Changeset 171859 in webkit
- Timestamp:
- Jul 31, 2014 9:45:19 AM (10 years ago)
- Location:
- trunk
- Files:
-
- 4 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/LayoutTests/ChangeLog
r171853 r171859 1 2014-07-31 Dan Bernstein <mitz@apple.com> 2 3 [WK2] Regression tests can't load HTTPS pages with NetworkProcess due to self-signed certificate 4 https://bugs.webkit.org/show_bug.cgi?id=115282 5 6 Reviewed by Sam Weinig. 7 8 * platform/mac-wk2/TestExpectations: Removed the exceptions listed under this bug. 9 1 10 2014-07-31 Michał Pakuła vel Rutka <m.pakula@samsung.com> 2 11 -
trunk/LayoutTests/platform/mac-wk2/TestExpectations
r171772 r171859 629 629 [ Mavericks ] storage/websql/private-browsing-noread-nowrite.html [ Skip ] 630 630 631 # https://bugs.webkit.org/show_bug.cgi?id=115282632 # PPT: https loads fail due to self-signed certificate633 [ Mavericks ] http/tests/appcache/different-https-origin-resource-main.html [ Skip ]634 [ Mavericks ] http/tests/cache/history-only-cached-subresource-loads-max-age-https.html [ Skip ]635 [ Mavericks ] http/tests/misc/dns-prefetch-control.html [ Skip ]636 [ Mavericks ] http/tests/navigation/https-in-page-cache.html [ Skip ]637 [ Mavericks ] http/tests/navigation/ping-cross-origin-from-https.html [ Skip ]638 [ Mavericks ] http/tests/security/contentSecurityPolicy/block-mixed-content-hides-warning.html [ Skip ]639 [ Mavericks ] http/tests/security/contentSecurityPolicy/script-src-star-cross-scheme.html [ Skip ]640 [ Mavericks ] http/tests/security/mixedContent [ Skip ]641 [ Mavericks ] http/tests/security/originHeader/origin-header-for-https.html [ Skip ]642 [ Mavericks ] http/tests/security/referrer-policy-https-always.html [ Skip ]643 [ Mavericks ] http/tests/security/referrer-policy-https-default.html [ Skip ]644 [ Mavericks ] http/tests/security/referrer-policy-https-never.html [ Skip ]645 [ Mavericks ] http/tests/security/referrer-policy-https-origin.html [ Skip ]646 [ Mavericks ] http/tests/security/referrer-policy-redirect-link.html [ Skip ]647 [ Mavericks ] http/tests/security/referrer-policy-redirect.html [ Skip ]648 [ Mavericks ] http/tests/ssl [ Skip ]649 650 631 # testRunner.setAlwaysAcceptCookies does not work with NetworkProcess 651 632 [ Mavericks ] http/tests/cookies/third-party-cookie-relaxing.html [ Skip ] -
trunk/Tools/ChangeLog
r171856 r171859 1 2014-07-31 Dan Bernstein <mitz@apple.com> 2 3 [WK2] Regression tests can't load HTTPS pages with NetworkProcess due to self-signed certificate 4 https://bugs.webkit.org/show_bug.cgi?id=115282 5 6 Reviewed by Sam Weinig. 7 8 * WebKitTestRunner/TestController.cpp: 9 (WTR::TestController::canAuthenticateAgainstProtectionSpaceInFrame): Return true for any 10 local host server trust protection space. 11 (WTR::TestController::didReceiveAuthenticationChallengeInFrame): Respond with a non-empty 12 credential to server trust challenges. 13 1 14 2014-07-31 Tibor Meszaros <tmeszaros.u-szeged@partner.samsung.com> 2 15 -
trunk/Tools/WebKitTestRunner/TestController.cpp
r171772 r171859 1199 1199 bool TestController::canAuthenticateAgainstProtectionSpaceInFrame(WKPageRef, WKFrameRef, WKProtectionSpaceRef protectionSpace, const void*) 1200 1200 { 1201 return WKProtectionSpaceGetAuthenticationScheme(protectionSpace) <= kWKProtectionSpaceAuthenticationSchemeHTTPDigest; 1201 WKProtectionSpaceAuthenticationScheme authenticationScheme = WKProtectionSpaceGetAuthenticationScheme(protectionSpace); 1202 1203 if (authenticationScheme == kWKProtectionSpaceAuthenticationSchemeServerTrustEvaluationRequested) { 1204 std::string host = toSTD(adoptWK(WKProtectionSpaceCopyHost(protectionSpace)).get()); 1205 return host == "localhost" || host == "127.0.0.1"; 1206 } 1207 1208 return authenticationScheme <= kWKProtectionSpaceAuthenticationSchemeHTTPDigest; 1202 1209 } 1203 1210 … … 1250 1257 void TestController::didReceiveAuthenticationChallengeInFrame(WKPageRef page, WKFrameRef frame, WKAuthenticationChallengeRef authenticationChallenge) 1251 1258 { 1259 WKProtectionSpaceRef protectionSpace = WKAuthenticationChallengeGetProtectionSpace(authenticationChallenge); 1260 WKAuthenticationDecisionListenerRef decisionListener = WKAuthenticationChallengeGetDecisionListener(authenticationChallenge); 1261 1262 if (WKProtectionSpaceGetAuthenticationScheme(protectionSpace) == kWKProtectionSpaceAuthenticationSchemeServerTrustEvaluationRequested) { 1263 // Any non-empty credential signals to accept the server trust. Since the cross-platform API 1264 // doesn't expose a way to create a credential from server trust, we use a password credential. 1265 1266 WKRetainPtr<WKCredentialRef> credential = adoptWK(WKCredentialCreate(toWK("accept server trust").get(), toWK("").get(), kWKCredentialPersistenceNone)); 1267 WKAuthenticationDecisionListenerUseCredential(decisionListener, credential.get()); 1268 return; 1269 } 1270 1252 1271 String message; 1253 1272 if (!m_handlesAuthenticationChallenges) … … 1257 1276 m_currentInvocation->outputText(message); 1258 1277 1259 WKAuthenticationDecisionListenerRef decisionListener = WKAuthenticationChallengeGetDecisionListener(authenticationChallenge);1260 1278 if (!m_handlesAuthenticationChallenges) { 1261 1279 WKAuthenticationDecisionListenerUseCredential(decisionListener, 0);
Note: See TracChangeset
for help on using the changeset viewer.