chore: remove Breakpad tests for crashReporter on Linux (#31729)
This commit is contained in:
parent
97eb424450
commit
daed10512d
1 changed files with 408 additions and 442 deletions
|
@ -138,16 +138,10 @@ function waitForNewFileInDir (dir: string): Promise<string[]> {
|
|||
|
||||
// TODO(nornagon): Fix tests on linux/arm.
|
||||
ifdescribe(!isLinuxOnArm && !process.mas && !process.env.DISABLE_CRASH_REPORTER_TESTS)('crashReporter module', function () {
|
||||
// TODO(nornagon): remove linux/breakpad tests once breakpad support is fully
|
||||
// removed.
|
||||
for (const enableLinuxCrashpad of (process.platform === 'linux' ? [false] : [false])) {
|
||||
const withLinuxCrashpad = enableLinuxCrashpad || (process.platform === 'linux');
|
||||
const crashpadExtraArgs = enableLinuxCrashpad ? ['--enable-crashpad'] : [];
|
||||
describe(withLinuxCrashpad ? '(with crashpad)' : '', () => {
|
||||
describe('should send minidump', () => {
|
||||
it('when renderer crashes', async () => {
|
||||
const { port, waitForCrash } = await startServer();
|
||||
runCrashApp('renderer', port, crashpadExtraArgs);
|
||||
runCrashApp('renderer', port);
|
||||
const crash = await waitForCrash();
|
||||
checkCrash('renderer', crash);
|
||||
expect(crash.mainProcessSpecific).to.be.undefined();
|
||||
|
@ -155,7 +149,7 @@ ifdescribe(!isLinuxOnArm && !process.mas && !process.env.DISABLE_CRASH_REPORTER_
|
|||
|
||||
it('when sandboxed renderer crashes', async () => {
|
||||
const { port, waitForCrash } = await startServer();
|
||||
runCrashApp('sandboxed-renderer', port, crashpadExtraArgs);
|
||||
runCrashApp('sandboxed-renderer', port);
|
||||
const crash = await waitForCrash();
|
||||
checkCrash('renderer', crash);
|
||||
expect(crash.mainProcessSpecific).to.be.undefined();
|
||||
|
@ -166,7 +160,7 @@ ifdescribe(!isLinuxOnArm && !process.mas && !process.env.DISABLE_CRASH_REPORTER_
|
|||
// out why.
|
||||
ifit(!isLinuxOnArm)('when main process crashes', async () => {
|
||||
const { port, waitForCrash } = await startServer();
|
||||
runCrashApp('main', port, crashpadExtraArgs);
|
||||
runCrashApp('main', port);
|
||||
const crash = await waitForCrash();
|
||||
checkCrash('browser', crash);
|
||||
expect(crash.mainProcessSpecific).to.equal('mps');
|
||||
|
@ -174,7 +168,7 @@ ifdescribe(!isLinuxOnArm && !process.mas && !process.env.DISABLE_CRASH_REPORTER_
|
|||
|
||||
ifit(!isLinuxOnArm)('when a node process crashes', async () => {
|
||||
const { port, waitForCrash } = await startServer();
|
||||
runCrashApp('node', port, crashpadExtraArgs);
|
||||
runCrashApp('node', port);
|
||||
const crash = await waitForCrash();
|
||||
checkCrash('node', crash);
|
||||
expect(crash.mainProcessSpecific).to.be.undefined();
|
||||
|
@ -185,7 +179,7 @@ ifdescribe(!isLinuxOnArm && !process.mas && !process.env.DISABLE_CRASH_REPORTER_
|
|||
for (const processType of ['main', 'renderer', 'sandboxed-renderer']) {
|
||||
it(`when ${processType} crashes`, async () => {
|
||||
const { port, waitForCrash } = await startServer();
|
||||
runCrashApp(processType, port, crashpadExtraArgs);
|
||||
runCrashApp(processType, port);
|
||||
const crash = await waitForCrash();
|
||||
expect(crash.guid).to.be.a('string');
|
||||
});
|
||||
|
@ -196,13 +190,13 @@ ifdescribe(!isLinuxOnArm && !process.mas && !process.env.DISABLE_CRASH_REPORTER_
|
|||
let crash2Guid;
|
||||
{
|
||||
const { port, waitForCrash } = await startServer();
|
||||
runCrashApp('main', port, crashpadExtraArgs);
|
||||
runCrashApp('main', port);
|
||||
const crash = await waitForCrash();
|
||||
crash1Guid = crash.guid;
|
||||
}
|
||||
{
|
||||
const { port, waitForCrash } = await startServer();
|
||||
