Now verify about:version. url = "about:version"; - std::cout << "***** " << url.c_str() << "\n" << std::flush; + printf("***** %s\n", url.c_str()); ExtensionTestMessageListener listener3a("content script: " + url, false); ExtensionTestMessageListener listener3b("execute: " + url, false); ui_test_utils::NavigateToURL(browser(), GURL(url)); - std::cout << "***** Wait 3a\n" << std::flush; + printf("***** Wait 3a\n"); ASSERT_TRUE(listener3a.WaitUntilSatisfied()); - std::cout << "***** Wait 3b\n" << std::flush; + printf("***** Wait 3b\n"); ASSERT_TRUE(listener3b.WaitUntilSatisfied()); // Now verify about:blank. url = "about:blank"; - std::cout << "***** " << url.c_str() << "\n" << std::flush; + printf("***** %s\n", url.c_str()); ExtensionTestMessageListener listener4a("content script: " + url, false); ExtensionTestMessageListener listener4b("execute: " + url, false); ui_test_utils::NavigateToURL(browser(), GURL(url)); - std::cout << "***** Wait 4a\n" << std::flush; + printf("***** Wait 4a\n"); ASSERT_TRUE(listener4a.WaitUntilSatisfied()); - std::cout << "***** Wait 4b\n" << std::flush; + printf("***** Wait 4b\n"); ASSERT_TRUE(listener4b.WaitUntilSatisfied()); // Now verify we can script a regular http page. ASSERT_TRUE(test_server()->Start()); GURL page_url = test_server()->GetURL(kAllUrlsTarget); - std::cout << "***** " << page_url.spec().c_str() << "\n" << std::flush; + printf("***** %s\n", page_url.spec().c_str()); ExtensionTestMessageListener listener5a("content script: " + page_url.spec(), false); ExtensionTestMessageListener listener5b("execute: " + page_url.spec(), false); ui_test_utils::NavigateToURL(browser(), page_url); - std::cout << "***** Wait 5a\n" << std::flush; + printf("***** Wait 5a\n"); ASSERT_TRUE(listener5a.WaitUntilSatisfied()); - std::cout << "***** Wait 5b\n" << std::flush; + printf("***** Wait 5b\n"); ASSERT_TRUE(listener5b.WaitUntilSatisfied()); - std::cout << "***** DONE!\n" << std::flush; + printf("***** DONE!\n"); } // Test that an extension NOT whitelisted for scripting can ask for <all_urls> diff --git a/chrome/browser/extensions/execute_code_in_tab_function.cc b/chrome/browser/extensions/execute_code_in_tab_function.cc index b7bf999..40719eb 100644 --- a/chrome/browser/extensions/execute_code_in_tab_function.cc +++ b/chrome/browser/extensions/execute_code_in_tab_function.cc @@ -30,6 +30,8 @@ ExecuteCodeInTabFunction::~ExecuteCodeInTabFunction() { } bool ExecuteCodeInTabFunction::RunImpl() { + if (Extension::emit_traces_for_whitelist_extension_test_) + printf("***** ExecuteCodeInTabFunction::RunImpl() runs\n"); DictionaryValue* script_info; EXTENSION_FUNCTION_VALIDATE(args_->GetDictionary(1, &script_info)); size_t number_of_value = script_info->size(); @@ -87,8 +89,12 @@ bool ExecuteCodeInTabFunction::RunImpl() { &host_permissions, NULL, &error_)) { + if (Extension::emit_traces_for_whitelist_extension_test_) + printf("***** CANNOT EXECUTE!! \n"); return false; } + if (Extension::emit_traces_for_whitelist_extension_test_) + printf("***** ALLOWED to execute. \n"); if (script_info->HasKey(keys::kAllFramesKey)) { if (!script_info->GetBoolean(keys::kAllFramesKey, &all_frames_)) diff --git a/chrome/browser/renderer_host/browser_render_process_host.cc b/chrome/browser/renderer_host/browser_render_process_host.cc index 392b10f..521b934 100644 --- a/chrome/browser/renderer_host/browser_render_process_host.cc +++ b/chrome/browser/renderer_host/browser_render_process_host.cc @@ -77,9 +77,6 @@ using WebKit::WebCache; #include "third_party/skia/include/core/SkBitmap.h" -// TODO(finnur): Remove after capturing debug info. -#include <iostream> - // This class creates the IO thread for the renderer when running in // single-process mode. It's not used in multi-process mode. class RendererMainThread : public base::Thread { @@ -709,8 +706,11 @@ void BrowserRenderProcessHost::SendExtensionInfo() { info.host_permissions = extension->host_permissions(); // TODO(finnur): Remove after capturing debug info. - if (Extension::emit_traces_for_whitelist_extension_test_) - std::cout << "*-*-* Sending down: " << info.allowed_to_execute_script_everywhere << " for CanExecuteEverywhere \n" << std::flush; + if (Extension::emit_traces_for_whitelist_extension_test_) { + printf("*-*-* Sending down: %d for %s\n", + info.allowed_to_execute_script_everywhere, + info.name.c_str()); + } // The icon in the page is 96px. We'd rather not scale up, so use 128. info.icon_url = extension->GetIconURL(Extension::EXTENSION_ICON_LARGE, diff --git a/chrome/common/extensions/extension.cc b/chrome/common/extensions/extension.cc index 2f7e2e7..973346c 100644 --- a/chrome/common/extensions/extension.cc +++ b/chrome/common/extensions/extension.cc @@ -40,7 +40,8 @@ #include "third_party/skia/include/core/SkBitmap.h" #include "webkit/glue/image_decoder.h" -// TODO(finur): Remove once I have one failed run of the Whitelist extension test. +// TODO(finur): Remove once I have one failed run of the Whitelist extension +// test. #include <iostream> namespace keys = extension_manifest_keys; @@ -1912,12 +1913,12 @@ static std::string SizeToString(const gfx::Size& max_size) { // static void Extension::SetScriptingWhitelist( const std::vector<std::string>& whitelist) { - ScriptingWhitelist* current_whitelist = - ExtensionConfig::GetSingleton()->whitelist(); - current_whitelist->clear(); - for (ScriptingWhitelist::const_iterator it = whitelist.begin(); - it != whitelist.end(); ++it) { - current_whitelist->push_back(*it); + ScriptingWhitelist* current_whitelist = + ExtensionConfig::GetSingleton()->whitelist(); + current_whitelist->clear(); + for (ScriptingWhitelist::const_iterator it = whitelist.begin(); + it != whitelist.end(); ++it) { + current_whitelist->push_back(*it); } } @@ -2078,6 +2079,8 @@ bool Extension::CanExecuteScriptOnPage( switches::kAllowScriptingGallery)) { if (error) *error = errors::kCannotScriptGallery; + if (Extension::emit_traces_for_whitelist_extension_test_) + printf("***** CANNOT SCRIPT GALLERY!! \n"); return false; } @@ -2086,10 +2089,14 @@ bool Extension::CanExecuteScriptOnPage( if ((*host_permissions)[i].MatchesUrl(page_url)) return true; } + if (Extension::emit_traces_for_whitelist_extension_test_) + printf("***** HAS NO HOST PERMISSIONS!! \n"); } if (script) { if (script->MatchesUrl(page_url)) return true; + if (Extension::emit_traces_for_whitelist_extension_test_) + printf("***** HAS NO SCRIPT PERMISSIONS!! \n"); } if (error) { @@ -2148,28 +2155,29 @@ bool Extension::IsAPIPermission(const std::string& str) { } bool Extension::CanExecuteScriptEverywhere() const { - if (location() == Extension::COMPONENT) + if (location() == Extension::COMPONENT) { + if (emit_traces_for_whitelist_extension_test_) + printf("***** CAN execute (is component)\n"); return true; + } ScriptingWhitelist* whitelist = ExtensionConfig::GetSingleton()->whitelist(); if (emit_traces_for_whitelist_extension_test_) - std::cout << "***** CanExecuteScriptEverywhere() called \n" << std::flush; + printf("***** CanExecuteScriptEverywhere() called \n"); for (ScriptingWhitelist::const_iterator it = whitelist->begin(); it != whitelist->end(); ++it) { - if (emit_traces_for_whitelist_extension_test_) - std::cout << "***** " << id() << " == " << *it << "\n" << std::flush; if (id() == *it) { if (emit_traces_for_whitelist_extension_test_) - std::cout << "***** CAN execute\n" << std::flush; + printf("***** CAN execute\n"); return true; } } if (emit_traces_for_whitelist_extension_test_) - std::cout << "***** Can NOT execute \n" << std::flush; + printf("***** Can NOT execute \n"); return false; } diff --git a/chrome/test/data/extensions/api_test/all_urls/execute_script/background.html b/chrome/test/data/extensions/api_test/all_urls/execute_script/background.html index b7c4032..66689c6 100644 --- a/chrome/test/data/extensions/api_test/all_urls/execute_script/background.html +++ b/chrome/test/data/extensions/api_test/all_urls/execute_script/background.html @@ -9,6 +9,7 @@ console.log('EXECUTE SCRIPT background page runs');
chrome.tabs.onUpdated.addListener(function(tabId, changeInfo, tab) {
+ console.log('EXECUTE SCRIPT receives onUpdated for: ' + tab.url);
chrome.tabs.executeScript(tabId, {file: "execute_script.js"})
});
|