Perhaps a network sniffer like wireshark might help capture where the communications is failing. It is free and available for most operating systems. Configure it to capture traffic for the loopback or local newtork interface (the name depends on the OS). Make sure it's capturing some local traffic eg if you open a web browser to localhost and/or your local telnet to port 7055. Then quit any existing firefox instances before trying to run your code. Do a telnet connection and then type some unique junk so you can easily find the telnet query later. Stop the capture once you think you have enough evidence. Then see if you can isolate the webdriver traffic eg using a filter of tcp port 7055.
If you wish you should be able to extract the text of the traffic and post it here.
I've probably given you about half the info needed for someone new to wireshark so tell me if you'd like more stuff explained and I'll try to fill in the gaps.
Julian
On Mar 23, 2009 10:46 AM, "Gleb Schukin" <gs1...@gmail.com> wrote:
Hi Simon,
I've tried both variants, with WebDriver profile created by profile manager and without, in second case I checked that there wasn't any redundant profiles except default one. In both cases I can see that Firefox profile changed to WebDriver profile and WebDriver Firefox extension is installed. When I create WebDriver profile manually I do NOT copy WebDriver extension.
Extension version is 0.6.680. I'm using latest WebDriver version available at downloads section.
I also had the same behavior with one of the previous WebDriver builds. When it was necessary to install Firefox extension manually.
-Gleb
On Mon, Mar 23, 2009 at 12:53 PM, Simon Stewart <simon.m...@gmail.com> wrote: > > > Hi Gleb, ...
I'm not sure WebDriver should listen on all interfaces by default,
that could be a security risk.
Cheers
Mirko
Cheers
Mirko
> I'm not sure WebDriver should listen on all interfaces by default,
> that could be a security risk.
Agreed. That's why I didn't enable it to start with, and just made it
listen on the loopback device. We could add a preference to allow
users to specify the address to bind to, but we should probably
(also?) do a better job of scanning the interfaces and identifying
loopback devices by the sound of it.
Thanks to everyone who's contributed on this thread: I know that it's
terribly frustrating when things like this don't work.
Regards,
Simon