runCrashApp('main', port, crashpadExtraArgs);
|
||||
runCrashApp('main', port);
|
||||
const crash = await waitForCrash();
|
||||
crash2Guid = crash.guid;
|
||||
}
|
||||
|
@ -213,7 +207,7 @@ ifdescribe(!isLinuxOnArm && !process.mas && !process.env.DISABLE_CRASH_REPORTER_
|
|||
describe('with extra parameters', () => {
|
||||
it('when renderer crashes', async () => {
|
||||
const { port, waitForCrash } = await startServer();
|
||||
runCrashApp('renderer', port, ['--set-extra-parameters-in-renderer', ...crashpadExtraArgs]);
|
||||
runCrashApp('renderer', port, ['--set-extra-parameters-in-renderer']);
|
||||
const crash = await waitForCrash();
|
||||
checkCrash('renderer', crash);
|
||||
expect(crash.mainProcessSpecific).to.be.undefined();
|
||||
|
@ -223,7 +217,7 @@ ifdescribe(!isLinuxOnArm && !process.mas && !process.env.DISABLE_CRASH_REPORTER_
|
|||
|
||||
it('when sandboxed renderer crashes', async () => {
|
||||
const { port, waitForCrash } = await startServer();
|
||||
runCrashApp('sandboxed-renderer', port, ['--set-extra-parameters-in-renderer', ...crashpadExtraArgs]);
|
||||
runCrashApp('sandboxed-renderer', port, ['--set-extra-parameters-in-renderer']);
|
||||
const crash = await waitForCrash();
|
||||
checkCrash('renderer', crash);
|
||||
expect(crash.mainProcessSpecific).to.be.undefined();
|
||||
|
@ -232,7 +226,7 @@ ifdescribe(!isLinuxOnArm && !process.mas && !process.env.DISABLE_CRASH_REPORTER_
|
|||
});
|
||||
|
||||
it('contains v8 crash keys when a v8 crash occurs', async () => {
|
||||
const { remotely } = await startRemoteControlApp(crashpadExtraArgs);
|
||||
const { remotely } = await startRemoteControlApp();
|
||||
const { port, waitForCrash } = await startServer();
|
||||
|
||||
await remotely((port: number) => {
|
||||
|
@ -274,7 +268,7 @@ ifdescribe(!isLinuxOnArm && !process.mas && !process.env.DISABLE_CRASH_REPORTER_
|
|||
|
||||
it('should truncate extra values longer than 5 * 4096 characters', async () => {
|
||||
const { port, waitForCrash } = await startServer();
|
||||
const { remotely } = await startRemoteControlApp(crashpadExtraArgs);
|
||||
const { remotely } = await startRemoteControlApp();
|
||||
remotely((port: number) => {
|
||||
require('electron').crashReporter.start({
|
||||
submitURL: `http://127.0.0.1:${port}`,
|
||||
|
@ -285,13 +279,13 @@ ifdescribe(!isLinuxOnArm && !process.mas && !process.env.DISABLE_CRASH_REPORTER_
|
|||
setTimeout(() => process.crash());
|
||||
}, port);
|
||||
const crash = await waitForCrash();
|
||||
expect(stitchLongCrashParam(crash, 'longParam')).to.have.lengthOf(160 * 127 + (withLinuxCrashpad ? 159 : 0), 'crash should have truncated longParam');
|
||||
expect(stitchLongCrashParam(crash, 'longParam')).to.have.lengthOf(160 * 127 + (process.platform === 'linux' ? 159 : 0), 'crash should have truncated longParam');
|
||||
});
|
||||
|
||||
it('should omit extra keys with names longer than the maximum', async () => {
|
||||
const kKeyLengthMax = 39;
|
||||
const { port, waitForCrash } = await startServer();
|
||||
const { remotely } = await startRemoteControlApp(crashpadExtraArgs);
|
||||
const { remotely } = await startRemoteControlApp();
|
||||
remotely((port: number, kKeyLengthMax: number) => {
|
||||
require('electron').crashReporter.start({
|
||||
submitURL: `http://127.0.0.1:${port}`,
|
||||
|
@ -319,35 +313,35 @@ ifdescribe(!isLinuxOnArm && !process.mas && !process.env.DISABLE_CRASH_REPORTER_
|
|||
describe('globalExtra', () => {
|
||||
ifit(!isLinuxOnArm)('should be sent with main process dumps', async () => {
|
||||
const { port, waitForCrash } = await startServer();
|
||||
runCrashApp('main', port, ['--add-global-param=globalParam:globalValue', ...crashpadExtraArgs]);
