diff options
Diffstat (limited to 'chrome/browser')
19 files changed, 72 insertions, 74 deletions
diff --git a/chrome/browser/autofill/autofill_download.cc b/chrome/browser/autofill/autofill_download.cc index ba8c63d..10617a3 100644 --- a/chrome/browser/autofill/autofill_download.cc +++ b/chrome/browser/autofill/autofill_download.cc @@ -97,7 +97,7 @@ bool AutoFillDownloadManager::StartUploadRequest( double upload_rate = form_was_matched ? GetPositiveUploadRate() : GetNegativeUploadRate(); if (base::RandDouble() > upload_rate) { - LOG(INFO) << "AutoFillDownloadManager: Upload request is ignored"; + VLOG(1) << "AutoFillDownloadManager: Upload request is ignored"; // If we ever need notification that upload was skipped, add it here. return false; } @@ -238,16 +238,16 @@ void AutoFillDownloadManager::OnURLFetchComplete(const URLFetcher* source, } } - LOG(INFO) << "AutoFillDownloadManager: " << type_of_request << - " request has failed with response" << response_code; + VLOG(1) << "AutoFillDownloadManager: " << type_of_request + << " request has failed with response" << response_code; if (observer_) { observer_->OnHeuristicsRequestError(it->second.form_signatures[0], it->second.request_type, response_code); } } else { - LOG(INFO) << "AutoFillDownloadManager: " << type_of_request << - " request has succeeded"; + VLOG(1) << "AutoFillDownloadManager: " << type_of_request + << " request has succeeded"; if (it->second.request_type == AutoFillDownloadManager::REQUEST_QUERY) { if (observer_) observer_->OnLoadedAutoFillHeuristics(data); diff --git a/chrome/browser/cocoa/install_from_dmg.mm b/chrome/browser/cocoa/install_from_dmg.mm index e702e64..df24d5c 100644 --- a/chrome/browser/cocoa/install_from_dmg.mm +++ b/chrome/browser/cocoa/install_from_dmg.mm @@ -393,8 +393,8 @@ bool MaybeInstallFromDiskImage() { if (![file_manager fileExistsAtPath:application_directory isDirectory:&is_directory] || !is_directory) { - LOG(INFO) << "No application directory at " - << [application_directory UTF8String]; + VLOG(1) << "No application directory at " + << [application_directory UTF8String]; return false; } @@ -404,14 +404,14 @@ bool MaybeInstallFromDiskImage() { [application_directory stringByAppendingPathComponent:application_name]; if ([file_manager fileExistsAtPath:target_path]) { - LOG(INFO) << "Something already exists at " << [target_path UTF8String]; + VLOG(1) << "Something already exists at " << [target_path UTF8String]; return false; } NSString* installer_path = [mac_util::MainAppBundle() pathForResource:@"install" ofType:@"sh"]; if (!installer_path) { - LOG(INFO) << "Could not locate install.sh"; + VLOG(1) << "Could not locate install.sh"; return false; } diff --git a/chrome/browser/cocoa/preferences_window_controller.mm b/chrome/browser/cocoa/preferences_window_controller.mm index cc15ac8..a323233 100644 --- a/chrome/browser/cocoa/preferences_window_controller.mm +++ b/chrome/browser/cocoa/preferences_window_controller.mm @@ -1637,9 +1637,8 @@ const int kDisabledIndex = 1; GoogleUpdateSettings::SetCollectStatsConsent(enabled); bool update_pref = GoogleUpdateSettings::GetCollectStatsConsent(); if (enabled != update_pref) { - DLOG(INFO) << - "GENERAL SECTION: Unable to set crash report status to " << - enabled; + DVLOG(1) << "GENERAL SECTION: Unable to set crash report status to " + << enabled; } // Only change the pref if GoogleUpdateSettings::GetCollectStatsConsent // succeeds. diff --git a/chrome/browser/debugger/extension_ports_remote_service.cc b/chrome/browser/debugger/extension_ports_remote_service.cc index 29cc11f..4fc4c68 100644 --- a/chrome/browser/debugger/extension_ports_remote_service.cc +++ b/chrome/browser/debugger/extension_ports_remote_service.cc @@ -203,7 +203,7 @@ void ExtensionPortsRemoteService::HandleMessage( } void ExtensionPortsRemoteService::OnConnectionLost() { - LOG(INFO) << "OnConnectionLost"; + VLOG(1) << "OnConnectionLost"; DCHECK_EQ(MessageLoop::current()->type(), MessageLoop::TYPE_UI); DCHECK(service_); for (PortIdSet::iterator it = openPortIds_.begin(); @@ -264,8 +264,7 @@ void ExtensionPortsRemoteService::OnExtensionMessageInvoke( void ExtensionPortsRemoteService::OnExtensionMessage( const std::string& message, int port_id) { - LOG(INFO) << "Message event: from port " << port_id - << ", < " << message << ">"; + VLOG(1) << "Message event: from port " << port_id << ", < " << message << ">"; // Transpose the information into a JSON message for the external client. DictionaryValue content; content.SetString(kCommandKey, kOnMessage); @@ -281,7 +280,7 @@ void ExtensionPortsRemoteService::OnExtensionMessage( } void ExtensionPortsRemoteService::OnExtensionPortDisconnected(int port_id) { - LOG(INFO) << "Disconnect event for port " << port_id; + VLOG(1) << "Disconnect event for port " << port_id; openPortIds_.erase(port_id); DictionaryValue content; content.SetString(kCommandKey, kOnDisconnect); @@ -316,32 +315,32 @@ void ExtensionPortsRemoteService::ConnectCommand( if (it != navcon_map.end()) tab_contents = it->second->tab_contents(); if (!tab_contents) { - LOG(INFO) << "tab not found: " << tab_id; + VLOG(1) << "tab not found: " << tab_id; response->SetInteger(kResultKey, RESULT_TAB_NOT_FOUND); return; } // Ask the ExtensionMessageService to open the channel. - LOG(INFO) << "Connect: extension_id <" << extension_id - << ">, channel_name <" << channel_name << ">" - << ", tab " << tab_id; + VLOG(1) << "Connect: extension_id <" << extension_id + << ">, channel_name <" << channel_name + << ">, tab " << tab_id; DCHECK(service_); port_id = service_->OpenSpecialChannelToTab( extension_id, channel_name, tab_contents, this); } else { // no tab: channel to an extension' background page / toolstrip. // Ask the ExtensionMessageService to open the channel. - LOG(INFO) << "Connect: extension_id <" << extension_id - << ">, channel_name <" << channel_name << ">"; + VLOG(1) << "Connect: extension_id <" << extension_id + << ">, channel_name <" << channel_name << ">"; DCHECK(service_); port_id = service_->OpenSpecialChannelToExtension( extension_id, channel_name, "null", this); } if (port_id == -1) { // Failure: probably the extension ID doesn't exist. - LOG(INFO) << "Connect failed"; + VLOG(1) << "Connect failed"; response->SetInteger(kResultKey, RESULT_CONNECT_FAILED); return; } - LOG(INFO) << "Connected: port " << port_id; + VLOG(1) << "Connected: port " << port_id; openPortIds_.insert(port_id); // Reply to external client with the port ID assigned to the new channel. DictionaryValue* reply_data = new DictionaryValue(); @@ -352,10 +351,10 @@ void ExtensionPortsRemoteService::ConnectCommand( void ExtensionPortsRemoteService::DisconnectCommand( int port_id, DictionaryValue* response) { - LOG(INFO) << "Disconnect port " << port_id; + VLOG(1) << "Disconnect port " << port_id; PortIdSet::iterator portEntry = openPortIds_.find(port_id); if (portEntry == openPortIds_.end()) { // unknown port ID. - LOG(INFO) << "unknown port: " << port_id; + VLOG(1) << "unknown port: " << port_id; response->SetInteger(kResultKey, RESULT_UNKNOWN_PORT); return; } @@ -375,11 +374,11 @@ void ExtensionPortsRemoteService::PostMessageCommand( std::string message; // Stringified the JSON message body. base::JSONWriter::Write(data, false, &message); - LOG(INFO) << "postMessage: port " << port_id - << ", message: <" << message << ">"; + VLOG(1) << "postMessage: port " << port_id + << ", message: <" << message << ">"; PortIdSet::iterator portEntry = openPortIds_.find(port_id); if (portEntry == openPortIds_.end()) { // Unknown port ID. - LOG(INFO) << "unknown port: " << port_id; + VLOG(1) << "unknown port: " << port_id; response->SetInteger(kResultKey, RESULT_UNKNOWN_PORT); return; } diff --git a/chrome/browser/dom_ui/filebrowse_ui.cc