|
||||
runCrashApp('main', port, ['--add-global-param=globalParam:globalValue']);
|
||||
const crash = await waitForCrash();
|
||||
expect(crash.globalParam).to.equal('globalValue');
|
||||
});
|
||||
|
||||
it('should be sent with renderer process dumps', async () => {
|
||||
const { port, waitForCrash } = await startServer();
|
||||
runCrashApp('renderer', port, ['--add-global-param=globalParam:globalValue', ...crashpadExtraArgs]);
|
||||
runCrashApp('renderer', port, ['--add-global-param=globalParam:globalValue']);
|
||||
const crash = await waitForCrash();
|
||||
expect(crash.globalParam).to.equal('globalValue');
|
||||
});
|
||||
|
||||
it('should be sent with sandboxed renderer process dumps', async () => {
|
||||
const { port, waitForCrash } = await startServer();
|
||||
runCrashApp('sandboxed-renderer', port, ['--add-global-param=globalParam:globalValue', ...crashpadExtraArgs]);
|
||||
runCrashApp('sandboxed-renderer', port, ['--add-global-param=globalParam:globalValue']);
|
||||
const crash = await waitForCrash();
|
||||
expect(crash.globalParam).to.equal('globalValue');
|
||||
});
|
||||
|
||||
ifit(!isLinuxOnArm)('should not be overridden by extra in main process', async () => {
|
||||
const { port, waitForCrash } = await startServer();
|
||||
runCrashApp('main', port, ['--add-global-param=mainProcessSpecific:global', ...crashpadExtraArgs]);
|
||||
runCrashApp('main', port, ['--add-global-param=mainProcessSpecific:global']);
|
||||
const crash = await waitForCrash();
|
||||
expect(crash.mainProcessSpecific).to.equal('global');
|
||||
});
|
||||
|
||||
ifit(!isLinuxOnArm)('should not be overridden by extra in renderer process', async () => {
|
||||
const { port, waitForCrash } = await startServer();
|
||||
runCrashApp('main', port, ['--add-global-param=rendererSpecific:global', ...crashpadExtraArgs]);
|
||||
runCrashApp('main', port, ['--add-global-param=rendererSpecific:global']);
|
||||
const crash = await waitForCrash();
|
||||
expect(crash.rendererSpecific).to.equal('global');
|
||||
});
|
||||
|
@ -357,7 +351,7 @@ ifdescribe(!isLinuxOnArm && !process.mas && !process.env.DISABLE_CRASH_REPORTER_
|
|||
ifit(!isWindowsOnArm)('should not send a minidump when uploadToServer is false', async () => {
|
||||
const { port, waitForCrash, getCrashes } = await startServer();
|
||||
waitForCrash().then(() => expect.fail('expected not to receive a dump'));
|
||||
await runCrashApp('renderer', port, ['--no-upload', ...crashpadExtraArgs]);
|
||||
await runCrashApp('renderer', port, ['--no-upload']);
|
||||
// wait a sec in case the crash reporter is about to upload a crash
|
||||
await delay(1000);
|
||||
expect(getCrashes()).to.have.length(0);
|
||||
|
@ -365,7 +359,7 @@ ifdescribe(!isLinuxOnArm && !process.mas && !process.env.DISABLE_CRASH_REPORTER_
|
|||
|
||||
describe('getUploadedReports', () => {
|
||||
it('returns an array of reports', async () => {
|
||||
const { remotely } = await startRemoteControlApp(crashpadExtraArgs);
|
||||
const { remotely } = await startRemoteControlApp();
|
||||
await remotely(() => {
|
||||
require('electron').crashReporter.start({ submitURL: 'http://127.0.0.1' });
|
||||
});
|
||||
|
@ -377,7 +371,7 @@ ifdescribe(!isLinuxOnArm && !process.mas && !process.env.DISABLE_CRASH_REPORTER_
|
|||
// TODO(nornagon): re-enable on woa
|
||||
ifdescribe(!isWindowsOnArm)('getLastCrashReport', () => {
|
||||
it('returns the last uploaded report', async () => {
|
||||
const { remotely } = await startRemoteControlApp(crashpadExtraArgs);
|
||||
const { remotely } = await startRemoteControlApp();
|
||||
const { port, waitForCrash } = await startServer();
|
||||
|
||||
// 0. clear the crash reports directory.