b/chrome/browser/dom_ui/filebrowse_ui.cc index 2e616ef..9a63394 100644 --- a/chrome/browser/dom_ui/filebrowse_ui.cc +++ b/chrome/browser/dom_ui/filebrowse_ui.cc @@ -1,4 +1,4 @@ -// Copyright (c) 2009 The Chromium Authors. All rights reserved. +// Copyright (c) 2010 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. @@ -521,8 +521,8 @@ void FilebrowseHandler::OnURLFetchComplete(const URLFetcher* source, const ResponseCookies& cookies, const std::string& data) { upload_response_code_ = response_code; - LOG(INFO) << "Response code:" << response_code; - LOG(INFO) << "request url" << url; + VLOG(1) << "Response code: " << response_code; + VLOG(1) << "Request url: " << url; if (StartsWithASCII(url.spec(), kPicasawebUserPrefix, true)) { BrowserThread::PostTask( BrowserThread::UI, FROM_HERE, diff --git a/chrome/browser/download/download_util.cc b/chrome/browser/download/download_util.cc index a0cd265..affa24a1 100644 --- a/chrome/browser/download/download_util.cc +++ b/chrome/browser/download/download_util.cc @@ -605,13 +605,13 @@ void UpdateAppIconDownloadProgress(int download_count, HRESULT result = taskbar.CreateInstance(CLSID_TaskbarList, NULL, CLSCTX_INPROC_SERVER); if (FAILED(result)) { - LOG(INFO) << "failed creating a TaskbarList object: " << result; + VLOG(1) << "Failed creating a TaskbarList object: " << result; return; } result = taskbar->HrInit(); if (FAILED(result)) { - LOG(ERROR) << "failed initializing an ITaskbarList3 interface."; + LOG(ERROR) << "Failed initializing an ITaskbarList3 interface."; return; } diff --git a/chrome/browser/first_run/first_run.cc b/chrome/browser/first_run/first_run.cc index 663c52d..54f030e 100644 --- a/chrome/browser/first_run/first_run.cc +++ b/chrome/browser/first_run/first_run.cc @@ -133,10 +133,10 @@ bool FirstRun::ProcessMasterPreferences(const FilePath& user_data_dir, ::ExitProcess(1); } if (retcode == installer_util::EULA_ACCEPTED) { - LOG(INFO) << "EULA : no collection"; + VLOG(1) << "EULA : no collection"; GoogleUpdateSettings::SetCollectStatsConsent(false); } else if (retcode == installer_util::EULA_ACCEPTED_OPT_IN) { - LOG(INFO) << "EULA : collection consent"; + VLOG(1) << "EULA : collection consent"; GoogleUpdateSettings::SetCollectStatsConsent(true); } } @@ -159,7 +159,7 @@ bool FirstRun::ProcessMasterPreferences(const FilePath& user_data_dir, #if defined(OS_WIN) DictionaryValue* extensions = 0; if (installer_util::HasExtensionsBlock(prefs.get(), &extensions)) { - LOG(INFO) << "Extensions block found in master preferences"; + VLOG(1) << "Extensions block found in master preferences"; DoDelayedInstallExtensions(); } #endif diff --git a/chrome/browser/history/history_backend.cc b/chrome/browser/history/history_backend.cc index 4b37ccd..fb8e3d3 100644 --- a/chrome/browser/history/history_backend.cc +++ b/chrome/browser/history/history_backend.cc @@ -602,7 +602,7 @@ void HistoryBackend::InitImpl(const std::string& languages) { if (history::TopSites::IsEnabled()) { // TODO(sky): fix when reenabling top sites migration. // if (db_->needs_version_18_migration()) { - // LOG(INFO) << "Starting TopSites migration"; + // VLOG(1) << "Starting TopSites migration"; // delegate_->StartTopSitesMigration(); // } } diff --git a/chrome/browser/history/top_sites.cc b/chrome/browser/history/top_sites.cc index 99e8b65..31ce4ac 100644 --- a/chrome/browser/history/top_sites.cc +++ b/chrome/browser/history/top_sites.cc @@ -658,13 +658,13 @@ void TopSites::StartQueryForMostVisited() { &cancelable_consumer_, NewCallback(this, &TopSites::OnTopSitesAvailable)); } else { - LOG(INFO) << "History Service not available."; + VLOG(1) << "History Service not available."; } } } void TopSites::StartMigration() { - LOG(INFO) << "Starting migration to TopSites."; + VLOG(1) << "Starting migration to TopSites."; migration_in_progress_ = true; StartQueryForMostVisited(); MigratePinnedURLs(); diff --git