|
||||
|
@ -415,7 +409,7 @@ ifdescribe(!isLinuxOnArm && !process.mas && !process.env.DISABLE_CRASH_REPORTER_
|
|||
|
||||
describe('getParameters', () => {
|
||||
it('returns all of the current parameters', async () => {
|
||||
const { remotely } = await startRemoteControlApp(crashpadExtraArgs);
|
||||
const { remotely } = await startRemoteControlApp();
|
||||
await remotely(() => {
|
||||
require('electron').crashReporter.start({
|
||||
submitURL: 'http://127.0.0.1',
|
||||
|
@ -427,7 +421,7 @@ ifdescribe(!isLinuxOnArm && !process.mas && !process.env.DISABLE_CRASH_REPORTER_
|
|||
});
|
||||
|
||||
it('reflects added and removed parameters', async () => {
|
||||
const { remotely } = await startRemoteControlApp(crashpadExtraArgs);
|
||||
const { remotely } = await startRemoteControlApp();
|
||||
await remotely(() => {
|
||||
require('electron').crashReporter.start({ submitURL: 'http://127.0.0.1' });
|
||||
require('electron').crashReporter.addExtraParameter('hello', 'world');
|
||||
|
@ -446,7 +440,7 @@ ifdescribe(!isLinuxOnArm && !process.mas && !process.env.DISABLE_CRASH_REPORTER_
|
|||
});
|
||||
|
||||
it('can be called in the renderer', async () => {
|
||||
const { remotely } = await startRemoteControlApp(crashpadExtraArgs);
|
||||
const { remotely } = await startRemoteControlApp();
|
||||
const rendererParameters = await remotely(async () => {
|
||||
const { crashReporter, BrowserWindow } = require('electron');
|
||||
crashReporter.start({ submitURL: 'http://' });
|
||||
|
@ -455,13 +449,7 @@ ifdescribe(!isLinuxOnArm && !process.mas && !process.env.DISABLE_CRASH_REPORTER_
|
|||
await bw.webContents.executeJavaScript('require(\'electron\').crashReporter.addExtraParameter(\'hello\', \'world\')');
|
||||
return bw.webContents.executeJavaScript('require(\'electron\').crashReporter.getParameters()');
|
||||
});
|
||||
if (process.platform === 'linux') {
|
||||
// On Linux, 'getParameters' will also include the global parameters,
|
||||
// because breakpad doesn't support global parameters.
|
||||
expect(rendererParameters).to.have.property('hello', 'world');
|
||||
} else {
|
||||
expect(rendererParameters).to.deep.equal({ hello: 'world' });
|
||||
}
|
||||
});
|
||||
|
||||
it('can be called in a node child process', async () => {
|
||||
|
@ -525,14 +513,14 @@ ifdescribe(!isLinuxOnArm && !process.mas && !process.env.DISABLE_CRASH_REPORTER_
|
|||
for (const crashingProcess of processList) {
|
||||
describe(`when ${crashingProcess} crashes`, () => {
|
||||
it('stores crashes in the crash dump directory when uploadToServer: false', async () => {
|
||||
const { remotely } = await startRemoteControlApp(crashpadExtraArgs);
|
||||
const { remotely } = await startRemoteControlApp();
|
||||
const crashesDir = await remotely(() => {
|
||||
const { crashReporter, app } = require('electron');
|
||||
crashReporter.start({ submitURL: 'http://127.0.0.1', uploadToServer: false, ignoreSystemCrashHandler: true });
|
||||
return app.getPath('crashDumps');
|
||||
});
|
||||
let reportsDir = crashesDir;
|
||||
if (process.platform === 'darwin' || (process.platform === 'linux' && withLinuxCrashpad)) {
|
||||
if (process.platform === 'darwin' || process.platform === 'linux') {
|
||||
reportsDir = path.join(crashesDir, 'completed');
|
||||
} else if (process.platform === 'win32') {
|
||||
reportsDir = path.join(crashesDir, 'reports');
|
||||
|
@ -541,21 +529,11 @@ ifdescribe(!isLinuxOnArm && !process.mas && !process.env.DISABLE_CRASH_REPORTER_
|
|||
crash(crashingProcess, remotely);
|
||||
const newFiles = await newFileAppeared;
|
||||
expect(newFiles.length).to.be.greaterThan(0);
|
||||
if (process.platform === 'linux' && !withLinuxCrashpad) {
|
||||
if (crashingProcess === 'main') {
|
||||
expect(newFiles[0]).to.match(/^[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{8}-[0-9a-f]{8}\.dmp$/);
|
||||
} else {
|
||||
const process = crashingProcess === 'sandboxed-renderer' ? 'renderer' : crashingProcess;
|
||||
const regex = RegExp(`chromium-${process}-minidump-[0-9a-f]{16}.dmp`);
|
||||
expect(newFiles[0]).to.match(regex);
|
||||
}
|
||||
} else {
|
||||
expect(newFiles[0]).to.match(/^[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}\.dmp$/);
|
||||
}
|
||||
});
|
||||
|
||||
it('respects an overridden crash dump directory', async () => {
|
||||
const { remotely } = await startRemoteControlApp(crashpadExtraArgs);
|
||||
const { remotely } = await startRemoteControlApp();
|
||||
const crashesDir = path.join(app.getPath('temp'), uuid.v4());
|
||||
const remoteCrashesDir = await remotely((crashesDir: string) => {
|
||||
const { crashReporter, app } = require('electron');
|
||||
|
@ -566,7 +544,7 @@ ifdescribe(!isLinuxOnArm && !process.mas && !process.env.DISABLE_CRASH_REPORTER_
|
|||
expect(remoteCrashesDir).to.equal(crashesDir);
|
||||
|
||||
let reportsDir = crashesDir;
|
||||
if (process.platform === 'darwin' || (process.platform === 'linux' && withLinuxCrashpad)) {
|
||||
if (process.platform === 'darwin' || process.platform === 'linux') {
|
||||
reportsDir = path.join(crashesDir, 'completed');
|
||||
} else if (process.platform === 'win32') {
|
||||
reportsDir = path.join(crashesDir, 'reports');
|
||||
|
@ -575,23 +553,11 @@ ifdescribe(!isLinuxOnArm && !process.mas && !process.env.DISABLE_CRASH_REPORTER_
|
|||
crash(crashingProcess, remotely);
|
||||
const newFiles = await newFileAppeared;
|
||||
expect(newFiles.length).to.be.greaterThan(0);
|
||||
if (process.platform === 'linux' && !withLinuxCrashpad) {
|
||||
if (crashingProcess === 'main') {
|
||||
expect(newFiles[0]).to.match(/^[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{8}-[0-9a-f]{8}\.dmp$/);
|
||||
} else {
|
||||
const process = crashingProcess !== 'sandboxed-renderer' ? crashingProcess : 'renderer';
|
||||
const regex = RegExp(`chromium-${process}-minidump-[0-9a-f]{16}.dmp`);
|
||||
expect(newFiles[0]).to.match(regex);
|
||||
}
|
||||
} else {
|
||||
expect(newFiles[0]).to.match(/^[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}\.dmp$/);
|
||||
}
|
||||
});
|
||||
});
|
||||
}
|
||||
});
|
||||
});
|
||||
}
|
||||
|
||||
describe('start() option validation', () => {
|
||||
it('requires that the submitURL option be specified', () => {
|
||||
|
|
Loading…
Add table
Reference in a new issue