a/chrome/browser/importer/firefox_importer_utils.cc b/chrome/browser/importer/firefox_importer_utils.cc index 3552b7a..e223491 100644 --- a/chrome/browser/importer/firefox_importer_utils.cc +++ b/chrome/browser/importer/firefox_importer_utils.cc @@ -410,7 +410,7 @@ bool ParsePrefFile(const FilePath& pref_file, DictionaryValue* prefs) { if (IsStringUTF8(value)) prefs->SetString(key, value); else - LOG(INFO) << "Non UTF8 value for key " << key << ", ignored."; + VLOG(1) << "Non UTF8 value for key " << key << ", ignored."; continue; } @@ -421,8 +421,8 @@ bool ParsePrefFile(const FilePath& pref_file, DictionaryValue* prefs) { continue; } - LOG(ERROR) << "Invalid value found in Firefox pref file '" << - pref_file.value() << "' value is '" << value << "'."; + LOG(ERROR) << "Invalid value found in Firefox pref file '" + << pref_file.value() << "' value is '" << value << "'."; } return true; } @@ -434,7 +434,7 @@ std::string GetPrefsJsValue(const std::string& content, std::string("\", "); size_t prop_index = content.find(search_for); if (prop_index == std::string::npos) - return ""; + return std::string(); size_t start = prop_index + search_for.length(); size_t stop = std::string::npos; diff --git a/chrome/browser/importer/ie_importer.cc b/chrome/browser/importer/ie_importer.cc index 07b2d34..f2905dd 100644 --- a/chrome/browser/importer/ie_importer.cc +++ b/chrome/browser/importer/ie_importer.cc @@ -364,7 +364,7 @@ void IEImporter::ImportSearchEngines() { RegKey sub_key(HKEY_CURRENT_USER, sub_key_name.c_str(), KEY_READ); std::wstring wide_url; if (!sub_key.ReadValue(L"URL", &wide_url) || wide_url.empty()) { - LOG(INFO) << "No URL for IE search engine at " << key_iterator.Name(); + VLOG(1) << "No URL for IE search engine at " << key_iterator.Name(); ++key_iterator; continue; } @@ -375,7 +375,7 @@ void IEImporter::ImportSearchEngines() { if (!sub_key.ReadValue(NULL, &name) || name.empty()) { // Try the displayable name. if (!sub_key.ReadValue(L"DisplayName", &name) || name.empty()) { - LOG(INFO) << "No name for IE search engine at " << key_iterator.Name(); + VLOG(1) << "No name for IE search engine at " << key_iterator.Name(); ++key_iterator; continue; } diff --git a/chrome/browser/metrics/metrics_service.cc b/chrome/browser/metrics/metrics_service.cc index 37b79b7..1ddc987 100644 --- a/chrome/browser/metrics/metrics_service.cc +++ b/chrome/browser/metrics/metrics_service.cc @@ -656,7 +656,7 @@ void MetricsService::Observe(NotificationType type, HandleIdleSinceLastTransmission(false); if (current_log_) - DLOG(INFO) << "METRICS: NUMBER OF EVENTS = " << current_log_->num_events(); + DVLOG(1) << "METRICS: NUMBER OF EVENTS = " << current_log_->num_events(); } void MetricsService::HandleIdleSinceLastTransmission(bool in_idle) { @@ -1305,7 +1305,7 @@ void MetricsService::PreparePendingLogText() { if (Bzip2Compress(pending_log_text, &compressed_log_)) { // Allow security conscious users to see all metrics logs that we send. - LOG(INFO) << "COMPRESSED FOLLOWING METRICS LOG: " << pending_log_text; + VLOG(1) << "COMPRESSED FOLLOWING METRICS LOG: " << pending_log_text; } else { LOG(DFATAL) << "Failed to compress log for transmission."; // We can't discard the logs as other caller functions expect that @@ -1365,8 +1365,8 @@ void MetricsService::OnURLFetchComplete(const URLFetcher* source, current_fetch_.reset(NULL); // We're not allowed to re-use it. // Confirm send so that we can move on. - LOG(INFO) << "METRICS RESPONSE CODE: " << response_code << " status=" << - StatusToString(status); + VLOG(1) << "METRICS RESPONSE CODE: " << response_code + << " status=" << StatusToString(status); // Provide boolean for error recovery (allow us to ignore response_code). bool discard_log = false; @@ -1384,11 +1384,11 @@ void MetricsService::OnURLFetchComplete(const URLFetcher* source, } if (response_code != 200 && !discard_log) { - LOG(INFO) << "METRICS: transmission attempt returned a failure code: " - << response_code << ". Verify network connectivity"; + VLOG(1) << "METRICS: transmission attempt returned a failure code: " + << response_code << ". Verify network connectivity"; HandleBadResponseCode(); } else { // Successful receipt (or we are discarding log). - LOG(INFO) << "METRICS RESPONSE DATA: " << data; + VLOG(1) << "METRICS RESPONSE DATA: " << data; switch (state_) { case INITIAL_LOG_READY: state_ = SEND_OLD_INITIAL_LOGS; @@ -1438,10 +1438,10 @@ void MetricsService::OnURLFetchComplete(const URLFetcher* source, } void MetricsService::HandleBadResponseCode() { - LOG(INFO) << "Verify your metrics logs are formatted correctly. " - "Verify server is active at " << server_url_; + VLOG(1) << "Verify your metrics logs are formatted correctly. Verify server " + "is active at " << server_url_; if (!pending_log()) { - LOG(INFO) << "METRICS: Recorder shutdown during log transmission."; + VLOG(1) << "METRICS: Recorder shutdown during log transmission."; } else { // Send progressively less frequently. DCHECK(kBackoff > 1.0); @@ -1454,9 +1454,9 @@ void MetricsService::HandleBadResponseCode() { TimeDelta::FromSeconds(kMinSecondsPerLog); } - LOG(INFO) << "METRICS: transmission retry being scheduled in " << - interlog_duration_.InSeconds() << " seconds for " << - compressed_log_; + VLOG(1) << "METRICS: transmission retry being scheduled in " + << interlog_duration_.InSeconds() << " seconds for " + << compressed_log_; } } @@ -1464,18 +1464,18 @@ void MetricsService::GetSettingsFromResponseData(const std::string& data) { // We assume that the file is structured as a block opened by <response> // and that inside response, there is a block opened by tag <chrome_config> // other tags are ignored for now except the content of <chrome_config>. - LOG(INFO) << "METRICS: getting settings from response data: " << data; + VLOG(1) << "METRICS: getting settings from response data: " << data; int data_size = static_cast<int>(data.size()); if (data_size < 0) { - LOG(INFO) << "METRICS: server response data bad size: " << data_size << - "; aborting extraction of settings"; + VLOG(1) << "METRICS: server response data bad size: " << data_size + << "; aborting extraction of settings"; return; } xmlDocPtr doc = xmlReadMemory(data.c_str(), data_size, "", NULL, 0); // If the document is malformed, we just use the settings that were there. if (!doc) { - LOG(INFO) << "METRICS: reading xml from server response data failed"; + VLOG(1) << "METRICS: reading xml from server response data failed"; return; } diff --git a/chrome/browser/notifications/notification_ui_manager.cc b/chrome/browser/notifications/notification_ui_manager.cc index 42b9c5e..adc44cf 100644 --- a/chrome/browser/notifications/notification_ui_manager.cc +++ b/chrome/browser/notifications/notification_ui_manager.cc @@ -1,4 +1,4 @@ -// Copyright (c) 2009 The Chromium Authors. All rights reserved. +// Copyright (c) 2010 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. @@ -59,8 +59,8 @@ void NotificationUIManager::Add(const Notification& notification, return; } - LOG(INFO) << "Added notification. URL: " - << notification.content_url().spec().c_str(); + VLOG(1) << "Added notification. URL: " + << notification.content_url().spec(); show_queue_.push_back( new QueuedNotification(notification, profile)); CheckAndShowNotifications(); diff --git a/chrome/browser/password_manager/password_store_x.cc b/chrome/browser/password_manager/password_store_x.cc index 6e39215..cc827dd 100644 --- a/chrome/browser/password_manager/password_store_x.cc +++ b/chrome/browser/password_manager/password_store_x.cc @@ -170,7 +170,7 @@ void PasswordStoreX::CheckMigration() { migration_checked_ = true; ssize_t migrated = MigrateLogins(); if (migrated > 0) { - LOG(INFO) << "Migrated " << migrated << " passwords to native store."; + VLOG(1) << "Migrated " << migrated << " passwords to native store."; } else if (migrated == 0) { // As long as we are able to migrate some passwords, we know the native // store is working. But if there is nothing to migrate, the "migration" diff --git a/chrome/browser/policy/config_dir_policy_provider.cc b/chrome/browser/policy/config_dir_policy_provider.cc index 3598f71..6fe7630 100644 --- a/chrome/browser/policy/config_dir_policy_provider.cc +++ b/chrome/browser/policy/config_dir_policy_provider.cc @@ -87,7 +87,7 @@ void PolicyDirLoader::Reload() { // There's a change, report it! if (changed) { - LOG(INFO) << "Policy reload from " << config_dir_.value() << " succeeded."; + VLOG(1) << "Policy reload from " << config_dir_.value() << " succeeded."; origin_loop_->PostTask(FROM_HERE, NewRunnableMethod(this, &PolicyDirLoader::NotifyPolicyChanged)); } diff --git a/chrome/browser/service/service_process_control.cc b/chrome/browser/service/service_process_control.cc index fcef987..534cc5a 100644 --- a/chrome/browser/service/service_process_control.cc +++ b/chrome/browser/service/service_process_control.cc @@ -102,7 +102,7 @@ void ServiceProcessControl::ConnectInternal() { } // Actually going to connect. - LOG(INFO) << "Connecting to Service Process IPC Server"; + VLOG(1) << "Connecting to Service Process IPC Server"; // Run the IPC channel on the shared IO thread. base::Thread* io_thread = g_browser_process->io_thread(); diff --git a/chrome/browser/ssl/ssl_error_handler.cc b/chrome/browser/ssl/ssl_error_handler.cc index fb26005..d05c17f 100644 --- a/chrome/browser/ssl/ssl_error_handler.cc +++ b/chrome/browser/ssl/ssl_error_handler.cc @@ -130,7 +130,7 @@ void SSLErrorHandler::CompleteCancelRequest(int error) { if (request) { // The request can be NULL if it was cancelled by the renderer (as the // result of the user navigating to a new page from the location bar). - DLOG(INFO) << "CompleteCancelRequest() url: " << request->url().spec(); + DVLOG(1) << "CompleteCancelRequest() url: " << request->url().spec(); SSLCertErrorHandler* cert_error = AsSSLCertErrorHandler(); if (cert_error) request->SimulateSSLError(error, cert_error->ssl_info()); @@ -157,7 +157,7 @@ void SSLErrorHandler::CompleteContinueRequest() { if (request) { // The request can be NULL if it was cancelled by the renderer (as the // result of the user navigating to a new page from the location bar). - DLOG(INFO) << "CompleteContinueRequest() url: " << request->url().spec(); + DVLOG(1) << "CompleteContinueRequest() url: " << request->url().spec(); request->ContinueDespiteLastError(); } request_has_been_notified_ = true; diff --git a/chrome/browser/ssl/ssl_manager.cc b/chrome/browser/ssl/ssl_manager.cc index 6b4f731..c894a44 100644 --- a/chrome/browser/ssl/ssl_manager.cc +++ b/chrome/browser/ssl/ssl_manager.cc @@ -27,8 +27,8 @@ void SSLManager::OnSSLCertificateError(ResourceDispatcherHost* rdh, URLRequest* request, int cert_error, net::X509Certificate* cert) { - DLOG(INFO) << "OnSSLCertificateError() cert_error: " << cert_error << - " url: " << request->url().spec(); + DVLOG(1) << "OnSSLCertificateError() cert_error: " << cert_error + << " url: " << request->url().spec(); ResourceDispatcherHostRequestInfo* info = ResourceDispatcherHost::InfoForRequest(request); diff --git a/chrome/browser/themes/browser_theme_provider.cc b/chrome/browser/themes/browser_theme_provider.cc index fde7ea5..58a6c31 100644 --- a/chrome/browser/themes/browser_theme_provider.cc +++ b/chrome/browser/themes/browser_theme_provider.cc @@ -574,7 +574,7 @@ void BrowserThemeProvider::LoadThemePrefs() { } void BrowserThemeProvider::NotifyThemeChanged(Extension* extension) { - LOG(INFO) << "Sending BROWSER_THEME_CHANGED"; + VLOG(1) << "Sending BROWSER_THEME_CHANGED"; // Redraw! NotificationService* service = NotificationService::current(); service->Notify(NotificationType::BROWSER_THEME_CHANGED, |